]> git.ipfire.org Git - thirdparty/bird.git/commitdiff
Fixes compatibility with Mikrotik.
authorOndrej Zajicek <santiago@crfreenet.org>
Wed, 18 May 2011 23:20:00 +0000 (01:20 +0200)
committerOndrej Zajicek <santiago@crfreenet.org>
Wed, 18 May 2011 23:20:00 +0000 (01:20 +0200)
proto/ospf/packet.c

index d156474e752a9cafaee1051f431045f3f90a0f1c..307629722fdb76c6ea1e8ae3957c2a4d8a54244d 100644 (file)
@@ -60,12 +60,16 @@ ospf_pkt_finalize(struct ospf_iface *ifa, struct ospf_packet *pkt)
   struct MD5Context ctxt;
   char password[OSPF_AUTH_CRYPT_SIZE];
 
+  pkt->checksum = 0;
   pkt->autype = htons(ifa->autype);
+  bzero(&pkt->u, sizeof(union ospf_auth));
+
+  /* Compatibility note: pkt->u may contain anything if autype is
+     none, but nonzero values do not work with Mikrotik OSPF */
 
   switch(ifa->autype)
   {
     case OSPF_AUTH_SIMPLE:
-      bzero(&pkt->u, sizeof(union ospf_auth));
       passwd = password_find(ifa->passwords, 1);
       if (!passwd)
       {
@@ -74,7 +78,6 @@ ospf_pkt_finalize(struct ospf_iface *ifa, struct ospf_packet *pkt)
       }
       password_cpy(pkt->u.password, passwd->password, sizeof(union ospf_auth));
     case OSPF_AUTH_NONE:
-      pkt->checksum = 0;
       pkt->checksum = ipsum_calculate(pkt, sizeof(struct ospf_packet) -
                                   sizeof(union ospf_auth), (pkt + 1),
                                  ntohs(pkt->length) -
@@ -88,8 +91,6 @@ ospf_pkt_finalize(struct ospf_iface *ifa, struct ospf_packet *pkt)
         return;
       }
 
-      pkt->checksum = 0;
-
       /* Perhaps use random value to prevent replay attacks after
         reboot when system does not have independent RTC? */
       if (!ifa->csn)