]> git.puffer.fish Git - mirror/frr.git/commitdiff
[bgpd] cleanup, compact and consolidate capability parsing code
authorPaul Jakma <paul.jakma@sun.com>
Mon, 6 Aug 2007 15:21:45 +0000 (15:21 +0000)
committerPaul Jakma <paul.jakma@sun.com>
Mon, 6 Aug 2007 15:21:45 +0000 (15:21 +0000)
2007-07-26 Paul Jakma <paul.jakma@sun.com>

* (general) Clean up and compact capability parsing slightly.
  Consolidate validation of length and logging of generic TLV, and
  memcpy of capability data, thus removing such from cap specifc
  code (not always present or correct).
* bgp_open.h: Add structures for the generic capability TLV header
  and for the data formats of the various specific capabilities we
  support.  Hence remove the badly named, or else misdefined, struct
  capability.
* bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
  Do the length checks *before* memcpy()'ing based on that length
  (stored capability - should have been validated anyway on input,
  but..).
  (bgp_afi_safi_valid_indices) new function to validate (afi,safi)
  which is about to be used as index into arrays, consolidates
  several instances of same, at least one of which appeared to be
  incomplete..
  (bgp_capability_mp) Much condensed.
  (bgp_capability_orf_entry) New, process one ORF entry
  (bgp_capability_orf) Condensed. Fixed to process all ORF entries.
  (bgp_capability_restart) Condensed, and fixed to use a
  cap-specific type, rather than abusing capability_mp.
  (struct message capcode_str) added to aid generic logging.
  (size_t cap_minsizes[]) added to aid generic validation of
  capability length field.
  (bgp_capability_parse) Generic logging and validation of TLV
  consolidated here. Code compacted as much as possible.
* bgp_packet.c: (bgp_open_receive) Capability parsers now use
  streams, so no more need here to manually fudge the input stream
  getp.
  (bgp_capability_msg_parse) use struct capability_mp_data. Validate
  lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
  (bgp_capability_receive) Exported for use by test harness.
* bgp_vty.c: (bgp_show_summary) fix conversion warning
  (bgp_show_peer) ditto
* bgp_debug.h: Fix storage 'extern' after type 'const'.
        * lib/log.c: (mes_lookup) warning about code not being in
          same-number array slot should be debug, not warning. E.g. BGP
          has several discontigious number spaces, allocating from
          different parts of a space is not uncommon (e.g. IANA
          assigned versus vendor-assigned code points in some number
          space).

bgpd/ChangeLog
bgpd/bgp_debug.h
bgpd/bgp_open.c
bgpd/bgp_open.h
bgpd/bgp_packet.c
bgpd/bgp_vty.c
lib/ChangeLog
lib/log.c
tests/ChangeLog
tests/Makefile.am

index 5fb87e2cbe775828f12ab209c0ab20c78d148aa1..7a93a90b880ccdb8babc76b2938a1495d09fa697 100644 (file)
@@ -1,3 +1,41 @@
+2007-07-26 Paul Jakma <paul.jakma@sun.com>
+
+       * (general) Clean up and compact capability parsing slightly.
+         Consolidate validation of length and logging of generic TLV, and
+         memcpy of capability data, thus removing such from cap specifc
+         code (not always present or correct).
+       * bgp_open.h: Add structures for the generic capability TLV header
+         and for the data formats of the various specific capabilities we
+         support.  Hence remove the badly named, or else misdefined, struct
+         capability.
+       * bgp_open.c: (bgp_capability_vty_out) Use struct capability_mp_data.
+         Do the length checks *before* memcpy()'ing based on that length
+         (stored capability - should have been validated anyway on input,
+         but..).
+         (bgp_afi_safi_valid_indices) new function to validate (afi,safi)
+         which is about to be used as index into arrays, consolidates
+         several instances of same, at least one of which appeared to be
+         incomplete..
+         (bgp_capability_mp) Much condensed.
+         (bgp_capability_orf_entry) New, process one ORF entry
+         (bgp_capability_orf) Condensed. Fixed to process all ORF entries.
+         (bgp_capability_restart) Condensed, and fixed to use a
+         cap-specific type, rather than abusing capability_mp.
+         (struct message capcode_str) added to aid generic logging.
+         (size_t cap_minsizes[]) added to aid generic validation of
+         capability length field.
+         (bgp_capability_parse) Generic logging and validation of TLV
+         consolidated here. Code compacted as much as possible.
+       * bgp_packet.c: (bgp_open_receive) Capability parsers now use
+         streams, so no more need here to manually fudge the input stream
+         getp.
+         (bgp_capability_msg_parse) use struct capability_mp_data. Validate
+         lengths /before/ memcpy. Use bgp_afi_safi_valid_indices.
+         (bgp_capability_receive) Exported for use by test harness.      
+       * bgp_vty.c: (bgp_show_summary) fix conversion warning
+         (bgp_show_peer) ditto
+       * bgp_debug.h: Fix storage 'extern' after type 'const'.
+
 2007-07-31 Lorenzo Colitti <lorenzo@colitti.com>
 
        * bgp_dump.c: (general) Add comments to code.
index eab95d09c52719b02aec4672266199582500fc8d..7015cb77ad20991f3fa71fa3d9a5fc8e59129443 100644 (file)
@@ -110,7 +110,7 @@ extern unsigned long term_bgp_debug_zebra;
 #define BGP_DEBUG(a, b)                (term_bgp_debug_ ## a & BGP_DEBUG_ ## b)
 #define CONF_BGP_DEBUG(a, b)    (conf_bgp_debug_ ## a & BGP_DEBUG_ ## b)
 
-const extern char *bgp_type_str[];
+extern const char *bgp_type_str[];
 
 extern int bgp_dump_attr (struct peer *, struct attr *, char *, size_t);
 extern void bgp_notify_print (struct peer *, struct bgp_notify *, const char *);
index e44bd2a07d08b083cb288f8e5617dc9187829525..d4f7cdf598d0f2c98b2bba7cdf7989743f8db3c0 100644 (file)
@@ -26,6 +26,7 @@ Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
 #include "thread.h"
 #include "log.h"
 #include "command.h"
+#include "memory.h"
 
 #include "bgpd/bgpd.h"
 #include "bgpd/bgp_attr.h"
@@ -50,25 +51,28 @@ bgp_capability_vty_out (struct vty *vty, struct peer *peer)
 {
   char *pnt;
   char *end;
-  struct capability cap;
+  struct capability_mp_data mpc;
+  struct capability_header *hdr;
 
   pnt = peer->notify.data;
   end = pnt + peer->notify.length;
-
+  
   while (pnt < end)
     {
-      memcpy(&cap, pnt, sizeof(struct capability));
-
-      if (pnt + 2 > end)
+      if (pnt + sizeof (struct capability_mp_data) + 2 > end)
        return;
-      if (pnt + (cap.length + 2) > end)
+      
+      hdr = (struct capability_header *)pnt;
+      if (pnt + hdr->length + 2 > end)
        return;
 
-      if (cap.code == CAPABILITY_CODE_MP)
+      memcpy (&mpc, pnt + 2, sizeof(struct capability_mp_data));
+
+      if (hdr->code == CAPABILITY_CODE_MP)
        {
          vty_out (vty, "  Capability error for: Multi protocol ");
 
-         switch (ntohs (cap.mpc.afi))
+         switch (ntohs (mpc.afi))
            {
            case AFI_IP:
              vty_out (vty, "AFI IPv4, ");
@@ -77,10 +81,10 @@ bgp_capability_vty_out (struct vty *vty, struct peer *peer)
              vty_out (vty, "AFI IPv6, ");
              break;
            default:
-             vty_out (vty, "AFI Unknown %d, ", ntohs (cap.mpc.afi));
+             vty_out (vty, "AFI Unknown %d, ", ntohs (mpc.afi));
              break;
            }
-         switch (cap.mpc.safi)
+         switch (mpc.safi)
            {
            case SAFI_UNICAST:
              vty_out (vty, "SAFI Unicast");
@@ -95,88 +99,87 @@ bgp_capability_vty_out (struct vty *vty, struct peer *peer)
              vty_out (vty, "SAFI MPLS-VPN");
              break;
            default:
-             vty_out (vty, "SAFI Unknown %d ", cap.mpc.safi);
+             vty_out (vty, "SAFI Unknown %d ", mpc.safi);
              break;
            }
          vty_out (vty, "%s", VTY_NEWLINE);
        }
-      else if (cap.code >= 128)
+      else if (hdr->code >= 128)
        vty_out (vty, "  Capability error: vendor specific capability code %d",
-                cap.code);
+                hdr->code);
       else
        vty_out (vty, "  Capability error: unknown capability code %d", 
-                cap.code);
+                hdr->code);
 
-      pnt += cap.length + 2;
+      pnt += hdr->length + 2;
     }
 }
 
-/* Set negotiated capability value. */
-static int
-bgp_capability_mp (struct peer *peer, struct capability *cap)
+static void 
+bgp_capability_mp_data (struct stream *s, struct capability_mp_data *mpc)
 {
-  if (ntohs (cap->mpc.afi) == AFI_IP)
-    {
-      if (cap->mpc.safi == SAFI_UNICAST)
-       {
-         peer->afc_recv[AFI_IP][SAFI_UNICAST] = 1;
-
-         if (peer->afc[AFI_IP][SAFI_UNICAST])
-           peer->afc_nego[AFI_IP][SAFI_UNICAST] = 1;
-         else
-           return -1;
-       }
-      else if (cap->mpc.safi == SAFI_MULTICAST) 
-       {
-         peer->afc_recv[AFI_IP][SAFI_MULTICAST] = 1;
-
-         if (peer->afc[AFI_IP][SAFI_MULTICAST])
-           peer->afc_nego[AFI_IP][SAFI_MULTICAST] = 1;
-         else
-           return -1;
-       }
-      else if (cap->mpc.safi == BGP_SAFI_VPNV4)
-       {
-         peer->afc_recv[AFI_IP][SAFI_MPLS_VPN] = 1;
+  mpc->afi = stream_getw (s);
+  mpc->reserved = stream_getc (s);
+  mpc->safi = stream_getc (s);
+}
 
-         if (peer->afc[AFI_IP][SAFI_MPLS_VPN])
-           peer->afc_nego[AFI_IP][SAFI_MPLS_VPN] = 1;
-         else
-           return -1;
-       }
-      else
-       return -1;
-    }
-#ifdef HAVE_IPV6
-  else if (ntohs (cap->mpc.afi) == AFI_IP6)
+int
+bgp_afi_safi_valid_indices (afi_t afi, safi_t *safi)
+{
+  /* VPNvX are AFI specific */
+  if ((afi == AFI_IP6 && *safi == BGP_SAFI_VPNV4)
+      || (afi == AFI_IP && *safi == BGP_SAFI_VPNV6))
     {
-      if (cap->mpc.safi == SAFI_UNICAST)
-       {
-         peer->afc_recv[AFI_IP6][SAFI_UNICAST] = 1;
-
-         if (peer->afc[AFI_IP6][SAFI_UNICAST])
-           peer->afc_nego[AFI_IP6][SAFI_UNICAST] = 1;
-         else
-           return -1;
-       }
-      else if (cap->mpc.safi == SAFI_MULTICAST)
-       {
-         peer->afc_recv[AFI_IP6][SAFI_MULTICAST] = 1;
-
-         if (peer->afc[AFI_IP6][SAFI_MULTICAST])
-           peer->afc_nego[AFI_IP6][SAFI_MULTICAST] = 1;
-         else
-           return -1;
-       }
-      else
-       return -1;
+      zlog_warn ("Invalid afi/safi combination (%u/%u)", afi, *safi);
+      return 0;
     }
-#endif /* HAVE_IPV6 */
-  else
+  
+  switch (afi)
     {
-      /* Unknown Address Family. */
-      return -1;
+      case AFI_IP:
+#ifdef HAVE_IPV6
+      case AFI_IP6:
+#endif
+        switch (*safi)
+          {
+            /* BGP VPNvX SAFI isn't contigious with others, remap */
+            case BGP_SAFI_VPNV4:
+            case BGP_SAFI_VPNV6:
+              *safi = SAFI_MPLS_VPN;
+            case SAFI_UNICAST:
+            case SAFI_MULTICAST:
+            case SAFI_MPLS_VPN:
+              return 1;
+          }
     }
+  zlog_debug ("unknown afi/safi (%u/%u)", afi, *safi);
+  
+  return 0;
+}
+
+/* Set negotiated capability value. */
+static int
+bgp_capability_mp (struct peer *peer, struct capability_header *hdr)
+{
+  struct capability_mp_data mpc;
+  struct stream *s = BGP_INPUT (peer);
+  
+  bgp_capability_mp_data (s, &mpc);
+  
+  if (BGP_DEBUG (normal, NORMAL))
+    zlog_debug ("%s OPEN has MP_EXT CAP for afi/safi: %u/%u",
+               peer->host, mpc.afi, mpc.safi);
+  
+  if (!bgp_afi_safi_valid_indices (mpc.afi, &mpc.safi))
+    return -1;
+   
+  /* Now safi remapped, and afi/safi are valid array indices */
+  peer->afc_recv[mpc.afi][mpc.safi] = 1;
+  
+  if (peer->afc[mpc.afi][mpc.safi])
+    peer->afc_nego[mpc.safi][mpc.safi] = 1;
+  else 
+    return -1;
 
   return 0;
 }
@@ -190,98 +193,133 @@ bgp_capability_orf_not_support (struct peer *peer, afi_t afi, safi_t safi,
               peer->host, afi, safi, type, mode);
 }
 
+static struct message orf_type_str[] =
+{
+  { ORF_TYPE_PREFIX,           "Prefixlist"            },
+  { ORF_TYPE_PREFIX_OLD,       "Prefixlist (old)"      },
+};
+static int orf_type_str_max = sizeof(orf_type_str)/sizeof(orf_type_str[0]);
+
+static struct message orf_mode_str[] =
+{
+  { ORF_MODE_RECEIVE,  "Receive"       },
+  { ORF_MODE_SEND,     "Send"          },
+  { ORF_MODE_BOTH,     "Both"          },
+};
+static int orf_mode_str_max = sizeof(orf_mode_str)/sizeof(orf_mode_str[0]);
+
 static int
-bgp_capability_orf (struct peer *peer, struct capability *cap,
-                   u_char *pnt)
+bgp_capability_orf_entry (struct peer *peer, struct capability_header *hdr)
 {
-  afi_t afi = ntohs(cap->mpc.afi);
-  safi_t safi = cap->mpc.safi;
-  u_char number_of_orfs;
+  struct stream *s = BGP_INPUT (peer);
+  struct capability_orf_entry entry;
+  afi_t afi;
+  safi_t safi;
   u_char type;
   u_char mode;
   u_int16_t sm_cap = 0; /* capability send-mode receive */
   u_int16_t rm_cap = 0; /* capability receive-mode receive */ 
   int i;
 
-  /* Check length. */
-  if (cap->length < 7)
-    {
-      zlog_info ("%s ORF Capability length error %d",
-                peer->host, cap->length);
-                bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
-      return -1;
-    }
-
+  /* ORF Entry header */
+  bgp_capability_mp_data (s, &entry.mpc);
+  entry.num = stream_getc (s);
+  afi = entry.mpc.afi;
+  safi = entry.mpc.safi;
+  
   if (BGP_DEBUG (normal, NORMAL))
-    zlog_debug ("%s OPEN has ORF CAP(%s) for afi/safi: %u/%u",
-              peer->host, (cap->code == CAPABILITY_CODE_ORF ?
-                       "new" : "old"), afi, safi);
+    zlog_debug ("%s ORF Cap entry for afi/safi: %u/%u",
+               peer->host, entry.mpc.afi, entry.mpc.safi);
 
   /* Check AFI and SAFI. */
-  if ((afi != AFI_IP && afi != AFI_IP6)
-      || (safi != SAFI_UNICAST && safi != SAFI_MULTICAST
-         && safi != BGP_SAFI_VPNV4))
+  if (!bgp_afi_safi_valid_indices (entry.mpc.afi, &safi))
+    {
+      zlog_info ("%s Addr-family %d/%d not supported."
+                 " Ignoring the ORF capability",
+                 peer->host, entry.mpc.afi, entry.mpc.safi);
+      return 0;
+    }
+  
+  /* validate number field */
+  if (sizeof (struct capability_orf_entry) + (entry.num * 2) > hdr->length)
     {
-      zlog_info ("%s Addr-family %d/%d not supported. Ignoring the ORF capability",
-                 peer->host, afi, safi);
+      zlog_info ("%s ORF Capability entry length error,"
+                 " Cap length %u, num %u",
+                 peer->host, hdr->length, entry.num);
+      bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
       return -1;
     }
 
-  number_of_orfs = *pnt++;
-
-  for (i = 0 ; i < number_of_orfs ; i++)
+  for (i = 0 ; i < entry.num ; i++)
     {
-      type = *pnt++;
-      mode = *pnt++;
-
+      type = stream_getc(s);
+      mode = stream_getc(s);
+      
       /* ORF Mode error check */
-      if (mode != ORF_MODE_BOTH && mode != ORF_MODE_SEND
-         && mode != ORF_MODE_RECEIVE)
-       {
-         bgp_capability_orf_not_support (peer, afi, safi, type, mode);
-         continue;
+      switch (mode)
+        {
+          case ORF_MODE_BOTH:
+          case ORF_MODE_SEND:
+          case ORF_MODE_RECEIVE:
+            break;
+          default:
+           bgp_capability_orf_not_support (peer, afi, safi, type, mode);
+           continue;
        }
+      /* ORF Type and afi/safi error checks */
+      /* capcode versus type */
+      switch (hdr->code)
+        {
+          case CAPABILITY_CODE_ORF:
+            switch (type)
+              {
+                case ORF_TYPE_PREFIX:
+                  break;
+                default:
+                  bgp_capability_orf_not_support (peer, afi, safi, type, mode);
+                  continue;
+              }
+            break;
+          case CAPABILITY_CODE_ORF_OLD:
+            switch (type)
+              {
+                case ORF_TYPE_PREFIX_OLD:
+                  break;
+                default:
+                  bgp_capability_orf_not_support (peer, afi, safi, type, mode);
+                  continue;
+              }
+            break;
+          default:
+            bgp_capability_orf_not_support (peer, afi, safi, type, mode);
+            continue;
+        }
+                
+      /* AFI vs SAFI */
+      if (!((afi == AFI_IP && safi == SAFI_UNICAST)
+            || (afi == AFI_IP && safi == SAFI_MULTICAST)
+            || (afi == AFI_IP6 && safi == SAFI_UNICAST)))
+        {
+          bgp_capability_orf_not_support (peer, afi, safi, type, mode);
+          continue;
+        }
+      
+      if (BGP_DEBUG (normal, NORMAL))
+        zlog_debug ("%s OPEN has %s ORF capability"
+                    " as %s for afi/safi: %d/%d",
+                    peer->host, LOOKUP (orf_type_str, type),
+                    LOOKUP (orf_mode_str, mode),
+                    entry.mpc.afi, safi);
 
-      /* ORF Type and afi/safi error check */
-      if (cap->code == CAPABILITY_CODE_ORF)
+      if (hdr->code == CAPABILITY_CODE_ORF)
        {
-         if (type == ORF_TYPE_PREFIX &&
-             ((afi == AFI_IP && safi == SAFI_UNICAST)
-               || (afi == AFI_IP && safi == SAFI_MULTICAST)
-               || (afi == AFI_IP6 && safi == SAFI_UNICAST)))
-           {
-             sm_cap = PEER_CAP_ORF_PREFIX_SM_RCV;
-             rm_cap = PEER_CAP_ORF_PREFIX_RM_RCV;
-             if (BGP_DEBUG (normal, NORMAL))
-               zlog_debug ("%s OPEN has Prefixlist ORF(%d) capability as %s for afi/safi: %d/%d",
-                          peer->host, ORF_TYPE_PREFIX, (mode == ORF_MODE_SEND ? "SEND" :
-                          mode == ORF_MODE_RECEIVE ? "RECEIVE" : "BOTH") , afi, safi);
-           }
-         else
-           {
-             bgp_capability_orf_not_support (peer, afi, safi, type, mode);
-             continue;
-           }
+          sm_cap = PEER_CAP_ORF_PREFIX_SM_RCV;
+          rm_cap = PEER_CAP_ORF_PREFIX_RM_RCV;
        }
-      else if (cap->code == CAPABILITY_CODE_ORF_OLD)
+      else if (hdr->code == CAPABILITY_CODE_ORF_OLD)
        {
-         if (type == ORF_TYPE_PREFIX_OLD &&
-             ((afi == AFI_IP && safi == SAFI_UNICAST)
-               || (afi == AFI_IP && safi == SAFI_MULTICAST)
-               || (afi == AFI_IP6 && safi == SAFI_UNICAST)))
-           {
-             sm_cap = PEER_CAP_ORF_PREFIX_SM_OLD_RCV;
-             rm_cap = PEER_CAP_ORF_PREFIX_RM_OLD_RCV;
-             if (BGP_DEBUG (normal, NORMAL))
-               zlog_debug ("%s OPEN has Prefixlist ORF(%d) capability as %s for afi/safi: %d/%d",
-                          peer->host, ORF_TYPE_PREFIX_OLD, (mode == ORF_MODE_SEND ? "SEND" :
-                          mode == ORF_MODE_RECEIVE ? "RECEIVE" : "BOTH") , afi, safi);
-           }
-         else
-           {
-             bgp_capability_orf_not_support (peer, afi, safi, type, mode);
-             continue;
-           }
+          sm_cap = PEER_CAP_ORF_PREFIX_SM_OLD_RCV;
+          rm_cap = PEER_CAP_ORF_PREFIX_RM_OLD_RCV;
        }
       else
        {
@@ -306,206 +344,258 @@ bgp_capability_orf (struct peer *peer, struct capability *cap,
   return 0;
 }
 
-/* Parse given capability. */
 static int
-bgp_capability_parse (struct peer *peer, u_char *pnt, u_char length,
-                     u_char **error)
+bgp_capability_orf (struct peer *peer, struct capability_header *hdr)
 {
-  int ret;
-  u_char *end;
-  struct capability cap;
-
-  end = pnt + length;
-
-  while (pnt < end)
+  struct stream *s = BGP_INPUT (peer);
+  size_t end = stream_get_getp (s) + hdr->length;
+  
+  assert (stream_get_getp(s) + sizeof(struct capability_orf_entry) <= end);
+  
+  /* We must have at least one ORF entry, as the caller has already done
+   * minimum length validation for the capability code - for ORF there must
+   * at least one ORF entry (header and unknown number of pairs of bytes).
+   */
+  do
     {
-      afi_t afi;
-      safi_t safi;
+      if (bgp_capability_orf_entry (peer, hdr) == -1)
+        return -1;
+    } 
+  while (stream_get_getp(s) + sizeof(struct capability_orf_entry) < end);
+  
+  return 0;
+}
 
-      /* Fetch structure to the byte stream. */
-      memcpy (&cap, pnt, sizeof (struct capability));
+static int
+bgp_capability_restart (struct peer *peer, struct capability_header *caphdr)
+{
+  struct stream *s = BGP_INPUT (peer);
+  u_int16_t restart_flag_time;
+  int restart_bit = 0;
+  size_t end = stream_get_getp (s) + caphdr->length;
+
+  SET_FLAG (peer->cap, PEER_CAP_RESTART_RCV);
+  restart_flag_time = stream_getw(s);
+  if (CHECK_FLAG (restart_flag_time, RESTART_R_BIT))
+    restart_bit = 1;
+  UNSET_FLAG (restart_flag_time, 0xF000);
+  peer->v_gr_restart = restart_flag_time;
 
-      afi = ntohs(cap.mpc.afi);
-      safi = cap.mpc.safi;
+  if (BGP_DEBUG (normal, NORMAL))
+    {
+      zlog_debug ("%s OPEN has Graceful Restart capability", peer->host);
+      zlog_debug ("%s Peer has%srestarted. Restart Time : %d",
+                  peer->host, restart_bit ? " " : " not ",
+                  peer->v_gr_restart);
+    }
 
-      if (BGP_DEBUG (normal, NORMAL))
-       zlog_debug ("%s OPEN has CAPABILITY code: %d, length %d",
-                  peer->host, cap.code, cap.length);
+  while (stream_get_getp (s) + 4 < end)
+    {
+      afi_t afi = stream_getw (s);
+      safi_t safi = stream_getc (s);
+      u_char flag = stream_getc (s);
+      
+      if (!bgp_afi_safi_valid_indices (afi, &safi))
+        {
+          if (BGP_DEBUG (normal, NORMAL))
+            zlog_debug ("%s Addr-family %d/%d(afi/safi) not supported."
+                        " Ignore the Graceful Restart capability",
+                        peer->host, afi, safi);
+        }
+      else if (!peer->afc[afi][safi])
+        {
+          if (BGP_DEBUG (normal, NORMAL))
+            zlog_debug ("%s Addr-family %d/%d(afi/safi) not enabled."
+                        " Ignore the Graceful Restart capability",
+                        peer->host, afi, safi);
+        }
+      else
+        {
+          if (BGP_DEBUG (normal, NORMAL))
+            zlog_debug ("%s Address family %s is%spreserved", peer->host,
+                        afi_safi_print (afi, safi),
+                        CHECK_FLAG (peer->af_cap[afi][safi],
+                                    PEER_CAP_RESTART_AF_PRESERVE_RCV)
+                        ? " " : " not ");
+
+          SET_FLAG (peer->af_cap[afi][safi], PEER_CAP_RESTART_AF_RCV);
+          if (CHECK_FLAG (flag, RESTART_F_BIT))
+            SET_FLAG (peer->af_cap[afi][safi], PEER_CAP_RESTART_AF_PRESERVE_RCV);
+          
+        }
+    }
+  return 0;
+}
 
+static struct message capcode_str[] =
+{
+  { 0, ""},
+  { CAPABILITY_CODE_MP,                        "MultiProtocol Extensions"      },
+  { CAPABILITY_CODE_REFRESH,           "Route Refresh"                 },
+  { CAPABILITY_CODE_ORF,               "Cooperative Route Filtering"   },
+  { CAPABILITY_CODE_RESTART,           "Graceful Restart"              },
+  { CAPABILITY_CODE_AS4,               "4-octet AS number"             },
+  { CAPABILITY_CODE_DYNAMIC,           "Dynamic"                       },
+  { CAPABILITY_CODE_REFRESH_OLD,       "Route Refresh (Old)"           },
+  { CAPABILITY_CODE_ORF_OLD,           "ORF (Old)"                     },
+};
+int capcode_str_max = sizeof(capcode_str)/sizeof(capcode_str[0]);
+
+/* Minimum sizes for length field of each cap (so not inc. the header) */
+static size_t cap_minsizes[] = 
+{
+  [CAPABILITY_CODE_MP]         = sizeof (struct capability_mp_data),
+  [CAPABILITY_CODE_REFRESH]    = CAPABILITY_CODE_REFRESH_LEN,
+  [CAPABILITY_CODE_ORF]                = sizeof (struct capability_orf_entry),
+  [CAPABILITY_CODE_RESTART]    = sizeof (struct capability_gr) - 2,
+  [CAPABILITY_CODE_AS4]                = CAPABILITY_CODE_AS4_LEN,
+  [CAPABILITY_CODE_DYNAMIC]    = CAPABILITY_CODE_DYNAMIC_LEN,
+  [CAPABILITY_CODE_REFRESH_OLD]        = CAPABILITY_CODE_REFRESH_LEN,
+  [CAPABILITY_CODE_ORF_OLD]    = sizeof (struct capability_orf_entry),
+};
+
+/* Parse given capability.
+ * XXX: This is reading into a stream, but not using stream API
+ */
+static int
+bgp_capability_parse (struct peer *peer, size_t length, u_char **error)
+{
+  int ret;
+  struct stream *s = BGP_INPUT (peer);
+  size_t end = stream_get_getp (s) + length;
+  
+  assert (STREAM_READABLE (s) >= length);
+  
+  while (stream_get_getp (s) < end)
+    {
+      size_t start;
+      u_char *sp = stream_pnt (s);
+      struct capability_header caphdr;
+      
       /* We need at least capability code and capability length. */
-      if (pnt + 2 > end)
+      if (stream_get_getp(s) + 2 > end)
        {
-         zlog_info ("%s Capability length error", peer->host);
+         zlog_info ("%s Capability length error (< header)", peer->host);
          bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
          return -1;
        }
-
-      /* Capability length check. */
-      if (pnt + (cap.length + 2) > end)
+      
+      caphdr.code = stream_getc (s);
+      caphdr.length = stream_getc (s);
+      start = stream_get_getp (s);
+      
+      /* Capability length check sanity check. */
+      if (start + caphdr.length > end)
        {
-         zlog_info ("%s Capability length error", peer->host);
+         zlog_info ("%s Capability length error (< length)", peer->host);
          bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
          return -1;
        }
-
-      /* We know MP Capability Code. */
-      if (cap.code == CAPABILITY_CODE_MP)
-       {
-         if (BGP_DEBUG (normal, NORMAL))
-           zlog_debug ("%s OPEN has MP_EXT CAP for afi/safi: %u/%u",
-                      peer->host, afi, safi);
-
-         /* Ignore capability when override-capability is set. */
-         if (! CHECK_FLAG (peer->flags, PEER_FLAG_OVERRIDE_CAPABILITY))
-           {
-             /* Set negotiated value. */
-             ret = bgp_capability_mp (peer, &cap);
-
-             /* Unsupported Capability. */
-             if (ret < 0)
-               {
-                 /* Store return data. */
-                 memcpy (*error, &cap, cap.length + 2);
-                 *error += cap.length + 2;
-               }
-           }
-       }
-      else if (cap.code == CAPABILITY_CODE_REFRESH
-              || cap.code == CAPABILITY_CODE_REFRESH_OLD)
-       {
-         /* Check length. */
-         if (cap.length != CAPABILITY_CODE_REFRESH_LEN)
-           {
-             zlog_info ("%s Route Refresh Capability length error %d",
-                        peer->host, cap.length);
-             bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
-             return -1;
-           }
-
-         if (BGP_DEBUG (normal, NORMAL))
-           zlog_debug ("%s OPEN has ROUTE-REFRESH capability(%s) for all address-families",
-                      peer->host,
-                      cap.code == CAPABILITY_CODE_REFRESH_OLD ? "old" : "new");
-
-         /* BGP refresh capability */
-         if (cap.code == CAPABILITY_CODE_REFRESH_OLD)
-           SET_FLAG (peer->cap, PEER_CAP_REFRESH_OLD_RCV);
-         else
-           SET_FLAG (peer->cap, PEER_CAP_REFRESH_NEW_RCV);
-       }
-      else if (cap.code == CAPABILITY_CODE_ORF
-              || cap.code == CAPABILITY_CODE_ORF_OLD)
-       bgp_capability_orf (peer, &cap, pnt + sizeof (struct capability));
-      else if (cap.code == CAPABILITY_CODE_RESTART)
-       {
-         struct graceful_restart_af graf;
-         u_int16_t restart_flag_time;
-         int restart_bit = 0;
-         u_char *restart_pnt;
-         u_char *restart_end;
-
-         /* Check length. */
-         if (cap.length < CAPABILITY_CODE_RESTART_LEN)
-           {
-             zlog_info ("%s Graceful Restart Capability length error %d",
-                        peer->host, cap.length);
-             bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
-             return -1;
-           }
-
-         SET_FLAG (peer->cap, PEER_CAP_RESTART_RCV);
-         restart_flag_time = ntohs(cap.mpc.afi);
-         if (CHECK_FLAG (restart_flag_time, RESTART_R_BIT))
-           restart_bit = 1;
-         UNSET_FLAG (restart_flag_time, 0xF000);
-        peer->v_gr_restart = restart_flag_time;
-
-         if (BGP_DEBUG (normal, NORMAL))
-           {
-             zlog_debug ("%s OPEN has Graceful Restart capability", peer->host);
-             zlog_debug ("%s Peer has%srestarted. Restart Time : %d",
-                        peer->host, restart_bit ? " " : " not ",
-                       peer->v_gr_restart);
-           }
-
-         restart_pnt = pnt + 4;
-         restart_end = pnt + cap.length + 2;
-
-         while (restart_pnt < restart_end)
-           {
-             memcpy (&graf, restart_pnt, sizeof (struct graceful_restart_af));
-
-             afi = ntohs(graf.afi);
-             safi = graf.safi;
-
-             if (CHECK_FLAG (graf.flag, RESTART_F_BIT))
-               SET_FLAG (peer->af_cap[afi][safi], PEER_CAP_RESTART_AF_PRESERVE_RCV);
-
-             if (strcmp (afi_safi_print (afi, safi), "Unknown") == 0)
-               {
-                  if (BGP_DEBUG (normal, NORMAL))
-                    zlog_debug ("%s Addr-family %d/%d(afi/safi) not supported. I gnore the Graceful Restart capability",
-                               peer->host, afi, safi);
-               }
-             else if (! peer->afc[afi][safi])
-               {
-                  if (BGP_DEBUG (normal, NORMAL))
-                     zlog_debug ("%s Addr-family %d/%d(afi/safi) not enabled. Ignore the Graceful Restart capability",
-                                peer->host, afi, safi);
-               }
-             else
-               {
-                 if (BGP_DEBUG (normal, NORMAL))
-                   zlog_debug ("%s Address family %s is%spreserved", peer->host,
-                              afi_safi_print (afi, safi),
-                              CHECK_FLAG (peer->af_cap[afi][safi],
-                              PEER_CAP_RESTART_AF_PRESERVE_RCV)
-                              ? " " : " not ");
-
-                   SET_FLAG (peer->af_cap[afi][safi], PEER_CAP_RESTART_AF_RCV);
-               }
-             restart_pnt += 4;
-           }
-       }
-      else if (cap.code == CAPABILITY_CODE_DYNAMIC)
-       {
-         /* Check length. */
-         if (cap.length != CAPABILITY_CODE_DYNAMIC_LEN)
-           {
-             zlog_info ("%s Dynamic Capability length error %d",
-                        peer->host, cap.length);
-             bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
-             return -1;
-           }
-
-         if (BGP_DEBUG (normal, NORMAL))
-           zlog_debug ("%s OPEN has DYNAMIC capability", peer->host);
-
-         SET_FLAG (peer->cap, PEER_CAP_DYNAMIC_RCV);
-       }
-      else if (cap.code > 128)
-       {
-         /* We don't send Notification for unknown vendor specific
-            capabilities.  It seems reasonable for now...  */
-         zlog_warn ("%s Vendor specific capability %d",
-                    peer->host, cap.code);
-       }
-      else
-       {
-         zlog_warn ("%s unrecognized capability code: %d - ignored",
-                    peer->host, cap.code);
-         memcpy (*error, &cap, cap.length + 2);
-         *error += cap.length + 2;
-       }
-
-      pnt += cap.length + 2;
+      
+      if (BGP_DEBUG (normal, NORMAL))
+       zlog_debug ("%s OPEN has %s capability (%u), length %u",
+                  peer->host,
+                  LOOKUP (capcode_str, caphdr.code),
+                  caphdr.code, caphdr.length);
+      
+      /* Length sanity check, type-specific, for known capabilities */
+      switch (caphdr.code)
+        {
+          case CAPABILITY_CODE_MP:
+          case CAPABILITY_CODE_REFRESH:
+          case CAPABILITY_CODE_REFRESH_OLD:
+          case CAPABILITY_CODE_ORF:
+          case CAPABILITY_CODE_ORF_OLD:
+          case CAPABILITY_CODE_RESTART:
+          case CAPABILITY_CODE_DYNAMIC:
+              /* Check length. */
+              if (caphdr.length < cap_minsizes[caphdr.code])
+                {
+                  zlog_info ("%s %s Capability length error: got %u,"
+                             " expected at least %u",
+                             peer->host, 
+                             LOOKUP (capcode_str, caphdr.code),
+                             caphdr.length, cap_minsizes[caphdr.code]);
+                  bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
+                  return -1;
+                }
+          /* we deliberately ignore unknown codes, see below */
+          default:
+            break;
+        }
+      
+      switch (caphdr.code)
+        {
+          case CAPABILITY_CODE_MP:
+            {
+              /* Ignore capability when override-capability is set. */
+              if (! CHECK_FLAG (peer->flags, PEER_FLAG_OVERRIDE_CAPABILITY))
+                {
+                  /* Set negotiated value. */
+                  ret = bgp_capability_mp (peer, &caphdr);
+
+                  /* Unsupported Capability. */
+                  if (ret < 0)
+                    {
+                      /* Store return data. */
+                      memcpy (*error, sp, caphdr.length + 2);
+                      *error += caphdr.length + 2;
+                    }
+                }
+            }
+            break;
+          case CAPABILITY_CODE_REFRESH:
+          case CAPABILITY_CODE_REFRESH_OLD:
+            {
+              /* BGP refresh capability */
+              if (caphdr.code == CAPABILITY_CODE_REFRESH_OLD)
+                SET_FLAG (peer->cap, PEER_CAP_REFRESH_OLD_RCV);
+              else
+                SET_FLAG (peer->cap, PEER_CAP_REFRESH_NEW_RCV);
+            }
+            break;
+          case CAPABILITY_CODE_ORF:
+          case CAPABILITY_CODE_ORF_OLD:
+            if (bgp_capability_orf (peer, &caphdr))
+              return -1;
+            break;
+          case CAPABILITY_CODE_RESTART:
+            if (bgp_capability_restart (peer, &caphdr))
+              return -1;
+            break;
+          case CAPABILITY_CODE_DYNAMIC:
+            SET_FLAG (peer->cap, PEER_CAP_DYNAMIC_RCV);
+            break;
+          default:
+            if (caphdr.code > 128)
+              {
+                /* We don't send Notification for unknown vendor specific
+                   capabilities.  It seems reasonable for now...  */
+                zlog_warn ("%s Vendor specific capability %d",
+                           peer->host, caphdr.code);
+              }
+            else
+              {
+                zlog_warn ("%s unrecognized capability code: %d - ignored",
+                           peer->host, caphdr.code);
+                memcpy (*error, sp, caphdr.length + 2);
+                *error += caphdr.length + 2;
+              }
+          }
+      if (stream_get_getp(s) != (start + caphdr.length))
+        {
+          if (stream_get_getp(s) > (start + caphdr.length))
+            zlog_warn ("%s Cap-parser for %s read past cap-length, %u!",
+                       peer->host, LOOKUP (capcode_str, caphdr.code),
+                       caphdr.length);
+          stream_set_getp (s, start + caphdr.length);
+        }
     }
   return 0;
 }
 
 static int
-bgp_auth_parse (struct peer *peer, u_char *pnt, size_t length)
+bgp_auth_parse (struct peer *peer, size_t length)
 {
   bgp_notify_send (peer, 
                   BGP_NOTIFY_OPEN_ERR, 
@@ -530,30 +620,25 @@ int
 bgp_open_option_parse (struct peer *peer, u_char length, int *capability)
 {
   int ret;
-  u_char *end;
-  u_char opt_type;
-  u_char opt_length;
-  u_char *pnt;
   u_char *error;
   u_char error_data[BGP_MAX_PACKET_SIZE];
-
-  /* Fetch pointer. */
-  pnt = stream_pnt (peer->ibuf);
+  struct stream *s = BGP_INPUT(peer);
+  size_t end = stream_get_getp (s) + length;
 
   ret = 0;
-  opt_type = 0;
-  opt_length = 0;
-  end = pnt + length;
   error = error_data;
 
   if (BGP_DEBUG (normal, NORMAL))
     zlog_debug ("%s rcv OPEN w/ OPTION parameter len: %u",
               peer->host, length);
   
-  while (pnt < end) 
+  while (stream_get_getp(s) < end)
     {
-      /* Check the length. */
-      if (pnt + 2 > end)
+      u_char opt_type;
+      u_char opt_length;
+      
+      /* Must have at least an OPEN option header */
+      if (STREAM_READABLE(s) < 2)
        {
          zlog_info ("%s Option length error", peer->host);
          bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
@@ -561,11 +646,11 @@ bgp_open_option_parse (struct peer *peer, u_char length, int *capability)
        }
 
       /* Fetch option type and length. */
-      opt_type = *pnt++;
-      opt_length = *pnt++;
+      opt_type = stream_getc (s);
+      opt_length = stream_getc (s);
       
       /* Option length check. */
-      if (pnt + opt_length > end)
+      if (STREAM_READABLE (s) < opt_length)
        {
          zlog_info ("%s Option length error", peer->host);
          bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
@@ -582,10 +667,10 @@ bgp_open_option_parse (struct peer *peer, u_char length, int *capability)
       switch (opt_type)
        {
        case BGP_OPEN_OPT_AUTH:
-         ret = bgp_auth_parse (peer, pnt, opt_length);
+         ret = bgp_auth_parse (peer, opt_length);
          break;
        case BGP_OPEN_OPT_CAP:
-         ret = bgp_capability_parse (peer, pnt, opt_length, &error);
+         ret = bgp_capability_parse (peer, opt_length, &error);
          *capability = 1;
          break;
        default:
@@ -602,9 +687,6 @@ bgp_open_option_parse (struct peer *peer, u_char length, int *capability)
          error and erro_data pointer, like below.  */
       if (ret < 0)
        return -1;
-
-      /* Forward pointer. */
-      pnt += opt_length;
     }
 
   /* All OPEN option is parsed.  Check capability when strict compare
index 7515d3f47bb9fb8a1dd8be6625215f5dbbfa425a..436eb01ccaeb2fca604d5d1e081a38ae3f76d7cd 100644 (file)
@@ -21,21 +21,32 @@ Software Foundation, Inc., 59 Temple Place - Suite 330, Boston, MA
 #ifndef _QUAGGA_BGP_OPEN_H
 #define _QUAGGA_BGP_OPEN_H
 
-/* MP Capability information. */
-struct capability_mp
+/* Standard header for capability TLV */
+struct capability_header
+{
+  u_char code;
+  u_char length;
+};
+
+/* Generic MP capability data */
+struct capability_mp_data
 {
   u_int16_t afi;
   u_char reserved;
   u_char safi;
 };
 
-/* BGP open message capability. */
-struct capability
+#pragma pack(1)
+struct capability_orf_entry 
 {
-  u_char code;
-  u_char length;
-  struct capability_mp mpc;
-};
+  struct capability_mp_data mpc;
+  u_char num;
+  struct {
+    u_char type;
+    u_char mode;
+  } orfs[];
+} __attribute__ ((packed));
+#pragma pack()
 
 struct graceful_restart_af
 {
@@ -44,12 +55,18 @@ struct graceful_restart_af
   u_char flag;
 };
 
+struct capability_gr
+{
+  u_int16_t restart_flag_time;
+  struct graceful_restart_af gr[];
+};
+
 /* Capability Code */
 #define CAPABILITY_CODE_MP              1 /* Multiprotocol Extensions */
 #define CAPABILITY_CODE_REFRESH         2 /* Route Refresh Capability */
 #define CAPABILITY_CODE_ORF             3 /* Cooperative Route Filtering Capability */
 #define CAPABILITY_CODE_RESTART        64 /* Graceful Restart Capability */
-#define CAPABILITY_CODE_4BYTE_AS       65 /* 4-octet AS number Capability */
+#define CAPABILITY_CODE_AS4            65 /* 4-octet AS number Capability */
 #define CAPABILITY_CODE_DYNAMIC        66 /* Dynamic Capability */
 #define CAPABILITY_CODE_REFRESH_OLD   128 /* Route Refresh Capability(cisco) */
 #define CAPABILITY_CODE_ORF_OLD       130 /* Cooperative Route Filtering Capability(cisco) */
@@ -59,6 +76,7 @@ struct graceful_restart_af
 #define CAPABILITY_CODE_REFRESH_LEN     0
 #define CAPABILITY_CODE_DYNAMIC_LEN     0
 #define CAPABILITY_CODE_RESTART_LEN     2 /* Receiving only case */
+#define CAPABILITY_CODE_AS4_LEN         4
 
 /* Cooperative Route Filtering Capability.  */
 
@@ -82,5 +100,6 @@ struct graceful_restart_af
 extern int bgp_open_option_parse (struct peer *, u_char, int *);
 extern void bgp_open_capability (struct stream *, struct peer *);
 extern void bgp_capability_vty_out (struct vty *, struct peer *);
+extern int bgp_afi_safi_valid_indices (afi_t, safi_t *);
 
 #endif /* _QUAGGA_BGP_OPEN_H */
index 2653201172a594d1d063ac5e59419de6c9b34214..17ac1f73029d378783ff971886d26b3267cebbd2 100644 (file)
@@ -1371,8 +1371,6 @@ bgp_open_receive (struct peer *peer, bgp_size_t size)
       ret = bgp_open_option_parse (peer, optlen, &capability);
       if (ret < 0)
        return ret;
-
-      stream_forward_getp (peer->ibuf, optlen);
     }
   else
     {
@@ -1991,7 +1989,8 @@ static int
 bgp_capability_msg_parse (struct peer *peer, u_char *pnt, bgp_size_t length)
 {
   u_char *end;
-  struct capability cap;
+  struct capability_mp_data mpc;
+  struct capability_header *hdr;
   u_char action;
   struct bgp *bgp;
   afi_t afi;
@@ -2001,7 +2000,7 @@ bgp_capability_msg_parse (struct peer *peer, u_char *pnt, bgp_size_t length)
   end = pnt + length;
 
   while (pnt < end)
-    {
+    {      
       /* We need at least action, capability code and capability length. */
       if (pnt + 3 > end)
         {
@@ -2009,12 +2008,9 @@ bgp_capability_msg_parse (struct peer *peer, u_char *pnt, bgp_size_t length)
           bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
           return -1;
         }
-
       action = *pnt;
-
-      /* Fetch structure to the byte stream. */
-      memcpy (&cap, pnt + 1, sizeof (struct capability));
-
+      hdr = (struct capability_header *)(pnt + 1);
+      
       /* Action value check.  */
       if (action != CAPABILITY_ACTION_SET
          && action != CAPABILITY_ACTION_UNSET)
@@ -2027,77 +2023,77 @@ bgp_capability_msg_parse (struct peer *peer, u_char *pnt, bgp_size_t length)
 
       if (BGP_DEBUG (normal, NORMAL))
        zlog_debug ("%s CAPABILITY has action: %d, code: %u, length %u",
-                  peer->host, action, cap.code, cap.length);
+                  peer->host, action, hdr->code, hdr->length);
 
       /* Capability length check. */
-      if (pnt + (cap.length + 3) > end)
+      if ((pnt + hdr->length + 3) > end)
         {
           zlog_info ("%s Capability length error", peer->host);
           bgp_notify_send (peer, BGP_NOTIFY_CEASE, 0);
           return -1;
         }
 
+      /* Fetch structure to the byte stream. */
+      memcpy (&mpc, pnt + 3, sizeof (struct capability_mp_data));
+
       /* We know MP Capability Code. */
-      if (cap.code == CAPABILITY_CODE_MP)
+      if (hdr->code == CAPABILITY_CODE_MP)
         {
-         afi = ntohs (cap.mpc.afi);
-         safi = cap.mpc.safi;
+         afi = ntohs (mpc.afi);
+         safi = mpc.safi;
 
           /* Ignore capability when override-capability is set. */
           if (CHECK_FLAG (peer->flags, PEER_FLAG_OVERRIDE_CAPABILITY))
            continue;
-
+          
+          if (!bgp_afi_safi_valid_indices (afi, &safi))
+            {
+              if (BGP_DEBUG (normal, NORMAL))
+                zlog_debug ("%s Dynamic Capability MP_EXT afi/safi invalid",
+                            peer->host, afi, safi);
+              continue;
+            }
+          
          /* Address family check.  */
-         if ((afi == AFI_IP 
-              || afi == AFI_IP6)
-             && (safi == SAFI_UNICAST 
-                 || safi == SAFI_MULTICAST 
-                 || safi == BGP_SAFI_VPNV4))
-           {
-             if (BGP_DEBUG (normal, NORMAL))
-               zlog_debug ("%s CAPABILITY has %s MP_EXT CAP for afi/safi: %u/%u",
-                          peer->host,
-                          action == CAPABILITY_ACTION_SET 
-                          ? "Advertising" : "Removing",
-                          ntohs(cap.mpc.afi) , cap.mpc.safi);
-                 
-             /* Adjust safi code. */
-             if (safi == BGP_SAFI_VPNV4)
-               safi = SAFI_MPLS_VPN;
-             
-             if (action == CAPABILITY_ACTION_SET)
-               {
-                 peer->afc_recv[afi][safi] = 1;
-                 if (peer->afc[afi][safi])
-                   {
-                     peer->afc_nego[afi][safi] = 1;
-                     bgp_announce_route (peer, afi, safi);
-                   }
-               }
-             else
-               {
-                 peer->afc_recv[afi][safi] = 0;
-                 peer->afc_nego[afi][safi] = 0;
-
-                 if (peer_active_nego (peer))
-                   bgp_clear_route (peer, afi, safi);
-                 else
-                   BGP_EVENT_ADD (peer, BGP_Stop);
-               } 
-           }
+          if (BGP_DEBUG (normal, NORMAL))
+            zlog_debug ("%s CAPABILITY has %s MP_EXT CAP for afi/safi: %u/%u",
+                       peer->host,
+                       action == CAPABILITY_ACTION_SET 
+                       ? "Advertising" : "Removing",
+                       ntohs(mpc.afi) , mpc.safi);
+              
+          if (action == CAPABILITY_ACTION_SET)
+            {
+              peer->afc_recv[afi][safi] = 1;
+              if (peer->afc[afi][safi])
+                {
+                  peer->afc_nego[afi][safi] = 1;
+                  bgp_announce_route (peer, afi, safi);
+                }
+            }
+          else
+            {
+              peer->afc_recv[afi][safi] = 0;
+              peer->afc_nego[afi][safi] = 0;
+
+              if (peer_active_nego (peer))
+                bgp_clear_route (peer, afi, safi);
+              else
+                BGP_EVENT_ADD (peer, BGP_Stop);
+            }
         }
       else
         {
           zlog_warn ("%s unrecognized capability code: %d - ignored",
-                     peer->host, cap.code);
+                     peer->host, hdr->code);
         }
-      pnt += cap.length + 3;
+      pnt += hdr->length + 3;
     }
   return 0;
 }
 
 /* Dynamic Capability is received. */
-static void
+int
 bgp_capability_receive (struct peer *peer, bgp_size_t size)
 {
   u_char *pnt;
@@ -2130,7 +2126,7 @@ bgp_capability_receive (struct peer *peer, bgp_size_t size)
     }
 
   /* Parse packet. */
-  ret = bgp_capability_msg_parse (peer, pnt, size);
+  return bgp_capability_msg_parse (peer, pnt, size);
 }
 \f
 /* BGP read utility function. */
index 1e21c74f43d79242f938a100786b5b9f70194c4b..3eeb5f929e6ecb6bf7d6b7e1e692a92c8ad7e9c9 100644 (file)
@@ -6681,14 +6681,14 @@ bgp_show_summary (struct vty *vty, struct bgp *bgp, int afi, int safi)
 
          vty_out (vty, "4 ");
 
-         vty_out (vty, "%5d %7d %7d %8d %4d %4ld ",
+         vty_out (vty, "%5d %7d %7d %8d %4d %4lu ",
                   peer->as,
                   peer->open_in + peer->update_in + peer->keepalive_in
                   + peer->notify_in + peer->refresh_in + peer->dynamic_cap_in,
                   peer->open_out + peer->update_out + peer->keepalive_out
                   + peer->notify_out + peer->refresh_out
                   + peer->dynamic_cap_out,
-                  0, 0, peer->obuf->count);
+                  0, 0, (unsigned long)peer->obuf->count);
 
          vty_out (vty, "%8s", 
                   peer_uptime (peer->uptime, timebuf, BGP_UPTIME_LEN));
@@ -7403,7 +7403,7 @@ bgp_show_peer (struct vty *vty, struct peer *p)
   /* Packet counts. */
   vty_out (vty, "  Message statistics:%s", VTY_NEWLINE);
   vty_out (vty, "    Inq depth is 0%s", VTY_NEWLINE);
-  vty_out (vty, "    Outq depth is %ld%s", p->obuf->count, VTY_NEWLINE);
+  vty_out (vty, "    Outq depth is %lu%s", (unsigned long)p->obuf->count, VTY_NEWLINE);
   vty_out (vty, "                         Sent       Rcvd%s", VTY_NEWLINE);
   vty_out (vty, "    Opens:         %10d %10d%s", p->open_out, p->open_in, VTY_NEWLINE);
   vty_out (vty, "    Notifications: %10d %10d%s", p->notify_out, p->notify_in, VTY_NEWLINE);
index 2d8e5deb823224b30f6b24dc996252d789f59690..41689d038729378c832bf023d38e7a1f1d9f0bba 100644 (file)
@@ -1,3 +1,11 @@
+2007-07-26  Paul Jakma <paul.jakma@sun.com>
+
+       * log.c: (mes_lookup) warning about code not being in same-number
+         array slot should be debug, not warning. E.g. BGP has several
+         discontigious number spaces, allocating from different parts of a
+         space is not uncommon (e.g. IANA assigned versus vendor-assigned
+         code points in some number space).
+         
 2007-07-06 Andrew J. Schorr <ajschorr@alumni.princeton.edu>
 
        * sockopt.{c,h}: (setsockopt_multicast_ipv4) Add some comments about
index cbf76af9921bff955526b92d5f2de8ee1f1cde9e..ff47cae0dddfc88f10e3a6448031b63a6d109e8c 100644 (file)
--- a/lib/log.c
+++ b/lib/log.c
@@ -769,7 +769,7 @@ mes_lookup (struct message *meslist, int max, int index)
       {
        if (meslist->key == index)
          {
-           zlog_warn("message index %d [%s] found in position %d (max is %d)",
+           zlog_debug ("message index %d [%s] found in position %d (max is %d)",
                      index, meslist->str, i, max);
            return meslist->str;
          }
index 850fd54d2566826fd5729ba6159c9c834de554f8..1a198263c0ce43e83c25652374b581816a751714 100644 (file)
@@ -1,3 +1,8 @@
+2007-07-27 Paul Jakma <paul.jakma@sun.com>
+
+       * bgp_capability_test.c: new, capability parser unit tests.
+       * Makefile.am: add previous.
+
 2006-08-26 Paul Jakma <paul.jakma@sun.com>
 
        * heavy-wq.c: (slow_func_del,slow_func) update to match workqueue
index 94f7533dee5e8f4059f10913007478c5609a197b..a63416fffa26616c0f72175f4c7ac4ee68dc8b34 100644 (file)
@@ -2,7 +2,7 @@ INCLUDES = @INCLUDES@ -I.. -I$(top_srcdir) -I$(top_srcdir)/lib
 DEFS = @DEFS@ $(LOCAL_OPTS) -DSYSCONFDIR=\"$(sysconfdir)/\"
 
 noinst_PROGRAMS = testsig testbuffer testmemory heavy heavywq heavythread \
-               aspathtest testprivs teststream
+               aspathtest testprivs teststream testbgpcap
 testsig_SOURCES = test-sig.c
 testbuffer_SOURCES = test-buffer.c
 testmemory_SOURCES = test-memory.c
@@ -12,6 +12,7 @@ heavy_SOURCES = heavy.c main.c
 heavywq_SOURCES = heavy-wq.c main.c
 heavythread_SOURCES = heavy-thread.c main.c
 aspathtest_SOURCES = aspath_test.c
+testbgpcap_SOURCES = bgp_capability_test.c
 
 testsig_LDADD = ../lib/libzebra.la @LIBCAP@
 testbuffer_LDADD = ../lib/libzebra.la @LIBCAP@
@@ -22,3 +23,4 @@ heavy_LDADD = ../lib/libzebra.la @LIBCAP@ -lm
 heavywq_LDADD = ../lib/libzebra.la @LIBCAP@ -lm
 heavythread_LDADD = ../lib/libzebra.la @LIBCAP@ -lm
 aspathtest_LDADD = ../lib/libzebra.la @LIBCAP@ -lm ../bgpd/libbgp.a
+testbgpcap_LDADD = ../lib/libzebra.la @LIBCAP@ -lm ../bgpd/libbgp.a