mirror of
https://git.kernel.org/pub/scm/bluetooth/bluez.git
synced 2024-11-23 20:24:21 +08:00
e71d0e8026
When transitioning from Phase 1 to Phase 2 of a network key and we are beaconing, we need to halt the beaconing on the old key version, and begin beaconing on the new key version.
3878 lines
90 KiB
C
3878 lines
90 KiB
C
// SPDX-License-Identifier: LGPL-2.1-or-later
|
|
/*
|
|
*
|
|
* BlueZ - Bluetooth protocol stack for Linux
|
|
*
|
|
* Copyright (C) 2018-2019 Intel Corporation. All rights reserved.
|
|
*
|
|
*
|
|
*/
|
|
|
|
#ifdef HAVE_CONFIG_H
|
|
#include <config.h>
|
|
#endif
|
|
|
|
#define _GNU_SOURCE
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <ell/ell.h>
|
|
|
|
#include "mesh/mesh-defs.h"
|
|
#include "mesh/util.h"
|
|
#include "mesh/crypto.h"
|
|
#include "mesh/net-keys.h"
|
|
#include "mesh/node.h"
|
|
#include "mesh/net.h"
|
|
#include "mesh/mesh-io.h"
|
|
#include "mesh/friend.h"
|
|
#include "mesh/mesh-config.h"
|
|
#include "mesh/model.h"
|
|
#include "mesh/appkey.h"
|
|
#include "mesh/rpl.h"
|
|
|
|
#define abs_diff(a, b) ((a) > (b) ? (a) - (b) : (b) - (a))
|
|
|
|
#define IV_IDX_DIFF_RANGE 42
|
|
|
|
/*#define IV_IDX_UPD_MIN (5 * 60) * 5 minute for Testing */
|
|
#define IV_IDX_UPD_MIN (60 * 60 * 96) /* 96 Hours - per Spec */
|
|
#define IV_IDX_UPD_HOLD (IV_IDX_UPD_MIN/2)
|
|
#define IV_IDX_UPD_MAX (IV_IDX_UPD_MIN + IV_IDX_UPD_HOLD)
|
|
|
|
#define iv_is_updating(net) ((net)->iv_upd_state == IV_UPD_UPDATING)
|
|
|
|
#define IV_UPDATE_SEQ_TRIGGER 0x800000 /* Half of Seq-Nums expended */
|
|
|
|
#define SEG_TO 2
|
|
#define MSG_TO 60
|
|
#define SAR_DEL 10
|
|
|
|
#define DEFAULT_TRANSMIT_COUNT 1
|
|
#define DEFAULT_TRANSMIT_INTERVAL 100
|
|
|
|
#define SAR_KEY(src, seq0) ((((uint32_t)(seq0)) << 16) | (src))
|
|
|
|
#define FAST_CACHE_SIZE 8
|
|
|
|
enum _relay_advice {
|
|
RELAY_NONE, /* Relay not enabled in node */
|
|
RELAY_ALLOWED, /* Relay enabled, msg not to node's unicast */
|
|
RELAY_DISALLOWED, /* Msg was unicast handled by this node */
|
|
RELAY_ALWAYS /* Relay enabled, msg to a group */
|
|
};
|
|
|
|
enum _iv_upd_state {
|
|
/* Allows acceptance of any iv_index secure net beacon */
|
|
IV_UPD_INIT,
|
|
/* Normal, can transition, accept current or old */
|
|
IV_UPD_NORMAL,
|
|
/* Updating proc running, we use old, accept old or new */
|
|
IV_UPD_UPDATING,
|
|
/* Normal, can *not* transition, accept current or old iv_index */
|
|
IV_UPD_NORMAL_HOLD,
|
|
};
|
|
|
|
struct net_key {
|
|
struct mesh_key_set key_set;
|
|
unsigned int beacon_id;
|
|
uint8_t key[16];
|
|
uint8_t beacon_key[16];
|
|
uint8_t network_id[8];
|
|
};
|
|
|
|
struct mesh_subnet {
|
|
struct mesh_net *net;
|
|
uint16_t idx;
|
|
uint32_t net_key_tx;
|
|
uint32_t net_key_cur;
|
|
uint32_t net_key_upd;
|
|
uint8_t key_refresh;
|
|
uint8_t kr_phase;
|
|
};
|
|
|
|
struct mesh_net {
|
|
struct mesh_io *io;
|
|
struct mesh_node *node;
|
|
struct mesh_prov *prov;
|
|
struct l_queue *app_keys;
|
|
unsigned int pkt_id;
|
|
unsigned int bea_id;
|
|
unsigned int beacon_id;
|
|
unsigned int sar_id_next;
|
|
|
|
bool friend_enable;
|
|
bool snb_enable;
|
|
bool mpb_enable;
|
|
bool proxy_enable;
|
|
bool friend_seq;
|
|
struct l_timeout *iv_update_timeout;
|
|
enum _iv_upd_state iv_upd_state;
|
|
|
|
bool iv_update;
|
|
uint32_t instant; /* Controller Instant of recent Rx */
|
|
uint32_t iv_index;
|
|
uint32_t seq_num;
|
|
uint16_t src_addr;
|
|
uint16_t last_addr;
|
|
uint16_t tx_interval;
|
|
uint16_t tx_cnt;
|
|
uint8_t chan; /* Channel of recent Rx */
|
|
uint8_t default_ttl;
|
|
uint8_t tid;
|
|
uint8_t mpb_period;
|
|
|
|
struct {
|
|
bool enable;
|
|
uint16_t interval;
|
|
uint8_t count;
|
|
} relay;
|
|
|
|
/* Heartbeat info */
|
|
struct mesh_net_heartbeat_sub hb_sub;
|
|
struct mesh_net_heartbeat_pub hb_pub;
|
|
uint16_t features;
|
|
|
|
struct l_queue *subnets;
|
|
struct l_queue *msg_cache;
|
|
struct l_queue *replay_cache;
|
|
struct l_queue *sar_in;
|
|
struct l_queue *sar_out;
|
|
struct l_queue *sar_queue;
|
|
struct l_queue *frnd_msgs;
|
|
struct l_queue *friends;
|
|
struct l_queue *negotiations;
|
|
struct l_queue *destinations;
|
|
};
|
|
|
|
struct mesh_msg {
|
|
uint16_t src;
|
|
uint32_t seq;
|
|
uint32_t mic;
|
|
};
|
|
|
|
struct mesh_sar {
|
|
unsigned int id;
|
|
struct l_timeout *seg_timeout;
|
|
struct l_timeout *msg_timeout;
|
|
uint32_t flags;
|
|
uint32_t last_nak;
|
|
uint32_t iv_index;
|
|
uint32_t seqAuth;
|
|
uint16_t seqZero;
|
|
uint16_t app_idx;
|
|
uint16_t net_idx;
|
|
uint16_t src;
|
|
uint16_t remote;
|
|
uint16_t len;
|
|
bool szmic;
|
|
bool segmented;
|
|
bool frnd;
|
|
bool frnd_cred;
|
|
bool delete;
|
|
uint8_t ttl;
|
|
uint8_t last_seg;
|
|
uint8_t key_aid;
|
|
uint8_t buf[4]; /* Large enough for ACK-Flags and MIC */
|
|
};
|
|
|
|
struct mesh_destination {
|
|
uint16_t dst;
|
|
uint16_t ref_cnt;
|
|
};
|
|
|
|
struct net_decode {
|
|
struct mesh_net *net;
|
|
struct mesh_friend *frnd;
|
|
struct mesh_key_set *key_set;
|
|
uint8_t *packet;
|
|
uint32_t iv_index;
|
|
uint8_t size;
|
|
uint8_t nid;
|
|
bool proxy;
|
|
};
|
|
|
|
struct net_queue_data {
|
|
struct mesh_io_recv_info *info;
|
|
struct mesh_net *net;
|
|
const uint8_t *data;
|
|
uint8_t *out;
|
|
size_t out_size;
|
|
enum _relay_advice relay_advice;
|
|
uint32_t net_key_id;
|
|
uint32_t iv_index;
|
|
uint16_t len;
|
|
bool seen;
|
|
};
|
|
|
|
struct oneshot_tx {
|
|
struct mesh_net *net;
|
|
uint16_t interval;
|
|
uint8_t cnt;
|
|
uint8_t size;
|
|
uint8_t packet[30];
|
|
};
|
|
|
|
struct net_beacon_data {
|
|
uint32_t net_key_id;
|
|
uint32_t ivi;
|
|
bool ivu;
|
|
bool kr;
|
|
bool processed;
|
|
bool local;
|
|
};
|
|
|
|
static struct l_queue *fast_cache;
|
|
static struct l_queue *nets;
|
|
|
|
static void net_rx(void *net_ptr, void *user_data);
|
|
|
|
static inline struct mesh_subnet *get_primary_subnet(struct mesh_net *net)
|
|
{
|
|
return l_queue_peek_head(net->subnets);
|
|
}
|
|
|
|
static bool match_key_index(const void *a, const void *b)
|
|
{
|
|
const struct mesh_subnet *subnet = a;
|
|
uint16_t idx = L_PTR_TO_UINT(b);
|
|
|
|
return subnet->idx == idx;
|
|
}
|
|
|
|
static bool match_key_id(const void *a, const void *b)
|
|
{
|
|
const struct mesh_subnet *subnet = a;
|
|
uint32_t net_key_id = L_PTR_TO_UINT(b);
|
|
|
|
return (net_key_id == subnet->net_key_cur) ||
|
|
(net_key_id == subnet->net_key_upd);
|
|
}
|
|
|
|
static bool match_friend_key_id(const void *a, const void *b)
|
|
{
|
|
const struct mesh_friend *friend = a;
|
|
uint32_t net_key_id = L_PTR_TO_UINT(b);
|
|
|
|
return (net_key_id == friend->net_key_cur) ||
|
|
(net_key_id == friend->net_key_upd);
|
|
}
|
|
|
|
static void send_hb_publication(void *data)
|
|
{
|
|
struct mesh_net *net = data;
|
|
struct mesh_net_heartbeat_pub *pub = &net->hb_pub;
|
|
uint8_t msg[4];
|
|
int n = 0;
|
|
|
|
if (pub->dst == UNASSIGNED_ADDRESS)
|
|
return;
|
|
|
|
msg[n++] = NET_OP_HEARTBEAT;
|
|
msg[n++] = pub->ttl;
|
|
l_put_be16(net->features, msg + n);
|
|
n += 2;
|
|
|
|
mesh_net_transport_send(net, 0, 0, mesh_net_get_iv_index(net),
|
|
pub->ttl, 0, 0, pub->dst, msg, n);
|
|
}
|
|
|
|
static void trigger_heartbeat(struct mesh_net *net, uint16_t feature,
|
|
bool enable)
|
|
{
|
|
l_debug("HB: %4.4x --> %d", feature, enable);
|
|
|
|
if (enable) {
|
|
if (net->features & feature)
|
|
return; /* no change */
|
|
|
|
net->features |= feature;
|
|
} else {
|
|
if (!(net->features & feature))
|
|
return; /* no change */
|
|
|
|
net->features &= ~feature;
|
|
}
|
|
|
|
if (!(net->hb_pub.features & feature))
|
|
return; /* no interest in this feature */
|
|
|
|
l_idle_oneshot(send_hb_publication, net, NULL);
|
|
}
|
|
|
|
static bool match_by_friend(const void *a, const void *b)
|
|
{
|
|
const struct mesh_friend *frnd = a;
|
|
uint16_t dst = L_PTR_TO_UINT(b);
|
|
|
|
return frnd->lp_addr == dst;
|
|
}
|
|
|
|
static void free_friend_internals(struct mesh_friend *frnd)
|
|
{
|
|
if (frnd->pkt_cache)
|
|
l_queue_destroy(frnd->pkt_cache, l_free);
|
|
|
|
l_free(frnd->u.active.grp_list);
|
|
frnd->u.active.grp_list = NULL;
|
|
frnd->pkt_cache = NULL;
|
|
|
|
net_key_unref(frnd->net_key_cur);
|
|
net_key_unref(frnd->net_key_upd);
|
|
frnd->net_key_cur = 0;
|
|
frnd->net_key_upd = 0;
|
|
|
|
}
|
|
|
|
static void frnd_kr_phase1(void *a, void *b)
|
|
{
|
|
struct mesh_friend *frnd = a;
|
|
uint32_t net_key_id = L_PTR_TO_UINT(b);
|
|
|
|
frnd->net_key_upd = net_key_frnd_add(net_key_id, frnd->lp_addr,
|
|
frnd->net->src_addr, frnd->lp_cnt, frnd->fn_cnt);
|
|
}
|
|
|
|
static void frnd_kr_phase2(void *a, void *b)
|
|
{
|
|
struct mesh_friend *frnd = a;
|
|
|
|
/*
|
|
* I think that a Friend should use Old Key as long as possible
|
|
* Because a Friend Node will enter Phase 3 before it's LPN.
|
|
* Alternatively, the FN could keep the Old Friend Keys until it
|
|
* receives it's first Poll using the new keys (?)
|
|
*/
|
|
|
|
l_debug("Use Both KeySet %d && %d for %4.4x",
|
|
frnd->net_key_cur, frnd->net_key_upd, frnd->lp_addr);
|
|
}
|
|
|
|
static void frnd_kr_phase3(void *a, void *b)
|
|
{
|
|
struct mesh_friend *frnd = a;
|
|
|
|
l_debug("Replace KeySet %d with %d for %4.4x",
|
|
frnd->net_key_cur, frnd->net_key_upd, frnd->lp_addr);
|
|
net_key_unref(frnd->net_key_cur);
|
|
frnd->net_key_cur = frnd->net_key_upd;
|
|
frnd->net_key_upd = 0;
|
|
}
|
|
|
|
/* TODO: add net key idx? For now, use primary net key */
|
|
struct mesh_friend *mesh_friend_new(struct mesh_net *net, uint16_t dst,
|
|
uint8_t ele_cnt, uint8_t frd,
|
|
uint8_t frw, uint32_t fpt,
|
|
uint16_t fn_cnt, uint16_t lp_cnt)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
struct mesh_friend *frnd = l_queue_find(net->friends,
|
|
match_by_friend, L_UINT_TO_PTR(dst));
|
|
|
|
if (frnd) {
|
|
/* Kill all timers and empty cache for this friend */
|
|
free_friend_internals(frnd);
|
|
l_timeout_remove(frnd->timeout);
|
|
frnd->timeout = NULL;
|
|
} else {
|
|
frnd = l_new(struct mesh_friend, 1);
|
|
l_queue_push_head(net->friends, frnd);
|
|
}
|
|
|
|
/* add _k2 */
|
|
frnd->net = net;
|
|
frnd->lp_addr = dst;
|
|
frnd->frd = frd;
|
|
frnd->frw = frw;
|
|
frnd->fn_cnt = fn_cnt;
|
|
frnd->lp_cnt = lp_cnt;
|
|
frnd->poll_timeout = fpt;
|
|
frnd->ele_cnt = ele_cnt;
|
|
frnd->pkt_cache = l_queue_new();
|
|
frnd->net_key_upd = 0;
|
|
|
|
subnet = get_primary_subnet(net);
|
|
/* TODO: the primary key must be present, do we need to add check?. */
|
|
|
|
frnd->net_key_cur = net_key_frnd_add(subnet->net_key_cur, dst,
|
|
net->src_addr, lp_cnt, fn_cnt);
|
|
|
|
if (!subnet->net_key_upd)
|
|
return frnd;
|
|
|
|
frnd->net_idx = subnet->idx;
|
|
frnd->net_key_upd = net_key_frnd_add(subnet->net_key_upd, dst,
|
|
net->src_addr, lp_cnt, fn_cnt);
|
|
|
|
return frnd;
|
|
}
|
|
|
|
void mesh_friend_free(void *data)
|
|
{
|
|
struct mesh_friend *frnd = data;
|
|
|
|
free_friend_internals(frnd);
|
|
l_timeout_remove(frnd->timeout);
|
|
l_free(frnd);
|
|
}
|
|
|
|
bool mesh_friend_clear(struct mesh_net *net, struct mesh_friend *frnd)
|
|
{
|
|
bool removed = l_queue_remove(net->friends, frnd);
|
|
|
|
free_friend_internals(frnd);
|
|
|
|
return removed;
|
|
}
|
|
|
|
void mesh_friend_sub_add(struct mesh_net *net, uint16_t lpn, uint8_t ele_cnt,
|
|
uint8_t grp_cnt, const uint8_t *list)
|
|
{
|
|
uint16_t *new_list;
|
|
uint16_t *grp_list;
|
|
struct mesh_friend *frnd = l_queue_find(net->friends,
|
|
match_by_friend,
|
|
L_UINT_TO_PTR(lpn));
|
|
if (!frnd)
|
|
return;
|
|
|
|
new_list = l_malloc((grp_cnt +
|
|
frnd->u.active.grp_cnt) * sizeof(uint16_t));
|
|
grp_list = frnd->u.active.grp_list;
|
|
|
|
if (grp_list && frnd->u.active.grp_cnt)
|
|
memcpy(new_list, grp_list,
|
|
frnd->u.active.grp_cnt * sizeof(uint16_t));
|
|
|
|
memcpy(&new_list[frnd->u.active.grp_cnt], list,
|
|
grp_cnt * sizeof(uint16_t));
|
|
l_free(grp_list);
|
|
frnd->ele_cnt = ele_cnt;
|
|
frnd->u.active.grp_list = new_list;
|
|
frnd->u.active.grp_cnt += grp_cnt;
|
|
}
|
|
|
|
void mesh_friend_sub_del(struct mesh_net *net, uint16_t lpn, uint8_t cnt,
|
|
const uint8_t *del_list)
|
|
{
|
|
uint16_t *grp_list;
|
|
int16_t i, grp_cnt;
|
|
size_t cnt16 = cnt * sizeof(uint16_t);
|
|
struct mesh_friend *frnd = l_queue_find(net->friends, match_by_friend,
|
|
L_UINT_TO_PTR(lpn));
|
|
if (!frnd)
|
|
return;
|
|
|
|
grp_cnt = frnd->u.active.grp_cnt;
|
|
grp_list = frnd->u.active.grp_list;
|
|
|
|
while (cnt-- && grp_cnt) {
|
|
cnt16 -= sizeof(uint16_t);
|
|
for (i = grp_cnt - 1; i >= 0; i--) {
|
|
if (l_get_le16(del_list + cnt16) == grp_list[i]) {
|
|
grp_cnt--;
|
|
memcpy(&grp_list[i], &grp_list[i + 1],
|
|
(grp_cnt - i) * sizeof(uint16_t));
|
|
break;
|
|
}
|
|
}
|
|
}
|
|
|
|
frnd->u.active.grp_cnt = grp_cnt;
|
|
|
|
if (!grp_cnt) {
|
|
l_free(frnd->u.active.grp_list);
|
|
frnd->u.active.grp_list = NULL;
|
|
}
|
|
}
|
|
|
|
uint32_t mesh_net_next_seq_num(struct mesh_net *net)
|
|
{
|
|
uint32_t seq = net->seq_num++;
|
|
|
|
/*
|
|
* Cap out-of-range seq_num max value to +1. Out of range
|
|
* seq_nums will not be sent as they would violate spec.
