2 * Routines for RIPv1 and RIPv2 packet disassembly
3 * (c) Copyright Hannes R. Boehm <hannes@boehm.org>
5 * $Id: packet-rip.c,v 1.8 1999/03/23 03:14:43 gram Exp $
7 * Ethereal - Network traffic analyzer
8 * By Gerald Combs <gerald@zing.org>
9 * Copyright 1998 Gerald Combs
12 * This program is free software; you can redistribute it and/or
13 * modify it under the terms of the GNU General Public License
14 * as published by the Free Software Foundation; either version 2
15 * of the License, or (at your option) any later version.
17 * This program is distributed in the hope that it will be useful,
18 * but WITHOUT ANY WARRANTY; without even the implied warranty of
19 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
20 * GNU General Public License for more details.
22 * You should have received a copy of the GNU General Public License
23 * along with this program; if not, write to the Free Software
24 * Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA 02111-1307, USA.
29 #ifdef HAVE_SYS_TYPES_H
30 #include <sys/types.h>
33 #ifdef HAVE_NETINET_IN_H
34 #include <netinet/in.h>
39 #include "packet-rip.h"
41 static void dissect_ip_rip_vektor(guint8 version,
42 const e_rip_vektor *rip_vektor, int offset, proto_tree *tree);
43 static void dissect_rip_authentication(const e_rip_authentication *rip_authentication,
44 int offset, proto_tree *tree);
47 dissect_rip(const u_char *pd, int offset, frame_data *fd, proto_tree *tree) {
49 e_rip_entry rip_entry;
51 proto_tree *rip_tree = NULL;
54 /* we do the range checking of the index when checking wether or not this is a RIP packet */
55 static char *packet_type[8] = { "never used", "Request", "Response",
56 "Traceon", "Traceoff", "Vendor specific (Sun)" };
57 static char *version[3] = { "RIP", "RIPv1", "RIPv2" };
59 /* avoid alignment problem */
60 memcpy(&rip_header, &pd[offset], sizeof(rip_header));
62 /* Check if we 've realy got a RIP packet */
64 switch(rip_header.version) {
66 /* the domain field has to be set to zero for RIPv1 */
67 if(!(rip_header.domain == 0)){
68 dissect_data(pd, offset, fd, tree);
71 /* the RIPv2 checks are also made for v1 packets */
73 /* check wether or not command nr. is between 1-7
74 * (range checking for index of char* packet_type is done at the same time)
76 if( !( (rip_header.command > 0) && (rip_header.command <= 7) )){
77 dissect_data(pd, offset, fd, tree);
82 /* we only know RIPv1 and RIPv2 */
83 dissect_data(pd, offset, fd, tree);
87 if (check_col(fd, COL_PROTOCOL))
88 col_add_str(fd, COL_PROTOCOL, version[rip_header.version] );
89 if (check_col(fd, COL_INFO))
90 col_add_str(fd, COL_INFO, packet_type[rip_header.command]);
93 ti = proto_tree_add_item(tree, offset, (fd->cap_len - offset), "Routing Information Protocol");
94 rip_tree = proto_tree_new();
95 proto_item_add_subtree(ti, rip_tree, ETT_RIP);
97 proto_tree_add_item(rip_tree, offset, 1, "Command: %d (%s)", rip_header.command, packet_type[rip_header.command]);
98 proto_tree_add_item(rip_tree, offset + 1, 1, "Version: %d", rip_header.version);
99 if(rip_header.version == RIPv2)
100 proto_tree_add_item(rip_tree, offset + 2 , 2, "Routing Domain: %d", ntohs(rip_header.domain));
103 offset += RIP_HEADER_LENGTH;
105 /* zero or more entries */
107 while((fd->cap_len - offset) >= RIP_ENTRY_LENGTH){
108 memcpy(&rip_entry, &pd[offset], sizeof(rip_entry)); /* avoid alignment problem */
109 family = ntohs(rip_entry.vektor.family);
112 ti = proto_tree_add_item(rip_tree, offset,
113 RIP_ENTRY_LENGTH, "IP Address: %s, Metric: %ld",
114 ip_to_str((guint8 *) &(rip_entry.vektor.ip)),
115 (long)ntohl(rip_entry.vektor.metric));
116 dissect_ip_rip_vektor(rip_header.version, &rip_entry.vektor,
120 proto_tree_add_item(rip_tree, offset,
121 RIP_ENTRY_LENGTH, "Authentication");
122 dissect_rip_authentication(&rip_entry.authentication,
126 proto_tree_add_item(rip_tree, offset,
127 RIP_ENTRY_LENGTH, "Unknown address family %u",
132 offset += RIP_ENTRY_LENGTH;
138 dissect_ip_rip_vektor(guint8 version, const e_rip_vektor *rip_vektor,
139 int offset, proto_tree *tree)
141 proto_tree *rip_vektor_tree;
143 rip_vektor_tree = proto_tree_new();
144 proto_item_add_subtree(tree, rip_vektor_tree, ETT_RIP_VEC);
146 proto_tree_add_item(rip_vektor_tree, offset, 2, "Address Family ID: IP");
148 proto_tree_add_item(rip_vektor_tree, offset + 2 , 2, "Route Tag: %d",
149 ntohs(rip_vektor->tag));
150 proto_tree_add_item(rip_vektor_tree, offset + 4, 4, "IP Address: %s",
151 ip_to_str((guint8 *) &(rip_vektor->ip)));
152 if(version == RIPv2) {
153 proto_tree_add_item(rip_vektor_tree, offset + 8 , 4, "Netmask: %s",
154 ip_to_str((guint8 *) &(rip_vektor->mask)));
155 proto_tree_add_item(rip_vektor_tree, offset + 12, 4, "Next Hop: %s",
156 ip_to_str((guint8 *) &(rip_vektor->next_hop)));
158 proto_tree_add_item(rip_vektor_tree, offset + 16, 4, "Metric: %ld",
159 (long)ntohl(rip_vektor->metric));
163 dissect_rip_authentication(const e_rip_authentication *rip_authentication,
164 int offset, proto_tree *tree)
166 proto_tree *rip_authentication_tree;
169 rip_authentication_tree = proto_tree_new();
170 proto_item_add_subtree(tree, rip_authentication_tree, ETT_RIP_VEC);
172 authtype = ntohs(rip_authentication->authtype);
173 proto_tree_add_item(rip_authentication_tree, offset + 2, 2,
174 "Authentication type: %u", authtype);
176 proto_tree_add_item(rip_authentication_tree, offset + 4 , 16,
178 rip_authentication->authentication);