diff options
-rw-r--r-- | include/net/xfrm.h | 20 | ||||
-rw-r--r-- | net/ipv4/ah4.c | 4 | ||||
-rw-r--r-- | net/ipv4/esp4.c | 4 | ||||
-rw-r--r-- | net/ipv6/ah6.c | 4 | ||||
-rw-r--r-- | net/ipv6/esp6.c | 4 | ||||
-rw-r--r-- | net/xfrm/xfrm_output.c | 5 |
6 files changed, 32 insertions, 9 deletions
diff --git a/include/net/xfrm.h b/include/net/xfrm.h index bb9193434eb3..a267725f9753 100644 --- a/include/net/xfrm.h +++ b/include/net/xfrm.h | |||
@@ -2,7 +2,6 @@ | |||
2 | #define _NET_XFRM_H | 2 | #define _NET_XFRM_H |
3 | 3 | ||
4 | #include <linux/compiler.h> | 4 | #include <linux/compiler.h> |
5 | #include <linux/in.h> | ||
6 | #include <linux/xfrm.h> | 5 | #include <linux/xfrm.h> |
7 | #include <linux/spinlock.h> | 6 | #include <linux/spinlock.h> |
8 | #include <linux/list.h> | 7 | #include <linux/list.h> |
@@ -16,6 +15,7 @@ | |||
16 | 15 | ||
17 | #include <net/sock.h> | 16 | #include <net/sock.h> |
18 | #include <net/dst.h> | 17 | #include <net/dst.h> |
18 | #include <net/ip.h> | ||
19 | #include <net/route.h> | 19 | #include <net/route.h> |
20 | #include <net/ipv6.h> | 20 | #include <net/ipv6.h> |
21 | #include <net/ip6_fib.h> | 21 | #include <net/ip6_fib.h> |
@@ -279,6 +279,7 @@ struct xfrm_type | |||
279 | __u8 proto; | 279 | __u8 proto; |
280 | __u8 flags; | 280 | __u8 flags; |
281 | #define XFRM_TYPE_NON_FRAGMENT 1 | 281 | #define XFRM_TYPE_NON_FRAGMENT 1 |
282 | #define XFRM_TYPE_REPLAY_PROT 2 | ||
282 | 283 | ||
283 | int (*init_state)(struct xfrm_state *x); | 284 | int (*init_state)(struct xfrm_state *x); |
284 | void (*destructor)(struct xfrm_state *); | 285 | void (*destructor)(struct xfrm_state *); |
@@ -419,6 +420,23 @@ extern int xfrm_unregister_km(struct xfrm_mgr *km); | |||
419 | 420 | ||
420 | extern unsigned int xfrm_policy_count[XFRM_POLICY_MAX*2]; | 421 | extern unsigned int xfrm_policy_count[XFRM_POLICY_MAX*2]; |
421 | 422 | ||
423 | /* | ||
424 | * This structure is used for the duration where packets are being | ||
425 | * transformed by IPsec. As soon as the packet leaves IPsec the | ||
426 | * area beyond the generic IP part may be overwritten. | ||
427 | */ | ||
428 | struct xfrm_skb_cb { | ||
429 | union { | ||
430 | struct inet_skb_parm h4; | ||
431 | struct inet6_skb_parm h6; | ||
432 | } header; | ||
433 | |||
434 | /* Sequence number for replay protection. */ | ||
435 | u64 seq; | ||
436 | }; | ||
437 | |||
438 | #define XFRM_SKB_CB(__skb) ((struct xfrm_skb_cb *)&((__skb)->cb[0])) | ||
439 | |||
422 | /* Audit Information */ | 440 | /* Audit Information */ |
423 | struct xfrm_audit | 441 | struct xfrm_audit |
424 | { | 442 | { |
diff --git a/net/ipv4/ah4.c b/net/ipv4/ah4.c index dc1d8e871b24..58af298e1941 100644 --- a/net/ipv4/ah4.c +++ b/net/ipv4/ah4.c | |||
@@ -96,8 +96,7 @@ static int ah_output(struct xfrm_state *x, struct sk_buff *skb) | |||
96 | 96 | ||
97 | ah->reserved = 0; | 97 | ah->reserved = 0; |
98 | ah->spi = x->id.spi; | 98 | ah->spi = x->id.spi; |
99 | ah->seq_no = htonl(++x->replay.oseq); | 99 | ah->seq_no = htonl(XFRM_SKB_CB(skb)->seq); |
100 | xfrm_aevent_doreplay(x); | ||
101 | err = ah_mac_digest(ahp, skb, ah->auth_data); | 100 | err = ah_mac_digest(ahp, skb, ah->auth_data); |
102 | if (err) | 101 | if (err) |
103 | goto error; | 102 | goto error; |
@@ -297,6 +296,7 @@ static struct xfrm_type ah_type = | |||
297 | .description = "AH4", | 296 | .description = "AH4", |
298 | .owner = THIS_MODULE, | 297 | .owner = THIS_MODULE, |
299 | .proto = IPPROTO_AH, | 298 | .proto = IPPROTO_AH, |
299 | .flags = XFRM_TYPE_REPLAY_PROT, | ||
300 | .init_state = ah_init_state, | 300 | .init_state = ah_init_state, |
301 | .destructor = ah_destroy, | 301 | .destructor = ah_destroy, |
302 | .input = ah_input, | 302 | .input = ah_input, |
diff --git a/net/ipv4/esp4.c b/net/ipv4/esp4.c index d233e2e62500..0f62af9a7f15 100644 --- a/net/ipv4/esp4.c +++ b/net/ipv4/esp4.c | |||
@@ -95,8 +95,7 @@ static int esp_output(struct xfrm_state *x, struct sk_buff *skb) | |||
95 | top_iph->protocol = IPPROTO_ESP; | 95 | top_iph->protocol = IPPROTO_ESP; |
96 | 96 | ||
97 | esph->spi = x->id.spi; | 97 | esph->spi = x->id.spi; |
98 | esph->seq_no = htonl(++x->replay.oseq); | 98 | esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq); |
99 | xfrm_aevent_doreplay(x); | ||
100 | 99 | ||
101 | if (esp->conf.ivlen) { | 100 | if (esp->conf.ivlen) { |
102 | if (unlikely(!esp->conf.ivinitted)) { | 101 | if (unlikely(!esp->conf.ivinitted)) { |
@@ -437,6 +436,7 @@ static struct xfrm_type esp_type = | |||
437 | .description = "ESP4", | 436 | .description = "ESP4", |
438 | .owner = THIS_MODULE, | 437 | .owner = THIS_MODULE, |
439 | .proto = IPPROTO_ESP, | 438 | .proto = IPPROTO_ESP, |
439 | .flags = XFRM_TYPE_REPLAY_PROT, | ||
440 | .init_state = esp_init_state, | 440 | .init_state = esp_init_state, |
441 | .destructor = esp_destroy, | 441 | .destructor = esp_destroy, |
442 | .get_mtu = esp4_get_mtu, | 442 | .get_mtu = esp4_get_mtu, |
diff --git a/net/ipv6/ah6.c b/net/ipv6/ah6.c index 69a2030407b8..ae68a900f605 100644 --- a/net/ipv6/ah6.c +++ b/net/ipv6/ah6.c | |||
@@ -283,8 +283,7 @@ static int ah6_output(struct xfrm_state *x, struct sk_buff *skb) | |||
283 | 283 | ||
284 | ah->reserved = 0; | 284 | ah->reserved = 0; |
285 | ah->spi = x->id.spi; | 285 | ah->spi = x->id.spi; |
286 | ah->seq_no = htonl(++x->replay.oseq); | 286 | ah->seq_no = htonl(XFRM_SKB_CB(skb)->seq); |
287 | xfrm_aevent_doreplay(x); | ||
288 | err = ah_mac_digest(ahp, skb, ah->auth_data); | 287 | err = ah_mac_digest(ahp, skb, ah->auth_data); |
289 | if (err) | 288 | if (err) |
290 | goto error_free_iph; | 289 | goto error_free_iph; |
@@ -506,6 +505,7 @@ static struct xfrm_type ah6_type = | |||
506 | .description = "AH6", | 505 | .description = "AH6", |
507 | .owner = THIS_MODULE, | 506 | .owner = THIS_MODULE, |
508 | .proto = IPPROTO_AH, | 507 | .proto = IPPROTO_AH, |
508 | .flags = XFRM_TYPE_REPLAY_PROT, | ||
509 | .init_state = ah6_init_state, | 509 | .init_state = ah6_init_state, |
510 | .destructor = ah6_destroy, | 510 | .destructor = ah6_destroy, |
511 | .input = ah6_input, | 511 | .input = ah6_input, |
diff --git a/net/ipv6/esp6.c b/net/ipv6/esp6.c index 77281068d0f9..0c5fb81451b7 100644 --- a/net/ipv6/esp6.c +++ b/net/ipv6/esp6.c | |||
@@ -95,8 +95,7 @@ static int esp6_output(struct xfrm_state *x, struct sk_buff *skb) | |||
95 | *skb_network_header(skb) = IPPROTO_ESP; | 95 | *skb_network_header(skb) = IPPROTO_ESP; |
96 | 96 | ||
97 | esph->spi = x->id.spi; | 97 | esph->spi = x->id.spi; |
98 | esph->seq_no = htonl(++x->replay.oseq); | 98 | esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq); |
99 | xfrm_aevent_doreplay(x); | ||
100 | 99 | ||
101 | if (esp->conf.ivlen) { | 100 | if (esp->conf.ivlen) { |
102 | if (unlikely(!esp->conf.ivinitted)) { | 101 | if (unlikely(!esp->conf.ivinitted)) { |
@@ -373,6 +372,7 @@ static struct xfrm_type esp6_type = | |||
373 | .description = "ESP6", | 372 | .description = "ESP6", |
374 | .owner = THIS_MODULE, | 373 | .owner = THIS_MODULE, |
375 | .proto = IPPROTO_ESP, | 374 | .proto = IPPROTO_ESP, |
375 | .flags = XFRM_TYPE_REPLAY_PROT, | ||
376 | .init_state = esp6_init_state, | 376 | .init_state = esp6_init_state, |
377 | .destructor = esp6_destroy, | 377 | .destructor = esp6_destroy, |
378 | .get_mtu = esp6_get_mtu, | 378 | .get_mtu = esp6_get_mtu, |
diff --git a/net/xfrm/xfrm_output.c b/net/xfrm/xfrm_output.c index 5b1c978a323c..20e789d8c63e 100644 --- a/net/xfrm/xfrm_output.c +++ b/net/xfrm/xfrm_output.c | |||
@@ -58,6 +58,11 @@ int xfrm_output(struct sk_buff *skb) | |||
58 | if (err) | 58 | if (err) |
59 | goto error; | 59 | goto error; |
60 | 60 | ||
61 | if (x->type->flags & XFRM_TYPE_REPLAY_PROT) { | ||
62 | XFRM_SKB_CB(skb)->seq = ++x->replay.oseq; | ||
63 | xfrm_aevent_doreplay(x); | ||
64 | } | ||
65 | |||
61 | err = x->mode->output(x, skb); | 66 | err = x->mode->output(x, skb); |
62 | if (err) | 67 | if (err) |
63 | goto error; | 68 | goto error; |