📄 ipsec_radij.c
字号:
/* * Interface between the IPSEC code and the radix (radij) tree code * Copyright (C) 1996, 1997 John Ioannidis. * Copyright (C) 1998, 1999, 2000, 2001 Richard Guy Briggs. * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See <http://www.fsf.org/copyleft/gpl.txt>. * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. * * RCSID $Id: ipsec_radij.c,v 1.72 2004/12/03 21:25:57 mcr Exp $ */#include <linux/config.h>#include <linux/version.h>#include <linux/kernel.h> /* printk() */#include "openswan/ipsec_param.h"#ifdef MALLOC_SLAB# include <linux/slab.h> /* kmalloc() */#else /* MALLOC_SLAB */# include <linux/malloc.h> /* kmalloc() */#endif /* MALLOC_SLAB */#include <linux/errno.h> /* error codes */#include <linux/types.h> /* size_t */#include <linux/interrupt.h> /* mark_bh */#include <linux/netdevice.h> /* struct device, struct net_device_stats and other headers */#include <linux/etherdevice.h> /* eth_type_trans */#include <linux/ip.h> /* struct iphdr */#include <linux/skbuff.h>#include <openswan.h>#ifdef SPINLOCK# ifdef SPINLOCK_23# include <linux/spinlock.h> /* *lock* */# else /* 23_SPINLOCK */# include <asm/spinlock.h> /* *lock* */# endif /* 23_SPINLOCK */#endif /* SPINLOCK */#ifdef NET_21# include <asm/uaccess.h># include <linux/in6.h>#endif#include <asm/checksum.h>#include <net/ip.h>#include "openswan/ipsec_eroute.h"#include "openswan/ipsec_sa.h" #include "openswan/radij.h"#include "openswan/ipsec_encap.h"#include "openswan/radij.h"#include "openswan/ipsec_encap.h"#include "openswan/ipsec_radij.h"#include "openswan/ipsec_tunnel.h" /* struct ipsecpriv */#include "openswan/ipsec_xform.h" #include <pfkeyv2.h>#include <pfkey.h>#include "openswan/ipsec_proto.h"#ifdef CONFIG_KLIPS_DEBUGint debug_radij = 0;#endif /* CONFIG_KLIPS_DEBUG */struct radij_node_head *rnh = NULL;#ifdef SPINLOCKspinlock_t eroute_lock = SPIN_LOCK_UNLOCKED;#else /* SPINLOCK */spinlock_t eroute_lock;#endif /* SPINLOCK */intipsec_radijinit(void){ maj_keylen = sizeof (struct sockaddr_encap); rj_init(); if (rj_inithead((void **)&rnh, /*16*/offsetof(struct sockaddr_encap, sen_type) * sizeof(__u8)) == 0) /* 16 is bit offset of sen_type */ return -1; return 0;}intipsec_radijcleanup(void){ int error; spin_lock_bh(&eroute_lock); error = radijcleanup(); spin_unlock_bh(&eroute_lock); return error;}intipsec_cleareroutes(void){ int error; spin_lock_bh(&eroute_lock); error = radijcleartree(); spin_unlock_bh(&eroute_lock); return error;}intipsec_breakroute(struct sockaddr_encap *eaddr, struct sockaddr_encap *emask, struct sk_buff **first, struct sk_buff **last){ struct eroute *ro; struct radij_node *rn; int error;#ifdef CONFIG_KLIPS_DEBUG if (debug_eroute) { char buf1[SUBNETTOA_BUF], buf2[SUBNETTOA_BUF]; subnettoa(eaddr->sen_ip_src, emask->sen_ip_src, 0, buf1, sizeof(buf1)); subnettoa(eaddr->sen_ip_dst, emask->sen_ip_dst, 0, buf2, sizeof(buf2)); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_breakroute: " "attempting to delete eroute for %s:%d->%s:%d %d\n", buf1, ntohs(eaddr->sen_sport), buf2, ntohs(eaddr->sen_dport), eaddr->sen_proto); }#endif /* CONFIG_KLIPS_DEBUG */ spin_lock_bh(&eroute_lock); if ((error = rj_delete(eaddr, emask, rnh, &rn)) != 0) { spin_unlock_bh(&eroute_lock); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_breakroute: " "node not found, eroute delete failed.