xref: /freebsd/usr.sbin/ppp/ipv6cp.c (revision 1e413cf93298b5b97441a21d9a50fdcd0ee9945e)
1 /*-
2  * Copyright (c) 2001 Brian Somers <brian@Awfulhak.org>
3  * All rights reserved.
4  *
5  * Redistribution and use in source and binary forms, with or without
6  * modification, are permitted provided that the following conditions
7  * are met:
8  * 1. Redistributions of source code must retain the above copyright
9  *    notice, this list of conditions and the following disclaimer.
10  * 2. Redistributions in binary form must reproduce the above copyright
11  *    notice, this list of conditions and the following disclaimer in the
12  *    documentation and/or other materials provided with the distribution.
13  *
14  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24  * SUCH DAMAGE.
25  *
26  * $FreeBSD$
27  */
28 
29 #include <sys/param.h>
30 #include <netinet/in_systm.h>
31 #include <netinet/in.h>
32 #include <netinet/ip.h>
33 #include <sys/socket.h>
34 #include <net/route.h>
35 #include <net/if.h>
36 #include <net/if_types.h>
37 #include <net/if_dl.h>
38 #include <sys/un.h>
39 
40 #include <stdarg.h>
41 #include <stdio.h>
42 #include <stdlib.h>
43 #include <string.h>
44 #include <termios.h>
45 #include <ifaddrs.h>
46 
47 #include "layer.h"
48 #include "defs.h"
49 #include "mbuf.h"
50 #include "timer.h"
51 #include "fsm.h"
52 #include "iplist.h"
53 #include "throughput.h"
54 #include "slcompress.h"
55 #include "lqr.h"
56 #include "hdlc.h"
57 #include "lcp.h"
58 #include "ncpaddr.h"
59 #include "ip.h"
60 #include "ipcp.h"
61 #include "ipv6cp.h"
62 #include "filter.h"
63 #include "descriptor.h"
64 #include "ccp.h"
65 #include "link.h"
66 #include "mp.h"
67 #ifndef NORADIUS
68 #include "radius.h"
69 #endif
70 #include "ncp.h"
71 #include "bundle.h"
72 #include "route.h"
73 #include "iface.h"
74 #include "log.h"
75 #include "proto.h"
76 #include "command.h"
77 #include "prompt.h"
78 #include "async.h"
79 #include "physical.h"
80 #include "probe.h"
81 #include "systems.h"
82 
83 
84 #ifndef NOINET6
85 #define IN6ADDR_LINKLOCAL_MCAST_INIT \
86 	{{{ 0xff, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, \
87 	    0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }}}
88 static const struct in6_addr in6addr_linklocal_mcast =
89 	IN6ADDR_LINKLOCAL_MCAST_INIT;
90 
91 static int ipv6cp_LayerUp(struct fsm *);
92 static void ipv6cp_LayerDown(struct fsm *);
93 static void ipv6cp_LayerStart(struct fsm *);
94 static void ipv6cp_LayerFinish(struct fsm *);
95 static void ipv6cp_InitRestartCounter(struct fsm *, int);
96 static void ipv6cp_SendConfigReq(struct fsm *);
97 static void ipv6cp_SentTerminateReq(struct fsm *);
98 static void ipv6cp_SendTerminateAck(struct fsm *, u_char);
99 static void ipv6cp_DecodeConfig(struct fsm *, u_char *, u_char *, int,
100                                 struct fsm_decode *);
101 
102 static struct fsm_callbacks ipv6cp_Callbacks = {
103   ipv6cp_LayerUp,
104   ipv6cp_LayerDown,
105   ipv6cp_LayerStart,
106   ipv6cp_LayerFinish,
107   ipv6cp_InitRestartCounter,
108   ipv6cp_SendConfigReq,
109   ipv6cp_SentTerminateReq,
110   ipv6cp_SendTerminateAck,
111   ipv6cp_DecodeConfig,
112   fsm_NullRecvResetReq,
113   fsm_NullRecvResetAck
114 };
115 
116 static void
117 SetInterfaceID(u_char *ifid, int userandom)
118 {
119   struct ifaddrs *ifa, *ifap = NULL;
120   struct sockaddr_dl *sdl;
121   const u_long i32_max = 0xffffffff;
122   u_long r1, r2;
123 
124   /* configure an interface ID based on Section 4.1 of RFC 2472 */
125   memset(ifid, 0, IPV6CP_IFIDLEN);
126 
127   /*
128    * 1) If an IEEE global identifier (EUI-48 or EUI-64) is
129    * available anywhere on the node, it should be used to construct
130    * the tentative Interface-Identifier due to its uniqueness
131    * properties.
132    */
133   if (userandom)
134     goto randomid;
135   if (getifaddrs(&ifap) < 0)
136     goto randomid;
137 
138   for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
139     char *cp;
140 
141     if (ifa->ifa_addr->sa_family != AF_LINK)
142       continue;
143 
144     sdl = (struct sockaddr_dl *)ifa->ifa_addr;
145     if (sdl->sdl_alen < 6)
146       continue;
147     /* we're only interested in IEEE hardware addresses */
148     switch(sdl->sdl_type) {
149     case IFT_ETHER:
150     case IFT_FDDI:
151       /* XXX need more cases? */
152       break;
153     default:
154       continue;
155     }
156 
157     cp = (char *)(sdl->sdl_data + sdl->sdl_nlen);
158     ifid[0] = cp[0];
159     ifid[0] ^= 0x02; /* reverse the u/l bit*/
160     ifid[1] = cp[1];
161     ifid[2] = cp[2];
162     ifid[3] = 0xff;
163     ifid[4] = 0xfe;
164     ifid[5] = cp[3];
165     ifid[6] = cp[4];
166     ifid[7] = cp[5];
167 
168     freeifaddrs(ifap);
169     return;
170   }
171 
172   freeifaddrs(ifap);
173 
174   /*
175    * 2) If an IEEE global identifier is not available a different source
176    * of uniqueness should be used.
177    * XXX: we skip this case.
178    */
179 
180   /*
181    * 3) If a good source of uniqueness cannot be found, it is
182    * recommended that a random number be generated.  In this case the
183    * "u" bit of the interface identifier MUST be set to zero (0).
184    */
185  randomid:
186   randinit();
187   r1 = (((u_long)random()) % i32_max) + 1;
188   r2 = (((u_long)random()) % i32_max) + 1;
189   memcpy(ifid, &r1, sizeof(r1));
190   memcpy(ifid + 4, &r2, sizeof(r2));
191   ifid[0] &= 0xfd;
192   return;
193 }
194 
195 static int
196 ipcp_SetIPv6address(struct ipv6cp *ipv6cp, u_char *myifid, u_char *hisifid)
197 {
198   struct bundle *bundle = ipv6cp->fsm.bundle;
199   struct in6_addr myaddr, hisaddr;
200   struct ncprange myrange, range;
201   struct ncpaddr addr;
202   struct sockaddr_storage ssdst, ssgw, ssmask;
203   struct sockaddr *sadst, *sagw, *samask;
204 
205   sadst = (struct sockaddr *)&ssdst;
206   sagw = (struct sockaddr *)&ssgw;
207   samask = (struct sockaddr *)&ssmask;
208 
209   memset(&myaddr, '\0', sizeof myaddr);
210   memset(&hisaddr, '\0', sizeof hisaddr);
211 
212   myaddr.s6_addr[0] = 0xfe;
213   myaddr.s6_addr[1] = 0x80;
214   memcpy(&myaddr.s6_addr[8], myifid, IPV6CP_IFIDLEN);
215 #if 0
216   myaddr.s6_addr[8] |= 0x02;	/* set 'universal' bit */
217 #endif
218 
219   hisaddr.s6_addr[0] = 0xfe;
220   hisaddr.s6_addr[1] = 0x80;
221   memcpy(&hisaddr.s6_addr[8], hisifid, IPV6CP_IFIDLEN);
222 #if 0
223   hisaddr.s6_addr[8] |= 0x02;	/* set 'universal' bit */
224 #endif
225 
226   ncpaddr_setip6(&ipv6cp->myaddr, &myaddr);
227   ncpaddr_setip6(&ipv6cp->hisaddr, &hisaddr);
228   ncprange_set(&myrange, &ipv6cp->myaddr, 64);
229 
230   if (!iface_Add(bundle->iface, &bundle->ncp, &myrange, &ipv6cp->hisaddr,
231                  IFACE_ADD_FIRST|IFACE_FORCE_ADD|IFACE_SYSTEM))
232     return 0;
233 
234   if (!Enabled(bundle, OPT_IFACEALIAS))
235     iface_Clear(bundle->iface, &bundle->ncp, AF_INET6,
236                 IFACE_CLEAR_ALIASES|IFACE_SYSTEM);
237 
238   ncpaddr_setip6(&addr, &in6addr_linklocal_mcast);
239   ncprange_set(&range, &addr, 32);
240   rt_Set(bundle, RTM_ADD, &range, &ipv6cp->myaddr, 1, 0);
241 
242   if (bundle->ncp.cfg.sendpipe > 0 || bundle->ncp.cfg.recvpipe > 0) {
243     ncprange_getsa(&myrange, &ssgw, &ssmask);
244     if (ncpaddr_isset(&ipv6cp->hisaddr))
245       ncpaddr_getsa(&ipv6cp->hisaddr, &ssdst);
246     else
247       sadst = NULL;
248     rt_Update(bundle, sadst, sagw, samask);
249   }
250 
251   if (Enabled(bundle, OPT_SROUTES))
252     route_Change(bundle, bundle->ncp.route, &ipv6cp->myaddr, &ipv6cp->hisaddr);
253 
254 #ifndef NORADIUS
255   if (bundle->radius.valid)
256     route_Change(bundle, bundle->radius.ipv6routes, &ipv6cp->myaddr,
257                  &ipv6cp->hisaddr);
258 #endif
259 
260   return 1;	/* Ok */
261 }
262 
263 void
264 ipv6cp_Init(struct ipv6cp *ipv6cp, struct bundle *bundle, struct link *l,
265                  const struct fsm_parent *parent)
266 {
267   static const char * const timer_names[] =
268     {"IPV6CP restart", "IPV6CP openmode", "IPV6CP stopped"};
269   int n;
270 
271   fsm_Init(&ipv6cp->fsm, "IPV6CP", PROTO_IPV6CP, 1, IPV6CP_MAXCODE, LogIPV6CP,
272            bundle, l, parent, &ipv6cp_Callbacks, timer_names);
273 
274   ipv6cp->cfg.fsm.timeout = DEF_FSMRETRY;
275   ipv6cp->cfg.fsm.maxreq = DEF_FSMTRIES;
276   ipv6cp->cfg.fsm.maxtrm = DEF_FSMTRIES;
277 
278   SetInterfaceID(ipv6cp->my_ifid, 0);
279   do {
280     SetInterfaceID(ipv6cp->his_ifid, 1);
281   } while (memcmp(ipv6cp->his_ifid, ipv6cp->my_ifid, IPV6CP_IFIDLEN) == 0);
282 
283   if (probe.ipv6_available) {
284     n = 100;
285     while (n &&
286            !ipcp_SetIPv6address(ipv6cp, ipv6cp->my_ifid, ipv6cp->his_ifid)) {
287       do {
288 	n--;
289     	SetInterfaceID(ipv6cp->my_ifid, 1);
290       } while (n
291 	&& memcmp(ipv6cp->his_ifid, ipv6cp->my_ifid, IPV6CP_IFIDLEN) == 0);
292     }
293   }
294 
295   throughput_init(&ipv6cp->throughput, SAMPLE_PERIOD);
296   memset(ipv6cp->Queue, '\0', sizeof ipv6cp->Queue);
297   ipv6cp_Setup(ipv6cp);
298 }
299 
300 void
301 ipv6cp_Destroy(struct ipv6cp *ipv6cp)
302 {
303   throughput_destroy(&ipv6cp->throughput);
304 }
305 
306 void
307 ipv6cp_Setup(struct ipv6cp *ipv6cp)
308 {
309   ncpaddr_init(&ipv6cp->myaddr);
310   ncpaddr_init(&ipv6cp->hisaddr);
311 
312   ipv6cp->his_reject = 0;
313   ipv6cp->my_reject = 0;
314 }
315 
316 void
317 ipv6cp_SetLink(struct ipv6cp *ipv6cp, struct link *l)
318 {
319   ipv6cp->fsm.link = l;
320 }
321 
322 int
323 ipv6cp_Show(struct cmdargs const *arg)
324 {
325   struct ipv6cp *ipv6cp = &arg->bundle->ncp.ipv6cp;
326 
327   prompt_Printf(arg->prompt, "%s [%s]\n", ipv6cp->fsm.name,
328                 State2Nam(ipv6cp->fsm.state));
329   if (ipv6cp->fsm.state == ST_OPENED) {
330     prompt_Printf(arg->prompt, " His side:        %s\n",
331                   ncpaddr_ntoa(&ipv6cp->hisaddr));
332     prompt_Printf(arg->prompt, " My side:         %s\n",
333                   ncpaddr_ntoa(&ipv6cp->myaddr));
334     prompt_Printf(arg->prompt, " Queued packets:  %lu\n",
335                   (unsigned long)ipv6cp_QueueLen(ipv6cp));
336   }
337 
338   prompt_Printf(arg->prompt, "\nDefaults:\n");
339   prompt_Printf(arg->prompt, "  FSM retry = %us, max %u Config"
340                 " REQ%s, %u Term REQ%s\n\n", ipv6cp->cfg.fsm.timeout,
341                 ipv6cp->cfg.fsm.maxreq, ipv6cp->cfg.fsm.maxreq == 1 ? "" : "s",
342                 ipv6cp->cfg.fsm.maxtrm, ipv6cp->cfg.fsm.maxtrm == 1 ? "" : "s");
343 
344   throughput_disp(&ipv6cp->throughput, arg->prompt);
345 
346   return 0;
347 }
348 
349 struct mbuf *
350 ipv6cp_Input(struct bundle *bundle, struct link *l, struct mbuf *bp)
351 {
352   /* Got PROTO_IPV6CP from link */
353   m_settype(bp, MB_IPV6CPIN);
354   if (bundle_Phase(bundle) == PHASE_NETWORK)
355     fsm_Input(&bundle->ncp.ipv6cp.fsm, bp);
356   else {
357     if (bundle_Phase(bundle) < PHASE_NETWORK)
358       log_Printf(LogIPV6CP, "%s: Error: Unexpected IPV6CP in phase %s"
359                  " (ignored)\n", l->name, bundle_PhaseName(bundle));
360     m_freem(bp);
361   }
362   return NULL;
363 }
364 
365 void
366 ipv6cp_AddInOctets(struct ipv6cp *ipv6cp, int n)
367 {
368   throughput_addin(&ipv6cp->throughput, n);
369 }
370 
371 void
372 ipv6cp_AddOutOctets(struct ipv6cp *ipv6cp, int n)
373 {
374   throughput_addout(&ipv6cp->throughput, n);
375 }
376 
377 void
378 ipv6cp_IfaceAddrAdded(struct ipv6cp *ipv6cp __unused,
379 		      const struct iface_addr *addr __unused)
380 {
381 }
382 
383 void
384 ipv6cp_IfaceAddrDeleted(struct ipv6cp *ipv6cp __unused,
385 			const struct iface_addr *addr __unused)
386 {
387 }
388 
389 int
390 ipv6cp_InterfaceUp(struct ipv6cp *ipv6cp)
391 {
392   if (!ipcp_SetIPv6address(ipv6cp, ipv6cp->my_ifid, ipv6cp->his_ifid)) {
393     log_Printf(LogERROR, "ipv6cp_InterfaceUp: unable to set ipv6 address\n");
394     return 0;
395   }
396 
397   if (!iface_SetFlags(ipv6cp->fsm.bundle->iface->name, IFF_UP)) {
398     log_Printf(LogERROR, "ipv6cp_InterfaceUp: Can't set the IFF_UP"
399                " flag on %s\n", ipv6cp->fsm.bundle->iface->name);
400     return 0;
401   }
402 
403   return 1;
404 }
405 
406 size_t
407 ipv6cp_QueueLen(struct ipv6cp *ipv6cp)
408 {
409   struct mqueue *q;
410   size_t result;
411 
412   result = 0;
413   for (q = ipv6cp->Queue; q < ipv6cp->Queue + IPV6CP_QUEUES(ipv6cp); q++)
414     result += q->len;
415 
416   return result;
417 }
418 
419 int
420 ipv6cp_PushPacket(struct ipv6cp *ipv6cp, struct link *l)
421 {
422   struct bundle *bundle = ipv6cp->fsm.bundle;
423   struct mqueue *queue;
424   struct mbuf *bp;
425   int m_len;
426   u_int32_t secs = 0;
427   unsigned alivesecs = 0;
428 
429   if (ipv6cp->fsm.state != ST_OPENED)
430     return 0;
431 
432   /*
433    * If ccp is not open but is required, do nothing.
434    */
435   if (l->ccp.fsm.state != ST_OPENED && ccp_Required(&l->ccp)) {
436     log_Printf(LogPHASE, "%s: Not transmitting... waiting for CCP\n", l->name);
437     return 0;
438   }
439 
440   queue = ipv6cp->Queue + IPV6CP_QUEUES(ipv6cp) - 1;
441   do {
442     if (queue->top) {
443       bp = m_dequeue(queue);
444       bp = mbuf_Read(bp, &secs, sizeof secs);
445       bp = m_pullup(bp);
446       m_len = m_length(bp);
447       if (!FilterCheck(MBUF_CTOP(bp), AF_INET6, &bundle->filter.alive,
448                        &alivesecs)) {
449         if (secs == 0)
450           secs = alivesecs;
451         bundle_StartIdleTimer(bundle, secs);
452       }
453       link_PushPacket(l, bp, bundle, 0, PROTO_IPV6);
454       ipv6cp_AddOutOctets(ipv6cp, m_len);
455       return 1;
456     }
457   } while (queue-- != ipv6cp->Queue);
458 
459   return 0;
460 }
461 
462 static int
463 ipv6cp_LayerUp(struct fsm *fp)
464 {
465   /* We're now up */
466   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
467   char tbuff[40];
468 
469   log_Printf(LogIPV6CP, "%s: LayerUp.\n", fp->link->name);
470   if (!ipv6cp_InterfaceUp(ipv6cp))
471     return 0;
472 
473   snprintf(tbuff, sizeof tbuff, "%s", ncpaddr_ntoa(&ipv6cp->myaddr));
474   log_Printf(LogIPV6CP, "myaddr %s hisaddr = %s\n",
475              tbuff, ncpaddr_ntoa(&ipv6cp->hisaddr));
476 
477 #ifndef NORADIUS
478   radius_Account_Set_Ipv6(&fp->bundle->radacct6, ipv6cp->his_ifid);
479   radius_Account(&fp->bundle->radius, &fp->bundle->radacct6,
480 		 fp->bundle->links, RAD_START, &ipv6cp->throughput);
481 
482   /*
483    * XXX: Avoid duplicate evaluation of filterid between IPCP and
484    * IPV6CP.  When IPCP is enabled and rejected, filterid is not
485    * evaluated.
486    */
487   if (!Enabled(fp->bundle, OPT_IPCP)) {
488     if (fp->bundle->radius.cfg.file && fp->bundle->radius.filterid)
489       system_Select(fp->bundle, fp->bundle->radius.filterid, LINKUPFILE,
490 		    NULL, NULL);
491   }
492 #endif
493 
494   /*
495    * XXX this stuff should really live in the FSM.  Our config should
496    * associate executable sections in files with events.
497    */
498   if (system_Select(fp->bundle, tbuff, LINKUPFILE, NULL, NULL) < 0) {
499     /*
500      * XXX: Avoid duplicate evaluation of label between IPCP and
501      * IPV6CP.  When IPCP is enabled and rejected, label is not
502      * evaluated.
503      */
504     if (bundle_GetLabel(fp->bundle) && !Enabled(fp->bundle, OPT_IPCP)) {
505       if (system_Select(fp->bundle, bundle_GetLabel(fp->bundle),
506 			LINKUPFILE, NULL, NULL) < 0)
507 	system_Select(fp->bundle, "MYADDR6", LINKUPFILE, NULL, NULL);
508     } else
509       system_Select(fp->bundle, "MYADDR6", LINKUPFILE, NULL, NULL);
510   }
511 
512   fp->more.reqs = fp->more.naks = fp->more.rejs = ipv6cp->cfg.fsm.maxreq * 3;
513   log_DisplayPrompts();
514 
515   return 1;
516 }
517 
518 static void
519 ipv6cp_LayerDown(struct fsm *fp)
520 {
521   /* About to come down */
522   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
523   static int recursing;
524   char addr[40];
525 
526   if (!recursing++) {
527     snprintf(addr, sizeof addr, "%s", ncpaddr_ntoa(&ipv6cp->myaddr));
528     log_Printf(LogIPV6CP, "%s: LayerDown: %s\n", fp->link->name, addr);
529 
530 #ifndef NORADIUS
531     radius_Flush(&fp->bundle->radius);
532     radius_Account(&fp->bundle->radius, &fp->bundle->radacct6,
533 		   fp->bundle->links, RAD_STOP, &ipv6cp->throughput);
534 
535     /*
536      * XXX: Avoid duplicate evaluation of filterid between IPCP and
537      * IPV6CP.  When IPCP is enabled and rejected, filterid is not
538      * evaluated.
539      */
540     if (!Enabled(fp->bundle, OPT_IPCP)) {
541       if (fp->bundle->radius.cfg.file && fp->bundle->radius.filterid)
542 	system_Select(fp->bundle, fp->bundle->radius.filterid, LINKDOWNFILE,
543 		      NULL, NULL);
544     }
545 #endif
546 
547     /*
548      * XXX this stuff should really live in the FSM.  Our config should
549      * associate executable sections in files with events.
550      */
551     if (system_Select(fp->bundle, addr, LINKDOWNFILE, NULL, NULL) < 0) {
552       /*
553        * XXX: Avoid duplicate evaluation of label between IPCP and
554        * IPV6CP.  When IPCP is enabled and rejected, label is not
555        * evaluated.
556        */
557       if (bundle_GetLabel(fp->bundle) && !Enabled(fp->bundle, OPT_IPCP)) {
558 	if (system_Select(fp->bundle, bundle_GetLabel(fp->bundle),
559 			  LINKDOWNFILE, NULL, NULL) < 0)
560 	  system_Select(fp->bundle, "MYADDR6", LINKDOWNFILE, NULL, NULL);
561       } else
562 	system_Select(fp->bundle, "MYADDR6", LINKDOWNFILE, NULL, NULL);
563     }
564 
565     ipv6cp_Setup(ipv6cp);
566   }
567   recursing--;
568 }
569 
570 static void
571 ipv6cp_LayerStart(struct fsm *fp)
572 {
573   /* We're about to start up ! */
574   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
575 
576   log_Printf(LogIPV6CP, "%s: LayerStart.\n", fp->link->name);
577   throughput_start(&ipv6cp->throughput, "IPV6CP throughput",
578                    Enabled(fp->bundle, OPT_THROUGHPUT));
579   fp->more.reqs = fp->more.naks = fp->more.rejs = ipv6cp->cfg.fsm.maxreq * 3;
580   ipv6cp->peer_tokenreq = 0;
581 }
582 
583 static void
584 ipv6cp_LayerFinish(struct fsm *fp)
585 {
586   /* We're now down */
587   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
588 
589   log_Printf(LogIPV6CP, "%s: LayerFinish.\n", fp->link->name);
590   throughput_stop(&ipv6cp->throughput);
591   throughput_log(&ipv6cp->throughput, LogIPV6CP, NULL);
592 }
593 
594 static void
595 ipv6cp_InitRestartCounter(struct fsm *fp, int what)
596 {
597   /* Set fsm timer load */
598   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
599 
600   fp->FsmTimer.load = ipv6cp->cfg.fsm.timeout * SECTICKS;
601   switch (what) {
602     case FSM_REQ_TIMER:
603       fp->restart = ipv6cp->cfg.fsm.maxreq;
604       break;
605     case FSM_TRM_TIMER:
606       fp->restart = ipv6cp->cfg.fsm.maxtrm;
607       break;
608     default:
609       fp->restart = 1;
610       break;
611   }
612 }
613 
614 static void
615 ipv6cp_SendConfigReq(struct fsm *fp)
616 {
617   /* Send config REQ please */
618   struct physical *p = link2physical(fp->link);
619   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
620   u_char buff[IPV6CP_IFIDLEN+2];
621   struct fsm_opt *o;
622 
623   o = (struct fsm_opt *)buff;
624 
625   if ((p && !physical_IsSync(p)) || !REJECTED(ipv6cp, TY_TOKEN)) {
626     memcpy(o->data, ipv6cp->my_ifid, IPV6CP_IFIDLEN);
627     INC_FSM_OPT(TY_TOKEN, IPV6CP_IFIDLEN + 2, o);
628   }
629 
630   fsm_Output(fp, CODE_CONFIGREQ, fp->reqid, buff, (u_char *)o - buff,
631              MB_IPV6CPOUT);
632 }
633 
634 static void
635 ipv6cp_SentTerminateReq(struct fsm *fp __unused)
636 {
637   /* Term REQ just sent by FSM */
638 }
639 
640 static void
641 ipv6cp_SendTerminateAck(struct fsm *fp, u_char id)
642 {
643   /* Send Term ACK please */
644   fsm_Output(fp, CODE_TERMACK, id, NULL, 0, MB_IPV6CPOUT);
645 }
646 
647 static const char *
648 protoname(unsigned proto)
649 {
650   static const char *cftypes[] = { "IFACEID", "COMPPROTO" };
651 
652   if (proto > 0 && proto <= sizeof cftypes / sizeof *cftypes)
653     return cftypes[proto - 1];
654 
655   return NumStr(proto, NULL, 0);
656 }
657 
658 static void
659 ipv6cp_ValidateInterfaceID(struct ipv6cp *ipv6cp, u_char *ifid,
660 			   struct fsm_decode *dec)
661 {
662   struct fsm_opt opt;
663   u_char zero[IPV6CP_IFIDLEN];
664 
665   memset(zero, 0, IPV6CP_IFIDLEN);
666 
667   if (memcmp(ifid, zero, IPV6CP_IFIDLEN) != 0
668       && memcmp(ifid, ipv6cp->my_ifid, IPV6CP_IFIDLEN) != 0)
669     memcpy(ipv6cp->his_ifid, ifid, IPV6CP_IFIDLEN);
670 
671   opt.hdr.id = TY_TOKEN;
672   opt.hdr.len = IPV6CP_IFIDLEN + 2;
673   memcpy(opt.data, &ipv6cp->his_ifid, IPV6CP_IFIDLEN);
674   if (memcmp(ifid, ipv6cp->his_ifid, IPV6CP_IFIDLEN) == 0)
675     fsm_ack(dec, &opt);
676   else
677     fsm_nak(dec, &opt);
678 }
679 
680 static void
681 ipv6cp_DecodeConfig(struct fsm *fp, u_char *cp, u_char *end, int mode_type,
682                     struct fsm_decode *dec)
683 {
684   /* Deal with incoming PROTO_IPV6CP */
685   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
686   int n;
687   char tbuff[100];
688   u_char ifid[IPV6CP_IFIDLEN], zero[IPV6CP_IFIDLEN];
689   struct fsm_opt *opt;
690 
691   memset(zero, 0, IPV6CP_IFIDLEN);
692 
693   while (end - cp >= (int)sizeof(opt->hdr)) {
694     if ((opt = fsm_readopt(&cp)) == NULL)
695       break;
696 
697     snprintf(tbuff, sizeof tbuff, " %s[%d]", protoname(opt->hdr.id),
698              opt->hdr.len);
699 
700     switch (opt->hdr.id) {
701     case TY_TOKEN:
702       memcpy(ifid, opt->data, IPV6CP_IFIDLEN);
703       log_Printf(LogIPV6CP, "%s 0x%02x%02x%02x%02x%02x%02x%02x%02x\n", tbuff,
704 		 ifid[0], ifid[1], ifid[2], ifid[3], ifid[4], ifid[5], ifid[6], ifid[7]);
705 
706       switch (mode_type) {
707       case MODE_REQ:
708         ipv6cp->peer_tokenreq = 1;
709         ipv6cp_ValidateInterfaceID(ipv6cp, ifid, dec);
710         break;
711 
712       case MODE_NAK:
713         if (memcmp(ifid, zero, IPV6CP_IFIDLEN) == 0) {
714           log_Printf(log_IsKept(LogIPV6CP) ? LogIPV6CP : LogPHASE,
715 		     "0x0000000000000000: Unacceptable IntefaceID!\n");
716           fsm_Close(&ipv6cp->fsm);
717         } else if (memcmp(ifid, ipv6cp->his_ifid, IPV6CP_IFIDLEN) == 0) {
718           log_Printf(log_IsKept(LogIPV6CP) ? LogIPV6CP : LogPHASE,
719 		     "0x%02x%02x%02x%02x%02x%02x%02x%02x: "
720 		     "Unacceptable IntefaceID!\n",
721 		     ifid[0], ifid[1], ifid[2], ifid[3],
722 		     ifid[4], ifid[5], ifid[6], ifid[7]);
723         } else if (memcmp(ifid, ipv6cp->my_ifid, IPV6CP_IFIDLEN) != 0) {
724           n = 100;
725 	  while (n && !ipcp_SetIPv6address(ipv6cp, ifid, ipv6cp->his_ifid)) {
726 	    do {
727 	      n--;
728 	      SetInterfaceID(ifid, 1);
729 	    } while (n && memcmp(ifid, ipv6cp->his_ifid, IPV6CP_IFIDLEN) == 0);
730 	  }
731 
732           if (n == 0) {
733             log_Printf(log_IsKept(LogIPV6CP) ? LogIPV6CP : LogPHASE,
734                        "0x0000000000000000: Unacceptable IntefaceID!\n");
735             fsm_Close(&ipv6cp->fsm);
736           } else {
737 	    log_Printf(LogIPV6CP, "%s changing IntefaceID: "
738 		       "0x%02x%02x%02x%02x%02x%02x%02x%02x "
739 		       "--> 0x%02x%02x%02x%02x%02x%02x%02x%02x\n", tbuff,
740 		       ipv6cp->my_ifid[0], ipv6cp->my_ifid[1],
741 		       ipv6cp->my_ifid[2], ipv6cp->my_ifid[3],
742 		       ipv6cp->my_ifid[4], ipv6cp->my_ifid[5],
743 		       ipv6cp->my_ifid[6], ipv6cp->my_ifid[7],
744 		       ifid[0], ifid[1], ifid[2], ifid[3],
745 		       ifid[4], ifid[5], ifid[6], ifid[7]);
746             memcpy(ipv6cp->my_ifid, ifid, IPV6CP_IFIDLEN);
747             bundle_AdjustFilters(fp->bundle, &ipv6cp->myaddr, NULL);
748           }
749         }
750         break;
751 
752       case MODE_REJ:
753         ipv6cp->his_reject |= (1 << opt->hdr.id);
754         break;
755       }
756       break;
757 
758     default:
759       if (mode_type != MODE_NOP) {
760         ipv6cp->my_reject |= (1 << opt->hdr.id);
761         fsm_rej(dec, opt);
762       }
763       break;
764     }
765   }
766 
767   if (mode_type != MODE_NOP) {
768     if (mode_type == MODE_REQ && !ipv6cp->peer_tokenreq) {
769       if (dec->rejend == dec->rej && dec->nakend == dec->nak) {
770         /*
771          * Pretend the peer has requested a TOKEN.
772          * We do this to ensure that we only send one NAK if the only
773          * reason for the NAK is because the peer isn't sending a
774          * TY_TOKEN REQ.  This stops us from repeatedly trying to tell
775          * the peer that we have to have an IP address on their end.
776          */
777         ipv6cp->peer_tokenreq = 1;
778       }
779       memset(ifid, 0, IPV6CP_IFIDLEN);
780       ipv6cp_ValidateInterfaceID(ipv6cp, ifid, dec);
781     }
782     fsm_opt_normalise(dec);
783   }
784 }
785 #endif
786