]> The Tcpdump Group git mirrors - tcpdump/blobdiff - print-rt6.c
CI: Add warning exemptions for Sun C (suncc-5.14) on Solaris 10
[tcpdump] / print-rt6.c
index b8e16d599544e8ad88a9d431d086b46e38100d1f..edbcd96d5997746bccf287a430df7a1d9782a1d8 100644 (file)
  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
  */
 
-#ifndef lint
-static const char rcsid[] =
-    "@(#) /master/usr.sbin/tcpdump/tcpdump/print-icmp.c,v 2.1 1995/02/03 18:14:42 polk Exp (LBL)";
-#endif
+/* \summary: IPv6 routing header printer */
 
-#ifdef HAVE_CONFIG_H
-#include "config.h"
-#endif
+#include <config.h>
 
-#ifdef INET6
+#include "netdissect-stdinc.h"
 
-#include <sys/param.h>
-#include <sys/time.h>
-#include <sys/types.h>
-#include <sys/socket.h>
+#define ND_LONGJMP_FROM_TCHECK
+#include "netdissect.h"
+#include "addrtoname.h"
+#include "extract.h"
 
-#include <net/if.h>
+#include "ip6.h"
 
-#include <netinet/in.h>
-#include <netinet/if_ether.h>
-#include <netinet/in_systm.h>
-#include <netinet/ip.h>
-#include <netinet/ip_icmp.h>
-#include <netinet/ip_var.h>
-#include <netinet/udp.h>
-#include <netinet/udp_var.h>
-#include <netinet/tcp.h>
+static const struct tok srh_tlv_type[] = {
+    { IPV6_SRH_TLV_PAD1, "Pad1"},
+    { IPV6_SRH_TLV_PADN, "PadN"},
+    { IPV6_SRH_TLV_HMAC, "HMAC"},
+    { 0, NULL }
+};
 
-#include <stdio.h>
+static int
+srh_tlv_print(netdissect_options *ndo, const u_char *p, u_int bytes_left)
+{
+       u_int tlv_type, tlv_len;
+       while (bytes_left != 0) {
+               tlv_type = GET_U_1(p);
+               ND_PRINT(", TLV-type=%s(%u)",
+                        tok2str(srh_tlv_type, "Unknown", tlv_type),
+                        tlv_type);
+               ND_ICHECKMSG_U("remaining length", bytes_left, <, 1);
+               p += 1;
+               bytes_left -= 1;
+               if (bytes_left == 0)
+                       break;
+               if (tlv_type == IPV6_SRH_TLV_PAD1)
+                       continue;
 
-#include <netinet/ip6.h>
+               tlv_len = GET_U_1(p);
+               ND_PRINT(", TLV-len=%u", tlv_len);
+               ND_ICHECKMSG_U("remaining length", bytes_left, <, 1);
+               p += 1;
+               bytes_left -= 1;
+
+               switch (tlv_type) {
+               case IPV6_SRH_TLV_PADN:
+                       ND_ICHECKMSG_U("PadN length", tlv_len, >, 5); /* RFC 8754 */
+                       ND_ICHECKMSG_U("remaining length", bytes_left, <, tlv_len);
+                       ND_TCHECK_LEN(p, tlv_len);
+                       p += tlv_len;
+                       bytes_left -= tlv_len;
+                       break;
+               case IPV6_SRH_TLV_HMAC:
+                       ND_ICHECKMSG_U("remaining length", bytes_left, <, 6);
+                       uint16_t reserved;
+                       uint32_t key_id;
+                       uint8_t hmac_byte;
+                       reserved = GET_BE_U_2(p);
+                       p += 2;
+                       if (ndo->ndo_vflag)
+                               ND_PRINT(", D=%u", reserved >> 15);
+                       if (ndo->ndo_vflag && (reserved & 0x7fff) != 0)
+                               ND_PRINT(", reserved MBZ %u", reserved & 0x7fff);
+                       key_id = GET_BE_U_4(p);
+                       p += 4;
+                       if (ndo->ndo_vflag)
+                               ND_PRINT(", HMAC-key-ID=0x%02x", key_id);
+                       bytes_left -= 6;
+                       if (ndo->ndo_vflag)
+                               ND_PRINT(", HMAC=0x");
+                       for (u_int i = 0; i < tlv_len; i++) {
+                               hmac_byte = GET_U_1(p);
+                               ND_ICHECKMSG_U("remaining length", bytes_left, <, 1);
+                               p += 1;
+                               bytes_left -= 1;
+                               if (ndo->ndo_vflag)
+                                       ND_PRINT("%02x", hmac_byte);
+                       }
+                       break;
+               default:        /* Unknown type */
+                       if (ndo->ndo_vflag)
+                               ND_PRINT(", TLV-value=0x");
+                       ND_ICHECKMSG_U("remaining length", bytes_left, <, tlv_len);
+                       uint8_t tlv_byte;
+                       for (u_int i = 0; i < tlv_len; i++) {
+                               tlv_byte = GET_U_1(p);
+                               p += 1;
+                               bytes_left -= 1;
+                               if (ndo->ndo_vflag)
+                                       ND_PRINT("%02x", tlv_byte);
+                       }
+                       break;
+               }
+       }
+       return 0;
+
+invalid:
+       return -1;
+}
 
-#include "interface.h"
-#include "addrtoname.h"
 
 int
-rt6_print(register const u_char *bp, register const u_char *bp2)
+rt6_print(netdissect_options *ndo, const u_char *bp, const u_char *bp2 _U_)
 {
-       register const struct ip6_rthdr0 *dp;
-       register const struct ip6_hdr *ip;
-       register const u_char *ep;
-       u_long bitmap = 0x0800;
-       u_long slmap;
-       int i, len;
-
-#if 0
-#define TCHECK(var) if ((u_char *)&(var) >= ep - sizeof(var)) goto trunc
-#endif
-
-       dp = (struct ip6_rthdr0 *)bp;
-       ip = (struct ip6_hdr *)bp2;
-       len = dp->ip6r0_len;
-
-       /* 'ep' points to the end of avaible data. */
-       ep = snapend;
-
-        printf("%s > %s: ",
-              ip6addr_string(&ip->ip6_src),
-              ip6addr_string(&ip->ip6_dst));
-       
-       TCHECK(dp->ip6r0_slmap[2]);
-       printf("srcrt (len=%d, ", dp->ip6r0_len);
-       printf("type=%d, ", dp->ip6r0_type);
-       printf("segleft=%d, ", dp->ip6r0_segleft);
-       if (dp->ip6r0_type != 0)
-               goto trunc;
-       slmap = (dp->ip6r0_slmap[0] << 16)
-             | (dp->ip6r0_slmap[1] <<  8)
-             | (dp->ip6r0_slmap[2]);
-       printf("bitmap=");
-       for (i = 24; i > 0; i--) {
-               if (slmap & bitmap)
-                       printf("S");
-               else
-                       printf("L");
-               bitmap >>= 1;
-       }
-       if (len % 2 == 1)
-               goto trunc;
-       len >>= 1;
-       printf(", ");
-       for (i = 0; i < len; i++) {
-               if ((((u_char *)&(dp->ip6r0_reserved)) + sizeof(u_long)
-                    + (i<<4)) > ep) goto trunc;
-               printf(" [%d]%s", i,
-                      ip6addr_string(((u_char *)&(dp->ip6r0_reserved)) +
-                                     sizeof(u_long) + (i<<4)));
-               if (i != len - 1)
-                       printf(", ");
-                  
+       const struct ip6_rthdr *dp;
+       const struct ip6_rthdr0 *dp0;
+       const struct ip6_srh *srh;
+       u_int i, len, type, seg_list_len, last_entry;
+       int err;
+       const u_char *p;
+
+       ndo->ndo_protocol = "rt6";
+
+       nd_print_protocol_caps(ndo);
+       dp = (const struct ip6_rthdr *)bp;
+
+       len = GET_U_1(dp->ip6r_len);
+       ND_PRINT(" (len=%u", len);      /*)*/
+       type = GET_U_1(dp->ip6r_type);
+       ND_PRINT(", type=%u", type);
+       if (type == IPV6_RTHDR_TYPE_0)
+               ND_PRINT(" [Deprecated]");
+       ND_PRINT(", segleft=%u", GET_U_1(dp->ip6r_segleft));
+
+       switch (type) {
+       case IPV6_RTHDR_TYPE_0:
+       case IPV6_RTHDR_TYPE_2:                 /* Mobile IPv6 ID-20 */
+               dp0 = (const struct ip6_rthdr0 *)dp;
+
+               if (GET_BE_U_4(dp0->ip6r0_reserved) || ndo->ndo_vflag) {
+                       ND_PRINT(", rsv=0x%0x",
+                           GET_BE_U_4(dp0->ip6r0_reserved));
+               }
+
+               if (len % 2 == 1) {
+                       ND_PRINT(" [length %u]", len);
+                       goto invalid;
+               }
+               len >>= 1;
+               p = (const u_char *) dp0->ip6r0_addr;
+               for (i = 0; i < len; i++) {
+                       ND_PRINT(", [%u]%s", i, GET_IP6ADDR_STRING(p));
+                       p += 16;
+               }
+               /*(*/
+               ND_PRINT(") ");
+               return((GET_U_1(dp0->ip6r0_len) + 1) << 3);
+       case IPV6_RTHDR_TYPE_4:
+               srh = (const struct ip6_srh *)dp;
+               last_entry = GET_U_1(srh->srh_last_ent);
+               ND_PRINT(", last-entry=%u", last_entry);
+
+               if (GET_U_1(srh->srh_flags) || ndo->ndo_vflag) {
+                       ND_PRINT(", flags=0x%0x",
+                               GET_U_1(srh->srh_flags));
+               }
+
+               ND_PRINT(", tag=%x", GET_BE_U_2(srh->srh_tag));
+               p  = (const u_char *) srh->srh_segments;
+               for (i = 0; i < last_entry + 1; i++) {
+                       ND_PRINT(", [%u]%s", i, GET_IP6ADDR_STRING(p));
+                       p += 16;
+               }
+               seg_list_len = (last_entry + 1) * 2;
+               if (seg_list_len < len) {
+                       /* there is TLV */
+                       u_int bytes_left;
+                       bytes_left = (len - seg_list_len) * 8;
+                       err = srh_tlv_print(ndo, p, bytes_left);
+                       if (err)
+                               goto invalid;
+               }
+
+               /*(*/
+               ND_PRINT(") ");
+               return((GET_U_1(srh->srh_len) + 1) << 3);
+       default:
+               ND_PRINT(" (unknown type)");
+               goto invalid;
        }
-       printf(")");
-       return((dp->ip6r0_len + 1) << 3);
- trunc:
-       fputs("[|srcrt]", stdout);
-       return 65535;
-#undef TCHECK
+
+invalid:
+       nd_print_invalid(ndo);
+       return -1;
 }
-#endif /* INET6 */