1 /* 2 * Redistribution and use in source and binary forms, with or without 3 * modification, are permitted provided that: (1) source code 4 * distributions retain the above copyright notice and this paragraph 5 * in its entirety, and (2) distributions including binary code include 6 * the above copyright notice and this paragraph in its entirety in 7 * the documentation or other materials provided with the distribution. 8 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND 9 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT 10 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 11 * FOR A PARTICULAR PURPOSE. 12 * 13 * Copyright (c) 2009 Mojatatu Networks, Inc 14 * 15 */ 16 17 /* \summary: Forwarding and Control Element Separation (ForCES) Protocol printer */ 18 19 /* specification: RFC 5810 */ 20 21 #include <config.h> 22 23 #include "netdissect-stdinc.h" 24 25 #include "netdissect.h" 26 #include "extract.h" 27 28 29 #define ForCES_VERS 1 30 #define ForCES_HDRL 24 31 #define ForCES_ALNL 4U 32 #define TLV_HDRL 4 33 #define ILV_HDRL 8 34 35 #define TOM_RSVD 0x0 36 #define TOM_ASSNSETUP 0x1 37 #define TOM_ASSNTEARD 0x2 38 #define TOM_CONFIG 0x3 39 #define TOM_QUERY 0x4 40 #define TOM_EVENTNOT 0x5 41 #define TOM_PKTREDIR 0x6 42 #define TOM_HEARTBT 0x0F 43 #define TOM_ASSNSETREP 0x11 44 #define TOM_CONFIGREP 0x13 45 #define TOM_QUERYREP 0x14 46 47 /* 48 * tom_h Flags: resv1(8b):maxtlvs(4b):resv2(2b):mintlv(2b) 49 */ 50 #define ZERO_TTLV 0x01 51 #define ZERO_MORE_TTLV 0x02 52 #define ONE_MORE_TTLV 0x04 53 #define ZERO_TLV 0x00 54 #define ONE_TLV 0x10 55 #define TWO_TLV 0x20 56 #define MAX_TLV 0xF0 57 58 #define TTLV_T1 (ONE_MORE_TTLV|ONE_TLV) 59 #define TTLV_T2 (ONE_MORE_TTLV|MAX_TLV) 60 61 struct tom_h { 62 uint32_t v; 63 uint16_t flags; 64 uint16_t op_msk; 65 const char *s; 66 int (*print) (netdissect_options *ndo, const u_char * pptr, u_int len, 67 uint16_t op_msk, int indent); 68 }; 69 70 enum { 71 TOM_RSV_I, 72 TOM_ASS_I, 73 TOM_AST_I, 74 TOM_CFG_I, 75 TOM_QRY_I, 76 TOM_EVN_I, 77 TOM_RED_I, 78 TOM_HBT_I, 79 TOM_ASR_I, 80 TOM_CNR_I, 81 TOM_QRR_I, 82 _TOM_RSV_MAX 83 }; 84 #define TOM_MAX_IND (_TOM_RSV_MAX - 1) 85 86 static int 87 tom_valid(uint8_t tom) 88 { 89 if (tom > 0) { 90 if (tom >= 0x7 && tom <= 0xe) 91 return 0; 92 if (tom == 0x10) 93 return 0; 94 if (tom > 0x14) 95 return 0; 96 return 1; 97 } else 98 return 0; 99 } 100 101 static const char * 102 ForCES_node(uint32_t node) 103 { 104 if (node <= 0x3FFFFFFF) 105 return "FE"; 106 if (node >= 0x40000000 && node <= 0x7FFFFFFF) 107 return "CE"; 108 if (node >= 0xC0000000 && node <= 0xFFFFFFEF) 109 return "AllMulticast"; 110 if (node == 0xFFFFFFFD) 111 return "AllCEsBroadcast"; 112 if (node == 0xFFFFFFFE) 113 return "AllFEsBroadcast"; 114 if (node == 0xFFFFFFFF) 115 return "AllBroadcast"; 116 117 return "ForCESreserved"; 118 119 } 120 121 static const struct tok ForCES_ACKs[] = { 122 {0x0, "NoACK"}, 123 {0x1, "SuccessACK"}, 124 {0x2, "FailureACK"}, 125 {0x3, "AlwaysACK"}, 126 {0, NULL} 127 }; 128 129 static const struct tok ForCES_EMs[] = { 130 {0x0, "EMReserved"}, 131 {0x1, "execute-all-or-none"}, 132 {0x2, "execute-until-failure"}, 133 {0x3, "continue-execute-on-failure"}, 134 {0, NULL} 135 }; 136 137 static const struct tok ForCES_ATs[] = { 138 {0x0, "Standalone"}, 139 {0x1, "2PCtransaction"}, 140 {0, NULL} 141 }; 142 143 static const struct tok ForCES_TPs[] = { 144 {0x0, "StartofTransaction"}, 145 {0x1, "MiddleofTransaction"}, 146 {0x2, "EndofTransaction"}, 147 {0x3, "abort"}, 148 {0, NULL} 149 }; 150 151 /* 152 * Structure of forces header, naked of TLVs. 153 */ 154 struct forcesh { 155 nd_uint8_t fm_vrsvd; /* version and reserved */ 156 #define ForCES_V(forcesh) (GET_U_1((forcesh)->fm_vrsvd) >> 4) 157 nd_uint8_t fm_tom; /* type of message */ 158 nd_uint16_t fm_len; /* total length * 4 bytes */ 159 #define ForCES_BLN(forcesh) ((uint32_t)(GET_BE_U_2((forcesh)->fm_len) << 2)) 160 nd_uint32_t fm_sid; /* Source ID */ 161 #define ForCES_SID(forcesh) GET_BE_U_4((forcesh)->fm_sid) 162 nd_uint32_t fm_did; /* Destination ID */ 163 #define ForCES_DID(forcesh) GET_BE_U_4((forcesh)->fm_did) 164 nd_uint8_t fm_cor[8]; /* correlator */ 165 nd_uint32_t fm_flags; /* flags */ 166 #define ForCES_ACK(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0xC0000000) >> 30) 167 #define ForCES_PRI(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x38000000) >> 27) 168 #define ForCES_RS1(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x07000000) >> 24) 169 #define ForCES_EM(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x00C00000) >> 22) 170 #define ForCES_AT(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x00200000) >> 21) 171 #define ForCES_TP(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x00180000) >> 19) 172 #define ForCES_RS2(forcesh) ((GET_BE_U_4((forcesh)->fm_flags)&0x0007FFFF) >> 0) 173 }; 174 175 #define ForCES_HLN_VALID(fhl,tlen) ((tlen) >= ForCES_HDRL && \ 176 (fhl) >= ForCES_HDRL && \ 177 (fhl) == (tlen)) 178 179 #define F_LFB_RSVD 0x0 180 #define F_LFB_FEO 0x1 181 #define F_LFB_FEPO 0x2 182 static const struct tok ForCES_LFBs[] = { 183 {F_LFB_RSVD, "Invalid TLV"}, 184 {F_LFB_FEO, "FEObj LFB"}, 185 {F_LFB_FEPO, "FEProtoObj LFB"}, 186 {0, NULL} 187 }; 188 189 /* this is defined in RFC5810 section A.2 */ 190 /* https://www.iana.org/assignments/forces/forces.xhtml#oper-tlv-types */ 191 enum { 192 F_OP_RSV = 0, 193 F_OP_SET = 1, 194 F_OP_SETPROP = 2, 195 F_OP_SETRESP = 3, 196 F_OP_SETPRESP = 4, 197 F_OP_DEL = 5, 198 F_OP_DELRESP = 6, 199 F_OP_GET = 7, 200 F_OP_GETPROP = 8, 201 F_OP_GETRESP = 9, 202 F_OP_GETPRESP = 10, 203 F_OP_REPORT = 11, 204 F_OP_COMMIT = 12, 205 F_OP_RCOMMIT = 13, 206 F_OP_RTRCOMP = 14, 207 _F_OP_MAX 208 }; 209 #define F_OP_MAX (_F_OP_MAX - 1) 210 211 enum { 212 B_OP_SET = 1 << (F_OP_SET - 1), 213 B_OP_SETPROP = 1 << (F_OP_SETPROP - 1), 214 B_OP_SETRESP = 1 << (F_OP_SETRESP - 1), 215 B_OP_SETPRESP = 1 << (F_OP_SETPRESP - 1), 216 B_OP_DEL = 1 << (F_OP_DEL - 1), 217 B_OP_DELRESP = 1 << (F_OP_DELRESP - 1), 218 B_OP_GET = 1 << (F_OP_GET - 1), 219 B_OP_GETPROP = 1 << (F_OP_GETPROP - 1), 220 B_OP_GETRESP = 1 << (F_OP_GETRESP - 1), 221 B_OP_GETPRESP = 1 << (F_OP_GETPRESP - 1), 222 B_OP_REPORT = 1 << (F_OP_REPORT - 1), 223 B_OP_COMMIT = 1 << (F_OP_COMMIT - 1), 224 B_OP_RCOMMIT = 1 << (F_OP_RCOMMIT - 1), 225 B_OP_RTRCOMP = 1 << (F_OP_RTRCOMP - 1) 226 }; 227 228 struct optlv_h { 229 uint16_t flags; 230 uint16_t op_msk; 231 const char *s; 232 int (*print) (netdissect_options *ndo, const u_char * pptr, u_int len, 233 uint16_t op_msk, int indent); 234 }; 235 236 static int genoptlv_print(netdissect_options *, const u_char * pptr, u_int len, 237 uint16_t op_msk, int indent); 238 static int recpdoptlv_print(netdissect_options *, const u_char * pptr, u_int len, 239 uint16_t op_msk, int indent); 240 static int invoptlv_print(netdissect_options *, const u_char * pptr, u_int len, 241 uint16_t op_msk, int indent); 242 243 #define OP_MIN_SIZ 8 244 struct pathdata_h { 245 nd_uint16_t pflags; 246 nd_uint16_t pIDcnt; 247 }; 248 249 #define B_FULLD 0x1 250 #define B_SPARD 0x2 251 #define B_RESTV 0x4 252 #define B_KEYIN 0x8 253 #define B_APPND 0x10 254 #define B_TRNG 0x20 255 256 static const struct optlv_h OPTLV_msg[F_OP_MAX + 1] = { 257 /* F_OP_RSV */ {ZERO_TTLV, 0, "Invalid OPTLV", invoptlv_print}, 258 /* F_OP_SET */ {TTLV_T2, B_FULLD | B_SPARD, " Set", recpdoptlv_print}, 259 /* F_OP_SETPROP */ 260 {TTLV_T2, B_FULLD | B_SPARD, " SetProp", recpdoptlv_print}, 261 /* F_OP_SETRESP */ {TTLV_T2, B_RESTV, " SetResp", recpdoptlv_print}, 262 /* F_OP_SETPRESP */ {TTLV_T2, B_RESTV, " SetPropResp", recpdoptlv_print}, 263 /* F_OP_DEL */ {ZERO_TTLV, 0, " Del", recpdoptlv_print}, 264 /* F_OP_DELRESP */ {TTLV_T2, B_RESTV, " DelResp", recpdoptlv_print}, 265 /* F_OP_GET */ {ZERO_TTLV, 0, " Get", recpdoptlv_print}, 266 /* F_OP_GETPROP */ {ZERO_TTLV, 0, " GetProp", recpdoptlv_print}, 267 /* F_OP_GETRESP */ 268 {TTLV_T2, B_FULLD | B_SPARD | B_RESTV, " GetResp", recpdoptlv_print}, 269 /* F_OP_GETPRESP */ 270 {TTLV_T2, B_FULLD | B_RESTV, " GetPropResp", recpdoptlv_print}, 271 /* F_OP_REPORT */ 272 {TTLV_T2, B_FULLD | B_SPARD, " Report", recpdoptlv_print}, 273 /* F_OP_COMMIT */ {ZERO_TTLV, 0, " Commit", NULL}, 274 /* F_OP_RCOMMIT */ {TTLV_T1, B_RESTV, " RCommit", genoptlv_print}, 275 /* F_OP_RTRCOMP */ {ZERO_TTLV, 0, " RTRCOMP", NULL}, 276 }; 277 278 static const struct optlv_h * 279 get_forces_optlv_h(uint16_t opt) 280 { 281 if (opt > F_OP_MAX || opt == F_OP_RSV) 282 return &OPTLV_msg[F_OP_RSV]; 283 284 return &OPTLV_msg[opt]; 285 } 286 287 #define IND_SIZE 256 288 #define IND_CHR ' ' 289 #define IND_PREF '\n' 290 #define IND_SUF 0x0 291 static char ind_buf[IND_SIZE]; 292 293 static char * 294 indent_pr(int indent, int nlpref) 295 { 296 int i = 0; 297 char *r = ind_buf; 298 299 if (indent > (IND_SIZE - 1)) 300 indent = IND_SIZE - 1; 301 302 if (nlpref) { 303 r[i] = IND_PREF; 304 i++; 305 indent--; 306 } 307 308 while (--indent >= 0) 309 r[i++] = IND_CHR; 310 311 r[i] = IND_SUF; 312 return r; 313 } 314 315 static int 316 op_valid(uint16_t op, uint16_t mask) 317 { 318 if (op == 0) 319 return 0; 320 if (op <= F_OP_MAX) 321 return (1 << (op - 1)) & mask; /* works only for 0x0001 through 0x0010 */ 322 /* I guess we should allow vendor operations? */ 323 if (op >= 0x8000) 324 return 1; 325 return 0; 326 } 327 328 #define F_TLV_RSVD 0x0000 329 #define F_TLV_REDR 0x0001 330 #define F_TLV_ASRS 0x0010 331 #define F_TLV_ASRT 0x0011 332 #define F_TLV_LFBS 0x1000 333 #define F_TLV_PDAT 0x0110 334 #define F_TLV_KEYI 0x0111 335 #define F_TLV_FULD 0x0112 336 #define F_TLV_SPAD 0x0113 337 #define F_TLV_REST 0x0114 338 #define F_TLV_METD 0x0115 339 #define F_TLV_REDD 0x0116 340 #define F_TLV_TRNG 0x0117 341 342 343 #define F_TLV_VNST 0x8000 344 345 static const struct tok ForCES_TLV[] = { 346 {F_TLV_RSVD, "Invalid TLV"}, 347 {F_TLV_REDR, "REDIRECT TLV"}, 348 {F_TLV_ASRS, "ASResult TLV"}, 349 {F_TLV_ASRT, "ASTreason TLV"}, 350 {F_TLV_LFBS, "LFBselect TLV"}, 351 {F_TLV_PDAT, "PATH-DATA TLV"}, 352 {F_TLV_KEYI, "KEYINFO TLV"}, 353 {F_TLV_FULD, "FULLDATA TLV"}, 354 {F_TLV_SPAD, "SPARSEDATA TLV"}, 355 {F_TLV_REST, "RESULT TLV"}, 356 {F_TLV_METD, "METADATA TLV"}, 357 {F_TLV_REDD, "REDIRECTDATA TLV"}, 358 {0, NULL} 359 }; 360 361 #define TLV_HLN 4 362 static int 363 ttlv_valid(uint16_t ttlv) 364 { 365 if (ttlv > 0) { 366 if (ttlv == 1 || ttlv == 0x1000) 367 return 1; 368 if (ttlv >= 0x10 && ttlv <= 0x11) 369 return 1; 370 if (ttlv >= 0x110 && ttlv <= 0x116) 371 return 1; 372 if (ttlv >= 0x8000) 373 return 0; /* XXX: */ 374 } 375 376 return 0; 377 } 378 379 struct forces_ilv { 380 nd_uint32_t type; 381 nd_uint32_t length; 382 }; 383 384 struct forces_tlv { 385 nd_uint16_t type; 386 nd_uint16_t length; 387 }; 388 389 #define F_ALN_LEN(len) roundup2(len, ForCES_ALNL) 390 #define GET_TOP_TLV(fhdr) ((const struct forces_tlv *)((fhdr) + sizeof (struct forcesh))) 391 #define TLV_SET_LEN(len) (F_ALN_LEN(TLV_HDRL) + (len)) 392 #define TLV_DATA(tlvp) ((const void*)(((const char*)(tlvp)) + TLV_SET_LEN(0))) 393 #define GO_NXT_TLV(tlv,rlen) ((rlen) -= F_ALN_LEN(GET_BE_U_2((tlv)->length)), \ 394 (const struct forces_tlv*)(((const char*)(tlv)) \ 395 + F_ALN_LEN(GET_BE_U_2((tlv)->length)))) 396 #define ILV_SET_LEN(len) (F_ALN_LEN(ILV_HDRL) + (len)) 397 #define ILV_DATA(ilvp) ((const void*)(((const char*)(ilvp)) + ILV_SET_LEN(0))) 398 #define GO_NXT_ILV(ilv,rlen) ((rlen) -= F_ALN_LEN(GET_BE_U_4((ilv)->length)), \ 399 (const struct forces_ilv *)(((const char*)(ilv)) \ 400 + F_ALN_LEN(GET_BE_U_4((ilv)->length)))) 401 #define INVALID_RLEN 1 402 #define INVALID_STLN 2 403 #define INVALID_LTLN 3 404 #define INVALID_ALEN 4 405 406 static const struct tok ForCES_TLV_err[] = { 407 {INVALID_RLEN, "Invalid total length"}, 408 {INVALID_STLN, "xLV too short"}, 409 {INVALID_LTLN, "xLV too long"}, 410 {INVALID_ALEN, "data padding missing"}, 411 {0, NULL} 412 }; 413 414 static u_int 415 tlv_valid(u_int tlvl, u_int rlen) 416 { 417 if (rlen < TLV_HDRL) 418 return INVALID_RLEN; 419 if (tlvl < TLV_HDRL) 420 return INVALID_STLN; 421 if (tlvl > rlen) 422 return INVALID_LTLN; 423 if (rlen < F_ALN_LEN(tlvl)) 424 return INVALID_ALEN; 425 426 return 0; 427 } 428 429 static int 430 ilv_valid(netdissect_options *ndo, const struct forces_ilv *ilv, u_int rlen) 431 { 432 if (rlen < ILV_HDRL) 433 return INVALID_RLEN; 434 if (GET_BE_U_4(ilv->length) < ILV_HDRL) 435 return INVALID_STLN; 436 if (GET_BE_U_4(ilv->length) > rlen) 437 return INVALID_LTLN; 438 if (rlen < F_ALN_LEN(GET_BE_U_4(ilv->length))) 439 return INVALID_ALEN; 440 441 return 0; 442 } 443 444 static int lfbselect_print(netdissect_options *, const u_char * pptr, u_int len, 445 uint16_t op_msk, int indent); 446 static int redirect_print(netdissect_options *, const u_char * pptr, u_int len, 447 uint16_t op_msk, int indent); 448 static int asrtlv_print(netdissect_options *, const u_char * pptr, u_int len, 449 uint16_t op_msk, int indent); 450 static int asttlv_print(netdissect_options *, const u_char * pptr, u_int len, 451 uint16_t op_msk, int indent); 452 453 struct forces_lfbsh { 454 nd_uint32_t class; 455 nd_uint32_t instance; 456 }; 457 458 #define ASSNS_OPS (B_OP_REPORT) 459 #define CFG_OPS (B_OP_SET|B_OP_SETPROP|B_OP_DEL|B_OP_COMMIT|B_OP_RTRCOMP) 460 #define CFG_ROPS (B_OP_SETRESP|B_OP_SETPRESP|B_OP_DELRESP|B_OP_RCOMMIT) 461 #define CFG_QY (B_OP_GET|B_OP_GETPROP) 462 #define CFG_QYR (B_OP_GETRESP|B_OP_GETPRESP) 463 #define CFG_EVN (B_OP_REPORT) 464 465 static const struct tom_h ForCES_msg[TOM_MAX_IND + 1] = { 466 /* TOM_RSV_I */ {TOM_RSVD, ZERO_TTLV, 0, "Invalid message", NULL}, 467 /* TOM_ASS_I */ {TOM_ASSNSETUP, ZERO_MORE_TTLV | TWO_TLV, ASSNS_OPS, 468 "Association Setup", lfbselect_print}, 469 /* TOM_AST_I */ 470 {TOM_ASSNTEARD, TTLV_T1, 0, "Association TearDown", asttlv_print}, 471 /* TOM_CFG_I */ {TOM_CONFIG, TTLV_T2, CFG_OPS, "Config", lfbselect_print}, 472 /* TOM_QRY_I */ {TOM_QUERY, TTLV_T2, CFG_QY, "Query", lfbselect_print}, 473 /* TOM_EVN_I */ {TOM_EVENTNOT, TTLV_T1, CFG_EVN, "Event Notification", 474 lfbselect_print}, 475 /* TOM_RED_I */ 476 {TOM_PKTREDIR, TTLV_T2, 0, "Packet Redirect", redirect_print}, 477 /* TOM_HBT_I */ {TOM_HEARTBT, ZERO_TTLV, 0, "HeartBeat", NULL}, 478 /* TOM_ASR_I */ 479 {TOM_ASSNSETREP, TTLV_T1, 0, "Association Response", asrtlv_print}, 480 /* TOM_CNR_I */ {TOM_CONFIGREP, TTLV_T2, CFG_ROPS, "Config Response", 481 lfbselect_print}, 482 /* TOM_QRR_I */ 483 {TOM_QUERYREP, TTLV_T2, CFG_QYR, "Query Response", lfbselect_print}, 484 }; 485 486 static const struct tom_h * 487 get_forces_tom(uint8_t tom) 488 { 489 int i; 490 for (i = TOM_RSV_I; i <= TOM_MAX_IND; i++) { 491 const struct tom_h *th = &ForCES_msg[i]; 492 if (th->v == tom) 493 return th; 494 } 495 return &ForCES_msg[TOM_RSV_I]; 496 } 497 498 struct pdata_ops { 499 uint32_t v; 500 uint16_t flags; 501 uint16_t op_msk; 502 const char *s; 503 int (*print) (netdissect_options *, const u_char * pptr, u_int len, 504 uint16_t op_msk, int indent); 505 }; 506 507 enum { 508 PD_RSV_I, 509 PD_SEL_I, 510 PD_FDT_I, 511 PD_SDT_I, 512 PD_RES_I, 513 PD_PDT_I, 514 _PD_RSV_MAX 515 }; 516 #define PD_MAX_IND (_TOM_RSV_MAX - 1) 517 518 static int 519 pd_valid(uint16_t pd) 520 { 521 if (pd >= F_TLV_PDAT && pd <= F_TLV_REST) 522 return 1; 523 return 0; 524 } 525 526 static void 527 chk_op_type(netdissect_options *ndo, 528 uint16_t type, uint16_t msk, uint16_t omsk) 529 { 530 if (type != F_TLV_PDAT) { 531 if (msk & B_KEYIN) { 532 if (type != F_TLV_KEYI) { 533 ND_PRINT("Based on flags expected KEYINFO TLV!\n"); 534 } 535 } else { 536 if (!(msk & omsk)) { 537 ND_PRINT("Illegal DATA encoding for type 0x%x programmed %x got %x\n", 538 type, omsk, msk); 539 } 540 } 541 } 542 543 } 544 545 #define F_SELKEY 1 546 #define F_SELTABRANGE 2 547 #define F_TABAPPEND 4 548 549 struct res_val { 550 nd_uint8_t result; 551 nd_uint8_t resv1; 552 nd_uint16_t resv2; 553 }; 554 555 static int prestlv_print(netdissect_options *, const u_char * pptr, u_int len, 556 uint16_t op_msk, int indent); 557 static int pkeyitlv_print(netdissect_options *, const u_char * pptr, u_int len, 558 uint16_t op_msk, int indent); 559 static int fdatatlv_print(netdissect_options *, const u_char * pptr, u_int len, 560 uint16_t op_msk, int indent); 561 static int sdatatlv_print(netdissect_options *, const u_char * pptr, u_int len, 562 uint16_t op_msk, int indent); 563 564 static const struct pdata_ops ForCES_pdata[PD_MAX_IND + 1] = { 565 /* PD_RSV_I */ {0, 0, 0, "Invalid message", NULL}, 566 /* PD_SEL_I */ {F_TLV_KEYI, 0, 0, "KEYINFO TLV", pkeyitlv_print}, 567 /* PD_FDT_I */ {F_TLV_FULD, 0, B_FULLD, "FULLDATA TLV", fdatatlv_print}, 568 /* PD_SDT_I */ {F_TLV_SPAD, 0, B_SPARD, "SPARSEDATA TLV", sdatatlv_print}, 569 /* PD_RES_I */ {F_TLV_REST, 0, B_RESTV, "RESULT TLV", prestlv_print}, 570 /* PD_PDT_I */ 571 {F_TLV_PDAT, 0, 0, "Inner PATH-DATA TLV", recpdoptlv_print}, 572 }; 573 574 static const struct pdata_ops * 575 get_forces_pd(uint16_t pd) 576 { 577 int i; 578 for (i = PD_RSV_I + 1; i <= PD_MAX_IND; i++) { 579 const struct pdata_ops *pdo = &ForCES_pdata[i]; 580 if (pdo->v == pd) 581 return pdo; 582 } 583 return &ForCES_pdata[TOM_RSV_I]; 584 } 585 586 enum { 587 E_SUCCESS, 588 E_INVALID_HEADER, 589 E_LENGTH_MISMATCH, 590 E_VERSION_MISMATCH, 591 E_INVALID_DESTINATION_PID, 592 E_LFB_UNKNOWN, 593 E_LFB_NOT_FOUND, 594 E_LFB_INSTANCE_ID_NOT_FOUND, 595 E_INVALID_PATH, 596 E_COMPONENT_DOES_NOT_EXIST, 597 E_EXISTS, 598 E_NOT_FOUND, 599 E_READ_ONLY, 600 E_INVALID_ARRAY_CREATION, 601 E_VALUE_OUT_OF_RANGE, 602 E_CONTENTS_TOO_LONG, 603 E_INVALID_PARAMETERS, 604 E_INVALID_MESSAGE_TYPE, 605 E_INVALID_FLAGS, 606 E_INVALID_TLV, 607 E_EVENT_ERROR, 608 E_NOT_SUPPORTED, 609 E_MEMORY_ERROR, 610 E_INTERNAL_ERROR, 611 /* 0x18-0xFE are reserved .. */ 612 E_UNSPECIFIED_ERROR = 0XFF 613 }; 614 615 static const struct tok ForCES_errs[] = { 616 {E_SUCCESS, "SUCCESS"}, 617 {E_INVALID_HEADER, "INVALID HEADER"}, 618 {E_LENGTH_MISMATCH, "LENGTH MISMATCH"}, 619 {E_VERSION_MISMATCH, "VERSION MISMATCH"}, 620 {E_INVALID_DESTINATION_PID, "INVALID DESTINATION PID"}, 621 {E_LFB_UNKNOWN, "LFB UNKNOWN"}, 622 {E_LFB_NOT_FOUND, "LFB NOT FOUND"}, 623 {E_LFB_INSTANCE_ID_NOT_FOUND, "LFB INSTANCE ID NOT FOUND"}, 624 {E_INVALID_PATH, "INVALID PATH"}, 625 {E_COMPONENT_DOES_NOT_EXIST, "COMPONENT DOES NOT EXIST"}, 626 {E_EXISTS, "EXISTS ALREADY"}, 627 {E_NOT_FOUND, "NOT FOUND"}, 628 {E_READ_ONLY, "READ ONLY"}, 629 {E_INVALID_ARRAY_CREATION, "INVALID ARRAY CREATION"}, 630 {E_VALUE_OUT_OF_RANGE, "VALUE OUT OF RANGE"}, 631 {E_CONTENTS_TOO_LONG, "CONTENTS TOO LONG"}, 632 {E_INVALID_PARAMETERS, "INVALID PARAMETERS"}, 633 {E_INVALID_MESSAGE_TYPE, "INVALID MESSAGE TYPE"}, 634 {E_INVALID_FLAGS, "INVALID FLAGS"}, 635 {E_INVALID_TLV, "INVALID TLV"}, 636 {E_EVENT_ERROR, "EVENT ERROR"}, 637 {E_NOT_SUPPORTED, "NOT SUPPORTED"}, 638 {E_MEMORY_ERROR, "MEMORY ERROR"}, 639 {E_INTERNAL_ERROR, "INTERNAL ERROR"}, 640 {E_UNSPECIFIED_ERROR, "UNSPECIFIED ERROR"}, 641 {0, NULL} 642 }; 643 644 #define RESLEN 4 645 646 static int 647 prestlv_print(netdissect_options *ndo, 648 const u_char * pptr, u_int len, 649 uint16_t op_msk _U_, int indent) 650 { 651 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; 652 const u_char *tdp = (const u_char *) TLV_DATA(tlv); 653 const struct res_val *r = (const struct res_val *)tdp; 654 u_int dlen; 655 uint8_t result; 656 657 /* 658 * pdatacnt_print() has ensured that len (the TLV length) 659 * >= TLV_HDRL. 660 */ 661 dlen = len - TLV_HDRL; 662 if (dlen != RESLEN) { 663 ND_PRINT("illegal RESULT-TLV: %u bytes!\n", dlen); 664 return -1; 665 } 666 667 ND_TCHECK_SIZE(r); 668 result = GET_U_1(r->result); 669 if (result >= 0x18 && result <= 0xFE) { 670 ND_PRINT("illegal reserved result code: 0x%x!\n", result); 671 return -1; 672 } 673 674 if (ndo->ndo_vflag >= 3) { 675 char *ib = indent_pr(indent, 0); 676 ND_PRINT("%s Result: %s (code 0x%x)\n", ib, 677 tok2str(ForCES_errs, NULL, result), result); 678 } 679 return 0; 680 681 trunc: 682 nd_print_trunc(ndo); 683 return -1; 684 } 685 686 static int 687 fdatatlv_print(netdissect_options *ndo, 688 const u_char * pptr, u_int len, 689 uint16_t op_msk _U_, int indent) 690 { 691 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; 692 u_int rlen; 693 const u_char *tdp = (const u_char *) TLV_DATA(tlv); 694 uint16_t type; 695 696 /* 697 * pdatacnt_print() or pkeyitlv_print() has ensured that len 698 * (the TLV length) >= TLV_HDRL. 699 */ 700 rlen = len - TLV_HDRL; 701 ND_TCHECK_SIZE(tlv); 702 type = GET_BE_U_2(tlv->type); 703 if (type != F_TLV_FULD) { 704 ND_PRINT("Error: expecting FULLDATA!\n"); 705 return -1; 706 } 707 708 if (ndo->ndo_vflag >= 3) { 709 char *ib = indent_pr(indent + 2, 1); 710 ND_PRINT("%s[", ib + 1); 711 hex_print(ndo, ib, tdp, rlen); 712 ND_PRINT("\n%s]", ib + 1); 713 } 714 return 0; 715 716 trunc: 717 nd_print_trunc(ndo); 718 return -1; 719 } 720 721 static int 722 sdatailv_print(netdissect_options *ndo, 723 const u_char * pptr, u_int len, 724 uint16_t op_msk _U_, int indent) 725 { 726 u_int rlen; 727 const struct forces_ilv *ilv = (const struct forces_ilv *)pptr; 728 int invilv; 729 730 if (len < ILV_HDRL) { 731 ND_PRINT("Error: BAD SPARSEDATA-TLV!\n"); 732 return -1; 733 } 734 rlen = len; 735 indent += 1; 736 while (rlen != 0) { 737 #if 0 738 ND_PRINT("Jamal - outstanding length <%u>\n", rlen); 739 #endif 740 char *ib = indent_pr(indent, 1); 741 const u_char *tdp = (const u_char *) ILV_DATA(ilv); 742 invilv = ilv_valid(ndo, ilv, rlen); 743 if (invilv) { 744 ND_PRINT("Error: %s, rlen %u\n", 745 tok2str(ForCES_TLV_err, NULL, invilv), rlen); 746 return -1; 747 } 748 if (ndo->ndo_vflag >= 3) { 749 u_int ilvl = GET_BE_U_4(ilv->length); 750 ND_PRINT("\n%s ILV: type %x length %u\n", ib + 1, 751 GET_BE_U_4(ilv->type), ilvl); 752 hex_print(ndo, "\t\t[", tdp, ilvl-ILV_HDRL); 753 } 754 755 ilv = GO_NXT_ILV(ilv, rlen); 756 } 757 758 return 0; 759 } 760 761 static int 762 sdatatlv_print(netdissect_options *ndo, 763 const u_char * pptr, u_int len, 764 uint16_t op_msk, int indent) 765 { 766 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; 767 u_int rlen; 768 const u_char *tdp = (const u_char *) TLV_DATA(tlv); 769 uint16_t type; 770 771 /* 772 * pdatacnt_print() has ensured that len (the TLV length) 773 * >= TLV_HDRL. 774 */ 775 rlen = len - TLV_HDRL; 776 ND_TCHECK_SIZE(tlv); 777 type = GET_BE_U_2(tlv->type); 778 if (type != F_TLV_SPAD) { 779 ND_PRINT("Error: expecting SPARSEDATA!\n"); 780 return -1; 781 } 782 783 return sdatailv_print(ndo, tdp, rlen, op_msk, indent); 784 785 trunc: 786 nd_print_trunc(ndo); 787 return -1; 788 } 789 790 static int 791 pkeyitlv_print(netdissect_options *ndo, 792 const u_char * pptr, u_int len, 793 uint16_t op_msk, int indent) 794 { 795 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; 796 const u_char *tdp = (const u_char *) TLV_DATA(tlv); 797 const u_char *dp = tdp + 4; 798 const struct forces_tlv *kdtlv = (const struct forces_tlv *)dp; 799 uint32_t id; 800 char *ib = indent_pr(indent, 0); 801 uint16_t type, tll; 802 u_int invtlv; 803 804 id = GET_BE_U_4(tdp); 805 ND_PRINT("%sKeyinfo: Key 0x%x\n", ib, id); 806 type = GET_BE_U_2(kdtlv->type); 807 tll = GET_BE_U_2(kdtlv->length); 808 invtlv = tlv_valid(tll, len); 809 810 if (invtlv) { 811 ND_PRINT("%s TLV type 0x%x len %u\n", 812 tok2str(ForCES_TLV_err, NULL, invtlv), type, 813 tll); 814 return -1; 815 } 816 /* 817 * At this point, tlv_valid() has ensured that the TLV 818 * length is large enough but not too large (it doesn't 819 * go past the end of the containing TLV). 820 */ 821 tll = GET_BE_U_2(kdtlv->length); 822 dp = (const u_char *) TLV_DATA(kdtlv); 823 return fdatatlv_print(ndo, dp, tll, op_msk, indent); 824 } 825 826 #define PTH_DESC_SIZE 12 827 828 static int 829 pdatacnt_print(netdissect_options *ndo, 830 const u_char * pptr, u_int len, 831 uint16_t IDcnt, uint16_t op_msk, int indent) 832 { 833 u_int i; 834 uint32_t id; 835 char *ib = indent_pr(indent, 0); 836 837 if ((op_msk & B_APPND) && ndo->ndo_vflag >= 3) { 838 ND_PRINT("%sTABLE APPEND\n", ib); 839 } 840 for (i = 0; i < IDcnt; i++) { 841 ND_TCHECK_4(pptr); 842 if (len < 4) 843 goto trunc; 844 id = GET_BE_U_4(pptr); 845 if (ndo->ndo_vflag >= 3) 846 ND_PRINT("%sID#%02u: %u\n", ib, i + 1, id); 847 len -= 4; 848 pptr += 4; 849 } 850 851 if ((op_msk & B_TRNG) || (op_msk & B_KEYIN)) { 852 if (op_msk & B_TRNG) { 853 uint32_t starti, endi; 854 855 if (len < PTH_DESC_SIZE) { 856 ND_PRINT("pathlength %u with key/range too short %u\n", 857 len, PTH_DESC_SIZE); 858 return -1; 859 } 860 861 pptr += sizeof(struct forces_tlv); 862 len -= sizeof(struct forces_tlv); 863 864 starti = GET_BE_U_4(pptr); 865 pptr += 4; 866 len -= 4; 867 868 endi = GET_BE_U_4(pptr); 869 pptr += 4; 870 len -= 4; 871 872 if (ndo->ndo_vflag >= 3) 873 ND_PRINT("%sTable range: [%u,%u]\n", ib, starti, endi); 874 } 875 876 if (op_msk & B_KEYIN) { 877 const struct forces_tlv *keytlv; 878 uint16_t tll; 879 880 if (len < PTH_DESC_SIZE) { 881 ND_PRINT("pathlength %u with key/range too short %u\n", 882 len, PTH_DESC_SIZE); 883 return -1; 884 } 885 886 /* skip keyid */ 887 pptr += 4; 888 len -= 4; 889 keytlv = (const struct forces_tlv *)pptr; 890 /* skip header */ 891 pptr += sizeof(struct forces_tlv); 892 len -= sizeof(struct forces_tlv); 893 /* skip key content */ 894 tll = GET_BE_U_2(keytlv->length); 895 if (tll < TLV_HDRL) { 896 ND_PRINT("key content length %u < %u\n", 897 tll, TLV_HDRL); 898 return -1; 899 } 900 tll -= TLV_HDRL; 901 if (len < tll) { 902 ND_PRINT("key content too short\n"); 903 return -1; 904 } 905 pptr += tll; 906 len -= tll; 907 } 908 909 } 910 911 if (len) { 912 const struct forces_tlv *pdtlv = (const struct forces_tlv *)pptr; 913 uint16_t type; 914 uint16_t tlvl, tll; 915 u_int pad = 0; 916 u_int aln; 917 u_int invtlv; 918 919 type = GET_BE_U_2(pdtlv->type); 920 tlvl = GET_BE_U_2(pdtlv->length); 921 invtlv = tlv_valid(tlvl, len); 922 if (invtlv) { 923 ND_PRINT("%s Outstanding bytes %u for TLV type 0x%x TLV len %u\n", 924 tok2str(ForCES_TLV_err, NULL, invtlv), len, type, 925 tlvl); 926 goto pd_err; 927 } 928 /* 929 * At this point, tlv_valid() has ensured that the TLV 930 * length is large enough but not too large (it doesn't 931 * go past the end of the containing TLV). 932 */ 933 tll = tlvl - TLV_HDRL; 934 aln = F_ALN_LEN(tlvl); 935 if (aln > tlvl) { 936 if (aln > len) { 937 ND_PRINT("Invalid padded pathdata TLV type 0x%x len %u missing %u pad bytes\n", 938 type, tlvl, aln - len); 939 } else { 940 pad = aln - tlvl; 941 } 942 } 943 if (pd_valid(type)) { 944 const struct pdata_ops *ops = get_forces_pd(type); 945 946 if (ndo->ndo_vflag >= 3 && ops->v != F_TLV_PDAT) { 947 if (pad) 948 ND_PRINT("%s %s (Length %u DataLen %u pad %u Bytes)\n", 949 ib, ops->s, tlvl, tll, pad); 950 else 951 ND_PRINT("%s %s (Length %u DataLen %u Bytes)\n", 952 ib, ops->s, tlvl, tll); 953 } 954 955 chk_op_type(ndo, type, op_msk, ops->op_msk); 956 957 if (ops->print(ndo, (const u_char *)pdtlv, 958 tll + pad + TLV_HDRL, op_msk, 959 indent + 2) == -1) 960 return -1; 961 len -= (TLV_HDRL + pad + tll); 962 } else { 963 ND_PRINT("Invalid path data content type 0x%x len %u\n", 964 type, tlvl); 965 pd_err: 966 if (tlvl) { 967 hex_print(ndo, "Bad Data val\n\t [", 968 pptr, len); 969 ND_PRINT("]\n"); 970 971 return -1; 972 } 973 } 974 } 975 return len; 976 977 trunc: 978 nd_print_trunc(ndo); 979 return -1; 980 } 981 982 static int 983 pdata_print(netdissect_options *ndo, 984 const u_char * pptr, u_int len, 985 uint16_t op_msk, int indent) 986 { 987 const struct pathdata_h *pdh = (const struct pathdata_h *)pptr; 988 char *ib = indent_pr(indent, 0); 989 u_int minsize = 0; 990 int more_pd = 0; 991 uint16_t idcnt = 0; 992 993 ND_TCHECK_SIZE(pdh); 994 if (len < sizeof(struct pathdata_h)) 995 goto trunc; 996 if (ndo->ndo_vflag >= 3) { 997 ND_PRINT("\n%sPathdata: Flags 0x%x ID count %u\n", 998 ib, GET_BE_U_2(pdh->pflags), 999 GET_BE_U_2(pdh->pIDcnt)); 1000 } 1001 1002 if (GET_BE_U_2(pdh->pflags) & F_SELKEY) { 1003 op_msk |= B_KEYIN; 1004 } 1005 1006 /* Table GET Range operation */ 1007 if (GET_BE_U_2(pdh->pflags) & F_SELTABRANGE) { 1008 op_msk |= B_TRNG; 1009 } 1010 /* Table SET append operation */ 1011 if (GET_BE_U_2(pdh->pflags) & F_TABAPPEND) { 1012 op_msk |= B_APPND; 1013 } 1014 1015 pptr += sizeof(struct pathdata_h); 1016 len -= sizeof(struct pathdata_h); 1017 idcnt = GET_BE_U_2(pdh->pIDcnt); 1018 minsize = idcnt * 4; 1019 if (len < minsize) { 1020 ND_PRINT("\t\t\ttruncated IDs expected %uB got %uB\n", minsize, 1021 len); 1022 hex_print(ndo, "\t\t\tID Data[", pptr, len); 1023 ND_PRINT("]\n"); 1024 return -1; 1025 } 1026 1027 if ((op_msk & B_TRNG) && (op_msk & B_KEYIN)) { 1028 ND_PRINT("\t\t\tIllegal to have both Table ranges and keys\n"); 1029 return -1; 1030 } 1031 1032 more_pd = pdatacnt_print(ndo, pptr, len, idcnt, op_msk, indent); 1033 if (more_pd > 0) { 1034 int consumed = len - more_pd; 1035 pptr += consumed; 1036 len = more_pd; 1037 /* XXX: Argh, recurse some more */ 1038 return recpdoptlv_print(ndo, pptr, len, op_msk, indent+1); 1039 } else 1040 return 0; 1041 1042 trunc: 1043 nd_print_trunc(ndo); 1044 return -1; 1045 } 1046 1047 static int 1048 genoptlv_print(netdissect_options *ndo, 1049 const u_char * pptr, u_int len, 1050 uint16_t op_msk, int indent) 1051 { 1052 const struct forces_tlv *pdtlv = (const struct forces_tlv *)pptr; 1053 uint16_t type; 1054 u_int tlvl; 1055 u_int invtlv; 1056 char *ib = indent_pr(indent, 0); 1057 1058 type = GET_BE_U_2(pdtlv->type); 1059 tlvl = GET_BE_U_2(pdtlv->length); 1060 invtlv = tlv_valid(tlvl, len); 1061 ND_PRINT("genoptlvprint - %s TLV type 0x%x len %u\n", 1062 tok2str(ForCES_TLV, NULL, type), type, tlvl); 1063 if (!invtlv) { 1064 /* 1065 * At this point, tlv_valid() has ensured that the TLV 1066 * length is large enough but not too large (it doesn't 1067 * go past the end of the containing TLV). 