xref: /freebsd/contrib/tcpdump/print-icmp6.c (revision 87b759f0fa1f7554d50ce640c40138512bbded44)
1 /*
2  * Copyright (c) 1988, 1989, 1990, 1991, 1993, 1994
3  *	The Regents of the University of California.  All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that: (1) source code distributions
7  * retain the above copyright notice and this paragraph in its entirety, (2)
8  * distributions including binary code include the above copyright notice and
9  * this paragraph in its entirety in the documentation or other materials
10  * provided with the distribution, and (3) all advertising materials mentioning
11  * features or use of this software display the following acknowledgement:
12  * ``This product includes software developed by the University of California,
13  * Lawrence Berkeley Laboratory and its contributors.'' Neither the name of
14  * the University nor the names of its contributors may be used to endorse
15  * or promote products derived from this software without specific prior
16  * written permission.
17  * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR IMPLIED
18  * WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED WARRANTIES OF
19  * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE.
20  */
21 
22 /* \summary: IPv6 Internet Control Message Protocol (ICMPv6) printer */
23 
24 #include <config.h>
25 
26 #include "netdissect-stdinc.h"
27 
28 #include <stdio.h>
29 #include <string.h>
30 
31 #include "netdissect.h"
32 #include "addrtoname.h"
33 #include "addrtostr.h"
34 #include "extract.h"
35 
36 #include "ip6.h"
37 #include "ipproto.h"
38 
39 #include "udp.h"
40 #include "ah.h"
41 
42 /*	NetBSD: icmp6.h,v 1.13 2000/08/03 16:30:37 itojun Exp	*/
43 /*	$KAME: icmp6.h,v 1.22 2000/08/03 15:25:16 jinmei Exp $	*/
44 
45 /*
46  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
47  * All rights reserved.
48  *
49  * Redistribution and use in source and binary forms, with or without
50  * modification, are permitted provided that the following conditions
51  * are met:
52  * 1. Redistributions of source code must retain the above copyright
53  *    notice, this list of conditions and the following disclaimer.
54  * 2. Redistributions in binary form must reproduce the above copyright
55  *    notice, this list of conditions and the following disclaimer in the
56  *    documentation and/or other materials provided with the distribution.
57  * 3. Neither the name of the project nor the names of its contributors
58  *    may be used to endorse or promote products derived from this software
59  *    without specific prior written permission.
60  *
61  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
62  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
63  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
64  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
65  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
66  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
67  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
68  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
69  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
70  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
71  * SUCH DAMAGE.
72  */
73 
74 struct icmp6_hdr {
75 	nd_uint8_t	icmp6_type;	/* type field */
76 	nd_uint8_t	icmp6_code;	/* code field */
77 	nd_uint16_t	icmp6_cksum;	/* checksum field */
78 	union {
79 		nd_uint32_t	icmp6_un_data32[1]; /* type-specific field */
80 		nd_uint16_t	icmp6_un_data16[2]; /* type-specific field */
81 		nd_uint8_t	icmp6_un_data8[4];  /* type-specific field */
82 		nd_byte		icmp6_un_data[1];   /* type-specific field */
83 	} icmp6_dataun;
84 };
85 
86 #define icmp6_data32	icmp6_dataun.icmp6_un_data32
87 #define icmp6_data16	icmp6_dataun.icmp6_un_data16
88 #define icmp6_data8	icmp6_dataun.icmp6_un_data8
89 #define icmp6_data	icmp6_dataun.icmp6_un_data
90 #define icmp6_pptr	icmp6_data32[0]		/* parameter prob */
91 #define icmp6_mtu	icmp6_data32[0]		/* packet too big */
92 #define icmp6_id	icmp6_data16[0]		/* echo request/reply */
93 #define icmp6_seq	icmp6_data16[1]		/* echo request/reply */
94 #define icmp6_maxdelay	icmp6_data16[0]		/* mcast group membership */
95 
96 #define ICMP6_DST_UNREACH		1	/* dest unreachable, codes: */
97 #define ICMP6_PACKET_TOO_BIG		2	/* packet too big */
98 #define ICMP6_TIME_EXCEEDED		3	/* time exceeded, code: */
99 #define ICMP6_PARAM_PROB		4	/* ip6 header bad */
100 
101 #define ICMP6_ECHO_REQUEST		128	/* echo service */
102 #define ICMP6_ECHO_REPLY		129	/* echo reply */
103 #define ICMP6_MEMBERSHIP_QUERY		130	/* group membership query */
104 #define MLD6_LISTENER_QUERY		130	/* multicast listener query */
105 #define ICMP6_MEMBERSHIP_REPORT		131	/* group membership report */
106 #define MLD6_LISTENER_REPORT		131	/* multicast listener report */
107 #define ICMP6_MEMBERSHIP_REDUCTION	132	/* group membership termination */
108 #define MLD6_LISTENER_DONE		132	/* multicast listener done */
109 
110 #define ND_ROUTER_SOLICIT		133	/* router solicitation */
111 #define ND_ROUTER_ADVERT		134	/* router advertisement */
112 #define ND_NEIGHBOR_SOLICIT		135	/* neighbor solicitation */
113 #define ND_NEIGHBOR_ADVERT		136	/* neighbor advertisement */
114 #define ND_REDIRECT			137	/* redirect */
115 
116 #define ICMP6_ROUTER_RENUMBERING	138	/* router renumbering */
117 
118 #define ICMP6_WRUREQUEST		139	/* who are you request */
119 #define ICMP6_WRUREPLY			140	/* who are you reply */
120 #define ICMP6_FQDN_QUERY		139	/* FQDN query */
121 #define ICMP6_FQDN_REPLY		140	/* FQDN reply */
122 #define ICMP6_NI_QUERY			139	/* node information request - RFC 4620 */
123 #define ICMP6_NI_REPLY			140	/* node information reply - RFC 4620 */
124 #define IND_SOLICIT			141	/* inverse neighbor solicitation */
125 #define IND_ADVERT			142	/* inverse neighbor advertisement */
126 
127 #define ICMP6_V2_MEMBERSHIP_REPORT	143	/* v2 membership report */
128 #define MLDV2_LISTENER_REPORT		143	/* v2 multicast listener report */
129 #define ICMP6_HADISCOV_REQUEST		144
130 #define ICMP6_HADISCOV_REPLY		145
131 #define ICMP6_MOBILEPREFIX_SOLICIT	146
132 #define ICMP6_MOBILEPREFIX_ADVERT	147
133 
134 #define MLD6_MTRACE_RESP		200	/* mtrace response(to sender) */
135 #define MLD6_MTRACE			201	/* mtrace messages */
136 
137 #define ICMP6_MAXTYPE			201
138 
139 #define ICMP6_DST_UNREACH_NOROUTE	0	/* no route to destination */
140 #define ICMP6_DST_UNREACH_ADMIN		1	/* administratively prohibited */
141 #define ICMP6_DST_UNREACH_NOTNEIGHBOR	2	/* not a neighbor(obsolete) */
142 #define ICMP6_DST_UNREACH_BEYONDSCOPE	2	/* beyond scope of source address */
143 #define ICMP6_DST_UNREACH_ADDR		3	/* address unreachable */
144 #define ICMP6_DST_UNREACH_NOPORT	4	/* port unreachable */
145 
146 #define ICMP6_TIME_EXCEED_TRANSIT	0	/* ttl==0 in transit */
147 #define ICMP6_TIME_EXCEED_REASSEMBLY	1	/* ttl==0 in reass */
148 
149 #define ICMP6_PARAMPROB_HEADER		0	/* erroneous header field */
150 #define ICMP6_PARAMPROB_NEXTHEADER	1	/* unrecognized next header */
151 #define ICMP6_PARAMPROB_OPTION		2	/* unrecognized option */
152 #define ICMP6_PARAMPROB_FRAGHDRCHAIN	3	/* incomplete header chain */
153 
154 #define ICMP6_INFOMSG_MASK		0x80	/* all informational messages */
155 
156 #define ICMP6_NI_SUBJ_IPV6	0	/* Query Subject is an IPv6 address */
157 #define ICMP6_NI_SUBJ_FQDN	1	/* Query Subject is a Domain name */
158 #define ICMP6_NI_SUBJ_IPV4	2	/* Query Subject is an IPv4 address */
159 
160 #define ICMP6_NI_SUCCESS	0	/* node information successful reply */
161 #define ICMP6_NI_REFUSED	1	/* node information request is refused */
162 #define ICMP6_NI_UNKNOWN	2	/* unknown Qtype */
163 
164 #define ICMP6_ROUTER_RENUMBERING_COMMAND  0	/* rr command */
165 #define ICMP6_ROUTER_RENUMBERING_RESULT   1	/* rr result */
166 #define ICMP6_ROUTER_RENUMBERING_SEQNUM_RESET   255	/* rr seq num reset */
167 
168 /* Used in kernel only */
169 #define ND_REDIRECT_ONLINK	0	/* redirect to an on-link node */
170 #define ND_REDIRECT_ROUTER	1	/* redirect to a better router */
171 
172 /*
173  * Multicast Listener Discovery
174  */
175 struct mld6_hdr {
176 	struct icmp6_hdr	mld6_hdr;
177 	nd_ipv6			mld6_addr; /* multicast address */
178 };
179 
180 #define mld6_type	mld6_hdr.icmp6_type
181 #define mld6_code	mld6_hdr.icmp6_code
182 #define mld6_cksum	mld6_hdr.icmp6_cksum
183 #define mld6_maxdelay	mld6_hdr.icmp6_data16[0]
184 #define mld6_reserved	mld6_hdr.icmp6_data16[1]
185 
186 #define MLD_MINLEN	24
187 #define MLDV2_MINLEN	28
188 
189 /*
190  * Neighbor Discovery
191  */
192 
193 struct nd_router_solicit {	/* router solicitation */
194 	struct icmp6_hdr	nd_rs_hdr;
195 	/* could be followed by options */
196 };
197 
198 #define nd_rs_type	nd_rs_hdr.icmp6_type
199 #define nd_rs_code	nd_rs_hdr.icmp6_code
200 #define nd_rs_cksum	nd_rs_hdr.icmp6_cksum
201 #define nd_rs_reserved	nd_rs_hdr.icmp6_data32[0]
202 
203 struct nd_router_advert {	/* router advertisement */
204 	struct icmp6_hdr	nd_ra_hdr;
205 	nd_uint32_t		nd_ra_reachable;	/* reachable time */
206 	nd_uint32_t		nd_ra_retransmit;	/* retransmit timer */
207 	/* could be followed by options */
208 };
209 
210 #define nd_ra_type		nd_ra_hdr.icmp6_type
211 #define nd_ra_code		nd_ra_hdr.icmp6_code
212 #define nd_ra_cksum		nd_ra_hdr.icmp6_cksum
213 #define nd_ra_curhoplimit	nd_ra_hdr.icmp6_data8[0]
214 #define nd_ra_flags_reserved	nd_ra_hdr.icmp6_data8[1]
215 #define ND_RA_FLAG_MANAGED	0x80
216 #define ND_RA_FLAG_OTHER	0x40
217 #define ND_RA_FLAG_HOME_AGENT	0x20
218 #define ND_RA_FLAG_IPV6ONLY	0x02
219 
220 /*
221  * Router preference values based on draft-draves-ipngwg-router-selection-01.
222  * These are non-standard definitions.
