⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 pfkey_v2_build.c

📁 This a good VPN source
💻 C
📖 第 1 页 / 共 3 页
字号:
/* * RFC2367 PF_KEYv2 Key management API message parser * Copyright (C) 1999, 2000, 2001  Richard Guy Briggs. *  * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>. *  * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License * for more details. * * RCSID $Id: pfkey_v2_build.c,v 1.51 2004/10/03 01:26:36 mcr Exp $ *//* *		Template from klips/net/ipsec/ipsec/ipsec_parser.c. */char pfkey_v2_build_c_version[] = "$Id: pfkey_v2_build.c,v 1.51 2004/10/03 01:26:36 mcr Exp $";/* * Some ugly stuff to allow consistent debugging code for use in the * kernel and in user space*/#ifdef __KERNEL__# include <linux/kernel.h>  /* for printk */# include "openswan/ipsec_kversion.h" /* for malloc switch */# ifdef MALLOC_SLAB#  include <linux/slab.h> /* kmalloc() */# else /* MALLOC_SLAB */#  include <linux/malloc.h> /* kmalloc() */# endif /* MALLOC_SLAB */# include <linux/errno.h>  /* error codes */# include <linux/types.h>  /* size_t */# include <linux/interrupt.h> /* mark_bh */# include <linux/netdevice.h>   /* struct device, and other headers */# include <linux/etherdevice.h> /* eth_type_trans */# include <linux/ip.h>          /* struct iphdr */ # if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)#  include <linux/ipv6.h>        /* struct ipv6hdr */# endif /* if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) */# define MALLOC(size) kmalloc(size, GFP_ATOMIC)# define FREE(obj) kfree(obj)# include <openswan.h>#else /* __KERNEL__ */# include <sys/types.h># include <linux/types.h># include <linux/errno.h># include <malloc.h># include <string.h> /* memset */# include <openswan.h>#endif /* __KERNEL__ */#include <pfkeyv2.h>#include <pfkey.h>#ifdef __KERNEL__#include "openswan/radij.h"  /* rd_nodes */#include "openswan/ipsec_encap.h"  /* sockaddr_encap */#endif /* __KERNEL__ */#include "openswan/ipsec_sa.h"  /* IPSEC_SAREF_NULL, IPSEC_SA_REF_TABLE_IDX_WIDTH */#include "openswan/pfkey_debug.h"#define SENDERR(_x) do { error = -(_x); goto errlab; } while (0)voidpfkey_extensions_init(struct sadb_ext *extensions[SADB_EXT_MAX + 1]){	int i;		for (i = 0; i != SADB_EXT_MAX + 1; i++) {		extensions[i] = NULL;	}}voidpfkey_extensions_free(struct sadb_ext *extensions[SADB_EXT_MAX + 1]){	int i;		if(!extensions) {		return;	}	if(extensions[0]) {		memset(extensions[0], 0, sizeof(struct sadb_msg));		FREE(extensions[0]);		extensions[0] = NULL;	}		for (i = 1; i != SADB_EXT_MAX + 1; i++) {		if(extensions[i]) {			memset(extensions[i], 0, extensions[i]->sadb_ext_len * IPSEC_PFKEYv2_ALIGN);			FREE(extensions[i]);			extensions[i] = NULL;		}	}}voidpfkey_msg_free(struct sadb_msg **pfkey_msg){	if(*pfkey_msg) {		memset(*pfkey_msg, 0, (*pfkey_msg)->sadb_msg_len * IPSEC_PFKEYv2_ALIGN);		FREE(*pfkey_msg);		*pfkey_msg = NULL;	}}/* Default extension builders taken from the KLIPS code */intpfkey_msg_hdr_build(struct sadb_ext**	pfkey_ext,		    uint8_t		msg_type,		    uint8_t		satype,		    uint8_t		msg_errno,		    uint32_t		seq,		    uint32_t		pid){	int error = 0;	struct sadb_msg *pfkey_msg = (struct sadb_msg *)*pfkey_ext;	DEBUGGING(PF_KEY_DEBUG_BUILD,		"pfkey_msg_hdr_build:\n");	DEBUGGING(PF_KEY_DEBUG_BUILD,		"pfkey_msg_hdr_build: "		"on_entry &pfkey_ext=0p%p pfkey_ext=0p%p *pfkey_ext=0p%p.\n",		&pfkey_ext,		pfkey_ext,		*pfkey_ext);	/* sanity checks... */	if(pfkey_msg) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_msg_hdr_build: "			"why is pfkey_msg already pointing to something?\n");		SENDERR(EINVAL);	}	if(!msg_type) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_msg_hdr_build: "			"msg type not set, must be non-zero..\n");		SENDERR(EINVAL);	}	if(msg_type > SADB_MAX) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_msg_hdr_build: "			"msg type too large:%d.\n",			msg_type);		SENDERR(EINVAL);	}	if(satype > SADB_SATYPE_MAX) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_msg_hdr_build: "			"satype %d > max %d\n", 			satype, SADB_SATYPE_MAX);		SENDERR(EINVAL);	}	pfkey_msg = (struct sadb_msg*)MALLOC(sizeof(struct sadb_msg));	*pfkey_ext = (struct sadb_ext*)pfkey_msg;		if(pfkey_msg == NULL) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_msg_hdr_build: "			"memory allocation failed\n");		SENDERR(ENOMEM);	}	memset(pfkey_msg, 0, sizeof(struct sadb_msg));	pfkey_msg->sadb_msg_len = sizeof(struct sadb_msg) / IPSEC_PFKEYv2_ALIGN;	pfkey_msg->sadb_msg_type = msg_type;	pfkey_msg->sadb_msg_satype = satype;	pfkey_msg->sadb_msg_version = PF_KEY_V2;	pfkey_msg->sadb_msg_errno = msg_errno;	pfkey_msg->sadb_msg_reserved = 0;	pfkey_msg->sadb_msg_seq = seq;	pfkey_msg->sadb_msg_pid = pid;	DEBUGGING(PF_KEY_DEBUG_BUILD,		"pfkey_msg_hdr_build: "		"on_exit &pfkey_ext=0p%p pfkey_ext=0p%p *pfkey_ext=0p%p.\n",		&pfkey_ext,		pfkey_ext,		*pfkey_ext);errlab:	return error;}	intpfkey_sa_ref_build(struct sadb_ext **		pfkey_ext,		   uint16_t			exttype,		   uint32_t			spi,		   uint8_t			replay_window,		   uint8_t			sa_state,		   uint8_t			auth,		   uint8_t			encrypt,		   uint32_t			flags,		   uint32_t/*IPsecSAref_t*/	ref){	int error = 0;	struct sadb_sa *pfkey_sa = (struct sadb_sa *)*pfkey_ext;	DEBUGGING(PF_KEY_DEBUG_BUILD,		    "pfkey_sa_build: "		    "spi=%08x replay=%d sa_state=%d auth=%d encrypt=%d flags=%d\n",		    ntohl(spi), /* in network order */		    replay_window,		    sa_state,		    auth,		    encrypt,		    flags);	/* sanity checks... */	if(pfkey_sa) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_sa_build: "			"why is pfkey_sa already pointing to something?\n");		SENDERR(EINVAL);	}	if(exttype != SADB_EXT_SA &&	   exttype != SADB_X_EXT_SA2) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_sa_build: "			"invalid exttype=%d.\n",			exttype);		SENDERR(EINVAL);	}	if(replay_window > 64) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_sa_build: "			"replay window size: %d -- must be 0 <= size <= 64\n",			replay_window);		SENDERR(EINVAL);	}	if(auth > SADB_AALG_MAX) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_sa_build: "			"auth=%d > SADB_AALG_MAX=%d.\n",			auth,			SADB_AALG_MAX);		SENDERR(EINVAL);	}#if SADB_EALG_MAX < 255		if(encrypt > SADB_EALG_MAX) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_sa_build: "			"encrypt=%d > SADB_EALG_MAX=%d.\n",			encrypt,			SADB_EALG_MAX);		SENDERR(EINVAL);	}#endif	if(sa_state > SADB_SASTATE_MAX) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_sa_build: "			"sa_state=%d exceeds MAX=%d.\n",			sa_state,			SADB_SASTATE_MAX);		SENDERR(EINVAL);	}	if(sa_state == SADB_SASTATE_DEAD) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_sa_build: "			"sa_state=%d is DEAD=%d is not allowed.\n",			sa_state,			SADB_SASTATE_DEAD);		SENDERR(EINVAL);	}		if((IPSEC_SAREF_NULL != ref) && (ref >= (1 << IPSEC_SA_REF_TABLE_IDX_WIDTH))) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			  "pfkey_sa_build: "			  "SAref=%d must be (SAref == IPSEC_SAREF_NULL(%d) || SAref < IPSEC_SA_REF_TABLE_NUM_ENTRIES(%d)).