// SPDX-License-Identifier: GPL-2.0-only
|
/* Kernel module to match AH parameters. */
|
|
/* (C) 2001-2002 Andras Kis-Szabo <kisza@sch.bme.hu>
|
*/
|
#define pr_fmt(fmt) KBUILD_MODNAME ": " fmt
|
#include <linux/module.h>
|
#include <linux/skbuff.h>
|
#include <linux/ip.h>
|
#include <linux/ipv6.h>
|
#include <linux/types.h>
|
#include <net/checksum.h>
|
#include <net/ipv6.h>
|
|
#include <linux/netfilter/x_tables.h>
|
#include <linux/netfilter_ipv6/ip6_tables.h>
|
#include <linux/netfilter_ipv6/ip6t_ah.h>
|
|
MODULE_LICENSE("GPL");
|
MODULE_DESCRIPTION("Xtables: IPv6 IPsec-AH match");
|
MODULE_AUTHOR("Andras Kis-Szabo <kisza@sch.bme.hu>");
|
|
/* Returns 1 if the spi is matched by the range, 0 otherwise */
|
static inline bool
|
spi_match(u_int32_t min, u_int32_t max, u_int32_t spi, bool invert)
|
{
|
bool r;
|
|
pr_debug("spi_match:%c 0x%x <= 0x%x <= 0x%x\n",
|
invert ? '!' : ' ', min, spi, max);
|
r = (spi >= min && spi <= max) ^ invert;
|
pr_debug(" result %s\n", r ? "PASS" : "FAILED");
|
return r;
|
}
|
|
static bool ah_mt6(const struct sk_buff *skb, struct xt_action_param *par)
|
{
|
struct ip_auth_hdr _ah;
|
const struct ip_auth_hdr *ah;
|
const struct ip6t_ah *ahinfo = par->matchinfo;
|
unsigned int ptr = 0;
|
unsigned int hdrlen = 0;
|
int err;
|
|
err = ipv6_find_hdr(skb, &ptr, NEXTHDR_AUTH, NULL, NULL);
|
if (err < 0) {
|
if (err != -ENOENT)
|
par->hotdrop = true;
|
return false;
|
}
|
|
ah = skb_header_pointer(skb, ptr, sizeof(_ah), &_ah);
|
if (ah == NULL) {
|
par->hotdrop = true;
|
return false;
|
}
|
|
hdrlen = ipv6_authlen(ah);
|
|
pr_debug("IPv6 AH LEN %u %u ", hdrlen, ah->hdrlen);
|
pr_debug("RES %04X ", ah->reserved);
|
pr_debug("SPI %u %08X\n", ntohl(ah->spi), ntohl(ah->spi));
|
|
pr_debug("IPv6 AH spi %02X ",
|
spi_match(ahinfo->spis[0], ahinfo->spis[1],
|
ntohl(ah->spi),
|
!!(ahinfo->invflags & IP6T_AH_INV_SPI)));
|
pr_debug("len %02X %04X %02X ",
|
ahinfo->hdrlen, hdrlen,
|
(!ahinfo->hdrlen ||
|
(ahinfo->hdrlen == hdrlen) ^
|
!!(ahinfo->invflags & IP6T_AH_INV_LEN)));
|
pr_debug("res %02X %04X %02X\n",
|
ahinfo->hdrres, ah->reserved,
|
!(ahinfo->hdrres && ah->reserved));
|
|
return spi_match(ahinfo->spis[0], ahinfo->spis[1],
|
ntohl(ah->spi),
|
!!(ahinfo->invflags & IP6T_AH_INV_SPI)) &&
|
(!ahinfo->hdrlen ||
|
(ahinfo->hdrlen == hdrlen) ^
|
!!(ahinfo->invflags & IP6T_AH_INV_LEN)) &&
|
!(ahinfo->hdrres && ah->reserved);
|
}
|
|
static int ah_mt6_check(const struct xt_mtchk_param *par)
|
{
|
const struct ip6t_ah *ahinfo = par->matchinfo;
|
|
if (ahinfo->invflags & ~IP6T_AH_INV_MASK) {
|
pr_debug("unknown flags %X\n", ahinfo->invflags);
|
return -EINVAL;
|
}
|
return 0;
|
}
|
|
static struct xt_match ah_mt6_reg __read_mostly = {
|
.name = "ah",
|
.family = NFPROTO_IPV6,
|
.match = ah_mt6,
|
.matchsize = sizeof(struct ip6t_ah),
|
.checkentry = ah_mt6_check,
|
.me = THIS_MODULE,
|
};
|
|
static int __init ah_mt6_init(void)
|
{
|
return xt_register_match(&ah_mt6_reg);
|
}
|
|
static void __exit ah_mt6_exit(void)
|
{
|
xt_unregister_match(&ah_mt6_reg);
|
}
|
|
module_init(ah_mt6_init);
|
module_exit(ah_mt6_exit);
|