diff options
| author | Steffen Klassert <steffen.klassert@secunet.com> | 2011-03-08 00:06:31 +0000 | 
|---|---|---|
| committer | David S. Miller <davem@davemloft.net> | 2011-03-13 20:22:28 -0700 | 
| commit | 1ce3644ade9c865c755bf0f6a4e109b7bb6eb60f (patch) | |
| tree | 14ce0727337a43d1fa28432d01189d1a5f4269c7 | |
| parent | 9736acf395d3608583a7be70f62800b494fa103c (diff) | |
| download | olio-linux-3.10-1ce3644ade9c865c755bf0f6a4e109b7bb6eb60f.tar.xz olio-linux-3.10-1ce3644ade9c865c755bf0f6a4e109b7bb6eb60f.zip  | |
xfrm: Use separate low and high order bits of the sequence numbers in xfrm_skb_cb
To support IPsec extended sequence numbers, we split the
output sequence numbers of xfrm_skb_cb in low and high order 32 bits
and we add the high order 32 bits to the input sequence numbers.
All users are updated accordingly.
Signed-off-by: Steffen Klassert <steffen.klassert@secunet.com>
Acked-by: Herbert Xu <herbert@gondor.apana.org.au>
Signed-off-by: David S. Miller <davem@davemloft.net>
| -rw-r--r-- | include/net/xfrm.h | 10 | ||||
| -rw-r--r-- | net/ipv4/ah4.c | 2 | ||||
| -rw-r--r-- | net/ipv4/esp4.c | 4 | ||||
| -rw-r--r-- | net/ipv6/ah6.c | 2 | ||||
| -rw-r--r-- | net/ipv6/esp6.c | 4 | ||||
| -rw-r--r-- | net/xfrm/xfrm_input.c | 4 | ||||
| -rw-r--r-- | net/xfrm/xfrm_output.c | 2 | 
7 files changed, 17 insertions, 11 deletions
diff --git a/include/net/xfrm.h b/include/net/xfrm.h index 7640822bc51..cb6d9b3fc55 100644 --- a/include/net/xfrm.h +++ b/include/net/xfrm.h @@ -582,8 +582,14 @@ struct xfrm_skb_cb {          /* Sequence number for replay protection. */  	union { -		u64 output; -		__be32 input; +		struct { +			__u32 low; +			__u32 hi; +		} output; +		struct { +			__be32 low; +			__be32 hi; +		} input;  	} seq;  }; diff --git a/net/ipv4/ah4.c b/net/ipv4/ah4.c index 325053df6e7..4286fd3cc0e 100644 --- a/net/ipv4/ah4.c +++ b/net/ipv4/ah4.c @@ -208,7 +208,7 @@ static int ah_output(struct xfrm_state *x, struct sk_buff *skb)  	ah->reserved = 0;  	ah->spi = x->id.spi; -	ah->seq_no = htonl(XFRM_SKB_CB(skb)->seq.output); +	ah->seq_no = htonl(XFRM_SKB_CB(skb)->seq.output.low);  	sg_init_table(sg, nfrags);  	skb_to_sgvec(skb, sg, 0, skb->len); diff --git a/net/ipv4/esp4.c b/net/ipv4/esp4.c index e42a905180f..882dbbb7d79 100644 --- a/net/ipv4/esp4.c +++ b/net/ipv4/esp4.c @@ -215,7 +215,7 @@ static int esp_output(struct xfrm_state *x, struct sk_buff *skb)  	}  	esph->spi = x->id.spi; -	esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq.output); +	esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq.output.low);  	sg_init_table(sg, nfrags);  	skb_to_sgvec(skb, sg, @@ -227,7 +227,7 @@ static int esp_output(struct xfrm_state *x, struct sk_buff *skb)  	aead_givcrypt_set_crypt(req, sg, sg, clen, iv);  	aead_givcrypt_set_assoc(req, asg, sizeof(*esph));  	aead_givcrypt_set_giv(req, esph->enc_data, -			      XFRM_SKB_CB(skb)->seq.output); +			      XFRM_SKB_CB(skb)->seq.output.low);  	ESP_SKB_CB(skb)->tmp = tmp;  	err = crypto_aead_givencrypt(req); diff --git a/net/ipv6/ah6.c b/net/ipv6/ah6.c index 1aba54ae53c..2195ae65192 100644 --- a/net/ipv6/ah6.c +++ b/net/ipv6/ah6.c @@ -409,7 +409,7 @@ static int ah6_output(struct xfrm_state *x, struct sk_buff *skb)  	ah->reserved = 0;  	ah->spi = x->id.spi; -	ah->seq_no = htonl(XFRM_SKB_CB(skb)->seq.output); +	ah->seq_no = htonl(XFRM_SKB_CB(skb)->seq.output.low);  	sg_init_table(sg, nfrags);  	skb_to_sgvec(skb, sg, 0, skb->len); diff --git a/net/ipv6/esp6.c b/net/ipv6/esp6.c index 1b5c9825743..c7b5d5ee0de 100644 --- a/net/ipv6/esp6.c +++ b/net/ipv6/esp6.c @@ -204,7 +204,7 @@ static int esp6_output(struct xfrm_state *x, struct sk_buff *skb)  	*skb_mac_header(skb) = IPPROTO_ESP;  	esph->spi = x->id.spi; -	esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq.output); +	esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq.output.low);  	sg_init_table(sg, nfrags);  	skb_to_sgvec(skb, sg, @@ -216,7 +216,7 @@ static int esp6_output(struct xfrm_state *x, struct sk_buff *skb)  	aead_givcrypt_set_crypt(req, sg, sg, clen, iv);  	aead_givcrypt_set_assoc(req, asg, sizeof(*esph));  	aead_givcrypt_set_giv(req, esph->enc_data, -			      XFRM_SKB_CB(skb)->seq.output); +			      XFRM_SKB_CB(skb)->seq.output.low);  	ESP_SKB_CB(skb)->tmp = tmp;  	err = crypto_aead_givencrypt(req); diff --git a/net/xfrm/xfrm_input.c b/net/xfrm/xfrm_input.c index 45f1c98d4fc..b173b7fdc43 100644 --- a/net/xfrm/xfrm_input.c +++ b/net/xfrm/xfrm_input.c @@ -118,7 +118,7 @@ int xfrm_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type)  	if (encap_type < 0) {  		async = 1;  		x = xfrm_input_state(skb); -		seq = XFRM_SKB_CB(skb)->seq.input; +		seq = XFRM_SKB_CB(skb)->seq.input.low;  		goto resume;  	} @@ -184,7 +184,7 @@ int xfrm_input(struct sk_buff *skb, int nexthdr, __be32 spi, int encap_type)  		spin_unlock(&x->lock); -		XFRM_SKB_CB(skb)->seq.input = seq; +		XFRM_SKB_CB(skb)->seq.input.low = seq;  		nexthdr = x->type->input(x, skb); diff --git a/net/xfrm/xfrm_output.c b/net/xfrm/xfrm_output.c index 64f2ae1fdc1..4b63776a026 100644 --- a/net/xfrm/xfrm_output.c +++ b/net/xfrm/xfrm_output.c @@ -68,7 +68,7 @@ static int xfrm_output_one(struct sk_buff *skb, int err)  		}  		if (x->type->flags & XFRM_TYPE_REPLAY_PROT) { -			XFRM_SKB_CB(skb)->seq.output = ++x->replay.oseq; +			XFRM_SKB_CB(skb)->seq.output.low = ++x->replay.oseq;  			if (unlikely(x->replay.oseq == 0)) {  				XFRM_INC_STATS(net, LINUX_MIB_XFRMOUTSTATESEQERROR);  				x->replay.oseq--;  |