xref: /freebsd/sys/netinet6/raw_ip6.c (revision f95d46333db63ce9df4e8a2ca8c5c09bc0edfe72)
182cd038dSYoshinobu Inoue /*
282cd038dSYoshinobu Inoue  * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
382cd038dSYoshinobu Inoue  * All rights reserved.
482cd038dSYoshinobu Inoue  *
582cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
682cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
782cd038dSYoshinobu Inoue  * are met:
882cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
982cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
1082cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
1182cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
1282cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
1382cd038dSYoshinobu Inoue  * 3. Neither the name of the project nor the names of its contributors
1482cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
1582cd038dSYoshinobu Inoue  *    without specific prior written permission.
1682cd038dSYoshinobu Inoue  *
1782cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
1882cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
1982cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
2082cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
2182cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
2282cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
2382cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
2482cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
2582cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
2682cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
2782cd038dSYoshinobu Inoue  * SUCH DAMAGE.
2882cd038dSYoshinobu Inoue  *
2982cd038dSYoshinobu Inoue  * $FreeBSD$
3082cd038dSYoshinobu Inoue  */
3182cd038dSYoshinobu Inoue 
3282cd038dSYoshinobu Inoue /*
3382cd038dSYoshinobu Inoue  * Copyright (c) 1982, 1986, 1988, 1993
3482cd038dSYoshinobu Inoue  *	The Regents of the University of California.  All rights reserved.
3582cd038dSYoshinobu Inoue  *
3682cd038dSYoshinobu Inoue  * Redistribution and use in source and binary forms, with or without
3782cd038dSYoshinobu Inoue  * modification, are permitted provided that the following conditions
3882cd038dSYoshinobu Inoue  * are met:
3982cd038dSYoshinobu Inoue  * 1. Redistributions of source code must retain the above copyright
4082cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer.
4182cd038dSYoshinobu Inoue  * 2. Redistributions in binary form must reproduce the above copyright
4282cd038dSYoshinobu Inoue  *    notice, this list of conditions and the following disclaimer in the
4382cd038dSYoshinobu Inoue  *    documentation and/or other materials provided with the distribution.
4482cd038dSYoshinobu Inoue  * 3. All advertising materials mentioning features or use of this software
4582cd038dSYoshinobu Inoue  *    must display the following acknowledgement:
4682cd038dSYoshinobu Inoue  *	This product includes software developed by the University of
4782cd038dSYoshinobu Inoue  *	California, Berkeley and its contributors.
4882cd038dSYoshinobu Inoue  * 4. Neither the name of the University nor the names of its contributors
4982cd038dSYoshinobu Inoue  *    may be used to endorse or promote products derived from this software
5082cd038dSYoshinobu Inoue  *    without specific prior written permission.
5182cd038dSYoshinobu Inoue  *
5282cd038dSYoshinobu Inoue  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
5382cd038dSYoshinobu Inoue  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
5482cd038dSYoshinobu Inoue  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
5582cd038dSYoshinobu Inoue  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
5682cd038dSYoshinobu Inoue  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
5782cd038dSYoshinobu Inoue  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
5882cd038dSYoshinobu Inoue  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
5982cd038dSYoshinobu Inoue  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
6082cd038dSYoshinobu Inoue  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
6182cd038dSYoshinobu Inoue  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
6282cd038dSYoshinobu Inoue  * SUCH DAMAGE.
6382cd038dSYoshinobu Inoue  *
6482cd038dSYoshinobu Inoue  *	@(#)raw_ip.c	8.2 (Berkeley) 1/4/94
6582cd038dSYoshinobu Inoue  */
6682cd038dSYoshinobu Inoue 
676a800098SYoshinobu Inoue #include "opt_ipsec.h"
6833841545SHajimu UMEMOTO #include "opt_inet6.h"
696a800098SYoshinobu Inoue 
7082cd038dSYoshinobu Inoue #include <sys/param.h>
7182cd038dSYoshinobu Inoue #include <sys/errno.h>
72960ed29cSSeigo Tanimura #include <sys/lock.h>
73960ed29cSSeigo Tanimura #include <sys/malloc.h>
74960ed29cSSeigo Tanimura #include <sys/mbuf.h>
75960ed29cSSeigo Tanimura #include <sys/proc.h>
76960ed29cSSeigo Tanimura #include <sys/protosw.h>
77960ed29cSSeigo Tanimura #include <sys/signalvar.h>
78960ed29cSSeigo Tanimura #include <sys/socket.h>
79960ed29cSSeigo Tanimura #include <sys/socketvar.h>
80960ed29cSSeigo Tanimura #include <sys/sx.h>
8182cd038dSYoshinobu Inoue #include <sys/systm.h>
8282cd038dSYoshinobu Inoue 
8382cd038dSYoshinobu Inoue #include <net/if.h>
8482cd038dSYoshinobu Inoue #include <net/if_types.h>
85960ed29cSSeigo Tanimura #include <net/route.h>
8682cd038dSYoshinobu Inoue 
8782cd038dSYoshinobu Inoue #include <netinet/in.h>
8882cd038dSYoshinobu Inoue #include <netinet/in_var.h>
8982cd038dSYoshinobu Inoue #include <netinet/in_systm.h>
90686cdd19SJun-ichiro itojun Hagino #include <netinet/icmp6.h>
9182cd038dSYoshinobu Inoue #include <netinet/in_pcb.h>
92960ed29cSSeigo Tanimura #include <netinet/ip6.h>
93686cdd19SJun-ichiro itojun Hagino #include <netinet6/ip6protosw.h>
94960ed29cSSeigo Tanimura #include <netinet6/ip6_mroute.h>
95960ed29cSSeigo Tanimura #include <netinet6/in6_pcb.h>
96960ed29cSSeigo Tanimura #include <netinet6/ip6_var.h>
97960ed29cSSeigo Tanimura #include <netinet6/nd6.h>
98960ed29cSSeigo Tanimura #include <netinet6/raw_ip6.h>
99686cdd19SJun-ichiro itojun Hagino #ifdef ENABLE_DEFAULT_SCOPE
100686cdd19SJun-ichiro itojun Hagino #include <netinet6/scope6_var.h>
101686cdd19SJun-ichiro itojun Hagino #endif
10282cd038dSYoshinobu Inoue 
10382cd038dSYoshinobu Inoue #ifdef IPSEC
10482cd038dSYoshinobu Inoue #include <netinet6/ipsec.h>
10582cd038dSYoshinobu Inoue #include <netinet6/ipsec6.h>
10682cd038dSYoshinobu Inoue #endif /*IPSEC*/
10782cd038dSYoshinobu Inoue 
108b9234fafSSam Leffler #ifdef FAST_IPSEC
109b9234fafSSam Leffler #include <netipsec/ipsec.h>
110b9234fafSSam Leffler #include <netipsec/ipsec6.h>
111b9234fafSSam Leffler #endif /* FAST_IPSEC */
112b9234fafSSam Leffler 
11382cd038dSYoshinobu Inoue #include <machine/stdarg.h>
11482cd038dSYoshinobu Inoue 
11582cd038dSYoshinobu Inoue #define	satosin6(sa)	((struct sockaddr_in6 *)(sa))
11682cd038dSYoshinobu Inoue #define	ifatoia6(ifa)	((struct in6_ifaddr *)(ifa))
11782cd038dSYoshinobu Inoue 
11882cd038dSYoshinobu Inoue /*
11982cd038dSYoshinobu Inoue  * Raw interface to IP6 protocol.
