]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * xfrm6_state.c: based on xfrm4_state.c | |
3 | * | |
4 | * Authors: | |
5 | * Mitsuru KANDA @USAGI | |
6 | * Kazunori MIYAZAWA @USAGI | |
7 | * Kunihiro Ishiguro <[email protected]> | |
8 | * IPv6 support | |
9 | * YOSHIFUJI Hideaki @USAGI | |
10 | * Split up af-specific portion | |
1ab1457c | 11 | * |
1da177e4 LT |
12 | */ |
13 | ||
14 | #include <net/xfrm.h> | |
15 | #include <linux/pfkeyv2.h> | |
16 | #include <linux/ipsec.h> | |
862b82c6 | 17 | #include <linux/netfilter_ipv6.h> |
36cf9acf | 18 | #include <net/dsfield.h> |
1da177e4 | 19 | #include <net/ipv6.h> |
ee51b1b6 | 20 | #include <net/addrconf.h> |
1da177e4 | 21 | |
1da177e4 | 22 | static void |
73e5ebb2 | 23 | __xfrm6_init_tempsel(struct xfrm_selector *sel, const struct flowi *fl) |
1da177e4 | 24 | { |
7e1dc7b6 DM |
25 | const struct flowi6 *fl6 = &fl->u.ip6; |
26 | ||
1da177e4 LT |
27 | /* Initialize temporary selector matching only |
28 | * to current session. */ | |
7e1dc7b6 DM |
29 | ipv6_addr_copy((struct in6_addr *)&sel->daddr, &fl6->daddr); |
30 | ipv6_addr_copy((struct in6_addr *)&sel->saddr, &fl6->saddr); | |
31 | sel->dport = xfrm_flowi_dport(fl, &fl6->uli); | |
8444cf71 | 32 | sel->dport_mask = htons(0xffff); |
7e1dc7b6 | 33 | sel->sport = xfrm_flowi_sport(fl, &fl6->uli); |
8444cf71 TE |
34 | sel->sport_mask = htons(0xffff); |
35 | sel->family = AF_INET6; | |
36 | sel->prefixlen_d = 128; | |
37 | sel->prefixlen_s = 128; | |
7e1dc7b6 DM |
38 | sel->proto = fl6->flowi6_proto; |
39 | sel->ifindex = fl6->flowi6_oif; | |
8444cf71 TE |
40 | } |
41 | ||
42 | static void | |
19bd6244 DM |
43 | xfrm6_init_temprop(struct xfrm_state *x, const struct xfrm_tmpl *tmpl, |
44 | const xfrm_address_t *daddr, const xfrm_address_t *saddr) | |
8444cf71 | 45 | { |
1da177e4 LT |
46 | x->id = tmpl->id; |
47 | if (ipv6_addr_any((struct in6_addr*)&x->id.daddr)) | |
48 | memcpy(&x->id.daddr, daddr, sizeof(x->sel.daddr)); | |
49 | memcpy(&x->props.saddr, &tmpl->saddr, sizeof(x->props.saddr)); | |
50 | if (ipv6_addr_any((struct in6_addr*)&x->props.saddr)) | |
51 | memcpy(&x->props.saddr, saddr, sizeof(x->props.saddr)); | |
52 | x->props.mode = tmpl->mode; | |
53 | x->props.reqid = tmpl->reqid; | |
54 | x->props.family = AF_INET6; | |
55 | } | |
56 | ||
3b6cdf94 | 57 | /* distribution counting sort function for xfrm_state and xfrm_tmpl */ |
58c949d1 | 58 | static int |
3b6cdf94 | 59 | __xfrm6_sort(void **dst, void **src, int n, int (*cmp)(void *p), int maxclass) |
58c949d1 MN |
60 | { |
61 | int i; | |
3b6cdf94 YH |
62 | int class[XFRM_MAX_DEPTH]; |
63 | int count[maxclass]; | |
58c949d1 | 64 | |
3b6cdf94 | 65 | memset(count, 0, sizeof(count)); |
58c949d1 | 66 | |
64d9fdda | 67 | for (i = 0; i < n; i++) { |
3b6cdf94 YH |
68 | int c; |
69 | class[i] = c = cmp(src[i]); | |
70 | count[c]++; | |
64d9fdda | 71 | } |
58c949d1 | 72 | |
3b6cdf94 YH |
73 | for (i = 2; i < maxclass; i++) |
74 | count[i] += count[i - 1]; | |
58c949d1 | 75 | |
58c949d1 | 76 | for (i = 0; i < n; i++) { |
3b6cdf94 | 77 | dst[count[class[i] - 1]++] = src[i]; |
66da8c52 | 78 | src[i] = NULL; |
58c949d1 | 79 | } |
58c949d1 | 80 | |
58c949d1 MN |
81 | return 0; |
82 | } | |
83 | ||
3b6cdf94 YH |
84 | /* |
85 | * Rule for xfrm_state: | |
86 | * | |
87 | * rule 1: select IPsec transport except AH | |
88 | * rule 2: select MIPv6 RO or inbound trigger | |
89 | * rule 3: select IPsec transport AH | |
90 | * rule 4: select IPsec tunnel | |
91 | * rule 5: others | |
92 | */ | |
93 | static int __xfrm6_state_sort_cmp(void *p) | |
58c949d1 | 94 | { |
3b6cdf94 YH |
95 | struct xfrm_state *v = p; |
96 | ||
97 | switch (v->props.mode) { | |
98 | case XFRM_MODE_TRANSPORT: | |
99 | if (v->id.proto != IPPROTO_AH) | |
100 | return 1; | |
101 | else | |
102 | return 3; | |
59fbb3a6 | 103 | #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE) |
3b6cdf94 YH |
104 | case XFRM_MODE_ROUTEOPTIMIZATION: |
105 | case XFRM_MODE_IN_TRIGGER: | |
106 | return 2; | |
64d9fdda | 107 | #endif |
3b6cdf94 YH |
108 | case XFRM_MODE_TUNNEL: |
109 | case XFRM_MODE_BEET: | |
110 | return 4; | |
58c949d1 | 111 | } |
3b6cdf94 YH |
112 | return 5; |
113 | } | |
58c949d1 | 114 | |
3b6cdf94 YH |
115 | static int |
116 | __xfrm6_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n) | |
117 | { | |
118 | return __xfrm6_sort((void **)dst, (void **)src, n, | |
119 | __xfrm6_state_sort_cmp, 6); | |
120 | } | |
121 | ||
122 | /* | |
123 | * Rule for xfrm_tmpl: | |
124 | * | |
125 | * rule 1: select IPsec transport | |
126 | * rule 2: select MIPv6 RO or inbound trigger | |
127 | * rule 3: select IPsec tunnel | |
128 | * rule 4: others | |
129 | */ | |
130 | static int __xfrm6_tmpl_sort_cmp(void *p) | |
131 | { | |
132 | struct xfrm_tmpl *v = p; | |
133 | switch (v->mode) { | |
134 | case XFRM_MODE_TRANSPORT: | |
135 | return 1; | |
136 | #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE) | |
137 | case XFRM_MODE_ROUTEOPTIMIZATION: | |
138 | case XFRM_MODE_IN_TRIGGER: | |
139 | return 2; | |
140 | #endif | |
141 | case XFRM_MODE_TUNNEL: | |
142 | case XFRM_MODE_BEET: | |
143 | return 3; | |
58c949d1 | 144 | } |
3b6cdf94 YH |
145 | return 4; |
146 | } | |
58c949d1 | 147 | |
3b6cdf94 YH |
148 | static int |
149 | __xfrm6_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n) | |
150 | { | |
151 | return __xfrm6_sort((void **)dst, (void **)src, n, | |
152 | __xfrm6_tmpl_sort_cmp, 5); | |
58c949d1 MN |
153 | } |
154 | ||
36cf9acf HX |
155 | int xfrm6_extract_header(struct sk_buff *skb) |
156 | { | |
157 | struct ipv6hdr *iph = ipv6_hdr(skb); | |
158 | ||
732c8bd5 | 159 | XFRM_MODE_SKB_CB(skb)->ihl = sizeof(*iph); |
36cf9acf HX |
160 | XFRM_MODE_SKB_CB(skb)->id = 0; |
161 | XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF); | |
162 | XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph); | |
163 | XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit; | |
732c8bd5 | 164 | XFRM_MODE_SKB_CB(skb)->optlen = 0; |
36cf9acf HX |
165 | memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl, |
166 | sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl)); | |
167 | ||
168 | return 0; | |
169 | } | |
170 | ||
1da177e4 LT |
171 | static struct xfrm_state_afinfo xfrm6_state_afinfo = { |
172 | .family = AF_INET6, | |
36cf9acf | 173 | .proto = IPPROTO_IPV6, |
227620e2 | 174 | .eth_proto = htons(ETH_P_IPV6), |
17c2a42a | 175 | .owner = THIS_MODULE, |
1da177e4 | 176 | .init_tempsel = __xfrm6_init_tempsel, |
8444cf71 | 177 | .init_temprop = xfrm6_init_temprop, |
58c949d1 MN |
178 | .tmpl_sort = __xfrm6_tmpl_sort, |
179 | .state_sort = __xfrm6_state_sort, | |
cdca7265 | 180 | .output = xfrm6_output, |
227620e2 | 181 | .extract_input = xfrm6_extract_input, |
36cf9acf | 182 | .extract_output = xfrm6_extract_output, |
716062fd | 183 | .transport_finish = xfrm6_transport_finish, |
1da177e4 LT |
184 | }; |
185 | ||
0013caba | 186 | int __init xfrm6_state_init(void) |
1da177e4 | 187 | { |
0013caba | 188 | return xfrm_state_register_afinfo(&xfrm6_state_afinfo); |
1da177e4 LT |
189 | } |
190 | ||
191 | void xfrm6_state_fini(void) | |
192 | { | |
193 | xfrm_state_unregister_afinfo(&xfrm6_state_afinfo); | |
194 | } | |
195 |