blob: 8ffcfdd08cc502636068c95993b1e63b3866ad5b [file] [log] [blame]
paul718e3742002-12-13 20:15:29 +00001/* BGP attributes management routines.
2 Copyright (C) 1996, 97, 98, 1999 Kunihiro Ishiguro
3
4This file is part of GNU Zebra.
5
6GNU Zebra is free software; you can redistribute it and/or modify it
7under the terms of the GNU General Public License as published by the
8Free Software Foundation; either version 2, or (at your option) any
9later version.
10
11GNU Zebra is distributed in the hope that it will be useful, but
12WITHOUT ANY WARRANTY; without even the implied warranty of
13MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14General Public License for more details.
15
16You should have received a copy of the GNU General Public License
17along with GNU Zebra; see the file COPYING. If not, write to the Free
18Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
1902111-1307, USA. */
20
21#include <zebra.h>
22
23#include "linklist.h"
24#include "prefix.h"
25#include "memory.h"
26#include "vector.h"
27#include "vty.h"
28#include "stream.h"
29#include "log.h"
30#include "hash.h"
31
32#include "bgpd/bgpd.h"
33#include "bgpd/bgp_attr.h"
34#include "bgpd/bgp_route.h"
35#include "bgpd/bgp_aspath.h"
36#include "bgpd/bgp_community.h"
37#include "bgpd/bgp_debug.h"
38#include "bgpd/bgp_packet.h"
39#include "bgpd/bgp_ecommunity.h"
40
41/* Attribute strings for logging. */
42struct message attr_str [] =
43{
44 { BGP_ATTR_ORIGIN, "ORIGIN" },
45 { BGP_ATTR_AS_PATH, "AS_PATH" },
46 { BGP_ATTR_NEXT_HOP, "NEXT_HOP" },
47 { BGP_ATTR_MULTI_EXIT_DISC, "MULTI_EXIT_DISC" },
48 { BGP_ATTR_LOCAL_PREF, "LOCAL_PREF" },
49 { BGP_ATTR_ATOMIC_AGGREGATE, "ATOMIC_AGGREGATE" },
50 { BGP_ATTR_AGGREGATOR, "AGGREGATOR" },
51 { BGP_ATTR_COMMUNITIES, "COMMUNITY" },
52 { BGP_ATTR_ORIGINATOR_ID, "ORIGINATOR_ID" },
53 { BGP_ATTR_CLUSTER_LIST, "CLUSTERLIST" },
54 { BGP_ATTR_DPA, "DPA" },
55 { BGP_ATTR_ADVERTISER, "ADVERTISER"} ,
56 { BGP_ATTR_RCID_PATH, "RCID_PATH" },
57 { BGP_ATTR_MP_REACH_NLRI, "MP_REACH_NLRI" },
58 { BGP_ATTR_MP_UNREACH_NLRI, "MP_UNREACH_NLRI" },
59 { 0, NULL }
60};
61
62struct hash *cluster_hash;
63
64void *
65cluster_hash_alloc (struct cluster_list *val)
66{
67 struct cluster_list *cluster;
68
69 cluster = XMALLOC (MTYPE_CLUSTER, sizeof (struct cluster_list));
70 cluster->length = val->length;
71
72 if (cluster->length)
73 {
74 cluster->list = XMALLOC (MTYPE_CLUSTER_VAL, val->length);
75 memcpy (cluster->list, val->list, val->length);
76 }
77 else
78 cluster->list = NULL;
79
80 cluster->refcnt = 0;
81
82 return cluster;
83}
84
85/* Cluster list related functions. */
86struct cluster_list *
paul5228ad22004-06-04 17:58:18 +000087cluster_parse (struct in_addr * pnt, int length)
paul718e3742002-12-13 20:15:29 +000088{
89 struct cluster_list tmp;
90 struct cluster_list *cluster;
91
92 tmp.length = length;
paul5228ad22004-06-04 17:58:18 +000093 tmp.list = pnt;
paul718e3742002-12-13 20:15:29 +000094
95 cluster = hash_get (cluster_hash, &tmp, cluster_hash_alloc);
96 cluster->refcnt++;
97 return cluster;
98}
99
100int
101cluster_loop_check (struct cluster_list *cluster, struct in_addr originator)
102{
103 int i;
104
105 for (i = 0; i < cluster->length / 4; i++)
106 if (cluster->list[i].s_addr == originator.s_addr)
107 return 1;
108 return 0;
109}
110
111unsigned int
112cluster_hash_key_make (struct cluster_list *cluster)
113{
114 unsigned int key = 0;
115 int length;
116 caddr_t pnt;
117
118 length = cluster->length;
119 pnt = (caddr_t) cluster->list;
120
121 while (length)
122 key += pnt[--length];
123
124 return key;
125}
126
127int
128cluster_hash_cmp (struct cluster_list *cluster1, struct cluster_list *cluster2)
129{
130 if (cluster1->length == cluster2->length &&
131 memcmp (cluster1->list, cluster2->list, cluster1->length) == 0)
132 return 1;
133 return 0;
134}
135
136void
137cluster_free (struct cluster_list *cluster)
138{
139 if (cluster->list)
140 XFREE (MTYPE_CLUSTER_VAL, cluster->list);
141 XFREE (MTYPE_CLUSTER, cluster);
142}
143
144struct cluster_list *
145cluster_dup (struct cluster_list *cluster)
146{
147 struct cluster_list *new;
148
149 new = XMALLOC (MTYPE_CLUSTER, sizeof (struct cluster_list));
150 memset (new, 0, sizeof (struct cluster_list));
151 new->length = cluster->length;
152
153 if (cluster->length)
154 {
155 new->list = XMALLOC (MTYPE_CLUSTER_VAL, cluster->length);
156 memcpy (new->list, cluster->list, cluster->length);
157 }
158 else
159 new->list = NULL;
160
161 return new;
162}
163
164struct cluster_list *
165cluster_intern (struct cluster_list *cluster)
166{
167 struct cluster_list *find;
168
169 find = hash_get (cluster_hash, cluster, cluster_hash_alloc);
170 find->refcnt++;
171
172 return find;
173}
174
175void
176cluster_unintern (struct cluster_list *cluster)
177{
178 struct cluster_list *ret;
179
180 if (cluster->refcnt)
181 cluster->refcnt--;
182
183 if (cluster->refcnt == 0)
184 {
185 ret = hash_release (cluster_hash, cluster);
186 cluster_free (cluster);
187 }
188}
189
190void
191cluster_init ()
192{
193 cluster_hash = hash_create (cluster_hash_key_make, cluster_hash_cmp);
194}
195
196/* Unknown transit attribute. */
197struct hash *transit_hash;
198
199void
200transit_free (struct transit *transit)
201{
202 if (transit->val)
203 XFREE (MTYPE_TRANSIT_VAL, transit->val);
204 XFREE (MTYPE_TRANSIT, transit);
205}
206
207void *
208transit_hash_alloc (struct transit *transit)
209{
210 /* Transit structure is already allocated. */
211 return transit;
212}
213
214struct transit *
215transit_intern (struct transit *transit)
216{
217 struct transit *find;
218
219 find = hash_get (transit_hash, transit, transit_hash_alloc);
220 if (find != transit)
221 transit_free (transit);
222 find->refcnt++;
223
224 return find;
225}
226
227void
228transit_unintern (struct transit *transit)
229{
230 struct transit *ret;
231
232 if (transit->refcnt)
233 transit->refcnt--;
234
235 if (transit->refcnt == 0)
236 {
237 ret = hash_release (transit_hash, transit);
238 transit_free (transit);
239 }
240}
241
242unsigned int
243transit_hash_key_make (struct transit *transit)
244{
245 unsigned int key = 0;
246 int length;
247 caddr_t pnt;
248
249 length = transit->length;
250 pnt = (caddr_t) transit->val;
251
252 while (length)
253 key += pnt[--length];
254
255 return key;
256}
257
258int
259transit_hash_cmp (struct transit *transit1, struct transit *transit2)
260{
261 if (transit1->length == transit2->length &&
262 memcmp (transit1->val, transit2->val, transit1->length) == 0)
263 return 1;
264 return 0;
265}
266
267void
268transit_init ()
269{
270 transit_hash = hash_create (transit_hash_key_make, transit_hash_cmp);
271}
272
273/* Attribute hash routines. */
274
275struct hash *attrhash;
276
277unsigned int
278attrhash_key_make (struct attr *attr)
279{
280 unsigned int key = 0;
281
282 key += attr->origin;
283 key += attr->nexthop.s_addr;
284 key += attr->med;
285 key += attr->local_pref;
286 key += attr->aggregator_as;
287 key += attr->aggregator_addr.s_addr;
288 key += attr->weight;
289
290 key += attr->mp_nexthop_global_in.s_addr;
291 if (attr->aspath)
292 key += aspath_key_make (attr->aspath);
293 if (attr->community)
294 key += community_hash_make (attr->community);
295 if (attr->ecommunity)
296 key += ecommunity_hash_make (attr->ecommunity);
297 if (attr->cluster)
298 key += cluster_hash_key_make (attr->cluster);
299 if (attr->transit)
300 key += transit_hash_key_make (attr->transit);
301
302#ifdef HAVE_IPV6
303 {
304 int i;
305
306 key += attr->mp_nexthop_len;
307 for (i = 0; i < 16; i++)
308 key += attr->mp_nexthop_global.s6_addr[i];
309 for (i = 0; i < 16; i++)
310 key += attr->mp_nexthop_local.s6_addr[i];
311 }
312#endif /* HAVE_IPV6 */
313
314 return key;
315}
316
317int
318attrhash_cmp (struct attr *attr1, struct attr *attr2)
319{
320 if (attr1->flag == attr2->flag
321 && attr1->origin == attr2->origin
322 && attr1->nexthop.s_addr == attr2->nexthop.s_addr
323 && attr1->med == attr2->med
324 && attr1->local_pref == attr2->local_pref
325 && attr1->aggregator_as == attr2->aggregator_as
326 && attr1->aggregator_addr.s_addr == attr2->aggregator_addr.s_addr
327 && attr1->weight == attr2->weight
328#ifdef HAVE_IPV6
329 && attr1->mp_nexthop_len == attr2->mp_nexthop_len
330 && IPV6_ADDR_SAME (&attr1->mp_nexthop_global, &attr2->mp_nexthop_global)
331 && IPV6_ADDR_SAME (&attr1->mp_nexthop_local, &attr2->mp_nexthop_local)
332#endif /* HAVE_IPV6 */
333 && IPV4_ADDR_SAME (&attr1->mp_nexthop_global_in, &attr2->mp_nexthop_global_in)
334 && attr1->aspath == attr2->aspath
335 && attr1->community == attr2->community
336 && attr1->ecommunity == attr2->ecommunity
337 && attr1->cluster == attr2->cluster
338 && attr1->transit == attr2->transit)
339 return 1;
340 else
341 return 0;
342}
343
344void
345attrhash_init ()
346{
347 attrhash = hash_create (attrhash_key_make, attrhash_cmp);
348}
349
350void
351attr_show_all_iterator (struct hash_backet *backet, struct vty *vty)
352{
353 struct attr *attr = backet->data;
354
355 vty_out (vty, "attr[%ld] nexthop %s%s", attr->refcnt,
356 inet_ntoa (attr->nexthop), VTY_NEWLINE);
357}
358
359void
360attr_show_all (struct vty *vty)
361{
362 hash_iterate (attrhash,
363 (void (*)(struct hash_backet *, void *))
364 attr_show_all_iterator,
365 vty);
366}
367
368void *
369bgp_attr_hash_alloc (struct attr *val)
370{
371 struct attr *attr;
372
373 attr = XMALLOC (MTYPE_ATTR, sizeof (struct attr));
374 *attr = *val;
375 attr->refcnt = 0;
376 return attr;
377}
378
379/* Internet argument attribute. */
380struct attr *
381bgp_attr_intern (struct attr *attr)
382{
383 struct attr *find;
384
385 /* Intern referenced strucutre. */
386 if (attr->aspath)
387 {
388 if (! attr->aspath->refcnt)
389 attr->aspath = aspath_intern (attr->aspath);
390 else
391 attr->aspath->refcnt++;
392 }
393 if (attr->community)
394 {
395 if (! attr->community->refcnt)
396 attr->community = community_intern (attr->community);
397 else
398 attr->community->refcnt++;
399 }
400 if (attr->ecommunity)
401 {
402 if (! attr->ecommunity->refcnt)
403 attr->ecommunity = ecommunity_intern (attr->ecommunity);
404 else
405 attr->ecommunity->refcnt++;
406 }
407 if (attr->cluster)
408 {
409 if (! attr->cluster->refcnt)
410 attr->cluster = cluster_intern (attr->cluster);
411 else
412 attr->cluster->refcnt++;
413 }
414 if (attr->transit)
415 {
416 if (! attr->transit->refcnt)
417 attr->transit = transit_intern (attr->transit);
418 else
419 attr->transit->refcnt++;
420 }
421
422 find = (struct attr *) hash_get (attrhash, attr, bgp_attr_hash_alloc);
423 find->refcnt++;
424
425 return find;
426}
427
428/* Make network statement's attribute. */
429struct attr *
430bgp_attr_default_set (struct attr *attr, u_char origin)
431{
432 memset (attr, 0, sizeof (struct attr));
433
434 attr->origin = origin;
435 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_ORIGIN);
436 attr->aspath = aspath_empty ();
437 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_AS_PATH);
438 attr->weight = 32768;
439 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP);
440#ifdef HAVE_IPV6
441 attr->mp_nexthop_len = 16;
442#endif
443 return attr;
444}
445
446/* Make network statement's attribute. */
447struct attr *
448bgp_attr_default_intern (u_char origin)
449{
450 struct attr attr;
451 struct attr *new;
452
453 memset (&attr, 0, sizeof (struct attr));
454
455 attr.origin = origin;
456 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_ORIGIN);
457 attr.aspath = aspath_empty ();
458 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_AS_PATH);
459 attr.weight = 32768;
460 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP);
461#ifdef HAVE_IPV6
462 attr.mp_nexthop_len = 16;
463#endif
464
465 new = bgp_attr_intern (&attr);
466 aspath_unintern (new->aspath);
467 return new;
468}
469
470struct attr *
471bgp_attr_aggregate_intern (struct bgp *bgp, u_char origin,
472 struct aspath *aspath,
473 struct community *community, int as_set)
474{
475 struct attr attr;
476 struct attr *new;
477
478 memset (&attr, 0, sizeof (struct attr));
479
480 /* Origin attribute. */
481 attr.origin = origin;
482 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_ORIGIN);
483
484 /* AS path attribute. */
485 if (aspath)
486 attr.aspath = aspath_intern (aspath);
487 else
488 attr.aspath = aspath_empty ();
489 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_AS_PATH);
490
491 /* Next hop attribute. */
492 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP);
493
494 if (community)
495 {
496 attr.community = community;
497 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_COMMUNITIES);
498 }
499
500 attr.weight = 32768;
501#ifdef HAVE_IPV6
502 attr.mp_nexthop_len = 16;
503#endif
504 if (! as_set)
505 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE);
506 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_AGGREGATOR);
507 if (CHECK_FLAG (bgp->config, BGP_CONFIG_CONFEDERATION))
508 attr.aggregator_as = bgp->confed_id;
509 else
510 attr.aggregator_as = bgp->as;
511 attr.aggregator_addr = bgp->router_id;
512
513 new = bgp_attr_intern (&attr);
514 aspath_unintern (new->aspath);
515 return new;
516}
517
518/* Free bgp attribute and aspath. */
519void
520bgp_attr_unintern (struct attr *attr)
521{
522 struct attr *ret;
523 struct aspath *aspath;
524 struct community *community;
525 struct ecommunity *ecommunity;
526 struct cluster_list *cluster;
527 struct transit *transit;
528
529 /* Decrement attribute reference. */
530 attr->refcnt--;
531 aspath = attr->aspath;
532 community = attr->community;
533 ecommunity = attr->ecommunity;
534 cluster = attr->cluster;
535 transit = attr->transit;
536
537 /* If reference becomes zero then free attribute object. */
538 if (attr->refcnt == 0)
539 {
540 ret = hash_release (attrhash, attr);
541 assert (ret != NULL);
542 XFREE (MTYPE_ATTR, attr);
543 }
544
545 /* aspath refcount shoud be decrement. */
546 if (aspath)
547 aspath_unintern (aspath);
548 if (community)
549 community_unintern (community);
550 if (ecommunity)
551 ecommunity_unintern (ecommunity);
552 if (cluster)
553 cluster_unintern (cluster);
554 if (transit)
555 transit_unintern (transit);
556}
557
558void
559bgp_attr_flush (struct attr *attr)
560{
561 if (attr->aspath && ! attr->aspath->refcnt)
562 aspath_free (attr->aspath);
563 if (attr->community && ! attr->community->refcnt)
564 community_free (attr->community);
565 if (attr->ecommunity && ! attr->ecommunity->refcnt)
566 ecommunity_free (attr->ecommunity);
567 if (attr->cluster && ! attr->cluster->refcnt)
568 cluster_free (attr->cluster);
569 if (attr->transit && ! attr->transit->refcnt)
570 transit_free (attr->transit);
571}
572
573/* Get origin attribute of the update message. */
574int
575bgp_attr_origin (struct peer *peer, bgp_size_t length,
576 struct attr *attr, u_char flag, u_char *startp)
577{
578 bgp_size_t total;
579
580 /* total is entire attribute length include Attribute Flags (1),
581 Attribute Type code (1) and Attribute length (1 or 2). */
582 total = length + (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN) ? 4 : 3);
583
584 /* If any recognized attribute has Attribute Flags that conflict
585 with the Attribute Type Code, then the Error Subcode is set to
586 Attribute Flags Error. The Data field contains the erroneous
587 attribute (type, length and value). */
588 if (flag != BGP_ATTR_FLAG_TRANS)
589 {
590 zlog (peer->log, LOG_ERR,
591 "Origin attribute flag isn't transitive %d", flag);
592 bgp_notify_send_with_data (peer,
593 BGP_NOTIFY_UPDATE_ERR,
594 BGP_NOTIFY_UPDATE_ATTR_FLAG_ERR,
595 startp, total);
596 return -1;
597 }
598
599 /* If any recognized attribute has Attribute Length that conflicts
600 with the expected length (based on the attribute type code), then
601 the Error Subcode is set to Attribute Length Error. The Data
602 field contains the erroneous attribute (type, length and
603 value). */
604 if (length != 1)
605 {
606 zlog (peer->log, LOG_ERR, "Origin attribute length is not one %d",
607 length);
608 bgp_notify_send_with_data (peer, BGP_NOTIFY_UPDATE_ERR,
609 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR,
610 startp, total);
611 return -1;
612 }
613
614 /* Fetch origin attribute. */
615 attr->origin = stream_getc (BGP_INPUT (peer));
616
617 /* If the ORIGIN attribute has an undefined value, then the Error
618 Subcode is set to Invalid Origin Attribute. The Data field
619 contains the unrecognized attribute (type, length and value). */
620 if ((attr->origin != BGP_ORIGIN_IGP)
621 && (attr->origin != BGP_ORIGIN_EGP)
622 && (attr->origin != BGP_ORIGIN_INCOMPLETE))
623 {
624 zlog (peer->log, LOG_ERR, "Origin attribute value is invalid %d",
625 attr->origin);
626
627 bgp_notify_send_with_data (peer,
628 BGP_NOTIFY_UPDATE_ERR,
629 BGP_NOTIFY_UPDATE_INVAL_ORIGIN,
630 startp, total);
631 return -1;
632 }
633
634 /* Set oring attribute flag. */
635 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_ORIGIN);
636
637 return 0;
638}
639
640/* Parse AS path information. This function is wrapper of
641 aspath_parse. */
642int
643bgp_attr_aspath (struct peer *peer, bgp_size_t length,
644 struct attr *attr, u_char flag, u_char *startp)
645{
646 struct bgp *bgp;
647 struct aspath *aspath;
648 bgp_size_t total;
649
650 total = length + (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN) ? 4 : 3);
651
652 /* Flag check. */
653 if (CHECK_FLAG (flag, BGP_ATTR_FLAG_OPTIONAL)
654 || ! CHECK_FLAG (flag, BGP_ATTR_FLAG_TRANS))
655 {
656 zlog (peer->log, LOG_ERR,
657 "Origin attribute flag isn't transitive %d", flag);
658 bgp_notify_send_with_data (peer,
659 BGP_NOTIFY_UPDATE_ERR,
660 BGP_NOTIFY_UPDATE_ATTR_FLAG_ERR,
661 startp, total);
662 return -1;
663 }
664
665 /* In case of IBGP, length will be zero. */
666 attr->aspath = aspath_parse (stream_pnt (peer->ibuf), length);
667 if (! attr->aspath)
668 {
669 zlog (peer->log, LOG_ERR, "Malformed AS path length is %d", length);
670 bgp_notify_send (peer,
671 BGP_NOTIFY_UPDATE_ERR,
672 BGP_NOTIFY_UPDATE_MAL_AS_PATH);
673 return -1;
674 }
675
676 bgp = peer->bgp;
677
678 /* First AS check for EBGP. */
679 if (bgp != NULL && bgp_flag_check (bgp, BGP_FLAG_ENFORCE_FIRST_AS))
680 {
681 if (peer_sort (peer) == BGP_PEER_EBGP
682 && ! aspath_firstas_check (attr->aspath, peer->as))
683 {
684 zlog (peer->log, LOG_ERR,
685 "%s incorrect first AS (must be %d)", peer->host, peer->as);
686 bgp_notify_send (peer,
687 BGP_NOTIFY_UPDATE_ERR,
688 BGP_NOTIFY_UPDATE_MAL_AS_PATH);
689 return -1;
690 }
691 }
692
693 /* local-as prepend */
694 if (peer->change_local_as &&
695 ! CHECK_FLAG (peer->flags, PEER_FLAG_LOCAL_AS_NO_PREPEND))
696 {
697 aspath = aspath_dup (attr->aspath);
698 aspath = aspath_add_seq (aspath, peer->change_local_as);
699 aspath_unintern (attr->aspath);
700 attr->aspath = aspath_intern (aspath);
701 }
702
703 /* Forward pointer. */
704 stream_forward (peer->ibuf, length);
705
706 /* Set aspath attribute flag. */
707 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_AS_PATH);
708
709 return 0;
710}
711
712/* Nexthop attribute. */
713int
714bgp_attr_nexthop (struct peer *peer, bgp_size_t length,
715 struct attr *attr, u_char flag, u_char *startp)
716{
717 bgp_size_t total;
718
719 total = length + (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN) ? 4 : 3);
720
721 /* Flag check. */
722 if (CHECK_FLAG (flag, BGP_ATTR_FLAG_OPTIONAL)
723 || ! CHECK_FLAG (flag, BGP_ATTR_FLAG_TRANS))
724 {
725 zlog (peer->log, LOG_ERR,
726 "Origin attribute flag isn't transitive %d", flag);
727 bgp_notify_send_with_data (peer,
728 BGP_NOTIFY_UPDATE_ERR,
729 BGP_NOTIFY_UPDATE_ATTR_FLAG_ERR,
730 startp, total);
731 return -1;
732 }
733
734 /* Check nexthop attribute length. */
735 if (length != 4)
736 {
737 zlog (peer->log, LOG_ERR, "Nexthop attribute length isn't four [%d]",
738 length);
739
740 bgp_notify_send_with_data (peer,
741 BGP_NOTIFY_UPDATE_ERR,
742 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR,
743 startp, total);
744 return -1;
745 }
746
747 attr->nexthop.s_addr = stream_get_ipv4 (peer->ibuf);
748 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP);
749
750 return 0;
751}
752
753/* MED atrribute. */
754int
755bgp_attr_med (struct peer *peer, bgp_size_t length,
756 struct attr *attr, u_char flag, u_char *startp)
757{
758 bgp_size_t total;
759
760 total = length + (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN) ? 4 : 3);
761
762 /* Length check. */
763 if (length != 4)
764 {
765 zlog (peer->log, LOG_ERR,
766 "MED attribute length isn't four [%d]", length);
767
768 bgp_notify_send_with_data (peer,
769 BGP_NOTIFY_UPDATE_ERR,
770 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR,
771 startp, total);
772 return -1;
773 }
774
775 attr->med = stream_getl (peer->ibuf);
776
777 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC);
778
779 return 0;
780}
781
782/* Local preference attribute. */
783int
784bgp_attr_local_pref (struct peer *peer, bgp_size_t length,
785 struct attr *attr, u_char flag)
786{
787 /* If it is contained in an UPDATE message that is received from an
788 external peer, then this attribute MUST be ignored by the
789 receiving speaker. */
790 if (peer_sort (peer) == BGP_PEER_EBGP)
791 {
792 stream_forward (peer->ibuf, length);
793 return 0;
794 }
795
796 if (length == 4)
797 attr->local_pref = stream_getl (peer->ibuf);
798 else
799 attr->local_pref = 0;
800
801 /* Set atomic aggregate flag. */
802 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF);
803
804 return 0;
805}
806
807/* Atomic aggregate. */
808int
809bgp_attr_atomic (struct peer *peer, bgp_size_t length,
810 struct attr *attr, u_char flag)
811{
812 if (length != 0)
813 {
814 zlog (peer->log, LOG_ERR, "Bad atomic aggregate length %d", length);
815
816 bgp_notify_send (peer,
817 BGP_NOTIFY_UPDATE_ERR,
818 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
819 return -1;
820 }
821
822 /* Set atomic aggregate flag. */
823 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE);
824
825 return 0;
826}
827
828/* Aggregator attribute */
829int
830bgp_attr_aggregator (struct peer *peer, bgp_size_t length,
831 struct attr *attr, u_char flag)
832{
833 if (length != 6)
834 {
835 zlog (peer->log, LOG_ERR, "Aggregator length is not 6 [%d]", length);
836
837 bgp_notify_send (peer,
838 BGP_NOTIFY_UPDATE_ERR,
839 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
840 return -1;
841 }
842 attr->aggregator_as = stream_getw (peer->ibuf);
843 attr->aggregator_addr.s_addr = stream_get_ipv4 (peer->ibuf);
844
845 /* Set atomic aggregate flag. */
846 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_AGGREGATOR);
847
848 return 0;
849}
850
851/* Community attribute. */
852int
853bgp_attr_community (struct peer *peer, bgp_size_t length,
854 struct attr *attr, u_char flag)
855{
856 if (length == 0)
857 attr->community = NULL;
858 else
859 {
paul5228ad22004-06-04 17:58:18 +0000860 attr->community =
861 community_parse ((u_int32_t *)stream_pnt (peer->ibuf), length);
paul718e3742002-12-13 20:15:29 +0000862 stream_forward (peer->ibuf, length);
863 }
864
865 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_COMMUNITIES);
866
867 return 0;
868}
869
870/* Originator ID attribute. */
871int
872bgp_attr_originator_id (struct peer *peer, bgp_size_t length,
873 struct attr *attr, u_char flag)
874{
875 if (length != 4)
876 {
877 zlog (peer->log, LOG_ERR, "Bad originator ID length %d", length);
878
879 bgp_notify_send (peer,
880 BGP_NOTIFY_UPDATE_ERR,
881 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
882 return -1;
883 }
884
885 attr->originator_id.s_addr = stream_get_ipv4 (peer->ibuf);
886
887 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_ORIGINATOR_ID);
888
889 return 0;
890}
891
892/* Cluster list attribute. */
893int
894bgp_attr_cluster_list (struct peer *peer, bgp_size_t length,
895 struct attr *attr, u_char flag)
896{
897 /* Check length. */
898 if (length % 4)
899 {
900 zlog (peer->log, LOG_ERR, "Bad cluster list length %d", length);
901
902 bgp_notify_send (peer,
903 BGP_NOTIFY_UPDATE_ERR,
904 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
905 return -1;
906 }
907
paul5228ad22004-06-04 17:58:18 +0000908 attr->cluster = cluster_parse ((struct in_addr *)stream_pnt (peer->ibuf),
909 length);
paul718e3742002-12-13 20:15:29 +0000910
911 stream_forward (peer->ibuf, length);;
912
913 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_CLUSTER_LIST);
914
915 return 0;
916}
917
918/* Multiprotocol reachability information parse. */
919int
920bgp_mp_reach_parse (struct peer *peer, bgp_size_t length, struct attr *attr,
921 struct bgp_nlri *mp_update)
922{
923 u_int16_t afi;
924 u_char safi;
925 u_char snpa_num;
926 u_char snpa_len;
927 u_char *lim;
928 bgp_size_t nlri_len;
929 int ret;
930 struct stream *s;
931
932 /* Set end of packet. */
933 s = peer->ibuf;
934 lim = stream_pnt (s) + length;
935
936 /* Load AFI, SAFI. */
937 afi = stream_getw (s);
938 safi = stream_getc (s);
939
940 /* Get nexthop length. */
941 attr->mp_nexthop_len = stream_getc (s);
942
943 /* Nexthop length check. */
944 switch (attr->mp_nexthop_len)
945 {
946 case 4:
947 stream_get (&attr->mp_nexthop_global_in, s, 4);
948 break;
949 case 12:
950 {
951 u_int32_t rd_high;
952 u_int32_t rd_low;
953
954 rd_high = stream_getl (s);
955 rd_low = stream_getl (s);
956 stream_get (&attr->mp_nexthop_global_in, s, 4);
957 }
958 break;
959#ifdef HAVE_IPV6
960 case 16:
961 stream_get (&attr->mp_nexthop_global, s, 16);
962 break;
963 case 32:
964 stream_get (&attr->mp_nexthop_global, s, 16);
965 stream_get (&attr->mp_nexthop_local, s, 16);
966 if (! IN6_IS_ADDR_LINKLOCAL (&attr->mp_nexthop_local))
967 {
968 char buf1[INET6_ADDRSTRLEN];
969 char buf2[INET6_ADDRSTRLEN];
970
971 if (BGP_DEBUG (update, UPDATE_IN))
ajs557865c2004-12-08 19:59:11 +0000972 zlog_debug ("%s got two nexthop %s %s but second one is not a link-local nexthop", peer->host,
paul718e3742002-12-13 20:15:29 +0000973 inet_ntop (AF_INET6, &attr->mp_nexthop_global,
974 buf1, INET6_ADDRSTRLEN),
975 inet_ntop (AF_INET6, &attr->mp_nexthop_local,
976 buf2, INET6_ADDRSTRLEN));
977
978 attr->mp_nexthop_len = 16;
979 }
980 break;
981#endif /* HAVE_IPV6 */
982 default:
983 zlog_info ("Wrong multiprotocol next hop length: %d",
984 attr->mp_nexthop_len);
985 return -1;
986 break;
987 }
988
989 snpa_num = stream_getc (s);
990
991 while (snpa_num--)
992 {
993 snpa_len = stream_getc (s);
994 stream_forward (s, (snpa_len + 1) >> 1);
995 }
996
997 /* If peer is based on old draft-00. I read NLRI length from the
998 packet. */
999 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1000 {
1001 bgp_size_t nlri_total_len;
1002 nlri_total_len = stream_getw (s);
1003 }
1004
1005 nlri_len = lim - stream_pnt (s);
1006
1007 if (safi != BGP_SAFI_VPNV4)
1008 {
1009 ret = bgp_nlri_sanity_check (peer, afi, stream_pnt (s), nlri_len);
1010 if (ret < 0)
1011 return -1;
1012 }
1013
1014 mp_update->afi = afi;
1015 mp_update->safi = safi;
1016 mp_update->nlri = stream_pnt (s);
1017 mp_update->length = nlri_len;
1018
1019 stream_forward (s, nlri_len);
1020
1021 return 0;
1022}
1023
1024/* Multiprotocol unreachable parse */
1025int
1026bgp_mp_unreach_parse (struct peer *peer, int length,
1027 struct bgp_nlri *mp_withdraw)
1028{
1029 struct stream *s;
1030 u_int16_t afi;
1031 u_char safi;
1032 u_char *lim;
1033 u_int16_t withdraw_len;
1034 int ret;
1035
1036 s = peer->ibuf;
1037 lim = stream_pnt (s) + length;
1038
1039 afi = stream_getw (s);
1040 safi = stream_getc (s);
1041
1042 withdraw_len = lim - stream_pnt (s);
1043
1044 if (safi != BGP_SAFI_VPNV4)
1045 {
1046 ret = bgp_nlri_sanity_check (peer, afi, stream_pnt (s), withdraw_len);
1047 if (ret < 0)
1048 return -1;
1049 }
1050
1051 mp_withdraw->afi = afi;
1052 mp_withdraw->safi = safi;
1053 mp_withdraw->nlri = stream_pnt (s);
1054 mp_withdraw->length = withdraw_len;
1055
1056 stream_forward (s, withdraw_len);
1057
1058 return 0;
1059}
1060
1061/* Extended Community attribute. */
1062int
1063bgp_attr_ext_communities (struct peer *peer, bgp_size_t length,
1064 struct attr *attr, u_char flag)
1065{
1066 if (length == 0)
1067 attr->ecommunity = NULL;
1068 else
1069 {
paul5228ad22004-06-04 17:58:18 +00001070 attr->ecommunity =
1071 ecommunity_parse ((u_int8_t *)stream_pnt (peer->ibuf), length);
paul718e3742002-12-13 20:15:29 +00001072 stream_forward (peer->ibuf, length);
1073 }
1074 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_EXT_COMMUNITIES);
1075
1076 return 0;
1077}
1078
1079/* BGP unknown attribute treatment. */
1080int
1081bgp_attr_unknown (struct peer *peer, struct attr *attr, u_char flag,
1082 u_char type, bgp_size_t length, u_char *startp)
1083{
1084 bgp_size_t total;
1085 struct transit *transit;
1086
1087 if (BGP_DEBUG (events, EVENTS))
ajs557865c2004-12-08 19:59:11 +00001088 zlog (peer->log, LOG_DEBUG,
paul718e3742002-12-13 20:15:29 +00001089 "Unknown attribute type %d length %d is received", type, length);
1090
1091 /* Forward read pointer of input stream. */
1092 stream_forward (peer->ibuf, length);
1093
1094 /* Adjest total length to include type and length. */
1095 total = length + (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN) ? 4 : 3);
1096
1097 /* If any of the mandatory well-known attributes are not recognized,
1098 then the Error Subcode is set to Unrecognized Well-known
1099 Attribute. The Data field contains the unrecognized attribute
1100 (type, length and value). */
1101 if (! CHECK_FLAG (flag, BGP_ATTR_FLAG_OPTIONAL))
1102 {
1103 /* Adjust startp to do not include flag value. */
1104 bgp_notify_send_with_data (peer,
1105 BGP_NOTIFY_UPDATE_ERR,
1106 BGP_NOTIFY_UPDATE_UNREC_ATTR,
1107 startp, total);
1108 return -1;
1109 }
1110
1111 /* Unrecognized non-transitive optional attributes must be quietly
1112 ignored and not passed along to other BGP peers. */
1113 if (! CHECK_FLAG (flag, BGP_ATTR_FLAG_TRANS))
1114 return 0;
1115
1116 /* If a path with recognized transitive optional attribute is
1117 accepted and passed along to other BGP peers and the Partial bit
1118 in the Attribute Flags octet is set to 1 by some previous AS, it
1119 is not set back to 0 by the current AS. */
1120 SET_FLAG (*startp, BGP_ATTR_FLAG_PARTIAL);
1121
1122 /* Store transitive attribute to the end of attr->transit. */
1123 if (! attr->transit)
1124 {
1125 attr->transit = XMALLOC (MTYPE_TRANSIT, sizeof (struct transit));
1126 memset (attr->transit, 0, sizeof (struct transit));
1127 }
1128
1129 transit = attr->transit;
1130
1131 if (transit->val)
1132 transit->val = XREALLOC (MTYPE_TRANSIT_VAL, transit->val,
1133 transit->length + total);
1134 else
1135 transit->val = XMALLOC (MTYPE_TRANSIT_VAL, total);
1136
1137 memcpy (transit->val + transit->length, startp, total);
1138 transit->length += total;
1139
1140 return 0;
1141}
1142
1143/* Read attribute of update packet. This function is called from
1144 bgp_update() in bgpd.c. */
1145int
1146bgp_attr_parse (struct peer *peer, struct attr *attr, bgp_size_t size,
1147 struct bgp_nlri *mp_update, struct bgp_nlri *mp_withdraw)
1148{
1149 int ret;
1150 u_char flag;
1151 u_char type;
1152 bgp_size_t length;
1153 u_char *startp, *endp;
1154 u_char *attr_endp;
1155 u_char seen[BGP_ATTR_BITMAP_SIZE];
1156
1157 /* Initialize bitmap. */
1158 memset (seen, 0, BGP_ATTR_BITMAP_SIZE);
1159
1160 /* End pointer of BGP attribute. */
1161 endp = BGP_INPUT_PNT (peer) + size;
1162
1163 /* Get attributes to the end of attribute length. */
1164 while (BGP_INPUT_PNT (peer) < endp)
1165 {
1166 /* Check remaining length check.*/
1167 if (endp - BGP_INPUT_PNT (peer) < BGP_ATTR_MIN_LEN)
1168 {
gdtc29fdba2004-12-09 14:46:46 +00001169 /* XXX warning: long int format, int arg (arg 5) */
paul718e3742002-12-13 20:15:29 +00001170 zlog (peer->log, LOG_WARNING,
paula2b1ecd2004-10-31 18:58:09 +00001171 "%s error BGP attribute length %ld is smaller than min len",
paul718e3742002-12-13 20:15:29 +00001172 peer->host, endp - STREAM_PNT (BGP_INPUT (peer)));
1173
1174 bgp_notify_send (peer,
1175 BGP_NOTIFY_UPDATE_ERR,
1176 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
1177 return -1;
1178 }
1179
1180 /* Fetch attribute flag and type. */
1181 startp = BGP_INPUT_PNT (peer);
1182 flag = stream_getc (BGP_INPUT (peer));
1183 type = stream_getc (BGP_INPUT (peer));
1184
1185 /* Check extended attribue length bit. */
1186 if (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN))
1187 length = stream_getw (BGP_INPUT (peer));
1188 else
1189 length = stream_getc (BGP_INPUT (peer));
1190
1191 /* If any attribute appears more than once in the UPDATE
1192 message, then the Error Subcode is set to Malformed Attribute
1193 List. */
1194
1195 if (CHECK_BITMAP (seen, type))
1196 {
1197 zlog (peer->log, LOG_WARNING,
1198 "%s error BGP attribute type %d appears twice in a message",
1199 peer->host, type);
1200
1201 bgp_notify_send (peer,
1202 BGP_NOTIFY_UPDATE_ERR,
1203 BGP_NOTIFY_UPDATE_MAL_ATTR);
1204 return -1;
1205 }
1206
1207 /* Set type to bitmap to check duplicate attribute. `type' is
1208 unsigned char so it never overflow bitmap range. */
1209
1210 SET_BITMAP (seen, type);
1211
1212 /* Overflow check. */
1213 attr_endp = BGP_INPUT_PNT (peer) + length;
1214
1215 if (attr_endp > endp)
1216 {
1217 zlog (peer->log, LOG_WARNING,
1218 "%s BGP type %d length %d is too large, attribute total length is %d. attr_endp is %p. endp is %p", peer->host, type, length, size, attr_endp, endp);
1219 bgp_notify_send (peer,
1220 BGP_NOTIFY_UPDATE_ERR,
1221 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
1222 return -1;
1223 }
1224
1225 /* OK check attribute and store it's value. */
1226 switch (type)
1227 {
1228 case BGP_ATTR_ORIGIN:
1229 ret = bgp_attr_origin (peer, length, attr, flag, startp);
1230 break;
1231 case BGP_ATTR_AS_PATH:
1232 ret = bgp_attr_aspath (peer, length, attr, flag, startp);
1233 break;
1234 case BGP_ATTR_NEXT_HOP:
1235 ret = bgp_attr_nexthop (peer, length, attr, flag, startp);
1236 break;
1237 case BGP_ATTR_MULTI_EXIT_DISC:
1238 ret = bgp_attr_med (peer, length, attr, flag, startp);
1239 break;
1240 case BGP_ATTR_LOCAL_PREF:
1241 ret = bgp_attr_local_pref (peer, length, attr, flag);
1242 break;
1243 case BGP_ATTR_ATOMIC_AGGREGATE:
1244 ret = bgp_attr_atomic (peer, length, attr, flag);
1245 break;
1246 case BGP_ATTR_AGGREGATOR:
1247 ret = bgp_attr_aggregator (peer, length, attr, flag);
1248 break;
1249 case BGP_ATTR_COMMUNITIES:
1250 ret = bgp_attr_community (peer, length, attr, flag);
1251 break;
1252 case BGP_ATTR_ORIGINATOR_ID:
1253 ret = bgp_attr_originator_id (peer, length, attr, flag);
1254 break;
1255 case BGP_ATTR_CLUSTER_LIST:
1256 ret = bgp_attr_cluster_list (peer, length, attr, flag);
1257 break;
1258 case BGP_ATTR_MP_REACH_NLRI:
1259 ret = bgp_mp_reach_parse (peer, length, attr, mp_update);
1260 break;
1261 case BGP_ATTR_MP_UNREACH_NLRI:
1262 ret = bgp_mp_unreach_parse (peer, length, mp_withdraw);
1263 break;
1264 case BGP_ATTR_EXT_COMMUNITIES:
1265 ret = bgp_attr_ext_communities (peer, length, attr, flag);
1266 break;
1267 default:
1268 ret = bgp_attr_unknown (peer, attr, flag, type, length, startp);
1269 break;
1270 }
1271
1272 /* If error occured immediately return to the caller. */
1273 if (ret < 0)
1274 return ret;
1275
1276 /* Check the fetched length. */
1277 if (BGP_INPUT_PNT (peer) != attr_endp)
1278 {
1279 zlog (peer->log, LOG_WARNING,
1280 "%s BGP attribute fetch error", peer->host);
1281 bgp_notify_send (peer,
1282 BGP_NOTIFY_UPDATE_ERR,
1283 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
1284 return -1;
1285 }
1286 }
1287
1288 /* Check final read pointer is same as end pointer. */
1289 if (BGP_INPUT_PNT (peer) != endp)
1290 {
1291 zlog (peer->log, LOG_WARNING,
1292 "%s BGP attribute length mismatch", peer->host);
1293 bgp_notify_send (peer,
1294 BGP_NOTIFY_UPDATE_ERR,
1295 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
1296 return -1;
1297 }
1298
1299 /* Finally intern unknown attribute. */
1300 if (attr->transit)
1301 attr->transit = transit_intern (attr->transit);
1302
1303 return 0;
1304}
1305
1306/* Well-known attribute check. */
1307int
1308bgp_attr_check (struct peer *peer, struct attr *attr)
1309{
1310 u_char type = 0;
1311
1312 if (! CHECK_FLAG (attr->flag, ATTR_FLAG_BIT (BGP_ATTR_ORIGIN)))
1313 type = BGP_ATTR_ORIGIN;
1314
1315 if (! CHECK_FLAG (attr->flag, ATTR_FLAG_BIT (BGP_ATTR_AS_PATH)))
1316 type = BGP_ATTR_AS_PATH;
1317
1318 if (! CHECK_FLAG (attr->flag, ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP)))
1319 type = BGP_ATTR_NEXT_HOP;
1320
1321 if (peer_sort (peer) == BGP_PEER_IBGP
1322 && ! CHECK_FLAG (attr->flag, ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF)))
1323 type = BGP_ATTR_LOCAL_PREF;
1324
1325 if (type)
1326 {
1327 zlog (peer->log, LOG_WARNING,
1328 "%s Missing well-known attribute %d.",
1329 peer->host, type);
1330 bgp_notify_send_with_data (peer,
1331 BGP_NOTIFY_UPDATE_ERR,
1332 BGP_NOTIFY_UPDATE_MISS_ATTR,
1333 &type, 1);
1334 return -1;
1335 }
1336 return 0;
1337}
1338
1339int stream_put_prefix (struct stream *, struct prefix *);
1340
1341/* Make attribute packet. */
1342bgp_size_t
1343bgp_packet_attribute (struct bgp *bgp, struct peer *peer,
1344 struct stream *s, struct attr *attr, struct prefix *p,
1345 afi_t afi, safi_t safi, struct peer *from,
paul5228ad22004-06-04 17:58:18 +00001346 struct prefix_rd *prd, char *tag)
paul718e3742002-12-13 20:15:29 +00001347{
1348 unsigned long cp;
1349 struct aspath *aspath;
1350
1351 if (! bgp)
1352 bgp = bgp_get_default ();
1353
1354 /* Remember current pointer. */
1355 cp = stream_get_putp (s);
1356
1357 /* Origin attribute. */
1358 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1359 stream_putc (s, BGP_ATTR_ORIGIN);
1360 stream_putc (s, 1);
1361 stream_putc (s, attr->origin);
1362
1363 /* AS path attribute. */
1364
1365 /* If remote-peer is EBGP */
1366 if (peer_sort (peer) == BGP_PEER_EBGP
1367 && (! CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_AS_PATH_UNCHANGED)
1368 || attr->aspath->length == 0)
paulfee0f4c2004-09-13 05:12:46 +00001369 && (! CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_RSERVER_CLIENT)))
paul718e3742002-12-13 20:15:29 +00001370 {
1371 aspath = aspath_dup (attr->aspath);
1372
1373 if (CHECK_FLAG(bgp->config, BGP_CONFIG_CONFEDERATION))
1374 {
1375 /* Strip the confed info, and then stuff our path CONFED_ID
1376 on the front */
1377 aspath = aspath_delete_confed_seq (aspath);
1378 aspath = aspath_add_seq (aspath, bgp->confed_id);
1379 }
1380 else
1381 {
1382 aspath = aspath_add_seq (aspath, peer->local_as);
1383 if (peer->change_local_as)
1384 aspath = aspath_add_seq (aspath, peer->change_local_as);
1385 }
1386 }
1387 else if (peer_sort (peer) == BGP_PEER_CONFED)
1388 {
1389 /* A confed member, so we need to do the AS_CONFED_SEQUENCE thing */
1390 aspath = aspath_dup (attr->aspath);
1391 aspath = aspath_add_confed_seq (aspath, peer->local_as);
1392 }
1393 else
1394 aspath = attr->aspath;
1395
1396 /* AS path attribute extended length bit check. */
1397 if (aspath->length > 255)
1398 {
1399 stream_putc (s, BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1400 stream_putc (s, BGP_ATTR_AS_PATH);
1401 stream_putw (s, aspath->length);
1402 }
1403 else
1404 {
1405 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1406 stream_putc(s, BGP_ATTR_AS_PATH);
1407 stream_putc (s, aspath->length);
1408 }
1409 stream_put (s, aspath->data, aspath->length);
1410
1411 if (aspath != attr->aspath)
1412 aspath_free (aspath);
1413
1414 /* Nexthop attribute. */
1415 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP) && afi == AFI_IP)
1416 {
1417 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1418 stream_putc (s, BGP_ATTR_NEXT_HOP);
1419 stream_putc (s, 4);
1420 if (safi == SAFI_MPLS_VPN)
1421 {
1422 if (attr->nexthop.s_addr == 0)
1423 stream_put_ipv4 (s, peer->nexthop.v4.s_addr);
1424 else
1425 stream_put_ipv4 (s, attr->nexthop.s_addr);
1426 }
1427 else
1428 stream_put_ipv4 (s, attr->nexthop.s_addr);
1429 }
1430
1431 /* MED attribute. */
1432 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC))
1433 {
1434 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1435 stream_putc (s, BGP_ATTR_MULTI_EXIT_DISC);
1436 stream_putc (s, 4);
1437 stream_putl (s, attr->med);
1438 }
1439
1440 /* Local preference. */
1441 if (peer_sort (peer) == BGP_PEER_IBGP ||
1442 peer_sort (peer) == BGP_PEER_CONFED)
1443 {
1444 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1445 stream_putc (s, BGP_ATTR_LOCAL_PREF);
1446 stream_putc (s, 4);
1447 stream_putl (s, attr->local_pref);
1448 }
1449
1450 /* Atomic aggregate. */
1451 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE))
1452 {
1453 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1454 stream_putc (s, BGP_ATTR_ATOMIC_AGGREGATE);
1455 stream_putc (s, 0);
1456 }
1457
1458 /* Aggregator. */
1459 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_AGGREGATOR))
1460 {
1461 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1462 stream_putc (s, BGP_ATTR_AGGREGATOR);
1463 stream_putc (s, 6);
1464 stream_putw (s, attr->aggregator_as);
1465 stream_put_ipv4 (s, attr->aggregator_addr.s_addr);
1466 }
1467
1468 /* Community attribute. */
1469 if (CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_SEND_COMMUNITY)
1470 && (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_COMMUNITIES)))
