X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/5045cf5cb8a13e05f97e30c44ec80b92625f169d..HEAD:/print-vtp.c diff --git a/print-vtp.c b/print-vtp.c index 34900876..82dfe2b3 100644 --- a/print-vtp.c +++ b/print-vtp.c @@ -13,20 +13,19 @@ * FOR A PARTICULAR PURPOSE. * * Reference documentation: - * http://www.cisco.com/c/en/us/support/docs/lan-switching/vtp/10558-21.html - * http://docstore.mik.ua/univercd/cc/td/doc/product/lan/trsrb/frames.htm + * https://www.cisco.com/c/en/us/support/docs/lan-switching/vtp/10558-21.html + * https://docstore.mik.ua/univercd/cc/td/doc/product/lan/trsrb/frames.htm * * Original code ode by Carles Kishimoto */ /* \summary: Cisco VLAN Trunking Protocol (VTP) printer */ -#ifdef HAVE_CONFIG_H -#include "config.h" -#endif +#include -#include +#include "netdissect-stdinc.h" +#define ND_LONGJMP_FROM_TCHECK #include "netdissect.h" #include "addrtoname.h" #include "extract.h" @@ -116,43 +115,44 @@ static const struct tok vtp_stp_type_values[] = { }; void -vtp_print (netdissect_options *ndo, - const u_char *pptr, u_int length) +vtp_print(netdissect_options *ndo, + const u_char *pptr, const u_int length) { u_int type, len, name_len, tlv_len, tlv_value, mgmtd_len; const u_char *tptr; const struct vtp_vlan_ *vtp_vlan; + ndo->ndo_protocol = "vtp"; if (length < VTP_HEADER_LEN) - goto trunc; + goto invalid; tptr = pptr; ND_TCHECK_LEN(tptr, VTP_HEADER_LEN); - type = EXTRACT_U_1(tptr + 1); - ND_PRINT((ndo, "VTPv%u, Message %s (0x%02x), length %u", - EXTRACT_U_1(tptr), + type = GET_U_1(tptr + 1); + ND_PRINT("VTPv%u, Message %s (0x%02x), length %u", + GET_U_1(tptr), tok2str(vtp_message_type_values,"Unknown message type", type), type, - length)); + length); /* In non-verbose mode, just print version and message type */ if (ndo->ndo_vflag < 1) { - return; + goto tcheck_full_packet; } /* verbose mode print all fields */ - ND_PRINT((ndo, "\n\tDomain name: ")); - mgmtd_len = EXTRACT_U_1(tptr + 3); - if (mgmtd_len < 1 || mgmtd_len > 32) { - ND_PRINT((ndo, " [invalid MgmtD Len %u]", mgmtd_len)); - return; + ND_PRINT("\n\tDomain name: "); + mgmtd_len = GET_U_1(tptr + 3); + if (mgmtd_len < 1 || mgmtd_len > VTP_DOMAIN_NAME_LEN) { + ND_PRINT(" [MgmtD Len %u]", mgmtd_len); + goto invalid; } - fn_printzp(ndo, tptr + 4, mgmtd_len, NULL); - ND_PRINT((ndo, ", %s: %u", + nd_printjnp(ndo, tptr + 4, mgmtd_len); + ND_PRINT(", %s: %u", tok2str(vtp_header_values, "Unknown", type), - EXTRACT_U_1(tptr + 2))); + GET_U_1(tptr + 2)); tptr += VTP_HEADER_LEN; @@ -180,23 +180,20 @@ vtp_print (netdissect_options *ndo, * */ - ND_TCHECK_8(tptr); - ND_PRINT((ndo, "\n\t Config Rev %x, Updater %s", - EXTRACT_BE_U_4(tptr), - ipaddr_string(ndo, tptr+4))); + ND_PRINT("\n\t Config Rev %x, Updater %s", + GET_BE_U_4(tptr), + GET_IPADDR_STRING(tptr+4)); tptr += 8; - ND_TCHECK_LEN(tptr, VTP_UPDATE_TIMESTAMP_LEN); - ND_PRINT((ndo, ", Timestamp 0x%08x 0x%08x 0x%08x", - EXTRACT_BE_U_4(tptr), - EXTRACT_BE_U_4(tptr + 4), - EXTRACT_BE_U_4(tptr + 8))); + ND_PRINT(", Timestamp 0x%08x 0x%08x 0x%08x", + GET_BE_U_4(tptr), + GET_BE_U_4(tptr + 4), + GET_BE_U_4(tptr + 8)); tptr += VTP_UPDATE_TIMESTAMP_LEN; - ND_TCHECK_LEN(tptr, VTP_MD5_DIGEST_LEN); - ND_PRINT((ndo, ", MD5 digest: %08x%08x%08x%08x", - EXTRACT_BE_U_4(tptr), - EXTRACT_BE_U_4(tptr + 4), - EXTRACT_BE_U_4(tptr + 8), - EXTRACT_BE_U_4(tptr + 12))); + ND_PRINT(", MD5 digest: %08x%08x%08x%08x", + GET_BE_U_4(tptr), + GET_BE_U_4(tptr + 4), + GET_BE_U_4(tptr + 8), + GET_BE_U_4(tptr + 12)); tptr += VTP_MD5_DIGEST_LEN; break; @@ -222,8 +219,7 @@ vtp_print (netdissect_options *ndo, * */ - ND_TCHECK_4(tptr); - ND_PRINT((ndo, ", Config Rev %x", EXTRACT_BE_U_4(tptr))); + ND_PRINT(", Config Rev %x", GET_BE_U_4(tptr)); /* * VLAN INFORMATION @@ -241,10 +237,9 @@ vtp_print (netdissect_options *ndo, */ tptr += 4; - while (tptr < (pptr+length)) { + while ((unsigned)(tptr - pptr) < length) { - ND_TCHECK_1(tptr); - len = EXTRACT_U_1(tptr); + len = GET_U_1(tptr); if (len == 0) break; @@ -252,21 +247,19 @@ vtp_print (netdissect_options *ndo, vtp_vlan = (const struct vtp_vlan_*)tptr; if (len < VTP_VLAN_INFO_FIXED_PART_LEN) - goto trunc; - ND_TCHECK(*vtp_vlan); - ND_PRINT((ndo, "\n\tVLAN info status %s, type %s, VLAN-id %u, MTU %u, SAID 0x%08x, Name ", - tok2str(vtp_vlan_status,"Unknown",EXTRACT_U_1(vtp_vlan->status)), - tok2str(vtp_vlan_type_values,"Unknown",EXTRACT_U_1(vtp_vlan->type)), - EXTRACT_BE_U_2(vtp_vlan->vlanid), - EXTRACT_BE_U_2(vtp_vlan->mtu), - EXTRACT_BE_U_4(vtp_vlan->index))); + goto invalid; + ND_PRINT("\n\tVLAN info status %s, type %s, VLAN-id %u, MTU %u, SAID 0x%08x, Name ", + tok2str(vtp_vlan_status,"Unknown",GET_U_1(vtp_vlan->status)), + tok2str(vtp_vlan_type_values,"Unknown",GET_U_1(vtp_vlan->type)), + GET_BE_U_2(vtp_vlan->vlanid), + GET_BE_U_2(vtp_vlan->mtu), + GET_BE_U_4(vtp_vlan->index)); len -= VTP_VLAN_INFO_FIXED_PART_LEN; tptr += VTP_VLAN_INFO_FIXED_PART_LEN; - name_len = EXTRACT_U_1(vtp_vlan->name_len); + name_len = GET_U_1(vtp_vlan->name_len); if (len < 4*((name_len + 3)/4)) - goto trunc; - ND_TCHECK_LEN(tptr, name_len); - fn_printzp(ndo, tptr, name_len, NULL); + goto invalid; + nd_printjnp(ndo, tptr, name_len); /* * Vlan names are aligned to 32-bit boundaries. @@ -276,28 +269,27 @@ vtp_print (netdissect_options *ndo, /* TLV information follows */ - while (len > 0) { + while (len != 0) { /* * Cisco specs say 2 bytes for type + 2 bytes for length; - * see http://docstore.mik.ua/univercd/cc/td/doc/product/lan/trsrb/frames.htm + * see https://docstore.mik.ua/univercd/cc/td/doc/product/lan/trsrb/frames.htm * However, actual packets on the wire appear to use 1 * byte for the type and 1 byte for the length, so that's * what we do. */ if (len < 2) - goto trunc; - ND_TCHECK_2(tptr); - type = EXTRACT_U_1(tptr); - tlv_len = EXTRACT_U_1(tptr + 1); + goto invalid; + type = GET_U_1(tptr); + tlv_len = GET_U_1(tptr + 1); - ND_PRINT((ndo, "\n\t\t%s (0x%04x) TLV", + ND_PRINT("\n\t\t%s (0x%04x) TLV", tok2str(vtp_vlan_tlv_values, "Unknown", type), - type)); + type); if (len < tlv_len * 2 + 2) { - ND_PRINT((ndo, " (TLV goes past the end of the packet)")); - return; + ND_PRINT(" (TLV goes past the end of the packet)"); + goto invalid; } ND_TCHECK_LEN(tptr, tlv_len * 2 + 2); @@ -306,38 +298,38 @@ vtp_print (netdissect_options *ndo, * in units of 16-bit words. */ if (tlv_len != 1) { - ND_PRINT((ndo, " (invalid TLV length %u != 1)", tlv_len)); - return; + ND_PRINT(" [TLV length %u != 1]", tlv_len); + goto invalid; } else { - tlv_value = EXTRACT_BE_U_2(tptr + 2); + tlv_value = GET_BE_U_2(tptr + 2); switch (type) { case VTP_VLAN_STE_HOP_COUNT: - ND_PRINT((ndo, ", %u", tlv_value)); + ND_PRINT(", %u", tlv_value); break; case VTP_VLAN_PRUNING: - ND_PRINT((ndo, ", %s (%u)", + ND_PRINT(", %s (%u)", tlv_value == 1 ? "Enabled" : "Disabled", - tlv_value)); + tlv_value); break; case VTP_VLAN_STP_TYPE: - ND_PRINT((ndo, ", %s (%u)", + ND_PRINT(", %s (%u)", tok2str(vtp_stp_type_values, "Unknown", tlv_value), - tlv_value)); + tlv_value); break; case VTP_VLAN_BRIDGE_TYPE: - ND_PRINT((ndo, ", %s (%u)", + ND_PRINT(", %s (%u)", tlv_value == 1 ? "SRB" : "SRT", - tlv_value)); + tlv_value); break; case VTP_VLAN_BACKUP_CRF_MODE: - ND_PRINT((ndo, ", %s (%u)", + ND_PRINT(", %s (%u)", tlv_value == 1 ? "Backup" : "Not backup", - tlv_value)); + tlv_value); break; /* @@ -377,8 +369,7 @@ vtp_print (netdissect_options *ndo, * */ - ND_TCHECK_4(tptr); - ND_PRINT((ndo, "\n\tStart value: %u", EXTRACT_BE_U_4(tptr))); + ND_PRINT("\n\tStart value: %u", GET_BE_U_4(tptr)); break; case VTP_JOIN_MESSAGE: @@ -392,13 +383,8 @@ vtp_print (netdissect_options *ndo, return; - trunc: - ND_PRINT((ndo, "[|vtp]")); +invalid: + nd_print_invalid(ndo); +tcheck_full_packet: + ND_TCHECK_LEN(pptr, length); } - -/* - * Local Variables: - * c-style: whitesmith - * c-basic-offset: 4 - * End: - */