2006-05-08 08:50:50 +05:30
|
|
|
/* vi: set sw=4 ts=4: */
|
2010-03-26 13:05:24 +05:30
|
|
|
/*
|
|
|
|
* Rewrite by Russ Dill <Russ.Dill@asu.edu> July 2001
|
2006-05-08 08:50:50 +05:30
|
|
|
*
|
2010-08-16 23:44:46 +05:30
|
|
|
* Licensed under GPLv2, see file LICENSE in this source tree.
|
2006-05-08 08:50:50 +05:30
|
|
|
*/
|
|
|
|
#include "common.h"
|
|
|
|
|
2009-06-17 15:24:52 +05:30
|
|
|
#if defined CONFIG_UDHCP_DEBUG && CONFIG_UDHCP_DEBUG >= 1
|
2009-06-17 16:54:03 +05:30
|
|
|
unsigned dhcp_verbose;
|
2009-06-17 15:24:52 +05:30
|
|
|
#endif
|
|
|
|
|
2007-08-13 02:28:27 +05:30
|
|
|
const uint8_t MAC_BCAST_ADDR[6] ALIGN2 = {
|
|
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff
|
|
|
|
};
|
2010-03-26 13:05:24 +05:30
|
|
|
|
2017-06-28 22:48:17 +05:30
|
|
|
#if ENABLE_UDHCPC || ENABLE_UDHCPD
|
2020-06-24 01:55:08 +05:30
|
|
|
/* Supported options are easily added here, they need to be sorted.
|
2010-03-26 13:05:24 +05:30
|
|
|
* See RFC2132 for more options.
|
|
|
|
* OPTION_REQ: these options are requested by udhcpc (unless -o).
|
|
|
|
*/
|
2010-04-04 18:58:49 +05:30
|
|
|
const struct dhcp_optflag dhcp_optflags[] = {
|
2010-03-26 13:05:24 +05:30
|
|
|
/* flags code */
|
|
|
|
{ OPTION_IP | OPTION_REQ, 0x01 }, /* DHCP_SUBNET */
|
|
|
|
{ OPTION_S32 , 0x02 }, /* DHCP_TIME_OFFSET */
|
|
|
|
{ OPTION_IP | OPTION_LIST | OPTION_REQ, 0x03 }, /* DHCP_ROUTER */
|
|
|
|
// { OPTION_IP | OPTION_LIST , 0x04 }, /* DHCP_TIME_SERVER */
|
|
|
|
// { OPTION_IP | OPTION_LIST , 0x05 }, /* DHCP_NAME_SERVER */
|
|
|
|
{ OPTION_IP | OPTION_LIST | OPTION_REQ, 0x06 }, /* DHCP_DNS_SERVER */
|
|
|
|
// { OPTION_IP | OPTION_LIST , 0x07 }, /* DHCP_LOG_SERVER */
|
|
|
|
// { OPTION_IP | OPTION_LIST , 0x08 }, /* DHCP_COOKIE_SERVER */
|
|
|
|
{ OPTION_IP | OPTION_LIST , 0x09 }, /* DHCP_LPR_SERVER */
|
2011-12-08 21:11:05 +05:30
|
|
|
{ OPTION_STRING_HOST | OPTION_REQ, 0x0c }, /* DHCP_HOST_NAME */
|
2010-03-26 13:05:24 +05:30
|
|
|
{ OPTION_U16 , 0x0d }, /* DHCP_BOOT_SIZE */
|
2011-12-08 21:11:05 +05:30
|
|
|
{ OPTION_STRING_HOST | OPTION_REQ, 0x0f }, /* DHCP_DOMAIN_NAME */
|
2010-03-26 13:05:24 +05:30
|
|
|
{ OPTION_IP , 0x10 }, /* DHCP_SWAP_SERVER */
|
|
|
|
{ OPTION_STRING , 0x11 }, /* DHCP_ROOT_PATH */
|
|
|
|
{ OPTION_U8 , 0x17 }, /* DHCP_IP_TTL */
|
|
|
|
{ OPTION_U16 , 0x1a }, /* DHCP_MTU */
|
2011-10-20 16:51:55 +05:30
|
|
|
//TODO: why do we request DHCP_BROADCAST? Can't we assume that
|
|
|
|
//in the unlikely case it is different from typical N.N.255.255,
|
|
|
|
//server would let us know anyway?
|
2010-03-26 13:05:24 +05:30
|
|
|
{ OPTION_IP | OPTION_REQ, 0x1c }, /* DHCP_BROADCAST */
|
2010-09-26 03:45:12 +05:30
|
|
|
{ OPTION_IP_PAIR | OPTION_LIST , 0x21 }, /* DHCP_ROUTES */
|
2011-12-08 21:11:05 +05:30
|
|
|
{ OPTION_STRING_HOST , 0x28 }, /* DHCP_NIS_DOMAIN */
|
2010-03-26 13:05:24 +05:30
|
|
|
{ OPTION_IP | OPTION_LIST , 0x29 }, /* DHCP_NIS_SERVER */
|
|
|
|
{ OPTION_IP | OPTION_LIST | OPTION_REQ, 0x2a }, /* DHCP_NTP_SERVER */
|
|
|
|
{ OPTION_IP | OPTION_LIST , 0x2c }, /* DHCP_WINS_SERVER */
|
|
|
|
{ OPTION_U32 , 0x33 }, /* DHCP_LEASE_TIME */
|
|
|
|
{ OPTION_IP , 0x36 }, /* DHCP_SERVER_ID */
|
|
|
|
{ OPTION_STRING , 0x38 }, /* DHCP_ERR_MESSAGE */
|
|
|
|
//TODO: must be combined with 'sname' and 'file' handling:
|
2011-12-08 21:11:05 +05:30
|
|
|
{ OPTION_STRING_HOST , 0x42 }, /* DHCP_TFTP_SERVER_NAME */
|
2010-03-26 13:05:24 +05:30
|
|
|
{ OPTION_STRING , 0x43 }, /* DHCP_BOOT_FILE */
|
|
|
|
//TODO: not a string, but a set of LASCII strings:
|
|
|
|
// { OPTION_STRING , 0x4D }, /* DHCP_USER_CLASS */
|
2019-03-08 19:54:42 +05:30
|
|
|
{ OPTION_STRING , 0x64 }, /* DHCP_PCODE */
|
|
|
|
{ OPTION_STRING , 0x65 }, /* DHCP_TCODE */
|
2010-03-26 13:05:24 +05:30
|
|
|
#if ENABLE_FEATURE_UDHCP_RFC3397
|
2010-04-03 21:04:52 +05:30
|
|
|
{ OPTION_DNS_STRING | OPTION_LIST , 0x77 }, /* DHCP_DOMAIN_SEARCH */
|
|
|
|
{ OPTION_SIP_SERVERS , 0x78 }, /* DHCP_SIP_SERVERS */
|
2010-03-26 13:05:24 +05:30
|
|
|
#endif
|
2011-12-16 21:40:09 +05:30
|
|
|
{ OPTION_STATIC_ROUTES | OPTION_LIST , 0x79 }, /* DHCP_STATIC_ROUTES */
|
2011-04-26 06:20:00 +05:30
|
|
|
#if ENABLE_FEATURE_UDHCP_8021Q
|
|
|
|
{ OPTION_U16 , 0x84 }, /* DHCP_VLAN_ID */
|
|
|
|
{ OPTION_U8 , 0x85 }, /* DHCP_VLAN_PRIORITY */
|
|
|
|
#endif
|
2013-11-12 15:48:26 +05:30
|
|
|
{ OPTION_STRING , 0xd1 }, /* DHCP_PXE_CONF_FILE */
|
2014-07-15 08:33:17 +05:30
|
|
|
{ OPTION_STRING , 0xd2 }, /* DHCP_PXE_PATH_PREFIX */
|
2018-07-03 12:06:13 +05:30
|
|
|
{ OPTION_U32 , 0xd3 }, /* DHCP_REBOOT_TIME */
|
2011-10-20 02:10:35 +05:30
|
|
|
{ OPTION_6RD , 0xd4 }, /* DHCP_6RD */
|
2011-12-16 21:40:09 +05:30
|
|
|
{ OPTION_STATIC_ROUTES | OPTION_LIST , 0xf9 }, /* DHCP_MS_STATIC_ROUTES */
|
2010-03-26 13:05:24 +05:30
|
|
|
{ OPTION_STRING , 0xfc }, /* DHCP_WPAD */
|
|
|
|
|
|
|
|
/* Options below have no match in dhcp_option_strings[],
|
|
|
|
* are not passed to dhcpc scripts, and cannot be specified
|
|
|
|
* with "option XXX YYY" syntax in dhcpd config file.
