X-Git-Url: https://tinc-vpn.org/git/browse?p=tinc;a=blobdiff_plain;f=src%2Froute.c;h=ad62bc229b0f7ea94502754286a7006f72c602b0;hp=4e41cdff7ca6fcb68fc61adffe8b7ac624179596;hb=5fc1ed17f41f0c535cf57a4b7e00cd6d45759503;hpb=0e93f0aa02274481c16fc9f30b795d4f063bd1c3 diff --git a/src/route.c b/src/route.c index 4e41cdff..ad62bc22 100644 --- a/src/route.c +++ b/src/route.c @@ -1,7 +1,7 @@ /* route.c -- routing - Copyright (C) 2000-2002 Ivo Timmermans , - 2000-2002 Guus Sliepen + Copyright (C) 2000-2002 Ivo Timmermans , + 2000-2002 Guus Sliepen This program is free software; you can redistribute it and/or modify it under the terms of the GNU General Public License as published by @@ -17,22 +17,25 @@ along with this program; if not, write to the Free Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA. - $Id: route.c,v 1.1.2.34 2002/03/15 15:08:21 guus Exp $ + $Id: route.c,v 1.1.2.44 2002/09/09 19:40:11 guus Exp $ */ #include "config.h" -#if defined(HAVE_FREEBSD) || defined(HAVE_OPENBSD) +#ifdef HAVE_SYS_PARAM_H #include #endif #include #include -#if defined(HAVE_SOLARIS) || defined(HAVE_OPENBSD) +#ifdef HAVE_NET_IF_H #include - #define ETHER_ADDR_LEN 6 -#else +#endif +#ifdef HAVE_NET_ETHERNET_H #include #endif +#ifdef HAVE_NETINET_IN_SYSTM_H + #include +#endif #include #include #include @@ -40,6 +43,9 @@ #include #include #include +#ifdef HAVE_INTTYPES_H + #include +#endif #include @@ -52,6 +58,10 @@ #include "system.h" +#ifndef ETHER_ADDR_LEN + #define ETHER_ADDR_LEN 6 +#endif + int routing_mode = RMODE_ROUTER; int priorityinheritance = 0; int macexpire = 600; @@ -62,7 +72,7 @@ void learn_mac(mac_t *address) subnet_t *subnet; avl_node_t *node; connection_t *c; -cp + cp(); subnet = lookup_subnet_mac(address); /* If we don't know this MAC address yet, store it */ @@ -96,7 +106,7 @@ void age_mac(void) subnet_t *s; connection_t *c; avl_node_t *node, *next, *node2; -cp + cp(); for(node = myself->subnet_tree->head; node; node = next) { next = node->next; @@ -115,13 +125,13 @@ cp subnet_del(myself, s); } } -cp + cp(); } node_t *route_mac(vpn_packet_t *packet) { subnet_t *subnet; -cp + cp(); /* Learn source address */ learn_mac((mac_t *)(&packet->data[6])); @@ -139,12 +149,12 @@ cp node_t *route_ipv4(vpn_packet_t *packet) { subnet_t *subnet; -cp + cp(); if(priorityinheritance) packet->priority = packet->data[15]; subnet = lookup_subnet_ipv4((ipv4_t *)&packet->data[30]); -cp + cp(); if(!subnet) { if(debug_lvl >= DEBUG_TRAFFIC) @@ -155,40 +165,40 @@ cp return NULL; } -cp + cp(); return subnet->owner; } node_t *route_ipv6(vpn_packet_t *packet) { subnet_t *subnet; -cp + cp(); subnet = lookup_subnet_ipv6((ipv6_t *)&packet->data[38]); -cp + cp(); if(!subnet) { if(debug_lvl >= DEBUG_TRAFFIC) { syslog(LOG_WARNING, _("Cannot route packet: unknown IPv6 destination address %hx:%hx:%hx:%hx:%hx:%hx:%hx:%hx"), - ntohs(*(short unsigned int *)&packet->data[38]), - ntohs(*(short unsigned int *)&packet->data[40]), - ntohs(*(short unsigned int *)&packet->data[42]), - ntohs(*(short unsigned int *)&packet->data[44]), - ntohs(*(short unsigned int *)&packet->data[46]), - ntohs(*(short unsigned int *)&packet->data[48]), - ntohs(*(short unsigned int *)&packet->data[50]), - ntohs(*(short unsigned int *)&packet->data[52])); + ntohs(*(uint16_t *)&packet->data[38]), + ntohs(*(uint16_t *)&packet->data[40]), + ntohs(*(uint16_t *)&packet->data[42]), + ntohs(*(uint16_t *)&packet->data[44]), + ntohs(*(uint16_t *)&packet->data[46]), + ntohs(*(uint16_t *)&packet->data[48]), + ntohs(*(uint16_t *)&packet->data[50]), + ntohs(*(uint16_t *)&packet->data[52])); } return NULL; } -cp + cp(); return subnet->owner; } -unsigned short int inet_checksum(unsigned short int *data, int len, unsigned short int prevsum) +uint16_t inet_checksum(uint16_t *data, int len, uint16_t prevsum) { - unsigned long int checksum = prevsum ^ 0xFFFF; + uint32_t checksum = prevsum ^ 0xFFFF; while(len--) checksum += ntohs(*data++); @@ -205,7 +215,7 @@ void route_neighborsol(vpn_packet_t *packet) struct nd_neighbor_solicit *ns; struct nd_opt_hdr *opt; subnet_t *subnet; - short unsigned int checksum; + uint16_t checksum; struct { struct in6_addr ip6_src; /* source address */ @@ -214,7 +224,7 @@ void route_neighborsol(vpn_packet_t *packet) uint8_t junk[4]; } pseudo; -cp + cp(); hdr = (struct ip6_hdr *)(packet->data + 14); ns = (struct nd_neighbor_solicit *)(packet->data + 14 + sizeof(*hdr)); opt = (struct nd_opt_hdr *)(packet->data + 14 + sizeof(*hdr) + sizeof(*ns)); @@ -245,8 +255,8 @@ cp /* Generate checksum */ - checksum = inet_checksum((unsigned short int *)&pseudo, sizeof(pseudo)/2, ~0); - checksum = inet_checksum((unsigned short int *)ns, sizeof(*ns)/2 + 4, checksum); + checksum = inet_checksum((uint16_t *)&pseudo, sizeof(pseudo)/2, ~0); + checksum = inet_checksum((uint16_t *)ns, sizeof(*ns)/2 + 4, checksum); if(checksum) { @@ -264,8 +274,8 @@ cp if(debug_lvl >= DEBUG_TRAFFIC) { syslog(LOG_WARNING, _("Cannot route packet: neighbor solicitation request for unknown address %hx:%hx:%hx:%hx:%hx:%hx:%hx:%hx"), - ntohs(ns->nd_ns_target.s6_addr16[0]), ntohs(ns->nd_ns_target.s6_addr16[1]), ntohs(ns->nd_ns_target.s6_addr16[2]), ntohs(ns->nd_ns_target.s6_addr16[3]), - ntohs(ns->nd_ns_target.s6_addr16[4]), ntohs(ns->nd_ns_target.s6_addr16[5]), ntohs(ns->nd_ns_target.s6_addr16[6]), ntohs(ns->nd_ns_target.s6_addr16[7])); + ntohs(((uint16_t *)&ns->nd_ns_target)[0]), ntohs(((uint16_t *)&ns->nd_ns_target)[1]), ntohs(((uint16_t *)&ns->nd_ns_target)[2]), ntohs(((uint16_t *)&ns->nd_ns_target)[3]), + ntohs(((uint16_t *)&ns->nd_ns_target)[4]), ntohs(((uint16_t *)&ns->nd_ns_target)[5]), ntohs(((uint16_t *)&ns->nd_ns_target)[6]), ntohs(((uint16_t *)&ns->nd_ns_target)[7])); } return; @@ -302,21 +312,21 @@ cp /* Generate checksum */ - checksum = inet_checksum((unsigned short int *)&pseudo, sizeof(pseudo)/2, ~0); - checksum = inet_checksum((unsigned short int *)ns, sizeof(*ns)/2 + 4, checksum); + checksum = inet_checksum((uint16_t *)&pseudo, sizeof(pseudo)/2, ~0); + checksum = inet_checksum((uint16_t *)ns, sizeof(*ns)/2 + 4, checksum); - ns->nd_ns_hdr.icmp6_cksum = checksum; + ns->nd_ns_hdr.icmp6_cksum = htons(checksum); write_packet(packet); -cp + cp(); } void route_arp(vpn_packet_t *packet) { struct ether_arp *arp; subnet_t *subnet; - unsigned char ipbuf[4]; -cp + uint8_t ipbuf[4]; + cp(); /* First, snatch the source address from the ARP packet */ memcpy(mymac.net.mac.address.x, packet->data + 6, 6); @@ -332,8 +342,8 @@ cp if(ntohs(arp->arp_hrd) != ARPHRD_ETHER || ntohs(arp->arp_pro) != ETHERTYPE_IP || - (int) (arp->arp_hln) != ETHER_ADDR_LEN || - (int) (arp->arp_pln) != 4 || + arp->arp_hln != ETHER_ADDR_LEN || + arp->arp_pln != 4 || ntohs(arp->arp_op) != ARPOP_REQUEST ) { if(debug_lvl > DEBUG_TRAFFIC) @@ -375,32 +385,32 @@ cp arp->arp_op = htons(ARPOP_REPLY); write_packet(packet); -cp + cp(); } void route_outgoing(vpn_packet_t *packet) { - unsigned short int type; + uint16_t type; node_t *n = NULL; -cp + cp(); /* FIXME: multicast? */ switch(routing_mode) { case RMODE_ROUTER: - type = ntohs(*((unsigned short*)(&packet->data[12]))); + type = ntohs(*((uint16_t *)(&packet->data[12]))); switch(type) { case 0x0800: n = route_ipv4(packet); break; case 0x86DD: - n = route_ipv6(packet); - if(!n && packet->data[0] == 0x33 && packet->data[1] == 0x33 && packet->data[2] == 0xff) + if(packet->data[20] == IPPROTO_ICMPV6 && packet->data[54] == ND_NEIGHBOR_SOLICIT) { route_neighborsol(packet); return; } + n = route_ipv6(packet); break; case 0x0806: route_arp(packet); @@ -437,9 +447,9 @@ void route_incoming(node_t *source, vpn_packet_t *packet) case RMODE_ROUTER: { node_t *n = NULL; - unsigned short int type; + uint16_t type; - type = ntohs(*((unsigned short*)(&packet->data[12]))); + type = ntohs(*((uint16_t *)(&packet->data[12]))); switch(type) { case 0x0800: