The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 1 | /* |
| 2 | * Copyright 2008, The Android Open Source Project |
| 3 | * |
| 4 | * Licensed under the Apache License, Version 2.0 (the "License"); |
| 5 | * you may not use this file except in compliance with the License. |
| 6 | * You may obtain a copy of the License at |
| 7 | * |
| 8 | * http://www.apache.org/licenses/LICENSE-2.0 |
| 9 | * |
| 10 | * Unless required by applicable law or agreed to in writing, software |
| 11 | * distributed under the License is distributed on an "AS IS" BASIS, |
| 12 | * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. |
| 13 | * See the License for the specific language governing permissions and |
| 14 | * limitations under the License. |
| 15 | */ |
| 16 | |
| 17 | #include <stdlib.h> |
| 18 | #include <unistd.h> |
| 19 | #include <sys/uio.h> |
| 20 | #include <sys/socket.h> |
| 21 | #include <netinet/in.h> |
| 22 | #include <netinet/ip.h> |
| 23 | #include <netinet/udp.h> |
| 24 | #include <linux/if_packet.h> |
| 25 | #include <linux/if_ether.h> |
| 26 | #include <errno.h> |
| 27 | |
| 28 | #ifdef ANDROID |
| 29 | #define LOG_TAG "DHCP" |
| 30 | #include <cutils/log.h> |
| 31 | #else |
| 32 | #include <stdio.h> |
| 33 | #include <string.h> |
Steve Block | 8d66c49 | 2011-12-20 16:07:45 +0000 | [diff] [blame] | 34 | #define ALOGD printf |
Steve Block | ae8b56c | 2012-01-05 22:25:38 +0000 | [diff] [blame] | 35 | #define ALOGW printf |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 36 | #endif |
| 37 | |
| 38 | #include "dhcpmsg.h" |
| 39 | |
| 40 | int fatal(); |
| 41 | |
Edwin Vane | a5db95d | 2012-07-26 15:04:10 -0400 | [diff] [blame] | 42 | int open_raw_socket(const char *ifname __attribute__((unused)), uint8_t *hwaddr, int if_index) |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 43 | { |
| 44 | int s, flag; |
| 45 | struct sockaddr_ll bindaddr; |
| 46 | |
| 47 | if((s = socket(PF_PACKET, SOCK_DGRAM, htons(ETH_P_IP))) < 0) { |
| 48 | return fatal("socket(PF_PACKET)"); |
| 49 | } |
| 50 | |
| 51 | memset(&bindaddr, 0, sizeof(bindaddr)); |
| 52 | bindaddr.sll_family = AF_PACKET; |
| 53 | bindaddr.sll_protocol = htons(ETH_P_IP); |
| 54 | bindaddr.sll_halen = ETH_ALEN; |
| 55 | memcpy(bindaddr.sll_addr, hwaddr, ETH_ALEN); |
| 56 | bindaddr.sll_ifindex = if_index; |
| 57 | |
| 58 | if (bind(s, (struct sockaddr *)&bindaddr, sizeof(bindaddr)) < 0) { |
| 59 | return fatal("Cannot bind raw socket to interface"); |
| 60 | } |
| 61 | |
| 62 | return s; |
| 63 | } |
| 64 | |
| 65 | static uint32_t checksum(void *buffer, unsigned int count, uint32_t startsum) |
| 66 | { |
| 67 | uint16_t *up = (uint16_t *)buffer; |
| 68 | uint32_t sum = startsum; |
| 69 | uint32_t upper16; |
| 70 | |
| 71 | while (count > 1) { |
| 72 | sum += *up++; |
| 73 | count -= 2; |
| 74 | } |
| 75 | if (count > 0) { |
| 76 | sum += (uint16_t) *(uint8_t *)up; |
| 77 | } |
| 78 | while ((upper16 = (sum >> 16)) != 0) { |
| 79 | sum = (sum & 0xffff) + upper16; |
| 80 | } |
| 81 | return sum; |
| 82 | } |
| 83 | |
| 84 | static uint32_t finish_sum(uint32_t sum) |
| 85 | { |
| 86 | return ~sum & 0xffff; |
| 87 | } |
| 88 | |
