xref: /haiku/src/bin/network/ping/ping6.c (revision b3a7feb168844f27847a5d33c15df5f550938092)
1 /*	$KAME: ping6.c,v 1.169 2003/07/25 06:01:47 itojun Exp $	*/
2 
3 /*-
4  * SPDX-License-Identifier: BSD-3-Clause
5  *
6  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
7  * All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted provided that the following conditions
11  * are met:
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in the
16  *    documentation and/or other materials provided with the distribution.
17  * 3. Neither the name of the project nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 /*	BSDI	ping.c,v 2.3 1996/01/21 17:56:50 jch Exp	*/
35 
36 /*
37  * Copyright (c) 1989, 1993
38  *	The Regents of the University of California.  All rights reserved.
39  *
40  * This code is derived from software contributed to Berkeley by
41  * Mike Muuss.
42  *
43  * Redistribution and use in source and binary forms, with or without
44  * modification, are permitted provided that the following conditions
45  * are met:
46  * 1. Redistributions of source code must retain the above copyright
47  *    notice, this list of conditions and the following disclaimer.
48  * 2. Redistributions in binary form must reproduce the above copyright
49  *    notice, this list of conditions and the following disclaimer in the
50  *    documentation and/or other materials provided with the distribution.
51  * 3. Neither the name of the University nor the names of its contributors
52  *    may be used to endorse or promote products derived from this software
53  *    without specific prior written permission.
54  *
55  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
56  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
57  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
58  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
59  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
60  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
61  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
62  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
63  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
64  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
65  * SUCH DAMAGE.
66  */
67 
68 /*
69  * Using the InterNet Control Message Protocol (ICMP) "ECHO" facility,
70  * measure round-trip-delays and packet loss across network paths.
71  *
72  * Author -
73  *	Mike Muuss
74  *	U. S. Army Ballistic Research Laboratory
75  *	December, 1983
76  *
77  * Status -
78  *	Public Domain.  Distribution Unlimited.
79  * Bugs -
80  *	More statistics could always be gathered.
81  *	This program has to run SUID to ROOT to access the ICMP socket.
82  */
83 /*
84  * NOTE:
85  * USE_SIN6_SCOPE_ID assumes that sin6_scope_id has the same semantics
86  * as IPV6_PKTINFO.  Some people object it (sin6_scope_id specifies *link*
87  * while IPV6_PKTINFO specifies *interface*.  Link is defined as collection of
88  * network attached to 1 or more interfaces)
89  */
90 
91 #include <sys/param.h>
92 #ifndef __HAIKU__
93 #include <sys/capsicum.h>
94 #endif
95 #include <sys/uio.h>
96 #include <sys/socket.h>
97 
98 #include <net/if.h>
99 #include <net/route.h>
100 
101 #include <netinet/in.h>
102 #include <netinet/ip6.h>
103 #include <netinet/icmp6.h>
104 #include <arpa/inet.h>
105 #include <arpa/nameser.h>
106 #include <netdb.h>
107 
108 #ifndef __HAIKU__
109 #include <capsicum_helpers.h>
110 #include <casper/cap_dns.h>
111 #include <libcasper.h>
112 #endif
113 
114 #include <ctype.h>
115 #include <err.h>
116 #include <errno.h>
117 #include <fcntl.h>
118 #include <signal.h>
119 #include <stdio.h>
120 #include <stdlib.h>
121 #include <string.h>
122 #include <sysexits.h>
123 #include <time.h>
124 #include <unistd.h>
125 
126 #ifdef IPSEC
127 #include <netipsec/ah.h>
128 #include <netipsec/ipsec.h>
129 #endif
130 
131 #ifndef __HAIKU__
132 #include <md5.h>
133 #endif
134 
135 #include "main.h"
136 #include "ping6.h"
137 
138 struct tv32 {
139 	u_int32_t tv32_sec;
140 	u_int32_t tv32_nsec;
141 };
142 
143 #define MAXPACKETLEN	131072
144 #define	IP6LEN		40
145 #define ICMP6ECHOLEN	8	/* icmp echo header len excluding time */
146 #define ICMP6ECHOTMLEN sizeof(struct tv32)
147 #define ICMP6_NIQLEN	(ICMP6ECHOLEN + 8)
148 # define CONTROLLEN	10240	/* ancillary data buffer size RFC3542 20.1 */
149 /* FQDN case, 64 bits of nonce + 32 bits ttl */
150 #define ICMP6_NIRLEN	(ICMP6ECHOLEN + 12)
151 #define	EXTRA		256	/* for AH and various other headers. weird. */
152 #define	DEFDATALEN	ICMP6ECHOTMLEN
153 #define MAXDATALEN	MAXPACKETLEN - IP6LEN - ICMP6ECHOLEN
154 #define	NROUTES		9		/* number of record route slots */
155 #define	MAXWAIT		10000		/* max ms to wait for response */
156 #define	MAXALARM	(60 * 60)	/* max seconds for alarm timeout */
157 
158 #define	A(bit)		rcvd_tbl[(bit)>>3]	/* identify byte in array */
159 #define	B(bit)		(1 << ((bit) & 0x07))	/* identify bit in byte */
160 #define	SET(bit)	(A(bit) |= B(bit))
161 #define	CLR(bit)	(A(bit) &= (~B(bit)))
162 #define	TST(bit)	(A(bit) & B(bit))
163 
164 #define	F_FLOOD		0x0001
165 #define	F_INTERVAL	0x0002
166 #define	F_PINGFILLED	0x0008
167 #define	F_QUIET		0x0010
168 #define	F_RROUTE	0x0020
169 #define	F_SO_DEBUG	0x0040
170 #define	F_VERBOSE	0x0100
171 #ifdef IPSEC
172 #ifdef IPSEC_POLICY_IPSEC
173 #define	F_POLICY	0x0400
174 #else
175 #define F_AUTHHDR	0x0200
176 #define F_ENCRYPT	0x0400
177 #endif /*IPSEC_POLICY_IPSEC*/
178 #endif /*IPSEC*/
179 #define F_NODEADDR	0x0800
180 #define F_FQDN		0x1000
181 #define F_INTERFACE	0x2000
182 #define F_SRCADDR	0x4000
183 #define F_FQDNOLD	0x20000
184 #define F_NIGROUP	0x40000
185 #define F_SUPTYPES	0x80000
186 #define F_NOMINMTU	0x100000
187 #define F_ONCE		0x200000
188 #define F_AUDIBLE	0x400000
189 #define F_MISSED	0x800000
190 #define F_DONTFRAG	0x1000000
191 #define F_NOUSERDATA	(F_NODEADDR | F_FQDN | F_FQDNOLD | F_SUPTYPES)
192 #define	F_WAITTIME	0x2000000
193 #define	F_DOT		0x4000000
194 
195 #define IN6LEN		sizeof(struct in6_addr)
196 #define SA6LEN		sizeof(struct sockaddr_in6)
197 #define DUMMY_PORT	10101
198 
199 #define SIN6(s)	((struct sockaddr_in6 *)(s))
200 
201 /*
202  * MAX_DUP_CHK is the number of bits in received table, i.e. the maximum
203  * number of received sequence numbers we can keep track of.  Change 128
204  * to 8192 for complete accuracy...
205  */
206 #define	MAX_DUP_CHK	(8 * 8192)
207 static int mx_dup_ck = MAX_DUP_CHK;
208 static char rcvd_tbl[MAX_DUP_CHK / 8];
209 
210 static struct sockaddr_in6 dst;	/* who to ping6 */
211 static struct sockaddr_in6 src;	/* src addr of this packet */
212 static socklen_t srclen;
213 static size_t datalen = DEFDATALEN;
214 static int ssend;		/* send socket file descriptor */
215 static int srecv;		/* receive socket file descriptor */
216 static u_char outpack[MAXPACKETLEN];
217 static char BSPACE = '\b';	/* characters written for flood */
218 static char BBELL = '\a';	/* characters written for AUDIBLE */
219 static const char *DOT = ".";
220 static size_t DOTlen = 1;
221 static size_t DOTidx = 0;
222 static int ident;		/* process id to identify our packets */
223 static u_int8_t nonce[8];	/* nonce field for node information */
224 static int hoplimit = -1;	/* hoplimit */
225 static int tclass = -1;		/* traffic class */
226 static int pcp = -2;		/* vlan priority code point */
227 static u_char *packet = NULL;
228 #ifndef __HAIKU__
229 static cap_channel_t *capdns;
230 #endif
231 
232 /* counters */
233 static long nmissedmax;		/* max value of ntransmitted - nreceived - 1 */
234 static long npackets;		/* max packets to transmit */
235 static long ntransmitfailures;	/* number of transmit failures */
236 static int interval = 1000;	/* interval between packets in ms */
237 static int waittime = MAXWAIT;	/* timeout for each packet */
238 
239 /* for node addresses */
240 static u_short naflags;
241 
242 /* for ancillary data(advanced API) */
243 static struct msghdr smsghdr;
244 static struct iovec smsgiov;
245 static char *scmsg = 0;
246 
247 #ifndef __HAIKU__
248 static cap_channel_t *capdns_setup(void);
249 #endif
250 static void	 fill(char *, char *);
251 static int	 get_hoplim(struct msghdr *);
252 static int	 get_pathmtu(struct msghdr *);
253 static struct in6_pktinfo *get_rcvpktinfo(struct msghdr *);
254 static size_t	 pingerlen(void);
255 static int	 pinger(void);
256 static const char *pr_addr(struct sockaddr *, int);
257 static void	 pr_icmph(struct icmp6_hdr *, u_char *);
258 static void	 pr_iph(struct ip6_hdr *);
259 static void	 pr_suptypes(struct icmp6_nodeinfo *, size_t);
260 static void	 pr_nodeaddr(struct icmp6_nodeinfo *, int);
261 static int	 myechoreply(const struct icmp6_hdr *);
262 static int	 mynireply(const struct icmp6_nodeinfo *);
263 static const char *dnsdecode(const u_char *, const u_char *, const u_char *,
264     char *, size_t);
265 static void	 pr_pack(u_char *, int, struct msghdr *);
266 static void	 pr_exthdrs(struct msghdr *);
267 static void	 pr_ip6opt(void *, size_t);
268 static void	 pr_rthdr(void *, size_t);
269 static int	 pr_bitrange(u_int32_t, int, int);
270 static void	 pr_retip(struct ip6_hdr *, u_char *);
271 #ifdef IPSEC
272 #ifdef IPSEC_POLICY_IPSEC
273 static int	 setpolicy(int, char *);
274 #endif
275 #endif
276 #ifndef __HAIKU__
277 static char	*nigroup(char *, int);
278 #endif
279 
280 int
ping6(int argc,char * argv[])281 ping6(int argc, char *argv[])
282 {
283 	struct timespec last, intvl;
284 	struct sockaddr_in6 from, *sin6;
285 	struct addrinfo hints, *res;
286 	struct sigaction si_sa;
287 	int cc, i;
288 	int almost_done, ch, hold, packlen, preload, optval, error;
289 	int nig_oldmcprefix = -1;
290 	u_char *datap;
291 	char *e, *target, *ifname = NULL, *gateway = NULL;
292 	int ip6optlen = 0;
293 	struct cmsghdr *scmsgp = NULL;
294 	/* For control (ancillary) data received from recvmsg() */
295 	u_char cm[CONTROLLEN];
296 #if defined(SO_SNDBUF) && defined(SO_RCVBUF)
297 	u_long lsockbufsize;
298 	int sockbufsize = 0;
299 #endif
300 	int usepktinfo = 0;
301 	struct in6_pktinfo pktinfo;
302 	char *cmsg_pktinfo = NULL;
303 	struct ip6_rthdr *rthdr = NULL;
304 #ifdef IPSEC_POLICY_IPSEC
305 	char *policy_in = NULL;
306 	char *policy_out = NULL;
307 #endif
308 	double t;
309 	u_long alarmtimeout;
310 	size_t rthlen;
311 #ifdef IPV6_USE_MIN_MTU
312 	int mflag = 0;
313 #endif
314 #ifndef __HAIKU__
315 	cap_rights_t rights_srecv;
316 	cap_rights_t rights_ssend;
317 	cap_rights_t rights_stdin;
318 #endif
319 
320 	/* just to be sure */
321 	memset(&smsghdr, 0, sizeof(smsghdr));
322 	memset(&smsgiov, 0, sizeof(smsgiov));
