9 #include <netinet/ether.h>
10 #include <sys/ioctl.h>
12 #include <nsdp/attr.h>
13 #include <nsdp/misc.h>
15 #include <nsdp/protocol.h>
20 int startNetwork (struct ngadmin *nga)
27 nga->sock = socket(AF_INET, SOCK_DGRAM, 0);
33 memset(&ifr, 0, sizeof(struct ifreq));
34 strncpy(ifr.ifr_name, nga->iface, IFNAMSIZ - 1);
36 /* get the interface MAC address */
37 ret = ioctl(nga->sock, SIOCGIFHWADDR, &ifr);
39 perror("ioctl(SIOCGIFHWADDR)");
43 memcpy(&nga->localmac, ifr.ifr_hwaddr.sa_data, ETH_ALEN);
46 memset(&nga->local, 0, sizeof(struct sockaddr_in));
47 nga->local.sin_family = AF_INET;
48 nga->local.sin_port = htons(CLIENT_PORT);
50 ret = bind(nga->sock, (struct sockaddr*)&nga->local, sizeof(struct sockaddr_in));
57 /* allow broadcasting */
59 ret = setsockopt(nga->sock, SOL_SOCKET, SO_BROADCAST, &ret, sizeof(ret));
61 perror("setsockopt(SO_BROADCAST)");
65 /* prevent unicast packets from being routed by setting the TTL to 1 */
67 ret = setsockopt(nga->sock, IPPROTO_IP, IP_TTL, &ret, sizeof(ret));
69 perror("setsockopt(IP_TTL)");
78 int setBroadcastType (struct ngadmin *nga, bool value)
84 nga->globalbroad = value;
86 nga->brd.s_addr = (in_addr_t)0;
90 memset(&ifr, 0, sizeof(struct ifreq));
91 strncpy(ifr.ifr_name, nga->iface, IFNAMSIZ - 1);
93 /* get the interface broadcast address */
94 ret = ioctl(nga->sock, SIOCGIFBRDADDR, &ifr);
96 perror("ioctl(SIOCGIFBRDADDR)");
97 nga->brd.s_addr = (in_addr_t)0;
98 nga->globalbroad = true;
102 nga->brd = (*(struct sockaddr_in*)&ifr.ifr_addr).sin_addr;
108 int stopNetwork (struct ngadmin *nga)
110 return close(nga->sock);
114 int forceInterface (struct ngadmin *nga)
119 /* as described bellow, when you have multiple interfaces, this
120 * forces the packet to go to a particular interface
122 ret = setsockopt(nga->sock, SOL_SOCKET, SO_BINDTODEVICE, nga->iface, strlen(nga->iface) + 1);
124 perror("setsockopt(SO_BINDTODEVICE)");
128 /* if the switch's IP is not in your network range, for instance
129 * because you do not have DHCP enabled or you started the switch
130 * after your DHCP server, this allows to bypass the routing tables
131 * and consider every address is directly reachable on the interface
134 ret = setsockopt(nga->sock, SOL_SOCKET, SO_DONTROUTE, &ret, sizeof(ret));
136 perror("setsockopt(SO_DONTROUTE)");
145 static int checkErrorCode (const struct nsdp_cmd *nc)
150 return (nc->attr_error == ATTR_PASSWORD) ? ERR_BADPASS : ERR_DENIED;
152 case ERROR_INVALID_VALUE:
161 void prepareSend (struct ngadmin *nga, struct nsdp_cmd *nc, unsigned char code)
163 struct swi_attr *sa = nga->current;
166 memset(nc, 0, sizeof(struct nsdp_cmd));
167 memcpy(&nc->client_mac, &nga->localmac, ETH_ALEN);
168 nc->remote_addr.sin_family = AF_INET;
169 nc->remote_addr.sin_port = htons(SWITCH_PORT);
171 memcpy(&nc->switch_mac, &sa->mac, ETH_ALEN);
173 /* destination address selection */
174 if (sa != NULL && !nga->keepbroad)
175 nc->remote_addr.sin_addr = sa->nc.ip;
176 else if (nga->globalbroad)
177 nc->remote_addr.sin_addr.s_addr = htonl(INADDR_BROADCAST);
