+ u_int tlv_type, tlv_len;
+ while (bytes_left != 0) {
+ tlv_type = GET_U_1(p);
+ ND_PRINT(", TLV-type=%s(%u)",
+ tok2str(srh_tlv_type, "Unknown", tlv_type),
+ tlv_type);
+ ND_ICHECKMSG_U("remaining length", bytes_left, <, 1);
+ p += 1;
+ bytes_left -= 1;
+ if (bytes_left == 0)
+ break;
+ if (tlv_type == IPV6_SRH_TLV_PAD1)
+ continue;
+
+ tlv_len = GET_U_1(p);
+ ND_PRINT(", TLV-len=%u", tlv_len);
+ ND_ICHECKMSG_U("remaining length", bytes_left, <, 1);
+ p += 1;
+ bytes_left -= 1;
+
+ switch (tlv_type) {
+ case IPV6_SRH_TLV_PADN:
+ ND_ICHECKMSG_U("PadN length", tlv_len, >, 5); /* RFC 8754 */
+ ND_ICHECKMSG_U("remaining length", bytes_left, <, tlv_len);
+ ND_TCHECK_LEN(p, tlv_len);
+ p += tlv_len;
+ bytes_left -= tlv_len;
+ break;
+ case IPV6_SRH_TLV_HMAC:
+ ND_ICHECKMSG_U("remaining length", bytes_left, <, 6);
+ uint16_t reserved;
+ uint32_t key_id;
+ uint8_t hmac_byte;
+ reserved = GET_BE_U_2(p);
+ p += 2;
+ if (ndo->ndo_vflag)
+ ND_PRINT(", D=%u", reserved >> 15);
+ if (ndo->ndo_vflag && (reserved & 0x7fff) != 0)
+ ND_PRINT(", reserved MBZ %u", reserved & 0x7fff);
+ key_id = GET_BE_U_4(p);
+ p += 4;
+ if (ndo->ndo_vflag)
+ ND_PRINT(", HMAC-key-ID=0x%02x", key_id);
+ bytes_left -= 6;
+ if (ndo->ndo_vflag)
+ ND_PRINT(", HMAC=0x");
+ for (u_int i = 0; i < tlv_len; i++) {
+ hmac_byte = GET_U_1(p);
+ ND_ICHECKMSG_U("remaining length", bytes_left, <, 1);
+ p += 1;
+ bytes_left -= 1;
+ if (ndo->ndo_vflag)
+ ND_PRINT("%02x", hmac_byte);
+ }
+ break;
+ default: /* Unknown type */
+ if (ndo->ndo_vflag)
+ ND_PRINT(", TLV-value=0x");
+ ND_ICHECKMSG_U("remaining length", bytes_left, <, tlv_len);
+ uint8_t tlv_byte;
+ for (u_int i = 0; i < tlv_len; i++) {
+ tlv_byte = GET_U_1(p);
+ p += 1;
+ bytes_left -= 1;
+ if (ndo->ndo_vflag)
+ ND_PRINT("%02x", tlv_byte);
+ }
+ break;
+ }
+ }
+ return 0;