Deleted Added
full compact
ip6.h (57120) ip6.h (62587)
1/* $FreeBSD: head/sys/netinet/ip6.h 62587 2000-07-04 16:35:15Z itojun $ */
2/* $KAME: ip6.h,v 1.9 2000/07/02 21:01:32 itojun Exp $ */
3
1/*
4/*
2 * Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project.
5 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * 1. Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * 2. Redistributions in binary form must reproduce the above copyright

--- 9 unchanged lines hidden (view full) ---

20 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
6 * All rights reserved.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright

--- 9 unchanged lines hidden (view full) ---

23 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
30 * SUCH DAMAGE.
31 */
32
33/*
34 * Copyright (c) 1982, 1986, 1993
35 * The Regents of the University of California. All rights reserved.
28 *
36 *
29 * $FreeBSD: head/sys/netinet/ip6.h 57120 2000-02-10 19:33:58Z shin $
37 * Redistribution and use in source and binary forms, with or without
38 * modification, are permitted provided that the following conditions
39 * are met:
40 * 1. Redistributions of source code must retain the above copyright
41 * notice, this list of conditions and the following disclaimer.
42 * 2. Redistributions in binary form must reproduce the above copyright
43 * notice, this list of conditions and the following disclaimer in the
44 * documentation and/or other materials provided with the distribution.
45 * 3. All advertising materials mentioning features or use of this software
46 * must display the following acknowledgement:
47 * This product includes software developed by the University of
48 * California, Berkeley and its contributors.
49 * 4. Neither the name of the University nor the names of its contributors
50 * may be used to endorse or promote products derived from this software
51 * without specific prior written permission.
52 *
53 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
54 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
55 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
56 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
57 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
58 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
59 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
60 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
61 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
62 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
63 * SUCH DAMAGE.
64 *
65 * @(#)ip.h 8.1 (Berkeley) 6/10/93
30 */
31
66 */
67
32#define __KAME_NETINET_IP6_H_INCLUDED_
33#include <netinet6/ip6.h>
34#undef __KAME_NETINET_IP6_H_INCLUDED_
68#ifndef _NETINET_IP6_H_
69#define _NETINET_IP6_H_
70
71/*
72 * Definition for internet protocol version 6.
73 * RFC 2460
74 */
75
76struct ip6_hdr {
77 union {
78 struct ip6_hdrctl {
79 u_int32_t ip6_un1_flow; /* 20 bits of flow-ID */
80 u_int16_t ip6_un1_plen; /* payload length */
81 u_int8_t ip6_un1_nxt; /* next header */
82 u_int8_t ip6_un1_hlim; /* hop limit */
83 } ip6_un1;
84 u_int8_t ip6_un2_vfc; /* 4 bits version, top 4 bits class */
85 } ip6_ctlun;
86 struct in6_addr ip6_src; /* source address */
87 struct in6_addr ip6_dst; /* destination address */
88};
89
90#define ip6_vfc ip6_ctlun.ip6_un2_vfc
91#define ip6_flow ip6_ctlun.ip6_un1.ip6_un1_flow
92#define ip6_plen ip6_ctlun.ip6_un1.ip6_un1_plen
93#define ip6_nxt ip6_ctlun.ip6_un1.ip6_un1_nxt
94#define ip6_hlim ip6_ctlun.ip6_un1.ip6_un1_hlim
95#define ip6_hops ip6_ctlun.ip6_un1.ip6_un1_hlim
96
97#define IPV6_VERSION 0x60
98#define IPV6_VERSION_MASK 0xf0
99
100#if BYTE_ORDER == BIG_ENDIAN
101#define IPV6_FLOWINFO_MASK 0x0fffffff /* flow info (28 bits) */
102#define IPV6_FLOWLABEL_MASK 0x000fffff /* flow label (20 bits) */
103#else
104#if BYTE_ORDER == LITTLE_ENDIAN
105#define IPV6_FLOWINFO_MASK 0xffffff0f /* flow info (28 bits) */
106#define IPV6_FLOWLABEL_MASK 0xffff0f00 /* flow label (20 bits) */
107#endif /* LITTLE_ENDIAN */
108#endif
109/* ECN bits proposed by Sally Floyd */
110#define IP6TOS_CE 0x01 /* congestion experienced */
111#define IP6TOS_ECT 0x02 /* ECN-capable transport */
112
113/*
114 * Extension Headers
115 */
116
117struct ip6_ext {
118 u_char ip6e_nxt;
119 u_char ip6e_len;
120};
121
122/* Hop-by-Hop options header */
123/* XXX should we pad it to force alignment on an 8-byte boundary? */
124struct ip6_hbh {
125 u_int8_t ip6h_nxt; /* next header */
126 u_int8_t ip6h_len; /* length in units of 8 octets */
127 /* followed by options */
128};
129
130/* Destination options header */
131/* XXX should we pad it to force alignment on an 8-byte boundary? */
132struct ip6_dest {
133 u_int8_t ip6d_nxt; /* next header */
134 u_int8_t ip6d_len; /* length in units of 8 octets */
135 /* followed by options */
136};
137
138/* Option types and related macros */
139#define IP6OPT_PAD1 0x00 /* 00 0 00000 */
140#define IP6OPT_PADN 0x01 /* 00 0 00001 */
141#define IP6OPT_JUMBO 0xC2 /* 11 0 00010 = 194 */
142#define IP6OPT_JUMBO_LEN 6
143#define IP6OPT_RTALERT 0x05 /* 00 0 00101 */
144#define IP6OPT_RTALERT_LEN 4
145#define IP6OPT_RTALERT_MLD 0 /* Datagram contains an MLD message */
146#define IP6OPT_RTALERT_RSVP 1 /* Datagram contains an RSVP message */
147#define IP6OPT_RTALERT_ACTNET 2 /* contains an Active Networks msg */
148#define IP6OPT_MINLEN 2
149
150#define IP6OPT_TYPE(o) ((o) & 0xC0)
151#define IP6OPT_TYPE_SKIP 0x00
152#define IP6OPT_TYPE_DISCARD 0x40
153#define IP6OPT_TYPE_FORCEICMP 0x80
154#define IP6OPT_TYPE_ICMP 0xC0
155
156#define IP6OPT_MUTABLE 0x20
157
158/* Routing header */
159struct ip6_rthdr {
160 u_int8_t ip6r_nxt; /* next header */
161 u_int8_t ip6r_len; /* length in units of 8 octets */
162 u_int8_t ip6r_type; /* routing type */
163 u_int8_t ip6r_segleft; /* segments left */
164 /* followed by routing type specific data */
165};
166
167/* Type 0 Routing header */
168struct ip6_rthdr0 {
169 u_int8_t ip6r0_nxt; /* next header */
170 u_int8_t ip6r0_len; /* length in units of 8 octets */
171 u_int8_t ip6r0_type; /* always zero */
172 u_int8_t ip6r0_segleft; /* segments left */
173 u_int8_t ip6r0_reserved; /* reserved field */
174 u_int8_t ip6r0_slmap[3]; /* strict/loose bit map */
175 struct in6_addr ip6r0_addr[1]; /* up to 23 addresses */
176};
177
178/* Fragment header */
179struct ip6_frag {
180 u_int8_t ip6f_nxt; /* next header */
181 u_int8_t ip6f_reserved; /* reserved field */
182 u_int16_t ip6f_offlg; /* offset, reserved, and flag */
183 u_int32_t ip6f_ident; /* identification */
184};
185
186#if BYTE_ORDER == BIG_ENDIAN
187#define IP6F_OFF_MASK 0xfff8 /* mask out offset from _offlg */
188#define IP6F_RESERVED_MASK 0x0006 /* reserved bits in ip6f_offlg */
189#define IP6F_MORE_FRAG 0x0001 /* more-fragments flag */
190#else /* BYTE_ORDER == LITTLE_ENDIAN */
191#define IP6F_OFF_MASK 0xf8ff /* mask out offset from _offlg */
192#define IP6F_RESERVED_MASK 0x0600 /* reserved bits in ip6f_offlg */
193#define IP6F_MORE_FRAG 0x0100 /* more-fragments flag */
194#endif /* BYTE_ORDER == LITTLE_ENDIAN */
195
196/*
197 * Internet implementation parameters.
