#include <string.h>
+#define ND_LONGJMP_FROM_TCHECK
#include "netdissect.h"
#include "extract.h"
#include "addrtoname.h"
ndo->ndo_protocol = "eigrp";
tptr=pptr;
+ tlen = len;
eigrp_com_header = (const struct eigrp_common_header *)pptr;
- ND_TCHECK_SIZE(eigrp_com_header);
/*
* Sanity checking of the header.
*/
+ if (len < sizeof(struct eigrp_common_header)) {
+ ND_PRINT("EIGRP %s, length: %u (too short, < %zu)",
+ tok2str(eigrp_opcode_values, "unknown (%u)",GET_U_1(eigrp_com_header->opcode)),
+ len, sizeof(struct eigrp_common_header));
+ goto check_remainder;
+ }
if (GET_U_1(eigrp_com_header->version) != EIGRP_VERSION) {
ND_PRINT("EIGRP version %u packet not supported",
GET_U_1(eigrp_com_header->version));
- return;
+ goto check_remainder;
}
/* in non-verbose mode just lets print the basic Message Type*/
ND_PRINT("EIGRP %s, length: %u",
tok2str(eigrp_opcode_values, "unknown (%u)",GET_U_1(eigrp_com_header->opcode)),
len);
- return;
+ goto check_remainder;
}
/* ok they seem to want to know everything - lets fully decode it */
-
- if (len < sizeof(struct eigrp_common_header)) {
- ND_PRINT("EIGRP %s, length: %u (too short, < %zu)",
- tok2str(eigrp_opcode_values, "unknown (%u)",GET_U_1(eigrp_com_header->opcode)),
- len, sizeof(struct eigrp_common_header));
- return;
- }
- tlen=len-sizeof(struct eigrp_common_header);
+ tlen -= sizeof(struct eigrp_common_header);
ND_PRINT("\n\tEIGRP v%u, opcode: %s (%u), chksum: 0x%04x, Flags: [%s]"
"\n\tseq: 0x%08x, ack: 0x%08x, VRID: %u, AS: %u, length: %u",
tptr+=sizeof(struct eigrp_common_header);
while(tlen>0) {
- /* did we capture enough for fully decoding the object header ? */
- ND_TCHECK_LEN(tptr, sizeof(struct eigrp_tlv_header));
-
+ if (tlen < sizeof(struct eigrp_tlv_header)) {
+ ND_PRINT("\n\t (only %u bytes of data)", tlen);
+ goto invalid;
+ }
eigrp_tlv_header = (const struct eigrp_tlv_header *)tptr;
eigrp_tlv_len=GET_BE_U_2(eigrp_tlv_header->length);
eigrp_tlv_type=GET_BE_U_2(eigrp_tlv_header->type);
-
- if (eigrp_tlv_len < sizeof(struct eigrp_tlv_header) ||
- eigrp_tlv_len > tlen) {
- print_unknown_data(ndo,tptr+sizeof(struct eigrp_tlv_header),"\n\t ",tlen);
- return;
- }
-
ND_PRINT("\n\t %s TLV (0x%04x), length: %u",
tok2str(eigrp_tlv_values,
"Unknown",
eigrp_tlv_type,
eigrp_tlv_len);
- if (eigrp_tlv_len < sizeof(struct eigrp_tlv_header)) {
- ND_PRINT(" (too short, < %zu)",
- sizeof(struct eigrp_tlv_header));
- break;
+ if (eigrp_tlv_len < sizeof(struct eigrp_tlv_header) ||
+ eigrp_tlv_len > tlen) {
+ goto invalid;
}
tlv_tptr=tptr+sizeof(struct eigrp_tlv_header);
tlv_tlen=eigrp_tlv_len-sizeof(struct eigrp_tlv_header);
tlen-=eigrp_tlv_len;
}
return;
-trunc:
- nd_print_trunc(ndo);
+invalid:
+ nd_print_invalid(ndo);
+check_remainder:
+ ND_TCHECK_LEN(tptr, tlen);
}