1 /* SPDX-License-Identifier: LGPL-2.1-or-later */
3 Copyright © 2014-2015 Intel Corporation. All rights reserved.
7 #include <netinet/in.h>
9 #include "sd-dhcp6-client.h"
11 #include "alloc-util.h"
12 #include "dhcp6-internal.h"
13 #include "dhcp6-option.h"
14 #include "dhcp6-protocol.h"
15 #include "dns-domain.h"
17 #include "memory-util.h"
18 #include "network-common.h"
20 #include "unaligned.h"
22 #define DHCP6_OPTION_IA_NA_LEN (sizeof(struct ia_na))
23 #define DHCP6_OPTION_IA_PD_LEN (sizeof(struct ia_pd))
24 #define DHCP6_OPTION_IA_TA_LEN (sizeof(struct ia_ta))
26 bool dhcp6_option_can_request(uint16_t option
) {
27 /* See Client ORO field in
28 * https://www.iana.org/assignments/dhcpv6-parameters/dhcpv6-parameters.xhtml#dhcpv6-parameters-2 */
31 case SD_DHCP6_OPTION_CLIENTID
:
32 case SD_DHCP6_OPTION_SERVERID
:
33 case SD_DHCP6_OPTION_IA_NA
:
34 case SD_DHCP6_OPTION_IA_TA
:
35 case SD_DHCP6_OPTION_IAADDR
:
36 case SD_DHCP6_OPTION_ORO
:
37 case SD_DHCP6_OPTION_PREFERENCE
:
38 case SD_DHCP6_OPTION_ELAPSED_TIME
:
39 case SD_DHCP6_OPTION_RELAY_MSG
:
40 case SD_DHCP6_OPTION_AUTH
:
41 case SD_DHCP6_OPTION_UNICAST
:
42 case SD_DHCP6_OPTION_STATUS_CODE
:
43 case SD_DHCP6_OPTION_RAPID_COMMIT
:
44 case SD_DHCP6_OPTION_USER_CLASS
:
45 case SD_DHCP6_OPTION_VENDOR_CLASS
:
47 case SD_DHCP6_OPTION_VENDOR_OPTS
:
49 case SD_DHCP6_OPTION_INTERFACE_ID
:
50 case SD_DHCP6_OPTION_RECONF_MSG
:
51 case SD_DHCP6_OPTION_RECONF_ACCEPT
:
53 case SD_DHCP6_OPTION_SIP_SERVER_DOMAIN_NAME
:
54 case SD_DHCP6_OPTION_SIP_SERVER_ADDRESS
:
55 case SD_DHCP6_OPTION_DNS_SERVER
:
56 case SD_DHCP6_OPTION_DOMAIN
:
58 case SD_DHCP6_OPTION_IA_PD
:
59 case SD_DHCP6_OPTION_IA_PD_PREFIX
:
61 case SD_DHCP6_OPTION_NIS_SERVER
:
62 case SD_DHCP6_OPTION_NISP_SERVER
:
63 case SD_DHCP6_OPTION_NIS_DOMAIN_NAME
:
64 case SD_DHCP6_OPTION_NISP_DOMAIN_NAME
:
65 case SD_DHCP6_OPTION_SNTP_SERVER
:
67 case SD_DHCP6_OPTION_INFORMATION_REFRESH_TIME
:
68 return false; /* This is automatically set when sending INFORMATION_REQUEST message. */
69 case SD_DHCP6_OPTION_BCMCS_SERVER_D
:
70 case SD_DHCP6_OPTION_BCMCS_SERVER_A
:
71 case SD_DHCP6_OPTION_GEOCONF_CIVIC
:
73 case SD_DHCP6_OPTION_REMOTE_ID
:
74 case SD_DHCP6_OPTION_SUBSCRIBER_ID
:
76 case SD_DHCP6_OPTION_CLIENT_FQDN
:
77 case SD_DHCP6_OPTION_PANA_AGENT
:
78 case SD_DHCP6_OPTION_POSIX_TIMEZONE
:
79 case SD_DHCP6_OPTION_TZDB_TIMEZONE
:
81 case SD_DHCP6_OPTION_ERO
:
82 case SD_DHCP6_OPTION_LQ_QUERY
:
83 case SD_DHCP6_OPTION_CLIENT_DATA
:
