blob: b392bee396f16341c2842aa20c3759c19afb0238 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * xfrm6_state.c: based on xfrm4_state.c
3 *
4 * Authors:
5 * Mitsuru KANDA @USAGI
6 * Kazunori MIYAZAWA @USAGI
7 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
8 * IPv6 support
9 * YOSHIFUJI Hideaki @USAGI
10 * Split up af-specific portion
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +090011 *
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 */
13
14#include <net/xfrm.h>
15#include <linux/pfkeyv2.h>
16#include <linux/ipsec.h>
17#include <net/ipv6.h>
Patrick McHardyee51b1b2006-01-13 14:34:36 -080018#include <net/addrconf.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019
20static struct xfrm_state_afinfo xfrm6_state_afinfo;
21
22static void
23__xfrm6_init_tempsel(struct xfrm_state *x, struct flowi *fl,
24 struct xfrm_tmpl *tmpl,
25 xfrm_address_t *daddr, xfrm_address_t *saddr)
26{
27 /* Initialize temporary selector matching only
28 * to current session. */
29 ipv6_addr_copy((struct in6_addr *)&x->sel.daddr, &fl->fl6_dst);
30 ipv6_addr_copy((struct in6_addr *)&x->sel.saddr, &fl->fl6_src);
31 x->sel.dport = xfrm_flowi_dport(fl);
Al Viro8f83f232006-09-27 18:46:11 -070032 x->sel.dport_mask = htons(0xffff);
Linus Torvalds1da177e2005-04-16 15:20:36 -070033 x->sel.sport = xfrm_flowi_sport(fl);
Al Viro8f83f232006-09-27 18:46:11 -070034 x->sel.sport_mask = htons(0xffff);
Linus Torvalds1da177e2005-04-16 15:20:36 -070035 x->sel.prefixlen_d = 128;
36 x->sel.prefixlen_s = 128;
37 x->sel.proto = fl->proto;
38 x->sel.ifindex = fl->oif;
39 x->id = tmpl->id;
40 if (ipv6_addr_any((struct in6_addr*)&x->id.daddr))
41 memcpy(&x->id.daddr, daddr, sizeof(x->sel.daddr));
42 memcpy(&x->props.saddr, &tmpl->saddr, sizeof(x->props.saddr));
43 if (ipv6_addr_any((struct in6_addr*)&x->props.saddr))
44 memcpy(&x->props.saddr, saddr, sizeof(x->props.saddr));
Linus Torvalds1da177e2005-04-16 15:20:36 -070045 x->props.mode = tmpl->mode;
46 x->props.reqid = tmpl->reqid;
47 x->props.family = AF_INET6;
48}
49
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -070050static int
51__xfrm6_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n)
52{
53 int i;
54 int j = 0;
55
56 /* Rule 1: select IPsec transport except AH */
57 for (i = 0; i < n; i++) {
58 if (src[i]->props.mode == XFRM_MODE_TRANSPORT &&
59 src[i]->id.proto != IPPROTO_AH) {
60 dst[j++] = src[i];
61 src[i] = NULL;
62 }
63 }
64 if (j == n)
65 goto end;
66
Masahide NAKAMURA64d9fdd2006-08-23 22:54:07 -070067 /* Rule 2: select MIPv6 RO or inbound trigger */
Masahide NAKAMURA59fbb3a62007-06-26 23:56:32 -070068#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
Masahide NAKAMURA64d9fdd2006-08-23 22:54:07 -070069 for (i = 0; i < n; i++) {
70 if (src[i] &&
71 (src[i]->props.mode == XFRM_MODE_ROUTEOPTIMIZATION ||
72 src[i]->props.mode == XFRM_MODE_IN_TRIGGER)) {
73 dst[j++] = src[i];
74 src[i] = NULL;
75 }
76 }
77 if (j == n)
78 goto end;
79#endif
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -070080
81 /* Rule 3: select IPsec transport AH */
82 for (i = 0; i < n; i++) {
83 if (src[i] &&
84 src[i]->props.mode == XFRM_MODE_TRANSPORT &&
85 src[i]->id.proto == IPPROTO_AH) {
86 dst[j++] = src[i];
87 src[i] = NULL;
88 }
89 }
90 if (j == n)
91 goto end;
92
93 /* Rule 4: select IPsec tunnel */
94 for (i = 0; i < n; i++) {
95 if (src[i] &&
Herbert Xu1bfcb102007-10-17 21:31:50 -070096 (src[i]->props.mode == XFRM_MODE_TUNNEL ||
97 src[i]->props.mode == XFRM_MODE_BEET)) {
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -070098 dst[j++] = src[i];
99 src[i] = NULL;
100 }
101 }
102 if (likely(j == n))
103 goto end;
104
105 /* Final rule */
106 for (i = 0; i < n; i++) {
107 if (src[i]) {
108 dst[j++] = src[i];
109 src[i] = NULL;
110 }
111 }
112
113 end:
114 return 0;
115}
116
117static int
118__xfrm6_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n)
119{
120 int i;
121 int j = 0;
122
123 /* Rule 1: select IPsec transport */
124 for (i = 0; i < n; i++) {
125 if (src[i]->mode == XFRM_MODE_TRANSPORT) {
126 dst[j++] = src[i];
127 src[i] = NULL;
128 }
129 }
130 if (j == n)
131 goto end;
132
Masahide NAKAMURA64d9fdd2006-08-23 22:54:07 -0700133 /* Rule 2: select MIPv6 RO or inbound trigger */
Masahide NAKAMURA59fbb3a62007-06-26 23:56:32 -0700134#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
Masahide NAKAMURA64d9fdd2006-08-23 22:54:07 -0700135 for (i = 0; i < n; i++) {
136 if (src[i] &&
137 (src[i]->mode == XFRM_MODE_ROUTEOPTIMIZATION ||
138 src[i]->mode == XFRM_MODE_IN_TRIGGER)) {
139 dst[j++] = src[i];
140 src[i] = NULL;
141 }
142 }
143 if (j == n)
144 goto end;
145#endif
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700146
147 /* Rule 3: select IPsec tunnel */
148 for (i = 0; i < n; i++) {
149 if (src[i] &&
Herbert Xu1bfcb102007-10-17 21:31:50 -0700150 (src[i]->mode == XFRM_MODE_TUNNEL ||
151 src[i]->mode == XFRM_MODE_BEET)) {
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700152 dst[j++] = src[i];
153 src[i] = NULL;
154 }
155 }
156 if (likely(j == n))
157 goto end;
158
159 /* Final rule */
160 for (i = 0; i < n; i++) {
161 if (src[i]) {
162 dst[j++] = src[i];
163 src[i] = NULL;
164 }
165 }
166
167 end:
168 return 0;
169}
170
Linus Torvalds1da177e2005-04-16 15:20:36 -0700171static struct xfrm_state_afinfo xfrm6_state_afinfo = {
172 .family = AF_INET6,
Herbert Xu17c2a422007-10-17 21:33:12 -0700173 .owner = THIS_MODULE,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700174 .init_tempsel = __xfrm6_init_tempsel,
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700175 .tmpl_sort = __xfrm6_tmpl_sort,
176 .state_sort = __xfrm6_state_sort,
Miika Komucdca7262007-02-06 14:24:56 -0800177 .output = xfrm6_output,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700178};
179
180void __init xfrm6_state_init(void)
181{
182 xfrm_state_register_afinfo(&xfrm6_state_afinfo);
183}
184
185void xfrm6_state_fini(void)
186{
187 xfrm_state_unregister_afinfo(&xfrm6_state_afinfo);
188}
189