323 	memset(&pktinfo, 0, sizeof(pktinfo));
324 
325 	intvl.tv_sec = interval / 1000;
326 	intvl.tv_nsec = interval % 1000 * 1000000;
327 
328 	alarmtimeout = preload = 0;
329 	datap = &outpack[ICMP6ECHOLEN + ICMP6ECHOTMLEN];
330 #ifndef __HAIKU__
331 	capdns = capdns_setup();
332 #endif
333 
334 	while ((ch = getopt(argc, argv, PING6OPTS)) != -1) {
335 		switch (ch) {
336 		case '.':
337 			options |= F_DOT;
338 			if (optarg != NULL) {
339 				DOT = optarg;
340 				DOTlen = strlen(optarg);
341 			}
342 			break;
343 		case '6':
344 			/* This option is processed in main(). */
345 			break;
346 		case 'k':
347 		{
348 			char *cp;
349 
350 			options &= ~F_NOUSERDATA;
351 			options |= F_NODEADDR;
352 			for (cp = optarg; *cp != '\0'; cp++) {
353 				switch (*cp) {
354 				case 'a':
355 					naflags |= NI_NODEADDR_FLAG_ALL;
356 					break;
357 				case 'c':
358 				case 'C':
359 					naflags |= NI_NODEADDR_FLAG_COMPAT;
360 					break;
361 				case 'l':
362 				case 'L':
363 					naflags |= NI_NODEADDR_FLAG_LINKLOCAL;
364 					break;
365 				case 's':
366 				case 'S':
367 					naflags |= NI_NODEADDR_FLAG_SITELOCAL;
368 					break;
369 				case 'g':
370 				case 'G':
371 					naflags |= NI_NODEADDR_FLAG_GLOBAL;
372 					break;
373 				case 'A': /* experimental. not in the spec */
374 #ifdef NI_NODEADDR_FLAG_ANYCAST
375 					naflags |= NI_NODEADDR_FLAG_ANYCAST;
376 					break;
377 #else
378 					errx(1,
379 "-a A is not supported on the platform");
380 					/*NOTREACHED*/
381 #endif
382 				default:
383 					usage();
384 					/*NOTREACHED*/
385 				}
386 			}
387 			break;
388 		}
389 		case 'b':
390 #if defined(SO_SNDBUF) && defined(SO_RCVBUF)
391 			errno = 0;
392 			e = NULL;
393 			lsockbufsize = strtoul(optarg, &e, 10);
394 			sockbufsize = (int)lsockbufsize;
395 			if (errno || !*optarg || *e ||
396 			    lsockbufsize > INT_MAX)
397 				errx(1, "invalid socket buffer size");
398 #else
399 			errx(1,
400 "-b option ignored: SO_SNDBUF/SO_RCVBUF socket options not supported");
401 #endif
402 			break;
403 		case 'C':		/* vlan priority code point */
404 			pcp = strtol(optarg, &e, 10);
405 			if (*optarg == '\0' || *e != '\0')
406 				errx(1, "illegal vlan pcp %s", optarg);
407 			if (7 < pcp || pcp < -1)
408 				errx(1, "illegal vlan pcp -- %s", optarg);
409 			break;
410 		case 'c':
411 			npackets = strtol(optarg, &e, 10);
412 			if (npackets <= 0 || *optarg == '\0' || *e != '\0')
413 				errx(1,
414 				    "illegal number of packets -- %s", optarg);
415 			break;
416 		case 'D':
417 			options |= F_DONTFRAG;
418 			break;
419 		case 'd':
420 			options |= F_SO_DEBUG;
421 			break;
422 		case 'f':
423 			if (getuid()) {
424 				errno = EPERM;
425 				errx(1, "Must be superuser to flood ping");
426 			}
427 			options |= F_FLOOD;
428 			options |= F_DOT;
429 			setbuf(stdout, (char *)NULL);
430 			break;
431 		case 'e':
432 			gateway = optarg;
433 			break;
434 		case 'H':
435 			options |= F_HOSTNAME;
436 			break;
437 		case 'm':		/* hoplimit */
438 			hoplimit = strtol(optarg, &e, 10);
439 			if (*optarg == '\0' || *e != '\0')
440 				errx(1, "illegal hoplimit %s", optarg);
441 			if (255 < hoplimit || hoplimit < -1)
442 				errx(1,
443 				    "illegal hoplimit -- %s", optarg);
444 			break;
445 		case 'I':
446 			ifname = optarg;
447 			options |= F_INTERFACE;
448 #ifndef USE_SIN6_SCOPE_ID
449 			usepktinfo++;
450 #endif
451 			break;
452 		case 'i':		/* wait between sending packets */
453 			t = strtod(optarg, &e);
454 			if (*optarg == '\0' || *e != '\0')
455 				errx(1, "illegal timing interval %s", optarg);
456 			if (t < 1 && getuid()) {
457 				errx(1, "%s: only root may use interval < 1s",
458 				    strerror(EPERM));
459 			}
460 			intvl.tv_sec = (time_t)t;
461 			intvl.tv_nsec =
462 			    (long)((t - intvl.tv_sec) * 1000000000);
463 			if (intvl.tv_sec < 0)
464 				errx(1, "illegal timing interval %s", optarg);
465 			/* less than 1/hz does not make sense */
466 			if (intvl.tv_sec == 0 && intvl.tv_nsec < 1000) {
467 				warnx("too small interval, raised to .000001");
468 				intvl.tv_nsec = 1000;
469 			}
470 			options |= F_INTERVAL;
471 			break;
472 		case 'l':
473 			if (getuid()) {
474 				errno = EPERM;
475 				errx(1, "Must be superuser to preload");
476 			}
477 			preload = strtol(optarg, &e, 10);
478 			if (preload < 0 || *optarg == '\0' || *e != '\0')
479 				errx(1, "illegal preload value -- %s", optarg);
480 			break;
481 		case 'u':
482 #ifdef IPV6_USE_MIN_MTU
483 			mflag++;
484 			break;
485 #else
486 			errx(1, "-%c is not supported on this platform", ch);
487 			/*NOTREACHED*/
488 #endif
489 		case 'n':
490 			options &= ~F_HOSTNAME;
491 			break;
492 		case 'N':
493 			options |= F_NIGROUP;
494 			nig_oldmcprefix++;
495 			break;
496 		case 'o':
497 			options |= F_ONCE;
498 			break;
499 		case 'p':		/* fill buffer with user pattern */
500 			options |= F_PINGFILLED;
501 			fill((char *)datap, optarg);
502 				break;
503 		case 'q':
504 			options |= F_QUIET;
505 			break;
506 		case 'a':
507 			options |= F_AUDIBLE;
508 			break;
509 		case 'A':
510 			options |= F_MISSED;
511 			break;
512 		case 'S':
513 			memset(&hints, 0, sizeof(struct addrinfo));
514 			hints.ai_flags = AI_NUMERICHOST; /* allow hostname? */
515 			hints.ai_family = AF_INET6;
516 			hints.ai_socktype = SOCK_RAW;
517 			hints.ai_protocol = IPPROTO_ICMPV6;
518 
519 #ifdef __HAIKU__
520 #define cap_getaddrinfo(p1,p2,p3,p4,p5) getaddrinfo(p2,p3,p4,p5)
521 #endif
522 			error = cap_getaddrinfo(capdns, optarg, NULL, &hints, &res);
523 			if (error) {
524 				errx(1, "invalid source address: %s",
525 				     gai_strerror(error));
526 			}
527 			/*
528 			 * res->ai_family must be AF_INET6 and res->ai_addrlen
529 			 * must be sizeof(src).
530 			 */
531 			memcpy(&src, res->ai_addr, res->ai_addrlen);
532 			srclen = res->ai_addrlen;
533 			freeaddrinfo(res);
534 			options |= F_SRCADDR;
535 			break;
536 		case 's':		/* size of packet to send */
537 			datalen = strtol(optarg, &e, 10);
538 			if (datalen <= 0 || *optarg == '\0' || *e != '\0')
539 				errx(1, "illegal datalen value -- %s", optarg);
540 			if (datalen > MAXDATALEN) {
541 				errx(1,
542 				    "datalen value too large, maximum is %d",
543 				    MAXDATALEN);
544 			}
545 			break;
546 		case 'O':
547 			options &= ~F_NOUSERDATA;
548 			options |= F_SUPTYPES;
549 			break;
550 		case 'v':
551 			options |= F_VERBOSE;
552 			break;
553 		case 'y':
554 			options &= ~F_NOUSERDATA;
555 			options |= F_FQDN;
556 			break;
557 		case 'Y':
558 			options &= ~F_NOUSERDATA;
559 			options |= F_FQDNOLD;
560 			break;
561 		case 'W':
562 			t = strtod(optarg, &e);
563 			if (*e || e == optarg || t > (double)INT_MAX)
564 				errx(EX_USAGE, "invalid timing interval: `%s'",
565 				    optarg);
566 			options |= F_WAITTIME;
567 			waittime = (int)t;
568 			break;
569 		case 't':
570 			alarmtimeout = strtoul(optarg, &e, 0);
571 			if ((alarmtimeout < 1) || (alarmtimeout == ULONG_MAX))
572 				errx(EX_USAGE, "invalid timeout: `%s'",
573 				    optarg);
574 			if (alarmtimeout > MAXALARM)
575 				errx(EX_USAGE, "invalid timeout: `%s' > %d",
576 				    optarg, MAXALARM);
577 			{
578 				struct itimerval itv;
579 
580 				timerclear(&itv.it_interval);
581 				timerclear(&itv.it_value);
582 				itv.it_value.tv_sec = (time_t)alarmtimeout;
583 				if (setitimer(ITIMER_REAL, &itv, NULL) != 0)
584 					err(1, "setitimer");
585 			}
586 			break;
587 		case 'z':		/* traffic class */
588 			tclass = strtol(optarg, &e, 10);
589 			if (*optarg == '\0' || *e != '\0')
590 				errx(1, "illegal traffic class %s", optarg);
591 			if (255 < tclass || tclass < -1)
592 				errx(1,
593 				    "illegal traffic class -- %s", optarg);
594 			break;
595 #ifdef IPSEC
596 #ifdef IPSEC_POLICY_IPSEC
597 		case 'P':
598 			options |= F_POLICY;
599 			if (!strncmp("in", optarg, 2)) {
600 				if ((policy_in = strdup(optarg)) == NULL)
601 					errx(1, "strdup");
602 			} else if (!strncmp("out", optarg, 3)) {
603 				if ((policy_out = strdup(optarg)) == NULL)
604 					errx(1, "strdup");
605 			} else
606 				errx(1, "invalid security policy");
607 			break;
608 #else
609 		case 'Z':
610 			options |= F_AUTHHDR;
611 			break;
612 		case 'E':
613 			options |= F_ENCRYPT;
614 			break;
615 #endif /*IPSEC_POLICY_IPSEC*/
616 #endif /*IPSEC*/
617 		default:
618 			usage();
619 			/*NOTREACHED*/
620 		}
621 	}
622 
623 	argc -= optind;
624 	argv += optind;
625 
626 	if (argc < 1) {
627 		usage();
628 		/*NOTREACHED*/
629 	}
630 
631 #ifndef __HAIKU__
632 	if (argc > 1) {
633 #ifdef IPV6_RECVRTHDR	/* 2292bis */
634 		rthlen = CMSG_SPACE(inet6_rth_space(IPV6_RTHDR_TYPE_0,
635 		    argc - 1));
636 #else  /* RFC2292 */
637 		rthlen = inet6_rthdr_space(IPV6_RTHDR_TYPE_0, argc - 1);
638 #endif
639 		if (rthlen == 0) {
640 			errx(1, "too many intermediate hops");
641 			/*NOTREACHED*/
642 		}
643 		ip6optlen += rthlen;
644 	}
645 #endif
646 
647 #ifndef __HAIKU__
648 	if (options & F_NIGROUP) {
649 		target = nigroup(argv[argc - 1], nig_oldmcprefix);
650 		if (target == NULL) {
651 			usage();
652 			/*NOTREACHED*/
653 		}
654 	} else
655 #endif
656 		target = argv[argc - 1];
657 
658 	/* cap_getaddrinfo */
659 	memset(&hints, 0, sizeof(struct addrinfo));
660 	hints.ai_flags = AI_CANONNAME;
661 	hints.ai_family = AF_INET6;
662 	hints.ai_socktype = SOCK_RAW;
663 	hints.ai_protocol = IPPROTO_ICMPV6;
664 
665 	error = cap_getaddrinfo(capdns, target, NULL, &hints, &res);
666 	if (error)
667 		errx(EX_NOHOST, "cannot resolve %s: %s",
668 		    target, gai_strerror(error));
669 	if (res->ai_canonname)
670 		hostname = strdup(res->ai_canonname);
671 	else
672 		hostname = target;
673 
674 	if (!res->ai_addr)
675 		errx(EX_NOHOST, "cannot resolve %s", target);
676 
677 	(void)memcpy(&dst, res->ai_addr, res->ai_addrlen);
678 
679 	if ((ssend = socket(res->ai_family, res->ai_socktype,
680 	    res->ai_protocol)) < 0)
681 		err(1, "socket ssend");
682 	if ((srecv = socket(res->ai_family, res->ai_socktype,
683 	    res->ai_protocol)) < 0)
684 		err(1, "socket srecv");
685 	freeaddrinfo(res);
686 
687 	/* set the source address if specified. */
688 	if ((options & F_SRCADDR) != 0) {
689 		/* properly fill sin6_scope_id */
690 		if (IN6_IS_ADDR_LINKLOCAL(&src.sin6_addr) && (
691 		    IN6_IS_ADDR_LINKLOCAL(&dst.sin6_addr) ||
692 		    IN6_IS_ADDR_MC_LINKLOCAL(&dst.sin6_addr) ||
693 		    IN6_IS_ADDR_MC_NODELOCAL(&dst.sin6_addr))) {
694 			if (src.sin6_scope_id == 0)
695 				src.sin6_scope_id = dst.sin6_scope_id;
696 			if (dst.sin6_scope_id == 0)
697 				dst.sin6_scope_id = src.sin6_scope_id;
698 		}
699 		if (bind(ssend, (struct sockaddr *)&src, srclen) != 0)
700 			err(1, "bind");
701 	}
702 #ifndef __HAIKU__
703 	/* set the gateway (next hop) if specified */
704 	if (gateway) {
705 		memset(&hints, 0, sizeof(hints));
706 		hints.ai_family = AF_INET6;
707 		hints.ai_socktype = SOCK_RAW;
708 		hints.ai_protocol = IPPROTO_ICMPV6;
709 
710 		error = cap_getaddrinfo(capdns, gateway, NULL, &hints, &res);
711 		if (error) {
712 			errx(1, "cap_getaddrinfo for the gateway %s: %s",
713 			     gateway, gai_strerror(error));
714 		}
715 		if (res->ai_next && (options & F_VERBOSE))
716 			warnx("gateway resolves to multiple addresses");
717 
718 		if (setsockopt(ssend, IPPROTO_IPV6, IPV6_NEXTHOP,
719 		    res->ai_addr, res->ai_addrlen)) {
720 			err(1, "setsockopt(IPV6_NEXTHOP)");
721 		}
722 
723 		freeaddrinfo(res);
724 	}
725 #endif
726 
727 	/*
728 	 * let the kernel pass extension headers of incoming packets,
729 	 * for privileged socket options
730 	 */
731 	if ((options & F_VERBOSE) != 0) {
732 		int opton = 1;
733 
734 #ifdef IPV6_RECVHOPOPTS
735 		if (setsockopt(srecv, IPPROTO_IPV6, IPV6_RECVHOPOPTS, &opton,
736 		    sizeof(opton)))
737 			err(1, "setsockopt(IPV6_RECVHOPOPTS)");
738 #else  /* old adv. API */
739 		if (setsockopt(srecv, IPPROTO_IPV6, IPV6_HOPOPTS, &opton,
740 		    sizeof(opton)))
741 			err(1, "setsockopt(IPV6_HOPOPTS)");
742 #endif
743 #ifdef IPV6_RECVDSTOPTS
744 		if (setsockopt(srecv, IPPROTO_IPV6, IPV6_RECVDSTOPTS, &opton,
745 		    sizeof(opton)))
746 			err(1, "setsockopt(IPV6_RECVDSTOPTS)");
747 #else  /* old adv. API */
748 		if (setsockopt(srecv, IPPROTO_IPV6, IPV6_DSTOPTS, &opton,
749 		    sizeof(opton)))
750 			err(1, "setsockopt(IPV6_DSTOPTS)");
751 #endif
752 #ifdef IPV6_RECVRTHDRDSTOPTS
753 		if (setsockopt(srecv, IPPROTO_IPV6, IPV6_RECVRTHDRDSTOPTS, &opton,
754 		    sizeof(opton)))
755 			err(1, "setsockopt(IPV6_RECVRTHDRDSTOPTS)");
756 #endif
757 	}
758 
759 	/* revoke root privilege */
760 	if (seteuid(getuid()) != 0)
761 		err(1, "seteuid() failed");
762 	if (setuid(getuid()) != 0)
763 		err(1, "setuid() failed");
764 
765 	if ((options & F_FLOOD) && (options & F_INTERVAL))
766 		errx(1, "-f and -i incompatible options");
767 
768 	if ((options & F_NOUSERDATA) == 0) {
769 		if (datalen >= sizeof(struct tv32)) {
770 			/* we can time transfer */
771 			timing = 1;
772 		} else
773 			timing = 0;
774 		/* in F_VERBOSE case, we may get non-echoreply packets*/
775 		if (options & F_VERBOSE)
776 			packlen = 2048 + IP6LEN + ICMP6ECHOLEN + EXTRA;
777 		else
778 			packlen = datalen + IP6LEN + ICMP6ECHOLEN + EXTRA;
779 	} else {
780 		/* suppress timing for node information query */
781 		timing = 0;
782 		datalen = 2048;
783 		packlen = 2048 + IP6LEN + ICMP6ECHOLEN + EXTRA;
784 	}
785 
786 	if (!(packet = (u_char *)malloc((u_int)packlen)))
787 		err(1, "Unable to allocate packet");
788 	if (!(options & F_PINGFILLED))
789 		for (i = ICMP6ECHOLEN; i < packlen; ++i)
790 			*datap++ = i;
791 
792 	ident = getpid() & 0xFFFF;
793 	arc4random_buf(nonce, sizeof(nonce));
794 	optval = 1;
795 #ifndef __HAIKU__
796 	if (options & F_DONTFRAG)
797 		if (setsockopt(ssend, IPPROTO_IPV6, IPV6_DONTFRAG,
798 		    &optval, sizeof(optval)) == -1)
799 			err(1, "IPV6_DONTFRAG");
800 #endif
801 	hold = 1;
802 
803 	if (options & F_SO_DEBUG) {
804 		(void)setsockopt(ssend, SOL_SOCKET, SO_DEBUG, (char *)&hold,
805 		    sizeof(hold));
806 		(void)setsockopt(srecv, SOL_SOCKET, SO_DEBUG, (char *)&hold,
807 		    sizeof(hold));
808 	}
809 	optval = IPV6_DEFHLIM;
810 	if (IN6_IS_ADDR_MULTICAST(&dst.sin6_addr))
811 		if (setsockopt(ssend, IPPROTO_IPV6, IPV6_MULTICAST_HOPS,
812 		    &optval, sizeof(optval)) == -1)
813 			err(1, "IPV6_MULTICAST_HOPS");
814 #ifdef IPV6_USE_MIN_MTU
815 	if (mflag != 1) {
816 		optval = mflag > 1 ? 0 : 1;
817 
818 		if (setsockopt(ssend, IPPROTO_IPV6, IPV6_USE_MIN_MTU,
819 		    &optval, sizeof(optval)) == -1)
820 			err(1, "setsockopt(IPV6_USE_MIN_MTU)");
821 	}
822 #ifdef IPV6_RECVPATHMTU
823 	else {
824 		optval = 1;
825 		if (setsockopt(srecv, IPPROTO_IPV6, IPV6_RECVPATHMTU,
826 		    &optval, sizeof(optval)) == -1)
827 			err(1, "setsockopt(IPV6_RECVPATHMTU)");
828 	}
829 #endif /* IPV6_RECVPATHMTU */
830 #endif /* IPV6_USE_MIN_MTU */
831 
832 #ifdef IPSEC
833 #ifdef IPSEC_POLICY_IPSEC
834 	if (options & F_POLICY) {
835 		if (setpolicy(srecv, policy_in) < 0)
836 			errx(1, "%s", ipsec_strerror());
837 		if (setpolicy(ssend, policy_out) < 0)
838 			errx(1, "%s", ipsec_strerror());
839 	}
840 #else
841 	if (options & F_AUTHHDR) {
842 		optval = IPSEC_LEVEL_REQUIRE;
843 #ifdef IPV6_AUTH_TRANS_LEVEL
844 		if (setsockopt(ssend, IPPROTO_IPV6, IPV6_AUTH_TRANS_LEVEL,
845 		    &optval, sizeof(optval)) == -1)
846 			err(1, "setsockopt(IPV6_AUTH_TRANS_LEVEL)");
847 		if (setsockopt(srecv, IPPROTO_IPV6, IPV6_AUTH_TRANS_LEVEL,
848 		     &optval, sizeof(optval)) == -1)
849 			err(1, "setsockopt(IPV6_AUTH_TRANS_LEVEL)");
850 #else /* old def */
851 		if (setsockopt(ssend, IPPROTO_IPV6, IPV6_AUTH_LEVEL,
852 		    &optval, sizeof(optval)) == -1)
853 			err(1, "setsockopt(IPV6_AUTH_LEVEL)");
854 		if (setsockopt(srecv, IPPROTO_IPV6, IPV6_AUTH_LEVEL,
855 		    &optval, sizeof(optval)) == -1)
856 			err(1, "setsockopt(IPV6_AUTH_LEVEL)");
857 #endif
858 	}
859 	if (options & F_ENCRYPT) {
860 		optval = IPSEC_LEVEL_REQUIRE;
861 		if (setsockopt(ssend, IPPROTO_IPV6, IPV6_ESP_TRANS_LEVEL,
862 		    &optval, sizeof(optval)) == -1)
863 			err(1, "setsockopt(IPV6_ESP_TRANS_LEVEL)");
864 		if (setsockopt(srecv, IPPROTO_IPV6, IPV6_ESP_TRANS_LEVEL,
865 		    &optval, sizeof(optval)) == -1)
866 			err(1, "setsockopt(IPV6_ESP_TRANS_LEVEL)");
867 	}
868 #endif /*IPSEC_POLICY_IPSEC*/
869 #endif
870 
871 #ifdef ICMP6_FILTER
872     {
873 	struct icmp6_filter filt;
874 	if (!(options & F_VERBOSE)) {
875 		ICMP6_FILTER_SETBLOCKALL(&filt);
876 		if ((options & F_FQDN) || (options & F_FQDNOLD) ||
877 		    (options & F_NODEADDR) || (options & F_SUPTYPES))
878 			ICMP6_FILTER_SETPASS(ICMP6_NI_REPLY, &filt);
879 		else
880 			ICMP6_FILTER_SETPASS(ICMP6_ECHO_REPLY, &filt);
881 	} else {
882 		ICMP6_FILTER_SETPASSALL(&filt);
883 	}
884 	if (setsockopt(srecv, IPPROTO_ICMPV6, ICMP6_FILTER, &filt,
885 	    sizeof(filt)) < 0)
886 		err(1, "setsockopt(ICMP6_FILTER)");
887     }
888 #endif /*ICMP6_FILTER*/
889 
890 	/* let the kernel pass extension headers of incoming packets */
891 	if ((options & F_VERBOSE) != 0) {
892 		int opton = 1;
893 
894 #ifdef IPV6_RECVRTHDR
895 		if (setsockopt(srecv, IPPROTO_IPV6, IPV6_RECVRTHDR, &opton,
896 		    sizeof(opton)))
897 			err(1, "setsockopt(IPV6_RECVRTHDR)");
898 #else  /* old adv. API */
899 		if (setsockopt(srecv, IPPROTO_IPV6, IPV6_RTHDR, &opton,
900 		    sizeof(opton)))
901 			err(1, "setsockopt(IPV6_RTHDR)");
902 #endif
903 	}
904 
905 /*
906 	optval = 1;
907 	if (IN6_IS_ADDR_MULTICAST(&dst.sin6_addr))
908 		if (setsockopt(ssend, IPPROTO_IPV6, IPV6_MULTICAST_LOOP,
909 		    &optval, sizeof(optval)) == -1)
910 			err(1, "IPV6_MULTICAST_LOOP");
911 */
912 
913 	/* Specify the outgoing interface and/or the source address */
914 	if (usepktinfo)
915 		ip6optlen += CMSG_SPACE(sizeof(struct in6_pktinfo));
916 
917 	if (hoplimit != -1)
918 		ip6optlen += CMSG_SPACE(sizeof(int));
919 
920 	/* set IP6 packet options */
921 	if (ip6optlen) {
922 		if ((scmsg = (char *)malloc(ip6optlen)) == NULL)
923 			errx(1, "can't allocate enough memory");
924 		smsghdr.msg_control = (caddr_t)scmsg;
925 		smsghdr.msg_controllen = ip6optlen;
926 		scmsgp = CMSG_FIRSTHDR(&smsghdr);
927 	}
928 	if (usepktinfo) {
929 		cmsg_pktinfo = CMSG_DATA(scmsgp);
930 		scmsgp->cmsg_len = CMSG_LEN(sizeof(struct in6_pktinfo));
931 		scmsgp->cmsg_level = IPPROTO_IPV6;
932 		scmsgp->cmsg_type = IPV6_PKTINFO;
933 		scmsgp = CMSG_NXTHDR(&smsghdr, scmsgp);
934 	}
935 
936 	/* set the outgoing interface */
937 	if (ifname) {
938 #ifndef USE_SIN6_SCOPE_ID
939 		/* pktinfo must have already been allocated */
940 		if ((pktinfo.ipi6_ifindex = if_nametoindex(ifname)) == 0)
941 			errx(1, "%s: invalid interface name", ifname);
942 #else
943 		if ((dst.sin6_scope_id = if_nametoindex(ifname)) == 0)
944 			errx(1, "%s: invalid interface name", ifname);
945 #endif
946 	}
947 	if (hoplimit != -1) {
948 		scmsgp->cmsg_len = CMSG_LEN(sizeof(int));
949 		scmsgp->cmsg_level = IPPROTO_IPV6;
950 		scmsgp->cmsg_type = IPV6_HOPLIMIT;
951 		memcpy(CMSG_DATA(scmsgp), &hoplimit, sizeof(hoplimit));
952 
953 		scmsgp = CMSG_NXTHDR(&smsghdr, scmsgp);
954 	}
955 
956 #ifndef __HAIKU__
957 	if (tclass != -1) {
958 		if (setsockopt(ssend, IPPROTO_IPV6, IPV6_TCLASS,
959 		    &tclass, sizeof(tclass)) == -1)
960 			err(1, "setsockopt(IPV6_TCLASS)");
961 	}
962 
963 	if (pcp != -2) {
964 		if (setsockopt(ssend, IPPROTO_IPV6, IPV6_VLAN_PCP,
965 		    &pcp, sizeof(pcp)) == -1)
966 			err(1, "setsockopt(IPV6_VLAN_PCP)");
967 	}
968 
969 	if (argc > 1) {	/* some intermediate addrs are specified */
970 		int hops;
971 		int rthdrlen;
972 
973 		rthdrlen = inet6_rth_space(IPV6_RTHDR_TYPE_0, argc - 1);
974 		scmsgp->cmsg_len = CMSG_LEN(rthdrlen);
975 		scmsgp->cmsg_level = IPPROTO_IPV6;
976 		scmsgp->cmsg_type = IPV6_RTHDR;
977 		rthdr = (struct ip6_rthdr *)CMSG_DATA(scmsgp);
978 		rthdr = inet6_rth_init((void *)rthdr, rthdrlen,
979 		    IPV6_RTHDR_TYPE_0, argc - 1);
980 		if (rthdr == NULL)
981 			errx(1, "can't initialize rthdr");
982 
983 		for (hops = 0; hops < argc - 1; hops++) {
984 			memset(&hints, 0, sizeof(hints));
985 			hints.ai_family = AF_INET6;
986 
987 			if ((error = cap_getaddrinfo(capdns, argv[hops], NULL, &hints,
988 			    &res)))
989 				errx(1, "%s", gai_strerror(error));
990 			if (res->ai_addr->sa_family != AF_INET6)
991 				errx(1,
992 				    "bad addr family of an intermediate addr");
993 			sin6 = (struct sockaddr_in6 *)(void *)res->ai_addr;
994 			if (inet6_rth_add(rthdr, &sin6->sin6_addr))
995 				errx(1, "can't add an intermediate node");
996 			freeaddrinfo(res);
997 		}
998 
999 		scmsgp = CMSG_NXTHDR(&smsghdr, scmsgp);
1000 	}
1001 #endif
1002 
1003 	/* From now on we will use only reverse DNS lookups. */
1004 #ifdef WITH_CASPER
1005 	if (capdns != NULL) {
1006 		const char *types[1];
1007 
1008 		types[0] = "ADDR2NAME";
1009 		if (cap_dns_type_limit(capdns, types, nitems(types)) < 0)
1010 			err(1, "unable to limit access to system.dns service");
1011 	}
1012 #endif
1013 	if (!(options & F_SRCADDR)) {
1014 		/*
1015 		 * get the source address. XXX since we revoked the root
1016 		 * privilege, we cannot use a raw socket for this.
1017 		 */
1018 		int dummy;
1019 		socklen_t len = sizeof(src);
1020 
1021 		if ((dummy = socket(AF_INET6, SOCK_DGRAM, 0)) < 0)
1022 			err(1, "UDP socket");
1023 
1024 		src.sin6_family = AF_INET6;
1025 		src.sin6_addr = dst.sin6_addr;
1026 		src.sin6_port = ntohs(DUMMY_PORT);
1027 		src.sin6_scope_id = dst.sin6_scope_id;
1028 
1029 		if (usepktinfo &&
1030 		    setsockopt(dummy, IPPROTO_IPV6, IPV6_PKTINFO,
1031 		    (void *)&pktinfo, sizeof(pktinfo)))
1032 			err(1, "UDP setsockopt(IPV6_PKTINFO)");
1033 
1034 		if (hoplimit != -1 &&
1035 		    setsockopt(dummy, IPPROTO_IPV6, IPV6_UNICAST_HOPS,
1036 		    (void *)&hoplimit, sizeof(hoplimit)))
1037 			err(1, "UDP setsockopt(IPV6_UNICAST_HOPS)");
1038 
1039 		if (hoplimit != -1 &&
1040 		    setsockopt(dummy, IPPROTO_IPV6, IPV6_MULTICAST_HOPS,
1041 		    (void *)&hoplimit, sizeof(hoplimit)))
1042 			err(1, "UDP setsockopt(IPV6_MULTICAST_HOPS)");
1043 
1044 		if (rthdr &&
1045 		    setsockopt(dummy, IPPROTO_IPV6, IPV6_RTHDR,
1046 		    (void *)rthdr, (rthdr->ip6r_len + 1) << 3))
1047 			err(1, "UDP setsockopt(IPV6_RTHDR)");
1048 
1049 		if (connect(dummy, (struct sockaddr *)&src, len) < 0)
1050 			err(1, "UDP connect");
1051 
1052 		if (getsockname(dummy, (struct sockaddr *)&src, &len) < 0)
1053 			err(1, "getsockname");
1054 
1055 		close(dummy);
1056 	}
1057 
1058 	/* Save pktinfo in the ancillary data. */
1059 	if (usepktinfo)
1060 		memcpy(cmsg_pktinfo, &pktinfo, sizeof(pktinfo));
1061 
1062 	if (connect(ssend, (struct sockaddr *)&dst, sizeof(dst)) != 0)
1063 		err(1, "connect() ssend");
1064 
1065 #ifndef __HAIKU__
1066 	caph_cache_catpages();
1067 	if (caph_enter_casper() < 0)
1068 		err(1, "caph_enter_casper");
1069 
1070 	cap_rights_init(&rights_stdin);
1071 	if (caph_rights_limit(STDIN_FILENO, &rights_stdin) < 0)
1072 		err(1, "caph_rights_limit stdin");
1073 	if (caph_limit_stdout() < 0)
1074 		err(1, "caph_limit_stdout");
1075 	if (caph_limit_stderr() < 0)
1076 		err(1, "caph_limit_stderr");
1077 
1078 	cap_rights_init(&rights_srecv, CAP_RECV, CAP_EVENT, CAP_SETSOCKOPT);
1079 	if (caph_rights_limit(srecv, &rights_srecv) < 0)
1080 		err(1, "caph_rights_limit srecv");
1081 	cap_rights_init(&rights_ssend, CAP_SEND, CAP_SETSOCKOPT);
1082 	if (caph_rights_limit(ssend, &rights_ssend) < 0)
1083 		err(1, "caph_rights_limit ssend");
1084 #endif
1085 
1086 #if defined(SO_SNDBUF) && defined(SO_RCVBUF)
1087 	if (sockbufsize) {
1088 		if (datalen > (size_t)sockbufsize)
1089 			warnx("you need -b to increase socket buffer size");
1090 		if (setsockopt(ssend, SOL_SOCKET, SO_SNDBUF, &sockbufsize,
1091 		    sizeof(sockbufsize)) < 0)
1092 			err(1, "setsockopt(SO_SNDBUF)");
1093 		if (setsockopt(srecv, SOL_SOCKET, SO_RCVBUF, &sockbufsize,
1094 		    sizeof(sockbufsize)) < 0)
1095 			err(1, "setsockopt(SO_RCVBUF)");
1096 	}
1097 	else {
1098 		if (datalen > 8 * 1024)	/*XXX*/
1099 			warnx("you need -b to increase socket buffer size");
1100 		/*
1101 		 * When pinging the broadcast address, you can get a lot of
1102 		 * answers. Doing something so evil is useful if you are trying
1103 		 * to stress the ethernet, or just want to fill the arp cache
1104 		 * to get some stuff for /etc/ethers.
1105 		 */
1106 		hold = 48 * 1024;
1107 		setsockopt(srecv, SOL_SOCKET, SO_RCVBUF, (char *)&hold,
1108 		    sizeof(hold));
1109 	}
1110 #endif
1111 
1112 	optval = 1;
1113 #ifndef USE_SIN6_SCOPE_ID
1114 #ifdef IPV6_RECVPKTINFO
1115 	if (setsockopt(srecv, IPPROTO_IPV6, IPV6_RECVPKTINFO, &optval,
1116 	    sizeof(optval)) < 0)
1117 		warn("setsockopt(IPV6_RECVPKTINFO)"); /* XXX err? */
1118 #else  /* old adv. API */
1119 	if (setsockopt(srecv, IPPROTO_IPV6, IPV6_PKTINFO, &optval,
1120 	    sizeof(optval)) < 0)
1121 		warn("setsockopt(IPV6_PKTINFO)"); /* XXX err? */
1122 #endif
1123 #endif /* USE_SIN6_SCOPE_ID */
1124 #ifdef IPV6_RECVHOPLIMIT
1125 	if (setsockopt(srecv, IPPROTO_IPV6, IPV6_RECVHOPLIMIT, &optval,
1126 	    sizeof(optval)) < 0)
1127 		warn("setsockopt(IPV6_RECVHOPLIMIT)"); /* XXX err? */
1128 #else  /* old adv. API */
1129 	if (setsockopt(srecv, IPPROTO_IPV6, IPV6_HOPLIMIT, &optval,
1130 	    sizeof(optval)) < 0)
1131 		warn("setsockopt(IPV6_HOPLIMIT)"); /* XXX err? */
1132 #endif
1133 
1134 #ifndef __HAIKU__
1135 	cap_rights_clear(&rights_srecv, CAP_SETSOCKOPT);
1136 	if (caph_rights_limit(srecv, &rights_srecv) < 0)
1137 		err(1, "caph_rights_limit srecv setsockopt");
1138 	cap_rights_clear(&rights_ssend, CAP_SETSOCKOPT);
1139 	if (caph_rights_limit(ssend, &rights_ssend) < 0)
1140 		err(1, "caph_rights_limit ssend setsockopt");
1141 #endif
1142 
1143 	printf("PING(%lu=40+8+%lu bytes) ", (unsigned long)(40 + pingerlen()),
1144 	    (unsigned long)(pingerlen() - 8));
1145 	printf("%s --> ", pr_addr((struct sockaddr *)&src, sizeof(src)));
1146 	printf("%s\n", pr_addr((struct sockaddr *)&dst, sizeof(dst)));
1147 
1148 	if (preload == 0)
1149 		pinger();
1150 	else {
1151 		if (npackets != 0 && preload > npackets)
1152 			preload = npackets;
1153 		while (preload--)
1154 			pinger();
1155 	}
1156 	clock_gettime(CLOCK_MONOTONIC, &last);
1157 
1158 	sigemptyset(&si_sa.sa_mask);
1159 	si_sa.sa_flags = 0;
1160 	si_sa.sa_handler = onsignal;
1161 	if (sigaction(SIGINT, &si_sa, 0) == -1)
1162 		err(EX_OSERR, "sigaction SIGINT");
1163 	seenint = 0;
1164 #ifndef __HAIKU__
1165 	if (sigaction(SIGINFO, &si_sa, 0) == -1)
1166 		err(EX_OSERR, "sigaction SIGINFO");
1167 	seeninfo = 0;
1168 #endif
1169 	if (alarmtimeout > 0) {
1170 		if (sigaction(SIGALRM, &si_sa, 0) == -1)
1171 			err(EX_OSERR, "sigaction SIGALRM");
1172 	}
1173 	if (options & F_FLOOD) {
1174 		intvl.tv_sec = 0;
1175 		intvl.tv_nsec = 10000000;
1176 	}
1177 
1178 	almost_done = 0;
1179 	while (seenint == 0) {
1180 		struct timespec now, timeout;
1181 		struct msghdr m;
1182 		struct iovec iov[2];
1183 		fd_set rfds;
1184 		int n;
1185 
1186 		/* signal handling */
1187 		if (seeninfo) {
1188 			pr_summary(stderr);
1189 			seeninfo = 0;
1190 			continue;
1191 		}
1192 		FD_ZERO(&rfds);
1193 		FD_SET(srecv, &rfds);
1194 		clock_gettime(CLOCK_MONOTONIC, &now);
1195 		timespecadd(&last, &intvl, &timeout);
1196 		timespecsub(&timeout, &now, &timeout);
1197 		if (timeout.tv_sec < 0)
1198 			timespecclear(&timeout);
1199 
1200 		n = pselect(srecv + 1, &rfds, NULL, NULL, &timeout, NULL);
1201 		if (n < 0)
1202 			continue;	/* EINTR */
1203 		if (n == 1) {
1204 			m.msg_name = (caddr_t)&from;
1205 			m.msg_namelen = sizeof(from);
1206 			memset(&iov, 0, sizeof(iov));
1207 			iov[0].iov_base = (caddr_t)packet;
1208 			iov[0].iov_len = packlen;
1209 			m.msg_iov = iov;
1210 			m.msg_iovlen = 1;
1211 			memset(cm, 0, CONTROLLEN);
1212 			m.msg_control = (void *)cm;
1213 			m.msg_controllen = CONTROLLEN;
1214 
1215 			cc = recvmsg(srecv, &m, 0);
1216 			if (cc < 0) {
1217 				if (errno != EINTR) {
1218 					warn("recvmsg");
1219 					sleep(1);
1220 				}
1221 				continue;
1222 			} else if (cc == 0) {
1223 				int mtu;
1224 
1225 				/*
1226 				 * receive control messages only. Process the
1227 				 * exceptions (currently the only possibility is
1228 				 * a path MTU notification.)
1229 				 */
1230 				if ((mtu = get_pathmtu(&m)) > 0) {
1231 					if ((options & F_VERBOSE) != 0) {
1232 						printf("new path MTU (%d) is "
1233 						    "notified\n", mtu);
1234 					}
1235 				}
1236 				continue;
1237 			} else {
1238 				/*
1239 				 * an ICMPv6 message (probably an echoreply)
1240 				 * arrived.
1241 				 */
1242 				pr_pack(packet, cc, &m);
1243 			}
1244 			if (((options & F_ONCE) != 0 && nreceived > 0) ||
1245 			    (npackets > 0 && nreceived >= npackets))
1246 				break;
1247 		}
1248 		if (n == 0 || (options & F_FLOOD)) {
1249 			if (npackets == 0 || ntransmitted < npackets)
1250 				pinger();
1251 			else {
1252 				if (almost_done)
1253 					break;
1254 				almost_done = 1;
1255 				/*
1256 				 * If we're not transmitting any more packets,
1257 				 * change the timer to wait two round-trip times
1258 				 * if we've received any packets or (waittime)
1259 				 * milliseconds if we haven't.
1260 				 */
1261 				intvl.tv_nsec = 0;
1262 				if (nreceived) {
1263 					intvl.tv_sec = 2 * tmax / 1000;
1264 					if (intvl.tv_sec == 0)
1265 						intvl.tv_sec = 1;
1266 				} else {
1267 					intvl.tv_sec = waittime / 1000;
1268 					intvl.tv_nsec =
1269 					    waittime % 1000 * 1000000;
1270 				}
1271 			}
1272 			clock_gettime(CLOCK_MONOTONIC, &last);
1273 			if (ntransmitted - nreceived - 1 > nmissedmax) {
1274 				nmissedmax = ntransmitted - nreceived - 1;
1275 				if (options & F_MISSED)
1276 					(void)write(STDOUT_FILENO, &BBELL, 1);
1277 			}
1278 		}
1279 	}
1280 	sigemptyset(&si_sa.sa_mask);
1281 	si_sa.sa_flags = 0;
1282 	si_sa.sa_handler = SIG_IGN;
1283 	sigaction(SIGINT, &si_sa, 0);
1284 	sigaction(SIGALRM, &si_sa, 0);
1285 	pr_summary(stdout);
1286 
1287         if(packet != NULL)
1288                 free(packet);
1289 
1290 	if (nreceived > 0)
1291 		exit(0);
1292 	else if (ntransmitted > ntransmitfailures)
1293 		exit(2);
1294 	else
1295 		exit(EX_OSERR);
1296 }
1297 
1298 /*
1299  * pinger --
1300  *	Compose and transmit an ICMP ECHO REQUEST packet.  The IP packet
1301  * will be added on by the kernel.  The ID field is our UNIX process ID,
1302  * and the sequence number is an ascending integer.  The first 8 bytes
1303  * of the data portion are used to hold a UNIX "timespec" struct in VAX
1304  * byte-order, to compute the round-trip time.
1305  */
1306 static size_t
pingerlen(void)1307 pingerlen(void)
1308 {
1309 	size_t l;
1310 
1311 	if (options & F_FQDN)
1312 		l = ICMP6_NIQLEN + sizeof(dst.sin6_addr);
1313 	else if (options & F_FQDNOLD)
1314 		l = ICMP6_NIQLEN;
1315 	else if (options & F_NODEADDR)
1316 		l = ICMP6_NIQLEN + sizeof(dst.sin6_addr);
1317 	else if (options & F_SUPTYPES)
1318 		l = ICMP6_NIQLEN;
1319 	else
1320 		l = ICMP6ECHOLEN + datalen;
1321 
1322 	return l;
1323 }
1324 
1325 static int
pinger(void)1326 pinger(void)
1327 {
1328 	struct icmp6_hdr *icp;
1329 	struct iovec iov[2];
1330 	int i, cc;
1331 	struct icmp6_nodeinfo *nip;
1332 	uint16_t seq;
1333 
1334 	if (npackets && ntransmitted >= npackets)
1335 		return(-1);	/* no more transmission */
1336 
1337 	icp = (struct icmp6_hdr *)outpack;
1338 	nip = (struct icmp6_nodeinfo *)outpack;
1339 	memset(icp, 0, sizeof(*icp));
1340 	icp->icmp6_cksum = 0;
1341 	seq = ntransmitted++;
1342 	CLR(seq % mx_dup_ck);
1343 
1344 	if (options & F_FQDN) {
1345 		uint16_t s;
1346 
1347 		icp->icmp6_type = ICMP6_NI_QUERY;
1348 		icp->icmp6_code = ICMP6_NI_SUBJ_IPV6;
1349 		nip->ni_qtype = htons(NI_QTYPE_FQDN);
1350 		nip->ni_flags = htons(0);
1351 
1352 		memcpy(nip->icmp6_ni_nonce, nonce,
1353 		    sizeof(nip->icmp6_ni_nonce));
1354 		s = htons(seq);
1355 		memcpy(nip->icmp6_ni_nonce, &s, sizeof(s));
1356 
1357 		memcpy(&outpack[ICMP6_NIQLEN], &dst.sin6_addr,
1358 		    sizeof(dst.sin6_addr));
1359 		cc = ICMP6_NIQLEN + sizeof(dst.sin6_addr);
1360 		datalen = 0;
1361 	} else if (options & F_FQDNOLD) {
1362 		uint16_t s;
1363 		/* packet format in 03 draft - no Subject data on queries */
1364 		icp->icmp6_type = ICMP6_NI_QUERY;
1365 		icp->icmp6_code = 0;	/* code field is always 0 */
1366 		nip->ni_qtype = htons(NI_QTYPE_FQDN);
1367 		nip->ni_flags = htons(0);
1368 
1369 		memcpy(nip->icmp6_ni_nonce, nonce,
1370 		    sizeof(nip->icmp6_ni_nonce));
1371 		s = htons(seq);
1372 		memcpy(nip->icmp6_ni_nonce, &s, sizeof(s));
1373 
1374 		cc = ICMP6_NIQLEN;
1375 		datalen = 0;
1376 	} else if (options & F_NODEADDR) {
1377 		uint16_t s;
1378 
1379 		icp->icmp6_type = ICMP6_NI_QUERY;
1380 		icp->icmp6_code = ICMP6_NI_SUBJ_IPV6;
1381 		nip->ni_qtype = htons(NI_QTYPE_NODEADDR);
1382 		nip->ni_flags = naflags;
1383 
1384 		memcpy(nip->icmp6_ni_nonce, nonce,
1385 		    sizeof(nip->icmp6_ni_nonce));
1386 		s = htons(seq);
1387 		memcpy(nip->icmp6_ni_nonce, &s, sizeof(s));
1388 
1389 		memcpy(&outpack[ICMP6_NIQLEN], &dst.sin6_addr,
1390 		    sizeof(dst.sin6_addr));
1391 		cc = ICMP6_NIQLEN + sizeof(dst.sin6_addr);
1392 		datalen = 0;
1393 	} else if (options & F_SUPTYPES) {
1394 		uint16_t s;
1395 
1396 		icp->icmp6_type = ICMP6_NI_QUERY;
1397 		icp->icmp6_code = ICMP6_NI_SUBJ_FQDN;	/*empty*/
1398 		nip->ni_qtype = htons(NI_QTYPE_SUPTYPES);
1399 		/* we support compressed bitmap */
1400 		nip->ni_flags = NI_SUPTYPE_FLAG_COMPRESS;
1401 
1402 		memcpy(nip->icmp6_ni_nonce, nonce,
1403 		    sizeof(nip->icmp6_ni_nonce));
1404 		s = htons(seq);
1405 		memcpy(nip->icmp6_ni_nonce, &s, sizeof(s));
1406 
1407 		cc = ICMP6_NIQLEN;
1408 		datalen = 0;
1409 	} else {
1410 		icp->icmp6_type = ICMP6_ECHO_REQUEST;
1411 		icp->icmp6_code = 0;
1412 		icp->icmp6_id = htons(ident);
1413 		icp->icmp6_seq = htons(seq);
1414 		if (timing) {
1415 			struct timespec tv;
1416 			struct tv32 tv32;
1417 			(void)clock_gettime(CLOCK_MONOTONIC, &tv);
1418 			/*
1419 			 * Truncate seconds down to 32 bits in order
1420 			 * to fit the timestamp within 8 bytes of the
1421 			 * packet. We're only concerned with
1422 			 * durations, not absolute times.
1423 			 */
1424 			tv32.tv32_sec = (uint32_t)htonl(tv.tv_sec);
1425 			tv32.tv32_nsec = (uint32_t)htonl(tv.tv_nsec);
1426 			memcpy(&outpack[ICMP6ECHOLEN], &tv32, sizeof(tv32));
1427 		}
1428 		cc = ICMP6ECHOLEN + datalen;
1429 	}
1430 
1431 #ifdef DIAGNOSTIC
1432 	if (pingerlen() != cc)
1433 		errx(1, "internal error; length mismatch");
1434 #endif
1435 
1436 	memset(&iov, 0, sizeof(iov));
1437 	iov[0].iov_base = (caddr_t)outpack;
1438 	iov[0].iov_len = cc;
1439 	smsghdr.msg_iov = iov;
1440 	smsghdr.msg_iovlen = 1;
1441 
1442 	i = sendmsg(ssend, &smsghdr, 0);
1443 
1444 	if (i < 0 || i != cc)  {
1445 		if (i < 0) {
1446 			ntransmitfailures++;
1447 			warn("sendmsg");
1448 		}
1449 		(void)printf("ping: wrote %s %d chars, ret=%d\n",
1450 		    hostname, cc, i);
1451 	}
1452 	if (!(options & F_QUIET) && options & F_DOT)
1453 		(void)write(STDOUT_FILENO, &DOT[DOTidx++ % DOTlen], 1);
1454 
1455 	return(0);
1456 }
1457 
1458 static int
myechoreply(const struct icmp6_hdr * icp)1459 myechoreply(const struct icmp6_hdr *icp)
1460 {
1461 	if (ntohs(icp->icmp6_id) == ident)
1462 		return 1;
1463 	else
1464 		return 0;
1465 }
1466 
1467 static int
mynireply(const struct icmp6_nodeinfo * nip)1468 mynireply(const struct icmp6_nodeinfo *nip)
1469 {
1470 	if (memcmp(nip->icmp6_ni_nonce + sizeof(u_int16_t),
1471 	    nonce + sizeof(u_int16_t),
1472 	    sizeof(nonce) - sizeof(u_int16_t)) == 0)
1473 		return 1;
1474 	else
1475 		return 0;
1476 }
1477 
1478 /*
1479  * Decode a name from a DNS message.
1480  *
1481  * Format of the message is described in RFC 1035 subsection 4.1.4.
1482  *
1483  * Arguments:
1484  *   sp     - Pointer to a DNS pointer octet or to the first octet of a label
1485  *            in the message.
1486  *   ep     - Pointer to the end of the message (one step past the last octet).
1487  *   base   - Pointer to the beginning of the message.
1488  *   buf    - Buffer into which the decoded name will be saved.
1489  *   bufsiz - Size of the buffer 'buf'.
1490  *
1491  * Return value:
1492  *   Pointer to an octet immediately following the ending zero octet
1493  *   of the decoded label, or NULL if an error occurred.
1494  */
1495 static const char *
dnsdecode(const u_char * sp,const u_char * ep,const u_char * base,char * buf,size_t bufsiz)1496 dnsdecode(const u_char *sp, const u_char *ep, const u_char *base, char *buf,
1497 	size_t bufsiz)
1498 {
1499 	int i;
1500 	const u_char *cp;
1501 	char cresult[MAXDNAME + 1];
1502 	const u_char *comp;
1503 	int l;
1504 
1505 	cp = sp;
1506 	*buf = '\0';
1507 
1508 	if (cp >= ep)
1509 		return NULL;
1510 	while (cp < ep) {
1511 		i = *cp;
1512 		if (i == 0 || cp != sp) {
1513 			if (strlcat((char *)buf, ".", bufsiz) >= bufsiz)
1514 				return NULL;	/*result overrun*/
1515 		}
1516 		if (i == 0)
1517 			break;
1518 		cp++;
1519 
1520 		if ((i & 0xc0) == 0xc0 && cp - base > (i & 0x3f)) {
1521 			/* DNS compression */
1522 			if (!base)
1523 				return NULL;
1524 
1525 			comp = base + (i & 0x3f);
1526 			if (dnsdecode(comp, cp, base, cresult,
1527 			    sizeof(cresult)) == NULL)
1528 				return NULL;
1529 			if (strlcat(buf, cresult, bufsiz) >= bufsiz)
1530 				return NULL;	/*result overrun*/
1531 			break;
1532 		} else if ((i & 0x3f) == i) {
1533 			if (i > ep - cp)
1534 				return NULL;	/*source overrun*/
1535 			while (i-- > 0 && cp < ep) {
1536 				l = snprintf(cresult, sizeof(cresult),
1537 				    isprint(*cp) ? "%c" : "\\%03o", *cp & 0xff);
1538 				if ((size_t)l >= sizeof(cresult) || l < 0)
1539 					return NULL;
1540 				if (strlcat(buf, cresult, bufsiz) >= bufsiz)
1541 					return NULL;	/*result overrun*/
1542 				cp++;
1543 			}
1544 		} else
1545 			return NULL;	/*invalid label*/
1546 	}
1547 	if (i != 0)
1548 		return NULL;	/*not terminated*/
1549 	cp++;
1550 	return cp;
1551 }
1552 
1553 /*
1554  * pr_pack --
1555  *	Print out the packet, if it came from us.  This logic is necessary
1556  * because ALL readers of the ICMP socket get a copy of ALL ICMP packets
1557  * which arrive ('tis only fair).  This permits multiple copies of this
1558  * program to be run without having intermingled output (or statistics!).
1559  */
1560 static void
pr_pack(u_char * buf,int cc,struct msghdr * mhdr)1561 pr_pack(u_char *buf, int cc, struct msghdr *mhdr)
1562 {
1563 #define safeputc(c)	printf((isprint((c)) ? "%c" : "\\%03o"), c)
1564 	struct icmp6_hdr *icp;
1565 	struct icmp6_nodeinfo *ni;
1566 	int i;
1567 	int hoplim;
1568 	struct sockaddr *from;
1569 	int fromlen;
1570 	const u_char *cp = NULL;
1571 	u_char *dp, *end = buf + cc;
1572 	struct in6_pktinfo *pktinfo = NULL;
1573 	struct timespec tv, tp;
1574 	struct tv32 tpp;
1575 	double triptime = 0;
1576 	int dupflag;
1577 	size_t off;
1578 	int oldfqdn;
1579 	u_int16_t seq;
1580 	char dnsname[MAXDNAME + 1];
1581 
1582 	(void)clock_gettime(CLOCK_MONOTONIC, &tv);
1583 
1584 	if (!mhdr || !mhdr->msg_name ||
1585 	    mhdr->msg_namelen != sizeof(struct sockaddr_in6) ||
1586 	    ((struct sockaddr *)mhdr->msg_name)->sa_family != AF_INET6) {
1587 		if (options & F_VERBOSE)
1588 			warnx("invalid peername");
1589 		return;
1590 	}
1591 	from = (struct sockaddr *)mhdr->msg_name;
1592 	fromlen = mhdr->msg_namelen;
1593 	if (cc < (int)sizeof(struct icmp6_hdr)) {
1594 		if (options & F_VERBOSE)
1595 			warnx("packet too short (%d bytes) from %s", cc,
1596 			    pr_addr(from, fromlen));
1597 		return;
1598 	}
1599 	if (((mhdr->msg_flags & MSG_CTRUNC) != 0) &&
1600 	    (options & F_VERBOSE) != 0)
1601 		warnx("some control data discarded, insufficient buffer size");
1602 	icp = (struct icmp6_hdr *)buf;
1603 	ni = (struct icmp6_nodeinfo *)buf;
1604 	off = 0;
1605 
1606 	if ((hoplim = get_hoplim(mhdr)) == -1) {
1607 		warnx("failed to get receiving hop limit");
1608 		return;
1609 	}
1610 	if ((pktinfo = get_rcvpktinfo(mhdr)) == NULL) {
1611 		warnx("failed to get receiving packet information");
1612 		return;
1613 	}
1614 
1615 	if (icp->icmp6_type == ICMP6_ECHO_REPLY && myechoreply(icp)) {
1616 		seq = ntohs(icp->icmp6_seq);
1617 		++nreceived;
1618 		if (timing) {
1619 			memcpy(&tpp, icp + 1, sizeof(tpp));
1620 			tp.tv_sec = ntohl(tpp.tv32_sec);
1621 			tp.tv_nsec = ntohl(tpp.tv32_nsec);
1622 			timespecsub(&tv, &tp, &tv);
1623 			triptime = ((double)tv.tv_sec) * 1000.0 +
1624 			    ((double)tv.tv_nsec) / 1000000.0;
1625 			tsum += triptime;
1626 			tsumsq += triptime * triptime;
1627 			if (triptime < tmin)
1628 				tmin = triptime;
1629 			if (triptime > tmax)
1630 				tmax = triptime;
1631 		}
1632 
1633 		if (TST(seq % mx_dup_ck)) {
1634 			++nrepeats;
1635 			--nreceived;
1636 			dupflag = 1;
1637 		} else {
1638 			SET(seq % mx_dup_ck);
1639 			dupflag = 0;
1640 		}
1641 
1642 		if (options & F_QUIET)
1643 			return;
1644 
1645 		if (options & F_WAITTIME && triptime > waittime) {
1646 			++nrcvtimeout;
1647 			return;
1648 		}
1649 
1650 		if (options & F_DOT)
1651 			(void)write(STDOUT_FILENO, &BSPACE, 1);
1652 		else {
1653 			if (options & F_AUDIBLE)
1654 				(void)write(STDOUT_FILENO, &BBELL, 1);
1655 			(void)printf("%d bytes from %s, icmp_seq=%u", cc,
1656 			    pr_addr(from, fromlen), seq);
1657 			(void)printf(" hlim=%d", hoplim);
1658 			if ((options & F_VERBOSE) != 0) {
1659 				struct sockaddr_in6 dstsa;
1660 
1661 				memset(&dstsa, 0, sizeof(dstsa));
1662 				dstsa.sin6_family = AF_INET6;
1663 				dstsa.sin6_len = sizeof(dstsa);
1664 				dstsa.sin6_scope_id = pktinfo->ipi6_ifindex;
1665 				dstsa.sin6_addr = pktinfo->ipi6_addr;
1666 				(void)printf(" dst=%s",
1667 				    pr_addr((struct sockaddr *)&dstsa,
1668 				    sizeof(dstsa)));
1669 			}
1670 			if (timing)
1671 				(void)printf(" time=%.3f ms", triptime);
1672 			if (dupflag)
1673 				(void)printf("(DUP!)");
1674 			/* check the data */
1675 			cp = buf + off + ICMP6ECHOLEN + ICMP6ECHOTMLEN;
1676 			dp = outpack + ICMP6ECHOLEN + ICMP6ECHOTMLEN;
1677 			for (i = 8; cp < end; ++i, ++cp, ++dp) {
1678 				if (*cp != *dp) {
1679 					(void)printf("\nwrong data byte #%d should be 0x%x but was 0x%x", i, *dp, *cp);
1680 					break;
1681 				}
1682 			}
1683 		}
1684 	} else if (icp->icmp6_type == ICMP6_NI_REPLY && mynireply(ni)) {
1685 		memcpy(&seq, ni->icmp6_ni_nonce, sizeof(seq));
1686 		seq = ntohs(seq);
1687 		++nreceived;
1688 		if (TST(seq % mx_dup_ck)) {
1689 			++nrepeats;
1690 			--nreceived;
1691 			dupflag = 1;
1692 		} else {
1693 			SET(seq % mx_dup_ck);
1694 			dupflag = 0;
1695 		}
1696 
1697 		if (options & F_QUIET)
1698 			return;
1699 
1700 		(void)printf("%d bytes from %s: ", cc, pr_addr(from, fromlen));
1701 
1702 		switch (ntohs(ni->ni_code)) {
1703 		case ICMP6_NI_SUCCESS:
1704 			break;
1705 		case ICMP6_NI_REFUSED:
1706 			printf("refused, type 0x%x", ntohs(ni->ni_type));
1707 			goto fqdnend;
1708 		case ICMP6_NI_UNKNOWN:
1709 			printf("unknown, type 0x%x", ntohs(ni->ni_type));
1710 			goto fqdnend;
1711 		default:
1712 			printf("unknown code 0x%x, type 0x%x",
1713 			    ntohs(ni->ni_code), ntohs(ni->ni_type));
1714 			goto fqdnend;
1715 		}
1716 
1717 		switch (ntohs(ni->ni_qtype)) {
1718 		case NI_QTYPE_NOOP:
1719 			printf("NodeInfo NOOP");
1720 			break;
1721 		case NI_QTYPE_SUPTYPES:
1722 			pr_suptypes(ni, end - (u_char *)ni);
1723 			break;
1724 		case NI_QTYPE_NODEADDR:
1725 			pr_nodeaddr(ni, end - (u_char *)ni);
1726 			break;
1727 		case NI_QTYPE_FQDN:
1728 		default:	/* XXX: for backward compatibility */
1729 			cp = (u_char *)ni + ICMP6_NIRLEN;
1730 			if (buf[off + ICMP6_NIRLEN] ==
1731 			    cc - off - ICMP6_NIRLEN - 1)
1732 				oldfqdn = 1;
1733 			else
1734 				oldfqdn = 0;
1735 			if (oldfqdn) {
1736 				cp++;	/* skip length */
1737 				while (cp < end) {
1738 					safeputc(*cp & 0xff);
1739 					cp++;
1740 				}
1741 			} else {
1742 				i = 0;
1743 				while (cp < end) {
1744 					cp = dnsdecode((const u_char *)cp, end,
1745 					    (const u_char *)(ni + 1), dnsname,
1746 					    sizeof(dnsname));
1747 					if (cp == NULL) {
1748 						printf("???");
1749 						break;
1750 					}
1751 					/*
1752 					 * name-lookup special handling for
1753 					 * truncated name
1754 					 */
1755 					if (cp + 1 <= end && !*cp &&
1756 					    strlen(dnsname) > 0) {
1757 						dnsname[strlen(dnsname) - 1] = '\0';
1758 						cp++;
1759 					}
1760 					printf("%s%s", i > 0 ? "," : "",
1761 					    dnsname);
1762 				}
1763 			}
1764 			if (options & F_VERBOSE) {
1765 				u_long t;
1766 				int32_t ttl;
1767 				int comma = 0;
1768 
1769 				(void)printf(" (");	/*)*/
1770 
1771 				switch (ni->ni_code) {
1772 				case ICMP6_NI_REFUSED:
1773 					(void)printf("refused");
1774 					comma++;
1775 					break;
1776 				case ICMP6_NI_UNKNOWN:
1777 					(void)printf("unknown qtype");
1778 					comma++;
1779 					break;
1780 				}
1781 
1782 				if ((end - (u_char *)ni) < ICMP6_NIRLEN) {
