mirror of
https://gitlab.nic.cz/labs/bird.git
synced 2024-12-23 10:11:53 +00:00
1aec7112f7
Per RFC 3101, N-bit signalling NSSA support should be used only in Hello packets, not in DBDES packets. BIRD since 2.0.4 verifies N-bit in neighbor structure, which is learned from DBDES packets, therefore NSSA-LSAs are not propagated to proper implementations of RFC 3101. This patch fixes that. Both removing the check and removing N-bit from DBDES packet. This will fix compatibility issues with proper implementations, but causes compatibility issues with BIRD 2.0.4.
756 lines
17 KiB
C
756 lines
17 KiB
C
/*
|
|
* BIRD -- OSPF
|
|
*
|
|
* (c) 1999--2004 Ondrej Filip <feela@network.cz>
|
|
* (c) 2009--2015 Ondrej Zajicek <santiago@crfreenet.org>
|
|
* (c) 2009--2015 CZ.NIC z.s.p.o.
|
|
*
|
|
* Can be freely distributed and used under the terms of the GNU GPL.
|
|
*/
|
|
|
|
#include "ospf.h"
|
|
|
|
#include "lib/fletcher16.h"
|
|
|
|
#define HDRLEN sizeof(struct ospf_lsa_header)
|
|
|
|
|
|
#ifndef CPU_BIG_ENDIAN
|
|
void
|
|
lsa_hton_hdr(struct ospf_lsa_header *h, struct ospf_lsa_header *n)
|
|
{
|
|
n->age = htons(h->age);
|
|
n->type_raw = htons(h->type_raw);
|
|
n->id = htonl(h->id);
|
|
n->rt = htonl(h->rt);
|
|
n->sn = htonl(h->sn);
|
|
n->checksum = htons(h->checksum);
|
|
n->length = htons(h->length);
|
|
}
|
|
|
|
void
|
|
lsa_ntoh_hdr(struct ospf_lsa_header *n, struct ospf_lsa_header *h)
|
|
{
|
|
h->age = ntohs(n->age);
|
|
h->type_raw = ntohs(n->type_raw);
|
|
h->id = ntohl(n->id);
|
|
h->rt = ntohl(n->rt);
|
|
h->sn = ntohl(n->sn);
|
|
h->checksum = ntohs(n->checksum);
|
|
h->length = ntohs(n->length);
|
|
}
|
|
|
|
void
|
|
lsa_hton_body(void *h, void *n, u16 len)
|
|
{
|
|
u32 *hid = h;
|
|
u32 *nid = n;
|
|
uint i;
|
|
|
|
for (i = 0; i < (len / sizeof(u32)); i++)
|
|
nid[i] = htonl(hid[i]);
|
|
}
|
|
|
|
void
|
|
lsa_ntoh_body(void *n, void *h, u16 len)
|
|
{
|
|
u32 *nid = n;
|
|
u32 *hid = h;
|
|
uint i;
|
|
|
|
for (i = 0; i < (len / sizeof(u32)); i++)
|
|
hid[i] = ntohl(nid[i]);
|
|
}
|
|
#endif /* little endian */
|
|
|
|
|
|
int
|
|
lsa_flooding_allowed(u32 type, u32 domain, struct ospf_iface *ifa)
|
|
{
|
|
/* Handle inactive vlinks */
|
|
if (ifa->state == OSPF_IS_DOWN)
|
|
return 0;
|
|
|
|
/* 4.5.2 (Case 2) */
|
|
switch (LSA_SCOPE(type))
|
|
{
|
|
case LSA_SCOPE_LINK:
|
|
return ifa->iface_id == domain;
|
|
|
|
case LSA_SCOPE_AREA:
|
|
return ifa->oa->areaid == domain;
|
|
|
|
case LSA_SCOPE_AS:
|
|
if (ifa->type == OSPF_IT_VLINK)
|
|
return 0;
|
|
if (!oa_is_ext(ifa->oa))
|
|
return 0;
|
|
return 1;
|
|
|
|
default:
|
|
log(L_ERR "OSPF: LSA with invalid scope");
|
|
return 0;
|
|
}
|
|
}
|
|
|
|
int
|
|
lsa_is_acceptable(u32 type, struct ospf_neighbor *n, struct ospf_proto *p)
|
|
{
|
|
if (ospf_is_v2(p))
|
|
{
|
|
/* Do not check NSSA-LSA here, as OPT_N is only in HELLO packets */
|
|
|
|
if (lsa_is_opaque(type))
|
|
return !!(n->options & OPT_O);
|
|
|
|
return 1;
|
|
}
|
|
else
|
|
{
|
|
/*
|
|
* There should be check whether receiving router understands that type
|
|
* of LSA (for LSA types with U-bit == 0). But as we do not support any
|
|
* optional LSA types, this is not needed yet.
