X-Git-Url: https://tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Froute.c;h=8df8128a116c2f49fce13c5d15d3075561f0b55e;hp=c8de7a57a42f54aa2107857183ba13ac679ed423;hb=9b2b3747340173590b8f6f5fbdd060b42985f026;hpb=82e383710980534d38bb9a8ef22f20677cd85861 diff --git a/src/route.c b/src/route.c index c8de7a57..8df8128a 100644 --- a/src/route.c +++ b/src/route.c @@ -17,7 +17,7 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - $Id: route.c,v 1.1.2.19 2001/10/27 12:13:17 guus Exp $ + $Id: route.c,v 1.1.2.21 2001/11/16 17:40:50 zarq Exp $ */ #include "config.h" @@ -46,6 +46,7 @@ #include "subnet.h" #include "route.h" #include "protocol.h" +#include "device.h" #include "system.h" @@ -102,26 +103,10 @@ cp return NULL; } -node_t *route_ipv4(vpn_packet_t *packet) -{ - ipv4_t dest; - subnet_t *subnet; -cp -#ifdef HAVE_SOLARIS - /* The other form gives bus errors on a SparcStation 20. */ - dest = ((packet->data[30] * 0x100 + packet->data[31]) * 0x100 + packet->data[32]) * 0x100 + packet->data[33]; -#else - dest = ntohl(*((unsigned long*)(&packet->data[30]))); -#endif -cp - subnet = lookup_subnet_ipv4(&dest); -cp if(!subnet) { if(debug_lvl >= DEBUG_TRAFFIC) { - syslog(LOG_WARNING, _("Cannot route packet: unknown destination address %d.%d.%d.%d"), - packet->data[30], packet->data[31], packet->data[32], packet->data[33]); } return NULL; @@ -130,20 +115,21 @@ cp return subnet->owner; } -node_t *route_ipv6(vpn_packet_t *packet) +node_t *route_ip(vpn_packet_t *packet) { - ipv6_t dest; + struct addrinfo *dest; subnet_t *subnet; cp - memcpy(&dest, &packet->data[30], sizeof(ipv6_t)); +#warning FIXME + memcpy(&dest, &packet->data[30], 0); - subnet = lookup_subnet_ipv6(&dest); + subnet = lookup_subnet_ip(&dest); cp if(!subnet) { if(debug_lvl >= DEBUG_TRAFFIC) { - syslog(LOG_WARNING, _("Cannot route packet: unknown IPv6 destination address")); + syslog(LOG_WARNING, _("Cannot route packet: unknown IP destination address")); } return NULL; @@ -157,7 +143,7 @@ void route_arp(vpn_packet_t *packet) struct ether_arp *arp; subnet_t *subnet; unsigned char ipbuf[4]; - ipv4_t dest; + struct addrinfo *dest; cp /* First, snatch the source address from the ARP packet */ @@ -186,9 +172,9 @@ cp } /* Check if the IP address exists on the VPN */ - +#warning FIXME dest = ntohl(*((unsigned long*)(arp->arp_tpa))); - subnet = lookup_subnet_ipv4(&dest); + subnet = lookup_subnet_ip(&dest); if(!subnet) { @@ -217,7 +203,7 @@ cp memcpy(arp->arp_sha, packet->data + ETHER_ADDR_LEN, ETHER_ADDR_LEN); /* add fake source hard addr */ arp->arp_op = htons(ARPOP_REPLY); - accept_packet(packet); + write_packet(packet); cp } @@ -274,7 +260,7 @@ void route_incoming(node_t *source, vpn_packet_t *packet) { case RMODE_ROUTER: memcpy(packet->data, mymac.net.mac.address.x, 6); /* Override destination address to make the kernel accept it */ - accept_packet(packet); + write_packet(packet); break; case RMODE_SWITCH: { @@ -285,20 +271,20 @@ void route_incoming(node_t *source, vpn_packet_t *packet) if(subnet) { if(subnet->owner == myself) - accept_packet(packet); + write_packet(packet); else send_packet(subnet->owner, packet); } else { broadcast_packet(source, packet); - accept_packet(packet); + write_packet(packet); } } break; case RMODE_HUB: broadcast_packet(source, packet); /* Spread it on */ - accept_packet(packet); + write_packet(packet); break; } }