summaryrefslogtreecommitdiffstats
path: root/sysdep
diff options
context:
space:
mode:
authorOndrej Filip <feela@mamlas.feela.net>2009-05-04 18:17:46 +0200
committerOndrej Filip <feela@mamlas.feela.net>2009-05-04 18:17:46 +0200
commit2b70f0742e808053f87315433a2a64c749c3ec1d (patch)
treeb8aa2bfc5ad9644320442c59ee8c9c7dab5ee74d /sysdep
parent1bc4b2cc840eb3f48c7e245528ef79c2b0ba50e7 (diff)
downloadbird-2b70f0742e808053f87315433a2a64c749c3ec1d.tar
bird-2b70f0742e808053f87315433a2a64c749c3ec1d.zip
Linux specific TCP-MD5 handling moved to sysdep/linux/sysio.h
FreeBSD coded added. BSD cannot set BGP passwords itself. This has to be done by external command.
Diffstat (limited to 'sysdep')
-rw-r--r--sysdep/bsd/sysio.h45
-rw-r--r--sysdep/linux/sysio.h35
-rw-r--r--sysdep/unix/io.c37
3 files changed, 80 insertions, 37 deletions
diff --git a/sysdep/bsd/sysio.h b/sysdep/bsd/sysio.h
index b2dc3a2..b0ec456 100644
--- a/sysdep/bsd/sysio.h
+++ b/sysdep/bsd/sysio.h
@@ -74,3 +74,48 @@ sysio_mcast_join(sock * s)
}
#endif
+
+
+#include <netinet/tcp.h>
+#ifndef TCP_KEYLEN_MAX
+#define TCP_KEYLEN_MAX 80
+#endif
+#ifndef TCP_SIG_SPI
+#define TCP_SIG_SPI 0x1000
+#endif
+
+/*
+ * FIXME: Passwords has to be set by setkey(8) command. This is the same
+ * behaviour like Quagga. We need to add code for SA/SP entries
+ * management.
+ */
+
+static int
+sk_set_md5_auth_int(sock *s, sockaddr *sa, char *passwd)
+{
+ int enable = 0;
+ if (passwd)
+ {
+ int len = strlen(passwd);
+
+ enable = len ? TCP_SIG_SPI : 0;
+
+ if (len > TCP_KEYLEN_MAX)
+ {
+ log(L_ERR "MD5 password too long");
+ return -1;
+ }
+ }
+
+ int rv = setsockopt(s->fd, IPPROTO_TCP, TCP_MD5SIG, &enable, sizeof(enable));
+
+ if (rv < 0)
+ {
+ if (errno == ENOPROTOOPT)
+ log(L_ERR "Kernel does not support TCP MD5 signatures");
+ else
+ log(L_ERR "sk_set_md5_auth_int: setsockopt: %m");
+ }
+
+ return rv;
+}
diff --git a/sysdep/linux/sysio.h b/sysdep/linux/sysio.h
index 6e54110..2fa5f0a 100644
--- a/sysdep/linux/sysio.h
+++ b/sysdep/linux/sysio.h
@@ -160,3 +160,38 @@ struct tcp_md5sig {
};
#endif
+
+static int
+sk_set_md5_auth_int(sock *s, sockaddr *sa, char *passwd)
+{
+ struct tcp_md5sig md5;
+
+ memset(&md5, 0, sizeof(md5));
+ memcpy(&md5.tcpm_addr, (struct sockaddr *) sa, sizeof(*sa));
+
+ if (passwd)
+ {
+ int len = strlen(passwd);
+
+ if (len > TCP_MD5SIG_MAXKEYLEN)
+ {
+ log(L_ERR "MD5 password too long");
+ return -1;
+ }
+
+ md5.tcpm_keylen = len;
+ memcpy(&md5.tcpm_key, passwd, len);
+ }
+
+ int rv = setsockopt(s->fd, IPPROTO_TCP, TCP_MD5SIG, &md5, sizeof(md5));
+
+ if (rv < 0)
+ {
+ if (errno == ENOPROTOOPT)
+ log(L_ERR "Kernel does not support TCP MD5 signatures");
+ else
+ log(L_ERR "sk_set_md5_auth_int: setsockopt: %m");
+ }
+
+ return rv;
+}
diff --git a/sysdep/unix/io.c b/sysdep/unix/io.c
index b6c7f84..50992fb 100644
--- a/sysdep/unix/io.c
+++ b/sysdep/unix/io.c
@@ -738,43 +738,6 @@ sk_set_ttl(sock *s, int ttl)
}
-/* FIXME: check portability */
-
-static int
-sk_set_md5_auth_int(sock *s, sockaddr *sa, char *passwd)
-{
- struct tcp_md5sig md5;
-
- memset(&md5, 0, sizeof(md5));
- memcpy(&md5.tcpm_addr, (struct sockaddr *) sa, sizeof(*sa));
-
- if (passwd)
- {
- int len = strlen(passwd);
-
- if (len > TCP_MD5SIG_MAXKEYLEN)
- {
- log(L_ERR "MD5 password too long");
- return -1;
- }
-
- md5.tcpm_keylen = len;
- memcpy(&md5.tcpm_key, passwd, len);
- }
-
- int rv = setsockopt(s->fd, IPPROTO_TCP, TCP_MD5SIG, &md5, sizeof(md5));
-
- if (rv < 0)
- {
- if (errno == ENOPROTOOPT)
- log(L_ERR "Kernel does not support TCP MD5 signatures");
- else
- log(L_ERR "sk_set_md5_auth_int: setsockopt: %m");
- }
-
- return rv;
-}
-
/**
* sk_set_md5_auth - add / remove MD5 security association for given socket.
* @s: socket