xfrm6_state.c 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197
  1. /*
  2. * xfrm6_state.c: based on xfrm4_state.c
  3. *
  4. * Authors:
  5. * Mitsuru KANDA @USAGI
  6. * Kazunori MIYAZAWA @USAGI
  7. * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
  8. * IPv6 support
  9. * YOSHIFUJI Hideaki @USAGI
  10. * Split up af-specific portion
  11. *
  12. */
  13. #include <net/xfrm.h>
  14. #include <linux/pfkeyv2.h>
  15. #include <linux/ipsec.h>
  16. #include <linux/netfilter_ipv6.h>
  17. #include <net/dsfield.h>
  18. #include <net/ipv6.h>
  19. #include <net/addrconf.h>
  20. static void
  21. __xfrm6_init_tempsel(struct xfrm_selector *sel, const struct flowi *fl)
  22. {
  23. const struct flowi6 *fl6 = &fl->u.ip6;
  24. /* Initialize temporary selector matching only
  25. * to current session. */
  26. ipv6_addr_copy((struct in6_addr *)&sel->daddr, &fl6->daddr);
  27. ipv6_addr_copy((struct in6_addr *)&sel->saddr, &fl6->saddr);
  28. sel->dport = xfrm_flowi_dport(fl, &fl6->uli);
  29. sel->dport_mask = htons(0xffff);
  30. sel->sport = xfrm_flowi_sport(fl, &fl6->uli);
  31. sel->sport_mask = htons(0xffff);
  32. sel->family = AF_INET6;
  33. sel->prefixlen_d = 128;
  34. sel->prefixlen_s = 128;
  35. sel->proto = fl6->flowi6_proto;
  36. sel->ifindex = fl6->flowi6_oif;
  37. }
  38. static void
  39. xfrm6_init_temprop(struct xfrm_state *x, const struct xfrm_tmpl *tmpl,
  40. const xfrm_address_t *daddr, const xfrm_address_t *saddr)
  41. {
  42. x->id = tmpl->id;
  43. if (ipv6_addr_any((struct in6_addr*)&x->id.daddr))
  44. memcpy(&x->id.daddr, daddr, sizeof(x->sel.daddr));
  45. memcpy(&x->props.saddr, &tmpl->saddr, sizeof(x->props.saddr));
  46. if (ipv6_addr_any((struct in6_addr*)&x->props.saddr))
  47. memcpy(&x->props.saddr, saddr, sizeof(x->props.saddr));
  48. x->props.mode = tmpl->mode;
  49. x->props.reqid = tmpl->reqid;
  50. x->props.family = AF_INET6;
  51. }
  52. /* distribution counting sort function for xfrm_state and xfrm_tmpl */
  53. static int
  54. __xfrm6_sort(void **dst, void **src, int n, int (*cmp)(void *p), int maxclass)
  55. {
  56. int i;
  57. int class[XFRM_MAX_DEPTH];
  58. int count[maxclass];
  59. memset(count, 0, sizeof(count));
  60. for (i = 0; i < n; i++) {
  61. int c;
  62. class[i] = c = cmp(src[i]);
  63. count[c]++;
  64. }
  65. for (i = 2; i < maxclass; i++)
  66. count[i] += count[i - 1];
  67. for (i = 0; i < n; i++) {
  68. dst[count[class[i] - 1]++] = src[i];
  69. src[i] = NULL;
  70. }
  71. return 0;
  72. }
  73. /*
  74. * Rule for xfrm_state:
  75. *
  76. * rule 1: select IPsec transport except AH
  77. * rule 2: select MIPv6 RO or inbound trigger
  78. * rule 3: select IPsec transport AH
  79. * rule 4: select IPsec tunnel
  80. * rule 5: others
  81. */
  82. static int __xfrm6_state_sort_cmp(void *p)
  83. {
  84. struct xfrm_state *v = p;
  85. switch (v->props.mode) {
  86. case XFRM_MODE_TRANSPORT:
  87. if (v->id.proto != IPPROTO_AH)
  88. return 1;
  89. else
  90. return 3;
  91. #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
  92. case XFRM_MODE_ROUTEOPTIMIZATION:
  93. case XFRM_MODE_IN_TRIGGER:
  94. return 2;
  95. #endif
  96. case XFRM_MODE_TUNNEL:
  97. case XFRM_MODE_BEET:
  98. return 4;
  99. }
  100. return 5;
  101. }
  102. static int
  103. __xfrm6_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n)
  104. {
  105. return __xfrm6_sort((void **)dst, (void **)src, n,
  106. __xfrm6_state_sort_cmp, 6);
  107. }
  108. /*
  109. * Rule for xfrm_tmpl:
  110. *
  111. * rule 1: select IPsec transport
  112. * rule 2: select MIPv6 RO or inbound trigger
  113. * rule 3: select IPsec tunnel
  114. * rule 4: others
  115. */
  116. static int __xfrm6_tmpl_sort_cmp(void *p)
  117. {
  118. struct xfrm_tmpl *v = p;
  119. switch (v->mode) {
  120. case XFRM_MODE_TRANSPORT:
  121. return 1;
  122. #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
  123. case XFRM_MODE_ROUTEOPTIMIZATION:
  124. case XFRM_MODE_IN_TRIGGER:
  125. return 2;
  126. #endif
  127. case XFRM_MODE_TUNNEL:
  128. case XFRM_MODE_BEET:
  129. return 3;
  130. }
  131. return 4;
  132. }
  133. static int
  134. __xfrm6_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n)
  135. {
  136. return __xfrm6_sort((void **)dst, (void **)src, n,
  137. __xfrm6_tmpl_sort_cmp, 5);
  138. }
  139. int xfrm6_extract_header(struct sk_buff *skb)
  140. {
  141. struct ipv6hdr *iph = ipv6_hdr(skb);
  142. XFRM_MODE_SKB_CB(skb)->ihl = sizeof(*iph);
  143. XFRM_MODE_SKB_CB(skb)->id = 0;
  144. XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF);
  145. XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph);
  146. XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit;
  147. XFRM_MODE_SKB_CB(skb)->optlen = 0;
  148. memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl,
  149. sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl));
  150. return 0;
  151. }
  152. static struct xfrm_state_afinfo xfrm6_state_afinfo = {
  153. .family = AF_INET6,
  154. .proto = IPPROTO_IPV6,
  155. .eth_proto = htons(ETH_P_IPV6),
  156. .owner = THIS_MODULE,
  157. .init_tempsel = __xfrm6_init_tempsel,
  158. .init_temprop = xfrm6_init_temprop,
  159. .tmpl_sort = __xfrm6_tmpl_sort,
  160. .state_sort = __xfrm6_state_sort,
  161. .output = xfrm6_output,
  162. .output_finish = xfrm6_output_finish,
  163. .extract_input = xfrm6_extract_input,
  164. .extract_output = xfrm6_extract_output,
  165. .transport_finish = xfrm6_transport_finish,
  166. };
  167. int __init xfrm6_state_init(void)
  168. {
  169. return xfrm_state_register_afinfo(&xfrm6_state_afinfo);
  170. }
  171. void xfrm6_state_fini(void)
  172. {
  173. xfrm_state_unregister_afinfo(&xfrm6_state_afinfo);
  174. }