xref: /freebsd/sys/netinet/sctp_asconf.c (revision ce20b48a60fbae275085237dd48075d426f00d37)
1f8829a4aSRandall Stewart /*-
251369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni  *
4b1006367SRandall Stewart  * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
5807aad63SMichael Tuexen  * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
6807aad63SMichael Tuexen  * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
7f8829a4aSRandall Stewart  *
8f8829a4aSRandall Stewart  * Redistribution and use in source and binary forms, with or without
9f8829a4aSRandall Stewart  * modification, are permitted provided that the following conditions are met:
10f8829a4aSRandall Stewart  *
11f8829a4aSRandall Stewart  * a) Redistributions of source code must retain the above copyright notice,
12f8829a4aSRandall Stewart  *    this list of conditions and the following disclaimer.
13f8829a4aSRandall Stewart  *
14f8829a4aSRandall Stewart  * b) Redistributions in binary form must reproduce the above copyright
15f8829a4aSRandall Stewart  *    notice, this list of conditions and the following disclaimer in
16f8829a4aSRandall Stewart  *    the documentation and/or other materials provided with the distribution.
17f8829a4aSRandall Stewart  *
18f8829a4aSRandall Stewart  * c) Neither the name of Cisco Systems, Inc. nor the names of its
19f8829a4aSRandall Stewart  *    contributors may be used to endorse or promote products derived
20f8829a4aSRandall Stewart  *    from this software without specific prior written permission.
21f8829a4aSRandall Stewart  *
22f8829a4aSRandall Stewart  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23f8829a4aSRandall Stewart  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
24f8829a4aSRandall Stewart  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25f8829a4aSRandall Stewart  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
26f8829a4aSRandall Stewart  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
27f8829a4aSRandall Stewart  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
28f8829a4aSRandall Stewart  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
29f8829a4aSRandall Stewart  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
30f8829a4aSRandall Stewart  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
31f8829a4aSRandall Stewart  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
32f8829a4aSRandall Stewart  * THE POSSIBILITY OF SUCH DAMAGE.
33f8829a4aSRandall Stewart  */
34f8829a4aSRandall Stewart 
35f8829a4aSRandall Stewart #include <netinet/sctp_os.h>
36f8829a4aSRandall Stewart #include <netinet/sctp_var.h>
3742551e99SRandall Stewart #include <netinet/sctp_sysctl.h>
38f8829a4aSRandall Stewart #include <netinet/sctp_pcb.h>
39f8829a4aSRandall Stewart #include <netinet/sctp_header.h>
40f8829a4aSRandall Stewart #include <netinet/sctputil.h>
41f8829a4aSRandall Stewart #include <netinet/sctp_output.h>
42f8829a4aSRandall Stewart #include <netinet/sctp_asconf.h>
43851b7298SRandall Stewart #include <netinet/sctp_timer.h>
44f8829a4aSRandall Stewart 
45f8829a4aSRandall Stewart /*
46f8829a4aSRandall Stewart  * debug flags:
47f8829a4aSRandall Stewart  * SCTP_DEBUG_ASCONF1: protocol info, general info and errors
48f8829a4aSRandall Stewart  * SCTP_DEBUG_ASCONF2: detailed info
49f8829a4aSRandall Stewart  */
50f8829a4aSRandall Stewart 
51f8829a4aSRandall Stewart /*
52b1754ad1SMichael Tuexen  * RFC 5061
53f8829a4aSRandall Stewart  *
54f8829a4aSRandall Stewart  * An ASCONF parameter queue exists per asoc which holds the pending address
55f8829a4aSRandall Stewart  * operations.  Lists are updated upon receipt of ASCONF-ACK.
56f8829a4aSRandall Stewart  *
5718e198d3SRandall Stewart  * A restricted_addrs list exists per assoc to hold local addresses that are
5818e198d3SRandall Stewart  * not (yet) usable by the assoc as a source address.  These addresses are
5918e198d3SRandall Stewart  * either pending an ASCONF operation (and exist on the ASCONF parameter
6018e198d3SRandall Stewart  * queue), or they are permanently restricted (the peer has returned an
6118e198d3SRandall Stewart  * ERROR indication to an ASCONF(ADD), or the peer does not support ASCONF).
6218e198d3SRandall Stewart  *
63f8829a4aSRandall Stewart  * Deleted addresses are always immediately removed from the lists as they will
64f8829a4aSRandall Stewart  * (shortly) no longer exist in the kernel.  We send ASCONFs as a courtesy,
65f8829a4aSRandall Stewart  * only if allowed.
66f8829a4aSRandall Stewart  */
67f8829a4aSRandall Stewart 
68f8829a4aSRandall Stewart /*
6918e198d3SRandall Stewart  * ASCONF parameter processing.
7018e198d3SRandall Stewart  * response_required: set if a reply is required (eg. SUCCESS_REPORT).
7118e198d3SRandall Stewart  * returns a mbuf to an "error" response parameter or NULL/"success" if ok.
7218e198d3SRandall Stewart  * FIX: allocating this many mbufs on the fly is pretty inefficient...
73f8829a4aSRandall Stewart  */
74f8829a4aSRandall Stewart static struct mbuf *
sctp_asconf_success_response(uint32_t id)75f8829a4aSRandall Stewart sctp_asconf_success_response(uint32_t id)
76f8829a4aSRandall Stewart {
77f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
78f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
79f8829a4aSRandall Stewart 
80f8829a4aSRandall Stewart 	m_reply = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_paramhdr),
81eb1b1807SGleb Smirnoff 	    0, M_NOWAIT, 1, MT_DATA);
82f8829a4aSRandall Stewart 	if (m_reply == NULL) {
83ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
84ad81507eSRandall Stewart 		    "asconf_success_response: couldn't get mbuf!\n");
8560990c0cSMichael Tuexen 		return (NULL);
86f8829a4aSRandall Stewart 	}
87f8829a4aSRandall Stewart 	aph = mtod(m_reply, struct sctp_asconf_paramhdr *);
88f8829a4aSRandall Stewart 	aph->correlation_id = id;
89f8829a4aSRandall Stewart 	aph->ph.param_type = htons(SCTP_SUCCESS_REPORT);
90f8829a4aSRandall Stewart 	aph->ph.param_length = sizeof(struct sctp_asconf_paramhdr);
91139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_reply) = aph->ph.param_length;
92f8829a4aSRandall Stewart 	aph->ph.param_length = htons(aph->ph.param_length);
93f8829a4aSRandall Stewart 
9460990c0cSMichael Tuexen 	return (m_reply);
95f8829a4aSRandall Stewart }
96f8829a4aSRandall Stewart 
97f8829a4aSRandall Stewart static struct mbuf *
sctp_asconf_error_response(uint32_t id,uint16_t cause,uint8_t * error_tlv,uint16_t tlv_length)98f8829a4aSRandall Stewart sctp_asconf_error_response(uint32_t id, uint16_t cause, uint8_t *error_tlv,
99f8829a4aSRandall Stewart     uint16_t tlv_length)
100f8829a4aSRandall Stewart {
101f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
102f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
103f8829a4aSRandall Stewart 	struct sctp_error_cause *error;
104dc13edbcSMichael Tuexen 	uint32_t buf_len;
1055989470cSMichael Tuexen 	uint16_t i, param_length, cause_length, padding_length;
106f8829a4aSRandall Stewart 	uint8_t *tlv;
107f8829a4aSRandall Stewart 
1085989470cSMichael Tuexen 	if (error_tlv == NULL) {
1095989470cSMichael Tuexen 		tlv_length = 0;
1105989470cSMichael Tuexen 	}
1115989470cSMichael Tuexen 	cause_length = sizeof(struct sctp_error_cause) + tlv_length;
1125989470cSMichael Tuexen 	param_length = sizeof(struct sctp_asconf_paramhdr) + cause_length;
1135989470cSMichael Tuexen 	padding_length = tlv_length % 4;
1145989470cSMichael Tuexen 	if (padding_length != 0) {
1155989470cSMichael Tuexen 		padding_length = 4 - padding_length;
1165989470cSMichael Tuexen 	}
1175989470cSMichael Tuexen 	buf_len = param_length + padding_length;
1185989470cSMichael Tuexen 	if (buf_len > MLEN) {
1195989470cSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1205989470cSMichael Tuexen 		    "asconf_error_response: tlv_length (%xh) too big\n",
1215989470cSMichael Tuexen 		    tlv_length);
1225989470cSMichael Tuexen 		return (NULL);
1235989470cSMichael Tuexen 	}
1245989470cSMichael Tuexen 	m_reply = sctp_get_mbuf_for_msg(buf_len, 0, M_NOWAIT, 1, MT_DATA);
125f8829a4aSRandall Stewart 	if (m_reply == NULL) {
126ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
127ad81507eSRandall Stewart 		    "asconf_error_response: couldn't get mbuf!\n");
12860990c0cSMichael Tuexen 		return (NULL);
129f8829a4aSRandall Stewart 	}
130f8829a4aSRandall Stewart 	aph = mtod(m_reply, struct sctp_asconf_paramhdr *);
131f8829a4aSRandall Stewart 	aph->ph.param_type = htons(SCTP_ERROR_CAUSE_IND);
1325989470cSMichael Tuexen 	aph->ph.param_length = htons(param_length);
1335989470cSMichael Tuexen 	aph->correlation_id = id;
1345989470cSMichael Tuexen 	error = (struct sctp_error_cause *)(aph + 1);
135f8829a4aSRandall Stewart 	error->code = htons(cause);
1365989470cSMichael Tuexen 	error->length = htons(cause_length);
137f8829a4aSRandall Stewart 	if (error_tlv != NULL) {
138f8829a4aSRandall Stewart 		tlv = (uint8_t *)(error + 1);
139f8829a4aSRandall Stewart 		memcpy(tlv, error_tlv, tlv_length);
1405989470cSMichael Tuexen 		for (i = 0; i < padding_length; i++) {
1415989470cSMichael Tuexen 			tlv[tlv_length + i] = 0;
142f8829a4aSRandall Stewart 		}
1435989470cSMichael Tuexen 	}
1445989470cSMichael Tuexen 	SCTP_BUF_LEN(m_reply) = buf_len;
14560990c0cSMichael Tuexen 	return (m_reply);
146f8829a4aSRandall Stewart }
147f8829a4aSRandall Stewart 
148f8829a4aSRandall Stewart static struct mbuf *
sctp_process_asconf_add_ip(struct sockaddr * src,struct sctp_asconf_paramhdr * aph,struct sctp_tcb * stcb,int send_hb,int response_required)149b1754ad1SMichael Tuexen sctp_process_asconf_add_ip(struct sockaddr *src, struct sctp_asconf_paramhdr *aph,
150ca85e948SMichael Tuexen     struct sctp_tcb *stcb, int send_hb, int response_required)
151f8829a4aSRandall Stewart {
152ca85e948SMichael Tuexen 	struct sctp_nets *net;
153f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
15424aaac8dSMichael Tuexen 	union sctp_sockstore store;
155e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
156b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
157b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
158b54ddf22SMichael Tuexen 	uint16_t param_length;
159b54ddf22SMichael Tuexen #endif
160f8829a4aSRandall Stewart 	struct sockaddr *sa;
161f8829a4aSRandall Stewart 	int zero_address = 0;
16292776dfdSMichael Tuexen 	int bad_address = 0;
163e6194c2eSMichael Tuexen #ifdef INET
164e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
165e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
166e6194c2eSMichael Tuexen #endif
167f8829a4aSRandall Stewart #ifdef INET6
168f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
169f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
170e6194c2eSMichael Tuexen #endif
171f8829a4aSRandall Stewart 
172f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
173967e1a53SMichael Tuexen 	if (aparam_length < sizeof(struct sctp_asconf_paramhdr) + sizeof(struct sctp_paramhdr)) {
174967e1a53SMichael Tuexen 		return (NULL);
175967e1a53SMichael Tuexen 	}
176e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
177e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
178b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
179e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
180967e1a53SMichael Tuexen 	if (param_length + sizeof(struct sctp_asconf_paramhdr) != aparam_length) {
181967e1a53SMichael Tuexen 		return (NULL);
182967e1a53SMichael Tuexen 	}
183b54ddf22SMichael Tuexen #endif
18424aaac8dSMichael Tuexen 	sa = &store.sa;
185f8829a4aSRandall Stewart 	switch (param_type) {
186e6194c2eSMichael Tuexen #ifdef INET
187f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
188f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
189f8829a4aSRandall Stewart 			/* invalid param size */
19060990c0cSMichael Tuexen 			return (NULL);
191f8829a4aSRandall Stewart 		}
192e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
19324aaac8dSMichael Tuexen 		sin = &store.sin;
1945ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
195f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
196f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
197f8829a4aSRandall Stewart 		sin->sin_port = stcb->rport;
198f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
19992776dfdSMichael Tuexen 		if ((sin->sin_addr.s_addr == INADDR_BROADCAST) ||
20092776dfdSMichael Tuexen 		    IN_MULTICAST(ntohl(sin->sin_addr.s_addr))) {
2013657c405SMichael Tuexen 			bad_address = 1;
20292776dfdSMichael Tuexen 		}
203f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
204f8829a4aSRandall Stewart 			zero_address = 1;
205ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_add_ip: adding ");
206ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
207f8829a4aSRandall Stewart 		break;
208e6194c2eSMichael Tuexen #endif
209f8829a4aSRandall Stewart #ifdef INET6
210e6194c2eSMichael Tuexen 	case SCTP_IPV6_ADDRESS:
211f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
212f8829a4aSRandall Stewart 			/* invalid param size */
21360990c0cSMichael Tuexen 			return (NULL);
214f8829a4aSRandall Stewart 		}
215e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
21624aaac8dSMichael Tuexen 		sin6 = &store.sin6;
2175ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
218f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
219f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
220f8829a4aSRandall Stewart 		sin6->sin6_port = stcb->rport;
221f8829a4aSRandall Stewart 		memcpy((caddr_t)&sin6->sin6_addr, v6addr->addr,
222f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
22392776dfdSMichael Tuexen 		if (IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr)) {
22492776dfdSMichael Tuexen 			bad_address = 1;
22592776dfdSMichael Tuexen 		}
226f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
227f8829a4aSRandall Stewart 			zero_address = 1;
228ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_add_ip: adding ");
229ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
230f8829a4aSRandall Stewart 		break;
231e6194c2eSMichael Tuexen #endif
232f8829a4aSRandall Stewart 	default:
233f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
23492776dfdSMichael Tuexen 		    SCTP_CAUSE_INVALID_PARAM, (uint8_t *)aph,
235f8829a4aSRandall Stewart 		    aparam_length);
23660990c0cSMichael Tuexen 		return (m_reply);
237f8829a4aSRandall Stewart 	}			/* end switch */
238f8829a4aSRandall Stewart 
239f8829a4aSRandall Stewart 	/* if 0.0.0.0/::0, add the source address instead */
240b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
241b1754ad1SMichael Tuexen 		sa = src;
242ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
243ad81507eSRandall Stewart 		    "process_asconf_add_ip: using source addr ");
244b1754ad1SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
245f8829a4aSRandall Stewart 	}
2462974e263SMichael Tuexen 	net = NULL;
247f8829a4aSRandall Stewart 	/* add the address */
24892776dfdSMichael Tuexen 	if (bad_address) {
24992776dfdSMichael Tuexen 		m_reply = sctp_asconf_error_response(aph->correlation_id,
25092776dfdSMichael Tuexen 		    SCTP_CAUSE_INVALID_PARAM, (uint8_t *)aph,
25192776dfdSMichael Tuexen 		    aparam_length);
2527154bf4aSMichael Tuexen 	} else if (sctp_add_remote_addr(stcb, sa, &net, stcb->asoc.port,
2537154bf4aSMichael Tuexen 		    SCTP_DONOT_SETSCOPE,
254a5d547adSRandall Stewart 	    SCTP_ADDR_DYNAMIC_ADDED) != 0) {
255ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
256ad81507eSRandall Stewart 		    "process_asconf_add_ip: error adding address\n");
257f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
258f8829a4aSRandall Stewart 		    SCTP_CAUSE_RESOURCE_SHORTAGE, (uint8_t *)aph,
259f8829a4aSRandall Stewart 		    aparam_length);
260f8829a4aSRandall Stewart 	} else {
261f8829a4aSRandall Stewart 		if (response_required) {
262f8829a4aSRandall Stewart 			m_reply =
263f8829a4aSRandall Stewart 			    sctp_asconf_success_response(aph->correlation_id);
264f8829a4aSRandall Stewart 		}
2652974e263SMichael Tuexen 		if (net != NULL) {
2662974e263SMichael Tuexen 			/* notify upper layer */
2672974e263SMichael Tuexen 			sctp_ulp_notify(SCTP_NOTIFY_ASCONF_ADD_IP, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
268ca85e948SMichael Tuexen 			sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, stcb->sctp_ep, stcb, net);
2693c503c28SRandall Stewart 			sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep,
270ca85e948SMichael Tuexen 			    stcb, net);
271ca85e948SMichael Tuexen 			if (send_hb) {
272ca85e948SMichael Tuexen 				sctp_send_hb(stcb, net, SCTP_SO_NOT_LOCKED);
273ca85e948SMichael Tuexen 			}
274f8829a4aSRandall Stewart 		}
2752974e263SMichael Tuexen 	}
27660990c0cSMichael Tuexen 	return (m_reply);
277f8829a4aSRandall Stewart }
278f8829a4aSRandall Stewart 
279f8829a4aSRandall Stewart static int
sctp_asconf_del_remote_addrs_except(struct sctp_tcb * stcb,struct sockaddr * src)2801b649582SRandall Stewart sctp_asconf_del_remote_addrs_except(struct sctp_tcb *stcb, struct sockaddr *src)
281f8829a4aSRandall Stewart {
2822560cb1eSMichael Tuexen 	struct sctp_nets *src_net, *net, *nnet;
283f8829a4aSRandall Stewart 
284f8829a4aSRandall Stewart 	/* make sure the source address exists as a destination net */
285f8829a4aSRandall Stewart 	src_net = sctp_findnet(stcb, src);
286f8829a4aSRandall Stewart 	if (src_net == NULL) {
287f8829a4aSRandall Stewart 		/* not found */
28860990c0cSMichael Tuexen 		return (-1);
289f8829a4aSRandall Stewart 	}
2900053ed28SMichael Tuexen 
291f8829a4aSRandall Stewart 	/* delete all destination addresses except the source */
2922560cb1eSMichael Tuexen 	TAILQ_FOREACH_SAFE(net, &stcb->asoc.nets, sctp_next, nnet) {
293f8829a4aSRandall Stewart 		if (net != src_net) {
294f8829a4aSRandall Stewart 			/* delete this address */
295ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
296ad81507eSRandall Stewart 			    "asconf_del_remote_addrs_except: deleting ");
297ad81507eSRandall Stewart 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1,
298ad81507eSRandall Stewart 			    (struct sockaddr *)&net->ro._l_addr);
299f8829a4aSRandall Stewart 			/* notify upper layer */
300f8829a4aSRandall Stewart 			sctp_ulp_notify(SCTP_NOTIFY_ASCONF_DELETE_IP, stcb, 0,
301ceaad40aSRandall Stewart 			    (struct sockaddr *)&net->ro._l_addr, SCTP_SO_NOT_LOCKED);
3022560cb1eSMichael Tuexen 			sctp_remove_net(stcb, net);
303f8829a4aSRandall Stewart 		}
304f8829a4aSRandall Stewart 	}
30560990c0cSMichael Tuexen 	return (0);
306f8829a4aSRandall Stewart }
307f8829a4aSRandall Stewart 
308f8829a4aSRandall Stewart static struct mbuf *
sctp_process_asconf_delete_ip(struct sockaddr * src,struct sctp_asconf_paramhdr * aph,struct sctp_tcb * stcb,int response_required)309b1754ad1SMichael Tuexen sctp_process_asconf_delete_ip(struct sockaddr *src,
310b1754ad1SMichael Tuexen     struct sctp_asconf_paramhdr *aph,
311f8829a4aSRandall Stewart     struct sctp_tcb *stcb, int response_required)
312f8829a4aSRandall Stewart {
313f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
31424aaac8dSMichael Tuexen 	union sctp_sockstore store;
315e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
316b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
317b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
318b54ddf22SMichael Tuexen 	uint16_t param_length;
319b54ddf22SMichael Tuexen #endif
320f8829a4aSRandall Stewart 	struct sockaddr *sa;
321f8829a4aSRandall Stewart 	int zero_address = 0;
322f8829a4aSRandall Stewart 	int result;
323e6194c2eSMichael Tuexen #ifdef INET
324e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
325e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
326e6194c2eSMichael Tuexen #endif
327f8829a4aSRandall Stewart #ifdef INET6
328f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
329f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
330e6194c2eSMichael Tuexen #endif
331f8829a4aSRandall Stewart 
332f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
333967e1a53SMichael Tuexen 	if (aparam_length < sizeof(struct sctp_asconf_paramhdr) + sizeof(struct sctp_paramhdr)) {
334967e1a53SMichael Tuexen 		return (NULL);
335967e1a53SMichael Tuexen 	}
336953b78beSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
337953b78beSMichael Tuexen 	param_type = ntohs(ph->param_type);
338b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
339e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
340967e1a53SMichael Tuexen 	if (param_length + sizeof(struct sctp_asconf_paramhdr) != aparam_length) {
341967e1a53SMichael Tuexen 		return (NULL);
342967e1a53SMichael Tuexen 	}
343b54ddf22SMichael Tuexen #endif
34424aaac8dSMichael Tuexen 	sa = &store.sa;
345f8829a4aSRandall Stewart 	switch (param_type) {
346e6194c2eSMichael Tuexen #ifdef INET
347f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
348f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
349f8829a4aSRandall Stewart 			/* invalid param size */
35060990c0cSMichael Tuexen 			return (NULL);
351f8829a4aSRandall Stewart 		}
352e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
35324aaac8dSMichael Tuexen 		sin = &store.sin;
3545ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
355f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
356f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
357f8829a4aSRandall Stewart 		sin->sin_port = stcb->rport;
358f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
359f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
360f8829a4aSRandall Stewart 			zero_address = 1;
361ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
362ad81507eSRandall Stewart 		    "process_asconf_delete_ip: deleting ");
363ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
364f8829a4aSRandall Stewart 		break;
365e6194c2eSMichael Tuexen #endif
366e6194c2eSMichael Tuexen #ifdef INET6
367f8829a4aSRandall Stewart 	case SCTP_IPV6_ADDRESS:
368f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
369f8829a4aSRandall Stewart 			/* invalid param size */
37060990c0cSMichael Tuexen 			return (NULL);
371f8829a4aSRandall Stewart 		}
372e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
37324aaac8dSMichael Tuexen 		sin6 = &store.sin6;
3745ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
375f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
376f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
377f8829a4aSRandall Stewart 		sin6->sin6_port = stcb->rport;
378f8829a4aSRandall Stewart 		memcpy(&sin6->sin6_addr, v6addr->addr,
379f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
380f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
381f8829a4aSRandall Stewart 			zero_address = 1;
382ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
383ad81507eSRandall Stewart 		    "process_asconf_delete_ip: deleting ");
384ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
385f8829a4aSRandall Stewart 		break;
386e6194c2eSMichael Tuexen #endif
387f8829a4aSRandall Stewart 	default:
388f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
389f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
390f8829a4aSRandall Stewart 		    aparam_length);
39160990c0cSMichael Tuexen 		return (m_reply);
392f8829a4aSRandall Stewart 	}
393f8829a4aSRandall Stewart 
394f8829a4aSRandall Stewart 	/* make sure the source address is not being deleted */
395b1754ad1SMichael Tuexen 	if (sctp_cmpaddr(sa, src)) {
396f8829a4aSRandall Stewart 		/* trying to delete the source address! */
397ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: tried to delete source addr\n");
398f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
399f8829a4aSRandall Stewart 		    SCTP_CAUSE_DELETING_SRC_ADDR, (uint8_t *)aph,
400f8829a4aSRandall Stewart 		    aparam_length);
40160990c0cSMichael Tuexen 		return (m_reply);
402f8829a4aSRandall Stewart 	}
4030053ed28SMichael Tuexen 
404f8829a4aSRandall Stewart 	/* if deleting 0.0.0.0/::0, delete all addresses except src addr */
405b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
406b1754ad1SMichael Tuexen 		result = sctp_asconf_del_remote_addrs_except(stcb, src);
407f8829a4aSRandall Stewart 
408f8829a4aSRandall Stewart 		if (result) {
409f8829a4aSRandall Stewart 			/* src address did not exist? */
410ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: src addr does not exist?\n");
411f8829a4aSRandall Stewart 			/* what error to reply with?? */
412f8829a4aSRandall Stewart 			m_reply =
413f8829a4aSRandall Stewart 			    sctp_asconf_error_response(aph->correlation_id,
414f8829a4aSRandall Stewart 			    SCTP_CAUSE_REQUEST_REFUSED, (uint8_t *)aph,
415f8829a4aSRandall Stewart 			    aparam_length);
416f8829a4aSRandall Stewart 		} else if (response_required) {
417f8829a4aSRandall Stewart 			m_reply =
418f8829a4aSRandall Stewart 			    sctp_asconf_success_response(aph->correlation_id);
419f8829a4aSRandall Stewart 		}
42060990c0cSMichael Tuexen 		return (m_reply);
421f8829a4aSRandall Stewart 	}
4220053ed28SMichael Tuexen 
423f8829a4aSRandall Stewart 	/* delete the address */
424f8829a4aSRandall Stewart 	result = sctp_del_remote_addr(stcb, sa);
425f8829a4aSRandall Stewart 	/*
426f8829a4aSRandall Stewart 	 * note if result == -2, the address doesn't exist in the asoc but
427f8829a4aSRandall Stewart 	 * since it's being deleted anyways, we just ack the delete -- but
428f8829a4aSRandall Stewart 	 * this probably means something has already gone awry
429f8829a4aSRandall Stewart 	 */
430f8829a4aSRandall Stewart 	if (result == -1) {
431f8829a4aSRandall Stewart 		/* only one address in the asoc */
432ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: tried to delete last IP addr!\n");
433f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
434f8829a4aSRandall Stewart 		    SCTP_CAUSE_DELETING_LAST_ADDR, (uint8_t *)aph,
435f8829a4aSRandall Stewart 		    aparam_length);
436f8829a4aSRandall Stewart 	} else {
437f8829a4aSRandall Stewart 		if (response_required) {
438f8829a4aSRandall Stewart 			m_reply = sctp_asconf_success_response(aph->correlation_id);
439f8829a4aSRandall Stewart 		}
440f8829a4aSRandall Stewart 		/* notify upper layer */
441ceaad40aSRandall Stewart 		sctp_ulp_notify(SCTP_NOTIFY_ASCONF_DELETE_IP, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
442f8829a4aSRandall Stewart 	}
44360990c0cSMichael Tuexen 	return (m_reply);
444f8829a4aSRandall Stewart }
445f8829a4aSRandall Stewart 
446f8829a4aSRandall Stewart static struct mbuf *
sctp_process_asconf_set_primary(struct sockaddr * src,struct sctp_asconf_paramhdr * aph,struct sctp_tcb * stcb,int response_required)447b1754ad1SMichael Tuexen sctp_process_asconf_set_primary(struct sockaddr *src,
4481b649582SRandall Stewart     struct sctp_asconf_paramhdr *aph,
4491b649582SRandall Stewart     struct sctp_tcb *stcb, int response_required)
450f8829a4aSRandall Stewart {
451f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
45224aaac8dSMichael Tuexen 	union sctp_sockstore store;
453e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
454b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
455b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
456b54ddf22SMichael Tuexen 	uint16_t param_length;
457b54ddf22SMichael Tuexen #endif
458f8829a4aSRandall Stewart 	struct sockaddr *sa;
459f8829a4aSRandall Stewart 	int zero_address = 0;
460e6194c2eSMichael Tuexen #ifdef INET
461e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
462e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
463e6194c2eSMichael Tuexen #endif
464f8829a4aSRandall Stewart #ifdef INET6
465f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
466f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
467e6194c2eSMichael Tuexen #endif
468f8829a4aSRandall Stewart 
469f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
470967e1a53SMichael Tuexen 	if (aparam_length < sizeof(struct sctp_asconf_paramhdr) + sizeof(struct sctp_paramhdr)) {
471967e1a53SMichael Tuexen 		return (NULL);
472967e1a53SMichael Tuexen 	}
473e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
474e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
475b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
476e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
477967e1a53SMichael Tuexen 	if (param_length + sizeof(struct sctp_asconf_paramhdr) != aparam_length) {
478967e1a53SMichael Tuexen 		return (NULL);
479967e1a53SMichael Tuexen 	}
480b54ddf22SMichael Tuexen #endif
48124aaac8dSMichael Tuexen 	sa = &store.sa;
482f8829a4aSRandall Stewart 	switch (param_type) {
483e6194c2eSMichael Tuexen #ifdef INET
484f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
485f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
486f8829a4aSRandall Stewart 			/* invalid param size */
48760990c0cSMichael Tuexen 			return (NULL);
488f8829a4aSRandall Stewart 		}
489e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
49024aaac8dSMichael Tuexen 		sin = &store.sin;
4915ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
492f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
493f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
494f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
495f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
496f8829a4aSRandall Stewart 			zero_address = 1;
497ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_set_primary: ");
498ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
499f8829a4aSRandall Stewart 		break;
500e6194c2eSMichael Tuexen #endif
501e6194c2eSMichael Tuexen #ifdef INET6
502f8829a4aSRandall Stewart 	case SCTP_IPV6_ADDRESS:
503f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
504f8829a4aSRandall Stewart 			/* invalid param size */
50560990c0cSMichael Tuexen 			return (NULL);
506f8829a4aSRandall Stewart 		}
507e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
50824aaac8dSMichael Tuexen 		sin6 = &store.sin6;
5095ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
510f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
511f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
512f8829a4aSRandall Stewart 		memcpy((caddr_t)&sin6->sin6_addr, v6addr->addr,
513f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
514f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
515f8829a4aSRandall Stewart 			zero_address = 1;
516ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_set_primary: ");
517ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
518f8829a4aSRandall Stewart 		break;
519e6194c2eSMichael Tuexen #endif
520f8829a4aSRandall Stewart 	default:
521f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
522f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
523f8829a4aSRandall Stewart 		    aparam_length);
52460990c0cSMichael Tuexen 		return (m_reply);
525f8829a4aSRandall Stewart 	}
526f8829a4aSRandall Stewart 
527f8829a4aSRandall Stewart 	/* if 0.0.0.0/::0, use the source address instead */
528b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
529b1754ad1SMichael Tuexen 		sa = src;
530ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
531ad81507eSRandall Stewart 		    "process_asconf_set_primary: using source addr ");
532b1754ad1SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
533f8829a4aSRandall Stewart 	}
534f8829a4aSRandall Stewart 	/* set the primary address */
535f8829a4aSRandall Stewart 	if (sctp_set_primary_addr(stcb, sa, NULL) == 0) {
536ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
537ad81507eSRandall Stewart 		    "process_asconf_set_primary: primary address set\n");
538f8829a4aSRandall Stewart 		/* notify upper layer */
539ceaad40aSRandall Stewart 		sctp_ulp_notify(SCTP_NOTIFY_ASCONF_SET_PRIMARY, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
540ca85e948SMichael Tuexen 		if ((stcb->asoc.primary_destination->dest_state & SCTP_ADDR_REACHABLE) &&
5419b2a35b3SMichael Tuexen 		    ((stcb->asoc.primary_destination->dest_state & SCTP_ADDR_PF) == 0) &&
5429b2a35b3SMichael Tuexen 		    (stcb->asoc.alternate != NULL)) {
543ca85e948SMichael Tuexen 			sctp_free_remote_addr(stcb->asoc.alternate);
544ca85e948SMichael Tuexen 			stcb->asoc.alternate = NULL;
545ca85e948SMichael Tuexen 		}
546f8829a4aSRandall Stewart 		if (response_required) {
547f8829a4aSRandall Stewart 			m_reply = sctp_asconf_success_response(aph->correlation_id);
548f8829a4aSRandall Stewart 		}
549851b7298SRandall Stewart 		/*
550851b7298SRandall Stewart 		 * Mobility adaptation. Ideally, when the reception of SET
551851b7298SRandall Stewart 		 * PRIMARY with DELETE IP ADDRESS of the previous primary
552851b7298SRandall Stewart 		 * destination, unacknowledged DATA are retransmitted
553851b7298SRandall Stewart 		 * immediately to the new primary destination for seamless
554b5c16493SMichael Tuexen 		 * handover. If the destination is UNCONFIRMED and marked to
555b5c16493SMichael Tuexen 		 * REQ_PRIM, The retransmission occur when reception of the
556b5c16493SMichael Tuexen 		 * HEARTBEAT-ACK.  (See sctp_handle_heartbeat_ack in
557851b7298SRandall Stewart 		 * sctp_input.c) Also, when change of the primary
558851b7298SRandall Stewart 		 * destination, it is better that all subsequent new DATA
559851b7298SRandall Stewart 		 * containing already queued DATA are transmitted to the new
560851b7298SRandall Stewart 		 * primary destination. (by micchie)
561851b7298SRandall Stewart 		 */
562851b7298SRandall Stewart 		if ((sctp_is_mobility_feature_on(stcb->sctp_ep,
563851b7298SRandall Stewart 		    SCTP_MOBILITY_BASE) ||
564851b7298SRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
565851b7298SRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) &&
566851b7298SRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
567851b7298SRandall Stewart 		    SCTP_MOBILITY_PRIM_DELETED) &&
568851b7298SRandall Stewart 		    (stcb->asoc.primary_destination->dest_state &
569851b7298SRandall Stewart 		    SCTP_ADDR_UNCONFIRMED) == 0) {
570b7d130beSMichael Tuexen 			sctp_timer_stop(SCTP_TIMER_TYPE_PRIM_DELETED,
571b7d130beSMichael Tuexen 			    stcb->sctp_ep, stcb, NULL,
572b7d130beSMichael Tuexen 			    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_1);
573851b7298SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
574851b7298SRandall Stewart 			    SCTP_MOBILITY_FASTHANDOFF)) {
575851b7298SRandall Stewart 				sctp_assoc_immediate_retrans(stcb,
576851b7298SRandall Stewart 				    stcb->asoc.primary_destination);
577851b7298SRandall Stewart 			}
578851b7298SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
579851b7298SRandall Stewart 			    SCTP_MOBILITY_BASE)) {
5809eea4a2dSMichael Tuexen 				sctp_move_chunks_from_net(stcb,
5819eea4a2dSMichael Tuexen 				    stcb->asoc.deleted_primary);
582851b7298SRandall Stewart 			}
583a57fb68bSMichael Tuexen 			sctp_delete_prim_timer(stcb->sctp_ep, stcb);
584851b7298SRandall Stewart 		}
585f8829a4aSRandall Stewart 	} else {
586f8829a4aSRandall Stewart 		/* couldn't set the requested primary address! */
587ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
588ad81507eSRandall Stewart 		    "process_asconf_set_primary: set primary failed!\n");
589f8829a4aSRandall Stewart 		/* must have been an invalid address, so report */
590f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
591f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
592f8829a4aSRandall Stewart 		    aparam_length);
593f8829a4aSRandall Stewart 	}
594f8829a4aSRandall Stewart 
59560990c0cSMichael Tuexen 	return (m_reply);
596f8829a4aSRandall Stewart }
597f8829a4aSRandall Stewart 
598f8829a4aSRandall Stewart /*
599f8829a4aSRandall Stewart  * handles an ASCONF chunk.
600f8829a4aSRandall Stewart  * if all parameters are processed ok, send a plain (empty) ASCONF-ACK
601f8829a4aSRandall Stewart  */
602f8829a4aSRandall Stewart void
sctp_handle_asconf(struct mbuf * m,unsigned int offset,struct sockaddr * src,struct sctp_asconf_chunk * cp,struct sctp_tcb * stcb,int first)603f8829a4aSRandall Stewart sctp_handle_asconf(struct mbuf *m, unsigned int offset,
604b1754ad1SMichael Tuexen     struct sockaddr *src,
6052afb3e84SRandall Stewart     struct sctp_asconf_chunk *cp, struct sctp_tcb *stcb,
6062afb3e84SRandall Stewart     int first)
607f8829a4aSRandall Stewart {
608f8829a4aSRandall Stewart 	struct sctp_association *asoc;
609f8829a4aSRandall Stewart 	uint32_t serial_num;
6102afb3e84SRandall Stewart 	struct mbuf *n, *m_ack, *m_result, *m_tail;
611f8829a4aSRandall Stewart 	struct sctp_asconf_ack_chunk *ack_cp;
612f104b614SMichael Tuexen 	struct sctp_asconf_paramhdr *aph;
613f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *p_addr;
614ca85e948SMichael Tuexen 	unsigned int asconf_limit, cnt;
615f8829a4aSRandall Stewart 	int error = 0;		/* did an error occur? */
616f8829a4aSRandall Stewart 
617f8829a4aSRandall Stewart 	/* asconf param buffer */
618f42a358aSRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
6192afb3e84SRandall Stewart 	struct sctp_asconf_ack *ack, *ack_next;
620f8829a4aSRandall Stewart 
621f8829a4aSRandall Stewart 	/* verify minimum length */
622f8829a4aSRandall Stewart 	if (ntohs(cp->ch.chunk_length) < sizeof(struct sctp_asconf_chunk)) {
623ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
624ad81507eSRandall Stewart 		    "handle_asconf: chunk too small = %xh\n",
625f8829a4aSRandall Stewart 		    ntohs(cp->ch.chunk_length));
626f8829a4aSRandall Stewart 		return;
627f8829a4aSRandall Stewart 	}
628f8829a4aSRandall Stewart 	asoc = &stcb->asoc;
629f8829a4aSRandall Stewart 	serial_num = ntohl(cp->serial_number);
630f8829a4aSRandall Stewart 
63120b07a4dSMichael Tuexen 	if (SCTP_TSN_GE(asoc->asconf_seq_in, serial_num)) {
632f8829a4aSRandall Stewart 		/* got a duplicate ASCONF */
633ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
634ad81507eSRandall Stewart 		    "handle_asconf: got duplicate serial number = %xh\n",
635f8829a4aSRandall Stewart 		    serial_num);
636f8829a4aSRandall Stewart 		return;
637f8829a4aSRandall Stewart 	} else if (serial_num != (asoc->asconf_seq_in + 1)) {
638ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: incorrect serial number = %xh (expected next = %xh)\n",
639f8829a4aSRandall Stewart 		    serial_num, asoc->asconf_seq_in + 1);
640f8829a4aSRandall Stewart 		return;
641f8829a4aSRandall Stewart 	}
6420053ed28SMichael Tuexen 
643f8829a4aSRandall Stewart 	/* it's the expected "next" sequence number, so process it */
644f8829a4aSRandall Stewart 	asoc->asconf_seq_in = serial_num;	/* update sequence */
645f8829a4aSRandall Stewart 	/* get length of all the param's in the ASCONF */
646f8829a4aSRandall Stewart 	asconf_limit = offset + ntohs(cp->ch.chunk_length);
647ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1,
648ad81507eSRandall Stewart 	    "handle_asconf: asconf_limit=%u, sequence=%xh\n",
649f8829a4aSRandall Stewart 	    asconf_limit, serial_num);
6502afb3e84SRandall Stewart 
6512afb3e84SRandall Stewart 	if (first) {
6522afb3e84SRandall Stewart 		/* delete old cache */
653e6194c2eSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: Now processing first ASCONF. Try to delete old cache\n");
6542afb3e84SRandall Stewart 
6554a9ef3f8SMichael Tuexen 		TAILQ_FOREACH_SAFE(ack, &asoc->asconf_ack_sent, next, ack_next) {
6562afb3e84SRandall Stewart 			if (ack->serial_number == serial_num)
6572afb3e84SRandall Stewart 				break;
6582afb3e84SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: delete old(%u) < first(%u)\n",
6592afb3e84SRandall Stewart 			    ack->serial_number, serial_num);
6604a9ef3f8SMichael Tuexen 			TAILQ_REMOVE(&asoc->asconf_ack_sent, ack, next);
6612afb3e84SRandall Stewart 			if (ack->data != NULL) {
6622afb3e84SRandall Stewart 				sctp_m_freem(ack->data);
6632afb3e84SRandall Stewart 			}
664b3f1ea41SRandall Stewart 			SCTP_ZONE_FREE(SCTP_BASE_INFO(ipi_zone_asconf_ack), ack);
6652afb3e84SRandall Stewart 		}
666f8829a4aSRandall Stewart 	}
6670053ed28SMichael Tuexen 
668139bc87fSRandall Stewart 	m_ack = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_ack_chunk), 0,
669eb1b1807SGleb Smirnoff 	    M_NOWAIT, 1, MT_DATA);
670f8829a4aSRandall Stewart 	if (m_ack == NULL) {
671ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
672ad81507eSRandall Stewart 		    "handle_asconf: couldn't get mbuf!\n");
673f8829a4aSRandall Stewart 		return;
674f8829a4aSRandall Stewart 	}
675f8829a4aSRandall Stewart 	m_tail = m_ack;		/* current reply chain's tail */
676f8829a4aSRandall Stewart 
677f8829a4aSRandall Stewart 	/* fill in ASCONF-ACK header */
678f8829a4aSRandall Stewart 	ack_cp = mtod(m_ack, struct sctp_asconf_ack_chunk *);
679f8829a4aSRandall Stewart 	ack_cp->ch.chunk_type = SCTP_ASCONF_ACK;
680f8829a4aSRandall Stewart 	ack_cp->ch.chunk_flags = 0;
681f8829a4aSRandall Stewart 	ack_cp->serial_number = htonl(serial_num);
682f8829a4aSRandall Stewart 	/* set initial lengths (eg. just an ASCONF-ACK), ntohx at the end! */
683139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_ack) = sizeof(struct sctp_asconf_ack_chunk);
684f8829a4aSRandall Stewart 	ack_cp->ch.chunk_length = sizeof(struct sctp_asconf_ack_chunk);
685f8829a4aSRandall Stewart 
686f8829a4aSRandall Stewart 	/* skip the lookup address parameter */
687f8829a4aSRandall Stewart 	offset += sizeof(struct sctp_asconf_chunk);
688f8829a4aSRandall Stewart 	p_addr = (struct sctp_ipv6addr_param *)sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr), (uint8_t *)&aparam_buf);
689f8829a4aSRandall Stewart 	if (p_addr == NULL) {
690ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
691ad81507eSRandall Stewart 		    "handle_asconf: couldn't get lookup addr!\n");
692f8829a4aSRandall Stewart 		/* respond with a missing/invalid mandatory parameter error */
6931b084a5eSMichael Tuexen 		sctp_m_freem(m_ack);
694f8829a4aSRandall Stewart 		return;
695f8829a4aSRandall Stewart 	}
696aac50dabSMichael Tuexen 	/* skip lookup addr */
697aac50dabSMichael Tuexen 	offset += SCTP_SIZE32(ntohs(p_addr->ph.param_length));
698f8829a4aSRandall Stewart 	/* get pointer to first asconf param in ASCONF */
699f8829a4aSRandall Stewart 	aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, sizeof(struct sctp_asconf_paramhdr), (uint8_t *)&aparam_buf);
700f8829a4aSRandall Stewart 	if (aph == NULL) {
701ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Empty ASCONF received?\n");
702f8829a4aSRandall Stewart 		goto send_reply;
703f8829a4aSRandall Stewart 	}
704f8829a4aSRandall Stewart 	/* process through all parameters */
705ca85e948SMichael Tuexen 	cnt = 0;
706f8829a4aSRandall Stewart 	while (aph != NULL) {
707f8829a4aSRandall Stewart 		unsigned int param_length, param_type;
708f8829a4aSRandall Stewart 
709f8829a4aSRandall Stewart 		param_type = ntohs(aph->ph.param_type);
710f8829a4aSRandall Stewart 		param_length = ntohs(aph->ph.param_length);
711f8829a4aSRandall Stewart 		if (offset + param_length > asconf_limit) {
712f8829a4aSRandall Stewart 			/* parameter goes beyond end of chunk! */
713f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
714f8829a4aSRandall Stewart 			return;
715f8829a4aSRandall Stewart 		}
716f8829a4aSRandall Stewart 		m_result = NULL;
717f8829a4aSRandall Stewart 
718f8829a4aSRandall Stewart 		if (param_length > sizeof(aparam_buf)) {
719ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: param length (%u) larger than buffer size!\n", param_length);
720f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
721f8829a4aSRandall Stewart 			return;
722f8829a4aSRandall Stewart 		}
7230ec2ce0dSMichael Tuexen 		if (param_length < sizeof(struct sctp_asconf_paramhdr)) {
724ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: param length (%u) too short\n", param_length);
725f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
726e6b3bd22SMichael Tuexen 			return;
727f8829a4aSRandall Stewart 		}
728f8829a4aSRandall Stewart 		/* get the entire parameter */
729f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, param_length, aparam_buf);
730f8829a4aSRandall Stewart 		if (aph == NULL) {
731ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: couldn't get entire param\n");
732f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
733f8829a4aSRandall Stewart 			return;
734f8829a4aSRandall Stewart 		}
735f8829a4aSRandall Stewart 		switch (param_type) {
736f8829a4aSRandall Stewart 		case SCTP_ADD_IP_ADDRESS:
737b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_add_ip(src, aph, stcb,
738ca85e948SMichael Tuexen 			    (cnt < SCTP_BASE_SYSCTL(sctp_hb_maxburst)), error);
739ca85e948SMichael Tuexen 			cnt++;
740f8829a4aSRandall Stewart 			break;
741f8829a4aSRandall Stewart 		case SCTP_DEL_IP_ADDRESS:
742b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_delete_ip(src, aph, stcb,
743f8829a4aSRandall Stewart 			    error);
744f8829a4aSRandall Stewart 			break;
745f8829a4aSRandall Stewart 		case SCTP_ERROR_CAUSE_IND:
746f8829a4aSRandall Stewart 			/* not valid in an ASCONF chunk */
747f8829a4aSRandall Stewart 			break;
748f8829a4aSRandall Stewart 		case SCTP_SET_PRIM_ADDR:
749b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_set_primary(src, aph,
750f8829a4aSRandall Stewart 			    stcb, error);
751f8829a4aSRandall Stewart 			break;
752830d754dSRandall Stewart 		case SCTP_NAT_VTAGS:
753830d754dSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: sees a NAT VTAG state parameter\n");
754830d754dSRandall Stewart 			break;
755f8829a4aSRandall Stewart 		case SCTP_SUCCESS_REPORT:
756f8829a4aSRandall Stewart 			/* not valid in an ASCONF chunk */
757f8829a4aSRandall Stewart 			break;
758f8829a4aSRandall Stewart 		case SCTP_ULP_ADAPTATION:
759f8829a4aSRandall Stewart 			/* FIX */
760f8829a4aSRandall Stewart 			break;
761f8829a4aSRandall Stewart 		default:
762f8829a4aSRandall Stewart 			if ((param_type & 0x8000) == 0) {
763f8829a4aSRandall Stewart 				/* Been told to STOP at this param */
764f8829a4aSRandall Stewart 				asconf_limit = offset;
765f8829a4aSRandall Stewart 				/*
766f8829a4aSRandall Stewart 				 * FIX FIX - We need to call
767f8829a4aSRandall Stewart 				 * sctp_arethere_unrecognized_parameters()
768f8829a4aSRandall Stewart 				 * to get a operr and send it for any
769f8829a4aSRandall Stewart 				 * param's with the 0x4000 bit set OR do it
770f8829a4aSRandall Stewart 				 * here ourselves... note we still must STOP
771f8829a4aSRandall Stewart 				 * if the 0x8000 bit is clear.
772f8829a4aSRandall Stewart 				 */
773f8829a4aSRandall Stewart 			}
774f8829a4aSRandall Stewart 			/* unknown/invalid param type */
775f8829a4aSRandall Stewart 			break;
776f8829a4aSRandall Stewart 		}		/* switch */
777f8829a4aSRandall Stewart 
778f8829a4aSRandall Stewart 		/* add any (error) result to the reply mbuf chain */
779f8829a4aSRandall Stewart 		if (m_result != NULL) {
780139bc87fSRandall Stewart 			SCTP_BUF_NEXT(m_tail) = m_result;
781f8829a4aSRandall Stewart 			m_tail = m_result;
782139bc87fSRandall Stewart 			ack_cp->ch.chunk_length += SCTP_BUF_LEN(m_result);
783f8829a4aSRandall Stewart 			/* set flag to force success reports */
784f8829a4aSRandall Stewart 			error = 1;
785f8829a4aSRandall Stewart 		}
786f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(param_length);
787f8829a4aSRandall Stewart 		/* update remaining ASCONF message length to process */
788f8829a4aSRandall Stewart 		if (offset >= asconf_limit) {
789f8829a4aSRandall Stewart 			/* no more data in the mbuf chain */
790f8829a4aSRandall Stewart 			break;
791f8829a4aSRandall Stewart 		}
792f8829a4aSRandall Stewart 		/* get pointer to next asconf param */
793f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset,
794f8829a4aSRandall Stewart 		    sizeof(struct sctp_asconf_paramhdr),
795f8829a4aSRandall Stewart 		    (uint8_t *)&aparam_buf);
796f8829a4aSRandall Stewart 		if (aph == NULL) {
797f8829a4aSRandall Stewart 			/* can't get an asconf paramhdr */
798ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: can't get asconf param hdr!\n");
799f8829a4aSRandall Stewart 			/* FIX ME - add error here... */
800f8829a4aSRandall Stewart 		}
801ad81507eSRandall Stewart 	}
802f8829a4aSRandall Stewart 
803f8829a4aSRandall Stewart send_reply:
804f8829a4aSRandall Stewart 	ack_cp->ch.chunk_length = htons(ack_cp->ch.chunk_length);
805f8829a4aSRandall Stewart 	/* save the ASCONF-ACK reply */
806b3f1ea41SRandall Stewart 	ack = SCTP_ZONE_GET(SCTP_BASE_INFO(ipi_zone_asconf_ack),
8072afb3e84SRandall Stewart 	    struct sctp_asconf_ack);
8082afb3e84SRandall Stewart 	if (ack == NULL) {
8092afb3e84SRandall Stewart 		sctp_m_freem(m_ack);
8102afb3e84SRandall Stewart 		return;
8112afb3e84SRandall Stewart 	}
8122afb3e84SRandall Stewart 	ack->serial_number = serial_num;
8132afb3e84SRandall Stewart 	ack->last_sent_to = NULL;
8142afb3e84SRandall Stewart 	ack->data = m_ack;
815fc066a61SMichael Tuexen 	ack->len = 0;
816e6194c2eSMichael Tuexen 	for (n = m_ack; n != NULL; n = SCTP_BUF_NEXT(n)) {
8172afb3e84SRandall Stewart 		ack->len += SCTP_BUF_LEN(n);
8182afb3e84SRandall Stewart 	}
8192afb3e84SRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_ack_sent, ack, next);
820f8829a4aSRandall Stewart 
821f8829a4aSRandall Stewart 	/* see if last_control_chunk_from is set properly (use IP src addr) */
822f8829a4aSRandall Stewart 	if (stcb->asoc.last_control_chunk_from == NULL) {
823f8829a4aSRandall Stewart 		/*
824f8829a4aSRandall Stewart 		 * this could happen if the source address was just newly
825f8829a4aSRandall Stewart 		 * added
826f8829a4aSRandall Stewart 		 */
827ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: looking up net for IP source address\n");
828ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Looking for IP source: ");
829b82bd838SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
830f8829a4aSRandall Stewart 		/* look up the from address */
831b82bd838SMichael Tuexen 		stcb->asoc.last_control_chunk_from = sctp_findnet(stcb, src);
832f8829a4aSRandall Stewart #ifdef SCTP_DEBUG
833b82bd838SMichael Tuexen 		if (stcb->asoc.last_control_chunk_from == NULL) {
834ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: IP source address not found?!\n");
835f8829a4aSRandall Stewart 		}
836b82bd838SMichael Tuexen #endif
837f8829a4aSRandall Stewart 	}
838f8829a4aSRandall Stewart }
839f8829a4aSRandall Stewart 
840f8829a4aSRandall Stewart /*
841f8829a4aSRandall Stewart  * does the address match? returns 0 if not, 1 if so
842f8829a4aSRandall Stewart  */
843f8829a4aSRandall Stewart static uint32_t
sctp_asconf_addr_match(struct sctp_asconf_addr * aa,struct sockaddr * sa)844b0471b4bSMichael Tuexen sctp_asconf_addr_match(struct sctp_asconf_addr *aa, struct sockaddr *sa)
845b0471b4bSMichael Tuexen {
846e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
847f8829a4aSRandall Stewart #ifdef INET6
848e6194c2eSMichael Tuexen 	case AF_INET6:
849e6194c2eSMichael Tuexen 		{
850f8829a4aSRandall Stewart 			/* XXX scopeid */
851f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
852f8829a4aSRandall Stewart 
853f8829a4aSRandall Stewart 			if ((aa->ap.addrp.ph.param_type == SCTP_IPV6_ADDRESS) &&
854f8829a4aSRandall Stewart 			    (memcmp(&aa->ap.addrp.addr, &sin6->sin6_addr,
855f8829a4aSRandall Stewart 			    sizeof(struct in6_addr)) == 0)) {
856f8829a4aSRandall Stewart 				return (1);
857f8829a4aSRandall Stewart 			}
858e6194c2eSMichael Tuexen 			break;
859e6194c2eSMichael Tuexen 		}
860e6194c2eSMichael Tuexen #endif
861e6194c2eSMichael Tuexen #ifdef INET
862e6194c2eSMichael Tuexen 	case AF_INET:
863e6194c2eSMichael Tuexen 		{
864f8829a4aSRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
865f8829a4aSRandall Stewart 
866f8829a4aSRandall Stewart 			if ((aa->ap.addrp.ph.param_type == SCTP_IPV4_ADDRESS) &&
867f8829a4aSRandall Stewart 			    (memcmp(&aa->ap.addrp.addr, &sin->sin_addr,
868f8829a4aSRandall Stewart 			    sizeof(struct in_addr)) == 0)) {
869f8829a4aSRandall Stewart 				return (1);
870f8829a4aSRandall Stewart 			}
871e6194c2eSMichael Tuexen 			break;
872e6194c2eSMichael Tuexen 		}
873e6194c2eSMichael Tuexen #endif
874e6194c2eSMichael Tuexen 	default:
875e6194c2eSMichael Tuexen 		break;
876f8829a4aSRandall Stewart 	}
877f8829a4aSRandall Stewart 	return (0);
878f8829a4aSRandall Stewart }
879f8829a4aSRandall Stewart 
880f8829a4aSRandall Stewart /*
881c54a18d2SRandall Stewart  * does the address match? returns 0 if not, 1 if so
882c54a18d2SRandall Stewart  */
883c54a18d2SRandall Stewart static uint32_t
sctp_addr_match(struct sctp_paramhdr * ph,struct sockaddr * sa)884b0471b4bSMichael Tuexen sctp_addr_match(struct sctp_paramhdr *ph, struct sockaddr *sa)
885b0471b4bSMichael Tuexen {
886b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
887c54a18d2SRandall Stewart 	uint16_t param_type, param_length;
888c54a18d2SRandall Stewart 
889e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
890e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
891b54ddf22SMichael Tuexen #endif
892e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
893d6af161aSRandall Stewart #ifdef INET6
894e6194c2eSMichael Tuexen 	case AF_INET6:
895e6194c2eSMichael Tuexen 		{
896c54a18d2SRandall Stewart 			/* XXX scopeid */
897c54a18d2SRandall Stewart 			struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
898e6194c2eSMichael Tuexen 			struct sctp_ipv6addr_param *v6addr;
899c54a18d2SRandall Stewart 
900e6194c2eSMichael Tuexen 			v6addr = (struct sctp_ipv6addr_param *)ph;
901c54a18d2SRandall Stewart 			if ((param_type == SCTP_IPV6_ADDRESS) &&
902b54ddf22SMichael Tuexen 			    (param_length == sizeof(struct sctp_ipv6addr_param)) &&
903c54a18d2SRandall Stewart 			    (memcmp(&v6addr->addr, &sin6->sin6_addr,
904c54a18d2SRandall Stewart 			    sizeof(struct in6_addr)) == 0)) {
905c54a18d2SRandall Stewart 				return (1);
906c54a18d2SRandall Stewart 			}
907e6194c2eSMichael Tuexen 			break;
908d6af161aSRandall Stewart 		}
909d6af161aSRandall Stewart #endif
910e6194c2eSMichael Tuexen #ifdef INET
911e6194c2eSMichael Tuexen 	case AF_INET:
912e6194c2eSMichael Tuexen 		{
913c54a18d2SRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
914e6194c2eSMichael Tuexen 			struct sctp_ipv4addr_param *v4addr;
915c54a18d2SRandall Stewart 
916e6194c2eSMichael Tuexen 			v4addr = (struct sctp_ipv4addr_param *)ph;
917c54a18d2SRandall Stewart 			if ((param_type == SCTP_IPV4_ADDRESS) &&
918b54ddf22SMichael Tuexen 			    (param_length == sizeof(struct sctp_ipv4addr_param)) &&
919c54a18d2SRandall Stewart 			    (memcmp(&v4addr->addr, &sin->sin_addr,
920c54a18d2SRandall Stewart 			    sizeof(struct in_addr)) == 0)) {
921c54a18d2SRandall Stewart 				return (1);
922c54a18d2SRandall Stewart 			}
923e6194c2eSMichael Tuexen 			break;
924e6194c2eSMichael Tuexen 		}
925e6194c2eSMichael Tuexen #endif
926e6194c2eSMichael Tuexen 	default:
927e6194c2eSMichael Tuexen 		break;
928c54a18d2SRandall Stewart 	}
929c54a18d2SRandall Stewart 	return (0);
930c54a18d2SRandall Stewart }
931c54a18d2SRandall Stewart 
932c54a18d2SRandall Stewart /*
933f8829a4aSRandall Stewart  * Cleanup for non-responded/OP ERR'd ASCONF
934f8829a4aSRandall Stewart  */
935f8829a4aSRandall Stewart void
sctp_asconf_cleanup(struct sctp_tcb * stcb)9366fb7b4fbSMichael Tuexen sctp_asconf_cleanup(struct sctp_tcb *stcb)
937f8829a4aSRandall Stewart {
938f8829a4aSRandall Stewart 	/*
939f8829a4aSRandall Stewart 	 * clear out any existing asconfs going out
940f8829a4aSRandall Stewart 	 */
9416fb7b4fbSMichael Tuexen 	sctp_timer_stop(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep, stcb, NULL,
9423c503c28SRandall Stewart 	    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_2);
943c54a18d2SRandall Stewart 	stcb->asoc.asconf_seq_out_acked = stcb->asoc.asconf_seq_out;
944f8829a4aSRandall Stewart 	/* remove the old ASCONF on our outbound queue */
945f8829a4aSRandall Stewart 	sctp_toss_old_asconf(stcb);
946f8829a4aSRandall Stewart }
947f8829a4aSRandall Stewart 
948f8829a4aSRandall Stewart /*
9492dad8a55SRandall Stewart  * cleanup any cached source addresses that may be topologically
9502dad8a55SRandall Stewart  * incorrect after a new address has been added to this interface.
9512dad8a55SRandall Stewart  */
9522dad8a55SRandall Stewart static void
sctp_asconf_nets_cleanup(struct sctp_tcb * stcb,struct sctp_ifn * ifn)9532dad8a55SRandall Stewart sctp_asconf_nets_cleanup(struct sctp_tcb *stcb, struct sctp_ifn *ifn)
9542dad8a55SRandall Stewart {
9552dad8a55SRandall Stewart 	struct sctp_nets *net;
9562dad8a55SRandall Stewart 
9572dad8a55SRandall Stewart 	/*
9582dad8a55SRandall Stewart 	 * Ideally, we want to only clear cached routes and source addresses
9592dad8a55SRandall Stewart 	 * that are topologically incorrect.  But since there is no easy way
9602dad8a55SRandall Stewart 	 * to know whether the newly added address on the ifn would cause a
9612dad8a55SRandall Stewart 	 * routing change (i.e. a new egress interface would be chosen)
9622dad8a55SRandall Stewart 	 * without doing a new routing lookup and source address selection,
9632dad8a55SRandall Stewart 	 * we will (for now) just flush any cached route using a different
9642dad8a55SRandall Stewart 	 * ifn (and cached source addrs) and let output re-choose them
9652dad8a55SRandall Stewart 	 * during the next send on that net.
9662dad8a55SRandall Stewart 	 */
9672dad8a55SRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
9682dad8a55SRandall Stewart 		/*
9692dad8a55SRandall Stewart 		 * clear any cached route (and cached source address) if the
9702dad8a55SRandall Stewart 		 * route's interface is NOT the same as the address change.
9712dad8a55SRandall Stewart 		 * If it's the same interface, just clear the cached source
9722dad8a55SRandall Stewart 		 * address.
9732dad8a55SRandall Stewart 		 */
9742dad8a55SRandall Stewart 		if (SCTP_ROUTE_HAS_VALID_IFN(&net->ro) &&
975fc066a61SMichael Tuexen 		    ((ifn == NULL) ||
976fc066a61SMichael Tuexen 		    (SCTP_GET_IF_INDEX_FROM_ROUTE(&net->ro) != ifn->ifn_index))) {
9772dad8a55SRandall Stewart 			/* clear any cached route */
978983066f0SAlexander V. Chernikov 			RO_NHFREE(&net->ro);
9792dad8a55SRandall Stewart 		}
9802dad8a55SRandall Stewart 		/* clear any cached source address */
9812dad8a55SRandall Stewart 		if (net->src_addr_selected) {
9822dad8a55SRandall Stewart 			sctp_free_ifa(net->ro._s_addr);
9832dad8a55SRandall Stewart 			net->ro._s_addr = NULL;
9842dad8a55SRandall Stewart 			net->src_addr_selected = 0;
9852dad8a55SRandall Stewart 		}
9862dad8a55SRandall Stewart 	}
9872dad8a55SRandall Stewart }
9882dad8a55SRandall Stewart 
989851b7298SRandall Stewart void
sctp_assoc_immediate_retrans(struct sctp_tcb * stcb,struct sctp_nets * dstnet)990851b7298SRandall Stewart sctp_assoc_immediate_retrans(struct sctp_tcb *stcb, struct sctp_nets *dstnet)
991851b7298SRandall Stewart {
992851b7298SRandall Stewart 	int error;
993851b7298SRandall Stewart 
994851b7298SRandall Stewart 	if (dstnet->dest_state & SCTP_ADDR_UNCONFIRMED) {
995851b7298SRandall Stewart 		return;
996851b7298SRandall Stewart 	}
997851b7298SRandall Stewart 	if (stcb->asoc.deleted_primary == NULL) {
998851b7298SRandall Stewart 		return;
999851b7298SRandall Stewart 	}
10000053ed28SMichael Tuexen 
1001851b7298SRandall Stewart 	if (!TAILQ_EMPTY(&stcb->asoc.sent_queue)) {
1002b27a6b7dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "assoc_immediate_retrans: Deleted primary is ");
1003851b7298SRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, &stcb->asoc.deleted_primary->ro._l_addr.sa);
1004851b7298SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Current Primary is ");
1005851b7298SRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, &stcb->asoc.primary_destination->ro._l_addr.sa);
1006851b7298SRandall Stewart 		sctp_timer_stop(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep, stcb,
1007851b7298SRandall Stewart 		    stcb->asoc.deleted_primary,
1008b7d130beSMichael Tuexen 		    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_3);
1009851b7298SRandall Stewart 		stcb->asoc.num_send_timers_up--;
1010851b7298SRandall Stewart 		if (stcb->asoc.num_send_timers_up < 0) {
1011851b7298SRandall Stewart 			stcb->asoc.num_send_timers_up = 0;
1012851b7298SRandall Stewart 		}
1013851b7298SRandall Stewart 		SCTP_TCB_LOCK_ASSERT(stcb);
1014851b7298SRandall Stewart 		error = sctp_t3rxt_timer(stcb->sctp_ep, stcb,
1015851b7298SRandall Stewart 		    stcb->asoc.deleted_primary);
1016851b7298SRandall Stewart 		if (error) {
1017851b7298SRandall Stewart 			SCTP_INP_DECR_REF(stcb->sctp_ep);
1018851b7298SRandall Stewart 			return;
1019851b7298SRandall Stewart 		}
1020851b7298SRandall Stewart 		SCTP_TCB_LOCK_ASSERT(stcb);
1021851b7298SRandall Stewart #ifdef SCTP_AUDITING_ENABLED
1022f31e6c7fSMichael Tuexen 		sctp_auditing(4, stcb->sctp_ep, stcb, stcb->asoc.deleted_primary);
1023851b7298SRandall Stewart #endif
1024851b7298SRandall Stewart 		sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_NOT_LOCKED);
1025851b7298SRandall Stewart 		if ((stcb->asoc.num_send_timers_up == 0) &&
1026851b7298SRandall Stewart 		    (stcb->asoc.sent_queue_cnt > 0)) {
1027851b7298SRandall Stewart 			struct sctp_tmit_chunk *chk;
1028851b7298SRandall Stewart 
1029efd5e692SMichael Tuexen 			TAILQ_FOREACH(chk, &stcb->asoc.sent_queue, sctp_next) {
1030efd5e692SMichael Tuexen 				if (chk->whoTo != NULL) {
1031efd5e692SMichael Tuexen 					break;
1032efd5e692SMichael Tuexen 				}
1033efd5e692SMichael Tuexen 			}
1034efd5e692SMichael Tuexen 			if (chk != NULL) {
1035efd5e692SMichael Tuexen 				sctp_timer_start(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep, stcb, chk->whoTo);
1036efd5e692SMichael Tuexen 			}
1037851b7298SRandall Stewart 		}
1038851b7298SRandall Stewart 	}
1039851b7298SRandall Stewart 	return;
1040851b7298SRandall Stewart }
1041851b7298SRandall Stewart 
10422afb3e84SRandall Stewart static int
10432afb3e84SRandall Stewart     sctp_asconf_queue_mgmt(struct sctp_tcb *, struct sctp_ifa *, uint16_t);
10442afb3e84SRandall Stewart 
1045851b7298SRandall Stewart void
sctp_net_immediate_retrans(struct sctp_tcb * stcb,struct sctp_nets * net)10462afb3e84SRandall Stewart sctp_net_immediate_retrans(struct sctp_tcb *stcb, struct sctp_nets *net)
10472afb3e84SRandall Stewart {
10482afb3e84SRandall Stewart 	struct sctp_tmit_chunk *chk;
10492afb3e84SRandall Stewart 
1050b27a6b7dSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1, "net_immediate_retrans: RTO is %d\n", net->RTO);
10512afb3e84SRandall Stewart 	sctp_timer_stop(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep, stcb, net,
1052b7d130beSMichael Tuexen 	    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_4);
10532afb3e84SRandall Stewart 	stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
10542afb3e84SRandall Stewart 	net->error_count = 0;
10552afb3e84SRandall Stewart 	TAILQ_FOREACH(chk, &stcb->asoc.sent_queue, sctp_next) {
10562afb3e84SRandall Stewart 		if (chk->whoTo == net) {
1057851b7298SRandall Stewart 			if (chk->sent < SCTP_DATAGRAM_RESEND) {
10582afb3e84SRandall Stewart 				chk->sent = SCTP_DATAGRAM_RESEND;
10592afb3e84SRandall Stewart 				sctp_ucount_incr(stcb->asoc.sent_queue_retran_cnt);
1060d55b0b1bSRandall Stewart 				sctp_flight_size_decrease(chk);
1061d55b0b1bSRandall Stewart 				sctp_total_flight_decrease(stcb, chk);
1062d55b0b1bSRandall Stewart 				net->marked_retrans++;
1063d55b0b1bSRandall Stewart 				stcb->asoc.marked_retrans++;
10642afb3e84SRandall Stewart 			}
10652afb3e84SRandall Stewart 		}
10662afb3e84SRandall Stewart 	}
1067d55b0b1bSRandall Stewart 	if (net->marked_retrans) {
1068d55b0b1bSRandall Stewart 		sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_NOT_LOCKED);
1069d55b0b1bSRandall Stewart 	}
1070851b7298SRandall Stewart }
10712afb3e84SRandall Stewart 
10722afb3e84SRandall Stewart static void
sctp_path_check_and_react(struct sctp_tcb * stcb,struct sctp_ifa * newifa)10732afb3e84SRandall Stewart sctp_path_check_and_react(struct sctp_tcb *stcb, struct sctp_ifa *newifa)
10742afb3e84SRandall Stewart {
10752afb3e84SRandall Stewart 	struct sctp_nets *net;
10762afb3e84SRandall Stewart 	int addrnum, changed;
10772afb3e84SRandall Stewart 
10782afb3e84SRandall Stewart 	/*
10792afb3e84SRandall Stewart 	 * If number of local valid addresses is 1, the valid address is
10802afb3e84SRandall Stewart 	 * probably newly added address. Several valid addresses in this
10812afb3e84SRandall Stewart 	 * association.  A source address may not be changed.  Additionally,
10822afb3e84SRandall Stewart 	 * they can be configured on a same interface as "alias" addresses.
10832afb3e84SRandall Stewart 	 * (by micchie)
10842afb3e84SRandall Stewart 	 */
10852afb3e84SRandall Stewart 	addrnum = sctp_local_addr_count(stcb);
10862afb3e84SRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1, "p_check_react(): %d local addresses\n",
10872afb3e84SRandall Stewart 	    addrnum);
10882afb3e84SRandall Stewart 	if (addrnum == 1) {
10892afb3e84SRandall Stewart 		TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
10902afb3e84SRandall Stewart 			/* clear any cached route and source address */
1091983066f0SAlexander V. Chernikov 			RO_NHFREE(&net->ro);
10922afb3e84SRandall Stewart 			if (net->src_addr_selected) {
10932afb3e84SRandall Stewart 				sctp_free_ifa(net->ro._s_addr);
10942afb3e84SRandall Stewart 				net->ro._s_addr = NULL;
10952afb3e84SRandall Stewart 				net->src_addr_selected = 0;
10962afb3e84SRandall Stewart 			}
10972afb3e84SRandall Stewart 			/* Retransmit unacknowledged DATA chunks immediately */
10982afb3e84SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
10992afb3e84SRandall Stewart 			    SCTP_MOBILITY_FASTHANDOFF)) {
11002afb3e84SRandall Stewart 				sctp_net_immediate_retrans(stcb, net);
11012afb3e84SRandall Stewart 			}
11022afb3e84SRandall Stewart 			/* also, SET PRIMARY is maybe already sent */
11032afb3e84SRandall Stewart 		}
11042afb3e84SRandall Stewart 		return;
11052afb3e84SRandall Stewart 	}
11060053ed28SMichael Tuexen 
1107e7e65008SMichael Tuexen 	/* Multiple local addresses exist in the association.  */
11082afb3e84SRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
11092afb3e84SRandall Stewart 		/* clear any cached route and source address */
1110983066f0SAlexander V. Chernikov 		RO_NHFREE(&net->ro);
11112afb3e84SRandall Stewart 		if (net->src_addr_selected) {
11122afb3e84SRandall Stewart 			sctp_free_ifa(net->ro._s_addr);
11132afb3e84SRandall Stewart 			net->ro._s_addr = NULL;
11142afb3e84SRandall Stewart 			net->src_addr_selected = 0;
11152afb3e84SRandall Stewart 		}
11162afb3e84SRandall Stewart 		/*
11172afb3e84SRandall Stewart 		 * Check if the nexthop is corresponding to the new address.
11182afb3e84SRandall Stewart 		 * If the new address is corresponding to the current
11192afb3e84SRandall Stewart 		 * nexthop, the path will be changed. If the new address is
11202afb3e84SRandall Stewart 		 * NOT corresponding to the current nexthop, the path will
11212afb3e84SRandall Stewart 		 * not be changed.
11222afb3e84SRandall Stewart 		 */
11232afb3e84SRandall Stewart 		SCTP_RTALLOC((sctp_route_t *)&net->ro,
1124d089f9b9SMichael Tuexen 		    stcb->sctp_ep->def_vrf_id,
1125d089f9b9SMichael Tuexen 		    stcb->sctp_ep->fibnum);
1126983066f0SAlexander V. Chernikov 		if (net->ro.ro_nh == NULL)
11272afb3e84SRandall Stewart 			continue;
11282afb3e84SRandall Stewart 
11292afb3e84SRandall Stewart 		changed = 0;
1130e6194c2eSMichael Tuexen 		switch (net->ro._l_addr.sa.sa_family) {
1131e6194c2eSMichael Tuexen #ifdef INET
1132e6194c2eSMichael Tuexen 		case AF_INET:
1133e6194c2eSMichael Tuexen 			if (sctp_v4src_match_nexthop(newifa, (sctp_route_t *)&net->ro)) {
11342afb3e84SRandall Stewart 				changed = 1;
11352afb3e84SRandall Stewart 			}
1136e6194c2eSMichael Tuexen 			break;
11375e2c2d87SRandall Stewart #endif
1138e6194c2eSMichael Tuexen #ifdef INET6
1139e6194c2eSMichael Tuexen 		case AF_INET6:
1140e6194c2eSMichael Tuexen 			if (sctp_v6src_match_nexthop(
1141e6194c2eSMichael Tuexen 			    &newifa->address.sin6, (sctp_route_t *)&net->ro)) {
1142e6194c2eSMichael Tuexen 				changed = 1;
1143e6194c2eSMichael Tuexen 			}
1144e6194c2eSMichael Tuexen 			break;
1145e6194c2eSMichael Tuexen #endif
1146e6194c2eSMichael Tuexen 		default:
1147e6194c2eSMichael Tuexen 			break;
1148e6194c2eSMichael Tuexen 		}
11492afb3e84SRandall Stewart 		/*
11502afb3e84SRandall Stewart 		 * if the newly added address does not relate routing
11512afb3e84SRandall Stewart 		 * information, we skip.
11522afb3e84SRandall Stewart 		 */
11532afb3e84SRandall Stewart 		if (changed == 0)
11542afb3e84SRandall Stewart 			continue;
11552afb3e84SRandall Stewart 		/* Retransmit unacknowledged DATA chunks immediately */
11562afb3e84SRandall Stewart 		if (sctp_is_mobility_feature_on(stcb->sctp_ep,
11572afb3e84SRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) {
11582afb3e84SRandall Stewart 			sctp_net_immediate_retrans(stcb, net);
11592afb3e84SRandall Stewart 		}
11602afb3e84SRandall Stewart 		/* Send SET PRIMARY for this new address */
11612afb3e84SRandall Stewart 		if (net == stcb->asoc.primary_destination) {
11622afb3e84SRandall Stewart 			(void)sctp_asconf_queue_mgmt(stcb, newifa,
11632afb3e84SRandall Stewart 			    SCTP_SET_PRIM_ADDR);
11642afb3e84SRandall Stewart 		}
11652afb3e84SRandall Stewart 	}
11662afb3e84SRandall Stewart }
11672afb3e84SRandall Stewart 
11682dad8a55SRandall Stewart /*
1169f8829a4aSRandall Stewart  * process an ADD/DELETE IP ack from peer.
11701b649582SRandall Stewart  * addr: corresponding sctp_ifa to the address being added/deleted.
1171f8829a4aSRandall Stewart  * type: SCTP_ADD_IP_ADDRESS or SCTP_DEL_IP_ADDRESS.
1172f8829a4aSRandall Stewart  * flag: 1=success, 0=failure.
1173f8829a4aSRandall Stewart  */
1174f8829a4aSRandall Stewart static void
sctp_asconf_addr_mgmt_ack(struct sctp_tcb * stcb,struct sctp_ifa * addr,uint32_t flag)11757215cc1bSMichael Tuexen sctp_asconf_addr_mgmt_ack(struct sctp_tcb *stcb, struct sctp_ifa *addr, uint32_t flag)
1176f8829a4aSRandall Stewart {
1177f8829a4aSRandall Stewart 	/*
1178f8829a4aSRandall Stewart 	 * do the necessary asoc list work- if we get a failure indication,
11792dad8a55SRandall Stewart 	 * leave the address on the assoc's restricted list.  If we get a
11802dad8a55SRandall Stewart 	 * success indication, remove the address from the restricted list.
1181f8829a4aSRandall Stewart 	 */
1182f8829a4aSRandall Stewart 	/*
1183f8829a4aSRandall Stewart 	 * Note: this will only occur for ADD_IP_ADDRESS, since
1184f8829a4aSRandall Stewart 	 * DEL_IP_ADDRESS is never actually added to the list...
1185f8829a4aSRandall Stewart 	 */
1186f8829a4aSRandall Stewart 	if (flag) {
11871b649582SRandall Stewart 		/* success case, so remove from the restricted list */
11881b649582SRandall Stewart 		sctp_del_local_addr_restricted(stcb, addr);
11892dad8a55SRandall Stewart 
11903232788eSRandall Stewart 		if (sctp_is_mobility_feature_on(stcb->sctp_ep,
1191d55b0b1bSRandall Stewart 		    SCTP_MOBILITY_BASE) ||
1192d55b0b1bSRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
1193d55b0b1bSRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) {
11942afb3e84SRandall Stewart 			sctp_path_check_and_react(stcb, addr);
11952afb3e84SRandall Stewart 			return;
11962afb3e84SRandall Stewart 		}
11973232788eSRandall Stewart 		/* clear any cached/topologically incorrect source addresses */
11982dad8a55SRandall Stewart 		sctp_asconf_nets_cleanup(stcb, addr->ifn_p);
1199f8829a4aSRandall Stewart 	}
1200f8829a4aSRandall Stewart 	/* else, leave it on the list */
1201f8829a4aSRandall Stewart }
1202f8829a4aSRandall Stewart 
1203f8829a4aSRandall Stewart /*
12041b649582SRandall Stewart  * add an asconf add/delete/set primary IP address parameter to the queue.
1205f8829a4aSRandall Stewart  * type = SCTP_ADD_IP_ADDRESS, SCTP_DEL_IP_ADDRESS, SCTP_SET_PRIM_ADDR.
12061b649582SRandall Stewart  * returns 0 if queued, -1 if not queued/removed.
12071b649582SRandall Stewart  * NOTE: if adding, but a delete for the same address is already scheduled
12081b649582SRandall Stewart  * (and not yet sent out), simply remove it from queue.  Same for deleting
12091b649582SRandall Stewart  * an address already scheduled for add.  If a duplicate operation is found,
12101b649582SRandall Stewart  * ignore the new one.
1211f8829a4aSRandall Stewart  */
12121b649582SRandall Stewart static int
sctp_asconf_queue_mgmt(struct sctp_tcb * stcb,struct sctp_ifa * ifa,uint16_t type)12131b649582SRandall Stewart sctp_asconf_queue_mgmt(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
121418e198d3SRandall Stewart     uint16_t type)
1215f8829a4aSRandall Stewart {
1216f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1217f8829a4aSRandall Stewart 
1218f8829a4aSRandall Stewart 	/* make sure the request isn't already in the queue */
12194a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1220f8829a4aSRandall Stewart 		/* address match? */
122142551e99SRandall Stewart 		if (sctp_asconf_addr_match(aa, &ifa->address.sa) == 0)
1222f8829a4aSRandall Stewart 			continue;
1223c54a18d2SRandall Stewart 		/*
1224c54a18d2SRandall Stewart 		 * is the request already in queue but not sent? pass the
1225c54a18d2SRandall Stewart 		 * request already sent in order to resolve the following
1226c54a18d2SRandall Stewart 		 * case: 1. arrival of ADD, then sent 2. arrival of DEL. we
1227c54a18d2SRandall Stewart 		 * can't remove the ADD request already sent 3. arrival of
1228c54a18d2SRandall Stewart 		 * ADD
1229c54a18d2SRandall Stewart 		 */
1230c54a18d2SRandall Stewart 		if (aa->ap.aph.ph.param_type == type && aa->sent == 0) {
1231f8829a4aSRandall Stewart 			return (-1);
1232f8829a4aSRandall Stewart 		}
1233f8829a4aSRandall Stewart 		/* is the negative request already in queue, and not sent */
12341b649582SRandall Stewart 		if ((aa->sent == 0) && (type == SCTP_ADD_IP_ADDRESS) &&
12351b649582SRandall Stewart 		    (aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS)) {
1236f8829a4aSRandall Stewart 			/* add requested, delete already queued */
1237f8829a4aSRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
12381b649582SRandall Stewart 			/* remove the ifa from the restricted list */
12391b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, ifa);
12401b649582SRandall Stewart 			/* free the asconf param */
1241207304d4SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
12421b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_mgmt: add removes queued entry\n");
12431b649582SRandall Stewart 			return (-1);
12441b649582SRandall Stewart 		}
12451b649582SRandall Stewart 		if ((aa->sent == 0) && (type == SCTP_DEL_IP_ADDRESS) &&
12461b649582SRandall Stewart 		    (aa->ap.aph.ph.param_type == SCTP_ADD_IP_ADDRESS)) {
12471b649582SRandall Stewart 			/* delete requested, add already queued */
12481b649582SRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
12491b649582SRandall Stewart 			/* remove the aa->ifa from the restricted list */
12501b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, aa->ifa);
12511b649582SRandall Stewart 			/* free the asconf param */
12521b649582SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
12531b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_mgmt: delete removes queued entry\n");
1254f8829a4aSRandall Stewart 			return (-1);
1255f8829a4aSRandall Stewart 		}
1256f8829a4aSRandall Stewart 	}			/* for each aa */
1257f8829a4aSRandall Stewart 
1258f8829a4aSRandall Stewart 	/* adding new request to the queue */
12591b649582SRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
12601b649582SRandall Stewart 	    SCTP_M_ASC_ADDR);
1261f8829a4aSRandall Stewart 	if (aa == NULL) {
1262f8829a4aSRandall Stewart 		/* didn't get memory */
12631b649582SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "asconf_queue_mgmt: failed to get memory!\n");
1264f8829a4aSRandall Stewart 		return (-1);
1265f8829a4aSRandall Stewart 	}
1266830d754dSRandall Stewart 	aa->special_del = 0;
1267f8829a4aSRandall Stewart 	/* fill in asconf address parameter fields */
1268f8829a4aSRandall Stewart 	/* top level elements are "networked" during send */
1269f8829a4aSRandall Stewart 	aa->ap.aph.ph.param_type = type;
1270f8829a4aSRandall Stewart 	aa->ifa = ifa;
1271bff64a4dSRandall Stewart 	atomic_add_int(&ifa->refcount, 1);
1272f8829a4aSRandall Stewart 	/* correlation_id filled in during send routine later... */
1273e6194c2eSMichael Tuexen 	switch (ifa->address.sa.sa_family) {
1274e6194c2eSMichael Tuexen #ifdef INET6
1275e6194c2eSMichael Tuexen 	case AF_INET6:
1276e6194c2eSMichael Tuexen 		{
1277f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1278f8829a4aSRandall Stewart 
127924aaac8dSMichael Tuexen 			sin6 = &ifa->address.sin6;
1280f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
1281f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv6addr_param));
12821b649582SRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) +
1283f8829a4aSRandall Stewart 			    sizeof(struct sctp_ipv6addr_param);
1284f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin6->sin6_addr,
1285f8829a4aSRandall Stewart 			    sizeof(struct in6_addr));
1286e6194c2eSMichael Tuexen 			break;
1287e6194c2eSMichael Tuexen 		}
1288e6194c2eSMichael Tuexen #endif
1289e6194c2eSMichael Tuexen #ifdef INET
1290e6194c2eSMichael Tuexen 	case AF_INET:
1291e6194c2eSMichael Tuexen 		{
12921b649582SRandall Stewart 			struct sockaddr_in *sin;
1293f8829a4aSRandall Stewart 
129424aaac8dSMichael Tuexen 			sin = &ifa->address.sin;
1295f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
1296f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv4addr_param));
12971b649582SRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) +
1298f8829a4aSRandall Stewart 			    sizeof(struct sctp_ipv4addr_param);
1299f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin->sin_addr,
1300f8829a4aSRandall Stewart 			    sizeof(struct in_addr));
1301e6194c2eSMichael Tuexen 			break;
1302e6194c2eSMichael Tuexen 		}
1303e6194c2eSMichael Tuexen #endif
1304e6194c2eSMichael Tuexen 	default:
1305f8829a4aSRandall Stewart 		/* invalid family! */
1306207304d4SRandall Stewart 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
13073232788eSRandall Stewart 		sctp_free_ifa(ifa);
1308f8829a4aSRandall Stewart 		return (-1);
1309f8829a4aSRandall Stewart 	}
1310f8829a4aSRandall Stewart 	aa->sent = 0;		/* clear sent flag */
1311f8829a4aSRandall Stewart 
1312f8829a4aSRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
1313f8829a4aSRandall Stewart #ifdef SCTP_DEBUG
1314dec0177dSRandall Stewart 	if (SCTP_BASE_SYSCTL(sctp_debug_on) & SCTP_DEBUG_ASCONF2) {
1315c54a18d2SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
1316*ce20b48aSMichael Tuexen 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_mgmt: inserted asconf ADD_IP_ADDRESS: ");
131788a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1318c54a18d2SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
1319*ce20b48aSMichael Tuexen 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_mgmt: appended asconf DEL_IP_ADDRESS: ");
132088a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1321f8829a4aSRandall Stewart 		} else {
1322*ce20b48aSMichael Tuexen 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_mgmt: appended asconf SET_PRIM_ADDR: ");
132388a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1324f8829a4aSRandall Stewart 		}
1325f8829a4aSRandall Stewart 	}
1326ad81507eSRandall Stewart #endif
1327f8829a4aSRandall Stewart 
1328f8829a4aSRandall Stewart 	return (0);
1329f8829a4aSRandall Stewart }
1330f8829a4aSRandall Stewart 
13311b649582SRandall Stewart /*
13321b649582SRandall Stewart  * add an asconf operation for the given ifa and type.
13331b649582SRandall Stewart  * type = SCTP_ADD_IP_ADDRESS, SCTP_DEL_IP_ADDRESS, SCTP_SET_PRIM_ADDR.
13341b649582SRandall Stewart  * returns 0 if completed, -1 if not completed, 1 if immediate send is
13351b649582SRandall Stewart  * advisable.
13361b649582SRandall Stewart  */
13371b649582SRandall Stewart static int
sctp_asconf_queue_add(struct sctp_tcb * stcb,struct sctp_ifa * ifa,uint16_t type)13381b649582SRandall Stewart sctp_asconf_queue_add(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
13391b649582SRandall Stewart     uint16_t type)
13401b649582SRandall Stewart {
13411b649582SRandall Stewart 	uint32_t status;
13421b649582SRandall Stewart 	int pending_delete_queued = 0;
1343790a758dSMichael Tuexen 	int last;
13441b649582SRandall Stewart 
13451b649582SRandall Stewart 	/* see if peer supports ASCONF */
1346c79bec9cSMichael Tuexen 	if (stcb->asoc.asconf_supported == 0) {
13471b649582SRandall Stewart 		return (-1);
13481b649582SRandall Stewart 	}
13490053ed28SMichael Tuexen 
13501b649582SRandall Stewart 	/*
13511b649582SRandall Stewart 	 * if this is deleting the last address from the assoc, mark it as
13521b649582SRandall Stewart 	 * pending.
