11da177e4SLinus Torvalds #ifndef _NET_XFRM_H 21da177e4SLinus Torvalds #define _NET_XFRM_H 31da177e4SLinus Torvalds 4aabc9761SHerbert Xu #include <linux/compiler.h> 514c85021SArnaldo Carvalho de Melo #include <linux/in.h> 61da177e4SLinus Torvalds #include <linux/xfrm.h> 71da177e4SLinus Torvalds #include <linux/spinlock.h> 81da177e4SLinus Torvalds #include <linux/list.h> 91da177e4SLinus Torvalds #include <linux/skbuff.h> 1014c85021SArnaldo Carvalho de Melo #include <linux/socket.h> 111da177e4SLinus Torvalds #include <linux/pfkeyv2.h> 125794708fSMasahide NAKAMURA #include <linux/ipsec.h> 131da177e4SLinus Torvalds #include <linux/in6.h> 144a3e2f71SArjan van de Ven #include <linux/mutex.h> 151da177e4SLinus Torvalds 161da177e4SLinus Torvalds #include <net/sock.h> 171da177e4SLinus Torvalds #include <net/dst.h> 181da177e4SLinus Torvalds #include <net/route.h> 191da177e4SLinus Torvalds #include <net/ipv6.h> 201da177e4SLinus Torvalds #include <net/ip6_fib.h> 211da177e4SLinus Torvalds 221da177e4SLinus Torvalds #define XFRM_ALIGN8(len) (((len) + 7) & ~7) 23b59f45d0SHerbert Xu #define MODULE_ALIAS_XFRM_MODE(family, encap) \ 24b59f45d0SHerbert Xu MODULE_ALIAS("xfrm-mode-" __stringify(family) "-" __stringify(encap)) 251da177e4SLinus Torvalds 26f8cd5488SJamal Hadi Salim extern struct sock *xfrm_nl; 27f8cd5488SJamal Hadi Salim extern u32 sysctl_xfrm_aevent_etime; 28f8cd5488SJamal Hadi Salim extern u32 sysctl_xfrm_aevent_rseqth; 29f8cd5488SJamal Hadi Salim 304a3e2f71SArjan van de Ven extern struct mutex xfrm_cfg_mutex; 311da177e4SLinus Torvalds 321da177e4SLinus Torvalds /* Organization of SPD aka "XFRM rules" 331da177e4SLinus Torvalds ------------------------------------ 341da177e4SLinus Torvalds 351da177e4SLinus Torvalds Basic objects: 361da177e4SLinus Torvalds - policy rule, struct xfrm_policy (=SPD entry) 371da177e4SLinus Torvalds - bundle of transformations, struct dst_entry == struct xfrm_dst (=SA bundle) 381da177e4SLinus Torvalds - instance of a transformer, struct xfrm_state (=SA) 391da177e4SLinus Torvalds - template to clone xfrm_state, struct xfrm_tmpl 401da177e4SLinus Torvalds 411da177e4SLinus Torvalds SPD is plain linear list of xfrm_policy rules, ordered by priority. 421da177e4SLinus Torvalds (To be compatible with existing pfkeyv2 implementations, 431da177e4SLinus Torvalds many rules with priority of 0x7fffffff are allowed to exist and 441da177e4SLinus Torvalds such rules are ordered in an unpredictable way, thanks to bsd folks.) 451da177e4SLinus Torvalds 461da177e4SLinus Torvalds Lookup is plain linear search until the first match with selector. 471da177e4SLinus Torvalds 481da177e4SLinus Torvalds If "action" is "block", then we prohibit the flow, otherwise: 491da177e4SLinus Torvalds if "xfrms_nr" is zero, the flow passes untransformed. Otherwise, 501da177e4SLinus Torvalds policy entry has list of up to XFRM_MAX_DEPTH transformations, 511da177e4SLinus Torvalds described by templates xfrm_tmpl. Each template is resolved 521da177e4SLinus Torvalds to a complete xfrm_state (see below) and we pack bundle of transformations 531da177e4SLinus Torvalds to a dst_entry returned to requestor. 541da177e4SLinus Torvalds 551da177e4SLinus Torvalds dst -. xfrm .-> xfrm_state #1 561da177e4SLinus Torvalds |---. child .-> dst -. xfrm .-> xfrm_state #2 571da177e4SLinus Torvalds |---. child .-> dst -. xfrm .-> xfrm_state #3 581da177e4SLinus Torvalds |---. child .-> NULL 591da177e4SLinus Torvalds 601da177e4SLinus Torvalds Bundles are cached at xrfm_policy struct (field ->bundles). 611da177e4SLinus Torvalds 621da177e4SLinus Torvalds 631da177e4SLinus Torvalds Resolution of xrfm_tmpl 641da177e4SLinus Torvalds ----------------------- 651da177e4SLinus Torvalds Template contains: 661da177e4SLinus Torvalds 1. ->mode Mode: transport or tunnel 671da177e4SLinus Torvalds 2. ->id.proto Protocol: AH/ESP/IPCOMP 681da177e4SLinus Torvalds 3. ->id.daddr Remote tunnel endpoint, ignored for transport mode. 691da177e4SLinus Torvalds Q: allow to resolve security gateway? 701da177e4SLinus Torvalds 4. ->id.spi If not zero, static SPI. 711da177e4SLinus Torvalds 5. ->saddr Local tunnel endpoint, ignored for transport mode. 721da177e4SLinus Torvalds 6. ->algos List of allowed algos. Plain bitmask now. 731da177e4SLinus Torvalds Q: ealgos, aalgos, calgos. What a mess... 741da177e4SLinus Torvalds 7. ->share Sharing mode. 751da177e4SLinus Torvalds Q: how to implement private sharing mode? To add struct sock* to 761da177e4SLinus Torvalds flow id? 771da177e4SLinus Torvalds 781da177e4SLinus Torvalds Having this template we search through SAD searching for entries 791da177e4SLinus Torvalds with appropriate mode/proto/algo, permitted by selector. 801da177e4SLinus Torvalds If no appropriate entry found, it is requested from key manager. 811da177e4SLinus Torvalds 821da177e4SLinus Torvalds PROBLEMS: 831da177e4SLinus Torvalds Q: How to find all the bundles referring to a physical path for 841da177e4SLinus Torvalds PMTU discovery? Seems, dst should contain list of all parents... 851da177e4SLinus Torvalds and enter to infinite locking hierarchy disaster. 861da177e4SLinus Torvalds No! It is easier, we will not search for them, let them find us. 871da177e4SLinus Torvalds We add genid to each dst plus pointer to genid of raw IP route, 881da177e4SLinus Torvalds pmtu disc will update pmtu on raw IP route and increase its genid. 891da177e4SLinus Torvalds dst_check() will see this for top level and trigger resyncing 901da177e4SLinus Torvalds metrics. Plus, it will be made via sk->sk_dst_cache. Solved. 911da177e4SLinus Torvalds */ 921da177e4SLinus Torvalds 931da177e4SLinus Torvalds /* Full description of state of transformer. */ 941da177e4SLinus Torvalds struct xfrm_state 951da177e4SLinus Torvalds { 961da177e4SLinus Torvalds /* Note: bydst is re-used during gc */ 971da177e4SLinus Torvalds struct list_head bydst; 986c44e6b7SMasahide NAKAMURA struct list_head bysrc; 991da177e4SLinus Torvalds struct list_head byspi; 1001da177e4SLinus Torvalds 1011da177e4SLinus Torvalds atomic_t refcnt; 1021da177e4SLinus Torvalds spinlock_t lock; 1031da177e4SLinus Torvalds 1041da177e4SLinus Torvalds struct xfrm_id id; 1051da177e4SLinus Torvalds struct xfrm_selector sel; 1061da177e4SLinus Torvalds 1071da177e4SLinus Torvalds /* Key manger bits */ 1081da177e4SLinus Torvalds struct { 1091da177e4SLinus Torvalds u8 state; 1101da177e4SLinus Torvalds u8 dying; 1111da177e4SLinus Torvalds u32 seq; 1121da177e4SLinus Torvalds } km; 1131da177e4SLinus Torvalds 1141da177e4SLinus Torvalds /* Parameters of this state. */ 1151da177e4SLinus Torvalds struct { 1161da177e4SLinus Torvalds u32 reqid; 1171da177e4SLinus Torvalds u8 mode; 1181da177e4SLinus Torvalds u8 replay_window; 1191da177e4SLinus Torvalds u8 aalgo, ealgo, calgo; 1201da177e4SLinus Torvalds u8 flags; 1211da177e4SLinus Torvalds u16 family; 1221da177e4SLinus Torvalds xfrm_address_t saddr; 1231da177e4SLinus Torvalds int header_len; 1241da177e4SLinus Torvalds int trailer_len; 1251da177e4SLinus Torvalds } props; 1261da177e4SLinus Torvalds 1271da177e4SLinus Torvalds struct xfrm_lifetime_cfg lft; 1281da177e4SLinus Torvalds 1291da177e4SLinus Torvalds /* Data for transformer */ 1301da177e4SLinus Torvalds struct xfrm_algo *aalg; 1311da177e4SLinus Torvalds struct xfrm_algo *ealg; 1321da177e4SLinus Torvalds struct xfrm_algo *calg; 1331da177e4SLinus Torvalds 1341da177e4SLinus Torvalds /* Data for encapsulator */ 1351da177e4SLinus Torvalds struct xfrm_encap_tmpl *encap; 1361da177e4SLinus Torvalds 137060f02a3SNoriaki TAKAMIYA /* Data for care-of address */ 138060f02a3SNoriaki TAKAMIYA xfrm_address_t *coaddr; 139060f02a3SNoriaki TAKAMIYA 1401da177e4SLinus Torvalds /* IPComp needs an IPIP tunnel for handling uncompressed packets */ 1411da177e4SLinus Torvalds struct xfrm_state *tunnel; 1421da177e4SLinus Torvalds 1431da177e4SLinus Torvalds /* If a tunnel, number of users + 1 */ 1441da177e4SLinus Torvalds atomic_t tunnel_users; 1451da177e4SLinus Torvalds 1461da177e4SLinus Torvalds /* State for replay detection */ 1471da177e4SLinus Torvalds struct xfrm_replay_state replay; 1481da177e4SLinus Torvalds 149f8cd5488SJamal Hadi Salim /* Replay detection state at the time we sent the last notification */ 150f8cd5488SJamal Hadi Salim struct xfrm_replay_state preplay; 151f8cd5488SJamal Hadi Salim 1522717096aSJamal Hadi Salim /* internal flag that only holds state for delayed aevent at the 1532717096aSJamal Hadi Salim * moment 1542717096aSJamal Hadi Salim */ 1552717096aSJamal Hadi Salim u32 xflags; 1562717096aSJamal Hadi Salim 157f8cd5488SJamal Hadi Salim /* Replay detection notification settings */ 158f8cd5488SJamal Hadi Salim u32 replay_maxage; 159f8cd5488SJamal Hadi Salim u32 replay_maxdiff; 160f8cd5488SJamal Hadi Salim 161f8cd5488SJamal Hadi Salim /* Replay detection notification timer */ 162f8cd5488SJamal Hadi Salim struct timer_list rtimer; 163f8cd5488SJamal Hadi Salim 1641da177e4SLinus Torvalds /* Statistics */ 1651da177e4SLinus Torvalds struct xfrm_stats stats; 1661da177e4SLinus Torvalds 1671da177e4SLinus Torvalds struct xfrm_lifetime_cur curlft; 1681da177e4SLinus Torvalds struct timer_list timer; 1691da177e4SLinus Torvalds 1709afaca05SMasahide NAKAMURA /* Last used time */ 1719afaca05SMasahide NAKAMURA u64 lastused; 1729afaca05SMasahide NAKAMURA 1731da177e4SLinus Torvalds /* Reference to data common to all the instances of this 1741da177e4SLinus Torvalds * transformer. */ 1751da177e4SLinus Torvalds struct xfrm_type *type; 176b59f45d0SHerbert Xu struct xfrm_mode *mode; 1771da177e4SLinus Torvalds 178df71837dSTrent Jaeger /* Security context */ 179df71837dSTrent Jaeger struct xfrm_sec_ctx *security; 180df71837dSTrent Jaeger 1811da177e4SLinus Torvalds /* Private data of this transformer, format is opaque, 1821da177e4SLinus Torvalds * interpreted by xfrm_type methods. */ 1831da177e4SLinus Torvalds void *data; 1841da177e4SLinus Torvalds }; 1851da177e4SLinus Torvalds 1862717096aSJamal Hadi Salim /* xflags - make enum if more show up */ 1872717096aSJamal Hadi Salim #define XFRM_TIME_DEFER 1 1882717096aSJamal Hadi Salim 1891da177e4SLinus Torvalds enum { 1901da177e4SLinus Torvalds XFRM_STATE_VOID, 1911da177e4SLinus Torvalds XFRM_STATE_ACQ, 1921da177e4SLinus Torvalds XFRM_STATE_VALID, 1931da177e4SLinus Torvalds XFRM_STATE_ERROR, 1941da177e4SLinus Torvalds XFRM_STATE_EXPIRED, 1951da177e4SLinus Torvalds XFRM_STATE_DEAD 1961da177e4SLinus Torvalds }; 1971da177e4SLinus Torvalds 19826b15dadSJamal Hadi Salim /* callback structure passed from either netlink or pfkey */ 19926b15dadSJamal Hadi Salim struct km_event 20026b15dadSJamal Hadi Salim { 201bf08867fSHerbert Xu union { 202bf08867fSHerbert Xu u32 hard; 203bf08867fSHerbert Xu u32 proto; 204bf08867fSHerbert Xu u32 byid; 205f8cd5488SJamal Hadi Salim u32 aevent; 206bf08867fSHerbert Xu } data; 207bf08867fSHerbert Xu 20826b15dadSJamal Hadi Salim u32 seq; 20926b15dadSJamal Hadi Salim u32 pid; 21026b15dadSJamal Hadi Salim u32 event; 21126b15dadSJamal Hadi Salim }; 21226b15dadSJamal Hadi Salim 2131da177e4SLinus Torvalds struct xfrm_type; 2141da177e4SLinus Torvalds struct xfrm_dst; 2151da177e4SLinus Torvalds struct xfrm_policy_afinfo { 2161da177e4SLinus Torvalds unsigned short family; 21773654d61SHerbert Xu struct xfrm_type *type_map[IPPROTO_MAX]; 218b59f45d0SHerbert Xu struct xfrm_mode *mode_map[XFRM_MODE_MAX]; 2191da177e4SLinus Torvalds struct dst_ops *dst_ops; 2201da177e4SLinus Torvalds void (*garbage_collect)(void); 2211da177e4SLinus Torvalds int (*dst_lookup)(struct xfrm_dst **dst, struct flowi *fl); 2221da177e4SLinus Torvalds struct dst_entry *(*find_bundle)(struct flowi *fl, struct xfrm_policy *policy); 2231da177e4SLinus Torvalds int (*bundle_create)(struct xfrm_policy *policy, 2241da177e4SLinus Torvalds struct xfrm_state **xfrm, 2251da177e4SLinus Torvalds int nx, 2261da177e4SLinus Torvalds struct flowi *fl, 2271da177e4SLinus Torvalds struct dst_entry **dst_p); 2281da177e4SLinus Torvalds void (*decode_session)(struct sk_buff *skb, 2291da177e4SLinus Torvalds struct flowi *fl); 2301da177e4SLinus Torvalds }; 2311da177e4SLinus Torvalds 2321da177e4SLinus Torvalds extern int xfrm_policy_register_afinfo(struct xfrm_policy_afinfo *afinfo); 2331da177e4SLinus Torvalds extern int xfrm_policy_unregister_afinfo(struct xfrm_policy_afinfo *afinfo); 23426b15dadSJamal Hadi Salim extern void km_policy_notify(struct xfrm_policy *xp, int dir, struct km_event *c); 23526b15dadSJamal Hadi Salim extern void km_state_notify(struct xfrm_state *x, struct km_event *c); 2361da177e4SLinus Torvalds #define XFRM_ACQ_EXPIRES 30 2371da177e4SLinus Torvalds 2381da177e4SLinus Torvalds struct xfrm_tmpl; 239980ebd25SJamal Hadi Salim extern int km_query(struct xfrm_state *x, struct xfrm_tmpl *t, struct xfrm_policy *pol); 24053bc6b4dSJamal Hadi Salim extern void km_state_expired(struct xfrm_state *x, int hard, u32 pid); 24153bc6b4dSJamal Hadi Salim extern int __xfrm_state_delete(struct xfrm_state *x); 24253bc6b4dSJamal Hadi Salim 2431da177e4SLinus Torvalds struct xfrm_state_afinfo { 2441da177e4SLinus Torvalds unsigned short family; 2451da177e4SLinus Torvalds struct list_head *state_bydst; 2466c44e6b7SMasahide NAKAMURA struct list_head *state_bysrc; 2471da177e4SLinus Torvalds struct list_head *state_byspi; 248d094cd83SHerbert Xu int (*init_flags)(struct xfrm_state *x); 2491da177e4SLinus Torvalds void (*init_tempsel)(struct xfrm_state *x, struct flowi *fl, 2501da177e4SLinus Torvalds struct xfrm_tmpl *tmpl, 2511da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr); 2521da177e4SLinus Torvalds struct xfrm_state *(*state_lookup)(xfrm_address_t *daddr, u32 spi, u8 proto); 253eb2971b6SMasahide NAKAMURA struct xfrm_state *(*state_lookup_byaddr)(xfrm_address_t *daddr, xfrm_address_t *saddr, u8 proto); 2541da177e4SLinus Torvalds struct xfrm_state *(*find_acq)(u8 mode, u32 reqid, u8 proto, 2551da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr, 2561da177e4SLinus Torvalds int create); 2571da177e4SLinus Torvalds }; 2581da177e4SLinus Torvalds 2591da177e4SLinus Torvalds extern int xfrm_state_register_afinfo(struct xfrm_state_afinfo *afinfo); 2601da177e4SLinus Torvalds extern int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo); 2611da177e4SLinus Torvalds 2621da177e4SLinus Torvalds extern void xfrm_state_delete_tunnel(struct xfrm_state *x); 2631da177e4SLinus Torvalds 2641da177e4SLinus Torvalds struct xfrm_type 2651da177e4SLinus Torvalds { 2661da177e4SLinus Torvalds char *description; 2671da177e4SLinus Torvalds struct module *owner; 2681da177e4SLinus Torvalds __u8 proto; 2691b5c2299SMasahide NAKAMURA __u8 flags; 2701b5c2299SMasahide NAKAMURA #define XFRM_TYPE_NON_FRAGMENT 1 2711da177e4SLinus Torvalds 27272cb6962SHerbert Xu int (*init_state)(struct xfrm_state *x); 2731da177e4SLinus Torvalds void (*destructor)(struct xfrm_state *); 274e695633eSHerbert Xu int (*input)(struct xfrm_state *, struct sk_buff *skb); 2751da177e4SLinus Torvalds int (*output)(struct xfrm_state *, struct sk_buff *pskb); 276df0ba92aSMasahide NAKAMURA int (*reject)(struct xfrm_state *, struct sk_buff *, struct flowi *); 277aee5adb4SMasahide NAKAMURA int (*hdr_offset)(struct xfrm_state *, struct sk_buff *, u8 **); 27899505a84SMasahide NAKAMURA xfrm_address_t *(*local_addr)(struct xfrm_state *, xfrm_address_t *); 27999505a84SMasahide NAKAMURA xfrm_address_t *(*remote_addr)(struct xfrm_state *, xfrm_address_t *); 2801da177e4SLinus Torvalds /* Estimate maximal size of result of transformation of a dgram */ 2811da177e4SLinus Torvalds u32 (*get_max_size)(struct xfrm_state *, int size); 2821da177e4SLinus Torvalds }; 2831da177e4SLinus Torvalds 2841da177e4SLinus Torvalds extern int xfrm_register_type(struct xfrm_type *type, unsigned short family); 2851da177e4SLinus Torvalds extern int xfrm_unregister_type(struct xfrm_type *type, unsigned short family); 2861da177e4SLinus Torvalds extern struct xfrm_type *xfrm_get_type(u8 proto, unsigned short family); 2871da177e4SLinus Torvalds extern void xfrm_put_type(struct xfrm_type *type); 2881da177e4SLinus Torvalds 289b59f45d0SHerbert Xu struct xfrm_mode { 290b59f45d0SHerbert Xu int (*input)(struct xfrm_state *x, struct sk_buff *skb); 291b59f45d0SHerbert Xu int (*output)(struct sk_buff *skb); 292b59f45d0SHerbert Xu 293b59f45d0SHerbert Xu struct module *owner; 294b59f45d0SHerbert Xu unsigned int encap; 295b59f45d0SHerbert Xu }; 296b59f45d0SHerbert Xu 297b59f45d0SHerbert Xu extern int xfrm_register_mode(struct xfrm_mode *mode, int family); 298b59f45d0SHerbert Xu extern int xfrm_unregister_mode(struct xfrm_mode *mode, int family); 299b59f45d0SHerbert Xu extern struct xfrm_mode *xfrm_get_mode(unsigned int encap, int family); 300b59f45d0SHerbert Xu extern void xfrm_put_mode(struct xfrm_mode *mode); 301b59f45d0SHerbert Xu 3021da177e4SLinus Torvalds struct xfrm_tmpl 3031da177e4SLinus Torvalds { 3041da177e4SLinus Torvalds /* id in template is interpreted as: 3051da177e4SLinus Torvalds * daddr - destination of tunnel, may be zero for transport mode. 3061da177e4SLinus Torvalds * spi - zero to acquire spi. Not zero if spi is static, then 3071da177e4SLinus Torvalds * daddr must be fixed too. 3081da177e4SLinus Torvalds * proto - AH/ESP/IPCOMP 3091da177e4SLinus Torvalds */ 3101da177e4SLinus Torvalds struct xfrm_id id; 3111da177e4SLinus Torvalds 3121da177e4SLinus Torvalds /* Source address of tunnel. Ignored, if it is not a tunnel. */ 3131da177e4SLinus Torvalds xfrm_address_t saddr; 3141da177e4SLinus Torvalds 3151da177e4SLinus Torvalds __u32 reqid; 3161da177e4SLinus Torvalds 3177e49e6deSMasahide NAKAMURA /* Mode: transport, tunnel etc. */ 3181da177e4SLinus Torvalds __u8 mode; 3191da177e4SLinus Torvalds 3201da177e4SLinus Torvalds /* Sharing mode: unique, this session only, this user only etc. */ 3211da177e4SLinus Torvalds __u8 share; 3221da177e4SLinus Torvalds 3231da177e4SLinus Torvalds /* May skip this transfomration if no SA is found */ 3241da177e4SLinus Torvalds __u8 optional; 3251da177e4SLinus Torvalds 3261da177e4SLinus Torvalds /* Bit mask of algos allowed for acquisition */ 3271da177e4SLinus Torvalds __u32 aalgos; 3281da177e4SLinus Torvalds __u32 ealgos; 3291da177e4SLinus Torvalds __u32 calgos; 3301da177e4SLinus Torvalds }; 3311da177e4SLinus Torvalds 332622dc828SMasahide NAKAMURA #define XFRM_MAX_DEPTH 6 3331da177e4SLinus Torvalds 3341da177e4SLinus Torvalds struct xfrm_policy 3351da177e4SLinus Torvalds { 3361da177e4SLinus Torvalds struct xfrm_policy *next; 3371da177e4SLinus Torvalds struct list_head list; 3381da177e4SLinus Torvalds 3391da177e4SLinus Torvalds /* This lock only affects elements except for entry. */ 3401da177e4SLinus Torvalds rwlock_t lock; 3411da177e4SLinus Torvalds atomic_t refcnt; 3421da177e4SLinus Torvalds struct timer_list timer; 3431da177e4SLinus Torvalds 3444e81bb83SMasahide NAKAMURA u8 type; 3451da177e4SLinus Torvalds u32 priority; 3461da177e4SLinus Torvalds u32 index; 3471da177e4SLinus Torvalds struct xfrm_selector selector; 3481da177e4SLinus Torvalds struct xfrm_lifetime_cfg lft; 3491da177e4SLinus Torvalds struct xfrm_lifetime_cur curlft; 3501da177e4SLinus Torvalds struct dst_entry *bundles; 3511da177e4SLinus Torvalds __u16 family; 3521da177e4SLinus Torvalds __u8 action; 3531da177e4SLinus Torvalds __u8 flags; 3541da177e4SLinus Torvalds __u8 dead; 3551da177e4SLinus Torvalds __u8 xfrm_nr; 356df71837dSTrent Jaeger struct xfrm_sec_ctx *security; 3571da177e4SLinus Torvalds struct xfrm_tmpl xfrm_vec[XFRM_MAX_DEPTH]; 3581da177e4SLinus Torvalds }; 3591da177e4SLinus Torvalds 3601da177e4SLinus Torvalds #define XFRM_KM_TIMEOUT 30 361f8cd5488SJamal Hadi Salim /* which seqno */ 362f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_SEQ 1 363f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_OSEQ 2 364f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_SEQ_MASK 3 365f8cd5488SJamal Hadi Salim /* what happened */ 366f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_UPDATE XFRM_AE_CR 367f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_TIMEOUT XFRM_AE_CE 368f8cd5488SJamal Hadi Salim 369f8cd5488SJamal Hadi Salim /* default aevent timeout in units of 100ms */ 370f8cd5488SJamal Hadi Salim #define XFRM_AE_ETIME 10 371f8cd5488SJamal Hadi Salim /* Async Event timer multiplier */ 372f8cd5488SJamal Hadi Salim #define XFRM_AE_ETH_M 10 373f8cd5488SJamal Hadi Salim /* default seq threshold size */ 374f8cd5488SJamal Hadi Salim #define XFRM_AE_SEQT_SIZE 2 3751da177e4SLinus Torvalds 3761da177e4SLinus Torvalds struct xfrm_mgr 3771da177e4SLinus Torvalds { 3781da177e4SLinus Torvalds struct list_head list; 3791da177e4SLinus Torvalds char *id; 38026b15dadSJamal Hadi Salim int (*notify)(struct xfrm_state *x, struct km_event *c); 3811da177e4SLinus Torvalds int (*acquire)(struct xfrm_state *x, struct xfrm_tmpl *, struct xfrm_policy *xp, int dir); 382cb969f07SVenkat Yekkirala struct xfrm_policy *(*compile_policy)(struct sock *sk, int opt, u8 *data, int len, int *dir); 3831da177e4SLinus Torvalds int (*new_mapping)(struct xfrm_state *x, xfrm_address_t *ipaddr, u16 sport); 38426b15dadSJamal Hadi Salim int (*notify_policy)(struct xfrm_policy *x, int dir, struct km_event *c); 38597a64b45SMasahide NAKAMURA int (*report)(u8 proto, struct xfrm_selector *sel, xfrm_address_t *addr); 3861da177e4SLinus Torvalds }; 3871da177e4SLinus Torvalds 3881da177e4SLinus Torvalds extern int xfrm_register_km(struct xfrm_mgr *km); 3891da177e4SLinus Torvalds extern int xfrm_unregister_km(struct xfrm_mgr *km); 3901da177e4SLinus Torvalds 3911da177e4SLinus Torvalds 3921da177e4SLinus Torvalds extern struct xfrm_policy *xfrm_policy_list[XFRM_POLICY_MAX*2]; 3934e81bb83SMasahide NAKAMURA #ifdef CONFIG_XFRM_SUB_POLICY 3944e81bb83SMasahide NAKAMURA extern struct xfrm_policy *xfrm_policy_list_sub[XFRM_POLICY_MAX*2]; 3954e81bb83SMasahide NAKAMURA 3964e81bb83SMasahide NAKAMURA static inline int xfrm_policy_lists_empty(int dir) 3974e81bb83SMasahide NAKAMURA { 3984e81bb83SMasahide NAKAMURA return (!xfrm_policy_list[dir] && !xfrm_policy_list_sub[dir]); 3994e81bb83SMasahide NAKAMURA } 4004e81bb83SMasahide NAKAMURA #else 4014e81bb83SMasahide NAKAMURA static inline int xfrm_policy_lists_empty(int dir) 4024e81bb83SMasahide NAKAMURA { 4034e81bb83SMasahide NAKAMURA return (!xfrm_policy_list[dir]); 4044e81bb83SMasahide NAKAMURA } 4054e81bb83SMasahide NAKAMURA #endif 4061da177e4SLinus Torvalds 4071da177e4SLinus Torvalds static inline void xfrm_pol_hold(struct xfrm_policy *policy) 4081da177e4SLinus Torvalds { 4091da177e4SLinus Torvalds if (likely(policy != NULL)) 4101da177e4SLinus Torvalds atomic_inc(&policy->refcnt); 4111da177e4SLinus Torvalds } 4121da177e4SLinus Torvalds 4131da177e4SLinus Torvalds extern void __xfrm_policy_destroy(struct xfrm_policy *policy); 4141da177e4SLinus Torvalds 4151da177e4SLinus Torvalds static inline void xfrm_pol_put(struct xfrm_policy *policy) 4161da177e4SLinus Torvalds { 4171da177e4SLinus Torvalds if (atomic_dec_and_test(&policy->refcnt)) 4181da177e4SLinus Torvalds __xfrm_policy_destroy(policy); 4191da177e4SLinus Torvalds } 4201da177e4SLinus Torvalds 4214e81bb83SMasahide NAKAMURA #ifdef CONFIG_XFRM_SUB_POLICY 4224e81bb83SMasahide NAKAMURA static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols) 4234e81bb83SMasahide NAKAMURA { 4244e81bb83SMasahide NAKAMURA int i; 4254e81bb83SMasahide NAKAMURA for (i = npols - 1; i >= 0; --i) 4264e81bb83SMasahide NAKAMURA xfrm_pol_put(pols[i]); 4274e81bb83SMasahide NAKAMURA } 4284e81bb83SMasahide NAKAMURA #else 4294e81bb83SMasahide NAKAMURA static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols) 4304e81bb83SMasahide NAKAMURA { 4314e81bb83SMasahide NAKAMURA xfrm_pol_put(pols[0]); 4324e81bb83SMasahide NAKAMURA } 4334e81bb83SMasahide NAKAMURA #endif 4344e81bb83SMasahide NAKAMURA 4351da177e4SLinus Torvalds #define XFRM_DST_HSIZE 1024 4361da177e4SLinus Torvalds 4371da177e4SLinus Torvalds static __inline__ 4381da177e4SLinus Torvalds unsigned __xfrm4_dst_hash(xfrm_address_t *addr) 4391da177e4SLinus Torvalds { 4401da177e4SLinus Torvalds unsigned h; 4411da177e4SLinus Torvalds h = ntohl(addr->a4); 4421da177e4SLinus Torvalds h = (h ^ (h>>16)) % XFRM_DST_HSIZE; 4431da177e4SLinus Torvalds return h; 4441da177e4SLinus Torvalds } 4451da177e4SLinus Torvalds 4461da177e4SLinus Torvalds static __inline__ 4471da177e4SLinus Torvalds unsigned __xfrm6_dst_hash(xfrm_address_t *addr) 4481da177e4SLinus Torvalds { 4491da177e4SLinus Torvalds unsigned h; 4501da177e4SLinus Torvalds h = ntohl(addr->a6[2]^addr->a6[3]); 4511da177e4SLinus Torvalds h = (h ^ (h>>16)) % XFRM_DST_HSIZE; 4521da177e4SLinus Torvalds return h; 4531da177e4SLinus Torvalds } 4541da177e4SLinus Torvalds 4551da177e4SLinus Torvalds static __inline__ 4561da177e4SLinus Torvalds unsigned xfrm_dst_hash(xfrm_address_t *addr, unsigned short family) 4571da177e4SLinus Torvalds { 4581da177e4SLinus Torvalds switch (family) { 4591da177e4SLinus Torvalds case AF_INET: 4601da177e4SLinus Torvalds return __xfrm4_dst_hash(addr); 4611da177e4SLinus Torvalds case AF_INET6: 4621da177e4SLinus Torvalds return __xfrm6_dst_hash(addr); 4631da177e4SLinus Torvalds } 4641da177e4SLinus Torvalds return 0; 4651da177e4SLinus Torvalds } 4661da177e4SLinus Torvalds 4671da177e4SLinus Torvalds static __inline__ 4686c44e6b7SMasahide NAKAMURA unsigned __xfrm4_src_hash(xfrm_address_t *addr) 4696c44e6b7SMasahide NAKAMURA { 4706c44e6b7SMasahide NAKAMURA return __xfrm4_dst_hash(addr); 4716c44e6b7SMasahide NAKAMURA } 4726c44e6b7SMasahide NAKAMURA 4736c44e6b7SMasahide NAKAMURA static __inline__ 4746c44e6b7SMasahide NAKAMURA unsigned __xfrm6_src_hash(xfrm_address_t *addr) 4756c44e6b7SMasahide NAKAMURA { 4766c44e6b7SMasahide NAKAMURA return __xfrm6_dst_hash(addr); 4776c44e6b7SMasahide NAKAMURA } 4786c44e6b7SMasahide NAKAMURA 4796c44e6b7SMasahide NAKAMURA static __inline__ 4806c44e6b7SMasahide NAKAMURA unsigned xfrm_src_hash(xfrm_address_t *addr, unsigned short family) 4816c44e6b7SMasahide NAKAMURA { 4826c44e6b7SMasahide NAKAMURA switch (family) { 4836c44e6b7SMasahide NAKAMURA case AF_INET: 4846c44e6b7SMasahide NAKAMURA return __xfrm4_src_hash(addr); 4856c44e6b7SMasahide NAKAMURA case AF_INET6: 4866c44e6b7SMasahide NAKAMURA return __xfrm6_src_hash(addr); 4876c44e6b7SMasahide NAKAMURA } 4886c44e6b7SMasahide NAKAMURA return 0; 4896c44e6b7SMasahide NAKAMURA } 4906c44e6b7SMasahide NAKAMURA 4916c44e6b7SMasahide NAKAMURA static __inline__ 4921da177e4SLinus Torvalds unsigned __xfrm4_spi_hash(xfrm_address_t *addr, u32 spi, u8 proto) 4931da177e4SLinus Torvalds { 4941da177e4SLinus Torvalds unsigned h; 4951da177e4SLinus Torvalds h = ntohl(addr->a4^spi^proto); 4961da177e4SLinus Torvalds h = (h ^ (h>>10) ^ (h>>20)) % XFRM_DST_HSIZE; 4971da177e4SLinus Torvalds return h; 4981da177e4SLinus Torvalds } 4991da177e4SLinus Torvalds 5001da177e4SLinus Torvalds static __inline__ 5011da177e4SLinus Torvalds unsigned __xfrm6_spi_hash(xfrm_address_t *addr, u32 spi, u8 proto) 5021da177e4SLinus Torvalds { 5031da177e4SLinus Torvalds unsigned h; 5041da177e4SLinus Torvalds h = ntohl(addr->a6[2]^addr->a6[3]^spi^proto); 5051da177e4SLinus Torvalds h = (h ^ (h>>10) ^ (h>>20)) % XFRM_DST_HSIZE; 5061da177e4SLinus Torvalds return h; 5071da177e4SLinus Torvalds } 5081da177e4SLinus Torvalds 5091da177e4SLinus Torvalds static __inline__ 5101da177e4SLinus Torvalds unsigned xfrm_spi_hash(xfrm_address_t *addr, u32 spi, u8 proto, unsigned short family) 5111da177e4SLinus Torvalds { 5121da177e4SLinus Torvalds switch (family) { 5131da177e4SLinus Torvalds case AF_INET: 5141da177e4SLinus Torvalds return __xfrm4_spi_hash(addr, spi, proto); 5151da177e4SLinus Torvalds case AF_INET6: 5161da177e4SLinus Torvalds return __xfrm6_spi_hash(addr, spi, proto); 5171da177e4SLinus Torvalds } 5181da177e4SLinus Torvalds return 0; /*XXX*/ 5191da177e4SLinus Torvalds } 5201da177e4SLinus Torvalds 5211da177e4SLinus Torvalds extern void __xfrm_state_destroy(struct xfrm_state *); 5221da177e4SLinus Torvalds 52321380b81SHerbert Xu static inline void __xfrm_state_put(struct xfrm_state *x) 52421380b81SHerbert Xu { 52521380b81SHerbert Xu atomic_dec(&x->refcnt); 52621380b81SHerbert Xu } 52721380b81SHerbert Xu 5281da177e4SLinus Torvalds static inline void xfrm_state_put(struct xfrm_state *x) 5291da177e4SLinus Torvalds { 5301da177e4SLinus Torvalds if (atomic_dec_and_test(&x->refcnt)) 5311da177e4SLinus Torvalds __xfrm_state_destroy(x); 5321da177e4SLinus Torvalds } 5331da177e4SLinus Torvalds 5341da177e4SLinus Torvalds static inline void xfrm_state_hold(struct xfrm_state *x) 5351da177e4SLinus Torvalds { 5361da177e4SLinus Torvalds atomic_inc(&x->refcnt); 5371da177e4SLinus Torvalds } 5381da177e4SLinus Torvalds 5391da177e4SLinus Torvalds static __inline__ int addr_match(void *token1, void *token2, int prefixlen) 5401da177e4SLinus Torvalds { 5411da177e4SLinus Torvalds __u32 *a1 = token1; 5421da177e4SLinus Torvalds __u32 *a2 = token2; 5431da177e4SLinus Torvalds int pdw; 5441da177e4SLinus Torvalds int pbi; 5451da177e4SLinus Torvalds 5461da177e4SLinus Torvalds pdw = prefixlen >> 5; /* num of whole __u32 in prefix */ 5471da177e4SLinus Torvalds pbi = prefixlen & 0x1f; /* num of bits in incomplete u32 in prefix */ 5481da177e4SLinus Torvalds 5491da177e4SLinus Torvalds if (pdw) 5501da177e4SLinus Torvalds if (memcmp(a1, a2, pdw << 2)) 5511da177e4SLinus Torvalds return 0; 5521da177e4SLinus Torvalds 5531da177e4SLinus Torvalds if (pbi) { 5541da177e4SLinus Torvalds __u32 mask; 5551da177e4SLinus Torvalds 5561da177e4SLinus Torvalds mask = htonl((0xffffffff) << (32 - pbi)); 5571da177e4SLinus Torvalds 5581da177e4SLinus Torvalds if ((a1[pdw] ^ a2[pdw]) & mask) 5591da177e4SLinus Torvalds return 0; 5601da177e4SLinus Torvalds } 5611da177e4SLinus Torvalds 5621da177e4SLinus Torvalds return 1; 5631da177e4SLinus Torvalds } 5641da177e4SLinus Torvalds 5651da177e4SLinus Torvalds static __inline__ 5661da177e4SLinus Torvalds u16 xfrm_flowi_sport(struct flowi *fl) 5671da177e4SLinus Torvalds { 5681da177e4SLinus Torvalds u16 port; 5691da177e4SLinus Torvalds switch(fl->proto) { 5701da177e4SLinus Torvalds case IPPROTO_TCP: 5711da177e4SLinus Torvalds case IPPROTO_UDP: 5721da177e4SLinus Torvalds case IPPROTO_SCTP: 5731da177e4SLinus Torvalds port = fl->fl_ip_sport; 5741da177e4SLinus Torvalds break; 5751da177e4SLinus Torvalds case IPPROTO_ICMP: 5761da177e4SLinus Torvalds case IPPROTO_ICMPV6: 5771da177e4SLinus Torvalds port = htons(fl->fl_icmp_type); 5781da177e4SLinus Torvalds break; 5792ce4272aSMasahide NAKAMURA #ifdef CONFIG_IPV6_MIP6 5802ce4272aSMasahide NAKAMURA case IPPROTO_MH: 5812ce4272aSMasahide NAKAMURA port = htons(fl->fl_mh_type); 5822ce4272aSMasahide NAKAMURA break; 5832ce4272aSMasahide NAKAMURA #endif 5841da177e4SLinus Torvalds default: 5851da177e4SLinus Torvalds port = 0; /*XXX*/ 5861da177e4SLinus Torvalds } 5871da177e4SLinus Torvalds return port; 5881da177e4SLinus Torvalds } 5891da177e4SLinus Torvalds 5901da177e4SLinus Torvalds static __inline__ 5911da177e4SLinus Torvalds u16 xfrm_flowi_dport(struct flowi *fl) 5921da177e4SLinus Torvalds { 5931da177e4SLinus Torvalds u16 port; 5941da177e4SLinus Torvalds switch(fl->proto) { 5951da177e4SLinus Torvalds case IPPROTO_TCP: 5961da177e4SLinus Torvalds case IPPROTO_UDP: 5971da177e4SLinus Torvalds case IPPROTO_SCTP: 5981da177e4SLinus Torvalds port = fl->fl_ip_dport; 5991da177e4SLinus Torvalds break; 6001da177e4SLinus Torvalds case IPPROTO_ICMP: 6011da177e4SLinus Torvalds case IPPROTO_ICMPV6: 6021da177e4SLinus Torvalds port = htons(fl->fl_icmp_code); 6031da177e4SLinus Torvalds break; 6041da177e4SLinus Torvalds default: 6051da177e4SLinus Torvalds port = 0; /*XXX*/ 6061da177e4SLinus Torvalds } 6071da177e4SLinus Torvalds return port; 6081da177e4SLinus Torvalds } 6091da177e4SLinus Torvalds 6101da177e4SLinus Torvalds static inline int 6111da177e4SLinus Torvalds __xfrm4_selector_match(struct xfrm_selector *sel, struct flowi *fl) 6121da177e4SLinus Torvalds { 6131da177e4SLinus Torvalds return addr_match(&fl->fl4_dst, &sel->daddr, sel->prefixlen_d) && 6141da177e4SLinus Torvalds addr_match(&fl->fl4_src, &sel->saddr, sel->prefixlen_s) && 6151da177e4SLinus Torvalds !((xfrm_flowi_dport(fl) ^ sel->dport) & sel->dport_mask) && 6161da177e4SLinus Torvalds !((xfrm_flowi_sport(fl) ^ sel->sport) & sel->sport_mask) && 6171da177e4SLinus Torvalds (fl->proto == sel->proto || !sel->proto) && 6181da177e4SLinus Torvalds (fl->oif == sel->ifindex || !sel->ifindex); 6191da177e4SLinus Torvalds } 6201da177e4SLinus Torvalds 6211da177e4SLinus Torvalds static inline int 6221da177e4SLinus Torvalds __xfrm6_selector_match(struct xfrm_selector *sel, struct flowi *fl) 6231da177e4SLinus Torvalds { 6241da177e4SLinus Torvalds return addr_match(&fl->fl6_dst, &sel->daddr, sel->prefixlen_d) && 6251da177e4SLinus Torvalds addr_match(&fl->fl6_src, &sel->saddr, sel->prefixlen_s) && 6261da177e4SLinus Torvalds !((xfrm_flowi_dport(fl) ^ sel->dport) & sel->dport_mask) && 6271da177e4SLinus Torvalds !((xfrm_flowi_sport(fl) ^ sel->sport) & sel->sport_mask) && 6281da177e4SLinus Torvalds (fl->proto == sel->proto || !sel->proto) && 6291da177e4SLinus Torvalds (fl->oif == sel->ifindex || !sel->ifindex); 6301da177e4SLinus Torvalds } 6311da177e4SLinus Torvalds 6321da177e4SLinus Torvalds static inline int 6331da177e4SLinus Torvalds xfrm_selector_match(struct xfrm_selector *sel, struct flowi *fl, 6341da177e4SLinus Torvalds unsigned short family) 6351da177e4SLinus Torvalds { 6361da177e4SLinus Torvalds switch (family) { 6371da177e4SLinus Torvalds case AF_INET: 6381da177e4SLinus Torvalds return __xfrm4_selector_match(sel, fl); 6391da177e4SLinus Torvalds case AF_INET6: 6401da177e4SLinus Torvalds return __xfrm6_selector_match(sel, fl); 6411da177e4SLinus Torvalds } 6421da177e4SLinus Torvalds return 0; 6431da177e4SLinus Torvalds } 6441da177e4SLinus Torvalds 645df71837dSTrent Jaeger #ifdef CONFIG_SECURITY_NETWORK_XFRM 646df71837dSTrent Jaeger /* If neither has a context --> match 647df71837dSTrent Jaeger * Otherwise, both must have a context and the sids, doi, alg must match 648df71837dSTrent Jaeger */ 649df71837dSTrent Jaeger static inline int xfrm_sec_ctx_match(struct xfrm_sec_ctx *s1, struct xfrm_sec_ctx *s2) 650df71837dSTrent Jaeger { 651df71837dSTrent Jaeger return ((!s1 && !s2) || 652df71837dSTrent Jaeger (s1 && s2 && 653df71837dSTrent Jaeger (s1->ctx_sid == s2->ctx_sid) && 654df71837dSTrent Jaeger (s1->ctx_doi == s2->ctx_doi) && 655df71837dSTrent Jaeger (s1->ctx_alg == s2->ctx_alg))); 656df71837dSTrent Jaeger } 657df71837dSTrent Jaeger #else 658df71837dSTrent Jaeger static inline int xfrm_sec_ctx_match(struct xfrm_sec_ctx *s1, struct xfrm_sec_ctx *s2) 659df71837dSTrent Jaeger { 660df71837dSTrent Jaeger return 1; 661df71837dSTrent Jaeger } 662df71837dSTrent Jaeger #endif 663df71837dSTrent Jaeger 6641da177e4SLinus Torvalds /* A struct encoding bundle of transformations to apply to some set of flow. 6651da177e4SLinus Torvalds * 6661da177e4SLinus Torvalds * dst->child points to the next element of bundle. 6671da177e4SLinus Torvalds * dst->xfrm points to an instanse of transformer. 6681da177e4SLinus Torvalds * 6691da177e4SLinus Torvalds * Due to unfortunate limitations of current routing cache, which we 6701da177e4SLinus Torvalds * have no time to fix, it mirrors struct rtable and bound to the same 6711da177e4SLinus Torvalds * routing key, including saddr,daddr. However, we can have many of 6721da177e4SLinus Torvalds * bundles differing by session id. All the bundles grow from a parent 6731da177e4SLinus Torvalds * policy rule. 6741da177e4SLinus Torvalds */ 6751da177e4SLinus Torvalds struct xfrm_dst 6761da177e4SLinus Torvalds { 6771da177e4SLinus Torvalds union { 6781da177e4SLinus Torvalds struct xfrm_dst *next; 6791da177e4SLinus Torvalds struct dst_entry dst; 6801da177e4SLinus Torvalds struct rtable rt; 6811da177e4SLinus Torvalds struct rt6_info rt6; 6821da177e4SLinus Torvalds } u; 6831da177e4SLinus Torvalds struct dst_entry *route; 6841da177e4SLinus Torvalds u32 route_mtu_cached; 6851da177e4SLinus Torvalds u32 child_mtu_cached; 68692d63decSHideaki YOSHIFUJI u32 route_cookie; 68792d63decSHideaki YOSHIFUJI u32 path_cookie; 6881da177e4SLinus Torvalds }; 6891da177e4SLinus Torvalds 690aabc9761SHerbert Xu static inline void xfrm_dst_destroy(struct xfrm_dst *xdst) 691aabc9761SHerbert Xu { 692aabc9761SHerbert Xu dst_release(xdst->route); 693aabc9761SHerbert Xu if (likely(xdst->u.dst.xfrm)) 694aabc9761SHerbert Xu xfrm_state_put(xdst->u.dst.xfrm); 695aabc9761SHerbert Xu } 696aabc9761SHerbert Xu 697aabc9761SHerbert Xu extern void xfrm_dst_ifdown(struct dst_entry *dst, struct net_device *dev); 698aabc9761SHerbert Xu 6991da177e4SLinus Torvalds struct sec_path 7001da177e4SLinus Torvalds { 7011da177e4SLinus Torvalds atomic_t refcnt; 7021da177e4SLinus Torvalds int len; 703dbe5b4aaSHerbert Xu struct xfrm_state *xvec[XFRM_MAX_DEPTH]; 7041da177e4SLinus Torvalds }; 7051da177e4SLinus Torvalds 7061da177e4SLinus Torvalds static inline struct sec_path * 7071da177e4SLinus Torvalds secpath_get(struct sec_path *sp) 7081da177e4SLinus Torvalds { 7091da177e4SLinus Torvalds if (sp) 7101da177e4SLinus Torvalds atomic_inc(&sp->refcnt); 7111da177e4SLinus Torvalds return sp; 7121da177e4SLinus Torvalds } 7131da177e4SLinus Torvalds 7141da177e4SLinus Torvalds extern void __secpath_destroy(struct sec_path *sp); 7151da177e4SLinus Torvalds 7161da177e4SLinus Torvalds static inline void 7171da177e4SLinus Torvalds secpath_put(struct sec_path *sp) 7181da177e4SLinus Torvalds { 7191da177e4SLinus Torvalds if (sp && atomic_dec_and_test(&sp->refcnt)) 7201da177e4SLinus Torvalds __secpath_destroy(sp); 7211da177e4SLinus Torvalds } 7221da177e4SLinus Torvalds 7231da177e4SLinus Torvalds extern struct sec_path *secpath_dup(struct sec_path *src); 7241da177e4SLinus Torvalds 7251da177e4SLinus Torvalds static inline void 7261da177e4SLinus Torvalds secpath_reset(struct sk_buff *skb) 7271da177e4SLinus Torvalds { 7281da177e4SLinus Torvalds #ifdef CONFIG_XFRM 7291da177e4SLinus Torvalds secpath_put(skb->sp); 7301da177e4SLinus Torvalds skb->sp = NULL; 7311da177e4SLinus Torvalds #endif 7321da177e4SLinus Torvalds } 7331da177e4SLinus Torvalds 7341da177e4SLinus Torvalds static inline int 7351da177e4SLinus Torvalds __xfrm4_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x) 7361da177e4SLinus Torvalds { 7371da177e4SLinus Torvalds return (tmpl->saddr.a4 && 7381da177e4SLinus Torvalds tmpl->saddr.a4 != x->props.saddr.a4); 7391da177e4SLinus Torvalds } 7401da177e4SLinus Torvalds 7411da177e4SLinus Torvalds static inline int 7421da177e4SLinus Torvalds __xfrm6_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x) 7431da177e4SLinus Torvalds { 7441da177e4SLinus Torvalds return (!ipv6_addr_any((struct in6_addr*)&tmpl->saddr) && 7451da177e4SLinus Torvalds ipv6_addr_cmp((struct in6_addr *)&tmpl->saddr, (struct in6_addr*)&x->props.saddr)); 7461da177e4SLinus Torvalds } 7471da177e4SLinus Torvalds 7481da177e4SLinus Torvalds static inline int 7491da177e4SLinus Torvalds xfrm_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x, unsigned short family) 7501da177e4SLinus Torvalds { 7511da177e4SLinus Torvalds switch (family) { 7521da177e4SLinus Torvalds case AF_INET: 7531da177e4SLinus Torvalds return __xfrm4_state_addr_cmp(tmpl, x); 7541da177e4SLinus Torvalds case AF_INET6: 7551da177e4SLinus Torvalds return __xfrm6_state_addr_cmp(tmpl, x); 7561da177e4SLinus Torvalds } 7571da177e4SLinus Torvalds return !0; 7581da177e4SLinus Torvalds } 7591da177e4SLinus Torvalds 7601da177e4SLinus Torvalds #ifdef CONFIG_XFRM 7611da177e4SLinus Torvalds 7621da177e4SLinus Torvalds extern int __xfrm_policy_check(struct sock *, int dir, struct sk_buff *skb, unsigned short family); 7631da177e4SLinus Torvalds 7641da177e4SLinus Torvalds static inline int xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) 7651da177e4SLinus Torvalds { 7661da177e4SLinus Torvalds if (sk && sk->sk_policy[XFRM_POLICY_IN]) 7671da177e4SLinus Torvalds return __xfrm_policy_check(sk, dir, skb, family); 7681da177e4SLinus Torvalds 7694e81bb83SMasahide NAKAMURA return (xfrm_policy_lists_empty(dir) && !skb->sp) || 7701da177e4SLinus Torvalds (skb->dst->flags & DST_NOPOLICY) || 7711da177e4SLinus Torvalds __xfrm_policy_check(sk, dir, skb, family); 7721da177e4SLinus Torvalds } 7731da177e4SLinus Torvalds 7741da177e4SLinus Torvalds static inline int xfrm4_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 7751da177e4SLinus Torvalds { 7761da177e4SLinus Torvalds return xfrm_policy_check(sk, dir, skb, AF_INET); 7771da177e4SLinus Torvalds } 7781da177e4SLinus Torvalds 7791da177e4SLinus Torvalds static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 7801da177e4SLinus Torvalds { 7811da177e4SLinus Torvalds return xfrm_policy_check(sk, dir, skb, AF_INET6); 7821da177e4SLinus Torvalds } 7831da177e4SLinus Torvalds 7843e3850e9SPatrick McHardy extern int xfrm_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family); 7851da177e4SLinus Torvalds extern int __xfrm_route_forward(struct sk_buff *skb, unsigned short family); 7861da177e4SLinus Torvalds 7871da177e4SLinus Torvalds static inline int xfrm_route_forward(struct sk_buff *skb, unsigned short family) 7881da177e4SLinus Torvalds { 7894e81bb83SMasahide NAKAMURA return xfrm_policy_lists_empty(XFRM_POLICY_OUT) || 7901da177e4SLinus Torvalds (skb->dst->flags & DST_NOXFRM) || 7911da177e4SLinus Torvalds __xfrm_route_forward(skb, family); 7921da177e4SLinus Torvalds } 7931da177e4SLinus Torvalds 7941da177e4SLinus Torvalds static inline int xfrm4_route_forward(struct sk_buff *skb) 7951da177e4SLinus Torvalds { 7961da177e4SLinus Torvalds return xfrm_route_forward(skb, AF_INET); 7971da177e4SLinus Torvalds } 7981da177e4SLinus Torvalds 7991da177e4SLinus Torvalds static inline int xfrm6_route_forward(struct sk_buff *skb) 8001da177e4SLinus Torvalds { 8011da177e4SLinus Torvalds return xfrm_route_forward(skb, AF_INET6); 8021da177e4SLinus Torvalds } 8031da177e4SLinus Torvalds 8041da177e4SLinus Torvalds extern int __xfrm_sk_clone_policy(struct sock *sk); 8051da177e4SLinus Torvalds 8061da177e4SLinus Torvalds static inline int xfrm_sk_clone_policy(struct sock *sk) 8071da177e4SLinus Torvalds { 8081da177e4SLinus Torvalds if (unlikely(sk->sk_policy[0] || sk->sk_policy[1])) 8091da177e4SLinus Torvalds return __xfrm_sk_clone_policy(sk); 8101da177e4SLinus Torvalds return 0; 8111da177e4SLinus Torvalds } 8121da177e4SLinus Torvalds 8134666faabSHerbert Xu extern int xfrm_policy_delete(struct xfrm_policy *pol, int dir); 8141da177e4SLinus Torvalds 8151da177e4SLinus Torvalds static inline void xfrm_sk_free_policy(struct sock *sk) 8161da177e4SLinus Torvalds { 8171da177e4SLinus Torvalds if (unlikely(sk->sk_policy[0] != NULL)) { 8181da177e4SLinus Torvalds xfrm_policy_delete(sk->sk_policy[0], XFRM_POLICY_MAX); 8191da177e4SLinus Torvalds sk->sk_policy[0] = NULL; 8201da177e4SLinus Torvalds } 8211da177e4SLinus Torvalds if (unlikely(sk->sk_policy[1] != NULL)) { 8221da177e4SLinus Torvalds xfrm_policy_delete(sk->sk_policy[1], XFRM_POLICY_MAX+1); 8231da177e4SLinus Torvalds sk->sk_policy[1] = NULL; 8241da177e4SLinus Torvalds } 8251da177e4SLinus Torvalds } 8261da177e4SLinus Torvalds 8271da177e4SLinus Torvalds #else 8281da177e4SLinus Torvalds 8291da177e4SLinus Torvalds static inline void xfrm_sk_free_policy(struct sock *sk) {} 8301da177e4SLinus Torvalds static inline int xfrm_sk_clone_policy(struct sock *sk) { return 0; } 8311da177e4SLinus Torvalds static inline int xfrm6_route_forward(struct sk_buff *skb) { return 1; } 8321da177e4SLinus Torvalds static inline int xfrm4_route_forward(struct sk_buff *skb) { return 1; } 8331da177e4SLinus Torvalds static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 8341da177e4SLinus Torvalds { 8351da177e4SLinus Torvalds return 1; 8361da177e4SLinus Torvalds } 8371da177e4SLinus Torvalds static inline int xfrm4_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 8381da177e4SLinus Torvalds { 8391da177e4SLinus Torvalds return 1; 8401da177e4SLinus Torvalds } 8411da177e4SLinus Torvalds static inline int xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) 8421da177e4SLinus Torvalds { 8431da177e4SLinus Torvalds return 1; 8441da177e4SLinus Torvalds } 8451da177e4SLinus Torvalds #endif 8461da177e4SLinus Torvalds 8471da177e4SLinus Torvalds static __inline__ 8481da177e4SLinus Torvalds xfrm_address_t *xfrm_flowi_daddr(struct flowi *fl, unsigned short family) 8491da177e4SLinus Torvalds { 8501da177e4SLinus Torvalds switch (family){ 8511da177e4SLinus Torvalds case AF_INET: 8521da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl4_dst; 8531da177e4SLinus Torvalds case AF_INET6: 8541da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl6_dst; 8551da177e4SLinus Torvalds } 8561da177e4SLinus Torvalds return NULL; 8571da177e4SLinus Torvalds } 8581da177e4SLinus Torvalds 8591da177e4SLinus Torvalds static __inline__ 8601da177e4SLinus Torvalds xfrm_address_t *xfrm_flowi_saddr(struct flowi *fl, unsigned short family) 8611da177e4SLinus Torvalds { 8621da177e4SLinus Torvalds switch (family){ 8631da177e4SLinus Torvalds case AF_INET: 8641da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl4_src; 8651da177e4SLinus Torvalds case AF_INET6: 8661da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl6_src; 8671da177e4SLinus Torvalds } 8681da177e4SLinus Torvalds return NULL; 8691da177e4SLinus Torvalds } 8701da177e4SLinus Torvalds 8711da177e4SLinus Torvalds static __inline__ int 8721da177e4SLinus Torvalds __xfrm4_state_addr_check(struct xfrm_state *x, 8731da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr) 8741da177e4SLinus Torvalds { 8751da177e4SLinus Torvalds if (daddr->a4 == x->id.daddr.a4 && 8761da177e4SLinus Torvalds (saddr->a4 == x->props.saddr.a4 || !saddr->a4 || !x->props.saddr.a4)) 8771da177e4SLinus Torvalds return 1; 8781da177e4SLinus Torvalds return 0; 8791da177e4SLinus Torvalds } 8801da177e4SLinus Torvalds 8811da177e4SLinus Torvalds static __inline__ int 8821da177e4SLinus Torvalds __xfrm6_state_addr_check(struct xfrm_state *x, 8831da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr) 8841da177e4SLinus Torvalds { 8851da177e4SLinus Torvalds if (!ipv6_addr_cmp((struct in6_addr *)daddr, (struct in6_addr *)&x->id.daddr) && 8861da177e4SLinus Torvalds (!ipv6_addr_cmp((struct in6_addr *)saddr, (struct in6_addr *)&x->props.saddr)|| 8871da177e4SLinus Torvalds ipv6_addr_any((struct in6_addr *)saddr) || 8881da177e4SLinus Torvalds ipv6_addr_any((struct in6_addr *)&x->props.saddr))) 8891da177e4SLinus Torvalds return 1; 8901da177e4SLinus Torvalds return 0; 8911da177e4SLinus Torvalds } 8921da177e4SLinus Torvalds 8931da177e4SLinus Torvalds static __inline__ int 8941da177e4SLinus Torvalds xfrm_state_addr_check(struct xfrm_state *x, 8951da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr, 8961da177e4SLinus Torvalds unsigned short family) 8971da177e4SLinus Torvalds { 8981da177e4SLinus Torvalds switch (family) { 8991da177e4SLinus Torvalds case AF_INET: 9001da177e4SLinus Torvalds return __xfrm4_state_addr_check(x, daddr, saddr); 9011da177e4SLinus Torvalds case AF_INET6: 9021da177e4SLinus Torvalds return __xfrm6_state_addr_check(x, daddr, saddr); 9031da177e4SLinus Torvalds } 9041da177e4SLinus Torvalds return 0; 9051da177e4SLinus Torvalds } 9061da177e4SLinus Torvalds 907e53820deSMasahide NAKAMURA static __inline__ int 908e53820deSMasahide NAKAMURA xfrm_state_addr_flow_check(struct xfrm_state *x, struct flowi *fl, 909e53820deSMasahide NAKAMURA unsigned short family) 910e53820deSMasahide NAKAMURA { 911e53820deSMasahide NAKAMURA switch (family) { 912e53820deSMasahide NAKAMURA case AF_INET: 913e53820deSMasahide NAKAMURA return __xfrm4_state_addr_check(x, 914e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl4_dst, 915e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl4_src); 916e53820deSMasahide NAKAMURA case AF_INET6: 917e53820deSMasahide NAKAMURA return __xfrm6_state_addr_check(x, 918e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl6_dst, 919e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl6_src); 920e53820deSMasahide NAKAMURA } 921e53820deSMasahide NAKAMURA return 0; 922e53820deSMasahide NAKAMURA } 923e53820deSMasahide NAKAMURA 9241da177e4SLinus Torvalds static inline int xfrm_state_kern(struct xfrm_state *x) 9251da177e4SLinus Torvalds { 9261da177e4SLinus Torvalds return atomic_read(&x->tunnel_users); 9271da177e4SLinus Torvalds } 9281da177e4SLinus Torvalds 9295794708fSMasahide NAKAMURA static inline int xfrm_id_proto_match(u8 proto, u8 userproto) 9305794708fSMasahide NAKAMURA { 931dc00a525SMasahide NAKAMURA return (!userproto || proto == userproto || 932dc00a525SMasahide NAKAMURA (userproto == IPSEC_PROTO_ANY && (proto == IPPROTO_AH || 933dc00a525SMasahide NAKAMURA proto == IPPROTO_ESP || 934dc00a525SMasahide NAKAMURA proto == IPPROTO_COMP))); 9355794708fSMasahide NAKAMURA } 9365794708fSMasahide NAKAMURA 9371da177e4SLinus Torvalds /* 9381da177e4SLinus Torvalds * xfrm algorithm information 9391da177e4SLinus Torvalds */ 9401da177e4SLinus Torvalds struct xfrm_algo_auth_info { 9411da177e4SLinus Torvalds u16 icv_truncbits; 9421da177e4SLinus Torvalds u16 icv_fullbits; 9431da177e4SLinus Torvalds }; 9441da177e4SLinus Torvalds 9451da177e4SLinus Torvalds struct xfrm_algo_encr_info { 9461da177e4SLinus Torvalds u16 blockbits; 9471da177e4SLinus Torvalds u16 defkeybits; 9481da177e4SLinus Torvalds }; 9491da177e4SLinus Torvalds 9501da177e4SLinus Torvalds struct xfrm_algo_comp_info { 9511da177e4SLinus Torvalds u16 threshold; 9521da177e4SLinus Torvalds }; 9531da177e4SLinus Torvalds 9541da177e4SLinus Torvalds struct xfrm_algo_desc { 9551da177e4SLinus Torvalds char *name; 95604ff1260SHerbert Xu char *compat; 9571da177e4SLinus Torvalds u8 available:1; 9581da177e4SLinus Torvalds union { 9591da177e4SLinus Torvalds struct xfrm_algo_auth_info auth; 9601da177e4SLinus Torvalds struct xfrm_algo_encr_info encr; 9611da177e4SLinus Torvalds struct xfrm_algo_comp_info comp; 9621da177e4SLinus Torvalds } uinfo; 9631da177e4SLinus Torvalds struct sadb_alg desc; 9641da177e4SLinus Torvalds }; 9651da177e4SLinus Torvalds 9661da177e4SLinus Torvalds /* XFRM tunnel handlers. */ 9671da177e4SLinus Torvalds struct xfrm_tunnel { 9681da177e4SLinus Torvalds int (*handler)(struct sk_buff *skb); 969d2acc347SHerbert Xu int (*err_handler)(struct sk_buff *skb, __u32 info); 970d2acc347SHerbert Xu 971d2acc347SHerbert Xu struct xfrm_tunnel *next; 972d2acc347SHerbert Xu int priority; 9731da177e4SLinus Torvalds }; 9741da177e4SLinus Torvalds 9751da177e4SLinus Torvalds struct xfrm6_tunnel { 976d2acc347SHerbert Xu int (*handler)(struct sk_buff *skb); 977d2acc347SHerbert Xu int (*err_handler)(struct sk_buff *skb, struct inet6_skb_parm *opt, 9781da177e4SLinus Torvalds int type, int code, int offset, __u32 info); 979d2acc347SHerbert Xu 980d2acc347SHerbert Xu struct xfrm6_tunnel *next; 981d2acc347SHerbert Xu int priority; 9821da177e4SLinus Torvalds }; 9831da177e4SLinus Torvalds 9841da177e4SLinus Torvalds extern void xfrm_init(void); 9851da177e4SLinus Torvalds extern void xfrm4_init(void); 9861da177e4SLinus Torvalds extern void xfrm6_init(void); 9871da177e4SLinus Torvalds extern void xfrm6_fini(void); 9881da177e4SLinus Torvalds extern void xfrm_state_init(void); 9891da177e4SLinus Torvalds extern void xfrm4_state_init(void); 9901da177e4SLinus Torvalds extern void xfrm6_state_init(void); 9911da177e4SLinus Torvalds extern void xfrm6_state_fini(void); 9921da177e4SLinus Torvalds 9931da177e4SLinus Torvalds extern int xfrm_state_walk(u8 proto, int (*func)(struct xfrm_state *, int, void*), void *); 9941da177e4SLinus Torvalds extern struct xfrm_state *xfrm_state_alloc(void); 9951da177e4SLinus Torvalds extern struct xfrm_state *xfrm_state_find(xfrm_address_t *daddr, xfrm_address_t *saddr, 9961da177e4SLinus Torvalds struct flowi *fl, struct xfrm_tmpl *tmpl, 9971da177e4SLinus Torvalds struct xfrm_policy *pol, int *err, 9981da177e4SLinus Torvalds unsigned short family); 9991da177e4SLinus Torvalds extern int xfrm_state_check_expire(struct xfrm_state *x); 10001da177e4SLinus Torvalds extern void xfrm_state_insert(struct xfrm_state *x); 10011da177e4SLinus Torvalds extern int xfrm_state_add(struct xfrm_state *x); 10021da177e4SLinus Torvalds extern int xfrm_state_update(struct xfrm_state *x); 10031da177e4SLinus Torvalds extern struct xfrm_state *xfrm_state_lookup(xfrm_address_t *daddr, u32 spi, u8 proto, unsigned short family); 1004eb2971b6SMasahide NAKAMURA extern struct xfrm_state *xfrm_state_lookup_byaddr(xfrm_address_t *daddr, xfrm_address_t *saddr, u8 proto, unsigned short family); 10051da177e4SLinus Torvalds extern struct xfrm_state *xfrm_find_acq_byseq(u32 seq); 100626b15dadSJamal Hadi Salim extern int xfrm_state_delete(struct xfrm_state *x); 10071da177e4SLinus Torvalds extern void xfrm_state_flush(u8 proto); 10081da177e4SLinus Torvalds extern int xfrm_replay_check(struct xfrm_state *x, u32 seq); 10091da177e4SLinus Torvalds extern void xfrm_replay_advance(struct xfrm_state *x, u32 seq); 1010f8cd5488SJamal Hadi Salim extern void xfrm_replay_notify(struct xfrm_state *x, int event); 10111da177e4SLinus Torvalds extern int xfrm_state_check(struct xfrm_state *x, struct sk_buff *skb); 10121da177e4SLinus Torvalds extern int xfrm_state_mtu(struct xfrm_state *x, int mtu); 101372cb6962SHerbert Xu extern int xfrm_init_state(struct xfrm_state *x); 10141da177e4SLinus Torvalds extern int xfrm4_rcv(struct sk_buff *skb); 10151da177e4SLinus Torvalds extern int xfrm4_output(struct sk_buff *skb); 10161da177e4SLinus Torvalds extern int xfrm4_tunnel_register(struct xfrm_tunnel *handler); 10171da177e4SLinus Torvalds extern int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler); 1018d2acc347SHerbert Xu extern int xfrm6_rcv_spi(struct sk_buff *skb, u32 spi); 1019951dbc8aSPatrick McHardy extern int xfrm6_rcv(struct sk_buff **pskb); 1020fbd9a5b4SMasahide NAKAMURA extern int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr, 1021fbd9a5b4SMasahide NAKAMURA xfrm_address_t *saddr, u8 proto); 10221da177e4SLinus Torvalds extern int xfrm6_tunnel_register(struct xfrm6_tunnel *handler); 10231da177e4SLinus Torvalds extern int xfrm6_tunnel_deregister(struct xfrm6_tunnel *handler); 10241da177e4SLinus Torvalds extern u32 xfrm6_tunnel_alloc_spi(xfrm_address_t *saddr); 10251da177e4SLinus Torvalds extern void xfrm6_tunnel_free_spi(xfrm_address_t *saddr); 10261da177e4SLinus Torvalds extern u32 xfrm6_tunnel_spi_lookup(xfrm_address_t *saddr); 10271da177e4SLinus Torvalds extern int xfrm6_output(struct sk_buff *skb); 1028aee5adb4SMasahide NAKAMURA extern int xfrm6_find_1stfragopt(struct xfrm_state *x, struct sk_buff *skb, 1029aee5adb4SMasahide NAKAMURA u8 **prevhdr); 10301da177e4SLinus Torvalds 10311da177e4SLinus Torvalds #ifdef CONFIG_XFRM 10321da177e4SLinus Torvalds extern int xfrm4_rcv_encap(struct sk_buff *skb, __u16 encap_type); 10331da177e4SLinus Torvalds extern int xfrm_user_policy(struct sock *sk, int optname, u8 __user *optval, int optlen); 10341da177e4SLinus Torvalds extern int xfrm_dst_lookup(struct xfrm_dst **dst, struct flowi *fl, unsigned short family); 10351da177e4SLinus Torvalds #else 10361da177e4SLinus Torvalds static inline int xfrm_user_policy(struct sock *sk, int optname, u8 __user *optval, int optlen) 10371da177e4SLinus Torvalds { 10381da177e4SLinus Torvalds return -ENOPROTOOPT; 10391da177e4SLinus Torvalds } 10401da177e4SLinus Torvalds 10411da177e4SLinus Torvalds static inline int xfrm4_rcv_encap(struct sk_buff *skb, __u16 encap_type) 10421da177e4SLinus Torvalds { 10431da177e4SLinus Torvalds /* should not happen */ 10441da177e4SLinus Torvalds kfree_skb(skb); 10451da177e4SLinus Torvalds return 0; 10461da177e4SLinus Torvalds } 10471da177e4SLinus Torvalds static inline int xfrm_dst_lookup(struct xfrm_dst **dst, struct flowi *fl, unsigned short family) 10481da177e4SLinus Torvalds { 10491da177e4SLinus Torvalds return -EINVAL; 10501da177e4SLinus Torvalds } 10511da177e4SLinus Torvalds #endif 10521da177e4SLinus Torvalds 1053dd0fc66fSAl Viro struct xfrm_policy *xfrm_policy_alloc(gfp_t gfp); 10544e81bb83SMasahide NAKAMURA extern int xfrm_policy_walk(u8 type, int (*func)(struct xfrm_policy *, int, int, void*), void *); 10551da177e4SLinus Torvalds int xfrm_policy_insert(int dir, struct xfrm_policy *policy, int excl); 10564e81bb83SMasahide NAKAMURA struct xfrm_policy *xfrm_policy_bysel_ctx(u8 type, int dir, 10574e81bb83SMasahide NAKAMURA struct xfrm_selector *sel, 1058df71837dSTrent Jaeger struct xfrm_sec_ctx *ctx, int delete); 10594e81bb83SMasahide NAKAMURA struct xfrm_policy *xfrm_policy_byid(u8, int dir, u32 id, int delete); 10604e81bb83SMasahide NAKAMURA void xfrm_policy_flush(u8 type); 10611da177e4SLinus Torvalds u32 xfrm_get_acqseq(void); 10621da177e4SLinus Torvalds void xfrm_alloc_spi(struct xfrm_state *x, u32 minspi, u32 maxspi); 10631da177e4SLinus Torvalds struct xfrm_state * xfrm_find_acq(u8 mode, u32 reqid, u8 proto, 10641da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr, 10651da177e4SLinus Torvalds int create, unsigned short family); 10664e81bb83SMasahide NAKAMURA extern void xfrm_policy_flush(u8 type); 10671da177e4SLinus Torvalds extern int xfrm_sk_policy_insert(struct sock *sk, int dir, struct xfrm_policy *pol); 10681da177e4SLinus Torvalds extern int xfrm_flush_bundles(void); 1069399c180aSDavid S. Miller extern void xfrm_flush_all_bundles(void); 1070e53820deSMasahide NAKAMURA extern int xfrm_bundle_ok(struct xfrm_dst *xdst, struct flowi *fl, int family, int strict); 10711da177e4SLinus Torvalds extern void xfrm_init_pmtu(struct dst_entry *dst); 10721da177e4SLinus Torvalds 10731da177e4SLinus Torvalds extern wait_queue_head_t km_waitq; 10741da177e4SLinus Torvalds extern int km_new_mapping(struct xfrm_state *x, xfrm_address_t *ipaddr, u16 sport); 10756c5c8ca7SJamal Hadi Salim extern void km_policy_expired(struct xfrm_policy *pol, int dir, int hard, u32 pid); 107697a64b45SMasahide NAKAMURA extern int km_report(u8 proto, struct xfrm_selector *sel, xfrm_address_t *addr); 10771da177e4SLinus Torvalds 10781da177e4SLinus Torvalds extern void xfrm_input_init(void); 10791da177e4SLinus Torvalds extern int xfrm_parse_spi(struct sk_buff *skb, u8 nexthdr, u32 *spi, u32 *seq); 10801da177e4SLinus Torvalds 10811da177e4SLinus Torvalds extern void xfrm_probe_algs(void); 10821da177e4SLinus Torvalds extern int xfrm_count_auth_supported(void); 10831da177e4SLinus Torvalds extern int xfrm_count_enc_supported(void); 10841da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byidx(unsigned int idx); 10851da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byidx(unsigned int idx); 10861da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byid(int alg_id); 10871da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byid(int alg_id); 10881da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_calg_get_byid(int alg_id); 10891da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byname(char *name, int probe); 10901da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byname(char *name, int probe); 10911da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_calg_get_byname(char *name, int probe); 10921da177e4SLinus Torvalds 109307d4ee58SHerbert Xu struct hash_desc; 10949409f38aSHerbert Xu struct scatterlist; 109507d4ee58SHerbert Xu typedef int (icv_update_fn_t)(struct hash_desc *, struct scatterlist *, 109607d4ee58SHerbert Xu unsigned int); 10971da177e4SLinus Torvalds 109807d4ee58SHerbert Xu extern int skb_icv_walk(const struct sk_buff *skb, struct hash_desc *tfm, 10991da177e4SLinus Torvalds int offset, int len, icv_update_fn_t icv_update); 11001da177e4SLinus Torvalds 11011da177e4SLinus Torvalds static inline int xfrm_addr_cmp(xfrm_address_t *a, xfrm_address_t *b, 11021da177e4SLinus Torvalds int family) 11031da177e4SLinus Torvalds { 11041da177e4SLinus Torvalds switch (family) { 11051da177e4SLinus Torvalds default: 11061da177e4SLinus Torvalds case AF_INET: 11071da177e4SLinus Torvalds return a->a4 - b->a4; 11081da177e4SLinus Torvalds case AF_INET6: 11091da177e4SLinus Torvalds return ipv6_addr_cmp((struct in6_addr *)a, 11101da177e4SLinus Torvalds (struct in6_addr *)b); 11111da177e4SLinus Torvalds } 11121da177e4SLinus Torvalds } 11131da177e4SLinus Torvalds 111477d8d7a6SHerbert Xu static inline int xfrm_policy_id2dir(u32 index) 111577d8d7a6SHerbert Xu { 111677d8d7a6SHerbert Xu return index & 7; 111777d8d7a6SHerbert Xu } 111877d8d7a6SHerbert Xu 1119f8cd5488SJamal Hadi Salim static inline int xfrm_aevent_is_on(void) 1120f8cd5488SJamal Hadi Salim { 1121be33690dSPatrick McHardy struct sock *nlsk; 1122be33690dSPatrick McHardy int ret = 0; 1123be33690dSPatrick McHardy 1124be33690dSPatrick McHardy rcu_read_lock(); 1125be33690dSPatrick McHardy nlsk = rcu_dereference(xfrm_nl); 1126be33690dSPatrick McHardy if (nlsk) 1127be33690dSPatrick McHardy ret = netlink_has_listeners(nlsk, XFRMNLGRP_AEVENTS); 1128be33690dSPatrick McHardy rcu_read_unlock(); 1129be33690dSPatrick McHardy return ret; 1130f8cd5488SJamal Hadi Salim } 1131f8cd5488SJamal Hadi Salim 1132f8cd5488SJamal Hadi Salim static inline void xfrm_aevent_doreplay(struct xfrm_state *x) 1133f8cd5488SJamal Hadi Salim { 1134f8cd5488SJamal Hadi Salim if (xfrm_aevent_is_on()) 1135f8cd5488SJamal Hadi Salim xfrm_replay_notify(x, XFRM_REPLAY_UPDATE); 1136f8cd5488SJamal Hadi Salim } 1137f8cd5488SJamal Hadi Salim 1138f8cd5488SJamal Hadi Salim 11391da177e4SLinus Torvalds #endif /* _NET_XFRM_H */ 1140