keysock.c

来自「eCos操作系统源码」· C语言 代码 · 共 753 行 · 第 1/2 页

C
753
字号
//==========================================================================////      src/sys/netkey/keysock.c////==========================================================================//####BSDCOPYRIGHTBEGIN####//// -------------------------------------------//// Portions of this software may have been derived from OpenBSD, // FreeBSD or other sources, and are covered by the appropriate// copyright disclaimers included herein.//// Portions created by Red Hat are// Copyright (C) 2002 Red Hat, Inc. All Rights Reserved.//// -------------------------------------------////####BSDCOPYRIGHTEND####//==========================================================================/*	$KAME: keysock.c,v 1.25 2001/08/13 20:07:41 itojun Exp $	*//* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors *    may be used to endorse or promote products derived from this software *    without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */#if defined(__FreeBSD__) && __FreeBSD__ >= 3#include "opt_ipsec.h"#endif/* This code has derived from sys/net/rtsock.c on FreeBSD2.2.5 */#include <sys/types.h>#include <sys/param.h>#ifdef __FreeBSD__#include <sys/sysctl.h>#endif#include <sys/mbuf.h>#if defined(__FreeBSD__) && __FreeBSD__ >= 3#include <sys/malloc.h>#endif#include <sys/socket.h>#include <sys/socketvar.h>#include <sys/domain.h>#include <sys/protosw.h>#include <sys/errno.h>#ifdef __NetBSD__#include <sys/proc.h>#include <sys/queue.h>#endif#include <net/raw_cb.h>#include <net/route.h>#include <net/pfkeyv2.h>#include <netkey/keydb.h>#include <netkey/key.h>#include <netkey/keysock.h>#include <netkey/key_debug.h>struct sockaddr key_dst = { 2, PF_KEY, };struct sockaddr key_src = { 2, PF_KEY, };static int key_sendup0 __P((struct rawcb *, struct mbuf *, int));struct pfkeystat pfkeystat;#if !(defined(__FreeBSD__) && __FreeBSD__ >= 3)/* * key_usrreq() * derived from net/rtsock.c:route_usrreq() */#ifndef __NetBSD__intkey_usrreq(so, req, m, nam, control)	struct socket *so;	int req;	struct mbuf *m, *nam, *control;#elseintkey_usrreq(so, req, m, nam, control, p)	struct socket *so;	int req;	struct mbuf *m, *nam, *control;	struct proc *p;#endif /*__NetBSD__*/{	int error = 0;	struct keycb *kp = (struct keycb *)sotorawcb(so);	int s;#ifdef __NetBSD__	s = splsoftnet();#else	s = splnet();#endif	if (req == PRU_ATTACH) {		kp = (struct keycb *)malloc(sizeof(*kp), M_PCB, M_WAITOK);		so->so_pcb = (caddr_t)kp;		if (so->so_pcb)			bzero(so->so_pcb, sizeof(*kp));	}	if (req == PRU_DETACH && kp) {		int af = kp->kp_raw.rcb_proto.sp_protocol;		if (af == PF_KEY) /* XXX: AF_KEY */			key_cb.key_count--;		key_cb.any_count--;		key_freereg(so);	}#ifndef __NetBSD__	error = raw_usrreq(so, req, m, nam, control);#else	error = raw_usrreq(so, req, m, nam, control, p);#endif	m = control = NULL;	/* reclaimed in raw_usrreq */	kp = (struct keycb *)sotorawcb(so);	if (req == PRU_ATTACH && kp) {		int af = kp->kp_raw.rcb_proto.sp_protocol;		if (error) {			pfkeystat.sockerr++;			free((caddr_t)kp, M_PCB);			so->so_pcb = (caddr_t) 0;			splx(s);			return(error);		}		kp->kp_promisc = kp->kp_registered = 0;		if (af == PF_KEY) /* XXX: AF_KEY */			key_cb.key_count++;		key_cb.any_count++;#ifndef __bsdi__		kp->kp_raw.rcb_laddr = &key_src;		kp->kp_raw.rcb_faddr = &key_dst;#else		/*		 * XXX rcb_faddr must be dynamically allocated, otherwise		 * raw_disconnect() will get angry.		 */	    {		struct mbuf *m, *n;		MGET(m, M_WAITOK, MT_DATA);		if (!m) {			error = ENOBUFS;			pfkeystat.in_nomem++;			free((caddr_t)kp, M_PCB);			so->so_pcb = (caddr_t) 0;			splx(s);			return(error);		}		MGET(n, M_WAITOK, MT_DATA);		if (!n) {			error = ENOBUFS;			m_freem(m);			pfkeystat.in_nomem++;			free((caddr_t)kp, M_PCB);			so->so_pcb = (caddr_t) 0;			splx(s);			return(error);		}		m->m_len = sizeof(key_src);		kp->kp_raw.rcb_laddr = mtod(m, struct sockaddr *);		bcopy(&key_src, kp->kp_raw.rcb_laddr, sizeof(key_src));		n->m_len = sizeof(key_dst);		kp->kp_raw.rcb_faddr = mtod(n, struct sockaddr *);		bcopy(&key_dst, kp->kp_raw.rcb_faddr, sizeof(key_dst));	    }#endif		soisconnected(so);		so->so_options |= SO_USELOOPBACK;	}	splx(s);	return(error);}#endif /* other than FreeBSD >= 3 *//* * key_output() */int#if __STDC__key_output(struct mbuf *m, ...)#elsekey_output(m, va_alist)	struct mbuf *m;	va_dcl#endif{	struct sadb_msg *msg;	int len, error = 0;	int s;	struct socket *so;	va_list ap;	va_start(ap, m);	so = va_arg(ap, struct socket *);	va_end(ap);	if (m == 0)		panic("key_output: NULL pointer was passed.\n");	pfkeystat.out_total++;	pfkeystat.out_bytes += m->m_pkthdr.len;	len = m->m_pkthdr.len;	if (len < sizeof(struct sadb_msg)) {		pfkeystat.out_tooshort++;		error = EINVAL;		goto end;	}	if (m->m_len < sizeof(struct sadb_msg)) {		if ((m = m_pullup(m, sizeof(struct sadb_msg))) == 0) {			pfkeystat.out_nomem++;			error = ENOBUFS;			goto end;		}	}	if ((m->m_flags & M_PKTHDR) == 0)		panic("key_output: not M_PKTHDR ??");	KEYDEBUG(KEYDEBUG_KEY_DUMP, kdebug_mbuf(m));	msg = mtod(m, struct sadb_msg *);	pfkeystat.out_msgtype[msg->sadb_msg_type]++;	if (len != PFKEY_UNUNIT64(msg->sadb_msg_len)) {		pfkeystat.out_invlen++;		error = EINVAL;		goto end;	}	/*XXX giant lock*/#ifdef __NetBSD__	s = splsoftnet();#else	s = splnet();#endif	error = key_parse(m, so);	m = NULL;	splx(s);end:	if (m)		m_freem(m);	return error;}/* * send message to the socket. */static intkey_sendup0(rp, m, promisc)	struct rawcb *rp;	struct mbuf *m;	int promisc;{	int error;	if (promisc) {		struct sadb_msg *pmsg;		M_PREPEND(m, sizeof(struct sadb_msg), M_NOWAIT);		if (m && m->m_len < sizeof(struct sadb_msg))			m = m_pullup(m, sizeof(struct sadb_msg));		if (!m) {			pfkeystat.in_nomem++;			m_freem(m);			return ENOBUFS;		}		m->m_pkthdr.len += sizeof(*pmsg);		pmsg = mtod(m, struct sadb_msg *);		bzero(pmsg, sizeof(*pmsg));		pmsg->sadb_msg_version = PF_KEY_V2;		pmsg->sadb_msg_type = SADB_X_PROMISC;		pmsg->sadb_msg_len = PFKEY_UNIT64(m->m_pkthdr.len);		/* pid and seq? */		pfkeystat.in_msgtype[pmsg->sadb_msg_type]++;	}	if (!sbappendaddr(&rp->rcb_socket->so_rcv, (struct sockaddr *)&key_src,	    m, NULL)) {		pfkeystat.in_nomem++;		m_freem(m);		error = ENOBUFS;	} else		error = 0;	sorwakeup(rp->rcb_socket);	return error;}/* XXX this interface should be obsoleted. */intkey_sendup(so, msg, len, target)	struct socket *so;	struct sadb_msg *msg;	u_int len;	int target;	/*target of the resulting message*/{	struct mbuf *m, *n, *mprev;	int tlen;	/* sanity check */	if (so == 0 || msg == 0)		panic("key_sendup: NULL pointer was passed.\n");	KEYDEBUG(KEYDEBUG_KEY_DUMP,		printf("key_sendup: \n");		kdebug_sadb(msg));	/*	 * we increment statistics here, just in case we have ENOBUFS	 * in this function.	 */	pfkeystat.in_total++;	pfkeystat.in_bytes += len;	pfkeystat.in_msgtype[msg->sadb_msg_type]++;	/*	 * Get mbuf chain whenever possible (not clusters),	 * to save socket buffer.  We'll be generating many SADB_ACQUIRE	 * messages to listening key sockets.  If we simply allocate clusters,	 * sbappendaddr() will raise ENOBUFS due to too little sbspace().	 * sbspace() computes # of actual data bytes AND mbuf region.	 *	 * TODO: SADB_ACQUIRE filters should be implemented.	 */	tlen = len;	m = mprev = NULL;	while (tlen > 0) {		if (tlen == len) {			MGETHDR(n, M_DONTWAIT, MT_DATA);			n->m_len = MHLEN;		} else {			MGET(n, M_DONTWAIT, MT_DATA);			n->m_len = MLEN;		}		if (!n) {			pfkeystat.in_nomem++;			return ENOBUFS;		}		if (tlen >= MCLBYTES) {	/*XXX better threshold? */			MCLGET(n, M_DONTWAIT);			if ((n->m_flags & M_EXT) == 0) {				m_free(n);				m_freem(m);				pfkeystat.in_nomem++;				return ENOBUFS;

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?