1068 */ 1069 const u_char *dp = (const u_char *) TLV_DATA(pdtlv); 1070 1071 if (!ttlv_valid(type)) { 1072 ND_PRINT("%s TLV type 0x%x len %u\n", 1073 tok2str(ForCES_TLV_err, NULL, invtlv), type, 1074 tlvl); 1075 return -1; 1076 } 1077 if (ndo->ndo_vflag >= 3) 1078 ND_PRINT("%s%s, length %u (data length %u Bytes)", 1079 ib, tok2str(ForCES_TLV, NULL, type), 1080 tlvl, tlvl - TLV_HDRL); 1081 1082 return pdata_print(ndo, dp, tlvl - TLV_HDRL, op_msk, indent + 1); 1083 } else { 1084 ND_PRINT("\t\t\tInvalid ForCES TLV type=%x", type); 1085 return -1; 1086 } 1087 } 1088 1089 static int 1090 recpdoptlv_print(netdissect_options *ndo, 1091 const u_char * pptr, u_int len, 1092 uint16_t op_msk, int indent) 1093 { 1094 const struct forces_tlv *pdtlv = (const struct forces_tlv *)pptr; 1095 1096 while (len != 0) { 1097 uint16_t type, tlvl; 1098 u_int invtlv; 1099 char *ib; 1100 const u_char *dp; 1101 1102 tlvl = GET_BE_U_2(pdtlv->length); 1103 invtlv = tlv_valid(tlvl, len); 1104 if (invtlv) { 1105 break; 1106 } 1107 1108 /* 1109 * At this point, tlv_valid() has ensured that the TLV 1110 * length is large enough but not too large (it doesn't 1111 * go past the end of the containing TLV). 1112 */ 1113 ib = indent_pr(indent, 0); 1114 type = GET_BE_U_2(pdtlv->type); 1115 dp = (const u_char *) TLV_DATA(pdtlv); 1116 1117 if (ndo->ndo_vflag >= 3) 1118 ND_PRINT("%s%s, length %u (data encapsulated %u Bytes)", 1119 ib, tok2str(ForCES_TLV, NULL, type), 1120 tlvl, 1121 tlvl - TLV_HDRL); 1122 1123 if (pdata_print(ndo, dp, tlvl - TLV_HDRL, op_msk, indent + 1) == -1) 1124 return -1; 1125 pdtlv = GO_NXT_TLV(pdtlv, len); 1126 } 1127 1128 if (len) { 1129 ND_PRINT("\n\t\tMessy PATHDATA TLV header, type (0x%x)\n\t\texcess of %u Bytes ", 1130 GET_BE_U_2(pdtlv->type), 1131 len - GET_BE_U_2(pdtlv->length)); 1132 return -1; 1133 } 1134 1135 return 0; 1136 } 1137 1138 static int 1139 invoptlv_print(netdissect_options *ndo, 1140 const u_char * pptr, u_int len, 1141 uint16_t op_msk _U_, int indent) 1142 { 1143 char *ib = indent_pr(indent, 1); 1144 1145 if (ndo->ndo_vflag >= 3) { 1146 ND_PRINT("%sData[", ib + 1); 1147 hex_print(ndo, ib, pptr, len); 1148 ND_PRINT("%s]\n", ib); 1149 } 1150 return -1; 1151 } 1152 1153 static int 1154 otlv_print(netdissect_options *ndo, 1155 const struct forces_tlv *otlv, uint16_t op_msk _U_, int indent) 1156 { 1157 int rc = 0; 1158 const u_char *dp = (const u_char *) TLV_DATA(otlv); 1159 uint16_t type; 1160 u_int tll; 1161 char *ib = indent_pr(indent, 0); 1162 const struct optlv_h *ops; 1163 1164 /* 1165 * lfbselect_print() has ensured that GET_BE_U_2(otlv->length) 1166 * >= TLV_HDRL. 1167 */ 1168 type = GET_BE_U_2(otlv->type); 1169 tll = GET_BE_U_2(otlv->length) - TLV_HDRL; 1170 ops = get_forces_optlv_h(type); 1171 if (ndo->ndo_vflag >= 3) { 1172 ND_PRINT("%sOper TLV %s(0x%x) length %u\n", ib, ops->s, type, 1173 GET_BE_U_2(otlv->length)); 1174 } 1175 /* rest of ops must at least have 12B {pathinfo} */ 1176 if (tll < OP_MIN_SIZ) { 1177 ND_PRINT("\t\tOper TLV %s(0x%x) length %u\n", ops->s, type, 1178 GET_BE_U_2(otlv->length)); 1179 ND_PRINT("\t\tTruncated data size %u minimum required %u\n", tll, 1180 OP_MIN_SIZ); 1181 return invoptlv_print(ndo, dp, tll, ops->op_msk, indent); 1182 1183 } 1184 1185 /* XXX - do anything with ops->flags? */ 1186 if(ops->print) { 1187 rc = ops->print(ndo, dp, tll, ops->op_msk, indent + 1); 1188 } 1189 return rc; 1190 } 1191 1192 #define ASTDLN 4 1193 #define ASTMCD 255 1194 static int 1195 asttlv_print(netdissect_options *ndo, 1196 const u_char * pptr, u_int len, 1197 uint16_t op_msk _U_, int indent) 1198 { 1199 uint32_t rescode; 1200 u_int dlen; 1201 char *ib = indent_pr(indent, 0); 1202 1203 /* 1204 * forces_type_print() has ensured that len (the TLV length) 1205 * >= TLV_HDRL. 1206 */ 1207 dlen = len - TLV_HDRL; 1208 if (dlen != ASTDLN) { 1209 ND_PRINT("illegal ASTresult-TLV: %u bytes!\n", dlen); 1210 return -1; 1211 } 1212 rescode = GET_BE_U_4(pptr); 1213 if (rescode > ASTMCD) { 1214 ND_PRINT("illegal ASTresult result code: %u!\n", rescode); 1215 return -1; 1216 } 1217 1218 if (ndo->ndo_vflag >= 3) { 1219 ND_PRINT("Teardown reason:\n%s", ib); 1220 switch (rescode) { 1221 case 0: 1222 ND_PRINT("Normal Teardown"); 1223 break; 1224 case 1: 1225 ND_PRINT("Loss of Heartbeats"); 1226 break; 1227 case 2: 1228 ND_PRINT("Out of bandwidth"); 1229 break; 1230 case 3: 1231 ND_PRINT("Out of Memory"); 1232 break; 1233 case 4: 1234 ND_PRINT("Application Crash"); 1235 break; 1236 default: 1237 ND_PRINT("Unknown Teardown reason"); 1238 break; 1239 } 1240 ND_PRINT("(%x)\n%s", rescode, ib); 1241 } 1242 return 0; 1243 } 1244 1245 #define ASRDLN 4 1246 #define ASRMCD 3 1247 static int 1248 asrtlv_print(netdissect_options *ndo, 1249 const u_char * pptr, u_int len, 1250 uint16_t op_msk _U_, int indent) 1251 { 1252 uint32_t rescode; 1253 u_int dlen; 1254 char *ib = indent_pr(indent, 0); 1255 1256 /* 1257 * forces_type_print() has ensured that len (the TLV length) 1258 * >= TLV_HDRL. 1259 */ 1260 dlen = len - TLV_HDRL; 1261 if (dlen != ASRDLN) { /* id, instance, oper tlv */ 1262 ND_PRINT("illegal ASRresult-TLV: %u bytes!\n", dlen); 1263 return -1; 1264 } 1265 rescode = GET_BE_U_4(pptr); 1266 1267 if (rescode > ASRMCD) { 1268 ND_PRINT("illegal ASRresult result code: %u!\n", rescode); 1269 return -1; 1270 } 1271 1272 if (ndo->ndo_vflag >= 3) { 1273 ND_PRINT("\n%s", ib); 1274 switch (rescode) { 1275 case 0: 1276 ND_PRINT("Success "); 1277 break; 1278 case 1: 1279 ND_PRINT("FE ID invalid "); 1280 break; 1281 case 2: 1282 ND_PRINT("permission denied "); 1283 break; 1284 default: 1285 ND_PRINT("Unknown "); 1286 break; 1287 } 1288 ND_PRINT("(%x)\n%s", rescode, ib); 1289 } 1290 return 0; 1291 } 1292 1293 #if 0 1294 /* 1295 * XXX - not used. 1296 */ 1297 static int 1298 gentltlv_print(netdissect_options *ndo, 1299 const u_char * pptr _U_, u_int len, 1300 uint16_t op_msk _U_, int indent _U_) 1301 { 1302 u_int dlen = len - TLV_HDRL; 1303 1304 if (dlen < 4) { /* at least 32 bits must exist */ 1305 ND_PRINT("truncated TLV: %u bytes missing! ", 4 - dlen); 1306 return -1; 1307 } 1308 return 0; 1309 } 1310 #endif 1311 1312 #define RD_MIN 8 1313 1314 static int 1315 print_metailv(netdissect_options *ndo, 1316 const u_char * pptr, uint16_t op_msk _U_, int indent) 1317 { 1318 u_int rlen; 1319 char *ib = indent_pr(indent, 0); 1320 /* XXX: check header length */ 1321 const struct forces_ilv *ilv = (const struct forces_ilv *)pptr; 1322 1323 /* 1324 * print_metatlv() has ensured that len (what remains in the 1325 * ILV) >= ILV_HDRL. 1326 */ 1327 rlen = GET_BE_U_4(ilv->length) - ILV_HDRL; 1328 ND_PRINT("%sMetaID 0x%x length %u\n", ib, GET_BE_U_4(ilv->type), 1329 GET_BE_U_4(ilv->length)); 1330 if (ndo->ndo_vflag >= 3) { 1331 hex_print(ndo, "\t\t[", ILV_DATA(ilv), rlen); 1332 ND_PRINT(" ]\n"); 1333 } 1334 return 0; 1335 } 1336 1337 static int 1338 print_metatlv(netdissect_options *ndo, 1339 const u_char * pptr, u_int len, 1340 uint16_t op_msk _U_, int indent) 1341 { 1342 u_int dlen; 1343 char *ib = indent_pr(indent, 0); 1344 u_int rlen; 1345 const struct forces_ilv *ilv = (const struct forces_ilv *)pptr; 1346 int invilv; 1347 1348 /* 1349 * redirect_print() has ensured that len (what remains in the 1350 * TLV) >= TLV_HDRL. 1351 */ 1352 dlen = len - TLV_HDRL; 1353 rlen = dlen; 1354 ND_PRINT("\n%s METADATA length %u\n", ib, rlen); 1355 while (rlen != 0) { 1356 invilv = ilv_valid(ndo, ilv, rlen); 1357 if (invilv) { 1358 break; 1359 } 1360 1361 /* 1362 * At this point, ilv_valid() has ensured that the ILV 1363 * length is large enough but not too large (it doesn't 1364 * go past the end of the containing TLV). 1365 */ 1366 print_metailv(ndo, (const u_char *) ilv, 0, indent + 1); 1367 ilv = GO_NXT_ILV(ilv, rlen); 1368 } 1369 1370 return 0; 1371 } 1372 1373 1374 static int 1375 print_reddata(netdissect_options *ndo, 1376 const u_char * pptr, u_int len, 1377 uint16_t op_msk _U_, int indent) 1378 { 1379 u_int dlen; 1380 char *ib = indent_pr(indent, 0); 1381 u_int rlen; 1382 1383 dlen = len - TLV_HDRL; 1384 rlen = dlen; 1385 ND_PRINT("\n%s Redirect Data length %u\n", ib, rlen); 1386 1387 if (ndo->ndo_vflag >= 3) { 1388 ND_PRINT("\t\t["); 1389 hex_print(ndo, "\n\t\t", pptr, rlen); 1390 ND_PRINT("\n\t\t]"); 1391 } 1392 1393 return 0; 1394 } 1395 1396 static int 1397 redirect_print(netdissect_options *ndo, 1398 const u_char * pptr, u_int len, 1399 uint16_t op_msk _U_, int indent) 1400 { 1401 const struct forces_tlv *tlv = (const struct forces_tlv *)pptr; 1402 u_int dlen; 1403 u_int rlen; 1404 u_int invtlv; 1405 1406 /* 1407 * forces_type_print() has ensured that len (the TLV length) 1408 * >= TLV_HDRL. 1409 */ 1410 dlen = len - TLV_HDRL; 1411 if (dlen <= RD_MIN) { 1412 ND_PRINT("\n\t\ttruncated Redirect TLV: %u bytes missing! ", 1413 RD_MIN - dlen); 1414 return -1; 1415 } 1416 1417 rlen = dlen; 1418 indent += 1; 1419 while (rlen != 0) { 1420 uint16_t type, tlvl; 1421 1422 type = GET_BE_U_2(tlv->type); 1423 tlvl = GET_BE_U_2(tlv->length); 1424 invtlv = tlv_valid(tlvl, rlen); 1425 if (invtlv) { 1426 ND_PRINT("Bad Redirect data\n"); 1427 break; 1428 } 1429 1430 /* 1431 * At this point, tlv_valid() has ensured that the TLV 1432 * length is large enough but not too large (it doesn't 1433 * go past the end of the containing TLV). 1434 */ 1435 if (type == F_TLV_METD) { 1436 print_metatlv(ndo, (const u_char *) TLV_DATA(tlv), 1437 tlvl, 0, 1438 indent); 1439 } else if (type == F_TLV_REDD) { 1440 print_reddata(ndo, (const u_char *) TLV_DATA(tlv), 1441 tlvl, 0, 1442 indent); 1443 } else { 1444 ND_PRINT("Unknown REDIRECT TLV 0x%x len %u\n", 1445 type, 1446 tlvl); 1447 } 1448 1449 tlv = GO_NXT_TLV(tlv, rlen); 1450 } 1451 1452 if (rlen) { 1453 ND_PRINT("\n\t\tMessy Redirect TLV header, type (0x%x)\n\t\texcess of %u Bytes ", 1454 GET_BE_U_2(tlv->type), 1455 rlen - GET_BE_U_2(tlv->length)); 1456 return -1; 1457 } 1458 1459 return 0; 1460 } 1461 1462 #define OP_OFF 8 1463 #define OP_MIN 12 1464 1465 static int 1466 lfbselect_print(netdissect_options *ndo, 1467 const u_char * pptr, u_int len, 1468 uint16_t op_msk, int indent) 1469 { 1470 const struct forces_lfbsh *lfbs; 1471 const struct forces_tlv *otlv; 1472 char *ib = indent_pr(indent, 0); 1473 u_int dlen; 1474 u_int rlen; 1475 u_int invtlv; 1476 1477 /* 1478 * forces_type_print() has ensured that len (the TLV length) 1479 * >= TLV_HDRL. 1480 */ 1481 dlen = len - TLV_HDRL; 1482 if (dlen <= OP_MIN) { /* id, instance, oper tlv header .. */ 1483 ND_PRINT("\n\t\ttruncated lfb selector: %u bytes missing! ", 1484 OP_MIN - dlen); 1485 return -1; 1486 } 1487 1488 /* 1489 * At this point, we know that dlen > OP_MIN; OP_OFF < OP_MIN, so 1490 * we also know that it's > OP_OFF. 1491 */ 1492 rlen = dlen - OP_OFF; 1493 1494 lfbs = (const struct forces_lfbsh *)pptr; 1495 ND_TCHECK_SIZE(lfbs); 1496 if (ndo->ndo_vflag >= 3) { 1497 ND_PRINT("\n%s%s(Classid %x) instance %x\n", 1498 ib, 1499 tok2str(ForCES_LFBs, NULL, GET_BE_U_4(lfbs->class)), 1500 GET_BE_U_4(lfbs->class), 1501 GET_BE_U_4(lfbs->instance)); 1502 } 1503 1504 otlv = (const struct forces_tlv *)(lfbs + 1); 1505 1506 indent += 1; 1507 while (rlen != 0) { 1508 uint16_t type, tlvl; 1509 1510 type = GET_BE_U_2(otlv->type); 1511 tlvl = GET_BE_U_2(otlv->length); 1512 invtlv = tlv_valid(tlvl, rlen); 1513 if (invtlv) 1514 break; 1515 1516 /* 1517 * At this point, tlv_valid() has ensured that the TLV 1518 * length is large enough but not too large (it doesn't 1519 * go past the end of the containing TLV). 1520 */ 1521 if (op_valid(type, op_msk)) { 1522 otlv_print(ndo, otlv, 0, indent); 1523 } else { 1524 if (ndo->ndo_vflag < 3) 1525 ND_PRINT("\n"); 1526 ND_PRINT("\t\tINValid oper-TLV type 0x%x length %u for this ForCES message\n", 1527 type, tlvl); 1528 invoptlv_print(ndo, (const u_char *)otlv, rlen, 0, indent); 1529 } 1530 otlv = GO_NXT_TLV(otlv, rlen); 1531 } 1532 1533 if (rlen) { 1534 ND_PRINT("\n\t\tMessy oper TLV header, type (0x%x)\n\t\texcess of %u Bytes ", 1535 GET_BE_U_2(otlv->type), 1536 rlen - GET_BE_U_2(otlv->length)); 1537 return -1; 1538 } 1539 1540 return 0; 1541 1542 trunc: 1543 nd_print_trunc(ndo); 1544 return -1; 1545 } 1546 1547 static int 1548 forces_type_print(netdissect_options *ndo, 1549 const u_char * pptr, const struct forcesh *fhdr _U_, 1550 u_int mlen, const struct tom_h *tops) 1551 { 1552 const struct forces_tlv *tltlv; 1553 u_int rlen; 1554 u_int invtlv; 1555 int rc = 0; 1556 u_int ttlv = 0; 1557 1558 /* 1559 * forces_print() has already checked that mlen >= ForCES_HDRL 1560 * by calling ForCES_HLN_VALID(). 1561 */ 1562 rlen = mlen - ForCES_HDRL; 1563 1564 if (rlen > TLV_HLN) { 1565 if (tops->flags & ZERO_TTLV) { 1566 ND_PRINT("<0x%x>Illegal Top level TLV!\n", tops->flags); 1567 return -1; 1568 } 1569 } else { 1570 if (tops->flags & ZERO_MORE_TTLV) 1571 return 0; 1572 if (tops->flags & ONE_MORE_TTLV) { 1573 ND_PRINT("\tTop level TLV Data missing!\n"); 1574 return -1; 1575 } 1576 } 1577 1578 if (tops->flags & ZERO_TTLV) { 1579 return 0; 1580 } 1581 1582 ttlv = tops->flags >> 4; 1583 tltlv = GET_TOP_TLV(pptr); 1584 1585 /*XXX: 15 top level tlvs will probably be fine 1586 You are nuts if you send more ;-> */ 1587 while (rlen != 0) { 1588 uint16_t type, tlvl; 1589 1590 type = GET_BE_U_2(tltlv->type); 1591 tlvl = GET_BE_U_2(tltlv->length); 1592 invtlv = tlv_valid(tlvl, rlen); 1593 if (invtlv) 1594 break; 1595 1596 /* 1597 * At this point, tlv_valid() has ensured that the TLV 1598 * length is large enough but not too large (it doesn't 1599 * go past the end of the packet). 1600 */ 1601 if (!ttlv_valid(type)) { 1602 ND_PRINT("\n\tInvalid ForCES Top TLV type=0x%x", 1603 type); 1604 return -1; 1605 } 1606 1607 if (ndo->ndo_vflag >= 3) 1608 ND_PRINT("\t%s, length %u (data length %u Bytes)", 1609 tok2str(ForCES_TLV, NULL, type), 1610 tlvl, 1611 tlvl - TLV_HDRL); 1612 1613 rc = tops->print(ndo, (const u_char *) TLV_DATA(tltlv), 1614 tlvl, 1615 tops->op_msk, 9); 1616 if (rc < 0) { 1617 return -1; 1618 } 1619 tltlv = GO_NXT_TLV(tltlv, rlen); 1620 ttlv--; 1621 if (ttlv <= 0) 1622 break; 1623 } 1624 /* 1625 * XXX - if ttlv != 0, does that mean that the packet was too 1626 * short, and didn't have *enough* TLVs in it? 1627 */ 1628 if (rlen) { 1629 ND_PRINT("\tMess TopTLV header: min %u, total %u advertised %u ", 1630 TLV_HDRL, rlen, GET_BE_U_2(tltlv->length)); 1631 return -1; 1632 } 1633 1634 return 0; 1635 } 1636 1637 void 1638 forces_print(netdissect_options *ndo, 1639 const u_char * pptr, u_int len) 1640 { 1641 const struct forcesh *fhdr; 1642 u_int mlen; 1643 uint32_t flg_raw; 1644 uint8_t tom; 1645 const struct tom_h *tops; 1646 int rc = 0; 1647 1648 ndo->ndo_protocol = "forces"; 1649 fhdr = (const struct forcesh *)pptr; 1650 ND_TCHECK_SIZE(fhdr); 1651 tom = GET_U_1(fhdr->fm_tom); 1652 if (!tom_valid(tom)) { 1653 ND_PRINT("Invalid ForCES message type %u\n", tom); 1654 goto error; 1655 } 1656 1657 mlen = ForCES_BLN(fhdr); 1658 1659 tops = get_forces_tom(tom); 1660 if (tops->v == TOM_RSVD) { 1661 ND_PRINT("\n\tUnknown ForCES message type=0x%x", tom); 1662 goto error; 1663 } 1664 1665 ND_PRINT("\n\tForCES %s ", tops->s); 1666 if (!ForCES_HLN_VALID(mlen, len)) { 1667 ND_PRINT("Illegal ForCES pkt len - min %u, total recvd %u, advertised %u ", 1668 ForCES_HDRL, len, ForCES_BLN(fhdr)); 1669 goto error; 1670 } 1671 1672 flg_raw = GET_BE_U_4(pptr + 20); 1673 if (ndo->ndo_vflag >= 1) { 1674 ND_PRINT("\n\tForCES Version %u len %uB flags 0x%08x ", 1675 ForCES_V(fhdr), mlen, flg_raw); 1676 ND_PRINT("\n\tSrcID 0x%x(%s) DstID 0x%x(%s) Correlator 0x%" PRIx64, 1677 ForCES_SID(fhdr), ForCES_node(ForCES_SID(fhdr)), 1678 ForCES_DID(fhdr), ForCES_node(ForCES_DID(fhdr)), 1679 GET_BE_U_8(fhdr->fm_cor)); 1680 1681 } 1682 if (ndo->ndo_vflag >= 2) { 1683 ND_PRINT("\n\tForCES flags:\n\t %s(0x%x), prio=%u, %s(0x%x),\n\t %s(0x%x), %s(0x%x)\n", 1684 tok2str(ForCES_ACKs, "ACKUnknown", ForCES_ACK(fhdr)), 1685 ForCES_ACK(fhdr), 1686 ForCES_PRI(fhdr), 1687 tok2str(ForCES_EMs, "EMUnknown", ForCES_EM(fhdr)), 1688 ForCES_EM(fhdr), 1689 tok2str(ForCES_ATs, "ATUnknown", ForCES_AT(fhdr)), 1690 ForCES_AT(fhdr), 1691 tok2str(ForCES_TPs, "TPUnknown", ForCES_TP(fhdr)), 1692 ForCES_TP(fhdr)); 1693 ND_PRINT("\t Extra flags: rsv(b5-7) 0x%x rsv(b13-31) 0x%x\n", 1694 ForCES_RS1(fhdr), ForCES_RS2(fhdr)); 1695 } 1696 rc = forces_type_print(ndo, pptr, fhdr, mlen, tops); 1697 if (rc < 0) { 1698 error: 1699 hex_print(ndo, "\n\t[", pptr, len); 1700 ND_PRINT("\n\t]"); 1701 return; 1702 } 1703 1704 if (ndo->ndo_vflag >= 4) { 1705 ND_PRINT("\n\t Raw ForCES message\n\t ["); 1706 hex_print(ndo, "\n\t ", pptr, len); 1707 ND_PRINT("\n\t ]"); 1708 } 1709 return; 1710 1711 trunc: 1712 nd_print_trunc(ndo); 1713 } 1714