⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 pfkey_v2_ext_process.c

📁 openswan
💻 C
📖 第 1 页 / 共 2 页
字号:
/* * @(#) RFC2367 PF_KEYv2 Key management API message parser * Copyright (C) 1998-2003   Richard Guy Briggs. * Copyright (C) 2004        Michael Richardson <mcr@xelerance.com> *  * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version.  See <http://www.fsf.org/copyleft/gpl.txt>. *  * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE.  See the GNU General Public License * for more details. * * RCSID $Id: pfkey_v2_ext_process.c,v 1.20.2.1 2006/04/20 16:33:07 mcr Exp $ *//* *		Template from klips/net/ipsec/ipsec/ipsec_netlink.c. */char pfkey_v2_ext_process_c_version[] = "$Id: pfkey_v2_ext_process.c,v 1.20.2.1 2006/04/20 16:33:07 mcr Exp $";#include <linux/config.h>#include <linux/version.h>#include <linux/kernel.h> /* printk() */#include "openswan/ipsec_param.h"#ifdef MALLOC_SLAB# include <linux/slab.h> /* kmalloc() */#else /* MALLOC_SLAB */# include <linux/malloc.h> /* kmalloc() */#endif /* MALLOC_SLAB */#include <linux/errno.h>  /* error codes */#include <linux/types.h>  /* size_t */#include <linux/interrupt.h> /* mark_bh */#include <linux/netdevice.h>   /* struct device, and other headers */#include <linux/etherdevice.h> /* eth_type_trans */#include <linux/ip.h>          /* struct iphdr */#include <linux/skbuff.h>#include <openswan.h>#include <crypto/des.h>#ifdef SPINLOCK# ifdef SPINLOCK_23#  include <linux/spinlock.h> /* *lock* */# else /* SPINLOCK_23 */#  include <asm/spinlock.h> /* *lock* */# endif /* SPINLOCK_23 */#endif /* SPINLOCK */#ifdef NET_21# include <linux/in6.h># define ip_chk_addr inet_addr_type# define IS_MYADDR RTN_LOCAL#endif#include <net/ip.h>#ifdef NETLINK_SOCK# include <linux/netlink.h>#else# include <net/netlink.h>#endif#include <linux/random.h>	/* get_random_bytes() */#include "openswan/radij.h"#include "openswan/ipsec_encap.h"#include "openswan/ipsec_sa.h"#include "openswan/ipsec_radij.h"#include "openswan/ipsec_xform.h"#include "openswan/ipsec_ah.h"#include "openswan/ipsec_esp.h"#include "openswan/ipsec_tunnel.h"#include "openswan/ipsec_rcv.h"#include "openswan/ipcomp.h"#include <pfkeyv2.h>#include <pfkey.h>#include "openswan/ipsec_proto.h"#include "openswan/ipsec_alg.h"#define SENDERR(_x) do { error = -(_x); goto errlab; } while (0)intpfkey_sa_process(struct sadb_ext *pfkey_ext, struct pfkey_extracted_data* extr){	struct sadb_sa *pfkey_sa = (struct sadb_sa *)pfkey_ext;	int error = 0;	struct ipsec_sa* ipsp;		KLIPS_PRINT(debug_pfkey,		    "klips_debug:pfkey_sa_process: .\n");	if(!extr || !extr->ips) {		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_sa_process: "			    "extr or extr->ips is NULL, fatal\n");		SENDERR(EINVAL);	}	switch(pfkey_ext->sadb_ext_type) {	case SADB_EXT_SA:		ipsp = extr->ips;		break;	case SADB_X_EXT_SA2:		if(extr->ips2 == NULL) {			extr->ips2 = ipsec_sa_alloc(&error); /* pass error var by pointer */		}		if(extr->ips2 == NULL) {			SENDERR(-error);		}		ipsp = extr->ips2;		break;	default:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_sa_process: "			    "invalid exttype=%d.