|
|
* This condition signals a runaway seq_num condition, and
|
|
* the node must wait for a completed IV Index update procedure
|
|
* before it can send again.
|
|
*/
|
|
if (net->seq_num > SEQ_MASK)
|
|
net->seq_num = SEQ_MASK + 1;
|
|
|
|
node_set_sequence_number(net->node, net->seq_num);
|
|
return seq;
|
|
}
|
|
|
|
static struct mesh_sar *mesh_sar_new(size_t len)
|
|
{
|
|
size_t size = sizeof(struct mesh_sar) + len;
|
|
struct mesh_sar *sar;
|
|
|
|
sar = l_malloc(size);
|
|
memset(sar, 0, size);
|
|
return sar;
|
|
}
|
|
|
|
static void mesh_sar_free(void *data)
|
|
{
|
|
struct mesh_sar *sar = data;
|
|
|
|
if (!sar)
|
|
return;
|
|
|
|
l_timeout_remove(sar->seg_timeout);
|
|
l_timeout_remove(sar->msg_timeout);
|
|
l_free(sar);
|
|
}
|
|
|
|
static void subnet_free(void *data)
|
|
{
|
|
struct mesh_subnet *subnet = data;
|
|
struct mesh_net *net = subnet->net;
|
|
|
|
if (net->snb_enable)
|
|
net_key_beacon_disable(subnet->net_key_tx, false);
|
|
|
|
if (net->mpb_enable)
|
|
net_key_beacon_disable(subnet->net_key_tx, true);
|
|
|
|
net_key_unref(subnet->net_key_cur);
|
|
net_key_unref(subnet->net_key_upd);
|
|
l_free(subnet);
|
|
}
|
|
|
|
static struct mesh_subnet *subnet_new(struct mesh_net *net, uint16_t idx)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
subnet = l_new(struct mesh_subnet, 1);
|
|
if (!subnet)
|
|
return NULL;
|
|
|
|
subnet->net = net;
|
|
subnet->idx = idx;
|
|
return subnet;
|
|
}
|
|
|
|
static void enable_snb(void *a, void *b)
|
|
{
|
|
struct mesh_subnet *subnet = a;
|
|
struct mesh_net *net = b;
|
|
|
|
if (net->snb_enable)
|
|
net_key_beacon_enable(subnet->net_key_tx, false, 0);
|
|
else
|
|
net_key_beacon_disable(subnet->net_key_tx, false);
|
|
}
|
|
|
|
static void enable_mpb(void *a, void *b)
|
|
{
|
|
struct mesh_subnet *subnet = a;
|
|
struct mesh_net *net = b;
|
|
|
|
if (net->mpb_enable)
|
|
net_key_beacon_enable(subnet->net_key_tx, true,
|
|
net->mpb_period);
|
|
else
|
|
net_key_beacon_disable(subnet->net_key_tx, true);
|
|
}
|
|
|
|
static void enqueue_update(void *a, void *b);
|
|
|
|
static void queue_friend_update(struct mesh_net *net)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
struct mesh_friend *frnd;
|
|
uint8_t flags = 0;
|
|
|
|
if (l_queue_length(net->friends)) {
|
|
struct mesh_friend_msg update = {
|
|
.src = net->src_addr,
|
|
.iv_index = mesh_net_get_iv_index(net),
|
|
.last_len = 7,
|
|
.ctl = true,
|
|
};
|
|
|
|
frnd = l_queue_peek_head(net->friends);
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(frnd->net_idx));
|
|
|
|
if (!subnet)
|
|
return;
|
|
|
|
if (subnet->kr_phase == KEY_REFRESH_PHASE_TWO)
|
|
flags |= KEY_REFRESH;
|
|
|
|
if (net->iv_update)
|
|
flags |= IV_INDEX_UPDATE;
|
|
|
|
update.u.one[0].hdr = NET_OP_FRND_UPDATE << OPCODE_HDR_SHIFT;
|
|
update.u.one[0].seq = mesh_net_next_seq_num(net);
|
|
update.u.one[0].data[0] = NET_OP_FRND_UPDATE;
|
|
update.u.one[0].data[1] = flags;
|
|
l_put_be32(net->iv_index, update.u.one[0].data + 2);
|
|
update.u.one[0].data[6] = 0x01; /* More Data */
|
|
|
|
l_queue_foreach(net->friends, enqueue_update, &update);
|
|
}
|
|
}
|
|
|
|
static void refresh_beacon(void *a, void *b)
|
|
{
|
|
struct mesh_subnet *subnet = a;
|
|
struct mesh_net *net = b;
|
|
|
|
net_key_beacon_refresh(subnet->net_key_tx, net->iv_index,
|
|
!!(subnet->kr_phase == KEY_REFRESH_PHASE_TWO), net->iv_update,
|
|
false);
|
|
}
|
|
|
|
struct mesh_net *mesh_net_new(struct mesh_node *node)
|
|
{
|
|
struct mesh_net *net;
|
|
|
|
net = l_new(struct mesh_net, 1);
|
|
|
|
net->node = node;
|
|
net->seq_num = DEFAULT_SEQUENCE_NUMBER;
|
|
net->default_ttl = TTL_MASK;
|
|
|
|
net->tx_cnt = DEFAULT_TRANSMIT_COUNT;
|
|
net->tx_interval = DEFAULT_TRANSMIT_INTERVAL;
|
|
|
|
net->subnets = l_queue_new();
|
|
net->msg_cache = l_queue_new();
|
|
net->sar_in = l_queue_new();
|
|
net->sar_out = l_queue_new();
|
|
net->sar_queue = l_queue_new();
|
|
net->frnd_msgs = l_queue_new();
|
|
net->destinations = l_queue_new();
|
|
net->app_keys = l_queue_new();
|
|
net->replay_cache = l_queue_new();
|
|
|
|
if (!nets)
|
|
nets = l_queue_new();
|
|
|
|
if (!fast_cache)
|
|
fast_cache = l_queue_new();
|
|
|
|
return net;
|
|
}
|
|
|
|
void mesh_net_free(void *user_data)
|
|
{
|
|
struct mesh_net *net = user_data;
|
|
|
|
if (!net)
|
|
return;
|
|
|
|
l_queue_destroy(net->subnets, subnet_free);
|
|
l_queue_destroy(net->msg_cache, l_free);
|
|
l_queue_destroy(net->replay_cache, l_free);
|
|
l_queue_destroy(net->sar_in, mesh_sar_free);
|
|
l_queue_destroy(net->sar_out, mesh_sar_free);
|
|
l_queue_destroy(net->sar_queue, mesh_sar_free);
|
|
l_queue_destroy(net->frnd_msgs, l_free);
|
|
l_queue_destroy(net->friends, mesh_friend_free);
|
|
l_queue_destroy(net->negotiations, mesh_friend_free);
|
|
l_queue_destroy(net->destinations, l_free);
|
|
l_queue_destroy(net->app_keys, appkey_key_free);
|
|
|
|
l_free(net);
|
|
}
|
|
|
|
void mesh_net_cleanup(void)
|
|
{
|
|
l_queue_destroy(fast_cache, l_free);
|
|
fast_cache = NULL;
|
|
l_queue_destroy(nets, mesh_net_free);
|
|
nets = NULL;
|
|
}
|
|
|
|
bool mesh_net_set_seq_num(struct mesh_net *net, uint32_t seq)
|
|
{
|
|
if (!net)
|
|
return false;
|
|
|
|
net->seq_num = seq;
|
|
node_set_sequence_number(net->node, net->seq_num);
|
|
|
|
return true;
|
|
}
|
|
|
|
bool mesh_net_set_default_ttl(struct mesh_net *net, uint8_t ttl)
|
|
{
|
|
if (!net)
|
|
return false;
|
|
|
|
net->default_ttl = ttl;
|
|
|
|
return true;
|
|
}
|
|
|
|
uint32_t mesh_net_get_seq_num(struct mesh_net *net)
|
|
{
|
|
if (!net)
|
|
return 0;
|
|
|
|
return net->seq_num;
|
|
}
|
|
|
|
uint8_t mesh_net_get_default_ttl(struct mesh_net *net)
|
|
{
|
|
if (!net)
|
|
return 0;
|
|
|
|
return net->default_ttl;
|
|
}
|
|
|
|
uint16_t mesh_net_get_address(struct mesh_net *net)
|
|
{
|
|
if (!net)
|
|
return 0;
|
|
|
|
return net->src_addr;
|
|
}
|
|
|
|
bool mesh_net_register_unicast(struct mesh_net *net,
|
|
uint16_t address, uint8_t num_ele)
|
|
{
|
|
if (!net || !IS_UNICAST(address) || !num_ele)
|
|
return false;
|
|
|
|
net->src_addr = address;
|
|
net->last_addr = address + num_ele - 1;
|
|
if (net->last_addr < net->src_addr)
|
|
return false;
|
|
|
|
do {
|
|
mesh_net_dst_reg(net, address);
|
|
address++;
|
|
num_ele--;
|
|
} while (num_ele > 0);
|
|
|
|
return true;
|
|
}
|
|
|
|
bool mesh_net_set_proxy_mode(struct mesh_net *net, bool enable)
|
|
{
|
|
if (!net)
|
|
return false;
|
|
|
|
/* No support for proxy yet */
|
|
if (enable) {
|
|
l_error("Proxy not supported!");
|
|
return false;
|
|
}
|
|
|
|
trigger_heartbeat(net, FEATURE_PROXY, enable);
|
|
return true;
|
|
}
|
|
|
|
bool mesh_net_set_friend_mode(struct mesh_net *net, bool enable)
|
|
{
|
|
l_debug("mesh_net_set_friend_mode - %d", enable);
|
|
|
|
if (!net)
|
|
return false;
|
|
|
|
if (net->friend_enable == enable)
|
|
return true;
|
|
|
|
if (enable) {
|
|
net->friends = l_queue_new();
|
|
net->negotiations = l_queue_new();
|
|
} else {
|
|
l_queue_destroy(net->friends, mesh_friend_free);
|
|
l_queue_destroy(net->negotiations, mesh_friend_free);
|
|
net->friends = net->negotiations = NULL;
|
|
}
|
|
|
|
net->friend_enable = enable;
|
|
trigger_heartbeat(net, FEATURE_FRIEND, enable);
|
|
return true;
|
|
}
|
|
|
|
bool mesh_net_set_relay_mode(struct mesh_net *net, bool enable,
|
|
uint8_t cnt, uint8_t interval)
|
|
{
|
|
if (!net)
|
|
return false;
|
|
|
|
net->relay.enable = enable;
|
|
net->relay.count = cnt;
|
|
net->relay.interval = interval;
|
|
trigger_heartbeat(net, FEATURE_RELAY, enable);
|
|
return true;
|
|
}
|
|
|
|
int mesh_net_get_identity_mode(struct mesh_net *net, uint16_t idx,
|
|
uint8_t *mode)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
if (!net)
|
|
return MESH_STATUS_UNSPECIFIED_ERROR;
|
|
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(idx));
|
|
if (!subnet)
|
|
return MESH_STATUS_INVALID_NETKEY;
|
|
|
|
/* Currently, proxy mode is not supported */
|
|
*mode = MESH_MODE_UNSUPPORTED;
|
|
|
|
return MESH_STATUS_SUCCESS;
|
|
}
|
|
|
|
int mesh_net_del_key(struct mesh_net *net, uint16_t idx)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
if (!net)
|
|
return MESH_STATUS_UNSPECIFIED_ERROR;
|
|
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(idx));
|
|
if (!subnet)
|
|
return MESH_STATUS_SUCCESS;
|
|
|
|
/* Cannot remove primary key */
|
|
if (l_queue_length(net->subnets) <= 1)
|
|
return MESH_STATUS_CANNOT_REMOVE;
|
|
|
|
/* Delete associated app keys */
|
|
appkey_delete_bound_keys(net, idx);
|
|
|
|
/* Disable hearbeat publication on this subnet */
|
|
if (idx == net->hb_pub.net_idx)
|
|
net->hb_pub.dst = UNASSIGNED_ADDRESS;
|
|
|
|
/* TODO: cancel snb_enable on this subnet */
|
|
|
|
l_queue_remove(net->subnets, subnet);
|
|
subnet_free(subnet);
|
|
|
|
if (!mesh_config_net_key_del(node_config_get(net->node), idx))
|
|
return MESH_STATUS_STORAGE_FAIL;
|
|
|
|
return MESH_STATUS_SUCCESS;
|
|
}
|
|
|
|
static struct mesh_subnet *add_key(struct mesh_net *net, uint16_t idx,
|
|
const uint8_t *value)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
subnet = subnet_new(net, idx);
|
|
if (!subnet)
|
|
return NULL;
|
|
|
|
subnet->net_key_tx = subnet->net_key_cur = net_key_add(value);
|
|
if (!subnet->net_key_cur) {
|
|
l_free(subnet);
|
|
return NULL;
|
|
}
|
|
|
|
net_key_beacon_refresh(subnet->net_key_tx, net->iv_index,
|
|
false, net->iv_update, false);
|
|
|
|
if (net->snb_enable)
|
|
net_key_beacon_enable(subnet->net_key_tx, false, 0);
|
|
|
|
if (net->mpb_enable)
|
|
net_key_beacon_enable(subnet->net_key_tx, true,
|
|
net->mpb_period);
|
|
|
|
l_queue_push_tail(net->subnets, subnet);
|
|
|
|
return subnet;
|
|
}
|
|
|
|
/*
|
|
* This function is called when Configuration Server Model receives
|
|
* a NETKEY_ADD command
|
|
*/
|
|
int mesh_net_add_key(struct mesh_net *net, uint16_t idx, const uint8_t *value)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(idx));
|
|
|
|
if (subnet) {
|
|
if (net_key_confirm(subnet->net_key_cur, value))
|
|
return MESH_STATUS_SUCCESS;
|
|
else
|
|
return MESH_STATUS_IDX_ALREADY_STORED;
|
|
}
|
|
|
|
subnet = add_key(net, idx, value);
|
|
if (!subnet)
|
|
return MESH_STATUS_INSUFF_RESOURCES;
|
|
|
|
if (!mesh_config_net_key_add(node_config_get(net->node), idx, value)) {
|
|
l_queue_remove(net->subnets, subnet);
|
|
subnet_free(subnet);
|
|
return MESH_STATUS_STORAGE_FAIL;
|
|
}
|
|
|
|
return MESH_STATUS_SUCCESS;
|
|
}
|
|
|
|
uint32_t mesh_net_get_iv_index(struct mesh_net *net)
|
|
{
|
|
if (!net)
|
|
return 0xffffffff;
|
|
|
|
return net->iv_index - net->iv_update;
|
|
}
|
|
|
|
/* TODO: net key index? */
|
|
void mesh_net_get_snb_state(struct mesh_net *net, uint8_t *flags,
|
|
uint32_t *iv_index)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
if (!net || !flags || !iv_index)
|
|
return;
|
|
|
|
*iv_index = net->iv_index;
|
|
*flags = net->iv_update ? IV_INDEX_UPDATE : 0x00;
|
|
|
|
subnet = get_primary_subnet(net);
|
|
if (subnet)
|
|
*flags |= subnet->key_refresh ? KEY_REFRESH : 0x00;
|
|
}
|
|
|
|
bool mesh_net_get_key(struct mesh_net *net, bool new_key, uint16_t idx,
|
|
uint32_t *net_key_id)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
if (!net)
|
|
return false;
|
|
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(idx));
|
|
if (!subnet)
|
|
return false;
|
|
|
|
if (!new_key) {
|
|
*net_key_id = subnet->net_key_cur;
|
|
return true;
|
|
}
|
|
|
|
if (!subnet->net_key_upd)
|
|
return false;
|
|
|
|
*net_key_id = subnet->net_key_upd;
|
|
return true;
|
|
}
|
|
|
|
bool mesh_net_key_list_get(struct mesh_net *net, uint8_t *buf, uint16_t *size)
|
|
{
|
|
const struct l_queue_entry *entry;
|
|
uint16_t num_keys, req_size, buf_size;
|
|
struct mesh_subnet *subnet;
|
|
|
|
if (!net || !buf || !size)
|
|
return false;
|
|
|
|
buf_size = *size;
|
|
|
|
num_keys = l_queue_length(net->subnets);
|
|
req_size = (num_keys / 2) * 3 + (num_keys % 2) * 2;
|
|
|
|
if (buf_size < req_size)
|
|
return false;
|
|
|
|
*size = req_size;
|
|
|
|
/* Pack NetKey indices in 3 octets */
|
|
for (entry = l_queue_get_entries(net->subnets); num_keys > 1;) {
|
|
uint32_t idx_pair;
|
|
|
|
subnet = entry->data;
|
|
idx_pair = subnet->idx;
|
|
idx_pair <<= 12;
|
|
|
|
subnet = entry->next->data;
|
|
idx_pair += subnet->idx;
|
|
|
|
l_put_le32(idx_pair, buf);
|
|
buf += 3;
|
|
|
|
num_keys -= 2;
|
|
entry = entry->next->next;
|
|
}
|
|
|
|
/* If odd number of NetKeys, fill in the end of the buffer */
|
|
if (num_keys % 2) {
|
|
subnet = entry->data;
|
|
l_put_le16(subnet->idx, buf);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
bool mesh_net_get_frnd_seq(struct mesh_net *net)
|
|
{
|
|
if (!net)
|
|
return false;
|
|
|
|
return net->friend_seq;
|
|
}
|
|
|
|
void mesh_net_set_frnd_seq(struct mesh_net *net, bool seq)
|
|
{
|
|
if (!net)
|
|
return;
|
|
|
|
net->friend_seq = seq;
|
|
}
|
|
|
|
static bool match_cache(const void *a, const void *b)
|
|
{
|
|
const struct mesh_msg *msg = a;
|
|
const struct mesh_msg *tst = b;
|
|
|
|
if (msg->seq != tst->seq || msg->mic != tst->mic ||
|
|
msg->src != tst->src)
|
|
return false;
|
|
|
|
return true;
|
|
}
|
|
|
|
static bool msg_in_cache(struct mesh_net *net, uint16_t src, uint32_t seq,
|
|
uint32_t mic)
|
|
{
|
|
struct mesh_msg *msg;
|
|
struct mesh_msg tst = {
|
|
.src = src,
|
|
.seq = seq,
|
|
.mic = mic,
|
|
};
|
|
|
|
msg = l_queue_find(net->msg_cache, match_cache, &tst);
|
|
|
|
if (msg) {
|
|
l_debug("Supressing duplicate %4.4x + %6.6x + %8.8x",
|
|
src, seq, mic);
|
|
return true;
|
|
}
|
|
|
|
msg = l_new(struct mesh_msg, 1);
|
|
*msg = tst;
|
|
l_queue_push_head(net->msg_cache, msg);
|
|
l_debug("Add %4.4x + %6.6x + %8.8x", src, seq, mic);
|
|
|
|
if (l_queue_length(net->msg_cache) > MSG_CACHE_SIZE) {
|
|
msg = l_queue_peek_tail(net->msg_cache);
|
|
/* Remove Tail (oldest msg in cache) */
|
|
l_debug("Remove %4.4x + %6.6x + %8.8x",
|
|
msg->src, msg->seq, msg->mic);
|
|
if (l_queue_remove(net->msg_cache, msg))
|
|
l_free(msg);
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static bool match_sar_seq0(const void *a, const void *b)
|
|
{
|
|
const struct mesh_sar *sar = a;
|
|
uint16_t seqZero = L_PTR_TO_UINT(b);
|
|
|
|
return sar->seqZero == seqZero;
|
|
}
|
|
|
|
static bool match_sar_remote(const void *a, const void *b)
|
|
{
|
|
const struct mesh_sar *sar = a;
|
|
uint16_t remote = L_PTR_TO_UINT(b);
|
|
|
|
return sar->remote == remote;
|
|
}
|
|
|
|
static bool match_msg_timeout(const void *a, const void *b)
|
|
{
|
|
const struct mesh_sar *sar = a;
|
|
const struct l_timeout *msg_timeout = b;
|
|
|
|
return sar->msg_timeout == msg_timeout;
|
|
}
|
|
|
|
static bool match_seg_timeout(const void *a, const void *b)
|
|
{
|
|
const struct mesh_sar *sar = a;
|
|
const struct l_timeout *seg_timeout = b;
|
|
|
|
return sar->seg_timeout == seg_timeout;
|
|
}
|
|
|
|
static bool match_dest_dst(const void *a, const void *b)
|
|
{
|
|
const struct mesh_destination *dest = a;
|
|
uint16_t dst = L_PTR_TO_UINT(b);
|
|
|
|
return dst == dest->dst;
|
|
}
|
|
|
|
static bool match_frnd_dst(const void *a, const void *b)
|
|
{
|
|
const struct mesh_friend *frnd = a;
|
|
uint16_t dst = L_PTR_TO_UINT(b);
|
|
int16_t i, grp_cnt = frnd->u.active.grp_cnt;
|
|
uint16_t *grp_list = frnd->u.active.grp_list;
|
|
|
|
/*
|
|
* Determine if this message is for this friends unicast
|
|
* address, and/or one of it's group/virtual addresses
|
|
*/
|
|
if (dst >= frnd->lp_addr && dst < (frnd->lp_addr + frnd->ele_cnt))
|
|
return true;
|
|
|
|
if (!(dst & 0x8000))
|
|
return false;
|
|
|
|
for (i = 0; i < grp_cnt; i++) {
|
|
if (dst == grp_list[i])
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static bool is_lpn_friend(struct mesh_net *net, uint16_t addr)
|
|
{
|
|
void *tst;
|
|
|
|
tst = l_queue_find(net->friends, match_frnd_dst, L_UINT_TO_PTR(addr));
|
|
|
|
return tst != NULL;
|
|
}
|
|
|
|
static bool is_us(struct mesh_net *net, uint16_t addr, bool src)
|
|
{
|
|
void *tst;
|
|
|
|
if (IS_ALL_NODES(addr))
|
|
return true;
|
|
|
|
if (addr == FRIENDS_ADDRESS)
|
|
return net->friend_enable;
|
|
|
|
if (addr == RELAYS_ADDRESS)
|
|
return net->relay.enable;
|
|
|
|
if (addr == PROXIES_ADDRESS)
|
|
return net->proxy_enable;
|
|
|
|
if (addr >= net->src_addr && addr <= net->last_addr)
|
|
return true;
|
|
|
|
tst = l_queue_find(net->destinations, match_dest_dst,
|
|
L_UINT_TO_PTR(addr));
|
|
|
|
if (tst == NULL && !src)
|
|
tst = l_queue_find(net->friends, match_frnd_dst,
|
|
L_UINT_TO_PTR(addr));
|
|
|
|
return tst != NULL;
|
|
}
|
|
|
|
static struct mesh_friend_msg *mesh_friend_msg_new(uint8_t seg_max)
|
|
{
|
|
struct mesh_friend_msg *frnd_msg;
|
|
|
|
if (seg_max) {
|
|
size_t size = sizeof(struct mesh_friend_msg) -
|
|
sizeof(struct mesh_friend_seg_one);
|
|
|
|
size += (seg_max + 1) * sizeof(struct mesh_friend_seg_12);
|
|
frnd_msg = l_malloc(size);
|
|
memset(frnd_msg, 0, size);
|
|
} else
|
|
frnd_msg = l_new(struct mesh_friend_msg, 1);
|
|
|
|
|
|
return frnd_msg;
|
|
}
|
|
|
|
|
|
static bool match_ack(const void *a, const void *b)
|
|
{
|
|
const struct mesh_friend_msg *old = a;
|
|
const struct mesh_friend_msg *rx = b;
|
|
uint32_t old_hdr;
|
|
uint32_t new_hdr;
|
|
|
|
/* Determine if old pkt is ACK to same SAR message that new ACK is */
|
|
if (!old->ctl || old->src != rx->src)
|
|
return false;
|
|
|
|
/* Check the quickest items first before digging deeper */
|
|
old_hdr = old->u.one[0].hdr & HDR_ACK_MASK;
|
|
new_hdr = rx->u.one[0].hdr & HDR_ACK_MASK;
|
|
|
|
return old_hdr == new_hdr;
|
|
}
|
|
|
|
static void enqueue_friend_pkt(void *a, void *b)
|
|
{
|
|
struct mesh_friend *frnd = a;
|
|
struct mesh_friend_msg *pkt, *rx = b;
|
|
size_t size;
|
|
int16_t i;
|
|
|
|
if (rx->done)
|
|
return;
|
|
|
|
/*
|
|
* Determine if this message is for this friends unicast
|
|
* address, and/or one of it's group/virtual addresses
|
|
*/
|
|
if (rx->dst >= frnd->lp_addr && (rx->dst - frnd->lp_addr) <
|
|
frnd->ele_cnt) {
|
|
rx->done = true;
|
|
goto enqueue;
|
|
}
|
|
|
|
if (!(rx->dst & 0x8000))
|
|
return;
|
|
|
|
if (!IS_ALL_NODES(rx->dst)) {
|
|
for (i = 0; i < frnd->u.active.grp_cnt; i++) {
|
|
if (rx->dst == frnd->u.active.grp_list[i])
|
|
goto enqueue;
|
|
}
|
|
return;
|
|
}
|
|
|
|
enqueue:
|
|
/* Special handling for Seg Ack -- Only one per message queue */
|
|
if (((rx->u.one[0].hdr >> OPCODE_HDR_SHIFT) & OPCODE_MASK) ==
|
|
NET_OP_SEG_ACKNOWLEDGE) {
|
|
void *old_head = l_queue_peek_head(frnd->pkt_cache);
|
|
/* Suppress duplicate ACKs */
|
|
do {
|
|
void *old = l_queue_remove_if(frnd->pkt_cache,
|
|
match_ack, rx);
|
|
|
|
if (!old)
|
|
break;
|
|
|
|
if (old_head == old)
|
|
/*
|
|
* If we are discarding head for any
|
|
* reason, reset FRND SEQ
|
|
*/
|
|
frnd->u.active.last = frnd->u.active.seq;
|
|
|
|
l_free(old);
|
|
|
|
} while (true);
|
|
}
|
|
|
|
l_debug("%s for %4.4x from %4.4x ttl: %2.2x (seq: %6.6x) (ctl: %d)",
|
|
__func__, frnd->lp_addr, rx->src, rx->ttl,
|
|
rx->u.one[0].seq, rx->ctl);
|
|
|
|
if (rx->cnt_in) {
|
|
size = sizeof(struct mesh_friend_msg) -
|
|
sizeof(struct mesh_friend_seg_one);
|
|
size += (rx->cnt_in + 1) * sizeof(struct mesh_friend_seg_12);
|
|
} else
|
|
size = sizeof(struct mesh_friend_msg);
|
|
|
|
pkt = l_malloc(size);
|
|
memcpy(pkt, rx, size);
|
|
|
|
l_queue_push_tail(frnd->pkt_cache, pkt);
|
|
|
|
if (l_queue_length(frnd->pkt_cache) > FRND_CACHE_MAX) {
|
|
/*
|
|
* TODO: Guard against popping UPDATE packets
|
|
* (disallowed per spec)
|
|
*/
|
|
pkt = l_queue_pop_head(frnd->pkt_cache);
|
|
l_free(pkt);
|
|
frnd->u.active.last = frnd->u.active.seq;
|
|
}
|
|
}
|
|
|
|
static void enqueue_update(void *a, void *b)
|
|
{
|
|
struct mesh_friend *frnd = a;
|
|
struct mesh_friend_msg *pkt = b;
|
|
|
|
pkt->dst = frnd->lp_addr;
|
|
pkt->done = false;
|
|
enqueue_friend_pkt(frnd, pkt);
|
|
}
|
|
|
|
static uint32_t seq_auth(uint32_t seq, uint16_t seqZero)
|
|
{
|
|
uint32_t seqAuth = seqZero & SEQ_ZERO_MASK;
|
|
|
|
seqAuth |= seq & (~SEQ_ZERO_MASK);
|
|
if (seqAuth > seq)
|
|
seqAuth -= (SEQ_ZERO_MASK + 1);
|
|
|
|
return seqAuth;
|
|
}
|
|
|
|
static bool friend_packet_queue(struct mesh_net *net,
|
|
uint32_t iv_index,
|
|
bool ctl, uint8_t ttl,
|
|
uint32_t seq,
|
|
uint16_t src, uint16_t dst,
|
|
uint32_t hdr,
|
|
const uint8_t *data, uint16_t size)
|
|
{
|
|
struct mesh_friend_msg *frnd_msg;
|
|
uint8_t seg_max = SEG_TOTAL(hdr);
|
|
bool ret;
|
|
|
|
if (seg_max && !IS_SEGMENTED(hdr))
|
|
return false;
|
|
|
|
frnd_msg = mesh_friend_msg_new(seg_max);
|
|
|
|
if (IS_SEGMENTED(hdr)) {
|
|
uint32_t seqAuth = seq_auth(seq, hdr >> SEQ_ZERO_HDR_SHIFT);
|
|
uint8_t i;
|
|
|
|
for (i = 0; i <= seg_max; i++) {
|
|
memcpy(frnd_msg->u.s12[i].data, data, 12);
|
|
frnd_msg->u.s12[i].hdr = hdr;
|
|
frnd_msg->u.s12[i].seq = seqAuth + i;
|
|
data += 12;
|
|
hdr += (1 << SEGO_HDR_SHIFT);
|
|
}
|
|
|
|
frnd_msg->cnt_in = seg_max;
|
|
frnd_msg->last_len = size % 12;
|
|
if (!frnd_msg->last_len)
|
|
frnd_msg->last_len = 12;
|
|
} else {
|
|
uint8_t opcode = hdr >> OPCODE_HDR_SHIFT;
|
|
|
|
if (ctl && opcode != NET_OP_SEG_ACKNOWLEDGE) {
|
|
|
|
/* Don't cache Friend Ctl opcodes */
|
|
if (FRND_OPCODE(opcode)) {
|
|
l_free(frnd_msg);
|
|
return false;
|
|
}
|
|
|
|
memcpy(frnd_msg->u.one[0].data + 1, data, size);
|
|
frnd_msg->last_len = size + 1;
|
|
frnd_msg->u.one[0].data[0] = opcode;
|
|
} else {
|
|
memcpy(frnd_msg->u.one[0].data, data, size);
|
|
frnd_msg->last_len = size;
|
|
}
|
|
|
|
frnd_msg->u.one[0].hdr = hdr;
|
|
frnd_msg->u.one[0].seq = seq;
|
|
}
|
|
|
|
frnd_msg->iv_index = iv_index;
|
|
frnd_msg->src = src;
|
|
frnd_msg->dst = dst;
|
|
frnd_msg->ctl = ctl;
|
|
frnd_msg->ttl = ttl;
|
|
|
|
/* Re-Package into Friend Delivery payload */
|
|
l_queue_foreach(net->friends, enqueue_friend_pkt, frnd_msg);
|
|
ret = frnd_msg->done;
|
|
|
|
/* TODO Optimization(?): Unicast messages keep this buffer */
|
|
l_free(frnd_msg);
|
|
|
|
return ret;
|
|
}
|
|
|
|
static void friend_ack_rxed(struct mesh_net *net, uint32_t iv_index,
|
|
uint32_t seq,
|
|
uint16_t src, uint16_t dst,
|
|
const uint8_t *pkt)
|
|
{
|
|
uint32_t hdr = l_get_be32(pkt) &
|
|
((SEQ_ZERO_MASK << SEQ_ZERO_HDR_SHIFT) | /* Preserve SeqZero */
|
|
((uint32_t) 0x01 << RELAY_HDR_SHIFT)); /* Preserve Relay bit */
|
|
uint32_t flags = l_get_be32(pkt + 3);
|
|
struct mesh_friend_msg frnd_ack = {
|
|
.ctl = true,
|
|
.iv_index = iv_index,
|
|
.src = src,
|
|
.dst = dst,
|
|
.last_len = sizeof(flags),
|
|
.u.one[0].seq = seq,
|
|
.done = false,
|
|
};
|
|
|
|
hdr |= NET_OP_SEG_ACKNOWLEDGE << OPCODE_HDR_SHIFT;
|
|
frnd_ack.u.one[0].hdr = hdr;
|
|
l_put_be32(flags, frnd_ack.u.one[0].data);
|
|
l_queue_foreach(net->friends, enqueue_friend_pkt, &frnd_ack);
|
|
}
|
|
|
|
static bool send_seg(struct mesh_net *net, uint8_t cnt, uint16_t interval,
|
|
struct mesh_sar *msg, uint8_t seg);
|
|
|
|
static void send_frnd_ack(struct mesh_net *net, uint16_t src, uint16_t dst,
|
|
uint32_t hdr, uint32_t flags)
|
|
{
|
|
uint32_t expected;
|
|
uint8_t msg[7];
|
|
|
|
/* We don't ACK from multicast destinations */
|
|
if (src & 0x8000)
|
|
return;
|
|
|
|
/* Calculate the "Full ACK" mask */
|
|
expected = 0xffffffff >> (31 - SEG_TOTAL(hdr));
|
|
|
|
/* Clear Hdr bits that don't apply to Seg ACK */
|
|
hdr &= ~(((uint32_t) 0x01 << SEG_HDR_SHIFT) |
|
|
(OPCODE_MASK << OPCODE_HDR_SHIFT) |
|
|
((uint32_t) 0x01 << SZMIC_HDR_SHIFT) |
|
|
(SEG_MASK << SEGO_HDR_SHIFT) |
|
|
(SEG_MASK << SEGN_HDR_SHIFT));
|
|
|
|
hdr |= NET_OP_SEG_ACKNOWLEDGE << OPCODE_HDR_SHIFT;
|
|
hdr |= (uint32_t) 0x01 << RELAY_HDR_SHIFT;
|
|
|
|
/* Clear all unexpected bits */
|
|
flags &= expected;
|
|
|
|
l_put_be32(hdr, msg);
|
|
l_put_be32(flags, msg + 3);
|
|
|
|
l_debug("Send Friend ACK to Segs: %8.8x", flags);
|
|
|
|
if (is_lpn_friend(net, dst)) {
|
|
/* If we are acking our LPN Friend, queue, don't send */
|
|
friend_ack_rxed(net, mesh_net_get_iv_index(net),
|
|
mesh_net_next_seq_num(net), 0, dst, msg);
|
|
} else {
|
|
mesh_net_transport_send(net, 0, 0,
|
|
mesh_net_get_iv_index(net), DEFAULT_TTL,
|
|
0, 0, dst, msg, sizeof(msg));
|
|
}
|
|
}
|
|
|
|
static void send_net_ack(struct mesh_net *net, struct mesh_sar *sar,
|
|
uint32_t flags)
|
|
{
|
|
uint8_t msg[7];
|
|
uint32_t hdr;
|
|
uint16_t src = sar->src;
|
|
uint16_t dst = sar->remote;
|
|
|
|
/* We don't ACK from multicast destinations */
|
|
if (src & 0x8000)
|
|
return;
|
|
|
|
hdr = NET_OP_SEG_ACKNOWLEDGE << OPCODE_HDR_SHIFT;
|
|
hdr |= sar->seqZero << SEQ_ZERO_HDR_SHIFT;
|
|
|
|
if (is_lpn_friend(net, src))
|
|
hdr |= (uint32_t) 0x01 << RELAY_HDR_SHIFT;
|
|
|
|
l_put_be32(hdr, msg);
|
|
l_put_be32(flags, msg + 3);
|
|
l_debug("Send%s ACK to Segs: %8.8x", sar->frnd ? " Friend" : "", flags);
|
|
|
|
if (is_lpn_friend(net, dst)) {
|
|
/* If we are acking our LPN Friend, queue, don't send */
|
|
friend_ack_rxed(net, mesh_net_get_iv_index(net),
|
|
mesh_net_next_seq_num(net), src, dst, msg);
|
|
return;
|
|
}
|
|
|
|
mesh_net_transport_send(net, 0, sar->net_idx,
|
|
mesh_net_get_iv_index(net), DEFAULT_TTL,
|
|
0, src, dst, msg,
|
|
sizeof(msg));
|
|
}
|
|
|
|
static void inseg_to(struct l_timeout *seg_timeout, void *user_data)
|
|
{
|
|
struct mesh_net *net = user_data;
|
|
struct mesh_sar *sar = l_queue_find(net->sar_in,
|
|
match_seg_timeout, seg_timeout);
|
|
|
|
l_timeout_remove(seg_timeout);
|
|
if (!sar)
|
|
return;
|
|
|
|
/* Send NAK */
|
|
l_debug("Timeout %p %3.3x", sar, sar->app_idx);
|
|
send_net_ack(net, sar, sar->flags);
|
|
|
|
sar->seg_timeout = l_timeout_create(SEG_TO, inseg_to, net, NULL);
|
|
}
|
|
|
|
static void inmsg_to(struct l_timeout *msg_timeout, void *user_data)
|
|
{
|
|
struct mesh_net *net = user_data;
|
|
struct mesh_sar *sar = l_queue_find(net->sar_in,
|
|
match_msg_timeout, msg_timeout);
|
|
|
|
if (!sar) {
|
|
l_timeout_remove(msg_timeout);
|
|
return;
|
|
}
|
|
|
|
if (!sar->delete) {
|
|
/*
|
|
* Incomplete timer expired, cancel SAR and start
|
|
* delete timer
|
|
*/
|
|
l_timeout_remove(sar->seg_timeout);
|
|
sar->seg_timeout = NULL;
|
|
sar->delete = true;
|
|
l_timeout_modify(sar->msg_timeout, SAR_DEL);
|
|
return;
|
|
}
|
|
|
|
l_queue_remove(net->sar_in, sar);
|
|
mesh_sar_free(sar);
|
|
}
|
|
|
|
static void outmsg_to(struct l_timeout *msg_timeout, void *user_data)
|
|
{
|
|
struct mesh_net *net = user_data;
|
|
struct mesh_sar *sar = l_queue_remove_if(net->sar_out,
|
|
match_msg_timeout, msg_timeout);
|
|
|
|
l_timeout_remove(msg_timeout);
|
|
if (!sar)
|
|
return;
|
|
|
|
sar->msg_timeout = NULL;
|
|
mesh_sar_free(sar);
|
|
}
|
|
|
|
static void outseg_to(struct l_timeout *seg_timeout, void *user_data);
|
|
|
|
static void send_queued_sar(struct mesh_net *net, uint16_t dst)
|
|
{
|
|
struct mesh_sar *sar = l_queue_remove_if(net->sar_queue,
|
|
match_sar_remote, L_UINT_TO_PTR(dst));
|
|
|
|
if (!sar)
|
|
return;
|
|
|
|
/* Out to current outgoing, and immediate expire Seg TO */
|
|
l_queue_push_head(net->sar_out, sar);
|
|
sar->seg_timeout = NULL;
|
|
sar->msg_timeout = l_timeout_create(MSG_TO, outmsg_to, net, NULL);
|
|
outseg_to(NULL, net);
|
|
}
|
|
|
|
static void ack_received(struct mesh_net *net, bool timeout,
|
|
uint16_t src, uint16_t dst,
|
|
uint16_t seq0, uint32_t ack_flag)
|
|
{
|
|
struct mesh_sar *outgoing;
|
|
uint32_t seg_flag = 0x00000001;
|
|
uint32_t ack_copy = ack_flag;
|
|
uint16_t i;
|
|
|
|
l_debug("ACK Rxed (%x) (to:%d): %8.8x", seq0, timeout, ack_flag);
|
|
|
|
outgoing = l_queue_find(net->sar_out, match_sar_seq0,
|
|
L_UINT_TO_PTR(seq0));
|
|
|
|
if (!outgoing) {
|
|
l_debug("Not Found: %4.4x", seq0);
|
|
return;
|
|
}
|
|
|
|
/*
|
|
* TODO -- If we receive from different
|
|
* SRC than we are sending to, make sure the OBO flag is set
|
|
*/
|
|
|
|
if ((!timeout && !ack_flag) ||
|
|
(outgoing->flags & ack_flag) == outgoing->flags) {
|
|
l_debug("ob_sar_removal (%x)", outgoing->flags);
|
|
|
|
/* Note: ack_flags == 0x00000000 is a remote Cancel request */
|
|
|
|
l_queue_remove(net->sar_out, outgoing);
|
|
send_queued_sar(net, outgoing->remote);
|
|
mesh_sar_free(outgoing);
|
|
|
|
return;
|
|
}
|
|
|
|
outgoing->last_nak |= ack_flag;
|
|
|
|
ack_copy &= outgoing->flags;
|
|
|
|
for (i = 0; i <= SEG_MAX(true, outgoing->len); i++, seg_flag <<= 1) {
|
|
if (seg_flag & ack_flag) {
|
|
l_debug("Skipping Seg %d of %d",
|
|
i, SEG_MAX(true, outgoing->len));
|
|
continue;
|
|
}
|
|
|
|
ack_copy |= seg_flag;
|
|
|
|
l_debug("Resend Seg %d net:%p dst:%x app_idx:%3.3x",
|
|
i, net, outgoing->remote, outgoing->app_idx);
|
|
|
|
send_seg(net, net->tx_cnt, net->tx_interval, outgoing, i);
|
|
}
|
|
|
|
l_timeout_remove(outgoing->seg_timeout);
|
|
outgoing->seg_timeout = l_timeout_create(SEG_TO, outseg_to, net, NULL);
|
|
}
|
|
|
|
static void outseg_to(struct l_timeout *seg_timeout, void *user_data)
|
|
{
|
|
struct mesh_net *net = user_data;
|
|
struct mesh_sar *sar = l_queue_find(net->sar_out,
|
|
match_seg_timeout, seg_timeout);
|
|
|
|
l_timeout_remove(seg_timeout);
|
|
if (!sar)
|
|
return;
|
|
|
|
sar->seg_timeout = NULL;
|
|
|
|
/* Re-Send missing segments by faking NACK */
|
|
ack_received(net, true, sar->remote, sar->src,
|
|
sar->seqZero, sar->last_nak);
|
|
}
|
|
|
|
static bool match_replay_cache(const void *a, const void *b)
|
|
{
|
|
const struct mesh_rpl *rpe = a;
|
|
uint16_t src = L_PTR_TO_UINT(b);
|
|
|
|
return src == rpe->src;
|
|
}
|
|
|
|
static bool clean_old_iv_index(void *a, void *b)
|
|
{
|
|
struct mesh_rpl *rpe = a;
|
|
uint32_t iv_index = L_PTR_TO_UINT(b);
|
|
|
|
if (iv_index < 2)
|
|
return false;
|
|
|
|
if (rpe->iv_index < iv_index - 1) {
|
|
l_free(rpe);
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static bool msg_check_replay_cache(struct mesh_net *net, uint16_t src,
|
|
uint16_t crpl, uint32_t seq, uint32_t iv_index)
|
|
{
|
|
struct mesh_rpl *rpe;
|
|
|
|
/* If anything missing reject this message by returning true */
|
|
if (!net || !net->node)
|
|
return true;
|
|
|
|
rpe = l_queue_find(net->replay_cache, match_replay_cache,
|
|
L_UINT_TO_PTR(src));
|
|
|
|
if (rpe) {
|
|
if (iv_index > rpe->iv_index)
|
|
return false;
|
|
|
|
/* Return true if (iv_index | seq) too low */
|
|
if (iv_index < rpe->iv_index || seq <= rpe->seq) {
|
|
l_debug("Ignoring replayed packet");
|
|
return true;
|
|
}
|
|
} else if (l_queue_length(net->replay_cache) >= crpl) {
|
|
/* SRC not in Replay Cache... see if there is space for it */
|
|
|
|
int ret = l_queue_foreach_remove(net->replay_cache,
|
|
clean_old_iv_index, L_UINT_TO_PTR(iv_index));
|
|
|
|
/* Return true if no space could be freed */
|
|
if (!ret) {
|
|
l_debug("Replay cache full");
|
|
return true;
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static void msg_add_replay_cache(struct mesh_net *net, uint16_t src,
|
|
uint32_t seq, uint32_t iv_index)
|
|
{
|
|
struct mesh_rpl *rpe;
|
|
|
|
if (!net || !net->replay_cache)
|
|
return;
|
|
|
|
rpe = l_queue_remove_if(net->replay_cache, match_replay_cache,
|
|
L_UINT_TO_PTR(src));
|
|
|
|
if (!rpe) {
|
|
rpe = l_new(struct mesh_rpl, 1);
|
|
rpe->src = src;
|
|
}
|
|
|
|
rpe->seq = seq;
|
|
rpe->iv_index = iv_index;
|
|
rpl_put_entry(net->node, src, iv_index, seq);
|
|
|
|
/* Optimize so that most recent conversations stay earliest in cache */
|
|
l_queue_push_head(net->replay_cache, rpe);
|
|
}
|
|
|
|
static bool msg_rxed(struct mesh_net *net, bool frnd, uint32_t iv_index,
|
|
uint8_t ttl, uint32_t seq,
|
|
uint16_t net_idx,
|
|
uint16_t src, uint16_t dst,
|
|
uint8_t key_aid, bool segmented,
|
|
bool szmic, uint16_t seqZero,
|
|
const uint8_t *data, uint16_t size)
|
|
{
|
|
uint32_t seqAuth = seq_auth(seq, seqZero);
|
|
uint16_t crpl;
|
|
|
|
/* Sanity check seqAuth */
|
|
if (seqAuth > seq)
|
|
return false;
|
|
|
|
/* Save un-decrypted messages for our friends */
|
|
if (!frnd && l_queue_length(net->friends)) {
|
|
uint32_t hdr = key_aid << KEY_HDR_SHIFT;
|
|
uint8_t frnd_ttl = ttl;
|
|
|
|
/* If not from us, decrement for our hop */
|
|
if (src < net->src_addr || src > net->last_addr) {
|
|
if (frnd_ttl > 1)
|
|
frnd_ttl--;
|
|
else
|
|
goto not_for_friend;
|
|
}
|
|
|
|
if (szmic || size > 15) {
|
|
hdr |= (uint32_t) 0x01 << SEG_HDR_SHIFT;
|
|
hdr |= szmic << SZMIC_HDR_SHIFT;
|
|
hdr |= (seqZero & SEQ_ZERO_MASK) << SEQ_ZERO_HDR_SHIFT;
|
|
hdr |= SEG_MAX(true, size) << SEGN_HDR_SHIFT;
|
|
}
|
|
|
|
if (friend_packet_queue(net, iv_index, false, frnd_ttl,
|
|
seq, src, dst,
|
|
hdr, data, size))
|
|
return true;
|
|
}
|
|
|
|
not_for_friend:
|
|
if (dst == FRIENDS_ADDRESS && !net->friend_enable)
|
|
return false;
|
|
|
|
if (dst == RELAYS_ADDRESS && !net->relay.enable)
|
|
return false;
|
|
|
|
if (dst == PROXIES_ADDRESS && !net->proxy_enable)
|
|
return false;
|
|
|
|
/* Don't process if already in RPL */
|
|
crpl = node_get_crpl(net->node);
|
|
|
|
if (msg_check_replay_cache(net, src, crpl, seq, iv_index))
|
|
return false;
|
|
|
|
if (!mesh_model_rx(net->node, szmic, seqAuth, iv_index, net_idx, src,
|
|
dst, key_aid, data, size))
|
|
return false;
|
|
|
|
/* If message has been handled by us, add to RPL */
|
|
msg_add_replay_cache(net, src, seq, iv_index);
|
|
return true;
|
|
}
|
|
|
|
static uint16_t key_id_to_net_idx(struct mesh_net *net,
|
|
uint32_t net_key_id, bool *frnd)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
struct mesh_friend *friend;
|
|
|
|
if (!net)
|
|
return NET_IDX_INVALID;
|
|
|
|
if (frnd)
|
|
*frnd = false;
|
|
|
|
subnet = l_queue_find(net->subnets, match_key_id,
|
|
L_UINT_TO_PTR(net_key_id));
|
|
|
|
if (subnet)
|
|
return subnet->idx;
|
|
|
|
friend = l_queue_find(net->friends, match_friend_key_id,
|
|
L_UINT_TO_PTR(net_key_id));
|
|
|
|
if (friend) {
|
|
if (frnd)
|
|
*frnd = true;
|
|
|
|
return friend->net_idx;
|
|
}
|
|
|
|
friend = l_queue_find(net->negotiations, match_friend_key_id,
|
|
L_UINT_TO_PTR(net_key_id));
|
|
|
|
if (friend)
|
|
return friend->net_idx;
|
|
else
|
|
return NET_IDX_INVALID;
|
|
}
|
|
|
|
static bool match_frnd_sar_dst(const void *a, const void *b)
|
|
{
|
|
const struct mesh_friend_msg *frnd_msg = a;
|
|
uint16_t dst = L_PTR_TO_UINT(b);
|
|
|
|
return frnd_msg->dst == dst;
|
|
}
|
|
|
|
static void friend_seg_rxed(struct mesh_net *net,
|
|
uint32_t iv_index,
|
|
uint8_t ttl, uint32_t seq,
|
|
uint16_t src, uint16_t dst, uint32_t hdr,
|
|
const uint8_t *data, uint8_t size)
|
|
{
|
|
struct mesh_friend *frnd = NULL;
|
|
struct mesh_friend_msg *frnd_msg = NULL;
|
|
uint8_t cnt;
|
|
uint8_t segN = hdr & 0x1f;
|
|
uint8_t segO = ((hdr >> 5) & 0x1f);
|
|
uint32_t expected = 0xffffffff >> (31 - segN);
|
|
uint32_t this_seg_flag = 0x00000001 << segO;
|
|
uint32_t largest = (0xffffffff << segO) & expected;
|
|
uint32_t hdr_key = hdr & HDR_KEY_MASK;
|
|
|
|
frnd = l_queue_find(net->friends, match_frnd_dst,
|
|
L_UINT_TO_PTR(dst));
|
|
if (!frnd)
|
|
return;
|
|
|
|
if (frnd->u.active.last_hdr == hdr_key) {
|
|
/* We are no longer receiving this msg. Resend final ACK */
|
|
send_frnd_ack(net, dst, src, frnd->u.active.last_hdr,
|
|
0xffffffff);
|
|
return;
|
|
}
|
|
|
|
/* Check if we have a SAR-in-progress that matches incoming segment */
|
|
frnd_msg = l_queue_find(net->frnd_msgs, match_frnd_sar_dst,
|
|
L_UINT_TO_PTR(dst));
|
|
|
|
if (frnd_msg) {
|
|
/* Flush if SZMICN or IV Index has changed */
|
|
if (frnd_msg->iv_index != iv_index)
|
|
frnd_msg->u.s12[0].hdr = 0;
|
|
|
|
/* Flush incomplete old SAR message if it doesn't match */
|
|
if ((frnd_msg->u.s12[0].hdr & HDR_KEY_MASK) != hdr_key) {
|
|
l_queue_remove(net->frnd_msgs, frnd_msg);
|
|
l_free(frnd_msg);
|
|
frnd_msg = NULL;
|
|
}
|
|
}
|
|
|
|
if (!frnd_msg) {
|
|
frnd_msg = mesh_friend_msg_new(segN);
|
|
frnd_msg->iv_index = iv_index;
|
|
frnd_msg->src = src;
|
|
frnd_msg->dst = dst;
|
|
frnd_msg->ttl = ttl;
|
|
l_queue_push_tail(net->frnd_msgs, frnd_msg);
|
|
} else if (frnd_msg->flags & this_seg_flag) /* Ignore dup segs */
|
|
return;
|
|
|
|
cnt = frnd_msg->cnt_in;
|
|
frnd_msg->flags |= this_seg_flag;
|
|
|
|
frnd_msg->u.s12[cnt].hdr = hdr;
|
|
frnd_msg->u.s12[cnt].seq = seq;
|
|
memcpy(frnd_msg->u.s12[cnt].data, data, size);
|
|
|
|
/* Last segment could be short */
|
|
if (segN == segO)
|
|
frnd_msg->last_len = size;
|
|
|
|
l_debug("RXed Seg %d, Flags %8.8x (cnt: %d)",
|
|
segO, frnd_msg->flags, cnt);
|
|
|
|
/* In reality, if one of these is true, then *both* must be true */
|
|
if ((cnt == segN) || (frnd_msg->flags == expected)) {
|
|
l_debug("Full ACK");
|
|
send_frnd_ack(net, dst, src, hdr, frnd_msg->flags);
|
|
|
|
if (frnd_msg->ttl > 1) {
|
|
frnd_msg->ttl--;
|
|
/* Add to friends cache */
|
|
l_queue_foreach(net->friends,
|
|
enqueue_friend_pkt, frnd_msg);
|
|
}
|
|
|
|
/* Remove from "in progress" queue */
|
|
l_queue_remove(net->frnd_msgs, frnd_msg);
|
|
|
|
/* TODO Optimization(?): Unicast messages keep this buffer */
|
|
l_free(frnd_msg);
|
|
return;
|
|
}
|
|
|
|
/* Always ACK if this is the largest outstanding segment */
|
|
if ((largest & frnd_msg->flags) == largest) {
|
|
l_debug("Partial ACK");
|
|
send_frnd_ack(net, dst, src, hdr, frnd_msg->flags);
|
|
}
|
|
|
|
frnd_msg->cnt_in++;
|
|
}
|
|
|
|
static bool seg_rxed(struct mesh_net *net, bool frnd, uint32_t iv_index,
|
|
uint8_t ttl, uint32_t seq,
|
|
uint16_t net_idx,
|
|
uint16_t src, uint16_t dst,
|
|
uint8_t key_aid,
|
|
bool szmic, uint16_t seqZero,
|
|
uint8_t segO, uint8_t segN,
|
|
const uint8_t *data, uint8_t size)
|
|
{
|
|
struct mesh_sar *sar_in = NULL;
|
|
uint16_t seg_off = 0;
|
|
uint32_t expected, this_seg_flag, largest, seqAuth;
|
|
bool reset_seg_to = true;
|
|
|
|
/*
|
|
* DST could receive additional Segments after
|
|
* completing due to a lost ACK, so re-ACK and discard
|
|
*/
|
|
sar_in = l_queue_find(net->sar_in, match_sar_remote,
|
|
L_UINT_TO_PTR(src));
|
|
|
|
/* Discard *old* incoming-SAR-in-progress if this segment newer */
|
|
seqAuth = seq_auth(seq, seqZero);
|
|
if (sar_in && (sar_in->seqAuth != seqAuth ||
|
|
sar_in->iv_index != iv_index)) {
|
|
bool newer;
|
|
|
|
if (iv_index > sar_in->iv_index)
|
|
newer = true;
|
|
else if (iv_index == sar_in->iv_index)
|
|
newer = seqAuth > sar_in->seqAuth;
|
|
else
|
|
newer = false;
|
|
|
|
if (newer) {
|
|
/* Cancel Old, start New */
|
|
l_queue_remove(net->sar_in, sar_in);
|
|
mesh_sar_free(sar_in);
|
|
sar_in = NULL;
|
|
} else
|
|
/* Ignore Old */
|
|
return false;
|
|
}
|
|
|
|
expected = 0xffffffff >> (31 - segN);
|
|
|
|
if (sar_in) {
|
|
l_debug("RXed (old: %04x %06x size:%d) %d of %d",
|
|
seqZero, seq, size, segO, segN);
|
|
/* Sanity Check--> certain things must match */
|
|
if (SEG_MAX(true, sar_in->len) != segN ||
|
|
sar_in->key_aid != key_aid)
|
|
return false;
|
|
|
|
if (sar_in->flags == expected) {
|
|
/* Re-Send ACK for full msg */
|
|
send_net_ack(net, sar_in, expected);
|
|
return true;
|
|
} else if (sar_in->delete)
|
|
/* Ignore cancelled */
|
|
return false;
|
|
} else {
|
|
uint16_t len = MAX_SEG_TO_LEN(segN);
|
|
|
|
l_debug("RXed (new: %04x %06x size: %d len: %d) %d of %d",
|
|
seqZero, seq, size, len, segO, segN);
|
|
l_debug("Queue Size: %d", l_queue_length(net->sar_in));
|
|
sar_in = mesh_sar_new(len);
|
|
sar_in->seqAuth = seqAuth;
|
|
sar_in->iv_index = iv_index;
|
|
sar_in->src = dst;
|
|
sar_in->remote = src;
|
|
sar_in->seqZero = seqZero;
|
|
sar_in->key_aid = key_aid;
|
|
sar_in->len = len;
|
|
sar_in->last_seg = 0xff;
|
|
sar_in->net_idx = net_idx;
|
|
sar_in->msg_timeout = l_timeout_create(MSG_TO,
|
|
inmsg_to, net, NULL);
|
|
|
|
l_debug("First Seg %4.4x", sar_in->flags);
|
|
l_queue_push_head(net->sar_in, sar_in);
|
|
}
|
|
|
|
seg_off = segO * MAX_SEG_LEN;
|
|
memcpy(sar_in->buf + seg_off, data, size);
|
|
this_seg_flag = 0x00000001 << segO;
|
|
|
|
/* Don't reset Seg TO or NAK if we already have this seg */
|
|
if (this_seg_flag & sar_in->flags)
|
|
reset_seg_to = false;
|
|
|
|
sar_in->flags |= this_seg_flag;
|
|
sar_in->ttl = ttl;
|
|
|
|
/* Msg length only definitive on last segment */
|
|
if (segO == segN)
|
|
sar_in->len = segN * MAX_SEG_LEN + size;
|
|
|
|
if (sar_in->flags == expected) {
|
|
/* Got it all */
|
|
send_net_ack(net, sar_in, expected);
|
|
|
|
msg_rxed(net, frnd, iv_index, ttl, seq, net_idx,
|
|
sar_in->remote, dst, key_aid, true, szmic,
|
|
sar_in->seqZero, sar_in->buf, sar_in->len);
|
|
|
|
/* Kill Inter-Seg timeout */
|
|
l_timeout_remove(sar_in->seg_timeout);
|
|
sar_in->seg_timeout = NULL;
|
|
|
|
/* Start delete timer */
|
|
sar_in->delete = true;
|
|
l_timeout_modify(sar_in->msg_timeout, SAR_DEL);
|
|
return true;
|
|
}
|
|
|
|
if (reset_seg_to) {
|
|
/* Restart Inter-Seg Timeout */
|
|
l_timeout_remove(sar_in->seg_timeout);
|
|
|
|
/* if this is the largest outstanding segment, send NAK now */
|
|
largest = (0xffffffff << segO) & expected;
|
|
if ((largest & sar_in->flags) == largest)
|
|
send_net_ack(net, sar_in, sar_in->flags);
|
|
|
|
sar_in->seg_timeout = l_timeout_create(SEG_TO,
|
|
inseg_to, net, NULL);
|
|
} else
|
|
largest = 0;
|
|
|
|
l_debug("NAK: %d expected:%08x largest:%08x flags:%08x",
|
|
reset_seg_to, expected, largest, sar_in->flags);
|
|
return false;
|
|
}
|
|
|
|
static bool ctl_received(struct mesh_net *net, uint32_t net_key_id,
|
|
uint32_t iv_index, uint8_t ttl,
|
|
uint32_t seq,
|
|
uint16_t src, uint16_t dst,
|
|
uint8_t opcode, int8_t rssi,
|
|
const uint8_t *pkt, uint8_t len)
|
|
{
|
|
uint8_t msg[12];
|
|
uint8_t rsp_ttl = DEFAULT_TTL;
|
|
uint8_t n = 0;
|
|
uint16_t net_idx;
|
|
|
|
if (ttl > 1) {
|
|
uint32_t hdr = opcode << OPCODE_HDR_SHIFT;
|
|
uint8_t frnd_ttl = ttl - 1;
|
|
|
|
if (friend_packet_queue(net, iv_index, true, frnd_ttl, seq,
|
|
src, dst, hdr, pkt, len))
|
|
return true;
|
|
}
|
|
|
|
/* Don't process other peoples Unicast destinations */
|
|
if (dst < 0x8000 && (dst < net->src_addr || dst > net->last_addr))
|
|
return false;
|
|
|
|
switch (opcode) {
|
|
default:
|
|
l_error("Unsupported Ctl Opcode: %2.2x", opcode);
|
|
break;
|
|
|
|
case NET_OP_FRND_POLL:
|
|
if (len != 1 || ttl || pkt[0] > 1)
|
|
return false;
|
|
|
|
print_packet("Rx-NET_OP_FRND_POLL", pkt, len);
|
|
friend_poll(net, src, !!(pkt[0]), l_queue_find(net->friends,
|
|
match_by_friend, L_UINT_TO_PTR(src)));
|
|
break;
|
|
|
|
case NET_OP_FRND_REQUEST:
|
|
if (!net->friend_enable)
|
|
return false;
|
|
|
|
if (!IS_ALL_NODES(dst) && dst != FRIENDS_ADDRESS)
|
|
return false;
|
|
|
|
if (len != 10 || ttl)
|
|
return false;
|
|
|
|
print_packet("Rx-NET_OP_FRND_REQUEST", pkt, len);
|
|
net_idx = key_id_to_net_idx(net, net_key_id, NULL);
|
|
friend_request(net, net_idx, src, pkt[0], pkt[1],
|
|
l_get_be32(pkt + 1) & 0xffffff,
|
|
l_get_be16(pkt + 5), pkt[7],
|
|
l_get_be16(pkt + 8), rssi);
|
|
break;
|
|
|
|
case NET_OP_FRND_CLEAR_CONFIRM:
|
|
if (len != 4)
|
|
return false;
|
|
|
|
print_packet("Rx-NET_OP_FRND_CLEAR_CONFIRM", pkt, len);
|
|
friend_clear_confirm(net, src, l_get_be16(pkt),
|
|
l_get_be16(pkt + 2));
|
|
break;
|
|
|
|
case NET_OP_FRND_CLEAR:
|
|
if (len != 4 || dst != net->src_addr)
|
|
return false;
|
|
|
|
print_packet("Rx-NET_OP_FRND_CLEAR", pkt, len);
|
|
friend_clear(net, src, l_get_be16(pkt), l_get_be16(pkt + 2),
|
|
l_queue_find(net->friends, match_by_friend,
|
|
L_UINT_TO_PTR(l_get_be16(pkt))));
|
|
l_debug("Remaining Friends: %d", l_queue_length(net->friends));
|
|
break;
|
|
|
|
case NET_OP_PROXY_SUB_ADD:
|
|
if (ttl)
|
|
return false;
|
|
|
|
print_packet("Rx-NET_OP_PROXY_SUB_ADD", pkt, len);
|
|
friend_sub_add(net, l_queue_find(net->friends,
|
|
match_by_friend, L_UINT_TO_PTR(src)),
|
|
pkt, len);
|
|
break;
|
|
|
|
case NET_OP_PROXY_SUB_REMOVE:
|
|
if (ttl)
|
|
return false;
|
|
|
|
print_packet("Rx-NET_OP_PROXY_SUB_REMOVE", pkt, len);
|
|
friend_sub_del(net, l_queue_find(net->friends, match_by_friend,
|
|
L_UINT_TO_PTR(src)), pkt, len);
|
|
break;
|
|
|
|
case NET_OP_PROXY_SUB_CONFIRM:
|
|
if (ttl)
|
|
return false;
|
|
|
|
print_packet("Rx-NET_OP_PROXY_SUB_CONFIRM", pkt, len);
|
|
break;
|
|
|
|
case NET_OP_HEARTBEAT:
|
|
if (net->hb_sub.enabled && src == net->hb_sub.src) {
|
|
uint8_t hops = pkt[0] - ttl + 1;
|
|
|
|
print_packet("Rx-NET_OP_HEARTBEAT", pkt, len);
|
|
|
|
if (net->hb_sub.count != 0xffff)
|
|
net->hb_sub.count++;
|
|
|
|
if (net->hb_sub.min_hops > hops)
|
|
net->hb_sub.min_hops = hops;
|
|
|
|
if (net->hb_sub.max_hops < hops)
|
|
net->hb_sub.max_hops = hops;
|
|
|
|
l_debug("HB: cnt:%4.4x min:%2.2x max:%2.2x",
|
|
net->hb_sub.count, net->hb_sub.min_hops,
|
|
net->hb_sub.max_hops);
|
|
}
|
|
break;
|
|
}
|
|
|
|
if (n)
|
|
mesh_net_transport_send(net, 0, 0, mesh_net_get_iv_index(net),
|
|
rsp_ttl, 0, dst & 0x8000 ? 0 : dst,
|
|
src, msg, n);
|
|
|
|
return true;
|
|
}
|
|
|
|
static bool find_fast_hash(const void *a, const void *b)
|
|
{
|
|
const uint64_t *entry = a;
|
|
const uint64_t *test = b;
|
|
|
|
return *entry == *test;
|
|
}
|
|
|
|
static bool check_fast_cache(uint64_t hash)
|
|
{
|
|
void *found = l_queue_find(fast_cache, find_fast_hash, &hash);
|
|
uint64_t *new_hash;
|
|
|
|
if (found)
|
|
return false;
|
|
|
|
if (l_queue_length(fast_cache) >= FAST_CACHE_SIZE)
|
|
new_hash = l_queue_pop_head(fast_cache);
|
|
else
|
|
new_hash = l_malloc(sizeof(hash));
|
|
|
|
*new_hash = hash;
|
|
l_queue_push_tail(fast_cache, new_hash);
|
|
|
|
return true;
|
|
}
|
|
|
|
static bool match_by_dst(const void *a, const void *b)
|
|
{
|
|
const struct mesh_destination *dest = a;
|
|
uint16_t dst = L_PTR_TO_UINT(b);
|
|
|
|
return dest->dst == dst;
|
|
}
|
|
|
|
static void send_relay_pkt(struct mesh_net *net, uint8_t *data, uint8_t size)
|
|
{
|
|
uint8_t packet[30];
|
|
struct mesh_io *io = net->io;
|
|
struct mesh_io_send_info info = {
|
|
.type = MESH_IO_TIMING_TYPE_GENERAL,
|
|
.u.gen.interval = net->relay.interval,
|
|
.u.gen.cnt = net->relay.count,
|
|
.u.gen.min_delay = DEFAULT_MIN_DELAY,
|
|
.u.gen.max_delay = DEFAULT_MAX_DELAY
|
|
};
|
|
|
|
packet[0] = MESH_AD_TYPE_NETWORK;
|
|
memcpy(packet + 1, data, size);
|
|
|
|
mesh_io_send(io, &info, packet, size + 1);
|
|
}
|
|
|
|
static bool simple_match(const void *a, const void *b)
|
|
{
|
|
return a == b;
|
|
}
|
|
|
|
static void send_msg_pkt_oneshot(void *user_data)
|
|
{
|
|
struct oneshot_tx *tx = user_data;
|
|
struct mesh_net *net;
|
|
struct mesh_io_send_info info;
|
|
struct net_queue_data net_data = {
|
|
.info = NULL,
|
|
.data = tx->packet + 1,
|
|
.len = tx->size - 1,
|
|
.relay_advice = RELAY_NONE,
|
|
};
|
|
|
|
/* Send to local nodes first */
|
|
l_queue_foreach(nets, net_rx, &net_data);
|
|
|
|
/* Make sure specific network still valid */
|
|
net = l_queue_find(nets, simple_match, tx->net);
|
|
|
|
if (!net || net_data.relay_advice == RELAY_DISALLOWED) {
|
|
l_free(tx);
|
|
return;
|
|
}
|
|
|
|
tx->packet[0] = MESH_AD_TYPE_NETWORK;
|
|
info.type = MESH_IO_TIMING_TYPE_GENERAL;
|
|
info.u.gen.interval = tx->interval;
|
|
info.u.gen.cnt = tx->cnt;
|
|
info.u.gen.min_delay = DEFAULT_MIN_DELAY;
|
|
/* No extra randomization when sending regular mesh messages */
|
|
info.u.gen.max_delay = DEFAULT_MIN_DELAY;
|
|
|
|
mesh_io_send(net->io, &info, tx->packet, tx->size);
|
|
l_free(tx);
|
|
}
|
|
|
|
static void send_msg_pkt(struct mesh_net *net, uint8_t cnt, uint16_t interval,
|
|
uint8_t *packet, uint8_t size)
|
|
{
|
|
struct oneshot_tx *tx = l_new(struct oneshot_tx, 1);
|
|
|
|
tx->net = net;
|
|
tx->interval = interval;
|
|
tx->cnt = cnt;
|
|
tx->size = size;
|
|
memcpy(tx->packet, packet, size);
|
|
|
|
l_idle_oneshot(send_msg_pkt_oneshot, tx, NULL);
|
|
}
|
|
|
|
static enum _relay_advice packet_received(void *user_data,
|
|
uint32_t net_key_id, uint16_t net_idx,
|
|
bool frnd, uint32_t iv_index,
|
|
const void *data, uint8_t size, int8_t rssi)
|
|
{
|
|
struct mesh_net *net = user_data;
|
|
const uint8_t *msg = data;
|
|
uint8_t app_msg_len;
|
|
uint8_t net_ttl, key_aid, net_segO, net_segN, net_opcode;
|
|
uint32_t net_seq, cache_cookie;
|
|
uint16_t net_src, net_dst, net_seqZero;
|
|
uint8_t packet[31];
|
|
bool net_ctl, net_segmented, net_szmic, net_relay;
|
|
|
|
memcpy(packet + 2, data, size);
|
|
|
|
print_packet("RX: Network [clr] :", packet + 2, size);
|
|
|
|
if (!mesh_crypto_packet_parse(packet + 2, size, &net_ctl, &net_ttl,
|
|
&net_seq, &net_src, &net_dst,
|
|
&cache_cookie, &net_opcode,
|
|
&net_segmented, &key_aid, &net_szmic,
|
|
&net_relay, &net_seqZero, &net_segO,
|
|
&net_segN, &msg, &app_msg_len)) {
|
|
l_error("Failed to parse packet content");
|
|
return RELAY_NONE;
|
|
}
|
|
|
|
if (net_dst == 0) {
|
|
l_error("illegal parms: DST: %4.4x Ctl: %d TTL: %2.2x",
|
|
net_dst, net_ctl, net_ttl);
|
|
return RELAY_NONE;
|
|
}
|
|
|
|
/* Ignore if we originally sent this */
|
|
if (is_us(net, net_src, true))
|
|
return RELAY_NONE;
|
|
|
|
/*
|
|
* As a Relay, suppress repeats of last N packets that pass through
|
|
* The "cache_cookie" should be unique part of App message.
|
|
*/
|
|
if (msg_in_cache(net, net_src, net_seq, cache_cookie))
|
|
return RELAY_NONE;
|
|
|
|
l_debug("RX: Network %04x -> %04x : TTL 0x%02x : IV : %8.8x SEQ 0x%06x",
|
|
net_src, net_dst, net_ttl, iv_index, net_seq);
|
|
|
|
if (is_us(net, net_dst, false) ||
|
|
(net_ctl && net_opcode == NET_OP_HEARTBEAT)) {
|
|
|
|
l_debug("RX: App 0x%04x -> 0x%04x : TTL 0x%02x : SEQ 0x%06x",
|
|
net_src, net_dst, net_ttl, net_seq);
|
|
|
|
if (net_ctl) {
|
|
l_debug("CTL - %4.4x RX", net_seqZero);
|
|
if (net_opcode == NET_OP_SEG_ACKNOWLEDGE) {
|
|
/* Illegal to send ACK to non-Unicast Addr */
|
|
if (net_dst & 0x8000)
|
|
return RELAY_NONE;
|
|
|
|
/* Pedantic check for correct size */
|
|
if (app_msg_len != 7)
|
|
return RELAY_NONE;
|
|
|
|
/* If this is an ACK to our friend queue-only */
|
|
if (is_lpn_friend(net, net_dst))
|
|
friend_ack_rxed(net, iv_index, net_seq,
|
|
net_src, net_dst, msg);
|
|
else
|
|
ack_received(net, false,
|
|
net_src, net_dst,
|
|
net_seqZero,
|
|
l_get_be32(msg + 3));
|
|
} else {
|
|
ctl_received(net, net_key_id, iv_index, net_ttl,
|
|
net_seq, net_src, net_dst,
|
|
net_opcode, rssi, msg,
|
|
app_msg_len);
|
|
}
|
|
} else if (net_segmented) {
|
|
/*
|
|
* If we accept SAR packets to non-Unicast, then
|
|
* Friend Sar at least needs to be Unicast Only
|
|
*/
|
|
if (is_lpn_friend(net, net_dst) &&
|
|
!(net_dst & 0x8000)) {
|
|
/*
|
|
* Check TTL >= 2 before accepting segments
|
|
* for Friends
|
|
*/
|
|
if (net_ttl >= 2) {
|
|
friend_seg_rxed(net, iv_index, net_ttl,
|
|
net_seq, net_src, net_dst,
|
|
l_get_be32(packet + 2 + 9),
|
|
msg, app_msg_len);
|
|
}
|
|
} else {
|
|
seg_rxed(net, NULL, iv_index, net_ttl,
|
|
net_seq, net_idx, net_src,
|
|
net_dst, key_aid, net_szmic,
|
|
net_seqZero, net_segO, net_segN,
|
|
msg, app_msg_len);
|
|
}
|
|
|
|
} else {
|
|
msg_rxed(net, NULL, iv_index, net_ttl, net_seq, net_idx,
|
|
net_src, net_dst, key_aid, false,
|
|
false, net_seq & SEQ_ZERO_MASK, msg,
|
|
app_msg_len);
|
|
}
|
|
|
|
/* If this is one of our Unicast addresses, disallow relay */
|
|
if (IS_UNICAST(net_dst))
|
|
return RELAY_DISALLOWED;
|
|
}
|
|
|
|
/*
|
|
* Messages that are encrypted with friendship credentials
|
|
* should *always* be relayed
|
|
*/
|
|
if (frnd)
|
|
return RELAY_ALWAYS;
|
|
|
|
/* If relay not enable, or no more hops allowed */
|
|
if (!net->relay.enable || net_ttl < 0x02)
|
|
return RELAY_NONE;
|
|
|
|
/* Group or Virtual destinations should *always* be relayed */
|
|
if (IS_GROUP(net_dst) || IS_VIRTUAL(net_dst))
|
|
return RELAY_ALWAYS;
|
|
|
|
/* Unicast destinations for other nodes *may* be relayed */
|
|
else if (IS_UNICAST(net_dst))
|
|
return RELAY_ALLOWED;
|
|
|
|
/* Otherwise, do not make a relay decision */
|
|
else
|
|
return RELAY_NONE;
|
|
}
|
|
|
|
static void net_rx(void *net_ptr, void *user_data)
|
|
{
|
|
struct net_queue_data *data = user_data;
|
|
struct mesh_net *net = net_ptr;
|
|
enum _relay_advice relay_advice;
|
|
uint8_t *out;
|
|
size_t out_size;
|
|
uint32_t net_key_id;
|
|
uint16_t net_idx;
|
|
int8_t rssi = 0;
|
|
bool frnd;
|
|
bool ivi_net = !!(net->iv_index & 1);
|
|
bool ivi_pkt = !!(data->data[0] & 0x80);
|
|
|
|
/* if IVI flag differs, use previous IV Index */
|
|
uint32_t iv_index = net->iv_index - (ivi_pkt ^ ivi_net);
|
|
|
|
net_key_id = net_key_decrypt(iv_index, data->data, data->len,
|
|
&out, &out_size);
|
|
|
|
if (!net_key_id)
|
|
return;
|
|
|
|
if (!data->seen) {
|
|
data->seen = true;
|
|
print_packet("RX: Network [enc] :", data->data, data->len);
|
|
}
|
|
|
|
if (data->info) {
|
|
net->instant = data->info->instant;
|
|
net->chan = data->info->chan;
|
|
rssi = data->info->rssi;
|
|
}
|
|
|
|
net_idx = key_id_to_net_idx(net, net_key_id, &frnd);
|
|
|
|
if (net_idx == NET_IDX_INVALID)
|
|
return;
|
|
|
|
relay_advice = packet_received(net, net_key_id, net_idx, frnd,
|
|
iv_index, out, out_size, rssi);
|
|
if (relay_advice > data->relay_advice) {
|
|
/*
|
|
* If packet was encrypted with friendship credentials,
|
|
* relay it using master credentials
|
|
*/
|
|
if (frnd && !mesh_net_get_key(net, false, net_idx, &net_key_id))
|
|
return;
|
|
|
|
data->iv_index = iv_index;
|
|
data->relay_advice = relay_advice;
|
|
data->net_key_id = net_key_id;
|
|
data->net = net;
|
|
data->out = out;
|
|
data->out_size = out_size;
|
|
}
|
|
}
|
|
|
|
static void net_msg_recv(void *user_data, struct mesh_io_recv_info *info,
|
|
const uint8_t *data, uint16_t len)
|
|
{
|
|
uint64_t hash;
|
|
bool isNew;
|
|
struct net_queue_data net_data = {
|
|
.info = info,
|
|
.data = data + 1,
|
|
.len = len - 1,
|
|
.relay_advice = RELAY_NONE,
|
|
.seen = false,
|
|
};
|
|
|
|
if (len < 9)
|
|
return;
|
|
|
|
hash = l_get_le64(data + 1);
|
|
|
|
/* Only process packet once per reception */
|
|
isNew = check_fast_cache(hash);
|
|
if (!isNew)
|
|
return;
|
|
|
|
l_queue_foreach(nets, net_rx, &net_data);
|
|
|
|
if (net_data.relay_advice == RELAY_ALWAYS ||
|
|
net_data.relay_advice == RELAY_ALLOWED) {
|
|
uint8_t ttl = net_data.out[1] & TTL_MASK;
|
|
|
|
net_data.out[1] &= ~TTL_MASK;
|
|
net_data.out[1] |= ttl - 1;
|
|
net_key_encrypt(net_data.net_key_id, net_data.iv_index,
|
|
net_data.out, net_data.out_size);
|
|
send_relay_pkt(net_data.net, net_data.out, net_data.out_size);
|
|
}
|
|
}
|
|
|
|
static void iv_upd_to(struct l_timeout *upd_timeout, void *user_data)
|
|
{
|
|
struct mesh_net *net = user_data;
|
|
|
|
switch (net->iv_upd_state) {
|
|
case IV_UPD_UPDATING:
|
|
if (l_queue_length(net->sar_out) ||
|
|
l_queue_length(net->sar_queue)) {
|
|
l_debug("don't leave IV Update until sar_out empty");
|
|
l_timeout_modify(net->iv_update_timeout, 10);
|
|
break;
|
|
}
|
|
|
|
l_debug("iv_upd_state = IV_UPD_NORMAL_HOLD");
|
|
net->iv_upd_state = IV_UPD_NORMAL_HOLD;
|
|
l_timeout_modify(net->iv_update_timeout, IV_IDX_UPD_MIN);
|
|
|
|
if (net->iv_update)
|
|
mesh_net_set_seq_num(net, 0);
|
|
|
|
net->iv_update = false;
|
|
mesh_config_write_iv_index(node_config_get(net->node),
|
|
net->iv_index, false);
|
|
l_queue_foreach(net->subnets, refresh_beacon, net);
|
|
queue_friend_update(net);
|
|
l_queue_clear(net->msg_cache, l_free);
|
|
break;
|
|
|
|
case IV_UPD_INIT:
|
|
case IV_UPD_NORMAL_HOLD:
|
|
case IV_UPD_NORMAL:
|
|
l_timeout_remove(upd_timeout);
|
|
net->iv_update_timeout = NULL;
|
|
l_debug("iv_upd_state = IV_UPD_NORMAL");
|
|
net->iv_upd_state = IV_UPD_NORMAL;
|
|
|
|
if (net->iv_update)
|
|
mesh_net_set_seq_num(net, 0);
|
|
|
|
net->iv_update = false;
|
|
|
|
if (net->seq_num > IV_UPDATE_SEQ_TRIGGER)
|
|
mesh_net_iv_index_update(net);
|
|
break;
|
|
}
|
|
}
|
|
|
|
|
|
static int key_refresh_phase_two(struct mesh_net *net, uint16_t idx)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
if (!net)
|
|
return MESH_STATUS_UNSPECIFIED_ERROR;
|
|
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(idx));
|
|
|
|
if (!subnet || !subnet->net_key_upd)
|
|
return MESH_STATUS_INVALID_NETKEY;
|
|
|
|
l_debug("Key refresh procedure phase 2: start using new net TX keys");
|
|
|
|
if (subnet->kr_phase == KEY_REFRESH_PHASE_TWO)
|
|
return MESH_STATUS_SUCCESS;
|
|
|
|
/* Stop beaconing on old key */
|
|
if (net->snb_enable)
|
|
net_key_beacon_disable(subnet->net_key_tx, false);
|
|
|
|
if (net->mpb_enable)
|
|
net_key_beacon_disable(subnet->net_key_tx, true);
|
|
|
|
subnet->key_refresh = 1;
|
|
subnet->net_key_tx = subnet->net_key_upd;
|
|
/*
|
|
* TODO: Provisioner may need to stay in phase three until
|
|
* it hears beacons from all the nodes
|
|
*/
|
|
subnet->kr_phase = KEY_REFRESH_PHASE_TWO;
|
|
|
|
/* Start beaconing on new key */
|
|
if (net->snb_enable)
|
|
net_key_beacon_enable(subnet->net_key_tx, false, 0);
|
|
|
|
if (net->mpb_enable)
|
|
net_key_beacon_enable(subnet->net_key_tx, true,
|
|
net->mpb_period);
|
|
|
|
refresh_beacon(subnet, net);
|
|
queue_friend_update(net);
|
|
|
|
l_queue_foreach(net->friends, frnd_kr_phase2, net);
|
|
|
|
if (!mesh_config_net_key_set_phase(node_config_get(net->node), idx,
|
|
KEY_REFRESH_PHASE_TWO))
|
|
return MESH_STATUS_STORAGE_FAIL;
|
|
|
|
return MESH_STATUS_SUCCESS;
|
|
}
|
|
|
|
static int key_refresh_finish(struct mesh_net *net, uint16_t idx)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
if (!net)
|
|
return MESH_STATUS_UNSPECIFIED_ERROR;
|
|
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(idx));
|
|
if (!subnet || !subnet->net_key_upd)
|
|
return MESH_STATUS_INVALID_NETKEY;
|
|
|
|
if (subnet->kr_phase == KEY_REFRESH_PHASE_NONE)
|
|
return MESH_STATUS_SUCCESS;
|
|
|
|
l_debug("Key refresh phase 3: use new keys only, discard old ones");
|
|
|
|
/* Switch to using new keys, discard old ones */
|
|
net_key_unref(subnet->net_key_cur);
|
|
subnet->net_key_tx = subnet->net_key_cur = subnet->net_key_upd;
|
|
subnet->net_key_upd = 0;
|
|
subnet->key_refresh = 0;
|
|
subnet->kr_phase = KEY_REFRESH_PHASE_NONE;
|
|
refresh_beacon(subnet, net);
|
|
queue_friend_update(net);
|
|
|
|
l_queue_foreach(net->friends, frnd_kr_phase3, net);
|
|
|
|
appkey_finalize(net, idx);
|
|
|
|
if (!mesh_config_net_key_set_phase(node_config_get(net->node), idx,
|
|
KEY_REFRESH_PHASE_NONE))
|
|
return MESH_STATUS_STORAGE_FAIL;
|
|
|
|
return MESH_STATUS_SUCCESS;
|
|
}
|
|
|
|
static bool update_kr_state(struct mesh_subnet *subnet, bool kr, uint32_t id)
|
|
{
|
|
/* Figure out the key refresh phase */
|
|
if (kr) {
|
|
if (subnet->kr_phase == KEY_REFRESH_PHASE_ONE &&
|
|
id == subnet->net_key_upd) {
|
|
l_debug("Beacon based KR phase 2 change");
|
|
return (key_refresh_phase_two(subnet->net, subnet->idx)
|
|
== MESH_STATUS_SUCCESS);
|
|
}
|
|
} else {
|
|
if (id == subnet->net_key_upd) {
|
|
l_debug("Beacon based KR phase 3 change");
|
|
return (key_refresh_finish(subnet->net, subnet->idx)
|
|
== MESH_STATUS_SUCCESS);
|
|
}
|
|
}
|
|
|
|
return false;
|
|
}
|
|
|
|
static bool update_iv_ivu_state(struct mesh_net *net, uint32_t iv_index,
|
|
bool ivu)
|
|
{
|
|
if ((iv_index - ivu) > (net->iv_index - net->iv_update)) {
|
|
/* Don't accept IV_Index changes when performing SAR Out */
|
|
if (l_queue_length(net->sar_out))
|
|
return false;
|
|
}
|
|
|
|
/* If first beacon seen, accept without judgement */
|
|
if (net->iv_upd_state == IV_UPD_INIT) {
|
|
if (ivu) {
|
|
/* Ignore beacons with IVU if IV already updated */
|
|
if (iv_index == net->iv_index && !net->iv_update)
|
|
return false;
|
|
|
|
/*
|
|
* Other devices will be accepting old or new iv_index,
|
|
* but we don't know how far through update they are.
|
|
* Starting permissive state will allow us maximum
|
|
* (96 hours) to resync
|
|
*/
|
|
l_debug("iv_upd_state = IV_UPD_UPDATING");
|
|
net->iv_upd_state = IV_UPD_UPDATING;
|
|
net->iv_update_timeout = l_timeout_create(
|
|
IV_IDX_UPD_MIN, iv_upd_to, net, NULL);
|
|
} else {
|
|
l_debug("iv_upd_state = IV_UPD_NORMAL");
|
|
net->iv_upd_state = IV_UPD_NORMAL;
|
|
}
|
|
} else if (ivu) {
|
|
/* Ignore beacons with IVU if they come too soon */
|
|
if (!net->iv_update &&
|
|
net->iv_upd_state == IV_UPD_NORMAL_HOLD) {
|
|
l_error("Update attempted too soon");
|
|
return false;
|
|
}
|
|
|
|
/* Ignore beacons with IVU if IV already updated */
|
|
if (iv_index == net->iv_index)
|
|
return false;
|
|
|
|
/* Ignore beacon with invalid IV index value */
|
|
if (net->iv_update && iv_index == net->iv_index + 1)
|
|
return false;
|
|
|
|
if (!net->iv_update) {
|
|
l_debug("iv_upd_state = IV_UPD_UPDATING");
|
|
net->iv_upd_state = IV_UPD_UPDATING;
|
|
net->iv_update_timeout = l_timeout_create(
|
|
IV_IDX_UPD_MIN, iv_upd_to, net, NULL);
|
|
}
|
|
} else if (net->iv_update) {
|
|
l_error("IVU clear attempted too soon");
|
|
return false;
|
|
}
|
|
|
|
if ((iv_index - ivu) > (net->iv_index - net->iv_update))
|
|
mesh_net_set_seq_num(net, 0);
|
|
|
|
if (ivu != net->iv_update || iv_index != net->iv_index) {
|
|
struct mesh_config *cfg = node_config_get(net->node);
|
|
|
|
mesh_config_write_iv_index(cfg, iv_index, ivu);
|
|
|
|
/* Cleanup Replay Protection List NVM */
|
|
rpl_update(net->node, iv_index);
|
|
}
|
|
|
|
node_property_changed(net->node, "IVIndex");
|
|
|
|
net->iv_index = iv_index;
|
|
net->iv_update = ivu;
|
|
queue_friend_update(net);
|
|
return true;
|
|
}
|
|
|
|
static void process_beacon(void *net_ptr, void *user_data)
|
|
{
|
|
bool updated = false;
|
|
struct mesh_net *net = net_ptr;
|
|
struct net_beacon_data *beacon_data = user_data;
|
|
uint32_t ivi;
|
|
bool ivu, kr, local_kr;
|
|
struct mesh_subnet *subnet, *primary_subnet;
|
|
|
|
ivi = beacon_data->ivi;
|
|
|
|
/* Ignore out-of-range IV_Index for this network */
|
|
if ((net->iv_index + IV_IDX_DIFF_RANGE < ivi) || (ivi < net->iv_index))
|
|
return;
|
|
|
|
/* Ignore beacons not in this universe */
|
|
subnet = l_queue_find(net->subnets, match_key_id,
|
|
L_UINT_TO_PTR(beacon_data->net_key_id));
|
|
|
|
if (!subnet)
|
|
return;
|
|
|
|
/*
|
|
* @MshPRFv1.0.1 section 3.10.5: IV Update procedure
|
|
* If this node is a member of a primary subnet and receives a Secure
|
|
* Network beacon on a secondary subnet with an IV Index greater than
|
|
* the last known IV Index of the primary subnet, the Secure Network
|
|
* beacon shall be ignored.
