[SK_BUFF]: Introduce ipip_hdr(), remove skb->h.ipiph
[linux-2.6/openmoko-kernel/knife-kernel.git] / net / ipv4 / xfrm4_mode_beet.c
blob32fcfc0b5c8c10d6a5a8e9a954b33592523c8601
1 /*
2 * xfrm4_mode_beet.c - BEET mode encapsulation for IPv4.
4 * Copyright (c) 2006 Diego Beltrami <diego.beltrami@gmail.com>
5 * Miika Komu <miika@iki.fi>
6 * Herbert Xu <herbert@gondor.apana.org.au>
7 * Abhinav Pathak <abhinav.pathak@hiit.fi>
8 * Jeff Ahrenholz <ahrenholz@gmail.com>
9 */
11 #include <linux/init.h>
12 #include <linux/kernel.h>
13 #include <linux/module.h>
14 #include <linux/skbuff.h>
15 #include <linux/stringify.h>
16 #include <net/dst.h>
17 #include <net/ip.h>
18 #include <net/xfrm.h>
20 /* Add encapsulation header.
22 * The top IP header will be constructed per draft-nikander-esp-beet-mode-06.txt.
23 * The following fields in it shall be filled in by x->type->output:
24 * tot_len
25 * check
27 * On exit, skb->h will be set to the start of the payload to be processed
28 * by x->type->output and skb->nh will be set to the top IP header.
30 static int xfrm4_beet_output(struct xfrm_state *x, struct sk_buff *skb)
32 struct iphdr *iph, *top_iph = NULL;
33 int hdrlen, optlen;
35 iph = ip_hdr(skb);
36 skb->h.raw = skb->nh.raw;
38 hdrlen = 0;
39 optlen = iph->ihl * 4 - sizeof(*iph);
40 if (unlikely(optlen))
41 hdrlen += IPV4_BEET_PHMAXLEN - (optlen & 4);
43 skb_push(skb, x->props.header_len + hdrlen);
44 skb_reset_network_header(skb);
45 top_iph = ip_hdr(skb);
46 skb->h.raw += sizeof(*iph) - hdrlen;
48 memmove(top_iph, iph, sizeof(*iph));
49 if (unlikely(optlen)) {
50 struct ip_beet_phdr *ph;
52 BUG_ON(optlen < 0);
54 ph = (struct ip_beet_phdr *)skb->h.raw;
55 ph->padlen = 4 - (optlen & 4);
56 ph->hdrlen = optlen / 8;
57 ph->nexthdr = top_iph->protocol;
58 if (ph->padlen)
59 memset(ph + 1, IPOPT_NOP, ph->padlen);
61 top_iph->protocol = IPPROTO_BEETPH;
62 top_iph->ihl = sizeof(struct iphdr) / 4;
65 top_iph->saddr = x->props.saddr.a4;
66 top_iph->daddr = x->id.daddr.a4;
68 return 0;
71 static int xfrm4_beet_input(struct xfrm_state *x, struct sk_buff *skb)
73 struct iphdr *iph = ip_hdr(skb);
74 int phlen = 0;
75 int optlen = 0;
76 __u8 ph_nexthdr = 0, protocol = 0;
77 int err = -EINVAL;
79 protocol = iph->protocol;
81 if (unlikely(iph->protocol == IPPROTO_BEETPH)) {
82 struct ip_beet_phdr *ph;
84 if (!pskb_may_pull(skb, sizeof(*ph)))
85 goto out;
86 ph = (struct ip_beet_phdr *)(ipip_hdr(skb) + 1);
88 phlen = sizeof(*ph) + ph->padlen;
89 optlen = ph->hdrlen * 8 + (IPV4_BEET_PHMAXLEN - phlen);
90 if (optlen < 0 || optlen & 3 || optlen > 250)
91 goto out;
93 if (!pskb_may_pull(skb, phlen + optlen))
94 goto out;
95 skb->len -= phlen + optlen;
97 ph_nexthdr = ph->nexthdr;
100 skb_set_network_header(skb, phlen - sizeof(*iph));
101 memmove(skb_network_header(skb), iph, sizeof(*iph));
102 skb_set_transport_header(skb, phlen + optlen);
103 skb->data = skb->h.raw;
105 iph = ip_hdr(skb);
106 iph->ihl = (sizeof(*iph) + optlen) / 4;
107 iph->tot_len = htons(skb->len + iph->ihl * 4);
108 iph->daddr = x->sel.daddr.a4;
109 iph->saddr = x->sel.saddr.a4;
110 if (ph_nexthdr)
111 iph->protocol = ph_nexthdr;
112 else
113 iph->protocol = protocol;
114 iph->check = 0;
115 iph->check = ip_fast_csum(skb_network_header(skb), iph->ihl);
116 err = 0;
117 out:
118 return err;
121 static struct xfrm_mode xfrm4_beet_mode = {
122 .input = xfrm4_beet_input,
123 .output = xfrm4_beet_output,
124 .owner = THIS_MODULE,
125 .encap = XFRM_MODE_BEET,
128 static int __init xfrm4_beet_init(void)
130 return xfrm_register_mode(&xfrm4_beet_mode, AF_INET);
133 static void __exit xfrm4_beet_exit(void)
135 int err;
137 err = xfrm_unregister_mode(&xfrm4_beet_mode, AF_INET);
138 BUG_ON(err);
141 module_init(xfrm4_beet_init);
142 module_exit(xfrm4_beet_exit);
143 MODULE_LICENSE("GPL");
144 MODULE_ALIAS_XFRM_MODE(AF_INET, XFRM_MODE_BEET);