Commit 0d681623 authored by Serge Hallyn's avatar Serge Hallyn Committed by David S. Miller

[MLSXFRM]: Add security context to acquire messages using netlink

This includes the security context of a security association created
for use by IKE in the acquire messages sent to IKE daemons using
netlink/xfrm_user. This would allow the daemons to include the
security context in the negotiation, so that the resultant association
is unique to that security context.
Signed-off-by: default avatarSerge Hallyn <serue@us.ibm.com>
Signed-off-by: default avatarDavid S. Miller <davem@davemloft.net>
parent e0d1caa7
...@@ -911,25 +911,38 @@ static int copy_to_user_tmpl(struct xfrm_policy *xp, struct sk_buff *skb) ...@@ -911,25 +911,38 @@ static int copy_to_user_tmpl(struct xfrm_policy *xp, struct sk_buff *skb)
return -1; return -1;
} }
static int copy_to_user_sec_ctx(struct xfrm_policy *xp, struct sk_buff *skb) static int copy_sec_ctx(struct xfrm_sec_ctx *s, struct sk_buff *skb)
{ {
if (xp->security) { int ctx_size = sizeof(struct xfrm_sec_ctx) + s->ctx_len;
int ctx_size = sizeof(struct xfrm_sec_ctx) + struct rtattr *rt = __RTA_PUT(skb, XFRMA_SEC_CTX, ctx_size);
xp->security->ctx_len; struct xfrm_user_sec_ctx *uctx = RTA_DATA(rt);
struct rtattr *rt = __RTA_PUT(skb, XFRMA_SEC_CTX, ctx_size);
struct xfrm_user_sec_ctx *uctx = RTA_DATA(rt); uctx->exttype = XFRMA_SEC_CTX;
uctx->len = ctx_size;
uctx->ctx_doi = s->ctx_doi;
uctx->ctx_alg = s->ctx_alg;
uctx->ctx_len = s->ctx_len;
memcpy(uctx + 1, s->ctx_str, s->ctx_len);
return 0;
uctx->exttype = XFRMA_SEC_CTX; rtattr_failure:
uctx->len = ctx_size; return -1;
uctx->ctx_doi = xp->security->ctx_doi; }
uctx->ctx_alg = xp->security->ctx_alg;
uctx->ctx_len = xp->security->ctx_len; static inline int copy_to_user_state_sec_ctx(struct xfrm_state *x, struct sk_buff *skb)
memcpy(uctx + 1, xp->security->ctx_str, xp->security->ctx_len); {
if (x->security) {
return copy_sec_ctx(x->security, skb);
} }
return 0; return 0;
}
rtattr_failure: static inline int copy_to_user_sec_ctx(struct xfrm_policy *xp, struct sk_buff *skb)
return -1; {
if (xp->security) {
return copy_sec_ctx(xp->security, skb);
}
return 0;
} }
static int dump_one_policy(struct xfrm_policy *xp, int dir, int count, void *ptr) static int dump_one_policy(struct xfrm_policy *xp, int dir, int count, void *ptr)
...@@ -1710,7 +1723,7 @@ static int build_acquire(struct sk_buff *skb, struct xfrm_state *x, ...@@ -1710,7 +1723,7 @@ static int build_acquire(struct sk_buff *skb, struct xfrm_state *x,
if (copy_to_user_tmpl(xp, skb) < 0) if (copy_to_user_tmpl(xp, skb) < 0)
goto nlmsg_failure; goto nlmsg_failure;
if (copy_to_user_sec_ctx(xp, skb)) if (copy_to_user_state_sec_ctx(x, skb))
goto nlmsg_failure; goto nlmsg_failure;
nlh->nlmsg_len = skb->tail - b; nlh->nlmsg_len = skb->tail - b;
......
Markdown is supported
0%
or
You are about to add 0 people to the discussion. Proceed with caution.
Finish editing this message first!
Please register or to comment