projects
/
tinc
/ blobdiff
commit
grep
author
committer
pickaxe
?
search:
re
summary
|
shortlog
|
log
|
commit
|
commitdiff
|
tree
raw
|
inline
| side by side
Check for IPv6 header files.
[tinc]
/
src
/
route.c
diff --git
a/src/route.c
b/src/route.c
index
00aa486
..
b6ec0dc
100644
(file)
--- a/
src/route.c
+++ b/
src/route.c
@@
-17,7
+17,7
@@
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
along with this program; if not, write to the Free Software
Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
- $Id: route.c,v 1.1.2.
47 2003/03/29 21:51:21
guus Exp $
+ $Id: route.c,v 1.1.2.
53 2003/07/06 17:49:49
guus Exp $
*/
#include "config.h"
*/
#include "config.h"
@@
-38,8
+38,10
@@
#endif
#include <netinet/ip.h>
#include <netinet/ip_icmp.h>
#endif
#include <netinet/ip.h>
#include <netinet/ip_icmp.h>
+#ifdef HAVE_NETINET_IP6_H
#include <netinet/ip6.h>
#include <netinet/icmp6.h>
#include <netinet/ip6.h>
#include <netinet/icmp6.h>
+#endif
#include <netinet/if_ether.h>
#include <utils.h>
#include <xalloc.h>
#include <netinet/if_ether.h>
#include <utils.h>
#include <xalloc.h>
@@
-60,14
+62,29
@@
#include "system.h"
#include "system.h"
+/* Missing definitions */
+
#ifndef ETHER_ADDR_LEN
#define ETHER_ADDR_LEN 6
#endif
#ifndef ETHER_ADDR_LEN
#define ETHER_ADDR_LEN 6
#endif
+#ifndef ICMP_DEST_UNREACH
+#define ICMP_DEST_UNREACH 3
+#endif
+
+#ifndef ICMP_NET_UNKNOWN
+#define ICMP_NET_UNKNOWN 6
+#endif
+
+#ifndef ICMP_NET_UNREACH
+#define ICMP_NET_UNREACH 0
+#endif
+
int routing_mode = RMODE_ROUTER;
int priorityinheritance = 0;
int macexpire = 600;
int routing_mode = RMODE_ROUTER;
int priorityinheritance = 0;
int macexpire = 600;
-subnet_t mymac;
+int overwrite_mac = 0;
+mac_t mymac = {{0xFE, 0xFD, 0, 0, 0, 0}};
/* RFC 1071 */
/* RFC 1071 */
@@
-76,10
+93,13
@@
uint16_t inet_checksum(void *data, int len, uint16_t prevsum)
uint16_t *p = data;
uint32_t checksum = prevsum ^ 0xFFFF;
uint16_t *p = data;
uint32_t checksum = prevsum ^ 0xFFFF;
- len /= 2;
-
- while(len--)
+ while(len >= 2) {
checksum += *p++;
checksum += *p++;
+ len -= 2;
+ }
+
+ if(len)
+ checksum += *(unsigned char *)p;
while(checksum >> 16)
checksum = (checksum & 0xFFFF) + (checksum >> 16);
while(checksum >> 16)
checksum = (checksum & 0xFFFF) + (checksum >> 16);
@@
-206,8
+226,8
@@
void route_ipv4_unreachable(vpn_packet_t *packet, uint8_t code)
memcpy(&ip_dst, &hdr->ip_dst, 4);
oldlen = packet->len - 14;
memcpy(&ip_dst, &hdr->ip_dst, 4);
oldlen = packet->len - 14;
- if(oldlen >= IP_MSS - sizeof(*hdr) - sizeof(
struct icmphdr
))
- oldlen = IP_MSS - sizeof(*hdr) - sizeof(
struct icmphdr
);
+ if(oldlen >= IP_MSS - sizeof(*hdr) - sizeof(
*icmp
))
+ oldlen = IP_MSS - sizeof(*hdr) - sizeof(
*icmp
);
/* Copy first part of original contents to ICMP message */
/* Copy first part of original contents to ICMP message */
@@
-270,6
+290,8
@@
node_t *route_ipv4(vpn_packet_t *packet)
return subnet->owner;
}
return subnet->owner;
}
+#ifdef HAVE_NETINET_IP6_H
+
/* RFC 2463 */
void route_ipv6_unreachable(vpn_packet_t *packet, uint8_t code)
/* RFC 2463 */
void route_ipv6_unreachable(vpn_packet_t *packet, uint8_t code)
@@
-295,8
+317,8
@@
void route_ipv6_unreachable(vpn_packet_t *packet, uint8_t code)
/* Remember original source and destination */
/* Remember original source and destination */
- memcpy(&pseudo.ip6_src, &hdr->ip6_
src
, 16);
- memcpy(&pseudo.ip6_dst, &hdr->ip6_
dst
, 16);
+ memcpy(&pseudo.ip6_src, &hdr->ip6_
dst
, 16);
+ memcpy(&pseudo.ip6_dst, &hdr->ip6_
src
, 16);
pseudo.length = ntohs(hdr->ip6_plen) + sizeof(*hdr);
if(pseudo.length >= IP_MSS - sizeof(*hdr) - sizeof(*icmp))
pseudo.length = ntohs(hdr->ip6_plen) + sizeof(*hdr);
if(pseudo.length >= IP_MSS - sizeof(*hdr) - sizeof(*icmp))
@@
-312,8
+334,8
@@
void route_ipv6_unreachable(vpn_packet_t *packet, uint8_t code)
hdr->ip6_plen = htons(sizeof(*icmp) + pseudo.length);
hdr->ip6_nxt = IPPROTO_ICMPV6;
hdr->ip6_hlim = 255;
hdr->ip6_plen = htons(sizeof(*icmp) + pseudo.length);
hdr->ip6_nxt = IPPROTO_ICMPV6;
hdr->ip6_hlim = 255;
- memcpy(&hdr->ip6_dst, &pseudo.ip6_
src
, 16);
- memcpy(&hdr->ip6_src, &pseudo.ip6_
dst
, 16);
+ memcpy(&hdr->ip6_dst, &pseudo.ip6_
dst
, 16);
+ memcpy(&hdr->ip6_src, &pseudo.ip6_
src
, 16);
/* Fill in ICMP header */
/* Fill in ICMP header */
@@
-323,8
+345,6
@@
void route_ipv6_unreachable(vpn_packet_t *packet, uint8_t code)
/* Create pseudo header */
/* Create pseudo header */
- memcpy(&pseudo.ip6_src, &hdr->ip6_src, 16);
- memcpy(&pseudo.ip6_dst, &hdr->ip6_dst, 16);
pseudo.length = htonl(sizeof(*icmp) + pseudo.length);
pseudo.next = htonl(IPPROTO_ICMPV6);
pseudo.length = htonl(sizeof(*icmp) + pseudo.length);
pseudo.next = htonl(IPPROTO_ICMPV6);
@@
-340,6
+360,8
@@
void route_ipv6_unreachable(vpn_packet_t *packet, uint8_t code)
write_packet(packet);
}
write_packet(packet);
}
+#endif
+
node_t *route_ipv6(vpn_packet_t *packet)
{
subnet_t *subnet;
node_t *route_ipv6(vpn_packet_t *packet)
{
subnet_t *subnet;
@@
-360,17
+382,23
@@
node_t *route_ipv6(vpn_packet_t *packet)
ntohs(*(uint16_t *) & packet->data[50]),
ntohs(*(uint16_t *) & packet->data[52]));
}
ntohs(*(uint16_t *) & packet->data[50]),
ntohs(*(uint16_t *) & packet->data[52]));
}
+#ifdef HAVE_NETINET_IP6_H
route_ipv6_unreachable(packet, ICMP6_DST_UNREACH_ADDR);
route_ipv6_unreachable(packet, ICMP6_DST_UNREACH_ADDR);
+#endif
return NULL;
}
return NULL;
}
+#ifdef HAVE_NETINET_IP6_H
if(!subnet->owner->status.reachable)
route_ipv6_unreachable(packet, ICMP6_DST_UNREACH_NOROUTE);
if(!subnet->owner->status.reachable)
route_ipv6_unreachable(packet, ICMP6_DST_UNREACH_NOROUTE);
-
+#endif
+
return subnet->owner;
}
return subnet->owner;
}
+#ifdef HAVE_NETINET_IP6_H
+
/* RFC 2461 */
void route_neighborsol(vpn_packet_t *packet)
/* RFC 2461 */
void route_neighborsol(vpn_packet_t *packet)
@@
-396,7
+424,8
@@
void route_neighborsol(vpn_packet_t *packet)
/* First, snatch the source address from the neighbor solicitation packet */
/* First, snatch the source address from the neighbor solicitation packet */
- memcpy(mymac.net.mac.address.x, packet->data + 6, 6);
+ if(overwrite_mac)
+ memcpy(mymac.x, packet->data + 6, 6);
/* Check if this is a valid neighbor solicitation request */
/* Check if this is a valid neighbor solicitation request */
@@
-486,6
+515,8
@@
void route_neighborsol(vpn_packet_t *packet)
write_packet(packet);
}
write_packet(packet);
}
+#endif
+
/* RFC 826 */
void route_arp(vpn_packet_t *packet)
/* RFC 826 */
void route_arp(vpn_packet_t *packet)
@@
-498,7
+529,8
@@
void route_arp(vpn_packet_t *packet)
/* First, snatch the source address from the ARP packet */
/* First, snatch the source address from the ARP packet */
- memcpy(mymac.net.mac.address.x, packet->data + 6, 6);
+ if(overwrite_mac)
+ memcpy(mymac.x, packet->data + 6, 6);
/* This routine generates replies to ARP requests.
You don't need to set NOARP flag on the interface anymore (which is broken on FreeBSD).
/* This routine generates replies to ARP requests.
You don't need to set NOARP flag on the interface anymore (which is broken on FreeBSD).
@@
-568,10
+600,12
@@
void route_outgoing(vpn_packet_t *packet)
break;
case 0x86DD:
break;
case 0x86DD:
+#ifdef HAVE_NETINET_IP6_H
if(packet->data[20] == IPPROTO_ICMPV6 && packet->data[54] == ND_NEIGHBOR_SOLICIT) {
route_neighborsol(packet);
return;
}
if(packet->data[20] == IPPROTO_ICMPV6 && packet->data[54] == ND_NEIGHBOR_SOLICIT) {
route_neighborsol(packet);
return;
}
+#endif
n = route_ipv6(packet);
break;
n = route_ipv6(packet);
break;
@@
-627,7
+661,8
@@
void route_incoming(node_t *source, vpn_packet_t *packet)
if(n) {
if(n == myself) {
if(n) {
if(n == myself) {
- memcpy(packet->data, mymac.net.mac.address.x, 6);
+ if(overwrite_mac)
+ memcpy(packet->data, mymac.x, 6);
write_packet(packet);
} else
send_packet(n, packet);
write_packet(packet);
} else
send_packet(n, packet);