mirror of https://github.com/ARMmbed/mbed-os.git
				
				
				
			
		
			
				
	
	
		
			1166 lines
		
	
	
		
			40 KiB
		
	
	
	
		
			C
		
	
	
			
		
		
	
	
			1166 lines
		
	
	
		
			40 KiB
		
	
	
	
		
			C
		
	
	
/**
 | 
						|
 * @file
 | 
						|
 * Network Point to Point Protocol over Layer 2 Tunneling Protocol program file.
 | 
						|
 *
 | 
						|
 */
 | 
						|
 | 
						|
/*
 | 
						|
 * Redistribution and use in source and binary forms, with or without modification,
 | 
						|
 * are permitted provided that the following conditions are met:
 | 
						|
 *
 | 
						|
 * 1. Redistributions of source code must retain the above copyright notice,
 | 
						|
 *    this list of conditions and the following disclaimer.
 | 
						|
 * 2. Redistributions in binary form must reproduce the above copyright notice,
 | 
						|
 *    this list of conditions and the following disclaimer in the documentation
 | 
						|
 *    and/or other materials provided with the distribution.
 | 
						|
 * 3. The name of the author may not be used to endorse or promote products
 | 
						|
 *    derived from this software without specific prior written permission.
 | 
						|
 *
 | 
						|
 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR ``AS IS'' AND ANY EXPRESS OR IMPLIED
 | 
						|
 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
 | 
						|
 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT
 | 
						|
 * SHALL THE AUTHOR BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL,
 | 
						|
 * EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
 | 
						|
 * OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 | 
						|
 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 | 
						|
 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING
 | 
						|
 * IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY
 | 
						|
 * OF SUCH DAMAGE.
 | 
						|
 *
 | 
						|
 * This file is part of the lwIP TCP/IP stack.
 | 
						|
 *
 | 
						|
 */
 | 
						|
 | 
						|
/*
 | 
						|
 * L2TP Support status:
 | 
						|
 *
 | 
						|
 * Supported:
 | 
						|
 * - L2TPv2 (PPP over L2TP, a.k.a. UDP tunnels)
 | 
						|
 * - LAC
 | 
						|
 *
 | 
						|
 * Not supported:
 | 
						|
 * - LNS (require PPP server support)
 | 
						|
 * - L2TPv3 ethernet pseudowires
 | 
						|
 * - L2TPv3 VLAN pseudowire
 | 
						|
 * - L2TPv3 PPP pseudowires
 | 
						|
 * - L2TPv3 IP encapsulation
 | 
						|
 * - L2TPv3 IP pseudowire
 | 
						|
 * - L2TP tunnel switching - http://tools.ietf.org/html/draft-ietf-l2tpext-tunnel-switching-08
 | 
						|
 * - Multiple tunnels per UDP socket, as well as multiple sessions per tunnel
 | 
						|
 * - Hidden AVPs
 | 
						|
 */
 | 
						|
 | 
						|
#include "ppp_opts.h"
 | 
						|
#if PPP_SUPPORT && PPPOL2TP_SUPPORT /* don't build if not configured for use in ppp_opts.h */
 | 
						|
 | 
						|
#include "ppp_impl.h"
 | 
						|
#include "lcp.h"
 | 
						|
#include "ipcp.h"
 | 
						|
#include "pppol2tp.h"
 | 
						|
#include "pppcrypt.h"
 | 
						|
#include "magic.h"
 | 
						|
 | 
						|
/* Memory pool */
 | 
						|
PPP_MEMPOOL_DECLARE(PPPOL2TP_PCB, MEMP_NUM_PPPOL2TP_INTERFACES, sizeof(pppol2tp_pcb), "PPPOL2TP_PCB")
 | 
						|
 | 
						|
/* callbacks called from PPP core */
 | 
						|
static err_t pppol2tp_write(ppp_pcb *ppp, void *ctx, struct pbuf *p);
 | 
						|
static err_t pppol2tp_netif_output(ppp_pcb *ppp, void *ctx, struct pbuf *p, u_short protocol);
 | 
						|
static err_t pppol2tp_destroy(ppp_pcb *ppp, void *ctx);    /* Destroy a L2TP control block */
 | 
						|
static void pppol2tp_connect(ppp_pcb *ppp, void *ctx);    /* Be a LAC, connect to a LNS. */
 | 
						|
static void pppol2tp_disconnect(ppp_pcb *ppp, void *ctx);  /* Disconnect */
 | 
						|
 | 
						|
 /* Prototypes for procedures local to this file. */
 | 
						|
static void pppol2tp_input(void *arg, struct udp_pcb *pcb, struct pbuf *p, const ip_addr_t *addr, u16_t port);
 | 
						|
static void pppol2tp_dispatch_control_packet(pppol2tp_pcb *l2tp, u16_t port, struct pbuf *p, u16_t ns, u16_t nr);
 | 
						|
static void pppol2tp_timeout(void *arg);
 | 
						|
static void pppol2tp_abort_connect(pppol2tp_pcb *l2tp);
 | 
						|
static err_t pppol2tp_send_sccrq(pppol2tp_pcb *l2tp);
 | 
						|
static err_t pppol2tp_send_scccn(pppol2tp_pcb *l2tp, u16_t ns);
 | 
						|
static err_t pppol2tp_send_icrq(pppol2tp_pcb *l2tp, u16_t ns);
 | 
						|
static err_t pppol2tp_send_iccn(pppol2tp_pcb *l2tp, u16_t ns);
 | 
						|
static err_t pppol2tp_send_zlb(pppol2tp_pcb *l2tp, u16_t ns, u16_t nr);
 | 
						|
static err_t pppol2tp_send_stopccn(pppol2tp_pcb *l2tp, u16_t ns);
 | 
						|
static err_t pppol2tp_xmit(pppol2tp_pcb *l2tp, struct pbuf *pb);
 | 
						|
static err_t pppol2tp_udp_send(pppol2tp_pcb *l2tp, struct pbuf *pb);
 | 
						|
 | 
						|
/* Callbacks structure for PPP core */
 | 
						|
static const struct link_callbacks pppol2tp_callbacks = {
 | 
						|
  pppol2tp_connect,
 | 
						|
#if PPP_SERVER
 | 
						|
  NULL,
 | 
						|
#endif /* PPP_SERVER */
 | 
						|
  pppol2tp_disconnect,
 | 
						|
  pppol2tp_destroy,
 | 
						|
  pppol2tp_write,
 | 
						|
  pppol2tp_netif_output,
 | 
						|
  NULL,
 | 
						|
  NULL
 | 
						|
};
 | 
						|
 | 
						|
 | 
						|
/* Create a new L2TP session. */
 | 
						|
ppp_pcb *pppol2tp_create(struct netif *pppif,
 | 
						|
       struct netif *netif, const ip_addr_t *ipaddr, u16_t port,
 | 
						|
       const u8_t *secret, u8_t secret_len,
 | 
						|
       ppp_link_status_cb_fn link_status_cb, void *ctx_cb) {
 | 
						|
  ppp_pcb *ppp;
 | 
						|
  pppol2tp_pcb *l2tp;
 | 
						|
  struct udp_pcb *udp;
 | 
						|
#if !PPPOL2TP_AUTH_SUPPORT
 | 
						|
  UNUSED_ARG(secret);
 | 
						|
  UNUSED_ARG(secret_len);
 | 
						|
#endif /* !PPPOL2TP_AUTH_SUPPORT */
 | 
						|
 | 
						|
  if (ipaddr == NULL) {
 | 
						|
    goto ipaddr_check_failed;
 | 
						|
  }
 | 
						|
 | 
						|
  l2tp = (pppol2tp_pcb *)MEMPOOL_ALLOC(PPPOL2TP_PCB);
 | 
						|
  if (l2tp == NULL) {
 | 
						|
    goto memp_malloc_l2tp_failed;
 | 
						|
  }
 | 
						|
 | 
						|
  udp = udp_new_ip_type(IP_GET_TYPE(ipaddr));
 | 
						|
  if (udp == NULL) {
 | 
						|
    goto udp_new_failed;
 | 
						|
  }
 | 
						|
  udp_recv(udp, pppol2tp_input, l2tp);
 | 
						|
 | 
						|
  ppp = ppp_new(pppif, &pppol2tp_callbacks, l2tp, link_status_cb, ctx_cb);
 | 
						|
  if (ppp == NULL) {
 | 
						|
    goto ppp_new_failed;
 | 
						|
  }
 | 
						|
 | 
						|
  memset(l2tp, 0, sizeof(pppol2tp_pcb));
 | 
						|
  l2tp->phase = PPPOL2TP_STATE_INITIAL;
 | 
						|
  l2tp->ppp = ppp;
 | 
						|
  l2tp->udp = udp;
 | 
						|
  l2tp->netif = netif;
 | 
						|
  ip_addr_copy(l2tp->remote_ip, *ipaddr);
 | 
						|
  l2tp->remote_port = port;
 | 
						|
#if PPPOL2TP_AUTH_SUPPORT
 | 
						|
  l2tp->secret = secret;
 | 
						|
  l2tp->secret_len = secret_len;
 | 
						|
#endif /* PPPOL2TP_AUTH_SUPPORT */
 | 
						|
 | 
						|
  return ppp;
 | 
						|
 | 
						|
ppp_new_failed:
 | 
						|
  udp_remove(udp);
 | 
						|
udp_new_failed:
 | 
						|
  MEMPOOL_FREE(PPPOL2TP_PCB, l2tp);
 | 
						|
memp_malloc_l2tp_failed:
 | 
						|
ipaddr_check_failed:
 | 
						|
  return NULL;
 | 
						|
}
 | 
						|
 | 
						|
/* Called by PPP core */
 | 
						|
static err_t pppol2tp_write(ppp_pcb *ppp, void *ctx, struct pbuf *p) {
 | 
						|
  pppol2tp_pcb *l2tp = (pppol2tp_pcb *)ctx;
 | 
						|
  struct pbuf *ph; /* UDP + L2TP header */
 | 
						|
  err_t ret;
 | 
						|
#if MIB2_STATS
 | 
						|
  u16_t tot_len;
 | 
						|
#else /* MIB2_STATS */
 | 
						|
  UNUSED_ARG(ppp);
 | 
						|
#endif /* MIB2_STATS */
 | 
						|
 | 
						|
  ph = ppp_memory_buffer_allocate(ppp->netif->memory_manager, (u16_t)(PPPOL2TP_OUTPUT_DATA_HEADER_LEN), PPP_BUF_HEAP);
 | 
						|
  //ph = pbuf_alloc(PBUF_TRANSPORT, (u16_t)(PPPOL2TP_OUTPUT_DATA_HEADER_LEN), PBUF_RAM);
 | 
						|
  if(!ph) {
 | 
						|
    LINK_STATS_INC(link.memerr);
 | 
						|
    LINK_STATS_INC(link.proterr);
 | 
						|
    MIB2_STATS_NETIF_INC(ppp->netif, ifoutdiscards);
 | 
						|
    ppp_memory_buffer_free(p);
 | 
						|
    //pbuf_free(p);
 | 
						|
    return ERR_MEM;
 | 
						|
  }
 | 
						|
 | 
						|
  pbuf_remove_header(ph, PPPOL2TP_OUTPUT_DATA_HEADER_LEN); /* hide L2TP header */
 | 
						|
  pbuf_cat(ph, p);
 | 
						|
#if MIB2_STATS
 | 
						|
  tot_len = ph->tot_len;
 | 
						|
#endif /* MIB2_STATS */
 | 
						|
 | 
						|
  ret = pppol2tp_xmit(l2tp, ph);
 | 
						|
  if (ret != ERR_OK) {
 | 
						|
    LINK_STATS_INC(link.err);
 | 
						|
    MIB2_STATS_NETIF_INC(ppp->netif, ifoutdiscards);
 | 
						|
    return ret;
 | 
						|
  }
 | 
						|
 | 
						|
  MIB2_STATS_NETIF_ADD(ppp->netif, ifoutoctets, (u16_t)tot_len);
 | 
						|
  MIB2_STATS_NETIF_INC(ppp->netif, ifoutucastpkts);
 | 
						|
  LINK_STATS_INC(link.xmit);
 | 
						|
  return ERR_OK;
 | 
						|
}
 | 
						|
 | 
						|
/* Called by PPP core */
 | 
						|
static err_t pppol2tp_netif_output(ppp_pcb *ppp, void *ctx, struct pbuf *p, u_short protocol) {
 | 
						|
  pppol2tp_pcb *l2tp = (pppol2tp_pcb *)ctx;
 | 
						|
  struct pbuf *pb;
 | 
						|
  u8_t *pl;
 | 
						|
  err_t err;
 | 
						|
#if MIB2_STATS
 | 
						|
  u16_t tot_len;
 | 
						|
#else /* MIB2_STATS */
 | 
						|
  UNUSED_ARG(ppp);
 | 
						|
#endif /* MIB2_STATS */
 | 
						|
 | 
						|
  /* @todo: try to use pbuf_header() here! */
 | 
						|
  pb = ppp_memory_buffer_allocate(ppp->netif->memory_manager, PPPOL2TP_OUTPUT_DATA_HEADER_LEN + sizeof(protocol), PPP_BUF_HEAP);
 | 
						|
  //pb = pbuf_alloc(PBUF_TRANSPORT, PPPOL2TP_OUTPUT_DATA_HEADER_LEN + sizeof(protocol), PBUF_RAM);
 | 
						|
  if(!pb) {
 | 
						|
    LINK_STATS_INC(link.memerr);
 | 
						|
    LINK_STATS_INC(link.proterr);
 | 
						|
    MIB2_STATS_NETIF_INC(ppp->netif, ifoutdiscards);
 | 
						|
    return ERR_MEM;
 | 
						|
  }
 | 
						|
 | 
						|
  pbuf_remove_header(pb, PPPOL2TP_OUTPUT_DATA_HEADER_LEN);
 | 
						|
 | 
						|
  pl = (u8_t*)pb->payload;
 | 
						|
  PUTSHORT(protocol, pl);
 | 
						|
 | 
						|
  pbuf_chain(pb, p);
 | 
						|
#if MIB2_STATS
 | 
						|
  tot_len = pb->tot_len;
 | 
						|
#endif /* MIB2_STATS */
 | 
						|
 | 
						|
  if( (err = pppol2tp_xmit(l2tp, pb)) != ERR_OK) {
 | 
						|
    LINK_STATS_INC(link.err);
 | 
						|
    MIB2_STATS_NETIF_INC(ppp->netif, ifoutdiscards);
 | 
						|
    return err;
 | 
						|
  }
 | 
						|
 | 
						|
  MIB2_STATS_NETIF_ADD(ppp->netif, ifoutoctets, tot_len);
 | 
						|
  MIB2_STATS_NETIF_INC(ppp->netif, ifoutucastpkts);
 | 
						|
  LINK_STATS_INC(link.xmit);
 | 
						|
  return ERR_OK;
 | 
						|
}
 | 
						|
 | 
						|
/* Destroy a L2TP control block */
 | 
						|
static err_t pppol2tp_destroy(ppp_pcb *ppp, void *ctx) {
 | 
						|
  pppol2tp_pcb *l2tp = (pppol2tp_pcb *)ctx;
 | 
						|
  UNUSED_ARG(ppp);
 | 
						|
 | 
						|
  sys_untimeout(pppol2tp_timeout, l2tp);
 | 
						|
  udp_remove(l2tp->udp);
 | 
						|
  MEMPOOL_FREE(PPPOL2TP_PCB, l2tp);
 | 
						|
  return ERR_OK;
 | 
						|
}
 | 
						|
 | 
						|
/* Be a LAC, connect to a LNS. */
 | 
						|
static void pppol2tp_connect(ppp_pcb *ppp, void *ctx) {
 | 
						|
  err_t err;
 | 
						|
  pppol2tp_pcb *l2tp = (pppol2tp_pcb *)ctx;
 | 
						|
  lcp_options *lcp_wo;
 | 
						|
  lcp_options *lcp_ao;
 | 
						|
#if PPP_IPV4_SUPPORT && VJ_SUPPORT
 | 
						|
  ipcp_options *ipcp_wo;
 | 
						|
  ipcp_options *ipcp_ao;
 | 
						|
#endif /* PPP_IPV4_SUPPORT && VJ_SUPPORT */
 | 
						|
 | 
						|
  l2tp->tunnel_port = l2tp->remote_port;
 | 
						|
  l2tp->our_ns = 0;
 | 
						|
  l2tp->peer_nr = 0;
 | 
						|
  l2tp->peer_ns = 0;
 | 
						|
  l2tp->source_tunnel_id = 0;
 | 
						|
  l2tp->remote_tunnel_id = 0;
 | 
						|
  l2tp->source_session_id = 0;
 | 
						|
  l2tp->remote_session_id = 0;
 | 
						|
  /* l2tp->*_retried are cleared when used */
 | 
						|
 | 
						|
  lcp_wo = &ppp->lcp_wantoptions;
 | 
						|
  lcp_wo->mru = PPPOL2TP_DEFMRU;
 | 
						|
  lcp_wo->neg_asyncmap = 0;
 | 
						|
  lcp_wo->neg_pcompression = 0;
 | 
						|
  lcp_wo->neg_accompression = 0;
 | 
						|
  lcp_wo->passive = 0;
 | 
						|
  lcp_wo->silent = 0;
 | 
						|
 | 
						|
  lcp_ao = &ppp->lcp_allowoptions;
 | 
						|
  lcp_ao->mru = PPPOL2TP_DEFMRU;
 | 
						|
  lcp_ao->neg_asyncmap = 0;
 | 
						|
  lcp_ao->neg_pcompression = 0;
 | 
						|
  lcp_ao->neg_accompression = 0;
 | 
						|
 | 
						|
#if PPP_IPV4_SUPPORT && VJ_SUPPORT
 | 
						|
  ipcp_wo = &ppp->ipcp_wantoptions;
 | 
						|
  ipcp_wo->neg_vj = 0;
 | 
						|
  ipcp_wo->old_vj = 0;
 | 
						|
 | 
						|
  ipcp_ao = &ppp->ipcp_allowoptions;
 | 
						|
  ipcp_ao->neg_vj = 0;
 | 
						|
  ipcp_ao->old_vj = 0;
 | 
						|
#endif /* PPP_IPV4_SUPPORT && VJ_SUPPORT */
 | 
						|
 | 
						|
  /* Listen to a random source port, we need to do that instead of using udp_connect()
 | 
						|
   * because the L2TP LNS might answer with its own random source port (!= 1701)
 | 
						|
   */
 | 
						|
#if PPP_IPV6_SUPPORT
 | 
						|
  if (IP_IS_V6_VAL(l2tp->udp->local_ip)) {
 | 
						|
    udp_bind(l2tp->udp, IP6_ADDR_ANY, 0);
 | 
						|
  } else
 | 
						|
#endif /* PPP_IPV6_SUPPORT */
 | 
						|
  udp_bind(l2tp->udp, IP_ADDR_ANY, 0);
 | 
						|
 | 
						|
#if PPPOL2TP_AUTH_SUPPORT
 | 
						|
  /* Generate random vector */
 | 
						|
  if (l2tp->secret != NULL) {
 | 
						|
    magic_random_bytes(l2tp->secret_rv, sizeof(l2tp->secret_rv));
 | 
						|
  }
 | 
						|
#endif /* PPPOL2TP_AUTH_SUPPORT */
 | 
						|
 | 
						|
  do {
 | 
						|
    l2tp->remote_tunnel_id = magic();
 | 
						|
  } while(l2tp->remote_tunnel_id == 0);
 | 
						|
  /* save state, in case we fail to send SCCRQ */
 | 
						|
  l2tp->sccrq_retried = 0;
 | 
						|
  l2tp->phase = PPPOL2TP_STATE_SCCRQ_SENT;
 | 
						|
  if ((err = pppol2tp_send_sccrq(l2tp)) != 0) {
 | 
						|
    PPPDEBUG(LOG_DEBUG, ("pppol2tp: failed to send SCCRQ, error=%d\n", err));
 | 
						|
  }
 | 
						|
  sys_timeout(PPPOL2TP_CONTROL_TIMEOUT, pppol2tp_timeout, l2tp);
 | 
						|
}
 | 
						|
 | 
						|
/* Disconnect */
 | 
						|
static void pppol2tp_disconnect(ppp_pcb *ppp, void *ctx) {
 | 
						|
  pppol2tp_pcb *l2tp = (pppol2tp_pcb *)ctx;
 | 
						|
 | 
						|
  l2tp->our_ns++;
 | 
						|
  pppol2tp_send_stopccn(l2tp, l2tp->our_ns);
 | 
						|
 | 
						|
  /* stop any timer, disconnect can be called while initiating is in progress */
 | 
						|
  sys_untimeout(pppol2tp_timeout, l2tp);
 | 
						|
  l2tp->phase = PPPOL2TP_STATE_INITIAL;
 | 
						|
  ppp_link_end(ppp); /* notify upper layers */
 | 
						|
}
 | 
						|
 | 
						|
/* UDP Callback for incoming IPv4 L2TP frames */
 | 
						|
static void pppol2tp_input(void *arg, struct udp_pcb *pcb, struct pbuf *p, const ip_addr_t *addr, u16_t port) {
 | 
						|
  pppol2tp_pcb *l2tp = (pppol2tp_pcb*)arg;
 | 
						|
  u16_t hflags, hlen, len=0, tunnel_id=0, session_id=0, ns=0, nr=0, offset=0;
 | 
						|
  u8_t *inp;
 | 
						|
  UNUSED_ARG(pcb);
 | 
						|
 | 
						|
  /* we can't unbound a UDP pcb, thus we can still receive UDP frames after the link is closed */
 | 
						|
  if (l2tp->phase < PPPOL2TP_STATE_SCCRQ_SENT) {
 | 
						|
    goto free_and_return;
 | 
						|
  }
 | 
						|
 | 
						|
  if (!ip_addr_cmp(&l2tp->remote_ip, addr)) {
 | 
						|
    goto free_and_return;
 | 
						|
  }
 | 
						|
 | 
						|
  /* discard packet if port mismatch, but only if we received a SCCRP */
 | 
						|
  if (l2tp->phase > PPPOL2TP_STATE_SCCRQ_SENT && l2tp->tunnel_port != port) {
 | 
						|
    goto free_and_return;
 | 
						|
  }
 | 
						|
 | 
						|
  /* printf("-----------\nL2TP INPUT, %d\n", p->len); */
 | 
						|
 | 
						|
  /* L2TP header */
 | 
						|
  if (p->len < sizeof(hflags) + sizeof(tunnel_id) + sizeof(session_id) ) {
 | 
						|
    goto packet_too_short;
 | 
						|
  }
 | 
						|
 | 
						|
  inp = (u8_t*)p->payload;
 | 
						|
  GETSHORT(hflags, inp);
 | 
						|
 | 
						|
  if (hflags & PPPOL2TP_HEADERFLAG_CONTROL) {
 | 
						|
    /* check mandatory flags for a control packet */
 | 
						|
    if ( (hflags & PPPOL2TP_HEADERFLAG_CONTROL_MANDATORY) != PPPOL2TP_HEADERFLAG_CONTROL_MANDATORY ) {
 | 
						|
      PPPDEBUG(LOG_DEBUG, ("pppol2tp: mandatory header flags for control packet not set\n"));
 | 
						|
      goto free_and_return;
 | 
						|
    }
 | 
						|
    /* check forbidden flags for a control packet */
 | 
						|
    if (hflags & PPPOL2TP_HEADERFLAG_CONTROL_FORBIDDEN) {
 | 
						|
      PPPDEBUG(LOG_DEBUG, ("pppol2tp: forbidden header flags for control packet found\n"));
 | 
						|
      goto free_and_return;
 | 
						|
    }
 | 
						|
  } else {
 | 
						|
    /* check mandatory flags for a data packet */
 | 
						|
    if ( (hflags & PPPOL2TP_HEADERFLAG_DATA_MANDATORY) != PPPOL2TP_HEADERFLAG_DATA_MANDATORY) {
 | 
						|
      PPPDEBUG(LOG_DEBUG, ("pppol2tp: mandatory header flags for data packet not set\n"));
 | 
						|
      goto free_and_return;
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  /* Expected header size  */
 | 
						|
  hlen = sizeof(hflags) + sizeof(tunnel_id) + sizeof(session_id);
 | 
						|
  if (hflags & PPPOL2TP_HEADERFLAG_LENGTH) {
 | 
						|
    hlen += sizeof(len);
 | 
						|
  }
 | 
						|
  if (hflags & PPPOL2TP_HEADERFLAG_SEQUENCE) {
 | 
						|
    hlen += sizeof(ns) + sizeof(nr);
 | 
						|
  }
 | 
						|
  if (hflags & PPPOL2TP_HEADERFLAG_OFFSET) {
 | 
						|
    hlen += sizeof(offset);
 | 
						|
  }
 | 
						|
  if (p->len < hlen) {
 | 
						|
    goto packet_too_short;
 | 
						|
  }
 | 
						|
 | 
						|
  if (hflags & PPPOL2TP_HEADERFLAG_LENGTH) {
 | 
						|
    GETSHORT(len, inp);
 | 
						|
    if (p->len < len || len < hlen) {
 | 
						|
      goto packet_too_short;
 | 
						|
    }
 | 
						|
  }
 | 
						|
  GETSHORT(tunnel_id, inp);
 | 
						|
  GETSHORT(session_id, inp);
 | 
						|
  if (hflags & PPPOL2TP_HEADERFLAG_SEQUENCE) {
 | 
						|
    GETSHORT(ns, inp);
 | 
						|
    GETSHORT(nr, inp);
 | 
						|
  }
 | 
						|
  if (hflags & PPPOL2TP_HEADERFLAG_OFFSET) {
 | 
						|
    GETSHORT(offset, inp)
 | 
						|
    if (offset > 4096) { /* don't be fooled with large offset which might overflow hlen */
 | 
						|
      PPPDEBUG(LOG_DEBUG, ("pppol2tp: strange packet received, offset=%d\n", offset));
 | 
						|
      goto free_and_return;
 | 
						|
    }
 | 
						|
    hlen += offset;
 | 
						|
    if (p->len < hlen) {
 | 
						|
      goto packet_too_short;
 | 
						|
    }
 | 
						|
    INCPTR(offset, inp);
 | 
						|
  }
 | 
						|
 | 
						|
  /* printf("HLEN = %d\n", hlen); */
 | 
						|
 | 
						|
  /* skip L2TP header */
 | 
						|
  if (pbuf_remove_header(p, hlen) != 0) {
 | 
						|
    goto free_and_return;
 | 
						|
  }
 | 
						|
 | 
						|
  /* printf("LEN=%d, TUNNEL_ID=%d, SESSION_ID=%d, NS=%d, NR=%d, OFFSET=%d\n", len, tunnel_id, session_id, ns, nr, offset); */
 | 
						|
  PPPDEBUG(LOG_DEBUG, ("pppol2tp: input packet, len=%"U16_F", tunnel=%"U16_F", session=%"U16_F", ns=%"U16_F", nr=%"U16_F"\n",
 | 
						|
    len, tunnel_id, session_id, ns, nr));
 | 
						|
 | 
						|
  /* Control packet */
 | 
						|
  if (hflags & PPPOL2TP_HEADERFLAG_CONTROL) {
 | 
						|
    pppol2tp_dispatch_control_packet(l2tp, port, p, ns, nr);
 | 
						|
    goto free_and_return;
 | 
						|
  }
 | 
						|
 | 
						|
  /* Data packet */
 | 
						|
  if(l2tp->phase != PPPOL2TP_STATE_DATA) {
 | 
						|
    goto free_and_return;
 | 
						|
  }
 | 
						|
  if(tunnel_id != l2tp->remote_tunnel_id) {
 | 
						|
     PPPDEBUG(LOG_DEBUG, ("pppol2tp: tunnel ID mismatch, assigned=%d, received=%d\n", l2tp->remote_tunnel_id, tunnel_id));
 | 
						|
     goto free_and_return;
 | 
						|
  }
 | 
						|
  if(session_id != l2tp->remote_session_id) {
 | 
						|
     PPPDEBUG(LOG_DEBUG, ("pppol2tp: session ID mismatch, assigned=%d, received=%d\n", l2tp->remote_session_id, session_id));
 | 
						|
     goto free_and_return;
 | 
						|
  }
 | 
						|
  /*
 | 
						|
   * skip address & flags if necessary
 | 
						|
   *
 | 
						|
   * RFC 2661 does not specify whether the PPP frame in the L2TP payload should
 | 
						|
   * have a HDLC header or not. We handle both cases for compatibility.
 | 
						|
   */
 | 
						|
  if (p->len >= 2) {
 | 
						|
    GETSHORT(hflags, inp);
 | 
						|
    if (hflags == 0xff03) {
 | 
						|
      pbuf_remove_header(p, 2);
 | 
						|
    }
 | 
						|
  }
 | 
						|
  /* Dispatch the packet thereby consuming it. */
 | 
						|
  ppp_input(l2tp->ppp, p);
 | 
						|
  return;
 | 
						|
 | 
						|
packet_too_short:
 | 
						|
  PPPDEBUG(LOG_DEBUG, ("pppol2tp: packet too short: %d\n", p->len));
 | 
						|
free_and_return:
 | 
						|
  ppp_memory_buffer_free(p);
 | 
						|
  //pbuf_free(p);
 | 
						|
}
 | 
						|
 | 
						|
/* L2TP Control packet entry point */
 | 
						|
static void pppol2tp_dispatch_control_packet(pppol2tp_pcb *l2tp, u16_t port, struct pbuf *p, u16_t ns, u16_t nr) {
 | 
						|
  u8_t *inp;
 | 
						|
  u16_t avplen, avpflags, vendorid, attributetype, messagetype=0;
 | 
						|
  err_t err;
 | 
						|
#if PPPOL2TP_AUTH_SUPPORT
 | 
						|
  MD5_context md5_ctx;
 | 
						|
  u8_t md5_hash[16];
 | 
						|
  u8_t challenge_id = 0;
 | 
						|
#endif /* PPPOL2TP_AUTH_SUPPORT */
 | 
						|
 | 
						|
  /* printf("L2TP CTRL INPUT, ns=%d, nr=%d, len=%d\n", ns, nr, p->len); */
 | 
						|
 | 
						|
  /* Drop unexpected packet */
 | 
						|
  if (ns != l2tp->peer_ns) {
 | 
						|
    PPPDEBUG(LOG_DEBUG, ("pppol2tp: drop unexpected packet: received NS=%d, expected NS=%d\n", ns, l2tp->peer_ns));
 | 
						|
    /*
 | 
						|
     * In order to ensure that all messages are acknowledged properly
 | 
						|
     * (particularly in the case of a lost ZLB ACK message), receipt
 | 
						|
     * of duplicate messages MUST be acknowledged.
 | 
						|
     *
 | 
						|
     * In this very special case we Ack a packet we previously received.
 | 
						|
     * Therefore our NS is the NR we just received. And our NR is the
 | 
						|
     * NS we just received plus one.
 | 
						|
     */
 | 
						|
    if ((s16_t)(ns - l2tp->peer_ns) < 0) {
 | 
						|
      pppol2tp_send_zlb(l2tp, nr, ns+1);
 | 
						|
    }
 | 
						|
    return;
 | 
						|
  }
 | 
						|
 | 
						|
  l2tp->peer_nr = nr;
 | 
						|
 | 
						|
  /* Handle the special case of the ICCN acknowledge */
 | 
						|
  if (l2tp->phase == PPPOL2TP_STATE_ICCN_SENT && (s16_t)(l2tp->peer_nr - l2tp->our_ns) > 0) {
 | 
						|
    l2tp->phase = PPPOL2TP_STATE_DATA;
 | 
						|
    sys_untimeout(pppol2tp_timeout, l2tp);
 | 
						|
    ppp_start(l2tp->ppp); /* notify upper layers */
 | 
						|
  }
 | 
						|
 | 
						|
  /* ZLB packets */
 | 
						|
  if (p->tot_len == 0) {
 | 
						|
    return;
 | 
						|
  }
 | 
						|
  /* A ZLB packet does not consume a NS slot thus we don't record the NS value for ZLB packets */
 | 
						|
  l2tp->peer_ns = ns+1;
 | 
						|
 | 
						|
  p = pbuf_coalesce(p, PBUF_RAW);
 | 
						|
  inp = (u8_t*)p->payload;
 | 
						|
  /* Decode AVPs */
 | 
						|
  while (p->len > 0) {
 | 
						|
    if (p->len < sizeof(avpflags) + sizeof(vendorid) + sizeof(attributetype) ) {
 | 
						|
      goto packet_too_short;
 | 
						|
    }
 | 
						|
    GETSHORT(avpflags, inp);
 | 
						|
    avplen = avpflags & PPPOL2TP_AVPHEADERFLAG_LENGTHMASK;
 | 
						|
    /* printf("AVPLEN = %d\n", avplen); */
 | 
						|
    if (p->len < avplen || avplen < sizeof(avpflags) + sizeof(vendorid) + sizeof(attributetype)) {
 | 
						|
      goto packet_too_short;
 | 
						|
    }
 | 
						|
    GETSHORT(vendorid, inp);
 | 
						|
    GETSHORT(attributetype, inp);
 | 
						|
    avplen -= sizeof(avpflags) + sizeof(vendorid) + sizeof(attributetype);
 | 
						|
 | 
						|
    /* Message type must be the first AVP */
 | 
						|
    if (messagetype == 0) {
 | 
						|
      if (attributetype != 0 || vendorid != 0 || avplen != sizeof(messagetype) ) {
 | 
						|
        PPPDEBUG(LOG_DEBUG, ("pppol2tp: message type must be the first AVP\n"));
 | 
						|
        return;
 | 
						|
      }
 | 
						|
      GETSHORT(messagetype, inp);
 | 
						|
      /* printf("Message type = %d\n", messagetype); */
 | 
						|
      switch(messagetype) {
 | 
						|
        /* Start Control Connection Reply */
 | 
						|
        case PPPOL2TP_MESSAGETYPE_SCCRP:
 | 
						|
          /* Only accept SCCRP packet if we sent a SCCRQ */
 | 
						|
          if (l2tp->phase != PPPOL2TP_STATE_SCCRQ_SENT) {
 | 
						|
            goto send_zlb;
 | 
						|
          }
 | 
						|
          break;
 | 
						|
        /* Incoming Call Reply */
 | 
						|
        case PPPOL2TP_MESSAGETYPE_ICRP:
 | 
						|
          /* Only accept ICRP packet if we sent a IRCQ */
 | 
						|
          if (l2tp->phase != PPPOL2TP_STATE_ICRQ_SENT) {
 | 
						|
            goto send_zlb;
 | 
						|
          }
 | 
						|
          break;
 | 
						|
        /* Stop Control Connection Notification */
 | 
						|
        case PPPOL2TP_MESSAGETYPE_STOPCCN:
 | 
						|
          pppol2tp_send_zlb(l2tp, l2tp->our_ns+1, l2tp->peer_ns); /* Ack the StopCCN before we switch to down state */
 | 
						|
          if (l2tp->phase < PPPOL2TP_STATE_DATA) {
 | 
						|
            pppol2tp_abort_connect(l2tp);
 | 
						|
          } else if (l2tp->phase == PPPOL2TP_STATE_DATA) {
 | 
						|
            /* Don't disconnect here, we let the LCP Echo/Reply find the fact
 | 
						|
             * that PPP session is down. Asking the PPP stack to end the session
 | 
						|
             * require strict checking about the PPP phase to prevent endless
 | 
						|
             * disconnection loops.
 | 
						|
             */
 | 
						|
          }
 | 
						|
          return;
 | 
						|
        default:
 | 
						|
          break;
 | 
						|
      }
 | 
						|
      goto nextavp;
 | 
						|
    }
 | 
						|
 | 
						|
    /* Skip proprietary L2TP extensions */
 | 
						|
    if (vendorid != 0) {
 | 
						|
      goto skipavp;
 | 
						|
    }
 | 
						|
 | 
						|
    switch (messagetype) {
 | 
						|
      /* Start Control Connection Reply */
 | 
						|
      case PPPOL2TP_MESSAGETYPE_SCCRP:
 | 
						|
       switch (attributetype) {
 | 
						|
          case PPPOL2TP_AVPTYPE_TUNNELID:
 | 
						|
            if (avplen != sizeof(l2tp->source_tunnel_id) ) {
 | 
						|
               PPPDEBUG(LOG_DEBUG, ("pppol2tp: AVP Assign tunnel ID length check failed\n"));
 | 
						|
               return;
 | 
						|
            }
 | 
						|
            GETSHORT(l2tp->source_tunnel_id, inp);
 | 
						|
            PPPDEBUG(LOG_DEBUG, ("pppol2tp: Assigned tunnel ID %"U16_F"\n", l2tp->source_tunnel_id));
 | 
						|
            goto nextavp;
 | 
						|
#if PPPOL2TP_AUTH_SUPPORT
 | 
						|
          case PPPOL2TP_AVPTYPE_CHALLENGE:
 | 
						|
            if (avplen == 0) {
 | 
						|
               PPPDEBUG(LOG_DEBUG, ("pppol2tp: Challenge length check failed\n"));
 | 
						|
               return;
 | 
						|
            }
 | 
						|
            if (l2tp->secret == NULL) {
 | 
						|
              PPPDEBUG(LOG_DEBUG, ("pppol2tp: Received challenge from peer and no secret key available\n"));
 | 
						|
              pppol2tp_abort_connect(l2tp);
 | 
						|
              return;
 | 
						|
            }
 | 
						|
            /* Generate hash of ID, secret, challenge */
 | 
						|
            MD5_init(&md5_ctx);
 | 
						|
            MD5_starts(&md5_ctx);
 | 
						|
            challenge_id = PPPOL2TP_MESSAGETYPE_SCCCN;
 | 
						|
            MD5_update(&md5_ctx, &challenge_id, 1);
 | 
						|
            MD5_update(&md5_ctx, l2tp->secret, l2tp->secret_len);
 | 
						|
            MD5_update(&md5_ctx, inp, avplen);
 | 
						|
            MD5_finish(&md5_ctx, l2tp->challenge_hash);
 | 
						|
            MD5_free(&md5_ctx);
 | 
						|
            l2tp->send_challenge = 1;
 | 
						|
            goto skipavp;
 | 
						|
          case PPPOL2TP_AVPTYPE_CHALLENGERESPONSE:
 | 
						|
            if (avplen != PPPOL2TP_AVPTYPE_CHALLENGERESPONSE_SIZE) {
 | 
						|
               PPPDEBUG(LOG_DEBUG, ("pppol2tp: AVP Challenge Response length check failed\n"));
 | 
						|
               return;
 | 
						|
            }
 | 
						|
            /* Generate hash of ID, secret, challenge */
 | 
						|
            MD5_init(&md5_ctx);
 | 
						|
            MD5_starts(&md5_ctx);
 | 
						|
            challenge_id = PPPOL2TP_MESSAGETYPE_SCCRP;
 | 
						|
            MD5_update(&md5_ctx, &challenge_id, 1);
 | 
						|
            MD5_update(&md5_ctx, l2tp->secret, l2tp->secret_len);
 | 
						|
            MD5_update(&md5_ctx, l2tp->secret_rv, sizeof(l2tp->secret_rv));
 | 
						|
            MD5_finish(&md5_ctx, md5_hash);
 | 
						|
            MD5_free(&md5_ctx);
 | 
						|
            if ( memcmp(inp, md5_hash, sizeof(md5_hash)) ) {
 | 
						|
              PPPDEBUG(LOG_DEBUG, ("pppol2tp: Received challenge response from peer and secret key do not match\n"));
 | 
						|
              pppol2tp_abort_connect(l2tp);
 | 
						|
              return;
 | 
						|
            }
 | 
						|
            goto skipavp;
 | 
						|
#endif /* PPPOL2TP_AUTH_SUPPORT */
 | 
						|
          default:
 | 
						|
            break;
 | 
						|
        }
 | 
						|
        break;
 | 
						|
      /* Incoming Call Reply */
 | 
						|
      case PPPOL2TP_MESSAGETYPE_ICRP:
 | 
						|
        switch (attributetype) {
 | 
						|
         case PPPOL2TP_AVPTYPE_SESSIONID:
 | 
						|
            if (avplen != sizeof(l2tp->source_session_id) ) {
 | 
						|
               PPPDEBUG(LOG_DEBUG, ("pppol2tp: AVP Assign session ID length check failed\n"));
 | 
						|
               return;
 | 
						|
            }
 | 
						|
            GETSHORT(l2tp->source_session_id, inp);
 | 
						|
            PPPDEBUG(LOG_DEBUG, ("pppol2tp: Assigned session ID %"U16_F"\n", l2tp->source_session_id));
 | 
						|
            goto nextavp;
 | 
						|
          default:
 | 
						|
            break;
 | 
						|
        }
 | 
						|
        break;
 | 
						|
      default:
 | 
						|
        break;
 | 
						|
    }
 | 
						|
 | 
						|
skipavp:
 | 
						|
    INCPTR(avplen, inp);
 | 
						|
nextavp:
 | 
						|
    /* printf("AVP Found, vendor=%d, attribute=%d, len=%d\n", vendorid, attributetype, avplen); */
 | 
						|
    /* next AVP */
 | 
						|
    if (pbuf_remove_header(p, avplen + sizeof(avpflags) + sizeof(vendorid) + sizeof(attributetype)) != 0) {
 | 
						|
      return;
 | 
						|
    }
 | 
						|
  }
 | 
						|
 | 
						|
  switch(messagetype) {
 | 
						|
    /* Start Control Connection Reply */
 | 
						|
    case PPPOL2TP_MESSAGETYPE_SCCRP:
 | 
						|
      do {
 | 
						|
        l2tp->remote_session_id = magic();
 | 
						|
      } while(l2tp->remote_session_id == 0);
 | 
						|
      l2tp->tunnel_port = port; /* LNS server might have chosen its own local port */
 | 
						|
      l2tp->icrq_retried = 0;
 | 
						|
      l2tp->phase = PPPOL2TP_STATE_ICRQ_SENT;
 | 
						|
      l2tp->our_ns++;
 | 
						|
      if ((err = pppol2tp_send_scccn(l2tp, l2tp->our_ns)) != 0) {
 | 
						|
        PPPDEBUG(LOG_DEBUG, ("pppol2tp: failed to send SCCCN, error=%d\n", err));
 | 
						|
        UNUSED_ARG(err); /* if PPPDEBUG is disabled */
 | 
						|
      }
 | 
						|
      l2tp->our_ns++;
 | 
						|
      if ((err = pppol2tp_send_icrq(l2tp, l2tp->our_ns)) != 0) {
 | 
						|
        PPPDEBUG(LOG_DEBUG, ("pppol2tp: failed to send ICRQ, error=%d\n", err));
 | 
						|
        UNUSED_ARG(err); /* if PPPDEBUG is disabled */
 | 
						|
      }
 | 
						|
      sys_untimeout(pppol2tp_timeout, l2tp);
 | 
						|
      sys_timeout(PPPOL2TP_CONTROL_TIMEOUT, pppol2tp_timeout, l2tp);
 | 
						|
      break;
 | 
						|
    /* Incoming Call Reply */
 | 
						|
    case PPPOL2TP_MESSAGETYPE_ICRP:
 | 
						|
      l2tp->iccn_retried = 0;
 | 
						|
      l2tp->phase = PPPOL2TP_STATE_ICCN_SENT;
 | 
						|
      l2tp->our_ns++;
 | 
						|
      if ((err = pppol2tp_send_iccn(l2tp, l2tp->our_ns)) != 0) {
 | 
						|
        PPPDEBUG(LOG_DEBUG, ("pppol2tp: failed to send ICCN, error=%d\n", err));
 | 
						|
        UNUSED_ARG(err); /* if PPPDEBUG is disabled */
 | 
						|
      }
 | 
						|
      sys_untimeout(pppol2tp_timeout, l2tp);
 | 
						|
      sys_timeout(PPPOL2TP_CONTROL_TIMEOUT, pppol2tp_timeout, l2tp);
 | 
						|
      break;
 | 
						|
    /* Unhandled packet, send ZLB ACK */
 | 
						|
    default:
 | 
						|
      goto send_zlb;
 | 
						|
  }
 | 
						|
  return;
 | 
						|
 | 
						|
send_zlb:
 | 
						|
  pppol2tp_send_zlb(l2tp, l2tp->our_ns+1, l2tp->peer_ns);
 | 
						|
  return;
 | 
						|
packet_too_short:
 | 
						|
  PPPDEBUG(LOG_DEBUG, ("pppol2tp: packet too short: %d\n", p->len));
 | 
						|
}
 | 
						|
 | 
						|
/* L2TP Timeout handler */
 | 
						|
static void pppol2tp_timeout(void *arg) {
 | 
						|
  pppol2tp_pcb *l2tp = (pppol2tp_pcb*)arg;
 | 
						|
  err_t err;
 | 
						|
  u32_t retry_wait;
 | 
						|
 | 
						|
  PPPDEBUG(LOG_DEBUG, ("pppol2tp: timeout\n"));
 | 
						|
 | 
						|
  switch (l2tp->phase) {
 | 
						|
    case PPPOL2TP_STATE_SCCRQ_SENT:
 | 
						|
      /* backoff wait */
 | 
						|
      if (l2tp->sccrq_retried < 0xff) {
 | 
						|
        l2tp->sccrq_retried++;
 | 
						|
      }
 | 
						|
      if (!l2tp->ppp->settings.persist && l2tp->sccrq_retried >= PPPOL2TP_MAXSCCRQ) {
 | 
						|
        pppol2tp_abort_connect(l2tp);
 | 
						|
        return;
 | 
						|
      }
 | 
						|
      retry_wait = PPP_MIN(PPPOL2TP_CONTROL_TIMEOUT * l2tp->sccrq_retried, PPPOL2TP_SLOW_RETRY);
 | 
						|
      PPPDEBUG(LOG_DEBUG, ("pppol2tp: sccrq_retried=%d\n", l2tp->sccrq_retried));
 | 
						|
      if ((err = pppol2tp_send_sccrq(l2tp)) != 0) {
 | 
						|
        l2tp->sccrq_retried--;
 | 
						|
        PPPDEBUG(LOG_DEBUG, ("pppol2tp: failed to send SCCRQ, error=%d\n", err));
 | 
						|
        UNUSED_ARG(err); /* if PPPDEBUG is disabled */
 | 
						|
      }
 | 
						|
      sys_timeout(retry_wait, pppol2tp_timeout, l2tp);
 | 
						|
      break;
 | 
						|
 | 
						|
    case PPPOL2TP_STATE_ICRQ_SENT:
 | 
						|
      l2tp->icrq_retried++;
 | 
						|
      if (l2tp->icrq_retried >= PPPOL2TP_MAXICRQ) {
 | 
						|
        pppol2tp_abort_connect(l2tp);
 | 
						|
        return;
 | 
						|
      }
 | 
						|
      PPPDEBUG(LOG_DEBUG, ("pppol2tp: icrq_retried=%d\n", l2tp->icrq_retried));
 | 
						|
      if ((s16_t)(l2tp->peer_nr - l2tp->our_ns) < 0) { /* the SCCCN was not acknowledged */
 | 
						|
        if ((err = pppol2tp_send_scccn(l2tp, l2tp->our_ns -1)) != 0) {
 | 
						|
          l2tp->icrq_retried--;
 | 
						|
          PPPDEBUG(LOG_DEBUG, ("pppol2tp: failed to send SCCCN, error=%d\n", err));
 | 
						|
          UNUSED_ARG(err); /* if PPPDEBUG is disabled */
 | 
						|
          sys_timeout(PPPOL2TP_CONTROL_TIMEOUT, pppol2tp_timeout, l2tp);
 | 
						|
          break;
 | 
						|
        }
 | 
						|
      }
 | 
						|
      if ((err = pppol2tp_send_icrq(l2tp, l2tp->our_ns)) != 0) {
 | 
						|
        l2tp->icrq_retried--;
 | 
						|
        PPPDEBUG(LOG_DEBUG, ("pppol2tp: failed to send ICRQ, error=%d\n", err));
 | 
						|
        UNUSED_ARG(err); /* if PPPDEBUG is disabled */
 | 
						|
      }
 | 
						|
      sys_timeout(PPPOL2TP_CONTROL_TIMEOUT, pppol2tp_timeout, l2tp);
 | 
						|
      break;
 | 
						|
 | 
						|
    case PPPOL2TP_STATE_ICCN_SENT:
 | 
						|
      l2tp->iccn_retried++;
 | 
						|
      if (l2tp->iccn_retried >= PPPOL2TP_MAXICCN) {
 | 
						|
        pppol2tp_abort_connect(l2tp);
 | 
						|
        return;
 | 
						|
      }
 | 
						|
      PPPDEBUG(LOG_DEBUG, ("pppol2tp: iccn_retried=%d\n", l2tp->iccn_retried));
 | 
						|
      if ((err = pppol2tp_send_iccn(l2tp, l2tp->our_ns)) != 0) {
 | 
						|
        l2tp->iccn_retried--;
 | 
						|
        PPPDEBUG(LOG_DEBUG, ("pppol2tp: failed to send ICCN, error=%d\n", err));
 | 
						|
        UNUSED_ARG(err); /* if PPPDEBUG is disabled */
 | 
						|
      }
 | 
						|
      sys_timeout(PPPOL2TP_CONTROL_TIMEOUT, pppol2tp_timeout, l2tp);
 | 
						|
      break;
 | 
						|
 | 
						|
    default:
 | 
						|
      return;  /* all done, work in peace */
 | 
						|
  }
 | 
						|
}
 | 
						|
 | 
						|
/* Connection attempt aborted */
 | 
						|
static void pppol2tp_abort_connect(pppol2tp_pcb *l2tp) {
 | 
						|
  PPPDEBUG(LOG_DEBUG, ("pppol2tp: could not establish connection\n"));
 | 
						|
  l2tp->phase = PPPOL2TP_STATE_INITIAL;
 | 
						|
  ppp_link_failed(l2tp->ppp); /* notify upper layers */
 | 
						|
}
 | 
						|
 | 
						|
/* Initiate a new tunnel */
 | 
						|
static err_t pppol2tp_send_sccrq(pppol2tp_pcb *l2tp) {
 | 
						|
  struct pbuf *pb;
 | 
						|
  u8_t *p;
 | 
						|
  u16_t len;
 | 
						|
 | 
						|
  /* calculate UDP packet length */
 | 
						|
  len = 12 +8 +8 +10 +10 +6+sizeof(PPPOL2TP_HOSTNAME)-1 +6+sizeof(PPPOL2TP_VENDORNAME)-1 +8 +8;
 | 
						|
#if PPPOL2TP_AUTH_SUPPORT
 | 
						|
  if (l2tp->secret != NULL) {
 | 
						|
    len += 6 + sizeof(l2tp->secret_rv);
 | 
						|
  }
 | 
						|
#endif /* PPPOL2TP_AUTH_SUPPORT */
 | 
						|
 | 
						|
  /* allocate a buffer */
 | 
						|
  pb = ppp_memory_buffer_allocate(ppp->netif->memory_manager, len, PPP_BUF_HEAP);
 | 
						|
  //pb = pbuf_alloc(PBUF_TRANSPORT, len, PBUF_RAM);
 | 
						|
  if (pb == NULL) {
 | 
						|
    return ERR_MEM;
 | 
						|
  }
 | 
						|
  PPP_ASSERT("pb->tot_len == pb->len", pb->tot_len == pb->len);
 | 
						|
 | 
						|
  p = (u8_t*)pb->payload;
 | 
						|
  /* fill in pkt */
 | 
						|
  /* L2TP control header */
 | 
						|
  PUTSHORT(PPPOL2TP_HEADERFLAG_CONTROL_MANDATORY, p);
 | 
						|
  PUTSHORT(len, p); /* Length */
 | 
						|
  PUTSHORT(0, p); /* Tunnel Id */
 | 
						|
  PUTSHORT(0, p); /* Session Id */
 | 
						|
  PUTSHORT(0, p); /* NS Sequence number - to peer */
 | 
						|
  PUTSHORT(0, p); /* NR Sequence number - expected for peer */
 | 
						|
 | 
						|
  /* AVP - Message type */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 8, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_MESSAGE, p); /* Attribute type: Message Type */
 | 
						|
  PUTSHORT(PPPOL2TP_MESSAGETYPE_SCCRQ, p); /* Attribute value: Message type: SCCRQ */
 | 
						|
 | 
						|
  /* AVP - L2TP Version */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 8, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_VERSION, p); /* Attribute type: Version */
 | 
						|
  PUTSHORT(PPPOL2TP_VERSION, p); /* Attribute value: L2TP Version */
 | 
						|
 | 
						|
  /* AVP - Framing capabilities */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 10, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_FRAMINGCAPABILITIES, p); /* Attribute type: Framing capabilities */
 | 
						|
  PUTLONG(PPPOL2TP_FRAMINGCAPABILITIES, p); /* Attribute value: Framing capabilities */
 | 
						|
 | 
						|
  /* AVP - Bearer capabilities */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 10, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_BEARERCAPABILITIES, p); /* Attribute type: Bearer capabilities */
 | 
						|
  PUTLONG(PPPOL2TP_BEARERCAPABILITIES, p); /* Attribute value: Bearer capabilities */
 | 
						|
 | 
						|
  /* AVP - Host name */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 6+sizeof(PPPOL2TP_HOSTNAME)-1, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_HOSTNAME, p); /* Attribute type: Hostname */
 | 
						|
  MEMCPY(p, PPPOL2TP_HOSTNAME, sizeof(PPPOL2TP_HOSTNAME)-1); /* Attribute value: Hostname */
 | 
						|
  INCPTR(sizeof(PPPOL2TP_HOSTNAME)-1, p);
 | 
						|
 | 
						|
  /* AVP - Vendor name */
 | 
						|
  PUTSHORT(6+sizeof(PPPOL2TP_VENDORNAME)-1, p); /* len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_VENDORNAME, p); /* Attribute type: Vendor name */
 | 
						|
  MEMCPY(p, PPPOL2TP_VENDORNAME, sizeof(PPPOL2TP_VENDORNAME)-1); /* Attribute value: Vendor name */
 | 
						|
  INCPTR(sizeof(PPPOL2TP_VENDORNAME)-1, p);
 | 
						|
 | 
						|
  /* AVP - Assign tunnel ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 8, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_TUNNELID, p); /* Attribute type: Tunnel ID */
 | 
						|
  PUTSHORT(l2tp->remote_tunnel_id, p); /* Attribute value: Tunnel ID */
 | 
						|
 | 
						|
  /* AVP - Receive window size */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 8, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_RECEIVEWINDOWSIZE, p); /* Attribute type: Receive window size */
 | 
						|
  PUTSHORT(PPPOL2TP_RECEIVEWINDOWSIZE, p); /* Attribute value: Receive window size */
 | 
						|
 | 
						|
#if PPPOL2TP_AUTH_SUPPORT
 | 
						|
  /* AVP - Challenge */
 | 
						|
  if (l2tp->secret != NULL) {
 | 
						|
    PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 6 + sizeof(l2tp->secret_rv), p); /* Mandatory flag + len field */
 | 
						|
    PUTSHORT(0, p); /* Vendor ID */
 | 
						|
    PUTSHORT(PPPOL2TP_AVPTYPE_CHALLENGE, p); /* Attribute type: Challenge */
 | 
						|
    MEMCPY(p, l2tp->secret_rv, sizeof(l2tp->secret_rv)); /* Attribute value: Random vector */
 | 
						|
    INCPTR(sizeof(l2tp->secret_rv), p);
 | 
						|
  }
 | 
						|
#endif /* PPPOL2TP_AUTH_SUPPORT */
 | 
						|
 | 
						|
  return pppol2tp_udp_send(l2tp, pb);
 | 
						|
}
 | 
						|
 | 
						|
/* Complete tunnel establishment */
 | 
						|
static err_t pppol2tp_send_scccn(pppol2tp_pcb *l2tp, u16_t ns) {
 | 
						|
  struct pbuf *pb;
 | 
						|
  u8_t *p;
 | 
						|
  u16_t len;
 | 
						|
 | 
						|
  /* calculate UDP packet length */
 | 
						|
  len = 12 +8;
 | 
						|
#if PPPOL2TP_AUTH_SUPPORT
 | 
						|
  if (l2tp->send_challenge) {
 | 
						|
    len += 6 + sizeof(l2tp->challenge_hash);
 | 
						|
  }
 | 
						|
#endif /* PPPOL2TP_AUTH_SUPPORT */
 | 
						|
 | 
						|
  /* allocate a buffer */
 | 
						|
  pb = ppp_memory_buffer_allocate(ppp->netif->memory_manager, len, PPP_BUF_HEAP);
 | 
						|
  //pb = pbuf_alloc(PBUF_TRANSPORT, len, PBUF_RAM);
 | 
						|
  if (pb == NULL) {
 | 
						|
    return ERR_MEM;
 | 
						|
  }
 | 
						|
  PPP_ASSERT("pb->tot_len == pb->len", pb->tot_len == pb->len);
 | 
						|
 | 
						|
  p = (u8_t*)pb->payload;
 | 
						|
  /* fill in pkt */
 | 
						|
  /* L2TP control header */
 | 
						|
  PUTSHORT(PPPOL2TP_HEADERFLAG_CONTROL_MANDATORY, p);
 | 
						|
  PUTSHORT(len, p); /* Length */
 | 
						|
  PUTSHORT(l2tp->source_tunnel_id, p); /* Tunnel Id */
 | 
						|
  PUTSHORT(0, p); /* Session Id */
 | 
						|
  PUTSHORT(ns, p); /* NS Sequence number - to peer */
 | 
						|
  PUTSHORT(l2tp->peer_ns, p); /* NR Sequence number - expected for peer */
 | 
						|
 | 
						|
  /* AVP - Message type */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 8, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_MESSAGE, p); /* Attribute type: Message Type */
 | 
						|
  PUTSHORT(PPPOL2TP_MESSAGETYPE_SCCCN, p); /* Attribute value: Message type: SCCCN */
 | 
						|
 | 
						|
#if PPPOL2TP_AUTH_SUPPORT
 | 
						|
  /* AVP - Challenge response */
 | 
						|
  if (l2tp->send_challenge) {
 | 
						|
    PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 6 + sizeof(l2tp->challenge_hash), p); /* Mandatory flag + len field */
 | 
						|
    PUTSHORT(0, p); /* Vendor ID */
 | 
						|
    PUTSHORT(PPPOL2TP_AVPTYPE_CHALLENGERESPONSE, p); /* Attribute type: Challenge response */
 | 
						|
    MEMCPY(p, l2tp->challenge_hash, sizeof(l2tp->challenge_hash)); /* Attribute value: Computed challenge */
 | 
						|
    INCPTR(sizeof(l2tp->challenge_hash), p);
 | 
						|
  }
 | 
						|
#endif /* PPPOL2TP_AUTH_SUPPORT */
 | 
						|
 | 
						|
  return pppol2tp_udp_send(l2tp, pb);
 | 
						|
}
 | 
						|
 | 
						|
/* Initiate a new session */
 | 
						|
static err_t pppol2tp_send_icrq(pppol2tp_pcb *l2tp, u16_t ns) {
 | 
						|
  struct pbuf *pb;
 | 
						|
  u8_t *p;
 | 
						|
  u16_t len;
 | 
						|
  u32_t serialnumber;
 | 
						|
 | 
						|
  /* calculate UDP packet length */
 | 
						|
  len = 12 +8 +8 +10;
 | 
						|
 | 
						|
  /* allocate a buffer */
 | 
						|
  pb = ppp_memory_buffer_allocate(ppp->netif->memory_manager, len, PPP_BUF_HEAP);
 | 
						|
  //pb = pbuf_alloc(PBUF_TRANSPORT, len, PBUF_RAM);
 | 
						|
  if (pb == NULL) {
 | 
						|
    return ERR_MEM;
 | 
						|
  }
 | 
						|
  PPP_ASSERT("pb->tot_len == pb->len", pb->tot_len == pb->len);
 | 
						|
 | 
						|
  p = (u8_t*)pb->payload;
 | 
						|
  /* fill in pkt */
 | 
						|
  /* L2TP control header */
 | 
						|
  PUTSHORT(PPPOL2TP_HEADERFLAG_CONTROL_MANDATORY, p);
 | 
						|
  PUTSHORT(len, p); /* Length */
 | 
						|
  PUTSHORT(l2tp->source_tunnel_id, p); /* Tunnel Id */
 | 
						|
  PUTSHORT(0, p); /* Session Id */
 | 
						|
  PUTSHORT(ns, p); /* NS Sequence number - to peer */
 | 
						|
  PUTSHORT(l2tp->peer_ns, p); /* NR Sequence number - expected for peer */
 | 
						|
 | 
						|
  /* AVP - Message type */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 8, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_MESSAGE, p); /* Attribute type: Message Type */
 | 
						|
  PUTSHORT(PPPOL2TP_MESSAGETYPE_ICRQ, p); /* Attribute value: Message type: ICRQ */
 | 
						|
 | 
						|
  /* AVP - Assign session ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 8, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_SESSIONID, p); /* Attribute type: Session ID */
 | 
						|
  PUTSHORT(l2tp->remote_session_id, p); /* Attribute value: Session ID */
 | 
						|
 | 
						|
  /* AVP - Call Serial Number */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 10, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_CALLSERIALNUMBER, p); /* Attribute type: Serial number */
 | 
						|
  serialnumber = magic();
 | 
						|
  PUTLONG(serialnumber, p); /* Attribute value: Serial number */
 | 
						|
 | 
						|
  return pppol2tp_udp_send(l2tp, pb);
 | 
						|
}
 | 
						|
 | 
						|
/* Complete tunnel establishment */
 | 
						|
static err_t pppol2tp_send_iccn(pppol2tp_pcb *l2tp, u16_t ns) {
 | 
						|
  struct pbuf *pb;
 | 
						|
  u8_t *p;
 | 
						|
  u16_t len;
 | 
						|
 | 
						|
  /* calculate UDP packet length */
 | 
						|
  len = 12 +8 +10 +10;
 | 
						|
 | 
						|
  /* allocate a buffer */
 | 
						|
  pb = ppp_memory_buffer_allocate(ppp->netif->memory_manager, len, PPP_BUF_HEAP);
