xref: /freebsd/lib/libipsec/pfkey.c (revision 839fdcfc0c1dba34f728813d9756515ad82ff58a)
1 /*	$KAME: pfkey.c,v 1.46 2003/08/26 03:37:06 itojun Exp $	*/
2 
3 /*-
4  * SPDX-License-Identifier: BSD-3-Clause
5  *
6  * Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project.
7  * All rights reserved.
8  *
9  * Redistribution and use in source and binary forms, with or without
10  * modification, are permitted provided that the following conditions
11  * are met:
12  * 1. Redistributions of source code must retain the above copyright
13  *    notice, this list of conditions and the following disclaimer.
14  * 2. Redistributions in binary form must reproduce the above copyright
15  *    notice, this list of conditions and the following disclaimer in the
16  *    documentation and/or other materials provided with the distribution.
17  * 3. Neither the name of the project nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 #include <sys/cdefs.h>
35 __FBSDID("$FreeBSD$");
36 
37 #include <sys/types.h>
38 #include <sys/param.h>
39 #include <sys/socket.h>
40 #include <net/pfkeyv2.h>
41 #include <netipsec/key_var.h>
42 #include <netinet/in.h>
43 #include <netipsec/ipsec.h>
44 
45 #include <stdlib.h>
46 #include <stdint.h>
47 #include <unistd.h>
48 #include <string.h>
49 #include <errno.h>
50 
51 #include "ipsec_strerror.h"
52 #include "libpfkey.h"
53 
54 #define CALLOC(size, cast) (cast)calloc(1, (size))
55 
56 static int findsupportedmap(int);
57 static int setsupportedmap(struct sadb_supported *);
58 static struct sadb_alg *findsupportedalg(u_int, u_int);
59 static int pfkey_send_x1(int, u_int, u_int, u_int, struct sockaddr *,
60 	struct sockaddr *, u_int32_t, u_int32_t, u_int, caddr_t,
61 	u_int, u_int, u_int, u_int, u_int, u_int32_t, u_int32_t,
62 	u_int32_t, u_int32_t, u_int32_t);
63 static int pfkey_send_x2(int, u_int, u_int, u_int,
64 	struct sockaddr *, struct sockaddr *, u_int32_t);
65 static int pfkey_send_x3(int, u_int, u_int);
66 static int pfkey_send_x4(int, u_int, struct sockaddr *, u_int,
67 	struct sockaddr *, u_int, u_int, u_int64_t, u_int64_t,
68 	char *, int, u_int32_t);
69 static int pfkey_send_x5(int, u_int, u_int32_t);
70 
71 static caddr_t pfkey_setsadbmsg(caddr_t, caddr_t, u_int, u_int,
72 	u_int, u_int32_t, pid_t);
73 static caddr_t pfkey_setsadbsa(caddr_t, caddr_t, u_int32_t, u_int,
74 	u_int, u_int, u_int32_t);
75 static caddr_t pfkey_setsadbxreplay(caddr_t, caddr_t, uint32_t);
76 static caddr_t pfkey_setsadbaddr(caddr_t, caddr_t, u_int,
77 	struct sockaddr *, u_int, u_int);
78 static caddr_t pfkey_setsadbkey(caddr_t, caddr_t, u_int, caddr_t, u_int);
79 static caddr_t pfkey_setsadblifetime(caddr_t, caddr_t, u_int, u_int32_t,
80 	u_int32_t, u_int32_t, u_int32_t);
81 static caddr_t pfkey_setsadbxsa2(caddr_t, caddr_t, u_int32_t, u_int32_t);
82 
83 /*
84  * make and search supported algorithm structure.
85  */
86 static struct sadb_supported *ipsec_supported[] = { NULL, NULL, NULL, NULL };
87 
88 static int supported_map[] = {
89 	SADB_SATYPE_AH,
90 	SADB_SATYPE_ESP,
91 	SADB_X_SATYPE_IPCOMP,
92 	SADB_X_SATYPE_TCPSIGNATURE
93 };
94 
95 static int
96 findsupportedmap(satype)
97 	int satype;
98 {
99 	int i;
100 
101 	for (i = 0; i < sizeof(supported_map)/sizeof(supported_map[0]); i++)
102 		if (supported_map[i] == satype)
103 			return i;
104 	return -1;
105 }
106 
107 static struct sadb_alg *
108 findsupportedalg(satype, alg_id)
109 	u_int satype, alg_id;
110 {
111 	int algno;
112 	int tlen;
113 	caddr_t p;
114 
115 	/* validity check */
116 	algno = findsupportedmap(satype);
117 	if (algno == -1) {
118 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
119 		return NULL;
120 	}
121 	if (ipsec_supported[algno] == NULL) {
122 		__ipsec_errcode = EIPSEC_DO_GET_SUPP_LIST;
123 		return NULL;
124 	}
125 
126 	tlen = ipsec_supported[algno]->sadb_supported_len
127 		- sizeof(struct sadb_supported);
128 	p = (caddr_t)(ipsec_supported[algno] + 1);
129 	while (tlen > 0) {
130 		if (tlen < sizeof(struct sadb_alg)) {
131 			/* invalid format */
132 			break;
133 		}
134 		if (((struct sadb_alg *)p)->sadb_alg_id == alg_id)
135 			return (struct sadb_alg *)p;
136 
137 		tlen -= sizeof(struct sadb_alg);
138 		p += sizeof(struct sadb_alg);
139 	}
140 
141 	__ipsec_errcode = EIPSEC_NOT_SUPPORTED;
142 	return NULL;
143 }
144 
145 static int
146 setsupportedmap(sup)
147 	struct sadb_supported *sup;
148 {
149 	struct sadb_supported **ipsup;
150 
151 	switch (sup->sadb_supported_exttype) {
152 	case SADB_EXT_SUPPORTED_AUTH:
153 		ipsup = &ipsec_supported[findsupportedmap(SADB_SATYPE_AH)];
154 		break;
155 	case SADB_EXT_SUPPORTED_ENCRYPT:
156 		ipsup = &ipsec_supported[findsupportedmap(SADB_SATYPE_ESP)];
157 		break;
158 	default:
159 		__ipsec_errcode = EIPSEC_INVAL_SATYPE;
160 		return -1;
161 	}
162 
163 	if (*ipsup)
164 		free(*ipsup);
165 
166 	*ipsup = malloc(sup->sadb_supported_len);
167 	if (!*ipsup) {
168 		__ipsec_set_strerror(strerror(errno));
169 		return -1;
170 	}
171 	memcpy(*ipsup, sup, sup->sadb_supported_len);
172 
173 	return 0;
174 }
175 
176 /*
177  * check key length against algorithm specified.
178  * This function is called with SADB_EXT_SUPPORTED_{AUTH,ENCRYPT} as the
179  * augument, and only calls to ipsec_check_keylen2();
180  * keylen is the unit of bit.
181  * OUT:
182  *	-1: invalid.
183  *	 0: valid.
184  */
185 int
186 ipsec_check_keylen(supported, alg_id, keylen)
187 	u_int supported;
188 	u_int alg_id;
189 	u_int keylen;
190 {
191 	int satype;
192 
193 	/* validity check */
194 	switch (supported) {
195 	case SADB_EXT_SUPPORTED_AUTH:
196 		satype = SADB_SATYPE_AH;
197 		break;
198 	case SADB_EXT_SUPPORTED_ENCRYPT:
199 		satype = SADB_SATYPE_ESP;
200 		break;
201 	default:
202 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
203 		return -1;
204 	}
205 
206 	return ipsec_check_keylen2(satype, alg_id, keylen);
207 }
208 
209 /*
210  * check key length against algorithm specified.
211  * satype is one of satype defined at pfkeyv2.h.
212  * keylen is the unit of bit.
213  * OUT:
214  *	-1: invalid.
215  *	 0: valid.
216  */
217 int
218 ipsec_check_keylen2(satype, alg_id, keylen)
219 	u_int satype;
220 	u_int alg_id;
221 	u_int keylen;
222 {
223 	struct sadb_alg *alg;
224 
225 	alg = findsupportedalg(satype, alg_id);
226 	if (!alg)
227 		return -1;
228 
229 	if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) {
230 		__ipsec_errcode = EIPSEC_INVAL_KEYLEN;
231 		return -1;
232 	}
233 
234 	__ipsec_errcode = EIPSEC_NO_ERROR;
235 	return 0;
236 }
237 
238 /*
239  * get max/min key length against algorithm specified.
240  * satype is one of satype defined at pfkeyv2.h.
241  * keylen is the unit of bit.
242  * OUT:
243  *	-1: invalid.
244  *	 0: valid.
245  */
246 int
247 ipsec_get_keylen(supported, alg_id, alg0)
248 	u_int supported, alg_id;
249 	struct sadb_alg *alg0;
250 {
251 	struct sadb_alg *alg;
252 	u_int satype;
253 
254 	/* validity check */
255 	if (!alg0) {
256 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
257 		return -1;
258 	}
259 
260 	switch (supported) {
261 	case SADB_EXT_SUPPORTED_AUTH:
262 		satype = SADB_SATYPE_AH;
263 		break;
264 	case SADB_EXT_SUPPORTED_ENCRYPT:
265 		satype = SADB_SATYPE_ESP;
266 		break;
267 	default:
268 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
269 		return -1;
270 	}
271 
272 	alg = findsupportedalg(satype, alg_id);
273 	if (!alg)
274 		return -1;
275 
276 	memcpy(alg0, alg, sizeof(*alg0));
277 
278 	__ipsec_errcode = EIPSEC_NO_ERROR;
279 	return 0;
280 }
281 
282 /*
283  * set the rate for SOFT lifetime against HARD one.
284  * If rate is more than 100 or equal to zero, then set to 100.
285  */
286 static u_int soft_lifetime_allocations_rate = PFKEY_SOFT_LIFETIME_RATE;
287 static u_int soft_lifetime_bytes_rate = PFKEY_SOFT_LIFETIME_RATE;
288 static u_int soft_lifetime_addtime_rate = PFKEY_SOFT_LIFETIME_RATE;
289 static u_int soft_lifetime_usetime_rate = PFKEY_SOFT_LIFETIME_RATE;
290 
291 u_int
292 pfkey_set_softrate(type, rate)
293 	u_int type, rate;
294 {
295 	__ipsec_errcode = EIPSEC_NO_ERROR;
296 
297 	if (rate > 100 || rate == 0)
298 		rate = 100;
299 
300 	switch (type) {
301 	case SADB_X_LIFETIME_ALLOCATIONS:
302 		soft_lifetime_allocations_rate = rate;
303 		return 0;
304 	case SADB_X_LIFETIME_BYTES:
305 		soft_lifetime_bytes_rate = rate;
306 		return 0;
307 	case SADB_X_LIFETIME_ADDTIME:
308 		soft_lifetime_addtime_rate = rate;
309 		return 0;
310 	case SADB_X_LIFETIME_USETIME:
311 		soft_lifetime_usetime_rate = rate;
312 		return 0;
313 	}
314 
315 	__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
316 	return 1;
317 }
318 
319 /*
320  * get current rate for SOFT lifetime against HARD one.
321  * ATTENTION: ~0 is returned if invalid type was passed.
322  */
323 u_int
324 pfkey_get_softrate(type)
325 	u_int type;
326 {
327 	switch (type) {
328 	case SADB_X_LIFETIME_ALLOCATIONS:
329 		return soft_lifetime_allocations_rate;
330 	case SADB_X_LIFETIME_BYTES:
331 		return soft_lifetime_bytes_rate;
332 	case SADB_X_LIFETIME_ADDTIME:
333 		return soft_lifetime_addtime_rate;
334 	case SADB_X_LIFETIME_USETIME:
335 		return soft_lifetime_usetime_rate;
336 	}
337 
338 	return ~0;
339 }
340 
341 /*
342  * sending SADB_GETSPI message to the kernel.
343  * OUT:
344  *	positive: success and return length sent.
345  *	-1	: error occurred, and set errno.
346  */
347 int
348 pfkey_send_getspi(so, satype, mode, src, dst, min, max, reqid, seq)
349 	int so;
350 	u_int satype, mode;
351 	struct sockaddr *src, *dst;
352 	u_int32_t min, max, reqid, seq;
353 {
354 	struct sadb_msg *newmsg;
355 	caddr_t ep;
356 	int len;
357 	int need_spirange = 0;
358 	caddr_t p;
359 	int plen;
360 
361 	/* validity check */
362 	if (src == NULL || dst == NULL) {
363 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
364 		return -1;
365 	}
366 	if (src->sa_family != dst->sa_family) {
367 		__ipsec_errcode = EIPSEC_FAMILY_MISMATCH;
368 		return -1;
369 	}
370 	if (min > max || (min > 0 && min <= 255)) {
371 		__ipsec_errcode = EIPSEC_INVAL_SPI;
372 		return -1;
373 	}
374 	switch (src->sa_family) {
375 	case AF_INET:
376 		plen = sizeof(struct in_addr) << 3;
377 		break;
378 	case AF_INET6:
379 		plen = sizeof(struct in6_addr) << 3;
380 		break;
381 	default:
382 		__ipsec_errcode = EIPSEC_INVAL_FAMILY;
383 		return -1;
384 	}
385 
386 	/* create new sadb_msg to send. */
387 	len = sizeof(struct sadb_msg)
388 		+ sizeof(struct sadb_x_sa2)
389 		+ sizeof(struct sadb_address)
390 		+ PFKEY_ALIGN8(src->sa_len)
391 		+ sizeof(struct sadb_address)
392 		+ PFKEY_ALIGN8(dst->sa_len);
393 
394 	if (min > 255 && max < ~0) {
395 		need_spirange++;
396 		len += sizeof(struct sadb_spirange);
397 	}
398 
399 	if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
400 		__ipsec_set_strerror(strerror(errno));
401 		return -1;
402 	}
403 	ep = ((caddr_t)newmsg) + len;
404 
405 	p = pfkey_setsadbmsg((caddr_t)newmsg, ep, SADB_GETSPI,
406 	    len, satype, seq, getpid());
407 	if (!p) {
408 		free(newmsg);
409 		return -1;
410 	}
411 
412 	p = pfkey_setsadbxsa2(p, ep, mode, reqid);
413 	if (!p) {
414 		free(newmsg);
415 		return -1;
416 	}
417 
418 	/* set sadb_address for source */
419 	p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, plen,
420 	    IPSEC_ULPROTO_ANY);
421 	if (!p) {
422 		free(newmsg);
423 		return -1;
424 	}
425 
426 	/* set sadb_address for destination */
427 	p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, plen,
428 	    IPSEC_ULPROTO_ANY);
429 	if (!p) {
430 		free(newmsg);
431 		return -1;
432 	}
433 
434 	/* proccessing spi range */
435 	if (need_spirange) {
436 		struct sadb_spirange spirange;
437 
438 		if (p + sizeof(spirange) > ep) {
439 			free(newmsg);
440 			return -1;
441 		}
442 
443 		memset(&spirange, 0, sizeof(spirange));
444 		spirange.sadb_spirange_len = PFKEY_UNIT64(sizeof(spirange));
445 		spirange.sadb_spirange_exttype = SADB_EXT_SPIRANGE;
446 		spirange.sadb_spirange_min = min;
447 		spirange.sadb_spirange_max = max;
448 
449 		memcpy(p, &spirange, sizeof(spirange));
450 
451 		p += sizeof(spirange);
452 	}
453 	if (p != ep) {
454 		free(newmsg);
455 		return -1;
456 	}
457 
458 	/* send message */
459 	len = pfkey_send(so, newmsg, len);
460 	free(newmsg);
461 
462 	if (len < 0)
463 		return -1;
464 
465 	__ipsec_errcode = EIPSEC_NO_ERROR;
466 	return len;
467 }
468 
469 /*
470  * sending SADB_UPDATE message to the kernel.
471  * The length of key material is a_keylen + e_keylen.
472  * OUT:
473  *	positive: success and return length sent.
474  *	-1	: error occurred, and set errno.
475  */
476 int
477 pfkey_send_update(so, satype, mode, src, dst, spi, reqid, wsize,
478 		keymat, e_type, e_keylen, a_type, a_keylen, flags,
479 		l_alloc, l_bytes, l_addtime, l_usetime, seq)
480 	int so;
481 	u_int satype, mode, wsize;
482 	struct sockaddr *src, *dst;
483 	u_int32_t spi, reqid;
484 	caddr_t keymat;
485 	u_int e_type, e_keylen, a_type, a_keylen, flags;
486 	u_int32_t l_alloc;
487 	u_int64_t l_bytes, l_addtime, l_usetime;
488 	u_int32_t seq;
489 {
490 	int len;
491 	if ((len = pfkey_send_x1(so, SADB_UPDATE, satype, mode, src, dst, spi,
492 			reqid, wsize,
493 			keymat, e_type, e_keylen, a_type, a_keylen, flags,
494 			l_alloc, l_bytes, l_addtime, l_usetime, seq)) < 0)
495 		return -1;
496 
497 	return len;
498 }
499 
500 /*
501  * sending SADB_ADD message to the kernel.
502  * The length of key material is a_keylen + e_keylen.
503  * OUT:
504  *	positive: success and return length sent.
505  *	-1	: error occurred, and set errno.
506  */
507 int
508 pfkey_send_add(so, satype, mode, src, dst, spi, reqid, wsize,
509 		keymat, e_type, e_keylen, a_type, a_keylen, flags,
510 		l_alloc, l_bytes, l_addtime, l_usetime, seq)
511 	int so;
512 	u_int satype, mode, wsize;
513 	struct sockaddr *src, *dst;
514 	u_int32_t spi, reqid;
515 	caddr_t keymat;
516 	u_int e_type, e_keylen, a_type, a_keylen, flags;
517 	u_int32_t l_alloc;
518 	u_int64_t l_bytes, l_addtime, l_usetime;
519 	u_int32_t seq;
520 {
521 	int len;
522 	if ((len = pfkey_send_x1(so, SADB_ADD, satype, mode, src, dst, spi,
523 			reqid, wsize,
524 			keymat, e_type, e_keylen, a_type, a_keylen, flags,
525 			l_alloc, l_bytes, l_addtime, l_usetime, seq)) < 0)
526 		return -1;
527 
528 	return len;
529 }
530 
531 /*
532  * sending SADB_DELETE message to the kernel.
533  * OUT:
534  *	positive: success and return length sent.
535  *	-1	: error occurred, and set errno.
536  */
537 int
538 pfkey_send_delete(so, satype, mode, src, dst, spi)
539 	int so;
540 	u_int satype, mode;
541 	struct sockaddr *src, *dst;
542 	u_int32_t spi;
543 {
544 	int len;
545 	if ((len = pfkey_send_x2(so, SADB_DELETE, satype, mode, src, dst, spi)) < 0)
546 		return -1;
547 
548 	return len;
549 }
550 
551 /*
552  * sending SADB_DELETE without spi to the kernel.  This is
553  * the "delete all" request (an extension also present in
554  * Solaris).
555  *
556  * OUT:
557  *	positive: success and return length sent
558  *	-1	: error occurred, and set errno
559  */
560 int
561 pfkey_send_delete_all(so, satype, mode, src, dst)
562 	int so;
563 	u_int satype, mode;
564 	struct sockaddr *src, *dst;
565 {
566 	struct sadb_msg *newmsg;
567 	int len;
568 	caddr_t p;
569 	int plen;
570 	caddr_t ep;
571 
572 	/* validity check */
573 	if (src == NULL || dst == NULL) {
574 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
575 		return -1;
576 	}
577 	if (src->sa_family != dst->sa_family) {
578 		__ipsec_errcode = EIPSEC_FAMILY_MISMATCH;
579 		return -1;
580 	}
581 	switch (src->sa_family) {
582 	case AF_INET:
583 		plen = sizeof(struct in_addr) << 3;
584 		break;
585 	case AF_INET6:
586 		plen = sizeof(struct in6_addr) << 3;
587 		break;
588 	default:
589 		__ipsec_errcode = EIPSEC_INVAL_FAMILY;
590 		return -1;
591 	}
592 
593 	/* create new sadb_msg to reply. */
594 	len = sizeof(struct sadb_msg)
595 		+ sizeof(struct sadb_address)
596 		+ PFKEY_ALIGN8(src->sa_len)
597 		+ sizeof(struct sadb_address)
598 		+ PFKEY_ALIGN8(dst->sa_len);
599 
600 	if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
601 		__ipsec_set_strerror(strerror(errno));
602 		return -1;
603 	}
604 	ep = ((caddr_t)newmsg) + len;
605 
606 	p = pfkey_setsadbmsg((caddr_t)newmsg, ep, SADB_DELETE, len, satype, 0,
607 	    getpid());
608 	if (!p) {
609 		free(newmsg);
610 		return -1;
611 	}
612 	p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, plen,
613 	    IPSEC_ULPROTO_ANY);
614 	if (!p) {
615 		free(newmsg);
616 		return -1;
617 	}
618 	p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, plen,
619 	    IPSEC_ULPROTO_ANY);
620 	if (!p || p != ep) {
621 		free(newmsg);
622 		return -1;
623 	}
624 
625 	/* send message */
626 	len = pfkey_send(so, newmsg, len);
627 	free(newmsg);
628 
629 	if (len < 0)
630 		return -1;
631 
632 	__ipsec_errcode = EIPSEC_NO_ERROR;
633 	return len;
634 }
635 
636 /*
637  * sending SADB_GET message to the kernel.
638  * OUT:
639  *	positive: success and return length sent.
640  *	-1	: error occurred, and set errno.
641  */
642 int
643 pfkey_send_get(so, satype, mode, src, dst, spi)
644 	int so;
645 	u_int satype, mode;
646 	struct sockaddr *src, *dst;
647 	u_int32_t spi;
648 {
649 	int len;
650 	if ((len = pfkey_send_x2(so, SADB_GET, satype, mode, src, dst, spi)) < 0)
651 		return -1;
652 
653 	return len;
654 }
655 
656 /*
657  * sending SADB_REGISTER message to the kernel.
658  * OUT:
659  *	positive: success and return length sent.
660  *	-1	: error occurred, and set errno.
661  */
662 int
663 pfkey_send_register(so, satype)
664 	int so;
665 	u_int satype;
666 {
667 	int len, algno;
668 
669 	if (satype == SADB_SATYPE_UNSPEC) {
670 		for (algno = 0;
671 		     algno < sizeof(supported_map)/sizeof(supported_map[0]);
672 		     algno++) {
673 			if (ipsec_supported[algno]) {
674 				free(ipsec_supported[algno]);
675 				ipsec_supported[algno] = NULL;
676 			}
677 		}
678 	} else {
679 		algno = findsupportedmap(satype);
680 		if (algno == -1) {
681 			__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
682 			return -1;
683 		}
684 
685 		if (ipsec_supported[algno]) {
686 			free(ipsec_supported[algno]);
687 			ipsec_supported[algno] = NULL;
688 		}
689 	}
690 
691 	if ((len = pfkey_send_x3(so, SADB_REGISTER, satype)) < 0)
692 		return -1;
693 
694 	return len;
695 }
696 
697 /*
698  * receiving SADB_REGISTER message from the kernel, and copy buffer for
699  * sadb_supported returned into ipsec_supported.
700  * OUT:
701  *	 0: success and return length sent.
702  *	-1: error occurred, and set errno.
703  */
704 int
705 pfkey_recv_register(so)
706 	int so;
707 {
708 	pid_t pid = getpid();
709 	struct sadb_msg *newmsg;
710 	int error = -1;
711 
712 	/* receive message */
713 	for (;;) {
714 		if ((newmsg = pfkey_recv(so)) == NULL)
715 			return -1;
716 		if (newmsg->sadb_msg_type == SADB_REGISTER &&
717 		    newmsg->sadb_msg_pid == pid)
718 			break;
719 		free(newmsg);
720 	}
721 
722 	/* check and fix */
723 	newmsg->sadb_msg_len = PFKEY_UNUNIT64(newmsg->sadb_msg_len);
724 
725 	error = pfkey_set_supported(newmsg, newmsg->sadb_msg_len);
726 	free(newmsg);
727 
728 	if (error == 0)
729 		__ipsec_errcode = EIPSEC_NO_ERROR;
730 
731 	return error;
732 }
733 
734 /*
735  * receiving SADB_REGISTER message from the kernel, and copy buffer for
736  * sadb_supported returned into ipsec_supported.
737  * NOTE: sadb_msg_len must be host order.
738  * IN:
739  *	tlen: msg length, it's to makeing sure.
740  * OUT:
741  *	 0: success and return length sent.
742  *	-1: error occurred, and set errno.
743  */
744 int
745 pfkey_set_supported(msg, tlen)
746 	struct sadb_msg *msg;
747 	int tlen;
748 {
749 	struct sadb_supported *sup;
750 	caddr_t p;
751 	caddr_t ep;
752 
753 	/* validity */
754 	if (msg->sadb_msg_len != tlen) {
755 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
756 		return -1;
757 	}
758 
759 	p = (caddr_t)msg;
760 	ep = p + tlen;
761 
762 	p += sizeof(struct sadb_msg);
763 
764 	while (p < ep) {
765 		sup = (struct sadb_supported *)p;
766 		if (ep < p + sizeof(*sup) ||
767 		    PFKEY_EXTLEN(sup) < sizeof(*sup) ||
768 		    ep < p + sup->sadb_supported_len) {
769 			/* invalid format */
770 			break;
771 		}
772 
773 		switch (sup->sadb_supported_exttype) {
774 		case SADB_EXT_SUPPORTED_AUTH:
775 		case SADB_EXT_SUPPORTED_ENCRYPT:
776 			break;
777 		default:
778 			__ipsec_errcode = EIPSEC_INVAL_SATYPE;
779 			return -1;
780 		}
781 
782 		/* fixed length */
783 		sup->sadb_supported_len = PFKEY_EXTLEN(sup);
784 
785 		/* set supported map */
786 		if (setsupportedmap(sup) != 0)
787 			return -1;
788 
789 		p += sup->sadb_supported_len;
790 	}
791 
792 	if (p != ep) {
793 		__ipsec_errcode = EIPSEC_INVAL_SATYPE;
794 		return -1;
795 	}
796 
797 	__ipsec_errcode = EIPSEC_NO_ERROR;
798 
799 	return 0;
800 }
801 
802 /*
803  * sending SADB_FLUSH message to the kernel.
804  * OUT:
805  *	positive: success and return length sent.
806  *	-1	: error occurred, and set errno.
807  */
808 int
809 pfkey_send_flush(so, satype)
810 	int so;
811 	u_int satype;
812 {
813 	int len;
814 
815 	if ((len = pfkey_send_x3(so, SADB_FLUSH, satype)) < 0)
816 		return -1;
817 
818 	return len;
819 }
820 
821 /*
822  * sending SADB_DUMP message to the kernel.
823  * OUT:
824  *	positive: success and return length sent.
825  *	-1	: error occurred, and set errno.
826  */
827 int
828 pfkey_send_dump(so, satype)
829 	int so;
830 	u_int satype;
831 {
832 	int len;
833 
834 	if ((len = pfkey_send_x3(so, SADB_DUMP, satype)) < 0)
835 		return -1;
836 
837 	return len;
838 }
839 
840 /*
841  * sending SADB_X_PROMISC message to the kernel.
842  * NOTE that this function handles promisc mode toggle only.
843  * IN:
844  *	flag:	set promisc off if zero, set promisc on if non-zero.
845  * OUT:
846  *	positive: success and return length sent.
847  *	-1	: error occurred, and set errno.
848  *	0     : error occurred, and set errno.
849  *	others: a pointer to new allocated buffer in which supported
850  *	        algorithms is.
851  */
852 int
853 pfkey_send_promisc_toggle(so, flag)
854 	int so;
855 	int flag;
856 {
857 	int len;
858 
859 	if ((len = pfkey_send_x3(so, SADB_X_PROMISC, (flag ? 1 : 0))) < 0)
860 		return -1;
861 
862 	return len;
863 }
864 
865 /*
866  * sending SADB_X_SPDADD message to the kernel.
867  * OUT:
868  *	positive: success and return length sent.
869  *	-1	: error occurred, and set errno.
870  */
871 int
872 pfkey_send_spdadd(so, src, prefs, dst, prefd, proto, policy, policylen, seq)
873 	int so;
874 	struct sockaddr *src, *dst;
875 	u_int prefs, prefd, proto;
876 	caddr_t policy;
877 	int policylen;
878 	u_int32_t seq;
879 {
880 	int len;
881 
882 	if ((len = pfkey_send_x4(so, SADB_X_SPDADD,
883 				src, prefs, dst, prefd, proto,
884 				0, 0,
885 				policy, policylen, seq)) < 0)
886 		return -1;
887 
888 	return len;
889 }
890 
891 /*
892  * sending SADB_X_SPDADD message to the kernel.
893  * OUT:
894  *	positive: success and return length sent.
895  *	-1	: error occurred, and set errno.
896  */
897 int
898 pfkey_send_spdadd2(so, src, prefs, dst, prefd, proto, ltime, vtime,
899 		policy, policylen, seq)
900 	int so;
901 	struct sockaddr *src, *dst;
902 	u_int prefs, prefd, proto;
903 	u_int64_t ltime, vtime;
904 	caddr_t policy;
905 	int policylen;
906 	u_int32_t seq;
907 {
908 	int len;
909 
910 	if ((len = pfkey_send_x4(so, SADB_X_SPDADD,
911 				src, prefs, dst, prefd, proto,
912 				ltime, vtime,
913 				policy, policylen, seq)) < 0)
914 		return -1;
915 
916 	return len;
917 }
918 
919 /*
920  * sending SADB_X_SPDUPDATE message to the kernel.
921  * OUT:
922  *	positive: success and return length sent.
923  *	-1	: error occurred, and set errno.
924  */
925 int
926 pfkey_send_spdupdate(so, src, prefs, dst, prefd, proto, policy, policylen, seq)
927 	int so;
928 	struct sockaddr *src, *dst;
929 	u_int prefs, prefd, proto;
930 	caddr_t policy;
931 	int policylen;
932 	u_int32_t seq;
933 {
934 	int len;
935 
936 	if ((len = pfkey_send_x4(so, SADB_X_SPDUPDATE,
937 				src, prefs, dst, prefd, proto,
938 				0, 0,
939 				policy, policylen, seq)) < 0)
940 		return -1;
941 
942 	return len;
943 }
944 
945 /*
946  * sending SADB_X_SPDUPDATE message to the kernel.
947  * OUT:
948  *	positive: success and return length sent.
949  *	-1	: error occurred, and set errno.
950  */
951 int
952 pfkey_send_spdupdate2(so, src, prefs, dst, prefd, proto, ltime, vtime,
953 		policy, policylen, seq)
954 	int so;
955 	struct sockaddr *src, *dst;
956 	u_int prefs, prefd, proto;
957 	u_int64_t ltime, vtime;
958 	caddr_t policy;
959 	int policylen;
960 	u_int32_t seq;
961 {
962 	int len;
963 
964 	if ((len = pfkey_send_x4(so, SADB_X_SPDUPDATE,
965 				src, prefs, dst, prefd, proto,
966 				ltime, vtime,
967 				policy, policylen, seq)) < 0)
968 		return -1;
969 
970 	return len;
971 }
972 
973 /*
974  * sending SADB_X_SPDDELETE message to the kernel.
975  * OUT:
976  *	positive: success and return length sent.
977  *	-1	: error occurred, and set errno.
978  */
979 int
980 pfkey_send_spddelete(so, src, prefs, dst, prefd, proto, policy, policylen, seq)
981 	int so;
982 	struct sockaddr *src, *dst;
983 	u_int prefs, prefd, proto;
984 	caddr_t policy;
985 	int policylen;
986 	u_int32_t seq;
987 {
988 	int len;
989 
990 	if (policylen != sizeof(struct sadb_x_policy)) {
991 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
992 		return -1;
993 	}
994 
995 	if ((len = pfkey_send_x4(so, SADB_X_SPDDELETE,
996 				src, prefs, dst, prefd, proto,
997 				0, 0,
998 				policy, policylen, seq)) < 0)
999 		return -1;
1000 
1001 	return len;
1002 }
1003 
1004 /*
1005  * sending SADB_X_SPDDELETE message to the kernel.
1006  * OUT:
1007  *	positive: success and return length sent.
1008  *	-1	: error occurred, and set errno.
1009  */
1010 int
1011 pfkey_send_spddelete2(so, spid)
1012 	int so;
1013 	u_int32_t spid;
1014 {
1015 	int len;
1016 
1017 	if ((len = pfkey_send_x5(so, SADB_X_SPDDELETE2, spid)) < 0)
1018 		return -1;
1019 
1020 	return len;
1021 }
1022 
1023 /*
1024  * sending SADB_X_SPDGET message to the kernel.
1025  * OUT:
1026  *	positive: success and return length sent.
1027  *	-1	: error occurred, and set errno.
1028  */
1029 int
1030 pfkey_send_spdget(so, spid)
1031 	int so;
1032 	u_int32_t spid;
1033 {
1034 	int len;
1035 
1036 	if ((len = pfkey_send_x5(so, SADB_X_SPDGET, spid)) < 0)
1037 		return -1;
1038 
1039 	return len;
1040 }
1041 
1042 /*
1043  * sending SADB_X_SPDSETIDX message to the kernel.
1044  * OUT:
1045  *	positive: success and return length sent.
1046  *	-1	: error occurred, and set errno.
1047  */
1048 int
1049 pfkey_send_spdsetidx(so, src, prefs, dst, prefd, proto, policy, policylen, seq)
1050 	int so;
1051 	struct sockaddr *src, *dst;
1052 	u_int prefs, prefd, proto;
1053 	caddr_t policy;
1054 	int policylen;
1055 	u_int32_t seq;
1056 {
1057 	int len;
1058 
1059 	if (policylen != sizeof(struct sadb_x_policy)) {
1060 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
1061 		return -1;
1062 	}
1063 
1064 	if ((len = pfkey_send_x4(so, SADB_X_SPDSETIDX,
1065 				src, prefs, dst, prefd, proto,
1066 				0, 0,
1067 				policy, policylen, seq)) < 0)
1068 		return -1;
1069 
1070 	return len;
1071 }
1072 
1073 /*
1074  * sending SADB_SPDFLUSH message to the kernel.
1075  * OUT:
1076  *	positive: success and return length sent.
1077  *	-1	: error occurred, and set errno.
1078  */
1079 int
1080 pfkey_send_spdflush(so)
1081 	int so;
1082 {
1083 	int len;
1084 
1085 	if ((len = pfkey_send_x3(so, SADB_X_SPDFLUSH, SADB_SATYPE_UNSPEC)) < 0)
1086 		return -1;
1087 
1088 	return len;
1089 }
1090 
1091 /*
1092  * sending SADB_SPDDUMP message to the kernel.
1093  * OUT:
1094  *	positive: success and return length sent.
1095  *	-1	: error occurred, and set errno.
1096  */
1097 int
1098 pfkey_send_spddump(so)
1099 	int so;
1100 {
1101 	int len;
1102 
1103 	if ((len = pfkey_send_x3(so, SADB_X_SPDDUMP, SADB_SATYPE_UNSPEC)) < 0)
1104 		return -1;
1105 
1106 	return len;
1107 }
1108 
1109 /* sending SADB_ADD or SADB_UPDATE message to the kernel */
1110 static int
1111 pfkey_send_x1(so, type, satype, mode, src, dst, spi, reqid, wsize,
1112 		keymat, e_type, e_keylen, a_type, a_keylen, flags,
1113 		l_alloc, l_bytes, l_addtime, l_usetime, seq)
1114 	int so;
1115 	u_int type, satype, mode;
1116 	struct sockaddr *src, *dst;
1117 	u_int32_t spi, reqid;
1118 	u_int wsize;
1119 	caddr_t keymat;
1120 	u_int e_type, e_keylen, a_type, a_keylen, flags;
1121 	u_int32_t l_alloc, l_bytes, l_addtime, l_usetime, seq;
1122 {
1123 	struct sadb_msg *newmsg;
1124 	int len;
1125 	caddr_t p;
1126 	int plen;
1127 	caddr_t ep;
1128 
1129 	/* validity check */
1130 	if (src == NULL || dst == NULL) {
1131 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
1132 		return -1;
1133 	}
1134 	if (src->sa_family != dst->sa_family) {
1135 		__ipsec_errcode = EIPSEC_FAMILY_MISMATCH;
1136 		return -1;
1137 	}
1138 	switch (src->sa_family) {
1139 	case AF_INET:
1140 		plen = sizeof(struct in_addr) << 3;
1141 		break;
1142 	case AF_INET6:
1143 		plen = sizeof(struct in6_addr) << 3;
1144 		break;
1145 	default:
1146 		__ipsec_errcode = EIPSEC_INVAL_FAMILY;
1147 		return -1;
1148 	}
1149 
1150 	switch (satype) {
1151 	case SADB_SATYPE_ESP:
1152 		if (e_type == SADB_EALG_NONE) {
1153 			__ipsec_errcode = EIPSEC_NO_ALGS;
1154 			return -1;
1155 		}
1156 		break;
1157 	case SADB_SATYPE_AH:
1158 		if (e_type != SADB_EALG_NONE) {
1159 			__ipsec_errcode = EIPSEC_INVAL_ALGS;
1160 			return -1;
1161 		}
1162 		if (a_type == SADB_AALG_NONE) {
1163 			__ipsec_errcode = EIPSEC_NO_ALGS;
1164 			return -1;
1165 		}
1166 		break;
1167 	case SADB_X_SATYPE_IPCOMP:
1168 		if (e_type == SADB_X_CALG_NONE) {
1169 			__ipsec_errcode = EIPSEC_INVAL_ALGS;
1170 			return -1;
1171 		}
1172 		if (a_type != SADB_AALG_NONE) {
1173 			__ipsec_errcode = EIPSEC_NO_ALGS;
1174 			return -1;
1175 		}
1176 		break;
1177 	case SADB_X_SATYPE_TCPSIGNATURE:
1178 		if (e_type != SADB_EALG_NONE) {
1179 			__ipsec_errcode = EIPSEC_INVAL_ALGS;
1180 			return -1;
1181 		}
1182 		if (a_type != SADB_X_AALG_TCP_MD5) {
1183 			__ipsec_errcode = EIPSEC_INVAL_ALGS;
1184 			return -1;
1185 		}
1186 		break;
1187 	default:
1188 		__ipsec_errcode = EIPSEC_INVAL_SATYPE;
1189 		return -1;
1190 	}
1191 
1192 	/* create new sadb_msg to reply. */
1193 	len = sizeof(struct sadb_msg)
1194 		+ sizeof(struct sadb_sa)
1195 		+ sizeof(struct sadb_x_sa2)
1196 		+ sizeof(struct sadb_address)
1197 		+ PFKEY_ALIGN8(src->sa_len)
1198 		+ sizeof(struct sadb_address)
1199 		+ PFKEY_ALIGN8(dst->sa_len)
1200 		+ sizeof(struct sadb_lifetime)
1201 		+ sizeof(struct sadb_lifetime);
1202 
1203 	if (wsize > UINT8_MAX) {
1204 		if (wsize > (UINT32_MAX - 32) >> 3) {
1205 			__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
1206 			return (-1);
1207 		}
1208 		len += sizeof(struct sadb_x_sa_replay);
1209 	}
1210 	if (e_type != SADB_EALG_NONE)
1211 		len += (sizeof(struct sadb_key) + PFKEY_ALIGN8(e_keylen));
1212 	if (a_type != SADB_AALG_NONE)
1213 		len += (sizeof(struct sadb_key) + PFKEY_ALIGN8(a_keylen));
1214 
1215 	if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
1216 		__ipsec_set_strerror(strerror(errno));
1217 		return -1;
1218 	}
1219 	ep = ((caddr_t)newmsg) + len;
1220 
1221 	p = pfkey_setsadbmsg((caddr_t)newmsg, ep, type, len,
1222 	                     satype, seq, getpid());
1223 	if (!p) {
1224 		free(newmsg);
1225 		return -1;
1226 	}
1227 	p = pfkey_setsadbsa(p, ep, spi, wsize, a_type, e_type, flags);
1228 	if (!p) {
1229 		free(newmsg);
1230 		return -1;
1231 	}
1232 	p = pfkey_setsadbxsa2(p, ep, mode, reqid);
1233 	if (!p) {
1234 		free(newmsg);
1235 		return -1;
1236 	}
1237 	if (wsize > UINT8_MAX) {
1238 		p = pfkey_setsadbxreplay(p, ep, wsize);
1239 		if (!p) {
1240 			free(newmsg);
1241 			return (-1);
1242 		}
1243 	}
1244 	p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, plen,
1245 	    IPSEC_ULPROTO_ANY);
1246 	if (!p) {
1247 		free(newmsg);
1248 		return -1;
1249 	}
1250 	p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, plen,
1251 	    IPSEC_ULPROTO_ANY);
1252 	if (!p) {
1253 		free(newmsg);
1254 		return -1;
1255 	}
1256 
1257 	if (e_type != SADB_EALG_NONE) {
1258 		p = pfkey_setsadbkey(p, ep, SADB_EXT_KEY_ENCRYPT,
1259 		                   keymat, e_keylen);
1260 		if (!p) {
1261 			free(newmsg);
1262 			return -1;
1263 		}
1264 	}
1265 	if (a_type != SADB_AALG_NONE) {
1266 		p = pfkey_setsadbkey(p, ep, SADB_EXT_KEY_AUTH,
1267 		                   keymat + e_keylen, a_keylen);
1268 		if (!p) {
1269 			free(newmsg);
1270 			return -1;
1271 		}
1272 	}
1273 
1274 	/* set sadb_lifetime for destination */
1275 	p = pfkey_setsadblifetime(p, ep, SADB_EXT_LIFETIME_HARD,
1276 			l_alloc, l_bytes, l_addtime, l_usetime);
1277 	if (!p) {
1278 		free(newmsg);
1279 		return -1;
1280 	}
1281 	p = pfkey_setsadblifetime(p, ep, SADB_EXT_LIFETIME_SOFT,
1282 			l_alloc, l_bytes, l_addtime, l_usetime);
1283 	if (!p || p != ep) {
1284 		free(newmsg);
1285 		return -1;
1286 	}
1287 
1288 	/* send message */
1289 	len = pfkey_send(so, newmsg, len);
1290 	free(newmsg);
1291 
1292 	if (len < 0)
1293 		return -1;
1294 
1295 	__ipsec_errcode = EIPSEC_NO_ERROR;
1296 	return len;
1297 }
1298 
1299 /* sending SADB_DELETE or SADB_GET message to the kernel */
1300 static int
1301 pfkey_send_x2(so, type, satype, mode, src, dst, spi)
1302 	int so;
1303 	u_int type, satype, mode;
1304 	struct sockaddr *src, *dst;
1305 	u_int32_t spi;
1306 {
1307 	struct sadb_msg *newmsg;
1308 	int len;
1309 	caddr_t p;
1310 	int plen;
1311 	caddr_t ep;
1312 
1313 	/* validity check */
1314 	if (src == NULL || dst == NULL) {
1315 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
1316 		return -1;
1317 	}
1318 	if (src->sa_family != dst->sa_family) {
1319 		__ipsec_errcode = EIPSEC_FAMILY_MISMATCH;
1320 		return -1;
1321 	}
1322 	switch (src->sa_family) {
1323 	case AF_INET:
1324 		plen = sizeof(struct in_addr) << 3;
1325 		break;
1326 	case AF_INET6:
1327 		plen = sizeof(struct in6_addr) << 3;
1328 		break;
1329 	default:
1330 		__ipsec_errcode = EIPSEC_INVAL_FAMILY;
1331 		return -1;
1332 	}
1333 
1334 	/* create new sadb_msg to reply. */
1335 	len = sizeof(struct sadb_msg)
1336 		+ sizeof(struct sadb_sa)
1337 		+ sizeof(struct sadb_address)
1338 		+ PFKEY_ALIGN8(src->sa_len)
1339 		+ sizeof(struct sadb_address)
1340 		+ PFKEY_ALIGN8(dst->sa_len);
1341 
1342 	if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
1343 		__ipsec_set_strerror(strerror(errno));
1344 		return -1;
1345 	}
1346 	ep = ((caddr_t)newmsg) + len;
1347 
1348 	p = pfkey_setsadbmsg((caddr_t)newmsg, ep, type, len, satype, 0,
1349 	    getpid());
1350 	if (!p) {
1351 		free(newmsg);
1352 		return -1;
1353 	}
1354 	p = pfkey_setsadbsa(p, ep, spi, 0, 0, 0, 0);
1355 	if (!p) {
1356 		free(newmsg);
1357 		return -1;
1358 	}
1359 	p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, plen,
1360 	    IPSEC_ULPROTO_ANY);
1361 	if (!p) {
1362 		free(newmsg);
1363 		return -1;
1364 	}
1365 	p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, plen,
1366 	    IPSEC_ULPROTO_ANY);
1367 	if (!p || p != ep) {
1368 		free(newmsg);
1369 		return -1;
1370 	}
1371 
1372 	/* send message */
1373 	len = pfkey_send(so, newmsg, len);
1374 	free(newmsg);
1375 
1376 	if (len < 0)
1377 		return -1;
1378 
1379 	__ipsec_errcode = EIPSEC_NO_ERROR;
1380 	return len;
1381 }
1382 
1383 /*
1384  * sending SADB_REGISTER, SADB_FLUSH, SADB_DUMP or SADB_X_PROMISC message
1385  * to the kernel
1386  */
1387 static int
1388 pfkey_send_x3(so, type, satype)
1389 	int so;
1390 	u_int type, satype;
1391 {
1392 	struct sadb_msg *newmsg;
1393 	int len;
1394 	caddr_t p;
1395 	caddr_t ep;
1396 
1397 	/* validity check */
1398 	switch (type) {
1399 	case SADB_X_PROMISC:
1400 		if (satype != 0 && satype != 1) {
1401 			__ipsec_errcode = EIPSEC_INVAL_SATYPE;
1402 			return -1;
1403 		}
1404 		break;
1405 	default:
1406 		switch (satype) {
1407 		case SADB_SATYPE_UNSPEC:
1408 		case SADB_SATYPE_AH:
1409 		case SADB_SATYPE_ESP:
1410 		case SADB_X_SATYPE_IPCOMP:
1411 		case SADB_X_SATYPE_TCPSIGNATURE:
1412 			break;
1413 		default:
1414 			__ipsec_errcode = EIPSEC_INVAL_SATYPE;
1415 			return -1;
1416 		}
1417 	}
1418 
1419 	/* create new sadb_msg to send. */
1420 	len = sizeof(struct sadb_msg);
1421 
1422 	if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
1423 		__ipsec_set_strerror(strerror(errno));
1424 		return -1;
1425 	}
1426 	ep = ((caddr_t)newmsg) + len;
1427 
1428 	p = pfkey_setsadbmsg((caddr_t)newmsg, ep, type, len, satype, 0,
1429 	    getpid());
1430 	if (!p || p != ep) {
1431 		free(newmsg);
1432 		return -1;
1433 	}
1434 
1435 	/* send message */
1436 	len = pfkey_send(so, newmsg, len);
1437 	free(newmsg);
1438 
1439 	if (len < 0)
1440 		return -1;
1441 
1442 	__ipsec_errcode = EIPSEC_NO_ERROR;
1443 	return len;
1444 }
1445 
1446 /* sending SADB_X_SPDADD message to the kernel */
1447 static int
1448 pfkey_send_x4(so, type, src, prefs, dst, prefd, proto,
1449 		ltime, vtime, policy, policylen, seq)
1450 	int so;
1451 	struct sockaddr *src, *dst;
1452 	u_int type, prefs, prefd, proto;
1453 	u_int64_t ltime, vtime;
1454 	char *policy;
1455 	int policylen;
1456 	u_int32_t seq;
1457 {
1458 	struct sadb_msg *newmsg;
1459 	int len;
1460 	caddr_t p;
1461 	int plen;
1462 	caddr_t ep;
1463 
1464 	/* validity check */
1465 	if (src == NULL || dst == NULL) {
1466 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
1467 		return -1;
1468 	}
1469 	if (src->sa_family != dst->sa_family) {
1470 		__ipsec_errcode = EIPSEC_FAMILY_MISMATCH;
1471 		return -1;
1472 	}
1473 
1474 	switch (src->sa_family) {
1475 	case AF_INET:
1476 		plen = sizeof(struct in_addr) << 3;
1477 		break;
1478 	case AF_INET6:
1479 		plen = sizeof(struct in6_addr) << 3;
1480 		break;
1481 	default:
1482 		__ipsec_errcode = EIPSEC_INVAL_FAMILY;
1483 		return -1;
1484 	}
1485 	if (prefs > plen || prefd > plen) {
1486 		__ipsec_errcode = EIPSEC_INVAL_PREFIXLEN;
1487 		return -1;
1488 	}
1489 
1490 	/* create new sadb_msg to reply. */
1491 	len = sizeof(struct sadb_msg)
1492 		+ sizeof(struct sadb_address)
1493 		+ PFKEY_ALIGN8(src->sa_len)
1494 		+ sizeof(struct sadb_address)
1495 		+ PFKEY_ALIGN8(src->sa_len)
1496 		+ sizeof(struct sadb_lifetime)
1497 		+ policylen;
1498 
1499 	if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
1500 		__ipsec_set_strerror(strerror(errno));
1501 		return -1;
1502 	}
1503 	ep = ((caddr_t)newmsg) + len;
1504 
1505 	p = pfkey_setsadbmsg((caddr_t)newmsg, ep, type, len,
1506 	    SADB_SATYPE_UNSPEC, seq, getpid());
1507 	if (!p) {
1508 		free(newmsg);
1509 		return -1;
1510 	}
1511 	p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, prefs, proto);
1512 	if (!p) {
1513 		free(newmsg);
1514 		return -1;
1515 	}
1516 	p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, prefd, proto);
1517 	if (!p) {
1518 		free(newmsg);
1519 		return -1;
1520 	}
1521 	p = pfkey_setsadblifetime(p, ep, SADB_EXT_LIFETIME_HARD,
1522 			0, 0, ltime, vtime);
1523 	if (!p || p + policylen != ep) {
1524 		free(newmsg);
1525 		return -1;
1526 	}
1527 	memcpy(p, policy, policylen);
1528 
1529 	/* send message */
1530 	len = pfkey_send(so, newmsg, len);
1531 	free(newmsg);
1532 
1533 	if (len < 0)
1534 		return -1;
1535 
1536 	__ipsec_errcode = EIPSEC_NO_ERROR;
1537 	return len;
1538 }
1539 
1540 /* sending SADB_X_SPDGET or SADB_X_SPDDELETE message to the kernel */
1541 static int
1542 pfkey_send_x5(so, type, spid)
1543 	int so;
1544 	u_int type;
1545 	u_int32_t spid;
1546 {
1547 	struct sadb_msg *newmsg;
1548 	struct sadb_x_policy xpl;
1549 	int len;
1550 	caddr_t p;
1551 	caddr_t ep;
1552 
1553 	/* create new sadb_msg to reply. */
1554 	len = sizeof(struct sadb_msg)
1555 		+ sizeof(xpl);
1556 
1557 	if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) {
1558 		__ipsec_set_strerror(strerror(errno));
1559 		return -1;
1560 	}
1561 	ep = ((caddr_t)newmsg) + len;
1562 
1563 	p = pfkey_setsadbmsg((caddr_t)newmsg, ep, type, len,
1564 	    SADB_SATYPE_UNSPEC, 0, getpid());
1565 	if (!p) {
1566 		free(newmsg);
1567 		return -1;
1568 	}
1569 
1570 	if (p + sizeof(xpl) != ep) {
1571 		free(newmsg);
1572 		return -1;
1573 	}
1574 	memset(&xpl, 0, sizeof(xpl));
1575 	xpl.sadb_x_policy_len = PFKEY_UNIT64(sizeof(xpl));
1576 	xpl.sadb_x_policy_exttype = SADB_X_EXT_POLICY;
1577 	xpl.sadb_x_policy_id = spid;
1578 	memcpy(p, &xpl, sizeof(xpl));
1579 
1580 	/* send message */
1581 	len = pfkey_send(so, newmsg, len);
1582 	free(newmsg);
1583 
1584 	if (len < 0)
1585 		return -1;
1586 
1587 	__ipsec_errcode = EIPSEC_NO_ERROR;
1588 	return len;
1589 }
1590 
1591 /*
1592  * open a socket.
1593  * OUT:
1594  *	-1: fail.
1595  *	others : success and return value of socket.
1596  */
1597 int
1598 pfkey_open(void)
1599 {
1600 	int so;
1601 	int bufsiz_current, bufsiz_wanted;
1602 	int ret;
1603 	socklen_t len;
1604 
1605 	if ((so = socket(PF_KEY, SOCK_RAW, PF_KEY_V2)) < 0) {
1606 		__ipsec_set_strerror(strerror(errno));
1607 		return -1;
1608 	}
1609 
1610 	/*
1611 	 * This is a temporary workaround for KAME PR 154.
1612 	 * Don't really care even if it fails.
1613 	 */
1614 	/* Try to have 128k. If we have more, do not lower it. */
1615 	bufsiz_wanted = 128 * 1024;
1616 	len = sizeof(bufsiz_current);
1617 	ret = getsockopt(so, SOL_SOCKET, SO_SNDBUF,
1618 		&bufsiz_current, &len);
1619 	if ((ret < 0) || (bufsiz_current < bufsiz_wanted))
1620 		(void)setsockopt(so, SOL_SOCKET, SO_SNDBUF,
1621 			&bufsiz_wanted, sizeof(bufsiz_wanted));
1622 
1623 	/* Try to have have at least 2MB. If we have more, do not lower it. */
1624 	bufsiz_wanted = 2 * 1024 * 1024;
1625 	len = sizeof(bufsiz_current);
1626 	ret = getsockopt(so, SOL_SOCKET, SO_RCVBUF,
1627 		&bufsiz_current, &len);
1628 	if (ret < 0)
1629 		bufsiz_current = 128 * 1024;
1630 
1631 	for (; bufsiz_wanted > bufsiz_current; bufsiz_wanted /= 2) {
1632 		if (setsockopt(so, SOL_SOCKET, SO_RCVBUF,
1633 				&bufsiz_wanted, sizeof(bufsiz_wanted)) == 0)
1634 			break;
1635 	}
1636 
1637 	__ipsec_errcode = EIPSEC_NO_ERROR;
1638 	return so;
1639 }
1640 
1641 /*
1642  * close a socket.
1643  * OUT:
1644  *	 0: success.
1645  *	-1: fail.
1646  */
1647 void
1648 pfkey_close(so)
1649 	int so;
1650 {
1651 	(void)close(so);
1652 
1653 	__ipsec_errcode = EIPSEC_NO_ERROR;
1654 	return;
1655 }
1656 
1657 /*
1658  * receive sadb_msg data, and return pointer to new buffer allocated.
1659  * Must free this buffer later.
1660  * OUT:
1661  *	NULL	: error occurred.
1662  *	others	: a pointer to sadb_msg structure.
1663  *
1664  * XXX should be rewritten to pass length explicitly
1665  */
1666 struct sadb_msg *
1667 pfkey_recv(so)
1668 	int so;
1669 {
1670 	struct sadb_msg buf, *newmsg;
1671 	int len, reallen;
1672 
1673 	while ((len = recv(so, (caddr_t)&buf, sizeof(buf), MSG_PEEK)) < 0) {
1674 		if (errno == EINTR)
1675 			continue;
1676 		__ipsec_set_strerror(strerror(errno));
1677 		return NULL;
1678 	}
1679 
1680 	if (len < sizeof(buf)) {
1681 		recv(so, (caddr_t)&buf, sizeof(buf), 0);
1682 		__ipsec_errcode = EIPSEC_MAX;
1683 		return NULL;
1684 	}
1685 
1686 	/* read real message */
1687 	reallen = PFKEY_UNUNIT64(buf.sadb_msg_len);
1688 	if ((newmsg = CALLOC(reallen, struct sadb_msg *)) == NULL) {
1689 		__ipsec_set_strerror(strerror(errno));
1690 		return NULL;
1691 	}
1692 
1693 	while ((len = recv(so, (caddr_t)newmsg, reallen, 0)) < 0) {
1694 		if (errno == EINTR)
1695 			continue;
1696 		__ipsec_set_strerror(strerror(errno));
1697 		free(newmsg);
1698 		return NULL;
1699 	}
1700 
1701 	if (len != reallen) {
1702 		__ipsec_errcode = EIPSEC_SYSTEM_ERROR;
1703 		free(newmsg);
1704 		return NULL;
1705 	}
1706 
1707 	/* don't trust what the kernel says, validate! */
1708 	if (PFKEY_UNUNIT64(newmsg->sadb_msg_len) != len) {
1709 		__ipsec_errcode = EIPSEC_SYSTEM_ERROR;
1710 		free(newmsg);
1711 		return NULL;
1712 	}
1713 
1714 	__ipsec_errcode = EIPSEC_NO_ERROR;
1715 	return newmsg;
1716 }
1717 
1718 /*
1719  * send message to a socket.