\n",			    pfkey_ext->sadb_ext_type);		SENDERR(EINVAL);	}	ipsp->ips_said.spi = pfkey_sa->sadb_sa_spi;	ipsp->ips_replaywin = pfkey_sa->sadb_sa_replay;	ipsp->ips_state = pfkey_sa->sadb_sa_state;	ipsp->ips_flags = pfkey_sa->sadb_sa_flags;	ipsp->ips_replaywin_lastseq = ipsp->ips_replaywin_bitmap = 0;	ipsp->ips_ref_rel = pfkey_sa->sadb_x_sa_ref;		switch(ipsp->ips_said.proto) {	case IPPROTO_AH:		ipsp->ips_authalg = pfkey_sa->sadb_sa_auth;		ipsp->ips_encalg = SADB_EALG_NONE;		break;	case IPPROTO_ESP:		ipsp->ips_authalg = pfkey_sa->sadb_sa_auth;		ipsp->ips_encalg = pfkey_sa->sadb_sa_encrypt;		ipsec_alg_sa_init(ipsp);		break;	case IPPROTO_IPIP:		ipsp->ips_authalg = AH_NONE;		ipsp->ips_encalg = ESP_NONE;		break;#ifdef CONFIG_KLIPS_IPCOMP	case IPPROTO_COMP:		ipsp->ips_authalg = AH_NONE;		ipsp->ips_encalg = pfkey_sa->sadb_sa_encrypt;		break;#endif /* CONFIG_KLIPS_IPCOMP */	case IPPROTO_INT:		ipsp->ips_authalg = AH_NONE;		ipsp->ips_encalg = ESP_NONE;		break;	case 0:		break;	default:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_sa_process: "			    "unknown proto=%d.\n",			    ipsp->ips_said.proto);		SENDERR(EINVAL);	}errlab:	return error;}intpfkey_lifetime_process(struct sadb_ext *pfkey_ext, struct pfkey_extracted_data* extr){	int error = 0;	struct sadb_lifetime *pfkey_lifetime = (struct sadb_lifetime *)pfkey_ext;	KLIPS_PRINT(debug_pfkey,		    "klips_debug:pfkey_lifetime_process: .\n");	if(!extr || !extr->ips) {		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_lifetime_process: "			    "extr or extr->ips is NULL, fatal\n");		SENDERR(EINVAL);	}	switch(pfkey_lifetime->sadb_lifetime_exttype) {	case SADB_EXT_LIFETIME_CURRENT:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_lifetime_process: "			    "lifetime_current not supported yet.\n");  		SENDERR(EINVAL);  		break;	case SADB_EXT_LIFETIME_HARD:		ipsec_lifetime_update_hard(&extr->ips->ips_life.ipl_allocations,					  pfkey_lifetime->sadb_lifetime_allocations);		ipsec_lifetime_update_hard(&extr->ips->ips_life.ipl_bytes,					  pfkey_lifetime->sadb_lifetime_bytes);		ipsec_lifetime_update_hard(&extr->ips->ips_life.ipl_addtime,					  pfkey_lifetime->sadb_lifetime_addtime);		ipsec_lifetime_update_hard(&extr->ips->ips_life.ipl_usetime,					  pfkey_lifetime->sadb_lifetime_usetime);		break;	case SADB_EXT_LIFETIME_SOFT:		ipsec_lifetime_update_soft(&extr->ips->ips_life.ipl_allocations,					   pfkey_lifetime->sadb_lifetime_allocations);		ipsec_lifetime_update_soft(&extr->ips->ips_life.ipl_bytes,					   pfkey_lifetime->sadb_lifetime_bytes);		ipsec_lifetime_update_soft(&extr->ips->ips_life.ipl_addtime,					   pfkey_lifetime->sadb_lifetime_addtime);		ipsec_lifetime_update_soft(&extr->ips->ips_life.ipl_usetime,					   pfkey_lifetime->sadb_lifetime_usetime);		break;	default:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_lifetime_process: "			    "invalid exttype=%d.\n",			    pfkey_ext->sadb_ext_type);		SENDERR(EINVAL);	}errlab:	return error;}intpfkey_address_process(struct sadb_ext *pfkey_ext, struct pfkey_extracted_data* extr){	int error = 0;	int saddr_len = 0;	char ipaddr_txt[ADDRTOA_BUF];	unsigned char **sap;	unsigned short * portp = 0;	struct sadb_address *pfkey_address = (struct sadb_address *)pfkey_ext;	struct sockaddr* s = (struct sockaddr*)((char*)pfkey_address + sizeof(*pfkey_address));	struct ipsec_sa* ipsp;		KLIPS_PRINT(debug_pfkey,		    "klips_debug:pfkey_address_process:\n");		if(!extr || !extr->ips) {		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "extr or extr->ips is NULL, fatal\n");		SENDERR(EINVAL);	}	switch(s->sa_family) {	case AF_INET:		saddr_len = sizeof(struct sockaddr_in);		addrtoa(((struct sockaddr_in*)s)->sin_addr, 0, ipaddr_txt, sizeof(ipaddr_txt));		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "found address family=%d, AF_INET, %s.\n",			    s->sa_family,			    ipaddr_txt);		break;#if defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE)	case AF_INET6:		saddr_len = sizeof(struct sockaddr_in6);		break;#endif /* defined(CONFIG_IPV6) || defined(CONFIG_IPV6_MODULE) */	default:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "s->sa_family=%d not supported.\n",			    s->sa_family);		SENDERR(EPFNOSUPPORT);	}		switch(pfkey_address->sadb_address_exttype) {	case SADB_EXT_ADDRESS_SRC:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "found src address.\n");		sap = (unsigned char **)&(extr->ips->ips_addr_s);		extr->ips->ips_addr_s_size = saddr_len;		break;	case SADB_EXT_ADDRESS_DST:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "found dst address.\n");		sap = (unsigned char **)&(extr->ips->ips_addr_d);		extr->ips->ips_addr_d_size = saddr_len;		break;	case SADB_EXT_ADDRESS_PROXY:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "found proxy address.\n");		sap = (unsigned char **)&(extr->ips->ips_addr_p);		extr->ips->ips_addr_p_size = saddr_len;		break;	case SADB_X_EXT_ADDRESS_DST2:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "found 2nd dst address.\n");		if(extr->ips2 == NULL) {			extr->ips2 = ipsec_sa_alloc(&error); /* pass error var by pointer */		}		if(extr->ips2 == NULL) {			SENDERR(-error);		}		sap = (unsigned char **)&(extr->ips2->ips_addr_d);		extr->ips2->ips_addr_d_size = saddr_len;		break;	case SADB_X_EXT_ADDRESS_SRC_FLOW:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "found src flow address.\n");		if(pfkey_alloc_eroute(&(extr->eroute)) == ENOMEM) {			SENDERR(ENOMEM);		}		sap = (unsigned char **)&(extr->eroute->er_eaddr.sen_ip_src);		portp = &(extr->eroute->er_eaddr.sen_sport);		break;	case SADB_X_EXT_ADDRESS_DST_FLOW:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "found dst flow address.\n");		if(pfkey_alloc_eroute(&(extr->eroute)) == ENOMEM) {			SENDERR(ENOMEM);		}		sap = (unsigned char **)&(extr->eroute->er_eaddr.sen_ip_dst);		portp = &(extr->eroute->er_eaddr.sen_dport);		break;	case SADB_X_EXT_ADDRESS_SRC_MASK:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "found src mask address.\n");		if(pfkey_alloc_eroute(&(extr->eroute)) == ENOMEM) {			SENDERR(ENOMEM);		}		sap = (unsigned char **)&(extr->eroute->er_emask.sen_ip_src);		portp = &(extr->eroute->er_emask.sen_sport);		break;	case SADB_X_EXT_ADDRESS_DST_MASK:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "found dst mask address.\n");		if(pfkey_alloc_eroute(&(extr->eroute)) == ENOMEM) {			SENDERR(ENOMEM);		}		sap = (unsigned char **)&(extr->eroute->er_emask.sen_ip_dst);		portp = &(extr->eroute->er_emask.sen_dport);		break;#ifdef NAT_TRAVERSAL	case SADB_X_EXT_NAT_T_OA:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "found NAT-OA address.\n");		sap = (unsigned char **)&(extr->ips->ips_natt_oa);		extr->ips->ips_natt_oa_size = saddr_len;		break;#endif	default:		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "unrecognised ext_type=%d.\n",			    pfkey_address->sadb_address_exttype);		SENDERR(EINVAL);	}		switch(pfkey_address->sadb_address_exttype) {	case SADB_EXT_ADDRESS_SRC:	case SADB_EXT_ADDRESS_DST:	case SADB_EXT_ADDRESS_PROXY:	case SADB_X_EXT_ADDRESS_DST2:#ifdef NAT_TRAVERSAL	case SADB_X_EXT_NAT_T_OA:#endif		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_address_process: "			    "allocating %d bytes for saddr.\n",			    saddr_len);		if(!(*sap = kmalloc(saddr_len, GFP_KERNEL))) {			SENDERR(ENOMEM);		}		memcpy(*sap, s, saddr_len);		break;	default:		if(s->sa_family	!= AF_INET) {			KLIPS_PRINT(debug_pfkey,				    "klips_debug:pfkey_address_process: "				    "s->sa_family=%d not supported.\n",				    s->sa_family);			SENDERR(EPFNOSUPPORT);		}		{			unsigned long *ulsap = (unsigned long *)sap;			*ulsap = ((struct sockaddr_in*)s)->sin_addr.s_addr;		}		if (portp != 0)			*portp = ((struct sockaddr_in*)s)->sin_port;#ifdef CONFIG_KLIPS_DEBUG		if(extr->eroute) {			char buf1[64], buf2[64];			if (debug_pfkey) {				subnettoa(extr->eroute->er_eaddr.sen_ip_src,					  extr->eroute->er_emask.sen_ip_src, 0, buf1, sizeof(buf1));				subnettoa(extr->eroute->er_eaddr.sen_ip_dst,					  extr->eroute->er_emask.sen_ip_dst, 0, buf2, sizeof(buf2));				KLIPS_PRINT(debug_pfkey,					    "klips_debug:pfkey_address_parse: "					    "extr->eroute set to %s:%d->%s:%d\n",					    buf1,					    ntohs(extr->eroute->er_eaddr.sen_sport),					    buf2,					    ntohs(extr->eroute->er_eaddr.sen_dport));			}		}#endif /* CONFIG_KLIPS_DEBUG */	}	ipsp = extr->ips;	switch(pfkey_address->sadb_address_exttype) {	case SADB_X_EXT_ADDRESS_DST2:		ipsp = extr->ips2;	case SADB_EXT_ADDRESS_DST:		if(s->sa_family == AF_INET) {			ipsp->ips_said.dst.u.v4.sin_addr.s_addr = ((struct sockaddr_in*)(ipsp->ips_addr_d))->sin_addr.s_addr;			ipsp->ips_said.dst.u.v4.sin_family      = AF_INET;			addrtoa(((struct sockaddr_in*)(ipsp->ips_addr_d))->sin_addr,				0,				ipaddr_txt,				sizeof(ipaddr_txt));			KLIPS_PRINT(debug_pfkey,				    "klips_debug:pfkey_address_process: "				    "ips_said.dst set to %s.\n",				    ipaddr_txt);		} else {			KLIPS_PRINT(debug_pfkey,				    "klips_debug:pfkey_address_process: "				    "uh, ips_said.dst doesn't do address family=%d yet, said will be invalid.\n",				    s->sa_family);		}	default:		break;	}		/* XXX check if port!=0 */		KLIPS_PRINT(debug_pfkey,		    "klips_debug:pfkey_address_process: successful.\n"); errlab:	return error;}intpfkey_key_process(struct sadb_ext *pfkey_ext, struct pfkey_extracted_data* extr){        int error = 0;        struct sadb_key *pfkey_key = (struct sadb_key *)pfkey_ext;		KLIPS_PRINT(debug_pfkey,		    "klips_debug:pfkey_key_process: .\n");	if(!extr || !extr->ips) {		KLIPS_PRINT(debug_pfkey,			    "klips_debug:pfkey_key_process: "			    "extr or extr->ips is NULL, fatal\n");

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -