1/*	$KAME: config.c,v 1.84 2003/08/05 12:34:23 itojun Exp $	*/
2
3/*-
4 * SPDX-License-Identifier: BSD-3-Clause
5 *
6 * Copyright (C) 1998 WIDE Project.
7 * Copyright (C) 2011 Hiroki Sato <hrs@FreeBSD.org>
8 * All rights reserved.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 *    notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 *    notice, this list of conditions and the following disclaimer in the
17 *    documentation and/or other materials provided with the distribution.
18 * 3. Neither the name of the project nor the names of its contributors
19 *    may be used to endorse or promote products derived from this software
20 *    without specific prior written permission.
21 *
22 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
23 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
24 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25 * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
27 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
28 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
29 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
30 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
31 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 * SUCH DAMAGE.
33 */
34
35#include <sys/param.h>
36#include <sys/ioctl.h>
37#include <sys/socket.h>
38
39#include <net/if.h>
40#include <net/route.h>
41#include <net/if_dl.h>
42
43#include <netinet/in.h>
44#include <netinet/in_var.h>
45#include <netinet/ip6.h>
46#include <netinet6/ip6_var.h>
47#include <netinet/icmp6.h>
48#include <netinet6/nd6.h>
49
50#include <arpa/inet.h>
51
52#include <stdio.h>
53#include <syslog.h>
54#include <errno.h>
55#include <inttypes.h>
56#include <netdb.h>
57#include <string.h>
58#include <search.h>
59#include <stdlib.h>
60#include <time.h>
61#include <unistd.h>
62#include <ifaddrs.h>
63
64#include "rtadvd.h"
65#include "advcap.h"
66#include "timer.h"
67#include "if.h"
68#include "config.h"
69
70/* label of tcapcode + number + domain name + zero octet */
71static char entbuf[10 + 3 + NI_MAXHOST + 1];
72static char oentbuf[10 + 3 + NI_MAXHOST + 1];
73static char abuf[DNAME_LABELENC_MAXLEN];
74
75static time_t prefix_timo = (60 * 120);	/* 2 hours.
76					 * XXX: should be configurable. */
77
78static struct rtadvd_timer *prefix_timeout(void *);
79static void makeentry(char *, size_t, int, const char *);
80static ssize_t dname_labelenc(char *, const char *);
81
82/* Encode domain name label encoding in RFC 1035 Section 3.1 */
83static ssize_t
84dname_labelenc(char *dst, const char *src)
85{
86	char *dst_origin;
87	char *p;
88	size_t len;
89
90	dst_origin = dst;
91	len = strlen(src);
92
93	if (len + len / 64 + 1 + 1 > DNAME_LABELENC_MAXLEN)
94		return (-1);
95	/* Length fields per 63 octets + '\0' (<= DNAME_LABELENC_MAXLEN) */
96	memset(dst, 0, len + len / 64 + 1 + 1);
97
98	syslog(LOG_DEBUG, "<%s> labelenc = %s", __func__, src);
99	while (src && (len = strlen(src)) != 0) {
100		/* Put a length field with 63 octet limitation first. */
101		p = strchr(src, '.');
102		if (p == NULL)
103			*dst = len = MIN(63, len);
104		else
105			*dst = len = MIN(63, p - src);
106		if (dst + 1 + len < dst_origin + DNAME_LABELENC_MAXLEN)
107			dst++;
108		else
109			return (-1);
110		/* Copy 63 octets at most. */
111		memcpy(dst, src, len);
112		dst += len;
113		if (p == NULL) /* the last label */
114			break;
115		src = p + 1;
116	}
117	/* Always need a 0-length label at the tail. */
118	*dst++ = '\0';
119
120	syslog(LOG_DEBUG, "<%s> labellen = %td", __func__, dst - dst_origin);
121	return (dst - dst_origin);
122}
123
124#define	MUSTHAVE(var, cap)						\
125    do {								\
126	int64_t t;							\
127	if ((t = agetnum(cap)) < 0) {					\
128		fprintf(stderr, "rtadvd: need %s for interface %s\n",	\
129			cap, intface);					\
130		exit(1);						\
131	}								\
132	var = t;							\
133     } while (0)
134
135#define	MAYHAVE(var, cap, def)						\
136     do {								\
137	if ((var = agetnum(cap)) < 0)					\
138		var = def;						\
139     } while (0)
140
141int
142loadconfig_index(int idx)
143{
144	char ifname[IFNAMSIZ];
145
146	syslog(LOG_DEBUG, "<%s> enter", __func__);
147
148	if (if_indextoname(idx, ifname) != NULL)
149		return (loadconfig_ifname(ifname));
150	else
151		return (1);
152}
153
154int
155loadconfig_ifname(char *ifname)
156{
157	struct ifinfo *ifi;
158
159	syslog(LOG_DEBUG, "<%s> enter", __func__);
160
161	update_ifinfo(&ifilist, UPDATE_IFINFO_ALL);
162	TAILQ_FOREACH(ifi, &ifilist, ifi_next) {
163		/* NULL means all IFs will be processed. */
164		if (ifname != NULL &&
165		    strcmp(ifi->ifi_ifname, ifname) != 0)
166			continue;
167
168		if (!ifi->ifi_persist) {
169			syslog(LOG_INFO,
170			    "<%s> %s is not a target interface.  "
171			    "Ignored at this moment.", __func__,
172			    ifi->ifi_ifname);
173			continue;
174
175		}
176		if (ifi->ifi_ifindex == 0) {
177			syslog(LOG_ERR,
178			    "<%s> %s not found.  "
179			    "Ignored at this moment.", __func__,
180			    ifi->ifi_ifname);
181			continue;
182		}
183		if (getconfig(ifi) == NULL) {
184			syslog(LOG_ERR,
185			    "<%s> invalid configuration for %s.  "
186			    "Ignored at this moment.", __func__,
187			    ifi->ifi_ifname);
188			continue;
189		}
190	}
191	return (0);
192}
193
194int
195rm_ifinfo_index(int idx)
196{
197	struct ifinfo *ifi;
198
199	ifi = if_indextoifinfo(idx);
200	if (ifi == NULL) {
201		syslog(LOG_ERR, "<%s>: ifinfo not found (idx=%d)",
202		    __func__, idx);
203		return (-1);
204	}
205
206	return (rm_ifinfo(ifi));
207}
208
209int
210rm_ifinfo(struct ifinfo *ifi)
211{
212	int error;
213
214	syslog(LOG_DEBUG, "<%s> enter (%s).", __func__, ifi->ifi_ifname);
215	switch (ifi->ifi_state) {
216	case IFI_STATE_UNCONFIGURED:
217		return (0);
218		break;
219	default:
220		ifi->ifi_state = IFI_STATE_UNCONFIGURED;
221		syslog(LOG_DEBUG,
222		    "<%s> ifname=%s marked as UNCONFIGURED.",
223		    __func__, ifi->ifi_ifname);
224
225		/* XXX: No MC leaving here because index is disappeared */
226
227		/* Inactivate timer */
228		rtadvd_remove_timer(ifi->ifi_ra_timer);
229		ifi->ifi_ra_timer = NULL;
230		break;
231	}
232
233	/* clean up ifi */
234	if (!ifi->ifi_persist) {
235		TAILQ_REMOVE(&ifilist, ifi, ifi_next);
236		syslog(LOG_DEBUG, "<%s>: ifinfo (idx=%d) removed.",
237		    __func__, ifi->ifi_ifindex);
238	} else {
239		/* recreate an empty entry */
240		update_persist_ifinfo(&ifilist, ifi->ifi_ifname);
241		syslog(LOG_DEBUG, "<%s>: ifname=%s is persistent.",
242		    __func__, ifi->ifi_ifname);
243	}
244
245	/* clean up rai if any */
246	switch (ifi->ifi_state) {
247	case IFI_STATE_CONFIGURED:
248		if (ifi->ifi_rainfo != NULL) {
249			error = rm_rainfo(ifi->ifi_rainfo);
250			if (error)
251				return (error);
252			ifi->ifi_rainfo = NULL;
253		}
254		break;
255	case IFI_STATE_TRANSITIVE:
256		if (ifi->ifi_rainfo == ifi->ifi_rainfo_trans) {
257			if (ifi->ifi_rainfo != NULL) {
258				error = rm_rainfo(ifi->ifi_rainfo);
259				if (error)
260					return (error);
261				ifi->ifi_rainfo = NULL;
262				ifi->ifi_rainfo_trans = NULL;
263			}
264		} else {
265			if (ifi->ifi_rainfo != NULL) {
266				error = rm_rainfo(ifi->ifi_rainfo);
267				if (error)
268					return (error);
