ca466f385a
The result of looking at "grep -F -B2 '*fill*' busybox_unstripped.map" function old new delta .rodata 108586 108460 -126 ------------------------------------------------------------------------------ (add/remove: 0/0 grow/shrink: 0/1 up/down: 0/-126) Total: -126 bytes text data bss dec hex filename 970412 4219 1848 976479 ee65f busybox_old 970286 4219 1848 976353 ee5e1 busybox_unstripped Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
736 lines
24 KiB
C
736 lines
24 KiB
C
/* vi: set sw=4 ts=4: */
|
|
/*
|
|
* Rewrite by Russ Dill <Russ.Dill@asu.edu> July 2001
|
|
*
|
|
* Licensed under GPLv2, see file LICENSE in this source tree.
|
|
*/
|
|
#include "common.h"
|
|
|
|
#if defined CONFIG_UDHCP_DEBUG && CONFIG_UDHCP_DEBUG >= 1
|
|
unsigned dhcp_verbose;
|
|
#endif
|
|
|
|
const uint8_t MAC_BCAST_ADDR[6] ALIGN2 = {
|
|
0xff, 0xff, 0xff, 0xff, 0xff, 0xff
|
|
};
|
|
|
|
#if ENABLE_UDHCPC || ENABLE_UDHCPD
|
|
/* Supported options are easily added here, they need to be sorted.
|
|
* See RFC2132 for more options.
|
|
* OPTION_REQ: these options are requested by udhcpc (unless -o).
|
|
*/
|
|
const struct dhcp_optflag dhcp_optflags[] ALIGN2 = {
|
|
/* flags code */
|
|
{ OPTION_IP | OPTION_REQ, 0x01 }, /* DHCP_SUBNET */
|
|
{ OPTION_S32 , 0x02 }, /* DHCP_TIME_OFFSET */
|
|
{ OPTION_IP | OPTION_LIST | OPTION_REQ, 0x03 }, /* DHCP_ROUTER */
|
|
// { OPTION_IP | OPTION_LIST , 0x04 }, /* DHCP_TIME_SERVER */
|
|
// { OPTION_IP | OPTION_LIST , 0x05 }, /* DHCP_NAME_SERVER */
|
|
{ OPTION_IP | OPTION_LIST | OPTION_REQ, 0x06 }, /* DHCP_DNS_SERVER */
|
|
// { OPTION_IP | OPTION_LIST , 0x07 }, /* DHCP_LOG_SERVER */
|
|
// { OPTION_IP | OPTION_LIST , 0x08 }, /* DHCP_COOKIE_SERVER */
|
|
{ OPTION_IP | OPTION_LIST , 0x09 }, /* DHCP_LPR_SERVER */
|
|
{ OPTION_STRING_HOST | OPTION_REQ, 0x0c }, /* DHCP_HOST_NAME */
|
|
{ OPTION_U16 , 0x0d }, /* DHCP_BOOT_SIZE */
|
|
{ OPTION_STRING_HOST | OPTION_REQ, 0x0f }, /* DHCP_DOMAIN_NAME */
|
|
{ OPTION_IP , 0x10 }, /* DHCP_SWAP_SERVER */
|
|
{ OPTION_STRING , 0x11 }, /* DHCP_ROOT_PATH */
|
|
{ OPTION_U8 , 0x17 }, /* DHCP_IP_TTL */
|
|
{ OPTION_U16 , 0x1a }, /* DHCP_MTU */
|
|
//TODO: why do we request DHCP_BROADCAST? Can't we assume that
|
|
//in the unlikely case it is different from typical N.N.255.255,
|
|
//server would let us know anyway?
|
|
{ OPTION_IP | OPTION_REQ, 0x1c }, /* DHCP_BROADCAST */
|
|
{ OPTION_IP_PAIR | OPTION_LIST , 0x21 }, /* DHCP_ROUTES */
|
|
{ OPTION_STRING_HOST , 0x28 }, /* DHCP_NIS_DOMAIN */
|
|
{ OPTION_IP | OPTION_LIST , 0x29 }, /* DHCP_NIS_SERVER */
|
|
{ OPTION_IP | OPTION_LIST | OPTION_REQ, 0x2a }, /* DHCP_NTP_SERVER */
|
|
{ OPTION_IP | OPTION_LIST , 0x2c }, /* DHCP_WINS_SERVER */
|
|
{ OPTION_U32 , 0x33 }, /* DHCP_LEASE_TIME */
|
|
{ OPTION_IP , 0x36 }, /* DHCP_SERVER_ID */
|
|
{ OPTION_STRING , 0x38 }, /* DHCP_ERR_MESSAGE */
|
|
{ OPTION_STRING , 0x3c }, /* DHCP_VENDOR */
|
|
//TODO: must be combined with 'sname' and 'file' handling:
|
|
{ OPTION_STRING_HOST , 0x42 }, /* DHCP_TFTP_SERVER_NAME */
|
|
{ OPTION_STRING , 0x43 }, /* DHCP_BOOT_FILE */
|
|
//TODO: not a string, but a set of LASCII strings:
|
|
// { OPTION_STRING , 0x4D }, /* DHCP_USER_CLASS */
|
|
{ OPTION_STRING , 0x64 }, /* DHCP_PCODE */
|
|
{ OPTION_STRING , 0x65 }, /* DHCP_TCODE */
|
|
#if ENABLE_FEATURE_UDHCP_RFC3397
|
|
{ OPTION_DNS_STRING | OPTION_LIST , 0x77 }, /* DHCP_DOMAIN_SEARCH */
|
|
{ OPTION_SIP_SERVERS , 0x78 }, /* DHCP_SIP_SERVERS */
|
|
#endif
|
|
{ OPTION_STATIC_ROUTES | OPTION_LIST , 0x79 }, /* DHCP_STATIC_ROUTES */
|
|
#if ENABLE_FEATURE_UDHCP_8021Q
|
|
{ OPTION_U16 , 0x84 }, /* DHCP_VLAN_ID */
|
|
{ OPTION_U8 , 0x85 }, /* DHCP_VLAN_PRIORITY */
|
|
#endif
|
|
{ OPTION_STRING , 0xd1 }, /* DHCP_PXE_CONF_FILE */
|
|
{ OPTION_STRING , 0xd2 }, /* DHCP_PXE_PATH_PREFIX */
|
|
{ OPTION_U32 , 0xd3 }, /* DHCP_REBOOT_TIME */
|
|
{ OPTION_6RD , 0xd4 }, /* DHCP_6RD */
|
|
{ OPTION_STATIC_ROUTES | OPTION_LIST , 0xf9 }, /* DHCP_MS_STATIC_ROUTES */
|
|
{ OPTION_STRING , 0xfc }, /* DHCP_WPAD */
|
|
|
|
/* Options below have no match in dhcp_option_strings[],
|
|
* are not passed to dhcpc scripts, and cannot be specified
|
|
* with "option XXX YYY" syntax in dhcpd config file.
|
|
* These entries are only used internally by udhcp[cd]
|
|
* to correctly encode options into packets.
|
|
*/
|
|
|
|
{ OPTION_IP , 0x32 }, /* DHCP_REQUESTED_IP */
|
|
{ OPTION_U8 , 0x35 }, /* DHCP_MESSAGE_TYPE */
|
|
{ OPTION_U16 , 0x39 }, /* DHCP_MAX_SIZE */
|
|
//looks like these opts will work just fine even without these defs:
|
|
// /* not really a string: */
|
|
// { OPTION_STRING , 0x3d }, /* DHCP_CLIENT_ID */
|
|
{ 0, 0 } /* zeroed terminating entry */
|
|
};
|
|
|
|
/* Used for converting options from incoming packets to env variables
|
|
* for udhcpc script, and for setting options for udhcpd via
|
|
* "opt OPTION_NAME OPTION_VALUE" directives in udhcpd.conf file.
|
|
*/
|
|
/* Must match dhcp_optflags[] order */
|
|
const char dhcp_option_strings[] ALIGN1 =
|
|
"subnet" "\0" /* DHCP_SUBNET */
|
|
"timezone" "\0" /* DHCP_TIME_OFFSET */
|
|
"router" "\0" /* DHCP_ROUTER */
|
|
// "timesrv" "\0" /* DHCP_TIME_SERVER */
|
|
// "namesrv" "\0" /* DHCP_NAME_SERVER */
|
|
"dns" "\0" /* DHCP_DNS_SERVER */
|
|
// "logsrv" "\0" /* DHCP_LOG_SERVER */
|
|
// "cookiesrv" "\0" /* DHCP_COOKIE_SERVER */
|
|
"lprsrv" "\0" /* DHCP_LPR_SERVER */
|
|
"hostname" "\0" /* DHCP_HOST_NAME */
|
|
"bootsize" "\0" /* DHCP_BOOT_SIZE */
|
|
"domain" "\0" /* DHCP_DOMAIN_NAME */
|
|
"swapsrv" "\0" /* DHCP_SWAP_SERVER */
|
|
"rootpath" "\0" /* DHCP_ROOT_PATH */
