Module: sip-router
Branch: pd/outbound
Commit: 0c3d25f4fba43ee66a6f1edf88b1abfde97668c8
URL:    
http://git.sip-router.org/cgi-bin/gitweb.cgi/sip-router/?a=commit;h=0c3d25f4fba43ee66a6f1edf88b1abfde97668c8

Author: Peter Dunkley <[email protected]>
Committer: Peter Dunkley <[email protected]>
Date:   Sat Dec 22 17:02:01 2012 +0000

modules_k/outbound: Improved flow token encode/decode.  Now should work 
properly with IPv4 and IPv6

---

 modules_k/outbound/ob_mod.c |   68 ++++++++++++++++++++++++++-----------------
 1 files changed, 41 insertions(+), 27 deletions(-)

diff --git a/modules_k/outbound/ob_mod.c b/modules_k/outbound/ob_mod.c
index 63e922f..59c02f3 100644
--- a/modules_k/outbound/ob_mod.c
+++ b/modules_k/outbound/ob_mod.c
@@ -96,20 +96,23 @@ static int mod_init(void)
 
    <HMAC-SHA1-80><protocol><dst_ip><dst_port><src_ip><src_port>
           10     +    1    +  16   +    2    +  16   +    2
-          = 47 bytes
+          = 47 bytes maximum
 
-   IP addresses will always be 16 bytes. When an IPv4 address is used the
-   address will be encoded in the first four bytes and the last four bytes will
-   be ignored.
+   <protocol> specifies whether the addresses are IPv4 or IPv6 and the
+   transport.
+               Bits 0-6:       transport (see sip_protos enum from ip_addr.h)
+               Bit 7:          IPv6 if set, IPv4 if unset      
 
-   base64 encoded size: ceiling((47+2)/3)*4 = 68 bytes
+   IP addresses will be 4 (for IPv6) or 16 (for IPv6) bytes.
+
+   Maximum base64 encoded size: ceiling((47+2)/3)*4 = 68 bytes
 */
 
-#define UNENC_FLOW_TOKEN_LENGTH        47
-#define SHA1_LENGTH            20
-#define SHA1_80_LENGTH         10
-#define FLOW_TOKEN_START_POS   (SHA1_80_LENGTH)
-static unsigned char unenc_flow_token[UNENC_FLOW_TOKEN_LENGTH];
+#define UNENC_FLOW_TOKEN_MAX_LENGTH    47
+#define SHA1_LENGTH                    20
+#define SHA1_80_LENGTH                 10
+#define FLOW_TOKEN_START_POS           (SHA1_80_LENGTH)
+static unsigned char unenc_flow_token[UNENC_FLOW_TOKEN_MAX_LENGTH];
 static unsigned char hmac_sha1[EVP_MAX_MD_SIZE];
 
 int encode_flow_token(str *flow_token, struct receive_info rcv)
@@ -123,16 +126,17 @@ int encode_flow_token(str *flow_token, struct 
receive_info rcv)
        }
 
        /* Encode protocol information */
-       unenc_flow_token[pos++] = rcv.proto;
+       unenc_flow_token[pos++] = 
+               (rcv.dst_ip.af == AF_INET6 ? 0x80 : 0x00) | rcv.proto;
 
        /* Encode destination address */
-       for (i = 0; i < 16; i++)
+       for (i = 0; i < (rcv.dst_ip.af == AF_INET6 ? 16 : 4); i++)
                unenc_flow_token[pos++] = rcv.dst_ip.u.addr[i];
        unenc_flow_token[pos++] = (rcv.dst_port >> 8) & 0xff;
        unenc_flow_token[pos++] =  rcv.dst_port       & 0xff;
 
        /* Encode source address */
-       for (i = 0; i < 16; i++)
+       for (i = 0; i < (rcv.src_ip.af == AF_INET6 ? 16 : 4); i++)
                unenc_flow_token[pos++] = rcv.src_ip.u.addr[i];
        unenc_flow_token[pos++] = (rcv.dst_port >> 8) & 0xff;
        unenc_flow_token[pos++] =  rcv.dst_port       & 0xff;
@@ -141,46 +145,46 @@ int encode_flow_token(str *flow_token, struct 
receive_info rcv)
           prepend onto the flow token */
        HMAC(EVP_sha1(), ob_key.s, ob_key.len,
                &unenc_flow_token[FLOW_TOKEN_START_POS],
-               UNENC_FLOW_TOKEN_LENGTH - FLOW_TOKEN_START_POS,
+               pos - FLOW_TOKEN_START_POS,
                hmac_sha1, NULL);
        memcpy(unenc_flow_token, &hmac_sha1[SHA1_LENGTH - SHA1_80_LENGTH],
                SHA1_80_LENGTH);
 
