]> The Tcpdump Group git mirrors - tcpdump/blob - print-icmp6.c
ICMPv6: Delete some remains from drafts for Node Information Queries
[tcpdump] / print-icmp6.c
1 /*
2 * Copyright (c) 1988, 1989, 1990, 1991, 1993, 1994
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /* \summary: IPv6 Internet Control Message Protocol (ICMPv6) printer */
23
24 #include <config.h>
25
26 #include "netdissect-stdinc.h"
27
28 #include <stdio.h>
29 #include <string.h>
30
31 #include "netdissect.h"
32 #include "addrtoname.h"
33 #include "addrtostr.h"
34 #include "extract.h"
35
36 #include "ip6.h"
37 #include "ipproto.h"
38
39 #include "udp.h"
40 #include "ah.h"
41
42 /* NetBSD: icmp6.h,v 1.13 2000/08/03 16:30:37 itojun Exp */
43 /* $KAME: icmp6.h,v 1.22 2000/08/03 15:25:16 jinmei Exp $ */
44
45 /*
46 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
47 * All rights reserved.
48 *
49 * Redistribution and use in source and binary forms, with or without
50 * modification, are permitted provided that the following conditions
51 * are met:
52 * 1. Redistributions of source code must retain the above copyright
53 * notice, this list of conditions and the following disclaimer.
54 * 2. Redistributions in binary form must reproduce the above copyright
55 * notice, this list of conditions and the following disclaimer in the
56 * documentation and/or other materials provided with the distribution.
57 * 3. Neither the name of the project nor the names of its contributors
58 * may be used to endorse or promote products derived from this software
59 * without specific prior written permission.
60 *
61 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
62 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
63 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
64 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
65 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
66 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
67 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
68 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
69 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
70 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
71 * SUCH DAMAGE.
72 */
73
74 struct icmp6_hdr {
75 nd_uint8_t icmp6_type; /* type field */
76 nd_uint8_t icmp6_code; /* code field */
77 nd_uint16_t icmp6_cksum; /* checksum field */
78 union {
79 nd_uint32_t icmp6_un_data32[1]; /* type-specific field */
80 nd_uint16_t icmp6_un_data16[2]; /* type-specific field */
81 nd_uint8_t icmp6_un_data8[4]; /* type-specific field */
82 nd_byte icmp6_un_data[1]; /* type-specific field */
83 } icmp6_dataun;
84 };
85
86 #define icmp6_data32 icmp6_dataun.icmp6_un_data32
87 #define icmp6_data16 icmp6_dataun.icmp6_un_data16
88 #define icmp6_data8 icmp6_dataun.icmp6_un_data8
89 #define icmp6_data icmp6_dataun.icmp6_un_data
90 #define icmp6_pptr icmp6_data32[0] /* parameter prob */
91 #define icmp6_mtu icmp6_data32[0] /* packet too big */
92 #define icmp6_id icmp6_data16[0] /* echo request/reply */
93 #define icmp6_seq icmp6_data16[1] /* echo request/reply */
94 #define icmp6_maxdelay icmp6_data16[0] /* mcast group membership */
95
96 #define ICMP6_DST_UNREACH 1 /* dest unreachable, codes: */
97 #define ICMP6_PACKET_TOO_BIG 2 /* packet too big */
98 #define ICMP6_TIME_EXCEEDED 3 /* time exceeded, code: */
99 #define ICMP6_PARAM_PROB 4 /* ip6 header bad */
100
101 #define ICMP6_ECHO_REQUEST 128 /* echo service */
102 #define ICMP6_ECHO_REPLY 129 /* echo reply */
103 #define MLD6_LISTENER_QUERY 130 /* multicast listener query */
104 #define MLD6_LISTENER_REPORT 131 /* multicast listener report */
105 #define MLD6_LISTENER_DONE 132 /* multicast listener done */
106
107 #define ND_ROUTER_SOLICIT 133 /* router solicitation */
108 #define ND_ROUTER_ADVERT 134 /* router advertisement */
109 #define ND_NEIGHBOR_SOLICIT 135 /* neighbor solicitation */
110 #define ND_NEIGHBOR_ADVERT 136 /* neighbor advertisement */
111 #define ND_REDIRECT 137 /* redirect */
112
113 #define ICMP6_ROUTER_RENUMBERING 138 /* router renumbering */
114
115 #define ICMP6_NI_QUERY 139 /* node information query - RFC 4620 */
116 #define ICMP6_NI_REPLY 140 /* node information reply - RFC 4620 */
117 #define IND_SOLICIT 141 /* inverse neighbor solicitation */
118 #define IND_ADVERT 142 /* inverse neighbor advertisement */
119
120 #define ICMP6_V2_MEMBERSHIP_REPORT 143 /* v2 membership report */
121 #define MLDV2_LISTENER_REPORT 143 /* v2 multicast listener report */
122 #define ICMP6_HADISCOV_REQUEST 144
123 #define ICMP6_HADISCOV_REPLY 145
124 #define ICMP6_MOBILEPREFIX_SOLICIT 146
125 #define ICMP6_MOBILEPREFIX_ADVERT 147
126
127 #define MLD6_MTRACE_RESP 200 /* mtrace response(to sender) */
128 #define MLD6_MTRACE 201 /* mtrace messages */
129
130 #define ICMP6_MAXTYPE 201
131
132 #define ICMP6_DST_UNREACH_NOROUTE 0 /* no route to destination */
133 #define ICMP6_DST_UNREACH_ADMIN 1 /* administratively prohibited */
134 #define ICMP6_DST_UNREACH_NOTNEIGHBOR 2 /* not a neighbor(obsolete) */
135 #define ICMP6_DST_UNREACH_BEYONDSCOPE 2 /* beyond scope of source address */
136 #define ICMP6_DST_UNREACH_ADDR 3 /* address unreachable */
137 #define ICMP6_DST_UNREACH_NOPORT 4 /* port unreachable */
138
139 #define ICMP6_TIME_EXCEED_TRANSIT 0 /* ttl==0 in transit */
140 #define ICMP6_TIME_EXCEED_REASSEMBLY 1 /* ttl==0 in reass */
141
142 #define ICMP6_PARAMPROB_HEADER 0 /* erroneous header field */
143 #define ICMP6_PARAMPROB_NEXTHEADER 1 /* unrecognized next header */
144 #define ICMP6_PARAMPROB_OPTION 2 /* unrecognized option */
145 #define ICMP6_PARAMPROB_FRAGHDRCHAIN 3 /* incomplete header chain */
146
147 #define ICMP6_INFOMSG_MASK 0x80 /* all informational messages */
148
149 #define ICMP6_NI_SUBJ_IPV6 0 /* Query Subject is an IPv6 address */
150 #define ICMP6_NI_SUBJ_FQDN 1 /* Query Subject is a Domain name */
151 #define ICMP6_NI_SUBJ_IPV4 2 /* Query Subject is an IPv4 address */
152
153 #define ICMP6_NI_SUCCESS 0 /* node information successful reply */
154 #define ICMP6_NI_REFUSED 1 /* node information request is refused */
155 #define ICMP6_NI_UNKNOWN 2 /* unknown Qtype */
156
157 #define ICMP6_ROUTER_RENUMBERING_COMMAND 0 /* rr command */
158 #define ICMP6_ROUTER_RENUMBERING_RESULT 1 /* rr result */
159 #define ICMP6_ROUTER_RENUMBERING_SEQNUM_RESET 255 /* rr seq num reset */
160
161 /* Used in kernel only */
162 #define ND_REDIRECT_ONLINK 0 /* redirect to an on-link node */
163 #define ND_REDIRECT_ROUTER 1 /* redirect to a better router */
164
165 /*
166 * Multicast Listener Discovery
167 */
168 struct mld6_hdr {
169 struct icmp6_hdr mld6_hdr;
170 nd_ipv6 mld6_addr; /* multicast address */
171 };
172
173 #define mld6_type mld6_hdr.icmp6_type
174 #define mld6_code mld6_hdr.icmp6_code
175 #define mld6_cksum mld6_hdr.icmp6_cksum
176 #define mld6_maxdelay mld6_hdr.icmp6_data16[0]
177 #define mld6_reserved mld6_hdr.icmp6_data16[1]
178
179 #define MLD_MINLEN 24
180 #define MLDV2_MINLEN 28
181
182 /*
183 * Neighbor Discovery
184 */
185
186 struct nd_router_solicit { /* router solicitation */
187 struct icmp6_hdr nd_rs_hdr;
188 /* could be followed by options */
189 };
190
191 #define nd_rs_type nd_rs_hdr.icmp6_type
192 #define nd_rs_code nd_rs_hdr.icmp6_code
193 #define nd_rs_cksum nd_rs_hdr.icmp6_cksum
194 #define nd_rs_reserved nd_rs_hdr.icmp6_data32[0]
195
196 struct nd_router_advert { /* router advertisement */
197 struct icmp6_hdr nd_ra_hdr;
198 nd_uint32_t nd_ra_reachable; /* reachable time */
199 nd_uint32_t nd_ra_retransmit; /* retransmit timer */
200 /* could be followed by options */
201 };
202
203 #define nd_ra_type nd_ra_hdr.icmp6_type
204 #define nd_ra_code nd_ra_hdr.icmp6_code
205 #define nd_ra_cksum nd_ra_hdr.icmp6_cksum
206 #define nd_ra_curhoplimit nd_ra_hdr.icmp6_data8[0]
207 #define nd_ra_flags_reserved nd_ra_hdr.icmp6_data8[1]
208 #define ND_RA_FLAG_MANAGED 0x80
209 #define ND_RA_FLAG_OTHER 0x40
210 #define ND_RA_FLAG_HOME_AGENT 0x20
211 #define ND_RA_FLAG_IPV6ONLY 0x02
212
213 /*
214 * Router preference values based on draft-draves-ipngwg-router-selection-01.
215 * These are non-standard definitions.
216 */
217 #define ND_RA_FLAG_RTPREF_MASK 0x18 /* 00011000 */
218
219 #define ND_RA_FLAG_RTPREF_HIGH 0x08 /* 00001000 */
220 #define ND_RA_FLAG_RTPREF_MEDIUM 0x00 /* 00000000 */
221 #define ND_RA_FLAG_RTPREF_LOW 0x18 /* 00011000 */
222 #define ND_RA_FLAG_RTPREF_RSV 0x10 /* 00010000 */
223
224 #define nd_ra_router_lifetime nd_ra_hdr.icmp6_data16[1]
225
226 struct nd_neighbor_solicit { /* neighbor solicitation */
227 struct icmp6_hdr nd_ns_hdr;
228 nd_ipv6 nd_ns_target; /*target address */
229 /* could be followed by options */
230 };
231
232 #define nd_ns_type nd_ns_hdr.icmp6_type
233 #define nd_ns_code nd_ns_hdr.icmp6_code
234 #define nd_ns_cksum nd_ns_hdr.icmp6_cksum
235 #define nd_ns_reserved nd_ns_hdr.icmp6_data32[0]
236
237 struct nd_neighbor_advert { /* neighbor advertisement */
238 struct icmp6_hdr nd_na_hdr;
239 nd_ipv6 nd_na_target; /* target address */
240 /* could be followed by options */
241 };
242
243 #define nd_na_type nd_na_hdr.icmp6_type
244 #define nd_na_code nd_na_hdr.icmp6_code
245 #define nd_na_cksum nd_na_hdr.icmp6_cksum
246 #define nd_na_flags_reserved nd_na_hdr.icmp6_data32[0]
247
248 #define ND_NA_FLAG_ROUTER 0x80000000
249 #define ND_NA_FLAG_SOLICITED 0x40000000
250 #define ND_NA_FLAG_OVERRIDE 0x20000000
251
252 struct nd_redirect { /* redirect */
253 struct icmp6_hdr nd_rd_hdr;
254 nd_ipv6 nd_rd_target; /* target address */
255 nd_ipv6 nd_rd_dst; /* destination address */
256 /* could be followed by options */
257 };
258
259 #define nd_rd_type nd_rd_hdr.icmp6_type
260 #define nd_rd_code nd_rd_hdr.icmp6_code
261 #define nd_rd_cksum nd_rd_hdr.icmp6_cksum
262 #define nd_rd_reserved nd_rd_hdr.icmp6_data32[0]
263
264 struct nd_opt_hdr { /* Neighbor discovery option header */
265 nd_uint8_t nd_opt_type;
266 nd_uint8_t nd_opt_len;
267 /* followed by option specific data*/
268 };
269
270 #define ND_OPT_SOURCE_LINKADDR 1
271 #define ND_OPT_TARGET_LINKADDR 2
272 #define ND_OPT_PREFIX_INFORMATION 3
273 #define ND_OPT_REDIRECTED_HEADER 4
274 #define ND_OPT_MTU 5
275 #define ND_OPT_ADVINTERVAL 7
276 #define ND_OPT_HOMEAGENT_INFO 8
277 #define ND_OPT_ROUTE_INFO 24 /* RFC4191 */
278 #define ND_OPT_RDNSS 25
279 #define ND_OPT_DNSSL 31
280
281 struct nd_opt_prefix_info { /* prefix information */
282 nd_uint8_t nd_opt_pi_type;
283 nd_uint8_t nd_opt_pi_len;
284 nd_uint8_t nd_opt_pi_prefix_len;
285 nd_uint8_t nd_opt_pi_flags_reserved;
286 nd_uint32_t nd_opt_pi_valid_time;
287 nd_uint32_t nd_opt_pi_preferred_time;
288 nd_uint32_t nd_opt_pi_reserved2;
289 nd_ipv6 nd_opt_pi_prefix;
290 };
291
292 #define ND_OPT_PI_FLAG_ONLINK 0x80
293 #define ND_OPT_PI_FLAG_AUTO 0x40
294 #define ND_OPT_PI_FLAG_ROUTER 0x20 /*2292bis*/
295
296 struct nd_opt_rd_hdr { /* redirected header */
297 nd_uint8_t nd_opt_rh_type;
298 nd_uint8_t nd_opt_rh_len;
299 nd_uint16_t nd_opt_rh_reserved1;
300 nd_uint32_t nd_opt_rh_reserved2;
301 /* followed by IP header and data */
302 };
303
304 struct nd_opt_mtu { /* MTU option */
305 nd_uint8_t nd_opt_mtu_type;
306 nd_uint8_t nd_opt_mtu_len;
307 nd_uint16_t nd_opt_mtu_reserved;
308 nd_uint32_t nd_opt_mtu_mtu;
309 };
310
311 struct nd_opt_rdnss { /* RDNSS RFC 6106 5.1 */
312 nd_uint8_t nd_opt_rdnss_type;
313 nd_uint8_t nd_opt_rdnss_len;
314 nd_uint16_t nd_opt_rdnss_reserved;
315 nd_uint32_t nd_opt_rdnss_lifetime;
316 nd_ipv6 nd_opt_rdnss_addr[1]; /* variable-length */
317 };
318
319 struct nd_opt_dnssl { /* DNSSL RFC 6106 5.2 */
320 nd_uint8_t nd_opt_dnssl_type;
321 nd_uint8_t nd_opt_dnssl_len;
322 nd_uint16_t nd_opt_dnssl_reserved;
323 nd_uint32_t nd_opt_dnssl_lifetime;
324 /* followed by list of DNS search domains, variable-length */
325 };
326
327 struct nd_opt_advinterval { /* Advertisement interval option */
328 nd_uint8_t nd_opt_adv_type;
329 nd_uint8_t nd_opt_adv_len;
330 nd_uint16_t nd_opt_adv_reserved;
331 nd_uint32_t nd_opt_adv_interval;
332 };
333
334 struct nd_opt_homeagent_info { /* Home Agent info */
335 nd_uint8_t nd_opt_hai_type;
336 nd_uint8_t nd_opt_hai_len;
337 nd_uint16_t nd_opt_hai_reserved;
338 nd_uint16_t nd_opt_hai_preference;
339 nd_uint16_t nd_opt_hai_lifetime;
340 };
341
342 struct nd_opt_route_info { /* route info */
343 nd_uint8_t nd_opt_rti_type;
344 nd_uint8_t nd_opt_rti_len;
345 nd_uint8_t nd_opt_rti_prefixlen;
346 nd_uint8_t nd_opt_rti_flags;
347 nd_uint32_t nd_opt_rti_lifetime;
348 /* prefix follows */
349 };
350
351 /*
352 * icmp6 namelookup
353 */
354
355 struct icmp6_namelookup {
356 struct icmp6_hdr icmp6_nl_hdr;
357 nd_byte icmp6_nl_nonce[8];
358 nd_int32_t icmp6_nl_ttl;
359 #if 0
360 nd_uint8_t icmp6_nl_len;
361 nd_byte icmp6_nl_name[3];
362 #endif
363 /* could be followed by options */
364 };
365
366 /*
367 * icmp6 node information
368 */
369 struct icmp6_nodeinfo {
370 struct icmp6_hdr icmp6_ni_hdr;
371 nd_byte icmp6_ni_nonce[8];
372 /* could be followed by reply data */
373 };
374
375 #define ni_type icmp6_ni_hdr.icmp6_type
376 #define ni_code icmp6_ni_hdr.icmp6_code
377 #define ni_cksum icmp6_ni_hdr.icmp6_cksum
378 #define ni_qtype icmp6_ni_hdr.icmp6_data16[0]
379 #define ni_flags icmp6_ni_hdr.icmp6_data16[1]
380
381 #define NI_QTYPE_NOOP 0 /* NOOP */
382 #define NI_QTYPE_SUPTYPES 1 /* Supported Qtypes (Obsolete) */
383 #define NI_QTYPE_NODENAME 2 /* Node Name */
384 #define NI_QTYPE_NODEADDR 3 /* Node Addresses */
385 #define NI_QTYPE_IPV4ADDR 4 /* IPv4 Addresses */
386
387 #define NI_NODEADDR_FLAG_TRUNCATE 0x0001
388 #define NI_NODEADDR_FLAG_ALL 0x0002
389 #define NI_NODEADDR_FLAG_COMPAT 0x0004
390 #define NI_NODEADDR_FLAG_LINKLOCAL 0x0008
391 #define NI_NODEADDR_FLAG_SITELOCAL 0x0010
392 #define NI_NODEADDR_FLAG_GLOBAL 0x0020
393 #define NI_NODEADDR_FLAG_ANYCAST 0x0040 /* just experimental. not in spec */
394
395 struct ni_reply_fqdn {
396 nd_uint32_t ni_fqdn_ttl; /* TTL */
397 nd_uint8_t ni_fqdn_namelen; /* length in octets of the FQDN */
398 nd_byte ni_fqdn_name[3]; /* XXX: alignment */
399 };
400
401 /*
402 * Router Renumbering. as router-renum-08.txt
403 */
404 struct icmp6_router_renum { /* router renumbering header */
405 struct icmp6_hdr rr_hdr;
406 nd_uint8_t rr_segnum;
407 nd_uint8_t rr_flags;
408 nd_uint16_t rr_maxdelay;
409 nd_uint32_t rr_reserved;
410 };
411 #define ICMP6_RR_FLAGS_TEST 0x80
412 #define ICMP6_RR_FLAGS_REQRESULT 0x40
413 #define ICMP6_RR_FLAGS_FORCEAPPLY 0x20
414 #define ICMP6_RR_FLAGS_SPECSITE 0x10
415 #define ICMP6_RR_FLAGS_PREVDONE 0x08
416
417 #define rr_type rr_hdr.icmp6_type
418 #define rr_code rr_hdr.icmp6_code
419 #define rr_cksum rr_hdr.icmp6_cksum
420 #define rr_seqnum rr_hdr.icmp6_data32[0]
421
422 struct rr_pco_match { /* match prefix part */
423 nd_uint8_t rpm_code;
424 nd_uint8_t rpm_len;
425 nd_uint8_t rpm_ordinal;
426 nd_uint8_t rpm_matchlen;
427 nd_uint8_t rpm_minlen;
428 nd_uint8_t rpm_maxlen;
429 nd_uint16_t rpm_reserved;
430 nd_ipv6 rpm_prefix;
431 };
432
433 #define RPM_PCO_ADD 1
434 #define RPM_PCO_CHANGE 2
435 #define RPM_PCO_SETGLOBAL 3
436 #define RPM_PCO_MAX 4
437
438 struct rr_pco_use { /* use prefix part */
439 nd_uint8_t rpu_uselen;
440 nd_uint8_t rpu_keeplen;
441 nd_uint8_t rpu_ramask;
442 nd_uint8_t rpu_raflags;
443 nd_uint32_t rpu_vltime;
444 nd_uint32_t rpu_pltime;
445 nd_uint32_t rpu_flags;
446 nd_ipv6 rpu_prefix;
447 };
448 #define ICMP6_RR_PCOUSE_RAFLAGS_ONLINK 0x80
449 #define ICMP6_RR_PCOUSE_RAFLAGS_AUTO 0x40
450
451 /* network endian */
452 #define ICMP6_RR_PCOUSE_FLAGS_DECRVLTIME ((uint32_t)htonl(0x80000000))
453 #define ICMP6_RR_PCOUSE_FLAGS_DECRPLTIME ((uint32_t)htonl(0x40000000))
454
455 struct rr_result { /* router renumbering result message */
456 nd_uint16_t rrr_flags;
457 nd_uint8_t rrr_ordinal;
