X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/9d046ee0503d4c8cbfcb200c88986de876f6cae7..HEAD:/print-udld.c diff --git a/print-udld.c b/print-udld.c index 543e6582..2ebb1555 100644 --- a/print-udld.c +++ b/print-udld.c @@ -19,17 +19,17 @@ /* specification: RFC 5171 */ -#ifdef HAVE_CONFIG_H #include -#endif #include "netdissect-stdinc.h" +#define ND_LONGJMP_FROM_TCHECK #include "netdissect.h" #include "extract.h" #define UDLD_HEADER_LEN 4 +#define UDLD_TLV_HEADER_LEN 4 #define UDLD_DEVICE_ID_TLV 0x0001 #define UDLD_PORT_ID_TLV 0x0002 #define UDLD_ECHO_TLV 0x0003 @@ -57,9 +57,15 @@ static const struct tok udld_code_values[] = { { 0, NULL} }; -static const struct tok udld_flags_values[] = { - { 0x00, "RT"}, - { 0x01, "RSY"}, +static const struct tok udld_flags_bitmap_str[] = { + { 1U << 0, "RT" }, + { 1U << 1, "RSY" }, + { 1U << 2, "MBZ-2" }, + { 1U << 3, "MBZ-3" }, + { 1U << 4, "MBZ-4" }, + { 1U << 5, "MBZ-5" }, + { 1U << 6, "MBZ-6" }, + { 1U << 7, "MBZ-7" }, { 0, NULL} }; @@ -93,73 +99,80 @@ static const struct tok udld_flags_values[] = { #define UDLD_EXTRACT_OPCODE(x) ((x)&0x1f) void -udld_print(netdissect_options *ndo, const u_char *pptr, u_int length) +udld_print(netdissect_options *ndo, + const u_char *tptr, u_int length) { - int code, type, len; - const u_char *tptr; + uint8_t ver, code, flags; ndo->ndo_protocol = "udld"; if (length < UDLD_HEADER_LEN) - goto trunc; - - tptr = pptr; - - ND_TCHECK_LEN(tptr, UDLD_HEADER_LEN); + goto invalid; + ver = UDLD_EXTRACT_VERSION(GET_U_1(tptr)); code = UDLD_EXTRACT_OPCODE(GET_U_1(tptr)); + tptr += 1; + length -= 1; + + flags = GET_U_1(tptr); + tptr += 1; + length -= 1; ND_PRINT("UDLDv%u, Code %s (%x), Flags [%s] (0x%02x), length %u", - UDLD_EXTRACT_VERSION(GET_U_1(tptr)), + ver, tok2str(udld_code_values, "Reserved", code), code, - bittok2str(udld_flags_values, "none", GET_U_1((tptr + 1))), - GET_U_1((tptr + 1)), - length); + bittok2str(udld_flags_bitmap_str, "none", flags), + flags, + length + 2); /* * In non-verbose mode, just print version and opcode type */ if (ndo->ndo_vflag < 1) { - return; + goto tcheck_remainder; } - ND_PRINT("\n\tChecksum 0x%04x (unverified)", GET_BE_U_2(tptr + 2)); + ND_PRINT("\n\tChecksum 0x%04x (unverified)", GET_BE_U_2(tptr)); + tptr += 2; + length -= 2; - tptr += UDLD_HEADER_LEN; + while (length) { + uint16_t type, len; - while (tptr < (pptr+length)) { + if (length < UDLD_TLV_HEADER_LEN) + goto invalid; - ND_TCHECK_4(tptr); type = GET_BE_U_2(tptr); - len = GET_BE_U_2(tptr + 2); + tptr += 2; + length -= 2; + + len = GET_BE_U_2(tptr); + tptr += 2; + length -= 2; ND_PRINT("\n\t%s (0x%04x) TLV, length %u", tok2str(udld_tlv_values, "Unknown", type), type, len); - if (type == 0) - goto invalid; - /* infinite loop check */ - if (len <= 4) + if (len <= UDLD_TLV_HEADER_LEN) goto invalid; - len -= 4; - tptr += 4; - - ND_TCHECK_LEN(tptr, len); + len -= UDLD_TLV_HEADER_LEN; + if (length < len) + goto invalid; switch (type) { case UDLD_DEVICE_ID_TLV: case UDLD_PORT_ID_TLV: case UDLD_DEVICE_NAME_TLV: ND_PRINT(", "); - nd_printzp(ndo, tptr, len, NULL); + nd_printjnp(ndo, tptr, len); break; case UDLD_ECHO_TLV: ND_PRINT(", "); - (void)nd_printn(ndo, tptr, len, NULL); + nd_printjn(ndo, tptr, len); break; case UDLD_MESSAGE_INTERVAL_TLV: @@ -176,16 +189,17 @@ udld_print(netdissect_options *ndo, const u_char *pptr, u_int length) break; default: + ND_TCHECK_LEN(tptr, len); break; } tptr += len; + length -= len; } return; invalid: nd_print_invalid(ndo); - return; -trunc: - nd_print_trunc(ndo); +tcheck_remainder: + ND_TCHECK_LEN(tptr, length); }