blob: 44c858506048ff428d0801d888b9e1675712d0f3 [file] [log] [blame]
paul718e3742002-12-13 20:15:29 +00001/* BGP attributes management routines.
2 Copyright (C) 1996, 97, 98, 1999 Kunihiro Ishiguro
3
4This file is part of GNU Zebra.
5
6GNU Zebra is free software; you can redistribute it and/or modify it
7under the terms of the GNU General Public License as published by the
8Free Software Foundation; either version 2, or (at your option) any
9later version.
10
11GNU Zebra is distributed in the hope that it will be useful, but
12WITHOUT ANY WARRANTY; without even the implied warranty of
13MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14General Public License for more details.
15
16You should have received a copy of the GNU General Public License
17along with GNU Zebra; see the file COPYING. If not, write to the Free
18Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
1902111-1307, USA. */
20
21#include <zebra.h>
22
23#include "linklist.h"
24#include "prefix.h"
25#include "memory.h"
26#include "vector.h"
27#include "vty.h"
28#include "stream.h"
29#include "log.h"
30#include "hash.h"
31
32#include "bgpd/bgpd.h"
33#include "bgpd/bgp_attr.h"
34#include "bgpd/bgp_route.h"
35#include "bgpd/bgp_aspath.h"
36#include "bgpd/bgp_community.h"
37#include "bgpd/bgp_debug.h"
38#include "bgpd/bgp_packet.h"
39#include "bgpd/bgp_ecommunity.h"
40
41/* Attribute strings for logging. */
42struct message attr_str [] =
43{
44 { BGP_ATTR_ORIGIN, "ORIGIN" },
45 { BGP_ATTR_AS_PATH, "AS_PATH" },
46 { BGP_ATTR_NEXT_HOP, "NEXT_HOP" },
47 { BGP_ATTR_MULTI_EXIT_DISC, "MULTI_EXIT_DISC" },
48 { BGP_ATTR_LOCAL_PREF, "LOCAL_PREF" },
49 { BGP_ATTR_ATOMIC_AGGREGATE, "ATOMIC_AGGREGATE" },
50 { BGP_ATTR_AGGREGATOR, "AGGREGATOR" },
51 { BGP_ATTR_COMMUNITIES, "COMMUNITY" },
52 { BGP_ATTR_ORIGINATOR_ID, "ORIGINATOR_ID" },
53 { BGP_ATTR_CLUSTER_LIST, "CLUSTERLIST" },
54 { BGP_ATTR_DPA, "DPA" },
55 { BGP_ATTR_ADVERTISER, "ADVERTISER"} ,
56 { BGP_ATTR_RCID_PATH, "RCID_PATH" },
57 { BGP_ATTR_MP_REACH_NLRI, "MP_REACH_NLRI" },
58 { BGP_ATTR_MP_UNREACH_NLRI, "MP_UNREACH_NLRI" },
59 { 0, NULL }
60};
61
62struct hash *cluster_hash;
63
64void *
65cluster_hash_alloc (struct cluster_list *val)
66{
67 struct cluster_list *cluster;
68
69 cluster = XMALLOC (MTYPE_CLUSTER, sizeof (struct cluster_list));
70 cluster->length = val->length;
71
72 if (cluster->length)
73 {
74 cluster->list = XMALLOC (MTYPE_CLUSTER_VAL, val->length);
75 memcpy (cluster->list, val->list, val->length);
76 }
77 else
78 cluster->list = NULL;
79
80 cluster->refcnt = 0;
81
82 return cluster;
83}
84
85/* Cluster list related functions. */
86struct cluster_list *
paul5228ad22004-06-04 17:58:18 +000087cluster_parse (struct in_addr * pnt, int length)
paul718e3742002-12-13 20:15:29 +000088{
89 struct cluster_list tmp;
90 struct cluster_list *cluster;
91
92 tmp.length = length;
paul5228ad22004-06-04 17:58:18 +000093 tmp.list = pnt;
paul718e3742002-12-13 20:15:29 +000094
95 cluster = hash_get (cluster_hash, &tmp, cluster_hash_alloc);
96 cluster->refcnt++;
97 return cluster;
98}
99
100int
101cluster_loop_check (struct cluster_list *cluster, struct in_addr originator)
102{
103 int i;
104
105 for (i = 0; i < cluster->length / 4; i++)
106 if (cluster->list[i].s_addr == originator.s_addr)
107 return 1;
108 return 0;
109}
110
111unsigned int
112cluster_hash_key_make (struct cluster_list *cluster)
113{
114 unsigned int key = 0;
115 int length;
116 caddr_t pnt;
117
118 length = cluster->length;
119 pnt = (caddr_t) cluster->list;
120
121 while (length)
122 key += pnt[--length];
123
124 return key;
125}
126
127int
128cluster_hash_cmp (struct cluster_list *cluster1, struct cluster_list *cluster2)
129{
130 if (cluster1->length == cluster2->length &&
131 memcmp (cluster1->list, cluster2->list, cluster1->length) == 0)
132 return 1;
133 return 0;
134}
135
136void
137cluster_free (struct cluster_list *cluster)
138{
139 if (cluster->list)
140 XFREE (MTYPE_CLUSTER_VAL, cluster->list);
141 XFREE (MTYPE_CLUSTER, cluster);
142}
143
144struct cluster_list *
145cluster_dup (struct cluster_list *cluster)
146{
147 struct cluster_list *new;
148
149 new = XMALLOC (MTYPE_CLUSTER, sizeof (struct cluster_list));
150 memset (new, 0, sizeof (struct cluster_list));
151 new->length = cluster->length;
152
153 if (cluster->length)
154 {
155 new->list = XMALLOC (MTYPE_CLUSTER_VAL, cluster->length);
156 memcpy (new->list, cluster->list, cluster->length);
157 }
158 else
159 new->list = NULL;
160
161 return new;
162}
163
164struct cluster_list *
165cluster_intern (struct cluster_list *cluster)
166{
167 struct cluster_list *find;
168
169 find = hash_get (cluster_hash, cluster, cluster_hash_alloc);
170 find->refcnt++;
171
172 return find;
173}
174
175void
176cluster_unintern (struct cluster_list *cluster)
177{
178 struct cluster_list *ret;
179
180 if (cluster->refcnt)
181 cluster->refcnt--;
182
183 if (cluster->refcnt == 0)
184 {
185 ret = hash_release (cluster_hash, cluster);
186 cluster_free (cluster);
187 }
188}
189
190void
191cluster_init ()
192{
193 cluster_hash = hash_create (cluster_hash_key_make, cluster_hash_cmp);
194}
195
196/* Unknown transit attribute. */
197struct hash *transit_hash;
198
199void
200transit_free (struct transit *transit)
201{
202 if (transit->val)
203 XFREE (MTYPE_TRANSIT_VAL, transit->val);
204 XFREE (MTYPE_TRANSIT, transit);
205}
206
207void *
208transit_hash_alloc (struct transit *transit)
209{
210 /* Transit structure is already allocated. */
211 return transit;
212}
213
214struct transit *
215transit_intern (struct transit *transit)
216{
217 struct transit *find;
218
219 find = hash_get (transit_hash, transit, transit_hash_alloc);
220 if (find != transit)
221 transit_free (transit);
222 find->refcnt++;
223
224 return find;
225}
226
227void
228transit_unintern (struct transit *transit)
229{
230 struct transit *ret;
231
232 if (transit->refcnt)
233 transit->refcnt--;
234
235 if (transit->refcnt == 0)
236 {
237 ret = hash_release (transit_hash, transit);
238 transit_free (transit);
239 }
240}
241
242unsigned int
243transit_hash_key_make (struct transit *transit)
244{
245 unsigned int key = 0;
246 int length;
247 caddr_t pnt;
248
249 length = transit->length;
250 pnt = (caddr_t) transit->val;
251
252 while (length)
253 key += pnt[--length];
254
255 return key;
256}
257
258int
259transit_hash_cmp (struct transit *transit1, struct transit *transit2)
260{
261 if (transit1->length == transit2->length &&
262 memcmp (transit1->val, transit2->val, transit1->length) == 0)
263 return 1;
264 return 0;
265}
266
267void
268transit_init ()
269{
270 transit_hash = hash_create (transit_hash_key_make, transit_hash_cmp);
271}
272
273/* Attribute hash routines. */
274
275struct hash *attrhash;
276
277unsigned int
278attrhash_key_make (struct attr *attr)
279{
280 unsigned int key = 0;
281
282 key += attr->origin;
283 key += attr->nexthop.s_addr;
284 key += attr->med;
285 key += attr->local_pref;
286 key += attr->aggregator_as;
287 key += attr->aggregator_addr.s_addr;
288 key += attr->weight;
289
290 key += attr->mp_nexthop_global_in.s_addr;
291 if (attr->aspath)
292 key += aspath_key_make (attr->aspath);
293 if (attr->community)
294 key += community_hash_make (attr->community);
295 if (attr->ecommunity)
296 key += ecommunity_hash_make (attr->ecommunity);
297 if (attr->cluster)
298 key += cluster_hash_key_make (attr->cluster);
299 if (attr->transit)
300 key += transit_hash_key_make (attr->transit);
301
302#ifdef HAVE_IPV6
303 {
304 int i;
305
306 key += attr->mp_nexthop_len;
307 for (i = 0; i < 16; i++)
308 key += attr->mp_nexthop_global.s6_addr[i];
309 for (i = 0; i < 16; i++)
310 key += attr->mp_nexthop_local.s6_addr[i];
311 }
312#endif /* HAVE_IPV6 */
313
314 return key;
315}
316
317int
318attrhash_cmp (struct attr *attr1, struct attr *attr2)
319{
320 if (attr1->flag == attr2->flag
321 && attr1->origin == attr2->origin
322 && attr1->nexthop.s_addr == attr2->nexthop.s_addr
323 && attr1->med == attr2->med
324 && attr1->local_pref == attr2->local_pref
325 && attr1->aggregator_as == attr2->aggregator_as
326 && attr1->aggregator_addr.s_addr == attr2->aggregator_addr.s_addr
327 && attr1->weight == attr2->weight
328#ifdef HAVE_IPV6
329 && attr1->mp_nexthop_len == attr2->mp_nexthop_len
330 && IPV6_ADDR_SAME (&attr1->mp_nexthop_global, &attr2->mp_nexthop_global)
331 && IPV6_ADDR_SAME (&attr1->mp_nexthop_local, &attr2->mp_nexthop_local)
332#endif /* HAVE_IPV6 */
333 && IPV4_ADDR_SAME (&attr1->mp_nexthop_global_in, &attr2->mp_nexthop_global_in)
334 && attr1->aspath == attr2->aspath
335 && attr1->community == attr2->community
336 && attr1->ecommunity == attr2->ecommunity
337 && attr1->cluster == attr2->cluster
338 && attr1->transit == attr2->transit)
339 return 1;
340 else
341 return 0;
342}
343
344void
345attrhash_init ()
346{
347 attrhash = hash_create (attrhash_key_make, attrhash_cmp);
348}
349
350void
351attr_show_all_iterator (struct hash_backet *backet, struct vty *vty)
352{
353 struct attr *attr = backet->data;
354
355 vty_out (vty, "attr[%ld] nexthop %s%s", attr->refcnt,
356 inet_ntoa (attr->nexthop), VTY_NEWLINE);
357}
358
359void
360attr_show_all (struct vty *vty)
361{
362 hash_iterate (attrhash,
363 (void (*)(struct hash_backet *, void *))
364 attr_show_all_iterator,
365 vty);
366}
367
368void *
369bgp_attr_hash_alloc (struct attr *val)
370{
371 struct attr *attr;
372
373 attr = XMALLOC (MTYPE_ATTR, sizeof (struct attr));
374 *attr = *val;
375 attr->refcnt = 0;
376 return attr;
377}
378
379/* Internet argument attribute. */
380struct attr *
381bgp_attr_intern (struct attr *attr)
382{
383 struct attr *find;
384
385 /* Intern referenced strucutre. */
386 if (attr->aspath)
387 {
388 if (! attr->aspath->refcnt)
389 attr->aspath = aspath_intern (attr->aspath);
390 else
391 attr->aspath->refcnt++;
392 }
393 if (attr->community)
394 {
395 if (! attr->community->refcnt)
396 attr->community = community_intern (attr->community);
397 else
398 attr->community->refcnt++;
399 }
400 if (attr->ecommunity)
401 {
402 if (! attr->ecommunity->refcnt)
403 attr->ecommunity = ecommunity_intern (attr->ecommunity);
404 else
405 attr->ecommunity->refcnt++;
406 }
407 if (attr->cluster)
408 {
409 if (! attr->cluster->refcnt)
410 attr->cluster = cluster_intern (attr->cluster);
411 else
412 attr->cluster->refcnt++;
413 }
414 if (attr->transit)
415 {
416 if (! attr->transit->refcnt)
417 attr->transit = transit_intern (attr->transit);
418 else
419 attr->transit->refcnt++;
420 }
421
422 find = (struct attr *) hash_get (attrhash, attr, bgp_attr_hash_alloc);
423 find->refcnt++;
424
425 return find;
426}
427
428/* Make network statement's attribute. */
429struct attr *
430bgp_attr_default_set (struct attr *attr, u_char origin)
431{
432 memset (attr, 0, sizeof (struct attr));
433
434 attr->origin = origin;
435 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_ORIGIN);
436 attr->aspath = aspath_empty ();
437 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_AS_PATH);
438 attr->weight = 32768;
439 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP);
440#ifdef HAVE_IPV6
441 attr->mp_nexthop_len = 16;
442#endif
443 return attr;
444}
445
446/* Make network statement's attribute. */
447struct attr *
448bgp_attr_default_intern (u_char origin)
449{
450 struct attr attr;
451 struct attr *new;
452
453 memset (&attr, 0, sizeof (struct attr));
454
455 attr.origin = origin;
456 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_ORIGIN);
457 attr.aspath = aspath_empty ();
458 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_AS_PATH);
459 attr.weight = 32768;
460 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP);
461#ifdef HAVE_IPV6
462 attr.mp_nexthop_len = 16;
463#endif
464
465 new = bgp_attr_intern (&attr);
466 aspath_unintern (new->aspath);
467 return new;
468}
469
470struct attr *
471bgp_attr_aggregate_intern (struct bgp *bgp, u_char origin,
472 struct aspath *aspath,
473 struct community *community, int as_set)
474{
475 struct attr attr;
476 struct attr *new;
477
478 memset (&attr, 0, sizeof (struct attr));
479
480 /* Origin attribute. */
481 attr.origin = origin;
482 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_ORIGIN);
483
484 /* AS path attribute. */
485 if (aspath)
486 attr.aspath = aspath_intern (aspath);
487 else
488 attr.aspath = aspath_empty ();
489 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_AS_PATH);
490
491 /* Next hop attribute. */
492 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP);
493
494 if (community)
495 {
496 attr.community = community;
497 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_COMMUNITIES);
498 }
499
500 attr.weight = 32768;
501#ifdef HAVE_IPV6
502 attr.mp_nexthop_len = 16;
503#endif
504 if (! as_set)
505 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE);
506 attr.flag |= ATTR_FLAG_BIT (BGP_ATTR_AGGREGATOR);
507 if (CHECK_FLAG (bgp->config, BGP_CONFIG_CONFEDERATION))
508 attr.aggregator_as = bgp->confed_id;
509 else
510 attr.aggregator_as = bgp->as;
511 attr.aggregator_addr = bgp->router_id;
512
513 new = bgp_attr_intern (&attr);
514 aspath_unintern (new->aspath);
515 return new;
516}
517
518/* Free bgp attribute and aspath. */
519void
520bgp_attr_unintern (struct attr *attr)
521{
522 struct attr *ret;
523 struct aspath *aspath;
524 struct community *community;
525 struct ecommunity *ecommunity;
526 struct cluster_list *cluster;
527 struct transit *transit;
528
529 /* Decrement attribute reference. */
530 attr->refcnt--;
531 aspath = attr->aspath;
532 community = attr->community;
533 ecommunity = attr->ecommunity;
534 cluster = attr->cluster;
535 transit = attr->transit;
536
537 /* If reference becomes zero then free attribute object. */
538 if (attr->refcnt == 0)
539 {
540 ret = hash_release (attrhash, attr);
541 assert (ret != NULL);
542 XFREE (MTYPE_ATTR, attr);
543 }
544
545 /* aspath refcount shoud be decrement. */
546 if (aspath)
547 aspath_unintern (aspath);
548 if (community)
549 community_unintern (community);
550 if (ecommunity)
551 ecommunity_unintern (ecommunity);
552 if (cluster)
553 cluster_unintern (cluster);
554 if (transit)
555 transit_unintern (transit);
556}
557
558void
559bgp_attr_flush (struct attr *attr)
560{
561 if (attr->aspath && ! attr->aspath->refcnt)
562 aspath_free (attr->aspath);
563 if (attr->community && ! attr->community->refcnt)
564 community_free (attr->community);
565 if (attr->ecommunity && ! attr->ecommunity->refcnt)
566 ecommunity_free (attr->ecommunity);
567 if (attr->cluster && ! attr->cluster->refcnt)
568 cluster_free (attr->cluster);
569 if (attr->transit && ! attr->transit->refcnt)
570 transit_free (attr->transit);
571}
572
573/* Get origin attribute of the update message. */
574int
575bgp_attr_origin (struct peer *peer, bgp_size_t length,
576 struct attr *attr, u_char flag, u_char *startp)
577{
578 bgp_size_t total;
579
580 /* total is entire attribute length include Attribute Flags (1),
581 Attribute Type code (1) and Attribute length (1 or 2). */
582 total = length + (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN) ? 4 : 3);
583
584 /* If any recognized attribute has Attribute Flags that conflict
585 with the Attribute Type Code, then the Error Subcode is set to
586 Attribute Flags Error. The Data field contains the erroneous
587 attribute (type, length and value). */
588 if (flag != BGP_ATTR_FLAG_TRANS)
589 {
590 zlog (peer->log, LOG_ERR,
591 "Origin attribute flag isn't transitive %d", flag);
592 bgp_notify_send_with_data (peer,
593 BGP_NOTIFY_UPDATE_ERR,
594 BGP_NOTIFY_UPDATE_ATTR_FLAG_ERR,
595 startp, total);
596 return -1;
597 }
598
599 /* If any recognized attribute has Attribute Length that conflicts
600 with the expected length (based on the attribute type code), then
601 the Error Subcode is set to Attribute Length Error. The Data
602 field contains the erroneous attribute (type, length and
603 value). */
604 if (length != 1)
605 {
606 zlog (peer->log, LOG_ERR, "Origin attribute length is not one %d",
607 length);
608 bgp_notify_send_with_data (peer, BGP_NOTIFY_UPDATE_ERR,
609 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR,
610 startp, total);
611 return -1;
612 }
613
614 /* Fetch origin attribute. */
615 attr->origin = stream_getc (BGP_INPUT (peer));
616
617 /* If the ORIGIN attribute has an undefined value, then the Error
618 Subcode is set to Invalid Origin Attribute. The Data field
619 contains the unrecognized attribute (type, length and value). */
620 if ((attr->origin != BGP_ORIGIN_IGP)
621 && (attr->origin != BGP_ORIGIN_EGP)
622 && (attr->origin != BGP_ORIGIN_INCOMPLETE))
623 {
624 zlog (peer->log, LOG_ERR, "Origin attribute value is invalid %d",
625 attr->origin);
626
627 bgp_notify_send_with_data (peer,
628 BGP_NOTIFY_UPDATE_ERR,
629 BGP_NOTIFY_UPDATE_INVAL_ORIGIN,
630 startp, total);
631 return -1;
632 }
633
634 /* Set oring attribute flag. */
635 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_ORIGIN);
636
637 return 0;
638}
639
640/* Parse AS path information. This function is wrapper of
641 aspath_parse. */
642int
643bgp_attr_aspath (struct peer *peer, bgp_size_t length,
644 struct attr *attr, u_char flag, u_char *startp)
645{
646 struct bgp *bgp;
647 struct aspath *aspath;
648 bgp_size_t total;
649
650 total = length + (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN) ? 4 : 3);
651
652 /* Flag check. */
653 if (CHECK_FLAG (flag, BGP_ATTR_FLAG_OPTIONAL)
654 || ! CHECK_FLAG (flag, BGP_ATTR_FLAG_TRANS))
655 {
656 zlog (peer->log, LOG_ERR,
657 "Origin attribute flag isn't transitive %d", flag);
658 bgp_notify_send_with_data (peer,
659 BGP_NOTIFY_UPDATE_ERR,
660 BGP_NOTIFY_UPDATE_ATTR_FLAG_ERR,
661 startp, total);
662 return -1;
663 }
664
665 /* In case of IBGP, length will be zero. */
666 attr->aspath = aspath_parse (stream_pnt (peer->ibuf), length);
667 if (! attr->aspath)
668 {
669 zlog (peer->log, LOG_ERR, "Malformed AS path length is %d", length);
670 bgp_notify_send (peer,
671 BGP_NOTIFY_UPDATE_ERR,
672 BGP_NOTIFY_UPDATE_MAL_AS_PATH);
673 return -1;
674 }
675
676 bgp = peer->bgp;
677
678 /* First AS check for EBGP. */
679 if (bgp != NULL && bgp_flag_check (bgp, BGP_FLAG_ENFORCE_FIRST_AS))
680 {
681 if (peer_sort (peer) == BGP_PEER_EBGP
682 && ! aspath_firstas_check (attr->aspath, peer->as))
683 {
684 zlog (peer->log, LOG_ERR,
685 "%s incorrect first AS (must be %d)", peer->host, peer->as);
686 bgp_notify_send (peer,
687 BGP_NOTIFY_UPDATE_ERR,
688 BGP_NOTIFY_UPDATE_MAL_AS_PATH);
689 return -1;
690 }
691 }
692
693 /* local-as prepend */
694 if (peer->change_local_as &&
695 ! CHECK_FLAG (peer->flags, PEER_FLAG_LOCAL_AS_NO_PREPEND))
696 {
697 aspath = aspath_dup (attr->aspath);
698 aspath = aspath_add_seq (aspath, peer->change_local_as);
699 aspath_unintern (attr->aspath);
700 attr->aspath = aspath_intern (aspath);
701 }
702
703 /* Forward pointer. */
704 stream_forward (peer->ibuf, length);
705
706 /* Set aspath attribute flag. */
707 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_AS_PATH);
708
709 return 0;
710}
711
712/* Nexthop attribute. */
713int
714bgp_attr_nexthop (struct peer *peer, bgp_size_t length,
715 struct attr *attr, u_char flag, u_char *startp)
716{
717 bgp_size_t total;
718
719 total = length + (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN) ? 4 : 3);
720
721 /* Flag check. */
722 if (CHECK_FLAG (flag, BGP_ATTR_FLAG_OPTIONAL)
723 || ! CHECK_FLAG (flag, BGP_ATTR_FLAG_TRANS))
724 {
725 zlog (peer->log, LOG_ERR,
726 "Origin attribute flag isn't transitive %d", flag);
727 bgp_notify_send_with_data (peer,
728 BGP_NOTIFY_UPDATE_ERR,
729 BGP_NOTIFY_UPDATE_ATTR_FLAG_ERR,
730 startp, total);
731 return -1;
732 }
733
734 /* Check nexthop attribute length. */
735 if (length != 4)
736 {
737 zlog (peer->log, LOG_ERR, "Nexthop attribute length isn't four [%d]",
738 length);
739
740 bgp_notify_send_with_data (peer,
741 BGP_NOTIFY_UPDATE_ERR,
742 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR,
743 startp, total);
744 return -1;
745 }
746
747 attr->nexthop.s_addr = stream_get_ipv4 (peer->ibuf);
748 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP);
749
750 return 0;
751}
752
753/* MED atrribute. */
754int
755bgp_attr_med (struct peer *peer, bgp_size_t length,
756 struct attr *attr, u_char flag, u_char *startp)
757{
758 bgp_size_t total;
759
760 total = length + (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN) ? 4 : 3);
761
762 /* Length check. */
763 if (length != 4)
764 {
765 zlog (peer->log, LOG_ERR,
766 "MED attribute length isn't four [%d]", length);
767
768 bgp_notify_send_with_data (peer,
769 BGP_NOTIFY_UPDATE_ERR,
770 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR,
771 startp, total);
772 return -1;
773 }
774
775 attr->med = stream_getl (peer->ibuf);
776
777 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC);
778
779 return 0;
780}
781
782/* Local preference attribute. */
783int
784bgp_attr_local_pref (struct peer *peer, bgp_size_t length,
785 struct attr *attr, u_char flag)
786{
787 /* If it is contained in an UPDATE message that is received from an
788 external peer, then this attribute MUST be ignored by the
789 receiving speaker. */
790 if (peer_sort (peer) == BGP_PEER_EBGP)
791 {
792 stream_forward (peer->ibuf, length);
793 return 0;
794 }
795
796 if (length == 4)
797 attr->local_pref = stream_getl (peer->ibuf);
798 else
799 attr->local_pref = 0;
800
801 /* Set atomic aggregate flag. */
802 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF);
803
804 return 0;
805}
806
807/* Atomic aggregate. */
808int
809bgp_attr_atomic (struct peer *peer, bgp_size_t length,
810 struct attr *attr, u_char flag)
811{
812 if (length != 0)
813 {
814 zlog (peer->log, LOG_ERR, "Bad atomic aggregate length %d", length);
815
816 bgp_notify_send (peer,
817 BGP_NOTIFY_UPDATE_ERR,
818 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
819 return -1;
820 }
821
822 /* Set atomic aggregate flag. */
823 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE);
824
825 return 0;
826}
827
828/* Aggregator attribute */
829int
830bgp_attr_aggregator (struct peer *peer, bgp_size_t length,
831 struct attr *attr, u_char flag)
832{
833 if (length != 6)
834 {
835 zlog (peer->log, LOG_ERR, "Aggregator length is not 6 [%d]", length);
836
837 bgp_notify_send (peer,
838 BGP_NOTIFY_UPDATE_ERR,
839 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
840 return -1;
841 }
842 attr->aggregator_as = stream_getw (peer->ibuf);
843 attr->aggregator_addr.s_addr = stream_get_ipv4 (peer->ibuf);
844
845 /* Set atomic aggregate flag. */
846 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_AGGREGATOR);
847
848 return 0;
849}
850
851/* Community attribute. */
852int
853bgp_attr_community (struct peer *peer, bgp_size_t length,
854 struct attr *attr, u_char flag)
855{
856 if (length == 0)
857 attr->community = NULL;
858 else
859 {
paul5228ad22004-06-04 17:58:18 +0000860 attr->community =
861 community_parse ((u_int32_t *)stream_pnt (peer->ibuf), length);
paul718e3742002-12-13 20:15:29 +0000862 stream_forward (peer->ibuf, length);
863 }
864
865 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_COMMUNITIES);
866
867 return 0;
868}
869
870/* Originator ID attribute. */
871int
872bgp_attr_originator_id (struct peer *peer, bgp_size_t length,
873 struct attr *attr, u_char flag)
874{
875 if (length != 4)
876 {
877 zlog (peer->log, LOG_ERR, "Bad originator ID length %d", length);
878
879 bgp_notify_send (peer,
880 BGP_NOTIFY_UPDATE_ERR,
881 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
882 return -1;
883 }
884
885 attr->originator_id.s_addr = stream_get_ipv4 (peer->ibuf);
886
887 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_ORIGINATOR_ID);
888
889 return 0;
890}
891
892/* Cluster list attribute. */
893int
894bgp_attr_cluster_list (struct peer *peer, bgp_size_t length,
895 struct attr *attr, u_char flag)
896{
897 /* Check length. */
898 if (length % 4)
899 {
900 zlog (peer->log, LOG_ERR, "Bad cluster list length %d", length);
901
902 bgp_notify_send (peer,
903 BGP_NOTIFY_UPDATE_ERR,
904 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
905 return -1;
906 }
907
paul5228ad22004-06-04 17:58:18 +0000908 attr->cluster = cluster_parse ((struct in_addr *)stream_pnt (peer->ibuf),
909 length);
paul718e3742002-12-13 20:15:29 +0000910
911 stream_forward (peer->ibuf, length);;
912
913 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_CLUSTER_LIST);
914
915 return 0;
916}
917
918/* Multiprotocol reachability information parse. */
919int
920bgp_mp_reach_parse (struct peer *peer, bgp_size_t length, struct attr *attr,
921 struct bgp_nlri *mp_update)
922{
923 u_int16_t afi;
924 u_char safi;
925 u_char snpa_num;
926 u_char snpa_len;
927 u_char *lim;
928 bgp_size_t nlri_len;
929 int ret;
930 struct stream *s;
931
932 /* Set end of packet. */
933 s = peer->ibuf;
934 lim = stream_pnt (s) + length;
935
936 /* Load AFI, SAFI. */
937 afi = stream_getw (s);
938 safi = stream_getc (s);
939
940 /* Get nexthop length. */
941 attr->mp_nexthop_len = stream_getc (s);
942
943 /* Nexthop length check. */
944 switch (attr->mp_nexthop_len)
945 {
946 case 4:
947 stream_get (&attr->mp_nexthop_global_in, s, 4);
948 break;
949 case 12:
950 {
951 u_int32_t rd_high;
952 u_int32_t rd_low;
953
954 rd_high = stream_getl (s);
955 rd_low = stream_getl (s);
956 stream_get (&attr->mp_nexthop_global_in, s, 4);
957 }
958 break;
959#ifdef HAVE_IPV6
960 case 16:
961 stream_get (&attr->mp_nexthop_global, s, 16);
962 break;
963 case 32:
964 stream_get (&attr->mp_nexthop_global, s, 16);
965 stream_get (&attr->mp_nexthop_local, s, 16);
966 if (! IN6_IS_ADDR_LINKLOCAL (&attr->mp_nexthop_local))
967 {
968 char buf1[INET6_ADDRSTRLEN];
969 char buf2[INET6_ADDRSTRLEN];
970
971 if (BGP_DEBUG (update, UPDATE_IN))
ajs557865c2004-12-08 19:59:11 +0000972 zlog_debug ("%s got two nexthop %s %s but second one is not a link-local nexthop", peer->host,
paul718e3742002-12-13 20:15:29 +0000973 inet_ntop (AF_INET6, &attr->mp_nexthop_global,
974 buf1, INET6_ADDRSTRLEN),
975 inet_ntop (AF_INET6, &attr->mp_nexthop_local,
976 buf2, INET6_ADDRSTRLEN));
977
978 attr->mp_nexthop_len = 16;
979 }
980 break;
981#endif /* HAVE_IPV6 */
982 default:
983 zlog_info ("Wrong multiprotocol next hop length: %d",
984 attr->mp_nexthop_len);
985 return -1;
986 break;
987 }
988
989 snpa_num = stream_getc (s);
990
991 while (snpa_num--)
992 {
993 snpa_len = stream_getc (s);
994 stream_forward (s, (snpa_len + 1) >> 1);
995 }
996
997 /* If peer is based on old draft-00. I read NLRI length from the
998 packet. */
999 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1000 {
1001 bgp_size_t nlri_total_len;
1002 nlri_total_len = stream_getw (s);
1003 }
1004
1005 nlri_len = lim - stream_pnt (s);
1006
1007 if (safi != BGP_SAFI_VPNV4)
1008 {
1009 ret = bgp_nlri_sanity_check (peer, afi, stream_pnt (s), nlri_len);
1010 if (ret < 0)
1011 return -1;
1012 }
1013
1014 mp_update->afi = afi;
1015 mp_update->safi = safi;
1016 mp_update->nlri = stream_pnt (s);
1017 mp_update->length = nlri_len;
1018
1019 stream_forward (s, nlri_len);
1020
1021 return 0;
1022}
1023
1024/* Multiprotocol unreachable parse */
1025int
1026bgp_mp_unreach_parse (struct peer *peer, int length,
1027 struct bgp_nlri *mp_withdraw)
1028{
1029 struct stream *s;
1030 u_int16_t afi;
1031 u_char safi;
1032 u_char *lim;
1033 u_int16_t withdraw_len;
1034 int ret;
1035
1036 s = peer->ibuf;
1037 lim = stream_pnt (s) + length;
1038
1039 afi = stream_getw (s);
1040 safi = stream_getc (s);
1041
1042 withdraw_len = lim - stream_pnt (s);
1043
1044 if (safi != BGP_SAFI_VPNV4)
1045 {
1046 ret = bgp_nlri_sanity_check (peer, afi, stream_pnt (s), withdraw_len);
1047 if (ret < 0)
1048 return -1;
1049 }
1050
1051 mp_withdraw->afi = afi;
1052 mp_withdraw->safi = safi;
1053 mp_withdraw->nlri = stream_pnt (s);
1054 mp_withdraw->length = withdraw_len;
1055
1056 stream_forward (s, withdraw_len);
1057
1058 return 0;
1059}
1060
1061/* Extended Community attribute. */
1062int
1063bgp_attr_ext_communities (struct peer *peer, bgp_size_t length,
1064 struct attr *attr, u_char flag)
1065{
1066 if (length == 0)
1067 attr->ecommunity = NULL;
1068 else
1069 {
paul5228ad22004-06-04 17:58:18 +00001070 attr->ecommunity =
1071 ecommunity_parse ((u_int8_t *)stream_pnt (peer->ibuf), length);
paul718e3742002-12-13 20:15:29 +00001072 stream_forward (peer->ibuf, length);
1073 }
1074 attr->flag |= ATTR_FLAG_BIT (BGP_ATTR_EXT_COMMUNITIES);
1075
1076 return 0;
1077}
1078
1079/* BGP unknown attribute treatment. */
1080int
1081bgp_attr_unknown (struct peer *peer, struct attr *attr, u_char flag,
1082 u_char type, bgp_size_t length, u_char *startp)
1083{
1084 bgp_size_t total;
1085 struct transit *transit;
1086
1087 if (BGP_DEBUG (events, EVENTS))
ajs557865c2004-12-08 19:59:11 +00001088 zlog (peer->log, LOG_DEBUG,
paul718e3742002-12-13 20:15:29 +00001089 "Unknown attribute type %d length %d is received", type, length);
1090
1091 /* Forward read pointer of input stream. */
1092 stream_forward (peer->ibuf, length);
1093
1094 /* Adjest total length to include type and length. */
1095 total = length + (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN) ? 4 : 3);
1096
1097 /* If any of the mandatory well-known attributes are not recognized,
1098 then the Error Subcode is set to Unrecognized Well-known
1099 Attribute. The Data field contains the unrecognized attribute
1100 (type, length and value). */
1101 if (! CHECK_FLAG (flag, BGP_ATTR_FLAG_OPTIONAL))
1102 {
1103 /* Adjust startp to do not include flag value. */
1104 bgp_notify_send_with_data (peer,
1105 BGP_NOTIFY_UPDATE_ERR,
1106 BGP_NOTIFY_UPDATE_UNREC_ATTR,
1107 startp, total);
1108 return -1;
1109 }
1110
1111 /* Unrecognized non-transitive optional attributes must be quietly
1112 ignored and not passed along to other BGP peers. */
1113 if (! CHECK_FLAG (flag, BGP_ATTR_FLAG_TRANS))
1114 return 0;
1115
1116 /* If a path with recognized transitive optional attribute is
1117 accepted and passed along to other BGP peers and the Partial bit
1118 in the Attribute Flags octet is set to 1 by some previous AS, it
1119 is not set back to 0 by the current AS. */
1120 SET_FLAG (*startp, BGP_ATTR_FLAG_PARTIAL);
1121
1122 /* Store transitive attribute to the end of attr->transit. */
1123 if (! attr->transit)
1124 {
1125 attr->transit = XMALLOC (MTYPE_TRANSIT, sizeof (struct transit));
1126 memset (attr->transit, 0, sizeof (struct transit));
1127 }
1128
1129 transit = attr->transit;
1130
1131 if (transit->val)
1132 transit->val = XREALLOC (MTYPE_TRANSIT_VAL, transit->val,
1133 transit->length + total);
1134 else
1135 transit->val = XMALLOC (MTYPE_TRANSIT_VAL, total);
1136
1137 memcpy (transit->val + transit->length, startp, total);
1138 transit->length += total;
1139
1140 return 0;
1141}
1142
1143/* Read attribute of update packet. This function is called from
1144 bgp_update() in bgpd.c. */
1145int
1146bgp_attr_parse (struct peer *peer, struct attr *attr, bgp_size_t size,
1147 struct bgp_nlri *mp_update, struct bgp_nlri *mp_withdraw)
1148{
1149 int ret;
1150 u_char flag;
1151 u_char type;
1152 bgp_size_t length;
1153 u_char *startp, *endp;
1154 u_char *attr_endp;
1155 u_char seen[BGP_ATTR_BITMAP_SIZE];
1156
1157 /* Initialize bitmap. */
1158 memset (seen, 0, BGP_ATTR_BITMAP_SIZE);
1159
1160 /* End pointer of BGP attribute. */
1161 endp = BGP_INPUT_PNT (peer) + size;
1162
1163 /* Get attributes to the end of attribute length. */
1164 while (BGP_INPUT_PNT (peer) < endp)
1165 {
1166 /* Check remaining length check.*/
1167 if (endp - BGP_INPUT_PNT (peer) < BGP_ATTR_MIN_LEN)
1168 {
1169 zlog (peer->log, LOG_WARNING,
paula2b1ecd2004-10-31 18:58:09 +00001170 "%s error BGP attribute length %ld is smaller than min len",
paul718e3742002-12-13 20:15:29 +00001171 peer->host, endp - STREAM_PNT (BGP_INPUT (peer)));
1172
1173 bgp_notify_send (peer,
1174 BGP_NOTIFY_UPDATE_ERR,
1175 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
1176 return -1;
1177 }
1178
1179 /* Fetch attribute flag and type. */
1180 startp = BGP_INPUT_PNT (peer);
1181 flag = stream_getc (BGP_INPUT (peer));
1182 type = stream_getc (BGP_INPUT (peer));
1183
1184 /* Check extended attribue length bit. */
1185 if (CHECK_FLAG (flag, BGP_ATTR_FLAG_EXTLEN))
1186 length = stream_getw (BGP_INPUT (peer));
1187 else
1188 length = stream_getc (BGP_INPUT (peer));
1189
1190 /* If any attribute appears more than once in the UPDATE
1191 message, then the Error Subcode is set to Malformed Attribute
1192 List. */
1193
1194 if (CHECK_BITMAP (seen, type))
1195 {
1196 zlog (peer->log, LOG_WARNING,
1197 "%s error BGP attribute type %d appears twice in a message",
1198 peer->host, type);
1199
1200 bgp_notify_send (peer,
1201 BGP_NOTIFY_UPDATE_ERR,
1202 BGP_NOTIFY_UPDATE_MAL_ATTR);
1203 return -1;
1204 }
1205
1206 /* Set type to bitmap to check duplicate attribute. `type' is
1207 unsigned char so it never overflow bitmap range. */
1208
1209 SET_BITMAP (seen, type);
1210
1211 /* Overflow check. */
1212 attr_endp = BGP_INPUT_PNT (peer) + length;
1213
1214 if (attr_endp > endp)
1215 {
1216 zlog (peer->log, LOG_WARNING,
1217 "%s BGP type %d length %d is too large, attribute total length is %d. attr_endp is %p. endp is %p", peer->host, type, length, size, attr_endp, endp);
1218 bgp_notify_send (peer,
1219 BGP_NOTIFY_UPDATE_ERR,
1220 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
1221 return -1;
1222 }
1223
1224 /* OK check attribute and store it's value. */
1225 switch (type)
1226 {
1227 case BGP_ATTR_ORIGIN:
1228 ret = bgp_attr_origin (peer, length, attr, flag, startp);
1229 break;
1230 case BGP_ATTR_AS_PATH:
1231 ret = bgp_attr_aspath (peer, length, attr, flag, startp);
1232 break;
1233 case BGP_ATTR_NEXT_HOP:
1234 ret = bgp_attr_nexthop (peer, length, attr, flag, startp);
1235 break;
1236 case BGP_ATTR_MULTI_EXIT_DISC:
1237 ret = bgp_attr_med (peer, length, attr, flag, startp);
1238 break;
1239 case BGP_ATTR_LOCAL_PREF:
1240 ret = bgp_attr_local_pref (peer, length, attr, flag);
1241 break;
1242 case BGP_ATTR_ATOMIC_AGGREGATE:
1243 ret = bgp_attr_atomic (peer, length, attr, flag);
1244 break;
1245 case BGP_ATTR_AGGREGATOR:
1246 ret = bgp_attr_aggregator (peer, length, attr, flag);
1247 break;
1248 case BGP_ATTR_COMMUNITIES:
1249 ret = bgp_attr_community (peer, length, attr, flag);
1250 break;
1251 case BGP_ATTR_ORIGINATOR_ID:
1252 ret = bgp_attr_originator_id (peer, length, attr, flag);
1253 break;
1254 case BGP_ATTR_CLUSTER_LIST:
1255 ret = bgp_attr_cluster_list (peer, length, attr, flag);
1256 break;
1257 case BGP_ATTR_MP_REACH_NLRI:
1258 ret = bgp_mp_reach_parse (peer, length, attr, mp_update);
1259 break;
1260 case BGP_ATTR_MP_UNREACH_NLRI:
1261 ret = bgp_mp_unreach_parse (peer, length, mp_withdraw);
1262 break;
1263 case BGP_ATTR_EXT_COMMUNITIES:
1264 ret = bgp_attr_ext_communities (peer, length, attr, flag);
1265 break;
1266 default:
1267 ret = bgp_attr_unknown (peer, attr, flag, type, length, startp);
1268 break;
1269 }
1270
1271 /* If error occured immediately return to the caller. */
1272 if (ret < 0)
1273 return ret;
1274
1275 /* Check the fetched length. */
1276 if (BGP_INPUT_PNT (peer) != attr_endp)
1277 {
1278 zlog (peer->log, LOG_WARNING,
1279 "%s BGP attribute fetch error", peer->host);
1280 bgp_notify_send (peer,
1281 BGP_NOTIFY_UPDATE_ERR,
1282 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
1283 return -1;
1284 }
1285 }
1286
1287 /* Check final read pointer is same as end pointer. */
1288 if (BGP_INPUT_PNT (peer) != endp)
1289 {
1290 zlog (peer->log, LOG_WARNING,
1291 "%s BGP attribute length mismatch", peer->host);
1292 bgp_notify_send (peer,
1293 BGP_NOTIFY_UPDATE_ERR,
1294 BGP_NOTIFY_UPDATE_ATTR_LENG_ERR);
1295 return -1;
1296 }
1297
1298 /* Finally intern unknown attribute. */
1299 if (attr->transit)
1300 attr->transit = transit_intern (attr->transit);
1301
1302 return 0;
1303}
1304
1305/* Well-known attribute check. */
1306int
1307bgp_attr_check (struct peer *peer, struct attr *attr)
1308{
1309 u_char type = 0;
1310
1311 if (! CHECK_FLAG (attr->flag, ATTR_FLAG_BIT (BGP_ATTR_ORIGIN)))
1312 type = BGP_ATTR_ORIGIN;
1313
1314 if (! CHECK_FLAG (attr->flag, ATTR_FLAG_BIT (BGP_ATTR_AS_PATH)))
1315 type = BGP_ATTR_AS_PATH;
1316
1317 if (! CHECK_FLAG (attr->flag, ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP)))
1318 type = BGP_ATTR_NEXT_HOP;
1319
1320 if (peer_sort (peer) == BGP_PEER_IBGP
1321 && ! CHECK_FLAG (attr->flag, ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF)))
1322 type = BGP_ATTR_LOCAL_PREF;
1323
1324 if (type)
1325 {
1326 zlog (peer->log, LOG_WARNING,
1327 "%s Missing well-known attribute %d.",
1328 peer->host, type);
1329 bgp_notify_send_with_data (peer,
1330 BGP_NOTIFY_UPDATE_ERR,
1331 BGP_NOTIFY_UPDATE_MISS_ATTR,
1332 &type, 1);
1333 return -1;
1334 }
1335 return 0;
1336}
1337
1338int stream_put_prefix (struct stream *, struct prefix *);
1339
1340/* Make attribute packet. */
1341bgp_size_t
1342bgp_packet_attribute (struct bgp *bgp, struct peer *peer,
1343 struct stream *s, struct attr *attr, struct prefix *p,
1344 afi_t afi, safi_t safi, struct peer *from,
paul5228ad22004-06-04 17:58:18 +00001345 struct prefix_rd *prd, char *tag)
paul718e3742002-12-13 20:15:29 +00001346{
1347 unsigned long cp;
1348 struct aspath *aspath;
1349
1350 if (! bgp)
1351 bgp = bgp_get_default ();
1352
1353 /* Remember current pointer. */
1354 cp = stream_get_putp (s);
1355
1356 /* Origin attribute. */
1357 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1358 stream_putc (s, BGP_ATTR_ORIGIN);
1359 stream_putc (s, 1);
1360 stream_putc (s, attr->origin);
1361
1362 /* AS path attribute. */
1363
1364 /* If remote-peer is EBGP */
1365 if (peer_sort (peer) == BGP_PEER_EBGP
1366 && (! CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_AS_PATH_UNCHANGED)
1367 || attr->aspath->length == 0)
paulfee0f4c2004-09-13 05:12:46 +00001368 && (! CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_RSERVER_CLIENT)))
paul718e3742002-12-13 20:15:29 +00001369 {
1370 aspath = aspath_dup (attr->aspath);
1371
1372 if (CHECK_FLAG(bgp->config, BGP_CONFIG_CONFEDERATION))
1373 {
1374 /* Strip the confed info, and then stuff our path CONFED_ID
1375 on the front */
1376 aspath = aspath_delete_confed_seq (aspath);
1377 aspath = aspath_add_seq (aspath, bgp->confed_id);
1378 }
1379 else
1380 {
1381 aspath = aspath_add_seq (aspath, peer->local_as);
1382 if (peer->change_local_as)
1383 aspath = aspath_add_seq (aspath, peer->change_local_as);
1384 }
1385 }
1386 else if (peer_sort (peer) == BGP_PEER_CONFED)
1387 {
1388 /* A confed member, so we need to do the AS_CONFED_SEQUENCE thing */
1389 aspath = aspath_dup (attr->aspath);
1390 aspath = aspath_add_confed_seq (aspath, peer->local_as);
1391 }
1392 else
1393 aspath = attr->aspath;
1394
1395 /* AS path attribute extended length bit check. */
1396 if (aspath->length > 255)
1397 {
1398 stream_putc (s, BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1399 stream_putc (s, BGP_ATTR_AS_PATH);
1400 stream_putw (s, aspath->length);
1401 }
1402 else
1403 {
1404 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1405 stream_putc(s, BGP_ATTR_AS_PATH);
1406 stream_putc (s, aspath->length);
1407 }
1408 stream_put (s, aspath->data, aspath->length);
1409
1410 if (aspath != attr->aspath)
1411 aspath_free (aspath);
1412
1413 /* Nexthop attribute. */
1414 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_NEXT_HOP) && afi == AFI_IP)
1415 {
1416 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1417 stream_putc (s, BGP_ATTR_NEXT_HOP);
1418 stream_putc (s, 4);
1419 if (safi == SAFI_MPLS_VPN)
1420 {
1421 if (attr->nexthop.s_addr == 0)
1422 stream_put_ipv4 (s, peer->nexthop.v4.s_addr);
1423 else
1424 stream_put_ipv4 (s, attr->nexthop.s_addr);
1425 }
1426 else
1427 stream_put_ipv4 (s, attr->nexthop.s_addr);
1428 }
1429
1430 /* MED attribute. */
1431 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC))
1432 {
1433 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1434 stream_putc (s, BGP_ATTR_MULTI_EXIT_DISC);
1435 stream_putc (s, 4);
1436 stream_putl (s, attr->med);
1437 }
1438
1439 /* Local preference. */
1440 if (peer_sort (peer) == BGP_PEER_IBGP ||
1441 peer_sort (peer) == BGP_PEER_CONFED)
1442 {
1443 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1444 stream_putc (s, BGP_ATTR_LOCAL_PREF);
1445 stream_putc (s, 4);
1446 stream_putl (s, attr->local_pref);
1447 }
1448
1449 /* Atomic aggregate. */
1450 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE))
1451 {
1452 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1453 stream_putc (s, BGP_ATTR_ATOMIC_AGGREGATE);
1454 stream_putc (s, 0);
1455 }
1456
1457 /* Aggregator. */
1458 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_AGGREGATOR))
1459 {
1460 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1461 stream_putc (s, BGP_ATTR_AGGREGATOR);
1462 stream_putc (s, 6);
1463 stream_putw (s, attr->aggregator_as);
1464 stream_put_ipv4 (s, attr->aggregator_addr.s_addr);
1465 }
1466
1467 /* Community attribute. */
1468 if (CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_SEND_COMMUNITY)
1469 && (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_COMMUNITIES)))
1470 {
1471 if (attr->community->size * 4 > 255)
1472 {
1473 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1474 stream_putc (s, BGP_ATTR_COMMUNITIES);
1475 stream_putw (s, attr->community->size * 4);
1476 }
1477 else
1478 {
1479 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1480 stream_putc (s, BGP_ATTR_COMMUNITIES);
1481 stream_putc (s, attr->community->size * 4);
1482 }
1483 stream_put (s, attr->community->val, attr->community->size * 4);
1484 }
1485
1486 /* Route Reflector. */
1487 if (peer_sort (peer) == BGP_PEER_IBGP
1488 && from
1489 && peer_sort (from) == BGP_PEER_IBGP)
1490 {
1491 /* Originator ID. */
1492 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1493 stream_putc (s, BGP_ATTR_ORIGINATOR_ID);
1494 stream_putc (s, 4);
1495
1496 if (attr->flag & ATTR_FLAG_BIT(BGP_ATTR_ORIGINATOR_ID))
1497 stream_put_in_addr (s, &attr->originator_id);
1498 else
1499 {
1500 if (from)
1501 stream_put_in_addr (s, &from->remote_id);
1502 else
1503 stream_put_in_addr (s, &attr->originator_id);
1504 }
1505
1506 /* Cluster list. */
1507 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1508 stream_putc (s, BGP_ATTR_CLUSTER_LIST);
1509
1510 if (attr->cluster)
1511 {
1512 stream_putc (s, attr->cluster->length + 4);
1513 /* If this peer configuration's parent BGP has cluster_id. */
1514 if (bgp->config & BGP_CONFIG_CLUSTER_ID)
1515 stream_put_in_addr (s, &bgp->cluster_id);
1516 else
1517 stream_put_in_addr (s, &bgp->router_id);
1518 stream_put (s, attr->cluster->list, attr->cluster->length);
1519 }
1520 else
1521 {
1522 stream_putc (s, 4);
1523 /* If this peer configuration's parent BGP has cluster_id. */
1524 if (bgp->config & BGP_CONFIG_CLUSTER_ID)
1525 stream_put_in_addr (s, &bgp->cluster_id);
1526 else
1527 stream_put_in_addr (s, &bgp->router_id);
1528 }
1529 }
1530
1531#ifdef HAVE_IPV6
1532 /* If p is IPv6 address put it into attribute. */
1533 if (p->family == AF_INET6)
1534 {
1535 unsigned long sizep;
1536 unsigned long draftp = 0;
1537
1538 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1539 stream_putc (s, BGP_ATTR_MP_REACH_NLRI);
1540 sizep = stream_get_putp (s);
1541 stream_putc (s, 0); /* Length of this attribute. */
1542 stream_putw (s, AFI_IP6); /* AFI */
1543 stream_putc (s, safi); /* SAFI */
1544
1545 stream_putc (s, attr->mp_nexthop_len);
1546
1547 if (attr->mp_nexthop_len == 16)
1548 stream_put (s, &attr->mp_nexthop_global, 16);
1549 else if (attr->mp_nexthop_len == 32)
1550 {
1551 stream_put (s, &attr->mp_nexthop_global, 16);
1552 stream_put (s, &attr->mp_nexthop_local, 16);
1553 }
1554
1555 /* SNPA */
1556 stream_putc (s, 0);
1557
1558 /* In case of old draft BGP-4+. */
1559 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1560 {
1561 draftp = stream_get_putp (s);
1562 stream_putw (s, 0);
1563 }
1564
1565 /* Prefix write. */
1566 stream_put_prefix (s, p);
1567
1568 /* Set MP attribute length. */
1569 stream_putc_at (s, sizep, (stream_get_putp (s) - sizep) - 1);
1570
1571 /* In case of old draft BGP-4+. */
1572 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1573 stream_putw_at (s, draftp, (stream_get_putp (s) - draftp) - 2);
1574 }
1575#endif /* HAVE_IPV6 */
1576
1577 if (p->family == AF_INET && safi == SAFI_MULTICAST)
1578 {
1579 unsigned long sizep;
1580 unsigned long draftp = 0;
1581
1582 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1583 stream_putc (s, BGP_ATTR_MP_REACH_NLRI);
1584 sizep = stream_get_putp (s);
1585 stream_putc (s, 0); /* Length of this attribute. */
1586 stream_putw (s, AFI_IP); /* AFI */
1587 stream_putc (s, SAFI_MULTICAST); /* SAFI */
1588
1589 stream_putc (s, 4);
1590 stream_put_ipv4 (s, attr->nexthop.s_addr);
1591
1592 /* SNPA */
1593 stream_putc (s, 0);
1594
1595 /* In case of old draft BGP-4+. */
1596 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1597 {
1598 draftp = stream_get_putp (s);
1599 stream_putw (s, 0);
1600 }
1601
1602 /* Prefix write. */
1603 stream_put_prefix (s, p);
1604
1605 /* Set MP attribute length. */
1606 stream_putc_at (s, sizep, (stream_get_putp (s) - sizep) - 1);
1607
1608 /* In case of old draft BGP-4+. */
1609 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1610 stream_putw_at (s, draftp, (stream_get_putp (s) - draftp) - 2);
1611 }
1612
1613 if (p->family == AF_INET && safi == SAFI_MPLS_VPN)
1614 {
1615 unsigned long sizep;
1616 unsigned long draftp = 0;
1617
1618 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1619 stream_putc (s, BGP_ATTR_MP_REACH_NLRI);
1620 sizep = stream_get_putp (s);
1621 stream_putc (s, 0); /* Length of this attribute. */
1622 stream_putw (s, AFI_IP); /* AFI */
1623 stream_putc (s, BGP_SAFI_VPNV4); /* SAFI */
1624
1625 stream_putc (s, 12);
1626 stream_putl (s, 0);
1627 stream_putl (s, 0);
1628 stream_put (s, &attr->mp_nexthop_global_in, 4);
1629
1630 /* SNPA */
1631 stream_putc (s, 0);
1632
1633 /* In case of old draft BGP-4+. */
1634 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1635 {
1636 draftp = stream_get_putp (s);
1637 stream_putw (s, 0);
1638 }
1639
1640 /* Tag, RD, Prefix write. */
1641 stream_putc (s, p->prefixlen + 88);
1642 stream_put (s, tag, 3);
1643 stream_put (s, prd->val, 8);
1644 stream_put (s, &p->u.prefix, PSIZE (p->prefixlen));
1645
1646 /* Set MP attribute length. */
1647 stream_putc_at (s, sizep, (stream_get_putp (s) - sizep) - 1);
1648
1649 /* In case of old draft BGP-4+. */
1650 if (peer->version == BGP_VERSION_MP_4_DRAFT_00)
1651 stream_putw_at (s, draftp, (stream_get_putp (s) - draftp) - 2);
1652 }
1653
1654 /* Extended Communities attribute. */
1655 if (CHECK_FLAG (peer->af_flags[afi][safi], PEER_FLAG_SEND_EXT_COMMUNITY)
1656 && (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_EXT_COMMUNITIES)))
1657 {
hasso4372df72004-05-20 10:20:02 +00001658 if (peer_sort (peer) == BGP_PEER_IBGP || peer_sort (peer) == BGP_PEER_CONFED)
paul718e3742002-12-13 20:15:29 +00001659 {
hasso4372df72004-05-20 10:20:02 +00001660 if (attr->ecommunity->size * 8 > 255)
1661 {
1662 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1663 stream_putc (s, BGP_ATTR_EXT_COMMUNITIES);
1664 stream_putw (s, attr->ecommunity->size * 8);
1665 }
1666 else
1667 {
1668 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1669 stream_putc (s, BGP_ATTR_EXT_COMMUNITIES);
1670 stream_putc (s, attr->ecommunity->size * 8);
1671 }
1672 stream_put (s, attr->ecommunity->val, attr->ecommunity->size * 8);
paul718e3742002-12-13 20:15:29 +00001673 }
1674 else
1675 {
paul5228ad22004-06-04 17:58:18 +00001676 u_int8_t *pnt;
hasso4372df72004-05-20 10:20:02 +00001677 int tbit;
1678 int ecom_tr_size = 0;
1679 int i;
1680
1681 for (i = 0; i < attr->ecommunity->size; i++)
1682 {
1683 pnt = attr->ecommunity->val + (i * 8);
1684 tbit = *pnt;
1685
1686 if (CHECK_FLAG (tbit, ECOMMUNITY_FLAG_NON_TRANSITIVE))
1687 continue;
1688
1689 ecom_tr_size++;
1690 }
1691
1692 if (ecom_tr_size)
1693 {
1694 if (ecom_tr_size * 8 > 255)
1695 {
1696 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1697 stream_putc (s, BGP_ATTR_EXT_COMMUNITIES);
1698 stream_putw (s, ecom_tr_size * 8);
1699 }
1700 else
1701 {
1702 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1703 stream_putc (s, BGP_ATTR_EXT_COMMUNITIES);
1704 stream_putc (s, ecom_tr_size * 8);
1705 }
1706
1707 for (i = 0; i < attr->ecommunity->size; i++)
1708 {
1709 pnt = attr->ecommunity->val + (i * 8);
1710 tbit = *pnt;
1711
1712 if (CHECK_FLAG (tbit, ECOMMUNITY_FLAG_NON_TRANSITIVE))
1713 continue;
1714
1715 stream_put (s, pnt, 8);
1716 }
1717 }
paul718e3742002-12-13 20:15:29 +00001718 }
paul718e3742002-12-13 20:15:29 +00001719 }
1720
1721 /* Unknown transit attribute. */
1722 if (attr->transit)
1723 stream_put (s, attr->transit->val, attr->transit->length);
1724
1725 /* Return total size of attribute. */
1726 return stream_get_putp (s) - cp;
1727}
1728
1729bgp_size_t
1730bgp_packet_withdraw (struct peer *peer, struct stream *s, struct prefix *p,
1731 afi_t afi, safi_t safi, struct prefix_rd *prd,
paul5228ad22004-06-04 17:58:18 +00001732 char *tag)
paul718e3742002-12-13 20:15:29 +00001733{
1734 unsigned long cp;
1735 unsigned long attrlen_pnt;
1736 bgp_size_t size;
1737
1738 cp = stream_get_putp (s);
1739
1740 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1741 stream_putc (s, BGP_ATTR_MP_UNREACH_NLRI);
1742
1743 attrlen_pnt = stream_get_putp (s);
1744 stream_putc (s, 0); /* Length of this attribute. */
1745
1746 stream_putw (s, family2afi (p->family));
1747
1748 if (safi == SAFI_MPLS_VPN)
1749 {
1750 /* SAFI */
1751 stream_putc (s, BGP_SAFI_VPNV4);
1752
1753 /* prefix. */
1754 stream_putc (s, p->prefixlen + 88);
1755 stream_put (s, tag, 3);
1756 stream_put (s, prd->val, 8);
1757 stream_put (s, &p->u.prefix, PSIZE (p->prefixlen));
1758 }
1759 else
1760 {
1761 /* SAFI */
1762 stream_putc (s, safi);
1763
1764 /* prefix */
1765 stream_put_prefix (s, p);
1766 }
1767
1768 /* Set MP attribute length. */
1769 size = stream_get_putp (s) - attrlen_pnt - 1;
1770 stream_putc_at (s, attrlen_pnt, size);
1771
1772 return stream_get_putp (s) - cp;
1773}
1774
1775/* Initialization of attribute. */
1776void
1777bgp_attr_init ()
1778{
1779 void attrhash_init ();
1780
1781 aspath_init ();
1782 attrhash_init ();
1783 community_init ();
1784 ecommunity_init ();
1785 cluster_init ();
1786 transit_init ();
1787}
1788
1789/* Make attribute packet. */
1790void
paula3845922003-10-18 01:30:50 +00001791bgp_dump_routes_attr (struct stream *s, struct attr *attr,
1792 struct prefix *prefix)
paul718e3742002-12-13 20:15:29 +00001793{
1794 unsigned long cp;
1795 unsigned long len;
1796 struct aspath *aspath;
1797
1798 /* Remember current pointer. */
1799 cp = stream_get_putp (s);
1800
1801 /* Place holder of length. */
1802 stream_putw (s, 0);
1803
1804 /* Origin attribute. */
1805 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1806 stream_putc (s, BGP_ATTR_ORIGIN);
1807 stream_putc (s, 1);
1808 stream_putc (s, attr->origin);
1809
1810 aspath = attr->aspath;
1811
1812 if (aspath->length > 255)
1813 {
1814 stream_putc (s, BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1815 stream_putc (s, BGP_ATTR_AS_PATH);
1816 stream_putw (s, aspath->length);
1817 }
1818 else
1819 {
1820 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1821 stream_putc (s, BGP_ATTR_AS_PATH);
1822 stream_putc (s, aspath->length);
1823 }
1824 stream_put (s, aspath->data, aspath->length);
1825
1826 /* Nexthop attribute. */
paula3845922003-10-18 01:30:50 +00001827 /* If it's an IPv6 prefix, don't dump the IPv4 nexthop to save space */
1828 if(prefix != NULL
1829#ifdef HAVE_IPV6
1830 && prefix->family != AF_INET6
1831#endif /* HAVE_IPV6 */
1832 )
1833 {
1834 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1835 stream_putc (s, BGP_ATTR_NEXT_HOP);
1836 stream_putc (s, 4);
1837 stream_put_ipv4 (s, attr->nexthop.s_addr);
1838 }
paul718e3742002-12-13 20:15:29 +00001839
1840 /* MED attribute. */
1841 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_MULTI_EXIT_DISC))
1842 {
1843 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL);
1844 stream_putc (s, BGP_ATTR_MULTI_EXIT_DISC);
1845 stream_putc (s, 4);
1846 stream_putl (s, attr->med);
1847 }
1848
1849 /* Local preference. */
1850 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_LOCAL_PREF))
1851 {
1852 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1853 stream_putc (s, BGP_ATTR_LOCAL_PREF);
1854 stream_putc (s, 4);
1855 stream_putl (s, attr->local_pref);
1856 }
1857
1858 /* Atomic aggregate. */
1859 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_ATOMIC_AGGREGATE))
1860 {
1861 stream_putc (s, BGP_ATTR_FLAG_TRANS);
1862 stream_putc (s, BGP_ATTR_ATOMIC_AGGREGATE);
1863 stream_putc (s, 0);
1864 }
1865
1866 /* Aggregator. */
1867 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_AGGREGATOR))
1868 {
1869 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1870 stream_putc (s, BGP_ATTR_AGGREGATOR);
1871 stream_putc (s, 6);
1872 stream_putw (s, attr->aggregator_as);
1873 stream_put_ipv4 (s, attr->aggregator_addr.s_addr);
1874 }
1875
1876 /* Community attribute. */
1877 if (attr->flag & ATTR_FLAG_BIT (BGP_ATTR_COMMUNITIES))
1878 {
1879 if (attr->community->size * 4 > 255)
1880 {
1881 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS|BGP_ATTR_FLAG_EXTLEN);
1882 stream_putc (s, BGP_ATTR_COMMUNITIES);
1883 stream_putw (s, attr->community->size * 4);
1884 }
1885 else
1886 {
1887 stream_putc (s, BGP_ATTR_FLAG_OPTIONAL|BGP_ATTR_FLAG_TRANS);
1888 stream_putc (s, BGP_ATTR_COMMUNITIES);
1889 stream_putc (s, attr->community->size * 4);
1890 }
1891 stream_put (s, attr->community->val, attr->community->size * 4);
1892 }
1893
paula3845922003-10-18 01:30:50 +00001894#ifdef HAVE_IPV6
1895 /* Add a MP_NLRI attribute to dump the IPv6 next hop */
1896 if(prefix != NULL && prefix->family == AF_INET6 &&
1897 (attr->mp_nexthop_len == 16 || attr->mp_nexthop_len == 32) )
1898 {
1899 int sizep;
1900
1901 stream_putc(s, BGP_ATTR_FLAG_OPTIONAL);
1902 stream_putc(s, BGP_ATTR_MP_REACH_NLRI);
1903 sizep = stream_get_putp (s);
1904
1905 /* MP header */
1906 stream_putc (s, 0); /* Length of this attribute. */
1907 stream_putw(s, AFI_IP6); /* AFI */
1908 stream_putc(s, SAFI_UNICAST); /* SAFI */
1909
1910 /* Next hop */
1911 stream_putc(s, attr->mp_nexthop_len);
1912 stream_put(s, &attr->mp_nexthop_global, 16);
1913 if(attr->mp_nexthop_len == 32)
1914 stream_put(s, &attr->mp_nexthop_local, 16);
1915
1916 /* SNPA */
1917 stream_putc(s, 0);
1918
1919 /* Prefix */
1920 stream_put_prefix(s, prefix);
1921
1922 /* Set MP attribute length. */
1923 stream_putc_at (s, sizep, (stream_get_putp (s) - sizep) - 1);
1924 }
1925#endif /* HAVE_IPV6 */
1926
paul718e3742002-12-13 20:15:29 +00001927 /* Return total size of attribute. */
1928 len = stream_get_putp (s) - cp - 2;
1929 stream_putw_at (s, cp, len);
1930}