]> The Tcpdump Group git mirrors - tcpdump/blob - print-ldp.c
updated version
[tcpdump] / print-ldp.c
1 /*
2 * Redistribution and use in source and binary forms, with or without
3 * modification, are permitted provided that: (1) source code
4 * distributions retain the above copyright notice and this paragraph
5 * in its entirety, and (2) distributions including binary code include
6 * the above copyright notice and this paragraph in its entirety in
7 * the documentation or other materials provided with the distribution.
8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
11 * FOR A PARTICULAR PURPOSE.
12 *
13 * Original code by Hannes Gredler (hannes@juniper.net)
14 * and Steinar Haug (sthaug@nethelp.no)
15 */
16
17 #ifdef HAVE_CONFIG_H
18 #include "config.h"
19 #endif
20
21 #include <netdissect-stdinc.h>
22
23 #include "netdissect.h"
24 #include "extract.h"
25 #include "addrtoname.h"
26
27 #include "l2vpn.h"
28 #include "af.h"
29
30 /*
31 * ldp common header
32 *
33 * 0 1 2 3
34 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
35 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
36 * | Version | PDU Length |
37 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
38 * | LDP Identifier |
39 * + +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
40 * | |
41 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
42 *
43 */
44
45 struct ldp_common_header {
46 uint8_t version[2];
47 uint8_t pdu_length[2];
48 uint8_t lsr_id[4];
49 uint8_t label_space[2];
50 };
51
52 #define LDP_VERSION 1
53
54 /*
55 * ldp message header
56 *
57 * 0 1 2 3
58 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
59 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
60 * |U| Message Type | Message Length |
61 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
62 * | Message ID |
63 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
64 * | |
65 * + +
66 * | Mandatory Parameters |
67 * + +
68 * | |
69 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
70 * | |
71 * + +
72 * | Optional Parameters |
73 * + +
74 * | |
75 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
76 */
77
78 struct ldp_msg_header {
79 uint8_t type[2];
80 uint8_t length[2];
81 uint8_t id[4];
82 };
83
84 #define LDP_MASK_MSG_TYPE(x) ((x)&0x7fff)
85 #define LDP_MASK_U_BIT(x) ((x)&0x8000)
86
87 #define LDP_MSG_NOTIF 0x0001
88 #define LDP_MSG_HELLO 0x0100
89 #define LDP_MSG_INIT 0x0200
90 #define LDP_MSG_KEEPALIVE 0x0201
91 #define LDP_MSG_ADDRESS 0x0300
92 #define LDP_MSG_ADDRESS_WITHDRAW 0x0301
93 #define LDP_MSG_LABEL_MAPPING 0x0400
94 #define LDP_MSG_LABEL_REQUEST 0x0401
95 #define LDP_MSG_LABEL_WITHDRAW 0x0402
96 #define LDP_MSG_LABEL_RELEASE 0x0403
97 #define LDP_MSG_LABEL_ABORT_REQUEST 0x0404
98
99 #define LDP_VENDOR_PRIVATE_MIN 0x3e00
100 #define LDP_VENDOR_PRIVATE_MAX 0x3eff
101 #define LDP_EXPERIMENTAL_MIN 0x3f00
102 #define LDP_EXPERIMENTAL_MAX 0x3fff
103
104 static const struct tok ldp_msg_values[] = {
105 { LDP_MSG_NOTIF, "Notification" },
106 { LDP_MSG_HELLO, "Hello" },
107 { LDP_MSG_INIT, "Initialization" },
108 { LDP_MSG_KEEPALIVE, "Keepalive" },
109 { LDP_MSG_ADDRESS, "Address" },
110 { LDP_MSG_ADDRESS_WITHDRAW, "Address Withdraw" },
111 { LDP_MSG_LABEL_MAPPING, "Label Mapping" },
112 { LDP_MSG_LABEL_REQUEST, "Label Request" },
113 { LDP_MSG_LABEL_WITHDRAW, "Label Withdraw" },
114 { LDP_MSG_LABEL_RELEASE, "Label Release" },
115 { LDP_MSG_LABEL_ABORT_REQUEST, "Label Abort Request" },
116 { 0, NULL}
117 };
118
119 #define LDP_MASK_TLV_TYPE(x) ((x)&0x3fff)
120 #define LDP_MASK_F_BIT(x) ((x)&0x4000)
121
122 #define LDP_TLV_FEC 0x0100
123 #define LDP_TLV_ADDRESS_LIST 0x0101
124 #define LDP_TLV_ADDRESS_LIST_AFNUM_LEN 2
125 #define LDP_TLV_HOP_COUNT 0x0103
126 #define LDP_TLV_PATH_VECTOR 0x0104
127 #define LDP_TLV_GENERIC_LABEL 0x0200
128 #define LDP_TLV_ATM_LABEL 0x0201
129 #define LDP_TLV_FR_LABEL 0x0202
130 #define LDP_TLV_STATUS 0x0300
131 #define LDP_TLV_EXTD_STATUS 0x0301
132 #define LDP_TLV_RETURNED_PDU 0x0302
133 #define LDP_TLV_RETURNED_MSG 0x0303
134 #define LDP_TLV_COMMON_HELLO 0x0400
135 #define LDP_TLV_IPV4_TRANSPORT_ADDR 0x0401
136 #define LDP_TLV_CONFIG_SEQ_NUMBER 0x0402
137 #define LDP_TLV_IPV6_TRANSPORT_ADDR 0x0403
138 #define LDP_TLV_COMMON_SESSION 0x0500
139 #define LDP_TLV_ATM_SESSION_PARM 0x0501
140 #define LDP_TLV_FR_SESSION_PARM 0x0502
141 #define LDP_TLV_FT_SESSION 0x0503
142 #define LDP_TLV_LABEL_REQUEST_MSG_ID 0x0600
143 #define LDP_TLV_MTU 0x0601 /* rfc 3988 */
144
145 static const struct tok ldp_tlv_values[] = {
146 { LDP_TLV_FEC, "FEC" },
147 { LDP_TLV_ADDRESS_LIST, "Address List" },
148 { LDP_TLV_HOP_COUNT, "Hop Count" },
149 { LDP_TLV_PATH_VECTOR, "Path Vector" },
150 { LDP_TLV_GENERIC_LABEL, "Generic Label" },
151 { LDP_TLV_ATM_LABEL, "ATM Label" },
152 { LDP_TLV_FR_LABEL, "Frame-Relay Label" },
153 { LDP_TLV_STATUS, "Status" },
154 { LDP_TLV_EXTD_STATUS, "Extended Status" },
155 { LDP_TLV_RETURNED_PDU, "Returned PDU" },
156 { LDP_TLV_RETURNED_MSG, "Returned Message" },
157 { LDP_TLV_COMMON_HELLO, "Common Hello Parameters" },
158 { LDP_TLV_IPV4_TRANSPORT_ADDR, "IPv4 Transport Address" },
159 { LDP_TLV_CONFIG_SEQ_NUMBER, "Configuration Sequence Number" },
160 { LDP_TLV_IPV6_TRANSPORT_ADDR, "IPv6 Transport Address" },
161 { LDP_TLV_COMMON_SESSION, "Common Session Parameters" },
162 { LDP_TLV_ATM_SESSION_PARM, "ATM Session Parameters" },
163 { LDP_TLV_FR_SESSION_PARM, "Frame-Relay Session Parameters" },
164 { LDP_TLV_FT_SESSION, "Fault-Tolerant Session Parameters" },
165 { LDP_TLV_LABEL_REQUEST_MSG_ID, "Label Request Message ID" },
166 { LDP_TLV_MTU, "MTU" },
167 { 0, NULL}
168 };
169
170 #define LDP_FEC_WILDCARD 0x01
171 #define LDP_FEC_PREFIX 0x02
172 #define LDP_FEC_HOSTADDRESS 0x03
173 /* From RFC 4906; should probably be updated to RFC 4447 (e.g., VC -> PW) */
174 #define LDP_FEC_MARTINI_VC 0x80
175
176 static const struct tok ldp_fec_values[] = {
177 { LDP_FEC_WILDCARD, "Wildcard" },
178 { LDP_FEC_PREFIX, "Prefix" },
179 { LDP_FEC_HOSTADDRESS, "Host address" },
180 { LDP_FEC_MARTINI_VC, "Martini VC" },
181 { 0, NULL}
182 };
183
184 #define LDP_FEC_MARTINI_IFPARM_MTU 0x01
185 #define LDP_FEC_MARTINI_IFPARM_DESC 0x03
186 #define LDP_FEC_MARTINI_IFPARM_VCCV 0x0c
187
188 static const struct tok ldp_fec_martini_ifparm_values[] = {
189 { LDP_FEC_MARTINI_IFPARM_MTU, "MTU" },
190 { LDP_FEC_MARTINI_IFPARM_DESC, "Description" },
191 { LDP_FEC_MARTINI_IFPARM_VCCV, "VCCV" },
192 { 0, NULL}
193 };
194
195 /* draft-ietf-pwe3-vccv-04.txt */
196 static const struct tok ldp_fec_martini_ifparm_vccv_cc_values[] = {
197 { 0x01, "PWE3 control word" },
198 { 0x02, "MPLS Router Alert Label" },
199 { 0x04, "MPLS inner label TTL = 1" },
200 { 0, NULL}
201 };
202
203 /* draft-ietf-pwe3-vccv-04.txt */
204 static const struct tok ldp_fec_martini_ifparm_vccv_cv_values[] = {
205 { 0x01, "ICMP Ping" },
206 { 0x02, "LSP Ping" },
207 { 0x04, "BFD" },
208 { 0, NULL}
209 };
210
211 static int ldp_pdu_print(netdissect_options *, register const u_char *);
212
213 /*
214 * ldp tlv header
215 *
216 * 0 1 2 3
217 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
218 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
219 * |U|F| Type | Length |
220 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
221 * | |
222 * | Value |
223 * ~ ~
224 * | |
225 * | +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
226 * | |
227 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
228 */
229
230 #define TLV_TCHECK(minlen) \
231 ND_TCHECK2(*tptr, minlen); if (tlv_tlen < minlen) goto badtlv;
232
233 static int
234 ldp_tlv_print(netdissect_options *ndo,
235 register const u_char *tptr,
236 u_short msg_tlen)
237 {
238 struct ldp_tlv_header {
239 uint8_t type[2];
240 uint8_t length[2];
241 };
242
243 const struct ldp_tlv_header *ldp_tlv_header;
244 u_short tlv_type,tlv_len,tlv_tlen,af,ft_flags;
245 u_char fec_type;
246 u_int ui,vc_info_len, vc_info_tlv_type, vc_info_tlv_len,idx;
247 char buf[100];
248 int i;
249
250 ldp_tlv_header = (const struct ldp_tlv_header *)tptr;
251 ND_TCHECK(*ldp_tlv_header);
252 tlv_len=EXTRACT_16BITS(ldp_tlv_header->length);
253 if (tlv_len + 4 > msg_tlen) {
254 ND_PRINT((ndo, "\n\t\t TLV contents go past end of message"));
255 return 0;
256 }
257 tlv_tlen=tlv_len;
258 tlv_type=LDP_MASK_TLV_TYPE(EXTRACT_16BITS(ldp_tlv_header->type));
259
260 /* FIXME vendor private / experimental check */
261 ND_PRINT((ndo, "\n\t %s TLV (0x%04x), length: %u, Flags: [%s and %s forward if unknown]",
262 tok2str(ldp_tlv_values,
263 "Unknown",
264 tlv_type),
265 tlv_type,
266 tlv_len,
267 LDP_MASK_U_BIT(EXTRACT_16BITS(&ldp_tlv_header->type)) ? "continue processing" : "ignore",
268 LDP_MASK_F_BIT(EXTRACT_16BITS(&ldp_tlv_header->type)) ? "do" : "don't"));
269
270 tptr+=sizeof(struct ldp_tlv_header);
271
272 switch(tlv_type) {
273
274 case LDP_TLV_COMMON_HELLO:
275 TLV_TCHECK(4);
276 ND_PRINT((ndo, "\n\t Hold Time: %us, Flags: [%s Hello%s]",
277 EXTRACT_16BITS(tptr),
278 (EXTRACT_16BITS(tptr+2)&0x8000) ? "Targeted" : "Link",
279 (EXTRACT_16BITS(tptr+2)&0x4000) ? ", Request for targeted Hellos" : ""));
280 break;
281
282 case LDP_TLV_IPV4_TRANSPORT_ADDR:
283 TLV_TCHECK(4);
284 ND_PRINT((ndo, "\n\t IPv4 Transport Address: %s", ipaddr_string(ndo, tptr)));
285 break;
286 case LDP_TLV_IPV6_TRANSPORT_ADDR:
287 TLV_TCHECK(16);
288 ND_PRINT((ndo, "\n\t IPv6 Transport Address: %s", ip6addr_string(ndo, tptr)));
289 break;
290 case LDP_TLV_CONFIG_SEQ_NUMBER:
291 TLV_TCHECK(4);
292 ND_PRINT((ndo, "\n\t Sequence Number: %u", EXTRACT_32BITS(tptr)));
293 break;
294
295 case LDP_TLV_ADDRESS_LIST:
296 TLV_TCHECK(LDP_TLV_ADDRESS_LIST_AFNUM_LEN);
297 af = EXTRACT_16BITS(tptr);
298 tptr+=LDP_TLV_ADDRESS_LIST_AFNUM_LEN;
299 tlv_tlen -= LDP_TLV_ADDRESS_LIST_AFNUM_LEN;
300 ND_PRINT((ndo, "\n\t Address Family: %s, addresses",
301 tok2str(af_values, "Unknown (%u)", af)));
302 switch (af) {
303 case AFNUM_INET:
304 while(tlv_tlen >= sizeof(struct in_addr)) {
305 ND_TCHECK2(*tptr, sizeof(struct in_addr));
306 ND_PRINT((ndo, " %s", ipaddr_string(ndo, tptr)));
307 tlv_tlen-=sizeof(struct in_addr);
308 tptr+=sizeof(struct in_addr);
309 }
310 break;
311 case AFNUM_INET6:
312 while(tlv_tlen >= sizeof(struct in6_addr)) {
313 ND_TCHECK2(*tptr, sizeof(struct in6_addr));
314 ND_PRINT((ndo, " %s", ip6addr_string(ndo, tptr)));
315 tlv_tlen-=sizeof(struct in6_addr);
316 tptr+=sizeof(struct in6_addr);
317 }
318 break;
319 default:
320 /* unknown AF */
321 break;
322 }
323 break;
324
325 case LDP_TLV_COMMON_SESSION:
326 TLV_TCHECK(8);
327 ND_PRINT((ndo, "\n\t Version: %u, Keepalive: %us, Flags: [Downstream %s, Loop Detection %s]",
328 EXTRACT_16BITS(tptr), EXTRACT_16BITS(tptr+2),
329 (EXTRACT_16BITS(tptr+6)&0x8000) ? "On Demand" : "Unsolicited",
330 (EXTRACT_16BITS(tptr+6)&0x4000) ? "Enabled" : "Disabled"
331 ));
332 break;
333
334 case LDP_TLV_FEC:
335 TLV_TCHECK(1);
336 fec_type = *tptr;
337 ND_PRINT((ndo, "\n\t %s FEC (0x%02x)",
338 tok2str(ldp_fec_values, "Unknown", fec_type),
339 fec_type));
340
341 tptr+=1;
342 tlv_tlen-=1;
343 switch(fec_type) {
344
345 case LDP_FEC_WILDCARD:
346 break;
347 case LDP_FEC_PREFIX:
348 TLV_TCHECK(2);
349 af = EXTRACT_16BITS(tptr);
350 tptr+=LDP_TLV_ADDRESS_LIST_AFNUM_LEN;
351 tlv_tlen-=LDP_TLV_ADDRESS_LIST_AFNUM_LEN;
352 if (af == AFNUM_INET) {
353 i=decode_prefix4(ndo, tptr, tlv_tlen, buf, sizeof(buf));
354 if (i == -2)
355 goto trunc;
356 if (i == -3)
357 ND_PRINT((ndo, ": IPv4 prefix (goes past end of TLV)"));
358 else if (i == -1)
359 ND_PRINT((ndo, ": IPv4 prefix (invalid length)"));
360 else
361 ND_PRINT((ndo, ": IPv4 prefix %s", buf));
362 }
363 else if (af == AFNUM_INET6) {
364 i=decode_prefix6(ndo, tptr, tlv_tlen, buf, sizeof(buf));
365 if (i == -2)
366 goto trunc;
367 if (i == -3)
368 ND_PRINT((ndo, ": IPv4 prefix (goes past end of TLV)"));
369 else if (i == -1)
370 ND_PRINT((ndo, ": IPv6 prefix (invalid length)"));
371 else
372 ND_PRINT((ndo, ": IPv6 prefix %s", buf));
373 }
374 else
375 ND_PRINT((ndo, ": Address family %u prefix", af));
376 break;
377 case LDP_FEC_HOSTADDRESS:
378 break;
379 case LDP_FEC_MARTINI_VC:
380 /*
381 * According to RFC 4908, the VC info Length field can be zero,
382 * in which case not only are there no interface parameters,
383 * there's no VC ID.
384 */
385 TLV_TCHECK(7);
386 vc_info_len = *(tptr+2);
387
388 if (vc_info_len == 0) {
389 ND_PRINT((ndo, ": %s, %scontrol word, group-ID %u, VC-info-length: %u",
390 tok2str(l2vpn_encaps_values, "Unknown", EXTRACT_16BITS(tptr)&0x7fff),
391 EXTRACT_16BITS(tptr)&0x8000 ? "" : "no ",
392 EXTRACT_32BITS(tptr+3),
393 vc_info_len));
394 break;
395 }
396
397 /* Make sure we have the VC ID as well */
398 TLV_TCHECK(11);
399 ND_PRINT((ndo, ": %s, %scontrol word, group-ID %u, VC-ID %u, VC-info-length: %u",
400 tok2str(l2vpn_encaps_values, "Unknown", EXTRACT_16BITS(tptr)&0x7fff),
401 EXTRACT_16BITS(tptr)&0x8000 ? "" : "no ",
402 EXTRACT_32BITS(tptr+3),
403 EXTRACT_32BITS(tptr+7),
404 vc_info_len));
405 if (vc_info_len < 4) {
406 /* minimum 4, for the VC ID */
407 ND_PRINT((ndo, " (invalid, < 4"));
408 return(tlv_len+4); /* Type & Length fields not included */
409 }
410 vc_info_len -= 4; /* subtract out the VC ID, giving the length of the interface parameters */
411
412 /* Skip past the fixed information and the VC ID */
413 tptr+=11;
414 tlv_tlen-=11;
415 TLV_TCHECK(vc_info_len);
416
417 while (vc_info_len > 2) {
418 vc_info_tlv_type = *tptr;
419 vc_info_tlv_len = *(tptr+1);
420 if (vc_info_tlv_len < 2)
421 break;
422 if (vc_info_len < vc_info_tlv_len)
423 break;
424
425 ND_PRINT((ndo, "\n\t\tInterface Parameter: %s (0x%02x), len %u",
426 tok2str(ldp_fec_martini_ifparm_values,"Unknown",vc_info_tlv_type),
427 vc_info_tlv_type,
428 vc_info_tlv_len));
429
430 switch(vc_info_tlv_type) {
431 case LDP_FEC_MARTINI_IFPARM_MTU:
432 ND_PRINT((ndo, ": %u", EXTRACT_16BITS(tptr+2)));
433 break;
434
435 case LDP_FEC_MARTINI_IFPARM_DESC:
436 ND_PRINT((ndo, ": "));
437 for (idx = 2; idx < vc_info_tlv_len; idx++)
438 safeputchar(ndo, *(tptr + idx));
439 break;
440
441 case LDP_FEC_MARTINI_IFPARM_VCCV:
442 ND_PRINT((ndo, "\n\t\t Control Channels (0x%02x) = [%s]",
443 *(tptr+2),
444 bittok2str(ldp_fec_martini_ifparm_vccv_cc_values, "none", *(tptr+2))));
445 ND_PRINT((ndo, "\n\t\t CV Types (0x%02x) = [%s]",
446 *(tptr+3),
447 bittok2str(ldp_fec_martini_ifparm_vccv_cv_values, "none", *(tptr+3))));
448 break;
449
450 default:
451 print_unknown_data(ndo, tptr+2, "\n\t\t ", vc_info_tlv_len-2);
452 break;
453 }
454
455 vc_info_len -= vc_info_tlv_len;
456 tptr += vc_info_tlv_len;
457 }
458 break;
459 }
460
461 break;
462
463 case LDP_TLV_GENERIC_LABEL:
464 TLV_TCHECK(4);
465 ND_PRINT((ndo, "\n\t Label: %u", EXTRACT_32BITS(tptr) & 0xfffff));
466 break;
467
468 case LDP_TLV_STATUS:
469 TLV_TCHECK(8);
470 ui = EXTRACT_32BITS(tptr);
471 tptr+=4;
472 ND_PRINT((ndo, "\n\t Status: 0x%02x, Flags: [%s and %s forward]",
473 ui&0x3fffffff,
474 ui&0x80000000 ? "Fatal error" : "Advisory Notification",
475 ui&0x40000000 ? "do" : "don't"));
476 ui = EXTRACT_32BITS(tptr);
477 tptr+=4;
478 if (ui)
479 ND_PRINT((ndo, ", causing Message ID: 0x%08x", ui));
480 break;
481
482 case LDP_TLV_FT_SESSION:
483 TLV_TCHECK(8);
484 ft_flags = EXTRACT_16BITS(tptr);
485 ND_PRINT((ndo, "\n\t Flags: [%sReconnect, %sSave State, %sAll-Label Protection, %s Checkpoint, %sRe-Learn State]",
486 ft_flags&0x8000 ? "" : "No ",
487 ft_flags&0x8 ? "" : "Don't ",
488 ft_flags&0x4 ? "" : "No ",
489 ft_flags&0x2 ? "Sequence Numbered Label" : "All Labels",
490 ft_flags&0x1 ? "" : "Don't "));
491 tptr+=4;
492 ui = EXTRACT_32BITS(tptr);
493 if (ui)
494 ND_PRINT((ndo, ", Reconnect Timeout: %ums", ui));
495 tptr+=4;
496 ui = EXTRACT_32BITS(tptr);
497 if (ui)
498 ND_PRINT((ndo, ", Recovery Time: %ums", ui));
499 break;
500
501 case LDP_TLV_MTU:
502 TLV_TCHECK(2);
503 ND_PRINT((ndo, "\n\t MTU: %u", EXTRACT_16BITS(tptr)));
504 break;
505
506
507 /*
508 * FIXME those are the defined TLVs that lack a decoder
509 * you are welcome to contribute code ;-)
510 */
511
512 case LDP_TLV_HOP_COUNT:
513 case LDP_TLV_PATH_VECTOR:
514 case LDP_TLV_ATM_LABEL:
515 case LDP_TLV_FR_LABEL:
516 case LDP_TLV_EXTD_STATUS:
517 case LDP_TLV_RETURNED_PDU:
518 case LDP_TLV_RETURNED_MSG:
519 case LDP_TLV_ATM_SESSION_PARM:
520 case LDP_TLV_FR_SESSION_PARM:
521 case LDP_TLV_LABEL_REQUEST_MSG_ID:
522
523 default:
524 if (ndo->ndo_vflag <= 1)
525 print_unknown_data(ndo, tptr, "\n\t ", tlv_tlen);
526 break;
527 }
528 return(tlv_len+4); /* Type & Length fields not included */
529
530 trunc:
531 ND_PRINT((ndo, "\n\t\t packet exceeded snapshot"));
532 return 0;
533
534 badtlv:
535 ND_PRINT((ndo, "\n\t\t TLV contents go past end of TLV"));
536 return(tlv_len+4); /* Type & Length fields not included */
537 }
538
539 void
540 ldp_print(netdissect_options *ndo,
541 register const u_char *pptr, register u_int len)
542 {
543 int processed;
544 while (len > (sizeof(struct ldp_common_header) + sizeof(struct ldp_msg_header))) {
545 processed = ldp_pdu_print(ndo, pptr);
546 if (processed == 0)
547 return;
548 len -= processed;
549 pptr += processed;
550 }
551 }
552
553 static int
554 ldp_pdu_print(netdissect_options *ndo,
555 register const u_char *pptr)
556 {
557 const struct ldp_common_header *ldp_com_header;
558 const struct ldp_msg_header *ldp_msg_header;
559 const u_char *tptr,*msg_tptr;
560 u_short tlen;
561 u_short pdu_len,msg_len,msg_type,msg_tlen;
562 int hexdump,processed;
563
564 ldp_com_header = (const struct ldp_common_header *)pptr;
565 ND_TCHECK(*ldp_com_header);
566
567 /*
568 * Sanity checking of the header.
569 */
570 if (EXTRACT_16BITS(&ldp_com_header->version) != LDP_VERSION) {
571 ND_PRINT((ndo, "%sLDP version %u packet not supported",
572 (ndo->ndo_vflag < 1) ? "" : "\n\t",
573 EXTRACT_16BITS(&ldp_com_header->version)));
574 return 0;
575 }
576
577 pdu_len = EXTRACT_16BITS(&ldp_com_header->pdu_length);
578 if (pdu_len < sizeof(const struct ldp_common_header)-4) {
579 /* length too short */
580 ND_PRINT((ndo, "%sLDP, pdu-length: %u (too short, < %u)",
581 (ndo->ndo_vflag < 1) ? "" : "\n\t",
582 pdu_len,
583 (u_int)(sizeof(const struct ldp_common_header)-4)));
584 return 0;
585 }
586
587 /* print the LSR-ID, label-space & length */
588 ND_PRINT((ndo, "%sLDP, Label-Space-ID: %s:%u, pdu-length: %u",
589 (ndo->ndo_vflag < 1) ? "" : "\n\t",
590 ipaddr_string(ndo, &ldp_com_header->lsr_id),
591 EXTRACT_16BITS(&ldp_com_header->label_space),
592 pdu_len));
593
594 /* bail out if non-verbose */
595 if (ndo->ndo_vflag < 1)
596 return 0;
597
598 /* ok they seem to want to know everything - lets fully decode it */
599 tptr = pptr + sizeof(const struct ldp_common_header);
600 tlen = pdu_len - (sizeof(const struct ldp_common_header)-4); /* Type & Length fields not included */
601
602 while(tlen>0) {
603 /* did we capture enough for fully decoding the msg header ? */
604 ND_TCHECK2(*tptr, sizeof(struct ldp_msg_header));
605
606 ldp_msg_header = (const struct ldp_msg_header *)tptr;
607 msg_len=EXTRACT_16BITS(ldp_msg_header->length);
608 msg_type=LDP_MASK_MSG_TYPE(EXTRACT_16BITS(ldp_msg_header->type));
609
610 if (msg_len < sizeof(struct ldp_msg_header)-4) {
611 /* length too short */
612 /* FIXME vendor private / experimental check */
613 ND_PRINT((ndo, "\n\t %s Message (0x%04x), length: %u (too short, < %u)",
614 tok2str(ldp_msg_values,
615 "Unknown",
616 msg_type),
617 msg_type,
618 msg_len,
619 (u_int)(sizeof(struct ldp_msg_header)-4)));
620 return 0;
621 }
622
623 /* FIXME vendor private / experimental check */
624 ND_PRINT((ndo, "\n\t %s Message (0x%04x), length: %u, Message ID: 0x%08x, Flags: [%s if unknown]",
625 tok2str(ldp_msg_values,
626 "Unknown",
627 msg_type),
628 msg_type,
629 msg_len,
630 EXTRACT_32BITS(&ldp_msg_header->id),
631 LDP_MASK_U_BIT(EXTRACT_16BITS(&ldp_msg_header->type)) ? "continue processing" : "ignore"));
632
633 msg_tptr=tptr+sizeof(struct ldp_msg_header);
634 msg_tlen=msg_len-(sizeof(struct ldp_msg_header)-4); /* Type & Length fields not included */
635
636 /* did we capture enough for fully decoding the message ? */
637 ND_TCHECK2(*tptr, msg_len);
638 hexdump=FALSE;
639
640 switch(msg_type) {
641
642 case LDP_MSG_NOTIF:
643 case LDP_MSG_HELLO:
644 case LDP_MSG_INIT:
645 case LDP_MSG_KEEPALIVE:
646 case LDP_MSG_ADDRESS:
647 case LDP_MSG_LABEL_MAPPING:
648 case LDP_MSG_ADDRESS_WITHDRAW:
649 case LDP_MSG_LABEL_WITHDRAW:
650 while(msg_tlen >= 4) {
651 processed = ldp_tlv_print(ndo, msg_tptr, msg_tlen);
652 if (processed == 0)
653 break;
654 msg_tlen-=processed;
655 msg_tptr+=processed;
656 }
657 break;
658
659 /*
660 * FIXME those are the defined messages that lack a decoder
661 * you are welcome to contribute code ;-)
662 */
663
664 case LDP_MSG_LABEL_REQUEST:
665 case LDP_MSG_LABEL_RELEASE:
666 case LDP_MSG_LABEL_ABORT_REQUEST:
667
668 default:
669 if (ndo->ndo_vflag <= 1)
670 print_unknown_data(ndo, msg_tptr, "\n\t ", msg_tlen);
671 break;
672 }
673 /* do we want to see an additionally hexdump ? */
674 if (ndo->ndo_vflag > 1 || hexdump==TRUE)
675 print_unknown_data(ndo, tptr+sizeof(struct ldp_msg_header), "\n\t ",
676 msg_len);
677
678 tptr += msg_len+4;
679 tlen -= msg_len+4;
680 }
681 return pdu_len+4;
682 trunc:
683 ND_PRINT((ndo, "\n\t\t packet exceeded snapshot"));
684 return 0;
685 }
686
687 /*
688 * Local Variables:
689 * c-style: whitesmith
690 * c-basic-offset: 8
691 * End:
692 */