static void gateway_handle(struct dhcp_opt *opt, unsigned char *popt, int optlen) { IPaddr_t ip; ip = net_read_ip(popt); net_set_gateway(ip); }
static void env_ip_handle(struct dhcp_opt *opt, unsigned char *popt, int optlen) { IPaddr_t ip; ip = net_read_ip(popt); setenv_ip(opt->barebox_var_name, ip); }
/* * Copy parameters of interest from BOOTP_REPLY/DHCP_OFFER packet */ static void bootp_copy_net_params(struct bootp *bp) { IPaddr_t tmp_ip; tmp_ip = net_read_ip(&bp->bp_yiaddr); net_set_ip(tmp_ip); tmp_ip = net_read_ip(&bp->bp_siaddr); if (tmp_ip != 0) net_set_serverip(tmp_ip); if (strlen(bp->bp_file) > 0) setenv("bootfile", bp->bp_file); debug("bootfile: %s\n", bp->bp_file); }
static void netmask_handle(struct dhcp_opt *opt, unsigned char *popt, int optlen) { IPaddr_t ip; ip = net_read_ip(popt); net_set_netmask(ip); }
static int sb_eth_raw_send(struct udevice *dev, void *packet, int length) { struct eth_sandbox_raw_priv *priv = dev_get_priv(dev); debug("eth_sandbox_raw: Send packet %d\n", length); if (priv->local) { struct ethernet_hdr *eth = packet; if (ntohs(eth->et_protlen) == PROT_ARP) { struct arp_hdr *arp = packet + ETHER_HDR_SIZE; /** * localhost works on a higher-level API in Linux than * ARP packets, so fake it */ arp_ip = net_read_ip(&arp->ar_tpa); reply_arp = 1; return 0; } packet += ETHER_HDR_SIZE; length -= ETHER_HDR_SIZE; } return sandbox_eth_raw_os_send(packet, length, priv); }
void ping_receive(struct ethernet_hdr *et, struct ip_udp_hdr *ip, int len) { struct icmp_hdr *icmph = (struct icmp_hdr *)&ip->udp_src; struct in_addr src_ip; int eth_hdr_size; switch (icmph->type) { case ICMP_ECHO_REPLY: src_ip = net_read_ip((void *)&ip->ip_src); if (src_ip.s_addr == net_ping_ip.s_addr) net_set_state(NETLOOP_SUCCESS); return; case ICMP_ECHO_REQUEST: eth_hdr_size = net_update_ether(et, et->et_src, PROT_IP); debug_cond(DEBUG_DEV_PKT, "Got ICMP ECHO REQUEST, return %d bytes\n", eth_hdr_size + len); ip->ip_sum = 0; ip->ip_off = 0; net_copy_ip((void *)&ip->ip_dst, &ip->ip_src); net_copy_ip((void *)&ip->ip_src, &net_ip); ip->ip_sum = compute_ip_checksum(ip, IP_HDR_SIZE); icmph->type = ICMP_ECHO_REPLY; icmph->checksum = 0; icmph->checksum = compute_ip_checksum(icmph, len - IP_HDR_SIZE); net_send_packet((uchar *)et, eth_hdr_size + len); return; /* default: return;*/ } }
static void env_ip_handle(struct dhcp_opt *opt, unsigned char *popt, int optlen) { IPaddr_t ip; ip = net_read_ip(popt); if (IS_ENABLED(CONFIG_ENVIRONMENT_VARIABLES)) setenv_ip(opt->barebox_var_name, ip); }
static void ping_handler(void *ctx, char *pkt, unsigned len) { IPaddr_t tmp; struct iphdr *ip = net_eth_to_iphdr(pkt); tmp = net_read_ip((void *)&ip->saddr); if (tmp != net_ping_ip) return; ping_state = PING_STATE_SUCCESS; }
/* * Copy parameters of interest from BOOTP_REPLY/DHCP_OFFER packet */ static void bootp_copy_net_params(struct bootp *bp) { IPaddr_t tmp_ip; tmp_ip = net_read_ip(&bp->bp_yiaddr); net_set_ip(tmp_ip); tmp_ip = net_read_ip(&bp->bp_siaddr); if (tmp_ip != 0) net_set_serverip(tmp_ip); if (strlen(bp->bp_file) > 0) { if (IS_ENABLED(CONFIG_ENVIRONMENT_VARIABLES)) setenv("bootfile", bp->bp_file); if (IS_ENABLED(CONFIG_GLOBALVAR)) dhcp_set_barebox_global("bootfile", bp->bp_file); } debug("bootfile: %s\n", bp->bp_file); }
static int sb_check_ping_reply(struct udevice *dev, void *packet, unsigned int len) { struct eth_sandbox_priv *priv = dev_get_priv(dev); struct ethernet_hdr *eth = packet; struct ip_udp_hdr *ip; struct icmp_hdr *icmp; /* Used by all of the ut_assert macros */ struct unit_test_state *uts = priv->priv; if (ntohs(eth->et_protlen) != PROT_IP) return 0; ip = packet + ETHER_HDR_SIZE; if (ip->ip_p != IPPROTO_ICMP) return 0; icmp = (struct icmp_hdr *)&ip->udp_src; if (icmp->type != ICMP_ECHO_REPLY) return 0; /* This test would be worthless if we are not waiting */ ut_assert(arp_is_waiting()); /* Validate response */ ut_assert(memcmp(eth->et_src, net_ethaddr, ARP_HLEN) == 0); ut_assert(memcmp(eth->et_dest, priv->fake_host_hwaddr, ARP_HLEN) == 0); ut_assert(eth->et_protlen == htons(PROT_IP)); ut_assert(net_read_ip(&ip->ip_src).s_addr == net_ip.s_addr); ut_assert(net_read_ip(&ip->ip_dst).s_addr == string_to_ip("1.1.2.4").s_addr); return 0; }
static int sb_check_arp_reply(struct udevice *dev, void *packet, unsigned int len) { struct eth_sandbox_priv *priv = dev_get_priv(dev); struct ethernet_hdr *eth = packet; struct arp_hdr *arp; /* Used by all of the ut_assert macros */ struct unit_test_state *uts = priv->priv; if (ntohs(eth->et_protlen) != PROT_ARP) return 0; arp = packet + ETHER_HDR_SIZE; if (ntohs(arp->ar_op) != ARPOP_REPLY) return 0; /* This test would be worthless if we are not waiting */ ut_assert(arp_is_waiting()); /* Validate response */ ut_assert(memcmp(eth->et_src, net_ethaddr, ARP_HLEN) == 0); ut_assert(memcmp(eth->et_dest, priv->fake_host_hwaddr, ARP_HLEN) == 0); ut_assert(eth->et_protlen == htons(PROT_ARP)); ut_assert(arp->ar_hrd == htons(ARP_ETHER)); ut_assert(arp->ar_pro == htons(PROT_IP)); ut_assert(arp->ar_hln == ARP_HLEN); ut_assert(arp->ar_pln == ARP_PLEN); ut_assert(memcmp(&arp->ar_sha, net_ethaddr, ARP_HLEN) == 0); ut_assert(net_read_ip(&arp->ar_spa).s_addr == net_ip.s_addr); ut_assert(memcmp(&arp->ar_tha, priv->fake_host_hwaddr, ARP_HLEN) == 0); ut_assert(net_read_ip(&arp->ar_tpa).s_addr == string_to_ip("1.1.2.4").s_addr); return 0; }
static void dns_handler(void *ctx, char *packet, unsigned len) { struct header *header; unsigned char *p, *e, *s; u16 type; int found, stop, dlen; short tmp; debug("%s\n", __func__); /* We sent 1 query. We want to see more that 1 answer. */ header = (struct header *)net_eth_to_udp_payload(packet);; if (ntohs(header->nqueries) != 1) return; /* Received 0 answers */ if (header->nanswers == 0) { dns_state = STATE_DONE; debug("DNS server returned no answers\n"); return; } /* Skip host name */ s = &header->data[0]; e = packet + len; for (p = s; p < e && *p != '\0'; p++) continue; /* We sent query class 1, query type 1 */ tmp = p[1] | (p[2] << 8); if (&p[5] > e || ntohs(tmp) != DNS_A_RECORD) { debug("DNS response was not A record\n"); return; } /* Go to the first answer section */ p += 5; /* Loop through the answers, we want A type answer */ for (found = stop = 0; !stop && &p[12] < e; ) { /* Skip possible name in CNAME answer */ if (*p != 0xc0) { while (*p && &p[12] < e) p++; p--; } debug("Name (Offset in header): %d\n", p[1]); tmp = p[2] | (p[3] << 8); type = ntohs(tmp); debug("type = %d\n", type); if (type == DNS_CNAME_RECORD) { /* CNAME answer. shift to the next section */ debug("Found canonical name\n"); tmp = p[10] | (p[11] << 8); dlen = ntohs(tmp); debug("dlen = %d\n", dlen); p += 12 + dlen; } else if (type == DNS_A_RECORD) { debug("Found A-record\n"); found = stop = 1; } else { debug("Unknown type\n"); stop = 1; } } if (found && &p[12] < e) { tmp = p[10] | (p[11] << 8); dlen = ntohs(tmp); p += 12; dns_ip = net_read_ip(p); dns_state = STATE_DONE; } }
static int sb_eth_send(struct udevice *dev, void *packet, int length) { struct eth_sandbox_priv *priv = dev_get_priv(dev); struct ethernet_hdr *eth = packet; debug("eth_sandbox: Send packet %d\n", length); if (dev->seq >= 0 && dev->seq < ARRAY_SIZE(disabled) && disabled[dev->seq]) return 0; if (ntohs(eth->et_protlen) == PROT_ARP) { struct arp_hdr *arp = packet + ETHER_HDR_SIZE; if (ntohs(arp->ar_op) == ARPOP_REQUEST) { struct ethernet_hdr *eth_recv; struct arp_hdr *arp_recv; /* store this as the assumed IP of the fake host */ priv->fake_host_ipaddr = net_read_ip(&arp->ar_tpa); /* Formulate a fake response */ eth_recv = (void *)priv->recv_packet_buffer; memcpy(eth_recv->et_dest, eth->et_src, ARP_HLEN); memcpy(eth_recv->et_src, priv->fake_host_hwaddr, ARP_HLEN); eth_recv->et_protlen = htons(PROT_ARP); arp_recv = (void *)priv->recv_packet_buffer + ETHER_HDR_SIZE; arp_recv->ar_hrd = htons(ARP_ETHER); arp_recv->ar_pro = htons(PROT_IP); arp_recv->ar_hln = ARP_HLEN; arp_recv->ar_pln = ARP_PLEN; arp_recv->ar_op = htons(ARPOP_REPLY); memcpy(&arp_recv->ar_sha, priv->fake_host_hwaddr, ARP_HLEN); net_write_ip(&arp_recv->ar_spa, priv->fake_host_ipaddr); memcpy(&arp_recv->ar_tha, &arp->ar_sha, ARP_HLEN); net_copy_ip(&arp_recv->ar_tpa, &arp->ar_spa); priv->recv_packet_length = ETHER_HDR_SIZE + ARP_HDR_SIZE; } } else if (ntohs(eth->et_protlen) == PROT_IP) { struct ip_udp_hdr *ip = packet + ETHER_HDR_SIZE; if (ip->ip_p == IPPROTO_ICMP) { struct icmp_hdr *icmp = (struct icmp_hdr *)&ip->udp_src; if (icmp->type == ICMP_ECHO_REQUEST) { struct ethernet_hdr *eth_recv; struct ip_udp_hdr *ipr; struct icmp_hdr *icmpr; /* reply to the ping */ memcpy(priv->recv_packet_buffer, packet, length); eth_recv = (void *)priv->recv_packet_buffer; ipr = (void *)priv->recv_packet_buffer + ETHER_HDR_SIZE; icmpr = (struct icmp_hdr *)&ipr->udp_src; memcpy(eth_recv->et_dest, eth->et_src, ARP_HLEN); memcpy(eth_recv->et_src, priv->fake_host_hwaddr, ARP_HLEN); ipr->ip_sum = 0; ipr->ip_off = 0; net_copy_ip((void *)&ipr->ip_dst, &ip->ip_src); net_write_ip((void *)&ipr->ip_src, priv->fake_host_ipaddr); ipr->ip_sum = compute_ip_checksum(ipr, IP_HDR_SIZE); icmpr->type = ICMP_ECHO_REPLY; icmpr->checksum = 0; icmpr->checksum = compute_ip_checksum(icmpr, ICMP_HDR_SIZE); priv->recv_packet_length = length; } } } return 0; }
static void dhcp_options_process(unsigned char *popt, struct bootp *bp) { unsigned char *end = popt + sizeof(*bp) + OPT_SIZE; int oplen; IPaddr_t ip; char str[256]; while (popt < end && *popt != 0xff) { oplen = *(popt + 1); switch (*popt) { case 1: ip = net_read_ip(popt + 2); net_set_netmask(ip); break; case 3: ip = net_read_ip(popt + 2); net_set_gateway(ip); break; case 6: ip = net_read_ip(popt + 2); setenv_ip("nameserver", ip); break; case 12: memcpy(str, popt + 2, oplen); str[oplen] = 0; setenv("hostname", str); break; case 15: memcpy(str, popt + 2, oplen); str[oplen] = 0; setenv("domainname", str); break; case 17: memcpy(str, popt + 2, oplen); str[oplen] = 0; setenv("rootpath", str); break; case 51: net_copy_uint32 (&dhcp_leasetime, (uint32_t *)(popt + 2)); break; case 53: /* Ignore Message Type Option */ break; case 54: net_copy_ip(&net_dhcp_server_ip, (popt + 2)); break; case 58: /* Ignore Renewal Time Option */ break; case 59: /* Ignore Rebinding Time Option */ break; case 66: /* Ignore TFTP server name */ break; case 67: /* vendor opt bootfile */ /* * I can't use dhcp_vendorex_proc here because I need * to write into the bootp packet - even then I had to * pass the bootp packet pointer into here as the * second arg */ memcpy(str, popt + 2, oplen); str[oplen] = 0; if (bp->bp_file[0] == '\0') { /* * only use vendor boot file if we didn't * receive a boot file in the main non-vendor * part of the packet - god only knows why * some vendors chose not to use this perfectly * good spot to store the boot file (join on * Tru64 Unix) it seems mind bogglingly crazy * to me */ printf("*** WARNING: using vendor " "optional boot file\n"); setenv("bootfile", str); } break; default: #ifdef CONFIG_BOOTP_VENDOREX if (dhcp_vendorex_proc (popt)) break; #endif debug("*** Unhandled DHCP Option in OFFER/ACK: %d\n", *popt); break; } popt += oplen + 2; /* Process next option */ } }
void arp_receive(struct ethernet_hdr *et, struct ip_udp_hdr *ip, int len) { struct arp_hdr *arp; struct in_addr reply_ip_addr; uchar *pkt; int eth_hdr_size; /* * We have to deal with two types of ARP packets: * - REQUEST packets will be answered by sending our * IP address - if we know it. * - REPLY packates are expected only after we asked * for the TFTP server's or the gateway's ethernet * address; so if we receive such a packet, we set * the server ethernet address */ debug_cond(DEBUG_NET_PKT, "Got ARP\n"); arp = (struct arp_hdr *)ip; if (len < ARP_HDR_SIZE) { printf("bad length %d < %d\n", len, ARP_HDR_SIZE); return; } if (ntohs(arp->ar_hrd) != ARP_ETHER) return; if (ntohs(arp->ar_pro) != PROT_IP) return; if (arp->ar_hln != ARP_HLEN) return; if (arp->ar_pln != ARP_PLEN) return; if (net_ip.s_addr == 0) return; if (net_read_ip(&arp->ar_tpa).s_addr != net_ip.s_addr) return; switch (ntohs(arp->ar_op)) { case ARPOP_REQUEST: /* reply with our IP address */ debug_cond(DEBUG_DEV_PKT, "Got ARP REQUEST, return our IP\n"); pkt = (uchar *)et; eth_hdr_size = net_update_ether(et, et->et_src, PROT_ARP); pkt += eth_hdr_size; arp->ar_op = htons(ARPOP_REPLY); memcpy(&arp->ar_tha, &arp->ar_sha, ARP_HLEN); net_copy_ip(&arp->ar_tpa, &arp->ar_spa); memcpy(&arp->ar_sha, net_ethaddr, ARP_HLEN); net_copy_ip(&arp->ar_spa, &net_ip); #ifdef CONFIG_CMD_LINK_LOCAL /* * Work-around for brain-damaged Cisco equipment with * arp-proxy enabled. * * If the requesting IP is not on our subnet, wait 5ms to * reply to ARP request so that our reply will overwrite * the arp-proxy's instead of the other way around. */ if ((net_read_ip(&arp->ar_tpa).s_addr & net_netmask.s_addr) != (net_read_ip(&arp->ar_spa).s_addr & net_netmask.s_addr)) udelay(5000); #endif net_send_packet((uchar *)et, eth_hdr_size + ARP_HDR_SIZE); return; case ARPOP_REPLY: /* arp reply */ /* are we waiting for a reply */ if (!net_arp_wait_packet_ip.s_addr) break; #ifdef CONFIG_KEEP_SERVERADDR if (net_server_ip.s_addr == net_arp_wait_packet_ip.s_addr) { char buf[20]; sprintf(buf, "%pM", &arp->ar_sha); setenv("serveraddr", buf); } #endif reply_ip_addr = net_read_ip(&arp->ar_spa); /* matched waiting packet's address */ if (reply_ip_addr.s_addr == net_arp_wait_reply_ip.s_addr) { debug_cond(DEBUG_DEV_PKT, "Got ARP REPLY, set eth addr (%pM)\n", arp->ar_data); /* save address for later use */ if (arp_wait_packet_ethaddr != NULL) memcpy(arp_wait_packet_ethaddr, &arp->ar_sha, ARP_HLEN); net_get_arp_handler()((uchar *)arp, 0, reply_ip_addr, 0, len); /* set the mac address in the waiting packet's header and transmit it */ memcpy(((struct ethernet_hdr *)net_tx_packet)->et_dest, &arp->ar_sha, ARP_HLEN); net_send_packet(net_tx_packet, arp_wait_tx_packet_size); /* no arp request pending now */ net_arp_wait_packet_ip.s_addr = 0; arp_wait_tx_packet_size = 0; arp_wait_packet_ethaddr = NULL; } return; default: debug("Unexpected ARP opcode 0x%x\n", ntohs(arp->ar_op)); return; } }