458 nd_uint8_t rrr_matchedlen;
459 nd_uint32_t rrr_ifid;
460 nd_ipv6 rrr_prefix;
461 };
462 /* network endian */
463 #define ICMP6_RR_RESULT_FLAGS_OOB ((uint16_t)htons(0x0002))
464 #define ICMP6_RR_RESULT_FLAGS_FORBIDDEN ((uint16_t)htons(0x0001))
465
466 static const char *get_rtpref(u_int);
467 static const char *get_lifetime(uint32_t);
468 static void print_lladdr(netdissect_options *ndo, const u_char *, size_t);
469 static int icmp6_opt_print(netdissect_options *ndo, const u_char *, int);
470 static void mld6_print(netdissect_options *ndo, const u_char *);
471 static void mldv2_report_print(netdissect_options *ndo, const u_char *, u_int);
472 static void mldv2_query_print(netdissect_options *ndo, const u_char *, u_int);
473 static const struct udphdr *get_upperlayer(netdissect_options *ndo, const u_char *, u_int *);
474 static void dnsname_print(netdissect_options *ndo, const u_char *, const u_char *);
475 static void icmp6_nodeinfo_print(netdissect_options *ndo, u_int, const u_char *, const u_char *);
476 static void icmp6_rrenum_print(netdissect_options *ndo, const u_char *, const u_char *);
477
478 /*
479 * DIO: Updated to RFC6550, as published in 2012: section 6. (page 30)
480 */
481
482 #define ND_RPL_MESSAGE 155 /* 0x9B */
483
484 enum ND_RPL_CODE {
485 ND_RPL_DAG_IS=0x00,
486 ND_RPL_DAG_IO=0x01,
487 ND_RPL_DAO =0x02,
488 ND_RPL_DAO_ACK=0x03,
489 ND_RPL_SEC_DAG_IS = 0x80,
490 ND_RPL_SEC_DAG_IO = 0x81,
491 ND_RPL_SEC_DAG = 0x82,
492 ND_RPL_SEC_DAG_ACK= 0x83,
493 ND_RPL_SEC_CONSIST= 0x8A
494 };
495
496 enum ND_RPL_DIO_FLAGS {
497 ND_RPL_DIO_GROUNDED = 0x80,
498 ND_RPL_DIO_DATRIG = 0x40,
499 ND_RPL_DIO_DASUPPORT= 0x20,
500 ND_RPL_DIO_RES4 = 0x10,
501 ND_RPL_DIO_RES3 = 0x08,
502 ND_RPL_DIO_PRF_MASK = 0x07 /* 3-bit preference */
503 };
504
505 #define DAGID_LEN 16
506
507 /* section 6 of draft-ietf-roll-rpl-19 */
508 struct nd_rpl_security {
509 nd_uint8_t rpl_sec_t_reserved; /* bit 7 is T-bit */
510 nd_uint8_t rpl_sec_algo;
511 nd_uint16_t rpl_sec_kim_lvl_flags; /* bit 15/14, KIM */
512 /* bit 10-8, LVL, bit 7-0 flags */
513 nd_uint32_t rpl_sec_counter;
514 #if 0
515 nd_byte rpl_sec_ki[0]; /* depends upon kim */
516 #endif
517 };
518
519 /* section 6.2.1, DODAG Information Solicitation (DIS_IS) */
520 struct nd_rpl_dis_is {
521 nd_uint8_t rpl_dis_flags;
522 nd_uint8_t rpl_dis_reserved;
523 #if 0
524 nd_byte rpl_dis_options[0];
525 #endif
526 };
527
528 /* section 6.3.1, DODAG Information Object (DIO) */
529 struct nd_rpl_dio {
530 nd_uint8_t rpl_instanceid;
531 nd_uint8_t rpl_version;
532 nd_uint16_t rpl_dagrank;
533 nd_uint8_t rpl_mopprf; /* bit 7=G, 5-3=MOP, 2-0=PRF */
534 nd_uint8_t rpl_dtsn; /* Dest. Advertisement Trigger Sequence Number */
535 nd_uint8_t rpl_flags; /* no flags defined yet */
536 nd_uint8_t rpl_resv1;
537 nd_byte rpl_dagid[DAGID_LEN];
538 };
539 #define RPL_DIO_GROUND_FLAG 0x80
540 #define RPL_DIO_MOP_SHIFT 3
541 #define RPL_DIO_MOP_MASK (7 << RPL_DIO_MOP_SHIFT)
542 #define RPL_DIO_PRF_SHIFT 0
543 #define RPL_DIO_PRF_MASK (7 << RPL_DIO_PRF_SHIFT)
544 #define RPL_DIO_GROUNDED(X) ((X)&RPL_DIO_GROUND_FLAG)
545 #define RPL_DIO_MOP(X) (enum RPL_DIO_MOP)(((X)&RPL_DIO_MOP_MASK) >> RPL_DIO_MOP_SHIFT)
546 #define RPL_DIO_PRF(X) (((X)&RPL_DIO_PRF_MASK) >> RPL_DIO_PRF_SHIFT)
547
548 enum RPL_DIO_MOP {
549 RPL_DIO_NONSTORING= 0x0,
550 RPL_DIO_STORING = 0x1,
551 RPL_DIO_NONSTORING_MULTICAST = 0x2,
552 RPL_DIO_STORING_MULTICAST = 0x3
553 };
554
555 enum RPL_SUBOPT {
556 RPL_OPT_PAD1 = 0,
557 RPL_OPT_PADN = 1,
558 RPL_DIO_METRICS = 2,
559 RPL_DIO_ROUTINGINFO = 3,
560 RPL_DIO_CONFIG = 4,
561 RPL_DAO_RPLTARGET = 5,
562 RPL_DAO_TRANSITINFO = 6,
563 RPL_DIO_DESTPREFIX = 8,
564 RPL_DAO_RPLTARGET_DESC=9
565 };
566
567 struct rpl_genoption {
568 nd_uint8_t rpl_dio_type;
569 nd_uint8_t rpl_dio_len; /* suboption length, not including type/len */
570 };
571 #define RPL_GENOPTION_LEN 2
572
573 #define RPL_DIO_LIFETIME_INFINITE 0xffffffff
574 #define RPL_DIO_LIFETIME_DISCONNECT 0
575
576 struct rpl_dio_destprefix {
577 nd_uint8_t rpl_dio_type;
578 nd_uint8_t rpl_dio_len;
579 nd_uint8_t rpl_dio_prefixlen; /* in bits */
580 nd_uint8_t rpl_dio_prf; /* flags, including Route Preference */
581 nd_uint32_t rpl_dio_prefixlifetime; /* in seconds */
582 #if 0
583 nd_byte rpl_dio_prefix[0]; /* variable number of bytes */
584 #endif
585 };
586
587 /* section 6.4.1, DODAG Information Object (DIO) */
588 struct nd_rpl_dao {
589 nd_uint8_t rpl_instanceid;
590 nd_uint8_t rpl_flags; /* bit 7=K, 6=D */
591 nd_uint8_t rpl_resv;
592 nd_uint8_t rpl_daoseq;
593 nd_byte rpl_dagid[DAGID_LEN]; /* present when D set. */
594 };
595 #define ND_RPL_DAO_MIN_LEN 4 /* length without DAGID */
596
597 /* indicates if this DAO is to be acK'ed */
598 #define RPL_DAO_K_SHIFT 7
599 #define RPL_DAO_K_MASK (1 << RPL_DAO_K_SHIFT)
600 #define RPL_DAO_K(X) (((X)&RPL_DAO_K_MASK) >> RPL_DAO_K_SHIFT)
601
602 /* indicates if the DAGID is present */
603 #define RPL_DAO_D_SHIFT 6
604 #define RPL_DAO_D_MASK (1 << RPL_DAO_D_SHIFT)
605 #define RPL_DAO_D(X) (((X)&RPL_DAO_D_MASK) >> RPL_DAO_D_SHIFT)
606
607 struct rpl_dao_target {
608 nd_uint8_t rpl_dao_type;
609 nd_uint8_t rpl_dao_len;
610 nd_uint8_t rpl_dao_flags; /* unused */
611 nd_uint8_t rpl_dao_prefixlen; /* in bits */
612 #if 0
613 nd_byte rpl_dao_prefix[0]; /* variable number of bytes */
614 #endif
615 };
616
617 /* section 6.5.1, Destination Advertisement Object Acknowledgement (DAO-ACK) */
618 struct nd_rpl_daoack {
619 nd_uint8_t rpl_instanceid;
620 nd_uint8_t rpl_flags; /* bit 7=D */
621 nd_uint8_t rpl_daoseq;
622 nd_uint8_t rpl_status;
623 nd_byte rpl_dagid[DAGID_LEN]; /* present when D set. */
624 };
625 #define ND_RPL_DAOACK_MIN_LEN 4 /* length without DAGID */
626 /* indicates if the DAGID is present */
627 #define RPL_DAOACK_D_SHIFT 7
628 #define RPL_DAOACK_D_MASK (1 << RPL_DAOACK_D_SHIFT)
629 #define RPL_DAOACK_D(X) (((X)&RPL_DAOACK_D_MASK) >> RPL_DAOACK_D_SHIFT)
630
631 static const struct tok icmp6_type_values[] = {
632 { ICMP6_DST_UNREACH, "destination unreachable"},
633 { ICMP6_PACKET_TOO_BIG, "packet too big"},
634 { ICMP6_TIME_EXCEEDED, "time exceeded in-transit"},
635 { ICMP6_PARAM_PROB, "parameter problem"},
636 { ICMP6_ECHO_REQUEST, "echo request"},
637 { ICMP6_ECHO_REPLY, "echo reply"},
638 { MLD6_LISTENER_QUERY, "multicast listener query"},
639 { MLD6_LISTENER_REPORT, "multicast listener report"},
640 { MLD6_LISTENER_DONE, "multicast listener done"},
641 { ND_ROUTER_SOLICIT, "router solicitation"},
642 { ND_ROUTER_ADVERT, "router advertisement"},
643 { ND_NEIGHBOR_SOLICIT, "neighbor solicitation"},
644 { ND_NEIGHBOR_ADVERT, "neighbor advertisement"},
645 { ND_REDIRECT, "redirect"},
646 { ICMP6_ROUTER_RENUMBERING, "router renumbering"},
647 { IND_SOLICIT, "inverse neighbor solicitation"},
648 { IND_ADVERT, "inverse neighbor advertisement"},
649 { MLDV2_LISTENER_REPORT, "multicast listener report v2"},
650 { ICMP6_HADISCOV_REQUEST, "ha discovery request"},
651 { ICMP6_HADISCOV_REPLY, "ha discovery reply"},
652 { ICMP6_MOBILEPREFIX_SOLICIT, "mobile router solicitation"},
653 { ICMP6_MOBILEPREFIX_ADVERT, "mobile router advertisement"},
654 { ICMP6_NI_QUERY, "node information query"},
655 { ICMP6_NI_REPLY, "node information reply"},
656 { MLD6_MTRACE, "mtrace message"},
657 { MLD6_MTRACE_RESP, "mtrace response"},
658 { ND_RPL_MESSAGE, "RPL"},
659 { 0, NULL }
660 };
661
662 static const struct tok icmp6_dst_unreach_code_values[] = {
663 { ICMP6_DST_UNREACH_NOROUTE, "unreachable route" },
664 { ICMP6_DST_UNREACH_ADMIN, " unreachable prohibited"},
665 { ICMP6_DST_UNREACH_BEYONDSCOPE, "beyond scope"},
