/* * Copyright (c) 2001 William C. Fenner. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that: (1) source code * distributions retain the above copyright notice and this paragraph * in its entirety, and (2) distributions including binary code include * the above copyright notice and this paragraph in its entirety in * the documentation or other materials provided with the distribution. * The name of William C. Fenner may not be used to endorse or * promote products derived from this software without specific prior * written permission. THIS SOFTWARE IS PROVIDED ``AS IS'' AND * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS * FOR A PARTICULAR PURPOSE. */ /* \summary: Multicast Source Discovery Protocol (MSDP) printer */ #include #include "netdissect-stdinc.h" #define ND_LONGJMP_FROM_TCHECK #include "netdissect.h" #include "addrtoname.h" #include "extract.h" #define MSDP_TYPE_MAX 7 void msdp_print(netdissect_options *ndo, const u_char *sp, u_int length) { unsigned int type, len; ndo->ndo_protocol = "msdp"; ND_PRINT(": "); nd_print_protocol(ndo); /* See if we think we're at the beginning of a compound packet */ type = GET_U_1(sp); len = GET_BE_U_2(sp + 1); ND_ICHECK_U(len, >, 1500); ND_ICHECK_U(len, <, 3); ND_ICHECK_U(type, ==, 0); ND_ICHECK_U(type, >, MSDP_TYPE_MAX); while (length != 0) { unsigned int entry_count; ND_ICHECK_U(length, <, 3); type = GET_U_1(sp); len = GET_BE_U_2(sp + 1); if (len > 1400 || ndo->ndo_vflag) ND_PRINT(" [len %u]", len); ND_ICHECK_U(len, <, 3); ND_ICHECK_U(length, <, len); switch (type) { case 1: /* IPv4 Source-Active */ case 3: /* IPv4 Source-Active Response */ if (type == 1) ND_PRINT(" SA"); else ND_PRINT(" SA-Response"); /* Entry Count */ ND_ICHECK_U(len, <, 4); entry_count = GET_U_1(sp + 3); ND_PRINT(" %u entries", entry_count); /* RP Address */ ND_ICHECK_U(len, <, 8); /* XXX -print this based on ndo_vflag? */ ND_TCHECK_4(sp + 4); /* Entries */ ND_TCHECK_LEN(sp + 8, entry_count*12); if (len > (8 + entry_count*12)) { /* Encapsulated IP packet */ ND_PRINT(" [w/data]"); if (ndo->ndo_vflag > 1) { ND_PRINT(" "); ip_print(ndo, sp + (8 + entry_count*12), len - (8 + entry_count*12)); } } break; case 2: /* draft-ietf-msdp-spec-13 */ ND_PRINT(" SA-Request"); /* Reserved */ ND_ICHECK_U(len, <, 4); ND_TCHECK_1(sp + 3); /* Group Address */ ND_ICHECK_U(len, <, 8); if (len != 8) ND_PRINT("[len=%u] ", len); ND_PRINT(" for %s", GET_IPADDR_STRING(sp + 4)); break; case 4: ND_PRINT(" Keepalive"); if (len != 3) ND_PRINT("[len=%u] ", len); break; case 5: ND_PRINT(" Notification"); break; default: ND_PRINT(" [type=%u len=%u]", type, len); break; } ND_TCHECK_LEN(sp, len); sp += len; length -= len; } return; invalid: nd_print_invalid(ndo); }