blob: dc817e035e2338cb60fa78ec2e0cf9319eef986d [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * xfrm6_state.c: based on xfrm4_state.c
3 *
4 * Authors:
5 * Mitsuru KANDA @USAGI
6 * Kazunori MIYAZAWA @USAGI
7 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
8 * IPv6 support
9 * YOSHIFUJI Hideaki @USAGI
10 * Split up af-specific portion
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +090011 *
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 */
13
14#include <net/xfrm.h>
15#include <linux/pfkeyv2.h>
16#include <linux/ipsec.h>
Herbert Xu862b82c2007-11-13 21:43:11 -080017#include <linux/netfilter_ipv6.h>
Herbert Xu36cf9ac2007-11-13 21:40:52 -080018#include <net/dsfield.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <net/ipv6.h>
Patrick McHardyee51b1b2006-01-13 14:34:36 -080020#include <net/addrconf.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021
22static struct xfrm_state_afinfo xfrm6_state_afinfo;
23
24static void
25__xfrm6_init_tempsel(struct xfrm_state *x, struct flowi *fl,
26 struct xfrm_tmpl *tmpl,
27 xfrm_address_t *daddr, xfrm_address_t *saddr)
28{
29 /* Initialize temporary selector matching only
30 * to current session. */
31 ipv6_addr_copy((struct in6_addr *)&x->sel.daddr, &fl->fl6_dst);
32 ipv6_addr_copy((struct in6_addr *)&x->sel.saddr, &fl->fl6_src);
33 x->sel.dport = xfrm_flowi_dport(fl);
Al Viro8f83f232006-09-27 18:46:11 -070034 x->sel.dport_mask = htons(0xffff);
Linus Torvalds1da177e2005-04-16 15:20:36 -070035 x->sel.sport = xfrm_flowi_sport(fl);
Al Viro8f83f232006-09-27 18:46:11 -070036 x->sel.sport_mask = htons(0xffff);
Linus Torvalds1da177e2005-04-16 15:20:36 -070037 x->sel.prefixlen_d = 128;
38 x->sel.prefixlen_s = 128;
39 x->sel.proto = fl->proto;
40 x->sel.ifindex = fl->oif;
41 x->id = tmpl->id;
42 if (ipv6_addr_any((struct in6_addr*)&x->id.daddr))
43 memcpy(&x->id.daddr, daddr, sizeof(x->sel.daddr));
44 memcpy(&x->props.saddr, &tmpl->saddr, sizeof(x->props.saddr));
45 if (ipv6_addr_any((struct in6_addr*)&x->props.saddr))
46 memcpy(&x->props.saddr, saddr, sizeof(x->props.saddr));
Linus Torvalds1da177e2005-04-16 15:20:36 -070047 x->props.mode = tmpl->mode;
48 x->props.reqid = tmpl->reqid;
49 x->props.family = AF_INET6;
50}
51
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -070052static int
53__xfrm6_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n)
54{
55 int i;
56 int j = 0;
57
58 /* Rule 1: select IPsec transport except AH */
59 for (i = 0; i < n; i++) {
60 if (src[i]->props.mode == XFRM_MODE_TRANSPORT &&
61 src[i]->id.proto != IPPROTO_AH) {
62 dst[j++] = src[i];
63 src[i] = NULL;
64 }
65 }
66 if (j == n)
67 goto end;
68
Masahide NAKAMURA64d9fdd2006-08-23 22:54:07 -070069 /* Rule 2: select MIPv6 RO or inbound trigger */
Masahide NAKAMURA59fbb3a62007-06-26 23:56:32 -070070#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
Masahide NAKAMURA64d9fdd2006-08-23 22:54:07 -070071 for (i = 0; i < n; i++) {
72 if (src[i] &&
73 (src[i]->props.mode == XFRM_MODE_ROUTEOPTIMIZATION ||
74 src[i]->props.mode == XFRM_MODE_IN_TRIGGER)) {
75 dst[j++] = src[i];
76 src[i] = NULL;
77 }
78 }
79 if (j == n)
80 goto end;
81#endif
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -070082
83 /* Rule 3: select IPsec transport AH */
84 for (i = 0; i < n; i++) {
85 if (src[i] &&
86 src[i]->props.mode == XFRM_MODE_TRANSPORT &&
87 src[i]->id.proto == IPPROTO_AH) {
88 dst[j++] = src[i];
89 src[i] = NULL;
90 }
91 }
92 if (j == n)
93 goto end;
94
95 /* Rule 4: select IPsec tunnel */
96 for (i = 0; i < n; i++) {
97 if (src[i] &&
Herbert Xu1bfcb102007-10-17 21:31:50 -070098 (src[i]->props.mode == XFRM_MODE_TUNNEL ||
99 src[i]->props.mode == XFRM_MODE_BEET)) {
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700100 dst[j++] = src[i];
101 src[i] = NULL;
102 }
103 }
104 if (likely(j == n))
105 goto end;
106
107 /* Final rule */
108 for (i = 0; i < n; i++) {
109 if (src[i]) {
110 dst[j++] = src[i];
111 src[i] = NULL;
112 }
113 }
114
115 end:
116 return 0;
117}
118
119static int
120__xfrm6_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n)
121{
122 int i;
123 int j = 0;
124
125 /* Rule 1: select IPsec transport */
126 for (i = 0; i < n; i++) {
127 if (src[i]->mode == XFRM_MODE_TRANSPORT) {
128 dst[j++] = src[i];
129 src[i] = NULL;
130 }
131 }
132 if (j == n)
133 goto end;
134
Masahide NAKAMURA64d9fdd2006-08-23 22:54:07 -0700135 /* Rule 2: select MIPv6 RO or inbound trigger */
Masahide NAKAMURA59fbb3a62007-06-26 23:56:32 -0700136#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
Masahide NAKAMURA64d9fdd2006-08-23 22:54:07 -0700137 for (i = 0; i < n; i++) {
138 if (src[i] &&
139 (src[i]->mode == XFRM_MODE_ROUTEOPTIMIZATION ||
140 src[i]->mode == XFRM_MODE_IN_TRIGGER)) {
141 dst[j++] = src[i];
142 src[i] = NULL;
143 }
144 }
145 if (j == n)
146 goto end;
147#endif
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700148
149 /* Rule 3: select IPsec tunnel */
150 for (i = 0; i < n; i++) {
151 if (src[i] &&
Herbert Xu1bfcb102007-10-17 21:31:50 -0700152 (src[i]->mode == XFRM_MODE_TUNNEL ||
153 src[i]->mode == XFRM_MODE_BEET)) {
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700154 dst[j++] = src[i];
155 src[i] = NULL;
156 }
157 }
158 if (likely(j == n))
159 goto end;
160
161 /* Final rule */
162 for (i = 0; i < n; i++) {
163 if (src[i]) {
164 dst[j++] = src[i];
165 src[i] = NULL;
166 }
167 }
168
169 end:
170 return 0;
171}
172
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800173int xfrm6_extract_header(struct sk_buff *skb)
174{
175 struct ipv6hdr *iph = ipv6_hdr(skb);
176
177 XFRM_MODE_SKB_CB(skb)->id = 0;
178 XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF);
179 XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph);
180 XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit;
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800181 memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl,
182 sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl));
183
184 return 0;
185}
186
Linus Torvalds1da177e2005-04-16 15:20:36 -0700187static struct xfrm_state_afinfo xfrm6_state_afinfo = {
188 .family = AF_INET6,
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800189 .proto = IPPROTO_IPV6,
Herbert Xu227620e2007-11-13 21:41:28 -0800190 .eth_proto = htons(ETH_P_IPV6),
Herbert Xu17c2a422007-10-17 21:33:12 -0700191 .owner = THIS_MODULE,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700192 .init_tempsel = __xfrm6_init_tempsel,
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700193 .tmpl_sort = __xfrm6_tmpl_sort,
194 .state_sort = __xfrm6_state_sort,
Miika Komucdca7262007-02-06 14:24:56 -0800195 .output = xfrm6_output,
Herbert Xu227620e2007-11-13 21:41:28 -0800196 .extract_input = xfrm6_extract_input,
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800197 .extract_output = xfrm6_extract_output,
Herbert Xu716062f2007-11-13 21:44:23 -0800198 .transport_finish = xfrm6_transport_finish,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700199};
200
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800201int __init xfrm6_state_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700202{
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800203 return xfrm_state_register_afinfo(&xfrm6_state_afinfo);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700204}
205
206void xfrm6_state_fini(void)
207{
208 xfrm_state_unregister_afinfo(&xfrm6_state_afinfo);
209}
210