xfrm6_state.c 4.6 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207
  1. /*
  2. * xfrm6_state.c: based on xfrm4_state.c
  3. *
  4. * Authors:
  5. * Mitsuru KANDA @USAGI
  6. * Kazunori MIYAZAWA @USAGI
  7. * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
  8. * IPv6 support
  9. * YOSHIFUJI Hideaki @USAGI
  10. * Split up af-specific portion
  11. *
  12. */
  13. #include <net/xfrm.h>
  14. #include <linux/pfkeyv2.h>
  15. #include <linux/ipsec.h>
  16. #include <net/dsfield.h>
  17. #include <net/ipv6.h>
  18. #include <net/addrconf.h>
  19. static struct xfrm_state_afinfo xfrm6_state_afinfo;
  20. static void
  21. __xfrm6_init_tempsel(struct xfrm_state *x, struct flowi *fl,
  22. struct xfrm_tmpl *tmpl,
  23. xfrm_address_t *daddr, xfrm_address_t *saddr)
  24. {
  25. /* Initialize temporary selector matching only
  26. * to current session. */
  27. ipv6_addr_copy((struct in6_addr *)&x->sel.daddr, &fl->fl6_dst);
  28. ipv6_addr_copy((struct in6_addr *)&x->sel.saddr, &fl->fl6_src);
  29. x->sel.dport = xfrm_flowi_dport(fl);
  30. x->sel.dport_mask = htons(0xffff);
  31. x->sel.sport = xfrm_flowi_sport(fl);
  32. x->sel.sport_mask = htons(0xffff);
  33. x->sel.prefixlen_d = 128;
  34. x->sel.prefixlen_s = 128;
  35. x->sel.proto = fl->proto;
  36. x->sel.ifindex = fl->oif;
  37. x->id = tmpl->id;
  38. if (ipv6_addr_any((struct in6_addr*)&x->id.daddr))
  39. memcpy(&x->id.daddr, daddr, sizeof(x->sel.daddr));
  40. memcpy(&x->props.saddr, &tmpl->saddr, sizeof(x->props.saddr));
  41. if (ipv6_addr_any((struct in6_addr*)&x->props.saddr))
  42. memcpy(&x->props.saddr, saddr, sizeof(x->props.saddr));
  43. x->props.mode = tmpl->mode;
  44. x->props.reqid = tmpl->reqid;
  45. x->props.family = AF_INET6;
  46. }
  47. static int
  48. __xfrm6_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n)
  49. {
  50. int i;
  51. int j = 0;
  52. /* Rule 1: select IPsec transport except AH */
  53. for (i = 0; i < n; i++) {
  54. if (src[i]->props.mode == XFRM_MODE_TRANSPORT &&
  55. src[i]->id.proto != IPPROTO_AH) {
  56. dst[j++] = src[i];
  57. src[i] = NULL;
  58. }
  59. }
  60. if (j == n)
  61. goto end;
  62. /* Rule 2: select MIPv6 RO or inbound trigger */
  63. #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
  64. for (i = 0; i < n; i++) {
  65. if (src[i] &&
  66. (src[i]->props.mode == XFRM_MODE_ROUTEOPTIMIZATION ||
  67. src[i]->props.mode == XFRM_MODE_IN_TRIGGER)) {
  68. dst[j++] = src[i];
  69. src[i] = NULL;
  70. }
  71. }
  72. if (j == n)
  73. goto end;
  74. #endif
  75. /* Rule 3: select IPsec transport AH */
  76. for (i = 0; i < n; i++) {
  77. if (src[i] &&
  78. src[i]->props.mode == XFRM_MODE_TRANSPORT &&
  79. src[i]->id.proto == IPPROTO_AH) {
  80. dst[j++] = src[i];
  81. src[i] = NULL;
  82. }
  83. }
  84. if (j == n)
  85. goto end;
  86. /* Rule 4: select IPsec tunnel */
  87. for (i = 0; i < n; i++) {
  88. if (src[i] &&
  89. (src[i]->props.mode == XFRM_MODE_TUNNEL ||
  90. src[i]->props.mode == XFRM_MODE_BEET)) {
  91. dst[j++] = src[i];
  92. src[i] = NULL;
  93. }
  94. }
  95. if (likely(j == n))
  96. goto end;
  97. /* Final rule */
  98. for (i = 0; i < n; i++) {
  99. if (src[i]) {
  100. dst[j++] = src[i];
  101. src[i] = NULL;
  102. }
  103. }
  104. end:
  105. return 0;
  106. }
  107. static int
  108. __xfrm6_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n)
  109. {
  110. int i;
  111. int j = 0;
  112. /* Rule 1: select IPsec transport */
  113. for (i = 0; i < n; i++) {
  114. if (src[i]->mode == XFRM_MODE_TRANSPORT) {
  115. dst[j++] = src[i];
  116. src[i] = NULL;
  117. }
  118. }
  119. if (j == n)
  120. goto end;
  121. /* Rule 2: select MIPv6 RO or inbound trigger */
  122. #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
  123. for (i = 0; i < n; i++) {
  124. if (src[i] &&
  125. (src[i]->mode == XFRM_MODE_ROUTEOPTIMIZATION ||
  126. src[i]->mode == XFRM_MODE_IN_TRIGGER)) {
  127. dst[j++] = src[i];
  128. src[i] = NULL;
  129. }
  130. }
  131. if (j == n)
  132. goto end;
  133. #endif
  134. /* Rule 3: select IPsec tunnel */
  135. for (i = 0; i < n; i++) {
  136. if (src[i] &&
  137. (src[i]->mode == XFRM_MODE_TUNNEL ||
  138. src[i]->mode == XFRM_MODE_BEET)) {
  139. dst[j++] = src[i];
  140. src[i] = NULL;
  141. }
  142. }
  143. if (likely(j == n))
  144. goto end;
  145. /* Final rule */
  146. for (i = 0; i < n; i++) {
  147. if (src[i]) {
  148. dst[j++] = src[i];
  149. src[i] = NULL;
  150. }
  151. }
  152. end:
  153. return 0;
  154. }
  155. int xfrm6_extract_header(struct sk_buff *skb)
  156. {
  157. struct ipv6hdr *iph = ipv6_hdr(skb);
  158. XFRM_MODE_SKB_CB(skb)->id = 0;
  159. XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF);
  160. XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph);
  161. XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit;
  162. XFRM_MODE_SKB_CB(skb)->protocol = iph->nexthdr;
  163. memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl,
  164. sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl));
  165. return 0;
  166. }
  167. static struct xfrm_state_afinfo xfrm6_state_afinfo = {
  168. .family = AF_INET6,
  169. .proto = IPPROTO_IPV6,
  170. .owner = THIS_MODULE,
  171. .init_tempsel = __xfrm6_init_tempsel,
  172. .tmpl_sort = __xfrm6_tmpl_sort,
  173. .state_sort = __xfrm6_state_sort,
  174. .output = xfrm6_output,
  175. .extract_output = xfrm6_extract_output,
  176. };
  177. void __init xfrm6_state_init(void)
  178. {
  179. xfrm_state_register_afinfo(&xfrm6_state_afinfo);
  180. }
  181. void xfrm6_state_fini(void)
  182. {
  183. xfrm_state_unregister_afinfo(&xfrm6_state_afinfo);
  184. }