223  */
224 #define ND_RA_FLAG_RTPREF_MASK	0x18 /* 00011000 */
225 
226 #define ND_RA_FLAG_RTPREF_HIGH	0x08 /* 00001000 */
227 #define ND_RA_FLAG_RTPREF_MEDIUM	0x00 /* 00000000 */
228 #define ND_RA_FLAG_RTPREF_LOW	0x18 /* 00011000 */
229 #define ND_RA_FLAG_RTPREF_RSV	0x10 /* 00010000 */
230 
231 #define nd_ra_router_lifetime	nd_ra_hdr.icmp6_data16[1]
232 
233 struct nd_neighbor_solicit {	/* neighbor solicitation */
234 	struct icmp6_hdr	nd_ns_hdr;
235 	nd_ipv6			nd_ns_target;	/*target address */
236 	/* could be followed by options */
237 };
238 
239 #define nd_ns_type		nd_ns_hdr.icmp6_type
240 #define nd_ns_code		nd_ns_hdr.icmp6_code
241 #define nd_ns_cksum		nd_ns_hdr.icmp6_cksum
242 #define nd_ns_reserved		nd_ns_hdr.icmp6_data32[0]
243 
244 struct nd_neighbor_advert {	/* neighbor advertisement */
245 	struct icmp6_hdr	nd_na_hdr;
246 	nd_ipv6			nd_na_target;	/* target address */
247 	/* could be followed by options */
248 };
249 
250 #define nd_na_type		nd_na_hdr.icmp6_type
251 #define nd_na_code		nd_na_hdr.icmp6_code
252 #define nd_na_cksum		nd_na_hdr.icmp6_cksum
253 #define nd_na_flags_reserved	nd_na_hdr.icmp6_data32[0]
254 
255 #define ND_NA_FLAG_ROUTER		0x80000000
256 #define ND_NA_FLAG_SOLICITED		0x40000000
257 #define ND_NA_FLAG_OVERRIDE		0x20000000
258 
259 struct nd_redirect {		/* redirect */
260 	struct icmp6_hdr	nd_rd_hdr;
261 	nd_ipv6			nd_rd_target;	/* target address */
262 	nd_ipv6			nd_rd_dst;	/* destination address */
263 	/* could be followed by options */
264 };
265 
266 #define nd_rd_type		nd_rd_hdr.icmp6_type
267 #define nd_rd_code		nd_rd_hdr.icmp6_code
268 #define nd_rd_cksum		nd_rd_hdr.icmp6_cksum
269 #define nd_rd_reserved		nd_rd_hdr.icmp6_data32[0]
270 
271 struct nd_opt_hdr {		/* Neighbor discovery option header */
272 	nd_uint8_t	nd_opt_type;
273 	nd_uint8_t	nd_opt_len;
274 	/* followed by option specific data*/
275 };
276 
277 #define ND_OPT_SOURCE_LINKADDR		1
278 #define ND_OPT_TARGET_LINKADDR		2
279 #define ND_OPT_PREFIX_INFORMATION	3
280 #define ND_OPT_REDIRECTED_HEADER	4
281 #define ND_OPT_MTU			5
282 #define ND_OPT_ADVINTERVAL		7
283 #define ND_OPT_HOMEAGENT_INFO		8
284 #define ND_OPT_ROUTE_INFO		24	/* RFC4191 */
285 #define ND_OPT_RDNSS			25
286 #define ND_OPT_DNSSL			31
287 
288 struct nd_opt_prefix_info {	/* prefix information */
289 	nd_uint8_t	nd_opt_pi_type;
290 	nd_uint8_t	nd_opt_pi_len;
291 	nd_uint8_t	nd_opt_pi_prefix_len;
292 	nd_uint8_t	nd_opt_pi_flags_reserved;
293 	nd_uint32_t	nd_opt_pi_valid_time;
294 	nd_uint32_t	nd_opt_pi_preferred_time;
295 	nd_uint32_t	nd_opt_pi_reserved2;
296 	nd_ipv6		nd_opt_pi_prefix;
297 };
298 
299 #define ND_OPT_PI_FLAG_ONLINK		0x80
300 #define ND_OPT_PI_FLAG_AUTO		0x40
301 #define ND_OPT_PI_FLAG_ROUTER		0x20	/*2292bis*/
302 
303 struct nd_opt_rd_hdr {         /* redirected header */
304 	nd_uint8_t	nd_opt_rh_type;
305 	nd_uint8_t	nd_opt_rh_len;
306 	nd_uint16_t	nd_opt_rh_reserved1;
307 	nd_uint32_t	nd_opt_rh_reserved2;
308 	/* followed by IP header and data */
309 };
310 
311 struct nd_opt_mtu {		/* MTU option */
312 	nd_uint8_t	nd_opt_mtu_type;
313 	nd_uint8_t	nd_opt_mtu_len;
314 	nd_uint16_t	nd_opt_mtu_reserved;
315 	nd_uint32_t	nd_opt_mtu_mtu;
316 };
317 
318 struct nd_opt_rdnss {		/* RDNSS RFC 6106 5.1 */
319 	nd_uint8_t	nd_opt_rdnss_type;
320 	nd_uint8_t	nd_opt_rdnss_len;
321 	nd_uint16_t	nd_opt_rdnss_reserved;
322 	nd_uint32_t	nd_opt_rdnss_lifetime;
323 	nd_ipv6		nd_opt_rdnss_addr[1];	/* variable-length */
324 };
325 
326 struct nd_opt_dnssl {		/* DNSSL RFC 6106 5.2 */
327 	nd_uint8_t  nd_opt_dnssl_type;
328 	nd_uint8_t  nd_opt_dnssl_len;
329 	nd_uint16_t nd_opt_dnssl_reserved;
330 	nd_uint32_t nd_opt_dnssl_lifetime;
331 	/* followed by list of DNS search domains, variable-length */
332 };
333 
334 struct nd_opt_advinterval {	/* Advertisement interval option */
335 	nd_uint8_t	nd_opt_adv_type;
336 	nd_uint8_t	nd_opt_adv_len;
337 	nd_uint16_t	nd_opt_adv_reserved;
338 	nd_uint32_t	nd_opt_adv_interval;
339 };
340 
341 struct nd_opt_homeagent_info {	/* Home Agent info */
342 	nd_uint8_t	nd_opt_hai_type;
343 	nd_uint8_t	nd_opt_hai_len;
344 	nd_uint16_t	nd_opt_hai_reserved;
345 	nd_uint16_t	nd_opt_hai_preference;
346 	nd_uint16_t	nd_opt_hai_lifetime;
347 };
348 
349 struct nd_opt_route_info {	/* route info */
350 	nd_uint8_t	nd_opt_rti_type;
351 	nd_uint8_t	nd_opt_rti_len;
352 	nd_uint8_t	nd_opt_rti_prefixlen;
353 	nd_uint8_t	nd_opt_rti_flags;
354 	nd_uint32_t	nd_opt_rti_lifetime;
355 	/* prefix follows */
356 };
357 
358 /*
359  * icmp6 namelookup
360  */
361 
362 struct icmp6_namelookup {
363 	struct icmp6_hdr	icmp6_nl_hdr;
364 	nd_byte			icmp6_nl_nonce[8];
365 	nd_int32_t		icmp6_nl_ttl;
366 #if 0
367 	nd_uint8_t		icmp6_nl_len;
368 	nd_byte			icmp6_nl_name[3];
369 #endif
370 	/* could be followed by options */
371 };
372 
373 /*
374  * icmp6 node information
375  */
376 struct icmp6_nodeinfo {
377 	struct icmp6_hdr icmp6_ni_hdr;
378 	nd_byte icmp6_ni_nonce[8];
379 	/* could be followed by reply data */
380 };
381 
382 #define ni_type		icmp6_ni_hdr.icmp6_type
383 #define ni_code		icmp6_ni_hdr.icmp6_code
384 #define ni_cksum	icmp6_ni_hdr.icmp6_cksum
385 #define ni_qtype	icmp6_ni_hdr.icmp6_data16[0]
386 #define ni_flags	icmp6_ni_hdr.icmp6_data16[1]
387 
388 #define NI_QTYPE_NOOP		0 /* NOOP  */
389 #define NI_QTYPE_SUPTYPES	1 /* Supported Qtypes (drafts up to 09) */
390 #define NI_QTYPE_FQDN		2 /* FQDN (draft 04) */
391 #define NI_QTYPE_DNSNAME	2 /* DNS Name */
392 #define NI_QTYPE_NODEADDR	3 /* Node Addresses */
393 #define NI_QTYPE_IPV4ADDR	4 /* IPv4 Addresses */
394 
395 #define NI_NODEADDR_FLAG_TRUNCATE	0x0001
396 #define NI_NODEADDR_FLAG_ALL		0x0002
397 #define NI_NODEADDR_FLAG_COMPAT		0x0004
398 #define NI_NODEADDR_FLAG_LINKLOCAL	0x0008
399 #define NI_NODEADDR_FLAG_SITELOCAL	0x0010
400 #define NI_NODEADDR_FLAG_GLOBAL		0x0020
401 #define NI_NODEADDR_FLAG_ANYCAST	0x0040 /* just experimental. not in spec */
402 
403 struct ni_reply_fqdn {
404 	nd_uint32_t ni_fqdn_ttl;	/* TTL */
405 	nd_uint8_t ni_fqdn_namelen; /* length in octets of the FQDN */
406 	nd_byte ni_fqdn_name[3]; /* XXX: alignment */
407 };
408 
409 /*
410  * Router Renumbering. as router-renum-08.txt
411  */
412 struct icmp6_router_renum {	/* router renumbering header */
413 	struct icmp6_hdr	rr_hdr;
414 	nd_uint8_t		rr_segnum;
415 	nd_uint8_t		rr_flags;
416 	nd_uint16_t		rr_maxdelay;
417 	nd_uint32_t		rr_reserved;
418 };
419 #define ICMP6_RR_FLAGS_TEST		0x80
420 #define ICMP6_RR_FLAGS_REQRESULT	0x40
421 #define ICMP6_RR_FLAGS_FORCEAPPLY	0x20
422 #define ICMP6_RR_FLAGS_SPECSITE		0x10
423 #define ICMP6_RR_FLAGS_PREVDONE		0x08
424 
425 #define rr_type		rr_hdr.icmp6_type
426 #define rr_code		rr_hdr.icmp6_code
427 #define rr_cksum	rr_hdr.icmp6_cksum
428 #define rr_seqnum	rr_hdr.icmp6_data32[0]
429 
430 struct rr_pco_match {		/* match prefix part */
431 	nd_uint8_t		rpm_code;
432 	nd_uint8_t		rpm_len;
433 	nd_uint8_t		rpm_ordinal;
434 	nd_uint8_t		rpm_matchlen;
435 	nd_uint8_t		rpm_minlen;
436 	nd_uint8_t		rpm_maxlen;
437 	nd_uint16_t		rpm_reserved;
438 	nd_ipv6			rpm_prefix;
439 };
440 
441 #define RPM_PCO_ADD		1
442 #define RPM_PCO_CHANGE		2
443 #define RPM_PCO_SETGLOBAL	3
444 #define RPM_PCO_MAX		4
445 
446 struct rr_pco_use {		/* use prefix part */
447 	nd_uint8_t	rpu_uselen;
448 	nd_uint8_t	rpu_keeplen;
449 	nd_uint8_t	rpu_ramask;
450 	nd_uint8_t	rpu_raflags;
451 	nd_uint32_t	rpu_vltime;
452 	nd_uint32_t	rpu_pltime;
453 	nd_uint32_t	rpu_flags;
454 	nd_ipv6		rpu_prefix;
455 };
456 #define ICMP6_RR_PCOUSE_RAFLAGS_ONLINK	0x80
457 #define ICMP6_RR_PCOUSE_RAFLAGS_AUTO	0x40
458 
459 /* network endian */
460 #define ICMP6_RR_PCOUSE_FLAGS_DECRVLTIME     ((uint32_t)htonl(0x80000000))
461 #define ICMP6_RR_PCOUSE_FLAGS_DECRPLTIME     ((uint32_t)htonl(0x40000000))
462 
463 struct rr_result {		/* router renumbering result message */
464 	nd_uint16_t	rrr_flags;
465 	nd_uint8_t	rrr_ordinal;
466 	nd_uint8_t	rrr_matchedlen;
467 	nd_uint32_t	rrr_ifid;
468 	nd_ipv6		rrr_prefix;
469 };
470 /* network endian */
471 #define ICMP6_RR_RESULT_FLAGS_OOB		((uint16_t)htons(0x0002))
472 #define ICMP6_RR_RESULT_FLAGS_FORBIDDEN		((uint16_t)htons(0x0001))
473 
474 static const char *get_rtpref(u_int);
475 static const char *get_lifetime(uint32_t);
476 static void print_lladdr(netdissect_options *ndo, const u_char *, size_t);
477 static int icmp6_opt_print(netdissect_options *ndo, const u_char *, int);
478 static void mld6_print(netdissect_options *ndo, const u_char *);
479 static void mldv2_report_print(netdissect_options *ndo, const u_char *, u_int);
480 static void mldv2_query_print(netdissect_options *ndo, const u_char *, u_int);