\n",			  ref,			  IPSEC_SAREF_NULL,			  IPSEC_SA_REF_TABLE_NUM_ENTRIES);		SENDERR(EINVAL);	}		pfkey_sa = (struct sadb_sa*)MALLOC(sizeof(struct sadb_sa));	*pfkey_ext = (struct sadb_ext*)pfkey_sa;	if(pfkey_sa == NULL) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_sa_build: "			"memory allocation failed\n");		SENDERR(ENOMEM);	}	memset(pfkey_sa, 0, sizeof(struct sadb_sa));		pfkey_sa->sadb_sa_len = sizeof(*pfkey_sa) / IPSEC_PFKEYv2_ALIGN;	pfkey_sa->sadb_sa_exttype = exttype;	pfkey_sa->sadb_sa_spi = spi;	pfkey_sa->sadb_sa_replay = replay_window;	pfkey_sa->sadb_sa_state = sa_state;	pfkey_sa->sadb_sa_auth = auth;	pfkey_sa->sadb_sa_encrypt = encrypt;	pfkey_sa->sadb_sa_flags = flags;	pfkey_sa->sadb_x_sa_ref = ref;  errlab:	return error;}	intpfkey_sa_build(struct sadb_ext **	pfkey_ext,	       uint16_t			exttype,	       uint32_t			spi,	       uint8_t			replay_window,	       uint8_t			sa_state,	       uint8_t			auth,	       uint8_t			encrypt,	       uint32_t			flags){	return pfkey_sa_ref_build(pfkey_ext,			   exttype,			   spi,			   replay_window,			   sa_state,			   auth,			   encrypt,			   flags,			   IPSEC_SAREF_NULL);}intpfkey_lifetime_build(struct sadb_ext **	pfkey_ext,		     uint16_t		exttype,		     uint32_t		allocations,		     uint64_t		bytes,		     uint64_t		addtime,		     uint64_t		usetime,		     uint32_t		packets){	int error = 0;	struct sadb_lifetime *pfkey_lifetime = (struct sadb_lifetime *)*pfkey_ext;	DEBUGGING(PF_KEY_DEBUG_BUILD,		"pfkey_lifetime_build:\n");	/* sanity checks... */	if(pfkey_lifetime) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_lifetime_build: "			"why is pfkey_lifetime already pointing to something?\n");		SENDERR(EINVAL);	}	if(exttype != SADB_EXT_LIFETIME_CURRENT &&	   exttype != SADB_EXT_LIFETIME_HARD &&	   exttype != SADB_EXT_LIFETIME_SOFT) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_lifetime_build: "			"invalid exttype=%d.\n",			exttype);		SENDERR(EINVAL);	}	pfkey_lifetime = (struct sadb_lifetime*)MALLOC(sizeof(struct sadb_lifetime));	*pfkey_ext = (struct sadb_ext*) pfkey_lifetime;	if(pfkey_lifetime == NULL) {		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_lifetime_build: "			"memory allocation failed\n");		SENDERR(ENOMEM);	}	memset(pfkey_lifetime, 0, sizeof(struct sadb_lifetime));	pfkey_lifetime->sadb_lifetime_len = sizeof(struct sadb_lifetime) / IPSEC_PFKEYv2_ALIGN;	pfkey_lifetime->sadb_lifetime_exttype = exttype;	pfkey_lifetime->sadb_lifetime_allocations = allocations;	pfkey_lifetime->sadb_lifetime_bytes = bytes;	pfkey_lifetime->sadb_lifetime_addtime = addtime;	pfkey_lifetime->sadb_lifetime_usetime = usetime;	pfkey_lifetime->sadb_x_lifetime_packets = packets;errlab:	return error;}intpfkey_address_build(struct sadb_ext**	pfkey_ext,		    uint16_t		exttype,		    uint8_t		proto,		    uint8_t		prefixlen,		    struct sockaddr*	address){	int error = 0;	int saddr_len = 0;	char ipaddr_txt[ADDRTOT_BUF + 6/*extra for port number*/];	struct sadb_address *pfkey_address = (struct sadb_address *)*pfkey_ext;		DEBUGGING(PF_KEY_DEBUG_BUILD,		"pfkey_address_build: "		"exttype=%d proto=%d prefixlen=%d\n",		exttype,		proto,		prefixlen);	/* sanity checks... */	if(pfkey_address) {		ERROR("pfkey_address_build: "		      "why is pfkey_address already pointing to something?\n");		SENDERR(EINVAL);	}	if (!address)  {			ERROR("pfkey_address_build: " "address is NULL\n");			SENDERR(EINVAL);	}		switch(exttype) {		case SADB_EXT_ADDRESS_SRC:	case SADB_EXT_ADDRESS_DST:	case SADB_EXT_ADDRESS_PROXY:	case SADB_X_EXT_ADDRESS_DST2:	case SADB_X_EXT_ADDRESS_SRC_FLOW:	case SADB_X_EXT_ADDRESS_DST_FLOW:	case SADB_X_EXT_ADDRESS_SRC_MASK:	case SADB_X_EXT_ADDRESS_DST_MASK:#ifdef NAT_TRAVERSAL	case SADB_X_EXT_NAT_T_OA:#endif			break;	default:		ERROR("pfkey_address_build: "			"unrecognised ext_type=%d.\n", 			exttype); 		SENDERR(EINVAL); 	}	switch(address->sa_family) {	case AF_INET:		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_address_build: "			"found address family AF_INET.\n");		saddr_len = sizeof(struct sockaddr_in);		sprintf(ipaddr_txt, "%d.%d.%d.%d:%d"			, (((struct sockaddr_in*)address)->sin_addr.s_addr >>  0) & 0xFF			, (((struct sockaddr_in*)address)->sin_addr.s_addr >>  8) & 0xFF			, (((struct sockaddr_in*)address)->sin_addr.s_addr >> 16) & 0xFF			, (((struct sockaddr_in*)address)->sin_addr.s_addr >> 24) & 0xFF			, ntohs(((struct sockaddr_in*)address)->sin_port));		break;	case AF_INET6:		DEBUGGING(PF_KEY_DEBUG_BUILD,			"pfkey_address_build: "			"found address family AF_INET6.\n");		saddr_len = sizeof(struct sockaddr_in6);		sprintf(ipaddr_txt, "%x:%x:%x:%x:%x:%x:%x:%x-%x"			, ntohs(((struct sockaddr_in6*)address)->sin6_addr.s6_addr16[0])			, ntohs(((struct sockaddr_in6*)address)->sin6_addr.s6_addr16[1])			, ntohs(((struct sockaddr_in6*)address)->sin6_addr.s6_addr16[2])			, ntohs(((struct sockaddr_in6*)address)->sin6_addr.s6_addr16[3])			, ntohs(((struct sockaddr_in6*)address)->sin6_addr.s6_addr16[4])			, ntohs(((struct sockaddr_in6*)address)->sin6_addr.s6_addr16[5])			, ntohs(((struct sockaddr_in6*)address)->sin6_addr.s6_addr16[6])			, ntohs(((struct sockaddr_in6*)address)->sin6_addr.s6_addr16[7])			, ntohs(((struct sockaddr_in6*)address)->sin6_port));		break;	default:		ERROR("pfkey_address_build: "		      "address->sa_family=%d not supported.\n",		      address->sa_family);		SENDERR(EPFNOSUPPORT);	}	DEBUGGING(PF_KEY_DEBUG_BUILD,		"pfkey_address_build: "		"found address=%s.\n",		ipaddr_txt);	if(prefixlen != 0) {		ERROR("pfkey_address_build: "			"address prefixes not supported yet.\n");		SENDERR(EAFNOSUPPORT); /* not supported yet */	}	/* allocate some memory for the extension */	pfkey_address = (struct sadb_address*)		MALLOC(ALIGN_N(sizeof(struct sadb_address) + saddr_len, IPSEC_PFKEYv2_ALIGN));	*pfkey_ext = (struct sadb_ext*)pfkey_address;	if(pfkey_address == NULL ) {		ERROR("pfkey_lifetime_build: "			"memory allocation failed\n");		SENDERR(ENOMEM);	}	memset(pfkey_address,	       0,	       ALIGN_N(sizeof(struct sadb_address) + saddr_len,		     IPSEC_PFKEYv2_ALIGN));	       	pfkey_address->sadb_address_len = DIVUP(sizeof(struct sadb_address) + saddr_len,						IPSEC_PFKEYv2_ALIGN);		pfkey_address->sadb_address_exttype = exttype;	pfkey_address->sadb_address_proto = proto;	pfkey_address->sadb_address_prefixlen = prefixlen;	pfkey_address->sadb_address_reserved = 0;	memcpy((char*)pfkey_address + sizeof(struct sadb_address),	       address,	       saddr_len);#if 0	for(i = 0; i < sizeof(struct sockaddr_in) - offsetof(struct sockaddr_in, sin_zero); i++) {		pfkey_address_s_ska.sin_zero[i] = 0;	}#endif	DEBUGGING(PF_KEY_DEBUG_BUILD,		  "pfkey_address_build: "		  "successful created len: %d.\n", pfkey_address->sadb_address_len); errlab:	return error;}

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -