]> git.proxmox.com Git - mirror_frr.git/blame - ripd/ripd.c
Merge pull request #13330 from chiragshah6/fdev1
[mirror_frr.git] / ripd / ripd.c
CommitLineData
acddc0ed 1// SPDX-License-Identifier: GPL-2.0-or-later
718e3744 2/* RIP version 1 and 2.
fbf5d033 3 * Copyright (C) 2005 6WIND <alain.ritoux@6wind.com>
718e3744 4 * Copyright (C) 1997, 98, 99 Kunihiro Ishiguro <kunihiro@zebra.org>
718e3744 5 */
6
7#include <zebra.h>
8
b2d7c082 9#include "vrf.h"
718e3744 10#include "if.h"
11#include "command.h"
12#include "prefix.h"
13#include "table.h"
24a58196 14#include "frrevent.h"
718e3744 15#include "memory.h"
16#include "log.h"
17#include "stream.h"
18#include "filter.h"
19#include "sockunion.h"
1af81933 20#include "sockopt.h"
718e3744 21#include "routemap.h"
16705130 22#include "if_rmap.h"
718e3744 23#include "plist.h"
24#include "distribute.h"
0513a271 25#ifdef CRYPTO_INTERNAL
c1a03d47 26#include "md5.h"
0513a271 27#endif
718e3744 28#include "keychain.h"
edd7c245 29#include "privs.h"
77cbe4a1 30#include "lib_errors.h"
8c9226c2 31#include "northbound_cli.h"
5920b3eb 32#include "network.h"
53bb7f9b 33#include "lib/printfrr.h"
718e3744 34
35#include "ripd/ripd.h"
f80ec39e 36#include "ripd/rip_nb.h"
718e3744 37#include "ripd/rip_debug.h"
518e377f 38#include "ripd/rip_errors.h"
ae7b826a 39#include "ripd/rip_interface.h"
718e3744 40
0b3acf4f 41/* UDP receive buffer size */
42#define RIP_UDP_RCV_BUF 41600
43
bf8d3d6a
DL
44DEFINE_MGROUP(RIPD, "ripd");
45DEFINE_MTYPE_STATIC(RIPD, RIP, "RIP structure");
46DEFINE_MTYPE_STATIC(RIPD, RIP_VRF_NAME, "RIP VRF name");
47DEFINE_MTYPE_STATIC(RIPD, RIP_INFO, "RIP route info");
48DEFINE_MTYPE_STATIC(RIPD, RIP_DISTANCE, "RIP distance");
814a2585 49
718e3744 50/* Prototypes. */
d62a17ae 51static void rip_output_process(struct connected *, struct sockaddr_in *, int,
d7c0a89a 52 uint8_t);
e6685141 53static void rip_triggered_update(struct event *);
d62a17ae 54static int rip_update_jitter(unsigned long);
2826309c
RW
55static void rip_distance_table_node_cleanup(struct route_table *table,
56 struct route_node *node);
ae7b826a
RW
57static void rip_instance_enable(struct rip *rip, struct vrf *vrf, int sock);
58static void rip_instance_disable(struct rip *rip);
6b0655a2 59
03a38493
PG
60static void rip_distribute_update(struct distribute_ctx *ctx,
61 struct distribute *dist);
62
4b23867c
PG
63static void rip_if_rmap_update(struct if_rmap_ctx *ctx,
64 struct if_rmap *if_rmap);
65
718e3744 66/* RIP output routes type. */
d62a17ae 67enum { rip_all_route, rip_changed_route };
6b0655a2 68
718e3744 69/* RIP command strings. */
d62a17ae 70static const struct message rip_msg[] = {{RIP_REQUEST, "REQUEST"},
71 {RIP_RESPONSE, "RESPONSE"},
72 {RIP_TRACEON, "TRACEON"},
73 {RIP_TRACEOFF, "TRACEOFF"},
74 {RIP_POLL, "POLL"},
75 {RIP_POLL_ENTRY, "POLL ENTRY"},
76 {0}};
6b0655a2 77
ae7b826a
RW
78/* Generate rb-tree of RIP instances. */
79static inline int rip_instance_compare(const struct rip *a, const struct rip *b)
80{
81 return strcmp(a->vrf_name, b->vrf_name);
82}
83RB_GENERATE(rip_instance_head, rip, entry, rip_instance_compare)
84
85struct rip_instance_head rip_instances = RB_INITIALIZER(&rip_instances);
86
ab9939f2 87/* Utility function to set broadcast option to the socket. */
d62a17ae 88static int sockopt_broadcast(int sock)
718e3744 89{
d62a17ae 90 int ret;
91 int on = 1;
718e3744 92
d62a17ae 93 ret = setsockopt(sock, SOL_SOCKET, SO_BROADCAST, (char *)&on,
0d6f7fd6 94 sizeof(on));
d62a17ae 95 if (ret < 0) {
96 zlog_warn("can't set sockopt SO_BROADCAST to socket %d", sock);
97 return -1;
98 }
99 return 0;
718e3744 100}
101
1137aef4 102int rip_route_rte(struct rip_info *rinfo)
718e3744 103{
d62a17ae 104 return (rinfo->type == ZEBRA_ROUTE_RIP
105 && rinfo->sub_type == RIP_ROUTE_RTE);
718e3744 106}
107
d62a17ae 108static struct rip_info *rip_info_new(void)
718e3744 109{
d62a17ae 110 return XCALLOC(MTYPE_RIP_INFO, sizeof(struct rip_info));
718e3744 111}
112
d62a17ae 113void rip_info_free(struct rip_info *rinfo)
718e3744 114{
d62a17ae 115 XFREE(MTYPE_RIP_INFO, rinfo);
718e3744 116}
117
045c5389
RW
118struct rip *rip_info_get_instance(const struct rip_info *rinfo)
119{
120 return route_table_get_info(rinfo->rp->table);
121}
122
718e3744 123/* RIP route garbage collect timer. */
e6685141 124static void rip_garbage_collect(struct event *t)
718e3744 125{
d62a17ae 126 struct rip_info *rinfo;
127 struct route_node *rp;
128
e16d030c 129 rinfo = EVENT_ARG(t);
718e3744 130
d62a17ae 131 /* Off timeout timer. */
e16d030c 132 EVENT_OFF(rinfo->t_timeout);
718e3744 133
d62a17ae 134 /* Get route_node pointer. */
135 rp = rinfo->rp;
718e3744 136
d62a17ae 137 /* Unlock route_node. */
138 listnode_delete(rp->info, rinfo);
139 if (list_isempty((struct list *)rp->info)) {
6a154c88 140 list_delete((struct list **)&rp->info);
d62a17ae 141 route_unlock_node(rp);
142 }
718e3744 143
d62a17ae 144 /* Free RIP routing information. */
145 rip_info_free(rinfo);
718e3744 146}
147
045c5389 148static void rip_timeout_update(struct rip *rip, struct rip_info *rinfo);
bce8e868
LF
149
150/* Add new route to the ECMP list.
8478ae7e
LF
151 * RETURN: the new entry added in the list, or NULL if it is not the first
152 * entry and ECMP is not allowed.
bce8e868 153 */
045c5389 154struct rip_info *rip_ecmp_add(struct rip *rip, struct rip_info *rinfo_new)
718e3744 155{
d62a17ae 156 struct route_node *rp = rinfo_new->rp;
157 struct rip_info *rinfo = NULL;
158 struct list *list = NULL;
718e3744 159
d62a17ae 160 if (rp->info == NULL)
161 rp->info = list_new();
162 list = (struct list *)rp->info;
bce8e868 163
d62a17ae 164 /* If ECMP is not allowed and some entry already exists in the list,
165 * do nothing. */
166 if (listcount(list) && !rip->ecmp)
167 return NULL;
8478ae7e 168
d62a17ae 169 rinfo = rip_info_new();
170 memcpy(rinfo, rinfo_new, sizeof(struct rip_info));
171 listnode_add(list, rinfo);
bce8e868 172
d62a17ae 173 if (rip_route_rte(rinfo)) {
045c5389
RW
174 rip_timeout_update(rip, rinfo);
175 rip_zebra_ipv4_add(rip, rp);
d62a17ae 176 }
bce8e868 177
d62a17ae 178 /* Set the route change flag on the first entry. */
179 rinfo = listgetdata(listhead(list));
180 SET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
bce8e868 181
d62a17ae 182 /* Signal the output process to trigger an update (see section 2.5). */
045c5389 183 rip_event(rip, RIP_TRIGGERED_UPDATE, 0);
718e3744 184
d62a17ae 185 return rinfo;
bce8e868
LF
186}
187
188/* Replace the ECMP list with the new route.
189 * RETURN: the new entry added in the list
190 */
045c5389 191struct rip_info *rip_ecmp_replace(struct rip *rip, struct rip_info *rinfo_new)
d62a17ae 192{
193 struct route_node *rp = rinfo_new->rp;
194 struct list *list = (struct list *)rp->info;
195 struct rip_info *rinfo = NULL, *tmp_rinfo = NULL;
196 struct listnode *node = NULL, *nextnode = NULL;
197
198 if (list == NULL || listcount(list) == 0)
045c5389 199 return rip_ecmp_add(rip, rinfo_new);
d62a17ae 200
201 /* Get the first entry */
202 rinfo = listgetdata(listhead(list));
203
204 /* Learnt route replaced by a local one. Delete it from zebra. */
205 if (rip_route_rte(rinfo) && !rip_route_rte(rinfo_new))
206 if (CHECK_FLAG(rinfo->flags, RIP_RTF_FIB))
045c5389 207 rip_zebra_ipv4_delete(rip, rp);
d62a17ae 208
209 /* Re-use the first entry, and delete the others. */
91b508dc
DS
210 for (ALL_LIST_ELEMENTS(list, node, nextnode, tmp_rinfo)) {
211 if (tmp_rinfo == rinfo)
212 continue;
213
e16d030c
DS
214 EVENT_OFF(tmp_rinfo->t_timeout);
215 EVENT_OFF(tmp_rinfo->t_garbage_collect);
91b508dc
DS
216 list_delete_node(list, node);
217 rip_info_free(tmp_rinfo);
218 }
718e3744 219
e16d030c
DS
220 EVENT_OFF(rinfo->t_timeout);
221 EVENT_OFF(rinfo->t_garbage_collect);
d62a17ae 222 memcpy(rinfo, rinfo_new, sizeof(struct rip_info));
718e3744 223
d62a17ae 224 if (rip_route_rte(rinfo)) {
045c5389 225 rip_timeout_update(rip, rinfo);
d62a17ae 226 /* The ADD message implies an update. */
045c5389 227 rip_zebra_ipv4_add(rip, rp);
d62a17ae 228 }
718e3744 229
d62a17ae 230 /* Set the route change flag. */
231 SET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
718e3744 232
d62a17ae 233 /* Signal the output process to trigger an update (see section 2.5). */
045c5389 234 rip_event(rip, RIP_TRIGGERED_UPDATE, 0);
718e3744 235
d62a17ae 236 return rinfo;
bce8e868
LF
237}
238
239/* Delete one route from the ECMP list.
240 * RETURN:
241 * null - the entry is freed, and other entries exist in the list
242 * the entry - the entry is the last one in the list; its metric is set
243 * to INFINITY, and the garbage collector is started for it
244 */
045c5389 245struct rip_info *rip_ecmp_delete(struct rip *rip, struct rip_info *rinfo)
d62a17ae 246{
247 struct route_node *rp = rinfo->rp;
248 struct list *list = (struct list *)rp->info;
249
e16d030c 250 EVENT_OFF(rinfo->t_timeout);
d62a17ae 251
252 if (listcount(list) > 1) {
253 /* Some other ECMP entries still exist. Just delete this entry.
254 */
e16d030c 255 EVENT_OFF(rinfo->t_garbage_collect);
d62a17ae 256 listnode_delete(list, rinfo);
257 if (rip_route_rte(rinfo)
258 && CHECK_FLAG(rinfo->flags, RIP_RTF_FIB))
259 /* The ADD message implies the update. */
045c5389 260 rip_zebra_ipv4_add(rip, rp);
d62a17ae 261 rip_info_free(rinfo);
262 rinfo = NULL;
263 } else {
264 assert(rinfo == listgetdata(listhead(list)));
265
266 /* This is the only entry left in the list. We must keep it in
267 * the list for garbage collection time, with INFINITY metric.
268 */
269
270 rinfo->metric = RIP_METRIC_INFINITY;
271 RIP_TIMER_ON(rinfo->t_garbage_collect, rip_garbage_collect,
272 rip->garbage_time);
273
274 if (rip_route_rte(rinfo)
275 && CHECK_FLAG(rinfo->flags, RIP_RTF_FIB))
045c5389 276 rip_zebra_ipv4_delete(rip, rp);
d62a17ae 277 }
bce8e868 278
d62a17ae 279 /* Set the route change flag on the first entry. */
280 rinfo = listgetdata(listhead(list));
281 SET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
bce8e868 282
d62a17ae 283 /* Signal the output process to trigger an update (see section 2.5). */
045c5389 284 rip_event(rip, RIP_TRIGGERED_UPDATE, 0);
bce8e868 285
d62a17ae 286 return rinfo;
bce8e868
LF
287}
288
289/* Timeout RIP routes. */
e6685141 290static void rip_timeout(struct event *t)
bce8e868 291{
e16d030c 292 struct rip_info *rinfo = EVENT_ARG(t);
045c5389
RW
293 struct rip *rip = rip_info_get_instance(rinfo);
294
295 rip_ecmp_delete(rip, rinfo);
718e3744 296}
297
045c5389 298static void rip_timeout_update(struct rip *rip, struct rip_info *rinfo)
718e3744 299{
d62a17ae 300 if (rinfo->metric != RIP_METRIC_INFINITY) {
e16d030c 301 EVENT_OFF(rinfo->t_timeout);
907a2395
DS
302 event_add_timer(master, rip_timeout, rinfo, rip->timeout_time,
303 &rinfo->t_timeout);
d62a17ae 304 }
305}
306
307static int rip_filter(int rip_distribute, struct prefix_ipv4 *p,
308 struct rip_interface *ri)
309{
310 struct distribute *dist;
311 struct access_list *alist;
312 struct prefix_list *plist;
313 int distribute = rip_distribute == RIP_FILTER_OUT ? DISTRIBUTE_V4_OUT
314 : DISTRIBUTE_V4_IN;
315 const char *inout = rip_distribute == RIP_FILTER_OUT ? "out" : "in";
316
317 /* Input distribute-list filtering. */
91b508dc
DS
318 if (ri->list[rip_distribute] &&
319 access_list_apply(ri->list[rip_distribute], (struct prefix *)p) ==
320 FILTER_DENY) {
321 if (IS_RIP_DEBUG_PACKET)
322 zlog_debug("%pFX filtered by distribute %s", p, inout);
323 return -1;
718e3744 324 }
91b508dc
DS
325
326 if (ri->prefix[rip_distribute] &&
327 prefix_list_apply(ri->prefix[rip_distribute], (struct prefix *)p) ==
328 PREFIX_DENY) {
329 if (IS_RIP_DEBUG_PACKET)
330 zlog_debug("%pFX filtered by prefix-list %s", p, inout);
331 return -1;
718e3744 332 }
d62a17ae 333
334 /* All interface filter check. */
045c5389 335 dist = distribute_lookup(ri->rip->distribute_ctx, NULL);
91b508dc
DS
336 if (!dist)
337 return 0;
d62a17ae 338
91b508dc
DS
339 if (dist->list[distribute]) {
340 alist = access_list_lookup(AFI_IP, dist->list[distribute]);
341
342 if (alist) {
343 if (access_list_apply(alist, (struct prefix *)p) ==
344 FILTER_DENY) {
345 if (IS_RIP_DEBUG_PACKET)
346 zlog_debug(
347 "%pFX filtered by distribute %s",
348 p, inout);
349 return -1;
d62a17ae 350 }
351 }
91b508dc
DS
352 }
353 if (dist->prefix[distribute]) {
354 plist = prefix_list_lookup(AFI_IP, dist->prefix[distribute]);
355
356 if (plist) {
357 if (prefix_list_apply(plist, (struct prefix *)p) ==
358 PREFIX_DENY) {
359 if (IS_RIP_DEBUG_PACKET)
360 zlog_debug(
361 "%pFX filtered by prefix-list %s",
362 p, inout);
363 return -1;
d62a17ae 364 }
365 }
366 }
91b508dc 367
d62a17ae 368 return 0;
718e3744 369}
370
371/* Check nexthop address validity. */
045c5389 372static int rip_nexthop_check(struct rip *rip, struct in_addr *addr)
718e3744 373{
d62a17ae 374 struct interface *ifp;
f4e14fdb 375 struct listnode *cnode;
d62a17ae 376 struct connected *ifc;
377 struct prefix *p;
718e3744 378
d62a17ae 379 /* If nexthop address matches local configured address then it is
380 invalid nexthop. */
b2d7c082 381
ae7b826a 382 FOR_ALL_INTERFACES (rip->vrf, ifp) {
d62a17ae 383 for (ALL_LIST_ELEMENTS_RO(ifp->connected, cnode, ifc)) {
384 p = ifc->address;
718e3744 385
d62a17ae 386 if (p->family == AF_INET
387 && IPV4_ADDR_SAME(&p->u.prefix4, addr))
388 return -1;
389 }
718e3744 390 }
d62a17ae 391 return 0;
718e3744 392}
393
394/* RIP add route to routing table. */
d62a17ae 395static void rip_rte_process(struct rte *rte, struct sockaddr_in *from,
396 struct interface *ifp)
397{
045c5389 398 struct rip *rip;
d62a17ae 399 int ret;
400 struct prefix_ipv4 p;
401 struct route_node *rp;
402 struct rip_info *rinfo = NULL, newinfo;
403 struct rip_interface *ri;
404 struct in_addr *nexthop;
405 int same = 0;
406 unsigned char old_dist, new_dist;
407 struct list *list = NULL;
408 struct listnode *node = NULL;
409
410 /* Make prefix structure. */
411 memset(&p, 0, sizeof(struct prefix_ipv4));
412 p.family = AF_INET;
413 p.prefix = rte->prefix;
414 p.prefixlen = ip_masklen(rte->mask);
415
416 /* Make sure mask is applied. */
417 apply_mask_ipv4(&p);
418
d62a17ae 419 ri = ifp->info;
045c5389 420 rip = ri->rip;
718e3744 421
045c5389 422 /* Apply input filters. */
d62a17ae 423 ret = rip_filter(RIP_FILTER_IN, &p, ri);
424 if (ret < 0)
425 return;
426
427 memset(&newinfo, 0, sizeof(newinfo));
428 newinfo.type = ZEBRA_ROUTE_RIP;
429 newinfo.sub_type = RIP_ROUTE_RTE;
dd127197 430 newinfo.nh.gate.ipv4 = rte->nexthop;
d62a17ae 431 newinfo.from = from->sin_addr;
dd127197
DS
432 newinfo.nh.ifindex = ifp->ifindex;
433 newinfo.nh.type = NEXTHOP_TYPE_IPV4_IFINDEX;
d62a17ae 434 newinfo.metric = rte->metric;
435 newinfo.metric_out = rte->metric; /* XXX */
436 newinfo.tag = ntohs(rte->tag); /* XXX */
437
438 /* Modify entry according to the interface routemap. */
439 if (ri->routemap[RIP_FILTER_IN]) {
d62a17ae 440 /* The object should be of the type of rip_info */
441 ret = route_map_apply(ri->routemap[RIP_FILTER_IN],
1782514f 442 (struct prefix *)&p, &newinfo);
d62a17ae 443
444 if (ret == RMAP_DENYMATCH) {
445 if (IS_RIP_DEBUG_PACKET)
446 zlog_debug(
53bb7f9b
MS
447 "RIP %pFX is filtered by route-map in",
448 &p);
d62a17ae 449 return;
450 }
451
452 /* Get back the object */
453 rte->nexthop = newinfo.nexthop_out;
454 rte->tag = htons(newinfo.tag_out); /* XXX */
996c9314
LB
455 rte->metric = newinfo.metric_out; /* XXX: the routemap uses the
456 metric_out field */
d62a17ae 457 }
458
459 /* Once the entry has been validated, update the metric by
ab9939f2 460 adding the cost of the network on which the message
d62a17ae 461 arrived. If the result is greater than infinity, use infinity
462 (RFC2453 Sec. 3.9.2) */
463 /* Zebra ripd can handle offset-list in. */
464 ret = rip_offset_list_apply_in(&p, ifp, &rte->metric);
718e3744 465
d62a17ae 466 /* If offset-list does not modify the metric use interface's
467 metric. */
468 if (!ret)
469 rte->metric += ifp->metric ? ifp->metric : 1;
718e3744 470
d62a17ae 471 if (rte->metric > RIP_METRIC_INFINITY)
472 rte->metric = RIP_METRIC_INFINITY;
473
474 /* Set nexthop pointer. */
3a6290bd 475 if (rte->nexthop.s_addr == INADDR_ANY)
d62a17ae 476 nexthop = &from->sin_addr;
477 else
478 nexthop = &rte->nexthop;
479
480 /* Check if nexthop address is myself, then do nothing. */
045c5389 481 if (rip_nexthop_check(rip, nexthop) < 0) {
d62a17ae 482 if (IS_RIP_DEBUG_PACKET)
53bb7f9b
MS
483 zlog_debug("Nexthop address %pI4 is myself",
484 nexthop);
d62a17ae 485 return;
486 }
487
488 /* Get index for the prefix. */
489 rp = route_node_get(rip->table, (struct prefix *)&p);
490
491 newinfo.rp = rp;
dd127197
DS
492 newinfo.nh.gate.ipv4 = *nexthop;
493 newinfo.nh.type = NEXTHOP_TYPE_IPV4;
d62a17ae 494 newinfo.metric = rte->metric;
495 newinfo.tag = ntohs(rte->tag);
045c5389 496 newinfo.distance = rip_distance_apply(rip, &newinfo);
d62a17ae 497
498 new_dist = newinfo.distance ? newinfo.distance
499 : ZEBRA_RIP_DISTANCE_DEFAULT;
500
501 /* Check to see whether there is already RIP route on the table. */
502 if ((list = rp->info) != NULL)
503 for (ALL_LIST_ELEMENTS_RO(list, node, rinfo)) {
504 /* Need to compare with redistributed entry or local
505 * entry */
506 if (!rip_route_rte(rinfo))
507 break;
508
509 if (IPV4_ADDR_SAME(&rinfo->from, &from->sin_addr)
dd127197 510 && IPV4_ADDR_SAME(&rinfo->nh.gate.ipv4, nexthop))
d62a17ae 511 break;
512
91b508dc
DS
513 if (listnextnode(node))
514 continue;
d62a17ae 515
91b508dc 516 /* Not found in the list */
d62a17ae 517
91b508dc
DS
518 if (rte->metric > rinfo->metric) {
519 /* New route has a greater metric.
520 * Discard it. */
521 route_unlock_node(rp);
522 return;
523 }
d62a17ae 524
91b508dc
DS
525 if (rte->metric < rinfo->metric)
526 /* New route has a smaller metric.
527 * Replace the ECMP list
528 * with the new one in below. */
529 break;
530
531 /* Metrics are same. We compare the distances.
532 */
533 old_dist = rinfo->distance ? rinfo->distance
d62a17ae 534 : ZEBRA_RIP_DISTANCE_DEFAULT;
535
91b508dc
DS
536 if (new_dist > old_dist) {
537 /* New route has a greater distance.
538 * Discard it. */
539 route_unlock_node(rp);
540 return;
541 }
d62a17ae 542
91b508dc
DS
543 if (new_dist < old_dist)
544 /* New route has a smaller distance.
545 * Replace the ECMP list
546 * with the new one in below. */
547 break;
d62a17ae 548
91b508dc
DS
549 /* Metrics and distances are both same. Keep
550 * "rinfo" null and
551 * the new route is added in the ECMP list in
552 * below. */
718e3744 553 }
d62a17ae 554
555 if (rinfo) {
556 /* Local static route. */
557 if (rinfo->type == ZEBRA_ROUTE_RIP
558 && ((rinfo->sub_type == RIP_ROUTE_STATIC)
559 || (rinfo->sub_type == RIP_ROUTE_DEFAULT))
560 && rinfo->metric != RIP_METRIC_INFINITY) {
561 route_unlock_node(rp);
562 return;
718e3744 563 }
d62a17ae 564
565 /* Redistributed route check. */
566 if (rinfo->type != ZEBRA_ROUTE_RIP
567 && rinfo->metric != RIP_METRIC_INFINITY) {
568 old_dist = rinfo->distance;
569 /* Only routes directly connected to an interface
570 * (nexthop == 0)
571 * may have a valid NULL distance */
3a6290bd 572 if (rinfo->nh.gate.ipv4.s_addr != INADDR_ANY)
d62a17ae 573 old_dist = old_dist
574 ? old_dist
575 : ZEBRA_RIP_DISTANCE_DEFAULT;
576 /* If imported route does not have STRICT precedence,
577 mark it as a ghost */
578 if (new_dist <= old_dist
579 && rte->metric != RIP_METRIC_INFINITY)
045c5389 580 rip_ecmp_replace(rip, &newinfo);
d62a17ae 581
582 route_unlock_node(rp);
583 return;
718e3744 584 }
d62a17ae 585 }
586
587 if (!rinfo) {
588 if (rp->info)
589 route_unlock_node(rp);
590
591 /* Now, check to see whether there is already an explicit route
592 for the destination prefix. If there is no such route, add
593 this route to the routing table, unless the metric is
594 infinity (there is no point in adding a route which
595 unusable). */
596 if (rte->metric != RIP_METRIC_INFINITY)
045c5389 597 rip_ecmp_add(rip, &newinfo);
d62a17ae 598 } else {
599 /* Route is there but we are not sure the route is RIP or not.
600 */
601
602 /* If there is an existing route, compare the next hop address
603 to the address of the router from which the datagram came.
604 If this datagram is from the same router as the existing
605 route, reinitialize the timeout. */
606 same = (IPV4_ADDR_SAME(&rinfo->from, &from->sin_addr)
dd127197 607 && (rinfo->nh.ifindex == ifp->ifindex));
d62a17ae 608
609 old_dist = rinfo->distance ? rinfo->distance
610 : ZEBRA_RIP_DISTANCE_DEFAULT;
611
612 /* Next, compare the metrics. If the datagram is from the same
613 router as the existing route, and the new metric is different
614 than the old one; or, if the new metric is lower than the old
615 one, or if the tag has been changed; or if there is a route
616 with a lower administrave distance; or an update of the
617 distance on the actual route; do the following actions: */
618 if ((same && rinfo->metric != rte->metric)
619 || (rte->metric < rinfo->metric)
620 || ((same) && (rinfo->metric == rte->metric)
621 && (newinfo.tag != rinfo->tag))
622 || (old_dist > new_dist)
623 || ((old_dist != new_dist) && same)) {
624 if (listcount(list) == 1) {
625 if (newinfo.metric != RIP_METRIC_INFINITY)
045c5389 626 rip_ecmp_replace(rip, &newinfo);
d62a17ae 627 else
045c5389 628 rip_ecmp_delete(rip, rinfo);
d62a17ae 629 } else {
630 if (newinfo.metric < rinfo->metric)
045c5389 631 rip_ecmp_replace(rip, &newinfo);
d62a17ae 632 else if (newinfo.metric > rinfo->metric)
045c5389 633 rip_ecmp_delete(rip, rinfo);
d62a17ae 634 else if (new_dist < old_dist)
045c5389 635 rip_ecmp_replace(rip, &newinfo);
d62a17ae 636 else if (new_dist > old_dist)
045c5389 637 rip_ecmp_delete(rip, rinfo);
d62a17ae 638 else {
639 int update = CHECK_FLAG(rinfo->flags,
640 RIP_RTF_FIB)
641 ? 1
642 : 0;
643
644 assert(newinfo.metric
645 != RIP_METRIC_INFINITY);
646
e16d030c
DS
647 EVENT_OFF(rinfo->t_timeout);
648 EVENT_OFF(rinfo->t_garbage_collect);
d62a17ae 649 memcpy(rinfo, &newinfo,
650 sizeof(struct rip_info));
045c5389 651 rip_timeout_update(rip, rinfo);
d62a17ae 652
653 if (update)
045c5389 654 rip_zebra_ipv4_add(rip, rp);
d62a17ae 655
656 /* - Set the route change flag on the
657 * first entry. */
658 rinfo = listgetdata(listhead(list));
659 SET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
045c5389 660 rip_event(rip, RIP_TRIGGERED_UPDATE, 0);
d62a17ae 661 }
662 }
663 } else /* same & no change */
045c5389 664 rip_timeout_update(rip, rinfo);
d62a17ae 665
666 /* Unlock tempolary lock of the route. */
667 route_unlock_node(rp);
668 }
669}
670
671/* Dump RIP packet */
672static void rip_packet_dump(struct rip_packet *packet, int size,
673 const char *sndrcv)
674{
675 caddr_t lim;
676 struct rte *rte;
677 const char *command_str;
d7c0a89a
QY
678 uint8_t netmask = 0;
679 uint8_t *p;
d62a17ae 680
681 /* Set command string. */
682 if (packet->command > 0 && packet->command < RIP_COMMAND_MAX)
683 command_str = lookup_msg(rip_msg, packet->command, NULL);
684 else
685 command_str = "unknown";
686
687 /* Dump packet header. */
688 zlog_debug("%s %s version %d packet size %d", sndrcv, command_str,
689 packet->version, size);
690
691 /* Dump each routing table entry. */
692 rte = packet->rte;
693
694 for (lim = (caddr_t)packet + size; (caddr_t)rte < lim; rte++) {
695 if (packet->version == RIPv2) {
696 netmask = ip_masklen(rte->mask);
697
698 if (rte->family == htons(RIP_FAMILY_AUTH)) {
699 if (rte->tag
700 == htons(RIP_AUTH_SIMPLE_PASSWORD)) {
d7c0a89a 701 p = (uint8_t *)&rte->prefix;
d62a17ae 702
703 zlog_debug(
704 " family 0x%X type %d auth string: %s",
705 ntohs(rte->family),
706 ntohs(rte->tag), p);
707 } else if (rte->tag == htons(RIP_AUTH_MD5)) {
708 struct rip_md5_info *md5;
709
710 md5 = (struct rip_md5_info *)&packet
711 ->rte;
712
713 zlog_debug(
714 " family 0x%X type %d (MD5 authentication)",
715 ntohs(md5->family),
716 ntohs(md5->type));
717 zlog_debug(
3efd0893 718 " RIP-2 packet len %d Key ID %d Auth Data len %d",
d62a17ae 719 ntohs(md5->packet_len),
720 md5->keyid, md5->auth_len);
d7c0a89a
QY
721 zlog_debug(" Sequence Number %ld",
722 (unsigned long)ntohl(
723 md5->sequence));
d62a17ae 724 } else if (rte->tag == htons(RIP_AUTH_DATA)) {
d7c0a89a 725 p = (uint8_t *)&rte->prefix;
d62a17ae 726
727 zlog_debug(
728 " family 0x%X type %d (MD5 data)",
729 ntohs(rte->family),
730 ntohs(rte->tag));
731 zlog_debug(
3efd0893 732 " MD5: %02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X%02X",
d62a17ae 733 p[0], p[1], p[2], p[3], p[4],
734 p[5], p[6], p[7], p[8], p[9],
735 p[10], p[11], p[12], p[13],
736 p[14], p[15]);
737 } else {
738 zlog_debug(
739 " family 0x%X type %d (Unknown auth type)",
740 ntohs(rte->family),
741 ntohs(rte->tag));
742 }
743 } else
744 zlog_debug(
2e2262fe 745 " %pI4/%d -> %pI4 family %d tag %" ROUTE_TAG_PRI
d62a17ae 746 " metric %ld",
2e2262fe 747 &rte->prefix, netmask, &rte->nexthop,
d62a17ae 748 ntohs(rte->family),
749 (route_tag_t)ntohs(rte->tag),
d7c0a89a 750 (unsigned long)ntohl(rte->metric));
d62a17ae 751 } else {
2e2262fe
DS
752 zlog_debug(" %pI4 family %d tag %" ROUTE_TAG_PRI
753 " metric %ld",
754 &rte->prefix, ntohs(rte->family),
755 (route_tag_t)ntohs(rte->tag),
756 (unsigned long)ntohl(rte->metric));
718e3744 757 }
718e3744 758 }
718e3744 759}
760
761/* Check if the destination address is valid (unicast; not net 0
762 or 127) (RFC2453 Section 3.9.2 - Page 26). But we don't
763 check net 0 because we accept default route. */
d62a17ae 764static int rip_destination_check(struct in_addr addr)
718e3744 765{
d7c0a89a 766 uint32_t destination;
718e3744 767
d62a17ae 768 /* Convert to host byte order. */
769 destination = ntohl(addr.s_addr);
718e3744 770
d62a17ae 771 if (IPV4_NET127(destination))
772 return 0;
718e3744 773
d62a17ae 774 /* Net 0 may match to the default route. */
775 if (IPV4_NET0(destination) && destination != 0)
776 return 0;
718e3744 777
d62a17ae 778 /* Unicast address must belong to class A, B, C. */
779 if (IN_CLASSA(destination))
780 return 1;
781 if (IN_CLASSB(destination))
782 return 1;
783 if (IN_CLASSC(destination))
784 return 1;
718e3744 785
d62a17ae 786 return 0;
718e3744 787}
788
789/* RIP version 2 authentication. */
d62a17ae 790static int rip_auth_simple_password(struct rte *rte, struct sockaddr_in *from,
791 struct interface *ifp)
792{
793 struct rip_interface *ri;
0961ea93 794 char *auth_str = (char *)rte + offsetof(struct rte, prefix);
d62a17ae 795 int i;
796
797 /* reject passwords with zeros in the middle of the string */
0961ea93 798 for (i = strnlen(auth_str, 16); i < 16; i++) {
d62a17ae 799 if (auth_str[i] != '\0')
800 return 0;
801 }
802
803 if (IS_RIP_DEBUG_EVENT)
53bb7f9b
MS
804 zlog_debug("RIPv2 simple password authentication from %pI4",
805 &from->sin_addr);
d62a17ae 806
807 ri = ifp->info;
808
809 if (ri->auth_type != RIP_AUTH_SIMPLE_PASSWORD
810 || rte->tag != htons(RIP_AUTH_SIMPLE_PASSWORD))
811 return 0;
718e3744 812
d62a17ae 813 /* Simple password authentication. */
814 if (ri->auth_str) {
815 if (strncmp(auth_str, ri->auth_str, 16) == 0)
816 return 1;
817 }
818 if (ri->key_chain) {
819 struct keychain *keychain;
820 struct key *key;
821
822 keychain = keychain_lookup(ri->key_chain);
c4efb224 823 if (keychain == NULL || keychain->key == NULL)
d62a17ae 824 return 0;
825
826 key = key_match_for_accept(keychain, auth_str);
827 if (key)
828 return 1;
829 }
830 return 0;
718e3744 831}
832
833/* RIP version 2 authentication with MD5. */
d62a17ae 834static int rip_auth_md5(struct rip_packet *packet, struct sockaddr_in *from,
835 int length, struct interface *ifp)
836{
837 struct rip_interface *ri;
838 struct rip_md5_info *md5;
839 struct rip_md5_data *md5data;
840 struct keychain *keychain;
841 struct key *key;
0513a271
MR
842#ifdef CRYPTO_OPENSSL
843 EVP_MD_CTX *ctx;
844#elif CRYPTO_INTERNAL
d62a17ae 845 MD5_CTX ctx;
0513a271 846#endif
d7c0a89a
QY
847 uint8_t digest[RIP_AUTH_MD5_SIZE];
848 uint16_t packet_len;
5c84f238 849 char auth_str[RIP_AUTH_MD5_SIZE] = {};
d62a17ae 850
851 if (IS_RIP_DEBUG_EVENT)
53bb7f9b
MS
852 zlog_debug("RIPv2 MD5 authentication from %pI4",
853 &from->sin_addr);
718e3744 854
d62a17ae 855 ri = ifp->info;
856 md5 = (struct rip_md5_info *)&packet->rte;
857
858 /* Check auth type. */
859 if (ri->auth_type != RIP_AUTH_MD5 || md5->type != htons(RIP_AUTH_MD5))
860 return 0;
861
862 /* If the authentication length is less than 16, then it must be wrong
863 * for
864 * any interpretation of rfc2082. Some implementations also interpret
865 * this as RIP_HEADER_SIZE+ RIP_AUTH_MD5_SIZE, aka
866 * RIP_AUTH_MD5_COMPAT_SIZE.
867 */
868 if (!((md5->auth_len == RIP_AUTH_MD5_SIZE)
869 || (md5->auth_len == RIP_AUTH_MD5_COMPAT_SIZE))) {
870 if (IS_RIP_DEBUG_EVENT)
871 zlog_debug(
3efd0893 872 "RIPv2 MD5 authentication, strange authentication length field %d",
d62a17ae 873 md5->auth_len);
874 return 0;
875 }
876
877 /* grab and verify check packet length */
878 packet_len = ntohs(md5->packet_len);
718e3744 879
d62a17ae 880 if (packet_len > (length - RIP_HEADER_SIZE - RIP_AUTH_MD5_SIZE)) {
881 if (IS_RIP_DEBUG_EVENT)
882 zlog_debug(
3efd0893 883 "RIPv2 MD5 authentication, packet length field %d greater than received length %d!",
d62a17ae 884 md5->packet_len, length);
885 return 0;
886 }
887
888 /* retrieve authentication data */
d7c0a89a 889 md5data = (struct rip_md5_data *)(((uint8_t *)packet) + packet_len);
d62a17ae 890
d62a17ae 891 if (ri->key_chain) {
892 keychain = keychain_lookup(ri->key_chain);
893 if (keychain == NULL)
894 return 0;
895
896 key = key_lookup_for_accept(keychain, md5->keyid);
e65e227f 897 if (key == NULL || key->string == NULL)
d62a17ae 898 return 0;
899
b5b4f44e
IR
900 memcpy(auth_str, key->string,
901 MIN(sizeof(auth_str), strlen(key->string)));
d62a17ae 902 } else if (ri->auth_str)
b5b4f44e
IR
903 memcpy(auth_str, ri->auth_str,
904 MIN(sizeof(auth_str), strlen(ri->auth_str)));
d62a17ae 905
906 if (auth_str[0] == 0)
907 return 0;
908
909 /* MD5 digest authentication. */
0513a271
MR
910#ifdef CRYPTO_OPENSSL
911 unsigned int md5_size = RIP_AUTH_MD5_SIZE;
912 ctx = EVP_MD_CTX_new();
913 EVP_DigestInit(ctx, EVP_md5());
914 EVP_DigestUpdate(ctx, packet, packet_len + RIP_HEADER_SIZE);
915 EVP_DigestUpdate(ctx, auth_str, RIP_AUTH_MD5_SIZE);
916 EVP_DigestFinal(ctx, digest, &md5_size);
917 EVP_MD_CTX_free(ctx);
918#elif CRYPTO_INTERNAL
d62a17ae 919 memset(&ctx, 0, sizeof(ctx));
920 MD5Init(&ctx);
921 MD5Update(&ctx, packet, packet_len + RIP_HEADER_SIZE);
922 MD5Update(&ctx, auth_str, RIP_AUTH_MD5_SIZE);
923 MD5Final(digest, &ctx);
0513a271 924#endif
d62a17ae 925
926 if (memcmp(md5data->digest, digest, RIP_AUTH_MD5_SIZE) == 0)
927 return packet_len;
928 else
929 return 0;
718e3744 930}
931
b14ee00b 932/* Pick correct auth string for sends, prepare auth_str buffer for use.
933 * (left justified and padded).
934 *
935 * presumes one of ri or key is valid, and that the auth strings they point
936 * to are nul terminated. If neither are present, auth_str will be fully
937 * zero padded.
938 *
939 */
d62a17ae 940static void rip_auth_prepare_str_send(struct rip_interface *ri, struct key *key,
941 char *auth_str, int len)
718e3744 942{
d62a17ae 943 assert(ri || key);
718e3744 944
d62a17ae 945 memset(auth_str, 0, len);
946 if (key && key->string)
b5b4f44e
IR
947 memcpy(auth_str, key->string,
948 MIN((size_t)len, strlen(key->string)));
d62a17ae 949 else if (ri->auth_str)
b5b4f44e
IR
950 memcpy(auth_str, ri->auth_str,
951 MIN((size_t)len, strlen(ri->auth_str)));
718e3744 952
d62a17ae 953 return;
b14ee00b 954}
718e3744 955
b14ee00b 956/* Write RIPv2 simple password authentication information
957 *
d62a17ae 958 * auth_str is presumed to be 2 bytes and correctly prepared
b14ee00b 959 * (left justified and zero padded).
960 */
d62a17ae 961static void rip_auth_simple_write(struct stream *s, char *auth_str, int len)
b14ee00b 962{
d62a17ae 963 assert(s && len == RIP_AUTH_SIMPLE_SIZE);
964
965 stream_putw(s, RIP_FAMILY_AUTH);
966 stream_putw(s, RIP_AUTH_SIMPLE_PASSWORD);
967 stream_put(s, auth_str, RIP_AUTH_SIMPLE_SIZE);
968
969 return;
b14ee00b 970}
718e3744 971
d62a17ae 972/* write RIPv2 MD5 "authentication header"
b14ee00b 973 * (uses the auth key data field)
974 *
975 * Digest offset field is set to 0.
976 *
977 * returns: offset of the digest offset field, which must be set when
978 * length to the auth-data MD5 digest is known.
979 */
d62a17ae 980static size_t rip_auth_md5_ah_write(struct stream *s, struct rip_interface *ri,
981 struct key *key)
982{
983 size_t doff = 0;
1568e88a 984 static uint32_t seq = 0;
d62a17ae 985
986 assert(s && ri && ri->auth_type == RIP_AUTH_MD5);
987
988 /* MD5 authentication. */
989 stream_putw(s, RIP_FAMILY_AUTH);
990 stream_putw(s, RIP_AUTH_MD5);
991
992 /* MD5 AH digest offset field.
993 *
994 * Set to placeholder value here, to true value when RIP-2 Packet length
995 * is known. Actual value is set in .....().
996 */
997 doff = stream_get_endp(s);
998 stream_putw(s, 0);
999
1000 /* Key ID. */
1001 if (key)
1002 stream_putc(s, key->index % 256);
1003 else
1004 stream_putc(s, 1);
1005
1006 /* Auth Data Len. Set 16 for MD5 authentication data. Older ripds
1007 * however expect RIP_HEADER_SIZE + RIP_AUTH_MD5_SIZE so we allow for
1008 * this
1009 * to be configurable.
1010 */
1011 stream_putc(s, ri->md5_auth_len);
1012
1013 /* Sequence Number (non-decreasing). */
1014 /* RFC2080: The value used in the sequence number is
1015 arbitrary, but two suggestions are the time of the
1016 message's creation or a simple message counter. */
1568e88a 1017 stream_putl(s, ++seq);
d62a17ae 1018
1019 /* Reserved field must be zero. */
1020 stream_putl(s, 0);
1021 stream_putl(s, 0);
1022
1023 return doff;
b14ee00b 1024}
1025
1026/* If authentication is in used, write the appropriate header
1027 * returns stream offset to which length must later be written
1028 * or 0 if this is not required
1029 */
d62a17ae 1030static size_t rip_auth_header_write(struct stream *s, struct rip_interface *ri,
1031 struct key *key, char *auth_str, int len)
1032{
1033 assert(ri->auth_type != RIP_NO_AUTH);
1034
1035 switch (ri->auth_type) {
1036 case RIP_AUTH_SIMPLE_PASSWORD:
1037 rip_auth_prepare_str_send(ri, key, auth_str, len);
1038 rip_auth_simple_write(s, auth_str, len);
1039 return 0;
1040 case RIP_AUTH_MD5:
1041 return rip_auth_md5_ah_write(s, ri, key);
1042 }
1043 assert(1);
1044 return 0;
b14ee00b 1045}
1046
1047/* Write RIPv2 MD5 authentication data trailer */
d62a17ae 1048static void rip_auth_md5_set(struct stream *s, struct rip_interface *ri,
1049 size_t doff, char *auth_str, int authlen)
1050{
1051 unsigned long len;
0513a271
MR
1052#ifdef CRYPTO_OPENSSL
1053 EVP_MD_CTX *ctx;
1054#elif CRYPTO_INTERNAL
d62a17ae 1055 MD5_CTX ctx;
0513a271 1056#endif
d62a17ae 1057 unsigned char digest[RIP_AUTH_MD5_SIZE];
1058
1059 /* Make it sure this interface is configured as MD5
1060 authentication. */
1061 assert((ri->auth_type == RIP_AUTH_MD5)
1062 && (authlen == RIP_AUTH_MD5_SIZE));
1063 assert(doff > 0);
1064
1065 /* Get packet length. */
1066 len = stream_get_endp(s);
1067
1068 /* Check packet length. */
1069 if (len < (RIP_HEADER_SIZE + RIP_RTE_SIZE)) {
99404729 1070 flog_err(EC_RIP_PACKET,
1071 "%s: packet length %ld is less than minimum length.",
1072 __func__, len);
d62a17ae 1073 return;
1074 }
1075
1076 /* Set the digest offset length in the header */
1077 stream_putw_at(s, doff, len);
1078
1079 /* Set authentication data. */
1080 stream_putw(s, RIP_FAMILY_AUTH);
1081 stream_putw(s, RIP_AUTH_DATA);
1082
1083 /* Generate a digest for the RIP packet. */
0513a271
MR
1084#ifdef CRYPTO_OPENSSL
1085 unsigned int md5_size = RIP_AUTH_MD5_SIZE;
1086 ctx = EVP_MD_CTX_new();
1087 EVP_DigestInit(ctx, EVP_md5());
1088 EVP_DigestUpdate(ctx, STREAM_DATA(s), stream_get_endp(s));
1089 EVP_DigestUpdate(ctx, auth_str, RIP_AUTH_MD5_SIZE);
1090 EVP_DigestFinal(ctx, digest, &md5_size);
1091 EVP_MD_CTX_free(ctx);
1092#elif CRYPTO_INTERNAL
d62a17ae 1093 memset(&ctx, 0, sizeof(ctx));
1094 MD5Init(&ctx);
1095 MD5Update(&ctx, STREAM_DATA(s), stream_get_endp(s));
1096 MD5Update(&ctx, auth_str, RIP_AUTH_MD5_SIZE);
1097 MD5Final(digest, &ctx);
0513a271 1098#endif
d62a17ae 1099
1100 /* Copy the digest to the packet. */
1101 stream_write(s, digest, RIP_AUTH_MD5_SIZE);
718e3744 1102}
1103
1104/* RIP routing information. */
d62a17ae 1105static void rip_response_process(struct rip_packet *packet, int size,
1106 struct sockaddr_in *from,
1107 struct connected *ifc)
1108{
045c5389
RW
1109 struct rip_interface *ri = ifc->ifp->info;
1110 struct rip *rip = ri->rip;
d62a17ae 1111 caddr_t lim;
1112 struct rte *rte;
1113 struct prefix_ipv4 ifaddr;
1114 struct prefix_ipv4 ifaddrclass;
1115 int subnetted;
1116
1117 memset(&ifaddr, 0, sizeof(ifaddr));
1118 /* We don't know yet. */
1119 subnetted = -1;
1120
1121 /* The Response must be ignored if it is not from the RIP
1122 port. (RFC2453 - Sec. 3.9.2)*/
1123 if (from->sin_port != htons(RIP_PORT_DEFAULT)) {
1124 zlog_info("response doesn't come from RIP port: %d",
1125 from->sin_port);
045c5389 1126 rip_peer_bad_packet(rip, from);
d62a17ae 1127 return;
718e3744 1128 }
1129
d62a17ae 1130 /* The datagram's IPv4 source address should be checked to see
1131 whether the datagram is from a valid neighbor; the source of the
1132 datagram must be on a directly connected network (RFC2453 - Sec.
1133 3.9.2) */
ae7b826a
RW
1134 if (if_lookup_address((void *)&from->sin_addr, AF_INET,
1135 rip->vrf->vrf_id)
d62a17ae 1136 == NULL) {
1137 zlog_info(
53bb7f9b
MS
1138 "This datagram doesn't come from a valid neighbor: %pI4",
1139 &from->sin_addr);
045c5389 1140 rip_peer_bad_packet(rip, from);
d62a17ae 1141 return;
718e3744 1142 }
1143
d62a17ae 1144 /* It is also worth checking to see whether the response is from one
1145 of the router's own addresses. */
1146
1147 ; /* Alredy done in rip_read () */
1148
1149 /* Update RIP peer. */
045c5389 1150 rip_peer_update(rip, from, packet->version);
d62a17ae 1151
1152 /* Set RTE pointer. */
1153 rte = packet->rte;
1154
1155 for (lim = (caddr_t)packet + size; (caddr_t)rte < lim; rte++) {
1156 /* RIPv2 authentication check. */
1157 /* If the Address Family Identifier of the first (and only the
1158 first) entry in the message is 0xFFFF, then the remainder of
1159 the entry contains the authentication. */
1160 /* If the packet gets here it means authentication enabled */
1161 /* Check is done in rip_read(). So, just skipping it */
1162 if (packet->version == RIPv2 && rte == packet->rte
1163 && rte->family == htons(RIP_FAMILY_AUTH))
1164 continue;
1165
1166 if (rte->family != htons(AF_INET)) {
1167 /* Address family check. RIP only supports AF_INET. */
53bb7f9b 1168 zlog_info("Unsupported family %d from %pI4",
d62a17ae 1169 ntohs(rte->family),
53bb7f9b 1170 &from->sin_addr);
d62a17ae 1171 continue;
718e3744 1172 }
d62a17ae 1173
1174 /* - is the destination address valid (e.g., unicast; not net 0
1175 or 127) */
1176 if (!rip_destination_check(rte->prefix)) {
1177 zlog_info(
1178 "Network is net 0 or net 127 or it is not unicast network");
045c5389 1179 rip_peer_bad_route(rip, from);
d62a17ae 1180 continue;
718e3744 1181 }
1182
d62a17ae 1183 /* Convert metric value to host byte order. */
1184 rte->metric = ntohl(rte->metric);
718e3744 1185
d62a17ae 1186 /* - is the metric valid (i.e., between 1 and 16, inclusive) */
1187 if (!(rte->metric >= 1 && rte->metric <= 16)) {
1188 zlog_info("Route's metric is not in the 1-16 range.");
045c5389 1189 rip_peer_bad_route(rip, from);
d62a17ae 1190 continue;
1191 }
718e3744 1192
d62a17ae 1193 /* RIPv1 does not have nexthop value. */
975a328e
DA
1194 if (packet->version == RIPv1
1195 && rte->nexthop.s_addr != INADDR_ANY) {
53bb7f9b
MS
1196 zlog_info("RIPv1 packet with nexthop value %pI4",
1197 &rte->nexthop);
045c5389 1198 rip_peer_bad_route(rip, from);
d62a17ae 1199 continue;
1200 }
718e3744 1201
d62a17ae 1202 /* That is, if the provided information is ignored, a possibly
1203 sub-optimal, but absolutely valid, route may be taken. If
1204 the received Next Hop is not directly reachable, it should be
1205 treated as 0.0.0.0. */
975a328e
DA
1206 if (packet->version == RIPv2
1207 && rte->nexthop.s_addr != INADDR_ANY) {
d7c0a89a 1208 uint32_t addrval;
d62a17ae 1209
1210 /* Multicast address check. */
1211 addrval = ntohl(rte->nexthop.s_addr);
1212 if (IN_CLASSD(addrval)) {
1213 zlog_info(
53bb7f9b
MS
1214 "Nexthop %pI4 is multicast address, skip this rte",
1215 &rte->nexthop);
d62a17ae 1216 continue;
1217 }
1218
1219 if (!if_lookup_address((void *)&rte->nexthop, AF_INET,
ae7b826a 1220 rip->vrf->vrf_id)) {
d62a17ae 1221 struct route_node *rn;
1222 struct rip_info *rinfo;
1223
1224 rn = route_node_match_ipv4(rip->table,
1225 &rte->nexthop);
1226
1227 if (rn) {
1228 rinfo = rn->info;
1229
1230 if (rinfo->type == ZEBRA_ROUTE_RIP
1231 && rinfo->sub_type
1232 == RIP_ROUTE_RTE) {
1233 if (IS_RIP_DEBUG_EVENT)
1234 zlog_debug(
53bb7f9b
MS
1235 "Next hop %pI4 is on RIP network. Set nexthop to the packet's originator",
1236 &rte->nexthop);
d62a17ae 1237 rte->nexthop = rinfo->from;
1238 } else {
1239 if (IS_RIP_DEBUG_EVENT)
1240 zlog_debug(
53bb7f9b
MS
1241 "Next hop %pI4 is not directly reachable. Treat it as 0.0.0.0",
1242 &rte->nexthop);
975a328e
DA
1243 rte->nexthop.s_addr =
1244 INADDR_ANY;
d62a17ae 1245 }
1246
1247 route_unlock_node(rn);
1248 } else {
1249 if (IS_RIP_DEBUG_EVENT)
1250 zlog_debug(
53bb7f9b
MS
1251 "Next hop %pI4 is not directly reachable. Treat it as 0.0.0.0",
1252 &rte->nexthop);
975a328e 1253 rte->nexthop.s_addr = INADDR_ANY;
d62a17ae 1254 }
1255 }
1256 }
718e3744 1257
d62a17ae 1258 /* For RIPv1, there won't be a valid netmask.
91b508dc
DS
1259 * This is a best guess at the masks. If everyone was using old
1260 * Ciscos before the 'ip subnet zero' option, it would be almost
1261 * right too :-)
1262 *
1263 * Cisco summarize ripv1 advertisements to the classful boundary
1264 * (/16 for class B's) except when the RIP packet does to inside
1265 * the classful network in question.
1266 */
975a328e
DA
1267 if ((packet->version == RIPv1
1268 && rte->prefix.s_addr != INADDR_ANY)
d62a17ae 1269 || (packet->version == RIPv2
975a328e
DA
1270 && (rte->prefix.s_addr != INADDR_ANY
1271 && rte->mask.s_addr == INADDR_ANY))) {
d7c0a89a 1272 uint32_t destination;
d62a17ae 1273
1274 if (subnetted == -1) {
f51eeb86 1275 memcpy(&ifaddr, ifc->address, sizeof(ifaddr));
d62a17ae 1276 memcpy(&ifaddrclass, &ifaddr,
f51eeb86 1277 sizeof(ifaddrclass));
d62a17ae 1278 apply_classful_mask_ipv4(&ifaddrclass);
1279 subnetted = 0;
1280 if (ifaddr.prefixlen > ifaddrclass.prefixlen)
1281 subnetted = 1;
1282 }
1283
1284 destination = ntohl(rte->prefix.s_addr);
1285
1286 if (IN_CLASSA(destination))
1287 masklen2ip(8, &rte->mask);
1288 else if (IN_CLASSB(destination))
1289 masklen2ip(16, &rte->mask);
1290 else if (IN_CLASSC(destination))
1291 masklen2ip(24, &rte->mask);
1292
1293 if (subnetted == 1)
1294 masklen2ip(ifaddrclass.prefixlen,
1295 (struct in_addr *)&destination);
1296 if ((subnetted == 1)
1297 && ((rte->prefix.s_addr & destination)
1298 == ifaddrclass.prefix.s_addr)) {
1299 masklen2ip(ifaddr.prefixlen, &rte->mask);
1300 if ((rte->prefix.s_addr & rte->mask.s_addr)
1301 != rte->prefix.s_addr)
1302 masklen2ip(32, &rte->mask);
1303 if (IS_RIP_DEBUG_EVENT)
53bb7f9b
MS
1304 zlog_debug("Subnetted route %pI4",
1305 &rte->prefix);
d62a17ae 1306 } else {
1307 if ((rte->prefix.s_addr & rte->mask.s_addr)
1308 != rte->prefix.s_addr)
1309 continue;
1310 }
1311
1312 if (IS_RIP_DEBUG_EVENT) {
53bb7f9b
MS
1313 zlog_debug("Resultant route %pI4",
1314 &rte->prefix);
1315 zlog_debug("Resultant mask %pI4",
1316 &rte->mask);
d62a17ae 1317 }
1318 }
1319
1320 /* In case of RIPv2, if prefix in RTE is not netmask applied one
1321 ignore the entry. */
975a328e
DA
1322 if ((packet->version == RIPv2)
1323 && (rte->mask.s_addr != INADDR_ANY)
d62a17ae 1324 && ((rte->prefix.s_addr & rte->mask.s_addr)
1325 != rte->prefix.s_addr)) {
1326 zlog_warn(
53bb7f9b
MS
1327 "RIPv2 address %pI4 is not mask /%d applied one",
1328 &rte->prefix, ip_masklen(rte->mask));
045c5389 1329 rip_peer_bad_route(rip, from);
d62a17ae 1330 continue;
1331 }
1332
1333 /* Default route's netmask is ignored. */
975a328e
DA
1334 if (packet->version == RIPv2
1335 && (rte->prefix.s_addr == INADDR_ANY)
1336 && (rte->mask.s_addr != INADDR_ANY)) {
d62a17ae 1337 if (IS_RIP_DEBUG_EVENT)
1338 zlog_debug(
1339 "Default route with non-zero netmask. Set zero to netmask");
975a328e 1340 rte->mask.s_addr = INADDR_ANY;
d62a17ae 1341 }
1342
1343 /* Routing table updates. */
1344 rip_rte_process(rte, from, ifc->ifp);
718e3744 1345 }
718e3744 1346}
1347
a4e987e0 1348/* Make socket for RIP protocol. */
ae7b826a 1349int rip_create_socket(struct vrf *vrf)
d62a17ae 1350{
1351 int ret;
1352 int sock;
1353 struct sockaddr_in addr;
ae7b826a 1354 const char *vrf_dev = NULL;
d62a17ae 1355
1356 memset(&addr, 0, sizeof(struct sockaddr_in));
1357 addr.sin_family = AF_INET;
1358 addr.sin_addr.s_addr = INADDR_ANY;
6f0e3f6e 1359#ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
d62a17ae 1360 addr.sin_len = sizeof(struct sockaddr_in);
6f0e3f6e 1361#endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
d62a17ae 1362 /* sending port must always be the RIP port */
1363 addr.sin_port = htons(RIP_PORT_DEFAULT);
1364
1365 /* Make datagram socket. */
ae7b826a
RW
1366 if (vrf->vrf_id != VRF_DEFAULT)
1367 vrf_dev = vrf->name;
0cf6db21 1368 frr_with_privs(&ripd_privs) {
ae7b826a
RW
1369 sock = vrf_socket(AF_INET, SOCK_DGRAM, IPPROTO_UDP, vrf->vrf_id,
1370 vrf_dev);
1371 if (sock < 0) {
1372 flog_err_sys(EC_LIB_SOCKET,
1373 "Cannot create UDP socket: %s",
1374 safe_strerror(errno));
1375 return -1;
1376 }
d62a17ae 1377 }
1378
1379 sockopt_broadcast(sock);
1380 sockopt_reuseaddr(sock);
1381 sockopt_reuseport(sock);
1382 setsockopt_ipv4_multicast_loop(sock, 0);
78b31d5c 1383#ifdef IPTOS_PREC_INTERNETCONTROL
d62a17ae 1384 setsockopt_ipv4_tos(sock, IPTOS_PREC_INTERNETCONTROL);
78b31d5c 1385#endif
338b8e91 1386 setsockopt_so_recvbuf(sock, RIP_UDP_RCV_BUF);
a4e987e0 1387
0cf6db21 1388 frr_with_privs(&ripd_privs) {
633fc9b1
DL
1389 if ((ret = bind(sock, (struct sockaddr *)&addr, sizeof(addr)))
1390 < 0) {
53bb7f9b
MS
1391 zlog_err("%s: Can't bind socket %d to %pI4 port %d: %s",
1392 __func__, sock, &addr.sin_addr,
633fc9b1
DL
1393 (int)ntohs(addr.sin_port),
1394 safe_strerror(errno));
d62a17ae 1395
01b9e3fd
DL
1396 close(sock);
1397 return ret;
1398 }
01b9e3fd 1399 }
d62a17ae 1400
1401 return sock;
a4e987e0 1402}
1403
c49ad8f1 1404/* RIP packet send to destination address, on interface denoted by
1405 * by connected argument. NULL to argument denotes destination should be
1406 * should be RIP multicast group
1407 */
d7c0a89a 1408static int rip_send_packet(uint8_t *buf, int size, struct sockaddr_in *to,
d62a17ae 1409 struct connected *ifc)
1410{
045c5389
RW
1411 struct rip_interface *ri;
1412 struct rip *rip;
d62a17ae 1413 int ret;
1414 struct sockaddr_in sin;
e35356af
RW
1415 struct msghdr msg;
1416 struct iovec iov;
1417#ifdef GNU_LINUX
1418 struct cmsghdr *cmsgptr;
1419 char adata[256] = {};
1420 struct in_pktinfo *pkt;
1421#endif /* GNU_LINUX */
d62a17ae 1422
1423 assert(ifc != NULL);
045c5389
RW
1424 ri = ifc->ifp->info;
1425 rip = ri->rip;
d62a17ae 1426
1427 if (IS_RIP_DEBUG_PACKET) {
f69bd9da 1428#define ADDRESS_SIZE 20
d62a17ae 1429 char dst[ADDRESS_SIZE];
d62a17ae 1430
1431 if (to) {
53bb7f9b 1432 inet_ntop(AF_INET, &to->sin_addr, dst, sizeof(dst));
d62a17ae 1433 } else {
1434 sin.sin_addr.s_addr = htonl(INADDR_RIP_GROUP);
53bb7f9b 1435 inet_ntop(AF_INET, &sin.sin_addr, dst, sizeof(dst));
d62a17ae 1436 }
f69bd9da 1437#undef ADDRESS_SIZE
99404729 1438 zlog_debug("%s %pI4 > %s (%s)", __func__,
1439 &ifc->address->u.prefix4, dst, ifc->ifp->name);
d62a17ae 1440 }
1441
1442 if (CHECK_FLAG(ifc->flags, ZEBRA_IFA_SECONDARY)) {
1443 /*
1444 * ZEBRA_IFA_SECONDARY is set on linux when an interface is
91b508dc
DS
1445 * configured with multiple addresses on the same
1446 * subnet: the first address on the subnet is configured
1447 * "primary", and all subsequent addresses on that subnet
1448 * are treated as "secondary" addresses. In order to avoid
1449 * routing-table bloat on other rip listeners, we do not send
1450 * out RIP packets with ZEBRA_IFA_SECONDARY source addrs.
d62a17ae 1451 * XXX Since Linux is the only system for which the
91b508dc
DS
1452 * ZEBRA_IFA_SECONDARY flag is set, we would end up
1453 * sending a packet for a "secondary" source address on
1454 * non-linux systems.
d62a17ae 1455 */
1456 if (IS_RIP_DEBUG_PACKET)
1457 zlog_debug("duplicate dropped");
1458 return 0;
1459 }
1460
1461 /* Make destination address. */
6006b807 1462 memset(&sin, 0, sizeof(sin));
d62a17ae 1463 sin.sin_family = AF_INET;
6f0e3f6e 1464#ifdef HAVE_STRUCT_SOCKADDR_IN_SIN_LEN
d62a17ae 1465 sin.sin_len = sizeof(struct sockaddr_in);
6f0e3f6e 1466#endif /* HAVE_STRUCT_SOCKADDR_IN_SIN_LEN */
718e3744 1467
d62a17ae 1468 /* When destination is specified, use it's port and address. */
1469 if (to) {
1470 sin.sin_port = to->sin_port;
1471 sin.sin_addr = to->sin_addr;
1472 } else {
1473 sin.sin_port = htons(RIP_PORT_DEFAULT);
1474 sin.sin_addr.s_addr = htonl(INADDR_RIP_GROUP);
ae735d2d 1475
d62a17ae 1476 rip_interface_multicast_set(rip->sock, ifc);
1477 }
718e3744 1478
e35356af
RW
1479 memset(&msg, 0, sizeof(msg));
1480 msg.msg_name = (void *)&sin;
1481 msg.msg_namelen = sizeof(struct sockaddr_in);
1482 msg.msg_iov = &iov;
1483 msg.msg_iovlen = 1;
1484 iov.iov_base = buf;
1485 iov.iov_len = size;
1486
1487#ifdef GNU_LINUX
1488 msg.msg_control = (void *)adata;
1489 msg.msg_controllen = CMSG_SPACE(sizeof(struct in_pktinfo));
1490
1491 cmsgptr = (struct cmsghdr *)adata;
1492 cmsgptr->cmsg_len = CMSG_LEN(sizeof(struct in_pktinfo));
1493 cmsgptr->cmsg_level = IPPROTO_IP;
1494 cmsgptr->cmsg_type = IP_PKTINFO;
1495 pkt = (struct in_pktinfo *)CMSG_DATA(cmsgptr);
1496 pkt->ipi_ifindex = ifc->ifp->ifindex;
114918bd 1497 pkt->ipi_spec_dst.s_addr = ifc->address->u.prefix4.s_addr;
e35356af
RW
1498#endif /* GNU_LINUX */
1499
1500 ret = sendmsg(rip->sock, &msg, 0);
718e3744 1501
d62a17ae 1502 if (IS_RIP_DEBUG_EVENT)
fa930785 1503 zlog_debug("SEND to %pI4 port %d", &sin.sin_addr,
d62a17ae 1504 ntohs(sin.sin_port));
718e3744 1505
d62a17ae 1506 if (ret < 0)
1507 zlog_warn("can't send packet : %s", safe_strerror(errno));
718e3744 1508
d62a17ae 1509 return ret;
718e3744 1510}
1511
1512/* Add redistributed route to RIP table. */
045c5389
RW
1513void rip_redistribute_add(struct rip *rip, int type, int sub_type,
1514 struct prefix_ipv4 *p, struct nexthop *nh,
1515 unsigned int metric, unsigned char distance,
1516 route_tag_t tag)
d62a17ae 1517{
1518 int ret;
1519 struct route_node *rp = NULL;
1520 struct rip_info *rinfo = NULL, newinfo;
1521 struct list *list = NULL;
1522
1523 /* Redistribute route */
1524 ret = rip_destination_check(p->prefix);
1525 if (!ret)
1526 return;
1527
1528 rp = route_node_get(rip->table, (struct prefix *)p);
1529
6006b807 1530 memset(&newinfo, 0, sizeof(newinfo));
d62a17ae 1531 newinfo.type = type;
1532 newinfo.sub_type = sub_type;
d62a17ae 1533 newinfo.metric = 1;
1534 newinfo.external_metric = metric;
1535 newinfo.distance = distance;
1536 if (tag <= UINT16_MAX) /* RIP only supports 16 bit tags */
1537 newinfo.tag = tag;
1538 newinfo.rp = rp;
3f5682c8 1539 newinfo.nh = *nh;
d62a17ae 1540
1541 if ((list = rp->info) != NULL && listcount(list) != 0) {
1542 rinfo = listgetdata(listhead(list));
1543
1544 if (rinfo->type == ZEBRA_ROUTE_CONNECT
1545 && rinfo->sub_type == RIP_ROUTE_INTERFACE
1546 && rinfo->metric != RIP_METRIC_INFINITY) {
1547 route_unlock_node(rp);
1548 return;
1549 }
718e3744 1550
d62a17ae 1551 /* Manually configured RIP route check. */
1552 if (rinfo->type == ZEBRA_ROUTE_RIP
1553 && ((rinfo->sub_type == RIP_ROUTE_STATIC)
1554 || (rinfo->sub_type == RIP_ROUTE_DEFAULT))) {
1555 if (type != ZEBRA_ROUTE_RIP
1556 || ((sub_type != RIP_ROUTE_STATIC)
1557 && (sub_type != RIP_ROUTE_DEFAULT))) {
1558 route_unlock_node(rp);
1559 return;
1560 }
1561 }
1562
045c5389 1563 (void)rip_ecmp_replace(rip, &newinfo);
d62a17ae 1564 route_unlock_node(rp);
1565 } else
045c5389 1566 (void)rip_ecmp_add(rip, &newinfo);
d62a17ae 1567
1568 if (IS_RIP_DEBUG_EVENT) {
f42238f8 1569 zlog_debug("Redistribute new prefix %pFX", p);
718e3744 1570 }
1571
045c5389 1572 rip_event(rip, RIP_TRIGGERED_UPDATE, 0);
718e3744 1573}
1574
1575/* Delete redistributed route from RIP table. */
045c5389
RW
1576void rip_redistribute_delete(struct rip *rip, int type, int sub_type,
1577 struct prefix_ipv4 *p, ifindex_t ifindex)
d62a17ae 1578{
1579 int ret;
1580 struct route_node *rp;
1581 struct rip_info *rinfo;
1582
1583 ret = rip_destination_check(p->prefix);
1584 if (!ret)
1585 return;
1586
1587 rp = route_node_lookup(rip->table, (struct prefix *)p);
1588 if (rp) {
1589 struct list *list = rp->info;
1590
1591 if (list != NULL && listcount(list) != 0) {
1592 rinfo = listgetdata(listhead(list));
1593 if (rinfo != NULL && rinfo->type == type
1594 && rinfo->sub_type == sub_type
dd127197 1595 && rinfo->nh.ifindex == ifindex) {
d62a17ae 1596 /* Perform poisoned reverse. */
1597 rinfo->metric = RIP_METRIC_INFINITY;
1598 RIP_TIMER_ON(rinfo->t_garbage_collect,
1599 rip_garbage_collect,
1600 rip->garbage_time);
e16d030c 1601 EVENT_OFF(rinfo->t_timeout);
d62a17ae 1602 rinfo->flags |= RIP_RTF_CHANGED;
1603
1604 if (IS_RIP_DEBUG_EVENT)
1605 zlog_debug(
f42238f8
DS
1606 "Poison %pFX on the interface %s with an infinity metric [delete]",
1607 p,
ae7b826a
RW
1608 ifindex2ifname(
1609 ifindex,
1610 rip->vrf->vrf_id));
d62a17ae 1611
045c5389 1612 rip_event(rip, RIP_TRIGGERED_UPDATE, 0);
d62a17ae 1613 }
1614 }
1615 route_unlock_node(rp);
1616 }
718e3744 1617}
1618
1619/* Response to request called from rip_read ().*/
d62a17ae 1620static void rip_request_process(struct rip_packet *packet, int size,
1621 struct sockaddr_in *from, struct connected *ifc)
1622{
045c5389 1623 struct rip *rip;
d62a17ae 1624 caddr_t lim;
1625 struct rte *rte;
1626 struct prefix_ipv4 p;
1627 struct route_node *rp;
1628 struct rip_info *rinfo;
1629 struct rip_interface *ri;
1630
1631 /* Does not reponse to the requests on the loopback interfaces */
1632 if (if_is_loopback(ifc->ifp))
1633 return;
1634
1635 /* Check RIP process is enabled on this interface. */
1636 ri = ifc->ifp->info;
1637 if (!ri->running)
1638 return;
045c5389 1639 rip = ri->rip;
d62a17ae 1640
1641 /* When passive interface is specified, suppress responses */
1642 if (ri->passive)
1643 return;
1644
1645 /* RIP peer update. */
045c5389 1646 rip_peer_update(rip, from, packet->version);
d62a17ae 1647
1648 lim = ((caddr_t)packet) + size;
1649 rte = packet->rte;
1650
1651 /* The Request is processed entry by entry. If there are no
1652 entries, no response is given. */
1653 if (lim == (caddr_t)rte)
1654 return;
1655
1656 /* There is one special case. If there is exactly one entry in the
1657 request, and it has an address family identifier of zero and a
1658 metric of infinity (i.e., 16), then this is a request to send the
1659 entire routing table. */
1660 if (lim == ((caddr_t)(rte + 1)) && ntohs(rte->family) == 0
1661 && ntohl(rte->metric) == RIP_METRIC_INFINITY) {
1662 /* All route with split horizon */
1663 rip_output_process(ifc, from, rip_all_route, packet->version);
1664 } else {
1665 if (ntohs(rte->family) != AF_INET)
1666 return;
1667
1668 /* Examine the list of RTEs in the Request one by one. For each
1669 entry, look up the destination in the router's routing
1670 database and, if there is a route, put that route's metric in
1671 the metric field of the RTE. If there is no explicit route
1672 to the specified destination, put infinity in the metric
1673 field. Once all the entries have been filled in, change the
1674 command from Request to Response and send the datagram back
1675 to the requestor. */
1676 p.family = AF_INET;
1677
1678 for (; ((caddr_t)rte) < lim; rte++) {
1679 p.prefix = rte->prefix;
1680 p.prefixlen = ip_masklen(rte->mask);
1681 apply_mask_ipv4(&p);
1682
1683 rp = route_node_lookup(rip->table, (struct prefix *)&p);
1684 if (rp) {
1685 rinfo = listgetdata(
1686 listhead((struct list *)rp->info));
1687 rte->metric = htonl(rinfo->metric);
1688 route_unlock_node(rp);
1689 } else
1690 rte->metric = htonl(RIP_METRIC_INFINITY);
1691 }
1692 packet->command = RIP_RESPONSE;
4e054866 1693
b2608623 1694 (void)rip_send_packet((uint8_t *)packet, size, from, ifc);
d62a17ae 1695 }
c08a2107 1696 rip->counters.queries++;
718e3744 1697}
1698
718e3744 1699/* First entry point of RIP packet. */
e6685141 1700static void rip_read(struct event *t)
d62a17ae 1701{
e16d030c 1702 struct rip *rip = EVENT_ARG(t);
d62a17ae 1703 int sock;
1704 int ret;
1705 int rtenum;
1706 union rip_buf rip_buf;
1707 struct rip_packet *packet;
1708 struct sockaddr_in from;
1709 int len;
1710 int vrecv;
1711 socklen_t fromlen;
1712 struct interface *ifp = NULL;
1713 struct connected *ifc;
1714 struct rip_interface *ri;
1715 struct prefix p;
1716
1717 /* Fetch socket then register myself. */
e16d030c 1718 sock = EVENT_FD(t);
d62a17ae 1719
1720 /* Add myself to tne next event */
045c5389 1721 rip_event(rip, RIP_READ, sock);
d62a17ae 1722
1723 /* RIPd manages only IPv4. */
6006b807 1724 memset(&from, 0, sizeof(from));
d62a17ae 1725 fromlen = sizeof(struct sockaddr_in);
1726
1727 len = recvfrom(sock, (char *)&rip_buf.buf, sizeof(rip_buf.buf), 0,
1728 (struct sockaddr *)&from, &fromlen);
1729 if (len < 0) {
ae7b826a
RW
1730 zlog_info("recvfrom failed (VRF %s): %s", rip->vrf_name,
1731 safe_strerror(errno));
cc9f21da 1732 return;
d62a17ae 1733 }
1734
1735 /* Check is this packet comming from myself? */
045c5389 1736 if (if_check_address(rip, from.sin_addr)) {
d62a17ae 1737 if (IS_RIP_DEBUG_PACKET)
ae7b826a
RW
1738 zlog_debug("ignore packet comes from myself (VRF %s)",
1739 rip->vrf_name);
cc9f21da 1740 return;
d62a17ae 1741 }
1742
1743 /* Which interface is this packet comes from. */
ae7b826a
RW
1744 ifc = if_lookup_address((void *)&from.sin_addr, AF_INET,
1745 rip->vrf->vrf_id);
d62a17ae 1746 if (ifc)
1747 ifp = ifc->ifp;
1748
1749 /* RIP packet received */
1750 if (IS_RIP_DEBUG_EVENT)
53bb7f9b
MS
1751 zlog_debug("RECV packet from %pI4 port %d on %s (VRF %s)",
1752 &from.sin_addr, ntohs(from.sin_port),
ae7b826a 1753 ifp ? ifp->name : "unknown", rip->vrf_name);
d62a17ae 1754
1755 /* If this packet come from unknown interface, ignore it. */
1756 if (ifp == NULL) {
1757 zlog_info(
99404729 1758 "%s: cannot find interface for packet from %pI4 port %d (VRF %s)",
1759 __func__, &from.sin_addr, ntohs(from.sin_port),
ae7b826a 1760 rip->vrf_name);
cc9f21da 1761 return;
d62a17ae 1762 }
1763
1764 p.family = AF_INET;
1765 p.u.prefix4 = from.sin_addr;
1766 p.prefixlen = IPV4_MAX_BITLEN;
1767
1768 ifc = connected_lookup_prefix(ifp, &p);
1769
1770 if (ifc == NULL) {
1771 zlog_info(
99404729 1772 "%s: cannot find connected address for packet from %pI4 port %d on interface %s (VRF %s)",
1773 __func__, &from.sin_addr, ntohs(from.sin_port),
ae7b826a 1774 ifp->name, rip->vrf_name);
cc9f21da 1775 return;
d62a17ae 1776 }
1777
1778 /* Packet length check. */
1779 if (len < RIP_PACKET_MINSIZ) {
1780 zlog_warn("packet size %d is smaller than minimum size %d", len,
1781 RIP_PACKET_MINSIZ);
045c5389 1782 rip_peer_bad_packet(rip, &from);
cc9f21da 1783 return;
d62a17ae 1784 }
1785 if (len > RIP_PACKET_MAXSIZ) {
1786 zlog_warn("packet size %d is larger than max size %d", len,
1787 RIP_PACKET_MAXSIZ);
045c5389 1788 rip_peer_bad_packet(rip, &from);
cc9f21da 1789 return;
d62a17ae 1790 }
1791
1792 /* Packet alignment check. */
1793 if ((len - RIP_PACKET_MINSIZ) % 20) {
1794 zlog_warn("packet size %d is wrong for RIP packet alignment",
1795 len);
045c5389 1796 rip_peer_bad_packet(rip, &from);
cc9f21da 1797 return;
d62a17ae 1798 }
1799
1800 /* Set RTE number. */
1801 rtenum = ((len - RIP_PACKET_MINSIZ) / 20);
1802
1803 /* For easy to handle. */
1804 packet = &rip_buf.rip_packet;
1805
1806 /* RIP version check. */
1807 if (packet->version == 0) {
1808 zlog_info("version 0 with command %d received.",
1809 packet->command);
045c5389 1810 rip_peer_bad_packet(rip, &from);
cc9f21da 1811 return;
d62a17ae 1812 }
1813
1814 /* Dump RIP packet. */
1815 if (IS_RIP_DEBUG_RECV)
1816 rip_packet_dump(packet, len, "RECV");
1817
1818 /* RIP version adjust. This code should rethink now. RFC1058 says
1819 that "Version 1 implementations are to ignore this extra data and
1820 process only the fields specified in this document.". So RIPv3
1821 packet should be treated as RIPv1 ignoring must be zero field. */
1822 if (packet->version > RIPv2)
1823 packet->version = RIPv2;
1824
1825 /* Is RIP running or is this RIP neighbor ?*/
1826 ri = ifp->info;
045c5389 1827 if (!ri->running && !rip_neighbor_lookup(rip, &from)) {
d62a17ae 1828 if (IS_RIP_DEBUG_EVENT)
1829 zlog_debug("RIP is not enabled on interface %s.",
1830 ifp->name);
045c5389 1831 rip_peer_bad_packet(rip, &from);
cc9f21da 1832 return;
d62a17ae 1833 }
1834
1835 /* RIP Version check. RFC2453, 4.6 and 5.1 */
1836 vrecv = ((ri->ri_receive == RI_RIP_UNSPEC) ? rip->version_recv
1837 : ri->ri_receive);
1838 if (vrecv == RI_RIP_VERSION_NONE
1839 || ((packet->version == RIPv1) && !(vrecv & RIPv1))
1840 || ((packet->version == RIPv2) && !(vrecv & RIPv2))) {
1841 if (IS_RIP_DEBUG_PACKET)
1842 zlog_debug(
1843 " packet's v%d doesn't fit to if version spec",
1844 packet->version);
045c5389 1845 rip_peer_bad_packet(rip, &from);
cc9f21da 1846 return;
d62a17ae 1847 }
1848
1849 /* RFC2453 5.2 If the router is not configured to authenticate RIP-2
1850 messages, then RIP-1 and unauthenticated RIP-2 messages will be
1851 accepted; authenticated RIP-2 messages shall be discarded. */
1852 if ((ri->auth_type == RIP_NO_AUTH) && rtenum
1853 && (packet->version == RIPv2)
1854 && (packet->rte->family == htons(RIP_FAMILY_AUTH))) {
1855 if (IS_RIP_DEBUG_EVENT)
1856 zlog_debug(
1857 "packet RIPv%d is dropped because authentication disabled",
1858 packet->version);
fe339c95 1859 ripd_notif_send_auth_type_failure(ifp->name);
045c5389 1860 rip_peer_bad_packet(rip, &from);
cc9f21da 1861 return;
d62a17ae 1862 }
1863
1864 /* RFC:
1865 If the router is configured to authenticate RIP-2 messages, then
1866 RIP-1 messages and RIP-2 messages which pass authentication
1867 testing shall be accepted; unauthenticated and failed
1868 authentication RIP-2 messages shall be discarded. For maximum
1869 security, RIP-1 messages should be ignored when authentication is
1870 in use (see section 4.1); otherwise, the routing information from
1871 authenticated messages will be propagated by RIP-1 routers in an
1872 unauthenticated manner.
1873 */
1874 /* We make an exception for RIPv1 REQUEST packets, to which we'll
1875 * always reply regardless of authentication settings, because:
1876 *
1877 * - if there other authorised routers on-link, the REQUESTor can
1878 * passively obtain the routing updates anyway
1879 * - if there are no other authorised routers on-link, RIP can
1880 * easily be disabled for the link to prevent giving out information
1881 * on state of this routers RIP routing table..
1882 *
1883 * I.e. if RIPv1 has any place anymore these days, it's as a very
1884 * simple way to distribute routing information (e.g. to embedded
1885 * hosts / appliances) and the ability to give out RIPv1
1886 * routing-information freely, while still requiring RIPv2
1887 * authentication for any RESPONSEs might be vaguely useful.
1888 */
1889 if (ri->auth_type != RIP_NO_AUTH && packet->version == RIPv1) {
1890 /* Discard RIPv1 messages other than REQUESTs */
1891 if (packet->command != RIP_REQUEST) {
1892 if (IS_RIP_DEBUG_PACKET)
1893 zlog_debug(
3efd0893 1894 "RIPv1 dropped because authentication enabled");
fe339c95 1895 ripd_notif_send_auth_type_failure(ifp->name);
045c5389 1896 rip_peer_bad_packet(rip, &from);
cc9f21da 1897 return;
d62a17ae 1898 }
1899 } else if (ri->auth_type != RIP_NO_AUTH) {
1900 const char *auth_desc;
1901
1902 if (rtenum == 0) {
1903 /* There definitely is no authentication in the packet.
1904 */
1905 if (IS_RIP_DEBUG_PACKET)
1906 zlog_debug(
1907 "RIPv2 authentication failed: no auth RTE in packet");
fe339c95 1908 ripd_notif_send_auth_type_failure(ifp->name);
045c5389 1909 rip_peer_bad_packet(rip, &from);
cc9f21da 1910 return;
d62a17ae 1911 }
1912
1913 /* First RTE must be an Authentication Family RTE */
1914 if (packet->rte->family != htons(RIP_FAMILY_AUTH)) {
1915 if (IS_RIP_DEBUG_PACKET)
1916 zlog_debug(
3efd0893 1917 "RIPv2 dropped because authentication enabled");
fe339c95 1918 ripd_notif_send_auth_type_failure(ifp->name);
045c5389 1919 rip_peer_bad_packet(rip, &from);
cc9f21da 1920 return;
d62a17ae 1921 }
1922
1923 /* Check RIPv2 authentication. */
1924 switch (ntohs(packet->rte->tag)) {
1925 case RIP_AUTH_SIMPLE_PASSWORD:
1926 auth_desc = "simple";
1927 ret = rip_auth_simple_password(packet->rte, &from, ifp);
1928 break;
1929
1930 case RIP_AUTH_MD5:
1931 auth_desc = "MD5";
1932 ret = rip_auth_md5(packet, &from, len, ifp);
1933 /* Reset RIP packet length to trim MD5 data. */
1934 len = ret;
1935 break;
1936
1937 default:
1938 ret = 0;
1939 auth_desc = "unknown type";
1940 if (IS_RIP_DEBUG_PACKET)
1941 zlog_debug(
1942 "RIPv2 Unknown authentication type %d",
1943 ntohs(packet->rte->tag));
1944 }
1945
1946 if (ret) {
1947 if (IS_RIP_DEBUG_PACKET)
1948 zlog_debug("RIPv2 %s authentication success",
1949 auth_desc);
1950 } else {
1951 if (IS_RIP_DEBUG_PACKET)
1952 zlog_debug("RIPv2 %s authentication failure",
1953 auth_desc);
fe339c95 1954 ripd_notif_send_auth_failure(ifp->name);
045c5389 1955 rip_peer_bad_packet(rip, &from);
cc9f21da 1956 return;
d62a17ae 1957 }
1958 }
1959
1960 /* Process each command. */
1961 switch (packet->command) {
1962 case RIP_RESPONSE:
1963 rip_response_process(packet, len, &from, ifc);
1964 break;
1965 case RIP_REQUEST:
1966 case RIP_POLL:
1967 rip_request_process(packet, len, &from, ifc);
1968 break;
1969 case RIP_TRACEON:
1970 case RIP_TRACEOFF:
1971 zlog_info(
1972 "Obsolete command %s received, please sent it to routed",
1973 lookup_msg(rip_msg, packet->command, NULL));
045c5389 1974 rip_peer_bad_packet(rip, &from);
d62a17ae 1975 break;
1976 case RIP_POLL_ENTRY:
1977 zlog_info("Obsolete command %s received",
1978 lookup_msg(rip_msg, packet->command, NULL));
045c5389 1979 rip_peer_bad_packet(rip, &from);
d62a17ae 1980 break;
1981 default:
1982 zlog_info("Unknown RIP command %d received", packet->command);
045c5389 1983 rip_peer_bad_packet(rip, &from);
d62a17ae 1984 break;
1985 }
718e3744 1986}
1987
718e3744 1988/* Write routing table entry to the stream and return next index of
1989 the routing table entry in the stream. */
d62a17ae 1990static int rip_write_rte(int num, struct stream *s, struct prefix_ipv4 *p,
d7c0a89a 1991 uint8_t version, struct rip_info *rinfo)
d62a17ae 1992{
1993 struct in_addr mask;
1994
1995 /* Write routing table entry. */
1996 if (version == RIPv1) {
1997 stream_putw(s, AF_INET);
1998 stream_putw(s, 0);
1999 stream_put_ipv4(s, p->prefix.s_addr);
2000 stream_put_ipv4(s, 0);
2001 stream_put_ipv4(s, 0);
2002 stream_putl(s, rinfo->metric_out);
2003 } else {
2004 masklen2ip(p->prefixlen, &mask);
2005
2006 stream_putw(s, AF_INET);
2007 stream_putw(s, rinfo->tag_out);
2008 stream_put_ipv4(s, p->prefix.s_addr);
2009 stream_put_ipv4(s, mask.s_addr);
2010 stream_put_ipv4(s, rinfo->nexthop_out.s_addr);
2011 stream_putl(s, rinfo->metric_out);
2012 }
2013
2014 return ++num;
718e3744 2015}
2016
2017/* Send update to the ifp or spcified neighbor. */
d62a17ae 2018void rip_output_process(struct connected *ifc, struct sockaddr_in *to,
d7c0a89a 2019 int route_type, uint8_t version)
d62a17ae 2020{
045c5389 2021 struct rip *rip;
d62a17ae 2022 int ret;
2023 struct stream *s;
2024 struct route_node *rp;
2025 struct rip_info *rinfo;
2026 struct rip_interface *ri;
2027 struct prefix_ipv4 *p;
2028 struct prefix_ipv4 classfull;
2029 struct prefix_ipv4 ifaddrclass;
2030 struct key *key = NULL;
2031 /* this might need to made dynamic if RIP ever supported auth methods
2032 with larger key string sizes */
2033 char auth_str[RIP_AUTH_SIMPLE_SIZE];
2034 size_t doff = 0; /* offset of digest offset field */
2035 int num = 0;
2036 int rtemax;
2037 int subnetted = 0;
2038 struct list *list = NULL;
2039 struct listnode *listnode = NULL;
2040
2041 /* Logging output event. */
2042 if (IS_RIP_DEBUG_EVENT) {
2043 if (to)
53bb7f9b
MS
2044 zlog_debug("update routes to neighbor %pI4",
2045 &to->sin_addr);
d62a17ae 2046 else
2047 zlog_debug("update routes on interface %s ifindex %d",
2048 ifc->ifp->name, ifc->ifp->ifindex);
2049 }
718e3744 2050
045c5389
RW
2051 /* Get RIP interface. */
2052 ri = ifc->ifp->info;
2053 rip = ri->rip;
2054
d62a17ae 2055 /* Set output stream. */
2056 s = rip->obuf;
2057
2058 /* Reset stream and RTE counter. */
2059 stream_reset(s);
2060 rtemax = RIP_MAX_RTE;
2061
d62a17ae 2062 /* If output interface is in simple password authentication mode, we
2063 need space for authentication data. */
2064 if (ri->auth_type == RIP_AUTH_SIMPLE_PASSWORD)
2065 rtemax -= 1;
2066
2067 /* If output interface is in MD5 authentication mode, we need space
2068 for authentication header and data. */
2069 if (ri->auth_type == RIP_AUTH_MD5)
2070 rtemax -= 2;
2071
2072 /* If output interface is in simple password authentication mode
2073 and string or keychain is specified we need space for auth. data */
2074 if (ri->auth_type != RIP_NO_AUTH) {
2075 if (ri->key_chain) {
2076 struct keychain *keychain;
2077
2078 keychain = keychain_lookup(ri->key_chain);
2079 if (keychain)
2080 key = key_lookup_for_send(keychain);
2081 }
2082 /* to be passed to auth functions later */
5c84f238 2083 rip_auth_prepare_str_send(ri, key, auth_str, sizeof(auth_str));
558c6842 2084 if (strlen(auth_str) == 0)
2085 return;
d62a17ae 2086 }
2087
2088 if (version == RIPv1) {
f51eeb86 2089 memcpy(&ifaddrclass, ifc->address, sizeof(ifaddrclass));
d62a17ae 2090 apply_classful_mask_ipv4(&ifaddrclass);
2091 subnetted = 0;
2092 if (ifc->address->prefixlen > ifaddrclass.prefixlen)
2093 subnetted = 1;
2094 }
2095
91b508dc
DS
2096 for (rp = route_top(rip->table); rp; rp = route_next(rp)) {
2097 list = rp->info;
d62a17ae 2098
91b508dc
DS
2099 if (list == NULL)
2100 continue;
d62a17ae 2101
91b508dc
DS
2102 if (listcount(list) == 0)
2103 continue;
d62a17ae 2104
91b508dc
DS
2105 rinfo = listgetdata(listhead(list));
2106 /*
2107 * For RIPv1, if we are subnetted, output subnets in our
2108 * network that have the same mask as the output "interface".
2109 * For other networks, only the classfull version is output.
2110 */
2111 if (version == RIPv1) {
2112 p = (struct prefix_ipv4 *)&rp->p;
d62a17ae 2113
91b508dc
DS
2114 if (IS_RIP_DEBUG_PACKET)
2115 zlog_debug(
2116 "RIPv1 mask check, %pFX considered for output",
2117 &rp->p);
2118
2119 if (subnetted &&
2120 prefix_match((struct prefix *)&ifaddrclass,
2121 &rp->p)) {
2122 if ((ifc->address->prefixlen !=
2123 rp->p.prefixlen) &&
2124 (rp->p.prefixlen != IPV4_MAX_BITLEN))
2125 continue;
2126 } else {
2127 memcpy(&classfull, &rp->p,
2128 sizeof(struct prefix_ipv4));
2129 apply_classful_mask_ipv4(&classfull);
2130 if (rp->p.u.prefix4.s_addr != INADDR_ANY &&
2131 classfull.prefixlen != rp->p.prefixlen)
2132 continue;
2133 }
2134 if (IS_RIP_DEBUG_PACKET)
2135 zlog_debug(
2136 "RIPv1 mask check, %pFX made it through",
2137 &rp->p);
2138 } else
2139 p = (struct prefix_ipv4 *)&rp->p;
d62a17ae 2140
91b508dc
DS
2141 /* Apply output filters. */
2142 ret = rip_filter(RIP_FILTER_OUT, p, ri);
2143 if (ret < 0)
2144 continue;
d62a17ae 2145
91b508dc
DS
2146 /* Changed route only output. */
2147 if (route_type == rip_changed_route &&
2148 (!(rinfo->flags & RIP_RTF_CHANGED)))
2149 continue;
2150
2151 /* Split horizon. */
2152 if (ri->split_horizon == RIP_SPLIT_HORIZON) {
2153 /*
2154 * We perform split horizon for RIP and connected
2155 * route. For rip routes, we want to suppress the
2156 * route if we would end up sending the route back on
2157 * the interface that we learned it from, with a
2158 * higher metric. For connected routes, we suppress
2159 * the route if the prefix is a subset of the source
2160 * address that we are going to use for the packet
2161 * (in order to handle the case when multiple subnets
2162 * are configured on the same interface).
2163 */
2164 int suppress = 0;
2165 struct rip_info *tmp_rinfo = NULL;
2166 struct connected *tmp_ifc = NULL;
2167
2168 for (ALL_LIST_ELEMENTS_RO(list, listnode, tmp_rinfo))
2169 if (tmp_rinfo->type == ZEBRA_ROUTE_RIP &&
2170 tmp_rinfo->nh.ifindex ==
2171 ifc->ifp->ifindex) {
2172 suppress = 1;
2173 break;
9920df07 2174 }
d62a17ae 2175
91b508dc
DS
2176 if (!suppress && rinfo->type == ZEBRA_ROUTE_CONNECT) {
2177 for (ALL_LIST_ELEMENTS_RO(ifc->ifp->connected,
2178 listnode, tmp_ifc))
2179 if (prefix_match((struct prefix *)p,
2180 tmp_ifc->address)) {
2181 suppress = 1;
2182 break;
2183 }
d62a17ae 2184 }
2185
91b508dc
DS
2186 if (suppress)
2187 continue;
2188 }
d62a17ae 2189
91b508dc
DS
2190 /* Preparation for route-map. */
2191 rinfo->metric_set = 0;
2192 rinfo->nexthop_out.s_addr = 0;
2193 rinfo->metric_out = rinfo->metric;
2194 rinfo->tag_out = rinfo->tag;
2195 rinfo->ifindex_out = ifc->ifp->ifindex;
2196
2197 /* In order to avoid some local loops, if the RIP route has
2198 * a nexthop via this interface, keep the nexthop, otherwise
2199 * set it to 0. The nexthop should not be propagated beyond
2200 * the local broadcast/multicast area in order to avoid an
2201 * IGP multi-level recursive look-up. see (4.4)
2202 */
2203 if (rinfo->nh.ifindex == ifc->ifp->ifindex)
2204 rinfo->nexthop_out = rinfo->nh.gate.ipv4;
d62a17ae 2205
91b508dc
DS
2206 /* Interface route-map */
2207 if (ri->routemap[RIP_FILTER_OUT]) {
2208 ret = route_map_apply(ri->routemap[RIP_FILTER_OUT],
2209 (struct prefix *)p, rinfo);
2210
2211 if (ret == RMAP_DENYMATCH) {
2212 if (IS_RIP_DEBUG_PACKET)
2213 zlog_debug(
2214 "RIP %pFX is filtered by route-map out",
2215 p);
2216 continue;
d62a17ae 2217 }
91b508dc 2218 }
d62a17ae 2219
91b508dc
DS
2220 /* Apply redistribute route map - continue, if deny */
2221 if (rip->redist[rinfo->type].route_map.name &&
2222 rinfo->sub_type != RIP_ROUTE_INTERFACE) {
2223 ret = route_map_apply(
2224 rip->redist[rinfo->type].route_map.map,
2225 (struct prefix *)p, rinfo);
d62a17ae 2226
91b508dc
DS
2227 if (ret == RMAP_DENYMATCH) {
2228 if (IS_RIP_DEBUG_PACKET)
2229 zlog_debug(
2230 "%pFX is filtered by route-map",
2231 p);
2232 continue;
d62a17ae 2233 }
91b508dc 2234 }
d62a17ae 2235
91b508dc
DS
2236 /* When route-map does not set metric. */
2237 if (!rinfo->metric_set) {
2238 /* If redistribute metric is set. */
2239 if (rip->redist[rinfo->type].metric_config &&
2240 rinfo->metric != RIP_METRIC_INFINITY) {
2241 rinfo->metric_out =
2242 rip->redist[rinfo->type].metric;
2243 } else {
2244 /* If the route is not connected or localy
2245 * generated one, use default-metric value
2246 */
2247 if (rinfo->type != ZEBRA_ROUTE_RIP &&
2248 rinfo->type != ZEBRA_ROUTE_CONNECT &&
2249 rinfo->metric != RIP_METRIC_INFINITY)
2250 rinfo->metric_out = rip->default_metric;
d62a17ae 2251 }
91b508dc 2252 }
d62a17ae 2253
91b508dc
DS
2254 /* Apply offset-list */
2255 if (rinfo->metric != RIP_METRIC_INFINITY)
2256 rip_offset_list_apply_out(p, ifc->ifp,
2257 &rinfo->metric_out);
2258
2259 if (rinfo->metric_out > RIP_METRIC_INFINITY)
2260 rinfo->metric_out = RIP_METRIC_INFINITY;
2261
2262 /* Perform split-horizon with poisoned reverse
2263 * for RIP and connected routes.
2264 **/
2265 if (ri->split_horizon == RIP_SPLIT_HORIZON_POISONED_REVERSE) {
2266 /*
2267 * We perform split horizon for RIP and connected
2268 * route. For rip routes, we want to suppress the
2269 * route if we would end up sending the route back
2270 * on the interface that we learned it from, with a
2271 * higher metric. For connected routes, we suppress
2272 * the route if the prefix is a subset of the source
2273 * address that we are going to use for the packet
2274 * (in order to handle the case when multiple
2275 * subnets are configured on the same interface).
2276 */
2277 struct rip_info *tmp_rinfo = NULL;
2278 struct connected *tmp_ifc = NULL;
2279
2280 for (ALL_LIST_ELEMENTS_RO(list, listnode, tmp_rinfo))
2281 if (tmp_rinfo->type == ZEBRA_ROUTE_RIP &&
2282 tmp_rinfo->nh.ifindex == ifc->ifp->ifindex)
2283 rinfo->metric_out = RIP_METRIC_INFINITY;
2284
2285 if (rinfo->metric_out != RIP_METRIC_INFINITY &&
2286 rinfo->type == ZEBRA_ROUTE_CONNECT) {
2287 for (ALL_LIST_ELEMENTS_RO(ifc->ifp->connected,
2288 listnode, tmp_ifc))
2289 if (prefix_match((struct prefix *)p,
2290 tmp_ifc->address)) {
9920df07 2291 rinfo->metric_out =
d62a17ae 2292 RIP_METRIC_INFINITY;
91b508dc
DS
2293 break;
2294 }
d62a17ae 2295 }
91b508dc 2296 }
d62a17ae 2297
91b508dc
DS
2298 /* Prepare preamble, auth headers, if needs be */
2299 if (num == 0) {
2300 stream_putc(s, RIP_RESPONSE);
2301 stream_putc(s, version);
2302 stream_putw(s, 0);
2303
2304 /* auth header for !v1 && !no_auth */
2305 if ((ri->auth_type != RIP_NO_AUTH) &&
2306 (version != RIPv1))
2307 doff = rip_auth_header_write(
2308 s, ri, key, auth_str,
2309 RIP_AUTH_SIMPLE_SIZE);
2310 }
d62a17ae 2311
91b508dc
DS
2312 /* Write RTE to the stream. */
2313 num = rip_write_rte(num, s, p, version, rinfo);
2314 if (num == rtemax) {
2315 if (version == RIPv2 && ri->auth_type == RIP_AUTH_MD5)
2316 rip_auth_md5_set(s, ri, doff, auth_str,
2317 RIP_AUTH_SIMPLE_SIZE);
2318
2319 ret = rip_send_packet(STREAM_DATA(s),
2320 stream_get_endp(s), to, ifc);
2321
2322 if (ret >= 0 && IS_RIP_DEBUG_SEND)
2323 rip_packet_dump(
2324 (struct rip_packet *)STREAM_DATA(s),
2325 stream_get_endp(s), "SEND");
2326 num = 0;
2327 stream_reset(s);
d62a17ae 2328 }
91b508dc 2329 }
d62a17ae 2330
2331 /* Flush unwritten RTE. */
2332 if (num != 0) {
2333 if (version == RIPv2 && ri->auth_type == RIP_AUTH_MD5)
2334 rip_auth_md5_set(s, ri, doff, auth_str,
2335 RIP_AUTH_SIMPLE_SIZE);
2336
2337 ret = rip_send_packet(STREAM_DATA(s), stream_get_endp(s), to,
2338 ifc);
2339
2340 if (ret >= 0 && IS_RIP_DEBUG_SEND)
2341 rip_packet_dump((struct rip_packet *)STREAM_DATA(s),
2342 stream_get_endp(s), "SEND");
2343 stream_reset(s);
2344 }
2345
2346 /* Statistics updates. */
2347 ri->sent_updates++;
718e3744 2348}
2349
2350/* Send RIP packet to the interface. */
d7c0a89a 2351static void rip_update_interface(struct connected *ifc, uint8_t version,
d62a17ae 2352 int route_type)
2353{
2354 struct interface *ifp = ifc->ifp;
2355 struct rip_interface *ri = ifp->info;
2356 struct sockaddr_in to;
2357
2358 /* When RIP version is 2 and multicast enable interface. */
2359 if (version == RIPv2 && !ri->v2_broadcast && if_is_multicast(ifp)) {
2360 if (IS_RIP_DEBUG_EVENT)
2361 zlog_debug("multicast announce on %s ", ifp->name);
2362
2363 rip_output_process(ifc, NULL, route_type, version);
2364 return;
2365 }
2366
2367 /* If we can't send multicast packet, send it with unicast. */
2368 if (if_is_broadcast(ifp) || if_is_pointopoint(ifp)) {
2369 if (ifc->address->family == AF_INET) {
2370 /* Destination address and port setting. */
6006b807 2371 memset(&to, 0, sizeof(to));
d62a17ae 2372 if (ifc->destination)
2373 /* use specified broadcast or peer destination
2374 * addr */
2375 to.sin_addr = ifc->destination->u.prefix4;
936fbaef 2376 else if (ifc->address->prefixlen < IPV4_MAX_BITLEN)
d62a17ae 2377 /* calculate the appropriate broadcast address
2378 */
2379 to.sin_addr.s_addr = ipv4_broadcast_addr(
2380 ifc->address->u.prefix4.s_addr,
2381 ifc->address->prefixlen);
2382 else
2383 /* do not know where to send the packet */
2384 return;
2385 to.sin_port = htons(RIP_PORT_DEFAULT);
2386
2387 if (IS_RIP_DEBUG_EVENT)
53bb7f9b 2388 zlog_debug("%s announce to %pI4 on %s",
d62a17ae 2389 CONNECTED_PEER(ifc) ? "unicast"
2390 : "broadcast",
53bb7f9b 2391 &to.sin_addr, ifp->name);
d62a17ae 2392
2393 rip_output_process(ifc, &to, route_type, version);
2394 }
2395 }
718e3744 2396}
2397
2398/* Update send to all interface and neighbor. */
045c5389 2399static void rip_update_process(struct rip *rip, int route_type)
d62a17ae 2400{
d62a17ae 2401 struct listnode *ifnode, *ifnnode;
2402 struct connected *connected;
2403 struct interface *ifp;
2404 struct rip_interface *ri;
2405 struct route_node *rp;
2406 struct sockaddr_in to;
2407 struct prefix *p;
2408
2409 /* Send RIP update to each interface. */
ae7b826a 2410 FOR_ALL_INTERFACES (rip->vrf, ifp) {
d62a17ae 2411 if (if_is_loopback(ifp))
2412 continue;
2413
2414 if (!if_is_operative(ifp))
2415 continue;
2416
2417 /* Fetch RIP interface information. */
2418 ri = ifp->info;
2419
2420 /* When passive interface is specified, suppress announce to the
2421 interface. */
2422 if (ri->passive)
2423 continue;
2424
91b508dc
DS
2425 if (!ri->running)
2426 continue;
d62a17ae 2427
91b508dc
DS
2428 /*
2429 * If there is no version configuration in the
2430 * interface, use rip's version setting.
2431 */
2432 int vsend = ((ri->ri_send == RI_RIP_UNSPEC) ? rip->version_send
2433 : ri->ri_send);
2434
2435 if (IS_RIP_DEBUG_EVENT)
2436 zlog_debug("SEND UPDATE to %s ifindex %d", ifp->name,
2437 ifp->ifindex);
2438
2439 /* send update on each connected network */
2440 for (ALL_LIST_ELEMENTS(ifp->connected, ifnode, ifnnode,
2441 connected)) {
2442 if (connected->address->family == AF_INET) {
2443 if (vsend & RIPv1)
2444 rip_update_interface(connected, RIPv1,
2445 route_type);
2446 if ((vsend & RIPv2) && if_is_multicast(ifp))
2447 rip_update_interface(connected, RIPv2,
2448 route_type);
d62a17ae 2449 }
2450 }
2451 }
2452
2453 /* RIP send updates to each neighbor. */
91b508dc
DS
2454 for (rp = route_top(rip->neighbor); rp; rp = route_next(rp)) {
2455 if (rp->info == NULL)
2456 continue;
d62a17ae 2457
91b508dc 2458 p = &rp->p;
d62a17ae 2459
91b508dc
DS
2460 connected = if_lookup_address(&p->u.prefix4, AF_INET,
2461 rip->vrf->vrf_id);
2462 if (!connected) {
2463 zlog_warn(
2464 "Neighbor %pI4 doesn't have connected interface!",
2465 &p->u.prefix4);
2466 continue;
b9d92881 2467 }
91b508dc
DS
2468
2469 /* Set destination address and port */
2470 memset(&to, 0, sizeof(struct sockaddr_in));
2471 to.sin_addr = p->u.prefix4;
2472 to.sin_port = htons(RIP_PORT_DEFAULT);
2473
2474 /* RIP version is rip's configuration. */
2475 rip_output_process(connected, &to, route_type,
2476 rip->version_send);
2477 }
718e3744 2478}
2479
2480/* RIP's periodical timer. */
e6685141 2481static void rip_update(struct event *t)
718e3744 2482{
e16d030c 2483 struct rip *rip = EVENT_ARG(t);
045c5389 2484
d62a17ae 2485 if (IS_RIP_DEBUG_EVENT)
2486 zlog_debug("update timer fire!");
718e3744 2487
d62a17ae 2488 /* Process update output. */
045c5389 2489 rip_update_process(rip, rip_all_route);
718e3744 2490
d62a17ae 2491 /* Triggered updates may be suppressed if a regular update is due by
2492 the time the triggered update would be sent. */
e16d030c 2493 EVENT_OFF(rip->t_triggered_interval);
d62a17ae 2494 rip->trigger = 0;
718e3744 2495
d62a17ae 2496 /* Register myself. */
045c5389 2497 rip_event(rip, RIP_UPDATE_EVENT, 0);
718e3744 2498}
2499
2500/* Walk down the RIP routing table then clear changed flag. */
045c5389 2501static void rip_clear_changed_flag(struct rip *rip)
718e3744 2502{
d62a17ae 2503 struct route_node *rp;
2504 struct rip_info *rinfo = NULL;
2505 struct list *list = NULL;
2506 struct listnode *listnode = NULL;
718e3744 2507
91b508dc
DS
2508 for (rp = route_top(rip->table); rp; rp = route_next(rp)) {
2509 list = rp->info;
2510
2511 if (list == NULL)
2512 continue;
2513
2514 for (ALL_LIST_ELEMENTS_RO(list, listnode, rinfo)) {
2515 UNSET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
2516 /* This flag can be set only on the first entry. */
2517 break;
2518 }
2519 }
718e3744 2520}
2521
2522/* Triggered update interval timer. */
e6685141 2523static void rip_triggered_interval(struct event *t)
718e3744 2524{
e16d030c 2525 struct rip *rip = EVENT_ARG(t);
718e3744 2526
d62a17ae 2527 if (rip->trigger) {
2528 rip->trigger = 0;
2529 rip_triggered_update(t);
2530 }
d62a17ae 2531}
718e3744 2532
2533/* Execute triggered update. */
e6685141 2534static void rip_triggered_update(struct event *t)
718e3744 2535{
e16d030c 2536 struct rip *rip = EVENT_ARG(t);
d62a17ae 2537 int interval;
718e3744 2538
d62a17ae 2539 /* Cancel interval timer. */
e16d030c 2540 EVENT_OFF(rip->t_triggered_interval);
d62a17ae 2541 rip->trigger = 0;
718e3744 2542
d62a17ae 2543 /* Logging triggered update. */
2544 if (IS_RIP_DEBUG_EVENT)
2545 zlog_debug("triggered update!");
718e3744 2546
d62a17ae 2547 /* Split Horizon processing is done when generating triggered
2548 updates as well as normal updates (see section 2.6). */
045c5389 2549 rip_update_process(rip, rip_changed_route);
718e3744 2550
d62a17ae 2551 /* Once all of the triggered updates have been generated, the route
2552 change flags should be cleared. */
045c5389 2553 rip_clear_changed_flag(rip);
718e3744 2554
d62a17ae 2555 /* After a triggered update is sent, a timer should be set for a
2556 random interval between 1 and 5 seconds. If other changes that
2557 would trigger updates occur before the timer expires, a single
2558 update is triggered when the timer expires. */
5920b3eb 2559 interval = (frr_weak_random() % 5) + 1;
718e3744 2560
907a2395
DS
2561 event_add_timer(master, rip_triggered_interval, rip, interval,
2562 &rip->t_triggered_interval);
718e3744 2563}
2564
2565/* Withdraw redistributed route. */
045c5389 2566void rip_redistribute_withdraw(struct rip *rip, int type)
d62a17ae 2567{
2568 struct route_node *rp;
2569 struct rip_info *rinfo = NULL;
2570 struct list *list = NULL;
2571
91b508dc
DS
2572 for (rp = route_top(rip->table); rp; rp = route_next(rp)) {
2573 list = rp->info;
d62a17ae 2574
91b508dc
DS
2575 if (list == NULL)
2576 continue;
d62a17ae 2577
91b508dc 2578 rinfo = listgetdata(listhead(list));
d62a17ae 2579
91b508dc
DS
2580 if (rinfo->type != type)
2581 continue;
2582
2583 if (rinfo->sub_type == RIP_ROUTE_INTERFACE)
2584 continue;
2585
2586 /* Perform poisoned reverse. */
2587 rinfo->metric = RIP_METRIC_INFINITY;
2588 RIP_TIMER_ON(rinfo->t_garbage_collect, rip_garbage_collect,
2589 rip->garbage_time);
e16d030c 2590 EVENT_OFF(rinfo->t_timeout);
91b508dc
DS
2591 rinfo->flags |= RIP_RTF_CHANGED;
2592
2593 if (IS_RIP_DEBUG_EVENT) {
2594 struct prefix_ipv4 *p = (struct prefix_ipv4 *)&rp->p;
2595
2596 zlog_debug(
2597 "Poisone %pFX on the interface %s with an infinity metric [withdraw]",
2598 p,
2599 ifindex2ifname(rinfo->nh.ifindex,
2600 rip->vrf->vrf_id));
d62a17ae 2601 }
91b508dc
DS
2602
2603 rip_event(rip, RIP_TRIGGERED_UPDATE, 0);
2604 }
d62a17ae 2605}
2606
045c5389
RW
2607struct rip *rip_lookup_by_vrf_id(vrf_id_t vrf_id)
2608{
2609 struct vrf *vrf;
2610
2611 vrf = vrf_lookup_by_id(vrf_id);
2612 if (!vrf)
2613 return NULL;
2614
2615 return vrf->info;
2616}
2617
ae7b826a
RW
2618struct rip *rip_lookup_by_vrf_name(const char *vrf_name)
2619{
2620 struct rip rip;
2621
2622 rip.vrf_name = (char *)vrf_name;
2623
2624 return RB_FIND(rip_instance_head, &rip_instances, &rip);
2625}
2626
d62a17ae 2627/* Create new RIP instance and set it to global variable. */
ae7b826a 2628struct rip *rip_create(const char *vrf_name, struct vrf *vrf, int socket)
718e3744 2629{
045c5389 2630 struct rip *rip;
045c5389 2631
d62a17ae 2632 rip = XCALLOC(MTYPE_RIP, sizeof(struct rip));
ae7b826a 2633 rip->vrf_name = XSTRDUP(MTYPE_RIP_VRF_NAME, vrf_name);
718e3744 2634
d62a17ae 2635 /* Set initial value. */
8c9226c2
RW
2636 rip->ecmp = yang_get_default_bool("%s/allow-ecmp", RIP_INSTANCE);
2637 rip->default_metric =
2638 yang_get_default_uint8("%s/default-metric", RIP_INSTANCE);
2639 rip->distance =
2640 yang_get_default_uint8("%s/distance/default", RIP_INSTANCE);
44f2f852
RW
2641 rip->passive_default =
2642 yang_get_default_bool("%s/passive-default", RIP_INSTANCE);
8c9226c2
RW
2643 rip->garbage_time = yang_get_default_uint32("%s/timers/flush-interval",
2644 RIP_INSTANCE);
2645 rip->timeout_time = yang_get_default_uint32(
2646 "%s/timers/holddown-interval", RIP_INSTANCE);
2647 rip->update_time = yang_get_default_uint32("%s/timers/update-interval",
2648 RIP_INSTANCE);
2649 rip->version_send =
2650 yang_get_default_enum("%s/version/send", RIP_INSTANCE);
2651 rip->version_recv =
2652 yang_get_default_enum("%s/version/receive", RIP_INSTANCE);
718e3744 2653
ca046902 2654 /* Initialize RIP data structures. */
d62a17ae 2655 rip->table = route_table_init();
045c5389 2656 route_table_set_info(rip->table, rip);
d62a17ae 2657 rip->neighbor = route_table_init();
29e897ad
RW
2658 rip->peer_list = list_new();
2659 rip->peer_list->cmp = (int (*)(void *, void *))rip_peer_list_cmp;
711915d2 2660 rip->peer_list->del = rip_peer_list_del;
2826309c
RW
2661 rip->distance_table = route_table_init();
2662 rip->distance_table->cleanup = rip_distance_table_node_cleanup;
ca046902 2663 rip->enable_interface = vector_init(1);
1205fdc4 2664 rip->enable_network = route_table_init();
5a29c0d5 2665 rip->passive_nondefault = vector_init(1);
3f21c8c4
RW
2666 rip->offset_list_master = list_new();
2667 rip->offset_list_master->cmp = (int (*)(void *, void *))offset_list_cmp;
6c4c3561 2668 rip->offset_list_master->del = (void (*)(void *))offset_list_free;
718e3744 2669
2d2eaa13 2670 /* Distribute list install. */
ae7b826a 2671 rip->distribute_ctx = distribute_list_ctx_create(vrf);
2d2eaa13
RW
2672 distribute_list_add_hook(rip->distribute_ctx, rip_distribute_update);
2673 distribute_list_delete_hook(rip->distribute_ctx, rip_distribute_update);
2674
4b23867c 2675 /* if rmap install. */
8f88441d 2676 rip->if_rmap_ctx = if_rmap_ctx_create(vrf_name);
4b23867c
PG
2677 if_rmap_hook_add(rip->if_rmap_ctx, rip_if_rmap_update);
2678 if_rmap_hook_delete(rip->if_rmap_ctx, rip_if_rmap_update);
2679
d62a17ae 2680 /* Make output stream. */
2681 rip->obuf = stream_new(1500);
16705130 2682
ae7b826a
RW
2683 /* Enable the routing instance if possible. */
2684 if (vrf && vrf_is_enabled(vrf))
2685 rip_instance_enable(rip, vrf, socket);
2686 else {
2687 rip->vrf = NULL;
2688 rip->sock = -1;
045c5389
RW
2689 }
2690
ae7b826a
RW
2691 RB_INSERT(rip_instance_head, &rip_instances, rip);
2692
045c5389 2693 return rip;
d62a17ae 2694}
718e3744 2695
d62a17ae 2696/* Sned RIP request to the destination. */
2697int rip_request_send(struct sockaddr_in *to, struct interface *ifp,
d7c0a89a 2698 uint8_t version, struct connected *connected)
d62a17ae 2699{
2700 struct rte *rte;
2701 struct rip_packet rip_packet;
2702 struct listnode *node, *nnode;
2703
2704 memset(&rip_packet, 0, sizeof(rip_packet));
2705
2706 rip_packet.command = RIP_REQUEST;
2707 rip_packet.version = version;
2708 rte = rip_packet.rte;
2709 rte->metric = htonl(RIP_METRIC_INFINITY);
2710
2711 if (connected) {
2712 /*
2713 * connected is only sent for ripv1 case, or when
2714 * interface does not support multicast. Caller loops
2715 * over each connected address for this case.
