xref: /freebsd/usr.sbin/ppp/ipv6cp.c (revision 8881d206f4e68b564c2c5f50fc717086fc3e827a)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3  *
4  * Copyright (c) 2001 Brian Somers <brian@Awfulhak.org>
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  *
28  * $FreeBSD$
29  */
30 
31 #include <sys/param.h>
32 #include <netinet/in_systm.h>
33 #include <netinet/in.h>
34 #include <netinet/ip.h>
35 #include <sys/socket.h>
36 #include <net/route.h>
37 #include <net/if.h>
38 #include <net/if_types.h>
39 #include <net/if_dl.h>
40 #include <sys/un.h>
41 
42 #include <stdarg.h>
43 #include <stdio.h>
44 #include <stdlib.h>
45 #include <string.h>
46 #include <termios.h>
47 #include <ifaddrs.h>
48 
49 #include "layer.h"
50 #include "defs.h"
51 #include "mbuf.h"
52 #include "timer.h"
53 #include "fsm.h"
54 #include "iplist.h"
55 #include "throughput.h"
56 #include "slcompress.h"
57 #include "lqr.h"
58 #include "hdlc.h"
59 #include "lcp.h"
60 #include "ncpaddr.h"
61 #include "ip.h"
62 #include "ipcp.h"
63 #include "ipv6cp.h"
64 #include "filter.h"
65 #include "descriptor.h"
66 #include "ccp.h"
67 #include "link.h"
68 #include "mp.h"
69 #ifndef NORADIUS
70 #include "radius.h"
71 #endif
72 #include "ncp.h"
73 #include "bundle.h"
74 #include "route.h"
75 #include "iface.h"
76 #include "log.h"
77 #include "proto.h"
78 #include "command.h"
79 #include "prompt.h"
80 #include "async.h"
81 #include "physical.h"
82 #include "probe.h"
83 #include "systems.h"
84 
85 
86 #ifndef NOINET6
87 #define IN6ADDR_LINKLOCAL_MCAST_INIT \
88 	{{{ 0xff, 0x02, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, \
89 	    0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00, 0x00 }}}
90 static const struct in6_addr in6addr_linklocal_mcast =
91 	IN6ADDR_LINKLOCAL_MCAST_INIT;
92 
93 static int ipv6cp_LayerUp(struct fsm *);
94 static void ipv6cp_LayerDown(struct fsm *);
95 static void ipv6cp_LayerStart(struct fsm *);
96 static void ipv6cp_LayerFinish(struct fsm *);
97 static void ipv6cp_InitRestartCounter(struct fsm *, int);
98 static void ipv6cp_SendConfigReq(struct fsm *);
99 static void ipv6cp_SentTerminateReq(struct fsm *);
100 static void ipv6cp_SendTerminateAck(struct fsm *, u_char);
101 static void ipv6cp_DecodeConfig(struct fsm *, u_char *, u_char *, int,
102                                 struct fsm_decode *);
103 
104 static struct fsm_callbacks ipv6cp_Callbacks = {
105   ipv6cp_LayerUp,
106   ipv6cp_LayerDown,
107   ipv6cp_LayerStart,
108   ipv6cp_LayerFinish,
109   ipv6cp_InitRestartCounter,
110   ipv6cp_SendConfigReq,
111   ipv6cp_SentTerminateReq,
112   ipv6cp_SendTerminateAck,
113   ipv6cp_DecodeConfig,
114   fsm_NullRecvResetReq,
115   fsm_NullRecvResetAck
116 };
117 
118 static void
119 SetInterfaceID(u_char *ifid, int userandom)
120 {
121   struct ifaddrs *ifa, *ifap = NULL;
122   struct sockaddr_dl *sdl;
123   const u_long i32_max = 0xffffffff;
124   u_long r1, r2;
125 
126   /* configure an interface ID based on Section 4.1 of RFC 2472 */
127   memset(ifid, 0, IPV6CP_IFIDLEN);
128 
129   /*
130    * 1) If an IEEE global identifier (EUI-48 or EUI-64) is
131    * available anywhere on the node, it should be used to construct
132    * the tentative Interface-Identifier due to its uniqueness
133    * properties.
134    */
135   if (userandom)
136     goto randomid;
137   if (getifaddrs(&ifap) < 0)
138     goto randomid;
139 
140   for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
141     char *cp;
142 
143     if (ifa->ifa_addr->sa_family != AF_LINK)
144       continue;
145 
146     sdl = (struct sockaddr_dl *)ifa->ifa_addr;
147     if (sdl->sdl_alen < 6)
148       continue;
149     /* we're only interested in IEEE hardware addresses */
150     switch(sdl->sdl_type) {
151     case IFT_ETHER:
152     case IFT_FDDI:
153     case IFT_L2VLAN:
154       /* XXX need more cases? */
155       break;
156     default:
157       continue;
158     }
159 
160     cp = (char *)(sdl->sdl_data + sdl->sdl_nlen);
161     ifid[0] = cp[0];
162     ifid[0] ^= 0x02; /* reverse the u/l bit*/
163     ifid[1] = cp[1];
164     ifid[2] = cp[2];
165     ifid[3] = 0xff;
166     ifid[4] = 0xfe;
167     ifid[5] = cp[3];
168     ifid[6] = cp[4];
169     ifid[7] = cp[5];
170 
171     freeifaddrs(ifap);
172     return;
173   }
174 
175   freeifaddrs(ifap);
176 
177   /*
178    * 2) If an IEEE global identifier is not available a different source
179    * of uniqueness should be used.
180    * XXX: we skip this case.
181    */
182 
183   /*
184    * 3) If a good source of uniqueness cannot be found, it is
185    * recommended that a random number be generated.  In this case the
186    * "u" bit of the interface identifier MUST be set to zero (0).
187    */
188  randomid:
189   randinit();
190   r1 = (((u_long)random()) % i32_max) + 1;
191   r2 = (((u_long)random()) % i32_max) + 1;
192   memcpy(ifid, &r1, sizeof(r1));
193   memcpy(ifid + 4, &r2, sizeof(r2));
194   ifid[0] &= 0xfd;
195   return;
196 }
197 
198 static int
199 ipcp_SetIPv6address(struct ipv6cp *ipv6cp, u_char *myifid, u_char *hisifid)
200 {
201   struct bundle *bundle = ipv6cp->fsm.bundle;
202   struct in6_addr myaddr, hisaddr;
203   struct ncprange myrange, range;
204   struct ncpaddr addr;
205   struct sockaddr_storage ssdst, ssgw, ssmask;
206   struct sockaddr *sadst, *sagw, *samask;
207 
208   sadst = (struct sockaddr *)&ssdst;
209   sagw = (struct sockaddr *)&ssgw;
210   samask = (struct sockaddr *)&ssmask;
211 
212   memset(&myaddr, '\0', sizeof myaddr);
213   memset(&hisaddr, '\0', sizeof hisaddr);
214 
215   myaddr.s6_addr[0] = 0xfe;
216   myaddr.s6_addr[1] = 0x80;
217   memcpy(&myaddr.s6_addr[8], myifid, IPV6CP_IFIDLEN);
218 #if 0
219   myaddr.s6_addr[8] |= 0x02;	/* set 'universal' bit */
220 #endif
221 
222   hisaddr.s6_addr[0] = 0xfe;
223   hisaddr.s6_addr[1] = 0x80;
224   memcpy(&hisaddr.s6_addr[8], hisifid, IPV6CP_IFIDLEN);
225 #if 0
226   hisaddr.s6_addr[8] |= 0x02;	/* set 'universal' bit */
227 #endif
228 
229   ncpaddr_setip6(&ipv6cp->myaddr, &myaddr);
230   ncpaddr_setip6(&ipv6cp->hisaddr, &hisaddr);
231   ncprange_set(&myrange, &ipv6cp->myaddr, 64);
232 
233   if (!iface_Add(bundle->iface, &bundle->ncp, &myrange, &ipv6cp->hisaddr,
234                  IFACE_ADD_FIRST|IFACE_FORCE_ADD|IFACE_SYSTEM))
235     return 0;
236 
237   if (!Enabled(bundle, OPT_IFACEALIAS))
238     iface_Clear(bundle->iface, &bundle->ncp, AF_INET6,
239                 IFACE_CLEAR_ALIASES|IFACE_SYSTEM);
240 
241   ncpaddr_setip6(&addr, &in6addr_linklocal_mcast);
242   ncprange_set(&range, &addr, 32);
243   rt_Set(bundle, RTM_ADD, &range, &ipv6cp->myaddr, 1, 0);
244 
245   if (bundle->ncp.cfg.sendpipe > 0 || bundle->ncp.cfg.recvpipe > 0) {
246     ncprange_getsa(&myrange, &ssgw, &ssmask);
247     if (ncpaddr_isset(&ipv6cp->hisaddr))
248       ncpaddr_getsa(&ipv6cp->hisaddr, &ssdst);
249     else
250       sadst = NULL;
251     rt_Update(bundle, sadst, sagw, samask, NULL, NULL);
252   }
253 
254   if (Enabled(bundle, OPT_SROUTES))
255     route_Change(bundle, bundle->ncp.route, &ipv6cp->myaddr, &ipv6cp->hisaddr);
256 
257 #ifndef NORADIUS
258   if (bundle->radius.valid)
259     route_Change(bundle, bundle->radius.ipv6routes, &ipv6cp->myaddr,
260                  &ipv6cp->hisaddr);
261 #endif
262 
263   return 1;	/* Ok */
264 }
265 
266 void
267 ipv6cp_Init(struct ipv6cp *ipv6cp, struct bundle *bundle, struct link *l,
268                  const struct fsm_parent *parent)
269 {
270   static const char * const timer_names[] =
271     {"IPV6CP restart", "IPV6CP openmode", "IPV6CP stopped"};
272   int n;
273 
274   fsm_Init(&ipv6cp->fsm, "IPV6CP", PROTO_IPV6CP, 1, IPV6CP_MAXCODE, LogIPV6CP,
275            bundle, l, parent, &ipv6cp_Callbacks, timer_names);
276 
277   ipv6cp->cfg.fsm.timeout = DEF_FSMRETRY;
278   ipv6cp->cfg.fsm.maxreq = DEF_FSMTRIES;
279   ipv6cp->cfg.fsm.maxtrm = DEF_FSMTRIES;
280 
281   SetInterfaceID(ipv6cp->my_ifid, 0);
282   do {
283     SetInterfaceID(ipv6cp->his_ifid, 1);
284   } while (memcmp(ipv6cp->his_ifid, ipv6cp->my_ifid, IPV6CP_IFIDLEN) == 0);
285 
286   if (probe.ipv6_available) {
287     n = 100;
288     while (n &&
289            !ipcp_SetIPv6address(ipv6cp, ipv6cp->my_ifid, ipv6cp->his_ifid)) {
290       do {
291 	n--;
292     	SetInterfaceID(ipv6cp->my_ifid, 1);
293       } while (n
294 	&& memcmp(ipv6cp->his_ifid, ipv6cp->my_ifid, IPV6CP_IFIDLEN) == 0);
295     }
296   }
297 
298   throughput_init(&ipv6cp->throughput, SAMPLE_PERIOD);
299   memset(ipv6cp->Queue, '\0', sizeof ipv6cp->Queue);
300   ipv6cp_Setup(ipv6cp);
301 }
302 
303 void
304 ipv6cp_Destroy(struct ipv6cp *ipv6cp)
305 {
306   throughput_destroy(&ipv6cp->throughput);
307 }
308 
309 void
310 ipv6cp_Setup(struct ipv6cp *ipv6cp)
311 {
312   ncpaddr_init(&ipv6cp->myaddr);
313   ncpaddr_init(&ipv6cp->hisaddr);
314 
315   ipv6cp->his_reject = 0;
316   ipv6cp->my_reject = 0;
317 }
318 
319 void
320 ipv6cp_SetLink(struct ipv6cp *ipv6cp, struct link *l)
321 {
322   ipv6cp->fsm.link = l;
323 }
324 
325 int
326 ipv6cp_Show(struct cmdargs const *arg)
327 {
328   struct ipv6cp *ipv6cp = &arg->bundle->ncp.ipv6cp;
329 
330   prompt_Printf(arg->prompt, "%s [%s]\n", ipv6cp->fsm.name,
331                 State2Nam(ipv6cp->fsm.state));
332   if (ipv6cp->fsm.state == ST_OPENED) {
333     prompt_Printf(arg->prompt, " His side:        %s\n",
334                   ncpaddr_ntoa(&ipv6cp->hisaddr));
335     prompt_Printf(arg->prompt, " My side:         %s\n",
336                   ncpaddr_ntoa(&ipv6cp->myaddr));
337     prompt_Printf(arg->prompt, " Queued packets:  %lu\n",
338                   (unsigned long)ipv6cp_QueueLen(ipv6cp));
339   }
340 
341   prompt_Printf(arg->prompt, "\nDefaults:\n");
342   prompt_Printf(arg->prompt, "  FSM retry = %us, max %u Config"
343                 " REQ%s, %u Term REQ%s\n\n", ipv6cp->cfg.fsm.timeout,
344                 ipv6cp->cfg.fsm.maxreq, ipv6cp->cfg.fsm.maxreq == 1 ? "" : "s",
345                 ipv6cp->cfg.fsm.maxtrm, ipv6cp->cfg.fsm.maxtrm == 1 ? "" : "s");
346 
347   throughput_disp(&ipv6cp->throughput, arg->prompt);
348 
349   return 0;
350 }
351 
352 struct mbuf *
353 ipv6cp_Input(struct bundle *bundle, struct link *l, struct mbuf *bp)
354 {
355   /* Got PROTO_IPV6CP from link */
356   m_settype(bp, MB_IPV6CPIN);
357   if (bundle_Phase(bundle) == PHASE_NETWORK)
358     fsm_Input(&bundle->ncp.ipv6cp.fsm, bp);
359   else {
360     if (bundle_Phase(bundle) < PHASE_NETWORK)
361       log_Printf(LogIPV6CP, "%s: Error: Unexpected IPV6CP in phase %s"
362                  " (ignored)\n", l->name, bundle_PhaseName(bundle));
363     m_freem(bp);
364   }
365   return NULL;
366 }
367 
368 void
369 ipv6cp_AddInOctets(struct ipv6cp *ipv6cp, int n)
370 {
371   throughput_addin(&ipv6cp->throughput, n);
372 }
373 
374 void
375 ipv6cp_AddOutOctets(struct ipv6cp *ipv6cp, int n)
376 {
377   throughput_addout(&ipv6cp->throughput, n);
378 }
379 
380 void
381 ipv6cp_IfaceAddrAdded(struct ipv6cp *ipv6cp __unused,
382 		      const struct iface_addr *addr __unused)
383 {
384 }
385 
386 void
387 ipv6cp_IfaceAddrDeleted(struct ipv6cp *ipv6cp __unused,
388 			const struct iface_addr *addr __unused)
389 {
390 }
391 
392 int
393 ipv6cp_InterfaceUp(struct ipv6cp *ipv6cp)
394 {
395   if (!ipcp_SetIPv6address(ipv6cp, ipv6cp->my_ifid, ipv6cp->his_ifid)) {
396     log_Printf(LogERROR, "ipv6cp_InterfaceUp: unable to set ipv6 address\n");
397     return 0;
398   }
399 
400   if (!iface_SetFlags(ipv6cp->fsm.bundle->iface->name, IFF_UP)) {
401     log_Printf(LogERROR, "ipv6cp_InterfaceUp: Can't set the IFF_UP"
402                " flag on %s\n", ipv6cp->fsm.bundle->iface->name);
403     return 0;
404   }
405 
406   return 1;
407 }
408 
409 size_t
410 ipv6cp_QueueLen(struct ipv6cp *ipv6cp)
411 {
412   struct mqueue *q;
413   size_t result;
414 
415   result = 0;
416   for (q = ipv6cp->Queue; q < ipv6cp->Queue + IPV6CP_QUEUES(ipv6cp); q++)
417     result += q->len;
418 
419   return result;
420 }
421 
422 int
423 ipv6cp_PushPacket(struct ipv6cp *ipv6cp, struct link *l)
424 {
425   struct bundle *bundle = ipv6cp->fsm.bundle;
426   struct mqueue *queue;
427   struct mbuf *bp;
428   int m_len;
429   u_int32_t secs = 0;
430   unsigned alivesecs = 0;
431 
432   if (ipv6cp->fsm.state != ST_OPENED)
433     return 0;
434 
435   /*
436    * If ccp is not open but is required, do nothing.
437    */
438   if (l->ccp.fsm.state != ST_OPENED && ccp_Required(&l->ccp)) {
439     log_Printf(LogPHASE, "%s: Not transmitting... waiting for CCP\n", l->name);
440     return 0;
441   }
442 
443   queue = ipv6cp->Queue + IPV6CP_QUEUES(ipv6cp) - 1;
444   do {
445     if (queue->top) {
446       bp = m_dequeue(queue);
447       bp = mbuf_Read(bp, &secs, sizeof secs);
448       bp = m_pullup(bp);
449       m_len = m_length(bp);
450       if (!FilterCheck(MBUF_CTOP(bp), AF_INET6, &bundle->filter.alive,
451                        &alivesecs)) {
452         if (secs == 0)
453           secs = alivesecs;
454         bundle_StartIdleTimer(bundle, secs);
455       }
456       link_PushPacket(l, bp, bundle, 0, PROTO_IPV6);
457       ipv6cp_AddOutOctets(ipv6cp, m_len);
458       return 1;
459     }
460   } while (queue-- != ipv6cp->Queue);
461 
462   return 0;
463 }
464 
465 static int
466 ipv6cp_LayerUp(struct fsm *fp)
467 {
468   /* We're now up */
469   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
470   char tbuff[NCP_ASCIIBUFFERSIZE];
471 
472   log_Printf(LogIPV6CP, "%s: LayerUp.\n", fp->link->name);
473   if (!ipv6cp_InterfaceUp(ipv6cp))
474     return 0;
475 
476   snprintf(tbuff, sizeof tbuff, "%s", ncpaddr_ntoa(&ipv6cp->myaddr));
477   log_Printf(LogIPV6CP, "myaddr %s hisaddr = %s\n",
478              tbuff, ncpaddr_ntoa(&ipv6cp->hisaddr));
479 
480 #ifndef NORADIUS
481   radius_Account_Set_Ipv6(&fp->bundle->radacct6, ipv6cp->his_ifid);
482   radius_Account(&fp->bundle->radius, &fp->bundle->radacct6,
483 		 fp->bundle->links, RAD_START, &ipv6cp->throughput);
484 
485   /*
486    * XXX: Avoid duplicate evaluation of filterid between IPCP and
487    * IPV6CP.  When IPCP is enabled and rejected, filterid is not
488    * evaluated.
489    */
490   if (!Enabled(fp->bundle, OPT_IPCP)) {
491     if (*fp->bundle->radius.cfg.file && fp->bundle->radius.filterid)
492       system_Select(fp->bundle, fp->bundle->radius.filterid, LINKUPFILE,
493 		    NULL, NULL);
494   }
495 #endif
496 
497   /*
498    * XXX this stuff should really live in the FSM.  Our config should
499    * associate executable sections in files with events.
500    */
501   if (system_Select(fp->bundle, tbuff, LINKUPFILE, NULL, NULL) < 0) {
502     /*
503      * XXX: Avoid duplicate evaluation of label between IPCP and
504      * IPV6CP.  When IPCP is enabled and rejected, label is not
505      * evaluated.
506      */
507     if (bundle_GetLabel(fp->bundle) && !Enabled(fp->bundle, OPT_IPCP)) {
508       if (system_Select(fp->bundle, bundle_GetLabel(fp->bundle),
509 			LINKUPFILE, NULL, NULL) < 0)
510 	system_Select(fp->bundle, "MYADDR6", LINKUPFILE, NULL, NULL);
511     } else
512       system_Select(fp->bundle, "MYADDR6", LINKUPFILE, NULL, NULL);
513   }
514 
515   fp->more.reqs = fp->more.naks = fp->more.rejs = ipv6cp->cfg.fsm.maxreq * 3;
516   log_DisplayPrompts();
517 
518   return 1;
519 }
520 
521 static void
522 ipv6cp_LayerDown(struct fsm *fp)
523 {
524   /* About to come down */
525   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
526   static int recursing;
527   char addr[NCP_ASCIIBUFFERSIZE];
528 
529   if (!recursing++) {
530     snprintf(addr, sizeof addr, "%s", ncpaddr_ntoa(&ipv6cp->myaddr));
531     log_Printf(LogIPV6CP, "%s: LayerDown: %s\n", fp->link->name, addr);
532 
533 #ifndef NORADIUS
534     radius_Flush(&fp->bundle->radius);
535     radius_Account(&fp->bundle->radius, &fp->bundle->radacct6,
536 		   fp->bundle->links, RAD_STOP, &ipv6cp->throughput);
537 
538     /*
539      * XXX: Avoid duplicate evaluation of filterid between IPCP and
540      * IPV6CP.  When IPCP is enabled and rejected, filterid is not
541      * evaluated.
542      */
543     if (!Enabled(fp->bundle, OPT_IPCP)) {
544       if (*fp->bundle->radius.cfg.file && fp->bundle->radius.filterid)
545 	system_Select(fp->bundle, fp->bundle->radius.filterid, LINKDOWNFILE,
546 		      NULL, NULL);
547     }
548 #endif
549 
550     /*
551      * XXX this stuff should really live in the FSM.  Our config should
552      * associate executable sections in files with events.
553      */
554     if (system_Select(fp->bundle, addr, LINKDOWNFILE, NULL, NULL) < 0) {
555       /*
556        * XXX: Avoid duplicate evaluation of label between IPCP and
557        * IPV6CP.  When IPCP is enabled and rejected, label is not
558        * evaluated.
559        */
560       if (bundle_GetLabel(fp->bundle) && !Enabled(fp->bundle, OPT_IPCP)) {
561 	if (system_Select(fp->bundle, bundle_GetLabel(fp->bundle),
562 			  LINKDOWNFILE, NULL, NULL) < 0)
563 	  system_Select(fp->bundle, "MYADDR6", LINKDOWNFILE, NULL, NULL);
564       } else
565 	system_Select(fp->bundle, "MYADDR6", LINKDOWNFILE, NULL, NULL);
566     }
567 
568     ipv6cp_Setup(ipv6cp);
569   }
570   recursing--;
571 }
572 
573 static void
574 ipv6cp_LayerStart(struct fsm *fp)
575 {
576   /* We're about to start up ! */
577   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
578 
579   log_Printf(LogIPV6CP, "%s: LayerStart.\n", fp->link->name);
580   throughput_start(&ipv6cp->throughput, "IPV6CP throughput",
581                    Enabled(fp->bundle, OPT_THROUGHPUT));
582   fp->more.reqs = fp->more.naks = fp->more.rejs = ipv6cp->cfg.fsm.maxreq * 3;
583   ipv6cp->peer_tokenreq = 0;
584 }
585 
586 static void
587 ipv6cp_LayerFinish(struct fsm *fp)
588 {
589   /* We're now down */
590   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
591 
592   log_Printf(LogIPV6CP, "%s: LayerFinish.\n", fp->link->name);
593   throughput_stop(&ipv6cp->throughput);
594   throughput_log(&ipv6cp->throughput, LogIPV6CP, NULL);
595 }
596 
597 static void
598 ipv6cp_InitRestartCounter(struct fsm *fp, int what)
599 {
600   /* Set fsm timer load */
601   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
602 
603   fp->FsmTimer.load = ipv6cp->cfg.fsm.timeout * SECTICKS;
604   switch (what) {
605     case FSM_REQ_TIMER:
606       fp->restart = ipv6cp->cfg.fsm.maxreq;
607       break;
608     case FSM_TRM_TIMER:
609       fp->restart = ipv6cp->cfg.fsm.maxtrm;
610       break;
611     default:
612       fp->restart = 1;
613       break;
614   }
615 }
616 
617 static void
618 ipv6cp_SendConfigReq(struct fsm *fp)
619 {
620   /* Send config REQ please */
621   struct physical *p = link2physical(fp->link);
622   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
623   u_char buff[IPV6CP_IFIDLEN+2];
624   struct fsm_opt *o;
625 
626   o = (struct fsm_opt *)buff;
627 
628   if ((p && !physical_IsSync(p)) || !REJECTED(ipv6cp, TY_TOKEN)) {
629     memcpy(o->data, ipv6cp->my_ifid, IPV6CP_IFIDLEN);
630     INC_FSM_OPT(TY_TOKEN, IPV6CP_IFIDLEN + 2, o);
631   }
632 
633   fsm_Output(fp, CODE_CONFIGREQ, fp->reqid, buff, (u_char *)o - buff,
634              MB_IPV6CPOUT);
635 }
636 
637 static void
638 ipv6cp_SentTerminateReq(struct fsm *fp __unused)
639 {
640   /* Term REQ just sent by FSM */
641 }
642 
643 static void
644 ipv6cp_SendTerminateAck(struct fsm *fp, u_char id)
645 {
646   /* Send Term ACK please */
647   fsm_Output(fp, CODE_TERMACK, id, NULL, 0, MB_IPV6CPOUT);
648 }
649 
650 static const char *
651 protoname(unsigned proto)
652 {
653   static const char *cftypes[] = { "IFACEID", "COMPPROTO" };
654 
655   if (proto > 0 && proto <= sizeof cftypes / sizeof *cftypes)
656     return cftypes[proto - 1];
657 
658   return NumStr(proto, NULL, 0);
659 }
660 
661 static void
662 ipv6cp_ValidateInterfaceID(struct ipv6cp *ipv6cp, u_char *ifid,
663 			   struct fsm_decode *dec)
664 {
665   struct fsm_opt opt;
666   u_char zero[IPV6CP_IFIDLEN];
667 
668   memset(zero, 0, IPV6CP_IFIDLEN);
669 
670   if (memcmp(ifid, zero, IPV6CP_IFIDLEN) != 0
671       && memcmp(ifid, ipv6cp->my_ifid, IPV6CP_IFIDLEN) != 0)
672     memcpy(ipv6cp->his_ifid, ifid, IPV6CP_IFIDLEN);
673 
674   opt.hdr.id = TY_TOKEN;
675   opt.hdr.len = IPV6CP_IFIDLEN + 2;
676   memcpy(opt.data, &ipv6cp->his_ifid, IPV6CP_IFIDLEN);
677   if (memcmp(ifid, ipv6cp->his_ifid, IPV6CP_IFIDLEN) == 0)
678     fsm_ack(dec, &opt);
679   else
680     fsm_nak(dec, &opt);
681 }
682 
683 static void
684 ipv6cp_DecodeConfig(struct fsm *fp, u_char *cp, u_char *end, int mode_type,
685                     struct fsm_decode *dec)
686 {
687   /* Deal with incoming PROTO_IPV6CP */
688   struct ipv6cp *ipv6cp = fsm2ipv6cp(fp);
689   int n;
690   char tbuff[100];
691   u_char ifid[IPV6CP_IFIDLEN], zero[IPV6CP_IFIDLEN];
692   struct fsm_opt *opt;
693 
694   memset(zero, 0, IPV6CP_IFIDLEN);
695 
696   while (end - cp >= (int)sizeof(opt->hdr)) {
697     if ((opt = fsm_readopt(&cp)) == NULL)
698       break;
699 
700     snprintf(tbuff, sizeof tbuff, " %s[%d]", protoname(opt->hdr.id),
701              opt->hdr.len);
702 
703     switch (opt->hdr.id) {
704     case TY_TOKEN:
705       memcpy(ifid, opt->data, IPV6CP_IFIDLEN);
706       log_Printf(LogIPV6CP, "%s 0x%02x%02x%02x%02x%02x%02x%02x%02x\n", tbuff,
707 		 ifid[0], ifid[1], ifid[2], ifid[3], ifid[4], ifid[5], ifid[6], ifid[7]);
708 
709       switch (mode_type) {
710       case MODE_REQ:
711         ipv6cp->peer_tokenreq = 1;
712         ipv6cp_ValidateInterfaceID(ipv6cp, ifid, dec);
713         break;
714 
715       case MODE_NAK:
716         if (memcmp(ifid, zero, IPV6CP_IFIDLEN) == 0) {
717           log_Printf(log_IsKept(LogIPV6CP) ? LogIPV6CP : LogPHASE,
718 		     "0x0000000000000000: Unacceptable IntefaceID!\n");
719           fsm_Close(&ipv6cp->fsm);
720         } else if (memcmp(ifid, ipv6cp->his_ifid, IPV6CP_IFIDLEN) == 0) {
721           log_Printf(log_IsKept(LogIPV6CP) ? LogIPV6CP : LogPHASE,
722 		     "0x%02x%02x%02x%02x%02x%02x%02x%02x: "
723 		     "Unacceptable IntefaceID!\n",
724 		     ifid[0], ifid[1], ifid[2], ifid[3],
725 		     ifid[4], ifid[5], ifid[6], ifid[7]);
726         } else if (memcmp(ifid, ipv6cp->my_ifid, IPV6CP_IFIDLEN) != 0) {
727           n = 100;
728 	  while (n && !ipcp_SetIPv6address(ipv6cp, ifid, ipv6cp->his_ifid)) {
729 	    do {
730 	      n--;
731 	      SetInterfaceID(ifid, 1);
732 	    } while (n && memcmp(ifid, ipv6cp->his_ifid, IPV6CP_IFIDLEN) == 0);
733 	  }
734 
735           if (n == 0) {
736             log_Printf(log_IsKept(LogIPV6CP) ? LogIPV6CP : LogPHASE,
737                        "0x0000000000000000: Unacceptable IntefaceID!\n");
738             fsm_Close(&ipv6cp->fsm);
739           } else {
740 	    log_Printf(LogIPV6CP, "%s changing IntefaceID: "
741 		       "0x%02x%02x%02x%02x%02x%02x%02x%02x "
742 		       "--> 0x%02x%02x%02x%02x%02x%02x%02x%02x\n", tbuff,
743 		       ipv6cp->my_ifid[0], ipv6cp->my_ifid[1],
744 		       ipv6cp->my_ifid[2], ipv6cp->my_ifid[3],
745 		       ipv6cp->my_ifid[4], ipv6cp->my_ifid[5],
746 		       ipv6cp->my_ifid[6], ipv6cp->my_ifid[7],
747 		       ifid[0], ifid[1], ifid[2], ifid[3],
748 		       ifid[4], ifid[5], ifid[6], ifid[7]);
749             memcpy(ipv6cp->my_ifid, ifid, IPV6CP_IFIDLEN);
750             bundle_AdjustFilters(fp->bundle, &ipv6cp->myaddr, NULL);
751           }
752         }
753         break;
754 
755       case MODE_REJ:
756         ipv6cp->his_reject |= (1 << opt->hdr.id);
757         break;
758       }
759       break;
760 
761     default:
762       if (mode_type != MODE_NOP) {
763         ipv6cp->my_reject |= (1 << opt->hdr.id);
764         fsm_rej(dec, opt);
765       }
766       break;
767     }
768   }
769 
770   if (mode_type != MODE_NOP) {
771     if (mode_type == MODE_REQ && !ipv6cp->peer_tokenreq) {
772       if (dec->rejend == dec->rej && dec->nakend == dec->nak) {
773         /*
774          * Pretend the peer has requested a TOKEN.
775          * We do this to ensure that we only send one NAK if the only
776          * reason for the NAK is because the peer isn't sending a
777          * TY_TOKEN REQ.  This stops us from repeatedly trying to tell
778          * the peer that we have to have an IP address on their end.
779          */
780         ipv6cp->peer_tokenreq = 1;
781       }
782       memset(ifid, 0, IPV6CP_IFIDLEN);
783       ipv6cp_ValidateInterfaceID(ipv6cp, ifid, dec);
784     }
785     fsm_opt_normalise(dec);
786   }
787 }
788 #endif
789