2010-10-28 16:23:25 +00:00
|
|
|
/*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that: (1) source code
|
|
|
|
* distributions retain the above copyright notice and this paragraph
|
|
|
|
* in its entirety, and (2) distributions including binary code include
|
|
|
|
* the above copyright notice and this paragraph in its entirety in
|
|
|
|
* the documentation or other materials provided with the distribution.
|
|
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND
|
|
|
|
* WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
|
|
|
|
* LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
|
|
* FOR A PARTICULAR PURPOSE.
|
|
|
|
*
|
|
|
|
* Copyright (c) 2009 Mojatatu Networks, Inc
|
|
|
|
*
|
|
|
|
*/
|
|
|
|
|
2017-01-31 19:17:06 +00:00
|
|
|
/* \summary: Forwarding and Control Element Separation (ForCES) Protocol printer */
|
|
|
|
|
|
|
|
/* specification: RFC 5810 */
|
|
|
|
|
2010-10-28 16:23:25 +00:00
|
|
|
#ifdef HAVE_CONFIG_H
|
2023-05-10 15:02:34 +00:00
|
|
|
#include <config.h>
|
2010-10-28 16:23:25 +00:00
|
|
|
#endif
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
#include "netdissect-stdinc.h"
|
2010-10-28 16:23:25 +00:00
|
|
|
|
2017-01-31 19:17:06 +00:00
|
|
|
#include "netdissect.h"
|
2010-10-28 16:23:25 +00:00
|
|
|
#include "extract.h"
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
|
|
|
|
#define ForCES_VERS 1
|
|
|
|
#define ForCES_HDRL 24
|
|
|
|
#define ForCES_ALNL 4U
|
|
|
|
#define TLV_HDRL 4
|
|
|
|
#define ILV_HDRL 8
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
#define TOM_RSVD 0x0
|
|
|
|
#define TOM_ASSNSETUP 0x1
|
|
|
|
#define TOM_ASSNTEARD 0x2
|
|
|
|
#define TOM_CONFIG 0x3
|
|
|
|
#define TOM_QUERY 0x4
|
|
|
|
#define TOM_EVENTNOT 0x5
|
|
|
|
#define TOM_PKTREDIR 0x6
|
|
|
|
#define TOM_HEARTBT 0x0F
|
|
|
|
#define TOM_ASSNSETREP 0x11
|
|
|
|
#define TOM_CONFIGREP 0x13
|
|
|
|
#define TOM_QUERYREP 0x14
|
2015-01-06 19:03:11 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* tom_h Flags: resv1(8b):maxtlvs(4b):resv2(2b):mintlv(2b)
|
|
|
|
*/
|
|
|
|
#define ZERO_TTLV 0x01
|
|
|
|
#define ZERO_MORE_TTLV 0x02
|
|
|
|
#define ONE_MORE_TTLV 0x04
|
|
|
|
#define ZERO_TLV 0x00
|
|
|
|
#define ONE_TLV 0x10
|
|
|
|
#define TWO_TLV 0x20
|
|
|
|
#define MAX_TLV 0xF0
|
|
|
|
|
|
|
|
#define TTLV_T1 (ONE_MORE_TTLV|ONE_TLV)
|
|
|
|
#define TTLV_T2 (ONE_MORE_TTLV|MAX_TLV)
|
|
|
|
|
|
|
|
struct tom_h {
|
|
|
|
uint32_t v;
|
|
|
|
uint16_t flags;
|
|
|
|
uint16_t op_msk;
|
|
|
|
const char *s;
|
2023-05-10 15:02:34 +00:00
|
|
|
int (*print) (netdissect_options *ndo, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
TOM_RSV_I,
|
|
|
|
TOM_ASS_I,
|
|
|
|
TOM_AST_I,
|
|
|
|
TOM_CFG_I,
|
|
|
|
TOM_QRY_I,
|
|
|
|
TOM_EVN_I,
|
|
|
|
TOM_RED_I,
|
|
|
|
TOM_HBT_I,
|
|
|
|
TOM_ASR_I,
|
|
|
|
TOM_CNR_I,
|
|
|
|
TOM_QRR_I,
|
|
|
|
_TOM_RSV_MAX
|
|
|
|
};
|
|
|
|
#define TOM_MAX_IND (_TOM_RSV_MAX - 1)
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static int
|
|
|
|
tom_valid(uint8_t tom)
|
2015-01-06 19:03:11 +00:00
|
|
|
{
|
|
|
|
if (tom > 0) {
|
|
|
|
if (tom >= 0x7 && tom <= 0xe)
|
|
|
|
return 0;
|
|
|
|
if (tom == 0x10)
|
|
|
|
return 0;
|
|
|
|
if (tom > 0x14)
|
|
|
|
return 0;
|
|
|
|
return 1;
|
|
|
|
} else
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static const char *
|
|
|
|
ForCES_node(uint32_t node)
|
2015-01-06 19:03:11 +00:00
|
|
|
{
|
|
|
|
if (node <= 0x3FFFFFFF)
|
|
|
|
return "FE";
|
|
|
|
if (node >= 0x40000000 && node <= 0x7FFFFFFF)
|
|
|
|
return "CE";
|
|
|
|
if (node >= 0xC0000000 && node <= 0xFFFFFFEF)
|
|
|
|
return "AllMulticast";
|
|
|
|
if (node == 0xFFFFFFFD)
|
|
|
|
return "AllCEsBroadcast";
|
|
|
|
if (node == 0xFFFFFFFE)
|
|
|
|
return "AllFEsBroadcast";
|
|
|
|
if (node == 0xFFFFFFFF)
|
|
|
|
return "AllBroadcast";
|
|
|
|
|
|
|
|
return "ForCESreserved";
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
static const struct tok ForCES_ACKs[] = {
|
|
|
|
{0x0, "NoACK"},
|
|
|
|
{0x1, "SuccessACK"},
|
|
|
|
{0x2, "FailureACK"},
|
|
|
|
{0x3, "AlwaysACK"},
|
|
|
|
{0, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct tok ForCES_EMs[] = {
|
|
|
|
{0x0, "EMReserved"},
|
|
|
|
{0x1, "execute-all-or-none"},
|
|
|
|
{0x2, "execute-until-failure"},
|
|
|
|
{0x3, "continue-execute-on-failure"},
|
|
|
|
{0, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct tok ForCES_ATs[] = {
|
|
|
|
{0x0, "Standalone"},
|
|
|
|
{0x1, "2PCtransaction"},
|
|
|
|
{0, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct tok ForCES_TPs[] = {
|
|
|
|
{0x0, "StartofTransaction"},
|
|
|
|
{0x1, "MiddleofTransaction"},
|
|
|
|
{0x2, "EndofTransaction"},
|
|
|
|
{0x3, "abort"},
|
|
|
|
{0, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Structure of forces header, naked of TLVs.
|
|
|
|
*/
|
|
|
|
struct forcesh {
|
2017-01-31 19:17:06 +00:00
|
|
|
nd_uint8_t fm_vrsvd; /* version and reserved */
|
2023-05-10 15:02:34 +00:00
|
|
|
#define ForCES_V(forcesh) (GET_U_1((forcesh)->fm_vrsvd) >> 4)
|
2017-01-31 19:17:06 +00:00
|
|
|
nd_uint8_t fm_tom; /* type of message */
|
|
|
|
nd_uint16_t fm_len; /* total length * 4 bytes */
|
2023-05-10 15:02:34 +00:00
|
|
|
#define ForCES_BLN(forcesh) ((uint32_t)(GET_BE_U_2((forcesh)->fm_len) << 2))
|
2017-01-31 19:17:06 +00:00
|
|
|
nd_uint32_t fm_sid; /* Source ID */
|
2023-05-10 15:02:34 +00:00
|
|
|
#define ForCES_SID(forcesh) GET_BE_U_4((forcesh)->fm_sid)
|
2017-01-31 19:17:06 +00:00
|
|
|
nd_uint32_t fm_did; /* Destination ID */
|
2023-05-10 15:02:34 +00:00
|
|
|
#define ForCES_DID(forcesh) GET_BE_U_4((forcesh)->fm_did)
|
2017-01-31 19:17:06 +00:00
|
|
|
nd_uint8_t fm_cor[8]; /* correlator */
|
|
|
|
nd_uint32_t fm_flags; /* flags */
|
2023-05-10 15:02:34 +00:00
|
|
|
#define ForCES_ACK(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0xC0000000) >> 30)
|
|
|
|
#define ForCES_PRI(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x38000000) >> 27)
|
|
|
|
#define ForCES_RS1(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x07000000) >> 24)
|
|
|
|
#define ForCES_EM(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x00C00000) >> 22)
|
|
|
|
#define ForCES_AT(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x00200000) >> 21)
|
|
|
|
#define ForCES_TP(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x00180000) >> 19)
|
|
|
|
#define ForCES_RS2(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x0007FFFF) >> 0)
|
2015-01-06 19:03:11 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
#define ForCES_HLN_VALID(fhl,tlen) ((tlen) >= ForCES_HDRL && \
|
|
|
|
(fhl) >= ForCES_HDRL && \
|
|
|
|
(fhl) == (tlen))
|
|
|
|
|
|
|
|
#define F_LFB_RSVD 0x0
|
|
|
|
#define F_LFB_FEO 0x1
|
|
|
|
#define F_LFB_FEPO 0x2
|
|
|
|
static const struct tok ForCES_LFBs[] = {
|
|
|
|
{F_LFB_RSVD, "Invalid TLV"},
|
|
|
|
{F_LFB_FEO, "FEObj LFB"},
|
|
|
|
{F_LFB_FEPO, "FEProtoObj LFB"},
|
|
|
|
{0, NULL}
|
|
|
|
};
|
|
|
|
|
2015-07-06 02:16:08 +00:00
|
|
|
/* this is defined in RFC5810 section A.2 */
|
2023-05-10 15:02:34 +00:00
|
|
|
/* https://www.iana.org/assignments/forces/forces.xhtml#oper-tlv-types */
|
2015-01-06 19:03:11 +00:00
|
|
|
enum {
|
2015-07-06 02:16:08 +00:00
|
|
|
F_OP_RSV = 0,
|
|
|
|
F_OP_SET = 1,
|
|
|
|
F_OP_SETPROP = 2,
|
|
|
|
F_OP_SETRESP = 3,
|
|
|
|
F_OP_SETPRESP = 4,
|
|
|
|
F_OP_DEL = 5,
|
|
|
|
F_OP_DELRESP = 6,
|
|
|
|
F_OP_GET = 7,
|
|
|
|
F_OP_GETPROP = 8,
|
|
|
|
F_OP_GETRESP = 9,
|
|
|
|
F_OP_GETPRESP = 10,
|
|
|
|
F_OP_REPORT = 11,
|
|
|
|
F_OP_COMMIT = 12,
|
|
|
|
F_OP_RCOMMIT = 13,
|
|
|
|
F_OP_RTRCOMP = 14,
|
2015-01-06 19:03:11 +00:00
|
|
|
_F_OP_MAX
|
|
|
|
};
|
|
|
|
#define F_OP_MAX (_F_OP_MAX - 1)
|
2015-07-06 02:16:08 +00:00
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
enum {
|
|
|
|
B_OP_SET = 1 << (F_OP_SET - 1),
|
|
|
|
B_OP_SETPROP = 1 << (F_OP_SETPROP - 1),
|
|
|
|
B_OP_SETRESP = 1 << (F_OP_SETRESP - 1),
|
|
|
|
B_OP_SETPRESP = 1 << (F_OP_SETPRESP - 1),
|
|
|
|
B_OP_DEL = 1 << (F_OP_DEL - 1),
|
|
|
|
B_OP_DELRESP = 1 << (F_OP_DELRESP - 1),
|
|
|
|
B_OP_GET = 1 << (F_OP_GET - 1),
|
|
|
|
B_OP_GETPROP = 1 << (F_OP_GETPROP - 1),
|
|
|
|
B_OP_GETRESP = 1 << (F_OP_GETRESP - 1),
|
|
|
|
B_OP_GETPRESP = 1 << (F_OP_GETPRESP - 1),
|
|
|
|
B_OP_REPORT = 1 << (F_OP_REPORT - 1),
|
|
|
|
B_OP_COMMIT = 1 << (F_OP_COMMIT - 1),
|
|
|
|
B_OP_RCOMMIT = 1 << (F_OP_RCOMMIT - 1),
|
2017-01-31 19:17:06 +00:00
|
|
|
B_OP_RTRCOMP = 1 << (F_OP_RTRCOMP - 1)
|
2015-01-06 19:03:11 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
struct optlv_h {
|
|
|
|
uint16_t flags;
|
|
|
|
uint16_t op_msk;
|
|
|
|
const char *s;
|
2023-05-10 15:02:34 +00:00
|
|
|
int (*print) (netdissect_options *ndo, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
|
|
|
};
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static int genoptlv_print(netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
2023-05-10 15:02:34 +00:00
|
|
|
static int recpdoptlv_print(netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
2023-05-10 15:02:34 +00:00
|
|
|
static int invoptlv_print(netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
|
|
|
|
|
|
|
#define OP_MIN_SIZ 8
|
|
|
|
struct pathdata_h {
|
2017-01-31 19:17:06 +00:00
|
|
|
nd_uint16_t pflags;
|
|
|
|
nd_uint16_t pIDcnt;
|
2015-01-06 19:03:11 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
#define B_FULLD 0x1
|
2023-05-10 15:02:34 +00:00
|
|
|
#define B_SPARD 0x2
|
2015-01-06 19:03:11 +00:00
|
|
|
#define B_RESTV 0x4
|
|
|
|
#define B_KEYIN 0x8
|
|
|
|
#define B_APPND 0x10
|
|
|
|
#define B_TRNG 0x20
|
|
|
|
|
|
|
|
static const struct optlv_h OPTLV_msg[F_OP_MAX + 1] = {
|
|
|
|
/* F_OP_RSV */ {ZERO_TTLV, 0, "Invalid OPTLV", invoptlv_print},
|
|
|
|
/* F_OP_SET */ {TTLV_T2, B_FULLD | B_SPARD, " Set", recpdoptlv_print},
|
|
|
|
/* F_OP_SETPROP */
|
|
|
|
{TTLV_T2, B_FULLD | B_SPARD, " SetProp", recpdoptlv_print},
|
|
|
|
/* F_OP_SETRESP */ {TTLV_T2, B_RESTV, " SetResp", recpdoptlv_print},
|
|
|
|
/* F_OP_SETPRESP */ {TTLV_T2, B_RESTV, " SetPropResp", recpdoptlv_print},
|
|
|
|
/* F_OP_DEL */ {ZERO_TTLV, 0, " Del", recpdoptlv_print},
|
|
|
|
/* F_OP_DELRESP */ {TTLV_T2, B_RESTV, " DelResp", recpdoptlv_print},
|
|
|
|
/* F_OP_GET */ {ZERO_TTLV, 0, " Get", recpdoptlv_print},
|
|
|
|
/* F_OP_GETPROP */ {ZERO_TTLV, 0, " GetProp", recpdoptlv_print},
|
|
|
|
/* F_OP_GETRESP */
|
|
|
|
{TTLV_T2, B_FULLD | B_SPARD | B_RESTV, " GetResp", recpdoptlv_print},
|
|
|
|
/* F_OP_GETPRESP */
|
|
|
|
{TTLV_T2, B_FULLD | B_RESTV, " GetPropResp", recpdoptlv_print},
|
|
|
|
/* F_OP_REPORT */
|
|
|
|
{TTLV_T2, B_FULLD | B_SPARD, " Report", recpdoptlv_print},
|
|
|
|
/* F_OP_COMMIT */ {ZERO_TTLV, 0, " Commit", NULL},
|
|
|
|
/* F_OP_RCOMMIT */ {TTLV_T1, B_RESTV, " RCommit", genoptlv_print},
|
|
|
|
/* F_OP_RTRCOMP */ {ZERO_TTLV, 0, " RTRCOMP", NULL},
|
|
|
|
};
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static const struct optlv_h *
|
|
|
|
get_forces_optlv_h(uint16_t opt)
|
2015-01-06 19:03:11 +00:00
|
|
|
{
|
2023-05-10 15:02:34 +00:00
|
|
|
if (opt > F_OP_MAX || opt == F_OP_RSV)
|
2015-01-06 19:03:11 +00:00
|
|
|
return &OPTLV_msg[F_OP_RSV];
|
|
|
|
|
|
|
|
return &OPTLV_msg[opt];
|
|
|
|
}
|
|
|
|
|
|
|
|
#define IND_SIZE 256
|
|
|
|
#define IND_CHR ' '
|
|
|
|
#define IND_PREF '\n'
|
|
|
|
#define IND_SUF 0x0
|
2017-01-31 19:17:06 +00:00
|
|
|
static char ind_buf[IND_SIZE];
|
2015-01-06 19:03:11 +00:00
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static char *
|
|
|
|
indent_pr(int indent, int nlpref)
|
2015-01-06 19:03:11 +00:00
|
|
|
{
|
|
|
|
int i = 0;
|
|
|
|
char *r = ind_buf;
|
|
|
|
|
|
|
|
if (indent > (IND_SIZE - 1))
|
|
|
|
indent = IND_SIZE - 1;
|
|
|
|
|
|
|
|
if (nlpref) {
|
|
|
|
r[i] = IND_PREF;
|
|
|
|
i++;
|
|
|
|
indent--;
|
|
|
|
}
|
|
|
|
|
|
|
|
while (--indent >= 0)
|
|
|
|
r[i++] = IND_CHR;
|
|
|
|
|
|
|
|
r[i] = IND_SUF;
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static int
|
|
|
|
op_valid(uint16_t op, uint16_t mask)
|
2015-01-06 19:03:11 +00:00
|
|
|
{
|
|
|
|
if (op == 0)
|
|
|
|
return 0;
|
2023-05-10 15:02:34 +00:00
|
|
|
if (op <= F_OP_MAX)
|
|
|
|
return (1 << (op - 1)) & mask; /* works only for 0x0001 through 0x0010 */
|
2015-01-06 19:03:11 +00:00
|
|
|
/* I guess we should allow vendor operations? */
|
|
|
|
if (op >= 0x8000)
|
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define F_TLV_RSVD 0x0000
|
|
|
|
#define F_TLV_REDR 0x0001
|
|
|
|
#define F_TLV_ASRS 0x0010
|
|
|
|
#define F_TLV_ASRT 0x0011
|
|
|
|
#define F_TLV_LFBS 0x1000
|
|
|
|
#define F_TLV_PDAT 0x0110
|
|
|
|
#define F_TLV_KEYI 0x0111
|
|
|
|
#define F_TLV_FULD 0x0112
|
|
|
|
#define F_TLV_SPAD 0x0113
|
|
|
|
#define F_TLV_REST 0x0114
|
|
|
|
#define F_TLV_METD 0x0115
|
|
|
|
#define F_TLV_REDD 0x0116
|
|
|
|
#define F_TLV_TRNG 0x0117
|
|
|
|
|
|
|
|
|
|
|
|
#define F_TLV_VNST 0x8000
|
|
|
|
|
|
|
|
static const struct tok ForCES_TLV[] = {
|
|
|
|
{F_TLV_RSVD, "Invalid TLV"},
|
|
|
|
{F_TLV_REDR, "REDIRECT TLV"},
|
|
|
|
{F_TLV_ASRS, "ASResult TLV"},
|
|
|
|
{F_TLV_ASRT, "ASTreason TLV"},
|
|
|
|
{F_TLV_LFBS, "LFBselect TLV"},
|
|
|
|
{F_TLV_PDAT, "PATH-DATA TLV"},
|
|
|
|
{F_TLV_KEYI, "KEYINFO TLV"},
|
|
|
|
{F_TLV_FULD, "FULLDATA TLV"},
|
|
|
|
{F_TLV_SPAD, "SPARSEDATA TLV"},
|
|
|
|
{F_TLV_REST, "RESULT TLV"},
|
|
|
|
{F_TLV_METD, "METADATA TLV"},
|
|
|
|
{F_TLV_REDD, "REDIRECTDATA TLV"},
|
|
|
|
{0, NULL}
|
|
|
|
};
|
|
|
|
|
|
|
|
#define TLV_HLN 4
|
2023-05-10 15:02:34 +00:00
|
|
|
static int
|
|
|
|
ttlv_valid(uint16_t ttlv)
|
2015-01-06 19:03:11 +00:00
|
|
|
{
|
|
|
|
if (ttlv > 0) {
|
|
|
|
if (ttlv == 1 || ttlv == 0x1000)
|
|
|
|
return 1;
|
|
|
|
if (ttlv >= 0x10 && ttlv <= 0x11)
|
|
|
|
return 1;
|
|
|
|
if (ttlv >= 0x110 && ttlv <= 0x116)
|
|
|
|
return 1;
|
|
|
|
if (ttlv >= 0x8000)
|
|
|
|
return 0; /* XXX: */
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
struct forces_ilv {
|
2017-01-31 19:17:06 +00:00
|
|
|
nd_uint32_t type;
|
|
|
|
nd_uint32_t length;
|
2015-01-06 19:03:11 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
struct forces_tlv {
|
2017-01-31 19:17:06 +00:00
|
|
|
nd_uint16_t type;
|
|
|
|
nd_uint16_t length;
|
2015-01-06 19:03:11 +00:00
|
|
|
};
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
#define F_ALN_LEN(len) roundup2(len, ForCES_ALNL)
|
2017-01-31 19:17:06 +00:00
|
|
|
#define GET_TOP_TLV(fhdr) ((const struct forces_tlv *)((fhdr) + sizeof (struct forcesh)))
|
2015-01-06 19:03:11 +00:00
|
|
|
#define TLV_SET_LEN(len) (F_ALN_LEN(TLV_HDRL) + (len))
|
2017-01-31 19:17:06 +00:00
|
|
|
#define TLV_DATA(tlvp) ((const void*)(((const char*)(tlvp)) + TLV_SET_LEN(0)))
|
2023-05-10 15:02:34 +00:00
|
|
|
#define GO_NXT_TLV(tlv,rlen) ((rlen) -= F_ALN_LEN(GET_BE_U_2((tlv)->length)), \
|
2017-01-31 19:17:06 +00:00
|
|
|
(const struct forces_tlv*)(((const char*)(tlv)) \
