]> The Tcpdump Group git mirrors - tcpdump/blob - print-rt6.c
RT6: Use a "struct tok" for the SRH TLV type
[tcpdump] / print-rt6.c
1 /*
2 * Copyright (c) 1988, 1989, 1990, 1991, 1993, 1994
3 * The Regents of the University of California. All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that: (1) source code distributions
7 * retain the above copyright notice and this paragraph in its entirety, (2)
8 * distributions including binary code include the above copyright notice and
9 * this paragraph in its entirety in the documentation or other materials
10 * provided with the distribution, and (3) all advertising materials mentioning
11 * features or use of this software display the following acknowledgement:
12 * ``This product includes software developed by the University of California,
13 * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14 * the University nor the names of its contributors may be used to endorse
15 * or promote products derived from this software without specific prior
16 * written permission.
17 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18 * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20 */
21
22 /* \summary: IPv6 routing header printer */
23
24 #ifdef HAVE_CONFIG_H
25 #include <config.h>
26 #endif
27
28 #include "netdissect-stdinc.h"
29
30 #include "netdissect.h"
31 #include "addrtoname.h"
32 #include "extract.h"
33
34 #include "ip6.h"
35
36 const struct tok srh_tlv_type[] = {
37 { IPV6_SRH_TLV_PAD1, "Pad1"},
38 { IPV6_SRH_TLV_PADN, "PadN"},
39 { IPV6_SRH_TLV_HMAC, "HMAC"},
40 { 0, NULL }
41 };
42
43 static int
44 srh_tlv_print(netdissect_options *ndo, const u_char *p, u_int bytes_left)
45 {
46 u_int tlv_type, tlv_len;
47 while (bytes_left != 0) {
48 tlv_type = GET_U_1(p);
49 ND_PRINT(", TLV-type=%s(%u)",
50 tok2str(srh_tlv_type, "Unknown", tlv_type),
51 tlv_type);
52 ND_ICHECKMSG_U("remaining length", bytes_left, <, 1);
53 p += 1;
54 bytes_left -= 1;
55 if (bytes_left == 0)
56 break;
57 if (tlv_type == IPV6_SRH_TLV_PAD1)
58 continue;
59
60 tlv_len = GET_U_1(p);
61 ND_PRINT(", TLV-len=%u", tlv_len);
62 ND_ICHECKMSG_U("remaining length", bytes_left, <, 1);
63 p += 1;
64 bytes_left -= 1;
65
66 switch (tlv_type) {
67 case IPV6_SRH_TLV_PADN:
68 ND_ICHECKMSG_U("PadN length", tlv_len, >, 5); /* RFC 8754 */
69 ND_ICHECKMSG_U("remaining length", bytes_left, <, tlv_len);
70 p += tlv_len;
71 bytes_left -= tlv_len;
72 break;
73 case IPV6_SRH_TLV_HMAC:
74 ND_ICHECKMSG_U("remaining length", bytes_left, <, 6);
75 uint16_t reserved;
76 uint32_t key_id;
77 uint8_t hmac_byte;
78 reserved = GET_BE_U_2(p);
79 p += 2;
80 if (ndo->ndo_vflag)
81 ND_PRINT(", D=%u", reserved >> 15);
82 key_id = GET_BE_U_4(p);
83 p += 4;
84 if (ndo->ndo_vflag)
85 ND_PRINT(", HMAC-key-ID=0x%02x", key_id);
86 bytes_left -= 6;
87 if (ndo->ndo_vflag)
88 ND_PRINT(", HMAC=0x");
89 for (u_int i = 0; i < tlv_len; i++) {
90 hmac_byte = GET_U_1(p);
91 ND_ICHECKMSG_U("remaining length", bytes_left, <, 1);
92 p += 1;
93 bytes_left -= 1;
94 if (ndo->ndo_vflag)
95 ND_PRINT("%02x", hmac_byte);
96 }
97 break;
98 default: /* Unknown type */
99 if (ndo->ndo_vflag)
100 ND_PRINT(", TLV-value=0x");
101 ND_ICHECKMSG_U("remaining length", bytes_left, <, tlv_len);
102 uint8_t tlv_byte;
103 for (u_int i = 0; i < tlv_len; i++) {
104 tlv_byte = GET_U_1(p);
105 p += 1;
106 bytes_left -= 1;
107 if (ndo->ndo_vflag)
108 ND_PRINT("%02x", tlv_byte);
109 }
110 break;
111 }
112 }
113 return 0;
114
115 invalid:
116 return -1;
117 }
118
119
120 int
121 rt6_print(netdissect_options *ndo, const u_char *bp, const u_char *bp2 _U_)
122 {
123 const struct ip6_rthdr *dp;
124 const struct ip6_rthdr0 *dp0;
125 const struct ip6_srh *srh;
126 u_int i, len, type, seg_list_len, last_entry;
127 int err;
128 const u_char *p;
129
130 ndo->ndo_protocol = "rt6";
131
132 nd_print_protocol_caps(ndo);
133 dp = (const struct ip6_rthdr *)bp;
134
135 len = GET_U_1(dp->ip6r_len);
136 ND_PRINT(" (len=%u", len); /*)*/
137 type = GET_U_1(dp->ip6r_type);
138 ND_PRINT(", type=%u", type);
139 if (type == IPV6_RTHDR_TYPE_0)
140 ND_PRINT(" [Deprecated]");
141 ND_PRINT(", segleft=%u", GET_U_1(dp->ip6r_segleft));
142
143 switch (type) {
144 case IPV6_RTHDR_TYPE_0:
145 case IPV6_RTHDR_TYPE_2: /* Mobile IPv6 ID-20 */
146 dp0 = (const struct ip6_rthdr0 *)dp;
147
148 if (GET_BE_U_4(dp0->ip6r0_reserved) || ndo->ndo_vflag) {
149 ND_PRINT(", rsv=0x%0x",
150 GET_BE_U_4(dp0->ip6r0_reserved));
151 }
152
153 if (len % 2 == 1) {
154 ND_PRINT(" (invalid length %u)", len);
155 goto invalid;
156 }
157 len >>= 1;
158 p = (const u_char *) dp0->ip6r0_addr;
159 for (i = 0; i < len; i++) {
160 ND_PRINT(", [%u]%s", i, GET_IP6ADDR_STRING(p));
161 p += 16;
162 }
163 /*(*/
164 ND_PRINT(") ");
165 return((GET_U_1(dp0->ip6r0_len) + 1) << 3);
166 break;
167 case IPV6_RTHDR_TYPE_4:
168 srh = (const struct ip6_srh *)dp;
169 last_entry = GET_U_1(srh->srh_last_ent);
170 ND_PRINT(", last-entry=%u", last_entry);
171
172 if (GET_U_1(srh->srh_flags) || ndo->ndo_vflag) {
173 ND_PRINT(", flags=0x%0x",
174 GET_U_1(srh->srh_flags));
175 }
176
177 ND_PRINT(", tag=%x", GET_BE_U_2(srh->srh_tag));
178 p = (const u_char *) srh->srh_segments;
179 for (i = 0; i < last_entry + 1; i++) {
180 ND_PRINT(", [%u]%s", i, GET_IP6ADDR_STRING(p));
181 p += 16;
182 }
183 seg_list_len = (last_entry + 1) * 2;
184 if (seg_list_len < len) {
185 /* there is TLV */
186 u_int bytes_left;
187 bytes_left = (len - seg_list_len) * 8;
188 err = srh_tlv_print(ndo, p, bytes_left);
189 if (err)
190 goto invalid;
191 }
192
193 /*(*/
194 ND_PRINT(") ");
195 return((GET_U_1(srh->srh_len) + 1) << 3);
196 break;
197 default:
198 ND_PRINT(" (unknown type)");
199 goto invalid;
200 }
201
202 invalid:
203 nd_print_invalid(ndo);
204 return -1;
205 }