1471 {
1472 if (attr->community->size * 4 > 255)
1473 {
1474 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1475 stream_putc (s, BGP_ATTR_COMMUNITIES);
1476 stream_putw (s, attr->community->size * 4);
1477 }
1478 else
1479 {
1480 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1481 stream_putc (s, BGP_ATTR_COMMUNITIES);
1482 stream_putc (s, attr->community->size * 4);
1483 }
1484 stream_put (s, attr->community->val, attr->community->size * 4);
1485 }
1486
1487 /* Route Reflector. */
1488 if (peer_sort (peer) == BGP_PEER_IBGP
1489 && from
1490 && peer_sort (from) == BGP_PEER_IBGP)
1491 {
1492 /* Originator ID. */
1493 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1494 stream_putc (s, BGP_ATTR_ORIGINATOR_ID);
1495 stream_putc (s, 4);
1496
1497 if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID))
1498 stream_put_in_addr (s, &attr->originator_id);
1499 else
1500 {
1501 if (from)
1502 stream_put_in_addr (s, &from->remote_id);
1503 else
1504 stream_put_in_addr (s, &attr->originator_id);
1505 }
1506
1507 /* Cluster list. */
1508 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1509 stream_putc (s, BGP_ATTR_CLUSTER_LIST);
1510
1511 if (attr->cluster)
1512 {
1513 stream_putc (s, attr->cluster->length + 4);
1514 /* If this peer configuration's parent BGP has cluster_id. */
1515 if (bgp->config & BGP_CONFIG_CLUSTER_ID)
1516 stream_put_in_addr (s, &bgp->cluster_id);
1517 else
1518 stream_put_in_addr (s, &bgp->router_id);
1519 stream_put (s, attr->cluster->list, attr->cluster->length);
1520 }
1521 else
1522 {
1523 stream_putc (s, 4);
1524 /* If this peer configuration's parent BGP has cluster_id. */
1525 if (bgp->config & BGP_CONFIG_CLUSTER_ID)
1526 stream_put_in_addr (s, &bgp->cluster_id);
1527 else
1528 stream_put_in_addr (s, &bgp->router_id);
1529 }
1530 }
1531
1532#ifdef HAVE_IPV6
1533 /* If p is IPv6 address put it into attribute. */
1534 if (p->family == AF_INET6)
1535 {
1536 unsigned long sizep;
1537 unsigned long draftp = 0;
1538
1539 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1540 stream_putc (s, BGP_ATTR_MP_REACH_NLRI);
1541 sizep = stream_get_putp (s);
1542 stream_putc (s, 0); /* Length of this attribute. */
1543 stream_putw (s, AFI_IP6); /* AFI */
1544 stream_putc (s, safi); /* SAFI */
1545
1546 stream_putc (s, attr->mp_nexthop_len);
1547
1548 if (attr->mp_nexthop_len == 16)
1549 stream_put (s, &attr->mp_nexthop_global, 16);
1550 else if (attr->mp_nexthop_len == 32)
1551 {
1552 stream_put (s, &attr->mp_nexthop_global, 16);
1553 stream_put (s, &attr->mp_nexthop_local, 16);
1554 }
1555
1556 /* SNPA */
1557 stream_putc (s, 0);
1558
1559 /* In case of old draft BGP-4+. */
1560 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1561 {
1562 draftp = stream_get_putp (s);
1563 stream_putw (s, 0);
1564 }
1565
1566 /* Prefix write. */
1567 stream_put_prefix (s, p);
1568
1569 /* Set MP attribute length. */
1570 stream_putc_at (s, sizep, (stream_get_putp (s) - sizep) - 1);
1571
1572 /* In case of old draft BGP-4+. */
1573 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1574 stream_putw_at (s, draftp, (stream_get_putp (s) - draftp) - 2);
1575 }
1576#endif /* HAVE_IPV6 */
1577
1578 if (p->family == AF_INET && safi == SAFI_MULTICAST)
1579 {
1580 unsigned long sizep;
1581 unsigned long draftp = 0;
1582
1583 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1584 stream_putc (s, BGP_ATTR_MP_REACH_NLRI);
1585 sizep = stream_get_putp (s);
1586 stream_putc (s, 0); /* Length of this attribute. */
1587 stream_putw (s, AFI_IP); /* AFI */
1588 stream_putc (s, SAFI_MULTICAST); /* SAFI */
1589
1590 stream_putc (s, 4);
1591 stream_put_ipv4 (s, attr->nexthop.s_addr);
1592
1593 /* SNPA */
1594 stream_putc (s, 0);
1595
1596 /* In case of old draft BGP-4+. */
1597 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1598 {
1599 draftp = stream_get_putp (s);
1600 stream_putw (s, 0);
1601 }
1602
1603 /* Prefix write. */
1604 stream_put_prefix (s, p);
1605
1606 /* Set MP attribute length. */
1607 stream_putc_at (s, sizep, (stream_get_putp (s) - sizep) - 1);
1608
1609 /* In case of old draft BGP-4+. */
1610 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1611 stream_putw_at (s, draftp, (stream_get_putp (s) - draftp) - 2);
1612 }
1613
1614 if (p->family == AF_INET && safi == SAFI_MPLS_VPN)
1615 {
1616 unsigned long sizep;
1617 unsigned long draftp = 0;
1618
1619 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1620 stream_putc (s, BGP_ATTR_MP_REACH_NLRI);
1621 sizep = stream_get_putp (s);
1622 stream_putc (s, 0); /* Length of this attribute. */
1623 stream_putw (s, AFI_IP); /* AFI */
1624 stream_putc (s, BGP_SAFI_VPNV4); /* SAFI */
1625
1626 stream_putc (s, 12);
1627 stream_putl (s, 0);
1628 stream_putl (s, 0);
1629 stream_put (s, &attr->mp_nexthop_global_in, 4);
1630
1631 /* SNPA */
1632 stream_putc (s, 0);
1633
1634 /* In case of old draft BGP-4+. */
1635 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1636 {
1637 draftp = stream_get_putp (s);
1638 stream_putw (s, 0);
1639 }
1640
1641 /* Tag, RD, Prefix write. */
1642 stream_putc (s, p->prefixlen + 88);
1643 stream_put (s, tag, 3);
1644 stream_put (s, prd->val, 8);
1645 stream_put (s, &p->u.prefix, PSIZE (p->prefixlen));
1646
1647 /* Set MP attribute length. */
1648 stream_putc_at (s, sizep, (stream_get_putp (s) - sizep) - 1);
1649
1650 /* In case of old draft BGP-4+. */
1651 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1652 stream_putw_at (s, draftp, (stream_get_putp (s) - draftp) - 2);
1653 }
1654
1655 /* Extended Communities attribute. */
1656 if (CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_SEND_EXT_COMMUNITY)
1657 && (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_EXT_COMMUNITIES)))
1658 {
hasso4372df72004-05-20 10:20:02 +00001659 if (peer_sort (peer) == BGP_PEER_IBGP || peer_sort (peer) == BGP_PEER_CONFED)
paul718e3742002-12-13 20:15:29 +00001660 {
hasso4372df72004-05-20 10:20:02 +00001661 if (attr->ecommunity->size * 8 > 255)
1662 {
1663 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1664 stream_putc (s, BGP_ATTR_EXT_COMMUNITIES);
1665 stream_putw (s, attr->ecommunity->size * 8);
1666 }
1667 else
1668 {
1669 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1670 stream_putc (s, BGP_ATTR_EXT_COMMUNITIES);
1671 stream_putc (s, attr->ecommunity->size * 8);
1672 }
1673 stream_put (s, attr->ecommunity->val, attr->ecommunity->size * 8);
paul718e3742002-12-13 20:15:29 +00001674 }
1675 else
1676 {
paul5228ad22004-06-04 17:58:18 +00001677 u_int8_t *pnt;
hasso4372df72004-05-20 10:20:02 +00001678 int tbit;
1679 int ecom_tr_size = 0;
1680 int i;
1681
1682 for (i = 0; i < attr->ecommunity->size; i++)
1683 {
1684 pnt = attr->ecommunity->val + (i * 8);
1685 tbit = *pnt;
1686
1687 if (CHECK_FLAG (tbit, ECOMMUNITY_FLAG_NON_TRANSITIVE))
1688 continue;
1689
1690 ecom_tr_size++;
1691 }
1692
1693 if (ecom_tr_size)
1694 {
1695 if (ecom_tr_size * 8 > 255)
1696 {
1697 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1698 stream_putc (s, BGP_ATTR_EXT_COMMUNITIES);
1699 stream_putw (s, ecom_tr_size * 8);
1700 }
1701 else
1702 {
1703 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1704 stream_putc (s, BGP_ATTR_EXT_COMMUNITIES);
1705 stream_putc (s, ecom_tr_size * 8);
1706 }
1707
1708 for (i = 0; i < attr->ecommunity->size; i++)
1709 {
1710 pnt = attr->ecommunity->val + (i * 8);
1711 tbit = *pnt;
1712
1713 if (CHECK_FLAG (tbit, ECOMMUNITY_FLAG_NON_TRANSITIVE))
1714 continue;
1715
1716 stream_put (s, pnt, 8);
1717 }
1718 }
paul718e3742002-12-13 20:15:29 +00001719 }
paul718e3742002-12-13 20:15:29 +00001720 }
1721
1722 /* Unknown transit attribute. */
1723 if (attr->transit)
1724 stream_put (s, attr->transit->val, attr->transit->length);
1725
1726 /* Return total size of attribute. */
1727 return stream_get_putp (s) - cp;
1728}
1729
1730bgp_size_t
1731bgp_packet_withdraw (struct peer *peer, struct stream *s, struct prefix *p,
1732 afi_t afi, safi_t safi, struct prefix_rd *prd,
paul5228ad22004-06-04 17:58:18 +00001733 char *tag)
paul718e3742002-12-13 20:15:29 +00001734{
1735 unsigned long cp;
1736 unsigned long attrlen_pnt;
1737 bgp_size_t size;
1738
1739 cp = stream_get_putp (s);
1740
1741 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1742 stream_putc (s, BGP_ATTR_MP_UNREACH_NLRI);
1743
1744 attrlen_pnt = stream_get_putp (s);
1745 stream_putc (s, 0); /* Length of this attribute. */
1746
1747 stream_putw (s, family2afi (p->family));
1748
1749 if (safi == SAFI_MPLS_VPN)
1750 {
1751 /* SAFI */
1752 stream_putc (s, BGP_SAFI_VPNV4);
1753
1754 /* prefix. */
1755 stream_putc (s, p->prefixlen + 88);
1756 stream_put (s, tag, 3);
1757 stream_put (s, prd->val, 8);
1758 stream_put (s, &p->u.prefix, PSIZE (p->prefixlen));
1759 }
1760 else
1761 {
1762 /* SAFI */
1763 stream_putc (s, safi);
1764
1765 /* prefix */
1766 stream_put_prefix (s, p);
1767 }
1768
1769 /* Set MP attribute length. */
1770 size = stream_get_putp (s) - attrlen_pnt - 1;
1771 stream_putc_at (s, attrlen_pnt, size);
1772
1773 return stream_get_putp (s) - cp;
1774}
1775
1776/* Initialization of attribute. */
1777void
1778bgp_attr_init ()
1779{
1780 void attrhash_init ();
1781
1782 aspath_init ();
1783 attrhash_init ();
1784 community_init ();
1785 ecommunity_init ();
1786 cluster_init ();
1787 transit_init ();
1788}
1789
1790/* Make attribute packet. */
1791void
paula3845922003-10-18 01:30:50 +00001792bgp_dump_routes_attr (struct stream *s, struct attr *attr,
1793 struct prefix *prefix)
paul718e3742002-12-13 20:15:29 +00001794{
1795 unsigned long cp;
1796 unsigned long len;
1797 struct aspath *aspath;
1798
1799 /* Remember current pointer. */
1800 cp = stream_get_putp (s);
1801
1802 /* Place holder of length. */
1803 stream_putw (s, 0);
1804
1805 /* Origin attribute. */
1806 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1807 stream_putc (s, BGP_ATTR_ORIGIN);
1808 stream_putc (s, 1);
1809 stream_putc (s, attr->origin);
1810
1811 aspath = attr->aspath;
1812
1813 if (aspath->length > 255)
1814 {
1815 stream_putc (s, BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1816 stream_putc (s, BGP_ATTR_AS_PATH);
1817 stream_putw (s, aspath->length);
1818 }
1819 else
1820 {
1821 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1822 stream_putc (s, BGP_ATTR_AS_PATH);
1823 stream_putc (s, aspath->length);
1824 }
1825 stream_put (s, aspath->data, aspath->length);
1826
1827 /* Nexthop attribute. */
paula3845922003-10-18 01:30:50 +00001828 /* If it's an IPv6 prefix, don't dump the IPv4 nexthop to save space */
1829 if(prefix != NULL
1830#ifdef HAVE_IPV6
1831 && prefix->family != AF_INET6
1832#endif /* HAVE_IPV6 */
1833 )
1834 {
1835 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1836 stream_putc (s, BGP_ATTR_NEXT_HOP);
1837 stream_putc (s, 4);
1838 stream_put_ipv4 (s, attr->nexthop.s_addr);
1839 }
paul718e3742002-12-13 20:15:29 +00001840
1841 /* MED attribute. */
1842 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC))
1843 {
1844 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1845 stream_putc (s, BGP_ATTR_MULTI_EXIT_DISC);
1846 stream_putc (s, 4);
1847 stream_putl (s, attr->med);
1848 }
1849
1850 /* Local preference. */
1851 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF))
1852 {
1853 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1854 stream_putc (s, BGP_ATTR_LOCAL_PREF);
1855 stream_putc (s, 4);
1856 stream_putl (s, attr->local_pref);
1857 }
1858
1859 /* Atomic aggregate. */
1860 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE))
1861 {
1862 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1863 stream_putc (s, BGP_ATTR_ATOMIC_AGGREGATE);
1864 stream_putc (s, 0);
1865 }
1866
1867 /* Aggregator. */
1868 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_AGGREGATOR))
1869 {
1870 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1871 stream_putc (s, BGP_ATTR_AGGREGATOR);
1872 stream_putc (s, 6);
1873 stream_putw (s, attr->aggregator_as);
1874 stream_put_ipv4 (s, attr->aggregator_addr.s_addr);
1875 }
1876
1877 /* Community attribute. */
1878 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_COMMUNITIES))
1879 {
1880 if (attr->community->size * 4 > 255)
1881 {
1882 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1883 stream_putc (s, BGP_ATTR_COMMUNITIES);
1884 stream_putw (s, attr->community->size * 4);
1885 }
1886 else
1887 {
1888 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1889 stream_putc (s, BGP_ATTR_COMMUNITIES);
1890 stream_putc (s, attr->community->size * 4);
1891 }
1892 stream_put (s, attr->community->val, attr->community->size * 4);
1893 }
1894
paula3845922003-10-18 01:30:50 +00001895#ifdef HAVE_IPV6
1896 /* Add a MP_NLRI attribute to dump the IPv6 next hop */
1897 if(prefix != NULL && prefix->family == AF_INET6 &&
1898 (attr->mp_nexthop_len == 16 || attr->mp_nexthop_len == 32) )
1899 {
1900 int sizep;
1901
1902 stream_putc(s, BGP_ATTR_FLAG_OPTIONAL);
1903 stream_putc(s, BGP_ATTR_MP_REACH_NLRI);
1904 sizep = stream_get_putp (s);
1905
1906 /* MP header */
1907 stream_putc (s, 0); /* Length of this attribute. */
1908 stream_putw(s, AFI_IP6); /* AFI */
1909 stream_putc(s, SAFI_UNICAST); /* SAFI */
1910
1911 /* Next hop */
1912 stream_putc(s, attr->mp_nexthop_len);
1913 stream_put(s, &attr->mp_nexthop_global, 16);
1914 if(attr->mp_nexthop_len == 32)
1915 stream_put(s, &attr->mp_nexthop_local, 16);
1916
1917 /* SNPA */
1918 stream_putc(s, 0);
1919
1920 /* Prefix */
1921 stream_put_prefix(s, prefix);
1922
1923 /* Set MP attribute length. */
1924 stream_putc_at (s, sizep, (stream_get_putp (s) - sizep) - 1);
1925 }
1926#endif /* HAVE_IPV6 */
1927
paul718e3742002-12-13 20:15:29 +00001928 /* Return total size of attribute. */
1929 len = stream_get_putp (s) - cp - 2;
1930 stream_putw_at (s, cp, len);
1931}