mirror of
https://github.com/SoftEtherVPN/SoftEtherVPN.git
synced 2025-04-03 18:00:08 +03:00
2730 lines
64 KiB
C
2730 lines
64 KiB
C
// SoftEther VPN Source Code - Developer Edition Master Branch
|
|
// Cedar Communication Module
|
|
|
|
|
|
// IPC.c
|
|
// In-process VPN client module
|
|
|
|
#include "IPC.h"
|
|
|
|
#include "Admin.h"
|
|
#include "Cedar.h"
|
|
#include "Client.h"
|
|
#include "Connection.h"
|
|
#include "Hub.h"
|
|
#include "Protocol.h"
|
|
#include "Radius.h"
|
|
#include "Virtual.h"
|
|
|
|
#include "Mayaqua/Memory.h"
|
|
#include "Mayaqua/Object.h"
|
|
#include "Mayaqua/Pack.h"
|
|
#include "Mayaqua/Str.h"
|
|
#include "Mayaqua/Tick64.h"
|
|
|
|
// Extract the MS-CHAP v2 authentication information by parsing the password string
|
|
bool ParseAndExtractMsChapV2InfoFromPassword(IPC_MSCHAP_V2_AUTHINFO *d, char *password)
|
|
{
|
|
TOKEN_LIST *t;
|
|
bool ret = false;
|
|
// Validate arguments
|
|
if (d == NULL || password == NULL)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
Zero(d, sizeof(IPC_MSCHAP_V2_AUTHINFO));
|
|
|
|
if (StartWith(password, IPC_PASSWORD_MSCHAPV2_TAG) == false)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
t = ParseTokenWithNullStr(password, ":");
|
|
|
|
if (t->NumTokens == 6)
|
|
{
|
|
BUF *b1, *b2, *b3, *b4;
|
|
|
|
b1 = StrToBin(t->Token[2]);
|
|
b2 = StrToBin(t->Token[3]);
|
|
b3 = StrToBin(t->Token[4]);
|
|
b4 = StrToBin(t->Token[5]);
|
|
|
|
if (IsEmptyStr(t->Token[1]) == false && b1->Size == 16 && b2->Size == 16 && b3->Size == 24
|
|
&& b4->Size == 8)
|
|
{
|
|
UINT64 eap_client_ptr = 0;
|
|
|
|
StrCpy(d->MsChapV2_PPPUsername, sizeof(d->MsChapV2_PPPUsername), t->Token[1]);
|
|
Copy(d->MsChapV2_ServerChallenge, b1->Buf, 16);
|
|
Copy(d->MsChapV2_ClientChallenge, b2->Buf, 16);
|
|
Copy(d->MsChapV2_ClientResponse, b3->Buf, 24);
|
|
Copy(&eap_client_ptr, b4->Buf, 8);
|
|
|
|
d->MsChapV2_EapClient = (EAP_CLIENT *)eap_client_ptr;
|
|
|
|
ret = true;
|
|
}
|
|
|
|
FreeBuf(b1);
|
|
FreeBuf(b2);
|
|
FreeBuf(b3);
|
|
FreeBuf(b4);
|
|
}
|
|
|
|
FreeToken(t);
|
|
|
|
return ret;
|
|
}
|
|
|
|
// Start an IPC connection asynchronously
|
|
IPC_ASYNC *NewIPCAsync(CEDAR *cedar, IPC_PARAM *param, SOCK_EVENT *sock_event)
|
|
{
|
|
IPC_ASYNC *a;
|
|
// Validate arguments
|
|
if (cedar == NULL || param == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
a = ZeroMalloc(sizeof(IPC_ASYNC));
|
|
|
|
a->TubeForDisconnect = NewTube(0);
|
|
|
|
a->Cedar = cedar;
|
|
AddRef(a->Cedar->ref);
|
|
|
|
Copy(&a->Param, param, sizeof(IPC_PARAM));
|
|
|
|
if (param->ClientCertificate != NULL)
|
|
{
|
|
// Client certificate must be copied for async processing
|
|
a->Param.ClientCertificate = CloneX(param->ClientCertificate);
|
|
}
|
|
|
|
if (sock_event != NULL)
|
|
{
|
|
a->SockEvent = sock_event;
|
|
AddRef(a->SockEvent->ref);
|
|
}
|
|
|
|
a->Thread = NewThread(IPCAsyncThreadProc, a);
|
|
|
|
return a;
|
|
}
|
|
|
|
// asynchronous IPC connection creation thread
|
|
void IPCAsyncThreadProc(THREAD *thread, void *param)
|
|
{
|
|
IPC_ASYNC *a;
|
|
// Validate arguments
|
|
if (thread == NULL || param == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
a = (IPC_ASYNC *)param;
|
|
|
|
// Attempt to connect
|
|
a->Ipc = NewIPCByParam(a->Cedar, &a->Param, &a->ErrorCode);
|
|
|
|
if (a->Ipc != NULL)
|
|
{
|
|
if (a->Param.IsL3Mode)
|
|
{
|
|
DHCP_OPTION_LIST cao;
|
|
|
|
Zero(&cao, sizeof(cao));
|
|
|
|
// Get an IP address from the DHCP server in the case of L3 mode
|
|
Debug("IPCDhcpAllocateIP() start...\n");
|
|
if (IPCDhcpAllocateIP(a->Ipc, &cao, a->TubeForDisconnect))
|
|
{
|
|
UINT t;
|
|
IP ip, subnet, gw;
|
|
|
|
Debug("IPCDhcpAllocateIP() Ok.\n");
|
|
|
|
// Calculate the DHCP update interval
|
|
t = cao.LeaseTime;
|
|
if (t == 0)
|
|
{
|
|
t = 600;
|
|
}
|
|
|
|
t = t / 3;
|
|
|
|
if (t == 0)
|
|
{
|
|
t = 1;
|
|
}
|
|
|
|
// Save the options list
|
|
Copy(&a->L3ClientAddressOption, &cao, sizeof(DHCP_OPTION_LIST));
|
|
a->L3DhcpRenewInterval = (UINT64)t * (UINT64)1000;
|
|
|
|
// Set the obtained IP address parameters to the IPC virtual host
|
|
UINTToIP(&ip, cao.ClientAddress);
|
|
UINTToIP(&subnet, cao.SubnetMask);
|
|
UINTToIP(&gw, cao.Gateway);
|
|
|
|
IPCSetIPv4Parameters(a->Ipc, &ip, &subnet, &gw, &cao.ClasslessRoute);
|
|
|
|
a->L3NextDhcpRenewTick = Tick64() + a->L3DhcpRenewInterval;
|
|
}
|
|
else
|
|
{
|
|
Debug("IPCDhcpAllocateIP() Error.\n");
|
|
|
|
a->DhcpAllocFailed = true;
|
|
|
|
FreeIPC(a->Ipc);
|
|
a->Ipc = NULL;
|
|
}
|
|
}
|
|
}
|
|
|
|
// Procedure complete
|
|
a->Done = true;
|
|
|
|
if (a->SockEvent != NULL)
|
|
{
|
|
SetSockEvent(a->SockEvent);
|
|
}
|
|
}
|
|
|
|
// Release the IPC asynchronous connection object
|
|
void FreeIPCAsync(IPC_ASYNC *a)
|
|
{
|
|
// Validate arguments
|
|
if (a == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
TubeDisconnect(a->TubeForDisconnect);
|
|
WaitThread(a->Thread, INFINITE);
|
|
ReleaseThread(a->Thread);
|
|
|
|
if (a->Ipc != NULL)
|
|
{
|
|
FreeIPC(a->Ipc);
|
|
a->Ipc = NULL;
|
|
}
|
|
|
|
if (a->SockEvent != NULL)
|
|
{
|
|
ReleaseSockEvent(a->SockEvent);
|
|
}
|
|
|
|
ReleaseCedar(a->Cedar);
|
|
|
|
ReleaseTube(a->TubeForDisconnect);
|
|
|
|
if (a->Param.ClientCertificate != NULL)
|
|
{
|
|
FreeX(a->Param.ClientCertificate);
|
|
}
|
|
|
|
Free(a);
|
|
}
|
|
|
|
// Start a new IPC connection by specifying the parameter structure
|
|
IPC *NewIPCByParam(CEDAR *cedar, IPC_PARAM *param, UINT *error_code)
|
|
{
|
|
IPC *ipc;
|
|
// Validate arguments
|
|
if (cedar == NULL || param == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
ipc = NewIPC(cedar, param->ClientName, param->Postfix, param->HubName,
|
|
param->UserName, param->Password, param->WgKey, error_code,
|
|
¶m->ClientIp, param->ClientPort, ¶m->ServerIp, param->ServerPort,
|
|
param->ClientHostname, param->CryptName,
|
|
param->BridgeMode, param->Mss, NULL, param->ClientCertificate, param->Layer);
|
|
|
|
return ipc;
|
|
}
|
|
|
|
// Start a new IPC connection
|
|
IPC *NewIPC(CEDAR *cedar, char *client_name, char *postfix, char *hubname, char *username, char *password, char *wg_key,
|
|
UINT *error_code, IP *client_ip, UINT client_port, IP *server_ip, UINT server_port,
|
|
char *client_hostname, char *crypt_name,
|
|
bool bridge_mode, UINT mss, EAP_CLIENT *eap_client, X *client_certificate,
|
|
UINT layer)
|
|
{
|
|
IPC *ipc;
|
|
HUB *hub;
|
|
UINT dummy_int = 0;
|
|
SOCK *a;
|
|
SOCK *s;
|
|
PACK *p;
|
|
UINT err = ERR_INTERNAL_ERROR;
|
|
char server_str[MAX_SIZE];
|
|
char macstr[30];
|
|
UINT server_ver, server_build;
|
|
UCHAR unique[SHA1_SIZE];
|
|
NODE_INFO info;
|
|
BUF *b;
|
|
UCHAR mschap_v2_server_response_20[20];
|
|
UINT64 u64;
|
|
// Validate arguments
|
|
if (cedar == NULL || username == NULL || password == NULL || client_hostname == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
if (IsEmptyStr(client_name))
|
|
{
|
|
client_name = "InProc VPN Connection";
|
|
}
|
|
if (IsEmptyStr(crypt_name))
|
|
{
|
|
crypt_name = "";
|
|
}
|
|
if (error_code == NULL)
|
|
{
|
|
error_code = &dummy_int;
|
|
}
|
|
|
|
Zero(mschap_v2_server_response_20, sizeof(mschap_v2_server_response_20));
|
|
|
|
err = *error_code = ERR_INTERNAL_ERROR;
|
|
|
|
a = GetInProcListeningSock(cedar);
|
|
if (a == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
ipc = ZeroMalloc(sizeof(IPC));
|
|
|
|
ipc->Cedar = cedar;
|
|
AddRef(cedar->ref);
|
|
|
|
ipc->Layer = layer;
|
|
if (ipc->Layer == 0)
|
|
{
|
|
ipc->Layer = IPC_LAYER_2;
|
|
}
|
|
|
|
ipc->FlushList = NewTubeFlushList();
|
|
|
|
StrCpy(ipc->ClientHostname, sizeof(ipc->ClientHostname), client_hostname);
|
|
|
|
// Connect the in-process socket
|
|
s = ConnectInProc(a, client_ip, client_port, server_ip, server_port);
|
|
if (s == NULL)
|
|
{
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
// Protocol initialization process
|
|
if (ClientUploadSignature(s) == false)
|
|
{
|
|
err = ERR_DISCONNECTED;
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
p = HttpClientRecv(s);
|
|
if (p == NULL)
|
|
{
|
|
err = ERR_DISCONNECTED;
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
err = GetErrorFromPack(p);
|
|
if (err != ERR_NO_ERROR)
|
|
{
|
|
FreePack(p);
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
if (GetHello(p, ipc->random, &server_ver, &server_build, server_str, sizeof(server_str)) == false)
|
|
{
|
|
FreePack(p);
|
|
err = ERR_DISCONNECTED;
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
FreePack(p);
|
|
|
|
// Upload the authentication data
|
|
if (IsEmptyStr(wg_key) == false)
|
|
{
|
|
p = PackLoginWithWireGuardKey(wg_key);
|
|
}
|
|
else if (client_certificate != NULL)
|
|
{
|
|
p = PackLoginWithOpenVPNCertificate(hubname, username, client_certificate);
|
|
}
|
|
else
|
|
{
|
|
p = PackLoginWithPlainPassword(hubname, username, password);
|
|
}
|
|
|
|
if (p == NULL)
|
|
{
|
|
err = ERR_AUTH_FAILED;
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
PackAddStr(p, "hello", client_name);
|
|
PackAddInt(p, "client_ver", cedar->Version);
|
|
PackAddInt(p, "client_build", cedar->Build);
|
|
PackAddInt(p, "max_connection", 1);
|
|
PackAddInt(p, "use_encrypt", 0);
|
|
PackAddInt(p, "use_compress", 0);
|
|
PackAddInt(p, "half_connection", 0);
|
|
PackAddInt(p, "adjust_mss", mss);
|
|
PackAddBool(p, "require_bridge_routing_mode", bridge_mode);
|
|
PackAddBool(p, "require_monitor_mode", false);
|
|
PackAddBool(p, "qos", false);
|
|
|
|
if (eap_client != NULL)
|
|
{
|
|
UINT64 ptr = (UINT64)eap_client;
|
|
PackAddInt64(p, "release_me_eap_client", ptr);
|
|
|
|
AddRef(eap_client->Ref);
|
|
}
|
|
|
|
// Unique ID is determined by the sum of the connecting client IP address and the client_name
|
|
b = NewBuf();
|
|
WriteBuf(b, client_ip, sizeof(IP));
|
|
WriteBufStr(b, client_name);
|
|
WriteBufStr(b, crypt_name);
|
|
|
|
Sha1(unique, b->Buf, b->Size);
|
|
|
|
FreeBuf(b);
|
|
|
|
PackAddData(p, "unique_id", unique, SHA1_SIZE);
|
|
|
|
PackAddStr(p, "inproc_postfix", postfix);
|
|
PackAddStr(p, "inproc_cryptname", crypt_name);
|
|
PackAddInt(p, "inproc_layer", ipc->Layer);
|
|
|
|
// Node information
|
|
Zero(&info, sizeof(info));
|
|
StrCpy(info.ClientProductName, sizeof(info.ClientProductName), client_name);
|
|
info.ClientProductVer = Endian32(cedar->Version);
|
|
info.ClientProductBuild = Endian32(cedar->Build);
|
|
StrCpy(info.ServerProductName, sizeof(info.ServerProductName), server_str);
|
|
info.ServerProductVer = Endian32(server_ver);
|
|
info.ServerProductBuild = Endian32(server_build);
|
|
StrCpy(info.ClientOsName, sizeof(info.ClientOsName), client_name);
|
|
StrCpy(info.ClientOsVer, sizeof(info.ClientOsVer), "-");
|
|
StrCpy(info.ClientOsProductId, sizeof(info.ClientOsProductId), "-");
|
|
info.ClientIpAddress = IPToUINT(&s->LocalIP);
|
|
info.ClientPort = Endian32(s->LocalPort);
|
|
StrCpy(info.ClientHostname, sizeof(info.ClientHostname), ipc->ClientHostname);
|
|
IPToStr(info.ServerHostname, sizeof(info.ServerHostname), &s->RemoteIP);
|
|
info.ServerIpAddress = IPToUINT(&s->RemoteIP);
|
|
info.ServerPort = Endian32(s->RemotePort);
|
|
StrCpy(info.HubName, sizeof(info.HubName), hubname);
|
|
Copy(info.UniqueId, unique, sizeof(info.UniqueId));
|
|
if (IsIP6(&s->LocalIP))
|
|
{
|
|
Copy(info.ClientIpAddress6, s->LocalIP.address, sizeof(info.ClientIpAddress6));
|
|
}
|
|
if (IsIP6(&s->RemoteIP))
|
|
{
|
|
Copy(info.ServerIpAddress6, s->RemoteIP.address, sizeof(info.ServerIpAddress6));
|
|
}
|
|
OutRpcNodeInfo(p, &info);
|
|
|
|
if (HttpClientSend(s, p) == false)
|
|
{
|
|
FreePack(p);
|
|
err = ERR_DISCONNECTED;
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
FreePack(p);
|
|
|
|
// Receive a Welcome packet
|
|
p = HttpClientRecv(s);
|
|
if (p == NULL)
|
|
{
|
|
err = ERR_DISCONNECTED;
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
err = GetErrorFromPack(p);
|
|
if (err != ERR_NO_ERROR)
|
|
{
|
|
FreePack(p);
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
if (ParseWelcomeFromPack(p, ipc->SessionName, sizeof(ipc->SessionName),
|
|
ipc->ConnectionName, sizeof(ipc->ConnectionName), &ipc->Policy) == false)
|
|
{
|
|
err = ERR_PROTOCOL_ERROR;
|
|
FreePack(p);
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
if (PackGetData2(p, "IpcMacAddress", ipc->MacAddress, 6) == false || IsZero(ipc->MacAddress, 6))
|
|
{
|
|
err = ERR_PROTOCOL_ERROR;
|
|
FreePack(p);
|
|
goto LABEL_ERROR;
|
|
}
|
|
|
|
if (PackGetData2(p, "IpcMsChapV2ServerResponse", mschap_v2_server_response_20, sizeof(mschap_v2_server_response_20)))
|
|
{
|
|
Copy(ipc->MsChapV2_ServerResponse, mschap_v2_server_response_20, sizeof(mschap_v2_server_response_20));
|
|
}
|
|
|
|
PackGetStr(p, "IpcHubName", ipc->HubName, sizeof(ipc->HubName));
|
|
Debug("IPC Hub Name: %s\n", ipc->HubName);
|
|
|
|
hub = GetHub(cedar, ipc->HubName);
|
|
if (hub != NULL)
|
|
{
|
|
UINTToIP(&ipc->DefaultGateway, hub->Option->DefaultGateway);
|
|
UINTToIP(&ipc->SubnetMask, hub->Option->DefaultSubnet);
|
|
GetBroadcastAddress4(&ipc->BroadcastAddress, &ipc->DefaultGateway, &ipc->SubnetMask);
|
|
}
|
|
else
|
|
{
|
|
ZeroIP4(&ipc->DefaultGateway);
|
|
ZeroIP4(&ipc->SubnetMask);
|
|
ZeroIP4(&ipc->BroadcastAddress);
|
|
}
|
|
|
|
ReleaseHub(hub);
|
|
|
|
ZeroIP4(&ipc->ClientIPAddress);
|
|
|
|
MacToStr(macstr, sizeof(macstr), ipc->MacAddress);
|
|
|
|
Debug("IPC: Session = %s, Connection = %s, Mac = %s\n", ipc->SessionName, ipc->ConnectionName, macstr);
|
|
|
|
u64 = PackGetInt64(p, "IpcSessionSharedBuffer");
|
|
ipc->IpcSessionSharedBuffer = (SHARED_BUFFER *)u64;
|
|
ipc->IpcSessionShared = ipc->IpcSessionSharedBuffer->Data;
|
|
|
|
FreePack(p);
|
|
|
|
ReleaseSock(a);
|
|
ipc->Sock = s;
|
|
|
|
Debug("NewIPC() Succeed.\n");
|
|
|
|
ipc->Interrupt = NewInterruptManager();
|
|
|
|
// Create an ARP table
|
|
ipc->ArpTable = NewList(IPCCmpArpTable);
|
|
|
|
// Create an IPv4 reception queue
|
|
ipc->IPv4ReceivedQueue = NewQueue();
|
|
ipc->IPv4State = IPC_PROTO_STATUS_CLOSED;
|
|
|
|
ipc->DHCPv4Awaiter.IsAwaiting = false;
|
|
ipc->DHCPv4Awaiter.DhcpData = NULL;
|
|
|
|
IPCIPv6Init(ipc);
|
|
|
|
return ipc;
|
|
|
|
LABEL_ERROR:
|
|
Debug("NewIPC() Failed: Err = %u\n", err);
|
|
Disconnect(s);
|
|
ReleaseSock(s);
|
|
ReleaseSock(a);
|
|
FreeIPC(ipc);
|
|
*error_code = err;
|
|
return NULL;
|
|
}
|
|
|
|
// Create a new IPC based on SOCK
|
|
IPC *NewIPCBySock(CEDAR *cedar, SOCK *s, void *mac_address)
|
|
{
|
|
IPC *ipc;
|
|
// Validate arguments
|
|
if (cedar == NULL || mac_address == NULL || s == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
ipc = ZeroMalloc(sizeof(IPC));
|
|
|
|
ipc->Cedar = cedar;
|
|
AddRef(cedar->ref);
|
|
|
|
ipc->Sock = s;
|
|
AddRef(s->ref);
|
|
|
|
Copy(ipc->MacAddress, mac_address, 6);
|
|
|
|
ipc->Interrupt = NewInterruptManager();
|
|
|
|
// Create an ARP table
|
|
ipc->ArpTable = NewList(IPCCmpArpTable);
|
|
|
|
// Create an IPv4 reception queue
|
|
ipc->IPv4ReceivedQueue = NewQueue();
|
|
ipc->IPv4State = IPC_PROTO_STATUS_CLOSED;
|
|
|
|
ipc->DHCPv4Awaiter.IsAwaiting = false;
|
|
ipc->DHCPv4Awaiter.DhcpData = NULL;
|
|
|
|
ipc->FlushList = NewTubeFlushList();
|
|
|
|
IPCIPv6Init(ipc);
|
|
|
|
return ipc;
|
|
}
|
|
|
|
// Get whether the IPC is connected
|
|
bool IsIPCConnected(IPC *ipc)
|
|
{
|
|
// Validate arguments
|
|
if (ipc == NULL)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
if (IsTubeConnected(ipc->Sock->RecvTube) == false || IsTubeConnected(ipc->Sock->SendTube) == false)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
// Get to hit the SOCK_EVENT when a new data has arrived in the IPC
|
|
void IPCSetSockEventWhenRecvL2Packet(IPC *ipc, SOCK_EVENT *e)
|
|
{
|
|
// Validate arguments
|
|
if (ipc == NULL || e == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
JoinSockToSockEvent(ipc->Sock, e);
|
|
}
|
|
|
|
// End of IPC connection
|
|
void FreeIPC(IPC *ipc)
|
|
{
|
|
UINT i;
|
|
// Validate arguments
|
|
if (ipc == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
FreeTubeFlushList(ipc->FlushList);
|
|
|
|
Disconnect(ipc->Sock);
|
|
ReleaseSock(ipc->Sock);
|
|
|
|
if (ipc->Policy != NULL)
|
|
{
|
|
Free(ipc->Policy);
|
|
}
|
|
|
|
ReleaseCedar(ipc->Cedar);
|
|
|
|
FreeInterruptManager(ipc->Interrupt);
|
|
|
|
for (i = 0; i < LIST_NUM(ipc->ArpTable); i++)
|
|
{
|
|
IPC_ARP *a = LIST_DATA(ipc->ArpTable, i);
|
|
IPCFreeARP(a);
|
|
}
|
|
|
|
ReleaseList(ipc->ArpTable);
|
|
|
|
while (true)
|
|
{
|
|
BLOCK *b = GetNext(ipc->IPv4ReceivedQueue);
|
|
if (b == NULL)
|
|
{
|
|
break;
|
|
}
|
|
|
|
FreeBlock(b);
|
|
}
|
|
|
|
ReleaseQueue(ipc->IPv4ReceivedQueue);
|
|
|
|
ReleaseSharedBuffer(ipc->IpcSessionSharedBuffer);
|
|
|
|
FreeDHCPv4Data(ipc->DHCPv4Awaiter.DhcpData);
|
|
|
|
IPCIPv6Free(ipc);
|
|
|
|
Free(ipc);
|
|
}
|
|
|
|
// Set User Class option if corresponding Virtual Hub optin is set
|
|
void IPCDhcpSetConditionalUserClass(IPC *ipc, DHCP_OPTION_LIST *req)
|
|
{
|
|
HUB *hub;
|
|
|
|
hub = GetHub(ipc->Cedar, ipc->HubName);
|
|
if (hub == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (hub->Option && hub->Option->UseHubNameAsDhcpUserClassOption)
|
|
{
|
|
StrCpy(req->UserClass, sizeof(req->UserClass), ipc->HubName);
|
|
}
|
|
ReleaseHub(hub);
|
|
}
|
|
|
|
// Release the IP address from the DHCP server
|
|
void IPCDhcpFreeIP(IPC *ipc, IP *dhcp_server)
|
|
{
|
|
DHCP_OPTION_LIST req;
|
|
UINT tran_id = Rand32();
|
|
// Validate arguments
|
|
if (ipc == NULL || dhcp_server == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
Zero(&req, sizeof(req));
|
|
req.Opcode = DHCP_RELEASE;
|
|
req.ServerAddress = IPToUINT(dhcp_server);
|
|
IPCDhcpSetConditionalUserClass(ipc, &req);
|
|
|
|
FreeDHCPv4Data(IPCSendDhcpRequest(ipc, NULL, tran_id, &req, 0, 0, NULL));
|
|
}
|
|
|
|
// Update the IP address using the DHCP
|
|
void IPCDhcpRenewIP(IPC *ipc, IP *dhcp_server)
|
|
{
|
|
DHCP_OPTION_LIST req;
|
|
UINT tran_id = Rand32();
|
|
// Validate arguments
|
|
if (ipc == NULL || dhcp_server == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// Send a DHCP Request
|
|
Zero(&req, sizeof(req));
|
|
req.Opcode = DHCP_REQUEST;
|
|
StrCpy(req.Hostname, sizeof(req.Hostname), ipc->ClientHostname);
|
|
req.RequestedIp = IPToUINT(&ipc->ClientIPAddress);
|
|
IPCDhcpSetConditionalUserClass(ipc, &req);
|
|
|
|
FreeDHCPv4Data(IPCSendDhcpRequest(ipc, dhcp_server, tran_id, &req, 0, 0, NULL));
|
|
}
|
|
|
|
// Get the information other than the IP address with using DHCP
|
|
bool IPCDhcpRequestInformIP(IPC *ipc, DHCP_OPTION_LIST *opt, TUBE *discon_poll_tube, IP *client_ip)
|
|
{
|
|
DHCP_OPTION_LIST req;
|
|
DHCPV4_DATA *d;
|
|
UINT tran_id = Rand32();
|
|
bool ok;
|
|
// Validate arguments
|
|
if (ipc == NULL || opt == NULL || client_ip == NULL)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
// Send a DHCP Inform
|
|
Zero(&req, sizeof(req));
|
|
req.Opcode = DHCP_INFORM;
|
|
req.ClientAddress = IPToUINT(client_ip);
|
|
StrCpy(req.Hostname, sizeof(req.Hostname), ipc->ClientHostname);
|
|
IPCDhcpSetConditionalUserClass(ipc, &req);
|
|
|
|
d = IPCSendDhcpRequest(ipc, NULL, tran_id, &req, DHCP_ACK, IPC_DHCP_TIMEOUT, discon_poll_tube);
|
|
if (d == NULL)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
// Analyze the DHCP Ack
|
|
ok = true;
|
|
if (d->ParsedOptionList->SubnetMask == 0)
|
|
{
|
|
ok = false;
|
|
}
|
|
|
|
if (ok == false)
|
|
{
|
|
FreeDHCPv4Data(d);
|
|
return false;
|
|
}
|
|
|
|
Copy(opt, d->ParsedOptionList, sizeof(DHCP_OPTION_LIST));
|
|
|
|
FreeDHCPv4Data(d);
|
|
|
|
return true;
|
|
}
|
|
|
|
// Make a request for IP addresses using DHCP
|
|
bool IPCDhcpAllocateIP(IPC *ipc, DHCP_OPTION_LIST *opt, TUBE *discon_poll_tube)
|
|
{
|
|
DHCP_OPTION_LIST req;
|
|
DHCPV4_DATA *d, *d2;
|
|
UINT tran_id = Rand32();
|
|
bool ok;
|
|
// Validate arguments
|
|
if (ipc == NULL || opt == NULL)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
// Send a DHCP Discover
|
|
Zero(&req, sizeof(req));
|
|
req.RequestedIp = 0;
|
|
req.Opcode = DHCP_DISCOVER;
|
|
StrCpy(req.Hostname, sizeof(req.Hostname), ipc->ClientHostname);
|
|
IPCDhcpSetConditionalUserClass(ipc, &req);
|
|
|
|
d = IPCSendDhcpRequest(ipc, NULL, tran_id, &req, DHCP_OFFER, IPC_DHCP_TIMEOUT, discon_poll_tube);
|
|
if (d == NULL)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
// Analyze the DHCP Offer
|
|
ok = true;
|
|
if (IsValidUnicastIPAddressUINT4(d->ParsedOptionList->ClientAddress) == false)
|
|
{
|
|
ok = false;
|
|
}
|
|
if (IsValidUnicastIPAddressUINT4(d->ParsedOptionList->ServerAddress) == false)
|
|
{
|
|
ok = false;
|
|
}
|
|
if (d->ParsedOptionList->SubnetMask == 0)
|
|
{
|
|
ok = false;
|
|
}
|
|
if (d->ParsedOptionList->LeaseTime == 0)
|
|
{
|
|
d->ParsedOptionList->LeaseTime = IPC_DHCP_DEFAULT_LEASE;
|
|
}
|
|
if (d->ParsedOptionList->LeaseTime <= IPC_DHCP_MIN_LEASE)
|
|
{
|
|
d->ParsedOptionList->LeaseTime = IPC_DHCP_MIN_LEASE;
|
|
}
|
|
|
|
if (ok == false)
|
|
{
|
|
FreeDHCPv4Data(d);
|
|
return false;
|
|
}
|
|
|
|
// Send a DHCP Request
|
|
Zero(&req, sizeof(req));
|
|
req.Opcode = DHCP_REQUEST;
|
|
StrCpy(req.Hostname, sizeof(req.Hostname), ipc->ClientHostname);
|
|
req.ServerAddress = d->ParsedOptionList->ServerAddress;
|
|
req.RequestedIp = d->ParsedOptionList->ClientAddress;
|
|
IPCDhcpSetConditionalUserClass(ipc, &req);
|
|
|
|
d2 = IPCSendDhcpRequest(ipc, NULL, tran_id, &req, DHCP_ACK, IPC_DHCP_TIMEOUT, discon_poll_tube);
|
|
if (d2 == NULL)
|
|
{
|
|
FreeDHCPv4Data(d);
|
|
return false;
|
|
}
|
|
|
|
// Analyze the DHCP Ack
|
|
ok = true;
|
|
if (IsValidUnicastIPAddressUINT4(d2->ParsedOptionList->ClientAddress) == false)
|
|
{
|
|
ok = false;
|
|
}
|
|
if (IsValidUnicastIPAddressUINT4(d2->ParsedOptionList->ServerAddress) == false)
|
|
{
|
|
ok = false;
|
|
}
|
|
if (d2->ParsedOptionList->SubnetMask == 0)
|
|
{
|
|
ok = false;
|
|
}
|
|
if (d2->ParsedOptionList->LeaseTime == 0)
|
|
{
|
|
d2->ParsedOptionList->LeaseTime = IPC_DHCP_DEFAULT_LEASE;
|
|
}
|
|
if (d2->ParsedOptionList->LeaseTime <= IPC_DHCP_MIN_LEASE)
|
|
{
|
|
d2->ParsedOptionList->LeaseTime = IPC_DHCP_MIN_LEASE;
|
|
}
|
|
|
|
if (ok == false)
|
|
{
|
|
FreeDHCPv4Data(d);
|
|
FreeDHCPv4Data(d2);
|
|
return false;
|
|
}
|
|
|
|
Copy(opt, d2->ParsedOptionList, sizeof(DHCP_OPTION_LIST));
|
|
|
|
FreeDHCPv4Data(d);
|
|
FreeDHCPv4Data(d2);
|
|
|
|
return true;
|
|
}
|
|
|
|
// Send out a DHCP request, and wait for a corresponding response
|
|
DHCPV4_DATA *IPCSendDhcpRequest(IPC *ipc, IP *dest_ip, UINT tran_id, DHCP_OPTION_LIST *opt, UINT expecting_code, UINT timeout, TUBE *discon_poll_tube)
|
|
{
|
|
UINT resend_interval;
|
|
UINT64 giveup_time;
|
|
UINT64 next_send_time = 0;
|
|
TUBE *tubes[3];
|
|
UINT num_tubes = 0;
|
|
// Validate arguments
|
|
if (ipc == NULL || opt == NULL || (expecting_code != 0 && timeout == 0))
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
// Retransmission interval
|
|
resend_interval = MAX(1, (timeout / 3) - 100);
|
|
|
|
// Time-out time
|
|
giveup_time = Tick64() + (UINT64)timeout;
|
|
|
|
AddInterrupt(ipc->Interrupt, giveup_time);
|
|
|
|
tubes[num_tubes++] = ipc->Sock->RecvTube;
|
|
tubes[num_tubes++] = ipc->Sock->SendTube;
|
|
|
|
if (discon_poll_tube != NULL)
|
|
{
|
|
tubes[num_tubes++] = discon_poll_tube;
|
|
}
|
|
|
|
while (true)
|
|
{
|
|
UINT64 now = Tick64();
|
|
BUF *dhcp_packet;
|
|
|
|
IPCFlushArpTable(ipc);
|
|
|
|
// Time-out inspection
|
|
if ((expecting_code != 0) && (now >= giveup_time))
|
|
{
|
|
ipc->DHCPv4Awaiter.IsAwaiting = false;
|
|
FreeDHCPv4Data(ipc->DHCPv4Awaiter.DhcpData);
|
|
ipc->DHCPv4Awaiter.DhcpData = NULL;
|
|
return NULL;
|
|
}
|
|
|
|
// Send by building a DHCP packet periodically
|
|
if (next_send_time == 0 || next_send_time <= now)
|
|
{
|
|
dhcp_packet = IPCBuildDhcpRequest(ipc, dest_ip, tran_id, opt);
|
|
if (dhcp_packet == NULL)
|
|
{
|
|
ipc->DHCPv4Awaiter.IsAwaiting = false;
|
|
FreeDHCPv4Data(ipc->DHCPv4Awaiter.DhcpData);
|
|
ipc->DHCPv4Awaiter.DhcpData = NULL;
|
|
return NULL;
|
|
}
|
|
|
|
IPCSendIPv4(ipc, dhcp_packet->Buf, dhcp_packet->Size);
|
|
|
|
FreeBuf(dhcp_packet);
|
|
|
|
if (expecting_code == 0)
|
|
{
|
|
ipc->DHCPv4Awaiter.IsAwaiting = false;
|
|
FreeDHCPv4Data(ipc->DHCPv4Awaiter.DhcpData);
|
|
ipc->DHCPv4Awaiter.DhcpData = NULL;
|
|
return NULL;
|
|
}
|
|
|
|
next_send_time = now + (UINT64)resend_interval;
|
|
|
|
AddInterrupt(ipc->Interrupt, next_send_time);
|
|
}
|
|
|
|
// Happy processing
|
|
ipc->DHCPv4Awaiter.IsAwaiting = true;
|
|
FreeDHCPv4Data(ipc->DHCPv4Awaiter.DhcpData);
|
|
ipc->DHCPv4Awaiter.DhcpData = NULL;
|
|
ipc->DHCPv4Awaiter.TransCode = tran_id;
|
|
ipc->DHCPv4Awaiter.OpCode = expecting_code;
|
|
IPCProcessL3Events(ipc);
|
|
|
|
if (ipc->DHCPv4Awaiter.DhcpData != NULL)
|
|
{
|
|
DHCPV4_DATA *dhcp = ipc->DHCPv4Awaiter.DhcpData;
|
|
ipc->DHCPv4Awaiter.IsAwaiting = false;
|
|
ipc->DHCPv4Awaiter.DhcpData = NULL;
|
|
return dhcp;
|
|
}
|
|
|
|
if (IsTubeConnected(ipc->Sock->RecvTube) == false || IsTubeConnected(ipc->Sock->SendTube) == false ||
|
|
(discon_poll_tube != NULL && IsTubeConnected(discon_poll_tube) == false))
|
|
{
|
|
// Session is disconnected
|
|
ipc->DHCPv4Awaiter.IsAwaiting = false;
|
|
FreeDHCPv4Data(ipc->DHCPv4Awaiter.DhcpData);
|
|
ipc->DHCPv4Awaiter.DhcpData = NULL;
|
|
return NULL;
|
|
}
|
|
|
|
// Keep the CPU waiting
|
|
WaitForTubes(tubes, num_tubes, GetNextIntervalForInterrupt(ipc->Interrupt));
|
|
}
|
|
|
|
ipc->DHCPv4Awaiter.IsAwaiting = false;
|
|
FreeDHCPv4Data(ipc->DHCPv4Awaiter.DhcpData);
|
|
ipc->DHCPv4Awaiter.DhcpData = NULL;
|
|
return NULL;
|
|
}
|
|
|
|
// Build a DHCP request packet
|
|
BUF *IPCBuildDhcpRequest(IPC *ipc, IP *dest_ip, UINT tran_id, DHCP_OPTION_LIST *opt)
|
|
{
|
|
IPV4_HEADER ip;
|
|
UDP_HEADER *udp;
|
|
DHCPV4_HEADER dhcp;
|
|
UINT blank_size = 128 + 64;
|
|
BUF *ret;
|
|
BUF *b;
|
|
UDPV4_PSEUDO_HEADER *ph;
|
|
UINT ph_size;
|
|
UINT udp_size;
|
|
UINT magic_number = Endian32(DHCP_MAGIC_COOKIE);
|
|
USHORT checksum;
|
|
// Validate arguments
|
|
if (ipc == NULL || opt == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
// DHCPv4 Options
|
|
b = IPCBuildDhcpRequestOptions(ipc, opt);
|
|
if (b == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
// DHCPv4 Header
|
|
Zero(&dhcp, sizeof(dhcp));
|
|
dhcp.OpCode = 1;
|
|
dhcp.HardwareType = ARP_HARDWARE_TYPE_ETHERNET;
|
|
dhcp.HardwareAddressSize = 6;
|
|
dhcp.Hops = 0;
|
|
dhcp.TransactionId = Endian32(tran_id);
|
|
dhcp.ClientIP = IPToUINT(&ipc->ClientIPAddress);
|
|
if (dhcp.ClientIP == 0)
|
|
{
|
|
dhcp.ClientIP = opt->ClientAddress;
|
|
}
|
|
Copy(dhcp.ClientMacAddress, ipc->MacAddress, 6);
|
|
|
|
// UDP pseudo header
|
|
ph_size = b->Size + sizeof(dhcp) + blank_size + sizeof(UINT) + sizeof(UDPV4_PSEUDO_HEADER);
|
|
udp_size = b->Size + sizeof(dhcp) + blank_size + sizeof(UINT) + sizeof(UDP_HEADER);
|
|
|
|
ph = ZeroMalloc(ph_size);
|
|
ph->SrcIP = IPToUINT(&ipc->ClientIPAddress);
|
|
ph->DstIP = IPToUINT(dest_ip);
|
|
ph->Protocol = IP_PROTO_UDP;
|
|
ph->PacketLength1 = Endian16(udp_size);
|
|
ph->SrcPort = Endian16(NAT_DHCP_CLIENT_PORT);
|
|
ph->DstPort = Endian16(NAT_DHCP_SERVER_PORT);
|
|
ph->PacketLength2 = Endian16(udp_size);
|
|
|
|
Copy(((UCHAR *)(ph)) + sizeof(UDPV4_PSEUDO_HEADER), &dhcp, sizeof(dhcp));
|
|
Copy(((UCHAR *)(ph)) + sizeof(UDPV4_PSEUDO_HEADER) + sizeof(dhcp) + blank_size, &magic_number, sizeof(UINT));
|
|
Copy(((UCHAR *)(ph)) + sizeof(UDPV4_PSEUDO_HEADER) + sizeof(dhcp) + blank_size + sizeof(UINT),
|
|
b->Buf, b->Size);
|
|
|
|
// UDP Header
|
|
udp = (UDP_HEADER *)(((UCHAR *)ph) + 12);
|
|
|
|
// Calculate the checksum
|
|
checksum = IpChecksum(ph, ph_size);
|
|
if (checksum == 0x0000)
|
|
{
|
|
checksum = 0xffff;
|
|
}
|
|
udp->Checksum = checksum;
|
|
|
|
// IP Header
|
|
Zero(&ip, sizeof(ip));
|
|
IPV4_SET_VERSION(&ip, 4);
|
|
IPV4_SET_HEADER_LEN(&ip, 5);
|
|
ip.Identification = Rand16();
|
|
ip.TimeToLive = 128;
|
|
ip.Protocol = IP_PROTO_UDP;
|
|
ip.SrcIP = IPToUINT(&ipc->ClientIPAddress);
|
|
if (dest_ip != NULL)
|
|
{
|
|
ip.DstIP = IPToUINT(dest_ip);
|
|
}
|
|
else
|
|
{
|
|
ip.DstIP = Endian32(0xffffffff);
|
|
}
|
|
ip.TotalLength = Endian16((USHORT)(sizeof(IPV4_HEADER) + udp_size));
|
|
ip.Checksum = IpChecksum(&ip, sizeof(IPV4_HEADER));
|
|
|
|
ret = NewBuf();
|
|
|
|
WriteBuf(ret, &ip, sizeof(IPV4_HEADER));
|
|
WriteBuf(ret, udp, udp_size);
|
|
|
|
FreeBuf(b);
|
|
Free(ph);
|
|
|
|
return ret;
|
|
}
|
|
|
|
// Build a option data in the DHCP request packet
|
|
BUF *IPCBuildDhcpRequestOptions(IPC *ipc, DHCP_OPTION_LIST *opt)
|
|
{
|
|
LIST *o;
|
|
UCHAR opcode;
|
|
BUF *ret;
|
|
// Validate arguments
|
|
if (ipc == NULL || opt == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
o = NewListFast(NULL);
|
|
|
|
// Opcode
|
|
opcode = opt->Opcode;
|
|
Add(o, NewDhcpOption(DHCP_ID_MESSAGE_TYPE, &opcode, sizeof(opcode)));
|
|
|
|
// Server ID
|
|
if (opt->ServerAddress != 0)
|
|
{
|
|
Add(o, NewDhcpOption(DHCP_ID_SERVER_ADDRESS, &opt->ServerAddress, 4));
|
|
}
|
|
|
|
// Requested IP Address
|
|
if (opt->RequestedIp != 0)
|
|
{
|
|
Add(o, NewDhcpOption(DHCP_ID_REQUEST_IP_ADDRESS, &opt->RequestedIp, 4));
|
|
}
|
|
|
|
// Hostname
|
|
if (IsEmptyStr(opt->Hostname) == false)
|
|
{
|
|
UCHAR client_id[MAX_HOST_NAME_LEN + 32];
|
|
UCHAR macstr[30];
|
|
MacToStr(macstr, sizeof(macstr), ipc->MacAddress);
|
|
|
|
Format(client_id, sizeof(client_id), "%s/%s", opt->Hostname, macstr);
|
|
|
|
Add(o, NewDhcpOption(DHCP_ID_HOST_NAME, opt->Hostname, StrLen(opt->Hostname)));
|
|
Add(o, NewDhcpOption(DHCP_ID_CLIENT_ID, client_id, StrLen(client_id)));
|
|
}
|
|
else // Client MAC Address
|
|
{
|
|
UCHAR client_id[7];
|
|
client_id[0] = ARP_HARDWARE_TYPE_ETHERNET;
|
|
Copy(client_id + 1, ipc->MacAddress, 6);
|
|
Add(o, NewDhcpOption(DHCP_ID_CLIENT_ID, client_id, sizeof(client_id)));
|
|
}
|
|
|
|
// User Class
|
|
if (IsEmptyStr(opt->UserClass) == false)
|
|
{
|
|
Add(o, NewDhcpOption(DHCP_ID_USER_CLASS, opt->UserClass, StrLen(opt->UserClass)));
|
|
}
|
|
|
|
// Vendor
|
|
Add(o, NewDhcpOption(DHCP_ID_VENDOR_ID, IPC_DHCP_VENDOR_ID, StrLen(IPC_DHCP_VENDOR_ID)));
|
|
|
|
// Parameter Request List
|
|
if (opcode == DHCP_DISCOVER || opcode == DHCP_REQUEST || opcode == DHCP_INFORM)
|
|
{
|
|
UCHAR param_list[12];
|
|
|
|
param_list[0] = 1;
|
|
param_list[1] = 15;
|
|
param_list[2] = 3;
|
|
param_list[3] = 6;
|
|
param_list[4] = 44;
|
|
param_list[5] = 46;
|
|
param_list[6] = 47;
|
|
param_list[7] = 31;
|
|
param_list[8] = 33;
|
|
param_list[9] = 121;
|
|
param_list[10] = 249;
|
|
param_list[11] = 43;
|
|
|
|
Add(o, NewDhcpOption(DHCP_ID_REQ_PARAM_LIST, param_list, sizeof(param_list)));
|
|
}
|
|
|
|
ret = BuildDhcpOptionsBuf(o);
|
|
|
|
FreeDhcpOptions(o);
|
|
|
|
return ret;
|
|
}
|
|
|
|
// Process the received ARP
|
|
void IPCProcessArp(IPC *ipc, BLOCK *b)
|
|
{
|
|
UCHAR *dest_mac;
|
|
UCHAR *src_mac;
|
|
ARPV4_HEADER *arp;
|
|
UCHAR *sender_mac;
|
|
IP sender_ip;
|
|
UCHAR *target_mac;
|
|
IP target_ip;
|
|
// Validate arguments
|
|
if (ipc == NULL || b == NULL || b->Size < (14 + sizeof(ARPV4_HEADER)))
|
|
{
|
|
return;
|
|
}
|
|
|
|
dest_mac = b->Buf + 0;
|
|
src_mac = b->Buf + 6;
|
|
|
|
arp = (ARPV4_HEADER *)(b->Buf + 14);
|
|
|
|
if (arp->HardwareType != Endian16(ARP_HARDWARE_TYPE_ETHERNET))
|
|
{
|
|
return;
|
|
}
|
|
if (arp->ProtocolType != Endian16(MAC_PROTO_IPV4))
|
|
{
|
|
return;
|
|
}
|
|
if (arp->HardwareSize != 6 || arp->ProtocolSize != 4)
|
|
{
|
|
return;
|
|
}
|
|
|
|
sender_mac = arp->SrcAddress;
|
|
UINTToIP(&sender_ip, arp->SrcIP);
|
|
|
|
target_mac = arp->TargetAddress;
|
|
UINTToIP(&target_ip, arp->TargetIP);
|
|
|
|
if (CmpIpAddr(&sender_ip, &ipc->ClientIPAddress) == 0)
|
|
{
|
|
// Source is myself
|
|
return;
|
|
}
|
|
|
|
IPCAssociateOnArpTable(ipc, &sender_ip, sender_mac);
|
|
IPCAssociateOnArpTable(ipc, &target_ip, target_mac);
|
|
|
|
if (Endian16(arp->Operation) == ARP_OPERATION_REQUEST)
|
|
{
|
|
// Received an ARP request
|
|
if (CmpIpAddr(&target_ip, &ipc->ClientIPAddress) == 0)
|
|
{
|
|
// Create a response since a request for its own IP address have received
|
|
if (IsMacUnicast(sender_mac))
|
|
{
|
|
UCHAR tmp[14 + sizeof(ARPV4_HEADER)];
|
|
ARPV4_HEADER *arp = (ARPV4_HEADER *)(tmp + 14);
|
|
|
|
Copy(tmp + 0, sender_mac, 6);
|
|
Copy(tmp + 6, ipc->MacAddress, 6);
|
|
WRITE_USHORT(tmp + 12, MAC_PROTO_ARPV4);
|
|
|
|
arp->HardwareType = Endian16(ARP_HARDWARE_TYPE_ETHERNET);
|
|
arp->ProtocolType = Endian16(MAC_PROTO_IPV4);
|
|
arp->HardwareSize = 6;
|
|
arp->ProtocolSize = 4;
|
|
arp->Operation = Endian16(ARP_OPERATION_RESPONSE);
|
|
|
|
Copy(arp->SrcAddress, ipc->MacAddress, 6);
|
|
arp->SrcIP = IPToUINT(&ipc->ClientIPAddress);
|
|
|
|
Copy(arp->TargetAddress, sender_mac, 6);
|
|
arp->TargetIP = IPToUINT(&sender_ip);
|
|
|
|
IPCSendL2(ipc, tmp, sizeof(tmp));
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
// Associate the MAC address and IP address on the ARP table
|
|
void IPCAssociateOnArpTable(IPC *ipc, IP *ip, UCHAR *mac_address)
|
|
{
|
|
IPC_ARP *a;
|
|
// Validate arguments
|
|
if (ipc == NULL || ip == NULL || IsValidUnicastIPAddress4(ip) == false || IsMacUnicast(mac_address) == false)
|
|
{
|
|
return;
|
|
}
|
|
if (CmpIpAddr(&ipc->ClientIPAddress, ip) == 0 || Cmp(ipc->MacAddress, mac_address, 6) == 0)
|
|
{
|
|
return;
|
|
}
|
|
if (IsInSameNetwork4(ip, &ipc->ClientIPAddress, &ipc->SubnetMask) == false)
|
|
{
|
|
// Not to learn the IP address of outside the subnet
|
|
return;
|
|
}
|
|
|
|
if (CmpIpAddr(&ipc->BroadcastAddress, ip) == 0)
|
|
{
|
|
// Not to learn the broadcast IP address
|
|
return;
|
|
}
|
|
|
|
// Search whether there is ARP table entry already
|
|
a = IPCSearchArpTable(ipc->ArpTable, ip);
|
|
if (a == NULL)
|
|
{
|
|
// Add to the ARP table
|
|
a = IPCNewARP(ip, mac_address);
|
|
|
|
Insert(ipc->ArpTable, a);
|
|
}
|
|
else
|
|
{
|
|
Copy(a->MacAddress, mac_address, 6);
|
|
|
|
// There is the ARP table entry already
|
|
if (a->Resolved == false)
|
|
{
|
|
a->Resolved = true;
|
|
a->GiveupTime = 0;
|
|
|
|
// Send all the packets that are accumulated to be sent
|
|
while (true)
|
|
{
|
|
BLOCK *b = GetNext(a->PacketQueue);
|
|
|
|
if (b == NULL)
|
|
{
|
|
break;
|
|
}
|
|
|
|
IPCSendIPv4WithDestMacAddr(ipc, b->Buf, b->Size, a->MacAddress);
|
|
|
|
FreeBlock(b);
|
|
}
|
|
}
|
|
|
|
// Extend the expiration date
|
|
a->ExpireTime = Tick64() + (UINT64)IPC_ARP_LIFETIME;
|
|
}
|
|
}
|
|
|
|
// Interrupt process (This is called periodically)
|
|
void IPCProcessInterrupts(IPC *ipc)
|
|
{
|
|
// Validate arguments
|
|
if (ipc == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
FlushTubeFlushList(ipc->FlushList);
|
|
}
|
|
|
|
// Process the L3 event by the IPC
|
|
void IPCProcessL3Events(IPC *ipc)
|
|
{
|
|
IPCProcessL3EventsEx(ipc, 0);
|
|
}
|
|
void IPCProcessL3EventsIPv4Only(IPC *ipc)
|
|
{
|
|
UINT previousStatus4 = IPC_PROTO_GET_STATUS(ipc, IPv4State);
|
|
UINT previousStatus6 = IPC_PROTO_GET_STATUS(ipc, IPv6State);
|
|
IPC_PROTO_SET_STATUS(ipc, IPv4State, IPC_PROTO_STATUS_OPENED);
|
|
IPC_PROTO_SET_STATUS(ipc, IPv6State, IPC_PROTO_STATUS_CLOSED);
|
|
IPCProcessL3Events(ipc);
|
|
IPC_PROTO_SET_STATUS(ipc, IPv4State, previousStatus4);
|
|
IPC_PROTO_SET_STATUS(ipc, IPv6State, previousStatus6);
|
|
}
|
|
void IPCProcessL3EventsEx(IPC *ipc, UINT64 now)
|
|
{
|
|
// Validate arguments
|
|
if (ipc == NULL)
|
|
{
|
|
return;
|
|
}
|
|
if (now == 0)
|
|
{
|
|
now = Tick64();
|
|
}
|
|
|
|
// Remove old ARP table entries
|
|
IPCFlushArpTableEx(ipc, now);
|
|
IPCIPv6FlushNDTEx(ipc, now);
|
|
|
|
// Receive all the L2 packet
|
|
while (true)
|
|
{
|
|
BLOCK *b = IPCRecvL2(ipc);
|
|
if (b == NULL)
|
|
{
|
|
// All reception completed
|
|
break;
|
|
}
|
|
|
|
if (b->Size >= 14)
|
|
{
|
|
UCHAR *dest_mac = b->Buf + 0;
|
|
UCHAR *src_mac = b->Buf + 6;
|
|
USHORT protocol = READ_USHORT(b->Buf + 12);
|
|
|
|
// Confirm the destination MAC address
|
|
// (Receive if the destination MAC address is the IPC address or a broadcast address)
|
|
if (Cmp(dest_mac, ipc->MacAddress, 6) == 0 || IsMacBroadcast(dest_mac) || IsMacMulticast(dest_mac))
|
|
{
|
|
// If the source MAC address is itselves or invalid address, ignore the packet
|
|
if (Cmp(src_mac, ipc->MacAddress, 6) != 0 && IsMacUnicast(src_mac))
|
|
{
|
|
if (protocol == MAC_PROTO_ARPV4)
|
|
{
|
|
// ARP receiving process
|
|
IPCProcessArp(ipc, b);
|
|
}
|
|
else if (protocol == MAC_PROTO_IPV4)
|
|
{
|
|
// IPv4 receiving process
|
|
if (b->Size >= (14 + 20))
|
|
{
|
|
UCHAR *data = Clone(b->Buf + 14, b->Size - 14);
|
|
UINT size = b->Size - 14;
|
|
IP ip_src, ip_dst;
|
|
bool ok = false;
|
|
|
|
// Extract the IP address portion
|
|
UINTToIP(&ip_src, *((UINT *)(((UCHAR *)data) + 12)));
|
|
UINTToIP(&ip_dst, *((UINT *)(((UCHAR *)data) + 16)));
|
|
|
|
// Receive only if the IPv4 destination address is its own
|
|
// or 255.255.255.255 or a multicast address or a broadcast address
|
|
if (CmpIpAddr(&ip_dst, &ipc->ClientIPAddress) == 0)
|
|
{
|
|
ok = true;
|
|
}
|
|
else
|
|
{
|
|
const BYTE *ipv4 = IPV4(ip_dst.address);
|
|
|
|
if (ipv4[0] == 255 && ipv4[1] == 255 && ipv4[2] == 255 && ipv4[3] == 255)
|
|
{
|
|
ok = true;
|
|
}
|
|
else if (ipv4[0] >= 224 && ipv4[1] <= 239)
|
|
{
|
|
ok = true;
|
|
}
|
|
else if (CmpIpAddr(&ipc->BroadcastAddress, &ip_dst) == 0)
|
|
{
|
|
ok = true;
|
|
}
|
|
else if (IsZeroIP(&ipc->ClientIPAddress))
|
|
{
|
|
// Client IP address is undetermined
|
|
ok = true;
|
|
}
|
|
}
|
|
|
|
if (ok)
|
|
{
|
|
// Parse DHCP packets
|
|
bool packetConsumed = false;
|
|
if (ipc->DHCPv4Awaiter.IsAwaiting)
|
|
{
|
|
PKT *pkt;
|
|
DHCPV4_DATA *dhcp;
|
|
|
|
Debug("Parsing for DHCP awaiter\n");
|
|
pkt = ParsePacketIPv4WithDummyMacHeader(data, size);
|
|
dhcp = ParseDHCPv4Data(pkt);
|
|
|
|
if (dhcp != NULL)
|
|
{
|
|
if (Endian32(dhcp->Header->TransactionId) == ipc->DHCPv4Awaiter.TransCode &&
|
|
dhcp->OpCode == ipc->DHCPv4Awaiter.OpCode)
|
|
{
|
|
FreeDHCPv4Data(ipc->DHCPv4Awaiter.DhcpData);
|
|
ipc->DHCPv4Awaiter.DhcpData = dhcp;
|
|
packetConsumed = true;
|
|
}
|
|
else
|
|
{
|
|
FreeDHCPv4Data(dhcp);
|
|
}
|
|
}
|
|
|
|
FreePacketWithData(pkt);
|
|
}
|
|
|
|
IPCAssociateOnArpTable(ipc, &ip_src, src_mac);
|
|
|
|
if (ipc->IPv4State == IPC_PROTO_STATUS_OPENED && !packetConsumed)
|
|
{
|
|
// Place in the reception queue
|
|
InsertQueue(ipc->IPv4ReceivedQueue, NewBlock(data, size, 0));
|
|
}
|
|
else
|
|
{
|
|
Free(data); // We need to free the packet if we don't save it
|
|
}
|
|
|
|
}
|
|
else
|
|
{
|
|
// This packet is discarded because it is irrelevant for me
|
|
Free(data);
|
|
}
|
|
}
|
|
}
|
|
else if (protocol == MAC_PROTO_IPV6)
|
|
{
|
|
PKT *p = ParsePacketUpToICMPv6(b->Buf, b->Size);
|
|
if (p != NULL)
|
|
{
|
|
IP ip_src, ip_dst;
|
|
bool ndtProcessed = false;
|
|
UINT size = b->Size - 14;
|
|
|
|
UCHAR *data = Clone(b->Buf + 14, size);
|
|
|
|
IPv6AddrToIP(&ip_src, &p->IPv6HeaderPacketInfo.IPv6Header->SrcAddress);
|
|
IPv6AddrToIP(&ip_dst, &p->IPv6HeaderPacketInfo.IPv6Header->DestAddress);
|
|
|
|
if (p->IPv6HeaderPacketInfo.Protocol == IP_PROTO_ICMPV6)
|
|
{
|
|
IP icmpHeaderAddr;
|
|
UINT header_size = 0;
|
|
// We need to parse the Router Advertisement and Neighbor Advertisement messages
|
|
// to build the Neighbor Discovery Table (aka ARP table for IPv6)
|
|
switch (p->ICMPv6HeaderPacketInfo.Type)
|
|
{
|
|
case ICMPV6_TYPE_ROUTER_ADVERTISEMENT:
|
|
// We save the router advertisement data for later use
|
|
IPCIPv6AddRouterPrefixes(ipc, &p->ICMPv6HeaderPacketInfo.OptionList, src_mac, &ip_src);
|
|
IPCIPv6AssociateOnNDTEx(ipc, &ip_src, src_mac, true);
|
|
IPCIPv6AssociateOnNDTEx(ipc, &ip_src, p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer->Address, true);
|
|
ndtProcessed = true;
|
|
header_size = sizeof(ICMPV6_ROUTER_ADVERTISEMENT_HEADER);
|
|
break;
|
|
case ICMPV6_TYPE_NEIGHBOR_ADVERTISEMENT:
|
|
// We save the neighbor advertisements into NDT
|
|
IPv6AddrToIP(&icmpHeaderAddr, &p->ICMPv6HeaderPacketInfo.Headers.NeighborAdvertisementHeader->TargetAddress);
|
|
IPCIPv6AssociateOnNDTEx(ipc, &icmpHeaderAddr, src_mac, true);
|
|
IPCIPv6AssociateOnNDTEx(ipc, &ip_src, src_mac, true);
|
|
ndtProcessed = true;
|
|
header_size = sizeof(ICMPV6_NEIGHBOR_ADVERTISEMENT_HEADER);
|
|
break;
|
|
case ICMPV6_TYPE_NEIGHBOR_SOLICIATION:
|
|
header_size = sizeof(ICMPV6_NEIGHBOR_SOLICIATION_HEADER);
|
|
break;
|
|
}
|
|
|
|
// Remove link-layer address options for Windows clients (required on Windows 11)
|
|
if (header_size > 0)
|
|
{
|
|
UCHAR *src = p->ICMPv6HeaderPacketInfo.Headers.HeaderPointer + header_size;
|
|
UINT opt_size = p->ICMPv6HeaderPacketInfo.DataSize - header_size;
|
|
UCHAR *dst = src;
|
|
UINT removed = 0;
|
|
|
|
while (opt_size > sizeof(ICMPV6_OPTION))
|
|
{
|
|
ICMPV6_OPTION *option_header;
|
|
UINT header_total_size;
|
|
|
|
option_header = (ICMPV6_OPTION *)src;
|
|
// Calculate the entire header size
|
|
header_total_size = option_header->Length * 8;
|
|
if (header_total_size == 0)
|
|
{
|
|
// The size is zero
|
|
break;
|
|
}
|
|
if (opt_size < header_total_size)
|
|
{
|
|
// Size shortage
|
|
break;
|
|
}
|
|
|
|
switch (option_header->Type)
|
|
{
|
|
case ICMPV6_OPTION_TYPE_SOURCE_LINK_LAYER:
|
|
case ICMPV6_OPTION_TYPE_TARGET_LINK_LAYER:
|
|
// Skip source or target link-layer option
|
|
removed += header_total_size;
|
|
break;
|
|
default:
|
|
// Copy options other than source link-layer
|
|
if (src != dst)
|
|
{
|
|
UCHAR *tmp = Clone(src, header_total_size);
|
|
Copy(dst, tmp, header_total_size);
|
|
Free(tmp);
|
|
}
|
|
dst += header_total_size;
|
|
}
|
|
|
|
src += header_total_size;
|
|
opt_size -= header_total_size;
|
|
|
|
}
|
|
|
|
// Recalculate length and checksum if modified
|
|
if (removed > 0)
|
|
{
|
|
size -= removed;
|
|
p->L3.IPv6Header->PayloadLength = Endian16(size - sizeof(IPV6_HEADER));
|
|
p->L4.ICMPHeader->Checksum = 0;
|
|
p->L4.ICMPHeader->Checksum =
|
|
CalcChecksumForIPv6(&p->L3.IPv6Header->SrcAddress,
|
|
&p->L3.IPv6Header->DestAddress, IP_PROTO_ICMPV6,
|
|
p->L4.ICMPHeader, size - sizeof(IPV6_HEADER), 0);
|
|
Copy(data, b->Buf + 14, size);
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
// We update the NDT only if we have an entry in it for the IP+Mac
|
|
if (!ndtProcessed)
|
|
{
|
|
IPCIPv6AssociateOnNDT(ipc, &ip_src, src_mac);
|
|
}
|
|
|
|
/// TODO: should we or not filter Neighbor Advertisements and/or Neighbor Solicitations?
|
|
if (ipc->IPv6State == IPC_PROTO_STATUS_OPENED)
|
|
{
|
|
InsertQueue(ipc->IPv6ReceivedQueue, NewBlock(data, size, 0));
|
|
}
|
|
else
|
|
{
|
|
Free(data); // We need to free the packet if we don't save it
|
|
}
|
|
|
|
FreePacket(p);
|
|
}
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
FreeBlock(b);
|
|
}
|
|
|
|
IPCProcessInterrupts(ipc);
|
|
}
|
|
|
|
// Configure IPv4 parameters
|
|
bool IPCSetIPv4Parameters(IPC *ipc, IP *ip, IP *subnet, IP *gw, DHCP_CLASSLESS_ROUTE_TABLE *rt)
|
|
{
|
|
bool changed = false;
|
|
// Validate arguments
|
|
if (ipc == NULL || ip == NULL || subnet == NULL)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
if (CmpIpAddr(&ipc->ClientIPAddress, ip) != 0)
|
|
{
|
|
changed = true;
|
|
}
|
|
Copy(&ipc->ClientIPAddress, ip, sizeof(IP));
|
|
|
|
if (CmpIpAddr(&ipc->SubnetMask, subnet) != 0)
|
|
{
|
|
changed = true;
|
|
}
|
|
Copy(&ipc->SubnetMask, subnet, sizeof(IP));
|
|
|
|
if (gw != NULL)
|
|
{
|
|
if (CmpIpAddr(&ipc->DefaultGateway, gw) != 0)
|
|
{
|
|
changed = true;
|
|
}
|
|
|
|
Copy(&ipc->DefaultGateway, gw, sizeof(IP));
|
|
}
|
|
else
|
|
{
|
|
if (IsZeroIP(&ipc->DefaultGateway) == false)
|
|
{
|
|
changed = true;
|
|
}
|
|
|
|
Zero(&ipc->DefaultGateway, sizeof(IP));
|
|
}
|
|
|
|
GetBroadcastAddress4(&ipc->BroadcastAddress, ip, subnet);
|
|
|
|
if (rt != NULL && rt->NumExistingRoutes >= 1)
|
|
{
|
|
if (Cmp(&ipc->ClasslessRoute, rt, sizeof(DHCP_CLASSLESS_ROUTE_TABLE)) != 0)
|
|
{
|
|
changed = true;
|
|
|
|
Copy(&ipc->ClasslessRoute, rt, sizeof(DHCP_CLASSLESS_ROUTE_TABLE));
|
|
}
|
|
}
|
|
|
|
return changed;
|
|
}
|
|
|
|
// Send an IPv4 packet (client -> server)
|
|
void IPCSendIPv4(IPC *ipc, void *data, UINT size)
|
|
{
|
|
IP ip_src, ip_dst;
|
|
IP ip_dst_local;
|
|
bool is_broadcast = false;
|
|
UCHAR uc;
|
|
DHCP_CLASSLESS_ROUTE *r = NULL;
|
|
// Validate arguments
|
|
if (ipc == NULL || data == NULL || size < 20 || size > 1500)
|
|
{
|
|
return;
|
|
}
|
|
|
|
uc = ((UCHAR *)data)[0];
|
|
if (((uc >> 4) & 0x0f) != 4)
|
|
{
|
|
// Not an IPv4
|
|
return;
|
|
}
|
|
|
|
// Extract the IP address portion
|
|
UINTToIP(&ip_src, *((UINT *)(((UCHAR *)data) + 12)));
|
|
UINTToIP(&ip_dst, *((UINT *)(((UCHAR *)data) + 16)));
|
|
|
|
// Filter the source IP address
|
|
if (CmpIpAddr(&ip_src, &ipc->ClientIPAddress) != 0)
|
|
{
|
|
// Cut off packets from illegal IP address
|
|
return;
|
|
}
|
|
|
|
if (IsZeroIP(&ip_dst))
|
|
{
|
|
// Illegal destination address
|
|
return;
|
|
}
|
|
|
|
if (CmpIpAddr(&ip_dst, &ipc->ClientIPAddress) == 0)
|
|
{
|
|
// Packet destined for myself
|
|
return;
|
|
}
|
|
|
|
// Get the IP address of the relayed destination
|
|
Copy(&ip_dst_local, &ip_dst, sizeof(IP));
|
|
|
|
if (IsInSameNetwork4(&ip_dst, &ipc->ClientIPAddress, &ipc->SubnetMask) == false)
|
|
{
|
|
r = GetBestClasslessRoute(&ipc->ClasslessRoute, &ip_dst);
|
|
|
|
if (r == NULL)
|
|
{
|
|
Copy(&ip_dst_local, &ipc->DefaultGateway, sizeof(IP));
|
|
}
|
|
else
|
|
{
|
|
Copy(&ip_dst_local, &r->Gateway, sizeof(IP));
|
|
}
|
|
}
|
|
|
|
if (CmpIpAddr(&ipc->BroadcastAddress, &ip_dst) == 0)
|
|
{
|
|
// Local Broadcast
|
|
is_broadcast = true;
|
|
}
|
|
else
|
|
{
|
|
const BYTE *ipv4 = IPV4(ip_dst.address);
|
|
|
|
if (ipv4[0] == 255 && ipv4[1] == 255 && ipv4[2] == 255 && ipv4[3] == 255)
|
|
{
|
|
// Global Broadcast
|
|
is_broadcast = true;
|
|
}
|
|
else if (ipv4[0] >= 224 && ipv4[0] <= 239)
|
|
{
|
|
// IPv4 Multicast
|
|
UCHAR dest[6];
|
|
|
|
// Per RFC 1112, multicast MAC address has the form 01-00-5E-00-00-00,
|
|
// where the lowest 23 bits are copied from the destination IP address.
|
|
dest[0] = 0x01;
|
|
dest[1] = 0x00;
|
|
dest[2] = 0x5e;
|
|
dest[3] = 0x7f & ipv4[1];
|
|
dest[4] = ipv4[2];
|
|
dest[5] = ipv4[3];
|
|
|
|
// Send
|
|
IPCSendIPv4WithDestMacAddr(ipc, data, size, dest);
|
|
|
|
return;
|
|
}
|
|
}
|
|
|
|
if (is_broadcast)
|
|
{
|
|
// Send a broadcast packet
|
|
UCHAR dest[6];
|
|
UINT i;
|
|
|
|
// Destination
|
|
for (i = 0; i < 6; i++)
|
|
{
|
|
dest[i] = 0xff;
|
|
}
|
|
|
|
// Send
|
|
IPCSendIPv4WithDestMacAddr(ipc, data, size, dest);
|
|
|
|
return;
|
|
}
|
|
|
|
if (IsZeroIP(&ip_dst_local))
|
|
{
|
|
// Unable to send
|
|
return;
|
|
}
|
|
|
|
// Send a unicast packet
|
|
IPCSendIPv4Unicast(ipc, data, size, &ip_dst_local);
|
|
}
|
|
|
|
// Send an IPv4 packet with a specified destination MAC address
|
|
void IPCSendIPv4WithDestMacAddr(IPC *ipc, void *data, UINT size, UCHAR *dest_mac_addr)
|
|
{
|
|
UCHAR tmp[1514];
|
|
// Validate arguments
|
|
if (ipc == NULL || data == NULL || size < 20 || size > 1500 || dest_mac_addr == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// Destination
|
|
Copy(tmp + 0, dest_mac_addr, 6);
|
|
|
|
// Source
|
|
Copy(tmp + 6, ipc->MacAddress, 6);
|
|
|
|
// Protocol number
|
|
WRITE_USHORT(tmp + 12, MAC_PROTO_IPV4);
|
|
|
|
// Data
|
|
Copy(tmp + 14, data, size);
|
|
|
|
// Send
|
|
IPCSendL2(ipc, tmp, size + 14);
|
|
}
|
|
|
|
// Remove old ARP table entries
|
|
void IPCFlushArpTable(IPC *ipc)
|
|
{
|
|
IPCFlushArpTableEx(ipc, 0);
|
|
}
|
|
void IPCFlushArpTableEx(IPC *ipc, UINT64 now)
|
|
{
|
|
UINT i;
|
|
LIST *o = NULL;
|
|
// Validate arguments
|
|
if (ipc == NULL)
|
|
{
|
|
return;
|
|
}
|
|
if (now == 0)
|
|
{
|
|
now = Tick64();
|
|
}
|
|
|
|
for (i = 0; i < LIST_NUM(ipc->ArpTable); i++)
|
|
{
|
|
IPC_ARP *a = LIST_DATA(ipc->ArpTable, i);
|
|
bool b = false;
|
|
|
|
if (a->Resolved && a->ExpireTime <= now)
|
|
{
|
|
b = true;
|
|
}
|
|
else if (a->Resolved == false && a->GiveupTime <= now)
|
|
{
|
|
b = true;
|
|
}
|
|
|
|
if (b)
|
|
{
|
|
if (o == NULL)
|
|
{
|
|
o = NewListFast(NULL);
|
|
}
|
|
|
|
Add(o, a);
|
|
}
|
|
}
|
|
|
|
if (o != NULL)
|
|
{
|
|
for (i = 0; i < LIST_NUM(o); i++)
|
|
{
|
|
IPC_ARP *a = LIST_DATA(o, i);
|
|
|
|
IPCFreeARP(a);
|
|
|
|
Delete(ipc->ArpTable, a);
|
|
}
|
|
|
|
ReleaseList(o);
|
|
}
|
|
}
|
|
|
|
// Send an IPv4 unicast packet
|
|
void IPCSendIPv4Unicast(IPC *ipc, void *data, UINT size, IP *next_ip)
|
|
{
|
|
IPC_ARP *a;
|
|
// Validate arguments
|
|
if (ipc == NULL || data == NULL || size < 20 || size > 1500 || next_ip == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
a = IPCSearchArpTable(ipc->ArpTable, next_ip);
|
|
|
|
if (a != NULL)
|
|
{
|
|
// ARP entry is found
|
|
if (a->Resolved)
|
|
{
|
|
// Send
|
|
a->ExpireTime = Tick64() + (UINT64)IPC_ARP_LIFETIME;
|
|
|
|
IPCSendIPv4WithDestMacAddr(ipc, data, size, a->MacAddress);
|
|
}
|
|
else
|
|
{
|
|
// Undeliverable because of unresolved table. Accumulate in the queue
|
|
if (a->PacketQueue->num_item < IPC_MAX_PACKET_QUEUE_LEN)
|
|
{
|
|
InsertQueue(a->PacketQueue, NewBlock(Clone(data, size), size, false));
|
|
}
|
|
}
|
|
}
|
|
else
|
|
{
|
|
ARPV4_HEADER arp;
|
|
UCHAR tmp[14 + sizeof(ARPV4_HEADER)];
|
|
UINT i;
|
|
|
|
// Because there is no such ARP entry, create a new one
|
|
a = IPCNewARP(next_ip, NULL);
|
|
|
|
// Send an ARP request
|
|
Zero(&arp, sizeof(arp));
|
|
arp.HardwareType = Endian16(ARP_HARDWARE_TYPE_ETHERNET);
|
|
arp.ProtocolType = Endian16(MAC_PROTO_IPV4);
|
|
arp.HardwareSize = 6;
|
|
arp.ProtocolSize = 4;
|
|
arp.Operation = Endian16(ARP_OPERATION_REQUEST);
|
|
Copy(&arp.SrcAddress, &ipc->MacAddress, 6);
|
|
arp.SrcIP = IPToUINT(&ipc->ClientIPAddress);
|
|
arp.TargetIP = IPToUINT(next_ip);
|
|
|
|
for (i = 0; i < 6; i++)
|
|
{
|
|
tmp[i] = 0xff;
|
|
}
|
|
|
|
Copy(tmp + 6, ipc->MacAddress, 6);
|
|
|
|
WRITE_USHORT(tmp + 12, MAC_PROTO_ARPV4);
|
|
Copy(tmp + 14, &arp, sizeof(ARPV4_HEADER));
|
|
|
|
IPCSendL2(ipc, tmp, 14 + sizeof(ARPV4_HEADER));
|
|
|
|
// Accumulate the IP packet to be transmitted in the queue
|
|
if (a->PacketQueue->num_item < IPC_MAX_PACKET_QUEUE_LEN)
|
|
{
|
|
InsertQueue(a->PacketQueue, NewBlock(Clone(data, size), size, false));
|
|
}
|
|
|
|
Insert(ipc->ArpTable, a);
|
|
}
|
|
}
|
|
|
|
// Search the ARP table
|
|
IPC_ARP *IPCSearchArpTable(LIST *arpTable, IP *ip)
|
|
{
|
|
IPC_ARP t;
|
|
IPC_ARP *a;
|
|
// Validate arguments
|
|
if (arpTable == NULL || ip == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
Copy(&t.Ip, ip, sizeof(IP));
|
|
|
|
a = Search(arpTable, &t);
|
|
|
|
return a;
|
|
}
|
|
|
|
// Release the ARP entry
|
|
void IPCFreeARP(IPC_ARP *a)
|
|
{
|
|
BLOCK *b;
|
|
// Validate arguments
|
|
if (a == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
while (true)
|
|
{
|
|
b = GetNext(a->PacketQueue);
|
|
if (b == NULL)
|
|
{
|
|
break;
|
|
}
|
|
|
|
FreeBlock(b);
|
|
}
|
|
|
|
ReleaseQueue(a->PacketQueue);
|
|
|
|
Free(a);
|
|
}
|
|
|
|
// Create a new ARP entry
|
|
IPC_ARP *IPCNewARP(IP *ip, UCHAR *mac_address)
|
|
{
|
|
IPC_ARP *a;
|
|
// Validate arguments
|
|
if (ip == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
a = ZeroMalloc(sizeof(IPC_ARP));
|
|
|
|
Copy(&a->Ip, ip, sizeof(IP));
|
|
if (mac_address != NULL)
|
|
{
|
|
Copy(a->MacAddress, mac_address, 6);
|
|
a->Resolved = true;
|
|
a->ExpireTime = Tick64() + (UINT64)IPC_ARP_LIFETIME;
|
|
}
|
|
else
|
|
{
|
|
a->GiveupTime = Tick64() + (UINT64)IPC_ARP_GIVEUPTIME;
|
|
}
|
|
|
|
a->PacketQueue = NewQueueFast();
|
|
|
|
return a;
|
|
}
|
|
|
|
// Compare ARP entries
|
|
int IPCCmpArpTable(void *p1, void *p2)
|
|
{
|
|
IPC_ARP *a1, *a2;
|
|
// Validate arguments
|
|
if (p1 == NULL || p2 == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
a1 = *(IPC_ARP **)p1;
|
|
a2 = *(IPC_ARP **)p2;
|
|
if (a1 == NULL || a2 == NULL)
|
|
{
|
|
return 0;
|
|
}
|
|
|
|
return CmpIpAddr(&a1->Ip, &a2->Ip);
|
|
}
|
|
|
|
// Send an Ethernet packet (client -> server)
|
|
void IPCSendL2(IPC *ipc, void *data, UINT size)
|
|
{
|
|
// Validate arguments
|
|
if (ipc == NULL || data == NULL || size == 0)
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (ipc->Sock == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
TubeSendEx(ipc->Sock->SendTube, data, size, NULL, true);
|
|
AddTubeToFlushList(ipc->FlushList, ipc->Sock->SendTube);
|
|
}
|
|
|
|
// Receive an IPv4 packet (server -> client)
|
|
BLOCK *IPCRecvIPv4(IPC *ipc)
|
|
{
|
|
BLOCK *b;
|
|
// Validate arguments
|
|
if (ipc == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
b = GetNext(ipc->IPv4ReceivedQueue);
|
|
|
|
return b;
|
|
}
|
|
|
|
// Receive an Ethernet packet (server -> client)
|
|
BLOCK *IPCRecvL2(IPC *ipc)
|
|
{
|
|
TUBEDATA *d;
|
|
BLOCK *b;
|
|
// Validate arguments
|
|
if (ipc == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
if (ipc->Sock == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
d = TubeRecvAsync(ipc->Sock->RecvTube);
|
|
|
|
if (d == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
b = NewBlock(d->Data, d->DataSize, 0);
|
|
|
|
Free(d->Header);
|
|
Free(d);
|
|
|
|
return b;
|
|
}
|
|
|
|
// IPv6 stuff
|
|
// Memory management
|
|
void IPCIPv6Init(IPC *ipc)
|
|
{
|
|
ipc->IPv6ReceivedQueue = NewQueue();
|
|
// The NDT is basically the same as ARP Table with some slight adjustments
|
|
ipc->IPv6NeighborTable = NewList(IPCCmpArpTable);
|
|
ipc->IPv6RouterAdvs = NewList(NULL);
|
|
|
|
ipc->IPv6ClientEUI = 0;
|
|
GenerateEui64Address6((UCHAR *)&ipc->IPv6ServerEUI, ipc->MacAddress);
|
|
|
|
ipc->IPv6State = IPC_PROTO_STATUS_CLOSED;
|
|
}
|
|
void IPCIPv6Free(IPC *ipc)
|
|
{
|
|
UINT i;
|
|
for (i = 0; i < LIST_NUM(ipc->IPv6NeighborTable); i++)
|
|
{
|
|
IPC_ARP *a = LIST_DATA(ipc->IPv6NeighborTable, i);
|
|
IPCFreeARP(a);
|
|
}
|
|
|
|
ReleaseList(ipc->IPv6NeighborTable);
|
|
|
|
for (i = 0; i < LIST_NUM(ipc->IPv6RouterAdvs); i++)
|
|
{
|
|
IPC_IPV6_ROUTER_ADVERTISEMENT *ra = LIST_DATA(ipc->IPv6RouterAdvs, i);
|
|
Free(ra);
|
|
}
|
|
|
|
ReleaseList(ipc->IPv6RouterAdvs);
|
|
|
|
while (true)
|
|
{
|
|
BLOCK *b = GetNext(ipc->IPv6ReceivedQueue);
|
|
if (b == NULL)
|
|
{
|
|
break;
|
|
}
|
|
|
|
FreeBlock(b);
|
|
}
|
|
|
|
ReleaseQueue(ipc->IPv6ReceivedQueue);
|
|
}
|
|
|
|
// NDT
|
|
void IPCIPv6AssociateOnNDT(IPC *ipc, IP *ip, UCHAR *mac_address)
|
|
{
|
|
IPCIPv6AssociateOnNDTEx(ipc, ip, mac_address, false);
|
|
}
|
|
void IPCIPv6AssociateOnNDTEx(IPC *ipc, IP *ip, UCHAR *mac_address, bool isNeighborAdv)
|
|
{
|
|
IPC_ARP *a;
|
|
UINT addrType = 0;
|
|
if (ipc == NULL || ip == NULL ||
|
|
IsValidUnicastIPAddress6(ip) == false ||
|
|
IsMacUnicast(mac_address) == false)
|
|
{
|
|
return;
|
|
}
|
|
|
|
addrType = GetIPAddrType6(ip);
|
|
|
|
if (!(addrType & IPV6_ADDR_UNICAST))
|
|
{
|
|
return;
|
|
}
|
|
|
|
if (addrType & IPV6_ADDR_GLOBAL_UNICAST)
|
|
{
|
|
if (!IPCIPv6CheckUnicastFromRouterPrefix(ipc, ip, NULL))
|
|
{
|
|
return;
|
|
}
|
|
}
|
|
|
|
a = IPCSearchArpTable(ipc->IPv6NeighborTable, ip);
|
|
|
|
// We create a new entry only if we got a neighbor advertisement
|
|
if (a == NULL && isNeighborAdv)
|
|
{
|
|
a = IPCNewARP(ip, mac_address);
|
|
Insert(ipc->IPv6NeighborTable, a);
|
|
}
|
|
else if (a == NULL)
|
|
{
|
|
// We skip the NDT association on random packets from unknown locations
|
|
return;
|
|
}
|
|
else
|
|
{
|
|
Copy(a->MacAddress, mac_address, 6);
|
|
|
|
if (a->Resolved == false)
|
|
{
|
|
a->Resolved = true;
|
|
a->GiveupTime = 0;
|
|
while (true)
|
|
{
|
|
BLOCK *b = GetNext(a->PacketQueue);
|
|
|
|
if (b == NULL)
|
|
{
|
|
break;
|
|
}
|
|
|
|
IPCIPv6SendWithDestMacAddr(ipc, b->Buf, b->Size, a->MacAddress);
|
|
|
|
FreeBlock(b);
|
|
}
|
|
}
|
|
|
|
a->ExpireTime = Tick64() + (UINT64)IPC_IPV6_NDT_LIFETIME;
|
|
}
|
|
}
|
|
|
|
void IPCIPv6FlushNDT(IPC *ipc)
|
|
{
|
|
IPCIPv6FlushNDTEx(ipc, 0);
|
|
}
|
|
void IPCIPv6FlushNDTEx(IPC *ipc, UINT64 now)
|
|
{
|
|
UINT i;
|
|
LIST *o = NULL;
|
|
// Validate arguments
|
|
if (ipc == NULL)
|
|
{
|
|
return;
|
|
}
|
|
if (now == 0)
|
|
{
|
|
now = Tick64();
|
|
}
|
|
|
|
for (i = 0; i < LIST_NUM(ipc->IPv6NeighborTable); i++)
|
|
{
|
|
IPC_ARP *a = LIST_DATA(ipc->IPv6NeighborTable, i);
|
|
bool b = false;
|
|
|
|
if (a->Resolved && a->ExpireTime <= now)
|
|
{
|
|
b = true;
|
|
}
|
|
else if (a->Resolved == false && a->GiveupTime <= now)
|
|
{
|
|
b = true;
|
|
}
|
|
/// TODO: think about adding retransmission as per RFC4861
|
|
|
|
if (b)
|
|
{
|
|
if (o == NULL)
|
|
{
|
|
o = NewListFast(NULL);
|
|
}
|
|
|
|
Add(o, a);
|
|
}
|
|
}
|
|
|
|
if (o != NULL)
|
|
{
|
|
for (i = 0; i < LIST_NUM(o); i++)
|
|
{
|
|
IPC_ARP *a = LIST_DATA(o, i);
|
|
|
|
IPCFreeARP(a);
|
|
|
|
Delete(ipc->IPv6NeighborTable, a);
|
|
}
|
|
|
|
ReleaseList(o);
|
|
}
|
|
}
|
|
|
|
// Scan the hub IP Table to try to find the EUI-based link-local address
|
|
bool IPCIPv6CheckExistingLinkLocal(IPC *ipc, UINT64 eui)
|
|
{
|
|
HUB t, *h;
|
|
IP_TABLE_ENTRY i, *e;
|
|
t.Name = ipc->HubName;
|
|
|
|
// Construct link local from eui
|
|
Zero(&i.Ip, sizeof(i.Ip));
|
|
i.Ip.address[0] = 0xfe;
|
|
i.Ip.address[1] = 0x80;
|
|
Copy(&i.Ip.address[8], &eui, sizeof(eui));
|
|
|
|
h = Search(ipc->Cedar->HubList, &t);
|
|
|
|
if (h != NULL)
|
|
{
|
|
e = Search(h->IpTable, &i);
|
|
if (e != NULL)
|
|
{
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
// RA
|
|
void IPCIPv6AddRouterPrefixes(IPC *ipc, ICMPV6_OPTION_LIST *recvPrefix, UCHAR *macAddress, IP *ip)
|
|
{
|
|
UINT i, j;
|
|
for (i = 0; i < ICMPV6_OPTION_PREFIXES_MAX_COUNT; i++)
|
|
{
|
|
if (recvPrefix->Prefix[i] != NULL)
|
|
{
|
|
bool foundPrefix = false;
|
|
for (j = 0; j < LIST_NUM(ipc->IPv6RouterAdvs); j++)
|
|
{
|
|
IPC_IPV6_ROUTER_ADVERTISEMENT *existingRA = LIST_DATA(ipc->IPv6RouterAdvs, j);
|
|
if (Cmp(&recvPrefix->Prefix[i]->Prefix, &existingRA->RoutedPrefix.address, sizeof(IPV6_ADDR)) == 0)
|
|
{
|
|
foundPrefix = true;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (!foundPrefix)
|
|
{
|
|
IPC_IPV6_ROUTER_ADVERTISEMENT *newRA = Malloc(sizeof(IPC_IPV6_ROUTER_ADVERTISEMENT));
|
|
IPv6AddrToIP(&newRA->RoutedPrefix, &recvPrefix->Prefix[i]->Prefix);
|
|
IntToSubnetMask6(&newRA->RoutedMask, recvPrefix->Prefix[i]->SubnetLength);
|
|
CopyIP(&newRA->RouterAddress, ip);
|
|
Copy(newRA->RouterMacAddress, macAddress, 6);
|
|
Copy(newRA->RouterLinkLayerAddress, recvPrefix->SourceLinkLayer->Address, 6);
|
|
Add(ipc->IPv6RouterAdvs, newRA);
|
|
}
|
|
}
|
|
else
|
|
{
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
bool IPCIPv6CheckUnicastFromRouterPrefix(IPC *ipc, IP *ip, IPC_IPV6_ROUTER_ADVERTISEMENT *matchedRA)
|
|
{
|
|
UINT i;
|
|
IPC_IPV6_ROUTER_ADVERTISEMENT *matchingRA = NULL;
|
|
bool isInPrefix = false;
|
|
|
|
if (LIST_NUM(ipc->IPv6RouterAdvs) == 0)
|
|
{
|
|
// We have a unicast packet but we haven't got any RAs.
|
|
// The client is probably misconfigured in IPv6. We send non-blocking RS at best effort.
|
|
IPCSendIPv6RouterSoliciation(ipc, false);
|
|
return false;
|
|
}
|
|
|
|
for (i = 0; i < LIST_NUM(ipc->IPv6RouterAdvs); i++)
|
|
{
|
|
IPC_IPV6_ROUTER_ADVERTISEMENT *ra = LIST_DATA(ipc->IPv6RouterAdvs, i);
|
|
isInPrefix = IsInSameNetwork6(ip, &ra->RoutedPrefix, &ra->RoutedMask);
|
|
if (isInPrefix)
|
|
{
|
|
matchingRA = ra;
|
|
break;
|
|
}
|
|
}
|
|
|
|
if (matchedRA != NULL && matchingRA != NULL)
|
|
{
|
|
Copy(matchedRA, matchingRA, sizeof(IPC_IPV6_ROUTER_ADVERTISEMENT));
|
|
}
|
|
|
|
return isInPrefix;
|
|
}
|
|
|
|
// Send router solicitation to find a router
|
|
bool IPCSendIPv6RouterSoliciation(IPC *ipc, bool blocking)
|
|
{
|
|
IP destIP;
|
|
IPV6_ADDR destV6;
|
|
UCHAR destMacAddress[6];
|
|
IPV6_ADDR linkLocal;
|
|
BUF *packet;
|
|
UINT64 giveup_time = Tick64() + (UINT64)(IPC_IPV6_RA_MAX_RETRIES * IPC_IPV6_RA_INTERVAL);
|
|
UINT64 timeout_retry = 0;
|
|
|
|
// If we don't have a valid client EUI, we can't generate a correct link local
|
|
if (ipc->IPv6ClientEUI == 0)
|
|
{
|
|
return false;
|
|
}
|
|
|
|
Zero(&linkLocal, sizeof(IPV6_ADDR));
|
|
|
|
// Generate link local from client's EUI
|
|
linkLocal.Value[0] = 0xFE;
|
|
linkLocal.Value[1] = 0x80;
|
|
Copy(&linkLocal.Value[8], &ipc->IPv6ClientEUI, sizeof(UINT64));
|
|
|
|
GetAllRouterMulticastAddress6(&destIP);
|
|
|
|
// Generate the MAC address from the multicast address
|
|
destMacAddress[0] = 0x33;
|
|
destMacAddress[1] = 0x33;
|
|
Copy(&destMacAddress[2], &destIP.address[12], sizeof(UINT));
|
|
|
|
IPToIPv6Addr(&destV6, &destIP);
|
|
|
|
packet = BuildICMPv6RouterSoliciation(&linkLocal, &destV6, ipc->MacAddress, 0);
|
|
|
|
if (blocking == false) {
|
|
IPCIPv6SendWithDestMacAddr(ipc, packet->Buf, packet->Size, destMacAddress);
|
|
FreeBuf(packet);
|
|
return false;
|
|
}
|
|
|
|
while (LIST_NUM(ipc->IPv6RouterAdvs) == 0)
|
|
{
|
|
UINT64 now = Tick64();
|
|
if (now >= timeout_retry)
|
|
{
|
|
timeout_retry = now + (UINT64)IPC_IPV6_RA_INTERVAL;
|
|
IPCIPv6SendWithDestMacAddr(ipc, packet->Buf, packet->Size, destMacAddress);
|
|
}
|
|
|
|
AddInterrupt(ipc->Interrupt, timeout_retry);
|
|
|
|
if (Tick64() >= giveup_time)
|
|
{
|
|
// We failed to receive any router advertisements
|
|
FreeBuf(packet);
|
|
return false;
|
|
}
|
|
|
|
// The processing should populate the received RAs by itself
|
|
IPCProcessL3Events(ipc);
|
|
}
|
|
|
|
FreeBuf(packet);
|
|
return true;
|
|
}
|
|
|
|
// Data flow
|
|
BLOCK *IPCIPv6Recv(IPC *ipc)
|
|
{
|
|
BLOCK *b;
|
|
// Validate arguments
|
|
if (ipc == NULL)
|
|
{
|
|
return NULL;
|
|
}
|
|
|
|
b = GetNext(ipc->IPv6ReceivedQueue);
|
|
|
|
return b;
|
|
}
|
|
|
|
void IPCIPv6Send(IPC *ipc, void *data, UINT size)
|
|
{
|
|
IP destAddr;
|
|
UINT ipv6Type;
|
|
UCHAR destMac[6];
|
|
IPV6_HEADER *header = data;
|
|
|
|
IPv6AddrToIP(&destAddr, &header->DestAddress);
|
|
|
|
if (IsValidUnicastIPAddress6(&destAddr))
|
|
{
|
|
IPCIPv6SendUnicast(ipc, data, size, &destAddr);
|
|
return;
|
|
}
|
|
|
|
// Here we're probably dealing with a multicast packet. But let's check it anyway
|
|
ipv6Type = GetIPAddrType6(&destAddr);
|
|
if (ipv6Type & IPV6_ADDR_MULTICAST)
|
|
{
|
|
// Constructing multicast MAC address based on destination IP address, then just fire and forget
|
|
destMac[0] = 0x33;
|
|
destMac[1] = 0x33;
|
|
destMac[2] = destAddr.address[12];
|
|
destMac[3] = destAddr.address[13];
|
|
destMac[4] = destAddr.address[14];
|
|
destMac[5] = destAddr.address[15];
|
|
IPCIPv6SendWithDestMacAddr(ipc, data, size, destMac);
|
|
return;
|
|
}
|
|
else
|
|
{
|
|
Debug("We got a weird packet with a weird type! %i\n", ipv6Type);
|
|
}
|
|
}
|
|
|
|
void IPCIPv6SendWithDestMacAddr(IPC *ipc, void *data, UINT size, UCHAR *dest_mac_addr)
|
|
{
|
|
UCHAR tmp[1514];
|
|
|
|
IPV6_HEADER *header = data;
|
|
|
|
|
|
// Validate arguments
|
|
if (ipc == NULL || data == NULL || size < 40 || size > 1500 || dest_mac_addr == NULL)
|
|
{
|
|
return;
|
|
}
|
|
|
|
// Destination
|
|
Copy(tmp + 0, dest_mac_addr, 6);
|
|
|
|
// Source
|
|
Copy(tmp + 6, ipc->MacAddress, 6);
|
|
|
|
// Protocol number
|
|
WRITE_USHORT(tmp + 12, MAC_PROTO_IPV6);
|
|
|
|
// Data
|
|
Copy(tmp + 14, data, size);
|
|
|
|
// Parse the packet for ND ICMPv6 fixup
|
|
if (header->NextHeader == IP_PROTO_ICMPV6)
|
|
{
|
|
PKT *p = ParsePacketUpToICMPv6(tmp, size + 14);
|
|
if (p != NULL)
|
|
{
|
|
ICMPV6_OPTION_LINK_LAYER linkLayer;
|
|
BUF *buf;
|
|
BUF *optBuf;
|
|
BUF *packet;
|
|
UINT header_size = 0;
|
|
// We need to rebuild the packet to
|
|
switch (p->ICMPv6HeaderPacketInfo.Type)
|
|
{
|
|
case ICMPV6_TYPE_ROUTER_SOLICIATION:
|
|
header_size = sizeof(ICMPV6_ROUTER_SOLICIATION_HEADER);
|
|
if (p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer == NULL)
|
|
{
|
|
p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer = &linkLayer;
|
|
}
|
|
Copy(p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer->Address, ipc->MacAddress, 6);
|
|
break;
|
|
case ICMPV6_TYPE_NEIGHBOR_SOLICIATION:
|
|
header_size = sizeof(ICMPV6_NEIGHBOR_SOLICIATION_HEADER);
|
|
if (p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer == NULL)
|
|
{
|
|
p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer = &linkLayer;
|
|
}
|
|
Copy(p->ICMPv6HeaderPacketInfo.OptionList.SourceLinkLayer->Address, ipc->MacAddress, 6);
|
|
break;
|
|
case ICMPV6_TYPE_NEIGHBOR_ADVERTISEMENT:
|
|
header_size = sizeof(ICMPV6_NEIGHBOR_ADVERTISEMENT_HEADER);
|
|
if (p->ICMPv6HeaderPacketInfo.OptionList.TargetLinkLayer == NULL)
|
|
{
|
|
p->ICMPv6HeaderPacketInfo.OptionList.TargetLinkLayer = &linkLayer;
|
|
}
|
|
Copy(p->ICMPv6HeaderPacketInfo.OptionList.TargetLinkLayer->Address, ipc->MacAddress, 6);
|
|
break;
|
|
}
|
|
switch (p->ICMPv6HeaderPacketInfo.Type)
|
|
{
|
|
case ICMPV6_TYPE_ROUTER_SOLICIATION:
|
|
case ICMPV6_TYPE_NEIGHBOR_SOLICIATION:
|
|
case ICMPV6_TYPE_NEIGHBOR_ADVERTISEMENT:
|
|
optBuf = BuildICMPv6Options(&p->ICMPv6HeaderPacketInfo.OptionList);
|
|
buf = NewBuf();
|
|
WriteBuf(buf, p->ICMPv6HeaderPacketInfo.Headers.HeaderPointer, header_size);
|
|
WriteBufBuf(buf, optBuf);
|
|
packet = BuildICMPv6(&p->IPv6HeaderPacketInfo.IPv6Header->SrcAddress,
|
|
&p->IPv6HeaderPacketInfo.IPv6Header->DestAddress,
|
|
p->IPv6HeaderPacketInfo.IPv6Header->HopLimit,
|
|
p->ICMPv6HeaderPacketInfo.Type,
|
|
p->ICMPv6HeaderPacketInfo.Code,
|
|
buf->Buf,
|
|
buf->Size,
|
|
0);
|
|
Copy(tmp + 14, packet->Buf, packet->Size);
|
|
size = packet->Size;
|
|
FreeBuf(optBuf);
|
|
FreeBuf(buf);
|
|
FreeBuf(packet);
|
|
break;
|
|
}
|
|
}
|
|
FreePacket(p);
|
|
}
|
|
|
|
// Send
|
|
IPCSendL2(ipc, tmp, size + 14);
|
|
}
|
|
|
|
void IPCIPv6SendUnicast(IPC *ipc, void *data, UINT size, IP *next_ip)
|
|
{
|
|
IPC_ARP *ndtMatch;
|
|
UCHAR *destMac = NULL;
|
|
IPC_IPV6_ROUTER_ADVERTISEMENT ra;
|
|
IPV6_HEADER *header = data;
|
|
IP srcIp;
|
|
bool isLocal = false;
|
|
// First we need to understand if it is a local packet or we should route it through the router
|
|
UINT addrType = GetIPAddrType6(next_ip);
|
|
|
|
Zero(&ra, sizeof(IPC_IPV6_ROUTER_ADVERTISEMENT));
|
|
IPv6AddrToIP(&srcIp, &header->SrcAddress);
|
|
|
|
// Link local is always local =)
|
|
if (addrType & IPV6_ADDR_LOCAL_UNICAST)
|
|
{
|
|
isLocal = true;
|
|
}
|
|
|
|
// If it matches any received prefix from router advertisements, it's also local
|
|
if (!isLocal && IPCIPv6CheckUnicastFromRouterPrefix(ipc, next_ip, &ra))
|
|
{
|
|
isLocal = true;
|
|
}
|
|
|
|
// If it is a global packet, we need to get our source IP prefix to know through which router shall we route
|
|
if (!isLocal)
|
|
{
|
|
if (!IPCIPv6CheckUnicastFromRouterPrefix(ipc, &srcIp, &ra))
|
|
{
|
|
// If we didn't find a router for the source IP, let's just try to pick the first router and try to send to it
|
|
if (LIST_NUM(ipc->IPv6RouterAdvs) > 0)
|
|
{
|
|
Copy(&ra, LIST_DATA(ipc->IPv6RouterAdvs, 0), sizeof(IPC_IPV6_ROUTER_ADVERTISEMENT));
|
|
}
|
|
else
|
|
{
|
|
char tmp[MAX_SIZE];
|
|
IPToStr6(tmp, MAX_SIZE, &srcIp);
|
|
Debug("We couldn't find a router for the source address of %s! Trying as local.\n", tmp);
|
|
isLocal = true;
|
|
}
|
|
}
|
|
|
|
destMac = ra.RouterMacAddress;
|
|
if (!IsMacUnicast(destMac) && !IsMacInvalid(ra.RouterMacAddress))
|
|
{
|
|
destMac = ra.RouterLinkLayerAddress;
|
|
}
|
|
}
|
|
|
|
// If it is local it should be routed directly through the NDT
|
|
if (isLocal)
|
|
{
|
|
ndtMatch = IPCSearchArpTable(ipc->IPv6NeighborTable, next_ip);
|
|
if (ndtMatch == NULL)
|
|
{
|
|
// Creating a non-matched NDT entry
|
|
ndtMatch = IPCNewARP(next_ip, NULL);
|
|
Add(ipc->IPv6NeighborTable, ndtMatch);
|
|
}
|
|
|
|
if (ndtMatch->Resolved != true && LIST_NUM(ipc->IPv6RouterAdvs) > 0)
|
|
{
|
|
// First try to look up in router advertisements
|
|
UINT i;
|
|
for (i = 0; i < LIST_NUM(ipc->IPv6RouterAdvs); i++)
|
|
{
|
|
IPC_IPV6_ROUTER_ADVERTISEMENT *ra = LIST_DATA(ipc->IPv6RouterAdvs, i);
|
|
if (CmpIpAddr(next_ip, &ra->RouterAddress) == 0)
|
|
{
|
|
Copy(ndtMatch->MacAddress, IsMacUnicast(ra->RouterLinkLayerAddress) ? ra->RouterLinkLayerAddress : ra->RouterMacAddress, 6);
|
|
ndtMatch->Resolved = true;
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
if (ndtMatch->Resolved != true)
|
|
{
|
|
// We need to send the Neighbor Solicitation and save the packet for sending later
|
|
// Generate the MAC address from the multicast address
|
|
BUF *neighborSolicit;
|
|
UCHAR destMacAddress[6];
|
|
|
|
char tmp[MAX_SIZE];
|
|
UCHAR *copy;
|
|
BLOCK *blk;
|
|
|
|
neighborSolicit = BuildICMPv6NeighborSoliciation(&header->SrcAddress, &header->DestAddress, ipc->MacAddress, 0, true);
|
|
destMacAddress[0] = 0x33;
|
|
destMacAddress[1] = 0x33;
|
|
destMacAddress[2] = 0xFF;
|
|
Copy(&destMacAddress[3], &header->DestAddress.Value[13], 3);
|
|
IPCIPv6SendWithDestMacAddr(ipc, neighborSolicit->Buf, neighborSolicit->Size, destMacAddress);
|
|
|
|
FreeBuf(neighborSolicit);
|
|
|
|
|
|
copy = Clone(data, size);
|
|
blk = NewBlock(copy, size, 0);
|
|
InsertQueue(ndtMatch->PacketQueue, blk);
|
|
IPToStr6(tmp, MAX_SIZE, next_ip);
|
|
|
|
return;
|
|
}
|
|
destMac = ndtMatch->MacAddress;
|
|
}
|
|
|
|
if (destMac != NULL && !IsMacInvalid(destMac))
|
|
{
|
|
IPCIPv6SendWithDestMacAddr(ipc, data, size, destMac);
|
|
}
|
|
else
|
|
{
|
|
char tmp[MAX_SIZE];
|
|
IPToStr6(tmp, MAX_SIZE, next_ip);
|
|
Debug("We couldn't deduce the MAC address for unicast address %s, packet dropped.\n", tmp);
|
|
/// TODO: think about sending to the all routers broadcast MAC as a last resort
|
|
}
|
|
}
|