481 static const struct udphdr *get_upperlayer(netdissect_options *ndo, const u_char *, u_int *);
482 static void dnsname_print(netdissect_options *ndo, const u_char *, const u_char *);
483 static void icmp6_nodeinfo_print(netdissect_options *ndo, u_int, const u_char *, const u_char *);
484 static void icmp6_rrenum_print(netdissect_options *ndo, const u_char *, const u_char *);
485 
486 /*
487  * DIO: Updated to RFC6550, as published in 2012: section 6. (page 30)
488  */
489 
490 #define ND_RPL_MESSAGE 155  /* 0x9B */
491 
492 enum ND_RPL_CODE {
493     ND_RPL_DAG_IS=0x00,
494     ND_RPL_DAG_IO=0x01,
495     ND_RPL_DAO   =0x02,
496     ND_RPL_DAO_ACK=0x03,
497     ND_RPL_SEC_DAG_IS = 0x80,
498     ND_RPL_SEC_DAG_IO = 0x81,
499     ND_RPL_SEC_DAG    = 0x82,
500     ND_RPL_SEC_DAG_ACK= 0x83,
501     ND_RPL_SEC_CONSIST= 0x8A
502 };
503 
504 enum ND_RPL_DIO_FLAGS {
505         ND_RPL_DIO_GROUNDED = 0x80,
506         ND_RPL_DIO_DATRIG   = 0x40,
507         ND_RPL_DIO_DASUPPORT= 0x20,
508         ND_RPL_DIO_RES4     = 0x10,
509         ND_RPL_DIO_RES3     = 0x08,
510         ND_RPL_DIO_PRF_MASK = 0x07  /* 3-bit preference */
511 };
512 
513 #define DAGID_LEN 16
514 
515 /* section 6 of draft-ietf-roll-rpl-19 */
516 struct nd_rpl_security {
517     nd_uint8_t  rpl_sec_t_reserved;     /* bit 7 is T-bit */
518     nd_uint8_t  rpl_sec_algo;
519     nd_uint16_t rpl_sec_kim_lvl_flags;  /* bit 15/14, KIM */
520                                       /* bit 10-8, LVL, bit 7-0 flags */
521     nd_uint32_t rpl_sec_counter;
522 #if 0
523     nd_byte     rpl_sec_ki[0];          /* depends upon kim */
524 #endif
525 };
526 
527 /* section 6.2.1, DODAG Information Solicitation (DIS_IS) */
528 struct nd_rpl_dis_is {
529     nd_uint8_t rpl_dis_flags;
530     nd_uint8_t rpl_dis_reserved;
531 #if 0
532     nd_byte    rpl_dis_options[0];
533 #endif
534 };
535 
536 /* section 6.3.1, DODAG Information Object (DIO) */
537 struct nd_rpl_dio {
538     nd_uint8_t  rpl_instanceid;
539     nd_uint8_t  rpl_version;
540     nd_uint16_t rpl_dagrank;
541     nd_uint8_t  rpl_mopprf;   /* bit 7=G, 5-3=MOP, 2-0=PRF */
542     nd_uint8_t  rpl_dtsn;     /* Dest. Advertisement Trigger Sequence Number */
543     nd_uint8_t  rpl_flags;    /* no flags defined yet */
544     nd_uint8_t  rpl_resv1;
545     nd_byte     rpl_dagid[DAGID_LEN];
546 };
547 #define RPL_DIO_GROUND_FLAG 0x80
548 #define RPL_DIO_MOP_SHIFT   3
549 #define RPL_DIO_MOP_MASK    (7 << RPL_DIO_MOP_SHIFT)
550 #define RPL_DIO_PRF_SHIFT   0
551 #define RPL_DIO_PRF_MASK    (7 << RPL_DIO_PRF_SHIFT)
552 #define RPL_DIO_GROUNDED(X) ((X)&RPL_DIO_GROUND_FLAG)
553 #define RPL_DIO_MOP(X)      (enum RPL_DIO_MOP)(((X)&RPL_DIO_MOP_MASK) >> RPL_DIO_MOP_SHIFT)
554 #define RPL_DIO_PRF(X)      (((X)&RPL_DIO_PRF_MASK) >> RPL_DIO_PRF_SHIFT)
555 
556 enum RPL_DIO_MOP {
557     RPL_DIO_NONSTORING= 0x0,
558     RPL_DIO_STORING   = 0x1,
559     RPL_DIO_NONSTORING_MULTICAST = 0x2,
560     RPL_DIO_STORING_MULTICAST    = 0x3
561 };
562 
563 enum RPL_SUBOPT {
564         RPL_OPT_PAD1        = 0,
565         RPL_OPT_PADN        = 1,
566         RPL_DIO_METRICS     = 2,
567         RPL_DIO_ROUTINGINFO = 3,
568         RPL_DIO_CONFIG      = 4,
569         RPL_DAO_RPLTARGET   = 5,
570         RPL_DAO_TRANSITINFO = 6,
571         RPL_DIO_DESTPREFIX  = 8,
572         RPL_DAO_RPLTARGET_DESC=9
573 };
574 
575 struct rpl_genoption {
576     nd_uint8_t rpl_dio_type;
577     nd_uint8_t rpl_dio_len;        /* suboption length, not including type/len */
578 };
579 #define RPL_GENOPTION_LEN	2
580 
581 #define RPL_DIO_LIFETIME_INFINITE   0xffffffff
582 #define RPL_DIO_LIFETIME_DISCONNECT 0
583 
584 struct rpl_dio_destprefix {
585     nd_uint8_t rpl_dio_type;
586     nd_uint8_t rpl_dio_len;
587     nd_uint8_t rpl_dio_prefixlen;        /* in bits */
588     nd_uint8_t rpl_dio_prf;              /* flags, including Route Preference */
589     nd_uint32_t rpl_dio_prefixlifetime;  /* in seconds */
590 #if 0
591     nd_byte     rpl_dio_prefix[0];       /* variable number of bytes */
592 #endif
593 };
594 
595 /* section 6.4.1, DODAG Information Object (DIO) */
596 struct nd_rpl_dao {
597     nd_uint8_t  rpl_instanceid;
598     nd_uint8_t  rpl_flags;      /* bit 7=K, 6=D */
599     nd_uint8_t  rpl_resv;
600     nd_uint8_t  rpl_daoseq;
601     nd_byte     rpl_dagid[DAGID_LEN];   /* present when D set. */
602 };
603 #define ND_RPL_DAO_MIN_LEN	4	/* length without DAGID */
604 
605 /* indicates if this DAO is to be acK'ed */
606 #define RPL_DAO_K_SHIFT   7
607 #define RPL_DAO_K_MASK    (1 << RPL_DAO_K_SHIFT)
608 #define RPL_DAO_K(X)      (((X)&RPL_DAO_K_MASK) >> RPL_DAO_K_SHIFT)
609 
610 /* indicates if the DAGID is present */
611 #define RPL_DAO_D_SHIFT   6
612 #define RPL_DAO_D_MASK    (1 << RPL_DAO_D_SHIFT)
613 #define RPL_DAO_D(X)      (((X)&RPL_DAO_D_MASK) >> RPL_DAO_D_SHIFT)
614 
615 struct rpl_dao_target {
616     nd_uint8_t rpl_dao_type;
617     nd_uint8_t rpl_dao_len;
618     nd_uint8_t rpl_dao_flags;            /* unused */
619     nd_uint8_t rpl_dao_prefixlen;        /* in bits */
620 #if 0
621     nd_byte    rpl_dao_prefix[0];        /* variable number of bytes */
622 #endif
623 };
624 
625 /* section 6.5.1, Destination Advertisement Object Acknowledgement (DAO-ACK) */
626 struct nd_rpl_daoack {
627     nd_uint8_t  rpl_instanceid;
628     nd_uint8_t  rpl_flags;      /* bit 7=D */
629     nd_uint8_t  rpl_daoseq;
630     nd_uint8_t  rpl_status;
631     nd_byte     rpl_dagid[DAGID_LEN];   /* present when D set. */
632 };
633 #define ND_RPL_DAOACK_MIN_LEN	4	/* length without DAGID */
634 /* indicates if the DAGID is present */
635 #define RPL_DAOACK_D_SHIFT   7
636 #define RPL_DAOACK_D_MASK    (1 << RPL_DAOACK_D_SHIFT)
637 #define RPL_DAOACK_D(X)      (((X)&RPL_DAOACK_D_MASK) >> RPL_DAOACK_D_SHIFT)
638 
639 static const struct tok icmp6_type_values[] = {
640     { ICMP6_DST_UNREACH, "destination unreachable"},
641     { ICMP6_PACKET_TOO_BIG, "packet too big"},
642     { ICMP6_TIME_EXCEEDED, "time exceeded in-transit"},
643     { ICMP6_PARAM_PROB, "parameter problem"},
644     { ICMP6_ECHO_REQUEST, "echo request"},
645     { ICMP6_ECHO_REPLY, "echo reply"},
646     { MLD6_LISTENER_QUERY, "multicast listener query"},
647     { MLD6_LISTENER_REPORT, "multicast listener report"},
648     { MLD6_LISTENER_DONE, "multicast listener done"},
649     { ND_ROUTER_SOLICIT, "router solicitation"},
650     { ND_ROUTER_ADVERT, "router advertisement"},
651     { ND_NEIGHBOR_SOLICIT, "neighbor solicitation"},
652     { ND_NEIGHBOR_ADVERT, "neighbor advertisement"},
653     { ND_REDIRECT, "redirect"},
654     { ICMP6_ROUTER_RENUMBERING, "router renumbering"},
655     { IND_SOLICIT, "inverse neighbor solicitation"},
656     { IND_ADVERT, "inverse neighbor advertisement"},
657     { MLDV2_LISTENER_REPORT, "multicast listener report v2"},
658     { ICMP6_HADISCOV_REQUEST, "ha discovery request"},
659     { ICMP6_HADISCOV_REPLY, "ha discovery reply"},
660     { ICMP6_MOBILEPREFIX_SOLICIT, "mobile router solicitation"},
661     { ICMP6_MOBILEPREFIX_ADVERT, "mobile router advertisement"},
662     { ICMP6_WRUREQUEST, "who-are-you request"},
663     { ICMP6_WRUREPLY, "who-are-you reply"},
664     { ICMP6_NI_QUERY, "node information query"},
665     { ICMP6_NI_REPLY, "node information reply"},
666     { MLD6_MTRACE, "mtrace message"},
667     { MLD6_MTRACE_RESP, "mtrace response"},
668     { ND_RPL_MESSAGE,   "RPL"},
669     { 0,	NULL }
670 };
671 
672 static const struct tok icmp6_dst_unreach_code_values[] = {
673     { ICMP6_DST_UNREACH_NOROUTE, "unreachable route" },
674     { ICMP6_DST_UNREACH_ADMIN, " unreachable prohibited"},
675     { ICMP6_DST_UNREACH_BEYONDSCOPE, "beyond scope"},
676     { ICMP6_DST_UNREACH_ADDR, "unreachable address"},
677     { ICMP6_DST_UNREACH_NOPORT, "unreachable port"},
678     { 0,	NULL }
679 };
680 
681 static const struct tok icmp6_opt_pi_flag_values[] = {
682     { ND_OPT_PI_FLAG_ONLINK, "onlink" },
683     { ND_OPT_PI_FLAG_AUTO, "auto" },
684     { ND_OPT_PI_FLAG_ROUTER, "router" },
685     { 0,	NULL }
686 };
687 
688 static const struct tok icmp6_opt_ra_flag_values[] = {
689     { ND_RA_FLAG_MANAGED, "managed" },
690     { ND_RA_FLAG_OTHER, "other stateful"},
691     { ND_RA_FLAG_HOME_AGENT, "home agent"},
692     { ND_RA_FLAG_IPV6ONLY, "ipv6 only"},
693     { 0,	NULL }
694 };
695 
696 static const struct tok icmp6_nd_na_flag_values[] = {
697     { ND_NA_FLAG_ROUTER, "router" },
698     { ND_NA_FLAG_SOLICITED, "solicited" },
699     { ND_NA_FLAG_OVERRIDE, "override" },
700     { 0,	NULL }
701 };
702 
703 static const struct tok icmp6_opt_values[] = {
704    { ND_OPT_SOURCE_LINKADDR, "source link-address"},
705    { ND_OPT_TARGET_LINKADDR, "destination link-address"},
706    { ND_OPT_PREFIX_INFORMATION, "prefix info"},
707    { ND_OPT_REDIRECTED_HEADER, "redirected header"},
708    { ND_OPT_MTU, "mtu"},
709    { ND_OPT_RDNSS, "rdnss"},
710    { ND_OPT_DNSSL, "dnssl"},
711    { ND_OPT_ADVINTERVAL, "advertisement interval"},
712    { ND_OPT_HOMEAGENT_INFO, "homeagent information"},
713    { ND_OPT_ROUTE_INFO, "route info"},
714    { 0,	NULL }
715 };
716 
717 /* mldv2 report types */
718 static const struct tok mldv2report2str[] = {
719 	{ 1,	"is_in" },
720 	{ 2,	"is_ex" },
721 	{ 3,	"to_in" },
722 	{ 4,	"to_ex" },
723 	{ 5,	"allow" },
724 	{ 6,	"block" },
725 	{ 0,	NULL }
726 };
727 
728 static const char *
729 get_rtpref(u_int v)
730 {
731 	static const char *rtpref_str[] = {
732 		"medium",		/* 00 */
733 		"high",			/* 01 */
734 		"rsv",			/* 10 */
735 		"low"			/* 11 */
736 	};
737 
738 	return rtpref_str[((v & ND_RA_FLAG_RTPREF_MASK) >> 3) & 0xff];
739 }
740 
741 static const char *
742 get_lifetime(uint32_t v)
743 {
744 	static char buf[20];
745 
746 	if (v == (uint32_t)~0UL)
747 		return "infinity";
748 	else {
749 		snprintf(buf, sizeof(buf), "%us", v);
750 		return buf;
751 	}
752 }
753 
754 static void
755 print_lladdr(netdissect_options *ndo, const uint8_t *p, size_t l)
756 {
757 	const uint8_t *ep, *q;
758 
759 	q = p;
760 	ep = p + l;
761 	while (l > 0 && q < ep) {
762 		if (q > p)
763                         ND_PRINT(":");
764 		ND_PRINT("%02x", GET_U_1(q));
765 		q++;
766 		l--;
767 	}
768 }
769 
770 static uint16_t icmp6_cksum(netdissect_options *ndo, const struct ip6_hdr *ip6,
771 	const struct icmp6_hdr *icp, u_int len)
772 {
773 	return nextproto6_cksum(ndo, ip6, (const uint8_t *)(const void *)icp, len, len,
774 				IPPROTO_ICMPV6);
775 }
776 
777 static const struct tok rpl_mop_values[] = {
778         { RPL_DIO_NONSTORING,         "nonstoring"},
779         { RPL_DIO_STORING,            "storing"},
780         { RPL_DIO_NONSTORING_MULTICAST, "nonstoring-multicast"},
781         { RPL_DIO_STORING_MULTICAST,  "storing-multicast"},
782         { 0, NULL},
783 };
784 
785 static const struct tok rpl_subopt_values[] = {
786         { RPL_OPT_PAD1, "pad1"},
787         { RPL_OPT_PADN, "padN"},
788         { RPL_DIO_METRICS, "metrics"},
789         { RPL_DIO_ROUTINGINFO, "routinginfo"},
790         { RPL_DIO_CONFIG,    "config"},
791         { RPL_DAO_RPLTARGET, "rpltarget"},
792         { RPL_DAO_TRANSITINFO, "transitinfo"},
793         { RPL_DIO_DESTPREFIX, "destprefix"},
794         { RPL_DAO_RPLTARGET_DESC, "rpltargetdesc"},
795         { 0, NULL},
796 };
797 
798 static void
799 rpl_printopts(netdissect_options *ndo, const uint8_t *opts, u_int length)
800 {
801 	const struct rpl_genoption *opt;
802 	uint8_t dio_type;
803 	u_int optlen;
804 
805 	while (length != 0) {
806 		opt = (const struct rpl_genoption *)opts;
807 		dio_type = GET_U_1(opt->rpl_dio_type);
808 		if (dio_type == RPL_OPT_PAD1) {
809                         optlen = 1;
810                         ND_PRINT(" opt:pad1");
811                 } else {
812 			if (length < RPL_GENOPTION_LEN)
813 				goto trunc;
814 	                optlen = GET_U_1(opt->rpl_dio_len)+RPL_GENOPTION_LEN;
815                         ND_PRINT(" opt:%s len:%u ",
816                                   tok2str(rpl_subopt_values, "subopt:%u", dio_type),
817                                   optlen);
818                         ND_TCHECK_LEN(opt, optlen);
819                         if (length < optlen)
820 				goto trunc;
821                         if (ndo->ndo_vflag > 2) {
822                                 hex_print(ndo,
823                                           " ",
824                                           opts + RPL_GENOPTION_LEN,  /* content of DIO option */
825                                           optlen - RPL_GENOPTION_LEN);
826                         }
827                 }
828                 opts += optlen;
829                 length -= optlen;
830         }
831         return;
832 trunc:
833 	nd_print_trunc(ndo);
834 }
835 
836 static void
837 rpl_dio_print(netdissect_options *ndo,
838               const u_char *bp, u_int length)
839 {
840         const struct nd_rpl_dio *dio = (const struct nd_rpl_dio *)bp;
841 
842         ND_ICHECK_ZU(length, <, sizeof(struct nd_rpl_dio));
843         ND_PRINT(" [dagid:%s,seq:%u,instance:%u,rank:%u,%smop:%s,prf:%u]",
844                   GET_IP6ADDR_STRING(dio->rpl_dagid),
845                   GET_U_1(dio->rpl_dtsn),
846                   GET_U_1(dio->rpl_instanceid),
847                   GET_BE_U_2(dio->rpl_dagrank),
848                   RPL_DIO_GROUNDED(GET_U_1(dio->rpl_mopprf)) ? "grounded,":"",
849                   tok2str(rpl_mop_values, "mop%u",
850                           RPL_DIO_MOP(GET_U_1(dio->rpl_mopprf))),
851                   RPL_DIO_PRF(GET_U_1(dio->rpl_mopprf)));
852 
853         if(ndo->ndo_vflag > 1) {
854                 rpl_printopts(ndo, bp + sizeof(struct nd_rpl_dio),
855                               length - sizeof(struct nd_rpl_dio));
856         }
857         return;
858 invalid:
859         nd_print_invalid(ndo);
860 }
861 
862 static void
863 rpl_dao_print(netdissect_options *ndo,
864               const u_char *bp, u_int length)
865 {
866         const struct nd_rpl_dao *dao = (const struct nd_rpl_dao *)bp;
867         const char *dagid_str = "<elided>";
868         uint8_t rpl_flags;
869 
870         ND_TCHECK_SIZE(dao);
871         if (length < ND_RPL_DAO_MIN_LEN)
872 		goto tooshort;
873 
874         bp += ND_RPL_DAO_MIN_LEN;
875         length -= ND_RPL_DAO_MIN_LEN;
876         rpl_flags = GET_U_1(dao->rpl_flags);
877         if(RPL_DAO_D(rpl_flags)) {
878                 ND_TCHECK_LEN(dao->rpl_dagid, DAGID_LEN);
879                 if (length < DAGID_LEN)
880                         goto tooshort;
881                 dagid_str = ip6addr_string (ndo, dao->rpl_dagid);
882                 bp += DAGID_LEN;
883                 length -= DAGID_LEN;
884         }
885 
886         ND_PRINT(" [dagid:%s,seq:%u,instance:%u%s%s,flags:%02x]",
887                   dagid_str,
888                   GET_U_1(dao->rpl_daoseq),
889                   GET_U_1(dao->rpl_instanceid),
890                   RPL_DAO_K(rpl_flags) ? ",acK":"",
891                   RPL_DAO_D(rpl_flags) ? ",Dagid":"",
892                   rpl_flags);
893 
894         if(ndo->ndo_vflag > 1) {
895                 rpl_printopts(ndo, bp, length);
896         }
897 	return;
898 
899 trunc:
900 	nd_print_trunc(ndo);
901 	return;
902 
903 tooshort:
904 	ND_PRINT(" [|length too short]");
905 }
906 
907 static void
908 rpl_daoack_print(netdissect_options *ndo,
909                  const u_char *bp, u_int length)
910 {
911         const struct nd_rpl_daoack *daoack = (const struct nd_rpl_daoack *)bp;
912         const char *dagid_str = "<elided>";
913 
914         ND_TCHECK_LEN(daoack, ND_RPL_DAOACK_MIN_LEN);
915         if (length < ND_RPL_DAOACK_MIN_LEN)
916 		goto tooshort;
917 
918         bp += ND_RPL_DAOACK_MIN_LEN;
919         length -= ND_RPL_DAOACK_MIN_LEN;
920         if(RPL_DAOACK_D(GET_U_1(daoack->rpl_flags))) {
921                 ND_TCHECK_LEN(daoack->rpl_dagid, DAGID_LEN);
922                 if (length < DAGID_LEN)
923                         goto tooshort;
924                 dagid_str = ip6addr_string (ndo, daoack->rpl_dagid);
925                 bp += DAGID_LEN;
926                 length -= DAGID_LEN;
927         }
928 
929         ND_PRINT(" [dagid:%s,seq:%u,instance:%u,status:%u]",
930                   dagid_str,
931                   GET_U_1(daoack->rpl_daoseq),
932                   GET_U_1(daoack->rpl_instanceid),
933                   GET_U_1(daoack->rpl_status));
934 
935         /* no officially defined options for DAOACK, but print any we find */
936         if(ndo->ndo_vflag > 1) {
937                 rpl_printopts(ndo, bp, length);
938         }
939 	return;
940 
941 trunc:
942 	nd_print_trunc(ndo);
943 	return;
944 
945 tooshort:
946 	ND_PRINT(" [|dao-length too short]");
947 }
948 
949 static void
950 rpl_print(netdissect_options *ndo,
951           uint8_t icmp6_code,
952           const u_char *bp, u_int length)
953 {
954         int secured = icmp6_code & 0x80;
955         int basecode= icmp6_code & 0x7f;
956 
957         if(secured) {
958                 ND_PRINT(", (SEC) [worktodo]");
959                 /* XXX
960                  * the next header pointer needs to move forward to
961                  * skip the secure part.
962                  */
963                 return;
964         } else {
965                 ND_PRINT(", (CLR)");
966         }
967 
968         switch(basecode) {
969         case ND_RPL_DAG_IS:
970                 ND_PRINT("DODAG Information Solicitation");
971                 if(ndo->ndo_vflag) {
972                 }
973                 break;
974         case ND_RPL_DAG_IO:
975                 ND_PRINT("DODAG Information Object");
976                 if(ndo->ndo_vflag) {
977                         rpl_dio_print(ndo, bp, length);
978                 }
979                 break;
980         case ND_RPL_DAO:
981                 ND_PRINT("Destination Advertisement Object");
982                 if(ndo->ndo_vflag) {
983                         rpl_dao_print(ndo, bp, length);
984                 }
985                 break;
986         case ND_RPL_DAO_ACK:
987                 ND_PRINT("Destination Advertisement Object Ack");
988                 if(ndo->ndo_vflag) {
989                         rpl_daoack_print(ndo, bp, length);
990                 }
991                 break;
992         default:
993                 ND_PRINT("RPL message, unknown code %u",icmp6_code);
994                 break;
995         }
996 	return;
997 
998 #if 0
999 trunc:
1000 	nd_print_trunc(ndo);
1001 	return;
1002 #endif
1003 
1004 }
1005 
1006 void
1007 icmp6_print(netdissect_options *ndo,
1008             const u_char *bp, u_int length, const u_char *bp2, int fragmented)
1009 {
1010 	const struct icmp6_hdr *dp;
1011 	uint8_t icmp6_type, icmp6_code;
1012 	const struct ip6_hdr *ip;
1013 	const struct ip6_hdr *oip;
1014 	const struct udphdr *ouh;
1015 	uint16_t dport;
1016 	const u_char *ep;
1017 	u_int prot;
1018 
1019 	ndo->ndo_protocol = "icmp6";
1020 	dp = (const struct icmp6_hdr *)bp;
1021 	ip = (const struct ip6_hdr *)bp2;
1022 	oip = (const struct ip6_hdr *)(dp + 1);
1023 	/* 'ep' points to the end of available data. */
1024 	ep = ndo->ndo_snapend;
1025 	if (length == 0) {
1026 		ND_PRINT("ICMP6, length 0");
1027 		nd_print_invalid(ndo);
1028 		return;
1029 	}
1030 
1031 	if (ndo->ndo_vflag && !fragmented) {
1032 		uint16_t sum, udp_sum;
1033 
1034 		if (ND_TTEST_LEN(bp, length)) {
1035 			udp_sum = GET_BE_U_2(dp->icmp6_cksum);
1036 			sum = icmp6_cksum(ndo, ip, dp, length);
1037 			if (sum != 0)
1038 				ND_PRINT("[bad icmp6 cksum 0x%04x -> 0x%04x!] ",
1039                                                 udp_sum,
1040                                                 in_cksum_shouldbe(udp_sum, sum));
1041 			else
1042 				ND_PRINT("[icmp6 sum ok] ");
1043 		}
1044 	}
1045 
1046 	icmp6_type = GET_U_1(dp->icmp6_type);
1047 	ND_PRINT("ICMP6, %s", tok2str(icmp6_type_values,"unknown icmp6 type (%u)",icmp6_type));
1048 
1049         /* display cosmetics: print the packet length for printer that use the vflag now */
1050         if (ndo->ndo_vflag && (icmp6_type == ND_ROUTER_SOLICIT ||
1051                       icmp6_type == ND_ROUTER_ADVERT ||
1052                       icmp6_type == ND_NEIGHBOR_ADVERT ||
1053                       icmp6_type == ND_NEIGHBOR_SOLICIT ||
1054                       icmp6_type == ND_REDIRECT ||
1055                       icmp6_type == ICMP6_HADISCOV_REPLY ||
1056                       icmp6_type == ICMP6_MOBILEPREFIX_ADVERT ))
1057                 ND_PRINT(", length %u", length);
1058 
1059 	icmp6_code = GET_U_1(dp->icmp6_code);
1060 
1061 	switch (icmp6_type) {
1062 	case ICMP6_DST_UNREACH:
1063                 ND_PRINT(", %s", tok2str(icmp6_dst_unreach_code_values,"unknown unreach code (%u)",icmp6_code));
1064 		switch (icmp6_code) {
1065 
1066 		case ICMP6_DST_UNREACH_NOROUTE: /* fall through */
1067 		case ICMP6_DST_UNREACH_ADMIN:
1068 		case ICMP6_DST_UNREACH_ADDR:
1069                         ND_PRINT(" %s",GET_IP6ADDR_STRING(oip->ip6_dst));
1070                         break;
1071 		case ICMP6_DST_UNREACH_BEYONDSCOPE:
1072 			ND_PRINT(" %s, source address %s",
1073 			       GET_IP6ADDR_STRING(oip->ip6_dst),
1074                                   GET_IP6ADDR_STRING(oip->ip6_src));
1075 			break;
1076 		case ICMP6_DST_UNREACH_NOPORT:
1077 			if ((ouh = get_upperlayer(ndo, (const u_char *)oip, &prot))
1078 			    == NULL)
1079 				goto trunc;
1080 
1081 			dport = GET_BE_U_2(ouh->uh_dport);
1082 			switch (prot) {
1083 			case IPPROTO_TCP:
1084 				ND_PRINT(", %s tcp port %s",
1085 					GET_IP6ADDR_STRING(oip->ip6_dst),
1086                                           tcpport_string(ndo, dport));
1087 				break;
1088 			case IPPROTO_UDP:
1089 				ND_PRINT(", %s udp port %s",
1090 					GET_IP6ADDR_STRING(oip->ip6_dst),
1091                                           udpport_string(ndo, dport));
1092 				break;
1093 			default:
1094 				ND_PRINT(", %s protocol %u port %u unreachable",
1095 					GET_IP6ADDR_STRING(oip->ip6_dst),
1096                                           prot, dport);
1097 				break;
1098 			}
1099 			break;
1100 		default:
1101                   if (ndo->ndo_vflag <= 1) {
1102                     print_unknown_data(ndo, bp,"\n\t",length);
1103                     return;
1104                   }
1105                     break;
1106 		}
1107 		break;
1108 	case ICMP6_PACKET_TOO_BIG:
1109 		ND_PRINT(", mtu %u", GET_BE_U_4(dp->icmp6_mtu));
1110 		break;
1111 	case ICMP6_TIME_EXCEEDED:
1112 		switch (icmp6_code) {
1113 		case ICMP6_TIME_EXCEED_TRANSIT:
1114 			ND_PRINT(" for %s",
1115                                   GET_IP6ADDR_STRING(oip->ip6_dst));
1116 			break;
1117 		case ICMP6_TIME_EXCEED_REASSEMBLY:
1118 			ND_PRINT(" (reassembly)");
1119 			break;
1120 		default:
1121                         ND_PRINT(", unknown code (%u)", icmp6_code);
1122 			break;
1123 		}
1124 		break;
1125 	case ICMP6_PARAM_PROB:
1126 		ND_TCHECK_16(oip->ip6_dst);
1127 		switch (icmp6_code) {
1128 		case ICMP6_PARAMPROB_HEADER:
1129                         ND_PRINT(", erroneous - octet %u",
1130 				 GET_BE_U_4(dp->icmp6_pptr));
1131                         break;
1132 		case ICMP6_PARAMPROB_NEXTHEADER:
1133                         ND_PRINT(", next header - octet %u",
1134 				 GET_BE_U_4(dp->icmp6_pptr));
1135                         break;
1136 		case ICMP6_PARAMPROB_OPTION:
1137                         ND_PRINT(", option - octet %u",
1138 				 GET_BE_U_4(dp->icmp6_pptr));
1139                         break;
1140 		case ICMP6_PARAMPROB_FRAGHDRCHAIN:
1141                         ND_PRINT(", incomplete header chain - octet %u",
1142 				 GET_BE_U_4(dp->icmp6_pptr));
1143                         break;
1144 		default:
1145                         ND_PRINT(", code-#%u",
1146                                   icmp6_code);
1147                         break;
1148 		}
1149 		break;
1150 	case ICMP6_ECHO_REQUEST:
1151 	case ICMP6_ECHO_REPLY:
1152                 ND_PRINT(", id %u, seq %u", GET_BE_U_2(dp->icmp6_id),
1153 			 GET_BE_U_2(dp->icmp6_seq));
1154 		break;
1155 	case ICMP6_MEMBERSHIP_QUERY:
1156 		if (length == MLD_MINLEN) {
1157 			mld6_print(ndo, (const u_char *)dp);
1158 		} else if (length >= MLDV2_MINLEN) {
1159 			ND_PRINT(" v2");
1160 			mldv2_query_print(ndo, (const u_char *)dp, length);
1161 		} else {
1162                         ND_PRINT(" unknown-version (len %u) ", length);
1163 		}
1164 		break;
1165 	case ICMP6_MEMBERSHIP_REPORT:
1166 		mld6_print(ndo, (const u_char *)dp);
1167 		break;
1168 	case ICMP6_MEMBERSHIP_REDUCTION:
1169 		mld6_print(ndo, (const u_char *)dp);
1170 		break;
1171 	case ND_ROUTER_SOLICIT:
1172 #define RTSOLLEN 8
1173 		if (ndo->ndo_vflag) {
1174 			if (icmp6_opt_print(ndo, (const u_char *)dp + RTSOLLEN,
1175 					    length - RTSOLLEN) == -1)
1176 				goto trunc;
1177 		}
1178 		break;
1179 	case ND_ROUTER_ADVERT:
1180 #define RTADVLEN 16
1181 		if (ndo->ndo_vflag) {
1182 			const struct nd_router_advert *p;
1183 
1184 			p = (const struct nd_router_advert *)dp;
1185 			ND_PRINT("\n\thop limit %u, Flags [%s]"
1186                                   ", pref %s, router lifetime %us, reachable time %ums, retrans timer %ums",
1187                                   GET_U_1(p->nd_ra_curhoplimit),
1188                                   bittok2str(icmp6_opt_ra_flag_values,"none",GET_U_1(p->nd_ra_flags_reserved)),
1189                                   get_rtpref(GET_U_1(p->nd_ra_flags_reserved)),
1190                                   GET_BE_U_2(p->nd_ra_router_lifetime),
1191                                   GET_BE_U_4(p->nd_ra_reachable),
1192                                   GET_BE_U_4(p->nd_ra_retransmit));
1193 
1194 			if (icmp6_opt_print(ndo, (const u_char *)dp + RTADVLEN,
1195 					    length - RTADVLEN) == -1)
1196 				goto trunc;
1197 		}
1198 		break;
1199 	case ND_NEIGHBOR_SOLICIT:
1200 	    {
1201 		const struct nd_neighbor_solicit *p;
1202 		p = (const struct nd_neighbor_solicit *)dp;
1203 		ND_PRINT(", who has %s", GET_IP6ADDR_STRING(p->nd_ns_target));
1204 		if (ndo->ndo_vflag) {
1205 #define NDSOLLEN 24
1206 			if (icmp6_opt_print(ndo, (const u_char *)dp + NDSOLLEN,
1207 					    length - NDSOLLEN) == -1)
1208 				goto trunc;
1209 		}
1210 	    }
1211 		break;
1212 	case ND_NEIGHBOR_ADVERT:
1213 	    {
1214 		const struct nd_neighbor_advert *p;
1215 
1216 		p = (const struct nd_neighbor_advert *)dp;
1217 		ND_PRINT(", tgt is %s",
1218                           GET_IP6ADDR_STRING(p->nd_na_target));
1219 		if (ndo->ndo_vflag) {
1220                         ND_PRINT(", Flags [%s]",
1221                                   bittok2str(icmp6_nd_na_flag_values,
1222                                              "none",
1223                                              GET_BE_U_4(p->nd_na_flags_reserved)));
1224 #define NDADVLEN 24
1225 			if (icmp6_opt_print(ndo, (const u_char *)dp + NDADVLEN,
1226 					    length - NDADVLEN) == -1)
1227 				goto trunc;
1228 #undef NDADVLEN
1229 		}
1230 	    }
1231 		break;
1232 	case ND_REDIRECT:
1233 	    {
1234 		const struct nd_redirect *p;
1235 
1236 		p = (const struct nd_redirect *)dp;
1237 		ND_PRINT(", %s", GET_IP6ADDR_STRING(p->nd_rd_dst));
1238 		ND_PRINT(" to %s", GET_IP6ADDR_STRING(p->nd_rd_target));
1239 #define REDIRECTLEN 40
1240 		if (ndo->ndo_vflag) {
1241 			if (icmp6_opt_print(ndo, (const u_char *)dp + REDIRECTLEN,
1242 					    length - REDIRECTLEN) == -1)
1243 				goto trunc;
1244 #undef REDIRECTLEN
1245 		}
1246 	    }
1247 		break;
1248 	case ICMP6_ROUTER_RENUMBERING:
1249 		icmp6_rrenum_print(ndo, bp, ep);
1250 		break;
1251 	case ICMP6_NI_QUERY:
1252 	case ICMP6_NI_REPLY:
1253 		icmp6_nodeinfo_print(ndo, length, bp, ep);
1254 		break;
1255 	case IND_SOLICIT:
1256 	case IND_ADVERT:
1257 		break;
1258 	case ICMP6_V2_MEMBERSHIP_REPORT:
1259 		mldv2_report_print(ndo, (const u_char *) dp, length);
1260 		break;
1261 	case ICMP6_MOBILEPREFIX_SOLICIT: /* fall through */
1262 	case ICMP6_HADISCOV_REQUEST:
1263                 ND_PRINT(", id 0x%04x", GET_BE_U_2(dp->icmp6_data16[0]));
1264                 break;
1265 	case ICMP6_HADISCOV_REPLY:
1266 		if (ndo->ndo_vflag) {
1267 			const u_char *cp;
1268 			const u_char *p;
1269 
1270 			ND_PRINT(", id 0x%04x",
1271 				 GET_BE_U_2(dp->icmp6_data16[0]));
1272 			cp = (const u_char *)dp +
1273 				ND_MIN(length, ND_BYTES_AVAILABLE_AFTER(dp));
1274 			p = (const u_char *)(dp + 1);
1275 			while (p < cp) {
1276 				ND_PRINT(", %s", GET_IP6ADDR_STRING(p));
1277 				p += 16;
1278 			}
1279 		}
1280 		break;
1281 	case ICMP6_MOBILEPREFIX_ADVERT:
1282 		if (ndo->ndo_vflag) {
1283 			uint16_t flags;
1284 
1285 			ND_PRINT(", id 0x%04x",
1286 				 GET_BE_U_2(dp->icmp6_data16[0]));
1287 			flags = GET_BE_U_2(dp->icmp6_data16[1]);
1288 			if (flags & 0xc000)
1289 				ND_PRINT(" ");
1290 			if (flags & 0x8000)
1291 				ND_PRINT("M");
1292 			if (flags & 0x4000)
1293 				ND_PRINT("O");
1294 #define MPADVLEN 8
1295 			if (icmp6_opt_print(ndo, (const u_char *)dp + MPADVLEN,
1296 					    length - MPADVLEN) == -1)
1297 				goto trunc;
1298 		}
1299 		break;
1300         case ND_RPL_MESSAGE:
1301                 /* plus 4, because struct icmp6_hdr contains 4 bytes of icmp payload */
1302                 rpl_print(ndo, icmp6_code, dp->icmp6_data, length-sizeof(struct icmp6_hdr)+4);
1303                 break;
1304 	default:
1305                 ND_PRINT(", length %u", length);
1306                 if (ndo->ndo_vflag <= 1)
1307                         print_unknown_data(ndo, bp,"\n\t", length);
1308                 return;
1309         }
1310         if (!ndo->ndo_vflag)
1311                 ND_PRINT(", length %u", length);
1312 	return;
1313 trunc:
1314 	nd_print_trunc(ndo);
1315 }
1316 
1317 static const struct udphdr *
1318 get_upperlayer(netdissect_options *ndo, const u_char *bp, u_int *prot)
1319 {
1320 	const u_char *ep;
1321 	const struct ip6_hdr *ip6 = (const struct ip6_hdr *)bp;
1322 	const struct udphdr *uh;
1323 	const struct ip6_hbh *hbh;
1324 	const struct ip6_frag *fragh;
1325 	const struct ah *ah;
1326 	u_int nh;
1327 	int hlen;
1328 
1329 	/* 'ep' points to the end of available data. */
1330 	ep = ndo->ndo_snapend;
1331 
1332 	if (!ND_TTEST_1(ip6->ip6_nxt))
1333 		return NULL;
1334 
1335 	nh = GET_U_1(ip6->ip6_nxt);
1336 	hlen = sizeof(struct ip6_hdr);
1337 
1338 	while (bp < ep) {
1339 		bp += hlen;
1340 
1341 		switch(nh) {
1342 		case IPPROTO_UDP:
1343 		case IPPROTO_TCP:
1344 			uh = (const struct udphdr *)bp;
1345 			if (ND_TTEST_2(uh->uh_dport)) {
1346 				*prot = nh;
1347 				return(uh);
1348 			} else
1349 				return(NULL);
1350 			/* NOTREACHED */
1351 
1352 		case IPPROTO_HOPOPTS:
1353 		case IPPROTO_DSTOPTS:
1354 		case IPPROTO_ROUTING:
1355 			hbh = (const struct ip6_hbh *)bp;
1356 			if (!ND_TTEST_1(hbh->ip6h_len))
1357 				return(NULL);
1358 			nh = GET_U_1(hbh->ip6h_nxt);
1359 			hlen = (GET_U_1(hbh->ip6h_len) + 1) << 3;
1360 			break;
1361 
1362 		case IPPROTO_FRAGMENT: /* this should be odd, but try anyway */
1363 			fragh = (const struct ip6_frag *)bp;
1364 			if (!ND_TTEST_2(fragh->ip6f_offlg))
1365 				return(NULL);
1366 			/* fragments with non-zero offset are meaningless */
1367 			if ((GET_BE_U_2(fragh->ip6f_offlg) & IP6F_OFF_MASK) != 0)
1368 				return(NULL);
1369 			nh = GET_U_1(fragh->ip6f_nxt);
1370 			hlen = sizeof(struct ip6_frag);
1371 			break;
1372 
1373 		case IPPROTO_AH:
1374 			ah = (const struct ah *)bp;
1375 			if (!ND_TTEST_1(ah->ah_len))
1376 				return(NULL);
1377 			nh = GET_U_1(ah->ah_nxt);
1378 			hlen = (GET_U_1(ah->ah_len) + 2) << 2;
1379 			break;
1380 
1381 		default:	/* unknown or undecodable header */
1382 			*prot = nh; /* meaningless, but set here anyway */
1383 			return(NULL);
1384 		}
1385 	}
1386 
1387 	return(NULL);		/* should be notreached, though */
1388 }
1389 
1390 static int
1391 icmp6_opt_print(netdissect_options *ndo, const u_char *bp, int resid)
1392 {
1393 	const struct nd_opt_hdr *op;
1394 	uint8_t opt_type;
1395 	u_int opt_len;
1396 	const struct nd_opt_prefix_info *opp;
1397 	const struct nd_opt_mtu *opm;
1398 	const struct nd_opt_rdnss *oprd;
1399 	const struct nd_opt_dnssl *opds;
1400 	const struct nd_opt_advinterval *opa;
1401 	const struct nd_opt_homeagent_info *oph;
1402 	const struct nd_opt_route_info *opri;
1403 	const u_char *cp, *ep, *domp;
1404 	nd_ipv6 in6;
1405 	size_t l;
1406 	u_int i;
1407 
1408 	cp = bp;
1409 	/* 'ep' points to the end of available data. */
1410 	ep = ndo->ndo_snapend;
1411 
1412 	while (cp < ep) {
1413 		op = (const struct nd_opt_hdr *)cp;
1414 
1415 		ND_TCHECK_1(op->nd_opt_len);
1416 		if (resid <= 0)
1417 			return 0;
1418 		opt_type = GET_U_1(op->nd_opt_type);
1419 		opt_len = GET_U_1(op->nd_opt_len);
1420 		if (opt_len == 0)
1421 			goto trunc;
1422 		if (cp + (opt_len << 3) > ep)
1423 			goto trunc;
1424 
1425                 ND_PRINT("\n\t  %s option (%u), length %u (%u): ",
1426                           tok2str(icmp6_opt_values, "unknown", opt_type),
1427                           opt_type,
1428                           opt_len << 3,
1429                           opt_len);
1430 
1431 		switch (opt_type) {
1432 		case ND_OPT_SOURCE_LINKADDR:
1433 			l = (opt_len << 3) - 2;
1434 			print_lladdr(ndo, cp + 2, l);
1435 			break;
1436 		case ND_OPT_TARGET_LINKADDR:
1437 			l = (opt_len << 3) - 2;
1438 			print_lladdr(ndo, cp + 2, l);
1439 			break;
1440 		case ND_OPT_PREFIX_INFORMATION:
1441 			opp = (const struct nd_opt_prefix_info *)op;
1442                         ND_PRINT("%s/%u%s, Flags [%s], valid time %s",
1443                                   GET_IP6ADDR_STRING(opp->nd_opt_pi_prefix),
1444                                   GET_U_1(opp->nd_opt_pi_prefix_len),
1445                                   (opt_len != 4) ? "badlen" : "",
1446                                   bittok2str(icmp6_opt_pi_flag_values, "none", GET_U_1(opp->nd_opt_pi_flags_reserved)),
1447                                   get_lifetime(GET_BE_U_4(opp->nd_opt_pi_valid_time)));
1448                         ND_PRINT(", pref. time %s",
1449 				 get_lifetime(GET_BE_U_4(opp->nd_opt_pi_preferred_time)));
1450 			break;
1451 		case ND_OPT_REDIRECTED_HEADER:
1452                         print_unknown_data(ndo, bp,"\n\t    ",opt_len<<3);
1453 			/* xxx */
1454 			break;
1455 		case ND_OPT_MTU:
1456 			opm = (const struct nd_opt_mtu *)op;
1457 			ND_PRINT(" %u%s",
1458                                GET_BE_U_4(opm->nd_opt_mtu_mtu),
1459                                (opt_len != 1) ? "bad option length" : "" );
1460                         break;
1461 		case ND_OPT_RDNSS:
1462 			oprd = (const struct nd_opt_rdnss *)op;
1463 			l = (opt_len - 1) / 2;
1464 			ND_PRINT(" lifetime %us,",
1465                                   GET_BE_U_4(oprd->nd_opt_rdnss_lifetime));
1466 			for (i = 0; i < l; i++) {
1467 				ND_PRINT(" addr: %s",
1468                                           GET_IP6ADDR_STRING(oprd->nd_opt_rdnss_addr[i]));
1469 			}
1470 			break;
1471 		case ND_OPT_DNSSL:
1472 			opds = (const struct nd_opt_dnssl *)op;
1473 			ND_PRINT(" lifetime %us, domain(s):",
1474                                   GET_BE_U_4(opds->nd_opt_dnssl_lifetime));
1475 			domp = cp + 8; /* domain names, variable-sized, RFC1035-encoded */
1476 			while (domp < cp + (opt_len << 3) && GET_U_1(domp) != '\0') {
1477 				ND_PRINT(" ");
1478 				if ((domp = fqdn_print(ndo, domp, bp)) == NULL)
1479 					goto trunc;
1480 			}
1481 			break;
1482 		case ND_OPT_ADVINTERVAL:
1483 			opa = (const struct nd_opt_advinterval *)op;
1484 			ND_PRINT(" %ums",
1485 				 GET_BE_U_4(opa->nd_opt_adv_interval));
1486 			break;
1487                 case ND_OPT_HOMEAGENT_INFO:
1488 			oph = (const struct nd_opt_homeagent_info *)op;
1489 			ND_PRINT(" preference %u, lifetime %u",
1490                                   GET_BE_U_2(oph->nd_opt_hai_preference),
1491                                   GET_BE_U_2(oph->nd_opt_hai_lifetime));
1492 			break;
1493 		case ND_OPT_ROUTE_INFO:
1494 			opri = (const struct nd_opt_route_info *)op;
1495 			ND_TCHECK_4(opri->nd_opt_rti_lifetime);
1496 			memset(&in6, 0, sizeof(in6));
1497 			switch (opt_len) {
1498 			case 1:
1499 				break;
1500 			case 2:
1501 				GET_CPY_BYTES(&in6, opri + 1, 8);
1502 				break;
1503 			case 3:
1504 				GET_CPY_BYTES(&in6, opri + 1, 16);
1505 				break;
1506 			default:
1507 				goto trunc;
1508 			}
1509 			ND_PRINT(" %s/%u", ip6addr_string(ndo, (const u_char *)&in6), /* local buffer, not packet data; don't use GET_IP6ADDR_STRING() */
1510                                   GET_U_1(opri->nd_opt_rti_prefixlen));
1511 			ND_PRINT(", pref=%s",
1512 				 get_rtpref(GET_U_1(opri->nd_opt_rti_flags)));
1513 			ND_PRINT(", lifetime=%s",
1514                                   get_lifetime(GET_BE_U_4(opri->nd_opt_rti_lifetime)));
1515 			break;
1516 		default:
1517                         if (ndo->ndo_vflag <= 1) {
1518                                 print_unknown_data(ndo,cp+2,"\n\t  ", (opt_len << 3) - 2); /* skip option header */
1519                             return 0;
1520                         }
1521                         break;
1522 		}
1523                 /* do we want to see an additional hexdump ? */
1524                 if (ndo->ndo_vflag> 1)
1525                         print_unknown_data(ndo, cp+2,"\n\t    ", (opt_len << 3) - 2); /* skip option header */
1526 
1527 		cp += opt_len << 3;
1528 		resid -= opt_len << 3;
1529 	}
1530 	return 0;
1531 
1532 trunc:
1533 	return -1;
1534 }
1535 
1536 static void
1537 mld6_print(netdissect_options *ndo, const u_char *bp)
1538 {
1539 	const struct mld6_hdr *mp = (const struct mld6_hdr *)bp;
1540 	const u_char *ep;
1541 
1542 	/* 'ep' points to the end of available data. */
1543 	ep = ndo->ndo_snapend;
1544 
1545 	if ((const u_char *)mp + sizeof(*mp) > ep)
1546 		return;
1547 
1548 	ND_PRINT("max resp delay: %u ", GET_BE_U_2(mp->mld6_maxdelay));
1549 	ND_PRINT("addr: %s", GET_IP6ADDR_STRING(mp->mld6_addr));
1550 }
1551 
1552 static void
1553 mldv2_report_print(netdissect_options *ndo, const u_char *bp, u_int len)
1554 {
1555     const struct icmp6_hdr *icp = (const struct icmp6_hdr *) bp;
1556     u_int group, nsrcs, ngroups;
1557     u_int i, j;
1558 
1559     /* Minimum len is 8 */
1560     if (len < 8) {
1561             ND_PRINT(" [invalid len %u]", len);
1562             return;
1563     }
1564 
1565     ngroups = GET_BE_U_2(icp->icmp6_data16[1]);
1566     ND_PRINT(", %u group record(s)", ngroups);
1567     if (ndo->ndo_vflag > 0) {
1568 	/* Print the group records */
1569 	group = 8;
1570         for (i = 0; i < ngroups; i++) {
1571 	    /* type(1) + auxlen(1) + numsrc(2) + grp(16) */
1572 	    if (len < group + 20) {
1573                     ND_PRINT(" [invalid number of groups]");
1574                     return;
1575 	    }
1576             ND_PRINT(" [gaddr %s", GET_IP6ADDR_STRING(bp + group + 4));
1577 	    ND_PRINT(" %s", tok2str(mldv2report2str, " [v2-report-#%u]",
1578                                          GET_U_1(bp + group)));
1579             nsrcs = GET_BE_U_2(bp + group + 2);
1580 	    /* Check the number of sources and print them */
1581 	    if (len < group + 20 + (nsrcs * sizeof(nd_ipv6))) {
1582                     ND_PRINT(" [invalid number of sources %u]", nsrcs);
1583                     return;
1584 	    }
1585             if (ndo->ndo_vflag == 1)
1586                     ND_PRINT(", %u source(s)", nsrcs);
1587             else {
1588 		/* Print the sources */
1589                     ND_PRINT(" {");
1590                 for (j = 0; j < nsrcs; j++) {
1591 		    ND_PRINT(" %s", GET_IP6ADDR_STRING(bp + group + 20 + (j * sizeof(nd_ipv6))));
1592 		}
1593                 ND_PRINT(" }");
1594             }
1595 	    /* Next group record */
1596             group += 20 + nsrcs * sizeof(nd_ipv6);
1597 	    ND_PRINT("]");
1598         }
1599     }
1600 }
1601 
1602 static void
1603 mldv2_query_print(netdissect_options *ndo, const u_char *bp, u_int len)
1604 {
1605     const struct icmp6_hdr *icp = (const struct icmp6_hdr *) bp;
1606     u_int mrc;
1607     u_int mrt, qqi;
1608     u_int nsrcs;
1609     u_int i;
1610 
1611     /* Minimum len is 28 */
1612     if (len < 28) {
1613         ND_PRINT(" [invalid len %u]", len);
1614 	return;
1615     }
1616     mrc = GET_BE_U_2(icp->icmp6_data16[0]);
1617     if (mrc < 32768) {
1618 	mrt = mrc;
1619     } else {
1620         mrt = ((mrc & 0x0fff) | 0x1000) << (((mrc & 0x7000) >> 12) + 3);
1621     }
1622     if (ndo->ndo_vflag) {
1623             ND_PRINT(" [max resp delay=%u]", mrt);
1624     }
1625     ND_PRINT(" [gaddr %s", GET_IP6ADDR_STRING(bp + 8));
1626 
1627     if (ndo->ndo_vflag) {
1628 	if (GET_U_1(bp + 24) & 0x08) {
1629 		ND_PRINT(" sflag");
1630 	}
1631 	if (GET_U_1(bp + 24) & 0x07) {
1632 		ND_PRINT(" robustness=%u", GET_U_1(bp + 24) & 0x07);
1633 	}
1634 	if (GET_U_1(bp + 25) < 128) {
1635 		qqi = GET_U_1(bp + 25);
1636 	} else {
1637 		qqi = ((GET_U_1(bp + 25) & 0x0f) | 0x10) <<
1638 		       (((GET_U_1(bp + 25) & 0x70) >> 4) + 3);
1639 	}
1640 	ND_PRINT(" qqi=%u", qqi);
1641     }
1642 
1643     nsrcs = GET_BE_U_2(bp + 26);
1644     if (nsrcs > 0) {
1645 	if (len < 28 + nsrcs * sizeof(nd_ipv6))
1646 	    ND_PRINT(" [invalid number of sources]");
1647 	else if (ndo->ndo_vflag > 1) {
1648 	    ND_PRINT(" {");
1649 	    for (i = 0; i < nsrcs; i++) {
1650 		ND_PRINT(" %s", GET_IP6ADDR_STRING(bp + 28 + (i * sizeof(nd_ipv6))));
1651 	    }
1652 	    ND_PRINT(" }");
1653 	} else
1654                 ND_PRINT(", %u source(s)", nsrcs);
1655     }
1656     ND_PRINT("]");
1657 }
1658 
1659 static void
1660 dnsname_print(netdissect_options *ndo, const u_char *cp, const u_char *ep)
1661 {
1662 	int i;
1663 
1664 	/* DNS name decoding - no decompression */
1665 	ND_PRINT(", \"");
1666 	while (cp < ep) {
1667 		i = GET_U_1(cp);
1668 		cp++;
1669 		if (i) {
1670 			if (i > ep - cp) {
1671 				ND_PRINT("???");
1672 				break;
1673 			}
1674 			while (i-- && cp < ep) {
1675 				fn_print_char(ndo, GET_U_1(cp));
1676 				cp++;
1677 			}
1678 			if (cp + 1 < ep && GET_U_1(cp))
1679 				ND_PRINT(".");
1680 		} else {
1681 			if (cp == ep) {
1682 				/* FQDN */
1683 				ND_PRINT(".");
1684 			} else if (cp + 1 == ep && GET_U_1(cp) == '\0') {
1685 				/* truncated */
1686 			} else {
1687 				/* invalid */
1688 				ND_PRINT("???");
1689 			}
1690 			break;
1691 		}
1692 	}
1693 	ND_PRINT("\"");
1694 }
1695 
1696 static void
1697 icmp6_nodeinfo_print(netdissect_options *ndo, u_int icmp6len, const u_char *bp, const u_char *ep)
1698 {
1699 	const struct icmp6_nodeinfo *ni6;
1700 	const struct icmp6_hdr *dp;
1701 	const u_char *cp;
1702 	size_t siz, i;
1703 	int needcomma;
1704 
1705 	if (ep < bp)
1706 		return;
1707 	dp = (const struct icmp6_hdr *)bp;
1708 	ni6 = (const struct icmp6_nodeinfo *)bp;
1709 	siz = ep - bp;
1710 
1711 	switch (GET_U_1(ni6->ni_type)) {
1712 	case ICMP6_NI_QUERY:
1713 		if (siz == sizeof(*dp) + 4) {
1714 			/* KAME who-are-you */
1715 			ND_PRINT(" who-are-you request");
1716 			break;
1717 		}
1718 		ND_PRINT(" node information query");
1719 
1720 		ND_TCHECK_LEN(dp, sizeof(*ni6));
1721 		ni6 = (const struct icmp6_nodeinfo *)dp;
1722 		ND_PRINT(" (");	/*)*/
1723 		switch (GET_BE_U_2(ni6->ni_qtype)) {
1724 		case NI_QTYPE_NOOP:
1725 			ND_PRINT("noop");
1726 			break;
1727 		case NI_QTYPE_SUPTYPES:
1728 			ND_PRINT("supported qtypes");
1729 			i = GET_BE_U_2(ni6->ni_flags);
1730 			if (i)
1731 				ND_PRINT(" [%s]", (i & 0x01) ? "C" : "");
1732 			break;
1733 		case NI_QTYPE_FQDN:
1734 			ND_PRINT("DNS name");
1735 			break;
1736 		case NI_QTYPE_NODEADDR:
1737 			ND_PRINT("node addresses");
1738 			i = GET_BE_U_2(ni6->ni_flags);
1739 			if (!i)
1740 				break;
1741 			/* NI_NODEADDR_FLAG_TRUNCATE undefined for query */
1742 			ND_PRINT(" [%s%s%s%s%s%s]",
1743 			    (i & NI_NODEADDR_FLAG_ANYCAST) ? "a" : "",
1744 			    (i & NI_NODEADDR_FLAG_GLOBAL) ? "G" : "",
1745 			    (i & NI_NODEADDR_FLAG_SITELOCAL) ? "S" : "",
1746 			    (i & NI_NODEADDR_FLAG_LINKLOCAL) ? "L" : "",
1747 			    (i & NI_NODEADDR_FLAG_COMPAT) ? "C" : "",
1748 			    (i & NI_NODEADDR_FLAG_ALL) ? "A" : "");
1749 			break;
1750 		default:
1751 			ND_PRINT("unknown");
1752 			break;
1753 		}
1754 
1755 		if (GET_BE_U_2(ni6->ni_qtype) == NI_QTYPE_NOOP ||
1756 		    GET_BE_U_2(ni6->ni_qtype) == NI_QTYPE_SUPTYPES) {
1757 			if (siz != sizeof(*ni6))
1758 				if (ndo->ndo_vflag)
1759 					ND_PRINT(", invalid len");
1760 			/*(*/
1761 			ND_PRINT(")");
1762 			break;
1763 		}
1764 
1765 		/* XXX backward compat, icmp-name-lookup-03 */
1766 		if (siz == sizeof(*ni6)) {
1767 			ND_PRINT(", 03 draft");
1768 			/*(*/
1769 			ND_PRINT(")");
1770 			break;
1771 		}
1772 
1773 		cp = (const u_char *)(ni6 + 1);
1774 		switch (GET_U_1(ni6->ni_code)) {
1775 		case ICMP6_NI_SUBJ_IPV6:
1776 			if (!ND_TTEST_LEN(dp, sizeof(*ni6) + sizeof(nd_ipv6)))
1777 				break;
1778 			if (siz != sizeof(*ni6) + sizeof(nd_ipv6)) {
1779 				if (ndo->ndo_vflag)
1780 					ND_PRINT(", invalid subject len");
1781 				break;
1782 			}
1783 			ND_PRINT(", subject=%s",
1784                                   GET_IP6ADDR_STRING(cp));
1785 			break;
1786 		case ICMP6_NI_SUBJ_FQDN:
1787 			ND_PRINT(", subject=DNS name");
1788 			if (GET_U_1(cp) == ep - cp - 1) {
1789 				/* icmp-name-lookup-03, pascal string */
1790 				if (ndo->ndo_vflag)
1791 					ND_PRINT(", 03 draft");
1792 				cp++;
1793 				ND_PRINT(", \"");
1794 				while (cp < ep) {
1795 					fn_print_char(ndo, GET_U_1(cp));
1796 					cp++;
1797 				}
1798 				ND_PRINT("\"");
1799 			} else
1800 				dnsname_print(ndo, cp, ep);
1801 			break;
1802 		case ICMP6_NI_SUBJ_IPV4:
1803 			if (!ND_TTEST_LEN(dp, sizeof(*ni6) + sizeof(nd_ipv4)))
1804 				break;
1805 			if (siz != sizeof(*ni6) + sizeof(nd_ipv4)) {
1806 				if (ndo->ndo_vflag)
1807 					ND_PRINT(", invalid subject len");
1808 				break;
1809 			}
1810 			ND_PRINT(", subject=%s",
1811                                   GET_IPADDR_STRING(cp));
1812 			break;
1813 		default:
1814 			ND_PRINT(", unknown subject");
1815 			break;
1816 		}
1817 
1818 		/*(*/
1819 		ND_PRINT(")");
1820 		break;
1821 
1822 	case ICMP6_NI_REPLY:
1823 		if (icmp6len > siz)
1824 			goto trunc;
1825 
1826 		needcomma = 0;
1827 
1828 		ND_TCHECK_LEN(dp, sizeof(*ni6));
1829 		ni6 = (const struct icmp6_nodeinfo *)dp;
1830 		ND_PRINT(" node information reply");
1831 		ND_PRINT(" (");	/*)*/
1832 		switch (GET_U_1(ni6->ni_code)) {
1833 		case ICMP6_NI_SUCCESS:
1834 			if (ndo->ndo_vflag) {
1835 				ND_PRINT("success");
1836 				needcomma++;
1837 			}
1838 			break;
1839 		case ICMP6_NI_REFUSED:
1840 			ND_PRINT("refused");
1841 			needcomma++;
1842 			if (siz != sizeof(*ni6))
1843 				if (ndo->ndo_vflag)
1844 					ND_PRINT(", invalid length");
1845 			break;
1846 		case ICMP6_NI_UNKNOWN:
1847 			ND_PRINT("unknown");
1848 			needcomma++;
1849 			if (siz != sizeof(*ni6))
1850 				if (ndo->ndo_vflag)
1851 					ND_PRINT(", invalid length");
1852 			break;
1853 		}
1854 
1855 		if (GET_U_1(ni6->ni_code) != ICMP6_NI_SUCCESS) {
1856 			/*(*/
1857 			ND_PRINT(")");
1858 			break;
1859 		}
1860 
1861 		switch (GET_BE_U_2(ni6->ni_qtype)) {
1862 		case NI_QTYPE_NOOP:
1863 			if (needcomma)
1864 				ND_PRINT(", ");
1865 			ND_PRINT("noop");
1866 			if (siz != sizeof(*ni6))
1867 				if (ndo->ndo_vflag)
1868 					ND_PRINT(", invalid length");
1869 			break;
1870 		case NI_QTYPE_SUPTYPES:
1871 			if (needcomma)
1872 				ND_PRINT(", ");
1873 			ND_PRINT("supported qtypes");
1874 			i = GET_BE_U_2(ni6->ni_flags);
1875 			if (i)
1876 				ND_PRINT(" [%s]", (i & 0x01) ? "C" : "");
1877 			break;
1878 		case NI_QTYPE_FQDN:
1879 			if (needcomma)
1880 				ND_PRINT(", ");
1881 			ND_PRINT("DNS name");
1882 			cp = (const u_char *)(ni6 + 1) + 4;
1883 			if (GET_U_1(cp) == ep - cp - 1) {
1884 				/* icmp-name-lookup-03, pascal string */
1885 				if (ndo->ndo_vflag)
1886 					ND_PRINT(", 03 draft");
1887 				cp++;
1888 				ND_PRINT(", \"");
1889 				while (cp < ep) {
1890 					fn_print_char(ndo, GET_U_1(cp));
1891 					cp++;
1892 				}
1893 				ND_PRINT("\"");
1894 			} else
1895 				dnsname_print(ndo, cp, ep);
1896 			if ((GET_BE_U_2(ni6->ni_flags) & 0x01) != 0)
1897 				ND_PRINT(" [TTL=%u]", GET_BE_U_4(ni6 + 1));
1898 			break;
1899 		case NI_QTYPE_NODEADDR:
1900 			if (needcomma)
1901 				ND_PRINT(", ");
1902 			ND_PRINT("node addresses");
1903 			i = sizeof(*ni6);
1904 			while (i < siz) {
1905 				if (i + sizeof(uint32_t) + sizeof(nd_ipv6) > siz)
1906 					break;
1907 				ND_PRINT(" %s(%u)",
1908 				    GET_IP6ADDR_STRING(bp + i + sizeof(uint32_t)),
1909 				    GET_BE_U_4(bp + i));
1910 				i += sizeof(uint32_t) + sizeof(nd_ipv6);
1911 			}
1912 			i = GET_BE_U_2(ni6->ni_flags);
1913 			if (!i)
1914 				break;
1915 			ND_PRINT(" [%s%s%s%s%s%s%s]",
1916                                   (i & NI_NODEADDR_FLAG_ANYCAST) ? "a" : "",
1917                                   (i & NI_NODEADDR_FLAG_GLOBAL) ? "G" : "",
1918                                   (i & NI_NODEADDR_FLAG_SITELOCAL) ? "S" : "",
1919                                   (i & NI_NODEADDR_FLAG_LINKLOCAL) ? "L" : "",
1920                                   (i & NI_NODEADDR_FLAG_COMPAT) ? "C" : "",
1921                                   (i & NI_NODEADDR_FLAG_ALL) ? "A" : "",
1922                                   (i & NI_NODEADDR_FLAG_TRUNCATE) ? "T" : "");
1923 			break;
1924 		default:
1925 			if (needcomma)
1926 				ND_PRINT(", ");
1927 			ND_PRINT("unknown");
1928 			break;
1929 		}
1930 
1931 		/*(*/
1932 		ND_PRINT(")");
1933 		break;
1934 	}
1935 	return;
1936 
1937 trunc:
1938 	nd_print_trunc(ndo);
1939 }
1940 
1941 static void
1942 icmp6_rrenum_print(netdissect_options *ndo, const u_char *bp, const u_char *ep)
1943 {
1944 	const struct icmp6_router_renum *rr6;
1945 	const char *cp;
1946 	const struct rr_pco_match *match;
1947 	const struct rr_pco_use *use;
1948 	char hbuf[NI_MAXHOST];
1949 	int n;
1950 
1951 	if (ep < bp)
1952 		return;
1953 	rr6 = (const struct icmp6_router_renum *)bp;
1954 	cp = (const char *)(rr6 + 1);
1955 
1956 	ND_TCHECK_4(rr6->rr_reserved);
1957 	switch (GET_U_1(rr6->rr_code)) {
1958 	case ICMP6_ROUTER_RENUMBERING_COMMAND:
1959 		ND_PRINT(", command");
1960 		break;
1961 	case ICMP6_ROUTER_RENUMBERING_RESULT:
1962 		ND_PRINT(", result");
1963 		break;
1964 	case ICMP6_ROUTER_RENUMBERING_SEQNUM_RESET:
1965 		ND_PRINT(", sequence number reset");
1966 		break;
1967 	default:
1968 		ND_PRINT(", code-#%u", GET_U_1(rr6->rr_code));
1969 		break;
1970 	}
1971 
1972         ND_PRINT(", seq=%u", GET_BE_U_4(rr6->rr_seqnum));
1973 
1974 	if (ndo->ndo_vflag) {
1975 		uint8_t rr_flags = GET_U_1(rr6->rr_flags);
1976 #define F(x, y)	(rr_flags & (x) ? (y) : "")
1977 		ND_PRINT("[");	/*]*/
1978 		if (rr_flags) {
1979 			ND_PRINT("%s%s%s%s%s,", F(ICMP6_RR_FLAGS_TEST, "T"),
1980                                   F(ICMP6_RR_FLAGS_REQRESULT, "R"),
1981                                   F(ICMP6_RR_FLAGS_FORCEAPPLY, "A"),
1982                                   F(ICMP6_RR_FLAGS_SPECSITE, "S"),
1983                                   F(ICMP6_RR_FLAGS_PREVDONE, "P"));
1984 		}
1985                 ND_PRINT("seg=%u,", GET_U_1(rr6->rr_segnum));
1986                 ND_PRINT("maxdelay=%u", GET_BE_U_2(rr6->rr_maxdelay));
1987 		if (GET_BE_U_4(rr6->rr_reserved))
1988 			ND_PRINT("rsvd=0x%x", GET_BE_U_4(rr6->rr_reserved));
1989 		/*[*/
1990 		ND_PRINT("]");
1991 #undef F
1992 	}
1993 
1994 	if (GET_U_1(rr6->rr_code) == ICMP6_ROUTER_RENUMBERING_COMMAND) {
1995 		match = (const struct rr_pco_match *)cp;
1996 		cp = (const char *)(match + 1);
1997 
1998 		ND_TCHECK_16(match->rpm_prefix);
1999 
2000 		if (ndo->ndo_vflag > 1)
2001 			ND_PRINT("\n\t");
2002 		else
2003 			ND_PRINT(" ");
2004 		ND_PRINT("match(");	/*)*/
2005 		switch (GET_U_1(match->rpm_code)) {
2006 		case RPM_PCO_ADD:	ND_PRINT("add"); break;
2007 		case RPM_PCO_CHANGE:	ND_PRINT("change"); break;
2008 		case RPM_PCO_SETGLOBAL:	ND_PRINT("setglobal"); break;
2009 		default:		ND_PRINT("#%u",
2010 						 GET_U_1(match->rpm_code)); break;
2011 		}
2012 
2013 		if (ndo->ndo_vflag) {
2014 			ND_PRINT(",ord=%u", GET_U_1(match->rpm_ordinal));
2015 			ND_PRINT(",min=%u", GET_U_1(match->rpm_minlen));
2016 			ND_PRINT(",max=%u", GET_U_1(match->rpm_maxlen));
2017 		}
2018 		if (addrtostr6(match->rpm_prefix, hbuf, sizeof(hbuf)))
2019 			ND_PRINT(",%s/%u", hbuf, GET_U_1(match->rpm_matchlen));
2020 		else
2021 			ND_PRINT(",?/%u", GET_U_1(match->rpm_matchlen));
2022 		/*(*/
2023 		ND_PRINT(")");
2024 
2025 		n = GET_U_1(match->rpm_len) - 3;
2026 		if (n % 4)
2027 			goto trunc;
2028 		n /= 4;
2029 		while (n-- > 0) {
2030 			use = (const struct rr_pco_use *)cp;
2031 			cp = (const char *)(use + 1);
2032 
2033 			ND_TCHECK_16(use->rpu_prefix);
2034 
2035 			if (ndo->ndo_vflag > 1)
2036 				ND_PRINT("\n\t");
2037 			else
2038 				ND_PRINT(" ");
2039 			ND_PRINT("use(");	/*)*/
2040 			if (GET_U_1(use->rpu_flags)) {
2041 #define F(x, y)	(GET_U_1(use->rpu_flags) & (x) ? (y) : "")
2042 				ND_PRINT("%s%s,",
2043                                           F(ICMP6_RR_PCOUSE_FLAGS_DECRVLTIME, "V"),
2044                                           F(ICMP6_RR_PCOUSE_FLAGS_DECRPLTIME, "P"));
2045 #undef F
2046 			}
2047 			if (ndo->ndo_vflag) {
2048 				ND_PRINT("mask=0x%x,",
2049 					 GET_U_1(use->rpu_ramask));
2050 				ND_PRINT("raflags=0x%x,",
2051 					 GET_U_1(use->rpu_raflags));
2052 				if (GET_BE_U_4(use->rpu_vltime) == 0xffffffff)
2053 					ND_PRINT("vltime=infty,");
2054 				else
2055 					ND_PRINT("vltime=%u,",
2056                                                   GET_BE_U_4(use->rpu_vltime));
2057 				if (GET_BE_U_4(use->rpu_pltime) == 0xffffffff)
2058 					ND_PRINT("pltime=infty,");
2059 				else
2060 					ND_PRINT("pltime=%u,",
2061                                                   GET_BE_U_4(use->rpu_pltime));
2062 			}
2063 			if (addrtostr6(use->rpu_prefix, hbuf, sizeof(hbuf)))
2064 				ND_PRINT("%s/%u/%u", hbuf,
2065                                           GET_U_1(use->rpu_uselen),
2066                                           GET_U_1(use->rpu_keeplen));
2067 			else
2068 				ND_PRINT("?/%u/%u", GET_U_1(use->rpu_uselen),
2069                                           GET_U_1(use->rpu_keeplen));
2070 			/*(*/
2071                         ND_PRINT(")");
2072 		}
2073 	}
2074 
2075 	return;
2076 
2077 trunc:
2078 	nd_print_trunc(ndo);
2079 }
2080