xref: /openbmc/linux/include/net/xfrm.h (revision c9204d9c)
11da177e4SLinus Torvalds #ifndef _NET_XFRM_H
21da177e4SLinus Torvalds #define _NET_XFRM_H
31da177e4SLinus Torvalds 
4aabc9761SHerbert Xu #include <linux/compiler.h>
514c85021SArnaldo Carvalho de Melo #include <linux/in.h>
61da177e4SLinus Torvalds #include <linux/xfrm.h>
71da177e4SLinus Torvalds #include <linux/spinlock.h>
81da177e4SLinus Torvalds #include <linux/list.h>
91da177e4SLinus Torvalds #include <linux/skbuff.h>
1014c85021SArnaldo Carvalho de Melo #include <linux/socket.h>
111da177e4SLinus Torvalds #include <linux/pfkeyv2.h>
125794708fSMasahide NAKAMURA #include <linux/ipsec.h>
131da177e4SLinus Torvalds #include <linux/in6.h>
144a3e2f71SArjan van de Ven #include <linux/mutex.h>
151da177e4SLinus Torvalds 
161da177e4SLinus Torvalds #include <net/sock.h>
171da177e4SLinus Torvalds #include <net/dst.h>
181da177e4SLinus Torvalds #include <net/route.h>
191da177e4SLinus Torvalds #include <net/ipv6.h>
201da177e4SLinus Torvalds #include <net/ip6_fib.h>
211da177e4SLinus Torvalds 
221da177e4SLinus Torvalds #define XFRM_ALIGN8(len)	(((len) + 7) & ~7)
23b59f45d0SHerbert Xu #define MODULE_ALIAS_XFRM_MODE(family, encap) \
24b59f45d0SHerbert Xu 	MODULE_ALIAS("xfrm-mode-" __stringify(family) "-" __stringify(encap))
251da177e4SLinus Torvalds 
26f8cd5488SJamal Hadi Salim extern struct sock *xfrm_nl;
27f8cd5488SJamal Hadi Salim extern u32 sysctl_xfrm_aevent_etime;
28f8cd5488SJamal Hadi Salim extern u32 sysctl_xfrm_aevent_rseqth;
29f8cd5488SJamal Hadi Salim 
304a3e2f71SArjan van de Ven extern struct mutex xfrm_cfg_mutex;
311da177e4SLinus Torvalds 
321da177e4SLinus Torvalds /* Organization of SPD aka "XFRM rules"
331da177e4SLinus Torvalds    ------------------------------------
341da177e4SLinus Torvalds 
351da177e4SLinus Torvalds    Basic objects:
361da177e4SLinus Torvalds    - policy rule, struct xfrm_policy (=SPD entry)
371da177e4SLinus Torvalds    - bundle of transformations, struct dst_entry == struct xfrm_dst (=SA bundle)
381da177e4SLinus Torvalds    - instance of a transformer, struct xfrm_state (=SA)
391da177e4SLinus Torvalds    - template to clone xfrm_state, struct xfrm_tmpl
401da177e4SLinus Torvalds 
411da177e4SLinus Torvalds    SPD is plain linear list of xfrm_policy rules, ordered by priority.
421da177e4SLinus Torvalds    (To be compatible with existing pfkeyv2 implementations,
431da177e4SLinus Torvalds    many rules with priority of 0x7fffffff are allowed to exist and
441da177e4SLinus Torvalds    such rules are ordered in an unpredictable way, thanks to bsd folks.)
451da177e4SLinus Torvalds 
461da177e4SLinus Torvalds    Lookup is plain linear search until the first match with selector.
471da177e4SLinus Torvalds 
481da177e4SLinus Torvalds    If "action" is "block", then we prohibit the flow, otherwise:
491da177e4SLinus Torvalds    if "xfrms_nr" is zero, the flow passes untransformed. Otherwise,
501da177e4SLinus Torvalds    policy entry has list of up to XFRM_MAX_DEPTH transformations,
511da177e4SLinus Torvalds    described by templates xfrm_tmpl. Each template is resolved
521da177e4SLinus Torvalds    to a complete xfrm_state (see below) and we pack bundle of transformations
531da177e4SLinus Torvalds    to a dst_entry returned to requestor.
541da177e4SLinus Torvalds 
551da177e4SLinus Torvalds    dst -. xfrm  .-> xfrm_state #1
561da177e4SLinus Torvalds     |---. child .-> dst -. xfrm .-> xfrm_state #2
571da177e4SLinus Torvalds                      |---. child .-> dst -. xfrm .-> xfrm_state #3
581da177e4SLinus Torvalds                                       |---. child .-> NULL
591da177e4SLinus Torvalds 
601da177e4SLinus Torvalds    Bundles are cached at xrfm_policy struct (field ->bundles).
611da177e4SLinus Torvalds 
621da177e4SLinus Torvalds 
631da177e4SLinus Torvalds    Resolution of xrfm_tmpl
641da177e4SLinus Torvalds    -----------------------
651da177e4SLinus Torvalds    Template contains:
661da177e4SLinus Torvalds    1. ->mode		Mode: transport or tunnel
671da177e4SLinus Torvalds    2. ->id.proto	Protocol: AH/ESP/IPCOMP
681da177e4SLinus Torvalds    3. ->id.daddr	Remote tunnel endpoint, ignored for transport mode.
691da177e4SLinus Torvalds       Q: allow to resolve security gateway?
701da177e4SLinus Torvalds    4. ->id.spi          If not zero, static SPI.
711da177e4SLinus Torvalds    5. ->saddr		Local tunnel endpoint, ignored for transport mode.
721da177e4SLinus Torvalds    6. ->algos		List of allowed algos. Plain bitmask now.
731da177e4SLinus Torvalds       Q: ealgos, aalgos, calgos. What a mess...
741da177e4SLinus Torvalds    7. ->share		Sharing mode.
751da177e4SLinus Torvalds       Q: how to implement private sharing mode? To add struct sock* to
761da177e4SLinus Torvalds       flow id?
771da177e4SLinus Torvalds 
781da177e4SLinus Torvalds    Having this template we search through SAD searching for entries
791da177e4SLinus Torvalds    with appropriate mode/proto/algo, permitted by selector.
801da177e4SLinus Torvalds    If no appropriate entry found, it is requested from key manager.
811da177e4SLinus Torvalds 
821da177e4SLinus Torvalds    PROBLEMS:
831da177e4SLinus Torvalds    Q: How to find all the bundles referring to a physical path for
841da177e4SLinus Torvalds       PMTU discovery? Seems, dst should contain list of all parents...
851da177e4SLinus Torvalds       and enter to infinite locking hierarchy disaster.
861da177e4SLinus Torvalds       No! It is easier, we will not search for them, let them find us.
871da177e4SLinus Torvalds       We add genid to each dst plus pointer to genid of raw IP route,
881da177e4SLinus Torvalds       pmtu disc will update pmtu on raw IP route and increase its genid.
891da177e4SLinus Torvalds       dst_check() will see this for top level and trigger resyncing
901da177e4SLinus Torvalds       metrics. Plus, it will be made via sk->sk_dst_cache. Solved.
911da177e4SLinus Torvalds  */
921da177e4SLinus Torvalds 
931da177e4SLinus Torvalds /* Full description of state of transformer. */
941da177e4SLinus Torvalds struct xfrm_state
951da177e4SLinus Torvalds {
961da177e4SLinus Torvalds 	/* Note: bydst is re-used during gc */
978f126e37SDavid S. Miller 	struct hlist_node	bydst;
988f126e37SDavid S. Miller 	struct hlist_node	bysrc;
998f126e37SDavid S. Miller 	struct hlist_node	byspi;
1001da177e4SLinus Torvalds 
1011da177e4SLinus Torvalds 	atomic_t		refcnt;
1021da177e4SLinus Torvalds 	spinlock_t		lock;
1031da177e4SLinus Torvalds 
1041da177e4SLinus Torvalds 	struct xfrm_id		id;
1051da177e4SLinus Torvalds 	struct xfrm_selector	sel;
1061da177e4SLinus Torvalds 
1079d4a706dSDavid S. Miller 	u32			genid;
1089d4a706dSDavid S. Miller 
1091da177e4SLinus Torvalds 	/* Key manger bits */
1101da177e4SLinus Torvalds 	struct {
1111da177e4SLinus Torvalds 		u8		state;
1121da177e4SLinus Torvalds 		u8		dying;
1131da177e4SLinus Torvalds 		u32		seq;
1141da177e4SLinus Torvalds 	} km;
1151da177e4SLinus Torvalds 
1161da177e4SLinus Torvalds 	/* Parameters of this state. */
1171da177e4SLinus Torvalds 	struct {
1181da177e4SLinus Torvalds 		u32		reqid;
1191da177e4SLinus Torvalds 		u8		mode;
1201da177e4SLinus Torvalds 		u8		replay_window;
1211da177e4SLinus Torvalds 		u8		aalgo, ealgo, calgo;
1221da177e4SLinus Torvalds 		u8		flags;
1231da177e4SLinus Torvalds 		u16		family;
1241da177e4SLinus Torvalds 		xfrm_address_t	saddr;
1251da177e4SLinus Torvalds 		int		header_len;
1261da177e4SLinus Torvalds 		int		trailer_len;
1271da177e4SLinus Torvalds 	} props;
1281da177e4SLinus Torvalds 
1291da177e4SLinus Torvalds 	struct xfrm_lifetime_cfg lft;
1301da177e4SLinus Torvalds 
1311da177e4SLinus Torvalds 	/* Data for transformer */
1321da177e4SLinus Torvalds 	struct xfrm_algo	*aalg;
1331da177e4SLinus Torvalds 	struct xfrm_algo	*ealg;
1341da177e4SLinus Torvalds 	struct xfrm_algo	*calg;
1351da177e4SLinus Torvalds 
1361da177e4SLinus Torvalds 	/* Data for encapsulator */
1371da177e4SLinus Torvalds 	struct xfrm_encap_tmpl	*encap;
1381da177e4SLinus Torvalds 
139060f02a3SNoriaki TAKAMIYA 	/* Data for care-of address */
140060f02a3SNoriaki TAKAMIYA 	xfrm_address_t	*coaddr;
141060f02a3SNoriaki TAKAMIYA 
1421da177e4SLinus Torvalds 	/* IPComp needs an IPIP tunnel for handling uncompressed packets */
1431da177e4SLinus Torvalds 	struct xfrm_state	*tunnel;
1441da177e4SLinus Torvalds 
1451da177e4SLinus Torvalds 	/* If a tunnel, number of users + 1 */
1461da177e4SLinus Torvalds 	atomic_t		tunnel_users;
1471da177e4SLinus Torvalds 
1481da177e4SLinus Torvalds 	/* State for replay detection */
1491da177e4SLinus Torvalds 	struct xfrm_replay_state replay;
1501da177e4SLinus Torvalds 
151f8cd5488SJamal Hadi Salim 	/* Replay detection state at the time we sent the last notification */
152f8cd5488SJamal Hadi Salim 	struct xfrm_replay_state preplay;
153f8cd5488SJamal Hadi Salim 
1542717096aSJamal Hadi Salim 	/* internal flag that only holds state for delayed aevent at the
1552717096aSJamal Hadi Salim 	 * moment
1562717096aSJamal Hadi Salim 	*/
1572717096aSJamal Hadi Salim 	u32			xflags;
1582717096aSJamal Hadi Salim 
159f8cd5488SJamal Hadi Salim 	/* Replay detection notification settings */
160f8cd5488SJamal Hadi Salim 	u32			replay_maxage;
161f8cd5488SJamal Hadi Salim 	u32			replay_maxdiff;
162f8cd5488SJamal Hadi Salim 
163f8cd5488SJamal Hadi Salim 	/* Replay detection notification timer */
164f8cd5488SJamal Hadi Salim 	struct timer_list	rtimer;
165f8cd5488SJamal Hadi Salim 
1661da177e4SLinus Torvalds 	/* Statistics */
1671da177e4SLinus Torvalds 	struct xfrm_stats	stats;
1681da177e4SLinus Torvalds 
1691da177e4SLinus Torvalds 	struct xfrm_lifetime_cur curlft;
1701da177e4SLinus Torvalds 	struct timer_list	timer;
1711da177e4SLinus Torvalds 
1729afaca05SMasahide NAKAMURA 	/* Last used time */
1739afaca05SMasahide NAKAMURA 	u64			lastused;
1749afaca05SMasahide NAKAMURA 
1751da177e4SLinus Torvalds 	/* Reference to data common to all the instances of this
1761da177e4SLinus Torvalds 	 * transformer. */
1771da177e4SLinus Torvalds 	struct xfrm_type	*type;
178b59f45d0SHerbert Xu 	struct xfrm_mode	*mode;
1791da177e4SLinus Torvalds 
180df71837dSTrent Jaeger 	/* Security context */
181df71837dSTrent Jaeger 	struct xfrm_sec_ctx	*security;
182df71837dSTrent Jaeger 
1831da177e4SLinus Torvalds 	/* Private data of this transformer, format is opaque,
1841da177e4SLinus Torvalds 	 * interpreted by xfrm_type methods. */
1851da177e4SLinus Torvalds 	void			*data;
1861da177e4SLinus Torvalds };
1871da177e4SLinus Torvalds 
1882717096aSJamal Hadi Salim /* xflags - make enum if more show up */
1892717096aSJamal Hadi Salim #define XFRM_TIME_DEFER	1
1902717096aSJamal Hadi Salim 
1911da177e4SLinus Torvalds enum {
1921da177e4SLinus Torvalds 	XFRM_STATE_VOID,
1931da177e4SLinus Torvalds 	XFRM_STATE_ACQ,
1941da177e4SLinus Torvalds 	XFRM_STATE_VALID,
1951da177e4SLinus Torvalds 	XFRM_STATE_ERROR,
1961da177e4SLinus Torvalds 	XFRM_STATE_EXPIRED,
1971da177e4SLinus Torvalds 	XFRM_STATE_DEAD
1981da177e4SLinus Torvalds };
1991da177e4SLinus Torvalds 
20026b15dadSJamal Hadi Salim /* callback structure passed from either netlink or pfkey */
20126b15dadSJamal Hadi Salim struct km_event
20226b15dadSJamal Hadi Salim {
203bf08867fSHerbert Xu 	union {
204bf08867fSHerbert Xu 		u32 hard;
205bf08867fSHerbert Xu 		u32 proto;
206bf08867fSHerbert Xu 		u32 byid;
207f8cd5488SJamal Hadi Salim 		u32 aevent;
208f7b6983fSMasahide NAKAMURA 		u32 type;
209bf08867fSHerbert Xu 	} data;
210bf08867fSHerbert Xu 
21126b15dadSJamal Hadi Salim 	u32	seq;
21226b15dadSJamal Hadi Salim 	u32	pid;
21326b15dadSJamal Hadi Salim 	u32	event;
21426b15dadSJamal Hadi Salim };
21526b15dadSJamal Hadi Salim 
2161da177e4SLinus Torvalds struct xfrm_type;
2171da177e4SLinus Torvalds struct xfrm_dst;
2181da177e4SLinus Torvalds struct xfrm_policy_afinfo {
2191da177e4SLinus Torvalds 	unsigned short		family;
22073654d61SHerbert Xu 	struct xfrm_type	*type_map[IPPROTO_MAX];
221b59f45d0SHerbert Xu 	struct xfrm_mode	*mode_map[XFRM_MODE_MAX];
2221da177e4SLinus Torvalds 	struct dst_ops		*dst_ops;
2231da177e4SLinus Torvalds 	void			(*garbage_collect)(void);
2241da177e4SLinus Torvalds 	int			(*dst_lookup)(struct xfrm_dst **dst, struct flowi *fl);
225a1e59abfSPatrick McHardy 	int			(*get_saddr)(xfrm_address_t *saddr, xfrm_address_t *daddr);
2261da177e4SLinus Torvalds 	struct dst_entry	*(*find_bundle)(struct flowi *fl, struct xfrm_policy *policy);
2271da177e4SLinus Torvalds 	int			(*bundle_create)(struct xfrm_policy *policy,
2281da177e4SLinus Torvalds 						 struct xfrm_state **xfrm,
2291da177e4SLinus Torvalds 						 int nx,
2301da177e4SLinus Torvalds 						 struct flowi *fl,
2311da177e4SLinus Torvalds 						 struct dst_entry **dst_p);
2321da177e4SLinus Torvalds 	void			(*decode_session)(struct sk_buff *skb,
2331da177e4SLinus Torvalds 						  struct flowi *fl);
2341da177e4SLinus Torvalds };
2351da177e4SLinus Torvalds 
2361da177e4SLinus Torvalds extern int xfrm_policy_register_afinfo(struct xfrm_policy_afinfo *afinfo);
2371da177e4SLinus Torvalds extern int xfrm_policy_unregister_afinfo(struct xfrm_policy_afinfo *afinfo);
23826b15dadSJamal Hadi Salim extern void km_policy_notify(struct xfrm_policy *xp, int dir, struct km_event *c);
23926b15dadSJamal Hadi Salim extern void km_state_notify(struct xfrm_state *x, struct km_event *c);
2401da177e4SLinus Torvalds #define XFRM_ACQ_EXPIRES	30
2411da177e4SLinus Torvalds 
2421da177e4SLinus Torvalds struct xfrm_tmpl;
243980ebd25SJamal Hadi Salim extern int km_query(struct xfrm_state *x, struct xfrm_tmpl *t, struct xfrm_policy *pol);
24453bc6b4dSJamal Hadi Salim extern void km_state_expired(struct xfrm_state *x, int hard, u32 pid);
24553bc6b4dSJamal Hadi Salim extern int __xfrm_state_delete(struct xfrm_state *x);
24653bc6b4dSJamal Hadi Salim 
2471da177e4SLinus Torvalds struct xfrm_state_afinfo {
2481da177e4SLinus Torvalds 	unsigned short		family;
249d094cd83SHerbert Xu 	int			(*init_flags)(struct xfrm_state *x);
2501da177e4SLinus Torvalds 	void			(*init_tempsel)(struct xfrm_state *x, struct flowi *fl,
2511da177e4SLinus Torvalds 						struct xfrm_tmpl *tmpl,
2521da177e4SLinus Torvalds 						xfrm_address_t *daddr, xfrm_address_t *saddr);
25341a49cc3SMasahide NAKAMURA 	int			(*tmpl_sort)(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n);
25441a49cc3SMasahide NAKAMURA 	int			(*state_sort)(struct xfrm_state **dst, struct xfrm_state **src, int n);
2551da177e4SLinus Torvalds };
2561da177e4SLinus Torvalds 
2571da177e4SLinus Torvalds extern int xfrm_state_register_afinfo(struct xfrm_state_afinfo *afinfo);
2581da177e4SLinus Torvalds extern int xfrm_state_unregister_afinfo(struct xfrm_state_afinfo *afinfo);
2591da177e4SLinus Torvalds 
2601da177e4SLinus Torvalds extern void xfrm_state_delete_tunnel(struct xfrm_state *x);
2611da177e4SLinus Torvalds 
2621da177e4SLinus Torvalds struct xfrm_type
2631da177e4SLinus Torvalds {
2641da177e4SLinus Torvalds 	char			*description;
2651da177e4SLinus Torvalds 	struct module		*owner;
2661da177e4SLinus Torvalds 	__u8			proto;
2671b5c2299SMasahide NAKAMURA 	__u8			flags;
2681b5c2299SMasahide NAKAMURA #define XFRM_TYPE_NON_FRAGMENT	1
2691da177e4SLinus Torvalds 
27072cb6962SHerbert Xu 	int			(*init_state)(struct xfrm_state *x);
2711da177e4SLinus Torvalds 	void			(*destructor)(struct xfrm_state *);
272e695633eSHerbert Xu 	int			(*input)(struct xfrm_state *, struct sk_buff *skb);
2731da177e4SLinus Torvalds 	int			(*output)(struct xfrm_state *, struct sk_buff *pskb);
274df0ba92aSMasahide NAKAMURA 	int			(*reject)(struct xfrm_state *, struct sk_buff *, struct flowi *);
275aee5adb4SMasahide NAKAMURA 	int			(*hdr_offset)(struct xfrm_state *, struct sk_buff *, u8 **);
27699505a84SMasahide NAKAMURA 	xfrm_address_t		*(*local_addr)(struct xfrm_state *, xfrm_address_t *);
27799505a84SMasahide NAKAMURA 	xfrm_address_t		*(*remote_addr)(struct xfrm_state *, xfrm_address_t *);
2781da177e4SLinus Torvalds 	/* Estimate maximal size of result of transformation of a dgram */
2791da177e4SLinus Torvalds 	u32			(*get_max_size)(struct xfrm_state *, int size);
2801da177e4SLinus Torvalds };
2811da177e4SLinus Torvalds 
2821da177e4SLinus Torvalds extern int xfrm_register_type(struct xfrm_type *type, unsigned short family);
2831da177e4SLinus Torvalds extern int xfrm_unregister_type(struct xfrm_type *type, unsigned short family);
2841da177e4SLinus Torvalds extern struct xfrm_type *xfrm_get_type(u8 proto, unsigned short family);
2851da177e4SLinus Torvalds extern void xfrm_put_type(struct xfrm_type *type);
2861da177e4SLinus Torvalds 
287b59f45d0SHerbert Xu struct xfrm_mode {
288b59f45d0SHerbert Xu 	int (*input)(struct xfrm_state *x, struct sk_buff *skb);
289eb878e84SJamal Hadi Salim 	int (*output)(struct xfrm_state *x,struct sk_buff *skb);
290b59f45d0SHerbert Xu 
291b59f45d0SHerbert Xu 	struct module *owner;
292b59f45d0SHerbert Xu 	unsigned int encap;
293b59f45d0SHerbert Xu };
294b59f45d0SHerbert Xu 
295b59f45d0SHerbert Xu extern int xfrm_register_mode(struct xfrm_mode *mode, int family);
296b59f45d0SHerbert Xu extern int xfrm_unregister_mode(struct xfrm_mode *mode, int family);
297b59f45d0SHerbert Xu extern struct xfrm_mode *xfrm_get_mode(unsigned int encap, int family);
298b59f45d0SHerbert Xu extern void xfrm_put_mode(struct xfrm_mode *mode);
299b59f45d0SHerbert Xu 
3001da177e4SLinus Torvalds struct xfrm_tmpl
3011da177e4SLinus Torvalds {
3021da177e4SLinus Torvalds /* id in template is interpreted as:
3031da177e4SLinus Torvalds  * daddr - destination of tunnel, may be zero for transport mode.
3041da177e4SLinus Torvalds  * spi   - zero to acquire spi. Not zero if spi is static, then
3051da177e4SLinus Torvalds  *	   daddr must be fixed too.
3061da177e4SLinus Torvalds  * proto - AH/ESP/IPCOMP
3071da177e4SLinus Torvalds  */
3081da177e4SLinus Torvalds 	struct xfrm_id		id;
3091da177e4SLinus Torvalds 
3101da177e4SLinus Torvalds /* Source address of tunnel. Ignored, if it is not a tunnel. */
3111da177e4SLinus Torvalds 	xfrm_address_t		saddr;
3121da177e4SLinus Torvalds 
31376b3f055SMiika Komu 	unsigned short		encap_family;
31476b3f055SMiika Komu 
3151da177e4SLinus Torvalds 	__u32			reqid;
3161da177e4SLinus Torvalds 
3177e49e6deSMasahide NAKAMURA /* Mode: transport, tunnel etc. */
3181da177e4SLinus Torvalds 	__u8			mode;
3191da177e4SLinus Torvalds 
3201da177e4SLinus Torvalds /* Sharing mode: unique, this session only, this user only etc. */
3211da177e4SLinus Torvalds 	__u8			share;
3221da177e4SLinus Torvalds 
3231da177e4SLinus Torvalds /* May skip this transfomration if no SA is found */
3241da177e4SLinus Torvalds 	__u8			optional;
3251da177e4SLinus Torvalds 
3261da177e4SLinus Torvalds /* Bit mask of algos allowed for acquisition */
3271da177e4SLinus Torvalds 	__u32			aalgos;
3281da177e4SLinus Torvalds 	__u32			ealgos;
3291da177e4SLinus Torvalds 	__u32			calgos;
3301da177e4SLinus Torvalds };
3311da177e4SLinus Torvalds 
332622dc828SMasahide NAKAMURA #define XFRM_MAX_DEPTH		6
3331da177e4SLinus Torvalds 
3341da177e4SLinus Torvalds struct xfrm_policy
3351da177e4SLinus Torvalds {
3361da177e4SLinus Torvalds 	struct xfrm_policy	*next;
3372518c7c2SDavid S. Miller 	struct hlist_node	bydst;
3382518c7c2SDavid S. Miller 	struct hlist_node	byidx;
3391da177e4SLinus Torvalds 
3401da177e4SLinus Torvalds 	/* This lock only affects elements except for entry. */
3411da177e4SLinus Torvalds 	rwlock_t		lock;
3421da177e4SLinus Torvalds 	atomic_t		refcnt;
3431da177e4SLinus Torvalds 	struct timer_list	timer;
3441da177e4SLinus Torvalds 
3451da177e4SLinus Torvalds 	u32			priority;
3461da177e4SLinus Torvalds 	u32			index;
3471da177e4SLinus Torvalds 	struct xfrm_selector	selector;
3481da177e4SLinus Torvalds 	struct xfrm_lifetime_cfg lft;
3491da177e4SLinus Torvalds 	struct xfrm_lifetime_cur curlft;
3501da177e4SLinus Torvalds 	struct dst_entry       *bundles;
35146ca5f5dSArnaldo Carvalho de Melo 	u16			family;
35246ca5f5dSArnaldo Carvalho de Melo 	u8			type;
35346ca5f5dSArnaldo Carvalho de Melo 	u8			action;
35446ca5f5dSArnaldo Carvalho de Melo 	u8			flags;
35546ca5f5dSArnaldo Carvalho de Melo 	u8			dead;
35646ca5f5dSArnaldo Carvalho de Melo 	u8			xfrm_nr;
35746ca5f5dSArnaldo Carvalho de Melo 	/* XXX 1 byte hole, try to pack */
358df71837dSTrent Jaeger 	struct xfrm_sec_ctx	*security;
3591da177e4SLinus Torvalds 	struct xfrm_tmpl       	xfrm_vec[XFRM_MAX_DEPTH];
3601da177e4SLinus Torvalds };
3611da177e4SLinus Torvalds 
3621da177e4SLinus Torvalds #define XFRM_KM_TIMEOUT                30
363f8cd5488SJamal Hadi Salim /* which seqno */
364f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_SEQ		1
365f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_OSEQ	2
366f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_SEQ_MASK	3
367f8cd5488SJamal Hadi Salim /* what happened */
368f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_UPDATE	XFRM_AE_CR
369f8cd5488SJamal Hadi Salim #define XFRM_REPLAY_TIMEOUT	XFRM_AE_CE
370f8cd5488SJamal Hadi Salim 
371f8cd5488SJamal Hadi Salim /* default aevent timeout in units of 100ms */
372f8cd5488SJamal Hadi Salim #define XFRM_AE_ETIME			10
373f8cd5488SJamal Hadi Salim /* Async Event timer multiplier */
374f8cd5488SJamal Hadi Salim #define XFRM_AE_ETH_M			10
375f8cd5488SJamal Hadi Salim /* default seq threshold size */
376f8cd5488SJamal Hadi Salim #define XFRM_AE_SEQT_SIZE		2
3771da177e4SLinus Torvalds 
3781da177e4SLinus Torvalds struct xfrm_mgr
3791da177e4SLinus Torvalds {
3801da177e4SLinus Torvalds 	struct list_head	list;
3811da177e4SLinus Torvalds 	char			*id;
38226b15dadSJamal Hadi Salim 	int			(*notify)(struct xfrm_state *x, struct km_event *c);
3831da177e4SLinus Torvalds 	int			(*acquire)(struct xfrm_state *x, struct xfrm_tmpl *, struct xfrm_policy *xp, int dir);
384cb969f07SVenkat Yekkirala 	struct xfrm_policy	*(*compile_policy)(struct sock *sk, int opt, u8 *data, int len, int *dir);
3855d36b180SAl Viro 	int			(*new_mapping)(struct xfrm_state *x, xfrm_address_t *ipaddr, __be16 sport);
38626b15dadSJamal Hadi Salim 	int			(*notify_policy)(struct xfrm_policy *x, int dir, struct km_event *c);
38797a64b45SMasahide NAKAMURA 	int			(*report)(u8 proto, struct xfrm_selector *sel, xfrm_address_t *addr);
3881da177e4SLinus Torvalds };
3891da177e4SLinus Torvalds 
3901da177e4SLinus Torvalds extern int xfrm_register_km(struct xfrm_mgr *km);
3911da177e4SLinus Torvalds extern int xfrm_unregister_km(struct xfrm_mgr *km);
3921da177e4SLinus Torvalds 
3932518c7c2SDavid S. Miller extern unsigned int xfrm_policy_count[XFRM_POLICY_MAX*2];
3941da177e4SLinus Torvalds 
395161a09e7SJoy Latten /* Audit Information */
396161a09e7SJoy Latten struct xfrm_audit
397161a09e7SJoy Latten {
398161a09e7SJoy Latten 	uid_t	loginuid;
399161a09e7SJoy Latten 	u32	secid;
400161a09e7SJoy Latten };
401c9204d9cSJoy Latten 
402c9204d9cSJoy Latten #ifdef CONFIG_AUDITSYSCALL
403c9204d9cSJoy Latten extern void xfrm_audit_log(uid_t auid, u32 secid, int type, int result,
404161a09e7SJoy Latten 		    struct xfrm_policy *xp, struct xfrm_state *x);
405c9204d9cSJoy Latten #else
406c9204d9cSJoy Latten #define xfrm_audit_log(a,s,t,r,p,x) do { ; } while (0)
407c9204d9cSJoy Latten #endif /* CONFIG_AUDITSYSCALL */
408161a09e7SJoy Latten 
4091da177e4SLinus Torvalds static inline void xfrm_pol_hold(struct xfrm_policy *policy)
4101da177e4SLinus Torvalds {
4111da177e4SLinus Torvalds 	if (likely(policy != NULL))
4121da177e4SLinus Torvalds 		atomic_inc(&policy->refcnt);
4131da177e4SLinus Torvalds }
4141da177e4SLinus Torvalds 
4151da177e4SLinus Torvalds extern void __xfrm_policy_destroy(struct xfrm_policy *policy);
4161da177e4SLinus Torvalds 
4171da177e4SLinus Torvalds static inline void xfrm_pol_put(struct xfrm_policy *policy)
4181da177e4SLinus Torvalds {
4191da177e4SLinus Torvalds 	if (atomic_dec_and_test(&policy->refcnt))
4201da177e4SLinus Torvalds 		__xfrm_policy_destroy(policy);
4211da177e4SLinus Torvalds }
4221da177e4SLinus Torvalds 
4234e81bb83SMasahide NAKAMURA #ifdef CONFIG_XFRM_SUB_POLICY
4244e81bb83SMasahide NAKAMURA static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols)
4254e81bb83SMasahide NAKAMURA {
4264e81bb83SMasahide NAKAMURA 	int i;
4274e81bb83SMasahide NAKAMURA 	for (i = npols - 1; i >= 0; --i)
4284e81bb83SMasahide NAKAMURA 		xfrm_pol_put(pols[i]);
4294e81bb83SMasahide NAKAMURA }
4304e81bb83SMasahide NAKAMURA #else
4314e81bb83SMasahide NAKAMURA static inline void xfrm_pols_put(struct xfrm_policy **pols, int npols)
4324e81bb83SMasahide NAKAMURA {
4334e81bb83SMasahide NAKAMURA 	xfrm_pol_put(pols[0]);
4344e81bb83SMasahide NAKAMURA }
4354e81bb83SMasahide NAKAMURA #endif
4364e81bb83SMasahide NAKAMURA 
4371da177e4SLinus Torvalds extern void __xfrm_state_destroy(struct xfrm_state *);
4381da177e4SLinus Torvalds 
43921380b81SHerbert Xu static inline void __xfrm_state_put(struct xfrm_state *x)
44021380b81SHerbert Xu {
44121380b81SHerbert Xu 	atomic_dec(&x->refcnt);
44221380b81SHerbert Xu }
44321380b81SHerbert Xu 
4441da177e4SLinus Torvalds static inline void xfrm_state_put(struct xfrm_state *x)
4451da177e4SLinus Torvalds {
4461da177e4SLinus Torvalds 	if (atomic_dec_and_test(&x->refcnt))
4471da177e4SLinus Torvalds 		__xfrm_state_destroy(x);
4481da177e4SLinus Torvalds }
4491da177e4SLinus Torvalds 
4501da177e4SLinus Torvalds static inline void xfrm_state_hold(struct xfrm_state *x)
4511da177e4SLinus Torvalds {
4521da177e4SLinus Torvalds 	atomic_inc(&x->refcnt);
4531da177e4SLinus Torvalds }
4541da177e4SLinus Torvalds 
4551da177e4SLinus Torvalds static __inline__ int addr_match(void *token1, void *token2, int prefixlen)
4561da177e4SLinus Torvalds {
4575f19343fSAl Viro 	__be32 *a1 = token1;
4585f19343fSAl Viro 	__be32 *a2 = token2;
4591da177e4SLinus Torvalds 	int pdw;
4601da177e4SLinus Torvalds 	int pbi;
4611da177e4SLinus Torvalds 
4621da177e4SLinus Torvalds 	pdw = prefixlen >> 5;	  /* num of whole __u32 in prefix */
4631da177e4SLinus Torvalds 	pbi = prefixlen &  0x1f;  /* num of bits in incomplete u32 in prefix */
4641da177e4SLinus Torvalds 
4651da177e4SLinus Torvalds 	if (pdw)
4661da177e4SLinus Torvalds 		if (memcmp(a1, a2, pdw << 2))
4671da177e4SLinus Torvalds 			return 0;
4681da177e4SLinus Torvalds 
4691da177e4SLinus Torvalds 	if (pbi) {
4705f19343fSAl Viro 		__be32 mask;
4711da177e4SLinus Torvalds 
4721da177e4SLinus Torvalds 		mask = htonl((0xffffffff) << (32 - pbi));
4731da177e4SLinus Torvalds 
4741da177e4SLinus Torvalds 		if ((a1[pdw] ^ a2[pdw]) & mask)
4751da177e4SLinus Torvalds 			return 0;
4761da177e4SLinus Torvalds 	}
4771da177e4SLinus Torvalds 
4781da177e4SLinus Torvalds 	return 1;
4791da177e4SLinus Torvalds }
4801da177e4SLinus Torvalds 
4811da177e4SLinus Torvalds static __inline__
482f9d07e41SAl Viro __be16 xfrm_flowi_sport(struct flowi *fl)
4831da177e4SLinus Torvalds {
484f9d07e41SAl Viro 	__be16 port;
4851da177e4SLinus Torvalds 	switch(fl->proto) {
4861da177e4SLinus Torvalds 	case IPPROTO_TCP:
4871da177e4SLinus Torvalds 	case IPPROTO_UDP:
488ba4e58ecSGerrit Renker 	case IPPROTO_UDPLITE:
4891da177e4SLinus Torvalds 	case IPPROTO_SCTP:
4901da177e4SLinus Torvalds 		port = fl->fl_ip_sport;
4911da177e4SLinus Torvalds 		break;
4921da177e4SLinus Torvalds 	case IPPROTO_ICMP:
4931da177e4SLinus Torvalds 	case IPPROTO_ICMPV6:
4941da177e4SLinus Torvalds 		port = htons(fl->fl_icmp_type);
4951da177e4SLinus Torvalds 		break;
4962ce4272aSMasahide NAKAMURA #ifdef CONFIG_IPV6_MIP6
4972ce4272aSMasahide NAKAMURA 	case IPPROTO_MH:
4982ce4272aSMasahide NAKAMURA 		port = htons(fl->fl_mh_type);
4992ce4272aSMasahide NAKAMURA 		break;
5002ce4272aSMasahide NAKAMURA #endif
5011da177e4SLinus Torvalds 	default:
5021da177e4SLinus Torvalds 		port = 0;	/*XXX*/
5031da177e4SLinus Torvalds 	}
5041da177e4SLinus Torvalds 	return port;
5051da177e4SLinus Torvalds }
5061da177e4SLinus Torvalds 
5071da177e4SLinus Torvalds static __inline__
508f9d07e41SAl Viro __be16 xfrm_flowi_dport(struct flowi *fl)
5091da177e4SLinus Torvalds {
510f9d07e41SAl Viro 	__be16 port;
5111da177e4SLinus Torvalds 	switch(fl->proto) {
5121da177e4SLinus Torvalds 	case IPPROTO_TCP:
5131da177e4SLinus Torvalds 	case IPPROTO_UDP:
514ba4e58ecSGerrit Renker 	case IPPROTO_UDPLITE:
5151da177e4SLinus Torvalds 	case IPPROTO_SCTP:
5161da177e4SLinus Torvalds 		port = fl->fl_ip_dport;
5171da177e4SLinus Torvalds 		break;
5181da177e4SLinus Torvalds 	case IPPROTO_ICMP:
5191da177e4SLinus Torvalds 	case IPPROTO_ICMPV6:
5201da177e4SLinus Torvalds 		port = htons(fl->fl_icmp_code);
5211da177e4SLinus Torvalds 		break;
5221da177e4SLinus Torvalds 	default:
5231da177e4SLinus Torvalds 		port = 0;	/*XXX*/
5241da177e4SLinus Torvalds 	}
5251da177e4SLinus Torvalds 	return port;
5261da177e4SLinus Torvalds }
5271da177e4SLinus Torvalds 
52877681021SAndrew Morton extern int xfrm_selector_match(struct xfrm_selector *sel, struct flowi *fl,
52977681021SAndrew Morton 			       unsigned short family);
5301da177e4SLinus Torvalds 
531df71837dSTrent Jaeger #ifdef CONFIG_SECURITY_NETWORK_XFRM
532df71837dSTrent Jaeger /*	If neither has a context --> match
533df71837dSTrent Jaeger  * 	Otherwise, both must have a context and the sids, doi, alg must match
534df71837dSTrent Jaeger  */
535df71837dSTrent Jaeger static inline int xfrm_sec_ctx_match(struct xfrm_sec_ctx *s1, struct xfrm_sec_ctx *s2)
536df71837dSTrent Jaeger {
537df71837dSTrent Jaeger 	return ((!s1 && !s2) ||
538df71837dSTrent Jaeger 		(s1 && s2 &&
539df71837dSTrent Jaeger 		 (s1->ctx_sid == s2->ctx_sid) &&
540df71837dSTrent Jaeger 		 (s1->ctx_doi == s2->ctx_doi) &&
541df71837dSTrent Jaeger 		 (s1->ctx_alg == s2->ctx_alg)));
542df71837dSTrent Jaeger }
543df71837dSTrent Jaeger #else
544df71837dSTrent Jaeger static inline int xfrm_sec_ctx_match(struct xfrm_sec_ctx *s1, struct xfrm_sec_ctx *s2)
545df71837dSTrent Jaeger {
546df71837dSTrent Jaeger 	return 1;
547df71837dSTrent Jaeger }
548df71837dSTrent Jaeger #endif
549df71837dSTrent Jaeger 
5501da177e4SLinus Torvalds /* A struct encoding bundle of transformations to apply to some set of flow.
5511da177e4SLinus Torvalds  *
5521da177e4SLinus Torvalds  * dst->child points to the next element of bundle.
5531da177e4SLinus Torvalds  * dst->xfrm  points to an instanse of transformer.
5541da177e4SLinus Torvalds  *
5551da177e4SLinus Torvalds  * Due to unfortunate limitations of current routing cache, which we
5561da177e4SLinus Torvalds  * have no time to fix, it mirrors struct rtable and bound to the same
5571da177e4SLinus Torvalds  * routing key, including saddr,daddr. However, we can have many of
5581da177e4SLinus Torvalds  * bundles differing by session id. All the bundles grow from a parent
5591da177e4SLinus Torvalds  * policy rule.
5601da177e4SLinus Torvalds  */
5611da177e4SLinus Torvalds struct xfrm_dst
5621da177e4SLinus Torvalds {
5631da177e4SLinus Torvalds 	union {
5641da177e4SLinus Torvalds 		struct xfrm_dst		*next;
5651da177e4SLinus Torvalds 		struct dst_entry	dst;
5661da177e4SLinus Torvalds 		struct rtable		rt;
5671da177e4SLinus Torvalds 		struct rt6_info		rt6;
5681da177e4SLinus Torvalds 	} u;
5691da177e4SLinus Torvalds 	struct dst_entry *route;
5709d4a706dSDavid S. Miller 	u32 genid;
5711da177e4SLinus Torvalds 	u32 route_mtu_cached;
5721da177e4SLinus Torvalds 	u32 child_mtu_cached;
57392d63decSHideaki YOSHIFUJI 	u32 route_cookie;
57492d63decSHideaki YOSHIFUJI 	u32 path_cookie;
5751da177e4SLinus Torvalds };
5761da177e4SLinus Torvalds 
577aabc9761SHerbert Xu static inline void xfrm_dst_destroy(struct xfrm_dst *xdst)
578aabc9761SHerbert Xu {
579aabc9761SHerbert Xu 	dst_release(xdst->route);
580aabc9761SHerbert Xu 	if (likely(xdst->u.dst.xfrm))
581aabc9761SHerbert Xu 		xfrm_state_put(xdst->u.dst.xfrm);
582aabc9761SHerbert Xu }
583aabc9761SHerbert Xu 
584aabc9761SHerbert Xu extern void xfrm_dst_ifdown(struct dst_entry *dst, struct net_device *dev);
585aabc9761SHerbert Xu 
5861da177e4SLinus Torvalds struct sec_path
5871da177e4SLinus Torvalds {
5881da177e4SLinus Torvalds 	atomic_t		refcnt;
5891da177e4SLinus Torvalds 	int			len;
590dbe5b4aaSHerbert Xu 	struct xfrm_state	*xvec[XFRM_MAX_DEPTH];
5911da177e4SLinus Torvalds };
5921da177e4SLinus Torvalds 
5931da177e4SLinus Torvalds static inline struct sec_path *
5941da177e4SLinus Torvalds secpath_get(struct sec_path *sp)
5951da177e4SLinus Torvalds {
5961da177e4SLinus Torvalds 	if (sp)
5971da177e4SLinus Torvalds 		atomic_inc(&sp->refcnt);
5981da177e4SLinus Torvalds 	return sp;
5991da177e4SLinus Torvalds }
6001da177e4SLinus Torvalds 
6011da177e4SLinus Torvalds extern void __secpath_destroy(struct sec_path *sp);
6021da177e4SLinus Torvalds 
6031da177e4SLinus Torvalds static inline void
6041da177e4SLinus Torvalds secpath_put(struct sec_path *sp)
6051da177e4SLinus Torvalds {
6061da177e4SLinus Torvalds 	if (sp && atomic_dec_and_test(&sp->refcnt))
6071da177e4SLinus Torvalds 		__secpath_destroy(sp);
6081da177e4SLinus Torvalds }
6091da177e4SLinus Torvalds 
6101da177e4SLinus Torvalds extern struct sec_path *secpath_dup(struct sec_path *src);
6111da177e4SLinus Torvalds 
6121da177e4SLinus Torvalds static inline void
6131da177e4SLinus Torvalds secpath_reset(struct sk_buff *skb)
6141da177e4SLinus Torvalds {
6151da177e4SLinus Torvalds #ifdef CONFIG_XFRM
6161da177e4SLinus Torvalds 	secpath_put(skb->sp);
6171da177e4SLinus Torvalds 	skb->sp = NULL;
6181da177e4SLinus Torvalds #endif
6191da177e4SLinus Torvalds }
6201da177e4SLinus Torvalds 
6211da177e4SLinus Torvalds static inline int
622a1e59abfSPatrick McHardy xfrm_addr_any(xfrm_address_t *addr, unsigned short family)
623a1e59abfSPatrick McHardy {
624a1e59abfSPatrick McHardy 	switch (family) {
625a1e59abfSPatrick McHardy 	case AF_INET:
626a1e59abfSPatrick McHardy 		return addr->a4 == 0;
627a1e59abfSPatrick McHardy 	case AF_INET6:
628a1e59abfSPatrick McHardy 		return ipv6_addr_any((struct in6_addr *)&addr->a6);
629a1e59abfSPatrick McHardy 	}
630a1e59abfSPatrick McHardy 	return 0;
631a1e59abfSPatrick McHardy }
632a1e59abfSPatrick McHardy 
633a1e59abfSPatrick McHardy static inline int
6341da177e4SLinus Torvalds __xfrm4_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x)
6351da177e4SLinus Torvalds {
6361da177e4SLinus Torvalds 	return	(tmpl->saddr.a4 &&
6371da177e4SLinus Torvalds 		 tmpl->saddr.a4 != x->props.saddr.a4);
6381da177e4SLinus Torvalds }
6391da177e4SLinus Torvalds 
6401da177e4SLinus Torvalds static inline int
6411da177e4SLinus Torvalds __xfrm6_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x)
6421da177e4SLinus Torvalds {
6431da177e4SLinus Torvalds 	return	(!ipv6_addr_any((struct in6_addr*)&tmpl->saddr) &&
6441da177e4SLinus Torvalds 		 ipv6_addr_cmp((struct in6_addr *)&tmpl->saddr, (struct in6_addr*)&x->props.saddr));
6451da177e4SLinus Torvalds }
6461da177e4SLinus Torvalds 
6471da177e4SLinus Torvalds static inline int
6481da177e4SLinus Torvalds xfrm_state_addr_cmp(struct xfrm_tmpl *tmpl, struct xfrm_state *x, unsigned short family)
6491da177e4SLinus Torvalds {
6501da177e4SLinus Torvalds 	switch (family) {
6511da177e4SLinus Torvalds 	case AF_INET:
6521da177e4SLinus Torvalds 		return __xfrm4_state_addr_cmp(tmpl, x);
6531da177e4SLinus Torvalds 	case AF_INET6:
6541da177e4SLinus Torvalds 		return __xfrm6_state_addr_cmp(tmpl, x);
6551da177e4SLinus Torvalds 	}
6561da177e4SLinus Torvalds 	return !0;
6571da177e4SLinus Torvalds }
6581da177e4SLinus Torvalds 
6591da177e4SLinus Torvalds #ifdef CONFIG_XFRM
6601da177e4SLinus Torvalds 
6611da177e4SLinus Torvalds extern int __xfrm_policy_check(struct sock *, int dir, struct sk_buff *skb, unsigned short family);
6621da177e4SLinus Torvalds 
6631da177e4SLinus Torvalds static inline int xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family)
6641da177e4SLinus Torvalds {
6651da177e4SLinus Torvalds 	if (sk && sk->sk_policy[XFRM_POLICY_IN])
6661da177e4SLinus Torvalds 		return __xfrm_policy_check(sk, dir, skb, family);
6671da177e4SLinus Torvalds 
6682518c7c2SDavid S. Miller 	return	(!xfrm_policy_count[dir] && !skb->sp) ||
6691da177e4SLinus Torvalds 		(skb->dst->flags & DST_NOPOLICY) ||
6701da177e4SLinus Torvalds 		__xfrm_policy_check(sk, dir, skb, family);
6711da177e4SLinus Torvalds }
6721da177e4SLinus Torvalds 
6731da177e4SLinus Torvalds static inline int xfrm4_policy_check(struct sock *sk, int dir, struct sk_buff *skb)
6741da177e4SLinus Torvalds {
6751da177e4SLinus Torvalds 	return xfrm_policy_check(sk, dir, skb, AF_INET);
6761da177e4SLinus Torvalds }
6771da177e4SLinus Torvalds 
6781da177e4SLinus Torvalds static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *skb)
6791da177e4SLinus Torvalds {
6801da177e4SLinus Torvalds 	return xfrm_policy_check(sk, dir, skb, AF_INET6);
6811da177e4SLinus Torvalds }
6821da177e4SLinus Torvalds 
6833e3850e9SPatrick McHardy extern int xfrm_decode_session(struct sk_buff *skb, struct flowi *fl, unsigned short family);
6841da177e4SLinus Torvalds extern int __xfrm_route_forward(struct sk_buff *skb, unsigned short family);
6851da177e4SLinus Torvalds 
6861da177e4SLinus Torvalds static inline int xfrm_route_forward(struct sk_buff *skb, unsigned short family)
6871da177e4SLinus Torvalds {
6882518c7c2SDavid S. Miller 	return	!xfrm_policy_count[XFRM_POLICY_OUT] ||
6891da177e4SLinus Torvalds 		(skb->dst->flags & DST_NOXFRM) ||
6901da177e4SLinus Torvalds 		__xfrm_route_forward(skb, family);
6911da177e4SLinus Torvalds }
6921da177e4SLinus Torvalds 
6931da177e4SLinus Torvalds static inline int xfrm4_route_forward(struct sk_buff *skb)
6941da177e4SLinus Torvalds {
6951da177e4SLinus Torvalds 	return xfrm_route_forward(skb, AF_INET);
6961da177e4SLinus Torvalds }
6971da177e4SLinus Torvalds 
6981da177e4SLinus Torvalds static inline int xfrm6_route_forward(struct sk_buff *skb)
6991da177e4SLinus Torvalds {
7001da177e4SLinus Torvalds 	return xfrm_route_forward(skb, AF_INET6);
7011da177e4SLinus Torvalds }
7021da177e4SLinus Torvalds 
7031da177e4SLinus Torvalds extern int __xfrm_sk_clone_policy(struct sock *sk);
7041da177e4SLinus Torvalds 
7051da177e4SLinus Torvalds static inline int xfrm_sk_clone_policy(struct sock *sk)
7061da177e4SLinus Torvalds {
7071da177e4SLinus Torvalds 	if (unlikely(sk->sk_policy[0] || sk->sk_policy[1]))
7081da177e4SLinus Torvalds 		return __xfrm_sk_clone_policy(sk);
7091da177e4SLinus Torvalds 	return 0;
7101da177e4SLinus Torvalds }
7111da177e4SLinus Torvalds 
7124666faabSHerbert Xu extern int xfrm_policy_delete(struct xfrm_policy *pol, int dir);
7131da177e4SLinus Torvalds 
7141da177e4SLinus Torvalds static inline void xfrm_sk_free_policy(struct sock *sk)
7151da177e4SLinus Torvalds {
7161da177e4SLinus Torvalds 	if (unlikely(sk->sk_policy[0] != NULL)) {
7171da177e4SLinus Torvalds 		xfrm_policy_delete(sk->sk_policy[0], XFRM_POLICY_MAX);
7181da177e4SLinus Torvalds 		sk->sk_policy[0] = NULL;
7191da177e4SLinus Torvalds 	}
7201da177e4SLinus Torvalds 	if (unlikely(sk->sk_policy[1] != NULL)) {
7211da177e4SLinus Torvalds 		xfrm_policy_delete(sk->sk_policy[1], XFRM_POLICY_MAX+1);
7221da177e4SLinus Torvalds 		sk->sk_policy[1] = NULL;
7231da177e4SLinus Torvalds 	}
7241da177e4SLinus Torvalds }
7251da177e4SLinus Torvalds 
7261da177e4SLinus Torvalds #else
7271da177e4SLinus Torvalds 
7281da177e4SLinus Torvalds static inline void xfrm_sk_free_policy(struct sock *sk) {}
7291da177e4SLinus Torvalds static inline int xfrm_sk_clone_policy(struct sock *sk) { return 0; }
7301da177e4SLinus Torvalds static inline int xfrm6_route_forward(struct sk_buff *skb) { return 1; }
7311da177e4SLinus Torvalds static inline int xfrm4_route_forward(struct sk_buff *skb) { return 1; }
7321da177e4SLinus Torvalds static inline int xfrm6_policy_check(struct sock *sk, int dir, struct sk_buff *skb)
7331da177e4SLinus Torvalds {
7341da177e4SLinus Torvalds 	return 1;
7351da177e4SLinus Torvalds }
7361da177e4SLinus Torvalds static inline int xfrm4_policy_check(struct sock *sk, int dir, struct sk_buff *skb)
7371da177e4SLinus Torvalds {
7381da177e4SLinus Torvalds 	return 1;
7391da177e4SLinus Torvalds }
7401da177e4SLinus Torvalds static inline int xfrm_policy_check(struct sock *sk, int dir, struct sk_buff *skb, unsigned short family)
7411da177e4SLinus Torvalds {
7421da177e4SLinus Torvalds 	return 1;
7431da177e4SLinus Torvalds }
7441da177e4SLinus Torvalds #endif
7451da177e4SLinus Torvalds 
7461da177e4SLinus Torvalds static __inline__
7471da177e4SLinus Torvalds xfrm_address_t *xfrm_flowi_daddr(struct flowi *fl, unsigned short family)
7481da177e4SLinus Torvalds {
7491da177e4SLinus Torvalds 	switch (family){
7501da177e4SLinus Torvalds 	case AF_INET:
7511da177e4SLinus Torvalds 		return (xfrm_address_t *)&fl->fl4_dst;
7521da177e4SLinus Torvalds 	case AF_INET6:
7531da177e4SLinus Torvalds 		return (xfrm_address_t *)&fl->fl6_dst;
7541da177e4SLinus Torvalds 	}
7551da177e4SLinus Torvalds 	return NULL;
7561da177e4SLinus Torvalds }
7571da177e4SLinus Torvalds 
7581da177e4SLinus Torvalds static __inline__
7591da177e4SLinus Torvalds xfrm_address_t *xfrm_flowi_saddr(struct flowi *fl, unsigned short family)
7601da177e4SLinus Torvalds {
7611da177e4SLinus Torvalds 	switch (family){
7621da177e4SLinus Torvalds 	case AF_INET:
7631da177e4SLinus Torvalds 		return (xfrm_address_t *)&fl->fl4_src;
7641da177e4SLinus Torvalds 	case AF_INET6:
7651da177e4SLinus Torvalds 		return (xfrm_address_t *)&fl->fl6_src;
7661da177e4SLinus Torvalds 	}
7671da177e4SLinus Torvalds 	return NULL;
7681da177e4SLinus Torvalds }
7691da177e4SLinus Torvalds 
7701da177e4SLinus Torvalds static __inline__ int
7711da177e4SLinus Torvalds __xfrm4_state_addr_check(struct xfrm_state *x,
7721da177e4SLinus Torvalds 			 xfrm_address_t *daddr, xfrm_address_t *saddr)
7731da177e4SLinus Torvalds {
7741da177e4SLinus Torvalds 	if (daddr->a4 == x->id.daddr.a4 &&
7751da177e4SLinus Torvalds 	    (saddr->a4 == x->props.saddr.a4 || !saddr->a4 || !x->props.saddr.a4))
7761da177e4SLinus Torvalds 		return 1;
7771da177e4SLinus Torvalds 	return 0;
7781da177e4SLinus Torvalds }
7791da177e4SLinus Torvalds 
7801da177e4SLinus Torvalds static __inline__ int
7811da177e4SLinus Torvalds __xfrm6_state_addr_check(struct xfrm_state *x,
7821da177e4SLinus Torvalds 			 xfrm_address_t *daddr, xfrm_address_t *saddr)
7831da177e4SLinus Torvalds {
7841da177e4SLinus Torvalds 	if (!ipv6_addr_cmp((struct in6_addr *)daddr, (struct in6_addr *)&x->id.daddr) &&
7851da177e4SLinus Torvalds 	    (!ipv6_addr_cmp((struct in6_addr *)saddr, (struct in6_addr *)&x->props.saddr)||
7861da177e4SLinus Torvalds 	     ipv6_addr_any((struct in6_addr *)saddr) ||
7871da177e4SLinus Torvalds 	     ipv6_addr_any((struct in6_addr *)&x->props.saddr)))
7881da177e4SLinus Torvalds 		return 1;
7891da177e4SLinus Torvalds 	return 0;
7901da177e4SLinus Torvalds }
7911da177e4SLinus Torvalds 
7921da177e4SLinus Torvalds static __inline__ int
7931da177e4SLinus Torvalds xfrm_state_addr_check(struct xfrm_state *x,
7941da177e4SLinus Torvalds 		      xfrm_address_t *daddr, xfrm_address_t *saddr,
7951da177e4SLinus Torvalds 		      unsigned short family)
7961da177e4SLinus Torvalds {
7971da177e4SLinus Torvalds 	switch (family) {
7981da177e4SLinus Torvalds 	case AF_INET:
7991da177e4SLinus Torvalds 		return __xfrm4_state_addr_check(x, daddr, saddr);
8001da177e4SLinus Torvalds 	case AF_INET6:
8011da177e4SLinus Torvalds 		return __xfrm6_state_addr_check(x, daddr, saddr);
8021da177e4SLinus Torvalds 	}
8031da177e4SLinus Torvalds 	return 0;
8041da177e4SLinus Torvalds }
8051da177e4SLinus Torvalds 
806e53820deSMasahide NAKAMURA static __inline__ int
807e53820deSMasahide NAKAMURA xfrm_state_addr_flow_check(struct xfrm_state *x, struct flowi *fl,
808e53820deSMasahide NAKAMURA 			   unsigned short family)
809e53820deSMasahide NAKAMURA {
810e53820deSMasahide NAKAMURA 	switch (family) {
811e53820deSMasahide NAKAMURA 	case AF_INET:
812e53820deSMasahide NAKAMURA 		return __xfrm4_state_addr_check(x,
813e53820deSMasahide NAKAMURA 						(xfrm_address_t *)&fl->fl4_dst,
814e53820deSMasahide NAKAMURA 						(xfrm_address_t *)&fl->fl4_src);
815e53820deSMasahide NAKAMURA 	case AF_INET6:
816e53820deSMasahide NAKAMURA 		return __xfrm6_state_addr_check(x,
817e53820deSMasahide NAKAMURA 						(xfrm_address_t *)&fl->fl6_dst,
818e53820deSMasahide NAKAMURA 						(xfrm_address_t *)&fl->fl6_src);
819e53820deSMasahide NAKAMURA 	}
820e53820deSMasahide NAKAMURA 	return 0;
821e53820deSMasahide NAKAMURA }
822e53820deSMasahide NAKAMURA 
8231da177e4SLinus Torvalds static inline int xfrm_state_kern(struct xfrm_state *x)
8241da177e4SLinus Torvalds {
8251da177e4SLinus Torvalds 	return atomic_read(&x->tunnel_users);
8261da177e4SLinus Torvalds }
8271da177e4SLinus Torvalds 
8285794708fSMasahide NAKAMURA static inline int xfrm_id_proto_match(u8 proto, u8 userproto)
8295794708fSMasahide NAKAMURA {
830dc00a525SMasahide NAKAMURA 	return (!userproto || proto == userproto ||
831dc00a525SMasahide NAKAMURA 		(userproto == IPSEC_PROTO_ANY && (proto == IPPROTO_AH ||
832dc00a525SMasahide NAKAMURA 						  proto == IPPROTO_ESP ||
833dc00a525SMasahide NAKAMURA 						  proto == IPPROTO_COMP)));
8345794708fSMasahide NAKAMURA }
8355794708fSMasahide NAKAMURA 
8361da177e4SLinus Torvalds /*
8371da177e4SLinus Torvalds  * xfrm algorithm information
8381da177e4SLinus Torvalds  */
8391da177e4SLinus Torvalds struct xfrm_algo_auth_info {
8401da177e4SLinus Torvalds 	u16 icv_truncbits;
8411da177e4SLinus Torvalds 	u16 icv_fullbits;
8421da177e4SLinus Torvalds };
8431da177e4SLinus Torvalds 
8441da177e4SLinus Torvalds struct xfrm_algo_encr_info {
8451da177e4SLinus Torvalds 	u16 blockbits;
8461da177e4SLinus Torvalds 	u16 defkeybits;
8471da177e4SLinus Torvalds };
8481da177e4SLinus Torvalds 
8491da177e4SLinus Torvalds struct xfrm_algo_comp_info {
8501da177e4SLinus Torvalds 	u16 threshold;
8511da177e4SLinus Torvalds };
8521da177e4SLinus Torvalds 
8531da177e4SLinus Torvalds struct xfrm_algo_desc {
8541da177e4SLinus Torvalds 	char *name;
85504ff1260SHerbert Xu 	char *compat;
8561da177e4SLinus Torvalds 	u8 available:1;
8571da177e4SLinus Torvalds 	union {
8581da177e4SLinus Torvalds 		struct xfrm_algo_auth_info auth;
8591da177e4SLinus Torvalds 		struct xfrm_algo_encr_info encr;
8601da177e4SLinus Torvalds 		struct xfrm_algo_comp_info comp;
8611da177e4SLinus Torvalds 	} uinfo;
8621da177e4SLinus Torvalds 	struct sadb_alg desc;
8631da177e4SLinus Torvalds };
8641da177e4SLinus Torvalds 
8651da177e4SLinus Torvalds /* XFRM tunnel handlers.  */
8661da177e4SLinus Torvalds struct xfrm_tunnel {
8671da177e4SLinus Torvalds 	int (*handler)(struct sk_buff *skb);
868d2acc347SHerbert Xu 	int (*err_handler)(struct sk_buff *skb, __u32 info);
869d2acc347SHerbert Xu 
870d2acc347SHerbert Xu 	struct xfrm_tunnel *next;
871d2acc347SHerbert Xu 	int priority;
8721da177e4SLinus Torvalds };
8731da177e4SLinus Torvalds 
8741da177e4SLinus Torvalds struct xfrm6_tunnel {
875d2acc347SHerbert Xu 	int (*handler)(struct sk_buff *skb);
876d2acc347SHerbert Xu 	int (*err_handler)(struct sk_buff *skb, struct inet6_skb_parm *opt,
87704ce6909SAl Viro 			   int type, int code, int offset, __be32 info);
878d2acc347SHerbert Xu 	struct xfrm6_tunnel *next;
879d2acc347SHerbert Xu 	int priority;
8801da177e4SLinus Torvalds };
8811da177e4SLinus Torvalds 
8821da177e4SLinus Torvalds extern void xfrm_init(void);
8831da177e4SLinus Torvalds extern void xfrm4_init(void);
8841da177e4SLinus Torvalds extern void xfrm6_init(void);
8851da177e4SLinus Torvalds extern void xfrm6_fini(void);
8861da177e4SLinus Torvalds extern void xfrm_state_init(void);
8871da177e4SLinus Torvalds extern void xfrm4_state_init(void);
8881da177e4SLinus Torvalds extern void xfrm6_state_init(void);
8891da177e4SLinus Torvalds extern void xfrm6_state_fini(void);
8901da177e4SLinus Torvalds 
8911da177e4SLinus Torvalds extern int xfrm_state_walk(u8 proto, int (*func)(struct xfrm_state *, int, void*), void *);
8921da177e4SLinus Torvalds extern struct xfrm_state *xfrm_state_alloc(void);
8931da177e4SLinus Torvalds extern struct xfrm_state *xfrm_state_find(xfrm_address_t *daddr, xfrm_address_t *saddr,
8941da177e4SLinus Torvalds 					  struct flowi *fl, struct xfrm_tmpl *tmpl,
8951da177e4SLinus Torvalds 					  struct xfrm_policy *pol, int *err,
8961da177e4SLinus Torvalds 					  unsigned short family);
8971da177e4SLinus Torvalds extern int xfrm_state_check_expire(struct xfrm_state *x);
8981da177e4SLinus Torvalds extern void xfrm_state_insert(struct xfrm_state *x);
8991da177e4SLinus Torvalds extern int xfrm_state_add(struct xfrm_state *x);
9001da177e4SLinus Torvalds extern int xfrm_state_update(struct xfrm_state *x);
901a94cfd19SAl Viro extern struct xfrm_state *xfrm_state_lookup(xfrm_address_t *daddr, __be32 spi, u8 proto, unsigned short family);
902eb2971b6SMasahide NAKAMURA extern struct xfrm_state *xfrm_state_lookup_byaddr(xfrm_address_t *daddr, xfrm_address_t *saddr, u8 proto, unsigned short family);
90341a49cc3SMasahide NAKAMURA #ifdef CONFIG_XFRM_SUB_POLICY
90441a49cc3SMasahide NAKAMURA extern int xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src,
90541a49cc3SMasahide NAKAMURA 			  int n, unsigned short family);
90641a49cc3SMasahide NAKAMURA extern int xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src,
90741a49cc3SMasahide NAKAMURA 			   int n, unsigned short family);
90841a49cc3SMasahide NAKAMURA #else
90941a49cc3SMasahide NAKAMURA static inline int xfrm_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src,
91041a49cc3SMasahide NAKAMURA 				 int n, unsigned short family)
91141a49cc3SMasahide NAKAMURA {
91241a49cc3SMasahide NAKAMURA 	return -ENOSYS;
91341a49cc3SMasahide NAKAMURA }
91441a49cc3SMasahide NAKAMURA 
91541a49cc3SMasahide NAKAMURA static inline int xfrm_state_sort(struct xfrm_state **dst, struct xfrm_state **src,
91641a49cc3SMasahide NAKAMURA 				  int n, unsigned short family)
91741a49cc3SMasahide NAKAMURA {
91841a49cc3SMasahide NAKAMURA 	return -ENOSYS;
91941a49cc3SMasahide NAKAMURA }
92041a49cc3SMasahide NAKAMURA #endif
9211da177e4SLinus Torvalds extern struct xfrm_state *xfrm_find_acq_byseq(u32 seq);
92226b15dadSJamal Hadi Salim extern int xfrm_state_delete(struct xfrm_state *x);
923161a09e7SJoy Latten extern void xfrm_state_flush(u8 proto, struct xfrm_audit *audit_info);
924a252cc23SAl Viro extern int xfrm_replay_check(struct xfrm_state *x, __be32 seq);
92561f4627bSAl Viro extern void xfrm_replay_advance(struct xfrm_state *x, __be32 seq);
926f8cd5488SJamal Hadi Salim extern void xfrm_replay_notify(struct xfrm_state *x, int event);
9271da177e4SLinus Torvalds extern int xfrm_state_check(struct xfrm_state *x, struct sk_buff *skb);
9281da177e4SLinus Torvalds extern int xfrm_state_mtu(struct xfrm_state *x, int mtu);
92972cb6962SHerbert Xu extern int xfrm_init_state(struct xfrm_state *x);
9301da177e4SLinus Torvalds extern int xfrm4_rcv(struct sk_buff *skb);
9311da177e4SLinus Torvalds extern int xfrm4_output(struct sk_buff *skb);
9321da177e4SLinus Torvalds extern int xfrm4_tunnel_register(struct xfrm_tunnel *handler);
9331da177e4SLinus Torvalds extern int xfrm4_tunnel_deregister(struct xfrm_tunnel *handler);
934a252cc23SAl Viro extern int xfrm6_rcv_spi(struct sk_buff *skb, __be32 spi);
935951dbc8aSPatrick McHardy extern int xfrm6_rcv(struct sk_buff **pskb);
936fbd9a5b4SMasahide NAKAMURA extern int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr,
937fbd9a5b4SMasahide NAKAMURA 			    xfrm_address_t *saddr, u8 proto);
9381da177e4SLinus Torvalds extern int xfrm6_tunnel_register(struct xfrm6_tunnel *handler);
9391da177e4SLinus Torvalds extern int xfrm6_tunnel_deregister(struct xfrm6_tunnel *handler);
9408c689a6eSAl Viro extern __be32 xfrm6_tunnel_alloc_spi(xfrm_address_t *saddr);
9411da177e4SLinus Torvalds extern void xfrm6_tunnel_free_spi(xfrm_address_t *saddr);
9428c689a6eSAl Viro extern __be32 xfrm6_tunnel_spi_lookup(xfrm_address_t *saddr);
9431da177e4SLinus Torvalds extern int xfrm6_output(struct sk_buff *skb);
944aee5adb4SMasahide NAKAMURA extern int xfrm6_find_1stfragopt(struct xfrm_state *x, struct sk_buff *skb,
945aee5adb4SMasahide NAKAMURA 				 u8 **prevhdr);
9461da177e4SLinus Torvalds 
9471da177e4SLinus Torvalds #ifdef CONFIG_XFRM
9481da177e4SLinus Torvalds extern int xfrm4_rcv_encap(struct sk_buff *skb, __u16 encap_type);
9491da177e4SLinus Torvalds extern int xfrm_user_policy(struct sock *sk, int optname, u8 __user *optval, int optlen);
9501da177e4SLinus Torvalds extern int xfrm_dst_lookup(struct xfrm_dst **dst, struct flowi *fl, unsigned short family);
9511da177e4SLinus Torvalds #else
9521da177e4SLinus Torvalds static inline int xfrm_user_policy(struct sock *sk, int optname, u8 __user *optval, int optlen)
9531da177e4SLinus Torvalds {
9541da177e4SLinus Torvalds  	return -ENOPROTOOPT;
9551da177e4SLinus Torvalds }
9561da177e4SLinus Torvalds 
9571da177e4SLinus Torvalds static inline int xfrm4_rcv_encap(struct sk_buff *skb, __u16 encap_type)
9581da177e4SLinus Torvalds {
9591da177e4SLinus Torvalds  	/* should not happen */
9601da177e4SLinus Torvalds  	kfree_skb(skb);
9611da177e4SLinus Torvalds 	return 0;
9621da177e4SLinus Torvalds }
9631da177e4SLinus Torvalds static inline int xfrm_dst_lookup(struct xfrm_dst **dst, struct flowi *fl, unsigned short family)
9641da177e4SLinus Torvalds {
9651da177e4SLinus Torvalds 	return -EINVAL;
9661da177e4SLinus Torvalds }
9671da177e4SLinus Torvalds #endif
9681da177e4SLinus Torvalds 
969dd0fc66fSAl Viro struct xfrm_policy *xfrm_policy_alloc(gfp_t gfp);
9704e81bb83SMasahide NAKAMURA extern int xfrm_policy_walk(u8 type, int (*func)(struct xfrm_policy *, int, int, void*), void *);
9711da177e4SLinus Torvalds int xfrm_policy_insert(int dir, struct xfrm_policy *policy, int excl);
9724e81bb83SMasahide NAKAMURA struct xfrm_policy *xfrm_policy_bysel_ctx(u8 type, int dir,
9734e81bb83SMasahide NAKAMURA 					  struct xfrm_selector *sel,
974df71837dSTrent Jaeger 					  struct xfrm_sec_ctx *ctx, int delete);
9754e81bb83SMasahide NAKAMURA struct xfrm_policy *xfrm_policy_byid(u8, int dir, u32 id, int delete);
976161a09e7SJoy Latten void xfrm_policy_flush(u8 type, struct xfrm_audit *audit_info);
9771da177e4SLinus Torvalds u32 xfrm_get_acqseq(void);
97826977b4eSAl Viro void xfrm_alloc_spi(struct xfrm_state *x, __be32 minspi, __be32 maxspi);
9791da177e4SLinus Torvalds struct xfrm_state * xfrm_find_acq(u8 mode, u32 reqid, u8 proto,
9801da177e4SLinus Torvalds 				  xfrm_address_t *daddr, xfrm_address_t *saddr,
9811da177e4SLinus Torvalds 				  int create, unsigned short family);
982161a09e7SJoy Latten extern void xfrm_policy_flush(u8 type, struct xfrm_audit *audit_info);
9831da177e4SLinus Torvalds extern int xfrm_sk_policy_insert(struct sock *sk, int dir, struct xfrm_policy *pol);
9845b368e61SVenkat Yekkirala extern int xfrm_bundle_ok(struct xfrm_policy *pol, struct xfrm_dst *xdst,
9855b368e61SVenkat Yekkirala 			  struct flowi *fl, int family, int strict);
9861da177e4SLinus Torvalds extern void xfrm_init_pmtu(struct dst_entry *dst);
9871da177e4SLinus Torvalds 
9881da177e4SLinus Torvalds extern wait_queue_head_t km_waitq;
9895d36b180SAl Viro extern int km_new_mapping(struct xfrm_state *x, xfrm_address_t *ipaddr, __be16 sport);
9906c5c8ca7SJamal Hadi Salim extern void km_policy_expired(struct xfrm_policy *pol, int dir, int hard, u32 pid);
99197a64b45SMasahide NAKAMURA extern int km_report(u8 proto, struct xfrm_selector *sel, xfrm_address_t *addr);
9921da177e4SLinus Torvalds 
9931da177e4SLinus Torvalds extern void xfrm_input_init(void);
9946067b2baSAl Viro extern int xfrm_parse_spi(struct sk_buff *skb, u8 nexthdr, __be32 *spi, __be32 *seq);
9951da177e4SLinus Torvalds 
9961da177e4SLinus Torvalds extern void xfrm_probe_algs(void);
9971da177e4SLinus Torvalds extern int xfrm_count_auth_supported(void);
9981da177e4SLinus Torvalds extern int xfrm_count_enc_supported(void);
9991da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byidx(unsigned int idx);
10001da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byidx(unsigned int idx);
10011da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byid(int alg_id);
10021da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byid(int alg_id);
10031da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_calg_get_byid(int alg_id);
10041da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_aalg_get_byname(char *name, int probe);
10051da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_ealg_get_byname(char *name, int probe);
10061da177e4SLinus Torvalds extern struct xfrm_algo_desc *xfrm_calg_get_byname(char *name, int probe);
10071da177e4SLinus Torvalds 
100807d4ee58SHerbert Xu struct hash_desc;
10099409f38aSHerbert Xu struct scatterlist;
101007d4ee58SHerbert Xu typedef int (icv_update_fn_t)(struct hash_desc *, struct scatterlist *,
101107d4ee58SHerbert Xu 			      unsigned int);
10121da177e4SLinus Torvalds 
101307d4ee58SHerbert Xu extern int skb_icv_walk(const struct sk_buff *skb, struct hash_desc *tfm,
10141da177e4SLinus Torvalds 			int offset, int len, icv_update_fn_t icv_update);
10151da177e4SLinus Torvalds 
10161da177e4SLinus Torvalds static inline int xfrm_addr_cmp(xfrm_address_t *a, xfrm_address_t *b,
10171da177e4SLinus Torvalds 				int family)
10181da177e4SLinus Torvalds {
10191da177e4SLinus Torvalds 	switch (family) {
10201da177e4SLinus Torvalds 	default:
10211da177e4SLinus Torvalds 	case AF_INET:
10228c689a6eSAl Viro 		return (__force __u32)a->a4 - (__force __u32)b->a4;
10231da177e4SLinus Torvalds 	case AF_INET6:
10241da177e4SLinus Torvalds 		return ipv6_addr_cmp((struct in6_addr *)a,
10251da177e4SLinus Torvalds 				     (struct in6_addr *)b);
10261da177e4SLinus Torvalds 	}
10271da177e4SLinus Torvalds }
10281da177e4SLinus Torvalds 
102977d8d7a6SHerbert Xu static inline int xfrm_policy_id2dir(u32 index)
103077d8d7a6SHerbert Xu {
103177d8d7a6SHerbert Xu 	return index & 7;
103277d8d7a6SHerbert Xu }
103377d8d7a6SHerbert Xu 
1034f8cd5488SJamal Hadi Salim static inline int xfrm_aevent_is_on(void)
1035f8cd5488SJamal Hadi Salim {
1036be33690dSPatrick McHardy 	struct sock *nlsk;
1037be33690dSPatrick McHardy 	int ret = 0;
1038be33690dSPatrick McHardy 
1039be33690dSPatrick McHardy 	rcu_read_lock();
1040be33690dSPatrick McHardy 	nlsk = rcu_dereference(xfrm_nl);
1041be33690dSPatrick McHardy 	if (nlsk)
1042be33690dSPatrick McHardy 		ret = netlink_has_listeners(nlsk, XFRMNLGRP_AEVENTS);
1043be33690dSPatrick McHardy 	rcu_read_unlock();
1044be33690dSPatrick McHardy 	return ret;
1045f8cd5488SJamal Hadi Salim }
1046f8cd5488SJamal Hadi Salim 
1047f8cd5488SJamal Hadi Salim static inline void xfrm_aevent_doreplay(struct xfrm_state *x)
1048f8cd5488SJamal Hadi Salim {
1049f8cd5488SJamal Hadi Salim 	if (xfrm_aevent_is_on())
1050f8cd5488SJamal Hadi Salim 		xfrm_replay_notify(x, XFRM_REPLAY_UPDATE);
1051f8cd5488SJamal Hadi Salim }
1052f8cd5488SJamal Hadi Salim 
1053f8cd5488SJamal Hadi Salim 
10541da177e4SLinus Torvalds #endif	/* _NET_XFRM_H */
1055