{
case TUNNEL_PASS:
if (length < 3)
- {
- ND_PRINT((ndo, "%s", tstr));
- return;
- }
+ goto trunc;
if (*data && (*data <=0x1F) )
ND_PRINT((ndo, "Tag[%u] ", *data));
else
if (*data <= 0x1F)
{
if (length < 1)
- {
- ND_PRINT((ndo, "%s", tstr));
- return;
- }
+ goto trunc;
if (*data)
ND_PRINT((ndo, "Tag[%u] ", *data));
else
}
break;
case EGRESS_VLAN_NAME:
+ if (length < 1)
+ goto trunc;
ND_PRINT((ndo, "%s (0x%02x) ",
tok2str(rfc4675_tagged,"Unknown tag",*data),
*data));
break;
}
- for (i=0; *data && i < length ; i++, data++)
+ for (i=0; i < length && *data; i++, data++)
ND_PRINT((ndo, "%c", (*data < 32 || *data > 126) ? '.' : *data));
return;
pim_header_asan-2 pim_header_asan-2.pcap pim_header_asan-2.out -v
pim_header_asan-3 pim_header_asan-3.pcap pim_header_asan-3.out -v
ip6_frag_asan ip6_frag_asan.pcap ip6_frag_asan.out -v
+radius_attr_asan radius_attr_asan.pcap radius_attr_asan.out -v
# RTP tests
# fuzzed pcap
--- /dev/null
+IP (tos 0x64, ttl 249, id 40192, offset 0, flags [+, DF, rsvd], proto UDP (17), length 299, options (unknown 235 [bad length 252]), bad cksum 8000 (->1faa)!)
+ 0.0.86.32.258 > 0.2.250.99.3799: RADIUS, length: 263
+ Unknown Command (58), id: 0x6a, Authenticator: 0901020ed7ff03edb63a0f00cb0f00cb
+ NAS-Port Attribute (5), length: 5, Value: ERROR: length 3 != 4
+ Unknown Attribute (127), length: 4, Value:
+ NAS-IP-Address Attribute (4), length: 4, Value: ERROR: length 2 != 4
+ NAS-IP-Address Attribute (4), length: 4, Value: ERROR: length 2 != 4
+ NAS-IP-Address Attribute (4), length: 4, Value: ERROR: length 2 != 4
+ Callback-Id Attribute (20), length: 4, Value: .. [|radius]