/* print a query */ static void ns_qprint(register const u_char *cp, register const u_char *bp) { register const u_char *np = cp; register u_int i; cp = ns_nskip(cp, bp); if (cp + 4 > snapend) return; /* print the qtype and qclass (if it's not IN) */ i = *cp++ << 8; i |= *cp++; printf(" %s", tok2str(type2str, "Type%d", i)); i = *cp++ << 8; i |= *cp++; if (i != C_IN) printf(" %s", tok2str(class2str, "(Class %d)", i)); fputs("? ", stdout); ns_nprint(np, bp); }
static void dhcp6opt_print(netdissect_options *ndo, const u_char *cp, const u_char *ep) { const struct dhcp6opt *dh6o; const u_char *tp; u_int i; uint16_t opttype; uint16_t optlen; uint8_t auth_proto; uint8_t auth_alg; uint8_t auth_rdm; u_int authinfolen, authrealmlen; u_int remain_len; /* Length of remaining options */ u_int label_len; /* Label length */ uint16_t subopt_code; uint16_t subopt_len; uint8_t dh6_reconf_type; uint8_t dh6_lq_query_type; if (cp == ep) return; while (cp < ep) { if (ep < cp + sizeof(*dh6o)) goto trunc; dh6o = (const struct dhcp6opt *)cp; ND_TCHECK_SIZE(dh6o); optlen = EXTRACT_BE_U_2(dh6o->dh6opt_len); if (ep < cp + sizeof(*dh6o) + optlen) goto trunc; opttype = EXTRACT_BE_U_2(dh6o->dh6opt_type); ND_PRINT(" (%s", tok2str(dh6opt_str, "opt_%u", opttype)); ND_TCHECK_LEN(cp + sizeof(*dh6o), optlen); switch (opttype) { case DH6OPT_CLIENTID: case DH6OPT_SERVERID: if (optlen < 2) { /*(*/ ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); switch (EXTRACT_BE_U_2(tp)) { case 1: if (optlen >= 2 + 6) { ND_PRINT(" hwaddr/time type %u time %u ", EXTRACT_BE_U_2(tp + 2), EXTRACT_BE_U_4(tp + 4)); for (i = 8; i < optlen; i++) ND_PRINT("%02x", EXTRACT_U_1(tp + i)); /*(*/ ND_PRINT(")"); } else { /*(*/ ND_PRINT(" ?)"); } break; case 2: if (optlen >= 2 + 8) { ND_PRINT(" vid "); for (i = 2; i < 2 + 8; i++) ND_PRINT("%02x", EXTRACT_U_1(tp + i)); /*(*/ ND_PRINT(")"); } else { /*(*/ ND_PRINT(" ?)"); } break; case 3: if (optlen >= 2 + 2) { ND_PRINT(" hwaddr type %u ", EXTRACT_BE_U_2(tp + 2)); for (i = 4; i < optlen; i++) ND_PRINT("%02x", EXTRACT_U_1(tp + i)); /*(*/ ND_PRINT(")"); } else { /*(*/ ND_PRINT(" ?)"); } break; default: ND_PRINT(" type %u)", EXTRACT_BE_U_2(tp)); break; } break; case DH6OPT_IA_ADDR: if (optlen < 24) { /*(*/ ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); ND_PRINT(" %s", ip6addr_string(ndo, tp)); ND_PRINT(" pltime:%u vltime:%u", EXTRACT_BE_U_4(tp + 16), EXTRACT_BE_U_4(tp + 20)); if (optlen > 24) { /* there are sub-options */ dhcp6opt_print(ndo, tp + 24, tp + optlen); } ND_PRINT(")"); break; case DH6OPT_ORO: case DH6OPT_ERO: if (optlen % 2) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); for (i = 0; i < optlen; i += 2) { ND_PRINT(" %s", tok2str(dh6opt_str, "opt_%u", EXTRACT_BE_U_2(tp + i))); } ND_PRINT(")"); break; case DH6OPT_PREFERENCE: if (optlen != 1) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); ND_PRINT(" %u)", EXTRACT_U_1(tp)); break; case DH6OPT_ELAPSED_TIME: if (optlen != 2) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); ND_PRINT(" %u)", EXTRACT_BE_U_2(tp)); break; case DH6OPT_RELAY_MSG: ND_PRINT(" ("); tp = (const u_char *)(dh6o + 1); dhcp6_print(ndo, tp, optlen); ND_PRINT(")"); break; case DH6OPT_AUTH: if (optlen < 11) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); auth_proto = EXTRACT_U_1(tp); switch (auth_proto) { case DH6OPT_AUTHPROTO_DELAYED: ND_PRINT(" proto: delayed"); break; case DH6OPT_AUTHPROTO_RECONFIG: ND_PRINT(" proto: reconfigure"); break; default: ND_PRINT(" proto: %u", auth_proto); break; } tp++; auth_alg = EXTRACT_U_1(tp); switch (auth_alg) { case DH6OPT_AUTHALG_HMACMD5: /* XXX: may depend on the protocol */ ND_PRINT(", alg: HMAC-MD5"); break; default: ND_PRINT(", alg: %u", auth_alg); break; } tp++; auth_rdm = EXTRACT_U_1(tp); switch (auth_rdm) { case DH6OPT_AUTHRDM_MONOCOUNTER: ND_PRINT(", RDM: mono"); break; default: ND_PRINT(", RDM: %u", auth_rdm); break; } tp++; ND_PRINT(", RD:"); for (i = 0; i < 4; i++, tp += 2) ND_PRINT(" %04x", EXTRACT_BE_U_2(tp)); /* protocol dependent part */ authinfolen = optlen - 11; switch (auth_proto) { case DH6OPT_AUTHPROTO_DELAYED: if (authinfolen == 0) break; if (authinfolen < 20) { ND_PRINT(" ??"); break; } authrealmlen = authinfolen - 20; if (authrealmlen > 0) { ND_PRINT(", realm: "); } for (i = 0; i < authrealmlen; i++, tp++) ND_PRINT("%02x", EXTRACT_U_1(tp)); ND_PRINT(", key ID: %08x", EXTRACT_BE_U_4(tp)); tp += 4; ND_PRINT(", HMAC-MD5:"); for (i = 0; i < 4; i++, tp+= 4) ND_PRINT(" %08x", EXTRACT_BE_U_4(tp)); break; case DH6OPT_AUTHPROTO_RECONFIG: if (authinfolen != 17) { ND_PRINT(" ??"); break; } switch (EXTRACT_U_1(tp)) { case DH6OPT_AUTHRECONFIG_KEY: ND_PRINT(" reconfig-key"); break; case DH6OPT_AUTHRECONFIG_HMACMD5: ND_PRINT(" type: HMAC-MD5"); break; default: ND_PRINT(" type: ??"); break; } tp++; ND_PRINT(" value:"); for (i = 0; i < 4; i++, tp+= 4) ND_PRINT(" %08x", EXTRACT_BE_U_4(tp)); break; default: ND_PRINT(" ??"); break; } ND_PRINT(")"); break; case DH6OPT_RAPID_COMMIT: /* nothing todo */ ND_PRINT(")"); break; case DH6OPT_INTERFACE_ID: case DH6OPT_SUBSCRIBER_ID: /* * Since we cannot predict the encoding, print hex dump * at most 10 characters. */ tp = (const u_char *)(dh6o + 1); ND_PRINT(" "); for (i = 0; i < optlen && i < 10; i++) ND_PRINT("%02x", EXTRACT_U_1(tp + i)); ND_PRINT("...)"); break; case DH6OPT_RECONF_MSG: if (optlen != 1) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); dh6_reconf_type = EXTRACT_U_1(tp); switch (dh6_reconf_type) { case DH6_RENEW: ND_PRINT(" for renew)"); break; case DH6_INFORM_REQ: ND_PRINT(" for inf-req)"); break; default: ND_PRINT(" for ?\?\?(%02x))", dh6_reconf_type); break; } break; case DH6OPT_RECONF_ACCEPT: /* nothing todo */ ND_PRINT(")"); break; case DH6OPT_SIP_SERVER_A: case DH6OPT_DNS_SERVERS: case DH6OPT_SNTP_SERVERS: case DH6OPT_NIS_SERVERS: case DH6OPT_NISP_SERVERS: case DH6OPT_BCMCS_SERVER_A: case DH6OPT_PANA_AGENT: case DH6OPT_LQ_CLIENT_LINK: if (optlen % 16) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); for (i = 0; i < optlen; i += 16) ND_PRINT(" %s", ip6addr_string(ndo, tp + i)); ND_PRINT(")"); break; case DH6OPT_SIP_SERVER_D: case DH6OPT_DOMAIN_LIST: tp = (const u_char *)(dh6o + 1); while (tp < cp + sizeof(*dh6o) + optlen) { ND_PRINT(" "); if ((tp = ns_nprint(ndo, tp, cp + sizeof(*dh6o) + optlen)) == NULL) goto trunc; } ND_PRINT(")"); break; case DH6OPT_STATUS_CODE: if (optlen < 2) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); ND_PRINT(" %s)", dhcp6stcode(EXTRACT_BE_U_2(tp))); break; case DH6OPT_IA_NA: case DH6OPT_IA_PD: if (optlen < 12) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); ND_PRINT(" IAID:%u T1:%u T2:%u", EXTRACT_BE_U_4(tp), EXTRACT_BE_U_4(tp + 4), EXTRACT_BE_U_4(tp + 8)); if (optlen > 12) { /* there are sub-options */ dhcp6opt_print(ndo, tp + 12, tp + optlen); } ND_PRINT(")"); break; case DH6OPT_IA_TA: if (optlen < 4) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); ND_PRINT(" IAID:%u", EXTRACT_BE_U_4(tp)); if (optlen > 4) { /* there are sub-options */ dhcp6opt_print(ndo, tp + 4, tp + optlen); } ND_PRINT(")"); break; case DH6OPT_IA_PD_PREFIX: if (optlen < 25) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); ND_PRINT(" %s/%u", ip6addr_string(ndo, tp + 9), EXTRACT_U_1(tp + 8)); ND_PRINT(" pltime:%u vltime:%u", EXTRACT_BE_U_4(tp), EXTRACT_BE_U_4(tp + 4)); if (optlen > 25) { /* there are sub-options */ dhcp6opt_print(ndo, tp + 25, tp + optlen); } ND_PRINT(")"); break; case DH6OPT_LIFETIME: case DH6OPT_CLT_TIME: if (optlen != 4) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); ND_PRINT(" %u)", EXTRACT_BE_U_4(tp)); break; case DH6OPT_REMOTE_ID: if (optlen < 4) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); ND_PRINT(" %u ", EXTRACT_BE_U_4(tp)); /* * Print hex dump first 10 characters. */ for (i = 4; i < optlen && i < 14; i++) ND_PRINT("%02x", EXTRACT_U_1(tp + i)); ND_PRINT("...)"); break; case DH6OPT_LQ_QUERY: if (optlen < 17) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); dh6_lq_query_type = EXTRACT_U_1(tp); switch (dh6_lq_query_type) { case 1: ND_PRINT(" by-address"); break; case 2: ND_PRINT(" by-clientID"); break; default: ND_PRINT(" type_%u", dh6_lq_query_type); break; } ND_PRINT(" %s", ip6addr_string(ndo, tp + 1)); if (optlen > 17) { /* there are query-options */ dhcp6opt_print(ndo, tp + 17, tp + optlen); } ND_PRINT(")"); break; case DH6OPT_CLIENT_DATA: tp = (const u_char *)(dh6o + 1); if (optlen > 0) { /* there are encapsulated options */ dhcp6opt_print(ndo, tp, tp + optlen); } ND_PRINT(")"); break; case DH6OPT_LQ_RELAY_DATA: if (optlen < 16) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); ND_PRINT(" %s ", ip6addr_string(ndo, tp)); /* * Print hex dump first 10 characters. */ for (i = 16; i < optlen && i < 26; i++) ND_PRINT("%02x", EXTRACT_U_1(tp + i)); ND_PRINT("...)"); break; case DH6OPT_NTP_SERVER: if (optlen < 4) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); while (tp < cp + sizeof(*dh6o) + optlen - 4) { subopt_code = EXTRACT_BE_U_2(tp); tp += 2; subopt_len = EXTRACT_BE_U_2(tp); tp += 2; if (tp + subopt_len > cp + sizeof(*dh6o) + optlen) goto trunc; ND_PRINT(" subopt:%u", subopt_code); switch (subopt_code) { case DH6OPT_NTP_SUBOPTION_SRV_ADDR: case DH6OPT_NTP_SUBOPTION_MC_ADDR: if (subopt_len != 16) { ND_PRINT(" ?"); break; } ND_PRINT(" %s", ip6addr_string(ndo, tp)); break; case DH6OPT_NTP_SUBOPTION_SRV_FQDN: ND_PRINT(" "); if (ns_nprint(ndo, tp, tp + subopt_len) == NULL) goto trunc; break; default: ND_PRINT(" ?"); break; } tp += subopt_len; } ND_PRINT(")"); break; case DH6OPT_AFTR_NAME: if (optlen < 3) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); remain_len = optlen; ND_PRINT(" "); /* Encoding is described in section 3.1 of RFC 1035 */ while (remain_len && EXTRACT_U_1(tp)) { label_len = EXTRACT_U_1(tp); tp++; if (label_len < remain_len - 1) { (void)fn_printn(ndo, tp, label_len, NULL); tp += label_len; remain_len -= (label_len + 1); if(EXTRACT_U_1(tp)) ND_PRINT("."); } else { ND_PRINT(" ?"); break; } } ND_PRINT(")"); break; case DH6OPT_NEW_POSIX_TIMEZONE: /* all three of these options */ case DH6OPT_NEW_TZDB_TIMEZONE: /* are encoded similarly */ case DH6OPT_MUDURL: /* although GMT might not work */ if (optlen < 5) { ND_PRINT(" ?)"); break; } tp = (const u_char *)(dh6o + 1); ND_PRINT("="); (void)fn_printn(ndo, tp, (u_int)optlen, NULL); ND_PRINT(")"); break; default: ND_PRINT(")"); break; } cp += sizeof(*dh6o) + optlen; } return; trunc: ND_PRINT("[|dhcp6ext]"); }
void ns_print(register const u_char *bp, u_int length) { register const HEADER *np; register int qdcount, ancount, nscount, arcount; register const u_char *cp; np = (const HEADER *)bp; /* get the byte-order right */ qdcount = ntohs(np->qdcount); ancount = ntohs(np->ancount); nscount = ntohs(np->nscount); arcount = ntohs(np->arcount); if (np->qr) { /* this is a response */ printf(" %d%s%s%s%s%s", ntohs(np->id), ns_ops[np->opcode], ns_resp[np->rcode], np->aa? "*" : "", np->ra? "" : "-", np->tc? "|" : ""); if (qdcount != 1) printf(" [%dq]", qdcount); /* Print QUESTION section on -vv */ if (vflag > 1) { fputs(" q: ", stdout); cp = ns_nprint((const u_char *)(np + 1), bp); } else cp = ns_nskip((const u_char *)(np + 1), bp); printf(" %d/%d/%d", ancount, nscount, arcount); if (ancount--) { cp = ns_rprint(cp + 4, bp); while (ancount-- && cp < snapend) { putchar(','); cp = ns_rprint(cp, bp); } } } else { /* this is a request */ printf(" %d%s%s", ntohs(np->id), ns_ops[np->opcode], np->rd? "+" : ""); /* any weirdness? */ if (*(((u_short *)np)+1) & htons(0x6ff)) printf(" [b2&3=0x%x]", ntohs(*(((u_short *)np)+1))); if (np->opcode == IQUERY) { if (qdcount) printf(" [%dq]", qdcount); if (ancount != 1) printf(" [%da]", ancount); } else { if (ancount) printf(" [%da]", ancount); if (qdcount != 1) printf(" [%dq]", qdcount); } if (nscount) printf(" [%dn]", nscount); if (arcount) printf(" [%dau]", arcount); ns_qprint((const u_char *)(np + 1), (const u_char *)np); } printf(" (%d)", length); }
/* print a reply */ static const u_char * ns_rprint(register const u_char *cp, register const u_char *bp) { register u_int i; register u_short typ, len; register const u_char *rp; if (vflag) { putchar(' '); cp = ns_nprint(cp, bp); } else cp = ns_nskip(cp, bp); if (cp + 10 > snapend) return (snapend); /* print the type/qtype and class (if it's not IN) */ typ = *cp++ << 8; typ |= *cp++; i = *cp++ << 8; i |= *cp++; if (i != C_IN) printf(" %s", tok2str(class2str, "(Class %d)", i)); /* ignore ttl */ cp += 4; len = *cp++ << 8; len |= *cp++; rp = cp + len; printf(" %s", tok2str(type2str, "Type%d", typ)); switch (typ) { case T_A: printf(" %s", ipaddr_string(cp)); break; case T_NS: case T_CNAME: case T_PTR: putchar(' '); (void)ns_nprint(cp, bp); break; case T_MX: putchar(' '); (void)ns_nprint(cp + 2, bp); printf(" %d", EXTRACT_16BITS(cp)); break; case T_TXT: putchar(' '); (void)ns_cprint(cp, bp); break; case T_UNSPECA: /* One long string */ printf(" %.*s", len, cp); break; } return (rp); /* XXX This isn't always right */ }
static void dhcp6opt_print(const u_char *cp, const u_char *ep) { const struct dhcp6opt *dh6o; const u_char *tp; size_t i; u_int16_t opttype; size_t optlen; u_int8_t auth_proto; u_int authinfolen, authrealmlen; int remain_len; /* Length of remaining options */ int label_len; /* Label length */ u_int16_t subopt_code; u_int16_t subopt_len; if (cp == ep) return; while (cp < ep) { if (ep < cp + sizeof(*dh6o)) goto trunc; dh6o = (struct dhcp6opt *)cp; TCHECK(*dh6o); optlen = EXTRACT_16BITS(&dh6o->dh6opt_len); if (ep < cp + sizeof(*dh6o) + optlen) goto trunc; opttype = EXTRACT_16BITS(&dh6o->dh6opt_type); printf(" (%s", dhcp6opt_name(opttype)); switch (opttype) { case DH6OPT_CLIENTID: case DH6OPT_SERVERID: if (optlen < 2) { /*(*/ printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); switch (EXTRACT_16BITS(tp)) { case 1: if (optlen >= 2 + 6) { printf(" hwaddr/time type %u time %u ", EXTRACT_16BITS(&tp[2]), EXTRACT_32BITS(&tp[4])); for (i = 8; i < optlen; i++) printf("%02x", tp[i]); /*(*/ printf(")"); } else { /*(*/ printf(" ?)"); } break; case 2: if (optlen >= 2 + 8) { printf(" vid "); for (i = 2; i < 2 + 8; i++) printf("%02x", tp[i]); /*(*/ printf(")"); } else { /*(*/ printf(" ?)"); } break; case 3: if (optlen >= 2 + 2) { printf(" hwaddr type %u ", EXTRACT_16BITS(&tp[2])); for (i = 4; i < optlen; i++) printf("%02x", tp[i]); /*(*/ printf(")"); } else { /*(*/ printf(" ?)"); } break; default: printf(" type %d)", EXTRACT_16BITS(tp)); break; } break; case DH6OPT_IA_ADDR: if (optlen < 24) { /*(*/ printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); printf(" %s", ip6addr_string(&tp[0])); printf(" pltime:%u vltime:%u", EXTRACT_32BITS(&tp[16]), EXTRACT_32BITS(&tp[20])); if (optlen > 24) { /* there are sub-options */ dhcp6opt_print(tp + 24, tp + optlen); } printf(")"); break; case DH6OPT_ORO: case DH6OPT_ERO: if (optlen % 2) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); for (i = 0; i < optlen; i += 2) { printf(" %s", dhcp6opt_name(EXTRACT_16BITS(&tp[i]))); } printf(")"); break; case DH6OPT_PREFERENCE: if (optlen != 1) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); printf(" %d)", *tp); break; case DH6OPT_ELAPSED_TIME: if (optlen != 2) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); printf(" %d)", EXTRACT_16BITS(tp)); break; case DH6OPT_RELAY_MSG: printf(" ("); tp = (u_char *)(dh6o + 1); dhcp6_print(tp, optlen); printf(")"); break; case DH6OPT_AUTH: if (optlen < 11) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); auth_proto = *tp; switch (auth_proto) { case DH6OPT_AUTHPROTO_DELAYED: printf(" proto: delayed"); break; case DH6OPT_AUTHPROTO_RECONFIG: printf(" proto: reconfigure"); break; default: printf(" proto: %d", auth_proto); break; } tp++; switch (*tp) { case DH6OPT_AUTHALG_HMACMD5: /* XXX: may depend on the protocol */ printf(", alg: HMAC-MD5"); break; default: printf(", alg: %d", *tp); break; } tp++; switch (*tp) { case DH6OPT_AUTHRDM_MONOCOUNTER: printf(", RDM: mono"); break; default: printf(", RDM: %d", *tp); break; } tp++; printf(", RD:"); for (i = 0; i < 4; i++, tp += 2) printf(" %04x", EXTRACT_16BITS(tp)); /* protocol dependent part */ authinfolen = optlen - 11; switch (auth_proto) { case DH6OPT_AUTHPROTO_DELAYED: if (authinfolen == 0) break; if (authinfolen < 20) { printf(" ??"); break; } authrealmlen = authinfolen - 20; if (authrealmlen > 0) { printf(", realm: "); } for (i = 0; i < authrealmlen; i++, tp++) printf("%02x", *tp); printf(", key ID: %08x", EXTRACT_32BITS(tp)); tp += 4; printf(", HMAC-MD5:"); for (i = 0; i < 4; i++, tp+= 4) printf(" %08x", EXTRACT_32BITS(tp)); break; case DH6OPT_AUTHPROTO_RECONFIG: if (authinfolen != 17) { printf(" ??"); break; } switch (*tp++) { case DH6OPT_AUTHRECONFIG_KEY: printf(" reconfig-key"); break; case DH6OPT_AUTHRECONFIG_HMACMD5: printf(" type: HMAC-MD5"); break; default: printf(" type: ??"); break; } printf(" value:"); for (i = 0; i < 4; i++, tp+= 4) printf(" %08x", EXTRACT_32BITS(tp)); break; default: printf(" ??"); break; } printf(")"); break; case DH6OPT_RAPID_COMMIT: /* nothing todo */ printf(")"); break; case DH6OPT_INTERFACE_ID: case DH6OPT_SUBSCRIBER_ID: /* * Since we cannot predict the encoding, print hex dump * at most 10 characters. */ tp = (u_char *)(dh6o + 1); printf(" "); for (i = 0; i < optlen && i < 10; i++) printf("%02x", tp[i]); printf("...)"); break; case DH6OPT_RECONF_MSG: tp = (u_char *)(dh6o + 1); switch (*tp) { case DH6_RENEW: printf(" for renew)"); break; case DH6_INFORM_REQ: printf(" for inf-req)"); break; default: printf(" for ?\?\?(%02x))", *tp); break; } break; case DH6OPT_RECONF_ACCEPT: /* nothing todo */ printf(")"); break; case DH6OPT_SIP_SERVER_A: case DH6OPT_DNS_SERVERS: case DH6OPT_SNTP_SERVERS: case DH6OPT_NIS_SERVERS: case DH6OPT_NISP_SERVERS: case DH6OPT_BCMCS_SERVER_A: case DH6OPT_PANA_AGENT: case DH6OPT_LQ_CLIENT_LINK: if (optlen % 16) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); for (i = 0; i < optlen; i += 16) printf(" %s", ip6addr_string(&tp[i])); printf(")"); break; case DH6OPT_SIP_SERVER_D: case DH6OPT_DOMAIN_LIST: tp = (u_char *)(dh6o + 1); while (tp < cp + sizeof(*dh6o) + optlen) { putchar(' '); if ((tp = ns_nprint(tp, cp + sizeof(*dh6o) + optlen)) == NULL) goto trunc; } printf(")"); break; case DH6OPT_STATUS_CODE: if (optlen < 2) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); printf(" %s)", dhcp6stcode(EXTRACT_16BITS(&tp[0]))); break; case DH6OPT_IA_NA: case DH6OPT_IA_PD: if (optlen < 12) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); printf(" IAID:%u T1:%u T2:%u", EXTRACT_32BITS(&tp[0]), EXTRACT_32BITS(&tp[4]), EXTRACT_32BITS(&tp[8])); if (optlen > 12) { /* there are sub-options */ dhcp6opt_print(tp + 12, tp + optlen); } printf(")"); break; case DH6OPT_IA_TA: if (optlen < 4) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); printf(" IAID:%u", EXTRACT_32BITS(tp)); if (optlen > 4) { /* there are sub-options */ dhcp6opt_print(tp + 4, tp + optlen); } printf(")"); break; case DH6OPT_IA_PD_PREFIX: if (optlen < 25) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); printf(" %s/%d", ip6addr_string(&tp[9]), tp[8]); printf(" pltime:%u vltime:%u", EXTRACT_32BITS(&tp[0]), EXTRACT_32BITS(&tp[4])); if (optlen > 25) { /* there are sub-options */ dhcp6opt_print(tp + 25, tp + optlen); } printf(")"); break; case DH6OPT_LIFETIME: case DH6OPT_CLT_TIME: if (optlen != 4) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); printf(" %d)", EXTRACT_32BITS(tp)); break; case DH6OPT_REMOTE_ID: if (optlen < 4) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); printf(" %d ", EXTRACT_32BITS(tp)); /* * Print hex dump first 10 characters. */ for (i = 4; i < optlen && i < 14; i++) printf("%02x", tp[i]); printf("...)"); break; case DH6OPT_LQ_QUERY: if (optlen < 17) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); switch (*tp) { case 1: printf(" by-address"); break; case 2: printf(" by-clientID"); break; default: printf(" type_%d", (int)*tp); break; } printf(" %s", ip6addr_string(&tp[1])); if (optlen > 17) { /* there are query-options */ dhcp6opt_print(tp + 17, tp + optlen); } printf(")"); break; case DH6OPT_CLIENT_DATA: tp = (u_char *)(dh6o + 1); if (optlen > 0) { /* there are encapsulated options */ dhcp6opt_print(tp, tp + optlen); } printf(")"); break; case DH6OPT_LQ_RELAY_DATA: if (optlen < 16) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); printf(" %s ", ip6addr_string(&tp[0])); /* * Print hex dump first 10 characters. */ for (i = 16; i < optlen && i < 26; i++) printf("%02x", tp[i]); printf("...)"); break; case DH6OPT_NTP_SERVER: if (optlen < 4) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); while (tp < cp + sizeof(*dh6o) + optlen - 4) { subopt_code = EXTRACT_16BITS(tp); tp += 2; subopt_len = EXTRACT_16BITS(tp); tp += 2; if (tp + subopt_len > cp + sizeof(*dh6o) + optlen) goto trunc; printf(" subopt:%d", subopt_code); switch (subopt_code) { case DH6OPT_NTP_SUBOPTION_SRV_ADDR: case DH6OPT_NTP_SUBOPTION_MC_ADDR: if (subopt_len != 16) { printf(" ?"); break; } printf(" %s", ip6addr_string(&tp[0])); break; case DH6OPT_NTP_SUBOPTION_SRV_FQDN: putchar(' '); if (ns_nprint(tp, tp + subopt_len) == NULL) goto trunc; break; default: printf(" ?"); break; } tp += subopt_len; } printf(")"); break; case DH6OPT_AFTR_NAME: if (optlen < 3) { printf(" ?)"); break; } tp = (u_char *)(dh6o + 1); remain_len = optlen; printf(" "); /* Encoding is described in section 3.1 of RFC 1035 */ while (remain_len && *tp) { label_len = *tp++; if (label_len < remain_len - 1) { printf("%.*s", label_len, tp); tp += label_len; remain_len -= (label_len + 1); if(*tp) printf("."); } else { printf(" ?"); break; } } printf(")"); break; default: printf(")"); break; } cp += sizeof(*dh6o) + optlen; } return; trunc: printf("[|dhcp6ext]"); }