[IPSEC]: Separate inner/outer mode processing on output
[deliverable/linux.git] / net / ipv6 / xfrm6_input.c
CommitLineData
1da177e4
LT
1/*
2 * xfrm6_input.c: based on net/ipv4/xfrm4_input.c
3 *
4 * Authors:
5 * Mitsuru KANDA @USAGI
6 * Kazunori MIYAZAWA @USAGI
7 * Kunihiro Ishiguro <kunihiro@ipinfusion.com>
8 * YOSHIFUJI Hideaki @USAGI
9 * IPv6 support
10 */
11
12#include <linux/module.h>
13#include <linux/string.h>
b05e1066
PM
14#include <linux/netfilter.h>
15#include <linux/netfilter_ipv6.h>
1da177e4
LT
16#include <net/ipv6.h>
17#include <net/xfrm.h>
18
33b5ecb8 19int xfrm6_rcv_spi(struct sk_buff *skb, int nexthdr, __be32 spi)
1da177e4 20{
1da177e4 21 int err;
6067b2ba 22 __be32 seq;
dbe5b4aa 23 struct xfrm_state *xfrm_vec[XFRM_MAX_DEPTH];
1da177e4
LT
24 struct xfrm_state *x;
25 int xfrm_nr = 0;
26 int decaps = 0;
1da177e4
LT
27 unsigned int nhoff;
28
951dbc8a 29 nhoff = IP6CB(skb)->nhoff;
1da177e4
LT
30
31 seq = 0;
32 if (!spi && (err = xfrm_parse_spi(skb, nexthdr, &spi, &seq)) != 0)
33 goto drop;
1ab1457c 34
1da177e4 35 do {
0660e03f 36 struct ipv6hdr *iph = ipv6_hdr(skb);
1da177e4
LT
37
38 if (xfrm_nr == XFRM_MAX_DEPTH)
39 goto drop;
40
73d605d1 41 x = xfrm_state_lookup((xfrm_address_t *)&iph->daddr, spi,
33b5ecb8 42 nexthdr, AF_INET6);
1da177e4
LT
43 if (x == NULL)
44 goto drop;
45 spin_lock(&x->lock);
46 if (unlikely(x->km.state != XFRM_STATE_VALID))
47 goto drop_unlock;
48
49 if (x->props.replay_window && xfrm_replay_check(x, seq))
50 goto drop_unlock;
51
52 if (xfrm_state_check_expire(x))
53 goto drop_unlock;
54
e695633e 55 nexthdr = x->type->input(x, skb);
1da177e4
LT
56 if (nexthdr <= 0)
57 goto drop_unlock;
58
d56f90a7 59 skb_network_header(skb)[nhoff] = nexthdr;
1da177e4
LT
60
61 if (x->props.replay_window)
62 xfrm_replay_advance(x, seq);
63
64 x->curlft.bytes += skb->len;
65 x->curlft.packets++;
66
67 spin_unlock(&x->lock);
68
dbe5b4aa 69 xfrm_vec[xfrm_nr++] = x;
1da177e4 70
13996378 71 if (x->outer_mode->input(x, skb))
b59f45d0
HX
72 goto drop;
73
13996378 74 if (x->outer_mode->flags & XFRM_MODE_FLAG_TUNNEL) {
1da177e4
LT
75 decaps = 1;
76 break;
77 }
78
79 if ((err = xfrm_parse_spi(skb, nexthdr, &spi, &seq)) < 0)
80 goto drop;
81 } while (!err);
82
83 /* Allocate new secpath or COW existing one. */
84 if (!skb->sp || atomic_read(&skb->sp->refcnt) != 1) {
85 struct sec_path *sp;
86 sp = secpath_dup(skb->sp);
87 if (!sp)
88 goto drop;
89 if (skb->sp)
90 secpath_put(skb->sp);
91 skb->sp = sp;
92 }
93
94 if (xfrm_nr + skb->sp->len > XFRM_MAX_DEPTH)
95 goto drop;
96
dbe5b4aa
HX
97 memcpy(skb->sp->xvec + skb->sp->len, xfrm_vec,
98 xfrm_nr * sizeof(xfrm_vec[0]));
1da177e4 99 skb->sp->len += xfrm_nr;
1da177e4 100
b05e1066
PM
101 nf_reset(skb);
102
1da177e4 103 if (decaps) {
f282d45c
KM
104 dst_release(skb->dst);
105 skb->dst = NULL;
1da177e4
LT
106 netif_rx(skb);
107 return -1;
108 } else {
b05e1066 109#ifdef CONFIG_NETFILTER
0660e03f 110 ipv6_hdr(skb)->payload_len = htons(skb->len);
d56f90a7 111 __skb_push(skb, skb->data - skb_network_header(skb));
b05e1066
PM
112
113 NF_HOOK(PF_INET6, NF_IP6_PRE_ROUTING, skb, skb->dev, NULL,
1ab1457c 114 ip6_rcv_finish);
b05e1066
PM
115 return -1;
116#else
1da177e4 117 return 1;
b05e1066 118#endif
1da177e4
LT
119 }
120
121drop_unlock:
122 spin_unlock(&x->lock);
123 xfrm_state_put(x);
124drop:
125 while (--xfrm_nr >= 0)
dbe5b4aa 126 xfrm_state_put(xfrm_vec[xfrm_nr]);
1da177e4
LT
127 kfree_skb(skb);
128 return -1;
129}
130
131EXPORT_SYMBOL(xfrm6_rcv_spi);
132
e5bbef20 133int xfrm6_rcv(struct sk_buff *skb)
1da177e4 134{
33b5ecb8
HX
135 return xfrm6_rcv_spi(skb, skb_network_header(skb)[IP6CB(skb)->nhoff],
136 0);
1da177e4 137}
fbd9a5b4 138
7159039a
YH
139EXPORT_SYMBOL(xfrm6_rcv);
140
fbd9a5b4
MN
141int xfrm6_input_addr(struct sk_buff *skb, xfrm_address_t *daddr,
142 xfrm_address_t *saddr, u8 proto)
143{
1ab1457c
YH
144 struct xfrm_state *x = NULL;
145 int wildcard = 0;
fbd9a5b4
MN
146 xfrm_address_t *xany;
147 struct xfrm_state *xfrm_vec_one = NULL;
1ab1457c 148 int nh = 0;
fbd9a5b4
MN
149 int i = 0;
150
c53b3590 151 xany = (xfrm_address_t *)&in6addr_any;
fbd9a5b4
MN
152
153 for (i = 0; i < 3; i++) {
154 xfrm_address_t *dst, *src;
155 switch (i) {
156 case 0:
157 dst = daddr;
158 src = saddr;
159 break;
160 case 1:
161 /* lookup state with wild-card source address */
162 wildcard = 1;
163 dst = daddr;
164 src = xany;
165 break;
166 case 2:
167 default:
1ab1457c 168 /* lookup state with wild-card addresses */
fbd9a5b4
MN
169 wildcard = 1; /* XXX */
170 dst = xany;
171 src = xany;
172 break;
1ab1457c 173 }
fbd9a5b4
MN
174
175 x = xfrm_state_lookup_byaddr(dst, src, proto, AF_INET6);
176 if (!x)
177 continue;
178
179 spin_lock(&x->lock);
180
181 if (wildcard) {
182 if ((x->props.flags & XFRM_STATE_WILDRECV) == 0) {
183 spin_unlock(&x->lock);
184 xfrm_state_put(x);
185 x = NULL;
186 continue;
187 }
188 }
189
190 if (unlikely(x->km.state != XFRM_STATE_VALID)) {
191 spin_unlock(&x->lock);
192 xfrm_state_put(x);
1ab1457c
YH
193 x = NULL;
194 continue;
fbd9a5b4
MN
195 }
196 if (xfrm_state_check_expire(x)) {
197 spin_unlock(&x->lock);
198 xfrm_state_put(x);
199 x = NULL;
200 continue;
201 }
202
203 nh = x->type->input(x, skb);
204 if (nh <= 0) {
205 spin_unlock(&x->lock);
206 xfrm_state_put(x);
207 x = NULL;
208 continue;
209 }
210
211 x->curlft.bytes += skb->len;
212 x->curlft.packets++;
213
214 spin_unlock(&x->lock);
215
216 xfrm_vec_one = x;
217 break;
218 }
219
220 if (!xfrm_vec_one)
221 goto drop;
222
223 /* Allocate new secpath or COW existing one. */
224 if (!skb->sp || atomic_read(&skb->sp->refcnt) != 1) {
225 struct sec_path *sp;
226 sp = secpath_dup(skb->sp);
227 if (!sp)
228 goto drop;
229 if (skb->sp)
230 secpath_put(skb->sp);
231 skb->sp = sp;
232 }
233
234 if (1 + skb->sp->len > XFRM_MAX_DEPTH)
235 goto drop;
236
237 skb->sp->xvec[skb->sp->len] = xfrm_vec_one;
238 skb->sp->len ++;
239
240 return 1;
241drop:
242 if (xfrm_vec_one)
243 xfrm_state_put(xfrm_vec_one);
244 return -1;
245}
7159039a
YH
246
247EXPORT_SYMBOL(xfrm6_input_addr);
This page took 0.451454 seconds and 5 git commands to generate.