]>
Commit | Line | Data |
---|---|---|
0a69452c DB |
1 | /* |
2 | * xfrm4_mode_beet.c - BEET mode encapsulation for IPv4. | |
3 | * | |
4 | * Copyright (c) 2006 Diego Beltrami <[email protected]> | |
5 | * Miika Komu <[email protected]> | |
6 | * Herbert Xu <[email protected]> | |
7 | * Abhinav Pathak <[email protected]> | |
8 | * Jeff Ahrenholz <[email protected]> | |
9 | */ | |
10 | ||
11 | #include <linux/init.h> | |
12 | #include <linux/kernel.h> | |
13 | #include <linux/module.h> | |
14 | #include <linux/skbuff.h> | |
15 | #include <linux/stringify.h> | |
16 | #include <net/dst.h> | |
17 | #include <net/ip.h> | |
18 | #include <net/xfrm.h> | |
19 | ||
227620e2 HX |
20 | static void xfrm4_beet_make_header(struct sk_buff *skb) |
21 | { | |
22 | struct iphdr *iph = ip_hdr(skb); | |
23 | ||
24 | iph->ihl = 5; | |
25 | iph->version = 4; | |
26 | ||
27 | iph->protocol = XFRM_MODE_SKB_CB(skb)->protocol; | |
28 | iph->tos = XFRM_MODE_SKB_CB(skb)->tos; | |
29 | ||
30 | iph->id = XFRM_MODE_SKB_CB(skb)->id; | |
31 | iph->frag_off = XFRM_MODE_SKB_CB(skb)->frag_off; | |
32 | iph->ttl = XFRM_MODE_SKB_CB(skb)->ttl; | |
33 | } | |
34 | ||
0a69452c DB |
35 | /* Add encapsulation header. |
36 | * | |
37 | * The top IP header will be constructed per draft-nikander-esp-beet-mode-06.txt. | |
0a69452c DB |
38 | */ |
39 | static int xfrm4_beet_output(struct xfrm_state *x, struct sk_buff *skb) | |
40 | { | |
37fedd3a | 41 | struct ip_beet_phdr *ph; |
732c8bd5 | 42 | struct iphdr *top_iph; |
0a69452c DB |
43 | int hdrlen, optlen; |
44 | ||
0a69452c | 45 | hdrlen = 0; |
732c8bd5 | 46 | optlen = XFRM_MODE_SKB_CB(skb)->optlen; |
0a69452c DB |
47 | if (unlikely(optlen)) |
48 | hdrlen += IPV4_BEET_PHMAXLEN - (optlen & 4); | |
49 | ||
eb49e630 | 50 | skb_set_network_header(skb, -x->props.header_len - |
5797deb6 | 51 | hdrlen + (XFRM_MODE_SKB_CB(skb)->ihl - sizeof(*top_iph))); |
eb49e630 JK |
52 | if (x->sel.family != AF_INET6) |
53 | skb->network_header += IPV4_BEET_PHMAXLEN; | |
37fedd3a HX |
54 | skb->mac_header = skb->network_header + |
55 | offsetof(struct iphdr, protocol); | |
732c8bd5 | 56 | skb->transport_header = skb->network_header + sizeof(*top_iph); |
37fedd3a | 57 | |
227620e2 HX |
58 | xfrm4_beet_make_header(skb); |
59 | ||
732c8bd5 HX |
60 | ph = (struct ip_beet_phdr *) |
61 | __skb_pull(skb, XFRM_MODE_SKB_CB(skb)->ihl - hdrlen); | |
0a69452c | 62 | |
37fedd3a | 63 | top_iph = ip_hdr(skb); |
36cf9acf | 64 | |
0a69452c | 65 | if (unlikely(optlen)) { |
0a69452c DB |
66 | BUG_ON(optlen < 0); |
67 | ||
0a69452c | 68 | ph->padlen = 4 - (optlen & 4); |
05d22446 | 69 | ph->hdrlen = optlen / 8; |
0a69452c | 70 | ph->nexthdr = top_iph->protocol; |
04fef989 PM |
71 | if (ph->padlen) |
72 | memset(ph + 1, IPOPT_NOP, ph->padlen); | |
0a69452c DB |
73 | |
74 | top_iph->protocol = IPPROTO_BEETPH; | |
75 | top_iph->ihl = sizeof(struct iphdr) / 4; | |
76 | } | |
77 | ||
78 | top_iph->saddr = x->props.saddr.a4; | |
79 | top_iph->daddr = x->id.daddr.a4; | |
80 | ||
81 | return 0; | |
82 | } | |
83 | ||
84 | static int xfrm4_beet_input(struct xfrm_state *x, struct sk_buff *skb) | |
85 | { | |
227620e2 | 86 | struct iphdr *iph; |
0a69452c | 87 | int optlen = 0; |
0a69452c DB |
88 | int err = -EINVAL; |
89 | ||
227620e2 | 90 | if (unlikely(XFRM_MODE_SKB_CB(skb)->protocol == IPPROTO_BEETPH)) { |
254d0d24 | 91 | struct ip_beet_phdr *ph; |
227620e2 | 92 | int phlen; |
0a69452c DB |
93 | |
94 | if (!pskb_may_pull(skb, sizeof(*ph))) | |
95 | goto out; | |
227620e2 HX |
96 | |
97 | ph = (struct ip_beet_phdr *)skb->data; | |
0a69452c | 98 | |
d4b1e840 | 99 | phlen = sizeof(*ph) + ph->padlen; |
05d22446 | 100 | optlen = ph->hdrlen * 8 + (IPV4_BEET_PHMAXLEN - phlen); |
0a69452c DB |
101 | if (optlen < 0 || optlen & 3 || optlen > 250) |
102 | goto out; | |
103 | ||
227620e2 | 104 | XFRM_MODE_SKB_CB(skb)->protocol = ph->nexthdr; |
0a69452c | 105 | |
322c8a3c | 106 | if (!pskb_may_pull(skb, phlen)) |
227620e2 HX |
107 | goto out; |
108 | __skb_pull(skb, phlen); | |
0a69452c DB |
109 | } |
110 | ||
227620e2 HX |
111 | skb_push(skb, sizeof(*iph)); |
112 | skb_reset_network_header(skb); | |
03606895 | 113 | skb_mac_header_rebuild(skb); |
227620e2 HX |
114 | |
115 | xfrm4_beet_make_header(skb); | |
0a69452c | 116 | |
eddc9ec5 | 117 | iph = ip_hdr(skb); |
227620e2 HX |
118 | |
119 | iph->ihl += optlen / 4; | |
120 | iph->tot_len = htons(skb->len); | |
0a69452c DB |
121 | iph->daddr = x->sel.daddr.a4; |
122 | iph->saddr = x->sel.saddr.a4; | |
0a69452c | 123 | iph->check = 0; |
d56f90a7 | 124 | iph->check = ip_fast_csum(skb_network_header(skb), iph->ihl); |
0a69452c DB |
125 | err = 0; |
126 | out: | |
127 | return err; | |
128 | } | |
129 | ||
130 | static struct xfrm_mode xfrm4_beet_mode = { | |
227620e2 HX |
131 | .input2 = xfrm4_beet_input, |
132 | .input = xfrm_prepare_input, | |
36cf9acf HX |
133 | .output2 = xfrm4_beet_output, |
134 | .output = xfrm4_prepare_output, | |
0a69452c DB |
135 | .owner = THIS_MODULE, |
136 | .encap = XFRM_MODE_BEET, | |
1bfcb10f | 137 | .flags = XFRM_MODE_FLAG_TUNNEL, |
0a69452c DB |
138 | }; |
139 | ||
140 | static int __init xfrm4_beet_init(void) | |
141 | { | |
142 | return xfrm_register_mode(&xfrm4_beet_mode, AF_INET); | |
143 | } | |
144 | ||
145 | static void __exit xfrm4_beet_exit(void) | |
146 | { | |
147 | int err; | |
148 | ||
149 | err = xfrm_unregister_mode(&xfrm4_beet_mode, AF_INET); | |
150 | BUG_ON(err); | |
151 | } | |
152 | ||
153 | module_init(xfrm4_beet_init); | |
154 | module_exit(xfrm4_beet_exit); | |
155 | MODULE_LICENSE("GPL"); | |
156 | MODULE_ALIAS_XFRM_MODE(AF_INET, XFRM_MODE_BEET); |