mirror of
https://git.FreeBSD.org/src.git
synced 2024-12-18 10:35:55 +00:00
3cbd4ec3e4
RFC3173 says that the IP datagram MUST be sent in the original non-compressed form, when the total size of a compressed payload and the IPComp header is not smaller than the size of the original payload. In tunnel mode for small packets IPComp will send encapsulated IP datagrams without IPComp header. Add ip_encap handler for IPPROTO_IPV4 and IPPROTO_IPV6 to handle these datagrams. The handler does lookup for SA related to IPComp protocol and given from mbuf source and destination addresses as tunnel endpoints. It decapsulates packets only when corresponding SA is found. Reported by: gnn Reviewed by: gnn Differential Revision: https://reviews.freebsd.org/D6062
131 lines
4.8 KiB
C
131 lines
4.8 KiB
C
/* $FreeBSD$ */
|
|
/* $KAME: key.h,v 1.21 2001/07/27 03:51:30 itojun Exp $ */
|
|
|
|
/*-
|
|
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
|
* All rights reserved.
|
|
*
|
|
* Redistribution and use in source and binary forms, with or without
|
|
* modification, are permitted provided that the following conditions
|
|
* are met:
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
* notice, this list of conditions and the following disclaimer.
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
* documentation and/or other materials provided with the distribution.
|
|
* 3. Neither the name of the project nor the names of its contributors
|
|
* may be used to endorse or promote products derived from this software
|
|
* without specific prior written permission.
|
|
*
|
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
* SUCH DAMAGE.
|
|
*/
|
|
|
|
#ifndef _NETIPSEC_KEY_H_
|
|
#define _NETIPSEC_KEY_H_
|
|
|
|
#ifdef _KERNEL
|
|
|
|
struct secpolicy;
|
|
struct secpolicyindex;
|
|
struct ipsecrequest;
|
|
struct secasvar;
|
|
struct sockaddr;
|
|
struct socket;
|
|
struct sadb_msg;
|
|
struct sadb_x_policy;
|
|
struct secasindex;
|
|
union sockaddr_union;
|
|
|
|
extern void key_addref(struct secpolicy *sp);
|
|
extern int key_havesp(u_int dir);
|
|
extern struct secpolicy *key_allocsp(struct secpolicyindex *, u_int,
|
|
const char*, int);
|
|
extern struct secpolicy *key_allocsp2(u_int32_t spi, union sockaddr_union *dst,
|
|
u_int8_t proto, u_int dir, const char*, int);
|
|
extern struct secpolicy *key_newsp(const char*, int);
|
|
#if 0
|
|
extern struct secpolicy *key_gettunnel(const struct sockaddr *,
|
|
const struct sockaddr *, const struct sockaddr *,
|
|
const struct sockaddr *, const char*, int);
|
|
#endif
|
|
/* NB: prepend with _ for KAME IPv6 compatbility */
|
|
extern void _key_freesp(struct secpolicy **, const char*, int);
|
|
|
|
#define KEY_ALLOCSP(spidx, dir) \
|
|
key_allocsp(spidx, dir, __FILE__, __LINE__)
|
|
#define KEY_ALLOCSP2(spi, dst, proto, dir) \
|
|
key_allocsp2(spi, dst, proto, dir, __FILE__, __LINE__)
|
|
#define KEY_NEWSP() \
|
|
key_newsp(__FILE__, __LINE__)
|
|
#if 0
|
|
#define KEY_GETTUNNEL(osrc, odst, isrc, idst) \
|
|
key_gettunnel(osrc, odst, isrc, idst, __FILE__, __LINE__)
|
|
#endif
|
|
#define KEY_FREESP(spp) \
|
|
_key_freesp(spp, __FILE__, __LINE__)
|
|
|
|
extern struct secasvar *key_allocsa(union sockaddr_union *, u_int, u_int32_t,
|
|
const char*, int);
|
|
extern struct secasvar *key_allocsa_tunnel(union sockaddr_union *,
|
|
union sockaddr_union *, u_int, const char*, int);
|
|
extern void key_addrefsa(struct secasvar *, const char*, int);
|
|
extern void key_freesav(struct secasvar **, const char*, int);
|
|
|
|
#define KEY_ALLOCSA(dst, proto, spi) \
|
|
key_allocsa(dst, proto, spi, __FILE__, __LINE__)
|
|
#define KEY_ALLOCSA_TUNNEL(src, dst, proto) \
|
|
key_allocsa_tunnel(src, dst, proto, __FILE__, __LINE__)
|
|
#define KEY_ADDREFSA(sav) \
|
|
key_addrefsa(sav, __FILE__, __LINE__)
|
|
#define KEY_FREESAV(psav) \
|
|
key_freesav(psav, __FILE__, __LINE__)
|
|
|
|
extern void key_freeso(struct socket *);
|
|
extern int key_checktunnelsanity(struct secasvar *, u_int,
|
|
caddr_t, caddr_t);
|
|
extern int key_checkrequest(struct ipsecrequest *isr,
|
|
const struct secasindex *);
|
|
extern struct secpolicy *key_msg2sp(struct sadb_x_policy *,
|
|
size_t, int *);
|
|
extern struct mbuf *key_sp2msg(struct secpolicy *);
|
|
extern int key_ismyaddr(struct sockaddr *);
|
|
extern int key_spdacquire(struct secpolicy *);
|
|
extern u_long key_random(void);
|
|
extern void key_randomfill(void *, size_t);
|
|
extern void key_freereg(struct socket *);
|
|
extern int key_parse(struct mbuf *, struct socket *);
|
|
extern void key_init(void);
|
|
#ifdef VIMAGE
|
|
extern void key_destroy(void);
|
|
#endif
|
|
extern void key_sa_recordxfer(struct secasvar *, struct mbuf *);
|
|
#ifdef IPSEC_NAT_T
|
|
u_int16_t key_portfromsaddr(struct sockaddr *);
|
|
#define KEY_PORTFROMSADDR(saddr) \
|
|
key_portfromsaddr((struct sockaddr *)(saddr))
|
|
#endif
|
|
|
|
#ifdef MALLOC_DECLARE
|
|
MALLOC_DECLARE(M_IPSEC_SA);
|
|
MALLOC_DECLARE(M_IPSEC_SAH);
|
|
MALLOC_DECLARE(M_IPSEC_SP);
|
|
MALLOC_DECLARE(M_IPSEC_SR);
|
|
MALLOC_DECLARE(M_IPSEC_MISC);
|
|
MALLOC_DECLARE(M_IPSEC_SAQ);
|
|
MALLOC_DECLARE(M_IPSEC_SAR);
|
|
MALLOC_DECLARE(M_IPSEC_INPCB);
|
|
#endif /* MALLOC_DECLARE */
|
|
|
|
#endif /* defined(_KERNEL) */
|
|
#endif /* _NETIPSEC_KEY_H_ */
|