Home | History | Annotate | Line # | Download | only in netinet
sctp_input.c revision 1.8
      1  1.1    rjs /*	$KAME: sctp_input.c,v 1.28 2005/04/21 18:36:21 nishida Exp $	*/
      2  1.8   maxv /*	$NetBSD: sctp_input.c,v 1.8 2018/02/26 09:04:29 maxv Exp $	*/
      3  1.1    rjs 
      4  1.1    rjs /*
      5  1.1    rjs  * Copyright (C) 2002, 2003, 2004 Cisco Systems Inc,
      6  1.1    rjs  * All rights reserved.
      7  1.1    rjs  *
      8  1.1    rjs  * Redistribution and use in source and binary forms, with or without
      9  1.1    rjs  * modification, are permitted provided that the following conditions
     10  1.1    rjs  * are met:
     11  1.1    rjs  * 1. Redistributions of source code must retain the above copyright
     12  1.1    rjs  *    notice, this list of conditions and the following disclaimer.
     13  1.1    rjs  * 2. Redistributions in binary form must reproduce the above copyright
     14  1.1    rjs  *    notice, this list of conditions and the following disclaimer in the
     15  1.1    rjs  *    documentation and/or other materials provided with the distribution.
     16  1.1    rjs  * 3. Neither the name of the project nor the names of its contributors
     17  1.1    rjs  *    may be used to endorse or promote products derived from this software
     18  1.1    rjs  *    without specific prior written permission.
     19  1.1    rjs  *
     20  1.1    rjs  * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
     21  1.1    rjs  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     22  1.1    rjs  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     23  1.1    rjs  * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
     24  1.1    rjs  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     25  1.1    rjs  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     26  1.1    rjs  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     27  1.1    rjs  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     28  1.1    rjs  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     29  1.1    rjs  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     30  1.1    rjs  * SUCH DAMAGE.
     31  1.1    rjs  */
     32  1.1    rjs 
     33  1.1    rjs #include <sys/cdefs.h>
     34  1.8   maxv __KERNEL_RCSID(0, "$NetBSD: sctp_input.c,v 1.8 2018/02/26 09:04:29 maxv Exp $");
     35  1.1    rjs 
     36  1.1    rjs #ifdef _KERNEL_OPT
     37  1.1    rjs #include "opt_ipsec.h"
     38  1.1    rjs #include "opt_inet.h"
     39  1.1    rjs #include "opt_sctp.h"
     40  1.1    rjs #endif /* _KERNEL_OPT */
     41  1.1    rjs 
     42  1.1    rjs #include <sys/param.h>
     43  1.1    rjs #include <sys/systm.h>
     44  1.1    rjs #include <sys/malloc.h>
     45  1.1    rjs #include <sys/mbuf.h>
     46  1.1    rjs #include <sys/socket.h>
     47  1.1    rjs #include <sys/socketvar.h>
     48  1.1    rjs #include <sys/sysctl.h>
     49  1.1    rjs #include <sys/domain.h>
     50  1.1    rjs #include <sys/protosw.h>
     51  1.1    rjs #include <sys/kernel.h>
     52  1.1    rjs #include <sys/errno.h>
     53  1.1    rjs #include <sys/syslog.h>
     54  1.1    rjs 
     55  1.1    rjs #include <machine/limits.h>
     56  1.1    rjs #include <machine/cpu.h>
     57  1.1    rjs 
     58  1.1    rjs #include <net/if.h>
     59  1.1    rjs #include <net/route.h>
     60  1.1    rjs #include <net/if_types.h>
     61  1.1    rjs 
     62  1.1    rjs #include <netinet/in.h>
     63  1.1    rjs #include <netinet/in_systm.h>
     64  1.1    rjs #include <netinet/ip.h>
     65  1.1    rjs #include <netinet/in_pcb.h>
     66  1.1    rjs #include <netinet/in_var.h>
     67  1.1    rjs #include <netinet/ip_var.h>
     68  1.1    rjs 
     69  1.1    rjs #ifdef INET6
     70  1.1    rjs #include <netinet/ip6.h>
     71  1.1    rjs #include <netinet6/ip6_var.h>
     72  1.1    rjs #endif /* INET6 */
     73  1.1    rjs 
     74  1.1    rjs #include <netinet/ip_icmp.h>
     75  1.1    rjs #include <netinet/icmp_var.h>
     76  1.1    rjs #include <netinet/sctp_var.h>
     77  1.1    rjs #include <netinet/sctp_pcb.h>
     78  1.1    rjs #include <netinet/sctp_header.h>
     79  1.1    rjs #include <netinet/sctputil.h>
     80  1.1    rjs #include <netinet/sctp_output.h>
     81  1.1    rjs #include <netinet/sctp_input.h>
     82  1.1    rjs #include <netinet/sctp_hashdriver.h>
     83  1.1    rjs #include <netinet/sctp_indata.h>
     84  1.1    rjs #include <netinet/sctp_asconf.h>
     85  1.1    rjs 
     86  1.1    rjs #ifdef IPSEC
     87  1.2    rjs #include <netipsec/ipsec.h>
     88  1.2    rjs #include <netipsec/key.h>
     89  1.1    rjs #endif /*IPSEC*/
     90  1.1    rjs 
     91  1.1    rjs #include <net/net_osdep.h>
     92  1.1    rjs 
     93  1.1    rjs #ifdef SCTP_DEBUG
     94  1.1    rjs extern u_int32_t sctp_debug_on;
     95  1.1    rjs #endif
     96  1.1    rjs 
     97  1.1    rjs /* INIT handler */
     98  1.1    rjs static void
     99  1.1    rjs sctp_handle_init(struct mbuf *m, int iphlen, int offset,
    100  1.1    rjs     struct sctphdr *sh, struct sctp_init_chunk *cp, struct sctp_inpcb *inp,
    101  1.1    rjs     struct sctp_tcb *stcb, struct sctp_nets *net)
    102  1.1    rjs {
    103  1.1    rjs 	struct sctp_init *init;
    104  1.1    rjs 	struct mbuf *op_err;
    105  1.1    rjs #ifdef SCTP_DEBUG
    106  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    107  1.1    rjs 		printf("sctp_handle_init: handling INIT tcb:%p\n", stcb);
    108  1.1    rjs 	}
    109  1.1    rjs #endif
    110  1.1    rjs 	op_err = NULL;
    111  1.1    rjs 	init = &cp->init;
    112  1.1    rjs 	/* First are we accepting? */
    113  1.1    rjs 	if (((inp->sctp_flags & SCTP_PCB_FLAGS_ACCEPTING) == 0) ||
    114  1.1    rjs 	    (inp->sctp_socket->so_qlimit == 0)) {
    115  1.1    rjs 		sctp_abort_association(inp, stcb, m, iphlen, sh, op_err);
    116  1.1    rjs 		return;
    117  1.1    rjs 	}
    118  1.1    rjs 	if (ntohs(cp->ch.chunk_length) < sizeof(struct sctp_init_chunk)) {
    119  1.1    rjs 		/* Invalid length */
    120  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_INVALID_PARAM);
    121  1.1    rjs 		sctp_abort_association(inp, stcb, m, iphlen, sh, op_err);
    122  1.1    rjs 		return;
    123  1.1    rjs 	}
    124  1.1    rjs 	/* validate parameters */
    125  1.1    rjs 	if (init->initiate_tag == 0) {
    126  1.1    rjs 		/* protocol error... send abort */
    127  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_INVALID_PARAM);
    128  1.1    rjs 		sctp_abort_association(inp, stcb, m, iphlen, sh, op_err);
    129  1.1    rjs 		return;
    130  1.1    rjs 	}
    131  1.1    rjs 	if (ntohl(init->a_rwnd) < SCTP_MIN_RWND) {
    132  1.1    rjs 		/* invalid parameter... send abort */
    133  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_INVALID_PARAM);
    134  1.1    rjs 		sctp_abort_association(inp, stcb, m, iphlen, sh, op_err);
    135  1.1    rjs 		return;
    136  1.1    rjs 	}
    137  1.1    rjs 	if (init->num_inbound_streams == 0) {
    138  1.1    rjs 		/* protocol error... send abort */
    139  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_INVALID_PARAM);
    140  1.1    rjs 		sctp_abort_association(inp, stcb, m, iphlen, sh, op_err);
    141  1.1    rjs 		return;
    142  1.1    rjs 	}
    143  1.1    rjs 	if (init->num_outbound_streams == 0) {
    144  1.1    rjs 		/* protocol error... send abort */
    145  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_INVALID_PARAM);
    146  1.1    rjs 		sctp_abort_association(inp, stcb, m, iphlen, sh, op_err);
    147  1.1    rjs 		return;
    148  1.1    rjs 	}
    149  1.1    rjs 
    150  1.1    rjs 	/* send an INIT-ACK w/cookie */
    151  1.1    rjs #ifdef SCTP_DEBUG
    152  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
    153  1.1    rjs 		printf("sctp_handle_init: sending INIT-ACK\n");
    154  1.1    rjs 	}
    155  1.1    rjs #endif
    156  1.1    rjs 
    157  1.1    rjs 	sctp_send_initiate_ack(inp, stcb, m, iphlen, offset, sh, cp);
    158  1.1    rjs }
    159  1.1    rjs 
    160  1.1    rjs /*
    161  1.1    rjs  * process peer "INIT/INIT-ACK" chunk
    162  1.1    rjs  * returns value < 0 on error
    163  1.1    rjs  */
    164  1.1    rjs 
    165  1.1    rjs static int
    166  1.1    rjs sctp_process_init(struct sctp_init_chunk *cp, struct sctp_tcb *stcb,
    167  1.1    rjs     struct sctp_nets *net)
    168  1.1    rjs {
    169  1.1    rjs 	struct sctp_init *init;
    170  1.1    rjs 	struct sctp_association *asoc;
    171  1.1    rjs 	struct sctp_nets *lnet;
    172  1.1    rjs 	unsigned int i;
    173  1.1    rjs 
    174  1.1    rjs 	init = &cp->init;
    175  1.1    rjs 	asoc = &stcb->asoc;
    176  1.1    rjs 	/* save off parameters */
    177  1.1    rjs 	asoc->peer_vtag = ntohl(init->initiate_tag);
    178  1.1    rjs 	asoc->peers_rwnd = ntohl(init->a_rwnd);
    179  1.1    rjs 
    180  1.1    rjs 	if (TAILQ_FIRST(&asoc->nets)) {
    181  1.1    rjs 		/* update any ssthresh's that may have a default */
    182  1.1    rjs 		TAILQ_FOREACH(lnet, &asoc->nets, sctp_next) {
    183  1.1    rjs 			lnet->ssthresh = asoc->peers_rwnd;
    184  1.1    rjs 		}
    185  1.1    rjs 	}
    186  1.1    rjs 	if (asoc->pre_open_streams > ntohs(init->num_inbound_streams)) {
    187  1.1    rjs 		unsigned int newcnt;
    188  1.1    rjs 		struct sctp_stream_out *outs;
    189  1.1    rjs 		struct sctp_tmit_chunk *chk;
    190  1.1    rjs 
    191  1.1    rjs 		/* cut back on number of streams */
    192  1.1    rjs 		newcnt = ntohs(init->num_inbound_streams);
    193  1.1    rjs 		/* This if is probably not needed but I am cautious */
    194  1.1    rjs 		if (asoc->strmout) {
    195  1.1    rjs 			/* First make sure no data chunks are trapped */
    196  1.1    rjs 			for (i=newcnt; i < asoc->pre_open_streams; i++) {
    197  1.1    rjs 				outs = &asoc->strmout[i];
    198  1.1    rjs 				chk = TAILQ_FIRST(&outs->outqueue);
    199  1.1    rjs 				while (chk) {
    200  1.1    rjs 					TAILQ_REMOVE(&outs->outqueue, chk,
    201  1.1    rjs 						     sctp_next);
    202  1.1    rjs 					asoc->stream_queue_cnt--;
    203  1.1    rjs 					sctp_ulp_notify(SCTP_NOTIFY_DG_FAIL,
    204  1.1    rjs 					    stcb, SCTP_NOTIFY_DATAGRAM_UNSENT,
    205  1.1    rjs 					    chk);
    206  1.1    rjs 					if (chk->data) {
    207  1.1    rjs 						sctp_m_freem(chk->data);
    208  1.1    rjs 						chk->data = NULL;
    209  1.1    rjs 					}
    210  1.1    rjs 					sctp_free_remote_addr(chk->whoTo);
    211  1.1    rjs 					chk->whoTo = NULL;
    212  1.1    rjs 					chk->asoc = NULL;
    213  1.1    rjs 					/* Free the chunk */
    214  1.1    rjs 					SCTP_ZONE_FREE(sctppcbinfo.ipi_zone_chunk, chk);
    215  1.1    rjs 					sctppcbinfo.ipi_count_chunk--;
    216  1.1    rjs 					if ((int)sctppcbinfo.ipi_count_chunk < 0) {
    217  1.1    rjs 						panic("Chunk count is negative");
    218  1.1    rjs 					}
    219  1.1    rjs 					sctppcbinfo.ipi_gencnt_chunk++;
    220  1.1    rjs 					chk = TAILQ_FIRST(&outs->outqueue);
    221  1.1    rjs 				}
    222  1.1    rjs 			}
    223  1.1    rjs 		}
    224  1.1    rjs 		/* cut back the count and abandon the upper streams */
    225  1.1    rjs 		asoc->pre_open_streams = newcnt;
    226  1.1    rjs 	}
    227  1.1    rjs 	asoc->streamincnt = ntohs(init->num_outbound_streams);
    228  1.1    rjs 	if (asoc->streamincnt > MAX_SCTP_STREAMS) {
    229  1.1    rjs 		asoc->streamincnt = MAX_SCTP_STREAMS;
    230  1.1    rjs 	}
    231  1.1    rjs 
    232  1.1    rjs 	asoc->streamoutcnt = asoc->pre_open_streams;
    233  1.1    rjs 	/* init tsn's */
    234  1.1    rjs 	asoc->highest_tsn_inside_map = asoc->asconf_seq_in = ntohl(init->initial_tsn) - 1;
    235  1.1    rjs #ifdef SCTP_MAP_LOGGING
    236  1.1    rjs 	sctp_log_map(0, 5, asoc->highest_tsn_inside_map, SCTP_MAP_SLIDE_RESULT);
    237  1.1    rjs #endif
    238  1.1    rjs 	/* This is the next one we expect */
    239  1.1    rjs 	asoc->str_reset_seq_in = asoc->asconf_seq_in + 1;
    240  1.1    rjs 
    241  1.1    rjs 	asoc->mapping_array_base_tsn = ntohl(init->initial_tsn);
    242  1.1    rjs 	asoc->cumulative_tsn = asoc->asconf_seq_in;
    243  1.1    rjs 	asoc->last_echo_tsn = asoc->asconf_seq_in;
    244  1.1    rjs 	asoc->advanced_peer_ack_point = asoc->last_acked_seq;
    245  1.1    rjs 	/* open the requested streams */
    246  1.1    rjs 	if (asoc->strmin != NULL) {
    247  1.1    rjs 		/* Free the old ones */
    248  1.1    rjs 		free(asoc->strmin, M_PCB);
    249  1.1    rjs 	}
    250  1.1    rjs 	asoc->strmin = malloc(asoc->streamincnt * sizeof(struct sctp_stream_in),
    251  1.1    rjs 				M_PCB, M_NOWAIT);
    252  1.1    rjs 	if (asoc->strmin == NULL) {
    253  1.1    rjs 		/* we didn't get memory for the streams! */
    254  1.1    rjs #ifdef SCTP_DEBUG
    255  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    256  1.1    rjs 			printf("process_init: couldn't get memory for the streams!\n");
    257  1.1    rjs 		}
    258  1.1    rjs #endif
    259  1.1    rjs 		return (-1);
    260  1.1    rjs 	}
    261  1.1    rjs 	for (i = 0; i < asoc->streamincnt; i++) {
    262  1.1    rjs 		asoc->strmin[i].stream_no = i;
    263  1.1    rjs 		asoc->strmin[i].last_sequence_delivered = 0xffff;
    264  1.1    rjs 		/*
    265  1.1    rjs 		 * U-stream ranges will be set when the cookie
    266  1.1    rjs 		 * is unpacked. Or for the INIT sender they
    267  1.1    rjs 		 * are un set (if pr-sctp not supported) when the
    268  1.1    rjs 		 * INIT-ACK arrives.
    269  1.1    rjs 		 */
    270  1.1    rjs 		TAILQ_INIT(&asoc->strmin[i].inqueue);
    271  1.1    rjs 		/*
    272  1.1    rjs 		 * we are not on any wheel, pr-sctp streams
    273  1.1    rjs 		 * will go on the wheel when they have data waiting
    274  1.1    rjs 		 * for reorder.
    275  1.1    rjs 		 */
    276  1.1    rjs 		asoc->strmin[i].next_spoke.tqe_next = 0;
    277  1.1    rjs 		asoc->strmin[i].next_spoke.tqe_prev = 0;
    278  1.1    rjs 	}
    279  1.1    rjs 
    280  1.1    rjs 	/*
    281  1.1    rjs 	 * load_address_from_init will put the addresses into the
    282  1.1    rjs 	 * association when the COOKIE is processed or the INIT-ACK
    283  1.1    rjs 	 * is processed. Both types of COOKIE's existing and new
    284  1.1    rjs 	 * call this routine. It will remove addresses that
    285  1.1    rjs 	 * are no longer in the association (for the restarting
    286  1.1    rjs 	 * case where addresses are removed). Up front when the
    287  1.1    rjs 	 * INIT arrives we will discard it if it is a restart
    288  1.1    rjs 	 * and new addresses have been added.
    289  1.1    rjs 	 */
    290  1.1    rjs 	return (0);
    291  1.1    rjs }
    292  1.1    rjs 
    293  1.1    rjs /*
    294  1.1    rjs  * INIT-ACK message processing/consumption
    295  1.1    rjs  * returns value < 0 on error
    296  1.1    rjs  */
    297  1.1    rjs static int
    298  1.1    rjs sctp_process_init_ack(struct mbuf *m, int iphlen, int offset,
    299  1.1    rjs     struct sctphdr *sh, struct sctp_init_ack_chunk *cp, struct sctp_tcb *stcb,
    300  1.1    rjs     struct sctp_nets *net)
    301  1.1    rjs {
    302  1.1    rjs 	struct sctp_association *asoc;
    303  1.1    rjs 	struct mbuf *op_err;
    304  1.1    rjs 	int retval, abort_flag;
    305  1.1    rjs 	uint32_t initack_limit;
    306  1.1    rjs 	/* First verify that we have no illegal param's */
    307  1.1    rjs 	abort_flag = 0;
    308  1.1    rjs 	op_err = NULL;
    309  1.1    rjs 
    310  1.1    rjs 	op_err = sctp_arethere_unrecognized_parameters(m,
    311  1.1    rjs 	    (offset+sizeof(struct sctp_init_chunk)) ,
    312  1.1    rjs 	    &abort_flag, (struct sctp_chunkhdr *)cp);
    313  1.1    rjs 	if (abort_flag) {
    314  1.1    rjs 		/* Send an abort and notify peer */
    315  1.1    rjs 		if (op_err != NULL) {
    316  1.1    rjs 			sctp_send_operr_to(m, iphlen, op_err, cp->init.initiate_tag);
    317  1.1    rjs 		} else {
    318  1.1    rjs 			/*
    319  1.1    rjs 			 * Just notify (abort_assoc does this if
    320  1.1    rjs 			 * we send an abort).
    321  1.1    rjs 			 */
    322  1.1    rjs 			sctp_abort_notification(stcb, 0);
    323  1.1    rjs 			/*
    324  1.1    rjs 			 * No sense in further INIT's since
    325  1.1    rjs 			 * we will get the same param back
    326  1.1    rjs 			 */
    327  1.1    rjs 			sctp_free_assoc(stcb->sctp_ep, stcb);
    328  1.1    rjs 		}
    329  1.1    rjs 		return (-1);
    330  1.1    rjs 	}
    331  1.1    rjs 	asoc = &stcb->asoc;
    332  1.1    rjs 	/* process the peer's parameters in the INIT-ACK */
    333  1.1    rjs 	retval = sctp_process_init((struct sctp_init_chunk *)cp, stcb, net);
    334  1.1    rjs 	if (retval < 0) {
    335  1.1    rjs 		return (retval);
    336  1.1    rjs 	}
    337  1.1    rjs 
    338  1.1    rjs 	initack_limit = offset + ntohs(cp->ch.chunk_length);
    339  1.1    rjs 	/* load all addresses */
    340  1.1    rjs 	if (sctp_load_addresses_from_init(stcb, m, iphlen,
    341  1.1    rjs 	    (offset + sizeof(struct sctp_init_chunk)), initack_limit, sh,
    342  1.1    rjs 	    NULL)) {
    343  1.1    rjs 		/* Huh, we should abort */
    344  1.1    rjs 		sctp_abort_notification(stcb, 0);
    345  1.1    rjs 		sctp_free_assoc(stcb->sctp_ep, stcb);
    346  1.1    rjs 		return (-1);
    347  1.1    rjs 	}
    348  1.1    rjs 	if (op_err) {
    349  1.1    rjs 		sctp_queue_op_err(stcb, op_err);
    350  1.1    rjs 		/* queuing will steal away the mbuf chain to the out queue */
    351  1.1    rjs 		op_err = NULL;
    352  1.1    rjs 	}
    353  1.1    rjs 	/* extract the cookie and queue it to "echo" it back... */
    354  1.1    rjs 	stcb->asoc.overall_error_count = 0;
    355  1.1    rjs 	net->error_count = 0;
    356  1.1    rjs 	retval = sctp_send_cookie_echo(m, offset, stcb, net);
    357  1.1    rjs 	if (retval < 0) {
    358  1.1    rjs 		/*
    359  1.1    rjs 		 * No cookie, we probably should send a op error.
    360  1.1    rjs 		 * But in any case if there is no cookie in the INIT-ACK,
    361  1.1    rjs 		 * we can abandon the peer, its broke.
    362  1.1    rjs 		 */
    363  1.1    rjs 		if (retval == -3) {
    364  1.1    rjs 			/* We abort with an error of missing mandatory param */
    365  1.1    rjs 			op_err =
    366  1.1    rjs 			    sctp_generate_invmanparam(SCTP_CAUSE_MISS_PARAM);
    367  1.1    rjs 			if (op_err) {
    368  1.1    rjs 				/*
    369  1.1    rjs 				 * Expand beyond to include the mandatory
    370  1.1    rjs 				 * param cookie
    371  1.1    rjs 				 */
    372  1.1    rjs 				struct sctp_inv_mandatory_param *mp;
    373  1.1    rjs 				op_err->m_len =
    374  1.1    rjs 				    sizeof(struct sctp_inv_mandatory_param);
    375  1.1    rjs 				mp = mtod(op_err,
    376  1.1    rjs 				    struct sctp_inv_mandatory_param *);
    377  1.1    rjs 				/* Subtract the reserved param */
    378  1.1    rjs 				mp->length =
    379  1.1    rjs 				    htons(sizeof(struct sctp_inv_mandatory_param) - 2);
    380  1.1    rjs 				mp->num_param = htonl(1);
    381  1.1    rjs 				mp->param = htons(SCTP_STATE_COOKIE);
    382  1.1    rjs 				mp->resv = 0;
    383  1.1    rjs 			}
    384  1.1    rjs 			sctp_abort_association(stcb->sctp_ep, stcb, m, iphlen,
    385  1.1    rjs 			    sh, op_err);
    386  1.1    rjs 		}
    387  1.1    rjs 		return (retval);
    388  1.1    rjs 	}
    389  1.1    rjs 
    390  1.1    rjs 	/*
    391  1.1    rjs 	 * Cancel the INIT timer, We do this first before queueing
    392  1.1    rjs 	 * the cookie. We always cancel at the primary to assue that
    393  1.1    rjs 	 * we are canceling the timer started by the INIT which always
    394  1.1    rjs 	 * goes to the primary.
    395  1.1    rjs 	 */
    396  1.1    rjs 	sctp_timer_stop(SCTP_TIMER_TYPE_INIT, stcb->sctp_ep, stcb,
    397  1.1    rjs 	    asoc->primary_destination);
    398  1.1    rjs 
    399  1.1    rjs 	/* calculate the RTO */
    400  1.1    rjs 	net->RTO = sctp_calculate_rto(stcb, asoc, net, &asoc->time_entered);
    401  1.1    rjs 
    402  1.1    rjs 	return (0);
    403  1.1    rjs }
    404  1.1    rjs 
    405  1.1    rjs static void
    406  1.1    rjs sctp_handle_heartbeat_ack(struct sctp_heartbeat_chunk *cp,
    407  1.1    rjs     struct sctp_tcb *stcb, struct sctp_nets *net)
    408  1.1    rjs {
    409  1.1    rjs 	struct sockaddr_storage store;
    410  1.1    rjs 	struct sockaddr_in *sin;
    411  1.1    rjs 	struct sockaddr_in6 *sin6;
    412  1.1    rjs 	struct sctp_nets *r_net;
    413  1.1    rjs 	struct timeval tv;
    414  1.1    rjs 
    415  1.1    rjs 	if (ntohs(cp->ch.chunk_length) != sizeof(struct sctp_heartbeat_chunk)) {
    416  1.1    rjs 		/* Invalid length */
    417  1.1    rjs 		return;
    418  1.1    rjs 	}
    419  1.1    rjs 
    420  1.1    rjs 	sin = (struct sockaddr_in *)&store;
    421  1.1    rjs 	sin6 = (struct sockaddr_in6 *)&store;
    422  1.1    rjs 
    423  1.1    rjs 	memset(&store, 0, sizeof(store));
    424  1.1    rjs 	if (cp->heartbeat.hb_info.addr_family == AF_INET &&
    425  1.1    rjs 	    cp->heartbeat.hb_info.addr_len == sizeof(struct sockaddr_in)) {
    426  1.1    rjs 		sin->sin_family = cp->heartbeat.hb_info.addr_family;
    427  1.1    rjs 		sin->sin_len = cp->heartbeat.hb_info.addr_len;
    428  1.1    rjs 		sin->sin_port = stcb->rport;
    429  1.1    rjs 		memcpy(&sin->sin_addr, cp->heartbeat.hb_info.address,
    430  1.1    rjs 		    sizeof(sin->sin_addr));
    431  1.1    rjs 	} else if (cp->heartbeat.hb_info.addr_family == AF_INET6 &&
    432  1.1    rjs 	    cp->heartbeat.hb_info.addr_len == sizeof(struct sockaddr_in6)) {
    433  1.1    rjs 		sin6->sin6_family = cp->heartbeat.hb_info.addr_family;
    434  1.1    rjs 		sin6->sin6_len = cp->heartbeat.hb_info.addr_len;
    435  1.1    rjs 		sin6->sin6_port = stcb->rport;
    436  1.1    rjs 		memcpy(&sin6->sin6_addr, cp->heartbeat.hb_info.address,
    437  1.1    rjs 		    sizeof(sin6->sin6_addr));
    438  1.1    rjs 	} else {
    439  1.1    rjs #ifdef SCTP_DEBUG
    440  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
    441  1.1    rjs 			printf("unsupported address family");
    442  1.1    rjs 		}
    443  1.1    rjs #endif
    444  1.1    rjs 		return;
    445  1.1    rjs 	}
    446  1.1    rjs 	r_net = sctp_findnet(stcb, (struct sockaddr *)sin);
    447  1.1    rjs 	if (r_net == NULL) {
    448  1.1    rjs #ifdef SCTP_DEBUG
    449  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
    450  1.1    rjs 			printf("Huh? I can't find the address I sent it to, discard\n");
    451  1.1    rjs 		}
    452  1.1    rjs #endif
    453  1.1    rjs 		return;
    454  1.1    rjs 	}
    455  1.1    rjs 	if ((r_net && (r_net->dest_state & SCTP_ADDR_UNCONFIRMED)) &&
    456  1.1    rjs 	    (r_net->heartbeat_random1 == cp->heartbeat.hb_info.random_value1) &&
    457  1.1    rjs 	    (r_net->heartbeat_random2 == cp->heartbeat.hb_info.random_value2)) {
    458  1.1    rjs 		/*
    459  1.1    rjs 		 * If the its a HB and it's random value is correct when
    460  1.1    rjs 		 * can confirm the destination.
    461  1.1    rjs 		 */
    462  1.1    rjs 		r_net->dest_state &= ~SCTP_ADDR_UNCONFIRMED;
    463  1.1    rjs 		sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_CONFIRMED,
    464  1.1    rjs 		    stcb, 0, (void *)r_net);
    465  1.1    rjs 	}
    466  1.1    rjs 	r_net->error_count = 0;
    467  1.1    rjs 	r_net->hb_responded = 1;
    468  1.1    rjs 	tv.tv_sec = cp->heartbeat.hb_info.time_value_1;
    469  1.1    rjs 	tv.tv_usec = cp->heartbeat.hb_info.time_value_2;
    470  1.1    rjs 	if (r_net->dest_state & SCTP_ADDR_NOT_REACHABLE) {
    471  1.1    rjs 		r_net->dest_state = SCTP_ADDR_REACHABLE;
    472  1.1    rjs 		sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_UP, stcb,
    473  1.1    rjs 		    SCTP_HEARTBEAT_SUCCESS, (void *)r_net);
    474  1.1    rjs 
    475  1.1    rjs 		/* now was it the primary? if so restore */
    476  1.1    rjs 		if (r_net->dest_state & SCTP_ADDR_WAS_PRIMARY) {
    477  1.1    rjs 			sctp_set_primary_addr(stcb, (struct sockaddr *)NULL, r_net);
    478  1.1    rjs 		}
    479  1.1    rjs 	}
    480  1.1    rjs 	/* Now lets do a RTO with this */
    481  1.1    rjs 	r_net->RTO = sctp_calculate_rto(stcb, &stcb->asoc, r_net, &tv);
    482  1.1    rjs }
    483  1.1    rjs 
    484  1.1    rjs static void
    485  1.1    rjs sctp_handle_abort(struct sctp_abort_chunk *cp,
    486  1.1    rjs     struct sctp_tcb *stcb, struct sctp_nets *net)
    487  1.1    rjs {
    488  1.1    rjs 
    489  1.1    rjs #ifdef SCTP_DEBUG
    490  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    491  1.1    rjs 		printf("sctp_handle_abort: handling ABORT\n");
    492  1.1    rjs 	}
    493  1.1    rjs #endif
    494  1.1    rjs 	if (stcb == NULL)
    495  1.1    rjs 		return;
    496  1.1    rjs 	/* verify that the destination addr is in the association */
    497  1.1    rjs 	/* ignore abort for addresses being deleted */
    498  1.1    rjs 
    499  1.1    rjs 	/* stop any receive timers */
    500  1.1    rjs 	sctp_timer_stop(SCTP_TIMER_TYPE_RECV, stcb->sctp_ep, stcb, net);
    501  1.1    rjs 	/* notify user of the abort and clean up... */
    502  1.1    rjs 	sctp_abort_notification(stcb, 0);
    503  1.1    rjs 	/* free the tcb */
    504  1.1    rjs 	sctp_free_assoc(stcb->sctp_ep, stcb);
    505  1.1    rjs #ifdef SCTP_DEBUG
    506  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    507  1.1    rjs 		printf("sctp_handle_abort: finished\n");
    508  1.1    rjs 	}
    509  1.1    rjs #endif
    510  1.1    rjs }
    511  1.1    rjs 
    512  1.1    rjs static void
    513  1.1    rjs sctp_handle_shutdown(struct sctp_shutdown_chunk *cp,
    514  1.1    rjs     struct sctp_tcb *stcb, struct sctp_nets *net, int *abort_flag)
    515  1.1    rjs {
    516  1.1    rjs 	struct sctp_association *asoc;
    517  1.1    rjs 	int some_on_streamwheel;
    518  1.1    rjs 
    519  1.1    rjs #ifdef SCTP_DEBUG
    520  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    521  1.1    rjs 		printf("sctp_handle_shutdown: handling SHUTDOWN\n");
    522  1.1    rjs 	}
    523  1.1    rjs #endif
    524  1.1    rjs 	if (stcb == NULL)
    525  1.1    rjs 		return;
    526  1.1    rjs 
    527  1.1    rjs 	if ((SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_COOKIE_WAIT) ||
    528  1.1    rjs 	    (SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_COOKIE_ECHOED)) {
    529  1.1    rjs 	    return;
    530  1.1    rjs 	}
    531  1.1    rjs 
    532  1.1    rjs 	if (ntohs(cp->ch.chunk_length) != sizeof(struct sctp_shutdown_chunk)) {
    533  1.1    rjs 		/* update current data status */
    534  1.1    rjs #ifdef SCTP_DEBUG
    535  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
    536  1.1    rjs 			printf("Warning Shutdown NOT the expected size.. skipping (%d:%d)\n",
    537  1.1    rjs 			       ntohs(cp->ch.chunk_length),
    538  1.1    rjs 			       (int)sizeof(struct sctp_shutdown_chunk));
    539  1.1    rjs 		}
    540  1.1    rjs #endif
    541  1.1    rjs 		return;
    542  1.1    rjs 	} else {
    543  1.1    rjs 		sctp_update_acked(stcb, cp, net, abort_flag);
    544  1.1    rjs 	}
    545  1.1    rjs 	asoc = &stcb->asoc;
    546  1.1    rjs 	/* goto SHUTDOWN_RECEIVED state to block new requests */
    547  1.1    rjs 	if ((SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_RECEIVED) &&
    548  1.1    rjs 	    (SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_SENT)) {
    549  1.1    rjs 		asoc->state = SCTP_STATE_SHUTDOWN_RECEIVED;
    550  1.1    rjs #ifdef SCTP_DEBUG
    551  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
    552  1.1    rjs 			printf("Moving to SHUTDOWN-RECEIVED state\n");
    553  1.1    rjs 		}
    554  1.1    rjs #endif
    555  1.1    rjs 		/* notify upper layer that peer has initiated a shutdown */
    556  1.1    rjs 		sctp_ulp_notify(SCTP_NOTIFY_PEER_SHUTDOWN, stcb, 0, NULL);
    557  1.1    rjs 
    558  1.1    rjs 		if ((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
    559  1.1    rjs  		    (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
    560  1.1    rjs 
    561  1.1    rjs 			/* Set the flag so we cannot send more, we
    562  1.1    rjs 			 * would call the function but we don't want to
    563  1.1    rjs 			 * wake up the ulp necessarily.
    564  1.1    rjs 			 */
    565  1.1    rjs #if defined(__FreeBSD__) && __FreeBSD_version >= 502115
    566  1.1    rjs 			stcb->sctp_ep->sctp_socket->so_rcv.sb_state |= SBS_CANTSENDMORE;
    567  1.1    rjs #else
    568  1.1    rjs 			stcb->sctp_ep->sctp_socket->so_state |= SS_CANTSENDMORE;
    569  1.1    rjs #endif
    570  1.1    rjs 		}
    571  1.1    rjs 		/* reset time */
    572  1.1    rjs 		SCTP_GETTIME_TIMEVAL(&asoc->time_entered);
    573  1.1    rjs 	}
    574  1.1    rjs 	if (SCTP_GET_STATE(asoc) == SCTP_STATE_SHUTDOWN_SENT) {
    575  1.1    rjs 		/*
    576  1.1    rjs 		 * stop the shutdown timer, since we WILL move
    577  1.1    rjs 		 * to SHUTDOWN-ACK-SENT.
    578  1.1    rjs 		 */
    579  1.1    rjs 		sctp_timer_stop(SCTP_TIMER_TYPE_SHUTDOWN, stcb->sctp_ep, stcb, net);
    580  1.1    rjs 	}
    581  1.1    rjs 	/* Now are we there yet? */
    582  1.1    rjs 	some_on_streamwheel = 0;
    583  1.1    rjs 	if (!TAILQ_EMPTY(&asoc->out_wheel)) {
    584  1.1    rjs 		/* Check to see if some data queued */
    585  1.1    rjs 		struct sctp_stream_out *outs;
    586  1.1    rjs 		TAILQ_FOREACH(outs, &asoc->out_wheel, next_spoke) {
    587  1.1    rjs 			if (!TAILQ_EMPTY(&outs->outqueue)) {
    588  1.1    rjs 				some_on_streamwheel = 1;
    589  1.1    rjs 				break;
    590  1.1    rjs 			}
    591  1.1    rjs 		}
    592  1.1    rjs 	}
    593  1.1    rjs #ifdef SCTP_DEBUG
    594  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
    595  1.1    rjs 		printf("some_on_streamwheel:%d send_q_empty:%d sent_q_empty:%d\n",
    596  1.1    rjs 		       some_on_streamwheel,
    597  1.1    rjs 		       !TAILQ_EMPTY(&asoc->send_queue),
    598  1.1    rjs 		       !TAILQ_EMPTY(&asoc->sent_queue));
    599  1.1    rjs 	}
    600  1.1    rjs #endif
    601  1.1    rjs  	if (!TAILQ_EMPTY(&asoc->send_queue) ||
    602  1.1    rjs 	    !TAILQ_EMPTY(&asoc->sent_queue) ||
    603  1.1    rjs 	    some_on_streamwheel) {
    604  1.1    rjs 		/* By returning we will push more data out */
    605  1.1    rjs 		return;
    606  1.1    rjs 	} else {
    607  1.1    rjs 		/* no outstanding data to send, so move on... */
    608  1.1    rjs 		/* send SHUTDOWN-ACK */
    609  1.1    rjs 		sctp_send_shutdown_ack(stcb, stcb->asoc.primary_destination);
    610  1.1    rjs 		/* move to SHUTDOWN-ACK-SENT state */
    611  1.1    rjs 		asoc->state = SCTP_STATE_SHUTDOWN_ACK_SENT;
    612  1.1    rjs #ifdef SCTP_DEBUG
    613  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
    614  1.1    rjs 			printf("moving to SHUTDOWN_ACK state\n");
    615  1.1    rjs 		}
    616  1.1    rjs #endif
    617  1.1    rjs 		/* start SHUTDOWN timer */
    618  1.1    rjs 		sctp_timer_start(SCTP_TIMER_TYPE_SHUTDOWNACK, stcb->sctp_ep,
    619  1.1    rjs 		    stcb, net);
    620  1.1    rjs 	}
    621  1.1    rjs }
    622  1.1    rjs 
    623  1.1    rjs static void
    624  1.1    rjs sctp_handle_shutdown_ack(struct sctp_shutdown_ack_chunk *cp,
    625  1.1    rjs     struct sctp_tcb *stcb, struct sctp_nets *net)
    626  1.1    rjs {
    627  1.1    rjs 	struct sctp_association *asoc;
    628  1.1    rjs 
    629  1.1    rjs #ifdef SCTP_DEBUG
    630  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    631  1.1    rjs 		printf("sctp_handle_shutdown_ack: handling SHUTDOWN ACK\n");
    632  1.1    rjs 	}
    633  1.1    rjs #endif
    634  1.1    rjs 	if (stcb == NULL)
    635  1.1    rjs 		return;
    636  1.1    rjs 
    637  1.1    rjs 	asoc = &stcb->asoc;
    638  1.1    rjs 	/* process according to association state */
    639  1.1    rjs 	if ((SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_SENT) &&
    640  1.1    rjs 	    (SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_ACK_SENT)) {
    641  1.1    rjs 		/* unexpected SHUTDOWN-ACK... so ignore... */
    642  1.1    rjs 		return;
    643  1.1    rjs 	}
    644  1.1    rjs 	/* are the queues empty? */
    645  1.1    rjs 	if (!TAILQ_EMPTY(&asoc->send_queue) ||
    646  1.1    rjs 	    !TAILQ_EMPTY(&asoc->sent_queue) ||
    647  1.1    rjs 	    !TAILQ_EMPTY(&asoc->out_wheel)) {
    648  1.1    rjs 		sctp_report_all_outbound(stcb);
    649  1.1    rjs 	}
    650  1.1    rjs 	/* stop the timer */
    651  1.1    rjs 	sctp_timer_stop(SCTP_TIMER_TYPE_SHUTDOWN, stcb->sctp_ep, stcb, net);
    652  1.1    rjs 	/* send SHUTDOWN-COMPLETE */
    653  1.1    rjs 	sctp_send_shutdown_complete(stcb, net);
    654  1.1    rjs 	/* notify upper layer protocol */
    655  1.1    rjs 	sctp_ulp_notify(SCTP_NOTIFY_ASSOC_DOWN, stcb, 0, NULL);
    656  1.1    rjs 	if ((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
    657  1.1    rjs 	    (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
    658  1.1    rjs 		stcb->sctp_ep->sctp_flags &= ~SCTP_PCB_FLAGS_CONNECTED;
    659  1.1    rjs 		/* Set the connected flag to disconnected */
    660  1.1    rjs 		stcb->sctp_ep->sctp_socket->so_snd.sb_cc = 0;
    661  1.1    rjs 		stcb->sctp_ep->sctp_socket->so_snd.sb_mbcnt = 0;
    662  1.1    rjs 		soisdisconnected(stcb->sctp_ep->sctp_socket);
    663  1.1    rjs 	}
    664  1.1    rjs 	/* free the TCB but first save off the ep */
    665  1.1    rjs 	sctp_free_assoc(stcb->sctp_ep, stcb);
    666  1.1    rjs }
    667  1.1    rjs 
    668  1.1    rjs /*
    669  1.1    rjs  * Skip past the param header and then we will find the chunk that
    670  1.1    rjs  * caused the problem. There are two possiblities ASCONF or FWD-TSN
    671  1.1    rjs  * other than that and our peer must be broken.
    672  1.1    rjs  */
    673  1.1    rjs static void
    674  1.1    rjs sctp_process_unrecog_chunk(struct sctp_tcb *stcb, struct sctp_paramhdr *phdr,
    675  1.1    rjs     struct sctp_nets *net)
    676  1.1    rjs {
    677  1.1    rjs 	struct sctp_chunkhdr *chk;
    678  1.1    rjs 
    679  1.1    rjs 	chk = (struct sctp_chunkhdr *)((vaddr_t)phdr + sizeof(*phdr));
    680  1.1    rjs 	switch (chk->chunk_type) {
    681  1.1    rjs 	case SCTP_ASCONF_ACK:
    682  1.1    rjs #ifdef SCTP_DEBUG
    683  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    684  1.1    rjs 			printf("Strange peer, snds ASCONF but does not recongnize asconf-ack?\n");
    685  1.1    rjs 		}
    686  1.1    rjs #endif
    687  1.1    rjs 	case SCTP_ASCONF:
    688  1.1    rjs #ifdef SCTP_DEBUG
    689  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    690  1.1    rjs 			printf("Peer does not support ASCONF/ASCONF-ACK chunks\n");
    691  1.1    rjs 		}
    692  1.1    rjs #endif /* SCTP_DEBUG */
    693  1.1    rjs 		sctp_asconf_cleanup(stcb, net);
    694  1.1    rjs 		break;
    695  1.1    rjs 	case SCTP_FORWARD_CUM_TSN:
    696  1.1    rjs 		stcb->asoc.peer_supports_prsctp = 0;
    697  1.1    rjs 		break;
    698  1.1    rjs 	default:
    699  1.1    rjs #ifdef SCTP_DEBUG
    700  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    701  1.1    rjs 			printf("Peer does not support chunk type %d(%x)??\n",
    702  1.1    rjs 			       chk->chunk_type, (u_int)chk->chunk_type);
    703  1.1    rjs 		}
    704  1.1    rjs #endif
    705  1.1    rjs 		break;
    706  1.1    rjs 	}
    707  1.1    rjs }
    708  1.1    rjs 
    709  1.1    rjs /*
    710  1.1    rjs  * Skip past the param header and then we will find the param that
    711  1.1    rjs  * caused the problem.  There are a number of param's in a ASCONF
    712  1.1    rjs  * OR the prsctp param these will turn of specific features.
    713  1.1    rjs  */
    714  1.1    rjs static void
    715  1.1    rjs sctp_process_unrecog_param(struct sctp_tcb *stcb, struct sctp_paramhdr *phdr)
    716  1.1    rjs {
    717  1.1    rjs 	struct sctp_paramhdr *pbad;
    718  1.1    rjs 
    719  1.1    rjs 	pbad = phdr + 1;
    720  1.1    rjs 	switch (ntohs(pbad->param_type)) {
    721  1.1    rjs 		/* pr-sctp draft */
    722  1.1    rjs 	case SCTP_PRSCTP_SUPPORTED:
    723  1.1    rjs 		stcb->asoc.peer_supports_prsctp = 0;
    724  1.1    rjs 		break;
    725  1.1    rjs 	case SCTP_SUPPORTED_CHUNK_EXT:
    726  1.1    rjs 		break;
    727  1.1    rjs 		/* draft-ietf-tsvwg-addip-sctp */
    728  1.1    rjs 	case SCTP_ECN_NONCE_SUPPORTED:
    729  1.1    rjs 		stcb->asoc.peer_supports_ecn_nonce = 0;
    730  1.1    rjs 		stcb->asoc.ecn_nonce_allowed = 0;
    731  1.1    rjs 		stcb->asoc.ecn_allowed = 0;
    732  1.1    rjs 		break;
    733  1.1    rjs 	case SCTP_ADD_IP_ADDRESS:
    734  1.1    rjs 	case SCTP_DEL_IP_ADDRESS:
    735  1.1    rjs 		stcb->asoc.peer_supports_asconf = 0;
    736  1.1    rjs 		break;
    737  1.1    rjs 	case SCTP_SET_PRIM_ADDR:
    738  1.1    rjs 		stcb->asoc.peer_supports_asconf_setprim = 0;
    739  1.1    rjs 		break;
    740  1.1    rjs 	case SCTP_SUCCESS_REPORT:
    741  1.1    rjs 	case SCTP_ERROR_CAUSE_IND:
    742  1.1    rjs #ifdef SCTP_DEBUG
    743  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    744  1.1    rjs 			printf("Huh, the peer does not support success? or error cause?\n");
    745  1.1    rjs 			printf("Turning off ASCONF to this strange peer\n");
    746  1.1    rjs 		}
    747  1.1    rjs #endif
    748  1.1    rjs 		stcb->asoc.peer_supports_asconf = 0;
    749  1.1    rjs 		stcb->asoc.peer_supports_asconf_setprim = 0;
    750  1.1    rjs 		break;
    751  1.1    rjs 	default:
    752  1.1    rjs #ifdef SCTP_DEBUG
    753  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    754  1.1    rjs 			printf("Peer does not support base param type %d(%x)??\n",
    755  1.1    rjs 			    pbad->param_type, (u_int)pbad->param_type);
    756  1.1    rjs 		}
    757  1.1    rjs #endif
    758  1.1    rjs 		break;
    759  1.1    rjs 	}
    760  1.1    rjs }
    761  1.1    rjs 
    762  1.1    rjs static int
    763  1.1    rjs sctp_handle_error(struct sctp_chunkhdr *ch,
    764  1.1    rjs     struct sctp_tcb *stcb, struct sctp_nets *net)
    765  1.1    rjs {
    766  1.1    rjs 	int chklen;
    767  1.1    rjs 	struct sctp_paramhdr *phdr;
    768  1.1    rjs 	uint16_t error_type;
    769  1.1    rjs 	uint16_t error_len;
    770  1.1    rjs 	struct sctp_association *asoc;
    771  1.1    rjs 
    772  1.1    rjs 	int adjust;
    773  1.1    rjs 	/* parse through all of the errors and process */
    774  1.1    rjs 	asoc = &stcb->asoc;
    775  1.1    rjs 	phdr = (struct sctp_paramhdr *)((vaddr_t)ch +
    776  1.1    rjs 	    sizeof(struct sctp_chunkhdr));
    777  1.1    rjs 	chklen = ntohs(ch->chunk_length) - sizeof(struct sctp_chunkhdr);
    778  1.1    rjs 	while ((size_t)chklen >= sizeof(struct sctp_paramhdr)) {
    779  1.1    rjs 		/* Process an Error Cause */
    780  1.1    rjs 		error_type = ntohs(phdr->param_type);
    781  1.1    rjs 		error_len = ntohs(phdr->param_length);
    782  1.1    rjs 		if ((error_len > chklen) || (error_len == 0)) {
    783  1.1    rjs 			/* invalid param length for this param */
    784  1.1    rjs #ifdef SCTP_DEBUG
    785  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
    786  1.1    rjs 				printf("Bogus length in error param- chunk left:%d errorlen:%d\n",
    787  1.1    rjs 				       chklen, error_len);
    788  1.1    rjs 			}
    789  1.1    rjs #endif /* SCTP_DEBUG */
    790  1.1    rjs 			return (0);
    791  1.1    rjs 		}
    792  1.1    rjs 		switch (error_type) {
    793  1.1    rjs 		case SCTP_CAUSE_INV_STRM:
    794  1.1    rjs 		case SCTP_CAUSE_MISS_PARAM:
    795  1.1    rjs 		case SCTP_CAUSE_INVALID_PARAM:
    796  1.1    rjs 		case SCTP_CAUSE_NOUSER_DATA:
    797  1.1    rjs #ifdef SCTP_DEBUG
    798  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
    799  1.1    rjs 				printf("Software error we got a %d back? We have a bug :/ (or do they?)\n",
    800  1.1    rjs 				       error_type);
    801  1.1    rjs 			}
    802  1.1    rjs #endif
    803  1.1    rjs 			break;
    804  1.1    rjs 		case SCTP_CAUSE_STALE_COOKIE:
    805  1.1    rjs 			/* We only act if we have echoed a cookie and are waiting. */
    806  1.1    rjs 			if (SCTP_GET_STATE(asoc) == SCTP_STATE_COOKIE_ECHOED) {
    807  1.1    rjs 				int *p;
    808  1.1    rjs 				p = (int *)((vaddr_t)phdr + sizeof(*phdr));
    809  1.1    rjs 				/* Save the time doubled */
    810  1.1    rjs 				asoc->cookie_preserve_req = ntohl(*p) << 1;
    811  1.1    rjs 				asoc->stale_cookie_count++;
    812  1.1    rjs 				if (asoc->stale_cookie_count >
    813  1.1    rjs 				    asoc->max_init_times) {
    814  1.1    rjs 					sctp_abort_notification(stcb, 0);
    815  1.1    rjs 					/* now free the asoc */
    816  1.1    rjs 					sctp_free_assoc(stcb->sctp_ep, stcb);
    817  1.1    rjs 					return (-1);
    818  1.1    rjs 				}
    819  1.1    rjs 				/* blast back to INIT state */
    820  1.1    rjs 				asoc->state &= ~SCTP_STATE_COOKIE_ECHOED;
    821  1.1    rjs 				asoc->state |= SCTP_STATE_COOKIE_WAIT;
    822  1.1    rjs 				sctp_timer_stop(SCTP_TIMER_TYPE_COOKIE,
    823  1.1    rjs 				    stcb->sctp_ep, stcb, net);
    824  1.1    rjs 				sctp_send_initiate(stcb->sctp_ep, stcb);
    825  1.1    rjs 			}
    826  1.1    rjs 			break;
    827  1.1    rjs 		case SCTP_CAUSE_UNRESOLV_ADDR:
    828  1.1    rjs 			/*
    829  1.1    rjs 			 * Nothing we can do here, we don't do hostname
    830  1.1    rjs 			 * addresses so if the peer does not like my IPv6 (or
    831  1.1    rjs 			 * IPv4 for that matter) it does not matter. If they
    832  1.1    rjs 			 * don't support that type of address, they can NOT
    833  1.1    rjs 			 * possibly get that packet type... i.e. with no IPv6
    834  1.1    rjs 			 * you can't recieve a IPv6 packet. so we can safely
    835  1.1    rjs 			 * ignore this one. If we ever added support for
    836  1.1    rjs 			 * HOSTNAME Addresses, then we would need to do
    837  1.1    rjs 			 * something here.
    838  1.1    rjs 			 */
    839  1.1    rjs 			break;
    840  1.1    rjs 		case SCTP_CAUSE_UNRECOG_CHUNK:
    841  1.1    rjs 			sctp_process_unrecog_chunk(stcb, phdr, net);
    842  1.1    rjs 			break;
    843  1.1    rjs 		case SCTP_CAUSE_UNRECOG_PARAM:
    844  1.1    rjs 			sctp_process_unrecog_param(stcb, phdr);
    845  1.1    rjs 			break;
    846  1.1    rjs 		case SCTP_CAUSE_COOKIE_IN_SHUTDOWN:
    847  1.1    rjs 			/*
    848  1.1    rjs 			 * We ignore this since the timer will drive out a new
    849  1.1    rjs 			 * cookie anyway and there timer will drive us to send
    850  1.1    rjs 			 * a SHUTDOWN_COMPLETE. We can't send one here since
    851  1.1    rjs 			 * we don't have their tag.
    852  1.1    rjs 			 */
    853  1.1    rjs 			break;
    854  1.1    rjs 		case SCTP_CAUSE_DELETEING_LAST_ADDR:
    855  1.1    rjs 		case SCTP_CAUSE_OPERATION_REFUSED:
    856  1.1    rjs 		case SCTP_CAUSE_DELETING_SRC_ADDR:
    857  1.1    rjs 			/* We should NOT get these here, but in a ASCONF-ACK. */
    858  1.1    rjs #ifdef SCTP_DEBUG
    859  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    860  1.1    rjs 				printf("Peer sends ASCONF errors in a Operational Error?<%d>?\n",
    861  1.1    rjs 				       error_type);
    862  1.1    rjs 			}
    863  1.1    rjs #endif
    864  1.1    rjs 			break;
    865  1.1    rjs 		case SCTP_CAUSE_OUT_OF_RESC:
    866  1.1    rjs 			/*
    867  1.1    rjs 			 * And what, pray tell do we do with the fact
    868  1.1    rjs 			 * that the peer is out of resources? Not
    869  1.1    rjs 			 * really sure we could do anything but abort.
    870  1.1    rjs 			 * I suspect this should have came WITH an
    871  1.1    rjs 			 * abort instead of in a OP-ERROR.
    872  1.1    rjs 			 */
    873  1.1    rjs 			break;
    874  1.1    rjs 	 	default:
    875  1.1    rjs #ifdef SCTP_DEBUG
    876  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
    877  1.1    rjs 				/* don't know what this error cause is... */
    878  1.1    rjs 				printf("sctp_handle_error: unknown error type = 0x%xh\n",
    879  1.1    rjs 				       error_type);
    880  1.1    rjs 			}
    881  1.1    rjs #endif /* SCTP_DEBUG */
    882  1.1    rjs 			break;
    883  1.1    rjs 		}
    884  1.1    rjs 		adjust = SCTP_SIZE32(error_len);
    885  1.1    rjs 		chklen -= adjust;
    886  1.1    rjs 		phdr = (struct sctp_paramhdr *)((vaddr_t)phdr + adjust);
    887  1.1    rjs 	}
    888  1.1    rjs 	return (0);
    889  1.1    rjs }
    890  1.1    rjs 
    891  1.1    rjs static int
    892  1.1    rjs sctp_handle_init_ack(struct mbuf *m, int iphlen, int offset, struct sctphdr *sh,
    893  1.1    rjs     struct sctp_init_ack_chunk *cp, struct sctp_tcb *stcb,
    894  1.1    rjs     struct sctp_nets *net)
    895  1.1    rjs {
    896  1.1    rjs 	struct sctp_init_ack *init_ack;
    897  1.1    rjs 	int *state;
    898  1.1    rjs 	struct mbuf *op_err;
    899  1.1    rjs 
    900  1.1    rjs #ifdef SCTP_DEBUG
    901  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    902  1.1    rjs 		printf("sctp_handle_init_ack: handling INIT-ACK\n");
    903  1.1    rjs 	}
    904  1.1    rjs #endif
    905  1.1    rjs 	if (stcb == NULL) {
    906  1.1    rjs #ifdef SCTP_DEBUG
    907  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    908  1.1    rjs 			printf("sctp_handle_init_ack: TCB is null\n");
    909  1.1    rjs 		}
    910  1.1    rjs #endif
    911  1.1    rjs 		return (-1);
    912  1.1    rjs 	}
    913  1.1    rjs 	if (ntohs(cp->ch.chunk_length) < sizeof(struct sctp_init_ack_chunk)) {
    914  1.1    rjs 		/* Invalid length */
    915  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_INVALID_PARAM);
    916  1.1    rjs 		sctp_abort_association(stcb->sctp_ep, stcb, m, iphlen, sh,
    917  1.1    rjs 		    op_err);
    918  1.1    rjs 		return (-1);
    919  1.1    rjs 	}
    920  1.1    rjs 	init_ack = &cp->init;
    921  1.1    rjs 	/* validate parameters */
    922  1.1    rjs 	if (init_ack->initiate_tag == 0) {
    923  1.1    rjs 		/* protocol error... send an abort */
    924  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_INVALID_PARAM);
    925  1.1    rjs 		sctp_abort_association(stcb->sctp_ep, stcb, m, iphlen, sh,
    926  1.1    rjs 		    op_err);
    927  1.1    rjs 		return (-1);
    928  1.1    rjs 	}
    929  1.1    rjs 	if (ntohl(init_ack->a_rwnd) < SCTP_MIN_RWND) {
    930  1.1    rjs 		/* protocol error... send an abort */
    931  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_INVALID_PARAM);
    932  1.1    rjs 		sctp_abort_association(stcb->sctp_ep, stcb, m, iphlen, sh,
    933  1.1    rjs 		    op_err);
    934  1.1    rjs 		return (-1);
    935  1.1    rjs 	}
    936  1.1    rjs 	if (init_ack->num_inbound_streams == 0) {
    937  1.1    rjs 		/* protocol error... send an abort */
    938  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_INVALID_PARAM);
    939  1.1    rjs 		sctp_abort_association(stcb->sctp_ep, stcb, m, iphlen, sh,
    940  1.1    rjs 		    op_err);
    941  1.1    rjs 		return (-1);
    942  1.1    rjs 	}
    943  1.1    rjs 	if (init_ack->num_outbound_streams == 0) {
    944  1.1    rjs 		/* protocol error... send an abort */
    945  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_INVALID_PARAM);
    946  1.1    rjs 		sctp_abort_association(stcb->sctp_ep, stcb, m, iphlen, sh,
    947  1.1    rjs 		    op_err);
    948  1.1    rjs 		return (-1);
    949  1.1    rjs 	}
    950  1.1    rjs 
    951  1.1    rjs 	/* process according to association state... */
    952  1.1    rjs 	state = &stcb->asoc.state;
    953  1.1    rjs 	switch (*state & SCTP_STATE_MASK) {
    954  1.1    rjs 	case SCTP_STATE_COOKIE_WAIT:
    955  1.1    rjs 		/* this is the expected state for this chunk */
    956  1.1    rjs 		/* process the INIT-ACK parameters */
    957  1.1    rjs 		if (stcb->asoc.primary_destination->dest_state &
    958  1.1    rjs 		    SCTP_ADDR_UNCONFIRMED) {
    959  1.1    rjs 			/*
    960  1.1    rjs 			 * The primary is where we sent the INIT, we can
    961  1.1    rjs 			 * always consider it confirmed when the INIT-ACK
    962  1.1    rjs 			 * is returned. Do this before we load addresses
    963  1.1    rjs 			 * though.
    964  1.1    rjs 			 */
    965  1.1    rjs 			stcb->asoc.primary_destination->dest_state &=
    966  1.1    rjs 			    ~SCTP_ADDR_UNCONFIRMED;
    967  1.1    rjs 			sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_CONFIRMED,
    968  1.1    rjs 			    stcb, 0, (void *)stcb->asoc.primary_destination);
    969  1.1    rjs 		}
    970  1.1    rjs 		if (sctp_process_init_ack(m, iphlen, offset, sh, cp, stcb, net
    971  1.1    rjs 		    ) < 0) {
    972  1.1    rjs 			/* error in parsing parameters */
    973  1.1    rjs #ifdef SCTP_DEBUG
    974  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    975  1.1    rjs 				printf("sctp_process_init_ack: error in msg, discarding\n");
    976  1.1    rjs 			}
    977  1.1    rjs #endif
    978  1.1    rjs 			return (-1);
    979  1.1    rjs 		}
    980  1.1    rjs 		/* update our state */
    981  1.1    rjs #ifdef SCTP_DEBUG
    982  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
    983  1.1    rjs 			printf("moving to COOKIE-ECHOED state\n");
    984  1.1    rjs 		}
    985  1.1    rjs #endif
    986  1.1    rjs 		if (*state & SCTP_STATE_SHUTDOWN_PENDING) {
    987  1.1    rjs 			*state = SCTP_STATE_COOKIE_ECHOED |
    988  1.1    rjs 				SCTP_STATE_SHUTDOWN_PENDING;
    989  1.1    rjs 		} else {
    990  1.1    rjs 			*state = SCTP_STATE_COOKIE_ECHOED;
    991  1.1    rjs 		}
    992  1.1    rjs 
    993  1.1    rjs 		/* reset the RTO calc */
    994  1.1    rjs 		stcb->asoc.overall_error_count = 0;
    995  1.1    rjs 		SCTP_GETTIME_TIMEVAL(&stcb->asoc.time_entered);
    996  1.1    rjs 		/*
    997  1.1    rjs 		 * collapse the init timer back in case of a exponential backoff
    998  1.1    rjs 		 */
    999  1.1    rjs 		sctp_timer_start(SCTP_TIMER_TYPE_COOKIE, stcb->sctp_ep,
   1000  1.1    rjs 		    stcb, net);
   1001  1.1    rjs 		/*
   1002  1.1    rjs 		 * the send at the end of the inbound data processing will
   1003  1.1    rjs 		 * cause the cookie to be sent
   1004  1.1    rjs 		 */
   1005  1.1    rjs 		break;
   1006  1.1    rjs 	case SCTP_STATE_SHUTDOWN_SENT:
   1007  1.1    rjs 		/* incorrect state... discard */
   1008  1.1    rjs 		break;
   1009  1.1    rjs 	case SCTP_STATE_COOKIE_ECHOED:
   1010  1.1    rjs 		/* incorrect state... discard */
   1011  1.1    rjs 		break;
   1012  1.1    rjs 	case SCTP_STATE_OPEN:
   1013  1.1    rjs 		/* incorrect state... discard */
   1014  1.1    rjs 		break;
   1015  1.1    rjs 	case SCTP_STATE_EMPTY:
   1016  1.1    rjs 	case SCTP_STATE_INUSE:
   1017  1.1    rjs 	default:
   1018  1.1    rjs 		/* incorrect state... discard */
   1019  1.1    rjs #ifdef SCTP_DEBUG
   1020  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1021  1.1    rjs 			printf("Leaving handle-init-ack default\n");
   1022  1.1    rjs 		}
   1023  1.1    rjs #endif
   1024  1.1    rjs 		return (-1);
   1025  1.1    rjs 		break;
   1026  1.1    rjs 	} /* end switch asoc state */
   1027  1.1    rjs #ifdef SCTP_DEBUG
   1028  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1029  1.1    rjs 		printf("Leaving handle-init-ack end\n");
   1030  1.1    rjs 	}
   1031  1.1    rjs #endif
   1032  1.1    rjs 	return (0);
   1033  1.1    rjs }
   1034  1.1    rjs 
   1035  1.1    rjs 
   1036  1.1    rjs /*
   1037  1.1    rjs  * handle a state cookie for an existing association
   1038  1.1    rjs  * m: input packet mbuf chain-- assumes a pullup on IP/SCTP/COOKIE-ECHO chunk
   1039  1.1    rjs  *    note: this is a "split" mbuf and the cookie signature does not exist
   1040  1.1    rjs  * offset: offset into mbuf to the cookie-echo chunk
   1041  1.1    rjs  */
   1042  1.1    rjs static struct sctp_tcb *
   1043  1.1    rjs sctp_process_cookie_existing(struct mbuf *m, int iphlen, int offset,
   1044  1.1    rjs     struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len,
   1045  1.1    rjs     struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets *net,
   1046  1.1    rjs     struct sockaddr *init_src, int *notification)
   1047  1.1    rjs {
   1048  1.1    rjs 	struct sctp_association *asoc;
   1049  1.1    rjs 	struct sctp_init_chunk *init_cp, init_buf;
   1050  1.1    rjs 	struct sctp_init_ack_chunk *initack_cp, initack_buf;
   1051  1.1    rjs 	int chk_length;
   1052  1.1    rjs 	int init_offset, initack_offset;
   1053  1.1    rjs 	int retval;
   1054  1.1    rjs 
   1055  1.1    rjs 	/* I know that the TCB is non-NULL from the caller */
   1056  1.1    rjs 	asoc = &stcb->asoc;
   1057  1.1    rjs 
   1058  1.1    rjs 	if (SCTP_GET_STATE(asoc) == SCTP_STATE_SHUTDOWN_ACK_SENT) {
   1059  1.1    rjs 		/* SHUTDOWN came in after sending INIT-ACK */
   1060  1.1    rjs 		struct mbuf *op_err;
   1061  1.1    rjs 		struct sctp_paramhdr *ph;
   1062  1.1    rjs 
   1063  1.1    rjs 		sctp_send_shutdown_ack(stcb, stcb->asoc.primary_destination);
   1064  1.1    rjs #ifdef SCTP_DEBUG
   1065  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1066  1.1    rjs 			printf("sctp_handle_cookie: got a cookie, while shutting down!\n");
   1067  1.1    rjs 		}
   1068  1.1    rjs #endif
   1069  1.1    rjs 		MGETHDR(op_err, M_DONTWAIT, MT_HEADER);
   1070  1.1    rjs 		if (op_err == NULL) {
   1071  1.1    rjs 			/* FOOBAR */
   1072  1.1    rjs 			return (NULL);
   1073  1.1    rjs 		}
   1074  1.1    rjs 		/* pre-reserve some space */
   1075  1.1    rjs 		op_err->m_data += sizeof(struct ip6_hdr);
   1076  1.1    rjs 		op_err->m_data += sizeof(struct sctphdr);
   1077  1.1    rjs 		op_err->m_data += sizeof(struct sctp_chunkhdr);
   1078  1.1    rjs 		/* Set the len */
   1079  1.1    rjs 		op_err->m_len = op_err->m_pkthdr.len = sizeof(struct sctp_paramhdr);
   1080  1.1    rjs 		ph = mtod(op_err, struct sctp_paramhdr *);
   1081  1.1    rjs 		ph->param_type = htons(SCTP_CAUSE_COOKIE_IN_SHUTDOWN);
   1082  1.1    rjs 		ph->param_length = htons(sizeof(struct sctp_paramhdr));
   1083  1.1    rjs 		sctp_send_operr_to(m, iphlen, op_err, cookie->peers_vtag);
   1084  1.1    rjs 		return (NULL);
   1085  1.1    rjs 	}
   1086  1.1    rjs 	/*
   1087  1.1    rjs 	 * find and validate the INIT chunk in the cookie (peer's info)
   1088  1.1    rjs 	 * the INIT should start after the cookie-echo header struct
   1089  1.1    rjs 	 * (chunk header, state cookie header struct)
   1090  1.1    rjs 	 */
   1091  1.1    rjs 	init_offset = offset += sizeof(struct sctp_cookie_echo_chunk);
   1092  1.1    rjs 
   1093  1.1    rjs 	init_cp = (struct sctp_init_chunk *)
   1094  1.1    rjs 	    sctp_m_getptr(m, init_offset, sizeof(struct sctp_init_chunk),
   1095  1.1    rjs 	    (u_int8_t *)&init_buf);
   1096  1.1    rjs 	if (init_cp == NULL) {
   1097  1.1    rjs 		/* could not pull a INIT chunk in cookie */
   1098  1.1    rjs #ifdef SCTP_DEBUG
   1099  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1100  1.1    rjs 			printf("process_cookie_existing: could not pull INIT chunk hdr\n");
   1101  1.1    rjs 		}
   1102  1.1    rjs #endif /* SCTP_DEBUG */
   1103  1.1    rjs 		return (NULL);
   1104  1.1    rjs 	}
   1105  1.1    rjs 	chk_length = ntohs(init_cp->ch.chunk_length);
   1106  1.1    rjs 	if (init_cp->ch.chunk_type != SCTP_INITIATION) {
   1107  1.1    rjs #ifdef SCTP_DEBUG
   1108  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1109  1.1    rjs 			printf("process_cookie_existing: could not find INIT chunk!\n");
   1110  1.1    rjs 		}
   1111  1.1    rjs #endif /* SCTP_DEBUG */
   1112  1.1    rjs 		return (NULL);
   1113  1.1    rjs 	}
   1114  1.1    rjs 
   1115  1.1    rjs 	/*
   1116  1.1    rjs 	 * find and validate the INIT-ACK chunk in the cookie (my info)
   1117  1.1    rjs 	 * the INIT-ACK follows the INIT chunk
   1118  1.1    rjs 	 */
   1119  1.1    rjs 	initack_offset = init_offset + SCTP_SIZE32(chk_length);
   1120  1.1    rjs 	initack_cp = (struct sctp_init_ack_chunk *)
   1121  1.1    rjs 	    sctp_m_getptr(m, initack_offset, sizeof(struct sctp_init_ack_chunk),
   1122  1.1    rjs 	    (u_int8_t *)&initack_buf);
   1123  1.1    rjs 	if (initack_cp == NULL) {
   1124  1.1    rjs 		/* could not pull INIT-ACK chunk in cookie */
   1125  1.1    rjs #ifdef SCTP_DEBUG
   1126  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1127  1.1    rjs 			printf("process_cookie_existing: could not pull INIT-ACK chunk hdr\n");
   1128  1.1    rjs 		}
   1129  1.1    rjs #endif /* SCTP_DEBUG */
   1130  1.1    rjs 		return (NULL);
   1131  1.1    rjs 	}
   1132  1.1    rjs 	chk_length = ntohs(initack_cp->ch.chunk_length);
   1133  1.1    rjs 	if (initack_cp->ch.chunk_type != SCTP_INITIATION_ACK) {
   1134  1.1    rjs #ifdef SCTP_DEBUG
   1135  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1136  1.1    rjs 			printf("process_cookie_existing: could not find INIT-ACK chunk!\n");
   1137  1.1    rjs 		}
   1138  1.1    rjs #endif /* SCTP_DEBUG */
   1139  1.1    rjs 		return (NULL);
   1140  1.1    rjs 	}
   1141  1.1    rjs 	if ((ntohl(initack_cp->init.initiate_tag) == asoc->my_vtag) &&
   1142  1.1    rjs 	    (ntohl(init_cp->init.initiate_tag) == asoc->peer_vtag)) {
   1143  1.1    rjs 		/*
   1144  1.1    rjs 		 * case D in Section 5.2.4 Table 2: MMAA
   1145  1.1    rjs 		 * process accordingly to get into the OPEN state
   1146  1.1    rjs 		 */
   1147  1.1    rjs 		switch SCTP_GET_STATE(asoc) {
   1148  1.1    rjs 		case SCTP_STATE_COOKIE_WAIT:
   1149  1.1    rjs 			/*
   1150  1.1    rjs 			 * INIT was sent, but got got a COOKIE_ECHO with
   1151  1.1    rjs 			 * the correct tags... just accept it...
   1152  1.1    rjs 			 */
   1153  1.1    rjs 			/* First we must process the INIT !! */
   1154  1.1    rjs 			retval = sctp_process_init(init_cp, stcb, net);
   1155  1.1    rjs 			if (retval < 0) {
   1156  1.1    rjs #ifdef SCTP_DEBUG
   1157  1.1    rjs 				printf("process_cookie_existing: INIT processing failed\n");
   1158  1.1    rjs #endif
   1159  1.1    rjs 				return (NULL);
   1160  1.1    rjs 			}
   1161  1.1    rjs 			/* intentional fall through to below... */
   1162  1.1    rjs 
   1163  1.1    rjs 		case SCTP_STATE_COOKIE_ECHOED:
   1164  1.1    rjs 			/* Duplicate INIT case */
   1165  1.1    rjs 			/* we have already processed the INIT so no problem */
   1166  1.1    rjs 			sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb,
   1167  1.1    rjs 			    net);
   1168  1.1    rjs 			sctp_timer_stop(SCTP_TIMER_TYPE_INIT, inp, stcb, net);
   1169  1.1    rjs 			sctp_timer_stop(SCTP_TIMER_TYPE_COOKIE, inp, stcb,
   1170  1.1    rjs 			    net);
   1171  1.1    rjs 			/* update current state */
   1172  1.1    rjs 			if (asoc->state & SCTP_STATE_SHUTDOWN_PENDING) {
   1173  1.1    rjs 				asoc->state = SCTP_STATE_OPEN |
   1174  1.1    rjs 				    SCTP_STATE_SHUTDOWN_PENDING;
   1175  1.1    rjs 			} else if ((asoc->state & SCTP_STATE_SHUTDOWN_SENT) == 0) {
   1176  1.1    rjs 				/* if ok, move to OPEN state */
   1177  1.1    rjs 				asoc->state = SCTP_STATE_OPEN;
   1178  1.1    rjs 			}
   1179  1.1    rjs 			if (((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
   1180  1.1    rjs 			    (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) &&
   1181  1.1    rjs 			    (!(stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_ACCEPTING))) {
   1182  1.1    rjs 				/*
   1183  1.1    rjs 				 * Here is where collision would go if we did a
   1184  1.1    rjs 				 * connect() and instead got a
   1185  1.1    rjs 				 * init/init-ack/cookie done before the
   1186  1.1    rjs 				 * init-ack came back..
   1187  1.1    rjs 				 */
   1188  1.1    rjs 				stcb->sctp_ep->sctp_flags |=
   1189  1.1    rjs 				    SCTP_PCB_FLAGS_CONNECTED;
   1190  1.1    rjs 				soisconnected(stcb->sctp_ep->sctp_socket);
   1191  1.1    rjs 			}
   1192  1.1    rjs 			/* notify upper layer */
   1193  1.1    rjs 			*notification = SCTP_NOTIFY_ASSOC_UP;
   1194  1.1    rjs 			sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb,
   1195  1.1    rjs 			    net);
   1196  1.1    rjs 			/*
   1197  1.1    rjs 			 * since we did not send a HB make sure we don't double
   1198  1.1    rjs 			 * things
   1199  1.1    rjs 			 */
   1200  1.1    rjs 			net->hb_responded = 1;
   1201  1.1    rjs 
   1202  1.1    rjs 			if (stcb->asoc.sctp_autoclose_ticks &&
   1203  1.1    rjs 			    (inp->sctp_flags & SCTP_PCB_FLAGS_AUTOCLOSE)) {
   1204  1.1    rjs 				sctp_timer_start(SCTP_TIMER_TYPE_AUTOCLOSE,
   1205  1.1    rjs 				    inp, stcb, NULL);
   1206  1.1    rjs 			}
   1207  1.1    rjs 			break;
   1208  1.1    rjs 		default:
   1209  1.1    rjs 			/*
   1210  1.1    rjs 			 * we're in the OPEN state (or beyond), so peer
   1211  1.1    rjs 			 * must have simply lost the COOKIE-ACK
   1212  1.1    rjs 			 */
   1213  1.1    rjs 			break;
   1214  1.1    rjs 		} /* end switch */
   1215  1.1    rjs 
   1216  1.1    rjs 		/*
   1217  1.1    rjs 		 * We ignore the return code here.. not sure if we should
   1218  1.1    rjs 		 * somehow abort.. but we do have an existing asoc. This
   1219  1.1    rjs 		 * really should not fail.
   1220  1.1    rjs 		 */
   1221  1.1    rjs 		if (sctp_load_addresses_from_init(stcb, m, iphlen,
   1222  1.1    rjs 		    init_offset + sizeof(struct sctp_init_chunk),
   1223  1.1    rjs 		    initack_offset, sh, init_src)) {
   1224  1.1    rjs #ifdef SCTP_DEBUG
   1225  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1226  1.1    rjs 				printf("Weird cookie load_address failure on cookie existing - 1\n");
   1227  1.1    rjs 			}
   1228  1.1    rjs #endif
   1229  1.1    rjs 			return (NULL);
   1230  1.1    rjs 		}
   1231  1.1    rjs 
   1232  1.1    rjs 		/* respond with a COOKIE-ACK */
   1233  1.1    rjs 		sctp_send_cookie_ack(stcb);
   1234  1.1    rjs 		return (stcb);
   1235  1.1    rjs 	} /* end if */
   1236  1.1    rjs 	if (ntohl(initack_cp->init.initiate_tag) != asoc->my_vtag &&
   1237  1.1    rjs 	    ntohl(init_cp->init.initiate_tag) == asoc->peer_vtag &&
   1238  1.1    rjs 	    cookie->tie_tag_my_vtag == 0 &&
   1239  1.1    rjs 	    cookie->tie_tag_peer_vtag == 0) {
   1240  1.1    rjs 		/*
   1241  1.1    rjs 		 * case C in Section 5.2.4 Table 2: XMOO
   1242  1.1    rjs 		 * silently discard
   1243  1.1    rjs 		 */
   1244  1.1    rjs 		return (NULL);
   1245  1.1    rjs 	}
   1246  1.1    rjs 	if (ntohl(initack_cp->init.initiate_tag) == asoc->my_vtag &&
   1247  1.1    rjs 	    (ntohl(init_cp->init.initiate_tag) != asoc->peer_vtag ||
   1248  1.1    rjs 	     init_cp->init.initiate_tag == 0)) {
   1249  1.1    rjs 		/*
   1250  1.1    rjs 		 * case B in Section 5.2.4 Table 2: MXAA or MOAA
   1251  1.1    rjs 		 * my info should be ok, re-accept peer info
   1252  1.1    rjs 		 */
   1253  1.1    rjs 		sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
   1254  1.1    rjs 		sctp_timer_stop(SCTP_TIMER_TYPE_INIT, inp, stcb, net);
   1255  1.1    rjs 		sctp_timer_stop(SCTP_TIMER_TYPE_COOKIE, inp, stcb, net);
   1256  1.1    rjs 		sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
   1257  1.1    rjs 		/*
   1258  1.1    rjs 		 * since we did not send a HB make sure we don't double things
   1259  1.1    rjs 		 */
   1260  1.1    rjs 		net->hb_responded = 1;
   1261  1.1    rjs 		if (stcb->asoc.sctp_autoclose_ticks &&
   1262  1.1    rjs 		    (inp->sctp_flags & SCTP_PCB_FLAGS_AUTOCLOSE)) {
   1263  1.1    rjs 			sctp_timer_start(SCTP_TIMER_TYPE_AUTOCLOSE, inp, stcb,
   1264  1.1    rjs 			    NULL);
   1265  1.1    rjs 		}
   1266  1.1    rjs 		asoc->my_rwnd = ntohl(initack_cp->init.a_rwnd);
   1267  1.1    rjs 		asoc->pre_open_streams =
   1268  1.1    rjs 		    ntohs(initack_cp->init.num_outbound_streams);
   1269  1.1    rjs 		asoc->init_seq_number = ntohl(initack_cp->init.initial_tsn);
   1270  1.1    rjs 		asoc->sending_seq = asoc->asconf_seq_out = asoc->str_reset_seq_out =
   1271  1.1    rjs 		    asoc->init_seq_number;
   1272  1.1    rjs 		asoc->t3timeout_highest_marked = asoc->asconf_seq_out;
   1273  1.1    rjs 		asoc->last_cwr_tsn = asoc->init_seq_number - 1;
   1274  1.1    rjs 		asoc->asconf_seq_in = asoc->last_acked_seq = asoc->init_seq_number - 1;
   1275  1.1    rjs 		asoc->str_reset_seq_in = asoc->init_seq_number;
   1276  1.1    rjs 		asoc->advanced_peer_ack_point = asoc->last_acked_seq;
   1277  1.1    rjs 
   1278  1.1    rjs 		/* process the INIT info (peer's info) */
   1279  1.1    rjs 		retval = sctp_process_init(init_cp, stcb, net);
   1280  1.1    rjs 		if (retval < 0) {
   1281  1.1    rjs #ifdef SCTP_DEBUG
   1282  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1283  1.1    rjs 				printf("process_cookie_existing: INIT processing failed\n");
   1284  1.1    rjs 			}
   1285  1.1    rjs #endif
   1286  1.1    rjs 			return (NULL);
   1287  1.1    rjs 		}
   1288  1.1    rjs 		if (sctp_load_addresses_from_init(stcb, m, iphlen,
   1289  1.1    rjs 		    init_offset + sizeof(struct sctp_init_chunk),
   1290  1.1    rjs 		    initack_offset, sh, init_src)) {
   1291  1.1    rjs #ifdef SCTP_DEBUG
   1292  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1293  1.1    rjs 				printf("Weird cookie load_address failure on cookie existing - 2\n");
   1294  1.1    rjs 			}
   1295  1.1    rjs #endif
   1296  1.1    rjs 			return (NULL);
   1297  1.1    rjs 		}
   1298  1.1    rjs 
   1299  1.1    rjs 		if ((asoc->state & SCTP_STATE_COOKIE_WAIT) ||
   1300  1.1    rjs 		    (asoc->state & SCTP_STATE_COOKIE_ECHOED)) {
   1301  1.1    rjs 			*notification = SCTP_NOTIFY_ASSOC_UP;
   1302  1.1    rjs 
   1303  1.1    rjs 			if (((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
   1304  1.1    rjs 			     (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) &&
   1305  1.1    rjs 			    !(stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_ACCEPTING)) {
   1306  1.1    rjs 				stcb->sctp_ep->sctp_flags |=
   1307  1.1    rjs 				    SCTP_PCB_FLAGS_CONNECTED;
   1308  1.1    rjs 				soisconnected(stcb->sctp_ep->sctp_socket);
   1309  1.1    rjs 			}
   1310  1.1    rjs 		}
   1311  1.1    rjs 		if (asoc->state & SCTP_STATE_SHUTDOWN_PENDING) {
   1312  1.1    rjs 			asoc->state = SCTP_STATE_OPEN |
   1313  1.1    rjs 			    SCTP_STATE_SHUTDOWN_PENDING;
   1314  1.1    rjs 		} else {
   1315  1.1    rjs 			asoc->state = SCTP_STATE_OPEN;
   1316  1.1    rjs 		}
   1317  1.1    rjs 		sctp_send_cookie_ack(stcb);
   1318  1.1    rjs 		return (stcb);
   1319  1.1    rjs 	}
   1320  1.1    rjs 
   1321  1.1    rjs 	if ((ntohl(initack_cp->init.initiate_tag) != asoc->my_vtag &&
   1322  1.1    rjs 	     ntohl(init_cp->init.initiate_tag) != asoc->peer_vtag) &&
   1323  1.1    rjs 	    cookie->tie_tag_my_vtag == asoc->my_vtag_nonce &&
   1324  1.1    rjs 	    cookie->tie_tag_peer_vtag == asoc->peer_vtag_nonce &&
   1325  1.1    rjs 	    cookie->tie_tag_peer_vtag != 0) {
   1326  1.1    rjs 		/*
   1327  1.1    rjs 		 * case A in Section 5.2.4 Table 2: XXMM (peer restarted)
   1328  1.1    rjs 		 */
   1329  1.1    rjs 		sctp_timer_stop(SCTP_TIMER_TYPE_INIT, inp, stcb, net);
   1330  1.1    rjs 		sctp_timer_stop(SCTP_TIMER_TYPE_COOKIE, inp, stcb, net);
   1331  1.1    rjs 		sctp_timer_stop(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
   1332  1.1    rjs 
   1333  1.1    rjs 		/* notify upper layer */
   1334  1.1    rjs 		*notification = SCTP_NOTIFY_ASSOC_RESTART;
   1335  1.1    rjs 
   1336  1.1    rjs 		/* send up all the data */
   1337  1.1    rjs 		sctp_report_all_outbound(stcb);
   1338  1.1    rjs 
   1339  1.1    rjs 		/* process the INIT-ACK info (my info) */
   1340  1.1    rjs 		asoc->my_vtag = ntohl(initack_cp->init.initiate_tag);
   1341  1.1    rjs 		asoc->my_rwnd = ntohl(initack_cp->init.a_rwnd);
   1342  1.1    rjs 		asoc->pre_open_streams =
   1343  1.1    rjs 		    ntohs(initack_cp->init.num_outbound_streams);
   1344  1.1    rjs 		asoc->init_seq_number = ntohl(initack_cp->init.initial_tsn);
   1345  1.1    rjs 		asoc->sending_seq = asoc->asconf_seq_out = asoc->str_reset_seq_out =
   1346  1.1    rjs 		    asoc->init_seq_number;
   1347  1.1    rjs 		asoc->t3timeout_highest_marked = asoc->asconf_seq_out;
   1348  1.1    rjs 		asoc->last_cwr_tsn = asoc->init_seq_number - 1;
   1349  1.1    rjs 		asoc->asconf_seq_in = asoc->last_acked_seq = asoc->init_seq_number - 1;
   1350  1.1    rjs 		asoc->str_reset_seq_in = asoc->init_seq_number;
   1351  1.1    rjs 
   1352  1.1    rjs 		asoc->advanced_peer_ack_point = asoc->last_acked_seq;
   1353  1.1    rjs 		if (asoc->mapping_array)
   1354  1.1    rjs 			memset(asoc->mapping_array, 0,
   1355  1.1    rjs 			    asoc->mapping_array_size);
   1356  1.1    rjs 		/* process the INIT info (peer's info) */
   1357  1.1    rjs 		retval = sctp_process_init(init_cp, stcb, net);
   1358  1.1    rjs 		if (retval < 0) {
   1359  1.1    rjs #ifdef SCTP_DEBUG
   1360  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1361  1.1    rjs 				printf("process_cookie_existing: INIT processing failed\n");
   1362  1.1    rjs 			}
   1363  1.1    rjs #endif
   1364  1.1    rjs 			return (NULL);
   1365  1.1    rjs 		}
   1366  1.1    rjs 
   1367  1.1    rjs 		sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, net);
   1368  1.1    rjs 		/*
   1369  1.1    rjs 		 * since we did not send a HB make sure we don't double things
   1370  1.1    rjs 		 */
   1371  1.1    rjs 		net->hb_responded = 1;
   1372  1.1    rjs 
   1373  1.1    rjs 		if (sctp_load_addresses_from_init(stcb, m, iphlen,
   1374  1.1    rjs 		    init_offset + sizeof(struct sctp_init_chunk),
   1375  1.1    rjs 		    initack_offset, sh, init_src)) {
   1376  1.1    rjs #ifdef SCTP_DEBUG
   1377  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1378  1.1    rjs 				printf("Weird cookie load_address failure on cookie existing - 3\n");
   1379  1.1    rjs 			}
   1380  1.1    rjs #endif
   1381  1.1    rjs 			return (NULL);
   1382  1.1    rjs 		}
   1383  1.1    rjs 
   1384  1.1    rjs 		if (asoc->state & SCTP_STATE_SHUTDOWN_PENDING) {
   1385  1.1    rjs 			asoc->state = SCTP_STATE_OPEN |
   1386  1.1    rjs 			    SCTP_STATE_SHUTDOWN_PENDING;
   1387  1.1    rjs 		} else if (!(asoc->state & SCTP_STATE_SHUTDOWN_SENT)) {
   1388  1.1    rjs 			/* move to OPEN state, if not in SHUTDOWN_SENT */
   1389  1.1    rjs 			asoc->state = SCTP_STATE_OPEN;
   1390  1.1    rjs 		}
   1391  1.1    rjs 		/* respond with a COOKIE-ACK */
   1392  1.1    rjs 		sctp_send_cookie_ack(stcb);
   1393  1.1    rjs 
   1394  1.1    rjs 		return (stcb);
   1395  1.1    rjs 	}
   1396  1.1    rjs 	/* all other cases... */
   1397  1.1    rjs 	return (NULL);
   1398  1.1    rjs }
   1399  1.1    rjs 
   1400  1.1    rjs /*
   1401  1.1    rjs  * handle a state cookie for a new association
   1402  1.1    rjs  * m: input packet mbuf chain-- assumes a pullup on IP/SCTP/COOKIE-ECHO chunk
   1403  1.1    rjs  *    note: this is a "split" mbuf and the cookie signature does not exist
   1404  1.1    rjs  * offset: offset into mbuf to the cookie-echo chunk
   1405  1.1    rjs  * length: length of the cookie chunk
   1406  1.1    rjs  * to: where the init was from
   1407  1.1    rjs  * returns a new TCB
   1408  1.1    rjs  */
   1409  1.1    rjs static struct sctp_tcb *
   1410  1.1    rjs sctp_process_cookie_new(struct mbuf *m, int iphlen, int offset,
   1411  1.1    rjs     struct sctphdr *sh, struct sctp_state_cookie *cookie, int cookie_len,
   1412  1.1    rjs     struct sctp_inpcb *inp, struct sctp_nets **netp,
   1413  1.1    rjs     struct sockaddr *init_src, int *notification)
   1414  1.1    rjs {
   1415  1.1    rjs 	struct sctp_tcb *stcb;
   1416  1.1    rjs 	struct sctp_init_chunk *init_cp, init_buf;
   1417  1.1    rjs 	struct sctp_init_ack_chunk *initack_cp, initack_buf;
   1418  1.1    rjs 	struct sockaddr_storage sa_store;
   1419  1.1    rjs 	struct sockaddr *initack_src = (struct sockaddr *)&sa_store;
   1420  1.1    rjs 	struct sockaddr_in *sin;
   1421  1.1    rjs 	struct sockaddr_in6 *sin6;
   1422  1.1    rjs 	struct sctp_association *asoc;
   1423  1.1    rjs 	int chk_length;
   1424  1.1    rjs 	int init_offset, initack_offset, initack_limit;
   1425  1.1    rjs 	int retval;
   1426  1.1    rjs 	int error = 0;
   1427  1.1    rjs 	/*
   1428  1.1    rjs 	 * find and validate the INIT chunk in the cookie (peer's info)
   1429  1.1    rjs 	 * the INIT should start after the cookie-echo header struct
   1430  1.1    rjs 	 * (chunk header, state cookie header struct)
   1431  1.1    rjs 	 */
   1432  1.1    rjs 	init_offset = offset + sizeof(struct sctp_cookie_echo_chunk);
   1433  1.1    rjs 	init_cp = (struct sctp_init_chunk *)
   1434  1.1    rjs 	    sctp_m_getptr(m, init_offset, sizeof(struct sctp_init_chunk),
   1435  1.1    rjs 	    (u_int8_t *)&init_buf);
   1436  1.1    rjs 	if (init_cp == NULL) {
   1437  1.1    rjs 		/* could not pull a INIT chunk in cookie */
   1438  1.1    rjs #ifdef SCTP_DEBUG
   1439  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1440  1.1    rjs 			printf("process_cookie_new: could not pull INIT chunk hdr\n");
   1441  1.1    rjs 		}
   1442  1.1    rjs #endif /* SCTP_DEBUG */
   1443  1.1    rjs 		return (NULL);
   1444  1.1    rjs 	}
   1445  1.1    rjs 	chk_length = ntohs(init_cp->ch.chunk_length);
   1446  1.1    rjs 	if (init_cp->ch.chunk_type != SCTP_INITIATION) {
   1447  1.1    rjs #ifdef SCTP_DEBUG
   1448  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1449  1.1    rjs 			printf("HUH? process_cookie_new: could not find INIT chunk!\n");
   1450  1.1    rjs 		}
   1451  1.1    rjs #endif /* SCTP_DEBUG */
   1452  1.1    rjs 		return (NULL);
   1453  1.1    rjs 	}
   1454  1.1    rjs 
   1455  1.1    rjs 	initack_offset = init_offset + SCTP_SIZE32(chk_length);
   1456  1.1    rjs 	/*
   1457  1.1    rjs 	 * find and validate the INIT-ACK chunk in the cookie (my info)
   1458  1.1    rjs 	 * the INIT-ACK follows the INIT chunk
   1459  1.1    rjs 	 */
   1460  1.1    rjs 	initack_cp = (struct sctp_init_ack_chunk *)
   1461  1.1    rjs 	    sctp_m_getptr(m, initack_offset, sizeof(struct sctp_init_ack_chunk),
   1462  1.1    rjs 	    (u_int8_t *)&initack_buf);
   1463  1.1    rjs 	if (initack_cp == NULL) {
   1464  1.1    rjs 		/* could not pull INIT-ACK chunk in cookie */
   1465  1.1    rjs #ifdef SCTP_DEBUG
   1466  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1467  1.1    rjs 			printf("process_cookie_new: could not pull INIT-ACK chunk hdr\n");
   1468  1.1    rjs 		}
   1469  1.1    rjs #endif /* SCTP_DEBUG */
   1470  1.1    rjs 		return (NULL);
   1471  1.1    rjs 	}
   1472  1.1    rjs 	chk_length = ntohs(initack_cp->ch.chunk_length);
   1473  1.1    rjs 	if (initack_cp->ch.chunk_type != SCTP_INITIATION_ACK) {
   1474  1.1    rjs #ifdef SCTP_DEBUG
   1475  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1476  1.1    rjs 			u_int8_t *pp;
   1477  1.1    rjs 			pp = (u_int8_t *)initack_cp;
   1478  1.1    rjs 			printf("process_cookie_new: could not find INIT-ACK chunk!\n");
   1479  1.1    rjs 			printf("Found bytes %x %x %x %x at postion %d\n",
   1480  1.1    rjs 			    (u_int)pp[0], (u_int)pp[1], (u_int)pp[2],
   1481  1.1    rjs 			    (u_int)pp[3], initack_offset);
   1482  1.1    rjs 		}
   1483  1.1    rjs #endif /* SCTP_DEBUG */
   1484  1.1    rjs 		return (NULL);
   1485  1.1    rjs 	}
   1486  1.1    rjs 	initack_limit = initack_offset + SCTP_SIZE32(chk_length);
   1487  1.1    rjs 
   1488  1.1    rjs 	/*
   1489  1.1    rjs 	 * now that we know the INIT/INIT-ACK are in place,
   1490  1.1    rjs 	 * create a new TCB and popluate
   1491  1.1    rjs 	 */
   1492  1.1    rjs  	stcb = sctp_aloc_assoc(inp, init_src, 0, &error, ntohl(initack_cp->init.initiate_tag));
   1493  1.1    rjs 	if (stcb == NULL) {
   1494  1.1    rjs 		struct mbuf *op_err;
   1495  1.1    rjs 		/* memory problem? */
   1496  1.1    rjs #ifdef SCTP_DEBUG
   1497  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1498  1.1    rjs 			printf("process_cookie_new: no room for another TCB!\n");
   1499  1.1    rjs 		}
   1500  1.1    rjs #endif /* SCTP_DEBUG */
   1501  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_OUT_OF_RESC);
   1502  1.1    rjs 		sctp_abort_association(inp, (struct sctp_tcb *)NULL, m, iphlen,
   1503  1.1    rjs 		    sh, op_err);
   1504  1.1    rjs 		return (NULL);
   1505  1.1    rjs 	}
   1506  1.1    rjs 
   1507  1.1    rjs 	/* get the correct sctp_nets */
   1508  1.1    rjs 	*netp = sctp_findnet(stcb, init_src);
   1509  1.1    rjs 	asoc = &stcb->asoc;
   1510  1.1    rjs 	/* get scope variables out of cookie */
   1511  1.1    rjs 	asoc->ipv4_local_scope = cookie->ipv4_scope;
   1512  1.1    rjs 	asoc->site_scope = cookie->site_scope;
   1513  1.1    rjs 	asoc->local_scope = cookie->local_scope;
   1514  1.1    rjs 	asoc->loopback_scope = cookie->loopback_scope;
   1515  1.1    rjs 
   1516  1.1    rjs 	if ((asoc->ipv4_addr_legal != cookie->ipv4_addr_legal) ||
   1517  1.1    rjs 	    (asoc->ipv6_addr_legal != cookie->ipv6_addr_legal)) {
   1518  1.1    rjs 		struct mbuf *op_err;
   1519  1.1    rjs 		/*
   1520  1.1    rjs 		 * Houston we have a problem. The EP changed while the cookie
   1521  1.1    rjs 		 * was in flight. Only recourse is to abort the association.
   1522  1.1    rjs 		 */
   1523  1.1    rjs 		op_err = sctp_generate_invmanparam(SCTP_CAUSE_OUT_OF_RESC);
   1524  1.1    rjs 		sctp_abort_association(inp, (struct sctp_tcb *)NULL, m, iphlen,
   1525  1.1    rjs 		    sh, op_err);
   1526  1.1    rjs 		return (NULL);
   1527  1.1    rjs 	}
   1528  1.1    rjs 
   1529  1.1    rjs 	/* process the INIT-ACK info (my info) */
   1530  1.1    rjs 	asoc->my_vtag = ntohl(initack_cp->init.initiate_tag);
   1531  1.1    rjs 	asoc->my_rwnd = ntohl(initack_cp->init.a_rwnd);
   1532  1.1    rjs 	asoc->pre_open_streams = ntohs(initack_cp->init.num_outbound_streams);
   1533  1.1    rjs 	asoc->init_seq_number = ntohl(initack_cp->init.initial_tsn);
   1534  1.1    rjs 	asoc->sending_seq = asoc->asconf_seq_out = asoc->str_reset_seq_out = asoc->init_seq_number;
   1535  1.1    rjs 	asoc->t3timeout_highest_marked = asoc->asconf_seq_out;
   1536  1.1    rjs 	asoc->last_cwr_tsn = asoc->init_seq_number - 1;
   1537  1.1    rjs 	asoc->asconf_seq_in = asoc->last_acked_seq = asoc->init_seq_number - 1;
   1538  1.1    rjs 	asoc->str_reset_seq_in = asoc->init_seq_number;
   1539  1.1    rjs 
   1540  1.1    rjs 	asoc->advanced_peer_ack_point = asoc->last_acked_seq;
   1541  1.1    rjs 
   1542  1.1    rjs 	/* process the INIT info (peer's info) */
   1543  1.1    rjs 	retval = sctp_process_init(init_cp, stcb, *netp);
   1544  1.1    rjs 	if (retval < 0) {
   1545  1.1    rjs #ifdef SCTP_DEBUG
   1546  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1547  1.1    rjs 			printf("process_cookie_new: INIT processing failed\n");
   1548  1.1    rjs 		}
   1549  1.1    rjs #endif
   1550  1.1    rjs 		sctp_free_assoc(inp, stcb);
   1551  1.1    rjs 		return (NULL);
   1552  1.1    rjs 	}
   1553  1.1    rjs 	/* load all addresses */
   1554  1.1    rjs 	if (sctp_load_addresses_from_init(stcb, m, iphlen,
   1555  1.1    rjs 	    init_offset + sizeof(struct sctp_init_chunk), initack_offset, sh,
   1556  1.1    rjs 	    init_src)) {
   1557  1.1    rjs 		sctp_free_assoc(inp, stcb);
   1558  1.1    rjs 		return (NULL);
   1559  1.1    rjs 	}
   1560  1.1    rjs 
   1561  1.1    rjs 	/* update current state */
   1562  1.1    rjs #ifdef SCTP_DEBUG
   1563  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1564  1.1    rjs 		printf("moving to OPEN state\n");
   1565  1.1    rjs 	}
   1566  1.1    rjs #endif
   1567  1.1    rjs 	if (asoc->state & SCTP_STATE_SHUTDOWN_PENDING) {
   1568  1.1    rjs 		asoc->state = SCTP_STATE_OPEN | SCTP_STATE_SHUTDOWN_PENDING;
   1569  1.1    rjs 	} else {
   1570  1.1    rjs 		asoc->state = SCTP_STATE_OPEN;
   1571  1.1    rjs 	}
   1572  1.1    rjs 	/* calculate the RTT */
   1573  1.1    rjs 	(*netp)->RTO = sctp_calculate_rto(stcb, asoc, *netp,
   1574  1.1    rjs 	    &cookie->time_entered);
   1575  1.1    rjs 
   1576  1.1    rjs 	/*
   1577  1.1    rjs 	 * if we're doing ASCONFs, check to see if we have any new
   1578  1.1    rjs 	 * local addresses that need to get added to the peer (eg.
   1579  1.1    rjs 	 * addresses changed while cookie echo in flight).  This needs
   1580  1.1    rjs 	 * to be done after we go to the OPEN state to do the correct
   1581  1.1    rjs 	 * asconf processing.
   1582  1.1    rjs 	 * else, make sure we have the correct addresses in our lists
   1583  1.1    rjs 	 */
   1584  1.1    rjs 
   1585  1.1    rjs 	/* warning, we re-use sin, sin6, sa_store here! */
   1586  1.1    rjs 	/* pull in local_address (our "from" address) */
   1587  1.1    rjs 	if (cookie->laddr_type == SCTP_IPV4_ADDRESS) {
   1588  1.1    rjs 		/* source addr is IPv4 */
   1589  1.1    rjs 		sin = (struct sockaddr_in *)initack_src;
   1590  1.1    rjs 		memset(sin, 0, sizeof(*sin));
   1591  1.1    rjs 		sin->sin_family = AF_INET;
   1592  1.1    rjs 		sin->sin_len = sizeof(struct sockaddr_in);
   1593  1.1    rjs 		sin->sin_addr.s_addr = cookie->laddress[0];
   1594  1.1    rjs 	} else if (cookie->laddr_type == SCTP_IPV6_ADDRESS) {
   1595  1.1    rjs 		/* source addr is IPv6 */
   1596  1.1    rjs 		sin6 = (struct sockaddr_in6 *)initack_src;
   1597  1.1    rjs 		memset(sin6, 0, sizeof(*sin6));
   1598  1.1    rjs 		sin6->sin6_family = AF_INET6;
   1599  1.1    rjs 		sin6->sin6_len = sizeof(struct sockaddr_in6);
   1600  1.1    rjs 		sin6->sin6_scope_id = cookie->scope_id;
   1601  1.1    rjs 		memcpy(&sin6->sin6_addr, cookie->laddress,
   1602  1.1    rjs 		    sizeof(sin6->sin6_addr));
   1603  1.1    rjs 	} else {
   1604  1.1    rjs 		sctp_free_assoc(inp, stcb);
   1605  1.1    rjs 		return (NULL);
   1606  1.1    rjs 	}
   1607  1.1    rjs 
   1608  1.1    rjs 	sctp_check_address_list(stcb, m, initack_offset +
   1609  1.1    rjs 	    sizeof(struct sctp_init_ack_chunk), initack_limit,
   1610  1.1    rjs 	    initack_src, cookie->local_scope, cookie->site_scope,
   1611  1.1    rjs 	    cookie->ipv4_scope, cookie->loopback_scope);
   1612  1.1    rjs 
   1613  1.1    rjs 
   1614  1.1    rjs 	/* set up to notify upper layer */
   1615  1.1    rjs 	*notification = SCTP_NOTIFY_ASSOC_UP;
   1616  1.1    rjs 	if (((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
   1617  1.1    rjs 	     (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL))  &&
   1618  1.1    rjs 	    !(stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_ACCEPTING)) {
   1619  1.1    rjs 		/*
   1620  1.1    rjs 		 * This is an endpoint that called connect()
   1621  1.1    rjs 		 * how it got a cookie that is NEW is a bit of
   1622  1.1    rjs 		 * a mystery. It must be that the INIT was sent, but
   1623  1.1    rjs 		 * before it got there.. a complete INIT/INIT-ACK/COOKIE
   1624  1.1    rjs 		 * arrived. But of course then it should have went to
   1625  1.1    rjs 		 * the other code.. not here.. oh well.. a bit of protection
   1626  1.1    rjs 		 * is worth having..
   1627  1.1    rjs 		 */
   1628  1.1    rjs 		stcb->sctp_ep->sctp_flags |= SCTP_PCB_FLAGS_CONNECTED;
   1629  1.1    rjs 		soisconnected(stcb->sctp_ep->sctp_socket);
   1630  1.1    rjs 		sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, *netp);
   1631  1.1    rjs 	} else if ((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) &&
   1632  1.1    rjs 		   (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_ACCEPTING)) {
   1633  1.1    rjs 		/*
   1634  1.1    rjs 		 * We don't want to do anything with this
   1635  1.1    rjs 		 * one. Since it is the listening guy. The timer will
   1636  1.1    rjs 		 * get started for accepted connections in the caller.
   1637  1.1    rjs 		 */
   1638  1.1    rjs 		;
   1639  1.1    rjs 	} else {
   1640  1.1    rjs 		sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp, stcb, *netp);
   1641  1.1    rjs 	}
   1642  1.1    rjs 	/* since we did not send a HB make sure we don't double things */
   1643  1.1    rjs 	(*netp)->hb_responded = 1;
   1644  1.1    rjs 
   1645  1.1    rjs 	if (stcb->asoc.sctp_autoclose_ticks &&
   1646  1.1    rjs 	    (inp->sctp_flags & SCTP_PCB_FLAGS_AUTOCLOSE)) {
   1647  1.1    rjs 		sctp_timer_start(SCTP_TIMER_TYPE_AUTOCLOSE, inp, stcb, NULL);
   1648  1.1    rjs 	}
   1649  1.1    rjs 
   1650  1.1    rjs 	/* respond with a COOKIE-ACK */
   1651  1.1    rjs 	sctp_send_cookie_ack(stcb);
   1652  1.1    rjs 
   1653  1.1    rjs 	return (stcb);
   1654  1.1    rjs }
   1655  1.1    rjs 
   1656  1.1    rjs 
   1657  1.1    rjs /*
   1658  1.1    rjs  * handles a COOKIE-ECHO message
   1659  1.1    rjs  * stcb: modified to either a new or left as existing (non-NULL) TCB
   1660  1.1    rjs  */
   1661  1.1    rjs static struct mbuf *
   1662  1.1    rjs sctp_handle_cookie_echo(struct mbuf *m, int iphlen, int offset,
   1663  1.1    rjs     struct sctphdr *sh, struct sctp_cookie_echo_chunk *cp,
   1664  1.1    rjs     struct sctp_inpcb **inp_p, struct sctp_tcb **stcb, struct sctp_nets **netp)
   1665  1.1    rjs {
   1666  1.1    rjs 	struct sctp_state_cookie *cookie;
   1667  1.1    rjs 	struct sockaddr_in6 sin6;
   1668  1.1    rjs 	struct sockaddr_in sin;
   1669  1.1    rjs 	struct sctp_tcb *l_stcb=*stcb;
   1670  1.1    rjs 	struct sctp_inpcb *l_inp;
   1671  1.1    rjs 	struct sockaddr *to;
   1672  1.1    rjs 	struct sctp_pcb *ep;
   1673  1.1    rjs 	struct mbuf *m_sig;
   1674  1.1    rjs 	uint8_t calc_sig[SCTP_SIGNATURE_SIZE], tmp_sig[SCTP_SIGNATURE_SIZE];
   1675  1.1    rjs 	uint8_t *sig;
   1676  1.1    rjs 	uint8_t cookie_ok = 0;
   1677  1.1    rjs 	unsigned int size_of_pkt, sig_offset, cookie_offset;
   1678  1.1    rjs 	unsigned int cookie_len;
   1679  1.1    rjs 	struct timeval now;
   1680  1.1    rjs 	struct timeval time_expires;
   1681  1.1    rjs 	struct sockaddr_storage dest_store;
   1682  1.1    rjs 	struct sockaddr *localep_sa = (struct sockaddr *)&dest_store;
   1683  1.1    rjs 	struct ip *iph;
   1684  1.1    rjs 	int notification = 0;
   1685  1.1    rjs 	struct sctp_nets *netl;
   1686  1.1    rjs 	int had_a_existing_tcb = 0;
   1687  1.1    rjs 
   1688  1.1    rjs #ifdef SCTP_DEBUG
   1689  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1690  1.1    rjs 		printf("sctp_handle_cookie: handling COOKIE-ECHO\n");
   1691  1.1    rjs 	}
   1692  1.1    rjs #endif
   1693  1.1    rjs 
   1694  1.1    rjs 	if (inp_p == NULL) {
   1695  1.1    rjs #ifdef SCTP_DEBUG
   1696  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1697  1.1    rjs 			printf("sctp_handle_cookie: null inp_p!\n");
   1698  1.1    rjs 		}
   1699  1.1    rjs #endif
   1700  1.1    rjs 		return (NULL);
   1701  1.1    rjs 	}
   1702  1.1    rjs 	/* First get the destination address setup too. */
   1703  1.1    rjs 	iph = mtod(m, struct ip *);
   1704  1.1    rjs 	if (iph->ip_v == IPVERSION) {
   1705  1.1    rjs 		/* its IPv4 */
   1706  1.1    rjs 		struct sockaddr_in *sin_d;
   1707  1.1    rjs 		sin_d = (struct sockaddr_in *)(localep_sa);
   1708  1.1    rjs 		memset(sin_d, 0, sizeof(*sin_d));
   1709  1.1    rjs 		sin_d->sin_family = AF_INET;
   1710  1.1    rjs 		sin_d->sin_len = sizeof(*sin_d);
   1711  1.1    rjs 		sin_d->sin_port = sh->dest_port;
   1712  1.1    rjs 		sin_d->sin_addr.s_addr = iph->ip_dst.s_addr ;
   1713  1.1    rjs 	} else if (iph->ip_v == (IPV6_VERSION >> 4)) {
   1714  1.1    rjs 		/* its IPv6 */
   1715  1.1    rjs 		struct ip6_hdr *ip6;
   1716  1.1    rjs 		struct sockaddr_in6 *sin6_d;
   1717  1.1    rjs 		sin6_d = (struct sockaddr_in6 *)(localep_sa);
   1718  1.1    rjs 		memset(sin6_d, 0, sizeof(*sin6_d));
   1719  1.1    rjs 		sin6_d->sin6_family = AF_INET6;
   1720  1.1    rjs 		sin6_d->sin6_len = sizeof(struct sockaddr_in6);
   1721  1.1    rjs 		ip6 = mtod(m, struct ip6_hdr *);
   1722  1.1    rjs 		sin6_d->sin6_port = sh->dest_port;
   1723  1.1    rjs 		sin6_d->sin6_addr = ip6->ip6_dst;
   1724  1.1    rjs 	} else {
   1725  1.1    rjs 		return (NULL);
   1726  1.1    rjs 	}
   1727  1.1    rjs 
   1728  1.1    rjs 	cookie = &cp->cookie;
   1729  1.1    rjs 	cookie_offset = offset + sizeof(struct sctp_chunkhdr);
   1730  1.1    rjs 	cookie_len = ntohs(cp->ch.chunk_length);
   1731  1.1    rjs 
   1732  1.1    rjs 	/* compute size of packet */
   1733  1.1    rjs 	if (m->m_flags & M_PKTHDR) {
   1734  1.1    rjs 		size_of_pkt = m->m_pkthdr.len;
   1735  1.1    rjs 	} else {
   1736  1.1    rjs 		/* Should have a pkt hdr really */
   1737  1.1    rjs 		struct mbuf *mat;
   1738  1.1    rjs 		mat = m;
   1739  1.1    rjs 		size_of_pkt = 0;
   1740  1.1    rjs 		while (mat != NULL) {
   1741  1.1    rjs 			size_of_pkt += mat->m_len;
   1742  1.1    rjs 			mat = mat->m_next;
   1743  1.1    rjs 		}
   1744  1.1    rjs 	}
   1745  1.1    rjs 	if (cookie_len > size_of_pkt ||
   1746  1.1    rjs 	    cookie_len < sizeof(struct sctp_cookie_echo_chunk) +
   1747  1.1    rjs 	    sizeof(struct sctp_init_chunk) +
   1748  1.1    rjs 	    sizeof(struct sctp_init_ack_chunk) + SCTP_SIGNATURE_SIZE) {
   1749  1.1    rjs 		/* cookie too long!  or too small */
   1750  1.1    rjs #ifdef SCTP_DEBUG
   1751  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1752  1.1    rjs 			printf("sctp_handle_cookie: cookie_len=%u, pkt size=%u\n", cookie_len, size_of_pkt);
   1753  1.1    rjs 		}
   1754  1.1    rjs #endif /* SCTP_DEBUG */
   1755  1.1    rjs 		return (NULL);
   1756  1.1    rjs 	}
   1757  1.7    rjs 
   1758  1.7    rjs 	if ((cookie->peerport != sh->src_port) &&
   1759  1.7    rjs 	    (cookie->myport != sh->dest_port) &&
   1760  1.7    rjs 	    (cookie->my_vtag != sh->v_tag)) {
   1761  1.7    rjs 		/*
   1762  1.7    rjs 		 * invalid ports or bad tag.  Note that we always leave
   1763  1.7    rjs 		 * the v_tag in the header in network order and when we
   1764  1.7    rjs 		 * stored it in the my_vtag slot we also left it in network
   1765  1.7    rjs 		 * order. This maintians the match even though it may be in
   1766  1.7    rjs 		 * the opposite byte order of the machine :->
   1767  1.7    rjs 		 */
   1768  1.7    rjs 		return (NULL);
   1769  1.7    rjs 	}
   1770  1.7    rjs 
   1771  1.1    rjs 	/*
   1772  1.1    rjs 	 * split off the signature into its own mbuf (since it
   1773  1.1    rjs 	 * should not be calculated in the sctp_hash_digest_m() call).
   1774  1.1    rjs 	 */
   1775  1.1    rjs 	sig_offset = offset + cookie_len - SCTP_SIGNATURE_SIZE;
   1776  1.1    rjs 	if (sig_offset > size_of_pkt) {
   1777  1.1    rjs 		/* packet not correct size! */
   1778  1.1    rjs 		/* XXX this may already be accounted for earlier... */
   1779  1.1    rjs #ifdef SCTP_DEBUG
   1780  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1781  1.1    rjs 			printf("sctp_handle_cookie: sig offset=%u, pkt size=%u\n", sig_offset, size_of_pkt);
   1782  1.1    rjs 		}
   1783  1.1    rjs #endif
   1784  1.1    rjs 		return (NULL);
   1785  1.1    rjs 	}
   1786  1.1    rjs 
   1787  1.1    rjs 	m_sig = m_split(m, sig_offset, M_DONTWAIT);
   1788  1.1    rjs 	if (m_sig == NULL) {
   1789  1.1    rjs 		/* out of memory or ?? */
   1790  1.1    rjs #ifdef SCTP_DEBUG
   1791  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1792  1.1    rjs 			printf("sctp_handle_cookie: couldn't m_split the signature\n");
   1793  1.1    rjs 		}
   1794  1.1    rjs #endif
   1795  1.1    rjs 		return (NULL);
   1796  1.1    rjs 	}
   1797  1.1    rjs 	/*
   1798  1.1    rjs 	 * compute the signature/digest for the cookie
   1799  1.1    rjs 	 */
   1800  1.1    rjs 	ep = &(*inp_p)->sctp_ep;
   1801  1.1    rjs 	l_inp = *inp_p;
   1802  1.1    rjs 	if (l_stcb) {
   1803  1.1    rjs 		SCTP_TCB_UNLOCK(l_stcb);
   1804  1.1    rjs 	}
   1805  1.1    rjs 	SCTP_INP_RLOCK(l_inp);
   1806  1.1    rjs 	if (l_stcb) {
   1807  1.1    rjs 		SCTP_TCB_LOCK(l_stcb);
   1808  1.1    rjs 	}
   1809  1.1    rjs 	/* which cookie is it? */
   1810  1.1    rjs 	if ((cookie->time_entered.tv_sec < (long)ep->time_of_secret_change) &&
   1811  1.1    rjs 	    (ep->current_secret_number != ep->last_secret_number)) {
   1812  1.1    rjs 		/* it's the old cookie */
   1813  1.1    rjs #ifdef SCTP_DEBUG
   1814  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1815  1.1    rjs 			printf("sctp_handle_cookie: old cookie sig\n");
   1816  1.1    rjs 		}
   1817  1.1    rjs #endif
   1818  1.1    rjs 		sctp_hash_digest_m((char *)ep->secret_key[(int)ep->last_secret_number],
   1819  1.1    rjs 		    SCTP_SECRET_SIZE, m, cookie_offset, calc_sig);
   1820  1.1    rjs 	} else {
   1821  1.1    rjs 		/* it's the current cookie */
   1822  1.1    rjs #ifdef SCTP_DEBUG
   1823  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1824  1.1    rjs 			printf("sctp_handle_cookie: current cookie sig\n");
   1825  1.1    rjs 		}
   1826  1.1    rjs #endif
   1827  1.1    rjs 		sctp_hash_digest_m((char *)ep->secret_key[(int)ep->current_secret_number],
   1828  1.1    rjs 		    SCTP_SECRET_SIZE, m, cookie_offset, calc_sig);
   1829  1.1    rjs 	}
   1830  1.1    rjs 	/* get the signature */
   1831  1.1    rjs 	SCTP_INP_RUNLOCK(l_inp);
   1832  1.1    rjs 	sig = (u_int8_t *)sctp_m_getptr(m_sig, 0, SCTP_SIGNATURE_SIZE, (u_int8_t *)&tmp_sig);
   1833  1.1    rjs 	if (sig == NULL) {
   1834  1.1    rjs 		/* couldn't find signature */
   1835  1.1    rjs #ifdef SCTP_DEBUG
   1836  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   1837  1.1    rjs 			printf("sctp_handle_cookie: couldn't pull the signature\n");
   1838  1.1    rjs 		}
   1839  1.1    rjs #endif
   1840  1.1    rjs 		return (NULL);
   1841  1.1    rjs 	}
   1842  1.1    rjs 	/* compare the received digest with the computed digest */
   1843  1.1    rjs 	if (memcmp(calc_sig, sig, SCTP_SIGNATURE_SIZE) != 0) {
   1844  1.1    rjs 		/* try the old cookie? */
   1845  1.1    rjs 		if ((cookie->time_entered.tv_sec == (long)ep->time_of_secret_change) &&
   1846  1.1    rjs 		    (ep->current_secret_number != ep->last_secret_number)) {
   1847  1.1    rjs 			/* compute digest with old */
   1848  1.1    rjs #ifdef SCTP_DEBUG
   1849  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1850  1.1    rjs 				printf("sctp_handle_cookie: old cookie sig\n");
   1851  1.1    rjs 			}
   1852  1.1    rjs #endif
   1853  1.1    rjs 			sctp_hash_digest_m((char *)ep->secret_key[(int)ep->last_secret_number],
   1854  1.1    rjs 			    SCTP_SECRET_SIZE, m, cookie_offset, calc_sig);
   1855  1.1    rjs 			/* compare */
   1856  1.1    rjs 			if (memcmp(calc_sig, sig, SCTP_SIGNATURE_SIZE) == 0)
   1857  1.1    rjs 				cookie_ok = 1;
   1858  1.1    rjs 		}
   1859  1.1    rjs 	} else {
   1860  1.1    rjs 		cookie_ok = 1;
   1861  1.1    rjs 	}
   1862  1.1    rjs 
   1863  1.1    rjs 	/*
   1864  1.1    rjs 	 * Now before we continue we must reconstruct our mbuf so
   1865  1.1    rjs 	 * that normal processing of any other chunks will work.
   1866  1.1    rjs 	 */
   1867  1.1    rjs 	{
   1868  1.1    rjs 		struct mbuf *m_at;
   1869  1.1    rjs 		m_at = m;
   1870  1.1    rjs 		while (m_at->m_next != NULL) {
   1871  1.1    rjs 			m_at = m_at->m_next;
   1872  1.1    rjs 		}
   1873  1.1    rjs 		m_at->m_next = m_sig;
   1874  1.1    rjs 		if (m->m_flags & M_PKTHDR) {
   1875  1.1    rjs 			/*
   1876  1.1    rjs 			 * We should only do this if and only if the front
   1877  1.1    rjs 			 * mbuf has a m_pkthdr... it should in theory.
   1878  1.1    rjs 			 */
   1879  1.1    rjs 			if (m_sig->m_flags & M_PKTHDR) {
   1880  1.1    rjs 				/* Add back to the pkt hdr of main m chain */
   1881  1.1    rjs 				m->m_pkthdr.len += m_sig->m_len;
   1882  1.1    rjs 			} else {
   1883  1.1    rjs 				/*
   1884  1.1    rjs 				 * Got a problem, no pkthdr in split chain.
   1885  1.1    rjs 				 * TSNH but we will handle it just in case
   1886  1.1    rjs 				 */
   1887  1.1    rjs 				int mmlen = 0;
   1888  1.1    rjs 				struct mbuf *lat;
   1889  1.1    rjs 				printf("Warning: Hitting m_split join TSNH code - fixed\n");
   1890  1.1    rjs 				lat = m_sig;
   1891  1.1    rjs 				while (lat) {
   1892  1.1    rjs 					mmlen += lat->m_len;
   1893  1.1    rjs 					lat = lat->m_next;
   1894  1.1    rjs 				}
   1895  1.1    rjs 				m->m_pkthdr.len += mmlen;
   1896  1.1    rjs 			}
   1897  1.1    rjs 		}
   1898  1.1    rjs 	}
   1899  1.1    rjs 
   1900  1.1    rjs 	if (cookie_ok == 0) {
   1901  1.1    rjs #ifdef SCTP_DEBUG
   1902  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1903  1.1    rjs 			printf("handle_cookie_echo: cookie signature validation failed!\n");
   1904  1.1    rjs 			printf("offset = %u, cookie_offset = %u, sig_offset = %u\n",
   1905  1.1    rjs 			    (u_int32_t)offset, cookie_offset, sig_offset);
   1906  1.1    rjs 		}
   1907  1.1    rjs #endif
   1908  1.1    rjs 		return (NULL);
   1909  1.1    rjs 	}
   1910  1.1    rjs #ifdef SCTP_DEBUG
   1911  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   1912  1.1    rjs 		printf("handle_cookie_echo: cookie signature validation passed\n");
   1913  1.1    rjs 	}
   1914  1.1    rjs #endif
   1915  1.1    rjs 
   1916  1.1    rjs 	/*
   1917  1.1    rjs 	 * check the cookie timestamps to be sure it's not stale
   1918  1.1    rjs 	 */
   1919  1.1    rjs 	SCTP_GETTIME_TIMEVAL(&now);
   1920  1.1    rjs 	/* Expire time is in Ticks, so we convert to seconds */
   1921  1.1    rjs 	time_expires.tv_sec = cookie->time_entered.tv_sec + cookie->cookie_life;
   1922  1.1    rjs 	time_expires.tv_usec = cookie->time_entered.tv_usec;
   1923  1.1    rjs #ifndef __FreeBSD__
   1924  1.1    rjs 	if (timercmp(&now, &time_expires, >))
   1925  1.1    rjs #else
   1926  1.1    rjs 	if (timevalcmp(&now, &time_expires, >))
   1927  1.1    rjs #endif
   1928  1.1    rjs 	{
   1929  1.1    rjs 		/* cookie is stale! */
   1930  1.1    rjs 		struct mbuf *op_err;
   1931  1.1    rjs 		struct sctp_stale_cookie_msg *scm;
   1932  1.1    rjs 		u_int32_t tim;
   1933  1.1    rjs #ifdef SCTP_DEBUG
   1934  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   1935  1.1    rjs 			printf("sctp_handle_cookie: got a STALE cookie!\n");
   1936  1.1    rjs 		}
   1937  1.1    rjs #endif
   1938  1.1    rjs 		MGETHDR(op_err, M_DONTWAIT, MT_HEADER);
   1939  1.1    rjs 		if (op_err == NULL) {
   1940  1.1    rjs 			/* FOOBAR */
   1941  1.1    rjs 			return (NULL);
   1942  1.1    rjs 		}
   1943  1.1    rjs 		/* pre-reserve some space */
   1944  1.1    rjs 		op_err->m_data += sizeof(struct ip6_hdr);
   1945  1.1    rjs 		op_err->m_data += sizeof(struct sctphdr);
   1946  1.1    rjs 		op_err->m_data += sizeof(struct sctp_chunkhdr);
   1947  1.1    rjs 
   1948  1.1    rjs 		/* Set the len */
   1949  1.1    rjs 		op_err->m_len = op_err->m_pkthdr.len = sizeof(struct sctp_stale_cookie_msg);
   1950  1.1    rjs 		scm = mtod(op_err, struct sctp_stale_cookie_msg *);
   1951  1.1    rjs 		scm->ph.param_type = htons(SCTP_CAUSE_STALE_COOKIE);
   1952  1.1    rjs 		scm->ph.param_length = htons((sizeof(struct sctp_paramhdr) +
   1953  1.1    rjs 		    (sizeof(u_int32_t))));
   1954  1.1    rjs 		/* seconds to usec */
   1955  1.1    rjs 		tim = (now.tv_sec - time_expires.tv_sec) * 1000000;
   1956  1.1    rjs 		/* add in usec */
   1957  1.1    rjs 		if (tim == 0)
   1958  1.1    rjs 			tim = now.tv_usec - cookie->time_entered.tv_usec;
   1959  1.1    rjs 		scm->time_usec = htonl(tim);
   1960  1.1    rjs 		sctp_send_operr_to(m, iphlen, op_err, cookie->peers_vtag);
   1961  1.1    rjs 		return (NULL);
   1962  1.1    rjs 	}
   1963  1.1    rjs 	/*
   1964  1.1    rjs 	 * Now we must see with the lookup address if we have an existing
   1965  1.1    rjs 	 * asoc. This will only happen if we were in the COOKIE-WAIT state
   1966  1.1    rjs 	 * and a INIT collided with us and somewhere the peer sent the
   1967  1.1    rjs 	 * cookie on another address besides the single address our assoc
   1968  1.1    rjs 	 * had for him. In this case we will have one of the tie-tags set
   1969  1.1    rjs 	 * at least AND the address field in the cookie can be used to
   1970  1.1    rjs 	 * look it up.
   1971  1.1    rjs 	 */
   1972  1.1    rjs 	to = NULL;
   1973  1.1    rjs 	if (cookie->addr_type == SCTP_IPV6_ADDRESS) {
   1974  1.1    rjs 		memset(&sin6, 0, sizeof(sin6));
   1975  1.1    rjs 		sin6.sin6_family = AF_INET6;
   1976  1.1    rjs 		sin6.sin6_len = sizeof(sin6);
   1977  1.1    rjs 		sin6.sin6_port = sh->src_port;
   1978  1.1    rjs 		sin6.sin6_scope_id = cookie->scope_id;
   1979  1.1    rjs 		memcpy(&sin6.sin6_addr.s6_addr, cookie->address,
   1980  1.1    rjs 		       sizeof(sin6.sin6_addr.s6_addr));
   1981  1.1    rjs 		to = (struct sockaddr *)&sin6;
   1982  1.1    rjs 	} else if (cookie->addr_type == SCTP_IPV4_ADDRESS) {
   1983  1.1    rjs 		memset(&sin, 0, sizeof(sin));
   1984  1.1    rjs 		sin.sin_family = AF_INET;
   1985  1.1    rjs 		sin.sin_len = sizeof(sin);
   1986  1.1    rjs 		sin.sin_port = sh->src_port;
   1987  1.1    rjs 		sin.sin_addr.s_addr = cookie->address[0];
   1988  1.1    rjs 		to = (struct sockaddr *)&sin;
   1989  1.1    rjs 	}
   1990  1.1    rjs 
   1991  1.1    rjs 	if ((*stcb == NULL) && to) {
   1992  1.1    rjs 		/* Yep, lets check */
   1993  1.1    rjs 		*stcb = sctp_findassociation_ep_addr(inp_p, to, netp, localep_sa, NULL);
   1994  1.1    rjs 		if (*stcb == NULL) {
   1995  1.1    rjs 			/* We should have only got back the same inp. If we
   1996  1.1    rjs 			 * got back a different ep we have a problem. The original
   1997  1.1    rjs 			 * findep got back l_inp and now
   1998  1.1    rjs 			 */
   1999  1.1    rjs 			if (l_inp != *inp_p) {
   2000  1.1    rjs 				printf("Bad problem find_ep got a diff inp then special_locate?\n");
   2001  1.1    rjs 			}
   2002  1.1    rjs 		}
   2003  1.1    rjs 	}
   2004  1.1    rjs 
   2005  1.1    rjs 	cookie_len -= SCTP_SIGNATURE_SIZE;
   2006  1.1    rjs 	if (*stcb == NULL) {
   2007  1.1    rjs 		/* this is the "normal" case... get a new TCB */
   2008  1.1    rjs #ifdef SCTP_DEBUG
   2009  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   2010  1.1    rjs 			printf("sctp_handle_cookie: processing NEW cookie\n");
   2011  1.1    rjs 		}
   2012  1.1    rjs #endif
   2013  1.1    rjs 		*stcb = sctp_process_cookie_new(m, iphlen, offset, sh, cookie,
   2014  1.1    rjs 		    cookie_len, *inp_p, netp, to, &notification);
   2015  1.1    rjs 		/* now always decrement, since this is the normal
   2016  1.1    rjs 		 * case.. we had no tcb when we entered.
   2017  1.1    rjs 		 */
   2018  1.1    rjs 	} else {
   2019  1.1    rjs 		/* this is abnormal... cookie-echo on existing TCB */
   2020  1.1    rjs #ifdef SCTP_DEBUG
   2021  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   2022  1.1    rjs 			printf("sctp_handle_cookie: processing EXISTING cookie\n");
   2023  1.1    rjs 		}
   2024  1.1    rjs #endif
   2025  1.1    rjs 		had_a_existing_tcb = 1;
   2026  1.1    rjs 		*stcb = sctp_process_cookie_existing(m, iphlen, offset, sh,
   2027  1.1    rjs 		    cookie, cookie_len, *inp_p, *stcb, *netp, to, &notification);
   2028  1.1    rjs 	}
   2029  1.1    rjs 
   2030  1.1    rjs 	if (*stcb == NULL) {
   2031  1.1    rjs 		/* still no TCB... must be bad cookie-echo */
   2032  1.1    rjs #ifdef SCTP_DEBUG
   2033  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   2034  1.1    rjs 			printf("handle_cookie_echo: ACK! don't have a TCB!\n");
   2035  1.1    rjs 		}
   2036  1.1    rjs #endif /* SCTP_DEBUG */
   2037  1.1    rjs 		return (NULL);
   2038  1.1    rjs 	}
   2039  1.1    rjs 
   2040  1.1    rjs 	/*
   2041  1.1    rjs 	 * Ok, we built an association so confirm the address
   2042  1.1    rjs 	 * we sent the INIT-ACK to.
   2043  1.1    rjs 	 */
   2044  1.1    rjs 	netl = sctp_findnet(*stcb, to);
   2045  1.1    rjs         /* This code should in theory NOT run but
   2046  1.1    rjs 	 */
   2047  1.1    rjs 	if (netl == NULL) {
   2048  1.1    rjs #ifdef SCTP_DEBUG
   2049  1.1    rjs 		printf("TSNH! Huh, why do I need to add this address here?\n");
   2050  1.1    rjs #endif
   2051  1.1    rjs 		sctp_add_remote_addr(*stcb, to, 0, 100);
   2052  1.1    rjs 		netl = sctp_findnet(*stcb, to);
   2053  1.1    rjs 	}
   2054  1.1    rjs 	if (netl) {
   2055  1.1    rjs 		if (netl->dest_state &  SCTP_ADDR_UNCONFIRMED) {
   2056  1.1    rjs 			netl->dest_state &= ~SCTP_ADDR_UNCONFIRMED;
   2057  1.1    rjs 			sctp_set_primary_addr((*stcb), (struct sockaddr *)NULL,
   2058  1.1    rjs 					      netl);
   2059  1.1    rjs 			sctp_ulp_notify(SCTP_NOTIFY_INTERFACE_CONFIRMED,
   2060  1.1    rjs 					(*stcb), 0, (void *)netl);
   2061  1.1    rjs 		}
   2062  1.1    rjs 	}
   2063  1.1    rjs #ifdef SCTP_DEBUG
   2064  1.1    rjs 	else {
   2065  1.1    rjs 		printf("Could not add source address for some reason\n");
   2066  1.1    rjs 	}
   2067  1.1    rjs #endif
   2068  1.1    rjs 
   2069  1.1    rjs 	if ((*inp_p)->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) {
   2070  1.1    rjs 		if (!had_a_existing_tcb ||
   2071  1.1    rjs 		    (((*inp_p)->sctp_flags & SCTP_PCB_FLAGS_CONNECTED) == 0)) {
   2072  1.1    rjs 			/*
   2073  1.1    rjs 			 * If we have a NEW cookie or the connect never reached
   2074  1.1    rjs 			 * the connected state during collision we must do the
   2075  1.1    rjs 			 * TCP accept thing.
   2076  1.1    rjs 			 */
   2077  1.1    rjs 			struct socket *so, *oso;
   2078  1.1    rjs 			struct sctp_inpcb *inp;
   2079  1.1    rjs 			if (notification == SCTP_NOTIFY_ASSOC_RESTART) {
   2080  1.1    rjs 				/*
   2081  1.1    rjs 				 * For a restart we will keep the same socket,
   2082  1.1    rjs 				 * no need to do anything. I THINK!!
   2083  1.1    rjs 				 */
   2084  1.1    rjs 				sctp_ulp_notify(notification, *stcb, 0, NULL);
   2085  1.1    rjs 				return (m);
   2086  1.1    rjs 			}
   2087  1.1    rjs 			oso = (*inp_p)->sctp_socket;
   2088  1.1    rjs 			SCTP_TCB_UNLOCK((*stcb));
   2089  1.1    rjs 			so = sonewconn(oso, SS_ISCONNECTED);
   2090  1.1    rjs 			SCTP_INP_WLOCK((*stcb)->sctp_ep);
   2091  1.1    rjs 			SCTP_TCB_LOCK((*stcb));
   2092  1.1    rjs 			SCTP_INP_WUNLOCK((*stcb)->sctp_ep);
   2093  1.1    rjs 			if (so == NULL) {
   2094  1.1    rjs 				struct mbuf *op_err;
   2095  1.1    rjs 				/* Too many sockets */
   2096  1.1    rjs #ifdef SCTP_DEBUG
   2097  1.1    rjs 				if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   2098  1.1    rjs 					printf("process_cookie_new: no room for another socket!\n");
   2099  1.1    rjs 				}
   2100  1.1    rjs #endif /* SCTP_DEBUG */
   2101  1.1    rjs 				op_err = sctp_generate_invmanparam(SCTP_CAUSE_OUT_OF_RESC);
   2102  1.1    rjs 				sctp_abort_association(*inp_p, NULL, m, iphlen,
   2103  1.1    rjs 				    sh, op_err);
   2104  1.1    rjs 				sctp_free_assoc(*inp_p, *stcb);
   2105  1.1    rjs 				return (NULL);
   2106  1.1    rjs 			}
   2107  1.1    rjs 			inp = (struct sctp_inpcb *)so->so_pcb;
   2108  1.1    rjs 			inp->sctp_flags = (SCTP_PCB_FLAGS_TCPTYPE |
   2109  1.1    rjs 			    SCTP_PCB_FLAGS_CONNECTED |
   2110  1.1    rjs 			    SCTP_PCB_FLAGS_IN_TCPPOOL |
   2111  1.1    rjs 			    (SCTP_PCB_COPY_FLAGS & (*inp_p)->sctp_flags) |
   2112  1.1    rjs 			    SCTP_PCB_FLAGS_DONT_WAKE);
   2113  1.1    rjs 			inp->sctp_socket = so;
   2114  1.1    rjs 
   2115  1.1    rjs 			/*
   2116  1.1    rjs 			 * Now we must move it from one hash table to another
   2117  1.1    rjs 			 * and get the tcb in the right place.
   2118  1.1    rjs 			 */
   2119  1.1    rjs 			sctp_move_pcb_and_assoc(*inp_p, inp, *stcb);
   2120  1.1    rjs 
   2121  1.1    rjs 			/* Switch over to the new guy */
   2122  1.1    rjs 			*inp_p = inp;
   2123  1.1    rjs 
   2124  1.1    rjs 			sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, inp,
   2125  1.1    rjs 			    *stcb, *netp);
   2126  1.1    rjs 
   2127  1.1    rjs 			sctp_ulp_notify(notification, *stcb, 0, NULL);
   2128  1.1    rjs 			return (m);
   2129  1.1    rjs 		}
   2130  1.1    rjs 	}
   2131  1.1    rjs 	if ((notification) && ((*inp_p)->sctp_flags & SCTP_PCB_FLAGS_UDPTYPE)) {
   2132  1.1    rjs 		sctp_ulp_notify(notification, *stcb, 0, NULL);
   2133  1.1    rjs 	}
   2134  1.1    rjs 	return (m);
   2135  1.1    rjs }
   2136  1.1    rjs 
   2137  1.1    rjs static void
   2138  1.1    rjs sctp_handle_cookie_ack(struct sctp_cookie_ack_chunk *cp,
   2139  1.1    rjs     struct sctp_tcb *stcb, struct sctp_nets *net)
   2140  1.1    rjs {
   2141  1.1    rjs 	/* cp must not be used, others call this without a c-ack :-) */
   2142  1.1    rjs 	struct sctp_association *asoc;
   2143  1.1    rjs 
   2144  1.1    rjs #ifdef SCTP_DEBUG
   2145  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   2146  1.1    rjs 		printf("sctp_handle_cookie_ack: handling COOKIE-ACK\n");
   2147  1.1    rjs 	}
   2148  1.1    rjs #endif
   2149  1.1    rjs 	if (stcb == NULL)
   2150  1.1    rjs 		return;
   2151  1.1    rjs 
   2152  1.1    rjs 	asoc = &stcb->asoc;
   2153  1.1    rjs 
   2154  1.1    rjs 	sctp_timer_stop(SCTP_TIMER_TYPE_COOKIE, stcb->sctp_ep, stcb, net);
   2155  1.1    rjs 
   2156  1.1    rjs 	/* process according to association state */
   2157  1.1    rjs 	if (SCTP_GET_STATE(asoc) == SCTP_STATE_COOKIE_ECHOED) {
   2158  1.1    rjs 		/* state change only needed when I am in right state */
   2159  1.1    rjs #ifdef SCTP_DEBUG
   2160  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   2161  1.1    rjs 			printf("moving to OPEN state\n");
   2162  1.1    rjs 		}
   2163  1.1    rjs #endif
   2164  1.1    rjs 		if (asoc->state & SCTP_STATE_SHUTDOWN_PENDING) {
   2165  1.1    rjs 			asoc->state = SCTP_STATE_OPEN | SCTP_STATE_SHUTDOWN_PENDING;
   2166  1.1    rjs 		} else {
   2167  1.1    rjs 			asoc->state = SCTP_STATE_OPEN;
   2168  1.1    rjs 		}
   2169  1.1    rjs 
   2170  1.1    rjs 		/* update RTO */
   2171  1.1    rjs 		if (asoc->overall_error_count == 0) {
   2172  1.1    rjs 			net->RTO = sctp_calculate_rto(stcb, asoc, net,
   2173  1.1    rjs 			    &asoc->time_entered);
   2174  1.1    rjs 		}
   2175  1.1    rjs 		SCTP_GETTIME_TIMEVAL(&asoc->time_entered);
   2176  1.1    rjs 		sctp_ulp_notify(SCTP_NOTIFY_ASSOC_UP, stcb, 0, NULL);
   2177  1.1    rjs 		if ((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
   2178  1.1    rjs 		    (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
   2179  1.1    rjs 			stcb->sctp_ep->sctp_flags |= SCTP_PCB_FLAGS_CONNECTED;
   2180  1.1    rjs 			soisconnected(stcb->sctp_ep->sctp_socket);
   2181  1.1    rjs 		}
   2182  1.1    rjs 		sctp_timer_start(SCTP_TIMER_TYPE_HEARTBEAT, stcb->sctp_ep,
   2183  1.1    rjs 		    stcb, net);
   2184  1.1    rjs 		/* since we did not send a HB make sure we don't double things */
   2185  1.1    rjs 		net->hb_responded = 1;
   2186  1.1    rjs 
   2187  1.1    rjs 		if (stcb->asoc.sctp_autoclose_ticks &&
   2188  1.1    rjs 		    (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_AUTOCLOSE)) {
   2189  1.1    rjs 			sctp_timer_start(SCTP_TIMER_TYPE_AUTOCLOSE,
   2190  1.1    rjs 			    stcb->sctp_ep, stcb, NULL);
   2191  1.1    rjs 		}
   2192  1.1    rjs 
   2193  1.1    rjs 		/*
   2194  1.1    rjs 		 * set ASCONF timer if ASCONFs are pending and allowed
   2195  1.1    rjs 		 * (eg. addresses changed when init/cookie echo in flight)
   2196  1.1    rjs 		 */
   2197  1.1    rjs 		if ((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_DO_ASCONF) &&
   2198  1.1    rjs 		    (stcb->asoc.peer_supports_asconf) &&
   2199  1.1    rjs 		    (!TAILQ_EMPTY(&stcb->asoc.asconf_queue))) {
   2200  1.1    rjs 			sctp_timer_start(SCTP_TIMER_TYPE_ASCONF,
   2201  1.1    rjs 			    stcb->sctp_ep, stcb,
   2202  1.1    rjs 			    stcb->asoc.primary_destination);
   2203  1.1    rjs 		}
   2204  1.1    rjs 
   2205  1.1    rjs 	}
   2206  1.1    rjs 	/* Toss the cookie if I can */
   2207  1.1    rjs 	sctp_toss_old_cookies(asoc);
   2208  1.1    rjs 	if (!TAILQ_EMPTY(&asoc->sent_queue)) {
   2209  1.1    rjs 		/* Restart the timer if we have pending data */
   2210  1.1    rjs 		struct sctp_tmit_chunk *chk;
   2211  1.1    rjs 		chk = TAILQ_FIRST(&asoc->sent_queue);
   2212  1.1    rjs 		if (chk) {
   2213  1.1    rjs 			sctp_timer_start(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep,
   2214  1.1    rjs 			    stcb, chk->whoTo);
   2215  1.1    rjs 		}
   2216  1.1    rjs 	}
   2217  1.1    rjs 
   2218  1.1    rjs }
   2219  1.1    rjs 
   2220  1.1    rjs static void
   2221  1.1    rjs sctp_handle_ecn_echo(struct sctp_ecne_chunk *cp,
   2222  1.1    rjs     struct sctp_tcb *stcb)
   2223  1.1    rjs {
   2224  1.1    rjs 	struct sctp_nets *net;
   2225  1.1    rjs 	struct sctp_tmit_chunk *lchk;
   2226  1.1    rjs 	u_int32_t tsn;
   2227  1.1    rjs 	if (ntohs(cp->ch.chunk_length) != sizeof(struct sctp_ecne_chunk)) {
   2228  1.1    rjs 		return;
   2229  1.1    rjs 	}
   2230  1.1    rjs 	sctp_pegs[SCTP_ECNE_RCVD]++;
   2231  1.1    rjs 	tsn = ntohl(cp->tsn);
   2232  1.1    rjs 	/* ECN Nonce stuff: need a resync and disable the nonce sum check */
   2233  1.1    rjs 	/* Also we make sure we disable the nonce_wait */
   2234  1.1    rjs 	lchk = TAILQ_FIRST(&stcb->asoc.send_queue);
   2235  1.1    rjs 	if (lchk == NULL) {
   2236  1.1    rjs 		stcb->asoc.nonce_resync_tsn = stcb->asoc.sending_seq;
   2237  1.1    rjs 	} else {
   2238  1.1    rjs 		stcb->asoc.nonce_resync_tsn = lchk->rec.data.TSN_seq;
   2239  1.1    rjs 	}
   2240  1.1    rjs 	stcb->asoc.nonce_wait_for_ecne = 0;
   2241  1.1    rjs 	stcb->asoc.nonce_sum_check = 0;
   2242  1.1    rjs 
   2243  1.1    rjs 	/* Find where it was sent, if possible */
   2244  1.1    rjs 	net = NULL;
   2245  1.1    rjs 	lchk = TAILQ_FIRST(&stcb->asoc.sent_queue);
   2246  1.1    rjs 	while (lchk) {
   2247  1.1    rjs 		if (lchk->rec.data.TSN_seq == tsn) {
   2248  1.1    rjs 			net = lchk->whoTo;
   2249  1.1    rjs 			break;
   2250  1.1    rjs 		}
   2251  1.1    rjs 		if (compare_with_wrap(lchk->rec.data.TSN_seq, tsn, MAX_SEQ))
   2252  1.1    rjs 			break;
   2253  1.1    rjs 		lchk = TAILQ_NEXT(lchk, sctp_next);
   2254  1.1    rjs 	}
   2255  1.1    rjs 	if (net == NULL)
   2256  1.1    rjs 		/* default is we use the primary */
   2257  1.1    rjs 		net = stcb->asoc.primary_destination;
   2258  1.1    rjs 
   2259  1.1    rjs 	if (compare_with_wrap(tsn, stcb->asoc.last_cwr_tsn, MAX_TSN)) {
   2260  1.1    rjs #ifdef SCTP_CWND_LOGGING
   2261  1.1    rjs 		int old_cwnd;
   2262  1.1    rjs #endif
   2263  1.1    rjs #ifdef SCTP_CWND_LOGGING
   2264  1.1    rjs 		old_cwnd = net->cwnd;
   2265  1.1    rjs #endif
   2266  1.1    rjs 		sctp_pegs[SCTP_CWR_PERFO]++;
   2267  1.1    rjs 		net->ssthresh = net->cwnd / 2;
   2268  1.1    rjs 		if (net->ssthresh < net->mtu) {
   2269  1.1    rjs 			net->ssthresh = net->mtu;
   2270  1.1    rjs 			/* here back off the timer as well, to slow us down */
   2271  1.1    rjs 			net->RTO <<= 2;
   2272  1.1    rjs 		}
   2273  1.1    rjs 		net->cwnd = net->ssthresh;
   2274  1.1    rjs #ifdef SCTP_CWND_LOGGING
   2275  1.1    rjs 		sctp_log_cwnd(net, (net->cwnd-old_cwnd), SCTP_CWND_LOG_FROM_SAT);
   2276  1.1    rjs #endif
   2277  1.1    rjs 		/* we reduce once every RTT. So we will only lower
   2278  1.1    rjs 		 * cwnd at the next sending seq i.e. the resync_tsn.
   2279  1.1    rjs 		 */
   2280  1.1    rjs 		stcb->asoc.last_cwr_tsn = stcb->asoc.nonce_resync_tsn;
   2281  1.1    rjs 	}
   2282  1.1    rjs 	/*
   2283  1.1    rjs 	 * We always send a CWR this way if our previous one was lost
   2284  1.1    rjs 	 * our peer will get an update, or if it is not time again
   2285  1.1    rjs 	 * to reduce we still get the cwr to the peer.
   2286  1.1    rjs 	 */
   2287  1.1    rjs 	sctp_send_cwr(stcb, net, tsn);
   2288  1.1    rjs }
   2289  1.1    rjs 
   2290  1.1    rjs static void
   2291  1.1    rjs sctp_handle_ecn_cwr(struct sctp_cwr_chunk *cp, struct sctp_tcb *stcb)
   2292  1.1    rjs {
   2293  1.1    rjs 	/* Here we get a CWR from the peer. We must look in
   2294  1.1    rjs 	 * the outqueue and make sure that we have a covered
   2295  1.1    rjs 	 * ECNE in teh control chunk part. If so remove it.
   2296  1.1    rjs 	 */
   2297  1.1    rjs 	struct sctp_tmit_chunk *chk;
   2298  1.1    rjs 	struct sctp_ecne_chunk *ecne;
   2299  1.1    rjs 
   2300  1.1    rjs 	TAILQ_FOREACH(chk, &stcb->asoc.control_send_queue, sctp_next) {
   2301  1.1    rjs 		if (chk->rec.chunk_id != SCTP_ECN_ECHO) {
   2302  1.1    rjs 			continue;
   2303  1.1    rjs 		}
   2304  1.1    rjs 		/* Look for and remove if it is the right TSN. Since
   2305  1.1    rjs 		 * there is only ONE ECNE on the control queue at
   2306  1.1    rjs 		 * any one time we don't need to worry about more than
   2307  1.1    rjs 		 * one!
   2308  1.1    rjs 		 */
   2309  1.1    rjs 		ecne = mtod(chk->data, struct sctp_ecne_chunk *);
   2310  1.1    rjs 		if (compare_with_wrap(ntohl(cp->tsn), ntohl(ecne->tsn),
   2311  1.1    rjs 		    MAX_TSN) || (cp->tsn == ecne->tsn)) {
   2312  1.1    rjs 			/* this covers this ECNE, we can remove it */
   2313  1.1    rjs 			TAILQ_REMOVE(&stcb->asoc.control_send_queue, chk,
   2314  1.1    rjs 			    sctp_next);
   2315  1.1    rjs 			if (chk->data) {
   2316  1.1    rjs 				sctp_m_freem(chk->data);
   2317  1.1    rjs 				chk->data = NULL;
   2318  1.1    rjs 			}
   2319  1.1    rjs 			stcb->asoc.ctrl_queue_cnt--;
   2320  1.1    rjs 			sctp_free_remote_addr(chk->whoTo);
   2321  1.1    rjs 			SCTP_ZONE_FREE(sctppcbinfo.ipi_zone_chunk, chk);
   2322  1.1    rjs 			sctppcbinfo.ipi_count_chunk--;
   2323  1.1    rjs 			if ((int)sctppcbinfo.ipi_count_chunk < 0) {
   2324  1.1    rjs 				panic("Chunk count is negative");
   2325  1.1    rjs 			}
   2326  1.1    rjs 			sctppcbinfo.ipi_gencnt_chunk++;
   2327  1.1    rjs 			break;
   2328  1.1    rjs 		}
   2329  1.1    rjs 	}
   2330  1.1    rjs }
   2331  1.1    rjs 
   2332  1.1    rjs static void
   2333  1.1    rjs sctp_handle_shutdown_complete(struct sctp_shutdown_complete_chunk *cp,
   2334  1.1    rjs     struct sctp_tcb *stcb, struct sctp_nets *net)
   2335  1.1    rjs {
   2336  1.1    rjs 	struct sctp_association *asoc;
   2337  1.1    rjs 
   2338  1.1    rjs #ifdef SCTP_DEBUG
   2339  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   2340  1.1    rjs 		printf("sctp_handle_shutdown_complete: handling SHUTDOWN-COMPLETE\n");
   2341  1.1    rjs 	}
   2342  1.1    rjs #endif
   2343  1.1    rjs 	if (stcb == NULL)
   2344  1.1    rjs 		return;
   2345  1.1    rjs 
   2346  1.1    rjs 	asoc = &stcb->asoc;
   2347  1.1    rjs 	/* process according to association state */
   2348  1.1    rjs 	if (SCTP_GET_STATE(asoc) != SCTP_STATE_SHUTDOWN_ACK_SENT) {
   2349  1.1    rjs 		/* unexpected SHUTDOWN-COMPLETE... so ignore... */
   2350  1.1    rjs 		return;
   2351  1.1    rjs 	}
   2352  1.1    rjs 	/* notify upper layer protocol */
   2353  1.1    rjs 	sctp_ulp_notify(SCTP_NOTIFY_ASSOC_DOWN, stcb, 0, NULL);
   2354  1.1    rjs 	if ((stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_TCPTYPE) ||
   2355  1.1    rjs 	    (stcb->sctp_ep->sctp_flags & SCTP_PCB_FLAGS_IN_TCPPOOL)) {
   2356  1.1    rjs 		stcb->sctp_ep->sctp_flags &= ~SCTP_PCB_FLAGS_CONNECTED;
   2357  1.1    rjs 		stcb->sctp_ep->sctp_socket->so_snd.sb_cc = 0;
   2358  1.1    rjs 		stcb->sctp_ep->sctp_socket->so_snd.sb_mbcnt = 0;
   2359  1.1    rjs 		soisdisconnected(stcb->sctp_ep->sctp_socket);
   2360  1.1    rjs 	}
   2361  1.1    rjs 	/* are the queues empty? they should be */
   2362  1.1    rjs 	if (!TAILQ_EMPTY(&asoc->send_queue) ||
   2363  1.1    rjs 	    !TAILQ_EMPTY(&asoc->sent_queue) ||
   2364  1.1    rjs 	    !TAILQ_EMPTY(&asoc->out_wheel)) {
   2365  1.1    rjs 		sctp_report_all_outbound(stcb);
   2366  1.1    rjs 	}
   2367  1.1    rjs 	/* stop the timer */
   2368  1.1    rjs 	sctp_timer_stop(SCTP_TIMER_TYPE_SHUTDOWN, stcb->sctp_ep, stcb, net);
   2369  1.1    rjs 	/* free the TCB */
   2370  1.1    rjs 	sctp_free_assoc(stcb->sctp_ep, stcb);
   2371  1.1    rjs 	return;
   2372  1.1    rjs }
   2373  1.1    rjs 
   2374  1.1    rjs static int
   2375  1.1    rjs process_chunk_drop(struct sctp_tcb *stcb, struct sctp_chunk_desc *desc,
   2376  1.1    rjs     struct sctp_nets *net, u_int8_t flg)
   2377  1.1    rjs {
   2378  1.1    rjs 	switch (desc->chunk_type) {
   2379  1.1    rjs 	case SCTP_DATA:
   2380  1.1    rjs 		/* find the tsn to resend (possibly */
   2381  1.1    rjs 	{
   2382  1.1    rjs 		u_int32_t tsn;
   2383  1.1    rjs 		struct sctp_tmit_chunk *tp1;
   2384  1.1    rjs 		tsn = ntohl(desc->tsn_ifany);
   2385  1.1    rjs 		tp1 = TAILQ_FIRST(&stcb->asoc.sent_queue);
   2386  1.1    rjs 		while (tp1) {
   2387  1.1    rjs 			if (tp1->rec.data.TSN_seq == tsn) {
   2388  1.1    rjs 				/* found it */
   2389  1.1    rjs 				break;
   2390  1.1    rjs 			}
   2391  1.1    rjs 			if (compare_with_wrap(tp1->rec.data.TSN_seq, tsn,
   2392  1.1    rjs 					      MAX_TSN)) {
   2393  1.1    rjs 				/* not found */
   2394  1.1    rjs 				tp1 = NULL;
   2395  1.1    rjs 				break;
   2396  1.1    rjs 			}
   2397  1.1    rjs 			tp1 = TAILQ_NEXT(tp1, sctp_next);
   2398  1.1    rjs 		}
   2399  1.1    rjs 		if (tp1 == NULL) {
   2400  1.1    rjs 			/* Do it the other way */
   2401  1.1    rjs 			sctp_pegs[SCTP_PDRP_DNFND]++;
   2402  1.1    rjs 			tp1 = TAILQ_FIRST(&stcb->asoc.sent_queue);
   2403  1.1    rjs 			while (tp1) {
   2404  1.1    rjs 				if (tp1->rec.data.TSN_seq == tsn) {
   2405  1.1    rjs 					/* found it */
   2406  1.1    rjs 					break;
   2407  1.1    rjs 				}
   2408  1.1    rjs 				tp1 = TAILQ_NEXT(tp1, sctp_next);
   2409  1.1    rjs 			}
   2410  1.1    rjs 		}
   2411  1.1    rjs 		if (tp1 == NULL) {
   2412  1.1    rjs 			sctp_pegs[SCTP_PDRP_TSNNF]++;
   2413  1.1    rjs 		}
   2414  1.1    rjs 		if ((tp1) && (tp1->sent < SCTP_DATAGRAM_ACKED)) {
   2415  1.1    rjs 			u_int8_t *ddp;
   2416  1.1    rjs 			if (((tp1->rec.data.state_flags & SCTP_WINDOW_PROBE) == SCTP_WINDOW_PROBE) &&
   2417  1.1    rjs 			    ((flg & SCTP_FROM_MIDDLE_BOX) == 0)) {
   2418  1.1    rjs 				sctp_pegs[SCTP_PDRP_DIWNP]++;
   2419  1.1    rjs 				return (0);
   2420  1.1    rjs 			}
   2421  1.1    rjs 			if (stcb->asoc.peers_rwnd == 0 &&
   2422  1.1    rjs 			    (flg & SCTP_FROM_MIDDLE_BOX)) {
   2423  1.1    rjs 				sctp_pegs[SCTP_PDRP_DIZRW]++;
   2424  1.1    rjs 				return (0);
   2425  1.1    rjs 			}
   2426  1.1    rjs 			ddp = (u_int8_t *)(mtod(tp1->data, vaddr_t) +
   2427  1.1    rjs 			    sizeof(struct sctp_data_chunk));
   2428  1.1    rjs 			{
   2429  1.1    rjs 				unsigned int iii;
   2430  1.1    rjs 				for (iii = 0; iii < sizeof(desc->data_bytes);
   2431  1.1    rjs 				    iii++) {
   2432  1.1    rjs 					if (ddp[iii] != desc->data_bytes[iii]) {
   2433  1.1    rjs 						sctp_pegs[SCTP_PDRP_BADD]++;
   2434  1.1    rjs 						return (-1);
   2435  1.1    rjs 					}
   2436  1.1    rjs 				}
   2437  1.1    rjs 			}
   2438  1.1    rjs 			if (tp1->sent != SCTP_DATAGRAM_RESEND) {
   2439  1.1    rjs 				stcb->asoc.sent_queue_retran_cnt++;
   2440  1.1    rjs 			}
   2441  1.1    rjs 			/* We zero out the nonce so resync not needed */
   2442  1.1    rjs 			tp1->rec.data.ect_nonce = 0;
   2443  1.1    rjs 
   2444  1.1    rjs 			if (tp1->do_rtt) {
   2445  1.1    rjs 				/*
   2446  1.1    rjs 				 * this guy had a RTO calculation pending on it,
   2447  1.1    rjs 				 * cancel it
   2448  1.1    rjs 				 */
   2449  1.1    rjs 				tp1->whoTo->rto_pending = 0;
   2450  1.1    rjs 				tp1->do_rtt = 0;
   2451  1.1    rjs 			}
   2452  1.1    rjs 			sctp_pegs[SCTP_PDRP_MARK]++;
   2453  1.1    rjs 			tp1->sent = SCTP_DATAGRAM_RESEND;
   2454  1.1    rjs 			/*
   2455  1.1    rjs 			 * mark it as if we were doing a FR, since we
   2456  1.1    rjs 			 * will be getting gap ack reports behind the
   2457  1.1    rjs 			 * info from the router.
   2458  1.1    rjs 			 */
   2459  1.1    rjs  			tp1->rec.data.doing_fast_retransmit = 1;
   2460  1.1    rjs 			/*
   2461  1.1    rjs 			 * mark the tsn with what sequences can cause a new FR.
   2462  1.1    rjs 			 */
   2463  1.1    rjs 			if (TAILQ_EMPTY(&stcb->asoc.send_queue) ) {
   2464  1.1    rjs 				tp1->rec.data.fast_retran_tsn = stcb->asoc.sending_seq;
   2465  1.1    rjs 			} else {
   2466  1.1    rjs 				tp1->rec.data.fast_retran_tsn = (TAILQ_FIRST(&stcb->asoc.send_queue))->rec.data.TSN_seq;
   2467  1.1    rjs 			}
   2468  1.1    rjs 
   2469  1.1    rjs 			/* restart the timer */
   2470  1.1    rjs 			sctp_timer_stop(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep,
   2471  1.1    rjs 			    stcb, tp1->whoTo);
   2472  1.1    rjs 			sctp_timer_start(SCTP_TIMER_TYPE_SEND, stcb->sctp_ep,
   2473  1.1    rjs 			    stcb, tp1->whoTo);
   2474  1.1    rjs 
   2475  1.1    rjs 			/* fix counts and things */
   2476  1.1    rjs 			sctp_flight_size_decrease(tp1);
   2477  1.1    rjs 			sctp_total_flight_decrease(stcb, tp1);
   2478  1.1    rjs 			tp1->snd_count--;
   2479  1.1    rjs 		}
   2480  1.1    rjs 		{
   2481  1.1    rjs 			/* audit code */
   2482  1.1    rjs 			unsigned int audit;
   2483  1.1    rjs 			audit = 0;
   2484  1.1    rjs 			TAILQ_FOREACH(tp1, &stcb->asoc.sent_queue, sctp_next) {
   2485  1.1    rjs 				if (tp1->sent == SCTP_DATAGRAM_RESEND)
   2486  1.1    rjs 					audit++;
   2487  1.1    rjs 			}
   2488  1.1    rjs 			TAILQ_FOREACH(tp1, &stcb->asoc.control_send_queue,
   2489  1.1    rjs 			    sctp_next) {
   2490  1.1    rjs 				if (tp1->sent == SCTP_DATAGRAM_RESEND)
   2491  1.1    rjs 					audit++;
   2492  1.1    rjs 			}
   2493  1.1    rjs 			if (audit != stcb->asoc.sent_queue_retran_cnt) {
   2494  1.1    rjs 				printf("**Local Audit finds cnt:%d asoc cnt:%d\n",
   2495  1.1    rjs 				    audit, stcb->asoc.sent_queue_retran_cnt);
   2496  1.1    rjs #ifndef SCTP_AUDITING_ENABLED
   2497  1.1    rjs 				stcb->asoc.sent_queue_retran_cnt = audit;
   2498  1.1    rjs #endif
   2499  1.1    rjs 			}
   2500  1.1    rjs 		}
   2501  1.1    rjs 	}
   2502  1.1    rjs 	break;
   2503  1.1    rjs 	case SCTP_ASCONF:
   2504  1.1    rjs 	{
   2505  1.1    rjs 		struct sctp_tmit_chunk *asconf;
   2506  1.1    rjs 		TAILQ_FOREACH(asconf, &stcb->asoc.control_send_queue,
   2507  1.1    rjs 		    sctp_next) {
   2508  1.1    rjs 			if (asconf->rec.chunk_id == SCTP_ASCONF) {
   2509  1.1    rjs 				break;
   2510  1.1    rjs 			}
   2511  1.1    rjs 		}
   2512  1.1    rjs 		if (asconf) {
   2513  1.1    rjs 			if (asconf->sent != SCTP_DATAGRAM_RESEND)
   2514  1.1    rjs 				stcb->asoc.sent_queue_retran_cnt++;
   2515  1.1    rjs 			asconf->sent = SCTP_DATAGRAM_RESEND;
   2516  1.1    rjs 			asconf->snd_count--;
   2517  1.1    rjs 		}
   2518  1.1    rjs 	}
   2519  1.1    rjs 	break;
   2520  1.1    rjs 	case SCTP_INITIATION:
   2521  1.1    rjs 		/* resend the INIT */
   2522  1.1    rjs 		stcb->asoc.dropped_special_cnt++;
   2523  1.1    rjs 		if (stcb->asoc.dropped_special_cnt < SCTP_RETRY_DROPPED_THRESH) {
   2524  1.1    rjs 			/*
   2525  1.1    rjs 			 * If we can get it in, in a few attempts we do this,
   2526  1.1    rjs 			 * otherwise we let the timer fire.
   2527  1.1    rjs 			 */
   2528  1.1    rjs 			sctp_timer_stop(SCTP_TIMER_TYPE_INIT, stcb->sctp_ep,
   2529  1.1    rjs 			    stcb, net);
   2530  1.1    rjs 			sctp_send_initiate(stcb->sctp_ep, stcb);
   2531  1.1    rjs 		}
   2532  1.1    rjs 		break;
   2533  1.1    rjs 	case SCTP_SELECTIVE_ACK:
   2534  1.1    rjs 		/* resend the sack */
   2535  1.1    rjs 		sctp_send_sack(stcb);
   2536  1.1    rjs 		break;
   2537  1.1    rjs 	case SCTP_HEARTBEAT_REQUEST:
   2538  1.1    rjs 		/* resend a demand HB */
   2539  1.1    rjs 		sctp_send_hb(stcb, 1, net);
   2540  1.1    rjs 		break;
   2541  1.1    rjs 	case SCTP_SHUTDOWN:
   2542  1.1    rjs #ifdef SCTP_DEBUG
   2543  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_OUTPUT4) {
   2544  1.1    rjs 			printf("%s:%d sends a shutdown\n",
   2545  1.1    rjs 			       __FILE__,
   2546  1.1    rjs 			       __LINE__
   2547  1.1    rjs 				);
   2548  1.1    rjs 		}
   2549  1.1    rjs #endif
   2550  1.1    rjs 		sctp_send_shutdown(stcb, net);
   2551  1.1    rjs 		break;
   2552  1.1    rjs 	case SCTP_SHUTDOWN_ACK:
   2553  1.1    rjs 		sctp_send_shutdown_ack(stcb, net);
   2554  1.1    rjs 		break;
   2555  1.1    rjs 	case SCTP_COOKIE_ECHO:
   2556  1.1    rjs 	{
   2557  1.1    rjs 		struct sctp_tmit_chunk *cookie;
   2558  1.1    rjs 		cookie = NULL;
   2559  1.1    rjs 		TAILQ_FOREACH(cookie, &stcb->asoc.control_send_queue,
   2560  1.1    rjs 		    sctp_next) {
   2561  1.1    rjs 			if (cookie->rec.chunk_id == SCTP_COOKIE_ECHO) {
   2562  1.1    rjs 				break;
   2563  1.1    rjs 			}
   2564  1.1    rjs 		}
   2565  1.1    rjs 		if (cookie) {
   2566  1.1    rjs 			if (cookie->sent != SCTP_DATAGRAM_RESEND)
   2567  1.1    rjs 				stcb->asoc.sent_queue_retran_cnt++;
   2568  1.1    rjs 			cookie->sent = SCTP_DATAGRAM_RESEND;
   2569  1.1    rjs 			sctp_timer_stop(SCTP_TIMER_TYPE_COOKIE, stcb->sctp_ep, stcb, net);
   2570  1.1    rjs 		}
   2571  1.1    rjs 	}
   2572  1.1    rjs 	break;
   2573  1.1    rjs 	case SCTP_COOKIE_ACK:
   2574  1.1    rjs 		sctp_send_cookie_ack(stcb);
   2575  1.1    rjs 		break;
   2576  1.1    rjs 	case SCTP_ASCONF_ACK:
   2577  1.1    rjs 		/* resend last asconf ack */
   2578  1.1    rjs 		sctp_send_asconf_ack(stcb, 1);
   2579  1.1    rjs 		break;
   2580  1.1    rjs 	case SCTP_FORWARD_CUM_TSN:
   2581  1.1    rjs 		send_forward_tsn(stcb, &stcb->asoc);
   2582  1.1    rjs 		break;
   2583  1.1    rjs 		/* can't do anything with these */
   2584  1.1    rjs 	case SCTP_PACKET_DROPPED:
   2585  1.1    rjs 	case SCTP_INITIATION_ACK:	/* this should not happen */
   2586  1.1    rjs 	case SCTP_HEARTBEAT_ACK:
   2587  1.1    rjs 	case SCTP_ABORT_ASSOCIATION:
   2588  1.1    rjs 	case SCTP_OPERATION_ERROR:
   2589  1.1    rjs 	case SCTP_SHUTDOWN_COMPLETE:
   2590  1.1    rjs 	case SCTP_ECN_ECHO:
   2591  1.1    rjs 	case SCTP_ECN_CWR:
   2592  1.1    rjs 	default:
   2593  1.1    rjs 		break;
   2594  1.1    rjs 	}
   2595  1.1    rjs 	return (0);
   2596  1.1    rjs }
   2597  1.1    rjs 
   2598  1.1    rjs static void
   2599  1.1    rjs sctp_reset_in_stream(struct sctp_tcb *stcb,
   2600  1.1    rjs     struct sctp_stream_reset_response *resp, int number_entries)
   2601  1.1    rjs {
   2602  1.1    rjs 	int i;
   2603  1.1    rjs 	uint16_t *list, temp;
   2604  1.1    rjs 
   2605  1.1    rjs         /* We set things to 0xffff since this is the last delivered
   2606  1.1    rjs 	 * sequence and we will be sending in 0 after the reset.
   2607  1.1    rjs 	 */
   2608  1.1    rjs 
   2609  1.1    rjs 	if (resp->reset_flags & SCTP_RESET_PERFORMED) {
   2610  1.1    rjs 		if (number_entries) {
   2611  1.1    rjs 			list = resp->list_of_streams;
   2612  1.1    rjs 			for (i = 0; i < number_entries; i++) {
   2613  1.1    rjs 				temp = ntohs(list[i]);
   2614  1.1    rjs 				list[i] = temp;
   2615  1.1    rjs 				if (list[i] >= stcb->asoc.streamincnt) {
   2616  1.1    rjs 					printf("Invalid stream in-stream reset %d\n", list[i]);
   2617  1.1    rjs 					continue;
   2618  1.1    rjs 				}
   2619  1.1    rjs 				stcb->asoc.strmin[(list[i])].last_sequence_delivered = 0xffff;
   2620  1.1    rjs 			}
   2621  1.1    rjs 		} else {
   2622  1.1    rjs 			list = NULL;
   2623  1.1    rjs 			for (i = 0; i < stcb->asoc.streamincnt; i++) {
   2624  1.1    rjs 				stcb->asoc.strmin[i].last_sequence_delivered = 0xffff;
   2625  1.1    rjs 			}
   2626  1.1    rjs 		}
   2627  1.1    rjs 		sctp_ulp_notify(SCTP_NOTIFY_STR_RESET_RECV, stcb, number_entries, (void *)list);
   2628  1.1    rjs 	}
   2629  1.1    rjs }
   2630  1.1    rjs 
   2631  1.1    rjs static void
   2632  1.1    rjs sctp_clean_up_stream_reset(struct sctp_tcb *stcb)
   2633  1.1    rjs {
   2634  1.1    rjs 	struct sctp_tmit_chunk *chk, *nchk;
   2635  1.1    rjs 	struct sctp_association *asoc;
   2636  1.1    rjs 
   2637  1.1    rjs 	asoc = &stcb->asoc;
   2638  1.1    rjs 
   2639  1.1    rjs 	for (chk = TAILQ_FIRST(&asoc->control_send_queue);
   2640  1.1    rjs 	    chk; chk = nchk) {
   2641  1.1    rjs 		nchk = TAILQ_NEXT(chk, sctp_next);
   2642  1.1    rjs 		if (chk->rec.chunk_id == SCTP_STREAM_RESET) {
   2643  1.1    rjs 			struct sctp_stream_reset_req *strreq;
   2644  1.1    rjs 			strreq = mtod(chk->data, struct sctp_stream_reset_req *);
   2645  1.1    rjs 			if (strreq->sr_req.ph.param_type == ntohs(SCTP_STR_RESET_RESPONSE)) {
   2646  1.1    rjs 				/* we only clean up the request */
   2647  1.1    rjs 				continue;
   2648  1.1    rjs 			} else if (strreq->sr_req.ph.param_type != ntohs(SCTP_STR_RESET_REQUEST)) {
   2649  1.1    rjs 				printf("TSNH, an unknown stream reset request is in queue %x\n",
   2650  1.1    rjs 				       (u_int)ntohs(strreq->sr_req.ph.param_type));
   2651  1.1    rjs 				continue;
   2652  1.1    rjs 			}
   2653  1.1    rjs 			sctp_timer_stop(SCTP_TIMER_TYPE_STRRESET, stcb->sctp_ep, stcb, chk->whoTo);
   2654  1.1    rjs 			TAILQ_REMOVE(&asoc->control_send_queue,
   2655  1.1    rjs 				     chk,
   2656  1.1    rjs 				     sctp_next);
   2657  1.1    rjs 			if (chk->data) {
   2658  1.1    rjs 				sctp_m_freem(chk->data);
   2659  1.1    rjs 				chk->data = NULL;
   2660  1.1    rjs 			}
   2661  1.1    rjs 			asoc->ctrl_queue_cnt--;
   2662  1.1    rjs 			sctp_free_remote_addr(chk->whoTo);
   2663  1.1    rjs 			SCTP_ZONE_FREE(sctppcbinfo.ipi_zone_chunk, chk);
   2664  1.1    rjs 			sctppcbinfo.ipi_count_chunk--;
   2665  1.1    rjs 			if ((int)sctppcbinfo.ipi_count_chunk < 0) {
   2666  1.1    rjs 				panic("Chunk count is negative");
   2667  1.1    rjs 			}
   2668  1.1    rjs 			sctppcbinfo.ipi_gencnt_chunk++;
   2669  1.1    rjs 			/* we can only have one of these so we break */
   2670  1.1    rjs 			break;
   2671  1.1    rjs 		}
   2672  1.1    rjs 	}
   2673  1.1    rjs }
   2674  1.1    rjs 
   2675  1.1    rjs 
   2676  1.1    rjs void
   2677  1.1    rjs sctp_handle_stream_reset_response(struct sctp_tcb *stcb,
   2678  1.1    rjs 	struct sctp_stream_reset_response *resp)
   2679  1.1    rjs {
   2680  1.1    rjs  	uint32_t seq, tsn;
   2681  1.1    rjs  	int number_entries, param_length;
   2682  1.1    rjs 
   2683  1.1    rjs  	param_length = ntohs(resp->ph.param_length);
   2684  1.1    rjs  	seq = ntohl(resp->reset_req_seq_resp);
   2685  1.1    rjs 	if (seq == stcb->asoc.str_reset_seq_out) {
   2686  1.1    rjs  		sctp_clean_up_stream_reset(stcb);
   2687  1.1    rjs  		stcb->asoc.str_reset_seq_out++;
   2688  1.1    rjs  		stcb->asoc.stream_reset_outstanding = 0;
   2689  1.1    rjs  		tsn = ntohl(resp->reset_at_tsn);
   2690  1.1    rjs  		number_entries = (param_length - sizeof(struct sctp_stream_reset_response))/sizeof(uint16_t);
   2691  1.1    rjs  		tsn--;
   2692  1.1    rjs  		if ((tsn == stcb->asoc.cumulative_tsn) ||
   2693  1.1    rjs  		    (compare_with_wrap(stcb->asoc.cumulative_tsn, tsn, MAX_TSN))) {
   2694  1.1    rjs  			/* no problem we are good to go */
   2695  1.1    rjs  			sctp_reset_in_stream(stcb, resp, number_entries);
   2696  1.1    rjs  		} else {
   2697  1.1    rjs  			/* So, we have a stream reset but there
   2698  1.1    rjs  			 * is pending data. We need to copy
   2699  1.1    rjs  			 * out the stream_reset and then queue
   2700  1.1    rjs  			 * any data = or > resp->reset_at_tsn
   2701  1.1    rjs  			 */
   2702  1.1    rjs  			if (stcb->asoc.pending_reply != NULL) {
   2703  1.1    rjs  				/* FIX ME FIX ME
   2704  1.1    rjs  				 * This IS WRONG. We need
   2705  1.1    rjs  				 * to queue each of these up
   2706  1.1    rjs  				 * and only release the chunks
   2707  1.1    rjs  				 * for each reset that the cum-ack
   2708  1.1    rjs  				 * goes by. This is a short cut.
   2709  1.1    rjs  				 */
   2710  1.1    rjs  				free(stcb->asoc.pending_reply, M_PCB);
   2711  1.1    rjs  			}
   2712  1.1    rjs  			stcb->asoc.pending_reply = malloc(param_length,
   2713  1.1    rjs  			       				M_PCB, M_NOWAIT);
   2714  1.1    rjs  			memcpy(stcb->asoc.pending_reply, resp, param_length);
   2715  1.1    rjs  		}
   2716  1.1    rjs 
   2717  1.1    rjs   	} else {
   2718  1.1    rjs  		/* duplicate */
   2719  1.1    rjs #ifdef SCTP_DEBUG
   2720  1.1    rjs  		printf("Duplicate old stream reset resp next:%x this one:%x\n",
   2721  1.1    rjs  		       stcb->asoc.str_reset_seq_out, seq);
   2722  1.1    rjs #endif
   2723  1.1    rjs 	}
   2724  1.1    rjs }
   2725  1.1    rjs 
   2726  1.1    rjs 
   2727  1.1    rjs static void
   2728  1.1    rjs sctp_handle_stream_reset(struct sctp_tcb *stcb, struct sctp_stream_reset_req *sr_req)
   2729  1.1    rjs {
   2730  1.1    rjs  	int chk_length, param_len;
   2731  1.1    rjs  	struct sctp_paramhdr *ph;
   2732  1.1    rjs  	/* now it may be a reset or a reset-response */
   2733  1.1    rjs  	struct sctp_stream_reset_request *req;
   2734  1.1    rjs  	struct sctp_stream_reset_response *resp;
   2735  1.1    rjs  	chk_length = ntohs(sr_req->ch.chunk_length);
   2736  1.1    rjs 
   2737  1.1    rjs  	ph = (struct sctp_paramhdr *)&sr_req->sr_req;
   2738  1.1    rjs  	while ((size_t)chk_length >= sizeof(struct sctp_stream_reset_request)) {
   2739  1.1    rjs  		param_len = ntohs(ph->param_length);
   2740  1.1    rjs  		if (ntohs(ph->param_type) == SCTP_STR_RESET_REQUEST) {
   2741  1.1    rjs  			/* this will send the ACK and do the reset if needed */
   2742  1.1    rjs  			req = (struct sctp_stream_reset_request *)ph;
   2743  1.1    rjs  			sctp_send_str_reset_ack(stcb, req);
   2744  1.1    rjs  		} else if (ntohs(ph->param_type) == SCTP_STR_RESET_RESPONSE) {
   2745  1.1    rjs  			/* Now here is a tricky one. We reset our receive side
   2746  1.1    rjs  			 * of the streams. But what happens if the peers
   2747  1.1    rjs  			 * next sending TSN is NOT equal to 1 minus our cumack?
   2748  1.1    rjs  			 * And if his cumack is not equal to our next one out - 1
   2749  1.1    rjs  			 * we have another problem if this is receprical.
   2750  1.1    rjs  			 */
   2751  1.1    rjs  			resp = (struct sctp_stream_reset_response *)ph;
   2752  1.1    rjs  			sctp_handle_stream_reset_response(stcb, resp);
   2753  1.1    rjs  		}
   2754  1.1    rjs  		ph = (struct sctp_paramhdr *)((vaddr_t)ph + SCTP_SIZE32(param_len));
   2755  1.1    rjs  		chk_length -= SCTP_SIZE32(param_len);
   2756  1.1    rjs   	}
   2757  1.1    rjs }
   2758  1.1    rjs 
   2759  1.1    rjs /*
   2760  1.1    rjs  * Handle a router or endpoints report of a packet loss, there
   2761  1.1    rjs  * are two ways to handle this, either we get the whole packet
   2762  1.1    rjs  * and must disect it ourselves (possibly with truncation and
   2763  1.1    rjs  * or corruption) or it is a summary from a middle box that did
   2764  1.1    rjs  * the disectting for us.
   2765  1.1    rjs  */
   2766  1.1    rjs static void
   2767  1.1    rjs sctp_handle_packet_dropped(struct sctp_pktdrop_chunk *cp,
   2768  1.1    rjs     struct sctp_tcb *stcb, struct sctp_nets *net)
   2769  1.1    rjs {
   2770  1.1    rjs 	u_int32_t bottle_bw, on_queue;
   2771  1.1    rjs 	u_int16_t trunc_len;
   2772  1.1    rjs 	unsigned int chlen;
   2773  1.1    rjs 	unsigned int at;
   2774  1.1    rjs 	struct sctp_chunk_desc desc;
   2775  1.1    rjs 	struct sctp_chunkhdr *ch;
   2776  1.1    rjs 
   2777  1.1    rjs 	chlen = ntohs(cp->ch.chunk_length);
   2778  1.1    rjs 	chlen -= sizeof(struct sctp_pktdrop_chunk);
   2779  1.1    rjs 	/* XXX possible chlen underflow */
   2780  1.1    rjs 	if (chlen == 0) {
   2781  1.1    rjs 		ch = NULL;
   2782  1.1    rjs 		if (cp->ch.chunk_flags & SCTP_FROM_MIDDLE_BOX)
   2783  1.1    rjs 			sctp_pegs[SCTP_PDRP_BWRPT]++;
   2784  1.1    rjs 	} else {
   2785  1.1    rjs 		ch = (struct sctp_chunkhdr *)(cp->data + sizeof(struct sctphdr));
   2786  1.1    rjs 		chlen -= sizeof(struct sctphdr);
   2787  1.1    rjs 		/* XXX possible chlen underflow */
   2788  1.1    rjs 		memset(&desc, 0, sizeof(desc));
   2789  1.1    rjs 	}
   2790  1.1    rjs 
   2791  1.1    rjs 	/* first update a rwnd possibly */
   2792  1.1    rjs 	if ((cp->ch.chunk_flags & SCTP_FROM_MIDDLE_BOX) == 0) {
   2793  1.1    rjs 		/* From a peer, we get a rwnd report */
   2794  1.1    rjs 		u_int32_t a_rwnd;
   2795  1.1    rjs 
   2796  1.1    rjs 		sctp_pegs[SCTP_PDRP_FEHOS]++;
   2797  1.1    rjs 
   2798  1.1    rjs 		bottle_bw = ntohl(cp->bottle_bw);
   2799  1.1    rjs 		on_queue =  ntohl(cp->current_onq);
   2800  1.1    rjs 		if (bottle_bw && on_queue) {
   2801  1.1    rjs 			/* a rwnd report is in here */
   2802  1.1    rjs 			if (bottle_bw > on_queue)
   2803  1.1    rjs 				a_rwnd = bottle_bw - on_queue;
   2804  1.1    rjs 			else
   2805  1.1    rjs 				a_rwnd = 0;
   2806  1.1    rjs 
   2807  1.1    rjs 			if (a_rwnd <= 0)
   2808  1.1    rjs 				stcb->asoc.peers_rwnd =  0;
   2809  1.1    rjs 			else {
   2810  1.1    rjs 				if (a_rwnd > stcb->asoc.total_flight) {
   2811  1.1    rjs 					stcb->asoc.peers_rwnd =
   2812  1.1    rjs 					    a_rwnd - stcb->asoc.total_flight;
   2813  1.1    rjs 				} else {
   2814  1.1    rjs 					stcb->asoc.peers_rwnd =  0;
   2815  1.1    rjs 				}
   2816  1.1    rjs 				if (stcb->asoc.peers_rwnd <
   2817  1.1    rjs 				    stcb->sctp_ep->sctp_ep.sctp_sws_sender) {
   2818  1.1    rjs 					/* SWS sender side engages */
   2819  1.1    rjs 					stcb->asoc.peers_rwnd = 0;
   2820  1.1    rjs 				}
   2821  1.1    rjs 			}
   2822  1.1    rjs 		}
   2823  1.1    rjs 	} else {
   2824  1.1    rjs 		sctp_pegs[SCTP_PDRP_FMBOX]++;
   2825  1.1    rjs 	}
   2826  1.1    rjs 	trunc_len = (u_int16_t)ntohs(cp->trunc_len);
   2827  1.1    rjs 	/* now the chunks themselves */
   2828  1.1    rjs 	while ((ch != NULL) && (chlen >= sizeof(struct sctp_chunkhdr))) {
   2829  1.1    rjs 		desc.chunk_type = ch->chunk_type;
   2830  1.1    rjs 		/* get amount we need to move */
   2831  1.1    rjs 		at = ntohs(ch->chunk_length);
   2832  1.1    rjs 		if (at < sizeof(struct sctp_chunkhdr)) {
   2833  1.1    rjs 			/* corrupt chunk, maybe at the end? */
   2834  1.1    rjs 			sctp_pegs[SCTP_PDRP_CRUPT]++;
   2835  1.1    rjs 			break;
   2836  1.1    rjs 		}
   2837  1.1    rjs 		if (trunc_len == 0) {
   2838  1.1    rjs 			/* we are supposed to have all of it */
   2839  1.1    rjs 			if (at > chlen) {
   2840  1.1    rjs 				/* corrupt skip it */
   2841  1.1    rjs 				sctp_pegs[SCTP_PDRP_CRUPT]++;
   2842  1.1    rjs 				break;
   2843  1.1    rjs 			}
   2844  1.1    rjs 		} else {
   2845  1.1    rjs 			/* is there enough of it left ? */
   2846  1.1    rjs 			if (desc.chunk_type == SCTP_DATA) {
   2847  1.1    rjs 				if (chlen < (sizeof(struct sctp_data_chunk) +
   2848  1.1    rjs 					     sizeof(desc.data_bytes))) {
   2849  1.1    rjs 					break;
   2850  1.1    rjs 				}
   2851  1.1    rjs 			} else {
   2852  1.1    rjs 				if (chlen < sizeof(struct sctp_chunkhdr)) {
   2853  1.1    rjs 					break;
   2854  1.1    rjs 				}
   2855  1.1    rjs 			}
   2856  1.1    rjs 		}
   2857  1.1    rjs 		if (desc.chunk_type == SCTP_DATA) {
   2858  1.1    rjs 			/* can we get out the tsn? */
   2859  1.1    rjs 			if ((cp->ch.chunk_flags & SCTP_FROM_MIDDLE_BOX))
   2860  1.1    rjs 				sctp_pegs[SCTP_PDRP_MB_DA]++;
   2861  1.1    rjs 
   2862  1.1    rjs 			if (chlen >= (sizeof(struct sctp_data_chunk) + sizeof(u_int32_t)) ) {
   2863  1.1    rjs 				/* yep */
   2864  1.1    rjs 				struct sctp_data_chunk *dcp;
   2865  1.1    rjs 				u_int8_t  *ddp;
   2866  1.1    rjs 				unsigned int iii;
   2867  1.1    rjs 				dcp = (struct sctp_data_chunk *)ch;
   2868  1.1    rjs 				ddp = (u_int8_t *)(dcp + 1);
   2869  1.1    rjs 				for (iii = 0; iii < sizeof(desc.data_bytes); iii++) {
   2870  1.1    rjs 					desc.data_bytes[iii] = ddp[iii];
   2871  1.1    rjs 				}
   2872  1.1    rjs 				desc.tsn_ifany = dcp->dp.tsn;
   2873  1.1    rjs 			} else {
   2874  1.1    rjs 				/* nope we are done. */
   2875  1.1    rjs 				sctp_pegs[SCTP_PDRP_NEDAT]++;
   2876  1.1    rjs 				break;
   2877  1.1    rjs 			}
   2878  1.1    rjs 		} else {
   2879  1.1    rjs 			if ((cp->ch.chunk_flags & SCTP_FROM_MIDDLE_BOX))
   2880  1.1    rjs 				sctp_pegs[SCTP_PDRP_MB_CT]++;
   2881  1.1    rjs 		}
   2882  1.1    rjs 
   2883  1.1    rjs 		if (process_chunk_drop(stcb, &desc, net, cp->ch.chunk_flags)) {
   2884  1.1    rjs 			sctp_pegs[SCTP_PDRP_PDBRK]++;
   2885  1.1    rjs 			break;
   2886  1.1    rjs 		}
   2887  1.1    rjs 		if (SCTP_SIZE32(at) > chlen) {
   2888  1.1    rjs 			break;
   2889  1.1    rjs 		}
   2890  1.1    rjs 		chlen -= SCTP_SIZE32(at);
   2891  1.1    rjs 		if (chlen < sizeof(struct sctp_chunkhdr)) {
   2892  1.1    rjs 			/* done, none left */
   2893  1.1    rjs 			break;
   2894  1.1    rjs 		}
   2895  1.1    rjs 		ch = (struct sctp_chunkhdr *)((vaddr_t)ch + SCTP_SIZE32(at));
   2896  1.1    rjs 	}
   2897  1.1    rjs 
   2898  1.1    rjs 	/* now middle boxes in sat networks get a cwnd bump */
   2899  1.1    rjs 	if ((cp->ch.chunk_flags & SCTP_FROM_MIDDLE_BOX) &&
   2900  1.1    rjs 	    (stcb->asoc.sat_t3_loss_recovery == 0) &&
   2901  1.1    rjs 	    (stcb->asoc.sat_network)) {
   2902  1.1    rjs 		/*
   2903  1.1    rjs 		 * This is debateable but for sat networks it makes sense
   2904  1.1    rjs 		 * Note if a T3 timer has went off, we will prohibit any
   2905  1.1    rjs 		 * changes to cwnd until we exit the t3 loss recovery.
   2906  1.1    rjs 		 */
   2907  1.1    rjs 		u_int32_t bw_avail;
   2908  1.1    rjs 		int rtt, incr;
   2909  1.1    rjs #ifdef SCTP_CWND_LOGGING
   2910  1.1    rjs 		int old_cwnd=net->cwnd;
   2911  1.1    rjs #endif
   2912  1.1    rjs 		/* need real RTT for this calc */
   2913  1.1    rjs 		rtt = ((net->lastsa >> 2) + net->lastsv) >> 1;
   2914  1.1    rjs 		/* get bottle neck bw */
   2915  1.1    rjs 		bottle_bw = ntohl(cp->bottle_bw);
   2916  1.1    rjs 		/* and whats on queue */
   2917  1.1    rjs 		on_queue =  ntohl(cp->current_onq);
   2918  1.1    rjs 		/*
   2919  1.1    rjs 		 * adjust the on-queue if our flight is more it could be
   2920  1.1    rjs 		 * that the router has not yet gotten data "in-flight" to it
   2921  1.1    rjs 		 */
   2922  1.1    rjs  		if (on_queue < net->flight_size)
   2923  1.1    rjs 			on_queue = net->flight_size;
   2924  1.1    rjs 
   2925  1.1    rjs 		/* calculate the available space */
   2926  1.1    rjs 		bw_avail = (bottle_bw*rtt)/1000;
   2927  1.1    rjs 		if (bw_avail > bottle_bw) {
   2928  1.1    rjs 			/*
   2929  1.1    rjs 			 * Cap the growth to no more than the bottle neck.
   2930  1.1    rjs 			 * This can happen as RTT slides up due to queues.
   2931  1.1    rjs 			 * It also means if you have more than a 1 second
   2932  1.1    rjs 			 * RTT with a empty queue you will be limited to
   2933  1.1    rjs 			 * the bottle_bw per second no matter if
   2934  1.1    rjs 			 * other points have 1/2 the RTT and you could
   2935  1.1    rjs 			 * get more out...
   2936  1.1    rjs 			 */
   2937  1.1    rjs 			bw_avail = bottle_bw;
   2938  1.1    rjs 		}
   2939  1.1    rjs 
   2940  1.1    rjs 		if (on_queue > bw_avail) {
   2941  1.1    rjs 			/*
   2942  1.1    rjs 			 * No room for anything else don't allow anything
   2943  1.1    rjs 			 * else to be "added to the fire".
   2944  1.1    rjs 			 */
   2945  1.1    rjs 			int seg_inflight, seg_onqueue, my_portion;
   2946  1.1    rjs 			net->partial_bytes_acked = 0;
   2947  1.1    rjs 
   2948  1.1    rjs 			/* how much are we over queue size? */
   2949  1.1    rjs 			incr = on_queue - bw_avail;
   2950  1.1    rjs 			if (stcb->asoc.seen_a_sack_this_pkt) {
   2951  1.1    rjs 				/* undo any cwnd adjustment that
   2952  1.1    rjs 				 * the sack might have made
   2953  1.1    rjs 				 */
   2954  1.1    rjs 				net->cwnd = net->prev_cwnd;
   2955  1.1    rjs 			}
   2956  1.1    rjs 
   2957  1.1    rjs 			/* Now how much of that is mine? */
   2958  1.1    rjs 			seg_inflight = net->flight_size / net->mtu;
   2959  1.1    rjs 			seg_onqueue = on_queue / net->mtu;
   2960  1.1    rjs 			my_portion = (incr * seg_inflight)/seg_onqueue;
   2961  1.1    rjs 
   2962  1.1    rjs 			/* Have I made an adjustment already */
   2963  1.1    rjs 			if (net->cwnd > net->flight_size) {
   2964  1.1    rjs 				/* for this flight I made an adjustment
   2965  1.1    rjs 				 * we need to decrease the portion by a share
   2966  1.1    rjs 				 * our previous adjustment.
   2967  1.1    rjs 				 */
   2968  1.1    rjs 				int diff_adj;
   2969  1.1    rjs 				diff_adj = net->cwnd - net->flight_size;
   2970  1.1    rjs 				if (diff_adj > my_portion)
   2971  1.1    rjs 					my_portion = 0;
   2972  1.1    rjs 				else
   2973  1.1    rjs 					my_portion -= diff_adj;
   2974  1.1    rjs 			}
   2975  1.1    rjs 
   2976  1.1    rjs 			/* back down to the previous cwnd (assume
   2977  1.1    rjs 			 * we have had a sack before this packet). minus
   2978  1.1    rjs 			 * what ever portion of the overage is my fault.
   2979  1.1    rjs 			 */
   2980  1.1    rjs 			net->cwnd -= my_portion;
   2981  1.1    rjs 
   2982  1.1    rjs 			/* we will NOT back down more than 1 MTU */
   2983  1.1    rjs 			if (net->cwnd <= net->mtu) {
   2984  1.1    rjs 				net->cwnd = net->mtu;
   2985  1.1    rjs 			}
   2986  1.1    rjs 			/* force into CA */
   2987  1.1    rjs 			net->ssthresh = net->cwnd - 1;
   2988  1.1    rjs 		} else {
   2989  1.1    rjs 			/*
   2990  1.1    rjs 			 * Take 1/4 of the space left or
   2991  1.1    rjs 			 * max burst up .. whichever is less.
   2992  1.1    rjs 			 */
   2993  1.1    rjs 			incr = min((bw_avail - on_queue) >> 2,
   2994  1.1    rjs 			    (int)stcb->asoc.max_burst * (int)net->mtu);
   2995  1.1    rjs 			net->cwnd += incr;
   2996  1.1    rjs 		}
   2997  1.1    rjs 		if (net->cwnd > bw_avail) {
   2998  1.1    rjs 			/* We can't exceed the pipe size */
   2999  1.1    rjs 			net->cwnd = bw_avail;
   3000  1.1    rjs 		}
   3001  1.1    rjs 		if (net->cwnd < net->mtu) {
   3002  1.1    rjs 			/* We always have 1 MTU */
   3003  1.1    rjs 			net->cwnd = net->mtu;
   3004  1.1    rjs 		}
   3005  1.1    rjs #ifdef SCTP_CWND_LOGGING
   3006  1.1    rjs 		if (net->cwnd - old_cwnd != 0) {
   3007  1.1    rjs 			/* log only changes */
   3008  1.1    rjs 			sctp_log_cwnd(net, (net->cwnd - old_cwnd),
   3009  1.1    rjs 			    SCTP_CWND_LOG_FROM_SAT);
   3010  1.1    rjs 		}
   3011  1.1    rjs #endif
   3012  1.1    rjs 	}
   3013  1.1    rjs }
   3014  1.1    rjs 
   3015  1.1    rjs extern int sctp_strict_init;
   3016  1.1    rjs 
   3017  1.1    rjs /*
   3018  1.1    rjs  * handles all control chunks in a packet
   3019  1.1    rjs  * inputs:
   3020  1.1    rjs  * - m: mbuf chain, assumed to still contain IP/SCTP header
   3021  1.1    rjs  * - stcb: is the tcb found for this packet
   3022  1.1    rjs  * - offset: offset into the mbuf chain to first chunkhdr
   3023  1.1    rjs  * - length: is the length of the complete packet
   3024  1.1    rjs  * outputs:
   3025  1.1    rjs  * - length: modified to remaining length after control processing
   3026  1.1    rjs  * - netp: modified to new sctp_nets after cookie-echo processing
   3027  1.1    rjs  * - return NULL to discard the packet (ie. no asoc, bad packet,...)
   3028  1.1    rjs  *   otherwise return the tcb for this packet
   3029  1.1    rjs  */
   3030  1.1    rjs static struct sctp_tcb *
   3031  1.1    rjs sctp_process_control(struct mbuf *m, int iphlen, int *offset, int length,
   3032  1.1    rjs     struct sctphdr *sh, struct sctp_chunkhdr *ch, struct sctp_inpcb *inp,
   3033  1.1    rjs     struct sctp_tcb *stcb, struct sctp_nets **netp, int *fwd_tsn_seen)
   3034  1.1    rjs {
   3035  1.1    rjs 	struct sctp_association *asoc;
   3036  1.1    rjs 	u_int32_t vtag_in;
   3037  1.1    rjs 	int num_chunks = 0;	/* number of control chunks processed */
   3038  1.1    rjs 	int chk_length;
   3039  1.1    rjs 	int ret;
   3040  1.1    rjs 
   3041  1.1    rjs 	/*
   3042  1.1    rjs 	 * How big should this be, and should it be alloc'd?
   3043  1.1    rjs 	 * Lets try the d-mtu-ceiling for now (2k) and that should
   3044  1.1    rjs 	 * hopefully work ... until we get into jumbo grams and such..
   3045  1.1    rjs 	 */
   3046  1.1    rjs 	u_int8_t chunk_buf[DEFAULT_CHUNK_BUFFER];
   3047  1.1    rjs 	struct sctp_tcb *locked_tcb = stcb;
   3048  1.1    rjs 
   3049  1.1    rjs #ifdef SCTP_DEBUG
   3050  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   3051  1.1    rjs 		printf("sctp_process_control: iphlen=%u, offset=%u, length=%u stcb:%p\n",
   3052  1.1    rjs 		       iphlen, *offset, length, stcb);
   3053  1.1    rjs 	}
   3054  1.1    rjs #endif /* SCTP_DEBUG */
   3055  1.1    rjs 
   3056  1.1    rjs 	/* validate chunk header length... */
   3057  1.1    rjs 	if (ntohs(ch->chunk_length) < sizeof(*ch)) {
   3058  1.1    rjs 		return (NULL);
   3059  1.1    rjs 	}
   3060  1.1    rjs 
   3061  1.1    rjs 	/*
   3062  1.1    rjs 	 * validate the verification tag
   3063  1.1    rjs 	 */
   3064  1.1    rjs #ifdef SCTP_DEBUG
   3065  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3066  1.1    rjs 		printf("sctp_process_control: validating vtags\n");
   3067  1.1    rjs 	}
   3068  1.1    rjs #endif /* SCTP_DEBUG */
   3069  1.1    rjs 	vtag_in = ntohl(sh->v_tag);
   3070  1.1    rjs 	if (ch->chunk_type == SCTP_INITIATION) {
   3071  1.1    rjs 		if (vtag_in != 0) {
   3072  1.1    rjs 			/* protocol error- silently discard... */
   3073  1.1    rjs #ifdef SCTP_DEBUG
   3074  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3075  1.1    rjs 				printf("sctp_process_control: INIT with vtag != 0\n");
   3076  1.1    rjs 			}
   3077  1.1    rjs #endif /* SCTP_DEBUG */
   3078  1.1    rjs 			sctp_pegs[SCTP_BAD_VTAGS]++;
   3079  1.1    rjs 			if (locked_tcb) {
   3080  1.1    rjs 				SCTP_TCB_UNLOCK(locked_tcb);
   3081  1.1    rjs 			}
   3082  1.1    rjs 			return (NULL);
   3083  1.1    rjs 		}
   3084  1.1    rjs 	} else if (ch->chunk_type != SCTP_COOKIE_ECHO) {
   3085  1.1    rjs 		/*
   3086  1.1    rjs 		 * first check if it's an ASCONF with an unknown src addr
   3087  1.1    rjs 		 * we need to look inside to find the association
   3088  1.1    rjs 		 */
   3089  1.1    rjs 		if (ch->chunk_type == SCTP_ASCONF && stcb == NULL) {
   3090  1.1    rjs 			stcb = sctp_findassociation_ep_asconf(m, iphlen,
   3091  1.1    rjs 			    *offset, sh, &inp, netp);
   3092  1.1    rjs 		}
   3093  1.1    rjs 		if (stcb == NULL) {
   3094  1.1    rjs 			/* no association, so it's out of the blue... */
   3095  1.1    rjs 			sctp_handle_ootb(m, iphlen, *offset, sh, inp, NULL);
   3096  1.1    rjs #ifdef SCTP_DEBUG
   3097  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3098  1.1    rjs 				printf("sctp_process_control: handling OOTB packet, chunk type=%xh\n",
   3099  1.1    rjs 				       ch->chunk_type);
   3100  1.1    rjs 			}
   3101  1.1    rjs #endif /* SCTP_DEBUG */
   3102  1.1    rjs 			*offset = length;
   3103  1.1    rjs 			if (locked_tcb) {
   3104  1.1    rjs 				SCTP_TCB_UNLOCK(locked_tcb);
   3105  1.1    rjs 			}
   3106  1.1    rjs 			return (NULL);
   3107  1.1    rjs 		}
   3108  1.1    rjs 		asoc = &stcb->asoc;
   3109  1.1    rjs 		/* ABORT and SHUTDOWN can use either v_tag... */
   3110  1.1    rjs 		if ((ch->chunk_type == SCTP_ABORT_ASSOCIATION) ||
   3111  1.1    rjs 		    (ch->chunk_type == SCTP_SHUTDOWN_COMPLETE) ||
   3112  1.1    rjs 		    (ch->chunk_type == SCTP_PACKET_DROPPED)) {
   3113  1.1    rjs 			if ((vtag_in == asoc->my_vtag) ||
   3114  1.1    rjs 			    ((ch->chunk_flags & SCTP_HAD_NO_TCB) &&
   3115  1.1    rjs 			     (vtag_in == asoc->peer_vtag))) {
   3116  1.1    rjs 				/* this is valid */
   3117  1.1    rjs 			} else {
   3118  1.1    rjs 				/* drop this packet... */
   3119  1.1    rjs 				sctp_pegs[SCTP_BAD_VTAGS]++;
   3120  1.1    rjs 				if (locked_tcb) {
   3121  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3122  1.1    rjs 				}
   3123  1.1    rjs 				return (NULL);
   3124  1.1    rjs 			}
   3125  1.1    rjs 		} else if (ch->chunk_type == SCTP_SHUTDOWN_ACK) {
   3126  1.1    rjs 			if (vtag_in != asoc->my_vtag) {
   3127  1.1    rjs 				/*
   3128  1.1    rjs 				 * this could be a stale SHUTDOWN-ACK or the
   3129  1.1    rjs 				 * peer never got the SHUTDOWN-COMPLETE and
   3130  1.1    rjs 				 * is still hung; we have started a new asoc
   3131  1.1    rjs 				 * but it won't complete until the shutdown is
   3132  1.1    rjs 				 * completed
   3133  1.1    rjs 				 */
   3134  1.1    rjs 				if (locked_tcb) {
   3135  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3136  1.1    rjs 				}
   3137  1.1    rjs 				sctp_handle_ootb(m, iphlen, *offset, sh, inp,
   3138  1.1    rjs 				    NULL);
   3139  1.1    rjs 				return (NULL);
   3140  1.1    rjs 			}
   3141  1.1    rjs 		} else {
   3142  1.1    rjs 			/* for all other chunks, vtag must match */
   3143  1.1    rjs 
   3144  1.1    rjs 			if (vtag_in != asoc->my_vtag) {
   3145  1.1    rjs 				/* invalid vtag... */
   3146  1.1    rjs #ifdef SCTP_DEBUG
   3147  1.1    rjs 				if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3148  1.1    rjs 					printf("invalid vtag: %xh, expect %xh\n", vtag_in, asoc->my_vtag);
   3149  1.1    rjs 				}
   3150  1.1    rjs #endif /* SCTP_DEBUG */
   3151  1.1    rjs 				sctp_pegs[SCTP_BAD_VTAGS]++;
   3152  1.1    rjs 				if (locked_tcb) {
   3153  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3154  1.1    rjs 				}
   3155  1.1    rjs 				*offset = length;
   3156  1.1    rjs 				return (NULL);
   3157  1.1    rjs 			}
   3158  1.1    rjs 		}
   3159  1.1    rjs 	}  /* end if !SCTP_COOKIE_ECHO */
   3160  1.1    rjs 
   3161  1.1    rjs #ifdef SCTP_DEBUG
   3162  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3163  1.1    rjs 		printf("sctp_process_control: vtags ok, processing ctrl chunks\n");
   3164  1.1    rjs 	}
   3165  1.1    rjs #endif /* SCTP_DEBUG */
   3166  1.1    rjs 
   3167  1.1    rjs 	/*
   3168  1.1    rjs 	 * process all control chunks...
   3169  1.1    rjs 	 */
   3170  1.1    rjs 	if (((ch->chunk_type == SCTP_SELECTIVE_ACK) ||
   3171  1.1    rjs 	    (ch->chunk_type == SCTP_HEARTBEAT_REQUEST)) &&
   3172  1.1    rjs 	    (SCTP_GET_STATE(&stcb->asoc) == SCTP_STATE_COOKIE_ECHOED)) {
   3173  1.1    rjs 	    /* implied cookie-ack.. we must have lost the ack */
   3174  1.1    rjs 	    stcb->asoc.overall_error_count = 0;
   3175  1.1    rjs 	    sctp_handle_cookie_ack((struct sctp_cookie_ack_chunk *)ch, stcb, *netp);
   3176  1.1    rjs 	}
   3177  1.1    rjs 
   3178  1.1    rjs 	while (IS_SCTP_CONTROL(ch)) {
   3179  1.1    rjs 		/* validate chunk length */
   3180  1.1    rjs 		chk_length = ntohs(ch->chunk_length);
   3181  1.1    rjs #ifdef SCTP_DEBUG
   3182  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT2) {
   3183  1.1    rjs 			printf("sctp_process_control: processing a chunk type=%u, len=%u\n", ch->chunk_type, chk_length);
   3184  1.1    rjs 		}
   3185  1.1    rjs #endif /* SCTP_DEBUG */
   3186  1.1    rjs 		if ((size_t)chk_length < sizeof(*ch) ||
   3187  1.1    rjs 		    (*offset + chk_length) > length) {
   3188  1.1    rjs #ifdef SCTP_DEBUG
   3189  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3190  1.1    rjs 				printf("sctp_process_control: chunk length invalid! *offset:%u, chk_length:%u > length:%u\n",
   3191  1.6    rjs 				    *offset, chk_length, length);
   3192  1.1    rjs 			}
   3193  1.1    rjs #endif /* SCTP_DEBUG */
   3194  1.1    rjs 			*offset = length;
   3195  1.1    rjs 			if (locked_tcb) {
   3196  1.1    rjs 				SCTP_TCB_UNLOCK(locked_tcb);
   3197  1.1    rjs 			}
   3198  1.1    rjs 			return (NULL);
   3199  1.1    rjs 		}
   3200  1.1    rjs 
   3201  1.1    rjs 		/*
   3202  1.1    rjs 		 * INIT-ACK only gets the init ack "header" portion only
   3203  1.1    rjs 		 * because we don't have to process the peer's COOKIE.
   3204  1.1    rjs 		 * All others get a complete chunk.
   3205  1.1    rjs 		 */
   3206  1.1    rjs 		if (ch->chunk_type == SCTP_INITIATION_ACK) {
   3207  1.1    rjs 			/* get an init-ack chunk */
   3208  1.1    rjs 			ch = (struct sctp_chunkhdr *)sctp_m_getptr(m, *offset,
   3209  1.1    rjs 			    sizeof(struct sctp_init_ack), chunk_buf);
   3210  1.1    rjs 			if (ch == NULL) {
   3211  1.1    rjs 				*offset = length;
   3212  1.1    rjs 				if (locked_tcb) {
   3213  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3214  1.1    rjs 				}
   3215  1.1    rjs 				return (NULL);
   3216  1.1    rjs 			}
   3217  1.1    rjs 		} else {
   3218  1.1    rjs 			/* get a complete chunk... */
   3219  1.1    rjs 			if ((size_t)chk_length > sizeof(chunk_buf)) {
   3220  1.1    rjs 				struct mbuf *oper;
   3221  1.1    rjs 				struct sctp_paramhdr *phdr;
   3222  1.1    rjs 				oper = NULL;
   3223  1.1    rjs 				MGETHDR(oper, M_DONTWAIT, MT_HEADER);
   3224  1.1    rjs 				if (oper) {
   3225  1.1    rjs 					/* pre-reserve some space */
   3226  1.1    rjs 					oper->m_data +=
   3227  1.1    rjs 					    sizeof(struct sctp_chunkhdr);
   3228  1.1    rjs 					phdr =
   3229  1.1    rjs 					    mtod(oper, struct sctp_paramhdr *);
   3230  1.1    rjs 					phdr->param_type =
   3231  1.1    rjs 					    htons(SCTP_CAUSE_OUT_OF_RESC);
   3232  1.1    rjs 					phdr->param_length =
   3233  1.1    rjs 					    htons(sizeof(struct sctp_paramhdr));
   3234  1.1    rjs 					sctp_queue_op_err(stcb, oper);
   3235  1.1    rjs 				}
   3236  1.1    rjs 				if (locked_tcb) {
   3237  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3238  1.1    rjs 				}
   3239  1.1    rjs 				return (NULL);
   3240  1.1    rjs 			}
   3241  1.1    rjs 			ch = (struct sctp_chunkhdr *)sctp_m_getptr(m, *offset,
   3242  1.1    rjs 			    chk_length, chunk_buf);
   3243  1.1    rjs 			if (ch == NULL) {
   3244  1.1    rjs 				printf("sctp_process_control: Can't get the all data....\n");
   3245  1.1    rjs 				*offset = length;
   3246  1.1    rjs 				if (locked_tcb) {
   3247  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3248  1.1    rjs 				}
   3249  1.1    rjs 				return (NULL);
   3250  1.1    rjs 			}
   3251  1.1    rjs 
   3252  1.1    rjs 		}
   3253  1.1    rjs 		num_chunks++;
   3254  1.1    rjs 		/* Save off the last place we got a control from */
   3255  1.1    rjs 		if ((*netp) && stcb) {
   3256  1.1    rjs 			stcb->asoc.last_control_chunk_from = *netp;
   3257  1.1    rjs 		}
   3258  1.1    rjs #ifdef SCTP_AUDITING_ENABLED
   3259  1.1    rjs 		sctp_audit_log(0xB0, ch->chunk_type);
   3260  1.1    rjs #endif
   3261  1.1    rjs 		switch (ch->chunk_type) {
   3262  1.1    rjs 		case SCTP_INITIATION:
   3263  1.1    rjs 			/* must be first and only chunk */
   3264  1.1    rjs #ifdef SCTP_DEBUG
   3265  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3266  1.1    rjs 				printf("SCTP_INIT\n");
   3267  1.1    rjs 			}
   3268  1.1    rjs #endif /* SCTP_DEBUG */
   3269  1.1    rjs 			if (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) {
   3270  1.1    rjs 				/* We are not interested anymore */
   3271  1.1    rjs 				if (locked_tcb) {
   3272  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3273  1.1    rjs 				}
   3274  1.1    rjs 				if (LIST_FIRST(&inp->sctp_asoc_list) == NULL) {
   3275  1.1    rjs 					/* finish the job now */
   3276  1.1    rjs 					sctp_inpcb_free(inp, 1);
   3277  1.1    rjs 				}
   3278  1.1    rjs 				*offset = length;
   3279  1.1    rjs 				return (NULL);
   3280  1.1    rjs 			}
   3281  1.1    rjs 			if ((num_chunks > 1) ||
   3282  1.1    rjs 			    (sctp_strict_init && (length - *offset > SCTP_SIZE32(chk_length)))) {
   3283  1.1    rjs 				*offset = length;
   3284  1.1    rjs 				if (locked_tcb) {
   3285  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3286  1.1    rjs 				}
   3287  1.1    rjs 				return (NULL);
   3288  1.1    rjs 			}
   3289  1.1    rjs 			if ((stcb != NULL) &&
   3290  1.1    rjs 			    (SCTP_GET_STATE(&stcb->asoc) ==
   3291  1.1    rjs 			    SCTP_STATE_SHUTDOWN_ACK_SENT)) {
   3292  1.1    rjs 				sctp_send_shutdown_ack(stcb,
   3293  1.1    rjs 				    stcb->asoc.primary_destination);
   3294  1.1    rjs 				*offset = length;
   3295  1.1    rjs 				if (locked_tcb) {
   3296  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3297  1.1    rjs 				}
   3298  1.1    rjs 				return (NULL);
   3299  1.1    rjs 			}
   3300  1.1    rjs 			sctp_handle_init(m, iphlen, *offset, sh,
   3301  1.1    rjs 			    (struct sctp_init_chunk *)ch, inp, stcb, *netp);
   3302  1.1    rjs 			*offset = length;
   3303  1.1    rjs 			if (locked_tcb) {
   3304  1.1    rjs 				SCTP_TCB_UNLOCK(locked_tcb);
   3305  1.1    rjs 			}
   3306  1.1    rjs 			return (NULL);
   3307  1.1    rjs 			break;
   3308  1.1    rjs 		case SCTP_INITIATION_ACK:
   3309  1.1    rjs 			/* must be first and only chunk */
   3310  1.1    rjs #ifdef SCTP_DEBUG
   3311  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3312  1.1    rjs 				printf("SCTP_INIT-ACK\n");
   3313  1.1    rjs 			}
   3314  1.1    rjs #endif /* SCTP_DEBUG */
   3315  1.1    rjs 			if (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) {
   3316  1.1    rjs 				/* We are not interested anymore */
   3317  1.1    rjs 				if (locked_tcb) {
   3318  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3319  1.1    rjs 				}
   3320  1.1    rjs 				*offset = length;
   3321  1.1    rjs 				if (stcb) {
   3322  1.1    rjs 					sctp_free_assoc(inp, stcb);
   3323  1.1    rjs 				} else {
   3324  1.1    rjs 					if (LIST_FIRST(&inp->sctp_asoc_list) == NULL) {
   3325  1.1    rjs 						/* finish the job now */
   3326  1.1    rjs 						sctp_inpcb_free(inp, 1);
   3327  1.1    rjs 					}
   3328  1.1    rjs 				}
   3329  1.1    rjs 				return (NULL);
   3330  1.1    rjs 			}
   3331  1.1    rjs 			if ((num_chunks > 1) ||
   3332  1.1    rjs 			    (sctp_strict_init && (length - *offset > SCTP_SIZE32(chk_length)))) {
   3333  1.1    rjs #ifdef SCTP_DEBUG
   3334  1.1    rjs 				if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3335  1.1    rjs 					printf("Length is %d rounded chk_length:%d .. dropping\n",
   3336  1.1    rjs 					    length - *offset,
   3337  1.1    rjs 					    SCTP_SIZE32(chk_length));
   3338  1.1    rjs 				}
   3339  1.1    rjs #endif
   3340  1.1    rjs 				*offset = length;
   3341  1.1    rjs 				if (locked_tcb) {
   3342  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3343  1.1    rjs 				}
   3344  1.1    rjs 				return (NULL);
   3345  1.1    rjs 			}
   3346  1.1    rjs 			ret = sctp_handle_init_ack(m, iphlen, *offset, sh,
   3347  1.1    rjs 			    (struct sctp_init_ack_chunk *)ch, stcb, *netp);
   3348  1.1    rjs 			/*
   3349  1.1    rjs 			 * Special case, I must call the output routine
   3350  1.1    rjs 			 * to get the cookie echoed
   3351  1.1    rjs 			 */
   3352  1.1    rjs 			if ((stcb) && ret == 0)
   3353  1.1    rjs 				sctp_chunk_output(stcb->sctp_ep, stcb, 2);
   3354  1.1    rjs 			*offset = length;
   3355  1.1    rjs #ifdef SCTP_DEBUG
   3356  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3357  1.1    rjs 				printf("All done INIT-ACK processing\n");
   3358  1.1    rjs 			}
   3359  1.1    rjs #endif
   3360  1.1    rjs 			if (locked_tcb) {
   3361  1.1    rjs 				SCTP_TCB_UNLOCK(locked_tcb);
   3362  1.1    rjs 			}
   3363  1.1    rjs 			return (NULL);
   3364  1.1    rjs 			break;
   3365  1.1    rjs 		case SCTP_SELECTIVE_ACK:
   3366  1.1    rjs #ifdef SCTP_DEBUG
   3367  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3368  1.1    rjs 				printf("SCTP_SACK\n");
   3369  1.1    rjs 			}
   3370  1.1    rjs #endif /* SCTP_DEBUG */
   3371  1.1    rjs 			sctp_pegs[SCTP_PEG_SACKS_SEEN]++;
   3372  1.1    rjs 			{
   3373  1.1    rjs 				int abort_now = 0;
   3374  1.1    rjs 				stcb->asoc.seen_a_sack_this_pkt = 1;
   3375  1.1    rjs 				sctp_handle_sack((struct sctp_sack_chunk *)ch,
   3376  1.1    rjs 				    stcb, *netp, &abort_now);
   3377  1.1    rjs 				if (abort_now) {
   3378  1.1    rjs 					/* ABORT signal from sack processing */
   3379  1.1    rjs 					*offset = length;
   3380  1.1    rjs 					return (NULL);
   3381  1.1    rjs 				}
   3382  1.1    rjs 			}
   3383  1.1    rjs 			break;
   3384  1.1    rjs 		case SCTP_HEARTBEAT_REQUEST:
   3385  1.1    rjs #ifdef SCTP_DEBUG
   3386  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3387  1.1    rjs 				printf("SCTP_HEARTBEAT\n");
   3388  1.1    rjs 			}
   3389  1.1    rjs #endif /* SCTP_DEBUG */
   3390  1.1    rjs 			sctp_pegs[SCTP_HB_RECV]++;
   3391  1.1    rjs 			sctp_send_heartbeat_ack(stcb, m, *offset, chk_length,
   3392  1.1    rjs 			    *netp);
   3393  1.1    rjs 
   3394  1.1    rjs 			/* He's alive so give him credit */
   3395  1.1    rjs 			stcb->asoc.overall_error_count = 0;
   3396  1.1    rjs 			break;
   3397  1.1    rjs 		case SCTP_HEARTBEAT_ACK:
   3398  1.1    rjs #ifdef SCTP_DEBUG
   3399  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3400  1.1    rjs 				printf("SCTP_HEARTBEAT-ACK\n");
   3401  1.1    rjs 			}
   3402  1.1    rjs #endif /* SCTP_DEBUG */
   3403  1.1    rjs 
   3404  1.1    rjs 			/* He's alive so give him credit */
   3405  1.1    rjs 			stcb->asoc.overall_error_count = 0;
   3406  1.1    rjs 
   3407  1.1    rjs 			sctp_pegs[SCTP_HB_ACK_RECV]++;
   3408  1.1    rjs 			sctp_handle_heartbeat_ack((struct sctp_heartbeat_chunk *)ch,
   3409  1.1    rjs 			    stcb, *netp);
   3410  1.1    rjs 			break;
   3411  1.1    rjs 		case SCTP_ABORT_ASSOCIATION:
   3412  1.1    rjs #ifdef SCTP_DEBUG
   3413  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3414  1.1    rjs 				printf("SCTP_ABORT\n");
   3415  1.1    rjs 			}
   3416  1.1    rjs #endif /* SCTP_DEBUG */
   3417  1.1    rjs 			sctp_handle_abort((struct sctp_abort_chunk *)ch,
   3418  1.1    rjs 			    stcb, *netp);
   3419  1.1    rjs 			*offset = length;
   3420  1.1    rjs 			return (NULL);
   3421  1.1    rjs 			break;
   3422  1.1    rjs 		case SCTP_SHUTDOWN:
   3423  1.1    rjs #ifdef SCTP_DEBUG
   3424  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3425  1.1    rjs 				printf("SCTP_SHUTDOWN\n");
   3426  1.1    rjs 			}
   3427  1.1    rjs #endif /* SCTP_DEBUG */
   3428  1.1    rjs                        {
   3429  1.1    rjs 			       int abort_flag = 0;
   3430  1.1    rjs 			       sctp_handle_shutdown((struct sctp_shutdown_chunk *)ch,
   3431  1.1    rjs 				   stcb, *netp, &abort_flag);
   3432  1.1    rjs 			       if (abort_flag) {
   3433  1.1    rjs 				       *offset = length;
   3434  1.1    rjs 				       return (NULL);
   3435  1.1    rjs 			       }
   3436  1.1    rjs 		       }
   3437  1.1    rjs 			break;
   3438  1.1    rjs 		case SCTP_SHUTDOWN_ACK:
   3439  1.1    rjs #ifdef SCTP_DEBUG
   3440  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3441  1.1    rjs 				printf("SCTP_SHUTDOWN-ACK\n");
   3442  1.1    rjs 			}
   3443  1.1    rjs #endif /* SCTP_DEBUG */
   3444  1.1    rjs 			sctp_handle_shutdown_ack((struct sctp_shutdown_ack_chunk *)ch, stcb, *netp);
   3445  1.1    rjs 			*offset = length;
   3446  1.1    rjs 			return (NULL);
   3447  1.1    rjs 			break;
   3448  1.1    rjs 		case SCTP_OPERATION_ERROR:
   3449  1.1    rjs #ifdef SCTP_DEBUG
   3450  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3451  1.1    rjs 				printf("SCTP_OP-ERR\n");
   3452  1.1    rjs 			}
   3453  1.1    rjs #endif /* SCTP_DEBUG */
   3454  1.1    rjs 			if (sctp_handle_error(ch, stcb, *netp) < 0) {
   3455  1.1    rjs 				*offset = length;
   3456  1.1    rjs 				return (NULL);
   3457  1.1    rjs 			}
   3458  1.1    rjs 			break;
   3459  1.1    rjs 		case SCTP_COOKIE_ECHO:
   3460  1.1    rjs #ifdef SCTP_DEBUG
   3461  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3462  1.1    rjs 				printf("SCTP_COOKIE-ECHO stcb is %p\n", stcb);
   3463  1.1    rjs 			}
   3464  1.1    rjs #endif /* SCTP_DEBUG */
   3465  1.1    rjs 			if (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) {
   3466  1.1    rjs 				/* We are not interested anymore */
   3467  1.1    rjs 				*offset = length;
   3468  1.1    rjs 				if (stcb) {
   3469  1.1    rjs 					sctp_free_assoc(inp, stcb);
   3470  1.1    rjs 				} else {
   3471  1.1    rjs 					if (LIST_FIRST(&inp->sctp_asoc_list) == NULL) {
   3472  1.1    rjs 						/* finish the job now */
   3473  1.1    rjs 						sctp_inpcb_free(inp, 1);
   3474  1.1    rjs 					}
   3475  1.1    rjs 				}
   3476  1.1    rjs 				return (NULL);
   3477  1.1    rjs 			}
   3478  1.1    rjs 			/*
   3479  1.1    rjs 			 * First are we accepting?
   3480  1.1    rjs 			 * We do this again here since it is possible
   3481  1.1    rjs 			 * that a previous endpoint WAS listening responded to
   3482  1.1    rjs 			 * a INIT-ACK and then closed. We opened and bound..
   3483  1.1    rjs 			 * and are now no longer listening.
   3484  1.1    rjs 			 */
   3485  1.1    rjs 			if (((inp->sctp_flags & SCTP_PCB_FLAGS_ACCEPTING) == 0) ||
   3486  1.1    rjs 			    (inp->sctp_socket->so_qlimit == 0)) {
   3487  1.1    rjs 				sctp_abort_association(inp, stcb, m, iphlen, sh,
   3488  1.1    rjs 				    NULL);
   3489  1.1    rjs 				*offset = length;
   3490  1.1    rjs 				return (NULL);
   3491  1.1    rjs 			} else if (inp->sctp_flags & SCTP_PCB_FLAGS_ACCEPTING) {
   3492  1.1    rjs 				/* we are accepting so check limits like TCP */
   3493  1.1    rjs 				if (inp->sctp_socket->so_qlen >
   3494  1.1    rjs 				    inp->sctp_socket->so_qlimit) {
   3495  1.1    rjs 					/* no space */
   3496  1.1    rjs 					struct mbuf *oper;
   3497  1.1    rjs 					struct sctp_paramhdr *phdr;
   3498  1.1    rjs 					oper = NULL;
   3499  1.1    rjs 					MGETHDR(oper, M_DONTWAIT, MT_HEADER);
   3500  1.1    rjs 					if (oper) {
   3501  1.1    rjs 						oper->m_len =
   3502  1.1    rjs 						    oper->m_pkthdr.len =
   3503  1.1    rjs 						    sizeof(struct sctp_paramhdr);
   3504  1.1    rjs 						phdr = mtod(oper,
   3505  1.1    rjs 						    struct sctp_paramhdr *);
   3506  1.1    rjs 						phdr->param_type =
   3507  1.1    rjs 						    htons(SCTP_CAUSE_OUT_OF_RESC);
   3508  1.1    rjs 						phdr->param_length =
   3509  1.1    rjs 						    htons(sizeof(struct sctp_paramhdr));
   3510  1.1    rjs 					}
   3511  1.1    rjs 					sctp_abort_association(inp, stcb, m,
   3512  1.1    rjs 					    iphlen, sh, oper);
   3513  1.1    rjs 					*offset = length;
   3514  1.1    rjs 					return (NULL);
   3515  1.1    rjs 				}
   3516  1.1    rjs 			}
   3517  1.1    rjs 			{
   3518  1.1    rjs 				struct mbuf *ret_buf;
   3519  1.1    rjs 				ret_buf = sctp_handle_cookie_echo(m, iphlen,
   3520  1.1    rjs 				    *offset, sh,
   3521  1.1    rjs 				    (struct sctp_cookie_echo_chunk *)ch, &inp,
   3522  1.1    rjs 				    &stcb, netp);
   3523  1.1    rjs #ifdef SCTP_DEBUG
   3524  1.1    rjs 				if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3525  1.1    rjs 					printf("ret_buf:%p length:%d off:%d\n",
   3526  1.1    rjs 					    ret_buf, length, *offset);
   3527  1.1    rjs 				}
   3528  1.1    rjs #endif /* SCTP_DEBUG */
   3529  1.1    rjs 
   3530  1.1    rjs 				if (ret_buf == NULL) {
   3531  1.1    rjs 					if (locked_tcb) {
   3532  1.1    rjs 						SCTP_TCB_UNLOCK(locked_tcb);
   3533  1.1    rjs 					}
   3534  1.1    rjs #ifdef SCTP_DEBUG
   3535  1.1    rjs 					if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3536  1.1    rjs 						printf("GAK, null buffer\n");
   3537  1.1    rjs 					}
   3538  1.1    rjs #endif /* SCTP_DEBUG */
   3539  1.1    rjs 					*offset = length;
   3540  1.1    rjs 					return (NULL);
   3541  1.1    rjs 				}
   3542  1.1    rjs 				if (!TAILQ_EMPTY(&stcb->asoc.sent_queue)) {
   3543  1.1    rjs 					/*
   3544  1.1    rjs 					 * Restart the timer if we have pending
   3545  1.1    rjs 					 * data
   3546  1.1    rjs 					 */
   3547  1.1    rjs 					struct sctp_tmit_chunk *chk;
   3548  1.1    rjs 					chk = TAILQ_FIRST(&stcb->asoc.sent_queue);
   3549  1.1    rjs 					if (chk) {
   3550  1.1    rjs 						sctp_timer_start(SCTP_TIMER_TYPE_SEND,
   3551  1.1    rjs 						    stcb->sctp_ep, stcb,
   3552  1.1    rjs 						    chk->whoTo);
   3553  1.1    rjs 					}
   3554  1.1    rjs 				}
   3555  1.1    rjs 			}
   3556  1.1    rjs 			break;
   3557  1.1    rjs 		case SCTP_COOKIE_ACK:
   3558  1.1    rjs #ifdef SCTP_DEBUG
   3559  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3560  1.1    rjs 				printf("SCTP_COOKIE-ACK\n");
   3561  1.1    rjs 			}
   3562  1.1    rjs #endif /* SCTP_DEBUG */
   3563  1.1    rjs 
   3564  1.1    rjs 			if (inp->sctp_flags & SCTP_PCB_FLAGS_SOCKET_GONE) {
   3565  1.1    rjs 				/* We are not interested anymore */
   3566  1.1    rjs 				sctp_free_assoc(inp, stcb);
   3567  1.1    rjs 				*offset = length;
   3568  1.1    rjs 				return (NULL);
   3569  1.1    rjs 			}
   3570  1.1    rjs 			/* He's alive so give him credit */
   3571  1.1    rjs 			stcb->asoc.overall_error_count = 0;
   3572  1.1    rjs 			sctp_handle_cookie_ack((struct sctp_cookie_ack_chunk *)ch,
   3573  1.1    rjs 			    stcb, *netp);
   3574  1.1    rjs 			break;
   3575  1.1    rjs 		case SCTP_ECN_ECHO:
   3576  1.1    rjs #ifdef SCTP_DEBUG
   3577  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3578  1.1    rjs 				printf("SCTP_ECN-ECHO\n");
   3579  1.1    rjs 			}
   3580  1.1    rjs #endif /* SCTP_DEBUG */
   3581  1.1    rjs 			/* He's alive so give him credit */
   3582  1.1    rjs 			stcb->asoc.overall_error_count = 0;
   3583  1.1    rjs 			sctp_handle_ecn_echo((struct sctp_ecne_chunk *)ch,
   3584  1.1    rjs 			    stcb);
   3585  1.1    rjs 			break;
   3586  1.1    rjs 		case SCTP_ECN_CWR:
   3587  1.1    rjs #ifdef SCTP_DEBUG
   3588  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3589  1.1    rjs 				printf("SCTP_ECN-CWR\n");
   3590  1.1    rjs 			}
   3591  1.1    rjs #endif /* SCTP_DEBUG */
   3592  1.1    rjs 			/* He's alive so give him credit */
   3593  1.1    rjs 			stcb->asoc.overall_error_count = 0;
   3594  1.1    rjs 
   3595  1.1    rjs 			sctp_handle_ecn_cwr((struct sctp_cwr_chunk *)ch, stcb);
   3596  1.1    rjs 			break;
   3597  1.1    rjs 		case SCTP_SHUTDOWN_COMPLETE:
   3598  1.1    rjs #ifdef SCTP_DEBUG
   3599  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3600  1.1    rjs 				printf("SCTP_SHUTDOWN-COMPLETE\n");
   3601  1.1    rjs 			}
   3602  1.1    rjs #endif /* SCTP_DEBUG */
   3603  1.1    rjs 			/* must be first and only chunk */
   3604  1.1    rjs 			if ((num_chunks > 1) ||
   3605  1.1    rjs 			    (length - *offset > SCTP_SIZE32(chk_length))) {
   3606  1.1    rjs 				*offset = length;
   3607  1.1    rjs 				if (locked_tcb) {
   3608  1.1    rjs 					SCTP_TCB_UNLOCK(locked_tcb);
   3609  1.1    rjs 				}
   3610  1.1    rjs 				return (NULL);
   3611  1.1    rjs 			}
   3612  1.1    rjs 			sctp_handle_shutdown_complete((struct sctp_shutdown_complete_chunk *)ch,
   3613  1.1    rjs 			    stcb, *netp);
   3614  1.1    rjs 			*offset = length;
   3615  1.1    rjs 			return (NULL);
   3616  1.1    rjs 			break;
   3617  1.1    rjs 		case SCTP_ASCONF:
   3618  1.1    rjs #ifdef SCTP_DEBUG
   3619  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3620  1.1    rjs 				printf("SCTP_ASCONF\n");
   3621  1.1    rjs 			}
   3622  1.1    rjs #endif /* SCTP_DEBUG */
   3623  1.1    rjs 			/* He's alive so give him credit */
   3624  1.1    rjs 			stcb->asoc.overall_error_count = 0;
   3625  1.1    rjs 
   3626  1.1    rjs 			sctp_handle_asconf(m, *offset,
   3627  1.1    rjs 			    (struct sctp_asconf_chunk *)ch, stcb, *netp);
   3628  1.1    rjs 			break;
   3629  1.1    rjs 		case SCTP_ASCONF_ACK:
   3630  1.1    rjs #ifdef SCTP_DEBUG
   3631  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3632  1.1    rjs 				printf("SCTP_ASCONF-ACK\n");
   3633  1.1    rjs 			}
   3634  1.1    rjs #endif /* SCTP_DEBUG */
   3635  1.1    rjs 			/* He's alive so give him credit */
   3636  1.1    rjs 			stcb->asoc.overall_error_count = 0;
   3637  1.1    rjs 
   3638  1.1    rjs 			sctp_handle_asconf_ack(m, *offset,
   3639  1.1    rjs 			    (struct sctp_asconf_ack_chunk *)ch, stcb, *netp);
   3640  1.1    rjs 			break;
   3641  1.1    rjs 		case SCTP_FORWARD_CUM_TSN:
   3642  1.1    rjs #ifdef SCTP_DEBUG
   3643  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3644  1.1    rjs 				printf("SCTP_FWD-TSN\n");
   3645  1.1    rjs 			}
   3646  1.1    rjs #endif /* SCTP_DEBUG */
   3647  1.1    rjs 			/* He's alive so give him credit */
   3648  1.1    rjs                         {
   3649  1.1    rjs 				int abort_flag = 0;
   3650  1.1    rjs 				stcb->asoc.overall_error_count = 0;
   3651  1.1    rjs 				*fwd_tsn_seen = 1;
   3652  1.1    rjs 				sctp_handle_forward_tsn(stcb,
   3653  1.1    rjs 				    (struct sctp_forward_tsn_chunk *)ch, &abort_flag);
   3654  1.1    rjs 				if (abort_flag) {
   3655  1.1    rjs 					*offset = length;
   3656  1.1    rjs 					return (NULL);
   3657  1.1    rjs 				} else {
   3658  1.1    rjs 					stcb->asoc.overall_error_count = 0;
   3659  1.1    rjs 				}
   3660  1.1    rjs 
   3661  1.1    rjs                         }
   3662  1.1    rjs 			break;
   3663  1.1    rjs 		case SCTP_STREAM_RESET:
   3664  1.1    rjs #ifdef SCTP_DEBUG
   3665  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3666  1.1    rjs 				printf("SCTP_STREAM_RESET\n");
   3667  1.1    rjs 			}
   3668  1.1    rjs #endif /* SCTP_DEBUG */
   3669  1.1    rjs 			ch = (struct sctp_chunkhdr *)sctp_m_getptr(m, *offset,
   3670  1.1    rjs 			    chk_length, chunk_buf);
   3671  1.1    rjs 			if (stcb->asoc.peer_supports_strreset == 0) {
   3672  1.1    rjs 				/* hmm, peer should have annonced this, but
   3673  1.1    rjs 				 * we will turn it on since he is sending us
   3674  1.1    rjs 				 * a stream reset.
   3675  1.1    rjs 				 */
   3676  1.1    rjs 				stcb->asoc.peer_supports_strreset = 1;
   3677  1.1    rjs  			}
   3678  1.1    rjs 			sctp_handle_stream_reset(stcb, (struct sctp_stream_reset_req *)ch);
   3679  1.1    rjs 			break;
   3680  1.1    rjs 		case SCTP_PACKET_DROPPED:
   3681  1.1    rjs #ifdef SCTP_DEBUG
   3682  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3683  1.1    rjs 				printf("SCTP_PACKET_DROPPED\n");
   3684  1.1    rjs 			}
   3685  1.1    rjs #endif /* SCTP_DEBUG */
   3686  1.1    rjs 			/* re-get it all please */
   3687  1.1    rjs 			ch = (struct sctp_chunkhdr *)sctp_m_getptr(m, *offset,
   3688  1.1    rjs 			    chk_length, chunk_buf);
   3689  1.1    rjs 
   3690  1.1    rjs 			sctp_handle_packet_dropped((struct sctp_pktdrop_chunk *)ch,
   3691  1.1    rjs 			    stcb, *netp);
   3692  1.1    rjs 
   3693  1.1    rjs 
   3694  1.1    rjs 			break;
   3695  1.1    rjs 		default:
   3696  1.1    rjs 			/* it's an unknown chunk! */
   3697  1.1    rjs 			if ((ch->chunk_type & 0x40) && (stcb != NULL)) {
   3698  1.1    rjs 				struct mbuf *mm;
   3699  1.1    rjs 				struct sctp_paramhdr *phd;
   3700  1.1    rjs 				MGETHDR(mm, M_DONTWAIT, MT_HEADER);
   3701  1.1    rjs 				if (mm) {
   3702  1.1    rjs 					phd = mtod(mm, struct sctp_paramhdr *);
   3703  1.1    rjs 					/* We cheat and use param type since we
   3704  1.1    rjs 					 * did not bother to define a error
   3705  1.1    rjs 					 * cause struct.
   3706  1.1    rjs 					 * They are the same basic format with
   3707  1.1    rjs 					 * different names.
   3708  1.1    rjs 					 */
   3709  1.1    rjs 					phd->param_type =
   3710  1.1    rjs 					    htons(SCTP_CAUSE_UNRECOG_CHUNK);
   3711  1.1    rjs 					phd->param_length =
   3712  1.1    rjs 					    htons(chk_length + sizeof(*phd));
   3713  1.1    rjs 					mm->m_len = sizeof(*phd);
   3714  1.1    rjs 					mm->m_next = sctp_m_copym(m, *offset,
   3715  1.1    rjs 					    SCTP_SIZE32(chk_length),
   3716  1.1    rjs 					    M_DONTWAIT);
   3717  1.1    rjs 					if (mm->m_next) {
   3718  1.1    rjs 						mm->m_pkthdr.len =
   3719  1.1    rjs 						    SCTP_SIZE32(chk_length) +
   3720  1.1    rjs 						    sizeof(*phd);
   3721  1.1    rjs 						sctp_queue_op_err(stcb, mm);
   3722  1.1    rjs 					} else {
   3723  1.1    rjs 						sctp_m_freem(mm);
   3724  1.1    rjs #ifdef SCTP_DEBUG
   3725  1.1    rjs 						if (sctp_debug_on &
   3726  1.1    rjs 						    SCTP_DEBUG_INPUT1) {
   3727  1.1    rjs 							printf("Gak can't copy the chunk into operr %d bytes\n",
   3728  1.1    rjs 							    chk_length);
   3729  1.1    rjs 						}
   3730  1.1    rjs #endif
   3731  1.1    rjs 					}
   3732  1.1    rjs 				}
   3733  1.1    rjs #ifdef SCTP_DEBUG
   3734  1.1    rjs 				else {
   3735  1.1    rjs 					if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   3736  1.1    rjs 						printf("Gak can't mgethdr for op-err of unrec chunk\n");
   3737  1.1    rjs 					}
   3738  1.1    rjs 				}
   3739  1.1    rjs #endif
   3740  1.1    rjs 			}
   3741  1.1    rjs 			if ((ch->chunk_type & 0x80) == 0) {
   3742  1.1    rjs 				/* discard this packet */
   3743  1.1    rjs 				*offset = length;
   3744  1.1    rjs 				return (stcb);
   3745  1.1    rjs 			} /* else skip this bad chunk and continue... */
   3746  1.1    rjs 			break;
   3747  1.1    rjs 		} /* switch (ch->chunk_type) */
   3748  1.1    rjs 		/* get the next chunk */
   3749  1.1    rjs 		*offset += SCTP_SIZE32(chk_length);
   3750  1.1    rjs 		if (*offset >= length) {
   3751  1.1    rjs 			/* no more data left in the mbuf chain */
   3752  1.1    rjs 			break;
   3753  1.1    rjs 		}
   3754  1.1    rjs 		ch = (struct sctp_chunkhdr *)sctp_m_getptr(m, *offset,
   3755  1.1    rjs 		    sizeof(struct sctp_chunkhdr), chunk_buf);
   3756  1.1    rjs 		if (ch == NULL) {
   3757  1.1    rjs 			if (locked_tcb) {
   3758  1.1    rjs 				SCTP_TCB_UNLOCK(locked_tcb);
   3759  1.1    rjs 			}
   3760  1.1    rjs 			*offset = length;
   3761  1.1    rjs 			return (NULL);
   3762  1.1    rjs 		}
   3763  1.1    rjs 	} /* while */
   3764  1.1    rjs 	return (stcb);
   3765  1.1    rjs }
   3766  1.1    rjs 
   3767  1.1    rjs 
   3768  1.1    rjs /*
   3769  1.1    rjs  * Process the ECN bits we have something set so
   3770  1.1    rjs  * we must look to see if it is ECN(0) or ECN(1) or CE
   3771  1.1    rjs  */
   3772  1.1    rjs static void
   3773  1.1    rjs sctp_process_ecn_marked_a(struct sctp_tcb *stcb, struct sctp_nets *net,
   3774  1.1    rjs     u_int8_t ecn_bits)
   3775  1.1    rjs {
   3776  1.1    rjs 	if ((ecn_bits & SCTP_CE_BITS) == SCTP_CE_BITS) {
   3777  1.1    rjs 		;
   3778  1.1    rjs 	} else if ((ecn_bits & SCTP_ECT1_BIT) == SCTP_ECT1_BIT) {
   3779  1.1    rjs 		/*
   3780  1.1    rjs 		 * we only add to the nonce sum for ECT1, ECT0
   3781  1.1    rjs 		 * does not change the NS bit (that we have
   3782  1.1    rjs 		 * yet to find a way to send it yet).
   3783  1.1    rjs 		 */
   3784  1.1    rjs 
   3785  1.1    rjs 		/* ECN Nonce stuff */
   3786  1.1    rjs 		stcb->asoc.receiver_nonce_sum++;
   3787  1.1    rjs 		stcb->asoc.receiver_nonce_sum &= SCTP_SACK_NONCE_SUM;
   3788  1.1    rjs 
   3789  1.1    rjs 		/*
   3790  1.1    rjs 		 * Drag up the last_echo point if cumack is larger since we
   3791  1.1    rjs 		 * don't want the point falling way behind by more than 2^^31
   3792  1.1    rjs 		 * and then having it be incorrect.
   3793  1.1    rjs 		 */
   3794  1.1    rjs 		if (compare_with_wrap(stcb->asoc.cumulative_tsn,
   3795  1.1    rjs 		    stcb->asoc.last_echo_tsn, MAX_TSN)) {
   3796  1.1    rjs 			stcb->asoc.last_echo_tsn = stcb->asoc.cumulative_tsn;
   3797  1.1    rjs 		}
   3798  1.1    rjs 	} else if ((ecn_bits & SCTP_ECT0_BIT) == SCTP_ECT0_BIT) {
   3799  1.1    rjs 		/*
   3800  1.1    rjs 		 * Drag up the last_echo point if cumack is larger since we
   3801  1.1    rjs 		 * don't want the point falling way behind by more than 2^^31
   3802  1.1    rjs 		 * and then having it be incorrect.
   3803  1.1    rjs 		 */
   3804  1.1    rjs 		if (compare_with_wrap(stcb->asoc.cumulative_tsn,
   3805  1.1    rjs 		    stcb->asoc.last_echo_tsn, MAX_TSN)) {
   3806  1.1    rjs 			stcb->asoc.last_echo_tsn = stcb->asoc.cumulative_tsn;
   3807  1.1    rjs 		}
   3808  1.1    rjs 	}
   3809  1.1    rjs }
   3810  1.1    rjs 
   3811  1.1    rjs static void
   3812  1.1    rjs sctp_process_ecn_marked_b(struct sctp_tcb *stcb, struct sctp_nets *net,
   3813  1.1    rjs     u_int32_t high_tsn, u_int8_t ecn_bits)
   3814  1.1    rjs {
   3815  1.1    rjs 	if ((ecn_bits & SCTP_CE_BITS) == SCTP_CE_BITS) {
   3816  1.1    rjs 		/*
   3817  1.1    rjs 		 * we possibly must notify the sender that a congestion
   3818  1.1    rjs 		 * window reduction is in order. We do this
   3819  1.1    rjs 		 * by adding a ECNE chunk to the output chunk
   3820  1.1    rjs 		 * queue. The incoming CWR will remove this chunk.
   3821  1.1    rjs 		 */
   3822  1.1    rjs 		if (compare_with_wrap(high_tsn, stcb->asoc.last_echo_tsn,
   3823  1.1    rjs 		    MAX_TSN)) {
   3824  1.1    rjs 			/* Yep, we need to add a ECNE */
   3825  1.1    rjs 			sctp_send_ecn_echo(stcb, net, high_tsn);
   3826  1.1    rjs 			stcb->asoc.last_echo_tsn = high_tsn;
   3827  1.1    rjs 		}
   3828  1.1    rjs 	}
   3829  1.1    rjs }
   3830  1.1    rjs 
   3831  1.1    rjs /*
   3832  1.1    rjs  * common input chunk processing (v4 and v6)
   3833  1.1    rjs  */
   3834  1.1    rjs int
   3835  1.1    rjs sctp_common_input_processing(struct mbuf **mm, int iphlen, int offset,
   3836  1.1    rjs     int length, struct sctphdr *sh, struct sctp_chunkhdr *ch,
   3837  1.1    rjs     struct sctp_inpcb *inp, struct sctp_tcb *stcb, struct sctp_nets *net,
   3838  1.1    rjs     u_int8_t ecn_bits)
   3839  1.1    rjs {
   3840  1.1    rjs 	/*
   3841  1.1    rjs 	 * Control chunk processing
   3842  1.1    rjs 	 */
   3843  1.1    rjs 	u_int32_t high_tsn;
   3844  1.1    rjs 	int fwd_tsn_seen = 0, data_processed = 0;
   3845  1.1    rjs 	struct mbuf *m = *mm;
   3846  1.1    rjs 	int abort_flag = 0;
   3847  1.1    rjs 
   3848  1.1    rjs 	sctp_pegs[SCTP_DATAGRAMS_RCVD]++;
   3849  1.1    rjs #ifdef SCTP_AUDITING_ENABLED
   3850  1.1    rjs 	sctp_audit_log(0xE0, 1);
   3851  1.1    rjs 	sctp_auditing(0, inp, stcb, net);
   3852  1.1    rjs #endif
   3853  1.1    rjs 
   3854  1.1    rjs #ifdef SCTP_DEBUG
   3855  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   3856  1.1    rjs 		printf("Ok, Common input processing called, m:%p iphlen:%d offset:%d length:%d\n",
   3857  1.1    rjs 		       m, iphlen, offset, length);
   3858  1.1    rjs 	}
   3859  1.1    rjs #endif /* SCTP_DEBUG */
   3860  1.1    rjs 	if (IS_SCTP_CONTROL(ch)) {
   3861  1.1    rjs 		/* process the control portion of the SCTP packet */
   3862  1.1    rjs #ifdef SCTP_DEBUG
   3863  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   3864  1.1    rjs 			printf("Processing control\n");
   3865  1.1    rjs 		}
   3866  1.1    rjs #endif /* SCTP_DEBUG */
   3867  1.1    rjs 
   3868  1.1    rjs 		stcb = sctp_process_control(m, iphlen, &offset, length, sh, ch,
   3869  1.1    rjs 		    inp, stcb, &net, &fwd_tsn_seen);
   3870  1.1    rjs 	} else {
   3871  1.1    rjs 		/*
   3872  1.1    rjs 		 * no control chunks, so pre-process DATA chunks
   3873  1.1    rjs 		 * (these checks are taken care of by control processing)
   3874  1.1    rjs 		 */
   3875  1.1    rjs #ifdef SCTP_DEBUG
   3876  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   3877  1.1    rjs 			printf("No control present\n");
   3878  1.1    rjs 		}
   3879  1.1    rjs #endif /* SCTP_DEBUG */
   3880  1.1    rjs 
   3881  1.1    rjs 		if (stcb == NULL) {
   3882  1.1    rjs 			/* out of the blue DATA chunk */
   3883  1.1    rjs 			sctp_handle_ootb(m, iphlen, offset, sh, inp, NULL);
   3884  1.1    rjs 			return (1);
   3885  1.1    rjs 		}
   3886  1.1    rjs 		if (stcb->asoc.my_vtag != ntohl(sh->v_tag)) {
   3887  1.1    rjs 			/* v_tag mismatch! */
   3888  1.1    rjs 			sctp_pegs[SCTP_BAD_VTAGS]++;
   3889  1.1    rjs 			SCTP_TCB_UNLOCK(stcb);
   3890  1.1    rjs 			return (1);
   3891  1.1    rjs 		}
   3892  1.1    rjs 	}
   3893  1.1    rjs 	if (stcb == NULL) {
   3894  1.1    rjs 		/*
   3895  1.1    rjs 		 * no valid TCB for this packet,
   3896  1.1    rjs 		 * or we found it's a bad packet while processing control,
   3897  1.1    rjs 		 * or we're done with this packet (done or skip rest of data),
   3898  1.1    rjs 		 * so we drop it...
   3899  1.1    rjs 		 */
   3900  1.1    rjs 		return (1);
   3901  1.1    rjs 	}
   3902  1.1    rjs #ifdef SCTP_DEBUG
   3903  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   3904  1.1    rjs 		printf("Ok, control finished time to look for data (%d) offset:%d\n",
   3905  1.1    rjs 		       length, offset);
   3906  1.1    rjs 	}
   3907  1.1    rjs #endif /* SCTP_DEBUG */
   3908  1.1    rjs 	/*
   3909  1.1    rjs 	 * DATA chunk processing
   3910  1.1    rjs 	 */
   3911  1.1    rjs 	/* plow through the data chunks while length > offset */
   3912  1.1    rjs 	stcb->asoc.seen_a_sack_this_pkt = 0;
   3913  1.1    rjs 
   3914  1.1    rjs 	if (length > offset) {
   3915  1.1    rjs 		int retval;
   3916  1.1    rjs 		/*
   3917  1.1    rjs 		 * First check to make sure our state is correct.
   3918  1.1    rjs 		 * We would not get here unless we really did have a
   3919  1.1    rjs 		 * tag, so we don't abort if this happens, just
   3920  1.1    rjs 		 * dump the chunk silently.
   3921  1.1    rjs 		 */
   3922  1.1    rjs 		switch (SCTP_GET_STATE(&stcb->asoc)) {
   3923  1.1    rjs 		case SCTP_STATE_COOKIE_ECHOED:
   3924  1.1    rjs 			/*
   3925  1.1    rjs 			 * we consider data with valid tags in
   3926  1.1    rjs 			 * this state shows us the cookie-ack was lost.
   3927  1.1    rjs 			 * Imply it was there.
   3928  1.1    rjs 			 */
   3929  1.1    rjs 			stcb->asoc.overall_error_count = 0;
   3930  1.1    rjs 			sctp_handle_cookie_ack(
   3931  1.1    rjs 			    (struct sctp_cookie_ack_chunk *)ch, stcb, net);
   3932  1.1    rjs 			break;
   3933  1.1    rjs 		case SCTP_STATE_COOKIE_WAIT:
   3934  1.1    rjs 			/*
   3935  1.1    rjs 			 * We consider OOTB any data sent during asoc setup.
   3936  1.1    rjs 			 */
   3937  1.1    rjs 			sctp_handle_ootb(m, iphlen, offset, sh, inp, NULL);
   3938  1.1    rjs 			SCTP_TCB_UNLOCK(stcb);
   3939  1.1    rjs 			return (1);
   3940  1.1    rjs 		        break;
   3941  1.1    rjs 		case SCTP_STATE_EMPTY:	/* should not happen */
   3942  1.1    rjs 		case SCTP_STATE_INUSE:	/* should not happen */
   3943  1.1    rjs 		case SCTP_STATE_SHUTDOWN_RECEIVED:  /* This is a peer error */
   3944  1.1    rjs 		case SCTP_STATE_SHUTDOWN_ACK_SENT:
   3945  1.1    rjs 		default:
   3946  1.1    rjs #ifdef SCTP_DEBUG
   3947  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   3948  1.1    rjs 				printf("Got data in invalid state %d.. dropping\n", stcb->asoc.state);
   3949  1.1    rjs 			}
   3950  1.1    rjs #endif
   3951  1.1    rjs 			SCTP_TCB_UNLOCK(stcb);
   3952  1.1    rjs 			return (1);
   3953  1.1    rjs 			break;
   3954  1.1    rjs 		case SCTP_STATE_OPEN:
   3955  1.1    rjs 		case SCTP_STATE_SHUTDOWN_SENT:
   3956  1.1    rjs 			break;
   3957  1.1    rjs 		}
   3958  1.1    rjs 		/* take care of ECN, part 1. */
   3959  1.1    rjs 		if (stcb->asoc.ecn_allowed &&
   3960  1.1    rjs 		    (ecn_bits & (SCTP_ECT0_BIT|SCTP_ECT1_BIT)) ) {
   3961  1.1    rjs 			sctp_process_ecn_marked_a(stcb, net, ecn_bits);
   3962  1.1    rjs 		}
   3963  1.1    rjs 		/* plow through the data chunks while length > offset */
   3964  1.1    rjs 		retval = sctp_process_data(mm, iphlen, &offset, length, sh,
   3965  1.1    rjs 		    inp, stcb, net, &high_tsn);
   3966  1.1    rjs 		if (retval == 2) {
   3967  1.1    rjs 			/* The association aborted, NO UNLOCK needed
   3968  1.1    rjs 			 * since the association is destroyed.
   3969  1.1    rjs 			 */
   3970  1.1    rjs 			return (0);
   3971  1.1    rjs 		}
   3972  1.1    rjs 
   3973  1.1    rjs 		data_processed = 1;
   3974  1.1    rjs 		if (retval == 0) {
   3975  1.1    rjs 			/* take care of ecn part 2. */
   3976  1.1    rjs 			if (stcb->asoc.ecn_allowed && (ecn_bits & (SCTP_ECT0_BIT|SCTP_ECT1_BIT)) ) {
   3977  1.1    rjs 				sctp_process_ecn_marked_b(stcb, net, high_tsn, ecn_bits);
   3978  1.1    rjs 
   3979  1.1    rjs 			}
   3980  1.1    rjs 		}
   3981  1.1    rjs 
   3982  1.1    rjs 		/*
   3983  1.1    rjs 		 * Anything important needs to have been m_copy'ed in
   3984  1.1    rjs 		 * process_data
   3985  1.1    rjs 		 */
   3986  1.1    rjs 	}
   3987  1.1    rjs 	if ((data_processed == 0) && (fwd_tsn_seen)) {
   3988  1.1    rjs 		int was_a_gap = 0;
   3989  1.1    rjs 		if (compare_with_wrap(stcb->asoc.highest_tsn_inside_map,
   3990  1.1    rjs 				      stcb->asoc.cumulative_tsn, MAX_TSN)) {
   3991  1.1    rjs 			/* there was a gap before this data was processed */
   3992  1.1    rjs 			was_a_gap = 1;
   3993  1.1    rjs 		}
   3994  1.1    rjs 		sctp_sack_check(stcb, 1, was_a_gap, &abort_flag);
   3995  1.1    rjs 		if (abort_flag) {
   3996  1.1    rjs 			/* Again, we aborted so NO UNLOCK needed */
   3997  1.1    rjs 			return (0);
   3998  1.1    rjs 		}
   3999  1.1    rjs 	}
   4000  1.1    rjs 	/* trigger send of any chunks in queue... */
   4001  1.1    rjs #ifdef SCTP_AUDITING_ENABLED
   4002  1.1    rjs 	sctp_audit_log(0xE0, 2);
   4003  1.1    rjs 	sctp_auditing(1, inp, stcb, net);
   4004  1.1    rjs #endif
   4005  1.1    rjs #ifdef SCTP_DEBUG
   4006  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   4007  1.1    rjs 		printf("Check for chunk output prw:%d tqe:%d tf=%d\n",
   4008  1.1    rjs 		       stcb->asoc.peers_rwnd,
   4009  1.1    rjs 		       TAILQ_EMPTY(&stcb->asoc.control_send_queue),
   4010  1.1    rjs 		       stcb->asoc.total_flight);
   4011  1.1    rjs 	}
   4012  1.1    rjs #endif
   4013  1.1    rjs 	if (stcb->asoc.peers_rwnd > 0 ||
   4014  1.1    rjs 	    !TAILQ_EMPTY(&stcb->asoc.control_send_queue) ||
   4015  1.1    rjs 	    (stcb->asoc.peers_rwnd <= 0 && stcb->asoc.total_flight == 0)) {
   4016  1.1    rjs #ifdef SCTP_DEBUG
   4017  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   4018  1.1    rjs 			printf("Calling chunk OUTPUT\n");
   4019  1.1    rjs 		}
   4020  1.1    rjs #endif
   4021  1.1    rjs 		sctp_chunk_output(inp, stcb, 3);
   4022  1.1    rjs #ifdef SCTP_DEBUG
   4023  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT3) {
   4024  1.1    rjs 			printf("chunk OUTPUT returns\n");
   4025  1.1    rjs 		}
   4026  1.1    rjs #endif
   4027  1.1    rjs 	}
   4028  1.1    rjs 
   4029  1.1    rjs #ifdef SCTP_AUDITING_ENABLED
   4030  1.1    rjs 	sctp_audit_log(0xE0, 3);
   4031  1.1    rjs 	sctp_auditing(2, inp, stcb, net);
   4032  1.1    rjs #endif
   4033  1.1    rjs 	SCTP_TCB_UNLOCK(stcb);
   4034  1.1    rjs 	return (0);
   4035  1.1    rjs }
   4036  1.1    rjs 
   4037  1.1    rjs #if defined(__OpenBSD__)
   4038  1.1    rjs static void
   4039  1.1    rjs sctp_saveopt(struct sctp_inpcb *inp, struct mbuf **mp, struct ip *ip,
   4040  1.1    rjs     struct mbuf *m)
   4041  1.1    rjs {
   4042  1.1    rjs 	if (inp->ip_inp.inp.inp_flags & INP_RECVDSTADDR) {
   4043  1.1    rjs 		*mp = sbcreatecontrol((vaddr_t) &ip->ip_dst,
   4044  1.1    rjs 		    sizeof(struct in_addr), IP_RECVDSTADDR, IPPROTO_IP);
   4045  1.1    rjs 		if (*mp)
   4046  1.1    rjs 			mp = &(*mp)->m_next;
   4047  1.1    rjs 	}
   4048  1.1    rjs }
   4049  1.1    rjs #endif
   4050  1.1    rjs 
   4051  1.1    rjs extern int sctp_no_csum_on_loopback;
   4052  1.1    rjs 
   4053  1.1    rjs void
   4054  1.1    rjs sctp_input(struct mbuf *m, ...)
   4055  1.1    rjs {
   4056  1.1    rjs 	int iphlen;
   4057  1.1    rjs 	u_int8_t ecn_bits;
   4058  1.1    rjs 	struct ip *ip;
   4059  1.1    rjs 	struct sctphdr *sh;
   4060  1.1    rjs 	struct sctp_inpcb *inp = NULL;
   4061  1.1    rjs 	struct mbuf *opts = 0;
   4062  1.1    rjs /*#ifdef INET6*/
   4063  1.1    rjs /* Don't think this is needed */
   4064  1.1    rjs /*	struct ip6_recvpktopts opts6;*/
   4065  1.1    rjs /*#endif INET6 */
   4066  1.1    rjs 
   4067  1.1    rjs 	u_int32_t check, calc_check;
   4068  1.1    rjs 	struct sctp_nets *net;
   4069  1.1    rjs 	struct sctp_tcb *stcb = NULL;
   4070  1.1    rjs 	struct sctp_chunkhdr *ch;
   4071  1.1    rjs 	int refcount_up = 0;
   4072  1.1    rjs 	int length, mlen, offset;
   4073  1.1    rjs 
   4074  1.1    rjs 	int off;
   4075  1.1    rjs 	va_list ap;
   4076  1.1    rjs 
   4077  1.1    rjs 	va_start(ap, m);
   4078  1.1    rjs 	iphlen = off = va_arg(ap, int);
   4079  1.1    rjs 	va_end(ap);
   4080  1.1    rjs 
   4081  1.1    rjs 	net = NULL;
   4082  1.1    rjs 	sctp_pegs[SCTP_INPKTS]++;
   4083  1.1    rjs #ifdef SCTP_DEBUG
   4084  1.1    rjs 	/*if (sctp_debug_on & SCTP_DEBUG_INPUT1) {*/
   4085  1.1    rjs 		printf("V4 input gets a packet iphlen:%d pktlen:%d\n", iphlen, m->m_pkthdr.len);
   4086  1.1    rjs 	/*}*/
   4087  1.1    rjs #endif
   4088  1.1    rjs /*#ifdef INET6*/
   4089  1.1    rjs /* Don't think this is needed */
   4090  1.1    rjs /*	bzero(&opts6, sizeof(opts6));*/
   4091  1.1    rjs /*#endif INET6 */
   4092  1.1    rjs 
   4093  1.1    rjs 	/*
   4094  1.1    rjs 	 * Strip IP options, we don't allow any in or out.
   4095  1.1    rjs 	 */
   4096  1.1    rjs 	if ((size_t)iphlen > sizeof(struct ip)) {
   4097  1.1    rjs 		printf("sctp_input: got options\n");
   4098  1.1    rjs #if 0				/* XXX */
   4099  1.1    rjs 		ip_stripoptions(m, (struct mbuf *)0);
   4100  1.1    rjs #endif
   4101  1.1    rjs 		iphlen = sizeof(struct ip);
   4102  1.1    rjs 	}
   4103  1.1    rjs 
   4104  1.1    rjs 	/*
   4105  1.1    rjs 	 * Get IP, SCTP, and first chunk header together in first mbuf.
   4106  1.1    rjs 	 */
   4107  1.1    rjs 	ip = mtod(m, struct ip *);
   4108  1.1    rjs 	offset = iphlen + sizeof(*sh) + sizeof(*ch);
   4109  1.1    rjs 	if (m->m_len < offset) {
   4110  1.1    rjs 		if ((m = m_pullup(m, offset)) == 0) {
   4111  1.1    rjs 			sctp_pegs[SCTP_HDR_DROPS]++;
   4112  1.1    rjs 			return;
   4113  1.1    rjs 		}
   4114  1.1    rjs 		ip = mtod(m, struct ip *);
   4115  1.1    rjs 	}
   4116  1.1    rjs 	sh = (struct sctphdr *)((vaddr_t)ip + iphlen);
   4117  1.1    rjs 	ch = (struct sctp_chunkhdr *)((vaddr_t)sh + sizeof(*sh));
   4118  1.1    rjs 
   4119  1.1    rjs 	/* SCTP does not allow broadcasts or multicasts */
   4120  1.1    rjs 	if (IN_MULTICAST(ip->ip_dst.s_addr))
   4121  1.1    rjs 	{
   4122  1.1    rjs 		sctp_pegs[SCTP_IN_MCAST]++;
   4123  1.1    rjs 		goto bad;
   4124  1.1    rjs 	}
   4125  1.3  ozaki 	if (in_broadcast(ip->ip_dst, m_get_rcvif_NOMPSAFE(m))) {
   4126  1.1    rjs 		sctp_pegs[SCTP_IN_MCAST]++;
   4127  1.1    rjs 		goto bad;
   4128  1.1    rjs 	}
   4129  1.1    rjs 
   4130  1.1    rjs 	/* destination port of 0 is illegal, based on RFC2960. */
   4131  1.1    rjs 	if (sh->dest_port == 0) {
   4132  1.1    rjs 	        sctp_pegs[SCTP_HDR_DROPS]++;
   4133  1.1    rjs 		goto bad;
   4134  1.1    rjs 	}
   4135  1.1    rjs 
   4136  1.1    rjs 	/* validate SCTP checksum */
   4137  1.1    rjs 	if ((sctp_no_csum_on_loopback == 0) ||
   4138  1.3  ozaki 	    (m_get_rcvif_NOMPSAFE(m) == NULL) ||
   4139  1.3  ozaki 	    (m_get_rcvif_NOMPSAFE(m)->if_type != IFT_LOOP)) {
   4140  1.1    rjs 		/* we do NOT validate things from the loopback if the
   4141  1.1    rjs 		 * sysctl is set to 1.
   4142  1.1    rjs 		 */
   4143  1.1    rjs 		check = sh->checksum;	/* save incoming checksum */
   4144  1.1    rjs 		if ((check == 0) && (sctp_no_csum_on_loopback)) {
   4145  1.1    rjs 			/* special hook for where we got a local address
   4146  1.1    rjs 			 * somehow routed across a non IFT_LOOP type interface
   4147  1.1    rjs 			 */
   4148  1.1    rjs 			if (ip->ip_src.s_addr == ip->ip_dst.s_addr)
   4149  1.1    rjs 				goto sctp_skip_csum_4;
   4150  1.1    rjs 		}
   4151  1.1    rjs 		sh->checksum = 0;		/* prepare for calc */
   4152  1.1    rjs 		calc_check = sctp_calculate_sum(m, &mlen, iphlen);
   4153  1.1    rjs 		if (calc_check != check) {
   4154  1.1    rjs #ifdef SCTP_DEBUG
   4155  1.1    rjs 			if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   4156  1.1    rjs 				printf("Bad CSUM on SCTP packet calc_check:%x check:%x  m:%p mlen:%d iphlen:%d\n",
   4157  1.1    rjs 				       calc_check, check, m, mlen, iphlen);
   4158  1.1    rjs 			}
   4159  1.1    rjs #endif
   4160  1.1    rjs 
   4161  1.1    rjs 			stcb = sctp_findassociation_addr(m, iphlen,
   4162  1.1    rjs 							 offset - sizeof(*ch),
   4163  1.1    rjs 							 sh, ch, &inp, &net);
   4164  1.1    rjs 			if ((inp) && (stcb)) {
   4165  1.1    rjs 				sctp_send_packet_dropped(stcb, net, m, iphlen,
   4166  1.1    rjs 							 1);
   4167  1.1    rjs 				sctp_chunk_output(inp, stcb, 2);
   4168  1.1    rjs 			} else if ((inp != NULL) && (stcb == NULL)) {
   4169  1.1    rjs 				refcount_up = 1;
   4170  1.1    rjs 			}
   4171  1.1    rjs 			sctp_pegs[SCTP_BAD_CSUM]++;
   4172  1.1    rjs 			goto bad;
   4173  1.1    rjs 		}
   4174  1.1    rjs 		sh->checksum = calc_check;
   4175  1.1    rjs 	} else {
   4176  1.1    rjs 	sctp_skip_csum_4:
   4177  1.1    rjs 		mlen = m->m_pkthdr.len;
   4178  1.1    rjs 	}
   4179  1.1    rjs 	/* validate mbuf chain length with IP payload length */
   4180  1.1    rjs #if defined(__NetBSD__) || defined(__OpenBSD__)
   4181  1.1    rjs 	/* Open BSD gives us the len in network order, fix it */
   4182  1.1    rjs 	NTOHS(ip->ip_len);
   4183  1.1    rjs #endif
   4184  1.1    rjs 	if (mlen < (ip->ip_len - iphlen)) {
   4185  1.1    rjs 	        sctp_pegs[SCTP_HDR_DROPS]++;
   4186  1.1    rjs 		goto bad;
   4187  1.1    rjs 	}
   4188  1.1    rjs 
   4189  1.1    rjs 	/*
   4190  1.1    rjs 	 * Locate pcb and tcb for datagram
   4191  1.1    rjs 	 * sctp_findassociation_addr() wants IP/SCTP/first chunk header...
   4192  1.1    rjs 	 */
   4193  1.1    rjs #ifdef SCTP_DEBUG
   4194  1.1    rjs 	if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   4195  1.1    rjs 		printf("V4 find association\n");
   4196  1.1    rjs 	}
   4197  1.1    rjs #endif
   4198  1.1    rjs 
   4199  1.1    rjs 	stcb = sctp_findassociation_addr(m, iphlen, offset - sizeof(*ch),
   4200  1.1    rjs 	    sh, ch, &inp, &net);
   4201  1.1    rjs 	/* inp's ref-count increased && stcb locked */
   4202  1.1    rjs 	if (inp == NULL) {
   4203  1.1    rjs 		struct sctp_init_chunk *init_chk, chunk_buf;
   4204  1.1    rjs 
   4205  1.1    rjs 		sctp_pegs[SCTP_NOPORTS]++;
   4206  1.1    rjs #ifdef ICMP_BANDLIM
   4207  1.1    rjs 		/*
   4208  1.1    rjs 		 * we use the bandwidth limiting to protect against
   4209  1.1    rjs 		 * sending too many ABORTS all at once. In this case
   4210  1.1    rjs 		 * these count the same as an ICMP message.
   4211  1.1    rjs 		 */
   4212  1.1    rjs 		if (badport_bandlim(0) < 0)
   4213  1.1    rjs 			goto bad;
   4214  1.1    rjs #endif /* ICMP_BANDLIM */
   4215  1.1    rjs #ifdef SCTP_DEBUG
   4216  1.1    rjs 		if (sctp_debug_on & SCTP_DEBUG_INPUT1) {
   4217  1.1    rjs 			printf("Sending a ABORT from packet entry!\n");
   4218  1.1    rjs 		}
   4219  1.1    rjs #endif
   4220  1.1    rjs 		if (ch->chunk_type == SCTP_INITIATION) {
   4221  1.1    rjs 			/* we do a trick here to get the INIT tag,
   4222  1.1    rjs 			 * dig in and get the tag from the INIT and
   4223  1.1    rjs 			 * put it in the common header.
   4224  1.1    rjs 			 */
   4225  1.1    rjs 			init_chk = (struct sctp_init_chunk *)sctp_m_getptr(m,
   4226  1.1    rjs 			    iphlen + sizeof(*sh), sizeof(*init_chk),
   4227  1.1    rjs 			    (u_int8_t *)&chunk_buf);
   4228  1.1    rjs 			if (init_chk != NULL)
   4229  1.1    rjs 				sh->v_tag = init_chk->init.initiate_tag;
   4230  1.1    rjs 		}
   4231  1.1    rjs 		sctp_send_abort(m, iphlen, sh, 0, NULL);
   4232  1.1    rjs 		goto bad;
   4233  1.1    rjs 	} else if (stcb == NULL) {
   4234  1.1    rjs 		refcount_up = 1;
   4235  1.1    rjs 	}
   4236  1.1    rjs #ifdef IPSEC
   4237  1.1    rjs 	/*
   4238  1.1    rjs 	 * I very much doubt any of the IPSEC stuff will work but I have
   4239  1.1    rjs 	 * no idea, so I will leave it in place.
   4240  1.1    rjs 	 */
   4241  1.8   maxv 	if (ipsec_used && ipsec_in_reject(m, (struct inpcb *)inp)) {
   4242  1.2    rjs #if 0
   4243  1.1    rjs 		ipsecstat.in_polvio++;
   4244  1.2    rjs #endif
   4245  1.1    rjs 		sctp_pegs[SCTP_HDR_DROPS]++;
   4246  1.1    rjs 		goto bad;
   4247  1.1    rjs 	}
   4248  1.1    rjs #endif /* IPSEC */
   4249  1.1    rjs 
   4250  1.1    rjs 	/*
   4251  1.1    rjs 	 * Construct sockaddr format source address.
   4252  1.1    rjs 	 * Stuff source address and datagram in user buffer.
   4253  1.1    rjs 	 */
   4254  1.1    rjs 	if ((inp->ip_inp.inp.inp_flags & INP_CONTROLOPTS)
   4255  1.1    rjs 	    || (inp->sctp_socket->so_options & SO_TIMESTAMP)
   4256  1.1    rjs 		) {
   4257  1.1    rjs 		ip_savecontrol((struct inpcb *)inp, &opts, ip, m);
   4258  1.1    rjs 	}
   4259  1.1    rjs 
   4260  1.1    rjs 	/*
   4261  1.1    rjs 	 * common chunk processing
   4262  1.1    rjs 	 */
   4263  1.1    rjs 	length = ip->ip_len - (ip->ip_hl << 2) + iphlen;
   4264  1.1    rjs 	offset -= sizeof(struct sctp_chunkhdr);
   4265  1.1    rjs 
   4266  1.1    rjs 	ecn_bits = ip->ip_tos;
   4267  1.1    rjs 	sctp_common_input_processing(&m, iphlen, offset, length, sh, ch,
   4268  1.1    rjs 	    inp, stcb, net, ecn_bits);
   4269  1.1    rjs 	/* inp's ref-count reduced && stcb unlocked */
   4270  1.1    rjs 	if (m) {
   4271  1.1    rjs 		sctp_m_freem(m);
   4272  1.1    rjs 	}
   4273  1.1    rjs 	if (opts)
   4274  1.1    rjs 		sctp_m_freem(opts);
   4275  1.1    rjs 
   4276  1.1    rjs 	if ((inp) && (refcount_up)) {
   4277  1.1    rjs 		/* reduce ref-count */
   4278  1.1    rjs 		SCTP_INP_WLOCK(inp);
   4279  1.1    rjs 		SCTP_INP_DECR_REF(inp);
   4280  1.1    rjs 		SCTP_INP_WUNLOCK(inp);
   4281  1.1    rjs 	}
   4282  1.1    rjs 
   4283  1.1    rjs 	return;
   4284  1.1    rjs bad:
   4285  1.1    rjs 	if (stcb) {
   4286  1.1    rjs 		SCTP_TCB_UNLOCK(stcb);
   4287  1.1    rjs 	}
   4288  1.1    rjs 
   4289  1.1    rjs 	if ((inp) && (refcount_up)) {
   4290  1.1    rjs 		/* reduce ref-count */
   4291  1.1    rjs 		SCTP_INP_WLOCK(inp);
   4292  1.1    rjs 		SCTP_INP_DECR_REF(inp);
   4293  1.1    rjs 		SCTP_INP_WUNLOCK(inp);
   4294  1.1    rjs 	}
   4295  1.1    rjs 
   4296  1.1    rjs 	if (m) {
   4297  1.1    rjs 		sctp_m_freem(m);
   4298  1.1    rjs 	}
   4299  1.1    rjs 	if (opts)
   4300  1.1    rjs 		sctp_m_freem(opts);
   4301  1.1    rjs 	return;
   4302  1.1    rjs }
   4303