]>
The Tcpdump Group git mirrors - tcpdump/blob - print-ip6.c
2 * Copyright (c) 1988, 1989, 1990, 1991, 1992, 1993, 1994
3 * The Regents of the University of California. All rights reserved.
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
22 /* \summary: IPv6 printer */
26 #include "netdissect-stdinc.h"
30 #include "netdissect.h"
31 #include "addrtoname.h"
38 * If routing headers are presend and valid, set dst to the final destination.
39 * Otherwise, set it to the IPv6 destination.
41 * This is used for UDP and TCP pseudo-header in the checksum
45 ip6_finddst(netdissect_options
*ndo
, nd_ipv6
*dst
,
46 const struct ip6_hdr
*ip6
)
52 const struct ip6_rthdr
*dp
;
53 const struct ip6_rthdr0
*dp0
;
54 const struct ip6_srh
*srh
;
58 cp
= (const u_char
*)ip6
;
59 advance
= sizeof(struct ip6_hdr
);
60 nh
= GET_U_1(ip6
->ip6_nxt
);
61 dst_addr
= (const void *)ip6
->ip6_dst
;
63 while (cp
< ndo
->ndo_snapend
) {
70 case IPPROTO_MOBILITY_OLD
:
71 case IPPROTO_MOBILITY
:
73 * These have a header length byte, following
74 * the next header byte, giving the length of
75 * the header, in units of 8 octets, excluding
78 advance
= (GET_U_1(cp
+ 1) + 1) << 3;
82 case IPPROTO_FRAGMENT
:
84 * The byte following the next header byte is
85 * marked as reserved, and the header is always
88 advance
= sizeof(struct ip6_frag
);
96 dp
= (const struct ip6_rthdr
*)cp
;
98 len
= GET_U_1(dp
->ip6r_len
);
99 switch (GET_U_1(dp
->ip6r_type
)) {
101 case IPV6_RTHDR_TYPE_0
:
102 case IPV6_RTHDR_TYPE_2
: /* Mobile IPv6 ID-20 */
103 dp0
= (const struct ip6_rthdr0
*)dp
;
107 p
= (const u_char
*) dp0
->ip6r0_addr
;
108 for (i
= 0; i
< len
; i
++) {
110 dst_addr
= (const void *)p
;
114 case IPV6_RTHDR_TYPE_4
:
115 /* IPv6 Segment Routing Header (SRH) */
116 srh
= (const struct ip6_srh
*)dp
;
119 p
= (const u_char
*) srh
->srh_segments
;
121 * The list of segments are encoded in the reverse order.
122 * Accordingly, the final DA is encoded in srh_segments[0]
125 dst_addr
= (const void *)p
;
133 * Only one routing header to a customer.
142 * AH and ESP are, in the RFCs that describe them,
143 * described as being "viewed as an end-to-end
144 * payload" "in the IPv6 context, so that they
145 * "should appear after hop-by-hop, routing, and
146 * fragmentation extension headers". We assume
147 * that's the case, and stop as soon as we see
148 * one. (We can't handle an ESP header in
149 * the general case anyway, as its length depends
150 * on the encryption algorithm.)
152 * IPComp is also "viewed as an end-to-end
153 * payload" "in the IPv6 context".
155 * All other protocols are assumed to be the final
164 GET_CPY_BYTES(dst
, dst_addr
, sizeof(nd_ipv6
));
168 * Compute a V6-style checksum by building a pseudoheader.
171 nextproto6_cksum(netdissect_options
*ndo
,
172 const struct ip6_hdr
*ip6
, const uint8_t *data
,
173 u_int len
, u_int covlen
, uint8_t next_proto
)
182 struct cksum_vec vec
[2];
186 memset(&ph
, 0, sizeof(ph
));
187 GET_CPY_BYTES(&ph
.ph_src
, ip6
->ip6_src
, sizeof(nd_ipv6
));
188 nh
= GET_U_1(ip6
->ip6_nxt
);
191 case IPPROTO_HOPOPTS
:
192 case IPPROTO_DSTOPTS
:
193 case IPPROTO_MOBILITY_OLD
:
194 case IPPROTO_MOBILITY
:
195 case IPPROTO_FRAGMENT
:
196 case IPPROTO_ROUTING
:
198 * The next header is either a routing header or a header
199 * after which there might be a routing header, so scan
200 * for a routing header.
202 ip6_finddst(ndo
, &ph
.ph_dst
, ip6
);
206 GET_CPY_BYTES(&ph
.ph_dst
, ip6
->ip6_dst
, sizeof(nd_ipv6
));
209 ph
.ph_len
= htonl(len
);
210 ph
.ph_nxt
= next_proto
;
212 vec
[0].ptr
= (const uint8_t *)(void *)&ph
;
213 vec
[0].len
= sizeof(ph
);
217 return in_cksum(vec
, 2);
221 * print an IP6 datagram.
224 ip6_print(netdissect_options
*ndo
, const u_char
*bp
, u_int length
)
226 const struct ip6_hdr
*ip6
;
231 uint32_t payload_len
;
235 int found_extension_header
;
239 ndo
->ndo_protocol
= "ip6";
240 ip6
= (const struct ip6_hdr
*)bp
;
242 if (!ndo
->ndo_eflag
) {
243 nd_print_protocol_caps(ndo
);
247 ND_ICHECK_ZU(length
, <, sizeof (struct ip6_hdr
));
248 ND_ICHECKMSG_U("version", IP6_VERSION(ip6
), !=, 6);
250 payload_len
= GET_BE_U_2(ip6
->ip6_plen
);
254 * The Payload Length field in the IPv6 header must be set to zero
255 * in every packet that carries the Jumbo Payload option. If a
256 * packet is received with a valid Jumbo Payload option present and
257 * a non-zero IPv6 Payload Length field, an ICMP Parameter Problem
258 * message, Code 0, should be sent to the packet's source, pointing
259 * to the Option Type field of the Jumbo Payload option.
261 * Later versions of the IPv6 spec don't discuss the Jumbo Payload
264 * If the payload length is 0, we temporarily just set the total
265 * length to the remaining data in the packet (which, for Ethernet,
266 * could include frame padding, but if it's a Jumbo Payload frame,
267 * it shouldn't even be sendable over Ethernet, so we don't worry
268 * about that), so we can process the extension headers in order
269 * to *find* a Jumbo Payload hop-by-hop option and, when we've
270 * processed all the extension headers, check whether we found
271 * a Jumbo Payload option, and fail if we haven't.
273 if (payload_len
!= 0) {
274 len
= payload_len
+ sizeof(struct ip6_hdr
);
276 ND_PRINT("[header+payload length %u > length %u]",
278 nd_print_invalid(ndo
);
282 len
= length
+ sizeof(struct ip6_hdr
);
285 nh
= GET_U_1(ip6
->ip6_nxt
);
286 if (ndo
->ndo_vflag
) {
287 flow
= GET_BE_U_4(ip6
->ip6_flow
);
290 if (flow
& 0x0ff00000)
291 ND_PRINT("class 0x%02x, ", (flow
& 0x0ff00000) >> 20);
292 if (flow
& 0x000fffff)
293 ND_PRINT("flowlabel 0x%05x, ", flow
& 0x000fffff);
295 ND_PRINT("hlim %u, next-header %s (%u), payload length %u) ",
296 GET_U_1(ip6
->ip6_hlim
),
297 tok2str(ipproto_values
,"unknown",nh
),
304 * Cut off the snapshot length to the end of the IP payload
305 * or the end of the data in which it's contained, whichever
308 if (!nd_push_snaplen(ndo
, bp
, ND_MIN(length
, len
))) {
309 (*ndo
->ndo_error
)(ndo
, S_ERR_ND_MEM_ALLOC
,
310 "%s: can't push snaplen on buffer stack", __func__
);
313 cp
= (const u_char
*)ip6
;
314 advance
= sizeof(struct ip6_hdr
);
316 /* Process extension headers */
317 found_extension_header
= 0;
320 while (cp
< ndo
->ndo_snapend
&& advance
> 0) {
321 if (len
< (u_int
)advance
)
325 total_advance
+= advance
;
327 if (cp
== (const u_char
*)(ip6
+ 1) &&
328 nh
!= IPPROTO_TCP
&& nh
!= IPPROTO_UDP
&&
329 nh
!= IPPROTO_DCCP
&& nh
!= IPPROTO_SCTP
) {
330 ND_PRINT("%s > %s: ", GET_IP6ADDR_STRING(ip6
->ip6_src
),
331 GET_IP6ADDR_STRING(ip6
->ip6_dst
));
336 case IPPROTO_HOPOPTS
:
338 * The Hop-by-Hop Options header, when present,
339 * must immediately follow the IPv6 header (RFC 8200)
341 if (found_hbh
== 1) {
342 ND_PRINT("[The Hop-by-Hop Options header was already found]");
343 nd_print_invalid(ndo
);
347 ND_PRINT("[The Hop-by-Hop Options header don't follow the IPv6 header]");
348 nd_print_invalid(ndo
);
351 advance
= hbhopt_process(ndo
, cp
, &found_jumbo
, &payload_len
);
352 if (payload_len
== 0 && found_jumbo
== 0) {
353 ND_PRINT("[No valid Jumbo Payload Hop-by-Hop option found]");
354 nd_print_invalid(ndo
);
358 nd_pop_packet_info(ndo
);
361 found_extension_header
= 1;
366 case IPPROTO_DSTOPTS
:
367 advance
= dstopt_process(ndo
, cp
);
369 nd_pop_packet_info(ndo
);
372 found_extension_header
= 1;
376 case IPPROTO_FRAGMENT
:
377 advance
= frag6_print(ndo
, cp
, (const u_char
*)ip6
);
378 if (advance
< 0 || ndo
->ndo_snapend
<= cp
+ advance
) {
379 nd_pop_packet_info(ndo
);
382 found_extension_header
= 1;
387 case IPPROTO_MOBILITY_OLD
:
388 case IPPROTO_MOBILITY
:
391 * the next header field in a mobility header
392 * should be IPPROTO_NONE, but speaks of
393 * the possibility of a future extension in
394 * which payload can be piggybacked atop a
397 advance
= mobility_print(ndo
, cp
, (const u_char
*)ip6
);
399 nd_pop_packet_info(ndo
);
402 found_extension_header
= 1;
404 nd_pop_packet_info(ndo
);
407 case IPPROTO_ROUTING
:
409 advance
= rt6_print(ndo
, cp
, (const u_char
*)ip6
);
411 nd_pop_packet_info(ndo
);
414 found_extension_header
= 1;
420 * Not an extension header; hand off to the
421 * IP protocol demuxer.
425 * We saw a Jumbo Payload option.
426 * Set the length to the payload length
427 * plus the IPv6 header length, and
428 * change the snapshot length accordingly.
430 * But make sure it's not shorter than
431 * the total number of bytes we've
434 len
= payload_len
+ sizeof(struct ip6_hdr
);
435 if (len
< total_advance
)
438 ND_PRINT("[header+payload length %u > length %u]",
440 nd_print_invalid(ndo
);
443 nd_change_snaplen(ndo
, bp
, len
);
446 * Now subtract the length of the IPv6
447 * header plus extension headers to get
448 * the payload length.
450 len
-= total_advance
;
453 * We didn't see a Jumbo Payload option;
454 * was the payload length zero?
456 if (payload_len
== 0) {
458 * Yes. If we found an extension
459 * header, treat that as a truncated
460 * packet header, as there was
461 * no payload to contain an
464 if (found_extension_header
)
468 * OK, we didn't see any extension
469 * header, but that means we have
470 * no payload, so set the length
471 * to the IPv6 header length,
472 * and change the snapshot length
475 len
= sizeof(struct ip6_hdr
);
476 nd_change_snaplen(ndo
, bp
, len
);
479 * Now subtract the length of
480 * the IPv6 header plus extension
481 * headers (there weren't any, so
482 * that's just the IPv6 header
483 * length) to get the payload length.
485 len
-= total_advance
;
488 ip_demux_print(ndo
, cp
, len
, 6, fragmented
,
489 GET_U_1(ip6
->ip6_hlim
), nh
, bp
);
490 nd_pop_packet_info(ndo
);
495 /* ndo_protocol reassignment after xxx_print() calls */
496 ndo
->ndo_protocol
= "ip6";
499 nd_pop_packet_info(ndo
);
506 nd_print_invalid(ndo
);