 | 
						|
  //pb = pbuf_alloc(PBUF_TRANSPORT, len, PBUF_RAM);
 | 
						|
  if (pb == NULL) {
 | 
						|
    return ERR_MEM;
 | 
						|
  }
 | 
						|
  PPP_ASSERT("pb->tot_len == pb->len", pb->tot_len == pb->len);
 | 
						|
 | 
						|
  p = (u8_t*)pb->payload;
 | 
						|
  /* fill in pkt */
 | 
						|
  /* L2TP control header */
 | 
						|
  PUTSHORT(PPPOL2TP_HEADERFLAG_CONTROL_MANDATORY, p);
 | 
						|
  PUTSHORT(len, p); /* Length */
 | 
						|
  PUTSHORT(l2tp->source_tunnel_id, p); /* Tunnel Id */
 | 
						|
  PUTSHORT(l2tp->source_session_id, p); /* Session Id */
 | 
						|
  PUTSHORT(ns, p); /* NS Sequence number - to peer */
 | 
						|
  PUTSHORT(l2tp->peer_ns, p); /* NR Sequence number - expected for peer */
 | 
						|
 | 
						|
  /* AVP - Message type */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 8, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_MESSAGE, p); /* Attribute type: Message Type */
 | 
						|
  PUTSHORT(PPPOL2TP_MESSAGETYPE_ICCN, p); /* Attribute value: Message type: ICCN */
 | 
						|
 | 
						|
  /* AVP - Framing type */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 10, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_FRAMINGTYPE, p); /* Attribute type: Framing type */
 | 
						|
  PUTLONG(PPPOL2TP_FRAMINGTYPE, p); /* Attribute value: Framing type */
 | 
						|
 | 
						|
  /* AVP - TX Connect speed */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 10, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_TXCONNECTSPEED, p); /* Attribute type: TX Connect speed */
 | 
						|
  PUTLONG(PPPOL2TP_TXCONNECTSPEED, p); /* Attribute value: TX Connect speed */
 | 
						|
 | 
						|
  return pppol2tp_udp_send(l2tp, pb);
 | 
						|
}
 | 
						|
 | 
						|
/* Send a ZLB ACK packet */
 | 
						|
static err_t pppol2tp_send_zlb(pppol2tp_pcb *l2tp, u16_t ns, u16_t nr) {
 | 
						|
  struct pbuf *pb;
 | 
						|
  u8_t *p;
 | 
						|
  u16_t len;
 | 
						|
 | 
						|
  /* calculate UDP packet length */
 | 
						|
  len = 12;
 | 
						|
 | 
						|
  /* allocate a buffer */
 | 
						|
  pb = ppp_memory_buffer_allocate(ppp->netif->memory_manager, len, PPP_BUF_HEAP);
 | 
						|
  //pb = pbuf_alloc(PBUF_TRANSPORT, len, PBUF_RAM);
 | 
						|
  if (pb == NULL) {
 | 
						|
    return ERR_MEM;
 | 
						|
  }
 | 
						|
  PPP_ASSERT("pb->tot_len == pb->len", pb->tot_len == pb->len);
 | 
						|
 | 
						|
  p = (u8_t*)pb->payload;
 | 
						|
  /* fill in pkt */
 | 
						|
  /* L2TP control header */
 | 
						|
  PUTSHORT(PPPOL2TP_HEADERFLAG_CONTROL_MANDATORY, p);
 | 
						|
  PUTSHORT(len, p); /* Length */
 | 
						|
  PUTSHORT(l2tp->source_tunnel_id, p); /* Tunnel Id */
 | 
						|
  PUTSHORT(0, p); /* Session Id */
 | 
						|
  PUTSHORT(ns, p); /* NS Sequence number - to peer */
 | 
						|
  PUTSHORT(nr, p); /* NR Sequence number - expected for peer */
 | 
						|
 | 
						|
  return pppol2tp_udp_send(l2tp, pb);
 | 
						|
}
 | 
						|
 | 
						|
/* Send a StopCCN packet */
 | 
						|
static err_t pppol2tp_send_stopccn(pppol2tp_pcb *l2tp, u16_t ns) {
 | 
						|
  struct pbuf *pb;
 | 
						|
  u8_t *p;
 | 
						|
  u16_t len;
 | 
						|
 | 
						|
  /* calculate UDP packet length */
 | 
						|
  len = 12 +8 +8 +8;
 | 
						|
 | 
						|
  /* allocate a buffer */
 | 
						|
  pb = ppp_memory_buffer_allocate(ppp->netif->memory_manager, len, PPP_BUF_HEAP);
 | 
						|
  //pb = pbuf_alloc(PBUF_TRANSPORT, len, PBUF_RAM);
 | 
						|
  if (pb == NULL) {
 | 
						|
    return ERR_MEM;
 | 
						|
  }
 | 
						|
  PPP_ASSERT("pb->tot_len == pb->len", pb->tot_len == pb->len);
 | 
						|
 | 
						|
  p = (u8_t*)pb->payload;
 | 
						|
  /* fill in pkt */
 | 
						|
  /* L2TP control header */
 | 
						|
  PUTSHORT(PPPOL2TP_HEADERFLAG_CONTROL_MANDATORY, p);
 | 
						|
  PUTSHORT(len, p); /* Length */
 | 
						|
  PUTSHORT(l2tp->source_tunnel_id, p); /* Tunnel Id */
 | 
						|
  PUTSHORT(0, p); /* Session Id */
 | 
						|
  PUTSHORT(ns, p); /* NS Sequence number - to peer */
 | 
						|
  PUTSHORT(l2tp->peer_ns, p); /* NR Sequence number - expected for peer */
 | 
						|
 | 
						|
  /* AVP - Message type */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 8, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_MESSAGE, p); /* Attribute type: Message Type */
 | 
						|
  PUTSHORT(PPPOL2TP_MESSAGETYPE_STOPCCN, p); /* Attribute value: Message type: StopCCN */
 | 
						|
 | 
						|
  /* AVP - Assign tunnel ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 8, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_TUNNELID, p); /* Attribute type: Tunnel ID */
 | 
						|
  PUTSHORT(l2tp->remote_tunnel_id, p); /* Attribute value: Tunnel ID */
 | 
						|
 | 
						|
  /* AVP - Result code */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPHEADERFLAG_MANDATORY + 8, p); /* Mandatory flag + len field */
 | 
						|
  PUTSHORT(0, p); /* Vendor ID */
 | 
						|
  PUTSHORT(PPPOL2TP_AVPTYPE_RESULTCODE, p); /* Attribute type: Result code */
 | 
						|
  PUTSHORT(PPPOL2TP_RESULTCODE, p); /* Attribute value: Result code */
 | 
						|
 | 
						|
  return pppol2tp_udp_send(l2tp, pb);
 | 
						|
}
 | 
						|
 | 
						|
static err_t pppol2tp_xmit(pppol2tp_pcb *l2tp, struct pbuf *pb) {
 | 
						|
  u8_t *p;
 | 
						|
 | 
						|
  /* make room for L2TP header - should not fail */
 | 
						|
  if (pbuf_add_header(pb, PPPOL2TP_OUTPUT_DATA_HEADER_LEN) != 0) {
 | 
						|
    /* bail out */
 | 
						|
    PPPDEBUG(LOG_ERR, ("pppol2tp: pppol2tp_pcb: could not allocate room for L2TP header\n"));
 | 
						|
    LINK_STATS_INC(link.lenerr);
 | 
						|
    ppp_memory_buffer_free(pb);
 | 
						|
    //pbuf_free(pb);
 | 
						|
    return ERR_BUF;
 | 
						|
  }
 | 
						|
 | 
						|
  p = (u8_t*)pb->payload;
 | 
						|
  PUTSHORT(PPPOL2TP_HEADERFLAG_DATA_MANDATORY, p);
 | 
						|
  PUTSHORT(l2tp->source_tunnel_id, p); /* Tunnel Id */
 | 
						|
  PUTSHORT(l2tp->source_session_id, p); /* Session Id */
 | 
						|
 | 
						|
  return pppol2tp_udp_send(l2tp, pb);
 | 
						|
}
 | 
						|
 | 
						|
static err_t pppol2tp_udp_send(pppol2tp_pcb *l2tp, struct pbuf *pb) {
 | 
						|
  err_t err;
 | 
						|
  if (l2tp->netif) {
 | 
						|
    err = udp_sendto_if(l2tp->udp, pb, &l2tp->remote_ip, l2tp->tunnel_port, l2tp->netif);
 | 
						|
  } else {
 | 
						|
    err = udp_sendto(l2tp->udp, pb, &l2tp->remote_ip, l2tp->tunnel_port);
 | 
						|
  }
 | 
						|
  ppp_memory_buffer_free(pb);
 | 
						|
  //pbuf_free(pb);
 | 
						|
  return err;
 | 
						|
}
 | 
						|
 | 
						|
#endif /* PPP_SUPPORT && PPPOL2TP_SUPPORT */
 |