| /* Kernel module to match ESP parameters. */ |
| |
| /* (C) 1999-2000 Yon Uriarte <yon@astaro.de> |
| * |
| * This program is free software; you can redistribute it and/or modify |
| * it under the terms of the GNU General Public License version 2 as |
| * published by the Free Software Foundation. |
| */ |
| |
| #include <linux/module.h> |
| #include <linux/skbuff.h> |
| #include <linux/in.h> |
| #include <linux/ip.h> |
| |
| #include <linux/netfilter/xt_esp.h> |
| #include <linux/netfilter/x_tables.h> |
| |
| #include <linux/netfilter_ipv4/ip_tables.h> |
| #include <linux/netfilter_ipv6/ip6_tables.h> |
| |
| MODULE_LICENSE("GPL"); |
| MODULE_AUTHOR("Yon Uriarte <yon@astaro.de>"); |
| MODULE_DESCRIPTION("x_tables ESP SPI match module"); |
| MODULE_ALIAS("ipt_esp"); |
| MODULE_ALIAS("ip6t_esp"); |
| |
| #if 0 |
| #define duprintf(format, args...) printk(format , ## args) |
| #else |
| #define duprintf(format, args...) |
| #endif |
| |
| /* Returns 1 if the spi is matched by the range, 0 otherwise */ |
| static inline int |
| spi_match(u_int32_t min, u_int32_t max, u_int32_t spi, int invert) |
| { |
| int r = 0; |
| duprintf("esp spi_match:%c 0x%x <= 0x%x <= 0x%x", invert ? '!' : ' ', |
| min, spi, max); |
| r = (spi >= min && spi <= max) ^ invert; |
| duprintf(" result %s\n", r ? "PASS" : "FAILED"); |
| return r; |
| } |
| |
| static int |
| match(const struct sk_buff *skb, |
| const struct net_device *in, |
| const struct net_device *out, |
| const struct xt_match *match, |
| const void *matchinfo, |
| int offset, |
| unsigned int protoff, |
| int *hotdrop) |
| { |
| struct ip_esp_hdr _esp, *eh; |
| const struct xt_esp *espinfo = matchinfo; |
| |
| /* Must not be a fragment. */ |
| if (offset) |
| return 0; |
| |
| eh = skb_header_pointer(skb, protoff, sizeof(_esp), &_esp); |
| if (eh == NULL) { |
| /* We've been asked to examine this packet, and we |
| * can't. Hence, no choice but to drop. |
| */ |
| duprintf("Dropping evil ESP tinygram.\n"); |
| *hotdrop = 1; |
| return 0; |
| } |
| |
| return spi_match(espinfo->spis[0], espinfo->spis[1], ntohl(eh->spi), |
| !!(espinfo->invflags & XT_ESP_INV_SPI)); |
| } |
| |
| /* Called when user tries to insert an entry of this type. */ |
| static int |
| checkentry(const char *tablename, |
| const void *ip_void, |
| const struct xt_match *match, |
| void *matchinfo, |
| unsigned int hook_mask) |
| { |
| const struct xt_esp *espinfo = matchinfo; |
| |
| if (espinfo->invflags & ~XT_ESP_INV_MASK) { |
| duprintf("xt_esp: unknown flags %X\n", espinfo->invflags); |
| return 0; |
| } |
| |
| return 1; |
| } |
| |
| static struct xt_match xt_esp_match[] = { |
| { |
| .name = "esp", |
| .family = AF_INET, |
| .checkentry = checkentry, |
| .match = match, |
| .matchsize = sizeof(struct xt_esp), |
| .proto = IPPROTO_ESP, |
| .me = THIS_MODULE, |
| }, |
| { |
| .name = "esp", |
| .family = AF_INET6, |
| .checkentry = checkentry, |
| .match = match, |
| .matchsize = sizeof(struct xt_esp), |
| .proto = IPPROTO_ESP, |
| .me = THIS_MODULE, |
| }, |
| }; |
| |
| static int __init xt_esp_init(void) |
| { |
| return xt_register_matches(xt_esp_match, ARRAY_SIZE(xt_esp_match)); |
| } |
| |
| static void __exit xt_esp_cleanup(void) |
| { |
| xt_unregister_matches(xt_esp_match, ARRAY_SIZE(xt_esp_match)); |
| } |
| |
| module_init(xt_esp_init); |
| module_exit(xt_esp_cleanup); |