]>
Commit | Line | Data |
---|---|---|
39236c6e | 1 | /* |
fe8ab488 | 2 | * Copyright (c) 2012-2014 Apple Inc. All rights reserved. |
39236c6e A |
3 | * |
4 | * @APPLE_OSREFERENCE_LICENSE_HEADER_START@ | |
5 | * | |
6 | * This file contains Original Code and/or Modifications of Original Code | |
7 | * as defined in and that are subject to the Apple Public Source License | |
8 | * Version 2.0 (the 'License'). You may not use this file except in | |
9 | * compliance with the License. The rights granted to you under the License | |
10 | * may not be used to create, or enable the creation or redistribution of, | |
11 | * unlawful or unlicensed copies of an Apple operating system, or to | |
12 | * circumvent, violate, or enable the circumvention or violation of, any | |
13 | * terms of an Apple operating system software license agreement. | |
14 | * | |
15 | * Please obtain a copy of the License at | |
16 | * http://www.opensource.apple.com/apsl/ and read it before using this file. | |
17 | * | |
18 | * The Original Code and all software distributed under the License are | |
19 | * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER | |
20 | * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES, | |
21 | * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY, | |
22 | * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT. | |
23 | * Please see the License for the specific language governing rights and | |
24 | * limitations under the License. | |
25 | * | |
26 | * @APPLE_OSREFERENCE_LICENSE_HEADER_END@ | |
27 | */ | |
28 | ||
29 | #include <sys/systm.h> | |
30 | #include <sys/kern_control.h> | |
31 | #include <net/kpi_protocol.h> | |
32 | #include <net/kpi_interface.h> | |
33 | #include <sys/socket.h> | |
fe8ab488 | 34 | #include <sys/socketvar.h> |
39236c6e A |
35 | #include <net/if.h> |
36 | #include <net/if_types.h> | |
37 | #include <net/bpf.h> | |
38 | #include <net/if_ipsec.h> | |
39 | #include <libkern/OSMalloc.h> | |
40 | #include <libkern/OSAtomic.h> | |
41 | #include <sys/mbuf.h> | |
42 | #include <sys/sockio.h> | |
43 | #include <netinet/in.h> | |
44 | #include <netinet/ip6.h> | |
45 | #include <netinet6/in6_var.h> | |
46 | #include <netinet6/ip6_var.h> | |
47 | #include <sys/kauth.h> | |
48 | #include <netinet6/ipsec.h> | |
49 | #include <netinet6/ipsec6.h> | |
50 | #include <netinet/ip.h> | |
51 | #include <net/flowadv.h> | |
fe8ab488 | 52 | #include <net/necp.h> |
39236c6e A |
53 | |
54 | /* Kernel Control functions */ | |
55 | static errno_t ipsec_ctl_connect(kern_ctl_ref kctlref, struct sockaddr_ctl *sac, | |
56 | void **unitinfo); | |
57 | static errno_t ipsec_ctl_disconnect(kern_ctl_ref kctlref, u_int32_t unit, | |
58 | void *unitinfo); | |
59 | static errno_t ipsec_ctl_send(kern_ctl_ref kctlref, u_int32_t unit, | |
60 | void *unitinfo, mbuf_t m, int flags); | |
61 | static errno_t ipsec_ctl_getopt(kern_ctl_ref kctlref, u_int32_t unit, void *unitinfo, | |
62 | int opt, void *data, size_t *len); | |
63 | static errno_t ipsec_ctl_setopt(kern_ctl_ref kctlref, u_int32_t unit, void *unitinfo, | |
64 | int opt, void *data, size_t len); | |
65 | ||
66 | /* Network Interface functions */ | |
67 | static void ipsec_start(ifnet_t interface); | |
68 | static errno_t ipsec_output(ifnet_t interface, mbuf_t data); | |
69 | static errno_t ipsec_demux(ifnet_t interface, mbuf_t data, char *frame_header, | |
70 | protocol_family_t *protocol); | |
71 | static errno_t ipsec_add_proto(ifnet_t interface, protocol_family_t protocol, | |
72 | const struct ifnet_demux_desc *demux_array, | |
73 | u_int32_t demux_count); | |
74 | static errno_t ipsec_del_proto(ifnet_t interface, protocol_family_t protocol); | |
75 | static errno_t ipsec_ioctl(ifnet_t interface, u_long cmd, void *data); | |
76 | static void ipsec_detached(ifnet_t interface); | |
77 | ||
78 | /* Protocol handlers */ | |
79 | static errno_t ipsec_attach_proto(ifnet_t interface, protocol_family_t proto); | |
80 | static errno_t ipsec_proto_input(ifnet_t interface, protocol_family_t protocol, | |
81 | mbuf_t m, char *frame_header); | |
82 | static errno_t ipsec_proto_pre_output(ifnet_t interface, protocol_family_t protocol, | |
83 | mbuf_t *packet, const struct sockaddr *dest, void *route, | |
84 | char *frame_type, char *link_layer_dest); | |
85 | ||
86 | static kern_ctl_ref ipsec_kctlref; | |
87 | static u_int32_t ipsec_family; | |
88 | static OSMallocTag ipsec_malloc_tag; | |
89 | static SInt32 ipsec_ifcount = 0; | |
90 | ||
91 | #define IPSECQ_MAXLEN 256 | |
92 | ||
93 | /* Prepend length */ | |
94 | static void* | |
95 | ipsec_alloc(size_t size) | |
96 | { | |
97 | size_t *mem = OSMalloc(size + sizeof(size_t), ipsec_malloc_tag); | |
98 | ||
99 | if (mem) { | |
100 | *mem = size + sizeof(size_t); | |
101 | mem++; | |
102 | } | |
103 | ||
104 | return (void*)mem; | |
105 | } | |
106 | ||
107 | static void | |
108 | ipsec_free(void *ptr) | |
109 | { | |
110 | size_t *size = ptr; | |
111 | size--; | |
112 | OSFree(size, *size, ipsec_malloc_tag); | |
113 | } | |
114 | ||
115 | errno_t | |
116 | ipsec_register_control(void) | |
117 | { | |
118 | struct kern_ctl_reg kern_ctl; | |
119 | errno_t result = 0; | |
120 | ||
121 | /* Create a tag to allocate memory */ | |
122 | ipsec_malloc_tag = OSMalloc_Tagalloc(IPSEC_CONTROL_NAME, OSMT_DEFAULT); | |
123 | ||
124 | /* Find a unique value for our interface family */ | |
125 | result = mbuf_tag_id_find(IPSEC_CONTROL_NAME, &ipsec_family); | |
126 | if (result != 0) { | |
127 | printf("ipsec_register_control - mbuf_tag_id_find_internal failed: %d\n", result); | |
128 | return result; | |
129 | } | |
130 | ||
131 | bzero(&kern_ctl, sizeof(kern_ctl)); | |
fe8ab488 | 132 | strlcpy(kern_ctl.ctl_name, IPSEC_CONTROL_NAME, sizeof(kern_ctl.ctl_name)); |
39236c6e A |
133 | kern_ctl.ctl_name[sizeof(kern_ctl.ctl_name) - 1] = 0; |
134 | kern_ctl.ctl_flags = CTL_FLAG_PRIVILEGED; /* Require root */ | |
135 | kern_ctl.ctl_sendsize = 64 * 1024; | |
136 | kern_ctl.ctl_recvsize = 64 * 1024; | |
137 | kern_ctl.ctl_connect = ipsec_ctl_connect; | |
138 | kern_ctl.ctl_disconnect = ipsec_ctl_disconnect; | |
139 | kern_ctl.ctl_send = ipsec_ctl_send; | |
140 | kern_ctl.ctl_setopt = ipsec_ctl_setopt; | |
141 | kern_ctl.ctl_getopt = ipsec_ctl_getopt; | |
142 | ||
143 | result = ctl_register(&kern_ctl, &ipsec_kctlref); | |
144 | if (result != 0) { | |
145 | printf("ipsec_register_control - ctl_register failed: %d\n", result); | |
146 | return result; | |
147 | } | |
148 | ||
149 | /* Register the protocol plumbers */ | |
150 | if ((result = proto_register_plumber(PF_INET, ipsec_family, | |
151 | ipsec_attach_proto, NULL)) != 0) { | |
152 | printf("ipsec_register_control - proto_register_plumber(PF_INET, %d) failed: %d\n", | |
153 | ipsec_family, result); | |
154 | ctl_deregister(ipsec_kctlref); | |
155 | return result; | |
156 | } | |
157 | ||
158 | /* Register the protocol plumbers */ | |
159 | if ((result = proto_register_plumber(PF_INET6, ipsec_family, | |
160 | ipsec_attach_proto, NULL)) != 0) { | |
161 | proto_unregister_plumber(PF_INET, ipsec_family); | |
162 | ctl_deregister(ipsec_kctlref); | |
163 | printf("ipsec_register_control - proto_register_plumber(PF_INET6, %d) failed: %d\n", | |
164 | ipsec_family, result); | |
165 | return result; | |
166 | } | |
167 | ||
168 | return 0; | |
169 | } | |
170 | ||
171 | /* Helpers */ | |
172 | int | |
173 | ipsec_interface_isvalid (ifnet_t interface) | |
174 | { | |
175 | struct ipsec_pcb *pcb = NULL; | |
176 | ||
177 | if (interface == NULL) | |
178 | return 0; | |
179 | ||
180 | pcb = ifnet_softc(interface); | |
181 | ||
182 | if (pcb == NULL) | |
183 | return 0; | |
184 | ||
185 | /* When ctl disconnects, ipsec_unit is set to 0 */ | |
186 | if (pcb->ipsec_unit == 0) | |
187 | return 0; | |
188 | ||
189 | return 1; | |
190 | } | |
191 | ||
192 | /* Kernel control functions */ | |
193 | ||
194 | static errno_t | |
195 | ipsec_ctl_connect(kern_ctl_ref kctlref, | |
196 | struct sockaddr_ctl *sac, | |
197 | void **unitinfo) | |
198 | { | |
199 | struct ifnet_init_eparams ipsec_init; | |
200 | struct ipsec_pcb *pcb; | |
201 | errno_t result; | |
202 | struct ifnet_stats_param stats; | |
203 | ||
204 | /* kernel control allocates, interface frees */ | |
205 | pcb = ipsec_alloc(sizeof(*pcb)); | |
206 | if (pcb == NULL) | |
207 | return ENOMEM; | |
208 | ||
209 | /* Setup the protocol control block */ | |
210 | bzero(pcb, sizeof(*pcb)); | |
211 | *unitinfo = pcb; | |
212 | pcb->ipsec_ctlref = kctlref; | |
213 | pcb->ipsec_unit = sac->sc_unit; | |
fe8ab488 | 214 | pcb->ipsec_output_service_class = MBUF_SC_OAM; |
39236c6e A |
215 | |
216 | printf("ipsec_ctl_connect: creating interface ipsec%d\n", pcb->ipsec_unit - 1); | |
217 | ||
218 | /* Create the interface */ | |
219 | bzero(&ipsec_init, sizeof(ipsec_init)); | |
220 | ipsec_init.ver = IFNET_INIT_CURRENT_VERSION; | |
221 | ipsec_init.len = sizeof (ipsec_init); | |
222 | ipsec_init.name = "ipsec"; | |
fe8ab488 | 223 | ipsec_init.start = ipsec_start; |
39236c6e A |
224 | ipsec_init.unit = pcb->ipsec_unit - 1; |
225 | ipsec_init.family = ipsec_family; | |
226 | ipsec_init.type = IFT_OTHER; | |
227 | ipsec_init.demux = ipsec_demux; | |
228 | ipsec_init.add_proto = ipsec_add_proto; | |
229 | ipsec_init.del_proto = ipsec_del_proto; | |
230 | ipsec_init.softc = pcb; | |
231 | ipsec_init.ioctl = ipsec_ioctl; | |
232 | ipsec_init.detach = ipsec_detached; | |
233 | ||
234 | result = ifnet_allocate_extended(&ipsec_init, &pcb->ipsec_ifp); | |
235 | if (result != 0) { | |
236 | printf("ipsec_ctl_connect - ifnet_allocate failed: %d\n", result); | |
237 | ipsec_free(pcb); | |
238 | return result; | |
239 | } | |
240 | OSIncrementAtomic(&ipsec_ifcount); | |
241 | ||
242 | /* Set flags and additional information. */ | |
243 | ifnet_set_mtu(pcb->ipsec_ifp, 1500); | |
244 | ifnet_set_flags(pcb->ipsec_ifp, IFF_UP | IFF_MULTICAST | IFF_POINTOPOINT, 0xffff); | |
245 | ||
246 | /* The interface must generate its own IPv6 LinkLocal address, | |
247 | * if possible following the recommendation of RFC2472 to the 64bit interface ID | |
248 | */ | |
249 | ifnet_set_eflags(pcb->ipsec_ifp, IFEF_NOAUTOIPV6LL, IFEF_NOAUTOIPV6LL); | |
250 | ||
251 | /* Reset the stats in case as the interface may have been recycled */ | |
252 | bzero(&stats, sizeof(struct ifnet_stats_param)); | |
253 | ifnet_set_stat(pcb->ipsec_ifp, &stats); | |
254 | ||
255 | /* Attach the interface */ | |
256 | result = ifnet_attach(pcb->ipsec_ifp, NULL); | |
257 | if (result != 0) { | |
258 | printf("ipsec_ctl_connect - ifnet_allocate failed: %d\n", result); | |
259 | ifnet_release(pcb->ipsec_ifp); | |
260 | ipsec_free(pcb); | |
261 | } | |
262 | ||
263 | /* Attach to bpf */ | |
264 | if (result == 0) | |
265 | bpfattach(pcb->ipsec_ifp, DLT_NULL, 4); | |
266 | ||
267 | /* The interfaces resoures allocated, mark it as running */ | |
268 | if (result == 0) | |
269 | ifnet_set_flags(pcb->ipsec_ifp, IFF_RUNNING, IFF_RUNNING); | |
270 | ||
271 | return result; | |
272 | } | |
273 | ||
274 | static errno_t | |
275 | ipsec_detach_ip(ifnet_t interface, | |
276 | protocol_family_t protocol, | |
277 | socket_t pf_socket) | |
278 | { | |
279 | errno_t result = EPROTONOSUPPORT; | |
280 | ||
281 | /* Attempt a detach */ | |
282 | if (protocol == PF_INET) { | |
283 | struct ifreq ifr; | |
284 | ||
285 | bzero(&ifr, sizeof(ifr)); | |
286 | snprintf(ifr.ifr_name, sizeof(ifr.ifr_name), "%s%d", | |
287 | ifnet_name(interface), ifnet_unit(interface)); | |
288 | ||
289 | result = sock_ioctl(pf_socket, SIOCPROTODETACH, &ifr); | |
290 | } | |
291 | else if (protocol == PF_INET6) { | |
292 | struct in6_ifreq ifr6; | |
293 | ||
294 | bzero(&ifr6, sizeof(ifr6)); | |
295 | snprintf(ifr6.ifr_name, sizeof(ifr6.ifr_name), "%s%d", | |
296 | ifnet_name(interface), ifnet_unit(interface)); | |
297 | ||
298 | result = sock_ioctl(pf_socket, SIOCPROTODETACH_IN6, &ifr6); | |
299 | } | |
300 | ||
301 | return result; | |
302 | } | |
303 | ||
304 | static void | |
305 | ipsec_remove_address(ifnet_t interface, | |
306 | protocol_family_t protocol, | |
307 | ifaddr_t address, | |
308 | socket_t pf_socket) | |
309 | { | |
310 | errno_t result = 0; | |
311 | ||
312 | /* Attempt a detach */ | |
313 | if (protocol == PF_INET) { | |
314 | struct ifreq ifr; | |
315 | ||
316 | bzero(&ifr, sizeof(ifr)); | |
317 | snprintf(ifr.ifr_name, sizeof(ifr.ifr_name), "%s%d", | |
318 | ifnet_name(interface), ifnet_unit(interface)); | |
319 | result = ifaddr_address(address, &ifr.ifr_addr, sizeof(ifr.ifr_addr)); | |
320 | if (result != 0) { | |
321 | printf("ipsec_remove_address - ifaddr_address failed: %d", result); | |
322 | } | |
323 | else { | |
324 | result = sock_ioctl(pf_socket, SIOCDIFADDR, &ifr); | |
325 | if (result != 0) { | |
326 | printf("ipsec_remove_address - SIOCDIFADDR failed: %d", result); | |
327 | } | |
328 | } | |
329 | } | |
330 | else if (protocol == PF_INET6) { | |
331 | struct in6_ifreq ifr6; | |
332 | ||
333 | bzero(&ifr6, sizeof(ifr6)); | |
334 | snprintf(ifr6.ifr_name, sizeof(ifr6.ifr_name), "%s%d", | |
335 | ifnet_name(interface), ifnet_unit(interface)); | |
336 | result = ifaddr_address(address, (struct sockaddr*)&ifr6.ifr_addr, | |
337 | sizeof(ifr6.ifr_addr)); | |
338 | if (result != 0) { | |
339 | printf("ipsec_remove_address - ifaddr_address failed (v6): %d", | |
340 | result); | |
341 | } | |
342 | else { | |
343 | result = sock_ioctl(pf_socket, SIOCDIFADDR_IN6, &ifr6); | |
344 | if (result != 0) { | |
345 | printf("ipsec_remove_address - SIOCDIFADDR_IN6 failed: %d", | |
346 | result); | |
347 | } | |
348 | } | |
349 | } | |
350 | } | |
351 | ||
352 | static void | |
353 | ipsec_cleanup_family(ifnet_t interface, | |
354 | protocol_family_t protocol) | |
355 | { | |
356 | errno_t result = 0; | |
357 | socket_t pf_socket = NULL; | |
358 | ifaddr_t *addresses = NULL; | |
359 | int i; | |
360 | ||
361 | if (protocol != PF_INET && protocol != PF_INET6) { | |
362 | printf("ipsec_cleanup_family - invalid protocol family %d\n", protocol); | |
363 | return; | |
364 | } | |
365 | ||
366 | /* Create a socket for removing addresses and detaching the protocol */ | |
367 | result = sock_socket(protocol, SOCK_DGRAM, 0, NULL, NULL, &pf_socket); | |
368 | if (result != 0) { | |
369 | if (result != EAFNOSUPPORT) | |
370 | printf("ipsec_cleanup_family - failed to create %s socket: %d\n", | |
371 | protocol == PF_INET ? "IP" : "IPv6", result); | |
372 | goto cleanup; | |
373 | } | |
374 | ||
375 | /* always set SS_PRIV, we want to close and detach regardless */ | |
376 | sock_setpriv(pf_socket, 1); | |
377 | ||
378 | result = ipsec_detach_ip(interface, protocol, pf_socket); | |
379 | if (result == 0 || result == ENXIO) { | |
380 | /* We are done! We either detached or weren't attached. */ | |
381 | goto cleanup; | |
382 | } | |
383 | else if (result != EBUSY) { | |
384 | /* Uh, not really sure what happened here... */ | |
385 | printf("ipsec_cleanup_family - ipsec_detach_ip failed: %d\n", result); | |
386 | goto cleanup; | |
387 | } | |
388 | ||
389 | /* | |
390 | * At this point, we received an EBUSY error. This means there are | |
391 | * addresses attached. We should detach them and then try again. | |
392 | */ | |
393 | result = ifnet_get_address_list_family(interface, &addresses, protocol); | |
394 | if (result != 0) { | |
395 | printf("fnet_get_address_list_family(%s%d, 0xblah, %s) - failed: %d\n", | |
396 | ifnet_name(interface), ifnet_unit(interface), | |
397 | protocol == PF_INET ? "PF_INET" : "PF_INET6", result); | |
398 | goto cleanup; | |
399 | } | |
400 | ||
401 | for (i = 0; addresses[i] != 0; i++) { | |
402 | ipsec_remove_address(interface, protocol, addresses[i], pf_socket); | |
403 | } | |
404 | ifnet_free_address_list(addresses); | |
405 | addresses = NULL; | |
406 | ||
407 | /* | |
408 | * The addresses should be gone, we should try the remove again. | |
409 | */ | |
410 | result = ipsec_detach_ip(interface, protocol, pf_socket); | |
411 | if (result != 0 && result != ENXIO) { | |
412 | printf("ipsec_cleanup_family - ipsec_detach_ip failed: %d\n", result); | |
413 | } | |
414 | ||
415 | cleanup: | |
416 | if (pf_socket != NULL) | |
417 | sock_close(pf_socket); | |
418 | ||
419 | if (addresses != NULL) | |
420 | ifnet_free_address_list(addresses); | |
421 | } | |
422 | ||
423 | static errno_t | |
424 | ipsec_ctl_disconnect(__unused kern_ctl_ref kctlref, | |
425 | __unused u_int32_t unit, | |
426 | void *unitinfo) | |
427 | { | |
428 | struct ipsec_pcb *pcb = unitinfo; | |
429 | ifnet_t ifp = pcb->ipsec_ifp; | |
430 | errno_t result = 0; | |
431 | ||
432 | pcb->ipsec_ctlref = NULL; | |
433 | pcb->ipsec_unit = 0; | |
434 | ||
435 | /* | |
436 | * We want to do everything in our power to ensure that the interface | |
437 | * really goes away when the socket is closed. We must remove IP/IPv6 | |
438 | * addresses and detach the protocols. Finally, we can remove and | |
439 | * release the interface. | |
440 | */ | |
441 | key_delsp_for_ipsec_if(ifp); | |
442 | ||
443 | ipsec_cleanup_family(ifp, AF_INET); | |
444 | ipsec_cleanup_family(ifp, AF_INET6); | |
445 | ||
446 | if ((result = ifnet_detach(ifp)) != 0) { | |
447 | printf("ipsec_ctl_disconnect - ifnet_detach failed: %d\n", result); | |
448 | } | |
449 | ||
450 | return 0; | |
451 | } | |
452 | ||
453 | static errno_t | |
454 | ipsec_ctl_send(__unused kern_ctl_ref kctlref, | |
455 | __unused u_int32_t unit, | |
456 | __unused void *unitinfo, | |
457 | mbuf_t m, | |
458 | __unused int flags) | |
459 | { | |
460 | /* Receive messages from the control socket. Currently unused. */ | |
461 | mbuf_freem(m); | |
462 | return 0; | |
463 | } | |
464 | ||
465 | static errno_t | |
466 | ipsec_ctl_setopt(__unused kern_ctl_ref kctlref, | |
467 | __unused u_int32_t unit, | |
468 | void *unitinfo, | |
469 | int opt, | |
470 | void *data, | |
471 | size_t len) | |
472 | { | |
473 | struct ipsec_pcb *pcb = unitinfo; | |
474 | errno_t result = 0; | |
475 | ||
476 | /* check for privileges for privileged options */ | |
477 | switch (opt) { | |
478 | case IPSEC_OPT_FLAGS: | |
479 | case IPSEC_OPT_EXT_IFDATA_STATS: | |
480 | case IPSEC_OPT_SET_DELEGATE_INTERFACE: | |
fe8ab488 | 481 | case IPSEC_OPT_OUTPUT_TRAFFIC_CLASS: |
39236c6e A |
482 | if (kauth_cred_issuser(kauth_cred_get()) == 0) { |
483 | return EPERM; | |
484 | } | |
485 | break; | |
486 | } | |
487 | ||
488 | switch (opt) { | |
489 | case IPSEC_OPT_FLAGS: | |
490 | if (len != sizeof(u_int32_t)) | |
491 | result = EMSGSIZE; | |
492 | else | |
493 | pcb->ipsec_flags = *(u_int32_t *)data; | |
494 | break; | |
495 | ||
496 | case IPSEC_OPT_EXT_IFDATA_STATS: | |
497 | if (len != sizeof(int)) { | |
498 | result = EMSGSIZE; | |
499 | break; | |
500 | } | |
501 | pcb->ipsec_ext_ifdata_stats = (*(int *)data) ? 1 : 0; | |
502 | break; | |
503 | ||
504 | case IPSEC_OPT_INC_IFDATA_STATS_IN: | |
505 | case IPSEC_OPT_INC_IFDATA_STATS_OUT: { | |
506 | struct ipsec_stats_param *utsp = (struct ipsec_stats_param *)data; | |
507 | ||
508 | if (utsp == NULL || len < sizeof(struct ipsec_stats_param)) { | |
509 | result = EINVAL; | |
510 | break; | |
511 | } | |
512 | if (!pcb->ipsec_ext_ifdata_stats) { | |
513 | result = EINVAL; | |
514 | break; | |
515 | } | |
516 | if (opt == IPSEC_OPT_INC_IFDATA_STATS_IN) | |
517 | ifnet_stat_increment_in(pcb->ipsec_ifp, utsp->utsp_packets, | |
518 | utsp->utsp_bytes, utsp->utsp_errors); | |
519 | else | |
520 | ifnet_stat_increment_out(pcb->ipsec_ifp, utsp->utsp_packets, | |
521 | utsp->utsp_bytes, utsp->utsp_errors); | |
522 | break; | |
523 | } | |
524 | ||
525 | case IPSEC_OPT_SET_DELEGATE_INTERFACE: { | |
526 | ifnet_t del_ifp = NULL; | |
527 | char name[IFNAMSIZ]; | |
528 | ||
529 | if (len > IFNAMSIZ - 1) { | |
530 | result = EMSGSIZE; | |
531 | break; | |
532 | } | |
533 | if (len != 0) { /* if len==0, del_ifp will be NULL causing the delegate to be removed */ | |
534 | bcopy(data, name, len); | |
535 | name[len] = 0; | |
536 | result = ifnet_find_by_name(name, &del_ifp); | |
537 | } | |
538 | if (result == 0) { | |
539 | result = ifnet_set_delegate(pcb->ipsec_ifp, del_ifp); | |
540 | if (del_ifp) | |
541 | ifnet_release(del_ifp); | |
542 | } | |
543 | break; | |
544 | } | |
545 | ||
fe8ab488 A |
546 | case IPSEC_OPT_OUTPUT_TRAFFIC_CLASS: { |
547 | if (len != sizeof(int)) { | |
548 | result = EMSGSIZE; | |
549 | break; | |
550 | } | |
551 | mbuf_svc_class_t output_service_class = so_tc2msc(*(int *)data); | |
552 | if (output_service_class == MBUF_SC_UNSPEC) { | |
553 | pcb->ipsec_output_service_class = MBUF_SC_OAM; | |
554 | } else { | |
555 | pcb->ipsec_output_service_class = output_service_class; | |
556 | } | |
557 | break; | |
558 | } | |
559 | ||
39236c6e A |
560 | default: |
561 | result = ENOPROTOOPT; | |
562 | break; | |
563 | } | |
564 | ||
565 | return result; | |
566 | } | |
567 | ||
568 | static errno_t | |
569 | ipsec_ctl_getopt(__unused kern_ctl_ref kctlref, | |
570 | __unused u_int32_t unit, | |
571 | void *unitinfo, | |
572 | int opt, | |
573 | void *data, | |
574 | size_t *len) | |
575 | { | |
576 | struct ipsec_pcb *pcb = unitinfo; | |
577 | errno_t result = 0; | |
578 | ||
579 | switch (opt) { | |
580 | case IPSEC_OPT_FLAGS: | |
581 | if (*len != sizeof(u_int32_t)) | |
582 | result = EMSGSIZE; | |
583 | else | |
584 | *(u_int32_t *)data = pcb->ipsec_flags; | |
585 | break; | |
586 | ||
587 | case IPSEC_OPT_EXT_IFDATA_STATS: | |
588 | if (*len != sizeof(int)) | |
589 | result = EMSGSIZE; | |
590 | else | |
591 | *(int *)data = (pcb->ipsec_ext_ifdata_stats) ? 1 : 0; | |
592 | break; | |
593 | ||
594 | case IPSEC_OPT_IFNAME: | |
595 | *len = snprintf(data, *len, "%s%d", ifnet_name(pcb->ipsec_ifp), ifnet_unit(pcb->ipsec_ifp)) + 1; | |
596 | break; | |
597 | ||
fe8ab488 A |
598 | case IPSEC_OPT_OUTPUT_TRAFFIC_CLASS: { |
599 | if (*len != sizeof(int)) { | |
600 | result = EMSGSIZE; | |
601 | break; | |
602 | } | |
603 | *(int *)data = so_svc2tc(pcb->ipsec_output_service_class); | |
604 | break; | |
605 | } | |
39236c6e A |
606 | default: |
607 | result = ENOPROTOOPT; | |
608 | break; | |
609 | } | |
610 | ||
611 | return result; | |
612 | } | |
613 | ||
614 | /* Network Interface functions */ | |
615 | static errno_t | |
616 | ipsec_output(ifnet_t interface, | |
617 | mbuf_t data) | |
618 | { | |
619 | struct ipsec_pcb *pcb = ifnet_softc(interface); | |
620 | struct ipsec_output_state ipsec_state; | |
621 | struct route ro; | |
622 | struct route_in6 ro6; | |
623 | int length; | |
624 | struct ip *ip; | |
625 | struct ip6_hdr *ip6; | |
39236c6e A |
626 | struct ip_out_args ipoa; |
627 | struct ip6_out_args ip6oa; | |
628 | int error = 0; | |
629 | u_int ip_version = 0; | |
630 | uint32_t af; | |
fe8ab488 | 631 | int flags = 0; |
39236c6e A |
632 | struct flowadv *adv = NULL; |
633 | ||
fe8ab488 A |
634 | // Make sure this packet isn't looping through the interface |
635 | if (necp_get_last_interface_index_from_packet(data) == interface->if_index) { | |
636 | error = -1; | |
637 | goto ipsec_output_err; | |
638 | } | |
639 | ||
640 | // Mark the interface so NECP can evaluate tunnel policy | |
641 | necp_mark_packet_from_interface(data, interface); | |
39236c6e | 642 | |
39236c6e A |
643 | ip = mtod(data, struct ip *); |
644 | ip_version = ip->ip_v; | |
fe8ab488 | 645 | |
39236c6e A |
646 | switch (ip_version) { |
647 | case 4: | |
648 | /* Tap */ | |
649 | af = AF_INET; | |
650 | bpf_tap_out(pcb->ipsec_ifp, DLT_NULL, data, &af, sizeof(af)); | |
651 | ||
652 | /* Apply encryption */ | |
653 | bzero(&ipsec_state, sizeof(ipsec_state)); | |
654 | ipsec_state.m = data; | |
fe8ab488 | 655 | ipsec_state.dst = (struct sockaddr *)&ip->ip_dst; |
39236c6e A |
656 | bzero(&ipsec_state.ro, sizeof(ipsec_state.ro)); |
657 | ||
fe8ab488 | 658 | error = ipsec4_interface_output(&ipsec_state, interface); |
39236c6e A |
659 | data = ipsec_state.m; |
660 | if (error || data == NULL) { | |
fe8ab488 | 661 | printf("ipsec_output: ipsec4_output error %d.\n", error); |
39236c6e A |
662 | goto ipsec_output_err; |
663 | } | |
664 | ||
fe8ab488 A |
665 | /* Set traffic class, set flow */ |
666 | m_set_service_class(data, pcb->ipsec_output_service_class); | |
39236c6e A |
667 | data->m_pkthdr.pkt_flowsrc = FLOWSRC_IFNET; |
668 | data->m_pkthdr.pkt_flowid = interface->if_flowhash; | |
669 | data->m_pkthdr.pkt_proto = ip->ip_p; | |
670 | data->m_pkthdr.pkt_flags = (PKTF_FLOW_ID | PKTF_FLOW_ADV | PKTF_FLOW_LOCALSRC); | |
671 | ||
672 | /* Flip endian-ness for ip_output */ | |
673 | ip = mtod(data, struct ip *); | |
674 | NTOHS(ip->ip_len); | |
675 | NTOHS(ip->ip_off); | |
676 | ||
677 | /* Increment statistics */ | |
678 | length = mbuf_pkthdr_len(data); | |
679 | ifnet_stat_increment_out(interface, 1, length, 0); | |
680 | ||
681 | /* Send to ip_output */ | |
682 | bzero(&ro, sizeof(ro)); | |
683 | ||
fe8ab488 A |
684 | flags = IP_OUTARGS | /* Passing out args to specify interface */ |
685 | IP_NOIPSEC; /* To ensure the packet doesn't go through ipsec twice */ | |
39236c6e A |
686 | |
687 | bzero(&ipoa, sizeof(ipoa)); | |
688 | ipoa.ipoa_flowadv.code = 0; | |
689 | ipoa.ipoa_flags = IPOAF_SELECT_SRCIF | IPOAF_BOUND_SRCADDR; | |
fe8ab488 A |
690 | if (ipsec_state.outgoing_if) { |
691 | ipoa.ipoa_boundif = ipsec_state.outgoing_if; | |
39236c6e A |
692 | ipoa.ipoa_flags |= IPOAF_BOUND_IF; |
693 | } | |
694 | ||
695 | adv = &ipoa.ipoa_flowadv; | |
696 | ||
697 | (void) ip_output(data, NULL, &ro, flags, NULL, &ipoa); | |
698 | data = NULL; | |
699 | ||
700 | if (adv->code == FADV_FLOW_CONTROLLED || adv->code == FADV_SUSPENDED) { | |
701 | error = ENOBUFS; | |
702 | ifnet_disable_output(interface); | |
703 | } | |
704 | ||
705 | goto done; | |
706 | case 6: | |
707 | af = AF_INET6; | |
708 | bpf_tap_out(pcb->ipsec_ifp, DLT_NULL, data, &af, sizeof(af)); | |
709 | ||
fe8ab488 | 710 | data = ipsec6_splithdr(data); |
39236c6e | 711 | ip6 = mtod(data, struct ip6_hdr *); |
fe8ab488 A |
712 | |
713 | bzero(&ipsec_state, sizeof(ipsec_state)); | |
714 | ipsec_state.m = data; | |
715 | ipsec_state.dst = (struct sockaddr *)&ip6->ip6_dst; | |
716 | bzero(&ipsec_state.ro, sizeof(ipsec_state.ro)); | |
39236c6e | 717 | |
fe8ab488 A |
718 | error = ipsec6_interface_output(&ipsec_state, interface, &ip6->ip6_nxt, ipsec_state.m); |
719 | if (error == 0 && ipsec_state.tunneled == 4) /* tunneled in IPv4 - packet is gone */ | |
720 | goto done; | |
39236c6e A |
721 | data = ipsec_state.m; |
722 | if (error || data == NULL) { | |
fe8ab488 | 723 | printf("ipsec_output: ipsec6_output error %d.\n", error); |
39236c6e A |
724 | goto ipsec_output_err; |
725 | } | |
726 | ||
fe8ab488 A |
727 | /* Set traffic class, set flow */ |
728 | m_set_service_class(data, pcb->ipsec_output_service_class); | |
39236c6e A |
729 | data->m_pkthdr.pkt_flowsrc = FLOWSRC_IFNET; |
730 | data->m_pkthdr.pkt_flowid = interface->if_flowhash; | |
fe8ab488 | 731 | data->m_pkthdr.pkt_proto = ip6->ip6_nxt; |
39236c6e A |
732 | data->m_pkthdr.pkt_flags = (PKTF_FLOW_ID | PKTF_FLOW_ADV | PKTF_FLOW_LOCALSRC); |
733 | ||
734 | /* Increment statistics */ | |
735 | length = mbuf_pkthdr_len(data); | |
736 | ifnet_stat_increment_out(interface, 1, length, 0); | |
737 | ||
738 | /* Send to ip6_output */ | |
739 | bzero(&ro6, sizeof(ro6)); | |
740 | ||
741 | flags = IPV6_OUTARGS; | |
742 | ||
39236c6e A |
743 | bzero(&ip6oa, sizeof(ip6oa)); |
744 | ip6oa.ip6oa_flowadv.code = 0; | |
745 | ip6oa.ip6oa_flags = IPOAF_SELECT_SRCIF | IPOAF_BOUND_SRCADDR; | |
fe8ab488 A |
746 | if (ipsec_state.outgoing_if) { |
747 | ip6oa.ip6oa_boundif = ipsec_state.outgoing_if; | |
39236c6e A |
748 | ip6oa.ip6oa_flags |= IPOAF_BOUND_IF; |
749 | } | |
750 | ||
751 | adv = &ip6oa.ip6oa_flowadv; | |
752 | ||
753 | (void) ip6_output(data, NULL, &ro6, flags, NULL, NULL, &ip6oa); | |
754 | data = NULL; | |
755 | ||
756 | if (adv->code == FADV_FLOW_CONTROLLED || adv->code == FADV_SUSPENDED) { | |
757 | error = ENOBUFS; | |
758 | ifnet_disable_output(interface); | |
759 | } | |
760 | ||
761 | goto done; | |
762 | default: | |
763 | printf("ipsec_output: Received unknown packet version %d.\n", ip_version); | |
764 | error = -1; | |
765 | goto ipsec_output_err; | |
766 | } | |
767 | ||
768 | done: | |
39236c6e A |
769 | return error; |
770 | ||
771 | ipsec_output_err: | |
772 | if (data) | |
773 | mbuf_freem(data); | |
774 | goto done; | |
775 | } | |
776 | ||
777 | static void | |
778 | ipsec_start(ifnet_t interface) | |
779 | { | |
fe8ab488 A |
780 | mbuf_t data; |
781 | ||
782 | for (;;) { | |
783 | if (ifnet_dequeue(interface, &data) != 0) | |
784 | break; | |
785 | if (ipsec_output(interface, data) != 0) | |
786 | break; | |
787 | } | |
39236c6e A |
788 | } |
789 | ||
790 | /* Network Interface functions */ | |
791 | static errno_t | |
792 | ipsec_demux(__unused ifnet_t interface, | |
793 | mbuf_t data, | |
794 | __unused char *frame_header, | |
795 | protocol_family_t *protocol) | |
796 | { | |
797 | struct ip *ip; | |
798 | u_int ip_version; | |
799 | ||
800 | while (data != NULL && mbuf_len(data) < 1) { | |
801 | data = mbuf_next(data); | |
802 | } | |
803 | ||
804 | if (data == NULL) | |
805 | return ENOENT; | |
806 | ||
807 | ip = mtod(data, struct ip *); | |
808 | ip_version = ip->ip_v; | |
809 | ||
810 | switch(ip_version) { | |
811 | case 4: | |
812 | *protocol = PF_INET; | |
813 | return 0; | |
814 | case 6: | |
815 | *protocol = PF_INET6; | |
816 | return 0; | |
817 | default: | |
818 | break; | |
819 | } | |
820 | ||
821 | return 0; | |
822 | } | |
823 | ||
824 | static errno_t | |
825 | ipsec_add_proto(__unused ifnet_t interface, | |
826 | protocol_family_t protocol, | |
827 | __unused const struct ifnet_demux_desc *demux_array, | |
828 | __unused u_int32_t demux_count) | |
829 | { | |
830 | switch(protocol) { | |
831 | case PF_INET: | |
832 | return 0; | |
833 | case PF_INET6: | |
834 | return 0; | |
835 | default: | |
836 | break; | |
837 | } | |
838 | ||
839 | return ENOPROTOOPT; | |
840 | } | |
841 | ||
842 | static errno_t | |
843 | ipsec_del_proto(__unused ifnet_t interface, | |
844 | __unused protocol_family_t protocol) | |
845 | { | |
846 | return 0; | |
847 | } | |
848 | ||
849 | static errno_t | |
850 | ipsec_ioctl(ifnet_t interface, | |
851 | u_long command, | |
852 | void *data) | |
853 | { | |
854 | errno_t result = 0; | |
855 | ||
856 | switch(command) { | |
857 | case SIOCSIFMTU: | |
858 | ifnet_set_mtu(interface, ((struct ifreq*)data)->ifr_mtu); | |
859 | break; | |
860 | ||
861 | case SIOCSIFFLAGS: | |
862 | /* ifioctl() takes care of it */ | |
863 | break; | |
864 | ||
865 | default: | |
866 | result = EOPNOTSUPP; | |
867 | } | |
868 | ||
869 | return result; | |
870 | } | |
871 | ||
872 | static void | |
873 | ipsec_detached( | |
874 | ifnet_t interface) | |
875 | { | |
876 | struct ipsec_pcb *pcb = ifnet_softc(interface); | |
877 | ||
878 | ifnet_release(pcb->ipsec_ifp); | |
879 | ipsec_free(pcb); | |
880 | ||
881 | OSDecrementAtomic(&ipsec_ifcount); | |
882 | } | |
883 | ||
884 | /* Protocol Handlers */ | |
885 | ||
886 | static errno_t | |
fe8ab488 | 887 | ipsec_proto_input(ifnet_t interface, |
39236c6e | 888 | protocol_family_t protocol, |
fe8ab488 A |
889 | mbuf_t m, |
890 | __unused char *frame_header) | |
39236c6e | 891 | { |
fe8ab488 A |
892 | struct ip *ip; |
893 | uint32_t af = 0; | |
894 | ip = mtod(m, struct ip *); | |
895 | if (ip->ip_v == 4) | |
896 | af = AF_INET; | |
897 | else if (ip->ip_v == 6) | |
898 | af = AF_INET6; | |
899 | ||
900 | mbuf_pkthdr_setrcvif(m, interface); | |
901 | bpf_tap_in(interface, DLT_NULL, m, &af, sizeof(af)); | |
902 | ||
39236c6e A |
903 | if (proto_input(protocol, m) != 0) |
904 | m_freem(m); | |
905 | ||
906 | return 0; | |
907 | } | |
908 | ||
909 | static errno_t | |
910 | ipsec_proto_pre_output(__unused ifnet_t interface, | |
911 | protocol_family_t protocol, | |
912 | __unused mbuf_t *packet, | |
913 | __unused const struct sockaddr *dest, | |
914 | __unused void *route, | |
915 | __unused char *frame_type, | |
916 | __unused char *link_layer_dest) | |
917 | { | |
918 | ||
919 | *(protocol_family_t *)(void *)frame_type = protocol; | |
920 | return 0; | |
921 | } | |
922 | ||
923 | static errno_t | |
924 | ipsec_attach_proto(ifnet_t interface, | |
925 | protocol_family_t protocol) | |
926 | { | |
927 | struct ifnet_attach_proto_param proto; | |
928 | errno_t result; | |
929 | ||
930 | bzero(&proto, sizeof(proto)); | |
931 | proto.input = ipsec_proto_input; | |
932 | proto.pre_output = ipsec_proto_pre_output; | |
933 | ||
934 | result = ifnet_attach_protocol(interface, protocol, &proto); | |
935 | if (result != 0 && result != EEXIST) { | |
936 | printf("ipsec_attach_inet - ifnet_attach_protocol %d failed: %d\n", | |
937 | protocol, result); | |
938 | } | |
939 | ||
940 | return result; | |
941 | } | |
fe8ab488 A |
942 | |
943 | errno_t | |
944 | ipsec_inject_inbound_packet(ifnet_t interface, | |
945 | mbuf_t packet) | |
946 | { | |
947 | errno_t error; | |
948 | protocol_family_t protocol; | |
949 | if ((error = ipsec_demux(interface, packet, NULL, &protocol)) != 0) { | |
950 | return error; | |
951 | } | |
952 | ||
953 | return ipsec_proto_input(interface, protocol, packet, NULL); | |
954 | } | |
955 | ||
956 | void | |
957 | ipsec_set_pkthdr_for_interface(ifnet_t interface, mbuf_t packet, int family) | |
958 | { | |
959 | if (packet != NULL && interface != NULL) { | |
960 | struct ipsec_pcb *pcb = ifnet_softc(interface); | |
961 | if (pcb != NULL) { | |
962 | /* Set traffic class, set flow */ | |
963 | m_set_service_class(packet, pcb->ipsec_output_service_class); | |
964 | packet->m_pkthdr.pkt_flowsrc = FLOWSRC_IFNET; | |
965 | packet->m_pkthdr.pkt_flowid = interface->if_flowhash; | |
966 | if (family == AF_INET) { | |
967 | struct ip *ip = mtod(packet, struct ip *); | |
968 | packet->m_pkthdr.pkt_proto = ip->ip_p; | |
969 | } else if (family == AF_INET) { | |
970 | struct ip6_hdr *ip6 = mtod(packet, struct ip6_hdr *); | |
971 | packet->m_pkthdr.pkt_proto = ip6->ip6_nxt; | |
972 | } | |
973 | packet->m_pkthdr.pkt_flags = (PKTF_FLOW_ID | PKTF_FLOW_ADV | PKTF_FLOW_LOCALSRC); | |
974 | } | |
975 | } | |
976 | } |