1783 					/* case of refusion, unknown */
1784 					/*(*/
1785 					putchar(')');
1786 					goto fqdnend;
1787 				}
1788 				memcpy(&t, &buf[off+ICMP6ECHOLEN+8], sizeof(t));
1789 				ttl = (int32_t)ntohl(t);
1790 				if (comma)
1791 					printf(",");
1792 				if (!(ni->ni_flags & NI_FQDN_FLAG_VALIDTTL)) {
1793 					(void)printf("TTL=%d:meaningless",
1794 					    (int)ttl);
1795 				} else {
1796 					if (ttl < 0) {
1797 						(void)printf("TTL=%d:invalid",
1798 						   ttl);
1799 					} else
1800 						(void)printf("TTL=%d", ttl);
1801 				}
1802 				comma++;
1803 
1804 				if (oldfqdn) {
1805 					if (comma)
1806 						printf(",");
1807 					printf("03 draft");
1808 					comma++;
1809 				} else {
1810 					cp = (u_char *)ni + ICMP6_NIRLEN;
1811 					if (cp == end) {
1812 						if (comma)
1813 							printf(",");
1814 						printf("no name");
1815 						comma++;
1816 					}
1817 				}
1818 
1819 				if (buf[off + ICMP6_NIRLEN] !=
1820 				    cc - off - ICMP6_NIRLEN - 1 && oldfqdn) {
1821 					if (comma)
1822 						printf(",");
1823 					(void)printf("invalid namelen:%d/%lu",
1824 					    buf[off + ICMP6_NIRLEN],
1825 					    (u_long)cc - off - ICMP6_NIRLEN - 1);
1826 					comma++;
1827 				}
1828 				/*(*/
1829 				putchar(')');
1830 			}
1831 		fqdnend:
1832 			;
1833 		}
1834 	} else {
1835 		/* We've got something other than an ECHOREPLY */
1836 		if (!(options & F_VERBOSE))
1837 			return;
1838 		(void)printf("%d bytes from %s: ", cc, pr_addr(from, fromlen));
1839 		pr_icmph(icp, end);
1840 	}
1841 
1842 	if (!(options & F_DOT)) {
1843 		(void)putchar('\n');
1844 		if (options & F_VERBOSE)
1845 			pr_exthdrs(mhdr);
1846 		(void)fflush(stdout);
1847 	}
1848 #undef safeputc
1849 }
1850 
1851 static void
pr_exthdrs(struct msghdr * mhdr)1852 pr_exthdrs(struct msghdr *mhdr)
1853 {
1854 	ssize_t	bufsize;
1855 	void	*bufp;
1856 	struct cmsghdr *cm;
1857 
1858 	bufsize = 0;
1859 	bufp = mhdr->msg_control;
1860 	for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(mhdr); cm;
1861 	     cm = (struct cmsghdr *)CMSG_NXTHDR(mhdr, cm)) {
1862 		if (cm->cmsg_level != IPPROTO_IPV6)
1863 			continue;
1864 
1865 		bufsize = CONTROLLEN - ((caddr_t)CMSG_DATA(cm) - (caddr_t)bufp);
1866 		if (bufsize <= 0)
1867 			continue;
1868 		switch (cm->cmsg_type) {
1869 		case IPV6_HOPOPTS:
1870 			printf("  HbH Options: ");
1871 			pr_ip6opt(CMSG_DATA(cm), (size_t)bufsize);
1872 			break;
1873 		case IPV6_DSTOPTS:
1874 #ifdef IPV6_RTHDRDSTOPTS
1875 		case IPV6_RTHDRDSTOPTS:
1876 #endif
1877 			printf("  Dst Options: ");
1878 			pr_ip6opt(CMSG_DATA(cm), (size_t)bufsize);
1879 			break;
1880 		case IPV6_RTHDR:
1881 			printf("  Routing: ");
1882 			pr_rthdr(CMSG_DATA(cm), (size_t)bufsize);
1883 			break;
1884 		}
1885 	}
1886 }
1887 
1888 #ifndef __HAIKU__
1889 static void
pr_ip6opt(void * extbuf,size_t bufsize)1890 pr_ip6opt(void *extbuf, size_t bufsize)
1891 {
1892 	struct ip6_hbh *ext;
1893 	int currentlen;
1894 	u_int8_t type;
1895 	socklen_t extlen, len;
1896 	void *databuf;
1897 	size_t offset;
1898 	u_int16_t value2;
1899 	u_int32_t value4;
1900 
1901 	ext = (struct ip6_hbh *)extbuf;
1902 	extlen = (ext->ip6h_len + 1) * 8;
1903 	printf("nxt %u, len %u (%lu bytes)\n", ext->ip6h_nxt,
1904 	    (unsigned int)ext->ip6h_len, (unsigned long)extlen);
1905 
1906 	/*
1907 	 * Bounds checking on the ancillary data buffer:
1908 	 *     subtract the size of a cmsg structure from the buffer size.
1909 	 */
1910 	if (bufsize < (extlen  + CMSG_SPACE(0))) {
1911 		extlen = bufsize - CMSG_SPACE(0);
1912 		warnx("options truncated, showing only %u (total=%u)",
1913 		    (unsigned int)(extlen / 8 - 1),
1914 		    (unsigned int)(ext->ip6h_len));
1915 	}
1916 
1917 	currentlen = 0;
1918 	while (1) {
1919 		currentlen = inet6_opt_next(extbuf, extlen, currentlen,
1920 		    &type, &len, &databuf);
1921 		if (currentlen == -1)
1922 			break;
1923 		switch (type) {
1924 		/*
1925 		 * Note that inet6_opt_next automatically skips any padding
1926 		 * optins.
1927 		 */
1928 		case IP6OPT_JUMBO:
1929 			offset = 0;
1930 			offset = inet6_opt_get_val(databuf, offset,
1931 			    &value4, sizeof(value4));
1932 			printf("    Jumbo Payload Opt: Length %u\n",
1933 			    (u_int32_t)ntohl(value4));
1934 			break;
1935 		case IP6OPT_ROUTER_ALERT:
1936 			offset = 0;
1937 			offset = inet6_opt_get_val(databuf, offset,
1938 						   &value2, sizeof(value2));
1939 			printf("    Router Alert Opt: Type %u\n",
1940 			    ntohs(value2));
1941 			break;
1942 		default:
1943 			printf("    Received Opt %u len %lu\n",
1944 			    type, (unsigned long)len);
1945 			break;
1946 		}
1947 	}
1948 	return;
1949 }
1950 #else
1951 static void
pr_ip6opt(void * extbuf,size_t bufsize)1952 pr_ip6opt(void *extbuf, size_t bufsize)
1953 {
1954 	putchar('\n');
1955 	return;
1956 }
1957 #endif
1958 
1959 #ifndef __HAIKU__
1960 static void
pr_rthdr(void * extbuf,size_t bufsize)1961 pr_rthdr(void *extbuf, size_t bufsize)
1962 {
1963 	struct in6_addr *in6;
1964 	char ntopbuf[INET6_ADDRSTRLEN];
1965 	struct ip6_rthdr *rh = (struct ip6_rthdr *)extbuf;
1966 	int i, segments, origsegs, rthsize, size0, size1;
1967 
1968 	/* print fixed part of the header */
1969 	printf("nxt %u, len %u (%d bytes), type %u, ", rh->ip6r_nxt,
1970 	    rh->ip6r_len, (rh->ip6r_len + 1) << 3, rh->ip6r_type);
1971 	if ((segments = inet6_rth_segments(extbuf)) >= 0) {
1972 		printf("%d segments, ", segments);
1973 		printf("%d left\n", rh->ip6r_segleft);
1974 	} else {
1975 		printf("segments unknown, ");
1976 		printf("%d left\n", rh->ip6r_segleft);
1977 		return;
1978 	}
1979 
1980 	/*
1981 	 * Bounds checking on the ancillary data buffer. When calculating
1982 	 * the number of items to show keep in mind:
1983 	 *	- The size of the cmsg structure
1984 	 *	- The size of one segment (the size of a Type 0 routing header)
1985 	 *	- When dividing add a fudge factor of one in case the
1986 	 *	  dividend is not evenly divisible by the divisor
1987 	 */
1988 	rthsize = (rh->ip6r_len + 1) * 8;
1989 	if (bufsize < (rthsize + CMSG_SPACE(0))) {
1990 		origsegs = segments;
1991 		size0 = inet6_rth_space(IPV6_RTHDR_TYPE_0, 0);
1992 		size1 = inet6_rth_space(IPV6_RTHDR_TYPE_0, 1);
1993 		segments -= (rthsize - (bufsize - CMSG_SPACE(0))) /
1994 		    (size1 - size0) + 1;
1995 		warnx("segments truncated, showing only %d (total=%d)",
1996 		    segments, origsegs);
1997 	}
1998 
1999 	for (i = 0; i < segments; i++) {
2000 		in6 = inet6_rth_getaddr(extbuf, i);
2001 		if (in6 == NULL)
2002 			printf("   [%d]<NULL>\n", i);
2003 		else {
2004 			if (!inet_ntop(AF_INET6, in6, ntopbuf,
2005 			    sizeof(ntopbuf)))
2006 				strlcpy(ntopbuf, "?", sizeof(ntopbuf));
2007 			printf("   [%d]%s\n", i, ntopbuf);
2008 		}
2009 	}
2010 
2011 	return;
2012 
2013 }
2014 #else
2015 static void
pr_rthdr(void * extbuf,size_t bufsize)2016 pr_rthdr(void *extbuf, size_t bufsize)
2017 {
2018 	putchar('\n');
2019 	return;
2020 }
2021 #endif
2022 
2023 static int
pr_bitrange(u_int32_t v,int soff,int ii)2024 pr_bitrange(u_int32_t v, int soff, int ii)
2025 {
2026 	int off;
2027 	int i;
2028 
2029 	off = 0;
2030 	while (off < 32) {
2031 		/* shift till we have 0x01 */
2032 		if ((v & 0x01) == 0) {
2033 			if (ii > 1)
2034 				printf("-%u", soff + off - 1);
2035 			ii = 0;
2036 			switch (v & 0x0f) {
2037 			case 0x00:
2038 				v >>= 4;
2039 				off += 4;
2040 				continue;
2041 			case 0x08:
2042 				v >>= 3;
2043 				off += 3;
2044 				continue;
2045 			case 0x04: case 0x0c:
2046 				v >>= 2;
2047 				off += 2;
2048 				continue;
2049 			default:
2050 				v >>= 1;
2051 				off += 1;
2052 				continue;
2053 			}
2054 		}
2055 
2056 		/* we have 0x01 with us */
2057 		for (i = 0; i < 32 - off; i++) {
2058 			if ((v & (0x01 << i)) == 0)
2059 				break;
2060 		}
2061 		if (!ii)
2062 			printf(" %u", soff + off);
2063 		ii += i;
2064 		v >>= i; off += i;
2065 	}
2066 	return ii;
2067 }
2068 
2069 static void
pr_suptypes(struct icmp6_nodeinfo * ni,size_t nilen)2070 pr_suptypes(struct icmp6_nodeinfo *ni, size_t nilen)
2071 	/* ni->qtype must be SUPTYPES */
2072 {
2073 	size_t clen;
2074 	u_int32_t v;
2075 	const u_char *cp, *end;
2076 	u_int16_t cur;
2077 	struct cbit {
2078 		u_int16_t words;	/*32bit count*/
2079 		u_int16_t skip;
2080 	} cbit;
2081 #define MAXQTYPES	(1 << 16)
2082 	size_t off;
2083 	int b;
2084 
2085 	cp = (u_char *)(ni + 1);
2086 	end = ((u_char *)ni) + nilen;
2087 	cur = 0;
2088 	b = 0;
2089 
2090 	printf("NodeInfo Supported Qtypes");
2091 	if (options & F_VERBOSE) {
2092 		if (ni->ni_flags & NI_SUPTYPE_FLAG_COMPRESS)
2093 			printf(", compressed bitmap");
2094 		else
2095 			printf(", raw bitmap");
2096 	}
2097 
2098 	while (cp < end) {
2099 		clen = (size_t)(end - cp);
2100 		if ((ni->ni_flags & NI_SUPTYPE_FLAG_COMPRESS) == 0) {
2101 			if (clen == 0 || clen > MAXQTYPES / 8 ||
2102 			    clen % sizeof(v)) {
2103 				printf("???");
2104 				return;
2105 			}
2106 		} else {
2107 			if (clen < sizeof(cbit) || clen % sizeof(v))
2108 				return;
2109 			memcpy(&cbit, cp, sizeof(cbit));
2110 			if (sizeof(cbit) + ntohs(cbit.words) * sizeof(v) >
2111 			    clen)
2112 				return;
2113 			cp += sizeof(cbit);
2114 			clen = ntohs(cbit.words) * sizeof(v);
2115 			if (cur + clen * 8 + (u_long)ntohs(cbit.skip) * 32 >
2116 			    MAXQTYPES)
2117 				return;
2118 		}
2119 
2120 		for (off = 0; off < clen; off += sizeof(v)) {
2121 			memcpy(&v, cp + off, sizeof(v));
2122 			v = (u_int32_t)ntohl(v);
2123 			b = pr_bitrange(v, (int)(cur + off * 8), b);
2124 		}
2125 		/* flush the remaining bits */
2126 		b = pr_bitrange(0, (int)(cur + off * 8), b);
2127 
2128 		cp += clen;
2129 		cur += clen * 8;
2130 		if ((ni->ni_flags & NI_SUPTYPE_FLAG_COMPRESS) != 0)
2131 			cur += ntohs(cbit.skip) * 32;
2132 	}
2133 }
2134 
2135 static void
pr_nodeaddr(struct icmp6_nodeinfo * ni,int nilen)2136 pr_nodeaddr(struct icmp6_nodeinfo *ni, int nilen)
2137 	/* ni->qtype must be NODEADDR */
2138 {
2139 	u_char *cp = (u_char *)(ni + 1);
2140 	char ntop_buf[INET6_ADDRSTRLEN];
2141 	int withttl = 0;
2142 
2143 	nilen -= sizeof(struct icmp6_nodeinfo);
2144 
2145 	if (options & F_VERBOSE) {
2146 		switch (ni->ni_code) {
2147 		case ICMP6_NI_REFUSED:
2148 			(void)printf("refused");
2149 			break;
2150 		case ICMP6_NI_UNKNOWN:
2151 			(void)printf("unknown qtype");
2152 			break;
2153 		}
2154 		if (ni->ni_flags & NI_NODEADDR_FLAG_TRUNCATE)
2155 			(void)printf(" truncated");
2156 	}
2157 	putchar('\n');
2158 	if (nilen <= 0)
2159 		printf("  no address\n");
2160 
2161 	/*
2162 	 * In icmp-name-lookups 05 and later, TTL of each returned address
2163 	 * is contained in the response. We try to detect the version
2164 	 * by the length of the data, but note that the detection algorithm
2165 	 * is incomplete. We assume the latest draft by default.
2166 	 */
2167 	if (nilen % (sizeof(u_int32_t) + sizeof(struct in6_addr)) == 0)
2168 		withttl = 1;
2169 	while (nilen > 0) {
2170 		u_int32_t ttl = 0;
2171 
2172 		if (withttl) {
2173 			uint32_t t;
2174 
2175 			memcpy(&t, cp, sizeof(t));
2176 			ttl = (u_int32_t)ntohl(t);
2177 			cp += sizeof(u_int32_t);
2178 			nilen -= sizeof(u_int32_t);
2179 		}
2180 
2181 		if (inet_ntop(AF_INET6, cp, ntop_buf, sizeof(ntop_buf)) ==
2182 		    NULL)
2183 			strlcpy(ntop_buf, "?", sizeof(ntop_buf));
2184 		printf("  %s", ntop_buf);
2185 		if (withttl) {
2186 			if (ttl == 0xffffffff) {
2187 				/*
2188 				 * XXX: can this convention be applied to all
2189 				 * type of TTL (i.e. non-ND TTL)?
2190 				 */
2191 				printf("(TTL=infty)");
2192 			}
2193 			else
2194 				printf("(TTL=%u)", ttl);
2195 		}
2196 		putchar('\n');
2197 
2198 		nilen -= sizeof(struct in6_addr);
2199 		cp += sizeof(struct in6_addr);
2200 	}
2201 }
2202 
2203 static int
get_hoplim(struct msghdr * mhdr)2204 get_hoplim(struct msghdr *mhdr)
2205 {
2206 	struct cmsghdr *cm;
2207 
2208 	for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(mhdr); cm;
2209 	     cm = (struct cmsghdr *)CMSG_NXTHDR(mhdr, cm)) {
2210 		if (cm->cmsg_len == 0)
2211 			return(-1);
2212 
2213 		if (cm->cmsg_level == IPPROTO_IPV6 &&
2214 		    cm->cmsg_type == IPV6_HOPLIMIT &&
2215 		    cm->cmsg_len == CMSG_LEN(sizeof(int))) {
2216 			int r;
2217 
2218 			memcpy(&r, CMSG_DATA(cm), sizeof(r));
2219 			return(r);
2220 		}
2221 	}
2222 
2223 	return(-1);
2224 }
2225 
2226 static struct in6_pktinfo *
get_rcvpktinfo(struct msghdr * mhdr)2227 get_rcvpktinfo(struct msghdr *mhdr)
2228 {
2229 	static struct in6_pktinfo pi;
2230 	struct cmsghdr *cm;
2231 
2232 	for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(mhdr); cm;
2233 	     cm = (struct cmsghdr *)CMSG_NXTHDR(mhdr, cm)) {
2234 		if (cm->cmsg_len == 0)
2235 			return(NULL);
2236 
2237 		if (cm->cmsg_level == IPPROTO_IPV6 &&
2238 		    cm->cmsg_type == IPV6_PKTINFO &&
2239 		    cm->cmsg_len == CMSG_LEN(sizeof(struct in6_pktinfo))) {
2240 			memcpy(&pi, CMSG_DATA(cm), sizeof(pi));
2241 			return(&pi);
2242 		}
2243 	}
2244 
2245 	return(NULL);
2246 }
2247 
2248 static int
get_pathmtu(struct msghdr * mhdr)2249 get_pathmtu(struct msghdr *mhdr)
2250 {
2251 #ifdef IPV6_RECVPATHMTU
2252 	struct cmsghdr *cm;
2253 	struct ip6_mtuinfo mtuctl;
2254 
2255 	for (cm = (struct cmsghdr *)CMSG_FIRSTHDR(mhdr); cm;
2256 	     cm = (struct cmsghdr *)CMSG_NXTHDR(mhdr, cm)) {
2257 		if (cm->cmsg_len == 0)
2258 			return(0);
2259 
2260 		if (cm->cmsg_level == IPPROTO_IPV6 &&
2261 		    cm->cmsg_type == IPV6_PATHMTU &&
2262 		    cm->cmsg_len == CMSG_LEN(sizeof(struct ip6_mtuinfo))) {
2263 			memcpy(&mtuctl, CMSG_DATA(cm), sizeof(mtuctl));
2264 
2265 			/*
2266 			 * If the notified destination is different from
2267 			 * the one we are pinging, just ignore the info.
2268 			 * We check the scope ID only when both notified value
2269 			 * and our own value have non-0 values, because we may
2270 			 * have used the default scope zone ID for sending,
2271 			 * in which case the scope ID value is 0.
2272 			 */
2273 			if (!IN6_ARE_ADDR_EQUAL(&mtuctl.ip6m_addr.sin6_addr,
2274 						&dst.sin6_addr) ||
2275 			    (mtuctl.ip6m_addr.sin6_scope_id &&
2276 			     dst.sin6_scope_id &&
2277 			     mtuctl.ip6m_addr.sin6_scope_id !=
2278 			     dst.sin6_scope_id)) {
2279 				if ((options & F_VERBOSE) != 0) {
2280 					printf("path MTU for %s is notified. "
2281 					       "(ignored)\n",
2282 					   pr_addr((struct sockaddr *)&mtuctl.ip6m_addr,
2283 					   sizeof(mtuctl.ip6m_addr)));
2284 				}
2285 				return(0);
2286 			}
2287 
2288 			/*
2289 			 * Ignore an invalid MTU. XXX: can we just believe
2290 			 * the kernel check?
2291 			 */
2292 			if (mtuctl.ip6m_mtu < IPV6_MMTU)
2293 				return(0);
2294 
2295 			/* notification for our destination. return the MTU. */
2296 			return((int)mtuctl.ip6m_mtu);
2297 		}
2298 	}
2299 #endif
2300 	return(0);
2301 }
2302 
2303 /*subject type*/
2304 static const char *niqcode[] = {
2305 	"IPv6 address",
2306 	"DNS label",	/*or empty*/
2307 	"IPv4 address",
2308 };
2309 
2310 /*result code*/
2311 static const char *nircode[] = {
2312 	"Success", "Refused", "Unknown",
2313 };
2314 
2315 
2316 /*
2317  * pr_icmph --
2318  *	Print a descriptive string about an ICMP header.
2319  */
2320 static void
pr_icmph(struct icmp6_hdr * icp,u_char * end)2321 pr_icmph(struct icmp6_hdr *icp, u_char *end)
2322 {
2323 	char ntop_buf[INET6_ADDRSTRLEN];
2324 	struct nd_redirect *red;
2325 	struct icmp6_nodeinfo *ni;
2326 	char dnsname[MAXDNAME + 1];
2327 	const u_char *cp;
2328 	size_t l;
2329 
2330 	switch (icp->icmp6_type) {
2331 	case ICMP6_DST_UNREACH:
2332 		switch (icp->icmp6_code) {
2333 		case ICMP6_DST_UNREACH_NOROUTE:
2334 			(void)printf("No Route to Destination\n");
2335 			break;
2336 		case ICMP6_DST_UNREACH_ADMIN:
2337 			(void)printf("Destination Administratively "
2338 			    "Unreachable\n");
2339 			break;
2340 		case ICMP6_DST_UNREACH_BEYONDSCOPE:
2341 			(void)printf("Destination Unreachable Beyond Scope\n");
2342 			break;
2343 		case ICMP6_DST_UNREACH_ADDR:
2344 			(void)printf("Destination Host Unreachable\n");
2345 			break;
2346 		case ICMP6_DST_UNREACH_NOPORT:
2347 			(void)printf("Destination Port Unreachable\n");
2348 			break;
2349 		default:
2350 			(void)printf("Destination Unreachable, Bad Code: %d\n",
2351 			    icp->icmp6_code);
2352 			break;
2353 		}
2354 		/* Print returned IP header information */
2355 		pr_retip((struct ip6_hdr *)(icp + 1), end);
2356 		break;
2357 	case ICMP6_PACKET_TOO_BIG:
2358 		(void)printf("Packet too big mtu = %d\n",
2359 		    (int)ntohl(icp->icmp6_mtu));
2360 		pr_retip((struct ip6_hdr *)(icp + 1), end);
2361 		break;
2362 	case ICMP6_TIME_EXCEEDED:
2363 		switch (icp->icmp6_code) {
2364 		case ICMP6_TIME_EXCEED_TRANSIT:
2365 			(void)printf("Time to live exceeded\n");
2366 			break;
2367 		case ICMP6_TIME_EXCEED_REASSEMBLY:
2368 			(void)printf("Frag reassembly time exceeded\n");
2369 			break;
2370 		default:
2371 			(void)printf("Time exceeded, Bad Code: %d\n",
2372 			    icp->icmp6_code);
2373 			break;
2374 		}
2375 		pr_retip((struct ip6_hdr *)(icp + 1), end);
2376 		break;
2377 	case ICMP6_PARAM_PROB:
2378 		(void)printf("Parameter problem: ");
2379 		switch (icp->icmp6_code) {
2380 		case ICMP6_PARAMPROB_HEADER:
2381 			(void)printf("Erroneous Header ");
2382 			break;
2383 		case ICMP6_PARAMPROB_NEXTHEADER:
2384 			(void)printf("Unknown Nextheader ");
2385 			break;
2386 		case ICMP6_PARAMPROB_OPTION:
2387 			(void)printf("Unrecognized Option ");
2388 			break;
2389 		default:
2390 			(void)printf("Bad code(%d) ", icp->icmp6_code);
2391 			break;
2392 		}
2393 		(void)printf("pointer = 0x%02x\n",
2394 		    (u_int32_t)ntohl(icp->icmp6_pptr));
2395 		pr_retip((struct ip6_hdr *)(icp + 1), end);
2396 		break;
2397 	case ICMP6_ECHO_REQUEST:
2398 		(void)printf("Echo Request");
2399 		/* XXX ID + Seq + Data */
2400 		break;
2401 	case ICMP6_ECHO_REPLY:
2402 		(void)printf("Echo Reply");
2403 		/* XXX ID + Seq + Data */
2404 		break;
2405 	case ICMP6_MEMBERSHIP_QUERY:
2406 		(void)printf("Listener Query");
2407 		break;
2408 	case ICMP6_MEMBERSHIP_REPORT:
2409 		(void)printf("Listener Report");
2410 		break;
2411 	case ICMP6_MEMBERSHIP_REDUCTION:
2412 		(void)printf("Listener Done");
2413 		break;
2414 	case ND_ROUTER_SOLICIT:
2415 		(void)printf("Router Solicitation");
2416 		break;
2417 	case ND_ROUTER_ADVERT:
2418 		(void)printf("Router Advertisement");
2419 		break;
2420 	case ND_NEIGHBOR_SOLICIT:
2421 		(void)printf("Neighbor Solicitation");
2422 		break;
2423 	case ND_NEIGHBOR_ADVERT:
2424 		(void)printf("Neighbor Advertisement");
2425 		break;
2426 	case ND_REDIRECT:
2427 		red = (struct nd_redirect *)icp;
2428 		(void)printf("Redirect\n");
2429 		if (!inet_ntop(AF_INET6, &red->nd_rd_dst, ntop_buf,
2430 		    sizeof(ntop_buf)))
2431 			strlcpy(ntop_buf, "?", sizeof(ntop_buf));
2432 		(void)printf("Destination: %s", ntop_buf);
2433 		if (!inet_ntop(AF_INET6, &red->nd_rd_target, ntop_buf,
2434 		    sizeof(ntop_buf)))
2435 			strlcpy(ntop_buf, "?", sizeof(ntop_buf));
2436 		(void)printf(" New Target: %s", ntop_buf);
2437 		break;
2438 	case ICMP6_NI_QUERY:
2439 		(void)printf("Node Information Query");
2440 		/* XXX ID + Seq + Data */
2441 		ni = (struct icmp6_nodeinfo *)icp;
2442 		l = end - (u_char *)(ni + 1);
2443 		printf(", ");
2444 		switch (ntohs(ni->ni_qtype)) {
2445 		case NI_QTYPE_NOOP:
2446 			(void)printf("NOOP");
2447 			break;
2448 		case NI_QTYPE_SUPTYPES:
2449 			(void)printf("Supported qtypes");
2450 			break;
2451 		case NI_QTYPE_FQDN:
2452 			(void)printf("DNS name");
2453 			break;
2454 		case NI_QTYPE_NODEADDR:
2455 			(void)printf("nodeaddr");
2456 			break;
2457 		case NI_QTYPE_IPV4ADDR:
2458 			(void)printf("IPv4 nodeaddr");
2459 			break;
2460 		default:
2461 			(void)printf("unknown qtype");
2462 			break;
2463 		}
2464 		if (options & F_VERBOSE) {
2465 			switch (ni->ni_code) {
2466 			case ICMP6_NI_SUBJ_IPV6:
2467 				if (l == sizeof(struct in6_addr) &&
2468 				    inet_ntop(AF_INET6, ni + 1, ntop_buf,
2469 				    sizeof(ntop_buf)) != NULL) {
2470 					(void)printf(", subject=%s(%s)",
2471 					    niqcode[ni->ni_code], ntop_buf);
2472 				} else {
2473 #if 1
2474 					/* backward compat to -W */
2475 					(void)printf(", oldfqdn");
2476 #else
2477 					(void)printf(", invalid");
2478 #endif
2479 				}
2480 				break;
2481 			case ICMP6_NI_SUBJ_FQDN:
2482 				if (end == (u_char *)(ni + 1)) {
2483 					(void)printf(", no subject");
2484 					break;
2485 				}
2486 				printf(", subject=%s", niqcode[ni->ni_code]);
2487 				cp = (const u_char *)(ni + 1);
2488 				cp = dnsdecode(cp, end, NULL, dnsname,
2489 				    sizeof(dnsname));
2490 				if (cp != NULL)
2491 					printf("(%s)", dnsname);
2492 				else
2493 					printf("(invalid)");
2494 				break;
2495 			case ICMP6_NI_SUBJ_IPV4:
2496 				if (l == sizeof(struct in_addr) &&
2497 				    inet_ntop(AF_INET, ni + 1, ntop_buf,
2498 				    sizeof(ntop_buf)) != NULL) {
2499 					(void)printf(", subject=%s(%s)",
2500 					    niqcode[ni->ni_code], ntop_buf);
2501 				} else
2502 					(void)printf(", invalid");
2503 				break;
2504 			default:
2505 				(void)printf(", invalid");
2506 				break;
2507 			}
2508 		}
2509 		break;
2510 	case ICMP6_NI_REPLY:
2511 		(void)printf("Node Information Reply");
2512 		/* XXX ID + Seq + Data */
2513 		ni = (struct icmp6_nodeinfo *)icp;
2514 		printf(", ");
2515 		switch (ntohs(ni->ni_qtype)) {
2516 		case NI_QTYPE_NOOP:
2517 			(void)printf("NOOP");
2518 			break;
2519 		case NI_QTYPE_SUPTYPES:
2520 			(void)printf("Supported qtypes");
2521 			break;
2522 		case NI_QTYPE_FQDN:
2523 			(void)printf("DNS name");
2524 			break;
2525 		case NI_QTYPE_NODEADDR:
2526 			(void)printf("nodeaddr");
2527 			break;
2528 		case NI_QTYPE_IPV4ADDR:
2529 			(void)printf("IPv4 nodeaddr");
2530 			break;
2531 		default:
2532 			(void)printf("unknown qtype");
2533 			break;
2534 		}
2535 		if (options & F_VERBOSE) {
2536 			if (ni->ni_code > nitems(nircode))
2537 				printf(", invalid");
2538 			else
2539 				printf(", %s", nircode[ni->ni_code]);
2540 		}
2541 		break;
2542 	default:
2543 		(void)printf("Bad ICMP type: %d", icp->icmp6_type);
2544 	}
2545 }
2546 
2547 /*
2548  * pr_iph --
2549  *	Print an IP6 header.
2550  */
2551 static void
pr_iph(struct ip6_hdr * ip6)2552 pr_iph(struct ip6_hdr *ip6)
2553 {
2554 	u_int32_t flow = ip6->ip6_flow & IPV6_FLOWLABEL_MASK;
2555 	u_int8_t tc;
2556 	char ntop_buf[INET6_ADDRSTRLEN];
2557 
2558 	tc = *(&ip6->ip6_vfc + 1); /* XXX */
2559 	tc = (tc >> 4) & 0x0f;
2560 	tc |= (ip6->ip6_vfc << 4);
2561 
2562 	printf("Vr TC  Flow Plen Nxt Hlim\n");
2563 	printf(" %1x %02x %05x %04x  %02x   %02x\n",
2564 	    (ip6->ip6_vfc & IPV6_VERSION_MASK) >> 4, tc, (u_int32_t)ntohl(flow),
2565 	    ntohs(ip6->ip6_plen), ip6->ip6_nxt, ip6->ip6_hlim);
2566 	if (!inet_ntop(AF_INET6, &ip6->ip6_src, ntop_buf, sizeof(ntop_buf)))
2567 		strlcpy(ntop_buf, "?", sizeof(ntop_buf));
2568 	printf("%s->", ntop_buf);
2569 	if (!inet_ntop(AF_INET6, &ip6->ip6_dst, ntop_buf, sizeof(ntop_buf)))
2570 		strlcpy(ntop_buf, "?", sizeof(ntop_buf));
2571 	printf("%s\n", ntop_buf);
2572 }
2573 
2574 /*
2575  * pr_addr --
2576  *	Return an ascii host address as a dotted quad and optionally with
2577  * a hostname.
2578  */
2579 static const char *
pr_addr(struct sockaddr * addr,int addrlen)2580 pr_addr(struct sockaddr *addr, int addrlen)
2581 {
2582 	static char buf[NI_MAXHOST];
2583 	int flag = 0;
2584 
2585 	if (!(options & F_HOSTNAME))
2586 		flag |= NI_NUMERICHOST;
2587 
2588 #ifdef __HAIKU__
2589 #define cap_getnameinfo(p1,p2,p3,p4,p5,p6,p7,p8) getnameinfo(p2,p3,p4,p5,p6,p7,p8)
2590 #endif
2591 	if (cap_getnameinfo(capdns, addr, addrlen, buf, sizeof(buf), NULL, 0,
2592 		flag) == 0)
2593 		return (buf);
2594 	else
2595 		return "?";
2596 }
2597 
2598 /*
2599  * pr_retip --
2600  *	Dump some info on a returned (via ICMPv6) IPv6 packet.
2601  */
2602 static void
pr_retip(struct ip6_hdr * ip6,u_char * end)2603 pr_retip(struct ip6_hdr *ip6, u_char *end)
2604 {
2605 	u_char *cp = (u_char *)ip6, nh;
2606 	int hlen;
2607 
2608 	if ((size_t)(end - (u_char *)ip6) < sizeof(*ip6)) {
2609 		printf("IP6");
2610 		goto trunc;
2611 	}
2612 	pr_iph(ip6);
2613 	hlen = sizeof(*ip6);
2614 
2615 	nh = ip6->ip6_nxt;
2616 	cp += hlen;
2617 	while (end - cp >= 8) {
2618 #ifdef IPSEC
2619 		struct ah ah;
2620 #endif
2621 
2622 		switch (nh) {
2623 		case IPPROTO_HOPOPTS:
2624 			printf("HBH ");
2625 			hlen = (((struct ip6_hbh *)cp)->ip6h_len+1) << 3;
2626 			nh = ((struct ip6_hbh *)cp)->ip6h_nxt;
2627 			break;
2628 		case IPPROTO_DSTOPTS:
2629 			printf("DSTOPT ");
2630 			hlen = (((struct ip6_dest *)cp)->ip6d_len+1) << 3;
2631 			nh = ((struct ip6_dest *)cp)->ip6d_nxt;
2632 			break;
2633 		case IPPROTO_FRAGMENT:
2634 			printf("FRAG ");
2635 			hlen = sizeof(struct ip6_frag);
2636 			nh = ((struct ip6_frag *)cp)->ip6f_nxt;
2637 			break;
2638 		case IPPROTO_ROUTING:
2639 			printf("RTHDR ");
2640 			hlen = (((struct ip6_rthdr *)cp)->ip6r_len+1) << 3;
2641 			nh = ((struct ip6_rthdr *)cp)->ip6r_nxt;
2642 			break;
2643 #ifdef IPSEC
2644 		case IPPROTO_AH:
2645 			printf("AH ");
2646 			memcpy(&ah, cp, sizeof(ah));
2647 			hlen = (ah.ah_len+2) << 2;
2648 			nh = ah.ah_nxt;
2649 			break;
2650 #endif
2651 		case IPPROTO_ICMPV6:
2652 			printf("ICMP6: type = %d, code = %d\n",
2653 			    *cp, *(cp + 1));
2654 			return;
2655 		case IPPROTO_ESP:
2656 			printf("ESP\n");
2657 			return;
2658 		case IPPROTO_TCP:
2659 			printf("TCP: from port %u, to port %u (decimal)\n",
2660 			    (*cp * 256 + *(cp + 1)),
2661 			    (*(cp + 2) * 256 + *(cp + 3)));
2662 			return;
2663 		case IPPROTO_UDP:
2664 			printf("UDP: from port %u, to port %u (decimal)\n",
2665 			    (*cp * 256 + *(cp + 1)),
2666 			    (*(cp + 2) * 256 + *(cp + 3)));
2667 			return;
2668 		default:
2669 			printf("Unknown Header(%d)\n", nh);
2670 			return;
2671 		}
2672 
2673 		if ((cp += hlen) >= end)
2674 			goto trunc;
2675 	}
2676 	if (end - cp < 8)
2677 		goto trunc;
2678 
2679 	putchar('\n');
2680 	return;
2681 
2682   trunc:
2683 	printf("...\n");
2684 	return;
2685 }
2686 
2687 static void
fill(char * bp,char * patp)2688 fill(char *bp, char *patp)
2689 {
2690 	int ii, jj, kk;
2691 	int pat[16];
2692 	char *cp;
2693 
2694 	for (cp = patp; *cp; cp++)
2695 		if (!isxdigit(*cp))
2696 			errx(1, "patterns must be specified as hex digits");
2697 	ii = sscanf(patp,
2698 	    "%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x%2x",
2699 	    &pat[0], &pat[1], &pat[2], &pat[3], &pat[4], &pat[5], &pat[6],
2700 	    &pat[7], &pat[8], &pat[9], &pat[10], &pat[11], &pat[12],
2701 	    &pat[13], &pat[14], &pat[15]);
2702 
2703 /* xxx */
2704 	if (ii > 0)
2705 		for (kk = 0;
2706 		    (size_t)kk <= MAXDATALEN - 8 + sizeof(struct tv32) + ii;
2707 		    kk += ii)
2708 			for (jj = 0; jj < ii; ++jj)
2709 				bp[jj + kk] = pat[jj];
2710 	if (!(options & F_QUIET)) {
2711 		(void)printf("PATTERN: 0x");
2712 		for (jj = 0; jj < ii; ++jj)
2713 			(void)printf("%02x", bp[jj] & 0xFF);
2714 		(void)printf("\n");
2715 	}
2716 }
2717 
2718 #ifdef IPSEC
2719 #ifdef IPSEC_POLICY_IPSEC
2720 static int
setpolicy(int so __unused,char * policy)2721 setpolicy(int so __unused, char *policy)
2722 {
2723 	char *buf;
2724 
2725 	if (policy == NULL)
2726 		return 0;	/* ignore */
2727 
2728 	buf = ipsec_set_policy(policy, strlen(policy));
2729 	if (buf == NULL)
2730 		errx(1, "%s", ipsec_strerror());
2731 	if (setsockopt(ssend, IPPROTO_IPV6, IPV6_IPSEC_POLICY, buf,
2732 	    ipsec_get_policylen(buf)) < 0)
2733 		warnx("Unable to set IPsec policy");
2734 	free(buf);
2735 
2736 	return 0;
2737 }
2738 #endif
2739 #endif
2740 
2741 #ifndef __HAIKU__
2742 static char *
nigroup(char * name,int nig_oldmcprefix)2743 nigroup(char *name, int nig_oldmcprefix)
2744 {
2745 	char *p;
2746 	char *q;
2747 	MD5_CTX ctxt;
2748 	u_int8_t digest[16];
2749 	u_int8_t c;
2750 	size_t l;
2751 	char hbuf[NI_MAXHOST];
2752 	struct in6_addr in6;
2753 	int valid;
2754 
2755 	p = strchr(name, '.');
2756 	if (!p)
2757 		p = name + strlen(name);
2758 	l = p - name;
2759 	if (l > 63 || l > sizeof(hbuf) - 1)
2760 		return NULL;	/*label too long*/
2761 	strncpy(hbuf, name, l);
2762 	hbuf[(int)l] = '\0';
2763 
2764 	for (q = name; *q; q++) {
2765 		if (isupper(*(unsigned char *)q))
2766 			*q = tolower(*(unsigned char *)q);
2767 	}
2768 
2769 	/* generate 16 bytes of pseudo-random value. */
2770 	memset(&ctxt, 0, sizeof(ctxt));
2771 	MD5Init(&ctxt);
2772 	c = l & 0xff;
2773 	MD5Update(&ctxt, &c, sizeof(c));
2774 	MD5Update(&ctxt, (unsigned char *)name, l);
2775 	MD5Final(digest, &ctxt);
2776 
2777 	if (nig_oldmcprefix) {
2778 		/* draft-ietf-ipngwg-icmp-name-lookup */
2779 		valid = inet_pton(AF_INET6, "ff02::2:0000:0000", &in6);
2780 	} else {
2781 		/* RFC 4620 */
2782 		valid = inet_pton(AF_INET6, "ff02::2:ff00:0000", &in6);
2783 	}
2784 	if (valid != 1)
2785 		return NULL;	/*XXX*/
2786 
2787 	if (nig_oldmcprefix) {
2788 		/* draft-ietf-ipngwg-icmp-name-lookup */
2789 		bcopy(digest, &in6.s6_addr[12], 4);
2790 	} else {
2791 		/* RFC 4620 */
2792 		bcopy(digest, &in6.s6_addr[13], 3);
2793 	}
2794 
2795 	if (inet_ntop(AF_INET6, &in6, hbuf, sizeof(hbuf)) == NULL)
2796 		return NULL;
2797 
2798 	return strdup(hbuf);
2799 }
2800 #endif
2801 
2802 #ifndef __HAIKU__
2803 static cap_channel_t *
capdns_setup(void)2804 capdns_setup(void)
2805 {
2806 	cap_channel_t *capcas, *capdnsloc;
2807 #ifdef WITH_CASPER
2808 	const char *types[2];
2809 	int families[1];
2810 #endif
2811 	capcas = cap_init();
2812 	if (capcas == NULL)
2813 		err(1, "unable to create casper process");
2814 	capdnsloc = cap_service_open(capcas, "system.dns");
2815 	/* Casper capability no longer needed. */
2816 	cap_close(capcas);
2817 	if (capdnsloc == NULL)
2818 		err(1, "unable to open system.dns service");
2819 #ifdef WITH_CASPER
2820 	types[0] = "NAME2ADDR";
2821 	types[1] = "ADDR2NAME";
2822 	if (cap_dns_type_limit(capdnsloc, types, nitems(types)) < 0)
2823 		err(1, "unable to limit access to system.dns service");
2824 	families[0] = AF_INET6;
2825 	if (cap_dns_family_limit(capdnsloc, families, nitems(families)) < 0)
2826 		err(1, "unable to limit access to system.dns service");
2827 #endif
2828 	return (capdnsloc);
2829 }
2830 #endif
2831