84 case SD_DHCP6_OPTION_CLT_TIME
:
85 case SD_DHCP6_OPTION_LQ_RELAY_DATA
:
86 case SD_DHCP6_OPTION_LQ_CLIENT_LINK
:
88 case SD_DHCP6_OPTION_MIP6_HNIDF
:
89 case SD_DHCP6_OPTION_MIP6_VDINF
:
90 case SD_DHCP6_OPTION_V6_LOST
:
91 case SD_DHCP6_OPTION_CAPWAP_AC_V6
:
93 case SD_DHCP6_OPTION_RELAY_ID
:
95 case SD_DHCP6_OPTION_IPV6_ADDRESS_MOS
:
96 case SD_DHCP6_OPTION_IPV6_FQDN_MOS
:
97 case SD_DHCP6_OPTION_NTP_SERVER
:
98 case SD_DHCP6_OPTION_V6_ACCESS_DOMAIN
:
99 case SD_DHCP6_OPTION_SIP_UA_CS_LIST
:
100 case SD_DHCP6_OPTION_BOOTFILE_URL
:
101 case SD_DHCP6_OPTION_BOOTFILE_PARAM
:
103 case SD_DHCP6_OPTION_CLIENT_ARCH_TYPE
:
105 case SD_DHCP6_OPTION_NII
:
106 case SD_DHCP6_OPTION_GEOLOCATION
:
107 case SD_DHCP6_OPTION_AFTR_NAME
:
108 case SD_DHCP6_OPTION_ERP_LOCAL_DOMAIN_NAME
:
110 case SD_DHCP6_OPTION_RSOO
:
112 case SD_DHCP6_OPTION_PD_EXCLUDE
:
114 case SD_DHCP6_OPTION_VSS
:
116 case SD_DHCP6_OPTION_MIP6_IDINF
:
117 case SD_DHCP6_OPTION_MIP6_UDINF
:
118 case SD_DHCP6_OPTION_MIP6_HNP
:
119 case SD_DHCP6_OPTION_MIP6_HAA
:
120 case SD_DHCP6_OPTION_MIP6_HAF
:
121 case SD_DHCP6_OPTION_RDNSS_SELECTION
:
122 case SD_DHCP6_OPTION_KRB_PRINCIPAL_NAME
:
123 case SD_DHCP6_OPTION_KRB_REALM_NAME
:
124 case SD_DHCP6_OPTION_KRB_DEFAULT_REALM_NAME
:
125 case SD_DHCP6_OPTION_KRB_KDC
:
127 case SD_DHCP6_OPTION_CLIENT_LINKLAYER_ADDR
:
128 case SD_DHCP6_OPTION_LINK_ADDRESS
:
129 case SD_DHCP6_OPTION_RADIUS
:
130 case SD_DHCP6_OPTION_SOL_MAX_RT
: /* Automatically set when sending SOLICIT message. */
131 case SD_DHCP6_OPTION_INF_MAX_RT
: /* Automatically set when sending INFORMATION_REQUEST message. */
133 case SD_DHCP6_OPTION_ADDRSEL
:
134 case SD_DHCP6_OPTION_ADDRSEL_TABLE
:
135 case SD_DHCP6_OPTION_V6_PCP_SERVER
:
137 case SD_DHCP6_OPTION_DHCPV4_MSG
:
139 case SD_DHCP6_OPTION_DHCP4_O_DHCP6_SERVER
:
141 case SD_DHCP6_OPTION_S46_RULE
:
143 case SD_DHCP6_OPTION_S46_BR
:
145 case SD_DHCP6_OPTION_S46_DMR
:
146 case SD_DHCP6_OPTION_S46_V4V6BIND
:
147 case SD_DHCP6_OPTION_S46_PORTPARAMS
:
149 case SD_DHCP6_OPTION_S46_CONT_MAPE
:
150 case SD_DHCP6_OPTION_S46_CONT_MAPT
:
151 case SD_DHCP6_OPTION_S46_CONT_LW
:
152 case SD_DHCP6_OPTION_4RD
:
153 case SD_DHCP6_OPTION_4RD_MAP_RULE
:
154 case SD_DHCP6_OPTION_4RD_NON_MAP_RULE
:
156 case SD_DHCP6_OPTION_LQ_BASE_TIME
:
157 case SD_DHCP6_OPTION_LQ_START_TIME
:
158 case SD_DHCP6_OPTION_LQ_END_TIME
:
160 case SD_DHCP6_OPTION_CAPTIVE_PORTAL
:
161 case SD_DHCP6_OPTION_MPL_PARAMETERS
:
163 case SD_DHCP6_OPTION_ANI_ATT
:
164 case SD_DHCP6_OPTION_ANI_NETWORK_NAME
:
165 case SD_DHCP6_OPTION_ANI_AP_NAME
:
166 case SD_DHCP6_OPTION_ANI_AP_BSSID
:
167 case SD_DHCP6_OPTION_ANI_OPERATOR_ID
:
168 case SD_DHCP6_OPTION_ANI_OPERATOR_REALM
:
170 case SD_DHCP6_OPTION_S46_PRIORITY
:
172 case SD_DHCP6_OPTION_MUD_URL_V6
:
174 case SD_DHCP6_OPTION_V6_PREFIX64
:
176 case SD_DHCP6_OPTION_F_BINDING_STATUS
:
177 case SD_DHCP6_OPTION_F_CONNECT_FLAGS
:
178 case SD_DHCP6_OPTION_F_DNS_REMOVAL_INFO
:
179 case SD_DHCP6_OPTION_F_DNS_HOST_NAME
:
180 case SD_DHCP6_OPTION_F_DNS_ZONE_NAME
:
181 case SD_DHCP6_OPTION_F_DNS_FLAGS
:
182 case SD_DHCP6_OPTION_F_EXPIRATION_TIME
:
183 case SD_DHCP6_OPTION_F_MAX_UNACKED_BNDUPD
:
184 case SD_DHCP6_OPTION_F_MCLT
:
185 case SD_DHCP6_OPTION_F_PARTNER_LIFETIME
:
186 case SD_DHCP6_OPTION_F_PARTNER_LIFETIME_SENT
:
187 case SD_DHCP6_OPTION_F_PARTNER_DOWN_TIME
:
188 case SD_DHCP6_OPTION_F_PARTNER_RAW_CLT_TIME
:
189 case SD_DHCP6_OPTION_F_PROTOCOL_VERSION
:
190 case SD_DHCP6_OPTION_F_KEEPALIVE_TIME
:
191 case SD_DHCP6_OPTION_F_RECONFIGURE_DATA
:
192 case SD_DHCP6_OPTION_F_RELATIONSHIP_NAME
:
193 case SD_DHCP6_OPTION_F_SERVER_FLAGS
:
194 case SD_DHCP6_OPTION_F_SERVER_STATE
:
195 case SD_DHCP6_OPTION_F_START_TIME_OF_STATE
:
196 case SD_DHCP6_OPTION_F_STATE_EXPIRATION_TIME
:
197 case SD_DHCP6_OPTION_RELAY_PORT
:
199 case SD_DHCP6_OPTION_V6_SZTP_REDIRECT
:
200 case SD_DHCP6_OPTION_S46_BIND_IPV6_PREFIX
:
202 case SD_DHCP6_OPTION_IA_LL
:
203 case SD_DHCP6_OPTION_LLADDR
:
204 case SD_DHCP6_OPTION_SLAP_QUAD
:
206 case SD_DHCP6_OPTION_V6_DOTS_RI
:
207 case SD_DHCP6_OPTION_V6_DOTS_ADDRESS
:
208 case SD_DHCP6_OPTION_IPV6_ADDRESS_ANDSF
:
215 static int option_append_hdr(uint8_t **buf
, size_t *offset
, uint16_t optcode
, size_t optlen
) {
223 if (optlen
+ offsetof(DHCP6Option
, data
) > SIZE_MAX
- *offset
)
226 if (!GREEDY_REALLOC(*buf
, *offset
+ optlen
+ offsetof(DHCP6Option
, data
)))
229 unaligned_write_be16(*buf
+ *offset
+ offsetof(DHCP6Option
, code
), optcode
);
230 unaligned_write_be16(*buf
+ *offset
+ offsetof(DHCP6Option
, len
), optlen
);
232 *offset
+= offsetof(DHCP6Option
, data
);
236 int dhcp6_option_append(
241 const void *optval
) {
245 assert(optval
|| optlen
== 0);
247 r
= option_append_hdr(buf
, offset
, code
, optlen
);
251 memcpy_safe(*buf
+ *offset
, optval
, optlen
);
257 int dhcp6_option_append_vendor_option(uint8_t **buf
, size_t *offset
, OrderedSet
*vendor_options
) {
258 sd_dhcp6_option
*options
;
265 ORDERED_SET_FOREACH(options
, vendor_options
) {
266 _cleanup_free_
uint8_t *p
= NULL
;
269 total
= 4 + 2 + 2 + options
->length
;
275 unaligned_write_be32(p
, options
->enterprise_identifier
);
276 unaligned_write_be16(p
+ 4, options
->option
);
277 unaligned_write_be16(p
+ 6, options
->length
);
278 memcpy(p
+ 8, options
->data
, options
->length
);
280 r
= dhcp6_option_append(buf
, offset
, SD_DHCP6_OPTION_VENDOR_OPTS
, total
, p
);
288 static int option_append_ia_address(uint8_t **buf
, size_t *offset
, const struct iaaddr
*address
) {
294 /* Do not append T1 and T2. */
295 const struct iaaddr a
= {
296 .address
= address
->address
,
299 return dhcp6_option_append(buf
, offset
, SD_DHCP6_OPTION_IAADDR
, sizeof(struct iaaddr
), &a
);
302 static int option_append_pd_prefix(uint8_t **buf
, size_t *offset
, const struct iapdprefix
*prefix
) {
308 if (prefix
->prefixlen
== 0)
311 /* Do not append T1 and T2. */
312 const struct iapdprefix p
= {
313 .prefixlen
= prefix
->prefixlen
,
314 .address
= prefix
->address
,
317 return dhcp6_option_append(buf
, offset
, SD_DHCP6_OPTION_IA_PD_PREFIX
, sizeof(struct iapdprefix
), &p
);
320 int dhcp6_option_append_ia(uint8_t **buf
, size_t *offset
, const DHCP6IA
*ia
) {
321 _cleanup_free_
uint8_t *data
= NULL
;
322 struct ia_header header
;
331 /* client should not send set T1 and T2. See, RFC 8415, and issue #18090. */
334 case SD_DHCP6_OPTION_IA_NA
:
335 case SD_DHCP6_OPTION_IA_PD
:
336 len
= sizeof(struct ia_header
);
337 header
= (struct ia_header
) {
342 case SD_DHCP6_OPTION_IA_TA
:
343 len
= sizeof(header
.id
); /* IA_TA does not have lifetime. */
344 header
= (struct ia_header
) {
350 assert_not_reached();
353 if (!GREEDY_REALLOC(data
, len
))
356 memcpy(data
, &header
, len
);
358 LIST_FOREACH(addresses
, addr
, ia
->addresses
) {
359 if (ia
->type
== SD_DHCP6_OPTION_IA_PD
)
360 r
= option_append_pd_prefix(&data
, &len
, &addr
->iapdprefix
);
362 r
= option_append_ia_address(&data
, &len
, &addr
->iaaddr
);
367 return dhcp6_option_append(buf
, offset
, ia
->type
, len
, data
);
370 int dhcp6_option_append_fqdn(uint8_t **buf
, size_t *offset
, const char *fqdn
) {
371 uint8_t buffer
[1 + DNS_WIRE_FORMAT_HOSTNAME_MAX
];
381 buffer
[0] = DHCP6_FQDN_FLAG_S
; /* Request server to perform AAAA RR DNS updates */
383 /* Store domain name after flags field */
384 r
= dns_name_to_wire_format(fqdn
, buffer
+ 1, sizeof(buffer
) - 1, false);
389 * According to RFC 4704, chapter 4.2 only add terminating zero-length
390 * label in case a FQDN is provided. Since dns_name_to_wire_format
391 * always adds terminating zero-length label remove if only a hostname
394 if (dns_name_is_single_label(fqdn
))
397 return dhcp6_option_append(buf
, offset
, SD_DHCP6_OPTION_CLIENT_FQDN
, 1 + r
, buffer
);
400 int dhcp6_option_append_user_class(uint8_t **buf
, size_t *offset
, char * const *user_class
) {
401 _cleanup_free_
uint8_t *p
= NULL
;
408 if (strv_isempty(user_class
))
411 STRV_FOREACH(s
, user_class
) {
412 size_t len
= strlen(*s
);
414 if (len
> UINT16_MAX
|| len
== 0)
417 if (!GREEDY_REALLOC(p
, n
+ len
+ 2))
420 unaligned_write_be16(p
+ n
, len
);
421 memcpy(p
+ n
+ 2, *s
, len
);
425 return dhcp6_option_append(buf
, offset
, SD_DHCP6_OPTION_USER_CLASS
, n
, p
);
428 int dhcp6_option_append_vendor_class(uint8_t **buf
, size_t *offset
, char * const *vendor_class
) {
429 _cleanup_free_
uint8_t *p
= NULL
;
436 if (strv_isempty(vendor_class
))
439 if (!GREEDY_REALLOC(p
, sizeof(be32_t
)))
442 /* Enterprise Identifier */
443 unaligned_write_be32(p
, SYSTEMD_PEN
);
446 STRV_FOREACH(s
, vendor_class
) {
447 size_t len
= strlen(*s
);
449 if (len
> UINT16_MAX
|| len
== 0)
452 if (!GREEDY_REALLOC(p
, n
+ len
+ 2))
455 unaligned_write_be16(p
+ n
, len
);
456 memcpy(p
+ n
+ 2, *s
, len
);
460 return dhcp6_option_append(buf
, offset
, SD_DHCP6_OPTION_VENDOR_CLASS
, n
, p
);
463 int dhcp6_option_parse(
467 uint16_t *ret_option_code
,
468 size_t *ret_option_data_len
,
469 const uint8_t **ret_option_data
) {
475 assert(ret_option_code
);
476 assert(ret_option_data_len
);
477 assert(ret_option_data
);
479 if (buflen
< offsetof(DHCP6Option
, data
))
482 if (*offset
> buflen
- offsetof(DHCP6Option
, data
))
485 len
= unaligned_read_be16(buf
+ *offset
+ offsetof(DHCP6Option
, len
));
487 if (len
> buflen
- offsetof(DHCP6Option
, data
) - *offset
)
490 *ret_option_code
= unaligned_read_be16(buf
+ *offset
+ offsetof(DHCP6Option
, code
));
491 *ret_option_data_len
= len
;
492 *ret_option_data
= len
== 0 ? NULL
: buf
+ *offset
+ offsetof(DHCP6Option
, data
);
493 *offset
+= offsetof(DHCP6Option
, data
) + len
;
498 int dhcp6_option_parse_status(const uint8_t *data
, size_t data_len
, char **ret_status_message
) {
501 assert(data
|| data_len
== 0);
503 if (data_len
< sizeof(uint16_t))
506 status
= unaligned_read_be16(data
);
508 if (ret_status_message
) {
509 _cleanup_free_
char *msg
= NULL
;
512 /* The status message MUST NOT be null-terminated. See section 21.13 of RFC8415.