|
2023-05-10 15:02:34 +00:00
|
|
|
+ F_ALN_LEN(GET_BE_U_2((tlv)->length))))
|
2015-01-06 19:03:11 +00:00
|
|
|
#define ILV_SET_LEN(len) (F_ALN_LEN(ILV_HDRL) + (len))
|
2017-01-31 19:17:06 +00:00
|
|
|
#define ILV_DATA(ilvp) ((const void*)(((const char*)(ilvp)) + ILV_SET_LEN(0)))
|
2023-05-10 15:02:34 +00:00
|
|
|
#define GO_NXT_ILV(ilv,rlen) ((rlen) -= F_ALN_LEN(GET_BE_U_4((ilv)->length)), \
|
2017-01-31 19:17:06 +00:00
|
|
|
(const struct forces_ilv *)(((const char*)(ilv)) \
|
2023-05-10 15:02:34 +00:00
|
|
|
+ F_ALN_LEN(GET_BE_U_4((ilv)->length))))
|
2015-01-06 19:03:11 +00:00
|
|
|
#define INVALID_RLEN 1
|
|
|
|
#define INVALID_STLN 2
|
|
|
|
#define INVALID_LTLN 3
|
|
|
|
#define INVALID_ALEN 4
|
|
|
|
|
|
|
|
static const struct tok ForCES_TLV_err[] = {
|
|
|
|
{INVALID_RLEN, "Invalid total length"},
|
|
|
|
{INVALID_STLN, "xLV too short"},
|
|
|
|
{INVALID_LTLN, "xLV too long"},
|
|
|
|
{INVALID_ALEN, "data padding missing"},
|
|
|
|
{0, NULL}
|
|
|
|
};
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static u_int
|
|
|
|
tlv_valid(u_int tlvl, u_int rlen)
|
2015-01-06 19:03:11 +00:00
|
|
|
{
|
|
|
|
if (rlen < TLV_HDRL)
|
|
|
|
return INVALID_RLEN;
|
2023-05-10 15:02:34 +00:00
|
|
|
if (tlvl < TLV_HDRL)
|
2015-01-06 19:03:11 +00:00
|
|
|
return INVALID_STLN;
|
2023-05-10 15:02:34 +00:00
|
|
|
if (tlvl > rlen)
|
2015-01-06 19:03:11 +00:00
|
|
|
return INVALID_LTLN;
|
2023-05-10 15:02:34 +00:00
|
|
|
if (rlen < F_ALN_LEN(tlvl))
|
2015-01-06 19:03:11 +00:00
|
|
|
return INVALID_ALEN;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static int
|
|
|
|
ilv_valid(netdissect_options *ndo, const struct forces_ilv *ilv, u_int rlen)
|
2015-01-06 19:03:11 +00:00
|
|
|
{
|
|
|
|
if (rlen < ILV_HDRL)
|
|
|
|
return INVALID_RLEN;
|
2023-05-10 15:02:34 +00:00
|
|
|
if (GET_BE_U_4(ilv->length) < ILV_HDRL)
|
2015-01-06 19:03:11 +00:00
|
|
|
return INVALID_STLN;
|
2023-05-10 15:02:34 +00:00
|
|
|
if (GET_BE_U_4(ilv->length) > rlen)
|
2015-01-06 19:03:11 +00:00
|
|
|
return INVALID_LTLN;
|
2023-05-10 15:02:34 +00:00
|
|
|
if (rlen < F_ALN_LEN(GET_BE_U_4(ilv->length)))
|
2015-01-06 19:03:11 +00:00
|
|
|
return INVALID_ALEN;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static int lfbselect_print(netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
2023-05-10 15:02:34 +00:00
|
|
|
static int redirect_print(netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
2023-05-10 15:02:34 +00:00
|
|
|
static int asrtlv_print(netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
2023-05-10 15:02:34 +00:00
|
|
|
static int asttlv_print(netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
|
|
|
|
|
|
|
struct forces_lfbsh {
|
2017-01-31 19:17:06 +00:00
|
|
|
nd_uint32_t class;
|
|
|
|
nd_uint32_t instance;
|
2015-01-06 19:03:11 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
#define ASSNS_OPS (B_OP_REPORT)
|
|
|
|
#define CFG_OPS (B_OP_SET|B_OP_SETPROP|B_OP_DEL|B_OP_COMMIT|B_OP_RTRCOMP)
|
|
|
|
#define CFG_ROPS (B_OP_SETRESP|B_OP_SETPRESP|B_OP_DELRESP|B_OP_RCOMMIT)
|
|
|
|
#define CFG_QY (B_OP_GET|B_OP_GETPROP)
|
|
|
|
#define CFG_QYR (B_OP_GETRESP|B_OP_GETPRESP)
|
|
|
|
#define CFG_EVN (B_OP_REPORT)
|
|
|
|
|
|
|
|
static const struct tom_h ForCES_msg[TOM_MAX_IND + 1] = {
|
|
|
|
/* TOM_RSV_I */ {TOM_RSVD, ZERO_TTLV, 0, "Invalid message", NULL},
|
|
|
|
/* TOM_ASS_I */ {TOM_ASSNSETUP, ZERO_MORE_TTLV | TWO_TLV, ASSNS_OPS,
|
|
|
|
"Association Setup", lfbselect_print},
|
|
|
|
/* TOM_AST_I */
|
|
|
|
{TOM_ASSNTEARD, TTLV_T1, 0, "Association TearDown", asttlv_print},
|
|
|
|
/* TOM_CFG_I */ {TOM_CONFIG, TTLV_T2, CFG_OPS, "Config", lfbselect_print},
|
|
|
|
/* TOM_QRY_I */ {TOM_QUERY, TTLV_T2, CFG_QY, "Query", lfbselect_print},
|
|
|
|
/* TOM_EVN_I */ {TOM_EVENTNOT, TTLV_T1, CFG_EVN, "Event Notification",
|
|
|
|
lfbselect_print},
|
|
|
|
/* TOM_RED_I */
|
|
|
|
{TOM_PKTREDIR, TTLV_T2, 0, "Packet Redirect", redirect_print},
|
|
|
|
/* TOM_HBT_I */ {TOM_HEARTBT, ZERO_TTLV, 0, "HeartBeat", NULL},
|
|
|
|
/* TOM_ASR_I */
|
|
|
|
{TOM_ASSNSETREP, TTLV_T1, 0, "Association Response", asrtlv_print},
|
|
|
|
/* TOM_CNR_I */ {TOM_CONFIGREP, TTLV_T2, CFG_ROPS, "Config Response",
|
|
|
|
lfbselect_print},
|
|
|
|
/* TOM_QRR_I */
|
|
|
|
{TOM_QUERYREP, TTLV_T2, CFG_QYR, "Query Response", lfbselect_print},
|
|
|
|
};
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static const struct tom_h *
|
|
|
|
get_forces_tom(uint8_t tom)
|
2015-01-06 19:03:11 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for (i = TOM_RSV_I; i <= TOM_MAX_IND; i++) {
|
|
|
|
const struct tom_h *th = &ForCES_msg[i];
|
|
|
|
if (th->v == tom)
|
|
|
|
return th;
|
|
|
|
}
|
|
|
|
return &ForCES_msg[TOM_RSV_I];
|
|
|
|
}
|
|
|
|
|
|
|
|
struct pdata_ops {
|
|
|
|
uint32_t v;
|
|
|
|
uint16_t flags;
|
|
|
|
uint16_t op_msk;
|
|
|
|
const char *s;
|
2023-05-10 15:02:34 +00:00
|
|
|
int (*print) (netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
|
|
|
};
|
|
|
|
|
|
|
|
enum {
|
|
|
|
PD_RSV_I,
|
|
|
|
PD_SEL_I,
|
|
|
|
PD_FDT_I,
|
|
|
|
PD_SDT_I,
|
|
|
|
PD_RES_I,
|
|
|
|
PD_PDT_I,
|
|
|
|
_PD_RSV_MAX
|
|
|
|
};
|
|
|
|
#define PD_MAX_IND (_TOM_RSV_MAX - 1)
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static int
|
|
|
|
pd_valid(uint16_t pd)
|
2015-01-06 19:03:11 +00:00
|
|
|
{
|
|
|
|
if (pd >= F_TLV_PDAT && pd <= F_TLV_REST)
|
|
|
|
return 1;
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static void
|
2015-01-06 19:03:11 +00:00
|
|
|
chk_op_type(netdissect_options *ndo,
|
|
|
|
uint16_t type, uint16_t msk, uint16_t omsk)
|
|
|
|
{
|
|
|
|
if (type != F_TLV_PDAT) {
|
|
|
|
if (msk & B_KEYIN) {
|
|
|
|
if (type != F_TLV_KEYI) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Based on flags expected KEYINFO TLV!\n");
|
2015-01-06 19:03:11 +00:00
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (!(msk & omsk)) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Illegal DATA encoding for type 0x%x programmed %x got %x\n",
|
|
|
|
type, omsk, msk);
|
2015-01-06 19:03:11 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
|
|
|
#define F_SELKEY 1
|
|
|
|
#define F_SELTABRANGE 2
|
|
|
|
#define F_TABAPPEND 4
|
|
|
|
|
|
|
|
struct res_val {
|
2017-01-31 19:17:06 +00:00
|
|
|
nd_uint8_t result;
|
|
|
|
nd_uint8_t resv1;
|
|
|
|
nd_uint16_t resv2;
|
2015-01-06 19:03:11 +00:00
|
|
|
};
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static int prestlv_print(netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
2023-05-10 15:02:34 +00:00
|
|
|
static int pkeyitlv_print(netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
2023-05-10 15:02:34 +00:00
|
|
|
static int fdatatlv_print(netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
2023-05-10 15:02:34 +00:00
|
|
|
static int sdatatlv_print(netdissect_options *, const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent);
|
|
|
|
|
|
|
|
static const struct pdata_ops ForCES_pdata[PD_MAX_IND + 1] = {
|
|
|
|
/* PD_RSV_I */ {0, 0, 0, "Invalid message", NULL},
|
|
|
|
/* PD_SEL_I */ {F_TLV_KEYI, 0, 0, "KEYINFO TLV", pkeyitlv_print},
|
|
|
|
/* PD_FDT_I */ {F_TLV_FULD, 0, B_FULLD, "FULLDATA TLV", fdatatlv_print},
|
|
|
|
/* PD_SDT_I */ {F_TLV_SPAD, 0, B_SPARD, "SPARSEDATA TLV", sdatatlv_print},
|
|
|
|
/* PD_RES_I */ {F_TLV_REST, 0, B_RESTV, "RESULT TLV", prestlv_print},
|
|
|
|
/* PD_PDT_I */
|
|
|
|
