blob: c8aa52215740bd938430387e9dc5036b26f5066e [file] [log] [blame]
paul718e3742002-12-13 20:15:29 +00001/* RIP version 1 and 2.
vincentfbf5d032005-09-29 11:25:50 +00002 * Copyright (C) 2005 6WIND <alain.ritoux@6wind.com>
paul718e3742002-12-13 20:15:29 +00003 * Copyright (C) 1997, 98, 99 Kunihiro Ishiguro <kunihiro@zebra.org>
4 *
5 * This file is part of GNU Zebra.
6 *
7 * GNU Zebra is free software; you can redistribute it and/or modify it
8 * under the terms of the GNU General Public License as published by the
9 * Free Software Foundation; either version 2, or (at your option) any
10 * later version.
11 *
12 * GNU Zebra is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with GNU Zebra; see the file COPYING. If not, write to the Free
19 * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
20 * 02111-1307, USA.
21 */
22
23#include <zebra.h>
24
25#include "if.h"
26#include "command.h"
27#include "prefix.h"
28#include "table.h"
29#include "thread.h"
30#include "memory.h"
31#include "log.h"
32#include "stream.h"
33#include "filter.h"
34#include "sockunion.h"
hasso1af81932004-09-26 16:11:14 +000035#include "sockopt.h"
paul718e3742002-12-13 20:15:29 +000036#include "routemap.h"
hasso16705132003-05-25 14:49:19 +000037#include "if_rmap.h"
paul718e3742002-12-13 20:15:29 +000038#include "plist.h"
39#include "distribute.h"
vincentc1a03d42005-09-28 15:47:44 +000040#include "md5.h"
paul718e3742002-12-13 20:15:29 +000041#include "keychain.h"
pauledd7c242003-06-04 13:59:38 +000042#include "privs.h"
paul718e3742002-12-13 20:15:29 +000043
44#include "ripd/ripd.h"
45#include "ripd/rip_debug.h"
46
paul0b3acf42004-09-17 08:39:08 +000047/* UDP receive buffer size */
48#define RIP_UDP_RCV_BUF 41600
49
50/* privileges global */
pauledd7c242003-06-04 13:59:38 +000051extern struct zebra_privs_t ripd_privs;
52
paul718e3742002-12-13 20:15:29 +000053/* RIP Structure. */
54struct rip *rip = NULL;
55
56/* RIP neighbor address table. */
57struct route_table *rip_neighbor_table;
58
59/* RIP route changes. */
60long rip_global_route_changes = 0;
61
62/* RIP queries. */
63long rip_global_queries = 0;
64
65/* Prototypes. */
pauldc63bfd2005-10-25 23:31:05 +000066static void rip_event (enum rip_event, int);
67static void rip_output_process (struct connected *, struct sockaddr_in *, int, u_char);
68static int rip_triggered_update (struct thread *);
69static int rip_update_jitter (unsigned long);
70
paul718e3742002-12-13 20:15:29 +000071/* RIP output routes type. */
72enum
73{
74 rip_all_route,
75 rip_changed_route
76};
77
78/* RIP command strings. */
79struct message rip_msg[] =
80{
81 {RIP_REQUEST, "REQUEST"},
82 {RIP_RESPONSE, "RESPONSE"},
83 {RIP_TRACEON, "TRACEON"},
84 {RIP_TRACEOFF, "TRACEOFF"},
85 {RIP_POLL, "POLL"},
86 {RIP_POLL_ENTRY, "POLL ENTRY"},
87 {0, NULL}
88};
paul718e3742002-12-13 20:15:29 +000089
90/* Utility function to set boradcast option to the socket. */
pauldc63bfd2005-10-25 23:31:05 +000091static int
paul718e3742002-12-13 20:15:29 +000092sockopt_broadcast (int sock)
93{
94 int ret;
95 int on = 1;
96
97 ret = setsockopt (sock, SOL_SOCKET, SO_BROADCAST, (char *) &on, sizeof on);
98 if (ret < 0)
99 {
100 zlog_warn ("can't set sockopt SO_BROADCAST to socket %d", sock);
101 return -1;
102 }
103 return 0;
104}
105
pauldc63bfd2005-10-25 23:31:05 +0000106static int
paul718e3742002-12-13 20:15:29 +0000107rip_route_rte (struct rip_info *rinfo)
108{
109 return (rinfo->type == ZEBRA_ROUTE_RIP && rinfo->sub_type == RIP_ROUTE_RTE);
110}
111
pauldc63bfd2005-10-25 23:31:05 +0000112static struct rip_info *
paul718e3742002-12-13 20:15:29 +0000113rip_info_new ()
114{
115 struct rip_info *new;
116
117 new = XMALLOC (MTYPE_RIP_INFO, sizeof (struct rip_info));
118 memset (new, 0, sizeof (struct rip_info));
119 return new;
120}
121
122void
123rip_info_free (struct rip_info *rinfo)
124{
125 XFREE (MTYPE_RIP_INFO, rinfo);
126}
127
128/* RIP route garbage collect timer. */
pauldc63bfd2005-10-25 23:31:05 +0000129static int
paul718e3742002-12-13 20:15:29 +0000130rip_garbage_collect (struct thread *t)
131{
132 struct rip_info *rinfo;
133 struct route_node *rp;
134
135 rinfo = THREAD_ARG (t);
136 rinfo->t_garbage_collect = NULL;
137
138 /* Off timeout timer. */
139 RIP_TIMER_OFF (rinfo->t_timeout);
140
141 /* Get route_node pointer. */
142 rp = rinfo->rp;
143
144 /* Unlock route_node. */
145 rp->info = NULL;
146 route_unlock_node (rp);
147
148 /* Free RIP routing information. */
149 rip_info_free (rinfo);
150
151 return 0;
152}
153
154/* Timeout RIP routes. */
pauldc63bfd2005-10-25 23:31:05 +0000155static int
paul718e3742002-12-13 20:15:29 +0000156rip_timeout (struct thread *t)
157{
158 struct rip_info *rinfo;
159 struct route_node *rn;
160
161 rinfo = THREAD_ARG (t);
162 rinfo->t_timeout = NULL;
163
164 rn = rinfo->rp;
165
166 /* - The garbage-collection timer is set for 120 seconds. */
167 RIP_TIMER_ON (rinfo->t_garbage_collect, rip_garbage_collect,
168 rip->garbage_time);
169
170 rip_zebra_ipv4_delete ((struct prefix_ipv4 *)&rn->p, &rinfo->nexthop,
171 rinfo->metric);
172 /* - The metric for the route is set to 16 (infinity). This causes
173 the route to be removed from service. */
174 rinfo->metric = RIP_METRIC_INFINITY;
175 rinfo->flags &= ~RIP_RTF_FIB;
176
177 /* - The route change flag is to indicate that this entry has been
178 changed. */
179 rinfo->flags |= RIP_RTF_CHANGED;
180
181 /* - The output process is signalled to trigger a response. */
182 rip_event (RIP_TRIGGERED_UPDATE, 0);
183
184 return 0;
185}
186
pauldc63bfd2005-10-25 23:31:05 +0000187static void
paul718e3742002-12-13 20:15:29 +0000188rip_timeout_update (struct rip_info *rinfo)
189{
190 if (rinfo->metric != RIP_METRIC_INFINITY)
191 {
192 RIP_TIMER_OFF (rinfo->t_timeout);
193 RIP_TIMER_ON (rinfo->t_timeout, rip_timeout, rip->timeout_time);
194 }
195}
196
pauldc63bfd2005-10-25 23:31:05 +0000197static int
paul718e3742002-12-13 20:15:29 +0000198rip_incoming_filter (struct prefix_ipv4 *p, struct rip_interface *ri)
199{
200 struct distribute *dist;
201 struct access_list *alist;
202 struct prefix_list *plist;
203
204 /* Input distribute-list filtering. */
205 if (ri->list[RIP_FILTER_IN])
206 {
207 if (access_list_apply (ri->list[RIP_FILTER_IN],
208 (struct prefix *) p) == FILTER_DENY)
209 {
210 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +0000211 zlog_debug ("%s/%d filtered by distribute in",
paul718e3742002-12-13 20:15:29 +0000212 inet_ntoa (p->prefix), p->prefixlen);
213 return -1;
214 }
215 }
216 if (ri->prefix[RIP_FILTER_IN])
217 {
218 if (prefix_list_apply (ri->prefix[RIP_FILTER_IN],
219 (struct prefix *) p) == PREFIX_DENY)
220 {
221 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +0000222 zlog_debug ("%s/%d filtered by prefix-list in",
paul718e3742002-12-13 20:15:29 +0000223 inet_ntoa (p->prefix), p->prefixlen);
224 return -1;
225 }
226 }
227
228 /* All interface filter check. */
229 dist = distribute_lookup (NULL);
230 if (dist)
231 {
232 if (dist->list[DISTRIBUTE_IN])
233 {
234 alist = access_list_lookup (AFI_IP, dist->list[DISTRIBUTE_IN]);
235
236 if (alist)
237 {
238 if (access_list_apply (alist,
239 (struct prefix *) p) == FILTER_DENY)
240 {
241 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +0000242 zlog_debug ("%s/%d filtered by distribute in",
paul718e3742002-12-13 20:15:29 +0000243 inet_ntoa (p->prefix), p->prefixlen);
244 return -1;
245 }
246 }
247 }
248 if (dist->prefix[DISTRIBUTE_IN])
249 {
250 plist = prefix_list_lookup (AFI_IP, dist->prefix[DISTRIBUTE_IN]);
251
252 if (plist)
253 {
254 if (prefix_list_apply (plist,
255 (struct prefix *) p) == PREFIX_DENY)
256 {
257 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +0000258 zlog_debug ("%s/%d filtered by prefix-list in",
paul718e3742002-12-13 20:15:29 +0000259 inet_ntoa (p->prefix), p->prefixlen);
260 return -1;
261 }
262 }
263 }
264 }
265 return 0;
266}
267
pauldc63bfd2005-10-25 23:31:05 +0000268static int
paul718e3742002-12-13 20:15:29 +0000269rip_outgoing_filter (struct prefix_ipv4 *p, struct rip_interface *ri)
270{
271 struct distribute *dist;
272 struct access_list *alist;
273 struct prefix_list *plist;
274
275 if (ri->list[RIP_FILTER_OUT])
276 {
277 if (access_list_apply (ri->list[RIP_FILTER_OUT],
278 (struct prefix *) p) == FILTER_DENY)
279 {
280 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +0000281 zlog_debug ("%s/%d is filtered by distribute out",
paul718e3742002-12-13 20:15:29 +0000282 inet_ntoa (p->prefix), p->prefixlen);
283 return -1;
284 }
285 }
286 if (ri->prefix[RIP_FILTER_OUT])
287 {
288 if (prefix_list_apply (ri->prefix[RIP_FILTER_OUT],
289 (struct prefix *) p) == PREFIX_DENY)
290 {
291 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +0000292 zlog_debug ("%s/%d is filtered by prefix-list out",
paul718e3742002-12-13 20:15:29 +0000293 inet_ntoa (p->prefix), p->prefixlen);
294 return -1;
295 }
296 }
297
298 /* All interface filter check. */
299 dist = distribute_lookup (NULL);
300 if (dist)
301 {
302 if (dist->list[DISTRIBUTE_OUT])
303 {
304 alist = access_list_lookup (AFI_IP, dist->list[DISTRIBUTE_OUT]);
305
306 if (alist)
307 {
308 if (access_list_apply (alist,
309 (struct prefix *) p) == FILTER_DENY)
310 {
311 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +0000312 zlog_debug ("%s/%d filtered by distribute out",
paul718e3742002-12-13 20:15:29 +0000313 inet_ntoa (p->prefix), p->prefixlen);
314 return -1;
315 }
316 }
317 }
318 if (dist->prefix[DISTRIBUTE_OUT])
319 {
320 plist = prefix_list_lookup (AFI_IP, dist->prefix[DISTRIBUTE_OUT]);
321
322 if (plist)
323 {
324 if (prefix_list_apply (plist,
325 (struct prefix *) p) == PREFIX_DENY)
326 {
327 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +0000328 zlog_debug ("%s/%d filtered by prefix-list out",
paul718e3742002-12-13 20:15:29 +0000329 inet_ntoa (p->prefix), p->prefixlen);
330 return -1;
331 }
332 }
333 }
334 }
335 return 0;
336}
337
338/* Check nexthop address validity. */
339static int
340rip_nexthop_check (struct in_addr *addr)
341{
hasso52dc7ee2004-09-23 19:18:23 +0000342 struct listnode *node;
343 struct listnode *cnode;
paul718e3742002-12-13 20:15:29 +0000344 struct interface *ifp;
345 struct connected *ifc;
346 struct prefix *p;
347
348 /* If nexthop address matches local configured address then it is
349 invalid nexthop. */
paul1eb8ef22005-04-07 07:30:20 +0000350 for (ALL_LIST_ELEMENTS_RO (iflist, node, ifp))
paul718e3742002-12-13 20:15:29 +0000351 {
paul1eb8ef22005-04-07 07:30:20 +0000352 for (ALL_LIST_ELEMENTS_RO (ifp->connected, cnode, ifc))
paul718e3742002-12-13 20:15:29 +0000353 {
paul718e3742002-12-13 20:15:29 +0000354 p = ifc->address;
355
356 if (p->family == AF_INET
357 && IPV4_ADDR_SAME (&p->u.prefix4, addr))
358 return -1;
359 }
360 }
361 return 0;
362}
363
364/* RIP add route to routing table. */
pauldc63bfd2005-10-25 23:31:05 +0000365static void
paul718e3742002-12-13 20:15:29 +0000366rip_rte_process (struct rte *rte, struct sockaddr_in *from,
paula87552c2004-05-03 20:00:17 +0000367 struct interface *ifp)
paul718e3742002-12-13 20:15:29 +0000368{
369 int ret;
370 struct prefix_ipv4 p;
371 struct route_node *rp;
paulb94f9db2004-05-01 20:45:38 +0000372 struct rip_info *rinfo, rinfotmp;
paul718e3742002-12-13 20:15:29 +0000373 struct rip_interface *ri;
374 struct in_addr *nexthop;
375 u_char oldmetric;
376 int same = 0;
vincentfbf5d032005-09-29 11:25:50 +0000377 int route_reuse = 0;
378 unsigned char old_dist, new_dist;
paul718e3742002-12-13 20:15:29 +0000379
380 /* Make prefix structure. */
381 memset (&p, 0, sizeof (struct prefix_ipv4));
382 p.family = AF_INET;
383 p.prefix = rte->prefix;
384 p.prefixlen = ip_masklen (rte->mask);
385
386 /* Make sure mask is applied. */
387 apply_mask_ipv4 (&p);
388
389 /* Apply input filters. */
390 ri = ifp->info;
391
392 ret = rip_incoming_filter (&p, ri);
393 if (ret < 0)
394 return;
395
hasso16705132003-05-25 14:49:19 +0000396 /* Modify entry according to the interface routemap. */
397 if (ri->routemap[RIP_FILTER_IN])
398 {
399 int ret;
400 struct rip_info newinfo;
401
402 memset (&newinfo, 0, sizeof (newinfo));
403 newinfo.type = ZEBRA_ROUTE_RIP;
404 newinfo.sub_type = RIP_ROUTE_RTE;
paula87552c2004-05-03 20:00:17 +0000405 newinfo.nexthop = rte->nexthop;
406 newinfo.from = from->sin_addr;
407 newinfo.ifindex = ifp->ifindex;
hasso16705132003-05-25 14:49:19 +0000408 newinfo.metric = rte->metric;
409 newinfo.metric_out = rte->metric; /* XXX */
paula87552c2004-05-03 20:00:17 +0000410 newinfo.tag = ntohs (rte->tag); /* XXX */
hasso16705132003-05-25 14:49:19 +0000411
412 /* The object should be of the type of rip_info */
paula87552c2004-05-03 20:00:17 +0000413 ret = route_map_apply (ri->routemap[RIP_FILTER_IN],
414 (struct prefix *) &p, RMAP_RIP, &newinfo);
hasso16705132003-05-25 14:49:19 +0000415
416 if (ret == RMAP_DENYMATCH)
paula87552c2004-05-03 20:00:17 +0000417 {
418 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +0000419 zlog_debug ("RIP %s/%d is filtered by route-map in",
paula87552c2004-05-03 20:00:17 +0000420 inet_ntoa (p.prefix), p.prefixlen);
421 return;
422 }
hasso16705132003-05-25 14:49:19 +0000423
424 /* Get back the object */
paula87552c2004-05-03 20:00:17 +0000425 rte->nexthop = newinfo.nexthop_out;
426 rte->tag = htons (newinfo.tag_out); /* XXX */
427 rte->metric = newinfo.metric_out; /* XXX: the routemap uses the metric_out field */
hasso16705132003-05-25 14:49:19 +0000428 }
429
paul718e3742002-12-13 20:15:29 +0000430 /* Once the entry has been validated, update the metric by
431 adding the cost of the network on wich the message
432 arrived. If the result is greater than infinity, use infinity
433 (RFC2453 Sec. 3.9.2) */
434 /* Zebra ripd can handle offset-list in. */
435 ret = rip_offset_list_apply_in (&p, ifp, &rte->metric);
436
437 /* If offset-list does not modify the metric use interface's
438 metric. */
paula87552c2004-05-03 20:00:17 +0000439 if (!ret)
paul718e3742002-12-13 20:15:29 +0000440 rte->metric += ifp->metric;
441
442 if (rte->metric > RIP_METRIC_INFINITY)
443 rte->metric = RIP_METRIC_INFINITY;
444
445 /* Set nexthop pointer. */
446 if (rte->nexthop.s_addr == 0)
447 nexthop = &from->sin_addr;
448 else
449 nexthop = &rte->nexthop;
450
hasso16705132003-05-25 14:49:19 +0000451 /* Check if nexthop address is myself, then do nothing. */
paul718e3742002-12-13 20:15:29 +0000452 if (rip_nexthop_check (nexthop) < 0)
453 {
454 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +0000455 zlog_debug ("Nexthop address %s is myself", inet_ntoa (*nexthop));
paul718e3742002-12-13 20:15:29 +0000456 return;
457 }
458
459 /* Get index for the prefix. */
460 rp = route_node_get (rip->table, (struct prefix *) &p);
461
462 /* Check to see whether there is already RIP route on the table. */
463 rinfo = rp->info;
464
465 if (rinfo)
466 {
paul718e3742002-12-13 20:15:29 +0000467 /* Local static route. */
468 if (rinfo->type == ZEBRA_ROUTE_RIP
paula87552c2004-05-03 20:00:17 +0000469 && ((rinfo->sub_type == RIP_ROUTE_STATIC) ||
470 (rinfo->sub_type == RIP_ROUTE_DEFAULT))
471 && rinfo->metric != RIP_METRIC_INFINITY)
vincentfbf5d032005-09-29 11:25:50 +0000472 {
473 route_unlock_node (rp);
474 return;
475 }
476
477 /* Redistributed route check. */
478 if (rinfo->type != ZEBRA_ROUTE_RIP
479 && rinfo->metric != RIP_METRIC_INFINITY)
480 {
481 /* Fill in a minimaly temporary rip_info structure, for a future
482 rip_distance_apply() use) */
483 memset (&rinfotmp, 0, sizeof (rinfotmp));
484 IPV4_ADDR_COPY (&rinfotmp.from, &from->sin_addr);
485 rinfotmp.rp = rinfo->rp;
486 new_dist = rip_distance_apply (&rinfotmp);
487 new_dist = new_dist ? new_dist : ZEBRA_RIP_DISTANCE_DEFAULT;
488 old_dist = rinfo->distance;
vincent7a383332006-01-30 18:12:42 +0000489 /* Only connected routes may have a valid NULL distance */
490 if (rinfo->type != ZEBRA_ROUTE_CONNECT)
491 old_dist = old_dist ? old_dist : ZEBRA_RIP_DISTANCE_DEFAULT;
vincentfbf5d032005-09-29 11:25:50 +0000492 /* If imported route does not have STRICT precedence,
493 mark it as a ghost */
494 if (new_dist > old_dist
495 || rte->metric == RIP_METRIC_INFINITY)
496 {
497 route_unlock_node (rp);
498 return;
499 }
500 else
501 {
502 RIP_TIMER_OFF (rinfo->t_timeout);
503 RIP_TIMER_OFF (rinfo->t_garbage_collect);
504
505 rp->info = NULL;
506 if (rip_route_rte (rinfo))
507 rip_zebra_ipv4_delete ((struct prefix_ipv4 *)&rp->p,
508 &rinfo->nexthop, rinfo->metric);
509 rip_info_free (rinfo);
510 rinfo = NULL;
511 route_reuse = 1;
512 }
513 }
paul718e3742002-12-13 20:15:29 +0000514 }
paula87552c2004-05-03 20:00:17 +0000515
516 if (!rinfo)
paul718e3742002-12-13 20:15:29 +0000517 {
518 /* Now, check to see whether there is already an explicit route
paula87552c2004-05-03 20:00:17 +0000519 for the destination prefix. If there is no such route, add
520 this route to the routing table, unless the metric is
521 infinity (there is no point in adding a route which
522 unusable). */
paul718e3742002-12-13 20:15:29 +0000523 if (rte->metric != RIP_METRIC_INFINITY)
paula87552c2004-05-03 20:00:17 +0000524 {
525 rinfo = rip_info_new ();
paul718e3742002-12-13 20:15:29 +0000526
paula87552c2004-05-03 20:00:17 +0000527 /* - Setting the destination prefix and length to those in
528 the RTE. */
529 rinfo->rp = rp;
paul718e3742002-12-13 20:15:29 +0000530
paula87552c2004-05-03 20:00:17 +0000531 /* - Setting the metric to the newly calculated metric (as
532 described above). */
533 rinfo->metric = rte->metric;
534 rinfo->tag = ntohs (rte->tag);
paul718e3742002-12-13 20:15:29 +0000535
paula87552c2004-05-03 20:00:17 +0000536 /* - Set the next hop address to be the address of the router
537 from which the datagram came or the next hop address
538 specified by a next hop RTE. */
539 IPV4_ADDR_COPY (&rinfo->nexthop, nexthop);
540 IPV4_ADDR_COPY (&rinfo->from, &from->sin_addr);
541 rinfo->ifindex = ifp->ifindex;
paul718e3742002-12-13 20:15:29 +0000542
paula87552c2004-05-03 20:00:17 +0000543 /* - Initialize the timeout for the route. If the
544 garbage-collection timer is running for this route, stop it
545 (see section 2.3 for a discussion of the timers). */
546 rip_timeout_update (rinfo);
paul718e3742002-12-13 20:15:29 +0000547
paula87552c2004-05-03 20:00:17 +0000548 /* - Set the route change flag. */
549 rinfo->flags |= RIP_RTF_CHANGED;
paul718e3742002-12-13 20:15:29 +0000550
paula87552c2004-05-03 20:00:17 +0000551 /* - Signal the output process to trigger an update (see section
552 2.5). */
553 rip_event (RIP_TRIGGERED_UPDATE, 0);
paul718e3742002-12-13 20:15:29 +0000554
paula87552c2004-05-03 20:00:17 +0000555 /* Finally, route goes into the kernel. */
556 rinfo->type = ZEBRA_ROUTE_RIP;
557 rinfo->sub_type = RIP_ROUTE_RTE;
paul718e3742002-12-13 20:15:29 +0000558
paula87552c2004-05-03 20:00:17 +0000559 /* Set distance value. */
560 rinfo->distance = rip_distance_apply (rinfo);
561
562 rp->info = rinfo;
563 rip_zebra_ipv4_add (&p, &rinfo->nexthop, rinfo->metric,
564 rinfo->distance);
565 rinfo->flags |= RIP_RTF_FIB;
566 }
vincentfbf5d032005-09-29 11:25:50 +0000567
568 /* Unlock temporary lock, i.e. same behaviour */
569 if (route_reuse)
570 route_unlock_node (rp);
paul718e3742002-12-13 20:15:29 +0000571 }
572 else
573 {
574 /* Route is there but we are not sure the route is RIP or not. */
575 rinfo = rp->info;
paula87552c2004-05-03 20:00:17 +0000576
paul718e3742002-12-13 20:15:29 +0000577 /* If there is an existing route, compare the next hop address
paula87552c2004-05-03 20:00:17 +0000578 to the address of the router from which the datagram came.
579 If this datagram is from the same router as the existing
580 route, reinitialize the timeout. */
hasso16705132003-05-25 14:49:19 +0000581 same = (IPV4_ADDR_SAME (&rinfo->from, &from->sin_addr)
paula87552c2004-05-03 20:00:17 +0000582 && (rinfo->ifindex == ifp->ifindex));
paul718e3742002-12-13 20:15:29 +0000583
584 if (same)
paula87552c2004-05-03 20:00:17 +0000585 rip_timeout_update (rinfo);
paul718e3742002-12-13 20:15:29 +0000586
paulb94f9db2004-05-01 20:45:38 +0000587
588 /* Fill in a minimaly temporary rip_info structure, for a future
589 rip_distance_apply() use) */
paula87552c2004-05-03 20:00:17 +0000590 memset (&rinfotmp, 0, sizeof (rinfotmp));
paulb94f9db2004-05-01 20:45:38 +0000591 IPV4_ADDR_COPY (&rinfotmp.from, &from->sin_addr);
paula87552c2004-05-03 20:00:17 +0000592 rinfotmp.rp = rinfo->rp;
paulb94f9db2004-05-01 20:45:38 +0000593
594
paul718e3742002-12-13 20:15:29 +0000595 /* Next, compare the metrics. If the datagram is from the same
paula87552c2004-05-03 20:00:17 +0000596 router as the existing route, and the new metric is different
597 than the old one; or, if the new metric is lower than the old
598 one, or if the tag has been changed; or if there is a route
599 with a lower administrave distance; or an update of the
600 distance on the actual route; do the following actions: */
601 if ((same && rinfo->metric != rte->metric)
602 || (rte->metric < rinfo->metric)
603 || ((same)
604 && (rinfo->metric == rte->metric)
605 && ntohs (rte->tag) != rinfo->tag)
606 || (rinfo->distance > rip_distance_apply (&rinfotmp))
607 || ((rinfo->distance != rip_distance_apply (rinfo)) && same))
608 {
609 /* - Adopt the route from the datagram. That is, put the
610 new metric in, and adjust the next hop address (if
611 necessary). */
612 oldmetric = rinfo->metric;
613 rinfo->metric = rte->metric;
614 rinfo->tag = ntohs (rte->tag);
615 IPV4_ADDR_COPY (&rinfo->from, &from->sin_addr);
616 rinfo->ifindex = ifp->ifindex;
617 rinfo->distance = rip_distance_apply (rinfo);
paul718e3742002-12-13 20:15:29 +0000618
paula87552c2004-05-03 20:00:17 +0000619 /* Should a new route to this network be established
620 while the garbage-collection timer is running, the
621 new route will replace the one that is about to be
622 deleted. In this case the garbage-collection timer
623 must be cleared. */
paul718e3742002-12-13 20:15:29 +0000624
paula87552c2004-05-03 20:00:17 +0000625 if (oldmetric == RIP_METRIC_INFINITY &&
626 rinfo->metric < RIP_METRIC_INFINITY)
627 {
628 rinfo->type = ZEBRA_ROUTE_RIP;
629 rinfo->sub_type = RIP_ROUTE_RTE;
paul718e3742002-12-13 20:15:29 +0000630
paula87552c2004-05-03 20:00:17 +0000631 RIP_TIMER_OFF (rinfo->t_garbage_collect);
paul718e3742002-12-13 20:15:29 +0000632
paula87552c2004-05-03 20:00:17 +0000633 if (!IPV4_ADDR_SAME (&rinfo->nexthop, nexthop))
634 IPV4_ADDR_COPY (&rinfo->nexthop, nexthop);
paul718e3742002-12-13 20:15:29 +0000635
paula87552c2004-05-03 20:00:17 +0000636 rip_zebra_ipv4_add (&p, nexthop, rinfo->metric,
637 rinfo->distance);
638 rinfo->flags |= RIP_RTF_FIB;
639 }
paul718e3742002-12-13 20:15:29 +0000640
paula87552c2004-05-03 20:00:17 +0000641 /* Update nexthop and/or metric value. */
642 if (oldmetric != RIP_METRIC_INFINITY)
643 {
644 rip_zebra_ipv4_delete (&p, &rinfo->nexthop, oldmetric);
645 rip_zebra_ipv4_add (&p, nexthop, rinfo->metric,
646 rinfo->distance);
647 rinfo->flags |= RIP_RTF_FIB;
paul718e3742002-12-13 20:15:29 +0000648
paula87552c2004-05-03 20:00:17 +0000649 if (!IPV4_ADDR_SAME (&rinfo->nexthop, nexthop))
650 IPV4_ADDR_COPY (&rinfo->nexthop, nexthop);
651 }
paul718e3742002-12-13 20:15:29 +0000652
paula87552c2004-05-03 20:00:17 +0000653 /* - Set the route change flag and signal the output process
654 to trigger an update. */
655 rinfo->flags |= RIP_RTF_CHANGED;
656 rip_event (RIP_TRIGGERED_UPDATE, 0);
paul718e3742002-12-13 20:15:29 +0000657
paula87552c2004-05-03 20:00:17 +0000658 /* - If the new metric is infinity, start the deletion
659 process (described above); */
660 if (rinfo->metric == RIP_METRIC_INFINITY)
661 {
662 /* If the new metric is infinity, the deletion process
663 begins for the route, which is no longer used for
664 routing packets. Note that the deletion process is
665 started only when the metric is first set to
666 infinity. If the metric was already infinity, then a
667 new deletion process is not started. */
668 if (oldmetric != RIP_METRIC_INFINITY)
669 {
670 /* - The garbage-collection timer is set for 120 seconds. */
671 RIP_TIMER_ON (rinfo->t_garbage_collect,
672 rip_garbage_collect, rip->garbage_time);
673 RIP_TIMER_OFF (rinfo->t_timeout);
paul718e3742002-12-13 20:15:29 +0000674
paula87552c2004-05-03 20:00:17 +0000675 /* - The metric for the route is set to 16
676 (infinity). This causes the route to be removed
677 from service. */
678 rip_zebra_ipv4_delete (&p, &rinfo->nexthop, oldmetric);
679 rinfo->flags &= ~RIP_RTF_FIB;
paul718e3742002-12-13 20:15:29 +0000680
paula87552c2004-05-03 20:00:17 +0000681 /* - The route change flag is to indicate that this
682 entry has been changed. */
683 /* - The output process is signalled to trigger a
paul718e3742002-12-13 20:15:29 +0000684 response. */
paula87552c2004-05-03 20:00:17 +0000685 ; /* Above processes are already done previously. */
686 }
687 }
688 else
689 {
690 /* otherwise, re-initialize the timeout. */
691 rip_timeout_update (rinfo);
692 }
693 }
paul718e3742002-12-13 20:15:29 +0000694 /* Unlock tempolary lock of the route. */
695 route_unlock_node (rp);
696 }
697}
698
699/* Dump RIP packet */
pauldc63bfd2005-10-25 23:31:05 +0000700static void
hasso8a676be2004-10-08 06:36:38 +0000701rip_packet_dump (struct rip_packet *packet, int size, const char *sndrcv)
paul718e3742002-12-13 20:15:29 +0000702{
703 caddr_t lim;
704 struct rte *rte;
hasso8a676be2004-10-08 06:36:38 +0000705 const char *command_str;
paul718e3742002-12-13 20:15:29 +0000706 char pbuf[BUFSIZ], nbuf[BUFSIZ];
707 u_char netmask = 0;
708 u_char *p;
709
710 /* Set command string. */
711 if (packet->command > 0 && packet->command < RIP_COMMAND_MAX)
712 command_str = lookup (rip_msg, packet->command);
713 else
714 command_str = "unknown";
715
716 /* Dump packet header. */
ajs5d6c3772004-12-08 19:24:06 +0000717 zlog_debug ("%s %s version %d packet size %d",
paul718e3742002-12-13 20:15:29 +0000718 sndrcv, command_str, packet->version, size);
719
720 /* Dump each routing table entry. */
721 rte = packet->rte;
722
723 for (lim = (caddr_t) packet + size; (caddr_t) rte < lim; rte++)
724 {
725 if (packet->version == RIPv2)
726 {
727 netmask = ip_masklen (rte->mask);
728
paulca5e5162004-06-06 22:06:33 +0000729 if (rte->family == htons (RIP_FAMILY_AUTH))
paul718e3742002-12-13 20:15:29 +0000730 {
paulca5e5162004-06-06 22:06:33 +0000731 if (rte->tag == htons (RIP_AUTH_SIMPLE_PASSWORD))
paul718e3742002-12-13 20:15:29 +0000732 {
733 p = (u_char *)&rte->prefix;
734
ajs5d6c3772004-12-08 19:24:06 +0000735 zlog_debug (" family 0x%X type %d auth string: %s",
paul718e3742002-12-13 20:15:29 +0000736 ntohs (rte->family), ntohs (rte->tag), p);
737 }
paulca5e5162004-06-06 22:06:33 +0000738 else if (rte->tag == htons (RIP_AUTH_MD5))
paul718e3742002-12-13 20:15:29 +0000739 {
740 struct rip_md5_info *md5;
741
742 md5 = (struct rip_md5_info *) &packet->rte;
743
ajs5d6c3772004-12-08 19:24:06 +0000744 zlog_debug (" family 0x%X type %d (MD5 authentication)",
paul718e3742002-12-13 20:15:29 +0000745 ntohs (md5->family), ntohs (md5->type));
ajs5d6c3772004-12-08 19:24:06 +0000746 zlog_debug (" RIP-2 packet len %d Key ID %d"
paulca5e5162004-06-06 22:06:33 +0000747 " Auth Data len %d",
748 ntohs (md5->packet_len), md5->keyid,
749 md5->auth_len);
ajs5d6c3772004-12-08 19:24:06 +0000750 zlog_debug (" Sequence Number %ld",
paulca5e5162004-06-06 22:06:33 +0000751 (u_long) ntohl (md5->sequence));
paul718e3742002-12-13 20:15:29 +0000752 }
paulca5e5162004-06-06 22:06:33 +0000753 else if (rte->tag == htons (RIP_AUTH_DATA))
paul718e3742002-12-13 20:15:29 +0000754 {
755 p = (u_char *)&rte->prefix;
756
ajs5d6c3772004-12-08 19:24:06 +0000757 zlog_debug (" family 0x%X type %d (MD5 data)",
paul718e3742002-12-13 20:15:29 +0000758 ntohs (rte->family), ntohs (rte->tag));
ajs5d6c3772004-12-08 19:24:06 +0000759 zlog_debug (" MD5: %02X%02X%02X%02X%02X%02X%02X%02X"
paul718e3742002-12-13 20:15:29 +0000760 "%02X%02X%02X%02X%02X%02X%02X",
paulca5e5162004-06-06 22:06:33 +0000761 p[0], p[1], p[2], p[3], p[4], p[5], p[6],
762 p[7], p[9], p[10], p[11], p[12], p[13],
763 p[14], p[15]);
paul718e3742002-12-13 20:15:29 +0000764 }
765 else
766 {
ajs5d6c3772004-12-08 19:24:06 +0000767 zlog_debug (" family 0x%X type %d (Unknown auth type)",
paul718e3742002-12-13 20:15:29 +0000768 ntohs (rte->family), ntohs (rte->tag));
769 }
770 }
771 else
ajs5d6c3772004-12-08 19:24:06 +0000772 zlog_debug (" %s/%d -> %s family %d tag %d metric %ld",
paulca5e5162004-06-06 22:06:33 +0000773 inet_ntop (AF_INET, &rte->prefix, pbuf, BUFSIZ),
774 netmask, inet_ntop (AF_INET, &rte->nexthop, nbuf,
775 BUFSIZ), ntohs (rte->family),
776 ntohs (rte->tag), (u_long) ntohl (rte->metric));
paul718e3742002-12-13 20:15:29 +0000777 }
778 else
779 {
ajs5d6c3772004-12-08 19:24:06 +0000780 zlog_debug (" %s family %d tag %d metric %ld",
paul718e3742002-12-13 20:15:29 +0000781 inet_ntop (AF_INET, &rte->prefix, pbuf, BUFSIZ),
782 ntohs (rte->family), ntohs (rte->tag),
783 (u_long)ntohl (rte->metric));
784 }
785 }
786}
787
788/* Check if the destination address is valid (unicast; not net 0
789 or 127) (RFC2453 Section 3.9.2 - Page 26). But we don't
790 check net 0 because we accept default route. */
pauldc63bfd2005-10-25 23:31:05 +0000791static int
paul718e3742002-12-13 20:15:29 +0000792rip_destination_check (struct in_addr addr)
793{
794 u_int32_t destination;
795
796 /* Convert to host byte order. */
797 destination = ntohl (addr.s_addr);
798
799 if (IPV4_NET127 (destination))
800 return 0;
801
802 /* Net 0 may match to the default route. */
803 if (IPV4_NET0 (destination) && destination != 0)
804 return 0;
805
806 /* Unicast address must belong to class A, B, C. */
807 if (IN_CLASSA (destination))
808 return 1;
809 if (IN_CLASSB (destination))
810 return 1;
811 if (IN_CLASSC (destination))
812 return 1;
813
814 return 0;
815}
816
817/* RIP version 2 authentication. */
pauldc63bfd2005-10-25 23:31:05 +0000818static int
paul718e3742002-12-13 20:15:29 +0000819rip_auth_simple_password (struct rte *rte, struct sockaddr_in *from,
820 struct interface *ifp)
821{
822 struct rip_interface *ri;
823 char *auth_str;
824
825 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +0000826 zlog_debug ("RIPv2 simple password authentication from %s",
paul718e3742002-12-13 20:15:29 +0000827 inet_ntoa (from->sin_addr));
828
829 ri = ifp->info;
830
831 if (ri->auth_type != RIP_AUTH_SIMPLE_PASSWORD
paulca5e5162004-06-06 22:06:33 +0000832 || rte->tag != htons(RIP_AUTH_SIMPLE_PASSWORD))
paul718e3742002-12-13 20:15:29 +0000833 return 0;
834
835 /* Simple password authentication. */
836 if (ri->auth_str)
837 {
838 auth_str = (char *) &rte->prefix;
839
840 if (strncmp (auth_str, ri->auth_str, 16) == 0)
841 return 1;
842 }
843 if (ri->key_chain)
844 {
845 struct keychain *keychain;
846 struct key *key;
847
848 keychain = keychain_lookup (ri->key_chain);
849 if (keychain == NULL)
850 return 0;
851
852 key = key_match_for_accept (keychain, (char *) &rte->prefix);
853 if (key)
854 return 1;
855 }
856 return 0;
857}
858
859/* RIP version 2 authentication with MD5. */
pauldc63bfd2005-10-25 23:31:05 +0000860static int
paul718e3742002-12-13 20:15:29 +0000861rip_auth_md5 (struct rip_packet *packet, struct sockaddr_in *from,
paulca5e5162004-06-06 22:06:33 +0000862 int length, struct interface *ifp)
paul718e3742002-12-13 20:15:29 +0000863{
864 struct rip_interface *ri;
865 struct rip_md5_info *md5;
866 struct rip_md5_data *md5data;
867 struct keychain *keychain;
868 struct key *key;
vincentc1a03d42005-09-28 15:47:44 +0000869 MD5_CTX ctx;
paul718e3742002-12-13 20:15:29 +0000870 u_char digest[RIP_AUTH_MD5_SIZE];
871 u_int16_t packet_len;
paul98fd1e62006-01-17 17:26:25 +0000872 char auth_str[RIP_AUTH_MD5_SIZE];
paul718e3742002-12-13 20:15:29 +0000873
874 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +0000875 zlog_debug ("RIPv2 MD5 authentication from %s",
paulca5e5162004-06-06 22:06:33 +0000876 inet_ntoa (from->sin_addr));
paul718e3742002-12-13 20:15:29 +0000877
878 ri = ifp->info;
879 md5 = (struct rip_md5_info *) &packet->rte;
880
881 /* Check auth type. */
paulca5e5162004-06-06 22:06:33 +0000882 if (ri->auth_type != RIP_AUTH_MD5 || md5->type != htons(RIP_AUTH_MD5))
paul718e3742002-12-13 20:15:29 +0000883 return 0;
884
paulca5e5162004-06-06 22:06:33 +0000885 /* If the authentication length is less than 16, then it must be wrong for
886 * any interpretation of rfc2082. Some implementations also interpret
887 * this as RIP_HEADER_SIZE+ RIP_AUTH_MD5_SIZE, aka RIP_AUTH_MD5_COMPAT_SIZE.
paul98fd1e62006-01-17 17:26:25 +0000888 */
paulca5e5162004-06-06 22:06:33 +0000889 if ( !((md5->auth_len == RIP_AUTH_MD5_SIZE)
890 || (md5->auth_len == RIP_AUTH_MD5_COMPAT_SIZE)))
paulc2bfbcc2004-06-04 01:42:38 +0000891 {
892 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +0000893 zlog_debug ("RIPv2 MD5 authentication, strange authentication "
paulca5e5162004-06-06 22:06:33 +0000894 "length field %d", md5->auth_len);
paul718e3742002-12-13 20:15:29 +0000895 return 0;
paulc2bfbcc2004-06-04 01:42:38 +0000896 }
paul718e3742002-12-13 20:15:29 +0000897
paulca5e5162004-06-06 22:06:33 +0000898 /* grab and verify check packet length */
899 packet_len = ntohs (md5->packet_len);
900
901 if (packet_len > (length - RIP_HEADER_SIZE - RIP_AUTH_MD5_SIZE))
902 {
903 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +0000904 zlog_debug ("RIPv2 MD5 authentication, packet length field %d "
paulca5e5162004-06-06 22:06:33 +0000905 "greater than received length %d!",
906 md5->packet_len, length);
907 return 0;
908 }
909
910 /* retrieve authentication data */
911 md5data = (struct rip_md5_data *) (((u_char *) packet) + packet_len);
paul98fd1e62006-01-17 17:26:25 +0000912
913 memset (auth_str, 0, RIP_AUTH_MD5_SIZE);
paulca5e5162004-06-06 22:06:33 +0000914
paul718e3742002-12-13 20:15:29 +0000915 if (ri->key_chain)
916 {
917 keychain = keychain_lookup (ri->key_chain);
918 if (keychain == NULL)
919 return 0;
920
921 key = key_lookup_for_accept (keychain, md5->keyid);
922 if (key == NULL)
923 return 0;
924
paul98fd1e62006-01-17 17:26:25 +0000925 strncpy (auth_str, key->string, RIP_AUTH_MD5_SIZE);
paul718e3742002-12-13 20:15:29 +0000926 }
paul98fd1e62006-01-17 17:26:25 +0000927 else if (ri->auth_str)
928 strncpy (auth_str, ri->auth_str, RIP_AUTH_MD5_SIZE);
paul718e3742002-12-13 20:15:29 +0000929
930 if (! auth_str)
931 return 0;
paul98fd1e62006-01-17 17:26:25 +0000932
paul718e3742002-12-13 20:15:29 +0000933 /* MD5 digest authentication. */
vincentc1a03d42005-09-28 15:47:44 +0000934 memset (&ctx, 0, sizeof(ctx));
935 MD5Init(&ctx);
paul98fd1e62006-01-17 17:26:25 +0000936 MD5Update(&ctx, packet, packet_len + RIP_HEADER_SIZE);
937 MD5Update(&ctx, auth_str, RIP_AUTH_MD5_SIZE);
vincentc1a03d42005-09-28 15:47:44 +0000938 MD5Final(digest, &ctx);
paul98fd1e62006-01-17 17:26:25 +0000939
940 if (memcmp (md5data->digest, digest, RIP_AUTH_MD5_SIZE) == 0)
paul718e3742002-12-13 20:15:29 +0000941 return packet_len;
942 else
943 return 0;
944}
945
paulb14ee002005-02-04 23:42:41 +0000946/* Pick correct auth string for sends, prepare auth_str buffer for use.
947 * (left justified and padded).
948 *
949 * presumes one of ri or key is valid, and that the auth strings they point
950 * to are nul terminated. If neither are present, auth_str will be fully
951 * zero padded.
952 *
953 */
954static void
955rip_auth_prepare_str_send (struct rip_interface *ri, struct key *key,
956 char *auth_str, int len)
paul718e3742002-12-13 20:15:29 +0000957{
paulb14ee002005-02-04 23:42:41 +0000958 assert (ri || key);
paul718e3742002-12-13 20:15:29 +0000959
paulb14ee002005-02-04 23:42:41 +0000960 memset (auth_str, 0, len);
961 if (key && key->string)
962 strncpy (auth_str, key->string, len);
963 else if (ri->auth_str)
964 strncpy (auth_str, ri->auth_str, len);
paul718e3742002-12-13 20:15:29 +0000965
paulb14ee002005-02-04 23:42:41 +0000966 return;
967}
paul718e3742002-12-13 20:15:29 +0000968
paulb14ee002005-02-04 23:42:41 +0000969/* Write RIPv2 simple password authentication information
970 *
971 * auth_str is presumed to be 2 bytes and correctly prepared
972 * (left justified and zero padded).
973 */
974static void
975rip_auth_simple_write (struct stream *s, char *auth_str, int len)
976{
977 assert (s && len == RIP_AUTH_SIMPLE_SIZE);
paul718e3742002-12-13 20:15:29 +0000978
paulb14ee002005-02-04 23:42:41 +0000979 stream_putw (s, RIP_FAMILY_AUTH);
980 stream_putw (s, RIP_AUTH_SIMPLE_PASSWORD);
981 stream_put (s, auth_str, RIP_AUTH_SIMPLE_SIZE);
982
983 return;
984}
985
986/* write RIPv2 MD5 "authentication header"
987 * (uses the auth key data field)
988 *
989 * Digest offset field is set to 0.