12082cd038dSYoshinobu Inoue  */
12182cd038dSYoshinobu Inoue 
12282cd038dSYoshinobu Inoue extern struct	inpcbhead ripcb;
12382cd038dSYoshinobu Inoue extern struct	inpcbinfo ripcbinfo;
12482cd038dSYoshinobu Inoue extern u_long	rip_sendspace;
12582cd038dSYoshinobu Inoue extern u_long	rip_recvspace;
12682cd038dSYoshinobu Inoue 
12733841545SHajimu UMEMOTO struct rip6stat rip6stat;
12833841545SHajimu UMEMOTO 
12982cd038dSYoshinobu Inoue /*
13082cd038dSYoshinobu Inoue  * Setup generic address and protocol structures
13182cd038dSYoshinobu Inoue  * for raw_input routine, then pass them along with
13282cd038dSYoshinobu Inoue  * mbuf chain.
13382cd038dSYoshinobu Inoue  */
13482cd038dSYoshinobu Inoue int
13582cd038dSYoshinobu Inoue rip6_input(mp, offp, proto)
13682cd038dSYoshinobu Inoue 	struct	mbuf **mp;
13782cd038dSYoshinobu Inoue 	int	*offp, proto;
13882cd038dSYoshinobu Inoue {
13982cd038dSYoshinobu Inoue 	struct mbuf *m = *mp;
14082cd038dSYoshinobu Inoue 	register struct ip6_hdr *ip6 = mtod(m, struct ip6_hdr *);
14182cd038dSYoshinobu Inoue 	register struct inpcb *in6p;
14282cd038dSYoshinobu Inoue 	struct inpcb *last = 0;
14333841545SHajimu UMEMOTO 	struct mbuf *opts = NULL;
14482cd038dSYoshinobu Inoue 	struct sockaddr_in6 rip6src;
14582cd038dSYoshinobu Inoue 
14633841545SHajimu UMEMOTO 	rip6stat.rip6s_ipackets++;
14733841545SHajimu UMEMOTO 
1489494d596SBrooks Davis 	if (faithprefix_p != NULL && (*faithprefix_p)(&ip6->ip6_dst)) {
14982cd038dSYoshinobu Inoue 		/* XXX send icmp6 host/port unreach? */
15082cd038dSYoshinobu Inoue 		m_freem(m);
15182cd038dSYoshinobu Inoue 		return IPPROTO_DONE;
15282cd038dSYoshinobu Inoue 	}
15333841545SHajimu UMEMOTO 
15482cd038dSYoshinobu Inoue 	init_sin6(&rip6src, m); /* general init */
15582cd038dSYoshinobu Inoue 
15682cd038dSYoshinobu Inoue 	LIST_FOREACH(in6p, &ripcb, inp_list) {
1576a800098SYoshinobu Inoue 		if ((in6p->in6p_vflag & INP_IPV6) == 0)
15882cd038dSYoshinobu Inoue 			continue;
15982cd038dSYoshinobu Inoue 		if (in6p->in6p_ip6_nxt &&
16082cd038dSYoshinobu Inoue 		    in6p->in6p_ip6_nxt != proto)
16182cd038dSYoshinobu Inoue 			continue;
16282cd038dSYoshinobu Inoue 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_laddr) &&
16382cd038dSYoshinobu Inoue 		    !IN6_ARE_ADDR_EQUAL(&in6p->in6p_laddr, &ip6->ip6_dst))
16482cd038dSYoshinobu Inoue 			continue;
16582cd038dSYoshinobu Inoue 		if (!IN6_IS_ADDR_UNSPECIFIED(&in6p->in6p_faddr) &&
16682cd038dSYoshinobu Inoue 		    !IN6_ARE_ADDR_EQUAL(&in6p->in6p_faddr, &ip6->ip6_src))
16782cd038dSYoshinobu Inoue 			continue;
16833841545SHajimu UMEMOTO 		if (in6p->in6p_cksum != -1) {
16933841545SHajimu UMEMOTO 			rip6stat.rip6s_isum++;
17033841545SHajimu UMEMOTO 			if (in6_cksum(m, ip6->ip6_nxt, *offp,
17182cd038dSYoshinobu Inoue 			    m->m_pkthdr.len - *offp)) {
17233841545SHajimu UMEMOTO 				rip6stat.rip6s_badsum++;
17382cd038dSYoshinobu Inoue 				continue;
17482cd038dSYoshinobu Inoue 			}
17533841545SHajimu UMEMOTO 		}
17682cd038dSYoshinobu Inoue 		if (last) {
17782cd038dSYoshinobu Inoue 			struct mbuf *n = m_copy(m, 0, (int)M_COPYALL);
17833841545SHajimu UMEMOTO 
17933841545SHajimu UMEMOTO #ifdef IPSEC
18033841545SHajimu UMEMOTO 			/*
18133841545SHajimu UMEMOTO 			 * Check AH/ESP integrity.
18233841545SHajimu UMEMOTO 			 */
183340c35deSJonathan Lemon 			if (n && ipsec6_in_reject(n, last)) {
18433841545SHajimu UMEMOTO 				m_freem(n);
18533841545SHajimu UMEMOTO 				ipsec6stat.in_polvio++;
18633841545SHajimu UMEMOTO 				/* do not inject data into pcb */
18733841545SHajimu UMEMOTO 			} else
18833841545SHajimu UMEMOTO #endif /*IPSEC*/
189b9234fafSSam Leffler #ifdef FAST_IPSEC
190b9234fafSSam Leffler 			/*
191b9234fafSSam Leffler 			 * Check AH/ESP integrity.
192b9234fafSSam Leffler 			 */
193b9234fafSSam Leffler 			if (n && ipsec6_in_reject(n, last)) {
194b9234fafSSam Leffler 				m_freem(n);
195b9234fafSSam Leffler 				/* do not inject data into pcb */
196b9234fafSSam Leffler 			} else
197b9234fafSSam Leffler #endif /*FAST_IPSEC*/
19882cd038dSYoshinobu Inoue 			if (n) {
1994cc20ab1SSeigo Tanimura 				if (last->in6p_flags & IN6P_CONTROLOPTS ||
2004cc20ab1SSeigo Tanimura 				    last->in6p_socket->so_options & SO_TIMESTAMP)
20182cd038dSYoshinobu Inoue 					ip6_savecontrol(last, &opts, ip6, n);
20282cd038dSYoshinobu Inoue 				/* strip intermediate headers */
20382cd038dSYoshinobu Inoue 				m_adj(n, *offp);
20482cd038dSYoshinobu Inoue 				if (sbappendaddr(&last->in6p_socket->so_rcv,
20582cd038dSYoshinobu Inoue 						(struct sockaddr *)&rip6src,
20682cd038dSYoshinobu Inoue 						 n, opts) == 0) {
20782cd038dSYoshinobu Inoue 					m_freem(n);
20882cd038dSYoshinobu Inoue 					if (opts)
20982cd038dSYoshinobu Inoue 						m_freem(opts);
21033841545SHajimu UMEMOTO 					rip6stat.rip6s_fullsock++;
2114cc20ab1SSeigo Tanimura 				} else
21282cd038dSYoshinobu Inoue 					sorwakeup(last->in6p_socket);
21382cd038dSYoshinobu Inoue 				opts = NULL;
21482cd038dSYoshinobu Inoue 			}
21582cd038dSYoshinobu Inoue 		}
21682cd038dSYoshinobu Inoue 		last = in6p;
21782cd038dSYoshinobu Inoue 	}
21833841545SHajimu UMEMOTO #ifdef IPSEC
21933841545SHajimu UMEMOTO 	/*
22033841545SHajimu UMEMOTO 	 * Check AH/ESP integrity.
22133841545SHajimu UMEMOTO 	 */
222340c35deSJonathan Lemon 	if (last && ipsec6_in_reject(m, last)) {
22333841545SHajimu UMEMOTO 		m_freem(m);
22433841545SHajimu UMEMOTO 		ipsec6stat.in_polvio++;
22533841545SHajimu UMEMOTO 		ip6stat.ip6s_delivered--;
22633841545SHajimu UMEMOTO 		/* do not inject data into pcb */
22733841545SHajimu UMEMOTO 	} else
22833841545SHajimu UMEMOTO #endif /*IPSEC*/
229b9234fafSSam Leffler #ifdef FAST_IPSEC
230b9234fafSSam Leffler 	/*
231b9234fafSSam Leffler 	 * Check AH/ESP integrity.
232b9234fafSSam Leffler 	 */
233b9234fafSSam Leffler 	if (last && ipsec6_in_reject(m, last)) {
234b9234fafSSam Leffler 		m_freem(m);
235b9234fafSSam Leffler 		ip6stat.ip6s_delivered--;
236b9234fafSSam Leffler 		/* do not inject data into pcb */
237b9234fafSSam Leffler 	} else
238b9234fafSSam Leffler #endif /*FAST_IPSEC*/
23982cd038dSYoshinobu Inoue 	if (last) {
2404cc20ab1SSeigo Tanimura 		if (last->in6p_flags & IN6P_CONTROLOPTS ||
2414cc20ab1SSeigo Tanimura 		    last->in6p_socket->so_options & SO_TIMESTAMP)
24282cd038dSYoshinobu Inoue 			ip6_savecontrol(last, &opts, ip6, m);
24382cd038dSYoshinobu Inoue 		/* strip intermediate headers */
24482cd038dSYoshinobu Inoue 		m_adj(m, *offp);
24582cd038dSYoshinobu Inoue 		if (sbappendaddr(&last->in6p_socket->so_rcv,
24682cd038dSYoshinobu Inoue 				(struct sockaddr *)&rip6src, m, opts) == 0) {
24782cd038dSYoshinobu Inoue 			m_freem(m);
24882cd038dSYoshinobu Inoue 			if (opts)
24982cd038dSYoshinobu Inoue 				m_freem(opts);
25033841545SHajimu UMEMOTO 			rip6stat.rip6s_fullsock++;
2514cc20ab1SSeigo Tanimura 		} else
25282cd038dSYoshinobu Inoue 			sorwakeup(last->in6p_socket);
25382cd038dSYoshinobu Inoue 	} else {
25433841545SHajimu UMEMOTO 		rip6stat.rip6s_nosock++;
25533841545SHajimu UMEMOTO 		if (m->m_flags & M_MCAST)
25633841545SHajimu UMEMOTO 			rip6stat.rip6s_nosockmcast++;
25782cd038dSYoshinobu Inoue 		if (proto == IPPROTO_NONE)
25882cd038dSYoshinobu Inoue 			m_freem(m);
25982cd038dSYoshinobu Inoue 		else {
26082cd038dSYoshinobu Inoue 			char *prvnxtp = ip6_get_prevhdr(m, *offp); /* XXX */
26182cd038dSYoshinobu Inoue 			icmp6_error(m, ICMP6_PARAM_PROB,
26282cd038dSYoshinobu Inoue 				    ICMP6_PARAMPROB_NEXTHEADER,
26382cd038dSYoshinobu Inoue 				    prvnxtp - mtod(m, char *));
26482cd038dSYoshinobu Inoue 		}
26582cd038dSYoshinobu Inoue 		ip6stat.ip6s_delivered--;
26682cd038dSYoshinobu Inoue 	}
26782cd038dSYoshinobu Inoue 	return IPPROTO_DONE;
26882cd038dSYoshinobu Inoue }
26982cd038dSYoshinobu Inoue 
270686cdd19SJun-ichiro itojun Hagino void
271686cdd19SJun-ichiro itojun Hagino rip6_ctlinput(cmd, sa, d)
272686cdd19SJun-ichiro itojun Hagino 	int cmd;
273686cdd19SJun-ichiro itojun Hagino 	struct sockaddr *sa;
274686cdd19SJun-ichiro itojun Hagino 	void *d;
275686cdd19SJun-ichiro itojun Hagino {
276686cdd19SJun-ichiro itojun Hagino 	struct ip6_hdr *ip6;
277686cdd19SJun-ichiro itojun Hagino 	struct mbuf *m;
278686cdd19SJun-ichiro itojun Hagino 	int off = 0;
27933841545SHajimu UMEMOTO 	struct ip6ctlparam *ip6cp = NULL;
28033841545SHajimu UMEMOTO 	const struct sockaddr_in6 *sa6_src = NULL;
2813ce144eaSJeffrey Hsu 	struct inpcb *(*notify) __P((struct inpcb *, int)) = in6_rtchange;
282686cdd19SJun-ichiro itojun Hagino 
283686cdd19SJun-ichiro itojun Hagino 	if (sa->sa_family != AF_INET6 ||
284686cdd19SJun-ichiro itojun Hagino 	    sa->sa_len != sizeof(struct sockaddr_in6))
285686cdd19SJun-ichiro itojun Hagino 		return;
286686cdd19SJun-ichiro itojun Hagino 
287686cdd19SJun-ichiro itojun Hagino 	if ((unsigned)cmd >= PRC_NCMDS)
288686cdd19SJun-ichiro itojun Hagino 		return;
289686cdd19SJun-ichiro itojun Hagino 	if (PRC_IS_REDIRECT(cmd))
290686cdd19SJun-ichiro itojun Hagino 		notify = in6_rtchange, d = NULL;
291686cdd19SJun-ichiro itojun Hagino 	else if (cmd == PRC_HOSTDEAD)
292686cdd19SJun-ichiro itojun Hagino 		d = NULL;
293686cdd19SJun-ichiro itojun Hagino 	else if (inet6ctlerrmap[cmd] == 0)
294686cdd19SJun-ichiro itojun Hagino 		return;
295686cdd19SJun-ichiro itojun Hagino 
296686cdd19SJun-ichiro itojun Hagino 	/* if the parameter is from icmp6, decode it. */
297686cdd19SJun-ichiro itojun Hagino 	if (d != NULL) {
29833841545SHajimu UMEMOTO 		ip6cp = (struct ip6ctlparam *)d;
299686cdd19SJun-ichiro itojun Hagino 		m = ip6cp->ip6c_m;
300686cdd19SJun-ichiro itojun Hagino 		ip6 = ip6cp->ip6c_ip6;
301686cdd19SJun-ichiro itojun Hagino 		off = ip6cp->ip6c_off;
30233841545SHajimu UMEMOTO 		sa6_src = ip6cp->ip6c_src;
303686cdd19SJun-ichiro itojun Hagino 	} else {
304686cdd19SJun-ichiro itojun Hagino 		m = NULL;
305686cdd19SJun-ichiro itojun Hagino 		ip6 = NULL;
30633841545SHajimu UMEMOTO 		sa6_src = &sa6_any;
307686cdd19SJun-ichiro itojun Hagino 	}
308686cdd19SJun-ichiro itojun Hagino 
309c4c0c592SAlfred Perlstein 	(void) in6_pcbnotify(&ripcb, sa, 0, (const struct sockaddr *)sa6_src,
31033841545SHajimu UMEMOTO 			     0, cmd, notify);
311686cdd19SJun-ichiro itojun Hagino }
312686cdd19SJun-ichiro itojun Hagino 
31382cd038dSYoshinobu Inoue /*
31482cd038dSYoshinobu Inoue  * Generate IPv6 header and pass packet to ip6_output.
31582cd038dSYoshinobu Inoue  * Tack on options user may have setup with control call.
31682cd038dSYoshinobu Inoue  */
31782cd038dSYoshinobu Inoue int
31882cd038dSYoshinobu Inoue #if __STDC__
31982cd038dSYoshinobu Inoue rip6_output(struct mbuf *m, ...)
32082cd038dSYoshinobu Inoue #else
32182cd038dSYoshinobu Inoue rip6_output(m, va_alist)
32282cd038dSYoshinobu Inoue 	struct mbuf *m;
32382cd038dSYoshinobu Inoue 	va_dcl
32482cd038dSYoshinobu Inoue #endif
32582cd038dSYoshinobu Inoue {
32607eb2995SHajimu UMEMOTO 	struct mbuf *control;
32782cd038dSYoshinobu Inoue 	struct socket *so;
32882cd038dSYoshinobu Inoue 	struct sockaddr_in6 *dstsock;
32982cd038dSYoshinobu Inoue 	struct in6_addr *dst;
33082cd038dSYoshinobu Inoue 	struct ip6_hdr *ip6;
33182cd038dSYoshinobu Inoue 	struct inpcb *in6p;
33282cd038dSYoshinobu Inoue 	u_int	plen = m->m_pkthdr.len;
33382cd038dSYoshinobu Inoue 	int error = 0;
334f95d4633SHajimu UMEMOTO 	struct ip6_pktopts opt, *stickyopt = NULL;
33582cd038dSYoshinobu Inoue 	struct ifnet *oifp = NULL;
33682cd038dSYoshinobu Inoue 	int type = 0, code = 0;		/* for ICMPv6 output statistics only */
33782cd038dSYoshinobu Inoue 	int priv = 0;
338f95d4633SHajimu UMEMOTO 	struct in6_addr *in6a;
33982cd038dSYoshinobu Inoue 	va_list ap;
34082cd038dSYoshinobu Inoue 
34182cd038dSYoshinobu Inoue 	va_start(ap, m);
34282cd038dSYoshinobu Inoue 	so = va_arg(ap, struct socket *);
34382cd038dSYoshinobu Inoue 	dstsock = va_arg(ap, struct sockaddr_in6 *);
34482cd038dSYoshinobu Inoue 	control = va_arg(ap, struct mbuf *);
34582cd038dSYoshinobu Inoue 	va_end(ap);
34682cd038dSYoshinobu Inoue 
34782cd038dSYoshinobu Inoue 	in6p = sotoin6pcb(so);
348f95d4633SHajimu UMEMOTO 	stickyopt = in6p->in6p_outputopts;
34982cd038dSYoshinobu Inoue 
35082cd038dSYoshinobu Inoue 	priv = 0;
35182cd038dSYoshinobu Inoue 	if (so->so_cred->cr_uid == 0)
35282cd038dSYoshinobu Inoue 		priv = 1;
35382cd038dSYoshinobu Inoue 	dst = &dstsock->sin6_addr;
35482cd038dSYoshinobu Inoue 	if (control) {
355f95d4633SHajimu UMEMOTO 		if ((error = ip6_setpktoptions(control, &opt,
356f95d4633SHajimu UMEMOTO 					       stickyopt, priv, 0,
357f95d4633SHajimu UMEMOTO 					       so->so_proto->pr_protocol))
358f95d4633SHajimu UMEMOTO 		    != 0) {
35982cd038dSYoshinobu Inoue 			goto bad;
360f95d4633SHajimu UMEMOTO 		}
361f95d4633SHajimu UMEMOTO 		in6p->in6p_outputopts = &opt;
362f95d4633SHajimu UMEMOTO 	}
36382cd038dSYoshinobu Inoue 
36482cd038dSYoshinobu Inoue 	/*
36582cd038dSYoshinobu Inoue 	 * For an ICMPv6 packet, we should know its type and code
36682cd038dSYoshinobu Inoue 	 * to update statistics.
36782cd038dSYoshinobu Inoue 	 */
36882cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
36982cd038dSYoshinobu Inoue 		struct icmp6_hdr *icmp6;
37082cd038dSYoshinobu Inoue 		if (m->m_len < sizeof(struct icmp6_hdr) &&
37182cd038dSYoshinobu Inoue 		    (m = m_pullup(m, sizeof(struct icmp6_hdr))) == NULL) {
37282cd038dSYoshinobu Inoue 			error = ENOBUFS;
37382cd038dSYoshinobu Inoue 			goto bad;
37482cd038dSYoshinobu Inoue 		}
37582cd038dSYoshinobu Inoue 		icmp6 = mtod(m, struct icmp6_hdr *);
37682cd038dSYoshinobu Inoue 		type = icmp6->icmp6_type;
37782cd038dSYoshinobu Inoue 		code = icmp6->icmp6_code;
37882cd038dSYoshinobu Inoue 	}
37982cd038dSYoshinobu Inoue 
380a163d034SWarner Losh 	M_PREPEND(m, sizeof(*ip6), M_TRYWAIT);
38182cd038dSYoshinobu Inoue 	ip6 = mtod(m, struct ip6_hdr *);
38282cd038dSYoshinobu Inoue 
38382cd038dSYoshinobu Inoue 	/*
38482cd038dSYoshinobu Inoue 	 * Next header might not be ICMP6 but use its pseudo header anyway.
38582cd038dSYoshinobu Inoue 	 */
38682cd038dSYoshinobu Inoue 	ip6->ip6_dst = *dst;
38782cd038dSYoshinobu Inoue 
38882cd038dSYoshinobu Inoue 	/*
38982cd038dSYoshinobu Inoue 	 * If the scope of the destination is link-local, embed the interface
39082cd038dSYoshinobu Inoue 	 * index in the address.
39182cd038dSYoshinobu Inoue 	 *
39282cd038dSYoshinobu Inoue 	 * XXX advanced-api value overrides sin6_scope_id
39382cd038dSYoshinobu Inoue 	 */
39482cd038dSYoshinobu Inoue 	if (IN6_IS_SCOPE_LINKLOCAL(&ip6->ip6_dst)) {
39582cd038dSYoshinobu Inoue 		struct in6_pktinfo *pi;
39682cd038dSYoshinobu Inoue 
39782cd038dSYoshinobu Inoue 		/*
39882cd038dSYoshinobu Inoue 		 * XXX Boundary check is assumed to be already done in
39982cd038dSYoshinobu Inoue 		 * ip6_setpktoptions().
40082cd038dSYoshinobu Inoue 		 */
401f95d4633SHajimu UMEMOTO 		if (in6p->in6p_outputopts &&
402f95d4633SHajimu UMEMOTO 		    (pi = in6p->in6p_outputopts->ip6po_pktinfo) &&
403f95d4633SHajimu UMEMOTO 		    pi->ipi6_ifindex) {
40482cd038dSYoshinobu Inoue 			ip6->ip6_dst.s6_addr16[1] = htons(pi->ipi6_ifindex);
405f9132cebSJonathan Lemon 			oifp = ifnet_byindex(pi->ipi6_ifindex);
40682cd038dSYoshinobu Inoue 		} else if (IN6_IS_ADDR_MULTICAST(&ip6->ip6_dst) &&
40782cd038dSYoshinobu Inoue 			 in6p->in6p_moptions &&
40882cd038dSYoshinobu Inoue 			 in6p->in6p_moptions->im6o_multicast_ifp) {
40982cd038dSYoshinobu Inoue 			oifp = in6p->in6p_moptions->im6o_multicast_ifp;
41082cd038dSYoshinobu Inoue 			ip6->ip6_dst.s6_addr16[1] = htons(oifp->if_index);
41182cd038dSYoshinobu Inoue 		} else if (dstsock->sin6_scope_id) {
41282cd038dSYoshinobu Inoue 			/* boundary check */
41307eb2995SHajimu UMEMOTO 			if (dstsock->sin6_scope_id < 0 ||
41407eb2995SHajimu UMEMOTO 			    if_index < dstsock->sin6_scope_id) {
41582cd038dSYoshinobu Inoue 				error = ENXIO;  /* XXX EINVAL? */
41682cd038dSYoshinobu Inoue 				goto bad;
41782cd038dSYoshinobu Inoue 			}
41807eb2995SHajimu UMEMOTO 			ip6->ip6_dst.s6_addr16[1] =
41907eb2995SHajimu UMEMOTO 			    htons(dstsock->sin6_scope_id & 0xffff); /* XXX */
42082cd038dSYoshinobu Inoue 		}
42182cd038dSYoshinobu Inoue 	}
42282cd038dSYoshinobu Inoue 
42382cd038dSYoshinobu Inoue 	/*
42482cd038dSYoshinobu Inoue 	 * Source address selection.
42582cd038dSYoshinobu Inoue 	 */
426f95d4633SHajimu UMEMOTO 	if ((in6a = in6_selectsrc(dstsock, in6p->in6p_outputopts,
427f95d4633SHajimu UMEMOTO 	    in6p->in6p_moptions, &in6p->in6p_route, &in6p->in6p_laddr,
428f95d4633SHajimu UMEMOTO 	    &error)) == 0) {
42982cd038dSYoshinobu Inoue 		if (error == 0)
43082cd038dSYoshinobu Inoue 			error = EADDRNOTAVAIL;
43182cd038dSYoshinobu Inoue 		goto bad;
43282cd038dSYoshinobu Inoue 	}
43382cd038dSYoshinobu Inoue 	ip6->ip6_src = *in6a;
43482cd038dSYoshinobu Inoue 	if (in6p->in6p_route.ro_rt)
435f9132cebSJonathan Lemon 		oifp = ifnet_byindex(in6p->in6p_route.ro_rt->rt_ifp->if_index);
4366a800098SYoshinobu Inoue 	ip6->ip6_flow = (ip6->ip6_flow & ~IPV6_FLOWINFO_MASK) |
4376a800098SYoshinobu Inoue 		(in6p->in6p_flowinfo & IPV6_FLOWINFO_MASK);
4386a800098SYoshinobu Inoue 	ip6->ip6_vfc = (ip6->ip6_vfc & ~IPV6_VERSION_MASK) |
4396a800098SYoshinobu Inoue 		(IPV6_VERSION & IPV6_VERSION_MASK);
44082cd038dSYoshinobu Inoue 	/* ip6_plen will be filled in ip6_output, so not fill it here. */
44182cd038dSYoshinobu Inoue 	ip6->ip6_nxt = in6p->in6p_ip6_nxt;
44282cd038dSYoshinobu Inoue 	ip6->ip6_hlim = in6_selecthlim(in6p, oifp);
44382cd038dSYoshinobu Inoue 
44482cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6 ||
44582cd038dSYoshinobu Inoue 	    in6p->in6p_cksum != -1) {
44682cd038dSYoshinobu Inoue 		struct mbuf *n;
44782cd038dSYoshinobu Inoue 		int off;
44882cd038dSYoshinobu Inoue 		u_int16_t *p;
44982cd038dSYoshinobu Inoue 
45082cd038dSYoshinobu Inoue 		/* compute checksum */
45182cd038dSYoshinobu Inoue 		if (so->so_proto->pr_protocol == IPPROTO_ICMPV6)
45282cd038dSYoshinobu Inoue 			off = offsetof(struct icmp6_hdr, icmp6_cksum);
45382cd038dSYoshinobu Inoue 		else
45482cd038dSYoshinobu Inoue 			off = in6p->in6p_cksum;
45582cd038dSYoshinobu Inoue 		if (plen < off + 1) {
45682cd038dSYoshinobu Inoue 			error = EINVAL;
45782cd038dSYoshinobu Inoue 			goto bad;
45882cd038dSYoshinobu Inoue 		}
45982cd038dSYoshinobu Inoue 		off += sizeof(struct ip6_hdr);
46082cd038dSYoshinobu Inoue 
46182cd038dSYoshinobu Inoue 		n = m;
46282cd038dSYoshinobu Inoue 		while (n && n->m_len <= off) {
46382cd038dSYoshinobu Inoue 			off -= n->m_len;
46482cd038dSYoshinobu Inoue 			n = n->m_next;
46582cd038dSYoshinobu Inoue 		}
46682cd038dSYoshinobu Inoue 		if (!n)
46782cd038dSYoshinobu Inoue 			goto bad;
46882cd038dSYoshinobu Inoue 		p = (u_int16_t *)(mtod(n, caddr_t) + off);
46982cd038dSYoshinobu Inoue 		*p = 0;
47082cd038dSYoshinobu Inoue 		*p = in6_cksum(m, ip6->ip6_nxt, sizeof(*ip6), plen);
47182cd038dSYoshinobu Inoue 	}
47282cd038dSYoshinobu Inoue 
473f95d4633SHajimu UMEMOTO 	error = ip6_output(m, in6p->in6p_outputopts, &in6p->in6p_route, 0,
4745d846453SSam Leffler 			   in6p->in6p_moptions, &oifp, in6p);
47582cd038dSYoshinobu Inoue 	if (so->so_proto->pr_protocol == IPPROTO_ICMPV6) {
47682cd038dSYoshinobu Inoue 		if (oifp)
47782cd038dSYoshinobu Inoue 			icmp6_ifoutstat_inc(oifp, type, code);
47882cd038dSYoshinobu Inoue 		icmp6stat.icp6s_outhist[type]++;
47933841545SHajimu UMEMOTO 	} else
48033841545SHajimu UMEMOTO 		rip6stat.rip6s_opackets++;
48182cd038dSYoshinobu Inoue 
48282cd038dSYoshinobu Inoue 	goto freectl;
48382cd038dSYoshinobu Inoue 
48482cd038dSYoshinobu Inoue  bad:
48582cd038dSYoshinobu Inoue 	if (m)
48682cd038dSYoshinobu Inoue 		m_freem(m);
48782cd038dSYoshinobu Inoue 
48882cd038dSYoshinobu Inoue  freectl:
48933841545SHajimu UMEMOTO 	if (control) {
490f95d4633SHajimu UMEMOTO 		ip6_clearpktopts(in6p->in6p_outputopts, -1);
491f95d4633SHajimu UMEMOTO 		in6p->in6p_outputopts = stickyopt;
49282cd038dSYoshinobu Inoue 		m_freem(control);
49333841545SHajimu UMEMOTO 	}
49482cd038dSYoshinobu Inoue 	return (error);
49582cd038dSYoshinobu Inoue }
49682cd038dSYoshinobu Inoue 
49782cd038dSYoshinobu Inoue /*
49882cd038dSYoshinobu Inoue  * Raw IPv6 socket option processing.
49982cd038dSYoshinobu Inoue  */
50082cd038dSYoshinobu Inoue int
50182cd038dSYoshinobu Inoue rip6_ctloutput(so, sopt)
50282cd038dSYoshinobu Inoue 	struct socket *so;
50382cd038dSYoshinobu Inoue 	struct sockopt *sopt;
50482cd038dSYoshinobu Inoue {
50582cd038dSYoshinobu Inoue 	int error;
50682cd038dSYoshinobu Inoue 
50782cd038dSYoshinobu Inoue 	if (sopt->sopt_level == IPPROTO_ICMPV6)
50882cd038dSYoshinobu Inoue 		/*
50982cd038dSYoshinobu Inoue 		 * XXX: is it better to call icmp6_ctloutput() directly
51082cd038dSYoshinobu Inoue 		 * from protosw?
51182cd038dSYoshinobu Inoue 		 */
51282cd038dSYoshinobu Inoue 		return (icmp6_ctloutput(so, sopt));
51382cd038dSYoshinobu Inoue 	else if (sopt->sopt_level != IPPROTO_IPV6)
51482cd038dSYoshinobu Inoue 		return (EINVAL);
51582cd038dSYoshinobu Inoue 
51682cd038dSYoshinobu Inoue 	error = 0;
51782cd038dSYoshinobu Inoue 
51882cd038dSYoshinobu Inoue 	switch (sopt->sopt_dir) {
51982cd038dSYoshinobu Inoue 	case SOPT_GET:
52082cd038dSYoshinobu Inoue 		switch (sopt->sopt_name) {
52191ec0a1eSYoshinobu Inoue 		case MRT6_INIT:
52291ec0a1eSYoshinobu Inoue 		case MRT6_DONE:
52391ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MIF:
52491ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MIF:
52591ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MFC:
52691ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MFC:
52791ec0a1eSYoshinobu Inoue 		case MRT6_PIM:
52891ec0a1eSYoshinobu Inoue 			error = ip6_mrouter_get(so, sopt);
52991ec0a1eSYoshinobu Inoue 			break;
53082cd038dSYoshinobu Inoue 		default:
53182cd038dSYoshinobu Inoue 			error = ip6_ctloutput(so, sopt);
53282cd038dSYoshinobu Inoue 			break;
53382cd038dSYoshinobu Inoue 		}
53482cd038dSYoshinobu Inoue 		break;
53582cd038dSYoshinobu Inoue 
53682cd038dSYoshinobu Inoue 	case SOPT_SET:
53782cd038dSYoshinobu Inoue 		switch (sopt->sopt_name) {
53891ec0a1eSYoshinobu Inoue 		case MRT6_INIT:
53991ec0a1eSYoshinobu Inoue 		case MRT6_DONE:
54091ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MIF:
54191ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MIF:
54291ec0a1eSYoshinobu Inoue 		case MRT6_ADD_MFC:
54391ec0a1eSYoshinobu Inoue 		case MRT6_DEL_MFC:
54491ec0a1eSYoshinobu Inoue 		case MRT6_PIM:
54591ec0a1eSYoshinobu Inoue 			error = ip6_mrouter_set(so, sopt);
54691ec0a1eSYoshinobu Inoue 			break;
54782cd038dSYoshinobu Inoue 		default:
54882cd038dSYoshinobu Inoue 			error = ip6_ctloutput(so, sopt);
54982cd038dSYoshinobu Inoue 			break;
55082cd038dSYoshinobu Inoue 		}
55182cd038dSYoshinobu Inoue 		break;
55282cd038dSYoshinobu Inoue 	}
55382cd038dSYoshinobu Inoue 
55482cd038dSYoshinobu Inoue 	return (error);
55582cd038dSYoshinobu Inoue }
55682cd038dSYoshinobu Inoue 
55782cd038dSYoshinobu Inoue static int
558b40ce416SJulian Elischer rip6_attach(struct socket *so, int proto, struct thread *td)
55982cd038dSYoshinobu Inoue {
56082cd038dSYoshinobu Inoue 	struct inpcb *inp;
56182cd038dSYoshinobu Inoue 	int error, s;
56282cd038dSYoshinobu Inoue 
56382cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
56482cd038dSYoshinobu Inoue 	if (inp)
56582cd038dSYoshinobu Inoue 		panic("rip6_attach");
56644731cabSJohn Baldwin 	if (td && (error = suser(td)) != 0)
56782cd038dSYoshinobu Inoue 		return error;
56882cd038dSYoshinobu Inoue 
56982cd038dSYoshinobu Inoue 	error = soreserve(so, rip_sendspace, rip_recvspace);
57082cd038dSYoshinobu Inoue 	if (error)
57182cd038dSYoshinobu Inoue 		return error;
57282cd038dSYoshinobu Inoue 	s = splnet();
573b40ce416SJulian Elischer 	error = in_pcballoc(so, &ripcbinfo, td);
57482cd038dSYoshinobu Inoue 	splx(s);
57582cd038dSYoshinobu Inoue 	if (error)
57682cd038dSYoshinobu Inoue 		return error;
57782cd038dSYoshinobu Inoue 	inp = (struct inpcb *)so->so_pcb;
57882cd038dSYoshinobu Inoue 	inp->inp_vflag |= INP_IPV6;
57982cd038dSYoshinobu Inoue 	inp->in6p_ip6_nxt = (long)proto;
58082cd038dSYoshinobu Inoue 	inp->in6p_hops = -1;	/* use kernel default */
58182cd038dSYoshinobu Inoue 	inp->in6p_cksum = -1;
58282cd038dSYoshinobu Inoue 	MALLOC(inp->in6p_icmp6filt, struct icmp6_filter *,
58382cd038dSYoshinobu Inoue 	       sizeof(struct icmp6_filter), M_PCB, M_NOWAIT);
58482cd038dSYoshinobu Inoue 	ICMP6_FILTER_SETPASSALL(inp->in6p_icmp6filt);
58582cd038dSYoshinobu Inoue 	return 0;
58682cd038dSYoshinobu Inoue }
58782cd038dSYoshinobu Inoue 
58882cd038dSYoshinobu Inoue static int
58982cd038dSYoshinobu Inoue rip6_detach(struct socket *so)
59082cd038dSYoshinobu Inoue {
59182cd038dSYoshinobu Inoue 	struct inpcb *inp;
59282cd038dSYoshinobu Inoue 
59382cd038dSYoshinobu Inoue 	inp = sotoinpcb(so);
59482cd038dSYoshinobu Inoue 	if (inp == 0)
59582cd038dSYoshinobu Inoue 		panic("rip6_detach");
59682cd038dSYoshinobu Inoue 	/* xxx: RSVP */
597e7e3ecb6SYoshinobu Inoue 	if (so == ip6_mrouter)
598e7e3ecb6SYoshinobu Inoue 		ip6_mrouter_done();
59982cd038dSYoshinobu Inoue 	if (inp->in6p_icmp6filt) {
60082cd038dSYoshinobu Inoue 		FREE(inp->in6p_icmp6filt, M_PCB);
60182cd038dSYoshinobu Inoue 		inp->in6p_icmp6filt = NULL;
60282cd038dSYoshinobu Inoue 	}
60382cd038dSYoshinobu Inoue 	in6_pcbdetach(inp);
60482cd038dSYoshinobu Inoue 	return 0;
60582cd038dSYoshinobu Inoue }
60682cd038dSYoshinobu Inoue 
60782cd038dSYoshinobu Inoue static int
60882cd038dSYoshinobu Inoue rip6_abort(struct socket *so)
60982cd038dSYoshinobu Inoue {
61082cd038dSYoshinobu Inoue 	soisdisconnected(so);
61182cd038dSYoshinobu Inoue 	return rip6_detach(so);
61282cd038dSYoshinobu Inoue }
61382cd038dSYoshinobu Inoue 
61482cd038dSYoshinobu Inoue static int
61582cd038dSYoshinobu Inoue rip6_disconnect(struct socket *so)
61682cd038dSYoshinobu Inoue {
61782cd038dSYoshinobu Inoue 	struct inpcb *inp = sotoinpcb(so);
61882cd038dSYoshinobu Inoue 
6194cc20ab1SSeigo Tanimura 	if ((so->so_state & SS_ISCONNECTED) == 0)
62082cd038dSYoshinobu Inoue 		return ENOTCONN;
62182cd038dSYoshinobu Inoue 	inp->in6p_faddr = in6addr_any;
62282cd038dSYoshinobu Inoue 	return rip6_abort(so);
62382cd038dSYoshinobu Inoue }
62482cd038dSYoshinobu Inoue 
62582cd038dSYoshinobu Inoue static int
626b40ce416SJulian Elischer rip6_bind(struct socket *so, struct sockaddr *nam, struct thread *td)
62782cd038dSYoshinobu Inoue {
62882cd038dSYoshinobu Inoue 	struct inpcb *inp = sotoinpcb(so);
62982cd038dSYoshinobu Inoue 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
63082cd038dSYoshinobu Inoue 	struct ifaddr *ia = NULL;
63182cd038dSYoshinobu Inoue 
63282cd038dSYoshinobu Inoue 	if (nam->sa_len != sizeof(*addr))
63382cd038dSYoshinobu Inoue 		return EINVAL;
63482cd038dSYoshinobu Inoue 	if (TAILQ_EMPTY(&ifnet) || addr->sin6_family != AF_INET6)
63582cd038dSYoshinobu Inoue 		return EADDRNOTAVAIL;
636686cdd19SJun-ichiro itojun Hagino #ifdef ENABLE_DEFAULT_SCOPE
637686cdd19SJun-ichiro itojun Hagino 	if (addr->sin6_scope_id == 0) {	/* not change if specified  */
638686cdd19SJun-ichiro itojun Hagino 		addr->sin6_scope_id = scope6_addr2default(&addr->sin6_addr);
639686cdd19SJun-ichiro itojun Hagino 	}
640686cdd19SJun-ichiro itojun Hagino #endif
64182cd038dSYoshinobu Inoue 	if (!IN6_IS_ADDR_UNSPECIFIED(&addr->sin6_addr) &&
64282cd038dSYoshinobu Inoue 	    (ia = ifa_ifwithaddr((struct sockaddr *)addr)) == 0)
64382cd038dSYoshinobu Inoue 		return EADDRNOTAVAIL;
64482cd038dSYoshinobu Inoue 	if (ia &&
64582cd038dSYoshinobu Inoue 	    ((struct in6_ifaddr *)ia)->ia6_flags &
64682cd038dSYoshinobu Inoue 	    (IN6_IFF_ANYCAST|IN6_IFF_NOTREADY|
64782cd038dSYoshinobu Inoue 	     IN6_IFF_DETACHED|IN6_IFF_DEPRECATED)) {
64882cd038dSYoshinobu Inoue 		return (EADDRNOTAVAIL);
64982cd038dSYoshinobu Inoue 	}
65082cd038dSYoshinobu Inoue 	inp->in6p_laddr = addr->sin6_addr;
65182cd038dSYoshinobu Inoue 	return 0;
65282cd038dSYoshinobu Inoue }
65382cd038dSYoshinobu Inoue 
65482cd038dSYoshinobu Inoue static int
655b40ce416SJulian Elischer rip6_connect(struct socket *so, struct sockaddr *nam, struct thread *td)
65682cd038dSYoshinobu Inoue {
65782cd038dSYoshinobu Inoue 	struct inpcb *inp = sotoinpcb(so);
65882cd038dSYoshinobu Inoue 	struct sockaddr_in6 *addr = (struct sockaddr_in6 *)nam;
65982cd038dSYoshinobu Inoue 	struct in6_addr *in6a = NULL;
66082cd038dSYoshinobu Inoue 	int error = 0;
661686cdd19SJun-ichiro itojun Hagino #ifdef ENABLE_DEFAULT_SCOPE
662686cdd19SJun-ichiro itojun Hagino 	struct sockaddr_in6 tmp;
663686cdd19SJun-ichiro itojun Hagino #endif
66482cd038dSYoshinobu Inoue 
66582cd038dSYoshinobu Inoue 	if (nam->sa_len != sizeof(*addr))
66682cd038dSYoshinobu Inoue 		return EINVAL;
66782cd038dSYoshinobu Inoue 	if (TAILQ_EMPTY(&ifnet))
66882cd038dSYoshinobu Inoue 		return EADDRNOTAVAIL;
66982cd038dSYoshinobu Inoue 	if (addr->sin6_family != AF_INET6)
67082cd038dSYoshinobu Inoue 		return EAFNOSUPPORT;
671686cdd19SJun-ichiro itojun Hagino #ifdef ENABLE_DEFAULT_SCOPE
672686cdd19SJun-ichiro itojun Hagino 	if (addr->sin6_scope_id == 0) {	/* not change if specified  */
673686cdd19SJun-ichiro itojun Hagino 		/* avoid overwrites */
674686cdd19SJun-ichiro itojun Hagino 		tmp = *addr;
675686cdd19SJun-ichiro itojun Hagino 		addr = &tmp;
676686cdd19SJun-ichiro itojun Hagino 		addr->sin6_scope_id = scope6_addr2default(&addr->sin6_addr);
677686cdd19SJun-ichiro itojun Hagino 	}
678686cdd19SJun-ichiro itojun Hagino #endif
67982cd038dSYoshinobu Inoue 	/* Source address selection. XXX: need pcblookup? */
68082cd038dSYoshinobu Inoue 	in6a = in6_selectsrc(addr, inp->in6p_outputopts,
68182cd038dSYoshinobu Inoue 			     inp->in6p_moptions, &inp->in6p_route,
68282cd038dSYoshinobu Inoue 			     &inp->in6p_laddr, &error);
68382cd038dSYoshinobu Inoue 	if (in6a == NULL)
68482cd038dSYoshinobu Inoue 		return (error ? error : EADDRNOTAVAIL);
68582cd038dSYoshinobu Inoue 	inp->in6p_laddr = *in6a;
68682cd038dSYoshinobu Inoue 	inp->in6p_faddr = addr->sin6_addr;
68782cd038dSYoshinobu Inoue 	soisconnected(so);
68882cd038dSYoshinobu Inoue 	return 0;
68982cd038dSYoshinobu Inoue }
69082cd038dSYoshinobu Inoue 
69182cd038dSYoshinobu Inoue static int
69282cd038dSYoshinobu Inoue rip6_shutdown(struct socket *so)
69382cd038dSYoshinobu Inoue {
69482cd038dSYoshinobu Inoue 	socantsendmore(so);
69582cd038dSYoshinobu Inoue 	return 0;
69682cd038dSYoshinobu Inoue }
69782cd038dSYoshinobu Inoue 
69882cd038dSYoshinobu Inoue static int
69982cd038dSYoshinobu Inoue rip6_send(struct socket *so, int flags, struct mbuf *m, struct sockaddr *nam,
700b40ce416SJulian Elischer 	 struct mbuf *control, struct thread *td)
70182cd038dSYoshinobu Inoue {
70282cd038dSYoshinobu Inoue 	struct inpcb *inp = sotoinpcb(so);
70382cd038dSYoshinobu Inoue 	struct sockaddr_in6 tmp;
70482cd038dSYoshinobu Inoue 	struct sockaddr_in6 *dst;
70582cd038dSYoshinobu Inoue 
706686cdd19SJun-ichiro itojun Hagino 	/* always copy sockaddr to avoid overwrites */
70782cd038dSYoshinobu Inoue 	if (so->so_state & SS_ISCONNECTED) {
70882cd038dSYoshinobu Inoue 		if (nam) {
70982cd038dSYoshinobu Inoue 			m_freem(m);
71082cd038dSYoshinobu Inoue 			return EISCONN;
71182cd038dSYoshinobu Inoue 		}
71282cd038dSYoshinobu Inoue 		/* XXX */
71382cd038dSYoshinobu Inoue 		bzero(&tmp, sizeof(tmp));
71482cd038dSYoshinobu Inoue 		tmp.sin6_family = AF_INET6;
71582cd038dSYoshinobu Inoue 		tmp.sin6_len = sizeof(struct sockaddr_in6);
71682cd038dSYoshinobu Inoue 		bcopy(&inp->in6p_faddr, &tmp.sin6_addr,
71782cd038dSYoshinobu Inoue 		      sizeof(struct in6_addr));
71882cd038dSYoshinobu Inoue 		dst = &tmp;
71982cd038dSYoshinobu Inoue 	} else {
72082cd038dSYoshinobu Inoue 		if (nam == NULL) {
72182cd038dSYoshinobu Inoue 			m_freem(m);
72282cd038dSYoshinobu Inoue 			return ENOTCONN;
72382cd038dSYoshinobu Inoue 		}
724686cdd19SJun-ichiro itojun Hagino 		tmp = *(struct sockaddr_in6 *)nam;
725686cdd19SJun-ichiro itojun Hagino 		dst = &tmp;
72682cd038dSYoshinobu Inoue 	}
727686cdd19SJun-ichiro itojun Hagino #ifdef ENABLE_DEFAULT_SCOPE
728686cdd19SJun-ichiro itojun Hagino 	if (dst->sin6_scope_id == 0) {	/* not change if specified  */
729686cdd19SJun-ichiro itojun Hagino 		dst->sin6_scope_id = scope6_addr2default(&dst->sin6_addr);
730686cdd19SJun-ichiro itojun Hagino 	}
731686cdd19SJun-ichiro itojun Hagino #endif
73282cd038dSYoshinobu Inoue 	return rip6_output(m, so, dst, control);
73382cd038dSYoshinobu Inoue }
73482cd038dSYoshinobu Inoue 
73582cd038dSYoshinobu Inoue struct pr_usrreqs rip6_usrreqs = {
73682cd038dSYoshinobu Inoue 	rip6_abort, pru_accept_notsupp, rip6_attach, rip6_bind, rip6_connect,
73782cd038dSYoshinobu Inoue 	pru_connect2_notsupp, in6_control, rip6_detach, rip6_disconnect,
73882cd038dSYoshinobu Inoue 	pru_listen_notsupp, in6_setpeeraddr, pru_rcvd_notsupp,
73982cd038dSYoshinobu Inoue 	pru_rcvoob_notsupp, rip6_send, pru_sense_null, rip6_shutdown,
74082cd038dSYoshinobu Inoue 	in6_setsockaddr, sosend, soreceive, sopoll
74182cd038dSYoshinobu Inoue };
742