{F_TLV_PDAT, 0, 0, "Inner PATH-DATA TLV", recpdoptlv_print},
|
|
|
|
};
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
static const struct pdata_ops *
|
|
|
|
get_forces_pd(uint16_t pd)
|
2015-01-06 19:03:11 +00:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
for (i = PD_RSV_I + 1; i <= PD_MAX_IND; i++) {
|
|
|
|
const struct pdata_ops *pdo = &ForCES_pdata[i];
|
|
|
|
if (pdo->v == pd)
|
|
|
|
return pdo;
|
|
|
|
}
|
|
|
|
return &ForCES_pdata[TOM_RSV_I];
|
|
|
|
}
|
|
|
|
|
|
|
|
enum {
|
|
|
|
E_SUCCESS,
|
|
|
|
E_INVALID_HEADER,
|
|
|
|
E_LENGTH_MISMATCH,
|
|
|
|
E_VERSION_MISMATCH,
|
|
|
|
E_INVALID_DESTINATION_PID,
|
|
|
|
E_LFB_UNKNOWN,
|
|
|
|
E_LFB_NOT_FOUND,
|
|
|
|
E_LFB_INSTANCE_ID_NOT_FOUND,
|
|
|
|
E_INVALID_PATH,
|
|
|
|
E_COMPONENT_DOES_NOT_EXIST,
|
|
|
|
E_EXISTS,
|
|
|
|
E_NOT_FOUND,
|
|
|
|
E_READ_ONLY,
|
|
|
|
E_INVALID_ARRAY_CREATION,
|
|
|
|
E_VALUE_OUT_OF_RANGE,
|
|
|
|
E_CONTENTS_TOO_LONG,
|
|
|
|
E_INVALID_PARAMETERS,
|
|
|
|
E_INVALID_MESSAGE_TYPE,
|
|
|
|
E_INVALID_FLAGS,
|
|
|
|
E_INVALID_TLV,
|
|
|
|
E_EVENT_ERROR,
|
|
|
|
E_NOT_SUPPORTED,
|
|
|
|
E_MEMORY_ERROR,
|
|
|
|
E_INTERNAL_ERROR,
|
|
|
|
/* 0x18-0xFE are reserved .. */
|
|
|
|
E_UNSPECIFIED_ERROR = 0XFF
|
|
|
|
};
|
|
|
|
|
|
|
|
static const struct tok ForCES_errs[] = {
|
|
|
|
{E_SUCCESS, "SUCCESS"},
|
|
|
|
{E_INVALID_HEADER, "INVALID HEADER"},
|
|
|
|
{E_LENGTH_MISMATCH, "LENGTH MISMATCH"},
|
|
|
|
{E_VERSION_MISMATCH, "VERSION MISMATCH"},
|
|
|
|
{E_INVALID_DESTINATION_PID, "INVALID DESTINATION PID"},
|
|
|
|
{E_LFB_UNKNOWN, "LFB UNKNOWN"},
|
|
|
|
{E_LFB_NOT_FOUND, "LFB NOT FOUND"},
|
|
|
|
{E_LFB_INSTANCE_ID_NOT_FOUND, "LFB INSTANCE ID NOT FOUND"},
|
|
|
|
{E_INVALID_PATH, "INVALID PATH"},
|
|
|
|
{E_COMPONENT_DOES_NOT_EXIST, "COMPONENT DOES NOT EXIST"},
|
|
|
|
{E_EXISTS, "EXISTS ALREADY"},
|
|
|
|
{E_NOT_FOUND, "NOT FOUND"},
|
|
|
|
{E_READ_ONLY, "READ ONLY"},
|
|
|
|
{E_INVALID_ARRAY_CREATION, "INVALID ARRAY CREATION"},
|
|
|
|
{E_VALUE_OUT_OF_RANGE, "VALUE OUT OF RANGE"},
|
|
|
|
{E_CONTENTS_TOO_LONG, "CONTENTS TOO LONG"},
|
|
|
|
{E_INVALID_PARAMETERS, "INVALID PARAMETERS"},
|
|
|
|
{E_INVALID_MESSAGE_TYPE, "INVALID MESSAGE TYPE"},
|
|
|
|
{E_INVALID_FLAGS, "INVALID FLAGS"},
|
|
|
|
{E_INVALID_TLV, "INVALID TLV"},
|
|
|
|
{E_EVENT_ERROR, "EVENT ERROR"},
|
|
|
|
{E_NOT_SUPPORTED, "NOT SUPPORTED"},
|
|
|
|
{E_MEMORY_ERROR, "MEMORY ERROR"},
|
|
|
|
{E_INTERNAL_ERROR, "INTERNAL ERROR"},
|
|
|
|
{E_UNSPECIFIED_ERROR, "UNSPECIFIED ERROR"},
|
|
|
|
{0, NULL}
|
|
|
|
};
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
#define RESLEN 4
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
prestlv_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk _U_, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_tlv *tlv = (const struct forces_tlv *)pptr;
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char *tdp = (const u_char *) TLV_DATA(tlv);
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct res_val *r = (const struct res_val *)tdp;
|
2010-10-28 16:23:25 +00:00
|
|
|
u_int dlen;
|
2023-05-10 15:02:34 +00:00
|
|
|
uint8_t result;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* pdatacnt_print() has ensured that len (the TLV length)
|
|
|
|
* >= TLV_HDRL.
|
|
|
|
*/
|
|
|
|
dlen = len - TLV_HDRL;
|
|
|
|
if (dlen != RESLEN) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("illegal RESULT-TLV: %u bytes!\n", dlen);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_TCHECK_SIZE(r);
|
|
|
|
result = GET_U_1(r->result);
|
|
|
|
if (result >= 0x18 && result <= 0xFE) {
|
|
|
|
ND_PRINT("illegal reserved result code: 0x%x!\n", result);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3) {
|
2010-10-28 16:23:25 +00:00
|
|
|
char *ib = indent_pr(indent, 0);
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%s Result: %s (code 0x%x)\n", ib,
|
|
|
|
tok2str(ForCES_errs, NULL, result), result);
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
trunc:
|
2023-05-10 15:02:34 +00:00
|
|
|
nd_print_trunc(ndo);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
fdatatlv_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk _U_, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_tlv *tlv = (const struct forces_tlv *)pptr;
|
2010-10-28 16:23:25 +00:00
|
|
|
u_int rlen;
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char *tdp = (const u_char *) TLV_DATA(tlv);
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t type;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* pdatacnt_print() or pkeyitlv_print() has ensured that len
|
|
|
|
* (the TLV length) >= TLV_HDRL.
|
|
|
|
*/
|
|
|
|
rlen = len - TLV_HDRL;
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_TCHECK_SIZE(tlv);
|
|
|
|
type = GET_BE_U_2(tlv->type);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (type != F_TLV_FULD) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Error: expecting FULLDATA!\n");
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3) {
|
2010-10-28 16:23:25 +00:00
|
|
|
char *ib = indent_pr(indent + 2, 1);
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%s[", ib + 1);
|
|
|
|
hex_print(ndo, ib, tdp, rlen);
|
|
|
|
ND_PRINT("\n%s]", ib + 1);
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
trunc:
|
2023-05-10 15:02:34 +00:00
|
|
|
nd_print_trunc(ndo);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
sdatailv_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk _U_, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
|
|
|
u_int rlen;
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_ilv *ilv = (const struct forces_ilv *)pptr;
|
2010-10-28 16:23:25 +00:00
|
|
|
int invilv;
|
|
|
|
|
|
|
|
if (len < ILV_HDRL) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Error: BAD SPARSEDATA-TLV!\n");
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2012-10-04 22:40:22 +00:00
|
|
|
rlen = len;
|
2010-10-28 16:23:25 +00:00
|
|
|
indent += 1;
|
|
|
|
while (rlen != 0) {
|
2015-01-06 19:03:11 +00:00
|
|
|
#if 0
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Jamal - outstanding length <%u>\n", rlen);
|
2015-01-06 19:03:11 +00:00
|
|
|
#endif
|
2012-10-04 22:40:22 +00:00
|
|
|
char *ib = indent_pr(indent, 1);
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char *tdp = (const u_char *) ILV_DATA(ilv);
|
|
|
|
invilv = ilv_valid(ndo, ilv, rlen);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (invilv) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Error: %s, rlen %u\n",
|
|
|
|
tok2str(ForCES_TLV_err, NULL, invilv), rlen);
|
2012-10-04 22:40:22 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3) {
|
2023-05-10 15:02:34 +00:00
|
|
|
u_int ilvl = GET_BE_U_4(ilv->length);
|
|
|
|
ND_PRINT("\n%s ILV: type %x length %u\n", ib + 1,
|
|
|
|
GET_BE_U_4(ilv->type), ilvl);
|
|
|
|
hex_print(ndo, "\t\t[", tdp, ilvl-ILV_HDRL);
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
ilv = GO_NXT_ILV(ilv, rlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
sdatatlv_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_tlv *tlv = (const struct forces_tlv *)pptr;
|
2010-10-28 16:23:25 +00:00
|
|
|
u_int rlen;
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char *tdp = (const u_char *) TLV_DATA(tlv);
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t type;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* pdatacnt_print() has ensured that len (the TLV length)
|
|
|
|
* >= TLV_HDRL.
|
|
|
|
*/
|
|
|
|
rlen = len - TLV_HDRL;
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_TCHECK_SIZE(tlv);
|
|
|
|
type = GET_BE_U_2(tlv->type);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (type != F_TLV_SPAD) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Error: expecting SPARSEDATA!\n");
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
return sdatailv_print(ndo, tdp, rlen, op_msk, indent);
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
trunc:
|
2023-05-10 15:02:34 +00:00
|
|
|
nd_print_trunc(ndo);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
pkeyitlv_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_tlv *tlv = (const struct forces_tlv *)pptr;
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char *tdp = (const u_char *) TLV_DATA(tlv);
|
|
|
|
const u_char *dp = tdp + 4;
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_tlv *kdtlv = (const struct forces_tlv *)dp;
|
2015-01-06 19:03:11 +00:00
|
|
|
uint32_t id;
|
2010-10-28 16:23:25 +00:00
|
|
|
char *ib = indent_pr(indent, 0);
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t type, tll;
|
|
|
|
u_int invtlv;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
id = GET_BE_U_4(tdp);
|
|
|
|
ND_PRINT("%sKeyinfo: Key 0x%x\n", ib, id);
|
|
|
|
type = GET_BE_U_2(kdtlv->type);
|
|
|
|
tll = GET_BE_U_2(kdtlv->length);
|
|
|
|
invtlv = tlv_valid(tll, len);
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
if (invtlv) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%s TLV type 0x%x len %u\n",
|
2010-10-28 16:23:25 +00:00
|
|
|
tok2str(ForCES_TLV_err, NULL, invtlv), type,
|
2023-05-10 15:02:34 +00:00
|
|
|
tll);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* At this point, tlv_valid() has ensured that the TLV
|
|
|
|
* length is large enough but not too large (it doesn't
|
|
|
|
* go past the end of the containing TLV).
|
|
|
|
*/
|
2023-05-10 15:02:34 +00:00
|
|
|
tll = GET_BE_U_2(kdtlv->length);
|
2017-01-31 19:17:06 +00:00
|
|
|
dp = (const u_char *) TLV_DATA(kdtlv);
|
2015-01-06 19:03:11 +00:00
|
|
|
return fdatatlv_print(ndo, dp, tll, op_msk, indent);
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
#define PTH_DESC_SIZE 12
|
|
|
|
|
|
|
|
static int
|
|
|
|
pdatacnt_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t IDcnt, uint16_t op_msk, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
|
|
|
u_int i;
|
2015-01-06 19:03:11 +00:00
|
|
|
uint32_t id;
|
2010-10-28 16:23:25 +00:00
|
|
|
char *ib = indent_pr(indent, 0);
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if ((op_msk & B_APPND) && ndo->ndo_vflag >= 3) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%sTABLE APPEND\n", ib);
|
2015-01-06 19:03:11 +00:00
|
|
|
}
|
2010-10-28 16:23:25 +00:00
|
|
|
for (i = 0; i < IDcnt; i++) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_TCHECK_4(pptr);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (len < 4)
|
|
|
|
goto trunc;
|
2023-05-10 15:02:34 +00:00
|
|
|
id = GET_BE_U_4(pptr);
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3)
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%sID#%02u: %u\n", ib, i + 1, id);
|
2010-10-28 16:23:25 +00:00
|
|
|
len -= 4;
|
|
|
|
pptr += 4;
|
|
|
|
}
|
2015-01-06 19:03:11 +00:00
|
|
|
|
|
|
|
if ((op_msk & B_TRNG) || (op_msk & B_KEYIN)) {
|
|
|
|
if (op_msk & B_TRNG) {
|
|
|
|
uint32_t starti, endi;
|
|
|
|
|
|
|
|
if (len < PTH_DESC_SIZE) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("pathlength %u with key/range too short %u\n",
|
|
|
|
len, PTH_DESC_SIZE);
|
2015-01-06 19:03:11 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
pptr += sizeof(struct forces_tlv);
|
|
|
|
len -= sizeof(struct forces_tlv);
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
starti = GET_BE_U_4(pptr);
|
2015-01-06 19:03:11 +00:00
|
|
|
pptr += 4;
|
|
|
|
len -= 4;
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
endi = GET_BE_U_4(pptr);
|
2015-01-06 19:03:11 +00:00
|
|
|
pptr += 4;
|
|
|
|
len -= 4;
|
|
|
|
|
|
|
|
if (ndo->ndo_vflag >= 3)
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%sTable range: [%u,%u]\n", ib, starti, endi);
|
2015-01-06 19:03:11 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
if (op_msk & B_KEYIN) {
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_tlv *keytlv;
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t tll;
|
|
|
|
|
|
|
|
if (len < PTH_DESC_SIZE) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("pathlength %u with key/range too short %u\n",
|
|
|
|
len, PTH_DESC_SIZE);
|
2015-01-06 19:03:11 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* skip keyid */
|
|
|
|
pptr += 4;
|
|
|
|
len -= 4;
|
2017-01-31 19:17:06 +00:00
|
|
|
keytlv = (const struct forces_tlv *)pptr;
|
2015-01-06 19:03:11 +00:00
|
|
|
/* skip header */
|
|
|
|
pptr += sizeof(struct forces_tlv);
|
|
|
|
len -= sizeof(struct forces_tlv);
|
|
|
|
/* skip key content */
|
2023-05-10 15:02:34 +00:00
|
|
|
tll = GET_BE_U_2(keytlv->length);
|
2015-01-06 19:03:11 +00:00
|
|
|
if (tll < TLV_HDRL) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("key content length %u < %u\n",
|
|
|
|
tll, TLV_HDRL);
|
2015-01-06 19:03:11 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
tll -= TLV_HDRL;
|
|
|
|
if (len < tll) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("key content too short\n");
|
2015-01-06 19:03:11 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
pptr += tll;
|
|
|
|
len -= tll;
|
|
|
|
}
|
|
|
|
|
|
|
|
}
|
|
|
|
|
2010-10-28 16:23:25 +00:00
|
|
|
if (len) {
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_tlv *pdtlv = (const struct forces_tlv *)pptr;
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t type;
|
2023-05-10 15:02:34 +00:00
|
|
|
uint16_t tlvl, tll;
|
|
|
|
u_int pad = 0;
|
2010-10-28 16:23:25 +00:00
|
|
|
u_int aln;
|
2015-01-06 19:03:11 +00:00
|
|
|
u_int invtlv;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
type = GET_BE_U_2(pdtlv->type);
|
|
|
|
tlvl = GET_BE_U_2(pdtlv->length);
|
|
|
|
invtlv = tlv_valid(tlvl, len);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (invtlv) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%s Outstanding bytes %u for TLV type 0x%x TLV len %u\n",
|
2015-01-06 19:03:11 +00:00
|
|
|
tok2str(ForCES_TLV_err, NULL, invtlv), len, type,
|
2023-05-10 15:02:34 +00:00
|
|
|
tlvl);
|
2010-10-28 16:23:25 +00:00
|
|
|
goto pd_err;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* At this point, tlv_valid() has ensured that the TLV
|
|
|
|
* length is large enough but not too large (it doesn't
|
|
|
|
* go past the end of the containing TLV).
|
|
|
|
*/
|
2023-05-10 15:02:34 +00:00
|
|
|
tll = tlvl - TLV_HDRL;
|
|
|
|
aln = F_ALN_LEN(tlvl);
|
|
|
|
if (aln > tlvl) {
|
2010-10-28 16:23:25 +00:00
|
|
|
if (aln > len) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Invalid padded pathdata TLV type 0x%x len %u missing %u pad bytes\n",
|
|
|
|
type, tlvl, aln - len);
|
2010-10-28 16:23:25 +00:00
|
|
|
} else {
|
2023-05-10 15:02:34 +00:00
|
|
|
pad = aln - tlvl;
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
if (pd_valid(type)) {
|
|
|
|
const struct pdata_ops *ops = get_forces_pd(type);
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3 && ops->v != F_TLV_PDAT) {
|
2010-10-28 16:23:25 +00:00
|
|
|
if (pad)
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%s %s (Length %u DataLen %u pad %u Bytes)\n",
|
|
|
|
ib, ops->s, tlvl, tll, pad);
|
2010-10-28 16:23:25 +00:00
|
|
|
else
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%s %s (Length %u DataLen %u Bytes)\n",
|
|
|
|
ib, ops->s, tlvl, tll);
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
chk_op_type(ndo, type, op_msk, ops->op_msk);
|
2010-10-28 16:23:25 +00:00
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ops->print(ndo, (const u_char *)pdtlv,
|
2010-10-28 16:23:25 +00:00
|
|
|
tll + pad + TLV_HDRL, op_msk,
|
2012-10-04 22:40:22 +00:00
|
|
|
indent + 2) == -1)
|
|
|
|
return -1;
|
2012-05-14 08:01:48 +00:00
|
|
|
len -= (TLV_HDRL + pad + tll);
|
2010-10-28 16:23:25 +00:00
|
|
|
} else {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Invalid path data content type 0x%x len %u\n",
|
|
|
|
type, tlvl);
|
2010-10-28 16:23:25 +00:00
|
|
|
pd_err:
|
2023-05-10 15:02:34 +00:00
|
|
|
if (tlvl) {
|
|
|
|
hex_print(ndo, "Bad Data val\n\t [",
|
|
|
|
pptr, len);
|
|
|
|
ND_PRINT("]\n");
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
2012-05-14 08:01:48 +00:00
|
|
|
return len;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
trunc:
|
2023-05-10 15:02:34 +00:00
|
|
|
nd_print_trunc(ndo);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
pdata_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct pathdata_h *pdh = (const struct pathdata_h *)pptr;
|
2010-10-28 16:23:25 +00:00
|
|
|
char *ib = indent_pr(indent, 0);
|
|
|
|
u_int minsize = 0;
|
2012-05-14 08:01:48 +00:00
|
|
|
int more_pd = 0;
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t idcnt = 0;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_TCHECK_SIZE(pdh);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (len < sizeof(struct pathdata_h))
|
|
|
|
goto trunc;
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n%sPathdata: Flags 0x%x ID count %u\n",
|
|
|
|
ib, GET_BE_U_2(pdh->pflags),
|
|
|
|
GET_BE_U_2(pdh->pIDcnt));
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
if (GET_BE_U_2(pdh->pflags) & F_SELKEY) {
|
2010-10-28 16:23:25 +00:00
|
|
|
op_msk |= B_KEYIN;
|
|
|
|
}
|
2015-01-06 19:03:11 +00:00
|
|
|
|
|
|
|
/* Table GET Range operation */
|
2023-05-10 15:02:34 +00:00
|
|
|
if (GET_BE_U_2(pdh->pflags) & F_SELTABRANGE) {
|
2015-01-06 19:03:11 +00:00
|
|
|
op_msk |= B_TRNG;
|
|
|
|
}
|
|
|
|
/* Table SET append operation */
|
2023-05-10 15:02:34 +00:00
|
|
|
if (GET_BE_U_2(pdh->pflags) & F_TABAPPEND) {
|
2015-01-06 19:03:11 +00:00
|
|
|
op_msk |= B_APPND;
|
|
|
|
}
|
|
|
|
|
2010-10-28 16:23:25 +00:00
|
|
|
pptr += sizeof(struct pathdata_h);
|
|
|
|
len -= sizeof(struct pathdata_h);
|
2023-05-10 15:02:34 +00:00
|
|
|
idcnt = GET_BE_U_2(pdh->pIDcnt);
|
2012-05-14 08:01:48 +00:00
|
|
|
minsize = idcnt * 4;
|
2010-10-28 16:23:25 +00:00
|
|
|
if (len < minsize) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\t\t\ttruncated IDs expected %uB got %uB\n", minsize,
|
|
|
|
len);
|
|
|
|
hex_print(ndo, "\t\t\tID Data[", pptr, len);
|
|
|
|
ND_PRINT("]\n");
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2015-01-06 19:03:11 +00:00
|
|
|
|
|
|
|
if ((op_msk & B_TRNG) && (op_msk & B_KEYIN)) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\t\t\tIllegal to have both Table ranges and keys\n");
|
2015-01-06 19:03:11 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
more_pd = pdatacnt_print(ndo, pptr, len, idcnt, op_msk, indent);
|
2012-05-14 08:01:48 +00:00
|
|
|
if (more_pd > 0) {
|
|
|
|
int consumed = len - more_pd;
|
|
|
|
pptr += consumed;
|
2015-01-06 19:03:11 +00:00
|
|
|
len = more_pd;
|
2012-05-14 08:01:48 +00:00
|
|
|
/* XXX: Argh, recurse some more */
|
2015-01-06 19:03:11 +00:00
|
|
|
return recpdoptlv_print(ndo, pptr, len, op_msk, indent+1);
|
2012-05-14 08:01:48 +00:00
|
|
|
} else
|
|
|
|
return 0;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
trunc:
|
2023-05-10 15:02:34 +00:00
|
|
|
nd_print_trunc(ndo);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
genoptlv_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_tlv *pdtlv = (const struct forces_tlv *)pptr;
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t type;
|
2023-05-10 15:02:34 +00:00
|
|
|
u_int tlvl;
|
2015-01-06 19:03:11 +00:00
|
|
|
u_int invtlv;
|
2010-10-28 16:23:25 +00:00
|
|
|
char *ib = indent_pr(indent, 0);
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
type = GET_BE_U_2(pdtlv->type);
|
|
|
|
tlvl = GET_BE_U_2(pdtlv->length);
|
|
|
|
invtlv = tlv_valid(tlvl, len);
|
|
|
|
ND_PRINT("genoptlvprint - %s TLV type 0x%x len %u\n",
|
|
|
|
tok2str(ForCES_TLV, NULL, type), type, tlvl);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (!invtlv) {
|
|
|
|
/*
|
|
|
|
* At this point, tlv_valid() has ensured that the TLV
|
|
|
|
* length is large enough but not too large (it doesn't
|
|
|
|
* go past the end of the containing TLV).
|
|
|
|
*/
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char *dp = (const u_char *) TLV_DATA(pdtlv);
|
|
|
|
|
2010-10-28 16:23:25 +00:00
|
|
|
if (!ttlv_valid(type)) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%s TLV type 0x%x len %u\n",
|
2010-10-28 16:23:25 +00:00
|
|
|
tok2str(ForCES_TLV_err, NULL, invtlv), type,
|
2023-05-10 15:02:34 +00:00
|
|
|
tlvl);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3)
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%s%s, length %u (data length %u Bytes)",
|
2010-10-28 16:23:25 +00:00
|
|
|
ib, tok2str(ForCES_TLV, NULL, type),
|
2023-05-10 15:02:34 +00:00
|
|
|
tlvl, tlvl - TLV_HDRL);
|
2010-10-28 16:23:25 +00:00
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
return pdata_print(ndo, dp, tlvl - TLV_HDRL, op_msk, indent + 1);
|
2010-10-28 16:23:25 +00:00
|
|
|
} else {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\t\t\tInvalid ForCES TLV type=%x", type);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
recpdoptlv_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_tlv *pdtlv = (const struct forces_tlv *)pptr;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
while (len != 0) {
|
2023-05-10 15:02:34 +00:00
|
|
|
uint16_t type, tlvl;
|
|
|
|
u_int invtlv;
|
|
|
|
char *ib;
|
|
|
|
const u_char *dp;
|
|
|
|
|
|
|
|
tlvl = GET_BE_U_2(pdtlv->length);
|
|
|
|
invtlv = tlv_valid(tlvl, len);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (invtlv) {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* At this point, tlv_valid() has ensured that the TLV
|
|
|
|
* length is large enough but not too large (it doesn't
|
|
|
|
* go past the end of the containing TLV).
|
|
|
|
*/
|
|
|
|
ib = indent_pr(indent, 0);
|
2023-05-10 15:02:34 +00:00
|
|
|
type = GET_BE_U_2(pdtlv->type);
|
2017-01-31 19:17:06 +00:00
|
|
|
dp = (const u_char *) TLV_DATA(pdtlv);
|
2010-10-28 16:23:25 +00:00
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3)
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%s%s, length %u (data encapsulated %u Bytes)",
|
2015-01-06 19:03:11 +00:00
|
|
|
ib, tok2str(ForCES_TLV, NULL, type),
|
2023-05-10 15:02:34 +00:00
|
|
|
tlvl,
|
|
|
|
tlvl - TLV_HDRL);
|
2010-10-28 16:23:25 +00:00
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
if (pdata_print(ndo, dp, tlvl - TLV_HDRL, op_msk, indent + 1) == -1)
|
2012-10-04 22:40:22 +00:00
|
|
|
return -1;
|
2010-10-28 16:23:25 +00:00
|
|
|
pdtlv = GO_NXT_TLV(pdtlv, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n\t\tMessy PATHDATA TLV header, type (0x%x)\n\t\texcess of %u Bytes ",
|
|
|
|
GET_BE_U_2(pdtlv->type),
|
|
|
|
len - GET_BE_U_2(pdtlv->length));
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
invoptlv_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk _U_, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
|
|
|
char *ib = indent_pr(indent, 1);
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%sData[", ib + 1);
|
|
|
|
hex_print(ndo, ib, pptr, len);
|
|
|
|
ND_PRINT("%s]\n", ib);
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
otlv_print(netdissect_options *ndo,
|
|
|
|
const struct forces_tlv *otlv, uint16_t op_msk _U_, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
|
|
|
int rc = 0;
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char *dp = (const u_char *) TLV_DATA(otlv);
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t type;
|
2023-05-10 15:02:34 +00:00
|
|
|
u_int tll;
|
2010-10-28 16:23:25 +00:00
|
|
|
char *ib = indent_pr(indent, 0);
|
|
|
|
const struct optlv_h *ops;
|
|
|
|
|
|
|
|
/*
|
2023-05-10 15:02:34 +00:00
|
|
|
* lfbselect_print() has ensured that GET_BE_U_2(otlv->length)
|
2010-10-28 16:23:25 +00:00
|
|
|
* >= TLV_HDRL.
|
|
|
|
*/
|
2023-05-10 15:02:34 +00:00
|
|
|
type = GET_BE_U_2(otlv->type);
|
|
|
|
tll = GET_BE_U_2(otlv->length) - TLV_HDRL;
|
2010-10-28 16:23:25 +00:00
|
|
|
ops = get_forces_optlv_h(type);
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("%sOper TLV %s(0x%x) length %u\n", ib, ops->s, type,
|
|
|
|
GET_BE_U_2(otlv->length));
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
/* rest of ops must at least have 12B {pathinfo} */
|
|
|
|
if (tll < OP_MIN_SIZ) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\t\tOper TLV %s(0x%x) length %u\n", ops->s, type,
|
|
|
|
GET_BE_U_2(otlv->length));
|
|
|
|
ND_PRINT("\t\tTruncated data size %u minimum required %u\n", tll,
|
|
|
|
OP_MIN_SIZ);
|
2015-01-06 19:03:11 +00:00
|
|
|
return invoptlv_print(ndo, dp, tll, ops->op_msk, indent);
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
}
|
|
|
|
|
2015-07-06 02:16:08 +00:00
|
|
|
/* XXX - do anything with ops->flags? */
|
|
|
|
if(ops->print) {
|
|
|
|
rc = ops->print(ndo, dp, tll, ops->op_msk, indent + 1);
|
|
|
|
}
|
2010-10-28 16:23:25 +00:00
|
|
|
return rc;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define ASTDLN 4
|
|
|
|
#define ASTMCD 255
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
asttlv_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk _U_, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
2015-01-06 19:03:11 +00:00
|
|
|
uint32_t rescode;
|
2010-10-28 16:23:25 +00:00
|
|
|
u_int dlen;
|
|
|
|
char *ib = indent_pr(indent, 0);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* forces_type_print() has ensured that len (the TLV length)
|
|
|
|
* >= TLV_HDRL.
