linux-2.6.20-openswan-2.4.7.kernel-2.6-natt.patch 4.2 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158
  1. packaging/utils/nattpatch 2.6
  2. --- /dev/null Tue Mar 11 13:02:56 2003
  3. +++ nat-t/include/net/xfrmudp.h Mon Feb 9 13:51:03 2004
  4. @@ -0,0 +1,10 @@
  5. +/*
  6. + * pointer to function for type that xfrm4_input wants, to permit
  7. + * decoupling of XFRM from udp.c
  8. + */
  9. +#define HAVE_XFRM4_UDP_REGISTER
  10. +
  11. +typedef int (*xfrm4_rcv_encap_t)(struct sk_buff *skb, __u16 encap_type);
  12. +extern int udp4_register_esp_rcvencap(xfrm4_rcv_encap_t func
  13. + , xfrm4_rcv_encap_t *oldfunc);
  14. +extern int udp4_unregister_esp_rcvencap(xfrm4_rcv_encap_t func);
  15. --- /distros/kernel/linux-2.6.11.2/net/ipv4/Kconfig 2005-03-09 03:12:33.000000000 -0500
  16. +++ swan26/net/ipv4/Kconfig 2005-04-04 18:46:13.000000000 -0400
  17. @@ -351,2 +351,8 @@
  18. +config IPSEC_NAT_TRAVERSAL
  19. + bool "IPSEC NAT-Traversal (KLIPS compatible)"
  20. + depends on INET
  21. + ---help---
  22. + Includes support for RFC3947/RFC3948 NAT-Traversal of ESP over UDP.
  23. +
  24. config IP_TCPDIAG
  25. --- plain26/net/ipv4/udp.c.orig 2006-01-02 22:21:10.000000000 -0500
  26. +++ plain26/net/ipv4/udp.c 2006-01-10 20:07:21.000000000 -0500
  27. @@ -108,11 +108,14 @@
  28. #include <net/checksum.h>
  29. #include <net/xfrm.h>
  30. +#include <net/xfrmudp.h>
  31. #include "udp_impl.h"
  32. /*
  33. * Snmp MIB for the UDP layer
  34. */
  35. +static xfrm4_rcv_encap_t xfrm4_rcv_encap_func;
  36. +
  37. DEFINE_SNMP_STAT(struct udp_mib, udp_statistics) __read_mostly;
  38. struct hlist_head udp_hash[UDP_HTABLE_SIZE];
  39. @@ -894,6 +897,42 @@
  40. sk_common_release(sk);
  41. }
  42. +#if defined(CONFIG_XFRM) || defined(CONFIG_IPSEC_NAT_TRAVERSAL)
  43. +
  44. +/* if XFRM isn't a module, then register it directly. */
  45. +#if 0 && !defined(CONFIG_XFRM_MODULE) && !defined(CONFIG_IPSEC_NAT_TRAVERSAL)
  46. +static xfrm4_rcv_encap_t xfrm4_rcv_encap_func = xfrm4_rcv_encap;
  47. +#else
  48. +static xfrm4_rcv_encap_t xfrm4_rcv_encap_func = NULL;
  49. +#endif
  50. +
  51. +int udp4_register_esp_rcvencap(xfrm4_rcv_encap_t func
  52. + , xfrm4_rcv_encap_t *oldfunc)
  53. +{
  54. + if(oldfunc != NULL) {
  55. + *oldfunc = xfrm4_rcv_encap_func;
  56. + }
  57. +
  58. +#if 0
  59. + if(xfrm4_rcv_encap_func != NULL)
  60. + return -1;
  61. +#endif
  62. +
  63. + xfrm4_rcv_encap_func = func;
  64. + return 0;
  65. +}
  66. +
  67. +int udp4_unregister_esp_rcvencap(xfrm4_rcv_encap_t func)
  68. +{
  69. + if(xfrm4_rcv_encap_func != func)
  70. + return -1;
  71. +
  72. + xfrm4_rcv_encap_func = NULL;
  73. + return 0;
  74. +}
  75. +#endif /* CONFIG_XFRM_MODULE || CONFIG_IPSEC_NAT_TRAVERSAL */
  76. +
  77. +
  78. /* return:
  79. * 1 if the the UDP system should process it
  80. * 0 if we should drop this packet
  81. @@ -901,9 +940,9 @@
  82. */
  83. static int udp_encap_rcv(struct sock * sk, struct sk_buff *skb)
  84. {
  85. -#ifndef CONFIG_XFRM
  86. +#if !defined(CONFIG_XFRM) && !defined(CONFIG_IPSEC_NAT_TRAVERSAL)
  87. return 1;
  88. -#else
  89. +#else /* either CONFIG_XFRM or CONFIG_IPSEC_NAT_TRAVERSAL */
  90. struct udp_sock *up = udp_sk(sk);
  91. struct udphdr *uh = skb->h.uh;
  92. struct iphdr *iph;
  93. @@ -915,11 +954,11 @@
  94. /* if we're overly short, let UDP handle it */
  95. len = skb->len - sizeof(struct udphdr);
  96. if (len <= 0)
  97. - return 1;
  98. + return 2;
  99. /* if this is not encapsulated socket, then just return now */
  100. if (!encap_type)
  101. - return 1;
  102. + return 3;
  103. /* If this is a paged skb, make sure we pull up
  104. * whatever data we need to look at. */
  105. @@ -934,7 +973,7 @@
  106. len = sizeof(struct udphdr);
  107. } else
  108. /* Must be an IKE packet.. pass it through */
  109. - return 1;
  110. + return 4;
  111. break;
  112. case UDP_ENCAP_ESPINUDP_NON_IKE:
  113. /* Check if this is a keepalive packet. If so, eat it. */
  114. @@ -947,7 +986,7 @@
  115. len = sizeof(struct udphdr) + 2 * sizeof(u32);
  116. } else
  117. /* Must be an IKE packet.. pass it through */
  118. - return 1;
  119. + return 5;
  120. break;
  121. }
  122. @@ -1021,10 +1060,14 @@
  123. return 0;
  124. }
  125. if (ret < 0) {
  126. - /* process the ESP packet */
  127. - ret = xfrm4_rcv_encap(skb, up->encap_type);
  128. - UDP_INC_STATS_BH(UDP_MIB_INDATAGRAMS, up->pcflag);
  129. - return -ret;
  130. + if(xfrm4_rcv_encap_func != NULL) {
  131. + ret = (*xfrm4_rcv_encap_func)(skb, up->encap_type);
  132. + UDP_INC_STATS_BH(UDP_MIB_INDATAGRAMS, up->pcflag);
  133. + } else {
  134. + UDP_INC_STATS_BH(UDP_MIB_INERRORS, up->pcflag);
  135. + ret = 1;
  136. + }
  137. + return ret;
  138. }
  139. /* FALLTHROUGH -- it's a UDP Packet */
  140. }
  141. @@ -1571,3 +1613,9 @@
  142. EXPORT_SYMBOL(udp_proc_register);
  143. EXPORT_SYMBOL(udp_proc_unregister);
  144. #endif
  145. +
  146. +#if defined(CONFIG_IPSEC_NAT_TRAVERSAL)
  147. +EXPORT_SYMBOL(udp4_register_esp_rcvencap);
  148. +EXPORT_SYMBOL(udp4_unregister_esp_rcvencap);
  149. +#endif
  150. +