version 1.63, 2002/10/22 02:34:47 |
version 1.78.2.1, 2004/05/10 15:00:12 |
|
|
* 2. Redistributions in binary form must reproduce the above copyright |
* 2. Redistributions in binary form must reproduce the above copyright |
* notice, this list of conditions and the following disclaimer in the |
* notice, this list of conditions and the following disclaimer in the |
* documentation and/or other materials provided with the distribution. |
* documentation and/or other materials provided with the distribution. |
* 3. All advertising materials mentioning features or use of this software |
* 3. Neither the name of the University nor the names of its contributors |
* must display the following acknowledgement: |
|
* This product includes software developed by the University of |
|
* California, Berkeley and its contributors. |
|
* 4. Neither the name of the University nor the names of its contributors |
|
* may be used to endorse or promote products derived from this software |
* may be used to endorse or promote products derived from this software |
* without specific prior written permission. |
* without specific prior written permission. |
* |
* |
|
|
#include <sys/cdefs.h> |
#include <sys/cdefs.h> |
__KERNEL_RCSID(0, "$NetBSD$"); |
__KERNEL_RCSID(0, "$NetBSD$"); |
|
|
|
#include "opt_inet.h" |
#include "opt_ipsec.h" |
#include "opt_ipsec.h" |
#include "opt_mrouting.h" |
#include "opt_mrouting.h" |
|
|
Line 98 __KERNEL_RCSID(0, "$NetBSD$"); |
|
Line 95 __KERNEL_RCSID(0, "$NetBSD$"); |
|
#include <netinet6/ipsec.h> |
#include <netinet6/ipsec.h> |
#endif /*IPSEC*/ |
#endif /*IPSEC*/ |
|
|
|
#ifdef FAST_IPSEC |
|
#include <netipsec/ipsec.h> |
|
#include <netipsec/ipsec_var.h> /* XXX ipsecstat namespace */ |
|
#endif /* FAST_IPSEC*/ |
|
|
struct inpcbtable rawcbtable; |
struct inpcbtable rawcbtable; |
|
|
int rip_pcbnotify __P((struct inpcbtable *, struct in_addr, |
int rip_pcbnotify __P((struct inpcbtable *, struct in_addr, |
Line 142 rip_input(m, va_alist) |
|
Line 144 rip_input(m, va_alist) |
|
{ |
{ |
int proto; |
int proto; |
struct ip *ip = mtod(m, struct ip *); |
struct ip *ip = mtod(m, struct ip *); |
|
struct inpcb_hdr *inph; |
struct inpcb *inp; |
struct inpcb *inp; |
struct inpcb *last = 0; |
struct inpcb *last = 0; |
struct mbuf *opts = 0; |
struct mbuf *opts = 0; |
Line 149 rip_input(m, va_alist) |
|
Line 152 rip_input(m, va_alist) |
|
va_list ap; |
va_list ap; |
|
|
va_start(ap, m); |
va_start(ap, m); |
|
(void)va_arg(ap, int); /* ignore value, advance ap */ |
proto = va_arg(ap, int); |
proto = va_arg(ap, int); |
va_end(ap); |
va_end(ap); |
|
|
Line 166 rip_input(m, va_alist) |
|
Line 170 rip_input(m, va_alist) |
|
ip->ip_len = ntohs(ip->ip_len) - (ip->ip_hl << 2); |
ip->ip_len = ntohs(ip->ip_len) - (ip->ip_hl << 2); |
NTOHS(ip->ip_off); |
NTOHS(ip->ip_off); |
|
|
CIRCLEQ_FOREACH(inp, &rawcbtable.inpt_queue, inp_queue) { |
CIRCLEQ_FOREACH(inph, &rawcbtable.inpt_queue, inph_queue) { |
|
inp = (struct inpcb *)inph; |
|
if (inp->inp_af != AF_INET) |
|
continue; |
if (inp->inp_ip.ip_p && inp->inp_ip.ip_p != proto) |
if (inp->inp_ip.ip_p && inp->inp_ip.ip_p != proto) |
continue; |
continue; |
if (!in_nullhost(inp->inp_laddr) && |
if (!in_nullhost(inp->inp_laddr) && |
Line 178 rip_input(m, va_alist) |
|
Line 185 rip_input(m, va_alist) |
|
if (last) { |
if (last) { |
struct mbuf *n; |
struct mbuf *n; |
|
|
#ifdef IPSEC |
#if defined(IPSEC) || defined(FAST_IPSEC) |
/* check AH/ESP integrity. */ |
/* check AH/ESP integrity. */ |
if (ipsec4_in_reject_so(m, last->inp_socket)) { |
if (ipsec4_in_reject_so(m, last->inp_socket)) { |
ipsecstat.in_polvio++; |
ipsecstat.in_polvio++; |
Line 202 rip_input(m, va_alist) |
|
Line 209 rip_input(m, va_alist) |
|
} |
} |
last = inp; |
last = inp; |
} |
} |
#ifdef IPSEC |
#if defined(IPSEC) || defined(FAST_IPSEC) |
/* check AH/ESP integrity. */ |
/* check AH/ESP integrity. */ |
if (last && ipsec4_in_reject_so(m, last->inp_socket)) { |
if (last && ipsec4_in_reject_so(m, last->inp_socket)) { |
m_freem(m); |
m_freem(m); |
Line 246 rip_pcbnotify(table, faddr, laddr, proto |
|
Line 253 rip_pcbnotify(table, faddr, laddr, proto |
|
int nmatch; |
int nmatch; |
|
|
nmatch = 0; |
nmatch = 0; |
for (inp = CIRCLEQ_FIRST(&table->inpt_queue); |
for (inp = (struct inpcb *)CIRCLEQ_FIRST(&table->inpt_queue); |
inp != (struct inpcb *)&table->inpt_queue; |
inp != (struct inpcb *)&table->inpt_queue; |
inp = ninp) { |
inp = ninp) { |
ninp = inp->inp_queue.cqe_next; |
ninp = (struct inpcb *)inp->inp_queue.cqe_next; |
|
if (inp->inp_af != AF_INET) |
|
continue; |
if (inp->inp_ip.ip_p && inp->inp_ip.ip_p != proto) |
if (inp->inp_ip.ip_p && inp->inp_ip.ip_p != proto) |
continue; |
continue; |
if (in_hosteq(inp->inp_faddr, faddr) && |
if (in_hosteq(inp->inp_faddr, faddr) && |
Line 331 rip_output(m, va_alist) |
|
Line 340 rip_output(m, va_alist) |
|
m_freem(m); |
m_freem(m); |
return (EMSGSIZE); |
return (EMSGSIZE); |
} |
} |
M_PREPEND(m, sizeof(struct ip), M_WAIT); |
M_PREPEND(m, sizeof(struct ip), M_DONTWAIT); |
|
if (!m) |
|
return (ENOBUFS); |
ip = mtod(m, struct ip *); |
ip = mtod(m, struct ip *); |
ip->ip_tos = 0; |
ip->ip_tos = 0; |
ip->ip_off = htons(0); |
ip->ip_off = htons(0); |
Line 347 rip_output(m, va_alist) |
|
Line 358 rip_output(m, va_alist) |
|
return (EMSGSIZE); |
return (EMSGSIZE); |
} |
} |
ip = mtod(m, struct ip *); |
ip = mtod(m, struct ip *); |
|
|
|
/* |
|
* If the mbuf is read-only, we need to allocate |
|
* a new mbuf for the header, since we need to |
|
* modify the header. |
|
*/ |
|
if (M_READONLY(m)) { |
|
int hlen = ip->ip_hl << 2; |
|
|
|
m = m_copyup(m, hlen, (max_linkhdr + 3) & ~3); |
|
if (m == NULL) |
|
return (ENOMEM); /* XXX */ |
|
ip = mtod(m, struct ip *); |
|
} |
|
|
/* XXX userland passes ip_len and ip_off in host order */ |
/* XXX userland passes ip_len and ip_off in host order */ |
if (m->m_pkthdr.len != ip->ip_len) { |
if (m->m_pkthdr.len != ip->ip_len) { |
m_freem(m); |
m_freem(m); |
Line 355 rip_output(m, va_alist) |
|
Line 381 rip_output(m, va_alist) |
|
HTONS(ip->ip_len); |
HTONS(ip->ip_len); |
HTONS(ip->ip_off); |
HTONS(ip->ip_off); |
if (ip->ip_id == 0) |
if (ip->ip_id == 0) |
ip->ip_id = htons(ip_id++); |
ip->ip_id = ip_newid(); |
opts = NULL; |
opts = NULL; |
/* XXX prevent ip_output from overwriting header fields */ |
/* XXX prevent ip_output from overwriting header fields */ |
flags |= IP_RAWOUTPUT; |
flags |= IP_RAWOUTPUT; |
ipstat.ips_rawout++; |
ipstat.ips_rawout++; |
} |
} |
#ifdef IPSEC |
|
if (ipsec_setsocket(m, inp->inp_socket) != 0) { |
|
m_freem(m); |
|
return ENOBUFS; |
|
} |
|
#endif /*IPSEC*/ |
|
return (ip_output(m, opts, &inp->inp_route, flags, inp->inp_moptions, |
return (ip_output(m, opts, &inp->inp_route, flags, inp->inp_moptions, |
&inp->inp_errormtu)); |
inp->inp_socket, &inp->inp_errormtu)); |
} |
} |
|
|
/* |
/* |
Line 426 rip_ctloutput(op, so, level, optname, m) |
|
Line 446 rip_ctloutput(op, so, level, optname, m) |
|
case PRCO_GETOPT: |
case PRCO_GETOPT: |
switch (optname) { |
switch (optname) { |
case IP_HDRINCL: |
case IP_HDRINCL: |
*m = m_get(M_WAIT, M_SOOPTS); |
*m = m_get(M_WAIT, MT_SOOPTS); |
|
MCLAIM((*m), so->so_mowner); |
(*m)->m_len = sizeof (int); |
(*m)->m_len = sizeof (int); |
*mtod(*m, int *) = inp->inp_flags & INP_HDRINCL ? 1 : 0; |
*mtod(*m, int *) = inp->inp_flags & INP_HDRINCL ? 1 : 0; |
break; |
break; |