#include "netdissect-stdinc.h"
+#define ND_LONGJMP_FROM_TCHECK
#include "netdissect.h"
#include "extract.h"
#include "addrtoname.h"
int llc_hdrlen;
struct lladdr_info src, dst;
+ if (length < caplen) {
+ ND_PRINT("[length %u < caplen %u]", length, caplen);
+ nd_print_invalid(ndo);
+ return length;
+ }
if (caplen < ETHER_HDRLEN + switch_tag_len) {
nd_print_trunc(ndo);
return caplen;
}
- if (length < ETHER_HDRLEN + switch_tag_len) {
- nd_print_trunc(ndo);
- return length;
- }
if (print_encap_header != NULL)
(*print_encap_header)(ndo, encap_header_arg);
}
int ret = macsec_print(ndo, &p, &length, &caplen, &hdrlen,
- &src, &dst);
+ &src, &dst);
if (ret == 0) {
/* Payload is encrypted; print it as raw data. */
*/
length_type = GET_BE_U_2(p);
+ ND_LCHECK_U(caplen, 2);
length -= 2;
caplen -= 2;
p += 2;
ND_DEFAULTPRINT(p, caplen);
}
}
+invalid:
return hdrlen;
}
* Fail if we don't have enough data for the Hilscher pseudo-header.
*/
ndo->ndo_protocol = "netanalyzer";
- if (h->caplen < 4) {
- ndo->ndo_ll_hdr_len += h->caplen;
- nd_print_trunc(ndo);
- return;
- }
+ ND_TCHECK_LEN(p, 4);
/* Skip the pseudo-header. */
ndo->ndo_ll_hdr_len += 4;
* preamble, and SOF.
*/
ndo->ndo_protocol = "netanalyzer_transparent";
- if (h->caplen < 12) {
- ndo->ndo_ll_hdr_len += h->caplen;
- nd_print_trunc(ndo);
- return;
- }
+ ND_TCHECK_LEN(p, 12);
/* Skip the pseudo-header, preamble, and SOF. */
ndo->ndo_ll_hdr_len += 12;
nd_print_trunc(ndo);
return (1);
}
+ /* At least one byte is required */
+ /* FIXME: Reference for this byte? */
+ ND_TCHECK_1(p);
isoclns_print(ndo, p + 1, length - 1);
return(1);