2716 */
d7c0a89a 2717 if (rip_send_packet((uint8_t *)&rip_packet, sizeof(rip_packet),
d62a17ae 2718 to, connected)
2719 != sizeof(rip_packet))
2720 return -1;
2721 else
2722 return sizeof(rip_packet);
2723 }
718e3744 2724
d62a17ae 2725 /* send request on each connected network */
2726 for (ALL_LIST_ELEMENTS(ifp->connected, node, nnode, connected)) {
2727 struct prefix_ipv4 *p;
718e3744 2728
d62a17ae 2729 p = (struct prefix_ipv4 *)connected->address;
718e3744 2730
d62a17ae 2731 if (p->family != AF_INET)
2732 continue;
f6eacff4 2733
d7c0a89a 2734 if (rip_send_packet((uint8_t *)&rip_packet, sizeof(rip_packet),
d62a17ae 2735 to, connected)
2736 != sizeof(rip_packet))
2737 return -1;
2738 }
2739 return sizeof(rip_packet);
718e3744 2740}
2741
d62a17ae 2742static int rip_update_jitter(unsigned long time)
718e3744 2743{
239389ba 2744#define JITTER_BOUND 4
d62a17ae 2745 /* We want to get the jitter to +/- 1/JITTER_BOUND the interval.
2746 Given that, we cannot let time be less than JITTER_BOUND seconds.
2747 The RIPv2 RFC says jitter should be small compared to
2748 update_time. We consider 1/JITTER_BOUND to be small.
2749 */
2750
2751 int jitter_input = time;
2752 int jitter;
2753
2754 if (jitter_input < JITTER_BOUND)
2755 jitter_input = JITTER_BOUND;
2756
5920b3eb
RZ
2757 jitter = (((frr_weak_random() % ((jitter_input * 2) + 1))
2758 - jitter_input));
d62a17ae 2759
2760 return jitter / JITTER_BOUND;
2761}
2762
045c5389 2763void rip_event(struct rip *rip, enum rip_event event, int sock)
d62a17ae 2764{
2765 int jitter = 0;
2766
2767 switch (event) {
2768 case RIP_READ:
907a2395 2769 event_add_read(master, rip_read, rip, sock, &rip->t_read);
d62a17ae 2770 break;
2771 case RIP_UPDATE_EVENT:
e16d030c 2772 EVENT_OFF(rip->t_update);
d62a17ae 2773 jitter = rip_update_jitter(rip->update_time);
907a2395
DS
2774 event_add_timer(master, rip_update, rip,
2775 sock ? 2 : rip->update_time + jitter,
2776 &rip->t_update);
d62a17ae 2777 break;
2778 case RIP_TRIGGERED_UPDATE:
2779 if (rip->t_triggered_interval)
2780 rip->trigger = 1;
2781 else
907a2395
DS
2782 event_add_event(master, rip_triggered_update, rip, 0,
2783 &rip->t_triggered_update);
d62a17ae 2784 break;
2785 default:
2786 break;
2787 }
718e3744 2788}
6b0655a2 2789
23b23d8c 2790struct rip_distance *rip_distance_new(void)
718e3744 2791{
d62a17ae 2792 return XCALLOC(MTYPE_RIP_DISTANCE, sizeof(struct rip_distance));
718e3744 2793}
2794
23b23d8c 2795void rip_distance_free(struct rip_distance *rdistance)
d62a17ae 2796{
2826309c
RW
2797 if (rdistance->access_list)
2798 free(rdistance->access_list);
d62a17ae 2799 XFREE(MTYPE_RIP_DISTANCE, rdistance);
718e3744 2800}
2801
2826309c
RW
2802static void rip_distance_table_node_cleanup(struct route_table *table,
2803 struct route_node *node)
d62a17ae 2804{
d62a17ae 2805 struct rip_distance *rdistance;
718e3744 2806
2826309c
RW
2807 rdistance = node->info;
2808 if (rdistance)
2809 rip_distance_free(rdistance);
d62a17ae 2810}
2811
2812/* Apply RIP information to distance method. */
045c5389 2813uint8_t rip_distance_apply(struct rip *rip, struct rip_info *rinfo)
d62a17ae 2814{
2815 struct route_node *rn;
2816 struct prefix_ipv4 p;
2817 struct rip_distance *rdistance;
2818 struct access_list *alist;
2819
6006b807 2820 memset(&p, 0, sizeof(p));
d62a17ae 2821 p.family = AF_INET;
2822 p.prefix = rinfo->from;
2823 p.prefixlen = IPV4_MAX_BITLEN;
2824
2825 /* Check source address. */
2826309c 2826 rn = route_node_match(rip->distance_table, (struct prefix *)&p);
d62a17ae 2827 if (rn) {
2828 rdistance = rn->info;
2829 route_unlock_node(rn);
2830
2831 if (rdistance->access_list) {
2832 alist = access_list_lookup(AFI_IP,
2833 rdistance->access_list);
2834 if (alist == NULL)
2835 return 0;
2836 if (access_list_apply(alist, &rinfo->rp->p)
2837 == FILTER_DENY)
2838 return 0;
b769fdc8 2839 }
2840 return rdistance->distance;
718e3744 2841 }
718e3744 2842
b769fdc8 2843 return rip->distance;
718e3744 2844}
2845
045c5389 2846static void rip_distance_show(struct vty *vty, struct rip *rip)
d62a17ae 2847{
2848 struct route_node *rn;
2849 struct rip_distance *rdistance;
2850 int header = 1;
2851 char buf[BUFSIZ];
2852
7f8a9cba 2853 vty_out(vty, " Distance: (default is %u)\n",
d62a17ae 2854 rip->distance ? rip->distance : ZEBRA_RIP_DISTANCE_DEFAULT);
2855
91b508dc
DS
2856 for (rn = route_top(rip->distance_table); rn; rn = route_next(rn)) {
2857 rdistance = rn->info;
2858
2859 if (rdistance == NULL)
2860 continue;
2861
2862 if (header) {
2863 vty_out(vty, " Address Distance List\n");
2864 header = 0;
d62a17ae 2865 }
91b508dc
DS
2866 snprintfrr(buf, sizeof(buf), "%pFX", &rn->p);
2867 vty_out(vty, " %-20s %4d %s\n", buf, rdistance->distance,
2868 rdistance->access_list ? rdistance->access_list : "");
2869 }
718e3744 2870}
2871
8478ae7e 2872/* Update ECMP routes to zebra when ECMP is disabled. */
045c5389 2873void rip_ecmp_disable(struct rip *rip)
d62a17ae 2874{
2875 struct route_node *rp;
2876 struct rip_info *rinfo, *tmp_rinfo;
2877 struct list *list;
2878 struct listnode *node, *nextnode;
2879
91b508dc
DS
2880 for (rp = route_top(rip->table); rp; rp = route_next(rp)) {
2881 list = rp->info;
d62a17ae 2882
91b508dc
DS
2883 if (!list)
2884 continue;
2885 if (listcount(list) == 0)
2886 continue;
d62a17ae 2887
91b508dc
DS
2888 rinfo = listgetdata(listhead(list));
2889 if (!rip_route_rte(rinfo))
2890 continue;
d62a17ae 2891
91b508dc
DS
2892 /* Drop all other entries, except the first one. */
2893 for (ALL_LIST_ELEMENTS(list, node, nextnode, tmp_rinfo)) {
2894 if (tmp_rinfo == rinfo)
2895 continue;
d62a17ae 2896
e16d030c
DS
2897 EVENT_OFF(tmp_rinfo->t_timeout);
2898 EVENT_OFF(tmp_rinfo->t_garbage_collect);
91b508dc
DS
2899 list_delete_node(list, node);
2900 rip_info_free(tmp_rinfo);
d62a17ae 2901 }
91b508dc
DS
2902
2903 /* Update zebra. */
2904 rip_zebra_ipv4_add(rip, rp);
2905
2906 /* Set the route change flag. */
2907 SET_FLAG(rinfo->flags, RIP_RTF_CHANGED);
2908
2909 /* Signal the output process to trigger an update. */
2910 rip_event(rip, RIP_TRIGGERED_UPDATE, 0);
2911 }
8478ae7e
LF
2912}
2913
718e3744 2914/* Print out routes update time. */
d62a17ae 2915static void rip_vty_out_uptime(struct vty *vty, struct rip_info *rinfo)
718e3744 2916{
d62a17ae 2917 time_t clock;
a2700b50 2918 struct tm tm;
718e3744 2919#define TIME_BUF 25
d62a17ae 2920 char timebuf[TIME_BUF];
e6685141 2921 struct event *thread;
d62a17ae 2922
2923 if ((thread = rinfo->t_timeout) != NULL) {
4f830a07 2924 clock = event_timer_remain_second(thread);
a2700b50
MS
2925 gmtime_r(&clock, &tm);
2926 strftime(timebuf, TIME_BUF, "%M:%S", &tm);
d62a17ae 2927 vty_out(vty, "%5s", timebuf);
2928 } else if ((thread = rinfo->t_garbage_collect) != NULL) {
4f830a07 2929 clock = event_timer_remain_second(thread);
a2700b50
MS
2930 gmtime_r(&clock, &tm);
2931 strftime(timebuf, TIME_BUF, "%M:%S", &tm);
d62a17ae 2932 vty_out(vty, "%5s", timebuf);
2933 }
2934}
2935
2936static const char *rip_route_type_print(int sub_type)
2937{
2938 switch (sub_type) {
2939 case RIP_ROUTE_RTE:
2940 return "n";
2941 case RIP_ROUTE_STATIC:
2942 return "s";
2943 case RIP_ROUTE_DEFAULT:
2944 return "d";
2945 case RIP_ROUTE_REDISTRIBUTE:
2946 return "r";
2947 case RIP_ROUTE_INTERFACE:
2948 return "i";
2949 default:
2950 return "?";
2951 }
718e3744 2952}
2953
2954DEFUN (show_ip_rip,
2955 show_ip_rip_cmd,
ae7b826a 2956 "show ip rip [vrf NAME]",
718e3744 2957 SHOW_STR
2958 IP_STR
ae7b826a
RW
2959 "Show RIP routes\n"
2960 VRF_CMD_HELP_STR)
718e3744 2961{
045c5389 2962 struct rip *rip;
d62a17ae 2963 struct route_node *np;
2964 struct rip_info *rinfo = NULL;
2965 struct list *list = NULL;
2966 struct listnode *listnode = NULL;
ae7b826a
RW
2967 const char *vrf_name;
2968 int idx = 0;
d62a17ae 2969
ae7b826a
RW
2970 if (argv_find(argv, argc, "vrf", &idx))
2971 vrf_name = argv[idx + 1]->arg;
2972 else
2973 vrf_name = VRF_DEFAULT_NAME;
2974
2975 rip = rip_lookup_by_vrf_name(vrf_name);
2976 if (!rip) {
2977 vty_out(vty, "%% RIP instance not found\n");
2978 return CMD_SUCCESS;
2979 }
2980 if (!rip->enabled) {
2981 vty_out(vty, "%% RIP instance is disabled\n");
d62a17ae 2982 return CMD_SUCCESS;
ae7b826a 2983 }
d62a17ae 2984
2985 vty_out(vty,
2986 "Codes: R - RIP, C - connected, S - Static, O - OSPF, B - BGP\n"
2987 "Sub-codes:\n"
2988 " (n) - normal, (s) - static, (d) - default, (r) - redistribute,\n"
2989 " (i) - interface\n\n"
2990 " Network Next Hop Metric From Tag Time\n");
2991
91b508dc
DS
2992 for (np = route_top(rip->table); np; np = route_next(np)) {
2993 list = np->info;
d62a17ae 2994
91b508dc
DS
2995 if (!list)
2996 continue;
2997
2998 for (ALL_LIST_ELEMENTS_RO(list, listnode, rinfo)) {
2999 int len;
3000
3001 len = vty_out(vty, "%c(%s) %pFX",
3002 /* np->lock, For debugging. */
3003 zebra_route_char(rinfo->type),
3004 rip_route_type_print(rinfo->sub_type),
3005 &np->p);
3006
3007 len = 24 - len;
3008
3009 if (len > 0)
3010 vty_out(vty, "%*s", len, " ");
d62a17ae 3011
91b508dc
DS
3012 switch (rinfo->nh.type) {
3013 case NEXTHOP_TYPE_IPV4:
3014 case NEXTHOP_TYPE_IPV4_IFINDEX:
3015 vty_out(vty, "%-20pI4 %2d ",
3016 &rinfo->nh.gate.ipv4, rinfo->metric);
3017 break;
3018 case NEXTHOP_TYPE_IFINDEX:
3019 vty_out(vty, "0.0.0.0 %2d ",
3020 rinfo->metric);
3021 break;
3022 case NEXTHOP_TYPE_BLACKHOLE:
3023 vty_out(vty, "blackhole %2d ",
3024 rinfo->metric);
3025 break;
3026 case NEXTHOP_TYPE_IPV6:
3027 case NEXTHOP_TYPE_IPV6_IFINDEX:
3028 vty_out(vty, "V6 Address Hidden %2d ",
3029 rinfo->metric);
3030 break;
3031 }
3032
3033 /* Route which exist in kernel routing table. */
3034 if ((rinfo->type == ZEBRA_ROUTE_RIP) &&
3035 (rinfo->sub_type == RIP_ROUTE_RTE)) {
3036 vty_out(vty, "%-15pI4 ", &rinfo->from);
3037 vty_out(vty, "%3" ROUTE_TAG_PRI " ",
3038 (route_tag_t)rinfo->tag);
3039 rip_vty_out_uptime(vty, rinfo);
3040 } else if (rinfo->metric == RIP_METRIC_INFINITY) {
3041 vty_out(vty, "self ");
3042 vty_out(vty, "%3" ROUTE_TAG_PRI " ",
3043 (route_tag_t)rinfo->tag);
3044 rip_vty_out_uptime(vty, rinfo);
3045 } else {
3046 if (rinfo->external_metric) {
3047 len = vty_out(
3048 vty, "self (%s:%d)",
3049 zebra_route_string(rinfo->type),
3050 rinfo->external_metric);
3051 len = 16 - len;
3052 if (len > 0)
3053 vty_out(vty, "%*s", len, " ");
3054 } else
3055 vty_out(vty, "self ");
3056 vty_out(vty, "%3" ROUTE_TAG_PRI,
3057 (route_tag_t)rinfo->tag);
d62a17ae 3058 }
91b508dc
DS
3059
3060 vty_out(vty, "\n");
3061 }
3062 }
d62a17ae 3063 return CMD_SUCCESS;
718e3744 3064}
3065
16705130 3066/* Vincent: formerly, it was show_ip_protocols_rip: "show ip protocols" */
3067DEFUN (show_ip_rip_status,
3068 show_ip_rip_status_cmd,
ae7b826a 3069 "show ip rip [vrf NAME] status",
718e3744 3070 SHOW_STR
3071 IP_STR
16705130 3072 "Show RIP routes\n"
ae7b826a 3073 VRF_CMD_HELP_STR
718e3744 3074 "IP routing protocol process parameters and statistics\n")
3075{
045c5389 3076 struct rip *rip;
d62a17ae 3077 struct interface *ifp;
3078 struct rip_interface *ri;
3079 extern const struct message ri_version_msg[];
3080 const char *send_version;
3081 const char *receive_version;
ae7b826a
RW
3082 const char *vrf_name;
3083 int idx = 0;
d62a17ae 3084
ae7b826a
RW
3085 if (argv_find(argv, argc, "vrf", &idx))
3086 vrf_name = argv[idx + 1]->arg;
3087 else
3088 vrf_name = VRF_DEFAULT_NAME;
3089
3090 rip = rip_lookup_by_vrf_name(vrf_name);
3091 if (!rip) {
3092 vty_out(vty, "%% RIP instance not found\n");
d62a17ae 3093 return CMD_SUCCESS;
ae7b826a
RW
3094 }
3095 if (!rip->enabled) {
3096 vty_out(vty, "%% RIP instance is disabled\n");
3097 return CMD_SUCCESS;
3098 }
d62a17ae 3099
3100 vty_out(vty, "Routing Protocol is \"rip\"\n");
b745780b 3101 vty_out(vty, " Sending updates every %u seconds with +/-50%%,",
d62a17ae 3102 rip->update_time);
3103 vty_out(vty, " next due in %lu seconds\n",
4f830a07 3104 event_timer_remain_second(rip->t_update));
b745780b
RW
3105 vty_out(vty, " Timeout after %u seconds,", rip->timeout_time);
3106 vty_out(vty, " garbage collect after %u seconds\n", rip->garbage_time);
d62a17ae 3107
3108 /* Filtering status show. */
03a38493 3109 config_show_distribute(vty, rip->distribute_ctx);
d62a17ae 3110
3111 /* Default metric information. */
282ae30c 3112 vty_out(vty, " Default redistribution metric is %u\n",
d62a17ae 3113 rip->default_metric);
3114
3115 /* Redistribute information. */
3116 vty_out(vty, " Redistributing:");
045c5389 3117 rip_show_redistribute_config(vty, rip);
d62a17ae 3118 vty_out(vty, "\n");
3119
3120 vty_out(vty, " Default version control: send version %s,",
3121 lookup_msg(ri_version_msg, rip->version_send, NULL));
3122 if (rip->version_recv == RI_RIP_VERSION_1_AND_2)
3123 vty_out(vty, " receive any version \n");
3124 else
3125 vty_out(vty, " receive version %s \n",
3126 lookup_msg(ri_version_msg, rip->version_recv, NULL));
3127
3128 vty_out(vty, " Interface Send Recv Key-chain\n");
3129
ae7b826a 3130 FOR_ALL_INTERFACES (rip->vrf, ifp) {
d62a17ae 3131 ri = ifp->info;
3132
3133 if (!ri->running)
3134 continue;
3135
3136 if (ri->enable_network || ri->enable_interface) {
3137 if (ri->ri_send == RI_RIP_UNSPEC)
3138 send_version =
3139 lookup_msg(ri_version_msg,
3140 rip->version_send, NULL);
3141 else
3142 send_version = lookup_msg(ri_version_msg,
3143 ri->ri_send, NULL);
3144
3145 if (ri->ri_receive == RI_RIP_UNSPEC)
3146 receive_version =
3147 lookup_msg(ri_version_msg,
3148 rip->version_recv, NULL);
3149 else
3150 receive_version = lookup_msg(
3151 ri_version_msg, ri->ri_receive, NULL);
3152
3153 vty_out(vty, " %-17s%-3s %-3s %s\n", ifp->name,
3154 send_version, receive_version,
3155 ri->key_chain ? ri->key_chain : "");
3156 }
3157 }
718e3744 3158
d62a17ae 3159 vty_out(vty, " Routing for Networks:\n");
045c5389 3160 rip_show_network_config(vty, rip);
718e3744 3161
91b508dc
DS
3162 int found_passive = 0;
3163 FOR_ALL_INTERFACES (rip->vrf, ifp) {
3164 ri = ifp->info;
3165
3166 if ((ri->enable_network || ri->enable_interface) &&
3167 ri->passive) {
3168 if (!found_passive) {
3169 vty_out(vty, " Passive Interface(s):\n");
3170 found_passive = 1;
d62a17ae 3171 }
91b508dc 3172 vty_out(vty, " %s\n", ifp->name);
d62a17ae 3173 }
718e3744 3174 }
3175
d62a17ae 3176 vty_out(vty, " Routing Information Sources:\n");
3177 vty_out(vty,
3178 " Gateway BadPackets BadRoutes Distance Last Update\n");
045c5389 3179 rip_peer_display(vty, rip);
718e3744 3180
045c5389 3181 rip_distance_show(vty, rip);
718e3744 3182
d62a17ae 3183 return CMD_SUCCESS;
3184}
718e3744 3185
d62a17ae 3186/* RIP configuration write function. */
3187static int config_write_rip(struct vty *vty)
3188{
ae7b826a 3189 struct rip *rip;
d62a17ae 3190 int write = 0;
d62a17ae 3191
ae7b826a
RW
3192 RB_FOREACH(rip, rip_instance_head, &rip_instances) {
3193 char xpath[XPATH_MAXLEN];
3194 struct lyd_node *dnode;
045c5389 3195
ae7b826a
RW
3196 snprintf(xpath, sizeof(xpath),
3197 "/frr-ripd:ripd/instance[vrf='%s']", rip->vrf_name);
3198
3199 dnode = yang_dnode_get(running_config->dnode, xpath);
3200 assert(dnode);
d62a17ae 3201
8c9226c2
RW
3202 nb_cli_show_dnode_cmds(vty, dnode, false);
3203
ae7b826a
RW
3204 /* Distribute configuration. */
3205 config_write_distribute(vty, rip->distribute_ctx);
d62a17ae 3206
07679ad9
IR
3207 vty_out(vty, "exit\n");
3208
ae7b826a 3209 write = 1;
d62a17ae 3210 }
ae7b826a 3211
d62a17ae 3212 return write;
3213}
718e3744 3214
612c2c15 3215static int config_write_rip(struct vty *vty);
d62a17ae 3216/* RIP node structure. */
62b346ee 3217static struct cmd_node rip_node = {
f4b8291f 3218 .name = "rip",
62b346ee 3219 .node = RIP_NODE,
24389580 3220 .parent_node = CONFIG_NODE,
62b346ee 3221 .prompt = "%s(config-router)# ",
612c2c15 3222 .config_write = config_write_rip,
62b346ee 3223};
718e3744 3224
d62a17ae 3225/* Distribute-list update functions. */
03a38493
PG
3226static void rip_distribute_update(struct distribute_ctx *ctx,
3227 struct distribute *dist)
d62a17ae 3228{
3229 struct interface *ifp;
3230 struct rip_interface *ri;
3231 struct access_list *alist;
3232 struct prefix_list *plist;
8478ae7e 3233
ae7b826a 3234 if (!ctx->vrf || !dist->ifname)
d62a17ae 3235 return;
718e3744 3236
a36898e7 3237 ifp = if_lookup_by_name(dist->ifname, ctx->vrf->vrf_id);
d62a17ae 3238 if (ifp == NULL)
3239 return;
718e3744 3240
d62a17ae 3241 ri = ifp->info;
6b0655a2 3242
d62a17ae 3243 if (dist->list[DISTRIBUTE_V4_IN]) {
3244 alist = access_list_lookup(AFI_IP,
3245 dist->list[DISTRIBUTE_V4_IN]);
3246 if (alist)
3247 ri->list[RIP_FILTER_IN] = alist;
3248 else
3249 ri->list[RIP_FILTER_IN] = NULL;
3250 } else
3251 ri->list[RIP_FILTER_IN] = NULL;
3252
3253 if (dist->list[DISTRIBUTE_V4_OUT]) {
3254 alist = access_list_lookup(AFI_IP,
3255 dist->list[DISTRIBUTE_V4_OUT]);
3256 if (alist)
3257 ri->list[RIP_FILTER_OUT] = alist;
3258 else
3259 ri->list[RIP_FILTER_OUT] = NULL;
3260 } else
3261 ri->list[RIP_FILTER_OUT] = NULL;
3262
3263 if (dist->prefix[DISTRIBUTE_V4_IN]) {
3264 plist = prefix_list_lookup(AFI_IP,
3265 dist->prefix[DISTRIBUTE_V4_IN]);
3266 if (plist)
3267 ri->prefix[RIP_FILTER_IN] = plist;
3268 else
3269 ri->prefix[RIP_FILTER_IN] = NULL;
3270 } else
3271 ri->prefix[RIP_FILTER_IN] = NULL;
3272
3273 if (dist->prefix[DISTRIBUTE_V4_OUT]) {
3274 plist = prefix_list_lookup(AFI_IP,
3275 dist->prefix[DISTRIBUTE_V4_OUT]);
3276 if (plist)
3277 ri->prefix[RIP_FILTER_OUT] = plist;
3278 else
3279 ri->prefix[RIP_FILTER_OUT] = NULL;
3280 } else
3281 ri->prefix[RIP_FILTER_OUT] = NULL;
3282}
3283
3284void rip_distribute_update_interface(struct interface *ifp)
3285{
045c5389
RW
3286 struct rip_interface *ri = ifp->info;
3287 struct rip *rip = ri->rip;
d62a17ae 3288 struct distribute *dist;
3289
03a38493
PG
3290 if (!rip)
3291 return;
3292 dist = distribute_lookup(rip->distribute_ctx, ifp->name);
d62a17ae 3293 if (dist)
03a38493 3294 rip_distribute_update(rip->distribute_ctx, dist);
718e3744 3295}
3296
3297/* Update all interface's distribute list. */
02ff83c5 3298/* ARGSUSED */
d62a17ae 3299static void rip_distribute_update_all(struct prefix_list *notused)
718e3744 3300{
f4e14fdb 3301 struct vrf *vrf = vrf_lookup_by_id(VRF_DEFAULT);
d62a17ae 3302 struct interface *ifp;
718e3744 3303
451fda4f 3304 FOR_ALL_INTERFACES (vrf, ifp)
d62a17ae 3305 rip_distribute_update_interface(ifp);
718e3744 3306}
11dde9c2 3307/* ARGSUSED */
d62a17ae 3308static void rip_distribute_update_all_wrapper(struct access_list *notused)
11dde9c2 3309{
d62a17ae 3310 rip_distribute_update_all(NULL);
11dde9c2 3311}
6b0655a2 3312
718e3744 3313/* Delete all added rip route. */
045c5389 3314void rip_clean(struct rip *rip)
718e3744 3315{
eb6b3885
IR
3316 rip_interfaces_clean(rip);
3317
ae7b826a
RW
3318 if (rip->enabled)
3319 rip_instance_disable(rip);
d62a17ae 3320
2d2eaa13 3321 stream_free(rip->obuf);
d62a17ae 3322
2d2eaa13 3323 for (int i = 0; i < ZEBRA_ROUTE_MAX; i++)
f9120f71
RW
3324 if (rip->redist[i].route_map.name)
3325 free(rip->redist[i].route_map.name);
2d2eaa13
RW
3326
3327 route_table_finish(rip->table);
3328 route_table_finish(rip->neighbor);
711915d2 3329 list_delete(&rip->peer_list);
2d2eaa13 3330 distribute_list_delete(&rip->distribute_ctx);
8f88441d 3331 if_rmap_ctx_delete(rip->if_rmap_ctx);
d62a17ae 3332
045c5389
RW
3333 rip_clean_network(rip);
3334 rip_passive_nondefault_clean(rip);
ca046902 3335 vector_free(rip->enable_interface);
1205fdc4 3336 route_table_finish(rip->enable_network);
5a29c0d5 3337 vector_free(rip->passive_nondefault);
3f21c8c4 3338 list_delete(&rip->offset_list_master);
2826309c 3339 route_table_finish(rip->distance_table);
045c5389 3340
ae7b826a
RW
3341 RB_REMOVE(rip_instance_head, &rip_instances, rip);
3342 XFREE(MTYPE_RIP_VRF_NAME, rip->vrf_name);
2d2eaa13 3343 XFREE(MTYPE_RIP, rip);
718e3744 3344}
3345
4b23867c
PG
3346static void rip_if_rmap_update(struct if_rmap_ctx *ctx,
3347 struct if_rmap *if_rmap)
16705130 3348{
aec0d756 3349 struct interface *ifp = NULL;
d62a17ae 3350 struct rip_interface *ri;
3351 struct route_map *rmap;
aec0d756 3352 struct vrf *vrf = NULL;
16705130 3353
aec0d756
PG
3354 if (ctx->name)
3355 vrf = vrf_lookup_by_name(ctx->name);
3356 if (vrf)
a36898e7 3357 ifp = if_lookup_by_name(if_rmap->ifname, vrf->vrf_id);
d62a17ae 3358 if (ifp == NULL)
3359 return;
16705130 3360
d62a17ae 3361 ri = ifp->info;
d62a17ae 3362 if (if_rmap->routemap[IF_RMAP_IN]) {
3363 rmap = route_map_lookup_by_name(if_rmap->routemap[IF_RMAP_IN]);
3364 if (rmap)
3365 ri->routemap[IF_RMAP_IN] = rmap;
3366 else
3367 ri->routemap[IF_RMAP_IN] = NULL;
3368 } else
3369 ri->routemap[RIP_FILTER_IN] = NULL;
16705130 3370
d62a17ae 3371 if (if_rmap->routemap[IF_RMAP_OUT]) {
3372 rmap = route_map_lookup_by_name(if_rmap->routemap[IF_RMAP_OUT]);
3373 if (rmap)
3374 ri->routemap[IF_RMAP_OUT] = rmap;
3375 else
3376 ri->routemap[IF_RMAP_OUT] = NULL;
3377 } else
3378 ri->routemap[RIP_FILTER_OUT] = NULL;
16705130 3379}
3380
d62a17ae 3381void rip_if_rmap_update_interface(struct interface *ifp)
16705130 3382{
8f88441d
RW
3383 struct rip_interface *ri = ifp->info;
3384 struct rip *rip = ri->rip;
d62a17ae 3385 struct if_rmap *if_rmap;
4b23867c 3386 struct if_rmap_ctx *ctx;
16705130 3387
4b23867c
PG
3388 if (!rip)
3389 return;
4b23867c
PG
3390 ctx = rip->if_rmap_ctx;
3391 if (!ctx)
3392 return;
3393 if_rmap = if_rmap_lookup(ctx, ifp->name);
d62a17ae 3394 if (if_rmap)
4b23867c 3395 rip_if_rmap_update(ctx, if_rmap);
16705130 3396}
3397
045c5389 3398static void rip_routemap_update_redistribute(struct rip *rip)
16705130 3399{
045c5389 3400 for (int i = 0; i < ZEBRA_ROUTE_MAX; i++) {
8f88441d 3401 if (rip->redist[i].route_map.name) {
f9120f71
RW
3402 rip->redist[i].route_map.map = route_map_lookup_by_name(
3403 rip->redist[i].route_map.name);
8f88441d
RW
3404 route_map_counter_increment(
3405 rip->redist[i].route_map.map);
d62a17ae 3406 }
16705130 3407 }
16705130 3408}
3409
11dde9c2 3410/* ARGSUSED */
d62a17ae 3411static void rip_routemap_update(const char *notused)
16705130 3412{
f4e14fdb 3413 struct vrf *vrf = vrf_lookup_by_id(VRF_DEFAULT);
045c5389 3414 struct rip *rip;
d62a17ae 3415 struct interface *ifp;
16705130 3416
451fda4f 3417 FOR_ALL_INTERFACES (vrf, ifp)
d62a17ae 3418 rip_if_rmap_update_interface(ifp);
16705130 3419
045c5389
RW
3420 rip = vrf->info;
3421 if (rip)
3422 rip_routemap_update_redistribute(rip);
16705130 3423}
3424
ae7b826a
RW
3425/* Link RIP instance to VRF. */
3426static void rip_vrf_link(struct rip *rip, struct vrf *vrf)
3427{
3428 struct interface *ifp;
3429
3430 rip->vrf = vrf;
3431 rip->distribute_ctx->vrf = vrf;
3432 vrf->info = rip;
3433
3434 FOR_ALL_INTERFACES (vrf, ifp)
3435 rip_interface_sync(ifp);
3436}
3437
3438/* Unlink RIP instance from VRF. */
3439static void rip_vrf_unlink(struct rip *rip, struct vrf *vrf)
3440{
3441 struct interface *ifp;
3442
3443 rip->vrf = NULL;
3444 rip->distribute_ctx->vrf = NULL;
3445 vrf->info = NULL;
3446
3447 FOR_ALL_INTERFACES (vrf, ifp)
3448 rip_interface_sync(ifp);
3449}
3450
3451static void rip_instance_enable(struct rip *rip, struct vrf *vrf, int sock)
3452{
3453 rip->sock = sock;
3454
3455 rip_vrf_link(rip, vrf);
3456 rip->enabled = true;
3457
f9120f71
RW
3458 /* Resend all redistribute requests. */
3459 rip_redistribute_enable(rip);
3460
ae7b826a
RW
3461 /* Create read and timer thread. */
3462 rip_event(rip, RIP_READ, rip->sock);
3463 rip_event(rip, RIP_UPDATE_EVENT, 1);
3464
3465 rip_zebra_vrf_register(vrf);
3466}
3467
3468static void rip_instance_disable(struct rip *rip)
3469{
3470 struct vrf *vrf = rip->vrf;
3471 struct route_node *rp;
3472
3473 /* Clear RIP routes */
3474 for (rp = route_top(rip->table); rp; rp = route_next(rp)) {
3475 struct rip_info *rinfo;
3476 struct list *list;
3477 struct listnode *listnode;
3478
3479 if ((list = rp->info) == NULL)
3480 continue;
3481
3482 rinfo = listgetdata(listhead(list));
3483 if (rip_route_rte(rinfo))
3484 rip_zebra_ipv4_delete(rip, rp);
3485
3486 for (ALL_LIST_ELEMENTS_RO(list, listnode, rinfo)) {
e16d030c
DS
3487 EVENT_OFF(rinfo->t_timeout);
3488 EVENT_OFF(rinfo->t_garbage_collect);
ae7b826a
RW
3489 rip_info_free(rinfo);
3490 }
3491 list_delete(&list);
3492 rp->info = NULL;
3493 route_unlock_node(rp);
3494 }
3495
f9120f71
RW
3496 /* Flush all redistribute requests. */
3497 rip_redistribute_disable(rip);
3498
ae7b826a 3499 /* Cancel RIP related timers. */
e16d030c
DS
3500 EVENT_OFF(rip->t_update);
3501 EVENT_OFF(rip->t_triggered_update);
3502 EVENT_OFF(rip->t_triggered_interval);
ae7b826a
RW
3503
3504 /* Cancel read thread. */
e16d030c 3505 EVENT_OFF(rip->t_read);
ae7b826a
RW
3506
3507 /* Close RIP socket. */
3508 close(rip->sock);
3509 rip->sock = -1;
3510
3511 /* Clear existing peers. */
3512 list_delete_all_node(rip->peer_list);
3513
3514 rip_zebra_vrf_deregister(vrf);
3515
3516 rip_vrf_unlink(rip, vrf);
3517 rip->enabled = false;
3518}
3519
3520static int rip_vrf_new(struct vrf *vrf)
3521{
3522 if (IS_RIP_DEBUG_EVENT)
3523 zlog_debug("%s: VRF created: %s(%u)", __func__, vrf->name,
3524 vrf->vrf_id);
3525
3526 return 0;
3527}
3528
3529static int rip_vrf_delete(struct vrf *vrf)
3530{
3d1588d8
DS
3531 struct rip *rip;
3532
ae7b826a
RW
3533 if (IS_RIP_DEBUG_EVENT)
3534 zlog_debug("%s: VRF deleted: %s(%u)", __func__, vrf->name,
3535 vrf->vrf_id);
3536
3d1588d8
DS
3537 rip = rip_lookup_by_vrf_name(vrf->name);
3538 if (!rip)
3539 return 0;
3540
3541 rip_clean(rip);
3542
ae7b826a
RW
3543 return 0;
3544}
3545
3546static int rip_vrf_enable(struct vrf *vrf)
3547{
3548 struct rip *rip;
3549 int socket;
3550
3551 rip = rip_lookup_by_vrf_name(vrf->name);
3552 if (!rip || rip->enabled)
3553 return 0;
3554
3555 if (IS_RIP_DEBUG_EVENT)
3556 zlog_debug("%s: VRF %s(%u) enabled", __func__, vrf->name,
3557 vrf->vrf_id);
3558
3559 /* Activate the VRF RIP instance. */
3560 if (!rip->enabled) {
3561 socket = rip_create_socket(vrf);
3562 if (socket < 0)
3563 return -1;
3564
3565 rip_instance_enable(rip, vrf, socket);
3566 }
3567
3568 return 0;
3569}
3570
3571static int rip_vrf_disable(struct vrf *vrf)
3572{
3573 struct rip *rip;
3574
3575 rip = rip_lookup_by_vrf_name(vrf->name);
3576 if (!rip || !rip->enabled)
3577 return 0;
3578
3579 if (IS_RIP_DEBUG_EVENT)
3580 zlog_debug("%s: VRF %s(%u) disabled", __func__, vrf->name,
3581 vrf->vrf_id);
3582
3583 /* Deactivate the VRF RIP instance. */
3584 if (rip->enabled)
3585 rip_instance_disable(rip);
3586
3587 return 0;
3588}
3589
3590void rip_vrf_init(void)
3591{
ac2cb9bf 3592 vrf_init(rip_vrf_new, rip_vrf_enable, rip_vrf_disable, rip_vrf_delete);
f5eef2d5 3593
cfc369c4 3594 vrf_cmd_init(NULL);
ae7b826a
RW
3595}
3596
3597void rip_vrf_terminate(void)
3598{
3599 vrf_terminate();
3600}
3601
718e3744 3602/* Allocate new rip structure and set default value. */
d62a17ae 3603void rip_init(void)
3604{
3605 /* Install top nodes. */
612c2c15 3606 install_node(&rip_node);
d62a17ae 3607
3608 /* Install rip commands. */
3609 install_element(VIEW_NODE, &show_ip_rip_cmd);
3610 install_element(VIEW_NODE, &show_ip_rip_status_cmd);
d62a17ae 3611
3612 install_default(RIP_NODE);
d62a17ae 3613
3614 /* Debug related init. */
3615 rip_debug_init();
3616
3617 /* Access list install. */
3618 access_list_init();
3619 access_list_add_hook(rip_distribute_update_all_wrapper);
3620 access_list_delete_hook(rip_distribute_update_all_wrapper);
3621
3622 /* Prefix list initialize.*/
3623 prefix_list_init();
3624 prefix_list_add_hook(rip_distribute_update_all);
3625 prefix_list_delete_hook(rip_distribute_update_all);
3626
d62a17ae 3627 /* Route-map */
3628 rip_route_map_init();
d62a17ae 3629
3630 route_map_add_hook(rip_routemap_update);
3631 route_map_delete_hook(rip_routemap_update);
3632
3633 if_rmap_init(RIP_NODE);
718e3744 3634}