269				ifi->ifi_rainfo = NULL;
270			}
271			if (ifi->ifi_rainfo_trans != NULL) {
272				error = rm_rainfo(ifi->ifi_rainfo_trans);
273				if (error)
274					return (error);
275				ifi->ifi_rainfo_trans = NULL;
276			}
277		}
278	}
279
280	syslog(LOG_DEBUG, "<%s> leave (%s).", __func__, ifi->ifi_ifname);
281	if (!ifi->ifi_persist)
282		free(ifi);
283	return (0);
284}
285
286int
287rm_rainfo(struct rainfo *rai)
288{
289	struct prefix *pfx;
290	struct soliciter *sol;
291	struct rdnss *rdn;
292	struct rdnss_addr *rdna;
293	struct dnssl *dns;
294	struct rtinfo *rti;
295
296	syslog(LOG_DEBUG, "<%s>: enter",  __func__);
297
298	TAILQ_REMOVE(&railist, rai, rai_next);
299	if (rai->rai_ifinfo != NULL)
300		syslog(LOG_DEBUG, "<%s>: rainfo (idx=%d) removed.",
301		    __func__, rai->rai_ifinfo->ifi_ifindex);
302
303	if (rai->rai_ra_data != NULL)
304		free(rai->rai_ra_data);
305
306	while ((pfx = TAILQ_FIRST(&rai->rai_prefix)) != NULL)
307		delete_prefix(pfx);
308	while ((sol = TAILQ_FIRST(&rai->rai_soliciter)) != NULL) {
309		TAILQ_REMOVE(&rai->rai_soliciter, sol, sol_next);
310		free(sol);
311	}
312	while ((rdn = TAILQ_FIRST(&rai->rai_rdnss)) != NULL) {
313		TAILQ_REMOVE(&rai->rai_rdnss, rdn, rd_next);
314		while ((rdna = TAILQ_FIRST(&rdn->rd_list)) != NULL) {
315			TAILQ_REMOVE(&rdn->rd_list, rdna, ra_next);
316			free(rdna);
317		}
318		free(rdn);
319	}
320	while ((dns = TAILQ_FIRST(&rai->rai_dnssl)) != NULL) {
321		TAILQ_REMOVE(&rai->rai_dnssl, dns, dn_next);
322		free(dns);
323	}
324	while ((rti = TAILQ_FIRST(&rai->rai_route)) != NULL) {
325		TAILQ_REMOVE(&rai->rai_route, rti, rti_next);
326		free(rti);
327	}
328	free(rai);
329	syslog(LOG_DEBUG, "<%s>: leave",  __func__);
330
331	return (0);
332}
333
334struct ifinfo *
335getconfig(struct ifinfo *ifi)
336{
337	int stat, i;
338	int error;
339	char tbuf[BUFSIZ];
340	struct rainfo *rai;
341	struct rainfo *rai_old;
342	int32_t val;
343	int64_t val64;
344	char buf[BUFSIZ];
345	char *bp = buf;
346	char *addr, *flagstr;
347
348	if (ifi == NULL)	/* if does not exist */
349		return (NULL);
350
351	if (ifi->ifi_state == IFI_STATE_TRANSITIVE &&
352	    ifi->ifi_rainfo == NULL) {
353		syslog(LOG_INFO, "<%s> %s is shutting down.  Skipped.",
354		    __func__, ifi->ifi_ifname);
355		return (NULL);
356	}
357
358	if ((stat = agetent(tbuf, ifi->ifi_ifname)) <= 0) {
359		memset(tbuf, 0, sizeof(tbuf));
360		syslog(LOG_INFO,
361		    "<%s> %s isn't defined in the configuration file"
362		    " or the configuration file doesn't exist."
363		    " Treat it as default",
364		     __func__, ifi->ifi_ifname);
365	}
366
367	ELM_MALLOC(rai, exit(1));
368	TAILQ_INIT(&rai->rai_prefix);
369	TAILQ_INIT(&rai->rai_route);
370	TAILQ_INIT(&rai->rai_rdnss);
371	TAILQ_INIT(&rai->rai_dnssl);
372	TAILQ_INIT(&rai->rai_soliciter);
373	rai->rai_ifinfo = ifi;
374
375	/* gather on-link prefixes from the network interfaces. */
376	if (agetflag("noifprefix"))
377		rai->rai_advifprefix = 0;
378	else
379		rai->rai_advifprefix = 1;
380
381	/* get interface information */
382	if (agetflag("nolladdr"))
383		rai->rai_advlinkopt = 0;
384	else
385		rai->rai_advlinkopt = 1;
386	if (rai->rai_advlinkopt) {
387		if (ifi->ifi_sdl.sdl_type == 0) {
388			syslog(LOG_ERR,
389			    "<%s> can't get information of %s",
390			    __func__, ifi->ifi_ifname);
391			goto getconfig_free_rai;
392		}
393	}
394
395	/*
396	 * set router configuration variables.
397	 */
398	MAYHAVE(val, "maxinterval", DEF_MAXRTRADVINTERVAL);
399	if (val < MIN_MAXINTERVAL || val > MAX_MAXINTERVAL) {
400		syslog(LOG_ERR,
401		    "<%s> maxinterval (%" PRIu32 ") on %s is invalid "
402		    "(must be between %u and %u)", __func__, val,
403		    ifi->ifi_ifname, MIN_MAXINTERVAL, MAX_MAXINTERVAL);
404		goto getconfig_free_rai;
405	}
406	rai->rai_maxinterval = (uint16_t)val;
407
408	MAYHAVE(val, "mininterval", rai->rai_maxinterval/3);
409	if ((uint16_t)val < MIN_MININTERVAL ||
410	    (uint16_t)val > (rai->rai_maxinterval * 3) / 4) {
411		syslog(LOG_ERR,
412		    "<%s> mininterval (%" PRIu32 ") on %s is invalid "
413		    "(must be between %d and %d)",
414		    __func__, val, ifi->ifi_ifname, MIN_MININTERVAL,
415		    (rai->rai_maxinterval * 3) / 4);
416		goto getconfig_free_rai;
417	}
418	rai->rai_mininterval = (uint16_t)val;
419
420	MAYHAVE(val, "chlim", DEF_ADVCURHOPLIMIT);
421	rai->rai_hoplimit = val & 0xff;
422
423	if ((flagstr = (char *)agetstr("raflags", &bp))) {
424		val = 0;
425		if (strchr(flagstr, 'm'))
426			val |= ND_RA_FLAG_MANAGED;
427		if (strchr(flagstr, 'o'))
428			val |= ND_RA_FLAG_OTHER;
429		if (strchr(flagstr, 'h'))
430			val |= ND_RA_FLAG_RTPREF_HIGH;
431		if (strchr(flagstr, 'l')) {
432			if ((val & ND_RA_FLAG_RTPREF_HIGH)) {
433				syslog(LOG_ERR, "<%s> the \'h\' and \'l\'"
434				    " router flags are exclusive", __func__);
435				goto getconfig_free_rai;
436			}
437			val |= ND_RA_FLAG_RTPREF_LOW;
438		}
439#ifdef DRAFT_IETF_6MAN_IPV6ONLY_FLAG
440		if (strchr(flagstr, 'S'))
441			val |= ND_RA_FLAG_IPV6_ONLY;
442#endif
443	} else
444		MAYHAVE(val, "raflags", 0);
445
446	rai->rai_managedflg = val & ND_RA_FLAG_MANAGED;
447	rai->rai_otherflg = val & ND_RA_FLAG_OTHER;
448#ifndef ND_RA_FLAG_RTPREF_MASK
449#define ND_RA_FLAG_RTPREF_MASK	0x18 /* 00011000 */
450#define ND_RA_FLAG_RTPREF_RSV	0x10 /* 00010000 */
451#endif
452	rai->rai_rtpref = val & ND_RA_FLAG_RTPREF_MASK;
453	if (rai->rai_rtpref == ND_RA_FLAG_RTPREF_RSV) {
454		syslog(LOG_ERR, "<%s> invalid router preference (%02x) on %s",
455		    __func__, rai->rai_rtpref, ifi->ifi_ifname);
456		goto getconfig_free_rai;
457	}
458#ifdef DRAFT_IETF_6MAN_IPV6ONLY_FLAG
459	rai->rai_ipv6onlyflg = val & ND_RA_FLAG_IPV6_ONLY;
460#endif
461
462	MAYHAVE(val, "rltime", rai->rai_maxinterval * 3);
463	if ((uint16_t)val && ((uint16_t)val < rai->rai_maxinterval ||
464	    (uint16_t)val > MAXROUTERLIFETIME)) {
465		syslog(LOG_ERR,
466		    "<%s> router lifetime (%" PRIu32 ") on %s is invalid "
467		    "(must be 0 or between %d and %d)",
468		    __func__, val, ifi->ifi_ifname, rai->rai_maxinterval,
469		    MAXROUTERLIFETIME);
470		goto getconfig_free_rai;
471	}
472	rai->rai_lifetime = val & 0xffff;
473
474	MAYHAVE(val, "rtime", DEF_ADVREACHABLETIME);
475	if (val < 0 || val > MAXREACHABLETIME) {
476		syslog(LOG_ERR,
477		    "<%s> reachable time (%" PRIu32 ") on %s is invalid "
478		    "(must be no greater than %d)",
479		    __func__, val, ifi->ifi_ifname, MAXREACHABLETIME);
480		goto getconfig_free_rai;
481	}
482	rai->rai_reachabletime = (uint32_t)val;
483
484	MAYHAVE(val64, "retrans", DEF_ADVRETRANSTIMER);
485	if (val64 < 0 || val64 > 0xffffffff) {
486		syslog(LOG_ERR, "<%s> retrans time (%" PRIu64 ") on %s out of range",
487		    __func__, val64, ifi->ifi_ifname);
488		goto getconfig_free_rai;
489	}
490	rai->rai_retranstimer = (uint32_t)val64;
491
492	if (agetnum("hapref") != -1 || agetnum("hatime") != -1) {
493		syslog(LOG_ERR,
494		    "<%s> mobile-ip6 configuration not supported",
495		    __func__);
496		goto getconfig_free_rai;
497	}
498	/* prefix information */
499
500	/*
501	 * This is an implementation specific parameter to consider
502	 * link propagation delays and poorly synchronized clocks when
503	 * checking consistency of advertised lifetimes.
504	 */
505	MAYHAVE(val, "clockskew", 0);
506	rai->rai_clockskew = val;
507
508	rai->rai_pfxs = 0;
509	for (i = -1; i < MAXPREFIX; i++) {
510		struct prefix *pfx;
511
512		makeentry(entbuf, sizeof(entbuf), i, "addr");
513		addr = (char *)agetstr(entbuf, &bp);
514		if (addr == NULL)
515			continue;
516
517		/* allocate memory to store prefix information */
518		ELM_MALLOC(pfx, exit(1));
519		pfx->pfx_rainfo = rai;
520		pfx->pfx_origin = PREFIX_FROM_CONFIG;
521
522		if (inet_pton(AF_INET6, addr, &pfx->pfx_prefix) != 1) {
523			syslog(LOG_ERR,
524			    "<%s> inet_pton failed for %s",
525			    __func__, addr);
526			goto getconfig_free_pfx;
527		}
528		if (IN6_IS_ADDR_MULTICAST(&pfx->pfx_prefix)) {
529			syslog(LOG_ERR,
530			    "<%s> multicast prefix (%s) must "
531			    "not be advertised on %s",
532			    __func__, addr, ifi->ifi_ifname);
533			goto getconfig_free_pfx;
534		}
535		if (IN6_IS_ADDR_LINKLOCAL(&pfx->pfx_prefix))
536			syslog(LOG_NOTICE,
537			    "<%s> link-local prefix (%s) will be"
538			    " advertised on %s",
539			    __func__, addr, ifi->ifi_ifname);
540
541		makeentry(entbuf, sizeof(entbuf), i, "prefixlen");
542		MAYHAVE(val, entbuf, 64);
543		if (val < 0 || val > 128) {
544			syslog(LOG_ERR, "<%s> prefixlen (%" PRIu32 ") for %s "
545			    "on %s out of range",
546			    __func__, val, addr, ifi->ifi_ifname);
547			goto getconfig_free_pfx;
548		}
549		pfx->pfx_prefixlen = (int)val;
550
551		makeentry(entbuf, sizeof(entbuf), i, "pinfoflags");
552		if ((flagstr = (char *)agetstr(entbuf, &bp))) {
553			val = 0;
554			if (strchr(flagstr, 'l'))
555				val |= ND_OPT_PI_FLAG_ONLINK;
556			if (strchr(flagstr, 'a'))
557				val |= ND_OPT_PI_FLAG_AUTO;
558		} else {
559			MAYHAVE(val, entbuf,
560			    (ND_OPT_PI_FLAG_ONLINK|ND_OPT_PI_FLAG_AUTO));
561		}
562		pfx->pfx_onlinkflg = val & ND_OPT_PI_FLAG_ONLINK;
563		pfx->pfx_autoconfflg = val & ND_OPT_PI_FLAG_AUTO;
564
565		makeentry(entbuf, sizeof(entbuf), i, "vltime");
566		MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME);
567		if (val64 < 0 || val64 > 0xffffffff) {
568			syslog(LOG_ERR, "<%s> vltime (%" PRIu64 ") for "
569			    "%s/%d on %s is out of range",
570			    __func__, val64,
571			    addr, pfx->pfx_prefixlen, ifi->ifi_ifname);
572			goto getconfig_free_pfx;
573		}
574		pfx->pfx_validlifetime = (uint32_t)val64;
575
576		makeentry(entbuf, sizeof(entbuf), i, "vltimedecr");
577		if (agetflag(entbuf)) {
578			struct timespec now;
579
580			clock_gettime(CLOCK_MONOTONIC_FAST, &now);
581			pfx->pfx_vltimeexpire =
582				now.tv_sec + pfx->pfx_validlifetime;
583		}
584
585		makeentry(entbuf, sizeof(entbuf), i, "pltime");
586		MAYHAVE(val64, entbuf, DEF_ADVPREFERREDLIFETIME);
587		if (val64 < 0 || val64 > 0xffffffff) {
588			syslog(LOG_ERR,
589			    "<%s> pltime (%" PRIu64 ") for %s/%d on %s "
590			    "is out of range",
591			    __func__, val64,
592			    addr, pfx->pfx_prefixlen, ifi->ifi_ifname);
593			goto getconfig_free_pfx;
594		}
595		pfx->pfx_preflifetime = (uint32_t)val64;
596
597		makeentry(entbuf, sizeof(entbuf), i, "pltimedecr");
598		if (agetflag(entbuf)) {
599			struct timespec now;
600
601			clock_gettime(CLOCK_MONOTONIC_FAST, &now);
602			pfx->pfx_pltimeexpire =
603			    now.tv_sec + pfx->pfx_preflifetime;
604		}
605		/* link into chain */
606		TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next);
607		rai->rai_pfxs++;
608		continue;
609getconfig_free_pfx:
610		free(pfx);
611	}
612	if (rai->rai_advifprefix && rai->rai_pfxs == 0)
613		get_prefix(rai);
614
615	MAYHAVE(val64, "mtu", 0);
616	if (val < 0 || val64 > 0xffffffff) {
617		syslog(LOG_ERR,
618		    "<%s> mtu (%" PRIu64 ") on %s out of range",
619		    __func__, val64, ifi->ifi_ifname);
620		goto getconfig_free_rai;
621	}
622	rai->rai_linkmtu = (uint32_t)val64;
623	if (rai->rai_linkmtu == 0) {
624		char *mtustr;
625
626		if ((mtustr = (char *)agetstr("mtu", &bp)) &&
627		    strcmp(mtustr, "auto") == 0)
628			rai->rai_linkmtu = ifi->ifi_phymtu;
629	}
630	else if (rai->rai_linkmtu < IPV6_MMTU ||
631	    rai->rai_linkmtu > ifi->ifi_phymtu) {
632		syslog(LOG_ERR,
633		    "<%s> advertised link mtu (%" PRIu32 ") on %s is invalid (must "
634		    "be between least MTU (%d) and physical link MTU (%d)",
635		    __func__, rai->rai_linkmtu, ifi->ifi_ifname,
636		    IPV6_MMTU, ifi->ifi_phymtu);
637		goto getconfig_free_rai;
638	}
639
640#ifdef SIOCSIFINFO_IN6
641	{
642		struct in6_ndireq ndi;
643		int s;
644
645		if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
646			syslog(LOG_ERR, "<%s> socket: %s", __func__,
647			    strerror(errno));
648			exit(1);
649		}
650		memset(&ndi, 0, sizeof(ndi));
651		strlcpy(ndi.ifname, ifi->ifi_ifname, sizeof(ndi.ifname));
652		if (ioctl(s, SIOCGIFINFO_IN6, (caddr_t)&ndi) < 0)
653			syslog(LOG_INFO, "<%s> ioctl:SIOCGIFINFO_IN6 at %s: %s",
654			    __func__, ifi->ifi_ifname, strerror(errno));
655
656		/* reflect the RA info to the host variables in kernel */
657		ndi.ndi.chlim = rai->rai_hoplimit;
658		ndi.ndi.retrans = rai->rai_retranstimer;
659		ndi.ndi.basereachable = rai->rai_reachabletime;
660		if (ioctl(s, SIOCSIFINFO_IN6, (caddr_t)&ndi) < 0)
661			syslog(LOG_INFO, "<%s> ioctl:SIOCSIFINFO_IN6 at %s: %s",
662			    __func__, ifi->ifi_ifname, strerror(errno));
663
664		close(s);
665	}
666#endif
667
668	/* route information */
669	rai->rai_routes = 0;
670	for (i = -1; i < MAXROUTE; i++) {
671		struct rtinfo *rti;
672
673		makeentry(entbuf, sizeof(entbuf), i, "rtprefix");
674		addr = (char *)agetstr(entbuf, &bp);
675		if (addr == NULL) {
676			makeentry(oentbuf, sizeof(oentbuf), i, "rtrprefix");
677			addr = (char *)agetstr(oentbuf, &bp);
678			if (addr)
679				fprintf(stderr, "%s was obsoleted.  Use %s.\n",
680				    oentbuf, entbuf);
681		}
682		if (addr == NULL)
683			continue;
684
685		/* allocate memory to store prefix information */
686		ELM_MALLOC(rti, exit(1));
687
688		if (inet_pton(AF_INET6, addr, &rti->rti_prefix) != 1) {
689			syslog(LOG_ERR, "<%s> inet_pton failed for %s",
690			    __func__, addr);
691			goto getconfig_free_rti;
692		}
693#if 0
694		/*
695		 * XXX: currently there's no restriction in route information
696		 * prefix according to
697		 * draft-ietf-ipngwg-router-selection-00.txt.
698		 * However, I think the similar restriction be necessary.
699		 */
700		MAYHAVE(val64, entbuf, DEF_ADVVALIDLIFETIME);
701		if (IN6_IS_ADDR_MULTICAST(&rti->prefix)) {
702			syslog(LOG_ERR,
703			    "<%s> multicast route (%s) must "
704			    "not be advertised on %s",
705			    __func__, addr, ifi->ifi_ifname);
706			goto getconfig_free_rti;
707		}
708		if (IN6_IS_ADDR_LINKLOCAL(&rti->prefix)) {
709			syslog(LOG_NOTICE,
710			    "<%s> link-local route (%s) will "
711			    "be advertised on %s",
712			    __func__, addr, ifi->ifi_ifname);
713			goto getconfig_free_rti;
714		}
715#endif
716
717		makeentry(entbuf, sizeof(entbuf), i, "rtplen");
718		/* XXX: 256 is a magic number for compatibility check. */
719		MAYHAVE(val, entbuf, 256);
720		if (val == 256) {
721			makeentry(oentbuf, sizeof(oentbuf), i, "rtrplen");
722			MAYHAVE(val, oentbuf, 256);
723			if (val != 256)
724				fprintf(stderr, "%s was obsoleted.  Use %s.\n",
725				    oentbuf, entbuf);
726			else
727				val = 64;
728		}
729		if (val < 0 || val > 128) {
730			syslog(LOG_ERR, "<%s> prefixlen (%" PRIu32 ") for %s on %s "
731			    "out of range",
732			    __func__, val, addr, ifi->ifi_ifname);
733			goto getconfig_free_rti;
734		}
735		rti->rti_prefixlen = (int)val;
736
737		makeentry(entbuf, sizeof(entbuf), i, "rtflags");
738		if ((flagstr = (char *)agetstr(entbuf, &bp))) {
739			val = 0;
740			if (strchr(flagstr, 'h'))
741				val |= ND_RA_FLAG_RTPREF_HIGH;
742			if (strchr(flagstr, 'l')) {
743				if ((val & ND_RA_FLAG_RTPREF_HIGH)) {
744					syslog(LOG_ERR,
745					    "<%s> the \'h\' and \'l\' route"
746					    " preferences are exclusive",
747					    __func__);
748					goto getconfig_free_rti;
749				}
750				val |= ND_RA_FLAG_RTPREF_LOW;
751			}
752		} else
753			MAYHAVE(val, entbuf, 256); /* XXX */
754		if (val == 256) {
755			makeentry(oentbuf, sizeof(oentbuf), i, "rtrflags");
756			MAYHAVE(val, oentbuf, 256);
757			if (val != 256) {
758				fprintf(stderr, "%s was obsoleted.  Use %s.\n",
759				    oentbuf, entbuf);
760			} else
761				val = 0;
762		}
763		rti->rti_rtpref = val & ND_RA_FLAG_RTPREF_MASK;
764		if (rti->rti_rtpref == ND_RA_FLAG_RTPREF_RSV) {
765			syslog(LOG_ERR, "<%s> invalid route preference (%02x) "
766			    "for %s/%d on %s",
767			    __func__, rti->rti_rtpref, addr,
768			    rti->rti_prefixlen, ifi->ifi_ifname);
769			goto getconfig_free_rti;
770		}
771
772		/*
773		 * Since the spec does not a default value, we should make
774		 * this entry mandatory.  However, FreeBSD 4.4 has shipped
775		 * with this field being optional, we use the router lifetime
776		 * as an ad-hoc default value with a warning message.
777		 */
778		makeentry(entbuf, sizeof(entbuf), i, "rtltime");
779		MAYHAVE(val64, entbuf, -1);
780		if (val64 == -1) {
781			makeentry(oentbuf, sizeof(oentbuf), i, "rtrltime");
782			MAYHAVE(val64, oentbuf, -1);
783			if (val64 != -1)
784				fprintf(stderr, "%s was obsoleted.  Use %s.\n",
785				    oentbuf, entbuf);
786			else {
787				fprintf(stderr, "%s should be specified "
788				    "for interface %s.\n", entbuf,
789				    ifi->ifi_ifname);
790				val64 = rai->rai_lifetime;
791			}
792		}
793		if (val64 < 0 || val64 > 0xffffffff) {
794			syslog(LOG_ERR, "<%s> route lifetime (%" PRIu64 ") for "
795			    "%s/%d on %s out of range", __func__,
796			    val64, addr, rti->rti_prefixlen,
797			    ifi->ifi_ifname);
798			goto getconfig_free_rti;
799		}
800		rti->rti_ltime = (uint32_t)val64;
801
802		/* link into chain */
803		TAILQ_INSERT_TAIL(&rai->rai_route, rti, rti_next);
804		rai->rai_routes++;
805		continue;
806getconfig_free_rti:
807		free(rti);
808	}
809
810	/* DNS server and DNS search list information */
811	for (i = -1; i < MAXRDNSSENT ; i++) {
812		struct rdnss *rdn;
813		struct rdnss_addr *rdna;
814		char *ap;
815		int c;
816
817		makeentry(entbuf, sizeof(entbuf), i, "rdnss");
818		addr = (char *)agetstr(entbuf, &bp);
819		if (addr == NULL)
820			continue;
821		ELM_MALLOC(rdn, exit(1));
822
823		TAILQ_INIT(&rdn->rd_list);
824
825		for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) {
826			c = strcspn(ap, ",");
827			strncpy(abuf, ap, c);
828			abuf[c] = '\0';
829			ELM_MALLOC(rdna, goto getconfig_free_rdn);
830			if (inet_pton(AF_INET6, abuf, &rdna->ra_dns) != 1) {
831				syslog(LOG_ERR, "<%s> inet_pton failed for %s",
832				    __func__, abuf);
833				free(rdna);
834				goto getconfig_free_rdn;
835			}
836			TAILQ_INSERT_TAIL(&rdn->rd_list, rdna, ra_next);
837		}
838
839		makeentry(entbuf, sizeof(entbuf), i, "rdnssltime");
840		MAYHAVE(val, entbuf, (rai->rai_maxinterval * 3 / 2));
841		if ((uint16_t)val < rai->rai_maxinterval ||
842		    (uint16_t)val > rai->rai_maxinterval * 2) {
843			syslog(LOG_ERR, "%s (%" PRIu16 ") on %s is invalid "
844			    "(must be between %d and %d)",
845			    entbuf, val, ifi->ifi_ifname, rai->rai_maxinterval,
846			    rai->rai_maxinterval * 2);
847			goto getconfig_free_rdn;
848		}
849		rdn->rd_ltime = val;
850
851		/* link into chain */
852		TAILQ_INSERT_TAIL(&rai->rai_rdnss, rdn, rd_next);
853		continue;
854getconfig_free_rdn:
855		while ((rdna = TAILQ_FIRST(&rdn->rd_list)) != NULL) {
856			TAILQ_REMOVE(&rdn->rd_list, rdna, ra_next);
857			free(rdna);
858		}
859		free(rdn);
860	}
861
862	for (i = -1; i < MAXDNSSLENT ; i++) {
863		struct dnssl *dns;
864		struct dnssl_addr *dnsa;
865		char *ap;
866		int c;
867
868		makeentry(entbuf, sizeof(entbuf), i, "dnssl");
869		addr = (char *)agetstr(entbuf, &bp);
870		if (addr == NULL)
871			continue;
872
873		ELM_MALLOC(dns, exit(1));
874
875		TAILQ_INIT(&dns->dn_list);
876
877		for (ap = addr; ap - addr < (ssize_t)strlen(addr); ap += c+1) {
878			c = strcspn(ap, ",");
879			strncpy(abuf, ap, c);
880			abuf[c] = '\0';
881			ELM_MALLOC(dnsa, goto getconfig_free_dns);
882			dnsa->da_len = dname_labelenc(dnsa->da_dom, abuf);
883			if (dnsa->da_len < 0) {
884				syslog(LOG_ERR, "Invalid dnssl entry: %s",
885				    abuf);
886				goto getconfig_free_dns;
887			}
888			syslog(LOG_DEBUG, "<%s>: dnsa->da_len = %d", __func__,
889			    dnsa->da_len);
890			TAILQ_INSERT_TAIL(&dns->dn_list, dnsa, da_next);
891		}
892
