blob: 2156ce33b114e0f465d8c432304660bc1304c09b [file] [log] [blame]
paul718e3742002-12-13 20:15:29 +00001/*
2 * OSPF Sending and Receiving OSPF Packets.
3 * Copyright (C) 1999, 2000 Toshiaki Takada
4 *
5 * This file is part of GNU Zebra.
6 *
7 * GNU Zebra is free software; you can redistribute it and/or modify it
8 * under the terms of the GNU General Public License as published by the
9 * Free Software Foundation; either version 2, or (at your option) any
10 * later version.
11 *
12 * GNU Zebra is distributed in the hope that it will be useful, but
13 * WITHOUT ANY WARRANTY; without even the implied warranty of
14 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
15 * General Public License for more details.
16 *
17 * You should have received a copy of the GNU General Public License
18 * along with GNU Zebra; see the file COPYING. If not, write to the Free
19 * Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
20 * 02111-1307, USA.
21 */
22
23#include <zebra.h>
24
25#include "thread.h"
26#include "memory.h"
27#include "linklist.h"
28#include "prefix.h"
29#include "if.h"
30#include "table.h"
31#include "sockunion.h"
32#include "stream.h"
33#include "log.h"
34#include "md5-gnu.h"
35
36#include "ospfd/ospfd.h"
37#include "ospfd/ospf_network.h"
38#include "ospfd/ospf_interface.h"
39#include "ospfd/ospf_ism.h"
40#include "ospfd/ospf_asbr.h"
41#include "ospfd/ospf_lsa.h"
42#include "ospfd/ospf_lsdb.h"
43#include "ospfd/ospf_neighbor.h"
44#include "ospfd/ospf_nsm.h"
45#include "ospfd/ospf_packet.h"
46#include "ospfd/ospf_spf.h"
47#include "ospfd/ospf_flood.h"
48#include "ospfd/ospf_dump.h"
49
50static void ospf_ls_ack_send_list (struct ospf_interface *, list,
51 struct in_addr);
52
53/* Packet Type String. */
54char *ospf_packet_type_str[] =
55{
56 "unknown",
57 "Hello",
58 "Database Description",
59 "Link State Request",
60 "Link State Update",
61 "Link State Acknowledgment",
62};
63
64extern int in_cksum (void *ptr, int nbytes);
65
66/* OSPF authentication checking function */
67int
68ospf_auth_type (struct ospf_interface *oi)
69{
70 int auth_type;
71
72 if (OSPF_IF_PARAM (oi, auth_type) == OSPF_AUTH_NOTSET)
73 auth_type = oi->area->auth_type;
74 else
75 auth_type = OSPF_IF_PARAM (oi, auth_type);
76
77 /* Handle case where MD5 key list is not configured aka Cisco */
78 if (auth_type == OSPF_AUTH_CRYPTOGRAPHIC &&
79 list_isempty (OSPF_IF_PARAM (oi, auth_crypt)))
80 return OSPF_AUTH_NULL;
81
82 return auth_type;
83
84}
85
86/* forward output pointer. */
87void
88ospf_output_forward (struct stream *s, int size)
89{
90 s->putp += size;
91}
92
93struct ospf_packet *
94ospf_packet_new (size_t size)
95{
96 struct ospf_packet *new;
97
98 new = XCALLOC (MTYPE_OSPF_PACKET, sizeof (struct ospf_packet));
99 new->s = stream_new (size);
100
101 return new;
102}
103
104void
105ospf_packet_free (struct ospf_packet *op)
106{
107 if (op->s)
108 stream_free (op->s);
109
110 XFREE (MTYPE_OSPF_PACKET, op);
111
112 op = NULL;
113}
114
115struct ospf_fifo *
116ospf_fifo_new ()
117{
118 struct ospf_fifo *new;
119
120 new = XCALLOC (MTYPE_OSPF_FIFO, sizeof (struct ospf_fifo));
121 return new;
122}
123
124/* Add new packet to fifo. */
125void
126ospf_fifo_push (struct ospf_fifo *fifo, struct ospf_packet *op)
127{
128 if (fifo->tail)
129 fifo->tail->next = op;
130 else
131 fifo->head = op;
132
133 fifo->tail = op;
134
135 fifo->count++;
136}
137
138/* Delete first packet from fifo. */
139struct ospf_packet *
140ospf_fifo_pop (struct ospf_fifo *fifo)
141{
142 struct ospf_packet *op;
143
144 op = fifo->head;
145
146 if (op)
147 {
148 fifo->head = op->next;
149
150 if (fifo->head == NULL)
151 fifo->tail = NULL;
152
153 fifo->count--;
154 }
155
156 return op;
157}
158
159/* Return first fifo entry. */
160struct ospf_packet *
161ospf_fifo_head (struct ospf_fifo *fifo)
162{
163 return fifo->head;
164}
165
166/* Flush ospf packet fifo. */
167void
168ospf_fifo_flush (struct ospf_fifo *fifo)
169{
170 struct ospf_packet *op;
171 struct ospf_packet *next;
172
173 for (op = fifo->head; op; op = next)
174 {
175 next = op->next;
176 ospf_packet_free (op);
177 }
178 fifo->head = fifo->tail = NULL;
179 fifo->count = 0;
180}
181
182/* Free ospf packet fifo. */
183void
184ospf_fifo_free (struct ospf_fifo *fifo)
185{
186 ospf_fifo_flush (fifo);
187
188 XFREE (MTYPE_OSPF_FIFO, fifo);
189}
190
191void
192ospf_packet_add (struct ospf_interface *oi, struct ospf_packet *op)
193{
194 /* Add packet to end of queue. */
195 ospf_fifo_push (oi->obuf, op);
196
197 /* Debug of packet fifo*/
198 /* ospf_fifo_debug (oi->obuf); */
199}
200
201void
202ospf_packet_delete (struct ospf_interface *oi)
203{
204 struct ospf_packet *op;
205
206 op = ospf_fifo_pop (oi->obuf);
207
208 if (op)
209 ospf_packet_free (op);
210}
211
212struct stream *
213ospf_stream_copy (struct stream *new, struct stream *s)
214{
215 new->endp = s->endp;
216 new->putp = s->putp;
217 new->getp = s->getp;
218
219 memcpy (new->data, s->data, stream_get_endp (s));
220
221 return new;
222}
223
224struct ospf_packet *
225ospf_packet_dup (struct ospf_packet *op)
226{
227 struct ospf_packet *new;
228
229 new = ospf_packet_new (op->length);
230 ospf_stream_copy (new->s, op->s);
231
232 new->dst = op->dst;
233 new->length = op->length;
234
235 return new;
236}
237
238int
239ospf_packet_max (struct ospf_interface *oi)
240{
241 int max;
242
243 if ( ospf_auth_type (oi) == OSPF_AUTH_CRYPTOGRAPHIC)
244 max = oi->ifp->mtu - OSPF_AUTH_MD5_SIZE - 88;
245 else
246 max = oi->ifp->mtu - 88;
247
248 return max;
249}
250
251
252int
253ospf_check_md5_digest (struct ospf_interface *oi, struct stream *s,
254 u_int16_t length)
255{
256 void *ibuf;
257 struct md5_ctx ctx;
258 unsigned char digest[OSPF_AUTH_MD5_SIZE];
259 unsigned char *pdigest;
260 struct crypt_key *ck;
261 struct ospf_header *ospfh;
262 struct ospf_neighbor *nbr;
263
264
265 ibuf = STREAM_PNT (s);
266 ospfh = (struct ospf_header *) ibuf;
267
268 /* Get pointer to the end of the packet. */
269 pdigest = ibuf + length;
270
271 /* Get secret key. */
272 ck = ospf_crypt_key_lookup (OSPF_IF_PARAM (oi, auth_crypt),
273 ospfh->u.crypt.key_id);
274 if (ck == NULL)
275 {
276 zlog_warn ("interface %s: ospf_check_md5 no key %d",
277 IF_NAME (oi), ospfh->u.crypt.key_id);
278 return 0;
279 }
280
281 /* check crypto seqnum. */
282 nbr = ospf_nbr_lookup_by_routerid (oi->nbrs, &ospfh->router_id);
283
284 if (nbr && ntohl(nbr->crypt_seqnum) > ntohl(ospfh->u.crypt.crypt_seqnum))
285 {
286 zlog_warn ("interface %s: ospf_check_md5 bad sequence %d (expect %d)",
287 IF_NAME (oi),
288 ntohl(ospfh->u.crypt.crypt_seqnum),
289 ntohl(nbr->crypt_seqnum));
290 return 0;
291 }
292
293 /* Generate a digest for the ospf packet - their digest + our digest. */
294 md5_init_ctx (&ctx);
295 md5_process_bytes (ibuf, length, &ctx);
296 md5_process_bytes (ck->auth_key, OSPF_AUTH_MD5_SIZE, &ctx);
297 md5_finish_ctx (&ctx, digest);
298
299 /* compare the two */
300 if (memcmp (pdigest, digest, OSPF_AUTH_MD5_SIZE))
301 {
302 zlog_warn ("interface %s: ospf_check_md5 checksum mismatch",
303 IF_NAME (oi));
304 return 0;
305 }
306
307 /* save neighbor's crypt_seqnum */
308 if (nbr)
309 nbr->crypt_seqnum = ospfh->u.crypt.crypt_seqnum;
310 return 1;
311}
312
313/* This function is called from ospf_write(), it will detect the
314 authentication scheme and if it is MD5, it will change the sequence
315 and update the MD5 digest. */
316int
317ospf_make_md5_digest (struct ospf_interface *oi, struct ospf_packet *op)
318{
319 struct ospf_header *ospfh;
320 unsigned char digest[OSPF_AUTH_MD5_SIZE];
321 struct md5_ctx ctx;
322 void *ibuf;
323 unsigned long oldputp;
324 struct crypt_key *ck;
325 char *auth_key;
326
327 ibuf = STREAM_DATA (op->s);
328 ospfh = (struct ospf_header *) ibuf;
329
330 if (ntohs (ospfh->auth_type) != OSPF_AUTH_CRYPTOGRAPHIC)
331 return 0;
332
333 /* We do this here so when we dup a packet, we don't have to
334 waste CPU rewriting other headers. */
335 ospfh->u.crypt.crypt_seqnum = htonl (oi->crypt_seqnum++);
336
337 /* Get MD5 Authentication key from auth_key list. */
338 if (list_isempty (OSPF_IF_PARAM (oi, auth_crypt)))
339 auth_key = "";
340 else
341 {
342 ck = getdata (OSPF_IF_PARAM (oi, auth_crypt)->tail);
343 auth_key = ck->auth_key;
344 }
345
346 /* Generate a digest for the entire packet + our secret key. */
347 md5_init_ctx (&ctx);
348 md5_process_bytes (ibuf, ntohs (ospfh->length), &ctx);
349 md5_process_bytes (auth_key, OSPF_AUTH_MD5_SIZE, &ctx);
350 md5_finish_ctx (&ctx, digest);
351
352 /* Append md5 digest to the end of the stream. */
353 oldputp = stream_get_putp (op->s);
354 stream_set_putp (op->s, ntohs (ospfh->length));
355 stream_put (op->s, digest, OSPF_AUTH_MD5_SIZE);
356 stream_set_putp (op->s, oldputp);
357
358 /* We do *NOT* increment the OSPF header length. */
359 op->length += OSPF_AUTH_MD5_SIZE;
360
361 return OSPF_AUTH_MD5_SIZE;
362}
363
364
365int
366ospf_ls_req_timer (struct thread *thread)
367{
368 struct ospf_neighbor *nbr;
369
370 nbr = THREAD_ARG (thread);
371 nbr->t_ls_req = NULL;
372
373 /* Send Link State Request. */
374 if (ospf_ls_request_count (nbr))
375 ospf_ls_req_send (nbr);
376
377 /* Set Link State Request retransmission timer. */
378 OSPF_NSM_TIMER_ON (nbr->t_ls_req, ospf_ls_req_timer, nbr->v_ls_req);
379
380 return 0;
381}
382
383void
384ospf_ls_req_event (struct ospf_neighbor *nbr)
385{
386 if (nbr->t_ls_req)
387 {
388 thread_cancel (nbr->t_ls_req);
389 nbr->t_ls_req = NULL;
390 }
391 nbr->t_ls_req = thread_add_event (master, ospf_ls_req_timer, nbr, 0);
392}
393
394/* Cyclic timer function. Fist registered in ospf_nbr_new () in
395 ospf_neighbor.c */
396int
397ospf_ls_upd_timer (struct thread *thread)
398{
399 struct ospf_neighbor *nbr;
400
401 nbr = THREAD_ARG (thread);
402 nbr->t_ls_upd = NULL;
403
404 /* Send Link State Update. */
405 if (ospf_ls_retransmit_count (nbr) > 0)
406 {
407 list update;
408 struct ospf_lsdb *lsdb;
409 int i;
410 struct timeval now;
411 int retransmit_interval;
412
413 gettimeofday (&now, NULL);
414 retransmit_interval = OSPF_IF_PARAM (nbr->oi, retransmit_interval);
415
416 lsdb = &nbr->ls_rxmt;
417 update = list_new ();
418
419 for (i = OSPF_MIN_LSA; i < OSPF_MAX_LSA; i++)
420 {
421 struct route_table *table = lsdb->type[i].db;
422 struct route_node *rn;
423
424 for (rn = route_top (table); rn; rn = route_next (rn))
425 {
426 struct ospf_lsa *lsa;
427
428 if ((lsa = rn->info) != NULL)
429 /* Don't retransmit an LSA if we received it within
430 the last RxmtInterval seconds - this is to allow the
431 neighbour a chance to acknowledge the LSA as it may
432 have ben just received before the retransmit timer
433 fired. This is a small tweak to what is in the RFC,
434 but it will cut out out a lot of retransmit traffic
435 - MAG */
436 if (tv_cmp (tv_sub (now, lsa->tv_recv),
437 int2tv (retransmit_interval)) >= 0)
438 listnode_add (update, rn->info);
439 }
440 }
441
442 if (listcount (update) > 0)
443 ospf_ls_upd_send (nbr, update, OSPF_SEND_PACKET_DIRECT);
444 list_delete (update);
445 }
446
447 /* Set LS Update retransmission timer. */
448 OSPF_NSM_TIMER_ON (nbr->t_ls_upd, ospf_ls_upd_timer, nbr->v_ls_upd);
449
450 return 0;
451}
452
453int
454ospf_ls_ack_timer (struct thread *thread)
455{
456 struct ospf_interface *oi;
457
458 oi = THREAD_ARG (thread);
459 oi->t_ls_ack = NULL;
460
461 /* Send Link State Acknowledgment. */
462 if (listcount (oi->ls_ack) > 0)
463 ospf_ls_ack_send_delayed (oi);
464
465 /* Set LS Ack timer. */
466 OSPF_ISM_TIMER_ON (oi->t_ls_ack, ospf_ls_ack_timer, oi->v_ls_ack);
467
468 return 0;
469}
470
471int
472ospf_write (struct thread *thread)
473{
474 struct ospf_interface *oi;
475 struct ospf_packet *op;
476 struct sockaddr_in sa_dst;
477 u_char type;
478 int ret;
479 int flags = 0;
480 struct ip iph;
481 struct msghdr msg;
482 struct iovec iov[2];
483 struct ospf *top;
484 listnode node;
485
486 top = THREAD_ARG (thread);
487 top->t_write = NULL;
488
489 node = listhead (top->oi_write_q);
490 assert (node);
491 oi = getdata (node);
492 assert (oi);
493
494 /* Get one packet from queue. */
495 op = ospf_fifo_head (oi->obuf);
496 assert (op);
497 assert (op->length >= OSPF_HEADER_SIZE);
498
499 if (op->dst.s_addr == htonl (OSPF_ALLSPFROUTERS) ||
500 op->dst.s_addr == htonl (OSPF_ALLDROUTERS))
501 ospf_if_ipmulticast (top, oi->address, oi->ifp->ifindex);
502
503 /* Rewrite the md5 signature & update the seq */
504 ospf_make_md5_digest (oi, op);
505
506 memset (&sa_dst, 0, sizeof (sa_dst));
507 sa_dst.sin_family = AF_INET;
508#ifdef HAVE_SIN_LEN
509 sa_dst.sin_len = sizeof(sa_dst);
510#endif /* HAVE_SIN_LEN */
511 sa_dst.sin_addr = op->dst;
512 sa_dst.sin_port = htons (0);
513
514 /* Set DONTROUTE flag if dst is unicast. */
515 if (oi->type != OSPF_IFTYPE_VIRTUALLINK)
516 if (!IN_MULTICAST (htonl (op->dst.s_addr)))
517 flags = MSG_DONTROUTE;
518
519 iph.ip_hl = sizeof (struct ip) >> 2;
520 iph.ip_v = IPVERSION;
521 iph.ip_tos = 0;
522#if defined(__NetBSD__) || defined(__FreeBSD__)
523 iph.ip_len = iph.ip_hl*4 + op->length;
524#else
525 iph.ip_len = htons (iph.ip_hl*4 + op->length);
526#endif
527 iph.ip_id = 0;
528 iph.ip_off = 0;
529 if (oi->type == OSPF_IFTYPE_VIRTUALLINK)
530 iph.ip_ttl = OSPF_VL_IP_TTL;
531 else
532 iph.ip_ttl = OSPF_IP_TTL;
533 iph.ip_p = IPPROTO_OSPFIGP;
534 iph.ip_sum = 0;
535 iph.ip_src.s_addr = oi->address->u.prefix4.s_addr;
536 iph.ip_dst.s_addr = op->dst.s_addr;
537
538 memset (&msg, 0, sizeof (msg));
539 msg.msg_name = &sa_dst;
540 msg.msg_namelen = sizeof (sa_dst);
541 msg.msg_iov = iov;
542 msg.msg_iovlen = 2;
543 iov[0].iov_base = (char*)&iph;
544 iov[0].iov_len = iph.ip_hl*4;
545 iov[1].iov_base = STREAM_DATA (op->s);
546 iov[1].iov_len = op->length;
547
548 ret = sendmsg (top->fd, &msg, flags);
549
550 if (ret < 0)
551 zlog_warn ("*** sendmsg in ospf_write failed with %s", strerror (errno));
552
553 /* Retrieve OSPF packet type. */
554 stream_set_getp (op->s, 1);
555 type = stream_getc (op->s);
556
557 /* Show debug sending packet. */
558 if (IS_DEBUG_OSPF_PACKET (type - 1, SEND))
559 {
560 if (IS_DEBUG_OSPF_PACKET (type - 1, DETAIL))
561 {
562 zlog_info ("-----------------------------------------------------");
563 stream_set_getp (op->s, 0);
564 ospf_packet_dump (op->s);
565 }
566
567 zlog_info ("%s sent to [%s] via [%s].",
568 ospf_packet_type_str[type], inet_ntoa (op->dst),
569 IF_NAME (oi));
570
571 if (IS_DEBUG_OSPF_PACKET (type - 1, DETAIL))
572 zlog_info ("-----------------------------------------------------");
573 }
574
575 /* Now delete packet from queue. */
576 ospf_packet_delete (oi);
577
578 if (ospf_fifo_head (oi->obuf) == NULL)
579 {
580 oi->on_write_q = 0;
581 list_delete_node (top->oi_write_q, node);
582 }
583
584 /* If packets still remain in queue, call write thread. */
585 if (!list_isempty (top->oi_write_q))
586 ospf_top->t_write =
587 thread_add_write (master, ospf_write, top, top->fd);
588
589 return 0;
590}
591
592/* OSPF Hello message read -- RFC2328 Section 10.5. */
593void
594ospf_hello (struct ip *iph, struct ospf_header *ospfh,
595 struct stream * s, struct ospf_interface *oi, int size)
596{
597 struct ospf_hello *hello;
598 struct ospf_neighbor *nbr;
599 struct route_node *rn;
600 struct prefix p, key;
601 int old_state;
602
603 /* increment statistics. */
604 oi->hello_in++;
605
606 hello = (struct ospf_hello *) STREAM_PNT (s);
607
608 /* If Hello is myself, silently discard. */
609 if (IPV4_ADDR_SAME (&ospfh->router_id, &ospf_top->router_id))
610 return;
611
612 /* If incoming interface is passive one, ignore Hello. */
613 if (OSPF_IF_PARAM (oi, passive_interface) == OSPF_IF_PASSIVE)
614 return;
615
616 /* get neighbor prefix. */
617 p.family = AF_INET;
618 p.prefixlen = ip_masklen (hello->network_mask);
619 p.u.prefix4 = iph->ip_src;
620
621 /* Compare network mask. */
622 /* Checking is ignored for Point-to-Point and Virtual link. */
623 if (oi->type != OSPF_IFTYPE_POINTOPOINT
624 && oi->type != OSPF_IFTYPE_VIRTUALLINK)
625 if (oi->address->prefixlen != p.prefixlen)
626 {
627 zlog_warn ("Packet %s [Hello:RECV]: NetworkMask mismatch.",
628 inet_ntoa (ospfh->router_id));
629 return;
630 }
631
632 /* Compare Hello Interval. */
633 if (OSPF_IF_PARAM (oi, v_hello) != ntohs (hello->hello_interval))
634 {
635 zlog_warn ("Packet %s [Hello:RECV]: HelloInterval mismatch.",
636 inet_ntoa (ospfh->router_id));
637 return;
638 }
639
640 /* Compare Router Dead Interval. */
641 if (OSPF_IF_PARAM (oi, v_wait) != ntohl (hello->dead_interval))
642 {
643 zlog_warn ("Packet %s [Hello:RECV]: RouterDeadInterval mismatch.",
644 inet_ntoa (ospfh->router_id));
645 return;
646 }
647
648 if (IS_DEBUG_OSPF_EVENT)
649 zlog_info ("Packet %s [Hello:RECV]: Options %s",
650 inet_ntoa (ospfh->router_id),
651 ospf_options_dump (hello->options));
652
653 /* Compare options. */
654#define REJECT_IF_TBIT_ON 1 /* XXX */
655#ifdef REJECT_IF_TBIT_ON
656 if (CHECK_FLAG (hello->options, OSPF_OPTION_T))
657 {
658 /*
659 * This router does not support non-zero TOS.
660 * Drop this Hello packet not to establish neighbor relationship.
661 */
662 zlog_warn ("Packet %s [Hello:RECV]: T-bit on, drop it.",
663 inet_ntoa (ospfh->router_id));
664 return;
665 }
666#endif /* REJECT_IF_TBIT_ON */
667
668#ifdef HAVE_OPAQUE_LSA
669 if (CHECK_FLAG (ospf_top->config, OSPF_OPAQUE_CAPABLE)
670 && CHECK_FLAG (hello->options, OSPF_OPTION_O))
671 {
672 /*
673 * This router does know the correct usage of O-bit
674 * the bit should be set in DD packet only.
675 */
676 zlog_warn ("Packet %s [Hello:RECV]: O-bit abuse?",
677 inet_ntoa (ospfh->router_id));
678#ifdef STRICT_OBIT_USAGE_CHECK
679 return; /* Reject this packet. */
680#else /* STRICT_OBIT_USAGE_CHECK */
681 UNSET_FLAG (hello->options, OSPF_OPTION_O); /* Ignore O-bit. */
682#endif /* STRICT_OBIT_USAGE_CHECK */
683 }
684#endif /* HAVE_OPAQUE_LSA */
685
686 /* new for NSSA is to ensure that NP is on and E is off */
687
688#ifdef HAVE_NSSA
689 if (oi->area->external_routing == OSPF_AREA_NSSA)
690 {
691 if (! (CHECK_FLAG (OPTIONS (oi), OSPF_OPTION_NP)
692 && CHECK_FLAG (hello->options, OSPF_OPTION_NP)
693 && ! CHECK_FLAG (OPTIONS (oi), OSPF_OPTION_E)
694 && ! CHECK_FLAG (hello->options, OSPF_OPTION_E)))
695 {
696 zlog_warn ("NSSA-Packet-%s[Hello:RECV]: my options: %x, his options %x", inet_ntoa (ospfh->router_id), OPTIONS (oi), hello->options);
697 return;
698 }
699 if (IS_DEBUG_OSPF_NSSA)
700 zlog_info ("NSSA-Hello:RECV:Packet from %s:", inet_ntoa(ospfh->router_id));
701 }
702 else
703#endif /* HAVE_NSSA */
704 /* The setting of the E-bit found in the Hello Packet's Options
705 field must match this area's ExternalRoutingCapability A
706 mismatch causes processing to stop and the packet to be
707 dropped. The setting of the rest of the bits in the Hello
708 Packet's Options field should be ignored. */
709 if (CHECK_FLAG (OPTIONS (oi), OSPF_OPTION_E) !=
710 CHECK_FLAG (hello->options, OSPF_OPTION_E))
711 {
712 zlog_warn ("Packet[Hello:RECV]: my options: %x, his options %x",
713 OPTIONS (oi), hello->options);
714 return;
715 }
716
717
718 /* Get neighbor information from table. */
719 key.family = AF_INET;
720 key.prefixlen = IPV4_MAX_BITLEN;
721 key.u.prefix4 = iph->ip_src;
722
723 rn = route_node_get (oi->nbrs, &key);
724 if (rn->info)
725 {
726 route_unlock_node (rn);
727 nbr = rn->info;
728
729 if (oi->type == OSPF_IFTYPE_NBMA && nbr->state == NSM_Attempt)
730 {
731 nbr->src = iph->ip_src;
732 nbr->address = p;
733 }
734 }
735 else
736 {
737 /* Create new OSPF Neighbor structure. */
738 nbr = ospf_nbr_new (oi);
739 nbr->state = NSM_Down;
740 nbr->src = iph->ip_src;
741 nbr->address = p;
742
743 rn->info = nbr;
744
745 nbr->nbr_nbma = NULL;
746
747 if (oi->type == OSPF_IFTYPE_NBMA)
748 {
749 struct ospf_nbr_nbma *nbr_nbma;
750 listnode node;
751
752 for (node = listhead (oi->nbr_nbma); node; nextnode (node))
753 {
754 nbr_nbma = getdata (node);
755 assert (nbr_nbma);
756
757 if (IPV4_ADDR_SAME(&nbr_nbma->addr, &iph->ip_src))
758 {
759 nbr_nbma->nbr = nbr;
760 nbr->nbr_nbma = nbr_nbma;
761
762 if (nbr_nbma->t_poll)
763 OSPF_POLL_TIMER_OFF (nbr_nbma->t_poll);
764
765 nbr->state_change = nbr_nbma->state_change + 1;
766 }
767 }
768 }
769
770 /* New nbr, save the crypto sequence number if necessary */
771 if (ntohs (ospfh->auth_type) == OSPF_AUTH_CRYPTOGRAPHIC)
772 nbr->crypt_seqnum = ospfh->u.crypt.crypt_seqnum;
773
774 if (IS_DEBUG_OSPF_EVENT)
775 zlog_info ("NSM[%s:%s]: start", IF_NAME (nbr->oi),
776 inet_ntoa (nbr->router_id));
777 }
778
779 nbr->router_id = ospfh->router_id;
780
781 old_state = nbr->state;
782
783 /* Add event to thread. */
784 OSPF_NSM_EVENT_EXECUTE (nbr, NSM_HelloReceived);
785
786 /* RFC2328 Section 9.5.1
787 If the router is not eligible to become Designated Router,
788 (snip) It must also send an Hello Packet in reply to an
789 Hello Packet received from any eligible neighbor (other than
790 the current Designated Router and Backup Designated Router). */
791 if (oi->type == OSPF_IFTYPE_NBMA)
792 if (PRIORITY(oi) == 0 && hello->priority > 0
793 && IPV4_ADDR_CMP(&DR(oi), &iph->ip_src)
794 && IPV4_ADDR_CMP(&BDR(oi), &iph->ip_src))
795 OSPF_NSM_TIMER_ON (nbr->t_hello_reply, ospf_hello_reply_timer,
796 OSPF_HELLO_REPLY_DELAY);
797
798 /* on NBMA network type, it happens to receive bidirectional Hello packet
799 without advance 1-Way Received event.
800 To avoid incorrect DR-seletion, raise 1-Way Received event.*/
801 if (oi->type == OSPF_IFTYPE_NBMA &&
802 (old_state == NSM_Down || old_state == NSM_Attempt))
803 {
804 OSPF_NSM_EVENT_EXECUTE (nbr, NSM_OneWayReceived);
805 nbr->priority = hello->priority;
806 nbr->d_router = hello->d_router;
807 nbr->bd_router = hello->bd_router;
808 return;
809 }
810
811 if (ospf_nbr_bidirectional (&ospf_top->router_id, hello->neighbors,
812 size - OSPF_HELLO_MIN_SIZE))
813 {
814 OSPF_NSM_EVENT_EXECUTE (nbr, NSM_TwoWayReceived);
815 nbr->options |= hello->options;
816 }
817 else
818 {
819 OSPF_NSM_EVENT_EXECUTE (nbr, NSM_OneWayReceived);
820 /* Set neighbor information. */
821 nbr->priority = hello->priority;
822 nbr->d_router = hello->d_router;
823 nbr->bd_router = hello->bd_router;
824 return;
825 }
826
827 /* If neighbor itself declares DR and no BDR exists,
828 cause event BackupSeen */
829 if (IPV4_ADDR_SAME (&nbr->address.u.prefix4, &hello->d_router))
830 if (hello->bd_router.s_addr == 0 && oi->state == ISM_Waiting)
831 OSPF_ISM_EVENT_SCHEDULE (oi, ISM_BackupSeen);
832
833 /* neighbor itself declares BDR. */
834 if (oi->state == ISM_Waiting &&
835 IPV4_ADDR_SAME (&nbr->address.u.prefix4, &hello->bd_router))
836 OSPF_ISM_EVENT_SCHEDULE (oi, ISM_BackupSeen);
837
838 /* had not previously. */
839 if ((IPV4_ADDR_SAME (&nbr->address.u.prefix4, &hello->d_router) &&
840 IPV4_ADDR_CMP (&nbr->address.u.prefix4, &nbr->d_router)) ||
841 (IPV4_ADDR_CMP (&nbr->address.u.prefix4, &hello->d_router) &&
842 IPV4_ADDR_SAME (&nbr->address.u.prefix4, &nbr->d_router)))
843 OSPF_ISM_EVENT_SCHEDULE (oi, ISM_NeighborChange);
844
845 /* had not previously. */
846 if ((IPV4_ADDR_SAME (&nbr->address.u.prefix4, &hello->bd_router) &&
847 IPV4_ADDR_CMP (&nbr->address.u.prefix4, &nbr->bd_router)) ||
848 (IPV4_ADDR_CMP (&nbr->address.u.prefix4, &hello->bd_router) &&
849 IPV4_ADDR_SAME (&nbr->address.u.prefix4, &nbr->bd_router)))
850 OSPF_ISM_EVENT_SCHEDULE (oi, ISM_NeighborChange);
851
852 /* Neighbor priority check. */
853 if (nbr->priority >= 0 && nbr->priority != hello->priority)
854 OSPF_ISM_EVENT_SCHEDULE (oi, ISM_NeighborChange);
855
856 /* Set neighbor information. */
857 nbr->priority = hello->priority;
858 nbr->d_router = hello->d_router;
859 nbr->bd_router = hello->bd_router;
860}
861
862/* Save DD flags/options/Seqnum received. */
863void
864ospf_db_desc_save_current (struct ospf_neighbor *nbr,
865 struct ospf_db_desc *dd)
866{
867 nbr->last_recv.flags = dd->flags;
868 nbr->last_recv.options = dd->options;
869 nbr->last_recv.dd_seqnum = ntohl (dd->dd_seqnum);
870}
871
872/* Process rest of DD packet. */
873static void
874ospf_db_desc_proc (struct stream *s, struct ospf_interface *oi,
875 struct ospf_neighbor *nbr, struct ospf_db_desc *dd,
876 u_int16_t size)
877{
878 struct ospf_lsa *new, *find;
879 struct lsa_header *lsah;
880
881 stream_forward (s, OSPF_DB_DESC_MIN_SIZE);
882 for (size -= OSPF_DB_DESC_MIN_SIZE;
883 size >= OSPF_LSA_HEADER_SIZE; size -= OSPF_LSA_HEADER_SIZE)
884 {
885 lsah = (struct lsa_header *) STREAM_PNT (s);
886 stream_forward (s, OSPF_LSA_HEADER_SIZE);
887
888 /* Unknown LS type. */
889 if (lsah->type < OSPF_MIN_LSA || lsah->type >= OSPF_MAX_LSA)
890 {
891 zlog_warn ("Pakcet [DD:RECV]: Unknown LS type %d.", lsah->type);
892 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_SeqNumberMismatch);
893 return;
894 }
895
896#ifdef HAVE_OPAQUE_LSA
897 if (IS_OPAQUE_LSA (lsah->type)
898 && ! CHECK_FLAG (nbr->options, OSPF_OPTION_O))
899 {
900 zlog_warn ("LSA[Type%d:%s]: Opaque capability mismatch?", lsah->type, inet_ntoa (lsah->id));
901 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_SeqNumberMismatch);
902 return;
903 }
904#endif /* HAVE_OPAQUE_LSA */
905
906 switch (lsah->type)
907 {
908 case OSPF_AS_EXTERNAL_LSA:
909#ifdef HAVE_OPAQUE_LSA
910 case OSPF_OPAQUE_AS_LSA:
911#endif /* HAVE_OPAQUE_LSA */
912#ifdef HAVE_NSSA
913 /* Check for stub area. Reject if AS-External from stub but
914 allow if from NSSA. */
915 if (oi->area->external_routing == OSPF_AREA_STUB)
916#else /* ! HAVE_NSSA */
917 if (oi->area->external_routing != OSPF_AREA_DEFAULT)
918#endif /* HAVE_NSSA */
919 {
920 zlog_warn ("Packet [DD:RECV]: LSA[Type%d:%s] from %s area.",
921 lsah->type, inet_ntoa (lsah->id),
922 (oi->area->external_routing == OSPF_AREA_STUB) ?\
923 "STUB" : "NSSA");
924 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_SeqNumberMismatch);
925 return;
926 }
927 break;
928 default:
929 break;
930 }
931
932 /* Create LS-request object. */
933 new = ospf_ls_request_new (lsah);
934
935 /* Lookup received LSA, then add LS request list. */
936 find = ospf_lsa_lookup_by_header (oi->area, lsah);
937 if (!find || ospf_lsa_more_recent (find, new) < 0)
938 {
939 ospf_ls_request_add (nbr, new);
940 ospf_lsa_discard (new);
941 }
942 else
943 {
944 /* Received LSA is not recent. */
945 if (IS_DEBUG_OSPF_EVENT)
946 zlog_info ("Packet [DD:RECV]: LSA received Type %d, "
947 "ID %s is not recent.", lsah->type, inet_ntoa (lsah->id));
948 ospf_lsa_discard (new);
949 continue;
950 }
951 }
952
953 /* Master */
954 if (IS_SET_DD_MS (nbr->dd_flags))
955 {
956 nbr->dd_seqnum++;
957 /* Entire DD packet sent. */
958 if (!IS_SET_DD_M (dd->flags) && !IS_SET_DD_M (nbr->dd_flags))
959 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_ExchangeDone);
960 else
961 /* Send new DD packet. */
962 ospf_db_desc_send (nbr);
963 }
964 /* Slave */
965 else
966 {
967 nbr->dd_seqnum = ntohl (dd->dd_seqnum);
968
969 /* When master's more flags is not set. */
970 if (!IS_SET_DD_M (dd->flags) && ospf_db_summary_isempty (nbr))
971 {
972 nbr->dd_flags &= ~(OSPF_DD_FLAG_M);
973 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_ExchangeDone);
974 }
975
976 /* Send DD pakcet in reply. */
977 ospf_db_desc_send (nbr);
978 }
979
980 /* Save received neighbor values from DD. */
981 ospf_db_desc_save_current (nbr, dd);
982}
983
984int
985ospf_db_desc_is_dup (struct ospf_db_desc *dd, struct ospf_neighbor *nbr)
986{
987 /* Is DD duplicated? */
988 if (dd->options == nbr->last_recv.options &&
989 dd->flags == nbr->last_recv.flags &&
990 dd->dd_seqnum == htonl (nbr->last_recv.dd_seqnum))
991 return 1;
992
993 return 0;
994}
995
996/* OSPF Database Description message read -- RFC2328 Section 10.6. */
997void
998ospf_db_desc (struct ip *iph, struct ospf_header *ospfh,
999 struct stream *s, struct ospf_interface *oi, u_int16_t size)
1000{
1001 struct ospf_db_desc *dd;
1002 struct ospf_neighbor *nbr;
1003
1004 /* Increment statistics. */
1005 oi->db_desc_in++;
1006
1007 dd = (struct ospf_db_desc *) STREAM_PNT (s);
1008
1009 nbr = ospf_nbr_lookup_by_addr (oi->nbrs, &iph->ip_src);
1010 if (nbr == NULL)
1011 {
1012 zlog_warn ("Packet[DD]: Unknown Neighbor %s",
1013 inet_ntoa (ospfh->router_id));
1014 return;
1015 }
1016
1017 /* Check MTU. */
1018 if (ntohs (dd->mtu) > oi->ifp->mtu)
1019 {
1020 zlog_warn ("Packet[DD]: MTU is larger than [%s]'s MTU", IF_NAME (oi));
1021 return;
1022 }
1023
1024#ifdef REJECT_IF_TBIT_ON
1025 if (CHECK_FLAG (dd->options, OSPF_OPTION_T))
1026 {
1027 /*
1028 * In Hello protocol, optional capability must have checked
1029 * to prevent this T-bit enabled router be my neighbor.
1030 */
1031 zlog_warn ("Packet[DD]: Neighbor %s: T-bit on?", inet_ntoa (nbr->router_id));
1032 return;
1033 }
1034#endif /* REJECT_IF_TBIT_ON */
1035
1036#ifdef HAVE_OPAQUE_LSA
1037 if (CHECK_FLAG (dd->options, OSPF_OPTION_O)
1038 && !CHECK_FLAG (ospf_top->config, OSPF_OPAQUE_CAPABLE))
1039 {
1040 /*
1041 * This node is not configured to handle O-bit, for now.
1042 * Clear it to ignore unsupported capability proposed by neighbor.
1043 */
1044 UNSET_FLAG (dd->options, OSPF_OPTION_O);
1045 }
1046#endif /* HAVE_OPAQUE_LSA */
1047
1048 /* Process DD packet by neighbor status. */
1049 switch (nbr->state)
1050 {
1051 case NSM_Down:
1052 case NSM_Attempt:
1053 case NSM_TwoWay:
1054 zlog_warn ("Packet[DD]: Neighbor state is %s, packet discarded.",
1055 LOOKUP (ospf_nsm_state_msg, nbr->state));
1056 break;
1057 case NSM_Init:
1058 OSPF_NSM_EVENT_EXECUTE (nbr, NSM_TwoWayReceived);
1059 /* If the new state is ExStart, the processing of the current
1060 packet should then continue in this new state by falling
1061 through to case ExStart below. */
1062 if (nbr->state != NSM_ExStart)
1063 break;
1064 case NSM_ExStart:
1065 /* Initial DBD */
1066 if ((IS_SET_DD_ALL (dd->flags) == OSPF_DD_FLAG_ALL) &&
1067 (size == OSPF_DB_DESC_MIN_SIZE))
1068 {
1069 if (IPV4_ADDR_CMP (&nbr->router_id, &ospf_top->router_id) > 0)
1070 {
1071 /* We're Slave---obey */
1072 zlog_warn ("Packet[DD]: Negotiation done (Slave).");
1073 nbr->dd_seqnum = ntohl (dd->dd_seqnum);
1074 nbr->dd_flags &= ~(OSPF_DD_FLAG_MS|OSPF_DD_FLAG_I); /* Reset I/MS */
1075 }
1076 else
1077 {
1078 /* We're Master, ignore the initial DBD from Slave */
1079 zlog_warn ("Packet[DD]: Initial DBD from Slave, ignoring.");
1080 break;
1081 }
1082 }
1083 /* Ack from the Slave */
1084 else if (!IS_SET_DD_MS (dd->flags) && !IS_SET_DD_I (dd->flags) &&
1085 ntohl (dd->dd_seqnum) == nbr->dd_seqnum &&
1086 IPV4_ADDR_CMP (&nbr->router_id, &ospf_top->router_id) < 0)
1087 {
1088 zlog_warn ("Packet[DD]: Negotiation done (Master).");
1089 nbr->dd_flags &= ~OSPF_DD_FLAG_I;
1090 }
1091 else
1092 {
1093 zlog_warn ("Packet[DD]: Negotiation fails.");
1094 break;
1095 }
1096
1097 /* This is where the real Options are saved */
1098 nbr->options = dd->options;
1099
1100#ifdef HAVE_OPAQUE_LSA
1101 if (CHECK_FLAG (ospf_top->config, OSPF_OPAQUE_CAPABLE))
1102 {
1103 if (IS_DEBUG_OSPF_EVENT)
1104 zlog_info ("Neighbor[%s] is %sOpaque-capable.",
1105 inet_ntoa (nbr->router_id),
1106 CHECK_FLAG (nbr->options, OSPF_OPTION_O) ? "" : "NOT ");
1107
1108 if (! CHECK_FLAG (nbr->options, OSPF_OPTION_O)
1109 && IPV4_ADDR_SAME (&DR (oi), &nbr->address.u.prefix4))
1110 {
1111 zlog_warn ("DR-neighbor[%s] is NOT opaque-capable; Opaque-LSAs cannot be reliably advertised in this network.", inet_ntoa (nbr->router_id));
1112 /* This situation is undesirable, but not a real error. */
1113 }
1114 }
1115#endif /* HAVE_OPAQUE_LSA */
1116
1117 OSPF_NSM_EVENT_EXECUTE (nbr, NSM_NegotiationDone);
1118
1119 /* continue processing rest of packet. */
1120 ospf_db_desc_proc (s, oi, nbr, dd, size);
1121 break;
1122 case NSM_Exchange:
1123 if (ospf_db_desc_is_dup (dd, nbr))
1124 {
1125 if (IS_SET_DD_MS (nbr->dd_flags))
1126 /* Master: discard duplicated DD packet. */
1127 zlog_warn ("Packet[DD] (Master): packet duplicated.");
1128 else
1129 /* Slave: cause to retransmit the last Database Description. */
1130 {
1131 zlog_warn ("Packet[DD] [Slave]: packet duplicated.");
1132 ospf_db_desc_resend (nbr);
1133 }
1134 break;
1135 }
1136
1137 /* Otherwise DD packet should be checked. */
1138 /* Check Master/Slave bit mismatch */
1139 if (IS_SET_DD_MS (dd->flags) != IS_SET_DD_MS (nbr->last_recv.flags))
1140 {
1141 zlog_warn ("Packet[DD]: MS-bit mismatch.");
1142 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_SeqNumberMismatch);
1143 if (IS_DEBUG_OSPF_EVENT)
1144 zlog_info ("Packet[DD]: dd->flags=%d, nbr->dd_flags=%d",
1145 dd->flags, nbr->dd_flags);
1146 break;
1147 }
1148
1149 /* Check initialize bit is set. */
1150 if (IS_SET_DD_I (dd->flags))
1151 {
1152 zlog_warn ("Packet[DD]: I-bit set.");
1153 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_SeqNumberMismatch);
1154 break;
1155 }
1156
1157 /* Check DD Options. */
1158 if (dd->options != nbr->options)
1159 {
1160#ifdef ORIGINAL_CODING
1161 /* Save the new options for debugging */
1162 nbr->options = dd->options;
1163#endif /* ORIGINAL_CODING */
1164 zlog_warn ("Packet[DD]: options mismatch.");
1165 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_SeqNumberMismatch);
1166 break;
1167 }
1168
1169 /* Check DD sequence number. */
1170 if ((IS_SET_DD_MS (nbr->dd_flags) &&
1171 ntohl (dd->dd_seqnum) != nbr->dd_seqnum) ||
1172 (!IS_SET_DD_MS (nbr->dd_flags) &&
1173 ntohl (dd->dd_seqnum) != nbr->dd_seqnum + 1))
1174 {
1175 zlog_warn ("Pakcet[DD]: sequence number mismatch.");
1176 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_SeqNumberMismatch);
1177 break;
1178 }
1179
1180 /* Continue processing rest of packet. */
1181 ospf_db_desc_proc (s, oi, nbr, dd, size);
1182 break;
1183 case NSM_Loading:
1184 case NSM_Full:
1185 if (ospf_db_desc_is_dup (dd, nbr))
1186 {
1187 if (IS_SET_DD_MS (nbr->dd_flags))
1188 {
1189 /* Master should discard duplicate DD packet. */
1190 zlog_warn ("Pakcet[DD]: duplicated, packet discarded.");
1191 break;
1192 }
1193 else
1194 {
1195 struct timeval t, now;
1196 gettimeofday (&now, NULL);
1197 t = tv_sub (now, nbr->last_send_ts);
1198 if (tv_cmp (t, int2tv (nbr->v_inactivity)) < 0)
1199 {
1200 /* In states Loading and Full the slave must resend
1201 its last Database Description packet in response to
1202 duplicate Database Description packets received
1203 from the master. For this reason the slave must
1204 wait RouterDeadInterval seconds before freeing the
1205 last Database Description packet. Reception of a
1206 Database Description packet from the master after
1207 this interval will generate a SeqNumberMismatch
1208 neighbor event. RFC2328 Section 10.8 */
1209 ospf_db_desc_resend (nbr);
1210 break;
1211 }
1212 }
1213 }
1214
1215 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_SeqNumberMismatch);
1216 break;
1217 default:
1218 zlog_warn ("Packet[DD]: NSM illegal status.");
1219 break;
1220 }
1221}
1222
1223#define OSPF_LSA_KEY_SIZE 12 /* type(4) + id(4) + ar(4) */
1224
1225/* OSPF Link State Request Read -- RFC2328 Section 10.7. */
1226void
1227ospf_ls_req (struct ip *iph, struct ospf_header *ospfh,
1228 struct stream *s, struct ospf_interface *oi, u_int16_t size)
1229{
1230 struct ospf_neighbor *nbr;
1231 u_int32_t ls_type;
1232 struct in_addr ls_id;
1233 struct in_addr adv_router;
1234 struct ospf_lsa *find;
1235 list ls_upd;
1236 int length;
1237
1238 /* Increment statistics. */
1239 oi->ls_req_in++;
1240
1241 nbr = ospf_nbr_lookup_by_addr (oi->nbrs, &iph->ip_src);
1242 if (nbr == NULL)
1243 {
1244 zlog_warn ("Link State Request: Unknown Neighbor %s.",
1245 inet_ntoa (ospfh->router_id));
1246 return;
1247 }
1248
1249 /* Neighbor State should be Exchange or later. */
1250 if (nbr->state != NSM_Exchange &&
1251 nbr->state != NSM_Loading &&
1252 nbr->state != NSM_Full)
1253 {
1254 zlog_warn ("Link State Request: Neighbor state is %s, packet discarded.",
1255 LOOKUP (ospf_nsm_state_msg, nbr->state));
1256 return;
1257 }
1258
1259 /* Send Link State Update for ALL requested LSAs. */
1260 ls_upd = list_new ();
1261 length = OSPF_HEADER_SIZE + OSPF_LS_UPD_MIN_SIZE;
1262
1263 while (size >= OSPF_LSA_KEY_SIZE)
1264 {
1265 /* Get one slice of Link State Request. */
1266 ls_type = stream_getl (s);
1267 ls_id.s_addr = stream_get_ipv4 (s);
1268 adv_router.s_addr = stream_get_ipv4 (s);
1269
1270 /* Verify LSA type. */
1271 if (ls_type < OSPF_MIN_LSA || ls_type >= OSPF_MAX_LSA)
1272 {
1273 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_BadLSReq);
1274 list_delete (ls_upd);
1275 return;
1276 }
1277
1278 /* Search proper LSA in LSDB. */
1279 find = ospf_lsa_lookup (oi->area, ls_type, ls_id, adv_router);
1280 if (find == NULL)
1281 {
1282 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_BadLSReq);
1283 list_delete (ls_upd);
1284 return;
1285 }
1286
1287 /* Packet overflows MTU size, send immediatly. */
1288 if (length + ntohs (find->data->length) > OSPF_PACKET_MAX (oi))
1289 {
1290 if (oi->type == OSPF_IFTYPE_NBMA)
1291 ospf_ls_upd_send (nbr, ls_upd, OSPF_SEND_PACKET_DIRECT);
1292 else
1293 ospf_ls_upd_send (nbr, ls_upd, OSPF_SEND_PACKET_INDIRECT);
1294
1295 /* Only remove list contents. Keep ls_upd. */
1296 list_delete_all_node (ls_upd);
1297
1298 length = OSPF_HEADER_SIZE + OSPF_LS_UPD_MIN_SIZE;
1299 }
1300
1301 /* Append LSA to update list. */
1302 listnode_add (ls_upd, find);
1303 length += ntohs (find->data->length);
1304
1305 size -= OSPF_LSA_KEY_SIZE;
1306 }
1307
1308 /* Send rest of Link State Update. */
1309 if (listcount (ls_upd) > 0)
1310 {
1311 if (oi->type == OSPF_IFTYPE_NBMA)
1312 ospf_ls_upd_send (nbr, ls_upd, OSPF_SEND_PACKET_DIRECT);
1313 else
1314 ospf_ls_upd_send (nbr, ls_upd, OSPF_SEND_PACKET_INDIRECT);
1315
1316 list_delete (ls_upd);
1317 }
1318 else
1319 list_free (ls_upd);
1320}
1321
1322/* Get the list of LSAs from Link State Update packet.
1323 And process some validation -- RFC2328 Section 13. (1)-(2). */
1324static list
1325ospf_ls_upd_list_lsa (struct ospf_neighbor *nbr, struct stream *s,
1326 struct ospf_interface *oi, size_t size)
1327{
1328 u_int16_t count, sum;
1329 u_int32_t length;
1330 struct lsa_header *lsah;
1331 struct ospf_lsa *lsa;
1332 list lsas;
1333
1334 lsas = list_new ();
1335
1336 count = stream_getl (s);
1337 size -= OSPF_LS_UPD_MIN_SIZE; /* # LSAs */
1338
1339 for (; size >= OSPF_LSA_HEADER_SIZE && count > 0;
1340 size -= length, stream_forward (s, length), count--)
1341 {
1342 lsah = (struct lsa_header *) STREAM_PNT (s);
1343 length = ntohs (lsah->length);
1344
1345 if (length > size)
1346 {
1347 zlog_warn ("Link State Update: LSA length exceeds packet size.");
1348 break;
1349 }
1350
1351 /* Validate the LSA's LS checksum. */
1352 sum = lsah->checksum;
1353 if (sum != ospf_lsa_checksum (lsah))
1354 {
1355 zlog_warn ("Link State Update: LSA checksum error %x, %x.",
1356 sum, lsah->checksum);
1357 continue;
1358 }
1359
1360 /* Examine the LSA's LS type. */
1361 if (lsah->type < OSPF_MIN_LSA || lsah->type >= OSPF_MAX_LSA)
1362 {
1363 zlog_warn ("Link State Update: Unknown LS type %d", lsah->type);
1364 continue;
1365 }
1366
1367 /*
1368 * What if the received LSA's age is greater than MaxAge?
1369 * Treat it as a MaxAge case -- endo.
1370 */
1371 if (ntohs (lsah->ls_age) > OSPF_LSA_MAXAGE)
1372 lsah->ls_age = htons (OSPF_LSA_MAXAGE);
1373
1374#ifdef HAVE_OPAQUE_LSA
1375 if (CHECK_FLAG (nbr->options, OSPF_OPTION_O))
1376 {
1377#ifdef STRICT_OBIT_USAGE_CHECK
1378 if ((IS_OPAQUE_LSA(lsah->type) &&
1379 ! CHECK_FLAG (lsah->options, OSPF_OPTION_O))
1380 || (! IS_OPAQUE_LSA(lsah->type) &&
1381 CHECK_FLAG (lsah->options, OSPF_OPTION_O)))
1382 {
1383 /*
1384 * This neighbor must know the exact usage of O-bit;
1385 * the bit will be set in Type-9,10,11 LSAs only.
1386 */
1387 zlog_warn ("LSA[Type%d:%s]: O-bit abuse?", lsah->type, inet_ntoa (lsah->id));
1388 continue;
1389 }
1390#endif /* STRICT_OBIT_USAGE_CHECK */
1391
1392 /* Do not take in AS External Opaque-LSAs if we are a stub. */
1393 if (lsah->type == OSPF_OPAQUE_AS_LSA
1394 && nbr->oi->area->external_routing != OSPF_AREA_DEFAULT)
1395 {
1396 if (IS_DEBUG_OSPF_EVENT)
1397 zlog_info ("LSA[Type%d:%s]: We are a stub, don't take this LSA.", lsah->type, inet_ntoa (lsah->id));
1398 continue;
1399 }
1400 }
1401 else if (IS_OPAQUE_LSA(lsah->type))
1402 {
1403 zlog_warn ("LSA[Type%d:%s]: Opaque capability mismatch?", lsah->type, inet_ntoa (lsah->id));
1404 continue;
1405 }
1406#endif /* HAVE_OPAQUE_LSA */
1407
1408 /* Create OSPF LSA instance. */
1409 lsa = ospf_lsa_new ();
1410
1411 /* We may wish to put some error checking if type NSSA comes in
1412 and area not in NSSA mode */
1413 switch (lsah->type)
1414 {
1415 case OSPF_AS_EXTERNAL_LSA:
1416#ifdef HAVE_OPAQUE_LSA
1417 case OSPF_OPAQUE_AS_LSA:
1418 lsa->area = NULL;
1419 break;
1420 case OSPF_OPAQUE_LINK_LSA:
1421 lsa->oi = oi; /* Remember incoming interface for flooding control. */
1422 /* Fallthrough */
1423#endif /* HAVE_OPAQUE_LSA */
1424 default:
1425 lsa->area = oi->area;
1426 break;
1427 }
1428
1429 lsa->data = ospf_lsa_data_new (length);
1430 memcpy (lsa->data, lsah, length);
1431
1432 if (IS_DEBUG_OSPF_EVENT)
1433 zlog_info("LSA[Type%d:%s]: %p new LSA created with Link State Update",
1434 lsa->data->type, inet_ntoa (lsa->data->id), lsa);
1435 listnode_add (lsas, lsa);
1436 }
1437
1438 return lsas;
1439}
1440
1441/* Cleanup Update list. */
1442void
1443ospf_upd_list_clean (list lsas)
1444{
1445 listnode node;
1446 struct ospf_lsa *lsa;
1447
1448 for (node = listhead (lsas); node; nextnode (node))
1449 if ((lsa = getdata (node)) != NULL)
1450 ospf_lsa_discard (lsa);
1451
1452 list_delete (lsas);
1453}
1454
1455/* OSPF Link State Update message read -- RFC2328 Section 13. */
1456void
1457ospf_ls_upd (struct ip *iph, struct ospf_header *ospfh,
1458 struct stream *s, struct ospf_interface *oi, u_int16_t size)
1459{
1460 struct ospf_neighbor *nbr;
1461 list lsas;
1462#ifdef HAVE_OPAQUE_LSA
1463 list mylsa_acks, mylsa_upds;
1464#endif /* HAVE_OPAQUE_LSA */
1465 listnode node, next;
1466 struct ospf_lsa *lsa = NULL;
1467 /* unsigned long ls_req_found = 0; */
1468
1469 /* Dis-assemble the stream, update each entry, re-encapsulate for flooding */
1470
1471 /* Increment statistics. */
1472 oi->ls_upd_in++;
1473
1474 /* Check neighbor. */
1475 nbr = ospf_nbr_lookup_by_addr (oi->nbrs, &iph->ip_src);
1476 if (nbr == NULL)
1477 {
1478 zlog_warn ("Link State Update: Unknown Neighbor %s on int: %s",
1479 inet_ntoa (ospfh->router_id), IF_NAME (oi));
1480 return;
1481 }
1482
1483 /* Check neighbor state. */
1484 if (nbr->state < NSM_Exchange)
1485 {
1486 zlog_warn ("Link State Update: Neighbor[%s] state is less than Exchange",
1487 inet_ntoa (ospfh->router_id));
1488 return;
1489 }
1490
1491 /* Get list of LSAs from Link State Update packet. - Also perorms Stages
1492 * 1 (validate LSA checksum) and 2 (check for LSA consistent type)
1493 * of section 13.
1494 */
1495 lsas = ospf_ls_upd_list_lsa (nbr, s, oi, size);
1496
1497#ifdef HAVE_OPAQUE_LSA
1498 /*
1499 * Prepare two kinds of lists to clean up unwanted self-originated
1500 * Opaque-LSAs from the routing domain as soon as possible.
1501 */
1502 mylsa_acks = list_new (); /* Let the sender cease retransmission. */
1503 mylsa_upds = list_new (); /* Flush target LSAs if necessary. */
1504
1505 /*
1506 * If self-originated Opaque-LSAs that have flooded before restart
1507 * are contained in the received LSUpd message, corresponding LSReq
1508 * messages to be sent may have to be modified.
1509 * To eliminate possible race conditions such that flushing and normal
1510 * updating for the same LSA would take place alternately, this trick
1511 * must be done before entering to the loop below.
1512 */
1513 ospf_opaque_adjust_lsreq (nbr, lsas);
1514#endif /* HAVE_OPAQUE_LSA */
1515
1516#define DISCARD_LSA(L,N) {\
1517 if (IS_DEBUG_OSPF_EVENT) \
1518 zlog_info ("ospf_lsa_discard() in ospf_ls_upd() point %d: lsa %p Type-%d", N, lsa, (int) lsa->data->type); \
1519 ospf_lsa_discard (L); \
1520 continue; }
1521
1522 /* Process each LSA received in the one packet. */
1523 for (node = listhead (lsas); node; node = next)
1524 {
1525 struct ospf_lsa *ls_ret, *current;
1526 int ret = 1;
1527
1528 next = node->next;
1529
1530 lsa = getdata (node);
1531
1532#ifdef HAVE_NSSA
1533 if (IS_DEBUG_OSPF_NSSA)
1534 {
1535 char buf1[INET_ADDRSTRLEN];
1536 char buf2[INET_ADDRSTRLEN];
1537 char buf3[INET_ADDRSTRLEN];
1538
1539 zlog_info("LSA Type-%d from %s, ID: %s, ADV: %s",
1540 lsa->data->type,
1541 inet_ntop (AF_INET, &ospfh->router_id,
1542 buf1, INET_ADDRSTRLEN),
1543 inet_ntop (AF_INET, &lsa->data->id,
1544 buf2, INET_ADDRSTRLEN),
1545 inet_ntop (AF_INET, &lsa->data->adv_router,
1546 buf3, INET_ADDRSTRLEN));
1547 }
1548#endif /* HAVE_NSSA */
1549
1550 listnode_delete (lsas, lsa); /* We don't need it in list anymore */
1551
1552 /* Validate Checksum - Done above by ospf_ls_upd_list_lsa() */
1553
1554 /* LSA Type - Done above by ospf_ls_upd_list_lsa() */
1555
1556 /* Do not take in AS External LSAs if we are a stub or NSSA. */
1557
1558 /* Do not take in AS NSSA if this neighbor and we are not NSSA */
1559
1560 /* Do take in Type-7's if we are an NSSA */
1561
1562 /* If we are also an ABR, later translate them to a Type-5 packet */
1563
1564 /* Later, an NSSA Re-fresh can Re-fresh Type-7's and an ABR will
1565 translate them to a separate Type-5 packet. */
1566
1567 if (lsa->data->type == OSPF_AS_EXTERNAL_LSA)
1568 /* Reject from STUB or NSSA */
1569 if (nbr->oi->area->external_routing != OSPF_AREA_DEFAULT)
1570 {
1571 DISCARD_LSA (lsa, 1);
1572#ifdef HAVE_NSSA
1573 if (IS_DEBUG_OSPF_NSSA)
1574 zlog_info("Incoming External LSA Discarded: We are NSSA/STUB Area");
1575#endif /* HAVE_NSSA */
1576 }
1577
1578#ifdef HAVE_NSSA
1579 if (lsa->data->type == OSPF_AS_NSSA_LSA)
1580 if (nbr->oi->area->external_routing != OSPF_AREA_NSSA)
1581 {
1582 DISCARD_LSA (lsa,2);
1583 if (IS_DEBUG_OSPF_NSSA)
1584 zlog_info("Incoming NSSA LSA Discarded: Not NSSA Area");
1585 }
1586#endif /* HAVE_NSSA */
1587
1588 /* Find the LSA in the current database. */
1589
1590 current = ospf_lsa_lookup_by_header (oi->area, lsa->data);
1591
1592 /* If the LSA's LS age is equal to MaxAge, and there is currently
1593 no instance of the LSA in the router's link state database,
1594 and none of router's neighbors are in states Exchange or Loading,
1595 then take the following actions. */
1596
1597 if (IS_LSA_MAXAGE (lsa) && !current &&
1598 (ospf_nbr_count (oi->nbrs, NSM_Exchange) +
1599 ospf_nbr_count (oi->nbrs, NSM_Loading)) == 0)
1600 {
1601 /* Response Link State Acknowledgment. */
1602 ospf_ls_ack_send (nbr, lsa);
1603
1604 /* Discard LSA. */
1605 zlog_warn ("Link State Update: LS age is equal to MaxAge.");
1606 DISCARD_LSA (lsa, 3);
1607 }
1608
1609#ifdef HAVE_OPAQUE_LSA
1610 if (IS_OPAQUE_LSA (lsa->data->type)
1611 && IPV4_ADDR_SAME (&lsa->data->adv_router, &ospf_top->router_id))
1612 {
1613 /*
1614 * Even if initial flushing seems to be completed, there might
1615 * be a case that self-originated LSA with MaxAge still remain
1616 * in the routing domain.
1617 * Just send an LSAck message to cease retransmission.
1618 */
1619 if (IS_LSA_MAXAGE (lsa))
1620 {
1621 zlog_warn ("LSA[%s]: Boomerang effect?", dump_lsa_key (lsa));
1622 ospf_ls_ack_send (nbr, lsa);
1623 ospf_lsa_discard (lsa);
1624
1625 if (current != NULL && ! IS_LSA_MAXAGE (current))
1626 ospf_opaque_lsa_refresh_schedule (current);
1627 continue;
1628 }
1629
1630 /*
1631 * If an instance of self-originated Opaque-LSA is not found
1632 * in the LSDB, there are some possible cases here.
1633 *
1634 * 1) This node lost opaque-capability after restart.
1635 * 2) Else, a part of opaque-type is no more supported.
1636 * 3) Else, a part of opaque-id is no more supported.
1637 *
1638 * Anyway, it is still this node's responsibility to flush it.
1639 * Otherwise, the LSA instance remains in the routing domain
1640 * until its age reaches to MaxAge.
1641 */
1642 if (current == NULL)
1643 {
1644 if (IS_DEBUG_OSPF_EVENT)
1645 zlog_info ("LSA[%s]: Previously originated Opaque-LSA, not found in the LSDB.", dump_lsa_key (lsa));
1646
1647 SET_FLAG (lsa->flags, OSPF_LSA_SELF);
1648 listnode_add (mylsa_upds, ospf_lsa_dup (lsa));
1649 listnode_add (mylsa_acks, ospf_lsa_lock (lsa));
1650 continue;
1651 }
1652 }
1653#endif /* HAVE_OPAQUE_LSA */
1654
1655 /* (5) Find the instance of this LSA that is currently contained
1656 in the router's link state database. If there is no
1657 database copy, or the received LSA is more recent than
1658 the database copy the following steps must be performed. */
1659
1660 if (current == NULL ||
1661 (ret = ospf_lsa_more_recent (current, lsa)) < 0)
1662 {
1663 /* Actual flooding procedure. */
1664 if (ospf_flood (nbr, current, lsa) < 0) /* Trap NSSA later. */
1665 DISCARD_LSA (lsa, 4);
1666 continue;
1667 }
1668
1669 /* (6) Else, If there is an instance of the LSA on the sending
1670 neighbor's Link state request list, an error has occurred in
1671 the Database Exchange process. In this case, restart the
1672 Database Exchange process by generating the neighbor event
1673 BadLSReq for the sending neighbor and stop processing the
1674 Link State Update packet. */
1675
1676 if (ospf_ls_request_lookup (nbr, lsa))
1677 {
1678 OSPF_NSM_EVENT_SCHEDULE (nbr, NSM_BadLSReq);
1679 zlog_warn ("LSA instance exists on Link state request list");
1680
1681 /* Clean list of LSAs. */
1682 ospf_upd_list_clean (lsas);
1683 /* this lsa is not on lsas list already. */
1684 ospf_lsa_discard (lsa);
1685#ifdef HAVE_OPAQUE_LSA
1686 list_delete (mylsa_acks);
1687 list_delete (mylsa_upds);
1688#endif /* HAVE_OPAQUE_LSA */
1689 return;
1690 }
1691
1692 /* If the received LSA is the same instance as the database copy
1693 (i.e., neither one is more recent) the following two steps
1694 should be performed: */
1695
1696 if (ret == 0)
1697 {
1698 /* If the LSA is listed in the Link state retransmission list
1699 for the receiving adjacency, the router itself is expecting
1700 an acknowledgment for this LSA. The router should treat the
1701 received LSA as an acknowledgment by removing the LSA from
1702 the Link state retransmission list. This is termed an
1703 "implied acknowledgment". */
1704
1705 ls_ret = ospf_ls_retransmit_lookup (nbr, lsa);
1706
1707 if (ls_ret != NULL)
1708 {
1709 ospf_ls_retransmit_delete (nbr, ls_ret);
1710
1711 /* Delayed acknowledgment sent if advertisement received
1712 from Designated Router, otherwise do nothing. */
1713 if (oi->state == ISM_Backup)
1714 if (NBR_IS_DR (nbr))
1715 listnode_add (oi->ls_ack, ospf_lsa_lock (lsa));
1716
1717 DISCARD_LSA (lsa, 5);
1718 }
1719 else
1720 /* Acknowledge the receipt of the LSA by sending a
1721 Link State Acknowledgment packet back out the receiving
1722 interface. */
1723 {
1724 ospf_ls_ack_send (nbr, lsa);
1725 DISCARD_LSA (lsa, 6);
1726 }
1727 }
1728
1729 /* The database copy is more recent. If the database copy
1730 has LS age equal to MaxAge and LS sequence number equal to
1731 MaxSequenceNumber, simply discard the received LSA without
1732 acknowledging it. (In this case, the LSA's LS sequence number is
1733 wrapping, and the MaxSequenceNumber LSA must be completely
1734 flushed before any new LSA instance can be introduced). */
1735
1736 else if (ret > 0) /* Database copy is more recent */
1737 {
1738 if (IS_LSA_MAXAGE (current) &&
1739 current->data->ls_seqnum == htonl (OSPF_MAX_SEQUENCE_NUMBER))
1740 {
1741 DISCARD_LSA (lsa, 7);
1742 }
1743 /* Otherwise, as long as the database copy has not been sent in a
1744 Link State Update within the last MinLSArrival seconds, send the
1745 database copy back to the sending neighbor, encapsulated within
1746 a Link State Update Packet. The Link State Update Packet should
1747 be sent directly to the neighbor. In so doing, do not put the
1748 database copy of the LSA on the neighbor's link state
1749 retransmission list, and do not acknowledge the received (less
1750 recent) LSA instance. */
1751 else
1752 {
1753 struct timeval now;
1754
1755 gettimeofday (&now, NULL);
1756
1757 if (tv_cmp (tv_sub (now, current->tv_orig),
1758 int2tv (OSPF_MIN_LS_ARRIVAL)) > 0)
1759 /* Trap NSSA type later.*/
1760 ospf_ls_upd_send_lsa (nbr, current, OSPF_SEND_PACKET_DIRECT);
1761 DISCARD_LSA (lsa, 8);
1762 }
1763 }
1764 }
1765
1766#ifdef HAVE_OPAQUE_LSA
1767 /*
1768 * Now that previously originated Opaque-LSAs those which not yet
1769 * installed into LSDB are captured, take several steps to clear
1770 * them completely from the routing domain, before proceeding to
1771 * origination for the current target Opaque-LSAs.
1772 */
1773 while (listcount (mylsa_acks) > 0)
1774 ospf_ls_ack_send_list (oi, mylsa_acks, nbr->address.u.prefix4);
1775
1776 if (listcount (mylsa_upds) > 0)
1777 ospf_opaque_self_originated_lsa_received (nbr, mylsa_upds);
1778
1779 list_delete (mylsa_upds);
1780#endif /* HAVE_OPAQUE_LSA */
1781
1782 assert (listcount (lsas) == 0);
1783 list_delete (lsas);
1784}
1785
1786/* OSPF Link State Acknowledgment message read -- RFC2328 Section 13.7. */
1787void
1788ospf_ls_ack (struct ip *iph, struct ospf_header *ospfh,
1789 struct stream *s, struct ospf_interface *oi, u_int16_t size)
1790{
1791 struct ospf_neighbor *nbr;
1792#ifdef HAVE_OPAQUE_LSA
1793 list opaque_acks;
1794#endif /* HAVE_OPAQUE_LSA */
1795
1796 /* increment statistics. */
1797 oi->ls_ack_in++;
1798
1799 nbr = ospf_nbr_lookup_by_addr (oi->nbrs, &iph->ip_src);
1800 if (nbr == NULL)
1801 {
1802 zlog_warn ("Link State Acknowledgment: Unknown Neighbor %s.",
1803 inet_ntoa (ospfh->router_id));
1804 return;
1805 }
1806
1807 if (nbr->state < NSM_Exchange)
1808 {
1809 zlog_warn ("Link State Acknowledgment: State is less than Exchange.");
1810 return;
1811 }
1812
1813#ifdef HAVE_OPAQUE_LSA
1814 opaque_acks = list_new ();
1815#endif /* HAVE_OPAQUE_LSA */
1816
1817 while (size >= OSPF_LSA_HEADER_SIZE)
1818 {
1819 struct ospf_lsa *lsa, *lsr;
1820
1821 lsa = ospf_lsa_new ();
1822 lsa->data = (struct lsa_header *) STREAM_PNT (s);
1823
1824 /* lsah = (struct lsa_header *) STREAM_PNT (s); */
1825 size -= OSPF_LSA_HEADER_SIZE;
1826 stream_forward (s, OSPF_LSA_HEADER_SIZE);
1827
1828 if (lsa->data->type < OSPF_MIN_LSA || lsa->data->type >= OSPF_MAX_LSA)
1829 {
1830 lsa->data = NULL;
1831 ospf_lsa_discard (lsa);
1832 continue;
1833 }
1834
1835 lsr = ospf_ls_retransmit_lookup (nbr, lsa);
1836
1837 if (lsr != NULL && lsr->data->ls_seqnum == lsa->data->ls_seqnum)
1838 {
1839#ifdef HAVE_OPAQUE_LSA
1840 /* Keep this LSA entry for later reference. */
1841 if (IS_OPAQUE_LSA (lsr->data->type))
1842 listnode_add (opaque_acks, ospf_lsa_dup (lsr));
1843#endif /* HAVE_OPAQUE_LSA */
1844
1845 ospf_ls_retransmit_delete (nbr, lsr);
1846 }
1847
1848 lsa->data = NULL;
1849 ospf_lsa_discard (lsa);
1850 }
1851
1852#ifdef HAVE_OPAQUE_LSA
1853 if (listcount (opaque_acks) > 0)
1854 ospf_opaque_ls_ack_received (nbr, opaque_acks);
1855
1856 list_delete (opaque_acks);
1857 return;
1858#endif /* HAVE_OPAQUE_LSA */
1859}
1860
1861struct stream *
1862ospf_recv_packet (int fd, struct interface **ifp)
1863{
1864 int ret;
1865 struct ip iph;
1866 u_int16_t ip_len;
1867 struct stream *ibuf;
1868 unsigned int ifindex = 0;
1869 struct iovec iov;
1870 struct cmsghdr *cmsg;
1871#if defined (IP_PKTINFO)
1872 struct in_pktinfo *pktinfo;
1873#elif defined (IP_RECVIF)
1874 struct sockaddr_dl *pktinfo;
1875#else
1876 char *pktinfo; /* dummy */
1877#endif
1878 char buff [sizeof (*cmsg) + sizeof (*pktinfo)];
1879 struct msghdr msgh = {NULL, 0, &iov, 1, buff,
1880 sizeof (*cmsg) + sizeof (*pktinfo), 0};
1881
1882 ret = recvfrom (fd, (void *)&iph, sizeof (iph), MSG_PEEK, NULL, 0);
1883
1884 if (ret != sizeof (iph))
1885 {
1886 zlog_warn ("ospf_recv_packet packet smaller than ip header");
1887 return NULL;
1888 }
1889
1890#if defined(__NetBSD__) || defined(__FreeBSD__) || defined(__OpenBSD__)
1891 ip_len = iph.ip_len;
1892#else
1893 ip_len = ntohs (iph.ip_len);
1894#endif
1895
1896#if !defined(GNU_LINUX)
1897 /*
1898 * Kernel network code touches incoming IP header parameters,
1899 * before protocol specific processing.
1900 *
1901 * 1) Convert byteorder to host representation.
1902 * --> ip_len, ip_id, ip_off
1903 *
1904 * 2) Adjust ip_len to strip IP header size!
1905 * --> If user process receives entire IP packet via RAW
1906 * socket, it must consider adding IP header size to
1907 * the "ip_len" field of "ip" structure.
1908 *
1909 * For more details, see <netinet/ip_input.c>.
1910 */
1911 ip_len = ip_len + (iph.ip_hl << 2);
1912#endif
1913
1914 ibuf = stream_new (ip_len);
1915 iov.iov_base = STREAM_DATA (ibuf);
1916 iov.iov_len = ip_len;
1917 ret = recvmsg (fd, &msgh, 0);
1918
1919 cmsg = CMSG_FIRSTHDR (&msgh);
1920
1921 if (cmsg != NULL && //cmsg->cmsg_len == sizeof (*pktinfo) &&
1922 cmsg->cmsg_level == IPPROTO_IP &&
1923#if defined (IP_PKTINFO)
1924 cmsg->cmsg_type == IP_PKTINFO
1925#elif defined (IP_RECVIF)
1926 cmsg->cmsg_type == IP_RECVIF
1927#else
1928 0
1929#endif
1930 )
1931 {
1932#if defined (IP_PKTINFO)
1933 pktinfo = (struct in_pktinfo *)CMSG_DATA(cmsg);
1934 ifindex = pktinfo->ipi_ifindex;
1935#elif defined (IP_RECVIF)
1936 pktinfo = (struct sockaddr_dl *)CMSG_DATA(cmsg);
1937 ifindex = pktinfo->sdl_index;
1938#else
1939 ifindex = 0;
1940#endif
1941 }
1942
1943 *ifp = if_lookup_by_index (ifindex);
1944
1945 if (ret != ip_len)
1946 {
1947 zlog_warn ("ospf_recv_packet short read. "
1948 "ip_len %d bytes read %d", ip_len, ret);
1949 stream_free (ibuf);
1950 return NULL;
1951 }
1952
1953 return ibuf;
1954}
1955
1956struct ospf_interface *
1957ospf_associate_packet_vl (struct interface *ifp, struct ospf_interface *oi,
1958 struct ip *iph, struct ospf_header *ospfh)
1959{
1960 struct ospf_interface *rcv_oi;
1961 listnode node;
1962 struct ospf_vl_data *vl_data;
1963 struct ospf_area *vl_area;
1964
1965 if (IN_MULTICAST (ntohl (iph->ip_dst.s_addr)) ||
1966 !OSPF_IS_AREA_BACKBONE (ospfh))
1967 return oi;
1968
1969 if ((rcv_oi = oi) == NULL)
1970 {
1971 if ((rcv_oi = ospf_if_lookup_by_local_addr (ifp, iph->ip_dst)) == NULL)
1972 return NULL;
1973 }
1974
1975 for (node = listhead (ospf_top->vlinks); node; nextnode (node))
1976 {
1977 if ((vl_data = getdata (node)) == NULL)
1978 continue;
1979
1980 vl_area = ospf_area_lookup_by_area_id (vl_data->vl_area_id);
1981 if (!vl_area)
1982 continue;
1983
1984 if (OSPF_AREA_SAME (&vl_area, &rcv_oi->area) &&
1985 IPV4_ADDR_SAME (&vl_data->vl_peer, &ospfh->router_id))
1986 {
1987 if (IS_DEBUG_OSPF_EVENT)
1988 zlog_info ("associating packet with %s",
1989 IF_NAME (vl_data->vl_oi));
1990 if (! CHECK_FLAG (vl_data->vl_oi->ifp->flags, IFF_UP))
1991 {
1992 if (IS_DEBUG_OSPF_EVENT)
1993 zlog_info ("This VL is not up yet, sorry");
1994 return NULL;
1995 }
1996
1997 return vl_data->vl_oi;
1998 }
1999 }
2000
2001 if (IS_DEBUG_OSPF_EVENT)
2002 zlog_info ("couldn't find any VL to associate the packet with");
2003
2004 return oi;
2005}
2006
2007int
2008ospf_check_area_id (struct ospf_interface *oi, struct ospf_header *ospfh)
2009{
2010 /* Check match the Area ID of the receiving interface. */
2011 if (OSPF_AREA_SAME (&oi->area, &ospfh))
2012 return 1;
2013
2014 return 0;
2015}
2016
2017/* Unbound socket will accept any Raw IP packets if proto is matched.
2018 To prevent it, compare src IP address and i/f address with masking
2019 i/f network mask. */
2020int
2021ospf_check_network_mask (struct ospf_interface *oi, struct in_addr ip_src)
2022{
2023 struct in_addr mask, me, him;
2024
2025 if (oi->type == OSPF_IFTYPE_POINTOPOINT ||
2026 oi->type == OSPF_IFTYPE_VIRTUALLINK)
2027 return 1;
2028
2029 masklen2ip (oi->address->prefixlen, &mask);
2030
2031 me.s_addr = oi->address->u.prefix4.s_addr & mask.s_addr;
2032 him.s_addr = ip_src.s_addr & mask.s_addr;
2033
2034 if (IPV4_ADDR_SAME (&me, &him))
2035 return 1;
2036
2037 return 0;
2038}
2039
2040int
2041ospf_check_auth (struct ospf_interface *oi, struct stream *ibuf,
2042 struct ospf_header *ospfh)
2043{
2044 int ret = 0;
2045 struct crypt_key *ck;
2046
2047 switch (ntohs (ospfh->auth_type))
2048 {
2049 case OSPF_AUTH_NULL:
2050 ret = 1;
2051 break;
2052 case OSPF_AUTH_SIMPLE:
2053 if (!memcmp (OSPF_IF_PARAM (oi, auth_simple), ospfh->u.auth_data, OSPF_AUTH_SIMPLE_SIZE))
2054 ret = 1;
2055 else
2056 ret = 0;
2057 break;
2058 case OSPF_AUTH_CRYPTOGRAPHIC:
2059 if ((ck = getdata (OSPF_IF_PARAM (oi,auth_crypt)->tail)) == NULL)
2060 {
2061 ret = 0;
2062 break;
2063 }
2064
2065 /* This is very basic, the digest processing is elsewhere */
2066 if (ospfh->u.crypt.auth_data_len == OSPF_AUTH_MD5_SIZE &&
2067 ospfh->u.crypt.key_id == ck->key_id &&
2068 ntohs (ospfh->length) + OSPF_AUTH_SIMPLE_SIZE <= stream_get_size (ibuf))
2069 ret = 1;
2070 else
2071 ret = 0;
2072 break;
2073 default:
2074 ret = 0;
2075 break;
2076 }
2077
2078 return ret;
2079}
2080
2081int
2082ospf_check_sum (struct ospf_header *ospfh)
2083{
2084 u_int32_t ret;
2085 u_int16_t sum;
2086 int in_cksum (void *ptr, int nbytes);
2087
2088 /* clear auth_data for checksum. */
2089 memset (ospfh->u.auth_data, 0, OSPF_AUTH_SIMPLE_SIZE);
2090
2091 /* keep checksum and clear. */
2092 sum = ospfh->checksum;
2093 memset (&ospfh->checksum, 0, sizeof (u_int16_t));
2094
2095 /* calculate checksum. */
2096 ret = in_cksum (ospfh, ntohs (ospfh->length));
2097
2098 if (ret != sum)
2099 {
2100 zlog_info ("ospf_check_sum(): checksum mismatch, my %X, his %X",
2101 ret, sum);
2102 return 0;
2103 }
2104
2105 return 1;
2106}
2107
2108/* OSPF Header verification. */
2109int
2110ospf_verify_header (struct stream *ibuf, struct ospf_interface *oi,
2111 struct ip *iph, struct ospf_header *ospfh)
2112{
2113 /* check version. */
2114 if (ospfh->version != OSPF_VERSION)
2115 {
2116 zlog_warn ("interface %s: ospf_read version number mismatch.",
2117 IF_NAME (oi));
2118 return -1;
2119 }
2120
2121 /* Check Area ID. */
2122 if (!ospf_check_area_id (oi, ospfh))
2123 {
2124 zlog_warn ("interface %s: ospf_read invalid Area ID %s.",
2125 IF_NAME (oi), inet_ntoa (ospfh->area_id));
2126 return -1;
2127 }
2128
2129 /* Check network mask, Silently discarded. */
2130 if (! ospf_check_network_mask (oi, iph->ip_src))
2131 {
2132 zlog_warn ("interface %s: ospf_read network address is not same [%s]",
2133 IF_NAME (oi), inet_ntoa (iph->ip_src));
2134 return -1;
2135 }
2136
2137 /* Check authentication. */
2138 if (ospf_auth_type (oi) != ntohs (ospfh->auth_type))
2139 {
2140 zlog_warn ("interface %s: ospf_read authentication type mismatch.",
2141 IF_NAME (oi));
2142 return -1;
2143 }
2144
2145 if (! ospf_check_auth (oi, ibuf, ospfh))
2146 {
2147 zlog_warn ("interface %s: ospf_read authentication failed.",
2148 IF_NAME (oi));
2149 return -1;
2150 }
2151
2152 /* if check sum is invalid, packet is discarded. */
2153 if (ntohs (ospfh->auth_type) != OSPF_AUTH_CRYPTOGRAPHIC)
2154 {
2155 if (! ospf_check_sum (ospfh))
2156 {
2157 zlog_warn ("interface %s: ospf_read packet checksum error %s",
2158 IF_NAME (oi), inet_ntoa (ospfh->router_id));
2159 return -1;
2160 }
2161 }
2162 else
2163 {
2164 if (ospfh->checksum != 0)
2165 return -1;
2166 if (ospf_check_md5_digest (oi, ibuf, ntohs (ospfh->length)) == 0)
2167 {
2168 zlog_warn ("interface %s: ospf_read md5 authentication failed.",
2169 IF_NAME (oi));
2170 return -1;
2171 }
2172 }
2173
2174 return 0;
2175}
2176
2177/* Starting point of packet process function. */
2178int
2179ospf_read (struct thread *thread)
2180{
2181 int ret;
2182 struct stream *ibuf;
2183 struct ospf *top;
2184 struct ospf_interface *oi;
2185 struct ip *iph;
2186 struct ospf_header *ospfh;
2187 u_int16_t length;
2188 struct interface *ifp;
2189
2190 /* first of all get interface pointer. */
2191 top = THREAD_ARG (thread);
2192 top->t_read = NULL;
2193
2194 /* read OSPF packet. */
2195 ibuf = ospf_recv_packet (top->fd, &ifp);
2196 if (ibuf == NULL)
2197 return -1;
2198
2199 iph = (struct ip *) STREAM_DATA (ibuf);
2200
2201 /* prepare for next packet. */
2202 top->t_read = thread_add_read (master, ospf_read, top, top->fd);
2203
2204 /* IP Header dump. */
2205 /*
2206 if (ospf_debug_packet & OSPF_DEBUG_RECV)
2207 ospf_ip_header_dump (ibuf);
2208 */
2209 /* Self-originated packet should be discarded silently. */
2210 if (ospf_if_lookup_by_local_addr (NULL, iph->ip_src))
2211 {
2212 stream_free (ibuf);
2213 return 0;
2214 }
2215
2216 /* Adjust size to message length. */
2217 stream_forward (ibuf, iph->ip_hl * 4);
2218
2219 /* Get ospf packet header. */
2220 ospfh = (struct ospf_header *) STREAM_PNT (ibuf);
2221
2222 /* associate packet with ospf interface */
2223 oi = ospf_if_lookup_recv_interface (iph->ip_src);
2224 if (ifp && oi && oi->ifp != ifp)
2225 {
2226 zlog_warn ("Packet from [%s] received on wrong link %s",
2227 inet_ntoa (iph->ip_src), ifp->name);
2228 stream_free (ibuf);
2229 return 0;
2230 }
2231
2232 if ((oi = ospf_associate_packet_vl (ifp, oi, iph, ospfh)) == NULL)
2233 {
2234 stream_free (ibuf);
2235 return 0;
2236 }
2237
2238 /*
2239 * If the received packet is destined for AllDRouters, the packet
2240 * should be accepted only if the received ospf interface state is
2241 * either DR or Backup -- endo.
2242 */
2243 if (iph->ip_dst.s_addr == htonl (OSPF_ALLDROUTERS)
2244 && (oi->state != ISM_DR && oi->state != ISM_Backup))
2245 {
2246 zlog_info ("Packet for AllDRouters from [%s] via [%s] (ISM: %s)",
2247 inet_ntoa (iph->ip_src), IF_NAME (oi),
2248 LOOKUP (ospf_ism_state_msg, oi->state));
2249 stream_free (ibuf);
2250 return 0;
2251 }
2252
2253 /* Show debug receiving packet. */
2254 if (IS_DEBUG_OSPF_PACKET (ospfh->type - 1, RECV))
2255 {
2256 if (IS_DEBUG_OSPF_PACKET (ospfh->type - 1, DETAIL))
2257 {
2258 zlog_info ("-----------------------------------------------------");
2259 ospf_packet_dump (ibuf);
2260 }
2261
2262 zlog_info ("%s received from [%s] via [%s]",
2263 ospf_packet_type_str[ospfh->type],
2264 inet_ntoa (ospfh->router_id), IF_NAME (oi));
2265 zlog_info (" src [%s],", inet_ntoa (iph->ip_src));
2266 zlog_info (" dst [%s]", inet_ntoa (iph->ip_dst));
2267
2268 if (IS_DEBUG_OSPF_PACKET (ospfh->type - 1, DETAIL))
2269 zlog_info ("-----------------------------------------------------");
2270 }
2271
2272 /* Some header verification. */
2273 ret = ospf_verify_header (ibuf, oi, iph, ospfh);
2274 if (ret < 0)
2275 {
2276 stream_free (ibuf);
2277 return ret;
2278 }
2279
2280 stream_forward (ibuf, OSPF_HEADER_SIZE);
2281
2282 /* Adjust size to message length. */
2283 length = ntohs (ospfh->length) - OSPF_HEADER_SIZE;
2284
2285 /* Read rest of the packet and call each sort of packet routine. */
2286 switch (ospfh->type)
2287 {
2288 case OSPF_MSG_HELLO:
2289 ospf_hello (iph, ospfh, ibuf, oi, length);
2290 break;
2291 case OSPF_MSG_DB_DESC:
2292 ospf_db_desc (iph, ospfh, ibuf, oi, length);
2293 break;
2294 case OSPF_MSG_LS_REQ:
2295 ospf_ls_req (iph, ospfh, ibuf, oi, length);
2296 break;
2297 case OSPF_MSG_LS_UPD:
2298 ospf_ls_upd (iph, ospfh, ibuf, oi, length);
2299 break;
2300 case OSPF_MSG_LS_ACK:
2301 ospf_ls_ack (iph, ospfh, ibuf, oi, length);
2302 break;
2303 default:
2304 zlog (NULL, LOG_WARNING,
2305 "interface %s: OSPF packet header type %d is illegal",
2306 IF_NAME (oi), ospfh->type);
2307 break;
2308 }
2309
2310 stream_free (ibuf);
2311 return 0;
2312}
2313
2314/* Make OSPF header. */
2315void
2316ospf_make_header (int type, struct ospf_interface *oi, struct stream *s)
2317{
2318 struct ospf_header *ospfh;
2319
2320 ospfh = (struct ospf_header *) STREAM_DATA (s);
2321
2322 ospfh->version = (u_char) OSPF_VERSION;
2323 ospfh->type = (u_char) type;
2324
2325 ospfh->router_id = ospf_top->router_id;
2326
2327 ospfh->checksum = 0;
2328 ospfh->area_id = oi->area->area_id;
2329 ospfh->auth_type = htons (ospf_auth_type (oi));
2330
2331 memset (ospfh->u.auth_data, 0, OSPF_AUTH_SIMPLE_SIZE);
2332
2333 ospf_output_forward (s, OSPF_HEADER_SIZE);
2334}
2335
2336/* Make Authentication Data. */
2337int
2338ospf_make_auth (struct ospf_interface *oi, struct ospf_header *ospfh)
2339{
2340 struct crypt_key *ck;
2341
2342 switch (ospf_auth_type (oi))
2343 {
2344 case OSPF_AUTH_NULL:
2345 /* memset (ospfh->u.auth_data, 0, sizeof (ospfh->u.auth_data)); */
2346 break;
2347 case OSPF_AUTH_SIMPLE:
2348 memcpy (ospfh->u.auth_data, OSPF_IF_PARAM (oi, auth_simple),
2349 OSPF_AUTH_SIMPLE_SIZE);
2350 break;
2351 case OSPF_AUTH_CRYPTOGRAPHIC:
2352 /* If key is not set, then set 0. */
2353 if (list_isempty (OSPF_IF_PARAM (oi, auth_crypt)))
2354 {
2355 ospfh->u.crypt.zero = 0;
2356 ospfh->u.crypt.key_id = 0;
2357 ospfh->u.crypt.auth_data_len = OSPF_AUTH_MD5_SIZE;
2358 }
2359 else
2360 {
2361 ck = getdata (OSPF_IF_PARAM (oi, auth_crypt)->tail);
2362 ospfh->u.crypt.zero = 0;
2363 ospfh->u.crypt.key_id = ck->key_id;
2364 ospfh->u.crypt.auth_data_len = OSPF_AUTH_MD5_SIZE;
2365 }
2366 /* note: the seq is done in ospf_make_md5_digest() */
2367 break;
2368 default:
2369 /* memset (ospfh->u.auth_data, 0, sizeof (ospfh->u.auth_data)); */
2370 break;
2371 }
2372
2373 return 0;
2374}
2375
2376/* Fill rest of OSPF header. */
2377void
2378ospf_fill_header (struct ospf_interface *oi,
2379 struct stream *s, u_int16_t length)
2380{
2381 struct ospf_header *ospfh;
2382
2383 ospfh = (struct ospf_header *) STREAM_DATA (s);
2384
2385 /* Fill length. */
2386 ospfh->length = htons (length);
2387
2388 /* Calculate checksum. */
2389 if (ntohs (ospfh->auth_type) != OSPF_AUTH_CRYPTOGRAPHIC)
2390 ospfh->checksum = in_cksum (ospfh, length);
2391 else
2392 ospfh->checksum = 0;
2393
2394 /* Add Authentication Data. */
2395 ospf_make_auth (oi, ospfh);
2396}
2397
2398int
2399ospf_make_hello (struct ospf_interface *oi, struct stream *s)
2400{
2401 struct ospf_neighbor *nbr;
2402 struct route_node *rn;
2403 u_int16_t length = OSPF_HELLO_MIN_SIZE;
2404 struct in_addr mask;
2405 unsigned long p;
2406 int flag = 0;
2407
2408 /* Set netmask of interface. */
2409 if (oi->type != OSPF_IFTYPE_POINTOPOINT &&
2410 oi->type != OSPF_IFTYPE_VIRTUALLINK)
2411 masklen2ip (oi->address->prefixlen, &mask);
2412 else
2413 memset ((char *) &mask, 0, sizeof (struct in_addr));
2414 stream_put_ipv4 (s, mask.s_addr);
2415
2416 /* Set Hello Interval. */
2417 stream_putw (s, OSPF_IF_PARAM (oi, v_hello));
2418
2419 if (IS_DEBUG_OSPF_EVENT)
2420 zlog_info ("make_hello: options: %x, int: %s",
2421 OPTIONS(oi), IF_NAME (oi));
2422
2423 /* Set Options. */
2424 stream_putc (s, OPTIONS (oi));
2425
2426 /* Set Router Priority. */
2427 stream_putc (s, PRIORITY (oi));
2428
2429 /* Set Router Dead Interval. */
2430 stream_putl (s, OSPF_IF_PARAM (oi, v_wait));
2431
2432 /* Set Designated Router. */
2433 stream_put_ipv4 (s, DR (oi).s_addr);
2434
2435 p = s->putp;
2436
2437 /* Set Backup Designated Router. */
2438 stream_put_ipv4 (s, BDR (oi).s_addr);
2439
2440 /* Add neighbor seen. */
2441 for (rn = route_top (oi->nbrs); rn; rn = route_next (rn))
2442 if ((nbr = rn->info) != NULL)
2443 /* ignore 0.0.0.0 node. */
2444 if (nbr->router_id.s_addr != 0)
2445 if (nbr->state != NSM_Attempt)
2446 /* ignore Down neighbor. */
2447 if (nbr->state != NSM_Down)
2448 /* this is myself for DR election. */
2449 if (!IPV4_ADDR_SAME (&nbr->router_id, &ospf_top->router_id))
2450 {
2451 /* Check neighbor is sane? */
2452 if (nbr->d_router.s_addr != 0 &&
2453 IPV4_ADDR_SAME (&nbr->d_router, &oi->address->u.prefix4) &&
2454 IPV4_ADDR_SAME (&nbr->bd_router, &oi->address->u.prefix4))
2455 flag = 1;
2456
2457 stream_put_ipv4 (s, nbr->router_id.s_addr);
2458 length += 4;
2459 }
2460
2461 /* Let neighbor generate BackupSeen. */
2462 if (flag == 1)
2463 {
2464 stream_set_putp (s, p);
2465 stream_put_ipv4 (s, 0);
2466 }
2467
2468 return length;
2469}
2470
2471int
2472ospf_make_db_desc (struct ospf_interface *oi, struct ospf_neighbor *nbr,
2473 struct stream *s)
2474{
2475 struct ospf_lsa *lsa;
2476 u_int16_t length = OSPF_DB_DESC_MIN_SIZE;
2477 u_char options;
2478 unsigned long pp;
2479 int i;
2480 struct ospf_lsdb *lsdb;
2481
2482 /* Set Interface MTU. */
2483 if (oi->type == OSPF_IFTYPE_VIRTUALLINK)
2484 stream_putw (s, 0);
2485 else
2486 stream_putw (s, oi->ifp->mtu);
2487
2488 /* Set Options. */
2489 options = OPTIONS (oi);
2490#ifdef HAVE_OPAQUE_LSA
2491 if (CHECK_FLAG (ospf_top->config, OSPF_OPAQUE_CAPABLE))
2492 {
2493 if (IS_SET_DD_I (nbr->dd_flags)
2494 || CHECK_FLAG (nbr->options, OSPF_OPTION_O))
2495 /*
2496 * Set O-bit in the outgoing DD packet for capablity negotiation,
2497 * if one of following case is applicable.
2498 *
2499 * 1) WaitTimer expiration event triggered the neighbor state to
2500 * change to Exstart, but no (valid) DD packet has received
2501 * from the neighbor yet.
2502 *
2503 * 2) At least one DD packet with O-bit on has received from the
2504 * neighbor.
2505 */
2506 SET_FLAG (options, OSPF_OPTION_O);
2507 }
2508#endif /* HAVE_OPAQUE_LSA */
2509 stream_putc (s, options);
2510
2511 /* Keep pointer to flags. */
2512 pp = stream_get_putp (s);
2513 stream_putc (s, nbr->dd_flags);
2514
2515 /* Set DD Sequence Number. */
2516 stream_putl (s, nbr->dd_seqnum);
2517
2518 if (ospf_db_summary_isempty (nbr))
2519 {
2520 if (nbr->state >= NSM_Exchange)
2521 {
2522 nbr->dd_flags &= ~OSPF_DD_FLAG_M;
2523 /* Set DD flags again */
2524 stream_set_putp (s, pp);
2525 stream_putc (s, nbr->dd_flags);
2526 }
2527 return length;
2528 }
2529
2530 /* Describe LSA Header from Database Summary List. */
2531 lsdb = &nbr->db_sum;
2532
2533 for (i = OSPF_MIN_LSA; i < OSPF_MAX_LSA; i++)
2534 {
2535 struct route_table *table = lsdb->type[i].db;
2536 struct route_node *rn;
2537
2538 for (rn = route_top (table); rn; rn = route_next (rn))
2539 if ((lsa = rn->info) != NULL)
2540 {
2541#ifdef HAVE_OPAQUE_LSA
2542 if (IS_OPAQUE_LSA (lsa->data->type)
2543 && (! CHECK_FLAG (options, OSPF_OPTION_O)))
2544 {
2545 /* Suppress advertising opaque-informations. */
2546 /* Remove LSA from DB summary list. */
2547 ospf_lsdb_delete (lsdb, lsa);
2548 continue;
2549 }
2550#endif /* HAVE_OPAQUE_LSA */
2551
2552 if (!CHECK_FLAG (lsa->flags, OSPF_LSA_DISCARD))
2553 {
2554 struct lsa_header *lsah;
2555 u_int16_t ls_age;
2556
2557 /* DD packet overflows interface MTU. */
2558 if (length + OSPF_LSA_HEADER_SIZE > OSPF_PACKET_MAX (oi))
2559 break;
2560
2561 /* Keep pointer to LS age. */
2562 lsah = (struct lsa_header *) (STREAM_DATA (s) +
2563 stream_get_putp (s));
2564
2565 /* Proceed stream pointer. */
2566 stream_put (s, lsa->data, OSPF_LSA_HEADER_SIZE);
2567 length += OSPF_LSA_HEADER_SIZE;
2568
2569 /* Set LS age. */
2570 ls_age = LS_AGE (lsa);
2571 lsah->ls_age = htons (ls_age);
2572
2573 }
2574
2575 /* Remove LSA from DB summary list. */
2576 ospf_lsdb_delete (lsdb, lsa);
2577 }
2578 }
2579
2580 return length;
2581}
2582
2583int
2584ospf_make_ls_req_func (struct stream *s, u_int16_t *length,
2585 unsigned long delta, struct ospf_neighbor *nbr,
2586 struct ospf_lsa *lsa)
2587{
2588 struct ospf_interface *oi;
2589
2590 oi = nbr->oi;
2591
2592 /* LS Request packet overflows interface MTU. */
2593 if (*length + delta > OSPF_PACKET_MAX(oi))
2594 return 0;
2595
2596 stream_putl (s, lsa->data->type);
2597 stream_put_ipv4 (s, lsa->data->id.s_addr);
2598 stream_put_ipv4 (s, lsa->data->adv_router.s_addr);
2599
2600 ospf_lsa_unlock (nbr->ls_req_last);
2601 nbr->ls_req_last = ospf_lsa_lock (lsa);
2602
2603 *length += 12;
2604 return 1;
2605}
2606
2607int
2608ospf_make_ls_req (struct ospf_neighbor *nbr, struct stream *s)
2609{
2610 struct ospf_lsa *lsa;
2611 u_int16_t length = OSPF_LS_REQ_MIN_SIZE;
2612 unsigned long delta = stream_get_putp(s)+12;
2613 struct route_table *table;
2614 struct route_node *rn;
2615 int i;
2616 struct ospf_lsdb *lsdb;
2617
2618 lsdb = &nbr->ls_req;
2619
2620 for (i = OSPF_MIN_LSA; i < OSPF_MAX_LSA; i++)
2621 {
2622 table = lsdb->type[i].db;
2623 for (rn = route_top (table); rn; rn = route_next (rn))
2624 if ((lsa = (rn->info)) != NULL)
2625 if (ospf_make_ls_req_func (s, &length, delta, nbr, lsa) == 0)
2626 {
2627 route_unlock_node (rn);
2628 break;
2629 }
2630 }
2631 return length;
2632}
2633
2634int
2635ls_age_increment (struct ospf_lsa *lsa, int delay)
2636{
2637 int age;
2638
2639 age = IS_LSA_MAXAGE (lsa) ? OSPF_LSA_MAXAGE : LS_AGE (lsa) + delay;
2640
2641 return (age > OSPF_LSA_MAXAGE ? OSPF_LSA_MAXAGE : age);
2642}
2643
2644int
2645ospf_make_ls_upd (struct ospf_interface *oi, list update, struct stream *s)
2646{
2647 struct ospf_lsa *lsa;
2648 listnode node;
2649 u_int16_t length = OSPF_LS_UPD_MIN_SIZE;
2650 unsigned long delta = stream_get_putp (s);
2651 unsigned long pp;
2652 int count = 0;
2653
2654 if (IS_DEBUG_OSPF_EVENT)
2655 zlog_info("ospf_make_ls_upd: Start");
2656
2657 pp = stream_get_putp (s);
2658 ospf_output_forward (s, 4);
2659
2660 while ((node = listhead (update)) != NULL)
2661 {
2662 struct lsa_header *lsah;
2663 u_int16_t ls_age;
2664
2665 if (IS_DEBUG_OSPF_EVENT)
2666 zlog_info("ospf_make_ls_upd: List Iteration");
2667
2668 lsa = getdata (node);
2669 assert (lsa);
2670 assert (lsa->data);
2671
2672 /* Check packet size. */
2673 if (length + delta + ntohs (lsa->data->length) > OSPF_PACKET_MAX (oi))
2674 break;
2675
2676 /* Keep pointer to LS age. */
2677 lsah = (struct lsa_header *) (STREAM_DATA (s) + stream_get_putp (s));
2678
2679 /* Put LSA to Link State Request. */
2680 stream_put (s, lsa->data, ntohs (lsa->data->length));
2681
2682 /* Set LS age. */
2683 /* each hop must increment an lsa_age by transmit_delay
2684 of OSPF interface */
2685 ls_age = ls_age_increment (lsa, OSPF_IF_PARAM (oi, transmit_delay));
2686 lsah->ls_age = htons (ls_age);
2687
2688 length += ntohs (lsa->data->length);
2689 count++;
2690
2691 list_delete_node (update, node);
2692 ospf_lsa_unlock (lsa);
2693 }
2694
2695 /* Now set #LSAs. */
2696 stream_set_putp (s, pp);
2697 stream_putl (s, count);
2698
2699 stream_set_putp (s, s->endp);
2700
2701 if (IS_DEBUG_OSPF_EVENT)
2702 zlog_info("ospf_make_ls_upd: Stop");
2703 return length;
2704}
2705
2706int
2707ospf_make_ls_ack (struct ospf_interface *oi, list ack, struct stream *s)
2708{
2709 list rm_list;
2710 listnode node;
2711 u_int16_t length = OSPF_LS_ACK_MIN_SIZE;
2712 unsigned long delta = stream_get_putp(s) + 24;
2713 struct ospf_lsa *lsa;
2714
2715 rm_list = list_new ();
2716
2717 for (node = listhead (ack); node; nextnode (node))
2718 {
2719 lsa = getdata (node);
2720 assert (lsa);
2721
2722 if (length + delta > OSPF_PACKET_MAX (oi))
2723 break;
2724
2725 stream_put (s, lsa->data, OSPF_LSA_HEADER_SIZE);
2726 length += OSPF_LSA_HEADER_SIZE;
2727
2728 listnode_add (rm_list, lsa);
2729 }
2730
2731 /* Remove LSA from LS-Ack list. */
2732 for (node = listhead (rm_list); node; nextnode (node))
2733 {
2734 lsa = (struct ospf_lsa *) getdata (node);
2735
2736 listnode_delete (ack, lsa);
2737 ospf_lsa_unlock (lsa);
2738 }
2739
2740 list_delete (rm_list);
2741
2742 return length;
2743}
2744
2745void
2746ospf_hello_send_sub (struct ospf_interface *oi, struct in_addr *addr)
2747{
2748 struct ospf_packet *op;
2749 u_int16_t length = OSPF_HEADER_SIZE;
2750
2751 op = ospf_packet_new (oi->ifp->mtu);
2752
2753 /* Prepare OSPF common header. */
2754 ospf_make_header (OSPF_MSG_HELLO, oi, op->s);
2755
2756 /* Prepare OSPF Hello body. */
2757 length += ospf_make_hello (oi, op->s);
2758
2759 /* Fill OSPF header. */
2760 ospf_fill_header (oi, op->s, length);
2761
2762 /* Set packet length. */
2763 op->length = length;
2764
2765 op->dst.s_addr = addr->s_addr;
2766
2767 /* Add packet to the interface output queue. */
2768 ospf_packet_add (oi, op);
2769
2770 /* Hook thread to write packet. */
2771 OSPF_ISM_WRITE_ON ();
2772}
2773
2774void
2775ospf_poll_send (struct ospf_nbr_nbma *nbr_nbma)
2776{
2777 struct ospf_interface *oi;
2778
2779 oi = nbr_nbma->oi;
2780 assert(oi);
2781
2782 /* If this is passive interface, do not send OSPF Hello. */
2783 if (OSPF_IF_PARAM (oi, passive_interface) == OSPF_IF_PASSIVE)
2784 return;
2785
2786 if (oi->type != OSPF_IFTYPE_NBMA)
2787 return;
2788
2789 if (nbr_nbma->nbr != NULL && nbr_nbma->nbr->state != NSM_Down)
2790 return;
2791
2792 if (PRIORITY(oi) == 0)
2793 return;
2794
2795 if (nbr_nbma->priority == 0
2796 && oi->state != ISM_DR && oi->state != ISM_Backup)
2797 return;
2798
2799 ospf_hello_send_sub (oi, &nbr_nbma->addr);
2800}
2801
2802int
2803ospf_poll_timer (struct thread *thread)
2804{
2805 struct ospf_nbr_nbma *nbr_nbma;
2806
2807 nbr_nbma = THREAD_ARG (thread);
2808 nbr_nbma->t_poll = NULL;
2809
2810 if (IS_DEBUG_OSPF (nsm, NSM_TIMERS))
2811 zlog (NULL, LOG_INFO, "NSM[%s:%s]: Timer (Poll timer expire)",
2812 IF_NAME (nbr_nbma->oi), inet_ntoa (nbr_nbma->addr));
2813
2814 ospf_poll_send (nbr_nbma);
2815
2816 if (nbr_nbma->v_poll > 0)
2817 OSPF_POLL_TIMER_ON (nbr_nbma->t_poll, ospf_poll_timer,
2818 nbr_nbma->v_poll);
2819
2820 return 0;
2821}
2822
2823
2824int
2825ospf_hello_reply_timer (struct thread *thread)
2826{
2827 struct ospf_neighbor *nbr;
2828
2829 nbr = THREAD_ARG (thread);
2830 nbr->t_hello_reply = NULL;
2831
2832 assert (nbr->oi);
2833
2834 if (IS_DEBUG_OSPF (nsm, NSM_TIMERS))
2835 zlog (NULL, LOG_INFO, "NSM[%s:%s]: Timer (hello-reply timer expire)",
2836 IF_NAME (nbr->oi), inet_ntoa (nbr->router_id));
2837
2838 ospf_hello_send_sub (nbr->oi, &nbr->address.u.prefix4);
2839
2840 return 0;
2841}
2842
2843/* Send OSPF Hello. */
2844void
2845ospf_hello_send (struct ospf_interface *oi)
2846{
2847 struct ospf_packet *op;
2848 u_int16_t length = OSPF_HEADER_SIZE;
2849
2850 /* If this is passive interface, do not send OSPF Hello. */
2851 if (OSPF_IF_PARAM (oi, passive_interface) == OSPF_IF_PASSIVE)
2852 return;
2853
2854 op = ospf_packet_new (oi->ifp->mtu);
2855
2856 /* Prepare OSPF common header. */
2857 ospf_make_header (OSPF_MSG_HELLO, oi, op->s);
2858
2859 /* Prepare OSPF Hello body. */
2860 length += ospf_make_hello (oi, op->s);
2861
2862 /* Fill OSPF header. */
2863 ospf_fill_header (oi, op->s, length);
2864
2865 /* Set packet length. */
2866 op->length = length;
2867
2868 if (oi->type == OSPF_IFTYPE_NBMA)
2869 {
2870 struct ospf_neighbor *nbr;
2871 struct route_node *rn;
2872
2873 for (rn = route_top (oi->nbrs); rn; rn = route_next (rn))
2874 if ((nbr = rn->info))
2875 if (nbr != oi->nbr_self)
2876 if (nbr->state != NSM_Down)
2877 {
2878 /* RFC 2328 Section 9.5.1
2879 If the router is not eligible to become Designated Router,
2880 it must periodically send Hello Packets to both the
2881 Designated Router and the Backup Designated Router (if they
2882 exist). */
2883 if (PRIORITY(oi) == 0 &&
2884 IPV4_ADDR_CMP(&DR(oi), &nbr->address.u.prefix4) &&
2885 IPV4_ADDR_CMP(&BDR(oi), &nbr->address.u.prefix4))
2886 continue;
2887
2888 /* If the router is eligible to become Designated Router, it
2889 must periodically send Hello Packets to all neighbors that
2890 are also eligible. In addition, if the router is itself the
2891 Designated Router or Backup Designated Router, it must also
2892 send periodic Hello Packets to all other neighbors. */
2893
2894 if (nbr->priority == 0 && oi->state == ISM_DROther)
2895 continue;
2896 /* if oi->state == Waiting, send hello to all neighbors */
2897 {
2898 struct ospf_packet *op_dup;
2899
2900 op_dup = ospf_packet_dup(op);
2901 op_dup->dst = nbr->address.u.prefix4;
2902
2903 /* Add packet to the interface output queue. */
2904 ospf_packet_add (oi, op_dup);
2905
2906 OSPF_ISM_WRITE_ON ();
2907 }
2908
2909 }
2910 ospf_packet_free (op);
2911 }
2912 else
2913 {
2914 /* Decide destination address. */
2915 if (oi->type == OSPF_IFTYPE_VIRTUALLINK)
2916 op->dst.s_addr = oi->vl_data->peer_addr.s_addr;
2917 else
2918 op->dst.s_addr = htonl (OSPF_ALLSPFROUTERS);
2919
2920 /* Add packet to the interface output queue. */
2921 ospf_packet_add (oi, op);
2922
2923 /* Hook thread to write packet. */
2924 OSPF_ISM_WRITE_ON ();
2925 }
2926}
2927
2928/* Send OSPF Database Description. */
2929void
2930ospf_db_desc_send (struct ospf_neighbor *nbr)
2931{
2932 struct ospf_interface *oi;
2933 struct ospf_packet *op;
2934 u_int16_t length = OSPF_HEADER_SIZE;
2935
2936 oi = nbr->oi;
2937 op = ospf_packet_new (oi->ifp->mtu);
2938
2939 /* Prepare OSPF common header. */
2940 ospf_make_header (OSPF_MSG_DB_DESC, oi, op->s);
2941
2942 /* Prepare OSPF Database Description body. */
2943 length += ospf_make_db_desc (oi, nbr, op->s);
2944
2945 /* Fill OSPF header. */
2946 ospf_fill_header (oi, op->s, length);
2947
2948 /* Set packet length. */
2949 op->length = length;
2950
2951 /* Decide destination address. */
2952 op->dst = nbr->address.u.prefix4;
2953
2954 /* Add packet to the interface output queue. */
2955 ospf_packet_add (oi, op);
2956
2957 /* Hook thread to write packet. */
2958 OSPF_ISM_WRITE_ON ();
2959
2960 /* Remove old DD packet, then copy new one and keep in neighbor structure. */
2961 if (nbr->last_send)
2962 ospf_packet_free (nbr->last_send);
2963 nbr->last_send = ospf_packet_dup (op);
2964 gettimeofday (&nbr->last_send_ts, NULL);
2965}
2966
2967/* Re-send Database Description. */
2968void
2969ospf_db_desc_resend (struct ospf_neighbor *nbr)
2970{
2971 struct ospf_interface *oi;
2972
2973 oi = nbr->oi;
2974
2975 /* Add packet to the interface output queue. */
2976 ospf_packet_add (oi, ospf_packet_dup (nbr->last_send));
2977
2978 /* Hook thread to write packet. */
2979 OSPF_ISM_WRITE_ON ();
2980}
2981
2982/* Send Link State Request. */
2983void
2984ospf_ls_req_send (struct ospf_neighbor *nbr)
2985{
2986 struct ospf_interface *oi;
2987 struct ospf_packet *op;
2988 u_int16_t length = OSPF_HEADER_SIZE;
2989
2990 oi = nbr->oi;
2991 op = ospf_packet_new (oi->ifp->mtu);
2992
2993 /* Prepare OSPF common header. */
2994 ospf_make_header (OSPF_MSG_LS_REQ, oi, op->s);
2995
2996 /* Prepare OSPF Link State Request body. */
2997 length += ospf_make_ls_req (nbr, op->s);
2998 if (length == OSPF_HEADER_SIZE)
2999 {
3000 ospf_packet_free (op);
3001 return;
3002 }
3003
3004 /* Fill OSPF header. */
3005 ospf_fill_header (oi, op->s, length);
3006
3007 /* Set packet length. */
3008 op->length = length;
3009
3010 /* Decide destination address. */
3011 op->dst = nbr->address.u.prefix4;
3012
3013 /* Add packet to the interface output queue. */
3014 ospf_packet_add (oi, op);
3015
3016 /* Hook thread to write packet. */
3017 OSPF_ISM_WRITE_ON ();
3018
3019 /* Add Link State Request Retransmission Timer. */
3020 OSPF_NSM_TIMER_ON (nbr->t_ls_req, ospf_ls_req_timer, nbr->v_ls_req);
3021}
3022
3023/* Send Link State Update with an LSA. */
3024void
3025ospf_ls_upd_send_lsa (struct ospf_neighbor *nbr, struct ospf_lsa *lsa,
3026 int flag)
3027{
3028 list update;
3029
3030 update = list_new ();
3031
3032 listnode_add (update, lsa);
3033 ospf_ls_upd_send (nbr, update, flag);
3034
3035 list_delete (update);
3036}
3037
3038static void
3039ospf_ls_upd_queue_send (struct ospf_interface *oi, list update,
3040 struct in_addr addr)
3041{
3042 struct ospf_packet *op;
3043 u_int16_t length = OSPF_HEADER_SIZE;
3044
3045 if (IS_DEBUG_OSPF_EVENT)
3046 zlog_info ("listcount = %d, dst %s", listcount (update), inet_ntoa(addr));
3047
3048 op = ospf_packet_new (oi->ifp->mtu);
3049
3050 /* Prepare OSPF common header. */
3051 ospf_make_header (OSPF_MSG_LS_UPD, oi, op->s);
3052
3053 /* Prepare OSPF Link State Update body. */
3054 /* Includes Type-7 translation. */
3055 length += ospf_make_ls_upd (oi, update, op->s);
3056
3057 /* Fill OSPF header. */
3058 ospf_fill_header (oi, op->s, length);
3059
3060 /* Set packet length. */
3061 op->length = length;
3062
3063 /* Decide destination address. */
3064 op->dst.s_addr = addr.s_addr;
3065
3066 /* Add packet to the interface output queue. */
3067 ospf_packet_add (oi, op);
3068
3069 /* Hook thread to write packet. */
3070 OSPF_ISM_WRITE_ON ();
3071}
3072
3073static int
3074ospf_ls_upd_send_queue_event (struct thread *thread)
3075{
3076 struct ospf_interface *oi = THREAD_ARG(thread);
3077 struct route_node *rn;
3078
3079 oi->t_ls_upd_event = NULL;
3080
3081 if (IS_DEBUG_OSPF_EVENT)
3082 zlog_info ("ospf_ls_upd_send_queue start");
3083
3084 for (rn = route_top (oi->ls_upd_queue); rn; rn = route_next (rn))
3085 {
3086 if (rn->info == NULL)
3087 continue;
3088
3089 while (!list_isempty ((list)rn->info))
3090 ospf_ls_upd_queue_send (oi, rn->info, rn->p.u.prefix4);
3091
3092 list_delete (rn->info);
3093 rn->info = NULL;
3094
3095 route_unlock_node (rn);
3096 }
3097
3098 if (IS_DEBUG_OSPF_EVENT)
3099 zlog_info ("ospf_ls_upd_send_queue stop");
3100 return 0;
3101}
3102
3103void
3104ospf_ls_upd_send (struct ospf_neighbor *nbr, list update, int flag)
3105{
3106 struct ospf_interface *oi;
3107 struct prefix_ipv4 p;
3108 struct route_node *rn;
3109 listnode n;
3110
3111 oi = nbr->oi;
3112
3113 p.family = AF_INET;
3114 p.prefixlen = IPV4_MAX_BITLEN;
3115
3116 /* Decide destination address. */
3117 if (oi->type == OSPF_IFTYPE_VIRTUALLINK)
3118 p.prefix = oi->vl_data->peer_addr;
3119 else if (flag == OSPF_SEND_PACKET_DIRECT)
3120 p.prefix = nbr->address.u.prefix4;
3121 else if (oi->state == ISM_DR || oi->state == ISM_Backup)
3122 p.prefix.s_addr = htonl (OSPF_ALLSPFROUTERS);
3123 else if ((oi->type == OSPF_IFTYPE_POINTOPOINT)
3124 && (flag == OSPF_SEND_PACKET_INDIRECT))
3125 p.prefix.s_addr = htonl (OSPF_ALLSPFROUTERS);
3126 else
3127 p.prefix.s_addr = htonl (OSPF_ALLDROUTERS);
3128
3129 if (oi->type == OSPF_IFTYPE_NBMA)
3130 {
3131 if (flag == OSPF_SEND_PACKET_INDIRECT)
3132 zlog_warn ("* LS-Update is directly sent on NBMA network.");
3133 if (IPV4_ADDR_SAME(&oi->address->u.prefix4, &p.prefix.s_addr))
3134 zlog_warn ("* LS-Update is sent to myself.");
3135 }
3136
3137 rn = route_node_get (oi->ls_upd_queue, (struct prefix *) &p);
3138
3139 if (rn->info == NULL)
3140 rn->info = list_new ();
3141
3142 for (n = listhead (update); n; nextnode (n))
3143 listnode_add (rn->info, ospf_lsa_lock (getdata (n)));
3144
3145 if (oi->t_ls_upd_event == NULL)
3146 oi->t_ls_upd_event =
3147 thread_add_event (master, ospf_ls_upd_send_queue_event, oi, 0);
3148}
3149
3150static void
3151ospf_ls_ack_send_list (struct ospf_interface *oi, list ack, struct in_addr dst)
3152{
3153 struct ospf_packet *op;
3154 u_int16_t length = OSPF_HEADER_SIZE;
3155
3156 op = ospf_packet_new (oi->ifp->mtu);
3157
3158 /* Prepare OSPF common header. */
3159 ospf_make_header (OSPF_MSG_LS_ACK, oi, op->s);
3160
3161 /* Prepare OSPF Link State Acknowledgment body. */
3162 length += ospf_make_ls_ack (oi, ack, op->s);
3163
3164 /* Fill OSPF header. */
3165 ospf_fill_header (oi, op->s, length);
3166
3167 /* Set packet length. */
3168 op->length = length;
3169
3170 /* Set destination IP address. */
3171 op->dst = dst;
3172
3173 /* Add packet to the interface output queue. */
3174 ospf_packet_add (oi, op);
3175
3176 /* Hook thread to write packet. */
3177 OSPF_ISM_WRITE_ON ();
3178}
3179
3180static int
3181ospf_ls_ack_send_event (struct thread *thread)
3182{
3183 struct ospf_interface *oi = THREAD_ARG (thread);
3184
3185 oi->t_ls_ack_direct = NULL;
3186
3187 while (listcount (oi->ls_ack_direct.ls_ack))
3188 ospf_ls_ack_send_list (oi, oi->ls_ack_direct.ls_ack,
3189 oi->ls_ack_direct.dst);
3190
3191 return 0;
3192}
3193
3194void
3195ospf_ls_ack_send (struct ospf_neighbor *nbr, struct ospf_lsa *lsa)
3196{
3197 struct ospf_interface *oi = nbr->oi;
3198
3199 if (listcount (oi->ls_ack_direct.ls_ack) == 0)
3200 oi->ls_ack_direct.dst = nbr->address.u.prefix4;
3201
3202 listnode_add (oi->ls_ack_direct.ls_ack, ospf_lsa_lock (lsa));
3203
3204 if (oi->t_ls_ack_direct == NULL)
3205 oi->t_ls_ack_direct =
3206 thread_add_event (master, ospf_ls_ack_send_event, oi, 0);
3207}
3208
3209/* Send Link State Acknowledgment delayed. */
3210void
3211ospf_ls_ack_send_delayed (struct ospf_interface *oi)
3212{
3213 struct in_addr dst;
3214
3215 /* Decide destination address. */
3216 /* RFC2328 Section 13.5 On non-broadcast
3217 networks, delayed Link State Acknowledgment packets must be
3218 unicast separately over each adjacency (i.e., neighbor whose
3219 state is >= Exchange). */
3220 if (oi->type == OSPF_IFTYPE_NBMA)
3221 {
3222 struct ospf_neighbor *nbr;
3223 struct route_node *rn;
3224
3225 for (rn = route_top (oi->nbrs); rn; rn = route_next (rn))
3226 if ((nbr = rn->info) != NULL)
3227 if (nbr != oi->nbr_self && nbr->state >= NSM_Exchange)
3228 while (listcount (oi->ls_ack))
3229 ospf_ls_ack_send_list (oi, oi->ls_ack, nbr->address.u.prefix4);
3230 return;
3231 }
3232 if (oi->type == OSPF_IFTYPE_VIRTUALLINK)
3233 dst.s_addr = oi->vl_data->peer_addr.s_addr;
3234 else if (oi->state == ISM_DR || oi->state == ISM_Backup)
3235 dst.s_addr = htonl (OSPF_ALLSPFROUTERS);
3236 else if (oi->type == OSPF_IFTYPE_POINTOPOINT)
3237 dst.s_addr = htonl (OSPF_ALLSPFROUTERS);
3238 else
3239 dst.s_addr = htonl (OSPF_ALLDROUTERS);
3240
3241 while (listcount (oi->ls_ack))
3242 ospf_ls_ack_send_list (oi, oi->ls_ack, dst);
3243}