| /* |
| * CIPSO - Commercial IP Security Option |
| * |
| * This is an implementation of the CIPSO 2.2 protocol as specified in |
| * draft-ietf-cipso-ipsecurity-01.txt with additional tag types as found in |
| * FIPS-188, copies of both documents can be found in the Documentation |
| * directory. While CIPSO never became a full IETF RFC standard many vendors |
| * have chosen to adopt the protocol and over the years it has become a |
| * de-facto standard for labeled networking. |
| * |
| * Author: Paul Moore <paul@paul-moore.com> |
| * |
| */ |
| |
| /* |
| * (c) Copyright Hewlett-Packard Development Company, L.P., 2006 |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License as published by |
| * the Free Software Foundation; either version 2 of the License, or |
| * (at your option) any later version. |
| * |
| * This program is distributed in the hope that it will be useful, |
| * but WITHOUT ANY WARRANTY; without even the implied warranty of |
| * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See |
| * the GNU General Public License for more details. |
| * |
| * You should have received a copy of the GNU General Public License |
| * along with this program; if not, see <http://www.gnu.org/licenses/>. |
| * |
| */ |
| |
| #ifndef _CIPSO_IPV4_H |
| #define _CIPSO_IPV4_H |
| |
| #include <linux/types.h> |
| #include <linux/rcupdate.h> |
| #include <linux/list.h> |
| #include <linux/net.h> |
| #include <linux/skbuff.h> |
| #include <net/netlabel.h> |
| #include <net/request_sock.h> |
| #include <linux/atomic.h> |
| #include <asm/unaligned.h> |
| |
| /* known doi values */ |
| #define CIPSO_V4_DOI_UNKNOWN 0x00000000 |
| |
| /* standard tag types */ |
| #define CIPSO_V4_TAG_INVALID 0 |
| #define CIPSO_V4_TAG_RBITMAP 1 |
| #define CIPSO_V4_TAG_ENUM 2 |
| #define CIPSO_V4_TAG_RANGE 5 |
| #define CIPSO_V4_TAG_PBITMAP 6 |
| #define CIPSO_V4_TAG_FREEFORM 7 |
| |
| /* non-standard tag types (tags > 127) */ |
| #define CIPSO_V4_TAG_LOCAL 128 |
| |
| /* doi mapping types */ |
| #define CIPSO_V4_MAP_UNKNOWN 0 |
| #define CIPSO_V4_MAP_TRANS 1 |
| #define CIPSO_V4_MAP_PASS 2 |
| #define CIPSO_V4_MAP_LOCAL 3 |
| |
| /* limits */ |
| #define CIPSO_V4_MAX_REM_LVLS 255 |
| #define CIPSO_V4_INV_LVL 0x80000000 |
| #define CIPSO_V4_MAX_LOC_LVLS (CIPSO_V4_INV_LVL - 1) |
| #define CIPSO_V4_MAX_REM_CATS 65534 |
| #define CIPSO_V4_INV_CAT 0x80000000 |
| #define CIPSO_V4_MAX_LOC_CATS (CIPSO_V4_INV_CAT - 1) |
| |
| /* |
| * CIPSO DOI definitions |
| */ |
| |
| /* DOI definition struct */ |
| #define CIPSO_V4_TAG_MAXCNT 5 |
| struct cipso_v4_doi { |
| u32 doi; |
| u32 type; |
| union { |
| struct cipso_v4_std_map_tbl *std; |
| } map; |
| u8 tags[CIPSO_V4_TAG_MAXCNT]; |
| |
| atomic_t refcount; |
| struct list_head list; |
| struct rcu_head rcu; |
| }; |
| |
| /* Standard CIPSO mapping table */ |
| /* NOTE: the highest order bit (i.e. 0x80000000) is an 'invalid' flag, if the |
| * bit is set then consider that value as unspecified, meaning the |
| * mapping for that particular level/category is invalid */ |
| struct cipso_v4_std_map_tbl { |
| struct { |
| u32 *cipso; |
| u32 *local; |
| u32 cipso_size; |
| u32 local_size; |
| } lvl; |
| struct { |
| u32 *cipso; |
| u32 *local; |
| u32 cipso_size; |
| u32 local_size; |
| } cat; |
| }; |
| |
| /* |
| * Sysctl Variables |
| */ |
| |
| #ifdef CONFIG_NETLABEL |
| extern int cipso_v4_cache_enabled; |
| extern int cipso_v4_cache_bucketsize; |
| extern int cipso_v4_rbm_optfmt; |
| extern int cipso_v4_rbm_strictvalid; |
| #endif |
| |
| /* |
| * Helper Functions |
| */ |
| |
| #define CIPSO_V4_OPTEXIST(x) (IPCB(x)->opt.cipso != 0) |
| #define CIPSO_V4_OPTPTR(x) (skb_network_header(x) + IPCB(x)->opt.cipso) |
| |
| /* |
| * DOI List Functions |
| */ |
| |
| #ifdef CONFIG_NETLABEL |
| int cipso_v4_doi_add(struct cipso_v4_doi *doi_def, |
| struct netlbl_audit *audit_info); |
| void cipso_v4_doi_free(struct cipso_v4_doi *doi_def); |
| int cipso_v4_doi_remove(u32 doi, struct netlbl_audit *audit_info); |
| struct cipso_v4_doi *cipso_v4_doi_getdef(u32 doi); |
| void cipso_v4_doi_putdef(struct cipso_v4_doi *doi_def); |
| int cipso_v4_doi_walk(u32 *skip_cnt, |
| int (*callback) (struct cipso_v4_doi *doi_def, void *arg), |
| void *cb_arg); |
| #else |
| static inline int cipso_v4_doi_add(struct cipso_v4_doi *doi_def, |
| struct netlbl_audit *audit_info) |
| { |
| return -ENOSYS; |
| } |
| |
| static inline void cipso_v4_doi_free(struct cipso_v4_doi *doi_def) |
| { |
| return; |
| } |
| |
| static inline int cipso_v4_doi_remove(u32 doi, |
| struct netlbl_audit *audit_info) |
| { |
| return 0; |
| } |
| |
| static inline struct cipso_v4_doi *cipso_v4_doi_getdef(u32 doi) |
| { |
| return NULL; |
| } |
| |
| static inline int cipso_v4_doi_walk(u32 *skip_cnt, |
| int (*callback) (struct cipso_v4_doi *doi_def, void *arg), |
| void *cb_arg) |
| { |
| return 0; |
| } |
| |
| static inline int cipso_v4_doi_domhsh_add(struct cipso_v4_doi *doi_def, |
| const char *domain) |
| { |
| return -ENOSYS; |
| } |
| |
| static inline int cipso_v4_doi_domhsh_remove(struct cipso_v4_doi *doi_def, |
| const char *domain) |
| { |
| return 0; |
| } |
| #endif /* CONFIG_NETLABEL */ |
| |
| /* |
| * Label Mapping Cache Functions |
| */ |
| |
| #ifdef CONFIG_NETLABEL |
| void cipso_v4_cache_invalidate(void); |
| int cipso_v4_cache_add(const struct sk_buff *skb, |
| const struct netlbl_lsm_secattr *secattr); |
| #else |
| static inline void cipso_v4_cache_invalidate(void) |
| { |
| return; |
| } |
| |
| static inline int cipso_v4_cache_add(const struct sk_buff *skb, |
| const struct netlbl_lsm_secattr *secattr) |
| { |
| return 0; |
| } |
| #endif /* CONFIG_NETLABEL */ |
| |
| /* |
| * Protocol Handling Functions |
| */ |
| |
| #ifdef CONFIG_NETLABEL |
| void cipso_v4_error(struct sk_buff *skb, int error, u32 gateway); |
| int cipso_v4_sock_setattr(struct sock *sk, |
| const struct cipso_v4_doi *doi_def, |
| const struct netlbl_lsm_secattr *secattr); |
| void cipso_v4_sock_delattr(struct sock *sk); |
| int cipso_v4_sock_getattr(struct sock *sk, struct netlbl_lsm_secattr *secattr); |
| int cipso_v4_req_setattr(struct request_sock *req, |
| const struct cipso_v4_doi *doi_def, |
| const struct netlbl_lsm_secattr *secattr); |
| void cipso_v4_req_delattr(struct request_sock *req); |
| int cipso_v4_skbuff_setattr(struct sk_buff *skb, |
| const struct cipso_v4_doi *doi_def, |
| const struct netlbl_lsm_secattr *secattr); |
| int cipso_v4_skbuff_delattr(struct sk_buff *skb); |
| int cipso_v4_skbuff_getattr(const struct sk_buff *skb, |
| struct netlbl_lsm_secattr *secattr); |
| int cipso_v4_validate(const struct sk_buff *skb, unsigned char **option); |
| #else |
| static inline void cipso_v4_error(struct sk_buff *skb, |
| int error, |
| u32 gateway) |
| { |
| return; |
| } |
| |
| static inline int cipso_v4_sock_setattr(struct sock *sk, |
| const struct cipso_v4_doi *doi_def, |
| const struct netlbl_lsm_secattr *secattr) |
| { |
| return -ENOSYS; |
| } |
| |
| static inline void cipso_v4_sock_delattr(struct sock *sk) |
| { |
| } |
| |
| static inline int cipso_v4_sock_getattr(struct sock *sk, |
| struct netlbl_lsm_secattr *secattr) |
| { |
| return -ENOSYS; |
| } |
| |
| static inline int cipso_v4_req_setattr(struct request_sock *req, |
| const struct cipso_v4_doi *doi_def, |
| const struct netlbl_lsm_secattr *secattr) |
| { |
| return -ENOSYS; |
| } |
| |
| static inline void cipso_v4_req_delattr(struct request_sock *req) |
| { |
| return; |
| } |
| |
| static inline int cipso_v4_skbuff_setattr(struct sk_buff *skb, |
| const struct cipso_v4_doi *doi_def, |
| const struct netlbl_lsm_secattr *secattr) |
| { |
| return -ENOSYS; |
| } |
| |
| static inline int cipso_v4_skbuff_delattr(struct sk_buff *skb) |
| { |
| return -ENOSYS; |
| } |
| |
| static inline int cipso_v4_skbuff_getattr(const struct sk_buff *skb, |
| struct netlbl_lsm_secattr *secattr) |
| { |
| return -ENOSYS; |
| } |
| |
| static inline int cipso_v4_validate(const struct sk_buff *skb, |
| unsigned char **option) |
| { |
| unsigned char *opt = *option; |
| unsigned char err_offset = 0; |
| u8 opt_len = opt[1]; |
| u8 opt_iter; |
| u8 tag_len; |
| |
| if (opt_len < 8) { |
| err_offset = 1; |
| goto out; |
| } |
| |
| if (get_unaligned_be32(&opt[2]) == 0) { |
| err_offset = 2; |
| goto out; |
| } |
| |
| for (opt_iter = 6; opt_iter < opt_len;) { |
| tag_len = opt[opt_iter + 1]; |
| if ((tag_len == 0) || (opt[opt_iter + 1] > (opt_len - opt_iter))) { |
| err_offset = opt_iter + 1; |
| goto out; |
| } |
| opt_iter += tag_len; |
| } |
| |
| out: |
| *option = opt + err_offset; |
| return err_offset; |
| |
| } |
| #endif /* CONFIG_NETLABEL */ |
| |
| #endif /* _CIPSO_IPV4_H */ |