Current Path : /sys/netgraph/ |
FreeBSD hs32.drive.ne.jp 9.1-RELEASE FreeBSD 9.1-RELEASE #1: Wed Jan 14 12:18:08 JST 2015 root@hs32.drive.ne.jp:/sys/amd64/compile/hs32 amd64 |
Current File : //sys/netgraph/ng_rfc1490.c |
/* * ng_rfc1490.c */ /*- * Copyright (c) 1996-1999 Whistle Communications, Inc. * All rights reserved. * * Subject to the following obligations and disclaimer of warranty, use and * redistribution of this software, in source or object code forms, with or * without modifications are expressly permitted by Whistle Communications; * provided, however, that: * 1. Any and all reproductions of the source or object code must include the * copyright notice above and the following disclaimer of warranties; and * 2. No rights are granted, in any manner or form, to use Whistle * Communications, Inc. trademarks, including the mark "WHISTLE * COMMUNICATIONS" on advertising, endorsements, or otherwise except as * such appears in the above copyright notice or in the software. * * THIS SOFTWARE IS BEING PROVIDED BY WHISTLE COMMUNICATIONS "AS IS", AND * TO THE MAXIMUM EXTENT PERMITTED BY LAW, WHISTLE COMMUNICATIONS MAKES NO * REPRESENTATIONS OR WARRANTIES, EXPRESS OR IMPLIED, REGARDING THIS SOFTWARE, * INCLUDING WITHOUT LIMITATION, ANY AND ALL IMPLIED WARRANTIES OF * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE, OR NON-INFRINGEMENT. * WHISTLE COMMUNICATIONS DOES NOT WARRANT, GUARANTEE, OR MAKE ANY * REPRESENTATIONS REGARDING THE USE OF, OR THE RESULTS OF THE USE OF THIS * SOFTWARE IN TERMS OF ITS CORRECTNESS, ACCURACY, RELIABILITY OR OTHERWISE. * IN NO EVENT SHALL WHISTLE COMMUNICATIONS BE LIABLE FOR ANY DAMAGES * RESULTING FROM OR ARISING OUT OF ANY USE OF THIS SOFTWARE, INCLUDING * WITHOUT LIMITATION, ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, * PUNITIVE, OR CONSEQUENTIAL DAMAGES, PROCUREMENT OF SUBSTITUTE GOODS OR * SERVICES, LOSS OF USE, DATA OR PROFITS, HOWEVER CAUSED AND UNDER ANY * THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT * (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF * THIS SOFTWARE, EVEN IF WHISTLE COMMUNICATIONS IS ADVISED OF THE POSSIBILITY * OF SUCH DAMAGE. * * Author: Julian Elischer <julian@freebsd.org> * * $FreeBSD: release/9.1.0/sys/netgraph/ng_rfc1490.c 220768 2011-04-18 09:12:27Z glebius $ * $Whistle: ng_rfc1490.c,v 1.22 1999/11/01 09:24:52 julian Exp $ */ /* * This node does RFC 1490 multiplexing. * * NOTE: RFC 1490 is updated by RFC 2427. */ #include <sys/param.h> #include <sys/systm.h> #include <sys/errno.h> #include <sys/kernel.h> #include <sys/malloc.h> #include <sys/mbuf.h> #include <sys/errno.h> #include <sys/socket.h> #include <net/if.h> #include <netinet/in.h> #include <netinet/if_ether.h> #include <netgraph/ng_message.h> #include <netgraph/netgraph.h> #include <netgraph/ng_parse.h> #include <netgraph/ng_rfc1490.h> /* * DEFINITIONS */ /* Q.922 stuff -- see RFC 1490 */ #define HDLC_UI 0x03 #define NLPID_IP 0xCC #define NLPID_PPP 0xCF #define NLPID_SNAP 0x80 #define NLPID_Q933 0x08 #define NLPID_CLNP 0x81 #define NLPID_ESIS 0x82 #define NLPID_ISIS 0x83 #define ERROUT(x) do { error = (x); goto done; } while (0) /* Encapsulation methods we understand */ enum { NG_RFC1490_ENCAP_IETF_IP = 1, /* see RFC2427, chapter 7, table 1 */ NG_RFC1490_ENCAP_IETF_SNAP, /* see RFC2427, chapter 7, table 2 */ NG_RFC1490_ENCAP_CISCO, /* Cisco's proprietary encapsulation */ }; struct ng_rfc1490_encap_t { u_int8_t method; const char *name; }; static const struct ng_rfc1490_encap_t ng_rfc1490_encaps[] = { { NG_RFC1490_ENCAP_IETF_IP, "ietf-ip" }, { NG_RFC1490_ENCAP_IETF_SNAP, "ietf-snap" }, { NG_RFC1490_ENCAP_CISCO, "cisco" }, { 0, NULL}, }; /* Node private data */ struct ng_rfc1490_private { hook_p downlink; hook_p ppp; hook_p inet; hook_p ethernet; const struct ng_rfc1490_encap_t *enc; }; typedef struct ng_rfc1490_private *priv_p; /* Netgraph node methods */ static ng_constructor_t ng_rfc1490_constructor; static ng_rcvmsg_t ng_rfc1490_rcvmsg; static ng_shutdown_t ng_rfc1490_shutdown; static ng_newhook_t ng_rfc1490_newhook; static ng_rcvdata_t ng_rfc1490_rcvdata; static ng_disconnect_t ng_rfc1490_disconnect; /* List of commands and how to convert arguments to/from ASCII */ static const struct ng_cmdlist ng_rfc1490_cmds[] = { { NGM_RFC1490_COOKIE, NGM_RFC1490_SET_ENCAP, "setencap", &ng_parse_string_type, NULL }, { NGM_RFC1490_COOKIE, NGM_RFC1490_GET_ENCAP, "getencap", NULL, &ng_parse_string_type }, { 0 } }; /* Node type descriptor */ static struct ng_type typestruct = { .version = NG_ABI_VERSION, .name = NG_RFC1490_NODE_TYPE, .constructor = ng_rfc1490_constructor, .rcvmsg = ng_rfc1490_rcvmsg, .shutdown = ng_rfc1490_shutdown, .newhook = ng_rfc1490_newhook, .rcvdata = ng_rfc1490_rcvdata, .disconnect = ng_rfc1490_disconnect, .cmdlist = ng_rfc1490_cmds, }; NETGRAPH_INIT(rfc1490, &typestruct); /************************************************************************ NETGRAPH NODE STUFF ************************************************************************/ /* * Node constructor */ static int ng_rfc1490_constructor(node_p node) { priv_p priv; /* Allocate private structure */ priv = malloc(sizeof(*priv), M_NETGRAPH, M_WAITOK | M_ZERO); /* Initialize to default encapsulation method - ietf-ip */ priv->enc = ng_rfc1490_encaps; NG_NODE_SET_PRIVATE(node, priv); /* Done */ return (0); } /* * Give our ok for a hook to be added */ static int ng_rfc1490_newhook(node_p node, hook_p hook, const char *name) { const priv_p priv = NG_NODE_PRIVATE(node); if (!strcmp(name, NG_RFC1490_HOOK_DOWNSTREAM)) { if (priv->downlink) return (EISCONN); priv->downlink = hook; } else if (!strcmp(name, NG_RFC1490_HOOK_PPP)) { if (priv->ppp) return (EISCONN); priv->ppp = hook; } else if (!strcmp(name, NG_RFC1490_HOOK_INET)) { if (priv->inet) return (EISCONN); priv->inet = hook; } else if (!strcmp(name, NG_RFC1490_HOOK_ETHERNET)) { if (priv->ethernet) return (EISCONN); priv->ethernet = hook; } else return (EINVAL); return (0); } /* * Receive a control message. */ static int ng_rfc1490_rcvmsg(node_p node, item_p item, hook_p lasthook) { const priv_p priv = NG_NODE_PRIVATE(node); struct ng_mesg *msg; struct ng_mesg *resp = NULL; int error = 0; NGI_GET_MSG(item, msg); if (msg->header.typecookie == NGM_RFC1490_COOKIE) { switch (msg->header.cmd) { case NGM_RFC1490_SET_ENCAP: { const struct ng_rfc1490_encap_t *enc; char *s; size_t len; if (msg->header.arglen == 0) ERROUT(EINVAL); s = (char *)msg->data; len = msg->header.arglen - 1; /* Search for matching encapsulation method */ for (enc = ng_rfc1490_encaps; enc->method != 0; enc++ ) if ((strlen(enc->name) == len) && !strncmp(enc->name, s, len)) break; /* found */ if (enc->method != 0) priv->enc = enc; else error = EINVAL; break; } case NGM_RFC1490_GET_ENCAP: NG_MKRESPONSE(resp, msg, strlen(priv->enc->name) + 1, M_NOWAIT); if (resp == NULL) ERROUT(ENOMEM); strlcpy((char *)resp->data, priv->enc->name, strlen(priv->enc->name) + 1); break; default: error = EINVAL; break; } } else error = EINVAL; done: NG_RESPOND_MSG(error, node, item, resp); NG_FREE_MSG(msg); return (error); } /* * Receive data on a hook and encapsulate according to RFC 1490. * Only those nodes marked (*) are supported by this routine so far. * * Q.922 control * | * | * --------------------------------------------------------------------- * | 0x03 | | * UI I Frame Cisco * | | Encapsulation * --------------------------------- -------------- | * | 0x08 | 0x81 |0xCC |0xCF | 0x00 |..01.... |..10.... -------------- * | | | | | 0x80 | | |0x800 | * Q.933 CLNP IP(*) PPP(*) SNAP ISO 8208 ISO 8208 | | * | (rfc1973) | Modulo 8 Modulo 128 IP(*) Others * | | * -------------------- OUI * | | | * L2 ID L3 ID ------------------------- * | User |00-80-C2 |00-00-00 * | specified | | * | 0x70 PID Ethertype * | | | * ------------------- -----------------... ---------- * |0x51 |0x4E | |0x4C |0x7 |0xB | |0x806 | * | | | | | | | | | * 7776 Q.922 Others 802.2 802.3(*) 802.6 Others IP(*) Others * * */ #define MAX_ENCAPS_HDR 8 #define OUICMP(P,A,B,C) ((P)[0]==(A) && (P)[1]==(B) && (P)[2]==(C)) static int ng_rfc1490_rcvdata(hook_p hook, item_p item) { const node_p node = NG_HOOK_NODE(hook); const priv_p priv = NG_NODE_PRIVATE(node); int error = 0; struct mbuf *m; NGI_GET_M(item, m); if (hook == priv->downlink) { const u_char *start; const u_char *ptr; if (m->m_len < MAX_ENCAPS_HDR && !(m = m_pullup(m, MAX_ENCAPS_HDR))) ERROUT(ENOBUFS); ptr = start = mtod(m, const u_char *); if (priv->enc->method == NG_RFC1490_ENCAP_CISCO) goto switch_on_etype; /* Must be UI frame */ if (*ptr++ != HDLC_UI) ERROUT(0); /* Eat optional zero pad byte */ if (*ptr == 0x00) ptr++; /* Multiplex on NLPID */ switch (*ptr++) { case NLPID_SNAP: if (OUICMP(ptr, 0, 0, 0)) { /* It's an ethertype */ u_int16_t etype; ptr += 3; switch_on_etype: etype = ntohs(*((const u_int16_t *)ptr)); ptr += 2; m_adj(m, ptr - start); switch (etype) { case ETHERTYPE_IP: NG_FWD_NEW_DATA(error, item, priv->inet, m); break; case ETHERTYPE_ARP: case ETHERTYPE_REVARP: default: ERROUT(0); } } else if (OUICMP(ptr, 0x00, 0x80, 0xc2)) { /* 802.1 bridging */ ptr += 3; if (*ptr++ != 0x00) ERROUT(0); /* unknown PID octet 0 */ if (*ptr++ != 0x07) ERROUT(0); /* not FCS-less 802.3 */ m_adj(m, ptr - start); NG_FWD_NEW_DATA(error, item, priv->ethernet, m); } else /* Other weird stuff... */ ERROUT(0); break; case NLPID_IP: m_adj(m, ptr - start); NG_FWD_NEW_DATA(error, item, priv->inet, m); break; case NLPID_PPP: m_adj(m, ptr - start); NG_FWD_NEW_DATA(error, item, priv->ppp, m); break; case NLPID_Q933: case NLPID_CLNP: case NLPID_ESIS: case NLPID_ISIS: ERROUT(0); default: /* Try PPP (see RFC 1973) */ ptr--; /* NLPID becomes PPP proto */ if ((*ptr & 0x01) == 0x01) ERROUT(0); m_adj(m, ptr - start); NG_FWD_NEW_DATA(error, item, priv->ppp, m); break; } } else if (hook == priv->ppp) { M_PREPEND(m, 2, M_DONTWAIT); /* Prepend PPP NLPID */ if (!m) ERROUT(ENOBUFS); mtod(m, u_char *)[0] = HDLC_UI; mtod(m, u_char *)[1] = NLPID_PPP; NG_FWD_NEW_DATA(error, item, priv->downlink, m); } else if (hook == priv->inet) { switch (priv->enc->method) { case NG_RFC1490_ENCAP_IETF_IP: M_PREPEND(m, 2, M_DONTWAIT); /* Prepend IP NLPID */ if (!m) ERROUT(ENOBUFS); mtod(m, u_char *)[0] = HDLC_UI; mtod(m, u_char *)[1] = NLPID_IP; break; case NG_RFC1490_ENCAP_IETF_SNAP: /* * According to RFC2427 frame should begin with * HDLC_UI PAD NLIPID OUI PID * 03 00 80 00 00 00 08 00 */ M_PREPEND(m, 8, M_DONTWAIT); if (!m) ERROUT(ENOBUFS); mtod(m, u_char *)[0] = HDLC_UI; mtod(m, u_char *)[1] = 0x00; /* PAD */ mtod(m, u_char *)[2] = NLPID_SNAP; bzero((char *)(mtod(m, u_char *) + 3), 3); /* OUI 0-0-0 */ *((u_int16_t *)mtod(m, u_int16_t *) + 6/sizeof(u_int16_t)) = htons(ETHERTYPE_IP); /* PID */ break; case NG_RFC1490_ENCAP_CISCO: M_PREPEND(m, 2, M_DONTWAIT); /* Prepend IP ethertype */ if (!m) ERROUT(ENOBUFS); *((u_int16_t *)mtod(m, u_int16_t *)) = htons(ETHERTYPE_IP); break; } NG_FWD_NEW_DATA(error, item, priv->downlink, m); } else if (hook == priv->ethernet) { M_PREPEND(m, 8, M_DONTWAIT); /* Prepend NLPID, OUI, PID */ if (!m) ERROUT(ENOBUFS); mtod(m, u_char *)[0] = HDLC_UI; mtod(m, u_char *)[1] = 0x00; /* pad */ mtod(m, u_char *)[2] = NLPID_SNAP; mtod(m, u_char *)[3] = 0x00; /* OUI */ mtod(m, u_char *)[4] = 0x80; mtod(m, u_char *)[5] = 0xc2; mtod(m, u_char *)[6] = 0x00; /* PID */ mtod(m, u_char *)[7] = 0x07; NG_FWD_NEW_DATA(error, item, priv->downlink, m); } else panic("%s", __func__); done: if (item) NG_FREE_ITEM(item); NG_FREE_M(m); return (error); } /* * Nuke node */ static int ng_rfc1490_shutdown(node_p node) { const priv_p priv = NG_NODE_PRIVATE(node); /* Take down netgraph node */ bzero(priv, sizeof(*priv)); free(priv, M_NETGRAPH); NG_NODE_SET_PRIVATE(node, NULL); NG_NODE_UNREF(node); /* let the node escape */ return (0); } /* * Hook disconnection */ static int ng_rfc1490_disconnect(hook_p hook) { const priv_p priv = NG_NODE_PRIVATE(NG_HOOK_NODE(hook)); if ((NG_NODE_NUMHOOKS(NG_HOOK_NODE(hook)) == 0) && (NG_NODE_IS_VALID(NG_HOOK_NODE(hook)))) ng_rmnode_self(NG_HOOK_NODE(hook)); else if (hook == priv->downlink) priv->downlink = NULL; else if (hook == priv->inet) priv->inet = NULL; else if (hook == priv->ppp) priv->ppp = NULL; else if (hook == priv->ethernet) priv->ethernet = NULL; else panic("%s", __func__); return (0); }