2 * fsm.c - {Link, IP} Control Protocol Finite State Machine.
4 * Copyright (c) 1984-2000 Carnegie Mellon University. All rights reserved.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in
15 * the documentation and/or other materials provided with the
18 * 3. The name "Carnegie Mellon University" must not be used to
19 * endorse or promote products derived from this software without
20 * prior written permission. For permission or any legal
21 * details, please contact
22 * Office of Technology Transfer
23 * Carnegie Mellon University
25 * Pittsburgh, PA 15213-3890
26 * (412) 268-4387, fax: (412) 268-7395
27 * tech-transfer@andrew.cmu.edu
29 * 4. Redistributions of any form whatsoever must retain the following
31 * "This product includes software developed by Computing Services
32 * at Carnegie Mellon University (http://www.cmu.edu/computing/)."
34 * CARNEGIE MELLON UNIVERSITY DISCLAIMS ALL WARRANTIES WITH REGARD TO
35 * THIS SOFTWARE, INCLUDING ALL IMPLIED WARRANTIES OF MERCHANTABILITY
36 * AND FITNESS, IN NO EVENT SHALL CARNEGIE MELLON UNIVERSITY BE LIABLE
37 * FOR ANY SPECIAL, INDIRECT OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
38 * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN
39 * AN ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING
40 * OUT OF OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
43 #define RCSID "$Id: fsm.c,v 1.20 2003/06/29 10:06:14 paulus Exp $"
47 * Randomize fsm id on link/init.
48 * Deal with variable outgoing MTU.
53 #include <sys/types.h>
58 static const char rcsid[] = RCSID;
60 static void fsm_timeout __P((void *));
61 static void fsm_rconfreq __P((fsm *, int, u_char *, int));
62 static void fsm_rconfack __P((fsm *, int, u_char *, int));
63 static void fsm_rconfnakrej __P((fsm *, int, int, u_char *, int));
64 static void fsm_rtermreq __P((fsm *, int, u_char *, int));
65 static void fsm_rtermack __P((fsm *));
66 static void fsm_rcoderej __P((fsm *, u_char *, int));
67 static void fsm_sconfreq __P((fsm *, int));
69 #define PROTO_NAME(f) ((f)->callbacks->proto_name)
71 int peer_mru[NUM_PPP];
75 * fsm_init - Initialize fsm.
77 * Initialize fsm state.
85 f->id = 0; /* XXX Start with random id? */
86 f->timeouttime = DEFTIMEOUT;
87 f->maxconfreqtransmits = DEFMAXCONFREQS;
88 f->maxtermtransmits = DEFMAXTERMREQS;
89 f->maxnakloops = DEFMAXNAKLOOPS;
90 f->term_reason_len = 0;
95 * fsm_lowerup - The lower layer is up.
107 if( f->flags & OPT_SILENT )
110 /* Send an initial configure-request */
117 FSMDEBUG(("%s: Up event in state %d!", PROTO_NAME(f), f->state));
123 * fsm_lowerdown - The lower layer is down.
125 * Cancel all timeouts and inform upper layers.
138 if( f->callbacks->starting )
139 (*f->callbacks->starting)(f);
144 UNTIMEOUT(fsm_timeout, f); /* Cancel timeout */
152 UNTIMEOUT(fsm_timeout, f); /* Cancel timeout */
156 if( f->callbacks->down )
157 (*f->callbacks->down)(f);
162 FSMDEBUG(("%s: Down event in state %d!", PROTO_NAME(f), f->state));
168 * fsm_open - Link is allowed to come up.
177 if( f->callbacks->starting )
178 (*f->callbacks->starting)(f);
182 if( f->flags & OPT_SILENT )
185 /* Send an initial configure-request */
196 if( f->flags & OPT_RESTART ){
206 * fsm_close - Start closing connection.
208 * Cancel timeouts and either initiate close or possibly go directly to
216 f->term_reason = reason;
217 f->term_reason_len = (reason == NULL? 0: strlen(reason));
233 if( f->state != OPENED )
234 UNTIMEOUT(fsm_timeout, f); /* Cancel timeout */
235 else if( f->callbacks->down )
236 (*f->callbacks->down)(f); /* Inform upper layers we're down */
238 /* Init restart counter, send Terminate-Request */
239 f->retransmits = f->maxtermtransmits;
240 fsm_sdata(f, TERMREQ, f->reqid = ++f->id,
241 (u_char *) f->term_reason, f->term_reason_len);
242 TIMEOUT(fsm_timeout, f, f->timeouttime);
252 * fsm_timeout - Timeout expired.
258 fsm *f = (fsm *) arg;
263 if( f->retransmits <= 0 ){
265 * We've waited for an ack long enough. Peer probably heard us.
267 f->state = (f->state == CLOSING)? CLOSED: STOPPED;
268 if( f->callbacks->finished )
269 (*f->callbacks->finished)(f);
271 /* Send Terminate-Request */
272 fsm_sdata(f, TERMREQ, f->reqid = ++f->id,
273 (u_char *) f->term_reason, f->term_reason_len);
274 TIMEOUT(fsm_timeout, f, f->timeouttime);
282 if (f->retransmits <= 0) {
283 warn("%s: timeout sending Config-Requests\n", PROTO_NAME(f));
285 if( (f->flags & OPT_PASSIVE) == 0 && f->callbacks->finished )
286 (*f->callbacks->finished)(f);
289 /* Retransmit the configure-request */
290 if (f->callbacks->retransmit)
291 (*f->callbacks->retransmit)(f);
292 fsm_sconfreq(f, 1); /* Re-send Configure-Request */
293 if( f->state == ACKRCVD )
299 FSMDEBUG(("%s: Timeout event in state %d!", PROTO_NAME(f), f->state));
305 * fsm_input - Input packet.
308 fsm_input(f, inpacket, l)
318 * Parse header (code, id and length).
319 * If packet too short, drop it.
323 FSMDEBUG(("fsm_input(%x): Rcvd short header.", f->protocol));
329 if (len < HEADERLEN) {
330 FSMDEBUG(("fsm_input(%x): Rcvd illegal length.", f->protocol));
334 FSMDEBUG(("fsm_input(%x): Rcvd short packet.", f->protocol));
337 len -= HEADERLEN; /* subtract header length */
339 if( f->state == INITIAL || f->state == STARTING ){
340 FSMDEBUG(("fsm_input(%x): Rcvd packet in state %d.",
341 f->protocol, f->state));
346 * Action depends on code.
350 fsm_rconfreq(f, id, inp, len);
354 fsm_rconfack(f, id, inp, len);
359 fsm_rconfnakrej(f, code, id, inp, len);
363 fsm_rtermreq(f, id, inp, len);
371 fsm_rcoderej(f, inp, len);
375 if( !f->callbacks->extcode
376 || !(*f->callbacks->extcode)(f, code, id, inp, len) )
377 fsm_sdata(f, CODEREJ, ++f->id, inpacket, len + HEADERLEN);
384 * fsm_rconfreq - Receive Configure-Request.
387 fsm_rconfreq(f, id, inp, len)
393 int code, reject_if_disagree;
397 /* Go away, we're closed */
398 fsm_sdata(f, TERMACK, id, NULL, 0);
405 /* Go down and restart negotiation */
406 if( f->callbacks->down )
407 (*f->callbacks->down)(f); /* Inform upper layers */
408 fsm_sconfreq(f, 0); /* Send initial Configure-Request */
413 /* Negotiation started by our peer */
414 fsm_sconfreq(f, 0); /* Send initial Configure-Request */
420 * Pass the requested configuration options
421 * to protocol-specific code for checking.
423 if (f->callbacks->reqci){ /* Check CI */
424 reject_if_disagree = (f->nakloops >= f->maxnakloops);
425 code = (*f->callbacks->reqci)(f, inp, &len, reject_if_disagree);
427 code = CONFREJ; /* Reject all CI */
431 /* send the Ack, Nak or Rej to the peer */
432 fsm_sdata(f, code, id, inp, len);
434 if (code == CONFACK) {
435 if (f->state == ACKRCVD) {
436 UNTIMEOUT(fsm_timeout, f); /* Cancel timeout */
438 if (f->callbacks->up)
439 (*f->callbacks->up)(f); /* Inform upper layers */
445 /* we sent CONFACK or CONFREJ */
446 if (f->state != ACKRCVD)
448 if( code == CONFNAK )
455 * fsm_rconfack - Receive Configure-Ack.
458 fsm_rconfack(f, id, inp, len)
464 if (id != f->reqid || f->seen_ack) /* Expected id? */
465 return; /* Nope, toss... */
466 if( !(f->callbacks->ackci? (*f->callbacks->ackci)(f, inp, len):
468 /* Ack is bad - ignore it */
469 error("Received bad configure-ack: %P", inp, len);
477 fsm_sdata(f, TERMACK, id, NULL, 0);
482 f->retransmits = f->maxconfreqtransmits;
486 /* Huh? an extra valid Ack? oh well... */
487 UNTIMEOUT(fsm_timeout, f); /* Cancel timeout */
493 UNTIMEOUT(fsm_timeout, f); /* Cancel timeout */
495 f->retransmits = f->maxconfreqtransmits;
496 if (f->callbacks->up)
497 (*f->callbacks->up)(f); /* Inform upper layers */
501 /* Go down and restart negotiation */
502 if (f->callbacks->down)
503 (*f->callbacks->down)(f); /* Inform upper layers */
504 fsm_sconfreq(f, 0); /* Send initial Configure-Request */
512 * fsm_rconfnakrej - Receive Configure-Nak or Configure-Reject.
515 fsm_rconfnakrej(f, code, id, inp, len)
521 int (*proc) __P((fsm *, u_char *, int));
524 if (id != f->reqid || f->seen_ack) /* Expected id? */
525 return; /* Nope, toss... */
526 proc = (code == CONFNAK)? f->callbacks->nakci: f->callbacks->rejci;
527 if (!proc || !(ret = proc(f, inp, len))) {
528 /* Nak/reject is bad - ignore it */
529 error("Received bad configure-nak/rej: %P", inp, len);
537 fsm_sdata(f, TERMACK, id, NULL, 0);
542 /* They didn't agree to what we wanted - try another request */
543 UNTIMEOUT(fsm_timeout, f); /* Cancel timeout */
545 f->state = STOPPED; /* kludge for stopping CCP */
547 fsm_sconfreq(f, 0); /* Send Configure-Request */
551 /* Got a Nak/reject when we had already had an Ack?? oh well... */
552 UNTIMEOUT(fsm_timeout, f); /* Cancel timeout */
558 /* Go down and restart negotiation */
559 if (f->callbacks->down)
560 (*f->callbacks->down)(f); /* Inform upper layers */
561 fsm_sconfreq(f, 0); /* Send initial Configure-Request */
569 * fsm_rtermreq - Receive Terminate-Req.
572 fsm_rtermreq(f, id, p, len)
581 f->state = REQSENT; /* Start over but keep trying */
586 info("%s terminated by peer (%0.*v)", PROTO_NAME(f), len, p);
588 info("%s terminated by peer", PROTO_NAME(f));
591 if (f->callbacks->down)
592 (*f->callbacks->down)(f); /* Inform upper layers */
593 TIMEOUT(fsm_timeout, f, f->timeouttime);
597 fsm_sdata(f, TERMACK, id, NULL, 0);
602 * fsm_rtermack - Receive Terminate-Ack.
610 UNTIMEOUT(fsm_timeout, f);
612 if( f->callbacks->finished )
613 (*f->callbacks->finished)(f);
616 UNTIMEOUT(fsm_timeout, f);
618 if( f->callbacks->finished )
619 (*f->callbacks->finished)(f);
627 if (f->callbacks->down)
628 (*f->callbacks->down)(f); /* Inform upper layers */
637 * fsm_rcoderej - Receive an Code-Reject.
640 fsm_rcoderej(f, inp, len)
647 if (len < HEADERLEN) {
648 FSMDEBUG(("fsm_rcoderej: Rcvd short Code-Reject packet!"));
653 warn("%s: Rcvd Code-Reject for code %d, id %d", PROTO_NAME(f), code, id);
655 if( f->state == ACKRCVD )
661 * fsm_protreject - Peer doesn't speak this protocol.
663 * Treat this as a catastrophic error (RXJ-).
671 UNTIMEOUT(fsm_timeout, f); /* Cancel timeout */
675 if( f->callbacks->finished )
676 (*f->callbacks->finished)(f);
683 UNTIMEOUT(fsm_timeout, f); /* Cancel timeout */
687 if( f->callbacks->finished )
688 (*f->callbacks->finished)(f);
692 if( f->callbacks->down )
693 (*f->callbacks->down)(f);
695 /* Init restart counter, send Terminate-Request */
696 f->retransmits = f->maxtermtransmits;
697 fsm_sdata(f, TERMREQ, f->reqid = ++f->id,
698 (u_char *) f->term_reason, f->term_reason_len);
699 TIMEOUT(fsm_timeout, f, f->timeouttime);
706 FSMDEBUG(("%s: Protocol-reject event in state %d!",
707 PROTO_NAME(f), f->state));
713 * fsm_sconfreq - Send a Configure-Request.
716 fsm_sconfreq(f, retransmit)
723 if( f->state != REQSENT && f->state != ACKRCVD && f->state != ACKSENT ){
724 /* Not currently negotiating - reset options */
725 if( f->callbacks->resetci )
726 (*f->callbacks->resetci)(f);
731 /* New request - reset retransmission counter, use new ID */
732 f->retransmits = f->maxconfreqtransmits;
739 * Make up the request packet
741 outp = outpacket_buf + PPP_HDRLEN + HEADERLEN;
742 if( f->callbacks->cilen && f->callbacks->addci ){
743 cilen = (*f->callbacks->cilen)(f);
744 if( cilen > peer_mru[f->unit] - HEADERLEN )
745 cilen = peer_mru[f->unit] - HEADERLEN;
746 if (f->callbacks->addci)
747 (*f->callbacks->addci)(f, outp, &cilen);
751 /* send the request to our peer */
752 fsm_sdata(f, CONFREQ, f->reqid, outp, cilen);
754 /* start the retransmit timer */
756 TIMEOUT(fsm_timeout, f, f->timeouttime);
761 * fsm_sdata - Send some data.
763 * Used for all packets sent to our peer by this module.
766 fsm_sdata(f, code, id, data, datalen)
775 /* Adjust length to be smaller than MTU */
776 outp = outpacket_buf;
777 if (datalen > peer_mru[f->unit] - HEADERLEN)
778 datalen = peer_mru[f->unit] - HEADERLEN;
779 if (datalen && data != outp + PPP_HDRLEN + HEADERLEN)
780 BCOPY(data, outp + PPP_HDRLEN + HEADERLEN, datalen);
781 outlen = datalen + HEADERLEN;
782 MAKEHEADER(outp, f->protocol);
785 PUTSHORT(outlen, outp);
786 output(f->unit, outpacket_buf, outlen + PPP_HDRLEN);