1999-10-30 13:11:06 +08:00
|
|
|
/*
|
|
|
|
* Copyright (c) 1988, 1989, 1990, 1991, 1993, 1994
|
|
|
|
* The Regents of the University of California. All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that: (1) source code distributions
|
|
|
|
* retain the above copyright notice and this paragraph in its entirety, (2)
|
|
|
|
* distributions including binary code include the above copyright notice and
|
|
|
|
* this paragraph in its entirety in the documentation or other materials
|
|
|
|
* provided with the distribution, and (3) all advertising materials mentioning
|
|
|
|
* features or use of this software display the following acknowledgement:
|
|
|
|
* ``This product includes software developed by the University of California,
|
|
|
|
* Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
|
|
|
|
* the University nor the names of its contributors may be used to endorse
|
|
|
|
* or promote products derived from this software without specific prior
|
|
|
|
* written permission.
|
|
|
|
* THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
|
|
|
|
* WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
|
|
|
|
* MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
|
|
|
|
*/
|
|
|
|
|
2016-08-14 21:42:19 +08:00
|
|
|
/* \summary: IPv6 Internet Control Message Protocol (ICMPv6) printer */
|
|
|
|
|
1999-11-21 17:36:43 +08:00
|
|
|
#ifdef HAVE_CONFIG_H
|
|
|
|
#include "config.h"
|
|
|
|
#endif
|
|
|
|
|
2015-09-10 04:42:38 +08:00
|
|
|
#include <netdissect-stdinc.h>
|
1999-10-30 13:11:06 +08:00
|
|
|
|
|
|
|
#include <stdio.h>
|
2001-06-27 10:48:43 +08:00
|
|
|
#include <string.h>
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2015-09-06 05:35:58 +08:00
|
|
|
#include "netdissect.h"
|
1999-10-30 13:11:06 +08:00
|
|
|
#include "addrtoname.h"
|
2015-09-18 05:56:44 +08:00
|
|
|
#include "addrtostr.h"
|
2002-12-11 15:13:49 +08:00
|
|
|
#include "extract.h"
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2005-05-14 08:42:28 +08:00
|
|
|
#include "ip6.h"
|
|
|
|
#include "ipproto.h"
|
|
|
|
|
2000-09-29 13:46:11 +08:00
|
|
|
#include "udp.h"
|
2000-10-06 19:32:17 +08:00
|
|
|
#include "ah.h"
|
2000-09-29 13:46:11 +08:00
|
|
|
|
2013-12-31 14:52:15 +08:00
|
|
|
/* NetBSD: icmp6.h,v 1.13 2000/08/03 16:30:37 itojun Exp */
|
|
|
|
/* $KAME: icmp6.h,v 1.22 2000/08/03 15:25:16 jinmei Exp $ */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the project nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
|
|
|
*
|
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct icmp6_hdr {
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t icmp6_type; /* type field */
|
|
|
|
uint8_t icmp6_code; /* code field */
|
2014-04-23 15:20:40 +08:00
|
|
|
uint16_t icmp6_cksum; /* checksum field */
|
2013-12-31 14:52:15 +08:00
|
|
|
union {
|
2014-04-23 15:20:40 +08:00
|
|
|
uint32_t icmp6_un_data32[1]; /* type-specific field */
|
|
|
|
uint16_t icmp6_un_data16[2]; /* type-specific field */
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t icmp6_un_data8[4]; /* type-specific field */
|
2013-12-31 14:52:15 +08:00
|
|
|
} icmp6_dataun;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define icmp6_data32 icmp6_dataun.icmp6_un_data32
|
|
|
|
#define icmp6_data16 icmp6_dataun.icmp6_un_data16
|
|
|
|
#define icmp6_data8 icmp6_dataun.icmp6_un_data8
|
|
|
|
#define icmp6_pptr icmp6_data32[0] /* parameter prob */
|
|
|
|
#define icmp6_mtu icmp6_data32[0] /* packet too big */
|
|
|
|
#define icmp6_id icmp6_data16[0] /* echo request/reply */
|
|
|
|
#define icmp6_seq icmp6_data16[1] /* echo request/reply */
|
|
|
|
#define icmp6_maxdelay icmp6_data16[0] /* mcast group membership */
|
|
|
|
|
|
|
|
#define ICMP6_DST_UNREACH 1 /* dest unreachable, codes: */
|
|
|
|
#define ICMP6_PACKET_TOO_BIG 2 /* packet too big */
|
|
|
|
#define ICMP6_TIME_EXCEEDED 3 /* time exceeded, code: */
|
|
|
|
#define ICMP6_PARAM_PROB 4 /* ip6 header bad */
|
|
|
|
|
|
|
|
#define ICMP6_ECHO_REQUEST 128 /* echo service */
|
|
|
|
#define ICMP6_ECHO_REPLY 129 /* echo reply */
|
|
|
|
#define ICMP6_MEMBERSHIP_QUERY 130 /* group membership query */
|
|
|
|
#define MLD6_LISTENER_QUERY 130 /* multicast listener query */
|
|
|
|
#define ICMP6_MEMBERSHIP_REPORT 131 /* group membership report */
|
|
|
|
#define MLD6_LISTENER_REPORT 131 /* multicast listener report */
|
|
|
|
#define ICMP6_MEMBERSHIP_REDUCTION 132 /* group membership termination */
|
|
|
|
#define MLD6_LISTENER_DONE 132 /* multicast listener done */
|
|
|
|
|
|
|
|
#define ND_ROUTER_SOLICIT 133 /* router solicitation */
|
|
|
|
#define ND_ROUTER_ADVERT 134 /* router advertisement */
|
|
|
|
#define ND_NEIGHBOR_SOLICIT 135 /* neighbor solicitation */
|
|
|
|
#define ND_NEIGHBOR_ADVERT 136 /* neighbor advertisement */
|
|
|
|
#define ND_REDIRECT 137 /* redirect */
|
|
|
|
|
|
|
|
#define ICMP6_ROUTER_RENUMBERING 138 /* router renumbering */
|
|
|
|
|
|
|
|
#define ICMP6_WRUREQUEST 139 /* who are you request */
|
|
|
|
#define ICMP6_WRUREPLY 140 /* who are you reply */
|
|
|
|
#define ICMP6_FQDN_QUERY 139 /* FQDN query */
|
|
|
|
#define ICMP6_FQDN_REPLY 140 /* FQDN reply */
|
|
|
|
#define ICMP6_NI_QUERY 139 /* node information request */
|
|
|
|
#define ICMP6_NI_REPLY 140 /* node information reply */
|
|
|
|
#define IND_SOLICIT 141 /* inverse neighbor solicitation */
|
|
|
|
#define IND_ADVERT 142 /* inverse neighbor advertisement */
|
|
|
|
|
|
|
|
#define ICMP6_V2_MEMBERSHIP_REPORT 143 /* v2 membership report */
|
|
|
|
#define MLDV2_LISTENER_REPORT 143 /* v2 multicast listener report */
|
|
|
|
#define ICMP6_HADISCOV_REQUEST 144
|
|
|
|
#define ICMP6_HADISCOV_REPLY 145
|
|
|
|
#define ICMP6_MOBILEPREFIX_SOLICIT 146
|
|
|
|
#define ICMP6_MOBILEPREFIX_ADVERT 147
|
|
|
|
|
|
|
|
#define MLD6_MTRACE_RESP 200 /* mtrace response(to sender) */
|
|
|
|
#define MLD6_MTRACE 201 /* mtrace messages */
|
|
|
|
|
|
|
|
#define ICMP6_MAXTYPE 201
|
|
|
|
|
|
|
|
#define ICMP6_DST_UNREACH_NOROUTE 0 /* no route to destination */
|
|
|
|
#define ICMP6_DST_UNREACH_ADMIN 1 /* administratively prohibited */
|
|
|
|
#define ICMP6_DST_UNREACH_NOTNEIGHBOR 2 /* not a neighbor(obsolete) */
|
|
|
|
#define ICMP6_DST_UNREACH_BEYONDSCOPE 2 /* beyond scope of source address */
|
|
|
|
#define ICMP6_DST_UNREACH_ADDR 3 /* address unreachable */
|
|
|
|
#define ICMP6_DST_UNREACH_NOPORT 4 /* port unreachable */
|
|
|
|
|
|
|
|
#define ICMP6_TIME_EXCEED_TRANSIT 0 /* ttl==0 in transit */
|
|
|
|
#define ICMP6_TIME_EXCEED_REASSEMBLY 1 /* ttl==0 in reass */
|
|
|
|
|
|
|
|
#define ICMP6_PARAMPROB_HEADER 0 /* erroneous header field */
|
|
|
|
#define ICMP6_PARAMPROB_NEXTHEADER 1 /* unrecognized next header */
|
|
|
|
#define ICMP6_PARAMPROB_OPTION 2 /* unrecognized option */
|
|
|
|
|
|
|
|
#define ICMP6_INFOMSG_MASK 0x80 /* all informational messages */
|
|
|
|
|
|
|
|
#define ICMP6_NI_SUBJ_IPV6 0 /* Query Subject is an IPv6 address */
|
|
|
|
#define ICMP6_NI_SUBJ_FQDN 1 /* Query Subject is a Domain name */
|
|
|
|
#define ICMP6_NI_SUBJ_IPV4 2 /* Query Subject is an IPv4 address */
|
|
|
|
|
|
|
|
#define ICMP6_NI_SUCCESS 0 /* node information successful reply */
|
|
|
|
#define ICMP6_NI_REFUSED 1 /* node information request is refused */
|
|
|
|
#define ICMP6_NI_UNKNOWN 2 /* unknown Qtype */
|
|
|
|
|
|
|
|
#define ICMP6_ROUTER_RENUMBERING_COMMAND 0 /* rr command */
|
|
|
|
#define ICMP6_ROUTER_RENUMBERING_RESULT 1 /* rr result */
|
|
|
|
#define ICMP6_ROUTER_RENUMBERING_SEQNUM_RESET 255 /* rr seq num reset */
|
|
|
|
|
|
|
|
/* Used in kernel only */
|
|
|
|
#define ND_REDIRECT_ONLINK 0 /* redirect to an on-link node */
|
|
|
|
#define ND_REDIRECT_ROUTER 1 /* redirect to a better router */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Multicast Listener Discovery
|
|
|
|
*/
|
|
|
|
struct mld6_hdr {
|
|
|
|
struct icmp6_hdr mld6_hdr;
|
|
|
|
struct in6_addr mld6_addr; /* multicast address */
|
|
|
|
};
|
|
|
|
|
|
|
|
#define mld6_type mld6_hdr.icmp6_type
|
|
|
|
#define mld6_code mld6_hdr.icmp6_code
|
|
|
|
#define mld6_cksum mld6_hdr.icmp6_cksum
|
|
|
|
#define mld6_maxdelay mld6_hdr.icmp6_data16[0]
|
|
|
|
#define mld6_reserved mld6_hdr.icmp6_data16[1]
|
|
|
|
|
|
|
|
#define MLD_MINLEN 24
|
|
|
|
#define MLDV2_MINLEN 28
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Neighbor Discovery
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct nd_router_solicit { /* router solicitation */
|
|
|
|
struct icmp6_hdr nd_rs_hdr;
|
|
|
|
/* could be followed by options */
|
|
|
|
};
|
|
|
|
|
|
|
|
#define nd_rs_type nd_rs_hdr.icmp6_type
|
|
|
|
#define nd_rs_code nd_rs_hdr.icmp6_code
|
|
|
|
#define nd_rs_cksum nd_rs_hdr.icmp6_cksum
|
|
|
|
#define nd_rs_reserved nd_rs_hdr.icmp6_data32[0]
|
|
|
|
|
|
|
|
struct nd_router_advert { /* router advertisement */
|
|
|
|
struct icmp6_hdr nd_ra_hdr;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint32_t nd_ra_reachable; /* reachable time */
|
|
|
|
uint32_t nd_ra_retransmit; /* retransmit timer */
|
2013-12-31 14:52:15 +08:00
|
|
|
/* could be followed by options */
|
|
|
|
};
|
|
|
|
|
|
|
|
#define nd_ra_type nd_ra_hdr.icmp6_type
|
|
|
|
#define nd_ra_code nd_ra_hdr.icmp6_code
|
|
|
|
#define nd_ra_cksum nd_ra_hdr.icmp6_cksum
|
|
|
|
#define nd_ra_curhoplimit nd_ra_hdr.icmp6_data8[0]
|
|
|
|
#define nd_ra_flags_reserved nd_ra_hdr.icmp6_data8[1]
|
|
|
|
#define ND_RA_FLAG_MANAGED 0x80
|
|
|
|
#define ND_RA_FLAG_OTHER 0x40
|
|
|
|
#define ND_RA_FLAG_HOME_AGENT 0x20
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Router preference values based on draft-draves-ipngwg-router-selection-01.
|
|
|
|
* These are non-standard definitions.
|
|
|
|
*/
|
|
|
|
#define ND_RA_FLAG_RTPREF_MASK 0x18 /* 00011000 */
|
|
|
|
|
|
|
|
#define ND_RA_FLAG_RTPREF_HIGH 0x08 /* 00001000 */
|
|
|
|
#define ND_RA_FLAG_RTPREF_MEDIUM 0x00 /* 00000000 */
|
|
|
|
#define ND_RA_FLAG_RTPREF_LOW 0x18 /* 00011000 */
|
|
|
|
#define ND_RA_FLAG_RTPREF_RSV 0x10 /* 00010000 */
|
|
|
|
|
|
|
|
#define nd_ra_router_lifetime nd_ra_hdr.icmp6_data16[1]
|
|
|
|
|
|
|
|
struct nd_neighbor_solicit { /* neighbor solicitation */
|
|
|
|
struct icmp6_hdr nd_ns_hdr;
|
|
|
|
struct in6_addr nd_ns_target; /*target address */
|
|
|
|
/* could be followed by options */
|
|
|
|
};
|
|
|
|
|
|
|
|
#define nd_ns_type nd_ns_hdr.icmp6_type
|
|
|
|
#define nd_ns_code nd_ns_hdr.icmp6_code
|
|
|
|
#define nd_ns_cksum nd_ns_hdr.icmp6_cksum
|
|
|
|
#define nd_ns_reserved nd_ns_hdr.icmp6_data32[0]
|
|
|
|
|
|
|
|
struct nd_neighbor_advert { /* neighbor advertisement */
|
|
|
|
struct icmp6_hdr nd_na_hdr;
|
|
|
|
struct in6_addr nd_na_target; /* target address */
|
|
|
|
/* could be followed by options */
|
|
|
|
};
|
|
|
|
|
|
|
|
#define nd_na_type nd_na_hdr.icmp6_type
|
|
|
|
#define nd_na_code nd_na_hdr.icmp6_code
|
|
|
|
#define nd_na_cksum nd_na_hdr.icmp6_cksum
|
|
|
|
#define nd_na_flags_reserved nd_na_hdr.icmp6_data32[0]
|
|
|
|
|
|
|
|
#define ND_NA_FLAG_ROUTER 0x80000000
|
|
|
|
#define ND_NA_FLAG_SOLICITED 0x40000000
|
|
|
|
#define ND_NA_FLAG_OVERRIDE 0x20000000
|
|
|
|
|
|
|
|
struct nd_redirect { /* redirect */
|
|
|
|
struct icmp6_hdr nd_rd_hdr;
|
|
|
|
struct in6_addr nd_rd_target; /* target address */
|
|
|
|
struct in6_addr nd_rd_dst; /* destination address */
|
|
|
|
/* could be followed by options */
|
|
|
|
};
|
|
|
|
|
|
|
|
#define nd_rd_type nd_rd_hdr.icmp6_type
|
|
|
|
#define nd_rd_code nd_rd_hdr.icmp6_code
|
|
|
|
#define nd_rd_cksum nd_rd_hdr.icmp6_cksum
|
|
|
|
#define nd_rd_reserved nd_rd_hdr.icmp6_data32[0]
|
|
|
|
|
|
|
|
struct nd_opt_hdr { /* Neighbor discovery option header */
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t nd_opt_type;
|
|
|
|
uint8_t nd_opt_len;
|
2013-12-31 14:52:15 +08:00
|
|
|
/* followed by option specific data*/
|
|
|
|
};
|
|
|
|
|
|
|
|
#define ND_OPT_SOURCE_LINKADDR 1
|
|
|
|
#define ND_OPT_TARGET_LINKADDR 2
|
|
|
|
#define ND_OPT_PREFIX_INFORMATION 3
|
|
|
|
#define ND_OPT_REDIRECTED_HEADER 4
|
|
|
|
#define ND_OPT_MTU 5
|
|
|
|
#define ND_OPT_ADVINTERVAL 7
|
|
|
|
#define ND_OPT_HOMEAGENT_INFO 8
|
|
|
|
#define ND_OPT_ROUTE_INFO 24 /* RFC4191 */
|
|
|
|
#define ND_OPT_RDNSS 25
|
|
|
|
#define ND_OPT_DNSSL 31
|
|
|
|
|
|
|
|
struct nd_opt_prefix_info { /* prefix information */
|
fix alignment issues with GCC on Solaris 10 SPARC
When compiled with the Solaris Studio 12.3 compiler (as in the OpenCSW
buildbot system at the time), tcpdump passed all the tests. When
compiled with GCC 5.2.0 on the same host, the following tests failed
because tcpdump terminated with SIGILL (Bus Error - core dumped):
icmpv6, icmpv6_opt24-v, dhcpv6-aftr-name, dhcpv6-ia-na, dhcpv6-ia-pd,
dhcpv6-ia-ta, dhcpv6-ntp-server, dhcpv6-sip-server-d,
dhcpv6-domain-list, kday1. This change fixes the issue with the method
suggested in commit 1376682.
2016-10-09 18:42:48 +08:00
|
|
|
nd_uint8_t nd_opt_pi_type;
|
|
|
|
nd_uint8_t nd_opt_pi_len;
|
|
|
|
nd_uint8_t nd_opt_pi_prefix_len;
|
|
|
|
nd_uint8_t nd_opt_pi_flags_reserved;
|
|
|
|
nd_uint32_t nd_opt_pi_valid_time;
|
|
|
|
nd_uint32_t nd_opt_pi_preferred_time;
|
|
|
|
nd_uint32_t nd_opt_pi_reserved2;
|
2013-12-31 14:52:15 +08:00
|
|
|
struct in6_addr nd_opt_pi_prefix;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define ND_OPT_PI_FLAG_ONLINK 0x80
|
|
|
|
#define ND_OPT_PI_FLAG_AUTO 0x40
|
|
|
|
#define ND_OPT_PI_FLAG_ROUTER 0x20 /*2292bis*/
|
|
|
|
|
|
|
|
struct nd_opt_rd_hdr { /* redirected header */
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t nd_opt_rh_type;
|
|
|
|
uint8_t nd_opt_rh_len;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint16_t nd_opt_rh_reserved1;
|
|
|
|
uint32_t nd_opt_rh_reserved2;
|
2013-12-31 14:52:15 +08:00
|
|
|
/* followed by IP header and data */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct nd_opt_mtu { /* MTU option */
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t nd_opt_mtu_type;
|
|
|
|
uint8_t nd_opt_mtu_len;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint16_t nd_opt_mtu_reserved;
|
|
|
|
uint32_t nd_opt_mtu_mtu;
|
2013-12-31 14:52:15 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct nd_opt_rdnss { /* RDNSS RFC 6106 5.1 */
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t nd_opt_rdnss_type;
|
|
|
|
uint8_t nd_opt_rdnss_len;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint16_t nd_opt_rdnss_reserved;
|
|
|
|
uint32_t nd_opt_rdnss_lifetime;
|
2013-12-31 14:52:15 +08:00
|
|
|
struct in6_addr nd_opt_rdnss_addr[1]; /* variable-length */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct nd_opt_dnssl { /* DNSSL RFC 6106 5.2 */
|
2014-04-23 15:20:40 +08:00
|
|
|
uint8_t nd_opt_dnssl_type;
|
|
|
|
uint8_t nd_opt_dnssl_len;
|
|
|
|
uint16_t nd_opt_dnssl_reserved;
|
|
|
|
uint32_t nd_opt_dnssl_lifetime;
|
2013-12-31 14:52:15 +08:00
|
|
|
/* followed by list of DNS search domains, variable-length */
|
|
|
|
};
|
|
|
|
|
|
|
|
struct nd_opt_advinterval { /* Advertisement interval option */
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t nd_opt_adv_type;
|
|
|
|
uint8_t nd_opt_adv_len;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint16_t nd_opt_adv_reserved;
|
|
|
|
uint32_t nd_opt_adv_interval;
|
2013-12-31 14:52:15 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct nd_opt_homeagent_info { /* Home Agent info */
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t nd_opt_hai_type;
|
|
|
|
uint8_t nd_opt_hai_len;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint16_t nd_opt_hai_reserved;
|
2013-12-31 14:52:15 +08:00
|
|
|
int16_t nd_opt_hai_preference;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint16_t nd_opt_hai_lifetime;
|
2013-12-31 14:52:15 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
struct nd_opt_route_info { /* route info */
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t nd_opt_rti_type;
|
|
|
|
uint8_t nd_opt_rti_len;
|
|
|
|
uint8_t nd_opt_rti_prefixlen;
|
|
|
|
uint8_t nd_opt_rti_flags;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint32_t nd_opt_rti_lifetime;
|
2013-12-31 14:52:15 +08:00
|
|
|
/* prefix follows */
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* icmp6 namelookup
|
|
|
|
*/
|
|
|
|
|
|
|
|
struct icmp6_namelookup {
|
|
|
|
struct icmp6_hdr icmp6_nl_hdr;
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t icmp6_nl_nonce[8];
|
2013-12-31 14:52:15 +08:00
|
|
|
int32_t icmp6_nl_ttl;
|
|
|
|
#if 0
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t icmp6_nl_len;
|
|
|
|
uint8_t icmp6_nl_name[3];
|
2013-12-31 14:52:15 +08:00
|
|
|
#endif
|
|
|
|
/* could be followed by options */
|
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* icmp6 node information
|
|
|
|
*/
|
|
|
|
struct icmp6_nodeinfo {
|
|
|
|
struct icmp6_hdr icmp6_ni_hdr;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint8_t icmp6_ni_nonce[8];
|
2013-12-31 14:52:15 +08:00
|
|
|
/* could be followed by reply data */
|
|
|
|
};
|
|
|
|
|
|
|
|
#define ni_type icmp6_ni_hdr.icmp6_type
|
|
|
|
#define ni_code icmp6_ni_hdr.icmp6_code
|
|
|
|
#define ni_cksum icmp6_ni_hdr.icmp6_cksum
|
|
|
|
#define ni_qtype icmp6_ni_hdr.icmp6_data16[0]
|
|
|
|
#define ni_flags icmp6_ni_hdr.icmp6_data16[1]
|
|
|
|
|
|
|
|
#define NI_QTYPE_NOOP 0 /* NOOP */
|
|
|
|
#define NI_QTYPE_SUPTYPES 1 /* Supported Qtypes */
|
|
|
|
#define NI_QTYPE_FQDN 2 /* FQDN (draft 04) */
|
|
|
|
#define NI_QTYPE_DNSNAME 2 /* DNS Name */
|
|
|
|
#define NI_QTYPE_NODEADDR 3 /* Node Addresses */
|
|
|
|
#define NI_QTYPE_IPV4ADDR 4 /* IPv4 Addresses */
|
|
|
|
|
|
|
|
/* network endian */
|
2014-04-23 15:20:40 +08:00
|
|
|
#define NI_SUPTYPE_FLAG_COMPRESS ((uint16_t)htons(0x1))
|
|
|
|
#define NI_FQDN_FLAG_VALIDTTL ((uint16_t)htons(0x1))
|
2013-12-31 14:52:15 +08:00
|
|
|
|
|
|
|
/* network endian */
|
2014-04-23 15:20:40 +08:00
|
|
|
#define NI_NODEADDR_FLAG_TRUNCATE ((uint16_t)htons(0x1))
|
|
|
|
#define NI_NODEADDR_FLAG_ALL ((uint16_t)htons(0x2))
|
|
|
|
#define NI_NODEADDR_FLAG_COMPAT ((uint16_t)htons(0x4))
|
|
|
|
#define NI_NODEADDR_FLAG_LINKLOCAL ((uint16_t)htons(0x8))
|
|
|
|
#define NI_NODEADDR_FLAG_SITELOCAL ((uint16_t)htons(0x10))
|
|
|
|
#define NI_NODEADDR_FLAG_GLOBAL ((uint16_t)htons(0x20))
|
|
|
|
#define NI_NODEADDR_FLAG_ANYCAST ((uint16_t)htons(0x40)) /* just experimental. not in spec */
|
2013-12-31 14:52:15 +08:00
|
|
|
|
|
|
|
struct ni_reply_fqdn {
|
2014-04-23 15:20:40 +08:00
|
|
|
uint32_t ni_fqdn_ttl; /* TTL */
|
|
|
|
uint8_t ni_fqdn_namelen; /* length in octets of the FQDN */
|
|
|
|
uint8_t ni_fqdn_name[3]; /* XXX: alignment */
|
2013-12-31 14:52:15 +08:00
|
|
|
};
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Router Renumbering. as router-renum-08.txt
|
|
|
|
*/
|
|
|
|
struct icmp6_router_renum { /* router renumbering header */
|
|
|
|
struct icmp6_hdr rr_hdr;
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t rr_segnum;
|
|
|
|
uint8_t rr_flags;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint16_t rr_maxdelay;
|
|
|
|
uint32_t rr_reserved;
|
2013-12-31 14:52:15 +08:00
|
|
|
};
|
|
|
|
#define ICMP6_RR_FLAGS_TEST 0x80
|
|
|
|
#define ICMP6_RR_FLAGS_REQRESULT 0x40
|
|
|
|
#define ICMP6_RR_FLAGS_FORCEAPPLY 0x20
|
|
|
|
#define ICMP6_RR_FLAGS_SPECSITE 0x10
|
|
|
|
#define ICMP6_RR_FLAGS_PREVDONE 0x08
|
|
|
|
|
|
|
|
#define rr_type rr_hdr.icmp6_type
|
|
|
|
#define rr_code rr_hdr.icmp6_code
|
|
|
|
#define rr_cksum rr_hdr.icmp6_cksum
|
|
|
|
#define rr_seqnum rr_hdr.icmp6_data32[0]
|
|
|
|
|
|
|
|
struct rr_pco_match { /* match prefix part */
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t rpm_code;
|
|
|
|
uint8_t rpm_len;
|
|
|
|
uint8_t rpm_ordinal;
|
|
|
|
uint8_t rpm_matchlen;
|
|
|
|
uint8_t rpm_minlen;
|
|
|
|
uint8_t rpm_maxlen;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint16_t rpm_reserved;
|
2013-12-31 14:52:15 +08:00
|
|
|
struct in6_addr rpm_prefix;
|
|
|
|
};
|
|
|
|
|
|
|
|
#define RPM_PCO_ADD 1
|
|
|
|
#define RPM_PCO_CHANGE 2
|
|
|
|
#define RPM_PCO_SETGLOBAL 3
|
|
|
|
#define RPM_PCO_MAX 4
|
|
|
|
|
|
|
|
struct rr_pco_use { /* use prefix part */
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t rpu_uselen;
|
|
|
|
uint8_t rpu_keeplen;
|
|
|
|
uint8_t rpu_ramask;
|
|
|
|
uint8_t rpu_raflags;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint32_t rpu_vltime;
|
|
|
|
uint32_t rpu_pltime;
|
|
|
|
uint32_t rpu_flags;
|
2013-12-31 14:52:15 +08:00
|
|
|
struct in6_addr rpu_prefix;
|
|
|
|
};
|
|
|
|
#define ICMP6_RR_PCOUSE_RAFLAGS_ONLINK 0x80
|
|
|
|
#define ICMP6_RR_PCOUSE_RAFLAGS_AUTO 0x40
|
|
|
|
|
|
|
|
/* network endian */
|
2014-04-23 15:20:40 +08:00
|
|
|
#define ICMP6_RR_PCOUSE_FLAGS_DECRVLTIME ((uint32_t)htonl(0x80000000))
|
|
|
|
#define ICMP6_RR_PCOUSE_FLAGS_DECRPLTIME ((uint32_t)htonl(0x40000000))
|
2013-12-31 14:52:15 +08:00
|
|
|
|
|
|
|
struct rr_result { /* router renumbering result message */
|
2014-04-23 15:20:40 +08:00
|
|
|
uint16_t rrr_flags;
|
2014-04-24 02:53:22 +08:00
|
|
|
uint8_t rrr_ordinal;
|
|
|
|
uint8_t rrr_matchedlen;
|
2014-04-23 15:20:40 +08:00
|
|
|
uint32_t rrr_ifid;
|
2013-12-31 14:52:15 +08:00
|
|
|
struct in6_addr rrr_prefix;
|
|
|
|
};
|
|
|
|
/* network endian */
|
2014-04-23 15:20:40 +08:00
|
|
|
#define ICMP6_RR_RESULT_FLAGS_OOB ((uint16_t)htons(0x0002))
|
|
|
|
#define ICMP6_RR_RESULT_FLAGS_FORBIDDEN ((uint16_t)htons(0x0001))
|
2013-12-31 14:52:15 +08:00
|
|
|
|
2001-06-01 11:49:02 +08:00
|
|
|
static const char *get_rtpref(u_int);
|
2014-04-23 15:20:40 +08:00
|
|
|
static const char *get_lifetime(uint32_t);
|
2014-01-02 09:43:45 +08:00
|
|
|
static void print_lladdr(netdissect_options *ndo, const u_char *, size_t);
|
|
|
|
static void icmp6_opt_print(netdissect_options *ndo, const u_char *, int);
|
|
|
|
static void mld6_print(netdissect_options *ndo, const u_char *);
|
|
|
|
static void mldv2_report_print(netdissect_options *ndo, const u_char *, u_int);
|
|
|
|
static void mldv2_query_print(netdissect_options *ndo, const u_char *, u_int);
|
2014-01-09 08:59:07 +08:00
|
|
|
static const struct udphdr *get_upperlayer(netdissect_options *ndo, const u_char *, u_int *);
|
2014-01-02 09:43:45 +08:00
|
|
|
static void dnsname_print(netdissect_options *ndo, const u_char *, const u_char *);
|
|
|
|
static void icmp6_nodeinfo_print(netdissect_options *ndo, u_int, const u_char *, const u_char *);
|
|
|
|
static void icmp6_rrenum_print(netdissect_options *ndo, const u_char *, const u_char *);
|
2000-05-10 16:20:52 +08:00
|
|
|
|
|
|
|
#ifndef abs
|
|
|
|
#define abs(a) ((0 < (a)) ? (a) : -(a))
|
|
|
|
#endif
|
|
|
|
|
2014-01-04 23:52:11 +08:00
|
|
|
#include "rpl.h"
|
2009-11-15 11:17:12 +08:00
|
|
|
|
2013-09-25 00:46:24 +08:00
|
|
|
static const struct tok icmp6_type_values[] = {
|
2005-01-14 18:41:50 +08:00
|
|
|
{ ICMP6_DST_UNREACH, "destination unreachable"},
|
|
|
|
{ ICMP6_PACKET_TOO_BIG, "packet too big"},
|
|
|
|
{ ICMP6_TIME_EXCEEDED, "time exceeded in-transit"},
|
|
|
|
{ ICMP6_PARAM_PROB, "parameter problem"},
|
|
|
|
{ ICMP6_ECHO_REQUEST, "echo request"},
|
|
|
|
{ ICMP6_ECHO_REPLY, "echo reply"},
|
2005-04-26 01:29:51 +08:00
|
|
|
{ MLD6_LISTENER_QUERY, "multicast listener query"},
|
|
|
|
{ MLD6_LISTENER_REPORT, "multicast listener report"},
|
|
|
|
{ MLD6_LISTENER_DONE, "multicast listener done"},
|
|
|
|
{ ND_ROUTER_SOLICIT, "router solicitation"},
|
2005-01-14 18:41:50 +08:00
|
|
|
{ ND_ROUTER_ADVERT, "router advertisement"},
|
|
|
|
{ ND_NEIGHBOR_SOLICIT, "neighbor solicitation"},
|
2005-09-05 17:29:00 +08:00
|
|
|
{ ND_NEIGHBOR_ADVERT, "neighbor advertisement"},
|
2005-01-14 18:41:50 +08:00
|
|
|
{ ND_REDIRECT, "redirect"},
|
|
|
|
{ ICMP6_ROUTER_RENUMBERING, "router renumbering"},
|
|
|
|
{ IND_SOLICIT, "inverse neighbor solicitation"},
|
|
|
|
{ IND_ADVERT, "inverse neighbor advertisement"},
|
2005-04-26 01:29:51 +08:00
|
|
|
{ MLDV2_LISTENER_REPORT, "multicast listener report v2"},
|
2005-01-14 18:41:50 +08:00
|
|
|
{ ICMP6_HADISCOV_REQUEST, "ha discovery request"},
|
|
|
|
{ ICMP6_HADISCOV_REPLY, "ha discovery reply"},
|
|
|
|
{ ICMP6_MOBILEPREFIX_SOLICIT, "mobile router solicitation"},
|
|
|
|
{ ICMP6_MOBILEPREFIX_ADVERT, "mobile router advertisement"},
|
|
|
|
{ ICMP6_WRUREQUEST, "who-are-you request"},
|
|
|
|
{ ICMP6_WRUREPLY, "who-are-you reply"},
|
|
|
|
{ ICMP6_NI_QUERY, "node information query"},
|
|
|
|
{ ICMP6_NI_REPLY, "node information reply"},
|
|
|
|
{ MLD6_MTRACE, "mtrace message"},
|
|
|
|
{ MLD6_MTRACE_RESP, "mtrace response"},
|
2009-11-15 11:17:12 +08:00
|
|
|
{ ND_RPL_MESSAGE, "RPL"},
|
2005-01-14 18:41:50 +08:00
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
2013-09-25 00:46:24 +08:00
|
|
|
static const struct tok icmp6_dst_unreach_code_values[] = {
|
2005-01-14 18:41:50 +08:00
|
|
|
{ ICMP6_DST_UNREACH_NOROUTE, "unreachable route" },
|
|
|
|
{ ICMP6_DST_UNREACH_ADMIN, " unreachable prohibited"},
|
|
|
|
{ ICMP6_DST_UNREACH_BEYONDSCOPE, "beyond scope"},
|
|
|
|
{ ICMP6_DST_UNREACH_ADDR, "unreachable address"},
|
|
|
|
{ ICMP6_DST_UNREACH_NOPORT, "unreachable port"},
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
2013-09-25 00:46:24 +08:00
|
|
|
static const struct tok icmp6_opt_pi_flag_values[] = {
|
2005-01-14 18:41:50 +08:00
|
|
|
{ ND_OPT_PI_FLAG_ONLINK, "onlink" },
|
|
|
|
{ ND_OPT_PI_FLAG_AUTO, "auto" },
|
|
|
|
{ ND_OPT_PI_FLAG_ROUTER, "router" },
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
2013-09-25 00:46:24 +08:00
|
|
|
static const struct tok icmp6_opt_ra_flag_values[] = {
|
2005-01-14 18:41:50 +08:00
|
|
|
{ ND_RA_FLAG_MANAGED, "managed" },
|
|
|
|
{ ND_RA_FLAG_OTHER, "other stateful"},
|
|
|
|
{ ND_RA_FLAG_HOME_AGENT, "home agent"},
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
2013-09-25 00:46:24 +08:00
|
|
|
static const struct tok icmp6_nd_na_flag_values[] = {
|
2005-01-14 18:41:50 +08:00
|
|
|
{ ND_NA_FLAG_ROUTER, "router" },
|
|
|
|
{ ND_NA_FLAG_SOLICITED, "solicited" },
|
|
|
|
{ ND_NA_FLAG_OVERRIDE, "override" },
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
|
|
|
|
2013-09-25 00:46:24 +08:00
|
|
|
static const struct tok icmp6_opt_values[] = {
|
2005-01-14 18:41:50 +08:00
|
|
|
{ ND_OPT_SOURCE_LINKADDR, "source link-address"},
|
|
|
|
{ ND_OPT_TARGET_LINKADDR, "destination link-address"},
|
|
|
|
{ ND_OPT_PREFIX_INFORMATION, "prefix info"},
|
|
|
|
{ ND_OPT_REDIRECTED_HEADER, "redirected header"},
|
|
|
|
{ ND_OPT_MTU, "mtu"},
|
2010-02-08 06:52:07 +08:00
|
|
|
{ ND_OPT_RDNSS, "rdnss"},
|
2012-04-13 20:32:40 +08:00
|
|
|
{ ND_OPT_DNSSL, "dnssl"},
|
2005-09-05 17:29:00 +08:00
|
|
|
{ ND_OPT_ADVINTERVAL, "advertisement interval"},
|
2005-01-14 18:41:50 +08:00
|
|
|
{ ND_OPT_HOMEAGENT_INFO, "homeagent information"},
|
|
|
|
{ ND_OPT_ROUTE_INFO, "route info"},
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
2004-06-16 08:06:28 +08:00
|
|
|
/* mldv2 report types */
|
2013-09-25 00:46:24 +08:00
|
|
|
static const struct tok mldv2report2str[] = {
|
2004-06-16 08:06:28 +08:00
|
|
|
{ 1, "is_in" },
|
|
|
|
{ 2, "is_ex" },
|
|
|
|
{ 3, "to_in" },
|
|
|
|
{ 4, "to_ex" },
|
|
|
|
{ 5, "allow" },
|
|
|
|
{ 6, "block" },
|
|
|
|
{ 0, NULL }
|
|
|
|
};
|
|
|
|
|
2001-06-01 11:49:02 +08:00
|
|
|
static const char *
|
|
|
|
get_rtpref(u_int v)
|
|
|
|
{
|
|
|
|
static const char *rtpref_str[] = {
|
|
|
|
"medium", /* 00 */
|
|
|
|
"high", /* 01 */
|
|
|
|
"rsv", /* 10 */
|
|
|
|
"low" /* 11 */
|
|
|
|
};
|
|
|
|
|
|
|
|
return rtpref_str[((v & ND_RA_FLAG_RTPREF_MASK) >> 3) & 0xff];
|
|
|
|
}
|
|
|
|
|
|
|
|
static const char *
|
2014-04-23 15:20:40 +08:00
|
|
|
get_lifetime(uint32_t v)
|
2001-06-01 11:49:02 +08:00
|
|
|
{
|
|
|
|
static char buf[20];
|
|
|
|
|
2014-04-23 15:20:40 +08:00
|
|
|
if (v == (uint32_t)~0UL)
|
2001-06-01 11:49:02 +08:00
|
|
|
return "infinity";
|
|
|
|
else {
|
2012-06-21 21:14:55 +08:00
|
|
|
snprintf(buf, sizeof(buf), "%us", v);
|
2001-06-01 11:49:02 +08:00
|
|
|
return buf;
|
|
|
|
}
|
|
|
|
}
|
2001-05-09 10:43:40 +08:00
|
|
|
|
2001-06-01 12:08:57 +08:00
|
|
|
static void
|
2014-04-23 15:20:40 +08:00
|
|
|
print_lladdr(netdissect_options *ndo, const uint8_t *p, size_t l)
|
2001-06-01 12:08:57 +08:00
|
|
|
{
|
2014-04-23 15:20:40 +08:00
|
|
|
const uint8_t *ep, *q;
|
2001-06-01 12:08:57 +08:00
|
|
|
|
|
|
|
q = p;
|
|
|
|
ep = p + l;
|
|
|
|
while (l > 0 && q < ep) {
|
|
|
|
if (q > p)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,":"));
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,"%02x", EXTRACT_U_1(q)));
|
2017-11-22 22:27:53 +08:00
|
|
|
q++;
|
2001-06-01 12:08:57 +08:00
|
|
|
l--;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2016-02-13 12:26:39 +08:00
|
|
|
static int icmp6_cksum(netdissect_options *ndo, const struct ip6_hdr *ip6,
|
|
|
|
const struct icmp6_hdr *icp, u_int len)
|
2003-05-02 16:13:54 +08:00
|
|
|
{
|
2016-02-13 12:26:39 +08:00
|
|
|
return nextproto6_cksum(ndo, ip6, (const uint8_t *)(const void *)icp, len, len,
|
2014-02-17 01:29:37 +08:00
|
|
|
IPPROTO_ICMPV6);
|
2003-05-02 16:13:54 +08:00
|
|
|
}
|
|
|
|
|
2016-09-12 03:45:26 +08:00
|
|
|
static const struct tok rpl_mop_values[] = {
|
2014-01-04 00:13:16 +08:00
|
|
|
{ RPL_DIO_NONSTORING, "nonstoring"},
|
|
|
|
{ RPL_DIO_STORING, "storing"},
|
|
|
|
{ RPL_DIO_NONSTORING_MULTICAST, "nonstoring-multicast"},
|
|
|
|
{ RPL_DIO_STORING_MULTICAST, "storing-multicast"},
|
|
|
|
{ 0, NULL},
|
|
|
|
};
|
|
|
|
|
2016-09-12 03:45:26 +08:00
|
|
|
static const struct tok rpl_subopt_values[] = {
|
2014-01-04 00:13:16 +08:00
|
|
|
{ RPL_OPT_PAD0, "pad0"},
|
|
|
|
{ RPL_OPT_PADN, "padN"},
|
|
|
|
{ RPL_DIO_METRICS, "metrics"},
|
|
|
|
{ RPL_DIO_ROUTINGINFO, "routinginfo"},
|
|
|
|
{ RPL_DIO_CONFIG, "config"},
|
|
|
|
{ RPL_DAO_RPLTARGET, "rpltarget"},
|
|
|
|
{ RPL_DAO_TRANSITINFO, "transitinfo"},
|
|
|
|
{ RPL_DIO_DESTPREFIX, "destprefix"},
|
|
|
|
{ RPL_DAO_RPLTARGET_DESC, "rpltargetdesc"},
|
|
|
|
{ 0, NULL},
|
|
|
|
};
|
2009-11-15 11:17:12 +08:00
|
|
|
|
2014-01-04 23:52:11 +08:00
|
|
|
static void
|
|
|
|
rpl_dio_printopt(netdissect_options *ndo,
|
2014-01-09 08:59:07 +08:00
|
|
|
const struct rpl_dio_genoption *opt,
|
2014-01-04 23:52:11 +08:00
|
|
|
u_int length)
|
|
|
|
{
|
2014-01-09 08:59:07 +08:00
|
|
|
if(length < RPL_DIO_GENOPTION_LEN) return;
|
|
|
|
length -= RPL_DIO_GENOPTION_LEN;
|
2014-01-05 12:31:47 +08:00
|
|
|
|
2014-01-04 23:52:11 +08:00
|
|
|
ND_TCHECK(opt->rpl_dio_len);
|
|
|
|
|
|
|
|
while((opt->rpl_dio_type == RPL_OPT_PAD0 &&
|
2015-04-27 08:24:42 +08:00
|
|
|
(const u_char *)opt < ndo->ndo_snapend) ||
|
2014-01-04 23:52:11 +08:00
|
|
|
ND_TTEST2(*opt,(opt->rpl_dio_len+2))) {
|
|
|
|
|
|
|
|
unsigned int optlen = opt->rpl_dio_len+2;
|
|
|
|
if(opt->rpl_dio_type == RPL_OPT_PAD0) {
|
|
|
|
optlen = 1;
|
|
|
|
ND_PRINT((ndo, " opt:pad0"));
|
|
|
|
} else {
|
|
|
|
ND_PRINT((ndo, " opt:%s len:%u ",
|
2015-05-05 05:05:23 +08:00
|
|
|
tok2str(rpl_subopt_values, "subopt:%u", opt->rpl_dio_type),
|
2014-01-04 23:52:11 +08:00
|
|
|
optlen));
|
|
|
|
if(ndo->ndo_vflag > 2) {
|
|
|
|
unsigned int paylen = opt->rpl_dio_len;
|
|
|
|
if(paylen > length) paylen = length;
|
|
|
|
hex_print(ndo,
|
|
|
|
" ",
|
2015-04-27 08:24:42 +08:00
|
|
|
((const uint8_t *)opt) + RPL_DIO_GENOPTION_LEN, /* content of DIO option */
|
2014-01-04 23:52:11 +08:00
|
|
|
paylen);
|
|
|
|
}
|
|
|
|
}
|
2015-04-27 08:24:42 +08:00
|
|
|
opt = (const struct rpl_dio_genoption *)(((const char *)opt) + optlen);
|
2014-01-04 23:52:11 +08:00
|
|
|
length -= optlen;
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
trunc:
|
|
|
|
ND_PRINT((ndo," [|truncated]"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rpl_dio_print(netdissect_options *ndo,
|
|
|
|
const u_char *bp, u_int length)
|
|
|
|
{
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct nd_rpl_dio *dio = (const struct nd_rpl_dio *)bp;
|
2016-07-11 18:55:39 +08:00
|
|
|
const char *dagid_str;
|
2014-01-04 23:52:11 +08:00
|
|
|
|
|
|
|
ND_TCHECK(*dio);
|
2016-07-11 18:55:39 +08:00
|
|
|
dagid_str = ip6addr_string (ndo, dio->rpl_dagid);
|
2014-01-04 23:52:11 +08:00
|
|
|
|
2014-01-03 11:07:38 +08:00
|
|
|
ND_PRINT((ndo, " [dagid:%s,seq:%u,instance:%u,rank:%u,%smop:%s,prf:%u]",
|
2014-01-04 23:52:11 +08:00
|
|
|
dagid_str,
|
2014-01-03 11:07:38 +08:00
|
|
|
dio->rpl_dtsn,
|
|
|
|
dio->rpl_instanceid,
|
2017-11-23 06:54:09 +08:00
|
|
|
EXTRACT_BE_U_2(&dio->rpl_dagrank),
|
2014-01-03 11:07:38 +08:00
|
|
|
RPL_DIO_GROUNDED(dio->rpl_mopprf) ? "grounded,":"",
|
2014-01-04 00:13:16 +08:00
|
|
|
tok2str(rpl_mop_values, "mop%u", RPL_DIO_MOP(dio->rpl_mopprf)),
|
2014-01-03 11:07:38 +08:00
|
|
|
RPL_DIO_PRF(dio->rpl_mopprf)));
|
|
|
|
|
|
|
|
if(ndo->ndo_vflag > 1) {
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct rpl_dio_genoption *opt = (const struct rpl_dio_genoption *)&dio[1];
|
2014-01-04 23:52:11 +08:00
|
|
|
rpl_dio_printopt(ndo, opt, length);
|
2014-01-03 11:07:38 +08:00
|
|
|
}
|
|
|
|
return;
|
|
|
|
trunc:
|
|
|
|
ND_PRINT((ndo," [|truncated]"));
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2014-01-04 23:52:11 +08:00
|
|
|
static void
|
|
|
|
rpl_dao_print(netdissect_options *ndo,
|
|
|
|
const u_char *bp, u_int length)
|
|
|
|
{
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct nd_rpl_dao *dao = (const struct nd_rpl_dao *)bp;
|
2016-07-11 18:55:39 +08:00
|
|
|
const char *dagid_str = "<elided>";
|
2014-01-04 23:52:11 +08:00
|
|
|
|
|
|
|
ND_TCHECK(*dao);
|
2014-01-09 08:59:07 +08:00
|
|
|
if (length < ND_RPL_DAO_MIN_LEN)
|
|
|
|
goto tooshort;
|
2014-01-04 23:52:11 +08:00
|
|
|
|
2014-01-09 08:59:07 +08:00
|
|
|
bp += ND_RPL_DAO_MIN_LEN;
|
|
|
|
length -= ND_RPL_DAO_MIN_LEN;
|
2014-01-04 23:52:11 +08:00
|
|
|
if(RPL_DAO_D(dao->rpl_flags)) {
|
2014-01-09 08:59:07 +08:00
|
|
|
ND_TCHECK2(dao->rpl_dagid, DAGID_LEN);
|
|
|
|
if (length < DAGID_LEN)
|
|
|
|
goto tooshort;
|
2016-07-11 18:55:39 +08:00
|
|
|
dagid_str = ip6addr_string (ndo, dao->rpl_dagid);
|
2014-01-09 08:59:07 +08:00
|
|
|
bp += DAGID_LEN;
|
|
|
|
length -= DAGID_LEN;
|
2014-01-04 23:52:11 +08:00
|
|
|
}
|
|
|
|
|
2014-01-06 00:59:29 +08:00
|
|
|
ND_PRINT((ndo, " [dagid:%s,seq:%u,instance:%u%s%s,%02x]",
|
2014-01-04 23:52:11 +08:00
|
|
|
dagid_str,
|
|
|
|
dao->rpl_daoseq,
|
2014-01-06 00:59:29 +08:00
|
|
|
dao->rpl_instanceid,
|
|
|
|
RPL_DAO_K(dao->rpl_flags) ? ",acK":"",
|
|
|
|
RPL_DAO_D(dao->rpl_flags) ? ",Dagid":"",
|
|
|
|
dao->rpl_flags));
|
2014-01-04 23:52:11 +08:00
|
|
|
|
2014-01-04 23:56:41 +08:00
|
|
|
if(ndo->ndo_vflag > 1) {
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct rpl_dio_genoption *opt = (const struct rpl_dio_genoption *)bp;
|
2014-01-04 23:56:41 +08:00
|
|
|
rpl_dio_printopt(ndo, opt, length);
|
|
|
|
}
|
2014-01-04 23:52:11 +08:00
|
|
|
return;
|
|
|
|
|
|
|
|
trunc:
|
|
|
|
ND_PRINT((ndo," [|truncated]"));
|
|
|
|
return;
|
2014-01-09 08:59:07 +08:00
|
|
|
|
|
|
|
tooshort:
|
|
|
|
ND_PRINT((ndo," [|length too short]"));
|
|
|
|
return;
|
2014-01-04 23:52:11 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
rpl_daoack_print(netdissect_options *ndo,
|
2014-01-05 13:20:52 +08:00
|
|
|
const u_char *bp, u_int length)
|
2014-01-04 23:52:11 +08:00
|
|
|
{
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct nd_rpl_daoack *daoack = (const struct nd_rpl_daoack *)bp;
|
2016-07-11 18:55:39 +08:00
|
|
|
const char *dagid_str = "<elided>";
|
2014-01-04 23:52:11 +08:00
|
|
|
|
2014-01-09 08:59:07 +08:00
|
|
|
ND_TCHECK2(*daoack, ND_RPL_DAOACK_MIN_LEN);
|
|
|
|
if (length < ND_RPL_DAOACK_MIN_LEN)
|
|
|
|
goto tooshort;
|
2014-01-04 23:52:11 +08:00
|
|
|
|
2014-01-09 08:59:07 +08:00
|
|
|
bp += ND_RPL_DAOACK_MIN_LEN;
|
|
|
|
length -= ND_RPL_DAOACK_MIN_LEN;
|
2014-01-04 23:52:11 +08:00
|
|
|
if(RPL_DAOACK_D(daoack->rpl_flags)) {
|
2016-07-11 18:34:40 +08:00
|
|
|
ND_TCHECK2(daoack->rpl_dagid, DAGID_LEN);
|
2014-01-09 08:59:07 +08:00
|
|
|
if (length < DAGID_LEN)
|
|
|
|
goto tooshort;
|
2016-07-11 18:55:39 +08:00
|
|
|
dagid_str = ip6addr_string (ndo, daoack->rpl_dagid);
|
2014-01-09 08:59:07 +08:00
|
|
|
bp += DAGID_LEN;
|
|
|
|
length -= DAGID_LEN;
|
2014-01-04 23:52:11 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
ND_PRINT((ndo, " [dagid:%s,seq:%u,instance:%u,status:%u]",
|
|
|
|
dagid_str,
|
|
|
|
daoack->rpl_daoseq,
|
|
|
|
daoack->rpl_instanceid,
|
|
|
|
daoack->rpl_status));
|
2014-01-04 23:56:41 +08:00
|
|
|
|
2014-01-05 13:20:52 +08:00
|
|
|
/* no officially defined options for DAOACK, but print any we find */
|
2014-01-04 23:56:41 +08:00
|
|
|
if(ndo->ndo_vflag > 1) {
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct rpl_dio_genoption *opt = (const struct rpl_dio_genoption *)bp;
|
2014-01-04 23:56:41 +08:00
|
|
|
rpl_dio_printopt(ndo, opt, length);
|
|
|
|
}
|
2014-01-04 23:52:11 +08:00
|
|
|
return;
|
|
|
|
|
|
|
|
trunc:
|
2014-01-05 13:20:52 +08:00
|
|
|
ND_PRINT((ndo," [|dao-truncated]"));
|
2014-01-04 23:52:11 +08:00
|
|
|
return;
|
2014-01-09 08:59:07 +08:00
|
|
|
|
|
|
|
tooshort:
|
|
|
|
ND_PRINT((ndo," [|dao-length too short]"));
|
|
|
|
return;
|
2014-01-04 23:52:11 +08:00
|
|
|
}
|
|
|
|
|
2009-11-28 04:03:25 +08:00
|
|
|
static void
|
2009-11-15 11:17:12 +08:00
|
|
|
rpl_print(netdissect_options *ndo,
|
|
|
|
const struct icmp6_hdr *hdr,
|
2014-01-03 11:07:38 +08:00
|
|
|
const u_char *bp, u_int length)
|
2009-11-15 11:17:12 +08:00
|
|
|
{
|
2011-01-01 01:28:43 +08:00
|
|
|
int secured = hdr->icmp6_code & 0x80;
|
|
|
|
int basecode= hdr->icmp6_code & 0x7f;
|
2009-11-15 11:17:12 +08:00
|
|
|
|
2011-01-01 01:28:43 +08:00
|
|
|
if(secured) {
|
2014-01-04 23:52:11 +08:00
|
|
|
ND_PRINT((ndo, ", (SEC) [worktodo]"));
|
|
|
|
/* XXX
|
|
|
|
* the next header pointer needs to move forward to
|
|
|
|
* skip the secure part.
|
|
|
|
*/
|
|
|
|
return;
|
2011-01-01 01:28:43 +08:00
|
|
|
} else {
|
|
|
|
ND_PRINT((ndo, ", (CLR)"));
|
|
|
|
}
|
2014-01-02 10:27:54 +08:00
|
|
|
|
2011-01-01 01:28:43 +08:00
|
|
|
switch(basecode) {
|
2014-01-04 23:52:11 +08:00
|
|
|
case ND_RPL_DAG_IS:
|
2011-01-01 01:28:43 +08:00
|
|
|
ND_PRINT((ndo, "DODAG Information Solicitation"));
|
2009-11-15 11:17:12 +08:00
|
|
|
if(ndo->ndo_vflag) {
|
|
|
|
}
|
|
|
|
break;
|
2014-01-04 23:52:11 +08:00
|
|
|
case ND_RPL_DAG_IO:
|
2011-01-01 01:28:43 +08:00
|
|
|
ND_PRINT((ndo, "DODAG Information Object"));
|
2009-11-15 11:17:12 +08:00
|
|
|
if(ndo->ndo_vflag) {
|
2014-01-05 13:20:52 +08:00
|
|
|
rpl_dio_print(ndo, bp, length);
|
2009-11-15 11:17:12 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ND_RPL_DAO:
|
2011-01-01 01:28:43 +08:00
|
|
|
ND_PRINT((ndo, "Destination Advertisement Object"));
|
|
|
|
if(ndo->ndo_vflag) {
|
2014-01-05 13:20:52 +08:00
|
|
|
rpl_dao_print(ndo, bp, length);
|
2011-01-01 01:28:43 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ND_RPL_DAO_ACK:
|
|
|
|
ND_PRINT((ndo, "Destination Advertisement Object Ack"));
|
2009-11-15 11:17:12 +08:00
|
|
|
if(ndo->ndo_vflag) {
|
2014-01-05 13:20:52 +08:00
|
|
|
rpl_daoack_print(ndo, bp, length);
|
2009-11-15 11:17:12 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
2011-01-01 01:28:43 +08:00
|
|
|
ND_PRINT((ndo, "RPL message, unknown code %u",hdr->icmp6_code));
|
2009-11-15 11:17:12 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
return;
|
2014-01-04 00:04:15 +08:00
|
|
|
|
|
|
|
#if 0
|
2009-11-15 11:17:12 +08:00
|
|
|
trunc:
|
|
|
|
ND_PRINT((ndo," [|truncated]"));
|
|
|
|
return;
|
2014-01-04 00:04:15 +08:00
|
|
|
#endif
|
2014-01-02 10:27:54 +08:00
|
|
|
|
2009-11-15 11:17:12 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
1999-10-30 13:11:06 +08:00
|
|
|
void
|
2009-11-15 10:36:05 +08:00
|
|
|
icmp6_print(netdissect_options *ndo,
|
|
|
|
const u_char *bp, u_int length, const u_char *bp2, int fragmented)
|
1999-10-30 13:11:06 +08:00
|
|
|
{
|
2000-05-10 16:20:52 +08:00
|
|
|
const struct icmp6_hdr *dp;
|
2001-06-01 11:32:27 +08:00
|
|
|
const struct ip6_hdr *ip;
|
|
|
|
const struct ip6_hdr *oip;
|
|
|
|
const struct udphdr *ouh;
|
|
|
|
int dport;
|
|
|
|
const u_char *ep;
|
2003-11-19 09:27:54 +08:00
|
|
|
u_int prot;
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2015-04-27 08:24:42 +08:00
|
|
|
dp = (const struct icmp6_hdr *)bp;
|
|
|
|
ip = (const struct ip6_hdr *)bp2;
|
|
|
|
oip = (const struct ip6_hdr *)(dp + 1);
|
2000-10-03 10:19:04 +08:00
|
|
|
/* 'ep' points to the end of available data. */
|
2014-01-02 09:43:45 +08:00
|
|
|
ep = ndo->ndo_snapend;
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(dp->icmp6_cksum);
|
2003-05-02 16:13:54 +08:00
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag && !fragmented) {
|
2014-04-23 15:20:40 +08:00
|
|
|
uint16_t sum, udp_sum;
|
2003-05-02 16:13:54 +08:00
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ND_TTEST2(bp[0], length)) {
|
2017-11-23 06:54:09 +08:00
|
|
|
udp_sum = EXTRACT_BE_U_2(&dp->icmp6_cksum);
|
2016-02-13 12:26:39 +08:00
|
|
|
sum = icmp6_cksum(ndo, ip, dp, length);
|
2003-05-02 16:13:54 +08:00
|
|
|
if (sum != 0)
|
2014-03-26 17:08:22 +08:00
|
|
|
ND_PRINT((ndo,"[bad icmp6 cksum 0x%04x -> 0x%04x!] ",
|
2014-01-02 09:43:45 +08:00
|
|
|
udp_sum,
|
|
|
|
in_cksum_shouldbe(udp_sum, sum)));
|
2003-05-02 16:13:54 +08:00
|
|
|
else
|
2014-03-26 17:08:22 +08:00
|
|
|
ND_PRINT((ndo,"[icmp6 sum ok] "));
|
2003-05-02 16:13:54 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"ICMP6, %s", tok2str(icmp6_type_values,"unknown icmp6 type (%u)",dp->icmp6_type)));
|
2005-01-14 18:41:50 +08:00
|
|
|
|
|
|
|
/* display cosmetics: print the packet length for printer that use the vflag now */
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag && (dp->icmp6_type == ND_ROUTER_SOLICIT ||
|
2010-08-20 10:23:08 +08:00
|
|
|
dp->icmp6_type == ND_ROUTER_ADVERT ||
|
|
|
|
dp->icmp6_type == ND_NEIGHBOR_ADVERT ||
|
|
|
|
dp->icmp6_type == ND_NEIGHBOR_SOLICIT ||
|
|
|
|
dp->icmp6_type == ND_REDIRECT ||
|
|
|
|
dp->icmp6_type == ICMP6_HADISCOV_REPLY ||
|
|
|
|
dp->icmp6_type == ICMP6_MOBILEPREFIX_ADVERT ))
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", length %u", length));
|
2014-01-02 10:27:54 +08:00
|
|
|
|
2000-04-24 20:59:39 +08:00
|
|
|
switch (dp->icmp6_type) {
|
1999-10-30 13:11:06 +08:00
|
|
|
case ICMP6_DST_UNREACH:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(oip->ip6_dst);
|
|
|
|
ND_PRINT((ndo,", %s", tok2str(icmp6_dst_unreach_code_values,"unknown unreach code (%u)",dp->icmp6_code)));
|
1999-10-30 13:11:06 +08:00
|
|
|
switch (dp->icmp6_code) {
|
2005-01-14 18:41:50 +08:00
|
|
|
|
|
|
|
case ICMP6_DST_UNREACH_NOROUTE: /* fall through */
|
1999-10-30 13:11:06 +08:00
|
|
|
case ICMP6_DST_UNREACH_ADMIN:
|
2005-01-14 18:41:50 +08:00
|
|
|
case ICMP6_DST_UNREACH_ADDR:
|
2014-04-04 15:43:46 +08:00
|
|
|
ND_PRINT((ndo," %s",ip6addr_string(ndo, &oip->ip6_dst)));
|
2005-01-14 18:41:50 +08:00
|
|
|
break;
|
1999-10-30 13:11:06 +08:00
|
|
|
case ICMP6_DST_UNREACH_BEYONDSCOPE:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," %s, source address %s",
|
2014-04-04 15:43:46 +08:00
|
|
|
ip6addr_string(ndo, &oip->ip6_dst),
|
|
|
|
ip6addr_string(ndo, &oip->ip6_src)));
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_DST_UNREACH_NOPORT:
|
2015-04-27 08:24:42 +08:00
|
|
|
if ((ouh = get_upperlayer(ndo, (const u_char *)oip, &prot))
|
2000-10-03 10:17:50 +08:00
|
|
|
== NULL)
|
|
|
|
goto trunc;
|
|
|
|
|
2017-11-23 06:54:09 +08:00
|
|
|
dport = EXTRACT_BE_U_2(&ouh->uh_dport);
|
2000-10-03 10:17:50 +08:00
|
|
|
switch (prot) {
|
1999-10-30 13:11:06 +08:00
|
|
|
case IPPROTO_TCP:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", %s tcp port %s",
|
2014-04-04 15:43:46 +08:00
|
|
|
ip6addr_string(ndo, &oip->ip6_dst),
|
2015-09-06 04:28:04 +08:00
|
|
|
tcpport_string(ndo, dport)));
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
case IPPROTO_UDP:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", %s udp port %s",
|
2014-04-04 15:43:46 +08:00
|
|
|
ip6addr_string(ndo, &oip->ip6_dst),
|
2015-09-06 04:28:04 +08:00
|
|
|
udpport_string(ndo, dport)));
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
default:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", %s protocol %d port %d unreachable",
|
2014-04-04 15:43:46 +08:00
|
|
|
ip6addr_string(ndo, &oip->ip6_dst),
|
2014-01-02 09:43:45 +08:00
|
|
|
oip->ip6_nxt, dport));
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
default:
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag <= 1) {
|
|
|
|
print_unknown_data(ndo, bp,"\n\t",length);
|
|
|
|
return;
|
|
|
|
}
|
2005-01-14 18:41:50 +08:00
|
|
|
break;
|
1999-10-30 13:11:06 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ICMP6_PACKET_TOO_BIG:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(dp->icmp6_mtu);
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,", mtu %u", EXTRACT_BE_U_4(&dp->icmp6_mtu)));
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_TIME_EXCEEDED:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(oip->ip6_dst);
|
1999-10-30 13:11:06 +08:00
|
|
|
switch (dp->icmp6_code) {
|
|
|
|
case ICMP6_TIME_EXCEED_TRANSIT:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," for %s",
|
2014-04-04 15:43:46 +08:00
|
|
|
ip6addr_string(ndo, &oip->ip6_dst)));
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_TIME_EXCEED_REASSEMBLY:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," (reassembly)"));
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
default:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", unknown code (%u)", dp->icmp6_code));
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ICMP6_PARAM_PROB:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(oip->ip6_dst);
|
1999-10-30 13:11:06 +08:00
|
|
|
switch (dp->icmp6_code) {
|
|
|
|
case ICMP6_PARAMPROB_HEADER:
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,", erroneous - octet %u", EXTRACT_BE_U_4(&dp->icmp6_pptr)));
|
2014-01-02 09:43:45 +08:00
|
|
|
break;
|
1999-10-30 13:11:06 +08:00
|
|
|
case ICMP6_PARAMPROB_NEXTHEADER:
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,", next header - octet %u", EXTRACT_BE_U_4(&dp->icmp6_pptr)));
|
2014-01-02 09:43:45 +08:00
|
|
|
break;
|
1999-10-30 13:11:06 +08:00
|
|
|
case ICMP6_PARAMPROB_OPTION:
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,", option - octet %u", EXTRACT_BE_U_4(&dp->icmp6_pptr)));
|
2014-01-02 09:43:45 +08:00
|
|
|
break;
|
1999-10-30 13:11:06 +08:00
|
|
|
default:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", code-#%d",
|
|
|
|
dp->icmp6_code));
|
|
|
|
break;
|
1999-10-30 13:11:06 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ICMP6_ECHO_REQUEST:
|
|
|
|
case ICMP6_ECHO_REPLY:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(dp->icmp6_seq);
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,", seq %u", EXTRACT_BE_U_2(&dp->icmp6_seq)));
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_MEMBERSHIP_QUERY:
|
2004-06-16 08:06:28 +08:00
|
|
|
if (length == MLD_MINLEN) {
|
2014-01-02 09:43:45 +08:00
|
|
|
mld6_print(ndo, (const u_char *)dp);
|
2004-06-16 08:06:28 +08:00
|
|
|
} else if (length >= MLDV2_MINLEN) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," v2"));
|
|
|
|
mldv2_query_print(ndo, (const u_char *)dp, length);
|
2004-06-16 08:06:28 +08:00
|
|
|
} else {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," unknown-version (len %u) ", length));
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_MEMBERSHIP_REPORT:
|
2014-01-02 09:43:45 +08:00
|
|
|
mld6_print(ndo, (const u_char *)dp);
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_MEMBERSHIP_REDUCTION:
|
2014-01-02 09:43:45 +08:00
|
|
|
mld6_print(ndo, (const u_char *)dp);
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
|
|
|
case ND_ROUTER_SOLICIT:
|
|
|
|
#define RTSOLLEN 8
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
|
|
|
icmp6_opt_print(ndo, (const u_char *)dp + RTSOLLEN,
|
2003-11-19 09:27:54 +08:00
|
|
|
length - RTSOLLEN);
|
1999-10-30 13:11:06 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ND_ROUTER_ADVERT:
|
2005-01-14 18:41:50 +08:00
|
|
|
#define RTADVLEN 16
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct nd_router_advert *p;
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2015-04-27 08:24:42 +08:00
|
|
|
p = (const struct nd_router_advert *)dp;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(p->nd_ra_retransmit);
|
|
|
|
ND_PRINT((ndo,"\n\thop limit %u, Flags [%s]" \
|
|
|
|
", pref %s, router lifetime %us, reachable time %us, retrans time %us",
|
|
|
|
(u_int)p->nd_ra_curhoplimit,
|
|
|
|
bittok2str(icmp6_opt_ra_flag_values,"none",(p->nd_ra_flags_reserved)),
|
|
|
|
get_rtpref(p->nd_ra_flags_reserved),
|
2017-11-23 06:54:09 +08:00
|
|
|
EXTRACT_BE_U_2(&p->nd_ra_router_lifetime),
|
|
|
|
EXTRACT_BE_U_4(&p->nd_ra_reachable),
|
|
|
|
EXTRACT_BE_U_4(&p->nd_ra_retransmit)));
|
2014-01-02 09:43:45 +08:00
|
|
|
|
|
|
|
icmp6_opt_print(ndo, (const u_char *)dp + RTADVLEN,
|
2003-11-19 09:27:54 +08:00
|
|
|
length - RTADVLEN);
|
1999-10-30 13:11:06 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ND_NEIGHBOR_SOLICIT:
|
|
|
|
{
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct nd_neighbor_solicit *p;
|
|
|
|
p = (const struct nd_neighbor_solicit *)dp;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(p->nd_ns_target);
|
2014-04-04 15:43:46 +08:00
|
|
|
ND_PRINT((ndo,", who has %s", ip6addr_string(ndo, &p->nd_ns_target)));
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
1999-10-30 13:11:06 +08:00
|
|
|
#define NDSOLLEN 24
|
2014-01-02 09:43:45 +08:00
|
|
|
icmp6_opt_print(ndo, (const u_char *)dp + NDSOLLEN,
|
2003-11-19 09:27:54 +08:00
|
|
|
length - NDSOLLEN);
|
1999-10-30 13:11:06 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ND_NEIGHBOR_ADVERT:
|
|
|
|
{
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct nd_neighbor_advert *p;
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2015-04-27 08:24:42 +08:00
|
|
|
p = (const struct nd_neighbor_advert *)dp;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(p->nd_na_target);
|
|
|
|
ND_PRINT((ndo,", tgt is %s",
|
2014-04-04 15:43:46 +08:00
|
|
|
ip6addr_string(ndo, &p->nd_na_target)));
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
|
|
|
ND_PRINT((ndo,", Flags [%s]",
|
|
|
|
bittok2str(icmp6_nd_na_flag_values,
|
|
|
|
"none",
|
2017-11-23 06:54:09 +08:00
|
|
|
EXTRACT_BE_U_4(&p->nd_na_flags_reserved))));
|
1999-10-30 13:11:06 +08:00
|
|
|
#define NDADVLEN 24
|
2014-01-02 09:43:45 +08:00
|
|
|
icmp6_opt_print(ndo, (const u_char *)dp + NDADVLEN,
|
2003-11-19 09:27:54 +08:00
|
|
|
length - NDADVLEN);
|
2000-05-10 16:20:52 +08:00
|
|
|
#undef NDADVLEN
|
1999-10-30 13:11:06 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
case ND_REDIRECT:
|
2015-04-27 08:24:42 +08:00
|
|
|
#define RDR(i) ((const struct nd_redirect *)(i))
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(RDR(dp)->nd_rd_dst);
|
2016-07-11 17:26:01 +08:00
|
|
|
ND_PRINT((ndo,", %s", ip6addr_string(ndo, &RDR(dp)->nd_rd_dst)));
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(RDR(dp)->nd_rd_target);
|
|
|
|
ND_PRINT((ndo," to %s",
|
2016-07-11 17:26:01 +08:00
|
|
|
ip6addr_string(ndo, &RDR(dp)->nd_rd_target)));
|
1999-10-30 13:11:06 +08:00
|
|
|
#define REDIRECTLEN 40
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
|
|
|
icmp6_opt_print(ndo, (const u_char *)dp + REDIRECTLEN,
|
2003-11-19 09:27:54 +08:00
|
|
|
length - REDIRECTLEN);
|
1999-10-30 13:11:06 +08:00
|
|
|
}
|
|
|
|
break;
|
2000-05-10 16:20:52 +08:00
|
|
|
#undef REDIRECTLEN
|
|
|
|
#undef RDR
|
1999-10-30 13:11:06 +08:00
|
|
|
case ICMP6_ROUTER_RENUMBERING:
|
2014-01-02 09:43:45 +08:00
|
|
|
icmp6_rrenum_print(ndo, bp, ep);
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
2000-05-10 16:20:52 +08:00
|
|
|
case ICMP6_NI_QUERY:
|
|
|
|
case ICMP6_NI_REPLY:
|
2014-01-02 09:43:45 +08:00
|
|
|
icmp6_nodeinfo_print(ndo, length, bp, ep);
|
1999-10-30 13:11:06 +08:00
|
|
|
break;
|
2004-06-16 08:06:28 +08:00
|
|
|
case IND_SOLICIT:
|
|
|
|
case IND_ADVERT:
|
|
|
|
break;
|
|
|
|
case ICMP6_V2_MEMBERSHIP_REPORT:
|
2014-01-02 09:43:45 +08:00
|
|
|
mldv2_report_print(ndo, (const u_char *) dp, length);
|
2004-06-16 08:06:28 +08:00
|
|
|
break;
|
2005-01-14 18:41:50 +08:00
|
|
|
case ICMP6_MOBILEPREFIX_SOLICIT: /* fall through */
|
2002-03-28 18:02:34 +08:00
|
|
|
case ICMP6_HADISCOV_REQUEST:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(dp->icmp6_data16[0]);
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,", id 0x%04x", EXTRACT_BE_U_2(&dp->icmp6_data16[0])));
|
2005-01-14 18:41:50 +08:00
|
|
|
break;
|
2002-03-28 18:02:34 +08:00
|
|
|
case ICMP6_HADISCOV_REPLY:
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct in6_addr *in6;
|
|
|
|
const u_char *cp;
|
2002-06-27 16:21:39 +08:00
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(dp->icmp6_data16[0]);
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,", id 0x%04x", EXTRACT_BE_U_2(&dp->icmp6_data16[0])));
|
2015-04-27 08:24:42 +08:00
|
|
|
cp = (const u_char *)dp + length;
|
|
|
|
in6 = (const struct in6_addr *)(dp + 1);
|
|
|
|
for (; (const u_char *)in6 < cp; in6++) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(*in6);
|
2014-04-04 15:43:46 +08:00
|
|
|
ND_PRINT((ndo,", %s", ip6addr_string(ndo, in6)));
|
2002-06-27 16:21:39 +08:00
|
|
|
}
|
2002-09-05 08:52:30 +08:00
|
|
|
}
|
2002-06-27 16:21:39 +08:00
|
|
|
break;
|
2002-03-28 18:02:34 +08:00
|
|
|
case ICMP6_MOBILEPREFIX_ADVERT:
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
|
|
|
ND_TCHECK(dp->icmp6_data16[0]);
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,", id 0x%04x", EXTRACT_BE_U_2(&dp->icmp6_data16[0])));
|
2017-03-22 14:01:44 +08:00
|
|
|
ND_TCHECK(dp->icmp6_data16[1]);
|
2003-02-05 10:36:25 +08:00
|
|
|
if (dp->icmp6_data16[1] & 0xc0)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," "));
|
2003-02-05 10:36:25 +08:00
|
|
|
if (dp->icmp6_data16[1] & 0x80)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"M"));
|
2003-02-05 10:36:25 +08:00
|
|
|
if (dp->icmp6_data16[1] & 0x40)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"O"));
|
2003-02-05 10:36:25 +08:00
|
|
|
#define MPADVLEN 8
|
2014-01-02 09:43:45 +08:00
|
|
|
icmp6_opt_print(ndo, (const u_char *)dp + MPADVLEN,
|
2003-11-19 09:27:54 +08:00
|
|
|
length - MPADVLEN);
|
2002-06-27 16:21:39 +08:00
|
|
|
}
|
|
|
|
break;
|
2009-11-15 11:17:12 +08:00
|
|
|
case ND_RPL_MESSAGE:
|
2014-01-05 13:20:52 +08:00
|
|
|
/* plus 4, because struct icmp6_hdr contains 4 bytes of icmp payload */
|
|
|
|
rpl_print(ndo, dp, &dp->icmp6_data8[0], length-sizeof(struct icmp6_hdr)+4);
|
2009-11-15 11:17:12 +08:00
|
|
|
break;
|
1999-10-30 13:11:06 +08:00
|
|
|
default:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", length %u", length));
|
|
|
|
if (ndo->ndo_vflag <= 1)
|
|
|
|
print_unknown_data(ndo, bp,"\n\t", length);
|
2005-01-14 18:41:50 +08:00
|
|
|
return;
|
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
if (!ndo->ndo_vflag)
|
|
|
|
ND_PRINT((ndo,", length %u", length));
|
1999-10-30 13:11:06 +08:00
|
|
|
return;
|
|
|
|
trunc:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo, "[|icmp6]"));
|
1999-10-30 13:11:06 +08:00
|
|
|
}
|
|
|
|
|
2014-01-09 08:59:07 +08:00
|
|
|
static const struct udphdr *
|
|
|
|
get_upperlayer(netdissect_options *ndo, const u_char *bp, u_int *prot)
|
2000-10-03 10:17:50 +08:00
|
|
|
{
|
2001-06-01 11:32:27 +08:00
|
|
|
const u_char *ep;
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct ip6_hdr *ip6 = (const struct ip6_hdr *)bp;
|
2014-01-09 08:59:07 +08:00
|
|
|
const struct udphdr *uh;
|
|
|
|
const struct ip6_hbh *hbh;
|
|
|
|
const struct ip6_frag *fragh;
|
|
|
|
const struct ah *ah;
|
2002-12-12 06:29:21 +08:00
|
|
|
u_int nh;
|
|
|
|
int hlen;
|
2000-10-03 10:17:50 +08:00
|
|
|
|
2000-10-03 10:55:39 +08:00
|
|
|
/* 'ep' points to the end of available data. */
|
2014-01-02 09:43:45 +08:00
|
|
|
ep = ndo->ndo_snapend;
|
2000-10-03 10:17:50 +08:00
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
if (!ND_TTEST(ip6->ip6_nxt))
|
2000-10-03 10:17:50 +08:00
|
|
|
return NULL;
|
|
|
|
|
|
|
|
nh = ip6->ip6_nxt;
|
|
|
|
hlen = sizeof(struct ip6_hdr);
|
|
|
|
|
2005-04-21 06:30:53 +08:00
|
|
|
while (bp < ep) {
|
2000-10-03 10:17:50 +08:00
|
|
|
bp += hlen;
|
|
|
|
|
|
|
|
switch(nh) {
|
|
|
|
case IPPROTO_UDP:
|
|
|
|
case IPPROTO_TCP:
|
2015-04-27 08:24:42 +08:00
|
|
|
uh = (const struct udphdr *)bp;
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ND_TTEST(uh->uh_dport)) {
|
2000-10-03 10:17:50 +08:00
|
|
|
*prot = nh;
|
|
|
|
return(uh);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
return(NULL);
|
|
|
|
/* NOTREACHED */
|
|
|
|
|
|
|
|
case IPPROTO_HOPOPTS:
|
|
|
|
case IPPROTO_DSTOPTS:
|
|
|
|
case IPPROTO_ROUTING:
|
2015-04-27 08:24:42 +08:00
|
|
|
hbh = (const struct ip6_hbh *)bp;
|
2014-01-02 09:43:45 +08:00
|
|
|
if (!ND_TTEST(hbh->ip6h_len))
|
2000-10-03 10:17:50 +08:00
|
|
|
return(NULL);
|
|
|
|
nh = hbh->ip6h_nxt;
|
|
|
|
hlen = (hbh->ip6h_len + 1) << 3;
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPPROTO_FRAGMENT: /* this should be odd, but try anyway */
|
2015-04-27 08:24:42 +08:00
|
|
|
fragh = (const struct ip6_frag *)bp;
|
2014-01-02 09:43:45 +08:00
|
|
|
if (!ND_TTEST(fragh->ip6f_offlg))
|
2000-10-03 10:17:50 +08:00
|
|
|
return(NULL);
|
|
|
|
/* fragments with non-zero offset are meaningless */
|
2017-11-23 06:54:09 +08:00
|
|
|
if ((EXTRACT_BE_U_2(&fragh->ip6f_offlg) & IP6F_OFF_MASK) != 0)
|
2000-10-03 10:17:50 +08:00
|
|
|
return(NULL);
|
|
|
|
nh = fragh->ip6f_nxt;
|
|
|
|
hlen = sizeof(struct ip6_frag);
|
|
|
|
break;
|
|
|
|
|
|
|
|
case IPPROTO_AH:
|
2015-04-27 08:24:42 +08:00
|
|
|
ah = (const struct ah *)bp;
|
2014-01-02 09:43:45 +08:00
|
|
|
if (!ND_TTEST(ah->ah_len))
|
2000-10-03 10:17:50 +08:00
|
|
|
return(NULL);
|
|
|
|
nh = ah->ah_nxt;
|
|
|
|
hlen = (ah->ah_len + 2) << 2;
|
|
|
|
break;
|
|
|
|
|
|
|
|
default: /* unknown or undecodable header */
|
|
|
|
*prot = nh; /* meaningless, but set here anyway */
|
|
|
|
return(NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return(NULL); /* should be notreached, though */
|
|
|
|
}
|
|
|
|
|
2002-12-12 06:29:21 +08:00
|
|
|
static void
|
2014-01-02 09:43:45 +08:00
|
|
|
icmp6_opt_print(netdissect_options *ndo, const u_char *bp, int resid)
|
1999-10-30 13:11:06 +08:00
|
|
|
{
|
2001-06-01 11:32:27 +08:00
|
|
|
const struct nd_opt_hdr *op;
|
|
|
|
const struct nd_opt_prefix_info *opp;
|
|
|
|
const struct nd_opt_mtu *opm;
|
2010-02-08 06:52:07 +08:00
|
|
|
const struct nd_opt_rdnss *oprd;
|
2012-04-13 20:32:40 +08:00
|
|
|
const struct nd_opt_dnssl *opds;
|
2001-06-01 11:32:27 +08:00
|
|
|
const struct nd_opt_advinterval *opa;
|
2001-12-09 13:22:27 +08:00
|
|
|
const struct nd_opt_homeagent_info *oph;
|
2001-06-01 11:32:27 +08:00
|
|
|
const struct nd_opt_route_info *opri;
|
2012-04-13 20:32:40 +08:00
|
|
|
const u_char *cp, *ep, *domp;
|
2015-04-27 08:24:42 +08:00
|
|
|
struct in6_addr in6;
|
|
|
|
const struct in6_addr *in6p;
|
2001-06-01 12:08:57 +08:00
|
|
|
size_t l;
|
2010-02-08 06:52:07 +08:00
|
|
|
u_int i;
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2015-04-27 08:24:42 +08:00
|
|
|
#define ECHECK(var) if ((const u_char *)&(var) > ep - sizeof(var)) return
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2001-06-01 11:49:02 +08:00
|
|
|
cp = bp;
|
2000-10-03 10:19:04 +08:00
|
|
|
/* 'ep' points to the end of available data. */
|
2014-01-02 09:43:45 +08:00
|
|
|
ep = ndo->ndo_snapend;
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2001-06-01 11:49:02 +08:00
|
|
|
while (cp < ep) {
|
2015-04-27 08:24:42 +08:00
|
|
|
op = (const struct nd_opt_hdr *)cp;
|
2001-06-01 11:49:02 +08:00
|
|
|
|
|
|
|
ECHECK(op->nd_opt_len);
|
|
|
|
if (resid <= 0)
|
|
|
|
return;
|
|
|
|
if (op->nd_opt_len == 0)
|
1999-10-30 13:11:06 +08:00
|
|
|
goto trunc;
|
2001-06-01 11:49:02 +08:00
|
|
|
if (cp + (op->nd_opt_len << 3) > ep)
|
1999-10-30 13:11:06 +08:00
|
|
|
goto trunc;
|
2001-06-01 11:49:02 +08:00
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"\n\t %s option (%u), length %u (%u): ",
|
|
|
|
tok2str(icmp6_opt_values, "unknown", op->nd_opt_type),
|
|
|
|
op->nd_opt_type,
|
|
|
|
op->nd_opt_len << 3,
|
|
|
|
op->nd_opt_len));
|
2005-01-14 18:41:50 +08:00
|
|
|
|
2001-06-01 11:49:02 +08:00
|
|
|
switch (op->nd_opt_type) {
|
|
|
|
case ND_OPT_SOURCE_LINKADDR:
|
2001-06-01 12:08:57 +08:00
|
|
|
l = (op->nd_opt_len << 3) - 2;
|
2014-01-02 09:43:45 +08:00
|
|
|
print_lladdr(ndo, cp + 2, l);
|
2001-06-01 11:32:27 +08:00
|
|
|
break;
|
2001-06-01 11:49:02 +08:00
|
|
|
case ND_OPT_TARGET_LINKADDR:
|
2001-06-01 12:08:57 +08:00
|
|
|
l = (op->nd_opt_len << 3) - 2;
|
2014-01-02 09:43:45 +08:00
|
|
|
print_lladdr(ndo, cp + 2, l);
|
2001-06-01 11:32:27 +08:00
|
|
|
break;
|
2001-06-01 11:49:02 +08:00
|
|
|
case ND_OPT_PREFIX_INFORMATION:
|
2015-04-27 08:24:42 +08:00
|
|
|
opp = (const struct nd_opt_prefix_info *)op;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(opp->nd_opt_pi_prefix);
|
|
|
|
ND_PRINT((ndo,"%s/%u%s, Flags [%s], valid time %s",
|
2014-04-04 15:43:46 +08:00
|
|
|
ip6addr_string(ndo, &opp->nd_opt_pi_prefix),
|
2014-01-02 09:43:45 +08:00
|
|
|
opp->nd_opt_pi_prefix_len,
|
|
|
|
(op->nd_opt_len != 4) ? "badlen" : "",
|
|
|
|
bittok2str(icmp6_opt_pi_flag_values, "none", opp->nd_opt_pi_flags_reserved),
|
2017-11-23 06:54:09 +08:00
|
|
|
get_lifetime(EXTRACT_BE_U_4(&opp->nd_opt_pi_valid_time))));
|
|
|
|
ND_PRINT((ndo,", pref. time %s", get_lifetime(EXTRACT_BE_U_4(&opp->nd_opt_pi_preferred_time))));
|
2001-06-01 11:49:02 +08:00
|
|
|
break;
|
|
|
|
case ND_OPT_REDIRECTED_HEADER:
|
2014-01-02 09:43:45 +08:00
|
|
|
print_unknown_data(ndo, bp,"\n\t ",op->nd_opt_len<<3);
|
2001-06-01 11:49:02 +08:00
|
|
|
/* xxx */
|
|
|
|
break;
|
|
|
|
case ND_OPT_MTU:
|
2015-04-27 08:24:42 +08:00
|
|
|
opm = (const struct nd_opt_mtu *)op;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(opm->nd_opt_mtu_mtu);
|
|
|
|
ND_PRINT((ndo," %u%s",
|
2017-11-23 06:54:09 +08:00
|
|
|
EXTRACT_BE_U_4(&opm->nd_opt_mtu_mtu),
|
2017-11-18 18:52:52 +08:00
|
|
|
(op->nd_opt_len != 1) ? "bad option length" : "" ));
|
2005-01-14 18:41:50 +08:00
|
|
|
break;
|
2010-02-08 06:52:07 +08:00
|
|
|
case ND_OPT_RDNSS:
|
2015-04-27 08:24:42 +08:00
|
|
|
oprd = (const struct nd_opt_rdnss *)op;
|
2010-02-08 06:52:07 +08:00
|
|
|
l = (op->nd_opt_len - 1) / 2;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," lifetime %us,",
|
2017-11-23 06:54:09 +08:00
|
|
|
EXTRACT_BE_U_4(&oprd->nd_opt_rdnss_lifetime)));
|
2010-02-08 06:52:07 +08:00
|
|
|
for (i = 0; i < l; i++) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(oprd->nd_opt_rdnss_addr[i]);
|
|
|
|
ND_PRINT((ndo," addr: %s",
|
2014-04-04 15:43:46 +08:00
|
|
|
ip6addr_string(ndo, &oprd->nd_opt_rdnss_addr[i])));
|
2010-02-08 06:52:07 +08:00
|
|
|
}
|
|
|
|
break;
|
2012-04-13 20:32:40 +08:00
|
|
|
case ND_OPT_DNSSL:
|
2015-04-27 08:24:42 +08:00
|
|
|
opds = (const struct nd_opt_dnssl *)op;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," lifetime %us, domain(s):",
|
2017-11-23 06:54:09 +08:00
|
|
|
EXTRACT_BE_U_4(&opds->nd_opt_dnssl_lifetime)));
|
2012-04-13 20:32:40 +08:00
|
|
|
domp = cp + 8; /* domain names, variable-sized, RFC1035-encoded */
|
|
|
|
while (domp < cp + (op->nd_opt_len << 3) && *domp != '\0')
|
|
|
|
{
|
2014-03-12 22:11:23 +08:00
|
|
|
ND_PRINT((ndo, " "));
|
2014-03-25 19:05:59 +08:00
|
|
|
if ((domp = ns_nprint (ndo, domp, bp)) == NULL)
|
2012-04-13 20:32:40 +08:00
|
|
|
goto trunc;
|
|
|
|
}
|
|
|
|
break;
|
2001-06-01 11:49:02 +08:00
|
|
|
case ND_OPT_ADVINTERVAL:
|
2015-04-27 08:24:42 +08:00
|
|
|
opa = (const struct nd_opt_advinterval *)op;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(opa->nd_opt_adv_interval);
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo," %ums", EXTRACT_BE_U_4(&opa->nd_opt_adv_interval)));
|
2002-06-12 01:08:37 +08:00
|
|
|
break;
|
2014-01-02 09:43:45 +08:00
|
|
|
case ND_OPT_HOMEAGENT_INFO:
|
2015-04-27 08:24:42 +08:00
|
|
|
oph = (const struct nd_opt_homeagent_info *)op;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(oph->nd_opt_hai_lifetime);
|
|
|
|
ND_PRINT((ndo," preference %u, lifetime %u",
|
2017-11-23 06:54:09 +08:00
|
|
|
EXTRACT_BE_U_2(&oph->nd_opt_hai_preference),
|
|
|
|
EXTRACT_BE_U_2(&oph->nd_opt_hai_lifetime)));
|
2002-06-12 01:08:37 +08:00
|
|
|
break;
|
2001-06-01 11:49:02 +08:00
|
|
|
case ND_OPT_ROUTE_INFO:
|
2015-04-27 08:24:42 +08:00
|
|
|
opri = (const struct nd_opt_route_info *)op;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(opri->nd_opt_rti_lifetime);
|
2001-06-01 11:49:02 +08:00
|
|
|
memset(&in6, 0, sizeof(in6));
|
2015-04-27 08:24:42 +08:00
|
|
|
in6p = (const struct in6_addr *)(opri + 1);
|
2001-06-01 11:49:02 +08:00
|
|
|
switch (op->nd_opt_len) {
|
|
|
|
case 1:
|
|
|
|
break;
|
|
|
|
case 2:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK2(*in6p, 8);
|
2001-06-01 11:49:02 +08:00
|
|
|
memcpy(&in6, opri + 1, 8);
|
|
|
|
break;
|
|
|
|
case 3:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(*in6p);
|
2001-06-01 11:49:02 +08:00
|
|
|
memcpy(&in6, opri + 1, sizeof(in6));
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
goto trunc;
|
|
|
|
}
|
2014-04-04 15:43:46 +08:00
|
|
|
ND_PRINT((ndo," %s/%u", ip6addr_string(ndo, &in6),
|
2014-01-02 09:43:45 +08:00
|
|
|
opri->nd_opt_rti_prefixlen));
|
|
|
|
ND_PRINT((ndo,", pref=%s", get_rtpref(opri->nd_opt_rti_flags)));
|
|
|
|
ND_PRINT((ndo,", lifetime=%s",
|
2017-11-23 06:54:09 +08:00
|
|
|
get_lifetime(EXTRACT_BE_U_4(&opri->nd_opt_rti_lifetime))));
|
2001-06-01 11:32:27 +08:00
|
|
|
break;
|
|
|
|
default:
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag <= 1) {
|
|
|
|
print_unknown_data(ndo,cp+2,"\n\t ", (op->nd_opt_len << 3) - 2); /* skip option header */
|
2005-01-14 18:41:50 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
break;
|
2001-06-01 11:32:27 +08:00
|
|
|
}
|
2005-01-14 18:41:50 +08:00
|
|
|
/* do we want to see an additional hexdump ? */
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag> 1)
|
|
|
|
print_unknown_data(ndo, cp+2,"\n\t ", (op->nd_opt_len << 3) - 2); /* skip option header */
|
2001-06-01 11:49:02 +08:00
|
|
|
|
|
|
|
cp += op->nd_opt_len << 3;
|
|
|
|
resid -= op->nd_opt_len << 3;
|
1999-10-30 13:11:06 +08:00
|
|
|
}
|
|
|
|
return;
|
2001-06-01 11:49:02 +08:00
|
|
|
|
1999-10-30 13:11:06 +08:00
|
|
|
trunc:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo, "[ndp opt]"));
|
1999-10-30 13:11:06 +08:00
|
|
|
return;
|
|
|
|
#undef ECHECK
|
|
|
|
}
|
|
|
|
|
2002-12-12 06:29:21 +08:00
|
|
|
static void
|
2014-01-02 09:43:45 +08:00
|
|
|
mld6_print(netdissect_options *ndo, const u_char *bp)
|
1999-10-30 13:11:06 +08:00
|
|
|
{
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct mld6_hdr *mp = (const struct mld6_hdr *)bp;
|
2001-06-01 11:32:27 +08:00
|
|
|
const u_char *ep;
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2000-10-03 10:19:04 +08:00
|
|
|
/* 'ep' points to the end of available data. */
|
2014-01-02 09:43:45 +08:00
|
|
|
ep = ndo->ndo_snapend;
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2015-04-27 08:24:42 +08:00
|
|
|
if ((const u_char *)mp + sizeof(*mp) > ep)
|
1999-10-30 13:11:06 +08:00
|
|
|
return;
|
|
|
|
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,"max resp delay: %d ", EXTRACT_BE_U_2(&mp->mld6_maxdelay)));
|
2014-04-04 15:43:46 +08:00
|
|
|
ND_PRINT((ndo,"addr: %s", ip6addr_string(ndo, &mp->mld6_addr)));
|
2000-04-10 03:14:52 +08:00
|
|
|
}
|
1999-10-30 13:11:06 +08:00
|
|
|
|
2000-05-17 22:54:03 +08:00
|
|
|
static void
|
2014-01-02 09:43:45 +08:00
|
|
|
mldv2_report_print(netdissect_options *ndo, const u_char *bp, u_int len)
|
2004-06-16 08:06:28 +08:00
|
|
|
{
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct icmp6_hdr *icp = (const struct icmp6_hdr *) bp;
|
2004-06-16 08:06:28 +08:00
|
|
|
u_int group, nsrcs, ngroups;
|
|
|
|
u_int i, j;
|
|
|
|
|
|
|
|
/* Minimum len is 8 */
|
|
|
|
if (len < 8) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," [invalid len %d]", len));
|
|
|
|
return;
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(icp->icmp6_data16[1]);
|
2017-11-23 06:54:09 +08:00
|
|
|
ngroups = EXTRACT_BE_U_2(&icp->icmp6_data16[1]);
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", %d group record(s)", ngroups));
|
|
|
|
if (ndo->ndo_vflag > 0) {
|
2004-06-16 08:06:28 +08:00
|
|
|
/* Print the group records */
|
|
|
|
group = 8;
|
|
|
|
for (i = 0; i < ngroups; i++) {
|
|
|
|
/* type(1) + auxlen(1) + numsrc(2) + grp(16) */
|
|
|
|
if (len < group + 20) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," [invalid number of groups]"));
|
|
|
|
return;
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK2(bp[group + 4], sizeof(struct in6_addr));
|
2014-04-04 15:43:46 +08:00
|
|
|
ND_PRINT((ndo," [gaddr %s", ip6addr_string(ndo, &bp[group + 4])));
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," %s", tok2str(mldv2report2str, " [v2-report-#%d]",
|
2017-11-23 22:05:08 +08:00
|
|
|
EXTRACT_U_1(bp + group))));
|
2004-06-16 08:06:28 +08:00
|
|
|
nsrcs = (bp[group + 2] << 8) + bp[group + 3];
|
|
|
|
/* Check the number of sources and print them */
|
2005-07-12 04:15:31 +08:00
|
|
|
if (len < group + 20 + (nsrcs * sizeof(struct in6_addr))) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," [invalid number of sources %d]", nsrcs));
|
|
|
|
return;
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag == 1)
|
|
|
|
ND_PRINT((ndo,", %d source(s)", nsrcs));
|
2004-06-16 08:06:28 +08:00
|
|
|
else {
|
|
|
|
/* Print the sources */
|
2014-03-26 17:08:22 +08:00
|
|
|
ND_PRINT((ndo," {"));
|
2004-06-16 08:06:28 +08:00
|
|
|
for (j = 0; j < nsrcs; j++) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK2(bp[group + 20 + j * sizeof(struct in6_addr)],
|
2005-07-12 04:15:31 +08:00
|
|
|
sizeof(struct in6_addr));
|
2014-04-04 15:43:46 +08:00
|
|
|
ND_PRINT((ndo," %s", ip6addr_string(ndo, &bp[group + 20 + j * sizeof(struct in6_addr)])));
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
2014-03-26 17:08:22 +08:00
|
|
|
ND_PRINT((ndo," }"));
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
|
|
|
/* Next group record */
|
2005-07-12 04:15:31 +08:00
|
|
|
group += 20 + nsrcs * sizeof(struct in6_addr);
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"]"));
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