\n"); return error; } spin_unlock_bh(&eroute_lock); ro = (struct eroute *)rn; KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_breakroute: " "deleted eroute=0p%p, ident=0p%p->0p%p, first=0p%p, last=0p%p\n", ro, ro->er_ident_s.data, ro->er_ident_d.data, ro->er_first, ro->er_last); if (ro->er_ident_s.data != NULL) { kfree(ro->er_ident_s.data); } if (ro->er_ident_d.data != NULL) { kfree(ro->er_ident_d.data); } if (ro->er_first != NULL) {#if 0 struct net_device_stats *stats = (struct net_device_stats *) &(((struct ipsecpriv *)(ro->er_first->dev->priv))->mystats); stats->tx_dropped--;#endif *first = ro->er_first; } if (ro->er_last != NULL) {#if 0 struct net_device_stats *stats = (struct net_device_stats *) &(((struct ipsecpriv *)(ro->er_last->dev->priv))->mystats); stats->tx_dropped--;#endif *last = ro->er_last; } if (rn->rj_flags & (RJF_ACTIVE | RJF_ROOT)) panic ("ipsec_breakroute RMT_DELEROUTE root or active node\n"); memset((caddr_t)rn, 0, sizeof (struct eroute)); kfree(rn); return 0;}intipsec_makeroute(struct sockaddr_encap *eaddr, struct sockaddr_encap *emask, ip_said said, uint32_t pid, struct sk_buff *skb, struct ident *ident_s, struct ident *ident_d){ struct eroute *retrt; int error; char sa[SATOT_BUF]; size_t sa_len;#ifdef CONFIG_KLIPS_DEBUG if (debug_eroute) { { char buf1[SUBNETTOA_BUF], buf2[SUBNETTOA_BUF]; subnettoa(eaddr->sen_ip_src, emask->sen_ip_src, 0, buf1, sizeof(buf1)); subnettoa(eaddr->sen_ip_dst, emask->sen_ip_dst, 0, buf2, sizeof(buf2)); sa_len = satot(&said, 0, sa, sizeof(sa)); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "attempting to allocate %lu bytes to insert eroute for %s->%s, SA: %s, PID:%d, skb=0p%p, ident:%s->%s\n", (unsigned long) sizeof(struct eroute), buf1, buf2, sa_len ? sa : " (error)", pid, skb, (ident_s ? (ident_s->data ? ident_s->data : "NULL") : "NULL"), (ident_d ? (ident_d->data ? ident_d->data : "NULL") : "NULL")); } { char buf1[sizeof(struct sockaddr_encap)*2 + 1], buf2[sizeof(struct sockaddr_encap)*2 + 1]; int i; unsigned char *b1 = buf1, *b2 = buf2, *ea = (unsigned char *)eaddr, *em = (unsigned char *)emask; for (i=0; i<sizeof(struct sockaddr_encap); i++) { sprintf(b1, "%02x", ea[i]); sprintf(b2, "%02x", em[i]); b1+=2; b2+=2; } KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: %s / %s \n", buf1, buf2); } }#endif /* CONFIG_KLIPS_DEBUG */ retrt = (struct eroute *)kmalloc(sizeof (struct eroute), GFP_ATOMIC); if (retrt == NULL) { printk("klips_error:ipsec_makeroute: " "not able to allocate kernel memory"); return -ENOMEM; } memset((caddr_t)retrt, 0, sizeof (struct eroute)); retrt->er_eaddr = *eaddr; retrt->er_emask = *emask; retrt->er_said = said; retrt->er_pid = pid; retrt->er_count = 0; retrt->er_lasttime = jiffies/HZ; { /* this is because gcc 3. doesn't like cast's as lvalues */ struct rjtentry *rje = (struct rjtentry *)&(retrt->er_rjt); caddr_t er = (caddr_t)&(retrt->er_eaddr); rje->rd_nodes->rj_key= er; } if (ident_s && ident_s->type != SADB_IDENTTYPE_RESERVED) { int data_len = ident_s->len * IPSEC_PFKEYv2_ALIGN - sizeof(struct sadb_ident); retrt->er_ident_s.type = ident_s->type; retrt->er_ident_s.id = ident_s->id; retrt->er_ident_s.len = ident_s->len; if(data_len) { KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "attempting to allocate %u bytes for ident_s.\n", data_len); if(!(retrt->er_ident_s.data = kmalloc(data_len, GFP_KERNEL))) { kfree(retrt); printk("klips_error:ipsec_makeroute: not able to allocate kernel memory (%d)\n", data_len); return ENOMEM; } memcpy(retrt->er_ident_s.data, ident_s->data, data_len); } else { retrt->er_ident_s.data = NULL; } } if (ident_d && ident_d->type != SADB_IDENTTYPE_RESERVED) { int data_len = ident_d->len * IPSEC_PFKEYv2_ALIGN - sizeof(struct sadb_ident); retrt->er_ident_d.type = ident_d->type; retrt->er_ident_d.id = ident_d->id; retrt->er_ident_d.len = ident_d->len; if(data_len) { KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "attempting to allocate %u bytes for ident_d.\n", data_len); if(!(retrt->er_ident_d.data = kmalloc(data_len, GFP_KERNEL))) { if (retrt->er_ident_s.data) kfree(retrt->er_ident_s.data); kfree(retrt); printk("klips_error:ipsec_makeroute: not able to allocate kernel memory (%d)\n", data_len); return ENOMEM; } memcpy(retrt->er_ident_d.data, ident_d->data, data_len); } else { retrt->er_ident_d.data = NULL; } } retrt->er_first = skb; retrt->er_last = NULL; KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "calling rj_addroute now\n"); spin_lock_bh(&eroute_lock); error = rj_addroute(&(retrt->er_eaddr), &(retrt->er_emask), rnh, retrt->er_rjt.rd_nodes); spin_unlock_bh(&eroute_lock); if(error) { sa_len = satot(&said, 0, sa, sizeof(sa)); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "rj_addroute not able to insert eroute for SA:%s (error:%d)\n", sa_len ? sa : " (error)", error); if (retrt->er_ident_s.data) kfree(retrt->er_ident_s.data); if (retrt->er_ident_d.data) kfree(retrt->er_ident_d.data); kfree(retrt); return error; }#ifdef CONFIG_KLIPS_DEBUG if (debug_eroute) { char buf1[SUBNETTOA_BUF], buf2[SUBNETTOA_BUF];/* subnettoa(eaddr->sen_ip_src, emask->sen_ip_src, 0, buf1, sizeof(buf1)); subnettoa(eaddr->sen_ip_dst, emask->sen_ip_dst, 0, buf2, sizeof(buf2));*/ subnettoa(rd_key((&(retrt->er_rjt)))->sen_ip_src, rd_mask((&(retrt->er_rjt)))->sen_ip_src, 0, buf1, sizeof(buf1)); subnettoa(rd_key((&(retrt->er_rjt)))->sen_ip_dst, rd_mask((&(retrt->er_rjt)))->sen_ip_dst, 0, buf2, sizeof(buf2)); sa_len = satot(&retrt->er_said, 0, sa, sizeof(sa)); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "pid=%05d " "count=%10d " "lasttime=%6d " "%-18s -> %-18s => %s\n", retrt->er_pid, retrt->er_count, (int)(jiffies/HZ - retrt->er_lasttime), buf1, buf2, sa_len ? sa : " (error)"); }#endif /* CONFIG_KLIPS_DEBUG */ KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_makeroute: " "succeeded.\n"); return 0;}struct eroute *ipsec_findroute(struct sockaddr_encap *eaddr){ struct radij_node *rn;#ifdef CONFIG_KLIPS_DEBUG char buf1[ADDRTOA_BUF], buf2[ADDRTOA_BUF]; if (debug_radij & DB_RJ_FINDROUTE) { addrtoa(eaddr->sen_ip_src, 0, buf1, sizeof(buf1)); addrtoa(eaddr->sen_ip_dst, 0, buf2, sizeof(buf2)); KLIPS_PRINT(debug_eroute, "klips_debug:ipsec_findroute: " "%s:%d->%s:%d %d\n", buf1, ntohs(eaddr->sen_sport), buf2, ntohs(eaddr->sen_dport), eaddr->sen_proto); }#endif /* CONFIG_KLIPS_DEBUG */ rn = rj_match((caddr_t)eaddr, rnh); if(rn) { KLIPS_PRINT(debug_eroute && sysctl_ipsec_debug_verbose, "klips_debug:ipsec_findroute: " "found, points to proto=%d, spi=%x, dst=%x.\n", ((struct eroute*)rn)->er_said.proto, ntohl(((struct eroute*)rn)->er_said.spi), ntohl(((struct eroute*)rn)->er_said.dst.u.v4.sin_addr.s_addr)); } return (struct eroute *)rn;} #ifdef CONFIG_PROC_FS/** ipsec_rj_walker_procprint: print one line of eroute table output. * * Theoretical BUG: if w->length is less than the length * of some line we should produce, that line will never * be finished. In effect, the "file" will stop part way * through that line. */intipsec_rj_walker_procprint(struct radij_node *rn, void *w0){ struct eroute *ro = (struct eroute *)rn; struct rjtentry *rd = (struct rjtentry *)rn; struct wsbuf *w = (struct wsbuf *)w0; char buf1[SUBNETTOA_BUF], buf2[SUBNETTOA_BUF]; char buf3[16]; char sa[SATOT_BUF]; size_t sa_len, buf_len; struct sockaddr_encap *key, *mask; KLIPS_PRINT(debug_radij, "klips_debug:ipsec_rj_walker_procprint: " "rn=0p%p, w0=0p%p\n", rn, w0); if (rn->rj_b >= 0) { return 0; } key = rd_key(rd); mask = rd_mask(rd);
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -