diff options
Diffstat (limited to 'networking/udhcp/packet.c')
-rw-r--r-- | networking/udhcp/packet.c | 73 |
1 files changed, 41 insertions, 32 deletions
diff --git a/networking/udhcp/packet.c b/networking/udhcp/packet.c index 22c18deaf..443fea6dd 100644 --- a/networking/udhcp/packet.c +++ b/networking/udhcp/packet.c | |||
@@ -41,20 +41,14 @@ void udhcp_init_header(struct dhcpMessage *packet, char type) | |||
41 | /* read a packet from socket fd, return -1 on read error, -2 on packet error */ | 41 | /* read a packet from socket fd, return -1 on read error, -2 on packet error */ |
42 | int udhcp_recv_packet(struct dhcpMessage *packet, int fd) | 42 | int udhcp_recv_packet(struct dhcpMessage *packet, int fd) |
43 | { | 43 | { |
44 | #if 0 | ||
45 | static const char broken_vendors[][8] = { | ||
46 | "MSFT 98", | ||
47 | "" | ||
48 | }; | ||
49 | #endif | ||
50 | int bytes; | 44 | int bytes; |
51 | unsigned char *vendor; | 45 | unsigned char *vendor; |
52 | 46 | ||
53 | memset(packet, 0, sizeof(*packet)); | 47 | memset(packet, 0, sizeof(*packet)); |
54 | bytes = read(fd, packet, sizeof(*packet)); | 48 | bytes = safe_read(fd, packet, sizeof(*packet)); |
55 | if (bytes < 0) { | 49 | if (bytes < 0) { |
56 | DEBUG("cannot read on listening socket, ignoring"); | 50 | DEBUG("cannot read on listening socket, ignoring"); |
57 | return -1; | 51 | return bytes; /* returns -1 */ |
58 | } | 52 | } |
59 | 53 | ||
60 | if (packet->cookie != htonl(DHCP_MAGIC)) { | 54 | if (packet->cookie != htonl(DHCP_MAGIC)) { |
@@ -67,6 +61,10 @@ int udhcp_recv_packet(struct dhcpMessage *packet, int fd) | |||
67 | vendor = get_option(packet, DHCP_VENDOR); | 61 | vendor = get_option(packet, DHCP_VENDOR); |
68 | if (vendor) { | 62 | if (vendor) { |
69 | #if 0 | 63 | #if 0 |
64 | static const char broken_vendors[][8] = { | ||
65 | "MSFT 98", | ||
66 | "" | ||
67 | }; | ||
70 | int i; | 68 | int i; |
71 | for (i = 0; broken_vendors[i][0]; i++) { | 69 | for (i = 0; broken_vendors[i][0]; i++) { |
72 | if (vendor[OPT_LEN - 2] == (uint8_t)strlen(broken_vendors[i]) | 70 | if (vendor[OPT_LEN - 2] == (uint8_t)strlen(broken_vendors[i]) |
@@ -127,10 +125,11 @@ int udhcp_send_raw_packet(struct dhcpMessage *payload, | |||
127 | uint32_t source_ip, int source_port, | 125 | uint32_t source_ip, int source_port, |
128 | uint32_t dest_ip, int dest_port, const uint8_t *dest_arp, int ifindex) | 126 | uint32_t dest_ip, int dest_port, const uint8_t *dest_arp, int ifindex) |
129 | { | 127 | { |
130 | int fd; | ||
131 | int result; | ||
132 | struct sockaddr_ll dest; | 128 | struct sockaddr_ll dest; |
133 | struct udp_dhcp_packet packet; | 129 | struct udp_dhcp_packet packet; |
130 | int fd; | ||
131 | int result = -1; | ||
132 | const char *msg; | ||
134 | 133 | ||
135 | enum { | 134 | enum { |
136 | IP_UPD_DHCP_SIZE = sizeof(struct udp_dhcp_packet) - CONFIG_UDHCPC_SLACK_FOR_BUGGY_SERVERS, | 135 | IP_UPD_DHCP_SIZE = sizeof(struct udp_dhcp_packet) - CONFIG_UDHCPC_SLACK_FOR_BUGGY_SERVERS, |
@@ -139,8 +138,8 @@ int udhcp_send_raw_packet(struct dhcpMessage *payload, | |||
139 | 138 | ||
140 | fd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP)); | 139 | fd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP)); |
141 | if (fd < 0) { | 140 | if (fd < 0) { |
142 | bb_perror_msg("socket"); | 141 | msg = "socket(%s)"; |
143 | return -1; | 142 | goto ret_msg; |
144 | } | 143 | } |
145 | 144 | ||
146 | memset(&dest, 0, sizeof(dest)); | 145 | memset(&dest, 0, sizeof(dest)); |
@@ -152,10 +151,9 @@ int udhcp_send_raw_packet(struct dhcpMessage *payload, | |||
152 | dest.sll_ifindex = ifindex; | 151 | dest.sll_ifindex = ifindex; |
153 | dest.sll_halen = 6; | 152 | dest.sll_halen = 6; |
154 | memcpy(dest.sll_addr, dest_arp, 6); | 153 | memcpy(dest.sll_addr, dest_arp, 6); |
155 | if (bind(fd, (struct sockaddr *)&dest, sizeof(struct sockaddr_ll)) < 0) { | 154 | if (bind(fd, (struct sockaddr *)&dest, sizeof(dest)) < 0) { |
156 | bb_perror_msg("bind"); | 155 | msg = "bind(%s)"; |
157 | close(fd); | 156 | goto ret_close; |
158 | return -1; | ||
159 | } | 157 | } |
160 | 158 | ||
161 | packet.ip.protocol = IPPROTO_UDP; | 159 | packet.ip.protocol = IPPROTO_UDP; |
@@ -179,11 +177,15 @@ int udhcp_send_raw_packet(struct dhcpMessage *payload, | |||
179 | * If you need to change this: last byte of the packet is | 177 | * If you need to change this: last byte of the packet is |
180 | * packet.data.options[end_option(packet.data.options)] | 178 | * packet.data.options[end_option(packet.data.options)] |
181 | */ | 179 | */ |
182 | result = sendto(fd, &packet, IP_UPD_DHCP_SIZE, 0, (struct sockaddr *) &dest, sizeof(dest)); | 180 | result = sendto(fd, &packet, IP_UPD_DHCP_SIZE, 0, |
183 | if (result <= 0) { | 181 | (struct sockaddr *) &dest, sizeof(dest)); |
184 | bb_perror_msg("sendto"); | 182 | msg = "sendto"; |
185 | } | 183 | ret_close: |
186 | close(fd); | 184 | close(fd); |
185 | if (result < 0) { | ||
186 | ret_msg: | ||
187 | bb_perror_msg(msg, "PACKET"); | ||
188 | } | ||
187 | return result; | 189 | return result; |
188 | } | 190 | } |
189 | 191 | ||
@@ -193,41 +195,48 @@ int udhcp_send_kernel_packet(struct dhcpMessage *payload, | |||
193 | uint32_t source_ip, int source_port, | 195 | uint32_t source_ip, int source_port, |
194 | uint32_t dest_ip, int dest_port) | 196 | uint32_t dest_ip, int dest_port) |
195 | { | 197 | { |
196 | int fd, result; | ||
197 | struct sockaddr_in client; | 198 | struct sockaddr_in client; |
199 | int fd; | ||
200 | int result = -1; | ||
201 | const char *msg; | ||
198 | 202 | ||
199 | enum { | 203 | enum { |
200 | DHCP_SIZE = sizeof(struct dhcpMessage) - CONFIG_UDHCPC_SLACK_FOR_BUGGY_SERVERS, | 204 | DHCP_SIZE = sizeof(struct dhcpMessage) - CONFIG_UDHCPC_SLACK_FOR_BUGGY_SERVERS, |
201 | }; | 205 | }; |
202 | 206 | ||
203 | fd = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP); | 207 | fd = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP); |
204 | if (fd < 0) | 208 | if (fd < 0) { |
205 | return -1; | 209 | msg = "socket(%s)"; |
206 | 210 | goto ret_msg; | |
211 | } | ||
207 | setsockopt_reuseaddr(fd); | 212 | setsockopt_reuseaddr(fd); |
208 | 213 | ||
209 | memset(&client, 0, sizeof(client)); | 214 | memset(&client, 0, sizeof(client)); |
210 | client.sin_family = AF_INET; | 215 | client.sin_family = AF_INET; |
211 | client.sin_port = htons(source_port); | 216 | client.sin_port = htons(source_port); |
212 | client.sin_addr.s_addr = source_ip; | 217 | client.sin_addr.s_addr = source_ip; |
213 | |||
214 | if (bind(fd, (struct sockaddr *)&client, sizeof(client)) == -1) { | 218 | if (bind(fd, (struct sockaddr *)&client, sizeof(client)) == -1) { |
215 | close(fd); | 219 | msg = "bind(%s)"; |
216 | return -1; | 220 | goto ret_close; |
217 | } | 221 | } |
218 | 222 | ||
219 | memset(&client, 0, sizeof(client)); | 223 | memset(&client, 0, sizeof(client)); |
220 | client.sin_family = AF_INET; | 224 | client.sin_family = AF_INET; |
221 | client.sin_port = htons(dest_port); | 225 | client.sin_port = htons(dest_port); |
222 | client.sin_addr.s_addr = dest_ip; | 226 | client.sin_addr.s_addr = dest_ip; |
223 | 227 | if (connect(fd, (struct sockaddr *)&client, sizeof(client)) == -1) { | |
224 | if (connect(fd, (struct sockaddr *)&client, sizeof(struct sockaddr)) == -1) { | 228 | msg = "connect"; |
225 | close(fd); | 229 | goto ret_close; |
226 | return -1; | ||
227 | } | 230 | } |
228 | 231 | ||
229 | /* Currently we send full-sized DHCP packets (see above) */ | 232 | /* Currently we send full-sized DHCP packets (see above) */ |
230 | result = write(fd, payload, DHCP_SIZE); | 233 | result = safe_write(fd, payload, DHCP_SIZE); |
234 | msg = "write"; | ||
235 | ret_close: | ||
231 | close(fd); | 236 | close(fd); |
237 | if (result < 0) { | ||
238 | ret_msg: | ||
239 | bb_perror_msg(msg, "UDP"); | ||
240 | } | ||
232 | return result; | 241 | return result; |
233 | } | 242 | } |