        /* base64 encode the entire flow token and store for the caller to
           use */
-       flow_token->s = pkg_malloc(base64_enc_len(UNENC_FLOW_TOKEN_LENGTH));
+       flow_token->s = pkg_malloc(base64_enc_len(pos));
        if (flow_token->s == NULL)
        {
                LM_ERR("allocating package memory\n");
                return -1;
        }
-       flow_token->len = base64_enc(unenc_flow_token, UNENC_FLOW_TOKEN_LENGTH,
+       flow_token->len = base64_enc(unenc_flow_token, pos,
                                (unsigned char *) flow_token->s,
-                               base64_enc_len(UNENC_FLOW_TOKEN_LENGTH));
+                               base64_enc_len(pos));
 
        return 0;
 }
 
 int decode_flow_token(struct receive_info *rcv, str flow_token)
 {
-       int pos = FLOW_TOKEN_START_POS, i;
+       int pos = FLOW_TOKEN_START_POS, flow_length, i;
 
-       if (flow_token.len != base64_enc_len(UNENC_FLOW_TOKEN_LENGTH))
+       if (flow_token.len > base64_enc_len(UNENC_FLOW_TOKEN_MAX_LENGTH))
        {
-               LM_ERR("bad flow token length.  Length is %d, expected %d\n",
-                       flow_token.len, UNENC_FLOW_TOKEN_LENGTH);
+               LM_ERR("bad flow token length.  Length is %d, expected <= %d\n",
+                       flow_token.len, UNENC_FLOW_TOKEN_MAX_LENGTH);
                return -1;
        }
 
        /* base64 decode the flow token */
-       base64_dec((unsigned char *) flow_token.s, flow_token.len,
-                       unenc_flow_token, UNENC_FLOW_TOKEN_LENGTH);
+       flow_length = base64_dec((unsigned char *) flow_token.s, flow_token.len,
+                       unenc_flow_token, UNENC_FLOW_TOKEN_MAX_LENGTH);
 
        /* HMAC-SHA1 the flow token (after the hash) and compare with the
           truncated hash at the start of the flow token. */
        HMAC(EVP_sha1(), ob_key.s, ob_key.len,
                &unenc_flow_token[FLOW_TOKEN_START_POS],
-               UNENC_FLOW_TOKEN_LENGTH - FLOW_TOKEN_START_POS,
+               flow_length - FLOW_TOKEN_START_POS,
                hmac_sha1, NULL);
        if (memcmp(unenc_flow_token, &hmac_sha1[SHA1_LENGTH - SHA1_80_LENGTH],
                SHA1_80_LENGTH) != 0)
@@ -190,16 +194,26 @@ int decode_flow_token(struct receive_info *rcv, str 
flow_token)
        }
 
        /* Decode protocol information */
-       rcv->proto = unenc_flow_token[pos++];
+       if (unenc_flow_token[pos] & 0x80)
+       {
+               rcv->dst_ip.af = rcv->src_ip.af = AF_INET6;
+               rcv->dst_ip.len = rcv->src_ip.len = 16;
+       }
+       else
+       {
+               rcv->dst_ip.af = rcv->src_ip.af = AF_INET;
+               rcv->dst_ip.len = rcv->src_ip.len = 4;
+       }
+       rcv->proto = unenc_flow_token[pos++] & 0x7f;
 
        /* Decode destination address */
-       for (i = 0; i < 16; i++)
+       for (i = 0; i < (rcv->dst_ip.af == AF_INET6 ? 16 : 4); i++)
                rcv->dst_ip.u.addr[i] = unenc_flow_token[pos++];
        rcv->dst_port = ((unenc_flow_token[pos++] << 8) & 0xff)
                                | (unenc_flow_token[pos++] & 0xff);
 
        /* Decode source address */
-       for (i = 0; i < 16; i++)
+       for (i = 0; i < (rcv->src_ip.af == AF_INET6 ? 16 : 4); i++)
                rcv->src_ip.u.addr[i] = unenc_flow_token[pos++];
        rcv->src_port = ((unenc_flow_token[pos++] << 8) & 0xff)
                                | (unenc_flow_token[pos++] & 0xff);


_______________________________________________
sr-dev mailing list
[email protected]
http://lists.sip-router.org/cgi-bin/mailman/listinfo/sr-dev

Reply via email to