1720  * OUT:
1721  *	 others: success and return length sent.
1722  *	-1     : fail.
1723  */
1724 int
1725 pfkey_send(so, msg, len)
1726 	int so;
1727 	struct sadb_msg *msg;
1728 	int len;
1729 {
1730 	if ((len = send(so, (caddr_t)msg, len, 0)) < 0) {
1731 		__ipsec_set_strerror(strerror(errno));
1732 		return -1;
1733 	}
1734 
1735 	__ipsec_errcode = EIPSEC_NO_ERROR;
1736 	return len;
1737 }
1738 
1739 /*
1740  * %%% Utilities
1741  * NOTE: These functions are derived from netkey/key.c in KAME.
1742  */
1743 /*
1744  * set the pointer to each header in this message buffer.
1745  * IN:	msg: pointer to message buffer.
1746  *	mhp: pointer to the buffer initialized like below:
1747  *		caddr_t mhp[SADB_EXT_MAX + 1];
1748  * OUT:	-1: invalid.
1749  *	 0: valid.
1750  *
1751  * XXX should be rewritten to obtain length explicitly
1752  */
1753 int
1754 pfkey_align(msg, mhp)
1755 	struct sadb_msg *msg;
1756 	caddr_t *mhp;
1757 {
1758 	struct sadb_ext *ext;
1759 	int i;
1760 	caddr_t p;
1761 	caddr_t ep;	/* XXX should be passed from upper layer */
1762 
1763 	/* validity check */
1764 	if (msg == NULL || mhp == NULL) {
1765 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
1766 		return -1;
1767 	}
1768 
1769 	/* initialize */
1770 	for (i = 0; i < SADB_EXT_MAX + 1; i++)
1771 		mhp[i] = NULL;
1772 
1773 	mhp[0] = (caddr_t)msg;
1774 
1775 	/* initialize */
1776 	p = (caddr_t) msg;
1777 	ep = p + PFKEY_UNUNIT64(msg->sadb_msg_len);
1778 
1779 	/* skip base header */
1780 	p += sizeof(struct sadb_msg);
1781 
1782 	while (p < ep) {
1783 		ext = (struct sadb_ext *)p;
1784 		if (ep < p + sizeof(*ext) || PFKEY_EXTLEN(ext) < sizeof(*ext) ||
1785 		    ep < p + PFKEY_EXTLEN(ext)) {
1786 			/* invalid format */
1787 			break;
1788 		}
1789 
1790 		/* duplicate check */
1791 		/* XXX Are there duplication either KEY_AUTH or KEY_ENCRYPT ?*/
1792 		if (mhp[ext->sadb_ext_type] != NULL) {
1793 			__ipsec_errcode = EIPSEC_INVAL_EXTTYPE;
1794 			return -1;
1795 		}
1796 
1797 		/* set pointer */
1798 		switch (ext->sadb_ext_type) {
1799 		case SADB_EXT_SA:
1800 		case SADB_EXT_LIFETIME_CURRENT:
1801 		case SADB_EXT_LIFETIME_HARD:
1802 		case SADB_EXT_LIFETIME_SOFT:
1803 		case SADB_EXT_ADDRESS_SRC:
1804 		case SADB_EXT_ADDRESS_DST:
1805 		case SADB_EXT_ADDRESS_PROXY:
1806 		case SADB_EXT_KEY_AUTH:
1807 			/* XXX should to be check weak keys. */
1808 		case SADB_EXT_KEY_ENCRYPT:
1809 			/* XXX should to be check weak keys. */
1810 		case SADB_EXT_IDENTITY_SRC:
1811 		case SADB_EXT_IDENTITY_DST:
1812 		case SADB_EXT_SENSITIVITY:
1813 		case SADB_EXT_PROPOSAL:
1814 		case SADB_EXT_SUPPORTED_AUTH:
1815 		case SADB_EXT_SUPPORTED_ENCRYPT:
1816 		case SADB_EXT_SPIRANGE:
1817 		case SADB_X_EXT_POLICY:
1818 		case SADB_X_EXT_SA2:
1819 		case SADB_X_EXT_NAT_T_TYPE:
1820 		case SADB_X_EXT_NAT_T_SPORT:
1821 		case SADB_X_EXT_NAT_T_DPORT:
1822 		case SADB_X_EXT_NAT_T_OAI:
1823 		case SADB_X_EXT_NAT_T_OAR:
1824 		case SADB_X_EXT_NAT_T_FRAG:
1825 		case SADB_X_EXT_SA_REPLAY:
1826 		case SADB_X_EXT_NEW_ADDRESS_SRC:
1827 		case SADB_X_EXT_NEW_ADDRESS_DST:
1828 			mhp[ext->sadb_ext_type] = (caddr_t)ext;
1829 			break;
1830 		default:
1831 			__ipsec_errcode = EIPSEC_INVAL_EXTTYPE;
1832 			return -1;
1833 		}
1834 
1835 		p += PFKEY_EXTLEN(ext);
1836 	}
1837 
1838 	if (p != ep) {
1839 		__ipsec_errcode = EIPSEC_INVAL_SADBMSG;
1840 		return -1;
1841 	}
1842 
1843 	__ipsec_errcode = EIPSEC_NO_ERROR;
1844 	return 0;
1845 }
1846 
1847 /*
1848  * check basic usage for sadb_msg,
1849  * NOTE: This routine is derived from netkey/key.c in KAME.
1850  * IN:	msg: pointer to message buffer.
1851  *	mhp: pointer to the buffer initialized like below:
1852  *
1853  *		caddr_t mhp[SADB_EXT_MAX + 1];
1854  *
1855  * OUT:	-1: invalid.
1856  *	 0: valid.
1857  */
1858 int
1859 pfkey_check(mhp)
1860 	caddr_t *mhp;
1861 {
1862 	struct sadb_msg *msg;
1863 
1864 	/* validity check */
1865 	if (mhp == NULL || mhp[0] == NULL) {
1866 		__ipsec_errcode = EIPSEC_INVAL_ARGUMENT;
1867 		return -1;
1868 	}
1869 
1870 	msg = (struct sadb_msg *)mhp[0];
1871 
1872 	/* check version */
1873 	if (msg->sadb_msg_version != PF_KEY_V2) {
1874 		__ipsec_errcode = EIPSEC_INVAL_VERSION;
1875 		return -1;
1876 	}
1877 
1878 	/* check type */
1879 	if (msg->sadb_msg_type > SADB_MAX) {
1880 		__ipsec_errcode = EIPSEC_INVAL_MSGTYPE;
1881 		return -1;
1882 	}
1883 
1884 	/* check SA type */
1885 	switch (msg->sadb_msg_satype) {
1886 	case SADB_SATYPE_UNSPEC:
1887 		switch (msg->sadb_msg_type) {
1888 		case SADB_GETSPI:
1889 		case SADB_UPDATE:
1890 		case SADB_ADD:
1891 		case SADB_DELETE:
1892 		case SADB_GET:
1893 		case SADB_ACQUIRE:
1894 		case SADB_EXPIRE:
1895 			__ipsec_errcode = EIPSEC_INVAL_SATYPE;
1896 			return -1;
1897 		}
1898 		break;
1899 	case SADB_SATYPE_ESP:
1900 	case SADB_SATYPE_AH:
1901 	case SADB_X_SATYPE_IPCOMP:
1902 	case SADB_X_SATYPE_TCPSIGNATURE:
1903 		switch (msg->sadb_msg_type) {
1904 		case SADB_X_SPDADD:
1905 		case SADB_X_SPDDELETE:
1906 		case SADB_X_SPDGET:
1907 		case SADB_X_SPDDUMP:
1908 		case SADB_X_SPDFLUSH:
1909 			__ipsec_errcode = EIPSEC_INVAL_SATYPE;
1910 			return -1;
1911 		}
1912 		break;
1913 	case SADB_SATYPE_RSVP:
1914 	case SADB_SATYPE_OSPFV2:
1915 	case SADB_SATYPE_RIPV2:
1916 	case SADB_SATYPE_MIP:
1917 		__ipsec_errcode = EIPSEC_NOT_SUPPORTED;
1918 		return -1;
1919 	case 1:	/* XXX: What does it do ? */
1920 		if (msg->sadb_msg_type == SADB_X_PROMISC)
1921 			break;
1922 		/*FALLTHROUGH*/
1923 	default:
1924 		__ipsec_errcode = EIPSEC_INVAL_SATYPE;
1925 		return -1;
1926 	}
1927 
1928 	/* check field of upper layer protocol and address family */
1929 	if (mhp[SADB_EXT_ADDRESS_SRC] != NULL
1930 	 && mhp[SADB_EXT_ADDRESS_DST] != NULL) {
1931 		struct sadb_address *src0, *dst0;
1932 
1933 		src0 = (struct sadb_address *)(mhp[SADB_EXT_ADDRESS_SRC]);
1934 		dst0 = (struct sadb_address *)(mhp[SADB_EXT_ADDRESS_DST]);
1935 
1936 		if (src0->sadb_address_proto != dst0->sadb_address_proto) {
1937 			__ipsec_errcode = EIPSEC_PROTO_MISMATCH;
1938 			return -1;
1939 		}
1940 
1941 		if (PFKEY_ADDR_SADDR(src0)->sa_family
1942 		 != PFKEY_ADDR_SADDR(dst0)->sa_family) {
1943 			__ipsec_errcode = EIPSEC_FAMILY_MISMATCH;
1944 			return -1;
1945 		}
1946 
1947 		switch (PFKEY_ADDR_SADDR(src0)->sa_family) {
1948 		case AF_INET:
1949 		case AF_INET6:
1950 			break;
1951 		default:
1952 			__ipsec_errcode = EIPSEC_INVAL_FAMILY;
1953 			return -1;
1954 		}
1955 
1956 		/*
1957 		 * prefixlen == 0 is valid because there must be the case
1958 		 * all addresses are matched.