| 89 | int send_packet(int s, int if_index, struct dhcp_msg *msg, int size, |
| 90 | uint32_t saddr, uint32_t daddr, uint32_t sport, uint32_t dport) |
| 91 | { |
| 92 | struct iphdr ip; |
| 93 | struct udphdr udp; |
| 94 | struct iovec iov[3]; |
| 95 | uint32_t udpsum; |
| 96 | uint16_t temp; |
| 97 | struct msghdr msghdr; |
| 98 | struct sockaddr_ll destaddr; |
| 99 | |
| 100 | ip.version = IPVERSION; |
| 101 | ip.ihl = sizeof(ip) >> 2; |
| 102 | ip.tos = 0; |
| 103 | ip.tot_len = htons(sizeof(ip) + sizeof(udp) + size); |
| 104 | ip.id = 0; |
| 105 | ip.frag_off = 0; |
| 106 | ip.ttl = IPDEFTTL; |
| 107 | ip.protocol = IPPROTO_UDP; |
| 108 | ip.check = 0; |
| 109 | ip.saddr = saddr; |
| 110 | ip.daddr = daddr; |
| 111 | ip.check = finish_sum(checksum(&ip, sizeof(ip), 0)); |
| 112 | |
| 113 | udp.source = htons(sport); |
| 114 | udp.dest = htons(dport); |
| 115 | udp.len = htons(sizeof(udp) + size); |
| 116 | udp.check = 0; |
| 117 | |
| 118 | /* Calculate checksum for pseudo header */ |
| 119 | udpsum = checksum(&ip.saddr, sizeof(ip.saddr), 0); |
| 120 | udpsum = checksum(&ip.daddr, sizeof(ip.daddr), udpsum); |
| 121 | temp = htons(IPPROTO_UDP); |
| 122 | udpsum = checksum(&temp, sizeof(temp), udpsum); |
| 123 | temp = udp.len; |
| 124 | udpsum = checksum(&temp, sizeof(temp), udpsum); |
| 125 | |
| 126 | /* Add in the checksum for the udp header */ |
| 127 | udpsum = checksum(&udp, sizeof(udp), udpsum); |
| 128 | |
| 129 | /* Add in the checksum for the data */ |
| 130 | udpsum = checksum(msg, size, udpsum); |
| 131 | udp.check = finish_sum(udpsum); |
| 132 | |
| 133 | iov[0].iov_base = (char *)&ip; |
| 134 | iov[0].iov_len = sizeof(ip); |
| 135 | iov[1].iov_base = (char *)&udp; |
| 136 | iov[1].iov_len = sizeof(udp); |
| 137 | iov[2].iov_base = (char *)msg; |
| 138 | iov[2].iov_len = size; |
| 139 | memset(&destaddr, 0, sizeof(destaddr)); |
| 140 | destaddr.sll_family = AF_PACKET; |
| 141 | destaddr.sll_protocol = htons(ETH_P_IP); |
| 142 | destaddr.sll_ifindex = if_index; |
| 143 | destaddr.sll_halen = ETH_ALEN; |
| 144 | memcpy(destaddr.sll_addr, "\xff\xff\xff\xff\xff\xff", ETH_ALEN); |
| 145 | |
| 146 | msghdr.msg_name = &destaddr; |
| 147 | msghdr.msg_namelen = sizeof(destaddr); |
| 148 | msghdr.msg_iov = iov; |
| 149 | msghdr.msg_iovlen = sizeof(iov) / sizeof(struct iovec); |
| 150 | msghdr.msg_flags = 0; |
| 151 | msghdr.msg_control = 0; |
| 152 | msghdr.msg_controllen = 0; |
| 153 | return sendmsg(s, &msghdr, 0); |
| 154 | } |
| 155 | |
| 156 | int receive_packet(int s, struct dhcp_msg *msg) |
| 157 | { |
| 158 | int nread; |
| 159 | int is_valid; |
| 160 | struct dhcp_packet { |
| 161 | struct iphdr ip; |
| 162 | struct udphdr udp; |
| 163 | struct dhcp_msg dhcp; |
| 164 | } packet; |
| 165 | int dhcp_size; |
| 166 | uint32_t sum; |
| 167 | uint16_t temp; |
| 168 | uint32_t saddr, daddr; |
| 169 | |
| 170 | nread = read(s, &packet, sizeof(packet)); |
| 171 | if (nread < 0) { |
| 172 | return -1; |
| 173 | } |
| 174 | /* |
| 175 | * The raw packet interface gives us all packets received by the |
| 176 | * network interface. We need to filter out all packets that are |
| 177 | * not meant for us. |
| 178 | */ |
| 179 | is_valid = 0; |