198 */
199#define IPV6_MAXHLIM 255 /* maximun hoplimit */
200#define IPV6_DEFHLIM 64 /* default hlim */
201#define IPV6_FRAGTTL 120 /* ttl for fragment packets, in slowtimo tick */
202#define IPV6_HLIMDEC 1 /* subtracted when forwaeding */
203
204#define IPV6_MMTU 1280 /* minimal MTU and reassembly. 1024 + 256 */
205#define IPV6_MAXPACKET 65535 /* ip6 max packet size without Jumbo payload*/
206
207#ifdef _KERNEL
208/*
209 * IP6_EXTHDR_CHECK ensures that region between the IP6 header and the
210 * target header (including IPv6 itself, extension headers and
211 * TCP/UDP/ICMP6 headers) are continuous. KAME requires drivers
212 * to store incoming data into one internal mbuf or one or more external
213 * mbufs(never into two or more internal mbufs). Thus, the third case is
214 * supposed to never be matched but is prepared just in case.
215 */
216
217#ifdef INET6
218#define IP6_EXTHDR_STAT(x) x
219#else
220#define IP6_EXTHDR_STAT(x)
221#endif
222
223#define IP6_EXTHDR_CHECK(m, off, hlen, ret) \
224do { \
225 if ((m)->m_next != NULL) { \
226 if (((m)->m_flags & M_LOOP) && \
227 ((m)->m_len < (off) + (hlen)) && \
228 (((m) = m_pullup((m), (off) + (hlen))) == NULL)) { \
229 IP6_EXTHDR_STAT(ip6stat.ip6s_exthdrtoolong++); \
230 return ret; \
231 } else if ((m)->m_flags & M_EXT) { \
232 if ((m)->m_len < (off) + (hlen)) { \
233 IP6_EXTHDR_STAT(ip6stat.ip6s_exthdrtoolong++); \
234 m_freem(m); \
235 return ret; \
236 } \
237 } else { \
238 if ((m)->m_len < (off) + (hlen)) { \
239 IP6_EXTHDR_STAT(ip6stat.ip6s_exthdrtoolong++); \
240 m_freem(m); \
241 return ret; \
242 } \
243 } \
244 } else { \
245 if ((m)->m_len < (off) + (hlen)) { \
246 IP6_EXTHDR_STAT(ip6stat.ip6s_tooshort++); \
247 in6_ifstat_inc(m->m_pkthdr.rcvif, ifs6_in_truncated); \
248 m_freem(m); \
249 return ret; \
250 } \
251 } \
252} while (0)
253
254/*
255 * IP6_EXTHDR_GET ensures that intermediate protocol header (from "off" to
256 * "len") is located in single mbuf, on contiguous memory region.
257 * The pointer to the region will be returned to pointer variable "val",
258 * with type "typ".
259 * IP6_EXTHDR_GET0 does the same, except that it aligns the structure at the
260 * very top of mbuf. GET0 is likely to make memory copy than GET.
261 *
262 * XXX we're now testing this, needs m_pulldown()
263 */
264#define IP6_EXTHDR_GET(val, typ, m, off, len) \
265do { \
266 struct mbuf *t; \
267 int tmp; \
268 IP6_EXTHDR_STAT(ip6stat.ip6s_exthdrget++); \
269 if ((m)->m_len >= (off) + (len)) \
270 (val) = (typ)(mtod((m), caddr_t) + (off)); \
271 else { \
272 t = m_pulldown((m), (off), (len), &tmp); \
273 if (t) { \
274 if (t->m_len < tmp + (len)) \
275 panic("m_pulldown malfunction"); \
276 (val) = (typ)(mtod(t, caddr_t) + tmp); \
277 } else { \
278 (val) = (typ)NULL; \
279 (m) = NULL; \
280 } \
281 } \
282} while (0)
283
284#define IP6_EXTHDR_GET0(val, typ, m, off, len) \
285do { \
286 struct mbuf *t; \
287 IP6_EXTHDR_STAT(ip6stat.ip6s_exthdrget0++); \
288 if ((off) == 0) \
289 (val) = (typ)mtod(m, caddr_t); \
290 else { \
291 t = m_pulldown((m), (off), (len), NULL); \
292 if (t) { \
293 if (t->m_len < (len)) \
294 panic("m_pulldown malfunction"); \
295 (val) = (typ)mtod(t, caddr_t); \
296 } else { \
297 (val) = (typ)NULL; \
298 (m) = NULL; \
299 } \
300 } \
301} while (0)
302#endif /*_KERNEL*/
303
304#endif /* not _NETINET_IP6_H_ */