ipsec_sa.c
来自「FREESWAN VPN源代码包」· C语言 代码 · 共 787 行 · 第 1/2 页
C
787 行
/* * Common routines for IPsec SA maintenance routines. * * Copyright (C) 1996, 1997 John Ioannidis. * Copyright (C) 1998, 1999, 2000, 2001 Richard Guy Briggs. * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. * * RCSID $Id: ipsec_sa.c,v 1.5 2003/02/07 13:14:25 ken Exp $ * * This is the file formerly known as "ipsec_xform.h" * */#include <linux/config.h>#include <linux/version.h>#include <linux/kernel.h> /* printk() */#include "ipsec_param.h"#ifdef MALLOC_SLAB# include <linux/slab.h> /* kmalloc() */#else /* MALLOC_SLAB */# include <linux/malloc.h> /* kmalloc() */#endif /* MALLOC_SLAB */#include <linux/errno.h> /* error codes */#include <linux/types.h> /* size_t */#include <linux/interrupt.h> /* mark_bh */#include <linux/netdevice.h> /* struct device, and other headers */#include <linux/etherdevice.h> /* eth_type_trans */#include <linux/ip.h> /* struct iphdr */#include <linux/skbuff.h>#include <linux/random.h> /* get_random_bytes() */#include <freeswan.h>#ifdef SPINLOCK#ifdef SPINLOCK_23#include <linux/spinlock.h> /* *lock* */#else /* SPINLOCK_23 */#include <asm/spinlock.h> /* *lock* */#endif /* SPINLOCK_23 */#endif /* SPINLOCK */#ifdef NET_21#include <asm/uaccess.h>#include <linux/in6.h>#endif#include <asm/checksum.h>#include <net/ip.h>#include "radij.h"#include "ipsec_stats.h"#include "ipsec_life.h"#include "ipsec_sa.h"#include "ipsec_xform.h"#include "ipsec_encap.h"#include "ipsec_radij.h"#include "ipsec_netlink.h"#include "ipsec_xform.h"#include "ipsec_ipe4.h"#include "ipsec_ah.h"#include "ipsec_esp.h"#include <pfkeyv2.h>#include <pfkey.h>#include "ipsec_proto.h"#include "ipsec_alg.h"#ifdef CONFIG_IPSEC_DEBUGint debug_xform = 0;#endif /* CONFIG_IPSEC_DEBUG */#define SENDERR(_x) do { error = -(_x); goto errlab; } while (0)struct ipsec_sa *ipsec_sadb_hash[SADB_HASHMOD];#ifdef SPINLOCKspinlock_t tdb_lock = SPIN_LOCK_UNLOCKED;#else /* SPINLOCK */spinlock_t tdb_lock;#endif /* SPINLOCK */intipsec_sadb_init(void){ int i; for(i = 1; i < SADB_HASHMOD; i++) { ipsec_sadb_hash[i] = NULL; } return 0;}struct ipsec_sa *ipsec_sa_getbyid(struct sa_id *said){ int hashval; struct ipsec_sa *ips; char sa[SATOA_BUF]; size_t sa_len; if(!said) { KLIPS_PRINT(debug_xform, "klips_error:gettdb: " "null pointer passed in!\n"); return NULL; } sa_len = satoa(*said, 0, sa, SATOA_BUF); hashval = (said->spi+said->dst.s_addr+said->proto) % SADB_HASHMOD; KLIPS_PRINT(debug_xform, "klips_debug:gettdb: " "linked entry in tdb table for hash=%d of SA:%s requested.\n", hashval, sa_len ? sa : " (error)"); if(!(ips = ipsec_sadb_hash[hashval])) { KLIPS_PRINT(debug_xform, "klips_debug:gettdb: " "no entries in tdb table for hash=%d of SA:%s.\n", hashval, sa_len ? sa : " (error)"); return NULL; } for (; ips; ips = ips->ips_hnext) { if ((ips->ips_said.spi == said->spi) && (ips->ips_said.dst.s_addr == said->dst.s_addr) && (ips->ips_said.proto == said->proto)) { return ips; } } KLIPS_PRINT(debug_xform, "klips_debug:gettdb: " "no entry in linked list for hash=%d of SA:%s.\n", hashval, sa_len ? sa : " (error)"); return NULL;}/* The tdb table better *NOT* be locked before it is handed in, or SMP locks will happen*/intipsec_sa_put(struct ipsec_sa *ips){ int error = 0; unsigned int hashval; if(!ips) { KLIPS_PRINT(debug_xform, "klips_error:puttdb: " "null pointer passed in!\n"); return -ENODATA; } hashval = ((ips->ips_said.spi + ips->ips_said.dst.s_addr + ips->ips_said.proto) % SADB_HASHMOD); spin_lock_bh(&tdb_lock); ips->ips_hnext = ipsec_sadb_hash[hashval]; ipsec_sadb_hash[hashval] = ips; spin_unlock_bh(&tdb_lock); return error;}/* The tdb table better be locked before it is handed in, or races might happen*/intipsec_sa_del(struct ipsec_sa *ips){ unsigned int hashval; struct ipsec_sa *tdbtp; char sa[SATOA_BUF]; size_t sa_len; if(!ips) { KLIPS_PRINT(debug_xform, "klips_error:deltdb: " "null pointer passed in!\n"); return -ENODATA; } sa_len = satoa(ips->ips_said, 0, sa, SATOA_BUF); if(ips->ips_inext || ips->ips_onext) { KLIPS_PRINT(debug_xform, "klips_error:deltdb: " "SA:%s still linked!\n", sa_len ? sa : " (error)"); return -EMLINK; } hashval = ((ips->ips_said.spi + ips->ips_said.dst.s_addr + ips->ips_said.proto) % SADB_HASHMOD); KLIPS_PRINT(debug_xform, "klips_debug:deltdb: " "deleting SA:%s, hashval=%d.\n", sa_len ? sa : " (error)", hashval); if(!ipsec_sadb_hash[hashval]) { KLIPS_PRINT(debug_xform, "klips_debug:deltdb: " "no entries in tdb table for hash=%d of SA:%s.\n", hashval, sa_len ? sa : " (error)"); return -ENOENT; } if (ips == ipsec_sadb_hash[hashval]) { ipsec_sadb_hash[hashval] = ipsec_sadb_hash[hashval]->ips_hnext; ips->ips_hnext = NULL; KLIPS_PRINT(debug_xform, "klips_debug:deltdb: " "successfully deleted first tdb in chain.\n"); return 0; } else { for (tdbtp = ipsec_sadb_hash[hashval]; tdbtp; tdbtp = tdbtp->ips_hnext) { if (tdbtp->ips_hnext == ips) { tdbtp->ips_hnext = ips->ips_hnext; ips->ips_hnext = NULL; KLIPS_PRINT(debug_xform, "klips_debug:deltdb: " "successfully deleted link in tdb chain.\n"); return 0; } } } KLIPS_PRINT(debug_xform, "klips_debug:deltdb: " "no entries in linked list for hash=%d of SA:%s.\n", hashval, sa_len ? sa : " (error)"); return -ENOENT;}/* The tdb table better be locked before it is handed in, or races might happen*/intipsec_sa_delchain(struct ipsec_sa *ips){ struct ipsec_sa *tdbdel; int error = 0; char sa[SATOA_BUF]; size_t sa_len; if(!ips) { KLIPS_PRINT(debug_xform, "klips_error:deltdbchain: " "null pointer passed in!\n"); return -ENODATA; } sa_len = satoa(ips->ips_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_xform, "klips_debug:deltdbchain: " "passed SA:%s\n", sa_len ? sa : " (error)"); while(ips->ips_onext) { ips = ips->ips_onext; } while(ips) { /* XXX send a pfkey message up to advise of deleted TDB */ sa_len = satoa(ips->ips_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_xform, "klips_debug:deltdbchain: " "unlinking and delting SA:%s", sa_len ? sa : " (error)"); tdbdel = ips; ips = ips->ips_inext; if(ips) { sa_len = satoa(ips->ips_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_xform, ", inext=%s", sa_len ? sa : " (error)"); tdbdel->ips_inext = NULL; ips->ips_onext = NULL; } KLIPS_PRINT(debug_xform, ".\n"); if((error = ipsec_sa_del(tdbdel))) { KLIPS_PRINT(debug_xform, "klips_debug:deltdbchain: " "deltdb returned error %d.\n", -error); return error; } if((error = ipsec_sa_wipe(tdbdel))) { KLIPS_PRINT(debug_xform, "klips_debug:deltdbchain: " "ipsec_tdbwipe returned error %d.\n", -error); return error; } } return error;}int ipsec_sadb_cleanup(__u8 proto){ int i; int error = 0; struct ipsec_sa *ips, **ipsprev, *tdbdel; char sa[SATOA_BUF]; size_t sa_len; KLIPS_PRINT(debug_xform, "klips_debug:ipsec_tdbcleanup: " "cleaning up proto=%d.\n", proto); spin_lock_bh(&tdb_lock); for (i = 0; i < SADB_HASHMOD; i++) { ipsprev = &(ipsec_sadb_hash[i]); ips = ipsec_sadb_hash[i]; for(; ips;) { sa_len = satoa(ips->ips_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_xform, "klips_debug:ipsec_tdbcleanup: " "checking SA:%s, hash=%d", sa_len ? sa : " (error)", i); tdbdel = ips; ips = tdbdel->ips_hnext; if(ips) { sa_len = satoa(ips->ips_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_xform, ", hnext=%s", sa_len ? sa : " (error)"); } if(*ipsprev) { sa_len = satoa((*ipsprev)->ips_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_xform, ", *ipsprev=%s", sa_len ? sa : " (error)"); if((*ipsprev)->ips_hnext) { sa_len = satoa((*ipsprev)->ips_hnext->ips_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_xform, ", *ipsprev->ips_hnext=%s", sa_len ? sa : " (error)"); } } KLIPS_PRINT(debug_xform, ".\n"); if(!proto || (proto == tdbdel->ips_said.proto)) { sa_len = satoa(tdbdel->ips_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_xform, "klips_debug:ipsec_tdbcleanup: " "deleting SA chain:%s.\n", sa_len ? sa : " (error)"); if((error = ipsec_sa_delchain(tdbdel))) { SENDERR(-error); } ipsprev = &(ipsec_sadb_hash[i]); ips = ipsec_sadb_hash[i]; KLIPS_PRINT(debug_xform, "klips_debug:ipsec_tdbcleanup: " "deleted SA chain:%s", sa_len ? sa : " (error)"); if(ips) { sa_len = satoa(ips->ips_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_xform, ", tdbh[%d]=%s", i, sa_len ? sa : " (error)"); } if(*ipsprev) { sa_len = satoa((*ipsprev)->ips_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_xform, ", *ipsprev=%s", sa_len ? sa : " (error)"); if((*ipsprev)->ips_hnext) { sa_len = satoa((*ipsprev)->ips_hnext->ips_said, 0, sa, SATOA_BUF); KLIPS_PRINT(debug_xform,
⌨️ 快捷键说明
复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?