11da177e4SLinus Torvalds #ifndef _NET_XFRM_H 21da177e4SLinus Torvalds #define _NET_XFRM_H 31da177e4SLinus Torvalds 4aabc9761SHerbert Xu #include <linux/compiler.h> 514c85021SArnaldo Carvalho de Melo #include <linux/in.h> 61da177e4SLinus Torvalds #include <linux/xfrm.h> 71da177e4SLinus Torvalds #include <linux/spinlock.h> 81da177e4SLinus Torvalds #include <linux/list.h> 91da177e4SLinus Torvalds #include <linux/skbuff.h> 1014c85021SArnaldo Carvalho de Melo #include <linux/socket.h> 111da177e4SLinus Torvalds #include <linux/pfkeyv2.h> 125794708fSMasahide NAKAMURA #include <linux/ipsec.h> 131da177e4SLinus Torvalds #include <linux/in6.h> 144a3e2f71SArjan van de Ven #include <linux/mutex.h> 151da177e4SLinus Torvalds 161da177e4SLinus Torvalds #include <net/sock.h> 171da177e4SLinus Torvalds #include <net/dst.h> 181da177e4SLinus Torvalds #include <net/route.h> 191da177e4SLinus Torvalds #include <net/ipv6.h> 201da177e4SLinus Torvalds #include <net/ip6_fib.h> 211da177e4SLinus Torvalds 221da177e4SLinus Torvalds #define XFRM_ALIGN8(len) (((len) + 7) & ~7) 23b59f45d0SHerbert Xu #define MODULE_ALIAS_XFRM_MODE(family, encap) \ 24b59f45d0SHerbert Xu MODULE_ALIAS("xfrm-mode-" __stringify(family) "-" __stringify(encap)) 251da177e4SLinus Torvalds 26f8cd5488SJamal Hadi Salim extern struct sock *xfrm_nl; 27f8cd5488SJamal Hadi Salim extern u32 sysctl_xfrm_aevent_etime; 28f8cd5488SJamal Hadi Salim extern u32 sysctl_xfrm_aevent_rseqth; 29f8cd5488SJamal Hadi Salim 304a3e2f71SArjan van de Ven extern struct mutex xfrm_cfg_mutex; 311da177e4SLinus Torvalds 321da177e4SLinus Torvalds /* Organization of SPD aka "XFRM rules" 331da177e4SLinus Torvalds ------------------------------------ 341da177e4SLinus Torvalds 351da177e4SLinus Torvalds Basic objects: 361da177e4SLinus Torvalds - policy rule, struct xfrm_policy (=SPD entry) 371da177e4SLinus Torvalds - bundle of transformations, struct dst_entry == struct xfrm_dst (=SA bundle) 381da177e4SLinus Torvalds - instance of a transformer, struct xfrm_state (=SA) 391da177e4SLinus Torvalds - template to clone xfrm_state, struct xfrm_tmpl 401da177e4SLinus Torvalds 411da177e4SLinus Torvalds SPD is plain linear list of xfrm_policy rules, ordered by priority. 421da177e4SLinus Torvalds (To be compatible with existing pfkeyv2 implementations, 431da177e4SLinus Torvalds many rules with priority of 0x7fffffff are allowed to exist and 441da177e4SLinus Torvalds such rules are ordered in an unpredictable way, thanks to bsd folks.) 451da177e4SLinus Torvalds 461da177e4SLinus Torvalds Lookup is plain linear search until the first match with selector. 471da177e4SLinus Torvalds 481da177e4SLinus Torvalds If "action" is "block", then we prohibit the flow, otherwise: 491da177e4SLinus Torvalds if "xfrms_nr" is zero, the flow passes untransformed. Otherwise, 501da177e4SLinus Torvalds policy entry has list of up to XFRM_MAX_DEPTH transformations, 511da177e4SLinus Torvalds described by templates xfrm_tmpl. Each template is resolved 521da177e4SLinus Torvalds to a complete xfrm_state (see below) and we pack bundle of transformations 531da177e4SLinus Torvalds to a dst_entry returned to requestor. 541da177e4SLinus Torvalds 551da177e4SLinus Torvalds dst -. xfrm .-> xfrm_state #1 561da177e4SLinus Torvalds |---. child .-> dst -. xfrm .-> xfrm_state #2 571da177e4SLinus Torvalds |---. child .-> dst -. xfrm .-> xfrm_state #3 581da177e4SLinus Torvalds |---. child .-> NULL 591da177e4SLinus Torvalds 601da177e4SLinus Torvalds Bundles are cached at xrfm_policy struct (field ->bundles). 611da177e4SLinus Torvalds 621da177e4SLinus Torvalds 631da177e4SLinus Torvalds Resolution of xrfm_tmpl 641da177e4SLinus Torvalds ----------------------- 651da177e4SLinus Torvalds Template contains: 661da177e4SLinus Torvalds 1. ->mode Mode: transport or tunnel 671da177e4SLinus Torvalds 2. ->id.proto Protocol: AH/ESP/IPCOMP 681da177e4SLinus Torvalds 3. ->id.daddr Remote tunnel endpoint, ignored for transport mode. 691da177e4SLinus Torvalds Q: allow to resolve security gateway? 701da177e4SLinus Torvalds 4. ->id.spi If not zero, static SPI. 711da177e4SLinus Torvalds 5. ->saddr Local tunnel endpoint, ignored for transport mode. 721da177e4SLinus Torvalds 6. ->algos List of allowed algos. Plain bitmask now. 731da177e4SLinus Torvalds Q: ealgos, aalgos, calgos. What a mess... 741da177e4SLinus Torvalds 7. ->share Sharing mode. 751da177e4SLinus Torvalds Q: how to implement private sharing mode? To add struct sock* to 761da177e4SLinus Torvalds flow id? 771da177e4SLinus Torvalds 781da177e4SLinus Torvalds Having this template we search through SAD searching for entries 791da177e4SLinus Torvalds with appropriate mode/proto/algo, permitted by selector. 801da177e4SLinus Torvalds If no appropriate entry found, it is requested from key manager. 811da177e4SLinus Torvalds 821da177e4SLinus Torvalds PROBLEMS: 831da177e4SLinus Torvalds Q: How to find all the bundles referring to a physical path for 841da177e4SLinus Torvalds PMTU discovery? Seems, dst should contain list of all parents... 851da177e4SLinus Torvalds and enter to infinite locking hierarchy disaster. 861da177e4SLinus Torvalds No! It is easier, we will not search for them, let them find us. 871da177e4SLinus Torvalds We add genid to each dst plus pointer to genid of raw IP route, 881da177e4SLinus Torvalds pmtu disc will update pmtu on raw IP route and increase its genid. 891da177e4SLinus Torvalds dst_check() will see this for top level and trigger resyncing 901da177e4SLinus Torvalds metrics. Plus, it will be made via sk->sk_dst_cache. Solved. 911da177e4SLinus Torvalds */ 921da177e4SLinus Torvalds 931da177e4SLinus Torvalds /* Full description of state of transformer. */ 941da177e4SLinus Torvalds struct xfrm_state 951da177e4SLinus Torvalds { 961da177e4SLinus Torvalds /* Note: bydst is re-used during gc */ 978f126e37SDavid S. Miller struct hlist_node bydst; 988f126e37SDavid S. Miller struct hlist_node bysrc; 998f126e37SDavid S. Miller struct hlist_node byspi; 1001da177e4SLinus Torvalds 1011da177e4SLinus Torvalds atomic_t refcnt; 1021da177e4SLinus Torvalds spinlock_t lock; 1031da177e4SLinus Torvalds 1041da177e4SLinus Torvalds struct xfrm_id id; 1051da177e4SLinus Torvalds struct xfrm_selector sel; 1061da177e4SLinus Torvalds 1079d4a706dSDavid S. Miller u32 genid; 1089d4a706dSDavid S. Miller 1091da177e4SLinus Torvalds /* Key manger bits */ 1101da177e4SLinus Torvalds struct { 1111da177e4SLinus Torvalds u8 state; 1121da177e4SLinus Torvalds u8 dying; 1131da177e4SLinus Torvalds u32 seq; 1141da177e4SLinus Torvalds } km; 1151da177e4SLinus Torvalds 1161da177e4SLinus Torvalds /* Parameters of this state. */ 1171da177e4SLinus Torvalds struct { 1181da177e4SLinus Torvalds u32 reqid; 1191da177e4SLinus Torvalds u8 mode; 1201da177e4SLinus Torvalds u8 replay_window; 1211da177e4SLinus Torvalds u8 aalgo, ealgo, calgo; 1221da177e4SLinus Torvalds u8 flags; 1231da177e4SLinus Torvalds u16 family; 1241da177e4SLinus Torvalds xfrm_address_t saddr; 1251da177e4SLinus Torvalds int header_len; 1261da177e4SLinus Torvalds int trailer_len; 1271da177e4SLinus Torvalds } props; 1281da177e4SLinus Torvalds 1291da177e4SLinus Torvalds struct xfrm_lifetime_cfg lft; 1301da177e4SLinus Torvalds 1311da177e4SLinus Torvalds /* Data for transformer */ 1321da177e4SLinus Torvalds struct xfrm_algo *aalg; 1331da177e4SLinus Torvalds struct xfrm_algo *ealg; 1341da177e4SLinus Torvalds struct xfrm_algo *calg; 1351da177e4SLinus Torvalds 1361da177e4SLinus Torvalds /* Data for encapsulator */ 1371da177e4SLinus Torvalds struct xfrm_encap_tmpl *encap; 1381da177e4SLinus Torvalds 139060f02a3SNoriaki TAKAMIYA /* Data for care-of address */ 140060f02a3SNoriaki TAKAMIYA xfrm_address_t *coaddr; 141060f02a3SNoriaki TAKAMIYA 1421da177e4SLinus Torvalds /* IPComp needs an IPIP tunnel for handling uncompressed packets */ 1431da177e4SLinus Torvalds struct xfrm_state *tunnel; 1441da177e4SLinus Torvalds 1451da177e4SLinus Torvalds /* If a tunnel, number of users + 1 */ 1461da177e4SLinus Torvalds atomic_t tunnel_users; 1471da177e4SLinus Torvalds 1481da177e4SLinus Torvalds /* State for replay detection */ 1491da177e4SLinus Torvalds struct xfrm_replay_state replay; 1501da177e4SLinus Torvalds 151f8cd5488SJamal Hadi Salim /* Replay detection state at the time we sent the last notification */ 152f8cd5488SJamal Hadi Salim struct xfrm_replay_state preplay; 153f8cd5488SJamal Hadi Salim 1542717096aSJamal Hadi Salim /* internal flag that only holds state for delayed aevent at the 1552717096aSJamal Hadi Salim * moment 1562717096aSJamal Hadi Salim */ 1572717096aSJamal Hadi Salim u32 xflags; 1582717096aSJamal Hadi Salim 159f8cd5488SJamal Hadi Salim /* Replay detection notification settings */ 160f8cd5488SJamal Hadi Salim u32 replay_maxage; 161f8cd5488SJamal Hadi Salim u32 replay_maxdiff; 162f8cd5488SJamal Hadi Salim 163f8cd5488SJamal Hadi Salim /* Replay detection notification timer */ 164f8cd5488SJamal Hadi Salim struct timer_list rtimer; 165f8cd5488SJamal Hadi Salim 1661da177e4SLinus Torvalds /* Statistics */ 1671da177e4SLinus Torvalds struct xfrm_stats stats; 1681da177e4SLinus Torvalds 1691da177e4SLinus Torvalds struct xfrm_lifetime_cur curlft; 1701da177e4SLinus Torvalds struct timer_list timer; 1711da177e4SLinus Torvalds 1729afaca05SMasahide NAKAMURA /* Last used time */ 1739afaca05SMasahide NAKAMURA u64 lastused; 1749afaca05SMasahide NAKAMURA 1751da177e4SLinus Torvalds /* Reference to data common to all the instances of this 1761da177e4SLinus Torvalds * transformer. */ 1771da177e4SLinus Torvalds struct xfrm_type *type; 178b59f45d0SHerbert Xu struct xfrm_mode *mode; 1791da177e4SLinus Torvalds 180df71837dSTrent Jaeger /* Security context */ 181df71837dSTrent Jaeger struct xfrm_sec_ctx *security; 182df71837dSTrent Jaeger 1831da177e4SLinus Torvalds /* Private data of this transformer, format is opaque, 1841da177e4SLinus Torvalds * interpreted by xfrm_type methods. */ 1851da177e4SLinus Torvalds void *data; 1861da177e4SLinus Torvalds }; 1871da177e4SLinus Torvalds 1882717096aSJamal Hadi Salim /* xflags - make enum if more show up */ 1892717096aSJamal Hadi Salim #define XFRM_TIME_DEFER 1 1902717096aSJamal Hadi Salim 1911da177e4SLinus Torvalds enum { 1921da177e4SLinus Torvalds XFRM_STATE_VOID, 1931da177e4SLinus Torvalds XFRM_STATE_ACQ, 1941da177e4SLinus Torvalds XFRM_STATE_VALID, 1951da177e4SLinus Torvalds XFRM_STATE_ERROR, 1961da177e4SLinus Torvalds XFRM_STATE_EXPIRED, 1971da177e4SLinus Torvalds XFRM_STATE_DEAD 1981da177e4SLinus Torvalds }; 1991da177e4SLinus Torvalds 20026b15dadSJamal Hadi Salim /* callback structure passed from either netlink or pfkey */ 20126b15dadSJamal Hadi Salim struct km_event 20226b15dadSJamal Hadi Salim { 203bf08867fSHerbert Xu union { 204bf08867fSHerbert Xu u32 hard; 205bf08867fSHerbert Xu u32 proto; 206bf08867fSHerbert Xu u32 byid; 207f8cd5488SJamal Hadi Salim u32 aevent; 208f7b6983fSMasahide NAKAMURA u32 type; 209bf08867fSHerbert Xu } data; 210bf08867fSHerbert Xu 21126b15dadSJamal Hadi Salim u32 seq; 21226b15dadSJamal Hadi Salim u32 pid; 21326b15dadSJamal Hadi Salim u32 event; 21426b15dadSJamal Hadi Salim }; 21526b15dadSJamal Hadi Salim 2161da177e4SLinus Torvalds struct xfrm_type; 2171da177e4SLinus Torvalds struct xfrm_dst; 2181da177e4SLinus Torvalds struct xfrm_policy_afinfo { 2191da177e4SLinus Torvalds unsigned short family; 22073654d61SHerbert Xu struct xfrm_type *type_map[IPPROTO_MAX]; 221b59f45d0SHerbert Xu struct xfrm_mode *mode_map[XFRM_MODE_MAX]; 2221da177e4SLinus Torvalds struct dst_ops *dst_ops; 2231da177e4SLinus Torvalds void (*garbage_collect)(void); 2241da177e4SLinus Torvalds int (*dst_lookup)(struct xfrm_dst **dst, struct flowi *fl); 225a1e59abfSPatrick McHardy int (*get_saddr)(xfrm_address_t *saddr, xfrm_address_t *daddr); 2261da177e4SLinus Torvalds struct dst_entry *(*find_bundle)(struct flowi *fl, struct xfrm_policy *policy); 2271da177e4SLinus Torvalds int (*bundle_create)(struct xfrm_policy *policy, 2281da177e4SLinus Torvalds struct xfrm_state **xfrm, 2291da177e4SLinus Torvalds int nx, 2301da177e4SLinus Torvalds struct flowi *fl, 2311da177e4SLinus Torvalds struct dst_entry **dst_p); 2321da177e4SLinus Torvalds void (*decode_session)(struct sk_buff *skb, 2331da177e4SLinus Torvalds struct flowi *fl); 2341da177e4SLinus Torvalds }; 2351da177e4SLinus Torvalds 2361da177e4SLinus Torvalds extern int xfrm_policy_register_afinfo(struct xfrm_policy_afinfo *afinfo); 2371da177e4SLinus Torvalds extern int xfrm_policy_unregister_afinfo(struct xfrm_policy_afinfo *afinfo); 23826b15dadSJamal Hadi Salim extern void km_policy_notify(struct xfrm_policy *xp, int dir, struct km_event *c); 23926b15dadSJamal Hadi Salim extern void km_state_notify(struct xfrm_state *x, struct km_event *c); 2401da177e4SLinus Torvalds #define XFRM_ACQ_EXPIRES 30 2411da177e4SLinus Torvalds 2421da177e4SLinus Torvalds struct xfrm_tmpl; 243980ebd25SJamal Hadi Salim extern int km_query(struct xfrm_state *x, struct xfrm_tmpl *t, struct xfrm_policy *pol); 24453bc6b4dSJamal Hadi Salim extern void km_state_expired(struct xfrm_state *x, int hard, u32 pid); 24553bc6b4dSJamal Hadi Salim extern int __xfrm_state_delete(struct xfrm_state *x); 24653bc6b4dSJamal Hadi Salim 2471da177e4SLinus Torvalds struct xfrm_state_afinfo { 2481da177e4SLinus Torvalds unsigned short family; 249d094cd83SHerbert Xu int (*init_flags)(struct xfrm_state *x); 2501da177e4SLinus Torvalds void (*init_tempsel)(struct xfrm_state *x, struct flowi *fl, 2511da177e4SLinus Torvalds struct xfrm_tmpl *tmpl, 2521da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr); 25341a49cc3SMasahide NAKAMURA int (*tmpl_sort)(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n); 25441a49cc3SMasahide NAKAMURA int (*state_sort)(struct xfrm_state **dst, struct xfrm_state **src, int n); 2551da177e4SLinus Torvalds }; 2561da177e4SLinus Torvalds 2571da177e4SLinus Torvalds extern int xfrm_state_register_afinfo(struct xfrm_state_afinfo *afinfo); 2581da177e4SLinus Torvalds extern int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo); 2591da177e4SLinus Torvalds 2601da177e4SLinus Torvalds extern void xfrm_state_delete_tunnel(struct xfrm_state *x); 2611da177e4SLinus Torvalds 2621da177e4SLinus Torvalds struct xfrm_type 2631da177e4SLinus Torvalds { 2641da177e4SLinus Torvalds char *description; 2651da177e4SLinus Torvalds struct module *owner; 2661da177e4SLinus Torvalds __u8 proto; 2671b5c2299SMasahide NAKAMURA __u8 flags; 2681b5c2299SMasahide NAKAMURA #define XFRM_TYPE_NON_FRAGMENT 1 2691da177e4SLinus Torvalds 27072cb6962SHerbert Xu int (*init_state)(struct xfrm_state *x); 2711da177e4SLinus Torvalds void (*destructor)(struct xfrm_state *); 272e695633eSHerbert Xu int (*input)(struct xfrm_state *, struct sk_buff *skb); 2731da177e4SLinus Torvalds int (*output)(struct xfrm_state *, struct sk_buff *pskb); 274df0ba92aSMasahide NAKAMURA int (*reject)(struct xfrm_state *, struct sk_buff *, struct flowi *); 275aee5adb4SMasahide NAKAMURA int (*hdr_offset)(struct xfrm_state *, struct sk_buff *, u8 **); 27699505a84SMasahide NAKAMURA xfrm_address_t *(*local_addr)(struct xfrm_state *, xfrm_address_t *); 27799505a84SMasahide NAKAMURA xfrm_address_t *(*remote_addr)(struct xfrm_state *, xfrm_address_t *); 2781da177e4SLinus Torvalds /* Estimate maximal size of result of transformation of a dgram */ 2791da177e4SLinus Torvalds u32 (*get_max_size)(struct xfrm_state *, int size); 2801da177e4SLinus Torvalds }; 2811da177e4SLinus Torvalds 2821da177e4SLinus Torvalds extern int xfrm_register_type(struct xfrm_type *type, unsigned short family); 2831da177e4SLinus Torvalds extern int xfrm_unregister_type(struct xfrm_type *type, unsigned short family); 2841da177e4SLinus Torvalds extern struct xfrm_type *xfrm_get_type(u8 proto, unsigned short family); 2851da177e4SLinus Torvalds extern void xfrm_put_type(struct xfrm_type *type); 2861da177e4SLinus Torvalds 287b59f45d0SHerbert Xu struct xfrm_mode { 288b59f45d0SHerbert Xu int (*input)(struct xfrm_state *x, struct sk_buff *skb); 289eb878e84SJamal Hadi Salim int (*output)(struct xfrm_state *x,struct sk_buff *skb); 290b59f45d0SHerbert Xu 291b59f45d0SHerbert Xu struct module *owner; 292b59f45d0SHerbert Xu unsigned int encap; 293b59f45d0SHerbert Xu }; 294b59f45d0SHerbert Xu 295b59f45d0SHerbert Xu extern int xfrm_register_mode(struct xfrm_mode *mode, int family); 296b59f45d0SHerbert Xu extern int xfrm_unregister_mode(struct xfrm_mode *mode, int family); 297b59f45d0SHerbert Xu extern struct xfrm_mode *xfrm_get_mode(unsigned int encap, int family); 298b59f45d0SHerbert Xu extern void xfrm_put_mode(struct xfrm_mode *mode); 299b59f45d0SHerbert Xu 3001da177e4SLinus Torvalds struct xfrm_tmpl 3011da177e4SLinus Torvalds { 3021da177e4SLinus Torvalds /* id in template is interpreted as: 3031da177e4SLinus Torvalds * daddr - destination of tunnel, may be zero for transport mode. 3041da177e4SLinus Torvalds * spi - zero to acquire spi. Not zero if spi is static, then 3051da177e4SLinus Torvalds * daddr must be fixed too. 3061da177e4SLinus Torvalds * proto - AH/ESP/IPCOMP 3071da177e4SLinus Torvalds */ 3081da177e4SLinus Torvalds struct xfrm_id id; 3091da177e4SLinus Torvalds 3101da177e4SLinus Torvalds /* Source address of tunnel. Ignored, if it is not a tunnel. */ 3111da177e4SLinus Torvalds xfrm_address_t saddr; 3121da177e4SLinus Torvalds 3131da177e4SLinus Torvalds __u32 reqid; 3141da177e4SLinus Torvalds 3157e49e6deSMasahide NAKAMURA /* Mode: transport, tunnel etc. */ 3161da177e4SLinus Torvalds __u8 mode; 3171da177e4SLinus Torvalds 3181da177e4SLinus Torvalds /* Sharing mode: unique, this session only, this user only etc. */ 3191da177e4SLinus Torvalds __u8 share; 3201da177e4SLinus Torvalds 3211da177e4SLinus Torvalds /* May skip this transfomration if no SA is found */ 3221da177e4SLinus Torvalds __u8 optional; 3231da177e4SLinus Torvalds 3241da177e4SLinus Torvalds /* Bit mask of algos allowed for acquisition */ 3251da177e4SLinus Torvalds __u32 aalgos; 3261da177e4SLinus Torvalds __u32 ealgos; 3271da177e4SLinus Torvalds __u32 calgos; 3281da177e4SLinus Torvalds }; 3291da177e4SLinus Torvalds 330622dc828SMasahide NAKAMURA #define XFRM_MAX_DEPTH 6 3311da177e4SLinus Torvalds 3321da177e4SLinus Torvalds struct xfrm_policy 3331da177e4SLinus Torvalds { 3341da177e4SLinus Torvalds struct xfrm_policy *next; 3352518c7c2SDavid S. Miller struct hlist_node bydst; 3362518c7c2SDavid S. Miller struct hlist_node byidx; 3371da177e4SLinus Torvalds 3381da177e4SLinus Torvalds /* This lock only affects elements except for entry. */ 3391da177e4SLinus Torvalds rwlock_t lock; 3401da177e4SLinus Torvalds atomic_t refcnt; 3411da177e4SLinus Torvalds struct timer_list timer; 3421da177e4SLinus Torvalds 3434e81bb83SMasahide NAKAMURA u8 type; 3441da177e4SLinus Torvalds u32 priority; 3451da177e4SLinus Torvalds u32 index; 3461da177e4SLinus Torvalds struct xfrm_selector selector; 3471da177e4SLinus Torvalds struct xfrm_lifetime_cfg lft; 3481da177e4SLinus Torvalds struct xfrm_lifetime_cur curlft; 3491da177e4SLinus Torvalds struct dst_entry *bundles; 3501da177e4SLinus Torvalds __u16 family; 3511da177e4SLinus Torvalds __u8 action; 3521da177e4SLinus Torvalds __u8 flags; 3531da177e4SLinus Torvalds __u8 dead; 3541da177e4SLinus Torvalds __u8 xfrm_nr; 355df71837dSTrent Jaeger struct xfrm_sec_ctx *security; 3561da177e4SLinus Torvalds struct xfrm_tmpl xfrm_vec[XFRM_MAX_DEPTH]; 3571da177e4SLinus Torvalds }; 3581da177e4SLinus Torvalds 3591da177e4SLinus Torvalds #define XFRM_KM_TIMEOUT 30 360f8cd5488SJamal Hadi Salim /* which seqno */ 361f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_SEQ 1 362f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_OSEQ 2 363f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_SEQ_MASK 3 364f8cd5488SJamal Hadi Salim /* what happened */ 365f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_UPDATE XFRM_AE_CR 366f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_TIMEOUT XFRM_AE_CE 367f8cd5488SJamal Hadi Salim 368f8cd5488SJamal Hadi Salim /* default aevent timeout in units of 100ms */ 369f8cd5488SJamal Hadi Salim #define XFRM_AE_ETIME 10 370f8cd5488SJamal Hadi Salim /* Async Event timer multiplier */ 371f8cd5488SJamal Hadi Salim #define XFRM_AE_ETH_M 10 372f8cd5488SJamal Hadi Salim /* default seq threshold size */ 373f8cd5488SJamal Hadi Salim #define XFRM_AE_SEQT_SIZE 2 3741da177e4SLinus Torvalds 3751da177e4SLinus Torvalds struct xfrm_mgr 3761da177e4SLinus Torvalds { 3771da177e4SLinus Torvalds struct list_head list; 3781da177e4SLinus Torvalds char *id; 37926b15dadSJamal Hadi Salim int (*notify)(struct xfrm_state *x, struct km_event *c); 3801da177e4SLinus Torvalds int (*acquire)(struct xfrm_state *x, struct xfrm_tmpl *, struct xfrm_policy *xp, int dir); 381cb969f07SVenkat Yekkirala struct xfrm_policy *(*compile_policy)(struct sock *sk, int opt, u8 *data, int len, int *dir); 3825d36b180SAl Viro int (*new_mapping)(struct xfrm_state *x, xfrm_address_t *ipaddr, __be16 sport); 38326b15dadSJamal Hadi Salim int (*notify_policy)(struct xfrm_policy *x, int dir, struct km_event *c); 38497a64b45SMasahide NAKAMURA int (*report)(u8 proto, struct xfrm_selector *sel, xfrm_address_t *addr); 3851da177e4SLinus Torvalds }; 3861da177e4SLinus Torvalds 3871da177e4SLinus Torvalds extern int xfrm_register_km(struct xfrm_mgr *km); 3881da177e4SLinus Torvalds extern int xfrm_unregister_km(struct xfrm_mgr *km); 3891da177e4SLinus Torvalds 3902518c7c2SDavid S. Miller extern unsigned int xfrm_policy_count[XFRM_POLICY_MAX*2]; 3911da177e4SLinus Torvalds 3921da177e4SLinus Torvalds static inline void xfrm_pol_hold(struct xfrm_policy *policy) 3931da177e4SLinus Torvalds { 3941da177e4SLinus Torvalds if (likely(policy != NULL)) 3951da177e4SLinus Torvalds atomic_inc(&policy->refcnt); 3961da177e4SLinus Torvalds } 3971da177e4SLinus Torvalds 3981da177e4SLinus Torvalds extern void __xfrm_policy_destroy(struct xfrm_policy *policy); 3991da177e4SLinus Torvalds 4001da177e4SLinus Torvalds static inline void xfrm_pol_put(struct xfrm_policy *policy) 4011da177e4SLinus Torvalds { 4021da177e4SLinus Torvalds if (atomic_dec_and_test(&policy->refcnt)) 4031da177e4SLinus Torvalds __xfrm_policy_destroy(policy); 4041da177e4SLinus Torvalds } 4051da177e4SLinus Torvalds 4064e81bb83SMasahide NAKAMURA #ifdef CONFIG_XFRM_SUB_POLICY 4074e81bb83SMasahide NAKAMURA static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols) 4084e81bb83SMasahide NAKAMURA { 4094e81bb83SMasahide NAKAMURA int i; 4104e81bb83SMasahide NAKAMURA for (i = npols - 1; i >= 0; --i) 4114e81bb83SMasahide NAKAMURA xfrm_pol_put(pols[i]); 4124e81bb83SMasahide NAKAMURA } 4134e81bb83SMasahide NAKAMURA #else 4144e81bb83SMasahide NAKAMURA static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols) 4154e81bb83SMasahide NAKAMURA { 4164e81bb83SMasahide NAKAMURA xfrm_pol_put(pols[0]); 4174e81bb83SMasahide NAKAMURA } 4184e81bb83SMasahide NAKAMURA #endif 4194e81bb83SMasahide NAKAMURA 4201da177e4SLinus Torvalds extern void __xfrm_state_destroy(struct xfrm_state *); 4211da177e4SLinus Torvalds 42221380b81SHerbert Xu static inline void __xfrm_state_put(struct xfrm_state *x) 42321380b81SHerbert Xu { 42421380b81SHerbert Xu atomic_dec(&x->refcnt); 42521380b81SHerbert Xu } 42621380b81SHerbert Xu 4271da177e4SLinus Torvalds static inline void xfrm_state_put(struct xfrm_state *x) 4281da177e4SLinus Torvalds { 4291da177e4SLinus Torvalds if (atomic_dec_and_test(&x->refcnt)) 4301da177e4SLinus Torvalds __xfrm_state_destroy(x); 4311da177e4SLinus Torvalds } 4321da177e4SLinus Torvalds 4331da177e4SLinus Torvalds static inline void xfrm_state_hold(struct xfrm_state *x) 4341da177e4SLinus Torvalds { 4351da177e4SLinus Torvalds atomic_inc(&x->refcnt); 4361da177e4SLinus Torvalds } 4371da177e4SLinus Torvalds 4381da177e4SLinus Torvalds static __inline__ int addr_match(void *token1, void *token2, int prefixlen) 4391da177e4SLinus Torvalds { 4405f19343fSAl Viro __be32 *a1 = token1; 4415f19343fSAl Viro __be32 *a2 = token2; 4421da177e4SLinus Torvalds int pdw; 4431da177e4SLinus Torvalds int pbi; 4441da177e4SLinus Torvalds 4451da177e4SLinus Torvalds pdw = prefixlen >> 5; /* num of whole __u32 in prefix */ 4461da177e4SLinus Torvalds pbi = prefixlen & 0x1f; /* num of bits in incomplete u32 in prefix */ 4471da177e4SLinus Torvalds 4481da177e4SLinus Torvalds if (pdw) 4491da177e4SLinus Torvalds if (memcmp(a1, a2, pdw << 2)) 4501da177e4SLinus Torvalds return 0; 4511da177e4SLinus Torvalds 4521da177e4SLinus Torvalds if (pbi) { 4535f19343fSAl Viro __be32 mask; 4541da177e4SLinus Torvalds 4551da177e4SLinus Torvalds mask = htonl((0xffffffff) << (32 - pbi)); 4561da177e4SLinus Torvalds 4571da177e4SLinus Torvalds if ((a1[pdw] ^ a2[pdw]) & mask) 4581da177e4SLinus Torvalds return 0; 4591da177e4SLinus Torvalds } 4601da177e4SLinus Torvalds 4611da177e4SLinus Torvalds return 1; 4621da177e4SLinus Torvalds } 4631da177e4SLinus Torvalds 4641da177e4SLinus Torvalds static __inline__ 465f9d07e41SAl Viro __be16 xfrm_flowi_sport(struct flowi *fl) 4661da177e4SLinus Torvalds { 467f9d07e41SAl Viro __be16 port; 4681da177e4SLinus Torvalds switch(fl->proto) { 4691da177e4SLinus Torvalds case IPPROTO_TCP: 4701da177e4SLinus Torvalds case IPPROTO_UDP: 471ba4e58ecSGerrit Renker case IPPROTO_UDPLITE: 4721da177e4SLinus Torvalds case IPPROTO_SCTP: 4731da177e4SLinus Torvalds port = fl->fl_ip_sport; 4741da177e4SLinus Torvalds break; 4751da177e4SLinus Torvalds case IPPROTO_ICMP: 4761da177e4SLinus Torvalds case IPPROTO_ICMPV6: 4771da177e4SLinus Torvalds port = htons(fl->fl_icmp_type); 4781da177e4SLinus Torvalds break; 4792ce4272aSMasahide NAKAMURA #ifdef CONFIG_IPV6_MIP6 4802ce4272aSMasahide NAKAMURA case IPPROTO_MH: 4812ce4272aSMasahide NAKAMURA port = htons(fl->fl_mh_type); 4822ce4272aSMasahide NAKAMURA break; 4832ce4272aSMasahide NAKAMURA #endif 4841da177e4SLinus Torvalds default: 4851da177e4SLinus Torvalds port = 0; /*XXX*/ 4861da177e4SLinus Torvalds } 4871da177e4SLinus Torvalds return port; 4881da177e4SLinus Torvalds } 4891da177e4SLinus Torvalds 4901da177e4SLinus Torvalds static __inline__ 491f9d07e41SAl Viro __be16 xfrm_flowi_dport(struct flowi *fl) 4921da177e4SLinus Torvalds { 493f9d07e41SAl Viro __be16 port; 4941da177e4SLinus Torvalds switch(fl->proto) { 4951da177e4SLinus Torvalds case IPPROTO_TCP: 4961da177e4SLinus Torvalds case IPPROTO_UDP: 497ba4e58ecSGerrit Renker case IPPROTO_UDPLITE: 4981da177e4SLinus Torvalds case IPPROTO_SCTP: 4991da177e4SLinus Torvalds port = fl->fl_ip_dport; 5001da177e4SLinus Torvalds break; 5011da177e4SLinus Torvalds case IPPROTO_ICMP: 5021da177e4SLinus Torvalds case IPPROTO_ICMPV6: 5031da177e4SLinus Torvalds port = htons(fl->fl_icmp_code); 5041da177e4SLinus Torvalds break; 5051da177e4SLinus Torvalds default: 5061da177e4SLinus Torvalds port = 0; /*XXX*/ 5071da177e4SLinus Torvalds } 5081da177e4SLinus Torvalds return port; 5091da177e4SLinus Torvalds } 5101da177e4SLinus Torvalds 51177681021SAndrew Morton extern int xfrm_selector_match(struct xfrm_selector *sel, struct flowi *fl, 51277681021SAndrew Morton unsigned short family); 5131da177e4SLinus Torvalds 514df71837dSTrent Jaeger #ifdef CONFIG_SECURITY_NETWORK_XFRM 515df71837dSTrent Jaeger /* If neither has a context --> match 516df71837dSTrent Jaeger * Otherwise, both must have a context and the sids, doi, alg must match 517df71837dSTrent Jaeger */ 518df71837dSTrent Jaeger static inline int xfrm_sec_ctx_match(struct xfrm_sec_ctx *s1, struct xfrm_sec_ctx *s2) 519df71837dSTrent Jaeger { 520df71837dSTrent Jaeger return ((!s1 && !s2) || 521df71837dSTrent Jaeger (s1 && s2 && 522df71837dSTrent Jaeger (s1->ctx_sid == s2->ctx_sid) && 523df71837dSTrent Jaeger (s1->ctx_doi == s2->ctx_doi) && 524df71837dSTrent Jaeger (s1->ctx_alg == s2->ctx_alg))); 525df71837dSTrent Jaeger } 526df71837dSTrent Jaeger #else 527df71837dSTrent Jaeger static inline int xfrm_sec_ctx_match(struct xfrm_sec_ctx *s1, struct xfrm_sec_ctx *s2) 528df71837dSTrent Jaeger { 529df71837dSTrent Jaeger return 1; 530df71837dSTrent Jaeger } 531df71837dSTrent Jaeger #endif 532df71837dSTrent Jaeger 5331da177e4SLinus Torvalds /* A struct encoding bundle of transformations to apply to some set of flow. 5341da177e4SLinus Torvalds * 5351da177e4SLinus Torvalds * dst->child points to the next element of bundle. 5361da177e4SLinus Torvalds * dst->xfrm points to an instanse of transformer. 5371da177e4SLinus Torvalds * 5381da177e4SLinus Torvalds * Due to unfortunate limitations of current routing cache, which we 5391da177e4SLinus Torvalds * have no time to fix, it mirrors struct rtable and bound to the same 5401da177e4SLinus Torvalds * routing key, including saddr,daddr. However, we can have many of 5411da177e4SLinus Torvalds * bundles differing by session id. All the bundles grow from a parent 5421da177e4SLinus Torvalds * policy rule. 5431da177e4SLinus Torvalds */ 5441da177e4SLinus Torvalds struct xfrm_dst 5451da177e4SLinus Torvalds { 5461da177e4SLinus Torvalds union { 5471da177e4SLinus Torvalds struct xfrm_dst *next; 5481da177e4SLinus Torvalds struct dst_entry dst; 5491da177e4SLinus Torvalds struct rtable rt; 5501da177e4SLinus Torvalds struct rt6_info rt6; 5511da177e4SLinus Torvalds } u; 5521da177e4SLinus Torvalds struct dst_entry *route; 5539d4a706dSDavid S. Miller u32 genid; 5541da177e4SLinus Torvalds u32 route_mtu_cached; 5551da177e4SLinus Torvalds u32 child_mtu_cached; 55692d63decSHideaki YOSHIFUJI u32 route_cookie; 55792d63decSHideaki YOSHIFUJI u32 path_cookie; 5581da177e4SLinus Torvalds }; 5591da177e4SLinus Torvalds 560aabc9761SHerbert Xu static inline void xfrm_dst_destroy(struct xfrm_dst *xdst) 561aabc9761SHerbert Xu { 562aabc9761SHerbert Xu dst_release(xdst->route); 563aabc9761SHerbert Xu if (likely(xdst->u.dst.xfrm)) 564aabc9761SHerbert Xu xfrm_state_put(xdst->u.dst.xfrm); 565aabc9761SHerbert Xu } 566aabc9761SHerbert Xu 567aabc9761SHerbert Xu extern void xfrm_dst_ifdown(struct dst_entry *dst, struct net_device *dev); 568aabc9761SHerbert Xu 5691da177e4SLinus Torvalds struct sec_path 5701da177e4SLinus Torvalds { 5711da177e4SLinus Torvalds atomic_t refcnt; 5721da177e4SLinus Torvalds int len; 573dbe5b4aaSHerbert Xu struct xfrm_state *xvec[XFRM_MAX_DEPTH]; 5741da177e4SLinus Torvalds }; 5751da177e4SLinus Torvalds 5761da177e4SLinus Torvalds static inline struct sec_path * 5771da177e4SLinus Torvalds secpath_get(struct sec_path *sp) 5781da177e4SLinus Torvalds { 5791da177e4SLinus Torvalds if (sp) 5801da177e4SLinus Torvalds atomic_inc(&sp->refcnt); 5811da177e4SLinus Torvalds return sp; 5821da177e4SLinus Torvalds } 5831da177e4SLinus Torvalds 5841da177e4SLinus Torvalds extern void __secpath_destroy(struct sec_path *sp); 5851da177e4SLinus Torvalds 5861da177e4SLinus Torvalds static inline void 5871da177e4SLinus Torvalds secpath_put(struct sec_path *sp) 5881da177e4SLinus Torvalds { 5891da177e4SLinus Torvalds if (sp && atomic_dec_and_test(&sp->refcnt)) 5901da177e4SLinus Torvalds __secpath_destroy(sp); 5911da177e4SLinus Torvalds } 5921da177e4SLinus Torvalds 5931da177e4SLinus Torvalds extern struct sec_path *secpath_dup(struct sec_path *src); 5941da177e4SLinus Torvalds 5951da177e4SLinus Torvalds static inline void 5961da177e4SLinus Torvalds secpath_reset(struct sk_buff *skb) 5971da177e4SLinus Torvalds { 5981da177e4SLinus Torvalds #ifdef CONFIG_XFRM 5991da177e4SLinus Torvalds secpath_put(skb->sp); 6001da177e4SLinus Torvalds skb->sp = NULL; 6011da177e4SLinus Torvalds #endif 6021da177e4SLinus Torvalds } 6031da177e4SLinus Torvalds 6041da177e4SLinus Torvalds static inline int 605a1e59abfSPatrick McHardy xfrm_addr_any(xfrm_address_t *addr, unsigned short family) 606a1e59abfSPatrick McHardy { 607a1e59abfSPatrick McHardy switch (family) { 608a1e59abfSPatrick McHardy case AF_INET: 609a1e59abfSPatrick McHardy return addr->a4 == 0; 610a1e59abfSPatrick McHardy case AF_INET6: 611a1e59abfSPatrick McHardy return ipv6_addr_any((struct in6_addr *)&addr->a6); 612a1e59abfSPatrick McHardy } 613a1e59abfSPatrick McHardy return 0; 614a1e59abfSPatrick McHardy } 615a1e59abfSPatrick McHardy 616a1e59abfSPatrick McHardy static inline int 6171da177e4SLinus Torvalds __xfrm4_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x) 6181da177e4SLinus Torvalds { 6191da177e4SLinus Torvalds return (tmpl->saddr.a4 && 6201da177e4SLinus Torvalds tmpl->saddr.a4 != x->props.saddr.a4); 6211da177e4SLinus Torvalds } 6221da177e4SLinus Torvalds 6231da177e4SLinus Torvalds static inline int 6241da177e4SLinus Torvalds __xfrm6_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x) 6251da177e4SLinus Torvalds { 6261da177e4SLinus Torvalds return (!ipv6_addr_any((struct in6_addr*)&tmpl->saddr) && 6271da177e4SLinus Torvalds ipv6_addr_cmp((struct in6_addr *)&tmpl->saddr, (struct in6_addr*)&x->props.saddr)); 6281da177e4SLinus Torvalds } 6291da177e4SLinus Torvalds 6301da177e4SLinus Torvalds static inline int 6311da177e4SLinus Torvalds xfrm_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x, unsigned short family) 6321da177e4SLinus Torvalds { 6331da177e4SLinus Torvalds switch (family) { 6341da177e4SLinus Torvalds case AF_INET: 6351da177e4SLinus Torvalds return __xfrm4_state_addr_cmp(tmpl, x); 6361da177e4SLinus Torvalds case AF_INET6: 6371da177e4SLinus Torvalds return __xfrm6_state_addr_cmp(tmpl, x); 6381da177e4SLinus Torvalds } 6391da177e4SLinus Torvalds return !0; 6401da177e4SLinus Torvalds } 6411da177e4SLinus Torvalds 6421da177e4SLinus Torvalds #ifdef CONFIG_XFRM 6431da177e4SLinus Torvalds 6441da177e4SLinus Torvalds extern int __xfrm_policy_check(struct sock *, int dir, struct sk_buff *skb, unsigned short family); 6451da177e4SLinus Torvalds 6461da177e4SLinus Torvalds static inline int xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) 6471da177e4SLinus Torvalds { 6481da177e4SLinus Torvalds if (sk && sk->sk_policy[XFRM_POLICY_IN]) 6491da177e4SLinus Torvalds return __xfrm_policy_check(sk, dir, skb, family); 6501da177e4SLinus Torvalds 6512518c7c2SDavid S. Miller return (!xfrm_policy_count[dir] && !skb->sp) || 6521da177e4SLinus Torvalds (skb->dst->flags & DST_NOPOLICY) || 6531da177e4SLinus Torvalds __xfrm_policy_check(sk, dir, skb, family); 6541da177e4SLinus Torvalds } 6551da177e4SLinus Torvalds 6561da177e4SLinus Torvalds static inline int xfrm4_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 6571da177e4SLinus Torvalds { 6581da177e4SLinus Torvalds return xfrm_policy_check(sk, dir, skb, AF_INET); 6591da177e4SLinus Torvalds } 6601da177e4SLinus Torvalds 6611da177e4SLinus Torvalds static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 6621da177e4SLinus Torvalds { 6631da177e4SLinus Torvalds return xfrm_policy_check(sk, dir, skb, AF_INET6); 6641da177e4SLinus Torvalds } 6651da177e4SLinus Torvalds 6663e3850e9SPatrick McHardy extern int xfrm_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family); 6671da177e4SLinus Torvalds extern int __xfrm_route_forward(struct sk_buff *skb, unsigned short family); 6681da177e4SLinus Torvalds 6691da177e4SLinus Torvalds static inline int xfrm_route_forward(struct sk_buff *skb, unsigned short family) 6701da177e4SLinus Torvalds { 6712518c7c2SDavid S. Miller return !xfrm_policy_count[XFRM_POLICY_OUT] || 6721da177e4SLinus Torvalds (skb->dst->flags & DST_NOXFRM) || 6731da177e4SLinus Torvalds __xfrm_route_forward(skb, family); 6741da177e4SLinus Torvalds } 6751da177e4SLinus Torvalds 6761da177e4SLinus Torvalds static inline int xfrm4_route_forward(struct sk_buff *skb) 6771da177e4SLinus Torvalds { 6781da177e4SLinus Torvalds return xfrm_route_forward(skb, AF_INET); 6791da177e4SLinus Torvalds } 6801da177e4SLinus Torvalds 6811da177e4SLinus Torvalds static inline int xfrm6_route_forward(struct sk_buff *skb) 6821da177e4SLinus Torvalds { 6831da177e4SLinus Torvalds return xfrm_route_forward(skb, AF_INET6); 6841da177e4SLinus Torvalds } 6851da177e4SLinus Torvalds 6861da177e4SLinus Torvalds extern int __xfrm_sk_clone_policy(struct sock *sk); 6871da177e4SLinus Torvalds 6881da177e4SLinus Torvalds static inline int xfrm_sk_clone_policy(struct sock *sk) 6891da177e4SLinus Torvalds { 6901da177e4SLinus Torvalds if (unlikely(sk->sk_policy[0] || sk->sk_policy[1])) 6911da177e4SLinus Torvalds return __xfrm_sk_clone_policy(sk); 6921da177e4SLinus Torvalds return 0; 6931da177e4SLinus Torvalds } 6941da177e4SLinus Torvalds 6954666faabSHerbert Xu extern int xfrm_policy_delete(struct xfrm_policy *pol, int dir); 6961da177e4SLinus Torvalds 6971da177e4SLinus Torvalds static inline void xfrm_sk_free_policy(struct sock *sk) 6981da177e4SLinus Torvalds { 6991da177e4SLinus Torvalds if (unlikely(sk->sk_policy[0] != NULL)) { 7001da177e4SLinus Torvalds xfrm_policy_delete(sk->sk_policy[0], XFRM_POLICY_MAX); 7011da177e4SLinus Torvalds sk->sk_policy[0] = NULL; 7021da177e4SLinus Torvalds } 7031da177e4SLinus Torvalds if (unlikely(sk->sk_policy[1] != NULL)) { 7041da177e4SLinus Torvalds xfrm_policy_delete(sk->sk_policy[1], XFRM_POLICY_MAX+1); 7051da177e4SLinus Torvalds sk->sk_policy[1] = NULL; 7061da177e4SLinus Torvalds } 7071da177e4SLinus Torvalds } 7081da177e4SLinus Torvalds 7091da177e4SLinus Torvalds #else 7101da177e4SLinus Torvalds 7111da177e4SLinus Torvalds static inline void xfrm_sk_free_policy(struct sock *sk) {} 7121da177e4SLinus Torvalds static inline int xfrm_sk_clone_policy(struct sock *sk) { return 0; } 7131da177e4SLinus Torvalds static inline int xfrm6_route_forward(struct sk_buff *skb) { return 1; } 7141da177e4SLinus Torvalds static inline int xfrm4_route_forward(struct sk_buff *skb) { return 1; } 7151da177e4SLinus Torvalds static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 7161da177e4SLinus Torvalds { 7171da177e4SLinus Torvalds return 1; 7181da177e4SLinus Torvalds } 7191da177e4SLinus Torvalds static inline int xfrm4_policy_check(struct sock *sk, int dir, struct sk_buff *skb) 7201da177e4SLinus Torvalds { 7211da177e4SLinus Torvalds return 1; 7221da177e4SLinus Torvalds } 7231da177e4SLinus Torvalds static inline int xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family) 7241da177e4SLinus Torvalds { 7251da177e4SLinus Torvalds return 1; 7261da177e4SLinus Torvalds } 7271da177e4SLinus Torvalds #endif 7281da177e4SLinus Torvalds 7291da177e4SLinus Torvalds static __inline__ 7301da177e4SLinus Torvalds xfrm_address_t *xfrm_flowi_daddr(struct flowi *fl, unsigned short family) 7311da177e4SLinus Torvalds { 7321da177e4SLinus Torvalds switch (family){ 7331da177e4SLinus Torvalds case AF_INET: 7341da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl4_dst; 7351da177e4SLinus Torvalds case AF_INET6: 7361da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl6_dst; 7371da177e4SLinus Torvalds } 7381da177e4SLinus Torvalds return NULL; 7391da177e4SLinus Torvalds } 7401da177e4SLinus Torvalds 7411da177e4SLinus Torvalds static __inline__ 7421da177e4SLinus Torvalds xfrm_address_t *xfrm_flowi_saddr(struct flowi *fl, unsigned short family) 7431da177e4SLinus Torvalds { 7441da177e4SLinus Torvalds switch (family){ 7451da177e4SLinus Torvalds case AF_INET: 7461da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl4_src; 7471da177e4SLinus Torvalds case AF_INET6: 7481da177e4SLinus Torvalds return (xfrm_address_t *)&fl->fl6_src; 7491da177e4SLinus Torvalds } 7501da177e4SLinus Torvalds return NULL; 7511da177e4SLinus Torvalds } 7521da177e4SLinus Torvalds 7531da177e4SLinus Torvalds static __inline__ int 7541da177e4SLinus Torvalds __xfrm4_state_addr_check(struct xfrm_state *x, 7551da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr) 7561da177e4SLinus Torvalds { 7571da177e4SLinus Torvalds if (daddr->a4 == x->id.daddr.a4 && 7581da177e4SLinus Torvalds (saddr->a4 == x->props.saddr.a4 || !saddr->a4 || !x->props.saddr.a4)) 7591da177e4SLinus Torvalds return 1; 7601da177e4SLinus Torvalds return 0; 7611da177e4SLinus Torvalds } 7621da177e4SLinus Torvalds 7631da177e4SLinus Torvalds static __inline__ int 7641da177e4SLinus Torvalds __xfrm6_state_addr_check(struct xfrm_state *x, 7651da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr) 7661da177e4SLinus Torvalds { 7671da177e4SLinus Torvalds if (!ipv6_addr_cmp((struct in6_addr *)daddr, (struct in6_addr *)&x->id.daddr) && 7681da177e4SLinus Torvalds (!ipv6_addr_cmp((struct in6_addr *)saddr, (struct in6_addr *)&x->props.saddr)|| 7691da177e4SLinus Torvalds ipv6_addr_any((struct in6_addr *)saddr) || 7701da177e4SLinus Torvalds ipv6_addr_any((struct in6_addr *)&x->props.saddr))) 7711da177e4SLinus Torvalds return 1; 7721da177e4SLinus Torvalds return 0; 7731da177e4SLinus Torvalds } 7741da177e4SLinus Torvalds 7751da177e4SLinus Torvalds static __inline__ int 7761da177e4SLinus Torvalds xfrm_state_addr_check(struct xfrm_state *x, 7771da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr, 7781da177e4SLinus Torvalds unsigned short family) 7791da177e4SLinus Torvalds { 7801da177e4SLinus Torvalds switch (family) { 7811da177e4SLinus Torvalds case AF_INET: 7821da177e4SLinus Torvalds return __xfrm4_state_addr_check(x, daddr, saddr); 7831da177e4SLinus Torvalds case AF_INET6: 7841da177e4SLinus Torvalds return __xfrm6_state_addr_check(x, daddr, saddr); 7851da177e4SLinus Torvalds } 7861da177e4SLinus Torvalds return 0; 7871da177e4SLinus Torvalds } 7881da177e4SLinus Torvalds 789e53820deSMasahide NAKAMURA static __inline__ int 790e53820deSMasahide NAKAMURA xfrm_state_addr_flow_check(struct xfrm_state *x, struct flowi *fl, 791e53820deSMasahide NAKAMURA unsigned short family) 792e53820deSMasahide NAKAMURA { 793e53820deSMasahide NAKAMURA switch (family) { 794e53820deSMasahide NAKAMURA case AF_INET: 795e53820deSMasahide NAKAMURA return __xfrm4_state_addr_check(x, 796e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl4_dst, 797e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl4_src); 798e53820deSMasahide NAKAMURA case AF_INET6: 799e53820deSMasahide NAKAMURA return __xfrm6_state_addr_check(x, 800e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl6_dst, 801e53820deSMasahide NAKAMURA (xfrm_address_t *)&fl->fl6_src); 802e53820deSMasahide NAKAMURA } 803e53820deSMasahide NAKAMURA return 0; 804e53820deSMasahide NAKAMURA } 805e53820deSMasahide NAKAMURA 8061da177e4SLinus Torvalds static inline int xfrm_state_kern(struct xfrm_state *x) 8071da177e4SLinus Torvalds { 8081da177e4SLinus Torvalds return atomic_read(&x->tunnel_users); 8091da177e4SLinus Torvalds } 8101da177e4SLinus Torvalds 8115794708fSMasahide NAKAMURA static inline int xfrm_id_proto_match(u8 proto, u8 userproto) 8125794708fSMasahide NAKAMURA { 813dc00a525SMasahide NAKAMURA return (!userproto || proto == userproto || 814dc00a525SMasahide NAKAMURA (userproto == IPSEC_PROTO_ANY && (proto == IPPROTO_AH || 815dc00a525SMasahide NAKAMURA proto == IPPROTO_ESP || 816dc00a525SMasahide NAKAMURA proto == IPPROTO_COMP))); 8175794708fSMasahide NAKAMURA } 8185794708fSMasahide NAKAMURA 8191da177e4SLinus Torvalds /* 8201da177e4SLinus Torvalds * xfrm algorithm information 8211da177e4SLinus Torvalds */ 8221da177e4SLinus Torvalds struct xfrm_algo_auth_info { 8231da177e4SLinus Torvalds u16 icv_truncbits; 8241da177e4SLinus Torvalds u16 icv_fullbits; 8251da177e4SLinus Torvalds }; 8261da177e4SLinus Torvalds 8271da177e4SLinus Torvalds struct xfrm_algo_encr_info { 8281da177e4SLinus Torvalds u16 blockbits; 8291da177e4SLinus Torvalds u16 defkeybits; 8301da177e4SLinus Torvalds }; 8311da177e4SLinus Torvalds 8321da177e4SLinus Torvalds struct xfrm_algo_comp_info { 8331da177e4SLinus Torvalds u16 threshold; 8341da177e4SLinus Torvalds }; 8351da177e4SLinus Torvalds 8361da177e4SLinus Torvalds struct xfrm_algo_desc { 8371da177e4SLinus Torvalds char *name; 83804ff1260SHerbert Xu char *compat; 8391da177e4SLinus Torvalds u8 available:1; 8401da177e4SLinus Torvalds union { 8411da177e4SLinus Torvalds struct xfrm_algo_auth_info auth; 8421da177e4SLinus Torvalds struct xfrm_algo_encr_info encr; 8431da177e4SLinus Torvalds struct xfrm_algo_comp_info comp; 8441da177e4SLinus Torvalds } uinfo; 8451da177e4SLinus Torvalds struct sadb_alg desc; 8461da177e4SLinus Torvalds }; 8471da177e4SLinus Torvalds 8481da177e4SLinus Torvalds /* XFRM tunnel handlers. */ 8491da177e4SLinus Torvalds struct xfrm_tunnel { 8501da177e4SLinus Torvalds int (*handler)(struct sk_buff *skb); 851d2acc347SHerbert Xu int (*err_handler)(struct sk_buff *skb, __u32 info); 852d2acc347SHerbert Xu 853d2acc347SHerbert Xu struct xfrm_tunnel *next; 854d2acc347SHerbert Xu int priority; 8551da177e4SLinus Torvalds }; 8561da177e4SLinus Torvalds 8571da177e4SLinus Torvalds struct xfrm6_tunnel { 858d2acc347SHerbert Xu int (*handler)(struct sk_buff *skb); 859d2acc347SHerbert Xu int (*err_handler)(struct sk_buff *skb, struct inet6_skb_parm *opt, 86004ce6909SAl Viro int type, int code, int offset, __be32 info); 861d2acc347SHerbert Xu struct xfrm6_tunnel *next; 862d2acc347SHerbert Xu int priority; 8631da177e4SLinus Torvalds }; 8641da177e4SLinus Torvalds 8651da177e4SLinus Torvalds extern void xfrm_init(void); 8661da177e4SLinus Torvalds extern void xfrm4_init(void); 8671da177e4SLinus Torvalds extern void xfrm6_init(void); 8681da177e4SLinus Torvalds extern void xfrm6_fini(void); 8691da177e4SLinus Torvalds extern void xfrm_state_init(void); 8701da177e4SLinus Torvalds extern void xfrm4_state_init(void); 8711da177e4SLinus Torvalds extern void xfrm6_state_init(void); 8721da177e4SLinus Torvalds extern void xfrm6_state_fini(void); 8731da177e4SLinus Torvalds 8741da177e4SLinus Torvalds extern int xfrm_state_walk(u8 proto, int (*func)(struct xfrm_state *, int, void*), void *); 8751da177e4SLinus Torvalds extern struct xfrm_state *xfrm_state_alloc(void); 8761da177e4SLinus Torvalds extern struct xfrm_state *xfrm_state_find(xfrm_address_t *daddr, xfrm_address_t *saddr, 8771da177e4SLinus Torvalds struct flowi *fl, struct xfrm_tmpl *tmpl, 8781da177e4SLinus Torvalds struct xfrm_policy *pol, int *err, 8791da177e4SLinus Torvalds unsigned short family); 8801da177e4SLinus Torvalds extern int xfrm_state_check_expire(struct xfrm_state *x); 8811da177e4SLinus Torvalds extern void xfrm_state_insert(struct xfrm_state *x); 8821da177e4SLinus Torvalds extern int xfrm_state_add(struct xfrm_state *x); 8831da177e4SLinus Torvalds extern int xfrm_state_update(struct xfrm_state *x); 884a94cfd19SAl Viro extern struct xfrm_state *xfrm_state_lookup(xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family); 885eb2971b6SMasahide NAKAMURA extern struct xfrm_state *xfrm_state_lookup_byaddr(xfrm_address_t *daddr, xfrm_address_t *saddr, u8 proto, unsigned short family); 88641a49cc3SMasahide NAKAMURA #ifdef CONFIG_XFRM_SUB_POLICY 88741a49cc3SMasahide NAKAMURA extern int xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, 88841a49cc3SMasahide NAKAMURA int n, unsigned short family); 88941a49cc3SMasahide NAKAMURA extern int xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, 89041a49cc3SMasahide NAKAMURA int n, unsigned short family); 89141a49cc3SMasahide NAKAMURA #else 89241a49cc3SMasahide NAKAMURA static inline int xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, 89341a49cc3SMasahide NAKAMURA int n, unsigned short family) 89441a49cc3SMasahide NAKAMURA { 89541a49cc3SMasahide NAKAMURA return -ENOSYS; 89641a49cc3SMasahide NAKAMURA } 89741a49cc3SMasahide NAKAMURA 89841a49cc3SMasahide NAKAMURA static inline int xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src, 89941a49cc3SMasahide NAKAMURA int n, unsigned short family) 90041a49cc3SMasahide NAKAMURA { 90141a49cc3SMasahide NAKAMURA return -ENOSYS; 90241a49cc3SMasahide NAKAMURA } 90341a49cc3SMasahide NAKAMURA #endif 9041da177e4SLinus Torvalds extern struct xfrm_state *xfrm_find_acq_byseq(u32 seq); 90526b15dadSJamal Hadi Salim extern int xfrm_state_delete(struct xfrm_state *x); 9061da177e4SLinus Torvalds extern void xfrm_state_flush(u8 proto); 907a252cc23SAl Viro extern int xfrm_replay_check(struct xfrm_state *x, __be32 seq); 90861f4627bSAl Viro extern void xfrm_replay_advance(struct xfrm_state *x, __be32 seq); 909f8cd5488SJamal Hadi Salim extern void xfrm_replay_notify(struct xfrm_state *x, int event); 9101da177e4SLinus Torvalds extern int xfrm_state_check(struct xfrm_state *x, struct sk_buff *skb); 9111da177e4SLinus Torvalds extern int xfrm_state_mtu(struct xfrm_state *x, int mtu); 91272cb6962SHerbert Xu extern int xfrm_init_state(struct xfrm_state *x); 9131da177e4SLinus Torvalds extern int xfrm4_rcv(struct sk_buff *skb); 9141da177e4SLinus Torvalds extern int xfrm4_output(struct sk_buff *skb); 9151da177e4SLinus Torvalds extern int xfrm4_tunnel_register(struct xfrm_tunnel *handler); 9161da177e4SLinus Torvalds extern int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler); 917a252cc23SAl Viro extern int xfrm6_rcv_spi(struct sk_buff *skb, __be32 spi); 918951dbc8aSPatrick McHardy extern int xfrm6_rcv(struct sk_buff **pskb); 919fbd9a5b4SMasahide NAKAMURA extern int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr, 920fbd9a5b4SMasahide NAKAMURA xfrm_address_t *saddr, u8 proto); 9211da177e4SLinus Torvalds extern int xfrm6_tunnel_register(struct xfrm6_tunnel *handler); 9221da177e4SLinus Torvalds extern int xfrm6_tunnel_deregister(struct xfrm6_tunnel *handler); 9238c689a6eSAl Viro extern __be32 xfrm6_tunnel_alloc_spi(xfrm_address_t *saddr); 9241da177e4SLinus Torvalds extern void xfrm6_tunnel_free_spi(xfrm_address_t *saddr); 9258c689a6eSAl Viro extern __be32 xfrm6_tunnel_spi_lookup(xfrm_address_t *saddr); 9261da177e4SLinus Torvalds extern int xfrm6_output(struct sk_buff *skb); 927aee5adb4SMasahide NAKAMURA extern int xfrm6_find_1stfragopt(struct xfrm_state *x, struct sk_buff *skb, 928aee5adb4SMasahide NAKAMURA u8 **prevhdr); 9291da177e4SLinus Torvalds 9301da177e4SLinus Torvalds #ifdef CONFIG_XFRM 9311da177e4SLinus Torvalds extern int xfrm4_rcv_encap(struct sk_buff *skb, __u16 encap_type); 9321da177e4SLinus Torvalds extern int xfrm_user_policy(struct sock *sk, int optname, u8 __user *optval, int optlen); 9331da177e4SLinus Torvalds extern int xfrm_dst_lookup(struct xfrm_dst **dst, struct flowi *fl, unsigned short family); 9341da177e4SLinus Torvalds #else 9351da177e4SLinus Torvalds static inline int xfrm_user_policy(struct sock *sk, int optname, u8 __user *optval, int optlen) 9361da177e4SLinus Torvalds { 9371da177e4SLinus Torvalds return -ENOPROTOOPT; 9381da177e4SLinus Torvalds } 9391da177e4SLinus Torvalds 9401da177e4SLinus Torvalds static inline int xfrm4_rcv_encap(struct sk_buff *skb, __u16 encap_type) 9411da177e4SLinus Torvalds { 9421da177e4SLinus Torvalds /* should not happen */ 9431da177e4SLinus Torvalds kfree_skb(skb); 9441da177e4SLinus Torvalds return 0; 9451da177e4SLinus Torvalds } 9461da177e4SLinus Torvalds static inline int xfrm_dst_lookup(struct xfrm_dst **dst, struct flowi *fl, unsigned short family) 9471da177e4SLinus Torvalds { 9481da177e4SLinus Torvalds return -EINVAL; 9491da177e4SLinus Torvalds } 9501da177e4SLinus Torvalds #endif 9511da177e4SLinus Torvalds 952dd0fc66fSAl Viro struct xfrm_policy *xfrm_policy_alloc(gfp_t gfp); 9534e81bb83SMasahide NAKAMURA extern int xfrm_policy_walk(u8 type, int (*func)(struct xfrm_policy *, int, int, void*), void *); 9541da177e4SLinus Torvalds int xfrm_policy_insert(int dir, struct xfrm_policy *policy, int excl); 9554e81bb83SMasahide NAKAMURA struct xfrm_policy *xfrm_policy_bysel_ctx(u8 type, int dir, 9564e81bb83SMasahide NAKAMURA struct xfrm_selector *sel, 957df71837dSTrent Jaeger struct xfrm_sec_ctx *ctx, int delete); 9584e81bb83SMasahide NAKAMURA struct xfrm_policy *xfrm_policy_byid(u8, int dir, u32 id, int delete); 9594e81bb83SMasahide NAKAMURA void xfrm_policy_flush(u8 type); 9601da177e4SLinus Torvalds u32 xfrm_get_acqseq(void); 96126977b4eSAl Viro void xfrm_alloc_spi(struct xfrm_state *x, __be32 minspi, __be32 maxspi); 9621da177e4SLinus Torvalds struct xfrm_state * xfrm_find_acq(u8 mode, u32 reqid, u8 proto, 9631da177e4SLinus Torvalds xfrm_address_t *daddr, xfrm_address_t *saddr, 9641da177e4SLinus Torvalds int create, unsigned short family); 9654e81bb83SMasahide NAKAMURA extern void xfrm_policy_flush(u8 type); 9661da177e4SLinus Torvalds extern int xfrm_sk_policy_insert(struct sock *sk, int dir, struct xfrm_policy *pol); 9675b368e61SVenkat Yekkirala extern int xfrm_bundle_ok(struct xfrm_policy *pol, struct xfrm_dst *xdst, 9685b368e61SVenkat Yekkirala struct flowi *fl, int family, int strict); 9691da177e4SLinus Torvalds extern void xfrm_init_pmtu(struct dst_entry *dst); 9701da177e4SLinus Torvalds 9711da177e4SLinus Torvalds extern wait_queue_head_t km_waitq; 9725d36b180SAl Viro extern int km_new_mapping(struct xfrm_state *x, xfrm_address_t *ipaddr, __be16 sport); 9736c5c8ca7SJamal Hadi Salim extern void km_policy_expired(struct xfrm_policy *pol, int dir, int hard, u32 pid); 97497a64b45SMasahide NAKAMURA extern int km_report(u8 proto, struct xfrm_selector *sel, xfrm_address_t *addr); 9751da177e4SLinus Torvalds 9761da177e4SLinus Torvalds extern void xfrm_input_init(void); 9776067b2baSAl Viro extern int xfrm_parse_spi(struct sk_buff *skb, u8 nexthdr, __be32 *spi, __be32 *seq); 9781da177e4SLinus Torvalds 9791da177e4SLinus Torvalds extern void xfrm_probe_algs(void); 9801da177e4SLinus Torvalds extern int xfrm_count_auth_supported(void); 9811da177e4SLinus Torvalds extern int xfrm_count_enc_supported(void); 9821da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byidx(unsigned int idx); 9831da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byidx(unsigned int idx); 9841da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byid(int alg_id); 9851da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byid(int alg_id); 9861da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_calg_get_byid(int alg_id); 9871da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byname(char *name, int probe); 9881da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byname(char *name, int probe); 9891da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_calg_get_byname(char *name, int probe); 9901da177e4SLinus Torvalds 99107d4ee58SHerbert Xu struct hash_desc; 9929409f38aSHerbert Xu struct scatterlist; 99307d4ee58SHerbert Xu typedef int (icv_update_fn_t)(struct hash_desc *, struct scatterlist *, 99407d4ee58SHerbert Xu unsigned int); 9951da177e4SLinus Torvalds 99607d4ee58SHerbert Xu extern int skb_icv_walk(const struct sk_buff *skb, struct hash_desc *tfm, 9971da177e4SLinus Torvalds int offset, int len, icv_update_fn_t icv_update); 9981da177e4SLinus Torvalds 9991da177e4SLinus Torvalds static inline int xfrm_addr_cmp(xfrm_address_t *a, xfrm_address_t *b, 10001da177e4SLinus Torvalds int family) 10011da177e4SLinus Torvalds { 10021da177e4SLinus Torvalds switch (family) { 10031da177e4SLinus Torvalds default: 10041da177e4SLinus Torvalds case AF_INET: 10058c689a6eSAl Viro return (__force __u32)a->a4 - (__force __u32)b->a4; 10061da177e4SLinus Torvalds case AF_INET6: 10071da177e4SLinus Torvalds return ipv6_addr_cmp((struct in6_addr *)a, 10081da177e4SLinus Torvalds (struct in6_addr *)b); 10091da177e4SLinus Torvalds } 10101da177e4SLinus Torvalds } 10111da177e4SLinus Torvalds 101277d8d7a6SHerbert Xu static inline int xfrm_policy_id2dir(u32 index) 101377d8d7a6SHerbert Xu { 101477d8d7a6SHerbert Xu return index & 7; 101577d8d7a6SHerbert Xu } 101677d8d7a6SHerbert Xu 1017f8cd5488SJamal Hadi Salim static inline int xfrm_aevent_is_on(void) 1018f8cd5488SJamal Hadi Salim { 1019be33690dSPatrick McHardy struct sock *nlsk; 1020be33690dSPatrick McHardy int ret = 0; 1021be33690dSPatrick McHardy 1022be33690dSPatrick McHardy rcu_read_lock(); 1023be33690dSPatrick McHardy nlsk = rcu_dereference(xfrm_nl); 1024be33690dSPatrick McHardy if (nlsk) 1025be33690dSPatrick McHardy ret = netlink_has_listeners(nlsk, XFRMNLGRP_AEVENTS); 1026be33690dSPatrick McHardy rcu_read_unlock(); 1027be33690dSPatrick McHardy return ret; 1028f8cd5488SJamal Hadi Salim } 1029f8cd5488SJamal Hadi Salim 1030f8cd5488SJamal Hadi Salim static inline void xfrm_aevent_doreplay(struct xfrm_state *x) 1031f8cd5488SJamal Hadi Salim { 1032f8cd5488SJamal Hadi Salim if (xfrm_aevent_is_on()) 1033f8cd5488SJamal Hadi Salim xfrm_replay_notify(x, XFRM_REPLAY_UPDATE); 1034f8cd5488SJamal Hadi Salim } 1035f8cd5488SJamal Hadi Salim 1036f8cd5488SJamal Hadi Salim 10371da177e4SLinus Torvalds #endif /* _NET_XFRM_H */ 1038