| 180 | if (nread < (int)(sizeof(struct iphdr) + sizeof(struct udphdr))) { |
| 181 | #if VERBOSE |
Steve Block | 8d66c49 | 2011-12-20 16:07:45 +0000 | [diff] [blame] | 182 | ALOGD("Packet is too small (%d) to be a UDP datagram", nread); |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 183 | #endif |
| 184 | } else if (packet.ip.version != IPVERSION || packet.ip.ihl != (sizeof(packet.ip) >> 2)) { |
| 185 | #if VERBOSE |
Steve Block | 8d66c49 | 2011-12-20 16:07:45 +0000 | [diff] [blame] | 186 | ALOGD("Not a valid IP packet"); |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 187 | #endif |
| 188 | } else if (nread < ntohs(packet.ip.tot_len)) { |
| 189 | #if VERBOSE |
Steve Block | 8d66c49 | 2011-12-20 16:07:45 +0000 | [diff] [blame] | 190 | ALOGD("Packet was truncated (read %d, needed %d)", nread, ntohs(packet.ip.tot_len)); |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 191 | #endif |
| 192 | } else if (packet.ip.protocol != IPPROTO_UDP) { |
| 193 | #if VERBOSE |
Steve Block | 8d66c49 | 2011-12-20 16:07:45 +0000 | [diff] [blame] | 194 | ALOGD("IP protocol (%d) is not UDP", packet.ip.protocol); |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 195 | #endif |
| 196 | } else if (packet.udp.dest != htons(PORT_BOOTP_CLIENT)) { |
| 197 | #if VERBOSE |
Steve Block | 8d66c49 | 2011-12-20 16:07:45 +0000 | [diff] [blame] | 198 | ALOGD("UDP dest port (%d) is not DHCP client", ntohs(packet.udp.dest)); |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 199 | #endif |
| 200 | } else { |
| 201 | is_valid = 1; |
| 202 | } |
| 203 | |
| 204 | if (!is_valid) { |
| 205 | return -1; |
| 206 | } |
| 207 | |
| 208 | /* Seems like it's probably a valid DHCP packet */ |
| 209 | /* validate IP header checksum */ |
| 210 | sum = finish_sum(checksum(&packet.ip, sizeof(packet.ip), 0)); |
| 211 | if (sum != 0) { |
Steve Block | ae8b56c | 2012-01-05 22:25:38 +0000 | [diff] [blame] | 212 | ALOGW("IP header checksum failure (0x%x)", packet.ip.check); |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 213 | return -1; |
| 214 | } |
| 215 | /* |
| 216 | * Validate the UDP checksum. |
| 217 | * Since we don't need the IP header anymore, we "borrow" it |
| 218 | * to construct the pseudo header used in the checksum calculation. |
| 219 | */ |
| 220 | dhcp_size = ntohs(packet.udp.len) - sizeof(packet.udp); |
| 221 | saddr = packet.ip.saddr; |
| 222 | daddr = packet.ip.daddr; |
| 223 | nread = ntohs(packet.ip.tot_len); |
| 224 | memset(&packet.ip, 0, sizeof(packet.ip)); |
| 225 | packet.ip.saddr = saddr; |
| 226 | packet.ip.daddr = daddr; |
| 227 | packet.ip.protocol = IPPROTO_UDP; |
| 228 | packet.ip.tot_len = packet.udp.len; |
| 229 | temp = packet.udp.check; |
| 230 | packet.udp.check = 0; |
| 231 | sum = finish_sum(checksum(&packet, nread, 0)); |
| 232 | packet.udp.check = temp; |
| 233 | if (temp != sum) { |
Steve Block | ae8b56c | 2012-01-05 22:25:38 +0000 | [diff] [blame] | 234 | ALOGW("UDP header checksum failure (0x%x should be 0x%x)", sum, temp); |
The Android Open Source Project | dd7bc33 | 2009-03-03 19:32:55 -0800 | [diff] [blame] | 235 | return -1; |
| 236 | } |
| 237 | memcpy(msg, &packet.dhcp, dhcp_size); |
| 238 | return dhcp_size; |
| 239 | } |