]> git.saurik.com Git - apple/network_cmds.git/blame - rtadvd.tproj/config.c
network_cmds-543.260.3.tar.gz
[apple/network_cmds.git] / rtadvd.tproj / config.c
CommitLineData
fdfd5971 1/*
7af5ce03 2 * Copyright (c) 2009-2012 Apple Inc. All rights reserved.
fdfd5971
A
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28
7af5ce03 29/* $KAME: config.c,v 1.84 2003/08/05 12:34:23 itojun Exp $ */
7ba0088d
A
30
31/*
32 * Copyright (C) 1998 WIDE Project.
33 * All rights reserved.
34 *
35 * Redistribution and use in source and binary forms, with or without
36 * modification, are permitted provided that the following conditions
37 * are met:
38 * 1. Redistributions of source code must retain the above copyright
39 * notice, this list of conditions and the following disclaimer.
40 * 2. Redistributions in binary form must reproduce the above copyright
41 * notice, this list of conditions and the following disclaimer in the
42 * documentation and/or other materials provided with the distribution.
43 * 3. Neither the name of the project nor the names of its contributors
44 * may be used to endorse or promote products derived from this software
45 * without specific prior written permission.
46 *
47 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
48 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
49 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
50 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
51 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
52 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
53 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
54 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
55 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
56 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
57 * SUCH DAMAGE.
7ba0088d
A
58 */
59
60#include <sys/param.h>
61#include <sys/ioctl.h>
62#include <sys/socket.h>
63#include <sys/time.h>
64#include <sys/sysctl.h>
65
66#include <net/if.h>
7ba0088d 67#include <net/if_var.h>
7ba0088d
A
68#include <net/route.h>
69#include <net/if_dl.h>
70
71#include <netinet/in.h>
72#include <netinet/in_var.h>
73#include <netinet/ip6.h>
74#include <netinet6/ip6_var.h>
75#include <netinet/icmp6.h>
7af5ce03 76#include <netinet6/nd6.h>
7ba0088d
A
77
78#include <arpa/inet.h>
79
80#include <stdio.h>
81#include <syslog.h>
82#include <errno.h>
83#include <string.h>
7ba0088d 84#include <search.h>
7af5ce03 85#include <stdlib.h>
7ba0088d
A
86#include <unistd.h>
87#include <ifaddrs.h>
7af5ce03 88#include <stddef.h>
7ba0088d
A
89
90#include "rtadvd.h"
91#include "advcap.h"
92#include "timer.h"
93#include "if.h"
94#include "config.h"
95
7af5ce03
A
96static time_t prefix_timo = (60 * 120); /* 2 hours.
97 * XXX: should be configurable. */
7ba0088d
A
98extern struct rainfo *ralist;
99
7af5ce03
A
100static struct rtadvd_timer *prefix_timeout(void *);
101static void makeentry(char *, size_t, int, char *);
102static int getinet6sysctl(int);
103static int encode_domain(char *, u_char *);
104
7ba0088d 105void
7af5ce03
A
106getconfig(intface)
107 char *intface;
7ba0088d 108{
7af5ce03 109 int stat, i;
fdfd5971 110 int rdnss_length;
7af5ce03 111 int dnssl_length;
7ba0088d
A
112 char tbuf[BUFSIZ];
113 struct rainfo *tmp;
114 long val;
7af5ce03 115 int64_t val64;
7ba0088d
A
116 char buf[BUFSIZ];
117 char *bp = buf;
7af5ce03 118 char *addr, *flagstr;
7ba0088d
A
119 static int forwarding = -1;
120
121#define MUSTHAVE(var, cap) \
122 do { \
7af5ce03 123 int64_t t; \
7ba0088d
A
124 if ((t = agetnum(cap)) < 0) { \
125 fprintf(stderr, "rtadvd: need %s for interface %s\n", \
126 cap, intface); \
127 exit(1); \
128 } \
129 var = t; \
130 } while (0)
131#define MAYHAVE(var, cap, def) \
132 do { \
133 if ((var = agetnum(cap)) < 0) \
134 var = def; \
135 } while (0)
136
137 if ((stat = agetent(tbuf, intface)) <= 0) {
138 memset(tbuf, 0, sizeof(tbuf));
139 syslog(LOG_INFO,
140 "<%s> %s isn't defined in the configuration file"
141 " or the configuration file doesn't exist."
142 " Treat it as default",
7af5ce03 143 __func__, intface);
7ba0088d
A
144 }
145
146 tmp = (struct rainfo *)malloc(sizeof(*ralist));
7af5ce03
A
147 if (tmp == NULL) {
148 syslog(LOG_INFO, "<%s> %s: can't allocate enough memory",
149 __func__, intface);
150 exit(1);
151 }
7ba0088d
A
152 memset(tmp, 0, sizeof(*tmp));
153 tmp->prefix.next = tmp->prefix.prev = &tmp->prefix;
7af5ce03 154#ifdef ROUTEINFO
7ba0088d 155 tmp->route.next = tmp->route.prev = &tmp->route;
7af5ce03 156#endif
fdfd5971 157 tmp->rdnss_list.next = tmp->rdnss_list.prev = &tmp->rdnss_list;
7af5ce03 158 tmp->dnssl_list.next = tmp->dnssl_list.prev = &tmp->dnssl_list;
7ba0088d
A
159
160 /* check if we are allowed to forward packets (if not determined) */
161 if (forwarding < 0) {
162 if ((forwarding = getinet6sysctl(IPV6CTL_FORWARDING)) < 0)
163 exit(1);
164 }
165
166 /* get interface information */
167 if (agetflag("nolladdr"))
168 tmp->advlinkopt = 0;
169 else
170 tmp->advlinkopt = 1;
171 if (tmp->advlinkopt) {
172 if ((tmp->sdl = if_nametosdl(intface)) == NULL) {
173 syslog(LOG_ERR,
174 "<%s> can't get information of %s",
7af5ce03 175 __func__, intface);
7ba0088d
A
176 exit(1);
177 }
178 tmp->ifindex = tmp->sdl->sdl_index;
179 } else
180 tmp->ifindex = if_nametoindex(intface);
181 strncpy(tmp->ifname, intface, sizeof(tmp->ifname));
182 if ((tmp->phymtu = if_getmtu(intface)) == 0) {
183 tmp->phymtu = IPV6_MMTU;
184 syslog(LOG_WARNING,
185 "<%s> can't get interface mtu of %s. Treat as %d",
7af5ce03 186 __func__, intface, IPV6_MMTU);
7ba0088d
A
187 }
188
189 /*
190 * set router configuration variables.
191 */
192 MAYHAVE(val, "maxinterval", DEF_MAXRTRADVINTERVAL);
193 if (val < MIN_MAXINTERVAL || val > MAX_MAXINTERVAL) {
194 syslog(LOG_ERR,
7af5ce03
A
195 "<%s> maxinterval (%ld) on %s is invalid "
196 "(must be between %u and %u)", __func__, val,
197 intface, MIN_MAXINTERVAL, MAX_MAXINTERVAL);
7ba0088d
A
198 exit(1);
199 }
200 tmp->maxinterval = (u_int)val;
201 MAYHAVE(val, "mininterval", tmp->maxinterval/3);
202 if (val < MIN_MININTERVAL || val > (tmp->maxinterval * 3) / 4) {
203 syslog(LOG_ERR,
7af5ce03
A
204 "<%s> mininterval (%ld) on %s is invalid "
205 "(must be between %d and %d)",
206 __func__, val, intface, MIN_MININTERVAL,
7ba0088d
A
207 (tmp->maxinterval * 3) / 4);
208 exit(1);
209 }
210 tmp->mininterval = (u_int)val;
211
212 MAYHAVE(val, "chlim", DEF_ADVCURHOPLIMIT);
213 tmp->hoplimit = val & 0xff;
214
7af5ce03
A
215 if ((flagstr = (char *)agetstr("raflags", &bp))) {
216 val = 0;
217 if (strchr(flagstr, 'm'))
218 val |= ND_RA_FLAG_MANAGED;
219 if (strchr(flagstr, 'o'))
220 val |= ND_RA_FLAG_OTHER;
221 if (strchr(flagstr, 'h'))
222 val |= ND_RA_FLAG_RTPREF_HIGH;
223 if (strchr(flagstr, 'l')) {
224 if ((val & ND_RA_FLAG_RTPREF_HIGH)) {
225 syslog(LOG_ERR, "<%s> the \'h\' and \'l\'"
226 " router flags are exclusive", __func__);
227 exit(1);
228 }
229 val |= ND_RA_FLAG_RTPREF_LOW;
230 }
231 } else {
232 MAYHAVE(val, "raflags", 0);
233 }
7ba0088d
A
234 tmp->managedflg = val & ND_RA_FLAG_MANAGED;
235 tmp->otherflg = val & ND_RA_FLAG_OTHER;
7ba0088d
A
236#ifndef ND_RA_FLAG_RTPREF_MASK
237#define ND_RA_FLAG_RTPREF_MASK 0x18 /* 00011000 */
238#define ND_RA_FLAG_RTPREF_RSV 0x10 /* 00010000 */
239#endif
240 tmp->rtpref = val & ND_RA_FLAG_RTPREF_MASK;
241 if (tmp->rtpref == ND_RA_FLAG_RTPREF_RSV) {
7af5ce03
A
242 syslog(LOG_ERR, "<%s> invalid router preference (%02x) on %s",
243 __func__, tmp->rtpref, intface);
7ba0088d
A
244 exit(1);
245 }
246
247 MAYHAVE(val, "rltime", tmp->maxinterval * 3);
248 if (val && (val < tmp->maxinterval || val > MAXROUTERLIFETIME)) {
249 syslog(LOG_ERR,
7af5ce03
A
250 "<%s> router lifetime (%ld) on %s is invalid "
251 "(must be 0 or between %d and %d)",
252 __func__, val, intface,
253 tmp->maxinterval,
254 MAXROUTERLIFETIME);
7ba0088d
A
255 exit(1);
256 }
257 /*
258 * Basically, hosts MUST NOT send Router Advertisement messages at any
259 * time (RFC 2461, Section 6.2.3). However, it would sometimes be
260 * useful to allow hosts to advertise some parameters such as prefix
261 * information and link MTU. Thus, we allow hosts to invoke rtadvd
262 * only when router lifetime (on every advertising interface) is
263 * explicitly set zero. (see also the above section)
264 */
265 if (val && forwarding == 0) {
7af5ce03 266 syslog(LOG_ERR,
7ba0088d 267 "<%s> non zero router lifetime is specified for %s, "
7af5ce03
A
268 "which must not be allowed for hosts. you must "
269 "change router lifetime or enable IPv6 forwarding.",
270 __func__, intface);
7ba0088d
A
271 exit(1);
272 }
273 tmp->lifetime = val & 0xffff;
274
275 MAYHAVE(val, "rtime", DEF_ADVREACHABLETIME);
7af5ce03 276 if (val < 0 || val > MAXREACHABLETIME) {
7ba0088d 277 syslog(LOG_ERR,
7af5ce03
A
278 "<%s> reachable time (%ld) on %s is invalid "
279 "(must be no greater than %d)",
280 __func__, val, intface, MAXREACHABLETIME);
7ba0088d
A
281 exit(1);
282 }
283 tmp->reachabletime = (u_int32_t)val;
284
285 MAYHAVE(val64, "retrans", DEF_ADVRETRANSTIMER);
286 if (val64 < 0 || val64 > 0xffffffff) {
7af5ce03
A
287 syslog(LOG_ERR, "<%s> retrans time (%lld) on %s out of range",
288 __func__, (long long)val64, intface);
7ba0088d
A
289 exit(1);
290 }
291 tmp->retranstimer = (u_int32_t)val64;
292
7af5ce03 293 if (agetnum("hapref") != -1 || agetnum("hatime") != -1) {
7ba0088d
A
294 syslog(LOG_ERR,
295 "<%s> mobile-ip6 configuration not supported",
7af5ce03 296 __func__);
7ba0088d
A
297 exit(1);
298 }
7ba0088d
A
299 /* prefix information */
300
301 /*
7af5ce03 302 * This is an implementation specific parameter to consider
7ba0088d
A
303 * link propagation delays and poorly synchronized clocks when
304 * checking consistency of advertised lifetimes.
305 */
306 MAYHAVE(val, "clockskew", 0);
307 tmp->clockskew = val;
308
7af5ce03
A
309 tmp->pfxs = 0;
310 for (i = -1; i < MAXPREFIX; i++) {
311 struct prefix *pfx;
312 char entbuf[256];
313
314 makeentry(entbuf, sizeof(entbuf), i, "addr");
315 addr = (char *)agetstr(entbuf, &bp);
316 if (addr == NULL)
317 continue;
318
319 /* allocate memory to store prefix information */
320 if ((pfx = malloc(sizeof(struct prefix))) == NULL) {
7ba0088d 321 syslog(LOG_ERR,
7af5ce03
A
322 "<%s> can't allocate enough memory",
323 __func__);
7ba0088d
A
324 exit(1);
325 }
7af5ce03 326 memset(pfx, 0, sizeof(*pfx));
7ba0088d 327
7af5ce03
A
328 /* link into chain */
329 insque(pfx, &tmp->prefix);
330 tmp->pfxs++;
331 pfx->rainfo = tmp;
7ba0088d 332
7af5ce03 333 pfx->origin = PREFIX_FROM_CONFIG;
7ba0088d 334
7af5ce03
A
335 if (inet_pton(AF_INET6, addr, &pfx->prefix) != 1) {
336 syslog(LOG_ERR,
337 "<%s> inet_pton failed for %s",
338 __func__, addr);
339 exit(1);
340 }
341 if (IN6_IS_ADDR_MULTICAST(&pfx->prefix)) {
342 syslog(LOG_ERR,
343 "<%s> multicast prefix (%s) must "
344 "not be advertised on %s",
345 __func__, addr, intface);
346 exit(1);
347 }
348 if (IN6_IS_ADDR_LINKLOCAL(&pfx->prefix))
349 syslog(LOG_NOTICE,
350 "<%s> link-local prefix (%s) will be"
351 " advertised on %s",
352 __func__, addr, intface);
7ba0088d 353
7af5ce03
A
354 makeentry(entbuf, sizeof(entbuf), i, "prefixlen");
355 MAYHAVE(val, entbuf, 64);
356 if (val < 0 || val > 128) {
357 syslog(LOG_ERR, "<%s> prefixlen (%ld) for %s "
358 "on %s out of range",
359 __func__, val, addr, intface);
360 exit(1);
361 }
362 pfx->prefixlen = (int)val;
363
364 makeentry(entbuf, sizeof(entbuf), i, "pinfoflags");
365 if ((flagstr = (char *)agetstr(entbuf, &bp))) {
366 val = 0;
367 if (strchr(flagstr, 'l'))
368 val |= ND_OPT_PI_FLAG_ONLINK;
369 if (strchr(flagstr, 'a'))
370 val |= ND_OPT_PI_FLAG_AUTO;
371 } else {
372 MAYHAVE(val, entbuf,
373 (ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO));
374 }
375 pfx->onlinkflg = val & ND_OPT_PI_FLAG_ONLINK;
376 pfx->autoconfflg = val & ND_OPT_PI_FLAG_AUTO;
7ba0088d 377
7af5ce03
A
378 makeentry(entbuf, sizeof(entbuf), i, "vltime");
379 MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME);
380 if (val64 < 0 || val64 > 0xffffffff) {
381 syslog(LOG_ERR, "<%s> vltime (%lld) for "
382 "%s/%d on %s is out of range",
383 __func__, (long long)val64,
384 addr, pfx->prefixlen, intface);
385 exit(1);
386 }
387 pfx->validlifetime = (u_int32_t)val64;
388
389 makeentry(entbuf, sizeof(entbuf), i, "vltimedecr");
390 if (agetflag(entbuf)) {
391 struct timeval now;
392 gettimeofday(&now, 0);
393 pfx->vltimeexpire =
394 now.tv_sec + pfx->validlifetime;
395 }
7ba0088d 396
7af5ce03
A
397 makeentry(entbuf, sizeof(entbuf), i, "pltime");
398 MAYHAVE(val64, entbuf, DEF_ADVPREFERREDLIFETIME);
399 if (val64 < 0 || val64 > 0xffffffff) {
400 syslog(LOG_ERR,
401 "<%s> pltime (%lld) for %s/%d on %s "
402 "is out of range",
403 __func__, (long long)val64,
404 addr, pfx->prefixlen, intface);
405 exit(1);
406 }
407 pfx->preflifetime = (u_int32_t)val64;
408
409 makeentry(entbuf, sizeof(entbuf), i, "pltimedecr");
410 if (agetflag(entbuf)) {
411 struct timeval now;
412 gettimeofday(&now, 0);
413 pfx->pltimeexpire =
414 now.tv_sec + pfx->preflifetime;
7ba0088d
A
415 }
416 }
7af5ce03
A
417 if (tmp->pfxs == 0)
418 get_prefix(tmp);
7ba0088d
A
419
420 MAYHAVE(val, "mtu", 0);
421 if (val < 0 || val > 0xffffffff) {
422 syslog(LOG_ERR,
7af5ce03
A
423 "<%s> mtu (%ld) on %s out of range",
424 __func__, val, intface);
7ba0088d
A
425 exit(1);
426 }
427 tmp->linkmtu = (u_int32_t)val;
428 if (tmp->linkmtu == 0) {
429 char *mtustr;
430
431 if ((mtustr = (char *)agetstr("mtu", &bp)) &&
432 strcmp(mtustr, "auto") == 0)
433 tmp->linkmtu = tmp->phymtu;
434 }
435 else if (tmp->linkmtu < IPV6_MMTU || tmp->linkmtu > tmp->phymtu) {
436 syslog(LOG_ERR,
7af5ce03
A
437 "<%s> advertised link mtu (%lu) on %s is invalid (must "
438 "be between least MTU (%d) and physical link MTU (%d)",
439 __func__, (unsigned long)tmp->linkmtu, intface,
440 IPV6_MMTU, tmp->phymtu);
7ba0088d
A
441 exit(1);
442 }
443
7af5ce03
A
444#ifdef SIOCSIFINFO_IN6
445 {
446 struct in6_ndireq ndi;
447 int s;
7ba0088d 448
7af5ce03
A
449 if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
450 syslog(LOG_ERR, "<%s> socket: %s", __func__,
451 strerror(errno));
452 exit(1);
453 }
454 memset(&ndi, 0, sizeof(ndi));
455 strncpy(ndi.ifname, intface, IFNAMSIZ);
456 if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&ndi) < 0) {
457 syslog(LOG_INFO, "<%s> ioctl:SIOCGIFINFO_IN6 at %s: %s",
458 __func__, intface, strerror(errno));
459 }
460
461 /* reflect the RA info to the host variables in kernel */
462 ndi.ndi.chlim = tmp->hoplimit;
463 ndi.ndi.retrans = tmp->retranstimer;
464 ndi.ndi.basereachable = tmp->reachabletime;
465 if (ioctl(s, SIOCSIFINFO_IN6, (caddr_t)&ndi) < 0) {
466 syslog(LOG_INFO, "<%s> ioctl:SIOCSIFINFO_IN6 at %s: %s",
467 __func__, intface, strerror(errno));
468 }
469 close(s);
7ba0088d 470 }
7af5ce03
A
471#endif
472
473 /* route information */
474#ifdef ROUTEINFO
475 tmp->routes = 0;
476 for (i = -1; i < MAXROUTE; i++) {
7ba0088d 477 struct rtinfo *rti;
7af5ce03
A
478 char entbuf[256], oentbuf[256];
479
480 makeentry(entbuf, sizeof(entbuf), i, "rtprefix");
481 addr = (char *)agetstr(entbuf, &bp);
482 if (addr == NULL) {
483 makeentry(oentbuf, sizeof(oentbuf), i, "rtrprefix");
484 addr = (char *)agetstr(oentbuf, &bp);
485 if (addr) {
486 fprintf(stderr, "%s was obsoleted. Use %s.\n",
487 oentbuf, entbuf);
488 }
489 }
490 if (addr == NULL)
491 continue;
7ba0088d
A
492
493 /* allocate memory to store prefix information */
494 if ((rti = malloc(sizeof(struct rtinfo))) == NULL) {
495 syslog(LOG_ERR,
496 "<%s> can't allocate enough memory",
7af5ce03 497 __func__);
7ba0088d
A
498 exit(1);
499 }
500 memset(rti, 0, sizeof(*rti));
501
502 /* link into chain */
503 insque(rti, &tmp->route);
7af5ce03 504 tmp->routes++;
7ba0088d 505
7ba0088d 506 if (inet_pton(AF_INET6, addr, &rti->prefix) != 1) {
7af5ce03
A
507 syslog(LOG_ERR, "<%s> inet_pton failed for %s",
508 __func__, addr);
7ba0088d
A
509 exit(1);
510 }
511#if 0
512 /*
513 * XXX: currently there's no restriction in route information
7af5ce03
A
514 * prefix according to
515 * draft-ietf-ipngwg-router-selection-00.txt.
516 * However, I think the similar restriction be necessary.
7ba0088d
A
517 */
518 MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME);
519 if (IN6_IS_ADDR_MULTICAST(&rti->prefix)) {
520 syslog(LOG_ERR,
521 "<%s> multicast route (%s) must "
7af5ce03
A
522 "not be advertised on %s",
523 __func__, addr, intface);
7ba0088d
A
524 exit(1);
525 }
526 if (IN6_IS_ADDR_LINKLOCAL(&rti->prefix)) {
527 syslog(LOG_NOTICE,
7af5ce03
A
528 "<%s> link-local route (%s) will "
529 "be advertised on %s",
530 __func__, addr, intface);
7ba0088d
A
531 exit(1);
532 }
533#endif
7af5ce03
A
534
535 makeentry(entbuf, sizeof(entbuf), i, "rtplen");
536 /* XXX: 256 is a magic number for compatibility check. */
537 MAYHAVE(val, entbuf, 256);
538 if (val == 256) {
539 makeentry(oentbuf, sizeof(oentbuf), i, "rtrplen");
540 MAYHAVE(val, oentbuf, 256);
541 if (val != 256) {
542 fprintf(stderr, "%s was obsoleted. Use %s.\n",
543 oentbuf, entbuf);
544 } else
545 val = 64;
546 }
547 if (val < 0 || val > 128) {
548 syslog(LOG_ERR, "<%s> prefixlen (%ld) for %s on %s "
549 "out of range",
550 __func__, val, addr, intface);
551 exit(1);
552 }
553 rti->prefixlen = (int)val;
554
555 makeentry(entbuf, sizeof(entbuf), i, "rtflags");
556 if ((flagstr = (char *)agetstr(entbuf, &bp))) {
557 val = 0;
558 if (strchr(flagstr, 'h'))
559 val |= ND_RA_FLAG_RTPREF_HIGH;
560 if (strchr(flagstr, 'l')) {
561 if ((val & ND_RA_FLAG_RTPREF_HIGH)) {
562 syslog(LOG_ERR,
563 "<%s> the \'h\' and \'l\' route"
564 " preferences are exclusive",
565 __func__);
566 exit(1);
567 }
568 val |= ND_RA_FLAG_RTPREF_LOW;
569 }
570 } else
571 MAYHAVE(val, entbuf, 256); /* XXX */
572 if (val == 256) {
573 makeentry(oentbuf, sizeof(oentbuf), i, "rtrflags");
574 MAYHAVE(val, oentbuf, 256);
575 if (val != 256) {
576 fprintf(stderr, "%s was obsoleted. Use %s.\n",
577 oentbuf, entbuf);
578 } else
579 val = 0;
580 }
581 rti->rtpref = val & ND_RA_FLAG_RTPREF_MASK;
582 if (rti->rtpref == ND_RA_FLAG_RTPREF_RSV) {
583 syslog(LOG_ERR, "<%s> invalid route preference (%02x) "
584 "for %s/%d on %s",
585 __func__, rti->rtpref, addr,
586 rti->prefixlen, intface);
587 exit(1);
588 }
589
590 /*
591 * Since the spec does not a default value, we should make
592 * this entry mandatory. However, FreeBSD 4.4 has shipped
593 * with this field being optional, we use the router lifetime
594 * as an ad-hoc default value with a warning message.
595 */
596 makeentry(entbuf, sizeof(entbuf), i, "rtltime");
597 MAYHAVE(val64, entbuf, -1);
598 if (val64 == -1) {
599 makeentry(oentbuf, sizeof(oentbuf), i, "rtrltime");
600 MAYHAVE(val64, oentbuf, -1);
601 if (val64 != -1) {
602 fprintf(stderr, "%s was obsoleted. Use %s.\n",
603 oentbuf, entbuf);
604 } else {
605 fprintf(stderr, "%s should be specified "
606 "for interface %s.\n",
607 entbuf, intface);
608 val64 = tmp->lifetime;
609 }
610 }
611 if (val64 < 0 || val64 > 0xffffffff) {
612 syslog(LOG_ERR, "<%s> route lifetime (%lld) for "
613 "%s/%d on %s out of range", __func__,
614 (long long)val64, addr, rti->prefixlen, intface);
615 exit(1);
616 }
617 rti->ltime = (u_int32_t)val64;
7ba0088d 618 }
7af5ce03 619#endif
7ba0088d 620
fdfd5971
A
621 /* RDNSS option (RFC5006) */
622 MAYHAVE(val, "rdnsslifetime", 2 * tmp->maxinterval);
623 if (val < tmp->maxinterval || val > (2 * tmp->maxinterval)) {
624 syslog(LOG_NOTICE,
625 "<%s> rdnsslifetime (%lu) on %s SHOULD "
7af5ce03 626 "be between %u and %u", __func__, val,
fdfd5971
A
627 intface, tmp->maxinterval, 2 * tmp->maxinterval);
628 }
629 tmp->rdnss_lifetime = val;
630 if ((rdnss_length = agetnum("rdnssaddrs")) < 0) {
631 tmp->rdnss_length = 0;
632 }
633 else {
634 tmp->rdnss_length = rdnss_length;
635
636 /* traverse in reverse order so that the queue has correct order */
637 for (i = (rdnss_length - 1); i >= 0; i--) {
638 struct rdnss *rdnss;
639 char entbuf[256];
fdfd5971
A
640
641 /* allocate memory to store server address information */
642 if ((rdnss = malloc(sizeof(struct rdnss))) == NULL) {
643 syslog(LOG_ERR,
644 "<%s> can't allocate enough memory",
7af5ce03 645 __func__);
fdfd5971
A
646 exit(1);
647 }
648 memset(rdnss, 0, sizeof(*rdnss));
649
650 /* link into chain */
651 insque(rdnss, &tmp->rdnss_list);
652
7af5ce03 653 makeentry(entbuf, sizeof(entbuf), i, "rdnssaddr");
fdfd5971 654 addr = (char *)agetstr(entbuf, &bp);
7af5ce03
A
655
656 if (addr == NULL && rdnss_length == 1) {
657 makeentry(entbuf, sizeof(entbuf), -1, "rdnssaddr");
658 addr = agetstr(entbuf, &bp);
659 }
660
fdfd5971
A
661 if (addr == NULL) {
662 syslog(LOG_ERR,
663 "<%s> need %s as a DNS server address for "
664 "interface %s",
7af5ce03 665 __func__, entbuf, intface);
fdfd5971
A
666 exit(1);
667 }
668
669 if (inet_pton(AF_INET6, addr, &rdnss->addr) != 1) {
670 syslog(LOG_ERR,
671 "<%s> inet_pton failed for %s",
7af5ce03 672 __func__, addr);
fdfd5971
A
673 exit(1);
674 }
675 if (IN6_IS_ADDR_MULTICAST(&rdnss->addr)) {
676 syslog(LOG_ERR,
677 "<%s> multicast address (%s) must "
678 "not be advertised as recursive DNS server",
7af5ce03 679 __func__, addr);
fdfd5971
A
680 exit(1);
681 }
682 }
683 }
684
7af5ce03
A
685 /* DNSSL option (RFC6106) */
686
687 /* Parse the DNSSL lifetime from the config */
688 MAYHAVE(val, "dnssllifetime", 2 * tmp->maxinterval);
689 if (val < tmp->maxinterval || val > (2 * tmp->maxinterval)) {
690 syslog(LOG_NOTICE,
691 "<%s> dnssllifetime (%lu) on %s SHOULD "
692 "be between %u and %u", __func__, val,
693 intface, tmp->maxinterval, 2 * tmp->maxinterval);
694 }
695 tmp->dnssl_lifetime = val;
696 tmp->dnssl_option_length = 8; /* 8 bytes for the option header */
697
698 /* Parse the DNSSL domain list from the config */
699 if ((dnssl_length = agetnum("dnssldomains")) < 0) {
700 tmp->dnssl_length = 0;
701 } else {
702 tmp->dnssl_length = dnssl_length;
703
704 for (i = (tmp->dnssl_length - 1); i >= 0; i--) {
705 unsigned char *dnssl_buf;
706 struct dnssl *dnssl;
707 int dnssl_len;
708 char entbuf[sizeof("dnssldomain") + 20];
709 char *domain;
710 int domain_len;
711
712 makeentry(entbuf, sizeof(entbuf), i, "dnssldomain");
713 domain = agetstr(entbuf, &bp);
714
715 if (domain == NULL && tmp->dnssl_length == 1) {
716 makeentry(entbuf, sizeof(entbuf), -1, "dnssldomain");
717 domain = agetstr(entbuf, &bp);
718 }
719
720 if (domain == NULL) {
721 syslog(LOG_ERR,
722 "<%s> need %s as a DNS search domain for "
723 "interface %s",
724 __func__, entbuf, intface);
725 exit(1);
726 }
727
728 domain_len = strlen(domain);
729
730 /* Trim off leading dots */
731 while (domain_len > 0 && domain[0] == '.') {
732 domain++;
733 domain_len--;
734 }
735
736 /* Trim off trailing dots */
737 while (domain_len > 0 && domain[domain_len-1] == '.') {
738 domain_len--;
739 }
740
741 if (domain_len > 0) {
742 dnssl_len = sizeof(struct dnssl) + domain_len + 1;
743 dnssl_buf = (unsigned char *)malloc(dnssl_len);
744
745 memset(dnssl_buf, 0, dnssl_len);
746
747 dnssl = (struct dnssl *)dnssl_buf;
748 insque(dnssl, &tmp->dnssl_list);
749
750 /* Copy the domain name in at the end of the dnssl struct */
751 memcpy(dnssl_buf + offsetof(struct dnssl, domain), domain,
752 domain_len);
753
754 /* Add 2 for leading length byte and the trailing 0 byte */
755 tmp->dnssl_option_length += domain_len + 2;
756 }
757 }
758
759 /* Round up to the next multiple of 8 */
760 tmp->dnssl_option_length += (8 - (tmp->dnssl_option_length & 0x7));
761 }
762
7ba0088d
A
763 /* okey */
764 tmp->next = ralist;
765 ralist = tmp;
766
767 /* construct the sending packet */
768 make_packet(tmp);
769
770 /* set timer */
771 tmp->timer = rtadvd_add_timer(ra_timeout, ra_timer_update,
772 tmp, tmp);
773 ra_timer_update((void *)tmp, &tmp->timer->tm);
774 rtadvd_set_timer(&tmp->timer->tm, tmp->timer);
775}
776
7af5ce03 777void
7ba0088d
A
778get_prefix(struct rainfo *rai)
779{
780 struct ifaddrs *ifap, *ifa;
781 struct prefix *pp;
782 struct in6_addr *a;
783 u_char *p, *ep, *m, *lim;
7af5ce03 784 char ntopbuf[INET6_ADDRSTRLEN];
7ba0088d
A
785
786 if (getifaddrs(&ifap) < 0) {
787 syslog(LOG_ERR,
788 "<%s> can't get interface addresses",
7af5ce03 789 __func__);
7ba0088d
A
790 exit(1);
791 }
7af5ce03 792
7ba0088d 793 for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
7af5ce03
A
794 int plen;
795
7ba0088d
A
796 if (strcmp(ifa->ifa_name, rai->ifname) != 0)
797 continue;
798 if (ifa->ifa_addr->sa_family != AF_INET6)
799 continue;
800 a = &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr;
801 if (IN6_IS_ADDR_LINKLOCAL(a))
802 continue;
7af5ce03
A
803 /* get prefix length */
804 m = (u_char *)&((struct sockaddr_in6 *)ifa->ifa_netmask)->sin6_addr;
805 lim = (u_char *)(ifa->ifa_netmask) + ifa->ifa_netmask->sa_len;
806 plen = prefixlen(m, lim);
807 if (plen <= 0 || plen > 128) {
808 syslog(LOG_ERR, "<%s> failed to get prefixlen "
809 "or prefix is invalid",
810 __func__);
811 exit(1);
812 }
813 if (plen == 128) /* XXX */
814 continue;
815 if (find_prefix(rai, a, plen)) {
816 /* ignore a duplicated prefix. */
817 continue;
818 }
7ba0088d
A
819
820 /* allocate memory to store prefix info. */
821 if ((pp = malloc(sizeof(*pp))) == NULL) {
822 syslog(LOG_ERR,
823 "<%s> can't get allocate buffer for prefix",
7af5ce03 824 __func__);
7ba0088d
A
825 exit(1);
826 }
827 memset(pp, 0, sizeof(*pp));
828
7ba0088d 829 /* set prefix, sweep bits outside of prefixlen */
7af5ce03 830 pp->prefixlen = plen;
7ba0088d
A
831 memcpy(&pp->prefix, a, sizeof(*a));
832 p = (u_char *)&pp->prefix;
833 ep = (u_char *)(&pp->prefix + 1);
7af5ce03 834 while (m < lim && p < ep)
7ba0088d
A
835 *p++ &= *m++;
836 while (p < ep)
837 *p++ = 0x00;
7af5ce03 838 if (!inet_ntop(AF_INET6, &pp->prefix, ntopbuf,
7ba0088d 839 sizeof(ntopbuf))) {
7af5ce03 840 syslog(LOG_ERR, "<%s> inet_ntop failed", __func__);
7ba0088d
A
841 exit(1);
842 }
843 syslog(LOG_DEBUG,
844 "<%s> add %s/%d to prefix list on %s",
7af5ce03 845 __func__, ntopbuf, pp->prefixlen, rai->ifname);
7ba0088d
A
846
847 /* set other fields with protocol defaults */
848 pp->validlifetime = DEF_ADVVALIDLIFETIME;
849 pp->preflifetime = DEF_ADVPREFERREDLIFETIME;
850 pp->onlinkflg = 1;
851 pp->autoconfflg = 1;
852 pp->origin = PREFIX_FROM_KERNEL;
7af5ce03 853 pp->rainfo = rai;
7ba0088d
A
854
855 /* link into chain */
856 insque(pp, &rai->prefix);
857
858 /* counter increment */
859 rai->pfxs++;
860 }
861
862 freeifaddrs(ifap);
863}
864
865static void
7af5ce03
A
866makeentry(buf, len, id, string)
867 char *buf;
868 size_t len;
869 int id;
870 char *string;
7ba0088d 871{
7ba0088d 872
7af5ce03
A
873 if (id < 0)
874 strlcpy(buf, string, len);
875 else
876 snprintf(buf, len, "%s%d", string, id);
7ba0088d
A
877}
878
879/*
880 * Add a prefix to the list of specified interface and reconstruct
881 * the outgoing packet.
882 * The prefix must not be in the list.
7af5ce03 883 * XXX: other parameters of the prefix (e.g. lifetime) should be
7ba0088d
A
884 * able to be specified.
885 */
886static void
887add_prefix(struct rainfo *rai, struct in6_prefixreq *ipr)
888{
889 struct prefix *prefix;
7af5ce03 890 char ntopbuf[INET6_ADDRSTRLEN];
7ba0088d
A
891
892 if ((prefix = malloc(sizeof(*prefix))) == NULL) {
893 syslog(LOG_ERR, "<%s> memory allocation failed",
7af5ce03 894 __func__);
7ba0088d
A
895 return; /* XXX: error or exit? */
896 }
897 memset(prefix, 0, sizeof(*prefix));
898 prefix->prefix = ipr->ipr_prefix.sin6_addr;
899 prefix->prefixlen = ipr->ipr_plen;
900 prefix->validlifetime = ipr->ipr_vltime;
901 prefix->preflifetime = ipr->ipr_pltime;
902 prefix->onlinkflg = ipr->ipr_raf_onlink;
903 prefix->autoconfflg = ipr->ipr_raf_auto;
904 prefix->origin = PREFIX_FROM_DYNAMIC;
905
906 insque(prefix, &rai->prefix);
7af5ce03 907 prefix->rainfo = rai;
7ba0088d
A
908
909 syslog(LOG_DEBUG, "<%s> new prefix %s/%d was added on %s",
7af5ce03
A
910 __func__, inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr,
911 ntopbuf, INET6_ADDRSTRLEN),
7ba0088d
A
912 ipr->ipr_plen, rai->ifname);
913
914 /* free the previous packet */
915 free(rai->ra_data);
916 rai->ra_data = NULL;
917
918 /* reconstruct the packet */
919 rai->pfxs++;
920 make_packet(rai);
7ba0088d
A
921}
922
923/*
924 * Delete a prefix to the list of specified interface and reconstruct
925 * the outgoing packet.
926 * The prefix must be in the list.
927 */
928void
7af5ce03 929delete_prefix(struct prefix *prefix)
7ba0088d 930{
7af5ce03
A
931 char ntopbuf[INET6_ADDRSTRLEN];
932 struct rainfo *rai = prefix->rainfo;
7ba0088d
A
933
934 remque(prefix);
935 syslog(LOG_DEBUG, "<%s> prefix %s/%d was deleted on %s",
7af5ce03
A
936 __func__, inet_ntop(AF_INET6, &prefix->prefix,
937 ntopbuf, INET6_ADDRSTRLEN),
7ba0088d 938 prefix->prefixlen, rai->ifname);
7af5ce03
A
939 if (prefix->timer)
940 rtadvd_remove_timer(&prefix->timer);
7ba0088d
A
941 free(prefix);
942 rai->pfxs--;
7af5ce03
A
943}
944
945void
946invalidate_prefix(struct prefix *prefix)
947{
948 char ntopbuf[INET6_ADDRSTRLEN];
949 struct timeval timo;
950 struct rainfo *rai = prefix->rainfo;
951
952 if (prefix->timer) { /* sanity check */
953 syslog(LOG_ERR,
954 "<%s> assumption failure: timer already exists",
955 __func__);
956 exit(1);
957 }
958
959 syslog(LOG_DEBUG, "<%s> prefix %s/%d was invalidated on %s, "
960 "will expire in %ld seconds", __func__,
961 inet_ntop(AF_INET6, &prefix->prefix, ntopbuf, INET6_ADDRSTRLEN),
962 prefix->prefixlen, rai->ifname, (long)prefix_timo);
963
964 /* set the expiration timer */
965 prefix->timer = rtadvd_add_timer(prefix_timeout, NULL, prefix, NULL);
966 if (prefix->timer == NULL) {
967 syslog(LOG_ERR, "<%s> failed to add a timer for a prefix. "
968 "remove the prefix", __func__);
969 delete_prefix(prefix);
89c4ed63 970 return;
7af5ce03
A
971 }
972 timo.tv_sec = prefix_timo;
973 timo.tv_usec = 0;
974 rtadvd_set_timer(&timo, prefix->timer);
975}
976
977static struct rtadvd_timer *
978prefix_timeout(void *arg)
979{
980 struct prefix *prefix = (struct prefix *)arg;
981
982 delete_prefix(prefix);
983
984 return(NULL);
985}
986
987void
988update_prefix(struct prefix * prefix)
989{
990 char ntopbuf[INET6_ADDRSTRLEN];
991 struct rainfo *rai = prefix->rainfo;
992
993 if (prefix->timer == NULL) { /* sanity check */
994 syslog(LOG_ERR,
995 "<%s> assumption failure: timer does not exist",
996 __func__);
997 exit(1);
998 }
999
1000 syslog(LOG_DEBUG, "<%s> prefix %s/%d was re-enabled on %s",
1001 __func__, inet_ntop(AF_INET6, &prefix->prefix, ntopbuf,
1002 INET6_ADDRSTRLEN), prefix->prefixlen, rai->ifname);
1003
1004 /* stop the expiration timer */
1005 rtadvd_remove_timer(&prefix->timer);
7ba0088d
A
1006}
1007
1008/*
1009 * Try to get an in6_prefixreq contents for a prefix which matches
1010 * ipr->ipr_prefix and ipr->ipr_plen and belongs to
1011 * the interface whose name is ipr->ipr_name[].
1012 */
1013static int
1014init_prefix(struct in6_prefixreq *ipr)
1015{
7af5ce03 1016#if 0
7ba0088d
A
1017 int s;
1018
1019 if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
7af5ce03 1020 syslog(LOG_ERR, "<%s> socket: %s", __func__,
7ba0088d
A
1021 strerror(errno));
1022 exit(1);
1023 }
1024
1025 if (ioctl(s, SIOCGIFPREFIX_IN6, (caddr_t)ipr) < 0) {
7af5ce03 1026 syslog(LOG_INFO, "<%s> ioctl:SIOCGIFPREFIX %s", __func__,
7ba0088d
A
1027 strerror(errno));
1028
1029 ipr->ipr_vltime = DEF_ADVVALIDLIFETIME;
1030 ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME;
1031 ipr->ipr_raf_onlink = 1;
1032 ipr->ipr_raf_auto = 1;
1033 /* omit other field initialization */
1034 }
1035 else if (ipr->ipr_origin < PR_ORIG_RR) {
7af5ce03 1036 char ntopbuf[INET6_ADDRSTRLEN];
7ba0088d
A
1037
1038 syslog(LOG_WARNING, "<%s> Added prefix(%s)'s origin %d is"
1039 "lower than PR_ORIG_RR(router renumbering)."
7af5ce03
A
1040 "This should not happen if I am router", __func__,
1041 inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf,
7ba0088d
A
1042 sizeof(ntopbuf)), ipr->ipr_origin);
1043 close(s);
1044 return 1;
1045 }
1046
1047 close(s);
1048 return 0;
7af5ce03
A
1049#else
1050 ipr->ipr_vltime = DEF_ADVVALIDLIFETIME;
1051 ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME;
1052 ipr->ipr_raf_onlink = 1;
1053 ipr->ipr_raf_auto = 1;
1054 return 0;
1055#endif
7ba0088d
A
1056}
1057
1058void
1059make_prefix(struct rainfo *rai, int ifindex, struct in6_addr *addr, int plen)
1060{
1061 struct in6_prefixreq ipr;
1062
1063 memset(&ipr, 0, sizeof(ipr));
1064 if (if_indextoname(ifindex, ipr.ipr_name) == NULL) {
1065 syslog(LOG_ERR, "<%s> Prefix added interface No.%d doesn't"
7af5ce03 1066 "exist. This should not happen! %s", __func__,
7ba0088d
A
1067 ifindex, strerror(errno));
1068 exit(1);
1069 }
1070 ipr.ipr_prefix.sin6_len = sizeof(ipr.ipr_prefix);
1071 ipr.ipr_prefix.sin6_family = AF_INET6;
1072 ipr.ipr_prefix.sin6_addr = *addr;
1073 ipr.ipr_plen = plen;
1074
1075 if (init_prefix(&ipr))
1076 return; /* init failed by some error */
1077 add_prefix(rai, &ipr);
1078}
1079
1080void
1081make_packet(struct rainfo *rainfo)
1082{
1083 size_t packlen, lladdroptlen = 0;
7af5ce03 1084 u_char *buf;
7ba0088d
A
1085 struct nd_router_advert *ra;
1086 struct nd_opt_prefix_info *ndopt_pi;
1087 struct nd_opt_mtu *ndopt_mtu;
7af5ce03 1088#ifdef ROUTEINFO
7ba0088d 1089 struct nd_opt_route_info *ndopt_rti;
7ba0088d 1090 struct rtinfo *rti;
7af5ce03
A
1091#endif
1092 struct prefix *pfx;
7ba0088d
A
1093
1094 /* calculate total length */
1095 packlen = sizeof(struct nd_router_advert);
1096 if (rainfo->advlinkopt) {
1097 if ((lladdroptlen = lladdropt_length(rainfo->sdl)) == 0) {
1098 syslog(LOG_INFO,
1099 "<%s> link-layer address option has"
7af5ce03
A
1100 " null length on %s. Treat as not included.",
1101 __func__, rainfo->ifname);
7ba0088d
A
1102 rainfo->advlinkopt = 0;
1103 }
1104 packlen += lladdroptlen;
1105 }
1106 if (rainfo->pfxs)
1107 packlen += sizeof(struct nd_opt_prefix_info) * rainfo->pfxs;
1108 if (rainfo->linkmtu)
1109 packlen += sizeof(struct nd_opt_mtu);
7af5ce03 1110#ifdef ROUTEINFO
7ba0088d
A
1111 for (rti = rainfo->route.next; rti != &rainfo->route; rti = rti->next)
1112 packlen += sizeof(struct nd_opt_route_info) +
1113 ((rti->prefixlen + 0x3f) >> 6) * 8;
1114#endif
fdfd5971
A
1115 if (rainfo->rdnss_length > 0)
1116 packlen += 8 + sizeof(struct in6_addr) * rainfo->rdnss_length;
7ba0088d 1117
7af5ce03
A
1118 if (rainfo->dnssl_length > 0) {
1119 packlen += rainfo->dnssl_option_length;
1120 }
1121
7ba0088d
A
1122 /* allocate memory for the packet */
1123 if ((buf = malloc(packlen)) == NULL) {
1124 syslog(LOG_ERR,
1125 "<%s> can't get enough memory for an RA packet",
7af5ce03 1126 __func__);
7ba0088d
A
1127 exit(1);
1128 }
1129 if (rainfo->ra_data) {
1130 /* free the previous packet */
1131 free(rainfo->ra_data);
1132 rainfo->ra_data = NULL;
1133 }
7af5ce03 1134 rainfo->ra_data = buf;
7ba0088d
A
1135 /* XXX: what if packlen > 576? */
1136 rainfo->ra_datalen = packlen;
1137
1138 /*
1139 * construct the packet
1140 */
1141 ra = (struct nd_router_advert *)buf;
1142 ra->nd_ra_type = ND_ROUTER_ADVERT;
1143 ra->nd_ra_code = 0;
1144 ra->nd_ra_cksum = 0;
1145 ra->nd_ra_curhoplimit = (u_int8_t)(0xff & rainfo->hoplimit);
1146 ra->nd_ra_flags_reserved = 0; /* just in case */
1147 /*
1148 * XXX: the router preference field, which is a 2-bit field, should be
1149 * initialized before other fields.
1150 */
1151 ra->nd_ra_flags_reserved = 0xff & rainfo->rtpref;
1152 ra->nd_ra_flags_reserved |=
1153 rainfo->managedflg ? ND_RA_FLAG_MANAGED : 0;
1154 ra->nd_ra_flags_reserved |=
1155 rainfo->otherflg ? ND_RA_FLAG_OTHER : 0;
7ba0088d
A
1156 ra->nd_ra_router_lifetime = htons(rainfo->lifetime);
1157 ra->nd_ra_reachable = htonl(rainfo->reachabletime);
1158 ra->nd_ra_retransmit = htonl(rainfo->retranstimer);
1159 buf += sizeof(*ra);
1160
1161 if (rainfo->advlinkopt) {
1162 lladdropt_fill(rainfo->sdl, (struct nd_opt_hdr *)buf);
1163 buf += lladdroptlen;
1164 }
1165
1166 if (rainfo->linkmtu) {
1167 ndopt_mtu = (struct nd_opt_mtu *)buf;
1168 ndopt_mtu->nd_opt_mtu_type = ND_OPT_MTU;
1169 ndopt_mtu->nd_opt_mtu_len = 1;
1170 ndopt_mtu->nd_opt_mtu_reserved = 0;
1171 ndopt_mtu->nd_opt_mtu_mtu = htonl(rainfo->linkmtu);
1172 buf += sizeof(struct nd_opt_mtu);
1173 }
1174
7ba0088d
A
1175 for (pfx = rainfo->prefix.next;
1176 pfx != &rainfo->prefix; pfx = pfx->next) {
1177 u_int32_t vltime, pltime;
1178 struct timeval now;
1179
1180 ndopt_pi = (struct nd_opt_prefix_info *)buf;
1181 ndopt_pi->nd_opt_pi_type = ND_OPT_PREFIX_INFORMATION;
1182 ndopt_pi->nd_opt_pi_len = 4;
1183 ndopt_pi->nd_opt_pi_prefix_len = pfx->prefixlen;
1184 ndopt_pi->nd_opt_pi_flags_reserved = 0;
1185 if (pfx->onlinkflg)
1186 ndopt_pi->nd_opt_pi_flags_reserved |=
1187 ND_OPT_PI_FLAG_ONLINK;
1188 if (pfx->autoconfflg)
1189 ndopt_pi->nd_opt_pi_flags_reserved |=
1190 ND_OPT_PI_FLAG_AUTO;
7af5ce03
A
1191 if (pfx->timer)
1192 vltime = 0;
1193 else {
1194 if (pfx->vltimeexpire || pfx->pltimeexpire)
1195 gettimeofday(&now, NULL);
1196 if (pfx->vltimeexpire == 0)
1197 vltime = pfx->validlifetime;
1198 else
1199 vltime = (pfx->vltimeexpire > now.tv_sec) ?
1200 pfx->vltimeexpire - now.tv_sec : 0;
1201 }
1202 if (pfx->timer)
1203 pltime = 0;
1204 else {
1205 if (pfx->pltimeexpire == 0)
1206 pltime = pfx->preflifetime;
1207 else
1208 pltime = (pfx->pltimeexpire > now.tv_sec) ?
1209 pfx->pltimeexpire - now.tv_sec : 0;
1210 }
7ba0088d
A
1211 if (vltime < pltime) {
1212 /*
1213 * this can happen if vltime is decrement but pltime
1214 * is not.
1215 */
1216 pltime = vltime;
1217 }
1218 ndopt_pi->nd_opt_pi_valid_time = htonl(vltime);
1219 ndopt_pi->nd_opt_pi_preferred_time = htonl(pltime);
1220 ndopt_pi->nd_opt_pi_reserved2 = 0;
1221 ndopt_pi->nd_opt_pi_prefix = pfx->prefix;
1222
1223 buf += sizeof(struct nd_opt_prefix_info);
1224 }
1225
7af5ce03 1226#ifdef ROUTEINFO
7ba0088d
A
1227 for (rti = rainfo->route.next; rti != &rainfo->route; rti = rti->next) {
1228 u_int8_t psize = (rti->prefixlen + 0x3f) >> 6;
1229
1230 ndopt_rti = (struct nd_opt_route_info *)buf;
1231 ndopt_rti->nd_opt_rti_type = ND_OPT_ROUTE_INFO;
1232 ndopt_rti->nd_opt_rti_len = 1 + psize;
1233 ndopt_rti->nd_opt_rti_prefixlen = rti->prefixlen;
1234 ndopt_rti->nd_opt_rti_flags = 0xff & rti->rtpref;
7af5ce03 1235 ndopt_rti->nd_opt_rti_lifetime = htonl(rti->ltime);
7ba0088d
A
1236 memcpy(ndopt_rti + 1, &rti->prefix, psize * 8);
1237 buf += sizeof(struct nd_opt_route_info) + psize * 8;
1238 }
1239#endif
1240
fdfd5971
A
1241 if (rainfo->rdnss_length > 0) {
1242 struct nd_opt_rdnss * ndopt_rdnss;
1243 struct rdnss * rdnss;
1244
1245 ndopt_rdnss = (struct nd_opt_rdnss*) buf;
1246 ndopt_rdnss->nd_opt_rdnss_type = ND_OPT_RDNSS;
1247 ndopt_rdnss->nd_opt_rdnss_len = 1 + (rainfo->rdnss_length * 2);
1248 ndopt_rdnss->nd_opt_rdnss_reserved = 0;
1249 ndopt_rdnss->nd_opt_rdnss_lifetime = htonl(rainfo->rdnss_lifetime);
1250 buf += 8;
1251
1252 for (rdnss = rainfo->rdnss_list.next;
1253 rdnss != &rainfo->rdnss_list;
1254 rdnss = rdnss->next)
1255 {
1256 struct in6_addr* addr6 = (struct in6_addr*) buf;
1257 *addr6 = rdnss->addr;
1258 buf += sizeof *addr6;
1259 }
1260 }
1261
7af5ce03
A
1262 if (rainfo->dnssl_length > 0) {
1263 struct nd_opt_dnssl * dnssl_opt;
1264 struct dnssl * dnssl;
1265 int domains_length = 0;
1266 u_char * cursor = buf;
1267
1268 memset(cursor, 0, rainfo->dnssl_option_length);
1269
1270 dnssl_opt = (struct nd_opt_dnssl *)cursor;
1271 dnssl_opt->nd_opt_dnssl_type = ND_OPT_DNSSL;
1272 /*
1273 * Length is in units of 8 octets. Divide total byte length
1274 * of the option by 8.
1275 */
1276 dnssl_opt->nd_opt_dnssl_len = rainfo->dnssl_option_length >> 3;
1277 dnssl_opt->nd_opt_dnssl_reserved = 0;
1278 dnssl_opt->nd_opt_dnssl_lifetime =
1279 htonl(rainfo->dnssl_lifetime);
1280
1281 cursor += offsetof(struct nd_opt_dnssl, nd_opt_dnssl_domains);
1282
1283 for (dnssl = rainfo->dnssl_list.next;
1284 dnssl != &rainfo->dnssl_list;
1285 dnssl = dnssl->next)
1286 {
1287 int encodeLen = encode_domain(dnssl->domain, cursor);
1288 cursor += encodeLen;
1289 domains_length += encodeLen;
1290 }
1291
1292 buf += rainfo->dnssl_option_length;
1293 }
1294
7ba0088d
A
1295 return;
1296}
1297
1298static int
1299getinet6sysctl(int code)
1300{
1301 int mib[] = { CTL_NET, PF_INET6, IPPROTO_IPV6, 0 };
1302 int value;
1303 size_t size;
1304
1305 mib[3] = code;
1306 size = sizeof(value);
1307 if (sysctl(mib, sizeof(mib)/sizeof(mib[0]), &value, &size, NULL, 0)
1308 < 0) {
1309 syslog(LOG_ERR, "<%s>: failed to get ip6 sysctl(%d): %s",
7af5ce03 1310 __func__, code,
7ba0088d
A
1311 strerror(errno));
1312 return(-1);
1313 }
1314 else
1315 return(value);
1316}
7af5ce03
A
1317
1318/*
1319 * Encode a domain name into a buffer according to the rules in RFC 1035 section
1320 * 3.1. Do not use the compression techniques outlined in section 4.1.4.
1321 */
1322int
1323encode_domain(char *domain, u_char *dst)
1324{
1325 char *domainCopy = strdup(domain);
1326 char *input = domainCopy;
1327 char *label;
1328 u_char *cursor = dst;
1329
1330 while ((label = strsep(&input, ".")) != NULL) {
1331 int label_len = strlen(label) & 0x3f; /* Max length is 63 */
1332 if (label_len > 0) {
1333 *cursor = (u_char)label_len;
1334 cursor++;
1335 memcpy(cursor, label, label_len);
1336 cursor += label_len;
1337 }
1338 }
1339 *cursor = 0;
1340 cursor++;
1341
1342 free(domainCopy);
1343
1344 return (cursor - dst);
1345}