4422 lines
154 KiB
Diff
4422 lines
154 KiB
Diff
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/Makefile olsrd-0-5-6-ecb9cb41f488/Makefile
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/Makefile 2009-03-25 13:33:46.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/Makefile 2009-03-25 13:37:04.000000000 +0000
|
|
@@ -148,7 +148,7 @@
|
|
ifeq ($(OS),win32)
|
|
SUBDIRS := dot_draw httpinfo mini pgraph secure txtinfo
|
|
else
|
|
-SUBDIRS := bmf dot_draw dyn_gw dyn_gw_plain httpinfo mini nameservice pgraph secure txtinfo watchdog
|
|
+SUBDIRS := bmf dot_draw dyn_gw dyn_gw_plain httpinfo mini nameservice pgraph secure txtinfo watchdog mdns
|
|
endif
|
|
endif
|
|
|
|
@@ -234,6 +234,11 @@
|
|
$(MAKECMD) -C lib/watchdog
|
|
$(MAKECMD) -C lib/watchdog DESTDIR=$(DESTDIR) install
|
|
|
|
+mdns:
|
|
+ $(MAKECMD) -C lib/mdns clean
|
|
+ $(MAKECMD) -C lib/mdns
|
|
+ $(MAKECMD) -C lib/mdns DESTDIR=$(DESTDIR) install
|
|
+
|
|
build_all: all switch libs
|
|
install_all: install install_libs
|
|
clean_all: uberclean clean_libs
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/Makefile olsrd-0-5-6-ecb9cb41f488/lib/mdns/Makefile
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/Makefile 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/Makefile 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,66 @@
|
|
+#
|
|
+# OLSR Basic Multicast Forwarding (BMF) plugin.
|
|
+# Copyright (c) 2005, 2006, Thales Communications, Huizen, The Netherlands.
|
|
+# Written by Erik Tromp.
|
|
+# All rights reserved.
|
|
+#
|
|
+# Redistribution and use in source and binary forms, with or without
|
|
+# modification, are permitted provided that the following conditions
|
|
+# are met:
|
|
+#
|
|
+# * Redistributions of source code must retain the above copyright
|
|
+# notice, this list of conditions and the following disclaimer.
|
|
+# * Redistributions in binary form must reproduce the above copyright
|
|
+# notice, this list of conditions and the following disclaimer in
|
|
+# the documentation and/or other materials provided with the
|
|
+# distribution.
|
|
+# * Neither the name of Thales, BMF nor the names of its
|
|
+# contributors may be used to endorse or promote products derived
|
|
+# from this software without specific prior written permission.
|
|
+#
|
|
+# THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
|
|
+# "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
|
|
+# LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
|
|
+# FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
|
|
+# COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
|
|
+# INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+# BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
|
|
+# LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER
|
|
+# CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
+# LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN
|
|
+# ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
+# POSSIBILITY OF SUCH DAMAGE.
|
|
+#
|
|
+
|
|
+OLSRD_PLUGIN = true
|
|
+PLUGIN_NAME = olsrd_mdns
|
|
+PLUGIN_VER = 1.0.0
|
|
+
|
|
+TOPDIR = ../..
|
|
+include $(TOPDIR)/Makefile.inc
|
|
+
|
|
+LIBS += $(OS_LIB_PTHREAD)
|
|
+
|
|
+# Must be specified along with -lpthread on linux
|
|
+CPPFLAGS += $(OS_CFLAG_PTHREAD)
|
|
+
|
|
+ifneq ($(OS),linux)
|
|
+
|
|
+default_target install clean:
|
|
+ @echo "*** BMF Plugin only supported on Linux, sorry!"
|
|
+
|
|
+else
|
|
+
|
|
+default_target: $(PLUGIN_FULLNAME)
|
|
+
|
|
+$(PLUGIN_FULLNAME): $(OBJS) version-script.txt
|
|
+ $(CC) $(LDFLAGS) -o $(PLUGIN_FULLNAME) $(OBJS) $(LIBS)
|
|
+
|
|
+install: $(PLUGIN_FULLNAME)
|
|
+ $(STRIP) $(PLUGIN_FULLNAME)
|
|
+ $(INSTALL_LIB)
|
|
+
|
|
+clean:
|
|
+ rm -f $(OBJS) $(SRCS:%.c=%.d) $(PLUGIN_FULLNAME)
|
|
+
|
|
+endif
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/Address.c olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/Address.c
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/Address.c 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/Address.c 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,164 @@
|
|
+/*
|
|
+ * OLSR Basic Multicast Forwarding (BMF) plugin.
|
|
+ * Copyright (c) 2005 - 2007, Thales Communications, Huizen, The Netherlands.
|
|
+ * Written by Erik Tromp.
|
|
+ * All rights reserved.
|
|
+ *
|
|
+ * Redistribution and use in source and binary forms, with or without
|
|
+ * modification, are permitted provided that the following conditions
|
|
+ * are met:
|
|
+ *
|
|
+ * * Redistributions of source code must retain the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer.
|
|
+ * * Redistributions in binary form must reproduce the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer in
|
|
+ * the documentation and/or other materials provided with the
|
|
+ * distribution.
|
|
+ * * Neither the name of Thales, BMF nor the names of its
|
|
+ * contributors may be used to endorse or promote products derived
|
|
+ * from this software without specific prior written permission.
|
|
+ *
|
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+ * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
+ * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
+ * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
+ */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * File : Address.c
|
|
+ * Description: IP packet characterization functions
|
|
+ * Created : 29 Jun 2006
|
|
+ *
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+#include "Address.h"
|
|
+
|
|
+/* System includes */
|
|
+#include <stddef.h> /* NULL */
|
|
+#include <string.h> /* strcmp */
|
|
+#include <assert.h> /* assert() */
|
|
+#include <netinet/ip.h> /* struct ip */
|
|
+#include <netinet/udp.h> /* struct udphdr */
|
|
+
|
|
+/* OLSRD includes */
|
|
+#include "defs.h" /* ipequal */
|
|
+#include "olsr_protocol.h" /* OLSRPORT */
|
|
+
|
|
+/* Plugin includes */
|
|
+#include "mdns.h" /* BMF_ENCAP_PORT */
|
|
+#include "NetworkInterfaces.h" /* TBmfInterface */
|
|
+
|
|
+/* Whether or not to flood local broadcast packets (e.g. packets with IP
|
|
+ * destination 192.168.1.255). May be overruled by setting the plugin
|
|
+ * parameter "DoLocalBroadcast" to "no" */
|
|
+int EnableLocalBroadcast = 1;
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : DoLocalBroadcast
|
|
+ * Description: Overrule the default setting, enabling or disabling the
|
|
+ * flooding of local broadcast packets
|
|
+ * Input : enable - either "yes" or "no"
|
|
+ * data - not used
|
|
+ * addon - not used
|
|
+ * Output : none
|
|
+ * Return : success (0) or fail (1)
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int DoLocalBroadcast(
|
|
+ const char* enable,
|
|
+ void* data __attribute__((unused)),
|
|
+ set_plugin_parameter_addon addon __attribute__((unused)))
|
|
+{
|
|
+ if (strcmp(enable, "yes") == 0)
|
|
+ {
|
|
+ EnableLocalBroadcast = 1;
|
|
+ return 0;
|
|
+ }
|
|
+ else if (strcmp(enable, "no") == 0)
|
|
+ {
|
|
+ EnableLocalBroadcast = 0;
|
|
+ return 0;
|
|
+ }
|
|
+
|
|
+ /* Value not recognized */
|
|
+ return 1;
|
|
+}
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : IsMulticast
|
|
+ * Description: Check if an IP address is a multicast address
|
|
+ * Input : ipAddress
|
|
+ * Output : none
|
|
+ * Return : true (1) or false (0)
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int IsMulticast(union olsr_ip_addr* ipAddress)
|
|
+{
|
|
+ assert(ipAddress != NULL);
|
|
+
|
|
+ return (ntohl(ipAddress->v4.s_addr) & 0xF0000000) == 0xE0000000;
|
|
+}
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : IsOlsrOrBmfPacket
|
|
+ * Description: Check if an IP packet is either an OLSR packet or a BMF packet
|
|
+ * Input : ipPacket
|
|
+ * Output : none
|
|
+ * Return : true (1) or false (0)
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+//int IsOlsrOrBmfPacket(unsigned char* ipPacket)
|
|
+//{//MODIFICATA
|
|
+// struct ip* ipHeader;
|
|
+// unsigned int ipHeaderLen;
|
|
+// struct udphdr* udpHeader;
|
|
+// u_int16_t destPort;
|
|
+//
|
|
+// assert(ipPacket != NULL);
|
|
+//
|
|
+// /* OLSR packets are UDP - port 698
|
|
+// * OLSR-BMF packets are UDP - port 50698
|
|
+// * OLSR-Autodetect probe packets are UDP - port 51698 */
|
|
+//
|
|
+// /* Check if UDP */
|
|
+// ipHeader = (struct ip*) ipPacket;
|
|
+// if (ipHeader->ip_p != SOL_UDP)
|
|
+// {
|
|
+// /* Not UDP */
|
|
+// return 0;
|
|
+// }
|
|
+//
|
|
+// /* The total length must be at least large enough to store the UDP header */
|
|
+// ipHeaderLen = GetIpHeaderLength(ipPacket);
|
|
+// if (GetIpTotalLength(ipPacket) < ipHeaderLen + sizeof(struct udphdr))
|
|
+// {
|
|
+// /* Not long enough */
|
|
+// return 0;
|
|
+// }
|
|
+//
|
|
+// /* Go into the UDP header and check port number */
|
|
+// udpHeader = (struct udphdr*) (ipPacket + ipHeaderLen);
|
|
+// destPort = ntohs(udpHeader->dest);
|
|
+//
|
|
+// //if (destPort == OLSRPORT || destPort == BMF_ENCAP_PORT || destPort == 51698)
|
|
+// if (destPort == 5353)
|
|
+// /* TODO: #define for 51698 */
|
|
+// {
|
|
+// return 1;
|
|
+// }
|
|
+//
|
|
+// return 0;
|
|
+//}
|
|
+//
|
|
+/*
|
|
+ * Local Variables:
|
|
+ * c-basic-offset: 2
|
|
+ * indent-tabs-mode: nil
|
|
+ * End:
|
|
+ */
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/Address.h olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/Address.h
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/Address.h 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/Address.h 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,62 @@
|
|
+#ifndef _BMF_ADDRESS_H
|
|
+#define _BMF_ADDRESS_H
|
|
+
|
|
+/*
|
|
+ * OLSR Basic Multicast Forwarding (BMF) plugin.
|
|
+ * Copyright (c) 2005 - 2007, Thales Communications, Huizen, The Netherlands.
|
|
+ * Written by Erik Tromp.
|
|
+ * All rights reserved.
|
|
+ *
|
|
+ * Redistribution and use in source and binary forms, with or without
|
|
+ * modification, are permitted provided that the following conditions
|
|
+ * are met:
|
|
+ *
|
|
+ * * Redistributions of source code must retain the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer.
|
|
+ * * Redistributions in binary form must reproduce the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer in
|
|
+ * the documentation and/or other materials provided with the
|
|
+ * distribution.
|
|
+ * * Neither the name of Thales, BMF nor the names of its
|
|
+ * contributors may be used to endorse or promote products derived
|
|
+ * from this software without specific prior written permission.
|
|
+ *
|
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+ * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
+ * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
+ * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
+ */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * File : Address.h
|
|
+ * Description: IP packet characterization functions
|
|
+ * Created : 29 Jun 2006
|
|
+ *
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+#include "olsr_types.h" /* olsr_ip_addr */
|
|
+#include "olsrd_plugin.h" /* union set_plugin_parameter_addon */
|
|
+#include "interfaces.h" /* struct interface */
|
|
+
|
|
+struct TBmfInterface;
|
|
+
|
|
+extern int EnableLocalBroadcast;
|
|
+
|
|
+int DoLocalBroadcast(const char* enable, void* data, set_plugin_parameter_addon addon);
|
|
+int IsMulticast(union olsr_ip_addr* ipAddress);
|
|
+int IsOlsrOrBmfPacket(unsigned char* ipPacket);
|
|
+
|
|
+#endif /* _BMF_ADDRESS_H */
|
|
+
|
|
+/*
|
|
+ * Local Variables:
|
|
+ * c-basic-offset: 2
|
|
+ * indent-tabs-mode: nil
|
|
+ * End:
|
|
+ */
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/NetworkInterfaces.c olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/NetworkInterfaces.c
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/NetworkInterfaces.c 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/NetworkInterfaces.c 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,1703 @@
|
|
+/*
|
|
+ * OLSR Basic Multicast Forwarding (BMF) plugin.
|
|
+ * Copyright (c) 2005 - 2007, Thales Communications, Huizen, The Netherlands.
|
|
+ * Written by Erik Tromp.
|
|
+ * All rights reserved.
|
|
+ *
|
|
+ * Redistribution and use in source and binary forms, with or without
|
|
+ * modification, are permitted provided that the following conditions
|
|
+ * are met:
|
|
+ *
|
|
+ * * Redistributions of source code must retain the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer.
|
|
+ * * Redistributions in binary form must reproduce the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer in
|
|
+ * the documentation and/or other materials provided with the
|
|
+ * distribution.
|
|
+ * * Neither the name of Thales, BMF nor the names of its
|
|
+ * contributors may be used to endorse or promote products derived
|
|
+ * from this software without specific prior written permission.
|
|
+ *
|
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+ * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
+ * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
+ * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
+ */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * File : NetworkInterfaces.c
|
|
+ * Description: Functions to open and close sockets
|
|
+ * Created : 29 Jun 2006
|
|
+ *
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+#include "NetworkInterfaces.h"
|
|
+
|
|
+/* System includes */
|
|
+#include <stddef.h> /* NULL */
|
|
+#include <syslog.h> /* syslog() */
|
|
+#include <string.h> /* strerror(), strchr(), strcmp() */
|
|
+#include <errno.h> /* errno */
|
|
+#include <unistd.h> /* close() */
|
|
+#include <sys/ioctl.h> /* ioctl() */
|
|
+#include <fcntl.h> /* fcntl() */
|
|
+#include <assert.h> /* assert() */
|
|
+#include <net/if.h> /* socket(), ifreq, if_indextoname(), if_nametoindex() */
|
|
+#include <netinet/in.h> /* htons() */
|
|
+#include <linux/if_ether.h> /* ETH_P_IP */
|
|
+#include <linux/if_packet.h> /* packet_mreq, PACKET_MR_PROMISC, PACKET_ADD_MEMBERSHIP */
|
|
+#include <linux/if_tun.h> /* IFF_TAP */
|
|
+#include <netinet/ip.h> /* struct ip */
|
|
+#include <netinet/udp.h> /* SOL_UDP */
|
|
+#include <stdlib.h> /* atoi, malloc */
|
|
+
|
|
+/* OLSRD includes */
|
|
+#include "olsr.h" /* OLSR_PRINTF() */
|
|
+#include "ipcalc.h"
|
|
+#include "defs.h" /* olsr_cnf */
|
|
+#include "link_set.h" /* get_link_set() */
|
|
+#include "tc_set.h" /* olsr_lookup_tc_entry(), olsr_lookup_tc_edge() */
|
|
+#include "net_olsr.h" /* ipequal */
|
|
+#include "lq_plugin.h"
|
|
+
|
|
+
|
|
+/* Plugin includes */
|
|
+#include "Packet.h" /* IFHWADDRLEN */
|
|
+#include "mdns.h" /* PLUGIN_NAME, MainAddressOf() */
|
|
+#include "Address.h" /* IsMulticast() */
|
|
+
|
|
+/* List of network interface objects used by BMF plugin */
|
|
+struct TBmfInterface* BmfInterfaces = NULL;
|
|
+struct TBmfInterface* LastBmfInterface = NULL;
|
|
+
|
|
+/* Highest-numbered open socket file descriptor. To be used as first
|
|
+ * parameter in calls to select(...). */
|
|
+int HighestSkfd = -1;
|
|
+
|
|
+/* Set of socket file descriptors */
|
|
+fd_set InputSet;
|
|
+
|
|
+/* File descriptor of EtherTunTap interface */
|
|
+int EtherTunTapFd = -1;
|
|
+
|
|
+/* Network interface name of EtherTunTap interface. May be overruled by
|
|
+ * setting the plugin parameter "BmfInterface". */
|
|
+char EtherTunTapIfName[IFNAMSIZ] = "bmf0";
|
|
+
|
|
+/* The underlying mechanism to forward multicast packets. Either:
|
|
+ * - BM_BROADCAST: BMF uses the IP local broadcast as destination address
|
|
+ * - BM_UNICAST_PROMISCUOUS: BMF uses the IP address of the best neighbor as
|
|
+ * destination address. The other neighbors listen promiscuously. */
|
|
+enum TBmfMechanism BmfMechanism = BM_BROADCAST;
|
|
+
|
|
+#define ETHERTUNTAPIPNOTSET 0
|
|
+
|
|
+/* The IP address of the BMF network interface in host byte order.
|
|
+ * May be overruled by setting the plugin parameter "BmfInterfaceIp". */
|
|
+u_int32_t EtherTunTapIp = ETHERTUNTAPIPNOTSET;
|
|
+
|
|
+/* 255.255.255.255 in host byte order. May be overruled by
|
|
+ * setting the plugin parameter "BmfInterfaceIp". */
|
|
+u_int32_t EtherTunTapIpMask = 0xFFFFFFFF;
|
|
+
|
|
+/* The IP broadcast address of the BMF network interface in host byte order.
|
|
+ * May be overruled by setting the plugin parameter "BmfinterfaceIp". */
|
|
+u_int32_t EtherTunTapIpBroadcast = ETHERTUNTAPIPNOTSET;
|
|
+
|
|
+/* Whether or not the configuration has overruled the default IP
|
|
+ * configuration of the EtherTunTap interface */
|
|
+int TunTapIpOverruled = 0;
|
|
+
|
|
+/* Whether or not to capture packets on the OLSR-enabled
|
|
+ * interfaces (in promiscuous mode). May be overruled by setting the plugin
|
|
+ * parameter "CapturePacketsOnOlsrInterfaces" to "yes". */
|
|
+int CapturePacketsOnOlsrInterfaces = 0;
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : SetBmfInterfaceName
|
|
+ * Description: Overrule the default network interface name ("bmf0") of the
|
|
+ * EtherTunTap interface
|
|
+ * Input : ifname - network interface name (e.g. "mybmf0")
|
|
+ * data - not used
|
|
+ * addon - not used
|
|
+ * Output : none
|
|
+ * Return : success (0) or fail (1)
|
|
+ * Data Used : EtherTunTapIfName
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int SetBmfInterfaceName(
|
|
+ const char* ifname,
|
|
+ void* data __attribute__((unused)),
|
|
+ set_plugin_parameter_addon addon __attribute__((unused)))
|
|
+{
|
|
+ strncpy(EtherTunTapIfName, ifname, IFNAMSIZ - 1);
|
|
+ EtherTunTapIfName[IFNAMSIZ - 1] = '\0'; /* Ensures null termination */
|
|
+ return 0;
|
|
+} /* SetBmfInterfaceName */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : SetBmfInterfaceIp
|
|
+ * Description: Overrule the default IP address and prefix length
|
|
+ * ("10.255.255.253/30") of the EtherTunTap interface
|
|
+ * Input : ip - IP address string, followed by '/' and prefix length
|
|
+ * data - not used
|
|
+ * addon - not used
|
|
+ * Output : none
|
|
+ * Return : success (0) or fail (1)
|
|
+ * Data Used : EtherTunTapIp, EtherTunTapIpMask, EtherTunTapIpBroadcast,
|
|
+ * TunTapIpOverruled
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int SetBmfInterfaceIp(
|
|
+ const char* ip,
|
|
+ void* data __attribute__((unused)),
|
|
+ set_plugin_parameter_addon addon __attribute__((unused)))
|
|
+{
|
|
+#define IPV4_MAX_ADDRLEN 16
|
|
+#define IPV4_MAX_PREFIXLEN 32
|
|
+ char* slashAt;
|
|
+ char ipAddr[IPV4_MAX_ADDRLEN];
|
|
+ struct in_addr sinaddr;
|
|
+ int prefixLen;
|
|
+ int i;
|
|
+
|
|
+ /* Inspired by function str2prefix_ipv4 as found in Quagga source
|
|
+ * file lib/prefix.c */
|
|
+
|
|
+ /* Find slash inside string. */
|
|
+ slashAt = strchr(ip, '/');
|
|
+
|
|
+ /* String doesn't contain slash. */
|
|
+ if (slashAt == NULL || slashAt - ip >= IPV4_MAX_ADDRLEN)
|
|
+ {
|
|
+ /* No prefix length specified, or IP address too long */
|
|
+ return 1;
|
|
+ }
|
|
+
|
|
+ strncpy(ipAddr, ip, slashAt - ip);
|
|
+ *(ipAddr + (slashAt - ip)) = '\0';
|
|
+ if (inet_aton(ipAddr, &sinaddr) == 0)
|
|
+ {
|
|
+ /* Invalid address passed */
|
|
+ return 1;
|
|
+ }
|
|
+
|
|
+ EtherTunTapIp = ntohl(sinaddr.s_addr);
|
|
+
|
|
+ /* Get prefix length. */
|
|
+ prefixLen = atoi(++slashAt);
|
|
+ if (prefixLen <= 0 || prefixLen > IPV4_MAX_PREFIXLEN)
|
|
+ {
|
|
+ return 1;
|
|
+ }
|
|
+
|
|
+ /* Compose IP subnet mask in host byte order */
|
|
+ EtherTunTapIpMask = 0;
|
|
+ for (i = 0; i < prefixLen; i++)
|
|
+ {
|
|
+ EtherTunTapIpMask |= (1 << (IPV4_MAX_PREFIXLEN - 1 - i));
|
|
+ }
|
|
+
|
|
+ /* Compose IP broadcast address in host byte order */
|
|
+ EtherTunTapIpBroadcast = EtherTunTapIp;
|
|
+ for (i = prefixLen; i < IPV4_MAX_PREFIXLEN; i++)
|
|
+ {
|
|
+ EtherTunTapIpBroadcast |= (1 << (IPV4_MAX_PREFIXLEN - 1 - i));
|
|
+ }
|
|
+
|
|
+ TunTapIpOverruled = 1;
|
|
+
|
|
+ return 0;
|
|
+} /* SetBmfInterfaceIp */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : SetCapturePacketsOnOlsrInterfaces
|
|
+ * Description: Overrule the default setting, enabling or disabling the
|
|
+ * capturing of packets on OLSR-enabled interfaces.
|
|
+ * Input : enable - either "yes" or "no"
|
|
+ * data - not used
|
|
+ * addon - not used
|
|
+ * Output : none
|
|
+ * Return : success (0) or fail (1)
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int SetCapturePacketsOnOlsrInterfaces(
|
|
+ const char* enable,
|
|
+ void* data __attribute__((unused)),
|
|
+ set_plugin_parameter_addon addon __attribute__((unused)))
|
|
+{
|
|
+ if (strcmp(enable, "yes") == 0)
|
|
+ {
|
|
+ CapturePacketsOnOlsrInterfaces = 1;
|
|
+ return 0;
|
|
+ }
|
|
+ else if (strcmp(enable, "no") == 0)
|
|
+ {
|
|
+ CapturePacketsOnOlsrInterfaces = 0;
|
|
+ return 0;
|
|
+ }
|
|
+
|
|
+ /* Value not recognized */
|
|
+ return 1;
|
|
+} /* SetCapturePacketsOnOlsrInterfaces */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : SetBmfMechanism
|
|
+ * Description: Overrule the default BMF mechanism to either BM_BROADCAST or
|
|
+ * BM_UNICAST_PROMISCUOUS.
|
|
+ * Input : mechanism - either "Broadcast" or "UnicastPromiscuous"
|
|
+ * data - not used
|
|
+ * addon - not used
|
|
+ * Output : none
|
|
+ * Return : success (0) or fail (1)
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int SetBmfMechanism(
|
|
+ const char* mechanism,
|
|
+ void* data __attribute__((unused)),
|
|
+ set_plugin_parameter_addon addon __attribute__((unused)))
|
|
+{
|
|
+ if (strcmp(mechanism, "Broadcast") == 0)
|
|
+ {
|
|
+ BmfMechanism = BM_BROADCAST;
|
|
+ return 0;
|
|
+ }
|
|
+ else if (strcmp(mechanism, "UnicastPromiscuous") == 0)
|
|
+ {
|
|
+ BmfMechanism = BM_UNICAST_PROMISCUOUS;
|
|
+ return 0;
|
|
+ }
|
|
+
|
|
+ /* Value not recognized */
|
|
+ return 1;
|
|
+} /* SetBmfMechanism */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : AddDescriptorToInputSet
|
|
+ * Description: Add a socket descriptor to the global set of socket file descriptors
|
|
+ * Input : skfd - socket file descriptor
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : HighestSkfd, InputSet
|
|
+ * Notes : Keeps track of the highest-numbered descriptor
|
|
+ * ------------------------------------------------------------------------- */
|
|
+static void AddDescriptorToInputSet(int skfd)
|
|
+{
|
|
+ /* Keep the highest-numbered descriptor */
|
|
+ if (skfd > HighestSkfd)
|
|
+ {
|
|
+ HighestSkfd = skfd;
|
|
+ }
|
|
+
|
|
+ /* Add descriptor to input set */
|
|
+ FD_SET(skfd, &InputSet);
|
|
+} /* AddDescriptorToInputSet */
|
|
+
|
|
+/* To save the state of the IP spoof filter for the EtherTunTap interface */
|
|
+static char EthTapSpoofState = '1';
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : DeactivateSpoofFilter
|
|
+ * Description: Deactivates the Linux anti-spoofing filter for the tuntap
|
|
+ * interface
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : fail (0) or success (1)
|
|
+ * Data Used : EtherTunTapIfName, EthTapSpoofState
|
|
+ * Notes : Saves the current filter state for later restoring
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int DeactivateSpoofFilter(void)
|
|
+{
|
|
+ FILE* procSpoof;
|
|
+ char procFile[FILENAME_MAX];
|
|
+
|
|
+ /* Generate the procfile name */
|
|
+ sprintf(procFile, "/proc/sys/net/ipv4/conf/%s/rp_filter", EtherTunTapIfName);
|
|
+
|
|
+ /* Open procfile for reading */
|
|
+ procSpoof = fopen(procFile, "r");
|
|
+ if (procSpoof == NULL)
|
|
+ {
|
|
+ fprintf(
|
|
+ stderr,
|
|
+ "WARNING! Could not open the %s file to check/disable the IP spoof filter!\n"
|
|
+ "Are you using the procfile filesystem?\n"
|
|
+ "Does your system support IPv4?\n"
|
|
+ "I will continue (in 3 sec) - but you should manually ensure that IP spoof\n"
|
|
+ "filtering is disabled!\n\n",
|
|
+ procFile);
|
|
+
|
|
+ sleep(3);
|
|
+ return 0;
|
|
+ }
|
|
+
|
|
+ EthTapSpoofState = fgetc(procSpoof);
|
|
+ fclose(procSpoof);
|
|
+
|
|
+ /* Open procfile for writing */
|
|
+ procSpoof = fopen(procFile, "w");
|
|
+ if (procSpoof == NULL)
|
|
+ {
|
|
+ fprintf(stderr, "Could not open %s for writing!\n", procFile);
|
|
+ fprintf(
|
|
+ stderr,
|
|
+ "I will continue (in 3 sec) - but you should manually ensure that IP"
|
|
+ " spoof filtering is disabled!\n\n");
|
|
+ sleep(3);
|
|
+ return 0;
|
|
+ }
|
|
+
|
|
+ syslog(LOG_INFO, "Writing \"0\" to %s", procFile);
|
|
+ fputs("0", procSpoof);
|
|
+
|
|
+ fclose(procSpoof);
|
|
+
|
|
+ return 1;
|
|
+} /* DeactivateSpoofFilter */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : RestoreSpoofFilter
|
|
+ * Description: Restores the Linux anti-spoofing filter setting for the tuntap
|
|
+ * interface
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : EtherTunTapIfName, EthTapSpoofState
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void RestoreSpoofFilter(void)
|
|
+{
|
|
+ FILE* procSpoof;
|
|
+ char procFile[FILENAME_MAX];
|
|
+
|
|
+ /* Generate the procfile name */
|
|
+ sprintf(procFile, "/proc/sys/net/ipv4/conf/%s/rp_filter", EtherTunTapIfName);
|
|
+
|
|
+ /* Open procfile for writing */
|
|
+ procSpoof = fopen(procFile, "w");
|
|
+ if (procSpoof == NULL)
|
|
+ {
|
|
+ fprintf(stderr, "Could not open %s for writing!\nSettings not restored!\n", procFile);
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ syslog(LOG_INFO, "Resetting %s to %c\n", procFile, EthTapSpoofState);
|
|
+
|
|
+ fputc(EthTapSpoofState, procSpoof);
|
|
+ fclose(procSpoof);
|
|
+ }
|
|
+} /* RestoreSpoofFilter */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : FindNeighbors
|
|
+ * Description: Find the neighbors on a network interface to forward a BMF
|
|
+ * packet to
|
|
+ * Input : intf - the network interface
|
|
+ * source - the source IP address of the BMF packet
|
|
+ * forwardedBy - the IP address of the node that forwarded the BMF
|
|
+ * packet
|
|
+ * forwardedTo - the IP address of the node to which the BMF packet
|
|
+ * was directed
|
|
+ * Output : neighbors - list of (up to a number of 'FanOutLimit') neighbors.
|
|
+ * bestNeighbor - the best neighbor (in terms of lowest cost or ETX
|
|
+ * value)
|
|
+ * nPossibleNeighbors - number of found possible neighbors
|
|
+ * Data Used : FanOutLimit
|
|
+ * ------------------------------------------------------------------------- */
|
|
+//void FindNeighbors(
|
|
+// struct TBestNeighbors* neighbors,
|
|
+// struct link_entry** bestNeighbor,
|
|
+// struct TBmfInterface* intf,
|
|
+// union olsr_ip_addr* source,
|
|
+// union olsr_ip_addr* forwardedBy,
|
|
+// union olsr_ip_addr* forwardedTo,
|
|
+// int* nPossibleNeighbors)
|
|
+//{
|
|
+// struct link_entry* walker;
|
|
+// olsr_linkcost previousLinkEtx = LINK_COST_BROKEN;
|
|
+// olsr_linkcost bestEtx = LINK_COST_BROKEN;
|
|
+//
|
|
+// int i;
|
|
+//
|
|
+// /* Initialize */
|
|
+// *bestNeighbor = NULL;
|
|
+// for (i = 0; i < MAX_UNICAST_NEIGHBORS; i++)
|
|
+// {
|
|
+// neighbors->links[i] = NULL;
|
|
+// }
|
|
+// *nPossibleNeighbors = 0;
|
|
+//
|
|
+// if (forwardedBy != NULL)
|
|
+// {
|
|
+// /* Retrieve the cost of the link from 'forwardedBy' to myself */
|
|
+// struct link_entry* bestLinkFromForwarder = get_best_link_to_neighbor(forwardedBy);
|
|
+// if (bestLinkFromForwarder != NULL)
|
|
+// {
|
|
+// previousLinkEtx = bestLinkFromForwarder->linkcost;
|
|
+// }
|
|
+// }
|
|
+//
|
|
+// OLSR_FOR_ALL_LINK_ENTRIES(walker) {
|
|
+// struct ipaddr_str buf;
|
|
+// union olsr_ip_addr* neighborMainIp;
|
|
+// struct link_entry* bestLinkToNeighbor;
|
|
+// struct tc_entry* tcLastHop;
|
|
+// float currEtx;
|
|
+//
|
|
+// /* Consider only links from the specified interface */
|
|
+// if (! olsr_ipequal(&intf->intAddr, &walker->local_iface_addr))
|
|
+// {
|
|
+// continue; /* for */
|
|
+// }
|
|
+//
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> Considering forwarding pkt on \"%s\" to %s\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// intf->ifName,
|
|
+// olsr_ip_to_string(&buf, &walker->neighbor_iface_addr));
|
|
+//
|
|
+// neighborMainIp = MainAddressOf(&walker->neighbor_iface_addr);
|
|
+//
|
|
+// /* Consider only neighbors with an IP address that differs from the
|
|
+// * passed IP addresses (if passed). Rely on short-circuit boolean evaluation. */
|
|
+// if (source != NULL && olsr_ipequal(neighborMainIp, MainAddressOf(source)))
|
|
+// {
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> Not forwarding to %s: is source of pkt\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// olsr_ip_to_string(&buf, &walker->neighbor_iface_addr));
|
|
+//
|
|
+// continue; /* for */
|
|
+// }
|
|
+//
|
|
+// /* Rely on short-circuit boolean evaluation */
|
|
+// if (forwardedBy != NULL && olsr_ipequal(neighborMainIp, MainAddressOf(forwardedBy)))
|
|
+// {
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> Not forwarding to %s: is the node that forwarded the pkt\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// olsr_ip_to_string(&buf, &walker->neighbor_iface_addr));
|
|
+//
|
|
+// continue; /* for */
|
|
+// }
|
|
+//
|
|
+// /* Rely on short-circuit boolean evaluation */
|
|
+// if (forwardedTo != NULL && olsr_ipequal(neighborMainIp, MainAddressOf(forwardedTo)))
|
|
+// {
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> Not forwarding to %s: is the node to which the pkt was forwarded\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// olsr_ip_to_string(&buf, &walker->neighbor_iface_addr));
|
|
+//
|
|
+// continue; /* for */
|
|
+// }
|
|
+//
|
|
+// /* Found a candidate neighbor to direct our packet to */
|
|
+//
|
|
+// /* Calculate the link quality (ETX) of the link to the found neighbor */
|
|
+// currEtx = walker->linkcost;
|
|
+//
|
|
+// if (currEtx >= LINK_COST_BROKEN)
|
|
+// {
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> Not forwarding to %s: link is timing out\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// olsr_ip_to_string(&buf, &walker->neighbor_iface_addr));
|
|
+//
|
|
+// continue; /* for */
|
|
+// }
|
|
+//
|
|
+// /* Compare costs to check if the candidate neighbor is best reached via 'intf' */
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> Forwarding pkt to %s will cost ETX %5.2f\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// olsr_ip_to_string(&buf, &walker->neighbor_iface_addr),
|
|
+// currEtx);
|
|
+//
|
|
+// /*
|
|
+// * If the candidate neighbor is best reached via another interface, then skip
|
|
+// * the candidate neighbor; the candidate neighbor has been / will be selected via that
|
|
+// * other interface.
|
|
+// */
|
|
+// bestLinkToNeighbor = get_best_link_to_neighbor(&walker->neighbor_iface_addr);
|
|
+//
|
|
+// if (walker != bestLinkToNeighbor)
|
|
+// {
|
|
+// if (bestLinkToNeighbor == NULL)
|
|
+// {
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> Not forwarding to %s: no link found\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// olsr_ip_to_string(&buf, &walker->neighbor_iface_addr));
|
|
+// }
|
|
+// else
|
|
+// {
|
|
+//#ifndef NODEBUG
|
|
+// struct interface* bestIntf = if_ifwithaddr(&bestLinkToNeighbor->local_iface_addr);
|
|
+// struct lqtextbuffer lqbuffer;
|
|
+//#endif
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> Not forwarding to %s: \"%s\" gives a better link to this neighbor, costing %s\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// olsr_ip_to_string(&buf, &walker->neighbor_iface_addr),
|
|
+// bestIntf->int_name,
|
|
+// get_linkcost_text(bestLinkToNeighbor->linkcost, 0, &lqbuffer));
|
|
+// }
|
|
+//
|
|
+// continue; /* for */
|
|
+// }
|
|
+//
|
|
+// if (forwardedBy != NULL)
|
|
+// {
|
|
+//#ifndef NODEBUG
|
|
+// struct ipaddr_str forwardedByBuf, niaBuf;
|
|
+// struct lqtextbuffer lqbuffer;
|
|
+//#endif
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> 2-hop path from %s via me to %s will cost ETX %s\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// olsr_ip_to_string(&forwardedByBuf, forwardedBy),
|
|
+// olsr_ip_to_string(&niaBuf, &walker->neighbor_iface_addr),
|
|
+// get_linkcost_text(previousLinkEtx + currEtx, 1, &lqbuffer));
|
|
+// }
|
|
+//
|
|
+// /* Check the topology table whether the 'forwardedBy' node is itself a direct
|
|
+// * neighbor of the candidate neighbor, at a lower cost than the 2-hop route
|
|
+// * via myself. If so, we do not need to forward the BMF packet to the candidate
|
|
+// * neighbor, because the 'forwardedBy' node will forward the packet. */
|
|
+// if (forwardedBy != NULL)
|
|
+// {
|
|
+// tcLastHop = olsr_lookup_tc_entry(MainAddressOf(forwardedBy));
|
|
+// if (tcLastHop != NULL)
|
|
+// {
|
|
+// struct tc_edge_entry* tc_edge;
|
|
+//
|
|
+// tc_edge = olsr_lookup_tc_edge(tcLastHop, MainAddressOf(&walker->neighbor_iface_addr));
|
|
+//
|
|
+// /* We are not interested in dead-end edges. */
|
|
+// if (tc_edge) {
|
|
+// olsr_linkcost tcEtx = tc_edge->cost;
|
|
+//
|
|
+// if (previousLinkEtx + currEtx > tcEtx)
|
|
+// {
|
|
+//#ifndef NODEBUG
|
|
+// struct ipaddr_str neighbor_iface_buf, forw_buf;
|
|
+// struct lqtextbuffer lqbuffer;
|
|
+// olsr_ip_to_string(&neighbor_iface_buf, &walker->neighbor_iface_addr);
|
|
+//#endif
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> Not forwarding to %s: I am not an MPR between %s and %s, direct link costs %s\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// neighbor_iface_buf.buf,
|
|
+// olsr_ip_to_string(&forw_buf, forwardedBy),
|
|
+// neighbor_iface_buf.buf,
|
|
+// get_linkcost_text(tcEtx, 0, &lqbuffer));
|
|
+//
|
|
+// continue; /* for */
|
|
+// } /* if */
|
|
+// } /* if */
|
|
+// } /* if */
|
|
+// } /* if */
|
|
+//
|
|
+// /* Remember the best neighbor. If all are very bad, remember none. */
|
|
+// if (currEtx < bestEtx)
|
|
+// {
|
|
+// *bestNeighbor = walker;
|
|
+// bestEtx = currEtx;
|
|
+// }
|
|
+//
|
|
+// /* Fill the list with up to 'FanOutLimit' neighbors. If there
|
|
+// * are more neighbors, broadcast is used instead of unicast. In that
|
|
+// * case we do not need the list of neighbors. */
|
|
+// if (*nPossibleNeighbors < FanOutLimit)
|
|
+// {
|
|
+// neighbors->links[*nPossibleNeighbors] = walker;
|
|
+// }
|
|
+//
|
|
+// *nPossibleNeighbors += 1;
|
|
+// } OLSR_FOR_ALL_LINK_ENTRIES_END(walker);
|
|
+//
|
|
+// /* Display the result of the neighbor search */
|
|
+// if (*nPossibleNeighbors == 0)
|
|
+// {
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> No suitable neighbor found to forward to on \"%s\"\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// intf->ifName);
|
|
+// }
|
|
+// else
|
|
+// {
|
|
+// struct ipaddr_str buf;
|
|
+// OLSR_PRINTF(
|
|
+// 9,
|
|
+// "%s: ----> %d neighbors found on \"%s\"; best neighbor to forward to: %s\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// *nPossibleNeighbors,
|
|
+// intf->ifName,
|
|
+// olsr_ip_to_string(&buf, &(*bestNeighbor)->neighbor_iface_addr));
|
|
+// } /* if */
|
|
+//
|
|
+//} /* FindNeighbors */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CreateCaptureSocket
|
|
+ * Description: Create socket for promiscuously capturing multicast IP traffic
|
|
+ * Input : ifname - network interface (e.g. "eth0")
|
|
+ * Output : none
|
|
+ * Return : the socket descriptor ( >= 0), or -1 if an error occurred
|
|
+ * Data Used : none
|
|
+ * Notes : The socket is a cooked IP packet socket, bound to the specified
|
|
+ * network interface
|
|
+ * ------------------------------------------------------------------------- */
|
|
+static int CreateCaptureSocket(const char* ifName)
|
|
+{
|
|
+ int ifIndex = if_nametoindex(ifName);
|
|
+ struct packet_mreq mreq;
|
|
+ struct ifreq req;
|
|
+ struct sockaddr_ll bindTo;
|
|
+ int skfd = 0;
|
|
+ /* Open cooked IP packet socket */
|
|
+ if (olsr_cnf->ip_version == AF_INET){
|
|
+ skfd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP));
|
|
+ }
|
|
+ else {
|
|
+ skfd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IPV6));
|
|
+ }
|
|
+ if (skfd < 0)
|
|
+ {
|
|
+ BmfPError("socket(PF_PACKET) error");
|
|
+ return -1;
|
|
+ }
|
|
+
|
|
+ /* Set interface to promiscuous mode */
|
|
+ memset(&mreq, 0, sizeof(struct packet_mreq));
|
|
+ mreq.mr_ifindex = ifIndex;
|
|
+ mreq.mr_type = PACKET_MR_PROMISC;
|
|
+ if (setsockopt(skfd, SOL_PACKET, PACKET_ADD_MEMBERSHIP, &mreq, sizeof(mreq)) < 0)
|
|
+ {
|
|
+ BmfPError("setsockopt(PACKET_MR_PROMISC) error");
|
|
+ close(skfd);
|
|
+ return -1;
|
|
+ }
|
|
+
|
|
+ /* Get hardware (MAC) address */
|
|
+ memset(&req, 0, sizeof(struct ifreq));
|
|
+ strncpy(req.ifr_name, ifName, IFNAMSIZ - 1);
|
|
+ req.ifr_name[IFNAMSIZ-1] = '\0'; /* Ensures null termination */
|
|
+ if (ioctl(skfd, SIOCGIFHWADDR, &req) < 0)
|
|
+ {
|
|
+ BmfPError("error retrieving MAC address");
|
|
+ close(skfd);
|
|
+ return -1;
|
|
+ }
|
|
+
|
|
+ /* Bind the socket to the specified interface */
|
|
+ memset(&bindTo, 0, sizeof(bindTo));
|
|
+ bindTo.sll_family = AF_PACKET;
|
|
+ if (olsr_cnf->ip_version == AF_INET){
|
|
+ bindTo.sll_protocol = htons(ETH_P_IP);
|
|
+ }
|
|
+ else{
|
|
+ bindTo.sll_protocol = htons(ETH_P_IPV6);
|
|
+ }
|
|
+ bindTo.sll_ifindex = ifIndex;
|
|
+ memcpy(bindTo.sll_addr, req.ifr_hwaddr.sa_data, IFHWADDRLEN);
|
|
+ bindTo.sll_halen = IFHWADDRLEN;
|
|
+
|
|
+ if (bind(skfd, (struct sockaddr*)&bindTo, sizeof(bindTo)) < 0)
|
|
+ {
|
|
+ BmfPError("bind() error");
|
|
+ close(skfd);
|
|
+ return -1;
|
|
+ }
|
|
+
|
|
+ /* Set socket to blocking operation */
|
|
+ if (fcntl(skfd, F_SETFL, fcntl(skfd, F_GETFL, 0) & ~O_NONBLOCK) < 0)
|
|
+ {
|
|
+ BmfPError("fcntl() error");
|
|
+ close(skfd);
|
|
+ return -1;
|
|
+ }
|
|
+
|
|
+ AddDescriptorToInputSet(skfd);
|
|
+ add_olsr_socket(skfd,&DoMDNS);
|
|
+
|
|
+ return skfd;
|
|
+} /* CreateCaptureSocket */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CreateListeningSocket
|
|
+ * Description: Create socket for promiscuously listening to BMF packets.
|
|
+ * Used only when 'BmfMechanism' is BM_UNICAST_PROMISCUOUS
|
|
+ * Input : ifname - network interface (e.g. "eth0")
|
|
+ * Output : none
|
|
+ * Return : the socket descriptor ( >= 0), or -1 if an error occurred
|
|
+ * Data Used : none
|
|
+ * Notes : The socket is a cooked IP packet socket, bound to the specified
|
|
+ * network interface
|
|
+ * ------------------------------------------------------------------------- */
|
|
+//static int CreateListeningSocket(const char* ifName)
|
|
+//{
|
|
+// int ifIndex = if_nametoindex(ifName);
|
|
+// struct packet_mreq mreq;
|
|
+// struct ifreq req;
|
|
+// struct sockaddr_ll bindTo;
|
|
+//
|
|
+// /* Open cooked IP packet socket */
|
|
+// int skfd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP));
|
|
+// if (skfd < 0)
|
|
+// {
|
|
+// BmfPError("socket(PF_PACKET) error");
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// /* Set interface to promiscuous mode */
|
|
+// memset(&mreq, 0, sizeof(struct packet_mreq));
|
|
+// mreq.mr_ifindex = ifIndex;
|
|
+// mreq.mr_type = PACKET_MR_PROMISC;
|
|
+// if (setsockopt(skfd, SOL_PACKET, PACKET_ADD_MEMBERSHIP, &mreq, sizeof(mreq)) < 0)
|
|
+// {
|
|
+// BmfPError("setsockopt(PACKET_MR_PROMISC) error");
|
|
+// close(skfd);
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// /* Get hardware (MAC) address */
|
|
+// memset(&req, 0, sizeof(struct ifreq));
|
|
+// strncpy(req.ifr_name, ifName, IFNAMSIZ - 1);
|
|
+// req.ifr_name[IFNAMSIZ-1] = '\0'; /* Ensures null termination */
|
|
+// if (ioctl(skfd, SIOCGIFHWADDR, &req) < 0)
|
|
+// {
|
|
+// BmfPError("error retrieving MAC address");
|
|
+// close(skfd);
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// /* Bind the socket to the specified interface */
|
|
+// memset(&bindTo, 0, sizeof(bindTo));
|
|
+// bindTo.sll_family = AF_PACKET;
|
|
+// bindTo.sll_protocol = htons(ETH_P_IP);
|
|
+// bindTo.sll_ifindex = ifIndex;
|
|
+// memcpy(bindTo.sll_addr, req.ifr_hwaddr.sa_data, IFHWADDRLEN);
|
|
+// bindTo.sll_halen = IFHWADDRLEN;
|
|
+//
|
|
+// if (bind(skfd, (struct sockaddr*)&bindTo, sizeof(bindTo)) < 0)
|
|
+// {
|
|
+// BmfPError("bind() error");
|
|
+// close(skfd);
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// /* Set socket to blocking operation */
|
|
+// if (fcntl(skfd, F_SETFL, fcntl(skfd, F_GETFL, 0) & ~O_NONBLOCK) < 0)
|
|
+// {
|
|
+// BmfPError("fcntl() error");
|
|
+// close(skfd);
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// AddDescriptorToInputSet(skfd);
|
|
+//
|
|
+// return skfd;
|
|
+//} /* CreateListeningSocket */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CreateEncapsulateSocket
|
|
+ * Description: Create a socket for sending and receiving encapsulated
|
|
+ * multicast packets
|
|
+ * Input : ifname - network interface (e.g. "eth0")
|
|
+ * Output : none
|
|
+ * Return : the socket descriptor ( >= 0), or -1 if an error occurred
|
|
+ * Data Used : none
|
|
+ * Notes : The socket is an UDP (datagram) over IP socket, bound to the
|
|
+ * specified network interface
|
|
+ * ------------------------------------------------------------------------- */
|
|
+//static int CreateEncapsulateSocket(const char* ifName)
|
|
+//{
|
|
+// int on = 1;
|
|
+// struct sockaddr_in bindTo;
|
|
+//
|
|
+// /* Open UDP-IP socket */
|
|
+// int skfd = socket(PF_INET, SOCK_DGRAM, 0);
|
|
+// if (skfd < 0)
|
|
+// {
|
|
+// BmfPError("socket(PF_INET) error");
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// /* Enable sending to broadcast addresses */
|
|
+// if (setsockopt(skfd, SOL_SOCKET, SO_BROADCAST, &on, sizeof(on)) < 0)
|
|
+// {
|
|
+// BmfPError("setsockopt(SO_BROADCAST) error");
|
|
+// close(skfd);
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// /* Bind to the specific network interfaces indicated by ifName. */
|
|
+// /* When using Kernel 2.6 this must happer prior to the port binding! */
|
|
+// if (setsockopt(skfd, SOL_SOCKET, SO_BINDTODEVICE, ifName, strlen(ifName) + 1) < 0)
|
|
+// {
|
|
+// BmfPError("setsockopt(SO_BINDTODEVICE) error");
|
|
+// close(skfd);
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// /* Bind to BMF port */
|
|
+// memset(&bindTo, 0, sizeof(bindTo));
|
|
+// bindTo.sin_family = AF_INET;
|
|
+// bindTo.sin_port = htons(BMF_ENCAP_PORT);
|
|
+// bindTo.sin_addr.s_addr = htonl(INADDR_ANY);
|
|
+//
|
|
+// if (bind(skfd, (struct sockaddr*)&bindTo, sizeof(bindTo)) < 0)
|
|
+// {
|
|
+// BmfPError("bind() error");
|
|
+// close(skfd);
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// /* Set socket to blocking operation */
|
|
+// if (fcntl(skfd, F_SETFL, fcntl(skfd, F_GETFL, 0) & ~O_NONBLOCK) < 0)
|
|
+// {
|
|
+// BmfPError("fcntl() error");
|
|
+// close(skfd);
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// AddDescriptorToInputSet(skfd);
|
|
+//
|
|
+// return skfd;
|
|
+//} /* CreateEncapsulateSocket */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CreateLocalEtherTunTap
|
|
+ * Description: Creates and brings up an EtherTunTap interface
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : the socket file descriptor (>= 0), or -1 in case of failure
|
|
+ * Data Used : EtherTunTapIfName - name used for the tuntap interface (e.g.
|
|
+ * "bmf0")
|
|
+ * EtherTunTapIp
|
|
+ * EtherTunTapIpMask
|
|
+ * EtherTunTapIpBroadcast
|
|
+ * BmfInterfaces
|
|
+ * Note : Order dependency: call this function only if BmfInterfaces
|
|
+ * is filled with a list of network interfaces.
|
|
+ * ------------------------------------------------------------------------- */
|
|
+//static int CreateLocalEtherTunTap(void)
|
|
+//{
|
|
+// static const char deviceName[] = "/dev/net/tun";
|
|
+// struct ifreq ifreq;
|
|
+// int etfd;
|
|
+// int ioctlSkfd;
|
|
+// int ioctlres;
|
|
+//
|
|
+// etfd = open(deviceName, O_RDWR | O_NONBLOCK);
|
|
+// if (etfd < 0)
|
|
+// {
|
|
+// BmfPError("error opening %s", deviceName);
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// memset(&ifreq, 0, sizeof(ifreq));
|
|
+// strncpy(ifreq.ifr_name, EtherTunTapIfName, IFNAMSIZ - 1);
|
|
+// ifreq.ifr_name[IFNAMSIZ - 1] = '\0'; /* Ensures null termination */
|
|
+//
|
|
+// /* Specify the IFF_TUN flag for IP packets.
|
|
+// * Specify IFF_NO_PI for not receiving extra meta packet information. */
|
|
+// ifreq.ifr_flags = IFF_TUN;
|
|
+// ifreq.ifr_flags |= IFF_NO_PI;
|
|
+//
|
|
+// if (ioctl(etfd, TUNSETIFF, (void *)&ifreq) < 0)
|
|
+// {
|
|
+// BmfPError("ioctl(TUNSETIFF) error on %s", deviceName);
|
|
+// close(etfd);
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// memset(&ifreq, 0, sizeof(ifreq));
|
|
+// strncpy(ifreq.ifr_name, EtherTunTapIfName, IFNAMSIZ - 1);
|
|
+// ifreq.ifr_name[IFNAMSIZ - 1] = '\0'; /* Ensures null termination */
|
|
+// ifreq.ifr_addr.sa_family = AF_INET;
|
|
+//
|
|
+// ioctlSkfd = socket(PF_INET, SOCK_DGRAM, 0);
|
|
+// if (ioctlSkfd < 0)
|
|
+// {
|
|
+// BmfPError("socket(PF_INET) error on %s", deviceName);
|
|
+// close(etfd);
|
|
+// return -1;
|
|
+// }
|
|
+//
|
|
+// /* Give the EtherTunTap interface an IP address.
|
|
+// * The default IP address is the address of the first OLSR interface;
|
|
+// * the default netmask is 255.255.255.255 . Having an all-ones netmask prevents
|
|
+// * automatic entry of the BMF network interface in the routing table. */
|
|
+// if (EtherTunTapIp == ETHERTUNTAPIPNOTSET)
|
|
+// {
|
|
+// struct TBmfInterface* nextBmfIf = BmfInterfaces;
|
|
+// while (nextBmfIf != NULL)
|
|
+// {
|
|
+// struct TBmfInterface* bmfIf = nextBmfIf;
|
|
+// nextBmfIf = bmfIf->next;
|
|
+//
|
|
+// if (bmfIf->olsrIntf != NULL)
|
|
+// {
|
|
+// EtherTunTapIp = ntohl(bmfIf->intAddr.v4.s_addr);
|
|
+// EtherTunTapIpBroadcast = EtherTunTapIp;
|
|
+// }
|
|
+// }
|
|
+// }
|
|
+//
|
|
+// if (EtherTunTapIp == ETHERTUNTAPIPNOTSET)
|
|
+// {
|
|
+// /* No IP address configured for BMF network interface, and no OLSR interface found to
|
|
+// * copy IP address from. Fall back to default: 10.255.255.253 . */
|
|
+// EtherTunTapIp = ETHERTUNTAPDEFAULTIP;
|
|
+// }
|
|
+//
|
|
+// ((struct sockaddr_in*)&ifreq.ifr_addr)->sin_addr.s_addr = htonl(EtherTunTapIp);
|
|
+// ioctlres = ioctl(ioctlSkfd, SIOCSIFADDR, &ifreq);
|
|
+// if (ioctlres >= 0)
|
|
+// {
|
|
+// /* Set net mask */
|
|
+// ((struct sockaddr_in*)&ifreq.ifr_netmask)->sin_addr.s_addr = htonl(EtherTunTapIpMask);
|
|
+// ioctlres = ioctl(ioctlSkfd, SIOCSIFNETMASK, &ifreq);
|
|
+// if (ioctlres >= 0)
|
|
+// {
|
|
+// /* Set broadcast IP */
|
|
+// ((struct sockaddr_in*)&ifreq.ifr_broadaddr)->sin_addr.s_addr = htonl(EtherTunTapIpBroadcast);
|
|
+// ioctlres = ioctl(ioctlSkfd, SIOCSIFBRDADDR, &ifreq);
|
|
+// if (ioctlres >= 0)
|
|
+// {
|
|
+// /* Bring EtherTunTap interface up (if not already) */
|
|
+// ioctlres = ioctl(ioctlSkfd, SIOCGIFFLAGS, &ifreq);
|
|
+// if (ioctlres >= 0)
|
|
+// {
|
|
+// ifreq.ifr_flags |= (IFF_UP | IFF_RUNNING | IFF_BROADCAST);
|
|
+// ioctlres = ioctl(ioctlSkfd, SIOCSIFFLAGS, &ifreq);
|
|
+// }
|
|
+// }
|
|
+// }
|
|
+// }
|
|
+//
|
|
+// if (ioctlres < 0)
|
|
+// {
|
|
+// /* Any of the above ioctl() calls failed */
|
|
+// BmfPError("error bringing up EtherTunTap interface \"%s\"", EtherTunTapIfName);
|
|
+//
|
|
+// close(etfd);
|
|
+// close(ioctlSkfd);
|
|
+// return -1;
|
|
+// } /* if (ioctlres < 0) */
|
|
+//
|
|
+// /* Set the multicast flag on the interface */
|
|
+// memset(&ifreq, 0, sizeof(ifreq));
|
|
+// strncpy(ifreq.ifr_name, EtherTunTapIfName, IFNAMSIZ - 1);
|
|
+// ifreq.ifr_name[IFNAMSIZ - 1] = '\0'; /* Ensures null termination */
|
|
+//
|
|
+// ioctlres = ioctl(ioctlSkfd, SIOCGIFFLAGS, &ifreq);
|
|
+// if (ioctlres >= 0)
|
|
+// {
|
|
+// ifreq.ifr_flags |= IFF_MULTICAST;
|
|
+// ioctlres = ioctl(ioctlSkfd, SIOCSIFFLAGS, &ifreq);
|
|
+// }
|
|
+// if (ioctlres < 0)
|
|
+// {
|
|
+// /* Any of the two above ioctl() calls failed */
|
|
+// BmfPError("error setting multicast flag on EtherTunTap interface \"%s\"", EtherTunTapIfName);
|
|
+//
|
|
+// /* Continue anyway */
|
|
+// }
|
|
+//
|
|
+// /* Use ioctl to make the tuntap persistent. Otherwise it will disappear
|
|
+// * when this program exits. That is not desirable, since a multicast
|
|
+// * daemon (e.g. mrouted) may be using the tuntap interface. */
|
|
+// if (ioctl(etfd, TUNSETPERSIST, (void *)&ifreq) < 0)
|
|
+// {
|
|
+// BmfPError("error making EtherTunTap interface \"%s\" persistent", EtherTunTapIfName);
|
|
+//
|
|
+// /* Continue anyway */
|
|
+// }
|
|
+//
|
|
+// OLSR_PRINTF(8, "%s: opened 1 socket on \"%s\"\n", PLUGIN_NAME_SHORT, EtherTunTapIfName);
|
|
+//
|
|
+// AddDescriptorToInputSet(etfd);
|
|
+//
|
|
+// /* If the user configured a specific IP address for the BMF network interface,
|
|
+// * help the user and advertise the IP address of the BMF network interface
|
|
+// * on the OLSR network via HNA */
|
|
+// if (TunTapIpOverruled != 0)
|
|
+// {
|
|
+// union olsr_ip_addr temp_net;
|
|
+//
|
|
+// temp_net.v4.s_addr = htonl(EtherTunTapIp);
|
|
+// ip_prefix_list_add(&olsr_cnf->hna_entries, &temp_net, 32);
|
|
+// }
|
|
+//
|
|
+// close(ioctlSkfd);
|
|
+//
|
|
+// return etfd;
|
|
+//} /* CreateLocalEtherTunTap */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CreateInterface
|
|
+ * Description: Create a new TBmfInterface object and adds it to the global
|
|
+ * BmfInterfaces list
|
|
+ * Input : ifName - name of the network interface (e.g. "eth0")
|
|
+ * : olsrIntf - OLSR interface object of the network interface, or
|
|
+ * NULL if the network interface is not OLSR-enabled
|
|
+ * Output : none
|
|
+ * Return : the number of opened sockets
|
|
+ * Data Used : BmfInterfaces, LastBmfInterface
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+//FOR MDNS IS ALWAYS CALLED WITH NULL AS SECOND ARG
|
|
+
|
|
+static int CreateInterface(
|
|
+ const char* ifName,
|
|
+ struct interface* olsrIntf)
|
|
+{
|
|
+ int capturingSkfd = -1;
|
|
+ int encapsulatingSkfd = -1;
|
|
+ int listeningSkfd = -1;
|
|
+ int ioctlSkfd;
|
|
+ struct ifreq ifr;
|
|
+ int nOpened = 0;
|
|
+ struct TBmfInterface* newIf = malloc(sizeof(struct TBmfInterface));
|
|
+
|
|
+ assert(ifName != NULL);
|
|
+
|
|
+ if (newIf == NULL)
|
|
+ {
|
|
+ return 0;
|
|
+ }
|
|
+
|
|
+//TODO: assert interface is not talking OLSR
|
|
+
|
|
+// if (olsrIntf != NULL)
|
|
+// {
|
|
+// /* On OLSR-enabled interfaces, create socket for encapsulating and forwarding
|
|
+// * multicast packets */
|
|
+// encapsulatingSkfd = CreateEncapsulateSocket(ifName);
|
|
+// if (encapsulatingSkfd < 0)
|
|
+// {
|
|
+// free(newIf);
|
|
+// return 0;
|
|
+// }
|
|
+// nOpened++;
|
|
+// }
|
|
+
|
|
+ /* Create socket for capturing and sending of multicast packets on
|
|
+ * non-OLSR interfaces, and on OLSR-interfaces if configured. */
|
|
+ if ((olsrIntf == NULL) || (CapturePacketsOnOlsrInterfaces != 0))
|
|
+ {
|
|
+ capturingSkfd = CreateCaptureSocket(ifName);
|
|
+ if (capturingSkfd < 0)
|
|
+ {
|
|
+ close(encapsulatingSkfd);
|
|
+ free(newIf);
|
|
+ return 0;
|
|
+ }
|
|
+
|
|
+ nOpened++;
|
|
+ }
|
|
+
|
|
+// /* Create promiscuous mode listening interface if BMF uses IP unicast
|
|
+// * as underlying forwarding mechanism */
|
|
+// if (BmfMechanism == BM_UNICAST_PROMISCUOUS)
|
|
+// {
|
|
+// listeningSkfd = CreateListeningSocket(ifName);
|
|
+// if (listeningSkfd < 0)
|
|
+// {
|
|
+// close(listeningSkfd);
|
|
+// close(encapsulatingSkfd); /* no problem if 'encapsulatingSkfd' is -1 */
|
|
+// free(newIf);
|
|
+// return 0;
|
|
+// }
|
|
+//
|
|
+// nOpened++;
|
|
+// }
|
|
+
|
|
+ /* For ioctl operations on the network interface, use either capturingSkfd
|
|
+ * or encapsulatingSkfd, whichever is available */
|
|
+ ioctlSkfd = (capturingSkfd >= 0) ? capturingSkfd : encapsulatingSkfd;
|
|
+
|
|
+ /* Retrieve the MAC address of the interface. */
|
|
+ memset(&ifr, 0, sizeof(struct ifreq));
|
|
+ strncpy(ifr.ifr_name, ifName, IFNAMSIZ - 1);
|
|
+ ifr.ifr_name[IFNAMSIZ - 1] = '\0'; /* Ensures null termination */
|
|
+ if (ioctl(ioctlSkfd, SIOCGIFHWADDR, &ifr) < 0)
|
|
+ {
|
|
+ BmfPError("ioctl(SIOCGIFHWADDR) error for interface \"%s\"", ifName);
|
|
+ close(capturingSkfd);
|
|
+ close(encapsulatingSkfd);
|
|
+ free(newIf);
|
|
+ return 0;
|
|
+ }
|
|
+
|
|
+ /* Copy data into TBmfInterface object */
|
|
+ newIf->capturingSkfd = capturingSkfd;
|
|
+ newIf->encapsulatingSkfd = encapsulatingSkfd;
|
|
+ newIf->listeningSkfd = listeningSkfd;
|
|
+ memcpy(newIf->macAddr, ifr.ifr_hwaddr.sa_data, IFHWADDRLEN);
|
|
+ memcpy(newIf->ifName, ifName, IFNAMSIZ);
|
|
+ newIf->olsrIntf = olsrIntf;
|
|
+ if (olsrIntf != NULL)
|
|
+ {
|
|
+ /* For an OLSR-interface, copy the interface address and broadcast
|
|
+ * address from the OLSR interface object. Downcast to correct sockaddr
|
|
+ * subtype. */
|
|
+ newIf->intAddr.v4 = olsrIntf->int_addr.sin_addr;
|
|
+ newIf->broadAddr.v4 = olsrIntf->int_broadaddr.sin_addr;
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ /* For a non-OLSR interface, retrieve the IP address ourselves */
|
|
+ memset(&ifr, 0, sizeof(struct ifreq));
|
|
+ strncpy(ifr.ifr_name, ifName, IFNAMSIZ - 1);
|
|
+ ifr.ifr_name[IFNAMSIZ - 1] = '\0'; /* Ensures null termination */
|
|
+ if (ioctl(ioctlSkfd, SIOCGIFADDR, &ifr) < 0)
|
|
+ {
|
|
+ BmfPError("ioctl(SIOCGIFADDR) error for interface \"%s\"", ifName);
|
|
+
|
|
+ newIf->intAddr.v4.s_addr = inet_addr("0.0.0.0");
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ /* Downcast to correct sockaddr subtype */
|
|
+ newIf->intAddr.v4 = ((struct sockaddr_in *)&ifr.ifr_addr)->sin_addr;
|
|
+ }
|
|
+
|
|
+ /* For a non-OLSR interface, retrieve the IP broadcast address ourselves */
|
|
+ memset(&ifr, 0, sizeof(struct ifreq));
|
|
+ strncpy(ifr.ifr_name, ifName, IFNAMSIZ - 1);
|
|
+ ifr.ifr_name[IFNAMSIZ - 1] = '\0'; /* Ensures null termination */
|
|
+ if (ioctl(ioctlSkfd, SIOCGIFBRDADDR, &ifr) < 0)
|
|
+ {
|
|
+ BmfPError("ioctl(SIOCGIFBRDADDR) error for interface \"%s\"", ifName);
|
|
+
|
|
+ newIf->broadAddr.v4.s_addr = inet_addr("0.0.0.0");
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ /* Downcast to correct sockaddr subtype */
|
|
+ newIf->broadAddr.v4 = ((struct sockaddr_in *)&ifr.ifr_broadaddr)->sin_addr;
|
|
+ }
|
|
+ }
|
|
+
|
|
+ /* Initialize fragment history table */
|
|
+ //memset(&newIf->fragmentHistory, 0, sizeof(newIf->fragmentHistory));
|
|
+ //newIf->nextFragmentHistoryEntry = 0;
|
|
+
|
|
+ /* Reset counters */
|
|
+ //newIf->nBmfPacketsRx = 0;
|
|
+ //newIf->nBmfPacketsRxDup = 0;
|
|
+ //newIf->nBmfPacketsTx = 0;
|
|
+
|
|
+ /* Add new TBmfInterface object to global list. OLSR interfaces are
|
|
+ * added at the front of the list, non-OLSR interfaces at the back. */
|
|
+ if (BmfInterfaces == NULL)
|
|
+ {
|
|
+ /* First TBmfInterface object in list */
|
|
+ BmfInterfaces = newIf;
|
|
+ LastBmfInterface = newIf;
|
|
+ }
|
|
+ else if (olsrIntf != NULL)
|
|
+ {
|
|
+ /* Add new TBmfInterface object at front of list */
|
|
+ newIf->next = BmfInterfaces;
|
|
+ BmfInterfaces = newIf;
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ /* Add new TBmfInterface object at back of list */
|
|
+ newIf->next = NULL;
|
|
+ LastBmfInterface->next= newIf;
|
|
+ LastBmfInterface = newIf;
|
|
+ }
|
|
+
|
|
+ OLSR_PRINTF(
|
|
+ 8,
|
|
+ "%s: opened %d socket%s on %s interface \"%s\"\n",
|
|
+ PLUGIN_NAME_SHORT,
|
|
+ nOpened,
|
|
+ nOpened == 1 ? "" : "s",
|
|
+ olsrIntf != NULL ? "OLSR" : "non-OLSR",
|
|
+ ifName);
|
|
+
|
|
+ return nOpened;
|
|
+} /* CreateInterface */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CreateBmfNetworkInterfaces
|
|
+ * Description: Create a list of TBmfInterface objects, one for each network
|
|
+ * interface on which BMF runs
|
|
+ * Input : skipThisIntf - network interface to skip, if seen
|
|
+ * Output : none
|
|
+ * Return : fail (-1) or success (0)
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int CreateBmfNetworkInterfaces(struct interface* skipThisIntf)
|
|
+{
|
|
+ int skfd;
|
|
+ struct ifconf ifc;
|
|
+ int numreqs = 30;
|
|
+ struct ifreq* ifr;
|
|
+ int n;
|
|
+ int nOpenedSockets = 0;
|
|
+
|
|
+ /* Clear input descriptor set */
|
|
+ FD_ZERO(&InputSet);
|
|
+
|
|
+ skfd = socket(PF_INET, SOCK_DGRAM, 0);
|
|
+ if (skfd < 0)
|
|
+ {
|
|
+ BmfPError("no inet socket available to retrieve interface list");
|
|
+ return -1;
|
|
+ }
|
|
+
|
|
+ /* Retrieve the network interface configuration list */
|
|
+ ifc.ifc_buf = NULL;
|
|
+ for (;;)
|
|
+ {
|
|
+ ifc.ifc_len = sizeof(struct ifreq) * numreqs;
|
|
+ ifc.ifc_buf = realloc(ifc.ifc_buf, ifc.ifc_len);
|
|
+
|
|
+ if (ioctl(skfd, SIOCGIFCONF, &ifc) < 0)
|
|
+ {
|
|
+ BmfPError("ioctl(SIOCGIFCONF) error");
|
|
+
|
|
+ close(skfd);
|
|
+ free(ifc.ifc_buf);
|
|
+ return -1;
|
|
+ }
|
|
+ if ((unsigned)ifc.ifc_len == sizeof(struct ifreq) * numreqs)
|
|
+ {
|
|
+ /* Assume it overflowed; double the space and try again */
|
|
+ numreqs *= 2;
|
|
+ assert(numreqs < 1024);
|
|
+ continue; /* for (;;) */
|
|
+ }
|
|
+ break; /* for (;;) */
|
|
+ } /* for (;;) */
|
|
+
|
|
+ close(skfd);
|
|
+
|
|
+ /* For each item in the interface configuration list... */
|
|
+ ifr = ifc.ifc_req;
|
|
+ for (n = ifc.ifc_len / sizeof(struct ifreq); --n >= 0; ifr++)
|
|
+ {
|
|
+ struct interface* olsrIntf;
|
|
+ union olsr_ip_addr ipAddr;
|
|
+
|
|
+ /* Skip the BMF network interface itself */
|
|
+ //if (strncmp(ifr->ifr_name, EtherTunTapIfName, IFNAMSIZ) == 0)
|
|
+ //{
|
|
+ // continue; /* for (n = ...) */
|
|
+ //}
|
|
+
|
|
+ /* ...find the OLSR interface structure, if any */
|
|
+ ipAddr.v4 = ((struct sockaddr_in*)&ifr->ifr_addr)->sin_addr;
|
|
+ olsrIntf = if_ifwithaddr(&ipAddr);
|
|
+
|
|
+ if (skipThisIntf != NULL && olsrIntf == skipThisIntf)
|
|
+ {
|
|
+ continue; /* for (n = ...) */
|
|
+ }
|
|
+
|
|
+ if (olsrIntf == NULL && ! IsNonOlsrBmfIf(ifr->ifr_name))
|
|
+ {
|
|
+ /* Interface is neither OLSR interface, nor specified as non-OLSR BMF
|
|
+ * interface in the BMF plugin parameter list */
|
|
+ continue; /* for (n = ...) */
|
|
+ }
|
|
+
|
|
+ if (! IsNonOlsrBmfIf(ifr->ifr_name))
|
|
+ {
|
|
+ //If the interface is not specified in the configuration file then go ahead
|
|
+ continue; /* for (n = ...) */
|
|
+ }
|
|
+ //TODO: asser if->ifr_name is not talking OLSR
|
|
+ //nOpenedSockets += CreateInterface(ifr->ifr_name, olsrIntf);
|
|
+ nOpenedSockets += CreateInterface(ifr->ifr_name, NULL);
|
|
+
|
|
+ } /* for (n = ...) */
|
|
+
|
|
+ free(ifc.ifc_buf);
|
|
+
|
|
+ /* Create the BMF network interface */
|
|
+ //EtherTunTapFd = CreateLocalEtherTunTap();
|
|
+ //if (EtherTunTapFd >= 0)
|
|
+ //{
|
|
+ // nOpenedSockets++;
|
|
+ //}
|
|
+
|
|
+ if (BmfInterfaces == NULL)
|
|
+ {
|
|
+ OLSR_PRINTF(1, "%s: could not initialize any network interface\n", PLUGIN_NAME);
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ OLSR_PRINTF(1, "%s: opened %d sockets\n", PLUGIN_NAME, nOpenedSockets);
|
|
+ }
|
|
+ return 0;
|
|
+} /* CreateBmfNetworkInterfaces */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : AddInterface
|
|
+ * Description: Add an OLSR-enabled network interface to the list of BMF-enabled
|
|
+ * network interfaces
|
|
+ * Input : newIntf - network interface to add
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void AddInterface(struct interface* newIntf)
|
|
+{
|
|
+ int nOpened;
|
|
+
|
|
+ assert(newIntf != NULL);
|
|
+
|
|
+ nOpened = CreateInterface(newIntf->int_name, newIntf);
|
|
+
|
|
+ OLSR_PRINTF(1, "%s: opened %d sockets\n", PLUGIN_NAME, nOpened);
|
|
+} /* AddInterface */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CloseBmfNetworkInterfaces
|
|
+ * Description: Closes every socket on each network interface used by BMF
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * Notes : Closes
|
|
+ * - the local EtherTunTap interface (e.g. "tun0" or "tap0")
|
|
+ * - for each BMF-enabled interface, the socket used for
|
|
+ * capturing multicast packets
|
|
+ * - for each OLSR-enabled interface, the socket used for
|
|
+ * encapsulating packets
|
|
+ * Also restores the network state to the situation before BMF
|
|
+ * was started.
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void CloseBmfNetworkInterfaces(void)
|
|
+{
|
|
+ int nClosed = 0;
|
|
+ u_int32_t totalOlsrBmfPacketsRx = 0;
|
|
+ u_int32_t totalOlsrBmfPacketsRxDup = 0;
|
|
+ u_int32_t totalOlsrBmfPacketsTx = 0;
|
|
+ u_int32_t totalNonOlsrBmfPacketsRx = 0;
|
|
+ u_int32_t totalNonOlsrBmfPacketsRxDup = 0;
|
|
+ u_int32_t totalNonOlsrBmfPacketsTx = 0;
|
|
+
|
|
+ /* Close all opened sockets */
|
|
+ struct TBmfInterface* nextBmfIf = BmfInterfaces;
|
|
+ while (nextBmfIf != NULL)
|
|
+ {
|
|
+ struct TBmfInterface* bmfIf = nextBmfIf;
|
|
+ nextBmfIf = bmfIf->next;
|
|
+
|
|
+ if (bmfIf->capturingSkfd >= 0)
|
|
+ {
|
|
+ close(bmfIf->capturingSkfd);
|
|
+ nClosed++;
|
|
+ }
|
|
+ if (bmfIf->encapsulatingSkfd >= 0)
|
|
+ {
|
|
+ close(bmfIf->encapsulatingSkfd);
|
|
+ nClosed++;
|
|
+ }
|
|
+
|
|
+ OLSR_PRINTF(
|
|
+ 7,
|
|
+ "%s: %s interface \"%s\": RX pkts %u (%u dups); TX pkts %u\n",
|
|
+ PLUGIN_NAME_SHORT,
|
|
+ bmfIf->olsrIntf != NULL ? "OLSR" : "non-OLSR",
|
|
+ bmfIf->ifName,
|
|
+ bmfIf->nBmfPacketsRx,
|
|
+ bmfIf->nBmfPacketsRxDup,
|
|
+ bmfIf->nBmfPacketsTx);
|
|
+
|
|
+ OLSR_PRINTF(
|
|
+ 1,
|
|
+ "%s: closed %s interface \"%s\"\n",
|
|
+ PLUGIN_NAME_SHORT,
|
|
+ bmfIf->olsrIntf != NULL ? "OLSR" : "non-OLSR",
|
|
+ bmfIf->ifName);
|
|
+
|
|
+ /* Add totals */
|
|
+ if (bmfIf->olsrIntf != NULL)
|
|
+ {
|
|
+ totalOlsrBmfPacketsRx += bmfIf->nBmfPacketsRx;
|
|
+ totalOlsrBmfPacketsRxDup += bmfIf->nBmfPacketsRxDup;
|
|
+ totalOlsrBmfPacketsTx += bmfIf->nBmfPacketsTx;
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ totalNonOlsrBmfPacketsRx += bmfIf->nBmfPacketsRx;
|
|
+ totalNonOlsrBmfPacketsRxDup += bmfIf->nBmfPacketsRxDup;
|
|
+ totalNonOlsrBmfPacketsTx += bmfIf->nBmfPacketsTx;
|
|
+ }
|
|
+
|
|
+ free(bmfIf);
|
|
+ } /* while */
|
|
+
|
|
+ if (EtherTunTapFd >= 0)
|
|
+ {
|
|
+ close(EtherTunTapFd);
|
|
+ nClosed++;
|
|
+
|
|
+ OLSR_PRINTF(7, "%s: closed \"%s\"\n", PLUGIN_NAME_SHORT, EtherTunTapIfName);
|
|
+ }
|
|
+
|
|
+ BmfInterfaces = NULL;
|
|
+
|
|
+ OLSR_PRINTF(1, "%s: closed %d sockets\n", PLUGIN_NAME_SHORT, nClosed);
|
|
+
|
|
+ OLSR_PRINTF(
|
|
+ 7,
|
|
+ "%s: Total all OLSR interfaces : RX pkts %u (%u dups); TX pkts %u\n",
|
|
+ PLUGIN_NAME_SHORT,
|
|
+ totalOlsrBmfPacketsRx,
|
|
+ totalOlsrBmfPacketsRxDup,
|
|
+ totalOlsrBmfPacketsTx);
|
|
+ OLSR_PRINTF(
|
|
+ 7,
|
|
+ "%s: Total all non-OLSR interfaces: RX pkts %u (%u dups); TX pkts %u\n",
|
|
+ PLUGIN_NAME_SHORT,
|
|
+ totalNonOlsrBmfPacketsRx,
|
|
+ totalNonOlsrBmfPacketsRxDup,
|
|
+ totalNonOlsrBmfPacketsTx);
|
|
+} /* CloseBmfNetworkInterfaces */
|
|
+
|
|
+#define MAX_NON_OLSR_IFS 32
|
|
+static char NonOlsrIfNames[MAX_NON_OLSR_IFS][IFNAMSIZ];
|
|
+static int nNonOlsrIfs = 0;
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : AddNonOlsrBmfIf
|
|
+ * Description: Add an non-OLSR enabled network interface to the list of BMF-enabled
|
|
+ * network interfaces
|
|
+ * Input : ifName - network interface (e.g. "eth0")
|
|
+ * data - not used
|
|
+ * addon - not used
|
|
+ * Output : none
|
|
+ * Return : success (0) or fail (1)
|
|
+ * Data Used : NonOlsrIfNames
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int AddNonOlsrBmfIf(
|
|
+ const char* ifName,
|
|
+ void* data __attribute__((unused)),
|
|
+ set_plugin_parameter_addon addon __attribute__((unused)))
|
|
+{
|
|
+ assert(ifName != NULL);
|
|
+
|
|
+ if (nNonOlsrIfs >= MAX_NON_OLSR_IFS)
|
|
+ {
|
|
+ OLSR_PRINTF(
|
|
+ 1,
|
|
+ "%s: too many non-OLSR interfaces specified, maximum is %d\n",
|
|
+ PLUGIN_NAME,
|
|
+ MAX_NON_OLSR_IFS);
|
|
+ return 1;
|
|
+ }
|
|
+
|
|
+ strncpy(NonOlsrIfNames[nNonOlsrIfs], ifName, IFNAMSIZ - 1);
|
|
+ NonOlsrIfNames[nNonOlsrIfs][IFNAMSIZ - 1] = '\0'; /* Ensures null termination */
|
|
+ nNonOlsrIfs++;
|
|
+ return 0;
|
|
+} /* AddNonOlsrBmfIf */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : IsNonOlsrBmfIf
|
|
+ * Description: Checks if a network interface is OLSR-enabled
|
|
+ * Input : ifName - network interface (e.g. "eth0")
|
|
+ * Output : none
|
|
+ * Return : true (1) or false (0)
|
|
+ * Data Used : NonOlsrIfNames
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int IsNonOlsrBmfIf(const char* ifName)
|
|
+{
|
|
+ int i;
|
|
+
|
|
+ assert(ifName != NULL);
|
|
+
|
|
+ for (i = 0; i < nNonOlsrIfs; i++)
|
|
+ {
|
|
+ if (strncmp(NonOlsrIfNames[i], ifName, IFNAMSIZ) == 0) return 1;
|
|
+ }
|
|
+ return 0;
|
|
+} /* IsNonOlsrBmfIf */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CheckAndUpdateLocalBroadcast
|
|
+ * Description: For an IP packet, check if the destination address is not a
|
|
+ * multicast address. If it is not, the packet is assumed to be
|
|
+ * a local broadcast packet. In that case, set the destination
|
|
+ * address of the IP packet to the passed broadcast address.
|
|
+ * Input : ipPacket - the IP packet
|
|
+ * broadAddr - the broadcast address to fill in
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * Notes : See also RFC1141
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void CheckAndUpdateLocalBroadcast(unsigned char* ipPacket, union olsr_ip_addr* broadAddr)
|
|
+{
|
|
+ struct iphdr* iph;
|
|
+ union olsr_ip_addr destIp;
|
|
+
|
|
+ assert(ipPacket != NULL && broadAddr != NULL);
|
|
+
|
|
+ iph = (struct iphdr*) ipPacket;
|
|
+ destIp.v4.s_addr = iph->daddr;
|
|
+ if (! IsMulticast(&destIp))
|
|
+ {
|
|
+ u_int32_t origDaddr, newDaddr;
|
|
+ u_int32_t check;
|
|
+
|
|
+ origDaddr = ntohl(iph->daddr);
|
|
+
|
|
+ iph->daddr = broadAddr->v4.s_addr;
|
|
+ newDaddr = ntohl(iph->daddr);
|
|
+
|
|
+ /* Re-calculate IP header checksum for new destination */
|
|
+ check = ntohs(iph->check);
|
|
+
|
|
+ check = ~ (~ check - ((origDaddr >> 16) & 0xFFFF) + ((newDaddr >> 16) & 0xFFFF));
|
|
+ check = ~ (~ check - (origDaddr & 0xFFFF) + (newDaddr & 0xFFFF));
|
|
+
|
|
+ /* Add carry */
|
|
+ check = check + (check >> 16);
|
|
+
|
|
+ iph->check = htons(check);
|
|
+
|
|
+ if (iph->protocol == SOL_UDP)
|
|
+ {
|
|
+ /* Re-calculate UDP/IP checksum for new destination */
|
|
+
|
|
+ int ipHeaderLen = GetIpHeaderLength(ipPacket);
|
|
+ struct udphdr* udph = (struct udphdr*) (ipPacket + ipHeaderLen);
|
|
+
|
|
+ /* RFC 1624, Eq. 3: HC' = ~(~HC - m + m') */
|
|
+
|
|
+ check = ntohs(udph->check);
|
|
+
|
|
+ check = ~ (~ check - ((origDaddr >> 16) & 0xFFFF) + ((newDaddr >> 16) & 0xFFFF));
|
|
+ check = ~ (~ check - (origDaddr & 0xFFFF) + (newDaddr & 0xFFFF));
|
|
+
|
|
+ /* Add carry */
|
|
+ check = check + (check >> 16);
|
|
+
|
|
+ udph->check = htons(check);
|
|
+ } /* if */
|
|
+ } /* if */
|
|
+} /* CheckAndUpdateLocalBroadcast */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : AddMulticastRoute
|
|
+ * Description: Insert a route to all multicast addresses in the kernel
|
|
+ * routing table. The route will be via the BMF network interface.
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void AddMulticastRoute(void)
|
|
+{
|
|
+ struct rtentry kernel_route;
|
|
+ int ioctlSkfd = socket(PF_INET, SOCK_DGRAM, 0);
|
|
+ if (ioctlSkfd < 0)
|
|
+ {
|
|
+ BmfPError("socket(PF_INET) error");
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ memset(&kernel_route, 0, sizeof(struct rtentry));
|
|
+
|
|
+ ((struct sockaddr_in*)&kernel_route.rt_dst)->sin_family = AF_INET;
|
|
+ ((struct sockaddr_in*)&kernel_route.rt_gateway)->sin_family = AF_INET;
|
|
+ ((struct sockaddr_in*)&kernel_route.rt_genmask)->sin_family = AF_INET;
|
|
+
|
|
+ /* 224.0.0.0/4 */
|
|
+ ((struct sockaddr_in *)&kernel_route.rt_dst)->sin_addr.s_addr = htonl(0xE0000000);
|
|
+ ((struct sockaddr_in *)&kernel_route.rt_genmask)->sin_addr.s_addr = htonl(0xF0000000);
|
|
+
|
|
+ kernel_route.rt_metric = 0;
|
|
+ kernel_route.rt_flags = RTF_UP;
|
|
+
|
|
+ kernel_route.rt_dev = EtherTunTapIfName;
|
|
+
|
|
+ if (ioctl(ioctlSkfd, SIOCADDRT, &kernel_route) < 0)
|
|
+ {
|
|
+ BmfPError("error setting multicast route via EtherTunTap interface \"%s\"", EtherTunTapIfName);
|
|
+
|
|
+ /* Continue anyway */
|
|
+ }
|
|
+ close(ioctlSkfd);
|
|
+} /* AddMulticastRoute */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : DeleteMulticastRoute
|
|
+ * Description: Delete the route to all multicast addresses from the kernel
|
|
+ * routing table
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void DeleteMulticastRoute(void)
|
|
+{
|
|
+ if (EtherTunTapIp != ETHERTUNTAPDEFAULTIP)
|
|
+ {
|
|
+ struct rtentry kernel_route;
|
|
+ int ioctlSkfd = socket(PF_INET, SOCK_DGRAM, 0);
|
|
+ if (ioctlSkfd < 0)
|
|
+ {
|
|
+ BmfPError("socket(PF_INET) error");
|
|
+ return;
|
|
+ }
|
|
+
|
|
+ memset(&kernel_route, 0, sizeof(struct rtentry));
|
|
+
|
|
+ ((struct sockaddr_in*)&kernel_route.rt_dst)->sin_family = AF_INET;
|
|
+ ((struct sockaddr_in*)&kernel_route.rt_gateway)->sin_family = AF_INET;
|
|
+ ((struct sockaddr_in*)&kernel_route.rt_genmask)->sin_family = AF_INET;
|
|
+
|
|
+ /* 224.0.0.0/4 */
|
|
+ ((struct sockaddr_in *)&kernel_route.rt_dst)->sin_addr.s_addr = htonl(0xE0000000);
|
|
+ ((struct sockaddr_in *)&kernel_route.rt_genmask)->sin_addr.s_addr = htonl(0xF0000000);
|
|
+
|
|
+ kernel_route.rt_metric = 0;
|
|
+ kernel_route.rt_flags = RTF_UP;
|
|
+
|
|
+ kernel_route.rt_dev = EtherTunTapIfName;
|
|
+
|
|
+ if (ioctl(ioctlSkfd, SIOCDELRT, &kernel_route) < 0)
|
|
+ {
|
|
+ BmfPError("error deleting multicast route via EtherTunTap interface \"%s\"", EtherTunTapIfName);
|
|
+
|
|
+ /* Continue anyway */
|
|
+ }
|
|
+ close(ioctlSkfd);
|
|
+ } /* if */
|
|
+} /* DeleteMulticastRoute */
|
|
+
|
|
+/*
|
|
+ * Local Variables:
|
|
+ * c-basic-offset: 2
|
|
+ * indent-tabs-mode: nil
|
|
+ * End:
|
|
+ */
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/NetworkInterfaces.h olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/NetworkInterfaces.h
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/NetworkInterfaces.h 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/NetworkInterfaces.h 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,162 @@
|
|
+#ifndef _BMF_NETWORKINTERFACES_H
|
|
+#define _BMF_NETWORKINTERFACES_H
|
|
+
|
|
+/*
|
|
+ * OLSR Basic Multicast Forwarding (BMF) plugin.
|
|
+ * Copyright (c) 2005 - 2007, Thales Communications, Huizen, The Netherlands.
|
|
+ * Written by Erik Tromp.
|
|
+ * All rights reserved.
|
|
+ *
|
|
+ * Redistribution and use in source and binary forms, with or without
|
|
+ * modification, are permitted provided that the following conditions
|
|
+ * are met:
|
|
+ *
|
|
+ * * Redistributions of source code must retain the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer.
|
|
+ * * Redistributions in binary form must reproduce the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer in
|
|
+ * the documentation and/or other materials provided with the
|
|
+ * distribution.
|
|
+ * * Neither the name of Thales, BMF nor the names of its
|
|
+ * contributors may be used to endorse or promote products derived
|
|
+ * from this software without specific prior written permission.
|
|
+ *
|
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+ * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
+ * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
+ * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
+ */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * File : NetworkInterfaces.h
|
|
+ * Description: Functions to open and close sockets
|
|
+ * Created : 29 Jun 2006
|
|
+ *
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+/* System includes */
|
|
+#include <netinet/in.h> /* struct in_addr */
|
|
+
|
|
+/* OLSR includes */
|
|
+#include "olsr_types.h" /* olsr_ip_addr */
|
|
+#include "olsrd_plugin.h" /* union set_plugin_parameter_addon */
|
|
+#include "socket_parser.h"
|
|
+/* Plugin includes */
|
|
+#include "Packet.h" /* IFHWADDRLEN */
|
|
+#include "mdns.h"
|
|
+/* Size of buffer in which packets are received */
|
|
+#define BMF_BUFFER_SIZE 2048
|
|
+
|
|
+struct TBmfInterface
|
|
+{
|
|
+ /* File descriptor of raw packet socket, used for capturing multicast packets */
|
|
+ int capturingSkfd;
|
|
+
|
|
+ /* File descriptor of UDP (datagram) socket for encapsulated multicast packets.
|
|
+ * Only used for OLSR-enabled interfaces; set to -1 if interface is not OLSR-enabled. */
|
|
+ int encapsulatingSkfd;
|
|
+
|
|
+ /* File descriptor of UDP packet socket, used for listening to encapsulation packets.
|
|
+ * Used only when PlParam "BmfMechanism" is set to "UnicastPromiscuous". */
|
|
+ int listeningSkfd;
|
|
+
|
|
+ unsigned char macAddr[IFHWADDRLEN];
|
|
+
|
|
+ char ifName[IFNAMSIZ];
|
|
+
|
|
+ /* OLSRs idea of this network interface. NULL if this interface is not
|
|
+ * OLSR-enabled. */
|
|
+ struct interface* olsrIntf;
|
|
+
|
|
+ /* IP address of this network interface */
|
|
+ union olsr_ip_addr intAddr;
|
|
+
|
|
+ /* Broadcast address of this network interface */
|
|
+ union olsr_ip_addr broadAddr;
|
|
+
|
|
+ #define FRAGMENT_HISTORY_SIZE 10
|
|
+ struct TFragmentHistory
|
|
+ {
|
|
+ u_int16_t ipId;
|
|
+ u_int8_t ipProto;
|
|
+ struct in_addr ipSrc;
|
|
+ struct in_addr ipDst;
|
|
+ } fragmentHistory [FRAGMENT_HISTORY_SIZE];
|
|
+
|
|
+ int nextFragmentHistoryEntry;
|
|
+
|
|
+ /* Number of received and transmitted BMF packets on this interface */
|
|
+ u_int32_t nBmfPacketsRx;
|
|
+ u_int32_t nBmfPacketsRxDup;
|
|
+ u_int32_t nBmfPacketsTx;
|
|
+
|
|
+ /* Next element in list */
|
|
+ struct TBmfInterface* next;
|
|
+};
|
|
+
|
|
+extern struct TBmfInterface* BmfInterfaces;
|
|
+
|
|
+extern int HighestSkfd;
|
|
+extern fd_set InputSet;
|
|
+
|
|
+extern int EtherTunTapFd;
|
|
+
|
|
+extern char EtherTunTapIfName[];
|
|
+
|
|
+/* 10.255.255.253 in host byte order */
|
|
+#define ETHERTUNTAPDEFAULTIP 0x0AFFFFFD
|
|
+
|
|
+extern u_int32_t EtherTunTapIp;
|
|
+extern u_int32_t EtherTunTapIpMask;
|
|
+extern u_int32_t EtherTunTapIpBroadcast;
|
|
+
|
|
+extern int CapturePacketsOnOlsrInterfaces;
|
|
+
|
|
+enum TBmfMechanism { BM_BROADCAST = 0, BM_UNICAST_PROMISCUOUS };
|
|
+extern enum TBmfMechanism BmfMechanism;
|
|
+
|
|
+int SetBmfInterfaceName(const char* ifname, void* data, set_plugin_parameter_addon addon);
|
|
+int SetBmfInterfaceIp(const char* ip, void* data, set_plugin_parameter_addon addon);
|
|
+int SetCapturePacketsOnOlsrInterfaces(const char* enable, void* data, set_plugin_parameter_addon addon);
|
|
+int SetBmfMechanism(const char* mechanism, void* data, set_plugin_parameter_addon addon);
|
|
+int DeactivateSpoofFilter(void);
|
|
+void RestoreSpoofFilter(void);
|
|
+
|
|
+#define MAX_UNICAST_NEIGHBORS 10
|
|
+struct TBestNeighbors
|
|
+{
|
|
+ struct link_entry* links[MAX_UNICAST_NEIGHBORS];
|
|
+};
|
|
+
|
|
+void FindNeighbors(
|
|
+ struct TBestNeighbors* neighbors,
|
|
+ struct link_entry** bestNeighbor,
|
|
+ struct TBmfInterface* intf,
|
|
+ union olsr_ip_addr* source,
|
|
+ union olsr_ip_addr* forwardedBy,
|
|
+ union olsr_ip_addr* forwardedTo,
|
|
+ int* nPossibleNeighbors);
|
|
+
|
|
+int CreateBmfNetworkInterfaces(struct interface* skipThisIntf);
|
|
+void AddInterface(struct interface* newIntf);
|
|
+void CloseBmfNetworkInterfaces(void);
|
|
+int AddNonOlsrBmfIf(const char* ifName, void* data, set_plugin_parameter_addon addon);
|
|
+int IsNonOlsrBmfIf(const char* ifName);
|
|
+void CheckAndUpdateLocalBroadcast(unsigned char* ipPacket, union olsr_ip_addr* broadAddr);
|
|
+void AddMulticastRoute(void);
|
|
+void DeleteMulticastRoute(void);
|
|
+
|
|
+#endif /* _BMF_NETWORKINTERFACES_H */
|
|
+
|
|
+/*
|
|
+ * Local Variables:
|
|
+ * c-basic-offset: 2
|
|
+ * indent-tabs-mode: nil
|
|
+ * End:
|
|
+ */
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/Packet.c olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/Packet.c
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/Packet.c 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/Packet.c 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,238 @@
|
|
+/*
|
|
+ * OLSR Basic Multicast Forwarding (BMF) plugin.
|
|
+ * Copyright (c) 2005 - 2007, Thales Communications, Huizen, The Netherlands.
|
|
+ * Written by Erik Tromp.
|
|
+ * All rights reserved.
|
|
+ *
|
|
+ * Redistribution and use in source and binary forms, with or without
|
|
+ * modification, are permitted provided that the following conditions
|
|
+ * are met:
|
|
+ *
|
|
+ * * Redistributions of source code must retain the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer.
|
|
+ * * Redistributions in binary form must reproduce the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer in
|
|
+ * the documentation and/or other materials provided with the
|
|
+ * distribution.
|
|
+ * * Neither the name of Thales, BMF nor the names of its
|
|
+ * contributors may be used to endorse or promote products derived
|
|
+ * from this software without specific prior written permission.
|
|
+ *
|
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+ * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
+ * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
+ * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
+ */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * File : Packet.c
|
|
+ * Description: IP packet and Ethernet frame processing functions
|
|
+ * Created : 29 Jun 2006
|
|
+ *
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+#include "Packet.h"
|
|
+
|
|
+/* System includes */
|
|
+#include <stddef.h> /* NULL */
|
|
+#include <assert.h> /* assert() */
|
|
+#include <string.h> /* memcpy() */
|
|
+#include <sys/types.h> /* u_int8_t, u_int16_t, u_int32_t */
|
|
+#include <netinet/in.h> /* ntohs(), htons() */
|
|
+#include <netinet/ip.h> /* struct iphdr */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : IsIpFragment
|
|
+ * Description: Check if an IP packet is an IP fragment
|
|
+ * Input : ipPacket - the IP packet
|
|
+ * Output : none
|
|
+ * Return : true (1) or false (0)
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int IsIpFragment(unsigned char* ipPacket)
|
|
+{
|
|
+ struct ip* iph;
|
|
+
|
|
+ assert(ipPacket != NULL);
|
|
+
|
|
+ iph = (struct ip*) ipPacket;
|
|
+ if ((ntohs(iph->ip_off) & IP_OFFMASK) != 0)
|
|
+ {
|
|
+ return 1;
|
|
+ }
|
|
+ return 0;
|
|
+} /* IsIpFragment */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : GetIpTotalLength
|
|
+ * Description: Retrieve the total length of the IP packet (in bytes) of
|
|
+ * an IP packet
|
|
+ * Input : ipPacket - the IP packet
|
|
+ * Output : none
|
|
+ * Return : IP packet length
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+u_int16_t GetIpTotalLength(unsigned char* ipPacket)
|
|
+{
|
|
+ struct iphdr* iph;
|
|
+
|
|
+ assert(ipPacket != NULL);
|
|
+
|
|
+ iph = (struct iphdr*) ipPacket;
|
|
+ return ntohs(iph->tot_len);
|
|
+} /* GetIpTotalLength */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : GetIpHeaderLength
|
|
+ * Description: Retrieve the IP header length (in bytes) of an IP packet
|
|
+ * Input : ipPacket - the IP packet
|
|
+ * Output : none
|
|
+ * Return : IP header length
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+unsigned int GetIpHeaderLength(unsigned char* ipPacket)
|
|
+{
|
|
+ struct iphdr* iph;
|
|
+
|
|
+ assert(ipPacket != NULL);
|
|
+
|
|
+ iph = (struct iphdr*) ipPacket;
|
|
+ return iph->ihl << 2;
|
|
+} /* GetIpHeaderLength */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : GetTtl
|
|
+ * Description: Retrieve the TTL (Time To Live) value from the IP header of
|
|
+ * an IP packet
|
|
+ * Input : ipPacket - the IP packet
|
|
+ * Output : none
|
|
+ * Return : TTL value
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+u_int8_t GetTtl(unsigned char* ipPacket)
|
|
+{
|
|
+ struct iphdr* iph;
|
|
+
|
|
+ assert(ipPacket != NULL);
|
|
+
|
|
+ iph = (struct iphdr*) ipPacket;
|
|
+ return iph->ttl;
|
|
+} /* GetTtl */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : SaveTtlAndChecksum
|
|
+ * Description: Save the TTL (Time To Live) value and IP checksum as found in
|
|
+ * the IP header of an IP packet
|
|
+ * Input : ipPacket - the IP packet
|
|
+ * Output : sttl - the TTL and checksum values
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void SaveTtlAndChecksum(unsigned char* ipPacket, struct TSaveTtl* sttl)
|
|
+{
|
|
+ struct iphdr* iph;
|
|
+
|
|
+ assert(ipPacket != NULL && sttl != NULL);
|
|
+
|
|
+ iph = (struct iphdr*) ipPacket;
|
|
+ sttl->ttl = iph->ttl;
|
|
+ sttl->check = ntohs(iph->check);
|
|
+} /* SaveTtlAndChecksum */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : RestoreTtlAndChecksum
|
|
+ * Description: Restore the TTL (Time To Live) value and IP checksum in
|
|
+ * the IP header of an IP packet
|
|
+ * Input : ipPacket - the IP packet
|
|
+ * sttl - the TTL and checksum values
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void RestoreTtlAndChecksum(unsigned char* ipPacket, struct TSaveTtl* sttl)
|
|
+{
|
|
+ struct iphdr* iph;
|
|
+
|
|
+ assert(ipPacket != NULL && sttl != NULL);
|
|
+
|
|
+ iph = (struct iphdr*) ipPacket;
|
|
+ iph->ttl = sttl->ttl;
|
|
+ iph->check = htons(sttl->check);
|
|
+} /* RestoreTtlAndChecksum */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : DecreaseTtlAndUpdateHeaderChecksum
|
|
+ * Description: For an IP packet, decrement the TTL value and update the IP header
|
|
+ * checksum accordingly.
|
|
+ * Input : ipPacket - the IP packet
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * Notes : See also RFC1141
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void DecreaseTtlAndUpdateHeaderChecksum(unsigned char* ipPacket)
|
|
+{
|
|
+ struct iphdr* iph;
|
|
+ u_int32_t sum;
|
|
+
|
|
+ assert(ipPacket != NULL);
|
|
+
|
|
+ iph = (struct iphdr*) ipPacket;
|
|
+
|
|
+ iph->ttl--; /* decrement ttl */
|
|
+ sum = ntohs(iph->check) + 0x100; /* increment checksum high byte */
|
|
+ iph->check = htons(sum + (sum>>16)); /* add carry */
|
|
+} /* DecreaseTtlAndUpdateHeaderChecksum */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : GetIpHeader
|
|
+ * Description: Retrieve the IP header from BMF encapsulation UDP data
|
|
+ * Input : encapsulationUdpData - the encapsulation UDP data
|
|
+ * Output : none
|
|
+ * Return : IP header
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+struct ip* GetIpHeader(unsigned char* encapsulationUdpData)
|
|
+{
|
|
+ return (struct ip*)(encapsulationUdpData + ENCAP_HDR_LEN);
|
|
+} /* GetIpHeader */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : GetIpPacket
|
|
+ * Description: Retrieve the IP packet from BMF encapsulation UDP data
|
|
+ * Input : encapsulationUdpData - the encapsulation UDP data
|
|
+ * Output : none
|
|
+ * Return : The IP packet
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+unsigned char* GetIpPacket(unsigned char* encapsulationUdpData)
|
|
+{
|
|
+ return encapsulationUdpData + ENCAP_HDR_LEN;
|
|
+} /* GetIpPacket */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : GetEncapsulationUdpDataLength
|
|
+ * Description: Return the length of BMF encapsulation UDP data
|
|
+ * Input : encapsulationUdpData - the encapsulation UDP data
|
|
+ * Output : none
|
|
+ * Return : The encapsulation data length
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+u_int16_t GetEncapsulationUdpDataLength(unsigned char* encapsulationUdpData)
|
|
+{
|
|
+ return GetIpTotalLength(GetIpPacket(encapsulationUdpData)) + ENCAP_HDR_LEN;
|
|
+} /* GetEncapsulationUdpDataLength */
|
|
+
|
|
+
|
|
+/*
|
|
+ * Local Variables:
|
|
+ * c-basic-offset: 2
|
|
+ * indent-tabs-mode: nil
|
|
+ * End:
|
|
+ */
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/Packet.h olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/Packet.h
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/Packet.h 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/Packet.h 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,88 @@
|
|
+#ifndef _BMF_PACKET_H
|
|
+#define _BMF_PACKET_H
|
|
+
|
|
+/*
|
|
+ * OLSR Basic Multicast Forwarding (BMF) plugin.
|
|
+ * Copyright (c) 2005 - 2007, Thales Communications, Huizen, The Netherlands.
|
|
+ * Written by Erik Tromp.
|
|
+ * All rights reserved.
|
|
+ *
|
|
+ * Redistribution and use in source and binary forms, with or without
|
|
+ * modification, are permitted provided that the following conditions
|
|
+ * are met:
|
|
+ *
|
|
+ * * Redistributions of source code must retain the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer.
|
|
+ * * Redistributions in binary form must reproduce the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer in
|
|
+ * the documentation and/or other materials provided with the
|
|
+ * distribution.
|
|
+ * * Neither the name of Thales, BMF nor the names of its
|
|
+ * contributors may be used to endorse or promote products derived
|
|
+ * from this software without specific prior written permission.
|
|
+ *
|
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+ * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
+ * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
+ * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
+ */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * File : Packet.h
|
|
+ * Description: BMF and IP packet processing functions
|
|
+ * Created : 29 Jun 2006
|
|
+ *
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+/* System includes */
|
|
+#include <net/if.h> /* IFNAMSIZ, IFHWADDRLEN */
|
|
+#include <sys/types.h> /* u_int8_t, u_int16_t */
|
|
+
|
|
+/* BMF-encapsulated packets are Ethernet-IP-UDP packets, which start
|
|
+ * with a 8-bytes BMF header (struct TEncapHeader), followed by the
|
|
+ * encapsulated Ethernet-IP packet itself */
|
|
+
|
|
+struct TEncapHeader
|
|
+{
|
|
+ /* Use a standard Type-Length-Value (TLV) element */
|
|
+ u_int8_t type;
|
|
+ u_int8_t len;
|
|
+ u_int16_t reserved; /* Always 0 */
|
|
+ u_int32_t crc32;
|
|
+} __attribute__((__packed__));
|
|
+
|
|
+#define ENCAP_HDR_LEN ((int)sizeof(struct TEncapHeader))
|
|
+#define BMF_ENCAP_TYPE 1
|
|
+#define BMF_ENCAP_LEN 6
|
|
+
|
|
+struct TSaveTtl
|
|
+{
|
|
+ u_int8_t ttl;
|
|
+ u_int16_t check;
|
|
+} __attribute__((__packed__));
|
|
+
|
|
+int IsIpFragment(unsigned char* ipPacket);
|
|
+u_int16_t GetIpTotalLength(unsigned char* ipPacket);
|
|
+unsigned int GetIpHeaderLength(unsigned char* ipPacket);
|
|
+u_int8_t GetTtl(unsigned char* ipPacket);
|
|
+void SaveTtlAndChecksum(unsigned char* ipPacket, struct TSaveTtl* sttl);
|
|
+void RestoreTtlAndChecksum(unsigned char* ipPacket, struct TSaveTtl* sttl);
|
|
+void DecreaseTtlAndUpdateHeaderChecksum(unsigned char* ipPacket);
|
|
+struct ip* GetIpHeader(unsigned char* encapsulationUdpData);
|
|
+unsigned char* GetIpPacket(unsigned char* encapsulationUdpData);
|
|
+u_int16_t GetEncapsulationUdpDataLength(unsigned char* encapsulationUdpData);
|
|
+
|
|
+#endif /* _BMF_PACKET_H */
|
|
+
|
|
+/*
|
|
+ * Local Variables:
|
|
+ * c-basic-offset: 2
|
|
+ * indent-tabs-mode: nil
|
|
+ * End:
|
|
+ */
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/PacketHistory.c olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/PacketHistory.c
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/PacketHistory.c 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/PacketHistory.c 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,324 @@
|
|
+/*
|
|
+ * OLSR Basic Multicast Forwarding (BMF) plugin.
|
|
+ * Copyright (c) 2005 - 2007, Thales Communications, Huizen, The Netherlands.
|
|
+ * Written by Erik Tromp.
|
|
+ * All rights reserved.
|
|
+ *
|
|
+ * Redistribution and use in source and binary forms, with or without
|
|
+ * modification, are permitted provided that the following conditions
|
|
+ * are met:
|
|
+ *
|
|
+ * * Redistributions of source code must retain the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer.
|
|
+ * * Redistributions in binary form must reproduce the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer in
|
|
+ * the documentation and/or other materials provided with the
|
|
+ * distribution.
|
|
+ * * Neither the name of Thales, BMF nor the names of its
|
|
+ * contributors may be used to endorse or promote products derived
|
|
+ * from this software without specific prior written permission.
|
|
+ *
|
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+ * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
+ * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
+ * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
+ */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * File : PacketHistory.c
|
|
+ * Description: Functions for keeping and accessing the history of processed
|
|
+ * multicast IP packets.
|
|
+ * Created : 29 Jun 2006
|
|
+ *
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+#include "PacketHistory.h"
|
|
+
|
|
+/* System includes */
|
|
+#include <stddef.h> /* NULL */
|
|
+#include <assert.h> /* assert() */
|
|
+#include <string.h> /* memset */
|
|
+#include <sys/types.h> /* u_int16_t, u_int32_t */
|
|
+#include <netinet/ip.h> /* struct iphdr */
|
|
+#include <stdlib.h> /* atoi, malloc */
|
|
+
|
|
+/* OLSRD includes */
|
|
+#include "defs.h" /* GET_TIMESTAMP, TIMED_OUT */
|
|
+#include "olsr.h" /* OLSR_PRINTF */
|
|
+#include "scheduler.h" /* now_times */
|
|
+
|
|
+/* Plugin includes */
|
|
+#include "Packet.h"
|
|
+
|
|
+static struct TDupEntry* PacketHistory[HISTORY_HASH_SIZE];
|
|
+
|
|
+#define CRC_UPTO_NBYTES 256
|
|
+
|
|
+#if 0
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CalcCrcCcitt
|
|
+ * Description: Calculate 16-bits CRC according to CRC-CCITT specification
|
|
+ * Input : buffer - the bytes to calculate the CRC value over
|
|
+ * len - the number of bytes to calculate the CRC value over
|
|
+ * Output : none
|
|
+ * Return : CRC-16 value
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+static u_int16_t CalcCrcCcitt(unsigned char* buffer, ssize_t len)
|
|
+{
|
|
+ /* Initial value of 0xFFFF should be 0x1D0F according to
|
|
+ * www.joegeluso.com/software/articles/ccitt.htm */
|
|
+ u_int16_t crc = 0xFFFF;
|
|
+ int i;
|
|
+
|
|
+ assert(buffer != NULL);
|
|
+
|
|
+ for (i = 0; i < len; i++)
|
|
+ {
|
|
+ crc = (unsigned char)(crc >> 8) | (crc << 8);
|
|
+ crc ^= buffer[i];
|
|
+ crc ^= (unsigned char)(crc & 0xff) >> 4;
|
|
+ crc ^= (crc << 8) << 4;
|
|
+ crc ^= ((crc & 0xff) << 4) << 1;
|
|
+ }
|
|
+ return crc;
|
|
+} /* CalcCrcCcitt */
|
|
+#endif
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : GenerateCrc32Table
|
|
+ * Description: Generate the table of CRC remainders for all possible bytes,
|
|
+ * according to CRC-32-IEEE 802.3
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+#define CRC32_POLYNOMIAL 0xedb88320UL /* bit-inverse of 0x04c11db7UL */
|
|
+
|
|
+static unsigned long CrcTable[256];
|
|
+
|
|
+static void GenerateCrc32Table(void)
|
|
+{
|
|
+ int i, j;
|
|
+ u_int32_t crc;
|
|
+ for (i = 0; i < 256; i++)
|
|
+ {
|
|
+ crc = (u_int32_t) i;
|
|
+ for (j = 0; j < 8; j++)
|
|
+ {
|
|
+ if (crc & 1)
|
|
+ {
|
|
+ crc = (crc >> 1) ^ CRC32_POLYNOMIAL;
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ crc = (crc >> 1);
|
|
+ }
|
|
+ }
|
|
+ CrcTable[i] = crc;
|
|
+ } /* for */
|
|
+} /* GenerateCrc32Table */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CalcCrc32
|
|
+ * Description: Calculate CRC-32 according to CRC-32-IEEE 802.3
|
|
+ * Input : buffer - the bytes to calculate the CRC value over
|
|
+ * len - the number of bytes to calculate the CRC value over
|
|
+ * Output : none
|
|
+ * Return : CRC-32 value
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+static u_int32_t CalcCrc32(unsigned char* buffer, ssize_t len)
|
|
+{
|
|
+ int i, j;
|
|
+ u_int32_t crc = 0xffffffffUL;
|
|
+ for (i = 0; i < len; i++)
|
|
+ {
|
|
+ j = ((int) (crc & 0xFF) ^ *buffer++);
|
|
+ crc = (crc >> 8) ^ CrcTable[j];
|
|
+ }
|
|
+ return crc ^ 0xffffffffUL;
|
|
+} /* CalcCrc32 */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : PacketCrc32
|
|
+ * Description: Calculates the CRC-32 value for an IP packet
|
|
+ * Input : ipPacket - the IP packet
|
|
+ * len - the number of octets in the IP packet
|
|
+ * Output : none
|
|
+ * Return : 32-bits CRC value
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+u_int32_t PacketCrc32(unsigned char* ipPacket, ssize_t len)
|
|
+{
|
|
+ struct TSaveTtl sttl;
|
|
+ struct ip* ipHeader;
|
|
+ u_int32_t result;
|
|
+
|
|
+ assert(ipPacket != NULL);
|
|
+
|
|
+ /* Skip TTL: in a multi-homed OLSR-network, the same multicast packet
|
|
+ * may enter the network multiple times, each copy differing only in its
|
|
+ * TTL value. BMF must not calculate a different CRC for packets that
|
|
+ * differ only in TTL. Skip also the IP-header checksum, because it changes
|
|
+ * along with TTL. Besides, it is not a good idea to calculate a CRC over
|
|
+ * data that already contains a checksum.
|
|
+ *
|
|
+ * Clip number of bytes over which CRC is calculated to prevent
|
|
+ * long packets from possibly claiming too much CPU resources. */
|
|
+ assert(len > 0);
|
|
+ if (len > CRC_UPTO_NBYTES)
|
|
+ {
|
|
+ len = CRC_UPTO_NBYTES;
|
|
+ }
|
|
+
|
|
+ SaveTtlAndChecksum(ipPacket, &sttl);
|
|
+
|
|
+ ipHeader = (struct ip*)ipPacket;
|
|
+ ipHeader->ip_ttl = 0xFF; /* fixed value of TTL for CRC-32 calculation */
|
|
+ ipHeader->ip_sum = 0x5A5A; /* fixed value of IP header checksum for CRC-32 calculation */
|
|
+
|
|
+ result = CalcCrc32(ipPacket, len);
|
|
+
|
|
+ RestoreTtlAndChecksum(ipPacket, &sttl);
|
|
+ return result;
|
|
+} /* PacketCrc32 */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : Hash
|
|
+ * Description: Calculates a hash value from a 32-bit value
|
|
+ * Input : from32 - 32-bit value
|
|
+ * Output : none
|
|
+ * Return : hash value
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+u_int32_t Hash(u_int32_t from32)
|
|
+{
|
|
+ return ((from32 >> N_HASH_BITS) + from32) & ((1 << N_HASH_BITS) - 1);
|
|
+} /* Hash */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : InitPacketHistory
|
|
+ * Description: Initialize the packet history table and CRC-32 table
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : PacketHistory
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void InitPacketHistory(void)
|
|
+{
|
|
+ int i;
|
|
+
|
|
+ GenerateCrc32Table();
|
|
+
|
|
+ for(i = 0; i < HISTORY_HASH_SIZE; i++)
|
|
+ {
|
|
+ PacketHistory[i] = NULL;
|
|
+ }
|
|
+} /* InitPacketHistory */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CheckAndMarkRecentPacket
|
|
+ * Description: Check if this packet was seen recently, then record the fact
|
|
+ * that this packet was seen recently.
|
|
+ * Input : crc32 - 32-bits crc value of the packet
|
|
+ * Output : none
|
|
+ * Return : not recently seen (0), recently seen (1)
|
|
+ * Data Used : PacketHistory
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int CheckAndMarkRecentPacket(u_int32_t crc32)
|
|
+{
|
|
+ u_int32_t idx;
|
|
+ struct TDupEntry* walker;
|
|
+ struct TDupEntry* newEntry;
|
|
+
|
|
+ idx = Hash(crc32);
|
|
+ assert(idx < HISTORY_HASH_SIZE);
|
|
+
|
|
+ for (walker = PacketHistory[idx]; walker != NULL; walker = walker->next)
|
|
+ {
|
|
+ if (walker->crc32 == crc32)
|
|
+ {
|
|
+ /* Found duplicate entry */
|
|
+
|
|
+ /* Always mark as "seen recently": refresh time-out */
|
|
+ walker->timeOut = GET_TIMESTAMP(HISTORY_HOLD_TIME);
|
|
+
|
|
+ return 1;
|
|
+ } /* if */
|
|
+ } /* for */
|
|
+
|
|
+ /* No duplicate entry found: create one */
|
|
+ newEntry = malloc(sizeof(struct TDupEntry));
|
|
+ if (newEntry != NULL)
|
|
+ {
|
|
+ newEntry->crc32 = crc32;
|
|
+ newEntry->timeOut = GET_TIMESTAMP(HISTORY_HOLD_TIME);
|
|
+
|
|
+ /* Add new entry at the front of the list */
|
|
+ newEntry->next = PacketHistory[idx];
|
|
+ PacketHistory[idx] = newEntry;
|
|
+ }
|
|
+
|
|
+ return 0;
|
|
+} /* CheckAndMarkRecentPacket */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : PrunePacketHistory
|
|
+ * Description: Prune the packet history table.
|
|
+ * Input : useless - not used
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : PacketHistory
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void PrunePacketHistory(void* useless __attribute__((unused)))
|
|
+{
|
|
+ uint i;
|
|
+ for (i = 0; i < HISTORY_HASH_SIZE; i++)
|
|
+ {
|
|
+ if (PacketHistory[i] != NULL)
|
|
+ {
|
|
+ struct TDupEntry* nextEntry = PacketHistory[i];
|
|
+ struct TDupEntry* prevEntry = NULL;
|
|
+ while (nextEntry != NULL)
|
|
+ {
|
|
+ struct TDupEntry* entry = nextEntry;
|
|
+ nextEntry = entry->next;
|
|
+
|
|
+ if (TIMED_OUT(entry->timeOut))
|
|
+ {
|
|
+ /* De-queue */
|
|
+ if (prevEntry != NULL)
|
|
+ {
|
|
+ prevEntry->next = entry->next;
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ PacketHistory[i] = entry->next;
|
|
+ } /* if */
|
|
+
|
|
+ /* De-allocate memory */
|
|
+ free(entry);
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ prevEntry = entry;
|
|
+ } /* if */
|
|
+ } /* while */
|
|
+ } /* if (PacketHistory[i] != NULL) */
|
|
+ } /* for (i = ...) */
|
|
+} /* PrunePacketHistory */
|
|
+
|
|
+/*
|
|
+ * Local Variables:
|
|
+ * c-basic-offset: 2
|
|
+ * indent-tabs-mode: nil
|
|
+ * End:
|
|
+ */
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/PacketHistory.h olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/PacketHistory.h
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/PacketHistory.h 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/PacketHistory.h 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,75 @@
|
|
+#ifndef _BMF_PACKETHISTORY_H
|
|
+#define _BMF_PACKETHISTORY_H
|
|
+
|
|
+/*
|
|
+ * OLSR Basic Multicast Forwarding (BMF) plugin.
|
|
+ * Copyright (c) 2005 - 2007, Thales Communications, Huizen, The Netherlands.
|
|
+ * Written by Erik Tromp.
|
|
+ * All rights reserved.
|
|
+ *
|
|
+ * Redistribution and use in source and binary forms, with or without
|
|
+ * modification, are permitted provided that the following conditions
|
|
+ * are met:
|
|
+ *
|
|
+ * * Redistributions of source code must retain the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer.
|
|
+ * * Redistributions in binary form must reproduce the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer in
|
|
+ * the documentation and/or other materials provided with the
|
|
+ * distribution.
|
|
+ * * Neither the name of Thales, BMF nor the names of its
|
|
+ * contributors may be used to endorse or promote products derived
|
|
+ * from this software without specific prior written permission.
|
|
+ *
|
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+ * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
+ * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
+ * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
+ */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * File : PacketHistory.h
|
|
+ * Description: Functions for keeping and accessing the history of processed
|
|
+ * multicast IP packets.
|
|
+ * Created : 29 Jun 2006
|
|
+ *
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+/* System includes */
|
|
+#include <sys/types.h> /* ssize_t */
|
|
+#include <sys/times.h> /* clock_t */
|
|
+
|
|
+#define N_HASH_BITS 12
|
|
+#define HISTORY_HASH_SIZE (1 << N_HASH_BITS)
|
|
+
|
|
+/* Time-out of duplicate entries, in milliseconds */
|
|
+#define HISTORY_HOLD_TIME 3000
|
|
+
|
|
+struct TDupEntry
|
|
+{
|
|
+ u_int32_t crc32;
|
|
+ clock_t timeOut;
|
|
+ struct TDupEntry* next;
|
|
+};
|
|
+
|
|
+void InitPacketHistory(void);
|
|
+u_int32_t PacketCrc32(unsigned char* ipPkt, ssize_t len);
|
|
+u_int32_t Hash(u_int32_t from32);
|
|
+void MarkRecentPacket(u_int32_t crc32);
|
|
+int CheckAndMarkRecentPacket(u_int32_t crc32);
|
|
+void PrunePacketHistory(void*);
|
|
+
|
|
+#endif /* _BMF_PACKETHISTORY_H */
|
|
+
|
|
+/*
|
|
+ * Local Variables:
|
|
+ * c-basic-offset: 2
|
|
+ * indent-tabs-mode: nil
|
|
+ * End:
|
|
+ */
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/mdns.c olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/mdns.c
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/mdns.c 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/mdns.c 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,1174 @@
|
|
+/*
|
|
+ * OLSR MDNS plugin.
|
|
+ * Written by Saverio Proto.
|
|
+ *
|
|
+ * Redistribution and use in source and binary forms, with or without
|
|
+ * modification, are permitted provided that the following conditions
|
|
+ * are met:
|
|
+ *
|
|
+ * * Redistributions of source code must retain the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer.
|
|
+ * * Redistributions in binary form must reproduce the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer in
|
|
+ * the documentation and/or other materials provided with the
|
|
+ * distribution.
|
|
+ * * Neither the name of Thales, BMF nor the names of its
|
|
+ * contributors may be used to endorse or promote products derived
|
|
+ * from this software without specific prior written permission.
|
|
+ *
|
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+ * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
+ * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
+ * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
+ */
|
|
+
|
|
+
|
|
+//#define _MULTI_THREADED
|
|
+
|
|
+#include "mdns.h"
|
|
+
|
|
+/* System includes */
|
|
+#include <stddef.h> /* NULL */
|
|
+#include <sys/types.h> /* ssize_t */
|
|
+#include <string.h> /* strerror() */
|
|
+#include <stdarg.h> /* va_list, va_start, va_end */
|
|
+#include <errno.h> /* errno */
|
|
+#include <assert.h> /* assert() */
|
|
+#include <linux/if_ether.h> /* ETH_P_IP */
|
|
+#include <linux/if_packet.h> /* struct sockaddr_ll, PACKET_MULTICAST */
|
|
+//#include <pthread.h> /* pthread_t, pthread_create() */
|
|
+#include <signal.h> /* sigset_t, sigfillset(), sigdelset(), SIGINT */
|
|
+#include <netinet/ip.h> /* struct ip */
|
|
+#include <netinet/udp.h> /* struct udphdr */
|
|
+#include <unistd.h> /* close() */
|
|
+
|
|
+#include <netinet/in.h>
|
|
+#include <netinet/ip6.h>
|
|
+
|
|
+/* OLSRD includes */
|
|
+#include "plugin_util.h" /* set_plugin_int */
|
|
+#include "defs.h" /* olsr_cnf, OLSR_PRINTF */
|
|
+#include "ipcalc.h"
|
|
+#include "olsr.h" /* OLSR_PRINTF */
|
|
+#include "mid_set.h" /* mid_lookup_main_addr() */
|
|
+#include "mpr_selector_set.h" /* olsr_lookup_mprs_set() */
|
|
+#include "link_set.h" /* get_best_link_to_neighbor() */
|
|
+#include "net_olsr.h" /* ipequal */
|
|
+
|
|
+/* plugin includes */
|
|
+#include "NetworkInterfaces.h" /* TBmfInterface, CreateBmfNetworkInterfaces(), CloseBmfNetworkInterfaces() */
|
|
+#include "Address.h" /* IsMulticast() */
|
|
+#include "Packet.h" /* ENCAP_HDR_LEN, BMF_ENCAP_TYPE, BMF_ENCAP_LEN etc. */
|
|
+#include "PacketHistory.h" /* InitPacketHistory() */
|
|
+
|
|
+//static pthread_t mdnsThread;
|
|
+//static int mdnsThreadRunning = 0;
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : PacketReceivedFromOLSR
|
|
+ * Description: Handle a received packet from a OLSR message
|
|
+ * Input : ipPacket into an unsigned char and the lenght of the packet
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : BmfInterfaces
|
|
+ * ------------------------------------------------------------------------- */
|
|
+static void PacketReceivedFromOLSR(
|
|
+ unsigned char* encapsulationUdpData, int len)
|
|
+{
|
|
+ struct ip* ipHeader; /* IP header inside the encapsulated IP packet */
|
|
+ union olsr_ip_addr mcSrc; /* Original source of the encapsulated multicast packet */
|
|
+ union olsr_ip_addr mcDst; /* Multicast destination of the encapsulated packet */
|
|
+ struct TBmfInterface* walker;
|
|
+ ipHeader = (struct ip*) encapsulationUdpData;
|
|
+ mcSrc.v4 = ipHeader->ip_src;
|
|
+ mcDst.v4 = ipHeader->ip_dst;
|
|
+
|
|
+ OLSR_PRINTF(3, "MDNS PLUGIN got packet from OLSR message\n");
|
|
+
|
|
+
|
|
+ /* Check with each network interface what needs to be done on it */
|
|
+ for (walker = BmfInterfaces; walker != NULL; walker = walker->next)
|
|
+ {
|
|
+ /* To a non-OLSR interface: unpack the encapsulated IP packet and forward it */
|
|
+ if (walker->olsrIntf == NULL)
|
|
+ {
|
|
+ int nBytesWritten;
|
|
+ struct sockaddr_ll dest;
|
|
+
|
|
+ memset(&dest, 0, sizeof(dest));
|
|
+ dest.sll_family = AF_PACKET;
|
|
+ if ((encapsulationUdpData[0] & 0xf0) == 0x40) dest.sll_protocol = htons(ETH_P_IP);
|
|
+ if ((encapsulationUdpData[0] & 0xf0) == 0x60) dest.sll_protocol = htons(ETH_P_IPV6);
|
|
+ //TODO: if packet is not IP die here
|
|
+ dest.sll_ifindex = if_nametoindex(walker->ifName);
|
|
+ dest.sll_halen = IFHWADDRLEN;
|
|
+
|
|
+ /* Use all-ones as destination MAC address. When the IP destination is
|
|
+ * a multicast address, the destination MAC address should normally also
|
|
+ * be a multicast address. E.g., when the destination IP is 224.0.0.1,
|
|
+ * the destination MAC should be 01:00:5e:00:00:01. However, it does not
|
|
+ * seem to matter when the destination MAC address is set to all-ones
|
|
+ * in that case. */
|
|
+ memset(dest.sll_addr, 0xFF, IFHWADDRLEN);
|
|
+
|
|
+ nBytesWritten = sendto(
|
|
+ walker->capturingSkfd,
|
|
+ encapsulationUdpData,
|
|
+ len,
|
|
+ 0,
|
|
+ (struct sockaddr*) &dest,
|
|
+ sizeof(dest));
|
|
+ if (nBytesWritten != len)
|
|
+ {
|
|
+ BmfPError("sendto() error forwarding unpacked encapsulated pkt on \"%s\"", walker->ifName);
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+
|
|
+ OLSR_PRINTF(
|
|
+ 2,
|
|
+ "%s: --> unpacked and forwarded on \"%s\"\n",
|
|
+ PLUGIN_NAME_SHORT,
|
|
+ walker->ifName);
|
|
+ }
|
|
+ } /* if (walker->olsrIntf == NULL) */
|
|
+}
|
|
+} /* PacketReceivedFromOLSR */
|
|
+
|
|
+
|
|
+
|
|
+bool
|
|
+olsr_parser(union olsr_message *m,
|
|
+ struct interface *in_if __attribute__((unused)),
|
|
+ union olsr_ip_addr *ipaddr)
|
|
+{
|
|
+ union olsr_ip_addr originator;
|
|
+ int size;
|
|
+ olsr_reltime vtime;
|
|
+ OLSR_PRINTF(2, "MDNS PLUGIN: Received msg in parser\n");
|
|
+ /* Fetch the originator of the messsage */
|
|
+ if(olsr_cnf->ip_version == AF_INET) {
|
|
+ memcpy(&originator, &m->v4.originator, olsr_cnf->ipsize);
|
|
+ vtime = me_to_reltime(m->v4.olsr_vtime);
|
|
+ size = ntohs(m->v4.olsr_msgsize);
|
|
+ } else {
|
|
+ memcpy(&originator, &m->v6.originator, olsr_cnf->ipsize);
|
|
+ vtime = me_to_reltime(m->v6.olsr_vtime);
|
|
+ size = ntohs(m->v6.olsr_msgsize);
|
|
+ }
|
|
+
|
|
+ /* Check if message originated from this node.
|
|
+ * If so - back off */
|
|
+ if(ipequal(&originator, &olsr_cnf->main_addr))
|
|
+ return false;
|
|
+
|
|
+ /* Check that the neighbor this message was received from is symmetric.
|
|
+ * If not - back off*/
|
|
+ if(check_neighbor_link(ipaddr) != SYM_LINK) {
|
|
+ struct ipaddr_str strbuf;
|
|
+ OLSR_PRINTF(3, "NAME PLUGIN: Received msg from NON SYM neighbor %s\n", olsr_ip_to_string(&strbuf, ipaddr));
|
|
+ return false;
|
|
+ }
|
|
+
|
|
+ if(olsr_cnf->ip_version == AF_INET){
|
|
+ PacketReceivedFromOLSR((unsigned char*) &m->v4.message,size-12);
|
|
+ }
|
|
+ else {
|
|
+ PacketReceivedFromOLSR((unsigned char*) &m->v6.message,size-12-96);
|
|
+ }
|
|
+ /* Forward the message */
|
|
+ return 1;
|
|
+}
|
|
+
|
|
+//Sends a packet in the OLSR network
|
|
+void
|
|
+olsr_mdns_gen(unsigned char* packet, int len)
|
|
+{
|
|
+ /* send buffer: huge */
|
|
+ char buffer[10240];
|
|
+ union olsr_message *message = (union olsr_message *)buffer;
|
|
+ struct interface *ifn;
|
|
+ //int namesize;
|
|
+
|
|
+ /* fill message */
|
|
+ if(olsr_cnf->ip_version == AF_INET)
|
|
+ {
|
|
+ /* IPv4 */
|
|
+ message->v4.olsr_msgtype = MESSAGE_TYPE;
|
|
+ message->v4.olsr_vtime = reltime_to_me(MDNS_VALID_TIME * MSEC_PER_SEC);
|
|
+ memcpy(&message->v4.originator, &olsr_cnf->main_addr, olsr_cnf->ipsize);
|
|
+ message->v4.ttl = MAX_TTL;
|
|
+ message->v4.hopcnt = 0;
|
|
+ message->v4.seqno = htons(get_msg_seqno());
|
|
+
|
|
+ message->v4.olsr_msgsize = htons(len+12);
|
|
+
|
|
+ memcpy(&message->v4.message,packet,len);
|
|
+ len=len+12;
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ /* IPv6 */
|
|
+ message->v6.olsr_msgtype = MESSAGE_TYPE;
|
|
+ message->v6.olsr_vtime = reltime_to_me(MDNS_VALID_TIME * MSEC_PER_SEC);
|
|
+ memcpy(&message->v6.originator, &olsr_cnf->main_addr, olsr_cnf->ipsize);
|
|
+ message->v6.ttl = MAX_TTL;
|
|
+ message->v6.hopcnt = 0;
|
|
+ message->v6.seqno = htons(get_msg_seqno());
|
|
+
|
|
+ message->v6.olsr_msgsize = htons(len+12+96);
|
|
+ memcpy(&message->v6.message,packet,len);
|
|
+ len=len+12+96;
|
|
+ }
|
|
+
|
|
+ /* looping trough interfaces */
|
|
+ for (ifn = ifnet; ifn; ifn = ifn->int_next) {
|
|
+ OLSR_PRINTF(1, "MDNS PLUGIN: Generating packet - [%s]\n", ifn->int_name);
|
|
+
|
|
+ if(net_outbuffer_push(ifn, message, len) != len) {
|
|
+ /* send data and try again */
|
|
+ net_output(ifn);
|
|
+ if(net_outbuffer_push(ifn, message, len) != len) {
|
|
+ OLSR_PRINTF(1, "MDNS PLUGIN: could not send on interface: %s\n", ifn->int_name);
|
|
+ }
|
|
+ }
|
|
+ }
|
|
+}
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : BmfPError
|
|
+ * Description: Prints an error message at OLSR debug level 1.
|
|
+ * First the plug-in name is printed. Then (if format is not NULL
|
|
+ * and *format is not empty) the arguments are printed, followed
|
|
+ * by a colon and a blank. Then the message and a new-line.
|
|
+ * Input : format, arguments
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+void BmfPError(const char* format, ...)
|
|
+{
|
|
+#define MAX_STR_DESC 255
|
|
+#ifndef NODEBUG
|
|
+ char* strErr = strerror(errno);
|
|
+#endif
|
|
+ char strDesc[MAX_STR_DESC];
|
|
+
|
|
+ /* Rely on short-circuit boolean evaluation */
|
|
+ if (format == NULL || *format == '\0')
|
|
+ {
|
|
+ OLSR_PRINTF(1, "%s: %s\n", PLUGIN_NAME, strErr);
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ va_list arglist;
|
|
+
|
|
+ OLSR_PRINTF(1, "%s: ", PLUGIN_NAME);
|
|
+
|
|
+ va_start(arglist, format);
|
|
+ vsnprintf(strDesc, MAX_STR_DESC, format, arglist);
|
|
+ va_end(arglist);
|
|
+
|
|
+ strDesc[MAX_STR_DESC - 1] = '\0'; /* Ensures null termination */
|
|
+
|
|
+ OLSR_PRINTF(1, "%s: %s\n", strDesc, strErr);
|
|
+ }
|
|
+} /* BmfPError */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : MainAddressOf
|
|
+ * Description: Lookup the main address of a node
|
|
+ * Input : ip - IP address of the node
|
|
+ * Output : none
|
|
+ * Return : The main IP address of the node
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+union olsr_ip_addr* MainAddressOf(union olsr_ip_addr* ip)
|
|
+{
|
|
+ union olsr_ip_addr* result;
|
|
+
|
|
+ /* TODO: mid_lookup_main_addr() is not thread-safe! */
|
|
+ result = mid_lookup_main_addr(ip);
|
|
+ if (result == NULL)
|
|
+ {
|
|
+ result = ip;
|
|
+ }
|
|
+ return result;
|
|
+} /* MainAddressOf */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : EncapsulateAndForwardPacket
|
|
+ * Description: Encapsulate a captured raw IP packet and forward it
|
|
+ * Input : intf - the network interface on which to forward the packet
|
|
+ * encapsulationUdpData - The encapsulation header, followed by
|
|
+ * the encapsulated IP packet
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * ------------------------------------------------------------------------- */
|
|
+//static void EncapsulateAndForwardPacket(
|
|
+// struct TBmfInterface* intf,
|
|
+// unsigned char* encapsulationUdpData)
|
|
+//{
|
|
+//// /* The packet */
|
|
+// u_int16_t udpDataLen = GetEncapsulationUdpDataLength(encapsulationUdpData);
|
|
+//
|
|
+// /* The next destination(s) */
|
|
+// struct TBestNeighbors bestNeighborLinks;
|
|
+// struct link_entry* bestNeighbor;
|
|
+//
|
|
+// int nPossibleNeighbors = 0;
|
|
+// struct sockaddr_in forwardTo; /* Next destination of encapsulation packet */
|
|
+// int nPacketsToSend;
|
|
+// int sendUnicast; /* 0 = send broadcast; 1 = send unicast */
|
|
+//
|
|
+// int i;
|
|
+//
|
|
+// /* Find at most 'FanOutLimit' best neigbors to forward the packet to */
|
|
+// FindNeighbors(&bestNeighborLinks, &bestNeighbor, intf, NULL, NULL, NULL, &nPossibleNeighbors);
|
|
+//
|
|
+// if (nPossibleNeighbors <= 0)
|
|
+// {
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: --> not encap-forwarding on \"%s\": there is no neighbor that needs my retransmission\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// intf->ifName);
|
|
+// return;
|
|
+// }
|
|
+//
|
|
+// /* Compose destination of encapsulation packet */
|
|
+//
|
|
+// memset(&forwardTo, 0, sizeof(forwardTo));
|
|
+// forwardTo.sin_family = AF_INET;
|
|
+// forwardTo.sin_port = htons(BMF_ENCAP_PORT);
|
|
+//
|
|
+// /* Start by filling in the local broadcast address. This may be overwritten later. */
|
|
+// forwardTo.sin_addr = intf->broadAddr.v4;
|
|
+//
|
|
+// /* - If the BMF mechanism is BM_UNICAST_PROMISCUOUS, always send just one
|
|
+// * unicast packet (to the best neighbor).
|
|
+// * - But if the BMF mechanism is BM_BROADCAST,
|
|
+// * - send 'nPossibleNeighbors' unicast packets if there are up to
|
|
+// * 'FanOutLimit' possible neighbors,
|
|
+// * - if there are more than 'FanOutLimit' possible neighbors, then
|
|
+// * send a (WLAN-air-expensive, less reliable) broadcast packet. */
|
|
+// if (BmfMechanism == BM_UNICAST_PROMISCUOUS)
|
|
+// {
|
|
+// /* One unicast packet to the best neighbor */
|
|
+// nPacketsToSend = 1;
|
|
+// sendUnicast = 1;
|
|
+// bestNeighborLinks.links[0] = bestNeighbor;
|
|
+// }
|
|
+// else /* BmfMechanism == BM_BROADCAST */
|
|
+// {
|
|
+// if (nPossibleNeighbors <= FanOutLimit)
|
|
+// {
|
|
+// /* 'nPossibleNeighbors' unicast packets */
|
|
+// nPacketsToSend = nPossibleNeighbors;
|
|
+// sendUnicast = 1;
|
|
+// }
|
|
+// else /* nPossibleNeighbors > FanOutLimit */
|
|
+// {
|
|
+// /* One broadcast packet, possibly retransmitted as specified in the
|
|
+// * 'BroadcastRetransmitCount' plugin parameter */
|
|
+// nPacketsToSend = BroadcastRetransmitCount;
|
|
+// sendUnicast = 0;
|
|
+// } /* if */
|
|
+// } /* if */
|
|
+//
|
|
+// for (i = 0; i < nPacketsToSend; i++)
|
|
+// {
|
|
+// int nBytesWritten;
|
|
+//
|
|
+// if (sendUnicast == 1)
|
|
+// {
|
|
+// /* For unicast, overwrite the local broadcast address which was filled in above */
|
|
+// forwardTo.sin_addr = bestNeighborLinks.links[i]->neighbor_iface_addr.v4;
|
|
+// }
|
|
+//
|
|
+// /* Forward the BMF packet via the encapsulation socket */
|
|
+// nBytesWritten = sendto(
|
|
+// intf->encapsulatingSkfd,
|
|
+// encapsulationUdpData,
|
|
+// udpDataLen,
|
|
+// MSG_DONTROUTE,
|
|
+// (struct sockaddr*) &forwardTo,
|
|
+// sizeof(forwardTo));
|
|
+//
|
|
+// /* Evaluate and display result */
|
|
+// if (nBytesWritten != udpDataLen)
|
|
+// {
|
|
+// BmfPError("sendto() error forwarding pkt on \"%s\"", intf->ifName);
|
|
+// }
|
|
+// else
|
|
+// {
|
|
+// /* Increase counter */
|
|
+// intf->nBmfPacketsTx++;
|
|
+//
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: --> encapsulated and forwarded on \"%s\" to %s\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// intf->ifName,
|
|
+// inet_ntoa(forwardTo.sin_addr));
|
|
+// } /* if (nBytesWritten != udpDataLen) */
|
|
+// } /* for */
|
|
+//} /* EncapsulateAndForwardPacket */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : BmfPacketCaptured
|
|
+ * Description: Handle a captured IP packet
|
|
+ * Input : intf - the network interface on which the packet was captured
|
|
+ * sllPkttype - the type of packet. Either PACKET_OUTGOING,
|
|
+ * PACKET_BROADCAST or PACKET_MULTICAST.
|
|
+ * encapsulationUdpData - space for the encapsulation header, followed by
|
|
+ * the captured IP packet
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : BmfInterfaces
|
|
+ * Notes : The IP packet is assumed to be captured on a socket of family
|
|
+ * PF_PACKET and type SOCK_DGRAM (cooked).
|
|
+ * ------------------------------------------------------------------------- */
|
|
+static void BmfPacketCaptured(
|
|
+ //struct TBmfInterface* intf,
|
|
+ //unsigned char sllPkttype,
|
|
+ unsigned char* encapsulationUdpData,
|
|
+ int nBytes)
|
|
+{
|
|
+ union olsr_ip_addr src; /* Source IP address in captured packet */
|
|
+ union olsr_ip_addr dst; /* Destination IP address in captured packet */
|
|
+ union olsr_ip_addr* origIp; /* Main OLSR address of source of captured packet */
|
|
+ //struct TBmfInterface* walker;
|
|
+ //int isFromOlsrIntf;
|
|
+ //int isFromOlsrNeighbor;
|
|
+ //int iAmMpr;
|
|
+ //unsigned char* ipPacket; /* The captured IP packet... */
|
|
+ //u_int16_t ipPacketLen; /* ...and its length */
|
|
+ struct ip* ipHeader; /* The IP header inside the captured IP packet */
|
|
+ struct ip6_hdr* ipHeader6; /* The IP header inside the captured IP packet */
|
|
+ //u_int32_t crc32;
|
|
+ //struct TEncapHeader* encapHdr;
|
|
+ //struct ipaddr_str srcBuf, dstBuf;
|
|
+ struct udphdr* udpHeader;
|
|
+ u_int16_t destPort;
|
|
+
|
|
+ if ((encapsulationUdpData[0] & 0xf0) == 0x40) { //IPV4
|
|
+
|
|
+ ipHeader = (struct ip*) encapsulationUdpData;
|
|
+
|
|
+ dst.v4 = ipHeader->ip_dst;
|
|
+
|
|
+ /* Only forward multicast packets. If configured, also forward local broadcast packets */
|
|
+ if (IsMulticast(&dst))
|
|
+ {
|
|
+ /* continue */
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ return;
|
|
+ }
|
|
+ if (ipHeader->ip_p != SOL_UDP)
|
|
+ {
|
|
+ /* Not UDP */
|
|
+ OLSR_PRINTF(1,"NON UDP PACKET\n");
|
|
+ return; /* for */
|
|
+ }
|
|
+ udpHeader = (struct udphdr*)(encapsulationUdpData + GetIpHeaderLength(encapsulationUdpData));
|
|
+ destPort = ntohs(udpHeader->dest);
|
|
+ if (destPort != 5353)
|
|
+ {
|
|
+ return;
|
|
+ }
|
|
+ }//END IPV4
|
|
+
|
|
+ else if ((encapsulationUdpData[0] & 0xf0) == 0x60) { //IPv6
|
|
+
|
|
+ ipHeader6 = (struct ip6_hdr*) encapsulationUdpData;
|
|
+ if (ipHeader6->ip6_dst.s6_addr[0] == 0xff) //Multicast
|
|
+ {
|
|
+ //Continua
|
|
+ }
|
|
+ else
|
|
+ {
|
|
+ return; //not multicast
|
|
+ }
|
|
+ if (ipHeader6->ip6_nxt != SOL_UDP)
|
|
+ {
|
|
+ /* Not UDP */
|
|
+ OLSR_PRINTF(1,"NON UDP PACKET\n");
|
|
+ return; /* for */
|
|
+ }
|
|
+ udpHeader = (struct udphdr*)(encapsulationUdpData + 40);
|
|
+ destPort = ntohs(udpHeader->dest);
|
|
+ if (destPort != 5353)
|
|
+ {
|
|
+ return;
|
|
+ }
|
|
+ } //END IPV6
|
|
+ else return; //Is not IP packet
|
|
+
|
|
+ /* Check if the frame is captured on an OLSR-enabled interface */
|
|
+ //isFromOlsrIntf = (intf->olsrIntf != NULL); TODO: put again this check
|
|
+
|
|
+ /* Retrieve the length of the captured packet */
|
|
+ //ipPacketLen = GetIpTotalLength(ipPacket);
|
|
+
|
|
+ //src.v4 = ipHeader->ip_src;
|
|
+
|
|
+ //OLSR_PRINTF(
|
|
+ // 1,
|
|
+ // "%s: %s pkt of %ld bytes captured on %s interface \"%s\": %s->%s\n",
|
|
+ // PLUGIN_NAME_SHORT,
|
|
+ // sllPkttype == PACKET_OUTGOING ? "outgoing" : "incoming",
|
|
+ // (long)ipPacketLen,
|
|
+ // isFromOlsrIntf ? "OLSR" : "non-OLSR",
|
|
+ // intf->ifName,
|
|
+ // olsr_ip_to_string(&srcBuf, &src),
|
|
+ // olsr_ip_to_string(&dstBuf, &dst));
|
|
+
|
|
+ /* Lookup main address of source in the MID table of OLSR */
|
|
+ origIp = MainAddressOf(&src);
|
|
+
|
|
+ // send the packet to OLSR forward mechanism
|
|
+ olsr_mdns_gen(encapsulationUdpData,nBytes);
|
|
+} /* BmfPacketCaptured */
|
|
+
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : BmfEncapsulationPacketReceived
|
|
+ * Description: Handle a received BMF-encapsulation packet
|
|
+ * Input : intf - the network interface on which the packet was received
|
|
+ * forwardedBy - the IP node that forwarded the packet to me
|
|
+ * forwardedTo - the destination IP address of the encapsulation
|
|
+ * packet, in case the packet was received promiscuously.
|
|
+ * Pass NULL if the packet is received normally (unicast or
|
|
+ * broadcast).
|
|
+ * encapsulationUdpData - the encapsulating IP UDP data, containting
|
|
+ * the BMF encapsulation header, followed by the encapsulated
|
|
+ * IP packet
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : BmfInterfaces
|
|
+ * ------------------------------------------------------------------------- */
|
|
+//static void BmfEncapsulationPacketReceived(
|
|
+// struct TBmfInterface* intf,
|
|
+// union olsr_ip_addr* forwardedBy,
|
|
+// union olsr_ip_addr* forwardedTo,
|
|
+// unsigned char* encapsulationUdpData)
|
|
+//{
|
|
+// int iAmMpr; /* True (1) if I am selected as MPR by 'forwardedBy' */
|
|
+// struct sockaddr_in forwardTo; /* Next destination of encapsulation packet */
|
|
+// unsigned char* ipPacket; /* The encapsulated IP packet */
|
|
+// u_int16_t ipPacketLen; /* Length of the encapsulated IP packet */
|
|
+// struct ip* ipHeader; /* IP header inside the encapsulated IP packet */
|
|
+// union olsr_ip_addr mcSrc; /* Original source of the encapsulated multicast packet */
|
|
+// union olsr_ip_addr mcDst; /* Multicast destination of the encapsulated packet */
|
|
+// struct TEncapHeader* encapsulationHdr;
|
|
+// u_int16_t encapsulationUdpDataLen;
|
|
+// struct TBmfInterface* walker;
|
|
+// struct ipaddr_str mcSrcBuf, mcDstBuf, forwardedByBuf, forwardedToBuf;
|
|
+// /* Are we talking to ourselves? */
|
|
+// if (if_ifwithaddr(forwardedBy) != NULL)
|
|
+// {
|
|
+// return;
|
|
+// }
|
|
+//
|
|
+// /* Discard encapsulated packets received on a non-OLSR interface */
|
|
+// if (intf->olsrIntf == NULL)
|
|
+// {
|
|
+// return;
|
|
+// }
|
|
+//
|
|
+// /* Retrieve details about the encapsulated IP packet */
|
|
+// ipPacket = GetIpPacket(encapsulationUdpData);
|
|
+// ipPacketLen = GetIpTotalLength(ipPacket);
|
|
+// ipHeader = GetIpHeader(encapsulationUdpData);
|
|
+//
|
|
+// mcSrc.v4 = ipHeader->ip_src;
|
|
+// mcDst.v4 = ipHeader->ip_dst;
|
|
+//
|
|
+// /* Increase counter */
|
|
+// intf->nBmfPacketsRx++;
|
|
+//
|
|
+// /* Beware: not possible to call olsr_ip_to_string more than 4 times in same printf */
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: encapsulated pkt of %ld bytes incoming on \"%s\": %s->%s, forwarded by %s to %s\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// (long)ipPacketLen,
|
|
+// intf->ifName,
|
|
+// olsr_ip_to_string(&mcSrcBuf, &mcSrc),
|
|
+// olsr_ip_to_string(&mcDstBuf, &mcDst),
|
|
+// olsr_ip_to_string(&forwardedByBuf, forwardedBy),
|
|
+// forwardedTo != NULL ? olsr_ip_to_string(&forwardedToBuf, forwardedTo) : "me");
|
|
+//
|
|
+// /* Get encapsulation header */
|
|
+// encapsulationHdr = (struct TEncapHeader*) encapsulationUdpData;
|
|
+//
|
|
+// /* Verify correct format of BMF encapsulation header */
|
|
+// if (encapsulationHdr->type != BMF_ENCAP_TYPE ||
|
|
+// encapsulationHdr->len != BMF_ENCAP_LEN ||
|
|
+// ntohs(encapsulationHdr->reserved != 0))
|
|
+// {
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: --> discarding: format of BMF encapsulation header not recognized\n",
|
|
+// PLUGIN_NAME_SHORT);
|
|
+// return;
|
|
+// }
|
|
+//
|
|
+// /* Check if this packet was seen recently */
|
|
+// if (CheckAndMarkRecentPacket(ntohl(encapsulationHdr->crc32)))
|
|
+// {
|
|
+// /* Increase counter */
|
|
+// intf->nBmfPacketsRxDup++;
|
|
+//
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: --> discarding: packet is duplicate\n",
|
|
+// PLUGIN_NAME_SHORT);
|
|
+// return;
|
|
+// }
|
|
+//
|
|
+// if (EtherTunTapFd >= 0)
|
|
+// {
|
|
+// /* Unpack the encapsulated IP packet and deliver it locally, by sending
|
|
+// * a copy into the local IP stack via the EtherTunTap interface */
|
|
+//
|
|
+// union olsr_ip_addr broadAddr;
|
|
+// int nBytesToWrite, nBytesWritten;
|
|
+// unsigned char* bufferToWrite;
|
|
+//
|
|
+// /* If the encapsulated IP packet is a local broadcast packet,
|
|
+// * update its destination address to match the subnet of the EtherTunTap
|
|
+// * interface */
|
|
+// broadAddr.v4.s_addr = htonl(EtherTunTapIpBroadcast);
|
|
+// CheckAndUpdateLocalBroadcast(ipPacket, &broadAddr);
|
|
+//
|
|
+// bufferToWrite = ipPacket;
|
|
+// nBytesToWrite = ipPacketLen;
|
|
+//
|
|
+// /* Write the packet into the EtherTunTap interface for local delivery */
|
|
+// nBytesWritten = write(EtherTunTapFd, bufferToWrite, nBytesToWrite);
|
|
+// if (nBytesWritten != nBytesToWrite)
|
|
+// {
|
|
+// BmfPError("write() error forwarding encapsulated pkt on \"%s\"", EtherTunTapIfName);
|
|
+// }
|
|
+// else
|
|
+// {
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: --> unpacked and delivered locally on \"%s\"\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// EtherTunTapIfName);
|
|
+// }
|
|
+// } /* if (EtherTunTapFd >= 0) */
|
|
+//
|
|
+// /* Check if I am MPR for the forwarder */
|
|
+// /* TODO: olsr_lookup_mprs_set() is not thread-safe! */
|
|
+// iAmMpr = (olsr_lookup_mprs_set(MainAddressOf(forwardedBy)) != NULL);
|
|
+//
|
|
+// /* Compose destination address for next hop */
|
|
+// memset(&forwardTo, 0, sizeof(forwardTo));
|
|
+// forwardTo.sin_family = AF_INET;
|
|
+// forwardTo.sin_port = htons(BMF_ENCAP_PORT);
|
|
+//
|
|
+// /* Retrieve the number of bytes to be forwarded via the encapsulation socket */
|
|
+// encapsulationUdpDataLen = GetEncapsulationUdpDataLength(encapsulationUdpData);
|
|
+//
|
|
+// /* Check with each network interface what needs to be done on it */
|
|
+// for (walker = BmfInterfaces; walker != NULL; walker = walker->next)
|
|
+// {
|
|
+// /* What to do with the packet on a non-OLSR interface? Unpack
|
|
+// * encapsulated packet, and forward it.
|
|
+// *
|
|
+// * What to do with the packet on an OLSR interface? Forward it only
|
|
+// * if the forwarding node has selected us as MPR (iAmMpr).
|
|
+// *
|
|
+// * Note that the packet is always coming in on an OLSR interface, because
|
|
+// * it is an encapsulated BMF packet. */
|
|
+//
|
|
+// /* To a non-OLSR interface: unpack the encapsulated IP packet and forward it */
|
|
+// if (walker->olsrIntf == NULL)
|
|
+// {
|
|
+// int nBytesWritten;
|
|
+// struct sockaddr_ll dest;
|
|
+//
|
|
+// /* If the encapsulated IP packet is a local broadcast packet,
|
|
+// * update its destination address to match the subnet of the network
|
|
+// * interface on which the packet is being sent. */
|
|
+// CheckAndUpdateLocalBroadcast(ipPacket, &walker->broadAddr);
|
|
+//
|
|
+// memset(&dest, 0, sizeof(dest));
|
|
+// dest.sll_family = AF_PACKET;
|
|
+// dest.sll_protocol = htons(ETH_P_IP);
|
|
+// dest.sll_ifindex = if_nametoindex(walker->ifName);
|
|
+// dest.sll_halen = IFHWADDRLEN;
|
|
+//
|
|
+// /* Use all-ones as destination MAC address. When the IP destination is
|
|
+// * a multicast address, the destination MAC address should normally also
|
|
+// * be a multicast address. E.g., when the destination IP is 224.0.0.1,
|
|
+// * the destination MAC should be 01:00:5e:00:00:01. However, it does not
|
|
+// * seem to matter when the destination MAC address is set to all-ones
|
|
+// * in that case. */
|
|
+// memset(dest.sll_addr, 0xFF, IFHWADDRLEN);
|
|
+//
|
|
+// nBytesWritten = sendto(
|
|
+// walker->capturingSkfd,
|
|
+// ipPacket,
|
|
+// ipPacketLen,
|
|
+// 0,
|
|
+// (struct sockaddr*) &dest,
|
|
+// sizeof(dest));
|
|
+// if (nBytesWritten != ipPacketLen)
|
|
+// {
|
|
+// BmfPError("sendto() error forwarding unpacked encapsulated pkt on \"%s\"", walker->ifName);
|
|
+// }
|
|
+// else
|
|
+// {
|
|
+// /* Increase counter */
|
|
+// walker->nBmfPacketsTx++;
|
|
+//
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: --> unpacked and forwarded on \"%s\"\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// walker->ifName);
|
|
+// }
|
|
+// } /* if (walker->olsrIntf == NULL) */
|
|
+//
|
|
+// /* To an OLSR interface: forward the packet, but only if this node is
|
|
+// * selected as MPR by the forwarding node */
|
|
+// else if (iAmMpr)
|
|
+// {
|
|
+// struct TBestNeighbors bestNeighborLinks;
|
|
+// struct link_entry* bestNeighbor;
|
|
+// int nPossibleNeighbors;
|
|
+// int nPacketsToSend;
|
|
+// int sendUnicast; /* 0 = send broadcast; 1 = send unicast */
|
|
+// int i;
|
|
+//
|
|
+// /* Retrieve at most two best neigbors to forward the packet to */
|
|
+// FindNeighbors(
|
|
+// &bestNeighborLinks,
|
|
+// &bestNeighbor,
|
|
+// walker,
|
|
+// &mcSrc,
|
|
+// forwardedBy,
|
|
+// forwardedTo,
|
|
+// &nPossibleNeighbors);
|
|
+//
|
|
+// if (nPossibleNeighbors <= 0)
|
|
+// {
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: --> not forwarding on \"%s\": there is no neighbor that needs my retransmission\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// walker->ifName);
|
|
+//
|
|
+// continue; /* for */
|
|
+// }
|
|
+//
|
|
+// /* Compose destination of encapsulation packet.
|
|
+// * Start by filling in the local broadcast address. This may be overwritten later. */
|
|
+// forwardTo.sin_addr = walker->broadAddr.v4;
|
|
+//
|
|
+// /* - If the BMF mechanism is BM_UNICAST_PROMISCUOUS, always send just one
|
|
+// * unicast packet (to the best neighbor).
|
|
+// * - But if the BMF mechanism is BM_BROADCAST,
|
|
+// * - send 'nPossibleNeighbors' unicast packets if there are up to
|
|
+// * 'FanOutLimit' possible neighbors,
|
|
+// * - if there are more than 'FanOutLimit' possible neighbors, then
|
|
+// * send a (WLAN-air-expensive, less reliable) broadcast packet. */
|
|
+// if (BmfMechanism == BM_UNICAST_PROMISCUOUS)
|
|
+// {
|
|
+// /* One unicast packet to the best neighbor */
|
|
+// nPacketsToSend = 1;
|
|
+// sendUnicast = 1;
|
|
+// bestNeighborLinks.links[0] = bestNeighbor;
|
|
+// }
|
|
+// else /* BmfMechanism == BM_BROADCAST */
|
|
+// {
|
|
+// if (nPossibleNeighbors <= FanOutLimit)
|
|
+// {
|
|
+// /* 'nPossibleNeighbors' unicast packets */
|
|
+// nPacketsToSend = nPossibleNeighbors;
|
|
+// sendUnicast = 1;
|
|
+// }
|
|
+// else /* nPossibleNeighbors > FanOutLimit */
|
|
+// {
|
|
+// /* One broadcast packet, possibly retransmitted as specified in the
|
|
+// * 'BroadcastRetransmitCount' plugin parameter */
|
|
+// nPacketsToSend = BroadcastRetransmitCount;
|
|
+// sendUnicast = 0;
|
|
+// } /* if */
|
|
+// } /* if */
|
|
+//
|
|
+// for (i = 0; i < nPacketsToSend; i++)
|
|
+// {
|
|
+// int nBytesWritten;
|
|
+//
|
|
+// if (sendUnicast)
|
|
+// {
|
|
+// /* For unicast, overwrite the local broadcast address which was filled in above */
|
|
+// forwardTo.sin_addr = bestNeighborLinks.links[i]->neighbor_iface_addr.v4;
|
|
+// }
|
|
+//
|
|
+// /* Forward the BMF packet via the encapsulation socket */
|
|
+// nBytesWritten = sendto(
|
|
+// walker->encapsulatingSkfd,
|
|
+// encapsulationUdpData,
|
|
+// encapsulationUdpDataLen,
|
|
+// MSG_DONTROUTE,
|
|
+// (struct sockaddr*) &forwardTo,
|
|
+// sizeof(forwardTo));
|
|
+//
|
|
+// /* Evaluate and display result */
|
|
+// if (nBytesWritten != encapsulationUdpDataLen)
|
|
+// {
|
|
+// BmfPError("sendto() error forwarding encapsulated pkt on \"%s\"", walker->ifName);
|
|
+// }
|
|
+// else
|
|
+// {
|
|
+// /* Increase counter */
|
|
+// walker->nBmfPacketsTx++;
|
|
+//
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: --> forwarded on \"%s\" to %s\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// walker->ifName,
|
|
+// inet_ntoa(forwardTo.sin_addr));
|
|
+// } /* if */
|
|
+// } /* for */
|
|
+// } /* else if (iAmMpr) */
|
|
+//
|
|
+// else /* walker->olsrIntf != NULL && !iAmMpr */
|
|
+// {
|
|
+// struct ipaddr_str buf;
|
|
+// /* 'walker' is an OLSR interface, but I am not selected as MPR. In that
|
|
+// * case, don't forward. */
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: --> not forwarding on \"%s\": I am not selected as MPR by %s\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// walker->ifName,
|
|
+// olsr_ip_to_string(&buf, forwardedBy));
|
|
+// } /* else */
|
|
+// } /* for */
|
|
+//} /* BmfEncapsulationPacketReceived */
|
|
+//
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : BmfTunPacketCaptured
|
|
+ * Description: Handle an IP packet, captured outgoing on the tuntap interface
|
|
+ * Input : encapsulationUdpData - space for the encapsulation header, followed by
|
|
+ * the captured outgoing IP packet
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * Notes : The packet is assumed to be captured on a socket of family
|
|
+ * PF_PACKET and type SOCK_DGRAM (cooked).
|
|
+ * ------------------------------------------------------------------------- */
|
|
+//static void BmfTunPacketCaptured(unsigned char* encapsulationUdpData)
|
|
+//{
|
|
+// union olsr_ip_addr srcIp;
|
|
+// union olsr_ip_addr dstIp;
|
|
+// union olsr_ip_addr broadAddr;
|
|
+// struct TBmfInterface* walker;
|
|
+// unsigned char* ipPacket;
|
|
+// u_int16_t ipPacketLen;
|
|
+// struct ip* ipHeader;
|
|
+// u_int32_t crc32;
|
|
+// struct TEncapHeader* encapHdr;
|
|
+// struct ipaddr_str srcIpBuf, dstIpBuf;
|
|
+// ipPacket = GetIpPacket(encapsulationUdpData);
|
|
+// ipPacketLen = GetIpTotalLength(ipPacket);
|
|
+// ipHeader = GetIpHeader(encapsulationUdpData);
|
|
+//
|
|
+// dstIp.v4 = ipHeader->ip_dst;
|
|
+// broadAddr.v4.s_addr = htonl(EtherTunTapIpBroadcast);
|
|
+//
|
|
+// /* Only forward multicast packets. If configured, also forward local broadcast packets */
|
|
+// if (IsMulticast(&dstIp) ||
|
|
+// (EnableLocalBroadcast != 0 && olsr_ipequal(&dstIp, &broadAddr)))
|
|
+// {
|
|
+// /* continue */
|
|
+// }
|
|
+// else
|
|
+// {
|
|
+// return;
|
|
+// }
|
|
+//
|
|
+// srcIp.v4 = ipHeader->ip_src;
|
|
+//
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: outgoing pkt of %ld bytes captured on tuntap interface \"%s\": %s->%s\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// (long)ipPacketLen,
|
|
+// EtherTunTapIfName,
|
|
+// olsr_ip_to_string(&srcIpBuf, &srcIp),
|
|
+// olsr_ip_to_string(&dstIpBuf, &dstIp));
|
|
+//
|
|
+// /* Calculate packet fingerprint */
|
|
+// crc32 = PacketCrc32(ipPacket, ipPacketLen);
|
|
+//
|
|
+// /* Check if this packet was seen recently */
|
|
+// if (CheckAndMarkRecentPacket(crc32))
|
|
+// {
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: --> discarding: packet is duplicate\n",
|
|
+// PLUGIN_NAME_SHORT);
|
|
+// return;
|
|
+// }
|
|
+//
|
|
+// /* Compose encapsulation header */
|
|
+// encapHdr = (struct TEncapHeader*) encapsulationUdpData;
|
|
+// memset (encapHdr, 0, ENCAP_HDR_LEN);
|
|
+// encapHdr->type = BMF_ENCAP_TYPE;
|
|
+// encapHdr->len = BMF_ENCAP_LEN;
|
|
+// encapHdr->reserved = 0;
|
|
+// encapHdr->crc32 = htonl(crc32);
|
|
+//
|
|
+// /* Check with each network interface what needs to be done on it */
|
|
+// for (walker = BmfInterfaces; walker != NULL; walker = walker->next)
|
|
+// {
|
|
+// /* Is the forwarding interface OLSR-enabled? */
|
|
+// if (walker->olsrIntf != NULL)
|
|
+// {
|
|
+// /* On an OLSR interface: encapsulate and forward packet. */
|
|
+//
|
|
+// EncapsulateAndForwardPacket(walker, encapsulationUdpData);
|
|
+// }
|
|
+// else
|
|
+// {
|
|
+// /* On a non-OLSR interface: what to do?
|
|
+// * Answer 1: nothing. Multicast routing between non-OLSR interfaces
|
|
+// * is to be done by other protocols (e.g. PIM, DVMRP).
|
|
+// * Answer 2 (better): Forward it. */
|
|
+//
|
|
+// int nBytesWritten;
|
|
+// struct sockaddr_ll dest;
|
|
+//
|
|
+// /* If the encapsulated IP packet is a local broadcast packet,
|
|
+// * update its destination address to match the subnet of the network
|
|
+// * interface on which the packet is being sent. */
|
|
+// CheckAndUpdateLocalBroadcast(ipPacket, &walker->broadAddr);
|
|
+//
|
|
+// memset(&dest, 0, sizeof(dest));
|
|
+// dest.sll_family = AF_PACKET;
|
|
+// dest.sll_protocol = htons(ETH_P_IP);
|
|
+// dest.sll_ifindex = if_nametoindex(walker->ifName);
|
|
+// dest.sll_halen = IFHWADDRLEN;
|
|
+//
|
|
+// /* Use all-ones as destination MAC address. When the IP destination is
|
|
+// * a multicast address, the destination MAC address should normally also
|
|
+// * be a multicast address. E.g., when the destination IP is 224.0.0.1,
|
|
+// * the destination MAC should be 01:00:5e:00:00:01. However, it does not
|
|
+// * seem to matter when the destination MAC address is set to all-ones
|
|
+// * in that case. */
|
|
+// memset(dest.sll_addr, 0xFF, IFHWADDRLEN);
|
|
+//
|
|
+// nBytesWritten = sendto(
|
|
+// walker->capturingSkfd,
|
|
+// ipPacket,
|
|
+// ipPacketLen,
|
|
+// 0,
|
|
+// (struct sockaddr*) &dest,
|
|
+// sizeof(dest));
|
|
+// if (nBytesWritten != ipPacketLen)
|
|
+// {
|
|
+// BmfPError("sendto() error forwarding pkt on \"%s\"", walker->ifName);
|
|
+// }
|
|
+// else
|
|
+// {
|
|
+// /* Increase counter */
|
|
+// walker->nBmfPacketsTx++;
|
|
+//
|
|
+// OLSR_PRINTF(
|
|
+// 8,
|
|
+// "%s: --> forwarded from non-OLSR to non-OLSR \"%s\"\n",
|
|
+// PLUGIN_NAME_SHORT,
|
|
+// walker->ifName);
|
|
+// } /* if */
|
|
+// } /* if */
|
|
+// } /* for */
|
|
+//} /* BmfTunPacketCaptured */
|
|
+//
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : DoBmf
|
|
+ * Description: Wait (blocking) for IP packets, then call the handler for each
|
|
+ * received packet
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : BmfInterfaces
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void DoMDNS(int skfd, void *data __attribute__ ((unused)), unsigned int flags __attribute__ ((unused)))
|
|
+
|
|
+{
|
|
+// int nFdBitsSet;
|
|
+ unsigned char rxBuffer[BMF_BUFFER_SIZE];
|
|
+// fd_set rxFdSet;
|
|
+// OLSR_PRINTF(1,"ENTERING DoMDNS\n");
|
|
+// assert(HighestSkfd >= 0);
|
|
+//
|
|
+// /* Make a local copy of the set of file descriptors that select() can
|
|
+// * modify to indicate which descriptors actually changed status */
|
|
+// rxFdSet = InputSet;
|
|
+//
|
|
+// /* Wait (blocking) for packets received on any of the sockets.
|
|
+// * NOTE: don't use a timeout (last parameter). It causes a high system CPU load! */
|
|
+// nFdBitsSet = select(HighestSkfd + 1, &rxFdSet, NULL, NULL, NULL);
|
|
+// if (nFdBitsSet < 0)
|
|
+// {
|
|
+// if (errno != EINTR)
|
|
+// {
|
|
+// BmfPError("select() error");
|
|
+// }
|
|
+// return;
|
|
+// }
|
|
+//
|
|
+ //while (nFdBitsSet > 0)
|
|
+ //{
|
|
+ //struct TBmfInterface* walker;
|
|
+
|
|
+ /* Check if a packet was received on the capturing socket (if any)
|
|
+ * of each network interface */
|
|
+ //for (walker = BmfInterfaces; walker != NULL; walker = walker->next)
|
|
+ //{
|
|
+ //int skfd = walker->capturingSkfd;
|
|
+ //if (skfd >= 0 && (FD_ISSET(skfd, &rxFdSet)))
|
|
+ if (skfd >= 0)
|
|
+ {
|
|
+ struct sockaddr_ll pktAddr;
|
|
+ socklen_t addrLen = sizeof(pktAddr);
|
|
+ int nBytes;
|
|
+ unsigned char* ipPacket;
|
|
+
|
|
+ /* Receive the captured Ethernet frame, leaving space for the BMF
|
|
+ * encapsulation header */
|
|
+ ipPacket = GetIpPacket(rxBuffer);
|
|
+ nBytes = recvfrom(
|
|
+ skfd,
|
|
+ ipPacket,
|
|
+ //BMF_BUFFER_SIZE - ENCAP_HDR_LEN, //TODO: understand how to change this
|
|
+ BMF_BUFFER_SIZE, //TODO: understand how to change this
|
|
+ 0,
|
|
+ (struct sockaddr*)&pktAddr,
|
|
+ &addrLen);
|
|
+ if (nBytes < 0)
|
|
+ {
|
|
+ //BmfPError("recvfrom() error on \"%s\"", walker->ifName);
|
|
+
|
|
+ return; /* for */
|
|
+ } /* if (nBytes < 0) */
|
|
+
|
|
+ /* Check if the number of received bytes is large enough for an IP
|
|
+ * packet which contains at least a minimum-size IP header.
|
|
+ * Note: There is an apparent bug in the packet socket implementation in
|
|
+ * combination with VLAN interfaces. On a VLAN interface, the value returned
|
|
+ * by 'recvfrom' may (but need not) be 4 (bytes) larger than the value
|
|
+ * returned on a non-VLAN interface, for the same ethernet frame. */
|
|
+ if (nBytes < (int)sizeof(struct ip))
|
|
+ {
|
|
+ //OLSR_PRINTF(
|
|
+ // 1,
|
|
+ // "%s: captured frame too short (%d bytes) on \"%s\"\n",
|
|
+ // PLUGIN_NAME,
|
|
+ // nBytes,
|
|
+ // walker->ifName);
|
|
+
|
|
+ return; /* for */
|
|
+ }
|
|
+
|
|
+ if (pktAddr.sll_pkttype == PACKET_OUTGOING ||
|
|
+ pktAddr.sll_pkttype == PACKET_MULTICAST ||
|
|
+ pktAddr.sll_pkttype == PACKET_BROADCAST)
|
|
+ {
|
|
+ /* A multicast or broadcast packet was captured */
|
|
+
|
|
+ //OLSR_PRINTF(
|
|
+ // 1,
|
|
+ // "%s: captured frame (%d bytes) on \"%s\"\n",
|
|
+ // PLUGIN_NAME,
|
|
+ // nBytes,
|
|
+ // walker->ifName);
|
|
+ //BmfPacketCaptured(walker, pktAddr.sll_pkttype, rxBuffer);
|
|
+ BmfPacketCaptured(ipPacket,nBytes);
|
|
+
|
|
+ } /* if (pktAddr.sll_pkttype == ...) */
|
|
+ } /* if (skfd >= 0 && (FD_ISSET...)) */
|
|
+// } /* for */
|
|
+
|
|
+// } /* while (nFdBitsSet > 0) */
|
|
+} /* DoMDNS */
|
|
+
|
|
+int InitMDNS(struct interface* skipThisIntf)
|
|
+{
|
|
+
|
|
+
|
|
+ //Tells OLSR to launch olsr_parser when the packets for this plugin arrive
|
|
+ olsr_parser_add_function(&olsr_parser, PARSER_TYPE);
|
|
+ CreateBmfNetworkInterfaces(skipThisIntf);
|
|
+
|
|
+ return 0;
|
|
+} /* InitBmf */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : CloseBmf
|
|
+ * Description: Close the BMF plugin and clean up
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : BmfThread
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void CloseMDNS(void)
|
|
+{
|
|
+// if (EtherTunTapFd >= 0)
|
|
+// {
|
|
+// /* If there is a multicast route, try to delete it first */
|
|
+// DeleteMulticastRoute();
|
|
+//
|
|
+// /* Restore IP spoof filter for EtherTunTap interface */
|
|
+// RestoreSpoofFilter();
|
|
+// }
|
|
+//
|
|
+// if (mdnsThreadRunning)
|
|
+// {
|
|
+// /* Signal BmfThread to exit */
|
|
+// /* Strangely enough, all running threads receive the SIGALRM signal. But only the
|
|
+// * BMF thread is affected by this signal, having specified a handler for this
|
|
+// * signal in its thread entry function BmfRun(...). */
|
|
+// if (pthread_kill(mdnsThread, SIGALRM) != 0)
|
|
+// {
|
|
+// BmfPError("pthread_kill() error");
|
|
+// }
|
|
+//
|
|
+// /* Wait for BmfThread to acknowledge */
|
|
+// if (pthread_join(mdnsThread, NULL) != 0)
|
|
+// {
|
|
+// BmfPError("pthread_join() error");
|
|
+// }
|
|
+// }
|
|
+//
|
|
+// /* Clean up after the BmfThread has been killed */
|
|
+ CloseBmfNetworkInterfaces();
|
|
+} /* CloseBmf */
|
|
+
|
|
+
|
|
+/*
|
|
+ * Local Variables:
|
|
+ * c-basic-offset: 2
|
|
+ * indent-tabs-mode: nil
|
|
+ * End:
|
|
+ */
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/mdns.h olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/mdns.h
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/mdns.h 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/mdns.h 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,95 @@
|
|
+#ifndef _BMF_BMF_H
|
|
+#define _BMF_BMF_H
|
|
+
|
|
+/*
|
|
+ * OLSR Basic Multicast Forwarding (BMF) plugin.
|
|
+ * Copyright (c) 2005 - 2007, Thales Communications, Huizen, The Netherlands.
|
|
+ * Written by Erik Tromp.
|
|
+ * All rights reserved.
|
|
+ *
|
|
+ * Redistribution and use in source and binary forms, with or without
|
|
+ * modification, are permitted provided that the following conditions
|
|
+ * are met:
|
|
+ *
|
|
+ * * Redistributions of source code must retain the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer.
|
|
+ * * Redistributions in binary form must reproduce the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer in
|
|
+ * the documentation and/or other materials provided with the
|
|
+ * distribution.
|
|
+ * * Neither the name of Thales, BMF nor the names of its
|
|
+ * contributors may be used to endorse or promote products derived
|
|
+ * from this software without specific prior written permission.
|
|
+ *
|
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+ * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
+ * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
+ * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
+ */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * File : Bmf.h
|
|
+ * Description: Multicast forwarding functions
|
|
+ * Created : 29 Jun 2006
|
|
+ *
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+#include "olsrd_plugin.h" /* union set_plugin_parameter_addon */
|
|
+
|
|
+#include "parser.h"
|
|
+#include <socket_parser.h>
|
|
+
|
|
+#define MESSAGE_TYPE 132
|
|
+#define PARSER_TYPE MESSAGE_TYPE
|
|
+#define EMISSION_INTERVAL 10 /* seconds */
|
|
+#define EMISSION_JITTER 25 /* percent */
|
|
+#define MDNS_VALID_TIME 1800 /* seconds */
|
|
+
|
|
+/* BMF plugin data */
|
|
+#define PLUGIN_NAME "OLSRD MDNS plugin"
|
|
+#define PLUGIN_NAME_SHORT "OLSRD MDNS"
|
|
+#define PLUGIN_VERSION "1.0.0 (" __DATE__ " " __TIME__ ")"
|
|
+#define PLUGIN_COPYRIGHT " (C) Ninux.org"
|
|
+#define PLUGIN_AUTHOR " Saverio Proto (zioproto@gmail.com)"
|
|
+#define MOD_DESC PLUGIN_NAME " " PLUGIN_VERSION "\n" PLUGIN_COPYRIGHT "\n" PLUGIN_AUTHOR
|
|
+#define PLUGIN_INTERFACE_VERSION 5
|
|
+
|
|
+/* UDP-Port on which multicast packets are encapsulated */
|
|
+//#define BMF_ENCAP_PORT 50698
|
|
+
|
|
+/* Forward declaration of OLSR interface type */
|
|
+struct interface;
|
|
+
|
|
+//extern int FanOutLimit;
|
|
+//extern int BroadcastRetransmitCount;
|
|
+
|
|
+void DoMDNS(int sd, void * x, unsigned int y);
|
|
+void BmfPError(const char* format, ...) __attribute__((format(printf, 1, 2)));
|
|
+union olsr_ip_addr* MainAddressOf(union olsr_ip_addr* ip);
|
|
+//int InterfaceChange(struct interface* interf, int action);
|
|
+//int SetFanOutLimit(const char* value, void* data, set_plugin_parameter_addon addon);
|
|
+//int InitBmf(struct interface* skipThisIntf);
|
|
+//void CloseBmf(void);
|
|
+int InitMDNS(struct interface* skipThisIntf);
|
|
+void CloseMDNS(void);
|
|
+
|
|
+void olsr_mdns_gen(unsigned char* packet, int len);
|
|
+
|
|
+/* Parser function to register with the scheduler */
|
|
+bool
|
|
+olsr_parser(union olsr_message *, struct interface *, union olsr_ip_addr *);
|
|
+
|
|
+#endif /* _BMF_BMF_H */
|
|
+
|
|
+/*
|
|
+ * Local Variables:
|
|
+ * c-basic-offset: 2
|
|
+ * indent-tabs-mode: nil
|
|
+ * End:
|
|
+ */
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/olsrd_plugin.c olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/olsrd_plugin.c
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/src/olsrd_plugin.c 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/src/olsrd_plugin.c 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,185 @@
|
|
+/*
|
|
+ * OLSR Basic Multicast Forwarding (BMF) plugin.
|
|
+ * Copyright (c) 2005 - 2007, Thales Communications, Huizen, The Netherlands.
|
|
+ * Written by Erik Tromp.
|
|
+ * All rights reserved.
|
|
+ *
|
|
+ * Redistribution and use in source and binary forms, with or without
|
|
+ * modification, are permitted provided that the following conditions
|
|
+ * are met:
|
|
+ *
|
|
+ * * Redistributions of source code must retain the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer.
|
|
+ * * Redistributions in binary form must reproduce the above copyright
|
|
+ * notice, this list of conditions and the following disclaimer in
|
|
+ * the documentation and/or other materials provided with the
|
|
+ * distribution.
|
|
+ * * Neither the name of Thales, BMF nor the names of its
|
|
+ * contributors may be used to endorse or promote products derived
|
|
+ * from this software without specific prior written permission.
|
|
+ *
|
|
+ * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" AND
|
|
+ * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED
|
|
+ * WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED.
|
|
+ * IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
|
|
+ * INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
|
|
+ * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE,
|
|
+ * DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY
|
|
+ * OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
|
|
+ * OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
|
|
+ * OF THE POSSIBILITY OF SUCH DAMAGE.
|
|
+ */
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * File : olsrd_plugin.c
|
|
+ * Description: Interface to the OLSRD plugin system
|
|
+ * Created : 29 Jun 2006
|
|
+ *
|
|
+ * ------------------------------------------------------------------------- */
|
|
+
|
|
+/* System includes */
|
|
+#include <assert.h> /* assert() */
|
|
+#include <stddef.h> /* NULL */
|
|
+
|
|
+/* OLSRD includes */
|
|
+#include "olsrd_plugin.h"
|
|
+#include "plugin_util.h"
|
|
+#include "defs.h" /* uint8_t, olsr_cnf */
|
|
+#include "scheduler.h" /* olsr_start_timer() */
|
|
+#include "olsr_cfg.h" /* olsr_cnf() */
|
|
+#include "olsr_cookie.h" /* olsr_alloc_cookie() */
|
|
+
|
|
+/* BMF includes */
|
|
+#include "mdns.h" /* InitBmf(), CloseBmf() */
|
|
+#include "PacketHistory.h" /* InitPacketHistory() */
|
|
+#include "NetworkInterfaces.h" /* AddNonOlsrBmfIf(), SetBmfInterfaceIp(), ... */
|
|
+#include "Address.h" /* DoLocalBroadcast() */
|
|
+
|
|
+static void __attribute__ ((constructor)) my_init(void);
|
|
+static void __attribute__ ((destructor)) my_fini(void);
|
|
+
|
|
+//static struct olsr_cookie_info *prune_packet_history_timer_cookie;
|
|
+
|
|
+void olsr_plugin_exit(void);
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : olsrd_plugin_interface_version
|
|
+ * Description: Plugin interface version
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : BMF plugin interface version number
|
|
+ * Data Used : none
|
|
+ * Notes : Called by main OLSRD (olsr_load_dl) to check plugin interface
|
|
+ * version
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int olsrd_plugin_interface_version(void)
|
|
+{
|
|
+ return PLUGIN_INTERFACE_VERSION;
|
|
+}
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : olsrd_plugin_init
|
|
+ * Description: Plugin initialisation
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : fail (0) or success (1)
|
|
+ * Data Used : olsr_cnf
|
|
+ * Notes : Called by main OLSRD (init_olsr_plugin) to initialize plugin
|
|
+ * ------------------------------------------------------------------------- */
|
|
+int olsrd_plugin_init(void)
|
|
+{
|
|
+ /* Clear the packet history */
|
|
+ //InitPacketHistory();
|
|
+
|
|
+ /* Register ifchange function */
|
|
+ //add_ifchgf(&InterfaceChange);
|
|
+
|
|
+ /* create the cookie */
|
|
+ //prune_packet_history_timer_cookie = olsr_alloc_cookie("BMF: Prune Packet History", OLSR_COOKIE_TYPE_TIMER);
|
|
+
|
|
+ /* Register the duplicate registration pruning process */
|
|
+ //olsr_start_timer(3 * MSEC_PER_SEC, 0, OLSR_TIMER_PERIODIC,
|
|
+ // &PrunePacketHistory, NULL, prune_packet_history_timer_cookie->ci_id);
|
|
+
|
|
+
|
|
+ return InitMDNS(NULL);
|
|
+}
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : olsr_plugin_exit
|
|
+ * Description: Plugin cleanup
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * Notes : Called by my_fini() at unload of shared object
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void olsr_plugin_exit(void)
|
|
+{
|
|
+ CloseMDNS();
|
|
+}
|
|
+
|
|
+static const struct olsrd_plugin_parameters plugin_parameters[] = {
|
|
+ { .name = "NonOlsrIf", .set_plugin_parameter = &AddNonOlsrBmfIf, .data = NULL },
|
|
+ //{ .name = "DoLocalBroadcast", .set_plugin_parameter = &DoLocalBroadcast, .data = NULL },
|
|
+ //{ .name = "BmfInterface", .set_plugin_parameter = &SetBmfInterfaceName, .data = NULL },
|
|
+ //{ .name = "BmfInterfaceIp", .set_plugin_parameter = &SetBmfInterfaceIp, .data = NULL },
|
|
+ //{ .name = "CapturePacketsOnOlsrInterfaces", .set_plugin_parameter = &SetCapturePacketsOnOlsrInterfaces, .data = NULL },
|
|
+ //{ .name = "BmfMechanism", .set_plugin_parameter = &SetBmfMechanism, .data = NULL },
|
|
+ //{ .name = "FanOutLimit", .set_plugin_parameter = &SetFanOutLimit, .data = NULL },
|
|
+ //{ .name = "BroadcastRetransmitCount", .set_plugin_parameter = &set_plugin_int, .data = &BroadcastRetransmitCount},
|
|
+};
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : olsrd_get_plugin_parameters
|
|
+ * Description: Return the parameter table and its size
|
|
+ * Input : none
|
|
+ * Output : params - the parameter table
|
|
+ * size - its size in no. of entries
|
|
+ * Return : none
|
|
+ * Data Used : plugin_parameters
|
|
+ * Notes : Called by main OLSR (init_olsr_plugin) for all plugins
|
|
+ * ------------------------------------------------------------------------- */
|
|
+void olsrd_get_plugin_parameters(const struct olsrd_plugin_parameters **params, int *size)
|
|
+{
|
|
+ *params = plugin_parameters;
|
|
+ *size = ARRAYSIZE(plugin_parameters);
|
|
+}
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : my_init
|
|
+ * Description: Plugin constructor
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * Notes : Called at load of shared object
|
|
+ * ------------------------------------------------------------------------- */
|
|
+static void my_init(void)
|
|
+{
|
|
+ /* Print plugin info to stdout */
|
|
+ printf("%s\n", MOD_DESC);
|
|
+
|
|
+ return;
|
|
+}
|
|
+
|
|
+/* -------------------------------------------------------------------------
|
|
+ * Function : my_fini
|
|
+ * Description: Plugin destructor
|
|
+ * Input : none
|
|
+ * Output : none
|
|
+ * Return : none
|
|
+ * Data Used : none
|
|
+ * Notes : Called at unload of shared object
|
|
+ * ------------------------------------------------------------------------- */
|
|
+static void my_fini(void)
|
|
+{
|
|
+ olsr_plugin_exit();
|
|
+}
|
|
+
|
|
+/*
|
|
+ * Local Variables:
|
|
+ * c-basic-offset: 2
|
|
+ * indent-tabs-mode: nil
|
|
+ * End:
|
|
+ */
|
|
diff -Nurb olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/version-script.txt olsrd-0-5-6-ecb9cb41f488/lib/mdns/version-script.txt
|
|
--- olsrd-0-5-6-ecb9cb41f488.orig/lib/mdns/version-script.txt 1970-01-01 00:00:00.000000000 +0000
|
|
+++ olsrd-0-5-6-ecb9cb41f488/lib/mdns/version-script.txt 2009-03-16 18:04:32.000000000 +0000
|
|
@@ -0,0 +1,10 @@
|
|
+VERS_1.0
|
|
+{
|
|
+ global:
|
|
+ olsrd_plugin_interface_version;
|
|
+ olsrd_plugin_init;
|
|
+ olsrd_get_plugin_parameters;
|
|
+
|
|
+ local:
|
|
+ *;
|
|
+};
|