|
|
"ipttl" "\0" /* DHCP_IP_TTL */
|
|
"mtu" "\0" /* DHCP_MTU */
|
|
"broadcast" "\0" /* DHCP_BROADCAST */
|
|
"routes" "\0" /* DHCP_ROUTES */
|
|
"nisdomain" "\0" /* DHCP_NIS_DOMAIN */
|
|
"nissrv" "\0" /* DHCP_NIS_SERVER */
|
|
"ntpsrv" "\0" /* DHCP_NTP_SERVER */
|
|
"wins" "\0" /* DHCP_WINS_SERVER */
|
|
"lease" "\0" /* DHCP_LEASE_TIME */
|
|
"serverid" "\0" /* DHCP_SERVER_ID */
|
|
"message" "\0" /* DHCP_ERR_MESSAGE */
|
|
"vendor" "\0" /* DHCP_VENDOR */
|
|
"tftp" "\0" /* DHCP_TFTP_SERVER_NAME*/
|
|
"bootfile" "\0" /* DHCP_BOOT_FILE */
|
|
// "userclass" "\0" /* DHCP_USER_CLASS */
|
|
"tzstr" "\0" /* DHCP_PCODE */
|
|
"tzdbstr" "\0" /* DHCP_TCODE */
|
|
#if ENABLE_FEATURE_UDHCP_RFC3397
|
|
"search" "\0" /* DHCP_DOMAIN_SEARCH */
|
|
// doesn't work in udhcpd.conf since OPTION_SIP_SERVERS
|
|
// is not handled yet by "string->option" conversion code:
|
|
"sipsrv" "\0" /* DHCP_SIP_SERVERS */
|
|
#endif
|
|
"staticroutes" "\0" /* DHCP_STATIC_ROUTES */
|
|
#if ENABLE_FEATURE_UDHCP_8021Q
|
|
"vlanid" "\0" /* DHCP_VLAN_ID */
|
|
"vlanpriority" "\0" /* DHCP_VLAN_PRIORITY */
|
|
#endif
|
|
"pxeconffile" "\0" /* DHCP_PXE_CONF_FILE */
|
|
"pxepathprefix" "\0" /* DHCP_PXE_PATH_PREFIX */
|
|
"reboottime" "\0" /* DHCP_REBOOT_TIME */
|
|
"ip6rd" "\0" /* DHCP_6RD */
|
|
"msstaticroutes" "\0" /* DHCP_MS_STATIC_ROUTES*/
|
|
"wpad" "\0" /* DHCP_WPAD */
|
|
;
|
|
#endif
|
|
|
|
/* Lengths of the option types in binary form.
|
|
* Used by:
|
|
* udhcp_str2optset: to determine how many bytes to allocate.
|
|
* xmalloc_optname_optval: to estimate string length
|
|
* from binary option length: (option[LEN] / dhcp_option_lengths[opt_type])
|
|
* is the number of elements, multiply it by one element's string width
|
|
* (len_of_option_as_string[opt_type]) and you know how wide string you need.
|
|
*/
|
|
const uint8_t dhcp_option_lengths[] ALIGN1 = {
|
|
[OPTION_IP] = 4,
|
|
[OPTION_IP_PAIR] = 8,
|
|
// [OPTION_BOOLEAN] = 1,
|
|
[OPTION_STRING] = 1, /* ignored by udhcp_str2optset */
|
|
[OPTION_STRING_HOST] = 1, /* ignored by udhcp_str2optset */
|
|
#if ENABLE_FEATURE_UDHCP_RFC3397
|
|
[OPTION_DNS_STRING] = 1, /* ignored by both udhcp_str2optset and xmalloc_optname_optval */
|
|
[OPTION_SIP_SERVERS] = 1,
|
|
#endif
|
|
[OPTION_U8] = 1,
|
|
[OPTION_U16] = 2,
|
|
// [OPTION_S16] = 2,
|
|
[OPTION_U32] = 4,
|
|
[OPTION_S32] = 4,
|
|
/* Just like OPTION_STRING, we use minimum length here */
|
|
[OPTION_STATIC_ROUTES] = 5,
|
|
[OPTION_6RD] = 12, /* ignored by udhcp_str2optset */
|
|
/* The above value was chosen as follows:
|
|
* len_of_option_as_string[] for this option is >60: it's a string of the form
|
|
* "32 128 ffff:ffff:ffff:ffff:ffff:ffff:ffff:ffff 255.255.255.255 ".
|
|
* Each additional ipv4 address takes 4 bytes in binary option and appends
|
|
* another "255.255.255.255 " 16-byte string. We can set [OPTION_6RD] = 4
|
|
* but this severely overestimates string length: instead of 16 bytes,
|
|
* it adds >60 for every 4 bytes in binary option.
|
|
* We cheat and declare here that option is in units of 12 bytes.
|
|
* This adds more than 60 bytes for every three ipv4 addresses - more than enough.
|
|
* (Even 16 instead of 12 should work, but let's be paranoid).
|
|
*/
|
|
};
|
|
|
|
#if defined CONFIG_UDHCP_DEBUG && CONFIG_UDHCP_DEBUG >= 1
|
|
void FAST_FUNC log1s(const char *msg)
|
|
{
|
|
if (dhcp_verbose >= 1)
|
|
bb_simple_info_msg(msg);
|
|
}
|
|
#endif
|
|
|
|
#if defined CONFIG_UDHCP_DEBUG && CONFIG_UDHCP_DEBUG >= 2
|
|
static void log_option(const char *pfx, const uint8_t *opt)
|
|
{
|
|
if (dhcp_verbose >= 2) {
|
|
char buf[256 * 2 + 2];
|
|
*bin2hex(buf, (void*) (opt + OPT_DATA), opt[OPT_LEN]) = '\0';
|
|
bb_info_msg("%s: 0x%02x %s", pfx, opt[OPT_CODE], buf);
|
|
}
|
|
}
|
|
#else
|
|
# define log_option(pfx, opt) ((void)0)
|
|
#endif
|
|
|
|
unsigned FAST_FUNC udhcp_option_idx(const char *name, const char *option_strings)
|
|
{
|
|
int n = index_in_strings(option_strings, name);
|
|
if (n >= 0)
|
|
return n;
|
|
|
|
{
|
|
char *buf, *d;
|
|
const char *s;
|
|
|
|
s = option_strings;
|
|
while (*s)
|
|
s += strlen(s) + 1;
|
|
|
|
d = buf = xzalloc(s - option_strings);
|
|
s = option_strings;
|
|
while (!(*s == '\0' && s[1] == '\0')) {
|
|
*d++ = (*s == '\0' ? ' ' : *s);
|
|
s++;
|
|
}
|
|
bb_error_msg_and_die("unknown option '%s', known options: %s", name, buf);
|
|
}
|
|
}
|
|
|
|
/* Initialize state to be used between subsequent udhcp_scan_options calls */
|
|
void FAST_FUNC init_scan_state(struct dhcp_packet *packet, struct dhcp_scan_state *scan_state)
|
|
{
|
|
scan_state->overload = 0;
|
|
scan_state->rem = sizeof(packet->options);
|
|
scan_state->optionptr = packet->options;
|
|
}
|
|
|
|
/* Iterate over packet's options, each call returning the next option.
|
|
* scan_state needs to be initialized with init_scan_state beforehand.
|
|
* Warning, result is not aligned. */
|
|
uint8_t* FAST_FUNC udhcp_scan_options(struct dhcp_packet *packet, struct dhcp_scan_state *scan_state)
|
|
{
|
|
int len;
|
|
enum {
|
|
FILE_FIELD101 = FILE_FIELD * 0x101,
|
|
SNAME_FIELD101 = SNAME_FIELD * 0x101,
|
|
};
|
|
|
|
/* option bytes: [code][len][data1][data2]..[dataLEN] */
|
|
while (1) {
|
|
if (scan_state->rem <= 0) {
|
|
complain:
|
|
bb_simple_error_msg("bad packet, malformed option field");
|
|
return NULL;
|
|
}
|
|
|
|
/* DHCP_PADDING and DHCP_END have no [len] byte */
|
|
if (scan_state->optionptr[OPT_CODE] == DHCP_PADDING) {
|
|
scan_state->rem--;
|
|
scan_state->optionptr++;
|
|
continue;
|
|
}
|
|
if (scan_state->optionptr[OPT_CODE] == DHCP_END) {
|
|
if ((scan_state->overload & FILE_FIELD101) == FILE_FIELD) {
|
|
/* can use packet->file, and didn't look at it yet */
|
|
scan_state->overload |= FILE_FIELD101; /* "we looked at it" */
|
|
scan_state->optionptr = packet->file;
|
|
scan_state->rem = sizeof(packet->file);
|
|
continue;
|
|
}
|
|
if ((scan_state->overload & SNAME_FIELD101) == SNAME_FIELD) {
|
|
/* can use packet->sname, and didn't look at it yet */
|
|
scan_state->overload |= SNAME_FIELD101; /* "we looked at it" */
|
|
scan_state->optionptr = packet->sname;
|
|
scan_state->rem = sizeof(packet->sname);
|
|
continue;
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (scan_state->rem <= OPT_LEN) /* [len] byte exists? */
|
|
goto complain; /* no, complain and return NULL */
|
|
len = scan_state->optionptr[OPT_LEN];
|
|
/* Skip options with zero length.
|
|
* Users report that DHCP server on a TrendNet router (unknown model)
|
|
* provides a zero-length option 12 (Host Name)
|
|
* (this violates RFC 2132 section 3.14).
|
|
*/
|
|
if (len == 0) {
|
|
scan_state->rem -= 2;
|
|
scan_state->optionptr += 2;
|
|
continue;
|
|
}
|
|
len += 2;
|
|
scan_state->rem -= len;
|
|
if (scan_state->rem < 0) /* option is longer than options field? */
|
|
goto complain; /* yes, complain and return NULL */
|
|
|
|
if (scan_state->optionptr[OPT_CODE] == DHCP_OPTION_OVERLOAD) {
|
|
/* len is known to be >= 3 now, [data] byte exists */
|
|
scan_state->overload |= scan_state->optionptr[OPT_DATA];
|
|
} else {
|
|
uint8_t *return_ptr = scan_state->optionptr;
|
|
scan_state->optionptr += len;
|
|
return return_ptr;
|
|
}
|
|
scan_state->optionptr += len;
|
|
}
|
|
|
|
return NULL;
|
|
}
|
|
|
|
/* Get an option with bounds checking (warning, result is not aligned) */
|
|
uint8_t* FAST_FUNC udhcp_get_option(struct dhcp_packet *packet, int code)
|
|
{
|
|
uint8_t *optptr;
|
|
struct dhcp_scan_state scan_state;
|
|
|
|
init_scan_state(packet, &scan_state);
|
|
while ((optptr = udhcp_scan_options(packet, &scan_state)) != NULL) {
|
|
if (optptr[OPT_CODE] == code) {
|
|
log_option("option found", optptr);
|
|
return optptr + OPT_DATA;
|
|
}
|
|
}
|
|
|
|
/* log3 because udhcpc uses it a lot - very noisy */
|
|
log3("option 0x%02x not found", code);
|
|
return NULL;
|
|
}
|
|
|
|
uint8_t* FAST_FUNC udhcp_get_option32(struct dhcp_packet *packet, int code)
|
|
{
|
|
uint8_t *r = udhcp_get_option(packet, code);
|
|
if (r) {
|
|
if (r[-OPT_DATA + OPT_LEN] != 4)
|
|
r = NULL;
|
|
}
|
|
return r;
|
|
}
|
|
|
|
/* Return the position of the 'end' option (no bounds checking) */
|
|
int FAST_FUNC udhcp_end_option(uint8_t *optionptr)
|
|
{
|
|
int i = 0;
|
|
|
|
while (optionptr[i] != DHCP_END) {
|
|
if (optionptr[i] != DHCP_PADDING)
|
|
i += optionptr[i + OPT_LEN] + OPT_DATA-1;
|
|
i++;
|
|
}
|
|
return i;
|
|
}
|
|
|
|
/* Add an option (supplied in binary form) to the options.
|
|
* Option format: [code][len][data1][data2]..[dataLEN]
|
|
*/
|
|
void FAST_FUNC udhcp_add_binary_option(struct dhcp_packet *packet, uint8_t *addopt)
|
|
{
|
|
unsigned len;
|
|
uint8_t *optionptr = packet->options;
|
|
unsigned end = udhcp_end_option(optionptr);
|
|
|
|
len = OPT_DATA + addopt[OPT_LEN];
|
|
/* end position + (option code/length + addopt length) + end option */
|
|
if (end + len + 1 >= DHCP_OPTIONS_BUFSIZE) {
|
|
//TODO: learn how to use overflow option if we exhaust packet->options[]
|
|
bb_error_msg("option 0x%02x did not fit into the packet",
|
|
addopt[OPT_CODE]);
|
|
return;
|
|
}
|
|
log_option("adding option", addopt);
|
|
memcpy(optionptr + end, addopt, len);
|
|
optionptr[end + len] = DHCP_END;
|
|
}
|
|
|
|
#if ENABLE_UDHCPC || ENABLE_UDHCPD
|
|
/* Add an one to four byte option to a packet */
|
|
void FAST_FUNC udhcp_add_simple_option(struct dhcp_packet *packet, uint8_t code, uint32_t data)
|
|
{
|
|
const struct dhcp_optflag *dh;
|
|
|
|
for (dh = dhcp_optflags; dh->code; dh++) {
|
|
if (dh->code == code) {
|
|
uint8_t option[6], len;
|
|
|
|
option[OPT_CODE] = code;
|
|
len = dhcp_option_lengths[dh->flags & OPTION_TYPE_MASK];
|
|
option[OPT_LEN] = len;
|
|
if (BB_BIG_ENDIAN)
|
|
data <<= 8 * (4 - len);
|
|
/* Assignment is unaligned! */
|
|
move_to_unaligned32(&option[OPT_DATA], data);
|
|
udhcp_add_binary_option(packet, option);
|
|
return;
|
|
}
|
|
}
|
|
|
|
bb_error_msg("can't add option 0x%02x", code);
|
|
}
|
|
#endif
|
|
|
|
/* Find option 'code' in opt_list */
|
|
struct option_set* FAST_FUNC udhcp_find_option(struct option_set *opt_list, uint8_t code, bool dhcpv6)
|
|
{
|
|
IF_NOT_UDHCPC6(bool dhcpv6 = 0;)
|
|
uint8_t cur_code;
|
|
|
|
for (;;) {
|
|
if (!opt_list)
|
|
return opt_list; /* NULL */
|
|
if (!dhcpv6) {
|
|
cur_code = opt_list->data[OPT_CODE];
|
|
} else {
|
|
//FIXME: add support for code > 0xff
|
|
if (opt_list->data[D6_OPT_CODE] != 0)
|
|
return NULL;
|
|
cur_code = opt_list->data[D6_OPT_CODE + 1];
|
|
}
|
|
if (cur_code >= code) {
|
|
if (cur_code == code)
|
|
return opt_list;
|
|
return NULL;
|
|
}
|
|
opt_list = opt_list->next;
|
|
}
|
|
}
|
|
|
|
/* Parse string to IP in network order */
|
|
int FAST_FUNC udhcp_str2nip(const char *str, void *arg)
|
|
{
|
|
len_and_sockaddr *lsa;
|
|
|
|
lsa = host_and_af2sockaddr(str, 0, AF_INET);
|
|
if (!lsa)
|
|
return 0;
|
|
/* arg maybe unaligned */
|
|
move_to_unaligned32((uint32_t*)arg, lsa->u.sin.sin_addr.s_addr);
|
|
free(lsa);
|
|
return 1;
|
|
}
|
|
|
|
void* FAST_FUNC udhcp_insert_new_option(
|
|
struct option_set **opt_list,
|
|
unsigned code,
|
|
unsigned length,
|
|
bool dhcpv6)
|
|
{
|
|
IF_NOT_UDHCPC6(bool dhcpv6 = 0;)
|
|
struct option_set *new, **curr;
|
|
|
|
log2("attaching option %02x to list", code);
|
|
new = xmalloc(sizeof(*new));
|
|
if (!dhcpv6) {
|
|
new->data = xzalloc(length + OPT_DATA);
|
|
new->data[OPT_CODE] = code;
|
|
new->data[OPT_LEN] = length;
|
|
} else {
|
|
new->data = xzalloc(length + D6_OPT_DATA);
|
|
new->data[D6_OPT_CODE] = code >> 8;
|
|
new->data[D6_OPT_CODE + 1] = code & 0xff;
|
|
new->data[D6_OPT_LEN] = length >> 8;
|
|
new->data[D6_OPT_LEN + 1] = length & 0xff;
|
|
}
|
|
|
|
curr = opt_list;
|
|
//FIXME: DHCP6 codes > 255!!
|
|
while (*curr && (*curr)->data[OPT_CODE] < code)
|
|
curr = &(*curr)->next;
|
|
|
|
new->next = *curr;
|
|
*curr = new;
|
|
|
|
return new->data;
|
|
}
|
|
|
|
/* udhcp_str2optset:
|
|
* Parse string option representation to binary form and add it to opt_list.
|
|
* Called to parse "udhcpc -x OPTNAME:OPTVAL"
|
|
* and to parse udhcpd.conf's "opt OPTNAME OPTVAL" directives.
|
|
*/
|
|
/* helper: add an option to the opt_list */
|
|
#if !ENABLE_UDHCPC6
|
|
#define attach_option(opt_list, optflag, buffer, length, dhcpv6) \
|
|
attach_option(opt_list, optflag, buffer, length)
|
|
#endif
|
|
static NOINLINE void attach_option(
|
|
struct option_set **opt_list,
|
|
const struct dhcp_optflag *optflag,
|
|
char *buffer,
|
|
int length,
|
|
bool dhcpv6)
|
|
{
|
|
IF_NOT_UDHCPC6(bool dhcpv6 = 0;)
|
|
struct option_set *existing;
|
|
char *allocated = NULL;
|
|
|
|
if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_BIN) {
|
|
const char *end;
|
|
allocated = xstrdup(buffer); /* more than enough */
|
|
end = hex2bin(allocated, buffer, 255);
|
|
if (errno)
|
|
bb_error_msg_and_die("malformed hex string '%s'", buffer);
|
|
length = end - allocated;
|
|
buffer = allocated;
|
|
}
|
|
#if ENABLE_FEATURE_UDHCP_RFC3397
|
|
if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_DNS_STRING) {
|
|
/* reuse buffer and length for RFC1035-formatted string */
|
|
allocated = buffer = (char *)dname_enc(/*NULL, 0,*/ buffer, &length);
|
|
}
|
|
#endif
|
|
|
|
existing = udhcp_find_option(*opt_list, optflag->code, dhcpv6);
|
|
if (!existing) {
|
|
/* make a new option */
|
|
uint8_t *p = udhcp_insert_new_option(opt_list, optflag->code, length, dhcpv6);
|
|
if (!dhcpv6)
|
|
memcpy(p + OPT_DATA, buffer, length);
|
|
else
|
|
memcpy(p + D6_OPT_DATA, buffer, length);
|
|
goto ret;
|
|
}
|
|
|
|
if (optflag->flags & OPTION_LIST) {
|
|
unsigned old_len;
|
|
|
|
/* add it to an existing option */
|
|
log2("attaching option %02x to existing member of list", optflag->code);
|
|
old_len = existing->data[OPT_LEN];
|
|
if (old_len + length < 255) {
|
|
/* actually 255 is ok too, but adding a space can overlow it */
|
|
|
|
existing->data = xrealloc(existing->data, OPT_DATA + 1 + old_len + length);
|
|
// So far dhcp_optflags[] has no OPTION_STRING[_HOST] | OPTION_LIST items
|
|
#if 0
|
|
if ((optflag->flags & OPTION_TYPE_MASK) == OPTION_STRING
|
|
|| (optflag->flags & OPTION_TYPE_MASK) == OPTION_STRING_HOST
|
|
) {
|
|
/* add space separator between STRING options in a list */
|
|
existing->data[OPT_DATA + old_len] = ' ';
|
|
old_len++;
|
|
}
|
|
#endif
|
|
|
|
memcpy(existing->data + OPT_DATA + old_len, buffer, length);
|
|
existing->data[OPT_LEN] = old_len + length;
|
|
} /* else, ignore the data, we could put this in a second option in the future */
|
|
} /* else, ignore the new data */
|
|
|
|
ret:
|
|
free(allocated);
|
|
}
|
|
|
|
int FAST_FUNC udhcp_str2optset(const char *const_str, void *arg,
|
|
const struct dhcp_optflag *optflags, const char *option_strings,
|
|
bool dhcpv6)
|
|
{
|
|
struct option_set **opt_list = arg;
|
|
char *opt;
|
|
char *str;
|
|
const struct dhcp_optflag *optflag;
|
|
struct dhcp_optflag userdef_optflag;
|
|
unsigned optcode;
|
|
int retval;
|
|
/* IP_PAIR needs 8 bytes, STATIC_ROUTES needs 9 max */
|
|
char buffer[9] ALIGNED(4);
|
|
uint16_t *result_u16 = (uint16_t *) buffer;
|
|
uint32_t *result_u32 = (uint32_t *) buffer;
|
|
|
|
/* Cheat, the only *const* str possible is "" */
|
|
str = (char *) const_str;
|
|
opt = strtok_r(str, " \t=:", &str);
|
|
if (!opt)
|
|
return 0;
|
|
|
|
optcode = bb_strtou(opt, NULL, 0);
|
|
if (!errno && optcode < 255) {
|
|
/* Raw (numeric) option code.
|
|
* Initially assume binary (hex-str), but if "str" or 'str'
|
|
* is seen later, switch to STRING.
|
|
*/
|
|
userdef_optflag.flags = OPTION_BIN;
|
|
userdef_optflag.code = optcode;
|
|
optflag = &userdef_optflag;
|
|
} else {
|
|
optflag = &optflags[udhcp_option_idx(opt, option_strings)];
|
|
}
|
|
|
|
/* Loop to handle OPTION_LIST case, else execute just once */
|
|
retval = 0;
|
|
do {
|
|
int length;
|
|
char *val;
|
|
|
|
if (optflag->flags == OPTION_BIN) {
|
|
val = strtok_r(NULL, "", &str); /* do not split "'q w e'" */
|
|
if (val) trim(val);
|
|
} else
|
|
val = strtok_r(NULL, ", \t", &str);
|
|
if (!val)
|
|
break;
|
|
|
|
length = dhcp_option_lengths[optflag->flags & OPTION_TYPE_MASK];
|
|
retval = 0;
|
|
opt = buffer; /* new meaning for variable opt */
|
|
|
|
switch (optflag->flags & OPTION_TYPE_MASK) {
|
|
case OPTION_IP:
|
|
retval = udhcp_str2nip(val, buffer);
|
|
break;
|
|
case OPTION_IP_PAIR:
|
|
retval = udhcp_str2nip(val, buffer);
|
|
val = strtok_r(NULL, ", \t/-", &str);
|
|
if (!val)
|
|
retval = 0;
|
|
if (retval)
|
|
retval = udhcp_str2nip(val, buffer + 4);
|
|
break;
|
|
case_OPTION_STRING:
|
|
case OPTION_STRING:
|
|
case OPTION_STRING_HOST:
|
|
#if ENABLE_FEATURE_UDHCP_RFC3397
|
|
case OPTION_DNS_STRING:
|
|
#endif
|
|
length = strnlen(val, 254);
|
|
if (length > 0) {
|
|
opt = val;
|
|
retval = 1;
|
|
}
|
|
break;
|
|
// case OPTION_BOOLEAN: {
|
|
// static const char no_yes[] ALIGN1 = "no\0yes\0";
|
|
// buffer[0] = retval = index_in_strings(no_yes, val);
|
|
// retval++; /* 0 - bad; 1: "no" 2: "yes" */
|
|
// break;
|
|
// }
|
|
case OPTION_U8:
|
|
buffer[0] = bb_strtou32(val, NULL, 0);
|
|
retval = (errno == 0);
|
|
break;
|
|
/* htonX are macros in older libc's, using temp var
|
|
* in code below for safety */
|
|
/* TODO: use bb_strtoX? */
|
|
case OPTION_U16: {
|
|
uint32_t tmp = bb_strtou32(val, NULL, 0);
|
|
*result_u16 = htons(tmp);
|
|
retval = (errno == 0 /*&& tmp < 0x10000*/);
|
|
break;
|
|
}
|
|
// case OPTION_S16: {
|
|
// long tmp = bb_strtoi32(val, NULL, 0);
|
|
// *result_u16 = htons(tmp);
|
|
// retval = (errno == 0);
|
|
// break;
|
|
// }
|
|
case OPTION_U32: {
|
|
uint32_t tmp = bb_strtou32(val, NULL, 0);
|
|
*result_u32 = htonl(tmp);
|
|
retval = (errno == 0);
|
|
break;
|
|
}
|
|
case OPTION_S32: {
|
|
int32_t tmp = bb_strtoi32(val, NULL, 0);
|
|
*result_u32 = htonl(tmp);
|
|
retval = (errno == 0);
|
|
break;
|
|
}
|
|
case OPTION_STATIC_ROUTES: {
|
|
/* Input: "a.b.c.d/m" */
|
|
/* Output: mask(1 byte),pfx(0-4 bytes),gw(4 bytes) */
|
|
unsigned mask;
|
|
char *slash = strchr(val, '/');
|
|
if (slash) {
|
|
*slash = '\0';
|
|
retval = udhcp_str2nip(val, buffer + 1);
|
|
buffer[0] = mask = bb_strtou(slash + 1, NULL, 10);
|
|
val = strtok_r(NULL, ", \t/-", &str);
|
|
if (!val || mask > 32 || errno)
|
|
retval = 0;
|
|
if (retval) {
|
|
length = ((mask + 7) >> 3) + 5;
|
|
retval = udhcp_str2nip(val, buffer + (length - 4));
|
|
}
|
|
}
|
|
break;
|
|
}
|
|
case OPTION_BIN:
|
|
/* Raw (numeric) option code. Is it a string? */
|
|
if (val[0] == '"' || val[0] == '\'') {
|
|
char delim = val[0];
|
|
char *end = last_char_is(val + 1, delim);
|
|
if (end) {
|
|
*end = '\0';
|
|
val++;
|
|
userdef_optflag.flags = OPTION_STRING;
|
|
goto case_OPTION_STRING;
|
|
}
|
|
}
|
|
/* No: hex-str option, handled in attach_option() */
|
|
opt = val;
|
|
retval = 1;
|
|
break;
|
|
default:
|
|
break;
|
|
}
|
|
|
|
if (retval)
|
|
attach_option(opt_list, optflag, opt, length, dhcpv6);
|
|
} while (retval && (optflag->flags & OPTION_LIST));
|
|
|
|
return retval;
|
|
}
|
|
|
|
/* note: ip is a pointer to an IPv6 in network order, possibly misaliged */
|
|
int FAST_FUNC sprint_nip6(char *dest, /*const char *pre,*/ const uint8_t *ip)
|
|
{
|
|
char hexstrbuf[16 * 2];
|
|
bin2hex(hexstrbuf, (void*)ip, 16);
|
|
return sprintf(dest, /* "%s" */
|
|
"%.4s:%.4s:%.4s:%.4s:%.4s:%.4s:%.4s:%.4s",
|
|
/* pre, */
|
|
hexstrbuf + 0 * 4,
|
|
hexstrbuf + 1 * 4,
|
|
hexstrbuf + 2 * 4,
|
|
hexstrbuf + 3 * 4,
|
|
hexstrbuf + 4 * 4,
|
|
hexstrbuf + 5 * 4,
|
|
hexstrbuf + 6 * 4,
|
|
hexstrbuf + 7 * 4
|
|
);
|
|
}
|