X-Git-Url: https://git.tcpdump.org/tcpdump/blobdiff_plain/c6d472bf63488b0c2ab7ab9f4b32c68dd2c8ea2b..97de8ca7bd0e1a64714dc2819d65ee0863b1d6d1:/print-openflow.c diff --git a/print-openflow.c b/print-openflow.c index 8825ae3d..16d1e18b 100644 --- a/print-openflow.c +++ b/print-openflow.c @@ -30,20 +30,20 @@ * POSSIBILITY OF SUCH DAMAGE. */ -#define NETDISSECT_REWORKED +/* \summary: version-independent OpenFlow printer */ + #ifdef HAVE_CONFIG_H #include "config.h" #endif -#include +#include -#include "interface.h" +#include "netdissect.h" #include "extract.h" #include "openflow.h" #include "oui.h" static const char tstr[] = " [|openflow]"; -static const char cstr[] = " (corrupt)"; #define OF_VER_1_0 0x01 @@ -83,22 +83,22 @@ of_header_body_print(netdissect_options *ndo, const u_char *cp, const u_char *ep uint32_t xid; if (ep < cp + OF_HEADER_LEN) - goto corrupt; + goto invalid; /* version */ - ND_TCHECK2(*cp, 1); + ND_TCHECK_1(cp); version = *cp; cp += 1; /* type */ - ND_TCHECK2(*cp, 1); + ND_TCHECK_1(cp); type = *cp; cp += 1; /* length */ - ND_TCHECK2(*cp, 2); - length = EXTRACT_16BITS(cp); + ND_TCHECK_2(cp); + length = EXTRACT_BE_U_2(cp); cp += 2; /* xid */ - ND_TCHECK2(*cp, 4); - xid = EXTRACT_32BITS(cp); + ND_TCHECK_4(cp); + xid = EXTRACT_BE_U_4(cp); cp += 4; /* Message length includes the header length and a message always includes * the basic header. A message length underrun fails decoding of the rest of @@ -107,7 +107,7 @@ of_header_body_print(netdissect_options *ndo, const u_char *cp, const u_char *ep * segment. */ if (length < OF_HEADER_LEN) { of_header_print(ndo, version, type, length, xid); - goto corrupt; + goto invalid; } /* Decode known protocol versions further without printing the header (the * type decoding is version-specific. */ @@ -120,8 +120,8 @@ of_header_body_print(netdissect_options *ndo, const u_char *cp, const u_char *ep return cp + length - OF_HEADER_LEN; /* done with current message */ } -corrupt: /* fail current packet */ - ND_PRINT((ndo, "%s", cstr)); +invalid: /* fail current packet */ + ND_PRINT((ndo, "%s", istr)); ND_TCHECK2(*cp, ep - cp); return ep; trunc: