blob: f87898e0d3e2aabd456614f106d426113620bd66 [file] [log] [blame]
JP Abgrall53f17a92014-02-12 14:02:41 -08001/*
2 * Copyright (c) 1998-2006 The TCPDUMP project
3 *
4 * Redistribution and use in source and binary forms, with or without
5 * modification, are permitted provided that: (1) source code
6 * distributions retain the above copyright notice and this paragraph
7 * in its entirety, and (2) distributions including binary code include
8 * the above copyright notice and this paragraph in its entirety in
9 * the documentation or other materials provided with the distribution.
10 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND
11 * WITHOUT ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, WITHOUT
12 * LIMITATION, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
13 * FOR A PARTICULAR PURPOSE.
14 *
JP Abgrall53f17a92014-02-12 14:02:41 -080015 * Original code by Carles Kishimoto <Carles.Kishimoto@bsc.es>
16 */
17
Elliott Hughese2e3bd12017-05-15 10:59:29 -070018/* \summary: Cisco VLAN Query Protocol (VQP) printer */
19
JP Abgrall53f17a92014-02-12 14:02:41 -080020#ifdef HAVE_CONFIG_H
Elliott Hughes820eced2021-08-20 18:00:50 -070021#include <config.h>
JP Abgrall53f17a92014-02-12 14:02:41 -080022#endif
23
Elliott Hughes820eced2021-08-20 18:00:50 -070024#include "netdissect-stdinc.h"
JP Abgrall53f17a92014-02-12 14:02:41 -080025
Elliott Hughes820eced2021-08-20 18:00:50 -070026#define ND_LONGJMP_FROM_TCHECK
Elliott Hughese2e3bd12017-05-15 10:59:29 -070027#include "netdissect.h"
JP Abgrall53f17a92014-02-12 14:02:41 -080028#include "extract.h"
29#include "addrtoname.h"
30
31#define VQP_VERSION 1
JP Abgrall53f17a92014-02-12 14:02:41 -080032
33/*
34 * VQP common header
35 *
36 * 0 1 2 3
37 * 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
38 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
39 * | Constant | Packet type | Error Code | nitems |
40 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
41 * | Packet Sequence Number (4 bytes) |
42 * +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
43 */
44
45struct vqp_common_header_t {
Elliott Hughes820eced2021-08-20 18:00:50 -070046 nd_uint8_t version;
47 nd_uint8_t msg_type;
48 nd_uint8_t error_code;
49 nd_uint8_t nitems;
50 nd_uint32_t sequence;
JP Abgrall53f17a92014-02-12 14:02:41 -080051};
52
53struct vqp_obj_tlv_t {
Elliott Hughes820eced2021-08-20 18:00:50 -070054 nd_uint32_t obj_type;
55 nd_uint16_t obj_length;
JP Abgrall53f17a92014-02-12 14:02:41 -080056};
57
58#define VQP_OBJ_REQ_JOIN_PORT 0x01
59#define VQP_OBJ_RESP_VLAN 0x02
60#define VQP_OBJ_REQ_RECONFIRM 0x03
61#define VQP_OBJ_RESP_RECONFIRM 0x04
62
63static const struct tok vqp_msg_type_values[] = {
64 { VQP_OBJ_REQ_JOIN_PORT, "Request, Join Port"},
65 { VQP_OBJ_RESP_VLAN, "Response, VLAN"},
66 { VQP_OBJ_REQ_RECONFIRM, "Request, Reconfirm"},
67 { VQP_OBJ_RESP_RECONFIRM, "Response, Reconfirm"},
68 { 0, NULL}
69};
70
71static const struct tok vqp_error_code_values[] = {
72 { 0x00, "No error"},
73 { 0x03, "Access denied"},
74 { 0x04, "Shutdown port"},
75 { 0x05, "Wrong VTP domain"},
76 { 0, NULL}
77};
78
79/* FIXME the heading 0x0c looks ugly - those must be flags etc. */
80#define VQP_OBJ_IP_ADDRESS 0x0c01
81#define VQP_OBJ_PORT_NAME 0x0c02
82#define VQP_OBJ_VLAN_NAME 0x0c03
83#define VQP_OBJ_VTP_DOMAIN 0x0c04
84#define VQP_OBJ_ETHERNET_PKT 0x0c05
85#define VQP_OBJ_MAC_NULL 0x0c06
86#define VQP_OBJ_MAC_ADDRESS 0x0c08
87
88static const struct tok vqp_obj_values[] = {
89 { VQP_OBJ_IP_ADDRESS, "Client IP Address" },
90 { VQP_OBJ_PORT_NAME, "Port Name" },
91 { VQP_OBJ_VLAN_NAME, "VLAN Name" },
92 { VQP_OBJ_VTP_DOMAIN, "VTP Domain" },
93 { VQP_OBJ_ETHERNET_PKT, "Ethernet Packet" },
94 { VQP_OBJ_MAC_NULL, "MAC Null" },
95 { VQP_OBJ_MAC_ADDRESS, "MAC Address" },
96 { 0, NULL}
97};
98
99void
Elliott Hughes820eced2021-08-20 18:00:50 -0700100vqp_print(netdissect_options *ndo, const u_char *pptr, u_int len)
JP Abgrall53f17a92014-02-12 14:02:41 -0800101{
102 const struct vqp_common_header_t *vqp_common_header;
103 const struct vqp_obj_tlv_t *vqp_obj_tlv;
104
105 const u_char *tptr;
Elliott Hughes820eced2021-08-20 18:00:50 -0700106 uint8_t version;
Elliott Hughes892a68b2015-10-19 14:43:53 -0700107 uint16_t vqp_obj_len;
108 uint32_t vqp_obj_type;
Elliott Hughescec480a2017-12-19 16:54:57 -0800109 u_int tlen;
Elliott Hughes892a68b2015-10-19 14:43:53 -0700110 uint8_t nitems;
JP Abgrall53f17a92014-02-12 14:02:41 -0800111
Elliott Hughes820eced2021-08-20 18:00:50 -0700112 ndo->ndo_protocol = "vqp";
JP Abgrall53f17a92014-02-12 14:02:41 -0800113 tptr=pptr;
114 tlen = len;
115 vqp_common_header = (const struct vqp_common_header_t *)pptr;
Elliott Hughes820eced2021-08-20 18:00:50 -0700116 ND_TCHECK_SIZE(vqp_common_header);
Elliott Hughescec480a2017-12-19 16:54:57 -0800117 if (sizeof(struct vqp_common_header_t) > tlen)
Elliott Hughes820eced2021-08-20 18:00:50 -0700118 goto invalid;
119 version = GET_U_1(vqp_common_header->version);
JP Abgrall53f17a92014-02-12 14:02:41 -0800120
121 /*
122 * Sanity checking of the header.
123 */
Elliott Hughes820eced2021-08-20 18:00:50 -0700124 if (version != VQP_VERSION) {
125 ND_PRINT("VQP version %u packet not supported",
126 version);
JP Abgrall53f17a92014-02-12 14:02:41 -0800127 return;
128 }
129
130 /* in non-verbose mode just lets print the basic Message Type */
Elliott Hughes892a68b2015-10-19 14:43:53 -0700131 if (ndo->ndo_vflag < 1) {
Elliott Hughes820eced2021-08-20 18:00:50 -0700132 ND_PRINT("VQPv%u %s Message, error-code %s (%u), length %u",
133 version,
134 tok2str(vqp_msg_type_values, "unknown (%u)",GET_U_1(vqp_common_header->msg_type)),
135 tok2str(vqp_error_code_values, "unknown (%u)",GET_U_1(vqp_common_header->error_code)),
136 GET_U_1(vqp_common_header->error_code),
137 len);
JP Abgrall53f17a92014-02-12 14:02:41 -0800138 return;
139 }
Elliott Hughes892a68b2015-10-19 14:43:53 -0700140
JP Abgrall53f17a92014-02-12 14:02:41 -0800141 /* ok they seem to want to know everything - lets fully decode it */
Elliott Hughes820eced2021-08-20 18:00:50 -0700142 nitems = GET_U_1(vqp_common_header->nitems);
143 ND_PRINT("\n\tVQPv%u, %s Message, error-code %s (%u), seq 0x%08x, items %u, length %u",
144 version,
145 tok2str(vqp_msg_type_values, "unknown (%u)",GET_U_1(vqp_common_header->msg_type)),
146 tok2str(vqp_error_code_values, "unknown (%u)",GET_U_1(vqp_common_header->error_code)),
147 GET_U_1(vqp_common_header->error_code),
148 GET_BE_U_4(vqp_common_header->sequence),
149 nitems,
150 len);
JP Abgrall53f17a92014-02-12 14:02:41 -0800151
152 /* skip VQP Common header */
Elliott Hughes820eced2021-08-20 18:00:50 -0700153 tptr+=sizeof(struct vqp_common_header_t);
154 tlen-=sizeof(struct vqp_common_header_t);
JP Abgrall53f17a92014-02-12 14:02:41 -0800155
Elliott Hughes820eced2021-08-20 18:00:50 -0700156 while (nitems != 0 && tlen != 0) {
JP Abgrall53f17a92014-02-12 14:02:41 -0800157
158 vqp_obj_tlv = (const struct vqp_obj_tlv_t *)tptr;
Elliott Hughes820eced2021-08-20 18:00:50 -0700159 ND_TCHECK_SIZE(vqp_obj_tlv);
Elliott Hughescec480a2017-12-19 16:54:57 -0800160 if (sizeof(struct vqp_obj_tlv_t) > tlen)
Elliott Hughes820eced2021-08-20 18:00:50 -0700161 goto invalid;
162 vqp_obj_type = GET_BE_U_4(vqp_obj_tlv->obj_type);
163 vqp_obj_len = GET_BE_U_2(vqp_obj_tlv->obj_length);
JP Abgrall53f17a92014-02-12 14:02:41 -0800164 tptr+=sizeof(struct vqp_obj_tlv_t);
165 tlen-=sizeof(struct vqp_obj_tlv_t);
166
Elliott Hughes820eced2021-08-20 18:00:50 -0700167 ND_PRINT("\n\t %s Object (0x%08x), length %u, value: ",
JP Abgrall53f17a92014-02-12 14:02:41 -0800168 tok2str(vqp_obj_values, "Unknown", vqp_obj_type),
Elliott Hughes820eced2021-08-20 18:00:50 -0700169 vqp_obj_type, vqp_obj_len);
JP Abgrall53f17a92014-02-12 14:02:41 -0800170
171 /* basic sanity check */
172 if (vqp_obj_type == 0 || vqp_obj_len ==0) {
173 return;
174 }
175
176 /* did we capture enough for fully decoding the object ? */
Elliott Hughes820eced2021-08-20 18:00:50 -0700177 ND_TCHECK_LEN(tptr, vqp_obj_len);
Elliott Hughescec480a2017-12-19 16:54:57 -0800178 if (vqp_obj_len > tlen)
Elliott Hughes820eced2021-08-20 18:00:50 -0700179 goto invalid;
JP Abgrall53f17a92014-02-12 14:02:41 -0800180
181 switch(vqp_obj_type) {
182 case VQP_OBJ_IP_ADDRESS:
Elliott Hughescec480a2017-12-19 16:54:57 -0800183 if (vqp_obj_len != 4)
Elliott Hughes820eced2021-08-20 18:00:50 -0700184 goto invalid;
185 ND_PRINT("%s (0x%08x)", GET_IPADDR_STRING(tptr),
186 GET_BE_U_4(tptr));
JP Abgrall53f17a92014-02-12 14:02:41 -0800187 break;
188 /* those objects have similar semantics - fall through */
189 case VQP_OBJ_PORT_NAME:
190 case VQP_OBJ_VLAN_NAME:
191 case VQP_OBJ_VTP_DOMAIN:
192 case VQP_OBJ_ETHERNET_PKT:
Elliott Hughes820eced2021-08-20 18:00:50 -0700193 nd_printjnp(ndo, tptr, vqp_obj_len);
JP Abgrall53f17a92014-02-12 14:02:41 -0800194 break;
195 /* those objects have similar semantics - fall through */
196 case VQP_OBJ_MAC_ADDRESS:
197 case VQP_OBJ_MAC_NULL:
Elliott Hughes820eced2021-08-20 18:00:50 -0700198 if (vqp_obj_len != MAC_ADDR_LEN)
199 goto invalid;
200 ND_PRINT("%s", GET_ETHERADDR_STRING(tptr));
JP Abgrall53f17a92014-02-12 14:02:41 -0800201 break;
202 default:
Elliott Hughes892a68b2015-10-19 14:43:53 -0700203 if (ndo->ndo_vflag <= 1)
204 print_unknown_data(ndo,tptr, "\n\t ", vqp_obj_len);
JP Abgrall53f17a92014-02-12 14:02:41 -0800205 break;
206 }
207 tptr += vqp_obj_len;
208 tlen -= vqp_obj_len;
209 nitems--;
210 }
211 return;
Elliott Hughes820eced2021-08-20 18:00:50 -0700212invalid:
213 nd_print_invalid(ndo);
JP Abgrall53f17a92014-02-12 14:02:41 -0800214}