Linux kernel mirror (for testing) git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git
kernel os linux
1
fork

Configure Feed

Select the types of activity you want to include in your feed.

at v2.6.31-rc1 719 lines 18 kB view raw
1 2/* 3 * DECnet An implementation of the DECnet protocol suite for the LINUX 4 * operating system. DECnet is implemented using the BSD Socket 5 * interface as the means of communication with the user level. 6 * 7 * DECnet Network Services Protocol (Output) 8 * 9 * Author: Eduardo Marcelo Serrat <emserrat@geocities.com> 10 * 11 * Changes: 12 * 13 * Steve Whitehouse: Split into dn_nsp_in.c and dn_nsp_out.c from 14 * original dn_nsp.c. 15 * Steve Whitehouse: Updated to work with my new routing architecture. 16 * Steve Whitehouse: Added changes from Eduardo Serrat's patches. 17 * Steve Whitehouse: Now conninits have the "return" bit set. 18 * Steve Whitehouse: Fixes to check alloc'd skbs are non NULL! 19 * Moved output state machine into one function 20 * Steve Whitehouse: New output state machine 21 * Paul Koning: Connect Confirm message fix. 22 * Eduardo Serrat: Fix to stop dn_nsp_do_disc() sending malformed packets. 23 * Steve Whitehouse: dn_nsp_output() and friends needed a spring clean 24 * Steve Whitehouse: Moved dn_nsp_send() in here from route.h 25 */ 26 27/****************************************************************************** 28 (c) 1995-1998 E.M. Serrat emserrat@geocities.com 29 30 This program is free software; you can redistribute it and/or modify 31 it under the terms of the GNU General Public License as published by 32 the Free Software Foundation; either version 2 of the License, or 33 any later version. 34 35 This program is distributed in the hope that it will be useful, 36 but WITHOUT ANY WARRANTY; without even the implied warranty of 37 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the 38 GNU General Public License for more details. 39*******************************************************************************/ 40 41#include <linux/errno.h> 42#include <linux/types.h> 43#include <linux/socket.h> 44#include <linux/in.h> 45#include <linux/kernel.h> 46#include <linux/timer.h> 47#include <linux/string.h> 48#include <linux/sockios.h> 49#include <linux/net.h> 50#include <linux/netdevice.h> 51#include <linux/inet.h> 52#include <linux/route.h> 53#include <net/sock.h> 54#include <asm/system.h> 55#include <linux/fcntl.h> 56#include <linux/mm.h> 57#include <linux/termios.h> 58#include <linux/interrupt.h> 59#include <linux/proc_fs.h> 60#include <linux/stat.h> 61#include <linux/init.h> 62#include <linux/poll.h> 63#include <linux/if_packet.h> 64#include <net/neighbour.h> 65#include <net/dst.h> 66#include <net/flow.h> 67#include <net/dn.h> 68#include <net/dn_nsp.h> 69#include <net/dn_dev.h> 70#include <net/dn_route.h> 71 72 73static int nsp_backoff[NSP_MAXRXTSHIFT + 1] = { 1, 2, 4, 8, 16, 32, 64, 64, 64, 64, 64, 64, 64 }; 74 75static void dn_nsp_send(struct sk_buff *skb) 76{ 77 struct sock *sk = skb->sk; 78 struct dn_scp *scp = DN_SK(sk); 79 struct dst_entry *dst; 80 struct flowi fl; 81 82 skb_reset_transport_header(skb); 83 scp->stamp = jiffies; 84 85 dst = sk_dst_check(sk, 0); 86 if (dst) { 87try_again: 88 skb_dst_set(skb, dst); 89 dst_output(skb); 90 return; 91 } 92 93 memset(&fl, 0, sizeof(fl)); 94 fl.oif = sk->sk_bound_dev_if; 95 fl.fld_src = dn_saddr2dn(&scp->addr); 96 fl.fld_dst = dn_saddr2dn(&scp->peer); 97 dn_sk_ports_copy(&fl, scp); 98 fl.proto = DNPROTO_NSP; 99 if (dn_route_output_sock(&sk->sk_dst_cache, &fl, sk, 0) == 0) { 100 dst = sk_dst_get(sk); 101 sk->sk_route_caps = dst->dev->features; 102 goto try_again; 103 } 104 105 sk->sk_err = EHOSTUNREACH; 106 if (!sock_flag(sk, SOCK_DEAD)) 107 sk->sk_state_change(sk); 108} 109 110 111/* 112 * If sk == NULL, then we assume that we are supposed to be making 113 * a routing layer skb. If sk != NULL, then we are supposed to be 114 * creating an skb for the NSP layer. 115 * 116 * The eventual aim is for each socket to have a cached header size 117 * for its outgoing packets, and to set hdr from this when sk != NULL. 118 */ 119struct sk_buff *dn_alloc_skb(struct sock *sk, int size, gfp_t pri) 120{ 121 struct sk_buff *skb; 122 int hdr = 64; 123 124 if ((skb = alloc_skb(size + hdr, pri)) == NULL) 125 return NULL; 126 127 skb->protocol = htons(ETH_P_DNA_RT); 128 skb->pkt_type = PACKET_OUTGOING; 129 130 if (sk) 131 skb_set_owner_w(skb, sk); 132 133 skb_reserve(skb, hdr); 134 135 return skb; 136} 137 138/* 139 * Calculate persist timer based upon the smoothed round 140 * trip time and the variance. Backoff according to the 141 * nsp_backoff[] array. 142 */ 143unsigned long dn_nsp_persist(struct sock *sk) 144{ 145 struct dn_scp *scp = DN_SK(sk); 146 147 unsigned long t = ((scp->nsp_srtt >> 2) + scp->nsp_rttvar) >> 1; 148 149 t *= nsp_backoff[scp->nsp_rxtshift]; 150 151 if (t < HZ) t = HZ; 152 if (t > (600*HZ)) t = (600*HZ); 153 154 if (scp->nsp_rxtshift < NSP_MAXRXTSHIFT) 155 scp->nsp_rxtshift++; 156 157 /* printk(KERN_DEBUG "rxtshift %lu, t=%lu\n", scp->nsp_rxtshift, t); */ 158 159 return t; 160} 161 162/* 163 * This is called each time we get an estimate for the rtt 164 * on the link. 165 */ 166static void dn_nsp_rtt(struct sock *sk, long rtt) 167{ 168 struct dn_scp *scp = DN_SK(sk); 169 long srtt = (long)scp->nsp_srtt; 170 long rttvar = (long)scp->nsp_rttvar; 171 long delta; 172 173 /* 174 * If the jiffies clock flips over in the middle of timestamp 175 * gathering this value might turn out negative, so we make sure 176 * that is it always positive here. 177 */ 178 if (rtt < 0) 179 rtt = -rtt; 180 /* 181 * Add new rtt to smoothed average 182 */ 183 delta = ((rtt << 3) - srtt); 184 srtt += (delta >> 3); 185 if (srtt >= 1) 186 scp->nsp_srtt = (unsigned long)srtt; 187 else 188 scp->nsp_srtt = 1; 189 190 /* 191 * Add new rtt varience to smoothed varience 192 */ 193 delta >>= 1; 194 rttvar += ((((delta>0)?(delta):(-delta)) - rttvar) >> 2); 195 if (rttvar >= 1) 196 scp->nsp_rttvar = (unsigned long)rttvar; 197 else 198 scp->nsp_rttvar = 1; 199 200 /* printk(KERN_DEBUG "srtt=%lu rttvar=%lu\n", scp->nsp_srtt, scp->nsp_rttvar); */ 201} 202 203/** 204 * dn_nsp_clone_and_send - Send a data packet by cloning it 205 * @skb: The packet to clone and transmit 206 * @gfp: memory allocation flag 207 * 208 * Clone a queued data or other data packet and transmit it. 209 * 210 * Returns: The number of times the packet has been sent previously 211 */ 212static inline unsigned dn_nsp_clone_and_send(struct sk_buff *skb, 213 gfp_t gfp) 214{ 215 struct dn_skb_cb *cb = DN_SKB_CB(skb); 216 struct sk_buff *skb2; 217 int ret = 0; 218 219 if ((skb2 = skb_clone(skb, gfp)) != NULL) { 220 ret = cb->xmit_count; 221 cb->xmit_count++; 222 cb->stamp = jiffies; 223 skb2->sk = skb->sk; 224 dn_nsp_send(skb2); 225 } 226 227 return ret; 228} 229 230/** 231 * dn_nsp_output - Try and send something from socket queues 232 * @sk: The socket whose queues are to be investigated 233 * 234 * Try and send the packet on the end of the data and other data queues. 235 * Other data gets priority over data, and if we retransmit a packet we 236 * reduce the window by dividing it in two. 237 * 238 */ 239void dn_nsp_output(struct sock *sk) 240{ 241 struct dn_scp *scp = DN_SK(sk); 242 struct sk_buff *skb; 243 unsigned reduce_win = 0; 244 245 /* 246 * First we check for otherdata/linkservice messages 247 */ 248 if ((skb = skb_peek(&scp->other_xmit_queue)) != NULL) 249 reduce_win = dn_nsp_clone_and_send(skb, GFP_ATOMIC); 250 251 /* 252 * If we may not send any data, we don't. 253 * If we are still trying to get some other data down the 254 * channel, we don't try and send any data. 255 */ 256 if (reduce_win || (scp->flowrem_sw != DN_SEND)) 257 goto recalc_window; 258 259 if ((skb = skb_peek(&scp->data_xmit_queue)) != NULL) 260 reduce_win = dn_nsp_clone_and_send(skb, GFP_ATOMIC); 261 262 /* 263 * If we've sent any frame more than once, we cut the 264 * send window size in half. There is always a minimum 265 * window size of one available. 266 */ 267recalc_window: 268 if (reduce_win) { 269 scp->snd_window >>= 1; 270 if (scp->snd_window < NSP_MIN_WINDOW) 271 scp->snd_window = NSP_MIN_WINDOW; 272 } 273} 274 275int dn_nsp_xmit_timeout(struct sock *sk) 276{ 277 struct dn_scp *scp = DN_SK(sk); 278 279 dn_nsp_output(sk); 280 281 if (!skb_queue_empty(&scp->data_xmit_queue) || 282 !skb_queue_empty(&scp->other_xmit_queue)) 283 scp->persist = dn_nsp_persist(sk); 284 285 return 0; 286} 287 288static inline __le16 *dn_mk_common_header(struct dn_scp *scp, struct sk_buff *skb, unsigned char msgflag, int len) 289{ 290 unsigned char *ptr = skb_push(skb, len); 291 292 BUG_ON(len < 5); 293 294 *ptr++ = msgflag; 295 *((__le16 *)ptr) = scp->addrrem; 296 ptr += 2; 297 *((__le16 *)ptr) = scp->addrloc; 298 ptr += 2; 299 return (__le16 __force *)ptr; 300} 301 302static __le16 *dn_mk_ack_header(struct sock *sk, struct sk_buff *skb, unsigned char msgflag, int hlen, int other) 303{ 304 struct dn_scp *scp = DN_SK(sk); 305 unsigned short acknum = scp->numdat_rcv & 0x0FFF; 306 unsigned short ackcrs = scp->numoth_rcv & 0x0FFF; 307 __le16 *ptr; 308 309 BUG_ON(hlen < 9); 310 311 scp->ackxmt_dat = acknum; 312 scp->ackxmt_oth = ackcrs; 313 acknum |= 0x8000; 314 ackcrs |= 0x8000; 315 316 /* If this is an "other data/ack" message, swap acknum and ackcrs */ 317 if (other) { 318 unsigned short tmp = acknum; 319 acknum = ackcrs; 320 ackcrs = tmp; 321 } 322 323 /* Set "cross subchannel" bit in ackcrs */ 324 ackcrs |= 0x2000; 325 326 ptr = (__le16 *)dn_mk_common_header(scp, skb, msgflag, hlen); 327 328 *ptr++ = cpu_to_le16(acknum); 329 *ptr++ = cpu_to_le16(ackcrs); 330 331 return ptr; 332} 333 334static __le16 *dn_nsp_mk_data_header(struct sock *sk, struct sk_buff *skb, int oth) 335{ 336 struct dn_scp *scp = DN_SK(sk); 337 struct dn_skb_cb *cb = DN_SKB_CB(skb); 338 __le16 *ptr = dn_mk_ack_header(sk, skb, cb->nsp_flags, 11, oth); 339 340 if (unlikely(oth)) { 341 cb->segnum = scp->numoth; 342 seq_add(&scp->numoth, 1); 343 } else { 344 cb->segnum = scp->numdat; 345 seq_add(&scp->numdat, 1); 346 } 347 *(ptr++) = cpu_to_le16(cb->segnum); 348 349 return ptr; 350} 351 352void dn_nsp_queue_xmit(struct sock *sk, struct sk_buff *skb, 353 gfp_t gfp, int oth) 354{ 355 struct dn_scp *scp = DN_SK(sk); 356 struct dn_skb_cb *cb = DN_SKB_CB(skb); 357 unsigned long t = ((scp->nsp_srtt >> 2) + scp->nsp_rttvar) >> 1; 358 359 cb->xmit_count = 0; 360 dn_nsp_mk_data_header(sk, skb, oth); 361 362 /* 363 * Slow start: If we have been idle for more than 364 * one RTT, then reset window to min size. 365 */ 366 if ((jiffies - scp->stamp) > t) 367 scp->snd_window = NSP_MIN_WINDOW; 368 369 if (oth) 370 skb_queue_tail(&scp->other_xmit_queue, skb); 371 else 372 skb_queue_tail(&scp->data_xmit_queue, skb); 373 374 if (scp->flowrem_sw != DN_SEND) 375 return; 376 377 dn_nsp_clone_and_send(skb, gfp); 378} 379 380 381int dn_nsp_check_xmit_queue(struct sock *sk, struct sk_buff *skb, struct sk_buff_head *q, unsigned short acknum) 382{ 383 struct dn_skb_cb *cb = DN_SKB_CB(skb); 384 struct dn_scp *scp = DN_SK(sk); 385 struct sk_buff *skb2, *n, *ack = NULL; 386 int wakeup = 0; 387 int try_retrans = 0; 388 unsigned long reftime = cb->stamp; 389 unsigned long pkttime; 390 unsigned short xmit_count; 391 unsigned short segnum; 392 393 skb_queue_walk_safe(q, skb2, n) { 394 struct dn_skb_cb *cb2 = DN_SKB_CB(skb2); 395 396 if (dn_before_or_equal(cb2->segnum, acknum)) 397 ack = skb2; 398 399 /* printk(KERN_DEBUG "ack: %s %04x %04x\n", ack ? "ACK" : "SKIP", (int)cb2->segnum, (int)acknum); */ 400 401 if (ack == NULL) 402 continue; 403 404 /* printk(KERN_DEBUG "check_xmit_queue: %04x, %d\n", acknum, cb2->xmit_count); */ 405 406 /* Does _last_ packet acked have xmit_count > 1 */ 407 try_retrans = 0; 408 /* Remember to wake up the sending process */ 409 wakeup = 1; 410 /* Keep various statistics */ 411 pkttime = cb2->stamp; 412 xmit_count = cb2->xmit_count; 413 segnum = cb2->segnum; 414 /* Remove and drop ack'ed packet */ 415 skb_unlink(ack, q); 416 kfree_skb(ack); 417 ack = NULL; 418 419 /* 420 * We don't expect to see acknowledgements for packets we 421 * haven't sent yet. 422 */ 423 WARN_ON(xmit_count == 0); 424 425 /* 426 * If the packet has only been sent once, we can use it 427 * to calculate the RTT and also open the window a little 428 * further. 429 */ 430 if (xmit_count == 1) { 431 if (dn_equal(segnum, acknum)) 432 dn_nsp_rtt(sk, (long)(pkttime - reftime)); 433 434 if (scp->snd_window < scp->max_window) 435 scp->snd_window++; 436 } 437 438 /* 439 * Packet has been sent more than once. If this is the last 440 * packet to be acknowledged then we want to send the next 441 * packet in the send queue again (assumes the remote host does 442 * go-back-N error control). 443 */ 444 if (xmit_count > 1) 445 try_retrans = 1; 446 } 447 448 if (try_retrans) 449 dn_nsp_output(sk); 450 451 return wakeup; 452} 453 454void dn_nsp_send_data_ack(struct sock *sk) 455{ 456 struct sk_buff *skb = NULL; 457 458 if ((skb = dn_alloc_skb(sk, 9, GFP_ATOMIC)) == NULL) 459 return; 460 461 skb_reserve(skb, 9); 462 dn_mk_ack_header(sk, skb, 0x04, 9, 0); 463 dn_nsp_send(skb); 464} 465 466void dn_nsp_send_oth_ack(struct sock *sk) 467{ 468 struct sk_buff *skb = NULL; 469 470 if ((skb = dn_alloc_skb(sk, 9, GFP_ATOMIC)) == NULL) 471 return; 472 473 skb_reserve(skb, 9); 474 dn_mk_ack_header(sk, skb, 0x14, 9, 1); 475 dn_nsp_send(skb); 476} 477 478 479void dn_send_conn_ack (struct sock *sk) 480{ 481 struct dn_scp *scp = DN_SK(sk); 482 struct sk_buff *skb = NULL; 483 struct nsp_conn_ack_msg *msg; 484 485 if ((skb = dn_alloc_skb(sk, 3, sk->sk_allocation)) == NULL) 486 return; 487 488 msg = (struct nsp_conn_ack_msg *)skb_put(skb, 3); 489 msg->msgflg = 0x24; 490 msg->dstaddr = scp->addrrem; 491 492 dn_nsp_send(skb); 493} 494 495void dn_nsp_delayed_ack(struct sock *sk) 496{ 497 struct dn_scp *scp = DN_SK(sk); 498 499 if (scp->ackxmt_oth != scp->numoth_rcv) 500 dn_nsp_send_oth_ack(sk); 501 502 if (scp->ackxmt_dat != scp->numdat_rcv) 503 dn_nsp_send_data_ack(sk); 504} 505 506static int dn_nsp_retrans_conn_conf(struct sock *sk) 507{ 508 struct dn_scp *scp = DN_SK(sk); 509 510 if (scp->state == DN_CC) 511 dn_send_conn_conf(sk, GFP_ATOMIC); 512 513 return 0; 514} 515 516void dn_send_conn_conf(struct sock *sk, gfp_t gfp) 517{ 518 struct dn_scp *scp = DN_SK(sk); 519 struct sk_buff *skb = NULL; 520 struct nsp_conn_init_msg *msg; 521 __u8 len = (__u8)le16_to_cpu(scp->conndata_out.opt_optl); 522 523 if ((skb = dn_alloc_skb(sk, 50 + len, gfp)) == NULL) 524 return; 525 526 msg = (struct nsp_conn_init_msg *)skb_put(skb, sizeof(*msg)); 527 msg->msgflg = 0x28; 528 msg->dstaddr = scp->addrrem; 529 msg->srcaddr = scp->addrloc; 530 msg->services = scp->services_loc; 531 msg->info = scp->info_loc; 532 msg->segsize = cpu_to_le16(scp->segsize_loc); 533 534 *skb_put(skb,1) = len; 535 536 if (len > 0) 537 memcpy(skb_put(skb, len), scp->conndata_out.opt_data, len); 538 539 540 dn_nsp_send(skb); 541 542 scp->persist = dn_nsp_persist(sk); 543 scp->persist_fxn = dn_nsp_retrans_conn_conf; 544} 545 546 547static __inline__ void dn_nsp_do_disc(struct sock *sk, unsigned char msgflg, 548 unsigned short reason, gfp_t gfp, 549 struct dst_entry *dst, 550 int ddl, unsigned char *dd, __le16 rem, __le16 loc) 551{ 552 struct sk_buff *skb = NULL; 553 int size = 7 + ddl + ((msgflg == NSP_DISCINIT) ? 1 : 0); 554 unsigned char *msg; 555 556 if ((dst == NULL) || (rem == 0)) { 557 if (net_ratelimit()) 558 printk(KERN_DEBUG "DECnet: dn_nsp_do_disc: BUG! Please report this to SteveW@ACM.org rem=%u dst=%p\n", le16_to_cpu(rem), dst); 559 return; 560 } 561 562 if ((skb = dn_alloc_skb(sk, size, gfp)) == NULL) 563 return; 564 565 msg = skb_put(skb, size); 566 *msg++ = msgflg; 567 *(__le16 *)msg = rem; 568 msg += 2; 569 *(__le16 *)msg = loc; 570 msg += 2; 571 *(__le16 *)msg = cpu_to_le16(reason); 572 msg += 2; 573 if (msgflg == NSP_DISCINIT) 574 *msg++ = ddl; 575 576 if (ddl) { 577 memcpy(msg, dd, ddl); 578 } 579 580 /* 581 * This doesn't go via the dn_nsp_send() function since we need 582 * to be able to send disc packets out which have no socket 583 * associations. 584 */ 585 skb_dst_set(skb, dst_clone(dst)); 586 dst_output(skb); 587} 588 589 590void dn_nsp_send_disc(struct sock *sk, unsigned char msgflg, 591 unsigned short reason, gfp_t gfp) 592{ 593 struct dn_scp *scp = DN_SK(sk); 594 int ddl = 0; 595 596 if (msgflg == NSP_DISCINIT) 597 ddl = le16_to_cpu(scp->discdata_out.opt_optl); 598 599 if (reason == 0) 600 reason = le16_to_cpu(scp->discdata_out.opt_status); 601 602 dn_nsp_do_disc(sk, msgflg, reason, gfp, sk->sk_dst_cache, ddl, 603 scp->discdata_out.opt_data, scp->addrrem, scp->addrloc); 604} 605 606 607void dn_nsp_return_disc(struct sk_buff *skb, unsigned char msgflg, 608 unsigned short reason) 609{ 610 struct dn_skb_cb *cb = DN_SKB_CB(skb); 611 int ddl = 0; 612 gfp_t gfp = GFP_ATOMIC; 613 614 dn_nsp_do_disc(NULL, msgflg, reason, gfp, skb_dst(skb), ddl, 615 NULL, cb->src_port, cb->dst_port); 616} 617 618 619void dn_nsp_send_link(struct sock *sk, unsigned char lsflags, char fcval) 620{ 621 struct dn_scp *scp = DN_SK(sk); 622 struct sk_buff *skb; 623 unsigned char *ptr; 624 gfp_t gfp = GFP_ATOMIC; 625 626 if ((skb = dn_alloc_skb(sk, DN_MAX_NSP_DATA_HEADER + 2, gfp)) == NULL) 627 return; 628 629 skb_reserve(skb, DN_MAX_NSP_DATA_HEADER); 630 ptr = skb_put(skb, 2); 631 DN_SKB_CB(skb)->nsp_flags = 0x10; 632 *ptr++ = lsflags; 633 *ptr = fcval; 634 635 dn_nsp_queue_xmit(sk, skb, gfp, 1); 636 637 scp->persist = dn_nsp_persist(sk); 638 scp->persist_fxn = dn_nsp_xmit_timeout; 639} 640 641static int dn_nsp_retrans_conninit(struct sock *sk) 642{ 643 struct dn_scp *scp = DN_SK(sk); 644 645 if (scp->state == DN_CI) 646 dn_nsp_send_conninit(sk, NSP_RCI); 647 648 return 0; 649} 650 651void dn_nsp_send_conninit(struct sock *sk, unsigned char msgflg) 652{ 653 struct dn_scp *scp = DN_SK(sk); 654 struct nsp_conn_init_msg *msg; 655 unsigned char aux; 656 unsigned char menuver; 657 struct dn_skb_cb *cb; 658 unsigned char type = 1; 659 gfp_t allocation = (msgflg == NSP_CI) ? sk->sk_allocation : GFP_ATOMIC; 660 struct sk_buff *skb = dn_alloc_skb(sk, 200, allocation); 661 662 if (!skb) 663 return; 664 665 cb = DN_SKB_CB(skb); 666 msg = (struct nsp_conn_init_msg *)skb_put(skb,sizeof(*msg)); 667 668 msg->msgflg = msgflg; 669 msg->dstaddr = 0x0000; /* Remote Node will assign it*/ 670 671 msg->srcaddr = scp->addrloc; 672 msg->services = scp->services_loc; /* Requested flow control */ 673 msg->info = scp->info_loc; /* Version Number */ 674 msg->segsize = cpu_to_le16(scp->segsize_loc); /* Max segment size */ 675 676 if (scp->peer.sdn_objnum) 677 type = 0; 678 679 skb_put(skb, dn_sockaddr2username(&scp->peer, 680 skb_tail_pointer(skb), type)); 681 skb_put(skb, dn_sockaddr2username(&scp->addr, 682 skb_tail_pointer(skb), 2)); 683 684 menuver = DN_MENUVER_ACC | DN_MENUVER_USR; 685 if (scp->peer.sdn_flags & SDF_PROXY) 686 menuver |= DN_MENUVER_PRX; 687 if (scp->peer.sdn_flags & SDF_UICPROXY) 688 menuver |= DN_MENUVER_UIC; 689 690 *skb_put(skb, 1) = menuver; /* Menu Version */ 691 692 aux = scp->accessdata.acc_userl; 693 *skb_put(skb, 1) = aux; 694 if (aux > 0) 695 memcpy(skb_put(skb, aux), scp->accessdata.acc_user, aux); 696 697 aux = scp->accessdata.acc_passl; 698 *skb_put(skb, 1) = aux; 699 if (aux > 0) 700 memcpy(skb_put(skb, aux), scp->accessdata.acc_pass, aux); 701 702 aux = scp->accessdata.acc_accl; 703 *skb_put(skb, 1) = aux; 704 if (aux > 0) 705 memcpy(skb_put(skb, aux), scp->accessdata.acc_acc, aux); 706 707 aux = (__u8)le16_to_cpu(scp->conndata_out.opt_optl); 708 *skb_put(skb, 1) = aux; 709 if (aux > 0) 710 memcpy(skb_put(skb,aux), scp->conndata_out.opt_data, aux); 711 712 scp->persist = dn_nsp_persist(sk); 713 scp->persist_fxn = dn_nsp_retrans_conninit; 714 715 cb->rt_flags = DN_RT_F_RQR; 716 717 dn_nsp_send(skb); 718} 719