| /* | 
 |  * xfrm6_state.c: based on xfrm4_state.c | 
 |  * | 
 |  * Authors: | 
 |  *	Mitsuru KANDA @USAGI | 
 |  * 	Kazunori MIYAZAWA @USAGI | 
 |  * 	Kunihiro Ishiguro <kunihiro@ipinfusion.com> | 
 |  * 		IPv6 support | 
 |  * 	YOSHIFUJI Hideaki @USAGI | 
 |  * 		Split up af-specific portion | 
 |  * | 
 |  */ | 
 |  | 
 | #include <net/xfrm.h> | 
 | #include <linux/pfkeyv2.h> | 
 | #include <linux/ipsec.h> | 
 | #include <linux/netfilter_ipv6.h> | 
 | #include <net/dsfield.h> | 
 | #include <net/ipv6.h> | 
 | #include <net/addrconf.h> | 
 |  | 
 | static struct xfrm_state_afinfo xfrm6_state_afinfo; | 
 |  | 
 | static void | 
 | __xfrm6_init_tempsel(struct xfrm_state *x, struct flowi *fl, | 
 | 		     struct xfrm_tmpl *tmpl, | 
 | 		     xfrm_address_t *daddr, xfrm_address_t *saddr) | 
 | { | 
 | 	/* Initialize temporary selector matching only | 
 | 	 * to current session. */ | 
 | 	ipv6_addr_copy((struct in6_addr *)&x->sel.daddr, &fl->fl6_dst); | 
 | 	ipv6_addr_copy((struct in6_addr *)&x->sel.saddr, &fl->fl6_src); | 
 | 	x->sel.dport = xfrm_flowi_dport(fl); | 
 | 	x->sel.dport_mask = htons(0xffff); | 
 | 	x->sel.sport = xfrm_flowi_sport(fl); | 
 | 	x->sel.sport_mask = htons(0xffff); | 
 | 	x->sel.prefixlen_d = 128; | 
 | 	x->sel.prefixlen_s = 128; | 
 | 	x->sel.proto = fl->proto; | 
 | 	x->sel.ifindex = fl->oif; | 
 | 	x->id = tmpl->id; | 
 | 	if (ipv6_addr_any((struct in6_addr*)&x->id.daddr)) | 
 | 		memcpy(&x->id.daddr, daddr, sizeof(x->sel.daddr)); | 
 | 	memcpy(&x->props.saddr, &tmpl->saddr, sizeof(x->props.saddr)); | 
 | 	if (ipv6_addr_any((struct in6_addr*)&x->props.saddr)) | 
 | 		memcpy(&x->props.saddr, saddr, sizeof(x->props.saddr)); | 
 | 	x->props.mode = tmpl->mode; | 
 | 	x->props.reqid = tmpl->reqid; | 
 | 	x->props.family = AF_INET6; | 
 | } | 
 |  | 
 | static int | 
 | __xfrm6_state_sort(struct xfrm_state **dst, struct xfrm_state **src, int n) | 
 | { | 
 | 	int i; | 
 | 	int j = 0; | 
 |  | 
 | 	/* Rule 1: select IPsec transport except AH */ | 
 | 	for (i = 0; i < n; i++) { | 
 | 		if (src[i]->props.mode == XFRM_MODE_TRANSPORT && | 
 | 		    src[i]->id.proto != IPPROTO_AH) { | 
 | 			dst[j++] = src[i]; | 
 | 			src[i] = NULL; | 
 | 		} | 
 | 	} | 
 | 	if (j == n) | 
 | 		goto end; | 
 |  | 
 | 	/* Rule 2: select MIPv6 RO or inbound trigger */ | 
 | #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE) | 
 | 	for (i = 0; i < n; i++) { | 
 | 		if (src[i] && | 
 | 		    (src[i]->props.mode == XFRM_MODE_ROUTEOPTIMIZATION || | 
 | 		     src[i]->props.mode == XFRM_MODE_IN_TRIGGER)) { | 
 | 			dst[j++] = src[i]; | 
 | 			src[i] = NULL; | 
 | 		} | 
 | 	} | 
 | 	if (j == n) | 
 | 		goto end; | 
 | #endif | 
 |  | 
 | 	/* Rule 3: select IPsec transport AH */ | 
 | 	for (i = 0; i < n; i++) { | 
 | 		if (src[i] && | 
 | 		    src[i]->props.mode == XFRM_MODE_TRANSPORT && | 
 | 		    src[i]->id.proto == IPPROTO_AH) { | 
 | 			dst[j++] = src[i]; | 
 | 			src[i] = NULL; | 
 | 		} | 
 | 	} | 
 | 	if (j == n) | 
 | 		goto end; | 
 |  | 
 | 	/* Rule 4: select IPsec tunnel */ | 
 | 	for (i = 0; i < n; i++) { | 
 | 		if (src[i] && | 
 | 		    (src[i]->props.mode == XFRM_MODE_TUNNEL || | 
 | 		     src[i]->props.mode == XFRM_MODE_BEET)) { | 
 | 			dst[j++] = src[i]; | 
 | 			src[i] = NULL; | 
 | 		} | 
 | 	} | 
 | 	if (likely(j == n)) | 
 | 		goto end; | 
 |  | 
 | 	/* Final rule */ | 
 | 	for (i = 0; i < n; i++) { | 
 | 		if (src[i]) { | 
 | 			dst[j++] = src[i]; | 
 | 			src[i] = NULL; | 
 | 		} | 
 | 	} | 
 |  | 
 |  end: | 
 | 	return 0; | 
 | } | 
 |  | 
 | static int | 
 | __xfrm6_tmpl_sort(struct xfrm_tmpl **dst, struct xfrm_tmpl **src, int n) | 
 | { | 
 | 	int i; | 
 | 	int j = 0; | 
 |  | 
 | 	/* Rule 1: select IPsec transport */ | 
 | 	for (i = 0; i < n; i++) { | 
 | 		if (src[i]->mode == XFRM_MODE_TRANSPORT) { | 
 | 			dst[j++] = src[i]; | 
 | 			src[i] = NULL; | 
 | 		} | 
 | 	} | 
 | 	if (j == n) | 
 | 		goto end; | 
 |  | 
 | 	/* Rule 2: select MIPv6 RO or inbound trigger */ | 
 | #if defined(CONFIG_IPV6_MIP6) || defined(CONFIG_IPV6_MIP6_MODULE) | 
 | 	for (i = 0; i < n; i++) { | 
 | 		if (src[i] && | 
 | 		    (src[i]->mode == XFRM_MODE_ROUTEOPTIMIZATION || | 
 | 		     src[i]->mode == XFRM_MODE_IN_TRIGGER)) { | 
 | 			dst[j++] = src[i]; | 
 | 			src[i] = NULL; | 
 | 		} | 
 | 	} | 
 | 	if (j == n) | 
 | 		goto end; | 
 | #endif | 
 |  | 
 | 	/* Rule 3: select IPsec tunnel */ | 
 | 	for (i = 0; i < n; i++) { | 
 | 		if (src[i] && | 
 | 		    (src[i]->mode == XFRM_MODE_TUNNEL || | 
 | 		     src[i]->mode == XFRM_MODE_BEET)) { | 
 | 			dst[j++] = src[i]; | 
 | 			src[i] = NULL; | 
 | 		} | 
 | 	} | 
 | 	if (likely(j == n)) | 
 | 		goto end; | 
 |  | 
 | 	/* Final rule */ | 
 | 	for (i = 0; i < n; i++) { | 
 | 		if (src[i]) { | 
 | 			dst[j++] = src[i]; | 
 | 			src[i] = NULL; | 
 | 		} | 
 | 	} | 
 |  | 
 |  end: | 
 | 	return 0; | 
 | } | 
 |  | 
 | int xfrm6_extract_header(struct sk_buff *skb) | 
 | { | 
 | 	struct ipv6hdr *iph = ipv6_hdr(skb); | 
 |  | 
 | 	XFRM_MODE_SKB_CB(skb)->id = 0; | 
 | 	XFRM_MODE_SKB_CB(skb)->frag_off = htons(IP_DF); | 
 | 	XFRM_MODE_SKB_CB(skb)->tos = ipv6_get_dsfield(iph); | 
 | 	XFRM_MODE_SKB_CB(skb)->ttl = iph->hop_limit; | 
 | 	memcpy(XFRM_MODE_SKB_CB(skb)->flow_lbl, iph->flow_lbl, | 
 | 	       sizeof(XFRM_MODE_SKB_CB(skb)->flow_lbl)); | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | static struct xfrm_state_afinfo xfrm6_state_afinfo = { | 
 | 	.family			= AF_INET6, | 
 | 	.proto			= IPPROTO_IPV6, | 
 | 	.eth_proto		= htons(ETH_P_IPV6), | 
 | 	.owner			= THIS_MODULE, | 
 | 	.init_tempsel		= __xfrm6_init_tempsel, | 
 | 	.tmpl_sort		= __xfrm6_tmpl_sort, | 
 | 	.state_sort		= __xfrm6_state_sort, | 
 | 	.output			= xfrm6_output, | 
 | 	.extract_input		= xfrm6_extract_input, | 
 | 	.extract_output		= xfrm6_extract_output, | 
 | 	.transport_finish	= xfrm6_transport_finish, | 
 | }; | 
 |  | 
 | int __init xfrm6_state_init(void) | 
 | { | 
 | 	return xfrm_state_register_afinfo(&xfrm6_state_afinfo); | 
 | } | 
 |  | 
 | void xfrm6_state_fini(void) | 
 | { | 
 | 	xfrm_state_unregister_afinfo(&xfrm6_state_afinfo); | 
 | } | 
 |  |