]> The Tcpdump Group git mirrors - tcpdump/blob - print-ip.c
Get rid of the added "IP " - IPv6 doesn't do it, and previous versions
[tcpdump] / print-ip.c
1 /*
2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994, 1995, 1996, 1997
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 #ifndef lint
23 static const char rcsid[] =
24 "@(#) $Header: /tcpdump/master/tcpdump/print-ip.c,v 1.120 2003-02-05 02:30:39 guy Exp $ (LBL)";
25 #endif
26
27 #ifdef HAVE_CONFIG_H
28 #include "config.h"
29 #endif
30
31 #include <tcpdump-stdinc.h>
32
33 #include <stdio.h>
34 #include <stdlib.h>
35 #include <string.h>
36
37 #include "addrtoname.h"
38 #include "interface.h"
39 #include "extract.h" /* must come after interface.h */
40
41 #include "ip.h"
42
43 /* Compatibility */
44 #ifndef IPPROTO_ND
45 #define IPPROTO_ND 77
46 #endif
47
48 /*
49 * print the recorded route in an IP RR, LSRR or SSRR option.
50 */
51 static void
52 ip_printroute(const char *type, register const u_char *cp, u_int length)
53 {
54 register u_int ptr = cp[2] - 1;
55 register u_int len;
56
57 printf(" %s{", type);
58 if ((length + 1) & 3)
59 printf(" [bad length %d]", length);
60 if (ptr < 3 || ((ptr + 1) & 3) || ptr > length + 1)
61 printf(" [bad ptr %d]", cp[2]);
62
63 type = "";
64 for (len = 3; len < length; len += 4) {
65 if (ptr == len)
66 type = "#";
67 printf("%s%s", type, ipaddr_string(&cp[len]));
68 type = " ";
69 }
70 printf("%s}", ptr == len? "#" : "");
71 }
72
73 /*
74 * If source-routing is present, return the final destination.
75 * Otherwise, return IP destination.
76 *
77 * This is used for UDP and TCP pseudo-header in the checksum
78 * calculation.
79 */
80 u_int32_t
81 ip_finddst(const struct ip *ip)
82 {
83 int length;
84 int len;
85 const u_char *cp;
86 u_int32_t retval;
87
88 cp = (const u_char *)(ip + 1);
89 length = (IP_HL(ip) << 2) - sizeof(struct ip);
90
91 for (; length > 0; cp += len, length -= len) {
92 int tt = *cp;
93
94 if (tt == IPOPT_NOP || tt == IPOPT_EOL)
95 len = 1;
96 else {
97 if (&cp[1] >= snapend) {
98 return 0;
99 }
100 len = cp[1];
101 }
102 if (len <= 0) {
103 return 0;
104 }
105 if (&cp[1] >= snapend || cp + len > snapend) {
106 return 0;
107 }
108 switch (tt) {
109
110 case IPOPT_SSRR:
111 case IPOPT_LSRR:
112 memcpy(&retval, cp + len - 4, 4);
113 return retval;
114 }
115 }
116 return ip->ip_dst.s_addr;
117 }
118
119 static void
120 ip_printts(register const u_char *cp, u_int length)
121 {
122 register u_int ptr = cp[2] - 1;
123 register u_int len = 0;
124 int hoplen;
125 const char *type;
126
127 printf(" TS{");
128 hoplen = ((cp[3]&0xF) != IPOPT_TS_TSONLY) ? 8 : 4;
129 if ((length - 4) & (hoplen-1))
130 printf("[bad length %d]", length);
131 if (ptr < 4 || ((ptr - 4) & (hoplen-1)) || ptr > length + 1)
132 printf("[bad ptr %d]", cp[2]);
133 switch (cp[3]&0xF) {
134 case IPOPT_TS_TSONLY:
135 printf("TSONLY");
136 break;
137 case IPOPT_TS_TSANDADDR:
138 printf("TS+ADDR");
139 break;
140 /*
141 * prespecified should really be 3, but some ones might send 2
142 * instead, and the IPOPT_TS_PRESPEC constant can apparently
143 * have both values, so we have to hard-code it here.
144 */
145
146 case 2:
147 printf("PRESPEC2.0");
148 break;
149 case 3: /* IPOPT_TS_PRESPEC */
150 printf("PRESPEC");
151 break;
152 default:
153 printf("[bad ts type %d]", cp[3]&0xF);
154 goto done;
155 }
156
157 type = " ";
158 for (len = 4; len < length; len += hoplen) {
159 if (ptr == len)
160 type = " ^ ";
161 printf("%s%d@%s", type, EXTRACT_32BITS(&cp[len+hoplen-4]),
162 hoplen!=8 ? "" : ipaddr_string(&cp[len]));
163 type = " ";
164 }
165
166 done:
167 printf("%s", ptr == len ? " ^ " : "");
168
169 if (cp[3]>>4)
170 printf(" [%d hops not recorded]} ", cp[3]>>4);
171 else
172 printf("}");
173 }
174
175 /*
176 * print IP options.
177 */
178 static void
179 ip_optprint(register const u_char *cp, u_int length)
180 {
181 register u_int len;
182
183 for (; length > 0; cp += len, length -= len) {
184 int tt = *cp;
185
186 if (tt == IPOPT_NOP || tt == IPOPT_EOL)
187 len = 1;
188 else {
189 if (&cp[1] >= snapend) {
190 printf("[|ip]");
191 return;
192 }
193 len = cp[1];
194 }
195 if (len <= 0) {
196 printf("[|ip op len %d]", len);
197 return;
198 }
199 if (&cp[1] >= snapend || cp + len > snapend) {
200 printf("[|ip]");
201 return;
202 }
203 switch (tt) {
204
205 case IPOPT_EOL:
206 printf(" EOL");
207 if (length > 1)
208 printf("-%d", length - 1);
209 return;
210
211 case IPOPT_NOP:
212 printf(" NOP");
213 break;
214
215 case IPOPT_TS:
216 ip_printts(cp, len);
217 break;
218
219 #ifndef IPOPT_SECURITY
220 #define IPOPT_SECURITY 130
221 #endif /* IPOPT_SECURITY */
222 case IPOPT_SECURITY:
223 printf(" SECURITY{%d}", len);
224 break;
225
226 case IPOPT_RR:
227 ip_printroute("RR", cp, len);
228 break;
229
230 case IPOPT_SSRR:
231 ip_printroute("SSRR", cp, len);
232 break;
233
234 case IPOPT_LSRR:
235 ip_printroute("LSRR", cp, len);
236 break;
237
238 #ifndef IPOPT_RA
239 #define IPOPT_RA 148 /* router alert */
240 #endif
241 case IPOPT_RA:
242 printf(" RA");
243 if (len != 4)
244 printf("{%d}", len);
245 else if (cp[2] || cp[3])
246 printf("%d.%d", cp[2], cp[3]);
247 break;
248
249 default:
250 printf(" IPOPT-%d{%d}", cp[0], len);
251 break;
252 }
253 }
254 }
255
256 /*
257 * compute an IP header checksum.
258 * don't modifiy the packet.
259 */
260 u_short
261 in_cksum(const u_short *addr, register u_int len, int csum)
262 {
263 int nleft = len;
264 const u_short *w = addr;
265 u_short answer;
266 int sum = csum;
267
268 /*
269 * Our algorithm is simple, using a 32 bit accumulator (sum),
270 * we add sequential 16 bit words to it, and at the end, fold
271 * back all the carry bits from the top 16 bits into the lower
272 * 16 bits.
273 */
274 while (nleft > 1) {
275 sum += *w++;
276 nleft -= 2;
277 }
278 if (nleft == 1)
279 sum += htons(*(u_char *)w<<8);
280
281 /*
282 * add back carry outs from top 16 bits to low 16 bits
283 */
284 sum = (sum >> 16) + (sum & 0xffff); /* add hi 16 to low 16 */
285 sum += (sum >> 16); /* add carry */
286 answer = ~sum; /* truncate to 16 bits */
287 return (answer);
288 }
289
290 /*
291 * Given the host-byte-order value of the checksum field in a packet
292 * header, and the network-byte-order computed checksum of the data
293 * that the checksum covers (including the checksum itself), compute
294 * what the checksum field *should* have been.
295 */
296 u_int16_t
297 in_cksum_shouldbe(u_int16_t sum, u_int16_t computed_sum)
298 {
299 u_int32_t shouldbe;
300
301 /*
302 * The value that should have gone into the checksum field
303 * is the negative of the value gotten by summing up everything
304 * *but* the checksum field.
305 *
306 * We can compute that by subtracting the value of the checksum
307 * field from the sum of all the data in the packet, and then
308 * computing the negative of that value.
309 *
310 * "sum" is the value of the checksum field, and "computed_sum"
311 * is the negative of the sum of all the data in the packets,
312 * so that's -(-computed_sum - sum), or (sum + computed_sum).
313 *
314 * All the arithmetic in question is one's complement, so the
315 * addition must include an end-around carry; we do this by
316 * doing the arithmetic in 32 bits (with no sign-extension),
317 * and then adding the upper 16 bits of the sum, which contain
318 * the carry, to the lower 16 bits of the sum, and then do it
319 * again in case *that* sum produced a carry.
320 *
321 * As RFC 1071 notes, the checksum can be computed without
322 * byte-swapping the 16-bit words; summing 16-bit words
323 * on a big-endian machine gives a big-endian checksum, which
324 * can be directly stuffed into the big-endian checksum fields
325 * in protocol headers, and summing words on a little-endian
326 * machine gives a little-endian checksum, which must be
327 * byte-swapped before being stuffed into a big-endian checksum
328 * field.
329 *
330 * "computed_sum" is a network-byte-order value, so we must put
331 * it in host byte order before subtracting it from the
332 * host-byte-order value from the header; the adjusted checksum
333 * will be in host byte order, which is what we'll return.
334 */
335 shouldbe = sum;
336 shouldbe += ntohs(computed_sum);
337 shouldbe = (shouldbe & 0xFFFF) + (shouldbe >> 16);
338 shouldbe = (shouldbe & 0xFFFF) + (shouldbe >> 16);
339 return shouldbe;
340 }
341
342 /*
343 * print an IP datagram.
344 */
345 void
346 ip_print(register const u_char *bp, register u_int length)
347 {
348 register const struct ip *ip;
349 register u_int hlen, len, len0, off;
350 register const u_char *cp;
351 u_char nh;
352 int advance;
353 struct protoent *proto;
354
355 ip = (const struct ip *)bp;
356 if ((u_char *)(ip + 1) > snapend) {
357 printf("[|ip]");
358 return;
359 }
360 if (length < sizeof (struct ip)) {
361 (void)printf("truncated-ip %d", length);
362 return;
363 }
364 hlen = IP_HL(ip) * 4;
365 if (hlen < sizeof (struct ip)) {
366 (void)printf("bad-hlen %d", hlen);
367 return;
368 }
369
370 len = EXTRACT_16BITS(&ip->ip_len);
371 if (length < len)
372 (void)printf("truncated-ip - %d bytes missing! ",
373 len - length);
374 len -= hlen;
375 len0 = len;
376
377 off = EXTRACT_16BITS(&ip->ip_off);
378
379 if (vflag) {
380 (void)printf("(tos 0x%x", (int)ip->ip_tos);
381 /* ECN bits */
382 if (ip->ip_tos & 0x03) {
383 switch (ip->ip_tos & 0x03) {
384 case 1:
385 (void)printf(",ECT(1)");
386 break;
387 case 2:
388 (void)printf(",ECT(0)");
389 break;
390 case 3:
391 (void)printf(",CE");
392 }
393 }
394
395 if (ip->ip_ttl >= 1)
396 (void)printf(", ttl %u", ip->ip_ttl);
397
398 if ((off & 0x3fff) != 0)
399 (void)printf(", id %u", EXTRACT_16BITS(&ip->ip_id));
400
401 (void)printf(", length: %u", EXTRACT_16BITS(&ip->ip_len));
402
403 if ((hlen - sizeof(struct ip)) > 0) {
404 (void)printf(", optlength: %u (", hlen - (u_int)sizeof(struct ip));
405 ip_optprint((u_char *)(ip + 1), hlen - sizeof(struct ip));
406 printf(" )");
407 }
408 printf(") ");
409 }
410
411 /*
412 * If this is fragment zero, hand it to the next higher
413 * level protocol.
414 */
415 if ((off & 0x1fff) == 0) {
416 cp = (const u_char *)ip + hlen;
417 nh = ip->ip_p;
418
419 #ifndef IPPROTO_SCTP
420 #define IPPROTO_SCTP 132
421 #endif
422 if (nh != IPPROTO_TCP && nh != IPPROTO_UDP &&
423 nh != IPPROTO_SCTP) {
424 (void)printf("%s > %s: ", ipaddr_string(&ip->ip_src),
425 ipaddr_string(&ip->ip_dst));
426 }
427 again:
428 switch (nh) {
429
430 #ifndef IPPROTO_AH
431 #define IPPROTO_AH 51
432 #endif
433 case IPPROTO_AH:
434 nh = *cp;
435 advance = ah_print(cp);
436 cp += advance;
437 len -= advance;
438 goto again;
439
440 #ifndef IPPROTO_ESP
441 #define IPPROTO_ESP 50
442 #endif
443 case IPPROTO_ESP:
444 {
445 int enh, padlen;
446 advance = esp_print(cp, (const u_char *)ip, &enh, &padlen);
447 cp += advance;
448 len -= advance + padlen;
449 if (enh < 0)
450 break;
451 nh = enh & 0xff;
452 goto again;
453 }
454
455 #ifndef IPPROTO_IPCOMP
456 #define IPPROTO_IPCOMP 108
457 #endif
458 case IPPROTO_IPCOMP:
459 {
460 int enh;
461 advance = ipcomp_print(cp, &enh);
462 cp += advance;
463 len -= advance;
464 if (enh < 0)
465 break;
466 nh = enh & 0xff;
467 goto again;
468 }
469
470 case IPPROTO_SCTP:
471 sctp_print(cp, (const u_char *)ip, len);
472 break;
473
474 case IPPROTO_TCP:
475 tcp_print(cp, len, (const u_char *)ip, (off &~ 0x6000));
476 break;
477
478 case IPPROTO_UDP:
479 udp_print(cp, len, (const u_char *)ip, (off &~ 0x6000));
480 break;
481
482 case IPPROTO_ICMP:
483 icmp_print(cp, len, (const u_char *)ip);
484 break;
485
486 #ifndef IPPROTO_IGRP
487 #define IPPROTO_IGRP 9
488 #endif
489 case IPPROTO_IGRP:
490 igrp_print(cp, len, (const u_char *)ip);
491 break;
492
493 case IPPROTO_ND:
494 (void)printf(" nd %d", len);
495 break;
496
497 case IPPROTO_EGP:
498 egp_print(cp);
499 break;
500
501 #ifndef IPPROTO_OSPF
502 #define IPPROTO_OSPF 89
503 #endif
504 case IPPROTO_OSPF:
505 ospf_print(cp, len, (const u_char *)ip);
506 break;
507
508 #ifndef IPPROTO_IGMP
509 #define IPPROTO_IGMP 2
510 #endif
511 case IPPROTO_IGMP:
512 igmp_print(cp, len);
513 break;
514
515 case 4:
516 /* DVMRP multicast tunnel (ip-in-ip encapsulation) */
517 ip_print(cp, len);
518 if (! vflag) {
519 printf(" (ipip-proto-4)");
520 return;
521 }
522 break;
523
524 #ifdef INET6
525 #ifndef IP6PROTO_ENCAP
526 #define IP6PROTO_ENCAP 41
527 #endif
528 case IP6PROTO_ENCAP:
529 /* ip6-in-ip encapsulation */
530 ip6_print(cp, len);
531 break;
532 #endif /*INET6*/
533
534 #ifndef IPPROTO_RSVP
535 #define IPPROTO_RSVP 46
536 #endif
537 case IPPROTO_RSVP:
538 rsvp_print(cp, len);
539 break;
540
541 #ifndef IPPROTO_GRE
542 #define IPPROTO_GRE 47
543 #endif
544 case IPPROTO_GRE:
545 /* do it */
546 gre_print(cp, len);
547 break;
548
549 #ifndef IPPROTO_MOBILE
550 #define IPPROTO_MOBILE 55
551 #endif
552 case IPPROTO_MOBILE:
553 mobile_print(cp, len);
554 break;
555
556 #ifndef IPPROTO_PIM
557 #define IPPROTO_PIM 103
558 #endif
559 case IPPROTO_PIM:
560 pim_print(cp, len);
561 break;
562
563 #ifndef IPPROTO_VRRP
564 #define IPPROTO_VRRP 112
565 #endif
566 case IPPROTO_VRRP:
567 vrrp_print(cp, len, ip->ip_ttl);
568 break;
569
570 default:
571 if ((proto = getprotobynumber(nh)) != NULL)
572 (void)printf(" %s", proto->p_name);
573 else
574 (void)printf(" ip-proto-%d", nh);
575 printf(" %d", len);
576 break;
577 }
578 }
579
580 /* Ultra quiet now means that all this stuff should be suppressed */
581 /* res 3-Nov-98 */
582 if (qflag > 1) return;
583
584
585 /*
586 * for fragmented datagrams, print id:size@offset. On all
587 * but the last stick a "+". For unfragmented datagrams, note
588 * the don't fragment flag.
589 */
590 len = len0; /* get the original length */
591 if (off & 0x3fff) {
592 /*
593 * if this isn't the first frag, we're missing the
594 * next level protocol header. print the ip addr
595 * and the protocol.
596 */
597 if (off & 0x1fff) {
598 (void)printf("%s > %s:", ipaddr_string(&ip->ip_src),
599 ipaddr_string(&ip->ip_dst));
600 if ((proto = getprotobynumber(ip->ip_p)) != NULL)
601 (void)printf(" %s", proto->p_name);
602 else
603 (void)printf(" ip-proto-%d", ip->ip_p);
604 }
605 #ifndef IP_MF
606 #define IP_MF 0x2000
607 #endif /* IP_MF */
608 #ifndef IP_DF
609 #define IP_DF 0x4000
610 #endif /* IP_DF */
611 (void)printf(" (frag %u:%u@%u%s)", EXTRACT_16BITS(&ip->ip_id), len,
612 (off & 0x1fff) * 8,
613 (off & IP_MF)? "+" : "");
614
615 } else if (off & IP_DF)
616 (void)printf(" (DF)");
617
618 if (vflag) {
619 u_int16_t sum, ip_sum;
620 const char *sep = "";
621
622 if ((u_char *)ip + hlen <= snapend) {
623 sum = in_cksum((const u_short *)ip, hlen, 0);
624 if (sum != 0) {
625 ip_sum = EXTRACT_16BITS(&ip->ip_sum);
626 (void)printf("%sbad cksum %x (->%x)!", sep,
627 ip_sum,
628 in_cksum_shouldbe(ip_sum, sum));
629 sep = ", ";
630 }
631 }
632 }
633 }
634
635 void
636 ipN_print(register const u_char *bp, register u_int length)
637 {
638 struct ip *ip, hdr;
639
640 ip = (struct ip *)bp;
641 if (length < 4) {
642 (void)printf("truncated-ip %d", length);
643 return;
644 }
645 memcpy (&hdr, (char *)ip, 4);
646 switch (IP_V(&hdr)) {
647 case 4:
648 ip_print (bp, length);
649 return;
650 #ifdef INET6
651 case 6:
652 ip6_print (bp, length);
653 return;
654 #endif
655 default:
656 (void)printf("unknown ip %d", IP_V(&hdr));
657 return;
658 }
659 }
660
661
662