blob: 2b432cb3a09a4248c25d5e464e711e73cd1cf7c3 [file] [log] [blame]
/* dhcp.c - DHCP client for dynamic network configuration.
*
* Copyright 2012 Madhur Verma <mad.flexi@gmail.com>
* Copyright 2013 Kyungwan Han <asura321@gmail.com>
*
* Not in SUSv4.
USE_DHCP(NEWTOY(dhcp, "V:H:F:x*r:O*A#<0T#<0t#<0s:p:i:SBRCaovqnbf", TOYFLAG_SBIN|TOYFLAG_ROOTONLY))
config DHCP
bool "dhcp"
default n
help
usage: dhcp [-fbnqvoCRB] [-i IFACE] [-r IP] [-s PROG] [-p PIDFILE]
[-H HOSTNAME] [-V VENDOR] [-x OPT:VAL] [-O OPT]
Configure network dynamicaly using DHCP.
-i Interface to use (default eth0)
-p Create pidfile
-s Run PROG at DHCP events (default /usr/share/dhcp/default.script)
-B Request broadcast replies
-t Send up to N discover packets
-T Pause between packets (default 3 seconds)
-A Wait N seconds after failure (default 20)
-f Run in foreground
-b Background if lease is not obtained
-n Exit if lease is not obtained
-q Exit after obtaining lease
-R Release IP on exit
-S Log to syslog too
-a Use arping to validate offered address
-O Request option OPT from server (cumulative)
-o Don't request any options (unless -O is given)
-r Request this IP address
-x OPT:VAL Include option OPT in sent packets (cumulative)
-F Ask server to update DNS mapping for NAME
-H Send NAME as client hostname (default none)
-V VENDOR Vendor identifier (default 'toybox VERSION')
-C Don't send MAC as client identifier
-v Verbose
Signals:
USR1 Renew current lease
USR2 Release current lease
*/
#define FOR_dhcp
#include "toys.h"
// TODO: headers not in posix:
#include <netinet/ip.h>
#include <netinet/udp.h>
#include <netpacket/packet.h>
#include <linux/filter.h> //FIXME: linux specific. fix for other OS ports
#include <linux/if_ether.h>
GLOBALS(
char *iface;
char *pidfile;
char *script;
long retries;
long timeout;
long tryagain;
struct arg_list *req_opt;
char *req_ip;
struct arg_list *pkt_opt;
char *fdn_name;
char *hostname;
char *vendor_cls;
)
#define flag_get(f,v,d) ((toys.optflags & f) ? v : d)
#define flag_chk(f) ((toys.optflags & f) ? 1 : 0)
#define STATE_INIT 0
#define STATE_REQUESTING 1
#define STATE_BOUND 2
#define STATE_RENEWING 3
#define STATE_REBINDING 4
#define STATE_RENEW_REQUESTED 5
#define STATE_RELEASED 6
#define BOOTP_BROADCAST 0x8000
#define DHCP_MAGIC 0x63825363
#define DHCP_REQUEST 1
#define DHCP_REPLY 2
#define DHCP_HTYPE_ETHERNET 1
#define DHCPC_SERVER_PORT 67
#define DHCPC_CLIENT_PORT 68
#define DHCPDISCOVER 1
#define DHCPOFFER 2
#define DHCPREQUEST 3
#define DHCPACK 5
#define DHCPNAK 6
#define DHCPRELEASE 7
#define DHCP_OPTION_PADDING 0x00
#define DHCP_OPTION_SUBNET_MASK 0x01
#define DHCP_OPTION_ROUTER 0x03
#define DHCP_OPTION_DNS_SERVER 0x06
#define DHCP_OPTION_HOST_NAME 0x0c
#define DHCP_OPTION_BROADCAST 0x1c
#define DHCP_OPTION_REQ_IPADDR 0x32
#define DHCP_OPTION_LEASE_TIME 0x33
#define DHCP_OPTION_OVERLOAD 0x34
#define DHCP_OPTION_MSG_TYPE 0x35
#define DHCP_OPTION_SERVER_ID 0x36
#define DHCP_OPTION_REQ_LIST 0x37
#define DHCP_OPTION_MAX_SIZE 0x39
#define DHCP_OPTION_CLIENTID 0x3D
#define DHCP_OPTION_VENDOR 0x3C
#define DHCP_OPTION_FQDN 0x51
#define DHCP_OPTION_END 0xFF
#define DHCP_NUM8 (1<<8)
#define DHCP_NUM16 (1<<9)
#define DHCP_NUM32 DHCP_NUM16 | DHCP_NUM8
#define DHCP_STRING (1<<10)
#define DHCP_STRLST (1<<11)
#define DHCP_IP (1<<12)
#define DHCP_IPLIST (1<<13)
#define DHCP_IPPLST (1<<14)
#define DHCP_STCRTS (1<<15)
#define LOG_SILENT 0x0
#define LOG_CONSOLE 0x1
#define LOG_SYSTEM 0x2
#define MODE_OFF 0
#define MODE_RAW 1
#define MODE_APP 2
static void (*dbg)(char *format, ...);
static void dummy(char *format, ...){
return;
}
typedef struct dhcpc_result_s {
struct in_addr serverid;
struct in_addr ipaddr;
struct in_addr netmask;
struct in_addr dnsaddr;
struct in_addr default_router;
uint32_t lease_time;
} dhcpc_result_t;
typedef struct __attribute__((packed)) dhcp_msg_s {
uint8_t op;
uint8_t htype;
uint8_t hlen;
uint8_t hops;
uint32_t xid;
uint16_t secs;
uint16_t flags;
uint32_t ciaddr;
uint32_t yiaddr;
uint32_t nsiaddr;
uint32_t ngiaddr;
uint8_t chaddr[16];
uint8_t sname[64];
uint8_t file[128];
uint32_t cookie;
uint8_t options[308];
} dhcp_msg_t;
typedef struct __attribute__((packed)) dhcp_raw_s {
struct iphdr iph;
struct udphdr udph;
dhcp_msg_t dhcp;
} dhcp_raw_t;
typedef struct dhcpc_state_s {
uint8_t macaddr[6];
char *iface;
int ifindex;
int sockfd;
int status;
int mode;
uint32_t mask;
struct in_addr ipaddr;
struct in_addr serverid;
dhcp_msg_t pdhcp;
} dhcpc_state_t;
typedef struct option_val_s {
char *key;
uint16_t code;
void *val;
size_t len;
} option_val_t;
struct fd_pair { int rd; int wr; };
static uint32_t xid;
static dhcpc_state_t *state;
static struct fd_pair sigfd;
uint8_t bmacaddr[6] = {0xff, 0xff, 0xff, 0xff, 0xff, 0xff};
int set = 1;
uint8_t infomode = LOG_CONSOLE;
uint8_t raw_opt[29];
int raw_optcount = 0;
struct arg_list *x_opt;
in_addr_t server = 0;
static option_val_t *msgopt_list = NULL;
static option_val_t options_list[] = {
{"lease" , DHCP_NUM32 | 0x33, NULL, 0},
{"subnet" , DHCP_IP | 0x01, NULL, 0},
{"broadcast" , DHCP_IP | 0x1c, NULL, 0},
{"router" , DHCP_IP | 0x03, NULL, 0},
{"ipttl" , DHCP_NUM8 | 0x17, NULL, 0},
{"mtu" , DHCP_NUM16 | 0x1a, NULL, 0},
{"hostname" , DHCP_STRING | 0x0c, NULL, 0},
{"domain" , DHCP_STRING | 0x0f, NULL, 0},
{"search" , DHCP_STRLST | 0x77, NULL, 0},
{"nisdomain" , DHCP_STRING | 0x28, NULL, 0},
{"timezone" , DHCP_NUM32 | 0x02, NULL, 0},
{"tftp" , DHCP_STRING | 0x42, NULL, 0},
{"bootfile" , DHCP_STRING | 0x43, NULL, 0},
{"bootsize" , DHCP_NUM16 | 0x0d, NULL, 0},
{"rootpath" , DHCP_STRING | 0x11, NULL, 0},
{"wpad" , DHCP_STRING | 0xfc, NULL, 0},
{"serverid" , DHCP_IP | 0x36, NULL, 0},
{"message" , DHCP_STRING | 0x38, NULL, 0},
{"vlanid" , DHCP_NUM32 | 0x84, NULL, 0},
{"vlanpriority" , DHCP_NUM32 | 0x85, NULL, 0},
{"dns" , DHCP_IPLIST | 0x06, NULL, 0},
{"wins" , DHCP_IPLIST | 0x2c, NULL, 0},
{"nissrv" , DHCP_IPLIST | 0x29, NULL, 0},
{"ntpsrv" , DHCP_IPLIST | 0x2a, NULL, 0},
{"lprsrv" , DHCP_IPLIST | 0x09, NULL, 0},
{"swapsrv" , DHCP_IP | 0x10, NULL, 0},
{"routes" , DHCP_STCRTS | 0x21, NULL, 0},
{"staticroutes" , DHCP_STCRTS | 0x79, NULL, 0},
{"msstaticroutes" , DHCP_STCRTS | 0xf9, NULL, 0},
};
static struct sock_filter filter_instr[] = {
BPF_STMT(BPF_LD|BPF_B|BPF_ABS, 9),
BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, IPPROTO_UDP, 0, 6),
BPF_STMT(BPF_LD|BPF_H|BPF_ABS, 6),
BPF_JUMP(BPF_JMP|BPF_JSET|BPF_K, 0x1fff, 4, 0),
BPF_STMT(BPF_LDX|BPF_B|BPF_MSH, 0), BPF_STMT(BPF_LD|BPF_H|BPF_IND, 2),
BPF_JUMP(BPF_JMP|BPF_JEQ|BPF_K, 68, 0, 1),
BPF_STMT(BPF_RET|BPF_K, 0xffffffff), BPF_STMT(BPF_RET|BPF_K, 0),
};
static struct sock_fprog filter_prog = {
.len = ARRAY_LEN(filter_instr),
.filter = (struct sock_filter *) filter_instr,
};
// calculate options size.
static int dhcp_opt_size(uint8_t *optionptr)
{
int i = 0;
for(;optionptr[i] != 0xff; i++) if(optionptr[i] != 0x00) i += optionptr[i + 1] + 2 -1;
return i;
}
// calculates checksum for dhcp messages.
static uint16_t dhcp_checksum(void *addr, int count)
{
int32_t sum = 0;
uint16_t tmp = 0, *source = (uint16_t *)addr;
while (count > 1) {
sum += *source++;
count -= 2;
}
if (count > 0) {
*(uint8_t*)&tmp = *(uint8_t*)source;
sum += tmp;
}
while (sum >> 16) sum = (sum & 0xffff) + (sum >> 16);
return ~sum;
}
// gets information of INTERFACE and updates IFINDEX, MAC and IP
static int get_interface( char *interface, int *ifindex, uint32_t *oip, uint8_t *mac)
{
struct ifreq req;
struct sockaddr_in *ip;
int fd = xsocket(AF_INET, SOCK_RAW, IPPROTO_RAW);
req.ifr_addr.sa_family = AF_INET;
strncpy(req.ifr_name, interface, IFNAMSIZ);
req.ifr_name[IFNAMSIZ-1] = '\0';
xioctl(fd, SIOCGIFFLAGS, &req);
if (!(req.ifr_flags & IFF_UP)) return -1;
if (oip) {
xioctl(fd, SIOCGIFADDR, &req);
ip = (struct sockaddr_in*) &req.ifr_addr;
dbg("IP %s\n", inet_ntoa(ip->sin_addr));
*oip = ntohl(ip->sin_addr.s_addr);
}
if (ifindex) {
xioctl(fd, SIOCGIFINDEX, &req);
dbg("Adapter index %d\n", req.ifr_ifindex);
*ifindex = req.ifr_ifindex;
}
if (mac) {
xioctl(fd, SIOCGIFHWADDR, &req);
memcpy(mac, req.ifr_hwaddr.sa_data, 6);
dbg("MAC %02x:%02x:%02x:%02x:%02x:%02x\n", mac[0], mac[1], mac[2], mac[3], mac[4], mac[5]);
}
close(fd);
return 0;
}
static int dhcp_daemon(void)
{
int fd = open("/dev/null", O_RDWR);
if (fd < 0) fd = xcreate("/", O_RDONLY, 0666);
pid_t pid = fork();
if (pid < 0) perror_exit("DAEMON: failed to fork");
if (pid) exit(EXIT_SUCCESS);
setsid();
dup2(fd, 0);
dup2(fd, 1);
dup2(fd, 2);
if (fd > 2) xclose(fd);
return 0;
}
/*
*logs messeges to syslog or console
*opening the log is still left with applet.
*FIXME: move to more relevent lib. probably libc.c
*/
static void infomsg(uint8_t infomode, char *s, ...)
{
int used;
char *msg;
va_list p, t;
if (infomode == LOG_SILENT) return;
va_start(p, s);
va_copy(t, p);
used = vsnprintf(NULL, 0, s, t);
used++;
va_end(t);
msg = xmalloc(used);
vsnprintf(msg, used, s, p);
va_end(p);
if (infomode & LOG_SYSTEM) syslog(LOG_INFO, "%s", msg);
if (infomode & LOG_CONSOLE) printf("%s\n", msg);
free(msg);
}
/*
* Writes self PID in file PATH
* FIXME: libc implementation only writes in /var/run
* this is more generic as some implemenation may provide
* arguments to write in specific file. as dhcpd does.
*/
static void write_pid(char *path)
{
int pidfile = open(path, O_CREAT | O_WRONLY | O_TRUNC, 0666);
if (pidfile > 0) {
char pidbuf[12];
sprintf(pidbuf, "%u", (unsigned)getpid());
write(pidfile, pidbuf, strlen(pidbuf));
close(pidfile);
}
}
// String STR to UINT32 conversion strored in VAR
static long strtou32( char *str)
{
char *endptr = NULL;
int base = 10;
errno=0;
if (str[0]=='0' && (str[1]=='x' || str[1]=='X')) {
base = 16;
str+=2;
}
long ret_val = strtol(str, &endptr, base);
if (errno) return -1;
else if (endptr && (*endptr!='\0'||endptr == str)) return -1;
return ret_val;
}
// IP String STR to binary data.
static int striptovar( char *str, void *var)
{
in_addr_t addr;
if(!str) error_exit("NULL address string.");
addr = inet_addr(str);
if(addr == -1) error_exit("Wrong address %s.",str );
*((uint32_t*)(var)) = (uint32_t)addr;
return 0;
}
// String to dhcp option conversion
static int strtoopt( char *str, uint8_t optonly)
{
char *option, *valstr, *grp, *tp;
long optcode = 0, convtmp;
uint16_t flag = 0;
uint32_t mask, nip, router;
int count, size = ARRAY_LEN(options_list);
if (!*str) return 0;
option = strtok((char*)str, ":");
if (!option) return -1;
dbg("-x option : %s ", option);
optcode = strtou32(option);
if (optcode > 0 && optcode < 256) { // raw option
for (count = 0; count < size; count++) {
if ((options_list[count].code & 0X00FF) == optcode) {
flag = (options_list[count].code & 0XFF00);
break;
}
}
if (count == size) error_exit("Obsolete OR Unknown Option : %s", option);
} else { // string option
for (count = 0; count < size; count++) {
if (!strcmp(options_list[count].key, option)) {
flag = (options_list[count].code & 0XFF00);
optcode = (options_list[count].code & 0X00FF);
break;
}
}
if (count == size) error_exit("Obsolete OR Unknown Option : %s", option);
}
if (!flag || !optcode) return -1;
if (optonly) return optcode;
valstr = strtok(NULL, "\n");
if (!valstr) error_exit("option %s has no value defined.\n", option);
dbg(" value : %-20s \n ", valstr);
switch (flag) {
case DHCP_NUM32:
options_list[count].len = sizeof(uint32_t);
options_list[count].val = xmalloc(sizeof(uint32_t));
convtmp = strtou32(valstr);
if (convtmp < 0) error_exit("Invalid/wrong formated number %s", valstr);
convtmp = htonl(convtmp);
memcpy(options_list[count].val, &convtmp, sizeof(uint32_t));
break;
case DHCP_NUM16:
options_list[count].len = sizeof(uint16_t);
options_list[count].val = xmalloc(sizeof(uint16_t));
convtmp = strtou32(valstr);
if (convtmp < 0) error_exit("Invalid/malformed number %s", valstr);
convtmp = htons(convtmp);
memcpy(options_list[count].val, &convtmp, sizeof(uint16_t));
break;
case DHCP_NUM8:
options_list[count].len = sizeof(uint8_t);
options_list[count].val = xmalloc(sizeof(uint8_t));
convtmp = strtou32(valstr);
if (convtmp < 0) error_exit("Invalid/malformed number %s", valstr);
memcpy(options_list[count].val, &convtmp, sizeof(uint8_t));
break;
case DHCP_IP:
options_list[count].len = sizeof(uint32_t);
options_list[count].val = xmalloc(sizeof(uint32_t));
striptovar(valstr, options_list[count].val);
break;
case DHCP_STRING:
options_list[count].len = strlen(valstr);
options_list[count].val = strdup(valstr);
break;
case DHCP_IPLIST:
while(valstr){
options_list[count].val = xrealloc(options_list[count].val, options_list[count].len + sizeof(uint32_t));
striptovar(valstr, ((uint8_t*)options_list[count].val)+options_list[count].len);
options_list[count].len += sizeof(uint32_t);
valstr = strtok(NULL," \t");
}
break;
case DHCP_STRLST:
case DHCP_IPPLST:
break;
case DHCP_STCRTS:
/* Option binary format:
* mask [one byte, 0..32]
* ip [0..4 bytes depending on mask]
* router [4 bytes]
* may be repeated
* staticroutes 10.0.0.0/8 10.127.0.1, 10.11.12.0/24 10.11.12.1
*/
grp = strtok(valstr, ",");;
while(grp){
while(*grp == ' ' || *grp == '\t') grp++;
tp = strchr(grp, '/');
if (!tp) error_exit("malformed static route option");
*tp = '\0';
mask = strtol(++tp, &tp, 10);
if (striptovar(grp, (uint8_t*)&nip) < 0) error_exit("malformed static route option");
while(*tp == ' ' || *tp == '\t' || *tp == '-') tp++;
if (striptovar(tp, (uint8_t*)&router) < 0) error_exit("malformed static route option");
options_list[count].val = xrealloc(options_list[count].val, options_list[count].len + 1 + mask/8 + 4);
memcpy(((uint8_t*)options_list[count].val)+options_list[count].len, &mask, 1);
options_list[count].len += 1;
memcpy(((uint8_t*)options_list[count].val)+options_list[count].len, &nip, mask/8);
options_list[count].len += mask/8;
memcpy(((uint8_t*)options_list[count].val)+options_list[count].len, &router, 4);
options_list[count].len += 4;
tp = NULL;
grp = strtok(NULL, ",");
}
break;
}
return 0;
}
// Creates environment pointers from RES to use in script
static int fill_envp(dhcpc_result_t *res)
{
struct in_addr temp;
int size = ARRAY_LEN(options_list), count, ret = -1;
ret = setenv("interface", state->iface, 1);
if (!res) return ret;
if (res->ipaddr.s_addr) {
temp.s_addr = htonl(res->ipaddr.s_addr);
ret = setenv("ip", inet_ntoa(temp), 1);
if (ret) return ret;
}
if (msgopt_list) {
for (count = 0; count < size; count++) {
if ((msgopt_list[count].len == 0) || (msgopt_list[count].val == NULL)) continue;
ret = setenv(msgopt_list[count].key, (char*)msgopt_list[count].val, 1);
if (ret) return ret;
}
}
return ret;
}
// Executes Script NAME.
static void run_script(dhcpc_result_t *res, char *name)
{
volatile int error = 0;
pid_t pid;
char *argv[3];
struct stat sts;
char *script = flag_get(FLAG_s, TT.script, "/usr/share/dhcp/default.script");
if (stat(script, &sts) == -1 && errno == ENOENT) return;
if (fill_envp(res)) {
dbg("Failed to create environment variables.");
return;
}
dbg("Executing %s %s\n", script, name);
argv[0] = (char*) script;
argv[1] = (char*) name;
argv[2] = NULL;
fflush(NULL);
pid = vfork();
if (pid < 0) {
dbg("Fork failed.\n");
return;
}
if (!pid) {
execvp(argv[0], argv);
error = errno;
_exit(111);
}
if (error) {
waitpid(pid, NULL,0);
errno = error;
perror_msg("script exec failed");
}
dbg("script complete.\n");
}
// returns a randome ID
static uint32_t getxid(void)
{
uint32_t randnum;
int fd = xopen("/dev/urandom", O_RDONLY);
xreadall(fd, &randnum, sizeof(randnum));
xclose(fd);
return randnum;
}
// opens socket in raw mode.
static int mode_raw(void)
{
state->mode = MODE_OFF;
struct sockaddr_ll sock;
if (state->sockfd > 0) close(state->sockfd);
dbg("Opening raw socket on ifindex %d\n", state->ifindex);
state->sockfd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP));
if (state->sockfd < 0) {
dbg("MODE RAW : socket fail ERROR : %d\n", state->sockfd);
return -1;
}
dbg("Got raw socket fd %d\n", state->sockfd);
memset(&sock, 0, sizeof(sock));
sock.sll_family = AF_PACKET;
sock.sll_protocol = htons(ETH_P_IP);
sock.sll_ifindex = state->ifindex;
if (bind(state->sockfd, (struct sockaddr *) &sock, sizeof(sock))) {
dbg("MODE RAW : bind fail.\n");
close(state->sockfd);
return -1;
}
state->mode = MODE_RAW;
if (setsockopt(state->sockfd, SOL_SOCKET, SO_ATTACH_FILTER, &filter_prog, sizeof(filter_prog)) < 0)
dbg("MODE RAW : filter attach fail.\n");
dbg("MODE RAW : success\n");
return 0;
}
// opens UDP socket
static int mode_app(void)
{
struct sockaddr_in addr;
struct ifreq ifr;
state->mode = MODE_OFF;
if (state->sockfd > 0) close(state->sockfd);
dbg("Opening listen socket on *:%d %s\n", DHCPC_CLIENT_PORT, state->iface);
state->sockfd = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP);
if (state->sockfd < 0) {
dbg("MODE APP : socket fail ERROR: %d\n", state->sockfd);
return -1;
}
setsockopt(state->sockfd, SOL_SOCKET, SO_REUSEADDR, &set, sizeof(set));
if (setsockopt(state->sockfd, SOL_SOCKET, SO_BROADCAST, &set, sizeof(set)) == -1) {
dbg("MODE APP : brodcast failed.\n");
close(state->sockfd);
return -1;
}
strncpy(ifr.ifr_name, state->iface, IFNAMSIZ);
ifr.ifr_name[IFNAMSIZ -1] = '\0';
setsockopt(state->sockfd, SOL_SOCKET, SO_BINDTODEVICE, &ifr, sizeof(ifr));
memset(&addr, 0, sizeof(addr));
addr.sin_family = AF_INET;
addr.sin_port = htons(DHCPC_CLIENT_PORT);
addr.sin_addr.s_addr = INADDR_ANY ;
if (bind(state->sockfd, (struct sockaddr *) &addr, sizeof(addr))) {
close(state->sockfd);
dbg("MODE APP : bind failed.\n");
return -1;
}
state->mode = MODE_APP;
dbg("MODE APP : success\n");
return 0;
}
static int read_raw(void)
{
dhcp_raw_t packet;
uint16_t check;
int bytes = 0;
memset(&packet, 0, sizeof(packet));
if ((bytes = read(state->sockfd, &packet, sizeof(packet))) < 0) {
dbg("\tPacket read error, ignoring\n");
return bytes;
}
if (bytes < (int) (sizeof(packet.iph) + sizeof(packet.udph))) {
dbg("\tPacket is too short, ignoring\n");
return -2;
}
if (bytes < ntohs(packet.iph.tot_len)) {
dbg("\tOversized packet, ignoring\n");
return -2;
}
// ignore any extra garbage bytes
bytes = ntohs(packet.iph.tot_len);
// make sure its the right packet for us, and that it passes sanity checks
if (packet.iph.protocol != IPPROTO_UDP || packet.iph.version != IPVERSION
|| packet.iph.ihl != (sizeof(packet.iph) >> 2)
|| packet.udph.dest != htons(DHCPC_CLIENT_PORT)
|| ntohs(packet.udph.len) != (uint16_t)(bytes - sizeof(packet.iph))) {
dbg("\tUnrelated/bogus packet, ignoring\n");
return -2;
}
// verify IP checksum
check = packet.iph.check;
packet.iph.check = 0;
if (check != dhcp_checksum(&packet.iph, sizeof(packet.iph))) {
dbg("\tBad IP header checksum, ignoring\n");
return -2;
}
memset(&packet.iph, 0, ((size_t) &((struct iphdr *)0)->protocol));
packet.iph.tot_len = packet.udph.len;
check = packet.udph.check;
packet.udph.check = 0;
if (check && check != dhcp_checksum(&packet, bytes)) {
dbg("\tPacket with bad UDP checksum received, ignoring\n");
return -2;
}
memcpy(&state->pdhcp, &packet.dhcp, bytes - (sizeof(packet.iph) + sizeof(packet.udph)));
if (state->pdhcp.cookie != htonl(DHCP_MAGIC)) {
dbg("\tPacket with bad magic, ignoring\n");
return -2;
}
return bytes - sizeof(packet.iph) - sizeof(packet.udph);
}
static int read_app(void)
{
int ret;
memset(&state->pdhcp, 0, sizeof(dhcp_msg_t));
if ((ret = read(state->sockfd, &state->pdhcp, sizeof(dhcp_msg_t))) < 0) {
dbg("Packet read error, ignoring\n");
return ret; /* returns -1 */
}
if (state->pdhcp.cookie != htonl(DHCP_MAGIC)) {
dbg("Packet with bad magic, ignoring\n");
return -2;
}
return ret;
}
// Sends data through raw socket.
static int send_raw(void)
{
struct sockaddr_ll dest_sll;
dhcp_raw_t packet;
unsigned padding;
int fd, result = -1;
memset(&packet, 0, sizeof(dhcp_raw_t));
memcpy(&packet.dhcp, &state->pdhcp, sizeof(dhcp_msg_t));
if ((fd = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP))) < 0) {
dbg("SEND RAW: socket failed\n");
return result;
}
memset(&dest_sll, 0, sizeof(dest_sll));
dest_sll.sll_family = AF_PACKET;
dest_sll.sll_protocol = htons(ETH_P_IP);
dest_sll.sll_ifindex = state->ifindex;
dest_sll.sll_halen = 6;
memcpy(dest_sll.sll_addr, bmacaddr , 6);
if (bind(fd, (struct sockaddr *) &dest_sll, sizeof(dest_sll)) < 0) {
dbg("SEND RAW: bind failed\n");
close(fd);
return result;
}
padding = 308 - 1 - dhcp_opt_size(state->pdhcp.options);
packet.iph.protocol = IPPROTO_UDP;
packet.iph.saddr = INADDR_ANY;
packet.iph.daddr = INADDR_BROADCAST;
packet.udph.source = htons(DHCPC_CLIENT_PORT);
packet.udph.dest = htons(DHCPC_SERVER_PORT);
packet.udph.len = htons(sizeof(dhcp_raw_t) - sizeof(struct iphdr) - padding);
packet.iph.tot_len = packet.udph.len;
packet.udph.check = dhcp_checksum(&packet, sizeof(dhcp_raw_t) - padding);
packet.iph.tot_len = htons(sizeof(dhcp_raw_t) - padding);
packet.iph.ihl = sizeof(packet.iph) >> 2;
packet.iph.version = IPVERSION;
packet.iph.ttl = IPDEFTTL;
packet.iph.check = dhcp_checksum(&packet.iph, sizeof(packet.iph));
result = sendto(fd, &packet, sizeof(dhcp_raw_t) - padding, 0,
(struct sockaddr *) &dest_sll, sizeof(dest_sll));
close(fd);
if (result < 0) dbg("SEND RAW: PACKET send error\n");
return result;
}
// Sends data through UDP socket.
static int send_app(void)
{
struct sockaddr_in cli;
int fd, ret = -1;
if ((fd = socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP)) < 0) {
dbg("SEND APP: sock failed.\n");
return ret;
}
setsockopt(fd, SOL_SOCKET, SO_REUSEADDR, &set, sizeof(set));
memset(&cli, 0, sizeof(cli));
cli.sin_family = AF_INET;
cli.sin_port = htons(DHCPC_CLIENT_PORT);
cli.sin_addr.s_addr = state->pdhcp.ciaddr;
if (bind(fd, (struct sockaddr *)&cli, sizeof(cli)) == -1) {
dbg("SEND APP: bind failed.\n");
goto error_fd;
}
memset(&cli, 0, sizeof(cli));
cli.sin_family = AF_INET;
cli.sin_port = htons(DHCPC_SERVER_PORT);
cli.sin_addr.s_addr = state->serverid.s_addr;
if (connect(fd, (struct sockaddr *)&cli, sizeof(cli)) == -1) {
dbg("SEND APP: connect failed.\n");
goto error_fd;
}
int padding = 308 - 1 - dhcp_opt_size(state->pdhcp.options);
if((ret = write(fd, &state->pdhcp, sizeof(dhcp_msg_t) - padding)) < 0) {
dbg("SEND APP: write failed error %d\n", ret);
goto error_fd;
}
dbg("SEND APP: write success wrote %d\n", ret);
error_fd:
close(fd);
return ret;
}
// Generic signal handler real handling is done in main funcrion.
static void signal_handler(int sig)
{
unsigned char ch = sig;
if (write(sigfd.wr, &ch, 1) != 1) dbg("can't send signal\n");
}
// signal setup for SIGUSR1 SIGUSR2 SIGTERM
static int setup_signal()
{
if (pipe((int *)&sigfd) < 0) {
dbg("signal pipe failed\n");
return -1;
}
fcntl(sigfd.wr , F_SETFD, FD_CLOEXEC);
fcntl(sigfd.rd , F_SETFD, FD_CLOEXEC);
int flags = fcntl(sigfd.wr, F_GETFL);
fcntl(sigfd.wr, F_SETFL, flags | O_NONBLOCK);
signal(SIGUSR1, signal_handler);
signal(SIGUSR2, signal_handler);
signal(SIGTERM, signal_handler);
return 0;
}
// adds client id to dhcp packet
static uint8_t *dhcpc_addclientid(uint8_t *optptr)
{
*optptr++ = DHCP_OPTION_CLIENTID;
*optptr++ = 7;
*optptr++ = 1;
memcpy(optptr, &state->macaddr, 6);
return optptr + 6;
}
// adds messege type to dhcp packet
static uint8_t *dhcpc_addmsgtype(uint8_t *optptr, uint8_t type)
{
*optptr++ = DHCP_OPTION_MSG_TYPE;
*optptr++ = 1;
*optptr++ = type;
return optptr;
}
// adds max size to dhcp packet
static uint8_t *dhcpc_addmaxsize(uint8_t *optptr, uint16_t size)
{
*optptr++ = DHCP_OPTION_MAX_SIZE;
*optptr++ = 2;
memcpy(optptr, &size, 2);
return optptr + 2;
}
static uint8_t *dhcpc_addstropt(uint8_t *optptr, uint8_t opcode, char* str, int len)
{
*optptr++ = opcode;
*optptr++ = len;
memcpy(optptr, str, len);
return optptr + len;
}
// adds server id to dhcp packet.
static uint8_t *dhcpc_addserverid(struct in_addr *serverid, uint8_t *optptr)
{
*optptr++ = DHCP_OPTION_SERVER_ID;
*optptr++ = 4;
memcpy(optptr, &serverid->s_addr, 4);
return optptr + 4;
}
// adds requested ip address to dhcp packet.
static uint8_t *dhcpc_addreqipaddr(struct in_addr *ipaddr, uint8_t *optptr)
{
*optptr++ = DHCP_OPTION_REQ_IPADDR;
*optptr++ = 4;
memcpy(optptr, &ipaddr->s_addr, 4);
return optptr + 4;
}
// adds hostname to dhcp packet.
static uint8_t *dhcpc_addfdnname(uint8_t *optptr, char *hname)
{
int size = strlen(hname);
*optptr++ = DHCP_OPTION_FQDN;
*optptr++ = size + 3;
*optptr++ = 0x1; //flags
optptr += 2; // two blank bytes
strncpy((char*)optptr, hname, size); // name
return optptr + size;
}
// adds request options using -o,-O flag to dhcp packet
static uint8_t *dhcpc_addreqoptions(uint8_t *optptr)
{
uint8_t *len;
*optptr++ = DHCP_OPTION_REQ_LIST;
len = optptr;
*len = 0;
optptr++;
if (!flag_chk(FLAG_o)) {
*len = 4;
*optptr++ = DHCP_OPTION_SUBNET_MASK;
*optptr++ = DHCP_OPTION_ROUTER;
*optptr++ = DHCP_OPTION_DNS_SERVER;
*optptr++ = DHCP_OPTION_BROADCAST;
}
if (flag_chk(FLAG_O)) {
memcpy(optptr++, raw_opt, raw_optcount);
*len += raw_optcount;
}
return optptr;
}
static uint8_t *dhcpc_addend(uint8_t *optptr)
{
*optptr++ = DHCP_OPTION_END;
return optptr;
}
// Sets values of -x options in dhcp discover and request packet.