666 { ICMP6_DST_UNREACH_ADDR, "unreachable address"},
667 { ICMP6_DST_UNREACH_NOPORT, "unreachable port"},
668 { 0, NULL }
669 };
670
671 static const struct tok icmp6_opt_pi_flag_values[] = {
672 { ND_OPT_PI_FLAG_ONLINK, "onlink" },
673 { ND_OPT_PI_FLAG_AUTO, "auto" },
674 { ND_OPT_PI_FLAG_ROUTER, "router" },
675 { 0, NULL }
676 };
677
678 static const struct tok icmp6_opt_ra_flag_values[] = {
679 { ND_RA_FLAG_MANAGED, "managed" },
680 { ND_RA_FLAG_OTHER, "other stateful"},
681 { ND_RA_FLAG_HOME_AGENT, "home agent"},
682 { ND_RA_FLAG_IPV6ONLY, "ipv6 only"},
683 { 0, NULL }
684 };
685
686 static const struct tok icmp6_nd_na_flag_values[] = {
687 { ND_NA_FLAG_ROUTER, "router" },
688 { ND_NA_FLAG_SOLICITED, "solicited" },
689 { ND_NA_FLAG_OVERRIDE, "override" },
690 { 0, NULL }
691 };
692
693 static const struct tok icmp6_opt_values[] = {
694 { ND_OPT_SOURCE_LINKADDR, "source link-address"},
695 { ND_OPT_TARGET_LINKADDR, "destination link-address"},
696 { ND_OPT_PREFIX_INFORMATION, "prefix info"},
697 { ND_OPT_REDIRECTED_HEADER, "redirected header"},
698 { ND_OPT_MTU, "mtu"},
699 { ND_OPT_RDNSS, "rdnss"},
700 { ND_OPT_DNSSL, "dnssl"},
701 { ND_OPT_ADVINTERVAL, "advertisement interval"},
702 { ND_OPT_HOMEAGENT_INFO, "homeagent information"},
703 { ND_OPT_ROUTE_INFO, "route info"},
704 { 0, NULL }
705 };
706
707 /* mldv2 report types */
708 static const struct tok mldv2report2str[] = {
709 { 1, "is_in" },
710 { 2, "is_ex" },
711 { 3, "to_in" },
712 { 4, "to_ex" },
713 { 5, "allow" },
714 { 6, "block" },
715 { 0, NULL }
716 };
717
718 static const char *
719 get_rtpref(u_int v)
720 {
721 static const char *rtpref_str[] = {
722 "medium", /* 00 */
723 "high", /* 01 */
724 "rsv", /* 10 */
725 "low" /* 11 */
726 };
727
728 return rtpref_str[((v & ND_RA_FLAG_RTPREF_MASK) >> 3) & 0xff];
729 }
730
731 static const char *
732 get_lifetime(uint32_t v)
733 {
734 static char buf[20];
735
736 if (v == (uint32_t)~0UL)
737 return "infinity";
738 else {
739 snprintf(buf, sizeof(buf), "%us", v);
740 return buf;
741 }
742 }
743
744 static void
745 print_lladdr(netdissect_options *ndo, const uint8_t *p, size_t l)
746 {
747 const uint8_t *ep, *q;
748
749 q = p;
750 ep = p + l;
751 while (l > 0 && q < ep) {
752 if (q > p)
753 ND_PRINT(":");
754 ND_PRINT("%02x", GET_U_1(q));
755 q++;
756 l--;
757 }
758 }
759
760 static uint16_t icmp6_cksum(netdissect_options *ndo, const struct ip6_hdr *ip6,
761 const struct icmp6_hdr *icp, u_int len)
762 {
763 return nextproto6_cksum(ndo, ip6, (const uint8_t *)(const void *)icp, len, len,
764 IPPROTO_ICMPV6);
765 }
766
767 static const struct tok rpl_mop_values[] = {
768 { RPL_DIO_NONSTORING, "nonstoring"},
769 { RPL_DIO_STORING, "storing"},
770 { RPL_DIO_NONSTORING_MULTICAST, "nonstoring-multicast"},
771 { RPL_DIO_STORING_MULTICAST, "storing-multicast"},
772 { 0, NULL},
773 };
774
775 static const struct tok rpl_subopt_values[] = {
776 { RPL_OPT_PAD1, "pad1"},
777 { RPL_OPT_PADN, "padN"},
778 { RPL_DIO_METRICS, "metrics"},
779 { RPL_DIO_ROUTINGINFO, "routinginfo"},
780 { RPL_DIO_CONFIG, "config"},
781 { RPL_DAO_RPLTARGET, "rpltarget"},
782 { RPL_DAO_TRANSITINFO, "transitinfo"},
783 { RPL_DIO_DESTPREFIX, "destprefix"},
784 { RPL_DAO_RPLTARGET_DESC, "rpltargetdesc"},
785 { 0, NULL},
786 };
787
788 static void
789 rpl_printopts(netdissect_options *ndo, const uint8_t *opts, u_int length)
790 {
791 const struct rpl_genoption *opt;
792 uint8_t dio_type;
793 u_int optlen;
794
795 while (length != 0) {
796 opt = (const struct rpl_genoption *)opts;
797 dio_type = GET_U_1(opt->rpl_dio_type);
798 if (dio_type == RPL_OPT_PAD1) {
799 optlen = 1;
800 ND_PRINT(" opt:pad1");
801 } else {
802 if (length < RPL_GENOPTION_LEN)
803 goto trunc;
804 optlen = GET_U_1(opt->rpl_dio_len)+RPL_GENOPTION_LEN;
805 ND_PRINT(" opt:%s len:%u ",
806 tok2str(rpl_subopt_values, "subopt:%u", dio_type),
807 optlen);
808 ND_TCHECK_LEN(opt, optlen);
809 if (length < optlen)
810 goto trunc;
811 if (ndo->ndo_vflag > 2) {
812 hex_print(ndo,
813 " ",
814 opts + RPL_GENOPTION_LEN, /* content of DIO option */
815 optlen - RPL_GENOPTION_LEN);
816 }
817 }
818 opts += optlen;
819 length -= optlen;
820 }
821 return;
822 trunc:
823 nd_print_trunc(ndo);
824 }
825
826 static void
827 rpl_dio_print(netdissect_options *ndo,
828 const u_char *bp, u_int length)
829 {
830 const struct nd_rpl_dio *dio = (const struct nd_rpl_dio *)bp;
831
832 ND_ICHECK_ZU(length, <, sizeof(struct nd_rpl_dio));
833 ND_PRINT(" [dagid:%s,seq:%u,instance:%u,rank:%u,%smop:%s,prf:%u]",
834 GET_IP6ADDR_STRING(dio->rpl_dagid),
835 GET_U_1(dio->rpl_dtsn),
836 GET_U_1(dio->rpl_instanceid),
837 GET_BE_U_2(dio->rpl_dagrank),
838 RPL_DIO_GROUNDED(GET_U_1(dio->rpl_mopprf)) ? "grounded,":"",
839 tok2str(rpl_mop_values, "mop%u",
840 RPL_DIO_MOP(GET_U_1(dio->rpl_mopprf))),
841 RPL_DIO_PRF(GET_U_1(dio->rpl_mopprf)));
842
843 if(ndo->ndo_vflag > 1) {
844 rpl_printopts(ndo, bp + sizeof(struct nd_rpl_dio),
845 length - sizeof(struct nd_rpl_dio));
846 }
847 return;
848 invalid:
849 nd_print_invalid(ndo);
850 }
851
852 static void
853 rpl_dao_print(netdissect_options *ndo,
854 const u_char *bp, u_int length)
855 {
856 const struct nd_rpl_dao *dao = (const struct nd_rpl_dao *)bp;
857 const char *dagid_str = "<elided>";
858 uint8_t rpl_flags;
859
860 ND_TCHECK_SIZE(dao);
861 if (length < ND_RPL_DAO_MIN_LEN)
862 goto tooshort;
863
864 bp += ND_RPL_DAO_MIN_LEN;
865 length -= ND_RPL_DAO_MIN_LEN;
866 rpl_flags = GET_U_1(dao->rpl_flags);
867 if(RPL_DAO_D(rpl_flags)) {
868 ND_TCHECK_LEN(dao->rpl_dagid, DAGID_LEN);
869 if (length < DAGID_LEN)
870 goto tooshort;
871 dagid_str = ip6addr_string (ndo, dao->rpl_dagid);
872 bp += DAGID_LEN;
873 length -= DAGID_LEN;
874 }
875
876 ND_PRINT(" [dagid:%s,seq:%u,instance:%u%s%s,flags:%02x]",
877 dagid_str,
878 GET_U_1(dao->rpl_daoseq),
879 GET_U_1(dao->rpl_instanceid),
880 RPL_DAO_K(rpl_flags) ? ",acK":"",
881 RPL_DAO_D(rpl_flags) ? ",Dagid":"",
882 rpl_flags);
883
884 if(ndo->ndo_vflag > 1) {
885 rpl_printopts(ndo, bp, length);
886 }
887 return;
888
889 trunc:
890 nd_print_trunc(ndo);
891 return;
892
893 tooshort:
894 ND_PRINT(" [|length too short]");
895 }
896
897 static void
898 rpl_daoack_print(netdissect_options *ndo,
899 const u_char *bp, u_int length)
900 {
901 const struct nd_rpl_daoack *daoack = (const struct nd_rpl_daoack *)bp;
902 const char *dagid_str = "<elided>";
903
904 ND_TCHECK_LEN(daoack, ND_RPL_DAOACK_MIN_LEN);
905 if (length < ND_RPL_DAOACK_MIN_LEN)
906 goto tooshort;
907
908 bp += ND_RPL_DAOACK_MIN_LEN;
909 length -= ND_RPL_DAOACK_MIN_LEN;
910 if(RPL_DAOACK_D(GET_U_1(daoack->rpl_flags))) {
911 ND_TCHECK_LEN(daoack->rpl_dagid, DAGID_LEN);
912 if (length < DAGID_LEN)
913 goto tooshort;
914 dagid_str = ip6addr_string (ndo, daoack->rpl_dagid);
915 bp += DAGID_LEN;
916 length -= DAGID_LEN;
917 }
918
919 ND_PRINT(" [dagid:%s,seq:%u,instance:%u,status:%u]",
920 dagid_str,
921 GET_U_1(daoack->rpl_daoseq),
922 GET_U_1(daoack->rpl_instanceid),
923 GET_U_1(daoack->rpl_status));
924
925 /* no officially defined options for DAOACK, but print any we find */
926 if(ndo->ndo_vflag > 1) {
927 rpl_printopts(ndo, bp, length);
928 }
929 return;
930
931 trunc:
932 nd_print_trunc(ndo);
933 return;
934
935 tooshort:
936 ND_PRINT(" [|dao-length too short]");
937 }
938
939 static void
940 rpl_print(netdissect_options *ndo,
941 uint8_t icmp6_code,
942 const u_char *bp, u_int length)
943 {
944 int secured = icmp6_code & 0x80;
945 int basecode= icmp6_code & 0x7f;
946
947 if(secured) {
948 ND_PRINT(", (SEC) [worktodo]");
949 /* XXX
950 * the next header pointer needs to move forward to
951 * skip the secure part.
952 */
953 return;
954 } else {
955 ND_PRINT(", (CLR)");
956 }
957
958 switch(basecode) {
959 case ND_RPL_DAG_IS:
960 ND_PRINT("DODAG Information Solicitation");
961 if(ndo->ndo_vflag) {
962 }
963 break;
964 case ND_RPL_DAG_IO:
965 ND_PRINT("DODAG Information Object");
966 if(ndo->ndo_vflag) {
967 rpl_dio_print(ndo, bp, length);
968 }
969 break;
970 case ND_RPL_DAO:
971 ND_PRINT("Destination Advertisement Object");
972 if(ndo->ndo_vflag) {
973 rpl_dao_print(ndo, bp, length);
974 }
975 break;
976 case ND_RPL_DAO_ACK:
977 ND_PRINT("Destination Advertisement Object Ack");
978 if(ndo->ndo_vflag) {
979 rpl_daoack_print(ndo, bp, length);
980 }
981 break;
982 default:
983 ND_PRINT("RPL message, unknown code %u",icmp6_code);
984 break;
985 }
986 return;
987
988 #if 0
989 trunc:
990 nd_print_trunc(ndo);
991 return;
992 #endif
993
994 }
995
996 void
997 icmp6_print(netdissect_options *ndo,
998 const u_char *bp, u_int length, const u_char *bp2, int fragmented)
999 {
1000 const struct icmp6_hdr *dp;
1001 uint8_t icmp6_type, icmp6_code;
1002 const struct ip6_hdr *ip;
1003 const struct ip6_hdr *oip;
1004 const struct udphdr *ouh;
1005 uint16_t dport;
1006 const u_char *ep;
1007 u_int prot;
1008
1009 ndo->ndo_protocol = "icmp6";
1010 dp = (const struct icmp6_hdr *)bp;
1011 ip = (const struct ip6_hdr *)bp2;
1012 oip = (const struct ip6_hdr *)(dp + 1);
1013 /* 'ep' points to the end of available data. */
1014 ep = ndo->ndo_snapend;
1015 if (length == 0) {
1016 ND_PRINT("ICMP6, length 0");
1017 nd_print_invalid(ndo);
1018 return;
1019 }
1020
1021 if (ndo->ndo_vflag && !fragmented) {
1022 uint16_t sum, udp_sum;
1023
1024 if (ND_TTEST_LEN(bp, length)) {
1025 udp_sum = GET_BE_U_2(dp->icmp6_cksum);
1026 sum = icmp6_cksum(ndo, ip, dp, length);
1027 if (sum != 0)
1028 ND_PRINT("[bad icmp6 cksum 0x%04x -> 0x%04x!] ",
1029 udp_sum,
1030 in_cksum_shouldbe(udp_sum, sum));
1031 else
1032 ND_PRINT("[icmp6 sum ok] ");
1033 }
1034 }
1035
1036 icmp6_type = GET_U_1(dp->icmp6_type);
1037 ND_PRINT("ICMP6, %s", tok2str(icmp6_type_values,"unknown icmp6 type (%u)",icmp6_type));
1038
1039 /* display cosmetics: print the packet length for printer that use the vflag now */
1040 if (ndo->ndo_vflag && (icmp6_type == ND_ROUTER_SOLICIT ||
1041 icmp6_type == ND_ROUTER_ADVERT ||
1042 icmp6_type == ND_NEIGHBOR_ADVERT ||
1043 icmp6_type == ND_NEIGHBOR_SOLICIT ||
1044 icmp6_type == ND_REDIRECT ||
1045 icmp6_type == ICMP6_HADISCOV_REPLY ||
1046 icmp6_type == ICMP6_MOBILEPREFIX_ADVERT ))
1047 ND_PRINT(", length %u", length);
1048
1049 icmp6_code = GET_U_1(dp->icmp6_code);
1050
1051 switch (icmp6_type) {
1052 case ICMP6_DST_UNREACH:
1053 ND_PRINT(", %s", tok2str(icmp6_dst_unreach_code_values,"unknown unreach code (%u)",icmp6_code));
1054 switch (icmp6_code) {
1055
1056 case ICMP6_DST_UNREACH_NOROUTE: /* fall through */
1057 case ICMP6_DST_UNREACH_ADMIN:
1058 case ICMP6_DST_UNREACH_ADDR:
1059 ND_PRINT(" %s",GET_IP6ADDR_STRING(oip->ip6_dst));
1060 break;
1061 case ICMP6_DST_UNREACH_BEYONDSCOPE:
1062 ND_PRINT(" %s, source address %s",
1063 GET_IP6ADDR_STRING(oip->ip6_dst),
1064 GET_IP6ADDR_STRING(oip->ip6_src));
1065 break;
1066 case ICMP6_DST_UNREACH_NOPORT:
1067 if ((ouh = get_upperlayer(ndo, (const u_char *)oip, &prot))
1068 == NULL)
1069 goto trunc;
1070
1071 dport = GET_BE_U_2(ouh->uh_dport);
1072 switch (prot) {
1073 case IPPROTO_TCP:
1074 ND_PRINT(", %s tcp port %s",
1075 GET_IP6ADDR_STRING(oip->ip6_dst),
1076 tcpport_string(ndo, dport));
1077 break;
1078 case IPPROTO_UDP:
1079 ND_PRINT(", %s udp port %s",
1080 GET_IP6ADDR_STRING(oip->ip6_dst),
1081 udpport_string(ndo, dport));
1082 break;
1083 default:
1084 ND_PRINT(", %s protocol %u port %u unreachable",
1085 GET_IP6ADDR_STRING(oip->ip6_dst),
1086 prot, dport);
1087 break;
1088 }
1089 break;
1090 default:
1091 if (ndo->ndo_vflag <= 1) {
1092 print_unknown_data(ndo, bp,"\n\t",length);
1093 return;
1094 }
1095 break;
1096 }
1097 break;
1098 case ICMP6_PACKET_TOO_BIG:
1099 ND_PRINT(", mtu %u", GET_BE_U_4(dp->icmp6_mtu));
1100 break;
1101 case ICMP6_TIME_EXCEEDED:
1102 switch (icmp6_code) {
1103 case ICMP6_TIME_EXCEED_TRANSIT:
1104 ND_PRINT(" for %s",
1105 GET_IP6ADDR_STRING(oip->ip6_dst));
1106 break;
1107 case ICMP6_TIME_EXCEED_REASSEMBLY:
1108 ND_PRINT(" (reassembly)");
1109 break;
1110 default:
1111 ND_PRINT(", unknown code (%u)", icmp6_code);
1112 break;
1113 }
1114 break;
1115 case ICMP6_PARAM_PROB:
1116 ND_TCHECK_16(oip->ip6_dst);
1117 switch (icmp6_code) {
1118 case ICMP6_PARAMPROB_HEADER:
1119 ND_PRINT(", erroneous - octet %u",
1120 GET_BE_U_4(dp->icmp6_pptr));
1121 break;
1122 case ICMP6_PARAMPROB_NEXTHEADER:
1123 ND_PRINT(", next header - octet %u",
1124 GET_BE_U_4(dp->icmp6_pptr));
1125 break;
1126 case ICMP6_PARAMPROB_OPTION:
1127 ND_PRINT(", option - octet %u",
1128 GET_BE_U_4(dp->icmp6_pptr));
1129 break;
1130 case ICMP6_PARAMPROB_FRAGHDRCHAIN:
1131 ND_PRINT(", incomplete header chain - octet %u",
1132 GET_BE_U_4(dp->icmp6_pptr));
1133 break;
1134 default:
1135 ND_PRINT(", code-#%u",
1136 icmp6_code);
1137 break;
1138 }
1139 break;
1140 case ICMP6_ECHO_REQUEST:
1141 case ICMP6_ECHO_REPLY:
1142 ND_PRINT(", id %u, seq %u", GET_BE_U_2(dp->icmp6_id),
1143 GET_BE_U_2(dp->icmp6_seq));
1144 break;
1145 case MLD6_LISTENER_QUERY:
1146 if (length == MLD_MINLEN) {
1147 mld6_print(ndo, (const u_char *)dp);
1148 } else if (length >= MLDV2_MINLEN) {
1149 ND_PRINT(" v2");
1150 mldv2_query_print(ndo, (const u_char *)dp, length);
1151 } else {
1152 ND_PRINT(" unknown-version (len %u) ", length);
1153 }
1154 break;
1155 case MLD6_LISTENER_REPORT:
1156 mld6_print(ndo, (const u_char *)dp);
1157 break;
1158 case MLD6_LISTENER_DONE:
1159 mld6_print(ndo, (const u_char *)dp);
1160 break;
1161 case ND_ROUTER_SOLICIT:
1162 #define RTSOLLEN 8
1163 if (ndo->ndo_vflag) {
1164 if (icmp6_opt_print(ndo, (const u_char *)dp + RTSOLLEN,
1165 length - RTSOLLEN) == -1)
1166 goto trunc;
1167 }
1168 break;
1169 case ND_ROUTER_ADVERT:
1170 #define RTADVLEN 16
1171 if (ndo->ndo_vflag) {
1172 const struct nd_router_advert *p;
1173
1174 p = (const struct nd_router_advert *)dp;
1175 ND_PRINT("\n\thop limit %u, Flags [%s]"
1176 ", pref %s, router lifetime %us, reachable time %ums, retrans timer %ums",
1177 GET_U_1(p->nd_ra_curhoplimit),
1178 bittok2str(icmp6_opt_ra_flag_values,"none",GET_U_1(p->nd_ra_flags_reserved)),
1179 get_rtpref(GET_U_1(p->nd_ra_flags_reserved)),
1180 GET_BE_U_2(p->nd_ra_router_lifetime),
1181 GET_BE_U_4(p->nd_ra_reachable),
1182 GET_BE_U_4(p->nd_ra_retransmit));
1183
1184 if (icmp6_opt_print(ndo, (const u_char *)dp + RTADVLEN,
1185 length - RTADVLEN) == -1)
1186 goto trunc;
1187 }
1188 break;
1189 case ND_NEIGHBOR_SOLICIT:
1190 {
1191 const struct nd_neighbor_solicit *p;
1192 p = (const struct nd_neighbor_solicit *)dp;
1193 ND_PRINT(", who has %s", GET_IP6ADDR_STRING(p->nd_ns_target));
1194 if (ndo->ndo_vflag) {
1195 #define NDSOLLEN 24
1196 if (icmp6_opt_print(ndo, (const u_char *)dp + NDSOLLEN,
1197 length - NDSOLLEN) == -1)
1198 goto trunc;
1199 }
1200 }
1201 break;
1202 case ND_NEIGHBOR_ADVERT:
1203 {
1204 const struct nd_neighbor_advert *p;
1205
1206 p = (const struct nd_neighbor_advert *)dp;
1207 ND_PRINT(", tgt is %s",
1208 GET_IP6ADDR_STRING(p->nd_na_target));
1209 if (ndo->ndo_vflag) {
1210 ND_PRINT(", Flags [%s]",
1211 bittok2str(icmp6_nd_na_flag_values,
1212 "none",
1213 GET_BE_U_4(p->nd_na_flags_reserved)));
1214 #define NDADVLEN 24
1215 if (icmp6_opt_print(ndo, (const u_char *)dp + NDADVLEN,
1216 length - NDADVLEN) == -1)
1217 goto trunc;
1218 #undef NDADVLEN
1219 }
1220 }
1221 break;
1222 case ND_REDIRECT:
1223 {
1224 const struct nd_redirect *p;
1225
1226 p = (const struct nd_redirect *)dp;
1227 ND_PRINT(", %s", GET_IP6ADDR_STRING(p->nd_rd_dst));
1228 ND_PRINT(" to %s", GET_IP6ADDR_STRING(p->nd_rd_target));
1229 #define REDIRECTLEN 40
1230 if (ndo->ndo_vflag) {
1231 if (icmp6_opt_print(ndo, (const u_char *)dp + REDIRECTLEN,
1232 length - REDIRECTLEN) == -1)
1233 goto trunc;
1234 #undef REDIRECTLEN
1235 }
1236 }
1237 break;
1238 case ICMP6_ROUTER_RENUMBERING:
1239 icmp6_rrenum_print(ndo, bp, ep);
1240 break;
1241 case ICMP6_NI_QUERY:
1242 case ICMP6_NI_REPLY:
1243 icmp6_nodeinfo_print(ndo, length, bp, ep);
1244 break;
1245 case IND_SOLICIT:
1246 case IND_ADVERT:
1247 break;
1248 case ICMP6_V2_MEMBERSHIP_REPORT:
1249 mldv2_report_print(ndo, (const u_char *) dp, length);
1250 break;
1251 case ICMP6_MOBILEPREFIX_SOLICIT: /* fall through */
1252 case ICMP6_HADISCOV_REQUEST:
1253 ND_PRINT(", id 0x%04x", GET_BE_U_2(dp->icmp6_data16[0]));
1254 break;
1255 case ICMP6_HADISCOV_REPLY:
1256 if (ndo->ndo_vflag) {
1257 const u_char *cp;
1258 const u_char *p;
1259
1260 ND_PRINT(", id 0x%04x",
1261 GET_BE_U_2(dp->icmp6_data16[0]));
1262 cp = (const u_char *)dp +
1263 ND_MIN(length, ND_BYTES_AVAILABLE_AFTER(dp));
1264 p = (const u_char *)(dp + 1);
1265 while (p < cp) {
1266 ND_PRINT(", %s", GET_IP6ADDR_STRING(p));
1267 p += 16;
1268 }
1269 }
1270 break;
1271 case ICMP6_MOBILEPREFIX_ADVERT:
1272 if (ndo->ndo_vflag) {
1273 uint16_t flags;
1274
1275 ND_PRINT(", id 0x%04x",
1276 GET_BE_U_2(dp->icmp6_data16[0]));
1277 flags = GET_BE_U_2(dp->icmp6_data16[1]);
1278 if (flags & 0xc000)
1279 ND_PRINT(" ");
1280 if (flags & 0x8000)
1281 ND_PRINT("M");
1282 if (flags & 0x4000)
1283 ND_PRINT("O");
1284 #define MPADVLEN 8
1285 if (icmp6_opt_print(ndo, (const u_char *)dp + MPADVLEN,
1286 length - MPADVLEN) == -1)
1287 goto trunc;
1288 }
1289 break;
1290 case ND_RPL_MESSAGE:
1291 /* plus 4, because struct icmp6_hdr contains 4 bytes of icmp payload */
1292 rpl_print(ndo, icmp6_code, dp->icmp6_data, length-sizeof(struct icmp6_hdr)+4);
1293 break;
1294 default:
1295 ND_PRINT(", length %u", length);
1296 if (ndo->ndo_vflag <= 1)
1297 print_unknown_data(ndo, bp,"\n\t", length);
1298 return;
1299 }
1300 if (!ndo->ndo_vflag)
1301 ND_PRINT(", length %u", length);
1302 return;
1303 trunc:
1304 nd_print_trunc(ndo);
1305 }
1306
1307 static const struct udphdr *
1308 get_upperlayer(netdissect_options *ndo, const u_char *bp, u_int *prot)
1309 {
1310 const u_char *ep;
1311 const struct ip6_hdr *ip6 = (const struct ip6_hdr *)bp;
1312 const struct udphdr *uh;
1313 const struct ip6_hbh *hbh;
1314 const struct ip6_frag *fragh;
1315 const struct ah *ah;
1316 u_int nh;
1317 int hlen;
1318
1319 /* 'ep' points to the end of available data. */
1320 ep = ndo->ndo_snapend;
1321
1322 if (!ND_TTEST_1(ip6->ip6_nxt))
1323 return NULL;
1324
1325 nh = GET_U_1(ip6->ip6_nxt);
1326 hlen = sizeof(struct ip6_hdr);
1327
1328 while (bp < ep) {
1329 bp += hlen;
1330
1331 switch(nh) {
1332 case IPPROTO_UDP:
1333 case IPPROTO_TCP:
1334 uh = (const struct udphdr *)bp;
1335 if (ND_TTEST_2(uh->uh_dport)) {
1336 *prot = nh;
1337 return(uh);
1338 } else
1339 return(NULL);
1340 /* NOTREACHED */
1341
1342 case IPPROTO_HOPOPTS:
1343 case IPPROTO_DSTOPTS:
1344 case IPPROTO_ROUTING:
1345 hbh = (const struct ip6_hbh *)bp;
1346 if (!ND_TTEST_1(hbh->ip6h_len))
1347 return(NULL);
1348 nh = GET_U_1(hbh->ip6h_nxt);
1349 hlen = (GET_U_1(hbh->ip6h_len) + 1) << 3;
1350 break;
1351
1352 case IPPROTO_FRAGMENT: /* this should be odd, but try anyway */
1353 fragh = (const struct ip6_frag *)bp;
1354 if (!ND_TTEST_2(fragh->ip6f_offlg))
1355 return(NULL);
1356 /* fragments with non-zero offset are meaningless */
1357 if ((GET_BE_U_2(fragh->ip6f_offlg) & IP6F_OFF_MASK) != 0)
1358 return(NULL);
1359 nh = GET_U_1(fragh->ip6f_nxt);
1360 hlen = sizeof(struct ip6_frag);
1361 break;
1362
1363 case IPPROTO_AH:
1364 ah = (const struct ah *)bp;
1365 if (!ND_TTEST_1(ah->ah_len))
1366 return(NULL);
1367 nh = GET_U_1(ah->ah_nxt);
1368 hlen = (GET_U_1(ah->ah_len) + 2) << 2;
1369 break;
1370
1371 default: /* unknown or undecodable header */
1372 *prot = nh; /* meaningless, but set here anyway */
1373 return(NULL);
1374 }
1375 }
1376
1377 return(NULL); /* should be notreached, though */
1378 }
1379
1380 static int
1381 icmp6_opt_print(netdissect_options *ndo, const u_char *bp, int resid)
1382 {
1383 const struct nd_opt_hdr *op;
1384 uint8_t opt_type;
1385 u_int opt_len;
1386 const struct nd_opt_prefix_info *opp;
1387 const struct nd_opt_mtu *opm;
1388 const struct nd_opt_rdnss *oprd;
1389 const struct nd_opt_dnssl *opds;
1390 const struct nd_opt_advinterval *opa;
1391 const struct nd_opt_homeagent_info *oph;
1392 const struct nd_opt_route_info *opri;
1393 const u_char *cp, *ep, *domp;
1394 nd_ipv6 in6;
1395 size_t l;
1396 u_int i;
1397
1398 cp = bp;
1399 /* 'ep' points to the end of available data. */
1400 ep = ndo->ndo_snapend;
1401
1402 while (cp < ep) {
1403 op = (const struct nd_opt_hdr *)cp;
1404
1405 ND_TCHECK_1(op->nd_opt_len);
1406 if (resid <= 0)
1407 return 0;
1408 opt_type = GET_U_1(op->nd_opt_type);
1409 opt_len = GET_U_1(op->nd_opt_len);
1410 if (opt_len == 0)
1411 goto trunc;
1412 if (cp + (opt_len << 3) > ep)
1413 goto trunc;
1414
1415 ND_PRINT("\n\t %s option (%u), length %u (%u): ",
1416 tok2str(icmp6_opt_values, "unknown", opt_type),
1417 opt_type,
1418 opt_len << 3,
1419 opt_len);
1420
1421 switch (opt_type) {
1422 case ND_OPT_SOURCE_LINKADDR:
1423 l = (opt_len << 3) - 2;
1424 print_lladdr(ndo, cp + 2, l);
1425 break;
1426 case ND_OPT_TARGET_LINKADDR:
1427 l = (opt_len << 3) - 2;
1428 print_lladdr(ndo, cp + 2, l);
1429 break;
1430 case ND_OPT_PREFIX_INFORMATION:
1431 opp = (const struct nd_opt_prefix_info *)op;
1432 ND_PRINT("%s/%u%s, Flags [%s], valid time %s",
1433 GET_IP6ADDR_STRING(opp->nd_opt_pi_prefix),
1434 GET_U_1(opp->nd_opt_pi_prefix_len),
1435 (opt_len != 4) ? "badlen" : "",
1436 bittok2str(icmp6_opt_pi_flag_values, "none", GET_U_1(opp->nd_opt_pi_flags_reserved)),
1437 get_lifetime(GET_BE_U_4(opp->nd_opt_pi_valid_time)));
1438 ND_PRINT(", pref. time %s",
1439 get_lifetime(GET_BE_U_4(opp->nd_opt_pi_preferred_time)));
1440 break;
1441 case ND_OPT_REDIRECTED_HEADER:
1442 print_unknown_data(ndo, bp,"\n\t ",opt_len<<3);
1443 /* xxx */
1444 break;
1445 case ND_OPT_MTU:
1446 opm = (const struct nd_opt_mtu *)op;
1447 ND_PRINT(" %u%s",
1448 GET_BE_U_4(opm->nd_opt_mtu_mtu),
1449 (opt_len != 1) ? "bad option length" : "" );
1450 break;
1451 case ND_OPT_RDNSS:
1452 oprd = (const struct nd_opt_rdnss *)op;
1453 l = (opt_len - 1) / 2;
1454 ND_PRINT(" lifetime %us,",
1455 GET_BE_U_4(oprd->nd_opt_rdnss_lifetime));
1456 for (i = 0; i < l; i++) {
1457 ND_PRINT(" addr: %s",
1458 GET_IP6ADDR_STRING(oprd->nd_opt_rdnss_addr[i]));
1459 }
1460 break;
1461 case ND_OPT_DNSSL:
1462 opds = (const struct nd_opt_dnssl *)op;
1463 ND_PRINT(" lifetime %us, domain(s):",
1464 GET_BE_U_4(opds->nd_opt_dnssl_lifetime));
1465 domp = cp + 8; /* domain names, variable-sized, RFC1035-encoded */
1466 while (domp < cp + (opt_len << 3) && GET_U_1(domp) != '\0') {
1467 ND_PRINT(" ");
1468 if ((domp = fqdn_print(ndo, domp, bp)) == NULL)
1469 goto trunc;
1470 }
1471 break;
1472 case ND_OPT_ADVINTERVAL:
1473 opa = (const struct nd_opt_advinterval *)op;
1474 ND_PRINT(" %ums",
1475 GET_BE_U_4(opa->nd_opt_adv_interval));
1476 break;
1477 case ND_OPT_HOMEAGENT_INFO:
1478 oph = (const struct nd_opt_homeagent_info *)op;
1479 ND_PRINT(" preference %u, lifetime %u",
1480 GET_BE_U_2(oph->nd_opt_hai_preference),
1481 GET_BE_U_2(oph->nd_opt_hai_lifetime));
1482 break;
1483 case ND_OPT_ROUTE_INFO:
1484 opri = (const struct nd_opt_route_info *)op;
1485 ND_TCHECK_4(opri->nd_opt_rti_lifetime);
1486 memset(&in6, 0, sizeof(in6));
1487 switch (opt_len) {
1488 case 1:
1489 break;
1490 case 2:
1491 GET_CPY_BYTES(&in6, opri + 1, 8);
1492 break;
1493 case 3:
1494 GET_CPY_BYTES(&in6, opri + 1, 16);
1495 break;
1496 default:
1497 goto trunc;
1498 }
1499 ND_PRINT(" %s/%u", ip6addr_string(ndo, (const u_char *)&in6), /* local buffer, not packet data; don't use GET_IP6ADDR_STRING() */
1500 GET_U_1(opri->nd_opt_rti_prefixlen));
1501 ND_PRINT(", pref=%s",
1502 get_rtpref(GET_U_1(opri->nd_opt_rti_flags)));
1503 ND_PRINT(", lifetime=%s",
1504 get_lifetime(GET_BE_U_4(opri->nd_opt_rti_lifetime)));
1505 break;
1506 default:
1507 if (ndo->ndo_vflag <= 1) {
1508 print_unknown_data(ndo,cp+2,"\n\t ", (opt_len << 3) - 2); /* skip option header */
1509 return 0;
1510 }
1511 break;
1512 }
1513 /* do we want to see an additional hexdump ? */
1514 if (ndo->ndo_vflag> 1)
1515 print_unknown_data(ndo, cp+2,"\n\t ", (opt_len << 3) - 2); /* skip option header */
1516
1517 cp += opt_len << 3;
1518 resid -= opt_len << 3;
1519 }
1520 return 0;
1521
1522 trunc:
1523 return -1;
1524 }
1525
1526 static void
1527 mld6_print(netdissect_options *ndo, const u_char *bp)
1528 {
1529 const struct mld6_hdr *mp = (const struct mld6_hdr *)bp;
1530 const u_char *ep;
1531
1532 /* 'ep' points to the end of available data. */
1533 ep = ndo->ndo_snapend;
1534
1535 if ((const u_char *)mp + sizeof(*mp) > ep)
1536 return;
1537
1538 ND_PRINT("max resp delay: %u ", GET_BE_U_2(mp->mld6_maxdelay));
1539 ND_PRINT("addr: %s", GET_IP6ADDR_STRING(mp->mld6_addr));
1540 }
1541
1542 static void
1543 mldv2_report_print(netdissect_options *ndo, const u_char *bp, u_int len)
1544 {
1545 const struct icmp6_hdr *icp = (const struct icmp6_hdr *) bp;
1546 u_int group, nsrcs, ngroups;
1547 u_int i, j;
1548
1549 /* Minimum len is 8 */
1550 if (len < 8) {
1551 ND_PRINT(" [invalid len %u]", len);
1552 return;
1553 }
1554
1555 ngroups = GET_BE_U_2(icp->icmp6_data16[1]);
1556 ND_PRINT(", %u group record(s)", ngroups);
1557 if (ndo->ndo_vflag > 0) {
1558 /* Print the group records */
1559 group = 8;
1560 for (i = 0; i < ngroups; i++) {
1561 /* type(1) + auxlen(1) + numsrc(2) + grp(16) */
1562 if (len < group + 20) {
1563 ND_PRINT(" [invalid number of groups]");
1564 return;
1565 }
1566 ND_PRINT(" [gaddr %s", GET_IP6ADDR_STRING(bp + group + 4));
1567 ND_PRINT(" %s", tok2str(mldv2report2str, " [v2-report-#%u]",
1568 GET_U_1(bp + group)));
1569 nsrcs = GET_BE_U_2(bp + group + 2);
1570 /* Check the number of sources and print them */
1571 if (len < group + 20 + (nsrcs * sizeof(nd_ipv6))) {
1572 ND_PRINT(" [invalid number of sources %u]", nsrcs);
1573 return;
1574 }
1575 if (ndo->ndo_vflag == 1)
1576 ND_PRINT(", %u source(s)", nsrcs);
1577 else {
1578 /* Print the sources */
1579 ND_PRINT(" {");
1580 for (j = 0; j < nsrcs; j++) {
1581 ND_PRINT(" %s", GET_IP6ADDR_STRING(bp + group + 20 + (j * sizeof(nd_ipv6))));
1582 }
1583 ND_PRINT(" }");
1584 }
1585 /* Next group record */
1586 group += 20 + nsrcs * sizeof(nd_ipv6);
1587 ND_PRINT("]");
1588 }
1589 }
1590 }
1591
1592 static void
1593 mldv2_query_print(netdissect_options *ndo, const u_char *bp, u_int len)
1594 {
1595 const struct icmp6_hdr *icp = (const struct icmp6_hdr *) bp;
1596 u_int mrc;
1597 u_int mrt, qqi;
1598 u_int nsrcs;
1599 u_int i;
1600
1601 /* Minimum len is 28 */
1602 if (len < 28) {
1603 ND_PRINT(" [invalid len %u]", len);
1604 return;
1605 }
1606 mrc = GET_BE_U_2(icp->icmp6_data16[0]);
1607 if (mrc < 32768) {
1608 mrt = mrc;
1609 } else {
1610 mrt = ((mrc & 0x0fff) | 0x1000) << (((mrc & 0x7000) >> 12) + 3);
1611 }
1612 if (ndo->ndo_vflag) {
1613 ND_PRINT(" [max resp delay=%u]", mrt);
1614 }
1615 ND_PRINT(" [gaddr %s", GET_IP6ADDR_STRING(bp + 8));
1616
1617 if (ndo->ndo_vflag) {
1618 if (GET_U_1(bp + 24) & 0x08) {
1619 ND_PRINT(" sflag");
1620 }
1621 if (GET_U_1(bp + 24) & 0x07) {
1622 ND_PRINT(" robustness=%u", GET_U_1(bp + 24) & 0x07);
1623 }
1624 if (GET_U_1(bp + 25) < 128) {
1625 qqi = GET_U_1(bp + 25);
1626 } else {
1627 qqi = ((GET_U_1(bp + 25) & 0x0f) | 0x10) <<
1628 (((GET_U_1(bp + 25) & 0x70) >> 4) + 3);
1629 }
1630 ND_PRINT(" qqi=%u", qqi);
1631 }
1632
1633 nsrcs = GET_BE_U_2(bp + 26);
1634 if (nsrcs > 0) {
1635 if (len < 28 + nsrcs * sizeof(nd_ipv6))
1636 ND_PRINT(" [invalid number of sources]");
1637 else if (ndo->ndo_vflag > 1) {
1638 ND_PRINT(" {");
1639 for (i = 0; i < nsrcs; i++) {
1640 ND_PRINT(" %s", GET_IP6ADDR_STRING(bp + 28 + (i * sizeof(nd_ipv6))));
1641 }
1642 ND_PRINT(" }");
1643 } else
1644 ND_PRINT(", %u source(s)", nsrcs);
1645 }
1646 ND_PRINT("]");
1647 }
1648
1649 static void
1650 dnsname_print(netdissect_options *ndo, const u_char *cp, const u_char *ep)
1651 {
1652 int i;
1653
1654 /* DNS name decoding - no decompression */
1655 ND_PRINT(", \"");
1656 while (cp < ep) {
1657 i = GET_U_1(cp);
1658 cp++;
1659 if (i) {
1660 if (i > ep - cp) {
1661 ND_PRINT("???");
1662 break;
1663 }
1664 while (i-- && cp < ep) {
1665 fn_print_char(ndo, GET_U_1(cp));
1666 cp++;
1667 }
1668 if (cp + 1 < ep && GET_U_1(cp))
1669 ND_PRINT(".");
1670 } else {
1671 if (cp == ep) {
1672 /* FQDN */
1673 ND_PRINT(".");
1674 } else if (cp + 1 == ep && GET_U_1(cp) == '\0') {
1675 /* truncated */
1676 } else {
1677 /* invalid */
1678 ND_PRINT("???");
1679 }
1680 break;
1681 }
1682 }
1683 ND_PRINT("\"");
1684 }
1685
1686 static void
1687 icmp6_nodeinfo_print(netdissect_options *ndo, u_int icmp6len, const u_char *bp, const u_char *ep)
1688 {
1689 const struct icmp6_nodeinfo *ni6;
1690 const struct icmp6_hdr *dp;
1691 const u_char *cp;
1692 size_t siz, i;
1693 int needcomma;
1694
1695 if (ep < bp)
1696 return;
1697 dp = (const struct icmp6_hdr *)bp;
1698 ni6 = (const struct icmp6_nodeinfo *)bp;
1699 siz = ep - bp;
1700
1701 switch (GET_U_1(ni6->ni_type)) {
1702 case ICMP6_NI_QUERY:
1703 if (siz == sizeof(*dp) + 4) {
1704 /* KAME who-are-you */
1705 ND_PRINT(" who-are-you request");
1706 break;
1707 }
1708
1709 ND_TCHECK_LEN(dp, sizeof(*ni6));
1710 ni6 = (const struct icmp6_nodeinfo *)dp;
1711 ND_PRINT(" ("); /*)*/
1712 switch (GET_BE_U_2(ni6->ni_qtype)) {
1713 case NI_QTYPE_NOOP:
1714 ND_PRINT("noop");
1715 break;
1716 case NI_QTYPE_NODENAME:
1717 ND_PRINT("node name");
1718 break;
1719 case NI_QTYPE_NODEADDR:
1720 ND_PRINT("node addresses");
1721 i = GET_BE_U_2(ni6->ni_flags);
1722 if (!i)
1723 break;
1724 /* NI_NODEADDR_FLAG_TRUNCATE undefined for query */
1725 ND_PRINT(" [%s%s%s%s%s%s]",
1726 (i & NI_NODEADDR_FLAG_ANYCAST) ? "a" : "",
1727 (i & NI_NODEADDR_FLAG_GLOBAL) ? "G" : "",
1728 (i & NI_NODEADDR_FLAG_SITELOCAL) ? "S" : "",
1729 (i & NI_NODEADDR_FLAG_LINKLOCAL) ? "L" : "",
1730 (i & NI_NODEADDR_FLAG_COMPAT) ? "C" : "",
1731 (i & NI_NODEADDR_FLAG_ALL) ? "A" : "");
1732 break;
1733 default:
1734 ND_PRINT("unknown");
1735 break;
1736 }
1737
1738 if (GET_BE_U_2(ni6->ni_qtype) == NI_QTYPE_NOOP) {
1739 if (siz != sizeof(*ni6))
1740 if (ndo->ndo_vflag)
1741 ND_PRINT(", invalid len");
1742 /*(*/
1743 ND_PRINT(")");
1744 break;
1745 }
1746
1747 cp = (const u_char *)(ni6 + 1);
1748 switch (GET_U_1(ni6->ni_code)) {
1749 case ICMP6_NI_SUBJ_IPV6:
1750 if (!ND_TTEST_LEN(dp, sizeof(*ni6) + sizeof(nd_ipv6)))
1751 break;
1752 if (siz != sizeof(*ni6) + sizeof(nd_ipv6)) {
1753 if (ndo->ndo_vflag)
1754 ND_PRINT(", invalid subject len");
1755 break;
1756 }
1757 ND_PRINT(", subject=%s",
1758 GET_IP6ADDR_STRING(cp));
1759 break;
1760 case ICMP6_NI_SUBJ_FQDN:
1761 ND_PRINT(", subject=DNS name");
1762 dnsname_print(ndo, cp, ep);
1763 break;
1764 case ICMP6_NI_SUBJ_IPV4:
1765 if (!ND_TTEST_LEN(dp, sizeof(*ni6) + sizeof(nd_ipv4)))
1766 break;
1767 if (siz != sizeof(*ni6) + sizeof(nd_ipv4)) {
1768 if (ndo->ndo_vflag)
1769 ND_PRINT(", invalid subject len");
1770 break;
1771 }
1772 ND_PRINT(", subject=%s",
1773 GET_IPADDR_STRING(cp));
1774 break;
1775 default:
1776 ND_PRINT(", unknown subject");
1777 break;
1778 }
1779
1780 /*(*/
1781 ND_PRINT(")");
1782 break;
1783
1784 case ICMP6_NI_REPLY:
1785 if (icmp6len > siz)
1786 goto trunc;
1787
1788 needcomma = 0;
1789
1790 ND_TCHECK_LEN(dp, sizeof(*ni6));
1791 ni6 = (const struct icmp6_nodeinfo *)dp;
1792 ND_PRINT(" ("); /*)*/
1793 switch (GET_U_1(ni6->ni_code)) {
1794 case ICMP6_NI_SUCCESS:
1795 if (ndo->ndo_vflag) {
1796 ND_PRINT("success");
1797 needcomma++;
1798 }
1799 break;
1800 case ICMP6_NI_REFUSED:
1801 ND_PRINT("refused");
1802 needcomma++;
1803 if (siz != sizeof(*ni6))
1804 if (ndo->ndo_vflag)
1805 ND_PRINT(", invalid length");
1806 break;
1807 case ICMP6_NI_UNKNOWN:
1808 ND_PRINT("unknown");
1809 needcomma++;
1810 if (siz != sizeof(*ni6))
1811 if (ndo->ndo_vflag)
1812 ND_PRINT(", invalid length");
1813 break;
1814 }
1815
1816 if (GET_U_1(ni6->ni_code) != ICMP6_NI_SUCCESS) {
1817 /*(*/
1818 ND_PRINT(")");
1819 break;
1820 }
1821
1822 switch (GET_BE_U_2(ni6->ni_qtype)) {
1823 case NI_QTYPE_NOOP:
1824 if (needcomma)
1825 ND_PRINT(", ");
1826 ND_PRINT("noop");
1827 if (siz != sizeof(*ni6))
1828 if (ndo->ndo_vflag)
1829 ND_PRINT(", invalid length");
1830 break;
1831 case NI_QTYPE_NODENAME:
1832 if (needcomma)
1833 ND_PRINT(", ");
1834 ND_PRINT("node name");
1835 cp = (const u_char *)(ni6 + 1) + 4;
1836 dnsname_print(ndo, cp, ep);
1837 if ((GET_BE_U_2(ni6->ni_flags) & 0x01) != 0)
1838 ND_PRINT(" [TTL=%u]", GET_BE_U_4(ni6 + 1));
1839 break;
1840 case NI_QTYPE_NODEADDR:
1841 if (needcomma)
1842 ND_PRINT(", ");
1843 ND_PRINT("node addresses");
1844 i = sizeof(*ni6);
1845 while (i < siz) {
1846 if (i + sizeof(uint32_t) + sizeof(nd_ipv6) > siz)
1847 break;
1848 ND_PRINT(" %s(%u)",
1849 GET_IP6ADDR_STRING(bp + i + sizeof(uint32_t)),
1850 GET_BE_U_4(bp + i));
1851 i += sizeof(uint32_t) + sizeof(nd_ipv6);
1852 }
1853 i = GET_BE_U_2(ni6->ni_flags);
1854 if (!i)
1855 break;
1856 ND_PRINT(" [%s%s%s%s%s%s%s]",
1857 (i & NI_NODEADDR_FLAG_ANYCAST) ? "a" : "",
1858 (i & NI_NODEADDR_FLAG_GLOBAL) ? "G" : "",
1859 (i & NI_NODEADDR_FLAG_SITELOCAL) ? "S" : "",
1860 (i & NI_NODEADDR_FLAG_LINKLOCAL) ? "L" : "",
1861 (i & NI_NODEADDR_FLAG_COMPAT) ? "C" : "",
1862 (i & NI_NODEADDR_FLAG_ALL) ? "A" : "",
1863 (i & NI_NODEADDR_FLAG_TRUNCATE) ? "T" : "");
1864 break;
1865 default:
1866 if (needcomma)
1867 ND_PRINT(", ");
1868 ND_PRINT("unknown");
1869 break;
1870 }
1871
1872 /*(*/
1873 ND_PRINT(")");
1874 break;
1875 }
1876 return;
1877
1878 trunc:
1879 nd_print_trunc(ndo);
1880 }
1881
1882 static void
1883 icmp6_rrenum_print(netdissect_options *ndo, const u_char *bp, const u_char *ep)
1884 {
1885 const struct icmp6_router_renum *rr6;
1886 const char *cp;
1887 const struct rr_pco_match *match;
1888 const struct rr_pco_use *use;
1889 char hbuf[NI_MAXHOST];
1890 int n;
1891
1892 if (ep < bp)
1893 return;
1894 rr6 = (const struct icmp6_router_renum *)bp;
1895 cp = (const char *)(rr6 + 1);
1896
1897 ND_TCHECK_4(rr6->rr_reserved);
1898 switch (GET_U_1(rr6->rr_code)) {
1899 case ICMP6_ROUTER_RENUMBERING_COMMAND:
1900 ND_PRINT(", command");
1901 break;
1902 case ICMP6_ROUTER_RENUMBERING_RESULT:
1903 ND_PRINT(", result");
1904 break;
1905 case ICMP6_ROUTER_RENUMBERING_SEQNUM_RESET:
1906 ND_PRINT(", sequence number reset");
1907 break;
1908 default:
1909 ND_PRINT(", code-#%u", GET_U_1(rr6->rr_code));
1910 break;
1911 }
1912
1913 ND_PRINT(", seq=%u", GET_BE_U_4(rr6->rr_seqnum));
1914
1915 if (ndo->ndo_vflag) {
1916 uint8_t rr_flags = GET_U_1(rr6->rr_flags);
1917 #define F(x, y) (rr_flags & (x) ? (y) : "")
1918 ND_PRINT("["); /*]*/
1919 if (rr_flags) {
1920 ND_PRINT("%s%s%s%s%s,", F(ICMP6_RR_FLAGS_TEST, "T"),
1921 F(ICMP6_RR_FLAGS_REQRESULT, "R"),
1922 F(ICMP6_RR_FLAGS_FORCEAPPLY, "A"),
1923 F(ICMP6_RR_FLAGS_SPECSITE, "S"),
1924 F(ICMP6_RR_FLAGS_PREVDONE, "P"));
1925 }
1926 ND_PRINT("seg=%u,", GET_U_1(rr6->rr_segnum));
1927 ND_PRINT("maxdelay=%u", GET_BE_U_2(rr6->rr_maxdelay));
1928 if (GET_BE_U_4(rr6->rr_reserved))
1929 ND_PRINT("rsvd=0x%x", GET_BE_U_4(rr6->rr_reserved));
1930 /*[*/
1931 ND_PRINT("]");
1932 #undef F
1933 }
1934
1935 if (GET_U_1(rr6->rr_code) == ICMP6_ROUTER_RENUMBERING_COMMAND) {
1936 match = (const struct rr_pco_match *)cp;
1937 cp = (const char *)(match + 1);
1938
1939 ND_TCHECK_16(match->rpm_prefix);
1940
1941 if (ndo->ndo_vflag > 1)
1942 ND_PRINT("\n\t");
1943 else
1944 ND_PRINT(" ");
1945 ND_PRINT("match("); /*)*/
1946 switch (GET_U_1(match->rpm_code)) {
1947 case RPM_PCO_ADD: ND_PRINT("add"); break;
1948 case RPM_PCO_CHANGE: ND_PRINT("change"); break;
1949 case RPM_PCO_SETGLOBAL: ND_PRINT("setglobal"); break;
1950 default: ND_PRINT("#%u",
1951 GET_U_1(match->rpm_code)); break;
1952 }
1953
1954 if (ndo->ndo_vflag) {
1955 ND_PRINT(",ord=%u", GET_U_1(match->rpm_ordinal));
1956 ND_PRINT(",min=%u", GET_U_1(match->rpm_minlen));
1957 ND_PRINT(",max=%u", GET_U_1(match->rpm_maxlen));
1958 }
1959 if (addrtostr6(match->rpm_prefix, hbuf, sizeof(hbuf)))
1960 ND_PRINT(",%s/%u", hbuf, GET_U_1(match->rpm_matchlen));
1961 else
1962 ND_PRINT(",?/%u", GET_U_1(match->rpm_matchlen));
1963 /*(*/
1964 ND_PRINT(")");
1965
1966 n = GET_U_1(match->rpm_len) - 3;
1967 if (n % 4)
1968 goto trunc;
1969 n /= 4;
1970 while (n-- > 0) {
1971 use = (const struct rr_pco_use *)cp;
1972 cp = (const char *)(use + 1);
1973
1974 ND_TCHECK_16(use->rpu_prefix);
1975
1976 if (ndo->ndo_vflag > 1)
1977 ND_PRINT("\n\t");
1978 else
1979 ND_PRINT(" ");
1980 ND_PRINT("use("); /*)*/
1981 if (GET_U_1(use->rpu_flags)) {
1982 #define F(x, y) (GET_U_1(use->rpu_flags) & (x) ? (y) : "")
1983 ND_PRINT("%s%s,",
1984 F(ICMP6_RR_PCOUSE_FLAGS_DECRVLTIME, "V"),
1985 F(ICMP6_RR_PCOUSE_FLAGS_DECRPLTIME, "P"));
1986 #undef F
1987 }
1988 if (ndo->ndo_vflag) {
1989 ND_PRINT("mask=0x%x,",
1990 GET_U_1(use->rpu_ramask));
1991 ND_PRINT("raflags=0x%x,",
1992 GET_U_1(use->rpu_raflags));
1993 if (GET_BE_U_4(use->rpu_vltime) == 0xffffffff)
1994 ND_PRINT("vltime=infty,");
1995 else
1996 ND_PRINT("vltime=%u,",
1997 GET_BE_U_4(use->rpu_vltime));
1998 if (GET_BE_U_4(use->rpu_pltime) == 0xffffffff)
1999 ND_PRINT("pltime=infty,");
2000 else
2001 ND_PRINT("pltime=%u,",
2002 GET_BE_U_4(use->rpu_pltime));
2003 }
2004 if (addrtostr6(use->rpu_prefix, hbuf, sizeof(hbuf)))
2005 ND_PRINT("%s/%u/%u", hbuf,
2006 GET_U_1(use->rpu_uselen),
2007 GET_U_1(use->rpu_keeplen));
2008 else
2009 ND_PRINT("?/%u/%u", GET_U_1(use->rpu_uselen),
2010 GET_U_1(use->rpu_keeplen));
2011 /*(*/
2012 ND_PRINT(")");
2013 }
2014 }
2015
2016 return;
2017
2018 trunc:
2019 nd_print_trunc(ndo);
2020 }