trunc:
|
2014-03-26 17:08:22 +08:00
|
|
|
ND_PRINT((ndo,"[|icmp6]"));
|
2004-06-16 08:06:28 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2014-01-02 09:43:45 +08:00
|
|
|
mldv2_query_print(netdissect_options *ndo, const u_char *bp, u_int len)
|
2004-06-16 08:06:28 +08:00
|
|
|
{
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct icmp6_hdr *icp = (const struct icmp6_hdr *) bp;
|
2004-06-16 08:06:28 +08:00
|
|
|
u_int mrc;
|
|
|
|
int mrt, qqi;
|
|
|
|
u_int nsrcs;
|
|
|
|
register u_int i;
|
|
|
|
|
|
|
|
/* Minimum len is 28 */
|
|
|
|
if (len < 28) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," [invalid len %d]", len));
|
2004-06-16 08:06:28 +08:00
|
|
|
return;
|
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(icp->icmp6_data16[0]);
|
2017-11-23 06:54:09 +08:00
|
|
|
mrc = EXTRACT_BE_U_2(&icp->icmp6_data16[0]);
|
2004-06-16 08:06:28 +08:00
|
|
|
if (mrc < 32768) {
|
|
|
|
mrt = mrc;
|
|
|
|
} else {
|
|
|
|
mrt = ((mrc & 0x0fff) | 0x1000) << (((mrc & 0x7000) >> 12) + 3);
|
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
2014-03-26 17:08:22 +08:00
|
|
|
ND_PRINT((ndo," [max resp delay=%d]", mrt));
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK2(bp[8], sizeof(struct in6_addr));
|
2014-04-04 15:43:46 +08:00
|
|
|
ND_PRINT((ndo," [gaddr %s", ip6addr_string(ndo, &bp[8])));
|
2004-06-16 08:06:28 +08:00
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
|
|
|
ND_TCHECK(bp[25]);
|
2004-06-16 08:06:28 +08:00
|
|
|
if (bp[24] & 0x08) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," sflag"));
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
|
|
|
if (bp[24] & 0x07) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," robustness=%d", bp[24] & 0x07));
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
|
|
|
if (bp[25] < 128) {
|
|
|
|
qqi = bp[25];
|
|
|
|
} else {
|
|
|
|
qqi = ((bp[25] & 0x0f) | 0x10) << (((bp[25] & 0x70) >> 4) + 3);
|
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," qqi=%d", qqi));
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
|
|
|
|
2017-11-25 05:48:55 +08:00
|
|
|
ND_TCHECK_2(bp + 26);
|
2017-11-23 06:54:09 +08:00
|
|
|
nsrcs = EXTRACT_BE_U_2(bp + 26);
|
2004-06-16 08:06:28 +08:00
|
|
|
if (nsrcs > 0) {
|
2005-07-12 04:15:31 +08:00
|
|
|
if (len < 28 + nsrcs * sizeof(struct in6_addr))
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," [invalid number of sources]"));
|
|
|
|
else if (ndo->ndo_vflag > 1) {
|
|
|
|
ND_PRINT((ndo," {"));
|
2004-06-16 08:06:28 +08:00
|
|
|
for (i = 0; i < nsrcs; i++) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK2(bp[28 + i * sizeof(struct in6_addr)],
|
2005-07-12 04:15:31 +08:00
|
|
|
sizeof(struct in6_addr));
|
2014-04-04 15:43:46 +08:00
|
|
|
ND_PRINT((ndo," %s", ip6addr_string(ndo, &bp[28 + i * sizeof(struct in6_addr)])));
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," }"));
|
2004-06-16 08:06:28 +08:00
|
|
|
} else
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", %d source(s)", nsrcs));
|
2004-06-16 08:06:28 +08:00
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"]"));
|
2004-06-16 08:06:28 +08:00
|
|
|
return;
|
|
|
|
trunc:
|
2014-03-26 17:08:22 +08:00
|
|
|
ND_PRINT((ndo,"[|icmp6]"));
|
2004-06-16 08:06:28 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2009-09-22 01:16:14 +08:00
|
|
|
static void
|
2014-01-02 09:43:45 +08:00
|
|
|
dnsname_print(netdissect_options *ndo, const u_char *cp, const u_char *ep)
|
2000-05-17 22:54:03 +08:00
|
|
|
{
|
|
|
|
int i;
|
|
|
|
|
|
|
|
/* DNS name decoding - no decompression */
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", \""));
|
2000-05-17 22:54:03 +08:00
|
|
|
while (cp < ep) {
|
2017-11-23 06:54:09 +08:00
|
|
|
i = EXTRACT_U_1(cp);
|
2017-11-22 03:23:59 +08:00
|
|
|
cp++;
|
2000-05-17 22:54:03 +08:00
|
|
|
if (i) {
|
|
|
|
if (i > ep - cp) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"???"));
|
2000-05-17 22:54:03 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
while (i-- && cp < ep) {
|
2014-04-01 21:29:55 +08:00
|
|
|
safeputchar(ndo, *cp);
|
2000-05-17 22:54:03 +08:00
|
|
|
cp++;
|
|
|
|
}
|
2017-11-23 06:54:09 +08:00
|
|
|
if (cp + 1 < ep && EXTRACT_U_1(cp))
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"."));
|
2000-05-17 22:54:03 +08:00
|
|
|
} else {
|
|
|
|
if (cp == ep) {
|
|
|
|
/* FQDN */
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"."));
|
2000-05-17 22:54:03 +08:00
|
|
|
} else if (cp + 1 == ep && *cp == '\0') {
|
|
|
|
/* truncated */
|
|
|
|
} else {
|
|
|
|
/* invalid */
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"???"));
|
2000-05-17 22:54:03 +08:00
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"\""));
|
2000-05-17 22:54:03 +08:00
|
|
|
}
|
|
|
|
|
2002-12-12 06:29:21 +08:00
|
|
|
static void
|
2014-01-02 09:43:45 +08:00
|
|
|
icmp6_nodeinfo_print(netdissect_options *ndo, u_int icmp6len, const u_char *bp, const u_char *ep)
|
2000-05-10 16:20:52 +08:00
|
|
|
{
|
2014-01-09 08:59:07 +08:00
|
|
|
const struct icmp6_nodeinfo *ni6;
|
|
|
|
const struct icmp6_hdr *dp;
|
2000-05-10 16:20:52 +08:00
|
|
|
const u_char *cp;
|
2002-12-12 06:29:21 +08:00
|
|
|
size_t siz, i;
|
2000-07-16 13:25:16 +08:00
|
|
|
int needcomma;
|
2000-05-10 16:20:52 +08:00
|
|
|
|
2002-12-12 06:29:21 +08:00
|
|
|
if (ep < bp)
|
|
|
|
return;
|
2015-04-27 08:24:42 +08:00
|
|
|
dp = (const struct icmp6_hdr *)bp;
|
|
|
|
ni6 = (const struct icmp6_nodeinfo *)bp;
|
2000-05-10 16:20:52 +08:00
|
|
|
siz = ep - bp;
|
|
|
|
|
|
|
|
switch (ni6->ni_type) {
|
|
|
|
case ICMP6_NI_QUERY:
|
|
|
|
if (siz == sizeof(*dp) + 4) {
|
|
|
|
/* KAME who-are-you */
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," who-are-you request"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," node information query"));
|
2000-05-10 16:20:52 +08:00
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK2(*dp, sizeof(*ni6));
|
2015-04-27 08:24:42 +08:00
|
|
|
ni6 = (const struct icmp6_nodeinfo *)dp;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," (")); /*)*/
|
2017-11-23 06:54:09 +08:00
|
|
|
switch (EXTRACT_BE_U_2(&ni6->ni_qtype)) {
|
2000-05-10 16:20:52 +08:00
|
|
|
case NI_QTYPE_NOOP:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"noop"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
case NI_QTYPE_SUPTYPES:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"supported qtypes"));
|
2017-11-23 06:54:09 +08:00
|
|
|
i = EXTRACT_BE_U_2(&ni6->ni_flags);
|
2000-05-10 16:20:52 +08:00
|
|
|
if (i)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," [%s]", (i & 0x01) ? "C" : ""));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
case NI_QTYPE_FQDN:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"DNS name"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
case NI_QTYPE_NODEADDR:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"node addresses"));
|
2000-05-10 16:20:52 +08:00
|
|
|
i = ni6->ni_flags;
|
|
|
|
if (!i)
|
|
|
|
break;
|
|
|
|
/* NI_NODEADDR_FLAG_TRUNCATE undefined for query */
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," [%s%s%s%s%s%s]",
|
2000-05-10 16:20:52 +08:00
|
|
|
(i & NI_NODEADDR_FLAG_ANYCAST) ? "a" : "",
|
|
|
|
(i & NI_NODEADDR_FLAG_GLOBAL) ? "G" : "",
|
|
|
|
(i & NI_NODEADDR_FLAG_SITELOCAL) ? "S" : "",
|
|
|
|
(i & NI_NODEADDR_FLAG_LINKLOCAL) ? "L" : "",
|
|
|
|
(i & NI_NODEADDR_FLAG_COMPAT) ? "C" : "",
|
2014-01-02 09:43:45 +08:00
|
|
|
(i & NI_NODEADDR_FLAG_ALL) ? "A" : ""));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
default:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"unknown"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (ni6->ni_qtype == NI_QTYPE_NOOP ||
|
|
|
|
ni6->ni_qtype == NI_QTYPE_SUPTYPES) {
|
|
|
|
if (siz != sizeof(*ni6))
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag)
|
|
|
|
ND_PRINT((ndo,", invalid len"));
|
2000-05-10 16:20:52 +08:00
|
|
|
/*(*/
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,")"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* XXX backward compat, icmp-name-lookup-03 */
|
|
|
|
if (siz == sizeof(*ni6)) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", 03 draft"));
|
2000-05-10 16:20:52 +08:00
|
|
|
/*(*/
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,")"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
switch (ni6->ni_code) {
|
|
|
|
case ICMP6_NI_SUBJ_IPV6:
|
2014-01-02 09:43:45 +08:00
|
|
|
if (!ND_TTEST2(*dp,
|
2000-05-10 16:20:52 +08:00
|
|
|
sizeof(*ni6) + sizeof(struct in6_addr)))
|
|
|
|
break;
|
|
|
|
if (siz != sizeof(*ni6) + sizeof(struct in6_addr)) {
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag)
|
|
|
|
ND_PRINT((ndo,", invalid subject len"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", subject=%s",
|
2016-07-11 17:26:01 +08:00
|
|
|
ip6addr_string(ndo, ni6 + 1)));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_NI_SUBJ_FQDN:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", subject=DNS name"));
|
2000-05-15 17:23:49 +08:00
|
|
|
cp = (const u_char *)(ni6 + 1);
|
2000-05-10 16:20:52 +08:00
|
|
|
if (cp[0] == ep - cp - 1) {
|
|
|
|
/* icmp-name-lookup-03, pascal string */
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag)
|
|
|
|
ND_PRINT((ndo,", 03 draft"));
|
2000-05-10 16:20:52 +08:00
|
|
|
cp++;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", \""));
|
2000-05-10 16:20:52 +08:00
|
|
|
while (cp < ep) {
|
2014-04-01 21:29:55 +08:00
|
|
|
safeputchar(ndo, *cp);
|
2000-05-10 16:20:52 +08:00
|
|
|
cp++;
|
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"\""));
|
2000-05-17 22:54:03 +08:00
|
|
|
} else
|
2014-01-02 09:43:45 +08:00
|
|
|
dnsname_print(ndo, cp, ep);
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_NI_SUBJ_IPV4:
|
2014-01-02 09:43:45 +08:00
|
|
|
if (!ND_TTEST2(*dp, sizeof(*ni6) + sizeof(struct in_addr)))
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
if (siz != sizeof(*ni6) + sizeof(struct in_addr)) {
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag)
|
|
|
|
ND_PRINT((ndo,", invalid subject len"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", subject=%s",
|
2016-07-11 17:43:34 +08:00
|
|
|
ipaddr_string(ndo, ni6 + 1)));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
default:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", unknown subject"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*(*/
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,")"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
|
|
|
|
case ICMP6_NI_REPLY:
|
|
|
|
if (icmp6len > siz) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"[|icmp6: node information reply]"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2000-07-16 13:25:16 +08:00
|
|
|
needcomma = 0;
|
|
|
|
|
2017-06-13 13:16:12 +08:00
|
|
|
ND_TCHECK2(*dp, sizeof(*ni6));
|
2015-04-27 08:24:42 +08:00
|
|
|
ni6 = (const struct icmp6_nodeinfo *)dp;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," node information reply"));
|
|
|
|
ND_PRINT((ndo," (")); /*)*/
|
2000-05-10 16:20:52 +08:00
|
|
|
switch (ni6->ni_code) {
|
2000-08-03 22:25:57 +08:00
|
|
|
case ICMP6_NI_SUCCESS:
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
|
|
|
ND_PRINT((ndo,"success"));
|
2000-07-16 13:25:16 +08:00
|
|
|
needcomma++;
|
|
|
|
}
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_NI_REFUSED:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"refused"));
|
2000-07-16 13:25:16 +08:00
|
|
|
needcomma++;
|
2000-05-10 16:20:52 +08:00
|
|
|
if (siz != sizeof(*ni6))
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag)
|
|
|
|
ND_PRINT((ndo,", invalid length"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_NI_UNKNOWN:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"unknown"));
|
2000-07-16 13:25:16 +08:00
|
|
|
needcomma++;
|
2000-05-10 16:20:52 +08:00
|
|
|
if (siz != sizeof(*ni6))
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag)
|
|
|
|
ND_PRINT((ndo,", invalid length"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2000-08-03 22:25:57 +08:00
|
|
|
if (ni6->ni_code != ICMP6_NI_SUCCESS) {
|
2000-05-10 16:20:52 +08:00
|
|
|
/*(*/
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,")"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-11-23 06:54:09 +08:00
|
|
|
switch (EXTRACT_BE_U_2(&ni6->ni_qtype)) {
|
2000-05-10 16:20:52 +08:00
|
|
|
case NI_QTYPE_NOOP:
|
2000-07-16 13:25:16 +08:00
|
|
|
if (needcomma)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", "));
|
|
|
|
ND_PRINT((ndo,"noop"));
|
2000-05-10 16:20:52 +08:00
|
|
|
if (siz != sizeof(*ni6))
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag)
|
|
|
|
ND_PRINT((ndo,", invalid length"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
case NI_QTYPE_SUPTYPES:
|
2000-07-16 13:25:16 +08:00
|
|
|
if (needcomma)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", "));
|
|
|
|
ND_PRINT((ndo,"supported qtypes"));
|
2017-11-23 06:54:09 +08:00
|
|
|
i = EXTRACT_BE_U_2(&ni6->ni_flags);
|
2000-05-10 16:20:52 +08:00
|
|
|
if (i)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," [%s]", (i & 0x01) ? "C" : ""));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
case NI_QTYPE_FQDN:
|
2000-07-16 13:25:16 +08:00
|
|
|
if (needcomma)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", "));
|
|
|
|
ND_PRINT((ndo,"DNS name"));
|
2000-05-10 16:20:52 +08:00
|
|
|
cp = (const u_char *)(ni6 + 1) + 4;
|
2017-06-13 13:16:12 +08:00
|
|
|
ND_TCHECK(cp[0]);
|
2000-05-10 16:20:52 +08:00
|
|
|
if (cp[0] == ep - cp - 1) {
|
|
|
|
/* icmp-name-lookup-03, pascal string */
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag)
|
|
|
|
ND_PRINT((ndo,", 03 draft"));
|
2000-05-10 16:20:52 +08:00
|
|
|
cp++;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", \""));
|
2000-05-10 16:20:52 +08:00
|
|
|
while (cp < ep) {
|
2014-04-01 21:29:55 +08:00
|
|
|
safeputchar(ndo, *cp);
|
2000-05-10 16:20:52 +08:00
|
|
|
cp++;
|
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"\""));
|
2000-05-17 22:54:03 +08:00
|
|
|
} else
|
2014-01-02 09:43:45 +08:00
|
|
|
dnsname_print(ndo, cp, ep);
|
2017-11-23 06:54:09 +08:00
|
|
|
if ((EXTRACT_BE_U_2(&ni6->ni_flags) & 0x01) != 0)
|
|
|
|
ND_PRINT((ndo," [TTL=%u]", EXTRACT_BE_U_4(ni6 + 1)));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
case NI_QTYPE_NODEADDR:
|
2000-07-16 13:25:16 +08:00
|
|
|
if (needcomma)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", "));
|
|
|
|
ND_PRINT((ndo,"node addresses"));
|
2000-08-30 00:04:55 +08:00
|
|
|
i = sizeof(*ni6);
|
|
|
|
while (i < siz) {
|
|
|
|
if (i + sizeof(struct in6_addr) + sizeof(int32_t) > siz)
|
|
|
|
break;
|
2016-07-11 17:26:01 +08:00
|
|
|
ND_PRINT((ndo," %s", ip6addr_string(ndo, bp + i)));
|
2000-08-30 00:04:55 +08:00
|
|
|
i += sizeof(struct in6_addr);
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,"(%d)", (int32_t) EXTRACT_BE_U_4(bp + i)));
|
2000-08-30 00:04:55 +08:00
|
|
|
i += sizeof(int32_t);
|
2000-05-10 16:20:52 +08:00
|
|
|
}
|
|
|
|
i = ni6->ni_flags;
|
|
|
|
if (!i)
|
|
|
|
break;
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," [%s%s%s%s%s%s%s]",
|
|
|
|
(i & NI_NODEADDR_FLAG_ANYCAST) ? "a" : "",
|
|
|
|
(i & NI_NODEADDR_FLAG_GLOBAL) ? "G" : "",
|
|
|
|
(i & NI_NODEADDR_FLAG_SITELOCAL) ? "S" : "",
|
|
|
|
(i & NI_NODEADDR_FLAG_LINKLOCAL) ? "L" : "",
|
|
|
|
(i & NI_NODEADDR_FLAG_COMPAT) ? "C" : "",
|
|
|
|
(i & NI_NODEADDR_FLAG_ALL) ? "A" : "",
|
|
|
|
(i & NI_NODEADDR_FLAG_TRUNCATE) ? "T" : ""));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
default:
|
2000-07-16 13:25:16 +08:00
|
|
|
if (needcomma)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,", "));
|
|
|
|
ND_PRINT((ndo,"unknown"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
/*(*/
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,")"));
|
2000-05-10 16:20:52 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
return;
|
|
|
|
|
|
|
|
trunc:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo, "[|icmp6]"));
|
2000-05-10 16:20:52 +08:00
|
|
|
}
|
|
|
|
|
2002-12-12 06:29:21 +08:00
|
|
|
static void
|
2014-01-02 09:43:45 +08:00
|
|
|
icmp6_rrenum_print(netdissect_options *ndo, const u_char *bp, const u_char *ep)
|
2000-11-08 17:28:43 +08:00
|
|
|
{
|
2014-01-09 08:59:07 +08:00
|
|
|
const struct icmp6_router_renum *rr6;
|
2000-11-08 17:28:43 +08:00
|
|
|
const char *cp;
|
2015-04-27 08:24:42 +08:00
|
|
|
const struct rr_pco_match *match;
|
|
|
|
const struct rr_pco_use *use;
|
2000-11-08 17:28:43 +08:00
|
|
|
char hbuf[NI_MAXHOST];
|
|
|
|
int n;
|
|
|
|
|
2002-12-12 06:29:21 +08:00
|
|
|
if (ep < bp)
|
|
|
|
return;
|
2015-04-27 08:24:42 +08:00
|
|
|
rr6 = (const struct icmp6_router_renum *)bp;
|
2000-11-08 17:28:43 +08:00
|
|
|
cp = (const char *)(rr6 + 1);
|
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(rr6->rr_reserved);
|
2000-11-08 17:28:43 +08:00
|
|
|
switch (rr6->rr_code) {
|
|
|
|
case ICMP6_ROUTER_RENUMBERING_COMMAND:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"router renum: command"));
|
2000-11-08 17:28:43 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_ROUTER_RENUMBERING_RESULT:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"router renum: result"));
|
2000-11-08 17:28:43 +08:00
|
|
|
break;
|
|
|
|
case ICMP6_ROUTER_RENUMBERING_SEQNUM_RESET:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"router renum: sequence number reset"));
|
2000-11-08 17:28:43 +08:00
|
|
|
break;
|
|
|
|
default:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"router renum: code-#%d", rr6->rr_code));
|
2000-11-08 17:28:43 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,", seq=%u", EXTRACT_BE_U_4(&rr6->rr_seqnum)));
|
2000-11-08 21:03:12 +08:00
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
2000-11-08 17:28:43 +08:00
|
|
|
#define F(x, y) ((rr6->rr_flags) & (x) ? (y) : "")
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"[")); /*]*/
|
2000-11-08 17:28:43 +08:00
|
|
|
if (rr6->rr_flags) {
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"%s%s%s%s%s,", F(ICMP6_RR_FLAGS_TEST, "T"),
|
|
|
|
F(ICMP6_RR_FLAGS_REQRESULT, "R"),
|
|
|
|
F(ICMP6_RR_FLAGS_FORCEAPPLY, "A"),
|
|
|
|
F(ICMP6_RR_FLAGS_SPECSITE, "S"),
|
|
|
|
F(ICMP6_RR_FLAGS_PREVDONE, "P")));
|
2000-11-08 17:28:43 +08:00
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"seg=%u,", rr6->rr_segnum));
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,"maxdelay=%u", EXTRACT_BE_U_2(&rr6->rr_maxdelay)));
|
2000-11-08 17:28:43 +08:00
|
|
|
if (rr6->rr_reserved)
|
2017-11-23 06:54:09 +08:00
|
|
|
ND_PRINT((ndo,"rsvd=0x%x", EXTRACT_BE_U_4(&rr6->rr_reserved)));
|
2000-11-08 17:28:43 +08:00
|
|
|
/*[*/
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"]"));
|
2000-11-08 17:28:43 +08:00
|
|
|
#undef F
|
|
|
|
}
|
|
|
|
|
|
|
|
if (rr6->rr_code == ICMP6_ROUTER_RENUMBERING_COMMAND) {
|
2015-04-27 08:24:42 +08:00
|
|
|
match = (const struct rr_pco_match *)cp;
|
2000-11-08 17:28:43 +08:00
|
|
|
cp = (const char *)(match + 1);
|
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(match->rpm_prefix);
|
2000-11-08 17:28:43 +08:00
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag > 1)
|
|
|
|
ND_PRINT((ndo,"\n\t"));
|
2000-11-08 17:28:43 +08:00
|
|
|
else
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," "));
|
|
|
|
ND_PRINT((ndo,"match(")); /*)*/
|
2000-11-08 17:28:43 +08:00
|
|
|
switch (match->rpm_code) {
|
2014-01-02 09:43:45 +08:00
|
|
|
case RPM_PCO_ADD: ND_PRINT((ndo,"add")); break;
|
|
|
|
case RPM_PCO_CHANGE: ND_PRINT((ndo,"change")); break;
|
|
|
|
case RPM_PCO_SETGLOBAL: ND_PRINT((ndo,"setglobal")); break;
|
|
|
|
default: ND_PRINT((ndo,"#%u", match->rpm_code)); break;
|
2000-11-08 17:28:43 +08:00
|
|
|
}
|
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
|
|
|
ND_PRINT((ndo,",ord=%u", match->rpm_ordinal));
|
|
|
|
ND_PRINT((ndo,",min=%u", match->rpm_minlen));
|
|
|
|
ND_PRINT((ndo,",max=%u", match->rpm_maxlen));
|
2000-11-08 17:28:43 +08:00
|
|
|
}
|
2015-09-18 05:56:44 +08:00
|
|
|
if (addrtostr6(&match->rpm_prefix, hbuf, sizeof(hbuf)))
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,",%s/%u", hbuf, match->rpm_matchlen));
|
2000-11-08 17:28:43 +08:00
|
|
|
else
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,",?/%u", match->rpm_matchlen));
|
2000-11-08 17:28:43 +08:00
|
|
|
/*(*/
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,")"));
|
2000-11-08 17:28:43 +08:00
|
|
|
|
|
|
|
n = match->rpm_len - 3;
|
|
|
|
if (n % 4)
|
|
|
|
goto trunc;
|
|
|
|
n /= 4;
|
|
|
|
while (n-- > 0) {
|
2015-04-27 08:24:42 +08:00
|
|
|
use = (const struct rr_pco_use *)cp;
|
2000-11-08 17:28:43 +08:00
|
|
|
cp = (const char *)(use + 1);
|
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_TCHECK(use->rpu_prefix);
|
2000-11-08 17:28:43 +08:00
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag > 1)
|
|
|
|
ND_PRINT((ndo,"\n\t"));
|
2000-11-08 17:28:43 +08:00
|
|
|
else
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo," "));
|
|
|
|
ND_PRINT((ndo,"use(")); /*)*/
|
2000-11-08 17:28:43 +08:00
|
|
|
if (use->rpu_flags) {
|
|
|
|
#define F(x, y) ((use->rpu_flags) & (x) ? (y) : "")
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"%s%s,",
|
|
|
|
F(ICMP6_RR_PCOUSE_FLAGS_DECRVLTIME, "V"),
|
|
|
|
F(ICMP6_RR_PCOUSE_FLAGS_DECRPLTIME, "P")));
|
2000-11-08 17:28:43 +08:00
|
|
|
#undef F
|
|
|
|
}
|
2014-01-02 09:43:45 +08:00
|
|
|
if (ndo->ndo_vflag) {
|
|
|
|
ND_PRINT((ndo,"mask=0x%x,", use->rpu_ramask));
|
|
|
|
ND_PRINT((ndo,"raflags=0x%x,", use->rpu_raflags));
|
2000-11-08 17:28:43 +08:00
|
|
|
if (~use->rpu_vltime == 0)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"vltime=infty,"));
|
2000-11-08 17:28:43 +08:00
|
|
|
else
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"vltime=%u,",
|
2017-11-23 06:54:09 +08:00
|
|
|
EXTRACT_BE_U_4(&use->rpu_vltime)));
|
2000-11-08 17:28:43 +08:00
|
|
|
if (~use->rpu_pltime == 0)
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"pltime=infty,"));
|
2000-11-08 17:28:43 +08:00
|
|
|
else
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"pltime=%u,",
|
2017-11-23 06:54:09 +08:00
|
|
|
EXTRACT_BE_U_4(&use->rpu_pltime)));
|
2000-11-08 17:28:43 +08:00
|
|
|
}
|
2015-09-18 05:56:44 +08:00
|
|
|
if (addrtostr6(&use->rpu_prefix, hbuf, sizeof(hbuf)))
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"%s/%u/%u", hbuf, use->rpu_uselen,
|
|
|
|
use->rpu_keeplen));
|
2000-11-08 17:28:43 +08:00
|
|
|
else
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"?/%u/%u", use->rpu_uselen,
|
|
|
|
use->rpu_keeplen));
|
2000-11-08 17:28:43 +08:00
|
|
|
/*(*/
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,")"));
|
2000-11-08 17:28:43 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return;
|
|
|
|
|
|
|
|
trunc:
|
2014-01-02 09:43:45 +08:00
|
|
|
ND_PRINT((ndo,"[|icmp6]"));
|
2000-11-08 17:28:43 +08:00
|
|
|
}
|
|
|
|
|
2014-01-02 09:43:45 +08:00
|
|
|
/*
|
|
|
|
* Local Variables:
|
|
|
|
* c-style: whitesmith
|
|
|
|
* c-basic-offset: 8
|
|
|
|
* End:
|
|
|
|
*/
|