static uint8_t* set_xopt(uint8_t *optptr)
{
int count;
int size = ARRAY_LEN(options_list);
for (count = 0; count < size; count++) {
if ((options_list[count].len == 0) || (options_list[count].val == NULL)) continue;
*optptr++ = (uint8_t) (options_list[count].code & 0x00FF);
*optptr++ = (uint8_t) options_list[count].len;
memcpy(optptr, options_list[count].val, options_list[count].len);
optptr += options_list[count].len;
}
return optptr;
}
static uint32_t get_option_serverid (uint8_t *opt, dhcpc_result_t *presult)
{
uint32_t var = 0;
while (*opt != DHCP_OPTION_SERVER_ID) {
if (*opt == DHCP_OPTION_END) return var;
opt += opt[1] + 2;
}
memcpy(&var, opt+2, sizeof(uint32_t));
state->serverid.s_addr = var;
presult->serverid.s_addr = state->serverid.s_addr;
presult->serverid.s_addr = ntohl(presult->serverid.s_addr);
return var;
}
static uint8_t get_option_msgtype(uint8_t *opt)
{
uint32_t var = 0;
while (*opt != DHCP_OPTION_MSG_TYPE) {
if (*opt == DHCP_OPTION_END) return var;
opt += opt[1] + 2;
}
memcpy(&var, opt+2, sizeof(uint8_t));
return var;
}
static uint8_t get_option_lease(uint8_t *opt, dhcpc_result_t *presult)
{
uint32_t var = 0;
while (*opt != DHCP_OPTION_LEASE_TIME) {
if (*opt == DHCP_OPTION_END) return var;
opt += opt[1] + 2;
}
memcpy(&var, opt+2, sizeof(uint32_t));
var = htonl(var);
presult->lease_time = var;
return var;
}
// sends dhcp msg of MSGTYPE
static int dhcpc_sendmsg(int msgtype)
{
uint8_t *pend;
struct in_addr rqsd;
char *vendor;
// Create the common message header settings
memset(&state->pdhcp, 0, sizeof(dhcp_msg_t));
state->pdhcp.op = DHCP_REQUEST;
state->pdhcp.htype = DHCP_HTYPE_ETHERNET;
state->pdhcp.hlen = 6;
state->pdhcp.xid = xid;
memcpy(state->pdhcp.chaddr, state->macaddr, 6);
memset(&state->pdhcp.chaddr[6], 0, 10);
state->pdhcp.cookie = htonl(DHCP_MAGIC);;
// Add the common header options
pend = state->pdhcp.options;
pend = dhcpc_addmsgtype(pend, msgtype);
if (!flag_chk(FLAG_C)) pend = dhcpc_addclientid(pend);
// Handle the message specific settings
switch (msgtype) {
case DHCPDISCOVER: // Broadcast DISCOVER message to all servers
state->pdhcp.flags = htons(BOOTP_BROADCAST); // Broadcast bit.
if (flag_chk(FLAG_r)) {
inet_aton(TT.req_ip, &rqsd);
pend = dhcpc_addreqipaddr(&rqsd, pend);
}
pend = dhcpc_addmaxsize(pend, htons(sizeof(dhcp_raw_t)));
vendor = flag_get(FLAG_V, TT.vendor_cls, "toybox\0");
pend = dhcpc_addstropt(pend, DHCP_OPTION_VENDOR, vendor, strlen(vendor));
if (flag_chk(FLAG_H)) pend = dhcpc_addstropt(pend, DHCP_OPTION_HOST_NAME, TT.hostname, strlen(TT.hostname));
if (flag_chk(FLAG_F)) pend = dhcpc_addfdnname(pend, TT.fdn_name);
if ((!flag_chk(FLAG_o)) || flag_chk(FLAG_O)) pend = dhcpc_addreqoptions(pend);
if (flag_chk(FLAG_x)) pend = set_xopt(pend);
break;
case DHCPREQUEST: // Send REQUEST message to the server that sent the *first* OFFER
state->pdhcp.flags = htons(BOOTP_BROADCAST); // Broadcast bit.
if (state->status == STATE_RENEWING) memcpy(&state->pdhcp.ciaddr, &state->ipaddr.s_addr, 4);
pend = dhcpc_addmaxsize(pend, htons(sizeof(dhcp_raw_t)));
rqsd.s_addr = htonl(server);
pend = dhcpc_addserverid(&rqsd, pend);
pend = dhcpc_addreqipaddr(&state->ipaddr, pend);
vendor = flag_get(FLAG_V, TT.vendor_cls, "toybox\0");
pend = dhcpc_addstropt(pend, DHCP_OPTION_VENDOR, vendor, strlen(vendor));
if (flag_chk(FLAG_H)) pend = dhcpc_addstropt(pend, DHCP_OPTION_HOST_NAME, TT.hostname, strlen(TT.hostname));
if (flag_chk(FLAG_F)) pend = dhcpc_addfdnname(pend, TT.fdn_name);
if ((!flag_chk(FLAG_o)) || flag_chk(FLAG_O)) pend = dhcpc_addreqoptions(pend);
if (flag_chk(FLAG_x)) pend = set_xopt(pend);
break;
case DHCPRELEASE: // Send RELEASE message to the server.
memcpy(&state->pdhcp.ciaddr, &state->ipaddr.s_addr, 4);
rqsd.s_addr = htonl(server);
pend = dhcpc_addserverid(&rqsd, pend);
break;
default:
return -1;
}
pend = dhcpc_addend(pend);
if (state->mode == MODE_APP) return send_app();
return send_raw();
}
/*
* parses options from received dhcp packet at OPTPTR and
* stores result in PRESULT or MSGOPT_LIST
*/
static uint8_t dhcpc_parseoptions(dhcpc_result_t *presult, uint8_t *optptr)
{
uint8_t type = 0, *options, overloaded = 0;;
uint16_t flag = 0;
uint32_t convtmp = 0;
char *dest, *pfx;
struct in_addr addr;
int count, optlen, size = ARRAY_LEN(options_list);
if (flag_chk(FLAG_x)) {
if(msgopt_list){
for (count = 0; count < size; count++){
if(msgopt_list[count].val) free(msgopt_list[count].val);
msgopt_list[count].val = NULL;
msgopt_list[count].len = 0;
}
} else {
msgopt_list = xmalloc(sizeof(options_list));
memcpy(msgopt_list, options_list, sizeof(options_list));
for (count = 0; count < size; count++) {
msgopt_list[count].len = 0;
msgopt_list[count].val = NULL;
}
}
} else {
msgopt_list = options_list;
for (count = 0; count < size; count++) {
msgopt_list[count].len = 0;
if(msgopt_list[count].val) free(msgopt_list[count].val);
msgopt_list[count].val = NULL;
}
}
while (*optptr != DHCP_OPTION_END) {
if (*optptr == DHCP_OPTION_PADDING) {
optptr++;
continue;
}
if (*optptr == DHCP_OPTION_OVERLOAD) {
overloaded = optptr[2];
optptr += optptr[1] + 2;
continue;
}
for (count = 0, flag = 0; count < size; count++) {
if ((msgopt_list[count].code & 0X00FF) == *optptr) {
flag = (msgopt_list[count].code & 0XFF00);
break;
}
}
switch (flag) {
case DHCP_NUM32:
memcpy(&convtmp, &optptr[2], sizeof(uint32_t));
convtmp = htonl(convtmp);
sprintf(toybuf, "%u", convtmp);
msgopt_list[count].val = strdup(toybuf);
msgopt_list[count].len = strlen(toybuf);
break;
case DHCP_NUM16:
memcpy(&convtmp, &optptr[2], sizeof(uint16_t));
convtmp = htons(convtmp);
sprintf(toybuf, "%u", convtmp);
msgopt_list[count].val = strdup(toybuf);
msgopt_list[count].len = strlen(toybuf);
break;
case DHCP_NUM8:
memcpy(&convtmp, &optptr[2], sizeof(uint8_t));
sprintf(toybuf, "%u", convtmp);
msgopt_list[count].val = strdup(toybuf);
msgopt_list[count].len = strlen(toybuf);
break;
case DHCP_IP:
memcpy(&convtmp, &optptr[2], sizeof(uint32_t));
addr.s_addr = convtmp;
sprintf(toybuf, "%s", inet_ntoa(addr));
msgopt_list[count].val = strdup(toybuf);
msgopt_list[count].len = strlen(toybuf);
break;
case DHCP_STRING:
sprintf(toybuf, "%.*s", optptr[1], &optptr[2]);
msgopt_list[count].val = strdup(toybuf);
msgopt_list[count].len = strlen(toybuf);
break;
case DHCP_IPLIST:
optlen = optptr[1];
dest = toybuf;
while (optlen) {
memcpy(&convtmp, &optptr[2], sizeof(uint32_t));
addr.s_addr = convtmp;
dest += sprintf(dest, "%s ", inet_ntoa(addr));
optlen -= 4;
}
*(dest - 1) = '\0';
msgopt_list[count].val = strdup(toybuf);
msgopt_list[count].len = strlen(toybuf);
break;
case DHCP_STRLST: //FIXME: do smthing.
case DHCP_IPPLST:
break;
case DHCP_STCRTS:
pfx = "";
dest = toybuf;
options = &optptr[2];
optlen = optptr[1];
while (optlen >= 1 + 4) {
uint32_t nip = 0;
int bytes;
uint8_t *p_tmp;
unsigned mask = *options;
if (mask > 32) break;
optlen--;
p_tmp = (void*) &nip;
bytes = (mask + 7) / 8;
while (--bytes >= 0) {
*p_tmp++ = *options++;
optlen--;
}
if (optlen < 4) break;
dest += sprintf(dest, "%s%u.%u.%u.%u", pfx, ((uint8_t*) &nip)[0],
((uint8_t*) &nip)[1], ((uint8_t*) &nip)[2], ((uint8_t*) &nip)[3]);
pfx = " ";
dest += sprintf(dest, "/%u ", mask);
dest += sprintf(dest, "%u.%u.%u.%u", options[0], options[1], options[2], options[3]);
options += 4;
optlen -= 4;
}
msgopt_list[count].val = strdup(toybuf);
msgopt_list[count].len = strlen(toybuf);
break;
default: break;
}
optptr += optptr[1] + 2;
}
if ((overloaded == 1) || (overloaded == 3)) dhcpc_parseoptions(presult, optptr);
if ((overloaded == 2) || (overloaded == 3)) dhcpc_parseoptions(presult, optptr);
return type;
}
// parses recvd messege to check that it was for us.
static uint8_t dhcpc_parsemsg(dhcpc_result_t *presult)
{
if (state->pdhcp.op == DHCP_REPLY
&& !memcmp(state->pdhcp.chaddr, state->macaddr, 6)
&& !memcmp(&state->pdhcp.xid, &xid, sizeof(xid))) {
memcpy(&presult->ipaddr.s_addr, &state->pdhcp.yiaddr, 4);
presult->ipaddr.s_addr = ntohl(presult->ipaddr.s_addr);
return get_option_msgtype(state->pdhcp.options);
}
return 0;
}
// Sends a IP renew request.
static void renew(void)
{
infomsg(infomode, "Performing a DHCP renew");
switch (state->status) {
case STATE_INIT:
break;
case STATE_BOUND:
mode_raw();
case STATE_RENEWING: // FALLTHROUGH
case STATE_REBINDING: // FALLTHROUGH
state->status = STATE_RENEW_REQUESTED;
break;
case STATE_RENEW_REQUESTED:
run_script(NULL, "deconfig");
case STATE_REQUESTING: // FALLTHROUGH
case STATE_RELEASED: // FALLTHROUGH
mode_raw();
state->status = STATE_INIT;
break;
default: break;
}
}
// Sends a IP release request.
static void release(void)
{
int len = sizeof("255.255.255.255\0");
char buffer[len];
struct in_addr temp_addr;
mode_app();
// send release packet
if (state->status == STATE_BOUND || state->status == STATE_RENEWING || state->status == STATE_REBINDING) {
temp_addr.s_addr = htonl(server);
strncpy(buffer, inet_ntoa(temp_addr), sizeof(buffer));
buffer[len - 1] = '\0';
temp_addr.s_addr = state->ipaddr.s_addr;
infomsg( infomode, "Unicasting a release of %s to %s", inet_ntoa(temp_addr), buffer);
dhcpc_sendmsg(DHCPRELEASE);
run_script(NULL, "deconfig");
}
infomsg(infomode, "Entering released state");
close(state->sockfd);
state->sockfd = -1;
state->mode = MODE_OFF;
state->status = STATE_RELEASED;
}
static void free_option_stores(void)
{
int count, size = ARRAY_LEN(options_list);
for (count = 0; count < size; count++)
if (options_list[count].val) free(options_list[count].val);
if(flag_chk(FLAG_x)){
for (count = 0; count < size; count++)
if (msgopt_list[count].val) free(msgopt_list[count].val);
free(msgopt_list);
}
}
void dhcp_main(void)
{
struct timeval tv;
int retval, bufflen = 0;
dhcpc_result_t result;
uint8_t packets = 0, retries = 0;
uint32_t timeout = 0, waited = 0;
fd_set rfds;
xid = 0;
setlinebuf(stdout);
dbg = dummy;
if (flag_chk(FLAG_v)) dbg = xprintf;
if (flag_chk(FLAG_p)) write_pid(TT.pidfile);
retries = flag_get(FLAG_t, TT.retries, 3);
if (flag_chk(FLAG_S)) {
openlog("UDHCPC :", LOG_PID, LOG_DAEMON);
infomode |= LOG_SYSTEM;
}
infomsg(infomode, "dhcp started");
if (flag_chk(FLAG_O)) {
while (TT.req_opt) {
raw_opt[raw_optcount] = (uint8_t) strtoopt(TT.req_opt->arg, 1);
raw_optcount++;
TT.req_opt = TT.req_opt->next;
}
}
if (flag_chk(FLAG_x)) {
while (TT.pkt_opt) {
(void) strtoopt(TT.pkt_opt->arg, 0);
TT.pkt_opt = TT.pkt_opt->next;
}
}
memset(&result, 0, sizeof(dhcpc_result_t));
state = (dhcpc_state_t*) xmalloc(sizeof(dhcpc_state_t));
memset(state, 0, sizeof(dhcpc_state_t));
state->iface = flag_get(FLAG_i, TT.iface, "eth0");
if (get_interface(state->iface, &state->ifindex, NULL, state->macaddr))
perror_exit("Failed to get interface %s", state->iface);
run_script(NULL, "deconfig");
setup_signal();
state->status = STATE_INIT;
mode_raw();
fcntl(state->sockfd, F_SETFD, FD_CLOEXEC);
for (;;) {
FD_ZERO(&rfds);
if (state->sockfd >= 0) FD_SET(state->sockfd, &rfds);
FD_SET(sigfd.rd, &rfds);
tv.tv_sec = timeout - waited;
tv.tv_usec = 0;
retval = 0;
int maxfd = (sigfd.rd > state->sockfd)? sigfd.rd : state->sockfd;
dbg("select wait ....\n");
uint32_t timestmp = time(NULL);
if((retval = select(maxfd + 1, &rfds, NULL, NULL, &tv)) < 0) {
if (errno == EINTR) {
waited += (unsigned) time(NULL) - timestmp;
continue;
}
perror_exit("Error in select");
}
if (!retval) { // Timed out
if (get_interface(state->iface, &state->ifindex, NULL, state->macaddr))
error_exit("Interface lost %s\n", state->iface);
switch (state->status) {
case STATE_INIT:
if (packets < retries) {
if (!packets) xid = getxid();
run_script(NULL, "deconfig");
infomsg(infomode, "Sending discover...");
dhcpc_sendmsg(DHCPDISCOVER);
server = 0;
timeout = flag_get(FLAG_T, TT.timeout, 3);
waited = 0;
packets++;
continue;
}
lease_fail:
run_script(NULL,"leasefail");
if (flag_chk(FLAG_n)) {
infomsg(infomode, "Lease failed. Exiting");
goto ret_with_sockfd;
}
if (flag_chk(FLAG_b)) {
infomsg(infomode, "Lease failed. Going Daemon mode");
dhcp_daemon();
if (flag_chk(FLAG_p)) write_pid(TT.pidfile);
toys.optflags &= ~FLAG_b;
toys.optflags |= FLAG_f;
}
timeout = flag_get(FLAG_A, TT.tryagain, 20);
waited = 0;
packets = 0;
continue;
case STATE_REQUESTING:
if (packets < retries) {
memcpy(&state->ipaddr.s_addr,&state->pdhcp.yiaddr, 4);
dhcpc_sendmsg(DHCPREQUEST);
infomsg(infomode, "Sending select for %d.%d.%d.%d...",
(result.ipaddr.s_addr >> 24) & 0xff, (result.ipaddr.s_addr >> 16) & 0xff, (result.ipaddr.s_addr >> 8) & 0xff, (result.ipaddr.s_addr) & 0xff);
timeout = flag_get(FLAG_T, TT.timeout, 3);
waited = 0;
packets++;
continue;
}
mode_raw();
state->status = STATE_INIT;
goto lease_fail;
case STATE_BOUND:
state->status = STATE_RENEWING;
dbg("Entering renew state\n");
// FALLTHROUGH
case STATE_RENEW_REQUESTED: // FALLTHROUGH
case STATE_RENEWING:
renew_requested:
if (timeout > 60) {
dhcpc_sendmsg(DHCPREQUEST);
timeout >>= 1;
waited = 0;
continue;
}
dbg("Entering rebinding state\n");
state->status = STATE_REBINDING;
// FALLTHROUGH
case STATE_REBINDING:
mode_raw();
if (timeout > 0) {
dhcpc_sendmsg(DHCPREQUEST);
timeout >>= 1;
waited = 0;
continue;
}
infomsg(infomode, "Lease lost, entering INIT state");
run_script(NULL, "deconfig");
state->status = STATE_INIT;
timeout = 0;
waited = 0;
packets = 0;
continue;
default: break;
}
timeout = INT_MAX;
waited = 0;
continue;
}
if (FD_ISSET(sigfd.rd, &rfds)) { // Some Activity on RDFDs : is signal
unsigned char sig;
if (read(sigfd.rd, &sig, 1) != 1) {
dbg("signal read failed.\n");
continue;
}
switch (sig) {
case SIGUSR1:
infomsg(infomode, "Received SIGUSR1");
renew();
packets = 0;
waited = 0;
if (state->status == STATE_RENEW_REQUESTED) goto renew_requested;
if (state->status == STATE_INIT) timeout = 0;
continue;
case SIGUSR2:
infomsg(infomode, "Received SIGUSR2");
release();
timeout = INT_MAX;
waited = 0;
packets = 0;
continue;
case SIGTERM:
infomsg(infomode, "Received SIGTERM");
if (flag_chk(FLAG_R)) release();
goto ret_with_sockfd;
default: break;
}
}
if (FD_ISSET(state->sockfd, &rfds)) { // Some Activity on RDFDs : is socket
dbg("main sock read\n");
uint8_t msgType;
if (state->mode == MODE_RAW) bufflen = read_raw();
if (state->mode == MODE_APP) bufflen = read_app();
if (bufflen < 0) {
if (state->mode == MODE_RAW) mode_raw();
if (state->mode == MODE_APP) mode_app();
continue;
}
waited += time(NULL) - timestmp;
memset(&result, 0, sizeof(dhcpc_result_t));
msgType = dhcpc_parsemsg(&result);
if (msgType != DHCPNAK && result.ipaddr.s_addr == 0 ) continue; // no ip for me ignore
if (!msgType || !get_option_serverid(state->pdhcp.options, &result)) continue; //no server id ignore
if (msgType == DHCPOFFER && server == 0) server = result.serverid.s_addr; // select the server
if (result.serverid.s_addr != server) continue; // not from the server we requested ignore
dhcpc_parseoptions(&result, state->pdhcp.options);
get_option_lease(state->pdhcp.options, &result);
switch (state->status) {
case STATE_INIT:
if (msgType == DHCPOFFER) {
state->status = STATE_REQUESTING;
mode_raw();
timeout = 0;
waited = 0;
packets = 0;
}
continue;
case STATE_REQUESTING: // FALLTHROUGH
case STATE_RENEWING: // FALLTHROUGH
case STATE_RENEW_REQUESTED: // FALLTHROUGH
case STATE_REBINDING:
if (msgType == DHCPACK) {
timeout = result.lease_time / 2;
run_script(&result, state->status == STATE_REQUESTING ? "bound" : "renew");
state->status = STATE_BOUND;
infomsg(infomode, "Lease of %d.%d.%d.%d obtained, lease time %d from server %d.%d.%d.%d",
(result.ipaddr.s_addr >> 24) & 0xff, (result.ipaddr.s_addr >> 16) & 0xff, (result.ipaddr.s_addr >> 8) & 0xff, (result.ipaddr.s_addr) & 0xff,
result.lease_time,
(result.serverid.s_addr >> 24) & 0xff, (result.serverid.s_addr >> 16) & 0xff, (result.serverid.s_addr >> 8) & 0xff, (result.serverid.s_addr) & 0xff);
if (flag_chk(FLAG_q)) {
if (flag_chk(FLAG_R)) release();
goto ret_with_sockfd;
}
toys.optflags &= ~FLAG_n;
if (!flag_chk(FLAG_f)) {
dhcp_daemon();
toys.optflags |= FLAG_f;
if (flag_chk(FLAG_p)) write_pid(TT.pidfile);
}
waited = 0;
continue;
} else if (msgType == DHCPNAK) {
dbg("NACK received.\n");
run_script(&result, "nak");
if (state->status != STATE_REQUESTING) run_script(NULL, "deconfig");
mode_raw();
sleep(3);
state->status = STATE_INIT;
state->ipaddr.s_addr = 0;
server = 0;
timeout = 0;
packets = 0;
waited = 0;
}
continue;
default: break;
}
}
}
ret_with_sockfd:
if (CFG_TOYBOX_FREE) {
free_option_stores();
if (state->sockfd > 0) close(state->sockfd);
free(state);
}
}