|
|
|
|
*/
|
|
|
|
dlen = len - TLV_HDRL;
|
|
|
|
if (dlen != ASTDLN) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("illegal ASTresult-TLV: %u bytes!\n", dlen);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2023-05-10 15:02:34 +00:00
|
|
|
rescode = GET_BE_U_4(pptr);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (rescode > ASTMCD) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("illegal ASTresult result code: %u!\n", rescode);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Teardown reason:\n%s", ib);
|
2010-10-28 16:23:25 +00:00
|
|
|
switch (rescode) {
|
|
|
|
case 0:
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Normal Teardown");
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
|
|
|
case 1:
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Loss of Heartbeats");
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
|
|
|
case 2:
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Out of bandwidth");
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
|
|
|
case 3:
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Out of Memory");
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
|
|
|
case 4:
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Application Crash");
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
|
|
|
default:
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Unknown Teardown reason");
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
|
|
|
}
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("(%x)\n%s", rescode, ib);
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define ASRDLN 4
|
|
|
|
#define ASRMCD 3
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
asrtlv_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk _U_, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
2015-01-06 19:03:11 +00:00
|
|
|
uint32_t rescode;
|
2010-10-28 16:23:25 +00:00
|
|
|
u_int dlen;
|
|
|
|
char *ib = indent_pr(indent, 0);
|
|
|
|
|
|
|
|
/*
|
|
|
|
* forces_type_print() has ensured that len (the TLV length)
|
|
|
|
* >= TLV_HDRL.
|
|
|
|
*/
|
|
|
|
dlen = len - TLV_HDRL;
|
|
|
|
if (dlen != ASRDLN) { /* id, instance, oper tlv */
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("illegal ASRresult-TLV: %u bytes!\n", dlen);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
2023-05-10 15:02:34 +00:00
|
|
|
rescode = GET_BE_U_4(pptr);
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
if (rescode > ASRMCD) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("illegal ASRresult result code: %u!\n", rescode);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n%s", ib);
|
2010-10-28 16:23:25 +00:00
|
|
|
switch (rescode) {
|
|
|
|
case 0:
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Success ");
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
|
|
|
case 1:
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("FE ID invalid ");
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
|
|
|
case 2:
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("permission denied ");
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
|
|
|
default:
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Unknown ");
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
|
|
|
}
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("(%x)\n%s", rescode, ib);
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
#if 0
|
2010-10-28 16:23:25 +00:00
|
|
|
/*
|
|
|
|
* XXX - not used.
|
|
|
|
*/
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
gentltlv_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr _U_, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk _U_, int indent _U_)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
|
|
|
u_int dlen = len - TLV_HDRL;
|
|
|
|
|
|
|
|
if (dlen < 4) { /* at least 32 bits must exist */
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("truncated TLV: %u bytes missing! ", 4 - dlen);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
2015-01-06 19:03:11 +00:00
|
|
|
#endif
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
#define RD_MIN 8
|
2015-01-06 19:03:11 +00:00
|
|
|
|
|
|
|
static int
|
|
|
|
print_metailv(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, uint16_t op_msk _U_, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
|
|
|
u_int rlen;
|
|
|
|
char *ib = indent_pr(indent, 0);
|
|
|
|
/* XXX: check header length */
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_ilv *ilv = (const struct forces_ilv *)pptr;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* print_metatlv() has ensured that len (what remains in the
|
|
|
|
* ILV) >= ILV_HDRL.
|
|
|
|
*/
|
2023-05-10 15:02:34 +00:00
|
|
|
rlen = GET_BE_U_4(ilv->length) - ILV_HDRL;
|
|
|
|
ND_PRINT("%sMetaID 0x%x length %u\n", ib, GET_BE_U_4(ilv->type),
|
|
|
|
GET_BE_U_4(ilv->length));
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3) {
|
2023-05-10 15:02:34 +00:00
|
|
|
hex_print(ndo, "\t\t[", ILV_DATA(ilv), rlen);
|
|
|
|
ND_PRINT(" ]\n");
|
2015-01-06 19:03:11 +00:00
|
|
|
}
|
2010-10-28 16:23:25 +00:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
print_metatlv(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk _U_, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
|
|
|
u_int dlen;
|
|
|
|
char *ib = indent_pr(indent, 0);
|
|
|
|
u_int rlen;
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_ilv *ilv = (const struct forces_ilv *)pptr;
|
2010-10-28 16:23:25 +00:00
|
|
|
int invilv;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* redirect_print() has ensured that len (what remains in the
|
|
|
|
* TLV) >= TLV_HDRL.
|
|
|
|
*/
|
|
|
|
dlen = len - TLV_HDRL;
|
|
|
|
rlen = dlen;
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n%s METADATA length %u\n", ib, rlen);
|
2010-10-28 16:23:25 +00:00
|
|
|
while (rlen != 0) {
|
2023-05-10 15:02:34 +00:00
|
|
|
invilv = ilv_valid(ndo, ilv, rlen);
|
2015-01-06 19:03:11 +00:00
|
|
|
if (invilv) {
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
2015-01-06 19:03:11 +00:00
|
|
|
}
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* At this point, ilv_valid() has ensured that the ILV
|
|
|
|
* length is large enough but not too large (it doesn't
|
|
|
|
* go past the end of the containing TLV).
|
|
|
|
*/
|
2017-01-31 19:17:06 +00:00
|
|
|
print_metailv(ndo, (const u_char *) ilv, 0, indent + 1);
|
2010-10-28 16:23:25 +00:00
|
|
|
ilv = GO_NXT_ILV(ilv, rlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
|
|
|
|
static int
|
|
|
|
print_reddata(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2017-01-31 19:17:06 +00:00
|
|
|
uint16_t op_msk _U_, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
|
|
|
u_int dlen;
|
2015-01-06 19:03:11 +00:00
|
|
|
char *ib = indent_pr(indent, 0);
|
2010-10-28 16:23:25 +00:00
|
|
|
u_int rlen;
|
|
|
|
|
|
|
|
dlen = len - TLV_HDRL;
|
|
|
|
rlen = dlen;
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n%s Redirect Data length %u\n", ib, rlen);
|
2010-10-28 16:23:25 +00:00
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\t\t[");
|
|
|
|
hex_print(ndo, "\n\t\t", pptr, rlen);
|
|
|
|
ND_PRINT("\n\t\t]");
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
redirect_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk _U_, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
2017-01-31 19:17:06 +00:00
|
|
|
const struct forces_tlv *tlv = (const struct forces_tlv *)pptr;
|
2010-10-28 16:23:25 +00:00
|
|
|
u_int dlen;
|
|
|
|
u_int rlen;
|
2015-01-06 19:03:11 +00:00
|
|
|
u_int invtlv;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* forces_type_print() has ensured that len (the TLV length)
|
|
|
|
* >= TLV_HDRL.
|
|
|
|
*/
|
|
|
|
dlen = len - TLV_HDRL;
|
|
|
|
if (dlen <= RD_MIN) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n\t\ttruncated Redirect TLV: %u bytes missing! ",
|
|
|
|
RD_MIN - dlen);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
rlen = dlen;
|
|
|
|
indent += 1;
|
|
|
|
while (rlen != 0) {
|
2023-05-10 15:02:34 +00:00
|
|
|
uint16_t type, tlvl;
|
|
|
|
|
|
|
|
type = GET_BE_U_2(tlv->type);
|
|
|
|
tlvl = GET_BE_U_2(tlv->length);
|
|
|
|
invtlv = tlv_valid(tlvl, rlen);
|
2015-01-06 19:03:11 +00:00
|
|
|
if (invtlv) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Bad Redirect data\n");
|
2010-10-28 16:23:25 +00:00
|
|
|
break;
|
2015-01-06 19:03:11 +00:00
|
|
|
}
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* At this point, tlv_valid() has ensured that the TLV
|
|
|
|
* length is large enough but not too large (it doesn't
|
|
|
|
* go past the end of the containing TLV).
|
|
|
|
*/
|
2023-05-10 15:02:34 +00:00
|
|
|
if (type == F_TLV_METD) {
|
2017-01-31 19:17:06 +00:00
|
|
|
print_metatlv(ndo, (const u_char *) TLV_DATA(tlv),
|
2023-05-10 15:02:34 +00:00
|
|
|
tlvl, 0,
|
|
|
|
indent);
|
|
|
|
} else if (type == F_TLV_REDD) {
|
2017-01-31 19:17:06 +00:00
|
|
|
print_reddata(ndo, (const u_char *) TLV_DATA(tlv),
|
2023-05-10 15:02:34 +00:00
|
|
|
tlvl, 0,
|
|
|
|
indent);
|
2010-10-28 16:23:25 +00:00
|
|
|
} else {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Unknown REDIRECT TLV 0x%x len %u\n",
|
|
|
|
type,
|
|
|
|
tlvl);
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
tlv = GO_NXT_TLV(tlv, rlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rlen) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n\t\tMessy Redirect TLV header, type (0x%x)\n\t\texcess of %u Bytes ",
|
|
|
|
GET_BE_U_2(tlv->type),
|
|
|
|
rlen - GET_BE_U_2(tlv->length));
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
#define OP_OFF 8
|
|
|
|
#define OP_MIN 12
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
lfbselect_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len,
|
2015-01-06 19:03:11 +00:00
|
|
|
uint16_t op_msk, int indent)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
|
|
|
const struct forces_lfbsh *lfbs;
|
|
|
|
const struct forces_tlv *otlv;
|
|
|
|
char *ib = indent_pr(indent, 0);
|
|
|
|
u_int dlen;
|
|
|
|
u_int rlen;
|
2015-01-06 19:03:11 +00:00
|
|
|
u_int invtlv;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* forces_type_print() has ensured that len (the TLV length)
|
|
|
|
* >= TLV_HDRL.
|
|
|
|
*/
|
|
|
|
dlen = len - TLV_HDRL;
|
|
|
|
if (dlen <= OP_MIN) { /* id, instance, oper tlv header .. */
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n\t\ttruncated lfb selector: %u bytes missing! ",
|
|
|
|
OP_MIN - dlen);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*
|
|
|
|
* At this point, we know that dlen > OP_MIN; OP_OFF < OP_MIN, so
|
|
|
|
* we also know that it's > OP_OFF.
