xref: /freebsd/sys/netinet/sctp_asconf.c (revision 2974e263c32ec88f6fe05adc24e2ae585cd0a923)
1f8829a4aSRandall Stewart /*-
251369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni  *
4b1006367SRandall Stewart  * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
5807aad63SMichael Tuexen  * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
6807aad63SMichael Tuexen  * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
7f8829a4aSRandall Stewart  *
8f8829a4aSRandall Stewart  * Redistribution and use in source and binary forms, with or without
9f8829a4aSRandall Stewart  * modification, are permitted provided that the following conditions are met:
10f8829a4aSRandall Stewart  *
11f8829a4aSRandall Stewart  * a) Redistributions of source code must retain the above copyright notice,
12f8829a4aSRandall Stewart  *    this list of conditions and the following disclaimer.
13f8829a4aSRandall Stewart  *
14f8829a4aSRandall Stewart  * b) Redistributions in binary form must reproduce the above copyright
15f8829a4aSRandall Stewart  *    notice, this list of conditions and the following disclaimer in
16f8829a4aSRandall Stewart  *    the documentation and/or other materials provided with the distribution.
17f8829a4aSRandall Stewart  *
18f8829a4aSRandall Stewart  * c) Neither the name of Cisco Systems, Inc. nor the names of its
19f8829a4aSRandall Stewart  *    contributors may be used to endorse or promote products derived
20f8829a4aSRandall Stewart  *    from this software without specific prior written permission.
21f8829a4aSRandall Stewart  *
22f8829a4aSRandall Stewart  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23f8829a4aSRandall Stewart  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
24f8829a4aSRandall Stewart  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25f8829a4aSRandall Stewart  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
26f8829a4aSRandall Stewart  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
27f8829a4aSRandall Stewart  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
28f8829a4aSRandall Stewart  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
29f8829a4aSRandall Stewart  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
30f8829a4aSRandall Stewart  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
31f8829a4aSRandall Stewart  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
32f8829a4aSRandall Stewart  * THE POSSIBILITY OF SUCH DAMAGE.
33f8829a4aSRandall Stewart  */
34f8829a4aSRandall Stewart 
35f8829a4aSRandall Stewart #include <sys/cdefs.h>
36cef8ad06SRandall Stewart __FBSDID("$FreeBSD$");
37807aad63SMichael Tuexen 
38f8829a4aSRandall Stewart #include <netinet/sctp_os.h>
39f8829a4aSRandall Stewart #include <netinet/sctp_var.h>
4042551e99SRandall Stewart #include <netinet/sctp_sysctl.h>
41f8829a4aSRandall Stewart #include <netinet/sctp_pcb.h>
42f8829a4aSRandall Stewart #include <netinet/sctp_header.h>
43f8829a4aSRandall Stewart #include <netinet/sctputil.h>
44f8829a4aSRandall Stewart #include <netinet/sctp_output.h>
45f8829a4aSRandall Stewart #include <netinet/sctp_asconf.h>
46851b7298SRandall Stewart #include <netinet/sctp_timer.h>
47f8829a4aSRandall Stewart 
48f8829a4aSRandall Stewart /*
49f8829a4aSRandall Stewart  * debug flags:
50f8829a4aSRandall Stewart  * SCTP_DEBUG_ASCONF1: protocol info, general info and errors
51f8829a4aSRandall Stewart  * SCTP_DEBUG_ASCONF2: detailed info
52f8829a4aSRandall Stewart  */
53f8829a4aSRandall Stewart 
54f8829a4aSRandall Stewart 
55f8829a4aSRandall Stewart /*
56b1754ad1SMichael Tuexen  * RFC 5061
57f8829a4aSRandall Stewart  *
58f8829a4aSRandall Stewart  * An ASCONF parameter queue exists per asoc which holds the pending address
59f8829a4aSRandall Stewart  * operations.  Lists are updated upon receipt of ASCONF-ACK.
60f8829a4aSRandall Stewart  *
6118e198d3SRandall Stewart  * A restricted_addrs list exists per assoc to hold local addresses that are
6218e198d3SRandall Stewart  * not (yet) usable by the assoc as a source address.  These addresses are
6318e198d3SRandall Stewart  * either pending an ASCONF operation (and exist on the ASCONF parameter
6418e198d3SRandall Stewart  * queue), or they are permanently restricted (the peer has returned an
6518e198d3SRandall Stewart  * ERROR indication to an ASCONF(ADD), or the peer does not support ASCONF).
6618e198d3SRandall Stewart  *
67f8829a4aSRandall Stewart  * Deleted addresses are always immediately removed from the lists as they will
68f8829a4aSRandall Stewart  * (shortly) no longer exist in the kernel.  We send ASCONFs as a courtesy,
69f8829a4aSRandall Stewart  * only if allowed.
70f8829a4aSRandall Stewart  */
71f8829a4aSRandall Stewart 
72f8829a4aSRandall Stewart /*
7318e198d3SRandall Stewart  * ASCONF parameter processing.
7418e198d3SRandall Stewart  * response_required: set if a reply is required (eg. SUCCESS_REPORT).
7518e198d3SRandall Stewart  * returns a mbuf to an "error" response parameter or NULL/"success" if ok.
7618e198d3SRandall Stewart  * FIX: allocating this many mbufs on the fly is pretty inefficient...
77f8829a4aSRandall Stewart  */
78f8829a4aSRandall Stewart static struct mbuf *
79f8829a4aSRandall Stewart sctp_asconf_success_response(uint32_t id)
80f8829a4aSRandall Stewart {
81f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
82f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
83f8829a4aSRandall Stewart 
84f8829a4aSRandall Stewart 	m_reply = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_paramhdr),
85eb1b1807SGleb Smirnoff 	    0, M_NOWAIT, 1, MT_DATA);
86f8829a4aSRandall Stewart 	if (m_reply == NULL) {
87ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
88ad81507eSRandall Stewart 		    "asconf_success_response: couldn't get mbuf!\n");
8960990c0cSMichael Tuexen 		return (NULL);
90f8829a4aSRandall Stewart 	}
91f8829a4aSRandall Stewart 	aph = mtod(m_reply, struct sctp_asconf_paramhdr *);
92f8829a4aSRandall Stewart 	aph->correlation_id = id;
93f8829a4aSRandall Stewart 	aph->ph.param_type = htons(SCTP_SUCCESS_REPORT);
94f8829a4aSRandall Stewart 	aph->ph.param_length = sizeof(struct sctp_asconf_paramhdr);
95139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_reply) = aph->ph.param_length;
96f8829a4aSRandall Stewart 	aph->ph.param_length = htons(aph->ph.param_length);
97f8829a4aSRandall Stewart 
9860990c0cSMichael Tuexen 	return (m_reply);
99f8829a4aSRandall Stewart }
100f8829a4aSRandall Stewart 
101f8829a4aSRandall Stewart static struct mbuf *
102f8829a4aSRandall Stewart sctp_asconf_error_response(uint32_t id, uint16_t cause, uint8_t *error_tlv,
103f8829a4aSRandall Stewart     uint16_t tlv_length)
104f8829a4aSRandall Stewart {
105f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
106f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
107f8829a4aSRandall Stewart 	struct sctp_error_cause *error;
108f8829a4aSRandall Stewart 	uint8_t *tlv;
109f8829a4aSRandall Stewart 
110f8829a4aSRandall Stewart 	m_reply = sctp_get_mbuf_for_msg((sizeof(struct sctp_asconf_paramhdr) +
111f8829a4aSRandall Stewart 	    tlv_length +
112f8829a4aSRandall Stewart 	    sizeof(struct sctp_error_cause)),
113eb1b1807SGleb Smirnoff 	    0, M_NOWAIT, 1, MT_DATA);
114f8829a4aSRandall Stewart 	if (m_reply == NULL) {
115ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
116ad81507eSRandall Stewart 		    "asconf_error_response: couldn't get mbuf!\n");
11760990c0cSMichael Tuexen 		return (NULL);
118f8829a4aSRandall Stewart 	}
119f8829a4aSRandall Stewart 	aph = mtod(m_reply, struct sctp_asconf_paramhdr *);
120f8829a4aSRandall Stewart 	error = (struct sctp_error_cause *)(aph + 1);
121f8829a4aSRandall Stewart 
122f8829a4aSRandall Stewart 	aph->correlation_id = id;
123f8829a4aSRandall Stewart 	aph->ph.param_type = htons(SCTP_ERROR_CAUSE_IND);
124f8829a4aSRandall Stewart 	error->code = htons(cause);
125f8829a4aSRandall Stewart 	error->length = tlv_length + sizeof(struct sctp_error_cause);
126f8829a4aSRandall Stewart 	aph->ph.param_length = error->length +
127f8829a4aSRandall Stewart 	    sizeof(struct sctp_asconf_paramhdr);
128f8829a4aSRandall Stewart 
129f8829a4aSRandall Stewart 	if (aph->ph.param_length > MLEN) {
130ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
131ad81507eSRandall Stewart 		    "asconf_error_response: tlv_length (%xh) too big\n",
132f8829a4aSRandall Stewart 		    tlv_length);
133f8829a4aSRandall Stewart 		sctp_m_freem(m_reply);	/* discard */
13460990c0cSMichael Tuexen 		return (NULL);
135f8829a4aSRandall Stewart 	}
136f8829a4aSRandall Stewart 	if (error_tlv != NULL) {
137f8829a4aSRandall Stewart 		tlv = (uint8_t *)(error + 1);
138f8829a4aSRandall Stewart 		memcpy(tlv, error_tlv, tlv_length);
139f8829a4aSRandall Stewart 	}
140139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_reply) = aph->ph.param_length;
141f8829a4aSRandall Stewart 	error->length = htons(error->length);
142f8829a4aSRandall Stewart 	aph->ph.param_length = htons(aph->ph.param_length);
143f8829a4aSRandall Stewart 
14460990c0cSMichael Tuexen 	return (m_reply);
145f8829a4aSRandall Stewart }
146f8829a4aSRandall Stewart 
147f8829a4aSRandall Stewart static struct mbuf *
148b1754ad1SMichael Tuexen sctp_process_asconf_add_ip(struct sockaddr *src, struct sctp_asconf_paramhdr *aph,
149ca85e948SMichael Tuexen     struct sctp_tcb *stcb, int send_hb, int response_required)
150f8829a4aSRandall Stewart {
151ca85e948SMichael Tuexen 	struct sctp_nets *net;
152f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
15324aaac8dSMichael Tuexen 	union sctp_sockstore store;
154e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
155b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
156b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
157b54ddf22SMichael Tuexen 	uint16_t param_length;
158b54ddf22SMichael Tuexen #endif
159f8829a4aSRandall Stewart 	struct sockaddr *sa;
160f8829a4aSRandall Stewart 	int zero_address = 0;
16192776dfdSMichael Tuexen 	int bad_address = 0;
162e6194c2eSMichael Tuexen #ifdef INET
163e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
164e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
165e6194c2eSMichael Tuexen #endif
166f8829a4aSRandall Stewart #ifdef INET6
167f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
168f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
169e6194c2eSMichael Tuexen #endif
170f8829a4aSRandall Stewart 
171f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
172e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
173e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
174b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
175e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
176b54ddf22SMichael Tuexen #endif
17724aaac8dSMichael Tuexen 	sa = &store.sa;
178f8829a4aSRandall Stewart 	switch (param_type) {
179e6194c2eSMichael Tuexen #ifdef INET
180f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
181f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
182f8829a4aSRandall Stewart 			/* invalid param size */
18360990c0cSMichael Tuexen 			return (NULL);
184f8829a4aSRandall Stewart 		}
185e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
18624aaac8dSMichael Tuexen 		sin = &store.sin;
1875ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
188f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
189f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
190f8829a4aSRandall Stewart 		sin->sin_port = stcb->rport;
191f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
19292776dfdSMichael Tuexen 		if ((sin->sin_addr.s_addr == INADDR_BROADCAST) ||
19392776dfdSMichael Tuexen 		    IN_MULTICAST(ntohl(sin->sin_addr.s_addr))) {
1943657c405SMichael Tuexen 			bad_address = 1;
19592776dfdSMichael Tuexen 		}
196f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
197f8829a4aSRandall Stewart 			zero_address = 1;
198ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_add_ip: adding ");
199ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
200f8829a4aSRandall Stewart 		break;
201e6194c2eSMichael Tuexen #endif
202f8829a4aSRandall Stewart #ifdef INET6
203e6194c2eSMichael Tuexen 	case SCTP_IPV6_ADDRESS:
204f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
205f8829a4aSRandall Stewart 			/* invalid param size */
20660990c0cSMichael Tuexen 			return (NULL);
207f8829a4aSRandall Stewart 		}
208e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
20924aaac8dSMichael Tuexen 		sin6 = &store.sin6;
2105ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
211f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
212f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
213f8829a4aSRandall Stewart 		sin6->sin6_port = stcb->rport;
214f8829a4aSRandall Stewart 		memcpy((caddr_t)&sin6->sin6_addr, v6addr->addr,
215f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
21692776dfdSMichael Tuexen 		if (IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr)) {
21792776dfdSMichael Tuexen 			bad_address = 1;
21892776dfdSMichael Tuexen 		}
219f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
220f8829a4aSRandall Stewart 			zero_address = 1;
221ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_add_ip: adding ");
222ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
223f8829a4aSRandall Stewart 		break;
224e6194c2eSMichael Tuexen #endif
225f8829a4aSRandall Stewart 	default:
226f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
22792776dfdSMichael Tuexen 		    SCTP_CAUSE_INVALID_PARAM, (uint8_t *)aph,
228f8829a4aSRandall Stewart 		    aparam_length);
22960990c0cSMichael Tuexen 		return (m_reply);
230f8829a4aSRandall Stewart 	}			/* end switch */
231f8829a4aSRandall Stewart 
232f8829a4aSRandall Stewart 	/* if 0.0.0.0/::0, add the source address instead */
233b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
234b1754ad1SMichael Tuexen 		sa = src;
235ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
236ad81507eSRandall Stewart 		    "process_asconf_add_ip: using source addr ");
237b1754ad1SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
238f8829a4aSRandall Stewart 	}
239*2974e263SMichael Tuexen 	net = NULL;
240f8829a4aSRandall Stewart 	/* add the address */
24192776dfdSMichael Tuexen 	if (bad_address) {
24292776dfdSMichael Tuexen 		m_reply = sctp_asconf_error_response(aph->correlation_id,
24392776dfdSMichael Tuexen 		    SCTP_CAUSE_INVALID_PARAM, (uint8_t *)aph,
24492776dfdSMichael Tuexen 		    aparam_length);
2457154bf4aSMichael Tuexen 	} else if (sctp_add_remote_addr(stcb, sa, &net, stcb->asoc.port,
2467154bf4aSMichael Tuexen 		    SCTP_DONOT_SETSCOPE,
247a5d547adSRandall Stewart 	    SCTP_ADDR_DYNAMIC_ADDED) != 0) {
248ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
249ad81507eSRandall Stewart 		    "process_asconf_add_ip: error adding address\n");
250f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
251f8829a4aSRandall Stewart 		    SCTP_CAUSE_RESOURCE_SHORTAGE, (uint8_t *)aph,
252f8829a4aSRandall Stewart 		    aparam_length);
253f8829a4aSRandall Stewart 	} else {
254f8829a4aSRandall Stewart 		if (response_required) {
255f8829a4aSRandall Stewart 			m_reply =
256f8829a4aSRandall Stewart 			    sctp_asconf_success_response(aph->correlation_id);
257f8829a4aSRandall Stewart 		}
258*2974e263SMichael Tuexen 		if (net != NULL) {
259*2974e263SMichael Tuexen 			/* notify upper layer */
260*2974e263SMichael Tuexen 			sctp_ulp_notify(SCTP_NOTIFY_ASCONF_ADD_IP, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
261ca85e948SMichael Tuexen 			sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, stcb->sctp_ep, stcb, net);
2623c503c28SRandall Stewart 			sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep,
263ca85e948SMichael Tuexen 			    stcb, net);
264ca85e948SMichael Tuexen 			if (send_hb) {
265ca85e948SMichael Tuexen 				sctp_send_hb(stcb, net, SCTP_SO_NOT_LOCKED);
266ca85e948SMichael Tuexen 			}
267f8829a4aSRandall Stewart 		}
268*2974e263SMichael Tuexen 	}
26960990c0cSMichael Tuexen 	return (m_reply);
270f8829a4aSRandall Stewart }
271f8829a4aSRandall Stewart 
272f8829a4aSRandall Stewart static int
2731b649582SRandall Stewart sctp_asconf_del_remote_addrs_except(struct sctp_tcb *stcb, struct sockaddr *src)
274f8829a4aSRandall Stewart {
275f8829a4aSRandall Stewart 	struct sctp_nets *src_net, *net;
276f8829a4aSRandall Stewart 
277f8829a4aSRandall Stewart 	/* make sure the source address exists as a destination net */
278f8829a4aSRandall Stewart 	src_net = sctp_findnet(stcb, src);
279f8829a4aSRandall Stewart 	if (src_net == NULL) {
280f8829a4aSRandall Stewart 		/* not found */
28160990c0cSMichael Tuexen 		return (-1);
282f8829a4aSRandall Stewart 	}
2830053ed28SMichael Tuexen 
284f8829a4aSRandall Stewart 	/* delete all destination addresses except the source */
285f8829a4aSRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
286f8829a4aSRandall Stewart 		if (net != src_net) {
287f8829a4aSRandall Stewart 			/* delete this address */
288f8829a4aSRandall Stewart 			sctp_remove_net(stcb, net);
289ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
290ad81507eSRandall Stewart 			    "asconf_del_remote_addrs_except: deleting ");
291ad81507eSRandall Stewart 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1,
292ad81507eSRandall Stewart 			    (struct sockaddr *)&net->ro._l_addr);
293f8829a4aSRandall Stewart 			/* notify upper layer */
294f8829a4aSRandall Stewart 			sctp_ulp_notify(SCTP_NOTIFY_ASCONF_DELETE_IP, stcb, 0,
295ceaad40aSRandall Stewart 			    (struct sockaddr *)&net->ro._l_addr, SCTP_SO_NOT_LOCKED);
296f8829a4aSRandall Stewart 		}
297f8829a4aSRandall Stewart 	}
29860990c0cSMichael Tuexen 	return (0);
299f8829a4aSRandall Stewart }
300f8829a4aSRandall Stewart 
301f8829a4aSRandall Stewart static struct mbuf *
302b1754ad1SMichael Tuexen sctp_process_asconf_delete_ip(struct sockaddr *src,
303b1754ad1SMichael Tuexen     struct sctp_asconf_paramhdr *aph,
304f8829a4aSRandall Stewart     struct sctp_tcb *stcb, int response_required)
305f8829a4aSRandall Stewart {
306f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
30724aaac8dSMichael Tuexen 	union sctp_sockstore store;
308e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
309b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
310b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
311b54ddf22SMichael Tuexen 	uint16_t param_length;
312b54ddf22SMichael Tuexen #endif
313f8829a4aSRandall Stewart 	struct sockaddr *sa;
314f8829a4aSRandall Stewart 	int zero_address = 0;
315f8829a4aSRandall Stewart 	int result;
316e6194c2eSMichael Tuexen #ifdef INET
317e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
318e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
319e6194c2eSMichael Tuexen #endif
320f8829a4aSRandall Stewart #ifdef INET6
321f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
322f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
323e6194c2eSMichael Tuexen #endif
324f8829a4aSRandall Stewart 
325f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
326e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
327e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
328b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
329e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
330b54ddf22SMichael Tuexen #endif
33124aaac8dSMichael Tuexen 	sa = &store.sa;
332f8829a4aSRandall Stewart 	switch (param_type) {
333e6194c2eSMichael Tuexen #ifdef INET
334f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
335f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
336f8829a4aSRandall Stewart 			/* invalid param size */
33760990c0cSMichael Tuexen 			return (NULL);
338f8829a4aSRandall Stewart 		}
339e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
34024aaac8dSMichael Tuexen 		sin = &store.sin;
3415ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
342f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
343f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
344f8829a4aSRandall Stewart 		sin->sin_port = stcb->rport;
345f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
346f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
347f8829a4aSRandall Stewart 			zero_address = 1;
348ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
349ad81507eSRandall Stewart 		    "process_asconf_delete_ip: deleting ");
350ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
351f8829a4aSRandall Stewart 		break;
352e6194c2eSMichael Tuexen #endif
353e6194c2eSMichael Tuexen #ifdef INET6
354f8829a4aSRandall Stewart 	case SCTP_IPV6_ADDRESS:
355f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
356f8829a4aSRandall Stewart 			/* invalid param size */
35760990c0cSMichael Tuexen 			return (NULL);
358f8829a4aSRandall Stewart 		}
359e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
36024aaac8dSMichael Tuexen 		sin6 = &store.sin6;
3615ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
362f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
363f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
364f8829a4aSRandall Stewart 		sin6->sin6_port = stcb->rport;
365f8829a4aSRandall Stewart 		memcpy(&sin6->sin6_addr, v6addr->addr,
366f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
367f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
368f8829a4aSRandall Stewart 			zero_address = 1;
369ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
370ad81507eSRandall Stewart 		    "process_asconf_delete_ip: deleting ");
371ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
372f8829a4aSRandall Stewart 		break;
373e6194c2eSMichael Tuexen #endif
374f8829a4aSRandall Stewart 	default:
375f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
376f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
377f8829a4aSRandall Stewart 		    aparam_length);
37860990c0cSMichael Tuexen 		return (m_reply);
379f8829a4aSRandall Stewart 	}
380f8829a4aSRandall Stewart 
381f8829a4aSRandall Stewart 	/* make sure the source address is not being deleted */
382b1754ad1SMichael Tuexen 	if (sctp_cmpaddr(sa, src)) {
383f8829a4aSRandall Stewart 		/* trying to delete the source address! */
384ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: tried to delete source addr\n");
385f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
386f8829a4aSRandall Stewart 		    SCTP_CAUSE_DELETING_SRC_ADDR, (uint8_t *)aph,
387f8829a4aSRandall Stewart 		    aparam_length);
38860990c0cSMichael Tuexen 		return (m_reply);
389f8829a4aSRandall Stewart 	}
3900053ed28SMichael Tuexen 
391f8829a4aSRandall Stewart 	/* if deleting 0.0.0.0/::0, delete all addresses except src addr */
392b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
393b1754ad1SMichael Tuexen 		result = sctp_asconf_del_remote_addrs_except(stcb, src);
394f8829a4aSRandall Stewart 
395f8829a4aSRandall Stewart 		if (result) {
396f8829a4aSRandall Stewart 			/* src address did not exist? */
397ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: src addr does not exist?\n");
398f8829a4aSRandall Stewart 			/* what error to reply with?? */
399f8829a4aSRandall Stewart 			m_reply =
400f8829a4aSRandall Stewart 			    sctp_asconf_error_response(aph->correlation_id,
401f8829a4aSRandall Stewart 			    SCTP_CAUSE_REQUEST_REFUSED, (uint8_t *)aph,
402f8829a4aSRandall Stewart 			    aparam_length);
403f8829a4aSRandall Stewart 		} else if (response_required) {
404f8829a4aSRandall Stewart 			m_reply =
405f8829a4aSRandall Stewart 			    sctp_asconf_success_response(aph->correlation_id);
406f8829a4aSRandall Stewart 		}
40760990c0cSMichael Tuexen 		return (m_reply);
408f8829a4aSRandall Stewart 	}
4090053ed28SMichael Tuexen 
410f8829a4aSRandall Stewart 	/* delete the address */
411f8829a4aSRandall Stewart 	result = sctp_del_remote_addr(stcb, sa);
412f8829a4aSRandall Stewart 	/*
413f8829a4aSRandall Stewart 	 * note if result == -2, the address doesn't exist in the asoc but
414f8829a4aSRandall Stewart 	 * since it's being deleted anyways, we just ack the delete -- but
415f8829a4aSRandall Stewart 	 * this probably means something has already gone awry
416f8829a4aSRandall Stewart 	 */
417f8829a4aSRandall Stewart 	if (result == -1) {
418f8829a4aSRandall Stewart 		/* only one address in the asoc */
419ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: tried to delete last IP addr!\n");
420f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
421f8829a4aSRandall Stewart 		    SCTP_CAUSE_DELETING_LAST_ADDR, (uint8_t *)aph,
422f8829a4aSRandall Stewart 		    aparam_length);
423f8829a4aSRandall Stewart 	} else {
424f8829a4aSRandall Stewart 		if (response_required) {
425f8829a4aSRandall Stewart 			m_reply = sctp_asconf_success_response(aph->correlation_id);
426f8829a4aSRandall Stewart 		}
427f8829a4aSRandall Stewart 		/* notify upper layer */
428ceaad40aSRandall Stewart 		sctp_ulp_notify(SCTP_NOTIFY_ASCONF_DELETE_IP, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
429f8829a4aSRandall Stewart 	}
43060990c0cSMichael Tuexen 	return (m_reply);
431f8829a4aSRandall Stewart }
432f8829a4aSRandall Stewart 
433f8829a4aSRandall Stewart static struct mbuf *
434b1754ad1SMichael Tuexen sctp_process_asconf_set_primary(struct sockaddr *src,
4351b649582SRandall Stewart     struct sctp_asconf_paramhdr *aph,
4361b649582SRandall Stewart     struct sctp_tcb *stcb, int response_required)
437f8829a4aSRandall Stewart {
438f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
43924aaac8dSMichael Tuexen 	union sctp_sockstore store;
440e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
441b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
442b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
443b54ddf22SMichael Tuexen 	uint16_t param_length;
444b54ddf22SMichael Tuexen #endif
445f8829a4aSRandall Stewart 	struct sockaddr *sa;
446f8829a4aSRandall Stewart 	int zero_address = 0;
447e6194c2eSMichael Tuexen #ifdef INET
448e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
449e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
450e6194c2eSMichael Tuexen #endif
451f8829a4aSRandall Stewart #ifdef INET6
452f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
453f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
454e6194c2eSMichael Tuexen #endif
455f8829a4aSRandall Stewart 
456f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
457e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
458e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
459b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
460e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
461b54ddf22SMichael Tuexen #endif
46224aaac8dSMichael Tuexen 	sa = &store.sa;
463f8829a4aSRandall Stewart 	switch (param_type) {
464e6194c2eSMichael Tuexen #ifdef INET
465f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
466f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
467f8829a4aSRandall Stewart 			/* invalid param size */
46860990c0cSMichael Tuexen 			return (NULL);
469f8829a4aSRandall Stewart 		}
470e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
47124aaac8dSMichael Tuexen 		sin = &store.sin;
4725ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
473f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
474f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
475f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
476f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
477f8829a4aSRandall Stewart 			zero_address = 1;
478ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_set_primary: ");
479ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
480f8829a4aSRandall Stewart 		break;
481e6194c2eSMichael Tuexen #endif
482e6194c2eSMichael Tuexen #ifdef INET6
483f8829a4aSRandall Stewart 	case SCTP_IPV6_ADDRESS:
484f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
485f8829a4aSRandall Stewart 			/* invalid param size */
48660990c0cSMichael Tuexen 			return (NULL);
487f8829a4aSRandall Stewart 		}
488e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
48924aaac8dSMichael Tuexen 		sin6 = &store.sin6;
4905ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
491f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
492f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
493f8829a4aSRandall Stewart 		memcpy((caddr_t)&sin6->sin6_addr, v6addr->addr,
494f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
495f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
496f8829a4aSRandall Stewart 			zero_address = 1;
497ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_set_primary: ");
498ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
499f8829a4aSRandall Stewart 		break;
500e6194c2eSMichael Tuexen #endif
501f8829a4aSRandall Stewart 	default:
502f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
503f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
504f8829a4aSRandall Stewart 		    aparam_length);
50560990c0cSMichael Tuexen 		return (m_reply);
506f8829a4aSRandall Stewart 	}
507f8829a4aSRandall Stewart 
508f8829a4aSRandall Stewart 	/* if 0.0.0.0/::0, use the source address instead */
509b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
510b1754ad1SMichael Tuexen 		sa = src;
511ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
512ad81507eSRandall Stewart 		    "process_asconf_set_primary: using source addr ");
513b1754ad1SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
514f8829a4aSRandall Stewart 	}
515f8829a4aSRandall Stewart 	/* set the primary address */
516f8829a4aSRandall Stewart 	if (sctp_set_primary_addr(stcb, sa, NULL) == 0) {
517ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
518ad81507eSRandall Stewart 		    "process_asconf_set_primary: primary address set\n");
519f8829a4aSRandall Stewart 		/* notify upper layer */
520ceaad40aSRandall Stewart 		sctp_ulp_notify(SCTP_NOTIFY_ASCONF_SET_PRIMARY, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
521ca85e948SMichael Tuexen 		if ((stcb->asoc.primary_destination->dest_state & SCTP_ADDR_REACHABLE) &&
522ca85e948SMichael Tuexen 		    (!(stcb->asoc.primary_destination->dest_state & SCTP_ADDR_PF)) &&
523ca85e948SMichael Tuexen 		    (stcb->asoc.alternate)) {
524ca85e948SMichael Tuexen 			sctp_free_remote_addr(stcb->asoc.alternate);
525ca85e948SMichael Tuexen 			stcb->asoc.alternate = NULL;
526ca85e948SMichael Tuexen 		}
527f8829a4aSRandall Stewart 		if (response_required) {
528f8829a4aSRandall Stewart 			m_reply = sctp_asconf_success_response(aph->correlation_id);
529f8829a4aSRandall Stewart 		}
530851b7298SRandall Stewart 		/*
531851b7298SRandall Stewart 		 * Mobility adaptation. Ideally, when the reception of SET
532851b7298SRandall Stewart 		 * PRIMARY with DELETE IP ADDRESS of the previous primary
533851b7298SRandall Stewart 		 * destination, unacknowledged DATA are retransmitted
534851b7298SRandall Stewart 		 * immediately to the new primary destination for seamless
535b5c16493SMichael Tuexen 		 * handover. If the destination is UNCONFIRMED and marked to
536b5c16493SMichael Tuexen 		 * REQ_PRIM, The retransmission occur when reception of the
537b5c16493SMichael Tuexen 		 * HEARTBEAT-ACK.  (See sctp_handle_heartbeat_ack in
538851b7298SRandall Stewart 		 * sctp_input.c) Also, when change of the primary
539851b7298SRandall Stewart 		 * destination, it is better that all subsequent new DATA
540851b7298SRandall Stewart 		 * containing already queued DATA are transmitted to the new
541851b7298SRandall Stewart 		 * primary destination. (by micchie)
542851b7298SRandall Stewart 		 */
543851b7298SRandall Stewart 		if ((sctp_is_mobility_feature_on(stcb->sctp_ep,
544851b7298SRandall Stewart 		    SCTP_MOBILITY_BASE) ||
545851b7298SRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
546851b7298SRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) &&
547851b7298SRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
548851b7298SRandall Stewart 		    SCTP_MOBILITY_PRIM_DELETED) &&
549851b7298SRandall Stewart 		    (stcb->asoc.primary_destination->dest_state &
550851b7298SRandall Stewart 		    SCTP_ADDR_UNCONFIRMED) == 0) {
551851b7298SRandall Stewart 
552b7d130beSMichael Tuexen 			sctp_timer_stop(SCTP_TIMER_TYPE_PRIM_DELETED,
553b7d130beSMichael Tuexen 			    stcb->sctp_ep, stcb, NULL,
554b7d130beSMichael Tuexen 			    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_1);
555851b7298SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
556851b7298SRandall Stewart 			    SCTP_MOBILITY_FASTHANDOFF)) {
557851b7298SRandall Stewart 				sctp_assoc_immediate_retrans(stcb,
558851b7298SRandall Stewart 				    stcb->asoc.primary_destination);
559851b7298SRandall Stewart 			}
560851b7298SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
561851b7298SRandall Stewart 			    SCTP_MOBILITY_BASE)) {
5629eea4a2dSMichael Tuexen 				sctp_move_chunks_from_net(stcb,
5639eea4a2dSMichael Tuexen 				    stcb->asoc.deleted_primary);
564851b7298SRandall Stewart 			}
565851b7298SRandall Stewart 			sctp_delete_prim_timer(stcb->sctp_ep, stcb,
566851b7298SRandall Stewart 			    stcb->asoc.deleted_primary);
567851b7298SRandall Stewart 		}
568f8829a4aSRandall Stewart 	} else {
569f8829a4aSRandall Stewart 		/* couldn't set the requested primary address! */
570ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
571ad81507eSRandall Stewart 		    "process_asconf_set_primary: set primary failed!\n");
572f8829a4aSRandall Stewart 		/* must have been an invalid address, so report */
573f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
574f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
575f8829a4aSRandall Stewart 		    aparam_length);
576f8829a4aSRandall Stewart 	}
577f8829a4aSRandall Stewart 
57860990c0cSMichael Tuexen 	return (m_reply);
579f8829a4aSRandall Stewart }
580f8829a4aSRandall Stewart 
581f8829a4aSRandall Stewart /*
582f8829a4aSRandall Stewart  * handles an ASCONF chunk.
583f8829a4aSRandall Stewart  * if all parameters are processed ok, send a plain (empty) ASCONF-ACK
584f8829a4aSRandall Stewart  */
585f8829a4aSRandall Stewart void
586f8829a4aSRandall Stewart sctp_handle_asconf(struct mbuf *m, unsigned int offset,
587b1754ad1SMichael Tuexen     struct sockaddr *src,
5882afb3e84SRandall Stewart     struct sctp_asconf_chunk *cp, struct sctp_tcb *stcb,
5892afb3e84SRandall Stewart     int first)
590f8829a4aSRandall Stewart {
591f8829a4aSRandall Stewart 	struct sctp_association *asoc;
592f8829a4aSRandall Stewart 	uint32_t serial_num;
5932afb3e84SRandall Stewart 	struct mbuf *n, *m_ack, *m_result, *m_tail;
594f8829a4aSRandall Stewart 	struct sctp_asconf_ack_chunk *ack_cp;
595f104b614SMichael Tuexen 	struct sctp_asconf_paramhdr *aph;
596f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *p_addr;
597ca85e948SMichael Tuexen 	unsigned int asconf_limit, cnt;
598f8829a4aSRandall Stewart 	int error = 0;		/* did an error occur? */
599f8829a4aSRandall Stewart 
600f8829a4aSRandall Stewart 	/* asconf param buffer */
601f42a358aSRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
6022afb3e84SRandall Stewart 	struct sctp_asconf_ack *ack, *ack_next;
603f8829a4aSRandall Stewart 
604f8829a4aSRandall Stewart 	/* verify minimum length */
605f8829a4aSRandall Stewart 	if (ntohs(cp->ch.chunk_length) < sizeof(struct sctp_asconf_chunk)) {
606ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
607ad81507eSRandall Stewart 		    "handle_asconf: chunk too small = %xh\n",
608f8829a4aSRandall Stewart 		    ntohs(cp->ch.chunk_length));
609f8829a4aSRandall Stewart 		return;
610f8829a4aSRandall Stewart 	}
611f8829a4aSRandall Stewart 	asoc = &stcb->asoc;
612f8829a4aSRandall Stewart 	serial_num = ntohl(cp->serial_number);
613f8829a4aSRandall Stewart 
61420b07a4dSMichael Tuexen 	if (SCTP_TSN_GE(asoc->asconf_seq_in, serial_num)) {
615f8829a4aSRandall Stewart 		/* got a duplicate ASCONF */
616ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
617ad81507eSRandall Stewart 		    "handle_asconf: got duplicate serial number = %xh\n",
618f8829a4aSRandall Stewart 		    serial_num);
619f8829a4aSRandall Stewart 		return;
620f8829a4aSRandall Stewart 	} else if (serial_num != (asoc->asconf_seq_in + 1)) {
621ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: incorrect serial number = %xh (expected next = %xh)\n",
622f8829a4aSRandall Stewart 		    serial_num, asoc->asconf_seq_in + 1);
623f8829a4aSRandall Stewart 		return;
624f8829a4aSRandall Stewart 	}
6250053ed28SMichael Tuexen 
626f8829a4aSRandall Stewart 	/* it's the expected "next" sequence number, so process it */
627f8829a4aSRandall Stewart 	asoc->asconf_seq_in = serial_num;	/* update sequence */
628f8829a4aSRandall Stewart 	/* get length of all the param's in the ASCONF */
629f8829a4aSRandall Stewart 	asconf_limit = offset + ntohs(cp->ch.chunk_length);
630ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1,
631ad81507eSRandall Stewart 	    "handle_asconf: asconf_limit=%u, sequence=%xh\n",
632f8829a4aSRandall Stewart 	    asconf_limit, serial_num);
6332afb3e84SRandall Stewart 
6342afb3e84SRandall Stewart 	if (first) {
6352afb3e84SRandall Stewart 		/* delete old cache */
636e6194c2eSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: Now processing first ASCONF. Try to delete old cache\n");
6372afb3e84SRandall Stewart 
6384a9ef3f8SMichael Tuexen 		TAILQ_FOREACH_SAFE(ack, &asoc->asconf_ack_sent, next, ack_next) {
6392afb3e84SRandall Stewart 			if (ack->serial_number == serial_num)
6402afb3e84SRandall Stewart 				break;
6412afb3e84SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: delete old(%u) < first(%u)\n",
6422afb3e84SRandall Stewart 			    ack->serial_number, serial_num);
6434a9ef3f8SMichael Tuexen 			TAILQ_REMOVE(&asoc->asconf_ack_sent, ack, next);
6442afb3e84SRandall Stewart 			if (ack->data != NULL) {
6452afb3e84SRandall Stewart 				sctp_m_freem(ack->data);
6462afb3e84SRandall Stewart 			}
647b3f1ea41SRandall Stewart 			SCTP_ZONE_FREE(SCTP_BASE_INFO(ipi_zone_asconf_ack), ack);
6482afb3e84SRandall Stewart 		}
649f8829a4aSRandall Stewart 	}
6500053ed28SMichael Tuexen 
651139bc87fSRandall Stewart 	m_ack = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_ack_chunk), 0,
652eb1b1807SGleb Smirnoff 	    M_NOWAIT, 1, MT_DATA);
653f8829a4aSRandall Stewart 	if (m_ack == NULL) {
654ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
655ad81507eSRandall Stewart 		    "handle_asconf: couldn't get mbuf!\n");
656f8829a4aSRandall Stewart 		return;
657f8829a4aSRandall Stewart 	}
658f8829a4aSRandall Stewart 	m_tail = m_ack;		/* current reply chain's tail */
659f8829a4aSRandall Stewart 
660f8829a4aSRandall Stewart 	/* fill in ASCONF-ACK header */
661f8829a4aSRandall Stewart 	ack_cp = mtod(m_ack, struct sctp_asconf_ack_chunk *);
662f8829a4aSRandall Stewart 	ack_cp->ch.chunk_type = SCTP_ASCONF_ACK;
663f8829a4aSRandall Stewart 	ack_cp->ch.chunk_flags = 0;
664f8829a4aSRandall Stewart 	ack_cp->serial_number = htonl(serial_num);
665f8829a4aSRandall Stewart 	/* set initial lengths (eg. just an ASCONF-ACK), ntohx at the end! */
666139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_ack) = sizeof(struct sctp_asconf_ack_chunk);
667f8829a4aSRandall Stewart 	ack_cp->ch.chunk_length = sizeof(struct sctp_asconf_ack_chunk);
668f8829a4aSRandall Stewart 
669f8829a4aSRandall Stewart 	/* skip the lookup address parameter */
670f8829a4aSRandall Stewart 	offset += sizeof(struct sctp_asconf_chunk);
671f8829a4aSRandall Stewart 	p_addr = (struct sctp_ipv6addr_param *)sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr), (uint8_t *)&aparam_buf);
672f8829a4aSRandall Stewart 	if (p_addr == NULL) {
673ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
674ad81507eSRandall Stewart 		    "handle_asconf: couldn't get lookup addr!\n");
675f8829a4aSRandall Stewart 		/* respond with a missing/invalid mandatory parameter error */
6761b084a5eSMichael Tuexen 		sctp_m_freem(m_ack);
677f8829a4aSRandall Stewart 		return;
678f8829a4aSRandall Stewart 	}
679f8829a4aSRandall Stewart 	/* param_length is already validated in process_control... */
680f8829a4aSRandall Stewart 	offset += ntohs(p_addr->ph.param_length);	/* skip lookup addr */
681f8829a4aSRandall Stewart 	/* get pointer to first asconf param in ASCONF */
682f8829a4aSRandall Stewart 	aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, sizeof(struct sctp_asconf_paramhdr), (uint8_t *)&aparam_buf);
683f8829a4aSRandall Stewart 	if (aph == NULL) {
684ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Empty ASCONF received?\n");
685f8829a4aSRandall Stewart 		goto send_reply;
686f8829a4aSRandall Stewart 	}
687f8829a4aSRandall Stewart 	/* process through all parameters */
688ca85e948SMichael Tuexen 	cnt = 0;
689f8829a4aSRandall Stewart 	while (aph != NULL) {
690f8829a4aSRandall Stewart 		unsigned int param_length, param_type;
691f8829a4aSRandall Stewart 
692f8829a4aSRandall Stewart 		param_type = ntohs(aph->ph.param_type);
693f8829a4aSRandall Stewart 		param_length = ntohs(aph->ph.param_length);
694f8829a4aSRandall Stewart 		if (offset + param_length > asconf_limit) {
695f8829a4aSRandall Stewart 			/* parameter goes beyond end of chunk! */
696f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
697f8829a4aSRandall Stewart 			return;
698f8829a4aSRandall Stewart 		}
699f8829a4aSRandall Stewart 		m_result = NULL;
700f8829a4aSRandall Stewart 
701f8829a4aSRandall Stewart 		if (param_length > sizeof(aparam_buf)) {
702ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: param length (%u) larger than buffer size!\n", param_length);
703f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
704f8829a4aSRandall Stewart 			return;
705f8829a4aSRandall Stewart 		}
706f8829a4aSRandall Stewart 		if (param_length <= sizeof(struct sctp_paramhdr)) {
707ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: param length (%u) too short\n", param_length);
708f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
709e6b3bd22SMichael Tuexen 			return;
710f8829a4aSRandall Stewart 		}
711f8829a4aSRandall Stewart 		/* get the entire parameter */
712f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, param_length, aparam_buf);
713f8829a4aSRandall Stewart 		if (aph == NULL) {
714ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: couldn't get entire param\n");
715f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
716f8829a4aSRandall Stewart 			return;
717f8829a4aSRandall Stewart 		}
718f8829a4aSRandall Stewart 		switch (param_type) {
719f8829a4aSRandall Stewart 		case SCTP_ADD_IP_ADDRESS:
720b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_add_ip(src, aph, stcb,
721ca85e948SMichael Tuexen 			    (cnt < SCTP_BASE_SYSCTL(sctp_hb_maxburst)), error);
722ca85e948SMichael Tuexen 			cnt++;
723f8829a4aSRandall Stewart 			break;
724f8829a4aSRandall Stewart 		case SCTP_DEL_IP_ADDRESS:
725b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_delete_ip(src, aph, stcb,
726f8829a4aSRandall Stewart 			    error);
727f8829a4aSRandall Stewart 			break;
728f8829a4aSRandall Stewart 		case SCTP_ERROR_CAUSE_IND:
729f8829a4aSRandall Stewart 			/* not valid in an ASCONF chunk */
730f8829a4aSRandall Stewart 			break;
731f8829a4aSRandall Stewart 		case SCTP_SET_PRIM_ADDR:
732b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_set_primary(src, aph,
733f8829a4aSRandall Stewart 			    stcb, error);
734f8829a4aSRandall Stewart 			break;
735830d754dSRandall Stewart 		case SCTP_NAT_VTAGS:
736830d754dSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: sees a NAT VTAG state parameter\n");
737830d754dSRandall Stewart 			break;
738f8829a4aSRandall Stewart 		case SCTP_SUCCESS_REPORT:
739f8829a4aSRandall Stewart 			/* not valid in an ASCONF chunk */
740f8829a4aSRandall Stewart 			break;
741f8829a4aSRandall Stewart 		case SCTP_ULP_ADAPTATION:
742f8829a4aSRandall Stewart 			/* FIX */
743f8829a4aSRandall Stewart 			break;
744f8829a4aSRandall Stewart 		default:
745f8829a4aSRandall Stewart 			if ((param_type & 0x8000) == 0) {
746f8829a4aSRandall Stewart 				/* Been told to STOP at this param */
747f8829a4aSRandall Stewart 				asconf_limit = offset;
748f8829a4aSRandall Stewart 				/*
749f8829a4aSRandall Stewart 				 * FIX FIX - We need to call
750f8829a4aSRandall Stewart 				 * sctp_arethere_unrecognized_parameters()
751f8829a4aSRandall Stewart 				 * to get a operr and send it for any
752f8829a4aSRandall Stewart 				 * param's with the 0x4000 bit set OR do it
753f8829a4aSRandall Stewart 				 * here ourselves... note we still must STOP
754f8829a4aSRandall Stewart 				 * if the 0x8000 bit is clear.
755f8829a4aSRandall Stewart 				 */
756f8829a4aSRandall Stewart 			}
757f8829a4aSRandall Stewart 			/* unknown/invalid param type */
758f8829a4aSRandall Stewart 			break;
759f8829a4aSRandall Stewart 		}		/* switch */
760f8829a4aSRandall Stewart 
761f8829a4aSRandall Stewart 		/* add any (error) result to the reply mbuf chain */
762f8829a4aSRandall Stewart 		if (m_result != NULL) {
763139bc87fSRandall Stewart 			SCTP_BUF_NEXT(m_tail) = m_result;
764f8829a4aSRandall Stewart 			m_tail = m_result;
765f8829a4aSRandall Stewart 			/* update lengths, make sure it's aligned too */
766139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_result) = SCTP_SIZE32(SCTP_BUF_LEN(m_result));
767139bc87fSRandall Stewart 			ack_cp->ch.chunk_length += SCTP_BUF_LEN(m_result);
768f8829a4aSRandall Stewart 			/* set flag to force success reports */
769f8829a4aSRandall Stewart 			error = 1;
770f8829a4aSRandall Stewart 		}
771f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(param_length);
772f8829a4aSRandall Stewart 		/* update remaining ASCONF message length to process */
773f8829a4aSRandall Stewart 		if (offset >= asconf_limit) {
774f8829a4aSRandall Stewart 			/* no more data in the mbuf chain */
775f8829a4aSRandall Stewart 			break;
776f8829a4aSRandall Stewart 		}
777f8829a4aSRandall Stewart 		/* get pointer to next asconf param */
778f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset,
779f8829a4aSRandall Stewart 		    sizeof(struct sctp_asconf_paramhdr),
780f8829a4aSRandall Stewart 		    (uint8_t *)&aparam_buf);
781f8829a4aSRandall Stewart 		if (aph == NULL) {
782f8829a4aSRandall Stewart 			/* can't get an asconf paramhdr */
783ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: can't get asconf param hdr!\n");
784f8829a4aSRandall Stewart 			/* FIX ME - add error here... */
785f8829a4aSRandall Stewart 		}
786ad81507eSRandall Stewart 	}
787f8829a4aSRandall Stewart 
788f8829a4aSRandall Stewart send_reply:
789f8829a4aSRandall Stewart 	ack_cp->ch.chunk_length = htons(ack_cp->ch.chunk_length);
790f8829a4aSRandall Stewart 	/* save the ASCONF-ACK reply */
791b3f1ea41SRandall Stewart 	ack = SCTP_ZONE_GET(SCTP_BASE_INFO(ipi_zone_asconf_ack),
7922afb3e84SRandall Stewart 	    struct sctp_asconf_ack);
7932afb3e84SRandall Stewart 	if (ack == NULL) {
7942afb3e84SRandall Stewart 		sctp_m_freem(m_ack);
7952afb3e84SRandall Stewart 		return;
7962afb3e84SRandall Stewart 	}
7972afb3e84SRandall Stewart 	ack->serial_number = serial_num;
7982afb3e84SRandall Stewart 	ack->last_sent_to = NULL;
7992afb3e84SRandall Stewart 	ack->data = m_ack;
800fc066a61SMichael Tuexen 	ack->len = 0;
801e6194c2eSMichael Tuexen 	for (n = m_ack; n != NULL; n = SCTP_BUF_NEXT(n)) {
8022afb3e84SRandall Stewart 		ack->len += SCTP_BUF_LEN(n);
8032afb3e84SRandall Stewart 	}
8042afb3e84SRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_ack_sent, ack, next);
805f8829a4aSRandall Stewart 
806f8829a4aSRandall Stewart 	/* see if last_control_chunk_from is set properly (use IP src addr) */
807f8829a4aSRandall Stewart 	if (stcb->asoc.last_control_chunk_from == NULL) {
808f8829a4aSRandall Stewart 		/*
809f8829a4aSRandall Stewart 		 * this could happen if the source address was just newly
810f8829a4aSRandall Stewart 		 * added
811f8829a4aSRandall Stewart 		 */
812ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: looking up net for IP source address\n");
813ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Looking for IP source: ");
814b82bd838SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
815f8829a4aSRandall Stewart 		/* look up the from address */
816b82bd838SMichael Tuexen 		stcb->asoc.last_control_chunk_from = sctp_findnet(stcb, src);
817f8829a4aSRandall Stewart #ifdef SCTP_DEBUG
818b82bd838SMichael Tuexen 		if (stcb->asoc.last_control_chunk_from == NULL) {
819ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: IP source address not found?!\n");
820f8829a4aSRandall Stewart 		}
821b82bd838SMichael Tuexen #endif
822f8829a4aSRandall Stewart 	}
823f8829a4aSRandall Stewart }
824f8829a4aSRandall Stewart 
825f8829a4aSRandall Stewart /*
826f8829a4aSRandall Stewart  * does the address match? returns 0 if not, 1 if so
827f8829a4aSRandall Stewart  */
828f8829a4aSRandall Stewart static uint32_t
829b0471b4bSMichael Tuexen sctp_asconf_addr_match(struct sctp_asconf_addr *aa, struct sockaddr *sa)
830b0471b4bSMichael Tuexen {
831e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
832f8829a4aSRandall Stewart #ifdef INET6
833e6194c2eSMichael Tuexen 	case AF_INET6:
834e6194c2eSMichael Tuexen 		{
835f8829a4aSRandall Stewart 			/* XXX scopeid */
836f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
837f8829a4aSRandall Stewart 
838f8829a4aSRandall Stewart 			if ((aa->ap.addrp.ph.param_type == SCTP_IPV6_ADDRESS) &&
839f8829a4aSRandall Stewart 			    (memcmp(&aa->ap.addrp.addr, &sin6->sin6_addr,
840f8829a4aSRandall Stewart 			    sizeof(struct in6_addr)) == 0)) {
841f8829a4aSRandall Stewart 				return (1);
842f8829a4aSRandall Stewart 			}
843e6194c2eSMichael Tuexen 			break;
844e6194c2eSMichael Tuexen 		}
845e6194c2eSMichael Tuexen #endif
846e6194c2eSMichael Tuexen #ifdef INET
847e6194c2eSMichael Tuexen 	case AF_INET:
848e6194c2eSMichael Tuexen 		{
849f8829a4aSRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
850f8829a4aSRandall Stewart 
851f8829a4aSRandall Stewart 			if ((aa->ap.addrp.ph.param_type == SCTP_IPV4_ADDRESS) &&
852f8829a4aSRandall Stewart 			    (memcmp(&aa->ap.addrp.addr, &sin->sin_addr,
853f8829a4aSRandall Stewart 			    sizeof(struct in_addr)) == 0)) {
854f8829a4aSRandall Stewart 				return (1);
855f8829a4aSRandall Stewart 			}
856e6194c2eSMichael Tuexen 			break;
857e6194c2eSMichael Tuexen 		}
858e6194c2eSMichael Tuexen #endif
859e6194c2eSMichael Tuexen 	default:
860e6194c2eSMichael Tuexen 		break;
861f8829a4aSRandall Stewart 	}
862f8829a4aSRandall Stewart 	return (0);
863f8829a4aSRandall Stewart }
864f8829a4aSRandall Stewart 
865f8829a4aSRandall Stewart /*
866c54a18d2SRandall Stewart  * does the address match? returns 0 if not, 1 if so
867c54a18d2SRandall Stewart  */
868c54a18d2SRandall Stewart static uint32_t
869b0471b4bSMichael Tuexen sctp_addr_match(struct sctp_paramhdr *ph, struct sockaddr *sa)
870b0471b4bSMichael Tuexen {
871b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
872c54a18d2SRandall Stewart 	uint16_t param_type, param_length;
873c54a18d2SRandall Stewart 
874e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
875e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
876b54ddf22SMichael Tuexen #endif
877e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
878d6af161aSRandall Stewart #ifdef INET6
879e6194c2eSMichael Tuexen 	case AF_INET6:
880e6194c2eSMichael Tuexen 		{
881c54a18d2SRandall Stewart 			/* XXX scopeid */
882c54a18d2SRandall Stewart 			struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
883e6194c2eSMichael Tuexen 			struct sctp_ipv6addr_param *v6addr;
884c54a18d2SRandall Stewart 
885e6194c2eSMichael Tuexen 			v6addr = (struct sctp_ipv6addr_param *)ph;
886c54a18d2SRandall Stewart 			if ((param_type == SCTP_IPV6_ADDRESS) &&
887b54ddf22SMichael Tuexen 			    (param_length == sizeof(struct sctp_ipv6addr_param)) &&
888c54a18d2SRandall Stewart 			    (memcmp(&v6addr->addr, &sin6->sin6_addr,
889c54a18d2SRandall Stewart 			    sizeof(struct in6_addr)) == 0)) {
890c54a18d2SRandall Stewart 				return (1);
891c54a18d2SRandall Stewart 			}
892e6194c2eSMichael Tuexen 			break;
893d6af161aSRandall Stewart 		}
894d6af161aSRandall Stewart #endif
895e6194c2eSMichael Tuexen #ifdef INET
896e6194c2eSMichael Tuexen 	case AF_INET:
897e6194c2eSMichael Tuexen 		{
898c54a18d2SRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
899e6194c2eSMichael Tuexen 			struct sctp_ipv4addr_param *v4addr;
900c54a18d2SRandall Stewart 
901e6194c2eSMichael Tuexen 			v4addr = (struct sctp_ipv4addr_param *)ph;
902c54a18d2SRandall Stewart 			if ((param_type == SCTP_IPV4_ADDRESS) &&
903b54ddf22SMichael Tuexen 			    (param_length == sizeof(struct sctp_ipv4addr_param)) &&
904c54a18d2SRandall Stewart 			    (memcmp(&v4addr->addr, &sin->sin_addr,
905c54a18d2SRandall Stewart 			    sizeof(struct in_addr)) == 0)) {
906c54a18d2SRandall Stewart 				return (1);
907c54a18d2SRandall Stewart 			}
908e6194c2eSMichael Tuexen 			break;
909e6194c2eSMichael Tuexen 		}
910e6194c2eSMichael Tuexen #endif
911e6194c2eSMichael Tuexen 	default:
912e6194c2eSMichael Tuexen 		break;
913c54a18d2SRandall Stewart 	}
914c54a18d2SRandall Stewart 	return (0);
915c54a18d2SRandall Stewart }
916c54a18d2SRandall Stewart 
917c54a18d2SRandall Stewart /*
918f8829a4aSRandall Stewart  * Cleanup for non-responded/OP ERR'd ASCONF
919f8829a4aSRandall Stewart  */
920f8829a4aSRandall Stewart void
921f8829a4aSRandall Stewart sctp_asconf_cleanup(struct sctp_tcb *stcb, struct sctp_nets *net)
922f8829a4aSRandall Stewart {
923f8829a4aSRandall Stewart 	/*
924f8829a4aSRandall Stewart 	 * clear out any existing asconfs going out
925f8829a4aSRandall Stewart 	 */
9263c503c28SRandall Stewart 	sctp_timer_stop(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep, stcb, net,
9273c503c28SRandall Stewart 	    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_2);
928c54a18d2SRandall Stewart 	stcb->asoc.asconf_seq_out_acked = stcb->asoc.asconf_seq_out;
929f8829a4aSRandall Stewart 	/* remove the old ASCONF on our outbound queue */
930f8829a4aSRandall Stewart 	sctp_toss_old_asconf(stcb);
931f8829a4aSRandall Stewart }
932f8829a4aSRandall Stewart 
933f8829a4aSRandall Stewart /*
9342dad8a55SRandall Stewart  * cleanup any cached source addresses that may be topologically
9352dad8a55SRandall Stewart  * incorrect after a new address has been added to this interface.
9362dad8a55SRandall Stewart  */
9372dad8a55SRandall Stewart static void
9382dad8a55SRandall Stewart sctp_asconf_nets_cleanup(struct sctp_tcb *stcb, struct sctp_ifn *ifn)
9392dad8a55SRandall Stewart {
9402dad8a55SRandall Stewart 	struct sctp_nets *net;
9412dad8a55SRandall Stewart 
9422dad8a55SRandall Stewart 	/*
9432dad8a55SRandall Stewart 	 * Ideally, we want to only clear cached routes and source addresses
9442dad8a55SRandall Stewart 	 * that are topologically incorrect.  But since there is no easy way
9452dad8a55SRandall Stewart 	 * to know whether the newly added address on the ifn would cause a
9462dad8a55SRandall Stewart 	 * routing change (i.e. a new egress interface would be chosen)
9472dad8a55SRandall Stewart 	 * without doing a new routing lookup and source address selection,
9482dad8a55SRandall Stewart 	 * we will (for now) just flush any cached route using a different
9492dad8a55SRandall Stewart 	 * ifn (and cached source addrs) and let output re-choose them
9502dad8a55SRandall Stewart 	 * during the next send on that net.
9512dad8a55SRandall Stewart 	 */
9522dad8a55SRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
9532dad8a55SRandall Stewart 		/*
9542dad8a55SRandall Stewart 		 * clear any cached route (and cached source address) if the
9552dad8a55SRandall Stewart 		 * route's interface is NOT the same as the address change.
9562dad8a55SRandall Stewart 		 * If it's the same interface, just clear the cached source
9572dad8a55SRandall Stewart 		 * address.
9582dad8a55SRandall Stewart 		 */
9592dad8a55SRandall Stewart 		if (SCTP_ROUTE_HAS_VALID_IFN(&net->ro) &&
960fc066a61SMichael Tuexen 		    ((ifn == NULL) ||
961fc066a61SMichael Tuexen 		    (SCTP_GET_IF_INDEX_FROM_ROUTE(&net->ro) != ifn->ifn_index))) {
9622dad8a55SRandall Stewart 			/* clear any cached route */
9632dad8a55SRandall Stewart 			RTFREE(net->ro.ro_rt);
9642dad8a55SRandall Stewart 			net->ro.ro_rt = NULL;
9652dad8a55SRandall Stewart 		}
9662dad8a55SRandall Stewart 		/* clear any cached source address */
9672dad8a55SRandall Stewart 		if (net->src_addr_selected) {
9682dad8a55SRandall Stewart 			sctp_free_ifa(net->ro._s_addr);
9692dad8a55SRandall Stewart 			net->ro._s_addr = NULL;
9702dad8a55SRandall Stewart 			net->src_addr_selected = 0;
9712dad8a55SRandall Stewart 		}
9722dad8a55SRandall Stewart 	}
9732dad8a55SRandall Stewart }
9742dad8a55SRandall Stewart 
975851b7298SRandall Stewart 
976851b7298SRandall Stewart void
977851b7298SRandall Stewart sctp_assoc_immediate_retrans(struct sctp_tcb *stcb, struct sctp_nets *dstnet)
978851b7298SRandall Stewart {
979851b7298SRandall Stewart 	int error;
980851b7298SRandall Stewart 
981851b7298SRandall Stewart 	if (dstnet->dest_state & SCTP_ADDR_UNCONFIRMED) {
982851b7298SRandall Stewart 		return;
983851b7298SRandall Stewart 	}
984851b7298SRandall Stewart 	if (stcb->asoc.deleted_primary == NULL) {
985851b7298SRandall Stewart 		return;
986851b7298SRandall Stewart 	}
9870053ed28SMichael Tuexen 
988851b7298SRandall Stewart 	if (!TAILQ_EMPTY(&stcb->asoc.sent_queue)) {
989b27a6b7dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "assoc_immediate_retrans: Deleted primary is ");
990851b7298SRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, &stcb->asoc.deleted_primary->ro._l_addr.sa);
991851b7298SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Current Primary is ");
992851b7298SRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, &stcb->asoc.primary_destination->ro._l_addr.sa);
993851b7298SRandall Stewart 		sctp_timer_stop(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep, stcb,
994851b7298SRandall Stewart 		    stcb->asoc.deleted_primary,
995b7d130beSMichael Tuexen 		    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_3);
996851b7298SRandall Stewart 		stcb->asoc.num_send_timers_up--;
997851b7298SRandall Stewart 		if (stcb->asoc.num_send_timers_up < 0) {
998851b7298SRandall Stewart 			stcb->asoc.num_send_timers_up = 0;
999851b7298SRandall Stewart 		}
1000851b7298SRandall Stewart 		SCTP_TCB_LOCK_ASSERT(stcb);
1001851b7298SRandall Stewart 		error = sctp_t3rxt_timer(stcb->sctp_ep, stcb,
1002851b7298SRandall Stewart 		    stcb->asoc.deleted_primary);
1003851b7298SRandall Stewart 		if (error) {
1004851b7298SRandall Stewart 			SCTP_INP_DECR_REF(stcb->sctp_ep);
1005851b7298SRandall Stewart 			return;
1006851b7298SRandall Stewart 		}
1007851b7298SRandall Stewart 		SCTP_TCB_LOCK_ASSERT(stcb);
1008851b7298SRandall Stewart #ifdef SCTP_AUDITING_ENABLED
1009f31e6c7fSMichael Tuexen 		sctp_auditing(4, stcb->sctp_ep, stcb, stcb->asoc.deleted_primary);
1010851b7298SRandall Stewart #endif
1011851b7298SRandall Stewart 		sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_NOT_LOCKED);
1012851b7298SRandall Stewart 		if ((stcb->asoc.num_send_timers_up == 0) &&
1013851b7298SRandall Stewart 		    (stcb->asoc.sent_queue_cnt > 0)) {
1014851b7298SRandall Stewart 			struct sctp_tmit_chunk *chk;
1015851b7298SRandall Stewart 
1016851b7298SRandall Stewart 			chk = TAILQ_FIRST(&stcb->asoc.sent_queue);
1017851b7298SRandall Stewart 			sctp_timer_start(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep,
1018851b7298SRandall Stewart 			    stcb, chk->whoTo);
1019851b7298SRandall Stewart 		}
1020851b7298SRandall Stewart 	}
1021851b7298SRandall Stewart 	return;
1022851b7298SRandall Stewart }
1023851b7298SRandall Stewart 
10242afb3e84SRandall Stewart static int
10252afb3e84SRandall Stewart     sctp_asconf_queue_mgmt(struct sctp_tcb *, struct sctp_ifa *, uint16_t);
10262afb3e84SRandall Stewart 
1027851b7298SRandall Stewart void
10282afb3e84SRandall Stewart sctp_net_immediate_retrans(struct sctp_tcb *stcb, struct sctp_nets *net)
10292afb3e84SRandall Stewart {
10302afb3e84SRandall Stewart 	struct sctp_tmit_chunk *chk;
10312afb3e84SRandall Stewart 
1032b27a6b7dSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1, "net_immediate_retrans: RTO is %d\n", net->RTO);
10332afb3e84SRandall Stewart 	sctp_timer_stop(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep, stcb, net,
1034b7d130beSMichael Tuexen 	    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_4);
10352afb3e84SRandall Stewart 	stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
10362afb3e84SRandall Stewart 	net->error_count = 0;
10372afb3e84SRandall Stewart 	TAILQ_FOREACH(chk, &stcb->asoc.sent_queue, sctp_next) {
10382afb3e84SRandall Stewart 		if (chk->whoTo == net) {
1039851b7298SRandall Stewart 			if (chk->sent < SCTP_DATAGRAM_RESEND) {
10402afb3e84SRandall Stewart 				chk->sent = SCTP_DATAGRAM_RESEND;
10412afb3e84SRandall Stewart 				sctp_ucount_incr(stcb->asoc.sent_queue_retran_cnt);
1042d55b0b1bSRandall Stewart 				sctp_flight_size_decrease(chk);
1043d55b0b1bSRandall Stewart 				sctp_total_flight_decrease(stcb, chk);
1044d55b0b1bSRandall Stewart 				net->marked_retrans++;
1045d55b0b1bSRandall Stewart 				stcb->asoc.marked_retrans++;
10462afb3e84SRandall Stewart 			}
10472afb3e84SRandall Stewart 		}
10482afb3e84SRandall Stewart 	}
1049d55b0b1bSRandall Stewart 	if (net->marked_retrans) {
1050d55b0b1bSRandall Stewart 		sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_NOT_LOCKED);
1051d55b0b1bSRandall Stewart 	}
1052851b7298SRandall Stewart }
10532afb3e84SRandall Stewart 
10542afb3e84SRandall Stewart static void
10552afb3e84SRandall Stewart sctp_path_check_and_react(struct sctp_tcb *stcb, struct sctp_ifa *newifa)
10562afb3e84SRandall Stewart {
10572afb3e84SRandall Stewart 	struct sctp_nets *net;
10582afb3e84SRandall Stewart 	int addrnum, changed;
10592afb3e84SRandall Stewart 
10602afb3e84SRandall Stewart 	/*
10612afb3e84SRandall Stewart 	 * If number of local valid addresses is 1, the valid address is
10622afb3e84SRandall Stewart 	 * probably newly added address. Several valid addresses in this
10632afb3e84SRandall Stewart 	 * association.  A source address may not be changed.  Additionally,
10642afb3e84SRandall Stewart 	 * they can be configured on a same interface as "alias" addresses.
10652afb3e84SRandall Stewart 	 * (by micchie)
10662afb3e84SRandall Stewart 	 */
10672afb3e84SRandall Stewart 	addrnum = sctp_local_addr_count(stcb);
10682afb3e84SRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1, "p_check_react(): %d local addresses\n",
10692afb3e84SRandall Stewart 	    addrnum);
10702afb3e84SRandall Stewart 	if (addrnum == 1) {
10712afb3e84SRandall Stewart 		TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
10722afb3e84SRandall Stewart 			/* clear any cached route and source address */
10732afb3e84SRandall Stewart 			if (net->ro.ro_rt) {
10742afb3e84SRandall Stewart 				RTFREE(net->ro.ro_rt);
10752afb3e84SRandall Stewart 				net->ro.ro_rt = NULL;
10762afb3e84SRandall Stewart 			}
10772afb3e84SRandall Stewart 			if (net->src_addr_selected) {
10782afb3e84SRandall Stewart 				sctp_free_ifa(net->ro._s_addr);
10792afb3e84SRandall Stewart 				net->ro._s_addr = NULL;
10802afb3e84SRandall Stewart 				net->src_addr_selected = 0;
10812afb3e84SRandall Stewart 			}
10822afb3e84SRandall Stewart 			/* Retransmit unacknowledged DATA chunks immediately */
10832afb3e84SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
10842afb3e84SRandall Stewart 			    SCTP_MOBILITY_FASTHANDOFF)) {
10852afb3e84SRandall Stewart 				sctp_net_immediate_retrans(stcb, net);
10862afb3e84SRandall Stewart 			}
10872afb3e84SRandall Stewart 			/* also, SET PRIMARY is maybe already sent */
10882afb3e84SRandall Stewart 		}
10892afb3e84SRandall Stewart 		return;
10902afb3e84SRandall Stewart 	}
10910053ed28SMichael Tuexen 
10922afb3e84SRandall Stewart 	/* Multiple local addresses exsist in the association.  */
10932afb3e84SRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
10942afb3e84SRandall Stewart 		/* clear any cached route and source address */
10952afb3e84SRandall Stewart 		if (net->ro.ro_rt) {
10962afb3e84SRandall Stewart 			RTFREE(net->ro.ro_rt);
10972afb3e84SRandall Stewart 			net->ro.ro_rt = NULL;
10982afb3e84SRandall Stewart 		}
10992afb3e84SRandall Stewart 		if (net->src_addr_selected) {
11002afb3e84SRandall Stewart 			sctp_free_ifa(net->ro._s_addr);
11012afb3e84SRandall Stewart 			net->ro._s_addr = NULL;
11022afb3e84SRandall Stewart 			net->src_addr_selected = 0;
11032afb3e84SRandall Stewart 		}
11042afb3e84SRandall Stewart 		/*
11052afb3e84SRandall Stewart 		 * Check if the nexthop is corresponding to the new address.
11062afb3e84SRandall Stewart 		 * If the new address is corresponding to the current
11072afb3e84SRandall Stewart 		 * nexthop, the path will be changed. If the new address is
11082afb3e84SRandall Stewart 		 * NOT corresponding to the current nexthop, the path will
11092afb3e84SRandall Stewart 		 * not be changed.
11102afb3e84SRandall Stewart 		 */
11112afb3e84SRandall Stewart 		SCTP_RTALLOC((sctp_route_t *)&net->ro,
1112d089f9b9SMichael Tuexen 		    stcb->sctp_ep->def_vrf_id,
1113d089f9b9SMichael Tuexen 		    stcb->sctp_ep->fibnum);
11142afb3e84SRandall Stewart 		if (net->ro.ro_rt == NULL)
11152afb3e84SRandall Stewart 			continue;
11162afb3e84SRandall Stewart 
11172afb3e84SRandall Stewart 		changed = 0;
1118e6194c2eSMichael Tuexen 		switch (net->ro._l_addr.sa.sa_family) {
1119e6194c2eSMichael Tuexen #ifdef INET
1120e6194c2eSMichael Tuexen 		case AF_INET:
1121e6194c2eSMichael Tuexen 			if (sctp_v4src_match_nexthop(newifa, (sctp_route_t *)&net->ro)) {
11222afb3e84SRandall Stewart 				changed = 1;
11232afb3e84SRandall Stewart 			}
1124e6194c2eSMichael Tuexen 			break;
11255e2c2d87SRandall Stewart #endif
1126e6194c2eSMichael Tuexen #ifdef INET6
1127e6194c2eSMichael Tuexen 		case AF_INET6:
1128e6194c2eSMichael Tuexen 			if (sctp_v6src_match_nexthop(
1129e6194c2eSMichael Tuexen 			    &newifa->address.sin6, (sctp_route_t *)&net->ro)) {
1130e6194c2eSMichael Tuexen 				changed = 1;
1131e6194c2eSMichael Tuexen 			}
1132e6194c2eSMichael Tuexen 			break;
1133e6194c2eSMichael Tuexen #endif
1134e6194c2eSMichael Tuexen 		default:
1135e6194c2eSMichael Tuexen 			break;
1136e6194c2eSMichael Tuexen 		}
11372afb3e84SRandall Stewart 		/*
11382afb3e84SRandall Stewart 		 * if the newly added address does not relate routing
11392afb3e84SRandall Stewart 		 * information, we skip.
11402afb3e84SRandall Stewart 		 */
11412afb3e84SRandall Stewart 		if (changed == 0)
11422afb3e84SRandall Stewart 			continue;
11432afb3e84SRandall Stewart 		/* Retransmit unacknowledged DATA chunks immediately */
11442afb3e84SRandall Stewart 		if (sctp_is_mobility_feature_on(stcb->sctp_ep,
11452afb3e84SRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) {
11462afb3e84SRandall Stewart 			sctp_net_immediate_retrans(stcb, net);
11472afb3e84SRandall Stewart 		}
11482afb3e84SRandall Stewart 		/* Send SET PRIMARY for this new address */
11492afb3e84SRandall Stewart 		if (net == stcb->asoc.primary_destination) {
11502afb3e84SRandall Stewart 			(void)sctp_asconf_queue_mgmt(stcb, newifa,
11512afb3e84SRandall Stewart 			    SCTP_SET_PRIM_ADDR);
11522afb3e84SRandall Stewart 		}
11532afb3e84SRandall Stewart 	}
11542afb3e84SRandall Stewart }
11552afb3e84SRandall Stewart 
11562dad8a55SRandall Stewart /*
1157f8829a4aSRandall Stewart  * process an ADD/DELETE IP ack from peer.
11581b649582SRandall Stewart  * addr: corresponding sctp_ifa to the address being added/deleted.
1159f8829a4aSRandall Stewart  * type: SCTP_ADD_IP_ADDRESS or SCTP_DEL_IP_ADDRESS.
1160f8829a4aSRandall Stewart  * flag: 1=success, 0=failure.
1161f8829a4aSRandall Stewart  */
1162f8829a4aSRandall Stewart static void
11637215cc1bSMichael Tuexen sctp_asconf_addr_mgmt_ack(struct sctp_tcb *stcb, struct sctp_ifa *addr, uint32_t flag)
1164f8829a4aSRandall Stewart {
1165f8829a4aSRandall Stewart 	/*
1166f8829a4aSRandall Stewart 	 * do the necessary asoc list work- if we get a failure indication,
11672dad8a55SRandall Stewart 	 * leave the address on the assoc's restricted list.  If we get a
11682dad8a55SRandall Stewart 	 * success indication, remove the address from the restricted list.
1169f8829a4aSRandall Stewart 	 */
1170f8829a4aSRandall Stewart 	/*
1171f8829a4aSRandall Stewart 	 * Note: this will only occur for ADD_IP_ADDRESS, since
1172f8829a4aSRandall Stewart 	 * DEL_IP_ADDRESS is never actually added to the list...
1173f8829a4aSRandall Stewart 	 */
1174f8829a4aSRandall Stewart 	if (flag) {
11751b649582SRandall Stewart 		/* success case, so remove from the restricted list */
11761b649582SRandall Stewart 		sctp_del_local_addr_restricted(stcb, addr);
11772dad8a55SRandall Stewart 
11783232788eSRandall Stewart 		if (sctp_is_mobility_feature_on(stcb->sctp_ep,
1179d55b0b1bSRandall Stewart 		    SCTP_MOBILITY_BASE) ||
1180d55b0b1bSRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
1181d55b0b1bSRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) {
11822afb3e84SRandall Stewart 			sctp_path_check_and_react(stcb, addr);
11832afb3e84SRandall Stewart 			return;
11842afb3e84SRandall Stewart 		}
11853232788eSRandall Stewart 		/* clear any cached/topologically incorrect source addresses */
11862dad8a55SRandall Stewart 		sctp_asconf_nets_cleanup(stcb, addr->ifn_p);
1187f8829a4aSRandall Stewart 	}
1188f8829a4aSRandall Stewart 	/* else, leave it on the list */
1189f8829a4aSRandall Stewart }
1190f8829a4aSRandall Stewart 
1191f8829a4aSRandall Stewart /*
11921b649582SRandall Stewart  * add an asconf add/delete/set primary IP address parameter to the queue.
1193f8829a4aSRandall Stewart  * type = SCTP_ADD_IP_ADDRESS, SCTP_DEL_IP_ADDRESS, SCTP_SET_PRIM_ADDR.
11941b649582SRandall Stewart  * returns 0 if queued, -1 if not queued/removed.
11951b649582SRandall Stewart  * NOTE: if adding, but a delete for the same address is already scheduled
11961b649582SRandall Stewart  * (and not yet sent out), simply remove it from queue.  Same for deleting
11971b649582SRandall Stewart  * an address already scheduled for add.  If a duplicate operation is found,
11981b649582SRandall Stewart  * ignore the new one.
1199f8829a4aSRandall Stewart  */
12001b649582SRandall Stewart static int
12011b649582SRandall Stewart sctp_asconf_queue_mgmt(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
120218e198d3SRandall Stewart     uint16_t type)
1203f8829a4aSRandall Stewart {
1204f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1205f8829a4aSRandall Stewart 
1206f8829a4aSRandall Stewart 	/* make sure the request isn't already in the queue */
12074a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1208f8829a4aSRandall Stewart 		/* address match? */
120942551e99SRandall Stewart 		if (sctp_asconf_addr_match(aa, &ifa->address.sa) == 0)
1210f8829a4aSRandall Stewart 			continue;
1211c54a18d2SRandall Stewart 		/*
1212c54a18d2SRandall Stewart 		 * is the request already in queue but not sent? pass the
1213c54a18d2SRandall Stewart 		 * request already sent in order to resolve the following
1214c54a18d2SRandall Stewart 		 * case: 1. arrival of ADD, then sent 2. arrival of DEL. we
1215c54a18d2SRandall Stewart 		 * can't remove the ADD request already sent 3. arrival of
1216c54a18d2SRandall Stewart 		 * ADD
1217c54a18d2SRandall Stewart 		 */
1218c54a18d2SRandall Stewart 		if (aa->ap.aph.ph.param_type == type && aa->sent == 0) {
1219f8829a4aSRandall Stewart 			return (-1);
1220f8829a4aSRandall Stewart 		}
1221f8829a4aSRandall Stewart 		/* is the negative request already in queue, and not sent */
12221b649582SRandall Stewart 		if ((aa->sent == 0) && (type == SCTP_ADD_IP_ADDRESS) &&
12231b649582SRandall Stewart 		    (aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS)) {
1224f8829a4aSRandall Stewart 			/* add requested, delete already queued */
1225f8829a4aSRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
12261b649582SRandall Stewart 			/* remove the ifa from the restricted list */
12271b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, ifa);
12281b649582SRandall Stewart 			/* free the asconf param */
1229207304d4SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
12301b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_mgmt: add removes queued entry\n");
12311b649582SRandall Stewart 			return (-1);
12321b649582SRandall Stewart 		}
12331b649582SRandall Stewart 		if ((aa->sent == 0) && (type == SCTP_DEL_IP_ADDRESS) &&
12341b649582SRandall Stewart 		    (aa->ap.aph.ph.param_type == SCTP_ADD_IP_ADDRESS)) {
12351b649582SRandall Stewart 			/* delete requested, add already queued */
12361b649582SRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
12371b649582SRandall Stewart 			/* remove the aa->ifa from the restricted list */
12381b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, aa->ifa);
12391b649582SRandall Stewart 			/* free the asconf param */
12401b649582SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
12411b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_mgmt: delete removes queued entry\n");
1242f8829a4aSRandall Stewart 			return (-1);
1243f8829a4aSRandall Stewart 		}
1244f8829a4aSRandall Stewart 	}			/* for each aa */
1245f8829a4aSRandall Stewart 
1246f8829a4aSRandall Stewart 	/* adding new request to the queue */
12471b649582SRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
12481b649582SRandall Stewart 	    SCTP_M_ASC_ADDR);
1249f8829a4aSRandall Stewart 	if (aa == NULL) {
1250f8829a4aSRandall Stewart 		/* didn't get memory */
12511b649582SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "asconf_queue_mgmt: failed to get memory!\n");
1252f8829a4aSRandall Stewart 		return (-1);
1253f8829a4aSRandall Stewart 	}
1254830d754dSRandall Stewart 	aa->special_del = 0;
1255f8829a4aSRandall Stewart 	/* fill in asconf address parameter fields */
1256f8829a4aSRandall Stewart 	/* top level elements are "networked" during send */
1257f8829a4aSRandall Stewart 	aa->ap.aph.ph.param_type = type;
1258f8829a4aSRandall Stewart 	aa->ifa = ifa;
1259bff64a4dSRandall Stewart 	atomic_add_int(&ifa->refcount, 1);
1260f8829a4aSRandall Stewart 	/* correlation_id filled in during send routine later... */
1261e6194c2eSMichael Tuexen 	switch (ifa->address.sa.sa_family) {
1262e6194c2eSMichael Tuexen #ifdef INET6
1263e6194c2eSMichael Tuexen 	case AF_INET6:
1264e6194c2eSMichael Tuexen 		{
1265f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1266f8829a4aSRandall Stewart 
126724aaac8dSMichael Tuexen 			sin6 = &ifa->address.sin6;
1268f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
1269f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv6addr_param));
12701b649582SRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) +
1271f8829a4aSRandall Stewart 			    sizeof(struct sctp_ipv6addr_param);
1272f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin6->sin6_addr,
1273f8829a4aSRandall Stewart 			    sizeof(struct in6_addr));
1274e6194c2eSMichael Tuexen 			break;
1275e6194c2eSMichael Tuexen 		}
1276e6194c2eSMichael Tuexen #endif
1277e6194c2eSMichael Tuexen #ifdef INET
1278e6194c2eSMichael Tuexen 	case AF_INET:
1279e6194c2eSMichael Tuexen 		{
12801b649582SRandall Stewart 			struct sockaddr_in *sin;
1281f8829a4aSRandall Stewart 
128224aaac8dSMichael Tuexen 			sin = &ifa->address.sin;
1283f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
1284f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv4addr_param));
12851b649582SRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) +
1286f8829a4aSRandall Stewart 			    sizeof(struct sctp_ipv4addr_param);
1287f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin->sin_addr,
1288f8829a4aSRandall Stewart 			    sizeof(struct in_addr));
1289e6194c2eSMichael Tuexen 			break;
1290e6194c2eSMichael Tuexen 		}
1291e6194c2eSMichael Tuexen #endif
1292e6194c2eSMichael Tuexen 	default:
1293f8829a4aSRandall Stewart 		/* invalid family! */
1294207304d4SRandall Stewart 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
12953232788eSRandall Stewart 		sctp_free_ifa(ifa);
1296f8829a4aSRandall Stewart 		return (-1);
1297f8829a4aSRandall Stewart 	}
1298f8829a4aSRandall Stewart 	aa->sent = 0;		/* clear sent flag */
1299f8829a4aSRandall Stewart 
1300f8829a4aSRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
1301f8829a4aSRandall Stewart #ifdef SCTP_DEBUG
1302dec0177dSRandall Stewart 	if (SCTP_BASE_SYSCTL(sctp_debug_on) & SCTP_DEBUG_ASCONF2) {
1303c54a18d2SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
1304c54a18d2SRandall Stewart 			SCTP_PRINTF("asconf_queue_mgmt: inserted asconf ADD_IP_ADDRESS: ");
130588a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1306c54a18d2SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
13071b649582SRandall Stewart 			SCTP_PRINTF("asconf_queue_mgmt: appended asconf DEL_IP_ADDRESS: ");
130888a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1309f8829a4aSRandall Stewart 		} else {
13101b649582SRandall Stewart 			SCTP_PRINTF("asconf_queue_mgmt: appended asconf SET_PRIM_ADDR: ");
131188a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1312f8829a4aSRandall Stewart 		}
1313f8829a4aSRandall Stewart 	}
1314ad81507eSRandall Stewart #endif
1315f8829a4aSRandall Stewart 
1316f8829a4aSRandall Stewart 	return (0);
1317f8829a4aSRandall Stewart }
1318f8829a4aSRandall Stewart 
13191b649582SRandall Stewart 
13201b649582SRandall Stewart /*
13211b649582SRandall Stewart  * add an asconf operation for the given ifa and type.
13221b649582SRandall Stewart  * type = SCTP_ADD_IP_ADDRESS, SCTP_DEL_IP_ADDRESS, SCTP_SET_PRIM_ADDR.
13231b649582SRandall Stewart  * returns 0 if completed, -1 if not completed, 1 if immediate send is
13241b649582SRandall Stewart  * advisable.
13251b649582SRandall Stewart  */
13261b649582SRandall Stewart static int
13271b649582SRandall Stewart sctp_asconf_queue_add(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
13281b649582SRandall Stewart     uint16_t type)
13291b649582SRandall Stewart {
13301b649582SRandall Stewart 	uint32_t status;
13311b649582SRandall Stewart 	int pending_delete_queued = 0;
1332790a758dSMichael Tuexen 	int last;
13331b649582SRandall Stewart 
13341b649582SRandall Stewart 	/* see if peer supports ASCONF */
1335c79bec9cSMichael Tuexen 	if (stcb->asoc.asconf_supported == 0) {
13361b649582SRandall Stewart 		return (-1);
13371b649582SRandall Stewart 	}
13380053ed28SMichael Tuexen 
13391b649582SRandall Stewart 	/*
13401b649582SRandall Stewart 	 * if this is deleting the last address from the assoc, mark it as
13411b649582SRandall Stewart 	 * pending.
13421b649582SRandall Stewart 	 */
1343790a758dSMichael Tuexen 	if ((type == SCTP_DEL_IP_ADDRESS) && !stcb->asoc.asconf_del_pending) {
1344790a758dSMichael Tuexen 		if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1345790a758dSMichael Tuexen 			last = (sctp_local_addr_count(stcb) == 0);
1346790a758dSMichael Tuexen 		} else {
1347790a758dSMichael Tuexen 			last = (sctp_local_addr_count(stcb) == 1);
1348790a758dSMichael Tuexen 		}
1349790a758dSMichael Tuexen 		if (last) {
13501b649582SRandall Stewart 			/* set the pending delete info only */
13511b649582SRandall Stewart 			stcb->asoc.asconf_del_pending = 1;
13521b649582SRandall Stewart 			stcb->asoc.asconf_addr_del_pending = ifa;
13531b649582SRandall Stewart 			atomic_add_int(&ifa->refcount, 1);
13541b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2,
13551b649582SRandall Stewart 			    "asconf_queue_add: mark delete last address pending\n");
13561b649582SRandall Stewart 			return (-1);
13571b649582SRandall Stewart 		}
1358790a758dSMichael Tuexen 	}
13590053ed28SMichael Tuexen 
1360c54a18d2SRandall Stewart 	/* queue an asconf parameter */
1361c54a18d2SRandall Stewart 	status = sctp_asconf_queue_mgmt(stcb, ifa, type);
1362c54a18d2SRandall Stewart 
13631b649582SRandall Stewart 	/*
13641b649582SRandall Stewart 	 * if this is an add, and there is a delete also pending (i.e. the
13651b649582SRandall Stewart 	 * last local address is being changed), queue the pending delete
13661b649582SRandall Stewart 	 * too.
13671b649582SRandall Stewart 	 */
1368c54a18d2SRandall Stewart 	if ((type == SCTP_ADD_IP_ADDRESS) && stcb->asoc.asconf_del_pending && (status == 0)) {
13691b649582SRandall Stewart 		/* queue in the pending delete */
13701b649582SRandall Stewart 		if (sctp_asconf_queue_mgmt(stcb,
13711b649582SRandall Stewart 		    stcb->asoc.asconf_addr_del_pending,
13721b649582SRandall Stewart 		    SCTP_DEL_IP_ADDRESS) == 0) {
137347d16bf9SMichael Tuexen 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_add: queuing pending delete\n");
13741b649582SRandall Stewart 			pending_delete_queued = 1;
13751b649582SRandall Stewart 			/* clear out the pending delete info */
13761b649582SRandall Stewart 			stcb->asoc.asconf_del_pending = 0;
13771b649582SRandall Stewart 			sctp_free_ifa(stcb->asoc.asconf_addr_del_pending);
13781b649582SRandall Stewart 			stcb->asoc.asconf_addr_del_pending = NULL;
13791b649582SRandall Stewart 		}
13801b649582SRandall Stewart 	}
13810053ed28SMichael Tuexen 
1382c54a18d2SRandall Stewart 	if (pending_delete_queued) {
13831b649582SRandall Stewart 		struct sctp_nets *net;
13841b649582SRandall Stewart 
13851b649582SRandall Stewart 		/*
13861b649582SRandall Stewart 		 * since we know that the only/last address is now being
13871b649582SRandall Stewart 		 * changed in this case, reset the cwnd/rto on all nets to
13881b649582SRandall Stewart 		 * start as a new address and path.  Also clear the error
13891b649582SRandall Stewart 		 * counts to give the assoc the best chance to complete the
13901b649582SRandall Stewart 		 * address change.
13911b649582SRandall Stewart 		 */
13921b649582SRandall Stewart 		TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
13931b649582SRandall Stewart 			stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb,
13941b649582SRandall Stewart 			    net);
13951b649582SRandall Stewart 			net->RTO = 0;
13961b649582SRandall Stewart 			net->error_count = 0;
13971b649582SRandall Stewart 		}
13981b649582SRandall Stewart 		stcb->asoc.overall_error_count = 0;
1399b3f1ea41SRandall Stewart 		if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_THRESHOLD_LOGGING) {
1400c4739e2fSRandall Stewart 			sctp_misc_ints(SCTP_THRESHOLD_CLEAR,
1401c4739e2fSRandall Stewart 			    stcb->asoc.overall_error_count,
1402c4739e2fSRandall Stewart 			    0,
1403c4739e2fSRandall Stewart 			    SCTP_FROM_SCTP_ASCONF,
1404c4739e2fSRandall Stewart 			    __LINE__);
1405c4739e2fSRandall Stewart 		}
14060053ed28SMichael Tuexen 
14071b649582SRandall Stewart 		/* queue in an advisory set primary too */
14081b649582SRandall Stewart 		(void)sctp_asconf_queue_mgmt(stcb, ifa, SCTP_SET_PRIM_ADDR);
14091b649582SRandall Stewart 		/* let caller know we should send this out immediately */
14101b649582SRandall Stewart 		status = 1;
14111b649582SRandall Stewart 	}
14121b649582SRandall Stewart 	return (status);
14131b649582SRandall Stewart }
14141b649582SRandall Stewart 
14153232788eSRandall Stewart /*-
14163232788eSRandall Stewart  * add an asconf delete IP address parameter to the queue by sockaddr and
14173232788eSRandall Stewart  * possibly with no sctp_ifa available.  This is only called by the routine
14183232788eSRandall Stewart  * that checks the addresses in an INIT-ACK against the current address list.
1419f8829a4aSRandall Stewart  * returns 0 if completed, non-zero if not completed.
14203232788eSRandall Stewart  * NOTE: if an add is already scheduled (and not yet sent out), simply
14213232788eSRandall Stewart  * remove it from queue.  If a duplicate operation is found, ignore the
14223232788eSRandall Stewart  * new one.
1423f8829a4aSRandall Stewart  */
14241b649582SRandall Stewart static int
14253232788eSRandall Stewart sctp_asconf_queue_sa_delete(struct sctp_tcb *stcb, struct sockaddr *sa)
1426f8829a4aSRandall Stewart {
1427bff64a4dSRandall Stewart 	struct sctp_ifa *ifa;
1428f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1429f8829a4aSRandall Stewart 
1430ad81507eSRandall Stewart 	if (stcb == NULL) {
1431ad81507eSRandall Stewart 		return (-1);
1432ad81507eSRandall Stewart 	}
1433f8829a4aSRandall Stewart 	/* see if peer supports ASCONF */
1434c79bec9cSMichael Tuexen 	if (stcb->asoc.asconf_supported == 0) {
1435f8829a4aSRandall Stewart 		return (-1);
1436f8829a4aSRandall Stewart 	}
1437f8829a4aSRandall Stewart 	/* make sure the request isn't already in the queue */
14384a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1439f8829a4aSRandall Stewart 		/* address match? */
1440f8829a4aSRandall Stewart 		if (sctp_asconf_addr_match(aa, sa) == 0)
1441f8829a4aSRandall Stewart 			continue;
1442f8829a4aSRandall Stewart 		/* is the request already in queue (sent or not) */
14433232788eSRandall Stewart 		if (aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS) {
1444f8829a4aSRandall Stewart 			return (-1);
1445f8829a4aSRandall Stewart 		}
1446f8829a4aSRandall Stewart 		/* is the negative request already in queue, and not sent */
1447f8829a4aSRandall Stewart 		if (aa->sent == 1)
1448f8829a4aSRandall Stewart 			continue;
14493232788eSRandall Stewart 		if (aa->ap.aph.ph.param_type == SCTP_ADD_IP_ADDRESS) {
14503232788eSRandall Stewart 			/* add already queued, so remove existing entry */
1451f8829a4aSRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
14521b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, aa->ifa);
1453f8829a4aSRandall Stewart 			/* free the entry */
1454207304d4SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
1455f8829a4aSRandall Stewart 			return (-1);
1456f8829a4aSRandall Stewart 		}
1457f8829a4aSRandall Stewart 	}			/* for each aa */
14583232788eSRandall Stewart 
14593232788eSRandall Stewart 	/* find any existing ifa-- NOTE ifa CAN be allowed to be NULL */
1460448e8596SMichael Tuexen 	ifa = sctp_find_ifa_by_addr(sa, stcb->asoc.vrf_id, SCTP_ADDR_NOT_LOCKED);
14613232788eSRandall Stewart 
1462f8829a4aSRandall Stewart 	/* adding new request to the queue */
14631b649582SRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
14641b649582SRandall Stewart 	    SCTP_M_ASC_ADDR);
1465f8829a4aSRandall Stewart 	if (aa == NULL) {
1466f8829a4aSRandall Stewart 		/* didn't get memory */
1467ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
14683232788eSRandall Stewart 		    "sctp_asconf_queue_sa_delete: failed to get memory!\n");
1469f8829a4aSRandall Stewart 		return (-1);
1470f8829a4aSRandall Stewart 	}
1471830d754dSRandall Stewart 	aa->special_del = 0;
1472f8829a4aSRandall Stewart 	/* fill in asconf address parameter fields */
1473f8829a4aSRandall Stewart 	/* top level elements are "networked" during send */
14743232788eSRandall Stewart 	aa->ap.aph.ph.param_type = SCTP_DEL_IP_ADDRESS;
1475bff64a4dSRandall Stewart 	aa->ifa = ifa;
14763232788eSRandall Stewart 	if (ifa)
1477bff64a4dSRandall Stewart 		atomic_add_int(&ifa->refcount, 1);
1478f8829a4aSRandall Stewart 	/* correlation_id filled in during send routine later... */
1479e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
1480e6194c2eSMichael Tuexen #ifdef INET6
1481e6194c2eSMichael Tuexen 	case AF_INET6:
1482e6194c2eSMichael Tuexen 		{
1483f8829a4aSRandall Stewart 			/* IPv6 address */
1484f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1485f8829a4aSRandall Stewart 
1486f8829a4aSRandall Stewart 			sin6 = (struct sockaddr_in6 *)sa;
1487f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
1488f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv6addr_param));
1489f8829a4aSRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) + sizeof(struct sctp_ipv6addr_param);
1490f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin6->sin6_addr,
1491f8829a4aSRandall Stewart 			    sizeof(struct in6_addr));
1492e6194c2eSMichael Tuexen 			break;
1493e6194c2eSMichael Tuexen 		}
1494e6194c2eSMichael Tuexen #endif
1495e6194c2eSMichael Tuexen #ifdef INET
1496e6194c2eSMichael Tuexen 	case AF_INET:
1497e6194c2eSMichael Tuexen 		{
1498f8829a4aSRandall Stewart 			/* IPv4 address */
1499f8829a4aSRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
1500f8829a4aSRandall Stewart 
1501f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
1502f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv4addr_param));
1503f8829a4aSRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) + sizeof(struct sctp_ipv4addr_param);
1504f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin->sin_addr,
1505f8829a4aSRandall Stewart 			    sizeof(struct in_addr));
1506e6194c2eSMichael Tuexen 			break;
1507e6194c2eSMichael Tuexen 		}
1508e6194c2eSMichael Tuexen #endif
1509e6194c2eSMichael Tuexen 	default:
1510f8829a4aSRandall Stewart 		/* invalid family! */
1511207304d4SRandall Stewart 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
15123232788eSRandall Stewart 		if (ifa)
15133232788eSRandall Stewart 			sctp_free_ifa(ifa);
1514f8829a4aSRandall Stewart 		return (-1);
1515f8829a4aSRandall Stewart 	}
1516f8829a4aSRandall Stewart 	aa->sent = 0;		/* clear sent flag */
1517f8829a4aSRandall Stewart 
15183232788eSRandall Stewart 	/* delete goes to the back of the queue */
1519f8829a4aSRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
1520f8829a4aSRandall Stewart 
1521c99efcf6SRandall Stewart 	/* sa_ignore MEMLEAK {memory is put on the tailq} */
1522f8829a4aSRandall Stewart 	return (0);
1523f8829a4aSRandall Stewart }
1524f8829a4aSRandall Stewart 
1525f8829a4aSRandall Stewart /*
1526f8829a4aSRandall Stewart  * find a specific asconf param on our "sent" queue
1527f8829a4aSRandall Stewart  */
1528f8829a4aSRandall Stewart static struct sctp_asconf_addr *
1529f8829a4aSRandall Stewart sctp_asconf_find_param(struct sctp_tcb *stcb, uint32_t correlation_id)
1530f8829a4aSRandall Stewart {
1531f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa;
1532f8829a4aSRandall Stewart 
1533f8829a4aSRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
1534f8829a4aSRandall Stewart 		if (aa->ap.aph.correlation_id == correlation_id &&
1535f8829a4aSRandall Stewart 		    aa->sent == 1) {
1536f8829a4aSRandall Stewart 			/* found it */
1537f8829a4aSRandall Stewart 			return (aa);
1538f8829a4aSRandall Stewart 		}
1539f8829a4aSRandall Stewart 	}
1540f8829a4aSRandall Stewart 	/* didn't find it */
1541f8829a4aSRandall Stewart 	return (NULL);
1542f8829a4aSRandall Stewart }
1543f8829a4aSRandall Stewart 
1544f8829a4aSRandall Stewart /*
1545f8829a4aSRandall Stewart  * process an SCTP_ERROR_CAUSE_IND for a ASCONF-ACK parameter and do
1546f8829a4aSRandall Stewart  * notifications based on the error response
1547f8829a4aSRandall Stewart  */
1548f8829a4aSRandall Stewart static void
1549c79bec9cSMichael Tuexen sctp_asconf_process_error(struct sctp_tcb *stcb SCTP_UNUSED,
1550f8829a4aSRandall Stewart     struct sctp_asconf_paramhdr *aph)
1551f8829a4aSRandall Stewart {
1552f8829a4aSRandall Stewart 	struct sctp_error_cause *eh;
1553f8829a4aSRandall Stewart 	struct sctp_paramhdr *ph;
1554f8829a4aSRandall Stewart 	uint16_t param_type;
1555f8829a4aSRandall Stewart 	uint16_t error_code;
1556f8829a4aSRandall Stewart 
1557f8829a4aSRandall Stewart 	eh = (struct sctp_error_cause *)(aph + 1);
1558f8829a4aSRandall Stewart 	ph = (struct sctp_paramhdr *)(eh + 1);
1559f8829a4aSRandall Stewart 	/* validate lengths */
1560f8829a4aSRandall Stewart 	if (htons(eh->length) + sizeof(struct sctp_error_cause) >
1561f8829a4aSRandall Stewart 	    htons(aph->ph.param_length)) {
1562f8829a4aSRandall Stewart 		/* invalid error cause length */
1563ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1564ad81507eSRandall Stewart 		    "asconf_process_error: cause element too long\n");
1565f8829a4aSRandall Stewart 		return;
1566f8829a4aSRandall Stewart 	}
1567f8829a4aSRandall Stewart 	if (htons(ph->param_length) + sizeof(struct sctp_paramhdr) >
1568f8829a4aSRandall Stewart 	    htons(eh->length)) {
1569f8829a4aSRandall Stewart 		/* invalid included TLV length */
1570ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1571ad81507eSRandall Stewart 		    "asconf_process_error: included TLV too long\n");
1572f8829a4aSRandall Stewart 		return;
1573f8829a4aSRandall Stewart 	}
1574f8829a4aSRandall Stewart 	/* which error code ? */
1575f8829a4aSRandall Stewart 	error_code = ntohs(eh->code);
1576f8829a4aSRandall Stewart 	param_type = ntohs(aph->ph.param_type);
1577f8829a4aSRandall Stewart 	/* FIX: this should go back up the REMOTE_ERROR ULP notify */
1578f8829a4aSRandall Stewart 	switch (error_code) {
1579f8829a4aSRandall Stewart 	case SCTP_CAUSE_RESOURCE_SHORTAGE:
1580f8829a4aSRandall Stewart 		/* we allow ourselves to "try again" for this error */
1581f8829a4aSRandall Stewart 		break;
1582f8829a4aSRandall Stewart 	default:
1583f8829a4aSRandall Stewart 		/* peer can't handle it... */
1584f8829a4aSRandall Stewart 		switch (param_type) {
1585f8829a4aSRandall Stewart 		case SCTP_ADD_IP_ADDRESS:
1586f8829a4aSRandall Stewart 		case SCTP_DEL_IP_ADDRESS:
1587f8829a4aSRandall Stewart 		case SCTP_SET_PRIM_ADDR:
1588f8829a4aSRandall Stewart 			break;
1589f8829a4aSRandall Stewart 		default:
1590f8829a4aSRandall Stewart 			break;
1591f8829a4aSRandall Stewart 		}
1592f8829a4aSRandall Stewart 	}
1593f8829a4aSRandall Stewart }
1594f8829a4aSRandall Stewart 
1595f8829a4aSRandall Stewart /*
159618e198d3SRandall Stewart  * process an asconf queue param.
159718e198d3SRandall Stewart  * aparam: parameter to process, will be removed from the queue.
159818e198d3SRandall Stewart  * flag: 1=success case, 0=failure case
1599f8829a4aSRandall Stewart  */
1600f8829a4aSRandall Stewart static void
1601f8829a4aSRandall Stewart sctp_asconf_process_param_ack(struct sctp_tcb *stcb,
1602f8829a4aSRandall Stewart     struct sctp_asconf_addr *aparam, uint32_t flag)
1603f8829a4aSRandall Stewart {
1604f8829a4aSRandall Stewart 	uint16_t param_type;
1605f8829a4aSRandall Stewart 
1606f8829a4aSRandall Stewart 	/* process this param */
1607f8829a4aSRandall Stewart 	param_type = aparam->ap.aph.ph.param_type;
1608f8829a4aSRandall Stewart 	switch (param_type) {
1609f8829a4aSRandall Stewart 	case SCTP_ADD_IP_ADDRESS:
1610ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1611ad81507eSRandall Stewart 		    "process_param_ack: added IP address\n");
16127215cc1bSMichael Tuexen 		sctp_asconf_addr_mgmt_ack(stcb, aparam->ifa, flag);
1613f8829a4aSRandall Stewart 		break;
1614f8829a4aSRandall Stewart 	case SCTP_DEL_IP_ADDRESS:
1615ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1616ad81507eSRandall Stewart 		    "process_param_ack: deleted IP address\n");
1617f8829a4aSRandall Stewart 		/* nothing really to do... lists already updated */
1618f8829a4aSRandall Stewart 		break;
1619f8829a4aSRandall Stewart 	case SCTP_SET_PRIM_ADDR:
1620c54a18d2SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1621c54a18d2SRandall Stewart 		    "process_param_ack: set primary IP address\n");
1622f8829a4aSRandall Stewart 		/* nothing to do... peer may start using this addr */
1623f8829a4aSRandall Stewart 		break;
1624f8829a4aSRandall Stewart 	default:
1625f8829a4aSRandall Stewart 		/* should NEVER happen */
1626f8829a4aSRandall Stewart 		break;
1627f8829a4aSRandall Stewart 	}
1628f8829a4aSRandall Stewart 
1629f8829a4aSRandall Stewart 	/* remove the param and free it */
1630f8829a4aSRandall Stewart 	TAILQ_REMOVE(&stcb->asoc.asconf_queue, aparam, next);
16313232788eSRandall Stewart 	if (aparam->ifa)
1632bff64a4dSRandall Stewart 		sctp_free_ifa(aparam->ifa);
1633207304d4SRandall Stewart 	SCTP_FREE(aparam, SCTP_M_ASC_ADDR);
1634f8829a4aSRandall Stewart }
1635f8829a4aSRandall Stewart 
1636f8829a4aSRandall Stewart /*
1637f8829a4aSRandall Stewart  * cleanup from a bad asconf ack parameter
1638f8829a4aSRandall Stewart  */
1639f8829a4aSRandall Stewart static void
1640c79bec9cSMichael Tuexen sctp_asconf_ack_clear(struct sctp_tcb *stcb SCTP_UNUSED)
1641f8829a4aSRandall Stewart {
1642f8829a4aSRandall Stewart 	/* assume peer doesn't really know how to do asconfs */
1643f8829a4aSRandall Stewart 	/* XXX we could free the pending queue here */
1644c79bec9cSMichael Tuexen 
1645f8829a4aSRandall Stewart }
1646f8829a4aSRandall Stewart 
1647f8829a4aSRandall Stewart void
1648f8829a4aSRandall Stewart sctp_handle_asconf_ack(struct mbuf *m, int offset,
1649f8829a4aSRandall Stewart     struct sctp_asconf_ack_chunk *cp, struct sctp_tcb *stcb,
16503232788eSRandall Stewart     struct sctp_nets *net, int *abort_no_unlock)
1651f8829a4aSRandall Stewart {
1652f8829a4aSRandall Stewart 	struct sctp_association *asoc;
1653f8829a4aSRandall Stewart 	uint32_t serial_num;
1654f8829a4aSRandall Stewart 	uint16_t ack_length;
1655f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
1656f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1657f8829a4aSRandall Stewart 	uint32_t last_error_id = 0;	/* last error correlation id */
1658f8829a4aSRandall Stewart 	uint32_t id;
1659f8829a4aSRandall Stewart 	struct sctp_asconf_addr *ap;
1660f8829a4aSRandall Stewart 
1661f8829a4aSRandall Stewart 	/* asconf param buffer */
1662f42a358aSRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
1663f8829a4aSRandall Stewart 
1664f8829a4aSRandall Stewart 	/* verify minimum length */
1665f8829a4aSRandall Stewart 	if (ntohs(cp->ch.chunk_length) < sizeof(struct sctp_asconf_ack_chunk)) {
1666ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1667ad81507eSRandall Stewart 		    "handle_asconf_ack: chunk too small = %xh\n",
1668f8829a4aSRandall Stewart 		    ntohs(cp->ch.chunk_length));
1669f8829a4aSRandall Stewart 		return;
1670f8829a4aSRandall Stewart 	}
1671f8829a4aSRandall Stewart 	asoc = &stcb->asoc;
1672f8829a4aSRandall Stewart 	serial_num = ntohl(cp->serial_number);
1673f8829a4aSRandall Stewart 
1674f8829a4aSRandall Stewart 	/*
1675f8829a4aSRandall Stewart 	 * NOTE: we may want to handle this differently- currently, we will
1676f8829a4aSRandall Stewart 	 * abort when we get an ack for the expected serial number + 1 (eg.
1677f8829a4aSRandall Stewart 	 * we didn't send it), process an ack normally if it is the expected
1678f8829a4aSRandall Stewart 	 * serial number, and re-send the previous ack for *ALL* other
1679f8829a4aSRandall Stewart 	 * serial numbers
1680f8829a4aSRandall Stewart 	 */
1681f8829a4aSRandall Stewart 
1682f8829a4aSRandall Stewart 	/*
1683f8829a4aSRandall Stewart 	 * if the serial number is the next expected, but I didn't send it,
1684f8829a4aSRandall Stewart 	 * abort the asoc, since someone probably just hijacked us...
1685f8829a4aSRandall Stewart 	 */
1686f8829a4aSRandall Stewart 	if (serial_num == (asoc->asconf_seq_out + 1)) {
1687267dbe63SMichael Tuexen 		struct mbuf *op_err;
1688267dbe63SMichael Tuexen 		char msg[SCTP_DIAG_INFO_LEN];
1689267dbe63SMichael Tuexen 
1690ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf_ack: got unexpected next serial number! Aborting asoc!\n");
1691267dbe63SMichael Tuexen 		snprintf(msg, sizeof(msg), "Never sent serial number %8.8x",
1692267dbe63SMichael Tuexen 		    serial_num);
1693267dbe63SMichael Tuexen 		op_err = sctp_generate_cause(SCTP_CAUSE_PROTOCOL_VIOLATION, msg);
1694267dbe63SMichael Tuexen 		sctp_abort_an_association(stcb->sctp_ep, stcb, op_err, SCTP_SO_NOT_LOCKED);
16953232788eSRandall Stewart 		*abort_no_unlock = 1;
1696f8829a4aSRandall Stewart 		return;
1697f8829a4aSRandall Stewart 	}
1698c54a18d2SRandall Stewart 	if (serial_num != asoc->asconf_seq_out_acked + 1) {
1699f8829a4aSRandall Stewart 		/* got a duplicate/unexpected ASCONF-ACK */
1700ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf_ack: got duplicate/unexpected serial number = %xh (expected = %xh)\n",
1701c54a18d2SRandall Stewart 		    serial_num, asoc->asconf_seq_out_acked + 1);
1702f8829a4aSRandall Stewart 		return;
1703f8829a4aSRandall Stewart 	}
17040053ed28SMichael Tuexen 
1705c54a18d2SRandall Stewart 	if (serial_num == asoc->asconf_seq_out - 1) {
1706f8829a4aSRandall Stewart 		/* stop our timer */
17073c503c28SRandall Stewart 		sctp_timer_stop(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep, stcb, net,
1708b7d130beSMichael Tuexen 		    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_5);
1709c54a18d2SRandall Stewart 	}
17100053ed28SMichael Tuexen 
1711f8829a4aSRandall Stewart 	/* process the ASCONF-ACK contents */
1712f8829a4aSRandall Stewart 	ack_length = ntohs(cp->ch.chunk_length) -
1713f8829a4aSRandall Stewart 	    sizeof(struct sctp_asconf_ack_chunk);
1714f8829a4aSRandall Stewart 	offset += sizeof(struct sctp_asconf_ack_chunk);
1715f8829a4aSRandall Stewart 	/* process through all parameters */
1716f8829a4aSRandall Stewart 	while (ack_length >= sizeof(struct sctp_asconf_paramhdr)) {
1717f8829a4aSRandall Stewart 		unsigned int param_length, param_type;
1718f8829a4aSRandall Stewart 
1719f8829a4aSRandall Stewart 		/* get pointer to next asconf parameter */
1720f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset,
1721f8829a4aSRandall Stewart 		    sizeof(struct sctp_asconf_paramhdr), aparam_buf);
1722f8829a4aSRandall Stewart 		if (aph == NULL) {
1723f8829a4aSRandall Stewart 			/* can't get an asconf paramhdr */
1724f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1725f8829a4aSRandall Stewart 			return;
1726f8829a4aSRandall Stewart 		}
1727f8829a4aSRandall Stewart 		param_type = ntohs(aph->ph.param_type);
1728f8829a4aSRandall Stewart 		param_length = ntohs(aph->ph.param_length);
1729f8829a4aSRandall Stewart 		if (param_length > ack_length) {
1730f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1731f8829a4aSRandall Stewart 			return;
1732f8829a4aSRandall Stewart 		}
1733f8829a4aSRandall Stewart 		if (param_length < sizeof(struct sctp_paramhdr)) {
1734f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1735f8829a4aSRandall Stewart 			return;
1736f8829a4aSRandall Stewart 		}
1737f8829a4aSRandall Stewart 		/* get the complete parameter... */
1738f8829a4aSRandall Stewart 		if (param_length > sizeof(aparam_buf)) {
1739ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
1740ad81507eSRandall Stewart 			    "param length (%u) larger than buffer size!\n", param_length);
1741f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1742f8829a4aSRandall Stewart 			return;
1743f8829a4aSRandall Stewart 		}
1744f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, param_length, aparam_buf);
1745f8829a4aSRandall Stewart 		if (aph == NULL) {
1746f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1747f8829a4aSRandall Stewart 			return;
1748f8829a4aSRandall Stewart 		}
1749f8829a4aSRandall Stewart 		/* correlation_id is transparent to peer, no ntohl needed */
1750f8829a4aSRandall Stewart 		id = aph->correlation_id;
1751f8829a4aSRandall Stewart 
1752f8829a4aSRandall Stewart 		switch (param_type) {
1753f8829a4aSRandall Stewart 		case SCTP_ERROR_CAUSE_IND:
1754f8829a4aSRandall Stewart 			last_error_id = id;
1755f8829a4aSRandall Stewart 			/* find the corresponding asconf param in our queue */
1756f8829a4aSRandall Stewart 			ap = sctp_asconf_find_param(stcb, id);
1757f8829a4aSRandall Stewart 			if (ap == NULL) {
1758f8829a4aSRandall Stewart 				/* hmm... can't find this in our queue! */
1759f8829a4aSRandall Stewart 				break;
1760f8829a4aSRandall Stewart 			}
1761f8829a4aSRandall Stewart 			/* process the parameter, failed flag */
1762f8829a4aSRandall Stewart 			sctp_asconf_process_param_ack(stcb, ap, 0);
1763f8829a4aSRandall Stewart 			/* process the error response */
1764f8829a4aSRandall Stewart 			sctp_asconf_process_error(stcb, aph);
1765f8829a4aSRandall Stewart 			break;
1766f8829a4aSRandall Stewart 		case SCTP_SUCCESS_REPORT:
1767f8829a4aSRandall Stewart 			/* find the corresponding asconf param in our queue */
1768f8829a4aSRandall Stewart 			ap = sctp_asconf_find_param(stcb, id);
1769f8829a4aSRandall Stewart 			if (ap == NULL) {
1770f8829a4aSRandall Stewart 				/* hmm... can't find this in our queue! */
1771f8829a4aSRandall Stewart 				break;
1772f8829a4aSRandall Stewart 			}
1773f8829a4aSRandall Stewart 			/* process the parameter, success flag */
1774f8829a4aSRandall Stewart 			sctp_asconf_process_param_ack(stcb, ap, 1);
1775f8829a4aSRandall Stewart 			break;
1776f8829a4aSRandall Stewart 		default:
1777f8829a4aSRandall Stewart 			break;
1778f8829a4aSRandall Stewart 		}		/* switch */
1779f8829a4aSRandall Stewart 
1780f8829a4aSRandall Stewart 		/* update remaining ASCONF-ACK message length to process */
1781f8829a4aSRandall Stewart 		ack_length -= SCTP_SIZE32(param_length);
1782f8829a4aSRandall Stewart 		if (ack_length <= 0) {
1783f8829a4aSRandall Stewart 			/* no more data in the mbuf chain */
1784f8829a4aSRandall Stewart 			break;
1785f8829a4aSRandall Stewart 		}
1786f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(param_length);
1787f8829a4aSRandall Stewart 	}			/* while */
1788f8829a4aSRandall Stewart 
1789f8829a4aSRandall Stewart 	/*
1790f8829a4aSRandall Stewart 	 * if there are any "sent" params still on the queue, these are
1791f8829a4aSRandall Stewart 	 * implicitly "success", or "failed" (if we got an error back) ...
1792f8829a4aSRandall Stewart 	 * so process these appropriately
1793f8829a4aSRandall Stewart 	 *
1794f8829a4aSRandall Stewart 	 * we assume that the correlation_id's are monotonically increasing
1795f8829a4aSRandall Stewart 	 * beginning from 1 and that we don't have *that* many outstanding
1796f8829a4aSRandall Stewart 	 * at any given time
1797f8829a4aSRandall Stewart 	 */
1798f8829a4aSRandall Stewart 	if (last_error_id == 0)
1799f8829a4aSRandall Stewart 		last_error_id--;	/* set to "max" value */
18004a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1801f8829a4aSRandall Stewart 		if (aa->sent == 1) {
1802f8829a4aSRandall Stewart 			/*
1803f8829a4aSRandall Stewart 			 * implicitly successful or failed if correlation_id
1804f8829a4aSRandall Stewart 			 * < last_error_id, then success else, failure
1805f8829a4aSRandall Stewart 			 */
1806f8829a4aSRandall Stewart 			if (aa->ap.aph.correlation_id < last_error_id)
180718e198d3SRandall Stewart 				sctp_asconf_process_param_ack(stcb, aa, 1);
1808f8829a4aSRandall Stewart 			else
180918e198d3SRandall Stewart 				sctp_asconf_process_param_ack(stcb, aa, 0);
1810f8829a4aSRandall Stewart 		} else {
1811f8829a4aSRandall Stewart 			/*
1812f8829a4aSRandall Stewart 			 * since we always process in order (FIFO queue) if
1813f8829a4aSRandall Stewart 			 * we reach one that hasn't been sent, the rest
1814f8829a4aSRandall Stewart 			 * should not have been sent either. so, we're
1815f8829a4aSRandall Stewart 			 * done...
1816f8829a4aSRandall Stewart 			 */
1817f8829a4aSRandall Stewart 			break;
1818f8829a4aSRandall Stewart 		}
1819f8829a4aSRandall Stewart 	}
1820f8829a4aSRandall Stewart 
1821f8829a4aSRandall Stewart 	/* update the next sequence number to use */
1822c54a18d2SRandall Stewart 	asoc->asconf_seq_out_acked++;
1823f8829a4aSRandall Stewart 	/* remove the old ASCONF on our outbound queue */
1824f8829a4aSRandall Stewart 	sctp_toss_old_asconf(stcb);
1825f8829a4aSRandall Stewart 	if (!TAILQ_EMPTY(&stcb->asoc.asconf_queue)) {
18261b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
1827f8829a4aSRandall Stewart 		/* we have more params, so restart our timer */
1828f8829a4aSRandall Stewart 		sctp_timer_start(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep,
1829f8829a4aSRandall Stewart 		    stcb, net);
18301b649582SRandall Stewart #else
18311b649582SRandall Stewart 		/* we have more params, so send out more */
18323232788eSRandall Stewart 		sctp_send_asconf(stcb, net, SCTP_ADDR_NOT_LOCKED);
18331b649582SRandall Stewart #endif
1834f8829a4aSRandall Stewart 	}
1835f8829a4aSRandall Stewart }
1836f8829a4aSRandall Stewart 
18375e2c2d87SRandall Stewart #ifdef INET6
1838f8829a4aSRandall Stewart static uint32_t
1839b0471b4bSMichael Tuexen sctp_is_scopeid_in_nets(struct sctp_tcb *stcb, struct sockaddr *sa)
1840b0471b4bSMichael Tuexen {
1841f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6, *net6;
1842f8829a4aSRandall Stewart 	struct sctp_nets *net;
1843f8829a4aSRandall Stewart 
1844f8829a4aSRandall Stewart 	if (sa->sa_family != AF_INET6) {
1845f8829a4aSRandall Stewart 		/* wrong family */
1846f8829a4aSRandall Stewart 		return (0);
1847f8829a4aSRandall Stewart 	}
1848f8829a4aSRandall Stewart 	sin6 = (struct sockaddr_in6 *)sa;
1849f8829a4aSRandall Stewart 	if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr) == 0) {
1850f8829a4aSRandall Stewart 		/* not link local address */
1851f8829a4aSRandall Stewart 		return (0);
1852f8829a4aSRandall Stewart 	}
1853f8829a4aSRandall Stewart 	/* hunt through our destination nets list for this scope_id */
1854f8829a4aSRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
1855f8829a4aSRandall Stewart 		if (((struct sockaddr *)(&net->ro._l_addr))->sa_family !=
1856f8829a4aSRandall Stewart 		    AF_INET6)
1857f8829a4aSRandall Stewart 			continue;
1858f8829a4aSRandall Stewart 		net6 = (struct sockaddr_in6 *)&net->ro._l_addr;
1859f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_LINKLOCAL(&net6->sin6_addr) == 0)
1860f8829a4aSRandall Stewart 			continue;
1861f8829a4aSRandall Stewart 		if (sctp_is_same_scope(sin6, net6)) {
1862f8829a4aSRandall Stewart 			/* found one */
1863f8829a4aSRandall Stewart 			return (1);
1864f8829a4aSRandall Stewart 		}
1865f8829a4aSRandall Stewart 	}
1866f8829a4aSRandall Stewart 	/* didn't find one */
1867f8829a4aSRandall Stewart 	return (0);
1868f8829a4aSRandall Stewart }
18695e2c2d87SRandall Stewart #endif
18705e2c2d87SRandall Stewart 
1871f8829a4aSRandall Stewart /*
1872f8829a4aSRandall Stewart  * address management functions
1873f8829a4aSRandall Stewart  */
1874f8829a4aSRandall Stewart static void
1875f8829a4aSRandall Stewart sctp_addr_mgmt_assoc(struct sctp_inpcb *inp, struct sctp_tcb *stcb,
18763232788eSRandall Stewart     struct sctp_ifa *ifa, uint16_t type, int addr_locked)
1877f8829a4aSRandall Stewart {
1878f8829a4aSRandall Stewart 	int status;
1879f8829a4aSRandall Stewart 
1880ca85e948SMichael Tuexen 	if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0 ||
1881f8829a4aSRandall Stewart 	    sctp_is_feature_off(inp, SCTP_PCB_FLAGS_DO_ASCONF)) {
1882f8829a4aSRandall Stewart 		/* subset bound, no ASCONF allowed case, so ignore */
1883f8829a4aSRandall Stewart 		return;
1884f8829a4aSRandall Stewart 	}
1885f8829a4aSRandall Stewart 	/*
1886f8829a4aSRandall Stewart 	 * note: we know this is not the subset bound, no ASCONF case eg.
1887f8829a4aSRandall Stewart 	 * this is boundall or subset bound w/ASCONF allowed
1888f8829a4aSRandall Stewart 	 */
1889f8829a4aSRandall Stewart 
18906ba22f19SMichael Tuexen 	/* first, make sure that the address is IPv4 or IPv6 and not jailed */
1891e6194c2eSMichael Tuexen 	switch (ifa->address.sa.sa_family) {
1892e6194c2eSMichael Tuexen #ifdef INET6
1893e6194c2eSMichael Tuexen 	case AF_INET6:
18946ba22f19SMichael Tuexen 		if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
18956ba22f19SMichael Tuexen 		    &ifa->address.sin6.sin6_addr) != 0) {
18966ba22f19SMichael Tuexen 			return;
18976ba22f19SMichael Tuexen 		}
1898e6194c2eSMichael Tuexen 		break;
1899e6194c2eSMichael Tuexen #endif
1900e6194c2eSMichael Tuexen #ifdef INET
1901e6194c2eSMichael Tuexen 	case AF_INET:
19026ba22f19SMichael Tuexen 		if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
19036ba22f19SMichael Tuexen 		    &ifa->address.sin.sin_addr) != 0) {
19046ba22f19SMichael Tuexen 			return;
19056ba22f19SMichael Tuexen 		}
1906e6194c2eSMichael Tuexen 		break;
1907e6194c2eSMichael Tuexen #endif
1908e6194c2eSMichael Tuexen 	default:
1909f8829a4aSRandall Stewart 		return;
1910f8829a4aSRandall Stewart 	}
1911e6194c2eSMichael Tuexen #ifdef INET6
1912f8829a4aSRandall Stewart 	/* make sure we're "allowed" to add this type of addr */
191342551e99SRandall Stewart 	if (ifa->address.sa.sa_family == AF_INET6) {
1914f8829a4aSRandall Stewart 		/* invalid if we're not a v6 endpoint */
1915f8829a4aSRandall Stewart 		if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0)
1916f8829a4aSRandall Stewart 			return;
1917f8829a4aSRandall Stewart 		/* is the v6 addr really valid ? */
191842551e99SRandall Stewart 		if (ifa->localifa_flags & SCTP_ADDR_IFA_UNUSEABLE) {
1919f8829a4aSRandall Stewart 			return;
1920f8829a4aSRandall Stewart 		}
1921f8829a4aSRandall Stewart 	}
1922e6194c2eSMichael Tuexen #endif
1923f8829a4aSRandall Stewart 	/* put this address on the "pending/do not use yet" list */
19241b649582SRandall Stewart 	sctp_add_local_addr_restricted(stcb, ifa);
1925f8829a4aSRandall Stewart 	/*
1926f8829a4aSRandall Stewart 	 * check address scope if address is out of scope, don't queue
1927f8829a4aSRandall Stewart 	 * anything... note: this would leave the address on both inp and
1928f8829a4aSRandall Stewart 	 * asoc lists
1929f8829a4aSRandall Stewart 	 */
19305e2c2d87SRandall Stewart 	switch (ifa->address.sa.sa_family) {
19315e2c2d87SRandall Stewart #ifdef INET6
19325e2c2d87SRandall Stewart 	case AF_INET6:
19335e2c2d87SRandall Stewart 		{
1934f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1935f8829a4aSRandall Stewart 
193624aaac8dSMichael Tuexen 			sin6 = &ifa->address.sin6;
1937f8829a4aSRandall Stewart 			if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
1938f8829a4aSRandall Stewart 				/* we skip unspecifed addresses */
1939f8829a4aSRandall Stewart 				return;
1940f8829a4aSRandall Stewart 			}
1941f8829a4aSRandall Stewart 			if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
1942a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.local_scope == 0) {
1943f8829a4aSRandall Stewart 					return;
1944f8829a4aSRandall Stewart 				}
1945f8829a4aSRandall Stewart 				/* is it the right link local scope? */
194642551e99SRandall Stewart 				if (sctp_is_scopeid_in_nets(stcb, &ifa->address.sa) == 0) {
1947f8829a4aSRandall Stewart 					return;
1948f8829a4aSRandall Stewart 				}
1949f8829a4aSRandall Stewart 			}
1950a1cb341bSMichael Tuexen 			if (stcb->asoc.scope.site_scope == 0 &&
1951f8829a4aSRandall Stewart 			    IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr)) {
1952f8829a4aSRandall Stewart 				return;
1953f8829a4aSRandall Stewart 			}
19545e2c2d87SRandall Stewart 			break;
19555e2c2d87SRandall Stewart 		}
19565e2c2d87SRandall Stewart #endif
1957e6194c2eSMichael Tuexen #ifdef INET
19585e2c2d87SRandall Stewart 	case AF_INET:
19595e2c2d87SRandall Stewart 		{
1960f8829a4aSRandall Stewart 			struct sockaddr_in *sin;
1961f8829a4aSRandall Stewart 
1962f8829a4aSRandall Stewart 			/* invalid if we are a v6 only endpoint */
1963f8829a4aSRandall Stewart 			if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
196494962f6bSMichael Tuexen 			    SCTP_IPV6_V6ONLY(inp))
1965f8829a4aSRandall Stewart 				return;
1966f8829a4aSRandall Stewart 
196724aaac8dSMichael Tuexen 			sin = &ifa->address.sin;
1968f8829a4aSRandall Stewart 			if (sin->sin_addr.s_addr == 0) {
1969f8829a4aSRandall Stewart 				/* we skip unspecifed addresses */
1970f8829a4aSRandall Stewart 				return;
1971f8829a4aSRandall Stewart 			}
1972a1cb341bSMichael Tuexen 			if (stcb->asoc.scope.ipv4_local_scope == 0 &&
1973f8829a4aSRandall Stewart 			    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr)) {
1974f8829a4aSRandall Stewart 				return;
1975f8829a4aSRandall Stewart 			}
19765e2c2d87SRandall Stewart 			break;
19775e2c2d87SRandall Stewart 		}
1978e6194c2eSMichael Tuexen #endif
19795e2c2d87SRandall Stewart 	default:
1980f8829a4aSRandall Stewart 		/* else, not AF_INET or AF_INET6, so skip */
1981f8829a4aSRandall Stewart 		return;
1982f8829a4aSRandall Stewart 	}
1983f8829a4aSRandall Stewart 
1984f8829a4aSRandall Stewart 	/* queue an asconf for this address add/delete */
1985f8829a4aSRandall Stewart 	if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_DO_ASCONF)) {
1986f8829a4aSRandall Stewart 		/* does the peer do asconf? */
1987c79bec9cSMichael Tuexen 		if (stcb->asoc.asconf_supported) {
1988f8829a4aSRandall Stewart 			/* queue an asconf for this addr */
1989f8829a4aSRandall Stewart 			status = sctp_asconf_queue_add(stcb, ifa, type);
19901b649582SRandall Stewart 
1991f8829a4aSRandall Stewart 			/*
19921b649582SRandall Stewart 			 * if queued ok, and in the open state, send out the
19931b649582SRandall Stewart 			 * ASCONF.  If in the non-open state, these will be
19941b649582SRandall Stewart 			 * sent when the state goes open.
1995f8829a4aSRandall Stewart 			 */
1996f8829a4aSRandall Stewart 			if (status == 0 &&
1997839d21d6SMichael Tuexen 			    ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
1998839d21d6SMichael Tuexen 			    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED))) {
19991b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
2000f8829a4aSRandall Stewart 				sctp_timer_start(SCTP_TIMER_TYPE_ASCONF, inp,
2001f8829a4aSRandall Stewart 				    stcb, stcb->asoc.primary_destination);
20021b649582SRandall Stewart #else
2003ca85e948SMichael Tuexen 				sctp_send_asconf(stcb, NULL, addr_locked);
20041b649582SRandall Stewart #endif
2005f8829a4aSRandall Stewart 			}
2006f8829a4aSRandall Stewart 		}
2007f8829a4aSRandall Stewart 	}
2008f8829a4aSRandall Stewart }
2009f8829a4aSRandall Stewart 
201042551e99SRandall Stewart 
201142551e99SRandall Stewart int
20127215cc1bSMichael Tuexen sctp_asconf_iterator_ep(struct sctp_inpcb *inp, void *ptr, uint32_t val SCTP_UNUSED)
2013f8829a4aSRandall Stewart {
201442551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
201542551e99SRandall Stewart 	struct sctp_ifa *ifa;
201642551e99SRandall Stewart 	struct sctp_laddr *l;
201742551e99SRandall Stewart 	int cnt_invalid = 0;
2018f8829a4aSRandall Stewart 
201942551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
202042551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
202142551e99SRandall Stewart 		ifa = l->ifa;
2022e6194c2eSMichael Tuexen 		switch (ifa->address.sa.sa_family) {
2023e6194c2eSMichael Tuexen #ifdef INET6
2024e6194c2eSMichael Tuexen 		case AF_INET6:
2025f8829a4aSRandall Stewart 			/* invalid if we're not a v6 endpoint */
2026f8829a4aSRandall Stewart 			if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) {
202742551e99SRandall Stewart 				cnt_invalid++;
202842551e99SRandall Stewart 				if (asc->cnt == cnt_invalid)
202942551e99SRandall Stewart 					return (1);
2030f8829a4aSRandall Stewart 			}
2031e6194c2eSMichael Tuexen 			break;
2032e6194c2eSMichael Tuexen #endif
2033e6194c2eSMichael Tuexen #ifdef INET
2034e6194c2eSMichael Tuexen 		case AF_INET:
2035e6194c2eSMichael Tuexen 			{
2036f8829a4aSRandall Stewart 				/* invalid if we are a v6 only endpoint */
2037f8829a4aSRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
203894962f6bSMichael Tuexen 				    SCTP_IPV6_V6ONLY(inp)) {
203942551e99SRandall Stewart 					cnt_invalid++;
204042551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
204142551e99SRandall Stewart 						return (1);
2042f8829a4aSRandall Stewart 				}
2043e6194c2eSMichael Tuexen 				break;
2044e6194c2eSMichael Tuexen 			}
2045e6194c2eSMichael Tuexen #endif
2046e6194c2eSMichael Tuexen 		default:
2047f8829a4aSRandall Stewart 			/* invalid address family */
204842551e99SRandall Stewart 			cnt_invalid++;
204942551e99SRandall Stewart 			if (asc->cnt == cnt_invalid)
205042551e99SRandall Stewart 				return (1);
2051f8829a4aSRandall Stewart 		}
205242551e99SRandall Stewart 	}
205342551e99SRandall Stewart 	return (0);
205442551e99SRandall Stewart }
2055f8829a4aSRandall Stewart 
20561b649582SRandall Stewart static int
20577215cc1bSMichael Tuexen sctp_asconf_iterator_ep_end(struct sctp_inpcb *inp, void *ptr, uint32_t val SCTP_UNUSED)
205842551e99SRandall Stewart {
205942551e99SRandall Stewart 	struct sctp_ifa *ifa;
206042551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
206142551e99SRandall Stewart 	struct sctp_laddr *laddr, *nladdr, *l;
206242551e99SRandall Stewart 
206342551e99SRandall Stewart 	/* Only for specific case not bound all */
206442551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
206542551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
206642551e99SRandall Stewart 		ifa = l->ifa;
206742551e99SRandall Stewart 		if (l->action == SCTP_ADD_IP_ADDRESS) {
20683c503c28SRandall Stewart 			LIST_FOREACH(laddr, &inp->sctp_addr_list,
20693c503c28SRandall Stewart 			    sctp_nxt_addr) {
207042551e99SRandall Stewart 				if (laddr->ifa == ifa) {
207142551e99SRandall Stewart 					laddr->action = 0;
207242551e99SRandall Stewart 					break;
207342551e99SRandall Stewart 				}
20740053ed28SMichael Tuexen 
207542551e99SRandall Stewart 			}
207642551e99SRandall Stewart 		} else if (l->action == SCTP_DEL_IP_ADDRESS) {
20774a9ef3f8SMichael Tuexen 			LIST_FOREACH_SAFE(laddr, &inp->sctp_addr_list, sctp_nxt_addr, nladdr) {
207842551e99SRandall Stewart 				/* remove only after all guys are done */
207942551e99SRandall Stewart 				if (laddr->ifa == ifa) {
208042551e99SRandall Stewart 					sctp_del_local_addr_ep(inp, ifa);
208142551e99SRandall Stewart 				}
208242551e99SRandall Stewart 			}
208342551e99SRandall Stewart 		}
208442551e99SRandall Stewart 	}
208542551e99SRandall Stewart 	return (0);
208642551e99SRandall Stewart }
208742551e99SRandall Stewart 
208842551e99SRandall Stewart void
20891b649582SRandall Stewart sctp_asconf_iterator_stcb(struct sctp_inpcb *inp, struct sctp_tcb *stcb,
20907215cc1bSMichael Tuexen     void *ptr, uint32_t val SCTP_UNUSED)
209142551e99SRandall Stewart {
209242551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
209342551e99SRandall Stewart 	struct sctp_ifa *ifa;
209442551e99SRandall Stewart 	struct sctp_laddr *l;
209542551e99SRandall Stewart 	int cnt_invalid = 0;
209642551e99SRandall Stewart 	int type, status;
20971b649582SRandall Stewart 	int num_queued = 0;
209842551e99SRandall Stewart 
209942551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
210042551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
210142551e99SRandall Stewart 		ifa = l->ifa;
210242551e99SRandall Stewart 		type = l->action;
210322a67197SRandall Stewart 
210422a67197SRandall Stewart 		/* address's vrf_id must be the vrf_id of the assoc */
210522a67197SRandall Stewart 		if (ifa->vrf_id != stcb->asoc.vrf_id) {
210622a67197SRandall Stewart 			continue;
210722a67197SRandall Stewart 		}
21080053ed28SMichael Tuexen 
210942551e99SRandall Stewart 		/* Same checks again for assoc */
21105e2c2d87SRandall Stewart 		switch (ifa->address.sa.sa_family) {
21115e2c2d87SRandall Stewart #ifdef INET6
21125e2c2d87SRandall Stewart 		case AF_INET6:
21135e2c2d87SRandall Stewart 			{
211442551e99SRandall Stewart 				/* invalid if we're not a v6 endpoint */
211542551e99SRandall Stewart 				struct sockaddr_in6 *sin6;
211642551e99SRandall Stewart 
211742551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) {
211842551e99SRandall Stewart 					cnt_invalid++;
211942551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
212042551e99SRandall Stewart 						return;
212142551e99SRandall Stewart 					else
212242551e99SRandall Stewart 						continue;
212342551e99SRandall Stewart 				}
212424aaac8dSMichael Tuexen 				sin6 = &ifa->address.sin6;
212542551e99SRandall Stewart 				if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
212642551e99SRandall Stewart 					/* we skip unspecifed addresses */
212742551e99SRandall Stewart 					continue;
212842551e99SRandall Stewart 				}
21296ba22f19SMichael Tuexen 				if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
21306ba22f19SMichael Tuexen 				    &sin6->sin6_addr) != 0) {
21316ba22f19SMichael Tuexen 					continue;
21326ba22f19SMichael Tuexen 				}
213342551e99SRandall Stewart 				if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
2134a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.local_scope == 0) {
213542551e99SRandall Stewart 						continue;
213642551e99SRandall Stewart 					}
213742551e99SRandall Stewart 					/* is it the right link local scope? */
213842551e99SRandall Stewart 					if (sctp_is_scopeid_in_nets(stcb, &ifa->address.sa) == 0) {
213942551e99SRandall Stewart 						continue;
214042551e99SRandall Stewart 					}
214142551e99SRandall Stewart 				}
21425e2c2d87SRandall Stewart 				break;
21435e2c2d87SRandall Stewart 			}
21445e2c2d87SRandall Stewart #endif
2145e6194c2eSMichael Tuexen #ifdef INET
21465e2c2d87SRandall Stewart 		case AF_INET:
21475e2c2d87SRandall Stewart 			{
214842551e99SRandall Stewart 				/* invalid if we are a v6 only endpoint */
214942551e99SRandall Stewart 				struct sockaddr_in *sin;
215042551e99SRandall Stewart 
215142551e99SRandall Stewart 				/* invalid if we are a v6 only endpoint */
215242551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
215394962f6bSMichael Tuexen 				    SCTP_IPV6_V6ONLY(inp))
215442551e99SRandall Stewart 					continue;
215542551e99SRandall Stewart 
215624aaac8dSMichael Tuexen 				sin = &ifa->address.sin;
215742551e99SRandall Stewart 				if (sin->sin_addr.s_addr == 0) {
215842551e99SRandall Stewart 					/* we skip unspecifed addresses */
215942551e99SRandall Stewart 					continue;
216042551e99SRandall Stewart 				}
21616ba22f19SMichael Tuexen 				if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
21626ba22f19SMichael Tuexen 				    &sin->sin_addr) != 0) {
21636ba22f19SMichael Tuexen 					continue;
21646ba22f19SMichael Tuexen 				}
2165a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv4_local_scope == 0 &&
216642551e99SRandall Stewart 				    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr)) {
2167c2ede4b3SMartin Blapp 					continue;
216842551e99SRandall Stewart 				}
216942551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
217094962f6bSMichael Tuexen 				    SCTP_IPV6_V6ONLY(inp)) {
217142551e99SRandall Stewart 					cnt_invalid++;
217242551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
217342551e99SRandall Stewart 						return;
217442551e99SRandall Stewart 					else
217542551e99SRandall Stewart 						continue;
217642551e99SRandall Stewart 				}
21775e2c2d87SRandall Stewart 				break;
21785e2c2d87SRandall Stewart 			}
2179e6194c2eSMichael Tuexen #endif
21805e2c2d87SRandall Stewart 		default:
218142551e99SRandall Stewart 			/* invalid address family */
218242551e99SRandall Stewart 			cnt_invalid++;
218342551e99SRandall Stewart 			if (asc->cnt == cnt_invalid)
2184f8829a4aSRandall Stewart 				return;
218542551e99SRandall Stewart 			else
218642551e99SRandall Stewart 				continue;
21875e2c2d87SRandall Stewart 			break;
2188f8829a4aSRandall Stewart 		}
2189f8829a4aSRandall Stewart 
219042551e99SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
21911b649582SRandall Stewart 			/* prevent this address from being used as a source */
21921b649582SRandall Stewart 			sctp_add_local_addr_restricted(stcb, ifa);
219342551e99SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
2194f8829a4aSRandall Stewart 			struct sctp_nets *net;
2195f8829a4aSRandall Stewart 
2196f8829a4aSRandall Stewart 			TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
219717205eccSRandall Stewart 				sctp_rtentry_t *rt;
2198f8829a4aSRandall Stewart 
2199f8829a4aSRandall Stewart 				/* delete this address if cached */
2200851b7298SRandall Stewart 				if (net->ro._s_addr == ifa) {
220142551e99SRandall Stewart 					sctp_free_ifa(net->ro._s_addr);
220242551e99SRandall Stewart 					net->ro._s_addr = NULL;
220342551e99SRandall Stewart 					net->src_addr_selected = 0;
2204f8829a4aSRandall Stewart 					rt = net->ro.ro_rt;
220542551e99SRandall Stewart 					if (rt) {
220642551e99SRandall Stewart 						RTFREE(rt);
2207f8829a4aSRandall Stewart 						net->ro.ro_rt = NULL;
2208f8829a4aSRandall Stewart 					}
220942551e99SRandall Stewart 					/*
221042551e99SRandall Stewart 					 * Now we deleted our src address,
221142551e99SRandall Stewart 					 * should we not also now reset the
221242551e99SRandall Stewart 					 * cwnd/rto to start as if its a new
221342551e99SRandall Stewart 					 * address?
221442551e99SRandall Stewart 					 */
2215b54d3a6cSRandall Stewart 					stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
2216108df27cSRandall Stewart 					net->RTO = 0;
221742551e99SRandall Stewart 
2218f8829a4aSRandall Stewart 				}
2219f8829a4aSRandall Stewart 			}
222042551e99SRandall Stewart 		} else if (type == SCTP_SET_PRIM_ADDR) {
222142551e99SRandall Stewart 			if ((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0) {
22221b649582SRandall Stewart 				/* must validate the ifa is in the ep */
222342551e99SRandall Stewart 				if (sctp_is_addr_in_ep(stcb->sctp_ep, ifa) == 0) {
222442551e99SRandall Stewart 					continue;
2225f8829a4aSRandall Stewart 				}
222642551e99SRandall Stewart 			} else {
222742551e99SRandall Stewart 				/* Need to check scopes for this guy */
2228a1cb341bSMichael Tuexen 				if (sctp_is_address_in_scope(ifa, &stcb->asoc.scope, 0) == 0) {
222942551e99SRandall Stewart 					continue;
2230f8829a4aSRandall Stewart 				}
223142551e99SRandall Stewart 			}
223242551e99SRandall Stewart 		}
223342551e99SRandall Stewart 		/* queue an asconf for this address add/delete */
22341b649582SRandall Stewart 		if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_DO_ASCONF) &&
2235c79bec9cSMichael Tuexen 		    stcb->asoc.asconf_supported == 1) {
223642551e99SRandall Stewart 			/* queue an asconf for this addr */
223742551e99SRandall Stewart 			status = sctp_asconf_queue_add(stcb, ifa, type);
223842551e99SRandall Stewart 			/*
22391b649582SRandall Stewart 			 * if queued ok, and in the open state, update the
22401b649582SRandall Stewart 			 * count of queued params.  If in the non-open
22411b649582SRandall Stewart 			 * state, these get sent when the assoc goes open.
224242551e99SRandall Stewart 			 */
2243839d21d6SMichael Tuexen 			if ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
2244839d21d6SMichael Tuexen 			    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
22451b649582SRandall Stewart 				if (status >= 0) {
22461b649582SRandall Stewart 					num_queued++;
224742551e99SRandall Stewart 				}
224842551e99SRandall Stewart 			}
224942551e99SRandall Stewart 		}
225042551e99SRandall Stewart 	}
22511b649582SRandall Stewart 	/*
22521b649582SRandall Stewart 	 * If we have queued params in the open state, send out an ASCONF.
22531b649582SRandall Stewart 	 */
22541b649582SRandall Stewart 	if (num_queued > 0) {
2255ca85e948SMichael Tuexen 		sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
22561b649582SRandall Stewart 	}
225742551e99SRandall Stewart }
225842551e99SRandall Stewart 
225942551e99SRandall Stewart void
22607215cc1bSMichael Tuexen sctp_asconf_iterator_end(void *ptr, uint32_t val SCTP_UNUSED)
226142551e99SRandall Stewart {
226242551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
226342551e99SRandall Stewart 	struct sctp_ifa *ifa;
22644a9ef3f8SMichael Tuexen 	struct sctp_laddr *l, *nl;
226542551e99SRandall Stewart 
226642551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
22674a9ef3f8SMichael Tuexen 	LIST_FOREACH_SAFE(l, &asc->list_of_work, sctp_nxt_addr, nl) {
226842551e99SRandall Stewart 		ifa = l->ifa;
226942551e99SRandall Stewart 		if (l->action == SCTP_ADD_IP_ADDRESS) {
227042551e99SRandall Stewart 			/* Clear the defer use flag */
227142551e99SRandall Stewart 			ifa->localifa_flags &= ~SCTP_ADDR_DEFER_USE;
227242551e99SRandall Stewart 		}
227342551e99SRandall Stewart 		sctp_free_ifa(ifa);
2274b3f1ea41SRandall Stewart 		SCTP_ZONE_FREE(SCTP_BASE_INFO(ipi_zone_laddr), l);
227542551e99SRandall Stewart 		SCTP_DECR_LADDR_COUNT();
227642551e99SRandall Stewart 	}
2277207304d4SRandall Stewart 	SCTP_FREE(asc, SCTP_M_ASC_IT);
2278f8829a4aSRandall Stewart }
2279f8829a4aSRandall Stewart 
2280f8829a4aSRandall Stewart /*
22811b649582SRandall Stewart  * sa is the sockaddr to ask the peer to set primary to.
22821b649582SRandall Stewart  * returns: 0 = completed, -1 = error
2283f8829a4aSRandall Stewart  */
2284c4739e2fSRandall Stewart int32_t
2285b0471b4bSMichael Tuexen sctp_set_primary_ip_address_sa(struct sctp_tcb *stcb, struct sockaddr *sa)
2286b0471b4bSMichael Tuexen {
22873232788eSRandall Stewart 	uint32_t vrf_id;
22883232788eSRandall Stewart 	struct sctp_ifa *ifa;
2289f8829a4aSRandall Stewart 
22903232788eSRandall Stewart 	/* find the ifa for the desired set primary */
22913232788eSRandall Stewart 	vrf_id = stcb->asoc.vrf_id;
22923232788eSRandall Stewart 	ifa = sctp_find_ifa_by_addr(sa, vrf_id, SCTP_ADDR_NOT_LOCKED);
22933232788eSRandall Stewart 	if (ifa == NULL) {
22943232788eSRandall Stewart 		/* Invalid address */
22953232788eSRandall Stewart 		return (-1);
22963232788eSRandall Stewart 	}
22970053ed28SMichael Tuexen 
2298f8829a4aSRandall Stewart 	/* queue an ASCONF:SET_PRIM_ADDR to be sent */
22993232788eSRandall Stewart 	if (!sctp_asconf_queue_add(stcb, ifa, SCTP_SET_PRIM_ADDR)) {
2300f8829a4aSRandall Stewart 		/* set primary queuing succeeded */
2301ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2302ad81507eSRandall Stewart 		    "set_primary_ip_address_sa: queued on tcb=%p, ",
2303dd294dceSMichael Tuexen 		    (void *)stcb);
2304ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
2305839d21d6SMichael Tuexen 		if ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
2306839d21d6SMichael Tuexen 		    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
23071b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
23081b649582SRandall Stewart 			sctp_timer_start(SCTP_TIMER_TYPE_ASCONF,
23091b649582SRandall Stewart 			    stcb->sctp_ep, stcb,
23101b649582SRandall Stewart 			    stcb->asoc.primary_destination);
23111b649582SRandall Stewart #else
2312ca85e948SMichael Tuexen 			sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
23131b649582SRandall Stewart #endif
23141b649582SRandall Stewart 		}
2315f8829a4aSRandall Stewart 	} else {
2316ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "set_primary_ip_address_sa: failed to add to queue on tcb=%p, ",
2317dd294dceSMichael Tuexen 		    (void *)stcb);
2318ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
2319f8829a4aSRandall Stewart 		return (-1);
2320f8829a4aSRandall Stewart 	}
2321f8829a4aSRandall Stewart 	return (0);
2322f8829a4aSRandall Stewart }
2323f8829a4aSRandall Stewart 
2324c54a18d2SRandall Stewart int
2325c54a18d2SRandall Stewart sctp_is_addr_pending(struct sctp_tcb *stcb, struct sctp_ifa *sctp_ifa)
2326c54a18d2SRandall Stewart {
2327c54a18d2SRandall Stewart 	struct sctp_tmit_chunk *chk, *nchk;
2328c54a18d2SRandall Stewart 	unsigned int offset, asconf_limit;
2329c54a18d2SRandall Stewart 	struct sctp_asconf_chunk *acp;
2330c54a18d2SRandall Stewart 	struct sctp_asconf_paramhdr *aph;
2331c54a18d2SRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
2332e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
2333c54a18d2SRandall Stewart 	int add_cnt, del_cnt;
2334c54a18d2SRandall Stewart 	uint16_t last_param_type;
2335c54a18d2SRandall Stewart 
2336c54a18d2SRandall Stewart 	add_cnt = del_cnt = 0;
2337c54a18d2SRandall Stewart 	last_param_type = 0;
23384a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(chk, &stcb->asoc.asconf_send_queue, sctp_next, nchk) {
2339c54a18d2SRandall Stewart 		if (chk->data == NULL) {
2340c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: No mbuf data?\n");
2341c54a18d2SRandall Stewart 			continue;
2342c54a18d2SRandall Stewart 		}
2343c54a18d2SRandall Stewart 		offset = 0;
2344c54a18d2SRandall Stewart 		acp = mtod(chk->data, struct sctp_asconf_chunk *);
2345c54a18d2SRandall Stewart 		offset += sizeof(struct sctp_asconf_chunk);
2346c54a18d2SRandall Stewart 		asconf_limit = ntohs(acp->ch.chunk_length);
2347e6194c2eSMichael Tuexen 		ph = (struct sctp_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_paramhdr), aparam_buf);
2348e6194c2eSMichael Tuexen 		if (ph == NULL) {
2349c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: couldn't get lookup addr!\n");
2350c54a18d2SRandall Stewart 			continue;
2351c54a18d2SRandall Stewart 		}
2352e6194c2eSMichael Tuexen 		offset += ntohs(ph->param_length);
2353c54a18d2SRandall Stewart 
2354c54a18d2SRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_asconf_paramhdr), aparam_buf);
2355c54a18d2SRandall Stewart 		if (aph == NULL) {
2356c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: Empty ASCONF will be sent?\n");
2357c54a18d2SRandall Stewart 			continue;
2358c54a18d2SRandall Stewart 		}
2359c54a18d2SRandall Stewart 		while (aph != NULL) {
2360c54a18d2SRandall Stewart 			unsigned int param_length, param_type;
2361c54a18d2SRandall Stewart 
2362c54a18d2SRandall Stewart 			param_type = ntohs(aph->ph.param_type);
2363c54a18d2SRandall Stewart 			param_length = ntohs(aph->ph.param_length);
2364c54a18d2SRandall Stewart 			if (offset + param_length > asconf_limit) {
2365c54a18d2SRandall Stewart 				/* parameter goes beyond end of chunk! */
2366c54a18d2SRandall Stewart 				break;
2367c54a18d2SRandall Stewart 			}
2368c54a18d2SRandall Stewart 			if (param_length > sizeof(aparam_buf)) {
2369c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: param length (%u) larger than buffer size!\n", param_length);
2370c54a18d2SRandall Stewart 				break;
2371c54a18d2SRandall Stewart 			}
2372c54a18d2SRandall Stewart 			if (param_length <= sizeof(struct sctp_paramhdr)) {
2373c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: param length(%u) too short\n", param_length);
2374c54a18d2SRandall Stewart 				break;
2375c54a18d2SRandall Stewart 			}
23760053ed28SMichael Tuexen 
2377c54a18d2SRandall Stewart 			aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, param_length, aparam_buf);
2378c54a18d2SRandall Stewart 			if (aph == NULL) {
2379c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: couldn't get entire param\n");
2380c54a18d2SRandall Stewart 				break;
2381c54a18d2SRandall Stewart 			}
23820053ed28SMichael Tuexen 
2383e6194c2eSMichael Tuexen 			ph = (struct sctp_paramhdr *)(aph + 1);
2384e6194c2eSMichael Tuexen 			if (sctp_addr_match(ph, &sctp_ifa->address.sa) != 0) {
2385c54a18d2SRandall Stewart 				switch (param_type) {
2386c54a18d2SRandall Stewart 				case SCTP_ADD_IP_ADDRESS:
2387c54a18d2SRandall Stewart 					add_cnt++;
2388c54a18d2SRandall Stewart 					break;
2389c54a18d2SRandall Stewart 				case SCTP_DEL_IP_ADDRESS:
2390c54a18d2SRandall Stewart 					del_cnt++;
2391c54a18d2SRandall Stewart 					break;
2392c54a18d2SRandall Stewart 				default:
2393c54a18d2SRandall Stewart 					break;
2394c54a18d2SRandall Stewart 				}
2395c54a18d2SRandall Stewart 				last_param_type = param_type;
2396c54a18d2SRandall Stewart 			}
23970053ed28SMichael Tuexen 
2398c54a18d2SRandall Stewart 			offset += SCTP_SIZE32(param_length);
2399c54a18d2SRandall Stewart 			if (offset >= asconf_limit) {
2400c54a18d2SRandall Stewart 				/* no more data in the mbuf chain */
2401c54a18d2SRandall Stewart 				break;
2402c54a18d2SRandall Stewart 			}
2403c54a18d2SRandall Stewart 			/* get pointer to next asconf param */
2404c54a18d2SRandall Stewart 			aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_asconf_paramhdr), aparam_buf);
2405c54a18d2SRandall Stewart 		}
2406c54a18d2SRandall Stewart 	}
2407c54a18d2SRandall Stewart 
2408b7b84c0eSMichael Tuexen 	/*
2409b7b84c0eSMichael Tuexen 	 * we want to find the sequences which consist of ADD -> DEL -> ADD
2410b7b84c0eSMichael Tuexen 	 * or DEL -> ADD
2411b7b84c0eSMichael Tuexen 	 */
2412c54a18d2SRandall Stewart 	if (add_cnt > del_cnt ||
2413c54a18d2SRandall Stewart 	    (add_cnt == del_cnt && last_param_type == SCTP_ADD_IP_ADDRESS)) {
241460990c0cSMichael Tuexen 		return (1);
2415c54a18d2SRandall Stewart 	}
241660990c0cSMichael Tuexen 	return (0);
2417c54a18d2SRandall Stewart }
2418c54a18d2SRandall Stewart 
2419f8829a4aSRandall Stewart static struct sockaddr *
24203232788eSRandall Stewart sctp_find_valid_localaddr(struct sctp_tcb *stcb, int addr_locked)
2421f8829a4aSRandall Stewart {
242242551e99SRandall Stewart 	struct sctp_vrf *vrf = NULL;
242342551e99SRandall Stewart 	struct sctp_ifn *sctp_ifn;
242442551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
2425f8829a4aSRandall Stewart 
24263232788eSRandall Stewart 	if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2427c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RLOCK();
242842551e99SRandall Stewart 	vrf = sctp_find_vrf(stcb->asoc.vrf_id);
2429ad81507eSRandall Stewart 	if (vrf == NULL) {
24303232788eSRandall Stewart 		if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2431c99efcf6SRandall Stewart 			SCTP_IPI_ADDR_RUNLOCK();
2432ad81507eSRandall Stewart 		return (NULL);
2433ad81507eSRandall Stewart 	}
243442551e99SRandall Stewart 	LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
2435a1cb341bSMichael Tuexen 		if (stcb->asoc.scope.loopback_scope == 0 &&
243642551e99SRandall Stewart 		    SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
2437f8829a4aSRandall Stewart 			/* Skip if loopback_scope not set */
2438f8829a4aSRandall Stewart 			continue;
2439f8829a4aSRandall Stewart 		}
244042551e99SRandall Stewart 		LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
2441e6194c2eSMichael Tuexen 			switch (sctp_ifa->address.sa.sa_family) {
2442e6194c2eSMichael Tuexen #ifdef INET
2443e6194c2eSMichael Tuexen 			case AF_INET:
2444a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv4_addr_legal) {
2445f8829a4aSRandall Stewart 					struct sockaddr_in *sin;
2446f8829a4aSRandall Stewart 
244724aaac8dSMichael Tuexen 					sin = &sctp_ifa->address.sin;
2448f8829a4aSRandall Stewart 					if (sin->sin_addr.s_addr == 0) {
2449f8829a4aSRandall Stewart 						/* skip unspecifed addresses */
2450f8829a4aSRandall Stewart 						continue;
2451f8829a4aSRandall Stewart 					}
24526ba22f19SMichael Tuexen 					if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
24536ba22f19SMichael Tuexen 					    &sin->sin_addr) != 0) {
24546ba22f19SMichael Tuexen 						continue;
24556ba22f19SMichael Tuexen 					}
2456a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.ipv4_local_scope == 0 &&
2457f8829a4aSRandall Stewart 					    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr))
2458f8829a4aSRandall Stewart 						continue;
2459f8829a4aSRandall Stewart 
2460c54a18d2SRandall Stewart 					if (sctp_is_addr_restricted(stcb, sctp_ifa) &&
2461c54a18d2SRandall Stewart 					    (!sctp_is_addr_pending(stcb, sctp_ifa)))
2462f8829a4aSRandall Stewart 						continue;
2463b7b84c0eSMichael Tuexen 					/*
2464b7b84c0eSMichael Tuexen 					 * found a valid local v4 address to
2465b7b84c0eSMichael Tuexen 					 * use
2466b7b84c0eSMichael Tuexen 					 */
24673232788eSRandall Stewart 					if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2468c99efcf6SRandall Stewart 						SCTP_IPI_ADDR_RUNLOCK();
246942551e99SRandall Stewart 					return (&sctp_ifa->address.sa);
2470e6194c2eSMichael Tuexen 				}
2471e6194c2eSMichael Tuexen 				break;
2472e6194c2eSMichael Tuexen #endif
2473e6194c2eSMichael Tuexen #ifdef INET6
2474e6194c2eSMichael Tuexen 			case AF_INET6:
2475a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv6_addr_legal) {
2476f8829a4aSRandall Stewart 					struct sockaddr_in6 *sin6;
2477f8829a4aSRandall Stewart 
247842551e99SRandall Stewart 					if (sctp_ifa->localifa_flags & SCTP_ADDR_IFA_UNUSEABLE) {
2479f8829a4aSRandall Stewart 						continue;
248042551e99SRandall Stewart 					}
24810053ed28SMichael Tuexen 
248224aaac8dSMichael Tuexen 					sin6 = &sctp_ifa->address.sin6;
2483f8829a4aSRandall Stewart 					if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
2484b7b84c0eSMichael Tuexen 						/*
2485b7b84c0eSMichael Tuexen 						 * we skip unspecifed
2486b7b84c0eSMichael Tuexen 						 * addresses
2487b7b84c0eSMichael Tuexen 						 */
2488f8829a4aSRandall Stewart 						continue;
2489f8829a4aSRandall Stewart 					}
24906ba22f19SMichael Tuexen 					if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
24916ba22f19SMichael Tuexen 					    &sin6->sin6_addr) != 0) {
24926ba22f19SMichael Tuexen 						continue;
24936ba22f19SMichael Tuexen 					}
2494a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.local_scope == 0 &&
2495f8829a4aSRandall Stewart 					    IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr))
2496f8829a4aSRandall Stewart 						continue;
2497a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.site_scope == 0 &&
2498f8829a4aSRandall Stewart 					    IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr))
2499f8829a4aSRandall Stewart 						continue;
2500f8829a4aSRandall Stewart 
2501c54a18d2SRandall Stewart 					if (sctp_is_addr_restricted(stcb, sctp_ifa) &&
2502c54a18d2SRandall Stewart 					    (!sctp_is_addr_pending(stcb, sctp_ifa)))
2503c54a18d2SRandall Stewart 						continue;
2504b7b84c0eSMichael Tuexen 					/*
2505b7b84c0eSMichael Tuexen 					 * found a valid local v6 address to
2506b7b84c0eSMichael Tuexen 					 * use
2507b7b84c0eSMichael Tuexen 					 */
25083232788eSRandall Stewart 					if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2509c99efcf6SRandall Stewart 						SCTP_IPI_ADDR_RUNLOCK();
251042551e99SRandall Stewart 					return (&sctp_ifa->address.sa);
2511f8829a4aSRandall Stewart 				}
2512e6194c2eSMichael Tuexen 				break;
2513e6194c2eSMichael Tuexen #endif
2514e6194c2eSMichael Tuexen 			default:
2515e6194c2eSMichael Tuexen 				break;
2516e6194c2eSMichael Tuexen 			}
2517f8829a4aSRandall Stewart 		}
2518f8829a4aSRandall Stewart 	}
2519f8829a4aSRandall Stewart 	/* no valid addresses found */
25203232788eSRandall Stewart 	if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2521c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
2522f8829a4aSRandall Stewart 	return (NULL);
2523f8829a4aSRandall Stewart }
2524f8829a4aSRandall Stewart 
2525f8829a4aSRandall Stewart static struct sockaddr *
2526f8829a4aSRandall Stewart sctp_find_valid_localaddr_ep(struct sctp_tcb *stcb)
2527f8829a4aSRandall Stewart {
2528f8829a4aSRandall Stewart 	struct sctp_laddr *laddr;
2529f8829a4aSRandall Stewart 
2530f8829a4aSRandall Stewart 	LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
2531f8829a4aSRandall Stewart 		if (laddr->ifa == NULL) {
2532f8829a4aSRandall Stewart 			continue;
2533f8829a4aSRandall Stewart 		}
2534f8829a4aSRandall Stewart 		/* is the address restricted ? */
2535c54a18d2SRandall Stewart 		if (sctp_is_addr_restricted(stcb, laddr->ifa) &&
2536c54a18d2SRandall Stewart 		    (!sctp_is_addr_pending(stcb, laddr->ifa)))
2537f8829a4aSRandall Stewart 			continue;
2538f8829a4aSRandall Stewart 
2539f8829a4aSRandall Stewart 		/* found a valid local address to use */
254042551e99SRandall Stewart 		return (&laddr->ifa->address.sa);
2541f8829a4aSRandall Stewart 	}
2542f8829a4aSRandall Stewart 	/* no valid addresses found */
2543f8829a4aSRandall Stewart 	return (NULL);
2544f8829a4aSRandall Stewart }
2545f8829a4aSRandall Stewart 
2546f8829a4aSRandall Stewart /*
254718e198d3SRandall Stewart  * builds an ASCONF chunk from queued ASCONF params.
254818e198d3SRandall Stewart  * returns NULL on error (no mbuf, no ASCONF params queued, etc).
2549f8829a4aSRandall Stewart  */
2550f8829a4aSRandall Stewart struct mbuf *
25513232788eSRandall Stewart sctp_compose_asconf(struct sctp_tcb *stcb, int *retlen, int addr_locked)
2552f8829a4aSRandall Stewart {
2553f8829a4aSRandall Stewart 	struct mbuf *m_asconf, *m_asconf_chk;
2554f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa;
2555f8829a4aSRandall Stewart 	struct sctp_asconf_chunk *acp;
2556f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
2557f8829a4aSRandall Stewart 	struct sctp_asconf_addr_param *aap;
2558f8829a4aSRandall Stewart 	uint32_t p_length;
2559f8829a4aSRandall Stewart 	uint32_t correlation_id = 1;	/* 0 is reserved... */
2560f8829a4aSRandall Stewart 	caddr_t ptr, lookup_ptr;
2561f8829a4aSRandall Stewart 	uint8_t lookup_used = 0;
2562f8829a4aSRandall Stewart 
2563f8829a4aSRandall Stewart 	/* are there any asconf params to send? */
2564c54a18d2SRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
2565c54a18d2SRandall Stewart 		if (aa->sent == 0)
2566c54a18d2SRandall Stewart 			break;
2567f8829a4aSRandall Stewart 	}
2568c54a18d2SRandall Stewart 	if (aa == NULL)
25691b649582SRandall Stewart 		return (NULL);
2570c54a18d2SRandall Stewart 
2571f8829a4aSRandall Stewart 	/*
2572f8829a4aSRandall Stewart 	 * get a chunk header mbuf and a cluster for the asconf params since
2573f8829a4aSRandall Stewart 	 * it's simpler to fill in the asconf chunk header lookup address on
2574f8829a4aSRandall Stewart 	 * the fly
2575f8829a4aSRandall Stewart 	 */
2576eb1b1807SGleb Smirnoff 	m_asconf_chk = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_chunk), 0, M_NOWAIT, 1, MT_DATA);
2577f8829a4aSRandall Stewart 	if (m_asconf_chk == NULL) {
2578f8829a4aSRandall Stewart 		/* no mbuf's */
2579ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2580ad81507eSRandall Stewart 		    "compose_asconf: couldn't get chunk mbuf!\n");
2581f8829a4aSRandall Stewart 		return (NULL);
2582f8829a4aSRandall Stewart 	}
2583eb1b1807SGleb Smirnoff 	m_asconf = sctp_get_mbuf_for_msg(MCLBYTES, 0, M_NOWAIT, 1, MT_DATA);
2584f8829a4aSRandall Stewart 	if (m_asconf == NULL) {
2585f8829a4aSRandall Stewart 		/* no mbuf's */
2586ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2587ad81507eSRandall Stewart 		    "compose_asconf: couldn't get mbuf!\n");
2588f8829a4aSRandall Stewart 		sctp_m_freem(m_asconf_chk);
2589f8829a4aSRandall Stewart 		return (NULL);
2590f8829a4aSRandall Stewart 	}
2591139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_asconf_chk) = sizeof(struct sctp_asconf_chunk);
2592139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_asconf) = 0;
2593f8829a4aSRandall Stewart 	acp = mtod(m_asconf_chk, struct sctp_asconf_chunk *);
25945ba7f91fSMichael Tuexen 	memset(acp, 0, sizeof(struct sctp_asconf_chunk));
2595f8829a4aSRandall Stewart 	/* save pointers to lookup address and asconf params */
2596f8829a4aSRandall Stewart 	lookup_ptr = (caddr_t)(acp + 1);	/* after the header */
2597f8829a4aSRandall Stewart 	ptr = mtod(m_asconf, caddr_t);	/* beginning of cluster */
2598f8829a4aSRandall Stewart 
2599f8829a4aSRandall Stewart 	/* fill in chunk header info */
2600f8829a4aSRandall Stewart 	acp->ch.chunk_type = SCTP_ASCONF;
2601f8829a4aSRandall Stewart 	acp->ch.chunk_flags = 0;
2602f8829a4aSRandall Stewart 	acp->serial_number = htonl(stcb->asoc.asconf_seq_out);
2603c54a18d2SRandall Stewart 	stcb->asoc.asconf_seq_out++;
2604f8829a4aSRandall Stewart 
2605f8829a4aSRandall Stewart 	/* add parameters... up to smallest MTU allowed */
2606f8829a4aSRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
2607c54a18d2SRandall Stewart 		if (aa->sent)
2608c54a18d2SRandall Stewart 			continue;
2609f8829a4aSRandall Stewart 		/* get the parameter length */
2610f8829a4aSRandall Stewart 		p_length = SCTP_SIZE32(aa->ap.aph.ph.param_length);
2611f8829a4aSRandall Stewart 		/* will it fit in current chunk? */
2612a9d94d29SMichael Tuexen 		if ((SCTP_BUF_LEN(m_asconf) + p_length > stcb->asoc.smallest_mtu) ||
2613a9d94d29SMichael Tuexen 		    (SCTP_BUF_LEN(m_asconf) + p_length > MCLBYTES)) {
2614f8829a4aSRandall Stewart 			/* won't fit, so we're done with this chunk */
2615f8829a4aSRandall Stewart 			break;
2616f8829a4aSRandall Stewart 		}
2617f8829a4aSRandall Stewart 		/* assign (and store) a correlation id */
2618f8829a4aSRandall Stewart 		aa->ap.aph.correlation_id = correlation_id++;
2619f8829a4aSRandall Stewart 
2620f8829a4aSRandall Stewart 		/*
2621f8829a4aSRandall Stewart 		 * fill in address if we're doing a delete this is a simple
2622f8829a4aSRandall Stewart 		 * way for us to fill in the correlation address, which
2623f8829a4aSRandall Stewart 		 * should only be used by the peer if we're deleting our
2624f8829a4aSRandall Stewart 		 * source address and adding a new address (e.g. renumbering
2625f8829a4aSRandall Stewart 		 * case)
2626f8829a4aSRandall Stewart 		 */
2627f8829a4aSRandall Stewart 		if (lookup_used == 0 &&
2628830d754dSRandall Stewart 		    (aa->special_del == 0) &&
2629f8829a4aSRandall Stewart 		    aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS) {
2630f8829a4aSRandall Stewart 			struct sctp_ipv6addr_param *lookup;
2631f8829a4aSRandall Stewart 			uint16_t p_size, addr_size;
2632f8829a4aSRandall Stewart 
2633f8829a4aSRandall Stewart 			lookup = (struct sctp_ipv6addr_param *)lookup_ptr;
2634f8829a4aSRandall Stewart 			lookup->ph.param_type =
2635f8829a4aSRandall Stewart 			    htons(aa->ap.addrp.ph.param_type);
2636f8829a4aSRandall Stewart 			if (aa->ap.addrp.ph.param_type == SCTP_IPV6_ADDRESS) {
2637f8829a4aSRandall Stewart 				/* copy IPv6 address */
2638f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv6addr_param);
2639f8829a4aSRandall Stewart 				addr_size = sizeof(struct in6_addr);
2640f8829a4aSRandall Stewart 			} else {
2641f8829a4aSRandall Stewart 				/* copy IPv4 address */
2642f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv4addr_param);
2643f8829a4aSRandall Stewart 				addr_size = sizeof(struct in_addr);
2644f8829a4aSRandall Stewart 			}
2645f8829a4aSRandall Stewart 			lookup->ph.param_length = htons(SCTP_SIZE32(p_size));
2646f8829a4aSRandall Stewart 			memcpy(lookup->addr, &aa->ap.addrp.addr, addr_size);
2647139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_asconf_chk) += SCTP_SIZE32(p_size);
2648f8829a4aSRandall Stewart 			lookup_used = 1;
2649f8829a4aSRandall Stewart 		}
2650f8829a4aSRandall Stewart 		/* copy into current space */
2651f8829a4aSRandall Stewart 		memcpy(ptr, &aa->ap, p_length);
2652f8829a4aSRandall Stewart 
2653f8829a4aSRandall Stewart 		/* network elements and update lengths */
2654f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)ptr;
2655f8829a4aSRandall Stewart 		aap = (struct sctp_asconf_addr_param *)ptr;
2656f8829a4aSRandall Stewart 		/* correlation_id is transparent to peer, no htonl needed */
2657f8829a4aSRandall Stewart 		aph->ph.param_type = htons(aph->ph.param_type);
2658f8829a4aSRandall Stewart 		aph->ph.param_length = htons(aph->ph.param_length);
2659f8829a4aSRandall Stewart 		aap->addrp.ph.param_type = htons(aap->addrp.ph.param_type);
2660f8829a4aSRandall Stewart 		aap->addrp.ph.param_length = htons(aap->addrp.ph.param_length);
2661f8829a4aSRandall Stewart 
2662139bc87fSRandall Stewart 		SCTP_BUF_LEN(m_asconf) += SCTP_SIZE32(p_length);
2663f8829a4aSRandall Stewart 		ptr += SCTP_SIZE32(p_length);
2664f8829a4aSRandall Stewart 
2665f8829a4aSRandall Stewart 		/*
2666f8829a4aSRandall Stewart 		 * these params are removed off the pending list upon
2667f8829a4aSRandall Stewart 		 * getting an ASCONF-ACK back from the peer, just set flag
2668f8829a4aSRandall Stewart 		 */
2669f8829a4aSRandall Stewart 		aa->sent = 1;
2670f8829a4aSRandall Stewart 	}
2671f8829a4aSRandall Stewart 	/* check to see if the lookup addr has been populated yet */
2672f8829a4aSRandall Stewart 	if (lookup_used == 0) {
2673f8829a4aSRandall Stewart 		/* NOTE: if the address param is optional, can skip this... */
2674f8829a4aSRandall Stewart 		/* add any valid (existing) address... */
2675f8829a4aSRandall Stewart 		struct sctp_ipv6addr_param *lookup;
2676f8829a4aSRandall Stewart 		uint16_t p_size, addr_size;
2677f8829a4aSRandall Stewart 		struct sockaddr *found_addr;
2678f8829a4aSRandall Stewart 		caddr_t addr_ptr;
2679f8829a4aSRandall Stewart 
2680f8829a4aSRandall Stewart 		if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL)
26813232788eSRandall Stewart 			found_addr = sctp_find_valid_localaddr(stcb,
26823232788eSRandall Stewart 			    addr_locked);
2683f8829a4aSRandall Stewart 		else
2684f8829a4aSRandall Stewart 			found_addr = sctp_find_valid_localaddr_ep(stcb);
2685f8829a4aSRandall Stewart 
2686f8829a4aSRandall Stewart 		lookup = (struct sctp_ipv6addr_param *)lookup_ptr;
2687f8829a4aSRandall Stewart 		if (found_addr != NULL) {
2688e6194c2eSMichael Tuexen 			switch (found_addr->sa_family) {
2689e6194c2eSMichael Tuexen #ifdef INET6
2690e6194c2eSMichael Tuexen 			case AF_INET6:
2691f8829a4aSRandall Stewart 				/* copy IPv6 address */
2692f8829a4aSRandall Stewart 				lookup->ph.param_type =
2693f8829a4aSRandall Stewart 				    htons(SCTP_IPV6_ADDRESS);
2694f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv6addr_param);
2695f8829a4aSRandall Stewart 				addr_size = sizeof(struct in6_addr);
2696f8829a4aSRandall Stewart 				addr_ptr = (caddr_t)&((struct sockaddr_in6 *)
2697f8829a4aSRandall Stewart 				    found_addr)->sin6_addr;
2698e6194c2eSMichael Tuexen 				break;
2699e6194c2eSMichael Tuexen #endif
2700e6194c2eSMichael Tuexen #ifdef INET
2701e6194c2eSMichael Tuexen 			case AF_INET:
2702f8829a4aSRandall Stewart 				/* copy IPv4 address */
2703f8829a4aSRandall Stewart 				lookup->ph.param_type =
2704f8829a4aSRandall Stewart 				    htons(SCTP_IPV4_ADDRESS);
2705f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv4addr_param);
2706f8829a4aSRandall Stewart 				addr_size = sizeof(struct in_addr);
2707f8829a4aSRandall Stewart 				addr_ptr = (caddr_t)&((struct sockaddr_in *)
2708f8829a4aSRandall Stewart 				    found_addr)->sin_addr;
2709e6194c2eSMichael Tuexen 				break;
2710e6194c2eSMichael Tuexen #endif
2711e6194c2eSMichael Tuexen 			default:
2712e6194c2eSMichael Tuexen 				p_size = 0;
2713e6194c2eSMichael Tuexen 				addr_size = 0;
2714e6194c2eSMichael Tuexen 				addr_ptr = NULL;
2715e6194c2eSMichael Tuexen 				break;
2716f8829a4aSRandall Stewart 			}
2717f8829a4aSRandall Stewart 			lookup->ph.param_length = htons(SCTP_SIZE32(p_size));
2718f8829a4aSRandall Stewart 			memcpy(lookup->addr, addr_ptr, addr_size);
2719139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_asconf_chk) += SCTP_SIZE32(p_size);
2720f8829a4aSRandall Stewart 		} else {
2721f8829a4aSRandall Stewart 			/* uh oh... don't have any address?? */
2722ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
2723ad81507eSRandall Stewart 			    "compose_asconf: no lookup addr!\n");
2724e6194c2eSMichael Tuexen 			/* XXX for now, we send a IPv4 address of 0.0.0.0 */
2725f8829a4aSRandall Stewart 			lookup->ph.param_type = htons(SCTP_IPV4_ADDRESS);
2726f8829a4aSRandall Stewart 			lookup->ph.param_length = htons(SCTP_SIZE32(sizeof(struct sctp_ipv4addr_param)));
27275ba7f91fSMichael Tuexen 			memset(lookup->addr, 0, sizeof(struct in_addr));
2728139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_asconf_chk) += SCTP_SIZE32(sizeof(struct sctp_ipv4addr_param));
2729f8829a4aSRandall Stewart 		}
2730f8829a4aSRandall Stewart 	}
2731f8829a4aSRandall Stewart 	/* chain it all together */
2732139bc87fSRandall Stewart 	SCTP_BUF_NEXT(m_asconf_chk) = m_asconf;
27333c503c28SRandall Stewart 	*retlen = SCTP_BUF_LEN(m_asconf_chk) + SCTP_BUF_LEN(m_asconf);
2734c9eb4473SMichael Tuexen 	acp->ch.chunk_length = htons(*retlen);
2735f8829a4aSRandall Stewart 
2736f8829a4aSRandall Stewart 	return (m_asconf_chk);
2737f8829a4aSRandall Stewart }
2738f8829a4aSRandall Stewart 
2739f8829a4aSRandall Stewart /*
2740f8829a4aSRandall Stewart  * section to handle address changes before an association is up eg. changes
2741f8829a4aSRandall Stewart  * during INIT/INIT-ACK/COOKIE-ECHO handshake
2742f8829a4aSRandall Stewart  */
2743f8829a4aSRandall Stewart 
2744f8829a4aSRandall Stewart /*
2745f8829a4aSRandall Stewart  * processes the (local) addresses in the INIT-ACK chunk
2746f8829a4aSRandall Stewart  */
2747f8829a4aSRandall Stewart static void
2748f8829a4aSRandall Stewart sctp_process_initack_addresses(struct sctp_tcb *stcb, struct mbuf *m,
2749f8829a4aSRandall Stewart     unsigned int offset, unsigned int length)
2750f8829a4aSRandall Stewart {
2751f8829a4aSRandall Stewart 	struct sctp_paramhdr tmp_param, *ph;
2752f8829a4aSRandall Stewart 	uint16_t plen, ptype;
275342551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
275423602b60SMichael Tuexen 	union sctp_sockstore store;
2755e6194c2eSMichael Tuexen #ifdef INET6
27565e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr6_store;
2757e6194c2eSMichael Tuexen #endif
2758e6194c2eSMichael Tuexen #ifdef INET
27595e20b91dSMichael Tuexen 	struct sctp_ipv4addr_param addr4_store;
2760e6194c2eSMichael Tuexen #endif
2761f8829a4aSRandall Stewart 
2762ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF2, "processing init-ack addresses\n");
2763ad81507eSRandall Stewart 	if (stcb == NULL)	/* Un-needed check for SA */
2764ad81507eSRandall Stewart 		return;
2765f8829a4aSRandall Stewart 
2766f8829a4aSRandall Stewart 	/* convert to upper bound */
2767f8829a4aSRandall Stewart 	length += offset;
2768f8829a4aSRandall Stewart 
2769f8829a4aSRandall Stewart 	if ((offset + sizeof(struct sctp_paramhdr)) > length) {
2770f8829a4aSRandall Stewart 		return;
2771f8829a4aSRandall Stewart 	}
2772f8829a4aSRandall Stewart 	/* go through the addresses in the init-ack */
2773e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)
2774e6194c2eSMichael Tuexen 	    sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr),
2775e6194c2eSMichael Tuexen 	    (uint8_t *)&tmp_param);
2776f8829a4aSRandall Stewart 	while (ph != NULL) {
2777f8829a4aSRandall Stewart 		ptype = ntohs(ph->param_type);
2778f8829a4aSRandall Stewart 		plen = ntohs(ph->param_length);
2779e6194c2eSMichael Tuexen 		switch (ptype) {
2780e6194c2eSMichael Tuexen #ifdef INET6
2781e6194c2eSMichael Tuexen 		case SCTP_IPV6_ADDRESS:
2782e6194c2eSMichael Tuexen 			{
2783f8829a4aSRandall Stewart 				struct sctp_ipv6addr_param *a6p;
2784f8829a4aSRandall Stewart 
2785f8829a4aSRandall Stewart 				/* get the entire IPv6 address param */
2786f8829a4aSRandall Stewart 				a6p = (struct sctp_ipv6addr_param *)
2787f8829a4aSRandall Stewart 				    sctp_m_getptr(m, offset,
2788f8829a4aSRandall Stewart 				    sizeof(struct sctp_ipv6addr_param),
27895e20b91dSMichael Tuexen 				    (uint8_t *)&addr6_store);
2790f8829a4aSRandall Stewart 				if (plen != sizeof(struct sctp_ipv6addr_param) ||
2791f8829a4aSRandall Stewart 				    a6p == NULL) {
2792f8829a4aSRandall Stewart 					return;
2793f8829a4aSRandall Stewart 				}
279423602b60SMichael Tuexen 				memset(&store, 0, sizeof(union sctp_sockstore));
279523602b60SMichael Tuexen 				store.sin6.sin6_family = AF_INET6;
279623602b60SMichael Tuexen 				store.sin6.sin6_len = sizeof(struct sockaddr_in6);
279723602b60SMichael Tuexen 				store.sin6.sin6_port = stcb->rport;
279823602b60SMichael Tuexen 				memcpy(&store.sin6.sin6_addr, a6p->addr, sizeof(struct in6_addr));
2799e6194c2eSMichael Tuexen 				break;
2800e6194c2eSMichael Tuexen 			}
2801e6194c2eSMichael Tuexen #endif
2802e6194c2eSMichael Tuexen #ifdef INET
2803e6194c2eSMichael Tuexen 		case SCTP_IPV4_ADDRESS:
2804e6194c2eSMichael Tuexen 			{
2805f8829a4aSRandall Stewart 				struct sctp_ipv4addr_param *a4p;
2806f8829a4aSRandall Stewart 
2807f8829a4aSRandall Stewart 				/* get the entire IPv4 address param */
280842551e99SRandall Stewart 				a4p = (struct sctp_ipv4addr_param *)sctp_m_getptr(m, offset,
280942551e99SRandall Stewart 				    sizeof(struct sctp_ipv4addr_param),
28105e20b91dSMichael Tuexen 				    (uint8_t *)&addr4_store);
2811f8829a4aSRandall Stewart 				if (plen != sizeof(struct sctp_ipv4addr_param) ||
2812f8829a4aSRandall Stewart 				    a4p == NULL) {
2813f8829a4aSRandall Stewart 					return;
2814f8829a4aSRandall Stewart 				}
281523602b60SMichael Tuexen 				memset(&store, 0, sizeof(union sctp_sockstore));
281623602b60SMichael Tuexen 				store.sin.sin_family = AF_INET;
281723602b60SMichael Tuexen 				store.sin.sin_len = sizeof(struct sockaddr_in);
281823602b60SMichael Tuexen 				store.sin.sin_port = stcb->rport;
281923602b60SMichael Tuexen 				store.sin.sin_addr.s_addr = a4p->addr;
28201d663b46SMichael Tuexen 				break;
2821e6194c2eSMichael Tuexen 			}
2822e6194c2eSMichael Tuexen #endif
2823e6194c2eSMichael Tuexen 		default:
2824f8829a4aSRandall Stewart 			goto next_addr;
2825f8829a4aSRandall Stewart 		}
2826f8829a4aSRandall Stewart 
2827f8829a4aSRandall Stewart 		/* see if this address really (still) exists */
2828448e8596SMichael Tuexen 		sctp_ifa = sctp_find_ifa_by_addr(&store.sa, stcb->asoc.vrf_id,
28293232788eSRandall Stewart 		    SCTP_ADDR_NOT_LOCKED);
283042551e99SRandall Stewart 		if (sctp_ifa == NULL) {
2831f8829a4aSRandall Stewart 			/* address doesn't exist anymore */
2832f8829a4aSRandall Stewart 			int status;
2833f8829a4aSRandall Stewart 
2834f8829a4aSRandall Stewart 			/* are ASCONFs allowed ? */
2835f8829a4aSRandall Stewart 			if ((sctp_is_feature_on(stcb->sctp_ep,
2836f8829a4aSRandall Stewart 			    SCTP_PCB_FLAGS_DO_ASCONF)) &&
2837c79bec9cSMichael Tuexen 			    stcb->asoc.asconf_supported) {
2838f8829a4aSRandall Stewart 				/* queue an ASCONF DEL_IP_ADDRESS */
283923602b60SMichael Tuexen 				status = sctp_asconf_queue_sa_delete(stcb, &store.sa);
2840f8829a4aSRandall Stewart 				/*
28411b649582SRandall Stewart 				 * if queued ok, and in correct state, send
28421b649582SRandall Stewart 				 * out the ASCONF.
2843f8829a4aSRandall Stewart 				 */
2844f8829a4aSRandall Stewart 				if (status == 0 &&
2845839d21d6SMichael Tuexen 				    SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) {
28461b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
2847f8829a4aSRandall Stewart 					sctp_timer_start(SCTP_TIMER_TYPE_ASCONF,
2848f8829a4aSRandall Stewart 					    stcb->sctp_ep, stcb,
2849f8829a4aSRandall Stewart 					    stcb->asoc.primary_destination);
28501b649582SRandall Stewart #else
2851ca85e948SMichael Tuexen 					sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
28521b649582SRandall Stewart #endif
2853f8829a4aSRandall Stewart 				}
2854f8829a4aSRandall Stewart 			}
2855f8829a4aSRandall Stewart 		}
28560053ed28SMichael Tuexen 
2857f8829a4aSRandall Stewart next_addr:
2858f8829a4aSRandall Stewart 		/*
2859f8829a4aSRandall Stewart 		 * Sanity check:  Make sure the length isn't 0, otherwise
2860f8829a4aSRandall Stewart 		 * we'll be stuck in this loop for a long time...
2861f8829a4aSRandall Stewart 		 */
2862f8829a4aSRandall Stewart 		if (SCTP_SIZE32(plen) == 0) {
2863ad81507eSRandall Stewart 			SCTP_PRINTF("process_initack_addrs: bad len (%d) type=%xh\n",
2864f8829a4aSRandall Stewart 			    plen, ptype);
2865f8829a4aSRandall Stewart 			return;
2866f8829a4aSRandall Stewart 		}
2867f8829a4aSRandall Stewart 		/* get next parameter */
2868f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(plen);
2869f8829a4aSRandall Stewart 		if ((offset + sizeof(struct sctp_paramhdr)) > length)
2870f8829a4aSRandall Stewart 			return;
2871f8829a4aSRandall Stewart 		ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset,
2872f8829a4aSRandall Stewart 		    sizeof(struct sctp_paramhdr), (uint8_t *)&tmp_param);
2873f8829a4aSRandall Stewart 	}			/* while */
2874f8829a4aSRandall Stewart }
2875f8829a4aSRandall Stewart 
2876f8829a4aSRandall Stewart /* FIX ME: need to verify return result for v6 address type if v6 disabled */
2877f8829a4aSRandall Stewart /*
2878f8829a4aSRandall Stewart  * checks to see if a specific address is in the initack address list returns
2879f8829a4aSRandall Stewart  * 1 if found, 0 if not
2880f8829a4aSRandall Stewart  */
2881f8829a4aSRandall Stewart static uint32_t
2882b0471b4bSMichael Tuexen sctp_addr_in_initack(struct mbuf *m, uint32_t offset, uint32_t length, struct sockaddr *sa)
2883b0471b4bSMichael Tuexen {
2884f8829a4aSRandall Stewart 	struct sctp_paramhdr tmp_param, *ph;
2885f8829a4aSRandall Stewart 	uint16_t plen, ptype;
2886e6194c2eSMichael Tuexen #ifdef INET
2887f8829a4aSRandall Stewart 	struct sockaddr_in *sin;
2888f8829a4aSRandall Stewart 	struct sctp_ipv4addr_param *a4p;
28895e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr4_store;
2890e6194c2eSMichael Tuexen #endif
2891f8829a4aSRandall Stewart #ifdef INET6
289242551e99SRandall Stewart 	struct sockaddr_in6 *sin6;
2893f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *a6p;
28945e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr6_store;
289542551e99SRandall Stewart 	struct sockaddr_in6 sin6_tmp;
2896e6194c2eSMichael Tuexen #endif
2897f8829a4aSRandall Stewart 
2898e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
2899e6194c2eSMichael Tuexen #ifdef INET
2900e6194c2eSMichael Tuexen 	case AF_INET:
2901e6194c2eSMichael Tuexen 		break;
2902e6194c2eSMichael Tuexen #endif
2903f8829a4aSRandall Stewart #ifdef INET6
2904e6194c2eSMichael Tuexen 	case AF_INET6:
2905e6194c2eSMichael Tuexen 		break;
2906e6194c2eSMichael Tuexen #endif
2907e6194c2eSMichael Tuexen 	default:
2908f8829a4aSRandall Stewart 		return (0);
2909e6194c2eSMichael Tuexen 	}
2910f8829a4aSRandall Stewart 
2911ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF2, "find_initack_addr: starting search for ");
2912ad81507eSRandall Stewart 	SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, sa);
2913f8829a4aSRandall Stewart 	/* convert to upper bound */
2914f8829a4aSRandall Stewart 	length += offset;
2915f8829a4aSRandall Stewart 
2916f8829a4aSRandall Stewart 	if ((offset + sizeof(struct sctp_paramhdr)) > length) {
2917ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2918ad81507eSRandall Stewart 		    "find_initack_addr: invalid offset?\n");
2919f8829a4aSRandall Stewart 		return (0);
2920f8829a4aSRandall Stewart 	}
2921f8829a4aSRandall Stewart 	/* go through the addresses in the init-ack */
2922f8829a4aSRandall Stewart 	ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset,
2923f8829a4aSRandall Stewart 	    sizeof(struct sctp_paramhdr), (uint8_t *)&tmp_param);
2924f8829a4aSRandall Stewart 	while (ph != NULL) {
2925f8829a4aSRandall Stewart 		ptype = ntohs(ph->param_type);
2926f8829a4aSRandall Stewart 		plen = ntohs(ph->param_length);
2927e6194c2eSMichael Tuexen 		switch (ptype) {
2928f8829a4aSRandall Stewart #ifdef INET6
2929e6194c2eSMichael Tuexen 		case SCTP_IPV6_ADDRESS:
2930e6194c2eSMichael Tuexen 			if (sa->sa_family == AF_INET6) {
2931e6194c2eSMichael Tuexen 				/* get the entire IPv6 address param */
2932e6194c2eSMichael Tuexen 				if (plen != sizeof(struct sctp_ipv6addr_param)) {
2933e6194c2eSMichael Tuexen 					break;
2934e6194c2eSMichael Tuexen 				}
2935f8829a4aSRandall Stewart 				/* get the entire IPv6 address param */
2936f8829a4aSRandall Stewart 				a6p = (struct sctp_ipv6addr_param *)
2937f8829a4aSRandall Stewart 				    sctp_m_getptr(m, offset,
2938f8829a4aSRandall Stewart 				    sizeof(struct sctp_ipv6addr_param),
29395e20b91dSMichael Tuexen 				    (uint8_t *)&addr6_store);
2940e6194c2eSMichael Tuexen 				if (a6p == NULL) {
2941f8829a4aSRandall Stewart 					return (0);
2942f8829a4aSRandall Stewart 				}
2943f8829a4aSRandall Stewart 				sin6 = (struct sockaddr_in6 *)sa;
2944f8829a4aSRandall Stewart 				if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) {
2945f8829a4aSRandall Stewart 					/* create a copy and clear scope */
2946f8829a4aSRandall Stewart 					memcpy(&sin6_tmp, sin6,
2947f8829a4aSRandall Stewart 					    sizeof(struct sockaddr_in6));
2948f8829a4aSRandall Stewart 					sin6 = &sin6_tmp;
2949f8829a4aSRandall Stewart 					in6_clearscope(&sin6->sin6_addr);
2950f8829a4aSRandall Stewart 				}
2951f8829a4aSRandall Stewart 				if (memcmp(&sin6->sin6_addr, a6p->addr,
2952f8829a4aSRandall Stewart 				    sizeof(struct in6_addr)) == 0) {
2953f8829a4aSRandall Stewart 					/* found it */
2954f8829a4aSRandall Stewart 					return (1);
2955f8829a4aSRandall Stewart 				}
2956e6194c2eSMichael Tuexen 			}
2957e6194c2eSMichael Tuexen 			break;
2958f8829a4aSRandall Stewart #endif				/* INET6 */
2959e6194c2eSMichael Tuexen #ifdef INET
2960e6194c2eSMichael Tuexen 		case SCTP_IPV4_ADDRESS:
2961e6194c2eSMichael Tuexen 			if (sa->sa_family == AF_INET) {
2962e6194c2eSMichael Tuexen 				if (plen != sizeof(struct sctp_ipv4addr_param)) {
2963e6194c2eSMichael Tuexen 					break;
2964e6194c2eSMichael Tuexen 				}
2965f8829a4aSRandall Stewart 				/* get the entire IPv4 address param */
2966e6194c2eSMichael Tuexen 				a4p = (struct sctp_ipv4addr_param *)
2967e6194c2eSMichael Tuexen 				    sctp_m_getptr(m, offset,
2968e6194c2eSMichael Tuexen 				    sizeof(struct sctp_ipv4addr_param),
29695e20b91dSMichael Tuexen 				    (uint8_t *)&addr4_store);
2970e6194c2eSMichael Tuexen 				if (a4p == NULL) {
2971f8829a4aSRandall Stewart 					return (0);
2972f8829a4aSRandall Stewart 				}
2973f8829a4aSRandall Stewart 				sin = (struct sockaddr_in *)sa;
2974f8829a4aSRandall Stewart 				if (sin->sin_addr.s_addr == a4p->addr) {
2975f8829a4aSRandall Stewart 					/* found it */
2976f8829a4aSRandall Stewart 					return (1);
2977f8829a4aSRandall Stewart 				}
2978f8829a4aSRandall Stewart 			}
2979e6194c2eSMichael Tuexen 			break;
2980e6194c2eSMichael Tuexen #endif
2981e6194c2eSMichael Tuexen 		default:
2982e6194c2eSMichael Tuexen 			break;
2983e6194c2eSMichael Tuexen 		}
2984f8829a4aSRandall Stewart 		/* get next parameter */
2985f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(plen);
2986e6194c2eSMichael Tuexen 		if (offset + sizeof(struct sctp_paramhdr) > length) {
2987f8829a4aSRandall Stewart 			return (0);
2988e6194c2eSMichael Tuexen 		}
2989f8829a4aSRandall Stewart 		ph = (struct sctp_paramhdr *)
2990f8829a4aSRandall Stewart 		    sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr),
2991f8829a4aSRandall Stewart 		    (uint8_t *)&tmp_param);
2992f8829a4aSRandall Stewart 	}			/* while */
2993f8829a4aSRandall Stewart 	/* not found! */
2994f8829a4aSRandall Stewart 	return (0);
2995f8829a4aSRandall Stewart }
2996f8829a4aSRandall Stewart 
2997f8829a4aSRandall Stewart /*
2998f8829a4aSRandall Stewart  * makes sure that the current endpoint local addr list is consistent with
2999f8829a4aSRandall Stewart  * the new association (eg. subset bound, asconf allowed) adds addresses as
3000f8829a4aSRandall Stewart  * necessary
3001f8829a4aSRandall Stewart  */
3002f8829a4aSRandall Stewart static void
3003f8829a4aSRandall Stewart sctp_check_address_list_ep(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3004f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr)
3005f8829a4aSRandall Stewart {
3006f8829a4aSRandall Stewart 	struct sctp_laddr *laddr;
3007f8829a4aSRandall Stewart 
3008f8829a4aSRandall Stewart 	/* go through the endpoint list */
3009f8829a4aSRandall Stewart 	LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
3010f8829a4aSRandall Stewart 		/* be paranoid and validate the laddr */
3011f8829a4aSRandall Stewart 		if (laddr->ifa == NULL) {
3012ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
3013ad81507eSRandall Stewart 			    "check_addr_list_ep: laddr->ifa is NULL");
3014f8829a4aSRandall Stewart 			continue;
3015f8829a4aSRandall Stewart 		}
301642551e99SRandall Stewart 		if (laddr->ifa == NULL) {
3017ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "check_addr_list_ep: laddr->ifa->ifa_addr is NULL");
3018f8829a4aSRandall Stewart 			continue;
3019f8829a4aSRandall Stewart 		}
3020f8829a4aSRandall Stewart 		/* do i have it implicitly? */
302142551e99SRandall Stewart 		if (sctp_cmpaddr(&laddr->ifa->address.sa, init_addr)) {
3022f8829a4aSRandall Stewart 			continue;
3023f8829a4aSRandall Stewart 		}
3024f8829a4aSRandall Stewart 		/* check to see if in the init-ack */
30257215cc1bSMichael Tuexen 		if (!sctp_addr_in_initack(m, offset, length, &laddr->ifa->address.sa)) {
3026f8829a4aSRandall Stewart 			/* try to add it */
3027f8829a4aSRandall Stewart 			sctp_addr_mgmt_assoc(stcb->sctp_ep, stcb, laddr->ifa,
30283232788eSRandall Stewart 			    SCTP_ADD_IP_ADDRESS, SCTP_ADDR_NOT_LOCKED);
3029f8829a4aSRandall Stewart 		}
3030f8829a4aSRandall Stewart 	}
3031f8829a4aSRandall Stewart }
3032f8829a4aSRandall Stewart 
3033f8829a4aSRandall Stewart /*
3034f8829a4aSRandall Stewart  * makes sure that the current kernel address list is consistent with the new
3035f8829a4aSRandall Stewart  * association (with all addrs bound) adds addresses as necessary
3036f8829a4aSRandall Stewart  */
3037f8829a4aSRandall Stewart static void
3038f8829a4aSRandall Stewart sctp_check_address_list_all(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3039f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr,
3040f8829a4aSRandall Stewart     uint16_t local_scope, uint16_t site_scope,
3041f8829a4aSRandall Stewart     uint16_t ipv4_scope, uint16_t loopback_scope)
3042f8829a4aSRandall Stewart {
304342551e99SRandall Stewart 	struct sctp_vrf *vrf = NULL;
304442551e99SRandall Stewart 	struct sctp_ifn *sctp_ifn;
304542551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
304642551e99SRandall Stewart 	uint32_t vrf_id;
30477215cc1bSMichael Tuexen #ifdef INET
30487215cc1bSMichael Tuexen 	struct sockaddr_in *sin;
30497215cc1bSMichael Tuexen #endif
30507215cc1bSMichael Tuexen #ifdef INET6
30517215cc1bSMichael Tuexen 	struct sockaddr_in6 *sin6;
30527215cc1bSMichael Tuexen #endif
30537215cc1bSMichael Tuexen 
3054bff64a4dSRandall Stewart 	if (stcb) {
3055bff64a4dSRandall Stewart 		vrf_id = stcb->asoc.vrf_id;
3056bff64a4dSRandall Stewart 	} else {
3057ad81507eSRandall Stewart 		return;
3058bff64a4dSRandall Stewart 	}
3059c99efcf6SRandall Stewart 	SCTP_IPI_ADDR_RLOCK();
306042551e99SRandall Stewart 	vrf = sctp_find_vrf(vrf_id);
306142551e99SRandall Stewart 	if (vrf == NULL) {
3062c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
306342551e99SRandall Stewart 		return;
306442551e99SRandall Stewart 	}
3065f8829a4aSRandall Stewart 	/* go through all our known interfaces */
306642551e99SRandall Stewart 	LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
306742551e99SRandall Stewart 		if (loopback_scope == 0 && SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
3068f8829a4aSRandall Stewart 			/* skip loopback interface */
3069f8829a4aSRandall Stewart 			continue;
3070f8829a4aSRandall Stewart 		}
3071f8829a4aSRandall Stewart 		/* go through each interface address */
307242551e99SRandall Stewart 		LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
3073f8829a4aSRandall Stewart 			/* do i have it implicitly? */
307442551e99SRandall Stewart 			if (sctp_cmpaddr(&sctp_ifa->address.sa, init_addr)) {
3075f8829a4aSRandall Stewart 				continue;
3076f8829a4aSRandall Stewart 			}
30777215cc1bSMichael Tuexen 			switch (sctp_ifa->address.sa.sa_family) {
30787215cc1bSMichael Tuexen #ifdef INET
30797215cc1bSMichael Tuexen 			case AF_INET:
308024aaac8dSMichael Tuexen 				sin = &sctp_ifa->address.sin;
30816ba22f19SMichael Tuexen 				if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
30826ba22f19SMichael Tuexen 				    &sin->sin_addr) != 0) {
30836ba22f19SMichael Tuexen 					continue;
30846ba22f19SMichael Tuexen 				}
30857215cc1bSMichael Tuexen 				if ((ipv4_scope == 0) &&
30867215cc1bSMichael Tuexen 				    (IN4_ISPRIVATE_ADDRESS(&sin->sin_addr))) {
30877215cc1bSMichael Tuexen 					/* private address not in scope */
30887215cc1bSMichael Tuexen 					continue;
30897215cc1bSMichael Tuexen 				}
30907215cc1bSMichael Tuexen 				break;
30917215cc1bSMichael Tuexen #endif
30927215cc1bSMichael Tuexen #ifdef INET6
30937215cc1bSMichael Tuexen 			case AF_INET6:
309424aaac8dSMichael Tuexen 				sin6 = &sctp_ifa->address.sin6;
30956ba22f19SMichael Tuexen 				if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
30966ba22f19SMichael Tuexen 				    &sin6->sin6_addr) != 0) {
30976ba22f19SMichael Tuexen 					continue;
30986ba22f19SMichael Tuexen 				}
30997215cc1bSMichael Tuexen 				if ((local_scope == 0) &&
31007215cc1bSMichael Tuexen 				    (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr))) {
31017215cc1bSMichael Tuexen 					continue;
31027215cc1bSMichael Tuexen 				}
31037215cc1bSMichael Tuexen 				if ((site_scope == 0) &&
31047215cc1bSMichael Tuexen 				    (IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr))) {
31057215cc1bSMichael Tuexen 					continue;
31067215cc1bSMichael Tuexen 				}
31077215cc1bSMichael Tuexen 				break;
31087215cc1bSMichael Tuexen #endif
31097215cc1bSMichael Tuexen 			default:
31107215cc1bSMichael Tuexen 				break;
31117215cc1bSMichael Tuexen 			}
3112f8829a4aSRandall Stewart 			/* check to see if in the init-ack */
31137215cc1bSMichael Tuexen 			if (!sctp_addr_in_initack(m, offset, length, &sctp_ifa->address.sa)) {
3114f8829a4aSRandall Stewart 				/* try to add it */
3115f8829a4aSRandall Stewart 				sctp_addr_mgmt_assoc(stcb->sctp_ep, stcb,
31163232788eSRandall Stewart 				    sctp_ifa, SCTP_ADD_IP_ADDRESS,
31173232788eSRandall Stewart 				    SCTP_ADDR_LOCKED);
3118f8829a4aSRandall Stewart 			}
3119f8829a4aSRandall Stewart 		}		/* end foreach ifa */
3120f8829a4aSRandall Stewart 	}			/* end foreach ifn */
3121c99efcf6SRandall Stewart 	SCTP_IPI_ADDR_RUNLOCK();
3122f8829a4aSRandall Stewart }
3123f8829a4aSRandall Stewart 
3124f8829a4aSRandall Stewart /*
3125f8829a4aSRandall Stewart  * validates an init-ack chunk (from a cookie-echo) with current addresses
3126f8829a4aSRandall Stewart  * adds addresses from the init-ack into our local address list, if needed
3127f8829a4aSRandall Stewart  * queues asconf adds/deletes addresses as needed and makes appropriate list
3128f8829a4aSRandall Stewart  * changes for source address selection m, offset: points to the start of the
3129f8829a4aSRandall Stewart  * address list in an init-ack chunk length: total length of the address
3130f8829a4aSRandall Stewart  * params only init_addr: address where my INIT-ACK was sent from
3131f8829a4aSRandall Stewart  */
3132f8829a4aSRandall Stewart void
3133f8829a4aSRandall Stewart sctp_check_address_list(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3134f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr,
3135f8829a4aSRandall Stewart     uint16_t local_scope, uint16_t site_scope,
3136f8829a4aSRandall Stewart     uint16_t ipv4_scope, uint16_t loopback_scope)
3137f8829a4aSRandall Stewart {
3138f8829a4aSRandall Stewart 	/* process the local addresses in the initack */
3139f8829a4aSRandall Stewart 	sctp_process_initack_addresses(stcb, m, offset, length);
3140f8829a4aSRandall Stewart 
3141f8829a4aSRandall Stewart 	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
3142f8829a4aSRandall Stewart 		/* bound all case */
3143f8829a4aSRandall Stewart 		sctp_check_address_list_all(stcb, m, offset, length, init_addr,
3144f8829a4aSRandall Stewart 		    local_scope, site_scope, ipv4_scope, loopback_scope);
3145f8829a4aSRandall Stewart 	} else {
3146f8829a4aSRandall Stewart 		/* subset bound case */
3147f8829a4aSRandall Stewart 		if (sctp_is_feature_on(stcb->sctp_ep,
3148f8829a4aSRandall Stewart 		    SCTP_PCB_FLAGS_DO_ASCONF)) {
3149f8829a4aSRandall Stewart 			/* asconf's allowed */
3150f8829a4aSRandall Stewart 			sctp_check_address_list_ep(stcb, m, offset, length,
3151f8829a4aSRandall Stewart 			    init_addr);
3152f8829a4aSRandall Stewart 		}
3153f8829a4aSRandall Stewart 		/* else, no asconfs allowed, so what we sent is what we get */
3154f8829a4aSRandall Stewart 	}
3155f8829a4aSRandall Stewart }
3156f8829a4aSRandall Stewart 
3157f8829a4aSRandall Stewart /*
3158f8829a4aSRandall Stewart  * sctp_bindx() support
3159f8829a4aSRandall Stewart  */
3160f8829a4aSRandall Stewart uint32_t
31613c503c28SRandall Stewart sctp_addr_mgmt_ep_sa(struct sctp_inpcb *inp, struct sockaddr *sa,
3162b0471b4bSMichael Tuexen     uint32_t type, uint32_t vrf_id, struct sctp_ifa *sctp_ifap)
3163b0471b4bSMichael Tuexen {
316442551e99SRandall Stewart 	struct sctp_ifa *ifa;
31652678fe1eSMichael Tuexen 	struct sctp_laddr *laddr, *nladdr;
3166f8829a4aSRandall Stewart 
316742551e99SRandall Stewart 	if (sa->sa_len == 0) {
3168c4739e2fSRandall Stewart 		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EINVAL);
3169f8829a4aSRandall Stewart 		return (EINVAL);
317042551e99SRandall Stewart 	}
317180fefe0aSRandall Stewart 	if (sctp_ifap) {
317280fefe0aSRandall Stewart 		ifa = sctp_ifap;
317380fefe0aSRandall Stewart 	} else if (type == SCTP_ADD_IP_ADDRESS) {
317442551e99SRandall Stewart 		/* For an add the address MUST be on the system */
3175851b7298SRandall Stewart 		ifa = sctp_find_ifa_by_addr(sa, vrf_id, SCTP_ADDR_NOT_LOCKED);
317642551e99SRandall Stewart 	} else if (type == SCTP_DEL_IP_ADDRESS) {
317742551e99SRandall Stewart 		/* For a delete we need to find it in the inp */
3178851b7298SRandall Stewart 		ifa = sctp_find_ifa_in_ep(inp, sa, SCTP_ADDR_NOT_LOCKED);
317942551e99SRandall Stewart 	} else {
318042551e99SRandall Stewart 		ifa = NULL;
318142551e99SRandall Stewart 	}
3182f8829a4aSRandall Stewart 	if (ifa != NULL) {
318342551e99SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
318442551e99SRandall Stewart 			sctp_add_local_addr_ep(inp, ifa, type);
318542551e99SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
31863c503c28SRandall Stewart 			if (inp->laddr_count < 2) {
31873c503c28SRandall Stewart 				/* can't delete the last local address */
3188c4739e2fSRandall Stewart 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EINVAL);
31893c503c28SRandall Stewart 				return (EINVAL);
31903c503c28SRandall Stewart 			}
31913c503c28SRandall Stewart 			LIST_FOREACH(laddr, &inp->sctp_addr_list,
31923c503c28SRandall Stewart 			    sctp_nxt_addr) {
319342551e99SRandall Stewart 				if (ifa == laddr->ifa) {
319442551e99SRandall Stewart 					/* Mark in the delete */
319542551e99SRandall Stewart 					laddr->action = type;
319642551e99SRandall Stewart 				}
319742551e99SRandall Stewart 			}
319842551e99SRandall Stewart 		}
31992678fe1eSMichael Tuexen 		if (LIST_EMPTY(&inp->sctp_asoc_list)) {
320087b4fcd3SMichael Tuexen 			/*
320187b4fcd3SMichael Tuexen 			 * There is no need to start the iterator if the inp
320287b4fcd3SMichael Tuexen 			 * has no associations.
320387b4fcd3SMichael Tuexen 			 */
32042678fe1eSMichael Tuexen 			if (type == SCTP_DEL_IP_ADDRESS) {
32052678fe1eSMichael Tuexen 				LIST_FOREACH_SAFE(laddr, &inp->sctp_addr_list, sctp_nxt_addr, nladdr) {
32062678fe1eSMichael Tuexen 					if (laddr->ifa == ifa) {
32072678fe1eSMichael Tuexen 						sctp_del_local_addr_ep(inp, ifa);
32082678fe1eSMichael Tuexen 					}
32092678fe1eSMichael Tuexen 				}
32102678fe1eSMichael Tuexen 			}
32112678fe1eSMichael Tuexen 		} else {
321287b4fcd3SMichael Tuexen 			struct sctp_asconf_iterator *asc;
321387b4fcd3SMichael Tuexen 			struct sctp_laddr *wi;
32142b1c7de4SMichael Tuexen 			int ret;
321587b4fcd3SMichael Tuexen 
321687b4fcd3SMichael Tuexen 			SCTP_MALLOC(asc, struct sctp_asconf_iterator *,
321787b4fcd3SMichael Tuexen 			    sizeof(struct sctp_asconf_iterator),
321887b4fcd3SMichael Tuexen 			    SCTP_M_ASC_IT);
321987b4fcd3SMichael Tuexen 			if (asc == NULL) {
322087b4fcd3SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, ENOMEM);
322187b4fcd3SMichael Tuexen 				return (ENOMEM);
322287b4fcd3SMichael Tuexen 			}
322387b4fcd3SMichael Tuexen 			wi = SCTP_ZONE_GET(SCTP_BASE_INFO(ipi_zone_laddr), struct sctp_laddr);
322487b4fcd3SMichael Tuexen 			if (wi == NULL) {
322587b4fcd3SMichael Tuexen 				SCTP_FREE(asc, SCTP_M_ASC_IT);
322687b4fcd3SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, ENOMEM);
322787b4fcd3SMichael Tuexen 				return (ENOMEM);
322887b4fcd3SMichael Tuexen 			}
322942551e99SRandall Stewart 			LIST_INIT(&asc->list_of_work);
323042551e99SRandall Stewart 			asc->cnt = 1;
323142551e99SRandall Stewart 			SCTP_INCR_LADDR_COUNT();
323242551e99SRandall Stewart 			wi->ifa = ifa;
323342551e99SRandall Stewart 			wi->action = type;
323442551e99SRandall Stewart 			atomic_add_int(&ifa->refcount, 1);
323542551e99SRandall Stewart 			LIST_INSERT_HEAD(&asc->list_of_work, wi, sctp_nxt_addr);
32362b1c7de4SMichael Tuexen 			ret = sctp_initiate_iterator(sctp_asconf_iterator_ep,
32371b649582SRandall Stewart 			    sctp_asconf_iterator_stcb,
32381b649582SRandall Stewart 			    sctp_asconf_iterator_ep_end,
323942551e99SRandall Stewart 			    SCTP_PCB_ANY_FLAGS,
32403c503c28SRandall Stewart 			    SCTP_PCB_ANY_FEATURES,
32411b649582SRandall Stewart 			    SCTP_ASOC_ANY_STATE,
32421b649582SRandall Stewart 			    (void *)asc, 0,
32431b649582SRandall Stewart 			    sctp_asconf_iterator_end, inp, 0);
32442b1c7de4SMichael Tuexen 			if (ret) {
32452b1c7de4SMichael Tuexen 				SCTP_PRINTF("Failed to initiate iterator for addr_mgmt_ep_sa\n");
32462b1c7de4SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EFAULT);
32472b1c7de4SMichael Tuexen 				sctp_asconf_iterator_end(asc, 0);
32482b1c7de4SMichael Tuexen 				return (EFAULT);
32492b1c7de4SMichael Tuexen 			}
325087b4fcd3SMichael Tuexen 		}
325187b4fcd3SMichael Tuexen 		return (0);
3252f8829a4aSRandall Stewart 	} else {
3253f8829a4aSRandall Stewart 		/* invalid address! */
3254c4739e2fSRandall Stewart 		SCTP_LTRACE_ERR_RET(NULL, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EADDRNOTAVAIL);
3255f8829a4aSRandall Stewart 		return (EADDRNOTAVAIL);
3256f8829a4aSRandall Stewart 	}
3257f8829a4aSRandall Stewart }
3258830d754dSRandall Stewart 
3259830d754dSRandall Stewart void
3260830d754dSRandall Stewart sctp_asconf_send_nat_state_update(struct sctp_tcb *stcb,
3261830d754dSRandall Stewart     struct sctp_nets *net)
3262830d754dSRandall Stewart {
3263830d754dSRandall Stewart 	struct sctp_asconf_addr *aa;
3264830d754dSRandall Stewart 	struct sctp_ifa *sctp_ifap;
3265830d754dSRandall Stewart 	struct sctp_asconf_tag_param *vtag;
3266e6194c2eSMichael Tuexen #ifdef INET
3267830d754dSRandall Stewart 	struct sockaddr_in *to;
3268e6194c2eSMichael Tuexen #endif
3269830d754dSRandall Stewart #ifdef INET6
3270830d754dSRandall Stewart 	struct sockaddr_in6 *to6;
3271830d754dSRandall Stewart #endif
3272830d754dSRandall Stewart 	if (net == NULL) {
3273830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "sctp_asconf_send_nat_state_update: Missing net\n");
3274830d754dSRandall Stewart 		return;
3275830d754dSRandall Stewart 	}
3276830d754dSRandall Stewart 	if (stcb == NULL) {
3277830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "sctp_asconf_send_nat_state_update: Missing stcb\n");
3278830d754dSRandall Stewart 		return;
3279830d754dSRandall Stewart 	}
3280830d754dSRandall Stewart 	/*
3281830d754dSRandall Stewart 	 * Need to have in the asconf: - vtagparam(my_vtag/peer_vtag) -
3282830d754dSRandall Stewart 	 * add(0.0.0.0) - del(0.0.0.0) - Any global addresses add(addr)
3283830d754dSRandall Stewart 	 */
3284830d754dSRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
3285830d754dSRandall Stewart 	    SCTP_M_ASC_ADDR);
3286830d754dSRandall Stewart 	if (aa == NULL) {
3287830d754dSRandall Stewart 		/* didn't get memory */
3288830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
3289830d754dSRandall Stewart 		    "sctp_asconf_send_nat_state_update: failed to get memory!\n");
3290830d754dSRandall Stewart 		return;
3291830d754dSRandall Stewart 	}
3292830d754dSRandall Stewart 	aa->special_del = 0;
3293830d754dSRandall Stewart 	/* fill in asconf address parameter fields */
3294830d754dSRandall Stewart 	/* top level elements are "networked" during send */
3295830d754dSRandall Stewart 	aa->ifa = NULL;
3296830d754dSRandall Stewart 	aa->sent = 0;		/* clear sent flag */
3297830d754dSRandall Stewart 	vtag = (struct sctp_asconf_tag_param *)&aa->ap.aph;
3298830d754dSRandall Stewart 	vtag->aph.ph.param_type = SCTP_NAT_VTAGS;
3299830d754dSRandall Stewart 	vtag->aph.ph.param_length = sizeof(struct sctp_asconf_tag_param);
3300830d754dSRandall Stewart 	vtag->local_vtag = htonl(stcb->asoc.my_vtag);
3301830d754dSRandall Stewart 	vtag->remote_vtag = htonl(stcb->asoc.peer_vtag);
3302830d754dSRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3303830d754dSRandall Stewart 
3304830d754dSRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
3305830d754dSRandall Stewart 	    SCTP_M_ASC_ADDR);
3306830d754dSRandall Stewart 	if (aa == NULL) {
3307830d754dSRandall Stewart 		/* didn't get memory */
3308830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
3309830d754dSRandall Stewart 		    "sctp_asconf_send_nat_state_update: failed to get memory!\n");
3310830d754dSRandall Stewart 		return;
3311830d754dSRandall Stewart 	}
3312830d754dSRandall Stewart 	memset(aa, 0, sizeof(struct sctp_asconf_addr));
3313830d754dSRandall Stewart 	/* fill in asconf address parameter fields */
3314830d754dSRandall Stewart 	/* ADD(0.0.0.0) */
3315e6194c2eSMichael Tuexen 	switch (net->ro._l_addr.sa.sa_family) {
3316e6194c2eSMichael Tuexen #ifdef INET
3317e6194c2eSMichael Tuexen 	case AF_INET:
3318830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_ADD_IP_ADDRESS;
3319830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addrv4_param);
3320830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
3321830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv4addr_param);
3322830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3323830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3324e6194c2eSMichael Tuexen 		break;
3325e6194c2eSMichael Tuexen #endif
3326830d754dSRandall Stewart #ifdef INET6
3327e6194c2eSMichael Tuexen 	case AF_INET6:
3328830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_ADD_IP_ADDRESS;
3329830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addr_param);
3330830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
3331830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv6addr_param);
3332830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3333830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3334e6194c2eSMichael Tuexen 		break;
3335e6194c2eSMichael Tuexen #endif
33363ff78fbbSMichael Tuexen 	default:
33373ff78fbbSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1,
33383ff78fbbSMichael Tuexen 		    "sctp_asconf_send_nat_state_update: unknown address family\n");
33393ff78fbbSMichael Tuexen 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
33403ff78fbbSMichael Tuexen 		return;
3341830d754dSRandall Stewart 	}
3342830d754dSRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
3343830d754dSRandall Stewart 	    SCTP_M_ASC_ADDR);
3344830d754dSRandall Stewart 	if (aa == NULL) {
3345830d754dSRandall Stewart 		/* didn't get memory */
3346830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
3347830d754dSRandall Stewart 		    "sctp_asconf_send_nat_state_update: failed to get memory!\n");
3348830d754dSRandall Stewart 		return;
3349830d754dSRandall Stewart 	}
3350830d754dSRandall Stewart 	memset(aa, 0, sizeof(struct sctp_asconf_addr));
3351830d754dSRandall Stewart 	/* fill in asconf address parameter fields */
3352830d754dSRandall Stewart 	/* ADD(0.0.0.0) */
3353e6194c2eSMichael Tuexen 	switch (net->ro._l_addr.sa.sa_family) {
3354e6194c2eSMichael Tuexen #ifdef INET
3355e6194c2eSMichael Tuexen 	case AF_INET:
3356830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_ADD_IP_ADDRESS;
3357830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addrv4_param);
3358830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
3359830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv4addr_param);
3360830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3361830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3362e6194c2eSMichael Tuexen 		break;
3363e6194c2eSMichael Tuexen #endif
3364830d754dSRandall Stewart #ifdef INET6
3365e6194c2eSMichael Tuexen 	case AF_INET6:
3366830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_DEL_IP_ADDRESS;
3367830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addr_param);
3368830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
3369830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv6addr_param);
3370830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3371830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3372e6194c2eSMichael Tuexen 		break;
3373e6194c2eSMichael Tuexen #endif
33743ff78fbbSMichael Tuexen 	default:
33753ff78fbbSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1,
33763ff78fbbSMichael Tuexen 		    "sctp_asconf_send_nat_state_update: unknown address family\n");
33773ff78fbbSMichael Tuexen 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
33783ff78fbbSMichael Tuexen 		return;
3379830d754dSRandall Stewart 	}
3380830d754dSRandall Stewart 	/* Now we must hunt the addresses and add all global addresses */
3381830d754dSRandall Stewart 	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
3382830d754dSRandall Stewart 		struct sctp_vrf *vrf = NULL;
3383830d754dSRandall Stewart 		struct sctp_ifn *sctp_ifnp;
3384830d754dSRandall Stewart 		uint32_t vrf_id;
3385830d754dSRandall Stewart 
3386830d754dSRandall Stewart 		vrf_id = stcb->sctp_ep->def_vrf_id;
3387830d754dSRandall Stewart 		vrf = sctp_find_vrf(vrf_id);
3388830d754dSRandall Stewart 		if (vrf == NULL) {
3389830d754dSRandall Stewart 			goto skip_rest;
3390830d754dSRandall Stewart 		}
33910053ed28SMichael Tuexen 
3392830d754dSRandall Stewart 		SCTP_IPI_ADDR_RLOCK();
3393830d754dSRandall Stewart 		LIST_FOREACH(sctp_ifnp, &vrf->ifnlist, next_ifn) {
3394830d754dSRandall Stewart 			LIST_FOREACH(sctp_ifap, &sctp_ifnp->ifalist, next_ifa) {
3395e6194c2eSMichael Tuexen 				switch (sctp_ifap->address.sa.sa_family) {
3396e6194c2eSMichael Tuexen #ifdef INET
3397e6194c2eSMichael Tuexen 				case AF_INET:
3398830d754dSRandall Stewart 					to = &sctp_ifap->address.sin;
33996ba22f19SMichael Tuexen 					if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
34006ba22f19SMichael Tuexen 					    &to->sin_addr) != 0) {
34016ba22f19SMichael Tuexen 						continue;
34026ba22f19SMichael Tuexen 					}
3403830d754dSRandall Stewart 					if (IN4_ISPRIVATE_ADDRESS(&to->sin_addr)) {
3404830d754dSRandall Stewart 						continue;
3405830d754dSRandall Stewart 					}
3406830d754dSRandall Stewart 					if (IN4_ISLOOPBACK_ADDRESS(&to->sin_addr)) {
3407830d754dSRandall Stewart 						continue;
3408830d754dSRandall Stewart 					}
3409e6194c2eSMichael Tuexen 					break;
3410e6194c2eSMichael Tuexen #endif
3411830d754dSRandall Stewart #ifdef INET6
3412e6194c2eSMichael Tuexen 				case AF_INET6:
3413830d754dSRandall Stewart 					to6 = &sctp_ifap->address.sin6;
34146ba22f19SMichael Tuexen 					if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
34156ba22f19SMichael Tuexen 					    &to6->sin6_addr) != 0) {
34166ba22f19SMichael Tuexen 						continue;
34176ba22f19SMichael Tuexen 					}
3418830d754dSRandall Stewart 					if (IN6_IS_ADDR_LOOPBACK(&to6->sin6_addr)) {
3419830d754dSRandall Stewart 						continue;
3420830d754dSRandall Stewart 					}
3421830d754dSRandall Stewart 					if (IN6_IS_ADDR_LINKLOCAL(&to6->sin6_addr)) {
3422830d754dSRandall Stewart 						continue;
3423830d754dSRandall Stewart 					}
3424e6194c2eSMichael Tuexen 					break;
3425830d754dSRandall Stewart #endif
3426e6194c2eSMichael Tuexen 				default:
3427e6194c2eSMichael Tuexen 					continue;
3428e6194c2eSMichael Tuexen 				}
3429830d754dSRandall Stewart 				sctp_asconf_queue_mgmt(stcb, sctp_ifap, SCTP_ADD_IP_ADDRESS);
3430830d754dSRandall Stewart 			}
3431830d754dSRandall Stewart 		}
3432830d754dSRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
3433830d754dSRandall Stewart 	} else {
3434830d754dSRandall Stewart 		struct sctp_laddr *laddr;
3435830d754dSRandall Stewart 
3436830d754dSRandall Stewart 		LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
3437830d754dSRandall Stewart 			if (laddr->ifa == NULL) {
3438830d754dSRandall Stewart 				continue;
3439830d754dSRandall Stewart 			}
3440830d754dSRandall Stewart 			if (laddr->ifa->localifa_flags & SCTP_BEING_DELETED)
3441830d754dSRandall Stewart 				/*
3442830d754dSRandall Stewart 				 * Address being deleted by the system, dont
3443830d754dSRandall Stewart 				 * list.
3444830d754dSRandall Stewart 				 */
3445830d754dSRandall Stewart 				continue;
3446830d754dSRandall Stewart 			if (laddr->action == SCTP_DEL_IP_ADDRESS) {
3447830d754dSRandall Stewart 				/*
3448830d754dSRandall Stewart 				 * Address being deleted on this ep don't
3449830d754dSRandall Stewart 				 * list.
3450830d754dSRandall Stewart 				 */
3451830d754dSRandall Stewart 				continue;
3452830d754dSRandall Stewart 			}
3453830d754dSRandall Stewart 			sctp_ifap = laddr->ifa;
3454e6194c2eSMichael Tuexen 			switch (sctp_ifap->address.sa.sa_family) {
3455e6194c2eSMichael Tuexen #ifdef INET
3456e6194c2eSMichael Tuexen 			case AF_INET:
3457830d754dSRandall Stewart 				to = &sctp_ifap->address.sin;
3458830d754dSRandall Stewart 				if (IN4_ISPRIVATE_ADDRESS(&to->sin_addr)) {
3459830d754dSRandall Stewart 					continue;
3460830d754dSRandall Stewart 				}
3461830d754dSRandall Stewart 				if (IN4_ISLOOPBACK_ADDRESS(&to->sin_addr)) {
3462830d754dSRandall Stewart 					continue;
3463830d754dSRandall Stewart 				}
3464e6194c2eSMichael Tuexen 				break;
3465e6194c2eSMichael Tuexen #endif
3466830d754dSRandall Stewart #ifdef INET6
3467e6194c2eSMichael Tuexen 			case AF_INET6:
3468830d754dSRandall Stewart 				to6 = &sctp_ifap->address.sin6;
3469830d754dSRandall Stewart 				if (IN6_IS_ADDR_LOOPBACK(&to6->sin6_addr)) {
3470830d754dSRandall Stewart 					continue;
3471830d754dSRandall Stewart 				}
3472830d754dSRandall Stewart 				if (IN6_IS_ADDR_LINKLOCAL(&to6->sin6_addr)) {
3473830d754dSRandall Stewart 					continue;
3474830d754dSRandall Stewart 				}
3475e6194c2eSMichael Tuexen 				break;
3476830d754dSRandall Stewart #endif
3477e6194c2eSMichael Tuexen 			default:
3478e6194c2eSMichael Tuexen 				continue;
3479e6194c2eSMichael Tuexen 			}
3480830d754dSRandall Stewart 			sctp_asconf_queue_mgmt(stcb, sctp_ifap, SCTP_ADD_IP_ADDRESS);
3481830d754dSRandall Stewart 		}
3482830d754dSRandall Stewart 	}
3483830d754dSRandall Stewart skip_rest:
3484830d754dSRandall Stewart 	/* Now we must send the asconf into the queue */
3485ca85e948SMichael Tuexen 	sctp_send_asconf(stcb, net, SCTP_ADDR_NOT_LOCKED);
3486830d754dSRandall Stewart }
3487