13531b649582SRandall Stewart 	 */
1354790a758dSMichael Tuexen 	if ((type == SCTP_DEL_IP_ADDRESS) && !stcb->asoc.asconf_del_pending) {
1355790a758dSMichael Tuexen 		if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1356790a758dSMichael Tuexen 			last = (sctp_local_addr_count(stcb) == 0);
1357790a758dSMichael Tuexen 		} else {
1358790a758dSMichael Tuexen 			last = (sctp_local_addr_count(stcb) == 1);
1359790a758dSMichael Tuexen 		}
1360790a758dSMichael Tuexen 		if (last) {
13611b649582SRandall Stewart 			/* set the pending delete info only */
13621b649582SRandall Stewart 			stcb->asoc.asconf_del_pending = 1;
13631b649582SRandall Stewart 			stcb->asoc.asconf_addr_del_pending = ifa;
13641b649582SRandall Stewart 			atomic_add_int(&ifa->refcount, 1);
13651b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2,
13661b649582SRandall Stewart 			    "asconf_queue_add: mark delete last address pending\n");
13671b649582SRandall Stewart 			return (-1);
13681b649582SRandall Stewart 		}
1369790a758dSMichael Tuexen 	}
13700053ed28SMichael Tuexen 
1371c54a18d2SRandall Stewart 	/* queue an asconf parameter */
1372c54a18d2SRandall Stewart 	status = sctp_asconf_queue_mgmt(stcb, ifa, type);
1373c54a18d2SRandall Stewart 
13741b649582SRandall Stewart 	/*
13751b649582SRandall Stewart 	 * if this is an add, and there is a delete also pending (i.e. the
13761b649582SRandall Stewart 	 * last local address is being changed), queue the pending delete
13771b649582SRandall Stewart 	 * too.
13781b649582SRandall Stewart 	 */
1379c54a18d2SRandall Stewart 	if ((type == SCTP_ADD_IP_ADDRESS) && stcb->asoc.asconf_del_pending && (status == 0)) {
13801b649582SRandall Stewart 		/* queue in the pending delete */
13811b649582SRandall Stewart 		if (sctp_asconf_queue_mgmt(stcb,
13821b649582SRandall Stewart 		    stcb->asoc.asconf_addr_del_pending,
13831b649582SRandall Stewart 		    SCTP_DEL_IP_ADDRESS) == 0) {
138447d16bf9SMichael Tuexen 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_add: queuing pending delete\n");
13851b649582SRandall Stewart 			pending_delete_queued = 1;
13861b649582SRandall Stewart 			/* clear out the pending delete info */
13871b649582SRandall Stewart 			stcb->asoc.asconf_del_pending = 0;
13881b649582SRandall Stewart 			sctp_free_ifa(stcb->asoc.asconf_addr_del_pending);
13891b649582SRandall Stewart 			stcb->asoc.asconf_addr_del_pending = NULL;
13901b649582SRandall Stewart 		}
13911b649582SRandall Stewart 	}
13920053ed28SMichael Tuexen 
1393c54a18d2SRandall Stewart 	if (pending_delete_queued) {
13941b649582SRandall Stewart 		struct sctp_nets *net;
13951b649582SRandall Stewart 
13961b649582SRandall Stewart 		/*
13971b649582SRandall Stewart 		 * since we know that the only/last address is now being
13981b649582SRandall Stewart 		 * changed in this case, reset the cwnd/rto on all nets to
13991b649582SRandall Stewart 		 * start as a new address and path.  Also clear the error
14001b649582SRandall Stewart 		 * counts to give the assoc the best chance to complete the
14011b649582SRandall Stewart 		 * address change.
14021b649582SRandall Stewart 		 */
14031b649582SRandall Stewart 		TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
14041b649582SRandall Stewart 			stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb,
14051b649582SRandall Stewart 			    net);
14061b649582SRandall Stewart 			net->RTO = 0;
14071b649582SRandall Stewart 			net->error_count = 0;
14081b649582SRandall Stewart 		}
14091b649582SRandall Stewart 		stcb->asoc.overall_error_count = 0;
1410b3f1ea41SRandall Stewart 		if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_THRESHOLD_LOGGING) {
1411c4739e2fSRandall Stewart 			sctp_misc_ints(SCTP_THRESHOLD_CLEAR,
1412c4739e2fSRandall Stewart 			    stcb->asoc.overall_error_count,
1413c4739e2fSRandall Stewart 			    0,
1414c4739e2fSRandall Stewart 			    SCTP_FROM_SCTP_ASCONF,
1415c4739e2fSRandall Stewart 			    __LINE__);
1416c4739e2fSRandall Stewart 		}
14170053ed28SMichael Tuexen 
14181b649582SRandall Stewart 		/* queue in an advisory set primary too */
14191b649582SRandall Stewart 		(void)sctp_asconf_queue_mgmt(stcb, ifa, SCTP_SET_PRIM_ADDR);
14201b649582SRandall Stewart 		/* let caller know we should send this out immediately */
14211b649582SRandall Stewart 		status = 1;
14221b649582SRandall Stewart 	}
14231b649582SRandall Stewart 	return (status);
14241b649582SRandall Stewart }
14251b649582SRandall Stewart 
14263232788eSRandall Stewart /*-
14273232788eSRandall Stewart  * add an asconf delete IP address parameter to the queue by sockaddr and
14283232788eSRandall Stewart  * possibly with no sctp_ifa available.  This is only called by the routine
14293232788eSRandall Stewart  * that checks the addresses in an INIT-ACK against the current address list.
1430f8829a4aSRandall Stewart  * returns 0 if completed, non-zero if not completed.
14313232788eSRandall Stewart  * NOTE: if an add is already scheduled (and not yet sent out), simply
14323232788eSRandall Stewart  * remove it from queue.  If a duplicate operation is found, ignore the
14333232788eSRandall Stewart  * new one.
1434f8829a4aSRandall Stewart  */
14351b649582SRandall Stewart static int
sctp_asconf_queue_sa_delete(struct sctp_tcb * stcb,struct sockaddr * sa)14363232788eSRandall Stewart sctp_asconf_queue_sa_delete(struct sctp_tcb *stcb, struct sockaddr *sa)
1437f8829a4aSRandall Stewart {
1438bff64a4dSRandall Stewart 	struct sctp_ifa *ifa;
1439f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1440f8829a4aSRandall Stewart 
1441ad81507eSRandall Stewart 	if (stcb == NULL) {
1442ad81507eSRandall Stewart 		return (-1);
1443ad81507eSRandall Stewart 	}
1444f8829a4aSRandall Stewart 	/* see if peer supports ASCONF */
1445c79bec9cSMichael Tuexen 	if (stcb->asoc.asconf_supported == 0) {
1446f8829a4aSRandall Stewart 		return (-1);
1447f8829a4aSRandall Stewart 	}
1448f8829a4aSRandall Stewart 	/* make sure the request isn't already in the queue */
14494a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1450f8829a4aSRandall Stewart 		/* address match? */
1451f8829a4aSRandall Stewart 		if (sctp_asconf_addr_match(aa, sa) == 0)
1452f8829a4aSRandall Stewart 			continue;
1453f8829a4aSRandall Stewart 		/* is the request already in queue (sent or not) */
14543232788eSRandall Stewart 		if (aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS) {
1455f8829a4aSRandall Stewart 			return (-1);
1456f8829a4aSRandall Stewart 		}
1457f8829a4aSRandall Stewart 		/* is the negative request already in queue, and not sent */
1458f8829a4aSRandall Stewart 		if (aa->sent == 1)
1459f8829a4aSRandall Stewart 			continue;
14603232788eSRandall Stewart 		if (aa->ap.aph.ph.param_type == SCTP_ADD_IP_ADDRESS) {
14613232788eSRandall Stewart 			/* add already queued, so remove existing entry */
1462f8829a4aSRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
14631b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, aa->ifa);
1464f8829a4aSRandall Stewart 			/* free the entry */
1465207304d4SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
1466f8829a4aSRandall Stewart 			return (-1);
1467f8829a4aSRandall Stewart 		}
1468f8829a4aSRandall Stewart 	}			/* for each aa */
14693232788eSRandall Stewart 
14703232788eSRandall Stewart 	/* find any existing ifa-- NOTE ifa CAN be allowed to be NULL */
1471448e8596SMichael Tuexen 	ifa = sctp_find_ifa_by_addr(sa, stcb->asoc.vrf_id, SCTP_ADDR_NOT_LOCKED);
14723232788eSRandall Stewart 
1473f8829a4aSRandall Stewart 	/* adding new request to the queue */
14741b649582SRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
14751b649582SRandall Stewart 	    SCTP_M_ASC_ADDR);
1476f8829a4aSRandall Stewart 	if (aa == NULL) {
1477f8829a4aSRandall Stewart 		/* didn't get memory */
1478ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
14793232788eSRandall Stewart 		    "sctp_asconf_queue_sa_delete: failed to get memory!\n");
1480f8829a4aSRandall Stewart 		return (-1);
1481f8829a4aSRandall Stewart 	}
1482830d754dSRandall Stewart 	aa->special_del = 0;
1483f8829a4aSRandall Stewart 	/* fill in asconf address parameter fields */
1484f8829a4aSRandall Stewart 	/* top level elements are "networked" during send */
14853232788eSRandall Stewart 	aa->ap.aph.ph.param_type = SCTP_DEL_IP_ADDRESS;
1486bff64a4dSRandall Stewart 	aa->ifa = ifa;
14873232788eSRandall Stewart 	if (ifa)
1488bff64a4dSRandall Stewart 		atomic_add_int(&ifa->refcount, 1);
1489f8829a4aSRandall Stewart 	/* correlation_id filled in during send routine later... */
1490e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
1491e6194c2eSMichael Tuexen #ifdef INET6
1492e6194c2eSMichael Tuexen 	case AF_INET6:
1493e6194c2eSMichael Tuexen 		{
1494f8829a4aSRandall Stewart 			/* IPv6 address */
1495f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1496f8829a4aSRandall Stewart 
1497f8829a4aSRandall Stewart 			sin6 = (struct sockaddr_in6 *)sa;
1498f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
1499f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv6addr_param));
1500f8829a4aSRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) + sizeof(struct sctp_ipv6addr_param);
1501f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin6->sin6_addr,
1502f8829a4aSRandall Stewart 			    sizeof(struct in6_addr));
1503e6194c2eSMichael Tuexen 			break;
1504e6194c2eSMichael Tuexen 		}
1505e6194c2eSMichael Tuexen #endif
1506e6194c2eSMichael Tuexen #ifdef INET
1507e6194c2eSMichael Tuexen 	case AF_INET:
1508e6194c2eSMichael Tuexen 		{
1509f8829a4aSRandall Stewart 			/* IPv4 address */
1510f8829a4aSRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
1511f8829a4aSRandall Stewart 
1512f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
1513f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv4addr_param));
1514f8829a4aSRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) + sizeof(struct sctp_ipv4addr_param);
1515f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin->sin_addr,
1516f8829a4aSRandall Stewart 			    sizeof(struct in_addr));
1517e6194c2eSMichael Tuexen 			break;
1518e6194c2eSMichael Tuexen 		}
1519e6194c2eSMichael Tuexen #endif
1520e6194c2eSMichael Tuexen 	default:
1521f8829a4aSRandall Stewart 		/* invalid family! */
1522207304d4SRandall Stewart 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
15233232788eSRandall Stewart 		if (ifa)
15243232788eSRandall Stewart 			sctp_free_ifa(ifa);
1525f8829a4aSRandall Stewart 		return (-1);
1526f8829a4aSRandall Stewart 	}
1527f8829a4aSRandall Stewart 	aa->sent = 0;		/* clear sent flag */
1528f8829a4aSRandall Stewart 
15293232788eSRandall Stewart 	/* delete goes to the back of the queue */
1530f8829a4aSRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
1531f8829a4aSRandall Stewart 
1532c99efcf6SRandall Stewart 	/* sa_ignore MEMLEAK {memory is put on the tailq} */
1533f8829a4aSRandall Stewart 	return (0);
1534f8829a4aSRandall Stewart }
1535f8829a4aSRandall Stewart 
1536f8829a4aSRandall Stewart /*
1537f8829a4aSRandall Stewart  * find a specific asconf param on our "sent" queue
1538f8829a4aSRandall Stewart  */
1539f8829a4aSRandall Stewart static struct sctp_asconf_addr *
sctp_asconf_find_param(struct sctp_tcb * stcb,uint32_t correlation_id)1540f8829a4aSRandall Stewart sctp_asconf_find_param(struct sctp_tcb *stcb, uint32_t correlation_id)
1541f8829a4aSRandall Stewart {
1542f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa;
1543f8829a4aSRandall Stewart 
1544f8829a4aSRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
1545f8829a4aSRandall Stewart 		if (aa->ap.aph.correlation_id == correlation_id &&
1546f8829a4aSRandall Stewart 		    aa->sent == 1) {
1547f8829a4aSRandall Stewart 			/* found it */
1548f8829a4aSRandall Stewart 			return (aa);
1549f8829a4aSRandall Stewart 		}
1550f8829a4aSRandall Stewart 	}
1551f8829a4aSRandall Stewart 	/* didn't find it */
1552f8829a4aSRandall Stewart 	return (NULL);
1553f8829a4aSRandall Stewart }
1554f8829a4aSRandall Stewart 
1555f8829a4aSRandall Stewart /*
1556f8829a4aSRandall Stewart  * process an SCTP_ERROR_CAUSE_IND for a ASCONF-ACK parameter and do
1557f8829a4aSRandall Stewart  * notifications based on the error response
1558f8829a4aSRandall Stewart  */
1559f8829a4aSRandall Stewart static void
sctp_asconf_process_error(struct sctp_tcb * stcb SCTP_UNUSED,struct sctp_asconf_paramhdr * aph)1560c79bec9cSMichael Tuexen sctp_asconf_process_error(struct sctp_tcb *stcb SCTP_UNUSED,
1561f8829a4aSRandall Stewart     struct sctp_asconf_paramhdr *aph)
1562f8829a4aSRandall Stewart {
1563f8829a4aSRandall Stewart 	struct sctp_error_cause *eh;
1564f8829a4aSRandall Stewart 	struct sctp_paramhdr *ph;
1565f8829a4aSRandall Stewart 	uint16_t param_type;
1566f8829a4aSRandall Stewart 	uint16_t error_code;
1567f8829a4aSRandall Stewart 
1568f8829a4aSRandall Stewart 	eh = (struct sctp_error_cause *)(aph + 1);
1569f8829a4aSRandall Stewart 	ph = (struct sctp_paramhdr *)(eh + 1);
1570f8829a4aSRandall Stewart 	/* validate lengths */
1571f8829a4aSRandall Stewart 	if (htons(eh->length) + sizeof(struct sctp_error_cause) >
1572f8829a4aSRandall Stewart 	    htons(aph->ph.param_length)) {
1573f8829a4aSRandall Stewart 		/* invalid error cause length */
1574ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1575ad81507eSRandall Stewart 		    "asconf_process_error: cause element too long\n");
1576f8829a4aSRandall Stewart 		return;
1577f8829a4aSRandall Stewart 	}
1578f8829a4aSRandall Stewart 	if (htons(ph->param_length) + sizeof(struct sctp_paramhdr) >
1579f8829a4aSRandall Stewart 	    htons(eh->length)) {
1580f8829a4aSRandall Stewart 		/* invalid included TLV length */
1581ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1582ad81507eSRandall Stewart 		    "asconf_process_error: included TLV too long\n");
1583f8829a4aSRandall Stewart 		return;
1584f8829a4aSRandall Stewart 	}
1585f8829a4aSRandall Stewart 	/* which error code ? */
1586f8829a4aSRandall Stewart 	error_code = ntohs(eh->code);
1587f8829a4aSRandall Stewart 	param_type = ntohs(aph->ph.param_type);
1588f8829a4aSRandall Stewart 	/* FIX: this should go back up the REMOTE_ERROR ULP notify */
1589f8829a4aSRandall Stewart 	switch (error_code) {
1590f8829a4aSRandall Stewart 	case SCTP_CAUSE_RESOURCE_SHORTAGE:
1591f8829a4aSRandall Stewart 		/* we allow ourselves to "try again" for this error */
1592f8829a4aSRandall Stewart 		break;
1593f8829a4aSRandall Stewart 	default:
1594f8829a4aSRandall Stewart 		/* peer can't handle it... */
1595f8829a4aSRandall Stewart 		switch (param_type) {
1596f8829a4aSRandall Stewart 		case SCTP_ADD_IP_ADDRESS:
1597f8829a4aSRandall Stewart 		case SCTP_DEL_IP_ADDRESS:
1598f8829a4aSRandall Stewart 		case SCTP_SET_PRIM_ADDR:
1599f8829a4aSRandall Stewart 			break;
1600f8829a4aSRandall Stewart 		default:
1601f8829a4aSRandall Stewart 			break;
1602f8829a4aSRandall Stewart 		}
1603f8829a4aSRandall Stewart 	}
1604f8829a4aSRandall Stewart }
1605f8829a4aSRandall Stewart 
1606f8829a4aSRandall Stewart /*
160718e198d3SRandall Stewart  * process an asconf queue param.
160818e198d3SRandall Stewart  * aparam: parameter to process, will be removed from the queue.
160918e198d3SRandall Stewart  * flag: 1=success case, 0=failure case
1610f8829a4aSRandall Stewart  */
1611f8829a4aSRandall Stewart static void
sctp_asconf_process_param_ack(struct sctp_tcb * stcb,struct sctp_asconf_addr * aparam,uint32_t flag)1612f8829a4aSRandall Stewart sctp_asconf_process_param_ack(struct sctp_tcb *stcb,
1613f8829a4aSRandall Stewart     struct sctp_asconf_addr *aparam, uint32_t flag)
1614f8829a4aSRandall Stewart {
1615f8829a4aSRandall Stewart 	uint16_t param_type;
1616f8829a4aSRandall Stewart 
1617f8829a4aSRandall Stewart 	/* process this param */
1618f8829a4aSRandall Stewart 	param_type = aparam->ap.aph.ph.param_type;
1619f8829a4aSRandall Stewart 	switch (param_type) {
1620f8829a4aSRandall Stewart 	case SCTP_ADD_IP_ADDRESS:
1621ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1622ad81507eSRandall Stewart 		    "process_param_ack: added IP address\n");
16237215cc1bSMichael Tuexen 		sctp_asconf_addr_mgmt_ack(stcb, aparam->ifa, flag);
1624f8829a4aSRandall Stewart 		break;
1625f8829a4aSRandall Stewart 	case SCTP_DEL_IP_ADDRESS:
1626ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1627ad81507eSRandall Stewart 		    "process_param_ack: deleted IP address\n");
1628f8829a4aSRandall Stewart 		/* nothing really to do... lists already updated */
1629f8829a4aSRandall Stewart 		break;
1630f8829a4aSRandall Stewart 	case SCTP_SET_PRIM_ADDR:
1631c54a18d2SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1632c54a18d2SRandall Stewart 		    "process_param_ack: set primary IP address\n");
1633f8829a4aSRandall Stewart 		/* nothing to do... peer may start using this addr */
1634f8829a4aSRandall Stewart 		break;
1635f8829a4aSRandall Stewart 	default:
1636f8829a4aSRandall Stewart 		/* should NEVER happen */
1637f8829a4aSRandall Stewart 		break;
1638f8829a4aSRandall Stewart 	}
1639f8829a4aSRandall Stewart 
1640f8829a4aSRandall Stewart 	/* remove the param and free it */
1641f8829a4aSRandall Stewart 	TAILQ_REMOVE(&stcb->asoc.asconf_queue, aparam, next);
16423232788eSRandall Stewart 	if (aparam->ifa)
1643bff64a4dSRandall Stewart 		sctp_free_ifa(aparam->ifa);
1644207304d4SRandall Stewart 	SCTP_FREE(aparam, SCTP_M_ASC_ADDR);
1645f8829a4aSRandall Stewart }
1646f8829a4aSRandall Stewart 
1647f8829a4aSRandall Stewart /*
1648f8829a4aSRandall Stewart  * cleanup from a bad asconf ack parameter
1649f8829a4aSRandall Stewart  */
1650f8829a4aSRandall Stewart static void
sctp_asconf_ack_clear(struct sctp_tcb * stcb SCTP_UNUSED)1651c79bec9cSMichael Tuexen sctp_asconf_ack_clear(struct sctp_tcb *stcb SCTP_UNUSED)
1652f8829a4aSRandall Stewart {
1653f8829a4aSRandall Stewart 	/* assume peer doesn't really know how to do asconfs */
1654f8829a4aSRandall Stewart 	/* XXX we could free the pending queue here */
1655c79bec9cSMichael Tuexen 
1656f8829a4aSRandall Stewart }
1657f8829a4aSRandall Stewart 
1658f8829a4aSRandall Stewart void
sctp_handle_asconf_ack(struct mbuf * m,int offset,struct sctp_asconf_ack_chunk * cp,struct sctp_tcb * stcb,struct sctp_nets * net,int * abort_no_unlock)1659f8829a4aSRandall Stewart sctp_handle_asconf_ack(struct mbuf *m, int offset,
1660f8829a4aSRandall Stewart     struct sctp_asconf_ack_chunk *cp, struct sctp_tcb *stcb,
16613232788eSRandall Stewart     struct sctp_nets *net, int *abort_no_unlock)
1662f8829a4aSRandall Stewart {
1663f8829a4aSRandall Stewart 	struct sctp_association *asoc;
1664f8829a4aSRandall Stewart 	uint32_t serial_num;
1665f8829a4aSRandall Stewart 	uint16_t ack_length;
1666f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
1667f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1668f8829a4aSRandall Stewart 	uint32_t last_error_id = 0;	/* last error correlation id */
1669f8829a4aSRandall Stewart 	uint32_t id;
1670f8829a4aSRandall Stewart 	struct sctp_asconf_addr *ap;
1671f8829a4aSRandall Stewart 
1672f8829a4aSRandall Stewart 	/* asconf param buffer */
1673f42a358aSRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
1674f8829a4aSRandall Stewart 
1675f8829a4aSRandall Stewart 	/* verify minimum length */
1676f8829a4aSRandall Stewart 	if (ntohs(cp->ch.chunk_length) < sizeof(struct sctp_asconf_ack_chunk)) {
1677ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1678ad81507eSRandall Stewart 		    "handle_asconf_ack: chunk too small = %xh\n",
1679f8829a4aSRandall Stewart 		    ntohs(cp->ch.chunk_length));
1680f8829a4aSRandall Stewart 		return;
1681f8829a4aSRandall Stewart 	}
1682f8829a4aSRandall Stewart 	asoc = &stcb->asoc;
1683f8829a4aSRandall Stewart 	serial_num = ntohl(cp->serial_number);
1684f8829a4aSRandall Stewart 
1685f8829a4aSRandall Stewart 	/*
1686f8829a4aSRandall Stewart 	 * NOTE: we may want to handle this differently- currently, we will
1687f8829a4aSRandall Stewart 	 * abort when we get an ack for the expected serial number + 1 (eg.
1688f8829a4aSRandall Stewart 	 * we didn't send it), process an ack normally if it is the expected
1689f8829a4aSRandall Stewart 	 * serial number, and re-send the previous ack for *ALL* other
1690f8829a4aSRandall Stewart 	 * serial numbers
1691f8829a4aSRandall Stewart 	 */
1692f8829a4aSRandall Stewart 
1693f8829a4aSRandall Stewart 	/*
1694f8829a4aSRandall Stewart 	 * if the serial number is the next expected, but I didn't send it,
1695f8829a4aSRandall Stewart 	 * abort the asoc, since someone probably just hijacked us...
1696f8829a4aSRandall Stewart 	 */
1697f8829a4aSRandall Stewart 	if (serial_num == (asoc->asconf_seq_out + 1)) {
1698267dbe63SMichael Tuexen 		struct mbuf *op_err;
1699267dbe63SMichael Tuexen 		char msg[SCTP_DIAG_INFO_LEN];
1700267dbe63SMichael Tuexen 
1701ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf_ack: got unexpected next serial number! Aborting asoc!\n");
1702999f86d6SMichael Tuexen 		SCTP_SNPRINTF(msg, sizeof(msg), "Never sent serial number %8.8x", serial_num);
1703267dbe63SMichael Tuexen 		op_err = sctp_generate_cause(SCTP_CAUSE_PROTOCOL_VIOLATION, msg);
1704105b68b4SMichael Tuexen 		sctp_abort_an_association(stcb->sctp_ep, stcb, op_err, false, SCTP_SO_NOT_LOCKED);
17053232788eSRandall Stewart 		*abort_no_unlock = 1;
1706f8829a4aSRandall Stewart 		return;
1707f8829a4aSRandall Stewart 	}
1708c54a18d2SRandall Stewart 	if (serial_num != asoc->asconf_seq_out_acked + 1) {
1709f8829a4aSRandall Stewart 		/* got a duplicate/unexpected ASCONF-ACK */
1710ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf_ack: got duplicate/unexpected serial number = %xh (expected = %xh)\n",
1711c54a18d2SRandall Stewart 		    serial_num, asoc->asconf_seq_out_acked + 1);
1712f8829a4aSRandall Stewart 		return;
1713f8829a4aSRandall Stewart 	}
17140053ed28SMichael Tuexen 
1715c54a18d2SRandall Stewart 	if (serial_num == asoc->asconf_seq_out - 1) {
1716f8829a4aSRandall Stewart 		/* stop our timer */
17176fb7b4fbSMichael Tuexen 		sctp_timer_stop(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep, stcb, NULL,
1718b7d130beSMichael Tuexen 		    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_5);
1719c54a18d2SRandall Stewart 	}
17200053ed28SMichael Tuexen 
1721f8829a4aSRandall Stewart 	/* process the ASCONF-ACK contents */
1722f8829a4aSRandall Stewart 	ack_length = ntohs(cp->ch.chunk_length) -
1723f8829a4aSRandall Stewart 	    sizeof(struct sctp_asconf_ack_chunk);
1724f8829a4aSRandall Stewart 	offset += sizeof(struct sctp_asconf_ack_chunk);
1725f8829a4aSRandall Stewart 	/* process through all parameters */
1726f8829a4aSRandall Stewart 	while (ack_length >= sizeof(struct sctp_asconf_paramhdr)) {
1727f8829a4aSRandall Stewart 		unsigned int param_length, param_type;
1728f8829a4aSRandall Stewart 
1729f8829a4aSRandall Stewart 		/* get pointer to next asconf parameter */
1730f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset,
1731f8829a4aSRandall Stewart 		    sizeof(struct sctp_asconf_paramhdr), aparam_buf);
1732f8829a4aSRandall Stewart 		if (aph == NULL) {
1733f8829a4aSRandall Stewart 			/* can't get an asconf paramhdr */
1734f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1735f8829a4aSRandall Stewart 			return;
1736f8829a4aSRandall Stewart 		}
1737f8829a4aSRandall Stewart 		param_type = ntohs(aph->ph.param_type);
1738f8829a4aSRandall Stewart 		param_length = ntohs(aph->ph.param_length);
1739f8829a4aSRandall Stewart 		if (param_length > ack_length) {
1740f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1741f8829a4aSRandall Stewart 			return;
1742f8829a4aSRandall Stewart 		}
17430ec2ce0dSMichael Tuexen 		if (param_length < sizeof(struct sctp_asconf_paramhdr)) {
1744f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1745f8829a4aSRandall Stewart 			return;
1746f8829a4aSRandall Stewart 		}
1747f8829a4aSRandall Stewart 		/* get the complete parameter... */
1748f8829a4aSRandall Stewart 		if (param_length > sizeof(aparam_buf)) {
1749ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
1750ad81507eSRandall Stewart 			    "param length (%u) larger than buffer size!\n", param_length);
1751f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1752f8829a4aSRandall Stewart 			return;
1753f8829a4aSRandall Stewart 		}
1754f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, param_length, aparam_buf);
1755f8829a4aSRandall Stewart 		if (aph == NULL) {
1756f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1757f8829a4aSRandall Stewart 			return;
1758f8829a4aSRandall Stewart 		}
1759f8829a4aSRandall Stewart 		/* correlation_id is transparent to peer, no ntohl needed */
1760f8829a4aSRandall Stewart 		id = aph->correlation_id;
1761f8829a4aSRandall Stewart 
1762f8829a4aSRandall Stewart 		switch (param_type) {
1763f8829a4aSRandall Stewart 		case SCTP_ERROR_CAUSE_IND:
1764f8829a4aSRandall Stewart 			last_error_id = id;
1765f8829a4aSRandall Stewart 			/* find the corresponding asconf param in our queue */
1766f8829a4aSRandall Stewart 			ap = sctp_asconf_find_param(stcb, id);
1767f8829a4aSRandall Stewart 			if (ap == NULL) {
1768f8829a4aSRandall Stewart 				/* hmm... can't find this in our queue! */
1769f8829a4aSRandall Stewart 				break;
1770f8829a4aSRandall Stewart 			}
1771f8829a4aSRandall Stewart 			/* process the parameter, failed flag */
1772f8829a4aSRandall Stewart 			sctp_asconf_process_param_ack(stcb, ap, 0);
1773f8829a4aSRandall Stewart 			/* process the error response */
1774f8829a4aSRandall Stewart 			sctp_asconf_process_error(stcb, aph);
1775f8829a4aSRandall Stewart 			break;
1776f8829a4aSRandall Stewart 		case SCTP_SUCCESS_REPORT:
1777f8829a4aSRandall Stewart 			/* find the corresponding asconf param in our queue */
1778f8829a4aSRandall Stewart 			ap = sctp_asconf_find_param(stcb, id);
1779f8829a4aSRandall Stewart 			if (ap == NULL) {
1780f8829a4aSRandall Stewart 				/* hmm... can't find this in our queue! */
1781f8829a4aSRandall Stewart 				break;
1782f8829a4aSRandall Stewart 			}
1783f8829a4aSRandall Stewart 			/* process the parameter, success flag */
1784f8829a4aSRandall Stewart 			sctp_asconf_process_param_ack(stcb, ap, 1);
1785f8829a4aSRandall Stewart 			break;
1786f8829a4aSRandall Stewart 		default:
1787f8829a4aSRandall Stewart 			break;
1788f8829a4aSRandall Stewart 		}		/* switch */
1789f8829a4aSRandall Stewart 
1790f8829a4aSRandall Stewart 		/* update remaining ASCONF-ACK message length to process */
17916395219aSMichael Tuexen 		if (ack_length > SCTP_SIZE32(param_length)) {
1792f8829a4aSRandall Stewart 			ack_length -= SCTP_SIZE32(param_length);
17936395219aSMichael Tuexen 		} else {
1794f8829a4aSRandall Stewart 			break;
1795f8829a4aSRandall Stewart 		}
1796f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(param_length);
1797f8829a4aSRandall Stewart 	}			/* while */
1798f8829a4aSRandall Stewart 
1799f8829a4aSRandall Stewart 	/*
1800f8829a4aSRandall Stewart 	 * if there are any "sent" params still on the queue, these are
1801f8829a4aSRandall Stewart 	 * implicitly "success", or "failed" (if we got an error back) ...
1802f8829a4aSRandall Stewart 	 * so process these appropriately
1803f8829a4aSRandall Stewart 	 *
1804f8829a4aSRandall Stewart 	 * we assume that the correlation_id's are monotonically increasing
1805f8829a4aSRandall Stewart 	 * beginning from 1 and that we don't have *that* many outstanding
1806f8829a4aSRandall Stewart 	 * at any given time
1807f8829a4aSRandall Stewart 	 */
1808f8829a4aSRandall Stewart 	if (last_error_id == 0)
1809f8829a4aSRandall Stewart 		last_error_id--;	/* set to "max" value */
18104a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1811f8829a4aSRandall Stewart 		if (aa->sent == 1) {
1812f8829a4aSRandall Stewart 			/*
1813f8829a4aSRandall Stewart 			 * implicitly successful or failed if correlation_id
1814f8829a4aSRandall Stewart 			 * < last_error_id, then success else, failure
1815f8829a4aSRandall Stewart 			 */
1816f8829a4aSRandall Stewart 			if (aa->ap.aph.correlation_id < last_error_id)
181718e198d3SRandall Stewart 				sctp_asconf_process_param_ack(stcb, aa, 1);
1818f8829a4aSRandall Stewart 			else
181918e198d3SRandall Stewart 				sctp_asconf_process_param_ack(stcb, aa, 0);
1820f8829a4aSRandall Stewart 		} else {
1821f8829a4aSRandall Stewart 			/*
1822f8829a4aSRandall Stewart 			 * since we always process in order (FIFO queue) if
1823f8829a4aSRandall Stewart 			 * we reach one that hasn't been sent, the rest
1824f8829a4aSRandall Stewart 			 * should not have been sent either. so, we're
1825f8829a4aSRandall Stewart 			 * done...
1826f8829a4aSRandall Stewart 			 */
1827f8829a4aSRandall Stewart 			break;
1828f8829a4aSRandall Stewart 		}
1829f8829a4aSRandall Stewart 	}
1830f8829a4aSRandall Stewart 
1831f8829a4aSRandall Stewart 	/* update the next sequence number to use */
1832c54a18d2SRandall Stewart 	asoc->asconf_seq_out_acked++;
1833f8829a4aSRandall Stewart 	/* remove the old ASCONF on our outbound queue */
1834f8829a4aSRandall Stewart 	sctp_toss_old_asconf(stcb);
1835f8829a4aSRandall Stewart 	if (!TAILQ_EMPTY(&stcb->asoc.asconf_queue)) {
18361b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
1837f8829a4aSRandall Stewart 		/* we have more params, so restart our timer */
1838f8829a4aSRandall Stewart 		sctp_timer_start(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep,
1839f8829a4aSRandall Stewart 		    stcb, net);
18401b649582SRandall Stewart #else
18411b649582SRandall Stewart 		/* we have more params, so send out more */
18423232788eSRandall Stewart 		sctp_send_asconf(stcb, net, SCTP_ADDR_NOT_LOCKED);
18431b649582SRandall Stewart #endif
1844f8829a4aSRandall Stewart 	}
1845f8829a4aSRandall Stewart }
1846f8829a4aSRandall Stewart 
18475e2c2d87SRandall Stewart #ifdef INET6
1848f8829a4aSRandall Stewart static uint32_t
sctp_is_scopeid_in_nets(struct sctp_tcb * stcb,struct sockaddr * sa)1849b0471b4bSMichael Tuexen sctp_is_scopeid_in_nets(struct sctp_tcb *stcb, struct sockaddr *sa)
1850b0471b4bSMichael Tuexen {
1851f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6, *net6;
1852f8829a4aSRandall Stewart 	struct sctp_nets *net;
1853f8829a4aSRandall Stewart 
1854f8829a4aSRandall Stewart 	if (sa->sa_family != AF_INET6) {
1855f8829a4aSRandall Stewart 		/* wrong family */
1856f8829a4aSRandall Stewart 		return (0);
1857f8829a4aSRandall Stewart 	}
1858f8829a4aSRandall Stewart 	sin6 = (struct sockaddr_in6 *)sa;
1859f8829a4aSRandall Stewart 	if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr) == 0) {
1860f8829a4aSRandall Stewart 		/* not link local address */
1861f8829a4aSRandall Stewart 		return (0);
1862f8829a4aSRandall Stewart 	}
1863f8829a4aSRandall Stewart 	/* hunt through our destination nets list for this scope_id */
1864f8829a4aSRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
1865f8829a4aSRandall Stewart 		if (((struct sockaddr *)(&net->ro._l_addr))->sa_family !=
1866f8829a4aSRandall Stewart 		    AF_INET6)
1867f8829a4aSRandall Stewart 			continue;
1868f8829a4aSRandall Stewart 		net6 = (struct sockaddr_in6 *)&net->ro._l_addr;
1869f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_LINKLOCAL(&net6->sin6_addr) == 0)
1870f8829a4aSRandall Stewart 			continue;
1871f8829a4aSRandall Stewart 		if (sctp_is_same_scope(sin6, net6)) {
1872f8829a4aSRandall Stewart 			/* found one */
1873f8829a4aSRandall Stewart 			return (1);
1874f8829a4aSRandall Stewart 		}
1875f8829a4aSRandall Stewart 	}
1876f8829a4aSRandall Stewart 	/* didn't find one */
1877f8829a4aSRandall Stewart 	return (0);
1878f8829a4aSRandall Stewart }
18795e2c2d87SRandall Stewart #endif
18805e2c2d87SRandall Stewart 
1881f8829a4aSRandall Stewart /*
1882f8829a4aSRandall Stewart  * address management functions
1883f8829a4aSRandall Stewart  */
1884f8829a4aSRandall Stewart static void
sctp_addr_mgmt_assoc(struct sctp_inpcb * inp,struct sctp_tcb * stcb,struct sctp_ifa * ifa,uint16_t type,int addr_locked)1885f8829a4aSRandall Stewart sctp_addr_mgmt_assoc(struct sctp_inpcb *inp, struct sctp_tcb *stcb,
18863232788eSRandall Stewart     struct sctp_ifa *ifa, uint16_t type, int addr_locked)
1887f8829a4aSRandall Stewart {
1888f8829a4aSRandall Stewart 	int status;
1889f8829a4aSRandall Stewart 
1890ca85e948SMichael Tuexen 	if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0 ||
1891f8829a4aSRandall Stewart 	    sctp_is_feature_off(inp, SCTP_PCB_FLAGS_DO_ASCONF)) {
1892f8829a4aSRandall Stewart 		/* subset bound, no ASCONF allowed case, so ignore */
1893f8829a4aSRandall Stewart 		return;
1894f8829a4aSRandall Stewart 	}
1895f8829a4aSRandall Stewart 	/*
1896f8829a4aSRandall Stewart 	 * note: we know this is not the subset bound, no ASCONF case eg.
1897f8829a4aSRandall Stewart 	 * this is boundall or subset bound w/ASCONF allowed
1898f8829a4aSRandall Stewart 	 */
1899f8829a4aSRandall Stewart 
19006ba22f19SMichael Tuexen 	/* first, make sure that the address is IPv4 or IPv6 and not jailed */
1901e6194c2eSMichael Tuexen 	switch (ifa->address.sa.sa_family) {
1902e6194c2eSMichael Tuexen #ifdef INET6
1903e6194c2eSMichael Tuexen 	case AF_INET6:
19046ba22f19SMichael Tuexen 		if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
19056ba22f19SMichael Tuexen 		    &ifa->address.sin6.sin6_addr) != 0) {
19066ba22f19SMichael Tuexen 			return;
19076ba22f19SMichael Tuexen 		}
1908e6194c2eSMichael Tuexen 		break;
1909e6194c2eSMichael Tuexen #endif
1910e6194c2eSMichael Tuexen #ifdef INET
1911e6194c2eSMichael Tuexen 	case AF_INET:
19126ba22f19SMichael Tuexen 		if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
19136ba22f19SMichael Tuexen 		    &ifa->address.sin.sin_addr) != 0) {
19146ba22f19SMichael Tuexen 			return;
19156ba22f19SMichael Tuexen 		}
1916e6194c2eSMichael Tuexen 		break;
1917e6194c2eSMichael Tuexen #endif
1918e6194c2eSMichael Tuexen 	default:
1919f8829a4aSRandall Stewart 		return;
1920f8829a4aSRandall Stewart 	}
1921e6194c2eSMichael Tuexen #ifdef INET6
1922f8829a4aSRandall Stewart 	/* make sure we're "allowed" to add this type of addr */
192342551e99SRandall Stewart 	if (ifa->address.sa.sa_family == AF_INET6) {
1924f8829a4aSRandall Stewart 		/* invalid if we're not a v6 endpoint */
1925f8829a4aSRandall Stewart 		if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0)
1926f8829a4aSRandall Stewart 			return;
1927f8829a4aSRandall Stewart 		/* is the v6 addr really valid ? */
192842551e99SRandall Stewart 		if (ifa->localifa_flags & SCTP_ADDR_IFA_UNUSEABLE) {
1929f8829a4aSRandall Stewart 			return;
1930f8829a4aSRandall Stewart 		}
1931f8829a4aSRandall Stewart 	}
1932e6194c2eSMichael Tuexen #endif
1933f8829a4aSRandall Stewart 	/* put this address on the "pending/do not use yet" list */
19341b649582SRandall Stewart 	sctp_add_local_addr_restricted(stcb, ifa);
1935f8829a4aSRandall Stewart 	/*
1936f8829a4aSRandall Stewart 	 * check address scope if address is out of scope, don't queue
1937f8829a4aSRandall Stewart 	 * anything... note: this would leave the address on both inp and
1938f8829a4aSRandall Stewart 	 * asoc lists
1939f8829a4aSRandall Stewart 	 */
19405e2c2d87SRandall Stewart 	switch (ifa->address.sa.sa_family) {
19415e2c2d87SRandall Stewart #ifdef INET6
19425e2c2d87SRandall Stewart 	case AF_INET6:
19435e2c2d87SRandall Stewart 		{
1944f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1945f8829a4aSRandall Stewart 
194624aaac8dSMichael Tuexen 			sin6 = &ifa->address.sin6;
1947f8829a4aSRandall Stewart 			if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
1948e7e65008SMichael Tuexen 				/* we skip unspecified addresses */
1949f8829a4aSRandall Stewart 				return;
1950f8829a4aSRandall Stewart 			}
1951f8829a4aSRandall Stewart 			if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
1952a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.local_scope == 0) {
1953f8829a4aSRandall Stewart 					return;
1954f8829a4aSRandall Stewart 				}
1955f8829a4aSRandall Stewart 				/* is it the right link local scope? */
195642551e99SRandall Stewart 				if (sctp_is_scopeid_in_nets(stcb, &ifa->address.sa) == 0) {
1957f8829a4aSRandall Stewart 					return;
1958f8829a4aSRandall Stewart 				}
1959f8829a4aSRandall Stewart 			}
1960a1cb341bSMichael Tuexen 			if (stcb->asoc.scope.site_scope == 0 &&
1961f8829a4aSRandall Stewart 			    IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr)) {
1962f8829a4aSRandall Stewart 				return;
1963f8829a4aSRandall Stewart 			}
19645e2c2d87SRandall Stewart 			break;
19655e2c2d87SRandall Stewart 		}
19665e2c2d87SRandall Stewart #endif
1967e6194c2eSMichael Tuexen #ifdef INET
19685e2c2d87SRandall Stewart 	case AF_INET:
19695e2c2d87SRandall Stewart 		{
1970f8829a4aSRandall Stewart 			struct sockaddr_in *sin;
1971f8829a4aSRandall Stewart 
1972f8829a4aSRandall Stewart 			/* invalid if we are a v6 only endpoint */
1973f8829a4aSRandall Stewart 			if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
197494962f6bSMichael Tuexen 			    SCTP_IPV6_V6ONLY(inp))
1975f8829a4aSRandall Stewart 				return;
1976f8829a4aSRandall Stewart 
197724aaac8dSMichael Tuexen 			sin = &ifa->address.sin;
1978f8829a4aSRandall Stewart 			if (sin->sin_addr.s_addr == 0) {
1979e7e65008SMichael Tuexen 				/* we skip unspecified addresses */
1980f8829a4aSRandall Stewart 				return;
1981f8829a4aSRandall Stewart 			}
1982a1cb341bSMichael Tuexen 			if (stcb->asoc.scope.ipv4_local_scope == 0 &&
1983f8829a4aSRandall Stewart 			    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr)) {
1984f8829a4aSRandall Stewart 				return;
1985f8829a4aSRandall Stewart 			}
19865e2c2d87SRandall Stewart 			break;
19875e2c2d87SRandall Stewart 		}
1988e6194c2eSMichael Tuexen #endif
19895e2c2d87SRandall Stewart 	default:
1990f8829a4aSRandall Stewart 		/* else, not AF_INET or AF_INET6, so skip */
1991f8829a4aSRandall Stewart 		return;
1992f8829a4aSRandall Stewart 	}
1993f8829a4aSRandall Stewart 
1994f8829a4aSRandall Stewart 	/* queue an asconf for this address add/delete */
1995f8829a4aSRandall Stewart 	if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_DO_ASCONF)) {
1996f8829a4aSRandall Stewart 		/* does the peer do asconf? */
1997c79bec9cSMichael Tuexen 		if (stcb->asoc.asconf_supported) {
1998f8829a4aSRandall Stewart 			/* queue an asconf for this addr */
1999f8829a4aSRandall Stewart 			status = sctp_asconf_queue_add(stcb, ifa, type);
20001b649582SRandall Stewart 
2001f8829a4aSRandall Stewart 			/*
20021b649582SRandall Stewart 			 * if queued ok, and in the open state, send out the
20031b649582SRandall Stewart 			 * ASCONF.  If in the non-open state, these will be
20041b649582SRandall Stewart 			 * sent when the state goes open.
2005f8829a4aSRandall Stewart 			 */
2006f8829a4aSRandall Stewart 			if (status == 0 &&
2007839d21d6SMichael Tuexen 			    ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
2008839d21d6SMichael Tuexen 			    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED))) {
20091b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
2010f8829a4aSRandall Stewart 				sctp_timer_start(SCTP_TIMER_TYPE_ASCONF, inp,
2011f8829a4aSRandall Stewart 				    stcb, stcb->asoc.primary_destination);
20121b649582SRandall Stewart #else
2013ca85e948SMichael Tuexen 				sctp_send_asconf(stcb, NULL, addr_locked);
20141b649582SRandall Stewart #endif
2015f8829a4aSRandall Stewart 			}
2016f8829a4aSRandall Stewart 		}
2017f8829a4aSRandall Stewart 	}
2018f8829a4aSRandall Stewart }
2019f8829a4aSRandall Stewart 
202042551e99SRandall Stewart int
sctp_asconf_iterator_ep(struct sctp_inpcb * inp,void * ptr,uint32_t val SCTP_UNUSED)20217215cc1bSMichael Tuexen sctp_asconf_iterator_ep(struct sctp_inpcb *inp, void *ptr, uint32_t val SCTP_UNUSED)
2022f8829a4aSRandall Stewart {
202342551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
202442551e99SRandall Stewart 	struct sctp_ifa *ifa;
202542551e99SRandall Stewart 	struct sctp_laddr *l;
202642551e99SRandall Stewart 	int cnt_invalid = 0;
2027f8829a4aSRandall Stewart 
202842551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
202942551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
203042551e99SRandall Stewart 		ifa = l->ifa;
2031e6194c2eSMichael Tuexen 		switch (ifa->address.sa.sa_family) {
2032e6194c2eSMichael Tuexen #ifdef INET6
2033e6194c2eSMichael Tuexen 		case AF_INET6:
2034f8829a4aSRandall Stewart 			/* invalid if we're not a v6 endpoint */
2035f8829a4aSRandall Stewart 			if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) {
203642551e99SRandall Stewart 				cnt_invalid++;
203742551e99SRandall Stewart 				if (asc->cnt == cnt_invalid)
203842551e99SRandall Stewart 					return (1);
2039f8829a4aSRandall Stewart 			}
2040e6194c2eSMichael Tuexen 			break;
2041e6194c2eSMichael Tuexen #endif
2042e6194c2eSMichael Tuexen #ifdef INET
2043e6194c2eSMichael Tuexen 		case AF_INET:
2044e6194c2eSMichael Tuexen 			{
2045f8829a4aSRandall Stewart 				/* invalid if we are a v6 only endpoint */
2046f8829a4aSRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
204794962f6bSMichael Tuexen 				    SCTP_IPV6_V6ONLY(inp)) {
204842551e99SRandall Stewart 					cnt_invalid++;
204942551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
205042551e99SRandall Stewart 						return (1);
2051f8829a4aSRandall Stewart 				}
2052e6194c2eSMichael Tuexen 				break;
2053e6194c2eSMichael Tuexen 			}
2054e6194c2eSMichael Tuexen #endif
2055e6194c2eSMichael Tuexen 		default:
2056f8829a4aSRandall Stewart 			/* invalid address family */
205742551e99SRandall Stewart 			cnt_invalid++;
205842551e99SRandall Stewart 			if (asc->cnt == cnt_invalid)
205942551e99SRandall Stewart 				return (1);
2060f8829a4aSRandall Stewart 		}
206142551e99SRandall Stewart 	}
206242551e99SRandall Stewart 	return (0);
206342551e99SRandall Stewart }
2064f8829a4aSRandall Stewart 
20651b649582SRandall Stewart static int
sctp_asconf_iterator_ep_end(struct sctp_inpcb * inp,void * ptr,uint32_t val SCTP_UNUSED)20667215cc1bSMichael Tuexen sctp_asconf_iterator_ep_end(struct sctp_inpcb *inp, void *ptr, uint32_t val SCTP_UNUSED)
206742551e99SRandall Stewart {
206842551e99SRandall Stewart 	struct sctp_ifa *ifa;
206942551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
207042551e99SRandall Stewart 	struct sctp_laddr *laddr, *nladdr, *l;
207142551e99SRandall Stewart 
207242551e99SRandall Stewart 	/* Only for specific case not bound all */
207342551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
207442551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
207542551e99SRandall Stewart 		ifa = l->ifa;
207642551e99SRandall Stewart 		if (l->action == SCTP_ADD_IP_ADDRESS) {
20773c503c28SRandall Stewart 			LIST_FOREACH(laddr, &inp->sctp_addr_list,
20783c503c28SRandall Stewart 			    sctp_nxt_addr) {
207942551e99SRandall Stewart 				if (laddr->ifa == ifa) {
208042551e99SRandall Stewart 					laddr->action = 0;
208142551e99SRandall Stewart 					break;
208242551e99SRandall Stewart 				}
208342551e99SRandall Stewart 			}
208442551e99SRandall Stewart 		} else if (l->action == SCTP_DEL_IP_ADDRESS) {
20854a9ef3f8SMichael Tuexen 			LIST_FOREACH_SAFE(laddr, &inp->sctp_addr_list, sctp_nxt_addr, nladdr) {
208642551e99SRandall Stewart 				/* remove only after all guys are done */
208742551e99SRandall Stewart 				if (laddr->ifa == ifa) {
208842551e99SRandall Stewart 					sctp_del_local_addr_ep(inp, ifa);
208942551e99SRandall Stewart 				}
209042551e99SRandall Stewart 			}
209142551e99SRandall Stewart 		}
209242551e99SRandall Stewart 	}
209342551e99SRandall Stewart 	return (0);
209442551e99SRandall Stewart }
209542551e99SRandall Stewart 
209642551e99SRandall Stewart void
sctp_asconf_iterator_stcb(struct sctp_inpcb * inp,struct sctp_tcb * stcb,void * ptr,uint32_t val SCTP_UNUSED)20971b649582SRandall Stewart sctp_asconf_iterator_stcb(struct sctp_inpcb *inp, struct sctp_tcb *stcb,
20987215cc1bSMichael Tuexen     void *ptr, uint32_t val SCTP_UNUSED)
209942551e99SRandall Stewart {
210042551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
210142551e99SRandall Stewart 	struct sctp_ifa *ifa;
210242551e99SRandall Stewart 	struct sctp_laddr *l;
210342551e99SRandall Stewart 	int cnt_invalid = 0;
210442551e99SRandall Stewart 	int type, status;
21051b649582SRandall Stewart 	int num_queued = 0;
210642551e99SRandall Stewart 
210742551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
210842551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
210942551e99SRandall Stewart 		ifa = l->ifa;
211042551e99SRandall Stewart 		type = l->action;
211122a67197SRandall Stewart 
211222a67197SRandall Stewart 		/* address's vrf_id must be the vrf_id of the assoc */
211322a67197SRandall Stewart 		if (ifa->vrf_id != stcb->asoc.vrf_id) {
211422a67197SRandall Stewart 			continue;
211522a67197SRandall Stewart 		}
21160053ed28SMichael Tuexen 
211742551e99SRandall Stewart 		/* Same checks again for assoc */
21185e2c2d87SRandall Stewart 		switch (ifa->address.sa.sa_family) {
21195e2c2d87SRandall Stewart #ifdef INET6
21205e2c2d87SRandall Stewart 		case AF_INET6:
21215e2c2d87SRandall Stewart 			{
212242551e99SRandall Stewart 				/* invalid if we're not a v6 endpoint */
212342551e99SRandall Stewart 				struct sockaddr_in6 *sin6;
212442551e99SRandall Stewart 
212542551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) {
212642551e99SRandall Stewart 					cnt_invalid++;
212742551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
212842551e99SRandall Stewart 						return;
212942551e99SRandall Stewart 					else
213042551e99SRandall Stewart 						continue;
213142551e99SRandall Stewart 				}
213224aaac8dSMichael Tuexen 				sin6 = &ifa->address.sin6;
213342551e99SRandall Stewart 				if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
2134e7e65008SMichael Tuexen 					/* we skip unspecified addresses */
213542551e99SRandall Stewart 					continue;
213642551e99SRandall Stewart 				}
21376ba22f19SMichael Tuexen 				if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
21386ba22f19SMichael Tuexen 				    &sin6->sin6_addr) != 0) {
21396ba22f19SMichael Tuexen 					continue;
21406ba22f19SMichael Tuexen 				}
214142551e99SRandall Stewart 				if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
2142a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.local_scope == 0) {
214342551e99SRandall Stewart 						continue;
214442551e99SRandall Stewart 					}
214542551e99SRandall Stewart 					/* is it the right link local scope? */
214642551e99SRandall Stewart 					if (sctp_is_scopeid_in_nets(stcb, &ifa->address.sa) == 0) {
214742551e99SRandall Stewart 						continue;
214842551e99SRandall Stewart 					}
214942551e99SRandall Stewart 				}
21505e2c2d87SRandall Stewart 				break;
21515e2c2d87SRandall Stewart 			}
21525e2c2d87SRandall Stewart #endif
2153e6194c2eSMichael Tuexen #ifdef INET
21545e2c2d87SRandall Stewart 		case AF_INET:
21555e2c2d87SRandall Stewart 			{
215642551e99SRandall Stewart 				/* invalid if we are a v6 only endpoint */
215742551e99SRandall Stewart 				struct sockaddr_in *sin;
215842551e99SRandall Stewart 
215942551e99SRandall Stewart 				/* invalid if we are a v6 only endpoint */
216042551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
216194962f6bSMichael Tuexen 				    SCTP_IPV6_V6ONLY(inp))
216242551e99SRandall Stewart 					continue;
216342551e99SRandall Stewart 
216424aaac8dSMichael Tuexen 				sin = &ifa->address.sin;
216542551e99SRandall Stewart 				if (sin->sin_addr.s_addr == 0) {
2166e7e65008SMichael Tuexen 					/* we skip unspecified addresses */
216742551e99SRandall Stewart 					continue;
216842551e99SRandall Stewart 				}
21696ba22f19SMichael Tuexen 				if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
21706ba22f19SMichael Tuexen 				    &sin->sin_addr) != 0) {
21716ba22f19SMichael Tuexen 					continue;
21726ba22f19SMichael Tuexen 				}
2173a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv4_local_scope == 0 &&
217442551e99SRandall Stewart 				    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr)) {
2175c2ede4b3SMartin Blapp 					continue;
217642551e99SRandall Stewart 				}
217742551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
217894962f6bSMichael Tuexen 				    SCTP_IPV6_V6ONLY(inp)) {
217942551e99SRandall Stewart 					cnt_invalid++;
218042551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
218142551e99SRandall Stewart 						return;
218242551e99SRandall Stewart 					else
218342551e99SRandall Stewart 						continue;
218442551e99SRandall Stewart 				}
21855e2c2d87SRandall Stewart 				break;
21865e2c2d87SRandall Stewart 			}
2187e6194c2eSMichael Tuexen #endif
21885e2c2d87SRandall Stewart 		default:
218942551e99SRandall Stewart 			/* invalid address family */
219042551e99SRandall Stewart 			cnt_invalid++;
219142551e99SRandall Stewart 			if (asc->cnt == cnt_invalid)
2192f8829a4aSRandall Stewart 				return;
219342551e99SRandall Stewart 			else
219442551e99SRandall Stewart 				continue;
2195f8829a4aSRandall Stewart 		}
2196f8829a4aSRandall Stewart 
219742551e99SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
21981b649582SRandall Stewart 			/* prevent this address from being used as a source */
21991b649582SRandall Stewart 			sctp_add_local_addr_restricted(stcb, ifa);
220042551e99SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
2201f8829a4aSRandall Stewart 			struct sctp_nets *net;
2202f8829a4aSRandall Stewart 
2203f8829a4aSRandall Stewart 			TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
2204f8829a4aSRandall Stewart 				/* delete this address if cached */
2205851b7298SRandall Stewart 				if (net->ro._s_addr == ifa) {
220642551e99SRandall Stewart 					sctp_free_ifa(net->ro._s_addr);
220742551e99SRandall Stewart 					net->ro._s_addr = NULL;
220842551e99SRandall Stewart 					net->src_addr_selected = 0;
2209983066f0SAlexander V. Chernikov 					RO_NHFREE(&net->ro);
221042551e99SRandall Stewart 					/*
221142551e99SRandall Stewart 					 * Now we deleted our src address,
221242551e99SRandall Stewart 					 * should we not also now reset the
221342551e99SRandall Stewart 					 * cwnd/rto to start as if its a new
221442551e99SRandall Stewart 					 * address?
221542551e99SRandall Stewart 					 */
2216b54d3a6cSRandall Stewart 					stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
2217108df27cSRandall Stewart 					net->RTO = 0;
2218f8829a4aSRandall Stewart 				}
2219f8829a4aSRandall Stewart 			}
222042551e99SRandall Stewart 		} else if (type == SCTP_SET_PRIM_ADDR) {
222142551e99SRandall Stewart 			if ((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0) {
22221b649582SRandall Stewart 				/* must validate the ifa is in the ep */
222342551e99SRandall Stewart 				if (sctp_is_addr_in_ep(stcb->sctp_ep, ifa) == 0) {
222442551e99SRandall Stewart 					continue;
2225f8829a4aSRandall Stewart 				}
222642551e99SRandall Stewart 			} else {
222742551e99SRandall Stewart 				/* Need to check scopes for this guy */
2228a1cb341bSMichael Tuexen 				if (sctp_is_address_in_scope(ifa, &stcb->asoc.scope, 0) == 0) {
222942551e99SRandall Stewart 					continue;
2230f8829a4aSRandall Stewart 				}
223142551e99SRandall Stewart 			}
223242551e99SRandall Stewart 		}
223342551e99SRandall Stewart 		/* queue an asconf for this address add/delete */
22341b649582SRandall Stewart 		if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_DO_ASCONF) &&
2235c79bec9cSMichael Tuexen 		    stcb->asoc.asconf_supported == 1) {
223642551e99SRandall Stewart 			/* queue an asconf for this addr */
223742551e99SRandall Stewart 			status = sctp_asconf_queue_add(stcb, ifa, type);
223842551e99SRandall Stewart 			/*
22391b649582SRandall Stewart 			 * if queued ok, and in the open state, update the
22401b649582SRandall Stewart 			 * count of queued params.  If in the non-open
22411b649582SRandall Stewart 			 * state, these get sent when the assoc goes open.
224242551e99SRandall Stewart 			 */
2243839d21d6SMichael Tuexen 			if ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
2244839d21d6SMichael Tuexen 			    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
22451b649582SRandall Stewart 				if (status >= 0) {
22461b649582SRandall Stewart 					num_queued++;
224742551e99SRandall Stewart 				}
224842551e99SRandall Stewart 			}
224942551e99SRandall Stewart 		}
225042551e99SRandall Stewart 	}
22511b649582SRandall Stewart 	/*
22521b649582SRandall Stewart 	 * If we have queued params in the open state, send out an ASCONF.
22531b649582SRandall Stewart 	 */
22541b649582SRandall Stewart 	if (num_queued > 0) {
2255ca85e948SMichael Tuexen 		sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
22561b649582SRandall Stewart 	}
225742551e99SRandall Stewart }
225842551e99SRandall Stewart 
225942551e99SRandall Stewart void
sctp_asconf_iterator_end(void * ptr,uint32_t val SCTP_UNUSED)22607215cc1bSMichael Tuexen sctp_asconf_iterator_end(void *ptr, uint32_t val SCTP_UNUSED)
226142551e99SRandall Stewart {
226242551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
226342551e99SRandall Stewart 	struct sctp_ifa *ifa;
22644a9ef3f8SMichael Tuexen 	struct sctp_laddr *l, *nl;
226542551e99SRandall Stewart 
226642551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
22674a9ef3f8SMichael Tuexen 	LIST_FOREACH_SAFE(l, &asc->list_of_work, sctp_nxt_addr, nl) {
226842551e99SRandall Stewart 		ifa = l->ifa;
226942551e99SRandall Stewart 		if (l->action == SCTP_ADD_IP_ADDRESS) {
227042551e99SRandall Stewart 			/* Clear the defer use flag */
227142551e99SRandall Stewart 			ifa->localifa_flags &= ~SCTP_ADDR_DEFER_USE;
227242551e99SRandall Stewart 		}
227342551e99SRandall Stewart 		sctp_free_ifa(ifa);
2274b3f1ea41SRandall Stewart 		SCTP_ZONE_FREE(SCTP_BASE_INFO(ipi_zone_laddr), l);
227542551e99SRandall Stewart 		SCTP_DECR_LADDR_COUNT();
227642551e99SRandall Stewart 	}
2277207304d4SRandall Stewart 	SCTP_FREE(asc, SCTP_M_ASC_IT);
2278f8829a4aSRandall Stewart }
2279f8829a4aSRandall Stewart 
2280f8829a4aSRandall Stewart /*
22811b649582SRandall Stewart  * sa is the sockaddr to ask the peer to set primary to.
22821b649582SRandall Stewart  * returns: 0 = completed, -1 = error
2283f8829a4aSRandall Stewart  */
2284c4739e2fSRandall Stewart int32_t
sctp_set_primary_ip_address_sa(struct sctp_tcb * stcb,struct sockaddr * sa)2285b0471b4bSMichael Tuexen sctp_set_primary_ip_address_sa(struct sctp_tcb *stcb, struct sockaddr *sa)
2286b0471b4bSMichael Tuexen {
22873232788eSRandall Stewart 	uint32_t vrf_id;
22883232788eSRandall Stewart 	struct sctp_ifa *ifa;
2289f8829a4aSRandall Stewart 
22903232788eSRandall Stewart 	/* find the ifa for the desired set primary */
22913232788eSRandall Stewart 	vrf_id = stcb->asoc.vrf_id;
22923232788eSRandall Stewart 	ifa = sctp_find_ifa_by_addr(sa, vrf_id, SCTP_ADDR_NOT_LOCKED);
22933232788eSRandall Stewart 	if (ifa == NULL) {
22943232788eSRandall Stewart 		/* Invalid address */
22953232788eSRandall Stewart 		return (-1);
22963232788eSRandall Stewart 	}
22970053ed28SMichael Tuexen 
2298f8829a4aSRandall Stewart 	/* queue an ASCONF:SET_PRIM_ADDR to be sent */
22993232788eSRandall Stewart 	if (!sctp_asconf_queue_add(stcb, ifa, SCTP_SET_PRIM_ADDR)) {
2300f8829a4aSRandall Stewart 		/* set primary queuing succeeded */
2301ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2302ad81507eSRandall Stewart 		    "set_primary_ip_address_sa: queued on tcb=%p, ",
2303dd294dceSMichael Tuexen 		    (void *)stcb);
2304ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
2305839d21d6SMichael Tuexen 		if ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
2306839d21d6SMichael Tuexen 		    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
23071b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
23081b649582SRandall Stewart 			sctp_timer_start(SCTP_TIMER_TYPE_ASCONF,
23091b649582SRandall Stewart 			    stcb->sctp_ep, stcb,
23101b649582SRandall Stewart 			    stcb->asoc.primary_destination);
23111b649582SRandall Stewart #else
2312ca85e948SMichael Tuexen 			sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
23131b649582SRandall Stewart #endif
23141b649582SRandall Stewart 		}
2315f8829a4aSRandall Stewart 	} else {
2316ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "set_primary_ip_address_sa: failed to add to queue on tcb=%p, ",
2317dd294dceSMichael Tuexen 		    (void *)stcb);
2318ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
2319f8829a4aSRandall Stewart 		return (-1);
2320f8829a4aSRandall Stewart 	}
2321f8829a4aSRandall Stewart 	return (0);
2322f8829a4aSRandall Stewart }
2323f8829a4aSRandall Stewart 
2324c54a18d2SRandall Stewart int
sctp_is_addr_pending(struct sctp_tcb * stcb,struct sctp_ifa * sctp_ifa)2325c54a18d2SRandall Stewart sctp_is_addr_pending(struct sctp_tcb *stcb, struct sctp_ifa *sctp_ifa)
2326c54a18d2SRandall Stewart {
2327c54a18d2SRandall Stewart 	struct sctp_tmit_chunk *chk, *nchk;
2328c54a18d2SRandall Stewart 	unsigned int offset, asconf_limit;
2329c54a18d2SRandall Stewart 	struct sctp_asconf_chunk *acp;
2330c54a18d2SRandall Stewart 	struct sctp_asconf_paramhdr *aph;
2331c54a18d2SRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
2332e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
2333c54a18d2SRandall Stewart 	int add_cnt, del_cnt;
2334c54a18d2SRandall Stewart 	uint16_t last_param_type;
2335c54a18d2SRandall Stewart 
2336c54a18d2SRandall Stewart 	add_cnt = del_cnt = 0;
2337c54a18d2SRandall Stewart 	last_param_type = 0;
23384a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(chk, &stcb->asoc.asconf_send_queue, sctp_next, nchk) {
2339c54a18d2SRandall Stewart 		if (chk->data == NULL) {
2340c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: No mbuf data?\n");
2341c54a18d2SRandall Stewart 			continue;
2342c54a18d2SRandall Stewart 		}
2343c54a18d2SRandall Stewart 		offset = 0;
2344c54a18d2SRandall Stewart 		acp = mtod(chk->data, struct sctp_asconf_chunk *);
2345c54a18d2SRandall Stewart 		offset += sizeof(struct sctp_asconf_chunk);
2346c54a18d2SRandall Stewart 		asconf_limit = ntohs(acp->ch.chunk_length);
2347e6194c2eSMichael Tuexen 		ph = (struct sctp_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_paramhdr), aparam_buf);
2348e6194c2eSMichael Tuexen 		if (ph == NULL) {
2349c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: couldn't get lookup addr!\n");
2350c54a18d2SRandall Stewart 			continue;
2351c54a18d2SRandall Stewart 		}
2352e6194c2eSMichael Tuexen 		offset += ntohs(ph->param_length);
2353c54a18d2SRandall Stewart 
2354c54a18d2SRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_asconf_paramhdr), aparam_buf);
2355c54a18d2SRandall Stewart 		if (aph == NULL) {
2356c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: Empty ASCONF will be sent?\n");
2357c54a18d2SRandall Stewart 			continue;
2358c54a18d2SRandall Stewart 		}
2359c54a18d2SRandall Stewart 		while (aph != NULL) {
2360c54a18d2SRandall Stewart 			unsigned int param_length, param_type;
2361c54a18d2SRandall Stewart 
2362c54a18d2SRandall Stewart 			param_type = ntohs(aph->ph.param_type);
2363c54a18d2SRandall Stewart 			param_length = ntohs(aph->ph.param_length);
2364c54a18d2SRandall Stewart 			if (offset + param_length > asconf_limit) {
2365c54a18d2SRandall Stewart 				/* parameter goes beyond end of chunk! */
2366c54a18d2SRandall Stewart 				break;
2367c54a18d2SRandall Stewart 			}
2368c54a18d2SRandall Stewart 			if (param_length > sizeof(aparam_buf)) {
2369c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: param length (%u) larger than buffer size!\n", param_length);
2370c54a18d2SRandall Stewart 				break;
2371c54a18d2SRandall Stewart 			}
2372c54a18d2SRandall Stewart 			if (param_length <= sizeof(struct sctp_paramhdr)) {
2373c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: param length(%u) too short\n", param_length);
2374c54a18d2SRandall Stewart 				break;
2375c54a18d2SRandall Stewart 			}
23760053ed28SMichael Tuexen 
2377c54a18d2SRandall Stewart 			aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, param_length, aparam_buf);
2378c54a18d2SRandall Stewart 			if (aph == NULL) {
2379c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: couldn't get entire param\n");
2380c54a18d2SRandall Stewart 				break;
2381c54a18d2SRandall Stewart 			}
23820053ed28SMichael Tuexen 
2383e6194c2eSMichael Tuexen 			ph = (struct sctp_paramhdr *)(aph + 1);
2384e6194c2eSMichael Tuexen 			if (sctp_addr_match(ph, &sctp_ifa->address.sa) != 0) {
2385c54a18d2SRandall Stewart 				switch (param_type) {
2386c54a18d2SRandall Stewart 				case SCTP_ADD_IP_ADDRESS:
2387c54a18d2SRandall Stewart 					add_cnt++;
2388c54a18d2SRandall Stewart 					break;
2389c54a18d2SRandall Stewart 				case SCTP_DEL_IP_ADDRESS:
2390c54a18d2SRandall Stewart 					del_cnt++;
2391c54a18d2SRandall Stewart 					break;
2392c54a18d2SRandall Stewart 				default:
2393c54a18d2SRandall Stewart 					break;
2394c54a18d2SRandall Stewart 				}
2395c54a18d2SRandall Stewart 				last_param_type = param_type;
2396c54a18d2SRandall Stewart 			}
23970053ed28SMichael Tuexen 
2398c54a18d2SRandall Stewart 			offset += SCTP_SIZE32(param_length);
2399c54a18d2SRandall Stewart 			if (offset >= asconf_limit) {
2400c54a18d2SRandall Stewart 				/* no more data in the mbuf chain */
2401c54a18d2SRandall Stewart 				break;
2402c54a18d2SRandall Stewart 			}
2403c54a18d2SRandall Stewart 			/* get pointer to next asconf param */
2404c54a18d2SRandall Stewart 			aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_asconf_paramhdr), aparam_buf);
2405c54a18d2SRandall Stewart 		}
2406c54a18d2SRandall Stewart 	}
2407c54a18d2SRandall Stewart 
2408b7b84c0eSMichael Tuexen 	/*
2409b7b84c0eSMichael Tuexen 	 * we want to find the sequences which consist of ADD -> DEL -> ADD
2410b7b84c0eSMichael Tuexen 	 * or DEL -> ADD
2411b7b84c0eSMichael Tuexen 	 */
2412c54a18d2SRandall Stewart 	if (add_cnt > del_cnt ||
2413c54a18d2SRandall Stewart 	    (add_cnt == del_cnt && last_param_type == SCTP_ADD_IP_ADDRESS)) {
241460990c0cSMichael Tuexen 		return (1);
2415c54a18d2SRandall Stewart 	}
241660990c0cSMichael Tuexen 	return (0);
2417c54a18d2SRandall Stewart }
2418c54a18d2SRandall Stewart 
2419f8829a4aSRandall Stewart static struct sockaddr *
sctp_find_valid_localaddr(struct sctp_tcb * stcb,int addr_locked)24203232788eSRandall Stewart sctp_find_valid_localaddr(struct sctp_tcb *stcb, int addr_locked)
2421f8829a4aSRandall Stewart {
242242551e99SRandall Stewart 	struct sctp_vrf *vrf = NULL;
242342551e99SRandall Stewart 	struct sctp_ifn *sctp_ifn;
242442551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
2425f8829a4aSRandall Stewart 
24263232788eSRandall Stewart 	if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2427c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RLOCK();
242842551e99SRandall Stewart 	vrf = sctp_find_vrf(stcb->asoc.vrf_id);
2429ad81507eSRandall Stewart 	if (vrf == NULL) {
24303232788eSRandall Stewart 		if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2431c99efcf6SRandall Stewart 			SCTP_IPI_ADDR_RUNLOCK();
2432ad81507eSRandall Stewart 		return (NULL);
2433ad81507eSRandall Stewart 	}
243442551e99SRandall Stewart 	LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
2435a1cb341bSMichael Tuexen 		if (stcb->asoc.scope.loopback_scope == 0 &&
243642551e99SRandall Stewart 		    SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
2437f8829a4aSRandall Stewart 			/* Skip if loopback_scope not set */
2438f8829a4aSRandall Stewart 			continue;
2439f8829a4aSRandall Stewart 		}
244042551e99SRandall Stewart 		LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
2441e6194c2eSMichael Tuexen 			switch (sctp_ifa->address.sa.sa_family) {
2442e6194c2eSMichael Tuexen #ifdef INET
2443e6194c2eSMichael Tuexen 			case AF_INET:
2444a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv4_addr_legal) {
2445f8829a4aSRandall Stewart 					struct sockaddr_in *sin;
2446f8829a4aSRandall Stewart 
244724aaac8dSMichael Tuexen 					sin = &sctp_ifa->address.sin;
2448f8829a4aSRandall Stewart 					if (sin->sin_addr.s_addr == 0) {
2449e7e65008SMichael Tuexen 						/*
2450e7e65008SMichael Tuexen 						 * skip unspecified
2451e7e65008SMichael Tuexen 						 * addresses
2452e7e65008SMichael Tuexen 						 */
2453f8829a4aSRandall Stewart 						continue;
2454f8829a4aSRandall Stewart 					}
24556ba22f19SMichael Tuexen 					if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
24566ba22f19SMichael Tuexen 					    &sin->sin_addr) != 0) {
24576ba22f19SMichael Tuexen 						continue;
24586ba22f19SMichael Tuexen 					}
2459a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.ipv4_local_scope == 0 &&
2460f8829a4aSRandall Stewart 					    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr))
2461f8829a4aSRandall Stewart 						continue;
2462f8829a4aSRandall Stewart 
2463c54a18d2SRandall Stewart 					if (sctp_is_addr_restricted(stcb, sctp_ifa) &&
2464c54a18d2SRandall Stewart 					    (!sctp_is_addr_pending(stcb, sctp_ifa)))
2465f8829a4aSRandall Stewart 						continue;
2466b7b84c0eSMichael Tuexen 					/*
2467b7b84c0eSMichael Tuexen 					 * found a valid local v4 address to
2468b7b84c0eSMichael Tuexen 					 * use
2469b7b84c0eSMichael Tuexen 					 */
24703232788eSRandall Stewart 					if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2471c99efcf6SRandall Stewart 						SCTP_IPI_ADDR_RUNLOCK();
247242551e99SRandall Stewart 					return (&sctp_ifa->address.sa);
2473e6194c2eSMichael Tuexen 				}
2474e6194c2eSMichael Tuexen 				break;
2475e6194c2eSMichael Tuexen #endif
2476e6194c2eSMichael Tuexen #ifdef INET6
2477e6194c2eSMichael Tuexen 			case AF_INET6:
2478a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv6_addr_legal) {
2479f8829a4aSRandall Stewart 					struct sockaddr_in6 *sin6;
2480f8829a4aSRandall Stewart 
248142551e99SRandall Stewart 					if (sctp_ifa->localifa_flags & SCTP_ADDR_IFA_UNUSEABLE) {
2482f8829a4aSRandall Stewart 						continue;
248342551e99SRandall Stewart 					}
24840053ed28SMichael Tuexen 
248524aaac8dSMichael Tuexen 					sin6 = &sctp_ifa->address.sin6;
2486f8829a4aSRandall Stewart 					if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
2487b7b84c0eSMichael Tuexen 						/*
2488e7e65008SMichael Tuexen 						 * we skip unspecified
2489b7b84c0eSMichael Tuexen 						 * addresses
2490b7b84c0eSMichael Tuexen 						 */
2491f8829a4aSRandall Stewart 						continue;
2492f8829a4aSRandall Stewart 					}
24936ba22f19SMichael Tuexen 					if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
24946ba22f19SMichael Tuexen 					    &sin6->sin6_addr) != 0) {
24956ba22f19SMichael Tuexen 						continue;
24966ba22f19SMichael Tuexen 					}
2497a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.local_scope == 0 &&
2498f8829a4aSRandall Stewart 					    IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr))
2499f8829a4aSRandall Stewart 						continue;
2500a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.site_scope == 0 &&
2501f8829a4aSRandall Stewart 					    IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr))
2502f8829a4aSRandall Stewart 						continue;
2503f8829a4aSRandall Stewart 
2504c54a18d2SRandall Stewart 					if (sctp_is_addr_restricted(stcb, sctp_ifa) &&
2505c54a18d2SRandall Stewart 					    (!sctp_is_addr_pending(stcb, sctp_ifa)))
2506c54a18d2SRandall Stewart 						continue;
2507b7b84c0eSMichael Tuexen 					/*
2508b7b84c0eSMichael Tuexen 					 * found a valid local v6 address to
2509b7b84c0eSMichael Tuexen 					 * use
2510b7b84c0eSMichael Tuexen 					 */
25113232788eSRandall Stewart 					if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2512c99efcf6SRandall Stewart 						SCTP_IPI_ADDR_RUNLOCK();
251342551e99SRandall Stewart 					return (&sctp_ifa->address.sa);
2514f8829a4aSRandall Stewart 				}
2515e6194c2eSMichael Tuexen 				break;
2516e6194c2eSMichael Tuexen #endif
2517e6194c2eSMichael Tuexen 			default:
2518e6194c2eSMichael Tuexen 				break;
2519e6194c2eSMichael Tuexen 			}
2520f8829a4aSRandall Stewart 		}
2521f8829a4aSRandall Stewart 	}
2522f8829a4aSRandall Stewart 	/* no valid addresses found */
25233232788eSRandall Stewart 	if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2524c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
2525f8829a4aSRandall Stewart 	return (NULL);
2526f8829a4aSRandall Stewart }
2527f8829a4aSRandall Stewart 
2528f8829a4aSRandall Stewart static struct sockaddr *
sctp_find_valid_localaddr_ep(struct sctp_tcb * stcb)2529f8829a4aSRandall Stewart sctp_find_valid_localaddr_ep(struct sctp_tcb *stcb)
2530f8829a4aSRandall Stewart {
2531f8829a4aSRandall Stewart 	struct sctp_laddr *laddr;
2532f8829a4aSRandall Stewart 
2533f8829a4aSRandall Stewart 	LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
2534f8829a4aSRandall Stewart 		if (laddr->ifa == NULL) {
2535f8829a4aSRandall Stewart 			continue;
2536f8829a4aSRandall Stewart 		}
2537f8829a4aSRandall Stewart 		/* is the address restricted ? */
2538c54a18d2SRandall Stewart 		if (sctp_is_addr_restricted(stcb, laddr->ifa) &&
2539c54a18d2SRandall Stewart 		    (!sctp_is_addr_pending(stcb, laddr->ifa)))
2540f8829a4aSRandall Stewart 			continue;
2541f8829a4aSRandall Stewart 
2542f8829a4aSRandall Stewart 		/* found a valid local address to use */
254342551e99SRandall Stewart 		return (&laddr->ifa->address.sa);
2544f8829a4aSRandall Stewart 	}
2545f8829a4aSRandall Stewart 	/* no valid addresses found */
2546f8829a4aSRandall Stewart 	return (NULL);
2547f8829a4aSRandall Stewart }
2548f8829a4aSRandall Stewart 
2549f8829a4aSRandall Stewart /*
255018e198d3SRandall Stewart  * builds an ASCONF chunk from queued ASCONF params.
255118e198d3SRandall Stewart  * returns NULL on error (no mbuf, no ASCONF params queued, etc).
2552f8829a4aSRandall Stewart  */
2553f8829a4aSRandall Stewart struct mbuf *
sctp_compose_asconf(struct sctp_tcb * stcb,int * retlen,int addr_locked)25543232788eSRandall Stewart sctp_compose_asconf(struct sctp_tcb *stcb, int *retlen, int addr_locked)
2555f8829a4aSRandall Stewart {
2556f8829a4aSRandall Stewart 	struct mbuf *m_asconf, *m_asconf_chk;
2557f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa;
2558f8829a4aSRandall Stewart 	struct sctp_asconf_chunk *acp;
2559f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
2560f8829a4aSRandall Stewart 	struct sctp_asconf_addr_param *aap;
2561218e463bSMichael Tuexen 	uint32_t p_length, overhead;
2562f8829a4aSRandall Stewart 	uint32_t correlation_id = 1;	/* 0 is reserved... */
2563f8829a4aSRandall Stewart 	caddr_t ptr, lookup_ptr;
2564f8829a4aSRandall Stewart 	uint8_t lookup_used = 0;
2565f8829a4aSRandall Stewart 
2566f8829a4aSRandall Stewart 	/* are there any asconf params to send? */
2567c54a18d2SRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
2568c54a18d2SRandall Stewart 		if (aa->sent == 0)
2569c54a18d2SRandall Stewart 			break;
2570f8829a4aSRandall Stewart 	}
2571c54a18d2SRandall Stewart 	if (aa == NULL)
25721b649582SRandall Stewart 		return (NULL);
2573c54a18d2SRandall Stewart 
2574218e463bSMichael Tuexen 	/* Consider IP header and SCTP common header. */
2575218e463bSMichael Tuexen 	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) {
2576218e463bSMichael Tuexen 		overhead = SCTP_MIN_OVERHEAD;
2577218e463bSMichael Tuexen 	} else {
2578218e463bSMichael Tuexen 		overhead = SCTP_MIN_V4_OVERHEAD;
2579218e463bSMichael Tuexen 	}
2580218e463bSMichael Tuexen 	/* Consider ASONF chunk. */
2581218e463bSMichael Tuexen 	overhead += sizeof(struct sctp_asconf_chunk);
2582218e463bSMichael Tuexen 	/* Consider AUTH chunk. */
2583218e463bSMichael Tuexen 	overhead += sctp_get_auth_chunk_len(stcb->asoc.peer_hmac_id);
2584218e463bSMichael Tuexen 	if (stcb->asoc.smallest_mtu <= overhead) {
2585218e463bSMichael Tuexen 		/* MTU too small. */
2586218e463bSMichael Tuexen 		return (NULL);
2587218e463bSMichael Tuexen 	}
2588f8829a4aSRandall Stewart 	/*
2589f8829a4aSRandall Stewart 	 * get a chunk header mbuf and a cluster for the asconf params since
2590f8829a4aSRandall Stewart 	 * it's simpler to fill in the asconf chunk header lookup address on
2591f8829a4aSRandall Stewart 	 * the fly
2592f8829a4aSRandall Stewart 	 */
2593eb1b1807SGleb Smirnoff 	m_asconf_chk = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_chunk), 0, M_NOWAIT, 1, MT_DATA);
2594f8829a4aSRandall Stewart 	if (m_asconf_chk == NULL) {
2595f8829a4aSRandall Stewart 		/* no mbuf's */
2596ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2597504ee6a0SMichael Tuexen 		    "sctp_compose_asconf: couldn't get chunk mbuf!\n");
2598f8829a4aSRandall Stewart 		return (NULL);
2599f8829a4aSRandall Stewart 	}
2600eb1b1807SGleb Smirnoff 	m_asconf = sctp_get_mbuf_for_msg(MCLBYTES, 0, M_NOWAIT, 1, MT_DATA);
2601f8829a4aSRandall Stewart 	if (m_asconf == NULL) {
2602f8829a4aSRandall Stewart 		/* no mbuf's */
2603ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2604504ee6a0SMichael Tuexen 		    "sctp_compose_asconf: couldn't get mbuf!\n");
2605f8829a4aSRandall Stewart 		sctp_m_freem(m_asconf_chk);
2606f8829a4aSRandall Stewart 		return (NULL);
2607f8829a4aSRandall Stewart 	}
2608139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_asconf_chk) = sizeof(struct sctp_asconf_chunk);
2609139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_asconf) = 0;
2610f8829a4aSRandall Stewart 	acp = mtod(m_asconf_chk, struct sctp_asconf_chunk *);
26115ba7f91fSMichael Tuexen 	memset(acp, 0, sizeof(struct sctp_asconf_chunk));
2612f8829a4aSRandall Stewart 	/* save pointers to lookup address and asconf params */
2613f8829a4aSRandall Stewart 	lookup_ptr = (caddr_t)(acp + 1);	/* after the header */
2614f8829a4aSRandall Stewart 	ptr = mtod(m_asconf, caddr_t);	/* beginning of cluster */
2615f8829a4aSRandall Stewart 
2616f8829a4aSRandall Stewart 	/* fill in chunk header info */
2617f8829a4aSRandall Stewart 	acp->ch.chunk_type = SCTP_ASCONF;
2618f8829a4aSRandall Stewart 	acp->ch.chunk_flags = 0;
2619f8829a4aSRandall Stewart 	acp->serial_number = htonl(stcb->asoc.asconf_seq_out);
2620c54a18d2SRandall Stewart 	stcb->asoc.asconf_seq_out++;
2621f8829a4aSRandall Stewart 
2622f8829a4aSRandall Stewart 	/* add parameters... up to smallest MTU allowed */
2623f8829a4aSRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
2624c54a18d2SRandall Stewart 		if (aa->sent)
2625c54a18d2SRandall Stewart 			continue;
2626f8829a4aSRandall Stewart 		/* get the parameter length */
2627f8829a4aSRandall Stewart 		p_length = SCTP_SIZE32(aa->ap.aph.ph.param_length);
2628f8829a4aSRandall Stewart 		/* will it fit in current chunk? */
2629218e463bSMichael Tuexen 		if ((SCTP_BUF_LEN(m_asconf) + p_length > stcb->asoc.smallest_mtu - overhead) ||
2630a9d94d29SMichael Tuexen 		    (SCTP_BUF_LEN(m_asconf) + p_length > MCLBYTES)) {
2631f8829a4aSRandall Stewart 			/* won't fit, so we're done with this chunk */
2632f8829a4aSRandall Stewart 			break;
2633f8829a4aSRandall Stewart 		}
2634f8829a4aSRandall Stewart 		/* assign (and store) a correlation id */
2635f8829a4aSRandall Stewart 		aa->ap.aph.correlation_id = correlation_id++;
2636f8829a4aSRandall Stewart 
2637f8829a4aSRandall Stewart 		/*
2638f8829a4aSRandall Stewart 		 * fill in address if we're doing a delete this is a simple
2639f8829a4aSRandall Stewart 		 * way for us to fill in the correlation address, which
2640f8829a4aSRandall Stewart 		 * should only be used by the peer if we're deleting our
2641f8829a4aSRandall Stewart 		 * source address and adding a new address (e.g. renumbering
2642f8829a4aSRandall Stewart 		 * case)
2643f8829a4aSRandall Stewart 		 */
2644f8829a4aSRandall Stewart 		if (lookup_used == 0 &&
2645830d754dSRandall Stewart 		    (aa->special_del == 0) &&
2646f8829a4aSRandall Stewart 		    aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS) {
2647f8829a4aSRandall Stewart 			struct sctp_ipv6addr_param *lookup;
2648f8829a4aSRandall Stewart 			uint16_t p_size, addr_size;
2649f8829a4aSRandall Stewart 
2650f8829a4aSRandall Stewart 			lookup = (struct sctp_ipv6addr_param *)lookup_ptr;
2651f8829a4aSRandall Stewart 			lookup->ph.param_type =
2652f8829a4aSRandall Stewart 			    htons(aa->ap.addrp.ph.param_type);
2653f8829a4aSRandall Stewart 			if (aa->ap.addrp.ph.param_type == SCTP_IPV6_ADDRESS) {
2654f8829a4aSRandall Stewart 				/* copy IPv6 address */
2655f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv6addr_param);
2656f8829a4aSRandall Stewart 				addr_size = sizeof(struct in6_addr);
2657f8829a4aSRandall Stewart 			} else {
2658f8829a4aSRandall Stewart 				/* copy IPv4 address */
2659f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv4addr_param);
2660f8829a4aSRandall Stewart 				addr_size = sizeof(struct in_addr);
2661f8829a4aSRandall Stewart 			}
2662f8829a4aSRandall Stewart 			lookup->ph.param_length = htons(SCTP_SIZE32(p_size));
2663f8829a4aSRandall Stewart 			memcpy(lookup->addr, &aa->ap.addrp.addr, addr_size);
2664139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_asconf_chk) += SCTP_SIZE32(p_size);
2665f8829a4aSRandall Stewart 			lookup_used = 1;
2666f8829a4aSRandall Stewart 		}
2667f8829a4aSRandall Stewart 		/* copy into current space */
2668f8829a4aSRandall Stewart 		memcpy(ptr, &aa->ap, p_length);
2669f8829a4aSRandall Stewart 
2670f8829a4aSRandall Stewart 		/* network elements and update lengths */
2671f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)ptr;
2672f8829a4aSRandall Stewart 		aap = (struct sctp_asconf_addr_param *)ptr;
2673f8829a4aSRandall Stewart 		/* correlation_id is transparent to peer, no htonl needed */
2674f8829a4aSRandall Stewart 		aph->ph.param_type = htons(aph->ph.param_type);
2675f8829a4aSRandall Stewart 		aph->ph.param_length = htons(aph->ph.param_length);
2676f8829a4aSRandall Stewart 		aap->addrp.ph.param_type = htons(aap->addrp.ph.param_type);
2677f8829a4aSRandall Stewart 		aap->addrp.ph.param_length = htons(aap->addrp.ph.param_length);
2678f8829a4aSRandall Stewart 
2679139bc87fSRandall Stewart 		SCTP_BUF_LEN(m_asconf) += SCTP_SIZE32(p_length);
2680f8829a4aSRandall Stewart 		ptr += SCTP_SIZE32(p_length);
2681f8829a4aSRandall Stewart 
2682f8829a4aSRandall Stewart 		/*
2683f8829a4aSRandall Stewart 		 * these params are removed off the pending list upon
2684f8829a4aSRandall Stewart 		 * getting an ASCONF-ACK back from the peer, just set flag
2685f8829a4aSRandall Stewart 		 */
2686f8829a4aSRandall Stewart 		aa->sent = 1;
2687f8829a4aSRandall Stewart 	}
2688f8829a4aSRandall Stewart 	/* check to see if the lookup addr has been populated yet */
2689f8829a4aSRandall Stewart 	if (lookup_used == 0) {
2690f8829a4aSRandall Stewart 		/* NOTE: if the address param is optional, can skip this... */
2691f8829a4aSRandall Stewart 		/* add any valid (existing) address... */
2692f8829a4aSRandall Stewart 		struct sctp_ipv6addr_param *lookup;
2693f8829a4aSRandall Stewart 		uint16_t p_size, addr_size;
2694f8829a4aSRandall Stewart 		struct sockaddr *found_addr;
2695f8829a4aSRandall Stewart 		caddr_t addr_ptr;
2696f8829a4aSRandall Stewart 
2697f8829a4aSRandall Stewart 		if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL)
26983232788eSRandall Stewart 			found_addr = sctp_find_valid_localaddr(stcb,
26993232788eSRandall Stewart 			    addr_locked);
2700f8829a4aSRandall Stewart 		else
2701f8829a4aSRandall Stewart 			found_addr = sctp_find_valid_localaddr_ep(stcb);
2702f8829a4aSRandall Stewart 
2703f8829a4aSRandall Stewart 		lookup = (struct sctp_ipv6addr_param *)lookup_ptr;
2704f8829a4aSRandall Stewart 		if (found_addr != NULL) {
2705e6194c2eSMichael Tuexen 			switch (found_addr->sa_family) {
2706e6194c2eSMichael Tuexen #ifdef INET6
2707e6194c2eSMichael Tuexen 			case AF_INET6:
2708f8829a4aSRandall Stewart 				/* copy IPv6 address */
2709f8829a4aSRandall Stewart 				lookup->ph.param_type =
2710f8829a4aSRandall Stewart 				    htons(SCTP_IPV6_ADDRESS);
2711f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv6addr_param);
2712f8829a4aSRandall Stewart 				addr_size = sizeof(struct in6_addr);
2713f8829a4aSRandall Stewart 				addr_ptr = (caddr_t)&((struct sockaddr_in6 *)
2714f8829a4aSRandall Stewart 				    found_addr)->sin6_addr;
2715e6194c2eSMichael Tuexen 				break;
2716e6194c2eSMichael Tuexen #endif
2717e6194c2eSMichael Tuexen #ifdef INET
2718e6194c2eSMichael Tuexen 			case AF_INET:
2719f8829a4aSRandall Stewart 				/* copy IPv4 address */
2720f8829a4aSRandall Stewart 				lookup->ph.param_type =
2721f8829a4aSRandall Stewart 				    htons(SCTP_IPV4_ADDRESS);
2722f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv4addr_param);
2723f8829a4aSRandall Stewart 				addr_size = sizeof(struct in_addr);
2724f8829a4aSRandall Stewart 				addr_ptr = (caddr_t)&((struct sockaddr_in *)
2725f8829a4aSRandall Stewart 				    found_addr)->sin_addr;
2726e6194c2eSMichael Tuexen 				break;
2727e6194c2eSMichael Tuexen #endif
2728e6194c2eSMichael Tuexen 			default:
2729504ee6a0SMichael Tuexen 				SCTPDBG(SCTP_DEBUG_ASCONF1,
2730504ee6a0SMichael Tuexen 				    "sctp_compose_asconf: no usable lookup addr (family = %d)!\n",
2731504ee6a0SMichael Tuexen 				    found_addr->sa_family);
2732504ee6a0SMichael Tuexen 				sctp_m_freem(m_asconf_chk);
2733504ee6a0SMichael Tuexen 				sctp_m_freem(m_asconf);
2734504ee6a0SMichael Tuexen 				return (NULL);
2735f8829a4aSRandall Stewart 			}
2736f8829a4aSRandall Stewart 			lookup->ph.param_length = htons(SCTP_SIZE32(p_size));
2737f8829a4aSRandall Stewart 			memcpy(lookup->addr, addr_ptr, addr_size);
2738139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_asconf_chk) += SCTP_SIZE32(p_size);
2739f8829a4aSRandall Stewart 		} else {
2740f8829a4aSRandall Stewart 			/* uh oh... don't have any address?? */
2741ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
2742504ee6a0SMichael Tuexen 			    "sctp_compose_asconf: no lookup addr!\n");
2743504ee6a0SMichael Tuexen 			sctp_m_freem(m_asconf_chk);
2744504ee6a0SMichael Tuexen 			sctp_m_freem(m_asconf);
2745504ee6a0SMichael Tuexen 			return (NULL);
2746f8829a4aSRandall Stewart 		}
2747f8829a4aSRandall Stewart 	}
2748f8829a4aSRandall Stewart 	/* chain it all together */
2749139bc87fSRandall Stewart 	SCTP_BUF_NEXT(m_asconf_chk) = m_asconf;
27503c503c28SRandall Stewart 	*retlen = SCTP_BUF_LEN(m_asconf_chk) + SCTP_BUF_LEN(m_asconf);
2751c9eb4473SMichael Tuexen 	acp->ch.chunk_length = htons(*retlen);
2752f8829a4aSRandall Stewart 
2753f8829a4aSRandall Stewart 	return (m_asconf_chk);
2754f8829a4aSRandall Stewart }
2755f8829a4aSRandall Stewart 
2756f8829a4aSRandall Stewart /*
2757f8829a4aSRandall Stewart  * section to handle address changes before an association is up eg. changes
2758f8829a4aSRandall Stewart  * during INIT/INIT-ACK/COOKIE-ECHO handshake
2759f8829a4aSRandall Stewart  */
2760f8829a4aSRandall Stewart 
2761f8829a4aSRandall Stewart /*
2762f8829a4aSRandall Stewart  * processes the (local) addresses in the INIT-ACK chunk
2763f8829a4aSRandall Stewart  */
2764f8829a4aSRandall Stewart static void
sctp_process_initack_addresses(struct sctp_tcb * stcb,struct mbuf * m,unsigned int offset,unsigned int length)2765f8829a4aSRandall Stewart sctp_process_initack_addresses(struct sctp_tcb *stcb, struct mbuf *m,
2766f8829a4aSRandall Stewart     unsigned int offset, unsigned int length)
2767f8829a4aSRandall Stewart {
2768f8829a4aSRandall Stewart 	struct sctp_paramhdr tmp_param, *ph;
2769f8829a4aSRandall Stewart 	uint16_t plen, ptype;
277042551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
277123602b60SMichael Tuexen 	union sctp_sockstore store;
2772e6194c2eSMichael Tuexen #ifdef INET6
27735e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr6_store;
2774e6194c2eSMichael Tuexen #endif
2775e6194c2eSMichael Tuexen #ifdef INET
27765e20b91dSMichael Tuexen 	struct sctp_ipv4addr_param addr4_store;
2777e6194c2eSMichael Tuexen #endif
2778f8829a4aSRandall Stewart 
2779ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF2, "processing init-ack addresses\n");
2780ad81507eSRandall Stewart 	if (stcb == NULL)	/* Un-needed check for SA */
2781ad81507eSRandall Stewart 		return;
2782f8829a4aSRandall Stewart 
2783f8829a4aSRandall Stewart 	/* convert to upper bound */
2784f8829a4aSRandall Stewart 	length += offset;
2785f8829a4aSRandall Stewart 
2786f8829a4aSRandall Stewart 	if ((offset + sizeof(struct sctp_paramhdr)) > length) {
2787f8829a4aSRandall Stewart 		return;
2788f8829a4aSRandall Stewart 	}
2789f8829a4aSRandall Stewart 	/* go through the addresses in the init-ack */
2790e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)
2791e6194c2eSMichael Tuexen 	    sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr),
2792e6194c2eSMichael Tuexen 	    (uint8_t *)&tmp_param);
2793f8829a4aSRandall Stewart 	while (ph != NULL) {
2794f8829a4aSRandall Stewart 		ptype = ntohs(ph->param_type);
2795f8829a4aSRandall Stewart 		plen = ntohs(ph->param_length);
2796e6194c2eSMichael Tuexen 		switch (ptype) {
2797e6194c2eSMichael Tuexen #ifdef INET6
2798e6194c2eSMichael Tuexen 		case SCTP_IPV6_ADDRESS:
2799e6194c2eSMichael Tuexen 			{
2800f8829a4aSRandall Stewart 				struct sctp_ipv6addr_param *a6p;
2801f8829a4aSRandall Stewart 
2802f8829a4aSRandall Stewart 				/* get the entire IPv6 address param */
2803f8829a4aSRandall Stewart 				a6p = (struct sctp_ipv6addr_param *)
2804f8829a4aSRandall Stewart 				    sctp_m_getptr(m, offset,
2805f8829a4aSRandall Stewart 				    sizeof(struct sctp_ipv6addr_param),
28065e20b91dSMichael Tuexen 				    (uint8_t *)&addr6_store);
2807f8829a4aSRandall Stewart 				if (plen != sizeof(struct sctp_ipv6addr_param) ||
2808f8829a4aSRandall Stewart 				    a6p == NULL) {
2809f8829a4aSRandall Stewart 					return;
2810f8829a4aSRandall Stewart 				}
281123602b60SMichael Tuexen 				memset(&store, 0, sizeof(union sctp_sockstore));
281223602b60SMichael Tuexen 				store.sin6.sin6_family = AF_INET6;
281323602b60SMichael Tuexen 				store.sin6.sin6_len = sizeof(struct sockaddr_in6);
281423602b60SMichael Tuexen 				store.sin6.sin6_port = stcb->rport;
281523602b60SMichael Tuexen 				memcpy(&store.sin6.sin6_addr, a6p->addr, sizeof(struct in6_addr));
2816e6194c2eSMichael Tuexen 				break;
2817e6194c2eSMichael Tuexen 			}
2818e6194c2eSMichael Tuexen #endif
2819e6194c2eSMichael Tuexen #ifdef INET
2820e6194c2eSMichael Tuexen 		case SCTP_IPV4_ADDRESS:
2821e6194c2eSMichael Tuexen 			{
2822f8829a4aSRandall Stewart 				struct sctp_ipv4addr_param *a4p;
2823f8829a4aSRandall Stewart 
2824f8829a4aSRandall Stewart 				/* get the entire IPv4 address param */
282542551e99SRandall Stewart 				a4p = (struct sctp_ipv4addr_param *)sctp_m_getptr(m, offset,
282642551e99SRandall Stewart 				    sizeof(struct sctp_ipv4addr_param),
28275e20b91dSMichael Tuexen 				    (uint8_t *)&addr4_store);
2828f8829a4aSRandall Stewart 				if (plen != sizeof(struct sctp_ipv4addr_param) ||
2829f8829a4aSRandall Stewart 				    a4p == NULL) {
2830f8829a4aSRandall Stewart 					return;
2831f8829a4aSRandall Stewart 				}
283223602b60SMichael Tuexen 				memset(&store, 0, sizeof(union sctp_sockstore));
283323602b60SMichael Tuexen 				store.sin.sin_family = AF_INET;
283423602b60SMichael Tuexen 				store.sin.sin_len = sizeof(struct sockaddr_in);
283523602b60SMichael Tuexen 				store.sin.sin_port = stcb->rport;
283623602b60SMichael Tuexen 				store.sin.sin_addr.s_addr = a4p->addr;
28371d663b46SMichael Tuexen 				break;
2838e6194c2eSMichael Tuexen 			}
2839e6194c2eSMichael Tuexen #endif
2840e6194c2eSMichael Tuexen 		default:
2841f8829a4aSRandall Stewart 			goto next_addr;
2842f8829a4aSRandall Stewart 		}
2843f8829a4aSRandall Stewart 
2844f8829a4aSRandall Stewart 		/* see if this address really (still) exists */
2845448e8596SMichael Tuexen 		sctp_ifa = sctp_find_ifa_by_addr(&store.sa, stcb->asoc.vrf_id,
28463232788eSRandall Stewart 		    SCTP_ADDR_NOT_LOCKED);
284742551e99SRandall Stewart 		if (sctp_ifa == NULL) {
2848f8829a4aSRandall Stewart 			/* address doesn't exist anymore */
2849f8829a4aSRandall Stewart 			int status;
2850f8829a4aSRandall Stewart 
2851f8829a4aSRandall Stewart 			/* are ASCONFs allowed ? */
2852f8829a4aSRandall Stewart 			if ((sctp_is_feature_on(stcb->sctp_ep,
2853f8829a4aSRandall Stewart 			    SCTP_PCB_FLAGS_DO_ASCONF)) &&
2854c79bec9cSMichael Tuexen 			    stcb->asoc.asconf_supported) {
2855f8829a4aSRandall Stewart 				/* queue an ASCONF DEL_IP_ADDRESS */
285623602b60SMichael Tuexen 				status = sctp_asconf_queue_sa_delete(stcb, &store.sa);
2857f8829a4aSRandall Stewart 				/*
28581b649582SRandall Stewart 				 * if queued ok, and in correct state, send
28591b649582SRandall Stewart 				 * out the ASCONF.
2860f8829a4aSRandall Stewart 				 */
2861f8829a4aSRandall Stewart 				if (status == 0 &&
2862839d21d6SMichael Tuexen 				    SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) {
28631b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
2864f8829a4aSRandall Stewart 					sctp_timer_start(SCTP_TIMER_TYPE_ASCONF,
2865f8829a4aSRandall Stewart 					    stcb->sctp_ep, stcb,
2866f8829a4aSRandall Stewart 					    stcb->asoc.primary_destination);
28671b649582SRandall Stewart #else
2868ca85e948SMichael Tuexen 					sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
28691b649582SRandall Stewart #endif
2870f8829a4aSRandall Stewart 				}
2871f8829a4aSRandall Stewart 			}
2872f8829a4aSRandall Stewart 		}
28730053ed28SMichael Tuexen 
2874f8829a4aSRandall Stewart next_addr:
2875f8829a4aSRandall Stewart 		/*
2876f8829a4aSRandall Stewart 		 * Sanity check:  Make sure the length isn't 0, otherwise
2877f8829a4aSRandall Stewart 		 * we'll be stuck in this loop for a long time...
2878f8829a4aSRandall Stewart 		 */
2879f8829a4aSRandall Stewart 		if (SCTP_SIZE32(plen) == 0) {
2880ad81507eSRandall Stewart 			SCTP_PRINTF("process_initack_addrs: bad len (%d) type=%xh\n",
2881f8829a4aSRandall Stewart 			    plen, ptype);
2882f8829a4aSRandall Stewart 			return;
2883f8829a4aSRandall Stewart 		}
2884f8829a4aSRandall Stewart 		/* get next parameter */
2885f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(plen);
2886f8829a4aSRandall Stewart 		if ((offset + sizeof(struct sctp_paramhdr)) > length)
2887f8829a4aSRandall Stewart 			return;
2888f8829a4aSRandall Stewart 		ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset,
2889f8829a4aSRandall Stewart 		    sizeof(struct sctp_paramhdr), (uint8_t *)&tmp_param);
2890f8829a4aSRandall Stewart 	}			/* while */
2891f8829a4aSRandall Stewart }
2892f8829a4aSRandall Stewart 
2893f8829a4aSRandall Stewart /* FIX ME: need to verify return result for v6 address type if v6 disabled */
2894f8829a4aSRandall Stewart /*
2895f8829a4aSRandall Stewart  * checks to see if a specific address is in the initack address list returns
2896f8829a4aSRandall Stewart  * 1 if found, 0 if not
2897f8829a4aSRandall Stewart  */
2898f8829a4aSRandall Stewart static uint32_t
sctp_addr_in_initack(struct mbuf * m,uint32_t offset,uint32_t length,struct sockaddr * sa)2899b0471b4bSMichael Tuexen sctp_addr_in_initack(struct mbuf *m, uint32_t offset, uint32_t length, struct sockaddr *sa)
2900b0471b4bSMichael Tuexen {
2901f8829a4aSRandall Stewart 	struct sctp_paramhdr tmp_param, *ph;
2902f8829a4aSRandall Stewart 	uint16_t plen, ptype;
2903e6194c2eSMichael Tuexen #ifdef INET
2904f8829a4aSRandall Stewart 	struct sockaddr_in *sin;
2905f8829a4aSRandall Stewart 	struct sctp_ipv4addr_param *a4p;
29065e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr4_store;
2907e6194c2eSMichael Tuexen #endif
2908f8829a4aSRandall Stewart #ifdef INET6
290942551e99SRandall Stewart 	struct sockaddr_in6 *sin6;
2910f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *a6p;
29115e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr6_store;
291242551e99SRandall Stewart 	struct sockaddr_in6 sin6_tmp;
2913e6194c2eSMichael Tuexen #endif
2914f8829a4aSRandall Stewart 
2915e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
2916e6194c2eSMichael Tuexen #ifdef INET
2917e6194c2eSMichael Tuexen 	case AF_INET:
2918e6194c2eSMichael Tuexen 		break;
2919e6194c2eSMichael Tuexen #endif
2920f8829a4aSRandall Stewart #ifdef INET6
2921e6194c2eSMichael Tuexen 	case AF_INET6:
2922e6194c2eSMichael Tuexen 		break;
2923e6194c2eSMichael Tuexen #endif
2924e6194c2eSMichael Tuexen 	default:
2925f8829a4aSRandall Stewart 		return (0);
2926e6194c2eSMichael Tuexen 	}
2927f8829a4aSRandall Stewart 
2928ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF2, "find_initack_addr: starting search for ");
2929ad81507eSRandall Stewart 	SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, sa);
2930f8829a4aSRandall Stewart 	/* convert to upper bound */
2931f8829a4aSRandall Stewart 	length += offset;
2932f8829a4aSRandall Stewart 
2933f8829a4aSRandall Stewart 	if ((offset + sizeof(struct sctp_paramhdr)) > length) {
2934ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2935ad81507eSRandall Stewart 		    "find_initack_addr: invalid offset?\n");
2936f8829a4aSRandall Stewart 		return (0);
2937f8829a4aSRandall Stewart 	}
2938f8829a4aSRandall Stewart 	/* go through the addresses in the init-ack */
2939f8829a4aSRandall Stewart 	ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset,
2940f8829a4aSRandall Stewart 	    sizeof(struct sctp_paramhdr), (uint8_t *)&tmp_param);
2941f8829a4aSRandall Stewart 	while (ph != NULL) {
2942f8829a4aSRandall Stewart 		ptype = ntohs(ph->param_type);
2943f8829a4aSRandall Stewart 		plen = ntohs(ph->param_length);
2944e6194c2eSMichael Tuexen 		switch (ptype) {
2945f8829a4aSRandall Stewart #ifdef INET6
2946e6194c2eSMichael Tuexen 		case SCTP_IPV6_ADDRESS:
2947e6194c2eSMichael Tuexen 			if (sa->sa_family == AF_INET6) {
2948e6194c2eSMichael Tuexen 				/* get the entire IPv6 address param */
2949e6194c2eSMichael Tuexen 				if (plen != sizeof(struct sctp_ipv6addr_param)) {
2950e6194c2eSMichael Tuexen 					break;
2951e6194c2eSMichael Tuexen 				}
2952f8829a4aSRandall Stewart 				/* get the entire IPv6 address param */
2953f8829a4aSRandall Stewart 				a6p = (struct sctp_ipv6addr_param *)
2954f8829a4aSRandall Stewart 				    sctp_m_getptr(m, offset,
2955f8829a4aSRandall Stewart 				    sizeof(struct sctp_ipv6addr_param),
29565e20b91dSMichael Tuexen 				    (uint8_t *)&addr6_store);
2957e6194c2eSMichael Tuexen 				if (a6p == NULL) {
2958f8829a4aSRandall Stewart 					return (0);
2959f8829a4aSRandall Stewart 				}
2960f8829a4aSRandall Stewart 				sin6 = (struct sockaddr_in6 *)sa;
2961f8829a4aSRandall Stewart 				if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) {
2962f8829a4aSRandall Stewart 					/* create a copy and clear scope */
2963f8829a4aSRandall Stewart 					memcpy(&sin6_tmp, sin6,
2964f8829a4aSRandall Stewart 					    sizeof(struct sockaddr_in6));
2965f8829a4aSRandall Stewart 					sin6 = &sin6_tmp;
2966f8829a4aSRandall Stewart 					in6_clearscope(&sin6->sin6_addr);
2967f8829a4aSRandall Stewart 				}
2968f8829a4aSRandall Stewart 				if (memcmp(&sin6->sin6_addr, a6p->addr,
2969f8829a4aSRandall Stewart 				    sizeof(struct in6_addr)) == 0) {
2970f8829a4aSRandall Stewart 					/* found it */
2971f8829a4aSRandall Stewart 					return (1);
2972f8829a4aSRandall Stewart 				}
2973e6194c2eSMichael Tuexen 			}
2974e6194c2eSMichael Tuexen 			break;
2975f8829a4aSRandall Stewart #endif				/* INET6 */
2976e6194c2eSMichael Tuexen #ifdef INET
2977e6194c2eSMichael Tuexen 		case SCTP_IPV4_ADDRESS:
2978e6194c2eSMichael Tuexen 			if (sa->sa_family == AF_INET) {
2979e6194c2eSMichael Tuexen 				if (plen != sizeof(struct sctp_ipv4addr_param)) {
2980e6194c2eSMichael Tuexen 					break;
2981e6194c2eSMichael Tuexen 				}
2982f8829a4aSRandall Stewart 				/* get the entire IPv4 address param */
2983e6194c2eSMichael Tuexen 				a4p = (struct sctp_ipv4addr_param *)
2984e6194c2eSMichael Tuexen 				    sctp_m_getptr(m, offset,
2985e6194c2eSMichael Tuexen 				    sizeof(struct sctp_ipv4addr_param),
29865e20b91dSMichael Tuexen 				    (uint8_t *)&addr4_store);
2987e6194c2eSMichael Tuexen 				if (a4p == NULL) {
2988f8829a4aSRandall Stewart 					return (0);
2989f8829a4aSRandall Stewart 				}
2990f8829a4aSRandall Stewart 				sin = (struct sockaddr_in *)sa;
2991f8829a4aSRandall Stewart 				if (sin->sin_addr.s_addr == a4p->addr) {
2992f8829a4aSRandall Stewart 					/* found it */
2993f8829a4aSRandall Stewart 					return (1);
2994f8829a4aSRandall Stewart 				}
2995f8829a4aSRandall Stewart 			}
2996e6194c2eSMichael Tuexen 			break;
2997e6194c2eSMichael Tuexen #endif
2998e6194c2eSMichael Tuexen 		default:
2999e6194c2eSMichael Tuexen 			break;
3000e6194c2eSMichael Tuexen 		}
3001f8829a4aSRandall Stewart 		/* get next parameter */
3002f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(plen);
3003e6194c2eSMichael Tuexen 		if (offset + sizeof(struct sctp_paramhdr) > length) {
3004f8829a4aSRandall Stewart 			return (0);
3005e6194c2eSMichael Tuexen 		}
3006f8829a4aSRandall Stewart 		ph = (struct sctp_paramhdr *)
3007f8829a4aSRandall Stewart 		    sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr),
3008f8829a4aSRandall Stewart 		    (uint8_t *)&tmp_param);
3009f8829a4aSRandall Stewart 	}			/* while */
3010f8829a4aSRandall Stewart 	/* not found! */
3011f8829a4aSRandall Stewart 	return (0);
3012f8829a4aSRandall Stewart }
3013f8829a4aSRandall Stewart 
3014f8829a4aSRandall Stewart /*
3015f8829a4aSRandall Stewart  * makes sure that the current endpoint local addr list is consistent with
3016f8829a4aSRandall Stewart  * the new association (eg. subset bound, asconf allowed) adds addresses as
3017f8829a4aSRandall Stewart  * necessary
3018f8829a4aSRandall Stewart  */
3019f8829a4aSRandall Stewart static void
sctp_check_address_list_ep(struct sctp_tcb * stcb,struct mbuf * m,int offset,int length,struct sockaddr * init_addr)3020f8829a4aSRandall Stewart sctp_check_address_list_ep(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3021f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr)
3022f8829a4aSRandall Stewart {
3023f8829a4aSRandall Stewart 	struct sctp_laddr *laddr;
3024f8829a4aSRandall Stewart 
3025f8829a4aSRandall Stewart 	/* go through the endpoint list */
3026f8829a4aSRandall Stewart 	LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
3027f8829a4aSRandall Stewart 		/* be paranoid and validate the laddr */
3028f8829a4aSRandall Stewart 		if (laddr->ifa == NULL) {
3029ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
3030ad81507eSRandall Stewart 			    "check_addr_list_ep: laddr->ifa is NULL");
3031f8829a4aSRandall Stewart 			continue;
3032f8829a4aSRandall Stewart 		}
3033f8829a4aSRandall Stewart 		/* do i have it implicitly? */
303442551e99SRandall Stewart 		if (sctp_cmpaddr(&laddr->ifa->address.sa, init_addr)) {
3035f8829a4aSRandall Stewart 			continue;
3036f8829a4aSRandall Stewart 		}
3037f8829a4aSRandall Stewart 		/* check to see if in the init-ack */
30387215cc1bSMichael Tuexen 		if (!sctp_addr_in_initack(m, offset, length, &laddr->ifa->address.sa)) {
3039f8829a4aSRandall Stewart 			/* try to add it */
3040f8829a4aSRandall Stewart 			sctp_addr_mgmt_assoc(stcb->sctp_ep, stcb, laddr->ifa,
30413232788eSRandall Stewart 			    SCTP_ADD_IP_ADDRESS, SCTP_ADDR_NOT_LOCKED);
3042f8829a4aSRandall Stewart 		}
3043f8829a4aSRandall Stewart 	}
3044f8829a4aSRandall Stewart }
3045f8829a4aSRandall Stewart 
3046f8829a4aSRandall Stewart /*
3047f8829a4aSRandall Stewart  * makes sure that the current kernel address list is consistent with the new
3048f8829a4aSRandall Stewart  * association (with all addrs bound) adds addresses as necessary
3049f8829a4aSRandall Stewart  */
3050f8829a4aSRandall Stewart static void
sctp_check_address_list_all(struct sctp_tcb * stcb,struct mbuf * m,int offset,int length,struct sockaddr * init_addr,uint16_t local_scope,uint16_t site_scope,uint16_t ipv4_scope,uint16_t loopback_scope)3051f8829a4aSRandall Stewart sctp_check_address_list_all(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3052f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr,
3053f8829a4aSRandall Stewart     uint16_t local_scope, uint16_t site_scope,
3054f8829a4aSRandall Stewart     uint16_t ipv4_scope, uint16_t loopback_scope)
3055f8829a4aSRandall Stewart {
305642551e99SRandall Stewart 	struct sctp_vrf *vrf = NULL;
305742551e99SRandall Stewart 	struct sctp_ifn *sctp_ifn;
305842551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
305942551e99SRandall Stewart 	uint32_t vrf_id;
30607215cc1bSMichael Tuexen #ifdef INET
30617215cc1bSMichael Tuexen 	struct sockaddr_in *sin;
30627215cc1bSMichael Tuexen #endif
30637215cc1bSMichael Tuexen #ifdef INET6
30647215cc1bSMichael Tuexen 	struct sockaddr_in6 *sin6;
30657215cc1bSMichael Tuexen #endif
30667215cc1bSMichael Tuexen 
3067bff64a4dSRandall Stewart 	if (stcb) {
3068bff64a4dSRandall Stewart 		vrf_id = stcb->asoc.vrf_id;
3069bff64a4dSRandall Stewart 	} else {
3070ad81507eSRandall Stewart 		return;
3071bff64a4dSRandall Stewart 	}
3072c99efcf6SRandall Stewart 	SCTP_IPI_ADDR_RLOCK();
307342551e99SRandall Stewart 	vrf = sctp_find_vrf(vrf_id);
307442551e99SRandall Stewart 	if (vrf == NULL) {
3075c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
307642551e99SRandall Stewart 		return;
307742551e99SRandall Stewart 	}
3078f8829a4aSRandall Stewart 	/* go through all our known interfaces */
307942551e99SRandall Stewart 	LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
308042551e99SRandall Stewart 		if (loopback_scope == 0 && SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
3081f8829a4aSRandall Stewart 			/* skip loopback interface */
3082f8829a4aSRandall Stewart 			continue;
3083f8829a4aSRandall Stewart 		}
3084f8829a4aSRandall Stewart 		/* go through each interface address */
308542551e99SRandall Stewart 		LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
3086f8829a4aSRandall Stewart 			/* do i have it implicitly? */
308742551e99SRandall Stewart 			if (sctp_cmpaddr(&sctp_ifa->address.sa, init_addr)) {
3088f8829a4aSRandall Stewart 				continue;
3089f8829a4aSRandall Stewart 			}
30907215cc1bSMichael Tuexen 			switch (sctp_ifa->address.sa.sa_family) {
30917215cc1bSMichael Tuexen #ifdef INET
30927215cc1bSMichael Tuexen 			case AF_INET:
309324aaac8dSMichael Tuexen 				sin = &sctp_ifa->address.sin;
30946ba22f19SMichael Tuexen 				if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
30956ba22f19SMichael Tuexen 				    &sin->sin_addr) != 0) {
30966ba22f19SMichael Tuexen 					continue;
30976ba22f19SMichael Tuexen 				}
30987215cc1bSMichael Tuexen 				if ((ipv4_scope == 0) &&
30997215cc1bSMichael Tuexen 				    (IN4_ISPRIVATE_ADDRESS(&sin->sin_addr))) {
31007215cc1bSMichael Tuexen 					/* private address not in scope */
31017215cc1bSMichael Tuexen 					continue;
31027215cc1bSMichael Tuexen 				}
31037215cc1bSMichael Tuexen 				break;
31047215cc1bSMichael Tuexen #endif
31057215cc1bSMichael Tuexen #ifdef INET6
31067215cc1bSMichael Tuexen 			case AF_INET6:
310724aaac8dSMichael Tuexen 				sin6 = &sctp_ifa->address.sin6;
31086ba22f19SMichael Tuexen 				if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
31096ba22f19SMichael Tuexen 				    &sin6->sin6_addr) != 0) {
31106ba22f19SMichael Tuexen 					continue;
31116ba22f19SMichael Tuexen 				}
31127215cc1bSMichael Tuexen 				if ((local_scope == 0) &&
31137215cc1bSMichael Tuexen 				    (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr))) {
31147215cc1bSMichael Tuexen 					continue;
31157215cc1bSMichael Tuexen 				}
31167215cc1bSMichael Tuexen 				if ((site_scope == 0) &&
31177215cc1bSMichael Tuexen 				    (IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr))) {
31187215cc1bSMichael Tuexen 					continue;
31197215cc1bSMichael Tuexen 				}
31207215cc1bSMichael Tuexen 				break;
31217215cc1bSMichael Tuexen #endif
31227215cc1bSMichael Tuexen 			default:
31237215cc1bSMichael Tuexen 				break;
31247215cc1bSMichael Tuexen 			}
3125f8829a4aSRandall Stewart 			/* check to see if in the init-ack */
31267215cc1bSMichael Tuexen 			if (!sctp_addr_in_initack(m, offset, length, &sctp_ifa->address.sa)) {
3127f8829a4aSRandall Stewart 				/* try to add it */
3128f8829a4aSRandall Stewart 				sctp_addr_mgmt_assoc(stcb->sctp_ep, stcb,
31293232788eSRandall Stewart 				    sctp_ifa, SCTP_ADD_IP_ADDRESS,
31303232788eSRandall Stewart 				    SCTP_ADDR_LOCKED);
3131f8829a4aSRandall Stewart 			}
3132f8829a4aSRandall Stewart 		}		/* end foreach ifa */
3133f8829a4aSRandall Stewart 	}			/* end foreach ifn */
3134c99efcf6SRandall Stewart 	SCTP_IPI_ADDR_RUNLOCK();
3135f8829a4aSRandall Stewart }
3136f8829a4aSRandall Stewart 
3137f8829a4aSRandall Stewart /*
3138f8829a4aSRandall Stewart  * validates an init-ack chunk (from a cookie-echo) with current addresses
3139f8829a4aSRandall Stewart  * adds addresses from the init-ack into our local address list, if needed
3140f8829a4aSRandall Stewart  * queues asconf adds/deletes addresses as needed and makes appropriate list
3141f8829a4aSRandall Stewart  * changes for source address selection m, offset: points to the start of the
3142f8829a4aSRandall Stewart  * address list in an init-ack chunk length: total length of the address
3143f8829a4aSRandall Stewart  * params only init_addr: address where my INIT-ACK was sent from
3144f8829a4aSRandall Stewart  */
3145f8829a4aSRandall Stewart void
sctp_check_address_list(struct sctp_tcb * stcb,struct mbuf * m,int offset,int length,struct sockaddr * init_addr,uint16_t local_scope,uint16_t site_scope,uint16_t ipv4_scope,uint16_t loopback_scope)3146f8829a4aSRandall Stewart sctp_check_address_list(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3147f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr,
3148f8829a4aSRandall Stewart     uint16_t local_scope, uint16_t site_scope,
3149f8829a4aSRandall Stewart     uint16_t ipv4_scope, uint16_t loopback_scope)
3150f8829a4aSRandall Stewart {
3151f8829a4aSRandall Stewart 	/* process the local addresses in the initack */
3152f8829a4aSRandall Stewart 	sctp_process_initack_addresses(stcb, m, offset, length);
3153f8829a4aSRandall Stewart 
3154f8829a4aSRandall Stewart 	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
3155f8829a4aSRandall Stewart 		/* bound all case */
3156f8829a4aSRandall Stewart 		sctp_check_address_list_all(stcb, m, offset, length, init_addr,
3157f8829a4aSRandall Stewart 		    local_scope, site_scope, ipv4_scope, loopback_scope);
3158f8829a4aSRandall Stewart 	} else {
3159f8829a4aSRandall Stewart 		/* subset bound case */
3160f8829a4aSRandall Stewart 		if (sctp_is_feature_on(stcb->sctp_ep,
3161f8829a4aSRandall Stewart 		    SCTP_PCB_FLAGS_DO_ASCONF)) {
3162f8829a4aSRandall Stewart 			/* asconf's allowed */
3163f8829a4aSRandall Stewart 			sctp_check_address_list_ep(stcb, m, offset, length,
3164f8829a4aSRandall Stewart 			    init_addr);
3165f8829a4aSRandall Stewart 		}
3166f8829a4aSRandall Stewart 		/* else, no asconfs allowed, so what we sent is what we get */
3167f8829a4aSRandall Stewart 	}
3168f8829a4aSRandall Stewart }
3169f8829a4aSRandall Stewart 
3170f8829a4aSRandall Stewart /*
3171f8829a4aSRandall Stewart  * sctp_bindx() support
3172f8829a4aSRandall Stewart  */
3173f8829a4aSRandall Stewart uint32_t
sctp_addr_mgmt_ep_sa(struct sctp_inpcb * inp,struct sockaddr * sa,uint32_t type,uint32_t vrf_id)31743c503c28SRandall Stewart sctp_addr_mgmt_ep_sa(struct sctp_inpcb *inp, struct sockaddr *sa,
31757a9dbc33SMichael Tuexen     uint32_t type, uint32_t vrf_id)
3176b0471b4bSMichael Tuexen {
317742551e99SRandall Stewart 	struct sctp_ifa *ifa;
31782678fe1eSMichael Tuexen 	struct sctp_laddr *laddr, *nladdr;
3179f8829a4aSRandall Stewart 
318042551e99SRandall Stewart 	if (sa->sa_len == 0) {
3181c4739e2fSRandall Stewart 		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EINVAL);
3182f8829a4aSRandall Stewart 		return (EINVAL);
318342551e99SRandall Stewart 	}
31847a9dbc33SMichael Tuexen 	if (type == SCTP_ADD_IP_ADDRESS) {
318542551e99SRandall Stewart 		/* For an add the address MUST be on the system */
3186851b7298SRandall Stewart 		ifa = sctp_find_ifa_by_addr(sa, vrf_id, SCTP_ADDR_NOT_LOCKED);
318742551e99SRandall Stewart 	} else if (type == SCTP_DEL_IP_ADDRESS) {
318842551e99SRandall Stewart 		/* For a delete we need to find it in the inp */
3189851b7298SRandall Stewart 		ifa = sctp_find_ifa_in_ep(inp, sa, SCTP_ADDR_NOT_LOCKED);
319042551e99SRandall Stewart 	} else {
319142551e99SRandall Stewart 		ifa = NULL;
319242551e99SRandall Stewart 	}
3193f8829a4aSRandall Stewart 	if (ifa != NULL) {
319442551e99SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
319542551e99SRandall Stewart 			sctp_add_local_addr_ep(inp, ifa, type);
319642551e99SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
31973c503c28SRandall Stewart 			if (inp->laddr_count < 2) {
31983c503c28SRandall Stewart 				/* can't delete the last local address */
3199c4739e2fSRandall Stewart 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EINVAL);
32003c503c28SRandall Stewart 				return (EINVAL);
32013c503c28SRandall Stewart 			}
32023c503c28SRandall Stewart 			LIST_FOREACH(laddr, &inp->sctp_addr_list,
32033c503c28SRandall Stewart 			    sctp_nxt_addr) {
320442551e99SRandall Stewart 				if (ifa == laddr->ifa) {
320542551e99SRandall Stewart 					/* Mark in the delete */
320642551e99SRandall Stewart 					laddr->action = type;
320742551e99SRandall Stewart 				}
320842551e99SRandall Stewart 			}
320942551e99SRandall Stewart 		}
32102678fe1eSMichael Tuexen 		if (LIST_EMPTY(&inp->sctp_asoc_list)) {
321187b4fcd3SMichael Tuexen 			/*
321287b4fcd3SMichael Tuexen 			 * There is no need to start the iterator if the inp
321387b4fcd3SMichael Tuexen 			 * has no associations.
321487b4fcd3SMichael Tuexen 			 */
32152678fe1eSMichael Tuexen 			if (type == SCTP_DEL_IP_ADDRESS) {
32162678fe1eSMichael Tuexen 				LIST_FOREACH_SAFE(laddr, &inp->sctp_addr_list, sctp_nxt_addr, nladdr) {
32172678fe1eSMichael Tuexen 					if (laddr->ifa == ifa) {
32182678fe1eSMichael Tuexen 						sctp_del_local_addr_ep(inp, ifa);
32192678fe1eSMichael Tuexen 					}
32202678fe1eSMichael Tuexen 				}
32212678fe1eSMichael Tuexen 			}
32222678fe1eSMichael Tuexen 		} else {
322387b4fcd3SMichael Tuexen 			struct sctp_asconf_iterator *asc;
322487b4fcd3SMichael Tuexen 			struct sctp_laddr *wi;
32252b1c7de4SMichael Tuexen 			int ret;
322687b4fcd3SMichael Tuexen 
322787b4fcd3SMichael Tuexen 			SCTP_MALLOC(asc, struct sctp_asconf_iterator *,
322887b4fcd3SMichael Tuexen 			    sizeof(struct sctp_asconf_iterator),
322987b4fcd3SMichael Tuexen 			    SCTP_M_ASC_IT);
323087b4fcd3SMichael Tuexen 			if (asc == NULL) {
323187b4fcd3SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, ENOMEM);
323287b4fcd3SMichael Tuexen 				return (ENOMEM);
323387b4fcd3SMichael Tuexen 			}
323487b4fcd3SMichael Tuexen 			wi = SCTP_ZONE_GET(SCTP_BASE_INFO(ipi_zone_laddr), struct sctp_laddr);
323587b4fcd3SMichael Tuexen 			if (wi == NULL) {
323687b4fcd3SMichael Tuexen 				SCTP_FREE(asc, SCTP_M_ASC_IT);
323787b4fcd3SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, ENOMEM);
323887b4fcd3SMichael Tuexen 				return (ENOMEM);
323987b4fcd3SMichael Tuexen 			}
324042551e99SRandall Stewart 			LIST_INIT(&asc->list_of_work);
324142551e99SRandall Stewart 			asc->cnt = 1;
324242551e99SRandall Stewart 			SCTP_INCR_LADDR_COUNT();
324342551e99SRandall Stewart 			wi->ifa = ifa;
324442551e99SRandall Stewart 			wi->action = type;
324542551e99SRandall Stewart 			atomic_add_int(&ifa->refcount, 1);
324642551e99SRandall Stewart 			LIST_INSERT_HEAD(&asc->list_of_work, wi, sctp_nxt_addr);
32472b1c7de4SMichael Tuexen 			ret = sctp_initiate_iterator(sctp_asconf_iterator_ep,
32481b649582SRandall Stewart 			    sctp_asconf_iterator_stcb,
32491b649582SRandall Stewart 			    sctp_asconf_iterator_ep_end,
325042551e99SRandall Stewart 			    SCTP_PCB_ANY_FLAGS,
32513c503c28SRandall Stewart 			    SCTP_PCB_ANY_FEATURES,
32521b649582SRandall Stewart 			    SCTP_ASOC_ANY_STATE,
32531b649582SRandall Stewart 			    (void *)asc, 0,
32541b649582SRandall Stewart 			    sctp_asconf_iterator_end, inp, 0);
32552b1c7de4SMichael Tuexen 			if (ret) {
32562b1c7de4SMichael Tuexen 				SCTP_PRINTF("Failed to initiate iterator for addr_mgmt_ep_sa\n");
32572b1c7de4SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EFAULT);
32582b1c7de4SMichael Tuexen 				sctp_asconf_iterator_end(asc, 0);
32592b1c7de4SMichael Tuexen 				return (EFAULT);
32602b1c7de4SMichael Tuexen 			}
326187b4fcd3SMichael Tuexen 		}
326287b4fcd3SMichael Tuexen 		return (0);
3263f8829a4aSRandall Stewart 	} else {
3264f8829a4aSRandall Stewart 		/* invalid address! */
3265c4739e2fSRandall Stewart 		SCTP_LTRACE_ERR_RET(NULL, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EADDRNOTAVAIL);
3266f8829a4aSRandall Stewart 		return (EADDRNOTAVAIL);
3267f8829a4aSRandall Stewart 	}
3268f8829a4aSRandall Stewart }
3269830d754dSRandall Stewart 
3270830d754dSRandall Stewart void
sctp_asconf_send_nat_state_update(struct sctp_tcb * stcb,struct sctp_nets * net)3271504ee6a0SMichael Tuexen sctp_asconf_send_nat_state_update(struct sctp_tcb *stcb, struct sctp_nets *net)
3272830d754dSRandall Stewart {
3273504ee6a0SMichael Tuexen 	struct sctp_asconf_addr *aa_vtag, *aa_add, *aa_del;
3274830d754dSRandall Stewart 	struct sctp_ifa *sctp_ifap;
3275830d754dSRandall Stewart 	struct sctp_asconf_tag_param *vtag;
3276e6194c2eSMichael Tuexen #ifdef INET
3277830d754dSRandall Stewart 	struct sockaddr_in *to;
3278e6194c2eSMichael Tuexen #endif
3279830d754dSRandall Stewart #ifdef INET6
3280830d754dSRandall Stewart 	struct sockaddr_in6 *to6;
3281830d754dSRandall Stewart #endif
3282504ee6a0SMichael Tuexen 
3283830d754dSRandall Stewart 	if (net == NULL) {
3284830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "sctp_asconf_send_nat_state_update: Missing net\n");
3285830d754dSRandall Stewart 		return;
3286830d754dSRandall Stewart 	}
3287830d754dSRandall Stewart 	if (stcb == NULL) {
3288830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "sctp_asconf_send_nat_state_update: Missing stcb\n");
3289830d754dSRandall Stewart 		return;
3290830d754dSRandall Stewart 	}
3291830d754dSRandall Stewart 	/*
3292504ee6a0SMichael Tuexen 	 * Need to have in the ASCONF: - VTAG(my_vtag/peer_vtag) -
3293504ee6a0SMichael Tuexen 	 * ADD(wildcard) - DEL(wildcard) - ADD(Any global addresses)
3294830d754dSRandall Stewart 	 */
3295504ee6a0SMichael Tuexen 	SCTP_MALLOC(aa_vtag, struct sctp_asconf_addr *, sizeof(struct sctp_asconf_addr), SCTP_M_ASC_ADDR);
3296504ee6a0SMichael Tuexen 	SCTP_MALLOC(aa_add, struct sctp_asconf_addr *, sizeof(struct sctp_asconf_addr), SCTP_M_ASC_ADDR);
3297504ee6a0SMichael Tuexen 	SCTP_MALLOC(aa_del, struct sctp_asconf_addr *, sizeof(struct sctp_asconf_addr), SCTP_M_ASC_ADDR);
3298504ee6a0SMichael Tuexen 
3299504ee6a0SMichael Tuexen 	if ((aa_vtag == NULL) || (aa_add == NULL) || (aa_del == NULL)) {
3300504ee6a0SMichael Tuexen 		/* Didn't get memory */
3301504ee6a0SMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1, "sctp_asconf_send_nat_state_update: failed to get memory!\n");
3302504ee6a0SMichael Tuexen out:
3303504ee6a0SMichael Tuexen 		if (aa_vtag != NULL) {
3304504ee6a0SMichael Tuexen 			SCTP_FREE(aa_vtag, SCTP_M_ASC_ADDR);
3305504ee6a0SMichael Tuexen 		}
3306504ee6a0SMichael Tuexen 		if (aa_add != NULL) {
3307504ee6a0SMichael Tuexen 			SCTP_FREE(aa_add, SCTP_M_ASC_ADDR);
3308504ee6a0SMichael Tuexen 		}
3309504ee6a0SMichael Tuexen 		if (aa_del != NULL) {
3310504ee6a0SMichael Tuexen 			SCTP_FREE(aa_del, SCTP_M_ASC_ADDR);
3311504ee6a0SMichael Tuexen 		}
3312830d754dSRandall Stewart 		return;
3313830d754dSRandall Stewart 	}
3314504ee6a0SMichael Tuexen 	memset(aa_vtag, 0, sizeof(struct sctp_asconf_addr));
3315504ee6a0SMichael Tuexen 	aa_vtag->special_del = 0;
3316504ee6a0SMichael Tuexen 	/* Fill in ASCONF address parameter fields. */
3317504ee6a0SMichael Tuexen 	/* Top level elements are "networked" during send. */
3318504ee6a0SMichael Tuexen 	aa_vtag->ifa = NULL;
3319504ee6a0SMichael Tuexen 	aa_vtag->sent = 0;	/* clear sent flag */
3320504ee6a0SMichael Tuexen 	vtag = (struct sctp_asconf_tag_param *)&aa_vtag->ap.aph;
3321830d754dSRandall Stewart 	vtag->aph.ph.param_type = SCTP_NAT_VTAGS;
3322830d754dSRandall Stewart 	vtag->aph.ph.param_length = sizeof(struct sctp_asconf_tag_param);
3323830d754dSRandall Stewart 	vtag->local_vtag = htonl(stcb->asoc.my_vtag);
3324830d754dSRandall Stewart 	vtag->remote_vtag = htonl(stcb->asoc.peer_vtag);
3325830d754dSRandall Stewart 
3326504ee6a0SMichael Tuexen 	memset(aa_add, 0, sizeof(struct sctp_asconf_addr));
3327504ee6a0SMichael Tuexen 	memset(aa_del, 0, sizeof(struct sctp_asconf_addr));
3328e6194c2eSMichael Tuexen 	switch (net->ro._l_addr.sa.sa_family) {
3329e6194c2eSMichael Tuexen #ifdef INET
3330e6194c2eSMichael Tuexen 	case AF_INET:
3331504ee6a0SMichael Tuexen 		aa_add->ap.aph.ph.param_type = SCTP_ADD_IP_ADDRESS;
3332504ee6a0SMichael Tuexen 		aa_add->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addrv4_param);
3333504ee6a0SMichael Tuexen 		aa_add->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
3334504ee6a0SMichael Tuexen 		aa_add->ap.addrp.ph.param_length = sizeof(struct sctp_ipv4addr_param);
3335504ee6a0SMichael Tuexen 		/* No need to fill the address, we are using 0.0.0.0 */
3336595ac4a1SMichael Tuexen 		aa_del->ap.aph.ph.param_type = SCTP_DEL_IP_ADDRESS;
3337504ee6a0SMichael Tuexen 		aa_del->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addrv4_param);
3338504ee6a0SMichael Tuexen 		aa_del->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
3339504ee6a0SMichael Tuexen 		aa_del->ap.addrp.ph.param_length = sizeof(struct sctp_ipv4addr_param);
3340504ee6a0SMichael Tuexen 		/* No need to fill the address, we are using 0.0.0.0 */
3341e6194c2eSMichael Tuexen 		break;
3342e6194c2eSMichael Tuexen #endif
3343830d754dSRandall Stewart #ifdef INET6
3344e6194c2eSMichael Tuexen 	case AF_INET6:
3345504ee6a0SMichael Tuexen 		aa_add->ap.aph.ph.param_type = SCTP_ADD_IP_ADDRESS;
3346504ee6a0SMichael Tuexen 		aa_add->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addr_param);
3347504ee6a0SMichael Tuexen 		aa_add->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
3348504ee6a0SMichael Tuexen 		aa_add->ap.addrp.ph.param_length = sizeof(struct sctp_ipv6addr_param);
3349504ee6a0SMichael Tuexen 		/* No need to fill the address, we are using ::0 */
3350504ee6a0SMichael Tuexen 		aa_del->ap.aph.ph.param_type = SCTP_DEL_IP_ADDRESS;
3351504ee6a0SMichael Tuexen 		aa_del->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addr_param);
3352504ee6a0SMichael Tuexen 		aa_del->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
3353504ee6a0SMichael Tuexen 		aa_del->ap.addrp.ph.param_length = sizeof(struct sctp_ipv6addr_param);
3354504ee6a0SMichael Tuexen 		/* No need to fill the address, we are using ::0 */
3355e6194c2eSMichael Tuexen 		break;
3356e6194c2eSMichael Tuexen #endif
33573ff78fbbSMichael Tuexen 	default:
33583ff78fbbSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1,
3359504ee6a0SMichael Tuexen 		    "sctp_asconf_send_nat_state_update: unknown address family %d\n",
3360504ee6a0SMichael Tuexen 		    net->ro._l_addr.sa.sa_family);
3361504ee6a0SMichael Tuexen 		goto out;
3362830d754dSRandall Stewart 	}
3363504ee6a0SMichael Tuexen 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa_vtag, next);
3364504ee6a0SMichael Tuexen 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa_add, next);
3365504ee6a0SMichael Tuexen 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa_del, next);
3366504ee6a0SMichael Tuexen 
3367830d754dSRandall Stewart 	/* Now we must hunt the addresses and add all global addresses */
3368830d754dSRandall Stewart 	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
3369830d754dSRandall Stewart 		struct sctp_vrf *vrf = NULL;
3370830d754dSRandall Stewart 		struct sctp_ifn *sctp_ifnp;
3371830d754dSRandall Stewart 		uint32_t vrf_id;
3372830d754dSRandall Stewart 
3373830d754dSRandall Stewart 		vrf_id = stcb->sctp_ep->def_vrf_id;
3374830d754dSRandall Stewart 		vrf = sctp_find_vrf(vrf_id);
3375830d754dSRandall Stewart 		if (vrf == NULL) {
3376830d754dSRandall Stewart 			goto skip_rest;
3377830d754dSRandall Stewart 		}
33780053ed28SMichael Tuexen 
3379830d754dSRandall Stewart 		SCTP_IPI_ADDR_RLOCK();
3380830d754dSRandall Stewart 		LIST_FOREACH(sctp_ifnp, &vrf->ifnlist, next_ifn) {
3381830d754dSRandall Stewart 			LIST_FOREACH(sctp_ifap, &sctp_ifnp->ifalist, next_ifa) {
3382e6194c2eSMichael Tuexen 				switch (sctp_ifap->address.sa.sa_family) {
3383e6194c2eSMichael Tuexen #ifdef INET
3384e6194c2eSMichael Tuexen 				case AF_INET:
3385830d754dSRandall Stewart 					to = &sctp_ifap->address.sin;
33866ba22f19SMichael Tuexen 					if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
33876ba22f19SMichael Tuexen 					    &to->sin_addr) != 0) {
33886ba22f19SMichael Tuexen 						continue;
33896ba22f19SMichael Tuexen 					}
3390830d754dSRandall Stewart 					if (IN4_ISPRIVATE_ADDRESS(&to->sin_addr)) {
3391830d754dSRandall Stewart 						continue;
3392830d754dSRandall Stewart 					}
3393830d754dSRandall Stewart 					if (IN4_ISLOOPBACK_ADDRESS(&to->sin_addr)) {
3394830d754dSRandall Stewart 						continue;
3395830d754dSRandall Stewart 					}
3396e6194c2eSMichael Tuexen 					break;
3397e6194c2eSMichael Tuexen #endif
3398830d754dSRandall Stewart #ifdef INET6
3399e6194c2eSMichael Tuexen 				case AF_INET6:
3400830d754dSRandall Stewart 					to6 = &sctp_ifap->address.sin6;
34016ba22f19SMichael Tuexen 					if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
34026ba22f19SMichael Tuexen 					    &to6->sin6_addr) != 0) {
34036ba22f19SMichael Tuexen 						continue;
34046ba22f19SMichael Tuexen 					}
3405830d754dSRandall Stewart 					if (IN6_IS_ADDR_LOOPBACK(&to6->sin6_addr)) {
3406830d754dSRandall Stewart 						continue;
3407830d754dSRandall Stewart 					}
3408830d754dSRandall Stewart 					if (IN6_IS_ADDR_LINKLOCAL(&to6->sin6_addr)) {
3409830d754dSRandall Stewart 						continue;
3410830d754dSRandall Stewart 					}
3411e6194c2eSMichael Tuexen 					break;
3412830d754dSRandall Stewart #endif
3413e6194c2eSMichael Tuexen 				default:
3414e6194c2eSMichael Tuexen 					continue;
3415e6194c2eSMichael Tuexen 				}
3416830d754dSRandall Stewart 				sctp_asconf_queue_mgmt(stcb, sctp_ifap, SCTP_ADD_IP_ADDRESS);
3417830d754dSRandall Stewart 			}
3418830d754dSRandall Stewart 		}
3419830d754dSRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
3420830d754dSRandall Stewart 	} else {
3421830d754dSRandall Stewart 		struct sctp_laddr *laddr;
3422830d754dSRandall Stewart 
3423830d754dSRandall Stewart 		LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
3424830d754dSRandall Stewart 			if (laddr->ifa == NULL) {
3425830d754dSRandall Stewart 				continue;
3426830d754dSRandall Stewart 			}
3427830d754dSRandall Stewart 			if (laddr->ifa->localifa_flags & SCTP_BEING_DELETED)
3428830d754dSRandall Stewart 				/*
3429830d754dSRandall Stewart 				 * Address being deleted by the system, dont
3430830d754dSRandall Stewart 				 * list.
3431830d754dSRandall Stewart 				 */
3432830d754dSRandall Stewart 				continue;
3433830d754dSRandall Stewart 			if (laddr->action == SCTP_DEL_IP_ADDRESS) {
3434830d754dSRandall Stewart 				/*
3435830d754dSRandall Stewart 				 * Address being deleted on this ep don't
3436830d754dSRandall Stewart 				 * list.
3437830d754dSRandall Stewart 				 */
3438830d754dSRandall Stewart 				continue;
3439830d754dSRandall Stewart 			}
3440830d754dSRandall Stewart 			sctp_ifap = laddr->ifa;
3441e6194c2eSMichael Tuexen 			switch (sctp_ifap->address.sa.sa_family) {
3442e6194c2eSMichael Tuexen #ifdef INET
3443e6194c2eSMichael Tuexen 			case AF_INET:
3444830d754dSRandall Stewart 				to = &sctp_ifap->address.sin;
3445830d754dSRandall Stewart 				if (IN4_ISPRIVATE_ADDRESS(&to->sin_addr)) {
3446830d754dSRandall Stewart 					continue;
3447830d754dSRandall Stewart 				}
3448830d754dSRandall Stewart 				if (IN4_ISLOOPBACK_ADDRESS(&to->sin_addr)) {
3449830d754dSRandall Stewart 					continue;
3450830d754dSRandall Stewart 				}
3451e6194c2eSMichael Tuexen 				break;
3452e6194c2eSMichael Tuexen #endif
3453830d754dSRandall Stewart #ifdef INET6
3454e6194c2eSMichael Tuexen 			case AF_INET6:
3455830d754dSRandall Stewart 				to6 = &sctp_ifap->address.sin6;
3456830d754dSRandall Stewart 				if (IN6_IS_ADDR_LOOPBACK(&to6->sin6_addr)) {
3457830d754dSRandall Stewart 					continue;
3458830d754dSRandall Stewart 				}
3459830d754dSRandall Stewart 				if (IN6_IS_ADDR_LINKLOCAL(&to6->sin6_addr)) {
3460830d754dSRandall Stewart 					continue;
3461830d754dSRandall Stewart 				}
3462e6194c2eSMichael Tuexen 				break;
3463830d754dSRandall Stewart #endif
3464e6194c2eSMichael Tuexen 			default:
3465e6194c2eSMichael Tuexen 				continue;
3466e6194c2eSMichael Tuexen 			}
3467830d754dSRandall Stewart 			sctp_asconf_queue_mgmt(stcb, sctp_ifap, SCTP_ADD_IP_ADDRESS);
3468830d754dSRandall Stewart 		}
3469830d754dSRandall Stewart 	}
3470830d754dSRandall Stewart skip_rest:
3471830d754dSRandall Stewart 	/* Now we must send the asconf into the queue */
3472ca85e948SMichael Tuexen 	sctp_send_asconf(stcb, net, SCTP_ADDR_NOT_LOCKED);
3473830d754dSRandall Stewart }
3474