513 * Let's escape unsafe characters for safety. */
514 msg
= cescape_length((const char*) (data
+ sizeof(uint16_t)), data_len
- sizeof(uint16_t));
518 s
= dhcp6_message_status_to_string(status
);
519 if (s
&& !strextend_with_separator(&msg
, ": ", s
))
522 *ret_status_message
= TAKE_PTR(msg
);
528 /* parse a string from dhcp option field. *ret must be initialized */
529 int dhcp6_option_parse_string(const uint8_t *data
, size_t data_len
, char **ret
) {
530 _cleanup_free_
char *string
= NULL
;
533 assert(data
|| data_len
== 0);
541 r
= make_cstring((const char *) data
, data_len
, MAKE_CSTRING_REFUSE_TRAILING_NUL
, &string
);
545 return free_and_replace(*ret
, string
);
548 static int dhcp6_option_parse_ia_options(sd_dhcp6_client
*client
, const uint8_t *buf
, size_t buflen
) {
551 assert(buf
|| buflen
== 0);
553 for (size_t offset
= 0; offset
< buflen
;) {
558 r
= dhcp6_option_parse(buf
, buflen
, &offset
, &code
, &data_len
, &data
);
563 case SD_DHCP6_OPTION_STATUS_CODE
: {
564 _cleanup_free_
char *msg
= NULL
;
566 r
= dhcp6_option_parse_status(data
, data_len
, &msg
);
570 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(EINVAL
),
571 "Received an IA address or PD prefix option with non-zero status%s%s",
572 isempty(msg
) ? "." : ": ", strempty(msg
));
574 /* Let's log but ignore the invalid status option. */
575 log_dhcp6_client_errno(client
, r
,
576 "Received an IA address or PD prefix option with an invalid status sub option, ignoring: %m");
580 log_dhcp6_client(client
, "Received an unknown sub option %u in IA address or PD prefix, ignoring.", code
);
587 static int dhcp6_option_parse_ia_address(sd_dhcp6_client
*client
, DHCP6IA
*ia
, const uint8_t *data
, size_t len
) {
588 _cleanup_free_ DHCP6Address
*a
= NULL
;
589 usec_t lt_valid
, lt_pref
;
593 assert(data
|| len
== 0);
595 if (!IN_SET(ia
->type
, SD_DHCP6_OPTION_IA_NA
, SD_DHCP6_OPTION_IA_TA
))
596 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(EINVAL
),
597 "Received an IA address sub-option in an invalid option, ignoring.");
599 if (len
< sizeof(struct iaaddr
))
602 a
= new(DHCP6Address
, 1);
606 memcpy(&a
->iaaddr
, data
, sizeof(struct iaaddr
));
608 lt_valid
= be32_sec_to_usec(a
->iaaddr
.lifetime_valid
, /* max_as_infinity = */ true);
609 lt_pref
= be32_sec_to_usec(a
->iaaddr
.lifetime_preferred
, /* max_as_infinity = */ true);
612 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(EINVAL
),
613 "Received an IA address with zero valid lifetime, ignoring.");
614 if (lt_pref
> lt_valid
)
615 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(EINVAL
),
616 "Received an IA address with preferred lifetime %s "
617 "larger than valid lifetime %s, ignoring.",
618 FORMAT_TIMESPAN(lt_pref
, USEC_PER_SEC
),
619 FORMAT_TIMESPAN(lt_valid
, USEC_PER_SEC
));
621 if (len
> sizeof(struct iaaddr
)) {
622 r
= dhcp6_option_parse_ia_options(client
, data
+ sizeof(struct iaaddr
), len
- sizeof(struct iaaddr
));
627 LIST_PREPEND(addresses
, ia
->addresses
, TAKE_PTR(a
));
631 static int dhcp6_option_parse_ia_pdprefix(sd_dhcp6_client
*client
, DHCP6IA
*ia
, const uint8_t *data
, size_t len
) {
632 _cleanup_free_ DHCP6Address
*a
= NULL
;
633 usec_t lt_valid
, lt_pref
;
637 assert(data
|| len
== 0);
639 if (ia
->type
!= SD_DHCP6_OPTION_IA_PD
)
640 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(EINVAL
),
641 "Received an PD prefix sub-option in an invalid option, ignoring");
643 if (len
< sizeof(struct iapdprefix
))
646 a
= new(DHCP6Address
, 1);
650 memcpy(&a
->iapdprefix
, data
, sizeof(struct iapdprefix
));
652 lt_valid
= be32_sec_to_usec(a
->iapdprefix
.lifetime_valid
, /* max_as_infinity = */ true);
653 lt_pref
= be32_sec_to_usec(a
->iapdprefix
.lifetime_preferred
, /* max_as_infinity = */ true);
656 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(EINVAL
),
657 "Received a PD prefix with zero valid lifetime, ignoring.");
658 if (lt_pref
> lt_valid
)
659 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(EINVAL
),
660 "Received a PD prefix with preferred lifetime %s "
661 "larger than valid lifetime %s, ignoring.",
662 FORMAT_TIMESPAN(lt_pref
, USEC_PER_SEC
),
663 FORMAT_TIMESPAN(lt_valid
, USEC_PER_SEC
));
665 if (len
> sizeof(struct iapdprefix
)) {
666 r
= dhcp6_option_parse_ia_options(client
, data
+ sizeof(struct iapdprefix
), len
- sizeof(struct iapdprefix
));
671 LIST_PREPEND(addresses
, ia
->addresses
, TAKE_PTR(a
));
675 int dhcp6_option_parse_ia(
676 sd_dhcp6_client
*client
,
678 uint16_t option_code
,
679 size_t option_data_len
,
680 const uint8_t *option_data
,
683 _cleanup_(dhcp6_ia_freep
) DHCP6IA
*ia
= NULL
;
688 assert(IN_SET(option_code
, SD_DHCP6_OPTION_IA_NA
, SD_DHCP6_OPTION_IA_TA
, SD_DHCP6_OPTION_IA_PD
));
689 assert(option_data
|| option_data_len
== 0);
692 /* This will return the following:
693 * -ENOMEM: memory allocation error,
694 * -ENOANO: unmatching IAID,
695 * -EINVAL: non-zero status code, or invalid lifetime,
696 * -EBADMSG: invalid message format,
697 * -ENODATA: no valid address or PD prefix,
700 switch (option_code
) {
701 case SD_DHCP6_OPTION_IA_NA
:
702 case SD_DHCP6_OPTION_IA_PD
:
703 header_len
= sizeof(struct ia_header
);
706 case SD_DHCP6_OPTION_IA_TA
:
707 header_len
= sizeof(be32_t
); /* IA_TA does not have lifetime. */
711 assert_not_reached();
714 if (option_data_len
< header_len
)
717 ia
= new(DHCP6IA
, 1);
724 memcpy(&ia
->header
, option_data
, header_len
);
726 /* According to RFC8415, IAs which do not match the client's IAID should be ignored,
727 * but not necessary to ignore or refuse the whole message. */
728 if (ia
->header
.id
!= iaid
)
729 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(ENOANO
),
730 "Received an IA option with a different IAID "
731 "from the one chosen by the client, ignoring.");
733 /* It is not necessary to check if the lifetime_t2 is zero here, as in that case it will be updated later. */
734 lt_t1
= be32_sec_to_usec(ia
->header
.lifetime_t1
, /* max_as_infinity = */ true);
735 lt_t2
= be32_sec_to_usec(ia
->header
.lifetime_t2
, /* max_as_infinity = */ true);
738 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(EINVAL
),
739 "Received an IA option with T1 %s > T2 %s, ignoring.",
740 FORMAT_TIMESPAN(lt_t1
, USEC_PER_SEC
),
741 FORMAT_TIMESPAN(lt_t2
, USEC_PER_SEC
));
742 if (lt_t1
== 0 && lt_t2
> 0)
743 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(EINVAL
),
744 "Received an IA option with zero T1 and non-zero T2 (%s), ignoring.",
745 FORMAT_TIMESPAN(lt_t2
, USEC_PER_SEC
));
747 for (size_t offset
= header_len
; offset
< option_data_len
;) {
748 const uint8_t *subdata
;
752 r
= dhcp6_option_parse(option_data
, option_data_len
, &offset
, &subopt
, &subdata_len
, &subdata
);
757 case SD_DHCP6_OPTION_IAADDR
: {
758 r
= dhcp6_option_parse_ia_address(client
, ia
, subdata
, subdata_len
);
762 /* Ignore non-critical errors in the sub-option. */
765 case SD_DHCP6_OPTION_IA_PD_PREFIX
: {
766 r
= dhcp6_option_parse_ia_pdprefix(client
, ia
, subdata
, subdata_len
);
770 /* Ignore non-critical errors in the sub-option. */
773 case SD_DHCP6_OPTION_STATUS_CODE
: {
774 _cleanup_free_
char *msg
= NULL
;
776 r
= dhcp6_option_parse_status(subdata
, subdata_len
, &msg
);
780 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(EINVAL
),
781 "Received an IA option with non-zero status%s%s",
782 isempty(msg
) ? "." : ": ", strempty(msg
));
784 log_dhcp6_client_errno(client
, r
,
785 "Received an IA option with an invalid status sub option, ignoring: %m");
789 log_dhcp6_client(client
, "Received an IA option with an unknown sub-option %u, ignoring", subopt
);
794 return log_dhcp6_client_errno(client
, SYNTHETIC_ERRNO(ENODATA
),
795 "Received an IA option without valid IA addresses or PD prefixes, ignoring.");
801 int dhcp6_option_parse_addresses(
802 const uint8_t *optval
,
804 struct in6_addr
**addrs
,
807 assert(optval
|| optlen
== 0);
811 if (optlen
== 0 || optlen
% sizeof(struct in6_addr
) != 0)
814 if (!GREEDY_REALLOC(*addrs
, *count
+ optlen
/ sizeof(struct in6_addr
)))
817 memcpy(*addrs
+ *count
, optval
, optlen
);
818 *count
+= optlen
/ sizeof(struct in6_addr
);
823 static int parse_domain(const uint8_t **data
, size_t *len
, char **ret
) {
824 _cleanup_free_
char *domain
= NULL
;
825 const uint8_t *optval
;
826 size_t optlen
, n
= 0;
831 assert(*data
|| *len
== 0);
860 label
= (const char*) optval
;
864 if (!GREEDY_REALLOC(domain
, n
+ (n
!= 0) + DNS_LABEL_ESCAPED_MAX
))
870 r
= dns_label_escape(label
, c
, domain
+ n
, DNS_LABEL_ESCAPED_MAX
);
878 if (!GREEDY_REALLOC(domain
, n
+ 1))
884 *ret
= TAKE_PTR(domain
);
891 int dhcp6_option_parse_domainname(const uint8_t *optval
, size_t optlen
, char **ret
) {
892 _cleanup_free_
char *domain
= NULL
;
895 assert(optval
|| optlen
== 0);
898 r
= parse_domain(&optval
, &optlen
, &domain
);
906 *ret
= TAKE_PTR(domain
);
910 int dhcp6_option_parse_domainname_list(const uint8_t *optval
, size_t optlen
, char ***ret
) {
911 _cleanup_strv_free_
char **names
= NULL
;
914 assert(optval
|| optlen
== 0);
919 if (optval
[optlen
- 1] != '\0')
923 _cleanup_free_
char *name
= NULL
;
925 r
= parse_domain(&optval
, &optlen
, &name
);
931 r
= strv_consume(&names
, TAKE_PTR(name
));
936 *ret
= TAKE_PTR(names
);
940 static sd_dhcp6_option
* dhcp6_option_free(sd_dhcp6_option
*i
) {
948 int sd_dhcp6_option_new(uint16_t option
, const void *data
, size_t length
, uint32_t enterprise_identifier
, sd_dhcp6_option
**ret
) {
949 assert_return(ret
, -EINVAL
);
950 assert_return(length
== 0 || data
, -EINVAL
);
952 _cleanup_free_
void *q
= memdup(data
, length
);
956 sd_dhcp6_option
*p
= new(sd_dhcp6_option
, 1);
960 *p
= (sd_dhcp6_option
) {
963 .enterprise_identifier
= enterprise_identifier
,
972 DEFINE_TRIVIAL_REF_UNREF_FUNC(sd_dhcp6_option
, sd_dhcp6_option
, dhcp6_option_free
);
973 DEFINE_HASH_OPS_WITH_VALUE_DESTRUCTOR(
974 dhcp6_option_hash_ops
,
977 trivial_compare_func
,
979 sd_dhcp6_option_unref
);