|
|
|
|
*/
|
|
|
|
rlen = dlen - OP_OFF;
|
|
|
|
|
|
|
|
lfbs = (const struct forces_lfbsh *)pptr;
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_TCHECK_SIZE(lfbs);
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n%s%s(Classid %x) instance %x\n",
|
|
|
|
ib,
|
|
|
|
tok2str(ForCES_LFBs, NULL, GET_BE_U_4(lfbs->class)),
|
|
|
|
GET_BE_U_4(lfbs->class),
|
|
|
|
GET_BE_U_4(lfbs->instance));
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
|
2017-01-31 19:17:06 +00:00
|
|
|
otlv = (const struct forces_tlv *)(lfbs + 1);
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
indent += 1;
|
|
|
|
while (rlen != 0) {
|
2023-05-10 15:02:34 +00:00
|
|
|
uint16_t type, tlvl;
|
|
|
|
|
|
|
|
type = GET_BE_U_2(otlv->type);
|
|
|
|
tlvl = GET_BE_U_2(otlv->length);
|
|
|
|
invtlv = tlv_valid(tlvl, rlen);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (invtlv)
|
|
|
|
break;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* At this point, tlv_valid() has ensured that the TLV
|
|
|
|
* length is large enough but not too large (it doesn't
|
|
|
|
* go past the end of the containing TLV).
|
|
|
|
*/
|
2023-05-10 15:02:34 +00:00
|
|
|
if (op_valid(type, op_msk)) {
|
2015-01-06 19:03:11 +00:00
|
|
|
otlv_print(ndo, otlv, 0, indent);
|
2010-10-28 16:23:25 +00:00
|
|
|
} else {
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag < 3)
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n");
|
|
|
|
ND_PRINT("\t\tINValid oper-TLV type 0x%x length %u for this ForCES message\n",
|
|
|
|
type, tlvl);
|
2017-01-31 19:17:06 +00:00
|
|
|
invoptlv_print(ndo, (const u_char *)otlv, rlen, 0, indent);
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
otlv = GO_NXT_TLV(otlv, rlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rlen) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n\t\tMessy oper TLV header, type (0x%x)\n\t\texcess of %u Bytes ",
|
|
|
|
GET_BE_U_2(otlv->type),
|
|
|
|
rlen - GET_BE_U_2(otlv->length));
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
trunc:
|
2023-05-10 15:02:34 +00:00
|
|
|
nd_print_trunc(ndo);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
static int
|
|
|
|
forces_type_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, const struct forcesh *fhdr _U_,
|
|
|
|
u_int mlen, const struct tom_h *tops)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
|
|
|
const struct forces_tlv *tltlv;
|
|
|
|
u_int rlen;
|
2015-01-06 19:03:11 +00:00
|
|
|
u_int invtlv;
|
2010-10-28 16:23:25 +00:00
|
|
|
int rc = 0;
|
2023-05-10 15:02:34 +00:00
|
|
|
u_int ttlv = 0;
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
/*
|
|
|
|
* forces_print() has already checked that mlen >= ForCES_HDRL
|
|
|
|
* by calling ForCES_HLN_VALID().
|
|
|
|
*/
|
|
|
|
rlen = mlen - ForCES_HDRL;
|
|
|
|
|
|
|
|
if (rlen > TLV_HLN) {
|
|
|
|
if (tops->flags & ZERO_TTLV) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("<0x%x>Illegal Top level TLV!\n", tops->flags);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (tops->flags & ZERO_MORE_TTLV)
|
|
|
|
return 0;
|
|
|
|
if (tops->flags & ONE_MORE_TTLV) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\tTop level TLV Data missing!\n");
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (tops->flags & ZERO_TTLV) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
ttlv = tops->flags >> 4;
|
|
|
|
tltlv = GET_TOP_TLV(pptr);
|
|
|
|
|
|
|
|
/*XXX: 15 top level tlvs will probably be fine
|
|
|
|
You are nuts if you send more ;-> */
|
|
|
|
while (rlen != 0) {
|
2023-05-10 15:02:34 +00:00
|
|
|
uint16_t type, tlvl;
|
|
|
|
|
|
|
|
type = GET_BE_U_2(tltlv->type);
|
|
|
|
tlvl = GET_BE_U_2(tltlv->length);
|
|
|
|
invtlv = tlv_valid(tlvl, rlen);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (invtlv)
|
|
|
|
break;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* At this point, tlv_valid() has ensured that the TLV
|
|
|
|
* length is large enough but not too large (it doesn't
|
|
|
|
* go past the end of the packet).
|
|
|
|
*/
|
2023-05-10 15:02:34 +00:00
|
|
|
if (!ttlv_valid(type)) {
|
|
|
|
ND_PRINT("\n\tInvalid ForCES Top TLV type=0x%x",
|
|
|
|
type);
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 3)
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\t%s, length %u (data length %u Bytes)",
|
|
|
|
tok2str(ForCES_TLV, NULL, type),
|
|
|
|
tlvl,
|
|
|
|
tlvl - TLV_HDRL);
|
2010-10-28 16:23:25 +00:00
|
|
|
|
2017-01-31 19:17:06 +00:00
|
|
|
rc = tops->print(ndo, (const u_char *) TLV_DATA(tltlv),
|
2023-05-10 15:02:34 +00:00
|
|
|
tlvl,
|
|
|
|
tops->op_msk, 9);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (rc < 0) {
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
tltlv = GO_NXT_TLV(tltlv, rlen);
|
|
|
|
ttlv--;
|
|
|
|
if (ttlv <= 0)
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
/*
|
|
|
|
* XXX - if ttlv != 0, does that mean that the packet was too
|
|
|
|
* short, and didn't have *enough* TLVs in it?
|
|
|
|
*/
|
|
|
|
if (rlen) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\tMess TopTLV header: min %u, total %u advertised %u ",
|
|
|
|
TLV_HDRL, rlen, GET_BE_U_2(tltlv->length));
|
2010-10-28 16:23:25 +00:00
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
void
|
|
|
|
forces_print(netdissect_options *ndo,
|
2023-05-10 15:02:34 +00:00
|
|
|
const u_char * pptr, u_int len)
|
2010-10-28 16:23:25 +00:00
|
|
|
{
|
|
|
|
const struct forcesh *fhdr;
|
|
|
|
u_int mlen;
|
2015-01-06 19:03:11 +00:00
|
|
|
uint32_t flg_raw;
|
2023-05-10 15:02:34 +00:00
|
|
|
uint8_t tom;
|
2010-10-28 16:23:25 +00:00
|
|
|
const struct tom_h *tops;
|
|
|
|
int rc = 0;
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
ndo->ndo_protocol = "forces";
|
2010-10-28 16:23:25 +00:00
|
|
|
fhdr = (const struct forcesh *)pptr;
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_TCHECK_SIZE(fhdr);
|
|
|
|
tom = GET_U_1(fhdr->fm_tom);
|
|
|
|
if (!tom_valid(tom)) {
|
|
|
|
ND_PRINT("Invalid ForCES message type %u\n", tom);
|
2010-10-28 16:23:25 +00:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
|
|
|
mlen = ForCES_BLN(fhdr);
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
tops = get_forces_tom(tom);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (tops->v == TOM_RSVD) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n\tUnknown ForCES message type=0x%x", tom);
|
2010-10-28 16:23:25 +00:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n\tForCES %s ", tops->s);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (!ForCES_HLN_VALID(mlen, len)) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("Illegal ForCES pkt len - min %u, total recvd %u, advertised %u ",
|
|
|
|
ForCES_HDRL, len, ForCES_BLN(fhdr));
|
2010-10-28 16:23:25 +00:00
|
|
|
goto error;
|
|
|
|
}
|
|
|
|
|
2023-05-10 15:02:34 +00:00
|
|
|
flg_raw = GET_BE_U_4(pptr + 20);
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 1) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n\tForCES Version %u len %uB flags 0x%08x ",
|
|
|
|
ForCES_V(fhdr), mlen, flg_raw);
|
|
|
|
ND_PRINT("\n\tSrcID 0x%x(%s) DstID 0x%x(%s) Correlator 0x%" PRIx64,
|
2010-10-28 16:23:25 +00:00
|
|
|
ForCES_SID(fhdr), ForCES_node(ForCES_SID(fhdr)),
|
|
|
|
ForCES_DID(fhdr), ForCES_node(ForCES_DID(fhdr)),
|
2023-05-10 15:02:34 +00:00
|
|
|
GET_BE_U_8(fhdr->fm_cor));
|
2010-10-28 16:23:25 +00:00
|
|
|
|
|
|
|
}
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 2) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n\tForCES flags:\n\t %s(0x%x), prio=%u, %s(0x%x),\n\t %s(0x%x), %s(0x%x)\n",
|
2015-01-06 19:03:11 +00:00
|
|
|
tok2str(ForCES_ACKs, "ACKUnknown", ForCES_ACK(fhdr)),
|
|
|
|
ForCES_ACK(fhdr),
|
2010-10-28 16:23:25 +00:00
|
|
|
ForCES_PRI(fhdr),
|
2015-01-06 19:03:11 +00:00
|
|
|
tok2str(ForCES_EMs, "EMUnknown", ForCES_EM(fhdr)),
|
|
|
|
ForCES_EM(fhdr),
|
|
|
|
tok2str(ForCES_ATs, "ATUnknown", ForCES_AT(fhdr)),
|
|
|
|
ForCES_AT(fhdr),
|
|
|
|
tok2str(ForCES_TPs, "TPUnknown", ForCES_TP(fhdr)),
|
2023-05-10 15:02:34 +00:00
|
|
|
ForCES_TP(fhdr));
|
|
|
|
ND_PRINT("\t Extra flags: rsv(b5-7) 0x%x rsv(b13-31) 0x%x\n",
|
|
|
|
ForCES_RS1(fhdr), ForCES_RS2(fhdr));
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
2015-01-06 19:03:11 +00:00
|
|
|
rc = forces_type_print(ndo, pptr, fhdr, mlen, tops);
|
2010-10-28 16:23:25 +00:00
|
|
|
if (rc < 0) {
|
|
|
|
error:
|
2023-05-10 15:02:34 +00:00
|
|
|
hex_print(ndo, "\n\t[", pptr, len);
|
|
|
|
ND_PRINT("\n\t]");
|
2010-10-28 16:23:25 +00:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2015-01-06 19:03:11 +00:00
|
|
|
if (ndo->ndo_vflag >= 4) {
|
2023-05-10 15:02:34 +00:00
|
|
|
ND_PRINT("\n\t Raw ForCES message\n\t [");
|
|
|
|
hex_print(ndo, "\n\t ", pptr, len);
|
|
|
|
ND_PRINT("\n\t ]");
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|
|
|
|
return;
|
|
|
|
|
|
|
|
trunc:
|
2023-05-10 15:02:34 +00:00
|
|
|
nd_print_trunc(ndo);
|
2010-10-28 16:23:25 +00:00
|
|
|
}
|