xref: /freebsd/sys/netinet/sctp_asconf.c (revision 839d21d62e4125b47ee35e9685d023b0fb4110a3)
1f8829a4aSRandall Stewart /*-
251369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni  *
4b1006367SRandall Stewart  * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
5807aad63SMichael Tuexen  * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
6807aad63SMichael Tuexen  * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
7f8829a4aSRandall Stewart  *
8f8829a4aSRandall Stewart  * Redistribution and use in source and binary forms, with or without
9f8829a4aSRandall Stewart  * modification, are permitted provided that the following conditions are met:
10f8829a4aSRandall Stewart  *
11f8829a4aSRandall Stewart  * a) Redistributions of source code must retain the above copyright notice,
12f8829a4aSRandall Stewart  *    this list of conditions and the following disclaimer.
13f8829a4aSRandall Stewart  *
14f8829a4aSRandall Stewart  * b) Redistributions in binary form must reproduce the above copyright
15f8829a4aSRandall Stewart  *    notice, this list of conditions and the following disclaimer in
16f8829a4aSRandall Stewart  *    the documentation and/or other materials provided with the distribution.
17f8829a4aSRandall Stewart  *
18f8829a4aSRandall Stewart  * c) Neither the name of Cisco Systems, Inc. nor the names of its
19f8829a4aSRandall Stewart  *    contributors may be used to endorse or promote products derived
20f8829a4aSRandall Stewart  *    from this software without specific prior written permission.
21f8829a4aSRandall Stewart  *
22f8829a4aSRandall Stewart  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23f8829a4aSRandall Stewart  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
24f8829a4aSRandall Stewart  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25f8829a4aSRandall Stewart  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
26f8829a4aSRandall Stewart  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
27f8829a4aSRandall Stewart  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
28f8829a4aSRandall Stewart  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
29f8829a4aSRandall Stewart  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
30f8829a4aSRandall Stewart  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
31f8829a4aSRandall Stewart  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
32f8829a4aSRandall Stewart  * THE POSSIBILITY OF SUCH DAMAGE.
33f8829a4aSRandall Stewart  */
34f8829a4aSRandall Stewart 
35f8829a4aSRandall Stewart #include <sys/cdefs.h>
36cef8ad06SRandall Stewart __FBSDID("$FreeBSD$");
37807aad63SMichael Tuexen 
38f8829a4aSRandall Stewart #include <netinet/sctp_os.h>
39f8829a4aSRandall Stewart #include <netinet/sctp_var.h>
4042551e99SRandall Stewart #include <netinet/sctp_sysctl.h>
41f8829a4aSRandall Stewart #include <netinet/sctp_pcb.h>
42f8829a4aSRandall Stewart #include <netinet/sctp_header.h>
43f8829a4aSRandall Stewart #include <netinet/sctputil.h>
44f8829a4aSRandall Stewart #include <netinet/sctp_output.h>
45f8829a4aSRandall Stewart #include <netinet/sctp_asconf.h>
46851b7298SRandall Stewart #include <netinet/sctp_timer.h>
47f8829a4aSRandall Stewart 
48f8829a4aSRandall Stewart /*
49f8829a4aSRandall Stewart  * debug flags:
50f8829a4aSRandall Stewart  * SCTP_DEBUG_ASCONF1: protocol info, general info and errors
51f8829a4aSRandall Stewart  * SCTP_DEBUG_ASCONF2: detailed info
52f8829a4aSRandall Stewart  */
53f8829a4aSRandall Stewart 
54f8829a4aSRandall Stewart 
55f8829a4aSRandall Stewart /*
56b1754ad1SMichael Tuexen  * RFC 5061
57f8829a4aSRandall Stewart  *
58f8829a4aSRandall Stewart  * An ASCONF parameter queue exists per asoc which holds the pending address
59f8829a4aSRandall Stewart  * operations.  Lists are updated upon receipt of ASCONF-ACK.
60f8829a4aSRandall Stewart  *
6118e198d3SRandall Stewart  * A restricted_addrs list exists per assoc to hold local addresses that are
6218e198d3SRandall Stewart  * not (yet) usable by the assoc as a source address.  These addresses are
6318e198d3SRandall Stewart  * either pending an ASCONF operation (and exist on the ASCONF parameter
6418e198d3SRandall Stewart  * queue), or they are permanently restricted (the peer has returned an
6518e198d3SRandall Stewart  * ERROR indication to an ASCONF(ADD), or the peer does not support ASCONF).
6618e198d3SRandall Stewart  *
67f8829a4aSRandall Stewart  * Deleted addresses are always immediately removed from the lists as they will
68f8829a4aSRandall Stewart  * (shortly) no longer exist in the kernel.  We send ASCONFs as a courtesy,
69f8829a4aSRandall Stewart  * only if allowed.
70f8829a4aSRandall Stewart  */
71f8829a4aSRandall Stewart 
72f8829a4aSRandall Stewart /*
7318e198d3SRandall Stewart  * ASCONF parameter processing.
7418e198d3SRandall Stewart  * response_required: set if a reply is required (eg. SUCCESS_REPORT).
7518e198d3SRandall Stewart  * returns a mbuf to an "error" response parameter or NULL/"success" if ok.
7618e198d3SRandall Stewart  * FIX: allocating this many mbufs on the fly is pretty inefficient...
77f8829a4aSRandall Stewart  */
78f8829a4aSRandall Stewart static struct mbuf *
79f8829a4aSRandall Stewart sctp_asconf_success_response(uint32_t id)
80f8829a4aSRandall Stewart {
81f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
82f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
83f8829a4aSRandall Stewart 
84f8829a4aSRandall Stewart 	m_reply = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_paramhdr),
85eb1b1807SGleb Smirnoff 	    0, M_NOWAIT, 1, MT_DATA);
86f8829a4aSRandall Stewart 	if (m_reply == NULL) {
87ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
88ad81507eSRandall Stewart 		    "asconf_success_response: couldn't get mbuf!\n");
8960990c0cSMichael Tuexen 		return (NULL);
90f8829a4aSRandall Stewart 	}
91f8829a4aSRandall Stewart 	aph = mtod(m_reply, struct sctp_asconf_paramhdr *);
92f8829a4aSRandall Stewart 	aph->correlation_id = id;
93f8829a4aSRandall Stewart 	aph->ph.param_type = htons(SCTP_SUCCESS_REPORT);
94f8829a4aSRandall Stewart 	aph->ph.param_length = sizeof(struct sctp_asconf_paramhdr);
95139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_reply) = aph->ph.param_length;
96f8829a4aSRandall Stewart 	aph->ph.param_length = htons(aph->ph.param_length);
97f8829a4aSRandall Stewart 
9860990c0cSMichael Tuexen 	return (m_reply);
99f8829a4aSRandall Stewart }
100f8829a4aSRandall Stewart 
101f8829a4aSRandall Stewart static struct mbuf *
102f8829a4aSRandall Stewart sctp_asconf_error_response(uint32_t id, uint16_t cause, uint8_t *error_tlv,
103f8829a4aSRandall Stewart     uint16_t tlv_length)
104f8829a4aSRandall Stewart {
105f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
106f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
107f8829a4aSRandall Stewart 	struct sctp_error_cause *error;
108f8829a4aSRandall Stewart 	uint8_t *tlv;
109f8829a4aSRandall Stewart 
110f8829a4aSRandall Stewart 	m_reply = sctp_get_mbuf_for_msg((sizeof(struct sctp_asconf_paramhdr) +
111f8829a4aSRandall Stewart 	    tlv_length +
112f8829a4aSRandall Stewart 	    sizeof(struct sctp_error_cause)),
113eb1b1807SGleb Smirnoff 	    0, M_NOWAIT, 1, MT_DATA);
114f8829a4aSRandall Stewart 	if (m_reply == NULL) {
115ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
116ad81507eSRandall Stewart 		    "asconf_error_response: couldn't get mbuf!\n");
11760990c0cSMichael Tuexen 		return (NULL);
118f8829a4aSRandall Stewart 	}
119f8829a4aSRandall Stewart 	aph = mtod(m_reply, struct sctp_asconf_paramhdr *);
120f8829a4aSRandall Stewart 	error = (struct sctp_error_cause *)(aph + 1);
121f8829a4aSRandall Stewart 
122f8829a4aSRandall Stewart 	aph->correlation_id = id;
123f8829a4aSRandall Stewart 	aph->ph.param_type = htons(SCTP_ERROR_CAUSE_IND);
124f8829a4aSRandall Stewart 	error->code = htons(cause);
125f8829a4aSRandall Stewart 	error->length = tlv_length + sizeof(struct sctp_error_cause);
126f8829a4aSRandall Stewart 	aph->ph.param_length = error->length +
127f8829a4aSRandall Stewart 	    sizeof(struct sctp_asconf_paramhdr);
128f8829a4aSRandall Stewart 
129f8829a4aSRandall Stewart 	if (aph->ph.param_length > MLEN) {
130ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
131ad81507eSRandall Stewart 		    "asconf_error_response: tlv_length (%xh) too big\n",
132f8829a4aSRandall Stewart 		    tlv_length);
133f8829a4aSRandall Stewart 		sctp_m_freem(m_reply);	/* discard */
13460990c0cSMichael Tuexen 		return (NULL);
135f8829a4aSRandall Stewart 	}
136f8829a4aSRandall Stewart 	if (error_tlv != NULL) {
137f8829a4aSRandall Stewart 		tlv = (uint8_t *)(error + 1);
138f8829a4aSRandall Stewart 		memcpy(tlv, error_tlv, tlv_length);
139f8829a4aSRandall Stewart 	}
140139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_reply) = aph->ph.param_length;
141f8829a4aSRandall Stewart 	error->length = htons(error->length);
142f8829a4aSRandall Stewart 	aph->ph.param_length = htons(aph->ph.param_length);
143f8829a4aSRandall Stewart 
14460990c0cSMichael Tuexen 	return (m_reply);
145f8829a4aSRandall Stewart }
146f8829a4aSRandall Stewart 
147f8829a4aSRandall Stewart static struct mbuf *
148b1754ad1SMichael Tuexen sctp_process_asconf_add_ip(struct sockaddr *src, struct sctp_asconf_paramhdr *aph,
149ca85e948SMichael Tuexen     struct sctp_tcb *stcb, int send_hb, int response_required)
150f8829a4aSRandall Stewart {
151ca85e948SMichael Tuexen 	struct sctp_nets *net;
152f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
15324aaac8dSMichael Tuexen 	union sctp_sockstore store;
154e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
155b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
156b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
157b54ddf22SMichael Tuexen 	uint16_t param_length;
158b54ddf22SMichael Tuexen #endif
159f8829a4aSRandall Stewart 	struct sockaddr *sa;
160f8829a4aSRandall Stewart 	int zero_address = 0;
16192776dfdSMichael Tuexen 	int bad_address = 0;
162e6194c2eSMichael Tuexen #ifdef INET
163e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
164e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
165e6194c2eSMichael Tuexen #endif
166f8829a4aSRandall Stewart #ifdef INET6
167f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
168f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
169e6194c2eSMichael Tuexen #endif
170f8829a4aSRandall Stewart 
171f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
172e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
173e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
174b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
175e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
176b54ddf22SMichael Tuexen #endif
17724aaac8dSMichael Tuexen 	sa = &store.sa;
178f8829a4aSRandall Stewart 	switch (param_type) {
179e6194c2eSMichael Tuexen #ifdef INET
180f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
181f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
182f8829a4aSRandall Stewart 			/* invalid param size */
18360990c0cSMichael Tuexen 			return (NULL);
184f8829a4aSRandall Stewart 		}
185e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
18624aaac8dSMichael Tuexen 		sin = &store.sin;
1875ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
188f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
189f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
190f8829a4aSRandall Stewart 		sin->sin_port = stcb->rport;
191f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
19292776dfdSMichael Tuexen 		if ((sin->sin_addr.s_addr == INADDR_BROADCAST) ||
19392776dfdSMichael Tuexen 		    IN_MULTICAST(ntohl(sin->sin_addr.s_addr))) {
1943657c405SMichael Tuexen 			bad_address = 1;
19592776dfdSMichael Tuexen 		}
196f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
197f8829a4aSRandall Stewart 			zero_address = 1;
198ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_add_ip: adding ");
199ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
200f8829a4aSRandall Stewart 		break;
201e6194c2eSMichael Tuexen #endif
202f8829a4aSRandall Stewart #ifdef INET6
203e6194c2eSMichael Tuexen 	case SCTP_IPV6_ADDRESS:
204f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
205f8829a4aSRandall Stewart 			/* invalid param size */
20660990c0cSMichael Tuexen 			return (NULL);
207f8829a4aSRandall Stewart 		}
208e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
20924aaac8dSMichael Tuexen 		sin6 = &store.sin6;
2105ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
211f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
212f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
213f8829a4aSRandall Stewart 		sin6->sin6_port = stcb->rport;
214f8829a4aSRandall Stewart 		memcpy((caddr_t)&sin6->sin6_addr, v6addr->addr,
215f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
21692776dfdSMichael Tuexen 		if (IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr)) {
21792776dfdSMichael Tuexen 			bad_address = 1;
21892776dfdSMichael Tuexen 		}
219f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
220f8829a4aSRandall Stewart 			zero_address = 1;
221ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_add_ip: adding ");
222ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
223f8829a4aSRandall Stewart 		break;
224e6194c2eSMichael Tuexen #endif
225f8829a4aSRandall Stewart 	default:
226f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
22792776dfdSMichael Tuexen 		    SCTP_CAUSE_INVALID_PARAM, (uint8_t *)aph,
228f8829a4aSRandall Stewart 		    aparam_length);
22960990c0cSMichael Tuexen 		return (m_reply);
230f8829a4aSRandall Stewart 	}			/* end switch */
231f8829a4aSRandall Stewart 
232f8829a4aSRandall Stewart 	/* if 0.0.0.0/::0, add the source address instead */
233b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
234b1754ad1SMichael Tuexen 		sa = src;
235ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
236ad81507eSRandall Stewart 		    "process_asconf_add_ip: using source addr ");
237b1754ad1SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
238f8829a4aSRandall Stewart 	}
239f8829a4aSRandall Stewart 	/* add the address */
24092776dfdSMichael Tuexen 	if (bad_address) {
24192776dfdSMichael Tuexen 		m_reply = sctp_asconf_error_response(aph->correlation_id,
24292776dfdSMichael Tuexen 		    SCTP_CAUSE_INVALID_PARAM, (uint8_t *)aph,
24392776dfdSMichael Tuexen 		    aparam_length);
2447154bf4aSMichael Tuexen 	} else if (sctp_add_remote_addr(stcb, sa, &net, stcb->asoc.port,
2457154bf4aSMichael Tuexen 		    SCTP_DONOT_SETSCOPE,
246a5d547adSRandall Stewart 	    SCTP_ADDR_DYNAMIC_ADDED) != 0) {
247ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
248ad81507eSRandall Stewart 		    "process_asconf_add_ip: error adding address\n");
249f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
250f8829a4aSRandall Stewart 		    SCTP_CAUSE_RESOURCE_SHORTAGE, (uint8_t *)aph,
251f8829a4aSRandall Stewart 		    aparam_length);
252f8829a4aSRandall Stewart 	} else {
253f8829a4aSRandall Stewart 		/* notify upper layer */
254ceaad40aSRandall Stewart 		sctp_ulp_notify(SCTP_NOTIFY_ASCONF_ADD_IP, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
255f8829a4aSRandall Stewart 		if (response_required) {
256f8829a4aSRandall Stewart 			m_reply =
257f8829a4aSRandall Stewart 			    sctp_asconf_success_response(aph->correlation_id);
258f8829a4aSRandall Stewart 		}
259ca85e948SMichael Tuexen 		sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, stcb->sctp_ep, stcb, net);
2603c503c28SRandall Stewart 		sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep,
261ca85e948SMichael Tuexen 		    stcb, net);
262ca85e948SMichael Tuexen 		if (send_hb) {
263ca85e948SMichael Tuexen 			sctp_send_hb(stcb, net, SCTP_SO_NOT_LOCKED);
264ca85e948SMichael Tuexen 		}
265f8829a4aSRandall Stewart 	}
26660990c0cSMichael Tuexen 	return (m_reply);
267f8829a4aSRandall Stewart }
268f8829a4aSRandall Stewart 
269f8829a4aSRandall Stewart static int
2701b649582SRandall Stewart sctp_asconf_del_remote_addrs_except(struct sctp_tcb *stcb, struct sockaddr *src)
271f8829a4aSRandall Stewart {
272f8829a4aSRandall Stewart 	struct sctp_nets *src_net, *net;
273f8829a4aSRandall Stewart 
274f8829a4aSRandall Stewart 	/* make sure the source address exists as a destination net */
275f8829a4aSRandall Stewart 	src_net = sctp_findnet(stcb, src);
276f8829a4aSRandall Stewart 	if (src_net == NULL) {
277f8829a4aSRandall Stewart 		/* not found */
27860990c0cSMichael Tuexen 		return (-1);
279f8829a4aSRandall Stewart 	}
2800053ed28SMichael Tuexen 
281f8829a4aSRandall Stewart 	/* delete all destination addresses except the source */
282f8829a4aSRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
283f8829a4aSRandall Stewart 		if (net != src_net) {
284f8829a4aSRandall Stewart 			/* delete this address */
285f8829a4aSRandall Stewart 			sctp_remove_net(stcb, net);
286ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
287ad81507eSRandall Stewart 			    "asconf_del_remote_addrs_except: deleting ");
288ad81507eSRandall Stewart 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1,
289ad81507eSRandall Stewart 			    (struct sockaddr *)&net->ro._l_addr);
290f8829a4aSRandall Stewart 			/* notify upper layer */
291f8829a4aSRandall Stewart 			sctp_ulp_notify(SCTP_NOTIFY_ASCONF_DELETE_IP, stcb, 0,
292ceaad40aSRandall Stewart 			    (struct sockaddr *)&net->ro._l_addr, SCTP_SO_NOT_LOCKED);
293f8829a4aSRandall Stewart 		}
294f8829a4aSRandall Stewart 	}
29560990c0cSMichael Tuexen 	return (0);
296f8829a4aSRandall Stewart }
297f8829a4aSRandall Stewart 
298f8829a4aSRandall Stewart static struct mbuf *
299b1754ad1SMichael Tuexen sctp_process_asconf_delete_ip(struct sockaddr *src,
300b1754ad1SMichael Tuexen     struct sctp_asconf_paramhdr *aph,
301f8829a4aSRandall Stewart     struct sctp_tcb *stcb, int response_required)
302f8829a4aSRandall Stewart {
303f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
30424aaac8dSMichael Tuexen 	union sctp_sockstore store;
305e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
306b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
307b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
308b54ddf22SMichael Tuexen 	uint16_t param_length;
309b54ddf22SMichael Tuexen #endif
310f8829a4aSRandall Stewart 	struct sockaddr *sa;
311f8829a4aSRandall Stewart 	int zero_address = 0;
312f8829a4aSRandall Stewart 	int result;
313e6194c2eSMichael Tuexen #ifdef INET
314e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
315e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
316e6194c2eSMichael Tuexen #endif
317f8829a4aSRandall Stewart #ifdef INET6
318f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
319f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
320e6194c2eSMichael Tuexen #endif
321f8829a4aSRandall Stewart 
322f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
323e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
324e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
325b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
326e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
327b54ddf22SMichael Tuexen #endif
32824aaac8dSMichael Tuexen 	sa = &store.sa;
329f8829a4aSRandall Stewart 	switch (param_type) {
330e6194c2eSMichael Tuexen #ifdef INET
331f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
332f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
333f8829a4aSRandall Stewart 			/* invalid param size */
33460990c0cSMichael Tuexen 			return (NULL);
335f8829a4aSRandall Stewart 		}
336e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
33724aaac8dSMichael Tuexen 		sin = &store.sin;
3385ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
339f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
340f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
341f8829a4aSRandall Stewart 		sin->sin_port = stcb->rport;
342f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
343f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
344f8829a4aSRandall Stewart 			zero_address = 1;
345ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
346ad81507eSRandall Stewart 		    "process_asconf_delete_ip: deleting ");
347ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
348f8829a4aSRandall Stewart 		break;
349e6194c2eSMichael Tuexen #endif
350e6194c2eSMichael Tuexen #ifdef INET6
351f8829a4aSRandall Stewart 	case SCTP_IPV6_ADDRESS:
352f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
353f8829a4aSRandall Stewart 			/* invalid param size */
35460990c0cSMichael Tuexen 			return (NULL);
355f8829a4aSRandall Stewart 		}
356e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
35724aaac8dSMichael Tuexen 		sin6 = &store.sin6;
3585ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
359f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
360f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
361f8829a4aSRandall Stewart 		sin6->sin6_port = stcb->rport;
362f8829a4aSRandall Stewart 		memcpy(&sin6->sin6_addr, v6addr->addr,
363f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
364f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
365f8829a4aSRandall Stewart 			zero_address = 1;
366ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
367ad81507eSRandall Stewart 		    "process_asconf_delete_ip: deleting ");
368ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
369f8829a4aSRandall Stewart 		break;
370e6194c2eSMichael Tuexen #endif
371f8829a4aSRandall Stewart 	default:
372f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
373f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
374f8829a4aSRandall Stewart 		    aparam_length);
37560990c0cSMichael Tuexen 		return (m_reply);
376f8829a4aSRandall Stewart 	}
377f8829a4aSRandall Stewart 
378f8829a4aSRandall Stewart 	/* make sure the source address is not being deleted */
379b1754ad1SMichael Tuexen 	if (sctp_cmpaddr(sa, src)) {
380f8829a4aSRandall Stewart 		/* trying to delete the source address! */
381ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: tried to delete source addr\n");
382f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
383f8829a4aSRandall Stewart 		    SCTP_CAUSE_DELETING_SRC_ADDR, (uint8_t *)aph,
384f8829a4aSRandall Stewart 		    aparam_length);
38560990c0cSMichael Tuexen 		return (m_reply);
386f8829a4aSRandall Stewart 	}
3870053ed28SMichael Tuexen 
388f8829a4aSRandall Stewart 	/* if deleting 0.0.0.0/::0, delete all addresses except src addr */
389b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
390b1754ad1SMichael Tuexen 		result = sctp_asconf_del_remote_addrs_except(stcb, src);
391f8829a4aSRandall Stewart 
392f8829a4aSRandall Stewart 		if (result) {
393f8829a4aSRandall Stewart 			/* src address did not exist? */
394ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: src addr does not exist?\n");
395f8829a4aSRandall Stewart 			/* what error to reply with?? */
396f8829a4aSRandall Stewart 			m_reply =
397f8829a4aSRandall Stewart 			    sctp_asconf_error_response(aph->correlation_id,
398f8829a4aSRandall Stewart 			    SCTP_CAUSE_REQUEST_REFUSED, (uint8_t *)aph,
399f8829a4aSRandall Stewart 			    aparam_length);
400f8829a4aSRandall Stewart 		} else if (response_required) {
401f8829a4aSRandall Stewart 			m_reply =
402f8829a4aSRandall Stewart 			    sctp_asconf_success_response(aph->correlation_id);
403f8829a4aSRandall Stewart 		}
40460990c0cSMichael Tuexen 		return (m_reply);
405f8829a4aSRandall Stewart 	}
4060053ed28SMichael Tuexen 
407f8829a4aSRandall Stewart 	/* delete the address */
408f8829a4aSRandall Stewart 	result = sctp_del_remote_addr(stcb, sa);
409f8829a4aSRandall Stewart 	/*
410f8829a4aSRandall Stewart 	 * note if result == -2, the address doesn't exist in the asoc but
411f8829a4aSRandall Stewart 	 * since it's being deleted anyways, we just ack the delete -- but
412f8829a4aSRandall Stewart 	 * this probably means something has already gone awry
413f8829a4aSRandall Stewart 	 */
414f8829a4aSRandall Stewart 	if (result == -1) {
415f8829a4aSRandall Stewart 		/* only one address in the asoc */
416ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: tried to delete last IP addr!\n");
417f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
418f8829a4aSRandall Stewart 		    SCTP_CAUSE_DELETING_LAST_ADDR, (uint8_t *)aph,
419f8829a4aSRandall Stewart 		    aparam_length);
420f8829a4aSRandall Stewart 	} else {
421f8829a4aSRandall Stewart 		if (response_required) {
422f8829a4aSRandall Stewart 			m_reply = sctp_asconf_success_response(aph->correlation_id);
423f8829a4aSRandall Stewart 		}
424f8829a4aSRandall Stewart 		/* notify upper layer */
425ceaad40aSRandall Stewart 		sctp_ulp_notify(SCTP_NOTIFY_ASCONF_DELETE_IP, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
426f8829a4aSRandall Stewart 	}
42760990c0cSMichael Tuexen 	return (m_reply);
428f8829a4aSRandall Stewart }
429f8829a4aSRandall Stewart 
430f8829a4aSRandall Stewart static struct mbuf *
431b1754ad1SMichael Tuexen sctp_process_asconf_set_primary(struct sockaddr *src,
4321b649582SRandall Stewart     struct sctp_asconf_paramhdr *aph,
4331b649582SRandall Stewart     struct sctp_tcb *stcb, int response_required)
434f8829a4aSRandall Stewart {
435f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
43624aaac8dSMichael Tuexen 	union sctp_sockstore store;
437e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
438b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
439b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
440b54ddf22SMichael Tuexen 	uint16_t param_length;
441b54ddf22SMichael Tuexen #endif
442f8829a4aSRandall Stewart 	struct sockaddr *sa;
443f8829a4aSRandall Stewart 	int zero_address = 0;
444e6194c2eSMichael Tuexen #ifdef INET
445e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
446e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
447e6194c2eSMichael Tuexen #endif
448f8829a4aSRandall Stewart #ifdef INET6
449f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
450f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
451e6194c2eSMichael Tuexen #endif
452f8829a4aSRandall Stewart 
453f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
454e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
455e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
456b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
457e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
458b54ddf22SMichael Tuexen #endif
45924aaac8dSMichael Tuexen 	sa = &store.sa;
460f8829a4aSRandall Stewart 	switch (param_type) {
461e6194c2eSMichael Tuexen #ifdef INET
462f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
463f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
464f8829a4aSRandall Stewart 			/* invalid param size */
46560990c0cSMichael Tuexen 			return (NULL);
466f8829a4aSRandall Stewart 		}
467e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
46824aaac8dSMichael Tuexen 		sin = &store.sin;
4695ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
470f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
471f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
472f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
473f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
474f8829a4aSRandall Stewart 			zero_address = 1;
475ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_set_primary: ");
476ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
477f8829a4aSRandall Stewart 		break;
478e6194c2eSMichael Tuexen #endif
479e6194c2eSMichael Tuexen #ifdef INET6
480f8829a4aSRandall Stewart 	case SCTP_IPV6_ADDRESS:
481f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
482f8829a4aSRandall Stewart 			/* invalid param size */
48360990c0cSMichael Tuexen 			return (NULL);
484f8829a4aSRandall Stewart 		}
485e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
48624aaac8dSMichael Tuexen 		sin6 = &store.sin6;
4875ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
488f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
489f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
490f8829a4aSRandall Stewart 		memcpy((caddr_t)&sin6->sin6_addr, v6addr->addr,
491f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
492f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
493f8829a4aSRandall Stewart 			zero_address = 1;
494ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_set_primary: ");
495ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
496f8829a4aSRandall Stewart 		break;
497e6194c2eSMichael Tuexen #endif
498f8829a4aSRandall Stewart 	default:
499f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
500f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
501f8829a4aSRandall Stewart 		    aparam_length);
50260990c0cSMichael Tuexen 		return (m_reply);
503f8829a4aSRandall Stewart 	}
504f8829a4aSRandall Stewart 
505f8829a4aSRandall Stewart 	/* if 0.0.0.0/::0, use the source address instead */
506b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
507b1754ad1SMichael Tuexen 		sa = src;
508ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
509ad81507eSRandall Stewart 		    "process_asconf_set_primary: using source addr ");
510b1754ad1SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
511f8829a4aSRandall Stewart 	}
512f8829a4aSRandall Stewart 	/* set the primary address */
513f8829a4aSRandall Stewart 	if (sctp_set_primary_addr(stcb, sa, NULL) == 0) {
514ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
515ad81507eSRandall Stewart 		    "process_asconf_set_primary: primary address set\n");
516f8829a4aSRandall Stewart 		/* notify upper layer */
517ceaad40aSRandall Stewart 		sctp_ulp_notify(SCTP_NOTIFY_ASCONF_SET_PRIMARY, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
518ca85e948SMichael Tuexen 		if ((stcb->asoc.primary_destination->dest_state & SCTP_ADDR_REACHABLE) &&
519ca85e948SMichael Tuexen 		    (!(stcb->asoc.primary_destination->dest_state & SCTP_ADDR_PF)) &&
520ca85e948SMichael Tuexen 		    (stcb->asoc.alternate)) {
521ca85e948SMichael Tuexen 			sctp_free_remote_addr(stcb->asoc.alternate);
522ca85e948SMichael Tuexen 			stcb->asoc.alternate = NULL;
523ca85e948SMichael Tuexen 		}
524f8829a4aSRandall Stewart 		if (response_required) {
525f8829a4aSRandall Stewart 			m_reply = sctp_asconf_success_response(aph->correlation_id);
526f8829a4aSRandall Stewart 		}
527851b7298SRandall Stewart 		/*
528851b7298SRandall Stewart 		 * Mobility adaptation. Ideally, when the reception of SET
529851b7298SRandall Stewart 		 * PRIMARY with DELETE IP ADDRESS of the previous primary
530851b7298SRandall Stewart 		 * destination, unacknowledged DATA are retransmitted
531851b7298SRandall Stewart 		 * immediately to the new primary destination for seamless
532b5c16493SMichael Tuexen 		 * handover. If the destination is UNCONFIRMED and marked to
533b5c16493SMichael Tuexen 		 * REQ_PRIM, The retransmission occur when reception of the
534b5c16493SMichael Tuexen 		 * HEARTBEAT-ACK.  (See sctp_handle_heartbeat_ack in
535851b7298SRandall Stewart 		 * sctp_input.c) Also, when change of the primary
536851b7298SRandall Stewart 		 * destination, it is better that all subsequent new DATA
537851b7298SRandall Stewart 		 * containing already queued DATA are transmitted to the new
538851b7298SRandall Stewart 		 * primary destination. (by micchie)
539851b7298SRandall Stewart 		 */
540851b7298SRandall Stewart 		if ((sctp_is_mobility_feature_on(stcb->sctp_ep,
541851b7298SRandall Stewart 		    SCTP_MOBILITY_BASE) ||
542851b7298SRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
543851b7298SRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) &&
544851b7298SRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
545851b7298SRandall Stewart 		    SCTP_MOBILITY_PRIM_DELETED) &&
546851b7298SRandall Stewart 		    (stcb->asoc.primary_destination->dest_state &
547851b7298SRandall Stewart 		    SCTP_ADDR_UNCONFIRMED) == 0) {
548851b7298SRandall Stewart 
549b7d130beSMichael Tuexen 			sctp_timer_stop(SCTP_TIMER_TYPE_PRIM_DELETED,
550b7d130beSMichael Tuexen 			    stcb->sctp_ep, stcb, NULL,
551b7d130beSMichael Tuexen 			    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_1);
552851b7298SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
553851b7298SRandall Stewart 			    SCTP_MOBILITY_FASTHANDOFF)) {
554851b7298SRandall Stewart 				sctp_assoc_immediate_retrans(stcb,
555851b7298SRandall Stewart 				    stcb->asoc.primary_destination);
556851b7298SRandall Stewart 			}
557851b7298SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
558851b7298SRandall Stewart 			    SCTP_MOBILITY_BASE)) {
5599eea4a2dSMichael Tuexen 				sctp_move_chunks_from_net(stcb,
5609eea4a2dSMichael Tuexen 				    stcb->asoc.deleted_primary);
561851b7298SRandall Stewart 			}
562851b7298SRandall Stewart 			sctp_delete_prim_timer(stcb->sctp_ep, stcb,
563851b7298SRandall Stewart 			    stcb->asoc.deleted_primary);
564851b7298SRandall Stewart 		}
565f8829a4aSRandall Stewart 	} else {
566f8829a4aSRandall Stewart 		/* couldn't set the requested primary address! */
567ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
568ad81507eSRandall Stewart 		    "process_asconf_set_primary: set primary failed!\n");
569f8829a4aSRandall Stewart 		/* must have been an invalid address, so report */
570f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
571f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
572f8829a4aSRandall Stewart 		    aparam_length);
573f8829a4aSRandall Stewart 	}
574f8829a4aSRandall Stewart 
57560990c0cSMichael Tuexen 	return (m_reply);
576f8829a4aSRandall Stewart }
577f8829a4aSRandall Stewart 
578f8829a4aSRandall Stewart /*
579f8829a4aSRandall Stewart  * handles an ASCONF chunk.
