11da177e4SLinus Torvalds #ifndef _NET_XFRM_H 21da177e4SLinus Torvalds #define _NET_XFRM_H 31da177e4SLinus Torvalds 4aabc9761SHerbert Xu #include <linux/compiler.h> 514c85021SArnaldo Carvalho de Melo #include <linux/in.h> 61da177e4SLinus Torvalds #include <linux/xfrm.h> 71da177e4SLinus Torvalds #include <linux/spinlock.h> 81da177e4SLinus Torvalds #include <linux/list.h> 91da177e4SLinus Torvalds #include <linux/skbuff.h> 1014c85021SArnaldo Carvalho de Melo #include <linux/socket.h> 111da177e4SLinus Torvalds #include <linux/pfkeyv2.h> 125794708fSMasahide NAKAMURA #include <linux/ipsec.h> 131da177e4SLinus Torvalds #include <linux/in6.h> 144a3e2f71SArjan van de Ven #include <linux/mutex.h> 151da177e4SLinus Torvalds 161da177e4SLinus Torvalds #include <net/sock.h> 171da177e4SLinus Torvalds #include <net/dst.h> 181da177e4SLinus Torvalds #include <net/route.h> 191da177e4SLinus Torvalds #include <net/ipv6.h> 201da177e4SLinus Torvalds #include <net/ip6_fib.h> 211da177e4SLinus Torvalds 221da177e4SLinus Torvalds #define XFRM_ALIGN8(len) (((len) + 7) & ~7) 23b59f45d0SHerbert Xu #define MODULE_ALIAS_XFRM_MODE(family, encap) \ 24b59f45d0SHerbert Xu MODULE_ALIAS("xfrm-mode-" __stringify(family) "-" __stringify(encap)) 251da177e4SLinus Torvalds 26f8cd5488SJamal Hadi Salim extern struct sock *xfrm_nl; 27f8cd5488SJamal Hadi Salim extern u32 sysctl_xfrm_aevent_etime; 28f8cd5488SJamal Hadi Salim extern u32 sysctl_xfrm_aevent_rseqth; 29f8cd5488SJamal Hadi Salim 304a3e2f71SArjan van de Ven extern struct mutex xfrm_cfg_mutex; 311da177e4SLinus Torvalds 321da177e4SLinus Torvalds /* Organization of SPD aka "XFRM rules" 331da177e4SLinus Torvalds ------------------------------------ 341da177e4SLinus Torvalds 351da177e4SLinus Torvalds Basic objects: 361da177e4SLinus Torvalds - policy rule, struct xfrm_policy (=SPD entry) 371da177e4SLinus Torvalds - bundle of transformations, struct dst_entry == struct xfrm_dst (=SA bundle) 381da177e4SLinus Torvalds - instance of a transformer, struct xfrm_state (=SA) 391da177e4SLinus Torvalds - template to clone xfrm_state, struct xfrm_tmpl 401da177e4SLinus Torvalds 411da177e4SLinus Torvalds SPD is plain linear list of xfrm_policy rules, ordered by priority. 421da177e4SLinus Torvalds (To be compatible with existing pfkeyv2 implementations, 431da177e4SLinus Torvalds many rules with priority of 0x7fffffff are allowed to exist and 441da177e4SLinus Torvalds such rules are ordered in an unpredictable way, thanks to bsd folks.) 451da177e4SLinus Torvalds 461da177e4SLinus Torvalds Lookup is plain linear search until the first match with selector. 471da177e4SLinus Torvalds 481da177e4SLinus Torvalds If "action" is "block", then we prohibit the flow, otherwise: 491da177e4SLinus Torvalds if "xfrms_nr" is zero, the flow passes untransformed. Otherwise, 501da177e4SLinus Torvalds policy entry has list of up to XFRM_MAX_DEPTH transformations, 511da177e4SLinus Torvalds described by templates xfrm_tmpl. Each template is resolved 521da177e4SLinus Torvalds to a complete xfrm_state (see below) and we pack bundle of transformations 531da177e4SLinus Torvalds to a dst_entry returned to requestor. 541da177e4SLinus Torvalds 551da177e4SLinus Torvalds dst -. xfrm .-> xfrm_state #1 561da177e4SLinus Torvalds |---. child .-> dst -. xfrm .-> xfrm_state #2 571da177e4SLinus Torvalds |---. child .-> dst -. xfrm .-> xfrm_state #3 581da177e4SLinus Torvalds |---. child .-> NULL 591da177e4SLinus Torvalds 601da177e4SLinus Torvalds Bundles are cached at xrfm_policy struct (field ->bundles). 611da177e4SLinus Torvalds 621da177e4SLinus Torvalds 631da177e4SLinus Torvalds Resolution of xrfm_tmpl 641da177e4SLinus Torvalds ----------------------- 651da177e4SLinus Torvalds Template contains: 661da177e4SLinus Torvalds 1. ->mode Mode: transport or tunnel 671da177e4SLinus Torvalds 2. ->id.proto Protocol: AH/ESP/IPCOMP 681da177e4SLinus Torvalds 3. ->id.daddr Remote tunnel endpoint, ignored for transport mode. 691da177e4SLinus Torvalds Q: allow to resolve security gateway? 701da177e4SLinus Torvalds 4. ->id.spi If not zero, static SPI. 711da177e4SLinus Torvalds 5. ->saddr Local tunnel endpoint, ignored for transport mode. 721da177e4SLinus Torvalds 6. ->algos List of allowed algos. Plain bitmask now. 731da177e4SLinus Torvalds Q: ealgos, aalgos, calgos. What a mess... 741da177e4SLinus Torvalds 7. ->share Sharing mode. 751da177e4SLinus Torvalds Q: how to implement private sharing mode? To add struct sock* to 761da177e4SLinus Torvalds flow id? 771da177e4SLinus Torvalds 781da177e4SLinus Torvalds Having this template we search through SAD searching for entries 791da177e4SLinus Torvalds with appropriate mode/proto/algo, permitted by selector. 801da177e4SLinus Torvalds If no appropriate entry found, it is requested from key manager. 811da177e4SLinus Torvalds 821da177e4SLinus Torvalds PROBLEMS: 831da177e4SLinus Torvalds Q: How to find all the bundles referring to a physical path for 841da177e4SLinus Torvalds PMTU discovery? Seems, dst should contain list of all parents... 851da177e4SLinus Torvalds and enter to infinite locking hierarchy disaster. 861da177e4SLinus Torvalds No! It is easier, we will not search for them, let them find us. 871da177e4SLinus Torvalds We add genid to each dst plus pointer to genid of raw IP route, 881da177e4SLinus Torvalds pmtu disc will update pmtu on raw IP route and increase its genid. 891da177e4SLinus Torvalds dst_check() will see this for top level and trigger resyncing 901da177e4SLinus Torvalds metrics. Plus, it will be made via sk->sk_dst_cache. Solved. 911da177e4SLinus Torvalds */ 921da177e4SLinus Torvalds 931da177e4SLinus Torvalds /* Full description of state of transformer. */ 941da177e4SLinus Torvalds struct xfrm_state 951da177e4SLinus Torvalds { 961da177e4SLinus Torvalds /* Note: bydst is re-used during gc */ 978f126e37SDavid S. Miller struct hlist_node bydst; 988f126e37SDavid S. Miller struct hlist_node bysrc; 998f126e37SDavid S. Miller struct hlist_node byspi; 1001da177e4SLinus Torvalds 1011da177e4SLinus Torvalds atomic_t refcnt; 1021da177e4SLinus Torvalds spinlock_t lock; 1031da177e4SLinus Torvalds 1041da177e4SLinus Torvalds struct xfrm_id id; 1051da177e4SLinus Torvalds struct xfrm_selector sel; 1061da177e4SLinus Torvalds 1079d4a706dSDavid S. Miller u32 genid; 1089d4a706dSDavid S. Miller 1091da177e4SLinus Torvalds /* Key manger bits */ 1101da177e4SLinus Torvalds struct { 1111da177e4SLinus Torvalds u8 state; 1121da177e4SLinus Torvalds u8 dying; 1131da177e4SLinus Torvalds u32 seq; 1141da177e4SLinus Torvalds } km; 1151da177e4SLinus Torvalds 1161da177e4SLinus Torvalds /* Parameters of this state. */ 1171da177e4SLinus Torvalds struct { 1181da177e4SLinus Torvalds u32 reqid; 1191da177e4SLinus Torvalds u8 mode; 1201da177e4SLinus Torvalds u8 replay_window; 1211da177e4SLinus Torvalds u8 aalgo, ealgo, calgo; 1221da177e4SLinus Torvalds u8 flags; 1231da177e4SLinus Torvalds u16 family; 1241da177e4SLinus Torvalds xfrm_address_t saddr; 1251da177e4SLinus Torvalds int header_len; 1261da177e4SLinus Torvalds int trailer_len; 1271da177e4SLinus Torvalds } props; 1281da177e4SLinus Torvalds 1291da177e4SLinus Torvalds struct xfrm_lifetime_cfg lft; 1301da177e4SLinus Torvalds 1311da177e4SLinus Torvalds /* Data for transformer */ 1321da177e4SLinus Torvalds struct xfrm_algo *aalg; 1331da177e4SLinus Torvalds struct xfrm_algo *ealg; 1341da177e4SLinus Torvalds struct xfrm_algo *calg; 1351da177e4SLinus Torvalds 1361da177e4SLinus Torvalds /* Data for encapsulator */ 1371da177e4SLinus Torvalds struct xfrm_encap_tmpl *encap; 1381da177e4SLinus Torvalds 139060f02a3SNoriaki TAKAMIYA /* Data for care-of address */ 140060f02a3SNoriaki TAKAMIYA xfrm_address_t *coaddr; 141060f02a3SNoriaki TAKAMIYA 1421da177e4SLinus Torvalds /* IPComp needs an IPIP tunnel for handling uncompressed packets */ 1431da177e4SLinus Torvalds struct xfrm_state *tunnel; 1441da177e4SLinus Torvalds 1451da177e4SLinus Torvalds /* If a tunnel, number of users + 1 */ 1461da177e4SLinus Torvalds atomic_t tunnel_users; 1471da177e4SLinus Torvalds 1481da177e4SLinus Torvalds /* State for replay detection */ 1491da177e4SLinus Torvalds struct xfrm_replay_state replay; 1501da177e4SLinus Torvalds 151f8cd5488SJamal Hadi Salim /* Replay detection state at the time we sent the last notification */ 152f8cd5488SJamal Hadi Salim struct xfrm_replay_state preplay; 153f8cd5488SJamal Hadi Salim 1542717096aSJamal Hadi Salim /* internal flag that only holds state for delayed aevent at the 1552717096aSJamal Hadi Salim * moment 1562717096aSJamal Hadi Salim */ 1572717096aSJamal Hadi Salim u32 xflags; 1582717096aSJamal Hadi Salim 159f8cd5488SJamal Hadi Salim /* Replay detection notification settings */ 160f8cd5488SJamal Hadi Salim u32 replay_maxage; 161f8cd5488SJamal Hadi Salim u32 replay_maxdiff; 162f8cd5488SJamal Hadi Salim 163f8cd5488SJamal Hadi Salim /* Replay detection notification timer */ 164f8cd5488SJamal Hadi Salim struct timer_list rtimer; 165f8cd5488SJamal Hadi Salim 1661da177e4SLinus Torvalds /* Statistics */ 1671da177e4SLinus Torvalds struct xfrm_stats stats; 1681da177e4SLinus Torvalds 1691da177e4SLinus Torvalds struct xfrm_lifetime_cur curlft; 1701da177e4SLinus Torvalds struct timer_list timer; 1711da177e4SLinus Torvalds 1729afaca05SMasahide NAKAMURA /* Last used time */ 1739afaca05SMasahide NAKAMURA u64 lastused; 1749afaca05SMasahide NAKAMURA 1751da177e4SLinus Torvalds /* Reference to data common to all the instances of this 1761da177e4SLinus Torvalds * transformer. */ 1771da177e4SLinus Torvalds struct xfrm_type *type; 178b59f45d0SHerbert Xu struct xfrm_mode *mode; 1791da177e4SLinus Torvalds 180df71837dSTrent Jaeger /* Security context */ 181df71837dSTrent Jaeger struct xfrm_sec_ctx *security; 182df71837dSTrent Jaeger 1831da177e4SLinus Torvalds /* Private data of this transformer, format is opaque, 1841da177e4SLinus Torvalds * interpreted by xfrm_type methods. */ 1851da177e4SLinus Torvalds void *data; 1861da177e4SLinus Torvalds }; 1871da177e4SLinus Torvalds 1882717096aSJamal Hadi Salim /* xflags - make enum if more show up */ 1892717096aSJamal Hadi Salim #define XFRM_TIME_DEFER 1 1902717096aSJamal Hadi Salim 1911da177e4SLinus Torvalds enum { 1921da177e4SLinus Torvalds XFRM_STATE_VOID, 1931da177e4SLinus Torvalds XFRM_STATE_ACQ, 1941da177e4SLinus Torvalds XFRM_STATE_VALID, 1951da177e4SLinus Torvalds XFRM_STATE_ERROR, 1961da177e4SLinus Torvalds XFRM_STATE_EXPIRED, 1971da177e4SLinus Torvalds XFRM_STATE_DEAD 1981da177e4SLinus Torvalds }; 1991da177e4SLinus Torvalds 20026b15dadSJamal Hadi Salim /* callback structure passed from either netlink or pfkey */ 20126b15dadSJamal Hadi Salim struct km_event 20226b15dadSJamal Hadi Salim { 203bf08867fSHerbert Xu union { 204bf08867fSHerbert Xu u32 hard; 205bf08867fSHerbert Xu u32 proto; 206bf08867fSHerbert Xu u32 byid; 207f8cd5488SJamal Hadi Salim u32 aevent; 208f7b6983fSMasahide NAKAMURA u32 type; 209bf08867fSHerbert Xu } data; 210bf08867fSHerbert Xu 21126b15dadSJamal Hadi Salim u32 seq; 21226b15dadSJamal Hadi Salim u32 pid; 21326b15dadSJamal Hadi Salim u32 event; 21426b15dadSJamal Hadi Salim }; 21526b15dadSJamal Hadi Salim 2161da177e4SLinus Torvalds struct xfrm_type; 2171da177e4SLinus Torvalds struct xfrm_dst; 2181da177e4SLinus Torvalds struct xfrm_policy_afinfo { 2191da177e4SLinus Torvalds unsigned short family; 22073654d61SHerbert Xu struct xfrm_type *type_map[IPPROTO_MAX]; 221b59f45d0SHerbert Xu struct xfrm_mode *mode_map[XFRM_MODE_MAX]; 2221da177e4SLinus Torvalds struct dst_ops *dst_ops; 2231da177e4SLinus Torvalds void (*garbage_collect)(void); 2241da177e4SLinus Torvalds int (*dst_lookup)(struct xfrm_dst **dst, struct flowi *fl); 225a1e59abfSPatrick McHardy int (*get_saddr)(xfrm_address_t *saddr, xfrm_address_t *daddr); 2261da177e4SLinus Torvalds struct dst_entry *(*find_bundle)(struct flowi *fl, struct xfrm_policy *policy); 2271da177e4SLinus Torvalds int (*bundle_create)(struct xfrm_policy *policy, 2281da177e4SLinus Torvalds struct xfrm_state **xfrm, 2291da177e4SLinus Torvalds int nx, 2301da177e4SLinus Torvalds struct flowi *fl, 2311da177e4SLinus Torvalds struct dst_entry **dst_p); 2321da177e4SLinus Torvalds void (*decode_session)(struct sk_buff *skb, 2331da177e4SLinus Torvalds struct flowi *fl); 2341da177e4SLinus Torvalds }; 2351da177e4SLinus Torvalds 2361da177e4SLinus Torvalds extern int xfrm_policy_register_afinfo(struct xfrm_policy_afinfo *afinfo); 2371da177e4SLinus Torvalds extern int xfrm_policy_unregister_afinfo(struct xfrm_policy_afinfo *afinfo); 23826b15dadSJamal Hadi Salim extern void km_policy_notify(struct xfrm_policy *xp, int dir, struct km_event *c); 23926b15dadSJamal Hadi Salim extern void km_state_notify(struct xfrm_state *x, struct km_event *c); 2401da177e4SLinus Torvalds #define XFRM_ACQ_EXPIRES 30 2411da177e4SLinus Torvalds 2421da177e4SLinus Torvalds struct xfrm_tmpl; 243980ebd25SJamal Hadi Salim extern int km_query(struct xfrm_state *x, struct xfrm_tmpl *t, struct xfrm_policy *pol); 24453bc6b4dSJamal Hadi Salim extern void km_state_expired(struct xfrm_state *x, int hard, u32 pid); 24553bc6b4dSJamal Hadi Salim extern int __xfrm_state_delete(struct xfrm_state *x); 24653bc6b4dSJamal Hadi Salim 2471da177e4SLinus Torvalds struct xfrm_state_afinfo { 2481da177e4SLinus Torvalds unsigned short family; 249d094cd83SHerbert Xu int (*init_flags)(struct xfrm_state *x); 2501da177e4SLinus Torvalds void (*init_tempsel)(struct xfrm_state *x, struct flowi *fl, 2511da177e4SLinus Torvalds struct xfrm_tmpl *tmpl, 2521da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr); 25341a49cc3SMasahide NAKAMURA int (*tmpl_sort)(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n); 25441a49cc3SMasahide NAKAMURA int (*state_sort)(struct xfrm_state **dst, struct xfrm_state **src, int n); 2551da177e4SLinus Torvalds }; 2561da177e4SLinus Torvalds 2571da177e4SLinus Torvalds extern int xfrm_state_register_afinfo(struct xfrm_state_afinfo *afinfo); 2581da177e4SLinus Torvalds extern int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo); 2591da177e4SLinus Torvalds 2601da177e4SLinus Torvalds extern void xfrm_state_delete_tunnel(struct xfrm_state *x); 2611da177e4SLinus Torvalds 2621da177e4SLinus Torvalds struct xfrm_type 2631da177e4SLinus Torvalds { 2641da177e4SLinus Torvalds char *description; 2651da177e4SLinus Torvalds struct module *owner; 2661da177e4SLinus Torvalds __u8 proto; 2671b5c2299SMasahide NAKAMURA __u8 flags; 2681b5c2299SMasahide NAKAMURA #define XFRM_TYPE_NON_FRAGMENT 1 2691da177e4SLinus Torvalds 27072cb6962SHerbert Xu int (*init_state)(struct xfrm_state *x); 2711da177e4SLinus Torvalds void (*destructor)(struct xfrm_state *); 272e695633eSHerbert Xu int (*input)(struct xfrm_state *, struct sk_buff *skb); 2731da177e4SLinus Torvalds int (*output)(struct xfrm_state *, struct sk_buff *pskb); 274df0ba92aSMasahide NAKAMURA int (*reject)(struct xfrm_state *, struct sk_buff *, struct flowi *); 275aee5adb4SMasahide NAKAMURA int (*hdr_offset)(struct xfrm_state *, struct sk_buff *, u8 **); 27699505a84SMasahide NAKAMURA xfrm_address_t *(*local_addr)(struct xfrm_state *, xfrm_address_t *); 27799505a84SMasahide NAKAMURA xfrm_address_t *(*remote_addr)(struct xfrm_state *, xfrm_address_t *); 2781da177e4SLinus Torvalds /* Estimate maximal size of result of transformation of a dgram */ 2791da177e4SLinus Torvalds u32 (*get_max_size)(struct xfrm_state *, int size); 2801da177e4SLinus Torvalds }; 2811da177e4SLinus Torvalds 2821da177e4SLinus Torvalds extern int xfrm_register_type(struct xfrm_type *type, unsigned short family); 2831da177e4SLinus Torvalds extern int xfrm_unregister_type(struct xfrm_type *type, unsigned short family); 2841da177e4SLinus Torvalds extern struct xfrm_type *xfrm_get_type(u8 proto, unsigned short family); 2851da177e4SLinus Torvalds extern void xfrm_put_type(struct xfrm_type *type); 2861da177e4SLinus Torvalds 287b59f45d0SHerbert Xu struct xfrm_mode { 288b59f45d0SHerbert Xu int (*input)(struct xfrm_state *x, struct sk_buff *skb); 289eb878e84SJamal Hadi Salim int (*output)(struct xfrm_state *x,struct sk_buff *skb); 290b59f45d0SHerbert Xu 291b59f45d0SHerbert Xu struct module *owner; 292b59f45d0SHerbert Xu unsigned int encap; 293b59f45d0SHerbert Xu }; 294b59f45d0SHerbert Xu 295b59f45d0SHerbert Xu extern int xfrm_register_mode(struct xfrm_mode *mode, int family); 296b59f45d0SHerbert Xu extern int xfrm_unregister_mode(struct xfrm_mode *mode, int family); 297b59f45d0SHerbert Xu extern struct xfrm_mode *xfrm_get_mode(unsigned int encap, int family); 298b59f45d0SHerbert Xu extern void xfrm_put_mode(struct xfrm_mode *mode); 299b59f45d0SHerbert Xu 3001da177e4SLinus Torvalds struct xfrm_tmpl 3011da177e4SLinus Torvalds { 3021da177e4SLinus Torvalds /* id in template is interpreted as: 3031da177e4SLinus Torvalds * daddr - destination of tunnel, may be zero for transport mode. 3041da177e4SLinus Torvalds * spi - zero to acquire spi. Not zero if spi is static, then 3051da177e4SLinus Torvalds * daddr must be fixed too. 3061da177e4SLinus Torvalds * proto - AH/ESP/IPCOMP 3071da177e4SLinus Torvalds */ 3081da177e4SLinus Torvalds struct xfrm_id id; 3091da177e4SLinus Torvalds 3101da177e4SLinus Torvalds /* Source address of tunnel. Ignored, if it is not a tunnel. */ 3111da177e4SLinus Torvalds xfrm_address_t saddr; 3121da177e4SLinus Torvalds 3131da177e4SLinus Torvalds __u32 reqid; 3141da177e4SLinus Torvalds 3157e49e6deSMasahide NAKAMURA /* Mode: transport, tunnel etc. */ 3161da177e4SLinus Torvalds __u8 mode; 3171da177e4SLinus Torvalds 3181da177e4SLinus Torvalds /* Sharing mode: unique, this session only, this user only etc. */ 3191da177e4SLinus Torvalds __u8 share; 3201da177e4SLinus Torvalds 3211da177e4SLinus Torvalds /* May skip this transfomration if no SA is found */ 3221da177e4SLinus Torvalds __u8 optional; 3231da177e4SLinus Torvalds 3241da177e4SLinus Torvalds /* Bit mask of algos allowed for acquisition */ 3251da177e4SLinus Torvalds __u32 aalgos; 3261da177e4SLinus Torvalds __u32 ealgos; 3271da177e4SLinus Torvalds __u32 calgos; 3281da177e4SLinus Torvalds }; 3291da177e4SLinus Torvalds 330622dc828SMasahide NAKAMURA #define XFRM_MAX_DEPTH 6 3311da177e4SLinus Torvalds 3321da177e4SLinus Torvalds struct xfrm_policy 3331da177e4SLinus Torvalds { 3341da177e4SLinus Torvalds struct xfrm_policy *next; 3352518c7c2SDavid S. Miller struct hlist_node bydst; 3362518c7c2SDavid S. Miller struct hlist_node byidx; 3371da177e4SLinus Torvalds 3381da177e4SLinus Torvalds /* This lock only affects elements except for entry. */ 3391da177e4SLinus Torvalds rwlock_t lock; 3401da177e4SLinus Torvalds atomic_t refcnt; 3411da177e4SLinus Torvalds struct timer_list timer; 3421da177e4SLinus Torvalds 3431da177e4SLinus Torvalds u32 priority; 3441da177e4SLinus Torvalds u32 index; 3451da177e4SLinus Torvalds struct xfrm_selector selector; 3461da177e4SLinus Torvalds struct xfrm_lifetime_cfg lft; 3471da177e4SLinus Torvalds struct xfrm_lifetime_cur curlft; 3481da177e4SLinus Torvalds struct dst_entry *bundles; 34946ca5f5dSArnaldo Carvalho de Melo u16 family; 35046ca5f5dSArnaldo Carvalho de Melo u8 type; 35146ca5f5dSArnaldo Carvalho de Melo u8 action; 35246ca5f5dSArnaldo Carvalho de Melo u8 flags; 35346ca5f5dSArnaldo Carvalho de Melo u8 dead; 35446ca5f5dSArnaldo Carvalho de Melo u8 xfrm_nr; 35546ca5f5dSArnaldo Carvalho de Melo /* XXX 1 byte hole, try to pack */ 356df71837dSTrent Jaeger struct xfrm_sec_ctx *security; 3571da177e4SLinus Torvalds struct xfrm_tmpl xfrm_vec[XFRM_MAX_DEPTH]; 3581da177e4SLinus Torvalds }; 3591da177e4SLinus Torvalds 3601da177e4SLinus Torvalds #define XFRM_KM_TIMEOUT 30 361f8cd5488SJamal Hadi Salim /* which seqno */ 362f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_SEQ 1 363f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_OSEQ 2 364f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_SEQ_MASK 3 365f8cd5488SJamal Hadi Salim /* what happened */ 366f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_UPDATE XFRM_AE_CR 367f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_TIMEOUT XFRM_AE_CE 368f8cd5488SJamal Hadi Salim 369f8cd5488SJamal Hadi Salim /* default aevent timeout in units of 100ms */ 370f8cd5488SJamal Hadi Salim #define XFRM_AE_ETIME 10 371f8cd5488SJamal Hadi Salim /* Async Event timer multiplier */ 372f8cd5488SJamal Hadi Salim #define XFRM_AE_ETH_M 10 373f8cd5488SJamal Hadi Salim /* default seq threshold size */ 374f8cd5488SJamal Hadi Salim #define XFRM_AE_SEQT_SIZE 2 3751da177e4SLinus Torvalds 3761da177e4SLinus Torvalds struct xfrm_mgr 3771da177e4SLinus Torvalds { 3781da177e4SLinus Torvalds struct list_head list; 3791da177e4SLinus Torvalds char *id; 38026b15dadSJamal Hadi Salim int (*notify)(struct xfrm_state *x, struct km_event *c); 3811da177e4SLinus Torvalds int (*acquire)(struct xfrm_state *x, struct xfrm_tmpl *, struct xfrm_policy *xp, int dir); 382cb969f07SVenkat Yekkirala struct xfrm_policy *(*compile_policy)(struct sock *sk, int opt, u8 *data, int len, int *dir); 3835d36b180SAl Viro int (*new_mapping)(struct xfrm_state *x, xfrm_address_t *ipaddr, __be16 sport); 38426b15dadSJamal Hadi Salim int (*notify_policy)(struct xfrm_policy *x, int dir, struct km_event *c); 38597a64b45SMasahide NAKAMURA int (*report)(u8 proto, struct xfrm_selector *sel, xfrm_address_t *addr); 3861da177e4SLinus Torvalds }; 3871da177e4SLinus Torvalds 3881da177e4SLinus Torvalds extern int xfrm_register_km(struct xfrm_mgr *km); 3891da177e4SLinus Torvalds extern int xfrm_unregister_km(struct xfrm_mgr *km); 3901da177e4SLinus Torvalds 3912518c7c2SDavid S. Miller extern unsigned int xfrm_policy_count[XFRM_POLICY_MAX*2]; 3921da177e4SLinus Torvalds 3931da177e4SLinus Torvalds static inline void xfrm_pol_hold(struct xfrm_policy *policy) 3941da177e4SLinus Torvalds { 3951da177e4SLinus Torvalds if (likely(policy != NULL)) 3961da177e4SLinus Torvalds atomic_inc(&policy->refcnt); 3971da177e4SLinus Torvalds } 3981da177e4SLinus Torvalds 3991da177e4SLinus Torvalds extern void __xfrm_policy_destroy(struct xfrm_policy *policy); 4001da177e4SLinus Torvalds 4011da177e4SLinus Torvalds static inline void xfrm_pol_put(struct xfrm_policy *policy) 4021da177e4SLinus Torvalds { 4031da177e4SLinus Torvalds if (atomic_dec_and_test(&policy->refcnt)) 4041da177e4SLinus Torvalds __xfrm_policy_destroy(policy); 4051da177e4SLinus Torvalds } 4061da177e4SLinus Torvalds 4074e81bb83SMasahide NAKAMURA #ifdef CONFIG_XFRM_SUB_POLICY 4084e81bb83SMasahide NAKAMURA static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols) 4094e81bb83SMasahide NAKAMURA { 4104e81bb83SMasahide NAKAMURA int i; 4114e81bb83SMasahide NAKAMURA for (i = npols - 1; i >= 0; --i) 4124e81bb83SMasahide NAKAMURA xfrm_pol_put(pols[i]); 4134e81bb83SMasahide NAKAMURA } 4144e81bb83SMasahide NAKAMURA #else 4154e81bb83SMasahide NAKAMURA static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols) 4164e81bb83SMasahide NAKAMURA { 4174e81bb83SMasahide NAKAMURA xfrm_pol_put(pols[0]); 4184e81bb83SMasahide NAKAMURA } 4194e81bb83SMasahide NAKAMURA #endif 4204e81bb83SMasahide NAKAMURA 4211da177e4SLinus Torvalds extern void __xfrm_state_destroy(struct xfrm_state *); 4221da177e4SLinus Torvalds 42321380b81SHerbert Xu static inline void __xfrm_state_put(struct xfrm_state *x) 42421380b81SHerbert Xu { 42521380b81SHerbert Xu atomic_dec(&x->refcnt); 42621380b81SHerbert Xu } 42721380b81SHerbert Xu 4281da177e4SLinus Torvalds static inline void xfrm_state_put(struct xfrm_state *x) 4291da177e4SLinus Torvalds { 4301da177e4SLinus Torvalds if (atomic_dec_and_test(&x->refcnt)) 4311da177e4SLinus Torvalds __xfrm_state_destroy(x); 4321da177e4SLinus Torvalds } 4331da177e4SLinus Torvalds 4341da177e4SLinus Torvalds static inline void xfrm_state_hold(struct xfrm_state *x) 4351da177e4SLinus Torvalds { 4361da177e4SLinus Torvalds atomic_inc(&x->refcnt); 4371da177e4SLinus Torvalds } 4381da177e4SLinus Torvalds 4391da177e4SLinus Torvalds static __inline__ int addr_match(void *token1, void *token2, int prefixlen) 4401da177e4SLinus Torvalds { 4415f19343fSAl Viro __be32 *a1 = token1; 4425f19343fSAl Viro __be32 *a2 = token2; 4431da177e4SLinus Torvalds int pdw; 4441da177e4SLinus Torvalds int pbi; 4451da177e4SLinus Torvalds 4461da177e4SLinus Torvalds pdw = prefixlen >> 5; /* num of whole __u32 in prefix */ 4471da177e4SLinus Torvalds pbi = prefixlen & 0x1f; /* num of bits in incomplete u32 in prefix */ 4481da177e4SLinus Torvalds 4491da177e4SLinus Torvalds if (pdw) 4501da177e4SLinus Torvalds if (memcmp(a1, a2, pdw << 2)) 4511da177e4SLinus Torvalds return 0; 4521da177e4SLinus Torvalds 4531da177e4SLinus Torvalds if (pbi) { 4545f19343fSAl Viro __be32 mask; 4551da177e4SLinus Torvalds 4561da177e4SLinus Torvalds mask = htonl((0xffffffff) << (32 - pbi)); 4571da177e4SLinus Torvalds 4581da177e4SLinus Torvalds if ((a1[pdw] ^ a2[pdw]) & mask) 4591da177e4SLinus Torvalds return 0; 4601da177e4SLinus Torvalds } 4611da177e4SLinus Torvalds 4621da177e4SLinus Torvalds return 1; 4631da177e4SLinus Torvalds } 4641da177e4SLinus Torvalds 4651da177e4SLinus Torvalds static __inline__ 466f9d07e41SAl Viro __be16 xfrm_flowi_sport(struct flowi *fl) 4671da177e4SLinus Torvalds { 468f9d07e41SAl Viro __be16 port; 4691da177e4SLinus Torvalds switch(fl->proto) { 4701da177e4SLinus Torvalds case IPPROTO_TCP: 4711da177e4SLinus Torvalds case IPPROTO_UDP: 472ba4e58ecSGerrit Renker case IPPROTO_UDPLITE: 4731da177e4SLinus Torvalds case IPPROTO_SCTP: 4741da177e4SLinus Torvalds port = fl->fl_ip_sport; 4751da177e4SLinus Torvalds break; 4761da177e4SLinus Torvalds case IPPROTO_ICMP: 4771da177e4SLinus Torvalds case IPPROTO_ICMPV6: 4781da177e4SLinus Torvalds port = htons(fl->fl_icmp_type); 4791da177e4SLinus Torvalds break; 4802ce4272aSMasahide NAKAMURA #ifdef CONFIG_IPV6_MIP6 4812ce4272aSMasahide NAKAMURA case IPPROTO_MH: 4822ce4272aSMasahide NAKAMURA port = htons(fl->fl_mh_type); 4832ce4272aSMasahide NAKAMURA break; 4842ce4272aSMasahide NAKAMURA #endif 4851da177e4SLinus Torvalds default: 4861da177e4SLinus Torvalds port = 0; /*XXX*/ 4871da177e4SLinus Torvalds } 4881da177e4SLinus Torvalds return port; 4891da177e4SLinus Torvalds } 4901da177e4SLinus Torvalds 4911da177e4SLinus Torvalds static __inline__ 492f9d07e41SAl Viro __be16 xfrm_flowi_dport(struct flowi *fl) 4931da177e4SLinus Torvalds { 494f9d07e41SAl Viro __be16 port; 4951da177e4SLinus Torvalds switch(fl->proto) { 4961da177e4SLinus Torvalds case IPPROTO_TCP: 4971da177e4SLinus Torvalds case IPPROTO_UDP: 498ba4e58ecSGerrit Renker case IPPROTO_UDPLITE: 4991da177e4SLinus Torvalds case IPPROTO_SCTP: 5001da177e4SLinus Torvalds port = fl->fl_ip_dport; 5011da177e4SLinus Torvalds break; 5021da177e4SLinus Torvalds case IPPROTO_ICMP: 5031da177e4SLinus Torvalds case IPPROTO_ICMPV6: 5041da177e4SLinus Torvalds port = htons(fl->fl_icmp_code); 5051da177e4SLinus Torvalds break; 5061da177e4SLinus Torvalds default: 5071da177e4SLinus Torvalds port = 0; /*XXX*/ 5081da177e4SLinus Torvalds } 5091da177e4SLinus Torvalds return port; 5101da177e4SLinus Torvalds } 5111da177e4SLinus Torvalds 51277681021SAndrew Morton extern int xfrm_selector_match(struct xfrm_selector *sel, struct flowi *fl, 51377681021SAndrew Morton unsigned short family); 5141da177e4SLinus Torvalds 515df71837dSTrent Jaeger #ifdef CONFIG_SECURITY_NETWORK_XFRM 516df71837dSTrent Jaeger /* If neither has a context --> match 517df71837dSTrent Jaeger * Otherwise, both must have a context and the sids, doi, alg must match 518df71837dSTrent Jaeger */ 519df71837dSTrent Jaeger static inline int xfrm_sec_ctx_match(struct xfrm_sec_ctx *s1, struct xfrm_sec_ctx *s2) 520df71837dSTrent Jaeger { 521df71837dSTrent Jaeger return ((!s1 && !s2) || 522df71837dSTrent Jaeger (s1 && s2 && 523df71837dSTrent Jaeger (s1->ctx_sid == s2->ctx_sid) && 524df71837dSTrent Jaeger (s1->ctx_doi == s2->ctx_doi) && 525df71837dSTrent Jaeger (s1->ctx_alg == s2->ctx_alg))); 526df71837dSTrent Jaeger } 527df71837dSTrent Jaeger #else 528df71837dSTrent Jaeger static inline int xfrm_sec_ctx_match(struct xfrm_sec_ctx *s1, struct xfrm_sec_ctx *s2) 529df71837dSTrent Jaeger { 530df71837dSTrent Jaeger return 1; 531df71837dSTrent Jaeger } 532df71837dSTrent Jaeger #endif 533df71837dSTrent Jaeger 5341da177e4SLinus Torvalds /* A struct encoding bundle of transformations to apply to some set of flow. 5351da177e4SLinus Torvalds * 5361da177e4SLinus Torvalds * dst->child points to the next element of bundle. 5371da177e4SLinus Torvalds * dst->xfrm points to an instanse of transformer. 5381da177e4SLinus Torvalds * 5391da177e4SLinus Torvalds * Due to unfortunate limitations of current routing cache, which we 5401da177e4SLinus Torvalds * have no time to fix, it mirrors struct rtable and bound to the same 5411da177e4SLinus Torvalds * routing key, including saddr,daddr. However, we can have many of 5421da177e4SLinus Torvalds * bundles differing by session id. All the bundles grow from a parent 5431da177e4SLinus Torvalds * policy rule. 5441da177e4SLinus Torvalds */ 5451da177e4SLinus Torvalds struct xfrm_dst 5461da177e4SLinus Torvalds { 5471da177e4SLinus Torvalds union { 5481da177e4SLinus Torvalds struct xfrm_dst *next; 5491da177e4SLinus Torvalds struct dst_entry dst; 5501da177e4SLinus Torvalds struct rtable rt; 5511da177e4SLinus Torvalds struct rt6_info rt6; 5521da177e4SLinus Torvalds } u; 5531da177e4SLinus Torvalds struct dst_entry *route; 5549d4a706dSDavid S. Miller u32 genid; 5551da177e4SLinus Torvalds u32 route_mtu_cached; 5561da177e4SLinus Torvalds u32 child_mtu_cached; 55792d63decSHideaki YOSHIFUJI u32 route_cookie; 55892d63decSHideaki YOSHIFUJI u32 path_cookie; 5591da177e4SLinus Torvalds }; 5601da177e4SLinus Torvalds 561aabc9761SHerbert Xu static inline void xfrm_dst_destroy(struct xfrm_dst *xdst) 562aabc9761SHerbert Xu { 563aabc9761SHerbert Xu dst_release(xdst->route); 564aabc9761SHerbert Xu if (likely(xdst->u.dst.xfrm)) 565aabc9761SHerbert Xu xfrm_state_put(xdst->u.dst.xfrm); 566aabc9761SHerbert Xu } 567aabc9761SHerbert Xu 568aabc9761SHerbert Xu extern void xfrm_dst_ifdown(struct dst_entry *dst, struct net_device *dev); 569aabc9761SHerbert Xu 5701da177e4SLinus Torvalds struct sec_path 5711da177e4SLinus Torvalds { 5721da177e4SLinus Torvalds atomic_t refcnt; 5731da177e4SLinus Torvalds int len; 574dbe5b4aaSHerbert Xu struct xfrm_state *xvec[XFRM_MAX_DEPTH]; 5751da177e4SLinus Torvalds }; 5761da177e4SLinus Torvalds 5771da177e4SLinus Torvalds static inline struct sec_path * 5781da177e4SLinus Torvalds secpath_get(struct sec_path *sp) 5791da177e4SLinus Torvalds { 5801da177e4SLinus Torvalds if (sp) 5811da177e4SLinus Torvalds atomic_inc(&sp->refcnt); 5821da177e4SLinus Torvalds return sp; 5831da177e4SLinus Torvalds } 5841da177e4SLinus Torvalds 5851da177e4SLinus Torvalds extern void __secpath_destroy(struct sec_path *sp); 5861da177e4SLinus Torvalds 5871da177e4SLinus Torvalds static inline void 5881da177e4SLinus Torvalds secpath_put(struct sec_path *sp) 5891da177e4SLinus Torvalds { 5901da177e4SLinus Torvalds if (sp && atomic_dec_and_test(&sp->refcnt)) 5911da177e4SLinus Torvalds __secpath_destroy(sp); 5921da177e4SLinus Torvalds } 5931da177e4SLinus Torvalds 5941da177e4SLinus Torvalds extern struct sec_path *secpath_dup(struct sec_path *src); 5951da177e4SLinus Torvalds 5961da177e4SLinus Torvalds static inline void 5971da177e4SLinus Torvalds secpath_reset(struct sk_buff *skb) 5981da177e4SLinus Torvalds { 5991da177e4SLinus Torvalds #ifdef CONFIG_XFRM 6001da177e4SLinus Torvalds secpath_put(skb->sp); 6011da177e4SLinus Torvalds skb->sp = NULL; 6021da177e4SLinus Torvalds #endif 6031da177e4SLinus Torvalds } 6041da177e4SLinus Torvalds 6051da177e4SLinus Torvalds static inline int 606a1e59abfSPatrick McHardy xfrm_addr_any(xfrm_address_t *addr, unsigned short family) 607a1e59abfSPatrick McHardy { 608a1e59abfSPatrick McHardy switch (family) { 609a1e59abfSPatrick McHardy case AF_INET: 610a1e59abfSPatrick McHardy return addr->a4 == 0; 611a1e59abfSPatrick McHardy case AF_INET6: 612a1e59abfSPatrick McHardy return ipv6_addr_any((struct in6_addr *)&addr->a6); 613a1e59abfSPatrick McHardy } 614a1e59abfSPatrick McHardy return 0; 615a1e59abfSPatrick McHardy } 616a1e59abfSPatrick McHardy 617a1e59abfSPatrick McHardy static inline int 6181da177e4SLinus Torvalds __xfrm4_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x) 6191da177e4SLinus Torvalds { 6201da177e4SLinus Torvalds return (tmpl->saddr.a4 && 6211da177e4SLinus Torvalds tmpl->saddr.a4 != x->props.saddr.a4); 6221da177e4SLinus Torvalds } 6231da177e4SLinus Torvalds 6241da177e4SLinus Torvalds static inline int 6251da177e4SLinus Torvalds __xfrm6_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x) 6261da177e4SLinus Torvalds { 6271da177e4SLinus Torvalds return (!ipv6_addr_any((struct in6_addr*)&tmpl->saddr) && 6281da177e4SLinus Torvalds ipv6_addr_cmp((struct in6_addr *)&tmpl->saddr, (struct in6_addr*)&x->props.saddr)); 6291da177e4SLinus Torvalds } 6301da177e4SLinus Torvalds 6311da177e4SLinus Torvalds static inline int 6321da177e4SLinus Torvalds xfrm_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x, unsigned short family) 6331da177e4SLinus Torvalds { 6341da177e4SLinus Torvalds switch (family) { 6351da177e4SLinus Torvalds case AF_INET: 6361da177e4SLinus Torvalds return __xfrm4_state_addr_cmp(tmpl, x); 6371da177e4SLinus Torvalds case AF_INET6: 6381da177e4SLinus Torvalds return __xfrm6_state_addr_cmp(tmpl, x); 6391da177e4SLinus Torvalds } 6401da177e4SLinus Torvalds return !0; 6411da177e4SLinus Torvalds } 6421da177e4SLinus Torvalds 6431da177e4SLinus Torvalds #ifdef CONFIG_XFRM 6441da177e4SLinus Torvalds 6451da177e4SLinus Torvalds extern int __xfrm_policy_check(struct sock *, int dir, struct sk_buff *skb, unsigned short family); 6461da177e4SLinus Torvalds 6471da177e4SLinus Torvalds static inline int xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) 6481da177e4SLinus Torvalds { 6491da177e4SLinus Torvalds if (sk && sk->sk_policy[XFRM_POLICY_IN]) 6501da177e4SLinus Torvalds return __xfrm_policy_check(sk, dir, skb, family); 6511da177e4SLinus Torvalds 6522518c7c2SDavid S. Miller return (!xfrm_policy_count[dir] && !skb->sp) || 6531da177e4SLinus Torvalds (skb->dst->flags & DST_NOPOLICY) || 6541da177e4SLinus Torvalds __xfrm_policy_check(sk, dir, skb, family); 6551da177e4SLinus Torvalds } 6561da177e4SLinus Torvalds 6571da177e4SLinus Torvalds static inline int xfrm4_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 6581da177e4SLinus Torvalds { 6591da177e4SLinus Torvalds return xfrm_policy_check(sk, dir, skb, AF_INET); 6601da177e4SLinus Torvalds } 6611da177e4SLinus Torvalds 6621da177e4SLinus Torvalds static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 6631da177e4SLinus Torvalds { 6641da177e4SLinus Torvalds return xfrm_policy_check(sk, dir, skb, AF_INET6); 6651da177e4SLinus Torvalds } 6661da177e4SLinus Torvalds 6673e3850e9SPatrick McHardy extern int xfrm_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family); 6681da177e4SLinus Torvalds extern int __xfrm_route_forward(struct sk_buff *skb, unsigned short family); 6691da177e4SLinus Torvalds 6701da177e4SLinus Torvalds static inline int xfrm_route_forward(struct sk_buff *skb, unsigned short family) 6711da177e4SLinus Torvalds { 6722518c7c2SDavid S. Miller return !xfrm_policy_count[XFRM_POLICY_OUT] || 6731da177e4SLinus Torvalds (skb->dst->flags & DST_NOXFRM) || 6741da177e4SLinus Torvalds __xfrm_route_forward(skb, family); 6751da177e4SLinus Torvalds } 6761da177e4SLinus Torvalds 6771da177e4SLinus Torvalds static inline int xfrm4_route_forward(struct sk_buff *skb) 6781da177e4SLinus Torvalds { 6791da177e4SLinus Torvalds return xfrm_route_forward(skb, AF_INET); 6801da177e4SLinus Torvalds } 6811da177e4SLinus Torvalds 6821da177e4SLinus Torvalds static inline int xfrm6_route_forward(struct sk_buff *skb) 6831da177e4SLinus Torvalds { 6841da177e4SLinus Torvalds return xfrm_route_forward(skb, AF_INET6); 6851da177e4SLinus Torvalds } 6861da177e4SLinus Torvalds 6871da177e4SLinus Torvalds extern int __xfrm_sk_clone_policy(struct sock *sk); 6881da177e4SLinus Torvalds 6891da177e4SLinus Torvalds static inline int xfrm_sk_clone_policy(struct sock *sk) 6901da177e4SLinus Torvalds { 6911da177e4SLinus Torvalds if (unlikely(sk->sk_policy[0] || sk->sk_policy[1])) 6921da177e4SLinus Torvalds return __xfrm_sk_clone_policy(sk); 6931da177e4SLinus Torvalds return 0; 6941da177e4SLinus Torvalds } 6951da177e4SLinus Torvalds 6964666faabSHerbert Xu extern int xfrm_policy_delete(struct xfrm_policy *pol, int dir); 6971da177e4SLinus Torvalds 6981da177e4SLinus Torvalds static inline void xfrm_sk_free_policy(struct sock *sk) 6991da177e4SLinus Torvalds { 7001da177e4SLinus Torvalds if (unlikely(sk->sk_policy[0] != NULL)) { 7011da177e4SLinus Torvalds xfrm_policy_delete(sk->sk_policy[0], XFRM_POLICY_MAX); 7021da177e4SLinus Torvalds sk->sk_policy[0] = NULL; 7031da177e4SLinus Torvalds } 7041da177e4SLinus Torvalds if (unlikely(sk->sk_policy[1] != NULL)) { 7051da177e4SLinus Torvalds xfrm_policy_delete(sk->sk_policy[1], XFRM_POLICY_MAX+1); 7061da177e4SLinus Torvalds sk->sk_policy[1] = NULL; 7071da177e4SLinus Torvalds } 7081da177e4SLinus Torvalds } 7091da177e4SLinus Torvalds 7101da177e4SLinus Torvalds #else 7111da177e4SLinus Torvalds 7121da177e4SLinus Torvalds static inline void xfrm_sk_free_policy(struct sock *sk) {} 7131da177e4SLinus Torvalds static inline int xfrm_sk_clone_policy(struct sock *sk) { return 0; } 7141da177e4SLinus Torvalds static inline int xfrm6_route_forward(struct sk_buff *skb) { return 1; } 7151da177e4SLinus Torvalds static inline int xfrm4_route_forward(struct sk_buff *skb) { return 1; } 7161da177e4SLinus Torvalds static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 7171da177e4SLinus Torvalds { 7181da177e4SLinus Torvalds return 1; 7191da177e4SLinus Torvalds } 7201da177e4SLinus Torvalds static inline int xfrm4_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 7211da177e4SLinus Torvalds { 7221da177e4SLinus Torvalds return 1; 7231da177e4SLinus Torvalds } 7241da177e4SLinus Torvalds static inline int xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) 7251da177e4SLinus Torvalds { 7261da177e4SLinus Torvalds return 1; 7271da177e4SLinus Torvalds } 7281da177e4SLinus Torvalds #endif 7291da177e4SLinus Torvalds 7301da177e4SLinus Torvalds static __inline__ 7311da177e4SLinus Torvalds xfrm_address_t *xfrm_flowi_daddr(struct flowi *fl, unsigned short family) 7321da177e4SLinus Torvalds { 7331da177e4SLinus Torvalds switch (family){ 7341da177e4SLinus Torvalds case AF_INET: 7351da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl4_dst; 7361da177e4SLinus Torvalds case AF_INET6: 7371da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl6_dst; 7381da177e4SLinus Torvalds } 7391da177e4SLinus Torvalds return NULL; 7401da177e4SLinus Torvalds } 7411da177e4SLinus Torvalds 7421da177e4SLinus Torvalds static __inline__ 7431da177e4SLinus Torvalds xfrm_address_t *xfrm_flowi_saddr(struct flowi *fl, unsigned short family) 7441da177e4SLinus Torvalds { 7451da177e4SLinus Torvalds switch (family){ 7461da177e4SLinus Torvalds case AF_INET: 7471da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl4_src; 7481da177e4SLinus Torvalds case AF_INET6: 7491da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl6_src; 7501da177e4SLinus Torvalds } 7511da177e4SLinus Torvalds return NULL; 7521da177e4SLinus Torvalds } 7531da177e4SLinus Torvalds 7541da177e4SLinus Torvalds static __inline__ int 7551da177e4SLinus Torvalds __xfrm4_state_addr_check(struct xfrm_state *x, 7561da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr) 7571da177e4SLinus Torvalds { 7581da177e4SLinus Torvalds if (daddr->a4 == x->id.daddr.a4 && 7591da177e4SLinus Torvalds (saddr->a4 == x->props.saddr.a4 || !saddr->a4 || !x->props.saddr.a4)) 7601da177e4SLinus Torvalds return 1; 7611da177e4SLinus Torvalds return 0; 7621da177e4SLinus Torvalds } 7631da177e4SLinus Torvalds 7641da177e4SLinus Torvalds static __inline__ int 7651da177e4SLinus Torvalds __xfrm6_state_addr_check(struct xfrm_state *x, 7661da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr) 7671da177e4SLinus Torvalds { 7681da177e4SLinus Torvalds if (!ipv6_addr_cmp((struct in6_addr *)daddr, (struct in6_addr *)&x->id.daddr) && 7691da177e4SLinus Torvalds (!ipv6_addr_cmp((struct in6_addr *)saddr, (struct in6_addr *)&x->props.saddr)|| 7701da177e4SLinus Torvalds ipv6_addr_any((struct in6_addr *)saddr) || 7711da177e4SLinus Torvalds ipv6_addr_any((struct in6_addr *)&x->props.saddr))) 7721da177e4SLinus Torvalds return 1; 7731da177e4SLinus Torvalds return 0; 7741da177e4SLinus Torvalds } 7751da177e4SLinus Torvalds 7761da177e4SLinus Torvalds static __inline__ int 7771da177e4SLinus Torvalds xfrm_state_addr_check(struct xfrm_state *x, 7781da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr, 7791da177e4SLinus Torvalds unsigned short family) 7801da177e4SLinus Torvalds { 7811da177e4SLinus Torvalds switch (family) { 7821da177e4SLinus Torvalds case AF_INET: 7831da177e4SLinus Torvalds return __xfrm4_state_addr_check(x, daddr, saddr); 7841da177e4SLinus Torvalds case AF_INET6: 7851da177e4SLinus Torvalds return __xfrm6_state_addr_check(x, daddr, saddr); 7861da177e4SLinus Torvalds } 7871da177e4SLinus Torvalds return 0; 7881da177e4SLinus Torvalds } 7891da177e4SLinus Torvalds 790e53820deSMasahide NAKAMURA static __inline__ int 791e53820deSMasahide NAKAMURA xfrm_state_addr_flow_check(struct xfrm_state *x, struct flowi *fl, 792e53820deSMasahide NAKAMURA unsigned short family) 793e53820deSMasahide NAKAMURA { 794e53820deSMasahide NAKAMURA switch (family) { 795e53820deSMasahide NAKAMURA case AF_INET: 796e53820deSMasahide NAKAMURA return __xfrm4_state_addr_check(x, 797e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl4_dst, 798e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl4_src); 799e53820deSMasahide NAKAMURA case AF_INET6: 800e53820deSMasahide NAKAMURA return __xfrm6_state_addr_check(x, 801e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl6_dst, 802e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl6_src); 803e53820deSMasahide NAKAMURA } 804e53820deSMasahide NAKAMURA return 0; 805e53820deSMasahide NAKAMURA } 806e53820deSMasahide NAKAMURA 8071da177e4SLinus Torvalds static inline int xfrm_state_kern(struct xfrm_state *x) 8081da177e4SLinus Torvalds { 8091da177e4SLinus Torvalds return atomic_read(&x->tunnel_users); 8101da177e4SLinus Torvalds } 8111da177e4SLinus Torvalds 8125794708fSMasahide NAKAMURA static inline int xfrm_id_proto_match(u8 proto, u8 userproto) 8135794708fSMasahide NAKAMURA { 814dc00a525SMasahide NAKAMURA return (!userproto || proto == userproto || 815dc00a525SMasahide NAKAMURA (userproto == IPSEC_PROTO_ANY && (proto == IPPROTO_AH || 816dc00a525SMasahide NAKAMURA proto == IPPROTO_ESP || 817dc00a525SMasahide NAKAMURA proto == IPPROTO_COMP))); 8185794708fSMasahide NAKAMURA } 8195794708fSMasahide NAKAMURA 8201da177e4SLinus Torvalds /* 8211da177e4SLinus Torvalds * xfrm algorithm information 8221da177e4SLinus Torvalds */ 8231da177e4SLinus Torvalds struct xfrm_algo_auth_info { 8241da177e4SLinus Torvalds u16 icv_truncbits; 8251da177e4SLinus Torvalds u16 icv_fullbits; 8261da177e4SLinus Torvalds }; 8271da177e4SLinus Torvalds 8281da177e4SLinus Torvalds struct xfrm_algo_encr_info { 8291da177e4SLinus Torvalds u16 blockbits; 8301da177e4SLinus Torvalds u16 defkeybits; 8311da177e4SLinus Torvalds }; 8321da177e4SLinus Torvalds 8331da177e4SLinus Torvalds struct xfrm_algo_comp_info { 8341da177e4SLinus Torvalds u16 threshold; 8351da177e4SLinus Torvalds }; 8361da177e4SLinus Torvalds 8371da177e4SLinus Torvalds struct xfrm_algo_desc { 8381da177e4SLinus Torvalds char *name; 83904ff1260SHerbert Xu char *compat; 8401da177e4SLinus Torvalds u8 available:1; 8411da177e4SLinus Torvalds union { 8421da177e4SLinus Torvalds struct xfrm_algo_auth_info auth; 8431da177e4SLinus Torvalds struct xfrm_algo_encr_info encr; 8441da177e4SLinus Torvalds struct xfrm_algo_comp_info comp; 8451da177e4SLinus Torvalds } uinfo; 8461da177e4SLinus Torvalds struct sadb_alg desc; 8471da177e4SLinus Torvalds }; 8481da177e4SLinus Torvalds 8491da177e4SLinus Torvalds /* XFRM tunnel handlers. */ 8501da177e4SLinus Torvalds struct xfrm_tunnel { 8511da177e4SLinus Torvalds int (*handler)(struct sk_buff *skb); 852d2acc347SHerbert Xu int (*err_handler)(struct sk_buff *skb, __u32 info); 853d2acc347SHerbert Xu 854d2acc347SHerbert Xu struct xfrm_tunnel *next; 855d2acc347SHerbert Xu int priority; 8561da177e4SLinus Torvalds }; 8571da177e4SLinus Torvalds 8581da177e4SLinus Torvalds struct xfrm6_tunnel { 859d2acc347SHerbert Xu int (*handler)(struct sk_buff *skb); 860d2acc347SHerbert Xu int (*err_handler)(struct sk_buff *skb, struct inet6_skb_parm *opt, 86104ce6909SAl Viro int type, int code, int offset, __be32 info); 862d2acc347SHerbert Xu struct xfrm6_tunnel *next; 863d2acc347SHerbert Xu int priority; 8641da177e4SLinus Torvalds }; 8651da177e4SLinus Torvalds 8661da177e4SLinus Torvalds extern void xfrm_init(void); 8671da177e4SLinus Torvalds extern void xfrm4_init(void); 8681da177e4SLinus Torvalds extern void xfrm6_init(void); 8691da177e4SLinus Torvalds extern void xfrm6_fini(void); 8701da177e4SLinus Torvalds extern void xfrm_state_init(void); 8711da177e4SLinus Torvalds extern void xfrm4_state_init(void); 8721da177e4SLinus Torvalds extern void xfrm6_state_init(void); 8731da177e4SLinus Torvalds extern void xfrm6_state_fini(void); 8741da177e4SLinus Torvalds 8751da177e4SLinus Torvalds extern int xfrm_state_walk(u8 proto, int (*func)(struct xfrm_state *, int, void*), void *); 8761da177e4SLinus Torvalds extern struct xfrm_state *xfrm_state_alloc(void); 8771da177e4SLinus Torvalds extern struct xfrm_state *xfrm_state_find(xfrm_address_t *daddr, xfrm_address_t *saddr, 8781da177e4SLinus Torvalds struct flowi *fl, struct xfrm_tmpl *tmpl, 8791da177e4SLinus Torvalds struct xfrm_policy *pol, int *err, 8801da177e4SLinus Torvalds unsigned short family); 8811da177e4SLinus Torvalds extern int xfrm_state_check_expire(struct xfrm_state *x); 8821da177e4SLinus Torvalds extern void xfrm_state_insert(struct xfrm_state *x); 8831da177e4SLinus Torvalds extern int xfrm_state_add(struct xfrm_state *x); 8841da177e4SLinus Torvalds extern int xfrm_state_update(struct xfrm_state *x); 885a94cfd19SAl Viro extern struct xfrm_state *xfrm_state_lookup(xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family); 886eb2971b6SMasahide NAKAMURA extern struct xfrm_state *xfrm_state_lookup_byaddr(xfrm_address_t *daddr, xfrm_address_t *saddr, u8 proto, unsigned short family); 88741a49cc3SMasahide NAKAMURA #ifdef CONFIG_XFRM_SUB_POLICY 88841a49cc3SMasahide NAKAMURA extern int xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, 88941a49cc3SMasahide NAKAMURA int n, unsigned short family); 89041a49cc3SMasahide NAKAMURA extern int xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, 89141a49cc3SMasahide NAKAMURA int n, unsigned short family); 89241a49cc3SMasahide NAKAMURA #else 89341a49cc3SMasahide NAKAMURA static inline int xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, 89441a49cc3SMasahide NAKAMURA int n, unsigned short family) 89541a49cc3SMasahide NAKAMURA { 89641a49cc3SMasahide NAKAMURA return -ENOSYS; 89741a49cc3SMasahide NAKAMURA } 89841a49cc3SMasahide NAKAMURA 89941a49cc3SMasahide NAKAMURA static inline int xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, 90041a49cc3SMasahide NAKAMURA int n, unsigned short family) 90141a49cc3SMasahide NAKAMURA { 90241a49cc3SMasahide NAKAMURA return -ENOSYS; 90341a49cc3SMasahide NAKAMURA } 90441a49cc3SMasahide NAKAMURA #endif 9051da177e4SLinus Torvalds extern struct xfrm_state *xfrm_find_acq_byseq(u32 seq); 90626b15dadSJamal Hadi Salim extern int xfrm_state_delete(struct xfrm_state *x); 9071da177e4SLinus Torvalds extern void xfrm_state_flush(u8 proto); 908a252cc23SAl Viro extern int xfrm_replay_check(struct xfrm_state *x, __be32 seq); 90961f4627bSAl Viro extern void xfrm_replay_advance(struct xfrm_state *x, __be32 seq); 910f8cd5488SJamal Hadi Salim extern void xfrm_replay_notify(struct xfrm_state *x, int event); 9111da177e4SLinus Torvalds extern int xfrm_state_check(struct xfrm_state *x, struct sk_buff *skb); 9121da177e4SLinus Torvalds extern int xfrm_state_mtu(struct xfrm_state *x, int mtu); 91372cb6962SHerbert Xu extern int xfrm_init_state(struct xfrm_state *x); 9141da177e4SLinus Torvalds extern int xfrm4_rcv(struct sk_buff *skb); 9151da177e4SLinus Torvalds extern int xfrm4_output(struct sk_buff *skb); 9161da177e4SLinus Torvalds extern int xfrm4_tunnel_register(struct xfrm_tunnel *handler); 9171da177e4SLinus Torvalds extern int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler); 918a252cc23SAl Viro extern int xfrm6_rcv_spi(struct sk_buff *skb, __be32 spi); 919951dbc8aSPatrick McHardy extern int xfrm6_rcv(struct sk_buff **pskb); 920fbd9a5b4SMasahide NAKAMURA extern int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr, 921fbd9a5b4SMasahide NAKAMURA xfrm_address_t *saddr, u8 proto); 9221da177e4SLinus Torvalds extern int xfrm6_tunnel_register(struct xfrm6_tunnel *handler); 9231da177e4SLinus Torvalds extern int xfrm6_tunnel_deregister(struct xfrm6_tunnel *handler); 9248c689a6eSAl Viro extern __be32 xfrm6_tunnel_alloc_spi(xfrm_address_t *saddr); 9251da177e4SLinus Torvalds extern void xfrm6_tunnel_free_spi(xfrm_address_t *saddr); 9268c689a6eSAl Viro extern __be32 xfrm6_tunnel_spi_lookup(xfrm_address_t *saddr); 9271da177e4SLinus Torvalds extern int xfrm6_output(struct sk_buff *skb); 928aee5adb4SMasahide NAKAMURA extern int xfrm6_find_1stfragopt(struct xfrm_state *x, struct sk_buff *skb, 929aee5adb4SMasahide NAKAMURA u8 **prevhdr); 9301da177e4SLinus Torvalds 9311da177e4SLinus Torvalds #ifdef CONFIG_XFRM 9321da177e4SLinus Torvalds extern int xfrm4_rcv_encap(struct sk_buff *skb, __u16 encap_type); 9331da177e4SLinus Torvalds extern int xfrm_user_policy(struct sock *sk, int optname, u8 __user *optval, int optlen); 9341da177e4SLinus Torvalds extern int xfrm_dst_lookup(struct xfrm_dst **dst, struct flowi *fl, unsigned short family); 9351da177e4SLinus Torvalds #else 9361da177e4SLinus Torvalds static inline int xfrm_user_policy(struct sock *sk, int optname, u8 __user *optval, int optlen) 9371da177e4SLinus Torvalds { 9381da177e4SLinus Torvalds return -ENOPROTOOPT; 9391da177e4SLinus Torvalds } 9401da177e4SLinus Torvalds 9411da177e4SLinus Torvalds static inline int xfrm4_rcv_encap(struct sk_buff *skb, __u16 encap_type) 9421da177e4SLinus Torvalds { 9431da177e4SLinus Torvalds /* should not happen */ 9441da177e4SLinus Torvalds kfree_skb(skb); 9451da177e4SLinus Torvalds return 0; 9461da177e4SLinus Torvalds } 9471da177e4SLinus Torvalds static inline int xfrm_dst_lookup(struct xfrm_dst **dst, struct flowi *fl, unsigned short family) 9481da177e4SLinus Torvalds { 9491da177e4SLinus Torvalds return -EINVAL; 9501da177e4SLinus Torvalds } 9511da177e4SLinus Torvalds #endif 9521da177e4SLinus Torvalds 953dd0fc66fSAl Viro struct xfrm_policy *xfrm_policy_alloc(gfp_t gfp); 9544e81bb83SMasahide NAKAMURA extern int xfrm_policy_walk(u8 type, int (*func)(struct xfrm_policy *, int, int, void*), void *); 9551da177e4SLinus Torvalds int xfrm_policy_insert(int dir, struct xfrm_policy *policy, int excl); 9564e81bb83SMasahide NAKAMURA struct xfrm_policy *xfrm_policy_bysel_ctx(u8 type, int dir, 9574e81bb83SMasahide NAKAMURA struct xfrm_selector *sel, 958df71837dSTrent Jaeger struct xfrm_sec_ctx *ctx, int delete); 9594e81bb83SMasahide NAKAMURA struct xfrm_policy *xfrm_policy_byid(u8, int dir, u32 id, int delete); 9604e81bb83SMasahide NAKAMURA void xfrm_policy_flush(u8 type); 9611da177e4SLinus Torvalds u32 xfrm_get_acqseq(void); 96226977b4eSAl Viro void xfrm_alloc_spi(struct xfrm_state *x, __be32 minspi, __be32 maxspi); 9631da177e4SLinus Torvalds struct xfrm_state * xfrm_find_acq(u8 mode, u32 reqid, u8 proto, 9641da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr, 9651da177e4SLinus Torvalds int create, unsigned short family); 9664e81bb83SMasahide NAKAMURA extern void xfrm_policy_flush(u8 type); 9671da177e4SLinus Torvalds extern int xfrm_sk_policy_insert(struct sock *sk, int dir, struct xfrm_policy *pol); 9685b368e61SVenkat Yekkirala extern int xfrm_bundle_ok(struct xfrm_policy *pol, struct xfrm_dst *xdst, 9695b368e61SVenkat Yekkirala struct flowi *fl, int family, int strict); 9701da177e4SLinus Torvalds extern void xfrm_init_pmtu(struct dst_entry *dst); 9711da177e4SLinus Torvalds 9721da177e4SLinus Torvalds extern wait_queue_head_t km_waitq; 9735d36b180SAl Viro extern int km_new_mapping(struct xfrm_state *x, xfrm_address_t *ipaddr, __be16 sport); 9746c5c8ca7SJamal Hadi Salim extern void km_policy_expired(struct xfrm_policy *pol, int dir, int hard, u32 pid); 97597a64b45SMasahide NAKAMURA extern int km_report(u8 proto, struct xfrm_selector *sel, xfrm_address_t *addr); 9761da177e4SLinus Torvalds 9771da177e4SLinus Torvalds extern void xfrm_input_init(void); 9786067b2baSAl Viro extern int xfrm_parse_spi(struct sk_buff *skb, u8 nexthdr, __be32 *spi, __be32 *seq); 9791da177e4SLinus Torvalds 9801da177e4SLinus Torvalds extern void xfrm_probe_algs(void); 9811da177e4SLinus Torvalds extern int xfrm_count_auth_supported(void); 9821da177e4SLinus Torvalds extern int xfrm_count_enc_supported(void); 9831da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byidx(unsigned int idx); 9841da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byidx(unsigned int idx); 9851da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byid(int alg_id); 9861da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byid(int alg_id); 9871da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_calg_get_byid(int alg_id); 9881da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byname(char *name, int probe); 9891da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byname(char *name, int probe); 9901da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_calg_get_byname(char *name, int probe); 9911da177e4SLinus Torvalds 99207d4ee58SHerbert Xu struct hash_desc; 9939409f38aSHerbert Xu struct scatterlist; 99407d4ee58SHerbert Xu typedef int (icv_update_fn_t)(struct hash_desc *, struct scatterlist *, 99507d4ee58SHerbert Xu unsigned int); 9961da177e4SLinus Torvalds 99707d4ee58SHerbert Xu extern int skb_icv_walk(const struct sk_buff *skb, struct hash_desc *tfm, 9981da177e4SLinus Torvalds int offset, int len, icv_update_fn_t icv_update); 9991da177e4SLinus Torvalds 10001da177e4SLinus Torvalds static inline int xfrm_addr_cmp(xfrm_address_t *a, xfrm_address_t *b, 10011da177e4SLinus Torvalds int family) 10021da177e4SLinus Torvalds { 10031da177e4SLinus Torvalds switch (family) { 10041da177e4SLinus Torvalds default: 10051da177e4SLinus Torvalds case AF_INET: 10068c689a6eSAl Viro return (__force __u32)a->a4 - (__force __u32)b->a4; 10071da177e4SLinus Torvalds case AF_INET6: 10081da177e4SLinus Torvalds return ipv6_addr_cmp((struct in6_addr *)a, 10091da177e4SLinus Torvalds (struct in6_addr *)b); 10101da177e4SLinus Torvalds } 10111da177e4SLinus Torvalds } 10121da177e4SLinus Torvalds 101377d8d7a6SHerbert Xu static inline int xfrm_policy_id2dir(u32 index) 101477d8d7a6SHerbert Xu { 101577d8d7a6SHerbert Xu return index & 7; 101677d8d7a6SHerbert Xu } 101777d8d7a6SHerbert Xu 1018f8cd5488SJamal Hadi Salim static inline int xfrm_aevent_is_on(void) 1019f8cd5488SJamal Hadi Salim { 1020be33690dSPatrick McHardy struct sock *nlsk; 1021be33690dSPatrick McHardy int ret = 0; 1022be33690dSPatrick McHardy 1023be33690dSPatrick McHardy rcu_read_lock(); 1024be33690dSPatrick McHardy nlsk = rcu_dereference(xfrm_nl); 1025be33690dSPatrick McHardy if (nlsk) 1026be33690dSPatrick McHardy ret = netlink_has_listeners(nlsk, XFRMNLGRP_AEVENTS); 1027be33690dSPatrick McHardy rcu_read_unlock(); 1028be33690dSPatrick McHardy return ret; 1029f8cd5488SJamal Hadi Salim } 1030f8cd5488SJamal Hadi Salim 1031f8cd5488SJamal Hadi Salim static inline void xfrm_aevent_doreplay(struct xfrm_state *x) 1032f8cd5488SJamal Hadi Salim { 1033f8cd5488SJamal Hadi Salim if (xfrm_aevent_is_on()) 1034f8cd5488SJamal Hadi Salim xfrm_replay_notify(x, XFRM_REPLAY_UPDATE); 1035f8cd5488SJamal Hadi Salim } 1036f8cd5488SJamal Hadi Salim 1037f8cd5488SJamal Hadi Salim 10381da177e4SLinus Torvalds #endif /* _NET_XFRM_H */ 1039