]>
The Tcpdump Group git mirrors - tcpdump/blob - print-ip6opts.c
5d4ecb246706141dcf841d6a8b51aafcf20b32b5
2 * Copyright (C) 1998 WIDE Project.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in the
12 * documentation and/or other materials provided with the distribution.
13 * 3. Neither the name of the project nor the names of its contributors
14 * may be used to endorse or promote products derived from this software
15 * without specific prior written permission.
17 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 /* \summary: IPv6 header option printer */
36 #include "netdissect-stdinc.h"
38 #include "netdissect.h"
39 #include "addrtoname.h"
45 ip6_sopt_print(netdissect_options
*ndo
, const u_char
*bp
, int len
)
50 for (i
= 0; i
< len
; i
+= optlen
) {
51 if (EXTRACT_U_1(bp
+ i
) == IP6OPT_PAD1
)
55 optlen
= EXTRACT_U_1(bp
+ i
+ 1) + 2;
62 switch (EXTRACT_U_1(bp
+ i
)) {
67 if (len
- i
< IP6OPT_MINLEN
) {
68 ND_PRINT(", padn: trunc");
74 if (len
- i
< IP6OPT_MINLEN
) {
75 ND_PRINT(", sopt_type %u: trunc)", EXTRACT_U_1(bp
+ i
));
78 ND_PRINT(", sopt_type 0x%02x: len=%u", EXTRACT_U_1(bp
+ i
), EXTRACT_U_1(bp
+ i
+ 1));
89 ip6_opt_print(netdissect_options
*ndo
, const u_char
*bp
, int len
)
96 for (i
= 0; i
< len
; i
+= optlen
) {
97 if (EXTRACT_U_1(bp
+ i
) == IP6OPT_PAD1
)
101 optlen
= EXTRACT_U_1(bp
+ i
+ 1) + 2;
105 if (i
+ optlen
> len
)
108 switch (EXTRACT_U_1(bp
+ i
)) {
113 if (len
- i
< IP6OPT_MINLEN
) {
114 ND_PRINT("(padn: trunc)");
119 case IP6OPT_ROUTER_ALERT
:
120 if (len
- i
< IP6OPT_RTALERT_LEN
) {
121 ND_PRINT("(rtalert: trunc)");
124 if (EXTRACT_U_1(bp
+ i
+ 1) != IP6OPT_RTALERT_LEN
- 2) {
125 ND_PRINT("(rtalert: invalid len %u)", EXTRACT_U_1(bp
+ i
+ 1));
128 ND_PRINT("(rtalert: 0x%04x) ", EXTRACT_BE_U_2(bp
+ i
+ 2));
131 if (len
- i
< IP6OPT_JUMBO_LEN
) {
132 ND_PRINT("(jumbo: trunc)");
135 if (EXTRACT_U_1(bp
+ i
+ 1) != IP6OPT_JUMBO_LEN
- 2) {
136 ND_PRINT("(jumbo: invalid len %u)", EXTRACT_U_1(bp
+ i
+ 1));
139 ND_PRINT("(jumbo: %u) ", EXTRACT_BE_U_4(bp
+ i
+ 2));
141 case IP6OPT_HOME_ADDRESS
:
142 if (len
- i
< IP6OPT_HOMEADDR_MINLEN
) {
143 ND_PRINT("(homeaddr: trunc)");
146 if (EXTRACT_U_1(bp
+ i
+ 1) < IP6OPT_HOMEADDR_MINLEN
- 2) {
147 ND_PRINT("(homeaddr: invalid len %u)", EXTRACT_U_1(bp
+ i
+ 1));
150 ND_PRINT("(homeaddr: %s", ip6addr_string(ndo
, bp
+ i
+ 2));
151 if (EXTRACT_U_1(bp
+ i
+ 1) > IP6OPT_HOMEADDR_MINLEN
- 2) {
152 ip6_sopt_print(ndo
, bp
+ i
+ IP6OPT_HOMEADDR_MINLEN
,
153 (optlen
- IP6OPT_HOMEADDR_MINLEN
));
158 if (len
- i
< IP6OPT_MINLEN
) {
159 ND_PRINT("(type %u: trunc)", EXTRACT_U_1(bp
+ i
));
162 ND_PRINT("(opt_type 0x%02x: len=%u)", EXTRACT_U_1(bp
+ i
), EXTRACT_U_1(bp
+ i
+ 1));
170 ND_PRINT("[trunc] ");
174 hbhopt_print(netdissect_options
*ndo
, const u_char
*bp
)
176 const struct ip6_hbh
*dp
= (const struct ip6_hbh
*)bp
;
179 ND_TCHECK_1(dp
->ip6h_len
);
180 hbhlen
= (EXTRACT_U_1(dp
->ip6h_len
) + 1) << 3;
181 ND_TCHECK_LEN(dp
, hbhlen
);
184 ip6_opt_print(ndo
, (const u_char
*)dp
+ sizeof(*dp
), hbhlen
- sizeof(*dp
));
194 dstopt_print(netdissect_options
*ndo
, const u_char
*bp
)
196 const struct ip6_dest
*dp
= (const struct ip6_dest
*)bp
;
199 ND_TCHECK_1(dp
->ip6d_len
);
200 dstoptlen
= (EXTRACT_U_1(dp
->ip6d_len
) + 1) << 3;
201 ND_TCHECK_LEN(dp
, dstoptlen
);
203 if (ndo
->ndo_vflag
) {
204 ip6_opt_print(ndo
, (const u_char
*)dp
+ sizeof(*dp
),
205 dstoptlen
- sizeof(*dp
));
211 ND_PRINT("[|DSTOPT]");