|
|
|
|
* These entries are only used internally by udhcp[cd]
|
|
|
|
* to correctly encode options into packets.
|
|
|
|
*/
|
|
|
|
|
|
|
|
{ OPTION_IP , 0x32 }, /* DHCP_REQUESTED_IP */
|
|
|
|
{ OPTION_U8 , 0x35 }, /* DHCP_MESSAGE_TYPE */
|
|
|
|
{ OPTION_U16 , 0x39 }, /* DHCP_MAX_SIZE */
|
2010-10-20 05:33:30 +05:30
|
|
|
//looks like these opts will work just fine even without these defs:
|
|
|
|
// { OPTION_STRING , 0x3c }, /* DHCP_VENDOR */
|
|
|
|
// /* not really a string: */
|
|
|
|
// { OPTION_STRING , 0x3d }, /* DHCP_CLIENT_ID */
|
2010-03-26 13:05:24 +05:30
|
|
|
{ 0, 0 } /* zeroed terminating entry */
|
|
|
|
};
|
|
|
|
|
|
|
|
/* Used for converting options from incoming packets to env variables
|
2017-01-29 23:18:58 +05:30
|
|
|
* for udhcpc script, and for setting options for udhcpd via
|
2010-03-26 13:05:24 +05:30
|
|
|
* "opt OPTION_NAME OPTION_VALUE" directives in udhcpd.conf file.
|
|
|
|
*/
|
2010-04-04 18:58:49 +05:30
|
|
|
/* Must match dhcp_optflags[] order */
|
2010-03-26 13:05:24 +05:30
|
|
|
const char dhcp_option_strings[] ALIGN1 =
|
2018-07-04 19:14:22 +05:30
|
|
|
"subnet" "\0" /* DHCP_SUBNET */
|
|
|
|
"timezone" "\0" /* DHCP_TIME_OFFSET */
|
|
|
|
"router" "\0" /* DHCP_ROUTER */
|
|
|
|
// "timesrv" "\0" /* DHCP_TIME_SERVER */
|
|
|
|
// "namesrv" "\0" /* DHCP_NAME_SERVER */
|
|
|
|
"dns" "\0" /* DHCP_DNS_SERVER */
|
|
|
|
// "logsrv" "\0" /* DHCP_LOG_SERVER */
|
|
|
|
// "cookiesrv" "\0" /* DHCP_COOKIE_SERVER */
|
|
|
|
"lprsrv" "\0" /* DHCP_LPR_SERVER */
|
|
|
|
"hostname" "\0" /* DHCP_HOST_NAME */
|
|
|
|
"bootsize" "\0" /* DHCP_BOOT_SIZE */
|
|
|
|
"domain" "\0" /* DHCP_DOMAIN_NAME */
|
|
|
|
"swapsrv" "\0" /* DHCP_SWAP_SERVER */
|
|
|
|
"rootpath" "\0" /* DHCP_ROOT_PATH */
|
|
|
|
"ipttl" "\0" /* DHCP_IP_TTL */
|
|
|
|
"mtu" "\0" /* DHCP_MTU */
|
|
|
|
"broadcast" "\0" /* DHCP_BROADCAST */
|
|
|
|
"routes" "\0" /* DHCP_ROUTES */
|
|
|
|
"nisdomain" "\0" /* DHCP_NIS_DOMAIN */
|
|
|
|
"nissrv" "\0" /* DHCP_NIS_SERVER */
|
|
|
|
"ntpsrv" "\0" /* DHCP_NTP_SERVER */
|
|
|
|
"wins" "\0" /* DHCP_WINS_SERVER */
|
|
|
|
"lease" "\0" /* DHCP_LEASE_TIME */
|
|
|
|
"serverid" "\0" /* DHCP_SERVER_ID */
|
|
|
|
"message" "\0" /* DHCP_ERR_MESSAGE */
|
|
|
|
"tftp" "\0" /* DHCP_TFTP_SERVER_NAME*/
|
|
|
|
"bootfile" "\0" /* DHCP_BOOT_FILE */
|
|
|
|
// "userclass" "\0" /* DHCP_USER_CLASS */
|
2019-03-08 19:54:42 +05:30
|
|
|
"tzstr" "\0" /* DHCP_PCODE */
|
|
|
|
"tzdbstr" "\0" /* DHCP_TCODE */
|
2010-03-26 13:05:24 +05:30
|
|
|
#if ENABLE_FEATURE_UDHCP_RFC3397
|
2018-07-04 19:14:22 +05:30
|
|
|
"search" "\0" /* DHCP_DOMAIN_SEARCH */
|
2010-04-03 21:04:52 +05:30
|
|
|
// doesn't work in udhcpd.conf since OPTION_SIP_SERVERS
|
|
|
|
// is not handled yet by "string->option" conversion code:
|
2018-07-04 19:14:22 +05:30
|
|
|
"sipsrv" "\0" /* DHCP_SIP_SERVERS */
|
2010-03-26 13:05:24 +05:30
|
|
|
#endif
|
2018-07-04 19:14:22 +05:30
|
|
|
"staticroutes" "\0" /* DHCP_STATIC_ROUTES */
|
2011-04-26 06:20:00 +05:30
|
|
|
#if ENABLE_FEATURE_UDHCP_8021Q
|
2018-07-04 19:14:22 +05:30
|
|
|
"vlanid" "\0" /* DHCP_VLAN_ID */
|
|
|
|
"vlanpriority" "\0" /* DHCP_VLAN_PRIORITY */
|
2011-04-26 06:20:00 +05:30
|
|
|
#endif
|
2018-07-04 19:14:22 +05:30
|
|
|
"pxeconffile" "\0" /* DHCP_PXE_CONF_FILE */
|
|
|
|
"pxepathprefix" "\0" /* DHCP_PXE_PATH_PREFIX */
|
|
|
|
"reboottime" "\0" /* DHCP_REBOOT_TIME */
|
|
|
|
"ip6rd" "\0" /* DHCP_6RD */
|
|
|
|
"msstaticroutes" "\0" /* DHCP_MS_STATIC_ROUTES*/
|
|
|
|
"wpad" "\0" /* DHCP_WPAD */
|
2010-03-26 13:05:24 +05:30
|
|
|
;
|
2017-06-28 22:48:17 +05:30
|
|
|
#endif
|
2010-03-26 13:05:24 +05:30
|
|
|
|
2010-04-03 21:04:52 +05:30
|
|
|
/* Lengths of the option types in binary form.
|
|
|
|
* Used by:
|
|
|
|
* udhcp_str2optset: to determine how many bytes to allocate.
|
|
|
|
* xmalloc_optname_optval: to estimate string length
|
|
|
|
* from binary option length: (option[LEN] / dhcp_option_lengths[opt_type])
|
2016-02-26 20:24:56 +05:30
|
|
|
* is the number of elements, multiply it by one element's string width
|
2010-04-03 21:04:52 +05:30
|
|
|
* (len_of_option_as_string[opt_type]) and you know how wide string you need.
|
|
|
|
*/
|
2010-03-26 13:05:24 +05:30
|
|
|
const uint8_t dhcp_option_lengths[] ALIGN1 = {
|
|
|
|
[OPTION_IP] = 4,
|
|
|
|
[OPTION_IP_PAIR] = 8,
|
|
|
|
// [OPTION_BOOLEAN] = 1,
|
2010-04-03 21:04:52 +05:30
|
|
|
[OPTION_STRING] = 1, /* ignored by udhcp_str2optset */
|
2011-12-08 21:11:05 +05:30
|
|
|
[OPTION_STRING_HOST] = 1, /* ignored by udhcp_str2optset */
|
2010-03-26 13:05:24 +05:30
|
|
|
#if ENABLE_FEATURE_UDHCP_RFC3397
|
2010-04-03 21:04:52 +05:30
|
|
|
[OPTION_DNS_STRING] = 1, /* ignored by both udhcp_str2optset and xmalloc_optname_optval */
|
|
|
|
[OPTION_SIP_SERVERS] = 1,
|
2010-03-26 13:05:24 +05:30
|
|
|
#endif
|
|
|
|
[OPTION_U8] = 1,
|
|
|
|
[OPTION_U16] = 2,
|
|
|
|
// [OPTION_S16] = 2,
|
|
|
|
[OPTION_U32] = 4,
|
|
|
|
[OPTION_S32] = 4,
|
|
|
|
/* Just like OPTION_STRING, we use minimum length here */
|
|
|
|
[OPTION_STATIC_ROUTES] = 5,
|
2016-02-26 20:24:56 +05:30
|
|
|
[OPTION_6RD] = 12, /* ignored by udhcp_str2optset */
|
|
|
|
/* The above value was chosen as follows:
|
|
|
|
* len_of_option_as_string[] for this option is >60: it's a string of the form
|
|
|
|
* "32 128 ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff 255.255.255.255 ".
|
|
|
|
* Each additional ipv4 address takes 4 bytes in binary option and appends
|
|
|
|
* another "255.255.255.255 " 16-byte string. We can set [OPTION_6RD] = 4
|
|
|
|
* but this severely overestimates string length: instead of 16 bytes,
|
|
|
|
* it adds >60 for every 4 bytes in binary option.
|
|
|
|
* We cheat and declare here that option is in units of 12 bytes.
|
|
|
|
* This adds more than 60 bytes for every three ipv4 addresses - more than enough.
|
|
|
|
* (Even 16 instead of 12 should work, but let's be paranoid).
|
|
|
|
*/
|
2010-03-26 13:05:24 +05:30
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
#if defined CONFIG_UDHCP_DEBUG && CONFIG_UDHCP_DEBUG >= 2
|
|
|
|
static void log_option(const char *pfx, const uint8_t *opt)
|
|
|
|
{
|
|
|
|
if (dhcp_verbose >= 2) {
|
|
|
|
char buf[256 * 2 + 2];
|
|
|
|
*bin2hex(buf, (void*) (opt + OPT_DATA), opt[OPT_LEN]) = '\0';
|
2019-04-12 22:31:51 +05:30
|
|
|
bb_info_msg("%s: 0x%02x %s", pfx, opt[OPT_CODE], buf);
|
2010-03-26 13:05:24 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
#else
|
|
|
|
# define log_option(pfx, opt) ((void)0)
|
|
|
|
#endif
|
|
|
|
|
2017-06-28 22:48:17 +05:30
|
|
|
unsigned FAST_FUNC udhcp_option_idx(const char *name, const char *option_strings)
|
2010-03-28 03:53:41 +05:30
|
|
|
{
|
2017-06-28 22:48:17 +05:30
|
|
|
int n = index_in_strings(option_strings, name);
|
2010-03-28 03:53:41 +05:30
|
|
|
if (n >= 0)
|
|
|
|
return n;
|
|
|
|
|
|
|
|
{
|
2017-06-28 22:48:17 +05:30
|
|
|
char *buf, *d;
|
|
|
|
const char *s;
|
|
|
|
|
|
|
|
s = option_strings;
|
|
|
|
while (*s)
|
|
|
|
s += strlen(s) + 1;
|
|
|
|
|
|
|
|
d = buf = xzalloc(s - option_strings);
|
|
|
|
s = option_strings;
|
|
|
|
while (!(*s == '\0' && s[1] == '\0')) {
|
2010-03-28 03:53:41 +05:30
|
|
|
*d++ = (*s == '\0' ? ' ' : *s);
|
|
|
|
s++;
|
|
|
|
}
|
|
|
|
bb_error_msg_and_die("unknown option '%s', known options: %s", name, buf);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2020-06-24 01:55:08 +05:30
|
|
|
/* Initialize state to be used between subsequent udhcp_scan_options calls */
|
|
|
|
void FAST_FUNC init_scan_state(struct dhcp_packet *packet, struct dhcp_scan_state *scan_state)
|
|
|
|
{
|
|
|
|
scan_state->overload = 0;
|
|
|
|
scan_state->rem = sizeof(packet->options);
|
|
|
|
scan_state->optionptr = packet->options;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Iterate over packet's options, each call returning the next option.
|
|
|
|
* scan_state needs to be initialized with init_scan_state beforehand.
|
|
|
|
* Warning, result is not aligned. */
|
|
|
|
uint8_t* FAST_FUNC udhcp_scan_options(struct dhcp_packet *packet, struct dhcp_scan_state *scan_state)
|
2010-03-26 13:05:24 +05:30
|
|
|
{
|
|
|
|
int len;
|
|
|
|
enum {
|
|
|
|
FILE_FIELD101 = FILE_FIELD * 0x101,
|
|
|
|
SNAME_FIELD101 = SNAME_FIELD * 0x101,
|
|
|
|
};
|
|
|
|
|
|
|
|
/* option bytes: [code][len][data1][data2]..[dataLEN] */
|
|
|
|
while (1) {
|
2020-06-24 01:55:08 +05:30
|
|
|
if (scan_state->rem <= 0) {
|
2016-10-25 17:50:55 +05:30
|
|
|
complain:
|
libbb: reduce the overhead of single parameter bb_error_msg() calls
Back in 2007, commit 0c97c9d43707 ("'simple' error message functions by
Loic Grenie") introduced bb_simple_perror_msg() to allow for a lower
overhead call to bb_perror_msg() when only a string was being printed
with no parameters. This saves space for some CPU architectures because
it avoids the overhead of a call to a variadic function. However there
has never been a simple version of bb_error_msg(), and since 2007 many
new calls to bb_perror_msg() have been added that only take a single
parameter and so could have been using bb_simple_perror_message().
This changeset introduces 'simple' versions of bb_info_msg(),
bb_error_msg(), bb_error_msg_and_die(), bb_herror_msg() and
bb_herror_msg_and_die(), and replaces all calls that only take a
single parameter, or use something like ("%s", arg), with calls to the
corresponding 'simple' version.
Since it is likely that single parameter calls to the variadic functions
may be accidentally reintroduced in the future a new debugging config
option WARN_SIMPLE_MSG has been introduced. This uses some macro magic
which will cause any such calls to generate a warning, but this is
turned off by default to avoid use of the unpleasant macros in normal
circumstances.
This is a large changeset due to the number of calls that have been
replaced. The only files that contain changes other than simple
substitution of function calls are libbb.h, libbb/herror_msg.c,
libbb/verror_msg.c and libbb/xfuncs_printf.c. In miscutils/devfsd.c,
networking/udhcp/common.h and util-linux/mdev.c additonal macros have
been added for logging so that single parameter and multiple parameter
logging variants exist.
The amount of space saved varies considerably by architecture, and was
found to be as follows (for 'defconfig' using GCC 7.4):
Arm: -92 bytes
MIPS: -52 bytes
PPC: -1836 bytes
x86_64: -938 bytes
Note that for the MIPS architecture only an exception had to be made
disabling the 'simple' calls for 'udhcp' (in networking/udhcp/common.h)
because it made these files larger on MIPS.
Signed-off-by: James Byrne <james.byrne@origamienergy.com>
Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
2019-07-02 15:05:03 +05:30
|
|
|
bb_simple_error_msg("bad packet, malformed option field");
|
2010-03-26 13:05:24 +05:30
|
|
|
return NULL;
|
|
|
|
}
|
2016-10-25 17:50:55 +05:30
|
|
|
|
|
|
|
/* DHCP_PADDING and DHCP_END have no [len] byte */
|
2020-06-24 01:55:08 +05:30
|
|
|
if (scan_state->optionptr[OPT_CODE] == DHCP_PADDING) {
|
|
|
|
scan_state->rem--;
|
|
|
|
scan_state->optionptr++;
|
2010-03-26 13:05:24 +05:30
|
|
|
continue;
|
|
|
|
}
|
2020-06-24 01:55:08 +05:30
|
|
|
if (scan_state->optionptr[OPT_CODE] == DHCP_END) {
|
|
|
|
if ((scan_state->overload & FILE_FIELD101) == FILE_FIELD) {
|
2010-03-26 13:05:24 +05:30
|
|
|
/* can use packet->file, and didn't look at it yet */
|
2020-06-24 01:55:08 +05:30
|
|
|
scan_state->overload |= FILE_FIELD101; /* "we looked at it" */
|
|
|
|
scan_state->optionptr = packet->file;
|
|
|
|
scan_state->rem = sizeof(packet->file);
|
2010-03-26 13:05:24 +05:30
|
|
|
continue;
|
|
|
|
}
|
2020-06-24 01:55:08 +05:30
|
|
|
if ((scan_state->overload & SNAME_FIELD101) == SNAME_FIELD) {
|
2010-03-26 13:05:24 +05:30
|
|
|
/* can use packet->sname, and didn't look at it yet */
|
2020-06-24 01:55:08 +05:30
|
|
|
scan_state->overload |= SNAME_FIELD101; /* "we looked at it" */
|
|
|
|
scan_state->optionptr = packet->sname;
|
|
|
|
scan_state->rem = sizeof(packet->sname);
|
2010-03-26 13:05:24 +05:30
|
|
|
continue;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
}
|
2016-10-25 17:50:55 +05:30
|
|
|
|
2021-03-16 11:12:43 +05:30
|
|
|
if (scan_state->rem <= OPT_LEN) /* [len] byte exists? */
|
|
|
|
goto complain; /* no, complain and return NULL */
|
|
|
|
len = scan_state->optionptr[OPT_LEN];
|
|
|
|
/* Skip options with zero length.
|
|
|
|
* Users report that DHCP server on a TrendNet router (unknown model)
|
|
|
|
* provides a zero-length option 12 (Host Name)
|
|
|
|
* (this violates RFC 2132 section 3.14).
|
|
|
|
*/
|
|
|
|
if (len == 0) {
|
2021-03-16 16:12:56 +05:30
|
|
|
scan_state->rem -= 2;
|
|
|
|
scan_state->optionptr += 2;
|
2021-03-16 11:12:43 +05:30
|
|
|
continue;
|
|
|
|
}
|
2021-03-16 16:12:56 +05:30
|
|
|
len += 2;
|
2020-06-24 01:55:08 +05:30
|
|
|
scan_state->rem -= len;
|
2021-03-16 11:12:43 +05:30
|
|
|
if (scan_state->rem < 0) /* option is longer than options field? */
|
|
|
|
goto complain; /* yes, complain and return NULL */
|
2010-03-26 13:05:24 +05:30
|
|
|
|
2020-06-24 01:55:08 +05:30
|
|
|
if (scan_state->optionptr[OPT_CODE] == DHCP_OPTION_OVERLOAD) {
|
2021-03-16 11:12:43 +05:30
|
|
|
/* len is known to be >= 3 now, [data] byte exists */
|
|
|
|
scan_state->overload |= scan_state->optionptr[OPT_DATA];
|
2020-06-24 01:55:08 +05:30
|
|
|
} else {
|
|
|
|
uint8_t *return_ptr = scan_state->optionptr;
|
|
|
|
scan_state->optionptr += len;
|
|
|
|
return return_ptr;
|
2010-03-26 13:05:24 +05:30
|
|
|
}
|
2020-06-24 01:55:08 +05:30
|
|
|
scan_state->optionptr += len;
|
|
|
|
}
|
2010-03-26 13:05:24 +05:30
|
|
|
|
2020-06-24 01:55:08 +05:30
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Get an option with bounds checking (warning, result is not aligned) */
|
|
|
|
uint8_t* FAST_FUNC udhcp_get_option(struct dhcp_packet *packet, int code)
|
|
|
|
{
|
|
|
|
uint8_t *optptr;
|
|
|
|
struct dhcp_scan_state scan_state;
|
|
|
|
|
|
|
|
init_scan_state(packet, &scan_state);
|
|
|
|
while ((optptr = udhcp_scan_options(packet, &scan_state)) != NULL) {
|
|
|
|
if (optptr[OPT_CODE] == code) {
|
|
|
|
log_option("option found", optptr);
|
|
|
|
return optptr + OPT_DATA;
|
2010-03-26 13:05:24 +05:30
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
/* log3 because udhcpc uses it a lot - very noisy */
|
2016-03-30 22:11:23 +05:30
|
|
|
log3("option 0x%02x not found", code);
|
2010-03-26 13:05:24 +05:30
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
2018-12-17 22:37:18 +05:30
|
|
|
uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code)
|
|
|
|
{
|
|
|
|
uint8_t *r = udhcp_get_option(packet, code);
|
|
|
|
if (r) {
|
2019-01-07 20:03:42 +05:30
|
|
|
if (r[-OPT_DATA + OPT_LEN] != 4)
|
2018-12-17 22:37:18 +05:30
|
|
|
r = NULL;
|
|
|
|
}
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
2010-05-31 03:11:23 +05:30
|
|
|
/* Return the position of the 'end' option (no bounds checking) */
|
2010-03-26 13:05:24 +05:30
|
|
|
int FAST_FUNC udhcp_end_option(uint8_t *optionptr)
|
|
|
|
{
|
|
|
|
int i = 0;
|
|
|
|
|
|
|
|
while (optionptr[i] != DHCP_END) {
|
|
|
|
if (optionptr[i] != DHCP_PADDING)
|
|
|
|
i += optionptr[i + OPT_LEN] + OPT_DATA-1;
|
|
|
|
i++;
|
|
|
|
}
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Add an option (supplied in binary form) to the options.
|
|
|
|
* Option format: [code][len][data1][data2]..[dataLEN]
|
|
|
|
*/
|
2010-03-26 14:02:09 +05:30
|
|
|
void FAST_FUNC udhcp_add_binary_option(struct dhcp_packet *packet, uint8_t *addopt)
|
2010-03-26 13:05:24 +05:30
|
|
|
{
|
|
|
|
unsigned len;
|
2010-03-26 14:02:09 +05:30
|
|
|
uint8_t *optionptr = packet->options;
|
2010-03-26 13:05:24 +05:30
|
|
|
unsigned end = udhcp_end_option(optionptr);
|
|
|
|
|
|
|
|
len = OPT_DATA + addopt[OPT_LEN];
|
2010-03-26 14:02:09 +05:30
|
|
|
/* end position + (option code/length + addopt length) + end option */
|
2010-03-26 13:05:24 +05:30
|
|
|
if (end + len + 1 >= DHCP_OPTIONS_BUFSIZE) {
|
2010-03-26 14:02:09 +05:30
|
|
|
//TODO: learn how to use overflow option if we exhaust packet->options[]
|
2010-03-26 13:05:24 +05:30
|
|
|
bb_error_msg("option 0x%02x did not fit into the packet",
|
|
|
|
addopt[OPT_CODE]);
|
|
|
|
return;
|
|
|
|
}
|
2016-03-30 22:19:45 +05:30
|
|
|
log_option("adding option", addopt);
|
2010-03-26 13:05:24 +05:30
|
|
|
memcpy(optionptr + end, addopt, len);
|
|
|
|
optionptr[end + len] = DHCP_END;
|
|
|
|
}
|
|
|
|
|
2017-06-28 22:48:17 +05:30
|
|
|
#if ENABLE_UDHCPC || ENABLE_UDHCPD
|
2010-03-26 14:02:09 +05:30
|
|
|
/* Add an one to four byte option to a packet */
|
|
|
|
void FAST_FUNC udhcp_add_simple_option(struct dhcp_packet *packet, uint8_t code, uint32_t data)
|
2010-03-26 13:05:24 +05:30
|
|
|
{
|
2010-04-04 18:58:49 +05:30
|
|
|
const struct dhcp_optflag *dh;
|
2010-03-26 13:05:24 +05:30
|
|
|
|
2010-04-04 18:58:49 +05:30
|
|
|
for (dh = dhcp_optflags; dh->code; dh++) {
|
2010-03-26 13:05:24 +05:30
|
|
|
if (dh->code == code) {
|
|
|
|
uint8_t option[6], len;
|
|
|
|
|
|
|
|
option[OPT_CODE] = code;
|
|
|
|
len = dhcp_option_lengths[dh->flags & OPTION_TYPE_MASK];
|
|
|
|
option[OPT_LEN] = len;
|
|
|
|
if (BB_BIG_ENDIAN)
|
|
|
|
data <<= 8 * (4 - len);
|
|
|
|
/* Assignment is unaligned! */
|
|
|
|
move_to_unaligned32(&option[OPT_DATA], data);
|
2010-03-26 14:02:09 +05:30
|
|
|
udhcp_add_binary_option(packet, option);
|
2010-03-26 13:05:24 +05:30
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
bb_error_msg("can't add option 0x%02x", code);
|
|
|
|
}
|
2017-06-28 22:48:17 +05:30
|
|
|
#endif
|
2010-03-26 13:05:24 +05:30
|
|
|
|
|
|
|
/* Find option 'code' in opt_list */
|
2010-03-26 14:02:09 +05:30
|
|
|
struct option_set* FAST_FUNC udhcp_find_option(struct option_set *opt_list, uint8_t code)
|
2010-03-26 13:05:24 +05:30
|
|
|
{
|
|
|
|
while (opt_list && opt_list->data[OPT_CODE] < code)
|
|
|
|
opt_list = opt_list->next;
|
|
|
|
|
|
|
|
if (opt_list && opt_list->data[OPT_CODE] == code)
|
|
|
|
return opt_list;
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* Parse string to IP in network order */
|
|
|
|
int FAST_FUNC udhcp_str2nip(const char *str, void *arg)
|
|
|
|
{
|
|
|
|
len_and_sockaddr *lsa;
|
|
|
|
|
|
|
|
lsa = host_and_af2sockaddr(str, 0, AF_INET);
|
|
|
|
if (!lsa)
|
|
|
|
return 0;
|
2011-12-16 21:40:09 +05:30
|
|
|
/* arg maybe unaligned */
|
|
|
|
move_to_unaligned32((uint32_t*)arg, lsa->u.sin.sin_addr.s_addr);
|
2010-03-26 13:05:24 +05:30
|
|
|
free(lsa);
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* udhcp_str2optset:
|
2010-04-04 19:01:12 +05:30
|
|
|
* Parse string option representation to binary form and add it to opt_list.
|
|
|
|
* Called to parse "udhcpc -x OPTNAME:OPTVAL"
|
|
|
|
* and to parse udhcpd.conf's "opt OPTNAME OPTVAL" directives.
|
2010-03-26 13:05:24 +05:30
|
|
|
*/
|
2018-04-13 16:48:34 +05:30
|
|
|
/* helper: add an option to the opt_list */
|
2018-05-14 14:36:35 +05:30
|
|
|
#if !ENABLE_UDHCPC6
|
|
|
|
#define attach_option(opt_list, optflag, buffer, length, dhcpv6) \
|
|
|
|
attach_option(opt_list, optflag, buffer, length)
|
|
|
|
#endif
|
2018-04-13 16:48:34 +05:30
|
|
|
static NOINLINE void attach_option(
|
|
|
|
struct option_set **opt_list,
|
2010-04-04 19:01:12 +05:30
|
|
|
const struct dhcp_optflag *optflag,
|
|
|
|
char *buffer,
|
2018-05-14 14:36:35 +05:30
|
|
|
int length,
|
|
|
|
bool dhcpv6)
|
2010-04-04 19:01:12 +05:30
|
|
|
{
|
2018-05-14 14:36:35 +05:30
|
|
|
IF_NOT_UDHCPC6(bool dhcpv6 = 0;)
|
2018-04-13 16:48:34 +05:30
|
|
|
struct option_set *existing;
|
2010-04-04 19:01:12 +05:30
|
|
|
char *allocated = NULL;
|
2018-04-13 16:48:34 +05:30
|
|
|
|
2010-04-04 19:01:12 +05:30
|
|
|
if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_BIN) {
|
|
|
|
const char *end;
|
|
|
|
allocated = xstrdup(buffer); /* more than enough */
|
|
|
|
end = hex2bin(allocated, buffer, 255);
|
|
|
|
if (errno)
|
|
|
|
bb_error_msg_and_die("malformed hex string '%s'", buffer);
|
2018-04-13 16:48:34 +05:30
|
|
|
length = end - allocated;
|
2019-01-07 19:53:18 +05:30
|
|
|
buffer = allocated;
|
2010-04-04 19:01:12 +05:30
|
|
|
}
|
2010-03-26 13:05:24 +05:30
|
|
|
#if ENABLE_FEATURE_UDHCP_RFC3397
|
2013-05-17 18:49:47 +05:30
|
|
|
if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_DNS_STRING) {
|
|
|
|
/* reuse buffer and length for RFC1035-formatted string */
|
2020-06-09 20:52:06 +05:30
|
|
|
allocated = buffer = (char *)dname_enc(/*NULL, 0,*/ buffer, &length);
|
2013-05-17 18:49:47 +05:30
|
|
|
}
|
2010-03-26 13:05:24 +05:30
|
|
|
#endif
|
2013-05-17 18:49:47 +05:30
|
|
|
|
|
|
|
existing = udhcp_find_option(*opt_list, optflag->code);
|
|
|
|
if (!existing) {
|
|
|
|
struct option_set *new, **curr;
|
|
|
|
|
2010-03-26 13:05:24 +05:30
|
|
|
/* make a new option */
|
2016-03-30 22:11:23 +05:30
|
|
|
log2("attaching option %02x to list", optflag->code);
|
2010-03-26 13:05:24 +05:30
|
|
|
new = xmalloc(sizeof(*new));
|
2018-05-14 14:36:35 +05:30
|
|
|
if (!dhcpv6) {
|
|
|
|
new->data = xmalloc(length + OPT_DATA);
|
|
|
|
new->data[OPT_CODE] = optflag->code;
|
|
|
|
new->data[OPT_LEN] = length;
|
2019-01-07 19:53:18 +05:30
|
|
|
memcpy(new->data + OPT_DATA, buffer, length);
|
2018-05-14 14:36:35 +05:30
|
|
|
} else {
|
|
|
|
new->data = xmalloc(length + D6_OPT_DATA);
|
|
|
|
new->data[D6_OPT_CODE] = optflag->code >> 8;
|
|
|
|
new->data[D6_OPT_CODE + 1] = optflag->code & 0xff;
|
|
|
|
new->data[D6_OPT_LEN] = length >> 8;
|
|
|
|
new->data[D6_OPT_LEN + 1] = length & 0xff;
|
2019-01-07 19:53:18 +05:30
|
|
|
memcpy(new->data + D6_OPT_DATA, buffer,
|
2018-05-14 14:36:35 +05:30
|
|
|
length);
|
|
|
|
}
|
2010-03-26 13:05:24 +05:30
|
|
|
|
|
|
|
curr = opt_list;
|
2010-04-04 18:58:49 +05:30
|
|
|
while (*curr && (*curr)->data[OPT_CODE] < optflag->code)
|
2010-03-26 13:05:24 +05:30
|
|
|
curr = &(*curr)->next;
|
|
|
|
|
|
|
|
new->next = *curr;
|
|
|
|
*curr = new;
|
|
|
|
goto ret;
|
|
|
|
}
|
|
|
|
|
2010-04-04 18:58:49 +05:30
|
|
|
if (optflag->flags & OPTION_LIST) {
|
2010-03-26 13:05:24 +05:30
|
|
|
unsigned old_len;
|
|
|
|
|
|
|
|
/* add it to an existing option */
|
2016-03-30 22:11:23 +05:30
|
|
|
log2("attaching option %02x to existing member of list", optflag->code);
|
2010-03-26 13:05:24 +05:30
|
|
|
old_len = existing->data[OPT_LEN];
|
|
|
|
if (old_len + length < 255) {
|
|
|
|
/* actually 255 is ok too, but adding a space can overlow it */
|
|
|
|
|
|
|
|
existing->data = xrealloc(existing->data, OPT_DATA + 1 + old_len + length);
|
2019-01-07 19:53:18 +05:30
|
|
|
// So far dhcp_optflags[] has no OPTION_STRING[_HOST] | OPTION_LIST items
|
|
|
|
#if 0
|
2011-12-08 21:11:05 +05:30
|
|
|
if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_STRING
|
|
|
|
|| (optflag->flags & OPTION_TYPE_MASK) == OPTION_STRING_HOST
|
|
|
|
) {
|
2010-03-26 13:05:24 +05:30
|
|
|
/* add space separator between STRING options in a list */
|
|
|
|
existing->data[OPT_DATA + old_len] = ' ';
|
|
|
|
old_len++;
|
|
|
|
}
|
2019-01-07 19:53:18 +05:30
|
|
|
#endif
|
|
|
|
|
|
|
|
memcpy(existing->data + OPT_DATA + old_len, buffer, length);
|
2010-03-26 13:05:24 +05:30
|
|
|
existing->data[OPT_LEN] = old_len + length;
|
|
|
|
} /* else, ignore the data, we could put this in a second option in the future */
|
|
|
|
} /* else, ignore the new data */
|
|
|
|
|
2010-04-04 19:01:12 +05:30
|
|
|
ret:
|
2010-03-26 13:05:24 +05:30
|
|
|
free(allocated);
|
|
|
|
}
|
|
|
|
|
2018-05-14 14:36:35 +05:30
|
|
|
int FAST_FUNC udhcp_str2optset(const char *const_str, void *arg,
|
|
|
|
const struct dhcp_optflag *optflags, const char *option_strings,
|
|
|
|
bool dhcpv6)
|
2010-03-26 13:05:24 +05:30
|
|
|
{
|
|
|
|
struct option_set **opt_list = arg;
|
2018-04-13 16:48:34 +05:30
|
|
|
char *opt;
|
2010-03-26 13:05:24 +05:30
|
|
|
char *str;
|
2010-04-04 18:58:49 +05:30
|
|
|
const struct dhcp_optflag *optflag;
|
2018-04-13 16:48:34 +05:30
|
|
|
struct dhcp_optflag userdef_optflag;
|
2010-04-04 19:01:12 +05:30
|
|
|
unsigned optcode;
|
2018-04-13 16:48:34 +05:30
|
|
|
int retval;
|
2011-12-16 21:40:09 +05:30
|
|
|
/* IP_PAIR needs 8 bytes, STATIC_ROUTES needs 9 max */
|
|
|
|
char buffer[9] ALIGNED(4);
|
2010-03-26 13:05:24 +05:30
|
|
|
uint16_t *result_u16 = (uint16_t *) buffer;
|
|
|
|
uint32_t *result_u32 = (uint32_t *) buffer;
|
|
|
|
|
|
|
|
/* Cheat, the only *const* str possible is "" */
|
|
|
|
str = (char *) const_str;
|
2020-10-06 06:06:47 +05:30
|
|
|
opt = strtok_r(str, " \t=:", &str);
|
2010-03-26 13:05:24 +05:30
|
|
|
if (!opt)
|
|
|
|
return 0;
|
|
|
|
|
2010-04-04 19:01:12 +05:30
|
|
|
optcode = bb_strtou(opt, NULL, 0);
|
|
|
|
if (!errno && optcode < 255) {
|
2018-04-13 16:48:34 +05:30
|
|
|
/* Raw (numeric) option code.
|
|
|
|
* Initially assume binary (hex-str), but if "str" or 'str'
|
|
|
|
* is seen later, switch to STRING.
|
|
|
|
*/
|
|
|
|
userdef_optflag.flags = OPTION_BIN;
|
|
|
|
userdef_optflag.code = optcode;
|
|
|
|
optflag = &userdef_optflag;
|
2010-04-04 19:01:12 +05:30
|
|
|
} else {
|
2017-06-28 22:48:17 +05:30
|
|
|
optflag = &optflags[udhcp_option_idx(opt, option_strings)];
|
2010-04-04 19:01:12 +05:30
|
|
|
}
|
2010-03-26 13:05:24 +05:30
|
|
|
|
2018-04-13 16:48:34 +05:30
|
|
|
/* Loop to handle OPTION_LIST case, else execute just once */
|
2010-03-26 13:05:24 +05:30
|
|
|
retval = 0;
|
|
|
|
do {
|
2018-04-13 16:48:34 +05:30
|
|
|
int length;
|
|
|
|
char *val;
|
|
|
|
|
2018-05-14 09:59:15 +05:30
|
|
|
if (optflag->flags == OPTION_BIN) {
|
2020-10-06 06:06:47 +05:30
|
|
|
val = strtok_r(NULL, "", &str); /* do not split "'q w e'" */
|
2019-09-25 17:33:13 +05:30
|
|
|
if (val) trim(val);
|
2018-05-14 09:59:15 +05:30
|
|
|
} else
|
2020-10-06 06:06:47 +05:30
|
|
|
val = strtok_r(NULL, ", \t", &str);
|
2010-03-26 13:05:24 +05:30
|
|
|
if (!val)
|
|
|
|
break;
|
2018-04-13 16:48:34 +05:30
|
|
|
|
2010-04-04 18:58:49 +05:30
|
|
|
length = dhcp_option_lengths[optflag->flags & OPTION_TYPE_MASK];
|
2010-03-26 13:05:24 +05:30
|
|
|
retval = 0;
|
|
|
|
opt = buffer; /* new meaning for variable opt */
|
2018-04-13 16:48:34 +05:30
|
|
|
|
2010-04-04 18:58:49 +05:30
|
|
|
switch (optflag->flags & OPTION_TYPE_MASK) {
|
2010-03-26 13:05:24 +05:30
|
|
|
case OPTION_IP:
|
|
|
|
retval = udhcp_str2nip(val, buffer);
|
|
|
|
break;
|
|
|
|
case OPTION_IP_PAIR:
|
|
|
|
retval = udhcp_str2nip(val, buffer);
|
2020-10-06 06:06:47 +05:30
|
|
|
val = strtok_r(NULL, ", \t/-", &str);
|
2010-03-26 13:05:24 +05:30
|
|
|
if (!val)
|
|
|
|
retval = 0;
|
|
|
|
if (retval)
|
|
|
|
retval = udhcp_str2nip(val, buffer + 4);
|
|
|
|
break;
|
2019-01-07 19:53:18 +05:30
|
|
|
case_OPTION_STRING:
|
2010-03-26 13:05:24 +05:30
|
|
|
case OPTION_STRING:
|
2011-12-08 21:11:05 +05:30
|
|
|
case OPTION_STRING_HOST:
|
2010-03-26 13:05:24 +05:30
|
|
|
#if ENABLE_FEATURE_UDHCP_RFC3397
|
2010-04-03 21:04:52 +05:30
|
|
|
case OPTION_DNS_STRING:
|
2010-03-26 13:05:24 +05:30
|
|
|
#endif
|
|
|
|
length = strnlen(val, 254);
|
|
|
|
if (length > 0) {
|
|
|
|
opt = val;
|
|
|
|
retval = 1;
|
|
|
|
}
|
|
|
|
break;
|
|
|
|
// case OPTION_BOOLEAN: {
|
2010-04-03 04:22:16 +05:30
|
|
|
// static const char no_yes[] ALIGN1 = "no\0yes\0";
|
|
|
|
// buffer[0] = retval = index_in_strings(no_yes, val);
|
2010-03-26 13:05:24 +05:30
|
|
|
// retval++; /* 0 - bad; 1: "no" 2: "yes" */
|
|
|
|
// break;
|
|
|
|
// }
|
|
|
|
case OPTION_U8:
|
2011-12-16 21:40:09 +05:30
|
|
|
buffer[0] = bb_strtou32(val, NULL, 0);
|
|
|
|
retval = (errno == 0);
|
2010-03-26 13:05:24 +05:30
|
|
|
break;
|
|
|
|
/* htonX are macros in older libc's, using temp var
|
|
|
|
* in code below for safety */
|
|
|
|
/* TODO: use bb_strtoX? */
|
|
|
|
case OPTION_U16: {
|
2011-12-16 21:40:09 +05:30
|
|
|
uint32_t tmp = bb_strtou32(val, NULL, 0);
|
2010-03-26 13:05:24 +05:30
|
|
|
*result_u16 = htons(tmp);
|
2011-12-16 21:40:09 +05:30
|
|
|
retval = (errno == 0 /*&& tmp < 0x10000*/);
|
2010-03-26 13:05:24 +05:30
|
|
|
break;
|
|
|
|
}
|
|
|
|
// case OPTION_S16: {
|
2011-12-16 21:40:09 +05:30
|
|
|
// long tmp = bb_strtoi32(val, NULL, 0);
|
2010-03-26 13:05:24 +05:30
|
|
|
// *result_u16 = htons(tmp);
|
2011-12-16 21:40:09 +05:30
|
|
|
// retval = (errno == 0);
|
2010-03-26 13:05:24 +05:30
|
|
|
// break;
|
|
|
|
// }
|
|
|
|
case OPTION_U32: {
|
2011-12-16 21:40:09 +05:30
|
|
|
uint32_t tmp = bb_strtou32(val, NULL, 0);
|
2010-03-26 13:05:24 +05:30
|
|
|
*result_u32 = htonl(tmp);
|
2011-12-16 21:40:09 +05:30
|
|
|
retval = (errno == 0);
|
2010-03-26 13:05:24 +05:30
|
|
|
break;
|
|
|
|
}
|
|
|
|
case OPTION_S32: {
|
2011-12-16 21:40:09 +05:30
|
|
|
int32_t tmp = bb_strtoi32(val, NULL, 0);
|
2010-03-26 13:05:24 +05:30
|
|
|
*result_u32 = htonl(tmp);
|
2011-12-16 21:40:09 +05:30
|
|
|
retval = (errno == 0);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
case OPTION_STATIC_ROUTES: {
|
|
|
|
/* Input: "a.b.c.d/m" */
|
|
|
|
/* Output: mask(1 byte),pfx(0-4 bytes),gw(4 bytes) */
|
|
|
|
unsigned mask;
|
|
|
|
char *slash = strchr(val, '/');
|
|
|
|
if (slash) {
|
|
|
|
*slash = '\0';
|
|
|
|
retval = udhcp_str2nip(val, buffer + 1);
|
|
|
|
buffer[0] = mask = bb_strtou(slash + 1, NULL, 10);
|
2020-10-06 06:06:47 +05:30
|
|
|
val = strtok_r(NULL, ", \t/-", &str);
|
2011-12-16 21:40:09 +05:30
|
|
|
if (!val || mask > 32 || errno)
|
|
|
|
retval = 0;
|
|
|
|
if (retval) {
|
|
|
|
length = ((mask + 7) >> 3) + 5;
|
|
|
|
retval = udhcp_str2nip(val, buffer + (length - 4));
|
|
|
|
}
|
|
|
|
}
|
2010-03-26 13:05:24 +05:30
|
|
|
break;
|
|
|
|
}
|
2018-04-13 16:48:34 +05:30
|
|
|
case OPTION_BIN:
|
|
|
|
/* Raw (numeric) option code. Is it a string? */
|
|
|
|
if (val[0] == '"' || val[0] == '\'') {
|
|
|
|
char delim = val[0];
|
|
|
|
char *end = last_char_is(val + 1, delim);
|
|
|
|
if (end) {
|
|
|
|
*end = '\0';
|
|
|
|
val++;
|
|
|
|
userdef_optflag.flags = OPTION_STRING;
|
|
|
|
goto case_OPTION_STRING;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* No: hex-str option, handled in attach_option() */
|
2010-04-04 19:01:12 +05:30
|
|
|
opt = val;
|
|
|
|
retval = 1;
|
2018-04-13 16:48:34 +05:30
|
|
|
break;
|
2010-03-26 13:05:24 +05:30
|
|
|
default:
|
|
|
|
break;
|
|
|
|
}
|
2018-04-13 16:48:34 +05:30
|
|
|
|
2010-03-26 13:05:24 +05:30
|
|
|
if (retval)
|
2018-05-14 14:36:35 +05:30
|
|
|
attach_option(opt_list, optflag, opt, length, dhcpv6);
|
2011-12-16 21:40:09 +05:30
|
|
|
} while (retval && (optflag->flags & OPTION_LIST));
|
2010-03-26 13:05:24 +05:30
|
|
|
|
|
|
|
return retval;
|
|
|
|
}
|
2011-11-17 00:47:12 +05:30
|
|
|
|
|
|
|
/* note: ip is a pointer to an IPv6 in network order, possibly misaliged */
|
|
|
|
int FAST_FUNC sprint_nip6(char *dest, /*const char *pre,*/ const uint8_t *ip)
|
|
|
|
{
|
|
|
|
char hexstrbuf[16 * 2];
|
|
|
|
bin2hex(hexstrbuf, (void*)ip, 16);
|
|
|
|
return sprintf(dest, /* "%s" */
|
|
|
|
"%.4s:%.4s:%.4s:%.4s:%.4s:%.4s:%.4s:%.4s",
|
|
|
|
/* pre, */
|
|
|
|
hexstrbuf + 0 * 4,
|
|
|
|
hexstrbuf + 1 * 4,
|
|
|
|
hexstrbuf + 2 * 4,
|
|
|
|
hexstrbuf + 3 * 4,
|
|
|
|
hexstrbuf + 4 * 4,
|
|
|
|
hexstrbuf + 5 * 4,
|
|
|
|
hexstrbuf + 6 * 4,
|
|
|
|
hexstrbuf + 7 * 4
|
|
|
|
);
|
|
|
|
}
|