990 *
991 * returns: offset of the digest offset field, which must be set when
992 * length to the auth-data MD5 digest is known.
993 */
994static size_t
995rip_auth_md5_ah_write (struct stream *s, struct rip_interface *ri,
996 struct key *key)
997{
paul98fd1e62006-01-17 17:26:25 +0000998 size_t doff = 0;
paulb14ee002005-02-04 23:42:41 +0000999
1000 assert (s && ri && ri->auth_type == RIP_AUTH_MD5);
paul718e3742002-12-13 20:15:29 +00001001
1002 /* MD5 authentication. */
paulca5e5162004-06-06 22:06:33 +00001003 stream_putw (s, RIP_FAMILY_AUTH);
paul718e3742002-12-13 20:15:29 +00001004 stream_putw (s, RIP_AUTH_MD5);
1005
paulb14ee002005-02-04 23:42:41 +00001006 /* MD5 AH digest offset field.
1007 *
1008 * Set to placeholder value here, to true value when RIP-2 Packet length
1009 * is known. Actual value is set in .....().
1010 */
paul98fd1e62006-01-17 17:26:25 +00001011 doff = stream_get_endp(s);
paulb14ee002005-02-04 23:42:41 +00001012 stream_putw (s, 0);
paul718e3742002-12-13 20:15:29 +00001013
1014 /* Key ID. */
1015 if (key)
1016 stream_putc (s, key->index % 256);
1017 else
1018 stream_putc (s, 1);
1019
paulca5e5162004-06-06 22:06:33 +00001020 /* Auth Data Len. Set 16 for MD5 authentication data. Older ripds
1021 * however expect RIP_HEADER_SIZE + RIP_AUTH_MD5_SIZE so we allow for this
1022 * to be configurable.
1023 */
1024 stream_putc (s, ri->md5_auth_len);
paul718e3742002-12-13 20:15:29 +00001025
1026 /* Sequence Number (non-decreasing). */
1027 /* RFC2080: The value used in the sequence number is
1028 arbitrary, but two suggestions are the time of the
1029 message's creation or a simple message counter. */
1030 stream_putl (s, time (NULL));
1031
1032 /* Reserved field must be zero. */
1033 stream_putl (s, 0);
1034 stream_putl (s, 0);
1035
paul98fd1e62006-01-17 17:26:25 +00001036 return doff;
paulb14ee002005-02-04 23:42:41 +00001037}
paul718e3742002-12-13 20:15:29 +00001038
paulb14ee002005-02-04 23:42:41 +00001039/* If authentication is in used, write the appropriate header
1040 * returns stream offset to which length must later be written
1041 * or 0 if this is not required
1042 */
1043static size_t
1044rip_auth_header_write (struct stream *s, struct rip_interface *ri,
1045 struct key *key, char *auth_str, int len)
1046{
1047 assert (ri->auth_type != RIP_NO_AUTH);
1048
1049 switch (ri->auth_type)
1050 {
1051 case RIP_AUTH_SIMPLE_PASSWORD:
1052 rip_auth_prepare_str_send (ri, key, auth_str, len);
1053 rip_auth_simple_write (s, auth_str, len);
1054 return 0;
1055 case RIP_AUTH_MD5:
1056 return rip_auth_md5_ah_write (s, ri, key);
1057 }
1058 assert (1);
paul98fd1e62006-01-17 17:26:25 +00001059 return 0;
paulb14ee002005-02-04 23:42:41 +00001060}
1061
1062/* Write RIPv2 MD5 authentication data trailer */
1063static void
1064rip_auth_md5_set (struct stream *s, struct rip_interface *ri, size_t doff,
1065 char *auth_str, int authlen)
1066{
1067 unsigned long len;
vincentc1a03d42005-09-28 15:47:44 +00001068 MD5_CTX ctx;
paulb14ee002005-02-04 23:42:41 +00001069 unsigned char digest[RIP_AUTH_MD5_SIZE];
1070
1071 /* Make it sure this interface is configured as MD5
1072 authentication. */
1073 assert ((ri->auth_type == RIP_AUTH_MD5) && (authlen == RIP_AUTH_MD5_SIZE));
1074 assert (doff > 0);
1075
1076 /* Get packet length. */
1077 len = stream_get_endp(s);
1078
1079 /* Check packet length. */
1080 if (len < (RIP_HEADER_SIZE + RIP_RTE_SIZE))
1081 {
1082 zlog_err ("rip_auth_md5_set(): packet length %ld is less than minimum length.", len);
1083 return;
1084 }
1085
1086 /* Set the digest offset length in the header */
1087 stream_putw_at (s, doff, len);
1088
paul718e3742002-12-13 20:15:29 +00001089 /* Set authentication data. */
paulca5e5162004-06-06 22:06:33 +00001090 stream_putw (s, RIP_FAMILY_AUTH);
1091 stream_putw (s, RIP_AUTH_DATA);
paul718e3742002-12-13 20:15:29 +00001092
1093 /* Generate a digest for the RIP packet. */
vincentc1a03d42005-09-28 15:47:44 +00001094 memset(&ctx, 0, sizeof(ctx));
1095 MD5Init(&ctx);
paul98fd1e62006-01-17 17:26:25 +00001096 MD5Update(&ctx, STREAM_DATA (s), stream_get_endp (s));
vincentc1a03d42005-09-28 15:47:44 +00001097 MD5Update(&ctx, auth_str, RIP_AUTH_MD5_SIZE);
1098 MD5Final(digest, &ctx);
paul718e3742002-12-13 20:15:29 +00001099
1100 /* Copy the digest to the packet. */
1101 stream_write (s, digest, RIP_AUTH_MD5_SIZE);
1102}
1103
1104/* RIP routing information. */
pauldc63bfd2005-10-25 23:31:05 +00001105static void
paul718e3742002-12-13 20:15:29 +00001106rip_response_process (struct rip_packet *packet, int size,
paulc49ad8f2004-10-22 10:27:28 +00001107 struct sockaddr_in *from, struct connected *ifc)
paul718e3742002-12-13 20:15:29 +00001108{
1109 caddr_t lim;
1110 struct rte *rte;
paul727d1042002-12-13 20:50:29 +00001111 struct prefix_ipv4 ifaddr;
1112 struct prefix_ipv4 ifaddrclass;
paul727d1042002-12-13 20:50:29 +00001113 int subnetted;
paul718e3742002-12-13 20:15:29 +00001114
paul727d1042002-12-13 20:50:29 +00001115 /* We don't know yet. */
1116 subnetted = -1;
1117
paul718e3742002-12-13 20:15:29 +00001118 /* The Response must be ignored if it is not from the RIP
1119 port. (RFC2453 - Sec. 3.9.2)*/
paulca5e5162004-06-06 22:06:33 +00001120 if (from->sin_port != htons(RIP_PORT_DEFAULT))
paul718e3742002-12-13 20:15:29 +00001121 {
1122 zlog_info ("response doesn't come from RIP port: %d",
1123 from->sin_port);
1124 rip_peer_bad_packet (from);
1125 return;
1126 }
1127
1128 /* The datagram's IPv4 source address should be checked to see
1129 whether the datagram is from a valid neighbor; the source of the
ajs35a60c22005-10-30 23:51:32 +00001130 datagram must be on a directly connected network (RFC2453 - Sec. 3.9.2) */
1131 if (if_lookup_address(from->sin_addr) == NULL)
paul718e3742002-12-13 20:15:29 +00001132 {
1133 zlog_info ("This datagram doesn't came from a valid neighbor: %s",
1134 inet_ntoa (from->sin_addr));
1135 rip_peer_bad_packet (from);
1136 return;
1137 }
1138
1139 /* It is also worth checking to see whether the response is from one
1140 of the router's own addresses. */
1141
1142 ; /* Alredy done in rip_read () */
1143
1144 /* Update RIP peer. */
1145 rip_peer_update (from, packet->version);
1146
1147 /* Set RTE pointer. */
1148 rte = packet->rte;
1149
1150 for (lim = (caddr_t) packet + size; (caddr_t) rte < lim; rte++)
1151 {
1152 /* RIPv2 authentication check. */
1153 /* If the Address Family Identifier of the first (and only the
1154 first) entry in the message is 0xFFFF, then the remainder of
1155 the entry contains the authentication. */
1156 /* If the packet gets here it means authentication enabled */
1157 /* Check is done in rip_read(). So, just skipping it */
1158 if (packet->version == RIPv2 &&
1159 rte == packet->rte &&
paulca5e5162004-06-06 22:06:33 +00001160 rte->family == htons(RIP_FAMILY_AUTH))
paul718e3742002-12-13 20:15:29 +00001161 continue;
1162
paulca5e5162004-06-06 22:06:33 +00001163 if (rte->family != htons(AF_INET))
paul718e3742002-12-13 20:15:29 +00001164 {
1165 /* Address family check. RIP only supports AF_INET. */
1166 zlog_info ("Unsupported family %d from %s.",
1167 ntohs (rte->family), inet_ntoa (from->sin_addr));
1168 continue;
1169 }
1170
1171 /* - is the destination address valid (e.g., unicast; not net 0
1172 or 127) */
1173 if (! rip_destination_check (rte->prefix))
1174 {
1175 zlog_info ("Network is net 0 or net 127 or it is not unicast network");
1176 rip_peer_bad_route (from);
1177 continue;
1178 }
1179
1180 /* Convert metric value to host byte order. */
1181 rte->metric = ntohl (rte->metric);
1182
1183 /* - is the metric valid (i.e., between 1 and 16, inclusive) */
1184 if (! (rte->metric >= 1 && rte->metric <= 16))
1185 {
1186 zlog_info ("Route's metric is not in the 1-16 range.");
1187 rip_peer_bad_route (from);
1188 continue;
1189 }
1190
1191 /* RIPv1 does not have nexthop value. */
1192 if (packet->version == RIPv1 && rte->nexthop.s_addr != 0)
1193 {
1194 zlog_info ("RIPv1 packet with nexthop value %s",
1195 inet_ntoa (rte->nexthop));
1196 rip_peer_bad_route (from);
1197 continue;
1198 }
1199
1200 /* That is, if the provided information is ignored, a possibly
1201 sub-optimal, but absolutely valid, route may be taken. If
1202 the received Next Hop is not directly reachable, it should be
1203 treated as 0.0.0.0. */
1204 if (packet->version == RIPv2 && rte->nexthop.s_addr != 0)
1205 {
1206 u_int32_t addrval;
1207
1208 /* Multicast address check. */
1209 addrval = ntohl (rte->nexthop.s_addr);
1210 if (IN_CLASSD (addrval))
1211 {
1212 zlog_info ("Nexthop %s is multicast address, skip this rte",
1213 inet_ntoa (rte->nexthop));
1214 continue;
1215 }
1216
1217 if (! if_lookup_address (rte->nexthop))
1218 {
1219 struct route_node *rn;
1220 struct rip_info *rinfo;
1221
1222 rn = route_node_match_ipv4 (rip->table, &rte->nexthop);
1223
1224 if (rn)
1225 {
1226 rinfo = rn->info;
1227
1228 if (rinfo->type == ZEBRA_ROUTE_RIP
1229 && rinfo->sub_type == RIP_ROUTE_RTE)
1230 {
1231 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00001232 zlog_debug ("Next hop %s is on RIP network. Set nexthop to the packet's originator", inet_ntoa (rte->nexthop));
paul718e3742002-12-13 20:15:29 +00001233 rte->nexthop = rinfo->from;
1234 }
1235 else
1236 {
1237 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00001238 zlog_debug ("Next hop %s is not directly reachable. Treat it as 0.0.0.0", inet_ntoa (rte->nexthop));
paul718e3742002-12-13 20:15:29 +00001239 rte->nexthop.s_addr = 0;
1240 }
1241
1242 route_unlock_node (rn);
1243 }
1244 else
1245 {
1246 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00001247 zlog_debug ("Next hop %s is not directly reachable. Treat it as 0.0.0.0", inet_ntoa (rte->nexthop));
paul718e3742002-12-13 20:15:29 +00001248 rte->nexthop.s_addr = 0;
1249 }
1250
1251 }
1252 }
1253
1254 /* For RIPv1, there won't be a valid netmask.
1255
1256 This is a best guess at the masks. If everyone was using old
1257 Ciscos before the 'ip subnet zero' option, it would be almost
1258 right too :-)
1259
1260 Cisco summarize ripv1 advertisments to the classful boundary
1261 (/16 for class B's) except when the RIP packet does to inside
1262 the classful network in question. */
1263
1264 if ((packet->version == RIPv1 && rte->prefix.s_addr != 0)
1265 || (packet->version == RIPv2
1266 && (rte->prefix.s_addr != 0 && rte->mask.s_addr == 0)))
1267 {
1268 u_int32_t destination;
1269
paul727d1042002-12-13 20:50:29 +00001270 if (subnetted == -1)
paulc49ad8f2004-10-22 10:27:28 +00001271 {
1272 memcpy (&ifaddr, ifc->address, sizeof (struct prefix_ipv4));
1273 memcpy (&ifaddrclass, &ifaddr, sizeof (struct prefix_ipv4));
1274 apply_classful_mask_ipv4 (&ifaddrclass);
1275 subnetted = 0;
1276 if (ifaddr.prefixlen > ifaddrclass.prefixlen)
1277 subnetted = 1;
1278 }
paul727d1042002-12-13 20:50:29 +00001279
paul718e3742002-12-13 20:15:29 +00001280 destination = ntohl (rte->prefix.s_addr);
1281
paul727d1042002-12-13 20:50:29 +00001282 if (IN_CLASSA (destination))
paul718e3742002-12-13 20:15:29 +00001283 masklen2ip (8, &rte->mask);
paul727d1042002-12-13 20:50:29 +00001284 else if (IN_CLASSB (destination))
1285 masklen2ip (16, &rte->mask);
1286 else if (IN_CLASSC (destination))
1287 masklen2ip (24, &rte->mask);
1288
1289 if (subnetted == 1)
1290 masklen2ip (ifaddrclass.prefixlen,
1291 (struct in_addr *) &destination);
1292 if ((subnetted == 1) && ((rte->prefix.s_addr & destination) ==
1293 ifaddrclass.prefix.s_addr))
1294 {
1295 masklen2ip (ifaddr.prefixlen, &rte->mask);
1296 if ((rte->prefix.s_addr & rte->mask.s_addr) != rte->prefix.s_addr)
1297 masklen2ip (32, &rte->mask);
1298 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00001299 zlog_debug ("Subnetted route %s", inet_ntoa (rte->prefix));
paul727d1042002-12-13 20:50:29 +00001300 }
1301 else
1302 {
1303 if ((rte->prefix.s_addr & rte->mask.s_addr) != rte->prefix.s_addr)
1304 continue;
1305 }
1306
1307 if (IS_RIP_DEBUG_EVENT)
1308 {
ajs5d6c3772004-12-08 19:24:06 +00001309 zlog_debug ("Resultant route %s", inet_ntoa (rte->prefix));
1310 zlog_debug ("Resultant mask %s", inet_ntoa (rte->mask));
paul718e3742002-12-13 20:15:29 +00001311 }
1312 }
1313
1314 /* In case of RIPv2, if prefix in RTE is not netmask applied one
1315 ignore the entry. */
1316 if ((packet->version == RIPv2)
1317 && (rte->mask.s_addr != 0)
1318 && ((rte->prefix.s_addr & rte->mask.s_addr) != rte->prefix.s_addr))
1319 {
1320 zlog_warn ("RIPv2 address %s is not mask /%d applied one",
1321 inet_ntoa (rte->prefix), ip_masklen (rte->mask));
1322 rip_peer_bad_route (from);
1323 continue;
1324 }
1325
1326 /* Default route's netmask is ignored. */
1327 if (packet->version == RIPv2
1328 && (rte->prefix.s_addr == 0)
1329 && (rte->mask.s_addr != 0))
1330 {
1331 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00001332 zlog_debug ("Default route with non-zero netmask. Set zero to netmask");
paul718e3742002-12-13 20:15:29 +00001333 rte->mask.s_addr = 0;
1334 }
1335
1336 /* Routing table updates. */
paulc49ad8f2004-10-22 10:27:28 +00001337 rip_rte_process (rte, from, ifc->ifp);
paul718e3742002-12-13 20:15:29 +00001338 }
1339}
1340
paula4e987e2005-06-03 17:46:49 +00001341/* Make socket for RIP protocol. */
paulf69bd9d2005-06-03 18:01:50 +00001342static int
paul2c61ae32005-08-16 15:22:14 +00001343rip_create_socket (struct sockaddr_in *from)
paula4e987e2005-06-03 17:46:49 +00001344{
1345 int ret;
1346 int sock;
1347 struct sockaddr_in addr;
paulf69bd9d2005-06-03 18:01:50 +00001348
paul2c61ae32005-08-16 15:22:14 +00001349 memset (&addr, 0, sizeof (struct sockaddr_in));
1350
1351 if (!from)
paulf69bd9d2005-06-03 18:01:50 +00001352 {
paulf69bd9d2005-06-03 18:01:50 +00001353 addr.sin_family = AF_INET;
1354 addr.sin_addr.s_addr = INADDR_ANY;
paul2c61ae32005-08-16 15:22:14 +00001355#ifdef HAVE_SINLEN
1356 addr.sin_len = sizeof (struct sockaddr_in);
1357#endif /* HAVE_SINLEN */
jardin38d3c162005-10-19 19:29:59 +00001358 } else {
1359 memcpy(&addr, from, sizeof(addr));
paulf69bd9d2005-06-03 18:01:50 +00001360 }
1361
paul2c61ae32005-08-16 15:22:14 +00001362 /* sending port must always be the RIP port */
1363 addr.sin_port = htons (RIP_PORT_DEFAULT);
1364
paula4e987e2005-06-03 17:46:49 +00001365 /* Make datagram socket. */
1366 sock = socket (AF_INET, SOCK_DGRAM, 0);
1367 if (sock < 0)
1368 {
1369 zlog_err("Cannot create UDP socket: %s", safe_strerror(errno));
1370 exit (1);
1371 }
1372
1373 sockopt_broadcast (sock);
1374 sockopt_reuseaddr (sock);
1375 sockopt_reuseport (sock);
paula4e987e2005-06-03 17:46:49 +00001376#ifdef RIP_RECVMSG
1377 setsockopt_pktinfo (sock);
1378#endif /* RIP_RECVMSG */
1379
1380 if (ripd_privs.change (ZPRIVS_RAISE))
1381 zlog_err ("rip_create_socket: could not raise privs");
paulf69bd9d2005-06-03 18:01:50 +00001382 setsockopt_so_recvbuf (sock, RIP_UDP_RCV_BUF);
1383 if ( (ret = bind (sock, (struct sockaddr *) & addr, sizeof (addr))) < 0)
1384
paula4e987e2005-06-03 17:46:49 +00001385 {
1386 int save_errno = errno;
1387 if (ripd_privs.change (ZPRIVS_LOWER))
1388 zlog_err ("rip_create_socket: could not lower privs");
paul2c61ae32005-08-16 15:22:14 +00001389
1390 zlog_err("%s: Can't bind socket %d to %s port %d: %s", __func__,
1391 sock, inet_ntoa(addr.sin_addr),
1392 (int) ntohs(addr.sin_port),
1393 safe_strerror(save_errno));
1394
paulf69bd9d2005-06-03 18:01:50 +00001395 close (sock);
paula4e987e2005-06-03 17:46:49 +00001396 return ret;
1397 }
paulf69bd9d2005-06-03 18:01:50 +00001398
paula4e987e2005-06-03 17:46:49 +00001399 if (ripd_privs.change (ZPRIVS_LOWER))
1400 zlog_err ("rip_create_socket: could not lower privs");
1401
1402 return sock;
1403}
1404
paulc49ad8f2004-10-22 10:27:28 +00001405/* RIP packet send to destination address, on interface denoted by
1406 * by connected argument. NULL to argument denotes destination should be
1407 * should be RIP multicast group
1408 */
pauldc63bfd2005-10-25 23:31:05 +00001409static int
paulc49ad8f2004-10-22 10:27:28 +00001410rip_send_packet (u_char * buf, int size, struct sockaddr_in *to,
1411 struct connected *ifc)
paul718e3742002-12-13 20:15:29 +00001412{
paul931cd542004-01-23 15:31:42 +00001413 int ret, send_sock;
paul718e3742002-12-13 20:15:29 +00001414 struct sockaddr_in sin;
paulc49ad8f2004-10-22 10:27:28 +00001415
1416 assert (ifc != NULL);
1417
paul931cd542004-01-23 15:31:42 +00001418 if (IS_RIP_DEBUG_PACKET)
1419 {
paulf69bd9d2005-06-03 18:01:50 +00001420#define ADDRESS_SIZE 20
1421 char dst[ADDRESS_SIZE];
1422 dst[ADDRESS_SIZE - 1] = '\0';
1423
paul931cd542004-01-23 15:31:42 +00001424 if (to)
1425 {
paulf69bd9d2005-06-03 18:01:50 +00001426 strncpy (dst, inet_ntoa(to->sin_addr), ADDRESS_SIZE - 1);
paul931cd542004-01-23 15:31:42 +00001427 }
1428 else
1429 {
1430 sin.sin_addr.s_addr = htonl (INADDR_RIP_GROUP);
paulf69bd9d2005-06-03 18:01:50 +00001431 strncpy (dst, inet_ntoa(sin.sin_addr), ADDRESS_SIZE - 1);
paul931cd542004-01-23 15:31:42 +00001432 }
paulf69bd9d2005-06-03 18:01:50 +00001433#undef ADDRESS_SIZE
ajs5d6c3772004-12-08 19:24:06 +00001434 zlog_debug("rip_send_packet %s > %s (%s)",
paulc49ad8f2004-10-22 10:27:28 +00001435 inet_ntoa(ifc->address->u.prefix4),
1436 dst, ifc->ifp->name);
paul931cd542004-01-23 15:31:42 +00001437 }
paulf69bd9d2005-06-03 18:01:50 +00001438
paulc49ad8f2004-10-22 10:27:28 +00001439 if ( CHECK_FLAG (ifc->flags, ZEBRA_IFA_SECONDARY) )
paul931cd542004-01-23 15:31:42 +00001440 {
1441 /*
1442 * ZEBRA_IFA_SECONDARY is set on linux when an interface is configured
1443 * with multiple addresses on the same subnet: the first address
1444 * on the subnet is configured "primary", and all subsequent addresses
1445 * on that subnet are treated as "secondary" addresses.
1446 * In order to avoid routing-table bloat on other rip listeners,
1447 * we do not send out RIP packets with ZEBRA_IFA_SECONDARY source addrs.
1448 * XXX Since Linux is the only system for which the ZEBRA_IFA_SECONDARY
1449 * flag is set, we would end up sending a packet for a "secondary"
1450 * source address on non-linux systems.
1451 */
1452 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +00001453 zlog_debug("duplicate dropped");
paul931cd542004-01-23 15:31:42 +00001454 return 0;
1455 }
1456
paul718e3742002-12-13 20:15:29 +00001457 /* Make destination address. */
1458 memset (&sin, 0, sizeof (struct sockaddr_in));
1459 sin.sin_family = AF_INET;
1460#ifdef HAVE_SIN_LEN
1461 sin.sin_len = sizeof (struct sockaddr_in);
1462#endif /* HAVE_SIN_LEN */
1463
1464 /* When destination is specified, use it's port and address. */
1465 if (to)
1466 {
paul718e3742002-12-13 20:15:29 +00001467 sin.sin_port = to->sin_port;
1468 sin.sin_addr = to->sin_addr;
paul931cd542004-01-23 15:31:42 +00001469 send_sock = rip->sock;
paul718e3742002-12-13 20:15:29 +00001470 }
1471 else
1472 {
paul2c61ae32005-08-16 15:22:14 +00001473 struct sockaddr_in from;
1474
paul718e3742002-12-13 20:15:29 +00001475 sin.sin_port = htons (RIP_PORT_DEFAULT);
1476 sin.sin_addr.s_addr = htonl (INADDR_RIP_GROUP);
paul2c61ae32005-08-16 15:22:14 +00001477
1478 /* multicast send should bind to local interface address */
1479 from.sin_family = AF_INET;
1480 from.sin_port = htons (RIP_PORT_DEFAULT);
1481 from.sin_addr = ifc->address->u.prefix4;
1482#ifdef HAVE_SIN_LEN
1483 from.sin_len = sizeof (struct sockaddr_in);
1484#endif /* HAVE_SIN_LEN */
1485
paul931cd542004-01-23 15:31:42 +00001486 /*
1487 * we have to open a new socket for each packet because this
1488 * is the most portable way to bind to a different source
1489 * ipv4 address for each packet.
1490 */
paul2c61ae32005-08-16 15:22:14 +00001491 if ( (send_sock = rip_create_socket (&from)) < 0)
paul931cd542004-01-23 15:31:42 +00001492 {
paulf69bd9d2005-06-03 18:01:50 +00001493 zlog_warn("rip_send_packet could not create socket.");
paul931cd542004-01-23 15:31:42 +00001494 return -1;
paulf69bd9d2005-06-03 18:01:50 +00001495 }
paulc49ad8f2004-10-22 10:27:28 +00001496 rip_interface_multicast_set (send_sock, ifc);
paul718e3742002-12-13 20:15:29 +00001497 }
1498
paul931cd542004-01-23 15:31:42 +00001499 ret = sendto (send_sock, buf, size, 0, (struct sockaddr *)&sin,
paul718e3742002-12-13 20:15:29 +00001500 sizeof (struct sockaddr_in));
1501
1502 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00001503 zlog_debug ("SEND to %s.%d", inet_ntoa(sin.sin_addr),
paulcc1131a2003-10-15 23:20:17 +00001504 ntohs (sin.sin_port));
paul718e3742002-12-13 20:15:29 +00001505
1506 if (ret < 0)
ajs6099b3b2004-11-20 02:06:59 +00001507 zlog_warn ("can't send packet : %s", safe_strerror (errno));
paul718e3742002-12-13 20:15:29 +00001508
paul931cd542004-01-23 15:31:42 +00001509 if (!to)
1510 close(send_sock);
1511
paul718e3742002-12-13 20:15:29 +00001512 return ret;
1513}
1514
1515/* Add redistributed route to RIP table. */
1516void
1517rip_redistribute_add (int type, int sub_type, struct prefix_ipv4 *p,
vincentfbf5d032005-09-29 11:25:50 +00001518 unsigned int ifindex, struct in_addr *nexthop,
1519 unsigned int metric, unsigned char distance)
paul718e3742002-12-13 20:15:29 +00001520{
1521 int ret;
1522 struct route_node *rp;
1523 struct rip_info *rinfo;
1524
1525 /* Redistribute route */
1526 ret = rip_destination_check (p->prefix);
1527 if (! ret)
1528 return;
1529
1530 rp = route_node_get (rip->table, (struct prefix *) p);
1531
1532 rinfo = rp->info;
1533
1534 if (rinfo)
1535 {
1536 if (rinfo->type == ZEBRA_ROUTE_CONNECT
1537 && rinfo->sub_type == RIP_ROUTE_INTERFACE
1538 && rinfo->metric != RIP_METRIC_INFINITY)
1539 {
1540 route_unlock_node (rp);
1541 return;
1542 }
1543
1544 /* Manually configured RIP route check. */
1545 if (rinfo->type == ZEBRA_ROUTE_RIP
hasso16705132003-05-25 14:49:19 +00001546 && ((rinfo->sub_type == RIP_ROUTE_STATIC) ||
1547 (rinfo->sub_type == RIP_ROUTE_DEFAULT)) )
paul718e3742002-12-13 20:15:29 +00001548 {
hasso16705132003-05-25 14:49:19 +00001549 if (type != ZEBRA_ROUTE_RIP || ((sub_type != RIP_ROUTE_STATIC) &&
1550 (sub_type != RIP_ROUTE_DEFAULT)))
paul718e3742002-12-13 20:15:29 +00001551 {
1552 route_unlock_node (rp);
1553 return;
1554 }
1555 }
1556
1557 RIP_TIMER_OFF (rinfo->t_timeout);
1558 RIP_TIMER_OFF (rinfo->t_garbage_collect);
1559
1560 if (rip_route_rte (rinfo))
1561 rip_zebra_ipv4_delete ((struct prefix_ipv4 *)&rp->p, &rinfo->nexthop,
1562 rinfo->metric);
1563 rp->info = NULL;
1564 rip_info_free (rinfo);
1565
1566 route_unlock_node (rp);
1567 }
1568
1569 rinfo = rip_info_new ();
1570
1571 rinfo->type = type;
1572 rinfo->sub_type = sub_type;
1573 rinfo->ifindex = ifindex;
1574 rinfo->metric = 1;
vincentfbf5d032005-09-29 11:25:50 +00001575 rinfo->external_metric = metric;
1576 rinfo->distance = distance;
paul718e3742002-12-13 20:15:29 +00001577 rinfo->rp = rp;
1578
1579 if (nexthop)
1580 rinfo->nexthop = *nexthop;
1581
1582 rinfo->flags |= RIP_RTF_FIB;
1583 rp->info = rinfo;
1584
1585 rinfo->flags |= RIP_RTF_CHANGED;
1586
hasso16705132003-05-25 14:49:19 +00001587 if (IS_RIP_DEBUG_EVENT) {
1588 if (!nexthop)
ajs5d6c3772004-12-08 19:24:06 +00001589 zlog_debug ("Redistribute new prefix %s/%d on the interface %s",
hasso16705132003-05-25 14:49:19 +00001590 inet_ntoa(p->prefix), p->prefixlen,
1591 ifindex2ifname(ifindex));
1592 else
ajs5d6c3772004-12-08 19:24:06 +00001593 zlog_debug ("Redistribute new prefix %s/%d with nexthop %s on the interface %s",
hasso16705132003-05-25 14:49:19 +00001594 inet_ntoa(p->prefix), p->prefixlen, inet_ntoa(rinfo->nexthop),
1595 ifindex2ifname(ifindex));
1596 }
1597
1598
paul718e3742002-12-13 20:15:29 +00001599 rip_event (RIP_TRIGGERED_UPDATE, 0);
1600}
1601
1602/* Delete redistributed route from RIP table. */
1603void
1604rip_redistribute_delete (int type, int sub_type, struct prefix_ipv4 *p,
1605 unsigned int ifindex)
1606{
1607 int ret;
1608 struct route_node *rp;
1609 struct rip_info *rinfo;
1610
1611 ret = rip_destination_check (p->prefix);
1612 if (! ret)
1613 return;
1614
1615 rp = route_node_lookup (rip->table, (struct prefix *) p);
1616 if (rp)
1617 {
1618 rinfo = rp->info;
1619
1620 if (rinfo != NULL
1621 && rinfo->type == type
1622 && rinfo->sub_type == sub_type
1623 && rinfo->ifindex == ifindex)
1624 {
1625 /* Perform poisoned reverse. */
1626 rinfo->metric = RIP_METRIC_INFINITY;
1627 RIP_TIMER_ON (rinfo->t_garbage_collect,
1628 rip_garbage_collect, rip->garbage_time);
1629 RIP_TIMER_OFF (rinfo->t_timeout);
1630 rinfo->flags |= RIP_RTF_CHANGED;
1631
hasso16705132003-05-25 14:49:19 +00001632 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00001633 zlog_debug ("Poisone %s/%d on the interface %s with an infinity metric [delete]",
hasso16705132003-05-25 14:49:19 +00001634 inet_ntoa(p->prefix), p->prefixlen,
1635 ifindex2ifname(ifindex));
1636
paul718e3742002-12-13 20:15:29 +00001637 rip_event (RIP_TRIGGERED_UPDATE, 0);
1638 }
1639 }
1640}
1641
1642/* Response to request called from rip_read ().*/
pauldc63bfd2005-10-25 23:31:05 +00001643static void
paul718e3742002-12-13 20:15:29 +00001644rip_request_process (struct rip_packet *packet, int size,
paulc49ad8f2004-10-22 10:27:28 +00001645 struct sockaddr_in *from, struct connected *ifc)
paul718e3742002-12-13 20:15:29 +00001646{
1647 caddr_t lim;
1648 struct rte *rte;
1649 struct prefix_ipv4 p;
1650 struct route_node *rp;
1651 struct rip_info *rinfo;
1652 struct rip_interface *ri;
1653
hasso16705132003-05-25 14:49:19 +00001654 /* Does not reponse to the requests on the loopback interfaces */
paulc49ad8f2004-10-22 10:27:28 +00001655 if (if_is_loopback (ifc->ifp))
hasso16705132003-05-25 14:49:19 +00001656 return;
1657
hasso429a0f82004-02-22 23:42:22 +00001658 /* Check RIP process is enabled on this interface. */
paulc49ad8f2004-10-22 10:27:28 +00001659 ri = ifc->ifp->info;
hasso16705132003-05-25 14:49:19 +00001660 if (! ri->running)
1661 return;
paul718e3742002-12-13 20:15:29 +00001662
1663 /* When passive interface is specified, suppress responses */
1664 if (ri->passive)
1665 return;
paulc49ad8f2004-10-22 10:27:28 +00001666
paul718e3742002-12-13 20:15:29 +00001667 /* RIP peer update. */
1668 rip_peer_update (from, packet->version);
1669
1670 lim = ((caddr_t) packet) + size;
1671 rte = packet->rte;
1672
1673 /* The Request is processed entry by entry. If there are no
1674 entries, no response is given. */
1675 if (lim == (caddr_t) rte)
1676 return;
1677
1678 /* There is one special case. If there is exactly one entry in the
1679 request, and it has an address family identifier of zero and a
1680 metric of infinity (i.e., 16), then this is a request to send the
1681 entire routing table. */
1682 if (lim == ((caddr_t) (rte + 1)) &&
1683 ntohs (rte->family) == 0 &&
1684 ntohl (rte->metric) == RIP_METRIC_INFINITY)
1685 {
paulcc1131a2003-10-15 23:20:17 +00001686 struct prefix_ipv4 saddr;
1687
1688 /* saddr will be used for determining which routes to split-horizon.
1689 Since the source address we'll pick will be on the same subnet as the
1690 destination, for the purpose of split-horizoning, we'll
1691 pretend that "from" is our source address. */
1692 saddr.family = AF_INET;
1693 saddr.prefixlen = IPV4_MAX_BITLEN;
1694 saddr.prefix = from->sin_addr;
1695
paul718e3742002-12-13 20:15:29 +00001696 /* All route with split horizon */
paulc49ad8f2004-10-22 10:27:28 +00001697 rip_output_process (ifc, from, rip_all_route, packet->version);
paul718e3742002-12-13 20:15:29 +00001698 }
1699 else
1700 {
1701 /* Examine the list of RTEs in the Request one by one. For each
1702 entry, look up the destination in the router's routing
1703 database and, if there is a route, put that route's metric in
1704 the metric field of the RTE. If there is no explicit route
1705 to the specified destination, put infinity in the metric
1706 field. Once all the entries have been filled in, change the
1707 command from Request to Response and send the datagram back
1708 to the requestor. */
1709 p.family = AF_INET;
1710
1711 for (; ((caddr_t) rte) < lim; rte++)
1712 {
1713 p.prefix = rte->prefix;
1714 p.prefixlen = ip_masklen (rte->mask);
1715 apply_mask_ipv4 (&p);
1716
1717 rp = route_node_lookup (rip->table, (struct prefix *) &p);
1718 if (rp)
1719 {
1720 rinfo = rp->info;
1721 rte->metric = htonl (rinfo->metric);
1722 route_unlock_node (rp);
1723 }
1724 else
1725 rte->metric = htonl (RIP_METRIC_INFINITY);
1726 }
1727 packet->command = RIP_RESPONSE;
1728
paulc49ad8f2004-10-22 10:27:28 +00001729 rip_send_packet ((u_char *)packet, size, from, ifc);
paul718e3742002-12-13 20:15:29 +00001730 }
1731 rip_global_queries++;
1732}
1733
1734#if RIP_RECVMSG
1735/* Set IPv6 packet info to the socket. */
1736static int
1737setsockopt_pktinfo (int sock)
1738{
1739 int ret;
1740 int val = 1;
1741
1742 ret = setsockopt(sock, IPPROTO_IP, IP_PKTINFO, &val, sizeof(val));
1743 if (ret < 0)
ajs6099b3b2004-11-20 02:06:59 +00001744 zlog_warn ("Can't setsockopt IP_PKTINFO : %s", safe_strerror (errno));
paul718e3742002-12-13 20:15:29 +00001745 return ret;
1746}
1747
1748/* Read RIP packet by recvmsg function. */
1749int
1750rip_recvmsg (int sock, u_char *buf, int size, struct sockaddr_in *from,
1751 int *ifindex)
1752{
1753 int ret;
1754 struct msghdr msg;
1755 struct iovec iov;
1756 struct cmsghdr *ptr;
1757 char adata[1024];
1758
1759 msg.msg_name = (void *) from;
1760 msg.msg_namelen = sizeof (struct sockaddr_in);
1761 msg.msg_iov = &iov;
1762 msg.msg_iovlen = 1;
1763 msg.msg_control = (void *) adata;
1764 msg.msg_controllen = sizeof adata;
1765 iov.iov_base = buf;
1766 iov.iov_len = size;
1767
1768 ret = recvmsg (sock, &msg, 0);
1769 if (ret < 0)
1770 return ret;
1771
ajsb99760a2005-01-04 16:24:43 +00001772 for (ptr = ZCMSG_FIRSTHDR(&msg); ptr != NULL; ptr = CMSG_NXTHDR(&msg, ptr))
paul718e3742002-12-13 20:15:29 +00001773 if (ptr->cmsg_level == IPPROTO_IP && ptr->cmsg_type == IP_PKTINFO)
1774 {
1775 struct in_pktinfo *pktinfo;
1776 int i;
1777
1778 pktinfo = (struct in_pktinfo *) CMSG_DATA (ptr);
1779 i = pktinfo->ipi_ifindex;
1780 }
1781 return ret;
1782}
1783
1784/* RIP packet read function. */
1785int
1786rip_read_new (struct thread *t)
1787{
1788 int ret;
1789 int sock;
1790 char buf[RIP_PACKET_MAXSIZ];
1791 struct sockaddr_in from;
1792 unsigned int ifindex;
1793
1794 /* Fetch socket then register myself. */
1795 sock = THREAD_FD (t);
1796 rip_event (RIP_READ, sock);
1797
1798 /* Read RIP packet. */
1799 ret = rip_recvmsg (sock, buf, RIP_PACKET_MAXSIZ, &from, (int *)&ifindex);
1800 if (ret < 0)
1801 {
ajs6099b3b2004-11-20 02:06:59 +00001802 zlog_warn ("Can't read RIP packet: %s", safe_strerror (errno));
paul718e3742002-12-13 20:15:29 +00001803 return ret;
1804 }
1805
1806 return ret;
1807}
1808#endif /* RIP_RECVMSG */
1809
1810/* First entry point of RIP packet. */
pauldc63bfd2005-10-25 23:31:05 +00001811static int
paul718e3742002-12-13 20:15:29 +00001812rip_read (struct thread *t)
1813{
1814 int sock;
1815 int ret;
1816 int rtenum;
1817 union rip_buf rip_buf;
1818 struct rip_packet *packet;
1819 struct sockaddr_in from;
paul11dde9c2004-05-31 14:00:00 +00001820 int len;
1821 socklen_t fromlen;
paul718e3742002-12-13 20:15:29 +00001822 struct interface *ifp;
paulc49ad8f2004-10-22 10:27:28 +00001823 struct connected *ifc;
paul718e3742002-12-13 20:15:29 +00001824 struct rip_interface *ri;
1825
1826 /* Fetch socket then register myself. */
1827 sock = THREAD_FD (t);
1828 rip->t_read = NULL;
1829
1830 /* Add myself to tne next event */
1831 rip_event (RIP_READ, sock);
1832
1833 /* RIPd manages only IPv4. */
1834 memset (&from, 0, sizeof (struct sockaddr_in));
1835 fromlen = sizeof (struct sockaddr_in);
1836
1837 len = recvfrom (sock, (char *)&rip_buf.buf, sizeof (rip_buf.buf), 0,
1838 (struct sockaddr *) &from, &fromlen);
1839 if (len < 0)
1840 {
ajs6099b3b2004-11-20 02:06:59 +00001841 zlog_info ("recvfrom failed: %s", safe_strerror (errno));
paul718e3742002-12-13 20:15:29 +00001842 return len;
1843 }
1844
1845 /* Check is this packet comming from myself? */
paul31a476c2003-09-29 19:54:53 +00001846 if (if_check_address (from.sin_addr))
paul718e3742002-12-13 20:15:29 +00001847 {
1848 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +00001849 zlog_debug ("ignore packet comes from myself");
paul718e3742002-12-13 20:15:29 +00001850 return -1;
1851 }
1852
1853 /* Which interface is this packet comes from. */
1854 ifp = if_lookup_address (from.sin_addr);
paulc49ad8f2004-10-22 10:27:28 +00001855
paul718e3742002-12-13 20:15:29 +00001856 /* RIP packet received */
1857 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00001858 zlog_debug ("RECV packet from %s port %d on %s",
paul718e3742002-12-13 20:15:29 +00001859 inet_ntoa (from.sin_addr), ntohs (from.sin_port),
1860 ifp ? ifp->name : "unknown");
1861
1862 /* If this packet come from unknown interface, ignore it. */
1863 if (ifp == NULL)
1864 {
ajs766a0ca2004-12-15 14:55:51 +00001865 zlog_info ("rip_read: cannot find interface for packet from %s port %d",
1866 inet_ntoa(from.sin_addr), ntohs (from.sin_port));
paulc49ad8f2004-10-22 10:27:28 +00001867 return -1;
1868 }
1869
1870 ifc = connected_lookup_address (ifp, from.sin_addr);
1871
1872 if (ifc == NULL)
1873 {
ajs766a0ca2004-12-15 14:55:51 +00001874 zlog_info ("rip_read: cannot find connected address for packet from %s "
1875 "port %d on interface %s",
1876 inet_ntoa(from.sin_addr), ntohs (from.sin_port), ifp->name);
paul718e3742002-12-13 20:15:29 +00001877 return -1;
1878 }
1879
1880 /* Packet length check. */
1881 if (len < RIP_PACKET_MINSIZ)
1882 {
1883 zlog_warn ("packet size %d is smaller than minimum size %d",
1884 len, RIP_PACKET_MINSIZ);
1885 rip_peer_bad_packet (&from);
1886 return len;
1887 }
1888 if (len > RIP_PACKET_MAXSIZ)
1889 {
1890 zlog_warn ("packet size %d is larger than max size %d",
1891 len, RIP_PACKET_MAXSIZ);
1892 rip_peer_bad_packet (&from);
1893 return len;
1894 }
1895
1896 /* Packet alignment check. */
1897 if ((len - RIP_PACKET_MINSIZ) % 20)
1898 {
1899 zlog_warn ("packet size %d is wrong for RIP packet alignment", len);
1900 rip_peer_bad_packet (&from);
1901 return len;
1902 }
1903
1904 /* Set RTE number. */
1905 rtenum = ((len - RIP_PACKET_MINSIZ) / 20);
1906
1907 /* For easy to handle. */
1908 packet = &rip_buf.rip_packet;
1909
1910 /* RIP version check. */
1911 if (packet->version == 0)
1912 {
1913 zlog_info ("version 0 with command %d received.", packet->command);
1914 rip_peer_bad_packet (&from);
1915 return -1;
1916 }
1917
1918 /* Dump RIP packet. */
1919 if (IS_RIP_DEBUG_RECV)
1920 rip_packet_dump (packet, len, "RECV");
1921
1922 /* RIP version adjust. This code should rethink now. RFC1058 says
1923 that "Version 1 implementations are to ignore this extra data and
1924 process only the fields specified in this document.". So RIPv3
1925 packet should be treated as RIPv1 ignoring must be zero field. */
1926 if (packet->version > RIPv2)
1927 packet->version = RIPv2;
1928
1929 /* Is RIP running or is this RIP neighbor ?*/
1930 ri = ifp->info;
1931 if (! ri->running && ! rip_neighbor_lookup (&from))
1932 {
1933 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00001934 zlog_debug ("RIP is not enabled on interface %s.", ifp->name);
paul718e3742002-12-13 20:15:29 +00001935 rip_peer_bad_packet (&from);
1936 return -1;
1937 }
1938
1939 /* RIP Version check. */
1940 if (packet->command == RIP_RESPONSE)
1941 {
paulf38a4712003-06-07 01:10:00 +00001942 int vrecv = ((ri->ri_receive == RI_RIP_UNSPEC) ?
