version 1.61, 2002/06/09 16:33:43 |
version 1.74, 2003/08/22 22:00:37 |
|
|
* 2. Redistributions in binary form must reproduce the above copyright |
* 2. Redistributions in binary form must reproduce the above copyright |
* notice, this list of conditions and the following disclaimer in the |
* notice, this list of conditions and the following disclaimer in the |
* documentation and/or other materials provided with the distribution. |
* documentation and/or other materials provided with the distribution. |
* 3. All advertising materials mentioning features or use of this software |
* 3. Neither the name of the University nor the names of its contributors |
* must display the following acknowledgement: |
|
* This product includes software developed by the University of |
|
* California, Berkeley and its contributors. |
|
* 4. Neither the name of the University nor the names of its contributors |
|
* may be used to endorse or promote products derived from this software |
* may be used to endorse or promote products derived from this software |
* without specific prior written permission. |
* without specific prior written permission. |
* |
* |
Line 98 __KERNEL_RCSID(0, "$NetBSD$"); |
|
Line 94 __KERNEL_RCSID(0, "$NetBSD$"); |
|
#include <netinet6/ipsec.h> |
#include <netinet6/ipsec.h> |
#endif /*IPSEC*/ |
#endif /*IPSEC*/ |
|
|
|
#ifdef FAST_IPSEC |
|
#include <netipsec/ipsec.h> |
|
#endif /* FAST_IPSEC*/ |
|
|
struct inpcbtable rawcbtable; |
struct inpcbtable rawcbtable; |
|
|
int rip_pcbnotify __P((struct inpcbtable *, struct in_addr, |
int rip_pcbnotify __P((struct inpcbtable *, struct in_addr, |
|
|
in_pcbinit(&rawcbtable, 1, 1); |
in_pcbinit(&rawcbtable, 1, 1); |
} |
} |
|
|
static struct sockaddr_in ripsrc = { sizeof(ripsrc), AF_INET }; |
|
|
|
/* |
/* |
* Setup generic address and protocol structures |
* Setup generic address and protocol structures |
* for raw_input routine, then pass them along with |
* for raw_input routine, then pass them along with |
Line 142 rip_input(m, va_alist) |
|
Line 140 rip_input(m, va_alist) |
|
va_dcl |
va_dcl |
#endif |
#endif |
{ |
{ |
int off, proto; |
int proto; |
struct ip *ip = mtod(m, struct ip *); |
struct ip *ip = mtod(m, struct ip *); |
struct inpcb *inp; |
struct inpcb *inp; |
struct inpcb *last = 0; |
struct inpcb *last = 0; |
Line 151 rip_input(m, va_alist) |
|
Line 149 rip_input(m, va_alist) |
|
va_list ap; |
va_list ap; |
|
|
va_start(ap, m); |
va_start(ap, m); |
off = va_arg(ap, int); |
(void)va_arg(ap, int); /* ignore value, advance ap */ |
proto = va_arg(ap, int); |
proto = va_arg(ap, int); |
va_end(ap); |
va_end(ap); |
|
|
Line 163 rip_input(m, va_alist) |
|
Line 161 rip_input(m, va_alist) |
|
|
|
/* |
/* |
* XXX Compatibility: programs using raw IP expect ip_len |
* XXX Compatibility: programs using raw IP expect ip_len |
* XXX to have the header length subtracted. |
* XXX to have the header length subtracted, and in host order. |
|
* XXX ip_off is also expected to be host order. |
*/ |
*/ |
ip->ip_len -= ip->ip_hl << 2; |
ip->ip_len = ntohs(ip->ip_len) - (ip->ip_hl << 2); |
|
NTOHS(ip->ip_off); |
|
|
CIRCLEQ_FOREACH(inp, &rawcbtable.inpt_queue, inp_queue) { |
CIRCLEQ_FOREACH(inp, &rawcbtable.inpt_queue, inp_queue) { |
if (inp->inp_ip.ip_p && inp->inp_ip.ip_p != proto) |
if (inp->inp_ip.ip_p && inp->inp_ip.ip_p != proto) |
Line 179 rip_input(m, va_alist) |
|
Line 179 rip_input(m, va_alist) |
|
if (last) { |
if (last) { |
struct mbuf *n; |
struct mbuf *n; |
|
|
#ifdef IPSEC |
#if defined(IPSEC) || defined(FAST_IPSEC) |
/* check AH/ESP integrity. */ |
/* check AH/ESP integrity. */ |
if (ipsec4_in_reject_so(m, last->inp_socket)) { |
if (ipsec4_in_reject_so(m, last->inp_socket)) { |
ipsecstat.in_polvio++; |
ipsecstat.in_polvio++; |
Line 203 rip_input(m, va_alist) |
|
Line 203 rip_input(m, va_alist) |
|
} |
} |
last = inp; |
last = inp; |
} |
} |
#ifdef IPSEC |
#if defined(IPSEC) || defined(FAST_IPSEC) |
/* check AH/ESP integrity. */ |
/* check AH/ESP integrity. */ |
if (last && ipsec4_in_reject_so(m, last->inp_socket)) { |
if (last && ipsec4_in_reject_so(m, last->inp_socket)) { |
m_freem(m); |
m_freem(m); |
Line 332 rip_output(m, va_alist) |
|
Line 332 rip_output(m, va_alist) |
|
m_freem(m); |
m_freem(m); |
return (EMSGSIZE); |
return (EMSGSIZE); |
} |
} |
M_PREPEND(m, sizeof(struct ip), M_WAIT); |
M_PREPEND(m, sizeof(struct ip), M_DONTWAIT); |
|
if (!m) |
|
return (ENOBUFS); |
ip = mtod(m, struct ip *); |
ip = mtod(m, struct ip *); |
ip->ip_tos = 0; |
ip->ip_tos = 0; |
ip->ip_off = 0; |
ip->ip_off = htons(0); |
ip->ip_p = inp->inp_ip.ip_p; |
ip->ip_p = inp->inp_ip.ip_p; |
ip->ip_len = m->m_pkthdr.len; |
ip->ip_len = htons(m->m_pkthdr.len); |
ip->ip_src = inp->inp_laddr; |
ip->ip_src = inp->inp_laddr; |
ip->ip_dst = inp->inp_faddr; |
ip->ip_dst = inp->inp_faddr; |
ip->ip_ttl = MAXTTL; |
ip->ip_ttl = MAXTTL; |
Line 348 rip_output(m, va_alist) |
|
Line 350 rip_output(m, va_alist) |
|
return (EMSGSIZE); |
return (EMSGSIZE); |
} |
} |
ip = mtod(m, struct ip *); |
ip = mtod(m, struct ip *); |
|
|
|
/* |
|
* If the mbuf is read-only, we need to allocate |
|
* a new mbuf for the header, since we need to |
|
* modify the header. |
|
*/ |
|
if (M_READONLY(m)) { |
|
int hlen = ip->ip_hl << 2; |
|
|
|
m = m_copyup(m, hlen, (max_linkhdr + 3) & ~3); |
|
if (m == NULL) |
|
return (ENOMEM); /* XXX */ |
|
ip = mtod(m, struct ip *); |
|
} |
|
|
|
/* XXX userland passes ip_len and ip_off in host order */ |
if (m->m_pkthdr.len != ip->ip_len) { |
if (m->m_pkthdr.len != ip->ip_len) { |
m_freem(m); |
m_freem(m); |
return (EINVAL); |
return (EINVAL); |
} |
} |
|
HTONS(ip->ip_len); |
|
HTONS(ip->ip_off); |
if (ip->ip_id == 0) |
if (ip->ip_id == 0) |
ip->ip_id = htons(ip_id++); |
ip->ip_id = htons(ip_id++); |
opts = NULL; |
opts = NULL; |
Line 359 rip_output(m, va_alist) |
|
Line 379 rip_output(m, va_alist) |
|
flags |= IP_RAWOUTPUT; |
flags |= IP_RAWOUTPUT; |
ipstat.ips_rawout++; |
ipstat.ips_rawout++; |
} |
} |
#ifdef IPSEC |
return (ip_output(m, opts, &inp->inp_route, flags, inp->inp_moptions, |
if (ipsec_setsocket(m, inp->inp_socket) != 0) { |
inp->inp_socket, &inp->inp_errormtu)); |
m_freem(m); |
|
return ENOBUFS; |
|
} |
|
#endif /*IPSEC*/ |
|
return (ip_output(m, opts, &inp->inp_route, flags, inp->inp_moptions, &inp->inp_errormtu)); |
|
} |
} |
|
|
/* |
/* |
Line 423 rip_ctloutput(op, so, level, optname, m) |
|
Line 438 rip_ctloutput(op, so, level, optname, m) |
|
case PRCO_GETOPT: |
case PRCO_GETOPT: |
switch (optname) { |
switch (optname) { |
case IP_HDRINCL: |
case IP_HDRINCL: |
*m = m_get(M_WAIT, M_SOOPTS); |
*m = m_get(M_WAIT, MT_SOOPTS); |
|
MCLAIM((*m), so->so_mowner); |
(*m)->m_len = sizeof (int); |
(*m)->m_len = sizeof (int); |
*mtod(*m, int *) = inp->inp_flags & INP_HDRINCL ? 1 : 0; |
*mtod(*m, int *) = inp->inp_flags & INP_HDRINCL ? 1 : 0; |
break; |
break; |