1959 		 */
1960 	}
1961 
1962 	__ipsec_errcode = EIPSEC_NO_ERROR;
1963 	return 0;
1964 }
1965 
1966 /*
1967  * set data into sadb_msg.
1968  * `buf' must has been allocated sufficiently.
1969  */
1970 static caddr_t
1971 pfkey_setsadbmsg(buf, lim, type, tlen, satype, seq, pid)
1972 	caddr_t buf;
1973 	caddr_t lim;
1974 	u_int type, satype;
1975 	u_int tlen;
1976 	u_int32_t seq;
1977 	pid_t pid;
1978 {
1979 	struct sadb_msg *p;
1980 	u_int len;
1981 
1982 	p = (struct sadb_msg *)buf;
1983 	len = sizeof(struct sadb_msg);
1984 
1985 	if (buf + len > lim)
1986 		return NULL;
1987 
1988 	memset(p, 0, len);
1989 	p->sadb_msg_version = PF_KEY_V2;
1990 	p->sadb_msg_type = type;
1991 	p->sadb_msg_errno = 0;
1992 	p->sadb_msg_satype = satype;
1993 	p->sadb_msg_len = PFKEY_UNIT64(tlen);
1994 	p->sadb_msg_reserved = 0;
1995 	p->sadb_msg_seq = seq;
1996 	p->sadb_msg_pid = (u_int32_t)pid;
1997 
1998 	return(buf + len);
1999 }
2000 
2001 /*
2002  * copy secasvar data into sadb_address.
2003  * `buf' must has been allocated sufficiently.
2004  */
2005 static caddr_t
2006 pfkey_setsadbsa(buf, lim, spi, wsize, auth, enc, flags)
2007 	caddr_t buf;
2008 	caddr_t lim;
2009 	u_int32_t spi, flags;
2010 	u_int wsize, auth, enc;
2011 {
2012 	struct sadb_sa *p;
2013 	u_int len;
2014 
2015 	p = (struct sadb_sa *)buf;
2016 	len = sizeof(struct sadb_sa);
2017 
2018 	if (buf + len > lim)
2019 		return NULL;
2020 
2021 	memset(p, 0, len);
2022 	p->sadb_sa_len = PFKEY_UNIT64(len);
2023 	p->sadb_sa_exttype = SADB_EXT_SA;
2024 	p->sadb_sa_spi = spi;
2025 	p->sadb_sa_replay = wsize > UINT8_MAX ? UINT8_MAX: wsize;
2026 	p->sadb_sa_state = SADB_SASTATE_LARVAL;
2027 	p->sadb_sa_auth = auth;
2028 	p->sadb_sa_encrypt = enc;
2029 	p->sadb_sa_flags = flags;
2030 
2031 	return(buf + len);
2032 }
2033 
2034 /*
2035  * Set data into sadb_x_sa_replay.
2036  * `buf' must has been allocated sufficiently.
2037  */
2038 static caddr_t
2039 pfkey_setsadbxreplay(caddr_t buf, caddr_t lim, uint32_t wsize)
2040 {
2041 	struct sadb_x_sa_replay *p;
2042 	u_int len;
2043 
2044 	p = (struct sadb_x_sa_replay *)buf;
2045 	len = sizeof(struct sadb_x_sa_replay);
2046 
2047 	if (buf + len > lim)
2048 		return (NULL);
2049 
2050 	memset(p, 0, len);
2051 	p->sadb_x_sa_replay_len = PFKEY_UNIT64(len);
2052 	p->sadb_x_sa_replay_exttype = SADB_X_EXT_SA_REPLAY;
2053 	/* Convert wsize from bytes to number of packets. */
2054 	p->sadb_x_sa_replay_replay = wsize << 3;
2055 
2056 	return (buf + len);
2057 }
2058 
2059 /*
2060  * set data into sadb_address.
2061  * `buf' must has been allocated sufficiently.
2062  * prefixlen is in bits.
2063  */
2064 static caddr_t
2065 pfkey_setsadbaddr(buf, lim, exttype, saddr, prefixlen, ul_proto)
2066 	caddr_t buf;
2067 	caddr_t lim;
2068 	u_int exttype;
2069 	struct sockaddr *saddr;
2070 	u_int prefixlen;
2071 	u_int ul_proto;
2072 {
2073 	struct sadb_address *p;
2074 	u_int len;
2075 
2076 	p = (struct sadb_address *)buf;
2077 	len = sizeof(struct sadb_address) + PFKEY_ALIGN8(saddr->sa_len);
2078 
2079 	if (buf + len > lim)
2080 		return NULL;
2081 
2082 	memset(p, 0, len);
2083 	p->sadb_address_len = PFKEY_UNIT64(len);
2084 	p->sadb_address_exttype = exttype & 0xffff;
2085 	p->sadb_address_proto = ul_proto & 0xff;
2086 	p->sadb_address_prefixlen = prefixlen;
2087 	p->sadb_address_reserved = 0;
2088 
2089 	memcpy(p + 1, saddr, saddr->sa_len);
2090 
2091 	return(buf + len);
2092 }
2093 
2094 /*
2095  * set sadb_key structure after clearing buffer with zero.
2096  * OUT: the pointer of buf + len.
2097  */
2098 static caddr_t
2099 pfkey_setsadbkey(buf, lim, type, key, keylen)
2100 	caddr_t buf;
2101 	caddr_t lim;
2102 	caddr_t key;
2103 	u_int type, keylen;
2104 {
2105 	struct sadb_key *p;
2106 	u_int len;
2107 
2108 	p = (struct sadb_key *)buf;
2109 	len = sizeof(struct sadb_key) + PFKEY_ALIGN8(keylen);
2110 
2111 	if (buf + len > lim)
2112 		return NULL;
2113 
2114 	memset(p, 0, len);
2115 	p->sadb_key_len = PFKEY_UNIT64(len);
2116 	p->sadb_key_exttype = type;
2117 	p->sadb_key_bits = keylen << 3;
2118 	p->sadb_key_reserved = 0;
2119 
2120 	memcpy(p + 1, key, keylen);
2121 
2122 	return buf + len;
2123 }
2124 
2125 /*
2126  * set sadb_lifetime structure after clearing buffer with zero.
2127  * OUT: the pointer of buf + len.
2128  */
2129 static caddr_t
2130 pfkey_setsadblifetime(buf, lim, type, l_alloc, l_bytes, l_addtime, l_usetime)
2131 	caddr_t buf;
2132 	caddr_t lim;
2133 	u_int type;
2134 	u_int32_t l_alloc, l_bytes, l_addtime, l_usetime;
2135 {
2136 	struct sadb_lifetime *p;
2137 	u_int len;
2138 
2139 	p = (struct sadb_lifetime *)buf;
2140 	len = sizeof(struct sadb_lifetime);
2141 
2142 	if (buf + len > lim)
2143 		return NULL;
2144 
2145 	memset(p, 0, len);
2146 	p->sadb_lifetime_len = PFKEY_UNIT64(len);
2147 	p->sadb_lifetime_exttype = type;
2148 
2149 	switch (type) {
2150 	case SADB_EXT_LIFETIME_SOFT:
2151 		p->sadb_lifetime_allocations
2152 			= (l_alloc * soft_lifetime_allocations_rate) /100;
2153 		p->sadb_lifetime_bytes
2154 			= (l_bytes * soft_lifetime_bytes_rate) /100;
2155 		p->sadb_lifetime_addtime
2156 			= (l_addtime * soft_lifetime_addtime_rate) /100;
2157 		p->sadb_lifetime_usetime
2158 			= (l_usetime * soft_lifetime_usetime_rate) /100;
2159 		break;
2160 	case SADB_EXT_LIFETIME_HARD:
2161 		p->sadb_lifetime_allocations = l_alloc;
2162 		p->sadb_lifetime_bytes = l_bytes;
2163 		p->sadb_lifetime_addtime = l_addtime;
2164 		p->sadb_lifetime_usetime = l_usetime;
2165 		break;
2166 	}
2167 
2168 	return buf + len;
2169 }
2170 
2171 /*
2172  * copy secasvar data into sadb_address.
2173  * `buf' must has been allocated sufficiently.
2174  */
2175 static caddr_t
2176 pfkey_setsadbxsa2(buf, lim, mode0, reqid)
2177 	caddr_t buf;
2178 	caddr_t lim;
2179 	u_int32_t mode0;
2180 	u_int32_t reqid;
2181 {
2182 	struct sadb_x_sa2 *p;
2183 	u_int8_t mode = mode0 & 0xff;
2184 	u_int len;
2185 
2186 	p = (struct sadb_x_sa2 *)buf;
2187 	len = sizeof(struct sadb_x_sa2);
2188 
2189 	if (buf + len > lim)
2190 		return NULL;
2191 
2192 	memset(p, 0, len);
2193 	p->sadb_x_sa2_len = PFKEY_UNIT64(len);
2194 	p->sadb_x_sa2_exttype = SADB_X_EXT_SA2;
2195 	p->sadb_x_sa2_mode = mode;
2196 	p->sadb_x_sa2_reqid = reqid;
2197 
2198 	return(buf + len);
2199 }
2200