2005-04-17 02:20:36 +04:00
/*
* xfrm4_input . c
*
* Changes :
* YOSHIFUJI Hideaki @ USAGI
* Split up af - specific portion
* Derek Atkins < derek @ ihtfp . com >
* Add Encapsulation support
2007-02-09 17:24:47 +03:00
*
2005-04-17 02:20:36 +04:00
*/
# include <linux/module.h>
# include <linux/string.h>
2006-01-07 10:03:34 +03:00
# include <linux/netfilter.h>
# include <linux/netfilter_ipv4.h>
2005-04-17 02:20:36 +04:00
# include <net/ip.h>
# include <net/xfrm.h>
2007-11-14 08:41:28 +03:00
int xfrm4_extract_input ( struct xfrm_state * x , struct sk_buff * skb )
{
return xfrm4_extract_header ( skb ) ;
}
2006-01-07 10:03:34 +03:00
static inline int xfrm4_rcv_encap_finish ( struct sk_buff * skb )
{
if ( skb - > dst = = NULL ) {
2007-04-21 09:47:35 +04:00
const struct iphdr * iph = ip_hdr ( skb ) ;
2006-01-07 10:03:34 +03:00
if ( ip_route_input ( skb , iph - > daddr , iph - > saddr , iph - > tos ,
2007-02-09 17:24:47 +03:00
skb - > dev ) )
2006-01-07 10:03:34 +03:00
goto drop ;
}
return dst_input ( skb ) ;
drop :
kfree_skb ( skb ) ;
return NET_RX_DROP ;
}
2007-10-18 08:28:53 +04:00
int xfrm4_rcv_encap ( struct sk_buff * skb , int nexthdr , __be32 spi ,
int encap_type )
2005-04-17 02:20:36 +04:00
{
2007-12-04 09:54:12 +03:00
XFRM_SPI_SKB_CB ( skb ) - > family = AF_INET ;
2007-11-14 08:44:23 +03:00
XFRM_SPI_SKB_CB ( skb ) - > daddroff = offsetof ( struct iphdr , daddr ) ;
return xfrm_input ( skb , nexthdr , spi , encap_type ) ;
}
EXPORT_SYMBOL ( xfrm4_rcv_encap ) ;
2006-01-07 10:03:34 +03:00
2007-11-14 08:44:23 +03:00
int xfrm4_transport_finish ( struct sk_buff * skb , int async )
{
2007-11-20 05:47:58 +03:00
struct iphdr * iph = ip_hdr ( skb ) ;
iph - > protocol = XFRM_MODE_SKB_CB ( skb ) - > protocol ;
2007-12-31 08:10:14 +03:00
# ifndef CONFIG_NETFILTER
if ( ! async )
return - iph - > protocol ;
# endif
2007-11-14 08:44:23 +03:00
__skb_push ( skb , skb - > data - skb_network_header ( skb ) ) ;
2007-11-20 05:47:58 +03:00
iph - > tot_len = htons ( skb - > len ) ;
ip_send_check ( iph ) ;
2006-01-07 10:03:34 +03:00
2007-11-20 05:53:30 +03:00
NF_HOOK ( PF_INET , NF_INET_PRE_ROUTING , skb , skb - > dev , NULL ,
2007-11-14 08:44:23 +03:00
xfrm4_rcv_encap_finish ) ;
return 0 ;
2005-04-17 02:20:36 +04:00
}
2007-07-06 04:08:05 +04:00
/* If it's a keepalive packet, then just eat it.
* If it ' s an encapsulated packet , then pass it to the
* IPsec xfrm input .
* Returns 0 if skb passed to xfrm or was dropped .
* Returns > 0 if skb should be passed to UDP .
* Returns < 0 if skb should be resubmitted ( - ret is protocol )
*/
int xfrm4_udp_encap_rcv ( struct sock * sk , struct sk_buff * skb )
{
struct udp_sock * up = udp_sk ( sk ) ;
struct udphdr * uh ;
struct iphdr * iph ;
int iphlen , len ;
__u8 * udpdata ;
__be32 * udpdata32 ;
__u16 encap_type = up - > encap_type ;
/* if this is not encapsulated socket, then just return now */
if ( ! encap_type )
return 1 ;
/* If this is a paged skb, make sure we pull up
* whatever data we need to look at . */
len = skb - > len - sizeof ( struct udphdr ) ;
if ( ! pskb_may_pull ( skb , sizeof ( struct udphdr ) + min ( len , 8 ) ) )
return 1 ;
/* Now we can get the pointers */
uh = udp_hdr ( skb ) ;
udpdata = ( __u8 * ) uh + sizeof ( struct udphdr ) ;
udpdata32 = ( __be32 * ) udpdata ;
switch ( encap_type ) {
default :
case UDP_ENCAP_ESPINUDP :
/* Check if this is a keepalive packet. If so, eat it. */
if ( len = = 1 & & udpdata [ 0 ] = = 0xff ) {
goto drop ;
} else if ( len > sizeof ( struct ip_esp_hdr ) & & udpdata32 [ 0 ] ! = 0 ) {
/* ESP Packet without Non-ESP header */
len = sizeof ( struct udphdr ) ;
} else
/* Must be an IKE packet.. pass it through */
return 1 ;
break ;
case UDP_ENCAP_ESPINUDP_NON_IKE :
/* Check if this is a keepalive packet. If so, eat it. */
if ( len = = 1 & & udpdata [ 0 ] = = 0xff ) {
goto drop ;
} else if ( len > 2 * sizeof ( u32 ) + sizeof ( struct ip_esp_hdr ) & &
udpdata32 [ 0 ] = = 0 & & udpdata32 [ 1 ] = = 0 ) {
/* ESP Packet with Non-IKE marker */
len = sizeof ( struct udphdr ) + 2 * sizeof ( u32 ) ;
} else
/* Must be an IKE packet.. pass it through */
return 1 ;
break ;
}
/* At this point we are sure that this is an ESPinUDP packet,
* so we need to remove ' len ' bytes from the packet ( the UDP
* header and optional ESP marker bytes ) and then modify the
* protocol to ESP , and then call into the transform receiver .
*/
if ( skb_cloned ( skb ) & & pskb_expand_head ( skb , 0 , 0 , GFP_ATOMIC ) )
goto drop ;
/* Now we can update and verify the packet length... */
iph = ip_hdr ( skb ) ;
iphlen = iph - > ihl < < 2 ;
iph - > tot_len = htons ( ntohs ( iph - > tot_len ) - len ) ;
if ( skb - > len < iphlen + len ) {
/* packet is too small!?! */
goto drop ;
}
/* pull the data buffer up to the ESP header and set the
* transport header to point to ESP . Keep UDP on the stack
* for later .
*/
__skb_pull ( skb , len ) ;
skb_reset_transport_header ( skb ) ;
/* process ESP */
2008-12-26 12:31:18 +03:00
return xfrm4_rcv_encap ( skb , IPPROTO_ESP , 0 , encap_type ) ;
2007-07-06 04:08:05 +04:00
drop :
kfree_skb ( skb ) ;
return 0 ;
}
int xfrm4_rcv ( struct sk_buff * skb )
{
2007-10-18 08:28:53 +04:00
return xfrm4_rcv_spi ( skb , ip_hdr ( skb ) - > protocol , 0 ) ;
2007-07-06 04:08:05 +04:00
}
EXPORT_SYMBOL ( xfrm4_rcv ) ;