1943 rip->version_recv : ri->ri_receive);
paul718e3742002-12-13 20:15:29 +00001944 if (packet->version == RIPv1)
paulf38a4712003-06-07 01:10:00 +00001945 if (! (vrecv & RIPv1))
paul718e3742002-12-13 20:15:29 +00001946 {
1947 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +00001948 zlog_debug (" packet's v%d doesn't fit to if version spec",
paul718e3742002-12-13 20:15:29 +00001949 packet->version);
1950 rip_peer_bad_packet (&from);
1951 return -1;
1952 }
1953 if (packet->version == RIPv2)
paulf38a4712003-06-07 01:10:00 +00001954 if (! (vrecv & RIPv2))
paul718e3742002-12-13 20:15:29 +00001955 {
1956 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +00001957 zlog_debug (" packet's v%d doesn't fit to if version spec",
paul718e3742002-12-13 20:15:29 +00001958 packet->version);
1959 rip_peer_bad_packet (&from);
1960 return -1;
1961 }
paul718e3742002-12-13 20:15:29 +00001962 }
1963
1964 /* RFC2453 5.2 If the router is not configured to authenticate RIP-2
1965 messages, then RIP-1 and unauthenticated RIP-2 messages will be
1966 accepted; authenticated RIP-2 messages shall be discarded. */
1967
1968 if ((ri->auth_type == RIP_NO_AUTH)
1969 && rtenum
paulca5e5162004-06-06 22:06:33 +00001970 && (packet->version == RIPv2)
1971 && (packet->rte->family == htons(RIP_FAMILY_AUTH)))
paul718e3742002-12-13 20:15:29 +00001972 {
1973 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00001974 zlog_debug ("packet RIPv%d is dropped because authentication disabled",
paul718e3742002-12-13 20:15:29 +00001975 packet->version);
1976 rip_peer_bad_packet (&from);
1977 return -1;
1978 }
1979
1980 /* If the router is configured to authenticate RIP-2 messages, then
1981 RIP-1 messages and RIP-2 messages which pass authentication
1982 testing shall be accepted; unauthenticated and failed
1983 authentication RIP-2 messages shall be discarded. For maximum
1984 security, RIP-1 messages should be ignored when authentication is
1985 in use (see section 4.1); otherwise, the routing information from
1986 authenticated messages will be propagated by RIP-1 routers in an
1987 unauthenticated manner. */
1988
1989 if ((ri->auth_type == RIP_AUTH_SIMPLE_PASSWORD
paulca5e5162004-06-06 22:06:33 +00001990 || ri->auth_type == RIP_AUTH_MD5) && rtenum)
paul718e3742002-12-13 20:15:29 +00001991 {
1992 /* We follow maximum security. */
paulca5e5162004-06-06 22:06:33 +00001993 if (packet->version == RIPv1
1994 && packet->rte->family == htons(RIP_FAMILY_AUTH))
paul718e3742002-12-13 20:15:29 +00001995 {
1996 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +00001997 zlog_debug
paulca5e5162004-06-06 22:06:33 +00001998 ("packet RIPv%d is dropped because authentication enabled",
1999 packet->version);
paul718e3742002-12-13 20:15:29 +00002000 rip_peer_bad_packet (&from);
2001 return -1;
2002 }
2003
2004 /* Check RIPv2 authentication. */
2005 if (packet->version == RIPv2)
2006 {
paulca5e5162004-06-06 22:06:33 +00002007 if (packet->rte->family == htons(RIP_FAMILY_AUTH))
paul718e3742002-12-13 20:15:29 +00002008 {
paulca5e5162004-06-06 22:06:33 +00002009 if (packet->rte->tag == htons(RIP_AUTH_SIMPLE_PASSWORD))
paul718e3742002-12-13 20:15:29 +00002010 {
2011 ret = rip_auth_simple_password (packet->rte, &from, ifp);
2012 if (! ret)
2013 {
2014 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00002015 zlog_debug
paulca5e5162004-06-06 22:06:33 +00002016 ("RIPv2 simple password authentication failed");
paul718e3742002-12-13 20:15:29 +00002017 rip_peer_bad_packet (&from);
2018 return -1;
2019 }
2020 else
2021 {
2022 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00002023 zlog_debug
paulca5e5162004-06-06 22:06:33 +00002024 ("RIPv2 simple password authentication success");
paul718e3742002-12-13 20:15:29 +00002025 }
2026 }
paulca5e5162004-06-06 22:06:33 +00002027 else if (packet->rte->tag == htons(RIP_AUTH_MD5))
paul718e3742002-12-13 20:15:29 +00002028 {
paulca5e5162004-06-06 22:06:33 +00002029 ret = rip_auth_md5 (packet, &from, len, ifp);
paul718e3742002-12-13 20:15:29 +00002030 if (! ret)
2031 {
2032 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00002033 zlog_debug ("RIPv2 MD5 authentication failed");
paul718e3742002-12-13 20:15:29 +00002034 rip_peer_bad_packet (&from);
2035 return -1;
2036 }
2037 else
2038 {
2039 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00002040 zlog_debug ("RIPv2 MD5 authentication success");
paul718e3742002-12-13 20:15:29 +00002041 }
2042 /* Reset RIP packet length to trim MD5 data. */
2043 len = ret;
2044 }
2045 else
2046 {
2047 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00002048 zlog_debug ("Unknown authentication type %d",
paul718e3742002-12-13 20:15:29 +00002049 ntohs (packet->rte->tag));
2050 rip_peer_bad_packet (&from);
2051 return -1;
2052 }
2053 }
2054 else
2055 {
2056 /* There is no authentication in the packet. */
2057 if (ri->auth_str || ri->key_chain)
2058 {
2059 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00002060 zlog_debug
paulca5e5162004-06-06 22:06:33 +00002061 ("RIPv2 authentication failed: no authentication in packet");
paul718e3742002-12-13 20:15:29 +00002062 rip_peer_bad_packet (&from);
2063 return -1;
2064 }
2065 }
2066 }
2067 }
2068
2069 /* Process each command. */
2070 switch (packet->command)
2071 {
2072 case RIP_RESPONSE:
paulc49ad8f2004-10-22 10:27:28 +00002073 rip_response_process (packet, len, &from, ifc);
paul718e3742002-12-13 20:15:29 +00002074 break;
2075 case RIP_REQUEST:
2076 case RIP_POLL:
paulc49ad8f2004-10-22 10:27:28 +00002077 rip_request_process (packet, len, &from, ifc);
paul718e3742002-12-13 20:15:29 +00002078 break;
2079 case RIP_TRACEON:
2080 case RIP_TRACEOFF:
2081 zlog_info ("Obsolete command %s received, please sent it to routed",
2082 lookup (rip_msg, packet->command));
2083 rip_peer_bad_packet (&from);
2084 break;
2085 case RIP_POLL_ENTRY:
2086 zlog_info ("Obsolete command %s received",
2087 lookup (rip_msg, packet->command));
2088 rip_peer_bad_packet (&from);
2089 break;
2090 default:
2091 zlog_info ("Unknown RIP command %d received", packet->command);
2092 rip_peer_bad_packet (&from);
2093 break;
2094 }
2095
2096 return len;
2097}
2098
paul718e3742002-12-13 20:15:29 +00002099/* Write routing table entry to the stream and return next index of
2100 the routing table entry in the stream. */
pauldc63bfd2005-10-25 23:31:05 +00002101static int
paul718e3742002-12-13 20:15:29 +00002102rip_write_rte (int num, struct stream *s, struct prefix_ipv4 *p,
paulb14ee002005-02-04 23:42:41 +00002103 u_char version, struct rip_info *rinfo)
paul718e3742002-12-13 20:15:29 +00002104{
2105 struct in_addr mask;
paul718e3742002-12-13 20:15:29 +00002106
2107 /* Write routing table entry. */
2108 if (version == RIPv1)
2109 {
2110 stream_putw (s, AF_INET);
2111 stream_putw (s, 0);
2112 stream_put_ipv4 (s, p->prefix.s_addr);
2113 stream_put_ipv4 (s, 0);
2114 stream_put_ipv4 (s, 0);
2115 stream_putl (s, rinfo->metric_out);
2116 }
2117 else
2118 {
2119 masklen2ip (p->prefixlen, &mask);
2120
2121 stream_putw (s, AF_INET);
hasso16705132003-05-25 14:49:19 +00002122 stream_putw (s, rinfo->tag_out);
paul718e3742002-12-13 20:15:29 +00002123 stream_put_ipv4 (s, p->prefix.s_addr);
2124 stream_put_ipv4 (s, mask.s_addr);
2125 stream_put_ipv4 (s, rinfo->nexthop_out.s_addr);
2126 stream_putl (s, rinfo->metric_out);
2127 }
2128
2129 return ++num;
2130}
2131
2132/* Send update to the ifp or spcified neighbor. */
2133void
paulc49ad8f2004-10-22 10:27:28 +00002134rip_output_process (struct connected *ifc, struct sockaddr_in *to,
2135 int route_type, u_char version)
paul718e3742002-12-13 20:15:29 +00002136{
2137 int ret;
2138 struct stream *s;
2139 struct route_node *rp;
2140 struct rip_info *rinfo;
2141 struct rip_interface *ri;
2142 struct prefix_ipv4 *p;
2143 struct prefix_ipv4 classfull;
paul727d1042002-12-13 20:50:29 +00002144 struct prefix_ipv4 ifaddrclass;
paulb14ee002005-02-04 23:42:41 +00002145 struct key *key = NULL;
2146 /* this might need to made dynamic if RIP ever supported auth methods
2147 with larger key string sizes */
2148 char auth_str[RIP_AUTH_SIMPLE_SIZE];
pauldc63bfd2005-10-25 23:31:05 +00002149 size_t doff = 0; /* offset of digest offset field */
paul2c61ae32005-08-16 15:22:14 +00002150 int num = 0;
paul718e3742002-12-13 20:15:29 +00002151 int rtemax;
paul01d09082003-06-08 21:22:18 +00002152 int subnetted = 0;
paul718e3742002-12-13 20:15:29 +00002153
2154 /* Logging output event. */
2155 if (IS_RIP_DEBUG_EVENT)
2156 {
2157 if (to)
ajs5d6c3772004-12-08 19:24:06 +00002158 zlog_debug ("update routes to neighbor %s", inet_ntoa (to->sin_addr));
paul718e3742002-12-13 20:15:29 +00002159 else
ajs5d6c3772004-12-08 19:24:06 +00002160 zlog_debug ("update routes on interface %s ifindex %d",
paulc49ad8f2004-10-22 10:27:28 +00002161 ifc->ifp->name, ifc->ifp->ifindex);
paul718e3742002-12-13 20:15:29 +00002162 }
2163
2164 /* Set output stream. */
2165 s = rip->obuf;
2166
2167 /* Reset stream and RTE counter. */
2168 stream_reset (s);
paul718e3742002-12-13 20:15:29 +00002169 rtemax = (RIP_PACKET_MAXSIZ - 4) / 20;
2170
2171 /* Get RIP interface. */
paulc49ad8f2004-10-22 10:27:28 +00002172 ri = ifc->ifp->info;
paul718e3742002-12-13 20:15:29 +00002173
2174 /* If output interface is in simple password authentication mode, we
2175 need space for authentication data. */
2176 if (ri->auth_type == RIP_AUTH_SIMPLE_PASSWORD)
2177 rtemax -= 1;
2178
2179 /* If output interface is in MD5 authentication mode, we need space
2180 for authentication header and data. */
2181 if (ri->auth_type == RIP_AUTH_MD5)
2182 rtemax -= 2;
2183
2184 /* If output interface is in simple password authentication mode
2185 and string or keychain is specified we need space for auth. data */
paulb14ee002005-02-04 23:42:41 +00002186 if (ri->auth_type != RIP_NO_AUTH)
paul718e3742002-12-13 20:15:29 +00002187 {
2188 if (ri->key_chain)
2189 {
2190 struct keychain *keychain;
2191
2192 keychain = keychain_lookup (ri->key_chain);
2193 if (keychain)
paulb14ee002005-02-04 23:42:41 +00002194 key = key_lookup_for_send (keychain);
paul718e3742002-12-13 20:15:29 +00002195 }
paulb14ee002005-02-04 23:42:41 +00002196 /* to be passed to auth functions later */
2197 rip_auth_prepare_str_send (ri, key, auth_str, RIP_AUTH_SIMPLE_SIZE);
paul718e3742002-12-13 20:15:29 +00002198 }
2199
paul727d1042002-12-13 20:50:29 +00002200 if (version == RIPv1)
2201 {
paulc49ad8f2004-10-22 10:27:28 +00002202 memcpy (&ifaddrclass, ifc->address, sizeof (struct prefix_ipv4));
paul727d1042002-12-13 20:50:29 +00002203 apply_classful_mask_ipv4 (&ifaddrclass);
2204 subnetted = 0;
paulc49ad8f2004-10-22 10:27:28 +00002205 if (ifc->address->prefixlen > ifaddrclass.prefixlen)
paul01d09082003-06-08 21:22:18 +00002206 subnetted = 1;
paul727d1042002-12-13 20:50:29 +00002207 }
2208
paul718e3742002-12-13 20:15:29 +00002209 for (rp = route_top (rip->table); rp; rp = route_next (rp))
2210 if ((rinfo = rp->info) != NULL)
2211 {
paul727d1042002-12-13 20:50:29 +00002212 /* For RIPv1, if we are subnetted, output subnets in our network */
2213 /* that have the same mask as the output "interface". For other */
2214 /* networks, only the classfull version is output. */
paul718e3742002-12-13 20:15:29 +00002215
2216 if (version == RIPv1)
2217 {
paul727d1042002-12-13 20:50:29 +00002218 p = (struct prefix_ipv4 *) &rp->p;
paul718e3742002-12-13 20:15:29 +00002219
2220 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +00002221 zlog_debug("RIPv1 mask check, %s/%d considered for output",
paul727d1042002-12-13 20:50:29 +00002222 inet_ntoa (rp->p.u.prefix4), rp->p.prefixlen);
paul718e3742002-12-13 20:15:29 +00002223
paul727d1042002-12-13 20:50:29 +00002224 if (subnetted &&
2225 prefix_match ((struct prefix *) &ifaddrclass, &rp->p))
2226 {
paulc49ad8f2004-10-22 10:27:28 +00002227 if ((ifc->address->prefixlen != rp->p.prefixlen) &&
paul727d1042002-12-13 20:50:29 +00002228 (rp->p.prefixlen != 32))
2229 continue;
2230 }
2231 else
2232 {
2233 memcpy (&classfull, &rp->p, sizeof(struct prefix_ipv4));
2234 apply_classful_mask_ipv4(&classfull);
2235 if (rp->p.u.prefix4.s_addr != 0 &&
2236 classfull.prefixlen != rp->p.prefixlen)
2237 continue;
2238 }
paul718e3742002-12-13 20:15:29 +00002239 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +00002240 zlog_debug("RIPv1 mask check, %s/%d made it through",
paul727d1042002-12-13 20:50:29 +00002241 inet_ntoa (rp->p.u.prefix4), rp->p.prefixlen);
paul718e3742002-12-13 20:15:29 +00002242 }
2243 else
2244 p = (struct prefix_ipv4 *) &rp->p;
2245
2246 /* Apply output filters. */
2247 ret = rip_outgoing_filter (p, ri);
2248 if (ret < 0)
2249 continue;
2250
2251 /* Changed route only output. */
2252 if (route_type == rip_changed_route &&
2253 (! (rinfo->flags & RIP_RTF_CHANGED)))
2254 continue;
2255
2256 /* Split horizon. */
2257 /* if (split_horizon == rip_split_horizon) */
hasso16705132003-05-25 14:49:19 +00002258 if (ri->split_horizon == RIP_SPLIT_HORIZON)
paul718e3742002-12-13 20:15:29 +00002259 {
paul42d14d92003-11-17 09:15:18 +00002260 /*
2261 * We perform split horizon for RIP and connected route.
2262 * For rip routes, we want to suppress the route if we would
2263 * end up sending the route back on the interface that we
2264 * learned it from, with a higher metric. For connected routes,
2265 * we suppress the route if the prefix is a subset of the
2266 * source address that we are going to use for the packet
2267 * (in order to handle the case when multiple subnets are
2268 * configured on the same interface).
2269 */
2270 if (rinfo->type == ZEBRA_ROUTE_RIP &&
paulc49ad8f2004-10-22 10:27:28 +00002271 rinfo->ifindex == ifc->ifp->ifindex)
paul42d14d92003-11-17 09:15:18 +00002272 continue;
2273 if (rinfo->type == ZEBRA_ROUTE_CONNECT &&
paulc49ad8f2004-10-22 10:27:28 +00002274 prefix_match((struct prefix *)p, ifc->address))
paul718e3742002-12-13 20:15:29 +00002275 continue;
2276 }
2277
2278 /* Preparation for route-map. */
2279 rinfo->metric_set = 0;
2280 rinfo->nexthop_out.s_addr = 0;
2281 rinfo->metric_out = rinfo->metric;
hasso16705132003-05-25 14:49:19 +00002282 rinfo->tag_out = rinfo->tag;
paulc49ad8f2004-10-22 10:27:28 +00002283 rinfo->ifindex_out = ifc->ifp->ifindex;
paul718e3742002-12-13 20:15:29 +00002284
hasso16705132003-05-25 14:49:19 +00002285 /* In order to avoid some local loops,
2286 * if the RIP route has a nexthop via this interface, keep the nexthop,
2287 * otherwise set it to 0. The nexthop should not be propagated
2288 * beyond the local broadcast/multicast area in order
2289 * to avoid an IGP multi-level recursive look-up.
2290 * see (4.4)
2291 */
paulc49ad8f2004-10-22 10:27:28 +00002292 if (rinfo->ifindex == ifc->ifp->ifindex)
paul718e3742002-12-13 20:15:29 +00002293 rinfo->nexthop_out = rinfo->nexthop;
hasso16705132003-05-25 14:49:19 +00002294
2295 /* Interface route-map */
2296 if (ri->routemap[RIP_FILTER_OUT])
2297 {
2298 ret = route_map_apply (ri->routemap[RIP_FILTER_OUT],
2299 (struct prefix *) p, RMAP_RIP,
2300 rinfo);
2301
2302 if (ret == RMAP_DENYMATCH)
2303 {
2304 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +00002305 zlog_debug ("RIP %s/%d is filtered by route-map out",
hasso16705132003-05-25 14:49:19 +00002306 inet_ntoa (p->prefix), p->prefixlen);
2307 continue;
2308 }
2309 }
paul718e3742002-12-13 20:15:29 +00002310
hasso16705132003-05-25 14:49:19 +00002311 /* Apply redistribute route map - continue, if deny */
paul718e3742002-12-13 20:15:29 +00002312 if (rip->route_map[rinfo->type].name
2313 && rinfo->sub_type != RIP_ROUTE_INTERFACE)
2314 {
2315 ret = route_map_apply (rip->route_map[rinfo->type].map,
2316 (struct prefix *)p, RMAP_RIP, rinfo);
2317
2318 if (ret == RMAP_DENYMATCH)
2319 {
2320 if (IS_RIP_DEBUG_PACKET)
ajs5d6c3772004-12-08 19:24:06 +00002321 zlog_debug ("%s/%d is filtered by route-map",
paul718e3742002-12-13 20:15:29 +00002322 inet_ntoa (p->prefix), p->prefixlen);
2323 continue;
2324 }
2325 }
2326
2327 /* When route-map does not set metric. */
2328 if (! rinfo->metric_set)
2329 {
2330 /* If redistribute metric is set. */
2331 if (rip->route_map[rinfo->type].metric_config
2332 && rinfo->metric != RIP_METRIC_INFINITY)
2333 {
2334 rinfo->metric_out = rip->route_map[rinfo->type].metric;
2335 }
2336 else
2337 {
2338 /* If the route is not connected or localy generated
2339 one, use default-metric value*/
2340 if (rinfo->type != ZEBRA_ROUTE_RIP
2341 && rinfo->type != ZEBRA_ROUTE_CONNECT
2342 && rinfo->metric != RIP_METRIC_INFINITY)
2343 rinfo->metric_out = rip->default_metric;
2344 }
2345 }
2346
2347 /* Apply offset-list */
2348 if (rinfo->metric != RIP_METRIC_INFINITY)
paulc49ad8f2004-10-22 10:27:28 +00002349 rip_offset_list_apply_out (p, ifc->ifp, &rinfo->metric_out);
paul718e3742002-12-13 20:15:29 +00002350
2351 if (rinfo->metric_out > RIP_METRIC_INFINITY)
2352 rinfo->metric_out = RIP_METRIC_INFINITY;
hasso16705132003-05-25 14:49:19 +00002353
2354 /* Perform split-horizon with poisoned reverse
2355 * for RIP and connected routes.
2356 **/
2357 if (ri->split_horizon == RIP_SPLIT_HORIZON_POISONED_REVERSE) {
paul42d14d92003-11-17 09:15:18 +00002358 /*
2359 * We perform split horizon for RIP and connected route.
2360 * For rip routes, we want to suppress the route if we would
2361 * end up sending the route back on the interface that we
2362 * learned it from, with a higher metric. For connected routes,
2363 * we suppress the route if the prefix is a subset of the
2364 * source address that we are going to use for the packet
2365 * (in order to handle the case when multiple subnets are
2366 * configured on the same interface).
2367 */
2368 if (rinfo->type == ZEBRA_ROUTE_RIP &&
paulc49ad8f2004-10-22 10:27:28 +00002369 rinfo->ifindex == ifc->ifp->ifindex)
hasso16705132003-05-25 14:49:19 +00002370 rinfo->metric_out = RIP_METRIC_INFINITY;
paul42d14d92003-11-17 09:15:18 +00002371 if (rinfo->type == ZEBRA_ROUTE_CONNECT &&
paulc49ad8f2004-10-22 10:27:28 +00002372 prefix_match((struct prefix *)p, ifc->address))
paul42d14d92003-11-17 09:15:18 +00002373 rinfo->metric_out = RIP_METRIC_INFINITY;
hasso16705132003-05-25 14:49:19 +00002374 }
paulb14ee002005-02-04 23:42:41 +00002375
2376 /* Prepare preamble, auth headers, if needs be */
2377 if (num == 0)
2378 {
2379 stream_putc (s, RIP_RESPONSE);
2380 stream_putc (s, version);
2381 stream_putw (s, 0);
2382
paul0cb8a012005-05-29 11:27:24 +00002383 /* auth header for !v1 && !no_auth */
2384 if ( (ri->auth_type != RIP_NO_AUTH) && (version != RIPv1) )
paulb14ee002005-02-04 23:42:41 +00002385 doff = rip_auth_header_write (s, ri, key, auth_str,
2386 RIP_AUTH_SIMPLE_SIZE);
2387 }
2388
paul718e3742002-12-13 20:15:29 +00002389 /* Write RTE to the stream. */
paulb14ee002005-02-04 23:42:41 +00002390 num = rip_write_rte (num, s, p, version, rinfo);
paul718e3742002-12-13 20:15:29 +00002391 if (num == rtemax)
2392 {
2393 if (version == RIPv2 && ri->auth_type == RIP_AUTH_MD5)
paulb14ee002005-02-04 23:42:41 +00002394 rip_auth_md5_set (s, ri, doff, auth_str, RIP_AUTH_SIMPLE_SIZE);
paul718e3742002-12-13 20:15:29 +00002395
2396 ret = rip_send_packet (STREAM_DATA (s), stream_get_endp (s),
paulc49ad8f2004-10-22 10:27:28 +00002397 to, ifc);
paul718e3742002-12-13 20:15:29 +00002398
2399 if (ret >= 0 && IS_RIP_DEBUG_SEND)
2400 rip_packet_dump ((struct rip_packet *)STREAM_DATA (s),
2401 stream_get_endp(s), "SEND");
2402 num = 0;
2403 stream_reset (s);
2404 }
2405 }
2406
2407 /* Flush unwritten RTE. */
2408 if (num != 0)
2409 {
2410 if (version == RIPv2 && ri->auth_type == RIP_AUTH_MD5)
paulb14ee002005-02-04 23:42:41 +00002411 rip_auth_md5_set (s, ri, doff, auth_str, RIP_AUTH_SIMPLE_SIZE);
paul718e3742002-12-13 20:15:29 +00002412
paulc49ad8f2004-10-22 10:27:28 +00002413 ret = rip_send_packet (STREAM_DATA (s), stream_get_endp (s), to, ifc);
paul718e3742002-12-13 20:15:29 +00002414
2415 if (ret >= 0 && IS_RIP_DEBUG_SEND)
2416 rip_packet_dump ((struct rip_packet *)STREAM_DATA (s),
2417 stream_get_endp (s), "SEND");
2418 num = 0;
2419 stream_reset (s);
2420 }
2421
2422 /* Statistics updates. */
2423 ri->sent_updates++;
2424}
2425
2426/* Send RIP packet to the interface. */
pauldc63bfd2005-10-25 23:31:05 +00002427static void
paulc49ad8f2004-10-22 10:27:28 +00002428rip_update_interface (struct connected *ifc, u_char version, int route_type)
paul718e3742002-12-13 20:15:29 +00002429{
paul718e3742002-12-13 20:15:29 +00002430 struct sockaddr_in to;
2431
2432 /* When RIP version is 2 and multicast enable interface. */
paulc49ad8f2004-10-22 10:27:28 +00002433 if (version == RIPv2 && if_is_multicast (ifc->ifp))
paul718e3742002-12-13 20:15:29 +00002434 {
2435 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00002436 zlog_debug ("multicast announce on %s ", ifc->ifp->name);
paul718e3742002-12-13 20:15:29 +00002437
paulc49ad8f2004-10-22 10:27:28 +00002438 rip_output_process (ifc, NULL, route_type, version);
paul718e3742002-12-13 20:15:29 +00002439 return;
2440 }
paulc49ad8f2004-10-22 10:27:28 +00002441
paul718e3742002-12-13 20:15:29 +00002442 /* If we can't send multicast packet, send it with unicast. */
paulc49ad8f2004-10-22 10:27:28 +00002443 if (if_is_broadcast (ifc->ifp) || if_is_pointopoint (ifc->ifp))
paul718e3742002-12-13 20:15:29 +00002444 {
paulc49ad8f2004-10-22 10:27:28 +00002445 if (ifc->address->family == AF_INET)
2446 {
2447 /* Destination address and port setting. */
2448 memset (&to, 0, sizeof (struct sockaddr_in));
2449 if (ifc->destination)
2450 /* use specified broadcast or point-to-point destination addr */
2451 to.sin_addr = ifc->destination->u.prefix4;
2452 else
2453 /* calculate the appropriate broadcast address */
2454 to.sin_addr.s_addr =
2455 ipv4_broadcast_addr(ifc->address->u.prefix4.s_addr,
2456 ifc->address->prefixlen);
2457 to.sin_port = htons (RIP_PORT_DEFAULT);
paul718e3742002-12-13 20:15:29 +00002458
paulc49ad8f2004-10-22 10:27:28 +00002459 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00002460 zlog_debug ("%s announce to %s on %s",
paulc49ad8f2004-10-22 10:27:28 +00002461 if_is_pointopoint (ifc->ifp) ? "unicast" : "broadcast",
2462 inet_ntoa (to.sin_addr), ifc->ifp->name);
paul718e3742002-12-13 20:15:29 +00002463
paulc49ad8f2004-10-22 10:27:28 +00002464 rip_output_process (ifc, &to, route_type, version);
2465 }
paul718e3742002-12-13 20:15:29 +00002466 }
2467}
2468
2469/* Update send to all interface and neighbor. */
pauldc63bfd2005-10-25 23:31:05 +00002470static void
paul718e3742002-12-13 20:15:29 +00002471rip_update_process (int route_type)
2472{
paul1eb8ef22005-04-07 07:30:20 +00002473 struct listnode *node;
2474 struct listnode *ifnode, *ifnnode;
paulcc1131a2003-10-15 23:20:17 +00002475 struct connected *connected;
paul718e3742002-12-13 20:15:29 +00002476 struct interface *ifp;
2477 struct rip_interface *ri;
2478 struct route_node *rp;
2479 struct sockaddr_in to;
2480 struct prefix_ipv4 *p;
2481
2482 /* Send RIP update to each interface. */
paul1eb8ef22005-04-07 07:30:20 +00002483 for (ALL_LIST_ELEMENTS_RO (iflist, node, ifp))
paul718e3742002-12-13 20:15:29 +00002484 {
paul718e3742002-12-13 20:15:29 +00002485 if (if_is_loopback (ifp))
2486 continue;
2487
paul2e3b2e42002-12-13 21:03:13 +00002488 if (! if_is_operative (ifp))
paul718e3742002-12-13 20:15:29 +00002489 continue;
2490
2491 /* Fetch RIP interface information. */
2492 ri = ifp->info;
2493
2494 /* When passive interface is specified, suppress announce to the
2495 interface. */
2496 if (ri->passive)
2497 continue;
2498
2499 if (ri->running)
2500 {
2501 if (IS_RIP_DEBUG_EVENT)
2502 {
2503 if (ifp->name)
ajs5d6c3772004-12-08 19:24:06 +00002504 zlog_debug ("SEND UPDATE to %s ifindex %d",
paul718e3742002-12-13 20:15:29 +00002505 ifp->name, ifp->ifindex);
2506 else
ajs5d6c3772004-12-08 19:24:06 +00002507 zlog_debug ("SEND UPDATE to _unknown_ ifindex %d",
paul718e3742002-12-13 20:15:29 +00002508 ifp->ifindex);
2509 }
2510
paulcc1131a2003-10-15 23:20:17 +00002511 /* send update on each connected network */
paul1eb8ef22005-04-07 07:30:20 +00002512 for (ALL_LIST_ELEMENTS (ifp->connected, ifnode, ifnnode, connected))
paulcc1131a2003-10-15 23:20:17 +00002513 {
2514 struct prefix_ipv4 *ifaddr;
paul931cd542004-01-23 15:31:42 +00002515 int done = 0;
2516 /*
2517 * If there is no version configuration in the interface,
2518 * use rip's version setting.
2519 */
paulf38a4712003-06-07 01:10:00 +00002520 int vsend = ((ri->ri_send == RI_RIP_UNSPEC) ?
2521 rip->version_send : ri->ri_send);
paulcc1131a2003-10-15 23:20:17 +00002522
2523 ifaddr = (struct prefix_ipv4 *) connected->address;
2524
2525 if (ifaddr->family != AF_INET)
2526 continue;
2527
paul931cd542004-01-23 15:31:42 +00002528 if ((vsend & RIPv1) && !done)
paulc49ad8f2004-10-22 10:27:28 +00002529 rip_update_interface (connected, RIPv1, route_type);
paul931cd542004-01-23 15:31:42 +00002530 if ((vsend & RIPv2) && if_is_multicast(ifp))
paulc49ad8f2004-10-22 10:27:28 +00002531 rip_update_interface (connected, RIPv2, route_type);
paul931cd542004-01-23 15:31:42 +00002532 done = 1;
2533 if (!(vsend & RIPv2) || !if_is_multicast(ifp))
2534 break;
2535
paulf38a4712003-06-07 01:10:00 +00002536 }
paul718e3742002-12-13 20:15:29 +00002537 }
2538 }
2539
2540 /* RIP send updates to each neighbor. */
2541 for (rp = route_top (rip->neighbor); rp; rp = route_next (rp))
2542 if (rp->info != NULL)
2543 {
2544 p = (struct prefix_ipv4 *) &rp->p;
2545
2546 ifp = if_lookup_address (p->prefix);
2547 if (! ifp)
2548 {
paulc49ad8f2004-10-22 10:27:28 +00002549 zlog_warn ("Neighbor %s doesnt have connected interface!",
paul718e3742002-12-13 20:15:29 +00002550 inet_ntoa (p->prefix));
2551 continue;
2552 }
paulc49ad8f2004-10-22 10:27:28 +00002553
2554 if ( (connected = connected_lookup_address (ifp, p->prefix)) == NULL)
2555 {
2556 zlog_warn ("Neighbor %s doesnt have connected network",
2557 inet_ntoa (p->prefix));
2558 continue;
2559 }
2560
paul718e3742002-12-13 20:15:29 +00002561 /* Set destination address and port */
2562 memset (&to, 0, sizeof (struct sockaddr_in));
2563 to.sin_addr = p->prefix;
2564 to.sin_port = htons (RIP_PORT_DEFAULT);
2565
2566 /* RIP version is rip's configuration. */
paulc49ad8f2004-10-22 10:27:28 +00002567 rip_output_process (connected, &to, route_type, rip->version_send);
paul718e3742002-12-13 20:15:29 +00002568 }
2569}
2570
2571/* RIP's periodical timer. */
pauldc63bfd2005-10-25 23:31:05 +00002572static int
paul718e3742002-12-13 20:15:29 +00002573rip_update (struct thread *t)
2574{
2575 /* Clear timer pointer. */
2576 rip->t_update = NULL;
2577
2578 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00002579 zlog_debug ("update timer fire!");
paul718e3742002-12-13 20:15:29 +00002580
2581 /* Process update output. */
2582 rip_update_process (rip_all_route);
2583
2584 /* Triggered updates may be suppressed if a regular update is due by
2585 the time the triggered update would be sent. */
2586 if (rip->t_triggered_interval)
2587 {
2588 thread_cancel (rip->t_triggered_interval);
2589 rip->t_triggered_interval = NULL;
2590 }
2591 rip->trigger = 0;
2592
2593 /* Register myself. */
2594 rip_event (RIP_UPDATE_EVENT, 0);
2595
2596 return 0;
2597}
2598
2599/* Walk down the RIP routing table then clear changed flag. */
pauldc63bfd2005-10-25 23:31:05 +00002600static void
paul216565a2005-10-25 23:35:28 +00002601rip_clear_changed_flag (void)
paul718e3742002-12-13 20:15:29 +00002602{
2603 struct route_node *rp;
2604 struct rip_info *rinfo;
2605
2606 for (rp = route_top (rip->table); rp; rp = route_next (rp))
2607 if ((rinfo = rp->info) != NULL)
2608 if (rinfo->flags & RIP_RTF_CHANGED)
2609 rinfo->flags &= ~RIP_RTF_CHANGED;
2610}
2611
2612/* Triggered update interval timer. */
pauldc63bfd2005-10-25 23:31:05 +00002613static int
paul718e3742002-12-13 20:15:29 +00002614rip_triggered_interval (struct thread *t)
2615{
2616 int rip_triggered_update (struct thread *);
2617
2618 rip->t_triggered_interval = NULL;
2619
2620 if (rip->trigger)
2621 {
2622 rip->trigger = 0;
2623 rip_triggered_update (t);
2624 }
2625 return 0;
2626}
2627
2628/* Execute triggered update. */
pauldc63bfd2005-10-25 23:31:05 +00002629static int
paul718e3742002-12-13 20:15:29 +00002630rip_triggered_update (struct thread *t)
2631{
2632 int interval;
2633
2634 /* Clear thred pointer. */
2635 rip->t_triggered_update = NULL;
2636
2637 /* Cancel interval timer. */
2638 if (rip->t_triggered_interval)
2639 {
2640 thread_cancel (rip->t_triggered_interval);
2641 rip->t_triggered_interval = NULL;
2642 }
2643 rip->trigger = 0;
2644
2645 /* Logging triggered update. */
2646 if (IS_RIP_DEBUG_EVENT)
ajs5d6c3772004-12-08 19:24:06 +00002647 zlog_debug ("triggered update!");
paul718e3742002-12-13 20:15:29 +00002648
2649 /* Split Horizon processing is done when generating triggered
2650 updates as well as normal updates (see section 2.6). */
2651 rip_update_process (rip_changed_route);
2652
2653 /* Once all of the triggered updates have been generated, the route
2654 change flags should be cleared. */
2655 rip_clear_changed_flag ();
2656
2657 /* After a triggered update is sent, a timer should be set for a
2658 random interval between 1 and 5 seconds. If other changes that
2659 would trigger updates occur before the timer expires, a single
2660 update is triggered when the timer expires. */
2661 interval = (random () % 5) + 1;
2662
2663 rip->t_triggered_interval =
2664 thread_add_timer (master, rip_triggered_interval, NULL, interval);
2665
2666 return 0;
2667}
2668
2669/* Withdraw redistributed route. */
2670void
2671rip_redistribute_withdraw (int type)
2672{
2673 struct route_node *rp;
2674 struct rip_info *rinfo;
2675
2676 if (!rip)
2677 return;
2678
2679 for (rp = route_top (rip->table); rp; rp = route_next (rp))
2680 if ((rinfo = rp->info) != NULL)
2681 {
2682 if (rinfo->type == type
2683 && rinfo->sub_type != RIP_ROUTE_INTERFACE)
2684 {
2685 /* Perform poisoned reverse. */
2686 rinfo->metric = RIP_METRIC_INFINITY;
2687 RIP_TIMER_ON (rinfo->t_garbage_collect,
2688 rip_garbage_collect, rip->garbage_time);
2689 RIP_TIMER_OFF (rinfo->t_timeout);
2690 rinfo->flags |= RIP_RTF_CHANGED;
2691
hasso16705132003-05-25 14:49:19 +00002692 if (IS_RIP_DEBUG_EVENT) {
2693 struct prefix_ipv4 *p = (struct prefix_ipv4 *) &rp->p;
2694
ajs5d6c3772004-12-08 19:24:06 +00002695 zlog_debug ("Poisone %s/%d on the interface %s with an infinity metric [withdraw]",
hasso16705132003-05-25 14:49:19 +00002696 inet_ntoa(p->prefix), p->prefixlen,
2697 ifindex2ifname(rinfo->ifindex));
2698 }
2699
paul718e3742002-12-13 20:15:29 +00002700 rip_event (RIP_TRIGGERED_UPDATE, 0);
2701 }
2702 }
2703}
2704
2705/* Create new RIP instance and set it to global variable. */
pauldc63bfd2005-10-25 23:31:05 +00002706static int
2707rip_create (void)
paul718e3742002-12-13 20:15:29 +00002708{
2709 rip = XMALLOC (MTYPE_RIP, sizeof (struct rip));
2710 memset (rip, 0, sizeof (struct rip));
2711
2712 /* Set initial value. */
paulf38a4712003-06-07 01:10:00 +00002713 rip->version_send = RI_RIP_VERSION_2;
2714 rip->version_recv = RI_RIP_VERSION_1_AND_2;
paul718e3742002-12-13 20:15:29 +00002715 rip->update_time = RIP_UPDATE_TIMER_DEFAULT;
2716 rip->timeout_time = RIP_TIMEOUT_TIMER_DEFAULT;
2717 rip->garbage_time = RIP_GARBAGE_TIMER_DEFAULT;
2718 rip->default_metric = RIP_DEFAULT_METRIC_DEFAULT;
2719
2720 /* Initialize RIP routig table. */
2721 rip->table = route_table_init ();
2722 rip->route = route_table_init ();
2723 rip->neighbor = route_table_init ();
2724
2725 /* Make output stream. */
2726 rip->obuf = stream_new (1500);
2727
2728 /* Make socket. */
paulf69bd9d2005-06-03 18:01:50 +00002729 rip->sock = rip_create_socket (NULL);
paul718e3742002-12-13 20:15:29 +00002730 if (rip->sock < 0)
2731 return rip->sock;
2732
2733 /* Create read and timer thread. */
2734 rip_event (RIP_READ, rip->sock);
2735 rip_event (RIP_UPDATE_EVENT, 1);
2736
2737 return 0;
2738}
2739
2740/* Sned RIP request to the destination. */
2741int
2742rip_request_send (struct sockaddr_in *to, struct interface *ifp,
paul931cd542004-01-23 15:31:42 +00002743 u_char version, struct connected *connected)
paul718e3742002-12-13 20:15:29 +00002744{
2745 struct rte *rte;
2746 struct rip_packet rip_packet;
paul1eb8ef22005-04-07 07:30:20 +00002747 struct listnode *node, *nnode;
paul718e3742002-12-13 20:15:29 +00002748
2749 memset (&rip_packet, 0, sizeof (rip_packet));
2750
2751 rip_packet.command = RIP_REQUEST;
2752 rip_packet.version = version;
2753 rte = rip_packet.rte;
2754 rte->metric = htonl (RIP_METRIC_INFINITY);
2755
paul931cd542004-01-23 15:31:42 +00002756 if (connected)
2757 {
2758 /*
2759 * connected is only sent for ripv1 case, or when
2760 * interface does not support multicast. Caller loops
2761 * over each connected address for this case.
2762 */
paul11dde9c2004-05-31 14:00:00 +00002763 if (rip_send_packet ((u_char *) &rip_packet, sizeof (rip_packet),
paulc49ad8f2004-10-22 10:27:28 +00002764 to, connected) != sizeof (rip_packet))
paul931cd542004-01-23 15:31:42 +00002765 return -1;
2766 else
2767 return sizeof (rip_packet);
2768 }
2769
paulcc1131a2003-10-15 23:20:17 +00002770 /* send request on each connected network */
paul1eb8ef22005-04-07 07:30:20 +00002771 for (ALL_LIST_ELEMENTS (ifp->connected, node, nnode, connected))
paulcc1131a2003-10-15 23:20:17 +00002772 {
2773 struct prefix_ipv4 *p;
2774
2775 p = (struct prefix_ipv4 *) connected->address;
2776
2777 if (p->family != AF_INET)
2778 continue;
2779
paul11dde9c2004-05-31 14:00:00 +00002780 if (rip_send_packet ((u_char *) &rip_packet, sizeof (rip_packet),
paulc49ad8f2004-10-22 10:27:28 +00002781 to, connected) != sizeof (rip_packet))
paulcc1131a2003-10-15 23:20:17 +00002782 return -1;
2783 }
2784 return sizeof (rip_packet);
paul718e3742002-12-13 20:15:29 +00002785}
2786
pauldc63bfd2005-10-25 23:31:05 +00002787static int
paul718e3742002-12-13 20:15:29 +00002788rip_update_jitter (unsigned long time)
2789{
paul239389b2004-05-05 14:09:37 +00002790#define JITTER_BOUND 4
2791 /* We want to get the jitter to +/- 1/JITTER_BOUND the interval.
2792 Given that, we cannot let time be less than JITTER_BOUND seconds.
2793 The RIPv2 RFC says jitter should be small compared to
2794 update_time. We consider 1/JITTER_BOUND to be small.
2795 */
2796
2797 int jitter_input = time;
2798 int jitter;
2799
2800 if (jitter_input < JITTER_BOUND)
2801 jitter_input = JITTER_BOUND;
2802
2803 jitter = (((rand () % ((jitter_input * 2) + 1)) - jitter_input));
2804
2805 return jitter/JITTER_BOUND;
paul718e3742002-12-13 20:15:29 +00002806}
2807
2808void
2809rip_event (enum rip_event event, int sock)
2810{
2811 int jitter = 0;
2812
2813 switch (event)
2814 {
2815 case RIP_READ:
2816 rip->t_read = thread_add_read (master, rip_read, NULL, sock);
2817 break;
2818 case RIP_UPDATE_EVENT:
2819 if (rip->t_update)
2820 {
2821 thread_cancel (rip->t_update);
2822 rip->t_update = NULL;
2823 }
2824 jitter = rip_update_jitter (rip->update_time);
2825 rip->t_update =
2826 thread_add_timer (master, rip_update, NULL,
2827 sock ? 2 : rip->update_time + jitter);
2828 break;
2829 case RIP_TRIGGERED_UPDATE:
2830 if (rip->t_triggered_interval)
2831 rip->trigger = 1;
2832 else if (! rip->t_triggered_update)
2833 rip->t_triggered_update =
2834 thread_add_event (master, rip_triggered_update, NULL, 0);
2835 break;
2836 default:
2837 break;
2838 }
2839}
2840
2841DEFUN (router_rip,
2842 router_rip_cmd,
2843 "router rip",
2844 "Enable a routing process\n"
2845 "Routing Information Protocol (RIP)\n")
2846{
2847 int ret;
2848
2849 /* If rip is not enabled before. */
2850 if (! rip)
2851 {
2852 ret = rip_create ();
2853 if (ret < 0)
2854 {
2855 zlog_info ("Can't create RIP");
2856 return CMD_WARNING;
2857 }
2858 }
2859 vty->node = RIP_NODE;
2860 vty->index = rip;
2861
2862 return CMD_SUCCESS;
2863}
2864
2865DEFUN (no_router_rip,
2866 no_router_rip_cmd,
2867 "no router rip",
2868 NO_STR
2869 "Enable a routing process\n"
2870 "Routing Information Protocol (RIP)\n")
2871{
2872 if (rip)
2873 rip_clean ();
2874 return CMD_SUCCESS;
2875}
2876
2877DEFUN (rip_version,
2878 rip_version_cmd,
2879 "version <1-2>",
2880 "Set routing protocol version\n"
2881 "version\n")
2882{
2883 int version;
2884
2885 version = atoi (argv[0]);
2886 if (version != RIPv1 && version != RIPv2)
2887 {
2888 vty_out (vty, "invalid rip version %d%s", version,
2889 VTY_NEWLINE);
2890 return CMD_WARNING;
2891 }
paulf38a4712003-06-07 01:10:00 +00002892 rip->version_send = version;
2893 rip->version_recv = version;
paul718e3742002-12-13 20:15:29 +00002894
2895 return CMD_SUCCESS;
2896}
2897
2898DEFUN (no_rip_version,
2899 no_rip_version_cmd,
2900 "no version",
2901 NO_STR
2902 "Set routing protocol version\n")
2903{
2904 /* Set RIP version to the default. */
paulf38a4712003-06-07 01:10:00 +00002905 rip->version_send = RI_RIP_VERSION_2;
2906 rip->version_recv = RI_RIP_VERSION_1_AND_2;
paul718e3742002-12-13 20:15:29 +00002907
2908 return CMD_SUCCESS;
2909}
2910
2911ALIAS (no_rip_version,
2912 no_rip_version_val_cmd,
2913 "no version <1-2>",
2914 NO_STR
2915 "Set routing protocol version\n"
2916 "version\n")
2917
2918DEFUN (rip_route,
2919 rip_route_cmd,
2920 "route A.B.C.D/M",
2921 "RIP static route configuration\n"
2922 "IP prefix <network>/<length>\n")
2923{
2924 int ret;
2925 struct prefix_ipv4 p;
2926 struct route_node *node;
2927
2928 ret = str2prefix_ipv4 (argv[0], &p);
2929 if (ret < 0)
2930 {
2931 vty_out (vty, "Malformed address%s", VTY_NEWLINE);
2932 return CMD_WARNING;
2933 }
2934 apply_mask_ipv4 (&p);
2935
2936 /* For router rip configuration. */
2937 node = route_node_get (rip->route, (struct prefix *) &p);
2938
2939 if (node->info)
2940 {
2941 vty_out (vty, "There is already same static route.%s", VTY_NEWLINE);
2942 route_unlock_node (node);
2943 return CMD_WARNING;
2944 }
2945
hasso8a676be2004-10-08 06:36:38 +00002946 node->info = (char *)"static";
paul718e3742002-12-13 20:15:29 +00002947
vincentfbf5d032005-09-29 11:25:50 +00002948 rip_redistribute_add (ZEBRA_ROUTE_RIP, RIP_ROUTE_STATIC, &p, 0, NULL, 0, 0);
paul718e3742002-12-13 20:15:29 +00002949
2950 return CMD_SUCCESS;
2951}
2952
2953DEFUN (no_rip_route,
2954 no_rip_route_cmd,
2955 "no route A.B.C.D/M",
2956 NO_STR
2957 "RIP static route configuration\n"
2958 "IP prefix <network>/<length>\n")
2959{
2960 int ret;
2961 struct prefix_ipv4 p;
2962 struct route_node *node;
2963
2964 ret = str2prefix_ipv4 (argv[0], &p);
2965 if (ret < 0)
2966 {
2967 vty_out (vty, "Malformed address%s", VTY_NEWLINE);
2968 return CMD_WARNING;
2969 }
2970 apply_mask_ipv4 (&p);
2971
2972 /* For router rip configuration. */
2973 node = route_node_lookup (rip->route, (struct prefix *) &p);
2974 if (! node)
2975 {
2976 vty_out (vty, "Can't find route %s.%s", argv[0],
2977 VTY_NEWLINE);
2978 return CMD_WARNING;
2979 }
2980
2981 rip_redistribute_delete (ZEBRA_ROUTE_RIP, RIP_ROUTE_STATIC, &p, 0);
2982 route_unlock_node (node);
2983
2984 node->info = NULL;
2985 route_unlock_node (node);
2986
2987 return CMD_SUCCESS;
2988}
2989
pauldc63bfd2005-10-25 23:31:05 +00002990static void
paul216565a2005-10-25 23:35:28 +00002991rip_update_default_metric (void)
paul718e3742002-12-13 20:15:29 +00002992{
2993 struct route_node *np;
2994 struct rip_info *rinfo;
2995
2996 for (np = route_top (rip->table); np; np = route_next (np))
2997 if ((rinfo = np->info) != NULL)
2998 if (rinfo->type != ZEBRA_ROUTE_RIP && rinfo->type != ZEBRA_ROUTE_CONNECT)
2999 rinfo->metric = rip->default_metric;
3000}
3001
3002DEFUN (rip_default_metric,
3003 rip_default_metric_cmd,
3004 "default-metric <1-16>",
3005 "Set a metric of redistribute routes\n"
3006 "Default metric\n")
3007{
3008 if (rip)
3009 {
3010 rip->default_metric = atoi (argv[0]);
3011 /* rip_update_default_metric (); */
3012 }
3013 return CMD_SUCCESS;
3014}
3015
3016DEFUN (no_rip_default_metric,
3017 no_rip_default_metric_cmd,
3018 "no default-metric",
3019 NO_STR
3020 "Set a metric of redistribute routes\n"
3021 "Default metric\n")
3022{
3023 if (rip)
3024 {
3025 rip->default_metric = RIP_DEFAULT_METRIC_DEFAULT;
3026 /* rip_update_default_metric (); */
3027 }
3028 return CMD_SUCCESS;
3029}
3030
3031ALIAS (no_rip_default_metric,
3032 no_rip_default_metric_val_cmd,
3033 "no default-metric <1-16>",
3034 NO_STR
3035 "Set a metric of redistribute routes\n"
3036 "Default metric\n")
3037
3038DEFUN (rip_timers,
3039 rip_timers_cmd,
3040 "timers basic <5-2147483647> <5-2147483647> <5-2147483647>",
3041 "Adjust routing timers\n"
3042 "Basic routing protocol update timers\n"
3043 "Routing table update timer value in second. Default is 30.\n"
3044 "Routing information timeout timer. Default is 180.\n"
3045 "Garbage collection timer. Default is 120.\n")
3046{
3047 unsigned long update;
3048 unsigned long timeout;
3049 unsigned long garbage;
3050 char *endptr = NULL;
3051 unsigned long RIP_TIMER_MAX = 2147483647;
3052 unsigned long RIP_TIMER_MIN = 5;
3053
3054 update = strtoul (argv[0], &endptr, 10);
3055 if (update > RIP_TIMER_MAX || update < RIP_TIMER_MIN || *endptr != '\0')
3056 {
3057 vty_out (vty, "update timer value error%s", VTY_NEWLINE);
3058 return CMD_WARNING;
3059 }
3060
3061 timeout = strtoul (argv[1], &endptr, 10);
3062 if (timeout > RIP_TIMER_MAX || timeout < RIP_TIMER_MIN || *endptr != '\0')
3063 {
3064 vty_out (vty, "timeout timer value error%s", VTY_NEWLINE);
3065 return CMD_WARNING;
3066 }
3067
3068 garbage = strtoul (argv[2], &endptr, 10);
3069 if (garbage > RIP_TIMER_MAX || garbage < RIP_TIMER_MIN || *endptr != '\0')
3070 {
3071 vty_out (vty, "garbage timer value error%s", VTY_NEWLINE);
3072 return CMD_WARNING;
3073 }
3074
3075 /* Set each timer value. */
3076 rip->update_time = update;
3077 rip->timeout_time = timeout;
3078 rip->garbage_time = garbage;
3079
3080 /* Reset update timer thread. */
3081 rip_event (RIP_UPDATE_EVENT, 0);
3082
3083 return CMD_SUCCESS;
3084}
3085
3086DEFUN (no_rip_timers,
3087 no_rip_timers_cmd,
3088 "no timers basic",
3089 NO_STR
3090 "Adjust routing timers\n"
3091 "Basic routing protocol update timers\n")
3092{
3093 /* Set each timer value to the default. */
3094 rip->update_time = RIP_UPDATE_TIMER_DEFAULT;
3095 rip->timeout_time = RIP_TIMEOUT_TIMER_DEFAULT;
3096 rip->garbage_time = RIP_GARBAGE_TIMER_DEFAULT;
3097
3098 /* Reset update timer thread. */
3099 rip_event (RIP_UPDATE_EVENT, 0);
3100
3101 return CMD_SUCCESS;
3102}
hasso16705132003-05-25 14:49:19 +00003103
3104ALIAS (no_rip_timers,
3105 no_rip_timers_val_cmd,
3106 "no timers basic <0-65535> <0-65535> <0-65535>",
3107 NO_STR
3108 "Adjust routing timers\n"
3109 "Basic routing protocol update timers\n"
3110 "Routing table update timer value in second. Default is 30.\n"
3111 "Routing information timeout timer. Default is 180.\n"
3112 "Garbage collection timer. Default is 120.\n")
3113
paul718e3742002-12-13 20:15:29 +00003114
3115struct route_table *rip_distance_table;
3116
3117struct rip_distance
3118{
3119 /* Distance value for the IP source prefix. */
3120 u_char distance;
3121
3122 /* Name of the access-list to be matched. */
3123 char *access_list;
3124};
3125
pauldc63bfd2005-10-25 23:31:05 +00003126static struct rip_distance *
paul216565a2005-10-25 23:35:28 +00003127rip_distance_new (void)
paul718e3742002-12-13 20:15:29 +00003128{
3129 struct rip_distance *new;
3130 new = XMALLOC (MTYPE_RIP_DISTANCE, sizeof (struct rip_distance));
3131 memset (new, 0, sizeof (struct rip_distance));
3132 return new;
3133}
3134
pauldc63bfd2005-10-25 23:31:05 +00003135static void
paul718e3742002-12-13 20:15:29 +00003136rip_distance_free (struct rip_distance *rdistance)
3137{
3138 XFREE (MTYPE_RIP_DISTANCE, rdistance);
3139}
3140
pauldc63bfd2005-10-25 23:31:05 +00003141static int
hasso98b718a2004-10-11 12:57:57 +00003142rip_distance_set (struct vty *vty, const char *distance_str, const char *ip_str,
3143 const char *access_list_str)
paul718e3742002-12-13 20:15:29 +00003144{
3145 int ret;
3146 struct prefix_ipv4 p;
3147 u_char distance;
3148 struct route_node *rn;
3149 struct rip_distance *rdistance;
3150
3151 ret = str2prefix_ipv4 (ip_str, &p);
3152 if (ret == 0)
3153 {
3154 vty_out (vty, "Malformed prefix%s", VTY_NEWLINE);
3155 return CMD_WARNING;
3156 }
3157
3158 distance = atoi (distance_str);
3159
3160 /* Get RIP distance node. */
3161 rn = route_node_get (rip_distance_table, (struct prefix *) &p);
3162 if (rn->info)
3163 {
3164 rdistance = rn->info;
3165 route_unlock_node (rn);
3166 }
3167 else
3168 {
3169 rdistance = rip_distance_new ();
3170 rn->info = rdistance;
3171 }
3172
3173 /* Set distance value. */
3174 rdistance->distance = distance;
3175
3176 /* Reset access-list configuration. */
3177 if (rdistance->access_list)
3178 {
3179 free (rdistance->access_list);
3180 rdistance->access_list = NULL;
3181 }
3182 if (access_list_str)
3183 rdistance->access_list = strdup (access_list_str);
3184
3185 return CMD_SUCCESS;
3186}
3187
pauldc63bfd2005-10-25 23:31:05 +00003188static int
hasso98b718a2004-10-11 12:57:57 +00003189rip_distance_unset (struct vty *vty, const char *distance_str,
3190 const char *ip_str, const char *access_list_str)
paul718e3742002-12-13 20:15:29 +00003191{
3192 int ret;
3193 struct prefix_ipv4 p;
3194 u_char distance;
3195 struct route_node *rn;
3196 struct rip_distance *rdistance;
3197
3198 ret = str2prefix_ipv4 (ip_str, &p);
3199 if (ret == 0)
3200 {
3201 vty_out (vty, "Malformed prefix%s", VTY_NEWLINE);
3202 return CMD_WARNING;
3203 }
3204
3205 distance = atoi (distance_str);
3206
3207 rn = route_node_lookup (rip_distance_table, (struct prefix *)&p);
3208 if (! rn)
3209 {
3210 vty_out (vty, "Can't find specified prefix%s", VTY_NEWLINE);
3211 return CMD_WARNING;
3212 }
3213
3214 rdistance = rn->info;
3215
3216 if (rdistance->access_list)
3217 free (rdistance->access_list);
3218 rip_distance_free (rdistance);
3219
3220 rn->info = NULL;
3221 route_unlock_node (rn);
3222 route_unlock_node (rn);
3223
3224 return CMD_SUCCESS;
3225}
3226
pauldc63bfd2005-10-25 23:31:05 +00003227static void
paul216565a2005-10-25 23:35:28 +00003228rip_distance_reset (void)
paul718e3742002-12-13 20:15:29 +00003229{
3230 struct route_node *rn;
3231 struct rip_distance *rdistance;
3232
3233 for (rn = route_top (rip_distance_table); rn; rn = route_next (rn))
3234 if ((rdistance = rn->info) != NULL)
3235 {
3236 if (rdistance->access_list)
3237 free (rdistance->access_list);
3238 rip_distance_free (rdistance);
3239 rn->info = NULL;
3240 route_unlock_node (rn);
3241 }
3242}
3243
3244/* Apply RIP information to distance method. */
3245u_char
3246rip_distance_apply (struct rip_info *rinfo)
3247{
3248 struct route_node *rn;
3249 struct prefix_ipv4 p;
3250 struct rip_distance *rdistance;
3251 struct access_list *alist;
3252
3253 if (! rip)
3254 return 0;
3255
3256 memset (&p, 0, sizeof (struct prefix_ipv4));
3257 p.family = AF_INET;
3258 p.prefix = rinfo->from;
3259 p.prefixlen = IPV4_MAX_BITLEN;
3260
3261 /* Check source address. */
3262 rn = route_node_match (rip_distance_table, (struct prefix *) &p);
3263 if (rn)
3264 {
3265 rdistance = rn->info;
3266 route_unlock_node (rn);
3267
3268 if (rdistance->access_list)
3269 {
3270 alist = access_list_lookup (AFI_IP, rdistance->access_list);
3271 if (alist == NULL)
3272 return 0;
3273 if (access_list_apply (alist, &rinfo->rp->p) == FILTER_DENY)
3274 return 0;
3275
3276 return rdistance->distance;
3277 }
3278 else
3279 return rdistance->distance;
3280 }
3281
3282 if (rip->distance)
3283 return rip->distance;
3284
3285 return 0;
3286}
3287
pauldc63bfd2005-10-25 23:31:05 +00003288static void
paul718e3742002-12-13 20:15:29 +00003289rip_distance_show (struct vty *vty)
3290{
3291 struct route_node *rn;
3292 struct rip_distance *rdistance;
3293 int header = 1;
3294 char buf[BUFSIZ];
3295
3296 vty_out (vty, " Distance: (default is %d)%s",
3297 rip->distance ? rip->distance :ZEBRA_RIP_DISTANCE_DEFAULT,
3298 VTY_NEWLINE);
3299
3300 for (rn = route_top (rip_distance_table); rn; rn = route_next (rn))
3301 if ((rdistance = rn->info) != NULL)
3302 {
3303 if (header)
3304 {
3305 vty_out (vty, " Address Distance List%s",
3306 VTY_NEWLINE);
3307 header = 0;
3308 }
3309 sprintf (buf, "%s/%d", inet_ntoa (rn->p.u.prefix4), rn->p.prefixlen);
3310 vty_out (vty, " %-20s %4d %s%s",
3311 buf, rdistance->distance,
3312 rdistance->access_list ? rdistance->access_list : "",
3313 VTY_NEWLINE);
3314 }
3315}
3316
3317DEFUN (rip_distance,
3318 rip_distance_cmd,
3319 "distance <1-255>",
3320 "Administrative distance\n"
3321 "Distance value\n")
3322{
3323 rip->distance = atoi (argv[0]);
3324 return CMD_SUCCESS;
3325}
3326
3327DEFUN (no_rip_distance,
3328 no_rip_distance_cmd,
3329 "no distance <1-255>",
3330 NO_STR
3331 "Administrative distance\n"
3332 "Distance value\n")
3333{
3334 rip->distance = 0;
3335 return CMD_SUCCESS;
3336}
3337
3338DEFUN (rip_distance_source,
3339 rip_distance_source_cmd,
3340 "distance <1-255> A.B.C.D/M",
3341 "Administrative distance\n"
3342 "Distance value\n"
3343 "IP source prefix\n")
3344{
3345 rip_distance_set (vty, argv[0], argv[1], NULL);
3346 return CMD_SUCCESS;
3347}
3348
3349DEFUN (no_rip_distance_source,
3350 no_rip_distance_source_cmd,
3351 "no distance <1-255> A.B.C.D/M",
3352 NO_STR
3353 "Administrative distance\n"
3354 "Distance value\n"
3355 "IP source prefix\n")
3356{
3357 rip_distance_unset (vty, argv[0], argv[1], NULL);
3358 return CMD_SUCCESS;
3359}
3360
3361DEFUN (rip_distance_source_access_list,
3362 rip_distance_source_access_list_cmd,
3363 "distance <1-255> A.B.C.D/M WORD",
3364 "Administrative distance\n"
3365 "Distance value\n"
3366 "IP source prefix\n"
3367 "Access list name\n")
3368{
3369 rip_distance_set (vty, argv[0], argv[1], argv[2]);
3370 return CMD_SUCCESS;
3371}
3372
3373DEFUN (no_rip_distance_source_access_list,
3374 no_rip_distance_source_access_list_cmd,
3375 "no distance <1-255> A.B.C.D/M WORD",
3376 NO_STR
3377 "Administrative distance\n"
3378 "Distance value\n"
3379 "IP source prefix\n"
3380 "Access list name\n")
3381{
3382 rip_distance_unset (vty, argv[0], argv[1], argv[2]);
3383 return CMD_SUCCESS;
3384}
3385
3386/* Print out routes update time. */
pauldc63bfd2005-10-25 23:31:05 +00003387static void
paul718e3742002-12-13 20:15:29 +00003388rip_vty_out_uptime (struct vty *vty, struct rip_info *rinfo)
3389{
3390 struct timeval timer_now;
3391 time_t clock;
3392 struct tm *tm;
3393#define TIME_BUF 25
3394 char timebuf [TIME_BUF];
3395 struct thread *thread;
3396
3397 gettimeofday (&timer_now, NULL);
3398
3399 if ((thread = rinfo->t_timeout) != NULL)
3400 {
3401 clock = thread->u.sands.tv_sec - timer_now.tv_sec;
3402 tm = gmtime (&clock);
3403 strftime (timebuf, TIME_BUF, "%M:%S", tm);
3404 vty_out (vty, "%5s", timebuf);
3405 }
3406 else if ((thread = rinfo->t_garbage_collect) != NULL)
3407 {
3408 clock = thread->u.sands.tv_sec - timer_now.tv_sec;
3409 tm = gmtime (&clock);
3410 strftime (timebuf, TIME_BUF, "%M:%S", tm);
3411 vty_out (vty, "%5s", timebuf);
3412 }
3413}
3414
pauldc63bfd2005-10-25 23:31:05 +00003415static const char *
paul718e3742002-12-13 20:15:29 +00003416rip_route_type_print (int sub_type)
3417{
3418 switch (sub_type)
3419 {
3420 case RIP_ROUTE_RTE:
3421 return "n";
3422 case RIP_ROUTE_STATIC:
3423 return "s";
3424 case RIP_ROUTE_DEFAULT:
3425 return "d";
3426 case RIP_ROUTE_REDISTRIBUTE:
3427 return "r";
3428 case RIP_ROUTE_INTERFACE:
3429 return "i";
3430 default:
3431 return "?";
3432 }
3433}
3434
3435DEFUN (show_ip_rip,
3436 show_ip_rip_cmd,
3437 "show ip rip",
3438 SHOW_STR
3439 IP_STR
3440 "Show RIP routes\n")
3441{
3442 struct route_node *np;
3443 struct rip_info *rinfo;
3444
3445 if (! rip)
3446 return CMD_SUCCESS;
3447
hasso16705132003-05-25 14:49:19 +00003448 vty_out (vty, "Codes: R - RIP, C - connected, S - Static, O - OSPF, B - BGP%s"
3449 "Sub-codes:%s"
3450 " (n) - normal, (s) - static, (d) - default, (r) - redistribute,%s"
paul718e3742002-12-13 20:15:29 +00003451 " (i) - interface%s%s"
hassoa1455d82004-03-03 19:36:24 +00003452 " Network Next Hop Metric From Tag Time%s",
hasso16705132003-05-25 14:49:19 +00003453 VTY_NEWLINE, VTY_NEWLINE, VTY_NEWLINE, VTY_NEWLINE, VTY_NEWLINE, VTY_NEWLINE);
paul718e3742002-12-13 20:15:29 +00003454
3455 for (np = route_top (rip->table); np; np = route_next (np))
3456 if ((rinfo = np->info) != NULL)
3457 {
3458 int len;
3459
ajsf52d13c2005-10-01 17:38:06 +00003460 len = vty_out (vty, "%c(%s) %s/%d",
paul718e3742002-12-13 20:15:29 +00003461 /* np->lock, For debugging. */
ajsf52d13c2005-10-01 17:38:06 +00003462 zebra_route_char(rinfo->type),
paul718e3742002-12-13 20:15:29 +00003463 rip_route_type_print (rinfo->sub_type),
3464 inet_ntoa (np->p.u.prefix4), np->p.prefixlen);
3465
hassoa1455d82004-03-03 19:36:24 +00003466 len = 24 - len;
paul718e3742002-12-13 20:15:29 +00003467
3468 if (len > 0)
3469 vty_out (vty, "%*s", len, " ");
3470
3471 if (rinfo->nexthop.s_addr)
3472 vty_out (vty, "%-20s %2d ", inet_ntoa (rinfo->nexthop),
3473 rinfo->metric);
3474 else
3475 vty_out (vty, "0.0.0.0 %2d ", rinfo->metric);
3476
3477 /* Route which exist in kernel routing table. */
3478 if ((rinfo->type == ZEBRA_ROUTE_RIP) &&
3479 (rinfo->sub_type == RIP_ROUTE_RTE))
3480 {
3481 vty_out (vty, "%-15s ", inet_ntoa (rinfo->from));
hasso16705132003-05-25 14:49:19 +00003482 vty_out (vty, "%3d ", rinfo->tag);
paul718e3742002-12-13 20:15:29 +00003483 rip_vty_out_uptime (vty, rinfo);
3484 }
3485 else if (rinfo->metric == RIP_METRIC_INFINITY)
3486 {
3487 vty_out (vty, "self ");
hasso16705132003-05-25 14:49:19 +00003488 vty_out (vty, "%3d ", rinfo->tag);
paul718e3742002-12-13 20:15:29 +00003489 rip_vty_out_uptime (vty, rinfo);
3490 }
3491 else
hasso16705132003-05-25 14:49:19 +00003492 {
vincentfbf5d032005-09-29 11:25:50 +00003493 if (rinfo->external_metric)
3494 {
3495 len = vty_out (vty, "self (%s:%d)",
ajsf52d13c2005-10-01 17:38:06 +00003496 zebra_route_string(rinfo->type),
vincentfbf5d032005-09-29 11:25:50 +00003497 rinfo->external_metric);
3498 len = 16 - len;
3499 if (len > 0)
3500 vty_out (vty, "%*s", len, " ");
3501 }
3502 else
3503 vty_out (vty, "self ");
hasso16705132003-05-25 14:49:19 +00003504 vty_out (vty, "%3d", rinfo->tag);
3505 }
paul718e3742002-12-13 20:15:29 +00003506
3507 vty_out (vty, "%s", VTY_NEWLINE);
3508 }
3509 return CMD_SUCCESS;
3510}
3511
3512/* Return next event time. */
pauldc63bfd2005-10-25 23:31:05 +00003513static int
paul718e3742002-12-13 20:15:29 +00003514rip_next_thread_timer (struct thread *thread)
3515{
3516 struct timeval timer_now;
3517
3518 gettimeofday (&timer_now, NULL);
3519
3520 return thread->u.sands.tv_sec - timer_now.tv_sec;
3521}
3522
hasso16705132003-05-25 14:49:19 +00003523/* Vincent: formerly, it was show_ip_protocols_rip: "show ip protocols" */
3524DEFUN (show_ip_rip_status,
3525 show_ip_rip_status_cmd,
3526 "show ip rip status",
paul718e3742002-12-13 20:15:29 +00003527 SHOW_STR
3528 IP_STR
hasso16705132003-05-25 14:49:19 +00003529 "Show RIP routes\n"
paul718e3742002-12-13 20:15:29 +00003530 "IP routing protocol process parameters and statistics\n")
3531{
hasso52dc7ee2004-09-23 19:18:23 +00003532 struct listnode *node;
paul718e3742002-12-13 20:15:29 +00003533 struct interface *ifp;
3534 struct rip_interface *ri;
3535 extern struct message ri_version_msg[];
hasso8a676be2004-10-08 06:36:38 +00003536 const char *send_version;
3537 const char *receive_version;
paul718e3742002-12-13 20:15:29 +00003538
3539 if (! rip)
3540 return CMD_SUCCESS;
3541
3542 vty_out (vty, "Routing Protocol is \"rip\"%s", VTY_NEWLINE);
3543 vty_out (vty, " Sending updates every %ld seconds with +/-50%%,",
3544 rip->update_time);
3545 vty_out (vty, " next due in %d seconds%s",
3546 rip_next_thread_timer (rip->t_update),
3547 VTY_NEWLINE);
3548 vty_out (vty, " Timeout after %ld seconds,", rip->timeout_time);
3549 vty_out (vty, " garbage collect after %ld seconds%s", rip->garbage_time,
3550 VTY_NEWLINE);
3551
3552 /* Filtering status show. */
3553 config_show_distribute (vty);
3554
3555 /* Default metric information. */
3556 vty_out (vty, " Default redistribution metric is %d%s",
3557 rip->default_metric, VTY_NEWLINE);
3558
3559 /* Redistribute information. */
3560 vty_out (vty, " Redistributing:");
3561 config_write_rip_redistribute (vty, 0);
3562 vty_out (vty, "%s", VTY_NEWLINE);
3563
paulf38a4712003-06-07 01:10:00 +00003564 vty_out (vty, " Default version control: send version %s,",
3565 lookup(ri_version_msg,rip->version_send));
3566 if (rip->version_recv == RI_RIP_VERSION_1_AND_2)
3567 vty_out (vty, " receive any version %s", VTY_NEWLINE);
3568 else
3569 vty_out (vty, " receive version %s %s",
3570 lookup(ri_version_msg,rip->version_recv), VTY_NEWLINE);
paul718e3742002-12-13 20:15:29 +00003571
3572 vty_out (vty, " Interface Send Recv Key-chain%s", VTY_NEWLINE);
3573
paul1eb8ef22005-04-07 07:30:20 +00003574 for (ALL_LIST_ELEMENTS_RO (iflist, node, ifp))
paul718e3742002-12-13 20:15:29 +00003575 {
paul718e3742002-12-13 20:15:29 +00003576 ri = ifp->info;
3577
3578 if (ri->enable_network || ri->enable_interface)
3579 {
3580 if (ri->ri_send == RI_RIP_UNSPEC)
paulf38a4712003-06-07 01:10:00 +00003581 send_version = lookup (ri_version_msg, rip->version_send);
paul718e3742002-12-13 20:15:29 +00003582 else
3583 send_version = lookup (ri_version_msg, ri->ri_send);
3584
3585 if (ri->ri_receive == RI_RIP_UNSPEC)
paulf38a4712003-06-07 01:10:00 +00003586 receive_version = lookup (ri_version_msg, rip->version_recv);
paul718e3742002-12-13 20:15:29 +00003587 else
3588 receive_version = lookup (ri_version_msg, ri->ri_receive);
3589
3590 vty_out (vty, " %-17s%-3s %-3s %s%s", ifp->name,
3591 send_version,
3592 receive_version,
3593 ri->key_chain ? ri->key_chain : "",
3594 VTY_NEWLINE);
3595 }
3596 }
3597
3598 vty_out (vty, " Routing for Networks:%s", VTY_NEWLINE);
3599 config_write_rip_network (vty, 0);
3600
paul4aaff3f2003-06-07 01:04:45 +00003601 {
3602 int found_passive = 0;
paul1eb8ef22005-04-07 07:30:20 +00003603 for (ALL_LIST_ELEMENTS_RO (iflist, node, ifp))
paul4aaff3f2003-06-07 01:04:45 +00003604 {
paul4aaff3f2003-06-07 01:04:45 +00003605 ri = ifp->info;
3606
3607 if ((ri->enable_network || ri->enable_interface) && ri->passive)
3608 {
3609 if (!found_passive)
3610 {
3611 vty_out (vty, " Passive Interface(s):%s", VTY_NEWLINE);
3612 found_passive = 1;
3613 }
3614 vty_out (vty, " %s%s", ifp->name, VTY_NEWLINE);
3615 }
3616 }
3617 }
3618
paul718e3742002-12-13 20:15:29 +00003619 vty_out (vty, " Routing Information Sources:%s", VTY_NEWLINE);
3620 vty_out (vty, " Gateway BadPackets BadRoutes Distance Last Update%s", VTY_NEWLINE);
3621 rip_peer_display (vty);
3622
3623 rip_distance_show (vty);
3624
3625 return CMD_SUCCESS;
3626}
3627
3628/* RIP configuration write function. */
pauldc63bfd2005-10-25 23:31:05 +00003629static int
paul718e3742002-12-13 20:15:29 +00003630config_write_rip (struct vty *vty)
3631{
3632 int write = 0;
3633 struct route_node *rn;
3634 struct rip_distance *rdistance;
3635
3636 if (rip)
3637 {
3638 /* Router RIP statement. */
3639 vty_out (vty, "router rip%s", VTY_NEWLINE);
3640 write++;
3641
3642 /* RIP version statement. Default is RIP version 2. */
paulf38a4712003-06-07 01:10:00 +00003643 if (rip->version_send != RI_RIP_VERSION_2
3644 || rip->version_recv != RI_RIP_VERSION_1_AND_2)
3645 vty_out (vty, " version %d%s", rip->version_send,
paul718e3742002-12-13 20:15:29 +00003646 VTY_NEWLINE);
3647
3648 /* RIP timer configuration. */
3649 if (rip->update_time != RIP_UPDATE_TIMER_DEFAULT
3650 || rip->timeout_time != RIP_TIMEOUT_TIMER_DEFAULT
3651 || rip->garbage_time != RIP_GARBAGE_TIMER_DEFAULT)
3652 vty_out (vty, " timers basic %lu %lu %lu%s",
3653 rip->update_time,
3654 rip->timeout_time,
3655 rip->garbage_time,
3656 VTY_NEWLINE);
3657
3658 /* Default information configuration. */
3659 if (rip->default_information)
3660 {
3661 if (rip->default_information_route_map)
3662 vty_out (vty, " default-information originate route-map %s%s",
3663 rip->default_information_route_map, VTY_NEWLINE);
3664 else
3665 vty_out (vty, " default-information originate%s",
3666 VTY_NEWLINE);
3667 }
3668
3669 /* Redistribute configuration. */
3670 config_write_rip_redistribute (vty, 1);
3671
3672 /* RIP offset-list configuration. */
3673 config_write_rip_offset_list (vty);
3674
3675 /* RIP enabled network and interface configuration. */
3676 config_write_rip_network (vty, 1);
3677
3678 /* RIP default metric configuration */
3679 if (rip->default_metric != RIP_DEFAULT_METRIC_DEFAULT)
3680 vty_out (vty, " default-metric %d%s",
3681 rip->default_metric, VTY_NEWLINE);
3682
3683 /* Distribute configuration. */
3684 write += config_write_distribute (vty);
3685
hasso16705132003-05-25 14:49:19 +00003686 /* Interface routemap configuration */
3687 write += config_write_if_rmap (vty);
3688
paul718e3742002-12-13 20:15:29 +00003689 /* Distance configuration. */
3690 if (rip->distance)
3691 vty_out (vty, " distance %d%s", rip->distance, VTY_NEWLINE);
3692
3693 /* RIP source IP prefix distance configuration. */
3694 for (rn = route_top (rip_distance_table); rn; rn = route_next (rn))
3695 if ((rdistance = rn->info) != NULL)
3696 vty_out (vty, " distance %d %s/%d %s%s", rdistance->distance,
3697 inet_ntoa (rn->p.u.prefix4), rn->p.prefixlen,
3698 rdistance->access_list ? rdistance->access_list : "",
3699 VTY_NEWLINE);
3700
3701 /* RIP static route configuration. */
3702 for (rn = route_top (rip->route); rn; rn = route_next (rn))
3703 if (rn->info)
3704 vty_out (vty, " route %s/%d%s",
3705 inet_ntoa (rn->p.u.prefix4),
3706 rn->p.prefixlen,
3707 VTY_NEWLINE);
3708
3709 }
3710 return write;
3711}
3712
3713/* RIP node structure. */
3714struct cmd_node rip_node =
3715{
3716 RIP_NODE,
3717 "%s(config-router)# ",
3718 1
3719};
3720
3721/* Distribute-list update functions. */
pauldc63bfd2005-10-25 23:31:05 +00003722static void
paul718e3742002-12-13 20:15:29 +00003723rip_distribute_update (struct distribute *dist)
3724{
3725 struct interface *ifp;
3726 struct rip_interface *ri;
3727 struct access_list *alist;
3728 struct prefix_list *plist;
3729
3730 if (! dist->ifname)
3731 return;
3732
3733 ifp = if_lookup_by_name (dist->ifname);
3734 if (ifp == NULL)
3735 return;
3736
3737 ri = ifp->info;
3738
3739 if (dist->list[DISTRIBUTE_IN])
3740 {
3741 alist = access_list_lookup (AFI_IP, dist->list[DISTRIBUTE_IN]);
3742 if (alist)
3743 ri->list[RIP_FILTER_IN] = alist;
3744 else
3745 ri->list[RIP_FILTER_IN] = NULL;
3746 }
3747 else
3748 ri->list[RIP_FILTER_IN] = NULL;
3749
3750 if (dist->list[DISTRIBUTE_OUT])
3751 {
3752 alist = access_list_lookup (AFI_IP, dist->list[DISTRIBUTE_OUT]);
3753 if (alist)
3754 ri->list[RIP_FILTER_OUT] = alist;
3755 else
3756 ri->list[RIP_FILTER_OUT] = NULL;
3757 }
3758 else
3759 ri->list[RIP_FILTER_OUT] = NULL;
3760
3761 if (dist->prefix[DISTRIBUTE_IN])
3762 {
3763 plist = prefix_list_lookup (AFI_IP, dist->prefix[DISTRIBUTE_IN]);
3764 if (plist)
3765 ri->prefix[RIP_FILTER_IN] = plist;
3766 else
3767 ri->prefix[RIP_FILTER_IN] = NULL;
3768 }
3769 else
3770 ri->prefix[RIP_FILTER_IN] = NULL;
3771
3772 if (dist->prefix[DISTRIBUTE_OUT])
3773 {
3774 plist = prefix_list_lookup (AFI_IP, dist->prefix[DISTRIBUTE_OUT]);
3775 if (plist)
3776 ri->prefix[RIP_FILTER_OUT] = plist;
3777 else
3778 ri->prefix[RIP_FILTER_OUT] = NULL;
3779 }
3780 else
3781 ri->prefix[RIP_FILTER_OUT] = NULL;
3782}
3783
3784void
3785rip_distribute_update_interface (struct interface *ifp)
3786{
3787 struct distribute *dist;
3788
3789 dist = distribute_lookup (ifp->name);
3790 if (dist)
3791 rip_distribute_update (dist);
3792}
3793
3794/* Update all interface's distribute list. */
paul02ff83c2004-06-11 11:27:03 +00003795/* ARGSUSED */
pauldc63bfd2005-10-25 23:31:05 +00003796static void
paul02ff83c2004-06-11 11:27:03 +00003797rip_distribute_update_all (struct prefix_list *notused)
paul718e3742002-12-13 20:15:29 +00003798{
3799 struct interface *ifp;
paul1eb8ef22005-04-07 07:30:20 +00003800 struct listnode *node, *nnode;
paul718e3742002-12-13 20:15:29 +00003801
paul1eb8ef22005-04-07 07:30:20 +00003802 for (ALL_LIST_ELEMENTS (iflist, node, nnode, ifp))
3803 rip_distribute_update_interface (ifp);
paul718e3742002-12-13 20:15:29 +00003804}
paul11dde9c2004-05-31 14:00:00 +00003805/* ARGSUSED */
pauldc63bfd2005-10-25 23:31:05 +00003806static void
paul11dde9c2004-05-31 14:00:00 +00003807rip_distribute_update_all_wrapper(struct access_list *notused)
3808{
paul02ff83c2004-06-11 11:27:03 +00003809 rip_distribute_update_all(NULL);
paul11dde9c2004-05-31 14:00:00 +00003810}
paul718e3742002-12-13 20:15:29 +00003811
3812/* Delete all added rip route. */
3813void
paul216565a2005-10-25 23:35:28 +00003814rip_clean (void)
paul718e3742002-12-13 20:15:29 +00003815{
3816 int i;
3817 struct route_node *rp;
3818 struct rip_info *rinfo;
3819
3820 if (rip)
3821 {
3822 /* Clear RIP routes */
3823 for (rp = route_top (rip->table); rp; rp = route_next (rp))
3824 if ((rinfo = rp->info) != NULL)
3825 {
3826 if (rinfo->type == ZEBRA_ROUTE_RIP &&
3827 rinfo->sub_type == RIP_ROUTE_RTE)
3828 rip_zebra_ipv4_delete ((struct prefix_ipv4 *)&rp->p,
3829 &rinfo->nexthop, rinfo->metric);
3830
3831 RIP_TIMER_OFF (rinfo->t_timeout);
3832 RIP_TIMER_OFF (rinfo->t_garbage_collect);
3833
3834 rp->info = NULL;
3835 route_unlock_node (rp);
3836
3837 rip_info_free (rinfo);
3838 }
3839
3840 /* Cancel RIP related timers. */
3841 RIP_TIMER_OFF (rip->t_update);
3842 RIP_TIMER_OFF (rip->t_triggered_update);
3843 RIP_TIMER_OFF (rip->t_triggered_interval);
3844
3845 /* Cancel read thread. */
3846 if (rip->t_read)
3847 {
3848 thread_cancel (rip->t_read);
3849 rip->t_read = NULL;
3850 }
3851
3852 /* Close RIP socket. */
3853 if (rip->sock >= 0)
3854 {
3855 close (rip->sock);
3856 rip->sock = -1;
3857 }
3858
3859 /* Static RIP route configuration. */
3860 for (rp = route_top (rip->route); rp; rp = route_next (rp))
3861 if (rp->info)
3862 {
3863 rp->info = NULL;
3864 route_unlock_node (rp);
3865 }
3866
3867 /* RIP neighbor configuration. */
3868 for (rp = route_top (rip->neighbor); rp; rp = route_next (rp))
3869 if (rp->info)
3870 {
3871 rp->info = NULL;
3872 route_unlock_node (rp);
3873 }
3874
3875 /* Redistribute related clear. */
3876 if (rip->default_information_route_map)
3877 free (rip->default_information_route_map);
3878
3879 for (i = 0; i < ZEBRA_ROUTE_MAX; i++)
3880 if (rip->route_map[i].name)
3881 free (rip->route_map[i].name);
3882
3883 XFREE (MTYPE_ROUTE_TABLE, rip->table);
3884 XFREE (MTYPE_ROUTE_TABLE, rip->route);
3885 XFREE (MTYPE_ROUTE_TABLE, rip->neighbor);
3886
3887 XFREE (MTYPE_RIP, rip);
3888 rip = NULL;
3889 }
3890
3891 rip_clean_network ();
paul4aaff3f2003-06-07 01:04:45 +00003892 rip_passive_nondefault_clean ();
paul718e3742002-12-13 20:15:29 +00003893 rip_offset_clean ();
3894 rip_interface_clean ();
3895 rip_distance_reset ();
3896 rip_redistribute_clean ();
3897}
3898
3899/* Reset all values to the default settings. */
3900void
paul216565a2005-10-25 23:35:28 +00003901rip_reset (void)
paul718e3742002-12-13 20:15:29 +00003902{
3903 /* Reset global counters. */
3904 rip_global_route_changes = 0;
3905 rip_global_queries = 0;
3906
3907 /* Call ripd related reset functions. */
3908 rip_debug_reset ();
3909 rip_route_map_reset ();
3910
3911 /* Call library reset functions. */
3912 vty_reset ();
3913 access_list_reset ();
3914 prefix_list_reset ();
3915
3916 distribute_list_reset ();
3917
3918 rip_interface_reset ();
3919 rip_distance_reset ();
3920
3921 rip_zclient_reset ();
3922}
3923
pauldc63bfd2005-10-25 23:31:05 +00003924static void
hasso16705132003-05-25 14:49:19 +00003925rip_if_rmap_update (struct if_rmap *if_rmap)
3926{
3927 struct interface *ifp;
3928 struct rip_interface *ri;
3929 struct route_map *rmap;
3930
3931 ifp = if_lookup_by_name (if_rmap->ifname);
3932 if (ifp == NULL)
3933 return;
3934
3935 ri = ifp->info;
3936
3937 if (if_rmap->routemap[IF_RMAP_IN])
3938 {
3939 rmap = route_map_lookup_by_name (if_rmap->routemap[IF_RMAP_IN]);
3940 if (rmap)
3941 ri->routemap[IF_RMAP_IN] = rmap;
3942 else
3943 ri->routemap[IF_RMAP_IN] = NULL;
3944 }
3945 else
3946 ri->routemap[RIP_FILTER_IN] = NULL;
3947
3948 if (if_rmap->routemap[IF_RMAP_OUT])
3949 {
3950 rmap = route_map_lookup_by_name (if_rmap->routemap[IF_RMAP_OUT]);
3951 if (rmap)
3952 ri->routemap[IF_RMAP_OUT] = rmap;
3953 else
3954 ri->routemap[IF_RMAP_OUT] = NULL;
3955 }
3956 else
3957 ri->routemap[RIP_FILTER_OUT] = NULL;
3958}
3959
3960void
3961rip_if_rmap_update_interface (struct interface *ifp)
3962{
3963 struct if_rmap *if_rmap;
3964
3965 if_rmap = if_rmap_lookup (ifp->name);
3966 if (if_rmap)
3967 rip_if_rmap_update (if_rmap);
3968}
3969
pauldc63bfd2005-10-25 23:31:05 +00003970static void
hasso16705132003-05-25 14:49:19 +00003971rip_routemap_update_redistribute (void)
3972{
3973 int i;
3974
3975 if (rip)
3976 {
3977 for (i = 0; i < ZEBRA_ROUTE_MAX; i++)
3978 {
3979 if (rip->route_map[i].name)
3980 rip->route_map[i].map =
3981 route_map_lookup_by_name (rip->route_map[i].name);
3982 }
3983 }
3984}
3985
paul11dde9c2004-05-31 14:00:00 +00003986/* ARGSUSED */
pauldc63bfd2005-10-25 23:31:05 +00003987static void
hasso98b718a2004-10-11 12:57:57 +00003988rip_routemap_update (const char *notused)
hasso16705132003-05-25 14:49:19 +00003989{
3990 struct interface *ifp;
paul1eb8ef22005-04-07 07:30:20 +00003991 struct listnode *node, *nnode;
hasso16705132003-05-25 14:49:19 +00003992
paul1eb8ef22005-04-07 07:30:20 +00003993 for (ALL_LIST_ELEMENTS (iflist, node, nnode, ifp))
3994 rip_if_rmap_update_interface (ifp);
hasso16705132003-05-25 14:49:19 +00003995
3996 rip_routemap_update_redistribute ();
3997}
3998
paul718e3742002-12-13 20:15:29 +00003999/* Allocate new rip structure and set default value. */
4000void
pauldc63bfd2005-10-25 23:31:05 +00004001rip_init (void)
paul718e3742002-12-13 20:15:29 +00004002{
4003 /* Randomize for triggered update random(). */
4004 srand (time (NULL));
4005
4006 /* Install top nodes. */
4007 install_node (&rip_node, config_write_rip);
4008
4009 /* Install rip commands. */
4010 install_element (VIEW_NODE, &show_ip_rip_cmd);
hasso16705132003-05-25 14:49:19 +00004011 install_element (VIEW_NODE, &show_ip_rip_status_cmd);
paul718e3742002-12-13 20:15:29 +00004012 install_element (ENABLE_NODE, &show_ip_rip_cmd);
hasso16705132003-05-25 14:49:19 +00004013 install_element (ENABLE_NODE, &show_ip_rip_status_cmd);
paul718e3742002-12-13 20:15:29 +00004014 install_element (CONFIG_NODE, &router_rip_cmd);
4015 install_element (CONFIG_NODE, &no_router_rip_cmd);
4016
4017 install_default (RIP_NODE);
4018 install_element (RIP_NODE, &rip_version_cmd);
4019 install_element (RIP_NODE, &no_rip_version_cmd);
4020 install_element (RIP_NODE, &no_rip_version_val_cmd);
4021 install_element (RIP_NODE, &rip_default_metric_cmd);
4022 install_element (RIP_NODE, &no_rip_default_metric_cmd);
4023 install_element (RIP_NODE, &no_rip_default_metric_val_cmd);
4024 install_element (RIP_NODE, &rip_timers_cmd);
4025 install_element (RIP_NODE, &no_rip_timers_cmd);
hasso16705132003-05-25 14:49:19 +00004026 install_element (RIP_NODE, &no_rip_timers_val_cmd);
paul718e3742002-12-13 20:15:29 +00004027 install_element (RIP_NODE, &rip_route_cmd);
4028 install_element (RIP_NODE, &no_rip_route_cmd);
4029 install_element (RIP_NODE, &rip_distance_cmd);
4030 install_element (RIP_NODE, &no_rip_distance_cmd);
4031 install_element (RIP_NODE, &rip_distance_source_cmd);
4032 install_element (RIP_NODE, &no_rip_distance_source_cmd);
4033 install_element (RIP_NODE, &rip_distance_source_access_list_cmd);
4034 install_element (RIP_NODE, &no_rip_distance_source_access_list_cmd);
4035
4036 /* Debug related init. */
4037 rip_debug_init ();
4038
paul718e3742002-12-13 20:15:29 +00004039 /* SNMP init. */
4040#ifdef HAVE_SNMP
4041 rip_snmp_init ();
4042#endif /* HAVE_SNMP */
4043
4044 /* Access list install. */
4045 access_list_init ();
paul11dde9c2004-05-31 14:00:00 +00004046 access_list_add_hook (rip_distribute_update_all_wrapper);
4047 access_list_delete_hook (rip_distribute_update_all_wrapper);
paul718e3742002-12-13 20:15:29 +00004048
4049 /* Prefix list initialize.*/
4050 prefix_list_init ();
4051 prefix_list_add_hook (rip_distribute_update_all);
4052 prefix_list_delete_hook (rip_distribute_update_all);
4053
4054 /* Distribute list install. */
4055 distribute_list_init (RIP_NODE);
4056 distribute_list_add_hook (rip_distribute_update);
4057 distribute_list_delete_hook (rip_distribute_update);
4058
hasso16705132003-05-25 14:49:19 +00004059 /* Route-map */
4060 rip_route_map_init ();
4061 rip_offset_init ();
4062
4063 route_map_add_hook (rip_routemap_update);
4064 route_map_delete_hook (rip_routemap_update);
4065
4066 if_rmap_init (RIP_NODE);
4067 if_rmap_hook_add (rip_if_rmap_update);
4068 if_rmap_hook_delete (rip_if_rmap_update);
4069
paul718e3742002-12-13 20:15:29 +00004070 /* Distance control. */
4071 rip_distance_table = route_table_init ();
4072}