]>
Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * xfrm6_state.c: based on xfrm4_state.c | |
3 | * | |
4 | * Authors: | |
5 | * Mitsuru KANDA @USAGI | |
6 | * Kazunori MIYAZAWA @USAGI | |
7 | * Kunihiro Ishiguro <[email protected]> | |
8 | * IPv6 support | |
9 | * YOSHIFUJI Hideaki @USAGI | |
10 | * Split up af-specific portion | |
1ab1457c | 11 | * |
1da177e4 LT |
12 | */ |
13 | ||
14 | #include <net/xfrm.h> | |
15 | #include <linux/pfkeyv2.h> | |
16 | #include <linux/ipsec.h> | |
862b82c6 | 17 | #include <linux/netfilter_ipv6.h> |
bc3b2d7f | 18 | #include <linux/export.h> |
36cf9acf | 19 | #include <net/dsfield.h> |
1da177e4 | 20 | #include <net/ipv6.h> |
ee51b1b6 | 21 | #include <net/addrconf.h> |
1da177e4 | 22 | |
1da177e4 | 23 | static void |
73e5ebb2 | 24 | __xfrm6_init_tempsel(struct xfrm_selector *sel, const struct flowi *fl) |
1da177e4 | 25 | { |
7e1dc7b6 DM |
26 | const struct flowi6 *fl6 = &fl->u.ip6; |
27 | ||
1da177e4 LT |
28 | /* Initialize temporary selector matching only |
29 | * to current session. */ | |
4e3fd7a0 AD |
30 | *(struct in6_addr *)&sel->daddr = fl6->daddr; |
31 | *(struct in6_addr *)&sel->saddr = fl6->saddr; | |
7e1dc7b6 | 32 | sel->dport = xfrm_flowi_dport(fl, &fl6->uli); |
8444cf71 | 33 | sel->dport_mask = htons(0xffff); |
7e1dc7b6 | 34 | sel->sport = xfrm_flowi_sport(fl, &fl6->uli); |
8444cf71 TE |
35 | sel->sport_mask = htons(0xffff); |
36 | sel->family = AF_INET6; | |
37 | sel->prefixlen_d = 128; | |
38 | sel->prefixlen_s = 128; | |
7e1dc7b6 DM |
39 | sel->proto = fl6->flowi6_proto; |
40 | sel->ifindex = fl6->flowi6_oif; | |
8444cf71 TE |
41 | } |
42 | ||
43 | static void | |
19bd6244 DM |
44 | xfrm6_init_temprop(struct xfrm_state *x, const struct xfrm_tmpl *tmpl, |
45 | const xfrm_address_t *daddr, const xfrm_address_t *saddr) | |
8444cf71 | 46 | { |
1da177e4 LT |
47 | x->id = tmpl->id; |
48 | if (ipv6_addr_any((struct in6_addr*)&x->id.daddr)) | |
49 | memcpy(&x->id.daddr, daddr, sizeof(x->sel.daddr)); | |
50 | memcpy(&x->props.saddr, &tmpl->saddr, sizeof(x->props.saddr)); | |
51 | if (ipv6_addr_any((struct in6_addr*)&x->props.saddr)) | |
52 | memcpy(&x->props.saddr, saddr, sizeof(x->props.saddr)); | |
53 | x->props.mode = tmpl->mode; | |
54 | x->props.reqid = tmpl->reqid; | |
55 | x->props.family = AF_INET6; | |
56 | } | |
57 | ||
3b6cdf94 | 58 | /* distribution counting sort function for xfrm_state and xfrm_tmpl */ |
58c949d1 | 59 | static int |
3b6cdf94 | 60 | __xfrm6_sort(void **dst, void **src, int n, int (*cmp)(void *p), int maxclass) |
58c949d1 MN |
61 | { |
62 | int i; | |
3b6cdf94 YH |
63 | int class[XFRM_MAX_DEPTH]; |
64 | int count[maxclass]; | |
58c949d1 | 65 | |
3b6cdf94 | 66 | memset(count, 0, sizeof(count)); |
58c949d1 | 67 | |
64d9fdda | 68 | for (i = 0; i < n; i++) { |
3b6cdf94 YH |
69 | int c; |
70 | class[i] = c = cmp(src[i]); | |
71 | count[c]++; | |
64d9fdda | 72 | } |
58c949d1 | 73 | |
3b6cdf94 YH |
74 | for (i = 2; i < maxclass; i++) |
75 | count[i] += count[i - 1]; | |
58c949d1 | 76 | |
58c949d1 | 77 | for (i = 0; i < n; i++) { |
3b6cdf94 | 78 | dst[count[class[i] - 1]++] = src[i]; |
66da8c52 | 79 | src[i] = NULL; |
58c949d1 | 80 | } |
58c949d1 | 81 | |
58c949d1 MN |
82 | return 0; |
83 | } | |
84 | ||
3b6cdf94 YH |
85 | /* |
86 | * Rule for xfrm_state: | |
87 | * | |
88 | * rule 1: select IPsec transport except AH | |
89 | * rule 2: select MIPv6 RO or inbound trigger | |
90 | * rule 3: select IPsec transport AH | |
91 | * rule 4: select IPsec tunnel | |
92 | * rule 5: others | |
93 | */ | |
94 | static int __xfrm6_state_sort_cmp(void *p) | |
58c949d1 | 95 | { |
3b6cdf94 YH |
96 | struct xfrm_state *v = p; |
97 | ||
98 | switch (v->props.mode) { | |
99 | case XFRM_MODE_TRANSPORT: | |
100 | if (v->id.proto != IPPROTO_AH) | |
101 | return 1; | |
102 | else | |
103 | return 3; | |
59fbb3a6 | 104 | #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE) |
3b6cdf94 YH |
105 | case XFRM_MODE_ROUTEOPTIMIZATION: |
106 | case XFRM_MODE_IN_TRIGGER: | |
107 | return 2; | |
64d9fdda | 108 | #endif |
3b6cdf94 YH |
109 | case XFRM_MODE_TUNNEL: |
110 | case XFRM_MODE_BEET: | |
111 | return 4; | |
58c949d1 | 112 | } |
3b6cdf94 YH |
113 | return 5; |
114 | } | |
58c949d1 | 115 | |
3b6cdf94 YH |
116 | static int |
117 | __xfrm6_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n) | |
118 | { | |
119 | return __xfrm6_sort((void **)dst, (void **)src, n, | |
120 | __xfrm6_state_sort_cmp, 6); | |
121 | } | |
122 | ||
123 | /* | |
124 | * Rule for xfrm_tmpl: | |
125 | * | |
126 | * rule 1: select IPsec transport | |
127 | * rule 2: select MIPv6 RO or inbound trigger | |
128 | * rule 3: select IPsec tunnel | |
129 | * rule 4: others | |
130 | */ | |
131 | static int __xfrm6_tmpl_sort_cmp(void *p) | |
132 | { | |
133 | struct xfrm_tmpl *v = p; | |
134 | switch (v->mode) { | |
135 | case XFRM_MODE_TRANSPORT: | |
136 | return 1; | |
137 | #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE) | |
138 | case XFRM_MODE_ROUTEOPTIMIZATION: | |
139 | case XFRM_MODE_IN_TRIGGER: | |
140 | return 2; | |
141 | #endif | |
142 | case XFRM_MODE_TUNNEL: | |
143 | case XFRM_MODE_BEET: | |
144 | return 3; | |
58c949d1 | 145 | } |
3b6cdf94 YH |
146 | return 4; |
147 | } | |
58c949d1 | 148 | |
3b6cdf94 YH |
149 | static int |
150 | __xfrm6_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n) | |
151 | { | |
152 | return __xfrm6_sort((void **)dst, (void **)src, n, | |
153 | __xfrm6_tmpl_sort_cmp, 5); | |
58c949d1 MN |
154 | } |
155 | ||
36cf9acf HX |
156 | int xfrm6_extract_header(struct sk_buff *skb) |
157 | { | |
158 | struct ipv6hdr *iph = ipv6_hdr(skb); | |
159 | ||
732c8bd5 | 160 | XFRM_MODE_SKB_CB(skb)->ihl = sizeof(*iph); |
36cf9acf HX |
161 | XFRM_MODE_SKB_CB(skb)->id = 0; |
162 | XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF); | |
163 | XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph); | |
164 | XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit; | |
732c8bd5 | 165 | XFRM_MODE_SKB_CB(skb)->optlen = 0; |
36cf9acf HX |
166 | memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl, |
167 | sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl)); | |
168 | ||
169 | return 0; | |
170 | } | |
171 | ||
1da177e4 LT |
172 | static struct xfrm_state_afinfo xfrm6_state_afinfo = { |
173 | .family = AF_INET6, | |
36cf9acf | 174 | .proto = IPPROTO_IPV6, |
227620e2 | 175 | .eth_proto = htons(ETH_P_IPV6), |
17c2a42a | 176 | .owner = THIS_MODULE, |
1da177e4 | 177 | .init_tempsel = __xfrm6_init_tempsel, |
8444cf71 | 178 | .init_temprop = xfrm6_init_temprop, |
58c949d1 MN |
179 | .tmpl_sort = __xfrm6_tmpl_sort, |
180 | .state_sort = __xfrm6_state_sort, | |
cdca7265 | 181 | .output = xfrm6_output, |
43a4dea4 | 182 | .output_finish = xfrm6_output_finish, |
227620e2 | 183 | .extract_input = xfrm6_extract_input, |
36cf9acf | 184 | .extract_output = xfrm6_extract_output, |
716062fd | 185 | .transport_finish = xfrm6_transport_finish, |
1da177e4 LT |
186 | }; |
187 | ||
0013caba | 188 | int __init xfrm6_state_init(void) |
1da177e4 | 189 | { |
0013caba | 190 | return xfrm_state_register_afinfo(&xfrm6_state_afinfo); |
1da177e4 LT |
191 | } |
192 | ||
193 | void xfrm6_state_fini(void) | |
194 | { | |
195 | xfrm_state_unregister_afinfo(&xfrm6_state_afinfo); | |
196 | } | |
197 |