|
|
*/
|
|
primary_subnet = get_primary_subnet(net);
|
|
if (primary_subnet && subnet != primary_subnet && ivi > net->iv_index)
|
|
return;
|
|
|
|
/* Get IVU and KR boolean bits from beacon */
|
|
ivu = beacon_data->ivu;
|
|
kr = beacon_data->kr;
|
|
local_kr = !!(subnet->kr_phase == KEY_REFRESH_PHASE_TWO);
|
|
|
|
/* We have officially *seen* this beacon now */
|
|
beacon_data->processed = true;
|
|
|
|
/*
|
|
* Ignore local beacons and beacons that don't change anything,
|
|
* unless we're doing IV Recovery
|
|
*/
|
|
if (!beacon_data->local) {
|
|
if (net->iv_upd_state == IV_UPD_INIT || ivi != net->iv_index ||
|
|
ivu != net->iv_update)
|
|
updated |= update_iv_ivu_state(net, ivi, ivu);
|
|
|
|
if (kr != local_kr)
|
|
updated |= update_kr_state(subnet, kr,
|
|
beacon_data->net_key_id);
|
|
|
|
|
|
if (updated)
|
|
net_key_beacon_refresh(beacon_data->net_key_id,
|
|
net->iv_index,
|
|
!!(subnet->kr_phase == KEY_REFRESH_PHASE_TWO),
|
|
net->iv_update, false);
|
|
}
|
|
}
|
|
|
|
static void beacon_recv(void *user_data, struct mesh_io_recv_info *info,
|
|
const uint8_t *data, uint16_t len)
|
|
{
|
|
struct net_beacon_data beacon_data = {
|
|
.local = false,
|
|
.processed = false,
|
|
};
|
|
|
|
beacon_data.net_key_id = net_key_beacon(data, len, &beacon_data.ivi,
|
|
&beacon_data.ivu, &beacon_data.kr);
|
|
|
|
if (!beacon_data.net_key_id)
|
|
return;
|
|
|
|
l_queue_foreach(nets, process_beacon, &beacon_data);
|
|
|
|
if (beacon_data.processed)
|
|
net_key_beacon_seen(beacon_data.net_key_id);
|
|
}
|
|
|
|
void net_local_beacon(uint32_t net_key_id, uint32_t ivi, bool ivu, bool kr)
|
|
{
|
|
struct net_beacon_data beacon_data = {
|
|
.local = true,
|
|
.processed = false,
|
|
.net_key_id = net_key_id,
|
|
.ivu = ivu,
|
|
.kr = kr,
|
|
.ivi = ivi,
|
|
};
|
|
|
|
/* Deliver locally generated beacons to all nodes */
|
|
l_queue_foreach(nets, process_beacon, &beacon_data);
|
|
}
|
|
|
|
bool mesh_net_set_snb_mode(struct mesh_net *net, bool enable)
|
|
{
|
|
if (!net)
|
|
return false;
|
|
|
|
if (net->snb_enable == enable)
|
|
return true;
|
|
|
|
net->snb_enable = enable;
|
|
|
|
if (enable)
|
|
l_queue_foreach(net->subnets, refresh_beacon, net);
|
|
|
|
l_queue_foreach(net->subnets, enable_snb, net);
|
|
queue_friend_update(net);
|
|
|
|
return true;
|
|
}
|
|
|
|
bool mesh_net_set_mpb_mode(struct mesh_net *net, bool enable, uint8_t period,
|
|
bool initialize)
|
|
{
|
|
uint8_t old_period;
|
|
bool old_enable;
|
|
|
|
if (!net)
|
|
return false;
|
|
|
|
old_enable = net->mpb_enable;
|
|
old_period = net->mpb_period;
|
|
|
|
if (enable)
|
|
net->mpb_period = period;
|
|
|
|
if (old_enable == enable && old_period == net->mpb_period)
|
|
return true;
|
|
|
|
if (enable && !initialize) {
|
|
/* If enable with different period, disable and re-enable */
|
|
net->mpb_enable = false;
|
|
l_queue_foreach(net->subnets, enable_mpb, net);
|
|
}
|
|
|
|
net->mpb_enable = enable;
|
|
|
|
if (enable)
|
|
l_queue_foreach(net->subnets, refresh_beacon, net);
|
|
|
|
l_queue_foreach(net->subnets, enable_mpb, net);
|
|
queue_friend_update(net);
|
|
|
|
return true;
|
|
}
|
|
|
|
/* This function is called when network keys are restored from storage. */
|
|
bool mesh_net_set_key(struct mesh_net *net, uint16_t idx, const uint8_t *key,
|
|
const uint8_t *new_key, uint8_t phase)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
/* Current key must be always present */
|
|
if (!key)
|
|
return false;
|
|
|
|
/* If key refresh is in progress, a new key must be present */
|
|
if (phase != KEY_REFRESH_PHASE_NONE && !new_key)
|
|
return false;
|
|
|
|
/* Check if the subnet with the specified index already exists */
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(idx));
|
|
if (subnet)
|
|
return false;
|
|
|
|
subnet = add_key(net, idx, key);
|
|
if (!subnet)
|
|
return false;
|
|
|
|
if (new_key && phase)
|
|
subnet->net_key_upd = net_key_add(new_key);
|
|
|
|
/* Preserve key refresh state to generate secure beacon flags*/
|
|
if (phase == KEY_REFRESH_PHASE_TWO) {
|
|
subnet->key_refresh = 1;
|
|
subnet->net_key_tx = subnet->net_key_upd;
|
|
|
|
if (net->snb_enable) {
|
|
/* Switch beaconing key */
|
|
net_key_beacon_disable(subnet->net_key_cur, false);
|
|
net_key_beacon_enable(subnet->net_key_upd, false, 0);
|
|
}
|
|
|
|
if (net->mpb_enable) {
|
|
/* Switch beaconing key */
|
|
net_key_beacon_disable(subnet->net_key_cur, true);
|
|
net_key_beacon_enable(subnet->net_key_upd, true,
|
|
net->mpb_period);
|
|
}
|
|
}
|
|
|
|
subnet->kr_phase = phase;
|
|
|
|
net_key_beacon_refresh(subnet->net_key_tx, net->iv_index,
|
|
!!(subnet->kr_phase == KEY_REFRESH_PHASE_TWO), net->iv_update,
|
|
false);
|
|
|
|
|
|
return true;
|
|
}
|
|
|
|
bool mesh_net_attach(struct mesh_net *net, struct mesh_io *io)
|
|
{
|
|
bool first;
|
|
|
|
if (!net)
|
|
return false;
|
|
|
|
first = l_queue_isempty(nets);
|
|
if (first) {
|
|
const uint8_t snb[] = {MESH_AD_TYPE_BEACON, 1};
|
|
const uint8_t mpb[] = {MESH_AD_TYPE_BEACON, 2};
|
|
const uint8_t pkt[] = {MESH_AD_TYPE_NETWORK};
|
|
|
|
if (!nets)
|
|
nets = l_queue_new();
|
|
|
|
if (!fast_cache)
|
|
fast_cache = l_queue_new();
|
|
|
|
mesh_io_register_recv_cb(io, snb, sizeof(snb),
|
|
beacon_recv, NULL);
|
|
mesh_io_register_recv_cb(io, mpb, sizeof(mpb),
|
|
beacon_recv, NULL);
|
|
mesh_io_register_recv_cb(io, pkt, sizeof(pkt),
|
|
net_msg_recv, NULL);
|
|
}
|
|
|
|
if (l_queue_find(nets, simple_match, net))
|
|
return false;
|
|
|
|
l_queue_push_head(nets, net);
|
|
|
|
net->io = io;
|
|
|
|
return true;
|
|
}
|
|
|
|
struct mesh_io *mesh_net_detach(struct mesh_net *net)
|
|
{
|
|
const uint8_t snb[] = {MESH_AD_TYPE_BEACON, 1};
|
|
const uint8_t mpb[] = {MESH_AD_TYPE_BEACON, 2};
|
|
const uint8_t pkt[] = {MESH_AD_TYPE_NETWORK};
|
|
struct mesh_io *io;
|
|
uint8_t type = 0;
|
|
|
|
if (!net || !net->io)
|
|
return NULL;
|
|
|
|
io = net->io;
|
|
|
|
mesh_io_send_cancel(net->io, &type, 1);
|
|
|
|
/* Only deregister io if this is the last network detached.*/
|
|
if (l_queue_length(nets) < 2) {
|
|
mesh_io_deregister_recv_cb(io, snb, sizeof(snb));
|
|
mesh_io_deregister_recv_cb(io, mpb, sizeof(mpb));
|
|
mesh_io_deregister_recv_cb(io, pkt, sizeof(pkt));
|
|
}
|
|
|
|
net->io = NULL;
|
|
l_queue_remove(nets, net);
|
|
|
|
return io;
|
|
}
|
|
|
|
bool mesh_net_iv_index_update(struct mesh_net *net)
|
|
{
|
|
if (net->iv_upd_state != IV_UPD_NORMAL)
|
|
return false;
|
|
|
|
l_debug("iv_upd_state = IV_UPD_UPDATING");
|
|
l_queue_clear(net->msg_cache, l_free);
|
|
|
|
if (!mesh_config_write_iv_index(node_config_get(net->node),
|
|
net->iv_index + 1, true))
|
|
return false;
|
|
|
|
net->iv_upd_state = IV_UPD_UPDATING;
|
|
net->iv_index++;
|
|
net->iv_update = true;
|
|
l_queue_foreach(net->subnets, refresh_beacon, net);
|
|
queue_friend_update(net);
|
|
net->iv_update_timeout = l_timeout_create(
|
|
IV_IDX_UPD_MIN,
|
|
iv_upd_to, net, NULL);
|
|
|
|
return true;
|
|
}
|
|
|
|
|
|
bool mesh_net_dst_reg(struct mesh_net *net, uint16_t dst)
|
|
{
|
|
struct mesh_destination *dest = l_queue_find(net->destinations,
|
|
match_by_dst, L_UINT_TO_PTR(dst));
|
|
|
|
if (IS_UNASSIGNED(dst) || IS_ALL_NODES(dst))
|
|
return false;
|
|
|
|
if (!dest) {
|
|
dest = l_new(struct mesh_destination, 1);
|
|
|
|
if (dst < 0x8000)
|
|
l_queue_push_head(net->destinations, dest);
|
|
else
|
|
l_queue_push_tail(net->destinations, dest);
|
|
}
|
|
|
|
dest->dst = dst;
|
|
dest->ref_cnt++;
|
|
|
|
return true;
|
|
}
|
|
|
|
bool mesh_net_dst_unreg(struct mesh_net *net, uint16_t dst)
|
|
{
|
|
struct mesh_destination *dest = l_queue_find(net->destinations,
|
|
match_by_dst, L_UINT_TO_PTR(dst));
|
|
|
|
if (!dest)
|
|
return false;
|
|
|
|
if (dest->ref_cnt)
|
|
dest->ref_cnt--;
|
|
|
|
if (dest->ref_cnt)
|
|
return true;
|
|
|
|
l_queue_remove(net->destinations, dest);
|
|
|
|
l_free(dest);
|
|
return true;
|
|
}
|
|
|
|
static bool send_seg(struct mesh_net *net, uint8_t cnt, uint16_t interval,
|
|
struct mesh_sar *msg, uint8_t segO)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
uint8_t seg_len;
|
|
uint8_t gatt_data[30];
|
|
uint8_t *packet = gatt_data;
|
|
uint8_t packet_len;
|
|
uint8_t segN = SEG_MAX(msg->segmented, msg->len);
|
|
uint16_t seg_off = SEG_OFF(segO);
|
|
uint32_t seq_num;
|
|
|
|
if (msg->segmented) {
|
|
/* Send each segment on unique seq_num */
|
|
seq_num = mesh_net_next_seq_num(net);
|
|
|
|
if (msg->len - seg_off > SEG_OFF(1))
|
|
seg_len = SEG_OFF(1);
|
|
else
|
|
seg_len = msg->len - seg_off;
|
|
} else {
|
|
/* Send on same seq_num used for Access Layer */
|
|
seq_num = msg->seqAuth;
|
|
seg_len = msg->len;
|
|
}
|
|
|
|
/* Start IV Update procedure when we hit our trigger point */
|
|
if (!msg->frnd && net->seq_num > IV_UPDATE_SEQ_TRIGGER)
|
|
mesh_net_iv_index_update(net);
|
|
|
|
l_debug("segN %d segment %d seg_off %d", segN, segO, seg_off);
|
|
|
|
/* TODO: Are we RXing on an LPN's behalf? Then set RLY bit */
|
|
if (!mesh_crypto_packet_build(false, msg->ttl, seq_num, msg->src,
|
|
msg->remote, 0, msg->segmented,
|
|
msg->key_aid, msg->szmic, false,
|
|
msg->seqZero, segO, segN,
|
|
msg->buf + seg_off, seg_len,
|
|
packet + 1, &packet_len)) {
|
|
l_error("Failed to build packet");
|
|
return false;
|
|
}
|
|
|
|
print_packet("Clr-Net Tx", packet + 1, packet_len);
|
|
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(msg->net_idx));
|
|
if (!subnet)
|
|
return false;
|
|
|
|
if (!net_key_encrypt(subnet->net_key_tx, msg->iv_index, packet + 1,
|
|
packet_len)) {
|
|
l_error("Failed to encode packet");
|
|
return false;
|
|
}
|
|
|
|
send_msg_pkt(net, cnt, interval, packet, packet_len + 1);
|
|
|
|
msg->last_seg = segO;
|
|
|
|
return true;
|
|
}
|
|
|
|
void mesh_net_send_seg(struct mesh_net *net, uint32_t net_key_id,
|
|
uint32_t iv_index, uint8_t ttl, uint32_t seq,
|
|
uint16_t src, uint16_t dst, uint32_t hdr,
|
|
const void *seg, uint16_t seg_len)
|
|
{
|
|
uint8_t packet[30];
|
|
uint8_t packet_len;
|
|
bool segmented = !!((hdr >> SEG_HDR_SHIFT) & true);
|
|
uint8_t key_aid = (hdr >> KEY_HDR_SHIFT) & KEY_ID_MASK;
|
|
bool szmic = !!((hdr >> SZMIC_HDR_SHIFT) & true);
|
|
uint16_t seqZero = (hdr >> SEQ_ZERO_HDR_SHIFT) & SEQ_ZERO_MASK;
|
|
uint8_t segO = (hdr >> SEGO_HDR_SHIFT) & SEG_MASK;
|
|
uint8_t segN = (hdr >> SEGN_HDR_SHIFT) & SEG_MASK;
|
|
|
|
/*
|
|
* MshPRFv1.0.1 section 3.4.5.2, Interface output filter:
|
|
* If TTL is set to 1, message shall be dropped.
|
|
*/
|
|
if (ttl == 1)
|
|
return;
|
|
|
|
/* TODO: Only used for current POLLed segments to LPNs */
|
|
|
|
l_debug("SEQ: %6.6x", seq + segO);
|
|
l_debug("SEQ0: %6.6x", seq);
|
|
l_debug("segO: %d", segO);
|
|
|
|
if (!mesh_crypto_packet_build(false, ttl, seq, src, dst, 0,
|
|
segmented, key_aid, szmic, false,
|
|
seqZero, segO, segN, seg, seg_len,
|
|
packet + 1, &packet_len)) {
|
|
l_error("Failed to build packet");
|
|
return;
|
|
}
|
|
|
|
if (!net_key_encrypt(net_key_id, iv_index, packet + 1, packet_len)) {
|
|
l_error("Failed to encode packet");
|
|
return;
|
|
}
|
|
|
|
send_msg_pkt(net, net->tx_cnt, net->tx_interval, packet,
|
|
packet_len + 1);
|
|
|
|
l_debug("TX: Friend Seg-%d %04x -> %04x : len %u) : TTL %d : SEQ %06x",
|
|
segO, src, dst, packet_len, ttl, seq);
|
|
|
|
print_packet("TX: Friend", packet + 1, packet_len);
|
|
}
|
|
|
|
bool mesh_net_app_send(struct mesh_net *net, bool frnd_cred, uint16_t src,
|
|
uint16_t dst, uint8_t key_aid, uint16_t net_idx,
|
|
uint8_t ttl, uint8_t cnt, uint16_t interval,
|
|
uint32_t seq, uint32_t iv_index, bool segmented,
|
|
bool szmic, const void *msg, uint16_t msg_len)
|
|
{
|
|
struct mesh_sar *payload = NULL;
|
|
uint8_t seg, seg_max;
|
|
bool result;
|
|
|
|
if (!net || msg_len > 384)
|
|
return false;
|
|
|
|
if (!src)
|
|
src = net->src_addr;
|
|
|
|
if (!src || !dst)
|
|
return false;
|
|
|
|
if (ttl == DEFAULT_TTL)
|
|
ttl = net->default_ttl;
|
|
|
|
/* Long and sizmic messages *require* segmenting */
|
|
segmented |= szmic;
|
|
seg_max = SEG_MAX(segmented, msg_len);
|
|
segmented |= !!(seg_max);
|
|
|
|
/* First enqueue to any Friends and internal models */
|
|
result = msg_rxed(net, false, iv_index, ttl, seq, net_idx, src, dst,
|
|
key_aid, segmented, szmic, seq & SEQ_ZERO_MASK,
|
|
msg, msg_len);
|
|
|
|
/*
|
|
* If addressed to a unicast address and successfully enqueued,
|
|
* or delivered to one of our Unicast addresses we are done
|
|
*/
|
|
if ((result && IS_UNICAST(dst)) || src == dst ||
|
|
(dst >= net->src_addr && dst <= net->last_addr))
|
|
return true;
|
|
|
|
/*
|
|
* MshPRFv1.0.1 section 3.4.5.2, Interface output filter:
|
|
* If TTL is set to 1, message shall be dropped.
|
|
*/
|
|
if (ttl == 1)
|
|
return true;
|
|
|
|
/* Setup OTA Network send */
|
|
payload = mesh_sar_new(msg_len);
|
|
memcpy(payload->buf, msg, msg_len);
|
|
payload->len = msg_len;
|
|
payload->src = src;
|
|
payload->remote = dst;
|
|
payload->ttl = ttl;
|
|
payload->szmic = szmic;
|
|
payload->frnd_cred = frnd_cred;
|
|
payload->key_aid = key_aid;
|
|
payload->net_idx = net_idx;
|
|
payload->iv_index = mesh_net_get_iv_index(net);
|
|
payload->seqAuth = seq;
|
|
payload->segmented = segmented;
|
|
|
|
if (segmented) {
|
|
payload->flags = 0xffffffff >> (31 - seg_max);
|
|
payload->seqZero = seq & SEQ_ZERO_MASK;
|
|
payload->id = ++net->sar_id_next;
|
|
|
|
/* Single thread SAR messages to same Unicast DST */
|
|
if (l_queue_find(net->sar_out, match_sar_remote,
|
|
L_UINT_TO_PTR(dst))) {
|
|
/* Delay sending Outbound SAR unless prior
|
|
* SAR to same DST has completed */
|
|
|
|
l_debug("OB-Queued SeqZero: %4.4x", payload->seqZero);
|
|
l_queue_push_tail(net->sar_queue, payload);
|
|
return true;
|
|
}
|
|
}
|
|
|
|
result = true;
|
|
|
|
if (!IS_UNICAST(dst) && segmented) {
|
|
int i;
|
|
|
|
for (i = 0; i < 4; i++) {
|
|
for (seg = 0; seg <= seg_max && result; seg++)
|
|
result = send_seg(net, cnt, interval, payload,
|
|
seg);
|
|
}
|
|
} else {
|
|
for (seg = 0; seg <= seg_max && result; seg++)
|
|
result = send_seg(net, cnt, interval, payload, seg);
|
|
}
|
|
|
|
/* Reliable: Cache; Unreliable: Flush*/
|
|
if (result && segmented && IS_UNICAST(dst)) {
|
|
l_queue_push_head(net->sar_out, payload);
|
|
payload->seg_timeout =
|
|
l_timeout_create(SEG_TO, outseg_to, net, NULL);
|
|
payload->msg_timeout =
|
|
l_timeout_create(MSG_TO, outmsg_to, net, NULL);
|
|
payload->id = ++net->sar_id_next;
|
|
} else
|
|
mesh_sar_free(payload);
|
|
|
|
return result;
|
|
}
|
|
|
|
void mesh_net_ack_send(struct mesh_net *net, uint32_t net_key_id,
|
|
uint32_t iv_index, uint8_t ttl, uint32_t seq,
|
|
uint16_t src, uint16_t dst, bool rly, uint16_t seqZero,
|
|
uint32_t ack_flags)
|
|
{
|
|
uint32_t hdr;
|
|
uint8_t data[7];
|
|
uint8_t pkt_len;
|
|
uint8_t pkt[30];
|
|
|
|
/*
|
|
* MshPRFv1.0.1 section 3.4.5.2, Interface output filter:
|
|
* If TTL is set to 1, message shall be dropped.
|
|
*/
|
|
if (ttl == 1)
|
|
return;
|
|
|
|
hdr = NET_OP_SEG_ACKNOWLEDGE << OPCODE_HDR_SHIFT;
|
|
hdr |= rly << RELAY_HDR_SHIFT;
|
|
hdr |= (seqZero & SEQ_ZERO_MASK) << SEQ_ZERO_HDR_SHIFT;
|
|
l_put_be32(hdr, data);
|
|
l_put_be32(ack_flags, data + 3);
|
|
|
|
/* Not Segmented, no Key ID associated, no segO or segN */
|
|
if (!mesh_crypto_packet_build(true, ttl, seq, src, dst,
|
|
NET_OP_SEG_ACKNOWLEDGE, false, 0, false,
|
|
rly, seqZero, 0, 0, data + 1, 6,
|
|
pkt + 1, &pkt_len))
|
|
return;
|
|
|
|
if (!net_key_id) {
|
|
struct mesh_subnet *subnet = get_primary_subnet(net);
|
|
|
|
net_key_id = subnet->net_key_tx;
|
|
}
|
|
|
|
if (!net_key_encrypt(net_key_id, iv_index, pkt + 1, pkt_len)) {
|
|
l_error("Failed to encode packet");
|
|
return;
|
|
}
|
|
|
|
send_msg_pkt(net, net->tx_cnt, net->tx_interval, pkt, pkt_len + 1);
|
|
|
|
l_debug("TX: Friend ACK %04x -> %04x : len %u : TTL %d : SEQ %06x",
|
|
src, dst, pkt_len, ttl, seq);
|
|
print_packet("TX: Friend ACK", pkt + 1, pkt_len);
|
|
}
|
|
|
|
void mesh_net_transport_send(struct mesh_net *net, uint32_t net_key_id,
|
|
uint16_t net_idx, uint32_t iv_index,
|
|
uint8_t ttl, uint32_t seq, uint16_t src,
|
|
uint16_t dst, const uint8_t *msg,
|
|
uint16_t msg_len)
|
|
{
|
|
uint32_t use_seq = seq;
|
|
uint8_t pkt_len;
|
|
uint8_t pkt[30];
|
|
bool result = false;
|
|
|
|
if (!net->src_addr)
|
|
return;
|
|
|
|
if (!src)
|
|
src = net->src_addr;
|
|
|
|
if (src == dst)
|
|
return;
|
|
|
|
if (ttl == DEFAULT_TTL)
|
|
ttl = net->default_ttl;
|
|
|
|
/* Range check the Opcode and msg length*/
|
|
if (*msg & 0xc0 || (9 + msg_len + 8 > 29))
|
|
return;
|
|
|
|
/*
|
|
* MshPRFv1.0.1 section 3.4.5.2, Interface output filter:
|
|
* If TTL is set to 1, message shall be dropped.
|
|
*/
|
|
if (ttl == 1)
|
|
return;
|
|
|
|
/* Enqueue for Friend if forwardable and from us */
|
|
if (!net_key_id && src >= net->src_addr && src <= net->last_addr) {
|
|
uint32_t hdr = msg[0] << OPCODE_HDR_SHIFT;
|
|
uint8_t frnd_ttl = ttl;
|
|
|
|
if (friend_packet_queue(net, iv_index, true, frnd_ttl,
|
|
mesh_net_next_seq_num(net), src, dst,
|
|
hdr, msg + 1, msg_len - 1))
|
|
return;
|
|
}
|
|
|
|
/* Deliver to Local entities if applicable */
|
|
if (!(dst & 0x8000) && src >= net->src_addr && src <= net->last_addr)
|
|
result = ctl_received(net, net_key_id, iv_index, ttl,
|
|
mesh_net_next_seq_num(net), src, dst,
|
|
msg[0], 0, msg + 1, msg_len - 1);
|
|
|
|
if (!net_key_id) {
|
|
struct mesh_subnet *subnet = l_queue_find(net->subnets,
|
|
match_key_index, L_UINT_TO_PTR(net_idx));
|
|
if (!subnet)
|
|
return;
|
|
|
|
net_key_id = subnet->net_key_tx;
|
|
use_seq = mesh_net_next_seq_num(net);
|
|
|
|
if (result || (dst >= net->src_addr && dst <= net->last_addr))
|
|
return;
|
|
}
|
|
|
|
if (!mesh_crypto_packet_build(true, ttl, use_seq, src, dst, msg[0],
|
|
false, 0, false, false, 0, 0, 0, msg + 1,
|
|
msg_len - 1, pkt + 1, &pkt_len))
|
|
return;
|
|
|
|
if (!net_key_encrypt(net_key_id, iv_index, pkt + 1, pkt_len)) {
|
|
l_error("Failed to encode packet");
|
|
return;
|
|
}
|
|
|
|
if (!(IS_UNASSIGNED(dst)))
|
|
send_msg_pkt(net, net->tx_cnt, net->tx_interval, pkt,
|
|
pkt_len + 1);
|
|
}
|
|
|
|
int mesh_net_key_refresh_phase_set(struct mesh_net *net, uint16_t idx,
|
|
uint8_t transition)
|
|
{
|
|
switch (transition) {
|
|
case KEY_REFRESH_TRANS_TWO:
|
|
return key_refresh_phase_two(net, idx);
|
|
|
|
case KEY_REFRESH_TRANS_THREE:
|
|
return key_refresh_finish(net, idx);
|
|
|
|
default:
|
|
return MESH_STATUS_UNSPECIFIED_ERROR;
|
|
}
|
|
}
|
|
|
|
int mesh_net_key_refresh_phase_get(struct mesh_net *net, uint16_t idx,
|
|
uint8_t *phase)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
if (!net)
|
|
return MESH_STATUS_UNSPECIFIED_ERROR;
|
|
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(idx));
|
|
if (!subnet)
|
|
return MESH_STATUS_INVALID_NETKEY;
|
|
|
|
*phase = subnet->kr_phase;
|
|
return MESH_STATUS_SUCCESS;
|
|
}
|
|
|
|
/*
|
|
* This function is called when Configuration Server Model receives
|
|
* a NETKEY_UPDATE command
|
|
*/
|
|
int mesh_net_update_key(struct mesh_net *net, uint16_t idx,
|
|
const uint8_t *value)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
if (!net)
|
|
return MESH_STATUS_UNSPECIFIED_ERROR;
|
|
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(idx));
|
|
|
|
if (!subnet)
|
|
return MESH_STATUS_INVALID_NETKEY;
|
|
|
|
/* Check if the key has been already successfully updated */
|
|
if (subnet->kr_phase == KEY_REFRESH_PHASE_ONE &&
|
|
net_key_confirm(subnet->net_key_upd, value))
|
|
return MESH_STATUS_SUCCESS;
|
|
|
|
if (subnet->kr_phase != KEY_REFRESH_PHASE_NONE)
|
|
return MESH_STATUS_CANNOT_UPDATE;
|
|
|
|
if (subnet->net_key_upd) {
|
|
net_key_unref(subnet->net_key_upd);
|
|
l_debug("Warning: overwriting new keys");
|
|
}
|
|
|
|
/* Preserve starting data */
|
|
subnet->net_key_upd = net_key_add(value);
|
|
|
|
if (!subnet->net_key_upd) {
|
|
l_error("Failed to start key refresh phase one");
|
|
return MESH_STATUS_CANNOT_UPDATE;
|
|
}
|
|
|
|
/* If we are a Friend-Node, generate all our new keys */
|
|
l_queue_foreach(net->friends, frnd_kr_phase1,
|
|
L_UINT_TO_PTR(subnet->net_key_upd));
|
|
|
|
l_debug("key refresh phase 1: Key ID %d", subnet->net_key_upd);
|
|
|
|
if (!mesh_config_net_key_update(node_config_get(net->node), idx, value))
|
|
return MESH_STATUS_STORAGE_FAIL;
|
|
|
|
subnet->kr_phase = KEY_REFRESH_PHASE_ONE;
|
|
|
|
return MESH_STATUS_SUCCESS;
|
|
}
|
|
|
|
struct mesh_net_heartbeat_sub *mesh_net_get_heartbeat_sub(struct mesh_net *net)
|
|
{
|
|
return &net->hb_sub;
|
|
}
|
|
|
|
struct mesh_net_heartbeat_pub *mesh_net_get_heartbeat_pub(struct mesh_net *net)
|
|
{
|
|
return &net->hb_pub;
|
|
}
|
|
|
|
void mesh_net_set_iv_index(struct mesh_net *net, uint32_t index, bool update)
|
|
{
|
|
net->iv_index = index;
|
|
net->iv_update = update;
|
|
}
|
|
|
|
uint16_t mesh_net_get_primary_idx(struct mesh_net *net)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
|
|
if (!net)
|
|
return NET_IDX_INVALID;
|
|
|
|
subnet = get_primary_subnet(net);
|
|
if (!subnet)
|
|
return NET_IDX_INVALID;
|
|
|
|
return subnet->idx;
|
|
}
|
|
|
|
uint32_t mesh_net_friend_timeout(struct mesh_net *net, uint16_t addr)
|
|
{
|
|
struct mesh_friend *frnd = l_queue_find(net->friends, match_by_friend,
|
|
L_UINT_TO_PTR(addr));
|
|
|
|
if (!frnd)
|
|
return 0;
|
|
else
|
|
return frnd->poll_timeout;
|
|
}
|
|
|
|
struct l_queue *mesh_net_get_friends(struct mesh_net *net)
|
|
{
|
|
if (net)
|
|
return net->friends;
|
|
|
|
return NULL;
|
|
}
|
|
|
|
struct l_queue *mesh_net_get_negotiations(struct mesh_net *net)
|
|
{
|
|
if (net)
|
|
return net->negotiations;
|
|
|
|
return NULL;
|
|
}
|
|
|
|
struct mesh_node *mesh_net_node_get(struct mesh_net *net)
|
|
{
|
|
return net->node;
|
|
}
|
|
|
|
struct l_queue *mesh_net_get_app_keys(struct mesh_net *net)
|
|
{
|
|
if (!net)
|
|
return NULL;
|
|
|
|
if (!net->app_keys)
|
|
net->app_keys = l_queue_new();
|
|
|
|
return net->app_keys;
|
|
}
|
|
|
|
bool mesh_net_have_key(struct mesh_net *net, uint16_t idx)
|
|
{
|
|
if (!net)
|
|
return false;
|
|
|
|
return (l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(idx)) != NULL);
|
|
}
|
|
|
|
bool mesh_net_is_local_address(struct mesh_net *net, uint16_t src,
|
|
uint16_t count)
|
|
{
|
|
const uint16_t last = src + count - 1;
|
|
if (!net)
|
|
return false;
|
|
|
|
return (src >= net->src_addr && src <= net->last_addr) &&
|
|
(last >= net->src_addr && last <= net->last_addr);
|
|
}
|
|
|
|
void mesh_net_transmit_params_set(struct mesh_net *net, uint8_t count,
|
|
uint16_t interval)
|
|
{
|
|
if (!net)
|
|
return;
|
|
|
|
net->tx_interval = interval;
|
|
net->tx_cnt = count;
|
|
}
|
|
|
|
void mesh_net_transmit_params_get(struct mesh_net *net, uint8_t *count,
|
|
uint16_t *interval)
|
|
{
|
|
if (!net)
|
|
return;
|
|
|
|
*interval = net->tx_interval;
|
|
*count = net->tx_cnt;
|
|
}
|
|
|
|
struct mesh_io *mesh_net_get_io(struct mesh_net *net)
|
|
{
|
|
if (!net)
|
|
return NULL;
|
|
|
|
return net->io;
|
|
}
|
|
|
|
struct mesh_prov *mesh_net_get_prov(struct mesh_net *net)
|
|
{
|
|
if (!net)
|
|
return NULL;
|
|
|
|
return net->prov;
|
|
}
|
|
|
|
void mesh_net_set_prov(struct mesh_net *net, struct mesh_prov *prov)
|
|
{
|
|
if (!net)
|
|
return;
|
|
|
|
net->prov = prov;
|
|
}
|
|
|
|
static void refresh_instant(void *a, void *b)
|
|
{
|
|
struct mesh_subnet *subnet = a;
|
|
struct mesh_net *net = b;
|
|
uint32_t instant = net_key_beacon_last_seen(subnet->net_key_tx);
|
|
|
|
if (net->instant < instant)
|
|
net->instant = instant;
|
|
}
|
|
|
|
uint32_t mesh_net_get_instant(struct mesh_net *net)
|
|
{
|
|
if (!net)
|
|
return 0;
|
|
|
|
l_queue_foreach(net->subnets, refresh_instant, net);
|
|
|
|
return net->instant;
|
|
}
|
|
|
|
static void hb_sub_timeout_func(struct l_timeout *timeout, void *user_data)
|
|
{
|
|
struct mesh_net *net = user_data;
|
|
struct mesh_net_heartbeat_sub *sub = &net->hb_sub;
|
|
|
|
l_debug("HB Subscription Ended");
|
|
l_timeout_remove(sub->timer);
|
|
sub->timer = NULL;
|
|
sub->enabled = false;
|
|
}
|
|
|
|
static uint32_t log_to_uint32(uint8_t log)
|
|
{
|
|
if (!log)
|
|
return 0x0000;
|
|
|
|
return (1 << (log - 1));
|
|
}
|
|
|
|
int mesh_net_set_heartbeat_sub(struct mesh_net *net, uint16_t src, uint16_t dst,
|
|
uint8_t period_log)
|
|
{
|
|
struct mesh_net_heartbeat_sub *sub = &net->hb_sub;
|
|
struct timeval time_now;
|
|
|
|
if (!net)
|
|
return MESH_STATUS_UNSPECIFIED_ERROR;
|
|
|
|
/* Check if the subscription should be disabled */
|
|
if (IS_UNASSIGNED(src) || IS_UNASSIGNED(dst) || !period_log) {
|
|
if (IS_GROUP(sub->dst))
|
|
mesh_net_dst_unreg(net, sub->dst);
|
|
|
|
/* Preserve collected data, but disable */
|
|
sub->enabled = false;
|
|
sub->dst = UNASSIGNED_ADDRESS;
|
|
sub->src = UNASSIGNED_ADDRESS;
|
|
sub->period = 0;
|
|
|
|
} else {
|
|
if (sub->dst != dst) {
|
|
if (IS_GROUP(sub->dst))
|
|
mesh_net_dst_unreg(net, sub->dst);
|
|
|
|
if (IS_GROUP(dst))
|
|
mesh_net_dst_reg(net, dst);
|
|
}
|
|
|
|
sub->enabled = true;
|
|
sub->src = src;
|
|
sub->dst = dst;
|
|
sub->count = 0;
|
|
sub->period = log_to_uint32(period_log);
|
|
sub->min_hops = 0x7f;
|
|
sub->max_hops = 0x00;
|
|
gettimeofday(&time_now, NULL);
|
|
sub->start = time_now.tv_sec;
|
|
}
|
|
|
|
/* TODO: Save to node config */
|
|
|
|
if (!sub->enabled) {
|
|
l_timeout_remove(sub->timer);
|
|
sub->timer = NULL;
|
|
return MESH_STATUS_SUCCESS;
|
|
}
|
|
|
|
if (!sub->timer)
|
|
sub->timer = l_timeout_create(sub->period, hb_sub_timeout_func,
|
|
net, NULL);
|
|
else
|
|
l_timeout_modify(sub->timer, sub->period);
|
|
|
|
return MESH_STATUS_SUCCESS;
|
|
}
|
|
|
|
static void hb_pub_timeout_func(struct l_timeout *timeout, void *user_data)
|
|
{
|
|
struct mesh_net *net = user_data;
|
|
struct mesh_net_heartbeat_pub *pub = &net->hb_pub;
|
|
|
|
send_hb_publication(net);
|
|
|
|
if (pub->count != 0xffff)
|
|
pub->count--;
|
|
|
|
if (pub->count > 0)
|
|
l_timeout_modify(pub->timer, pub->period);
|
|
else {
|
|
l_timeout_remove(pub->timer);
|
|
pub->timer = NULL;
|
|
}
|
|
}
|
|
|
|
static void update_hb_pub_timer(struct mesh_net *net,
|
|
struct mesh_net_heartbeat_pub *pub)
|
|
{
|
|
if (IS_UNASSIGNED(pub->dst) || pub->count == 0) {
|
|
l_timeout_remove(pub->timer);
|
|
pub->timer = NULL;
|
|
return;
|
|
}
|
|
|
|
if (!pub->timer)
|
|
pub->timer = l_timeout_create(pub->period,
|
|
hb_pub_timeout_func, net, NULL);
|
|
else
|
|
l_timeout_modify(pub->timer, pub->period);
|
|
}
|
|
|
|
int mesh_net_set_heartbeat_pub(struct mesh_net *net, uint16_t dst,
|
|
uint16_t features, uint16_t idx, uint8_t ttl,
|
|
uint8_t count_log, uint8_t period_log)
|
|
{
|
|
struct mesh_subnet *subnet;
|
|
struct mesh_net_heartbeat_pub *pub = &net->hb_pub;
|
|
|
|
if (!net)
|
|
return MESH_STATUS_UNSPECIFIED_ERROR;
|
|
|
|
subnet = l_queue_find(net->subnets, match_key_index,
|
|
L_UINT_TO_PTR(idx));
|
|
if (!subnet)
|
|
return MESH_STATUS_INVALID_NETKEY;
|
|
|
|
pub->dst = dst;
|
|
|
|
if (pub->dst == UNASSIGNED_ADDRESS) {
|
|
pub->count = 0;
|
|
pub->period = 0;
|
|
pub->ttl = 0;
|
|
} else {
|
|
pub->count = (count_log != 0xff) ?
|
|
log_to_uint32(count_log) : 0xffff;
|
|
pub->period = log_to_uint32(period_log);
|
|
}
|
|
|
|
pub->ttl = ttl;
|
|
pub->features = features;
|
|
pub->net_idx = idx;
|
|
update_hb_pub_timer(net, pub);
|
|
|
|
/* TODO: Save to node config */
|
|
return MESH_STATUS_SUCCESS;
|
|
}
|
|
|
|
bool mesh_net_load_rpl(struct mesh_net *net)
|
|
{
|
|
return rpl_get_list(net->node, net->replay_cache);
|
|
}
|