893		makeentry(entbuf, sizeof(entbuf), i, "dnsslltime");
894		MAYHAVE(val, entbuf, (rai->rai_maxinterval * 3 / 2));
895		if ((uint16_t)val < rai->rai_maxinterval ||
896		    (uint16_t)val > rai->rai_maxinterval * 2) {
897			syslog(LOG_ERR, "%s (%" PRIu16 ") on %s is invalid "
898			    "(must be between %d and %d)",
899			    entbuf, val, ifi->ifi_ifname, rai->rai_maxinterval,
900			    rai->rai_maxinterval * 2);
901			goto getconfig_free_dns;
902		}
903		dns->dn_ltime = val;
904
905		/* link into chain */
906		TAILQ_INSERT_TAIL(&rai->rai_dnssl, dns, dn_next);
907		continue;
908getconfig_free_dns:
909		while ((dnsa = TAILQ_FIRST(&dns->dn_list)) != NULL) {
910			TAILQ_REMOVE(&dns->dn_list, dnsa, da_next);
911			free(dnsa);
912		}
913		free(dns);
914	}
915
916	/*
917	 * handle pref64
918	 */
919	rai->rai_pref64.p64_enabled = false;
920
921	if ((addr = (char *)agetstr("pref64", &bp))) {
922		if (inet_pton(AF_INET6, addr, &rai->rai_pref64.p64_prefix) != 1) {
923			syslog(LOG_ERR, "<%s> inet_pton failed for %s",
924			    __func__, addr);
925		} else {
926			rai->rai_pref64.p64_enabled = true;
927
928			switch (val64 = agetnum("pref64len")) {
929			case -1:
930			case 96:
931				rai->rai_pref64.p64_plc = 0;
932				break;
933			case 64:
934				rai->rai_pref64.p64_plc = 1;
935				break;
936			case 56:
937				rai->rai_pref64.p64_plc = 2;
938				break;
939			case 48:
940				rai->rai_pref64.p64_plc = 3;
941				break;
942			case 40:
943				rai->rai_pref64.p64_plc = 4;
944				break;
945			case 32:
946				rai->rai_pref64.p64_plc = 5;
947				break;
948			default:
949				syslog(LOG_ERR, "prefix length %" PRIi64
950				       "on %s is invalid; disabling PREF64",
951				       val64, ifi->ifi_ifname);
952				rai->rai_pref64.p64_enabled = 0;
953				break;
954			}
955
956			/* This logic is from RFC 8781 section 4.1. */
957			val64 = agetnum("pref64lifetime");
958			if (val64 == -1)
959				val64 = rai->rai_lifetime * 3;
960			if (val64 > 65528)
961				val64 = 65528;
962			val64 = (val64 + 7) / 8;
963			rai->rai_pref64.p64_sl = (uint16_t) (uint64_t) val64;
964		}
965	}
966
967	/* construct the sending packet */
968	make_packet(rai);
969
970	/*
971	 * If an entry with the same ifindex exists, remove it first.
972	 * Before the removal, RDNSS and DNSSL options with
973	 * zero-lifetime will be sent.
974	 */
975	switch (ifi->ifi_state) {
976	case IFI_STATE_UNCONFIGURED:
977		/* UNCONFIGURED -> TRANSITIVE */
978
979		error = sock_mc_join(&sock, ifi->ifi_ifindex);
980		if (error)
981			exit(1);
982
983		ifi->ifi_state = IFI_STATE_TRANSITIVE;
984		ifi->ifi_burstcount = MAX_INITIAL_RTR_ADVERTISEMENTS;
985		ifi->ifi_burstinterval = MAX_INITIAL_RTR_ADVERT_INTERVAL;
986
987		/* The same two rai mean initial burst */
988		ifi->ifi_rainfo = rai;
989		ifi->ifi_rainfo_trans = rai;
990		TAILQ_INSERT_TAIL(&railist, rai, rai_next);
991
992		if (ifi->ifi_ra_timer == NULL)
993			ifi->ifi_ra_timer = rtadvd_add_timer(ra_timeout,
994			    ra_timer_update, ifi, ifi);
995		ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm);
996		rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm,
997		    ifi->ifi_ra_timer);
998
999		syslog(LOG_DEBUG,
1000		    "<%s> ifname=%s marked as TRANSITIVE (initial burst).",
1001		    __func__, ifi->ifi_ifname);
1002		break;
1003	case IFI_STATE_CONFIGURED:
1004		/* CONFIGURED -> TRANSITIVE */
1005		rai_old = ifi->ifi_rainfo;
1006		if (rai_old == NULL) {
1007			syslog(LOG_ERR,
1008			    "<%s> ifi_rainfo is NULL"
1009			    " in IFI_STATE_CONFIGURED.", __func__);
1010			ifi = NULL;
1011			break;
1012		} else {
1013			struct rdnss *rdn;
1014			struct dnssl *dns;
1015
1016			rai_old->rai_lifetime = 0;
1017			TAILQ_FOREACH(rdn, &rai_old->rai_rdnss, rd_next)
1018			    rdn->rd_ltime = 0;
1019			TAILQ_FOREACH(dns, &rai_old->rai_dnssl, dn_next)
1020			    dns->dn_ltime = 0;
1021
1022			ifi->ifi_rainfo_trans = rai_old;
1023			ifi->ifi_state = IFI_STATE_TRANSITIVE;
1024			ifi->ifi_burstcount = MAX_FINAL_RTR_ADVERTISEMENTS;
1025			ifi->ifi_burstinterval = MIN_DELAY_BETWEEN_RAS;
1026
1027			ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm);
1028			rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm,
1029			    ifi->ifi_ra_timer);
1030
1031			syslog(LOG_DEBUG,
1032			    "<%s> ifname=%s marked as TRANSITIVE"
1033			    " (transitional burst)",
1034			    __func__, ifi->ifi_ifname);
1035		}
1036		ifi->ifi_rainfo = rai;
1037		TAILQ_INSERT_TAIL(&railist, rai, rai_next);
1038		break;
1039	case IFI_STATE_TRANSITIVE:
1040		if (ifi->ifi_rainfo != NULL) {
1041			if (ifi->ifi_rainfo == ifi->ifi_rainfo_trans) {
1042				/* Reinitialize initial burst */
1043				rm_rainfo(ifi->ifi_rainfo);
1044				ifi->ifi_rainfo = rai;
1045				ifi->ifi_rainfo_trans = rai;
1046				ifi->ifi_burstcount =
1047				    MAX_INITIAL_RTR_ADVERTISEMENTS;
1048				ifi->ifi_burstinterval =
1049				    MAX_INITIAL_RTR_ADVERT_INTERVAL;
1050			} else {
1051				/* Replace ifi_rainfo with the new one */
1052				rm_rainfo(ifi->ifi_rainfo);
1053				ifi->ifi_rainfo = rai;
1054			}
1055			TAILQ_INSERT_TAIL(&railist, rai, rai_next);
1056
1057			ra_timer_update(ifi, &ifi->ifi_ra_timer->rat_tm);
1058			rtadvd_set_timer(&ifi->ifi_ra_timer->rat_tm,
1059			    ifi->ifi_ra_timer);
1060		} else {
1061			/* XXX: NOTREACHED.  Being shut down. */
1062			syslog(LOG_ERR,
1063			    "<%s> %s is shutting down.  Skipped.",
1064			    __func__, ifi->ifi_ifname);
1065			rm_rainfo(rai);
1066
1067			return (NULL);
1068		}
1069		break;
1070	}
1071
1072	return (ifi);
1073
1074getconfig_free_rai:
1075	free(rai);
1076	return (NULL);
1077}
1078
1079void
1080get_prefix(struct rainfo *rai)
1081{
1082	struct ifaddrs *ifap, *ifa;
1083	struct prefix *pfx;
1084	struct in6_addr *a;
1085	struct ifinfo *ifi;
1086	char *p, *ep, *m, *lim;
1087	char ntopbuf[INET6_ADDRSTRLEN];
1088
1089	if (getifaddrs(&ifap) < 0) {
1090		syslog(LOG_ERR,
1091		    "<%s> can't get interface addresses",
1092		    __func__);
1093		exit(1);
1094	}
1095	ifi = rai->rai_ifinfo;
1096
1097	for (ifa = ifap; ifa; ifa = ifa->ifa_next) {
1098		int plen;
1099
1100		if (strcmp(ifa->ifa_name, ifi->ifi_ifname) != 0)
1101			continue;
1102		if (ifa->ifa_addr->sa_family != AF_INET6)