|
|
*/
|
|
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
static int
|
|
unknown_lsa_type(u32 type)
|
|
{
|
|
switch (type)
|
|
{
|
|
case LSA_T_RT:
|
|
case LSA_T_NET:
|
|
case LSA_T_SUM_NET:
|
|
case LSA_T_SUM_RT:
|
|
case LSA_T_EXT:
|
|
case LSA_T_NSSA:
|
|
case LSA_T_LINK:
|
|
case LSA_T_PREFIX:
|
|
case LSA_T_RI_LINK:
|
|
case LSA_T_RI_AREA:
|
|
case LSA_T_RI_AS:
|
|
return 0;
|
|
|
|
default:
|
|
return 1;
|
|
}
|
|
}
|
|
|
|
/* Maps OSPFv2 types to OSPFv3 types */
|
|
static const u16 lsa_v2_types[] = {
|
|
0, LSA_T_RT, LSA_T_NET, LSA_T_SUM_NET, LSA_T_SUM_RT, LSA_T_EXT, 0, LSA_T_NSSA,
|
|
0, LSA_T_OPAQUE_LINK, LSA_T_OPAQUE_AREA, LSA_T_OPAQUE_AS
|
|
};
|
|
|
|
/* Maps OSPFv2 opaque types to OSPFv3 function codes */
|
|
static const u16 opaque_lsa_types[] = {
|
|
[LSA_OT_GR] = LSA_T_GR,
|
|
[LSA_OT_RI] = LSA_T_RI_,
|
|
};
|
|
|
|
/* Maps (subset of) OSPFv3 function codes to OSPFv2 opaque types */
|
|
static const u8 opaque_lsa_types_inv[] = {
|
|
[LSA_T_GR] = LSA_OT_GR,
|
|
[LSA_T_RI_] = LSA_OT_RI,
|
|
};
|
|
|
|
#define LOOKUP(a, i) ({ uint _i = (i); (_i < ARRAY_SIZE(a)) ? a[_i] : 0; })
|
|
|
|
void
|
|
lsa_get_type_domain_(u32 type, u32 id, struct ospf_iface *ifa, u32 *otype, u32 *domain)
|
|
{
|
|
if (ospf_is_v2(ifa->oa->po))
|
|
{
|
|
type = type & LSA_T_V2_MASK;
|
|
type = LOOKUP(lsa_v2_types, type);
|
|
|
|
uint code;
|
|
if (LSA_FUNCTION(type) == LSA_T_OPAQUE_)
|
|
if (code = LOOKUP(opaque_lsa_types, id >> 24))
|
|
{
|
|
type = code | LSA_UBIT | LSA_SCOPE(type);
|
|
|
|
/* Hack for Grace-LSA: It does not use U-bit for link-scoped LSAs */
|
|
if (type == (LSA_T_GR | LSA_UBIT))
|
|
type = LSA_T_GR;
|
|
}
|
|
}
|
|
else
|
|
{
|
|
/* For unkown LSAs without U-bit change scope to LSA_SCOPE_LINK */
|
|
if (unknown_lsa_type(type) && !(type & LSA_UBIT))
|
|
type = type & ~LSA_SCOPE_MASK;
|
|
}
|
|
|
|
*otype = type;
|
|
|
|
switch (LSA_SCOPE(type))
|
|
{
|
|
case LSA_SCOPE_LINK:
|
|
*domain = ifa->iface_id;
|
|
return;
|
|
|
|
case LSA_SCOPE_AREA:
|
|
*domain = ifa->oa->areaid;
|
|
return;
|
|
|
|
case LSA_SCOPE_AS:
|
|
default:
|
|
*domain = 0;
|
|
return;
|
|
}
|
|
}
|
|
|
|
int
|
|
lsa_is_opaque(u32 type)
|
|
{
|
|
u32 fn = LSA_FUNCTION(type);
|
|
return LOOKUP(opaque_lsa_types_inv, fn) || (fn == LSA_T_OPAQUE_);
|
|
}
|
|
|
|
u32
|
|
lsa_get_opaque_type(u32 type)
|
|
{
|
|
return LOOKUP(opaque_lsa_types_inv, LSA_FUNCTION(type));
|
|
}
|
|
|
|
|
|
void
|
|
lsa_generate_checksum(struct ospf_lsa_header *lsa, const u8 *body)
|
|
{
|
|
struct fletcher16_context ctx;
|
|
struct ospf_lsa_header hdr;
|
|
u16 len = lsa->length;
|
|
|
|
/*
|
|
* lsa and body are in the host order, we need to compute Fletcher-16 checksum
|
|
* for data in the network order. We also skip the initial age field.
|
|
*/
|
|
|
|
lsa_hton_hdr(lsa, &hdr);
|
|
hdr.checksum = 0;
|
|
|
|
fletcher16_init(&ctx);
|
|
fletcher16_update(&ctx, (u8 *) &hdr + 2, sizeof(struct ospf_lsa_header) - 2);
|
|
fletcher16_update_n32(&ctx, body, len - sizeof(struct ospf_lsa_header));
|
|
lsa->checksum = fletcher16_final(&ctx, len, OFFSETOF(struct ospf_lsa_header, checksum));
|
|
}
|
|
|
|
u16
|
|
lsa_verify_checksum(const void *lsa_n, int lsa_len)
|
|
{
|
|
struct fletcher16_context ctx;
|
|
|
|
/* The whole LSA is at lsa_n in net order, we just skip initial age field */
|
|
|
|
fletcher16_init(&ctx);
|
|
fletcher16_update(&ctx, (u8 *) lsa_n + 2, lsa_len - 2);
|
|
|
|
return fletcher16_compute(&ctx) == 0;
|
|
}
|
|
|
|
|
|
int
|
|
lsa_comp(struct ospf_lsa_header *l1, struct ospf_lsa_header *l2)
|
|
/* Return codes from point of view of l1 */
|
|
{
|
|
u32 sn1, sn2;
|
|
|
|
sn1 = l1->sn - LSA_INITSEQNO + 1;
|
|
sn2 = l2->sn - LSA_INITSEQNO + 1;
|
|
|
|
if (sn1 > sn2)
|
|
return CMP_NEWER;
|
|
if (sn1 < sn2)
|
|
return CMP_OLDER;
|
|
|
|
if (l1->checksum != l2->checksum)
|
|
return l1->checksum < l2->checksum ? CMP_OLDER : CMP_NEWER;
|
|
|
|
if ((l1->age == LSA_MAXAGE) && (l2->age != LSA_MAXAGE))
|
|
return CMP_NEWER;
|
|
if ((l2->age == LSA_MAXAGE) && (l1->age != LSA_MAXAGE))
|
|
return CMP_OLDER;
|
|
|
|
if (ABS(l1->age - l2->age) > LSA_MAXAGEDIFF)
|
|
return l1->age < l2->age ? CMP_NEWER : CMP_OLDER;
|
|
|
|
return CMP_SAME;
|
|
}
|
|
|
|
|
|
#define LSA_TLV_LENGTH(tlv) \
|
|
(sizeof(struct ospf_tlv) + BIRD_ALIGN((tlv)->length, 4))
|
|
|
|
#define LSA_NEXT_TLV(tlv) \
|
|
((struct ospf_tlv *) ((byte *) (tlv) + LSA_TLV_LENGTH(tlv)))
|
|
|
|
#define LSA_WALK_TLVS(tlv,buf,len) \
|
|
for(struct ospf_tlv *tlv = (void *) (buf); \
|
|
(byte *) tlv < (byte *) (buf) + (len); \
|
|
tlv = LSA_NEXT_TLV(tlv))
|
|
|
|
struct ospf_tlv *
|
|
lsa_get_tlv(struct top_hash_entry *en, uint type)
|
|
{
|
|
LSA_WALK_TLVS(tlv, en->lsa_body, en->lsa.length - HDRLEN)
|
|
if (tlv->type == type)
|
|
return tlv;
|
|
|
|
return NULL;
|
|
}
|
|
|
|
int
|
|
lsa_validate_tlvs(byte *buf, uint len)
|
|
{
|
|
byte *pos = buf;
|
|
byte *end = buf + len;
|
|
|
|
while (pos < end)
|
|
{
|
|
if ((pos + sizeof(struct ospf_tlv)) > end)
|
|
return 0;
|
|
|
|
struct ospf_tlv *tlv = (void *) pos;
|
|
uint len = LSA_TLV_LENGTH(tlv);
|
|
|
|
if ((pos + len) > end)
|
|
return 0;
|
|
|
|
pos += len;
|
|
}
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
static inline int
|
|
lsa_walk_rt2(struct ospf_lsa_rt_walk *rt)
|
|
{
|
|
if (rt->buf >= rt->bufend)
|
|
return 0;
|
|
|
|
struct ospf_lsa_rt2_link *l = rt->buf;
|
|
rt->buf += sizeof(struct ospf_lsa_rt2_link) + l->no_tos * sizeof(struct ospf_lsa_rt2_tos);
|
|
|
|
rt->type = l->type;
|
|
rt->metric = l->metric;
|
|
rt->id = l->id;
|
|
rt->data = l->data;
|
|
return 1;
|
|
}
|
|
|
|
static inline int
|
|
lsa_walk_rt3(struct ospf_lsa_rt_walk *rt)
|
|
{
|
|
while (rt->buf >= rt->bufend)
|
|
{
|
|
rt->en = ospf_hash_find_rt3_next(rt->en);
|
|
if (!rt->en)
|
|
return 0;
|
|
|
|
rt->buf = rt->en->lsa_body;
|
|
rt->bufend = rt->buf + rt->en->lsa.length - sizeof(struct ospf_lsa_header);
|
|
rt->buf += sizeof(struct ospf_lsa_rt);
|
|
}
|
|
|
|
struct ospf_lsa_rt3_link *l = rt->buf;
|
|
rt->buf += sizeof(struct ospf_lsa_rt3_link);
|
|
|
|
rt->type = l->type;
|
|
rt->metric = l->metric;
|
|
rt->lif = l->lif;
|
|
rt->nif = l->nif;
|
|
rt->id = l->id;
|
|
return 1;
|
|
}
|
|
|
|
void
|
|
lsa_walk_rt_init(struct ospf_proto *p, struct top_hash_entry *act, struct ospf_lsa_rt_walk *rt)
|
|
{
|
|
rt->ospf2 = ospf_is_v2(p);
|
|
rt->id = rt->data = rt->lif = rt->nif = 0;
|
|
|
|
if (rt->ospf2)
|
|
rt->en = act;
|
|
else
|
|
rt->en = ospf_hash_find_rt3_first(p->gr, act->domain, act->lsa.rt);
|
|
|
|
rt->buf = rt->en->lsa_body;
|
|
rt->bufend = rt->buf + rt->en->lsa.length - sizeof(struct ospf_lsa_header);
|
|
rt->buf += sizeof(struct ospf_lsa_rt);
|
|
}
|
|
|
|
int
|
|
lsa_walk_rt(struct ospf_lsa_rt_walk *rt)
|
|
{
|
|
return rt->ospf2 ? lsa_walk_rt2(rt) : lsa_walk_rt3(rt);
|
|
}
|
|
|
|
|
|
void
|
|
lsa_parse_sum_net(struct top_hash_entry *en, int ospf2, int af, net_addr *net, u8 *pxopts, u32 *metric)
|
|
{
|
|
if (ospf2)
|
|
{
|
|
uint opts = lsa_get_options(&en->lsa);
|
|
struct ospf_lsa_sum2 *ls = en->lsa_body;
|
|
net_fill_ip4(net, ip4_from_u32(en->lsa.id & ls->netmask), u32_masklen(ls->netmask));
|
|
*pxopts = (opts & OPT_DN) ? OPT_PX_DN : 0;
|
|
*metric = ls->metric & LSA_METRIC_MASK;
|
|
}
|
|
else
|
|
{
|
|
struct ospf_lsa_sum3_net *ls = en->lsa_body;
|
|
ospf3_get_prefix(ls->prefix, af, net, pxopts, NULL);
|
|
*metric = ls->metric & LSA_METRIC_MASK;
|
|
}
|
|
}
|
|
|
|
void
|
|
lsa_parse_sum_rt(struct top_hash_entry *en, int ospf2, u32 *drid, u32 *metric, u32 *options)
|
|
{
|
|
if (ospf2)
|
|
{
|
|
struct ospf_lsa_sum2 *ls = en->lsa_body;
|
|
*drid = en->lsa.id;
|
|
*metric = ls->metric & LSA_METRIC_MASK;
|
|
*options = 0;
|
|
}
|
|
else
|
|
{
|
|
struct ospf_lsa_sum3_rt *ls = en->lsa_body;
|
|
*drid = ls->drid;
|
|
*metric = ls->metric & LSA_METRIC_MASK;
|
|
*options = ls->options & LSA_OPTIONS_MASK;
|
|
}
|
|
}
|
|
|
|
void
|
|
lsa_parse_ext(struct top_hash_entry *en, int ospf2, int af, struct ospf_lsa_ext_local *rt)
|
|
{
|
|
if (ospf2)
|
|
{
|
|
struct ospf_lsa_ext2 *ext = en->lsa_body;
|
|
net_fill_ip4(&rt->net,
|
|
ip4_from_u32(en->lsa.id & ext->netmask),
|
|
u32_masklen(ext->netmask));
|
|
rt->pxopts = 0;
|
|
rt->metric = ext->metric & LSA_METRIC_MASK;
|
|
rt->ebit = ext->metric & LSA_EXT2_EBIT;
|
|
|
|
rt->fbit = ext->fwaddr;
|
|
rt->fwaddr = ipa_from_u32(ext->fwaddr);
|
|
|
|
rt->tag = ext->tag;
|
|
rt->propagate = lsa_get_options(&en->lsa) & OPT_P;
|
|
rt->downwards = lsa_get_options(&en->lsa) & OPT_DN;
|
|
}
|
|
else
|
|
{
|
|
struct ospf_lsa_ext3 *ext = en->lsa_body;
|
|
u32 *buf = ospf3_get_prefix(ext->rest, af, &rt->net, &rt->pxopts, NULL);
|
|
rt->metric = ext->metric & LSA_METRIC_MASK;
|
|
rt->ebit = ext->metric & LSA_EXT3_EBIT;
|
|
|
|
rt->fbit = ext->metric & LSA_EXT3_FBIT;
|
|
if (rt->fbit)
|
|
buf = ospf3_get_addr(buf, af, &rt->fwaddr);
|
|
else
|
|
rt->fwaddr = IPA_NONE;
|
|
|
|
rt->tag = (ext->metric & LSA_EXT3_TBIT) ? *buf++ : 0;
|
|
rt->propagate = rt->pxopts & OPT_PX_P;
|
|
rt->downwards = rt->pxopts & OPT_PX_DN;
|
|
}
|
|
}
|
|
|
|
|
|
static int
|
|
lsa_validate_rt2(struct ospf_lsa_header *lsa, struct ospf_lsa_rt *body)
|
|
{
|
|
if (lsa->length < (HDRLEN + sizeof(struct ospf_lsa_rt)))
|
|
return 0;
|
|
|
|
uint i = 0;
|
|
void *buf = body;
|
|
void *bufend = buf + lsa->length - HDRLEN;
|
|
buf += sizeof(struct ospf_lsa_rt);
|
|
|
|
while (buf < bufend)
|
|
{
|
|
struct ospf_lsa_rt2_link *l = buf;
|
|
buf += sizeof(struct ospf_lsa_rt2_link) + l->no_tos * sizeof(struct ospf_lsa_rt2_tos);
|
|
i++;
|
|
|
|
if (buf > bufend)
|
|
return 0;
|
|
|
|
if (!((l->type == LSART_PTP) ||
|
|
(l->type == LSART_NET) ||
|
|
(l->type == LSART_STUB) ||
|
|
(l->type == LSART_VLNK)))
|
|
return 0;
|
|
}
|
|
|
|
if ((body->options & LSA_RT2_LINKS) != i)
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
static int
|
|
lsa_validate_rt3(struct ospf_lsa_header *lsa, struct ospf_lsa_rt *body)
|
|
{
|
|
if (lsa->length < (HDRLEN + sizeof(struct ospf_lsa_rt)))
|
|
return 0;
|
|
|
|
void *buf = body;
|
|
void *bufend = buf + lsa->length - HDRLEN;
|
|
buf += sizeof(struct ospf_lsa_rt);
|
|
|
|
while (buf < bufend)
|
|
{
|
|
struct ospf_lsa_rt3_link *l = buf;
|
|
buf += sizeof(struct ospf_lsa_rt3_link);
|
|
|
|
if (buf > bufend)
|
|
return 0;
|
|
|
|
if (!((l->type == LSART_PTP) ||
|
|
(l->type == LSART_NET) ||
|
|
(l->type == LSART_VLNK)))
|
|
return 0;
|
|
}
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
lsa_validate_net(struct ospf_lsa_header *lsa, struct ospf_lsa_net *body UNUSED)
|
|
{
|
|
if (lsa->length < (HDRLEN + sizeof(struct ospf_lsa_net)))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
lsa_validate_sum2(struct ospf_lsa_header *lsa, struct ospf_lsa_sum2 *body)
|
|
{
|
|
if (lsa->length < (HDRLEN + sizeof(struct ospf_lsa_sum2)))
|
|
return 0;
|
|
|
|
/* First field should have TOS = 0, we ignore other TOS fields */
|
|
if ((body->metric & LSA_SUM2_TOS) != 0)
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static inline int
|
|
pxlen(u32 *buf)
|
|
{
|
|
return *buf >> 24;
|
|
}
|
|
|
|
static int
|
|
lsa_validate_sum3_net(struct ospf_lsa_header *lsa, struct ospf_lsa_sum3_net *body)
|
|
{
|
|
if (lsa->length < (HDRLEN + sizeof(struct ospf_lsa_sum3_net) + 4))
|
|
return 0;
|
|
|
|
u8 pxl = pxlen(body->prefix);
|
|
if (pxl > IP6_MAX_PREFIX_LENGTH)
|
|
return 0;
|
|
|
|
if (lsa->length != (HDRLEN + sizeof(struct ospf_lsa_sum3_net) +
|
|
IPV6_PREFIX_SPACE(pxl)))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
lsa_validate_sum3_rt(struct ospf_lsa_header *lsa, struct ospf_lsa_sum3_rt *body UNUSED)
|
|
{
|
|
if (lsa->length != (HDRLEN + sizeof(struct ospf_lsa_sum3_rt)))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
lsa_validate_ext2(struct ospf_lsa_header *lsa, struct ospf_lsa_ext2 *body)
|
|
{
|
|
if (lsa->length < (HDRLEN + sizeof(struct ospf_lsa_ext2)))
|
|
return 0;
|
|
|
|
/* First field should have TOS = 0, we ignore other TOS fields */
|
|
if ((body->metric & LSA_EXT2_TOS) != 0)
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
lsa_validate_ext3(struct ospf_lsa_header *lsa, struct ospf_lsa_ext3 *body)
|
|
{
|
|
if (lsa->length < (HDRLEN + sizeof(struct ospf_lsa_ext3) + 4))
|
|
return 0;
|
|
|
|
u8 pxl = pxlen(body->rest);
|
|
if (pxl > IP6_MAX_PREFIX_LENGTH)
|
|
return 0;
|
|
|
|
int len = IPV6_PREFIX_SPACE(pxl);
|
|
if (body->metric & LSA_EXT3_FBIT) // forwarding address
|
|
len += 16;
|
|
if (body->metric & LSA_EXT3_TBIT) // route tag
|
|
len += 4;
|
|
if (*body->rest & 0xFFFF) // referenced LS type field
|
|
len += 4;
|
|
|
|
if (lsa->length != (HDRLEN + sizeof(struct ospf_lsa_ext3) + len))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
lsa_validate_pxlist(struct ospf_lsa_header *lsa, u32 pxcount, uint offset, u8 *pbuf)
|
|
{
|
|
uint bound = lsa->length - HDRLEN - 4;
|
|
u32 i;
|
|
|
|
for (i = 0; i < pxcount; i++)
|
|
{
|
|
if (offset > bound)
|
|
return 0;
|
|
|
|
u8 pxl = pxlen((u32 *) (pbuf + offset));
|
|
if (pxl > IP6_MAX_PREFIX_LENGTH)
|
|
return 0;
|
|
|
|
offset += IPV6_PREFIX_SPACE(pxl);
|
|
}
|
|
|
|
if (lsa->length != (HDRLEN + offset))
|
|
return 0;
|
|
|
|
return 1;
|
|
}
|
|
|
|
static int
|
|
lsa_validate_link(struct ospf_lsa_header *lsa, struct ospf_lsa_link *body)
|
|
{
|
|
if (lsa->length < (HDRLEN + sizeof(struct ospf_lsa_link)))
|
|
return 0;
|
|
|
|
return lsa_validate_pxlist(lsa, body->pxcount, sizeof(struct ospf_lsa_link), (u8 *) body);
|
|
}
|
|
|
|
static int
|
|
lsa_validate_prefix(struct ospf_lsa_header *lsa, struct ospf_lsa_prefix *body)
|
|
{
|
|
if (lsa->length < (HDRLEN + sizeof(struct ospf_lsa_prefix)))
|
|
return 0;
|
|
|
|
return lsa_validate_pxlist(lsa, body->pxcount, sizeof(struct ospf_lsa_prefix), (u8 *) body);
|
|
}
|
|
|
|
static int
|
|
lsa_validate_gr(struct ospf_lsa_header *lsa, void *body)
|
|
{
|
|
return lsa_validate_tlvs(body, lsa->length - HDRLEN);
|
|
}
|
|
|
|
static int
|
|
lsa_validate_ri(struct ospf_lsa_header *lsa UNUSED, struct ospf_lsa_net *body UNUSED)
|
|
{
|
|
/*
|
|
* There should be proper validation. But we do not really process RI LSAs, so
|
|
* we can just accept them like another unknown opaque LSAs.
|
|
*/
|
|
|
|
return 1;
|
|
}
|
|
|
|
|
|
/**
|
|
* lsa_validate - check whether given LSA is valid
|
|
* @lsa: LSA header
|
|
* @lsa_type: internal LSA type (%LSA_T_xxx)
|
|
* @ospf2: %true for OSPFv2, %false for OSPFv3
|
|
* @body: pointer to LSA body
|
|
*
|
|
* Checks internal structure of given LSA body (minimal length,
|
|
* consistency). Returns true if valid.
|
|
*/
|
|
int
|
|
lsa_validate(struct ospf_lsa_header *lsa, u32 lsa_type, int ospf2, void *body)
|
|
{
|
|
if (ospf2)
|
|
{
|
|
switch (lsa_type)
|
|
{
|
|
case LSA_T_RT:
|
|
return lsa_validate_rt2(lsa, body);
|
|
case LSA_T_NET:
|
|
return lsa_validate_net(lsa, body);
|
|
case LSA_T_SUM_NET:
|
|
return lsa_validate_sum2(lsa, body);
|
|
case LSA_T_SUM_RT:
|
|
return lsa_validate_sum2(lsa, body);
|
|
case LSA_T_EXT:
|
|
case LSA_T_NSSA:
|
|
return lsa_validate_ext2(lsa, body);
|
|
case LSA_T_GR:
|
|
return lsa_validate_gr(lsa, body);
|
|
case LSA_T_RI_LINK:
|
|
case LSA_T_RI_AREA:
|
|
case LSA_T_RI_AS:
|
|
return lsa_validate_ri(lsa, body);
|
|
case LSA_T_OPAQUE_LINK:
|
|
case LSA_T_OPAQUE_AREA:
|
|
case LSA_T_OPAQUE_AS:
|
|
return 1; /* Unknown Opaque LSAs */
|
|
default:
|
|
return 0; /* Should not happen, unknown LSAs are already rejected */
|
|
}
|
|
}
|
|
else
|
|
{
|
|
switch (lsa_type)
|
|
{
|
|
case LSA_T_RT:
|
|
return lsa_validate_rt3(lsa, body);
|
|
case LSA_T_NET:
|
|
return lsa_validate_net(lsa, body);
|
|
case LSA_T_SUM_NET:
|
|
return lsa_validate_sum3_net(lsa, body);
|
|
case LSA_T_SUM_RT:
|
|
return lsa_validate_sum3_rt(lsa, body);
|
|
case LSA_T_EXT:
|
|
case LSA_T_NSSA:
|
|
return lsa_validate_ext3(lsa, body);
|
|
case LSA_T_LINK:
|
|
return lsa_validate_link(lsa, body);
|
|
case LSA_T_PREFIX:
|
|
return lsa_validate_prefix(lsa, body);
|
|
case LSA_T_GR:
|
|
return lsa_validate_gr(lsa, body);
|
|
case LSA_T_RI_LINK:
|
|
case LSA_T_RI_AREA:
|
|
case LSA_T_RI_AS:
|
|
return lsa_validate_ri(lsa, body);
|
|
default:
|
|
return 1; /* Unknown LSAs are OK in OSPFv3 */
|
|
}
|
|
}
|
|
}
|