]> The Tcpdump Group git mirrors - tcpdump/blob - print-ip6.c
Use nd_ipv6 rather than struct in6_addr in packet-layout structures.
[tcpdump] / print-ip6.c
1 /*
2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /* \summary: IPv6 printer */
23
24 #ifdef HAVE_CONFIG_H
25 #include <config.h>
26 #endif
27
28 #include "netdissect-stdinc.h"
29
30 #include <string.h>
31
32 #include "netdissect.h"
33 #include "addrtoname.h"
34 #include "extract.h"
35
36 #include "ip6.h"
37 #include "ipproto.h"
38
39 /*
40 * If routing headers are presend and valid, set dst to the final destination.
41 * Otherwise, set it to the IPv6 destination.
42 *
43 * This is used for UDP and TCP pseudo-header in the checksum
44 * calculation.
45 */
46 static void
47 ip6_finddst(netdissect_options *ndo, struct in6_addr *dst,
48 const struct ip6_hdr *ip6)
49 {
50 const u_char *cp;
51 u_int advance;
52 u_int nh;
53 const void *dst_addr;
54 const struct ip6_rthdr *dp;
55 const struct ip6_rthdr0 *dp0;
56 const u_char *p;
57 int i, len;
58
59 cp = (const u_char *)ip6;
60 advance = sizeof(struct ip6_hdr);
61 nh = EXTRACT_U_1(ip6->ip6_nxt);
62 dst_addr = (const void *)&ip6->ip6_dst;
63
64 while (cp < ndo->ndo_snapend) {
65 cp += advance;
66
67 switch (nh) {
68
69 case IPPROTO_HOPOPTS:
70 case IPPROTO_DSTOPTS:
71 case IPPROTO_MOBILITY_OLD:
72 case IPPROTO_MOBILITY:
73 /*
74 * These have a header length byte, following
75 * the next header byte, giving the length of
76 * the header, in units of 8 octets, excluding
77 * the first 8 octets.
78 */
79 ND_TCHECK_2(cp);
80 advance = (EXTRACT_U_1(cp + 1) + 1) << 3;
81 nh = EXTRACT_U_1(cp);
82 break;
83
84 case IPPROTO_FRAGMENT:
85 /*
86 * The byte following the next header byte is
87 * marked as reserved, and the header is always
88 * the same size.
89 */
90 ND_TCHECK_1(cp);
91 advance = sizeof(struct ip6_frag);
92 nh = EXTRACT_U_1(cp);
93 break;
94
95 case IPPROTO_ROUTING:
96 /*
97 * OK, we found it.
98 */
99 dp = (const struct ip6_rthdr *)cp;
100 ND_TCHECK_SIZE(dp);
101 len = EXTRACT_U_1(dp->ip6r_len);
102 switch (EXTRACT_U_1(dp->ip6r_type)) {
103
104 case IPV6_RTHDR_TYPE_0:
105 case IPV6_RTHDR_TYPE_2: /* Mobile IPv6 ID-20 */
106 dp0 = (const struct ip6_rthdr0 *)dp;
107 if (len % 2 == 1)
108 goto trunc;
109 len >>= 1;
110 p = (const u_char *) dp0->ip6r0_addr;
111 for (i = 0; i < len; i++) {
112 ND_TCHECK_16(p);
113 dst_addr = (const void *)p;
114 p += 16;
115 }
116 break;
117
118 default:
119 break;
120 }
121
122 /*
123 * Only one routing header to a customer.
124 */
125 goto done;
126
127 case IPPROTO_AH:
128 case IPPROTO_ESP:
129 case IPPROTO_IPCOMP:
130 default:
131 /*
132 * AH and ESP are, in the RFCs that describe them,
133 * described as being "viewed as an end-to-end
134 * payload" "in the IPv6 context, so that they
135 * "should appear after hop-by-hop, routing, and
136 * fragmentation extension headers". We assume
137 * that's the case, and stop as soon as we see
138 * one. (We can't handle an ESP header in
139 * the general case anyway, as its length depends
140 * on the encryption algorithm.)
141 *
142 * IPComp is also "viewed as an end-to-end
143 * payload" "in the IPv6 context".
144 *
145 * All other protocols are assumed to be the final
146 * protocol.
147 */
148 goto done;
149 }
150 }
151
152 done:
153 trunc:
154 UNALIGNED_MEMCPY(dst, dst_addr, sizeof(nd_ipv6));
155 }
156
157 /*
158 * Compute a V6-style checksum by building a pseudoheader.
159 */
160 int
161 nextproto6_cksum(netdissect_options *ndo,
162 const struct ip6_hdr *ip6, const uint8_t *data,
163 u_int len, u_int covlen, u_int next_proto)
164 {
165 struct {
166 struct in6_addr ph_src;
167 struct in6_addr ph_dst;
168 uint32_t ph_len;
169 uint8_t ph_zero[3];
170 uint8_t ph_nxt;
171 } ph;
172 struct cksum_vec vec[2];
173 u_int nh;
174
175 /* pseudo-header */
176 memset(&ph, 0, sizeof(ph));
177 UNALIGNED_MEMCPY(&ph.ph_src, &ip6->ip6_src, sizeof (struct in6_addr));
178 nh = EXTRACT_U_1(ip6->ip6_nxt);
179 switch (nh) {
180
181 case IPPROTO_HOPOPTS:
182 case IPPROTO_DSTOPTS:
183 case IPPROTO_MOBILITY_OLD:
184 case IPPROTO_MOBILITY:
185 case IPPROTO_FRAGMENT:
186 case IPPROTO_ROUTING:
187 /*
188 * The next header is either a routing header or a header
189 * after which there might be a routing header, so scan
190 * for a routing header.
191 */
192 ip6_finddst(ndo, &ph.ph_dst, ip6);
193 break;
194
195 default:
196 UNALIGNED_MEMCPY(&ph.ph_dst, &ip6->ip6_dst, sizeof (struct in6_addr));
197 break;
198 }
199 ph.ph_len = htonl(len);
200 ph.ph_nxt = next_proto;
201
202 vec[0].ptr = (const uint8_t *)(void *)&ph;
203 vec[0].len = sizeof(ph);
204 vec[1].ptr = data;
205 vec[1].len = covlen;
206
207 return in_cksum(vec, 2);
208 }
209
210 /*
211 * print an IP6 datagram.
212 */
213 void
214 ip6_print(netdissect_options *ndo, const u_char *bp, u_int length)
215 {
216 const struct ip6_hdr *ip6;
217 int advance;
218 u_int len;
219 const u_char *ipend;
220 const u_char *cp;
221 u_int payload_len;
222 u_int nh;
223 int fragmented = 0;
224 u_int flow;
225
226 ip6 = (const struct ip6_hdr *)bp;
227
228 ND_TCHECK_SIZE(ip6);
229 if (length < sizeof (struct ip6_hdr)) {
230 ND_PRINT("truncated-ip6 %u", length);
231 return;
232 }
233
234 if (!ndo->ndo_eflag)
235 ND_PRINT("IP6 ");
236
237 if (IP6_VERSION(ip6) != 6) {
238 ND_PRINT("version error: %u != 6", IP6_VERSION(ip6));
239 return;
240 }
241
242 payload_len = EXTRACT_BE_U_2(ip6->ip6_plen);
243 len = payload_len + sizeof(struct ip6_hdr);
244 if (length < len)
245 ND_PRINT("truncated-ip6 - %u bytes missing!",
246 len - length);
247
248 nh = EXTRACT_U_1(ip6->ip6_nxt);
249 if (ndo->ndo_vflag) {
250 flow = EXTRACT_BE_U_4(ip6->ip6_flow);
251 ND_PRINT("(");
252 #if 0
253 /* rfc1883 */
254 if (flow & 0x0f000000)
255 ND_PRINT("pri 0x%02x, ", (flow & 0x0f000000) >> 24);
256 if (flow & 0x00ffffff)
257 ND_PRINT("flowlabel 0x%06x, ", flow & 0x00ffffff);
258 #else
259 /* RFC 2460 */
260 if (flow & 0x0ff00000)
261 ND_PRINT("class 0x%02x, ", (flow & 0x0ff00000) >> 20);
262 if (flow & 0x000fffff)
263 ND_PRINT("flowlabel 0x%05x, ", flow & 0x000fffff);
264 #endif
265
266 ND_PRINT("hlim %u, next-header %s (%u) payload length: %u) ",
267 EXTRACT_U_1(ip6->ip6_hlim),
268 tok2str(ipproto_values,"unknown",nh),
269 nh,
270 payload_len);
271 }
272
273 /*
274 * Cut off the snapshot length to the end of the IP payload.
275 */
276 ipend = bp + len;
277 if (ipend < ndo->ndo_snapend)
278 ndo->ndo_snapend = ipend;
279
280 cp = (const u_char *)ip6;
281 advance = sizeof(struct ip6_hdr);
282 while (cp < ndo->ndo_snapend && advance > 0) {
283 if (len < (u_int)advance)
284 goto trunc;
285 cp += advance;
286 len -= advance;
287
288 if (cp == (const u_char *)(ip6 + 1) &&
289 nh != IPPROTO_TCP && nh != IPPROTO_UDP &&
290 nh != IPPROTO_DCCP && nh != IPPROTO_SCTP) {
291 ND_PRINT("%s > %s: ", ip6addr_string(ndo, &ip6->ip6_src),
292 ip6addr_string(ndo, &ip6->ip6_dst));
293 }
294
295 switch (nh) {
296 case IPPROTO_HOPOPTS:
297 advance = hbhopt_print(ndo, cp);
298 if (advance < 0)
299 return;
300 nh = EXTRACT_U_1(cp);
301 break;
302 case IPPROTO_DSTOPTS:
303 advance = dstopt_print(ndo, cp);
304 if (advance < 0)
305 return;
306 nh = EXTRACT_U_1(cp);
307 break;
308 case IPPROTO_FRAGMENT:
309 advance = frag6_print(ndo, cp, (const u_char *)ip6);
310 if (advance < 0 || ndo->ndo_snapend <= cp + advance)
311 return;
312 nh = EXTRACT_U_1(cp);
313 fragmented = 1;
314 break;
315
316 case IPPROTO_MOBILITY_OLD:
317 case IPPROTO_MOBILITY:
318 /*
319 * XXX - we don't use "advance"; RFC 3775 says that
320 * the next header field in a mobility header
321 * should be IPPROTO_NONE, but speaks of
322 * the possiblity of a future extension in
323 * which payload can be piggybacked atop a
324 * mobility header.
325 */
326 advance = mobility_print(ndo, cp, (const u_char *)ip6);
327 if (advance < 0)
328 return;
329 nh = EXTRACT_U_1(cp);
330 return;
331 case IPPROTO_ROUTING:
332 ND_TCHECK_1(cp);
333 advance = rt6_print(ndo, cp, (const u_char *)ip6);
334 if (advance < 0)
335 return;
336 nh = EXTRACT_U_1(cp);
337 break;
338 case IPPROTO_SCTP:
339 sctp_print(ndo, cp, (const u_char *)ip6, len);
340 return;
341 case IPPROTO_DCCP:
342 dccp_print(ndo, cp, (const u_char *)ip6, len);
343 return;
344 case IPPROTO_TCP:
345 tcp_print(ndo, cp, len, (const u_char *)ip6, fragmented);
346 return;
347 case IPPROTO_UDP:
348 udp_print(ndo, cp, len, (const u_char *)ip6, fragmented);
349 return;
350 case IPPROTO_ICMPV6:
351 icmp6_print(ndo, cp, len, (const u_char *)ip6, fragmented);
352 return;
353 case IPPROTO_AH:
354 advance = ah_print(ndo, cp);
355 if (advance < 0)
356 return;
357 nh = EXTRACT_U_1(cp);
358 break;
359 case IPPROTO_ESP:
360 {
361 u_int enh, padlen;
362 advance = esp_print(ndo, cp, len, (const u_char *)ip6, &enh, &padlen);
363 if (advance < 0)
364 return;
365 nh = enh & 0xff;
366 len -= padlen;
367 break;
368 }
369 case IPPROTO_IPCOMP:
370 {
371 ipcomp_print(ndo, cp);
372 /*
373 * Either this has decompressed the payload and
374 * printed it, in which case there's nothing more
375 * to do, or it hasn't, in which case there's
376 * nothing more to do.
377 */
378 advance = -1;
379 break;
380 }
381
382 case IPPROTO_PIM:
383 pim_print(ndo, cp, len, (const u_char *)ip6);
384 return;
385
386 case IPPROTO_OSPF:
387 ospf6_print(ndo, cp, len);
388 return;
389
390 case IPPROTO_IPV6:
391 ip6_print(ndo, cp, len);
392 return;
393
394 case IPPROTO_IPV4:
395 ip_print(ndo, cp, len);
396 return;
397
398 case IPPROTO_PGM:
399 pgm_print(ndo, cp, len, (const u_char *)ip6);
400 return;
401
402 case IPPROTO_GRE:
403 gre_print(ndo, cp, len);
404 return;
405
406 case IPPROTO_RSVP:
407 rsvp_print(ndo, cp, len);
408 return;
409
410 case IPPROTO_EIGRP:
411 eigrp_print(ndo, cp, len);
412 return;
413
414 case IPPROTO_NONE:
415 ND_PRINT("no next header");
416 return;
417
418 default:
419 ND_PRINT("ip-proto-%u %u", nh, len);
420 return;
421 }
422 }
423
424 return;
425 trunc:
426 ND_PRINT("[|ip6]");
427 }