1103			continue;
1104		a = &((struct sockaddr_in6 *)ifa->ifa_addr)->sin6_addr;
1105		if (IN6_IS_ADDR_LINKLOCAL(a))
1106			continue;
1107
1108		/* get prefix length */
1109		m = (char *)&((struct sockaddr_in6 *)ifa->ifa_netmask)->sin6_addr;
1110		lim = (char *)(ifa->ifa_netmask) + ifa->ifa_netmask->sa_len;
1111		plen = prefixlen(m, lim);
1112		if (plen <= 0 || plen > 128) {
1113			syslog(LOG_ERR, "<%s> failed to get prefixlen "
1114			    "or prefix is invalid",
1115			    __func__);
1116			exit(1);
1117		}
1118		if (plen == 128)	/* XXX */
1119			continue;
1120		if (find_prefix(rai, a, plen)) {
1121			/* ignore a duplicated prefix. */
1122			continue;
1123		}
1124
1125		/* allocate memory to store prefix info. */
1126		ELM_MALLOC(pfx, exit(1));
1127
1128		/* set prefix, sweep bits outside of prefixlen */
1129		pfx->pfx_prefixlen = plen;
1130		memcpy(&pfx->pfx_prefix, a, sizeof(*a));
1131		p = (char *)&pfx->pfx_prefix;
1132		ep = (char *)(&pfx->pfx_prefix + 1);
1133		while (m < lim && p < ep)
1134			*p++ &= *m++;
1135		while (p < ep)
1136			*p++ = 0x00;
1137	        if (!inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf,
1138	            sizeof(ntopbuf))) {
1139			syslog(LOG_ERR, "<%s> inet_ntop failed", __func__);
1140			exit(1);
1141		}
1142		syslog(LOG_DEBUG,
1143		    "<%s> add %s/%d to prefix list on %s",
1144		    __func__, ntopbuf, pfx->pfx_prefixlen, ifi->ifi_ifname);
1145
1146		/* set other fields with protocol defaults */
1147		pfx->pfx_validlifetime = DEF_ADVVALIDLIFETIME;
1148		pfx->pfx_preflifetime = DEF_ADVPREFERREDLIFETIME;
1149		pfx->pfx_onlinkflg = 1;
1150		pfx->pfx_autoconfflg = 1;
1151		pfx->pfx_origin = PREFIX_FROM_KERNEL;
1152		pfx->pfx_rainfo = rai;
1153
1154		/* link into chain */
1155		TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next);
1156
1157		/* counter increment */
1158		rai->rai_pfxs++;
1159	}
1160
1161	freeifaddrs(ifap);
1162}
1163
1164static void
1165makeentry(char *buf, size_t len, int id, const char *string)
1166{
1167
1168	if (id < 0)
1169		strlcpy(buf, string, len);
1170	else
1171		snprintf(buf, len, "%s%d", string, id);
1172}
1173
1174/*
1175 * Add a prefix to the list of specified interface and reconstruct
1176 * the outgoing packet.
1177 * The prefix must not be in the list.
1178 * XXX: other parameters of the prefix (e.g. lifetime) should be
1179 * able to be specified.
1180 */
1181static void
1182add_prefix(struct rainfo *rai, struct in6_prefixreq *ipr)
1183{
1184	struct prefix *pfx;
1185	struct ifinfo *ifi;
1186	char ntopbuf[INET6_ADDRSTRLEN];
1187
1188	ifi = rai->rai_ifinfo;
1189	ELM_MALLOC(pfx, return);
1190	pfx->pfx_prefix = ipr->ipr_prefix.sin6_addr;
1191	pfx->pfx_prefixlen = ipr->ipr_plen;
1192	pfx->pfx_validlifetime = ipr->ipr_vltime;
1193	pfx->pfx_preflifetime = ipr->ipr_pltime;
1194	pfx->pfx_onlinkflg = ipr->ipr_raf_onlink;
1195	pfx->pfx_autoconfflg = ipr->ipr_raf_auto;
1196	pfx->pfx_origin = PREFIX_FROM_DYNAMIC;
1197	pfx->pfx_rainfo = rai;
1198
1199	TAILQ_INSERT_TAIL(&rai->rai_prefix, pfx, pfx_next);
1200
1201	syslog(LOG_DEBUG, "<%s> new prefix %s/%d was added on %s",
1202	    __func__,
1203	    inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf,
1204		sizeof(ntopbuf)), ipr->ipr_plen, ifi->ifi_ifname);
1205
1206	rai->rai_pfxs++;
1207}
1208
1209/*
1210 * Delete a prefix to the list of specified interface and reconstruct
1211 * the outgoing packet.
1212 * The prefix must be in the list.
1213 */
1214void
1215delete_prefix(struct prefix *pfx)
1216{
1217	struct rainfo *rai;
1218	struct ifinfo *ifi;
1219	char ntopbuf[INET6_ADDRSTRLEN];
1220
1221	rai = pfx->pfx_rainfo;
1222	ifi = rai->rai_ifinfo;
1223	TAILQ_REMOVE(&rai->rai_prefix, pfx, pfx_next);
1224	syslog(LOG_DEBUG, "<%s> prefix %s/%d was deleted on %s",
1225	    __func__,
1226	    inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf,
1227		sizeof(ntopbuf)), pfx->pfx_prefixlen, ifi->ifi_ifname);
1228	if (pfx->pfx_timer)
1229		rtadvd_remove_timer(pfx->pfx_timer);
1230	free(pfx);
1231
1232	rai->rai_pfxs--;
1233}
1234
1235void
1236invalidate_prefix(struct prefix *pfx)
1237{
1238	struct timespec timo;
1239	struct rainfo *rai;
1240	struct ifinfo *ifi;
1241	char ntopbuf[INET6_ADDRSTRLEN];
1242
1243	rai = pfx->pfx_rainfo;
1244	ifi = rai->rai_ifinfo;
1245	if (pfx->pfx_timer) {	/* sanity check */
1246		syslog(LOG_ERR,
1247		    "<%s> assumption failure: timer already exists",
1248		    __func__);
1249		exit(1);
1250	}
1251
1252	syslog(LOG_DEBUG, "<%s> prefix %s/%d was invalidated on %s, "
1253	    "will expire in %ld seconds", __func__,
1254	    inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf, sizeof(ntopbuf)),
1255	    pfx->pfx_prefixlen, ifi->ifi_ifname, (long)prefix_timo);
1256
1257	/* set the expiration timer */
1258	pfx->pfx_timer = rtadvd_add_timer(prefix_timeout, NULL, pfx, NULL);
1259	if (pfx->pfx_timer == NULL) {
1260		syslog(LOG_ERR, "<%s> failed to add a timer for a prefix. "
1261		    "remove the prefix", __func__);
1262		delete_prefix(pfx);
1263	}
1264	timo.tv_sec = prefix_timo;
1265	timo.tv_nsec = 0;
1266	rtadvd_set_timer(&timo, pfx->pfx_timer);
1267}
1268
1269static struct rtadvd_timer *
1270prefix_timeout(void *arg)
1271{
1272
1273	delete_prefix((struct prefix *)arg);
1274
1275	return (NULL);
1276}
1277
1278void
1279update_prefix(struct prefix *pfx)
1280{
1281	struct rainfo *rai;
1282	struct ifinfo *ifi;
1283	char ntopbuf[INET6_ADDRSTRLEN];
1284
1285	rai = pfx->pfx_rainfo;
1286	ifi = rai->rai_ifinfo;
1287	if (pfx->pfx_timer == NULL) { /* sanity check */
1288		syslog(LOG_ERR,
1289		    "<%s> assumption failure: timer does not exist",
1290		    __func__);
1291		exit(1);
1292	}
1293
1294	syslog(LOG_DEBUG, "<%s> prefix %s/%d was re-enabled on %s",
1295	    __func__, inet_ntop(AF_INET6, &pfx->pfx_prefix, ntopbuf,
1296		sizeof(ntopbuf)), pfx->pfx_prefixlen, ifi->ifi_ifname);
1297
1298	/* stop the expiration timer */
1299	rtadvd_remove_timer(pfx->pfx_timer);
1300	pfx->pfx_timer = NULL;
1301}
1302
1303/*
1304 * Try to get an in6_prefixreq contents for a prefix which matches
1305 * ipr->ipr_prefix and ipr->ipr_plen and belongs to
1306 * the interface whose name is ipr->ipr_name[].
1307 */
1308static int
1309init_prefix(struct in6_prefixreq *ipr)
1310{
1311#if 0
1312	int s;
1313
1314	if ((s = socket(AF_INET6, SOCK_DGRAM, 0)) < 0) {
1315		syslog(LOG_ERR, "<%s> socket: %s", __func__,
1316		    strerror(errno));
1317		exit(1);
1318	}
1319
1320	if (ioctl(s, SIOCGIFPREFIX_IN6, (caddr_t)ipr) < 0) {
1321		syslog(LOG_INFO, "<%s> ioctl:SIOCGIFPREFIX %s", __func__,
1322		    strerror(errno));
1323
1324		ipr->ipr_vltime = DEF_ADVVALIDLIFETIME;
1325		ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME;
1326		ipr->ipr_raf_onlink = 1;
1327		ipr->ipr_raf_auto = 1;
1328		/* omit other field initialization */
1329	}
1330	else if (ipr->ipr_origin < PR_ORIG_RR) {
1331		char ntopbuf[INET6_ADDRSTRLEN];
1332
1333		syslog(LOG_WARNING, "<%s> Added prefix(%s)'s origin %d is"
1334		    "lower than PR_ORIG_RR(router renumbering)."
1335		    "This should not happen if I am router", __func__,
1336		    inet_ntop(AF_INET6, &ipr->ipr_prefix.sin6_addr, ntopbuf,
1337			sizeof(ntopbuf)), ipr->ipr_origin);
1338		close(s);
1339		return (1);
1340	}
1341
1342	close(s);
1343	return (0);
1344#else
1345	ipr->ipr_vltime = DEF_ADVVALIDLIFETIME;
1346	ipr->ipr_pltime = DEF_ADVPREFERREDLIFETIME;
1347	ipr->ipr_raf_onlink = 1;
1348	ipr->ipr_raf_auto = 1;
1349	return (0);
1350#endif
1351}
1352
1353void
1354make_prefix(struct rainfo *rai, int ifindex, struct in6_addr *addr, int plen)
1355{
1356	struct in6_prefixreq ipr;
1357
1358	memset(&ipr, 0, sizeof(ipr));
1359	if (if_indextoname(ifindex, ipr.ipr_name) == NULL) {
1360		syslog(LOG_ERR, "<%s> Prefix added interface No.%d doesn't "
1361		    "exist. This should not happen! %s", __func__,
1362		    ifindex, strerror(errno));
1363		exit(1);
1364	}
1365	ipr.ipr_prefix.sin6_len = sizeof(ipr.ipr_prefix);
1366	ipr.ipr_prefix.sin6_family = AF_INET6;
1367	ipr.ipr_prefix.sin6_addr = *addr;
1368	ipr.ipr_plen = plen;
1369
1370	if (init_prefix(&ipr))
1371		return; /* init failed by some error */
1372	add_prefix(rai, &ipr);
1373}
1374
1375void
1376make_packet(struct rainfo *rai)
1377{
1378	size_t packlen, lladdroptlen = 0;
1379	char *buf;
1380	struct nd_router_advert *ra;
1381	struct nd_opt_prefix_info *ndopt_pi;
1382	struct nd_opt_mtu *ndopt_mtu;
1383	struct nd_opt_route_info *ndopt_rti;
1384	struct rtinfo *rti;
1385	struct nd_opt_rdnss *ndopt_rdnss;
1386	struct rdnss *rdn;
1387	struct nd_opt_dnssl *ndopt_dnssl;
1388	struct dnssl *dns;
1389	struct nd_opt_pref64 *ndopt_pref64;
1390	size_t len;
1391	struct prefix *pfx;
1392	struct ifinfo *ifi;
1393
1394	ifi = rai->rai_ifinfo;
1395	/* calculate total length */
1396	packlen = sizeof(struct nd_router_advert);
1397	if (rai->rai_advlinkopt) {
1398		if ((lladdroptlen = lladdropt_length(&ifi->ifi_sdl)) == 0) {
1399			syslog(LOG_INFO,
1400			    "<%s> link-layer address option has"
1401			    " null length on %s.  Treat as not included.",
1402			    __func__, ifi->ifi_ifname);
1403			rai->rai_advlinkopt = 0;
1404		}
1405		packlen += lladdroptlen;
1406	}
1407	if (rai->rai_pfxs)
1408		packlen += sizeof(struct nd_opt_prefix_info) * rai->rai_pfxs;
1409	if (rai->rai_linkmtu)
1410		packlen += sizeof(struct nd_opt_mtu);
1411	if (rai->rai_pref64.p64_enabled)
1412		packlen += sizeof(struct nd_opt_pref64);
1413
1414	TAILQ_FOREACH(rti, &rai->rai_route, rti_next)
1415		packlen += sizeof(struct nd_opt_route_info) +
1416			   ((rti->rti_prefixlen + 0x3f) >> 6) * 8;
1417
1418	TAILQ_FOREACH(rdn, &rai->rai_rdnss, rd_next) {
1419		struct rdnss_addr *rdna;
1420
1421		packlen += sizeof(struct nd_opt_rdnss);
1422		TAILQ_FOREACH(rdna, &rdn->rd_list, ra_next)
1423			packlen += sizeof(rdna->ra_dns);
1424	}
1425	TAILQ_FOREACH(dns, &rai->rai_dnssl, dn_next) {
1426		struct dnssl_addr *dnsa;
1427
1428		packlen += sizeof(struct nd_opt_dnssl);
1429		len = 0;
1430		TAILQ_FOREACH(dnsa, &dns->dn_list, da_next)
1431			len += dnsa->da_len;
1432
1433		/* A zero octet and 8 octet boundary */
1434		len++;
1435		len += (len % 8) ? 8 - len % 8 : 0;
1436
1437		packlen += len;
1438	}
1439	/* allocate memory for the packet */
1440	if ((buf = malloc(packlen)) == NULL) {
1441		syslog(LOG_ERR,
1442		    "<%s> can't get enough memory for an RA packet",
1443		    __func__);
1444		exit(1);
1445	}
1446	memset(buf, 0, packlen);
1447	if (rai->rai_ra_data)	/* Free old data if any. */
1448		free(rai->rai_ra_data);
1449	rai->rai_ra_data = buf;
1450	/* XXX: what if packlen > 576? */
1451	rai->rai_ra_datalen = packlen;
1452
1453	/*
1454	 * construct the packet
1455	 */
1456	ra = (struct nd_router_advert *)buf;
1457	ra->nd_ra_type = ND_ROUTER_ADVERT;
1458	ra->nd_ra_code = 0;
1459	ra->nd_ra_cksum = 0;
1460	ra->nd_ra_curhoplimit = (uint8_t)(0xff & rai->rai_hoplimit);
1461	/*
1462	 * XXX: the router preference field, which is a 2-bit field, should be
1463	 * initialized before other fields.
1464	 */
1465	ra->nd_ra_flags_reserved = 0xff & rai->rai_rtpref;
1466	ra->nd_ra_flags_reserved |=
1467		rai->rai_managedflg ? ND_RA_FLAG_MANAGED : 0;
1468	ra->nd_ra_flags_reserved |=
1469		rai->rai_otherflg ? ND_RA_FLAG_OTHER : 0;
1470#ifdef DRAFT_IETF_6MAN_IPV6ONLY_FLAG
1471	ra->nd_ra_flags_reserved |=
1472		rai->rai_ipv6onlyflg ? ND_RA_FLAG_IPV6_ONLY : 0;
1473#endif
1474	ra->nd_ra_router_lifetime = htons(rai->rai_lifetime);
1475	ra->nd_ra_reachable = htonl(rai->rai_reachabletime);
1476	ra->nd_ra_retransmit = htonl(rai->rai_retranstimer);
1477	buf += sizeof(*ra);
1478
1479	if (rai->rai_advlinkopt) {
1480		lladdropt_fill(&ifi->ifi_sdl, (struct nd_opt_hdr *)buf);
1481		buf += lladdroptlen;
1482	}
1483
1484	if (rai->rai_linkmtu) {
1485		ndopt_mtu = (struct nd_opt_mtu *)buf;
1486		ndopt_mtu->nd_opt_mtu_type = ND_OPT_MTU;
1487		ndopt_mtu->nd_opt_mtu_len = 1;
1488		ndopt_mtu->nd_opt_mtu_reserved = 0;
1489		ndopt_mtu->nd_opt_mtu_mtu = htonl(rai->rai_linkmtu);
1490		buf += sizeof(struct nd_opt_mtu);
1491	}
1492
1493	if (rai->rai_pref64.p64_enabled) {
1494		ndopt_pref64 = (struct nd_opt_pref64 *)buf;
1495		ndopt_pref64->nd_opt_pref64_type = ND_OPT_PREF64;
1496		ndopt_pref64->nd_opt_pref64_len = 2;
1497		ndopt_pref64->nd_opt_pref64_sl_plc =
1498			(htons(rai->rai_pref64.p64_sl << 3)) |
1499			htons((rai->rai_pref64.p64_plc & 0x7));
1500		memcpy(&ndopt_pref64->nd_opt_prefix[0],
1501		       &rai->rai_pref64.p64_prefix,
1502		       sizeof(ndopt_pref64->nd_opt_prefix));
1503		buf += sizeof(struct nd_opt_pref64);
1504	}
1505
1506	TAILQ_FOREACH(pfx, &rai->rai_prefix, pfx_next) {
1507		uint32_t vltime, pltime;
1508		struct timespec now;
1509
1510		ndopt_pi = (struct nd_opt_prefix_info *)buf;
1511		ndopt_pi->nd_opt_pi_type = ND_OPT_PREFIX_INFORMATION;
1512		ndopt_pi->nd_opt_pi_len = 4;
1513		ndopt_pi->nd_opt_pi_prefix_len = pfx->pfx_prefixlen;
1514		ndopt_pi->nd_opt_pi_flags_reserved = 0;
1515		if (pfx->pfx_onlinkflg)
1516			ndopt_pi->nd_opt_pi_flags_reserved |=
1517				ND_OPT_PI_FLAG_ONLINK;
1518		if (pfx->pfx_autoconfflg)
1519			ndopt_pi->nd_opt_pi_flags_reserved |=
1520				ND_OPT_PI_FLAG_AUTO;
1521		if (pfx->pfx_timer)
1522			vltime = 0;
1523		else {
1524			if (pfx->pfx_vltimeexpire || pfx->pfx_pltimeexpire)
1525				clock_gettime(CLOCK_MONOTONIC_FAST, &now);
1526			if (pfx->pfx_vltimeexpire == 0)
1527				vltime = pfx->pfx_validlifetime;
1528			else
1529				vltime = ((time_t)pfx->pfx_vltimeexpire > now.tv_sec) ?
1530				    pfx->pfx_vltimeexpire - now.tv_sec : 0;
1531		}
1532		if (pfx->pfx_timer)
1533			pltime = 0;
1534		else {
1535			if (pfx->pfx_pltimeexpire == 0)
1536				pltime = pfx->pfx_preflifetime;
1537			else
1538				pltime = ((time_t)pfx->pfx_pltimeexpire > now.tv_sec) ?
1539				    pfx->pfx_pltimeexpire - now.tv_sec : 0;
1540		}
1541		if (vltime < pltime) {
1542			/*
1543			 * this can happen if vltime is decrement but pltime
1544			 * is not.
1545			 */
1546			pltime = vltime;
1547		}
1548		ndopt_pi->nd_opt_pi_valid_time = htonl(vltime);
1549		ndopt_pi->nd_opt_pi_preferred_time = htonl(pltime);
1550		ndopt_pi->nd_opt_pi_reserved2 = 0;
1551		ndopt_pi->nd_opt_pi_prefix = pfx->pfx_prefix;
1552
1553		buf += sizeof(struct nd_opt_prefix_info);
1554	}
1555
1556	TAILQ_FOREACH(rti, &rai->rai_route, rti_next) {
1557		uint8_t psize = (rti->rti_prefixlen + 0x3f) >> 6;
1558
1559		ndopt_rti = (struct nd_opt_route_info *)buf;
1560		ndopt_rti->nd_opt_rti_type = ND_OPT_ROUTE_INFO;
1561		ndopt_rti->nd_opt_rti_len = 1 + psize;
1562		ndopt_rti->nd_opt_rti_prefixlen = rti->rti_prefixlen;
1563		ndopt_rti->nd_opt_rti_flags = 0xff & rti->rti_rtpref;
1564		ndopt_rti->nd_opt_rti_lifetime = htonl(rti->rti_ltime);
1565		memcpy(ndopt_rti + 1, &rti->rti_prefix, psize * 8);
1566		buf += sizeof(struct nd_opt_route_info) + psize * 8;
1567	}
1568
1569	TAILQ_FOREACH(rdn, &rai->rai_rdnss, rd_next) {
1570		struct rdnss_addr *rdna;
1571
1572		ndopt_rdnss = (struct nd_opt_rdnss *)buf;
1573		ndopt_rdnss->nd_opt_rdnss_type = ND_OPT_RDNSS;
1574		ndopt_rdnss->nd_opt_rdnss_len = 0;
1575		ndopt_rdnss->nd_opt_rdnss_reserved = 0;
1576		ndopt_rdnss->nd_opt_rdnss_lifetime = htonl(rdn->rd_ltime);
1577		buf += sizeof(struct nd_opt_rdnss);
1578
1579		TAILQ_FOREACH(rdna, &rdn->rd_list, ra_next) {
1580			memcpy(buf, &rdna->ra_dns, sizeof(rdna->ra_dns));
1581			buf += sizeof(rdna->ra_dns);
1582		}
1583		/* Length field should be in 8 octets */
1584		ndopt_rdnss->nd_opt_rdnss_len = (buf - (char *)ndopt_rdnss) / 8;
1585
1586		syslog(LOG_DEBUG, "<%s>: nd_opt_dnss_len = %d", __func__,
1587		    ndopt_rdnss->nd_opt_rdnss_len);
1588	}
1589
1590	TAILQ_FOREACH(dns, &rai->rai_dnssl, dn_next) {
1591		struct dnssl_addr *dnsa;
1592
1593		ndopt_dnssl = (struct nd_opt_dnssl *)buf;
1594		ndopt_dnssl->nd_opt_dnssl_type = ND_OPT_DNSSL;
1595		ndopt_dnssl->nd_opt_dnssl_len = 0;
1596		ndopt_dnssl->nd_opt_dnssl_reserved = 0;
1597		ndopt_dnssl->nd_opt_dnssl_lifetime = htonl(dns->dn_ltime);
1598		buf += sizeof(*ndopt_dnssl);
1599
1600		TAILQ_FOREACH(dnsa, &dns->dn_list, da_next) {
1601			memcpy(buf, dnsa->da_dom, dnsa->da_len);
1602			buf += dnsa->da_len;
1603		}
1604
1605		/* A zero octet after encoded DNS server list. */
1606		*buf++ = '\0';
1607
1608		/* Padding to next 8 octets boundary */
1609		len = buf - (char *)ndopt_dnssl;
1610		len += (len % 8) ? 8 - len % 8 : 0;
1611		buf = (char *)ndopt_dnssl + len;
1612
1613		/* Length field must be in 8 octets */
1614		ndopt_dnssl->nd_opt_dnssl_len = len / 8;
1615
1616		syslog(LOG_DEBUG, "<%s>: nd_opt_dnssl_len = %d", __func__,
1617		    ndopt_dnssl->nd_opt_dnssl_len);
1618	}
1619}
1620