blob: a67575d472a320f306002a88959f0d0f9a73af09 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * xfrm6_state.c: based on xfrm4_state.c
3 *
4 * Authors:
5 * Mitsuru KANDA @USAGI
6 * Kazunori MIYAZAWA @USAGI
7 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
8 * IPv6 support
9 * YOSHIFUJI Hideaki @USAGI
10 * Split up af-specific portion
YOSHIFUJI Hideaki1ab14572007-02-09 23:24:49 +090011 *
Linus Torvalds1da177e2005-04-16 15:20:36 -070012 */
13
14#include <net/xfrm.h>
15#include <linux/pfkeyv2.h>
16#include <linux/ipsec.h>
Herbert Xu862b82c2007-11-13 21:43:11 -080017#include <linux/netfilter_ipv6.h>
Herbert Xu36cf9ac2007-11-13 21:40:52 -080018#include <net/dsfield.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070019#include <net/ipv6.h>
Patrick McHardyee51b1b2006-01-13 14:34:36 -080020#include <net/addrconf.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070021
Linus Torvalds1da177e2005-04-16 15:20:36 -070022static void
Thomas Egerer8444cf72010-09-20 11:11:38 -070023__xfrm6_init_tempsel(struct xfrm_selector *sel, struct flowi *fl)
Linus Torvalds1da177e2005-04-16 15:20:36 -070024{
25 /* Initialize temporary selector matching only
26 * to current session. */
Thomas Egerer8444cf72010-09-20 11:11:38 -070027 ipv6_addr_copy((struct in6_addr *)&sel->daddr, &fl->fl6_dst);
28 ipv6_addr_copy((struct in6_addr *)&sel->saddr, &fl->fl6_src);
29 sel->dport = xfrm_flowi_dport(fl);
30 sel->dport_mask = htons(0xffff);
31 sel->sport = xfrm_flowi_sport(fl);
32 sel->sport_mask = htons(0xffff);
33 sel->family = AF_INET6;
34 sel->prefixlen_d = 128;
35 sel->prefixlen_s = 128;
36 sel->proto = fl->proto;
37 sel->ifindex = fl->oif;
38}
39
40static void
41xfrm6_init_temprop(struct xfrm_state *x, struct xfrm_tmpl *tmpl,
42 xfrm_address_t *daddr, xfrm_address_t *saddr)
43{
Linus Torvalds1da177e2005-04-16 15:20:36 -070044 x->id = tmpl->id;
45 if (ipv6_addr_any((struct in6_addr*)&x->id.daddr))
46 memcpy(&x->id.daddr, daddr, sizeof(x->sel.daddr));
47 memcpy(&x->props.saddr, &tmpl->saddr, sizeof(x->props.saddr));
48 if (ipv6_addr_any((struct in6_addr*)&x->props.saddr))
49 memcpy(&x->props.saddr, saddr, sizeof(x->props.saddr));
Linus Torvalds1da177e2005-04-16 15:20:36 -070050 x->props.mode = tmpl->mode;
51 x->props.reqid = tmpl->reqid;
52 x->props.family = AF_INET6;
53}
54
YOSHIFUJI Hideaki3b6cdf92008-02-19 10:15:27 +090055/* distribution counting sort function for xfrm_state and xfrm_tmpl */
56static int
57__xfrm6_sort(void **dst, void **src, int n, int (*cmp)(void *p), int maxclass)
58{
59 int i;
60 int class[XFRM_MAX_DEPTH];
61 int count[maxclass];
62
63 memset(count, 0, sizeof(count));
64
65 for (i = 0; i < n; i++) {
66 int c;
67 class[i] = c = cmp(src[i]);
68 count[c]++;
69 }
70
71 for (i = 2; i < maxclass; i++)
72 count[i] += count[i - 1];
73
74 for (i = 0; i < n; i++) {
75 dst[count[class[i] - 1]++] = src[i];
Hannes Eder66da8c52009-02-21 23:37:10 -080076 src[i] = NULL;
YOSHIFUJI Hideaki3b6cdf92008-02-19 10:15:27 +090077 }
78
79 return 0;
80}
81
82/*
83 * Rule for xfrm_state:
84 *
85 * rule 1: select IPsec transport except AH
86 * rule 2: select MIPv6 RO or inbound trigger
87 * rule 3: select IPsec transport AH
88 * rule 4: select IPsec tunnel
89 * rule 5: others
90 */
91static int __xfrm6_state_sort_cmp(void *p)
92{
93 struct xfrm_state *v = p;
94
95 switch (v->props.mode) {
96 case XFRM_MODE_TRANSPORT:
97 if (v->id.proto != IPPROTO_AH)
98 return 1;
99 else
100 return 3;
101#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
102 case XFRM_MODE_ROUTEOPTIMIZATION:
103 case XFRM_MODE_IN_TRIGGER:
104 return 2;
105#endif
106 case XFRM_MODE_TUNNEL:
107 case XFRM_MODE_BEET:
108 return 4;
109 }
110 return 5;
111}
112
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700113static int
114__xfrm6_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n)
115{
YOSHIFUJI Hideaki3b6cdf92008-02-19 10:15:27 +0900116 return __xfrm6_sort((void **)dst, (void **)src, n,
117 __xfrm6_state_sort_cmp, 6);
118}
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700119
YOSHIFUJI Hideaki3b6cdf92008-02-19 10:15:27 +0900120/*
121 * Rule for xfrm_tmpl:
122 *
123 * rule 1: select IPsec transport
124 * rule 2: select MIPv6 RO or inbound trigger
125 * rule 3: select IPsec tunnel
126 * rule 4: others
127 */
128static int __xfrm6_tmpl_sort_cmp(void *p)
129{
130 struct xfrm_tmpl *v = p;
131 switch (v->mode) {
132 case XFRM_MODE_TRANSPORT:
133 return 1;
Masahide NAKAMURA59fbb3a62007-06-26 23:56:32 -0700134#if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE)
YOSHIFUJI Hideaki3b6cdf92008-02-19 10:15:27 +0900135 case XFRM_MODE_ROUTEOPTIMIZATION:
136 case XFRM_MODE_IN_TRIGGER:
137 return 2;
Masahide NAKAMURA64d9fdd2006-08-23 22:54:07 -0700138#endif
YOSHIFUJI Hideaki3b6cdf92008-02-19 10:15:27 +0900139 case XFRM_MODE_TUNNEL:
140 case XFRM_MODE_BEET:
141 return 3;
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700142 }
YOSHIFUJI Hideaki3b6cdf92008-02-19 10:15:27 +0900143 return 4;
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700144}
145
146static int
147__xfrm6_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n)
148{
YOSHIFUJI Hideaki3b6cdf92008-02-19 10:15:27 +0900149 return __xfrm6_sort((void **)dst, (void **)src, n,
150 __xfrm6_tmpl_sort_cmp, 5);
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700151}
152
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800153int xfrm6_extract_header(struct sk_buff *skb)
154{
155 struct ipv6hdr *iph = ipv6_hdr(skb);
156
Herbert Xu732c8bd2008-03-26 16:51:09 -0700157 XFRM_MODE_SKB_CB(skb)->ihl = sizeof(*iph);
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800158 XFRM_MODE_SKB_CB(skb)->id = 0;
159 XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF);
160 XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph);
161 XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit;
Herbert Xu732c8bd2008-03-26 16:51:09 -0700162 XFRM_MODE_SKB_CB(skb)->optlen = 0;
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800163 memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl,
164 sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl));
165
166 return 0;
167}
168
Linus Torvalds1da177e2005-04-16 15:20:36 -0700169static struct xfrm_state_afinfo xfrm6_state_afinfo = {
170 .family = AF_INET6,
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800171 .proto = IPPROTO_IPV6,
Herbert Xu227620e2007-11-13 21:41:28 -0800172 .eth_proto = htons(ETH_P_IPV6),
Herbert Xu17c2a422007-10-17 21:33:12 -0700173 .owner = THIS_MODULE,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700174 .init_tempsel = __xfrm6_init_tempsel,
Thomas Egerer8444cf72010-09-20 11:11:38 -0700175 .init_temprop = xfrm6_init_temprop,
Masahide NAKAMURA58c949d2006-08-23 22:51:02 -0700176 .tmpl_sort = __xfrm6_tmpl_sort,
177 .state_sort = __xfrm6_state_sort,
Miika Komucdca7262007-02-06 14:24:56 -0800178 .output = xfrm6_output,
Herbert Xu227620e2007-11-13 21:41:28 -0800179 .extract_input = xfrm6_extract_input,
Herbert Xu36cf9ac2007-11-13 21:40:52 -0800180 .extract_output = xfrm6_extract_output,
Herbert Xu716062f2007-11-13 21:44:23 -0800181 .transport_finish = xfrm6_transport_finish,
Linus Torvalds1da177e2005-04-16 15:20:36 -0700182};
183
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800184int __init xfrm6_state_init(void)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700185{
Daniel Lezcano0013cab2007-12-07 00:42:11 -0800186 return xfrm_state_register_afinfo(&xfrm6_state_afinfo);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700187}
188
189void xfrm6_state_fini(void)
190{
191 xfrm_state_unregister_afinfo(&xfrm6_state_afinfo);
192}
193