179 nc->remote_addr.sin_addr = nga->brd;
181 nc->seqnum = ++nga->seq;
186 void prepareRecv (struct ngadmin *nga, struct nsdp_cmd *nc, unsigned char code)
188 struct swi_attr *sa = nga->current;
191 memset(nc, 0, sizeof(struct nsdp_cmd));
192 memcpy(&nc->client_mac, &nga->localmac, ETH_ALEN);
193 nc->remote_addr.sin_family = AF_INET;
194 nc->remote_addr.sin_port = htons(SWITCH_PORT);
196 memcpy(&nc->switch_mac, &sa->mac, ETH_ALEN);
198 /* set filter on switch IP */
200 nc->remote_addr.sin_addr.s_addr = htonl(INADDR_ANY);
202 nc->remote_addr.sin_addr = sa->nc.ip;
204 nc->seqnum = nga->seq;
209 int readRequest (struct ngadmin *nga, List *attr)
220 /* add end attribute to end */
221 pushBackList(attr, newEmptyAttr(ATTR_END));
223 prepareSend(nga, &nc, CODE_READ_REQ);
224 i = sendNsdpPacket(nga->sock, &nc, attr);
226 /* do not destroy the list, it will be filled again later by recvNsdpPacket */
227 clearList(attr, (void(*)(void*))freeAttr);
230 prepareRecv(nga, &nc, CODE_READ_REP);
231 i = recvNsdpPacket(nga->sock, &nc, attr, &nga->timeout);
238 ret = (errno == EAGAIN || errno == EWOULDBLOCK) ? ERR_TIMEOUT : ERR_NET;
243 /* check the switch error code */
244 ret = checkErrorCode(&nc);
252 int writeRequest (struct ngadmin *nga, List *attr)
262 } else if (nga->current == NULL) {
269 attr = createEmptyList();
271 /* add password attribute to start */
272 at = newAttr(ATTR_PASSWORD, strlen(nga->password), strdup(nga->password));
273 if (nga->encrypt_pass)
274 passwordEndecode(at->data, at->size);
275 pushFrontList(attr, at);
277 /* add end attribute to end */
278 pushBackList(attr, newEmptyAttr(ATTR_END));
280 prepareSend(nga, &nc, CODE_WRITE_REQ);
281 i = sendNsdpPacket(nga->sock, &nc, attr);
283 /* the list will be filled again by recvNgPacket
284 * but normally it will be still empty
286 clearList(attr, (void(*)(void*))freeAttr);
289 prepareRecv(nga, &nc, CODE_WRITE_REP);
290 i = recvNsdpPacket(nga->sock, &nc, attr, &nga->timeout);
297 ret = (errno == EAGAIN || errno == EWOULDBLOCK) ? ERR_TIMEOUT : ERR_NET;
301 /* check the switch error code */
302 ret = checkErrorCode(&nc);
306 /* the switch replies to write request by just a header (no attributes), so the list can be destroyed */
307 destroyList(attr, (void(*)(void*))freeAttr);
314 void extractSwitchAttributes (struct swi_attr *sa, const List *l)
317 const struct attr *at;
321 memset(sa, 0, sizeof(struct swi_attr));
323 for (ln = l->first; ln != NULL; ln = ln->next) {
329 len = min(at->size, PRODUCT_SIZE);
330 memcpy(sa->product, at->data, len);
331 trim(sa->product, len);
335 len = min(at->size, NAME_SIZE);
336 memcpy(sa->name, at->data, len);
341 memcpy(&sa->mac, at->data, ETH_ALEN);
345 sa->nc.ip = *(struct in_addr*)at->data;
349 sa->nc.netmask = *(struct in_addr*)at->data;
353 sa->nc.gw = *(struct in_addr*)at->data;
357 sa->nc.dhcp = (ntohs(*(unsigned short*)at->data) == 1);
361 len = min(at->size, FIRMWARE_SIZE - 1);
362 memcpy(sa->firmware, at->data, len);
363 sa->firmware[len] = '\0';
366 case ATTR_PORTS_COUNT:
367 sa->ports = *(unsigned char*)at->data;