xref: /freebsd/sys/netinet/sctp_asconf.c (revision e6b3bd22d8eff48799c344b6a9225ca2a06be994)
1f8829a4aSRandall Stewart /*-
251369649SPedro F. Giffuni  * SPDX-License-Identifier: BSD-3-Clause
351369649SPedro F. Giffuni  *
4b1006367SRandall Stewart  * Copyright (c) 2001-2007, by Cisco Systems, Inc. All rights reserved.
5807aad63SMichael Tuexen  * Copyright (c) 2008-2012, by Randall Stewart. All rights reserved.
6807aad63SMichael Tuexen  * Copyright (c) 2008-2012, by Michael Tuexen. All rights reserved.
7f8829a4aSRandall Stewart  *
8f8829a4aSRandall Stewart  * Redistribution and use in source and binary forms, with or without
9f8829a4aSRandall Stewart  * modification, are permitted provided that the following conditions are met:
10f8829a4aSRandall Stewart  *
11f8829a4aSRandall Stewart  * a) Redistributions of source code must retain the above copyright notice,
12f8829a4aSRandall Stewart  *    this list of conditions and the following disclaimer.
13f8829a4aSRandall Stewart  *
14f8829a4aSRandall Stewart  * b) Redistributions in binary form must reproduce the above copyright
15f8829a4aSRandall Stewart  *    notice, this list of conditions and the following disclaimer in
16f8829a4aSRandall Stewart  *    the documentation and/or other materials provided with the distribution.
17f8829a4aSRandall Stewart  *
18f8829a4aSRandall Stewart  * c) Neither the name of Cisco Systems, Inc. nor the names of its
19f8829a4aSRandall Stewart  *    contributors may be used to endorse or promote products derived
20f8829a4aSRandall Stewart  *    from this software without specific prior written permission.
21f8829a4aSRandall Stewart  *
22f8829a4aSRandall Stewart  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
23f8829a4aSRandall Stewart  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
24f8829a4aSRandall Stewart  * THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
25f8829a4aSRandall Stewart  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT OWNER OR CONTRIBUTORS BE
26f8829a4aSRandall Stewart  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
27f8829a4aSRandall Stewart  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
28f8829a4aSRandall Stewart  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
29f8829a4aSRandall Stewart  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
30f8829a4aSRandall Stewart  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
31f8829a4aSRandall Stewart  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF
32f8829a4aSRandall Stewart  * THE POSSIBILITY OF SUCH DAMAGE.
33f8829a4aSRandall Stewart  */
34f8829a4aSRandall Stewart 
35f8829a4aSRandall Stewart #include <sys/cdefs.h>
36cef8ad06SRandall Stewart __FBSDID("$FreeBSD$");
37807aad63SMichael Tuexen 
38f8829a4aSRandall Stewart #include <netinet/sctp_os.h>
39f8829a4aSRandall Stewart #include <netinet/sctp_var.h>
4042551e99SRandall Stewart #include <netinet/sctp_sysctl.h>
41f8829a4aSRandall Stewart #include <netinet/sctp_pcb.h>
42f8829a4aSRandall Stewart #include <netinet/sctp_header.h>
43f8829a4aSRandall Stewart #include <netinet/sctputil.h>
44f8829a4aSRandall Stewart #include <netinet/sctp_output.h>
45f8829a4aSRandall Stewart #include <netinet/sctp_asconf.h>
46851b7298SRandall Stewart #include <netinet/sctp_timer.h>
47f8829a4aSRandall Stewart 
48f8829a4aSRandall Stewart /*
49f8829a4aSRandall Stewart  * debug flags:
50f8829a4aSRandall Stewart  * SCTP_DEBUG_ASCONF1: protocol info, general info and errors
51f8829a4aSRandall Stewart  * SCTP_DEBUG_ASCONF2: detailed info
52f8829a4aSRandall Stewart  */
53f8829a4aSRandall Stewart 
54f8829a4aSRandall Stewart 
55f8829a4aSRandall Stewart /*
56b1754ad1SMichael Tuexen  * RFC 5061
57f8829a4aSRandall Stewart  *
58f8829a4aSRandall Stewart  * An ASCONF parameter queue exists per asoc which holds the pending address
59f8829a4aSRandall Stewart  * operations.  Lists are updated upon receipt of ASCONF-ACK.
60f8829a4aSRandall Stewart  *
6118e198d3SRandall Stewart  * A restricted_addrs list exists per assoc to hold local addresses that are
6218e198d3SRandall Stewart  * not (yet) usable by the assoc as a source address.  These addresses are
6318e198d3SRandall Stewart  * either pending an ASCONF operation (and exist on the ASCONF parameter
6418e198d3SRandall Stewart  * queue), or they are permanently restricted (the peer has returned an
6518e198d3SRandall Stewart  * ERROR indication to an ASCONF(ADD), or the peer does not support ASCONF).
6618e198d3SRandall Stewart  *
67f8829a4aSRandall Stewart  * Deleted addresses are always immediately removed from the lists as they will
68f8829a4aSRandall Stewart  * (shortly) no longer exist in the kernel.  We send ASCONFs as a courtesy,
69f8829a4aSRandall Stewart  * only if allowed.
70f8829a4aSRandall Stewart  */
71f8829a4aSRandall Stewart 
72f8829a4aSRandall Stewart /*
7318e198d3SRandall Stewart  * ASCONF parameter processing.
7418e198d3SRandall Stewart  * response_required: set if a reply is required (eg. SUCCESS_REPORT).
7518e198d3SRandall Stewart  * returns a mbuf to an "error" response parameter or NULL/"success" if ok.
7618e198d3SRandall Stewart  * FIX: allocating this many mbufs on the fly is pretty inefficient...
77f8829a4aSRandall Stewart  */
78f8829a4aSRandall Stewart static struct mbuf *
79f8829a4aSRandall Stewart sctp_asconf_success_response(uint32_t id)
80f8829a4aSRandall Stewart {
81f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
82f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
83f8829a4aSRandall Stewart 
84f8829a4aSRandall Stewart 	m_reply = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_paramhdr),
85eb1b1807SGleb Smirnoff 	    0, M_NOWAIT, 1, MT_DATA);
86f8829a4aSRandall Stewart 	if (m_reply == NULL) {
87ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
88ad81507eSRandall Stewart 		    "asconf_success_response: couldn't get mbuf!\n");
8960990c0cSMichael Tuexen 		return (NULL);
90f8829a4aSRandall Stewart 	}
91f8829a4aSRandall Stewart 	aph = mtod(m_reply, struct sctp_asconf_paramhdr *);
92f8829a4aSRandall Stewart 	aph->correlation_id = id;
93f8829a4aSRandall Stewart 	aph->ph.param_type = htons(SCTP_SUCCESS_REPORT);
94f8829a4aSRandall Stewart 	aph->ph.param_length = sizeof(struct sctp_asconf_paramhdr);
95139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_reply) = aph->ph.param_length;
96f8829a4aSRandall Stewart 	aph->ph.param_length = htons(aph->ph.param_length);
97f8829a4aSRandall Stewart 
9860990c0cSMichael Tuexen 	return (m_reply);
99f8829a4aSRandall Stewart }
100f8829a4aSRandall Stewart 
101f8829a4aSRandall Stewart static struct mbuf *
102f8829a4aSRandall Stewart sctp_asconf_error_response(uint32_t id, uint16_t cause, uint8_t *error_tlv,
103f8829a4aSRandall Stewart     uint16_t tlv_length)
104f8829a4aSRandall Stewart {
105f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
106f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
107f8829a4aSRandall Stewart 	struct sctp_error_cause *error;
108f8829a4aSRandall Stewart 	uint8_t *tlv;
109f8829a4aSRandall Stewart 
110f8829a4aSRandall Stewart 	m_reply = sctp_get_mbuf_for_msg((sizeof(struct sctp_asconf_paramhdr) +
111f8829a4aSRandall Stewart 	    tlv_length +
112f8829a4aSRandall Stewart 	    sizeof(struct sctp_error_cause)),
113eb1b1807SGleb Smirnoff 	    0, M_NOWAIT, 1, MT_DATA);
114f8829a4aSRandall Stewart 	if (m_reply == NULL) {
115ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
116ad81507eSRandall Stewart 		    "asconf_error_response: couldn't get mbuf!\n");
11760990c0cSMichael Tuexen 		return (NULL);
118f8829a4aSRandall Stewart 	}
119f8829a4aSRandall Stewart 	aph = mtod(m_reply, struct sctp_asconf_paramhdr *);
120f8829a4aSRandall Stewart 	error = (struct sctp_error_cause *)(aph + 1);
121f8829a4aSRandall Stewart 
122f8829a4aSRandall Stewart 	aph->correlation_id = id;
123f8829a4aSRandall Stewart 	aph->ph.param_type = htons(SCTP_ERROR_CAUSE_IND);
124f8829a4aSRandall Stewart 	error->code = htons(cause);
125f8829a4aSRandall Stewart 	error->length = tlv_length + sizeof(struct sctp_error_cause);
126f8829a4aSRandall Stewart 	aph->ph.param_length = error->length +
127f8829a4aSRandall Stewart 	    sizeof(struct sctp_asconf_paramhdr);
128f8829a4aSRandall Stewart 
129f8829a4aSRandall Stewart 	if (aph->ph.param_length > MLEN) {
130ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
131ad81507eSRandall Stewart 		    "asconf_error_response: tlv_length (%xh) too big\n",
132f8829a4aSRandall Stewart 		    tlv_length);
133f8829a4aSRandall Stewart 		sctp_m_freem(m_reply);	/* discard */
13460990c0cSMichael Tuexen 		return (NULL);
135f8829a4aSRandall Stewart 	}
136f8829a4aSRandall Stewart 	if (error_tlv != NULL) {
137f8829a4aSRandall Stewart 		tlv = (uint8_t *)(error + 1);
138f8829a4aSRandall Stewart 		memcpy(tlv, error_tlv, tlv_length);
139f8829a4aSRandall Stewart 	}
140139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_reply) = aph->ph.param_length;
141f8829a4aSRandall Stewart 	error->length = htons(error->length);
142f8829a4aSRandall Stewart 	aph->ph.param_length = htons(aph->ph.param_length);
143f8829a4aSRandall Stewart 
14460990c0cSMichael Tuexen 	return (m_reply);
145f8829a4aSRandall Stewart }
146f8829a4aSRandall Stewart 
147f8829a4aSRandall Stewart static struct mbuf *
148b1754ad1SMichael Tuexen sctp_process_asconf_add_ip(struct sockaddr *src, struct sctp_asconf_paramhdr *aph,
149ca85e948SMichael Tuexen     struct sctp_tcb *stcb, int send_hb, int response_required)
150f8829a4aSRandall Stewart {
151ca85e948SMichael Tuexen 	struct sctp_nets *net;
152f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
15324aaac8dSMichael Tuexen 	union sctp_sockstore store;
154e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
155b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
156b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
157b54ddf22SMichael Tuexen 	uint16_t param_length;
158b54ddf22SMichael Tuexen #endif
159f8829a4aSRandall Stewart 	struct sockaddr *sa;
160f8829a4aSRandall Stewart 	int zero_address = 0;
16192776dfdSMichael Tuexen 	int bad_address = 0;
162e6194c2eSMichael Tuexen #ifdef INET
163e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
164e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
165e6194c2eSMichael Tuexen #endif
166f8829a4aSRandall Stewart #ifdef INET6
167f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
168f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
169e6194c2eSMichael Tuexen #endif
170f8829a4aSRandall Stewart 
171f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
172e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
173e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
174b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
175e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
176b54ddf22SMichael Tuexen #endif
17724aaac8dSMichael Tuexen 	sa = &store.sa;
178f8829a4aSRandall Stewart 	switch (param_type) {
179e6194c2eSMichael Tuexen #ifdef INET
180f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
181f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
182f8829a4aSRandall Stewart 			/* invalid param size */
18360990c0cSMichael Tuexen 			return (NULL);
184f8829a4aSRandall Stewart 		}
185e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
18624aaac8dSMichael Tuexen 		sin = &store.sin;
1875ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
188f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
189f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
190f8829a4aSRandall Stewart 		sin->sin_port = stcb->rport;
191f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
19292776dfdSMichael Tuexen 		if ((sin->sin_addr.s_addr == INADDR_BROADCAST) ||
19392776dfdSMichael Tuexen 		    IN_MULTICAST(ntohl(sin->sin_addr.s_addr))) {
1943657c405SMichael Tuexen 			bad_address = 1;
19592776dfdSMichael Tuexen 		}
196f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
197f8829a4aSRandall Stewart 			zero_address = 1;
198ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_add_ip: adding ");
199ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
200f8829a4aSRandall Stewart 		break;
201e6194c2eSMichael Tuexen #endif
202f8829a4aSRandall Stewart #ifdef INET6
203e6194c2eSMichael Tuexen 	case SCTP_IPV6_ADDRESS:
204f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
205f8829a4aSRandall Stewart 			/* invalid param size */
20660990c0cSMichael Tuexen 			return (NULL);
207f8829a4aSRandall Stewart 		}
208e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
20924aaac8dSMichael Tuexen 		sin6 = &store.sin6;
2105ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
211f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
212f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
213f8829a4aSRandall Stewart 		sin6->sin6_port = stcb->rport;
214f8829a4aSRandall Stewart 		memcpy((caddr_t)&sin6->sin6_addr, v6addr->addr,
215f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
21692776dfdSMichael Tuexen 		if (IN6_IS_ADDR_MULTICAST(&sin6->sin6_addr)) {
21792776dfdSMichael Tuexen 			bad_address = 1;
21892776dfdSMichael Tuexen 		}
219f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
220f8829a4aSRandall Stewart 			zero_address = 1;
221ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_add_ip: adding ");
222ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
223f8829a4aSRandall Stewart 		break;
224e6194c2eSMichael Tuexen #endif
225f8829a4aSRandall Stewart 	default:
226f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
22792776dfdSMichael Tuexen 		    SCTP_CAUSE_INVALID_PARAM, (uint8_t *)aph,
228f8829a4aSRandall Stewart 		    aparam_length);
22960990c0cSMichael Tuexen 		return (m_reply);
230f8829a4aSRandall Stewart 	}			/* end switch */
231f8829a4aSRandall Stewart 
232f8829a4aSRandall Stewart 	/* if 0.0.0.0/::0, add the source address instead */
233b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
234b1754ad1SMichael Tuexen 		sa = src;
235ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
236ad81507eSRandall Stewart 		    "process_asconf_add_ip: using source addr ");
237b1754ad1SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
238f8829a4aSRandall Stewart 	}
239f8829a4aSRandall Stewart 	/* add the address */
24092776dfdSMichael Tuexen 	if (bad_address) {
24192776dfdSMichael Tuexen 		m_reply = sctp_asconf_error_response(aph->correlation_id,
24292776dfdSMichael Tuexen 		    SCTP_CAUSE_INVALID_PARAM, (uint8_t *)aph,
24392776dfdSMichael Tuexen 		    aparam_length);
2447154bf4aSMichael Tuexen 	} else if (sctp_add_remote_addr(stcb, sa, &net, stcb->asoc.port,
2457154bf4aSMichael Tuexen 		    SCTP_DONOT_SETSCOPE,
246a5d547adSRandall Stewart 	    SCTP_ADDR_DYNAMIC_ADDED) != 0) {
247ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
248ad81507eSRandall Stewart 		    "process_asconf_add_ip: error adding address\n");
249f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
250f8829a4aSRandall Stewart 		    SCTP_CAUSE_RESOURCE_SHORTAGE, (uint8_t *)aph,
251f8829a4aSRandall Stewart 		    aparam_length);
252f8829a4aSRandall Stewart 	} else {
253f8829a4aSRandall Stewart 		/* notify upper layer */
254ceaad40aSRandall Stewart 		sctp_ulp_notify(SCTP_NOTIFY_ASCONF_ADD_IP, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
255f8829a4aSRandall Stewart 		if (response_required) {
256f8829a4aSRandall Stewart 			m_reply =
257f8829a4aSRandall Stewart 			    sctp_asconf_success_response(aph->correlation_id);
258f8829a4aSRandall Stewart 		}
259ca85e948SMichael Tuexen 		sctp_timer_start(SCTP_TIMER_TYPE_PATHMTURAISE, stcb->sctp_ep, stcb, net);
2603c503c28SRandall Stewart 		sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep,
261ca85e948SMichael Tuexen 		    stcb, net);
262ca85e948SMichael Tuexen 		if (send_hb) {
263ca85e948SMichael Tuexen 			sctp_send_hb(stcb, net, SCTP_SO_NOT_LOCKED);
264ca85e948SMichael Tuexen 		}
265f8829a4aSRandall Stewart 	}
26660990c0cSMichael Tuexen 	return (m_reply);
267f8829a4aSRandall Stewart }
268f8829a4aSRandall Stewart 
269f8829a4aSRandall Stewart static int
2701b649582SRandall Stewart sctp_asconf_del_remote_addrs_except(struct sctp_tcb *stcb, struct sockaddr *src)
271f8829a4aSRandall Stewart {
272f8829a4aSRandall Stewart 	struct sctp_nets *src_net, *net;
273f8829a4aSRandall Stewart 
274f8829a4aSRandall Stewart 	/* make sure the source address exists as a destination net */
275f8829a4aSRandall Stewart 	src_net = sctp_findnet(stcb, src);
276f8829a4aSRandall Stewart 	if (src_net == NULL) {
277f8829a4aSRandall Stewart 		/* not found */
27860990c0cSMichael Tuexen 		return (-1);
279f8829a4aSRandall Stewart 	}
2800053ed28SMichael Tuexen 
281f8829a4aSRandall Stewart 	/* delete all destination addresses except the source */
282f8829a4aSRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
283f8829a4aSRandall Stewart 		if (net != src_net) {
284f8829a4aSRandall Stewart 			/* delete this address */
285f8829a4aSRandall Stewart 			sctp_remove_net(stcb, net);
286ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
287ad81507eSRandall Stewart 			    "asconf_del_remote_addrs_except: deleting ");
288ad81507eSRandall Stewart 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1,
289ad81507eSRandall Stewart 			    (struct sockaddr *)&net->ro._l_addr);
290f8829a4aSRandall Stewart 			/* notify upper layer */
291f8829a4aSRandall Stewart 			sctp_ulp_notify(SCTP_NOTIFY_ASCONF_DELETE_IP, stcb, 0,
292ceaad40aSRandall Stewart 			    (struct sockaddr *)&net->ro._l_addr, SCTP_SO_NOT_LOCKED);
293f8829a4aSRandall Stewart 		}
294f8829a4aSRandall Stewart 	}
29560990c0cSMichael Tuexen 	return (0);
296f8829a4aSRandall Stewart }
297f8829a4aSRandall Stewart 
298f8829a4aSRandall Stewart static struct mbuf *
299b1754ad1SMichael Tuexen sctp_process_asconf_delete_ip(struct sockaddr *src,
300b1754ad1SMichael Tuexen     struct sctp_asconf_paramhdr *aph,
301f8829a4aSRandall Stewart     struct sctp_tcb *stcb, int response_required)
302f8829a4aSRandall Stewart {
303f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
30424aaac8dSMichael Tuexen 	union sctp_sockstore store;
305e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
306b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
307b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
308b54ddf22SMichael Tuexen 	uint16_t param_length;
309b54ddf22SMichael Tuexen #endif
310f8829a4aSRandall Stewart 	struct sockaddr *sa;
311f8829a4aSRandall Stewart 	int zero_address = 0;
312f8829a4aSRandall Stewart 	int result;
313e6194c2eSMichael Tuexen #ifdef INET
314e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
315e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
316e6194c2eSMichael Tuexen #endif
317f8829a4aSRandall Stewart #ifdef INET6
318f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
319f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
320e6194c2eSMichael Tuexen #endif
321f8829a4aSRandall Stewart 
322f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
323e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
324e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
325b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
326e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
327b54ddf22SMichael Tuexen #endif
32824aaac8dSMichael Tuexen 	sa = &store.sa;
329f8829a4aSRandall Stewart 	switch (param_type) {
330e6194c2eSMichael Tuexen #ifdef INET
331f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
332f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
333f8829a4aSRandall Stewart 			/* invalid param size */
33460990c0cSMichael Tuexen 			return (NULL);
335f8829a4aSRandall Stewart 		}
336e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
33724aaac8dSMichael Tuexen 		sin = &store.sin;
3385ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
339f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
340f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
341f8829a4aSRandall Stewart 		sin->sin_port = stcb->rport;
342f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
343f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
344f8829a4aSRandall Stewart 			zero_address = 1;
345ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
346ad81507eSRandall Stewart 		    "process_asconf_delete_ip: deleting ");
347ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
348f8829a4aSRandall Stewart 		break;
349e6194c2eSMichael Tuexen #endif
350e6194c2eSMichael Tuexen #ifdef INET6
351f8829a4aSRandall Stewart 	case SCTP_IPV6_ADDRESS:
352f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
353f8829a4aSRandall Stewart 			/* invalid param size */
35460990c0cSMichael Tuexen 			return (NULL);
355f8829a4aSRandall Stewart 		}
356e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
35724aaac8dSMichael Tuexen 		sin6 = &store.sin6;
3585ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
359f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
360f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
361f8829a4aSRandall Stewart 		sin6->sin6_port = stcb->rport;
362f8829a4aSRandall Stewart 		memcpy(&sin6->sin6_addr, v6addr->addr,
363f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
364f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
365f8829a4aSRandall Stewart 			zero_address = 1;
366ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
367ad81507eSRandall Stewart 		    "process_asconf_delete_ip: deleting ");
368ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
369f8829a4aSRandall Stewart 		break;
370e6194c2eSMichael Tuexen #endif
371f8829a4aSRandall Stewart 	default:
372f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
373f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
374f8829a4aSRandall Stewart 		    aparam_length);
37560990c0cSMichael Tuexen 		return (m_reply);
376f8829a4aSRandall Stewart 	}
377f8829a4aSRandall Stewart 
378f8829a4aSRandall Stewart 	/* make sure the source address is not being deleted */
379b1754ad1SMichael Tuexen 	if (sctp_cmpaddr(sa, src)) {
380f8829a4aSRandall Stewart 		/* trying to delete the source address! */
381ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: tried to delete source addr\n");
382f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
383f8829a4aSRandall Stewart 		    SCTP_CAUSE_DELETING_SRC_ADDR, (uint8_t *)aph,
384f8829a4aSRandall Stewart 		    aparam_length);
38560990c0cSMichael Tuexen 		return (m_reply);
386f8829a4aSRandall Stewart 	}
3870053ed28SMichael Tuexen 
388f8829a4aSRandall Stewart 	/* if deleting 0.0.0.0/::0, delete all addresses except src addr */
389b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
390b1754ad1SMichael Tuexen 		result = sctp_asconf_del_remote_addrs_except(stcb, src);
391f8829a4aSRandall Stewart 
392f8829a4aSRandall Stewart 		if (result) {
393f8829a4aSRandall Stewart 			/* src address did not exist? */
394ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: src addr does not exist?\n");
395f8829a4aSRandall Stewart 			/* what error to reply with?? */
396f8829a4aSRandall Stewart 			m_reply =
397f8829a4aSRandall Stewart 			    sctp_asconf_error_response(aph->correlation_id,
398f8829a4aSRandall Stewart 			    SCTP_CAUSE_REQUEST_REFUSED, (uint8_t *)aph,
399f8829a4aSRandall Stewart 			    aparam_length);
400f8829a4aSRandall Stewart 		} else if (response_required) {
401f8829a4aSRandall Stewart 			m_reply =
402f8829a4aSRandall Stewart 			    sctp_asconf_success_response(aph->correlation_id);
403f8829a4aSRandall Stewart 		}
40460990c0cSMichael Tuexen 		return (m_reply);
405f8829a4aSRandall Stewart 	}
4060053ed28SMichael Tuexen 
407f8829a4aSRandall Stewart 	/* delete the address */
408f8829a4aSRandall Stewart 	result = sctp_del_remote_addr(stcb, sa);
409f8829a4aSRandall Stewart 	/*
410f8829a4aSRandall Stewart 	 * note if result == -2, the address doesn't exist in the asoc but
411f8829a4aSRandall Stewart 	 * since it's being deleted anyways, we just ack the delete -- but
412f8829a4aSRandall Stewart 	 * this probably means something has already gone awry
413f8829a4aSRandall Stewart 	 */
414f8829a4aSRandall Stewart 	if (result == -1) {
415f8829a4aSRandall Stewart 		/* only one address in the asoc */
416ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_delete_ip: tried to delete last IP addr!\n");
417f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
418f8829a4aSRandall Stewart 		    SCTP_CAUSE_DELETING_LAST_ADDR, (uint8_t *)aph,
419f8829a4aSRandall Stewart 		    aparam_length);
420f8829a4aSRandall Stewart 	} else {
421f8829a4aSRandall Stewart 		if (response_required) {
422f8829a4aSRandall Stewart 			m_reply = sctp_asconf_success_response(aph->correlation_id);
423f8829a4aSRandall Stewart 		}
424f8829a4aSRandall Stewart 		/* notify upper layer */
425ceaad40aSRandall Stewart 		sctp_ulp_notify(SCTP_NOTIFY_ASCONF_DELETE_IP, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
426f8829a4aSRandall Stewart 	}
42760990c0cSMichael Tuexen 	return (m_reply);
428f8829a4aSRandall Stewart }
429f8829a4aSRandall Stewart 
430f8829a4aSRandall Stewart static struct mbuf *
431b1754ad1SMichael Tuexen sctp_process_asconf_set_primary(struct sockaddr *src,
4321b649582SRandall Stewart     struct sctp_asconf_paramhdr *aph,
4331b649582SRandall Stewart     struct sctp_tcb *stcb, int response_required)
434f8829a4aSRandall Stewart {
435f8829a4aSRandall Stewart 	struct mbuf *m_reply = NULL;
43624aaac8dSMichael Tuexen 	union sctp_sockstore store;
437e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
438b54ddf22SMichael Tuexen 	uint16_t param_type, aparam_length;
439b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
440b54ddf22SMichael Tuexen 	uint16_t param_length;
441b54ddf22SMichael Tuexen #endif
442f8829a4aSRandall Stewart 	struct sockaddr *sa;
443f8829a4aSRandall Stewart 	int zero_address = 0;
444e6194c2eSMichael Tuexen #ifdef INET
445e6194c2eSMichael Tuexen 	struct sockaddr_in *sin;
446e6194c2eSMichael Tuexen 	struct sctp_ipv4addr_param *v4addr;
447e6194c2eSMichael Tuexen #endif
448f8829a4aSRandall Stewart #ifdef INET6
449f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6;
450f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *v6addr;
451e6194c2eSMichael Tuexen #endif
452f8829a4aSRandall Stewart 
453f8829a4aSRandall Stewart 	aparam_length = ntohs(aph->ph.param_length);
454e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)(aph + 1);
455e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
456b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
457e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
458b54ddf22SMichael Tuexen #endif
45924aaac8dSMichael Tuexen 	sa = &store.sa;
460f8829a4aSRandall Stewart 	switch (param_type) {
461e6194c2eSMichael Tuexen #ifdef INET
462f8829a4aSRandall Stewart 	case SCTP_IPV4_ADDRESS:
463f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv4addr_param)) {
464f8829a4aSRandall Stewart 			/* invalid param size */
46560990c0cSMichael Tuexen 			return (NULL);
466f8829a4aSRandall Stewart 		}
467e6194c2eSMichael Tuexen 		v4addr = (struct sctp_ipv4addr_param *)ph;
46824aaac8dSMichael Tuexen 		sin = &store.sin;
4695ba7f91fSMichael Tuexen 		memset(sin, 0, sizeof(*sin));
470f8829a4aSRandall Stewart 		sin->sin_family = AF_INET;
471f8829a4aSRandall Stewart 		sin->sin_len = sizeof(struct sockaddr_in);
472f8829a4aSRandall Stewart 		sin->sin_addr.s_addr = v4addr->addr;
473f8829a4aSRandall Stewart 		if (sin->sin_addr.s_addr == INADDR_ANY)
474f8829a4aSRandall Stewart 			zero_address = 1;
475ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_set_primary: ");
476ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
477f8829a4aSRandall Stewart 		break;
478e6194c2eSMichael Tuexen #endif
479e6194c2eSMichael Tuexen #ifdef INET6
480f8829a4aSRandall Stewart 	case SCTP_IPV6_ADDRESS:
481f8829a4aSRandall Stewart 		if (param_length != sizeof(struct sctp_ipv6addr_param)) {
482f8829a4aSRandall Stewart 			/* invalid param size */
48360990c0cSMichael Tuexen 			return (NULL);
484f8829a4aSRandall Stewart 		}
485e6194c2eSMichael Tuexen 		v6addr = (struct sctp_ipv6addr_param *)ph;
48624aaac8dSMichael Tuexen 		sin6 = &store.sin6;
4875ba7f91fSMichael Tuexen 		memset(sin6, 0, sizeof(*sin6));
488f8829a4aSRandall Stewart 		sin6->sin6_family = AF_INET6;
489f8829a4aSRandall Stewart 		sin6->sin6_len = sizeof(struct sockaddr_in6);
490f8829a4aSRandall Stewart 		memcpy((caddr_t)&sin6->sin6_addr, v6addr->addr,
491f8829a4aSRandall Stewart 		    sizeof(struct in6_addr));
492f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr))
493f8829a4aSRandall Stewart 			zero_address = 1;
494ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "process_asconf_set_primary: ");
495ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
496f8829a4aSRandall Stewart 		break;
497e6194c2eSMichael Tuexen #endif
498f8829a4aSRandall Stewart 	default:
499f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
500f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
501f8829a4aSRandall Stewart 		    aparam_length);
50260990c0cSMichael Tuexen 		return (m_reply);
503f8829a4aSRandall Stewart 	}
504f8829a4aSRandall Stewart 
505f8829a4aSRandall Stewart 	/* if 0.0.0.0/::0, use the source address instead */
506b3f1ea41SRandall Stewart 	if (zero_address && SCTP_BASE_SYSCTL(sctp_nat_friendly)) {
507b1754ad1SMichael Tuexen 		sa = src;
508ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
509ad81507eSRandall Stewart 		    "process_asconf_set_primary: using source addr ");
510b1754ad1SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
511f8829a4aSRandall Stewart 	}
512f8829a4aSRandall Stewart 	/* set the primary address */
513f8829a4aSRandall Stewart 	if (sctp_set_primary_addr(stcb, sa, NULL) == 0) {
514ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
515ad81507eSRandall Stewart 		    "process_asconf_set_primary: primary address set\n");
516f8829a4aSRandall Stewart 		/* notify upper layer */
517ceaad40aSRandall Stewart 		sctp_ulp_notify(SCTP_NOTIFY_ASCONF_SET_PRIMARY, stcb, 0, sa, SCTP_SO_NOT_LOCKED);
518ca85e948SMichael Tuexen 		if ((stcb->asoc.primary_destination->dest_state & SCTP_ADDR_REACHABLE) &&
519ca85e948SMichael Tuexen 		    (!(stcb->asoc.primary_destination->dest_state & SCTP_ADDR_PF)) &&
520ca85e948SMichael Tuexen 		    (stcb->asoc.alternate)) {
521ca85e948SMichael Tuexen 			sctp_free_remote_addr(stcb->asoc.alternate);
522ca85e948SMichael Tuexen 			stcb->asoc.alternate = NULL;
523ca85e948SMichael Tuexen 		}
524f8829a4aSRandall Stewart 		if (response_required) {
525f8829a4aSRandall Stewart 			m_reply = sctp_asconf_success_response(aph->correlation_id);
526f8829a4aSRandall Stewart 		}
527851b7298SRandall Stewart 		/*
528851b7298SRandall Stewart 		 * Mobility adaptation. Ideally, when the reception of SET
529851b7298SRandall Stewart 		 * PRIMARY with DELETE IP ADDRESS of the previous primary
530851b7298SRandall Stewart 		 * destination, unacknowledged DATA are retransmitted
531851b7298SRandall Stewart 		 * immediately to the new primary destination for seamless
532b5c16493SMichael Tuexen 		 * handover. If the destination is UNCONFIRMED and marked to
533b5c16493SMichael Tuexen 		 * REQ_PRIM, The retransmission occur when reception of the
534b5c16493SMichael Tuexen 		 * HEARTBEAT-ACK.  (See sctp_handle_heartbeat_ack in
535851b7298SRandall Stewart 		 * sctp_input.c) Also, when change of the primary
536851b7298SRandall Stewart 		 * destination, it is better that all subsequent new DATA
537851b7298SRandall Stewart 		 * containing already queued DATA are transmitted to the new
538851b7298SRandall Stewart 		 * primary destination. (by micchie)
539851b7298SRandall Stewart 		 */
540851b7298SRandall Stewart 		if ((sctp_is_mobility_feature_on(stcb->sctp_ep,
541851b7298SRandall Stewart 		    SCTP_MOBILITY_BASE) ||
542851b7298SRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
543851b7298SRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) &&
544851b7298SRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
545851b7298SRandall Stewart 		    SCTP_MOBILITY_PRIM_DELETED) &&
546851b7298SRandall Stewart 		    (stcb->asoc.primary_destination->dest_state &
547851b7298SRandall Stewart 		    SCTP_ADDR_UNCONFIRMED) == 0) {
548851b7298SRandall Stewart 
549b7d130beSMichael Tuexen 			sctp_timer_stop(SCTP_TIMER_TYPE_PRIM_DELETED,
550b7d130beSMichael Tuexen 			    stcb->sctp_ep, stcb, NULL,
551b7d130beSMichael Tuexen 			    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_1);
552851b7298SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
553851b7298SRandall Stewart 			    SCTP_MOBILITY_FASTHANDOFF)) {
554851b7298SRandall Stewart 				sctp_assoc_immediate_retrans(stcb,
555851b7298SRandall Stewart 				    stcb->asoc.primary_destination);
556851b7298SRandall Stewart 			}
557851b7298SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
558851b7298SRandall Stewart 			    SCTP_MOBILITY_BASE)) {
5599eea4a2dSMichael Tuexen 				sctp_move_chunks_from_net(stcb,
5609eea4a2dSMichael Tuexen 				    stcb->asoc.deleted_primary);
561851b7298SRandall Stewart 			}
562851b7298SRandall Stewart 			sctp_delete_prim_timer(stcb->sctp_ep, stcb,
563851b7298SRandall Stewart 			    stcb->asoc.deleted_primary);
564851b7298SRandall Stewart 		}
565f8829a4aSRandall Stewart 	} else {
566f8829a4aSRandall Stewart 		/* couldn't set the requested primary address! */
567ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
568ad81507eSRandall Stewart 		    "process_asconf_set_primary: set primary failed!\n");
569f8829a4aSRandall Stewart 		/* must have been an invalid address, so report */
570f8829a4aSRandall Stewart 		m_reply = sctp_asconf_error_response(aph->correlation_id,
571f8829a4aSRandall Stewart 		    SCTP_CAUSE_UNRESOLVABLE_ADDR, (uint8_t *)aph,
572f8829a4aSRandall Stewart 		    aparam_length);
573f8829a4aSRandall Stewart 	}
574f8829a4aSRandall Stewart 
57560990c0cSMichael Tuexen 	return (m_reply);
576f8829a4aSRandall Stewart }
577f8829a4aSRandall Stewart 
578f8829a4aSRandall Stewart /*
579f8829a4aSRandall Stewart  * handles an ASCONF chunk.
580f8829a4aSRandall Stewart  * if all parameters are processed ok, send a plain (empty) ASCONF-ACK
581f8829a4aSRandall Stewart  */
582f8829a4aSRandall Stewart void
583f8829a4aSRandall Stewart sctp_handle_asconf(struct mbuf *m, unsigned int offset,
584b1754ad1SMichael Tuexen     struct sockaddr *src,
5852afb3e84SRandall Stewart     struct sctp_asconf_chunk *cp, struct sctp_tcb *stcb,
5862afb3e84SRandall Stewart     int first)
587f8829a4aSRandall Stewart {
588f8829a4aSRandall Stewart 	struct sctp_association *asoc;
589f8829a4aSRandall Stewart 	uint32_t serial_num;
5902afb3e84SRandall Stewart 	struct mbuf *n, *m_ack, *m_result, *m_tail;
591f8829a4aSRandall Stewart 	struct sctp_asconf_ack_chunk *ack_cp;
592f104b614SMichael Tuexen 	struct sctp_asconf_paramhdr *aph;
593f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *p_addr;
594ca85e948SMichael Tuexen 	unsigned int asconf_limit, cnt;
595f8829a4aSRandall Stewart 	int error = 0;		/* did an error occur? */
596f8829a4aSRandall Stewart 
597f8829a4aSRandall Stewart 	/* asconf param buffer */
598f42a358aSRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
5992afb3e84SRandall Stewart 	struct sctp_asconf_ack *ack, *ack_next;
600f8829a4aSRandall Stewart 
601f8829a4aSRandall Stewart 	/* verify minimum length */
602f8829a4aSRandall Stewart 	if (ntohs(cp->ch.chunk_length) < sizeof(struct sctp_asconf_chunk)) {
603ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
604ad81507eSRandall Stewart 		    "handle_asconf: chunk too small = %xh\n",
605f8829a4aSRandall Stewart 		    ntohs(cp->ch.chunk_length));
606f8829a4aSRandall Stewart 		return;
607f8829a4aSRandall Stewart 	}
608f8829a4aSRandall Stewart 	asoc = &stcb->asoc;
609f8829a4aSRandall Stewart 	serial_num = ntohl(cp->serial_number);
610f8829a4aSRandall Stewart 
61120b07a4dSMichael Tuexen 	if (SCTP_TSN_GE(asoc->asconf_seq_in, serial_num)) {
612f8829a4aSRandall Stewart 		/* got a duplicate ASCONF */
613ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
614ad81507eSRandall Stewart 		    "handle_asconf: got duplicate serial number = %xh\n",
615f8829a4aSRandall Stewart 		    serial_num);
616f8829a4aSRandall Stewart 		return;
617f8829a4aSRandall Stewart 	} else if (serial_num != (asoc->asconf_seq_in + 1)) {
618ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: incorrect serial number = %xh (expected next = %xh)\n",
619f8829a4aSRandall Stewart 		    serial_num, asoc->asconf_seq_in + 1);
620f8829a4aSRandall Stewart 		return;
621f8829a4aSRandall Stewart 	}
6220053ed28SMichael Tuexen 
623f8829a4aSRandall Stewart 	/* it's the expected "next" sequence number, so process it */
624f8829a4aSRandall Stewart 	asoc->asconf_seq_in = serial_num;	/* update sequence */
625f8829a4aSRandall Stewart 	/* get length of all the param's in the ASCONF */
626f8829a4aSRandall Stewart 	asconf_limit = offset + ntohs(cp->ch.chunk_length);
627ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1,
628ad81507eSRandall Stewart 	    "handle_asconf: asconf_limit=%u, sequence=%xh\n",
629f8829a4aSRandall Stewart 	    asconf_limit, serial_num);
6302afb3e84SRandall Stewart 
6312afb3e84SRandall Stewart 	if (first) {
6322afb3e84SRandall Stewart 		/* delete old cache */
633e6194c2eSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: Now processing first ASCONF. Try to delete old cache\n");
6342afb3e84SRandall Stewart 
6354a9ef3f8SMichael Tuexen 		TAILQ_FOREACH_SAFE(ack, &asoc->asconf_ack_sent, next, ack_next) {
6362afb3e84SRandall Stewart 			if (ack->serial_number == serial_num)
6372afb3e84SRandall Stewart 				break;
6382afb3e84SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: delete old(%u) < first(%u)\n",
6392afb3e84SRandall Stewart 			    ack->serial_number, serial_num);
6404a9ef3f8SMichael Tuexen 			TAILQ_REMOVE(&asoc->asconf_ack_sent, ack, next);
6412afb3e84SRandall Stewart 			if (ack->data != NULL) {
6422afb3e84SRandall Stewart 				sctp_m_freem(ack->data);
6432afb3e84SRandall Stewart 			}
644b3f1ea41SRandall Stewart 			SCTP_ZONE_FREE(SCTP_BASE_INFO(ipi_zone_asconf_ack), ack);
6452afb3e84SRandall Stewart 		}
646f8829a4aSRandall Stewart 	}
6470053ed28SMichael Tuexen 
648139bc87fSRandall Stewart 	m_ack = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_ack_chunk), 0,
649eb1b1807SGleb Smirnoff 	    M_NOWAIT, 1, MT_DATA);
650f8829a4aSRandall Stewart 	if (m_ack == NULL) {
651ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
652ad81507eSRandall Stewart 		    "handle_asconf: couldn't get mbuf!\n");
653f8829a4aSRandall Stewart 		return;
654f8829a4aSRandall Stewart 	}
655f8829a4aSRandall Stewart 	m_tail = m_ack;		/* current reply chain's tail */
656f8829a4aSRandall Stewart 
657f8829a4aSRandall Stewart 	/* fill in ASCONF-ACK header */
658f8829a4aSRandall Stewart 	ack_cp = mtod(m_ack, struct sctp_asconf_ack_chunk *);
659f8829a4aSRandall Stewart 	ack_cp->ch.chunk_type = SCTP_ASCONF_ACK;
660f8829a4aSRandall Stewart 	ack_cp->ch.chunk_flags = 0;
661f8829a4aSRandall Stewart 	ack_cp->serial_number = htonl(serial_num);
662f8829a4aSRandall Stewart 	/* set initial lengths (eg. just an ASCONF-ACK), ntohx at the end! */
663139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_ack) = sizeof(struct sctp_asconf_ack_chunk);
664f8829a4aSRandall Stewart 	ack_cp->ch.chunk_length = sizeof(struct sctp_asconf_ack_chunk);
665f8829a4aSRandall Stewart 
666f8829a4aSRandall Stewart 	/* skip the lookup address parameter */
667f8829a4aSRandall Stewart 	offset += sizeof(struct sctp_asconf_chunk);
668f8829a4aSRandall Stewart 	p_addr = (struct sctp_ipv6addr_param *)sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr), (uint8_t *)&aparam_buf);
669f8829a4aSRandall Stewart 	if (p_addr == NULL) {
670ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
671ad81507eSRandall Stewart 		    "handle_asconf: couldn't get lookup addr!\n");
672f8829a4aSRandall Stewart 		/* respond with a missing/invalid mandatory parameter error */
6731b084a5eSMichael Tuexen 		sctp_m_freem(m_ack);
674f8829a4aSRandall Stewart 		return;
675f8829a4aSRandall Stewart 	}
676f8829a4aSRandall Stewart 	/* param_length is already validated in process_control... */
677f8829a4aSRandall Stewart 	offset += ntohs(p_addr->ph.param_length);	/* skip lookup addr */
678f8829a4aSRandall Stewart 	/* get pointer to first asconf param in ASCONF */
679f8829a4aSRandall Stewart 	aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, sizeof(struct sctp_asconf_paramhdr), (uint8_t *)&aparam_buf);
680f8829a4aSRandall Stewart 	if (aph == NULL) {
681ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Empty ASCONF received?\n");
682f8829a4aSRandall Stewart 		goto send_reply;
683f8829a4aSRandall Stewart 	}
684f8829a4aSRandall Stewart 	/* process through all parameters */
685ca85e948SMichael Tuexen 	cnt = 0;
686f8829a4aSRandall Stewart 	while (aph != NULL) {
687f8829a4aSRandall Stewart 		unsigned int param_length, param_type;
688f8829a4aSRandall Stewart 
689f8829a4aSRandall Stewart 		param_type = ntohs(aph->ph.param_type);
690f8829a4aSRandall Stewart 		param_length = ntohs(aph->ph.param_length);
691f8829a4aSRandall Stewart 		if (offset + param_length > asconf_limit) {
692f8829a4aSRandall Stewart 			/* parameter goes beyond end of chunk! */
693f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
694f8829a4aSRandall Stewart 			return;
695f8829a4aSRandall Stewart 		}
696f8829a4aSRandall Stewart 		m_result = NULL;
697f8829a4aSRandall Stewart 
698f8829a4aSRandall Stewart 		if (param_length > sizeof(aparam_buf)) {
699ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: param length (%u) larger than buffer size!\n", param_length);
700f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
701f8829a4aSRandall Stewart 			return;
702f8829a4aSRandall Stewart 		}
703f8829a4aSRandall Stewart 		if (param_length <= sizeof(struct sctp_paramhdr)) {
704ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: param length (%u) too short\n", param_length);
705f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
706*e6b3bd22SMichael Tuexen 			return;
707f8829a4aSRandall Stewart 		}
708f8829a4aSRandall Stewart 		/* get the entire parameter */
709f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, param_length, aparam_buf);
710f8829a4aSRandall Stewart 		if (aph == NULL) {
711ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: couldn't get entire param\n");
712f8829a4aSRandall Stewart 			sctp_m_freem(m_ack);
713f8829a4aSRandall Stewart 			return;
714f8829a4aSRandall Stewart 		}
715f8829a4aSRandall Stewart 		switch (param_type) {
716f8829a4aSRandall Stewart 		case SCTP_ADD_IP_ADDRESS:
717b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_add_ip(src, aph, stcb,
718ca85e948SMichael Tuexen 			    (cnt < SCTP_BASE_SYSCTL(sctp_hb_maxburst)), error);
719ca85e948SMichael Tuexen 			cnt++;
720f8829a4aSRandall Stewart 			break;
721f8829a4aSRandall Stewart 		case SCTP_DEL_IP_ADDRESS:
722b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_delete_ip(src, aph, stcb,
723f8829a4aSRandall Stewart 			    error);
724f8829a4aSRandall Stewart 			break;
725f8829a4aSRandall Stewart 		case SCTP_ERROR_CAUSE_IND:
726f8829a4aSRandall Stewart 			/* not valid in an ASCONF chunk */
727f8829a4aSRandall Stewart 			break;
728f8829a4aSRandall Stewart 		case SCTP_SET_PRIM_ADDR:
729b1754ad1SMichael Tuexen 			m_result = sctp_process_asconf_set_primary(src, aph,
730f8829a4aSRandall Stewart 			    stcb, error);
731f8829a4aSRandall Stewart 			break;
732830d754dSRandall Stewart 		case SCTP_NAT_VTAGS:
733830d754dSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: sees a NAT VTAG state parameter\n");
734830d754dSRandall Stewart 			break;
735f8829a4aSRandall Stewart 		case SCTP_SUCCESS_REPORT:
736f8829a4aSRandall Stewart 			/* not valid in an ASCONF chunk */
737f8829a4aSRandall Stewart 			break;
738f8829a4aSRandall Stewart 		case SCTP_ULP_ADAPTATION:
739f8829a4aSRandall Stewart 			/* FIX */
740f8829a4aSRandall Stewart 			break;
741f8829a4aSRandall Stewart 		default:
742f8829a4aSRandall Stewart 			if ((param_type & 0x8000) == 0) {
743f8829a4aSRandall Stewart 				/* Been told to STOP at this param */
744f8829a4aSRandall Stewart 				asconf_limit = offset;
745f8829a4aSRandall Stewart 				/*
746f8829a4aSRandall Stewart 				 * FIX FIX - We need to call
747f8829a4aSRandall Stewart 				 * sctp_arethere_unrecognized_parameters()
748f8829a4aSRandall Stewart 				 * to get a operr and send it for any
749f8829a4aSRandall Stewart 				 * param's with the 0x4000 bit set OR do it
750f8829a4aSRandall Stewart 				 * here ourselves... note we still must STOP
751f8829a4aSRandall Stewart 				 * if the 0x8000 bit is clear.
752f8829a4aSRandall Stewart 				 */
753f8829a4aSRandall Stewart 			}
754f8829a4aSRandall Stewart 			/* unknown/invalid param type */
755f8829a4aSRandall Stewart 			break;
756f8829a4aSRandall Stewart 		}		/* switch */
757f8829a4aSRandall Stewart 
758f8829a4aSRandall Stewart 		/* add any (error) result to the reply mbuf chain */
759f8829a4aSRandall Stewart 		if (m_result != NULL) {
760139bc87fSRandall Stewart 			SCTP_BUF_NEXT(m_tail) = m_result;
761f8829a4aSRandall Stewart 			m_tail = m_result;
762f8829a4aSRandall Stewart 			/* update lengths, make sure it's aligned too */
763139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_result) = SCTP_SIZE32(SCTP_BUF_LEN(m_result));
764139bc87fSRandall Stewart 			ack_cp->ch.chunk_length += SCTP_BUF_LEN(m_result);
765f8829a4aSRandall Stewart 			/* set flag to force success reports */
766f8829a4aSRandall Stewart 			error = 1;
767f8829a4aSRandall Stewart 		}
768f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(param_length);
769f8829a4aSRandall Stewart 		/* update remaining ASCONF message length to process */
770f8829a4aSRandall Stewart 		if (offset >= asconf_limit) {
771f8829a4aSRandall Stewart 			/* no more data in the mbuf chain */
772f8829a4aSRandall Stewart 			break;
773f8829a4aSRandall Stewart 		}
774f8829a4aSRandall Stewart 		/* get pointer to next asconf param */
775f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset,
776f8829a4aSRandall Stewart 		    sizeof(struct sctp_asconf_paramhdr),
777f8829a4aSRandall Stewart 		    (uint8_t *)&aparam_buf);
778f8829a4aSRandall Stewart 		if (aph == NULL) {
779f8829a4aSRandall Stewart 			/* can't get an asconf paramhdr */
780ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: can't get asconf param hdr!\n");
781f8829a4aSRandall Stewart 			/* FIX ME - add error here... */
782f8829a4aSRandall Stewart 		}
783ad81507eSRandall Stewart 	}
784f8829a4aSRandall Stewart 
785f8829a4aSRandall Stewart send_reply:
786f8829a4aSRandall Stewart 	ack_cp->ch.chunk_length = htons(ack_cp->ch.chunk_length);
787f8829a4aSRandall Stewart 	/* save the ASCONF-ACK reply */
788b3f1ea41SRandall Stewart 	ack = SCTP_ZONE_GET(SCTP_BASE_INFO(ipi_zone_asconf_ack),
7892afb3e84SRandall Stewart 	    struct sctp_asconf_ack);
7902afb3e84SRandall Stewart 	if (ack == NULL) {
7912afb3e84SRandall Stewart 		sctp_m_freem(m_ack);
7922afb3e84SRandall Stewart 		return;
7932afb3e84SRandall Stewart 	}
7942afb3e84SRandall Stewart 	ack->serial_number = serial_num;
7952afb3e84SRandall Stewart 	ack->last_sent_to = NULL;
7962afb3e84SRandall Stewart 	ack->data = m_ack;
797fc066a61SMichael Tuexen 	ack->len = 0;
798e6194c2eSMichael Tuexen 	for (n = m_ack; n != NULL; n = SCTP_BUF_NEXT(n)) {
7992afb3e84SRandall Stewart 		ack->len += SCTP_BUF_LEN(n);
8002afb3e84SRandall Stewart 	}
8012afb3e84SRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_ack_sent, ack, next);
802f8829a4aSRandall Stewart 
803f8829a4aSRandall Stewart 	/* see if last_control_chunk_from is set properly (use IP src addr) */
804f8829a4aSRandall Stewart 	if (stcb->asoc.last_control_chunk_from == NULL) {
805f8829a4aSRandall Stewart 		/*
806f8829a4aSRandall Stewart 		 * this could happen if the source address was just newly
807f8829a4aSRandall Stewart 		 * added
808f8829a4aSRandall Stewart 		 */
809ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: looking up net for IP source address\n");
810ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Looking for IP source: ");
811b82bd838SMichael Tuexen 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, src);
812f8829a4aSRandall Stewart 		/* look up the from address */
813b82bd838SMichael Tuexen 		stcb->asoc.last_control_chunk_from = sctp_findnet(stcb, src);
814f8829a4aSRandall Stewart #ifdef SCTP_DEBUG
815b82bd838SMichael Tuexen 		if (stcb->asoc.last_control_chunk_from == NULL) {
816ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf: IP source address not found?!\n");
817f8829a4aSRandall Stewart 		}
818b82bd838SMichael Tuexen #endif
819f8829a4aSRandall Stewart 	}
820f8829a4aSRandall Stewart }
821f8829a4aSRandall Stewart 
822f8829a4aSRandall Stewart /*
823f8829a4aSRandall Stewart  * does the address match? returns 0 if not, 1 if so
824f8829a4aSRandall Stewart  */
825f8829a4aSRandall Stewart static uint32_t
826b0471b4bSMichael Tuexen sctp_asconf_addr_match(struct sctp_asconf_addr *aa, struct sockaddr *sa)
827b0471b4bSMichael Tuexen {
828e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
829f8829a4aSRandall Stewart #ifdef INET6
830e6194c2eSMichael Tuexen 	case AF_INET6:
831e6194c2eSMichael Tuexen 		{
832f8829a4aSRandall Stewart 			/* XXX scopeid */
833f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
834f8829a4aSRandall Stewart 
835f8829a4aSRandall Stewart 			if ((aa->ap.addrp.ph.param_type == SCTP_IPV6_ADDRESS) &&
836f8829a4aSRandall Stewart 			    (memcmp(&aa->ap.addrp.addr, &sin6->sin6_addr,
837f8829a4aSRandall Stewart 			    sizeof(struct in6_addr)) == 0)) {
838f8829a4aSRandall Stewart 				return (1);
839f8829a4aSRandall Stewart 			}
840e6194c2eSMichael Tuexen 			break;
841e6194c2eSMichael Tuexen 		}
842e6194c2eSMichael Tuexen #endif
843e6194c2eSMichael Tuexen #ifdef INET
844e6194c2eSMichael Tuexen 	case AF_INET:
845e6194c2eSMichael Tuexen 		{
846f8829a4aSRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
847f8829a4aSRandall Stewart 
848f8829a4aSRandall Stewart 			if ((aa->ap.addrp.ph.param_type == SCTP_IPV4_ADDRESS) &&
849f8829a4aSRandall Stewart 			    (memcmp(&aa->ap.addrp.addr, &sin->sin_addr,
850f8829a4aSRandall Stewart 			    sizeof(struct in_addr)) == 0)) {
851f8829a4aSRandall Stewart 				return (1);
852f8829a4aSRandall Stewart 			}
853e6194c2eSMichael Tuexen 			break;
854e6194c2eSMichael Tuexen 		}
855e6194c2eSMichael Tuexen #endif
856e6194c2eSMichael Tuexen 	default:
857e6194c2eSMichael Tuexen 		break;
858f8829a4aSRandall Stewart 	}
859f8829a4aSRandall Stewart 	return (0);
860f8829a4aSRandall Stewart }
861f8829a4aSRandall Stewart 
862f8829a4aSRandall Stewart /*
863c54a18d2SRandall Stewart  * does the address match? returns 0 if not, 1 if so
864c54a18d2SRandall Stewart  */
865c54a18d2SRandall Stewart static uint32_t
866b0471b4bSMichael Tuexen sctp_addr_match(struct sctp_paramhdr *ph, struct sockaddr *sa)
867b0471b4bSMichael Tuexen {
868b54ddf22SMichael Tuexen #if defined(INET) || defined(INET6)
869c54a18d2SRandall Stewart 	uint16_t param_type, param_length;
870c54a18d2SRandall Stewart 
871e6194c2eSMichael Tuexen 	param_type = ntohs(ph->param_type);
872e6194c2eSMichael Tuexen 	param_length = ntohs(ph->param_length);
873b54ddf22SMichael Tuexen #endif
874e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
875d6af161aSRandall Stewart #ifdef INET6
876e6194c2eSMichael Tuexen 	case AF_INET6:
877e6194c2eSMichael Tuexen 		{
878c54a18d2SRandall Stewart 			/* XXX scopeid */
879c54a18d2SRandall Stewart 			struct sockaddr_in6 *sin6 = (struct sockaddr_in6 *)sa;
880e6194c2eSMichael Tuexen 			struct sctp_ipv6addr_param *v6addr;
881c54a18d2SRandall Stewart 
882e6194c2eSMichael Tuexen 			v6addr = (struct sctp_ipv6addr_param *)ph;
883c54a18d2SRandall Stewart 			if ((param_type == SCTP_IPV6_ADDRESS) &&
884b54ddf22SMichael Tuexen 			    (param_length == sizeof(struct sctp_ipv6addr_param)) &&
885c54a18d2SRandall Stewart 			    (memcmp(&v6addr->addr, &sin6->sin6_addr,
886c54a18d2SRandall Stewart 			    sizeof(struct in6_addr)) == 0)) {
887c54a18d2SRandall Stewart 				return (1);
888c54a18d2SRandall Stewart 			}
889e6194c2eSMichael Tuexen 			break;
890d6af161aSRandall Stewart 		}
891d6af161aSRandall Stewart #endif
892e6194c2eSMichael Tuexen #ifdef INET
893e6194c2eSMichael Tuexen 	case AF_INET:
894e6194c2eSMichael Tuexen 		{
895c54a18d2SRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
896e6194c2eSMichael Tuexen 			struct sctp_ipv4addr_param *v4addr;
897c54a18d2SRandall Stewart 
898e6194c2eSMichael Tuexen 			v4addr = (struct sctp_ipv4addr_param *)ph;
899c54a18d2SRandall Stewart 			if ((param_type == SCTP_IPV4_ADDRESS) &&
900b54ddf22SMichael Tuexen 			    (param_length == sizeof(struct sctp_ipv4addr_param)) &&
901c54a18d2SRandall Stewart 			    (memcmp(&v4addr->addr, &sin->sin_addr,
902c54a18d2SRandall Stewart 			    sizeof(struct in_addr)) == 0)) {
903c54a18d2SRandall Stewart 				return (1);
904c54a18d2SRandall Stewart 			}
905e6194c2eSMichael Tuexen 			break;
906e6194c2eSMichael Tuexen 		}
907e6194c2eSMichael Tuexen #endif
908e6194c2eSMichael Tuexen 	default:
909e6194c2eSMichael Tuexen 		break;
910c54a18d2SRandall Stewart 	}
911c54a18d2SRandall Stewart 	return (0);
912c54a18d2SRandall Stewart }
913c54a18d2SRandall Stewart 
914c54a18d2SRandall Stewart /*
915f8829a4aSRandall Stewart  * Cleanup for non-responded/OP ERR'd ASCONF
916f8829a4aSRandall Stewart  */
917f8829a4aSRandall Stewart void
918f8829a4aSRandall Stewart sctp_asconf_cleanup(struct sctp_tcb *stcb, struct sctp_nets *net)
919f8829a4aSRandall Stewart {
920f8829a4aSRandall Stewart 	/*
921f8829a4aSRandall Stewart 	 * clear out any existing asconfs going out
922f8829a4aSRandall Stewart 	 */
9233c503c28SRandall Stewart 	sctp_timer_stop(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep, stcb, net,
9243c503c28SRandall Stewart 	    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_2);
925c54a18d2SRandall Stewart 	stcb->asoc.asconf_seq_out_acked = stcb->asoc.asconf_seq_out;
926f8829a4aSRandall Stewart 	/* remove the old ASCONF on our outbound queue */
927f8829a4aSRandall Stewart 	sctp_toss_old_asconf(stcb);
928f8829a4aSRandall Stewart }
929f8829a4aSRandall Stewart 
930f8829a4aSRandall Stewart /*
9312dad8a55SRandall Stewart  * cleanup any cached source addresses that may be topologically
9322dad8a55SRandall Stewart  * incorrect after a new address has been added to this interface.
9332dad8a55SRandall Stewart  */
9342dad8a55SRandall Stewart static void
9352dad8a55SRandall Stewart sctp_asconf_nets_cleanup(struct sctp_tcb *stcb, struct sctp_ifn *ifn)
9362dad8a55SRandall Stewart {
9372dad8a55SRandall Stewart 	struct sctp_nets *net;
9382dad8a55SRandall Stewart 
9392dad8a55SRandall Stewart 	/*
9402dad8a55SRandall Stewart 	 * Ideally, we want to only clear cached routes and source addresses
9412dad8a55SRandall Stewart 	 * that are topologically incorrect.  But since there is no easy way
9422dad8a55SRandall Stewart 	 * to know whether the newly added address on the ifn would cause a
9432dad8a55SRandall Stewart 	 * routing change (i.e. a new egress interface would be chosen)
9442dad8a55SRandall Stewart 	 * without doing a new routing lookup and source address selection,
9452dad8a55SRandall Stewart 	 * we will (for now) just flush any cached route using a different
9462dad8a55SRandall Stewart 	 * ifn (and cached source addrs) and let output re-choose them
9472dad8a55SRandall Stewart 	 * during the next send on that net.
9482dad8a55SRandall Stewart 	 */
9492dad8a55SRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
9502dad8a55SRandall Stewart 		/*
9512dad8a55SRandall Stewart 		 * clear any cached route (and cached source address) if the
9522dad8a55SRandall Stewart 		 * route's interface is NOT the same as the address change.
9532dad8a55SRandall Stewart 		 * If it's the same interface, just clear the cached source
9542dad8a55SRandall Stewart 		 * address.
9552dad8a55SRandall Stewart 		 */
9562dad8a55SRandall Stewart 		if (SCTP_ROUTE_HAS_VALID_IFN(&net->ro) &&
957fc066a61SMichael Tuexen 		    ((ifn == NULL) ||
958fc066a61SMichael Tuexen 		    (SCTP_GET_IF_INDEX_FROM_ROUTE(&net->ro) != ifn->ifn_index))) {
9592dad8a55SRandall Stewart 			/* clear any cached route */
9602dad8a55SRandall Stewart 			RTFREE(net->ro.ro_rt);
9612dad8a55SRandall Stewart 			net->ro.ro_rt = NULL;
9622dad8a55SRandall Stewart 		}
9632dad8a55SRandall Stewart 		/* clear any cached source address */
9642dad8a55SRandall Stewart 		if (net->src_addr_selected) {
9652dad8a55SRandall Stewart 			sctp_free_ifa(net->ro._s_addr);
9662dad8a55SRandall Stewart 			net->ro._s_addr = NULL;
9672dad8a55SRandall Stewart 			net->src_addr_selected = 0;
9682dad8a55SRandall Stewart 		}
9692dad8a55SRandall Stewart 	}
9702dad8a55SRandall Stewart }
9712dad8a55SRandall Stewart 
972851b7298SRandall Stewart 
973851b7298SRandall Stewart void
974851b7298SRandall Stewart sctp_assoc_immediate_retrans(struct sctp_tcb *stcb, struct sctp_nets *dstnet)
975851b7298SRandall Stewart {
976851b7298SRandall Stewart 	int error;
977851b7298SRandall Stewart 
978851b7298SRandall Stewart 	if (dstnet->dest_state & SCTP_ADDR_UNCONFIRMED) {
979851b7298SRandall Stewart 		return;
980851b7298SRandall Stewart 	}
981851b7298SRandall Stewart 	if (stcb->asoc.deleted_primary == NULL) {
982851b7298SRandall Stewart 		return;
983851b7298SRandall Stewart 	}
9840053ed28SMichael Tuexen 
985851b7298SRandall Stewart 	if (!TAILQ_EMPTY(&stcb->asoc.sent_queue)) {
986b27a6b7dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "assoc_immediate_retrans: Deleted primary is ");
987851b7298SRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, &stcb->asoc.deleted_primary->ro._l_addr.sa);
988851b7298SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "Current Primary is ");
989851b7298SRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, &stcb->asoc.primary_destination->ro._l_addr.sa);
990851b7298SRandall Stewart 		sctp_timer_stop(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep, stcb,
991851b7298SRandall Stewart 		    stcb->asoc.deleted_primary,
992b7d130beSMichael Tuexen 		    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_3);
993851b7298SRandall Stewart 		stcb->asoc.num_send_timers_up--;
994851b7298SRandall Stewart 		if (stcb->asoc.num_send_timers_up < 0) {
995851b7298SRandall Stewart 			stcb->asoc.num_send_timers_up = 0;
996851b7298SRandall Stewart 		}
997851b7298SRandall Stewart 		SCTP_TCB_LOCK_ASSERT(stcb);
998851b7298SRandall Stewart 		error = sctp_t3rxt_timer(stcb->sctp_ep, stcb,
999851b7298SRandall Stewart 		    stcb->asoc.deleted_primary);
1000851b7298SRandall Stewart 		if (error) {
1001851b7298SRandall Stewart 			SCTP_INP_DECR_REF(stcb->sctp_ep);
1002851b7298SRandall Stewart 			return;
1003851b7298SRandall Stewart 		}
1004851b7298SRandall Stewart 		SCTP_TCB_LOCK_ASSERT(stcb);
1005851b7298SRandall Stewart #ifdef SCTP_AUDITING_ENABLED
1006f31e6c7fSMichael Tuexen 		sctp_auditing(4, stcb->sctp_ep, stcb, stcb->asoc.deleted_primary);
1007851b7298SRandall Stewart #endif
1008851b7298SRandall Stewart 		sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_NOT_LOCKED);
1009851b7298SRandall Stewart 		if ((stcb->asoc.num_send_timers_up == 0) &&
1010851b7298SRandall Stewart 		    (stcb->asoc.sent_queue_cnt > 0)) {
1011851b7298SRandall Stewart 			struct sctp_tmit_chunk *chk;
1012851b7298SRandall Stewart 
1013851b7298SRandall Stewart 			chk = TAILQ_FIRST(&stcb->asoc.sent_queue);
1014851b7298SRandall Stewart 			sctp_timer_start(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep,
1015851b7298SRandall Stewart 			    stcb, chk->whoTo);
1016851b7298SRandall Stewart 		}
1017851b7298SRandall Stewart 	}
1018851b7298SRandall Stewart 	return;
1019851b7298SRandall Stewart }
1020851b7298SRandall Stewart 
10212afb3e84SRandall Stewart static int
10222afb3e84SRandall Stewart     sctp_asconf_queue_mgmt(struct sctp_tcb *, struct sctp_ifa *, uint16_t);
10232afb3e84SRandall Stewart 
1024851b7298SRandall Stewart void
10252afb3e84SRandall Stewart sctp_net_immediate_retrans(struct sctp_tcb *stcb, struct sctp_nets *net)
10262afb3e84SRandall Stewart {
10272afb3e84SRandall Stewart 	struct sctp_tmit_chunk *chk;
10282afb3e84SRandall Stewart 
1029b27a6b7dSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1, "net_immediate_retrans: RTO is %d\n", net->RTO);
10302afb3e84SRandall Stewart 	sctp_timer_stop(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep, stcb, net,
1031b7d130beSMichael Tuexen 	    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_4);
10322afb3e84SRandall Stewart 	stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
10332afb3e84SRandall Stewart 	net->error_count = 0;
10342afb3e84SRandall Stewart 	TAILQ_FOREACH(chk, &stcb->asoc.sent_queue, sctp_next) {
10352afb3e84SRandall Stewart 		if (chk->whoTo == net) {
1036851b7298SRandall Stewart 			if (chk->sent < SCTP_DATAGRAM_RESEND) {
10372afb3e84SRandall Stewart 				chk->sent = SCTP_DATAGRAM_RESEND;
10382afb3e84SRandall Stewart 				sctp_ucount_incr(stcb->asoc.sent_queue_retran_cnt);
1039d55b0b1bSRandall Stewart 				sctp_flight_size_decrease(chk);
1040d55b0b1bSRandall Stewart 				sctp_total_flight_decrease(stcb, chk);
1041d55b0b1bSRandall Stewart 				net->marked_retrans++;
1042d55b0b1bSRandall Stewart 				stcb->asoc.marked_retrans++;
10432afb3e84SRandall Stewart 			}
10442afb3e84SRandall Stewart 		}
10452afb3e84SRandall Stewart 	}
1046d55b0b1bSRandall Stewart 	if (net->marked_retrans) {
1047d55b0b1bSRandall Stewart 		sctp_chunk_output(stcb->sctp_ep, stcb, SCTP_OUTPUT_FROM_T3, SCTP_SO_NOT_LOCKED);
1048d55b0b1bSRandall Stewart 	}
1049851b7298SRandall Stewart }
10502afb3e84SRandall Stewart 
10512afb3e84SRandall Stewart static void
10522afb3e84SRandall Stewart sctp_path_check_and_react(struct sctp_tcb *stcb, struct sctp_ifa *newifa)
10532afb3e84SRandall Stewart {
10542afb3e84SRandall Stewart 	struct sctp_nets *net;
10552afb3e84SRandall Stewart 	int addrnum, changed;
10562afb3e84SRandall Stewart 
10572afb3e84SRandall Stewart 	/*
10582afb3e84SRandall Stewart 	 * If number of local valid addresses is 1, the valid address is
10592afb3e84SRandall Stewart 	 * probably newly added address. Several valid addresses in this
10602afb3e84SRandall Stewart 	 * association.  A source address may not be changed.  Additionally,
10612afb3e84SRandall Stewart 	 * they can be configured on a same interface as "alias" addresses.
10622afb3e84SRandall Stewart 	 * (by micchie)
10632afb3e84SRandall Stewart 	 */
10642afb3e84SRandall Stewart 	addrnum = sctp_local_addr_count(stcb);
10652afb3e84SRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF1, "p_check_react(): %d local addresses\n",
10662afb3e84SRandall Stewart 	    addrnum);
10672afb3e84SRandall Stewart 	if (addrnum == 1) {
10682afb3e84SRandall Stewart 		TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
10692afb3e84SRandall Stewart 			/* clear any cached route and source address */
10702afb3e84SRandall Stewart 			if (net->ro.ro_rt) {
10712afb3e84SRandall Stewart 				RTFREE(net->ro.ro_rt);
10722afb3e84SRandall Stewart 				net->ro.ro_rt = NULL;
10732afb3e84SRandall Stewart 			}
10742afb3e84SRandall Stewart 			if (net->src_addr_selected) {
10752afb3e84SRandall Stewart 				sctp_free_ifa(net->ro._s_addr);
10762afb3e84SRandall Stewart 				net->ro._s_addr = NULL;
10772afb3e84SRandall Stewart 				net->src_addr_selected = 0;
10782afb3e84SRandall Stewart 			}
10792afb3e84SRandall Stewart 			/* Retransmit unacknowledged DATA chunks immediately */
10802afb3e84SRandall Stewart 			if (sctp_is_mobility_feature_on(stcb->sctp_ep,
10812afb3e84SRandall Stewart 			    SCTP_MOBILITY_FASTHANDOFF)) {
10822afb3e84SRandall Stewart 				sctp_net_immediate_retrans(stcb, net);
10832afb3e84SRandall Stewart 			}
10842afb3e84SRandall Stewart 			/* also, SET PRIMARY is maybe already sent */
10852afb3e84SRandall Stewart 		}
10862afb3e84SRandall Stewart 		return;
10872afb3e84SRandall Stewart 	}
10880053ed28SMichael Tuexen 
10892afb3e84SRandall Stewart 	/* Multiple local addresses exsist in the association.  */
10902afb3e84SRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
10912afb3e84SRandall Stewart 		/* clear any cached route and source address */
10922afb3e84SRandall Stewart 		if (net->ro.ro_rt) {
10932afb3e84SRandall Stewart 			RTFREE(net->ro.ro_rt);
10942afb3e84SRandall Stewart 			net->ro.ro_rt = NULL;
10952afb3e84SRandall Stewart 		}
10962afb3e84SRandall Stewart 		if (net->src_addr_selected) {
10972afb3e84SRandall Stewart 			sctp_free_ifa(net->ro._s_addr);
10982afb3e84SRandall Stewart 			net->ro._s_addr = NULL;
10992afb3e84SRandall Stewart 			net->src_addr_selected = 0;
11002afb3e84SRandall Stewart 		}
11012afb3e84SRandall Stewart 		/*
11022afb3e84SRandall Stewart 		 * Check if the nexthop is corresponding to the new address.
11032afb3e84SRandall Stewart 		 * If the new address is corresponding to the current
11042afb3e84SRandall Stewart 		 * nexthop, the path will be changed. If the new address is
11052afb3e84SRandall Stewart 		 * NOT corresponding to the current nexthop, the path will
11062afb3e84SRandall Stewart 		 * not be changed.
11072afb3e84SRandall Stewart 		 */
11082afb3e84SRandall Stewart 		SCTP_RTALLOC((sctp_route_t *)&net->ro,
1109d089f9b9SMichael Tuexen 		    stcb->sctp_ep->def_vrf_id,
1110d089f9b9SMichael Tuexen 		    stcb->sctp_ep->fibnum);
11112afb3e84SRandall Stewart 		if (net->ro.ro_rt == NULL)
11122afb3e84SRandall Stewart 			continue;
11132afb3e84SRandall Stewart 
11142afb3e84SRandall Stewart 		changed = 0;
1115e6194c2eSMichael Tuexen 		switch (net->ro._l_addr.sa.sa_family) {
1116e6194c2eSMichael Tuexen #ifdef INET
1117e6194c2eSMichael Tuexen 		case AF_INET:
1118e6194c2eSMichael Tuexen 			if (sctp_v4src_match_nexthop(newifa, (sctp_route_t *)&net->ro)) {
11192afb3e84SRandall Stewart 				changed = 1;
11202afb3e84SRandall Stewart 			}
1121e6194c2eSMichael Tuexen 			break;
11225e2c2d87SRandall Stewart #endif
1123e6194c2eSMichael Tuexen #ifdef INET6
1124e6194c2eSMichael Tuexen 		case AF_INET6:
1125e6194c2eSMichael Tuexen 			if (sctp_v6src_match_nexthop(
1126e6194c2eSMichael Tuexen 			    &newifa->address.sin6, (sctp_route_t *)&net->ro)) {
1127e6194c2eSMichael Tuexen 				changed = 1;
1128e6194c2eSMichael Tuexen 			}
1129e6194c2eSMichael Tuexen 			break;
1130e6194c2eSMichael Tuexen #endif
1131e6194c2eSMichael Tuexen 		default:
1132e6194c2eSMichael Tuexen 			break;
1133e6194c2eSMichael Tuexen 		}
11342afb3e84SRandall Stewart 		/*
11352afb3e84SRandall Stewart 		 * if the newly added address does not relate routing
11362afb3e84SRandall Stewart 		 * information, we skip.
11372afb3e84SRandall Stewart 		 */
11382afb3e84SRandall Stewart 		if (changed == 0)
11392afb3e84SRandall Stewart 			continue;
11402afb3e84SRandall Stewart 		/* Retransmit unacknowledged DATA chunks immediately */
11412afb3e84SRandall Stewart 		if (sctp_is_mobility_feature_on(stcb->sctp_ep,
11422afb3e84SRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) {
11432afb3e84SRandall Stewart 			sctp_net_immediate_retrans(stcb, net);
11442afb3e84SRandall Stewart 		}
11452afb3e84SRandall Stewart 		/* Send SET PRIMARY for this new address */
11462afb3e84SRandall Stewart 		if (net == stcb->asoc.primary_destination) {
11472afb3e84SRandall Stewart 			(void)sctp_asconf_queue_mgmt(stcb, newifa,
11482afb3e84SRandall Stewart 			    SCTP_SET_PRIM_ADDR);
11492afb3e84SRandall Stewart 		}
11502afb3e84SRandall Stewart 	}
11512afb3e84SRandall Stewart }
11522afb3e84SRandall Stewart 
11532dad8a55SRandall Stewart /*
1154f8829a4aSRandall Stewart  * process an ADD/DELETE IP ack from peer.
11551b649582SRandall Stewart  * addr: corresponding sctp_ifa to the address being added/deleted.
1156f8829a4aSRandall Stewart  * type: SCTP_ADD_IP_ADDRESS or SCTP_DEL_IP_ADDRESS.
1157f8829a4aSRandall Stewart  * flag: 1=success, 0=failure.
1158f8829a4aSRandall Stewart  */
1159f8829a4aSRandall Stewart static void
11607215cc1bSMichael Tuexen sctp_asconf_addr_mgmt_ack(struct sctp_tcb *stcb, struct sctp_ifa *addr, uint32_t flag)
1161f8829a4aSRandall Stewart {
1162f8829a4aSRandall Stewart 	/*
1163f8829a4aSRandall Stewart 	 * do the necessary asoc list work- if we get a failure indication,
11642dad8a55SRandall Stewart 	 * leave the address on the assoc's restricted list.  If we get a
11652dad8a55SRandall Stewart 	 * success indication, remove the address from the restricted list.
1166f8829a4aSRandall Stewart 	 */
1167f8829a4aSRandall Stewart 	/*
1168f8829a4aSRandall Stewart 	 * Note: this will only occur for ADD_IP_ADDRESS, since
1169f8829a4aSRandall Stewart 	 * DEL_IP_ADDRESS is never actually added to the list...
1170f8829a4aSRandall Stewart 	 */
1171f8829a4aSRandall Stewart 	if (flag) {
11721b649582SRandall Stewart 		/* success case, so remove from the restricted list */
11731b649582SRandall Stewart 		sctp_del_local_addr_restricted(stcb, addr);
11742dad8a55SRandall Stewart 
11753232788eSRandall Stewart 		if (sctp_is_mobility_feature_on(stcb->sctp_ep,
1176d55b0b1bSRandall Stewart 		    SCTP_MOBILITY_BASE) ||
1177d55b0b1bSRandall Stewart 		    sctp_is_mobility_feature_on(stcb->sctp_ep,
1178d55b0b1bSRandall Stewart 		    SCTP_MOBILITY_FASTHANDOFF)) {
11792afb3e84SRandall Stewart 			sctp_path_check_and_react(stcb, addr);
11802afb3e84SRandall Stewart 			return;
11812afb3e84SRandall Stewart 		}
11823232788eSRandall Stewart 		/* clear any cached/topologically incorrect source addresses */
11832dad8a55SRandall Stewart 		sctp_asconf_nets_cleanup(stcb, addr->ifn_p);
1184f8829a4aSRandall Stewart 	}
1185f8829a4aSRandall Stewart 	/* else, leave it on the list */
1186f8829a4aSRandall Stewart }
1187f8829a4aSRandall Stewart 
1188f8829a4aSRandall Stewart /*
11891b649582SRandall Stewart  * add an asconf add/delete/set primary IP address parameter to the queue.
1190f8829a4aSRandall Stewart  * type = SCTP_ADD_IP_ADDRESS, SCTP_DEL_IP_ADDRESS, SCTP_SET_PRIM_ADDR.
11911b649582SRandall Stewart  * returns 0 if queued, -1 if not queued/removed.
11921b649582SRandall Stewart  * NOTE: if adding, but a delete for the same address is already scheduled
11931b649582SRandall Stewart  * (and not yet sent out), simply remove it from queue.  Same for deleting
11941b649582SRandall Stewart  * an address already scheduled for add.  If a duplicate operation is found,
11951b649582SRandall Stewart  * ignore the new one.
1196f8829a4aSRandall Stewart  */
11971b649582SRandall Stewart static int
11981b649582SRandall Stewart sctp_asconf_queue_mgmt(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
119918e198d3SRandall Stewart     uint16_t type)
1200f8829a4aSRandall Stewart {
1201f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1202f8829a4aSRandall Stewart 
1203f8829a4aSRandall Stewart 	/* make sure the request isn't already in the queue */
12044a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1205f8829a4aSRandall Stewart 		/* address match? */
120642551e99SRandall Stewart 		if (sctp_asconf_addr_match(aa, &ifa->address.sa) == 0)
1207f8829a4aSRandall Stewart 			continue;
1208c54a18d2SRandall Stewart 		/*
1209c54a18d2SRandall Stewart 		 * is the request already in queue but not sent? pass the
1210c54a18d2SRandall Stewart 		 * request already sent in order to resolve the following
1211c54a18d2SRandall Stewart 		 * case: 1. arrival of ADD, then sent 2. arrival of DEL. we
1212c54a18d2SRandall Stewart 		 * can't remove the ADD request already sent 3. arrival of
1213c54a18d2SRandall Stewart 		 * ADD
1214c54a18d2SRandall Stewart 		 */
1215c54a18d2SRandall Stewart 		if (aa->ap.aph.ph.param_type == type && aa->sent == 0) {
1216f8829a4aSRandall Stewart 			return (-1);
1217f8829a4aSRandall Stewart 		}
1218f8829a4aSRandall Stewart 		/* is the negative request already in queue, and not sent */
12191b649582SRandall Stewart 		if ((aa->sent == 0) && (type == SCTP_ADD_IP_ADDRESS) &&
12201b649582SRandall Stewart 		    (aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS)) {
1221f8829a4aSRandall Stewart 			/* add requested, delete already queued */
1222f8829a4aSRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
12231b649582SRandall Stewart 			/* remove the ifa from the restricted list */
12241b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, ifa);
12251b649582SRandall Stewart 			/* free the asconf param */
1226207304d4SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
12271b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_mgmt: add removes queued entry\n");
12281b649582SRandall Stewart 			return (-1);
12291b649582SRandall Stewart 		}
12301b649582SRandall Stewart 		if ((aa->sent == 0) && (type == SCTP_DEL_IP_ADDRESS) &&
12311b649582SRandall Stewart 		    (aa->ap.aph.ph.param_type == SCTP_ADD_IP_ADDRESS)) {
12321b649582SRandall Stewart 			/* delete requested, add already queued */
12331b649582SRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
12341b649582SRandall Stewart 			/* remove the aa->ifa from the restricted list */
12351b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, aa->ifa);
12361b649582SRandall Stewart 			/* free the asconf param */
12371b649582SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
12381b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_mgmt: delete removes queued entry\n");
1239f8829a4aSRandall Stewart 			return (-1);
1240f8829a4aSRandall Stewart 		}
1241f8829a4aSRandall Stewart 	}			/* for each aa */
1242f8829a4aSRandall Stewart 
1243f8829a4aSRandall Stewart 	/* adding new request to the queue */
12441b649582SRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
12451b649582SRandall Stewart 	    SCTP_M_ASC_ADDR);
1246f8829a4aSRandall Stewart 	if (aa == NULL) {
1247f8829a4aSRandall Stewart 		/* didn't get memory */
12481b649582SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "asconf_queue_mgmt: failed to get memory!\n");
1249f8829a4aSRandall Stewart 		return (-1);
1250f8829a4aSRandall Stewart 	}
1251830d754dSRandall Stewart 	aa->special_del = 0;
1252f8829a4aSRandall Stewart 	/* fill in asconf address parameter fields */
1253f8829a4aSRandall Stewart 	/* top level elements are "networked" during send */
1254f8829a4aSRandall Stewart 	aa->ap.aph.ph.param_type = type;
1255f8829a4aSRandall Stewart 	aa->ifa = ifa;
1256bff64a4dSRandall Stewart 	atomic_add_int(&ifa->refcount, 1);
1257f8829a4aSRandall Stewart 	/* correlation_id filled in during send routine later... */
1258e6194c2eSMichael Tuexen 	switch (ifa->address.sa.sa_family) {
1259e6194c2eSMichael Tuexen #ifdef INET6
1260e6194c2eSMichael Tuexen 	case AF_INET6:
1261e6194c2eSMichael Tuexen 		{
1262f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1263f8829a4aSRandall Stewart 
126424aaac8dSMichael Tuexen 			sin6 = &ifa->address.sin6;
1265f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
1266f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv6addr_param));
12671b649582SRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) +
1268f8829a4aSRandall Stewart 			    sizeof(struct sctp_ipv6addr_param);
1269f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin6->sin6_addr,
1270f8829a4aSRandall Stewart 			    sizeof(struct in6_addr));
1271e6194c2eSMichael Tuexen 			break;
1272e6194c2eSMichael Tuexen 		}
1273e6194c2eSMichael Tuexen #endif
1274e6194c2eSMichael Tuexen #ifdef INET
1275e6194c2eSMichael Tuexen 	case AF_INET:
1276e6194c2eSMichael Tuexen 		{
12771b649582SRandall Stewart 			struct sockaddr_in *sin;
1278f8829a4aSRandall Stewart 
127924aaac8dSMichael Tuexen 			sin = &ifa->address.sin;
1280f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
1281f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv4addr_param));
12821b649582SRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) +
1283f8829a4aSRandall Stewart 			    sizeof(struct sctp_ipv4addr_param);
1284f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin->sin_addr,
1285f8829a4aSRandall Stewart 			    sizeof(struct in_addr));
1286e6194c2eSMichael Tuexen 			break;
1287e6194c2eSMichael Tuexen 		}
1288e6194c2eSMichael Tuexen #endif
1289e6194c2eSMichael Tuexen 	default:
1290f8829a4aSRandall Stewart 		/* invalid family! */
1291207304d4SRandall Stewart 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
12923232788eSRandall Stewart 		sctp_free_ifa(ifa);
1293f8829a4aSRandall Stewart 		return (-1);
1294f8829a4aSRandall Stewart 	}
1295f8829a4aSRandall Stewart 	aa->sent = 0;		/* clear sent flag */
1296f8829a4aSRandall Stewart 
1297f8829a4aSRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
1298f8829a4aSRandall Stewart #ifdef SCTP_DEBUG
1299dec0177dSRandall Stewart 	if (SCTP_BASE_SYSCTL(sctp_debug_on) & SCTP_DEBUG_ASCONF2) {
1300c54a18d2SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
1301c54a18d2SRandall Stewart 			SCTP_PRINTF("asconf_queue_mgmt: inserted asconf ADD_IP_ADDRESS: ");
130288a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1303c54a18d2SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
13041b649582SRandall Stewart 			SCTP_PRINTF("asconf_queue_mgmt: appended asconf DEL_IP_ADDRESS: ");
130588a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1306f8829a4aSRandall Stewart 		} else {
13071b649582SRandall Stewart 			SCTP_PRINTF("asconf_queue_mgmt: appended asconf SET_PRIM_ADDR: ");
130888a95b1fSMichael Tuexen 			SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, &ifa->address.sa);
1309f8829a4aSRandall Stewart 		}
1310f8829a4aSRandall Stewart 	}
1311ad81507eSRandall Stewart #endif
1312f8829a4aSRandall Stewart 
1313f8829a4aSRandall Stewart 	return (0);
1314f8829a4aSRandall Stewart }
1315f8829a4aSRandall Stewart 
13161b649582SRandall Stewart 
13171b649582SRandall Stewart /*
13181b649582SRandall Stewart  * add an asconf operation for the given ifa and type.
13191b649582SRandall Stewart  * type = SCTP_ADD_IP_ADDRESS, SCTP_DEL_IP_ADDRESS, SCTP_SET_PRIM_ADDR.
13201b649582SRandall Stewart  * returns 0 if completed, -1 if not completed, 1 if immediate send is
13211b649582SRandall Stewart  * advisable.
13221b649582SRandall Stewart  */
13231b649582SRandall Stewart static int
13241b649582SRandall Stewart sctp_asconf_queue_add(struct sctp_tcb *stcb, struct sctp_ifa *ifa,
13251b649582SRandall Stewart     uint16_t type)
13261b649582SRandall Stewart {
13271b649582SRandall Stewart 	uint32_t status;
13281b649582SRandall Stewart 	int pending_delete_queued = 0;
1329790a758dSMichael Tuexen 	int last;
13301b649582SRandall Stewart 
13311b649582SRandall Stewart 	/* see if peer supports ASCONF */
1332c79bec9cSMichael Tuexen 	if (stcb->asoc.asconf_supported == 0) {
13331b649582SRandall Stewart 		return (-1);
13341b649582SRandall Stewart 	}
13350053ed28SMichael Tuexen 
13361b649582SRandall Stewart 	/*
13371b649582SRandall Stewart 	 * if this is deleting the last address from the assoc, mark it as
13381b649582SRandall Stewart 	 * pending.
13391b649582SRandall Stewart 	 */
1340790a758dSMichael Tuexen 	if ((type == SCTP_DEL_IP_ADDRESS) && !stcb->asoc.asconf_del_pending) {
1341790a758dSMichael Tuexen 		if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
1342790a758dSMichael Tuexen 			last = (sctp_local_addr_count(stcb) == 0);
1343790a758dSMichael Tuexen 		} else {
1344790a758dSMichael Tuexen 			last = (sctp_local_addr_count(stcb) == 1);
1345790a758dSMichael Tuexen 		}
1346790a758dSMichael Tuexen 		if (last) {
13471b649582SRandall Stewart 			/* set the pending delete info only */
13481b649582SRandall Stewart 			stcb->asoc.asconf_del_pending = 1;
13491b649582SRandall Stewart 			stcb->asoc.asconf_addr_del_pending = ifa;
13501b649582SRandall Stewart 			atomic_add_int(&ifa->refcount, 1);
13511b649582SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF2,
13521b649582SRandall Stewart 			    "asconf_queue_add: mark delete last address pending\n");
13531b649582SRandall Stewart 			return (-1);
13541b649582SRandall Stewart 		}
1355790a758dSMichael Tuexen 	}
13560053ed28SMichael Tuexen 
1357c54a18d2SRandall Stewart 	/* queue an asconf parameter */
1358c54a18d2SRandall Stewart 	status = sctp_asconf_queue_mgmt(stcb, ifa, type);
1359c54a18d2SRandall Stewart 
13601b649582SRandall Stewart 	/*
13611b649582SRandall Stewart 	 * if this is an add, and there is a delete also pending (i.e. the
13621b649582SRandall Stewart 	 * last local address is being changed), queue the pending delete
13631b649582SRandall Stewart 	 * too.
13641b649582SRandall Stewart 	 */
1365c54a18d2SRandall Stewart 	if ((type == SCTP_ADD_IP_ADDRESS) && stcb->asoc.asconf_del_pending && (status == 0)) {
13661b649582SRandall Stewart 		/* queue in the pending delete */
13671b649582SRandall Stewart 		if (sctp_asconf_queue_mgmt(stcb,
13681b649582SRandall Stewart 		    stcb->asoc.asconf_addr_del_pending,
13691b649582SRandall Stewart 		    SCTP_DEL_IP_ADDRESS) == 0) {
137047d16bf9SMichael Tuexen 			SCTPDBG(SCTP_DEBUG_ASCONF2, "asconf_queue_add: queuing pending delete\n");
13711b649582SRandall Stewart 			pending_delete_queued = 1;
13721b649582SRandall Stewart 			/* clear out the pending delete info */
13731b649582SRandall Stewart 			stcb->asoc.asconf_del_pending = 0;
13741b649582SRandall Stewart 			sctp_free_ifa(stcb->asoc.asconf_addr_del_pending);
13751b649582SRandall Stewart 			stcb->asoc.asconf_addr_del_pending = NULL;
13761b649582SRandall Stewart 		}
13771b649582SRandall Stewart 	}
13780053ed28SMichael Tuexen 
1379c54a18d2SRandall Stewart 	if (pending_delete_queued) {
13801b649582SRandall Stewart 		struct sctp_nets *net;
13811b649582SRandall Stewart 
13821b649582SRandall Stewart 		/*
13831b649582SRandall Stewart 		 * since we know that the only/last address is now being
13841b649582SRandall Stewart 		 * changed in this case, reset the cwnd/rto on all nets to
13851b649582SRandall Stewart 		 * start as a new address and path.  Also clear the error
13861b649582SRandall Stewart 		 * counts to give the assoc the best chance to complete the
13871b649582SRandall Stewart 		 * address change.
13881b649582SRandall Stewart 		 */
13891b649582SRandall Stewart 		TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
13901b649582SRandall Stewart 			stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb,
13911b649582SRandall Stewart 			    net);
13921b649582SRandall Stewart 			net->RTO = 0;
13931b649582SRandall Stewart 			net->error_count = 0;
13941b649582SRandall Stewart 		}
13951b649582SRandall Stewart 		stcb->asoc.overall_error_count = 0;
1396b3f1ea41SRandall Stewart 		if (SCTP_BASE_SYSCTL(sctp_logging_level) & SCTP_THRESHOLD_LOGGING) {
1397c4739e2fSRandall Stewart 			sctp_misc_ints(SCTP_THRESHOLD_CLEAR,
1398c4739e2fSRandall Stewart 			    stcb->asoc.overall_error_count,
1399c4739e2fSRandall Stewart 			    0,
1400c4739e2fSRandall Stewart 			    SCTP_FROM_SCTP_ASCONF,
1401c4739e2fSRandall Stewart 			    __LINE__);
1402c4739e2fSRandall Stewart 		}
14030053ed28SMichael Tuexen 
14041b649582SRandall Stewart 		/* queue in an advisory set primary too */
14051b649582SRandall Stewart 		(void)sctp_asconf_queue_mgmt(stcb, ifa, SCTP_SET_PRIM_ADDR);
14061b649582SRandall Stewart 		/* let caller know we should send this out immediately */
14071b649582SRandall Stewart 		status = 1;
14081b649582SRandall Stewart 	}
14091b649582SRandall Stewart 	return (status);
14101b649582SRandall Stewart }
14111b649582SRandall Stewart 
14123232788eSRandall Stewart /*-
14133232788eSRandall Stewart  * add an asconf delete IP address parameter to the queue by sockaddr and
14143232788eSRandall Stewart  * possibly with no sctp_ifa available.  This is only called by the routine
14153232788eSRandall Stewart  * that checks the addresses in an INIT-ACK against the current address list.
1416f8829a4aSRandall Stewart  * returns 0 if completed, non-zero if not completed.
14173232788eSRandall Stewart  * NOTE: if an add is already scheduled (and not yet sent out), simply
14183232788eSRandall Stewart  * remove it from queue.  If a duplicate operation is found, ignore the
14193232788eSRandall Stewart  * new one.
1420f8829a4aSRandall Stewart  */
14211b649582SRandall Stewart static int
14223232788eSRandall Stewart sctp_asconf_queue_sa_delete(struct sctp_tcb *stcb, struct sockaddr *sa)
1423f8829a4aSRandall Stewart {
1424bff64a4dSRandall Stewart 	struct sctp_ifa *ifa;
1425f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1426f8829a4aSRandall Stewart 
1427ad81507eSRandall Stewart 	if (stcb == NULL) {
1428ad81507eSRandall Stewart 		return (-1);
1429ad81507eSRandall Stewart 	}
1430f8829a4aSRandall Stewart 	/* see if peer supports ASCONF */
1431c79bec9cSMichael Tuexen 	if (stcb->asoc.asconf_supported == 0) {
1432f8829a4aSRandall Stewart 		return (-1);
1433f8829a4aSRandall Stewart 	}
1434f8829a4aSRandall Stewart 	/* make sure the request isn't already in the queue */
14354a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1436f8829a4aSRandall Stewart 		/* address match? */
1437f8829a4aSRandall Stewart 		if (sctp_asconf_addr_match(aa, sa) == 0)
1438f8829a4aSRandall Stewart 			continue;
1439f8829a4aSRandall Stewart 		/* is the request already in queue (sent or not) */
14403232788eSRandall Stewart 		if (aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS) {
1441f8829a4aSRandall Stewart 			return (-1);
1442f8829a4aSRandall Stewart 		}
1443f8829a4aSRandall Stewart 		/* is the negative request already in queue, and not sent */
1444f8829a4aSRandall Stewart 		if (aa->sent == 1)
1445f8829a4aSRandall Stewart 			continue;
14463232788eSRandall Stewart 		if (aa->ap.aph.ph.param_type == SCTP_ADD_IP_ADDRESS) {
14473232788eSRandall Stewart 			/* add already queued, so remove existing entry */
1448f8829a4aSRandall Stewart 			TAILQ_REMOVE(&stcb->asoc.asconf_queue, aa, next);
14491b649582SRandall Stewart 			sctp_del_local_addr_restricted(stcb, aa->ifa);
1450f8829a4aSRandall Stewart 			/* free the entry */
1451207304d4SRandall Stewart 			SCTP_FREE(aa, SCTP_M_ASC_ADDR);
1452f8829a4aSRandall Stewart 			return (-1);
1453f8829a4aSRandall Stewart 		}
1454f8829a4aSRandall Stewart 	}			/* for each aa */
14553232788eSRandall Stewart 
14563232788eSRandall Stewart 	/* find any existing ifa-- NOTE ifa CAN be allowed to be NULL */
1457448e8596SMichael Tuexen 	ifa = sctp_find_ifa_by_addr(sa, stcb->asoc.vrf_id, SCTP_ADDR_NOT_LOCKED);
14583232788eSRandall Stewart 
1459f8829a4aSRandall Stewart 	/* adding new request to the queue */
14601b649582SRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
14611b649582SRandall Stewart 	    SCTP_M_ASC_ADDR);
1462f8829a4aSRandall Stewart 	if (aa == NULL) {
1463f8829a4aSRandall Stewart 		/* didn't get memory */
1464ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
14653232788eSRandall Stewart 		    "sctp_asconf_queue_sa_delete: failed to get memory!\n");
1466f8829a4aSRandall Stewart 		return (-1);
1467f8829a4aSRandall Stewart 	}
1468830d754dSRandall Stewart 	aa->special_del = 0;
1469f8829a4aSRandall Stewart 	/* fill in asconf address parameter fields */
1470f8829a4aSRandall Stewart 	/* top level elements are "networked" during send */
14713232788eSRandall Stewart 	aa->ap.aph.ph.param_type = SCTP_DEL_IP_ADDRESS;
1472bff64a4dSRandall Stewart 	aa->ifa = ifa;
14733232788eSRandall Stewart 	if (ifa)
1474bff64a4dSRandall Stewart 		atomic_add_int(&ifa->refcount, 1);
1475f8829a4aSRandall Stewart 	/* correlation_id filled in during send routine later... */
1476e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
1477e6194c2eSMichael Tuexen #ifdef INET6
1478e6194c2eSMichael Tuexen 	case AF_INET6:
1479e6194c2eSMichael Tuexen 		{
1480f8829a4aSRandall Stewart 			/* IPv6 address */
1481f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1482f8829a4aSRandall Stewart 
1483f8829a4aSRandall Stewart 			sin6 = (struct sockaddr_in6 *)sa;
1484f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
1485f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv6addr_param));
1486f8829a4aSRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) + sizeof(struct sctp_ipv6addr_param);
1487f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin6->sin6_addr,
1488f8829a4aSRandall Stewart 			    sizeof(struct in6_addr));
1489e6194c2eSMichael Tuexen 			break;
1490e6194c2eSMichael Tuexen 		}
1491e6194c2eSMichael Tuexen #endif
1492e6194c2eSMichael Tuexen #ifdef INET
1493e6194c2eSMichael Tuexen 	case AF_INET:
1494e6194c2eSMichael Tuexen 		{
1495f8829a4aSRandall Stewart 			/* IPv4 address */
1496f8829a4aSRandall Stewart 			struct sockaddr_in *sin = (struct sockaddr_in *)sa;
1497f8829a4aSRandall Stewart 
1498f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
1499f8829a4aSRandall Stewart 			aa->ap.addrp.ph.param_length = (sizeof(struct sctp_ipv4addr_param));
1500f8829a4aSRandall Stewart 			aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_paramhdr) + sizeof(struct sctp_ipv4addr_param);
1501f8829a4aSRandall Stewart 			memcpy(&aa->ap.addrp.addr, &sin->sin_addr,
1502f8829a4aSRandall Stewart 			    sizeof(struct in_addr));
1503e6194c2eSMichael Tuexen 			break;
1504e6194c2eSMichael Tuexen 		}
1505e6194c2eSMichael Tuexen #endif
1506e6194c2eSMichael Tuexen 	default:
1507f8829a4aSRandall Stewart 		/* invalid family! */
1508207304d4SRandall Stewart 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
15093232788eSRandall Stewart 		if (ifa)
15103232788eSRandall Stewart 			sctp_free_ifa(ifa);
1511f8829a4aSRandall Stewart 		return (-1);
1512f8829a4aSRandall Stewart 	}
1513f8829a4aSRandall Stewart 	aa->sent = 0;		/* clear sent flag */
1514f8829a4aSRandall Stewart 
15153232788eSRandall Stewart 	/* delete goes to the back of the queue */
1516f8829a4aSRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
1517f8829a4aSRandall Stewart 
1518c99efcf6SRandall Stewart 	/* sa_ignore MEMLEAK {memory is put on the tailq} */
1519f8829a4aSRandall Stewart 	return (0);
1520f8829a4aSRandall Stewart }
1521f8829a4aSRandall Stewart 
1522f8829a4aSRandall Stewart /*
1523f8829a4aSRandall Stewart  * find a specific asconf param on our "sent" queue
1524f8829a4aSRandall Stewart  */
1525f8829a4aSRandall Stewart static struct sctp_asconf_addr *
1526f8829a4aSRandall Stewart sctp_asconf_find_param(struct sctp_tcb *stcb, uint32_t correlation_id)
1527f8829a4aSRandall Stewart {
1528f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa;
1529f8829a4aSRandall Stewart 
1530f8829a4aSRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
1531f8829a4aSRandall Stewart 		if (aa->ap.aph.correlation_id == correlation_id &&
1532f8829a4aSRandall Stewart 		    aa->sent == 1) {
1533f8829a4aSRandall Stewart 			/* found it */
1534f8829a4aSRandall Stewart 			return (aa);
1535f8829a4aSRandall Stewart 		}
1536f8829a4aSRandall Stewart 	}
1537f8829a4aSRandall Stewart 	/* didn't find it */
1538f8829a4aSRandall Stewart 	return (NULL);
1539f8829a4aSRandall Stewart }
1540f8829a4aSRandall Stewart 
1541f8829a4aSRandall Stewart /*
1542f8829a4aSRandall Stewart  * process an SCTP_ERROR_CAUSE_IND for a ASCONF-ACK parameter and do
1543f8829a4aSRandall Stewart  * notifications based on the error response
1544f8829a4aSRandall Stewart  */
1545f8829a4aSRandall Stewart static void
1546c79bec9cSMichael Tuexen sctp_asconf_process_error(struct sctp_tcb *stcb SCTP_UNUSED,
1547f8829a4aSRandall Stewart     struct sctp_asconf_paramhdr *aph)
1548f8829a4aSRandall Stewart {
1549f8829a4aSRandall Stewart 	struct sctp_error_cause *eh;
1550f8829a4aSRandall Stewart 	struct sctp_paramhdr *ph;
1551f8829a4aSRandall Stewart 	uint16_t param_type;
1552f8829a4aSRandall Stewart 	uint16_t error_code;
1553f8829a4aSRandall Stewart 
1554f8829a4aSRandall Stewart 	eh = (struct sctp_error_cause *)(aph + 1);
1555f8829a4aSRandall Stewart 	ph = (struct sctp_paramhdr *)(eh + 1);
1556f8829a4aSRandall Stewart 	/* validate lengths */
1557f8829a4aSRandall Stewart 	if (htons(eh->length) + sizeof(struct sctp_error_cause) >
1558f8829a4aSRandall Stewart 	    htons(aph->ph.param_length)) {
1559f8829a4aSRandall Stewart 		/* invalid error cause length */
1560ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1561ad81507eSRandall Stewart 		    "asconf_process_error: cause element too long\n");
1562f8829a4aSRandall Stewart 		return;
1563f8829a4aSRandall Stewart 	}
1564f8829a4aSRandall Stewart 	if (htons(ph->param_length) + sizeof(struct sctp_paramhdr) >
1565f8829a4aSRandall Stewart 	    htons(eh->length)) {
1566f8829a4aSRandall Stewart 		/* invalid included TLV length */
1567ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1568ad81507eSRandall Stewart 		    "asconf_process_error: included TLV too long\n");
1569f8829a4aSRandall Stewart 		return;
1570f8829a4aSRandall Stewart 	}
1571f8829a4aSRandall Stewart 	/* which error code ? */
1572f8829a4aSRandall Stewart 	error_code = ntohs(eh->code);
1573f8829a4aSRandall Stewart 	param_type = ntohs(aph->ph.param_type);
1574f8829a4aSRandall Stewart 	/* FIX: this should go back up the REMOTE_ERROR ULP notify */
1575f8829a4aSRandall Stewart 	switch (error_code) {
1576f8829a4aSRandall Stewart 	case SCTP_CAUSE_RESOURCE_SHORTAGE:
1577f8829a4aSRandall Stewart 		/* we allow ourselves to "try again" for this error */
1578f8829a4aSRandall Stewart 		break;
1579f8829a4aSRandall Stewart 	default:
1580f8829a4aSRandall Stewart 		/* peer can't handle it... */
1581f8829a4aSRandall Stewart 		switch (param_type) {
1582f8829a4aSRandall Stewart 		case SCTP_ADD_IP_ADDRESS:
1583f8829a4aSRandall Stewart 		case SCTP_DEL_IP_ADDRESS:
1584f8829a4aSRandall Stewart 		case SCTP_SET_PRIM_ADDR:
1585f8829a4aSRandall Stewart 			break;
1586f8829a4aSRandall Stewart 		default:
1587f8829a4aSRandall Stewart 			break;
1588f8829a4aSRandall Stewart 		}
1589f8829a4aSRandall Stewart 	}
1590f8829a4aSRandall Stewart }
1591f8829a4aSRandall Stewart 
1592f8829a4aSRandall Stewart /*
159318e198d3SRandall Stewart  * process an asconf queue param.
159418e198d3SRandall Stewart  * aparam: parameter to process, will be removed from the queue.
159518e198d3SRandall Stewart  * flag: 1=success case, 0=failure case
1596f8829a4aSRandall Stewart  */
1597f8829a4aSRandall Stewart static void
1598f8829a4aSRandall Stewart sctp_asconf_process_param_ack(struct sctp_tcb *stcb,
1599f8829a4aSRandall Stewart     struct sctp_asconf_addr *aparam, uint32_t flag)
1600f8829a4aSRandall Stewart {
1601f8829a4aSRandall Stewart 	uint16_t param_type;
1602f8829a4aSRandall Stewart 
1603f8829a4aSRandall Stewart 	/* process this param */
1604f8829a4aSRandall Stewart 	param_type = aparam->ap.aph.ph.param_type;
1605f8829a4aSRandall Stewart 	switch (param_type) {
1606f8829a4aSRandall Stewart 	case SCTP_ADD_IP_ADDRESS:
1607ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1608ad81507eSRandall Stewart 		    "process_param_ack: added IP address\n");
16097215cc1bSMichael Tuexen 		sctp_asconf_addr_mgmt_ack(stcb, aparam->ifa, flag);
1610f8829a4aSRandall Stewart 		break;
1611f8829a4aSRandall Stewart 	case SCTP_DEL_IP_ADDRESS:
1612ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1613ad81507eSRandall Stewart 		    "process_param_ack: deleted IP address\n");
1614f8829a4aSRandall Stewart 		/* nothing really to do... lists already updated */
1615f8829a4aSRandall Stewart 		break;
1616f8829a4aSRandall Stewart 	case SCTP_SET_PRIM_ADDR:
1617c54a18d2SRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1618c54a18d2SRandall Stewart 		    "process_param_ack: set primary IP address\n");
1619f8829a4aSRandall Stewart 		/* nothing to do... peer may start using this addr */
1620f8829a4aSRandall Stewart 		break;
1621f8829a4aSRandall Stewart 	default:
1622f8829a4aSRandall Stewart 		/* should NEVER happen */
1623f8829a4aSRandall Stewart 		break;
1624f8829a4aSRandall Stewart 	}
1625f8829a4aSRandall Stewart 
1626f8829a4aSRandall Stewart 	/* remove the param and free it */
1627f8829a4aSRandall Stewart 	TAILQ_REMOVE(&stcb->asoc.asconf_queue, aparam, next);
16283232788eSRandall Stewart 	if (aparam->ifa)
1629bff64a4dSRandall Stewart 		sctp_free_ifa(aparam->ifa);
1630207304d4SRandall Stewart 	SCTP_FREE(aparam, SCTP_M_ASC_ADDR);
1631f8829a4aSRandall Stewart }
1632f8829a4aSRandall Stewart 
1633f8829a4aSRandall Stewart /*
1634f8829a4aSRandall Stewart  * cleanup from a bad asconf ack parameter
1635f8829a4aSRandall Stewart  */
1636f8829a4aSRandall Stewart static void
1637c79bec9cSMichael Tuexen sctp_asconf_ack_clear(struct sctp_tcb *stcb SCTP_UNUSED)
1638f8829a4aSRandall Stewart {
1639f8829a4aSRandall Stewart 	/* assume peer doesn't really know how to do asconfs */
1640f8829a4aSRandall Stewart 	/* XXX we could free the pending queue here */
1641c79bec9cSMichael Tuexen 
1642f8829a4aSRandall Stewart }
1643f8829a4aSRandall Stewart 
1644f8829a4aSRandall Stewart void
1645f8829a4aSRandall Stewart sctp_handle_asconf_ack(struct mbuf *m, int offset,
1646f8829a4aSRandall Stewart     struct sctp_asconf_ack_chunk *cp, struct sctp_tcb *stcb,
16473232788eSRandall Stewart     struct sctp_nets *net, int *abort_no_unlock)
1648f8829a4aSRandall Stewart {
1649f8829a4aSRandall Stewart 	struct sctp_association *asoc;
1650f8829a4aSRandall Stewart 	uint32_t serial_num;
1651f8829a4aSRandall Stewart 	uint16_t ack_length;
1652f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
1653f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa, *aa_next;
1654f8829a4aSRandall Stewart 	uint32_t last_error_id = 0;	/* last error correlation id */
1655f8829a4aSRandall Stewart 	uint32_t id;
1656f8829a4aSRandall Stewart 	struct sctp_asconf_addr *ap;
1657f8829a4aSRandall Stewart 
1658f8829a4aSRandall Stewart 	/* asconf param buffer */
1659f42a358aSRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
1660f8829a4aSRandall Stewart 
1661f8829a4aSRandall Stewart 	/* verify minimum length */
1662f8829a4aSRandall Stewart 	if (ntohs(cp->ch.chunk_length) < sizeof(struct sctp_asconf_ack_chunk)) {
1663ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
1664ad81507eSRandall Stewart 		    "handle_asconf_ack: chunk too small = %xh\n",
1665f8829a4aSRandall Stewart 		    ntohs(cp->ch.chunk_length));
1666f8829a4aSRandall Stewart 		return;
1667f8829a4aSRandall Stewart 	}
1668f8829a4aSRandall Stewart 	asoc = &stcb->asoc;
1669f8829a4aSRandall Stewart 	serial_num = ntohl(cp->serial_number);
1670f8829a4aSRandall Stewart 
1671f8829a4aSRandall Stewart 	/*
1672f8829a4aSRandall Stewart 	 * NOTE: we may want to handle this differently- currently, we will
1673f8829a4aSRandall Stewart 	 * abort when we get an ack for the expected serial number + 1 (eg.
1674f8829a4aSRandall Stewart 	 * we didn't send it), process an ack normally if it is the expected
1675f8829a4aSRandall Stewart 	 * serial number, and re-send the previous ack for *ALL* other
1676f8829a4aSRandall Stewart 	 * serial numbers
1677f8829a4aSRandall Stewart 	 */
1678f8829a4aSRandall Stewart 
1679f8829a4aSRandall Stewart 	/*
1680f8829a4aSRandall Stewart 	 * if the serial number is the next expected, but I didn't send it,
1681f8829a4aSRandall Stewart 	 * abort the asoc, since someone probably just hijacked us...
1682f8829a4aSRandall Stewart 	 */
1683f8829a4aSRandall Stewart 	if (serial_num == (asoc->asconf_seq_out + 1)) {
1684267dbe63SMichael Tuexen 		struct mbuf *op_err;
1685267dbe63SMichael Tuexen 		char msg[SCTP_DIAG_INFO_LEN];
1686267dbe63SMichael Tuexen 
1687ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf_ack: got unexpected next serial number! Aborting asoc!\n");
1688267dbe63SMichael Tuexen 		snprintf(msg, sizeof(msg), "Never sent serial number %8.8x",
1689267dbe63SMichael Tuexen 		    serial_num);
1690267dbe63SMichael Tuexen 		op_err = sctp_generate_cause(SCTP_CAUSE_PROTOCOL_VIOLATION, msg);
1691267dbe63SMichael Tuexen 		sctp_abort_an_association(stcb->sctp_ep, stcb, op_err, SCTP_SO_NOT_LOCKED);
16923232788eSRandall Stewart 		*abort_no_unlock = 1;
1693f8829a4aSRandall Stewart 		return;
1694f8829a4aSRandall Stewart 	}
1695c54a18d2SRandall Stewart 	if (serial_num != asoc->asconf_seq_out_acked + 1) {
1696f8829a4aSRandall Stewart 		/* got a duplicate/unexpected ASCONF-ACK */
1697ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "handle_asconf_ack: got duplicate/unexpected serial number = %xh (expected = %xh)\n",
1698c54a18d2SRandall Stewart 		    serial_num, asoc->asconf_seq_out_acked + 1);
1699f8829a4aSRandall Stewart 		return;
1700f8829a4aSRandall Stewart 	}
17010053ed28SMichael Tuexen 
1702c54a18d2SRandall Stewart 	if (serial_num == asoc->asconf_seq_out - 1) {
1703f8829a4aSRandall Stewart 		/* stop our timer */
17043c503c28SRandall Stewart 		sctp_timer_stop(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep, stcb, net,
1705b7d130beSMichael Tuexen 		    SCTP_FROM_SCTP_ASCONF + SCTP_LOC_5);
1706c54a18d2SRandall Stewart 	}
17070053ed28SMichael Tuexen 
1708f8829a4aSRandall Stewart 	/* process the ASCONF-ACK contents */
1709f8829a4aSRandall Stewart 	ack_length = ntohs(cp->ch.chunk_length) -
1710f8829a4aSRandall Stewart 	    sizeof(struct sctp_asconf_ack_chunk);
1711f8829a4aSRandall Stewart 	offset += sizeof(struct sctp_asconf_ack_chunk);
1712f8829a4aSRandall Stewart 	/* process through all parameters */
1713f8829a4aSRandall Stewart 	while (ack_length >= sizeof(struct sctp_asconf_paramhdr)) {
1714f8829a4aSRandall Stewart 		unsigned int param_length, param_type;
1715f8829a4aSRandall Stewart 
1716f8829a4aSRandall Stewart 		/* get pointer to next asconf parameter */
1717f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset,
1718f8829a4aSRandall Stewart 		    sizeof(struct sctp_asconf_paramhdr), aparam_buf);
1719f8829a4aSRandall Stewart 		if (aph == NULL) {
1720f8829a4aSRandall Stewart 			/* can't get an asconf paramhdr */
1721f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1722f8829a4aSRandall Stewart 			return;
1723f8829a4aSRandall Stewart 		}
1724f8829a4aSRandall Stewart 		param_type = ntohs(aph->ph.param_type);
1725f8829a4aSRandall Stewart 		param_length = ntohs(aph->ph.param_length);
1726f8829a4aSRandall Stewart 		if (param_length > ack_length) {
1727f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1728f8829a4aSRandall Stewart 			return;
1729f8829a4aSRandall Stewart 		}
1730f8829a4aSRandall Stewart 		if (param_length < sizeof(struct sctp_paramhdr)) {
1731f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1732f8829a4aSRandall Stewart 			return;
1733f8829a4aSRandall Stewart 		}
1734f8829a4aSRandall Stewart 		/* get the complete parameter... */
1735f8829a4aSRandall Stewart 		if (param_length > sizeof(aparam_buf)) {
1736ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
1737ad81507eSRandall Stewart 			    "param length (%u) larger than buffer size!\n", param_length);
1738f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1739f8829a4aSRandall Stewart 			return;
1740f8829a4aSRandall Stewart 		}
1741f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(m, offset, param_length, aparam_buf);
1742f8829a4aSRandall Stewart 		if (aph == NULL) {
1743f8829a4aSRandall Stewart 			sctp_asconf_ack_clear(stcb);
1744f8829a4aSRandall Stewart 			return;
1745f8829a4aSRandall Stewart 		}
1746f8829a4aSRandall Stewart 		/* correlation_id is transparent to peer, no ntohl needed */
1747f8829a4aSRandall Stewart 		id = aph->correlation_id;
1748f8829a4aSRandall Stewart 
1749f8829a4aSRandall Stewart 		switch (param_type) {
1750f8829a4aSRandall Stewart 		case SCTP_ERROR_CAUSE_IND:
1751f8829a4aSRandall Stewart 			last_error_id = id;
1752f8829a4aSRandall Stewart 			/* find the corresponding asconf param in our queue */
1753f8829a4aSRandall Stewart 			ap = sctp_asconf_find_param(stcb, id);
1754f8829a4aSRandall Stewart 			if (ap == NULL) {
1755f8829a4aSRandall Stewart 				/* hmm... can't find this in our queue! */
1756f8829a4aSRandall Stewart 				break;
1757f8829a4aSRandall Stewart 			}
1758f8829a4aSRandall Stewart 			/* process the parameter, failed flag */
1759f8829a4aSRandall Stewart 			sctp_asconf_process_param_ack(stcb, ap, 0);
1760f8829a4aSRandall Stewart 			/* process the error response */
1761f8829a4aSRandall Stewart 			sctp_asconf_process_error(stcb, aph);
1762f8829a4aSRandall Stewart 			break;
1763f8829a4aSRandall Stewart 		case SCTP_SUCCESS_REPORT:
1764f8829a4aSRandall Stewart 			/* find the corresponding asconf param in our queue */
1765f8829a4aSRandall Stewart 			ap = sctp_asconf_find_param(stcb, id);
1766f8829a4aSRandall Stewart 			if (ap == NULL) {
1767f8829a4aSRandall Stewart 				/* hmm... can't find this in our queue! */
1768f8829a4aSRandall Stewart 				break;
1769f8829a4aSRandall Stewart 			}
1770f8829a4aSRandall Stewart 			/* process the parameter, success flag */
1771f8829a4aSRandall Stewart 			sctp_asconf_process_param_ack(stcb, ap, 1);
1772f8829a4aSRandall Stewart 			break;
1773f8829a4aSRandall Stewart 		default:
1774f8829a4aSRandall Stewart 			break;
1775f8829a4aSRandall Stewart 		}		/* switch */
1776f8829a4aSRandall Stewart 
1777f8829a4aSRandall Stewart 		/* update remaining ASCONF-ACK message length to process */
1778f8829a4aSRandall Stewart 		ack_length -= SCTP_SIZE32(param_length);
1779f8829a4aSRandall Stewart 		if (ack_length <= 0) {
1780f8829a4aSRandall Stewart 			/* no more data in the mbuf chain */
1781f8829a4aSRandall Stewart 			break;
1782f8829a4aSRandall Stewart 		}
1783f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(param_length);
1784f8829a4aSRandall Stewart 	}			/* while */
1785f8829a4aSRandall Stewart 
1786f8829a4aSRandall Stewart 	/*
1787f8829a4aSRandall Stewart 	 * if there are any "sent" params still on the queue, these are
1788f8829a4aSRandall Stewart 	 * implicitly "success", or "failed" (if we got an error back) ...