580f8829a4aSRandall Stewart  * if all parameters are processed ok, send a plain (empty) ASCONF-ACK
581f8829a4aSRandall Stewart  */
582f8829a4aSRandall Stewart void
583f8829a4aSRandall Stewart sctp_handle_asconf(struct mbuf *m, unsigned int offset,
584b1754ad1SMichael Tuexen     struct sockaddr *src,
5852afb3e84SRandall Stewart     struct sctp_asconf_chunk *cp, struct sctp_tcb *stcb,
5862afb3e84SRandall Stewart     int first)
587f8829a4aSRandall Stewart {
588f8829a4aSRandall Stewart 	struct sctp_association *asoc;
589f8829a4aSRandall Stewart 	uint32_t serial_num;
5902afb3e84SRandall Stewart 	struct mbuf *n, *m_ack, *m_result, *m_tail;
591f8829a4aSRandall Stewart 	struct sctp_asconf_ack_chunk *ack_cp;
592f104b614SMichael Tuexen 	struct sctp_asconf_paramhdr *aph;
593f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *p_addr;
594ca85e948SMichael Tuexen 	unsigned int asconf_limit, cnt;
595f8829a4aSRandall Stewart 	int error = 0;		/* did an error occur? */
596f8829a4aSRandall Stewart 
597f8829a4aSRandall Stewart 	/* asconf param buffer */
598f42a358aSRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
5992afb3e84SRandall Stewart 	struct sctp_asconf_ack *ack, *ack_next;
600f8829a4aSRandall Stewart 
601f8829a4aSRandall Stewart 	/* verify minimum length */
602f8829a4aSRandall Stewart 	if (ntohs(cp->ch.chunk_length) < sizeof(struct sctp_asconf_chunk)) {
603ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
604ad81507eSRandall Stewart 		    "handle_asconf: chunk too small = %xh\n",
605f8829a4aSRandall Stewart 		    ntohs(cp->ch.chunk_length));
606f8829a4aSRandall Stewart 		return;
607f8829a4aSRandall Stewart 	}
608f8829a4aSRandall Stewart 	asoc = &stcb->asoc;
609f8829a4aSRandall Stewart 	serial_num = ntohl(cp->serial_number);
610f8829a4aSRandall Stewart 
61120b07a4dSMichael Tuexen 	if (SCTP_TSN_GE(asoc->asconf_seq_in, serial_num)) {
612f8829a4aSRandall Stewart 		/* got a duplicate ASCONF */
613ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
614ad81507eSRandall Stewart 		    "handle_asconf: got duplicate serial number = %xh\n",
615f8829a4aSRandall Stewart 		    serial_num);
616f8829a4aSRandall Stewart 		return;
617f8829a4aSRandall Stewart 	} else if (serial_num != (asoc->asconf_seq_in + 1)) {
618ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: incorrect serial number = %xh (expected next = %xh)\n",
619f8829a4aSRandall Stewart 		    serial_num, asoc->asconf_seq_in + 1);
620f8829a4aSRandall Stewart 		return;
621f8829a4aSRandall Stewart 	}
6220053ed28SMichael Tuexen 
623f8829a4aSRandall Stewart 	/* it's the expected "next" sequence number, so process it */
624f8829a4aSRandall Stewart 	asoc->asconf_seq_in = serial_num;	/* update sequence */
625f8829a4aSRandall Stewart 	/* get length of all the param's in the ASCONF */
626f8829a4aSRandall Stewart 	asconf_limit = offset + ntohs(cp->ch.chunk_length);
627ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1,
628ad81507eSRandall Stewart 	    "handle_asconf: asconf_limit=%u, sequence=%xh\n",
629f8829a4aSRandall Stewart 	    asconf_limit, serial_num);
6302afb3e84SRandall Stewart 
6312afb3e84SRandall Stewart 	if (first) {
6322afb3e84SRandall Stewart 		/* delete old cache */
633e6194c2eSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: Now processing first ASCONF. Try to delete old cache\n");
6342afb3e84SRandall Stewart 
6354a9ef3f8SMichael Tuexen 		TAILQ_FOREACH_SAFE(ack, &asoc->asconf_ack_sent, next, ack_next) {
6362afb3e84SRandall Stewart 			if (ack->serial_number == serial_num)
6372afb3e84SRandall Stewart 				break;
6382afb3e84SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: delete old(%u) < first(%u)\n",
6392afb3e84SRandall Stewart 			    ack->serial_number, serial_num);
6404a9ef3f8SMichael Tuexen 			TAILQ_REMOVE(&asoc->asconf_ack_sent, ack, next);
6412afb3e84SRandall Stewart 			if (ack->data != NULL) {
6422afb3e84SRandall Stewart 				sctp_m_freem(ack->data);
6432afb3e84SRandall Stewart 			}
644b3f1ea41SRandall Stewart 			SCTP_ZONE_FREE(SCTP_BASE_INFO(ipi_zone_asconf_ack), ack);
6452afb3e84SRandall Stewart 		}
646f8829a4aSRandall Stewart 	}
6470053ed28SMichael Tuexen 
648139bc87fSRandall Stewart 	m_ack = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_ack_chunk), 0,
649eb1b1807SGleb Smirnoff 	    M_NOWAIT, 1, MT_DATA);
650f8829a4aSRandall Stewart 	if (m_ack == NULL) {
651ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
652ad81507eSRandall Stewart 		    "handle_asconf: couldn't get mbuf!\n");
653f8829a4aSRandall Stewart 		return;
654f8829a4aSRandall Stewart 	}
655f8829a4aSRandall Stewart 	m_tail = m_ack;		/* current reply chain's tail */
656f8829a4aSRandall Stewart 
657f8829a4aSRandall Stewart 	/* fill in ASCONF-ACK header */
658f8829a4aSRandall Stewart 	ack_cp = mtod(m_ack, struct sctp_asconf_ack_chunk *);
659f8829a4aSRandall Stewart 	ack_cp->ch.chunk_type = SCTP_ASCONF_ACK;
660f8829a4aSRandall Stewart 	ack_cp->ch.chunk_flags = 0;
661f8829a4aSRandall Stewart 	ack_cp->serial_number = htonl(serial_num);
662f8829a4aSRandall Stewart 	/* set initial lengths (eg. just an ASCONF-ACK), ntohx at the end! */
663139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_ack) = sizeof(struct sctp_asconf_ack_chunk);
664f8829a4aSRandall Stewart 	ack_cp->ch.chunk_length = sizeof(struct sctp_asconf_ack_chunk);
665f8829a4aSRandall Stewart 
666f8829a4aSRandall Stewart 	/* skip the lookup address parameter */
667f8829a4aSRandall Stewart 	offset += sizeof(struct sctp_asconf_chunk);
668f8829a4aSRandall Stewart 	p_addr = (struct sctp_ipv6addr_param *)sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr), (uint8_t *)&aparam_buf);
669f8829a4aSRandall Stewart 	if (p_addr == NULL) {
670ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
671ad81507eSRandall Stewart 		    "handle_asconf: couldn't get lookup addr!\n");
672f8829a4aSRandall Stewart 		/* respond with a missing/invalid mandatory parameter error */
673f8829a4aSRandall Stewart 		return;
674f8829a4aSRandall Stewart 	}
675f8829a4aSRandall Stewart 	/* param_length is already validated in process_control... */
676f8829a4aSRandall Stewart 	offset += ntohs(p_addr->ph.param_length);	/* skip lookup addr */
677f8829a4aSRandall Stewart 	/* get pointer to first asconf param in ASCONF */
678f8829a4aSRandall Stewart 	aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, sizeof(struct sctp_asconf_paramhdr), (uint8_t *)&aparam_buf);
679f8829a4aSRandall Stewart 	if (aph == NULL) {
680ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Empty ASCONF received?\n");
681f8829a4aSRandall Stewart 		goto send_reply;
682f8829a4aSRandall Stewart 	}
683f8829a4aSRandall Stewart 	/* process through all parameters */
684ca85e948SMichael Tuexen 	cnt = 0;
685f8829a4aSRandall Stewart 	while (aph != NULL) {
686f8829a4aSRandall Stewart 		unsigned int param_length, param_type;
687f8829a4aSRandall Stewart 
688f8829a4aSRandall Stewart 		param_type = ntohs(aph->ph.param_type);
689f8829a4aSRandall Stewart 		param_length = ntohs(aph->ph.param_length);
690f8829a4aSRandall Stewart 		if (offset + param_length > asconf_limit) {
691f8829a4aSRandall Stewart 			/* parameter goes beyond end of chunk! */
692f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
693f8829a4aSRandall Stewart 			return;
694f8829a4aSRandall Stewart 		}
695f8829a4aSRandall Stewart 		m_result = NULL;
696f8829a4aSRandall Stewart 
697f8829a4aSRandall Stewart 		if (param_length > sizeof(aparam_buf)) {
698ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: param length (%u) larger than buffer size!\n", param_length);
699f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
700f8829a4aSRandall Stewart 			return;
701f8829a4aSRandall Stewart 		}
702f8829a4aSRandall Stewart 		if (param_length <= sizeof(struct sctp_paramhdr)) {
703ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: param length (%u) too short\n", param_length);
704f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
705f8829a4aSRandall Stewart 		}
706f8829a4aSRandall Stewart 		/* get the entire parameter */
707f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, param_length, aparam_buf);
708f8829a4aSRandall Stewart 		if (aph == NULL) {
709ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: couldn't get entire param\n");
710f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
711f8829a4aSRandall Stewart 			return;
712f8829a4aSRandall Stewart 		}
713f8829a4aSRandall Stewart 		switch (param_type) {
714f8829a4aSRandall Stewart 		case SCTP_ADD_IP_ADDRESS:
715b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_add_ip(src, aph, stcb,
716ca85e948SMichael Tuexen 			    (cnt < SCTP_BASE_SYSCTL(sctp_hb_maxburst)), error);
717ca85e948SMichael Tuexen 			cnt++;
718f8829a4aSRandall Stewart 			break;
719f8829a4aSRandall Stewart 		case SCTP_DEL_IP_ADDRESS:
720b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_delete_ip(src, aph, stcb,
721f8829a4aSRandall Stewart 			    error);
722f8829a4aSRandall Stewart 			break;
723f8829a4aSRandall Stewart 		case SCTP_ERROR_CAUSE_IND:
724f8829a4aSRandall Stewart 			/* not valid in an ASCONF chunk */
725f8829a4aSRandall Stewart 			break;
726f8829a4aSRandall Stewart 		case SCTP_SET_PRIM_ADDR:
727b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_set_primary(src, aph,
728f8829a4aSRandall Stewart 			    stcb, error);
729f8829a4aSRandall Stewart 			break;
730830d754dSRandall Stewart 		case SCTP_NAT_VTAGS:
731830d754dSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: sees a NAT VTAG state parameter\n");
732830d754dSRandall Stewart 			break;
733f8829a4aSRandall Stewart 		case SCTP_SUCCESS_REPORT:
734f8829a4aSRandall Stewart 			/* not valid in an ASCONF chunk */
735f8829a4aSRandall Stewart 			break;
736f8829a4aSRandall Stewart 		case SCTP_ULP_ADAPTATION:
737f8829a4aSRandall Stewart 			/* FIX */
738f8829a4aSRandall Stewart 			break;
739f8829a4aSRandall Stewart 		default:
740f8829a4aSRandall Stewart 			if ((param_type & 0x8000) == 0) {
741f8829a4aSRandall Stewart 				/* Been told to STOP at this param */
742f8829a4aSRandall Stewart 				asconf_limit = offset;
743f8829a4aSRandall Stewart 				/*
744f8829a4aSRandall Stewart 				 * FIX FIX - We need to call
745f8829a4aSRandall Stewart 				 * sctp_arethere_unrecognized_parameters()
746f8829a4aSRandall Stewart 				 * to get a operr and send it for any
747f8829a4aSRandall Stewart 				 * param's with the 0x4000 bit set OR do it
748f8829a4aSRandall Stewart 				 * here ourselves... note we still must STOP
749f8829a4aSRandall Stewart 				 * if the 0x8000 bit is clear.
750f8829a4aSRandall Stewart 				 */
751f8829a4aSRandall Stewart 			}
752f8829a4aSRandall Stewart 			/* unknown/invalid param type */
753f8829a4aSRandall Stewart 			break;
754f8829a4aSRandall Stewart 		}		/* switch */
755f8829a4aSRandall Stewart 
756f8829a4aSRandall Stewart 		/* add any (error) result to the reply mbuf chain */
757f8829a4aSRandall Stewart 		if (m_result != NULL) {
758139bc87fSRandall Stewart 			SCTP_BUF_NEXT(m_tail) = m_result;
759f8829a4aSRandall Stewart 			m_tail = m_result;
760f8829a4aSRandall Stewart 			/* update lengths, make sure it's aligned too */
761139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_result) = SCTP_SIZE32(SCTP_BUF_LEN(m_result));
762139bc87fSRandall Stewart 			ack_cp->ch.chunk_length += SCTP_BUF_LEN(m_result);
763f8829a4aSRandall Stewart 			/* set flag to force success reports */
764f8829a4aSRandall Stewart 			error = 1;
765f8829a4aSRandall Stewart 		}
766f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(param_length);
767f8829a4aSRandall Stewart 		/* update remaining ASCONF message length to process */
768f8829a4aSRandall Stewart 		if (offset >= asconf_limit) {
769f8829a4aSRandall Stewart 			/* no more data in the mbuf chain */
770f8829a4aSRandall Stewart 			break;
771f8829a4aSRandall Stewart 		}
772f8829a4aSRandall Stewart 		/* get pointer to next asconf param */
773f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset,
774f8829a4aSRandall Stewart 		    sizeof(struct sctp_asconf_paramhdr),
775f8829a4aSRandall Stewart 		    (uint8_t *)&aparam_buf);
776f8829a4aSRandall Stewart 		if (aph == NULL) {
777f8829a4aSRandall Stewart 			/* can't get an asconf paramhdr */
778ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: can't get asconf param hdr!\n");
779f8829a4aSRandall Stewart 			/* FIX ME - add error here... */
780f8829a4aSRandall Stewart 		}
781ad81507eSRandall Stewart 	}
782f8829a4aSRandall Stewart 
783f8829a4aSRandall Stewart send_reply:
784f8829a4aSRandall Stewart 	ack_cp->ch.chunk_length = htons(ack_cp->ch.chunk_length);
785f8829a4aSRandall Stewart 	/* save the ASCONF-ACK reply */
786b3f1ea41SRandall Stewart 	ack = SCTP_ZONE_GET(SCTP_BASE_INFO(ipi_zone_asconf_ack),
7872afb3e84SRandall Stewart 	    struct sctp_asconf_ack);
7882afb3e84SRandall Stewart 	if (ack == NULL) {
7892afb3e84SRandall Stewart 		sctp_m_freem(m_ack);
7902afb3e84SRandall Stewart 		return;
7912afb3e84SRandall Stewart 	}
7922afb3e84SRandall Stewart 	ack->serial_number = serial_num;
7932afb3e84SRandall Stewart 	ack->last_sent_to = NULL;
7942afb3e84SRandall Stewart 	ack->data = m_ack;
795fc066a61SMichael Tuexen 	ack->len = 0;
796e6194c2eSMichael Tuexen 	for (n = m_ack; n != NULL; n = SCTP_BUF_NEXT(n)) {
7972afb3e84SRandall Stewart 		ack->len += SCTP_BUF_LEN(n);
7982afb3e84SRandall Stewart 	}
7992afb3e84SRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_ack_sent, ack, next);
800f8829a4aSRandall Stewart 
801f8829a4aSRandall Stewart 	/* see if last_control_chunk_from is set properly (use IP src addr) */
802f8829a4aSRandall Stewart 	if (stcb->asoc.last_control_chunk_from == NULL) {
803f8829a4aSRandall Stewart 		/*
804f8829a4aSRandall Stewart 		 * this could happen if the source address was just newly
805f8829a4aSRandall Stewart 		 * added
806f8829a4aSRandall Stewart 		 */
807ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: looking up net for IP source address\n");
808ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Looking for IP source: ");
809b82bd838SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
810f8829a4aSRandall Stewart 		/* look up the from address */
811b82bd838SMichael Tuexen 		stcb->asoc.last_control_chunk_from = sctp_findnet(stcb, src);
812f8829a4aSRandall Stewart #ifdef SCTP_DEBUG
813b82bd838SMichael Tuexen 		if (stcb->asoc.last_control_chunk_from == NULL) {
814ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: IP source address not found?!\n");
815f8829a4aSRandall Stewart 		}
816b82bd838SMichael Tuexen #endif
817f8829a4aSRandall Stewart 	}
818f8829a4aSRandall Stewart }
819f8829a4aSRandall Stewart 
820f8829a4aSRandall Stewart /*
821f8829a4aSRandall Stewart  * does the address match? returns 0 if not, 1 if so
822f8829a4aSRandall Stewart  */
823f8829a4aSRandall Stewart static uint32_t
824b0471b4bSMichael Tuexen sctp_asconf_addr_match(struct sctp_asconf_addr *aa, struct sockaddr *sa)
825b0471b4bSMichael Tuexen {
826e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
827f8829a4aSRandall Stewart #ifdef INET6
828e6194c2eSMichael Tuexen 	case AF_INET6:
829e6194c2eSMichael Tuexen 		{
830f8829a4aSRandall Stewart 			/* XXX scopeid */
831f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
832f8829a4aSRandall Stewart 
833f8829a4aSRandall Stewart 			if ((aa->ap.addrp.ph.param_type == SCTP_IPV6_ADDRESS) &&
834f8829a4aSRandall Stewart 			    (memcmp(&aa->ap.addrp.addr, &sin6->sin6_addr,
835f8829a4aSRandall Stewart 			    sizeof(struct in6_addr)) == 0)) {
836f8829a4aSRandall Stewart 				return (1);
837f8829a4aSRandall Stewart 			}
838e6194c2eSMichael Tuexen 			break;
839e6194c2eSMichael Tuexen 		}
840e6194c2eSMichael Tuexen #endif
841e6194c2eSMichael Tuexen #ifdef INET
842e6194c2eSMichael Tuexen 	case AF_INET:
843e6194c2eSMichael Tuexen 		{
844f8829a4aSRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
845f8829a4aSRandall Stewart 
846f8829a4aSRandall Stewart 			if ((aa->ap.addrp.ph.param_type == SCTP_IPV4_ADDRESS) &&
847f8829a4aSRandall Stewart 			    (memcmp(&aa->ap.addrp.addr, &sin->sin_addr,
848f8829a4aSRandall Stewart 			    sizeof(struct in_addr)) == 0)) {
849f8829a4aSRandall Stewart 				return (1);
850f8829a4aSRandall Stewart 			}
851e6194c2eSMichael Tuexen 			break;
852e6194c2eSMichael Tuexen 		}
853e6194c2eSMichael Tuexen #endif
854e6194c2eSMichael Tuexen 	default:
855e6194c2eSMichael Tuexen 		break;
856f8829a4aSRandall Stewart 	}
857f8829a4aSRandall Stewart 	return (0);
858f8829a4aSRandall Stewart }
859f8829a4aSRandall Stewart 
860f8829a4aSRandall Stewart /*
861c54a18d2SRandall Stewart  * does the address match? returns 0 if not, 1 if so
862c54a18d2SRandall Stewart  */
863c54a18d2SRandall Stewart static uint32_t
864b0471b4bSMichael Tuexen sctp_addr_match(struct sctp_paramhdr *ph, struct sockaddr *sa)
865b0471b4bSMichael Tuexen {
866b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
867c54a18d2SRandall Stewart 	uint16_t param_type, param_length;
868c54a18d2SRandall Stewart 
869e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
870e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
871b54ddf22SMichael Tuexen #endif
872e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
873d6af161aSRandall Stewart #ifdef INET6
874e6194c2eSMichael Tuexen 	case AF_INET6:
875e6194c2eSMichael Tuexen 		{
876c54a18d2SRandall Stewart 			/* XXX scopeid */
877c54a18d2SRandall Stewart 			struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
878e6194c2eSMichael Tuexen 			struct sctp_ipv6addr_param *v6addr;
879c54a18d2SRandall Stewart 
880e6194c2eSMichael Tuexen 			v6addr = (struct sctp_ipv6addr_param *)ph;
881c54a18d2SRandall Stewart 			if ((param_type == SCTP_IPV6_ADDRESS) &&
882b54ddf22SMichael Tuexen 			    (param_length == sizeof(struct sctp_ipv6addr_param)) &&
883c54a18d2SRandall Stewart 			    (memcmp(&v6addr->addr, &sin6->sin6_addr,
884c54a18d2SRandall Stewart 			    sizeof(struct in6_addr)) == 0)) {
885c54a18d2SRandall Stewart 				return (1);
886c54a18d2SRandall Stewart 			}
887e6194c2eSMichael Tuexen 			break;
888d6af161aSRandall Stewart 		}
889d6af161aSRandall Stewart #endif
890e6194c2eSMichael Tuexen #ifdef INET
891e6194c2eSMichael Tuexen 	case AF_INET:
892e6194c2eSMichael Tuexen 		{
893c54a18d2SRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
894e6194c2eSMichael Tuexen 			struct sctp_ipv4addr_param *v4addr;
895c54a18d2SRandall Stewart 
896e6194c2eSMichael Tuexen 			v4addr = (struct sctp_ipv4addr_param *)ph;
897c54a18d2SRandall Stewart 			if ((param_type == SCTP_IPV4_ADDRESS) &&
898b54ddf22SMichael Tuexen 			    (param_length == sizeof(struct sctp_ipv4addr_param)) &&
899c54a18d2SRandall Stewart 			    (memcmp(&v4addr->addr, &sin->sin_addr,
900c54a18d2SRandall Stewart 			    sizeof(struct in_addr)) == 0)) {
901c54a18d2SRandall Stewart 				return (1);
902c54a18d2SRandall Stewart 			}
903e6194c2eSMichael Tuexen 			break;
904e6194c2eSMichael Tuexen 		}
905e6194c2eSMichael Tuexen #endif
906e6194c2eSMichael Tuexen 	default:
907e6194c2eSMichael Tuexen 		break;
908c54a18d2SRandall Stewart 	}
909c54a18d2SRandall Stewart 	return (0);
910c54a18d2SRandall Stewart }
911c54a18d2SRandall Stewart 
912c54a18d2SRandall Stewart /*
913f8829a4aSRandall Stewart  * Cleanup for non-responded/OP ERR'd ASCONF
914f8829a4aSRandall Stewart  */
915f8829a4aSRandall Stewart void
916f8829a4aSRandall Stewart sctp_asconf_cleanup(struct sctp_tcb *stcb, struct sctp_nets *net)
917f8829a4aSRandall Stewart {
918f8829a4aSRandall Stewart 	/*
919f8829a4aSRandall Stewart 	 * clear out any existing asconfs going out
920f8829a4aSRandall Stewart 	 */
9213c503c28SRandall Stewart 	sctp_timer_stop(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep, stcb, net,
9223c503c28SRandall Stewart 	    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_2);
923c54a18d2SRandall Stewart 	stcb->asoc.asconf_seq_out_acked = stcb->asoc.asconf_seq_out;
924f8829a4aSRandall Stewart 	/* remove the old ASCONF on our outbound queue */
925f8829a4aSRandall Stewart 	sctp_toss_old_asconf(stcb);
926f8829a4aSRandall Stewart }
927f8829a4aSRandall Stewart 
928f8829a4aSRandall Stewart /*
9292dad8a55SRandall Stewart  * cleanup any cached source addresses that may be topologically
9302dad8a55SRandall Stewart  * incorrect after a new address has been added to this interface.
9312dad8a55SRandall Stewart  */
9322dad8a55SRandall Stewart static void
9332dad8a55SRandall Stewart sctp_asconf_nets_cleanup(struct sctp_tcb *stcb, struct sctp_ifn *ifn)
9342dad8a55SRandall Stewart {
9352dad8a55SRandall Stewart 	struct sctp_nets *net;
9362dad8a55SRandall Stewart 
9372dad8a55SRandall Stewart 	/*
9382dad8a55SRandall Stewart 	 * Ideally, we want to only clear cached routes and source addresses
9392dad8a55SRandall Stewart 	 * that are topologically incorrect.  But since there is no easy way
9402dad8a55SRandall Stewart 	 * to know whether the newly added address on the ifn would cause a
9412dad8a55SRandall Stewart 	 * routing change (i.e. a new egress interface would be chosen)
9422dad8a55SRandall Stewart 	 * without doing a new routing lookup and source address selection,
9432dad8a55SRandall Stewart 	 * we will (for now) just flush any cached route using a different
9442dad8a55SRandall Stewart 	 * ifn (and cached source addrs) and let output re-choose them
9452dad8a55SRandall Stewart 	 * during the next send on that net.
9462dad8a55SRandall Stewart 	 */
9472dad8a55SRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
9482dad8a55SRandall Stewart 		/*
9492dad8a55SRandall Stewart 		 * clear any cached route (and cached source address) if the
9502dad8a55SRandall Stewart 		 * route's interface is NOT the same as the address change.
9512dad8a55SRandall Stewart 		 * If it's the same interface, just clear the cached source
9522dad8a55SRandall Stewart 		 * address.
9532dad8a55SRandall Stewart 		 */
9542dad8a55SRandall Stewart 		if (SCTP_ROUTE_HAS_VALID_IFN(&net->ro) &&
955fc066a61SMichael Tuexen 		    ((ifn == NULL) ||
956fc066a61SMichael Tuexen 		    (SCTP_GET_IF_INDEX_FROM_ROUTE(&net->ro) != ifn->ifn_index))) {
9572dad8a55SRandall Stewart 			/* clear any cached route */
9582dad8a55SRandall Stewart 			RTFREE(net->ro.ro_rt);
9592dad8a55SRandall Stewart 			net->ro.ro_rt = NULL;
9602dad8a55SRandall Stewart 		}
9612dad8a55SRandall Stewart 		/* clear any cached source address */
9622dad8a55SRandall Stewart 		if (net->src_addr_selected) {
9632dad8a55SRandall Stewart 			sctp_free_ifa(net->ro._s_addr);
9642dad8a55SRandall Stewart 			net->ro._s_addr = NULL;
9652dad8a55SRandall Stewart 			net->src_addr_selected = 0;
9662dad8a55SRandall Stewart 		}
9672dad8a55SRandall Stewart 	}
9682dad8a55SRandall Stewart }
9692dad8a55SRandall Stewart 
970851b7298SRandall Stewart 
971851b7298SRandall Stewart void
972851b7298SRandall Stewart sctp_assoc_immediate_retrans(struct sctp_tcb *stcb, struct sctp_nets *dstnet)
973851b7298SRandall Stewart {
974851b7298SRandall Stewart 	int error;
975851b7298SRandall Stewart 
976851b7298SRandall Stewart 	if (dstnet->dest_state & SCTP_ADDR_UNCONFIRMED) {
977851b7298SRandall Stewart 		return;
978851b7298SRandall Stewart 	}
979851b7298SRandall Stewart 	if (stcb->asoc.deleted_primary == NULL) {
980851b7298SRandall Stewart 		return;
981851b7298SRandall Stewart 	}
9820053ed28SMichael Tuexen 
983851b7298SRandall Stewart 	if (!TAILQ_EMPTY(&stcb->asoc.sent_queue)) {
984b27a6b7dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "assoc_immediate_retrans: Deleted primary is ");
985851b7298SRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, &stcb->asoc.deleted_primary->ro._l_addr.sa);
986851b7298SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Current Primary is ");
987851b7298SRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, &stcb->asoc.primary_destination->ro._l_addr.sa);
988851b7298SRandall Stewart 		sctp_timer_stop(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep, stcb,
989851b7298SRandall Stewart 		    stcb->asoc.deleted_primary,
990b7d130beSMichael Tuexen 		    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_3);
991851b7298SRandall Stewart 		stcb->asoc.num_send_timers_up--;
992851b7298SRandall Stewart 		if (stcb->asoc.num_send_timers_up < 0) {
993851b7298SRandall Stewart 			stcb->asoc.num_send_timers_up = 0;
994851b7298SRandall Stewart 		}
995851b7298SRandall Stewart 		SCTP_TCB_LOCK_ASSERT(stcb);
996851b7298SRandall Stewart 		error = sctp_t3rxt_timer(stcb->sctp_ep, stcb,
997851b7298SRandall Stewart 		    stcb->asoc.deleted_primary);
998851b7298SRandall Stewart 		if (error) {
999851b7298SRandall Stewart 			SCTP_INP_DECR_REF(stcb->sctp_ep);
1000851b7298SRandall Stewart 			return;
1001851b7298SRandall Stewart 		}
1002851b7298SRandall Stewart 		SCTP_TCB_LOCK_ASSERT(stcb);
1003851b7298SRandall Stewart #ifdef SCTP_AUDITING_ENABLED
1004f31e6c7fSMichael Tuexen 		sctp_auditing(4, stcb->sctp_ep, stcb, stcb->asoc.deleted_primary);
1005851b7298SRandall Stewart #endif
1006851b7298SRandall Stewart 		sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_NOT_LOCKED);
1007851b7298SRandall Stewart 		if ((stcb->asoc.num_send_timers_up == 0) &&
1008851b7298SRandall Stewart 		    (stcb->asoc.sent_queue_cnt > 0)) {
1009851b7298SRandall Stewart 			struct sctp_tmit_chunk *chk;
1010851b7298SRandall Stewart 
1011851b7298SRandall Stewart 			chk = TAILQ_FIRST(&stcb->asoc.sent_queue);
1012851b7298SRandall Stewart 			sctp_timer_start(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep,
1013851b7298SRandall Stewart 			    stcb, chk->whoTo);
1014851b7298SRandall Stewart 		}
1015851b7298SRandall Stewart 	}
1016851b7298SRandall Stewart 	return;
1017851b7298SRandall Stewart }
1018851b7298SRandall Stewart 
10192afb3e84SRandall Stewart static int
10202afb3e84SRandall Stewart     sctp_asconf_queue_mgmt(struct sctp_tcb *, struct sctp_ifa *, uint16_t);
10212afb3e84SRandall Stewart 
1022851b7298SRandall Stewart void
10232afb3e84SRandall Stewart sctp_net_immediate_retrans(struct sctp_tcb *stcb, struct sctp_nets *net)
10242afb3e84SRandall Stewart {
10252afb3e84SRandall Stewart 	struct sctp_tmit_chunk *chk;
10262afb3e84SRandall Stewart 
1027b27a6b7dSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1, "net_immediate_retrans: RTO is %d\n", net->RTO);
10282afb3e84SRandall Stewart 	sctp_timer_stop(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep, stcb, net,
1029b7d130beSMichael Tuexen 	    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_4);
10302afb3e84SRandall Stewart 	stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
10312afb3e84SRandall Stewart 	net->error_count = 0;
10322afb3e84SRandall Stewart 	TAILQ_FOREACH(chk, &stcb->asoc.sent_queue, sctp_next) {
10332afb3e84SRandall Stewart 		if (chk->whoTo == net) {
1034851b7298SRandall Stewart 			if (chk->sent < SCTP_DATAGRAM_RESEND) {
10352afb3e84SRandall Stewart 				chk->sent = SCTP_DATAGRAM_RESEND;
10362afb3e84SRandall Stewart 				sctp_ucount_incr(stcb->asoc.sent_queue_retran_cnt);
1037d55b0b1bSRandall Stewart 				sctp_flight_size_decrease(chk);
1038d55b0b1bSRandall Stewart 				sctp_total_flight_decrease(stcb, chk);
1039d55b0b1bSRandall Stewart 				net->marked_retrans++;
1040d55b0b1bSRandall Stewart 				stcb->asoc.marked_retrans++;
10412afb3e84SRandall Stewart 			}
10422afb3e84SRandall Stewart 		}
10432afb3e84SRandall Stewart 	}
1044d55b0b1bSRandall Stewart 	if (net->marked_retrans) {
1045d55b0b1bSRandall Stewart 		sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_NOT_LOCKED);
1046d55b0b1bSRandall Stewart 	}
1047851b7298SRandall Stewart }
10482afb3e84SRandall Stewart 
10492afb3e84SRandall Stewart static void
10502afb3e84SRandall Stewart sctp_path_check_and_react(struct sctp_tcb *stcb, struct sctp_ifa *newifa)
10512afb3e84SRandall Stewart {
10522afb3e84SRandall Stewart 	struct sctp_nets *net;
10532afb3e84SRandall Stewart 	int addrnum, changed;
10542afb3e84SRandall Stewart 
10552afb3e84SRandall Stewart 	/*
10562afb3e84SRandall Stewart 	 * If number of local valid addresses is 1, the valid address is
10572afb3e84SRandall Stewart 	 * probably newly added address. Several valid addresses in this
10582afb3e84SRandall Stewart 	 * association.  A source address may not be changed.  Additionally,
10592afb3e84SRandall Stewart 	 * they can be configured on a same interface as "alias" addresses.
10602afb3e84SRandall Stewart 	 * (by micchie)
10612afb3e84SRandall Stewart 	 */
10622afb3e84SRandall Stewart 	addrnum = sctp_local_addr_count(stcb);
10632afb3e84SRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1, "p_check_react(): %d local addresses\n",
10642afb3e84SRandall Stewart 	    addrnum);
10652afb3e84SRandall Stewart 	if (addrnum == 1) {
10662afb3e84SRandall Stewart 		TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
10672afb3e84SRandall Stewart 			/* clear any cached route and source address */
10682afb3e84SRandall Stewart 			if (net->ro.ro_rt) {
10692afb3e84SRandall Stewart 				RTFREE(net->ro.ro_rt);
10702afb3e84SRandall Stewart 				net->ro.ro_rt = NULL;
10712afb3e84SRandall Stewart 			}
10722afb3e84SRandall Stewart 			if (net->src_addr_selected) {
10732afb3e84SRandall Stewart 				sctp_free_ifa(net->ro._s_addr);
10742afb3e84SRandall Stewart 				net->ro._s_addr = NULL;
10752afb3e84SRandall Stewart 				net->src_addr_selected = 0;
10762afb3e84SRandall Stewart 			}
10772afb3e84SRandall Stewart 			/* Retransmit unacknowledged DATA chunks immediately */
10782afb3e84SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
10792afb3e84SRandall Stewart 			    SCTP_MOBILITY_FASTHANDOFF)) {
10802afb3e84SRandall Stewart 				sctp_net_immediate_retrans(stcb, net);
10812afb3e84SRandall Stewart 			}
10822afb3e84SRandall Stewart 			/* also, SET PRIMARY is maybe already sent */
10832afb3e84SRandall Stewart 		}
10842afb3e84SRandall Stewart 		return;
10852afb3e84SRandall Stewart 	}
10860053ed28SMichael Tuexen 
10872afb3e84SRandall Stewart 	/* Multiple local addresses exsist in the association.  */
10882afb3e84SRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
10892afb3e84SRandall Stewart 		/* clear any cached route and source address */
10902afb3e84SRandall Stewart 		if (net->ro.ro_rt) {
10912afb3e84SRandall Stewart 			RTFREE(net->ro.ro_rt);
10922afb3e84SRandall Stewart 			net->ro.ro_rt = NULL;
10932afb3e84SRandall Stewart 		}
10942afb3e84SRandall Stewart 		if (net->src_addr_selected) {
10952afb3e84SRandall Stewart 			sctp_free_ifa(net->ro._s_addr);
10962afb3e84SRandall Stewart 			net->ro._s_addr = NULL;
10972afb3e84SRandall Stewart 			net->src_addr_selected = 0;
10982afb3e84SRandall Stewart 		}
10992afb3e84SRandall Stewart 		/*
11002afb3e84SRandall Stewart 		 * Check if the nexthop is corresponding to the new address.
11012afb3e84SRandall Stewart 		 * If the new address is corresponding to the current
11022afb3e84SRandall Stewart 		 * nexthop, the path will be changed. If the new address is
11032afb3e84SRandall Stewart 		 * NOT corresponding to the current nexthop, the path will
11042afb3e84SRandall Stewart 		 * not be changed.
11052afb3e84SRandall Stewart 		 */
11062afb3e84SRandall Stewart 		SCTP_RTALLOC((sctp_route_t *)&net->ro,
1107d089f9b9SMichael Tuexen 		    stcb->sctp_ep->def_vrf_id,
1108d089f9b9SMichael Tuexen 		    stcb->sctp_ep->fibnum);
11092afb3e84SRandall Stewart 		if (net->ro.ro_rt == NULL)
11102afb3e84SRandall Stewart 			continue;
11112afb3e84SRandall Stewart 
11122afb3e84SRandall Stewart 		changed = 0;
1113e6194c2eSMichael Tuexen 		switch (net->ro._l_addr.sa.sa_family) {
1114e6194c2eSMichael Tuexen #ifdef INET
1115e6194c2eSMichael Tuexen 		case AF_INET:
1116e6194c2eSMichael Tuexen 			if (sctp_v4src_match_nexthop(newifa, (sctp_route_t *)&net->ro)) {
11172afb3e84SRandall Stewart 				changed = 1;
11182afb3e84SRandall Stewart 			}
1119e6194c2eSMichael Tuexen 			break;
11205e2c2d87SRandall Stewart #endif
1121e6194c2eSMichael Tuexen #ifdef INET6
1122e6194c2eSMichael Tuexen 		case AF_INET6:
1123e6194c2eSMichael Tuexen 			if (sctp_v6src_match_nexthop(
1124e6194c2eSMichael Tuexen 			    &newifa->address.sin6, (sctp_route_t *)&net->ro)) {
1125e6194c2eSMichael Tuexen 				changed = 1;
1126e6194c2eSMichael Tuexen 			}
1127e6194c2eSMichael Tuexen 			break;
1128e6194c2eSMichael Tuexen #endif
1129e6194c2eSMichael Tuexen 		default:
1130e6194c2eSMichael Tuexen 			break;
1131e6194c2eSMichael Tuexen 		}
11322afb3e84SRandall Stewart 		/*
11332afb3e84SRandall Stewart 		 * if the newly added address does not relate routing
11342afb3e84SRandall Stewart 		 * information, we skip.
11352afb3e84SRandall Stewart 		 */
11362afb3e84SRandall Stewart 		if (changed == 0)
11372afb3e84SRandall Stewart 			continue;
11382afb3e84SRandall Stewart 		/* Retransmit unacknowledged DATA chunks immediately */
11392afb3e84SRandall Stewart 		if (sctp_is_mobility_feature_on(stcb->sctp_ep,
11402afb3e84SRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) {
11412afb3e84SRandall Stewart 			sctp_net_immediate_retrans(stcb, net);
11422afb3e84SRandall Stewart 		}
11432afb3e84SRandall Stewart 		/* Send SET PRIMARY for this new address */
11442afb3e84SRandall Stewart 		if (net == stcb->asoc.primary_destination) {
11452afb3e84SRandall Stewart 			(void)sctp_asconf_queue_mgmt(stcb, newifa,
11462afb3e84SRandall Stewart 			    SCTP_SET_PRIM_ADDR);
11472afb3e84SRandall Stewart 		}
11482afb3e84SRandall Stewart 	}
11492afb3e84SRandall Stewart }
11502afb3e84SRandall Stewart 
11512dad8a55SRandall Stewart /*
1152f8829a4aSRandall Stewart  * process an ADD/DELETE IP ack from peer.
11531b649582SRandall Stewart  * addr: corresponding sctp_ifa to the address being added/deleted.
1154f8829a4aSRandall Stewart  * type: SCTP_ADD_IP_ADDRESS or SCTP_DEL_IP_ADDRESS.
1155f8829a4aSRandall Stewart  * flag: 1=success, 0=failure.
1156f8829a4aSRandall Stewart  */
1157f8829a4aSRandall Stewart static void
11587215cc1bSMichael Tuexen sctp_asconf_addr_mgmt_ack(struct sctp_tcb *stcb, struct sctp_ifa *addr, uint32_t flag)
1159f8829a4aSRandall Stewart {
1160f8829a4aSRandall Stewart 	/*
1161f8829a4aSRandall Stewart 	 * do the necessary asoc list work- if we get a failure indication,
11622dad8a55SRandall Stewart 	 * leave the address on the assoc's restricted list.  If we get a
11632dad8a55SRandall Stewart 	 * success indication, remove the address from the restricted list.
1164f8829a4aSRandall Stewart 	 */
1165f8829a4aSRandall Stewart 	/*
1166f8829a4aSRandall Stewart 	 * Note: this will only occur for ADD_IP_ADDRESS, since
1167f8829a4aSRandall Stewart 	 * DEL_IP_ADDRESS is never actually added to the list...
1168f8829a4aSRandall Stewart 	 */
1169f8829a4aSRandall Stewart 	if (flag) {
11701b649582SRandall Stewart 		/* success case, so remove from the restricted list */
11711b649582SRandall Stewart 		sctp_del_local_addr_restricted(stcb, addr);
11722dad8a55SRandall Stewart 
11733232788eSRandall Stewart 		if (sctp_is_mobility_feature_on(stcb->sctp_ep,
1174d55b0b1bSRandall Stewart 		    SCTP_MOBILITY_BASE) ||
1175d55b0b1bSRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
1176d55b0b1bSRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) {
11772afb3e84SRandall Stewart 			sctp_path_check_and_react(stcb, addr);
11782afb3e84SRandall Stewart 			return;
11792afb3e84SRandall Stewart 		}
11803232788eSRandall Stewart 		/* clear any cached/topologically incorrect source addresses */
11812dad8a55SRandall Stewart 		sctp_asconf_nets_cleanup(stcb, addr->ifn_p);
1182f8829a4aSRandall Stewart 	}
1183f8829a4aSRandall Stewart 	/* else, leave it on the list */
1184f8829a4aSRandall Stewart }
1185f8829a4aSRandall Stewart 
1186f8829a4aSRandall Stewart /*
11871b649582SRandall Stewart  * add an asconf add/delete/set primary IP address parameter to the queue.
1188f8829a4aSRandall Stewart  * type = SCTP_ADD_IP_ADDRESS, SCTP_DEL_IP_ADDRESS, SCTP_SET_PRIM_ADDR.
11891b649582SRandall Stewart  * returns 0 if queued, -1 if not queued/removed.
11901b649582SRandall Stewart  * NOTE: if adding, but a delete for the same address is already scheduled
11911b649582SRandall Stewart  * (and not yet sent out), simply remove it from queue.  Same for deleting
11921b649582SRandall Stewart  * an address already scheduled for add.  If a duplicate operation is found,
11931b649582SRandall Stewart  * ignore the new one.
1194f8829a4aSRandall Stewart  */
11951b649582SRandall Stewart static int
11961b649582SRandall Stewart sctp_asconf_queue_mgmt(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
119718e198d3SRandall Stewart     uint16_t type)
1198f8829a4aSRandall Stewart {
1199f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1200f8829a4aSRandall Stewart 
1201f8829a4aSRandall Stewart 	/* make sure the request isn't already in the queue */
12024a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1203f8829a4aSRandall Stewart 		/* address match? */
120442551e99SRandall Stewart 		if (sctp_asconf_addr_match(aa, &ifa->address.sa) == 0)
1205f8829a4aSRandall Stewart 			continue;
1206c54a18d2SRandall Stewart 		/*
1207c54a18d2SRandall Stewart 		 * is the request already in queue but not sent? pass the
1208c54a18d2SRandall Stewart 		 * request already sent in order to resolve the following
1209c54a18d2SRandall Stewart 		 * case: 1. arrival of ADD, then sent 2. arrival of DEL. we
1210c54a18d2SRandall Stewart 		 * can't remove the ADD request already sent 3. arrival of
1211c54a18d2SRandall Stewart 		 * ADD
1212c54a18d2SRandall Stewart 		 */
1213c54a18d2SRandall Stewart 		if (aa->ap.aph.ph.param_type == type && aa->sent == 0) {
1214f8829a4aSRandall Stewart 			return (-1);
1215f8829a4aSRandall Stewart 		}
1216f8829a4aSRandall Stewart 		/* is the negative request already in queue, and not sent */
12171b649582SRandall Stewart 		if ((aa->sent == 0) && (type == SCTP_ADD_IP_ADDRESS) &&
12181b649582SRandall Stewart 		    (aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS)) {
1219f8829a4aSRandall Stewart 			/* add requested, delete already queued */
1220f8829a4aSRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
12211b649582SRandall Stewart 			/* remove the ifa from the restricted list */
12221b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, ifa);
12231b649582SRandall Stewart 			/* free the asconf param */
1224207304d4SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
12251b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_mgmt: add removes queued entry\n");
12261b649582SRandall Stewart 			return (-1);
12271b649582SRandall Stewart 		}
12281b649582SRandall Stewart 		if ((aa->sent == 0) && (type == SCTP_DEL_IP_ADDRESS) &&
12291b649582SRandall Stewart 		    (aa->ap.aph.ph.param_type == SCTP_ADD_IP_ADDRESS)) {
12301b649582SRandall Stewart 			/* delete requested, add already queued */
12311b649582SRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
12321b649582SRandall Stewart 			/* remove the aa->ifa from the restricted list */
12331b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, aa->ifa);
12341b649582SRandall Stewart 			/* free the asconf param */
12351b649582SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
12361b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_mgmt: delete removes queued entry\n");
1237f8829a4aSRandall Stewart 			return (-1);
1238f8829a4aSRandall Stewart 		}
1239f8829a4aSRandall Stewart 	}			/* for each aa */
1240f8829a4aSRandall Stewart 
1241f8829a4aSRandall Stewart 	/* adding new request to the queue */
12421b649582SRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
12431b649582SRandall Stewart 	    SCTP_M_ASC_ADDR);
1244f8829a4aSRandall Stewart 	if (aa == NULL) {
1245f8829a4aSRandall Stewart 		/* didn't get memory */
12461b649582SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "asconf_queue_mgmt: failed to get memory!\n");
1247f8829a4aSRandall Stewart 		return (-1);
1248f8829a4aSRandall Stewart 	}
1249830d754dSRandall Stewart 	aa->special_del = 0;
1250f8829a4aSRandall Stewart 	/* fill in asconf address parameter fields */
1251f8829a4aSRandall Stewart 	/* top level elements are "networked" during send */
1252f8829a4aSRandall Stewart 	aa->ap.aph.ph.param_type = type;
1253f8829a4aSRandall Stewart 	aa->ifa = ifa;
1254bff64a4dSRandall Stewart 	atomic_add_int(&ifa->refcount, 1);
1255f8829a4aSRandall Stewart 	/* correlation_id filled in during send routine later... */
1256e6194c2eSMichael Tuexen 	switch (ifa->address.sa.sa_family) {
1257e6194c2eSMichael Tuexen #ifdef INET6
1258e6194c2eSMichael Tuexen 	case AF_INET6:
1259e6194c2eSMichael Tuexen 		{
1260f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1261f8829a4aSRandall Stewart 
126224aaac8dSMichael Tuexen 			sin6 = &ifa->address.sin6;
1263f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
1264f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv6addr_param));
12651b649582SRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) +
1266f8829a4aSRandall Stewart 			    sizeof(struct sctp_ipv6addr_param);
1267f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin6->sin6_addr,
1268f8829a4aSRandall Stewart 			    sizeof(struct in6_addr));
1269e6194c2eSMichael Tuexen 			break;
1270e6194c2eSMichael Tuexen 		}
1271e6194c2eSMichael Tuexen #endif
1272e6194c2eSMichael Tuexen #ifdef INET
1273e6194c2eSMichael Tuexen 	case AF_INET:
1274e6194c2eSMichael Tuexen 		{
12751b649582SRandall Stewart 			struct sockaddr_in *sin;
1276f8829a4aSRandall Stewart 
127724aaac8dSMichael Tuexen 			sin = &ifa->address.sin;
1278f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
1279f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv4addr_param));
12801b649582SRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) +
1281f8829a4aSRandall Stewart 			    sizeof(struct sctp_ipv4addr_param);
1282f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin->sin_addr,
1283f8829a4aSRandall Stewart 			    sizeof(struct in_addr));
1284e6194c2eSMichael Tuexen 			break;
1285e6194c2eSMichael Tuexen 		}
1286e6194c2eSMichael Tuexen #endif
1287e6194c2eSMichael Tuexen 	default:
1288f8829a4aSRandall Stewart 		/* invalid family! */
1289207304d4SRandall Stewart 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
12903232788eSRandall Stewart 		sctp_free_ifa(ifa);
1291f8829a4aSRandall Stewart 		return (-1);
1292f8829a4aSRandall Stewart 	}
1293f8829a4aSRandall Stewart 	aa->sent = 0;		/* clear sent flag */
1294f8829a4aSRandall Stewart 
1295f8829a4aSRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
1296f8829a4aSRandall Stewart #ifdef SCTP_DEBUG
1297dec0177dSRandall Stewart 	if (SCTP_BASE_SYSCTL(sctp_debug_on) & SCTP_DEBUG_ASCONF2) {
1298c54a18d2SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
1299c54a18d2SRandall Stewart 			SCTP_PRINTF("asconf_queue_mgmt: inserted asconf ADD_IP_ADDRESS: ");
130088a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1301c54a18d2SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
13021b649582SRandall Stewart 			SCTP_PRINTF("asconf_queue_mgmt: appended asconf DEL_IP_ADDRESS: ");
130388a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1304f8829a4aSRandall Stewart 		} else {
13051b649582SRandall Stewart 			SCTP_PRINTF("asconf_queue_mgmt: appended asconf SET_PRIM_ADDR: ");
130688a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1307f8829a4aSRandall Stewart 		}
1308f8829a4aSRandall Stewart 	}
1309ad81507eSRandall Stewart #endif
1310f8829a4aSRandall Stewart 
1311f8829a4aSRandall Stewart 	return (0);
1312f8829a4aSRandall Stewart }
1313f8829a4aSRandall Stewart 
13141b649582SRandall Stewart 
13151b649582SRandall Stewart /*
13161b649582SRandall Stewart  * add an asconf operation for the given ifa and type.
13171b649582SRandall Stewart  * type = SCTP_ADD_IP_ADDRESS, SCTP_DEL_IP_ADDRESS, SCTP_SET_PRIM_ADDR.
13181b649582SRandall Stewart  * returns 0 if completed, -1 if not completed, 1 if immediate send is
13191b649582SRandall Stewart  * advisable.
13201b649582SRandall Stewart  */
13211b649582SRandall Stewart static int
13221b649582SRandall Stewart sctp_asconf_queue_add(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
13231b649582SRandall Stewart     uint16_t type)
13241b649582SRandall Stewart {
13251b649582SRandall Stewart 	uint32_t status;
13261b649582SRandall Stewart 	int pending_delete_queued = 0;
1327790a758dSMichael Tuexen 	int last;
13281b649582SRandall Stewart 
13291b649582SRandall Stewart 	/* see if peer supports ASCONF */
1330c79bec9cSMichael Tuexen 	if (stcb->asoc.asconf_supported == 0) {
13311b649582SRandall Stewart 		return (-1);
13321b649582SRandall Stewart 	}
13330053ed28SMichael Tuexen 
13341b649582SRandall Stewart 	/*
13351b649582SRandall Stewart 	 * if this is deleting the last address from the assoc, mark it as
13361b649582SRandall Stewart 	 * pending.
13371b649582SRandall Stewart 	 */
1338790a758dSMichael Tuexen 	if ((type == SCTP_DEL_IP_ADDRESS) && !stcb->asoc.asconf_del_pending) {
1339790a758dSMichael Tuexen 		if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1340790a758dSMichael Tuexen 			last = (sctp_local_addr_count(stcb) == 0);
1341790a758dSMichael Tuexen 		} else {
1342790a758dSMichael Tuexen 			last = (sctp_local_addr_count(stcb) == 1);
1343790a758dSMichael Tuexen 		}
1344790a758dSMichael Tuexen 		if (last) {
13451b649582SRandall Stewart 			/* set the pending delete info only */
13461b649582SRandall Stewart 			stcb->asoc.asconf_del_pending = 1;
13471b649582SRandall Stewart 			stcb->asoc.asconf_addr_del_pending = ifa;
13481b649582SRandall Stewart 			atomic_add_int(&ifa->refcount, 1);
13491b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2,
13501b649582SRandall Stewart 			    "asconf_queue_add: mark delete last address pending\n");
13511b649582SRandall Stewart 			return (-1);
13521b649582SRandall Stewart 		}
1353790a758dSMichael Tuexen 	}
13540053ed28SMichael Tuexen 
1355c54a18d2SRandall Stewart 	/* queue an asconf parameter */
1356c54a18d2SRandall Stewart 	status = sctp_asconf_queue_mgmt(stcb, ifa, type);
1357c54a18d2SRandall Stewart 
13581b649582SRandall Stewart 	/*
13591b649582SRandall Stewart 	 * if this is an add, and there is a delete also pending (i.e. the
13601b649582SRandall Stewart 	 * last local address is being changed), queue the pending delete
13611b649582SRandall Stewart 	 * too.
13621b649582SRandall Stewart 	 */
1363c54a18d2SRandall Stewart 	if ((type == SCTP_ADD_IP_ADDRESS) && stcb->asoc.asconf_del_pending && (status == 0)) {
13641b649582SRandall Stewart 		/* queue in the pending delete */
13651b649582SRandall Stewart 		if (sctp_asconf_queue_mgmt(stcb,
13661b649582SRandall Stewart 		    stcb->asoc.asconf_addr_del_pending,
13671b649582SRandall Stewart 		    SCTP_DEL_IP_ADDRESS) == 0) {
13681b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_add: queing pending delete\n");
13691b649582SRandall Stewart 			pending_delete_queued = 1;
13701b649582SRandall Stewart 			/* clear out the pending delete info */
13711b649582SRandall Stewart 			stcb->asoc.asconf_del_pending = 0;
13721b649582SRandall Stewart 			sctp_free_ifa(stcb->asoc.asconf_addr_del_pending);
13731b649582SRandall Stewart 			stcb->asoc.asconf_addr_del_pending = NULL;
13741b649582SRandall Stewart 		}
13751b649582SRandall Stewart 	}
13760053ed28SMichael Tuexen 
1377c54a18d2SRandall Stewart 	if (pending_delete_queued) {
13781b649582SRandall Stewart 		struct sctp_nets *net;
13791b649582SRandall Stewart 
13801b649582SRandall Stewart 		/*
13811b649582SRandall Stewart 		 * since we know that the only/last address is now being
13821b649582SRandall Stewart 		 * changed in this case, reset the cwnd/rto on all nets to
13831b649582SRandall Stewart 		 * start as a new address and path.  Also clear the error
13841b649582SRandall Stewart 		 * counts to give the assoc the best chance to complete the
13851b649582SRandall Stewart 		 * address change.
13861b649582SRandall Stewart 		 */
13871b649582SRandall Stewart 		TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
13881b649582SRandall Stewart 			stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb,
13891b649582SRandall Stewart 			    net);
13901b649582SRandall Stewart 			net->RTO = 0;
13911b649582SRandall Stewart 			net->error_count = 0;
13921b649582SRandall Stewart 		}
13931b649582SRandall Stewart 		stcb->asoc.overall_error_count = 0;
1394b3f1ea41SRandall Stewart 		if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_THRESHOLD_LOGGING) {
1395c4739e2fSRandall Stewart 			sctp_misc_ints(SCTP_THRESHOLD_CLEAR,
1396c4739e2fSRandall Stewart 			    stcb->asoc.overall_error_count,
1397c4739e2fSRandall Stewart 			    0,
1398c4739e2fSRandall Stewart 			    SCTP_FROM_SCTP_ASCONF,
1399c4739e2fSRandall Stewart 			    __LINE__);
1400c4739e2fSRandall Stewart 		}
14010053ed28SMichael Tuexen 
14021b649582SRandall Stewart 		/* queue in an advisory set primary too */
14031b649582SRandall Stewart 		(void)sctp_asconf_queue_mgmt(stcb, ifa, SCTP_SET_PRIM_ADDR);
14041b649582SRandall Stewart 		/* let caller know we should send this out immediately */
14051b649582SRandall Stewart 		status = 1;
14061b649582SRandall Stewart 	}
14071b649582SRandall Stewart 	return (status);
14081b649582SRandall Stewart }
14091b649582SRandall Stewart 
14103232788eSRandall Stewart /*-
14113232788eSRandall Stewart  * add an asconf delete IP address parameter to the queue by sockaddr and
14123232788eSRandall Stewart  * possibly with no sctp_ifa available.  This is only called by the routine
14133232788eSRandall Stewart  * that checks the addresses in an INIT-ACK against the current address list.
1414f8829a4aSRandall Stewart  * returns 0 if completed, non-zero if not completed.
14153232788eSRandall Stewart  * NOTE: if an add is already scheduled (and not yet sent out), simply
14163232788eSRandall Stewart  * remove it from queue.  If a duplicate operation is found, ignore the
14173232788eSRandall Stewart  * new one.
1418f8829a4aSRandall Stewart  */
14191b649582SRandall Stewart static int
14203232788eSRandall Stewart sctp_asconf_queue_sa_delete(struct sctp_tcb *stcb, struct sockaddr *sa)
1421f8829a4aSRandall Stewart {
1422bff64a4dSRandall Stewart 	struct sctp_ifa *ifa;
1423f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1424f8829a4aSRandall Stewart 
1425ad81507eSRandall Stewart 	if (stcb == NULL) {
1426ad81507eSRandall Stewart 		return (-1);
1427ad81507eSRandall Stewart 	}
1428f8829a4aSRandall Stewart 	/* see if peer supports ASCONF */
1429c79bec9cSMichael Tuexen 	if (stcb->asoc.asconf_supported == 0) {
1430f8829a4aSRandall Stewart 		return (-1);
1431f8829a4aSRandall Stewart 	}
1432f8829a4aSRandall Stewart 	/* make sure the request isn't already in the queue */
14334a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1434f8829a4aSRandall Stewart 		/* address match? */
1435f8829a4aSRandall Stewart 		if (sctp_asconf_addr_match(aa, sa) == 0)
1436f8829a4aSRandall Stewart 			continue;
1437f8829a4aSRandall Stewart 		/* is the request already in queue (sent or not) */
14383232788eSRandall Stewart 		if (aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS) {
1439f8829a4aSRandall Stewart 			return (-1);
1440f8829a4aSRandall Stewart 		}
1441f8829a4aSRandall Stewart 		/* is the negative request already in queue, and not sent */
1442f8829a4aSRandall Stewart 		if (aa->sent == 1)
1443f8829a4aSRandall Stewart 			continue;
14443232788eSRandall Stewart 		if (aa->ap.aph.ph.param_type == SCTP_ADD_IP_ADDRESS) {
14453232788eSRandall Stewart 			/* add already queued, so remove existing entry */
1446f8829a4aSRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
14471b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, aa->ifa);
1448f8829a4aSRandall Stewart 			/* free the entry */
1449207304d4SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
1450f8829a4aSRandall Stewart 			return (-1);
1451f8829a4aSRandall Stewart 		}
1452f8829a4aSRandall Stewart 	}			/* for each aa */
14533232788eSRandall Stewart 
14543232788eSRandall Stewart 	/* find any existing ifa-- NOTE ifa CAN be allowed to be NULL */
1455448e8596SMichael Tuexen 	ifa = sctp_find_ifa_by_addr(sa, stcb->asoc.vrf_id, SCTP_ADDR_NOT_LOCKED);
14563232788eSRandall Stewart 
1457f8829a4aSRandall Stewart 	/* adding new request to the queue */
14581b649582SRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
14591b649582SRandall Stewart 	    SCTP_M_ASC_ADDR);
1460f8829a4aSRandall Stewart 	if (aa == NULL) {
1461f8829a4aSRandall Stewart 		/* didn't get memory */
1462ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
14633232788eSRandall Stewart 		    "sctp_asconf_queue_sa_delete: failed to get memory!\n");
1464f8829a4aSRandall Stewart 		return (-1);
1465f8829a4aSRandall Stewart 	}
1466830d754dSRandall Stewart 	aa->special_del = 0;
1467f8829a4aSRandall Stewart 	/* fill in asconf address parameter fields */
1468f8829a4aSRandall Stewart 	/* top level elements are "networked" during send */
14693232788eSRandall Stewart 	aa->ap.aph.ph.param_type = SCTP_DEL_IP_ADDRESS;
1470bff64a4dSRandall Stewart 	aa->ifa = ifa;
14713232788eSRandall Stewart 	if (ifa)
1472bff64a4dSRandall Stewart 		atomic_add_int(&ifa->refcount, 1);
1473f8829a4aSRandall Stewart 	/* correlation_id filled in during send routine later... */
1474e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
1475e6194c2eSMichael Tuexen #ifdef INET6
1476e6194c2eSMichael Tuexen 	case AF_INET6:
1477e6194c2eSMichael Tuexen 		{
1478f8829a4aSRandall Stewart 			/* IPv6 address */
1479f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1480f8829a4aSRandall Stewart 
1481f8829a4aSRandall Stewart 			sin6 = (struct sockaddr_in6 *)sa;
1482f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
1483f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv6addr_param));
1484f8829a4aSRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) + sizeof(struct sctp_ipv6addr_param);
1485f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin6->sin6_addr,
1486f8829a4aSRandall Stewart 			    sizeof(struct in6_addr));
1487e6194c2eSMichael Tuexen 			break;
1488e6194c2eSMichael Tuexen 		}
1489e6194c2eSMichael Tuexen #endif
1490e6194c2eSMichael Tuexen #ifdef INET
1491e6194c2eSMichael Tuexen 	case AF_INET:
1492e6194c2eSMichael Tuexen 		{
1493f8829a4aSRandall Stewart 			/* IPv4 address */
1494f8829a4aSRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
1495f8829a4aSRandall Stewart 
1496f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
1497f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv4addr_param));
1498f8829a4aSRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) + sizeof(struct sctp_ipv4addr_param);
1499f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin->sin_addr,
1500f8829a4aSRandall Stewart 			    sizeof(struct in_addr));
1501e6194c2eSMichael Tuexen 			break;
1502e6194c2eSMichael Tuexen 		}
1503e6194c2eSMichael Tuexen #endif
1504e6194c2eSMichael Tuexen 	default:
1505f8829a4aSRandall Stewart 		/* invalid family! */
1506207304d4SRandall Stewart 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
15073232788eSRandall Stewart 		if (ifa)
15083232788eSRandall Stewart 			sctp_free_ifa(ifa);
1509f8829a4aSRandall Stewart 		return (-1);
1510f8829a4aSRandall Stewart 	}
1511f8829a4aSRandall Stewart 	aa->sent = 0;		/* clear sent flag */
1512f8829a4aSRandall Stewart 
15133232788eSRandall Stewart 	/* delete goes to the back of the queue */
1514f8829a4aSRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
1515f8829a4aSRandall Stewart 
1516c99efcf6SRandall Stewart 	/* sa_ignore MEMLEAK {memory is put on the tailq} */
1517f8829a4aSRandall Stewart 	return (0);
1518f8829a4aSRandall Stewart }
1519f8829a4aSRandall Stewart 
1520f8829a4aSRandall Stewart /*
1521f8829a4aSRandall Stewart  * find a specific asconf param on our "sent" queue
1522f8829a4aSRandall Stewart  */
1523f8829a4aSRandall Stewart static struct sctp_asconf_addr *
1524f8829a4aSRandall Stewart sctp_asconf_find_param(struct sctp_tcb *stcb, uint32_t correlation_id)
1525f8829a4aSRandall Stewart {
1526f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa;
1527f8829a4aSRandall Stewart 
1528f8829a4aSRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
1529f8829a4aSRandall Stewart 		if (aa->ap.aph.correlation_id == correlation_id &&
1530f8829a4aSRandall Stewart 		    aa->sent == 1) {
1531f8829a4aSRandall Stewart 			/* found it */
1532f8829a4aSRandall Stewart 			return (aa);
1533f8829a4aSRandall Stewart 		}
1534f8829a4aSRandall Stewart 	}
1535f8829a4aSRandall Stewart 	/* didn't find it */
1536f8829a4aSRandall Stewart 	return (NULL);
1537f8829a4aSRandall Stewart }
1538f8829a4aSRandall Stewart 
1539f8829a4aSRandall Stewart /*
1540f8829a4aSRandall Stewart  * process an SCTP_ERROR_CAUSE_IND for a ASCONF-ACK parameter and do
1541f8829a4aSRandall Stewart  * notifications based on the error response
1542f8829a4aSRandall Stewart  */
1543f8829a4aSRandall Stewart static void
1544c79bec9cSMichael Tuexen sctp_asconf_process_error(struct sctp_tcb *stcb SCTP_UNUSED,
1545f8829a4aSRandall Stewart     struct sctp_asconf_paramhdr *aph)
1546f8829a4aSRandall Stewart {
1547f8829a4aSRandall Stewart 	struct sctp_error_cause *eh;
1548f8829a4aSRandall Stewart 	struct sctp_paramhdr *ph;
1549f8829a4aSRandall Stewart 	uint16_t param_type;
1550f8829a4aSRandall Stewart 	uint16_t error_code;
1551f8829a4aSRandall Stewart 
1552f8829a4aSRandall Stewart 	eh = (struct sctp_error_cause *)(aph + 1);
1553f8829a4aSRandall Stewart 	ph = (struct sctp_paramhdr *)(eh + 1);
1554f8829a4aSRandall Stewart 	/* validate lengths */
1555f8829a4aSRandall Stewart 	if (htons(eh->length) + sizeof(struct sctp_error_cause) >
1556f8829a4aSRandall Stewart 	    htons(aph->ph.param_length)) {
1557f8829a4aSRandall Stewart 		/* invalid error cause length */
1558ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1559ad81507eSRandall Stewart 		    "asconf_process_error: cause element too long\n");
1560f8829a4aSRandall Stewart 		return;
1561f8829a4aSRandall Stewart 	}
1562f8829a4aSRandall Stewart 	if (htons(ph->param_length) + sizeof(struct sctp_paramhdr) >
1563f8829a4aSRandall Stewart 	    htons(eh->length)) {
1564f8829a4aSRandall Stewart 		/* invalid included TLV length */
1565ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1566ad81507eSRandall Stewart 		    "asconf_process_error: included TLV too long\n");
1567f8829a4aSRandall Stewart 		return;
1568f8829a4aSRandall Stewart 	}
1569f8829a4aSRandall Stewart 	/* which error code ? */
1570f8829a4aSRandall Stewart 	error_code = ntohs(eh->code);
1571f8829a4aSRandall Stewart 	param_type = ntohs(aph->ph.param_type);
1572f8829a4aSRandall Stewart 	/* FIX: this should go back up the REMOTE_ERROR ULP notify */
1573f8829a4aSRandall Stewart 	switch (error_code) {
1574f8829a4aSRandall Stewart 	case SCTP_CAUSE_RESOURCE_SHORTAGE:
1575f8829a4aSRandall Stewart 		/* we allow ourselves to "try again" for this error */
1576f8829a4aSRandall Stewart 		break;
1577f8829a4aSRandall Stewart 	default:
1578f8829a4aSRandall Stewart 		/* peer can't handle it... */
1579f8829a4aSRandall Stewart 		switch (param_type) {
1580f8829a4aSRandall Stewart 		case SCTP_ADD_IP_ADDRESS:
1581f8829a4aSRandall Stewart 		case SCTP_DEL_IP_ADDRESS:
1582f8829a4aSRandall Stewart 		case SCTP_SET_PRIM_ADDR:
1583f8829a4aSRandall Stewart 			break;
1584f8829a4aSRandall Stewart 		default:
1585f8829a4aSRandall Stewart 			break;
1586f8829a4aSRandall Stewart 		}
1587f8829a4aSRandall Stewart 	}
1588f8829a4aSRandall Stewart }
1589f8829a4aSRandall Stewart 
1590f8829a4aSRandall Stewart /*
159118e198d3SRandall Stewart  * process an asconf queue param.
159218e198d3SRandall Stewart  * aparam: parameter to process, will be removed from the queue.
159318e198d3SRandall Stewart  * flag: 1=success case, 0=failure case
1594f8829a4aSRandall Stewart  */
1595f8829a4aSRandall Stewart static void
1596f8829a4aSRandall Stewart sctp_asconf_process_param_ack(struct sctp_tcb *stcb,
1597f8829a4aSRandall Stewart     struct sctp_asconf_addr *aparam, uint32_t flag)
1598f8829a4aSRandall Stewart {
1599f8829a4aSRandall Stewart 	uint16_t param_type;
1600f8829a4aSRandall Stewart 
1601f8829a4aSRandall Stewart 	/* process this param */
1602f8829a4aSRandall Stewart 	param_type = aparam->ap.aph.ph.param_type;
1603f8829a4aSRandall Stewart 	switch (param_type) {
1604f8829a4aSRandall Stewart 	case SCTP_ADD_IP_ADDRESS:
1605ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1606ad81507eSRandall Stewart 		    "process_param_ack: added IP address\n");
16077215cc1bSMichael Tuexen 		sctp_asconf_addr_mgmt_ack(stcb, aparam->ifa, flag);
1608f8829a4aSRandall Stewart 		break;
1609f8829a4aSRandall Stewart 	case SCTP_DEL_IP_ADDRESS:
1610ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1611ad81507eSRandall Stewart 		    "process_param_ack: deleted IP address\n");
1612f8829a4aSRandall Stewart 		/* nothing really to do... lists already updated */
1613f8829a4aSRandall Stewart 		break;
1614f8829a4aSRandall Stewart 	case SCTP_SET_PRIM_ADDR:
1615c54a18d2SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1616c54a18d2SRandall Stewart 		    "process_param_ack: set primary IP address\n");
1617f8829a4aSRandall Stewart 		/* nothing to do... peer may start using this addr */
1618f8829a4aSRandall Stewart 		break;
1619f8829a4aSRandall Stewart 	default:
1620f8829a4aSRandall Stewart 		/* should NEVER happen */
1621f8829a4aSRandall Stewart 		break;
1622f8829a4aSRandall Stewart 	}
1623f8829a4aSRandall Stewart 
1624f8829a4aSRandall Stewart 	/* remove the param and free it */
1625f8829a4aSRandall Stewart 	TAILQ_REMOVE(&stcb->asoc.asconf_queue, aparam, next);
16263232788eSRandall Stewart 	if (aparam->ifa)
1627bff64a4dSRandall Stewart 		sctp_free_ifa(aparam->ifa);
1628207304d4SRandall Stewart 	SCTP_FREE(aparam, SCTP_M_ASC_ADDR);
1629f8829a4aSRandall Stewart }
1630f8829a4aSRandall Stewart 
1631f8829a4aSRandall Stewart /*
1632f8829a4aSRandall Stewart  * cleanup from a bad asconf ack parameter
1633f8829a4aSRandall Stewart  */
1634f8829a4aSRandall Stewart static void
1635c79bec9cSMichael Tuexen sctp_asconf_ack_clear(struct sctp_tcb *stcb SCTP_UNUSED)
1636f8829a4aSRandall Stewart {
1637f8829a4aSRandall Stewart 	/* assume peer doesn't really know how to do asconfs */
1638f8829a4aSRandall Stewart 	/* XXX we could free the pending queue here */
1639c79bec9cSMichael Tuexen 
1640f8829a4aSRandall Stewart }
1641f8829a4aSRandall Stewart 
1642f8829a4aSRandall Stewart void
1643f8829a4aSRandall Stewart sctp_handle_asconf_ack(struct mbuf *m, int offset,
1644f8829a4aSRandall Stewart     struct sctp_asconf_ack_chunk *cp, struct sctp_tcb *stcb,
16453232788eSRandall Stewart     struct sctp_nets *net, int *abort_no_unlock)
1646f8829a4aSRandall Stewart {
1647f8829a4aSRandall Stewart 	struct sctp_association *asoc;
1648f8829a4aSRandall Stewart 	uint32_t serial_num;
1649f8829a4aSRandall Stewart 	uint16_t ack_length;
1650f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
1651f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1652f8829a4aSRandall Stewart 	uint32_t last_error_id = 0;	/* last error correlation id */
1653f8829a4aSRandall Stewart 	uint32_t id;
1654f8829a4aSRandall Stewart 	struct sctp_asconf_addr *ap;
1655f8829a4aSRandall Stewart 
1656f8829a4aSRandall Stewart 	/* asconf param buffer */
1657f42a358aSRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
1658f8829a4aSRandall Stewart 
1659f8829a4aSRandall Stewart 	/* verify minimum length */
1660f8829a4aSRandall Stewart 	if (ntohs(cp->ch.chunk_length) < sizeof(struct sctp_asconf_ack_chunk)) {
1661ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1662ad81507eSRandall Stewart 		    "handle_asconf_ack: chunk too small = %xh\n",
1663f8829a4aSRandall Stewart 		    ntohs(cp->ch.chunk_length));
1664f8829a4aSRandall Stewart 		return;
1665f8829a4aSRandall Stewart 	}
1666f8829a4aSRandall Stewart 	asoc = &stcb->asoc;
1667f8829a4aSRandall Stewart 	serial_num = ntohl(cp->serial_number);
1668f8829a4aSRandall Stewart 
1669f8829a4aSRandall Stewart 	/*
1670f8829a4aSRandall Stewart 	 * NOTE: we may want to handle this differently- currently, we will
1671f8829a4aSRandall Stewart 	 * abort when we get an ack for the expected serial number + 1 (eg.
1672f8829a4aSRandall Stewart 	 * we didn't send it), process an ack normally if it is the expected
1673f8829a4aSRandall Stewart 	 * serial number, and re-send the previous ack for *ALL* other
1674f8829a4aSRandall Stewart 	 * serial numbers
1675f8829a4aSRandall Stewart 	 */
1676f8829a4aSRandall Stewart 
1677f8829a4aSRandall Stewart 	/*
1678f8829a4aSRandall Stewart 	 * if the serial number is the next expected, but I didn't send it,
1679f8829a4aSRandall Stewart 	 * abort the asoc, since someone probably just hijacked us...
1680f8829a4aSRandall Stewart 	 */
1681f8829a4aSRandall Stewart 	if (serial_num == (asoc->asconf_seq_out + 1)) {
1682267dbe63SMichael Tuexen 		struct mbuf *op_err;
1683267dbe63SMichael Tuexen 		char msg[SCTP_DIAG_INFO_LEN];
1684267dbe63SMichael Tuexen 
1685ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf_ack: got unexpected next serial number! Aborting asoc!\n");
1686267dbe63SMichael Tuexen 		snprintf(msg, sizeof(msg), "Never sent serial number %8.8x",
1687267dbe63SMichael Tuexen 		    serial_num);
1688267dbe63SMichael Tuexen 		op_err = sctp_generate_cause(SCTP_CAUSE_PROTOCOL_VIOLATION, msg);
1689267dbe63SMichael Tuexen 		sctp_abort_an_association(stcb->sctp_ep, stcb, op_err, SCTP_SO_NOT_LOCKED);
16903232788eSRandall Stewart 		*abort_no_unlock = 1;
1691f8829a4aSRandall Stewart 		return;
1692f8829a4aSRandall Stewart 	}
1693c54a18d2SRandall Stewart 	if (serial_num != asoc->asconf_seq_out_acked + 1) {
1694f8829a4aSRandall Stewart 		/* got a duplicate/unexpected ASCONF-ACK */
1695ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf_ack: got duplicate/unexpected serial number = %xh (expected = %xh)\n",
1696c54a18d2SRandall Stewart 		    serial_num, asoc->asconf_seq_out_acked + 1);
1697f8829a4aSRandall Stewart 		return;
1698f8829a4aSRandall Stewart 	}
16990053ed28SMichael Tuexen 
1700c54a18d2SRandall Stewart 	if (serial_num == asoc->asconf_seq_out - 1) {
1701f8829a4aSRandall Stewart 		/* stop our timer */
17023c503c28SRandall Stewart 		sctp_timer_stop(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep, stcb, net,
1703b7d130beSMichael Tuexen 		    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_5);
1704c54a18d2SRandall Stewart 	}
17050053ed28SMichael Tuexen 
1706f8829a4aSRandall Stewart 	/* process the ASCONF-ACK contents */
1707f8829a4aSRandall Stewart 	ack_length = ntohs(cp->ch.chunk_length) -
1708f8829a4aSRandall Stewart 	    sizeof(struct sctp_asconf_ack_chunk);
1709f8829a4aSRandall Stewart 	offset += sizeof(struct sctp_asconf_ack_chunk);
1710f8829a4aSRandall Stewart 	/* process through all parameters */
1711f8829a4aSRandall Stewart 	while (ack_length >= sizeof(struct sctp_asconf_paramhdr)) {
1712f8829a4aSRandall Stewart 		unsigned int param_length, param_type;
1713f8829a4aSRandall Stewart 
1714f8829a4aSRandall Stewart 		/* get pointer to next asconf parameter */
1715f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset,
1716f8829a4aSRandall Stewart 		    sizeof(struct sctp_asconf_paramhdr), aparam_buf);
1717f8829a4aSRandall Stewart 		if (aph == NULL) {
1718f8829a4aSRandall Stewart 			/* can't get an asconf paramhdr */
1719f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1720f8829a4aSRandall Stewart 			return;
1721f8829a4aSRandall Stewart 		}
1722f8829a4aSRandall Stewart 		param_type = ntohs(aph->ph.param_type);
1723f8829a4aSRandall Stewart 		param_length = ntohs(aph->ph.param_length);
1724f8829a4aSRandall Stewart 		if (param_length > ack_length) {
1725f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1726f8829a4aSRandall Stewart 			return;
1727f8829a4aSRandall Stewart 		}
1728f8829a4aSRandall Stewart 		if (param_length < sizeof(struct sctp_paramhdr)) {
1729f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1730f8829a4aSRandall Stewart 			return;
1731f8829a4aSRandall Stewart 		}
1732f8829a4aSRandall Stewart 		/* get the complete parameter... */
1733f8829a4aSRandall Stewart 		if (param_length > sizeof(aparam_buf)) {
1734ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
1735ad81507eSRandall Stewart 			    "param length (%u) larger than buffer size!\n", param_length);
1736f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1737f8829a4aSRandall Stewart 			return;
1738f8829a4aSRandall Stewart 		}
1739f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, param_length, aparam_buf);
1740f8829a4aSRandall Stewart 		if (aph == NULL) {
1741f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1742f8829a4aSRandall Stewart 			return;
1743f8829a4aSRandall Stewart 		}
1744f8829a4aSRandall Stewart 		/* correlation_id is transparent to peer, no ntohl needed */
1745f8829a4aSRandall Stewart 		id = aph->correlation_id;
1746f8829a4aSRandall Stewart 
1747f8829a4aSRandall Stewart 		switch (param_type) {
1748f8829a4aSRandall Stewart 		case SCTP_ERROR_CAUSE_IND:
1749f8829a4aSRandall Stewart 			last_error_id = id;
1750f8829a4aSRandall Stewart 			/* find the corresponding asconf param in our queue */
1751f8829a4aSRandall Stewart 			ap = sctp_asconf_find_param(stcb, id);
1752f8829a4aSRandall Stewart 			if (ap == NULL) {
1753f8829a4aSRandall Stewart 				/* hmm... can't find this in our queue! */
1754f8829a4aSRandall Stewart 				break;
1755f8829a4aSRandall Stewart 			}
1756f8829a4aSRandall Stewart 			/* process the parameter, failed flag */
1757f8829a4aSRandall Stewart 			sctp_asconf_process_param_ack(stcb, ap, 0);
1758f8829a4aSRandall Stewart 			/* process the error response */
1759f8829a4aSRandall Stewart 			sctp_asconf_process_error(stcb, aph);
1760f8829a4aSRandall Stewart 			break;
1761f8829a4aSRandall Stewart 		case SCTP_SUCCESS_REPORT:
1762f8829a4aSRandall Stewart 			/* find the corresponding asconf param in our queue */
1763f8829a4aSRandall Stewart 			ap = sctp_asconf_find_param(stcb, id);
1764f8829a4aSRandall Stewart 			if (ap == NULL) {
1765f8829a4aSRandall Stewart 				/* hmm... can't find this in our queue! */
1766f8829a4aSRandall Stewart 				break;
1767f8829a4aSRandall Stewart 			}
1768f8829a4aSRandall Stewart 			/* process the parameter, success flag */
1769f8829a4aSRandall Stewart 			sctp_asconf_process_param_ack(stcb, ap, 1);
1770f8829a4aSRandall Stewart 			break;
1771f8829a4aSRandall Stewart 		default:
1772f8829a4aSRandall Stewart 			break;
1773f8829a4aSRandall Stewart 		}		/* switch */
1774f8829a4aSRandall Stewart 
1775f8829a4aSRandall Stewart 		/* update remaining ASCONF-ACK message length to process */
1776f8829a4aSRandall Stewart 		ack_length -= SCTP_SIZE32(param_length);
1777f8829a4aSRandall Stewart 		if (ack_length <= 0) {
1778f8829a4aSRandall Stewart 			/* no more data in the mbuf chain */
1779f8829a4aSRandall Stewart 			break;
1780f8829a4aSRandall Stewart 		}
1781f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(param_length);
1782f8829a4aSRandall Stewart 	}			/* while */
1783f8829a4aSRandall Stewart 
1784f8829a4aSRandall Stewart 	/*
1785f8829a4aSRandall Stewart 	 * if there are any "sent" params still on the queue, these are
1786f8829a4aSRandall Stewart 	 * implicitly "success", or "failed" (if we got an error back) ...
1787f8829a4aSRandall Stewart 	 * so process these appropriately
1788f8829a4aSRandall Stewart 	 *
1789f8829a4aSRandall Stewart 	 * we assume that the correlation_id's are monotonically increasing
1790f8829a4aSRandall Stewart 	 * beginning from 1 and that we don't have *that* many outstanding
1791f8829a4aSRandall Stewart 	 * at any given time
1792f8829a4aSRandall Stewart 	 */
1793f8829a4aSRandall Stewart 	if (last_error_id == 0)
1794f8829a4aSRandall Stewart 		last_error_id--;	/* set to "max" value */
17954a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1796f8829a4aSRandall Stewart 		if (aa->sent == 1) {
1797f8829a4aSRandall Stewart 			/*
1798f8829a4aSRandall Stewart 			 * implicitly successful or failed if correlation_id
1799f8829a4aSRandall Stewart 			 * < last_error_id, then success else, failure
1800f8829a4aSRandall Stewart 			 */
1801f8829a4aSRandall Stewart 			if (aa->ap.aph.correlation_id < last_error_id)
180218e198d3SRandall Stewart 				sctp_asconf_process_param_ack(stcb, aa, 1);
1803f8829a4aSRandall Stewart 			else
180418e198d3SRandall Stewart 				sctp_asconf_process_param_ack(stcb, aa, 0);
1805f8829a4aSRandall Stewart 		} else {
1806f8829a4aSRandall Stewart 			/*
1807f8829a4aSRandall Stewart 			 * since we always process in order (FIFO queue) if
1808f8829a4aSRandall Stewart 			 * we reach one that hasn't been sent, the rest
1809f8829a4aSRandall Stewart 			 * should not have been sent either. so, we're
1810f8829a4aSRandall Stewart 			 * done...
1811f8829a4aSRandall Stewart 			 */
1812f8829a4aSRandall Stewart 			break;
1813f8829a4aSRandall Stewart 		}
1814f8829a4aSRandall Stewart 	}
1815f8829a4aSRandall Stewart 
1816f8829a4aSRandall Stewart 	/* update the next sequence number to use */
1817c54a18d2SRandall Stewart 	asoc->asconf_seq_out_acked++;
1818f8829a4aSRandall Stewart 	/* remove the old ASCONF on our outbound queue */
1819f8829a4aSRandall Stewart 	sctp_toss_old_asconf(stcb);
1820f8829a4aSRandall Stewart 	if (!TAILQ_EMPTY(&stcb->asoc.asconf_queue)) {
18211b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
1822f8829a4aSRandall Stewart 		/* we have more params, so restart our timer */
1823f8829a4aSRandall Stewart 		sctp_timer_start(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep,
1824f8829a4aSRandall Stewart 		    stcb, net);
18251b649582SRandall Stewart #else
18261b649582SRandall Stewart 		/* we have more params, so send out more */
18273232788eSRandall Stewart 		sctp_send_asconf(stcb, net, SCTP_ADDR_NOT_LOCKED);
18281b649582SRandall Stewart #endif
1829f8829a4aSRandall Stewart 	}
1830f8829a4aSRandall Stewart }
1831f8829a4aSRandall Stewart 
18325e2c2d87SRandall Stewart #ifdef INET6
1833f8829a4aSRandall Stewart static uint32_t
1834b0471b4bSMichael Tuexen sctp_is_scopeid_in_nets(struct sctp_tcb *stcb, struct sockaddr *sa)
1835b0471b4bSMichael Tuexen {
1836f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6, *net6;
1837f8829a4aSRandall Stewart 	struct sctp_nets *net;
1838f8829a4aSRandall Stewart 
1839f8829a4aSRandall Stewart 	if (sa->sa_family != AF_INET6) {
1840f8829a4aSRandall Stewart 		/* wrong family */
1841f8829a4aSRandall Stewart 		return (0);
1842f8829a4aSRandall Stewart 	}
1843f8829a4aSRandall Stewart 	sin6 = (struct sockaddr_in6 *)sa;
1844f8829a4aSRandall Stewart 	if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr) == 0) {
1845f8829a4aSRandall Stewart 		/* not link local address */
1846f8829a4aSRandall Stewart 		return (0);
1847f8829a4aSRandall Stewart 	}
1848f8829a4aSRandall Stewart 	/* hunt through our destination nets list for this scope_id */
1849f8829a4aSRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
1850f8829a4aSRandall Stewart 		if (((struct sockaddr *)(&net->ro._l_addr))->sa_family !=
1851f8829a4aSRandall Stewart 		    AF_INET6)
1852f8829a4aSRandall Stewart 			continue;
1853f8829a4aSRandall Stewart 		net6 = (struct sockaddr_in6 *)&net->ro._l_addr;
1854f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_LINKLOCAL(&net6->sin6_addr) == 0)
1855f8829a4aSRandall Stewart 			continue;
1856f8829a4aSRandall Stewart 		if (sctp_is_same_scope(sin6, net6)) {
1857f8829a4aSRandall Stewart 			/* found one */
1858f8829a4aSRandall Stewart 			return (1);
1859f8829a4aSRandall Stewart 		}
1860f8829a4aSRandall Stewart 	}
1861f8829a4aSRandall Stewart 	/* didn't find one */
1862f8829a4aSRandall Stewart 	return (0);
1863f8829a4aSRandall Stewart }
18645e2c2d87SRandall Stewart #endif
18655e2c2d87SRandall Stewart 
1866f8829a4aSRandall Stewart /*
1867f8829a4aSRandall Stewart  * address management functions
1868f8829a4aSRandall Stewart  */
1869f8829a4aSRandall Stewart static void
1870f8829a4aSRandall Stewart sctp_addr_mgmt_assoc(struct sctp_inpcb *inp, struct sctp_tcb *stcb,
18713232788eSRandall Stewart     struct sctp_ifa *ifa, uint16_t type, int addr_locked)
1872f8829a4aSRandall Stewart {
1873f8829a4aSRandall Stewart 	int status;
1874f8829a4aSRandall Stewart 
1875ca85e948SMichael Tuexen 	if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0 ||
1876f8829a4aSRandall Stewart 	    sctp_is_feature_off(inp, SCTP_PCB_FLAGS_DO_ASCONF)) {
1877f8829a4aSRandall Stewart 		/* subset bound, no ASCONF allowed case, so ignore */
1878f8829a4aSRandall Stewart 		return;
1879f8829a4aSRandall Stewart 	}
1880f8829a4aSRandall Stewart 	/*
1881f8829a4aSRandall Stewart 	 * note: we know this is not the subset bound, no ASCONF case eg.
1882f8829a4aSRandall Stewart 	 * this is boundall or subset bound w/ASCONF allowed
1883f8829a4aSRandall Stewart 	 */
1884f8829a4aSRandall Stewart 
18856ba22f19SMichael Tuexen 	/* first, make sure that the address is IPv4 or IPv6 and not jailed */
1886e6194c2eSMichael Tuexen 	switch (ifa->address.sa.sa_family) {
1887e6194c2eSMichael Tuexen #ifdef INET6
1888e6194c2eSMichael Tuexen 	case AF_INET6:
18896ba22f19SMichael Tuexen 		if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
18906ba22f19SMichael Tuexen 		    &ifa->address.sin6.sin6_addr) != 0) {
18916ba22f19SMichael Tuexen 			return;
18926ba22f19SMichael Tuexen 		}
1893e6194c2eSMichael Tuexen 		break;
1894e6194c2eSMichael Tuexen #endif
1895e6194c2eSMichael Tuexen #ifdef INET
1896e6194c2eSMichael Tuexen 	case AF_INET:
18976ba22f19SMichael Tuexen 		if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
18986ba22f19SMichael Tuexen 		    &ifa->address.sin.sin_addr) != 0) {
18996ba22f19SMichael Tuexen 			return;
19006ba22f19SMichael Tuexen 		}
1901e6194c2eSMichael Tuexen 		break;
1902e6194c2eSMichael Tuexen #endif
1903e6194c2eSMichael Tuexen 	default:
1904f8829a4aSRandall Stewart 		return;
1905f8829a4aSRandall Stewart 	}
1906e6194c2eSMichael Tuexen #ifdef INET6
1907f8829a4aSRandall Stewart 	/* make sure we're "allowed" to add this type of addr */
190842551e99SRandall Stewart 	if (ifa->address.sa.sa_family == AF_INET6) {
1909f8829a4aSRandall Stewart 		/* invalid if we're not a v6 endpoint */
1910f8829a4aSRandall Stewart 		if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0)
1911f8829a4aSRandall Stewart 			return;
1912f8829a4aSRandall Stewart 		/* is the v6 addr really valid ? */
191342551e99SRandall Stewart 		if (ifa->localifa_flags & SCTP_ADDR_IFA_UNUSEABLE) {
1914f8829a4aSRandall Stewart 			return;
1915f8829a4aSRandall Stewart 		}
1916f8829a4aSRandall Stewart 	}
1917e6194c2eSMichael Tuexen #endif
1918f8829a4aSRandall Stewart 	/* put this address on the "pending/do not use yet" list */
19191b649582SRandall Stewart 	sctp_add_local_addr_restricted(stcb, ifa);
1920f8829a4aSRandall Stewart 	/*
1921f8829a4aSRandall Stewart 	 * check address scope if address is out of scope, don't queue
1922f8829a4aSRandall Stewart 	 * anything... note: this would leave the address on both inp and
1923f8829a4aSRandall Stewart 	 * asoc lists
1924f8829a4aSRandall Stewart 	 */
19255e2c2d87SRandall Stewart 	switch (ifa->address.sa.sa_family) {
19265e2c2d87SRandall Stewart #ifdef INET6
19275e2c2d87SRandall Stewart 	case AF_INET6:
19285e2c2d87SRandall Stewart 		{
1929f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1930f8829a4aSRandall Stewart 
193124aaac8dSMichael Tuexen 			sin6 = &ifa->address.sin6;
1932f8829a4aSRandall Stewart 			if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
1933f8829a4aSRandall Stewart 				/* we skip unspecifed addresses */
1934f8829a4aSRandall Stewart 				return;
1935f8829a4aSRandall Stewart 			}
1936f8829a4aSRandall Stewart 			if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
1937a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.local_scope == 0) {
1938f8829a4aSRandall Stewart 					return;
1939f8829a4aSRandall Stewart 				}
1940f8829a4aSRandall Stewart 				/* is it the right link local scope? */
194142551e99SRandall Stewart 				if (sctp_is_scopeid_in_nets(stcb, &ifa->address.sa) == 0) {
1942f8829a4aSRandall Stewart 					return;
1943f8829a4aSRandall Stewart 				}
1944f8829a4aSRandall Stewart 			}
1945a1cb341bSMichael Tuexen 			if (stcb->asoc.scope.site_scope == 0 &&
1946f8829a4aSRandall Stewart 			    IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr)) {
1947f8829a4aSRandall Stewart 				return;
1948f8829a4aSRandall Stewart 			}
19495e2c2d87SRandall Stewart 			break;
19505e2c2d87SRandall Stewart 		}
19515e2c2d87SRandall Stewart #endif
1952e6194c2eSMichael Tuexen #ifdef INET
19535e2c2d87SRandall Stewart 	case AF_INET:
19545e2c2d87SRandall Stewart 		{
1955f8829a4aSRandall Stewart 			struct sockaddr_in *sin;
1956f8829a4aSRandall Stewart 			struct in6pcb *inp6;
1957f8829a4aSRandall Stewart 
1958f8829a4aSRandall Stewart 			inp6 = (struct in6pcb *)&inp->ip_inp.inp;
1959f8829a4aSRandall Stewart 			/* invalid if we are a v6 only endpoint */
1960f8829a4aSRandall Stewart 			if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
196144b7479bSRandall Stewart 			    SCTP_IPV6_V6ONLY(inp6))
1962f8829a4aSRandall Stewart 				return;
1963f8829a4aSRandall Stewart 
196424aaac8dSMichael Tuexen 			sin = &ifa->address.sin;
1965f8829a4aSRandall Stewart 			if (sin->sin_addr.s_addr == 0) {
1966f8829a4aSRandall Stewart 				/* we skip unspecifed addresses */
1967f8829a4aSRandall Stewart 				return;
1968f8829a4aSRandall Stewart 			}
1969a1cb341bSMichael Tuexen 			if (stcb->asoc.scope.ipv4_local_scope == 0 &&
1970f8829a4aSRandall Stewart 			    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr)) {
1971f8829a4aSRandall Stewart 				return;
1972f8829a4aSRandall Stewart 			}
19735e2c2d87SRandall Stewart 			break;
19745e2c2d87SRandall Stewart 		}
1975e6194c2eSMichael Tuexen #endif
19765e2c2d87SRandall Stewart 	default:
1977f8829a4aSRandall Stewart 		/* else, not AF_INET or AF_INET6, so skip */
1978f8829a4aSRandall Stewart 		return;
1979f8829a4aSRandall Stewart 	}
1980f8829a4aSRandall Stewart 
1981f8829a4aSRandall Stewart 	/* queue an asconf for this address add/delete */
1982f8829a4aSRandall Stewart 	if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_DO_ASCONF)) {
1983f8829a4aSRandall Stewart 		/* does the peer do asconf? */
1984c79bec9cSMichael Tuexen 		if (stcb->asoc.asconf_supported) {
1985f8829a4aSRandall Stewart 			/* queue an asconf for this addr */
1986f8829a4aSRandall Stewart 			status = sctp_asconf_queue_add(stcb, ifa, type);
19871b649582SRandall Stewart 
1988f8829a4aSRandall Stewart 			/*
19891b649582SRandall Stewart 			 * if queued ok, and in the open state, send out the
19901b649582SRandall Stewart 			 * ASCONF.  If in the non-open state, these will be
19911b649582SRandall Stewart 			 * sent when the state goes open.
1992f8829a4aSRandall Stewart 			 */
1993f8829a4aSRandall Stewart 			if (status == 0 &&
1994*839d21d6SMichael Tuexen 			    ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
1995*839d21d6SMichael Tuexen 			    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED))) {
19961b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
1997f8829a4aSRandall Stewart 				sctp_timer_start(SCTP_TIMER_TYPE_ASCONF, inp,
1998f8829a4aSRandall Stewart 				    stcb, stcb->asoc.primary_destination);
19991b649582SRandall Stewart #else
2000ca85e948SMichael Tuexen 				sctp_send_asconf(stcb, NULL, addr_locked);
20011b649582SRandall Stewart #endif
2002f8829a4aSRandall Stewart 			}
2003f8829a4aSRandall Stewart 		}
2004f8829a4aSRandall Stewart 	}
2005f8829a4aSRandall Stewart }
2006f8829a4aSRandall Stewart 
200742551e99SRandall Stewart 
200842551e99SRandall Stewart int
20097215cc1bSMichael Tuexen sctp_asconf_iterator_ep(struct sctp_inpcb *inp, void *ptr, uint32_t val SCTP_UNUSED)
2010f8829a4aSRandall Stewart {
201142551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
201242551e99SRandall Stewart 	struct sctp_ifa *ifa;
201342551e99SRandall Stewart 	struct sctp_laddr *l;
201442551e99SRandall Stewart 	int cnt_invalid = 0;
2015f8829a4aSRandall Stewart 
201642551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
201742551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
201842551e99SRandall Stewart 		ifa = l->ifa;
2019e6194c2eSMichael Tuexen 		switch (ifa->address.sa.sa_family) {
2020e6194c2eSMichael Tuexen #ifdef INET6
2021e6194c2eSMichael Tuexen 		case AF_INET6:
2022f8829a4aSRandall Stewart 			/* invalid if we're not a v6 endpoint */
2023f8829a4aSRandall Stewart 			if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) {
202442551e99SRandall Stewart 				cnt_invalid++;
202542551e99SRandall Stewart 				if (asc->cnt == cnt_invalid)
202642551e99SRandall Stewart 					return (1);
2027f8829a4aSRandall Stewart 			}
2028e6194c2eSMichael Tuexen 			break;
2029e6194c2eSMichael Tuexen #endif
2030e6194c2eSMichael Tuexen #ifdef INET
2031e6194c2eSMichael Tuexen 		case AF_INET:
2032e6194c2eSMichael Tuexen 			{
2033f8829a4aSRandall Stewart 				/* invalid if we are a v6 only endpoint */
2034f8829a4aSRandall Stewart 				struct in6pcb *inp6;
2035f8829a4aSRandall Stewart 
2036f8829a4aSRandall Stewart 				inp6 = (struct in6pcb *)&inp->ip_inp.inp;
2037f8829a4aSRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
203844b7479bSRandall Stewart 				    SCTP_IPV6_V6ONLY(inp6)) {
203942551e99SRandall Stewart 					cnt_invalid++;
204042551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
204142551e99SRandall Stewart 						return (1);
2042f8829a4aSRandall Stewart 				}
2043e6194c2eSMichael Tuexen 				break;
2044e6194c2eSMichael Tuexen 			}
2045e6194c2eSMichael Tuexen #endif
2046e6194c2eSMichael Tuexen 		default:
2047f8829a4aSRandall Stewart 			/* invalid address family */
204842551e99SRandall Stewart 			cnt_invalid++;
204942551e99SRandall Stewart 			if (asc->cnt == cnt_invalid)
205042551e99SRandall Stewart 				return (1);
2051f8829a4aSRandall Stewart 		}
205242551e99SRandall Stewart 	}
205342551e99SRandall Stewart 	return (0);
205442551e99SRandall Stewart }
2055f8829a4aSRandall Stewart 
20561b649582SRandall Stewart static int
20577215cc1bSMichael Tuexen sctp_asconf_iterator_ep_end(struct sctp_inpcb *inp, void *ptr, uint32_t val SCTP_UNUSED)
205842551e99SRandall Stewart {
205942551e99SRandall Stewart 	struct sctp_ifa *ifa;
206042551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
206142551e99SRandall Stewart 	struct sctp_laddr *laddr, *nladdr, *l;
206242551e99SRandall Stewart 
206342551e99SRandall Stewart 	/* Only for specific case not bound all */
206442551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
206542551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
206642551e99SRandall Stewart 		ifa = l->ifa;
206742551e99SRandall Stewart 		if (l->action == SCTP_ADD_IP_ADDRESS) {
20683c503c28SRandall Stewart 			LIST_FOREACH(laddr, &inp->sctp_addr_list,
20693c503c28SRandall Stewart 			    sctp_nxt_addr) {
207042551e99SRandall Stewart 				if (laddr->ifa == ifa) {
207142551e99SRandall Stewart 					laddr->action = 0;
207242551e99SRandall Stewart 					break;
207342551e99SRandall Stewart 				}
20740053ed28SMichael Tuexen 
207542551e99SRandall Stewart 			}
207642551e99SRandall Stewart 		} else if (l->action == SCTP_DEL_IP_ADDRESS) {
20774a9ef3f8SMichael Tuexen 			LIST_FOREACH_SAFE(laddr, &inp->sctp_addr_list, sctp_nxt_addr, nladdr) {
207842551e99SRandall Stewart 				/* remove only after all guys are done */
207942551e99SRandall Stewart 				if (laddr->ifa == ifa) {
208042551e99SRandall Stewart 					sctp_del_local_addr_ep(inp, ifa);
208142551e99SRandall Stewart 				}
208242551e99SRandall Stewart 			}
208342551e99SRandall Stewart 		}
208442551e99SRandall Stewart 	}
208542551e99SRandall Stewart 	return (0);
208642551e99SRandall Stewart }
208742551e99SRandall Stewart 
208842551e99SRandall Stewart void
20891b649582SRandall Stewart sctp_asconf_iterator_stcb(struct sctp_inpcb *inp, struct sctp_tcb *stcb,
20907215cc1bSMichael Tuexen     void *ptr, uint32_t val SCTP_UNUSED)
209142551e99SRandall Stewart {
209242551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
209342551e99SRandall Stewart 	struct sctp_ifa *ifa;
209442551e99SRandall Stewart 	struct sctp_laddr *l;
209542551e99SRandall Stewart 	int cnt_invalid = 0;
209642551e99SRandall Stewart 	int type, status;
20971b649582SRandall Stewart 	int num_queued = 0;
209842551e99SRandall Stewart 
209942551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
210042551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
210142551e99SRandall Stewart 		ifa = l->ifa;
210242551e99SRandall Stewart 		type = l->action;
210322a67197SRandall Stewart 
210422a67197SRandall Stewart 		/* address's vrf_id must be the vrf_id of the assoc */
210522a67197SRandall Stewart 		if (ifa->vrf_id != stcb->asoc.vrf_id) {
210622a67197SRandall Stewart 			continue;
210722a67197SRandall Stewart 		}
21080053ed28SMichael Tuexen 
210942551e99SRandall Stewart 		/* Same checks again for assoc */
21105e2c2d87SRandall Stewart 		switch (ifa->address.sa.sa_family) {
21115e2c2d87SRandall Stewart #ifdef INET6
21125e2c2d87SRandall Stewart 		case AF_INET6:
21135e2c2d87SRandall Stewart 			{
211442551e99SRandall Stewart 				/* invalid if we're not a v6 endpoint */
211542551e99SRandall Stewart 				struct sockaddr_in6 *sin6;
211642551e99SRandall Stewart 
211742551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) {
211842551e99SRandall Stewart 					cnt_invalid++;
211942551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
212042551e99SRandall Stewart 						return;
212142551e99SRandall Stewart 					else
212242551e99SRandall Stewart 						continue;
212342551e99SRandall Stewart 				}
212424aaac8dSMichael Tuexen 				sin6 = &ifa->address.sin6;
212542551e99SRandall Stewart 				if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
212642551e99SRandall Stewart 					/* we skip unspecifed addresses */
212742551e99SRandall Stewart 					continue;
212842551e99SRandall Stewart 				}
21296ba22f19SMichael Tuexen 				if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
21306ba22f19SMichael Tuexen 				    &sin6->sin6_addr) != 0) {
21316ba22f19SMichael Tuexen 					continue;
21326ba22f19SMichael Tuexen 				}
213342551e99SRandall Stewart 				if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
2134a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.local_scope == 0) {
213542551e99SRandall Stewart 						continue;
213642551e99SRandall Stewart 					}
213742551e99SRandall Stewart 					/* is it the right link local scope? */
213842551e99SRandall Stewart 					if (sctp_is_scopeid_in_nets(stcb, &ifa->address.sa) == 0) {
213942551e99SRandall Stewart 						continue;
214042551e99SRandall Stewart 					}
214142551e99SRandall Stewart 				}
21425e2c2d87SRandall Stewart 				break;
21435e2c2d87SRandall Stewart 			}
21445e2c2d87SRandall Stewart #endif
2145e6194c2eSMichael Tuexen #ifdef INET
21465e2c2d87SRandall Stewart 		case AF_INET:
21475e2c2d87SRandall Stewart 			{
214842551e99SRandall Stewart 				/* invalid if we are a v6 only endpoint */
214942551e99SRandall Stewart 				struct in6pcb *inp6;
215042551e99SRandall Stewart 				struct sockaddr_in *sin;
215142551e99SRandall Stewart 
215242551e99SRandall Stewart 				inp6 = (struct in6pcb *)&inp->ip_inp.inp;
215342551e99SRandall Stewart 				/* invalid if we are a v6 only endpoint */
215442551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
215542551e99SRandall Stewart 				    SCTP_IPV6_V6ONLY(inp6))
215642551e99SRandall Stewart 					continue;
215742551e99SRandall Stewart 
215824aaac8dSMichael Tuexen 				sin = &ifa->address.sin;
215942551e99SRandall Stewart 				if (sin->sin_addr.s_addr == 0) {
216042551e99SRandall Stewart 					/* we skip unspecifed addresses */
216142551e99SRandall Stewart 					continue;
216242551e99SRandall Stewart 				}
21636ba22f19SMichael Tuexen 				if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
21646ba22f19SMichael Tuexen 				    &sin->sin_addr) != 0) {
21656ba22f19SMichael Tuexen 					continue;
21666ba22f19SMichael Tuexen 				}
2167a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv4_local_scope == 0 &&
216842551e99SRandall Stewart 				    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr)) {
2169c2ede4b3SMartin Blapp 					continue;
217042551e99SRandall Stewart 				}
217142551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
217242551e99SRandall Stewart 				    SCTP_IPV6_V6ONLY(inp6)) {
217342551e99SRandall Stewart 					cnt_invalid++;
217442551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
217542551e99SRandall Stewart 						return;
217642551e99SRandall Stewart 					else
217742551e99SRandall Stewart 						continue;
217842551e99SRandall Stewart 				}
21795e2c2d87SRandall Stewart 				break;
21805e2c2d87SRandall Stewart 			}
2181e6194c2eSMichael Tuexen #endif
21825e2c2d87SRandall Stewart 		default:
218342551e99SRandall Stewart 			/* invalid address family */
218442551e99SRandall Stewart 			cnt_invalid++;
218542551e99SRandall Stewart 			if (asc->cnt == cnt_invalid)
2186f8829a4aSRandall Stewart 				return;
218742551e99SRandall Stewart 			else
218842551e99SRandall Stewart 				continue;
21895e2c2d87SRandall Stewart 			break;
2190f8829a4aSRandall Stewart 		}
2191f8829a4aSRandall Stewart 
219242551e99SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
21931b649582SRandall Stewart 			/* prevent this address from being used as a source */
21941b649582SRandall Stewart 			sctp_add_local_addr_restricted(stcb, ifa);
219542551e99SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
2196f8829a4aSRandall Stewart 			struct sctp_nets *net;
2197f8829a4aSRandall Stewart 
2198f8829a4aSRandall Stewart 			TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
219917205eccSRandall Stewart 				sctp_rtentry_t *rt;
2200f8829a4aSRandall Stewart 
2201f8829a4aSRandall Stewart 				/* delete this address if cached */
2202851b7298SRandall Stewart 				if (net->ro._s_addr == ifa) {
220342551e99SRandall Stewart 					sctp_free_ifa(net->ro._s_addr);
220442551e99SRandall Stewart 					net->ro._s_addr = NULL;
220542551e99SRandall Stewart 					net->src_addr_selected = 0;
2206f8829a4aSRandall Stewart 					rt = net->ro.ro_rt;
220742551e99SRandall Stewart 					if (rt) {
220842551e99SRandall Stewart 						RTFREE(rt);
2209f8829a4aSRandall Stewart 						net->ro.ro_rt = NULL;
2210f8829a4aSRandall Stewart 					}
221142551e99SRandall Stewart 					/*
221242551e99SRandall Stewart 					 * Now we deleted our src address,
221342551e99SRandall Stewart 					 * should we not also now reset the
221442551e99SRandall Stewart 					 * cwnd/rto to start as if its a new
221542551e99SRandall Stewart 					 * address?
221642551e99SRandall Stewart 					 */
2217b54d3a6cSRandall Stewart 					stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
2218108df27cSRandall Stewart 					net->RTO = 0;
221942551e99SRandall Stewart 
2220f8829a4aSRandall Stewart 				}
2221f8829a4aSRandall Stewart 			}
222242551e99SRandall Stewart 		} else if (type == SCTP_SET_PRIM_ADDR) {
222342551e99SRandall Stewart 			if ((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0) {
22241b649582SRandall Stewart 				/* must validate the ifa is in the ep */
222542551e99SRandall Stewart 				if (sctp_is_addr_in_ep(stcb->sctp_ep, ifa) == 0) {
222642551e99SRandall Stewart 					continue;
2227f8829a4aSRandall Stewart 				}
222842551e99SRandall Stewart 			} else {
222942551e99SRandall Stewart 				/* Need to check scopes for this guy */
2230a1cb341bSMichael Tuexen 				if (sctp_is_address_in_scope(ifa, &stcb->asoc.scope, 0) == 0) {
223142551e99SRandall Stewart 					continue;
2232f8829a4aSRandall Stewart 				}
223342551e99SRandall Stewart 			}
223442551e99SRandall Stewart 		}
223542551e99SRandall Stewart 		/* queue an asconf for this address add/delete */
22361b649582SRandall Stewart 		if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_DO_ASCONF) &&
2237c79bec9cSMichael Tuexen 		    stcb->asoc.asconf_supported == 1) {
223842551e99SRandall Stewart 			/* queue an asconf for this addr */
223942551e99SRandall Stewart 			status = sctp_asconf_queue_add(stcb, ifa, type);
224042551e99SRandall Stewart 			/*
22411b649582SRandall Stewart 			 * if queued ok, and in the open state, update the
22421b649582SRandall Stewart 			 * count of queued params.  If in the non-open
22431b649582SRandall Stewart 			 * state, these get sent when the assoc goes open.
224442551e99SRandall Stewart 			 */
2245*839d21d6SMichael Tuexen 			if ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
2246*839d21d6SMichael Tuexen 			    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
22471b649582SRandall Stewart 				if (status >= 0) {
22481b649582SRandall Stewart 					num_queued++;
224942551e99SRandall Stewart 				}
225042551e99SRandall Stewart 			}
225142551e99SRandall Stewart 		}
225242551e99SRandall Stewart 	}
22531b649582SRandall Stewart 	/*
22541b649582SRandall Stewart 	 * If we have queued params in the open state, send out an ASCONF.
22551b649582SRandall Stewart 	 */
22561b649582SRandall Stewart 	if (num_queued > 0) {
2257ca85e948SMichael Tuexen 		sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
22581b649582SRandall Stewart 	}
225942551e99SRandall Stewart }
226042551e99SRandall Stewart 
226142551e99SRandall Stewart void
22627215cc1bSMichael Tuexen sctp_asconf_iterator_end(void *ptr, uint32_t val SCTP_UNUSED)
226342551e99SRandall Stewart {
226442551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
226542551e99SRandall Stewart 	struct sctp_ifa *ifa;
22664a9ef3f8SMichael Tuexen 	struct sctp_laddr *l, *nl;
226742551e99SRandall Stewart 
226842551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
22694a9ef3f8SMichael Tuexen 	LIST_FOREACH_SAFE(l, &asc->list_of_work, sctp_nxt_addr, nl) {
227042551e99SRandall Stewart 		ifa = l->ifa;
227142551e99SRandall Stewart 		if (l->action == SCTP_ADD_IP_ADDRESS) {
227242551e99SRandall Stewart 			/* Clear the defer use flag */
227342551e99SRandall Stewart 			ifa->localifa_flags &= ~SCTP_ADDR_DEFER_USE;
227442551e99SRandall Stewart 		}
227542551e99SRandall Stewart 		sctp_free_ifa(ifa);
2276b3f1ea41SRandall Stewart 		SCTP_ZONE_FREE(SCTP_BASE_INFO(ipi_zone_laddr), l);
227742551e99SRandall Stewart 		SCTP_DECR_LADDR_COUNT();
227842551e99SRandall Stewart 	}
2279207304d4SRandall Stewart 	SCTP_FREE(asc, SCTP_M_ASC_IT);
2280f8829a4aSRandall Stewart }
2281f8829a4aSRandall Stewart 
2282f8829a4aSRandall Stewart /*
22831b649582SRandall Stewart  * sa is the sockaddr to ask the peer to set primary to.
22841b649582SRandall Stewart  * returns: 0 = completed, -1 = error
2285f8829a4aSRandall Stewart  */
2286c4739e2fSRandall Stewart int32_t
2287b0471b4bSMichael Tuexen sctp_set_primary_ip_address_sa(struct sctp_tcb *stcb, struct sockaddr *sa)
2288b0471b4bSMichael Tuexen {
22893232788eSRandall Stewart 	uint32_t vrf_id;
22903232788eSRandall Stewart 	struct sctp_ifa *ifa;
2291f8829a4aSRandall Stewart 
22923232788eSRandall Stewart 	/* find the ifa for the desired set primary */
22933232788eSRandall Stewart 	vrf_id = stcb->asoc.vrf_id;
22943232788eSRandall Stewart 	ifa = sctp_find_ifa_by_addr(sa, vrf_id, SCTP_ADDR_NOT_LOCKED);
22953232788eSRandall Stewart 	if (ifa == NULL) {
22963232788eSRandall Stewart 		/* Invalid address */
22973232788eSRandall Stewart 		return (-1);
22983232788eSRandall Stewart 	}
22990053ed28SMichael Tuexen 
2300f8829a4aSRandall Stewart 	/* queue an ASCONF:SET_PRIM_ADDR to be sent */
23013232788eSRandall Stewart 	if (!sctp_asconf_queue_add(stcb, ifa, SCTP_SET_PRIM_ADDR)) {
2302f8829a4aSRandall Stewart 		/* set primary queuing succeeded */
2303ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2304ad81507eSRandall Stewart 		    "set_primary_ip_address_sa: queued on tcb=%p, ",
2305dd294dceSMichael Tuexen 		    (void *)stcb);
2306ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
2307*839d21d6SMichael Tuexen 		if ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
2308*839d21d6SMichael Tuexen 		    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
23091b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
23101b649582SRandall Stewart 			sctp_timer_start(SCTP_TIMER_TYPE_ASCONF,
23111b649582SRandall Stewart 			    stcb->sctp_ep, stcb,
23121b649582SRandall Stewart 			    stcb->asoc.primary_destination);
23131b649582SRandall Stewart #else
2314ca85e948SMichael Tuexen 			sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
23151b649582SRandall Stewart #endif
23161b649582SRandall Stewart 		}
2317f8829a4aSRandall Stewart 	} else {
2318ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "set_primary_ip_address_sa: failed to add to queue on tcb=%p, ",
2319dd294dceSMichael Tuexen 		    (void *)stcb);
2320ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
2321f8829a4aSRandall Stewart 		return (-1);
2322f8829a4aSRandall Stewart 	}
2323f8829a4aSRandall Stewart 	return (0);
2324f8829a4aSRandall Stewart }
2325f8829a4aSRandall Stewart 
2326c54a18d2SRandall Stewart int
2327c54a18d2SRandall Stewart sctp_is_addr_pending(struct sctp_tcb *stcb, struct sctp_ifa *sctp_ifa)
2328c54a18d2SRandall Stewart {
2329c54a18d2SRandall Stewart 	struct sctp_tmit_chunk *chk, *nchk;
2330c54a18d2SRandall Stewart 	unsigned int offset, asconf_limit;
2331c54a18d2SRandall Stewart 	struct sctp_asconf_chunk *acp;
2332c54a18d2SRandall Stewart 	struct sctp_asconf_paramhdr *aph;
2333c54a18d2SRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
2334e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
2335c54a18d2SRandall Stewart 	int add_cnt, del_cnt;
2336c54a18d2SRandall Stewart 	uint16_t last_param_type;
2337c54a18d2SRandall Stewart 
2338c54a18d2SRandall Stewart 	add_cnt = del_cnt = 0;
2339c54a18d2SRandall Stewart 	last_param_type = 0;
23404a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(chk, &stcb->asoc.asconf_send_queue, sctp_next, nchk) {
2341c54a18d2SRandall Stewart 		if (chk->data == NULL) {
2342c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: No mbuf data?\n");
2343c54a18d2SRandall Stewart 			continue;
2344c54a18d2SRandall Stewart 		}
2345c54a18d2SRandall Stewart 		offset = 0;
2346c54a18d2SRandall Stewart 		acp = mtod(chk->data, struct sctp_asconf_chunk *);
2347c54a18d2SRandall Stewart 		offset += sizeof(struct sctp_asconf_chunk);
2348c54a18d2SRandall Stewart 		asconf_limit = ntohs(acp->ch.chunk_length);
2349e6194c2eSMichael Tuexen 		ph = (struct sctp_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_paramhdr), aparam_buf);
2350e6194c2eSMichael Tuexen 		if (ph == NULL) {
2351c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: couldn't get lookup addr!\n");
2352c54a18d2SRandall Stewart 			continue;
2353c54a18d2SRandall Stewart 		}
2354e6194c2eSMichael Tuexen 		offset += ntohs(ph->param_length);
2355c54a18d2SRandall Stewart 
2356c54a18d2SRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_asconf_paramhdr), aparam_buf);
2357c54a18d2SRandall Stewart 		if (aph == NULL) {
2358c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: Empty ASCONF will be sent?\n");
2359c54a18d2SRandall Stewart 			continue;
2360c54a18d2SRandall Stewart 		}
2361c54a18d2SRandall Stewart 		while (aph != NULL) {
2362c54a18d2SRandall Stewart 			unsigned int param_length, param_type;
2363c54a18d2SRandall Stewart 
2364c54a18d2SRandall Stewart 			param_type = ntohs(aph->ph.param_type);
2365c54a18d2SRandall Stewart 			param_length = ntohs(aph->ph.param_length);
2366c54a18d2SRandall Stewart 			if (offset + param_length > asconf_limit) {
2367c54a18d2SRandall Stewart 				/* parameter goes beyond end of chunk! */
2368c54a18d2SRandall Stewart 				break;
2369c54a18d2SRandall Stewart 			}
2370c54a18d2SRandall Stewart 			if (param_length > sizeof(aparam_buf)) {
2371c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: param length (%u) larger than buffer size!\n", param_length);
2372c54a18d2SRandall Stewart 				break;
2373c54a18d2SRandall Stewart 			}
2374c54a18d2SRandall Stewart 			if (param_length <= sizeof(struct sctp_paramhdr)) {
2375c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: param length(%u) too short\n", param_length);
2376c54a18d2SRandall Stewart 				break;
2377c54a18d2SRandall Stewart 			}
23780053ed28SMichael Tuexen 
2379c54a18d2SRandall Stewart 			aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, param_length, aparam_buf);
2380c54a18d2SRandall Stewart 			if (aph == NULL) {
2381c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: couldn't get entire param\n");
2382c54a18d2SRandall Stewart 				break;
2383c54a18d2SRandall Stewart 			}
23840053ed28SMichael Tuexen 
2385e6194c2eSMichael Tuexen 			ph = (struct sctp_paramhdr *)(aph + 1);
2386e6194c2eSMichael Tuexen 			if (sctp_addr_match(ph, &sctp_ifa->address.sa) != 0) {
2387c54a18d2SRandall Stewart 				switch (param_type) {
2388c54a18d2SRandall Stewart 				case SCTP_ADD_IP_ADDRESS:
2389c54a18d2SRandall Stewart 					add_cnt++;
2390c54a18d2SRandall Stewart 					break;
2391c54a18d2SRandall Stewart 				case SCTP_DEL_IP_ADDRESS:
2392c54a18d2SRandall Stewart 					del_cnt++;
2393c54a18d2SRandall Stewart 					break;
2394c54a18d2SRandall Stewart 				default:
2395c54a18d2SRandall Stewart 					break;
2396c54a18d2SRandall Stewart 				}
2397c54a18d2SRandall Stewart 				last_param_type = param_type;
2398c54a18d2SRandall Stewart 			}
23990053ed28SMichael Tuexen 
2400c54a18d2SRandall Stewart 			offset += SCTP_SIZE32(param_length);
2401c54a18d2SRandall Stewart 			if (offset >= asconf_limit) {
2402c54a18d2SRandall Stewart 				/* no more data in the mbuf chain */
2403c54a18d2SRandall Stewart 				break;
2404c54a18d2SRandall Stewart 			}
2405c54a18d2SRandall Stewart 			/* get pointer to next asconf param */
2406c54a18d2SRandall Stewart 			aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_asconf_paramhdr), aparam_buf);
2407c54a18d2SRandall Stewart 		}
2408c54a18d2SRandall Stewart 	}
2409c54a18d2SRandall Stewart 
2410b7b84c0eSMichael Tuexen 	/*
2411b7b84c0eSMichael Tuexen 	 * we want to find the sequences which consist of ADD -> DEL -> ADD
2412b7b84c0eSMichael Tuexen 	 * or DEL -> ADD
2413b7b84c0eSMichael Tuexen 	 */
2414c54a18d2SRandall Stewart 	if (add_cnt > del_cnt ||
2415c54a18d2SRandall Stewart 	    (add_cnt == del_cnt && last_param_type == SCTP_ADD_IP_ADDRESS)) {
241660990c0cSMichael Tuexen 		return (1);
2417c54a18d2SRandall Stewart 	}
241860990c0cSMichael Tuexen 	return (0);
2419c54a18d2SRandall Stewart }
2420c54a18d2SRandall Stewart 
2421f8829a4aSRandall Stewart static struct sockaddr *
24223232788eSRandall Stewart sctp_find_valid_localaddr(struct sctp_tcb *stcb, int addr_locked)
2423f8829a4aSRandall Stewart {
242442551e99SRandall Stewart 	struct sctp_vrf *vrf = NULL;
242542551e99SRandall Stewart 	struct sctp_ifn *sctp_ifn;
242642551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
2427f8829a4aSRandall Stewart 
24283232788eSRandall Stewart 	if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2429c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RLOCK();
243042551e99SRandall Stewart 	vrf = sctp_find_vrf(stcb->asoc.vrf_id);
2431ad81507eSRandall Stewart 	if (vrf == NULL) {
24323232788eSRandall Stewart 		if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2433c99efcf6SRandall Stewart 			SCTP_IPI_ADDR_RUNLOCK();
2434ad81507eSRandall Stewart 		return (NULL);
2435ad81507eSRandall Stewart 	}
243642551e99SRandall Stewart 	LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
2437a1cb341bSMichael Tuexen 		if (stcb->asoc.scope.loopback_scope == 0 &&
243842551e99SRandall Stewart 		    SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
2439f8829a4aSRandall Stewart 			/* Skip if loopback_scope not set */
2440f8829a4aSRandall Stewart 			continue;
2441f8829a4aSRandall Stewart 		}
244242551e99SRandall Stewart 		LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
2443e6194c2eSMichael Tuexen 			switch (sctp_ifa->address.sa.sa_family) {
2444e6194c2eSMichael Tuexen #ifdef INET
2445e6194c2eSMichael Tuexen 			case AF_INET:
2446a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv4_addr_legal) {
2447f8829a4aSRandall Stewart 					struct sockaddr_in *sin;
2448f8829a4aSRandall Stewart 
244924aaac8dSMichael Tuexen 					sin = &sctp_ifa->address.sin;
2450f8829a4aSRandall Stewart 					if (sin->sin_addr.s_addr == 0) {
2451f8829a4aSRandall Stewart 						/* skip unspecifed addresses */
2452f8829a4aSRandall Stewart 						continue;
2453f8829a4aSRandall Stewart 					}
24546ba22f19SMichael Tuexen 					if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
24556ba22f19SMichael Tuexen 					    &sin->sin_addr) != 0) {
24566ba22f19SMichael Tuexen 						continue;
24576ba22f19SMichael Tuexen 					}
2458a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.ipv4_local_scope == 0 &&
2459f8829a4aSRandall Stewart 					    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr))
2460f8829a4aSRandall Stewart 						continue;
2461f8829a4aSRandall Stewart 
2462c54a18d2SRandall Stewart 					if (sctp_is_addr_restricted(stcb, sctp_ifa) &&
2463c54a18d2SRandall Stewart 					    (!sctp_is_addr_pending(stcb, sctp_ifa)))
2464f8829a4aSRandall Stewart 						continue;
2465b7b84c0eSMichael Tuexen 					/*
2466b7b84c0eSMichael Tuexen 					 * found a valid local v4 address to
2467b7b84c0eSMichael Tuexen 					 * use
2468b7b84c0eSMichael Tuexen 					 */
24693232788eSRandall Stewart 					if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2470c99efcf6SRandall Stewart 						SCTP_IPI_ADDR_RUNLOCK();
247142551e99SRandall Stewart 					return (&sctp_ifa->address.sa);
2472e6194c2eSMichael Tuexen 				}
2473e6194c2eSMichael Tuexen 				break;
2474e6194c2eSMichael Tuexen #endif
2475e6194c2eSMichael Tuexen #ifdef INET6
2476e6194c2eSMichael Tuexen 			case AF_INET6:
2477a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv6_addr_legal) {
2478f8829a4aSRandall Stewart 					struct sockaddr_in6 *sin6;
2479f8829a4aSRandall Stewart 
248042551e99SRandall Stewart 					if (sctp_ifa->localifa_flags & SCTP_ADDR_IFA_UNUSEABLE) {
2481f8829a4aSRandall Stewart 						continue;
248242551e99SRandall Stewart 					}
24830053ed28SMichael Tuexen 
248424aaac8dSMichael Tuexen 					sin6 = &sctp_ifa->address.sin6;
2485f8829a4aSRandall Stewart 					if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
2486b7b84c0eSMichael Tuexen 						/*
2487b7b84c0eSMichael Tuexen 						 * we skip unspecifed
2488b7b84c0eSMichael Tuexen 						 * addresses
2489b7b84c0eSMichael Tuexen 						 */
2490f8829a4aSRandall Stewart 						continue;
2491f8829a4aSRandall Stewart 					}
24926ba22f19SMichael Tuexen 					if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
24936ba22f19SMichael Tuexen 					    &sin6->sin6_addr) != 0) {
24946ba22f19SMichael Tuexen 						continue;
24956ba22f19SMichael Tuexen 					}
2496a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.local_scope == 0 &&
2497f8829a4aSRandall Stewart 					    IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr))
2498f8829a4aSRandall Stewart 						continue;
2499a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.site_scope == 0 &&
2500f8829a4aSRandall Stewart 					    IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr))
2501f8829a4aSRandall Stewart 						continue;
2502f8829a4aSRandall Stewart 
2503c54a18d2SRandall Stewart 					if (sctp_is_addr_restricted(stcb, sctp_ifa) &&
2504c54a18d2SRandall Stewart 					    (!sctp_is_addr_pending(stcb, sctp_ifa)))
2505c54a18d2SRandall Stewart 						continue;
2506b7b84c0eSMichael Tuexen 					/*
2507b7b84c0eSMichael Tuexen 					 * found a valid local v6 address to
2508b7b84c0eSMichael Tuexen 					 * use
2509b7b84c0eSMichael Tuexen 					 */
25103232788eSRandall Stewart 					if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2511c99efcf6SRandall Stewart 						SCTP_IPI_ADDR_RUNLOCK();
251242551e99SRandall Stewart 					return (&sctp_ifa->address.sa);
2513f8829a4aSRandall Stewart 				}
2514e6194c2eSMichael Tuexen 				break;
2515e6194c2eSMichael Tuexen #endif
2516e6194c2eSMichael Tuexen 			default:
2517e6194c2eSMichael Tuexen 				break;
2518e6194c2eSMichael Tuexen 			}
2519f8829a4aSRandall Stewart 		}
2520f8829a4aSRandall Stewart 	}
2521f8829a4aSRandall Stewart 	/* no valid addresses found */
25223232788eSRandall Stewart 	if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2523c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
2524f8829a4aSRandall Stewart 	return (NULL);
2525f8829a4aSRandall Stewart }
2526f8829a4aSRandall Stewart 
2527f8829a4aSRandall Stewart static struct sockaddr *
2528f8829a4aSRandall Stewart sctp_find_valid_localaddr_ep(struct sctp_tcb *stcb)
2529f8829a4aSRandall Stewart {
2530f8829a4aSRandall Stewart 	struct sctp_laddr *laddr;
2531f8829a4aSRandall Stewart 
2532f8829a4aSRandall Stewart 	LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
2533f8829a4aSRandall Stewart 		if (laddr->ifa == NULL) {
2534f8829a4aSRandall Stewart 			continue;
2535f8829a4aSRandall Stewart 		}
2536f8829a4aSRandall Stewart 		/* is the address restricted ? */
2537c54a18d2SRandall Stewart 		if (sctp_is_addr_restricted(stcb, laddr->ifa) &&
2538c54a18d2SRandall Stewart 		    (!sctp_is_addr_pending(stcb, laddr->ifa)))
2539f8829a4aSRandall Stewart 			continue;
2540f8829a4aSRandall Stewart 
2541f8829a4aSRandall Stewart 		/* found a valid local address to use */
254242551e99SRandall Stewart 		return (&laddr->ifa->address.sa);
2543f8829a4aSRandall Stewart 	}
2544f8829a4aSRandall Stewart 	/* no valid addresses found */
2545f8829a4aSRandall Stewart 	return (NULL);
2546f8829a4aSRandall Stewart }
2547f8829a4aSRandall Stewart 
2548f8829a4aSRandall Stewart /*
254918e198d3SRandall Stewart  * builds an ASCONF chunk from queued ASCONF params.
255018e198d3SRandall Stewart  * returns NULL on error (no mbuf, no ASCONF params queued, etc).
2551f8829a4aSRandall Stewart  */
2552f8829a4aSRandall Stewart struct mbuf *
25533232788eSRandall Stewart sctp_compose_asconf(struct sctp_tcb *stcb, int *retlen, int addr_locked)
2554f8829a4aSRandall Stewart {
2555f8829a4aSRandall Stewart 	struct mbuf *m_asconf, *m_asconf_chk;
2556f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa;
2557f8829a4aSRandall Stewart 	struct sctp_asconf_chunk *acp;
2558f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
2559f8829a4aSRandall Stewart 	struct sctp_asconf_addr_param *aap;
2560f8829a4aSRandall Stewart 	uint32_t p_length;
2561f8829a4aSRandall Stewart 	uint32_t correlation_id = 1;	/* 0 is reserved... */
2562f8829a4aSRandall Stewart 	caddr_t ptr, lookup_ptr;
2563f8829a4aSRandall Stewart 	uint8_t lookup_used = 0;
2564f8829a4aSRandall Stewart 
2565f8829a4aSRandall Stewart 	/* are there any asconf params to send? */
2566c54a18d2SRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
2567c54a18d2SRandall Stewart 		if (aa->sent == 0)
2568c54a18d2SRandall Stewart 			break;
2569f8829a4aSRandall Stewart 	}
2570c54a18d2SRandall Stewart 	if (aa == NULL)
25711b649582SRandall Stewart 		return (NULL);
2572c54a18d2SRandall Stewart 
2573f8829a4aSRandall Stewart 	/*
2574f8829a4aSRandall Stewart 	 * get a chunk header mbuf and a cluster for the asconf params since
2575f8829a4aSRandall Stewart 	 * it's simpler to fill in the asconf chunk header lookup address on
2576f8829a4aSRandall Stewart 	 * the fly
2577f8829a4aSRandall Stewart 	 */
2578eb1b1807SGleb Smirnoff 	m_asconf_chk = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_chunk), 0, M_NOWAIT, 1, MT_DATA);
2579f8829a4aSRandall Stewart 	if (m_asconf_chk == NULL) {
2580f8829a4aSRandall Stewart 		/* no mbuf's */
2581ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2582ad81507eSRandall Stewart 		    "compose_asconf: couldn't get chunk mbuf!\n");
2583f8829a4aSRandall Stewart 		return (NULL);
2584f8829a4aSRandall Stewart 	}
2585eb1b1807SGleb Smirnoff 	m_asconf = sctp_get_mbuf_for_msg(MCLBYTES, 0, M_NOWAIT, 1, MT_DATA);
2586f8829a4aSRandall Stewart 	if (m_asconf == NULL) {
2587f8829a4aSRandall Stewart 		/* no mbuf's */
2588ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2589ad81507eSRandall Stewart 		    "compose_asconf: couldn't get mbuf!\n");
2590f8829a4aSRandall Stewart 		sctp_m_freem(m_asconf_chk);
2591f8829a4aSRandall Stewart 		return (NULL);
2592f8829a4aSRandall Stewart 	}
2593139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_asconf_chk) = sizeof(struct sctp_asconf_chunk);
2594139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_asconf) = 0;
2595f8829a4aSRandall Stewart 	acp = mtod(m_asconf_chk, struct sctp_asconf_chunk *);
25965ba7f91fSMichael Tuexen 	memset(acp, 0, sizeof(struct sctp_asconf_chunk));
2597f8829a4aSRandall Stewart 	/* save pointers to lookup address and asconf params */
2598f8829a4aSRandall Stewart 	lookup_ptr = (caddr_t)(acp + 1);	/* after the header */
2599f8829a4aSRandall Stewart 	ptr = mtod(m_asconf, caddr_t);	/* beginning of cluster */
2600f8829a4aSRandall Stewart 
2601f8829a4aSRandall Stewart 	/* fill in chunk header info */
2602f8829a4aSRandall Stewart 	acp->ch.chunk_type = SCTP_ASCONF;
2603f8829a4aSRandall Stewart 	acp->ch.chunk_flags = 0;
2604f8829a4aSRandall Stewart 	acp->serial_number = htonl(stcb->asoc.asconf_seq_out);
2605c54a18d2SRandall Stewart 	stcb->asoc.asconf_seq_out++;
2606f8829a4aSRandall Stewart 
2607f8829a4aSRandall Stewart 	/* add parameters... up to smallest MTU allowed */
2608f8829a4aSRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
2609c54a18d2SRandall Stewart 		if (aa->sent)
2610c54a18d2SRandall Stewart 			continue;
2611f8829a4aSRandall Stewart 		/* get the parameter length */
2612f8829a4aSRandall Stewart 		p_length = SCTP_SIZE32(aa->ap.aph.ph.param_length);
2613f8829a4aSRandall Stewart 		/* will it fit in current chunk? */
2614a9d94d29SMichael Tuexen 		if ((SCTP_BUF_LEN(m_asconf) + p_length > stcb->asoc.smallest_mtu) ||
2615a9d94d29SMichael Tuexen 		    (SCTP_BUF_LEN(m_asconf) + p_length > MCLBYTES)) {
2616f8829a4aSRandall Stewart 			/* won't fit, so we're done with this chunk */
2617f8829a4aSRandall Stewart 			break;
2618f8829a4aSRandall Stewart 		}
2619f8829a4aSRandall Stewart 		/* assign (and store) a correlation id */
2620f8829a4aSRandall Stewart 		aa->ap.aph.correlation_id = correlation_id++;
2621f8829a4aSRandall Stewart 
2622f8829a4aSRandall Stewart 		/*
2623f8829a4aSRandall Stewart 		 * fill in address if we're doing a delete this is a simple
2624f8829a4aSRandall Stewart 		 * way for us to fill in the correlation address, which
2625f8829a4aSRandall Stewart 		 * should only be used by the peer if we're deleting our
2626f8829a4aSRandall Stewart 		 * source address and adding a new address (e.g. renumbering
2627f8829a4aSRandall Stewart 		 * case)
2628f8829a4aSRandall Stewart 		 */
2629f8829a4aSRandall Stewart 		if (lookup_used == 0 &&
2630830d754dSRandall Stewart 		    (aa->special_del == 0) &&
2631f8829a4aSRandall Stewart 		    aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS) {
2632f8829a4aSRandall Stewart 			struct sctp_ipv6addr_param *lookup;
2633f8829a4aSRandall Stewart 			uint16_t p_size, addr_size;
2634f8829a4aSRandall Stewart 
2635f8829a4aSRandall Stewart 			lookup = (struct sctp_ipv6addr_param *)lookup_ptr;
2636f8829a4aSRandall Stewart 			lookup->ph.param_type =
2637f8829a4aSRandall Stewart 			    htons(aa->ap.addrp.ph.param_type);
2638f8829a4aSRandall Stewart 			if (aa->ap.addrp.ph.param_type == SCTP_IPV6_ADDRESS) {
2639f8829a4aSRandall Stewart 				/* copy IPv6 address */
2640f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv6addr_param);
2641f8829a4aSRandall Stewart 				addr_size = sizeof(struct in6_addr);
2642f8829a4aSRandall Stewart 			} else {
2643f8829a4aSRandall Stewart 				/* copy IPv4 address */
2644f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv4addr_param);
2645f8829a4aSRandall Stewart 				addr_size = sizeof(struct in_addr);
2646f8829a4aSRandall Stewart 			}
2647f8829a4aSRandall Stewart 			lookup->ph.param_length = htons(SCTP_SIZE32(p_size));
2648f8829a4aSRandall Stewart 			memcpy(lookup->addr, &aa->ap.addrp.addr, addr_size);
2649139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_asconf_chk) += SCTP_SIZE32(p_size);
2650f8829a4aSRandall Stewart 			lookup_used = 1;
2651f8829a4aSRandall Stewart 		}
2652f8829a4aSRandall Stewart 		/* copy into current space */
2653f8829a4aSRandall Stewart 		memcpy(ptr, &aa->ap, p_length);
2654f8829a4aSRandall Stewart 
2655f8829a4aSRandall Stewart 		/* network elements and update lengths */
2656f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)ptr;
2657f8829a4aSRandall Stewart 		aap = (struct sctp_asconf_addr_param *)ptr;
2658f8829a4aSRandall Stewart 		/* correlation_id is transparent to peer, no htonl needed */
2659f8829a4aSRandall Stewart 		aph->ph.param_type = htons(aph->ph.param_type);
2660f8829a4aSRandall Stewart 		aph->ph.param_length = htons(aph->ph.param_length);
2661f8829a4aSRandall Stewart 		aap->addrp.ph.param_type = htons(aap->addrp.ph.param_type);
2662f8829a4aSRandall Stewart 		aap->addrp.ph.param_length = htons(aap->addrp.ph.param_length);
2663f8829a4aSRandall Stewart 
2664139bc87fSRandall Stewart 		SCTP_BUF_LEN(m_asconf) += SCTP_SIZE32(p_length);
2665f8829a4aSRandall Stewart 		ptr += SCTP_SIZE32(p_length);
2666f8829a4aSRandall Stewart 
2667f8829a4aSRandall Stewart 		/*
2668f8829a4aSRandall Stewart 		 * these params are removed off the pending list upon
2669f8829a4aSRandall Stewart 		 * getting an ASCONF-ACK back from the peer, just set flag
2670f8829a4aSRandall Stewart 		 */
2671f8829a4aSRandall Stewart 		aa->sent = 1;
2672f8829a4aSRandall Stewart 	}
2673f8829a4aSRandall Stewart 	/* check to see if the lookup addr has been populated yet */
2674f8829a4aSRandall Stewart 	if (lookup_used == 0) {
2675f8829a4aSRandall Stewart 		/* NOTE: if the address param is optional, can skip this... */
2676f8829a4aSRandall Stewart 		/* add any valid (existing) address... */
2677f8829a4aSRandall Stewart 		struct sctp_ipv6addr_param *lookup;
2678f8829a4aSRandall Stewart 		uint16_t p_size, addr_size;
2679f8829a4aSRandall Stewart 		struct sockaddr *found_addr;
2680f8829a4aSRandall Stewart 		caddr_t addr_ptr;
2681f8829a4aSRandall Stewart 
2682f8829a4aSRandall Stewart 		if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL)
26833232788eSRandall Stewart 			found_addr = sctp_find_valid_localaddr(stcb,
26843232788eSRandall Stewart 			    addr_locked);
2685f8829a4aSRandall Stewart 		else
2686f8829a4aSRandall Stewart 			found_addr = sctp_find_valid_localaddr_ep(stcb);
2687f8829a4aSRandall Stewart 
2688f8829a4aSRandall Stewart 		lookup = (struct sctp_ipv6addr_param *)lookup_ptr;
2689f8829a4aSRandall Stewart 		if (found_addr != NULL) {
2690e6194c2eSMichael Tuexen 			switch (found_addr->sa_family) {
2691e6194c2eSMichael Tuexen #ifdef INET6
2692e6194c2eSMichael Tuexen 			case AF_INET6:
2693f8829a4aSRandall Stewart 				/* copy IPv6 address */
2694f8829a4aSRandall Stewart 				lookup->ph.param_type =
2695f8829a4aSRandall Stewart 				    htons(SCTP_IPV6_ADDRESS);
2696f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv6addr_param);
2697f8829a4aSRandall Stewart 				addr_size = sizeof(struct in6_addr);
2698f8829a4aSRandall Stewart 				addr_ptr = (caddr_t)&((struct sockaddr_in6 *)
2699f8829a4aSRandall Stewart 				    found_addr)->sin6_addr;
2700e6194c2eSMichael Tuexen 				break;
2701e6194c2eSMichael Tuexen #endif
2702e6194c2eSMichael Tuexen #ifdef INET
2703e6194c2eSMichael Tuexen 			case AF_INET:
2704f8829a4aSRandall Stewart 				/* copy IPv4 address */
2705f8829a4aSRandall Stewart 				lookup->ph.param_type =
2706f8829a4aSRandall Stewart 				    htons(SCTP_IPV4_ADDRESS);
2707f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv4addr_param);
2708f8829a4aSRandall Stewart 				addr_size = sizeof(struct in_addr);
2709f8829a4aSRandall Stewart 				addr_ptr = (caddr_t)&((struct sockaddr_in *)
2710f8829a4aSRandall Stewart 				    found_addr)->sin_addr;
2711e6194c2eSMichael Tuexen 				break;
2712e6194c2eSMichael Tuexen #endif
2713e6194c2eSMichael Tuexen 			default:
2714e6194c2eSMichael Tuexen 				p_size = 0;
2715e6194c2eSMichael Tuexen 				addr_size = 0;
2716e6194c2eSMichael Tuexen 				addr_ptr = NULL;
2717e6194c2eSMichael Tuexen 				break;
2718f8829a4aSRandall Stewart 			}
2719f8829a4aSRandall Stewart 			lookup->ph.param_length = htons(SCTP_SIZE32(p_size));
2720f8829a4aSRandall Stewart 			memcpy(lookup->addr, addr_ptr, addr_size);
2721139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_asconf_chk) += SCTP_SIZE32(p_size);
2722f8829a4aSRandall Stewart 		} else {
2723f8829a4aSRandall Stewart 			/* uh oh... don't have any address?? */
2724ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
2725ad81507eSRandall Stewart 			    "compose_asconf: no lookup addr!\n");
2726e6194c2eSMichael Tuexen 			/* XXX for now, we send a IPv4 address of 0.0.0.0 */
2727f8829a4aSRandall Stewart 			lookup->ph.param_type = htons(SCTP_IPV4_ADDRESS);
2728f8829a4aSRandall Stewart 			lookup->ph.param_length = htons(SCTP_SIZE32(sizeof(struct sctp_ipv4addr_param)));
27295ba7f91fSMichael Tuexen 			memset(lookup->addr, 0, sizeof(struct in_addr));
2730139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_asconf_chk) += SCTP_SIZE32(sizeof(struct sctp_ipv4addr_param));
2731f8829a4aSRandall Stewart 		}
2732f8829a4aSRandall Stewart 	}
2733f8829a4aSRandall Stewart 	/* chain it all together */
2734139bc87fSRandall Stewart 	SCTP_BUF_NEXT(m_asconf_chk) = m_asconf;
27353c503c28SRandall Stewart 	*retlen = SCTP_BUF_LEN(m_asconf_chk) + SCTP_BUF_LEN(m_asconf);
2736c9eb4473SMichael Tuexen 	acp->ch.chunk_length = htons(*retlen);
2737f8829a4aSRandall Stewart 
2738f8829a4aSRandall Stewart 	return (m_asconf_chk);
2739f8829a4aSRandall Stewart }
2740f8829a4aSRandall Stewart 
2741f8829a4aSRandall Stewart /*
2742f8829a4aSRandall Stewart  * section to handle address changes before an association is up eg. changes
2743f8829a4aSRandall Stewart  * during INIT/INIT-ACK/COOKIE-ECHO handshake
2744f8829a4aSRandall Stewart  */
2745f8829a4aSRandall Stewart 
2746f8829a4aSRandall Stewart /*
2747f8829a4aSRandall Stewart  * processes the (local) addresses in the INIT-ACK chunk
2748f8829a4aSRandall Stewart  */
2749f8829a4aSRandall Stewart static void
2750f8829a4aSRandall Stewart sctp_process_initack_addresses(struct sctp_tcb *stcb, struct mbuf *m,
2751f8829a4aSRandall Stewart     unsigned int offset, unsigned int length)
2752f8829a4aSRandall Stewart {
2753f8829a4aSRandall Stewart 	struct sctp_paramhdr tmp_param, *ph;
2754f8829a4aSRandall Stewart 	uint16_t plen, ptype;
275542551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
275623602b60SMichael Tuexen 	union sctp_sockstore store;
2757e6194c2eSMichael Tuexen #ifdef INET6
27585e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr6_store;
2759e6194c2eSMichael Tuexen #endif
2760e6194c2eSMichael Tuexen #ifdef INET
27615e20b91dSMichael Tuexen 	struct sctp_ipv4addr_param addr4_store;
2762e6194c2eSMichael Tuexen #endif
2763f8829a4aSRandall Stewart 
2764ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF2, "processing init-ack addresses\n");
2765ad81507eSRandall Stewart 	if (stcb == NULL)	/* Un-needed check for SA */
2766ad81507eSRandall Stewart 		return;
2767f8829a4aSRandall Stewart 
2768f8829a4aSRandall Stewart 	/* convert to upper bound */
2769f8829a4aSRandall Stewart 	length += offset;
2770f8829a4aSRandall Stewart 
2771f8829a4aSRandall Stewart 	if ((offset + sizeof(struct sctp_paramhdr)) > length) {
2772f8829a4aSRandall Stewart 		return;
2773f8829a4aSRandall Stewart 	}
2774f8829a4aSRandall Stewart 	/* go through the addresses in the init-ack */
2775e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)
2776e6194c2eSMichael Tuexen 	    sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr),
2777e6194c2eSMichael Tuexen 	    (uint8_t *)&tmp_param);
2778f8829a4aSRandall Stewart 	while (ph != NULL) {
2779f8829a4aSRandall Stewart 		ptype = ntohs(ph->param_type);
2780f8829a4aSRandall Stewart 		plen = ntohs(ph->param_length);
2781e6194c2eSMichael Tuexen 		switch (ptype) {
2782e6194c2eSMichael Tuexen #ifdef INET6
2783e6194c2eSMichael Tuexen 		case SCTP_IPV6_ADDRESS:
2784e6194c2eSMichael Tuexen 			{
2785f8829a4aSRandall Stewart 				struct sctp_ipv6addr_param *a6p;
2786f8829a4aSRandall Stewart 
2787f8829a4aSRandall Stewart 				/* get the entire IPv6 address param */
2788f8829a4aSRandall Stewart 				a6p = (struct sctp_ipv6addr_param *)
2789f8829a4aSRandall Stewart 				    sctp_m_getptr(m, offset,
2790f8829a4aSRandall Stewart 				    sizeof(struct sctp_ipv6addr_param),
27915e20b91dSMichael Tuexen 				    (uint8_t *)&addr6_store);
2792f8829a4aSRandall Stewart 				if (plen != sizeof(struct sctp_ipv6addr_param) ||
2793f8829a4aSRandall Stewart 				    a6p == NULL) {
2794f8829a4aSRandall Stewart 					return;
2795f8829a4aSRandall Stewart 				}
279623602b60SMichael Tuexen 				memset(&store, 0, sizeof(union sctp_sockstore));
279723602b60SMichael Tuexen 				store.sin6.sin6_family = AF_INET6;
279823602b60SMichael Tuexen 				store.sin6.sin6_len = sizeof(struct sockaddr_in6);
279923602b60SMichael Tuexen 				store.sin6.sin6_port = stcb->rport;
280023602b60SMichael Tuexen 				memcpy(&store.sin6.sin6_addr, a6p->addr, sizeof(struct in6_addr));
2801e6194c2eSMichael Tuexen 				break;
2802e6194c2eSMichael Tuexen 			}
2803e6194c2eSMichael Tuexen #endif
2804e6194c2eSMichael Tuexen #ifdef INET
2805e6194c2eSMichael Tuexen 		case SCTP_IPV4_ADDRESS:
2806e6194c2eSMichael Tuexen 			{
2807f8829a4aSRandall Stewart 				struct sctp_ipv4addr_param *a4p;
2808f8829a4aSRandall Stewart 
2809f8829a4aSRandall Stewart 				/* get the entire IPv4 address param */
281042551e99SRandall Stewart 				a4p = (struct sctp_ipv4addr_param *)sctp_m_getptr(m, offset,
281142551e99SRandall Stewart 				    sizeof(struct sctp_ipv4addr_param),
28125e20b91dSMichael Tuexen 				    (uint8_t *)&addr4_store);
2813f8829a4aSRandall Stewart 				if (plen != sizeof(struct sctp_ipv4addr_param) ||
2814f8829a4aSRandall Stewart 				    a4p == NULL) {
2815f8829a4aSRandall Stewart 					return;
2816f8829a4aSRandall Stewart 				}
281723602b60SMichael Tuexen 				memset(&store, 0, sizeof(union sctp_sockstore));
281823602b60SMichael Tuexen 				store.sin.sin_family = AF_INET;
281923602b60SMichael Tuexen 				store.sin.sin_len = sizeof(struct sockaddr_in);
282023602b60SMichael Tuexen 				store.sin.sin_port = stcb->rport;
282123602b60SMichael Tuexen 				store.sin.sin_addr.s_addr = a4p->addr;
28221d663b46SMichael Tuexen 				break;
2823e6194c2eSMichael Tuexen 			}
2824e6194c2eSMichael Tuexen #endif
2825e6194c2eSMichael Tuexen 		default:
2826f8829a4aSRandall Stewart 			goto next_addr;
2827f8829a4aSRandall Stewart 		}
2828f8829a4aSRandall Stewart 
2829f8829a4aSRandall Stewart 		/* see if this address really (still) exists */
2830448e8596SMichael Tuexen 		sctp_ifa = sctp_find_ifa_by_addr(&store.sa, stcb->asoc.vrf_id,
28313232788eSRandall Stewart 		    SCTP_ADDR_NOT_LOCKED);
283242551e99SRandall Stewart 		if (sctp_ifa == NULL) {
2833f8829a4aSRandall Stewart 			/* address doesn't exist anymore */
2834f8829a4aSRandall Stewart 			int status;
2835f8829a4aSRandall Stewart 
2836f8829a4aSRandall Stewart 			/* are ASCONFs allowed ? */
2837f8829a4aSRandall Stewart 			if ((sctp_is_feature_on(stcb->sctp_ep,
2838f8829a4aSRandall Stewart 			    SCTP_PCB_FLAGS_DO_ASCONF)) &&
2839c79bec9cSMichael Tuexen 			    stcb->asoc.asconf_supported) {
2840f8829a4aSRandall Stewart 				/* queue an ASCONF DEL_IP_ADDRESS */
284123602b60SMichael Tuexen 				status = sctp_asconf_queue_sa_delete(stcb, &store.sa);
2842f8829a4aSRandall Stewart 				/*
28431b649582SRandall Stewart 				 * if queued ok, and in correct state, send
28441b649582SRandall Stewart 				 * out the ASCONF.
2845f8829a4aSRandall Stewart 				 */
2846f8829a4aSRandall Stewart 				if (status == 0 &&
2847*839d21d6SMichael Tuexen 				    SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) {
28481b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
2849f8829a4aSRandall Stewart 					sctp_timer_start(SCTP_TIMER_TYPE_ASCONF,
2850f8829a4aSRandall Stewart 					    stcb->sctp_ep, stcb,
2851f8829a4aSRandall Stewart 					    stcb->asoc.primary_destination);
28521b649582SRandall Stewart #else
2853ca85e948SMichael Tuexen 					sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
28541b649582SRandall Stewart #endif
2855f8829a4aSRandall Stewart 				}
2856f8829a4aSRandall Stewart 			}
2857f8829a4aSRandall Stewart 		}
28580053ed28SMichael Tuexen 
2859f8829a4aSRandall Stewart next_addr:
2860f8829a4aSRandall Stewart 		/*
2861f8829a4aSRandall Stewart 		 * Sanity check:  Make sure the length isn't 0, otherwise
2862f8829a4aSRandall Stewart 		 * we'll be stuck in this loop for a long time...
2863f8829a4aSRandall Stewart 		 */
2864f8829a4aSRandall Stewart 		if (SCTP_SIZE32(plen) == 0) {
2865ad81507eSRandall Stewart 			SCTP_PRINTF("process_initack_addrs: bad len (%d) type=%xh\n",
2866f8829a4aSRandall Stewart 			    plen, ptype);
2867f8829a4aSRandall Stewart 			return;
2868f8829a4aSRandall Stewart 		}
2869f8829a4aSRandall Stewart 		/* get next parameter */
2870f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(plen);
2871f8829a4aSRandall Stewart 		if ((offset + sizeof(struct sctp_paramhdr)) > length)
2872f8829a4aSRandall Stewart 			return;
2873f8829a4aSRandall Stewart 		ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset,
2874f8829a4aSRandall Stewart 		    sizeof(struct sctp_paramhdr), (uint8_t *)&tmp_param);
2875f8829a4aSRandall Stewart 	}			/* while */
2876f8829a4aSRandall Stewart }
2877f8829a4aSRandall Stewart 
2878f8829a4aSRandall Stewart /* FIX ME: need to verify return result for v6 address type if v6 disabled */
2879f8829a4aSRandall Stewart /*
2880f8829a4aSRandall Stewart  * checks to see if a specific address is in the initack address list returns
2881f8829a4aSRandall Stewart  * 1 if found, 0 if not
2882f8829a4aSRandall Stewart  */
2883f8829a4aSRandall Stewart static uint32_t
2884b0471b4bSMichael Tuexen sctp_addr_in_initack(struct mbuf *m, uint32_t offset, uint32_t length, struct sockaddr *sa)
2885b0471b4bSMichael Tuexen {
2886f8829a4aSRandall Stewart 	struct sctp_paramhdr tmp_param, *ph;
2887f8829a4aSRandall Stewart 	uint16_t plen, ptype;
2888e6194c2eSMichael Tuexen #ifdef INET
2889f8829a4aSRandall Stewart 	struct sockaddr_in *sin;
2890f8829a4aSRandall Stewart 	struct sctp_ipv4addr_param *a4p;
28915e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr4_store;
2892e6194c2eSMichael Tuexen #endif
2893f8829a4aSRandall Stewart #ifdef INET6
289442551e99SRandall Stewart 	struct sockaddr_in6 *sin6;
2895f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *a6p;
28965e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr6_store;
289742551e99SRandall Stewart 	struct sockaddr_in6 sin6_tmp;
2898e6194c2eSMichael Tuexen #endif
2899f8829a4aSRandall Stewart 
2900e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
2901e6194c2eSMichael Tuexen #ifdef INET
2902e6194c2eSMichael Tuexen 	case AF_INET:
2903e6194c2eSMichael Tuexen 		break;
2904e6194c2eSMichael Tuexen #endif
2905f8829a4aSRandall Stewart #ifdef INET6
2906e6194c2eSMichael Tuexen 	case AF_INET6:
2907e6194c2eSMichael Tuexen 		break;
2908e6194c2eSMichael Tuexen #endif
2909e6194c2eSMichael Tuexen 	default:
2910f8829a4aSRandall Stewart 		return (0);
2911e6194c2eSMichael Tuexen 	}
2912f8829a4aSRandall Stewart 
2913ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF2, "find_initack_addr: starting search for ");
2914ad81507eSRandall Stewart 	SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, sa);
2915f8829a4aSRandall Stewart 	/* convert to upper bound */
2916f8829a4aSRandall Stewart 	length += offset;
2917f8829a4aSRandall Stewart 
2918f8829a4aSRandall Stewart 	if ((offset + sizeof(struct sctp_paramhdr)) > length) {
2919ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2920ad81507eSRandall Stewart 		    "find_initack_addr: invalid offset?\n");
2921f8829a4aSRandall Stewart 		return (0);
2922f8829a4aSRandall Stewart 	}
2923f8829a4aSRandall Stewart 	/* go through the addresses in the init-ack */
2924f8829a4aSRandall Stewart 	ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset,
2925f8829a4aSRandall Stewart 	    sizeof(struct sctp_paramhdr), (uint8_t *)&tmp_param);
2926f8829a4aSRandall Stewart 	while (ph != NULL) {
2927f8829a4aSRandall Stewart 		ptype = ntohs(ph->param_type);
2928f8829a4aSRandall Stewart 		plen = ntohs(ph->param_length);
2929e6194c2eSMichael Tuexen 		switch (ptype) {
2930f8829a4aSRandall Stewart #ifdef INET6
2931e6194c2eSMichael Tuexen 		case SCTP_IPV6_ADDRESS:
2932e6194c2eSMichael Tuexen 			if (sa->sa_family == AF_INET6) {
2933e6194c2eSMichael Tuexen 				/* get the entire IPv6 address param */
2934e6194c2eSMichael Tuexen 				if (plen != sizeof(struct sctp_ipv6addr_param)) {
2935e6194c2eSMichael Tuexen 					break;
2936e6194c2eSMichael Tuexen 				}
2937f8829a4aSRandall Stewart 				/* get the entire IPv6 address param */
2938f8829a4aSRandall Stewart 				a6p = (struct sctp_ipv6addr_param *)
2939f8829a4aSRandall Stewart 				    sctp_m_getptr(m, offset,
2940f8829a4aSRandall Stewart 				    sizeof(struct sctp_ipv6addr_param),
29415e20b91dSMichael Tuexen 				    (uint8_t *)&addr6_store);
2942e6194c2eSMichael Tuexen 				if (a6p == NULL) {
2943f8829a4aSRandall Stewart 					return (0);
2944f8829a4aSRandall Stewart 				}
2945f8829a4aSRandall Stewart 				sin6 = (struct sockaddr_in6 *)sa;
2946f8829a4aSRandall Stewart 				if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) {
2947f8829a4aSRandall Stewart 					/* create a copy and clear scope */
2948f8829a4aSRandall Stewart 					memcpy(&sin6_tmp, sin6,
2949f8829a4aSRandall Stewart 					    sizeof(struct sockaddr_in6));
2950f8829a4aSRandall Stewart 					sin6 = &sin6_tmp;
2951f8829a4aSRandall Stewart 					in6_clearscope(&sin6->sin6_addr);
2952f8829a4aSRandall Stewart 				}
2953f8829a4aSRandall Stewart 				if (memcmp(&sin6->sin6_addr, a6p->addr,
2954f8829a4aSRandall Stewart 				    sizeof(struct in6_addr)) == 0) {
2955f8829a4aSRandall Stewart 					/* found it */
2956f8829a4aSRandall Stewart 					return (1);
2957f8829a4aSRandall Stewart 				}
2958e6194c2eSMichael Tuexen 			}
2959e6194c2eSMichael Tuexen 			break;
2960f8829a4aSRandall Stewart #endif				/* INET6 */
2961e6194c2eSMichael Tuexen #ifdef INET
2962e6194c2eSMichael Tuexen 		case SCTP_IPV4_ADDRESS:
2963e6194c2eSMichael Tuexen 			if (sa->sa_family == AF_INET) {
2964e6194c2eSMichael Tuexen 				if (plen != sizeof(struct sctp_ipv4addr_param)) {
2965e6194c2eSMichael Tuexen 					break;
2966e6194c2eSMichael Tuexen 				}
2967f8829a4aSRandall Stewart 				/* get the entire IPv4 address param */
2968e6194c2eSMichael Tuexen 				a4p = (struct sctp_ipv4addr_param *)
2969e6194c2eSMichael Tuexen 				    sctp_m_getptr(m, offset,
2970e6194c2eSMichael Tuexen 				    sizeof(struct sctp_ipv4addr_param),
29715e20b91dSMichael Tuexen 				    (uint8_t *)&addr4_store);
2972e6194c2eSMichael Tuexen 				if (a4p == NULL) {
2973f8829a4aSRandall Stewart 					return (0);
2974f8829a4aSRandall Stewart 				}
2975f8829a4aSRandall Stewart 				sin = (struct sockaddr_in *)sa;
2976f8829a4aSRandall Stewart 				if (sin->sin_addr.s_addr == a4p->addr) {
2977f8829a4aSRandall Stewart 					/* found it */
2978f8829a4aSRandall Stewart 					return (1);
2979f8829a4aSRandall Stewart 				}
2980f8829a4aSRandall Stewart 			}
2981e6194c2eSMichael Tuexen 			break;
2982e6194c2eSMichael Tuexen #endif
2983e6194c2eSMichael Tuexen 		default:
2984e6194c2eSMichael Tuexen 			break;
2985e6194c2eSMichael Tuexen 		}
2986f8829a4aSRandall Stewart 		/* get next parameter */
2987f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(plen);
2988e6194c2eSMichael Tuexen 		if (offset + sizeof(struct sctp_paramhdr) > length) {
2989f8829a4aSRandall Stewart 			return (0);
2990e6194c2eSMichael Tuexen 		}
2991f8829a4aSRandall Stewart 		ph = (struct sctp_paramhdr *)
2992f8829a4aSRandall Stewart 		    sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr),
2993f8829a4aSRandall Stewart 		    (uint8_t *)&tmp_param);
2994f8829a4aSRandall Stewart 	}			/* while */
2995f8829a4aSRandall Stewart 	/* not found! */
2996f8829a4aSRandall Stewart 	return (0);
2997f8829a4aSRandall Stewart }
2998f8829a4aSRandall Stewart 
2999f8829a4aSRandall Stewart /*
3000f8829a4aSRandall Stewart  * makes sure that the current endpoint local addr list is consistent with
3001f8829a4aSRandall Stewart  * the new association (eg. subset bound, asconf allowed) adds addresses as
3002f8829a4aSRandall Stewart  * necessary
3003f8829a4aSRandall Stewart  */
3004f8829a4aSRandall Stewart static void
3005f8829a4aSRandall Stewart sctp_check_address_list_ep(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3006f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr)
3007f8829a4aSRandall Stewart {
3008f8829a4aSRandall Stewart 	struct sctp_laddr *laddr;
3009f8829a4aSRandall Stewart 
3010f8829a4aSRandall Stewart 	/* go through the endpoint list */
3011f8829a4aSRandall Stewart 	LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
3012f8829a4aSRandall Stewart 		/* be paranoid and validate the laddr */
3013f8829a4aSRandall Stewart 		if (laddr->ifa == NULL) {
3014ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
3015ad81507eSRandall Stewart 			    "check_addr_list_ep: laddr->ifa is NULL");
3016f8829a4aSRandall Stewart 			continue;
3017f8829a4aSRandall Stewart 		}
301842551e99SRandall Stewart 		if (laddr->ifa == NULL) {
3019ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "check_addr_list_ep: laddr->ifa->ifa_addr is NULL");
3020f8829a4aSRandall Stewart 			continue;
3021f8829a4aSRandall Stewart 		}
3022f8829a4aSRandall Stewart 		/* do i have it implicitly? */
302342551e99SRandall Stewart 		if (sctp_cmpaddr(&laddr->ifa->address.sa, init_addr)) {
3024f8829a4aSRandall Stewart 			continue;
3025f8829a4aSRandall Stewart 		}
3026f8829a4aSRandall Stewart 		/* check to see if in the init-ack */
30277215cc1bSMichael Tuexen 		if (!sctp_addr_in_initack(m, offset, length, &laddr->ifa->address.sa)) {
3028f8829a4aSRandall Stewart 			/* try to add it */
3029f8829a4aSRandall Stewart 			sctp_addr_mgmt_assoc(stcb->sctp_ep, stcb, laddr->ifa,
30303232788eSRandall Stewart 			    SCTP_ADD_IP_ADDRESS, SCTP_ADDR_NOT_LOCKED);
3031f8829a4aSRandall Stewart 		}
3032f8829a4aSRandall Stewart 	}
3033f8829a4aSRandall Stewart }
3034f8829a4aSRandall Stewart 
3035f8829a4aSRandall Stewart /*
3036f8829a4aSRandall Stewart  * makes sure that the current kernel address list is consistent with the new
3037f8829a4aSRandall Stewart  * association (with all addrs bound) adds addresses as necessary
3038f8829a4aSRandall Stewart  */
3039f8829a4aSRandall Stewart static void
3040f8829a4aSRandall Stewart sctp_check_address_list_all(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3041f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr,
3042f8829a4aSRandall Stewart     uint16_t local_scope, uint16_t site_scope,
3043f8829a4aSRandall Stewart     uint16_t ipv4_scope, uint16_t loopback_scope)
3044f8829a4aSRandall Stewart {
304542551e99SRandall Stewart 	struct sctp_vrf *vrf = NULL;
304642551e99SRandall Stewart 	struct sctp_ifn *sctp_ifn;
304742551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
304842551e99SRandall Stewart 	uint32_t vrf_id;
30497215cc1bSMichael Tuexen #ifdef INET
30507215cc1bSMichael Tuexen 	struct sockaddr_in *sin;
30517215cc1bSMichael Tuexen #endif
30527215cc1bSMichael Tuexen #ifdef INET6
30537215cc1bSMichael Tuexen 	struct sockaddr_in6 *sin6;
30547215cc1bSMichael Tuexen #endif
30557215cc1bSMichael Tuexen 
3056bff64a4dSRandall Stewart 	if (stcb) {
3057bff64a4dSRandall Stewart 		vrf_id = stcb->asoc.vrf_id;
3058bff64a4dSRandall Stewart 	} else {
3059ad81507eSRandall Stewart 		return;
3060bff64a4dSRandall Stewart 	}
3061c99efcf6SRandall Stewart 	SCTP_IPI_ADDR_RLOCK();
306242551e99SRandall Stewart 	vrf = sctp_find_vrf(vrf_id);
306342551e99SRandall Stewart 	if (vrf == NULL) {
3064c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
306542551e99SRandall Stewart 		return;
306642551e99SRandall Stewart 	}
3067f8829a4aSRandall Stewart 	/* go through all our known interfaces */
306842551e99SRandall Stewart 	LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
306942551e99SRandall Stewart 		if (loopback_scope == 0 && SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
3070f8829a4aSRandall Stewart 			/* skip loopback interface */
3071f8829a4aSRandall Stewart 			continue;
3072f8829a4aSRandall Stewart 		}
3073f8829a4aSRandall Stewart 		/* go through each interface address */
307442551e99SRandall Stewart 		LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
3075f8829a4aSRandall Stewart 			/* do i have it implicitly? */
307642551e99SRandall Stewart 			if (sctp_cmpaddr(&sctp_ifa->address.sa, init_addr)) {
3077f8829a4aSRandall Stewart 				continue;
3078f8829a4aSRandall Stewart 			}
30797215cc1bSMichael Tuexen 			switch (sctp_ifa->address.sa.sa_family) {
30807215cc1bSMichael Tuexen #ifdef INET
30817215cc1bSMichael Tuexen 			case AF_INET:
308224aaac8dSMichael Tuexen 				sin = &sctp_ifa->address.sin;
30836ba22f19SMichael Tuexen 				if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
30846ba22f19SMichael Tuexen 				    &sin->sin_addr) != 0) {
30856ba22f19SMichael Tuexen 					continue;
30866ba22f19SMichael Tuexen 				}
30877215cc1bSMichael Tuexen 				if ((ipv4_scope == 0) &&
30887215cc1bSMichael Tuexen 				    (IN4_ISPRIVATE_ADDRESS(&sin->sin_addr))) {
30897215cc1bSMichael Tuexen 					/* private address not in scope */
30907215cc1bSMichael Tuexen 					continue;
30917215cc1bSMichael Tuexen 				}
30927215cc1bSMichael Tuexen 				break;
30937215cc1bSMichael Tuexen #endif
30947215cc1bSMichael Tuexen #ifdef INET6
30957215cc1bSMichael Tuexen 			case AF_INET6:
309624aaac8dSMichael Tuexen 				sin6 = &sctp_ifa->address.sin6;
30976ba22f19SMichael Tuexen 				if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
30986ba22f19SMichael Tuexen 				    &sin6->sin6_addr) != 0) {
30996ba22f19SMichael Tuexen 					continue;
31006ba22f19SMichael Tuexen 				}
31017215cc1bSMichael Tuexen 				if ((local_scope == 0) &&
31027215cc1bSMichael Tuexen 				    (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr))) {
31037215cc1bSMichael Tuexen 					continue;
31047215cc1bSMichael Tuexen 				}
31057215cc1bSMichael Tuexen 				if ((site_scope == 0) &&
31067215cc1bSMichael Tuexen 				    (IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr))) {
31077215cc1bSMichael Tuexen 					continue;
31087215cc1bSMichael Tuexen 				}
31097215cc1bSMichael Tuexen 				break;
31107215cc1bSMichael Tuexen #endif
31117215cc1bSMichael Tuexen 			default:
31127215cc1bSMichael Tuexen 				break;
31137215cc1bSMichael Tuexen 			}
3114f8829a4aSRandall Stewart 			/* check to see if in the init-ack */
31157215cc1bSMichael Tuexen 			if (!sctp_addr_in_initack(m, offset, length, &sctp_ifa->address.sa)) {
3116f8829a4aSRandall Stewart 				/* try to add it */
3117f8829a4aSRandall Stewart 				sctp_addr_mgmt_assoc(stcb->sctp_ep, stcb,
31183232788eSRandall Stewart 				    sctp_ifa, SCTP_ADD_IP_ADDRESS,
31193232788eSRandall Stewart 				    SCTP_ADDR_LOCKED);
3120f8829a4aSRandall Stewart 			}
3121f8829a4aSRandall Stewart 		}		/* end foreach ifa */
3122f8829a4aSRandall Stewart 	}			/* end foreach ifn */
3123c99efcf6SRandall Stewart 	SCTP_IPI_ADDR_RUNLOCK();
3124f8829a4aSRandall Stewart }
3125f8829a4aSRandall Stewart 
3126f8829a4aSRandall Stewart /*
3127f8829a4aSRandall Stewart  * validates an init-ack chunk (from a cookie-echo) with current addresses
3128f8829a4aSRandall Stewart  * adds addresses from the init-ack into our local address list, if needed
3129f8829a4aSRandall Stewart  * queues asconf adds/deletes addresses as needed and makes appropriate list
3130f8829a4aSRandall Stewart  * changes for source address selection m, offset: points to the start of the
3131f8829a4aSRandall Stewart  * address list in an init-ack chunk length: total length of the address
3132f8829a4aSRandall Stewart  * params only init_addr: address where my INIT-ACK was sent from
3133f8829a4aSRandall Stewart  */
3134f8829a4aSRandall Stewart void
3135f8829a4aSRandall Stewart sctp_check_address_list(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3136f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr,
3137f8829a4aSRandall Stewart     uint16_t local_scope, uint16_t site_scope,
3138f8829a4aSRandall Stewart     uint16_t ipv4_scope, uint16_t loopback_scope)
3139f8829a4aSRandall Stewart {
3140f8829a4aSRandall Stewart 	/* process the local addresses in the initack */
3141f8829a4aSRandall Stewart 	sctp_process_initack_addresses(stcb, m, offset, length);
3142f8829a4aSRandall Stewart 
3143f8829a4aSRandall Stewart 	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
3144f8829a4aSRandall Stewart 		/* bound all case */
3145f8829a4aSRandall Stewart 		sctp_check_address_list_all(stcb, m, offset, length, init_addr,
3146f8829a4aSRandall Stewart 		    local_scope, site_scope, ipv4_scope, loopback_scope);
3147f8829a4aSRandall Stewart 	} else {
3148f8829a4aSRandall Stewart 		/* subset bound case */
3149f8829a4aSRandall Stewart 		if (sctp_is_feature_on(stcb->sctp_ep,
3150f8829a4aSRandall Stewart 		    SCTP_PCB_FLAGS_DO_ASCONF)) {
3151f8829a4aSRandall Stewart 			/* asconf's allowed */
3152f8829a4aSRandall Stewart 			sctp_check_address_list_ep(stcb, m, offset, length,
3153f8829a4aSRandall Stewart 			    init_addr);
3154f8829a4aSRandall Stewart 		}
3155f8829a4aSRandall Stewart 		/* else, no asconfs allowed, so what we sent is what we get */
3156f8829a4aSRandall Stewart 	}
3157f8829a4aSRandall Stewart }
3158f8829a4aSRandall Stewart 
3159f8829a4aSRandall Stewart /*
3160f8829a4aSRandall Stewart  * sctp_bindx() support
3161f8829a4aSRandall Stewart  */
3162f8829a4aSRandall Stewart uint32_t
31633c503c28SRandall Stewart sctp_addr_mgmt_ep_sa(struct sctp_inpcb *inp, struct sockaddr *sa,
3164b0471b4bSMichael Tuexen     uint32_t type, uint32_t vrf_id, struct sctp_ifa *sctp_ifap)
3165b0471b4bSMichael Tuexen {
316642551e99SRandall Stewart 	struct sctp_ifa *ifa;
31672678fe1eSMichael Tuexen 	struct sctp_laddr *laddr, *nladdr;
3168f8829a4aSRandall Stewart 
316942551e99SRandall Stewart 	if (sa->sa_len == 0) {
3170c4739e2fSRandall Stewart 		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EINVAL);
3171f8829a4aSRandall Stewart 		return (EINVAL);
317242551e99SRandall Stewart 	}
317380fefe0aSRandall Stewart 	if (sctp_ifap) {
317480fefe0aSRandall Stewart 		ifa = sctp_ifap;
317580fefe0aSRandall Stewart 	} else if (type == SCTP_ADD_IP_ADDRESS) {
317642551e99SRandall Stewart 		/* For an add the address MUST be on the system */
3177851b7298SRandall Stewart 		ifa = sctp_find_ifa_by_addr(sa, vrf_id, SCTP_ADDR_NOT_LOCKED);
317842551e99SRandall Stewart 	} else if (type == SCTP_DEL_IP_ADDRESS) {
317942551e99SRandall Stewart 		/* For a delete we need to find it in the inp */
3180851b7298SRandall Stewart 		ifa = sctp_find_ifa_in_ep(inp, sa, SCTP_ADDR_NOT_LOCKED);
318142551e99SRandall Stewart 	} else {
318242551e99SRandall Stewart 		ifa = NULL;
318342551e99SRandall Stewart 	}
3184f8829a4aSRandall Stewart 	if (ifa != NULL) {
318542551e99SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
318642551e99SRandall Stewart 			sctp_add_local_addr_ep(inp, ifa, type);
318742551e99SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
31883c503c28SRandall Stewart 			if (inp->laddr_count < 2) {
31893c503c28SRandall Stewart 				/* can't delete the last local address */
3190c4739e2fSRandall Stewart 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EINVAL);
31913c503c28SRandall Stewart 				return (EINVAL);
31923c503c28SRandall Stewart 			}
31933c503c28SRandall Stewart 			LIST_FOREACH(laddr, &inp->sctp_addr_list,
31943c503c28SRandall Stewart 			    sctp_nxt_addr) {
319542551e99SRandall Stewart 				if (ifa == laddr->ifa) {
319642551e99SRandall Stewart 					/* Mark in the delete */
319742551e99SRandall Stewart 					laddr->action = type;
319842551e99SRandall Stewart 				}
319942551e99SRandall Stewart 			}
320042551e99SRandall Stewart 		}
32012678fe1eSMichael Tuexen 		if (LIST_EMPTY(&inp->sctp_asoc_list)) {
320287b4fcd3SMichael Tuexen 			/*
320387b4fcd3SMichael Tuexen 			 * There is no need to start the iterator if the inp
320487b4fcd3SMichael Tuexen 			 * has no associations.
320587b4fcd3SMichael Tuexen 			 */
32062678fe1eSMichael Tuexen 			if (type == SCTP_DEL_IP_ADDRESS) {
32072678fe1eSMichael Tuexen 				LIST_FOREACH_SAFE(laddr, &inp->sctp_addr_list, sctp_nxt_addr, nladdr) {
32082678fe1eSMichael Tuexen 					if (laddr->ifa == ifa) {
32092678fe1eSMichael Tuexen 						sctp_del_local_addr_ep(inp, ifa);
32102678fe1eSMichael Tuexen 					}
32112678fe1eSMichael Tuexen 				}
32122678fe1eSMichael Tuexen 			}
32132678fe1eSMichael Tuexen 		} else {
321487b4fcd3SMichael Tuexen 			struct sctp_asconf_iterator *asc;
321587b4fcd3SMichael Tuexen 			struct sctp_laddr *wi;
32162b1c7de4SMichael Tuexen 			int ret;
321787b4fcd3SMichael Tuexen 
321887b4fcd3SMichael Tuexen 			SCTP_MALLOC(asc, struct sctp_asconf_iterator *,
321987b4fcd3SMichael Tuexen 			    sizeof(struct sctp_asconf_iterator),
322087b4fcd3SMichael Tuexen 			    SCTP_M_ASC_IT);
322187b4fcd3SMichael Tuexen 			if (asc == NULL) {
322287b4fcd3SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, ENOMEM);
322387b4fcd3SMichael Tuexen 				return (ENOMEM);
322487b4fcd3SMichael Tuexen 			}
322587b4fcd3SMichael Tuexen 			wi = SCTP_ZONE_GET(SCTP_BASE_INFO(ipi_zone_laddr), struct sctp_laddr);
322687b4fcd3SMichael Tuexen 			if (wi == NULL) {
322787b4fcd3SMichael Tuexen 				SCTP_FREE(asc, SCTP_M_ASC_IT);
322887b4fcd3SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, ENOMEM);
322987b4fcd3SMichael Tuexen 				return (ENOMEM);
323087b4fcd3SMichael Tuexen 			}
323142551e99SRandall Stewart 			LIST_INIT(&asc->list_of_work);
323242551e99SRandall Stewart 			asc->cnt = 1;
323342551e99SRandall Stewart 			SCTP_INCR_LADDR_COUNT();
323442551e99SRandall Stewart 			wi->ifa = ifa;
323542551e99SRandall Stewart 			wi->action = type;
323642551e99SRandall Stewart 			atomic_add_int(&ifa->refcount, 1);
323742551e99SRandall Stewart 			LIST_INSERT_HEAD(&asc->list_of_work, wi, sctp_nxt_addr);
32382b1c7de4SMichael Tuexen 			ret = sctp_initiate_iterator(sctp_asconf_iterator_ep,
32391b649582SRandall Stewart 			    sctp_asconf_iterator_stcb,
32401b649582SRandall Stewart 			    sctp_asconf_iterator_ep_end,
324142551e99SRandall Stewart 			    SCTP_PCB_ANY_FLAGS,
32423c503c28SRandall Stewart 			    SCTP_PCB_ANY_FEATURES,
32431b649582SRandall Stewart 			    SCTP_ASOC_ANY_STATE,
32441b649582SRandall Stewart 			    (void *)asc, 0,
32451b649582SRandall Stewart 			    sctp_asconf_iterator_end, inp, 0);
32462b1c7de4SMichael Tuexen 			if (ret) {
32472b1c7de4SMichael Tuexen 				SCTP_PRINTF("Failed to initiate iterator for addr_mgmt_ep_sa\n");
32482b1c7de4SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EFAULT);
32492b1c7de4SMichael Tuexen 				sctp_asconf_iterator_end(asc, 0);
32502b1c7de4SMichael Tuexen 				return (EFAULT);
32512b1c7de4SMichael Tuexen 			}
325287b4fcd3SMichael Tuexen 		}
325387b4fcd3SMichael Tuexen 		return (0);
3254f8829a4aSRandall Stewart 	} else {
3255f8829a4aSRandall Stewart 		/* invalid address! */
3256c4739e2fSRandall Stewart 		SCTP_LTRACE_ERR_RET(NULL, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EADDRNOTAVAIL);
3257f8829a4aSRandall Stewart 		return (EADDRNOTAVAIL);
3258f8829a4aSRandall Stewart 	}
3259f8829a4aSRandall Stewart }
3260830d754dSRandall Stewart 
3261830d754dSRandall Stewart void
3262830d754dSRandall Stewart sctp_asconf_send_nat_state_update(struct sctp_tcb *stcb,
3263830d754dSRandall Stewart     struct sctp_nets *net)
3264830d754dSRandall Stewart {
3265830d754dSRandall Stewart 	struct sctp_asconf_addr *aa;
3266830d754dSRandall Stewart 	struct sctp_ifa *sctp_ifap;
3267830d754dSRandall Stewart 	struct sctp_asconf_tag_param *vtag;
3268e6194c2eSMichael Tuexen #ifdef INET
3269830d754dSRandall Stewart 	struct sockaddr_in *to;
3270e6194c2eSMichael Tuexen #endif
3271830d754dSRandall Stewart #ifdef INET6
3272830d754dSRandall Stewart 	struct sockaddr_in6 *to6;
3273830d754dSRandall Stewart #endif
3274830d754dSRandall Stewart 	if (net == NULL) {
3275830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "sctp_asconf_send_nat_state_update: Missing net\n");
3276830d754dSRandall Stewart 		return;
3277830d754dSRandall Stewart 	}
3278830d754dSRandall Stewart 	if (stcb == NULL) {
3279830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "sctp_asconf_send_nat_state_update: Missing stcb\n");
3280830d754dSRandall Stewart 		return;
3281830d754dSRandall Stewart 	}
3282830d754dSRandall Stewart 	/*
3283830d754dSRandall Stewart 	 * Need to have in the asconf: - vtagparam(my_vtag/peer_vtag) -
3284830d754dSRandall Stewart 	 * add(0.0.0.0) - del(0.0.0.0) - Any global addresses add(addr)
3285830d754dSRandall Stewart 	 */
3286830d754dSRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
3287830d754dSRandall Stewart 	    SCTP_M_ASC_ADDR);
3288830d754dSRandall Stewart 	if (aa == NULL) {
3289830d754dSRandall Stewart 		/* didn't get memory */
3290830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
3291830d754dSRandall Stewart 		    "sctp_asconf_send_nat_state_update: failed to get memory!\n");
3292830d754dSRandall Stewart 		return;
3293830d754dSRandall Stewart 	}
3294830d754dSRandall Stewart 	aa->special_del = 0;
3295830d754dSRandall Stewart 	/* fill in asconf address parameter fields */
3296830d754dSRandall Stewart 	/* top level elements are "networked" during send */
3297830d754dSRandall Stewart 	aa->ifa = NULL;
3298830d754dSRandall Stewart 	aa->sent = 0;		/* clear sent flag */
3299830d754dSRandall Stewart 	vtag = (struct sctp_asconf_tag_param *)&aa->ap.aph;
3300830d754dSRandall Stewart 	vtag->aph.ph.param_type = SCTP_NAT_VTAGS;
3301830d754dSRandall Stewart 	vtag->aph.ph.param_length = sizeof(struct sctp_asconf_tag_param);
3302830d754dSRandall Stewart 	vtag->local_vtag = htonl(stcb->asoc.my_vtag);
3303830d754dSRandall Stewart 	vtag->remote_vtag = htonl(stcb->asoc.peer_vtag);
3304830d754dSRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3305830d754dSRandall Stewart 
3306830d754dSRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
3307830d754dSRandall Stewart 	    SCTP_M_ASC_ADDR);
3308830d754dSRandall Stewart 	if (aa == NULL) {
3309830d754dSRandall Stewart 		/* didn't get memory */
3310830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
3311830d754dSRandall Stewart 		    "sctp_asconf_send_nat_state_update: failed to get memory!\n");
3312830d754dSRandall Stewart 		return;
3313830d754dSRandall Stewart 	}
3314830d754dSRandall Stewart 	memset(aa, 0, sizeof(struct sctp_asconf_addr));
3315830d754dSRandall Stewart 	/* fill in asconf address parameter fields */
3316830d754dSRandall Stewart 	/* ADD(0.0.0.0) */
3317e6194c2eSMichael Tuexen 	switch (net->ro._l_addr.sa.sa_family) {
3318e6194c2eSMichael Tuexen #ifdef INET
3319e6194c2eSMichael Tuexen 	case AF_INET:
3320830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_ADD_IP_ADDRESS;
3321830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addrv4_param);
3322830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
3323830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv4addr_param);
3324830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3325830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3326e6194c2eSMichael Tuexen 		break;
3327e6194c2eSMichael Tuexen #endif
3328830d754dSRandall Stewart #ifdef INET6
3329e6194c2eSMichael Tuexen 	case AF_INET6:
3330830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_ADD_IP_ADDRESS;
3331830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addr_param);
3332830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
3333830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv6addr_param);
3334830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3335830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3336e6194c2eSMichael Tuexen 		break;
3337e6194c2eSMichael Tuexen #endif
33383ff78fbbSMichael Tuexen 	default:
33393ff78fbbSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1,
33403ff78fbbSMichael Tuexen 		    "sctp_asconf_send_nat_state_update: unknown address family\n");
33413ff78fbbSMichael Tuexen 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
33423ff78fbbSMichael Tuexen 		return;
3343830d754dSRandall Stewart 	}
3344830d754dSRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
3345830d754dSRandall Stewart 	    SCTP_M_ASC_ADDR);
3346830d754dSRandall Stewart 	if (aa == NULL) {
3347830d754dSRandall Stewart 		/* didn't get memory */
3348830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
3349830d754dSRandall Stewart 		    "sctp_asconf_send_nat_state_update: failed to get memory!\n");
3350830d754dSRandall Stewart 		return;
3351830d754dSRandall Stewart 	}
3352830d754dSRandall Stewart 	memset(aa, 0, sizeof(struct sctp_asconf_addr));
3353830d754dSRandall Stewart 	/* fill in asconf address parameter fields */
3354830d754dSRandall Stewart 	/* ADD(0.0.0.0) */
3355e6194c2eSMichael Tuexen 	switch (net->ro._l_addr.sa.sa_family) {
3356e6194c2eSMichael Tuexen #ifdef INET
3357e6194c2eSMichael Tuexen 	case AF_INET:
3358830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_ADD_IP_ADDRESS;
3359830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addrv4_param);
3360830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
3361830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv4addr_param);
3362830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3363830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3364e6194c2eSMichael Tuexen 		break;
3365e6194c2eSMichael Tuexen #endif
3366830d754dSRandall Stewart #ifdef INET6
3367e6194c2eSMichael Tuexen 	case AF_INET6:
3368830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_DEL_IP_ADDRESS;
3369830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addr_param);
3370830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
3371830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv6addr_param);
3372830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3373830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3374e6194c2eSMichael Tuexen 		break;
3375e6194c2eSMichael Tuexen #endif
33763ff78fbbSMichael Tuexen 	default:
33773ff78fbbSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1,
33783ff78fbbSMichael Tuexen 		    "sctp_asconf_send_nat_state_update: unknown address family\n");
33793ff78fbbSMichael Tuexen 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
33803ff78fbbSMichael Tuexen 		return;
3381830d754dSRandall Stewart 	}
3382830d754dSRandall Stewart 	/* Now we must hunt the addresses and add all global addresses */
3383830d754dSRandall Stewart 	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
3384830d754dSRandall Stewart 		struct sctp_vrf *vrf = NULL;
3385830d754dSRandall Stewart 		struct sctp_ifn *sctp_ifnp;
3386830d754dSRandall Stewart 		uint32_t vrf_id;
3387830d754dSRandall Stewart 
3388830d754dSRandall Stewart 		vrf_id = stcb->sctp_ep->def_vrf_id;
3389830d754dSRandall Stewart 		vrf = sctp_find_vrf(vrf_id);
3390830d754dSRandall Stewart 		if (vrf == NULL) {
3391830d754dSRandall Stewart 			goto skip_rest;
3392830d754dSRandall Stewart 		}
33930053ed28SMichael Tuexen 
3394830d754dSRandall Stewart 		SCTP_IPI_ADDR_RLOCK();
3395830d754dSRandall Stewart 		LIST_FOREACH(sctp_ifnp, &vrf->ifnlist, next_ifn) {
3396830d754dSRandall Stewart 			LIST_FOREACH(sctp_ifap, &sctp_ifnp->ifalist, next_ifa) {
3397e6194c2eSMichael Tuexen 				switch (sctp_ifap->address.sa.sa_family) {
3398e6194c2eSMichael Tuexen #ifdef INET
3399e6194c2eSMichael Tuexen 				case AF_INET:
3400830d754dSRandall Stewart 					to = &sctp_ifap->address.sin;
34016ba22f19SMichael Tuexen 					if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
34026ba22f19SMichael Tuexen 					    &to->sin_addr) != 0) {
34036ba22f19SMichael Tuexen 						continue;
34046ba22f19SMichael Tuexen 					}
3405830d754dSRandall Stewart 					if (IN4_ISPRIVATE_ADDRESS(&to->sin_addr)) {
3406830d754dSRandall Stewart 						continue;
3407830d754dSRandall Stewart 					}
3408830d754dSRandall Stewart 					if (IN4_ISLOOPBACK_ADDRESS(&to->sin_addr)) {
3409830d754dSRandall Stewart 						continue;
3410830d754dSRandall Stewart 					}
3411e6194c2eSMichael Tuexen 					break;
3412e6194c2eSMichael Tuexen #endif
3413830d754dSRandall Stewart #ifdef INET6
3414e6194c2eSMichael Tuexen 				case AF_INET6:
3415830d754dSRandall Stewart 					to6 = &sctp_ifap->address.sin6;
34166ba22f19SMichael Tuexen 					if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
34176ba22f19SMichael Tuexen 					    &to6->sin6_addr) != 0) {
34186ba22f19SMichael Tuexen 						continue;
34196ba22f19SMichael Tuexen 					}
3420830d754dSRandall Stewart 					if (IN6_IS_ADDR_LOOPBACK(&to6->sin6_addr)) {
3421830d754dSRandall Stewart 						continue;
3422830d754dSRandall Stewart 					}
3423830d754dSRandall Stewart 					if (IN6_IS_ADDR_LINKLOCAL(&to6->sin6_addr)) {
3424830d754dSRandall Stewart 						continue;
3425830d754dSRandall Stewart 					}
3426e6194c2eSMichael Tuexen 					break;
3427830d754dSRandall Stewart #endif
3428e6194c2eSMichael Tuexen 				default:
3429e6194c2eSMichael Tuexen 					continue;
3430e6194c2eSMichael Tuexen 				}
3431830d754dSRandall Stewart 				sctp_asconf_queue_mgmt(stcb, sctp_ifap, SCTP_ADD_IP_ADDRESS);
3432830d754dSRandall Stewart 			}
3433830d754dSRandall Stewart 		}
3434830d754dSRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
3435830d754dSRandall Stewart 	} else {
3436830d754dSRandall Stewart 		struct sctp_laddr *laddr;
3437830d754dSRandall Stewart 
3438830d754dSRandall Stewart 		LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
3439830d754dSRandall Stewart 			if (laddr->ifa == NULL) {
3440830d754dSRandall Stewart 				continue;
3441830d754dSRandall Stewart 			}
3442830d754dSRandall Stewart 			if (laddr->ifa->localifa_flags & SCTP_BEING_DELETED)
3443830d754dSRandall Stewart 				/*
3444830d754dSRandall Stewart 				 * Address being deleted by the system, dont
3445830d754dSRandall Stewart 				 * list.
3446830d754dSRandall Stewart 				 */
3447830d754dSRandall Stewart 				continue;
3448830d754dSRandall Stewart 			if (laddr->action == SCTP_DEL_IP_ADDRESS) {
3449830d754dSRandall Stewart 				/*
3450830d754dSRandall Stewart 				 * Address being deleted on this ep don't
3451830d754dSRandall Stewart 				 * list.
3452830d754dSRandall Stewart 				 */
3453830d754dSRandall Stewart 				continue;
3454830d754dSRandall Stewart 			}
3455830d754dSRandall Stewart 			sctp_ifap = laddr->ifa;
3456e6194c2eSMichael Tuexen 			switch (sctp_ifap->address.sa.sa_family) {
3457e6194c2eSMichael Tuexen #ifdef INET
3458e6194c2eSMichael Tuexen 			case AF_INET:
3459830d754dSRandall Stewart 				to = &sctp_ifap->address.sin;
3460830d754dSRandall Stewart 				if (IN4_ISPRIVATE_ADDRESS(&to->sin_addr)) {
3461830d754dSRandall Stewart 					continue;
3462830d754dSRandall Stewart 				}
3463830d754dSRandall Stewart 				if (IN4_ISLOOPBACK_ADDRESS(&to->sin_addr)) {
3464830d754dSRandall Stewart 					continue;
3465830d754dSRandall Stewart 				}
3466e6194c2eSMichael Tuexen 				break;
3467e6194c2eSMichael Tuexen #endif
3468830d754dSRandall Stewart #ifdef INET6
3469e6194c2eSMichael Tuexen 			case AF_INET6:
3470830d754dSRandall Stewart 				to6 = &sctp_ifap->address.sin6;
3471830d754dSRandall Stewart 				if (IN6_IS_ADDR_LOOPBACK(&to6->sin6_addr)) {
3472830d754dSRandall Stewart 					continue;
3473830d754dSRandall Stewart 				}
3474830d754dSRandall Stewart 				if (IN6_IS_ADDR_LINKLOCAL(&to6->sin6_addr)) {
3475830d754dSRandall Stewart 					continue;
3476830d754dSRandall Stewart 				}
3477e6194c2eSMichael Tuexen 				break;
3478830d754dSRandall Stewart #endif
3479e6194c2eSMichael Tuexen 			default:
3480e6194c2eSMichael Tuexen 				continue;
3481e6194c2eSMichael Tuexen 			}
3482830d754dSRandall Stewart 			sctp_asconf_queue_mgmt(stcb, sctp_ifap, SCTP_ADD_IP_ADDRESS);
3483830d754dSRandall Stewart 		}
3484830d754dSRandall Stewart 	}
3485830d754dSRandall Stewart skip_rest:
3486830d754dSRandall Stewart 	/* Now we must send the asconf into the queue */
3487ca85e948SMichael Tuexen 	sctp_send_asconf(stcb, net, SCTP_ADDR_NOT_LOCKED);
3488830d754dSRandall Stewart }
3489