Home | History | Annotate | Line # | Download | only in netinet
portalgo.c revision 1.10
      1  1.10     ozaki /*	$NetBSD: portalgo.c,v 1.10 2016/04/26 08:44:44 ozaki-r Exp $	*/
      2   1.1  christos 
      3   1.1  christos /*
      4   1.1  christos  * Copyright 2011 Vlad Balan
      5   1.1  christos  *
      6   1.1  christos  * Written by Vlad Balan for the NetBSD Foundation.
      7   1.1  christos  *
      8   1.1  christos  * Redistribution and use in source and binary forms, with or without
      9   1.1  christos  * modification, are permitted provided that the following conditions
     10   1.1  christos  * are met:
     11   1.1  christos  * 1. Redistributions of source code must retain the above copyright
     12   1.1  christos  *    notice, this list of conditions and the following disclaimer.
     13   1.1  christos  * 2. Redistributions in binary form must reproduce the above copyright
     14   1.1  christos  *    notice, this list of conditions and the following disclaimer in the
     15   1.1  christos  *    documentation and/or other materials provided with the distribution.
     16   1.1  christos  *
     17   1.1  christos  * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
     18   1.1  christos  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     19   1.1  christos  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     20   1.1  christos  * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
     21   1.1  christos  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     22   1.1  christos  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     23   1.1  christos  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     24   1.1  christos  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     25   1.1  christos  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     26   1.1  christos  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     27   1.1  christos  * SUCH DAMAGE.
     28   1.1  christos  *
     29   1.1  christos  */
     30   1.1  christos 
     31   1.1  christos /*
     32   1.1  christos  * see:
     33   1.1  christos  *	RFC 6056 Recommendations for Transport-Protocol Port Randomization
     34   1.1  christos  */
     35   1.1  christos 
     36   1.1  christos #include <sys/cdefs.h>
     37  1.10     ozaki __KERNEL_RCSID(0, "$NetBSD: portalgo.c,v 1.10 2016/04/26 08:44:44 ozaki-r Exp $");
     38   1.1  christos 
     39   1.9     pooka #ifdef _KERNEL_OPT
     40   1.1  christos #include "opt_inet.h"
     41   1.9     pooka #endif
     42   1.1  christos 
     43   1.1  christos #include <sys/param.h>
     44   1.1  christos #include <sys/errno.h>
     45   1.1  christos #include <sys/kauth.h>
     46   1.1  christos #include <sys/uidinfo.h>
     47   1.1  christos #include <sys/domain.h>
     48   1.1  christos #include <sys/md5.h>
     49   1.1  christos #include <sys/cprng.h>
     50   1.3  christos #include <sys/bitops.h>
     51   1.1  christos 
     52   1.1  christos #include <net/if.h>
     53   1.1  christos 
     54   1.1  christos #include <netinet/in.h>
     55   1.1  christos #include <netinet/in_systm.h>
     56   1.1  christos #include <netinet/ip.h>
     57   1.1  christos #include <netinet/in_pcb.h>
     58   1.1  christos #include <netinet/in_var.h>
     59   1.1  christos #include <netinet/ip_var.h>
     60   1.1  christos 
     61   1.1  christos #ifdef INET6
     62   1.1  christos #include <netinet/ip6.h>
     63   1.1  christos #include <netinet6/ip6_var.h>
     64   1.1  christos #include <netinet6/in6_pcb.h>
     65   1.1  christos #endif
     66   1.1  christos 
     67   1.1  christos #include <netinet/tcp_vtw.h>
     68   1.1  christos 
     69   1.1  christos #include "portalgo.h"
     70   1.1  christos 
     71   1.1  christos #define NPROTO 2
     72   1.1  christos #define PORTALGO_TCP 0
     73   1.1  christos #define PORTALGO_UDP 1
     74   1.1  christos 
     75   1.1  christos #define NAF 2
     76   1.1  christos #define PORTALGO_IPV4 0
     77   1.1  christos #define PORTALGO_IPV6 1
     78   1.1  christos 
     79   1.1  christos #define NRANGES 2
     80   1.1  christos #define PORTALGO_LOWPORT 0
     81   1.1  christos #define PORTALGO_HIGHPORT 1
     82   1.1  christos 
     83   1.1  christos #if PORTALGO_DEBUG
     84   1.1  christos static bool portalgo_debug = true;
     85   1.1  christos #define DPRINTF if (portalgo_debug) printf
     86   1.1  christos #else
     87   1.1  christos #define DPRINTF while (/*CONSTCOND*/0) printf
     88   1.1  christos #endif
     89   1.1  christos 
     90   1.5     pooka #ifndef PORTALGO_INET4_DEFAULT
     91   1.5     pooka #define PORTALGO_INET4_DEFAULT PORTALGO_BSD
     92   1.5     pooka #endif
     93   1.5     pooka #ifndef PORTALGO_INET6_DEFAULT
     94   1.5     pooka #define PORTALGO_INET6_DEFAULT PORTALGO_BSD
     95   1.5     pooka #endif
     96   1.5     pooka 
     97   1.4  christos typedef __BITMAP_TYPE(, uint32_t, 0x10000) bitmap;
     98   1.1  christos #ifdef INET
     99   1.5     pooka static int inet4_portalgo = PORTALGO_INET4_DEFAULT;
    100   1.4  christos static bitmap inet4_reserve;
    101   1.1  christos #endif
    102   1.1  christos #ifdef INET6
    103   1.5     pooka static int inet6_portalgo = PORTALGO_INET6_DEFAULT;
    104   1.4  christos static bitmap inet6_reserve;
    105   1.1  christos #endif
    106   1.1  christos 
    107   1.1  christos typedef struct {
    108   1.1  christos 	const char *name;
    109   1.1  christos 	int (*func)(int, uint16_t *, struct inpcb_hdr *, kauth_cred_t);
    110   1.1  christos } portalgo_algorithm_t;
    111   1.1  christos 
    112   1.1  christos static int algo_bsd(int, uint16_t *, struct inpcb_hdr *, kauth_cred_t);
    113   1.1  christos static int algo_random_start(int, uint16_t *, struct inpcb_hdr *, kauth_cred_t);
    114   1.1  christos static int algo_random_pick(int, uint16_t *, struct inpcb_hdr *, kauth_cred_t);
    115   1.1  christos static int algo_hash(int, uint16_t *, struct inpcb_hdr *, kauth_cred_t);
    116   1.1  christos static int algo_doublehash(int, uint16_t *, struct inpcb_hdr *, kauth_cred_t);
    117   1.1  christos static int algo_randinc(int, uint16_t *, struct inpcb_hdr *, kauth_cred_t);
    118   1.1  christos 
    119   1.1  christos static const portalgo_algorithm_t algos[] = {
    120   1.1  christos 	{
    121   1.1  christos 		.name = "bsd",
    122   1.1  christos 		.func = algo_bsd
    123   1.1  christos 	},
    124   1.1  christos 	{
    125   1.1  christos 		.name = "random_start",
    126   1.1  christos 		.func = algo_random_start
    127   1.1  christos 	},
    128   1.1  christos 	{
    129   1.1  christos 		.name = "random_pick",
    130   1.1  christos 		.func = algo_random_pick
    131   1.1  christos 	},
    132   1.1  christos 	{
    133   1.1  christos 		.name = "hash",
    134   1.1  christos 		.func = algo_hash
    135   1.1  christos 	},
    136   1.1  christos 	{
    137   1.1  christos 		.name = "doublehash",
    138   1.1  christos 		.func = algo_doublehash
    139   1.1  christos 	},
    140   1.1  christos 	{
    141   1.1  christos 		.name = "randinc",
    142   1.1  christos 		.func = algo_randinc
    143   1.1  christos 	}
    144   1.1  christos };
    145   1.1  christos 
    146   1.1  christos #define NALGOS __arraycount(algos)
    147   1.1  christos 
    148   1.1  christos static uint16_t portalgo_next_ephemeral[NPROTO][NAF][NRANGES][NALGOS];
    149   1.1  christos 
    150   1.1  christos /*
    151   1.1  christos  * Access the pcb and copy the values of the last port and the ends of
    152   1.1  christos  * the port range.
    153   1.1  christos  */
    154   1.1  christos static int
    155   1.1  christos pcb_getports(struct inpcb_hdr *inp_hdr, uint16_t *lastport,
    156   1.1  christos     uint16_t *mymin, uint16_t *mymax, uint16_t **pnext_ephemeral, int algo)
    157   1.1  christos {
    158   1.1  christos 	struct inpcbtable * const table = inp_hdr->inph_table;
    159   1.1  christos 	struct socket *so;
    160   1.1  christos 	int portalgo_proto;
    161   1.1  christos 	int portalgo_af;
    162   1.1  christos 	int portalgo_range;
    163   1.1  christos 
    164   1.1  christos 	so = inp_hdr->inph_socket;
    165   1.1  christos 	switch (so->so_type) {
    166   1.1  christos 	case SOCK_DGRAM: /* UDP or DCCP */
    167   1.8       rjs 	case SOCK_CONN_DGRAM:
    168   1.1  christos 		portalgo_proto = PORTALGO_UDP;
    169   1.1  christos 		break;
    170   1.1  christos 	case SOCK_STREAM: /* TCP or SCTP */
    171   1.1  christos 		portalgo_proto = PORTALGO_TCP;
    172   1.1  christos 		break;
    173   1.1  christos 	default:
    174   1.1  christos 		return EPFNOSUPPORT;
    175   1.1  christos 	}
    176   1.1  christos 
    177   1.1  christos 	switch (inp_hdr->inph_af) {
    178   1.1  christos #ifdef INET
    179   1.1  christos 	case AF_INET: {
    180   1.1  christos 		struct inpcb *inp = (struct inpcb *)(void *)inp_hdr;
    181   1.1  christos 
    182   1.1  christos 		portalgo_af = PORTALGO_IPV4;
    183   1.1  christos 		if (inp->inp_flags & INP_LOWPORT) {
    184   1.1  christos 			*mymin = lowportmin;
    185   1.1  christos 			*mymax = lowportmax;
    186   1.1  christos 			*lastport = table->inpt_lastlow;
    187   1.1  christos 			portalgo_range = PORTALGO_LOWPORT;
    188   1.1  christos 		} else {
    189   1.1  christos 			*mymin = anonportmin;
    190   1.1  christos 			*mymax = anonportmax;
    191   1.1  christos 			*lastport = table->inpt_lastport;
    192   1.1  christos 			portalgo_range = PORTALGO_HIGHPORT;
    193   1.1  christos 		}
    194   1.1  christos 		break;
    195   1.1  christos 	}
    196   1.1  christos #endif
    197   1.1  christos #ifdef INET6
    198   1.1  christos 	case AF_INET6: {
    199   1.1  christos 		struct in6pcb *in6p = (struct in6pcb *)(void *)inp_hdr;
    200   1.1  christos 
    201   1.1  christos 		portalgo_af = PORTALGO_IPV6;
    202   1.1  christos 		if (in6p->in6p_flags & IN6P_LOWPORT) {
    203   1.1  christos 			*mymin = ip6_lowportmin;
    204   1.1  christos 			*mymax = ip6_lowportmax;
    205   1.1  christos 			*lastport = table->inpt_lastlow;
    206   1.1  christos 			portalgo_range = PORTALGO_LOWPORT;
    207   1.1  christos 		} else {
    208   1.1  christos 			*mymin = ip6_anonportmin;
    209   1.1  christos 			*mymax = ip6_anonportmax;
    210   1.1  christos 			*lastport = table->inpt_lastport;
    211   1.1  christos 			portalgo_range = PORTALGO_HIGHPORT;
    212   1.1  christos 		}
    213   1.1  christos 		break;
    214   1.1  christos 	}
    215   1.1  christos #endif
    216   1.1  christos 	default:
    217   1.1  christos 		return EAFNOSUPPORT;
    218   1.1  christos 	}
    219   1.1  christos 
    220   1.1  christos 	if (*mymin > *mymax) {	/* sanity check */
    221   1.1  christos 		u_int16_t swp;
    222   1.1  christos 
    223   1.1  christos 		swp = *mymin;
    224   1.1  christos 		*mymin = *mymax;
    225   1.1  christos 		*mymax = swp;
    226   1.1  christos 	}
    227   1.1  christos 
    228   1.1  christos 	DPRINTF("%s mymin:%d mymax:%d lastport:%d\n", __func__,
    229   1.1  christos 	    *mymin, *mymax, *lastport);
    230   1.1  christos 
    231   1.1  christos 	*pnext_ephemeral = &portalgo_next_ephemeral[portalgo_proto]
    232   1.1  christos 	    [portalgo_af][portalgo_range][algo];
    233   1.1  christos 
    234   1.1  christos 	DPRINTF("%s portalgo_proto:%d portalgo_af:%d portalgo_range:%d\n",
    235   1.1  christos 	    __func__, portalgo_proto, portalgo_af, portalgo_range);
    236   1.1  christos 	return 0;
    237   1.1  christos }
    238   1.1  christos 
    239   1.1  christos /*
    240   1.1  christos  * Check whether the port picked by the port randomizer is available
    241   1.1  christos  * and whether KAUTH approves of our choice. This part of the code
    242   1.1  christos  * shamelessly copied from in_pcb.c.
    243   1.1  christos  */
    244   1.1  christos static bool
    245   1.1  christos check_suitable_port(uint16_t port, struct inpcb_hdr *inp_hdr, kauth_cred_t cred)
    246   1.1  christos {
    247   1.1  christos 	struct inpcbtable * const table = inp_hdr->inph_table;
    248   1.1  christos #ifdef INET
    249   1.1  christos 	vestigial_inpcb_t vestigial;
    250   1.1  christos #endif
    251   1.1  christos 	int error;
    252   1.1  christos #ifdef INET6
    253   1.1  christos 	struct socket *so;
    254   1.1  christos 	int wild = 0;
    255   1.1  christos #endif
    256   1.1  christos 
    257   1.1  christos 	DPRINTF("%s called for argument %d\n", __func__, port);
    258   1.1  christos 
    259   1.1  christos 	switch (inp_hdr->inph_af) {
    260   1.1  christos #ifdef INET
    261   1.1  christos 	case AF_INET: { /* IPv4 */
    262   1.1  christos 		struct inpcb *inp = (struct inpcb *)(void *)inp_hdr;
    263   1.1  christos 		struct inpcb *pcb;
    264   1.1  christos 		struct sockaddr_in sin;
    265   1.1  christos 
    266   1.4  christos 		if (__BITMAP_ISSET(port, &inet4_reserve))
    267   1.2  christos 			return false;
    268   1.2  christos 
    269   1.1  christos 		sin.sin_addr = inp->inp_laddr;
    270   1.1  christos 		pcb = in_pcblookup_port(table, sin.sin_addr, htons(port), 1,
    271   1.1  christos 		    &vestigial);
    272   1.1  christos 
    273   1.1  christos 		DPRINTF("%s in_pcblookup_port returned %p and "
    274   1.1  christos 		    "vestigial.valid %d\n",
    275   1.1  christos 		    __func__, pcb, vestigial.valid);
    276   1.1  christos 
    277   1.1  christos 		if ((!pcb) && (!vestigial.valid)) {
    278   1.1  christos 			enum kauth_network_req req;
    279   1.1  christos 
    280   1.1  christos 			/* We have a free port. Check with the secmodel. */
    281   1.1  christos 			if (inp->inp_flags & INP_LOWPORT) {
    282   1.1  christos #ifndef IPNOPRIVPORTS
    283   1.1  christos 				req = KAUTH_REQ_NETWORK_BIND_PRIVPORT;
    284   1.1  christos #else
    285   1.1  christos 				req = KAUTH_REQ_NETWORK_BIND_PORT;
    286   1.1  christos #endif
    287   1.1  christos 			} else
    288   1.1  christos 				req = KAUTH_REQ_NETWORK_BIND_PORT;
    289   1.1  christos 
    290   1.1  christos 			sin.sin_port = port;
    291   1.1  christos 			error = kauth_authorize_network(cred,
    292   1.1  christos 			    KAUTH_NETWORK_BIND,
    293   1.1  christos 			    req, inp->inp_socket, &sin, NULL);
    294   1.1  christos 			DPRINTF("%s kauth_authorize_network returned %d\n",
    295   1.1  christos 			    __func__, error);
    296   1.1  christos 
    297   1.1  christos 			if (error == 0) {
    298   1.1  christos 				DPRINTF("%s port approved\n", __func__);
    299   1.1  christos 				return true;	/* KAUTH agrees */
    300   1.1  christos 			}
    301   1.1  christos 		}
    302   1.1  christos 		break;
    303   1.1  christos 	}
    304   1.1  christos #endif
    305   1.1  christos #ifdef INET6
    306   1.1  christos 	case AF_INET6: { /* IPv6 */
    307   1.1  christos 		struct in6pcb *in6p = (struct in6pcb *)(void *)inp_hdr;
    308   1.1  christos 		struct sockaddr_in6 sin6;
    309   1.1  christos 		void *t;
    310   1.1  christos 
    311   1.4  christos 		if (__BITMAP_ISSET(port, &inet6_reserve))
    312   1.2  christos 			return false;
    313   1.2  christos 
    314   1.1  christos 		sin6.sin6_addr = in6p->in6p_laddr;
    315   1.1  christos 		so = in6p->in6p_socket;
    316   1.1  christos 
    317   1.1  christos 		/* XXX: this is redundant when called from in6_pcbbind */
    318   1.1  christos 		if ((so->so_options & (SO_REUSEADDR|SO_REUSEPORT)) == 0 &&
    319   1.1  christos 		    ((so->so_proto->pr_flags & PR_CONNREQUIRED) == 0 ||
    320   1.1  christos 			(so->so_options & SO_ACCEPTCONN) == 0))
    321   1.1  christos 			wild = 1;
    322   1.1  christos 
    323   1.1  christos #ifdef INET
    324   1.1  christos 		if (IN6_IS_ADDR_V4MAPPED(&sin6.sin6_addr)) {
    325   1.1  christos 			t = in_pcblookup_port(table,
    326   1.1  christos 			    *(struct in_addr *)&sin6.sin6_addr.s6_addr32[3],
    327   1.1  christos 			    htons(port), wild, &vestigial);
    328   1.1  christos 			if (!t && vestigial.valid) {
    329   1.1  christos 				DPRINTF("%s in_pcblookup_port returned "
    330   1.1  christos 				    "a result\n", __func__);
    331   1.1  christos 				return false;
    332   1.1  christos 			}
    333   1.1  christos 		} else
    334   1.1  christos #endif
    335   1.1  christos 		{
    336   1.1  christos 			t = in6_pcblookup_port(table, &sin6.sin6_addr,
    337   1.1  christos 			    htons(port), wild, &vestigial);
    338   1.1  christos 			if (!t && vestigial.valid) {
    339   1.1  christos 				DPRINTF("%s in6_pcblookup_port returned "
    340   1.1  christos 				    "a result\n", __func__);
    341   1.1  christos 				return false;
    342   1.1  christos 			}
    343   1.1  christos 		}
    344   1.1  christos 		if (t == NULL) {
    345   1.1  christos 			enum kauth_network_req req;
    346   1.1  christos 
    347   1.1  christos 			/* We have a free port. Check with the secmodel. */
    348   1.1  christos 			if (in6p->in6p_flags & IN6P_LOWPORT) {
    349   1.1  christos #ifndef IPNOPRIVPORTS
    350   1.1  christos 				req = KAUTH_REQ_NETWORK_BIND_PRIVPORT;
    351   1.1  christos #else
    352   1.1  christos 				req = KAUTH_REQ_NETWORK_BIND_PORT;
    353   1.1  christos #endif
    354   1.1  christos 			} else {
    355   1.1  christos 				req = KAUTH_REQ_NETWORK_BIND_PORT;
    356   1.1  christos 			}
    357   1.1  christos 
    358   1.1  christos 			sin6.sin6_port = port;
    359   1.1  christos 			error = kauth_authorize_network(cred,
    360   1.1  christos 			    KAUTH_NETWORK_BIND, req, so, &sin6, NULL);
    361   1.1  christos 			if (error) {
    362   1.1  christos 				/* Secmodel says no. Keep looking. */
    363   1.1  christos 				DPRINTF("%s secmodel says no\n", __func__);
    364   1.1  christos 				return false;
    365   1.1  christos 			}
    366   1.1  christos 			DPRINTF("%s port approved\n", __func__);
    367   1.1  christos 			return true;
    368   1.1  christos 		}
    369   1.1  christos 		break;
    370   1.1  christos 	}
    371   1.1  christos #endif
    372   1.1  christos 	default:
    373   1.1  christos 		DPRINTF("%s unknown address family\n", __func__);
    374   1.1  christos 		return false;
    375   1.1  christos 	}
    376   1.1  christos 	return false;
    377   1.1  christos }
    378   1.1  christos 
    379   1.1  christos /* This is the default BSD algorithm, as described in RFC 6056 */
    380   1.1  christos static int
    381   1.1  christos algo_bsd(int algo, uint16_t *port, struct inpcb_hdr *inp_hdr, kauth_cred_t cred)
    382   1.1  christos {
    383   1.1  christos 	uint16_t count;
    384   1.1  christos 	uint16_t mymin, mymax, lastport;
    385   1.1  christos 	uint16_t *next_ephemeral;
    386   1.1  christos 	int error;
    387   1.1  christos 
    388   1.1  christos 	DPRINTF("%s called\n", __func__);
    389   1.1  christos 	error = pcb_getports(inp_hdr, &lastport, &mymin, &mymax,
    390   1.1  christos 	    &next_ephemeral, algo);
    391   1.1  christos 	if (error)
    392   1.1  christos 		return error;
    393   1.1  christos 	count = mymax - mymin + 1;
    394   1.1  christos 	do {
    395   1.1  christos 		uint16_t myport = *next_ephemeral;
    396   1.1  christos 
    397   1.1  christos 		if (myport < mymin || mymax < myport)
    398   1.1  christos 			myport = mymax;
    399   1.1  christos 		*next_ephemeral = myport - 1;
    400   1.1  christos 		if (check_suitable_port(myport, inp_hdr, cred)) {
    401   1.1  christos 			*port = myport;
    402   1.1  christos 			DPRINTF("%s returning port %d\n", __func__, *port);
    403   1.1  christos 			return 0;
    404   1.1  christos 		}
    405   1.1  christos 		count--;
    406   1.1  christos 	} while (count > 0);
    407   1.1  christos 
    408   1.1  christos 	DPRINTF("%s returning EAGAIN\n", __func__);
    409   1.1  christos 	return EAGAIN;
    410   1.1  christos }
    411   1.1  christos 
    412   1.1  christos /*
    413   1.6     joerg  * The straightforward algorithm that increments the port number
    414   1.6     joerg  * by a random amount.
    415   1.1  christos  */
    416   1.1  christos static int
    417   1.1  christos algo_random_start(int algo, uint16_t *port, struct inpcb_hdr *inp_hdr,
    418   1.1  christos     kauth_cred_t cred)
    419   1.1  christos {
    420   1.1  christos 	uint16_t count, num_ephemeral;
    421   1.1  christos 	uint16_t mymin, mymax, lastport;
    422   1.1  christos 	uint16_t *next_ephemeral;
    423   1.1  christos 	int error;
    424   1.1  christos 
    425   1.1  christos 	DPRINTF("%s called\n", __func__);
    426   1.1  christos 
    427   1.1  christos 	error = pcb_getports(inp_hdr, &lastport, &mymin, &mymax,
    428   1.1  christos 	    &next_ephemeral, algo);
    429   1.1  christos 	if (error)
    430   1.1  christos 		return error;
    431   1.1  christos 
    432   1.1  christos 	num_ephemeral = mymax - mymin + 1;
    433   1.1  christos 
    434   1.1  christos 	DPRINTF("num_ephemeral: %u\n", num_ephemeral);
    435   1.1  christos 
    436   1.1  christos 	*next_ephemeral = mymin + (cprng_fast32() % num_ephemeral);
    437   1.1  christos 
    438   1.1  christos 	DPRINTF("next_ephemeral initially: %u\n", *next_ephemeral);
    439   1.1  christos 
    440   1.1  christos 	count = num_ephemeral;
    441   1.1  christos 
    442   1.1  christos 	do {
    443   1.1  christos 		if (check_suitable_port(*next_ephemeral, inp_hdr, cred)) {
    444   1.1  christos 			*port = *next_ephemeral;
    445   1.1  christos 			DPRINTF("%s returning port %d\n", __func__, *port);
    446   1.1  christos 			return 0;
    447   1.1  christos 		}
    448   1.1  christos 		if (*next_ephemeral == mymax) {
    449   1.1  christos 			*next_ephemeral = mymin;
    450   1.1  christos 		} else
    451   1.1  christos 			(*next_ephemeral)++;
    452   1.1  christos 
    453   1.1  christos 		count--;
    454   1.1  christos 
    455   1.1  christos 
    456   1.1  christos 		DPRINTF("next_ephemeral: %u count: %u\n", *next_ephemeral,
    457   1.1  christos 		    count);
    458   1.1  christos 
    459   1.1  christos 	} while (count > 0);
    460   1.1  christos 
    461   1.1  christos 	DPRINTF("%s returning EINVAL\n", __func__);
    462   1.1  christos 
    463   1.1  christos 	return EINVAL;
    464   1.1  christos }
    465   1.1  christos 
    466   1.1  christos /*
    467   1.1  christos  * Since there is no state kept on the ports tried, we might actually
    468   1.1  christos  * give up before exhausting the free ports.
    469   1.1  christos  */
    470   1.1  christos static int
    471   1.1  christos algo_random_pick(int algo, uint16_t *port, struct inpcb_hdr *inp_hdr,
    472   1.1  christos     kauth_cred_t cred)
    473   1.1  christos {
    474   1.1  christos 	uint16_t count, num_ephemeral;
    475   1.1  christos 	uint16_t mymin, mymax, lastport;
    476   1.1  christos 	uint16_t *next_ephemeral;
    477   1.1  christos 	int error;
    478   1.1  christos 
    479   1.1  christos 	DPRINTF("%s called\n", __func__);
    480   1.1  christos 
    481   1.1  christos 	error = pcb_getports(inp_hdr, &lastport, &mymin, &mymax,
    482   1.1  christos 	    &next_ephemeral, algo);
    483   1.1  christos 	if (error)
    484   1.1  christos 		return error;
    485   1.1  christos 
    486   1.1  christos 	num_ephemeral = mymax - mymin + 1;
    487   1.1  christos 
    488   1.1  christos 	DPRINTF("num_ephemeral: %u\n", num_ephemeral);
    489   1.1  christos 	*next_ephemeral = mymin + (cprng_fast32() % num_ephemeral);
    490   1.1  christos 
    491   1.1  christos 	DPRINTF("next_ephemeral initially: %u\n", *next_ephemeral);
    492   1.1  christos 
    493   1.1  christos 	count = num_ephemeral;
    494   1.1  christos 
    495   1.1  christos 	do {
    496   1.1  christos 		if (check_suitable_port(*next_ephemeral, inp_hdr, cred)) {
    497   1.1  christos 			*port = *next_ephemeral;
    498   1.1  christos 			DPRINTF("%s returning port %d\n", __func__, *port);
    499   1.1  christos 			return 0;
    500   1.1  christos 		}
    501   1.1  christos 		*next_ephemeral = mymin +
    502   1.1  christos 		    (cprng_fast32() % num_ephemeral);
    503   1.1  christos 
    504   1.1  christos 		count--;
    505   1.1  christos 
    506   1.1  christos 		DPRINTF("next_ephemeral: %u count: %u\n",
    507   1.1  christos 		    *next_ephemeral, count);
    508   1.1  christos 	} while (count > 0);
    509   1.1  christos 
    510   1.1  christos 	DPRINTF("%s returning EINVAL\n", __func__);
    511   1.1  christos 
    512   1.1  christos 	return EINVAL;
    513   1.1  christos }
    514   1.1  christos 
    515   1.1  christos /* This is the implementation from FreeBSD, with tweaks */
    516   1.1  christos static uint16_t
    517   1.1  christos Fhash(const struct inpcb_hdr *inp_hdr)
    518   1.1  christos {
    519   1.1  christos 	MD5_CTX f_ctx;
    520   1.1  christos 	uint32_t Ff[4];
    521   1.1  christos 	uint32_t secret_f[4];
    522   1.1  christos 	uint32_t offset;
    523   1.1  christos 	uint16_t soffset[2];
    524   1.1  christos 
    525   1.1  christos 	cprng_fast(secret_f, sizeof(secret_f));
    526   1.1  christos 
    527   1.1  christos 	MD5Init(&f_ctx);
    528   1.1  christos 	switch (inp_hdr->inph_af) {
    529   1.1  christos #ifdef INET
    530   1.1  christos 	case AF_INET: {
    531   1.1  christos 		const struct inpcb *inp =
    532   1.1  christos 		    (const struct inpcb *)(const void *)inp_hdr;
    533   1.1  christos 		MD5Update(&f_ctx, (const u_char *)&inp->inp_laddr,
    534   1.1  christos 		    sizeof(inp->inp_laddr));
    535   1.1  christos 		MD5Update(&f_ctx, (const u_char *)&inp->inp_faddr,
    536   1.1  christos 		    sizeof(inp->inp_faddr));
    537   1.1  christos 		MD5Update(&f_ctx, (const u_char *)&inp->inp_fport,
    538   1.1  christos 		    sizeof(inp->inp_fport));
    539   1.1  christos 		break;
    540   1.1  christos 	}
    541   1.1  christos #endif
    542   1.1  christos #ifdef INET6
    543   1.1  christos 	case AF_INET6: {
    544   1.1  christos 		const struct in6pcb *in6p =
    545   1.1  christos 		    (const struct in6pcb *)(const void *)inp_hdr;
    546   1.1  christos 		MD5Update(&f_ctx, (const u_char *)&in6p->in6p_laddr,
    547   1.1  christos 		    sizeof(in6p->in6p_laddr));
    548   1.1  christos 		MD5Update(&f_ctx, (const u_char *)&in6p->in6p_faddr,
    549   1.1  christos 		    sizeof(in6p->in6p_faddr));
    550   1.1  christos 		MD5Update(&f_ctx, (const u_char *)&in6p->in6p_fport,
    551   1.1  christos 		    sizeof(in6p->in6p_fport));
    552   1.1  christos 		break;
    553   1.1  christos 	}
    554   1.1  christos #endif
    555   1.1  christos 	default:
    556   1.1  christos 		break;
    557   1.1  christos 	}
    558   1.1  christos 	MD5Update(&f_ctx, (const u_char *)secret_f, sizeof(secret_f));
    559   1.1  christos 	MD5Final((u_char *)&Ff, &f_ctx);
    560   1.1  christos 
    561   1.1  christos 	offset = (Ff[0] ^ Ff[1]) ^ (Ff[2] ^ Ff[3]);
    562   1.1  christos 
    563   1.1  christos 	memcpy(&soffset, &offset, sizeof(soffset));
    564   1.1  christos 
    565   1.1  christos 	return soffset[0] ^ soffset[1];
    566   1.1  christos }
    567   1.1  christos 
    568   1.1  christos /*
    569   1.1  christos  * Checks whether the tuple is complete. If not, marks the pcb for
    570   1.1  christos  * late binding.
    571   1.1  christos  */
    572   1.1  christos static bool
    573   1.1  christos iscompletetuple(struct inpcb_hdr *inp_hdr)
    574   1.1  christos {
    575   1.1  christos #ifdef INET6
    576   1.1  christos 	struct in6pcb *in6p;
    577   1.1  christos #endif
    578   1.1  christos 
    579   1.1  christos 	switch (inp_hdr->inph_af) {
    580   1.1  christos #ifdef INET
    581   1.1  christos 	case AF_INET: {
    582   1.1  christos 		struct inpcb *inp = (struct inpcb *)(void *)inp_hdr;
    583   1.1  christos 		if (inp->inp_fport == 0 || in_nullhost(inp->inp_faddr)) {
    584   1.1  christos 			DPRINTF("%s fport or faddr missing, delaying port "
    585   1.1  christos 			    "to connect/send\n", __func__);
    586   1.1  christos 			inp->inp_bindportonsend = true;
    587   1.1  christos 			return false;
    588   1.1  christos 		} else {
    589   1.1  christos 			inp->inp_bindportonsend = false;
    590   1.1  christos 		}
    591   1.1  christos 		break;
    592   1.1  christos 	}
    593   1.1  christos #endif
    594   1.1  christos #ifdef INET6
    595   1.1  christos 	case AF_INET6: {
    596   1.1  christos 		in6p = (struct in6pcb *)(void *)inp_hdr;
    597   1.1  christos 		if (in6p->in6p_fport == 0 || memcmp(&in6p->in6p_faddr,
    598   1.1  christos 		    &in6addr_any, sizeof(in6p->in6p_faddr)) == 0) {
    599   1.1  christos 			DPRINTF("%s fport or faddr missing, delaying port "
    600   1.1  christos 			    "to connect/send\n", __func__);
    601   1.1  christos 			in6p->in6p_bindportonsend = true;
    602   1.1  christos 			return false;
    603   1.1  christos 		} else {
    604   1.1  christos 			in6p->in6p_bindportonsend = false;
    605   1.1  christos 		}
    606   1.1  christos 		break;
    607   1.1  christos 	}
    608   1.1  christos #endif
    609   1.1  christos 	default:
    610   1.1  christos 		DPRINTF("%s incorrect address family\n", __func__);
    611   1.1  christos 		return false;
    612   1.1  christos 	}
    613   1.1  christos 
    614   1.1  christos 	return true;
    615   1.1  christos }
    616   1.1  christos 
    617   1.1  christos static int
    618   1.1  christos algo_hash(int algo, uint16_t *port, struct inpcb_hdr *inp_hdr,
    619   1.1  christos     kauth_cred_t cred)
    620   1.1  christos {
    621   1.1  christos 	uint16_t count, num_ephemeral;
    622   1.1  christos 	uint16_t mymin, mymax, lastport;
    623   1.1  christos 	uint16_t *next_ephemeral;
    624   1.1  christos 	uint16_t offset, myport;
    625   1.1  christos 	int error;
    626   1.1  christos 
    627   1.1  christos 	DPRINTF("%s called\n", __func__);
    628   1.1  christos 
    629   1.1  christos 	error = pcb_getports(inp_hdr, &lastport, &mymin, &mymax,
    630   1.1  christos 	    &next_ephemeral, algo);
    631   1.1  christos 	if (error)
    632   1.1  christos 		return error;
    633   1.1  christos 
    634   1.1  christos 	if (!iscompletetuple(inp_hdr)) {
    635   1.1  christos 		*port = 0;
    636   1.1  christos 		return 0;
    637   1.1  christos 	}
    638   1.1  christos 
    639   1.1  christos 	/* Ephemeral port selection function */
    640   1.1  christos 	num_ephemeral = mymax - mymin + 1;
    641   1.1  christos 
    642   1.1  christos 	DPRINTF("num_ephemeral: %d\n", num_ephemeral);
    643   1.1  christos 
    644   1.1  christos 	offset = Fhash(inp_hdr);
    645   1.1  christos 
    646   1.1  christos 	count = num_ephemeral;
    647   1.1  christos 	do {
    648   1.1  christos 		myport = mymin + (*next_ephemeral + offset)
    649   1.1  christos 		    % num_ephemeral;
    650   1.1  christos 
    651   1.1  christos 		(*next_ephemeral)++;
    652   1.1  christos 
    653   1.1  christos 		if (check_suitable_port(myport, inp_hdr, cred)) {
    654   1.1  christos 			*port = myport;
    655   1.1  christos 			DPRINTF("%s returning port %d\n", __func__, *port);
    656   1.1  christos 			return 0;
    657   1.1  christos 		}
    658   1.1  christos 		count--;
    659   1.1  christos 	} while (count > 0);
    660   1.1  christos 
    661   1.1  christos 	DPRINTF("%s returning EINVAL\n", __func__);
    662   1.1  christos 
    663   1.1  christos 	return EINVAL;
    664   1.1  christos }
    665   1.1  christos 
    666   1.1  christos static int
    667   1.1  christos algo_doublehash(int algo, uint16_t *port, struct inpcb_hdr *inp_hdr,
    668   1.1  christos     kauth_cred_t cred)
    669   1.1  christos {
    670   1.1  christos 	uint16_t count, num_ephemeral;
    671   1.1  christos 	uint16_t mymin, mymax, lastport;
    672   1.1  christos 	uint16_t *next_ephemeral;
    673   1.1  christos 	uint16_t offset, myport;
    674   1.1  christos 	static uint16_t dhtable[8];
    675   1.1  christos 	size_t idx;
    676   1.1  christos 	int error;
    677   1.1  christos 
    678   1.1  christos 	DPRINTF("%s called\n", __func__);
    679   1.1  christos 
    680   1.1  christos 	error = pcb_getports(inp_hdr, &lastport, &mymin, &mymax,
    681   1.1  christos 	    &next_ephemeral, algo);
    682   1.1  christos 	if (error)
    683   1.1  christos 		return error;
    684   1.1  christos 
    685   1.1  christos 	if (!iscompletetuple(inp_hdr)) {
    686   1.1  christos 		*port = 0;
    687   1.1  christos 		return 0;
    688   1.1  christos 	}
    689   1.1  christos 	/* first time initialization */
    690   1.1  christos 	if (dhtable[0] == 0)
    691   1.1  christos 		for (size_t i = 0; i < __arraycount(dhtable); i++)
    692   1.6     joerg 			dhtable[i] = cprng_fast32() & 0xffff;
    693   1.1  christos 
    694   1.1  christos 	/* Ephemeral port selection function */
    695   1.1  christos 	num_ephemeral = mymax - mymin + 1;
    696   1.1  christos 	offset = Fhash(inp_hdr);
    697   1.1  christos 	idx = Fhash(inp_hdr) % __arraycount(dhtable);	/* G */
    698   1.1  christos 	count = num_ephemeral;
    699   1.1  christos 
    700   1.1  christos 	do {
    701   1.1  christos 		myport = mymin + (offset + dhtable[idx])
    702   1.1  christos 		    % num_ephemeral;
    703   1.1  christos 		dhtable[idx]++;
    704   1.1  christos 
    705   1.1  christos 		if (check_suitable_port(myport, inp_hdr, cred)) {
    706   1.1  christos 			*port = myport;
    707   1.1  christos 			DPRINTF("%s returning port %d\n", __func__, *port);
    708   1.1  christos 			return 0;
    709   1.1  christos 		}
    710   1.1  christos 		count--;
    711   1.1  christos 
    712   1.1  christos 	} while (count > 0);
    713   1.1  christos 
    714   1.1  christos 	DPRINTF("%s returning EINVAL\n", __func__);
    715   1.1  christos 
    716   1.1  christos 	return EINVAL;
    717   1.1  christos }
    718   1.1  christos 
    719   1.1  christos static int
    720   1.1  christos algo_randinc(int algo, uint16_t *port, struct inpcb_hdr *inp_hdr,
    721   1.1  christos     kauth_cred_t cred)
    722   1.1  christos {
    723   1.1  christos 	static const uint16_t N = 500;	/* Determines the trade-off */
    724   1.1  christos 	uint16_t count, num_ephemeral;
    725   1.1  christos 	uint16_t mymin, mymax, lastport;
    726   1.1  christos 	uint16_t *next_ephemeral;
    727   1.1  christos 	uint16_t myport;
    728   1.1  christos 	int error;
    729   1.1  christos 
    730   1.1  christos 	DPRINTF("%s called\n", __func__);
    731   1.1  christos 
    732   1.1  christos 	error = pcb_getports(inp_hdr, &lastport, &mymin, &mymax,
    733   1.1  christos 	    &next_ephemeral, algo);
    734   1.1  christos 	if (error)
    735   1.1  christos 		return error;
    736   1.1  christos 
    737   1.1  christos 	if (*next_ephemeral == 0)
    738   1.1  christos 		*next_ephemeral = cprng_fast32() & 0xffff;
    739   1.1  christos 
    740   1.1  christos 	/* Ephemeral port selection function */
    741   1.1  christos 	num_ephemeral = mymax - mymin + 1;
    742   1.1  christos 
    743   1.1  christos 	count = num_ephemeral;
    744   1.1  christos 	do {
    745   1.1  christos 		*next_ephemeral = *next_ephemeral +
    746   1.1  christos 		    (cprng_fast32() % N) + 1;
    747   1.1  christos 		myport = mymin +
    748   1.1  christos 		    (*next_ephemeral % num_ephemeral);
    749   1.1  christos 
    750   1.1  christos 		if (check_suitable_port(myport, inp_hdr, cred)) {
    751   1.1  christos 			*port = myport;
    752   1.1  christos 			DPRINTF("%s returning port %d\n", __func__, *port);
    753   1.1  christos 			return 0;
    754   1.1  christos 		}
    755   1.1  christos 		count--;
    756   1.1  christos 	} while (count > 0);
    757   1.1  christos 
    758   1.1  christos 	return EINVAL;
    759   1.1  christos }
    760   1.1  christos 
    761   1.1  christos /* The generic function called in order to pick a port. */
    762   1.1  christos int
    763   1.1  christos portalgo_randport(uint16_t *port, struct inpcb_hdr *inp_hdr, kauth_cred_t cred)
    764   1.1  christos {
    765   1.1  christos 	int algo, error;
    766   1.1  christos 	uint16_t lport;
    767   1.1  christos 	int default_algo;
    768   1.1  christos 
    769   1.1  christos 	DPRINTF("%s called\n", __func__);
    770   1.1  christos 
    771   1.1  christos 	if (inp_hdr->inph_portalgo == PORTALGO_DEFAULT) {
    772   1.1  christos 		switch (inp_hdr->inph_af) {
    773   1.1  christos #ifdef INET
    774   1.1  christos 		case AF_INET:
    775   1.1  christos 			default_algo = inet4_portalgo;
    776   1.1  christos 			break;
    777   1.1  christos #endif
    778   1.1  christos #ifdef INET6
    779   1.1  christos 		case AF_INET6:
    780   1.1  christos 			default_algo = inet6_portalgo;
    781   1.1  christos 			break;
    782   1.1  christos #endif
    783   1.1  christos 		default:
    784   1.1  christos 			return EINVAL;
    785   1.1  christos 		}
    786   1.1  christos 
    787   1.1  christos 		if (default_algo == PORTALGO_DEFAULT)
    788   1.1  christos 			algo = PORTALGO_BSD;
    789   1.1  christos 		else
    790   1.1  christos 			algo = default_algo;
    791   1.1  christos 	}
    792   1.1  christos 	else /* socket specifies the algorithm */
    793   1.1  christos 		algo = inp_hdr->inph_portalgo;
    794   1.1  christos 
    795   1.1  christos 	KASSERT(algo >= 0);
    796   1.1  christos 	KASSERT(algo < NALGOS);
    797   1.1  christos 
    798   1.1  christos 	switch (inp_hdr->inph_af) {
    799   1.1  christos #ifdef INET
    800   1.1  christos 	case AF_INET: {
    801   1.7  christos 		char buf[INET_ADDRSTRLEN];
    802   1.1  christos 		struct inpcb *inp = (struct inpcb *)(void *)inp_hdr;
    803   1.7  christos 		DPRINTF("local addr: %s\n", IN_PRINT(buf, &inp->inp_laddr));
    804   1.1  christos 		DPRINTF("local port: %d\n", inp->inp_lport);
    805   1.7  christos 		DPRINTF("foreign addr: %s\n", IN_PRINT(buf, &inp->inp_faddr));
    806   1.1  christos 		DPRINTF("foreign port: %d\n", inp->inp_fport);
    807   1.1  christos 		break;
    808   1.1  christos 	}
    809   1.1  christos #endif
    810   1.1  christos #ifdef INET6
    811   1.1  christos 	case AF_INET6: {
    812   1.7  christos 		char buf[INET6_ADDRSTRLEN];
    813   1.1  christos 		struct in6pcb *in6p = (struct in6pcb *)(void *)inp_hdr;
    814   1.1  christos 
    815   1.7  christos 		DPRINTF("local addr: %s\n", IN6_PRINT(buf, &in6p->in6p_laddr));
    816   1.1  christos 		DPRINTF("local port: %d\n", in6p->in6p_lport);
    817   1.7  christos 		DPRINTF("foreign addr: %s\n", IN6_PRINT(buf,
    818   1.7  christos 		    &in6p->in6p_laddr));
    819   1.1  christos 		DPRINTF("foreign port: %d\n", in6p->in6p_fport);
    820   1.1  christos 		break;
    821   1.1  christos 	}
    822   1.1  christos #endif
    823   1.1  christos 	default:
    824   1.1  christos 		break;
    825   1.1  christos 	}
    826   1.1  christos 
    827   1.1  christos 	DPRINTF("%s portalgo = %d\n", __func__, algo);
    828   1.1  christos 
    829   1.1  christos 	error = (*algos[algo].func)(algo, &lport, inp_hdr, cred);
    830   1.1  christos 	if (error == 0) {
    831   1.1  christos 		*port = lport;
    832   1.1  christos 	} else if (error != EAGAIN) {
    833   1.1  christos 		uint16_t lastport, mymin, mymax, *pnext_ephemeral;
    834   1.1  christos 
    835   1.1  christos 		error = pcb_getports(inp_hdr, &lastport, &mymin,
    836   1.1  christos 		    &mymax, &pnext_ephemeral, algo);
    837   1.1  christos 		if (error)
    838   1.1  christos 			return error;
    839   1.1  christos 		*port = lastport - 1;
    840   1.1  christos 	}
    841   1.1  christos 	return error;
    842   1.1  christos }
    843   1.1  christos 
    844   1.1  christos /* Sets the algorithm to be used globally */
    845   1.1  christos static int
    846   1.1  christos portalgo_algo_name_select(const char *name, int *algo)
    847   1.1  christos {
    848   1.1  christos 	size_t ai;
    849   1.1  christos 
    850   1.1  christos 	DPRINTF("%s called\n", __func__);
    851   1.1  christos 
    852   1.1  christos 	for (ai = 0; ai < NALGOS; ai++)
    853   1.1  christos 		if (strcmp(algos[ai].name, name) == 0) {
    854   1.1  christos 			DPRINTF("%s: found idx %zu\n", __func__, ai);
    855   1.1  christos 			*algo = ai;
    856   1.1  christos 			return 0;
    857   1.1  christos 		}
    858   1.1  christos 	return EINVAL;
    859   1.1  christos }
    860   1.1  christos 
    861   1.1  christos /* Sets the algorithm to be used by the pcb inp. */
    862   1.1  christos int
    863   1.1  christos portalgo_algo_index_select(struct inpcb_hdr *inp, int algo)
    864   1.1  christos {
    865   1.1  christos 
    866   1.1  christos 	DPRINTF("%s called with algo %d for pcb %p\n", __func__, algo, inp );
    867   1.1  christos 
    868   1.1  christos 	if ((algo < 0 || algo >= NALGOS) &&
    869   1.1  christos 	    (algo != PORTALGO_DEFAULT))
    870   1.1  christos 		return EINVAL;
    871   1.1  christos 
    872   1.1  christos 	inp->inph_portalgo = algo;
    873   1.1  christos 	return 0;
    874   1.1  christos }
    875   1.1  christos 
    876   1.1  christos /*
    877   1.1  christos  * The sysctl hook that is supposed to check that we are picking one
    878   1.2  christos  * of the valid algorithms.
    879   1.1  christos  */
    880   1.1  christos static int
    881   1.2  christos sysctl_portalgo_selected(SYSCTLFN_ARGS, int *algo)
    882   1.1  christos {
    883   1.1  christos 	struct sysctlnode node;
    884   1.1  christos 	int error;
    885   1.1  christos 	char newalgo[PORTALGO_MAXLEN];
    886   1.1  christos 
    887   1.1  christos 	DPRINTF("%s called\n", __func__);
    888   1.1  christos 
    889   1.1  christos 	strlcpy(newalgo, algos[*algo].name, sizeof(newalgo));
    890   1.1  christos 
    891   1.1  christos 	node = *rnode;
    892   1.1  christos 	node.sysctl_data = newalgo;
    893   1.1  christos 	node.sysctl_size = sizeof(newalgo);
    894   1.1  christos 
    895   1.1  christos 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
    896   1.1  christos 
    897   1.1  christos 	DPRINTF("newalgo: %s\n", newalgo);
    898   1.1  christos 
    899   1.1  christos 	if (error || newp == NULL ||
    900   1.1  christos 	    strncmp(newalgo, algos[*algo].name, sizeof(newalgo)) == 0)
    901   1.1  christos 		return error;
    902   1.1  christos 
    903   1.1  christos #ifdef KAUTH_NETWORK_SOCKET_PORT_RANDOMIZE
    904   1.1  christos 	if (l != NULL && (error = kauth_authorize_system(l->l_cred,
    905   1.1  christos 	    KAUTH_NETWORK_SOCKET, KAUTH_NETWORK_SOCKET_PORT_RANDOMIZE, newname,
    906   1.1  christos 	    NULL, NULL)) != 0)
    907   1.1  christos 		return error;
    908   1.1  christos #endif
    909   1.1  christos 
    910   1.1  christos 	mutex_enter(softnet_lock);
    911   1.1  christos 	error = portalgo_algo_name_select(newalgo, algo);
    912   1.1  christos 	mutex_exit(softnet_lock);
    913   1.1  christos 	return error;
    914   1.1  christos }
    915   1.1  christos 
    916   1.2  christos static int
    917   1.4  christos sysctl_portalgo_reserve(SYSCTLFN_ARGS, bitmap *bt)
    918   1.2  christos {
    919   1.2  christos 	struct sysctlnode node;
    920   1.2  christos 	int error;
    921   1.2  christos 
    922   1.2  christos 	DPRINTF("%s called\n", __func__);
    923   1.2  christos 
    924   1.2  christos 	node = *rnode;
    925   1.2  christos 	node.sysctl_data = bt;
    926   1.2  christos 	node.sysctl_size = sizeof(*bt);
    927   1.2  christos 
    928   1.2  christos 	error = sysctl_lookup(SYSCTLFN_CALL(&node));
    929   1.2  christos 
    930   1.2  christos 	if (error || newp == NULL)
    931   1.2  christos 		return error;
    932   1.2  christos 
    933   1.2  christos #ifdef KAUTH_NETWORK_SOCKET_PORT_RESERVE
    934   1.2  christos 	if (l != NULL && (error = kauth_authorize_system(l->l_cred,
    935   1.2  christos 	    KAUTH_NETWORK_SOCKET, KAUTH_NETWORK_SOCKET_PORT_RESERVE, bt,
    936   1.2  christos 	    NULL, NULL)) != 0)
    937   1.2  christos 		return error;
    938   1.2  christos #endif
    939   1.2  christos 	return error;
    940   1.2  christos }
    941   1.2  christos 
    942   1.2  christos #ifdef INET
    943   1.1  christos /*
    944   1.1  christos  * The sysctl hook that is supposed to check that we are picking one
    945   1.1  christos  * of the valid algorithms.
    946   1.1  christos  */
    947   1.1  christos int
    948   1.2  christos sysctl_portalgo_selected4(SYSCTLFN_ARGS)
    949   1.2  christos {
    950   1.2  christos 
    951   1.2  christos 	return sysctl_portalgo_selected(SYSCTLFN_CALL(rnode), &inet4_portalgo);
    952   1.2  christos }
    953   1.2  christos 
    954   1.2  christos int
    955   1.2  christos sysctl_portalgo_reserve4(SYSCTLFN_ARGS)
    956   1.1  christos {
    957   1.1  christos 
    958   1.4  christos 	return sysctl_portalgo_reserve(SYSCTLFN_CALL(rnode), &inet4_reserve);
    959   1.1  christos }
    960   1.2  christos #endif
    961   1.1  christos 
    962   1.1  christos #ifdef INET6
    963   1.1  christos int
    964   1.1  christos sysctl_portalgo_selected6(SYSCTLFN_ARGS)
    965   1.1  christos {
    966   1.1  christos 
    967   1.2  christos 	return sysctl_portalgo_selected(SYSCTLFN_CALL(rnode), &inet6_portalgo);
    968   1.2  christos }
    969   1.2  christos 
    970   1.2  christos int
    971   1.2  christos sysctl_portalgo_reserve6(SYSCTLFN_ARGS)
    972   1.2  christos {
    973   1.4  christos 	return sysctl_portalgo_reserve(SYSCTLFN_CALL(rnode), &inet6_reserve);
    974   1.1  christos }
    975   1.1  christos #endif
    976   1.1  christos 
    977   1.1  christos /*
    978   1.1  christos  * The sysctl hook that returns the available
    979   1.1  christos  * algorithms.
    980   1.1  christos  */
    981   1.1  christos int
    982   1.1  christos sysctl_portalgo_available(SYSCTLFN_ARGS)
    983   1.1  christos {
    984   1.1  christos 	size_t ai, len = 0;
    985   1.1  christos 	struct sysctlnode node;
    986   1.1  christos 	char availalgo[NALGOS * PORTALGO_MAXLEN];
    987   1.1  christos 
    988   1.1  christos 	DPRINTF("%s called\n", __func__);
    989   1.1  christos 
    990   1.1  christos 	availalgo[0] = '\0';
    991   1.1  christos 
    992   1.1  christos 	for (ai = 0; ai < NALGOS; ai++) {
    993   1.1  christos 		len = strlcat(availalgo, algos[ai].name, sizeof(availalgo));
    994   1.1  christos 		if (ai < NALGOS - 1)
    995   1.1  christos 			strlcat(availalgo, " ", sizeof(availalgo));
    996   1.1  christos 	}
    997   1.1  christos 
    998   1.1  christos 	DPRINTF("available algos: %s\n", availalgo);
    999   1.1  christos 
   1000   1.1  christos 	node = *rnode;
   1001   1.1  christos 	node.sysctl_data = availalgo;
   1002   1.1  christos 	node.sysctl_size = len;
   1003   1.1  christos 
   1004   1.1  christos 	return sysctl_lookup(SYSCTLFN_CALL(&node));
   1005   1.1  christos }
   1006