1789f8829a4aSRandall Stewart 	 * so process these appropriately
1790f8829a4aSRandall Stewart 	 *
1791f8829a4aSRandall Stewart 	 * we assume that the correlation_id's are monotonically increasing
1792f8829a4aSRandall Stewart 	 * beginning from 1 and that we don't have *that* many outstanding
1793f8829a4aSRandall Stewart 	 * at any given time
1794f8829a4aSRandall Stewart 	 */
1795f8829a4aSRandall Stewart 	if (last_error_id == 0)
1796f8829a4aSRandall Stewart 		last_error_id--;	/* set to "max" value */
17974a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(aa, &stcb->asoc.asconf_queue, next, aa_next) {
1798f8829a4aSRandall Stewart 		if (aa->sent == 1) {
1799f8829a4aSRandall Stewart 			/*
1800f8829a4aSRandall Stewart 			 * implicitly successful or failed if correlation_id
1801f8829a4aSRandall Stewart 			 * < last_error_id, then success else, failure
1802f8829a4aSRandall Stewart 			 */
1803f8829a4aSRandall Stewart 			if (aa->ap.aph.correlation_id < last_error_id)
180418e198d3SRandall Stewart 				sctp_asconf_process_param_ack(stcb, aa, 1);
1805f8829a4aSRandall Stewart 			else
180618e198d3SRandall Stewart 				sctp_asconf_process_param_ack(stcb, aa, 0);
1807f8829a4aSRandall Stewart 		} else {
1808f8829a4aSRandall Stewart 			/*
1809f8829a4aSRandall Stewart 			 * since we always process in order (FIFO queue) if
1810f8829a4aSRandall Stewart 			 * we reach one that hasn't been sent, the rest
1811f8829a4aSRandall Stewart 			 * should not have been sent either. so, we're
1812f8829a4aSRandall Stewart 			 * done...
1813f8829a4aSRandall Stewart 			 */
1814f8829a4aSRandall Stewart 			break;
1815f8829a4aSRandall Stewart 		}
1816f8829a4aSRandall Stewart 	}
1817f8829a4aSRandall Stewart 
1818f8829a4aSRandall Stewart 	/* update the next sequence number to use */
1819c54a18d2SRandall Stewart 	asoc->asconf_seq_out_acked++;
1820f8829a4aSRandall Stewart 	/* remove the old ASCONF on our outbound queue */
1821f8829a4aSRandall Stewart 	sctp_toss_old_asconf(stcb);
1822f8829a4aSRandall Stewart 	if (!TAILQ_EMPTY(&stcb->asoc.asconf_queue)) {
18231b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
1824f8829a4aSRandall Stewart 		/* we have more params, so restart our timer */
1825f8829a4aSRandall Stewart 		sctp_timer_start(SCTP_TIMER_TYPE_ASCONF, stcb->sctp_ep,
1826f8829a4aSRandall Stewart 		    stcb, net);
18271b649582SRandall Stewart #else
18281b649582SRandall Stewart 		/* we have more params, so send out more */
18293232788eSRandall Stewart 		sctp_send_asconf(stcb, net, SCTP_ADDR_NOT_LOCKED);
18301b649582SRandall Stewart #endif
1831f8829a4aSRandall Stewart 	}
1832f8829a4aSRandall Stewart }
1833f8829a4aSRandall Stewart 
18345e2c2d87SRandall Stewart #ifdef INET6
1835f8829a4aSRandall Stewart static uint32_t
1836b0471b4bSMichael Tuexen sctp_is_scopeid_in_nets(struct sctp_tcb *stcb, struct sockaddr *sa)
1837b0471b4bSMichael Tuexen {
1838f8829a4aSRandall Stewart 	struct sockaddr_in6 *sin6, *net6;
1839f8829a4aSRandall Stewart 	struct sctp_nets *net;
1840f8829a4aSRandall Stewart 
1841f8829a4aSRandall Stewart 	if (sa->sa_family != AF_INET6) {
1842f8829a4aSRandall Stewart 		/* wrong family */
1843f8829a4aSRandall Stewart 		return (0);
1844f8829a4aSRandall Stewart 	}
1845f8829a4aSRandall Stewart 	sin6 = (struct sockaddr_in6 *)sa;
1846f8829a4aSRandall Stewart 	if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr) == 0) {
1847f8829a4aSRandall Stewart 		/* not link local address */
1848f8829a4aSRandall Stewart 		return (0);
1849f8829a4aSRandall Stewart 	}
1850f8829a4aSRandall Stewart 	/* hunt through our destination nets list for this scope_id */
1851f8829a4aSRandall Stewart 	TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
1852f8829a4aSRandall Stewart 		if (((struct sockaddr *)(&net->ro._l_addr))->sa_family !=
1853f8829a4aSRandall Stewart 		    AF_INET6)
1854f8829a4aSRandall Stewart 			continue;
1855f8829a4aSRandall Stewart 		net6 = (struct sockaddr_in6 *)&net->ro._l_addr;
1856f8829a4aSRandall Stewart 		if (IN6_IS_ADDR_LINKLOCAL(&net6->sin6_addr) == 0)
1857f8829a4aSRandall Stewart 			continue;
1858f8829a4aSRandall Stewart 		if (sctp_is_same_scope(sin6, net6)) {
1859f8829a4aSRandall Stewart 			/* found one */
1860f8829a4aSRandall Stewart 			return (1);
1861f8829a4aSRandall Stewart 		}
1862f8829a4aSRandall Stewart 	}
1863f8829a4aSRandall Stewart 	/* didn't find one */
1864f8829a4aSRandall Stewart 	return (0);
1865f8829a4aSRandall Stewart }
18665e2c2d87SRandall Stewart #endif
18675e2c2d87SRandall Stewart 
1868f8829a4aSRandall Stewart /*
1869f8829a4aSRandall Stewart  * address management functions
1870f8829a4aSRandall Stewart  */
1871f8829a4aSRandall Stewart static void
1872f8829a4aSRandall Stewart sctp_addr_mgmt_assoc(struct sctp_inpcb *inp, struct sctp_tcb *stcb,
18733232788eSRandall Stewart     struct sctp_ifa *ifa, uint16_t type, int addr_locked)
1874f8829a4aSRandall Stewart {
1875f8829a4aSRandall Stewart 	int status;
1876f8829a4aSRandall Stewart 
1877ca85e948SMichael Tuexen 	if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0 ||
1878f8829a4aSRandall Stewart 	    sctp_is_feature_off(inp, SCTP_PCB_FLAGS_DO_ASCONF)) {
1879f8829a4aSRandall Stewart 		/* subset bound, no ASCONF allowed case, so ignore */
1880f8829a4aSRandall Stewart 		return;
1881f8829a4aSRandall Stewart 	}
1882f8829a4aSRandall Stewart 	/*
1883f8829a4aSRandall Stewart 	 * note: we know this is not the subset bound, no ASCONF case eg.
1884f8829a4aSRandall Stewart 	 * this is boundall or subset bound w/ASCONF allowed
1885f8829a4aSRandall Stewart 	 */
1886f8829a4aSRandall Stewart 
18876ba22f19SMichael Tuexen 	/* first, make sure that the address is IPv4 or IPv6 and not jailed */
1888e6194c2eSMichael Tuexen 	switch (ifa->address.sa.sa_family) {
1889e6194c2eSMichael Tuexen #ifdef INET6
1890e6194c2eSMichael Tuexen 	case AF_INET6:
18916ba22f19SMichael Tuexen 		if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
18926ba22f19SMichael Tuexen 		    &ifa->address.sin6.sin6_addr) != 0) {
18936ba22f19SMichael Tuexen 			return;
18946ba22f19SMichael Tuexen 		}
1895e6194c2eSMichael Tuexen 		break;
1896e6194c2eSMichael Tuexen #endif
1897e6194c2eSMichael Tuexen #ifdef INET
1898e6194c2eSMichael Tuexen 	case AF_INET:
18996ba22f19SMichael Tuexen 		if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
19006ba22f19SMichael Tuexen 		    &ifa->address.sin.sin_addr) != 0) {
19016ba22f19SMichael Tuexen 			return;
19026ba22f19SMichael Tuexen 		}
1903e6194c2eSMichael Tuexen 		break;
1904e6194c2eSMichael Tuexen #endif
1905e6194c2eSMichael Tuexen 	default:
1906f8829a4aSRandall Stewart 		return;
1907f8829a4aSRandall Stewart 	}
1908e6194c2eSMichael Tuexen #ifdef INET6
1909f8829a4aSRandall Stewart 	/* make sure we're "allowed" to add this type of addr */
191042551e99SRandall Stewart 	if (ifa->address.sa.sa_family == AF_INET6) {
1911f8829a4aSRandall Stewart 		/* invalid if we're not a v6 endpoint */
1912f8829a4aSRandall Stewart 		if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0)
1913f8829a4aSRandall Stewart 			return;
1914f8829a4aSRandall Stewart 		/* is the v6 addr really valid ? */
191542551e99SRandall Stewart 		if (ifa->localifa_flags & SCTP_ADDR_IFA_UNUSEABLE) {
1916f8829a4aSRandall Stewart 			return;
1917f8829a4aSRandall Stewart 		}
1918f8829a4aSRandall Stewart 	}
1919e6194c2eSMichael Tuexen #endif
1920f8829a4aSRandall Stewart 	/* put this address on the "pending/do not use yet" list */
19211b649582SRandall Stewart 	sctp_add_local_addr_restricted(stcb, ifa);
1922f8829a4aSRandall Stewart 	/*
1923f8829a4aSRandall Stewart 	 * check address scope if address is out of scope, don't queue
1924f8829a4aSRandall Stewart 	 * anything... note: this would leave the address on both inp and
1925f8829a4aSRandall Stewart 	 * asoc lists
1926f8829a4aSRandall Stewart 	 */
19275e2c2d87SRandall Stewart 	switch (ifa->address.sa.sa_family) {
19285e2c2d87SRandall Stewart #ifdef INET6
19295e2c2d87SRandall Stewart 	case AF_INET6:
19305e2c2d87SRandall Stewart 		{
1931f8829a4aSRandall Stewart 			struct sockaddr_in6 *sin6;
1932f8829a4aSRandall Stewart 
193324aaac8dSMichael Tuexen 			sin6 = &ifa->address.sin6;
1934f8829a4aSRandall Stewart 			if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
1935f8829a4aSRandall Stewart 				/* we skip unspecifed addresses */
1936f8829a4aSRandall Stewart 				return;
1937f8829a4aSRandall Stewart 			}
1938f8829a4aSRandall Stewart 			if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
1939a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.local_scope == 0) {
1940f8829a4aSRandall Stewart 					return;
1941f8829a4aSRandall Stewart 				}
1942f8829a4aSRandall Stewart 				/* is it the right link local scope? */
194342551e99SRandall Stewart 				if (sctp_is_scopeid_in_nets(stcb, &ifa->address.sa) == 0) {
1944f8829a4aSRandall Stewart 					return;
1945f8829a4aSRandall Stewart 				}
1946f8829a4aSRandall Stewart 			}
1947a1cb341bSMichael Tuexen 			if (stcb->asoc.scope.site_scope == 0 &&
1948f8829a4aSRandall Stewart 			    IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr)) {
1949f8829a4aSRandall Stewart 				return;
1950f8829a4aSRandall Stewart 			}
19515e2c2d87SRandall Stewart 			break;
19525e2c2d87SRandall Stewart 		}
19535e2c2d87SRandall Stewart #endif
1954e6194c2eSMichael Tuexen #ifdef INET
19555e2c2d87SRandall Stewart 	case AF_INET:
19565e2c2d87SRandall Stewart 		{
1957f8829a4aSRandall Stewart 			struct sockaddr_in *sin;
1958f8829a4aSRandall Stewart 
1959f8829a4aSRandall Stewart 			/* invalid if we are a v6 only endpoint */
1960f8829a4aSRandall Stewart 			if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
196194962f6bSMichael Tuexen 			    SCTP_IPV6_V6ONLY(inp))
1962f8829a4aSRandall Stewart 				return;
1963f8829a4aSRandall Stewart 
196424aaac8dSMichael Tuexen 			sin = &ifa->address.sin;
1965f8829a4aSRandall Stewart 			if (sin->sin_addr.s_addr == 0) {
1966f8829a4aSRandall Stewart 				/* we skip unspecifed addresses */
1967f8829a4aSRandall Stewart 				return;
1968f8829a4aSRandall Stewart 			}
1969a1cb341bSMichael Tuexen 			if (stcb->asoc.scope.ipv4_local_scope == 0 &&
1970f8829a4aSRandall Stewart 			    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr)) {
1971f8829a4aSRandall Stewart 				return;
1972f8829a4aSRandall Stewart 			}
19735e2c2d87SRandall Stewart 			break;
19745e2c2d87SRandall Stewart 		}
1975e6194c2eSMichael Tuexen #endif
19765e2c2d87SRandall Stewart 	default:
1977f8829a4aSRandall Stewart 		/* else, not AF_INET or AF_INET6, so skip */
1978f8829a4aSRandall Stewart 		return;
1979f8829a4aSRandall Stewart 	}
1980f8829a4aSRandall Stewart 
1981f8829a4aSRandall Stewart 	/* queue an asconf for this address add/delete */
1982f8829a4aSRandall Stewart 	if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_DO_ASCONF)) {
1983f8829a4aSRandall Stewart 		/* does the peer do asconf? */
1984c79bec9cSMichael Tuexen 		if (stcb->asoc.asconf_supported) {
1985f8829a4aSRandall Stewart 			/* queue an asconf for this addr */
1986f8829a4aSRandall Stewart 			status = sctp_asconf_queue_add(stcb, ifa, type);
19871b649582SRandall Stewart 
1988f8829a4aSRandall Stewart 			/*
19891b649582SRandall Stewart 			 * if queued ok, and in the open state, send out the
19901b649582SRandall Stewart 			 * ASCONF.  If in the non-open state, these will be
19911b649582SRandall Stewart 			 * sent when the state goes open.
1992f8829a4aSRandall Stewart 			 */
1993f8829a4aSRandall Stewart 			if (status == 0 &&
1994839d21d6SMichael Tuexen 			    ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
1995839d21d6SMichael Tuexen 			    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED))) {
19961b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
1997f8829a4aSRandall Stewart 				sctp_timer_start(SCTP_TIMER_TYPE_ASCONF, inp,
1998f8829a4aSRandall Stewart 				    stcb, stcb->asoc.primary_destination);
19991b649582SRandall Stewart #else
2000ca85e948SMichael Tuexen 				sctp_send_asconf(stcb, NULL, addr_locked);
20011b649582SRandall Stewart #endif
2002f8829a4aSRandall Stewart 			}
2003f8829a4aSRandall Stewart 		}
2004f8829a4aSRandall Stewart 	}
2005f8829a4aSRandall Stewart }
2006f8829a4aSRandall Stewart 
200742551e99SRandall Stewart 
200842551e99SRandall Stewart int
20097215cc1bSMichael Tuexen sctp_asconf_iterator_ep(struct sctp_inpcb *inp, void *ptr, uint32_t val SCTP_UNUSED)
2010f8829a4aSRandall Stewart {
201142551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
201242551e99SRandall Stewart 	struct sctp_ifa *ifa;
201342551e99SRandall Stewart 	struct sctp_laddr *l;
201442551e99SRandall Stewart 	int cnt_invalid = 0;
2015f8829a4aSRandall Stewart 
201642551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
201742551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
201842551e99SRandall Stewart 		ifa = l->ifa;
2019e6194c2eSMichael Tuexen 		switch (ifa->address.sa.sa_family) {
2020e6194c2eSMichael Tuexen #ifdef INET6
2021e6194c2eSMichael Tuexen 		case AF_INET6:
2022f8829a4aSRandall Stewart 			/* invalid if we're not a v6 endpoint */
2023f8829a4aSRandall Stewart 			if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) {
202442551e99SRandall Stewart 				cnt_invalid++;
202542551e99SRandall Stewart 				if (asc->cnt == cnt_invalid)
202642551e99SRandall Stewart 					return (1);
2027f8829a4aSRandall Stewart 			}
2028e6194c2eSMichael Tuexen 			break;
2029e6194c2eSMichael Tuexen #endif
2030e6194c2eSMichael Tuexen #ifdef INET
2031e6194c2eSMichael Tuexen 		case AF_INET:
2032e6194c2eSMichael Tuexen 			{
2033f8829a4aSRandall Stewart 				/* invalid if we are a v6 only endpoint */
2034f8829a4aSRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
203594962f6bSMichael Tuexen 				    SCTP_IPV6_V6ONLY(inp)) {
203642551e99SRandall Stewart 					cnt_invalid++;
203742551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
203842551e99SRandall Stewart 						return (1);
2039f8829a4aSRandall Stewart 				}
2040e6194c2eSMichael Tuexen 				break;
2041e6194c2eSMichael Tuexen 			}
2042e6194c2eSMichael Tuexen #endif
2043e6194c2eSMichael Tuexen 		default:
2044f8829a4aSRandall Stewart 			/* invalid address family */
204542551e99SRandall Stewart 			cnt_invalid++;
204642551e99SRandall Stewart 			if (asc->cnt == cnt_invalid)
204742551e99SRandall Stewart 				return (1);
2048f8829a4aSRandall Stewart 		}
204942551e99SRandall Stewart 	}
205042551e99SRandall Stewart 	return (0);
205142551e99SRandall Stewart }
2052f8829a4aSRandall Stewart 
20531b649582SRandall Stewart static int
20547215cc1bSMichael Tuexen sctp_asconf_iterator_ep_end(struct sctp_inpcb *inp, void *ptr, uint32_t val SCTP_UNUSED)
205542551e99SRandall Stewart {
205642551e99SRandall Stewart 	struct sctp_ifa *ifa;
205742551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
205842551e99SRandall Stewart 	struct sctp_laddr *laddr, *nladdr, *l;
205942551e99SRandall Stewart 
206042551e99SRandall Stewart 	/* Only for specific case not bound all */
206142551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
206242551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
206342551e99SRandall Stewart 		ifa = l->ifa;
206442551e99SRandall Stewart 		if (l->action == SCTP_ADD_IP_ADDRESS) {
20653c503c28SRandall Stewart 			LIST_FOREACH(laddr, &inp->sctp_addr_list,
20663c503c28SRandall Stewart 			    sctp_nxt_addr) {
206742551e99SRandall Stewart 				if (laddr->ifa == ifa) {
206842551e99SRandall Stewart 					laddr->action = 0;
206942551e99SRandall Stewart 					break;
207042551e99SRandall Stewart 				}
20710053ed28SMichael Tuexen 
207242551e99SRandall Stewart 			}
207342551e99SRandall Stewart 		} else if (l->action == SCTP_DEL_IP_ADDRESS) {
20744a9ef3f8SMichael Tuexen 			LIST_FOREACH_SAFE(laddr, &inp->sctp_addr_list, sctp_nxt_addr, nladdr) {
207542551e99SRandall Stewart 				/* remove only after all guys are done */
207642551e99SRandall Stewart 				if (laddr->ifa == ifa) {
207742551e99SRandall Stewart 					sctp_del_local_addr_ep(inp, ifa);
207842551e99SRandall Stewart 				}
207942551e99SRandall Stewart 			}
208042551e99SRandall Stewart 		}
208142551e99SRandall Stewart 	}
208242551e99SRandall Stewart 	return (0);
208342551e99SRandall Stewart }
208442551e99SRandall Stewart 
208542551e99SRandall Stewart void
20861b649582SRandall Stewart sctp_asconf_iterator_stcb(struct sctp_inpcb *inp, struct sctp_tcb *stcb,
20877215cc1bSMichael Tuexen     void *ptr, uint32_t val SCTP_UNUSED)
208842551e99SRandall Stewart {
208942551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
209042551e99SRandall Stewart 	struct sctp_ifa *ifa;
209142551e99SRandall Stewart 	struct sctp_laddr *l;
209242551e99SRandall Stewart 	int cnt_invalid = 0;
209342551e99SRandall Stewart 	int type, status;
20941b649582SRandall Stewart 	int num_queued = 0;
209542551e99SRandall Stewart 
209642551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
209742551e99SRandall Stewart 	LIST_FOREACH(l, &asc->list_of_work, sctp_nxt_addr) {
209842551e99SRandall Stewart 		ifa = l->ifa;
209942551e99SRandall Stewart 		type = l->action;
210022a67197SRandall Stewart 
210122a67197SRandall Stewart 		/* address's vrf_id must be the vrf_id of the assoc */
210222a67197SRandall Stewart 		if (ifa->vrf_id != stcb->asoc.vrf_id) {
210322a67197SRandall Stewart 			continue;
210422a67197SRandall Stewart 		}
21050053ed28SMichael Tuexen 
210642551e99SRandall Stewart 		/* Same checks again for assoc */
21075e2c2d87SRandall Stewart 		switch (ifa->address.sa.sa_family) {
21085e2c2d87SRandall Stewart #ifdef INET6
21095e2c2d87SRandall Stewart 		case AF_INET6:
21105e2c2d87SRandall Stewart 			{
211142551e99SRandall Stewart 				/* invalid if we're not a v6 endpoint */
211242551e99SRandall Stewart 				struct sockaddr_in6 *sin6;
211342551e99SRandall Stewart 
211442551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) == 0) {
211542551e99SRandall Stewart 					cnt_invalid++;
211642551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
211742551e99SRandall Stewart 						return;
211842551e99SRandall Stewart 					else
211942551e99SRandall Stewart 						continue;
212042551e99SRandall Stewart 				}
212124aaac8dSMichael Tuexen 				sin6 = &ifa->address.sin6;
212242551e99SRandall Stewart 				if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
212342551e99SRandall Stewart 					/* we skip unspecifed addresses */
212442551e99SRandall Stewart 					continue;
212542551e99SRandall Stewart 				}
21266ba22f19SMichael Tuexen 				if (prison_check_ip6(inp->ip_inp.inp.inp_cred,
21276ba22f19SMichael Tuexen 				    &sin6->sin6_addr) != 0) {
21286ba22f19SMichael Tuexen 					continue;
21296ba22f19SMichael Tuexen 				}
213042551e99SRandall Stewart 				if (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr)) {
2131a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.local_scope == 0) {
213242551e99SRandall Stewart 						continue;
213342551e99SRandall Stewart 					}
213442551e99SRandall Stewart 					/* is it the right link local scope? */
213542551e99SRandall Stewart 					if (sctp_is_scopeid_in_nets(stcb, &ifa->address.sa) == 0) {
213642551e99SRandall Stewart 						continue;
213742551e99SRandall Stewart 					}
213842551e99SRandall Stewart 				}
21395e2c2d87SRandall Stewart 				break;
21405e2c2d87SRandall Stewart 			}
21415e2c2d87SRandall Stewart #endif
2142e6194c2eSMichael Tuexen #ifdef INET
21435e2c2d87SRandall Stewart 		case AF_INET:
21445e2c2d87SRandall Stewart 			{
214542551e99SRandall Stewart 				/* invalid if we are a v6 only endpoint */
214642551e99SRandall Stewart 				struct sockaddr_in *sin;
214742551e99SRandall Stewart 
214842551e99SRandall Stewart 				/* invalid if we are a v6 only endpoint */
214942551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
215094962f6bSMichael Tuexen 				    SCTP_IPV6_V6ONLY(inp))
215142551e99SRandall Stewart 					continue;
215242551e99SRandall Stewart 
215324aaac8dSMichael Tuexen 				sin = &ifa->address.sin;
215442551e99SRandall Stewart 				if (sin->sin_addr.s_addr == 0) {
215542551e99SRandall Stewart 					/* we skip unspecifed addresses */
215642551e99SRandall Stewart 					continue;
215742551e99SRandall Stewart 				}
21586ba22f19SMichael Tuexen 				if (prison_check_ip4(inp->ip_inp.inp.inp_cred,
21596ba22f19SMichael Tuexen 				    &sin->sin_addr) != 0) {
21606ba22f19SMichael Tuexen 					continue;
21616ba22f19SMichael Tuexen 				}
2162a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv4_local_scope == 0 &&
216342551e99SRandall Stewart 				    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr)) {
2164c2ede4b3SMartin Blapp 					continue;
216542551e99SRandall Stewart 				}
216642551e99SRandall Stewart 				if ((inp->sctp_flags & SCTP_PCB_FLAGS_BOUND_V6) &&
216794962f6bSMichael Tuexen 				    SCTP_IPV6_V6ONLY(inp)) {
216842551e99SRandall Stewart 					cnt_invalid++;
216942551e99SRandall Stewart 					if (asc->cnt == cnt_invalid)
217042551e99SRandall Stewart 						return;
217142551e99SRandall Stewart 					else
217242551e99SRandall Stewart 						continue;
217342551e99SRandall Stewart 				}
21745e2c2d87SRandall Stewart 				break;
21755e2c2d87SRandall Stewart 			}
2176e6194c2eSMichael Tuexen #endif
21775e2c2d87SRandall Stewart 		default:
217842551e99SRandall Stewart 			/* invalid address family */
217942551e99SRandall Stewart 			cnt_invalid++;
218042551e99SRandall Stewart 			if (asc->cnt == cnt_invalid)
2181f8829a4aSRandall Stewart 				return;
218242551e99SRandall Stewart 			else
218342551e99SRandall Stewart 				continue;
21845e2c2d87SRandall Stewart 			break;
2185f8829a4aSRandall Stewart 		}
2186f8829a4aSRandall Stewart 
218742551e99SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
21881b649582SRandall Stewart 			/* prevent this address from being used as a source */
21891b649582SRandall Stewart 			sctp_add_local_addr_restricted(stcb, ifa);
219042551e99SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
2191f8829a4aSRandall Stewart 			struct sctp_nets *net;
2192f8829a4aSRandall Stewart 
2193f8829a4aSRandall Stewart 			TAILQ_FOREACH(net, &stcb->asoc.nets, sctp_next) {
219417205eccSRandall Stewart 				sctp_rtentry_t *rt;
2195f8829a4aSRandall Stewart 
2196f8829a4aSRandall Stewart 				/* delete this address if cached */
2197851b7298SRandall Stewart 				if (net->ro._s_addr == ifa) {
219842551e99SRandall Stewart 					sctp_free_ifa(net->ro._s_addr);
219942551e99SRandall Stewart 					net->ro._s_addr = NULL;
220042551e99SRandall Stewart 					net->src_addr_selected = 0;
2201f8829a4aSRandall Stewart 					rt = net->ro.ro_rt;
220242551e99SRandall Stewart 					if (rt) {
220342551e99SRandall Stewart 						RTFREE(rt);
2204f8829a4aSRandall Stewart 						net->ro.ro_rt = NULL;
2205f8829a4aSRandall Stewart 					}
220642551e99SRandall Stewart 					/*
220742551e99SRandall Stewart 					 * Now we deleted our src address,
220842551e99SRandall Stewart 					 * should we not also now reset the
220942551e99SRandall Stewart 					 * cwnd/rto to start as if its a new
221042551e99SRandall Stewart 					 * address?
221142551e99SRandall Stewart 					 */
2212b54d3a6cSRandall Stewart 					stcb->asoc.cc_functions.sctp_set_initial_cc_param(stcb, net);
2213108df27cSRandall Stewart 					net->RTO = 0;
221442551e99SRandall Stewart 
2215f8829a4aSRandall Stewart 				}
2216f8829a4aSRandall Stewart 			}
221742551e99SRandall Stewart 		} else if (type == SCTP_SET_PRIM_ADDR) {
221842551e99SRandall Stewart 			if ((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) == 0) {
22191b649582SRandall Stewart 				/* must validate the ifa is in the ep */
222042551e99SRandall Stewart 				if (sctp_is_addr_in_ep(stcb->sctp_ep, ifa) == 0) {
222142551e99SRandall Stewart 					continue;
2222f8829a4aSRandall Stewart 				}
222342551e99SRandall Stewart 			} else {
222442551e99SRandall Stewart 				/* Need to check scopes for this guy */
2225a1cb341bSMichael Tuexen 				if (sctp_is_address_in_scope(ifa, &stcb->asoc.scope, 0) == 0) {
222642551e99SRandall Stewart 					continue;
2227f8829a4aSRandall Stewart 				}
222842551e99SRandall Stewart 			}
222942551e99SRandall Stewart 		}
223042551e99SRandall Stewart 		/* queue an asconf for this address add/delete */
22311b649582SRandall Stewart 		if (sctp_is_feature_on(inp, SCTP_PCB_FLAGS_DO_ASCONF) &&
2232c79bec9cSMichael Tuexen 		    stcb->asoc.asconf_supported == 1) {
223342551e99SRandall Stewart 			/* queue an asconf for this addr */
223442551e99SRandall Stewart 			status = sctp_asconf_queue_add(stcb, ifa, type);
223542551e99SRandall Stewart 			/*
22361b649582SRandall Stewart 			 * if queued ok, and in the open state, update the
22371b649582SRandall Stewart 			 * count of queued params.  If in the non-open
22381b649582SRandall Stewart 			 * state, these get sent when the assoc goes open.
223942551e99SRandall Stewart 			 */
2240839d21d6SMichael Tuexen 			if ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
2241839d21d6SMichael Tuexen 			    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
22421b649582SRandall Stewart 				if (status >= 0) {
22431b649582SRandall Stewart 					num_queued++;
224442551e99SRandall Stewart 				}
224542551e99SRandall Stewart 			}
224642551e99SRandall Stewart 		}
224742551e99SRandall Stewart 	}
22481b649582SRandall Stewart 	/*
22491b649582SRandall Stewart 	 * If we have queued params in the open state, send out an ASCONF.
22501b649582SRandall Stewart 	 */
22511b649582SRandall Stewart 	if (num_queued > 0) {
2252ca85e948SMichael Tuexen 		sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
22531b649582SRandall Stewart 	}
225442551e99SRandall Stewart }
225542551e99SRandall Stewart 
225642551e99SRandall Stewart void
22577215cc1bSMichael Tuexen sctp_asconf_iterator_end(void *ptr, uint32_t val SCTP_UNUSED)
225842551e99SRandall Stewart {
225942551e99SRandall Stewart 	struct sctp_asconf_iterator *asc;
226042551e99SRandall Stewart 	struct sctp_ifa *ifa;
22614a9ef3f8SMichael Tuexen 	struct sctp_laddr *l, *nl;
226242551e99SRandall Stewart 
226342551e99SRandall Stewart 	asc = (struct sctp_asconf_iterator *)ptr;
22644a9ef3f8SMichael Tuexen 	LIST_FOREACH_SAFE(l, &asc->list_of_work, sctp_nxt_addr, nl) {
226542551e99SRandall Stewart 		ifa = l->ifa;
226642551e99SRandall Stewart 		if (l->action == SCTP_ADD_IP_ADDRESS) {
226742551e99SRandall Stewart 			/* Clear the defer use flag */
226842551e99SRandall Stewart 			ifa->localifa_flags &= ~SCTP_ADDR_DEFER_USE;
226942551e99SRandall Stewart 		}
227042551e99SRandall Stewart 		sctp_free_ifa(ifa);
2271b3f1ea41SRandall Stewart 		SCTP_ZONE_FREE(SCTP_BASE_INFO(ipi_zone_laddr), l);
227242551e99SRandall Stewart 		SCTP_DECR_LADDR_COUNT();
227342551e99SRandall Stewart 	}
2274207304d4SRandall Stewart 	SCTP_FREE(asc, SCTP_M_ASC_IT);
2275f8829a4aSRandall Stewart }
2276f8829a4aSRandall Stewart 
2277f8829a4aSRandall Stewart /*
22781b649582SRandall Stewart  * sa is the sockaddr to ask the peer to set primary to.
22791b649582SRandall Stewart  * returns: 0 = completed, -1 = error
2280f8829a4aSRandall Stewart  */
2281c4739e2fSRandall Stewart int32_t
2282b0471b4bSMichael Tuexen sctp_set_primary_ip_address_sa(struct sctp_tcb *stcb, struct sockaddr *sa)
2283b0471b4bSMichael Tuexen {
22843232788eSRandall Stewart 	uint32_t vrf_id;
22853232788eSRandall Stewart 	struct sctp_ifa *ifa;
2286f8829a4aSRandall Stewart 
22873232788eSRandall Stewart 	/* find the ifa for the desired set primary */
22883232788eSRandall Stewart 	vrf_id = stcb->asoc.vrf_id;
22893232788eSRandall Stewart 	ifa = sctp_find_ifa_by_addr(sa, vrf_id, SCTP_ADDR_NOT_LOCKED);
22903232788eSRandall Stewart 	if (ifa == NULL) {
22913232788eSRandall Stewart 		/* Invalid address */
22923232788eSRandall Stewart 		return (-1);
22933232788eSRandall Stewart 	}
22940053ed28SMichael Tuexen 
2295f8829a4aSRandall Stewart 	/* queue an ASCONF:SET_PRIM_ADDR to be sent */
22963232788eSRandall Stewart 	if (!sctp_asconf_queue_add(stcb, ifa, SCTP_SET_PRIM_ADDR)) {
2297f8829a4aSRandall Stewart 		/* set primary queuing succeeded */
2298ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2299ad81507eSRandall Stewart 		    "set_primary_ip_address_sa: queued on tcb=%p, ",
2300dd294dceSMichael Tuexen 		    (void *)stcb);
2301ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
2302839d21d6SMichael Tuexen 		if ((SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) ||
2303839d21d6SMichael Tuexen 		    (SCTP_GET_STATE(stcb) == SCTP_STATE_SHUTDOWN_RECEIVED)) {
23041b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
23051b649582SRandall Stewart 			sctp_timer_start(SCTP_TIMER_TYPE_ASCONF,
23061b649582SRandall Stewart 			    stcb->sctp_ep, stcb,
23071b649582SRandall Stewart 			    stcb->asoc.primary_destination);
23081b649582SRandall Stewart #else
2309ca85e948SMichael Tuexen 			sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
23101b649582SRandall Stewart #endif
23111b649582SRandall Stewart 		}
2312f8829a4aSRandall Stewart 	} else {
2313ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "set_primary_ip_address_sa: failed to add to queue on tcb=%p, ",
2314dd294dceSMichael Tuexen 		    (void *)stcb);
2315ad81507eSRandall Stewart 		SCTPDBG_ADDR(SCTP_DEBUG_ASCONF1, sa);
2316f8829a4aSRandall Stewart 		return (-1);
2317f8829a4aSRandall Stewart 	}
2318f8829a4aSRandall Stewart 	return (0);
2319f8829a4aSRandall Stewart }
2320f8829a4aSRandall Stewart 
2321c54a18d2SRandall Stewart int
2322c54a18d2SRandall Stewart sctp_is_addr_pending(struct sctp_tcb *stcb, struct sctp_ifa *sctp_ifa)
2323c54a18d2SRandall Stewart {
2324c54a18d2SRandall Stewart 	struct sctp_tmit_chunk *chk, *nchk;
2325c54a18d2SRandall Stewart 	unsigned int offset, asconf_limit;
2326c54a18d2SRandall Stewart 	struct sctp_asconf_chunk *acp;
2327c54a18d2SRandall Stewart 	struct sctp_asconf_paramhdr *aph;
2328c54a18d2SRandall Stewart 	uint8_t aparam_buf[SCTP_PARAM_BUFFER_SIZE];
2329e6194c2eSMichael Tuexen 	struct sctp_paramhdr *ph;
2330c54a18d2SRandall Stewart 	int add_cnt, del_cnt;
2331c54a18d2SRandall Stewart 	uint16_t last_param_type;
2332c54a18d2SRandall Stewart 
2333c54a18d2SRandall Stewart 	add_cnt = del_cnt = 0;
2334c54a18d2SRandall Stewart 	last_param_type = 0;
23354a9ef3f8SMichael Tuexen 	TAILQ_FOREACH_SAFE(chk, &stcb->asoc.asconf_send_queue, sctp_next, nchk) {
2336c54a18d2SRandall Stewart 		if (chk->data == NULL) {
2337c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: No mbuf data?\n");
2338c54a18d2SRandall Stewart 			continue;
2339c54a18d2SRandall Stewart 		}
2340c54a18d2SRandall Stewart 		offset = 0;
2341c54a18d2SRandall Stewart 		acp = mtod(chk->data, struct sctp_asconf_chunk *);
2342c54a18d2SRandall Stewart 		offset += sizeof(struct sctp_asconf_chunk);
2343c54a18d2SRandall Stewart 		asconf_limit = ntohs(acp->ch.chunk_length);
2344e6194c2eSMichael Tuexen 		ph = (struct sctp_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_paramhdr), aparam_buf);
2345e6194c2eSMichael Tuexen 		if (ph == NULL) {
2346c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: couldn't get lookup addr!\n");
2347c54a18d2SRandall Stewart 			continue;
2348c54a18d2SRandall Stewart 		}
2349e6194c2eSMichael Tuexen 		offset += ntohs(ph->param_length);
2350c54a18d2SRandall Stewart 
2351c54a18d2SRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_asconf_paramhdr), aparam_buf);
2352c54a18d2SRandall Stewart 		if (aph == NULL) {
2353c54a18d2SRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: Empty ASCONF will be sent?\n");
2354c54a18d2SRandall Stewart 			continue;
2355c54a18d2SRandall Stewart 		}
2356c54a18d2SRandall Stewart 		while (aph != NULL) {
2357c54a18d2SRandall Stewart 			unsigned int param_length, param_type;
2358c54a18d2SRandall Stewart 
2359c54a18d2SRandall Stewart 			param_type = ntohs(aph->ph.param_type);
2360c54a18d2SRandall Stewart 			param_length = ntohs(aph->ph.param_length);
2361c54a18d2SRandall Stewart 			if (offset + param_length > asconf_limit) {
2362c54a18d2SRandall Stewart 				/* parameter goes beyond end of chunk! */
2363c54a18d2SRandall Stewart 				break;
2364c54a18d2SRandall Stewart 			}
2365c54a18d2SRandall Stewart 			if (param_length > sizeof(aparam_buf)) {
2366c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: param length (%u) larger than buffer size!\n", param_length);
2367c54a18d2SRandall Stewart 				break;
2368c54a18d2SRandall Stewart 			}
2369c54a18d2SRandall Stewart 			if (param_length <= sizeof(struct sctp_paramhdr)) {
2370c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: param length(%u) too short\n", param_length);
2371c54a18d2SRandall Stewart 				break;
2372c54a18d2SRandall Stewart 			}
23730053ed28SMichael Tuexen 
2374c54a18d2SRandall Stewart 			aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, param_length, aparam_buf);
2375c54a18d2SRandall Stewart 			if (aph == NULL) {
2376c54a18d2SRandall Stewart 				SCTPDBG(SCTP_DEBUG_ASCONF1, "is_addr_pending: couldn't get entire param\n");
2377c54a18d2SRandall Stewart 				break;
2378c54a18d2SRandall Stewart 			}
23790053ed28SMichael Tuexen 
2380e6194c2eSMichael Tuexen 			ph = (struct sctp_paramhdr *)(aph + 1);
2381e6194c2eSMichael Tuexen 			if (sctp_addr_match(ph, &sctp_ifa->address.sa) != 0) {
2382c54a18d2SRandall Stewart 				switch (param_type) {
2383c54a18d2SRandall Stewart 				case SCTP_ADD_IP_ADDRESS:
2384c54a18d2SRandall Stewart 					add_cnt++;
2385c54a18d2SRandall Stewart 					break;
2386c54a18d2SRandall Stewart 				case SCTP_DEL_IP_ADDRESS:
2387c54a18d2SRandall Stewart 					del_cnt++;
2388c54a18d2SRandall Stewart 					break;
2389c54a18d2SRandall Stewart 				default:
2390c54a18d2SRandall Stewart 					break;
2391c54a18d2SRandall Stewart 				}
2392c54a18d2SRandall Stewart 				last_param_type = param_type;
2393c54a18d2SRandall Stewart 			}
23940053ed28SMichael Tuexen 
2395c54a18d2SRandall Stewart 			offset += SCTP_SIZE32(param_length);
2396c54a18d2SRandall Stewart 			if (offset >= asconf_limit) {
2397c54a18d2SRandall Stewart 				/* no more data in the mbuf chain */
2398c54a18d2SRandall Stewart 				break;
2399c54a18d2SRandall Stewart 			}
2400c54a18d2SRandall Stewart 			/* get pointer to next asconf param */
2401c54a18d2SRandall Stewart 			aph = (struct sctp_asconf_paramhdr *)sctp_m_getptr(chk->data, offset, sizeof(struct sctp_asconf_paramhdr), aparam_buf);
2402c54a18d2SRandall Stewart 		}
2403c54a18d2SRandall Stewart 	}
2404c54a18d2SRandall Stewart 
2405b7b84c0eSMichael Tuexen 	/*
2406b7b84c0eSMichael Tuexen 	 * we want to find the sequences which consist of ADD -> DEL -> ADD
2407b7b84c0eSMichael Tuexen 	 * or DEL -> ADD
2408b7b84c0eSMichael Tuexen 	 */
2409c54a18d2SRandall Stewart 	if (add_cnt > del_cnt ||
2410c54a18d2SRandall Stewart 	    (add_cnt == del_cnt && last_param_type == SCTP_ADD_IP_ADDRESS)) {
241160990c0cSMichael Tuexen 		return (1);
2412c54a18d2SRandall Stewart 	}
241360990c0cSMichael Tuexen 	return (0);
2414c54a18d2SRandall Stewart }
2415c54a18d2SRandall Stewart 
2416f8829a4aSRandall Stewart static struct sockaddr *
24173232788eSRandall Stewart sctp_find_valid_localaddr(struct sctp_tcb *stcb, int addr_locked)
2418f8829a4aSRandall Stewart {
241942551e99SRandall Stewart 	struct sctp_vrf *vrf = NULL;
242042551e99SRandall Stewart 	struct sctp_ifn *sctp_ifn;
242142551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
2422f8829a4aSRandall Stewart 
24233232788eSRandall Stewart 	if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2424c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RLOCK();
242542551e99SRandall Stewart 	vrf = sctp_find_vrf(stcb->asoc.vrf_id);
2426ad81507eSRandall Stewart 	if (vrf == NULL) {
24273232788eSRandall Stewart 		if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2428c99efcf6SRandall Stewart 			SCTP_IPI_ADDR_RUNLOCK();
2429ad81507eSRandall Stewart 		return (NULL);
2430ad81507eSRandall Stewart 	}
243142551e99SRandall Stewart 	LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
2432a1cb341bSMichael Tuexen 		if (stcb->asoc.scope.loopback_scope == 0 &&
243342551e99SRandall Stewart 		    SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
2434f8829a4aSRandall Stewart 			/* Skip if loopback_scope not set */
2435f8829a4aSRandall Stewart 			continue;
2436f8829a4aSRandall Stewart 		}
243742551e99SRandall Stewart 		LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
2438e6194c2eSMichael Tuexen 			switch (sctp_ifa->address.sa.sa_family) {
2439e6194c2eSMichael Tuexen #ifdef INET
2440e6194c2eSMichael Tuexen 			case AF_INET:
2441a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv4_addr_legal) {
2442f8829a4aSRandall Stewart 					struct sockaddr_in *sin;
2443f8829a4aSRandall Stewart 
244424aaac8dSMichael Tuexen 					sin = &sctp_ifa->address.sin;
2445f8829a4aSRandall Stewart 					if (sin->sin_addr.s_addr == 0) {
2446f8829a4aSRandall Stewart 						/* skip unspecifed addresses */
2447f8829a4aSRandall Stewart 						continue;
2448f8829a4aSRandall Stewart 					}
24496ba22f19SMichael Tuexen 					if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
24506ba22f19SMichael Tuexen 					    &sin->sin_addr) != 0) {
24516ba22f19SMichael Tuexen 						continue;
24526ba22f19SMichael Tuexen 					}
2453a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.ipv4_local_scope == 0 &&
2454f8829a4aSRandall Stewart 					    IN4_ISPRIVATE_ADDRESS(&sin->sin_addr))
2455f8829a4aSRandall Stewart 						continue;
2456f8829a4aSRandall Stewart 
2457c54a18d2SRandall Stewart 					if (sctp_is_addr_restricted(stcb, sctp_ifa) &&
2458c54a18d2SRandall Stewart 					    (!sctp_is_addr_pending(stcb, sctp_ifa)))
2459f8829a4aSRandall Stewart 						continue;
2460b7b84c0eSMichael Tuexen 					/*
2461b7b84c0eSMichael Tuexen 					 * found a valid local v4 address to
2462b7b84c0eSMichael Tuexen 					 * use
2463b7b84c0eSMichael Tuexen 					 */
24643232788eSRandall Stewart 					if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2465c99efcf6SRandall Stewart 						SCTP_IPI_ADDR_RUNLOCK();
246642551e99SRandall Stewart 					return (&sctp_ifa->address.sa);
2467e6194c2eSMichael Tuexen 				}
2468e6194c2eSMichael Tuexen 				break;
2469e6194c2eSMichael Tuexen #endif
2470e6194c2eSMichael Tuexen #ifdef INET6
2471e6194c2eSMichael Tuexen 			case AF_INET6:
2472a1cb341bSMichael Tuexen 				if (stcb->asoc.scope.ipv6_addr_legal) {
2473f8829a4aSRandall Stewart 					struct sockaddr_in6 *sin6;
2474f8829a4aSRandall Stewart 
247542551e99SRandall Stewart 					if (sctp_ifa->localifa_flags & SCTP_ADDR_IFA_UNUSEABLE) {
2476f8829a4aSRandall Stewart 						continue;
247742551e99SRandall Stewart 					}
24780053ed28SMichael Tuexen 
247924aaac8dSMichael Tuexen 					sin6 = &sctp_ifa->address.sin6;
2480f8829a4aSRandall Stewart 					if (IN6_IS_ADDR_UNSPECIFIED(&sin6->sin6_addr)) {
2481b7b84c0eSMichael Tuexen 						/*
2482b7b84c0eSMichael Tuexen 						 * we skip unspecifed
2483b7b84c0eSMichael Tuexen 						 * addresses
2484b7b84c0eSMichael Tuexen 						 */
2485f8829a4aSRandall Stewart 						continue;
2486f8829a4aSRandall Stewart 					}
24876ba22f19SMichael Tuexen 					if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
24886ba22f19SMichael Tuexen 					    &sin6->sin6_addr) != 0) {
24896ba22f19SMichael Tuexen 						continue;
24906ba22f19SMichael Tuexen 					}
2491a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.local_scope == 0 &&
2492f8829a4aSRandall Stewart 					    IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr))
2493f8829a4aSRandall Stewart 						continue;
2494a1cb341bSMichael Tuexen 					if (stcb->asoc.scope.site_scope == 0 &&
2495f8829a4aSRandall Stewart 					    IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr))
2496f8829a4aSRandall Stewart 						continue;
2497f8829a4aSRandall Stewart 
2498c54a18d2SRandall Stewart 					if (sctp_is_addr_restricted(stcb, sctp_ifa) &&
2499c54a18d2SRandall Stewart 					    (!sctp_is_addr_pending(stcb, sctp_ifa)))
2500c54a18d2SRandall Stewart 						continue;
2501b7b84c0eSMichael Tuexen 					/*
2502b7b84c0eSMichael Tuexen 					 * found a valid local v6 address to
2503b7b84c0eSMichael Tuexen 					 * use
2504b7b84c0eSMichael Tuexen 					 */
25053232788eSRandall Stewart 					if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2506c99efcf6SRandall Stewart 						SCTP_IPI_ADDR_RUNLOCK();
250742551e99SRandall Stewart 					return (&sctp_ifa->address.sa);
2508f8829a4aSRandall Stewart 				}
2509e6194c2eSMichael Tuexen 				break;
2510e6194c2eSMichael Tuexen #endif
2511e6194c2eSMichael Tuexen 			default:
2512e6194c2eSMichael Tuexen 				break;
2513e6194c2eSMichael Tuexen 			}
2514f8829a4aSRandall Stewart 		}
2515f8829a4aSRandall Stewart 	}
2516f8829a4aSRandall Stewart 	/* no valid addresses found */
25173232788eSRandall Stewart 	if (addr_locked == SCTP_ADDR_NOT_LOCKED)
2518c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
2519f8829a4aSRandall Stewart 	return (NULL);
2520f8829a4aSRandall Stewart }
2521f8829a4aSRandall Stewart 
2522f8829a4aSRandall Stewart static struct sockaddr *
2523f8829a4aSRandall Stewart sctp_find_valid_localaddr_ep(struct sctp_tcb *stcb)
2524f8829a4aSRandall Stewart {
2525f8829a4aSRandall Stewart 	struct sctp_laddr *laddr;
2526f8829a4aSRandall Stewart 
2527f8829a4aSRandall Stewart 	LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
2528f8829a4aSRandall Stewart 		if (laddr->ifa == NULL) {
2529f8829a4aSRandall Stewart 			continue;
2530f8829a4aSRandall Stewart 		}
2531f8829a4aSRandall Stewart 		/* is the address restricted ? */
2532c54a18d2SRandall Stewart 		if (sctp_is_addr_restricted(stcb, laddr->ifa) &&
2533c54a18d2SRandall Stewart 		    (!sctp_is_addr_pending(stcb, laddr->ifa)))
2534f8829a4aSRandall Stewart 			continue;
2535f8829a4aSRandall Stewart 
2536f8829a4aSRandall Stewart 		/* found a valid local address to use */
253742551e99SRandall Stewart 		return (&laddr->ifa->address.sa);
2538f8829a4aSRandall Stewart 	}
2539f8829a4aSRandall Stewart 	/* no valid addresses found */
2540f8829a4aSRandall Stewart 	return (NULL);
2541f8829a4aSRandall Stewart }
2542f8829a4aSRandall Stewart 
2543f8829a4aSRandall Stewart /*
254418e198d3SRandall Stewart  * builds an ASCONF chunk from queued ASCONF params.
254518e198d3SRandall Stewart  * returns NULL on error (no mbuf, no ASCONF params queued, etc).
2546f8829a4aSRandall Stewart  */
2547f8829a4aSRandall Stewart struct mbuf *
25483232788eSRandall Stewart sctp_compose_asconf(struct sctp_tcb *stcb, int *retlen, int addr_locked)
2549f8829a4aSRandall Stewart {
2550f8829a4aSRandall Stewart 	struct mbuf *m_asconf, *m_asconf_chk;
2551f8829a4aSRandall Stewart 	struct sctp_asconf_addr *aa;
2552f8829a4aSRandall Stewart 	struct sctp_asconf_chunk *acp;
2553f8829a4aSRandall Stewart 	struct sctp_asconf_paramhdr *aph;
2554f8829a4aSRandall Stewart 	struct sctp_asconf_addr_param *aap;
2555f8829a4aSRandall Stewart 	uint32_t p_length;
2556f8829a4aSRandall Stewart 	uint32_t correlation_id = 1;	/* 0 is reserved... */
2557f8829a4aSRandall Stewart 	caddr_t ptr, lookup_ptr;
2558f8829a4aSRandall Stewart 	uint8_t lookup_used = 0;
2559f8829a4aSRandall Stewart 
2560f8829a4aSRandall Stewart 	/* are there any asconf params to send? */
2561c54a18d2SRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
2562c54a18d2SRandall Stewart 		if (aa->sent == 0)
2563c54a18d2SRandall Stewart 			break;
2564f8829a4aSRandall Stewart 	}
2565c54a18d2SRandall Stewart 	if (aa == NULL)
25661b649582SRandall Stewart 		return (NULL);
2567c54a18d2SRandall Stewart 
2568f8829a4aSRandall Stewart 	/*
2569f8829a4aSRandall Stewart 	 * get a chunk header mbuf and a cluster for the asconf params since
2570f8829a4aSRandall Stewart 	 * it's simpler to fill in the asconf chunk header lookup address on
2571f8829a4aSRandall Stewart 	 * the fly
2572f8829a4aSRandall Stewart 	 */
2573eb1b1807SGleb Smirnoff 	m_asconf_chk = sctp_get_mbuf_for_msg(sizeof(struct sctp_asconf_chunk), 0, M_NOWAIT, 1, MT_DATA);
2574f8829a4aSRandall Stewart 	if (m_asconf_chk == NULL) {
2575f8829a4aSRandall Stewart 		/* no mbuf's */
2576ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2577ad81507eSRandall Stewart 		    "compose_asconf: couldn't get chunk mbuf!\n");
2578f8829a4aSRandall Stewart 		return (NULL);
2579f8829a4aSRandall Stewart 	}
2580eb1b1807SGleb Smirnoff 	m_asconf = sctp_get_mbuf_for_msg(MCLBYTES, 0, M_NOWAIT, 1, MT_DATA);
2581f8829a4aSRandall Stewart 	if (m_asconf == NULL) {
2582f8829a4aSRandall Stewart 		/* no mbuf's */
2583ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2584ad81507eSRandall Stewart 		    "compose_asconf: couldn't get mbuf!\n");
2585f8829a4aSRandall Stewart 		sctp_m_freem(m_asconf_chk);
2586f8829a4aSRandall Stewart 		return (NULL);
2587f8829a4aSRandall Stewart 	}
2588139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_asconf_chk) = sizeof(struct sctp_asconf_chunk);
2589139bc87fSRandall Stewart 	SCTP_BUF_LEN(m_asconf) = 0;
2590f8829a4aSRandall Stewart 	acp = mtod(m_asconf_chk, struct sctp_asconf_chunk *);
25915ba7f91fSMichael Tuexen 	memset(acp, 0, sizeof(struct sctp_asconf_chunk));
2592f8829a4aSRandall Stewart 	/* save pointers to lookup address and asconf params */
2593f8829a4aSRandall Stewart 	lookup_ptr = (caddr_t)(acp + 1);	/* after the header */
2594f8829a4aSRandall Stewart 	ptr = mtod(m_asconf, caddr_t);	/* beginning of cluster */
2595f8829a4aSRandall Stewart 
2596f8829a4aSRandall Stewart 	/* fill in chunk header info */
2597f8829a4aSRandall Stewart 	acp->ch.chunk_type = SCTP_ASCONF;
2598f8829a4aSRandall Stewart 	acp->ch.chunk_flags = 0;
2599f8829a4aSRandall Stewart 	acp->serial_number = htonl(stcb->asoc.asconf_seq_out);
2600c54a18d2SRandall Stewart 	stcb->asoc.asconf_seq_out++;
2601f8829a4aSRandall Stewart 
2602f8829a4aSRandall Stewart 	/* add parameters... up to smallest MTU allowed */
2603f8829a4aSRandall Stewart 	TAILQ_FOREACH(aa, &stcb->asoc.asconf_queue, next) {
2604c54a18d2SRandall Stewart 		if (aa->sent)
2605c54a18d2SRandall Stewart 			continue;
2606f8829a4aSRandall Stewart 		/* get the parameter length */
2607f8829a4aSRandall Stewart 		p_length = SCTP_SIZE32(aa->ap.aph.ph.param_length);
2608f8829a4aSRandall Stewart 		/* will it fit in current chunk? */
2609a9d94d29SMichael Tuexen 		if ((SCTP_BUF_LEN(m_asconf) + p_length > stcb->asoc.smallest_mtu) ||
2610a9d94d29SMichael Tuexen 		    (SCTP_BUF_LEN(m_asconf) + p_length > MCLBYTES)) {
2611f8829a4aSRandall Stewart 			/* won't fit, so we're done with this chunk */
2612f8829a4aSRandall Stewart 			break;
2613f8829a4aSRandall Stewart 		}
2614f8829a4aSRandall Stewart 		/* assign (and store) a correlation id */
2615f8829a4aSRandall Stewart 		aa->ap.aph.correlation_id = correlation_id++;
2616f8829a4aSRandall Stewart 
2617f8829a4aSRandall Stewart 		/*
2618f8829a4aSRandall Stewart 		 * fill in address if we're doing a delete this is a simple
2619f8829a4aSRandall Stewart 		 * way for us to fill in the correlation address, which
2620f8829a4aSRandall Stewart 		 * should only be used by the peer if we're deleting our
2621f8829a4aSRandall Stewart 		 * source address and adding a new address (e.g. renumbering
2622f8829a4aSRandall Stewart 		 * case)
2623f8829a4aSRandall Stewart 		 */
2624f8829a4aSRandall Stewart 		if (lookup_used == 0 &&
2625830d754dSRandall Stewart 		    (aa->special_del == 0) &&
2626f8829a4aSRandall Stewart 		    aa->ap.aph.ph.param_type == SCTP_DEL_IP_ADDRESS) {
2627f8829a4aSRandall Stewart 			struct sctp_ipv6addr_param *lookup;
2628f8829a4aSRandall Stewart 			uint16_t p_size, addr_size;
2629f8829a4aSRandall Stewart 
2630f8829a4aSRandall Stewart 			lookup = (struct sctp_ipv6addr_param *)lookup_ptr;
2631f8829a4aSRandall Stewart 			lookup->ph.param_type =
2632f8829a4aSRandall Stewart 			    htons(aa->ap.addrp.ph.param_type);
2633f8829a4aSRandall Stewart 			if (aa->ap.addrp.ph.param_type == SCTP_IPV6_ADDRESS) {
2634f8829a4aSRandall Stewart 				/* copy IPv6 address */
2635f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv6addr_param);
2636f8829a4aSRandall Stewart 				addr_size = sizeof(struct in6_addr);
2637f8829a4aSRandall Stewart 			} else {
2638f8829a4aSRandall Stewart 				/* copy IPv4 address */
2639f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv4addr_param);
2640f8829a4aSRandall Stewart 				addr_size = sizeof(struct in_addr);
2641f8829a4aSRandall Stewart 			}
2642f8829a4aSRandall Stewart 			lookup->ph.param_length = htons(SCTP_SIZE32(p_size));
2643f8829a4aSRandall Stewart 			memcpy(lookup->addr, &aa->ap.addrp.addr, addr_size);
2644139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_asconf_chk) += SCTP_SIZE32(p_size);
2645f8829a4aSRandall Stewart 			lookup_used = 1;
2646f8829a4aSRandall Stewart 		}
2647f8829a4aSRandall Stewart 		/* copy into current space */
2648f8829a4aSRandall Stewart 		memcpy(ptr, &aa->ap, p_length);
2649f8829a4aSRandall Stewart 
2650f8829a4aSRandall Stewart 		/* network elements and update lengths */
2651f8829a4aSRandall Stewart 		aph = (struct sctp_asconf_paramhdr *)ptr;
2652f8829a4aSRandall Stewart 		aap = (struct sctp_asconf_addr_param *)ptr;
2653f8829a4aSRandall Stewart 		/* correlation_id is transparent to peer, no htonl needed */
2654f8829a4aSRandall Stewart 		aph->ph.param_type = htons(aph->ph.param_type);
2655f8829a4aSRandall Stewart 		aph->ph.param_length = htons(aph->ph.param_length);
2656f8829a4aSRandall Stewart 		aap->addrp.ph.param_type = htons(aap->addrp.ph.param_type);
2657f8829a4aSRandall Stewart 		aap->addrp.ph.param_length = htons(aap->addrp.ph.param_length);
2658f8829a4aSRandall Stewart 
2659139bc87fSRandall Stewart 		SCTP_BUF_LEN(m_asconf) += SCTP_SIZE32(p_length);
2660f8829a4aSRandall Stewart 		ptr += SCTP_SIZE32(p_length);
2661f8829a4aSRandall Stewart 
2662f8829a4aSRandall Stewart 		/*
2663f8829a4aSRandall Stewart 		 * these params are removed off the pending list upon
2664f8829a4aSRandall Stewart 		 * getting an ASCONF-ACK back from the peer, just set flag
2665f8829a4aSRandall Stewart 		 */
2666f8829a4aSRandall Stewart 		aa->sent = 1;
2667f8829a4aSRandall Stewart 	}
2668f8829a4aSRandall Stewart 	/* check to see if the lookup addr has been populated yet */
2669f8829a4aSRandall Stewart 	if (lookup_used == 0) {
2670f8829a4aSRandall Stewart 		/* NOTE: if the address param is optional, can skip this... */
2671f8829a4aSRandall Stewart 		/* add any valid (existing) address... */
2672f8829a4aSRandall Stewart 		struct sctp_ipv6addr_param *lookup;
2673f8829a4aSRandall Stewart 		uint16_t p_size, addr_size;
2674f8829a4aSRandall Stewart 		struct sockaddr *found_addr;
2675f8829a4aSRandall Stewart 		caddr_t addr_ptr;
2676f8829a4aSRandall Stewart 
2677f8829a4aSRandall Stewart 		if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL)
26783232788eSRandall Stewart 			found_addr = sctp_find_valid_localaddr(stcb,
26793232788eSRandall Stewart 			    addr_locked);
2680f8829a4aSRandall Stewart 		else
2681f8829a4aSRandall Stewart 			found_addr = sctp_find_valid_localaddr_ep(stcb);
2682f8829a4aSRandall Stewart 
2683f8829a4aSRandall Stewart 		lookup = (struct sctp_ipv6addr_param *)lookup_ptr;
2684f8829a4aSRandall Stewart 		if (found_addr != NULL) {
2685e6194c2eSMichael Tuexen 			switch (found_addr->sa_family) {
2686e6194c2eSMichael Tuexen #ifdef INET6
2687e6194c2eSMichael Tuexen 			case AF_INET6:
2688f8829a4aSRandall Stewart 				/* copy IPv6 address */
2689f8829a4aSRandall Stewart 				lookup->ph.param_type =
2690f8829a4aSRandall Stewart 				    htons(SCTP_IPV6_ADDRESS);
2691f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv6addr_param);
2692f8829a4aSRandall Stewart 				addr_size = sizeof(struct in6_addr);
2693f8829a4aSRandall Stewart 				addr_ptr = (caddr_t)&((struct sockaddr_in6 *)
2694f8829a4aSRandall Stewart 				    found_addr)->sin6_addr;
2695e6194c2eSMichael Tuexen 				break;
2696e6194c2eSMichael Tuexen #endif
2697e6194c2eSMichael Tuexen #ifdef INET
2698e6194c2eSMichael Tuexen 			case AF_INET:
2699f8829a4aSRandall Stewart 				/* copy IPv4 address */
2700f8829a4aSRandall Stewart 				lookup->ph.param_type =
2701f8829a4aSRandall Stewart 				    htons(SCTP_IPV4_ADDRESS);
2702f8829a4aSRandall Stewart 				p_size = sizeof(struct sctp_ipv4addr_param);
2703f8829a4aSRandall Stewart 				addr_size = sizeof(struct in_addr);
2704f8829a4aSRandall Stewart 				addr_ptr = (caddr_t)&((struct sockaddr_in *)
2705f8829a4aSRandall Stewart 				    found_addr)->sin_addr;
2706e6194c2eSMichael Tuexen 				break;
2707e6194c2eSMichael Tuexen #endif
2708e6194c2eSMichael Tuexen 			default:
2709e6194c2eSMichael Tuexen 				p_size = 0;
2710e6194c2eSMichael Tuexen 				addr_size = 0;
2711e6194c2eSMichael Tuexen 				addr_ptr = NULL;
2712e6194c2eSMichael Tuexen 				break;
2713f8829a4aSRandall Stewart 			}
2714f8829a4aSRandall Stewart 			lookup->ph.param_length = htons(SCTP_SIZE32(p_size));
2715f8829a4aSRandall Stewart 			memcpy(lookup->addr, addr_ptr, addr_size);
2716139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_asconf_chk) += SCTP_SIZE32(p_size);
2717f8829a4aSRandall Stewart 		} else {
2718f8829a4aSRandall Stewart 			/* uh oh... don't have any address?? */
2719ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
2720ad81507eSRandall Stewart 			    "compose_asconf: no lookup addr!\n");
2721e6194c2eSMichael Tuexen 			/* XXX for now, we send a IPv4 address of 0.0.0.0 */
2722f8829a4aSRandall Stewart 			lookup->ph.param_type = htons(SCTP_IPV4_ADDRESS);
2723f8829a4aSRandall Stewart 			lookup->ph.param_length = htons(SCTP_SIZE32(sizeof(struct sctp_ipv4addr_param)));
27245ba7f91fSMichael Tuexen 			memset(lookup->addr, 0, sizeof(struct in_addr));
2725139bc87fSRandall Stewart 			SCTP_BUF_LEN(m_asconf_chk) += SCTP_SIZE32(sizeof(struct sctp_ipv4addr_param));
2726f8829a4aSRandall Stewart 		}
2727f8829a4aSRandall Stewart 	}
2728f8829a4aSRandall Stewart 	/* chain it all together */
2729139bc87fSRandall Stewart 	SCTP_BUF_NEXT(m_asconf_chk) = m_asconf;
27303c503c28SRandall Stewart 	*retlen = SCTP_BUF_LEN(m_asconf_chk) + SCTP_BUF_LEN(m_asconf);
2731c9eb4473SMichael Tuexen 	acp->ch.chunk_length = htons(*retlen);
2732f8829a4aSRandall Stewart 
2733f8829a4aSRandall Stewart 	return (m_asconf_chk);
2734f8829a4aSRandall Stewart }
2735f8829a4aSRandall Stewart 
2736f8829a4aSRandall Stewart /*
2737f8829a4aSRandall Stewart  * section to handle address changes before an association is up eg. changes
2738f8829a4aSRandall Stewart  * during INIT/INIT-ACK/COOKIE-ECHO handshake
2739f8829a4aSRandall Stewart  */
2740f8829a4aSRandall Stewart 
2741f8829a4aSRandall Stewart /*
2742f8829a4aSRandall Stewart  * processes the (local) addresses in the INIT-ACK chunk
2743f8829a4aSRandall Stewart  */
2744f8829a4aSRandall Stewart static void
2745f8829a4aSRandall Stewart sctp_process_initack_addresses(struct sctp_tcb *stcb, struct mbuf *m,
2746f8829a4aSRandall Stewart     unsigned int offset, unsigned int length)
2747f8829a4aSRandall Stewart {
2748f8829a4aSRandall Stewart 	struct sctp_paramhdr tmp_param, *ph;
2749f8829a4aSRandall Stewart 	uint16_t plen, ptype;
275042551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
275123602b60SMichael Tuexen 	union sctp_sockstore store;
2752e6194c2eSMichael Tuexen #ifdef INET6
27535e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr6_store;
2754e6194c2eSMichael Tuexen #endif
2755e6194c2eSMichael Tuexen #ifdef INET
27565e20b91dSMichael Tuexen 	struct sctp_ipv4addr_param addr4_store;
2757e6194c2eSMichael Tuexen #endif
2758f8829a4aSRandall Stewart 
2759ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF2, "processing init-ack addresses\n");
2760ad81507eSRandall Stewart 	if (stcb == NULL)	/* Un-needed check for SA */
2761ad81507eSRandall Stewart 		return;
2762f8829a4aSRandall Stewart 
2763f8829a4aSRandall Stewart 	/* convert to upper bound */
2764f8829a4aSRandall Stewart 	length += offset;
2765f8829a4aSRandall Stewart 
2766f8829a4aSRandall Stewart 	if ((offset + sizeof(struct sctp_paramhdr)) > length) {
2767f8829a4aSRandall Stewart 		return;
2768f8829a4aSRandall Stewart 	}
2769f8829a4aSRandall Stewart 	/* go through the addresses in the init-ack */
2770e6194c2eSMichael Tuexen 	ph = (struct sctp_paramhdr *)
2771e6194c2eSMichael Tuexen 	    sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr),
2772e6194c2eSMichael Tuexen 	    (uint8_t *)&tmp_param);
2773f8829a4aSRandall Stewart 	while (ph != NULL) {
2774f8829a4aSRandall Stewart 		ptype = ntohs(ph->param_type);
2775f8829a4aSRandall Stewart 		plen = ntohs(ph->param_length);
2776e6194c2eSMichael Tuexen 		switch (ptype) {
2777e6194c2eSMichael Tuexen #ifdef INET6
2778e6194c2eSMichael Tuexen 		case SCTP_IPV6_ADDRESS:
2779e6194c2eSMichael Tuexen 			{
2780f8829a4aSRandall Stewart 				struct sctp_ipv6addr_param *a6p;
2781f8829a4aSRandall Stewart 
2782f8829a4aSRandall Stewart 				/* get the entire IPv6 address param */
2783f8829a4aSRandall Stewart 				a6p = (struct sctp_ipv6addr_param *)
2784f8829a4aSRandall Stewart 				    sctp_m_getptr(m, offset,
2785f8829a4aSRandall Stewart 				    sizeof(struct sctp_ipv6addr_param),
27865e20b91dSMichael Tuexen 				    (uint8_t *)&addr6_store);
2787f8829a4aSRandall Stewart 				if (plen != sizeof(struct sctp_ipv6addr_param) ||
2788f8829a4aSRandall Stewart 				    a6p == NULL) {
2789f8829a4aSRandall Stewart 					return;
2790f8829a4aSRandall Stewart 				}
279123602b60SMichael Tuexen 				memset(&store, 0, sizeof(union sctp_sockstore));
279223602b60SMichael Tuexen 				store.sin6.sin6_family = AF_INET6;
279323602b60SMichael Tuexen 				store.sin6.sin6_len = sizeof(struct sockaddr_in6);
279423602b60SMichael Tuexen 				store.sin6.sin6_port = stcb->rport;
279523602b60SMichael Tuexen 				memcpy(&store.sin6.sin6_addr, a6p->addr, sizeof(struct in6_addr));
2796e6194c2eSMichael Tuexen 				break;
2797e6194c2eSMichael Tuexen 			}
2798e6194c2eSMichael Tuexen #endif
2799e6194c2eSMichael Tuexen #ifdef INET
2800e6194c2eSMichael Tuexen 		case SCTP_IPV4_ADDRESS:
2801e6194c2eSMichael Tuexen 			{
2802f8829a4aSRandall Stewart 				struct sctp_ipv4addr_param *a4p;
2803f8829a4aSRandall Stewart 
2804f8829a4aSRandall Stewart 				/* get the entire IPv4 address param */
280542551e99SRandall Stewart 				a4p = (struct sctp_ipv4addr_param *)sctp_m_getptr(m, offset,
280642551e99SRandall Stewart 				    sizeof(struct sctp_ipv4addr_param),
28075e20b91dSMichael Tuexen 				    (uint8_t *)&addr4_store);
2808f8829a4aSRandall Stewart 				if (plen != sizeof(struct sctp_ipv4addr_param) ||
2809f8829a4aSRandall Stewart 				    a4p == NULL) {
2810f8829a4aSRandall Stewart 					return;
2811f8829a4aSRandall Stewart 				}
281223602b60SMichael Tuexen 				memset(&store, 0, sizeof(union sctp_sockstore));
281323602b60SMichael Tuexen 				store.sin.sin_family = AF_INET;
281423602b60SMichael Tuexen 				store.sin.sin_len = sizeof(struct sockaddr_in);
281523602b60SMichael Tuexen 				store.sin.sin_port = stcb->rport;
281623602b60SMichael Tuexen 				store.sin.sin_addr.s_addr = a4p->addr;
28171d663b46SMichael Tuexen 				break;
2818e6194c2eSMichael Tuexen 			}
2819e6194c2eSMichael Tuexen #endif
2820e6194c2eSMichael Tuexen 		default:
2821f8829a4aSRandall Stewart 			goto next_addr;
2822f8829a4aSRandall Stewart 		}
2823f8829a4aSRandall Stewart 
2824f8829a4aSRandall Stewart 		/* see if this address really (still) exists */
2825448e8596SMichael Tuexen 		sctp_ifa = sctp_find_ifa_by_addr(&store.sa, stcb->asoc.vrf_id,
28263232788eSRandall Stewart 		    SCTP_ADDR_NOT_LOCKED);
282742551e99SRandall Stewart 		if (sctp_ifa == NULL) {
2828f8829a4aSRandall Stewart 			/* address doesn't exist anymore */
2829f8829a4aSRandall Stewart 			int status;
2830f8829a4aSRandall Stewart 
2831f8829a4aSRandall Stewart 			/* are ASCONFs allowed ? */
2832f8829a4aSRandall Stewart 			if ((sctp_is_feature_on(stcb->sctp_ep,
2833f8829a4aSRandall Stewart 			    SCTP_PCB_FLAGS_DO_ASCONF)) &&
2834c79bec9cSMichael Tuexen 			    stcb->asoc.asconf_supported) {
2835f8829a4aSRandall Stewart 				/* queue an ASCONF DEL_IP_ADDRESS */
283623602b60SMichael Tuexen 				status = sctp_asconf_queue_sa_delete(stcb, &store.sa);
2837f8829a4aSRandall Stewart 				/*
28381b649582SRandall Stewart 				 * if queued ok, and in correct state, send
28391b649582SRandall Stewart 				 * out the ASCONF.
2840f8829a4aSRandall Stewart 				 */
2841f8829a4aSRandall Stewart 				if (status == 0 &&
2842839d21d6SMichael Tuexen 				    SCTP_GET_STATE(stcb) == SCTP_STATE_OPEN) {
28431b649582SRandall Stewart #ifdef SCTP_TIMER_BASED_ASCONF
2844f8829a4aSRandall Stewart 					sctp_timer_start(SCTP_TIMER_TYPE_ASCONF,
2845f8829a4aSRandall Stewart 					    stcb->sctp_ep, stcb,
2846f8829a4aSRandall Stewart 					    stcb->asoc.primary_destination);
28471b649582SRandall Stewart #else
2848ca85e948SMichael Tuexen 					sctp_send_asconf(stcb, NULL, SCTP_ADDR_NOT_LOCKED);
28491b649582SRandall Stewart #endif
2850f8829a4aSRandall Stewart 				}
2851f8829a4aSRandall Stewart 			}
2852f8829a4aSRandall Stewart 		}
28530053ed28SMichael Tuexen 
2854f8829a4aSRandall Stewart next_addr:
2855f8829a4aSRandall Stewart 		/*
2856f8829a4aSRandall Stewart 		 * Sanity check:  Make sure the length isn't 0, otherwise
2857f8829a4aSRandall Stewart 		 * we'll be stuck in this loop for a long time...
2858f8829a4aSRandall Stewart 		 */
2859f8829a4aSRandall Stewart 		if (SCTP_SIZE32(plen) == 0) {
2860ad81507eSRandall Stewart 			SCTP_PRINTF("process_initack_addrs: bad len (%d) type=%xh\n",
2861f8829a4aSRandall Stewart 			    plen, ptype);
2862f8829a4aSRandall Stewart 			return;
2863f8829a4aSRandall Stewart 		}
2864f8829a4aSRandall Stewart 		/* get next parameter */
2865f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(plen);
2866f8829a4aSRandall Stewart 		if ((offset + sizeof(struct sctp_paramhdr)) > length)
2867f8829a4aSRandall Stewart 			return;
2868f8829a4aSRandall Stewart 		ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset,
2869f8829a4aSRandall Stewart 		    sizeof(struct sctp_paramhdr), (uint8_t *)&tmp_param);
2870f8829a4aSRandall Stewart 	}			/* while */
2871f8829a4aSRandall Stewart }
2872f8829a4aSRandall Stewart 
2873f8829a4aSRandall Stewart /* FIX ME: need to verify return result for v6 address type if v6 disabled */
2874f8829a4aSRandall Stewart /*
2875f8829a4aSRandall Stewart  * checks to see if a specific address is in the initack address list returns
2876f8829a4aSRandall Stewart  * 1 if found, 0 if not
2877f8829a4aSRandall Stewart  */
2878f8829a4aSRandall Stewart static uint32_t
2879b0471b4bSMichael Tuexen sctp_addr_in_initack(struct mbuf *m, uint32_t offset, uint32_t length, struct sockaddr *sa)
2880b0471b4bSMichael Tuexen {
2881f8829a4aSRandall Stewart 	struct sctp_paramhdr tmp_param, *ph;
2882f8829a4aSRandall Stewart 	uint16_t plen, ptype;
2883e6194c2eSMichael Tuexen #ifdef INET
2884f8829a4aSRandall Stewart 	struct sockaddr_in *sin;
2885f8829a4aSRandall Stewart 	struct sctp_ipv4addr_param *a4p;
28865e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr4_store;
2887e6194c2eSMichael Tuexen #endif
2888f8829a4aSRandall Stewart #ifdef INET6
288942551e99SRandall Stewart 	struct sockaddr_in6 *sin6;
2890f8829a4aSRandall Stewart 	struct sctp_ipv6addr_param *a6p;
28915e20b91dSMichael Tuexen 	struct sctp_ipv6addr_param addr6_store;
289242551e99SRandall Stewart 	struct sockaddr_in6 sin6_tmp;
2893e6194c2eSMichael Tuexen #endif
2894f8829a4aSRandall Stewart 
2895e6194c2eSMichael Tuexen 	switch (sa->sa_family) {
2896e6194c2eSMichael Tuexen #ifdef INET
2897e6194c2eSMichael Tuexen 	case AF_INET:
2898e6194c2eSMichael Tuexen 		break;
2899e6194c2eSMichael Tuexen #endif
2900f8829a4aSRandall Stewart #ifdef INET6
2901e6194c2eSMichael Tuexen 	case AF_INET6:
2902e6194c2eSMichael Tuexen 		break;
2903e6194c2eSMichael Tuexen #endif
2904e6194c2eSMichael Tuexen 	default:
2905f8829a4aSRandall Stewart 		return (0);
2906e6194c2eSMichael Tuexen 	}
2907f8829a4aSRandall Stewart 
2908ad81507eSRandall Stewart 	SCTPDBG(SCTP_DEBUG_ASCONF2, "find_initack_addr: starting search for ");
2909ad81507eSRandall Stewart 	SCTPDBG_ADDR(SCTP_DEBUG_ASCONF2, sa);
2910f8829a4aSRandall Stewart 	/* convert to upper bound */
2911f8829a4aSRandall Stewart 	length += offset;
2912f8829a4aSRandall Stewart 
2913f8829a4aSRandall Stewart 	if ((offset + sizeof(struct sctp_paramhdr)) > length) {
2914ad81507eSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
2915ad81507eSRandall Stewart 		    "find_initack_addr: invalid offset?\n");
2916f8829a4aSRandall Stewart 		return (0);
2917f8829a4aSRandall Stewart 	}
2918f8829a4aSRandall Stewart 	/* go through the addresses in the init-ack */
2919f8829a4aSRandall Stewart 	ph = (struct sctp_paramhdr *)sctp_m_getptr(m, offset,
2920f8829a4aSRandall Stewart 	    sizeof(struct sctp_paramhdr), (uint8_t *)&tmp_param);
2921f8829a4aSRandall Stewart 	while (ph != NULL) {
2922f8829a4aSRandall Stewart 		ptype = ntohs(ph->param_type);
2923f8829a4aSRandall Stewart 		plen = ntohs(ph->param_length);
2924e6194c2eSMichael Tuexen 		switch (ptype) {
2925f8829a4aSRandall Stewart #ifdef INET6
2926e6194c2eSMichael Tuexen 		case SCTP_IPV6_ADDRESS:
2927e6194c2eSMichael Tuexen 			if (sa->sa_family == AF_INET6) {
2928e6194c2eSMichael Tuexen 				/* get the entire IPv6 address param */
2929e6194c2eSMichael Tuexen 				if (plen != sizeof(struct sctp_ipv6addr_param)) {
2930e6194c2eSMichael Tuexen 					break;
2931e6194c2eSMichael Tuexen 				}
2932f8829a4aSRandall Stewart 				/* get the entire IPv6 address param */
2933f8829a4aSRandall Stewart 				a6p = (struct sctp_ipv6addr_param *)
2934f8829a4aSRandall Stewart 				    sctp_m_getptr(m, offset,
2935f8829a4aSRandall Stewart 				    sizeof(struct sctp_ipv6addr_param),
29365e20b91dSMichael Tuexen 				    (uint8_t *)&addr6_store);
2937e6194c2eSMichael Tuexen 				if (a6p == NULL) {
2938f8829a4aSRandall Stewart 					return (0);
2939f8829a4aSRandall Stewart 				}
2940f8829a4aSRandall Stewart 				sin6 = (struct sockaddr_in6 *)sa;
2941f8829a4aSRandall Stewart 				if (IN6_IS_SCOPE_LINKLOCAL(&sin6->sin6_addr)) {
2942f8829a4aSRandall Stewart 					/* create a copy and clear scope */
2943f8829a4aSRandall Stewart 					memcpy(&sin6_tmp, sin6,
2944f8829a4aSRandall Stewart 					    sizeof(struct sockaddr_in6));
2945f8829a4aSRandall Stewart 					sin6 = &sin6_tmp;
2946f8829a4aSRandall Stewart 					in6_clearscope(&sin6->sin6_addr);
2947f8829a4aSRandall Stewart 				}
2948f8829a4aSRandall Stewart 				if (memcmp(&sin6->sin6_addr, a6p->addr,
2949f8829a4aSRandall Stewart 				    sizeof(struct in6_addr)) == 0) {
2950f8829a4aSRandall Stewart 					/* found it */
2951f8829a4aSRandall Stewart 					return (1);
2952f8829a4aSRandall Stewart 				}
2953e6194c2eSMichael Tuexen 			}
2954e6194c2eSMichael Tuexen 			break;
2955f8829a4aSRandall Stewart #endif				/* INET6 */
2956e6194c2eSMichael Tuexen #ifdef INET
2957e6194c2eSMichael Tuexen 		case SCTP_IPV4_ADDRESS:
2958e6194c2eSMichael Tuexen 			if (sa->sa_family == AF_INET) {
2959e6194c2eSMichael Tuexen 				if (plen != sizeof(struct sctp_ipv4addr_param)) {
2960e6194c2eSMichael Tuexen 					break;
2961e6194c2eSMichael Tuexen 				}
2962f8829a4aSRandall Stewart 				/* get the entire IPv4 address param */
2963e6194c2eSMichael Tuexen 				a4p = (struct sctp_ipv4addr_param *)
2964e6194c2eSMichael Tuexen 				    sctp_m_getptr(m, offset,
2965e6194c2eSMichael Tuexen 				    sizeof(struct sctp_ipv4addr_param),
29665e20b91dSMichael Tuexen 				    (uint8_t *)&addr4_store);
2967e6194c2eSMichael Tuexen 				if (a4p == NULL) {
2968f8829a4aSRandall Stewart 					return (0);
2969f8829a4aSRandall Stewart 				}
2970f8829a4aSRandall Stewart 				sin = (struct sockaddr_in *)sa;
2971f8829a4aSRandall Stewart 				if (sin->sin_addr.s_addr == a4p->addr) {
2972f8829a4aSRandall Stewart 					/* found it */
2973f8829a4aSRandall Stewart 					return (1);
2974f8829a4aSRandall Stewart 				}
2975f8829a4aSRandall Stewart 			}
2976e6194c2eSMichael Tuexen 			break;
2977e6194c2eSMichael Tuexen #endif
2978e6194c2eSMichael Tuexen 		default:
2979e6194c2eSMichael Tuexen 			break;
2980e6194c2eSMichael Tuexen 		}
2981f8829a4aSRandall Stewart 		/* get next parameter */
2982f8829a4aSRandall Stewart 		offset += SCTP_SIZE32(plen);
2983e6194c2eSMichael Tuexen 		if (offset + sizeof(struct sctp_paramhdr) > length) {
2984f8829a4aSRandall Stewart 			return (0);
2985e6194c2eSMichael Tuexen 		}
2986f8829a4aSRandall Stewart 		ph = (struct sctp_paramhdr *)
2987f8829a4aSRandall Stewart 		    sctp_m_getptr(m, offset, sizeof(struct sctp_paramhdr),
2988f8829a4aSRandall Stewart 		    (uint8_t *)&tmp_param);
2989f8829a4aSRandall Stewart 	}			/* while */
2990f8829a4aSRandall Stewart 	/* not found! */
2991f8829a4aSRandall Stewart 	return (0);
2992f8829a4aSRandall Stewart }
2993f8829a4aSRandall Stewart 
2994f8829a4aSRandall Stewart /*
2995f8829a4aSRandall Stewart  * makes sure that the current endpoint local addr list is consistent with
2996f8829a4aSRandall Stewart  * the new association (eg. subset bound, asconf allowed) adds addresses as
2997f8829a4aSRandall Stewart  * necessary
2998f8829a4aSRandall Stewart  */
2999f8829a4aSRandall Stewart static void
3000f8829a4aSRandall Stewart sctp_check_address_list_ep(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3001f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr)
3002f8829a4aSRandall Stewart {
3003f8829a4aSRandall Stewart 	struct sctp_laddr *laddr;
3004f8829a4aSRandall Stewart 
3005f8829a4aSRandall Stewart 	/* go through the endpoint list */
3006f8829a4aSRandall Stewart 	LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
3007f8829a4aSRandall Stewart 		/* be paranoid and validate the laddr */
3008f8829a4aSRandall Stewart 		if (laddr->ifa == NULL) {
3009ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1,
3010ad81507eSRandall Stewart 			    "check_addr_list_ep: laddr->ifa is NULL");
3011f8829a4aSRandall Stewart 			continue;
3012f8829a4aSRandall Stewart 		}
301342551e99SRandall Stewart 		if (laddr->ifa == NULL) {
3014ad81507eSRandall Stewart 			SCTPDBG(SCTP_DEBUG_ASCONF1, "check_addr_list_ep: laddr->ifa->ifa_addr is NULL");
3015f8829a4aSRandall Stewart 			continue;
3016f8829a4aSRandall Stewart 		}
3017f8829a4aSRandall Stewart 		/* do i have it implicitly? */
301842551e99SRandall Stewart 		if (sctp_cmpaddr(&laddr->ifa->address.sa, init_addr)) {
3019f8829a4aSRandall Stewart 			continue;
3020f8829a4aSRandall Stewart 		}
3021f8829a4aSRandall Stewart 		/* check to see if in the init-ack */
30227215cc1bSMichael Tuexen 		if (!sctp_addr_in_initack(m, offset, length, &laddr->ifa->address.sa)) {
3023f8829a4aSRandall Stewart 			/* try to add it */
3024f8829a4aSRandall Stewart 			sctp_addr_mgmt_assoc(stcb->sctp_ep, stcb, laddr->ifa,
30253232788eSRandall Stewart 			    SCTP_ADD_IP_ADDRESS, SCTP_ADDR_NOT_LOCKED);
3026f8829a4aSRandall Stewart 		}
3027f8829a4aSRandall Stewart 	}
3028f8829a4aSRandall Stewart }
3029f8829a4aSRandall Stewart 
3030f8829a4aSRandall Stewart /*
3031f8829a4aSRandall Stewart  * makes sure that the current kernel address list is consistent with the new
3032f8829a4aSRandall Stewart  * association (with all addrs bound) adds addresses as necessary
3033f8829a4aSRandall Stewart  */
3034f8829a4aSRandall Stewart static void
3035f8829a4aSRandall Stewart sctp_check_address_list_all(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3036f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr,
3037f8829a4aSRandall Stewart     uint16_t local_scope, uint16_t site_scope,
3038f8829a4aSRandall Stewart     uint16_t ipv4_scope, uint16_t loopback_scope)
3039f8829a4aSRandall Stewart {
304042551e99SRandall Stewart 	struct sctp_vrf *vrf = NULL;
304142551e99SRandall Stewart 	struct sctp_ifn *sctp_ifn;
304242551e99SRandall Stewart 	struct sctp_ifa *sctp_ifa;
304342551e99SRandall Stewart 	uint32_t vrf_id;
30447215cc1bSMichael Tuexen #ifdef INET
30457215cc1bSMichael Tuexen 	struct sockaddr_in *sin;
30467215cc1bSMichael Tuexen #endif
30477215cc1bSMichael Tuexen #ifdef INET6
30487215cc1bSMichael Tuexen 	struct sockaddr_in6 *sin6;
30497215cc1bSMichael Tuexen #endif
30507215cc1bSMichael Tuexen 
3051bff64a4dSRandall Stewart 	if (stcb) {
3052bff64a4dSRandall Stewart 		vrf_id = stcb->asoc.vrf_id;
3053bff64a4dSRandall Stewart 	} else {
3054ad81507eSRandall Stewart 		return;
3055bff64a4dSRandall Stewart 	}
3056c99efcf6SRandall Stewart 	SCTP_IPI_ADDR_RLOCK();
305742551e99SRandall Stewart 	vrf = sctp_find_vrf(vrf_id);
305842551e99SRandall Stewart 	if (vrf == NULL) {
3059c99efcf6SRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
306042551e99SRandall Stewart 		return;
306142551e99SRandall Stewart 	}
3062f8829a4aSRandall Stewart 	/* go through all our known interfaces */
306342551e99SRandall Stewart 	LIST_FOREACH(sctp_ifn, &vrf->ifnlist, next_ifn) {
306442551e99SRandall Stewart 		if (loopback_scope == 0 && SCTP_IFN_IS_IFT_LOOP(sctp_ifn)) {
3065f8829a4aSRandall Stewart 			/* skip loopback interface */
3066f8829a4aSRandall Stewart 			continue;
3067f8829a4aSRandall Stewart 		}
3068f8829a4aSRandall Stewart 		/* go through each interface address */
306942551e99SRandall Stewart 		LIST_FOREACH(sctp_ifa, &sctp_ifn->ifalist, next_ifa) {
3070f8829a4aSRandall Stewart 			/* do i have it implicitly? */
307142551e99SRandall Stewart 			if (sctp_cmpaddr(&sctp_ifa->address.sa, init_addr)) {
3072f8829a4aSRandall Stewart 				continue;
3073f8829a4aSRandall Stewart 			}
30747215cc1bSMichael Tuexen 			switch (sctp_ifa->address.sa.sa_family) {
30757215cc1bSMichael Tuexen #ifdef INET
30767215cc1bSMichael Tuexen 			case AF_INET:
307724aaac8dSMichael Tuexen 				sin = &sctp_ifa->address.sin;
30786ba22f19SMichael Tuexen 				if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
30796ba22f19SMichael Tuexen 				    &sin->sin_addr) != 0) {
30806ba22f19SMichael Tuexen 					continue;
30816ba22f19SMichael Tuexen 				}
30827215cc1bSMichael Tuexen 				if ((ipv4_scope == 0) &&
30837215cc1bSMichael Tuexen 				    (IN4_ISPRIVATE_ADDRESS(&sin->sin_addr))) {
30847215cc1bSMichael Tuexen 					/* private address not in scope */
30857215cc1bSMichael Tuexen 					continue;
30867215cc1bSMichael Tuexen 				}
30877215cc1bSMichael Tuexen 				break;
30887215cc1bSMichael Tuexen #endif
30897215cc1bSMichael Tuexen #ifdef INET6
30907215cc1bSMichael Tuexen 			case AF_INET6:
309124aaac8dSMichael Tuexen 				sin6 = &sctp_ifa->address.sin6;
30926ba22f19SMichael Tuexen 				if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
30936ba22f19SMichael Tuexen 				    &sin6->sin6_addr) != 0) {
30946ba22f19SMichael Tuexen 					continue;
30956ba22f19SMichael Tuexen 				}
30967215cc1bSMichael Tuexen 				if ((local_scope == 0) &&
30977215cc1bSMichael Tuexen 				    (IN6_IS_ADDR_LINKLOCAL(&sin6->sin6_addr))) {
30987215cc1bSMichael Tuexen 					continue;
30997215cc1bSMichael Tuexen 				}
31007215cc1bSMichael Tuexen 				if ((site_scope == 0) &&
31017215cc1bSMichael Tuexen 				    (IN6_IS_ADDR_SITELOCAL(&sin6->sin6_addr))) {
31027215cc1bSMichael Tuexen 					continue;
31037215cc1bSMichael Tuexen 				}
31047215cc1bSMichael Tuexen 				break;
31057215cc1bSMichael Tuexen #endif
31067215cc1bSMichael Tuexen 			default:
31077215cc1bSMichael Tuexen 				break;
31087215cc1bSMichael Tuexen 			}
3109f8829a4aSRandall Stewart 			/* check to see if in the init-ack */
31107215cc1bSMichael Tuexen 			if (!sctp_addr_in_initack(m, offset, length, &sctp_ifa->address.sa)) {
3111f8829a4aSRandall Stewart 				/* try to add it */
3112f8829a4aSRandall Stewart 				sctp_addr_mgmt_assoc(stcb->sctp_ep, stcb,
31133232788eSRandall Stewart 				    sctp_ifa, SCTP_ADD_IP_ADDRESS,
31143232788eSRandall Stewart 				    SCTP_ADDR_LOCKED);
3115f8829a4aSRandall Stewart 			}
3116f8829a4aSRandall Stewart 		}		/* end foreach ifa */
3117f8829a4aSRandall Stewart 	}			/* end foreach ifn */
3118c99efcf6SRandall Stewart 	SCTP_IPI_ADDR_RUNLOCK();
3119f8829a4aSRandall Stewart }
3120f8829a4aSRandall Stewart 
3121f8829a4aSRandall Stewart /*
3122f8829a4aSRandall Stewart  * validates an init-ack chunk (from a cookie-echo) with current addresses
3123f8829a4aSRandall Stewart  * adds addresses from the init-ack into our local address list, if needed
3124f8829a4aSRandall Stewart  * queues asconf adds/deletes addresses as needed and makes appropriate list
3125f8829a4aSRandall Stewart  * changes for source address selection m, offset: points to the start of the
3126f8829a4aSRandall Stewart  * address list in an init-ack chunk length: total length of the address
3127f8829a4aSRandall Stewart  * params only init_addr: address where my INIT-ACK was sent from
3128f8829a4aSRandall Stewart  */
3129f8829a4aSRandall Stewart void
3130f8829a4aSRandall Stewart sctp_check_address_list(struct sctp_tcb *stcb, struct mbuf *m, int offset,
3131f8829a4aSRandall Stewart     int length, struct sockaddr *init_addr,
3132f8829a4aSRandall Stewart     uint16_t local_scope, uint16_t site_scope,
3133f8829a4aSRandall Stewart     uint16_t ipv4_scope, uint16_t loopback_scope)
3134f8829a4aSRandall Stewart {
3135f8829a4aSRandall Stewart 	/* process the local addresses in the initack */
3136f8829a4aSRandall Stewart 	sctp_process_initack_addresses(stcb, m, offset, length);
3137f8829a4aSRandall Stewart 
3138f8829a4aSRandall Stewart 	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
3139f8829a4aSRandall Stewart 		/* bound all case */
3140f8829a4aSRandall Stewart 		sctp_check_address_list_all(stcb, m, offset, length, init_addr,
3141f8829a4aSRandall Stewart 		    local_scope, site_scope, ipv4_scope, loopback_scope);
3142f8829a4aSRandall Stewart 	} else {
3143f8829a4aSRandall Stewart 		/* subset bound case */
3144f8829a4aSRandall Stewart 		if (sctp_is_feature_on(stcb->sctp_ep,
3145f8829a4aSRandall Stewart 		    SCTP_PCB_FLAGS_DO_ASCONF)) {
3146f8829a4aSRandall Stewart 			/* asconf's allowed */
3147f8829a4aSRandall Stewart 			sctp_check_address_list_ep(stcb, m, offset, length,
3148f8829a4aSRandall Stewart 			    init_addr);
3149f8829a4aSRandall Stewart 		}
3150f8829a4aSRandall Stewart 		/* else, no asconfs allowed, so what we sent is what we get */
3151f8829a4aSRandall Stewart 	}
3152f8829a4aSRandall Stewart }
3153f8829a4aSRandall Stewart 
3154f8829a4aSRandall Stewart /*
3155f8829a4aSRandall Stewart  * sctp_bindx() support
3156f8829a4aSRandall Stewart  */
3157f8829a4aSRandall Stewart uint32_t
31583c503c28SRandall Stewart sctp_addr_mgmt_ep_sa(struct sctp_inpcb *inp, struct sockaddr *sa,
3159b0471b4bSMichael Tuexen     uint32_t type, uint32_t vrf_id, struct sctp_ifa *sctp_ifap)
3160b0471b4bSMichael Tuexen {
316142551e99SRandall Stewart 	struct sctp_ifa *ifa;
31622678fe1eSMichael Tuexen 	struct sctp_laddr *laddr, *nladdr;
3163f8829a4aSRandall Stewart 
316442551e99SRandall Stewart 	if (sa->sa_len == 0) {
3165c4739e2fSRandall Stewart 		SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EINVAL);
3166f8829a4aSRandall Stewart 		return (EINVAL);
316742551e99SRandall Stewart 	}
316880fefe0aSRandall Stewart 	if (sctp_ifap) {
316980fefe0aSRandall Stewart 		ifa = sctp_ifap;
317080fefe0aSRandall Stewart 	} else if (type == SCTP_ADD_IP_ADDRESS) {
317142551e99SRandall Stewart 		/* For an add the address MUST be on the system */
3172851b7298SRandall Stewart 		ifa = sctp_find_ifa_by_addr(sa, vrf_id, SCTP_ADDR_NOT_LOCKED);
317342551e99SRandall Stewart 	} else if (type == SCTP_DEL_IP_ADDRESS) {
317442551e99SRandall Stewart 		/* For a delete we need to find it in the inp */
3175851b7298SRandall Stewart 		ifa = sctp_find_ifa_in_ep(inp, sa, SCTP_ADDR_NOT_LOCKED);
317642551e99SRandall Stewart 	} else {
317742551e99SRandall Stewart 		ifa = NULL;
317842551e99SRandall Stewart 	}
3179f8829a4aSRandall Stewart 	if (ifa != NULL) {
318042551e99SRandall Stewart 		if (type == SCTP_ADD_IP_ADDRESS) {
318142551e99SRandall Stewart 			sctp_add_local_addr_ep(inp, ifa, type);
318242551e99SRandall Stewart 		} else if (type == SCTP_DEL_IP_ADDRESS) {
31833c503c28SRandall Stewart 			if (inp->laddr_count < 2) {
31843c503c28SRandall Stewart 				/* can't delete the last local address */
3185c4739e2fSRandall Stewart 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EINVAL);
31863c503c28SRandall Stewart 				return (EINVAL);
31873c503c28SRandall Stewart 			}
31883c503c28SRandall Stewart 			LIST_FOREACH(laddr, &inp->sctp_addr_list,
31893c503c28SRandall Stewart 			    sctp_nxt_addr) {
319042551e99SRandall Stewart 				if (ifa == laddr->ifa) {
319142551e99SRandall Stewart 					/* Mark in the delete */
319242551e99SRandall Stewart 					laddr->action = type;
319342551e99SRandall Stewart 				}
319442551e99SRandall Stewart 			}
319542551e99SRandall Stewart 		}
31962678fe1eSMichael Tuexen 		if (LIST_EMPTY(&inp->sctp_asoc_list)) {
319787b4fcd3SMichael Tuexen 			/*
319887b4fcd3SMichael Tuexen 			 * There is no need to start the iterator if the inp
319987b4fcd3SMichael Tuexen 			 * has no associations.
320087b4fcd3SMichael Tuexen 			 */
32012678fe1eSMichael Tuexen 			if (type == SCTP_DEL_IP_ADDRESS) {
32022678fe1eSMichael Tuexen 				LIST_FOREACH_SAFE(laddr, &inp->sctp_addr_list, sctp_nxt_addr, nladdr) {
32032678fe1eSMichael Tuexen 					if (laddr->ifa == ifa) {
32042678fe1eSMichael Tuexen 						sctp_del_local_addr_ep(inp, ifa);
32052678fe1eSMichael Tuexen 					}
32062678fe1eSMichael Tuexen 				}
32072678fe1eSMichael Tuexen 			}
32082678fe1eSMichael Tuexen 		} else {
320987b4fcd3SMichael Tuexen 			struct sctp_asconf_iterator *asc;
321087b4fcd3SMichael Tuexen 			struct sctp_laddr *wi;
32112b1c7de4SMichael Tuexen 			int ret;
321287b4fcd3SMichael Tuexen 
321387b4fcd3SMichael Tuexen 			SCTP_MALLOC(asc, struct sctp_asconf_iterator *,
321487b4fcd3SMichael Tuexen 			    sizeof(struct sctp_asconf_iterator),
321587b4fcd3SMichael Tuexen 			    SCTP_M_ASC_IT);
321687b4fcd3SMichael Tuexen 			if (asc == NULL) {
321787b4fcd3SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, ENOMEM);
321887b4fcd3SMichael Tuexen 				return (ENOMEM);
321987b4fcd3SMichael Tuexen 			}
322087b4fcd3SMichael Tuexen 			wi = SCTP_ZONE_GET(SCTP_BASE_INFO(ipi_zone_laddr), struct sctp_laddr);
322187b4fcd3SMichael Tuexen 			if (wi == NULL) {
322287b4fcd3SMichael Tuexen 				SCTP_FREE(asc, SCTP_M_ASC_IT);
322387b4fcd3SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, ENOMEM);
322487b4fcd3SMichael Tuexen 				return (ENOMEM);
322587b4fcd3SMichael Tuexen 			}
322642551e99SRandall Stewart 			LIST_INIT(&asc->list_of_work);
322742551e99SRandall Stewart 			asc->cnt = 1;
322842551e99SRandall Stewart 			SCTP_INCR_LADDR_COUNT();
322942551e99SRandall Stewart 			wi->ifa = ifa;
323042551e99SRandall Stewart 			wi->action = type;
323142551e99SRandall Stewart 			atomic_add_int(&ifa->refcount, 1);
323242551e99SRandall Stewart 			LIST_INSERT_HEAD(&asc->list_of_work, wi, sctp_nxt_addr);
32332b1c7de4SMichael Tuexen 			ret = sctp_initiate_iterator(sctp_asconf_iterator_ep,
32341b649582SRandall Stewart 			    sctp_asconf_iterator_stcb,
32351b649582SRandall Stewart 			    sctp_asconf_iterator_ep_end,
323642551e99SRandall Stewart 			    SCTP_PCB_ANY_FLAGS,
32373c503c28SRandall Stewart 			    SCTP_PCB_ANY_FEATURES,
32381b649582SRandall Stewart 			    SCTP_ASOC_ANY_STATE,
32391b649582SRandall Stewart 			    (void *)asc, 0,
32401b649582SRandall Stewart 			    sctp_asconf_iterator_end, inp, 0);
32412b1c7de4SMichael Tuexen 			if (ret) {
32422b1c7de4SMichael Tuexen 				SCTP_PRINTF("Failed to initiate iterator for addr_mgmt_ep_sa\n");
32432b1c7de4SMichael Tuexen 				SCTP_LTRACE_ERR_RET(inp, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EFAULT);
32442b1c7de4SMichael Tuexen 				sctp_asconf_iterator_end(asc, 0);
32452b1c7de4SMichael Tuexen 				return (EFAULT);
32462b1c7de4SMichael Tuexen 			}
324787b4fcd3SMichael Tuexen 		}
324887b4fcd3SMichael Tuexen 		return (0);
3249f8829a4aSRandall Stewart 	} else {
3250f8829a4aSRandall Stewart 		/* invalid address! */
3251c4739e2fSRandall Stewart 		SCTP_LTRACE_ERR_RET(NULL, NULL, NULL, SCTP_FROM_SCTP_ASCONF, EADDRNOTAVAIL);
3252f8829a4aSRandall Stewart 		return (EADDRNOTAVAIL);
3253f8829a4aSRandall Stewart 	}
3254f8829a4aSRandall Stewart }
3255830d754dSRandall Stewart 
3256830d754dSRandall Stewart void
3257830d754dSRandall Stewart sctp_asconf_send_nat_state_update(struct sctp_tcb *stcb,
3258830d754dSRandall Stewart     struct sctp_nets *net)
3259830d754dSRandall Stewart {
3260830d754dSRandall Stewart 	struct sctp_asconf_addr *aa;
3261830d754dSRandall Stewart 	struct sctp_ifa *sctp_ifap;
3262830d754dSRandall Stewart 	struct sctp_asconf_tag_param *vtag;
3263e6194c2eSMichael Tuexen #ifdef INET
3264830d754dSRandall Stewart 	struct sockaddr_in *to;
3265e6194c2eSMichael Tuexen #endif
3266830d754dSRandall Stewart #ifdef INET6
3267830d754dSRandall Stewart 	struct sockaddr_in6 *to6;
3268830d754dSRandall Stewart #endif
3269830d754dSRandall Stewart 	if (net == NULL) {
3270830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "sctp_asconf_send_nat_state_update: Missing net\n");
3271830d754dSRandall Stewart 		return;
3272830d754dSRandall Stewart 	}
3273830d754dSRandall Stewart 	if (stcb == NULL) {
3274830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1, "sctp_asconf_send_nat_state_update: Missing stcb\n");
3275830d754dSRandall Stewart 		return;
3276830d754dSRandall Stewart 	}
3277830d754dSRandall Stewart 	/*
3278830d754dSRandall Stewart 	 * Need to have in the asconf: - vtagparam(my_vtag/peer_vtag) -
3279830d754dSRandall Stewart 	 * add(0.0.0.0) - del(0.0.0.0) - Any global addresses add(addr)
3280830d754dSRandall Stewart 	 */
3281830d754dSRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
3282830d754dSRandall Stewart 	    SCTP_M_ASC_ADDR);
3283830d754dSRandall Stewart 	if (aa == NULL) {
3284830d754dSRandall Stewart 		/* didn't get memory */
3285830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
3286830d754dSRandall Stewart 		    "sctp_asconf_send_nat_state_update: failed to get memory!\n");
3287830d754dSRandall Stewart 		return;
3288830d754dSRandall Stewart 	}
3289830d754dSRandall Stewart 	aa->special_del = 0;
3290830d754dSRandall Stewart 	/* fill in asconf address parameter fields */
3291830d754dSRandall Stewart 	/* top level elements are "networked" during send */
3292830d754dSRandall Stewart 	aa->ifa = NULL;
3293830d754dSRandall Stewart 	aa->sent = 0;		/* clear sent flag */
3294830d754dSRandall Stewart 	vtag = (struct sctp_asconf_tag_param *)&aa->ap.aph;
3295830d754dSRandall Stewart 	vtag->aph.ph.param_type = SCTP_NAT_VTAGS;
3296830d754dSRandall Stewart 	vtag->aph.ph.param_length = sizeof(struct sctp_asconf_tag_param);
3297830d754dSRandall Stewart 	vtag->local_vtag = htonl(stcb->asoc.my_vtag);
3298830d754dSRandall Stewart 	vtag->remote_vtag = htonl(stcb->asoc.peer_vtag);
3299830d754dSRandall Stewart 	TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3300830d754dSRandall Stewart 
3301830d754dSRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
3302830d754dSRandall Stewart 	    SCTP_M_ASC_ADDR);
3303830d754dSRandall Stewart 	if (aa == NULL) {
3304830d754dSRandall Stewart 		/* didn't get memory */
3305830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
3306830d754dSRandall Stewart 		    "sctp_asconf_send_nat_state_update: failed to get memory!\n");
3307830d754dSRandall Stewart 		return;
3308830d754dSRandall Stewart 	}
3309830d754dSRandall Stewart 	memset(aa, 0, sizeof(struct sctp_asconf_addr));
3310830d754dSRandall Stewart 	/* fill in asconf address parameter fields */
3311830d754dSRandall Stewart 	/* ADD(0.0.0.0) */
3312e6194c2eSMichael Tuexen 	switch (net->ro._l_addr.sa.sa_family) {
3313e6194c2eSMichael Tuexen #ifdef INET
3314e6194c2eSMichael Tuexen 	case AF_INET:
3315830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_ADD_IP_ADDRESS;
3316830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addrv4_param);
3317830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
3318830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv4addr_param);
3319830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3320830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3321e6194c2eSMichael Tuexen 		break;
3322e6194c2eSMichael Tuexen #endif
3323830d754dSRandall Stewart #ifdef INET6
3324e6194c2eSMichael Tuexen 	case AF_INET6:
3325830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_ADD_IP_ADDRESS;
3326830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addr_param);
3327830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
3328830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv6addr_param);
3329830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3330830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3331e6194c2eSMichael Tuexen 		break;
3332e6194c2eSMichael Tuexen #endif
33333ff78fbbSMichael Tuexen 	default:
33343ff78fbbSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1,
33353ff78fbbSMichael Tuexen 		    "sctp_asconf_send_nat_state_update: unknown address family\n");
33363ff78fbbSMichael Tuexen 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
33373ff78fbbSMichael Tuexen 		return;
3338830d754dSRandall Stewart 	}
3339830d754dSRandall Stewart 	SCTP_MALLOC(aa, struct sctp_asconf_addr *, sizeof(*aa),
3340830d754dSRandall Stewart 	    SCTP_M_ASC_ADDR);
3341830d754dSRandall Stewart 	if (aa == NULL) {
3342830d754dSRandall Stewart 		/* didn't get memory */
3343830d754dSRandall Stewart 		SCTPDBG(SCTP_DEBUG_ASCONF1,
3344830d754dSRandall Stewart 		    "sctp_asconf_send_nat_state_update: failed to get memory!\n");
3345830d754dSRandall Stewart 		return;
3346830d754dSRandall Stewart 	}
3347830d754dSRandall Stewart 	memset(aa, 0, sizeof(struct sctp_asconf_addr));
3348830d754dSRandall Stewart 	/* fill in asconf address parameter fields */
3349830d754dSRandall Stewart 	/* ADD(0.0.0.0) */
3350e6194c2eSMichael Tuexen 	switch (net->ro._l_addr.sa.sa_family) {
3351e6194c2eSMichael Tuexen #ifdef INET
3352e6194c2eSMichael Tuexen 	case AF_INET:
3353830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_ADD_IP_ADDRESS;
3354830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addrv4_param);
3355830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV4_ADDRESS;
3356830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv4addr_param);
3357830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3358830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3359e6194c2eSMichael Tuexen 		break;
3360e6194c2eSMichael Tuexen #endif
3361830d754dSRandall Stewart #ifdef INET6
3362e6194c2eSMichael Tuexen 	case AF_INET6:
3363830d754dSRandall Stewart 		aa->ap.aph.ph.param_type = SCTP_DEL_IP_ADDRESS;
3364830d754dSRandall Stewart 		aa->ap.aph.ph.param_length = sizeof(struct sctp_asconf_addr_param);
3365830d754dSRandall Stewart 		aa->ap.addrp.ph.param_type = SCTP_IPV6_ADDRESS;
3366830d754dSRandall Stewart 		aa->ap.addrp.ph.param_length = sizeof(struct sctp_ipv6addr_param);
3367830d754dSRandall Stewart 		/* No need to add an address, we are using 0.0.0.0 */
3368830d754dSRandall Stewart 		TAILQ_INSERT_TAIL(&stcb->asoc.asconf_queue, aa, next);
3369e6194c2eSMichael Tuexen 		break;
3370e6194c2eSMichael Tuexen #endif
33713ff78fbbSMichael Tuexen 	default:
33723ff78fbbSMichael Tuexen 		SCTPDBG(SCTP_DEBUG_ASCONF1,
33733ff78fbbSMichael Tuexen 		    "sctp_asconf_send_nat_state_update: unknown address family\n");
33743ff78fbbSMichael Tuexen 		SCTP_FREE(aa, SCTP_M_ASC_ADDR);
33753ff78fbbSMichael Tuexen 		return;
3376830d754dSRandall Stewart 	}
3377830d754dSRandall Stewart 	/* Now we must hunt the addresses and add all global addresses */
3378830d754dSRandall Stewart 	if (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_BOUNDALL) {
3379830d754dSRandall Stewart 		struct sctp_vrf *vrf = NULL;
3380830d754dSRandall Stewart 		struct sctp_ifn *sctp_ifnp;
3381830d754dSRandall Stewart 		uint32_t vrf_id;
3382830d754dSRandall Stewart 
3383830d754dSRandall Stewart 		vrf_id = stcb->sctp_ep->def_vrf_id;
3384830d754dSRandall Stewart 		vrf = sctp_find_vrf(vrf_id);
3385830d754dSRandall Stewart 		if (vrf == NULL) {
3386830d754dSRandall Stewart 			goto skip_rest;
3387830d754dSRandall Stewart 		}
33880053ed28SMichael Tuexen 
3389830d754dSRandall Stewart 		SCTP_IPI_ADDR_RLOCK();
3390830d754dSRandall Stewart 		LIST_FOREACH(sctp_ifnp, &vrf->ifnlist, next_ifn) {
3391830d754dSRandall Stewart 			LIST_FOREACH(sctp_ifap, &sctp_ifnp->ifalist, next_ifa) {
3392e6194c2eSMichael Tuexen 				switch (sctp_ifap->address.sa.sa_family) {
3393e6194c2eSMichael Tuexen #ifdef INET
3394e6194c2eSMichael Tuexen 				case AF_INET:
3395830d754dSRandall Stewart 					to = &sctp_ifap->address.sin;
33966ba22f19SMichael Tuexen 					if (prison_check_ip4(stcb->sctp_ep->ip_inp.inp.inp_cred,
33976ba22f19SMichael Tuexen 					    &to->sin_addr) != 0) {
33986ba22f19SMichael Tuexen 						continue;
33996ba22f19SMichael Tuexen 					}
3400830d754dSRandall Stewart 					if (IN4_ISPRIVATE_ADDRESS(&to->sin_addr)) {
3401830d754dSRandall Stewart 						continue;
3402830d754dSRandall Stewart 					}
3403830d754dSRandall Stewart 					if (IN4_ISLOOPBACK_ADDRESS(&to->sin_addr)) {
3404830d754dSRandall Stewart 						continue;
3405830d754dSRandall Stewart 					}
3406e6194c2eSMichael Tuexen 					break;
3407e6194c2eSMichael Tuexen #endif
3408830d754dSRandall Stewart #ifdef INET6
3409e6194c2eSMichael Tuexen 				case AF_INET6:
3410830d754dSRandall Stewart 					to6 = &sctp_ifap->address.sin6;
34116ba22f19SMichael Tuexen 					if (prison_check_ip6(stcb->sctp_ep->ip_inp.inp.inp_cred,
34126ba22f19SMichael Tuexen 					    &to6->sin6_addr) != 0) {
34136ba22f19SMichael Tuexen 						continue;
34146ba22f19SMichael Tuexen 					}
3415830d754dSRandall Stewart 					if (IN6_IS_ADDR_LOOPBACK(&to6->sin6_addr)) {
3416830d754dSRandall Stewart 						continue;
3417830d754dSRandall Stewart 					}
3418830d754dSRandall Stewart 					if (IN6_IS_ADDR_LINKLOCAL(&to6->sin6_addr)) {
3419830d754dSRandall Stewart 						continue;
3420830d754dSRandall Stewart 					}
3421e6194c2eSMichael Tuexen 					break;
3422830d754dSRandall Stewart #endif
3423e6194c2eSMichael Tuexen 				default:
3424e6194c2eSMichael Tuexen 					continue;
3425e6194c2eSMichael Tuexen 				}
3426830d754dSRandall Stewart 				sctp_asconf_queue_mgmt(stcb, sctp_ifap, SCTP_ADD_IP_ADDRESS);
3427830d754dSRandall Stewart 			}
3428830d754dSRandall Stewart 		}
3429830d754dSRandall Stewart 		SCTP_IPI_ADDR_RUNLOCK();
3430830d754dSRandall Stewart 	} else {
3431830d754dSRandall Stewart 		struct sctp_laddr *laddr;
3432830d754dSRandall Stewart 
3433830d754dSRandall Stewart 		LIST_FOREACH(laddr, &stcb->sctp_ep->sctp_addr_list, sctp_nxt_addr) {
3434830d754dSRandall Stewart 			if (laddr->ifa == NULL) {
3435830d754dSRandall Stewart 				continue;
3436830d754dSRandall Stewart 			}
3437830d754dSRandall Stewart 			if (laddr->ifa->localifa_flags & SCTP_BEING_DELETED)
3438830d754dSRandall Stewart 				/*
3439830d754dSRandall Stewart 				 * Address being deleted by the system, dont
3440830d754dSRandall Stewart 				 * list.
3441830d754dSRandall Stewart 				 */
3442830d754dSRandall Stewart 				continue;
3443830d754dSRandall Stewart 			if (laddr->action == SCTP_DEL_IP_ADDRESS) {
3444830d754dSRandall Stewart 				/*
3445830d754dSRandall Stewart 				 * Address being deleted on this ep don't
3446830d754dSRandall Stewart 				 * list.
3447830d754dSRandall Stewart 				 */
3448830d754dSRandall Stewart 				continue;
3449830d754dSRandall Stewart 			}
3450830d754dSRandall Stewart 			sctp_ifap = laddr->ifa;
3451e6194c2eSMichael Tuexen 			switch (sctp_ifap->address.sa.sa_family) {
3452e6194c2eSMichael Tuexen #ifdef INET
3453e6194c2eSMichael Tuexen 			case AF_INET:
3454830d754dSRandall Stewart 				to = &sctp_ifap->address.sin;
3455830d754dSRandall Stewart 				if (IN4_ISPRIVATE_ADDRESS(&to->sin_addr)) {
3456830d754dSRandall Stewart 					continue;
3457830d754dSRandall Stewart 				}
3458830d754dSRandall Stewart 				if (IN4_ISLOOPBACK_ADDRESS(&to->sin_addr)) {
3459830d754dSRandall Stewart 					continue;
3460830d754dSRandall Stewart 				}
3461e6194c2eSMichael Tuexen 				break;
3462e6194c2eSMichael Tuexen #endif
3463830d754dSRandall Stewart #ifdef INET6
3464e6194c2eSMichael Tuexen 			case AF_INET6:
3465830d754dSRandall Stewart 				to6 = &sctp_ifap->address.sin6;
3466830d754dSRandall Stewart 				if (IN6_IS_ADDR_LOOPBACK(&to6->sin6_addr)) {
3467830d754dSRandall Stewart 					continue;
3468830d754dSRandall Stewart 				}
3469830d754dSRandall Stewart 				if (IN6_IS_ADDR_LINKLOCAL(&to6->sin6_addr)) {
3470830d754dSRandall Stewart 					continue;
3471830d754dSRandall Stewart 				}
3472e6194c2eSMichael Tuexen 				break;
3473830d754dSRandall Stewart #endif
3474e6194c2eSMichael Tuexen 			default:
3475e6194c2eSMichael Tuexen 				continue;
3476e6194c2eSMichael Tuexen 			}
3477830d754dSRandall Stewart 			sctp_asconf_queue_mgmt(stcb, sctp_ifap, SCTP_ADD_IP_ADDRESS);
3478830d754dSRandall Stewart 		}
3479830d754dSRandall Stewart 	}
3480830d754dSRandall Stewart skip_rest:
3481830d754dSRandall Stewart 	/* Now we must send the asconf into the queue */
3482ca85e948SMichael Tuexen 	sctp_send_asconf(stcb, net, SCTP_ADDR_NOT_LOCKED);
3483830d754dSRandall Stewart }
3484