]> git.saurik.com Git - apple/xnu.git/blob - bsd/netinet6/esp_core.c
22ff54d80ae941ee27dc1faa46dbd04f1bf7940b
[apple/xnu.git] / bsd / netinet6 / esp_core.c
1 /* $KAME: esp_core.c,v 1.11 2000/02/22 14:04:15 itojun Exp $ */
2
3 /*
4 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions
9 * are met:
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
12 * 2. Redistributions in binary form must reproduce the above copyright
13 * notice, this list of conditions and the following disclaimer in the
14 * documentation and/or other materials provided with the distribution.
15 * 3. Neither the name of the project nor the names of its contributors
16 * may be used to endorse or promote products derived from this software
17 * without specific prior written permission.
18 *
19 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
29 * SUCH DAMAGE.
30 */
31
32 #define _IP_VHL
33 #if (defined(__FreeBSD__) && __FreeBSD__ >= 3) || defined(__NetBSD__)
34 #include "opt_inet.h"
35 #endif
36
37 #include <sys/param.h>
38 #include <sys/systm.h>
39 #include <sys/malloc.h>
40 #include <sys/mbuf.h>
41 #include <sys/domain.h>
42 #include <sys/protosw.h>
43 #include <sys/socket.h>
44 #include <sys/errno.h>
45 #include <sys/time.h>
46 #include <sys/kernel.h>
47 #include <sys/syslog.h>
48
49 #include <net/if.h>
50 #include <net/route.h>
51
52 #include <netinet/in.h>
53 #include <netinet/in_var.h>
54 #if INET6
55 #include <netinet/ip6.h>
56 #include <netinet6/ip6_var.h>
57 #include <netinet/icmp6.h>
58 #endif
59
60 #include <netinet6/ipsec.h>
61 #include <netinet6/ah.h>
62 #include <netinet6/esp.h>
63 #include <net/pfkeyv2.h>
64 #include <netkey/keydb.h>
65 #include <crypto/des/des.h>
66 #include <crypto/blowfish/blowfish.h>
67 #include <crypto/cast128/cast128.h>
68 #include <crypto/rc5/rc5.h>
69
70 #include <net/net_osdep.h>
71
72 static int esp_null_mature __P((struct secasvar *));
73 static int esp_null_ivlen __P((struct secasvar *));
74 static int esp_null_decrypt __P((struct mbuf *, size_t,
75 struct secasvar *, struct esp_algorithm *, int));
76 static int esp_null_encrypt __P((struct mbuf *, size_t, size_t,
77 struct secasvar *, struct esp_algorithm *, int));
78 static int esp_descbc_mature __P((struct secasvar *));
79 static int esp_descbc_ivlen __P((struct secasvar *));
80 static int esp_descbc_decrypt __P((struct mbuf *, size_t,
81 struct secasvar *, struct esp_algorithm *, int));
82 static int esp_descbc_encrypt __P((struct mbuf *, size_t, size_t,
83 struct secasvar *, struct esp_algorithm *, int));
84 static int esp_cbc_mature __P((struct secasvar *));
85 static int esp_blowfish_cbc_decrypt __P((struct mbuf *, size_t,
86 struct secasvar *, struct esp_algorithm *, int));
87 static int esp_blowfish_cbc_encrypt __P((struct mbuf *, size_t,
88 size_t, struct secasvar *, struct esp_algorithm *, int));
89 static int esp_blowfish_cbc_ivlen __P((struct secasvar *));
90 static int esp_cast128cbc_ivlen __P((struct secasvar *));
91 static int esp_cast128cbc_decrypt __P((struct mbuf *, size_t,
92 struct secasvar *, struct esp_algorithm *, int));
93 static int esp_cast128cbc_encrypt __P((struct mbuf *, size_t, size_t,
94 struct secasvar *, struct esp_algorithm *, int));
95 static int esp_3descbc_ivlen __P((struct secasvar *));
96 static int esp_3descbc_decrypt __P((struct mbuf *, size_t,
97 struct secasvar *, struct esp_algorithm *, int));
98 static int esp_3descbc_encrypt __P((struct mbuf *, size_t, size_t,
99 struct secasvar *, struct esp_algorithm *, int));
100 static int esp_rc5cbc_ivlen __P((struct secasvar *));
101 static int esp_rc5cbc_decrypt __P((struct mbuf *, size_t,
102 struct secasvar *, struct esp_algorithm *, int));
103 static int esp_rc5cbc_encrypt __P((struct mbuf *, size_t, size_t,
104 struct secasvar *, struct esp_algorithm *, int));
105 static void esp_increment_iv __P((struct secasvar *));
106 static caddr_t mbuf_find_offset __P((struct mbuf *, size_t, size_t));
107
108 /* NOTE: The order depends on SADB_EALG_x in netkey/keyv2.h */
109 struct esp_algorithm esp_algorithms[] = {
110 { 0, 0, 0, 0, 0, 0, 0, },
111 { 8, esp_descbc_mature, 64, 64,
112 esp_descbc_ivlen, esp_descbc_decrypt, esp_descbc_encrypt, },
113 { 8, esp_cbc_mature, 192, 192,
114 esp_3descbc_ivlen, esp_3descbc_decrypt, esp_3descbc_encrypt, },
115 { 1, esp_null_mature, 0, 2048,
116 esp_null_ivlen, esp_null_decrypt, esp_null_encrypt, },
117 { 8, esp_cbc_mature, 40, 448,
118 esp_blowfish_cbc_ivlen, esp_blowfish_cbc_decrypt,
119 esp_blowfish_cbc_encrypt, },
120 { 8, esp_cbc_mature, 40, 128,
121 esp_cast128cbc_ivlen, esp_cast128cbc_decrypt,
122 esp_cast128cbc_encrypt, },
123 { 8, esp_cbc_mature, 40, 2040,
124 esp_rc5cbc_ivlen, esp_rc5cbc_decrypt, esp_rc5cbc_encrypt, },
125 };
126
127 /*
128 * mbuf assumption: foo_encrypt() assumes that IV part is placed in a single
129 * mbuf, not across multiple mbufs.
130 */
131
132 static int
133 esp_null_mature(sav)
134 struct secasvar *sav;
135 {
136 /* anything is okay */
137 return 0;
138 }
139
140 static int
141 esp_null_ivlen(sav)
142 struct secasvar *sav;
143 {
144 return 0;
145 }
146
147 static int
148 esp_null_decrypt(m, off, sav, algo, ivlen)
149 struct mbuf *m;
150 size_t off; /* offset to ESP header */
151 struct secasvar *sav;
152 struct esp_algorithm *algo;
153 int ivlen;
154 {
155 return 0; /* do nothing */
156 }
157
158 static int
159 esp_null_encrypt(m, off, plen, sav, algo, ivlen)
160 struct mbuf *m;
161 size_t off; /* offset to ESP header */
162 size_t plen; /* payload length (to be encrypted) */
163 struct secasvar *sav;
164 struct esp_algorithm *algo;
165 int ivlen;
166 {
167 return 0; /* do nothing */
168 }
169
170 static int
171 esp_descbc_mature(sav)
172 struct secasvar *sav;
173 {
174 struct esp_algorithm *algo;
175
176 if (!(sav->flags & SADB_X_EXT_OLD) && (sav->flags & SADB_X_EXT_IV4B)) {
177 ipseclog((LOG_ERR, "esp_cbc_mature: "
178 "algorithm incompatible with 4 octets IV length\n"));
179 return 1;
180 }
181
182 if (!sav->key_enc) {
183 ipseclog((LOG_ERR, "esp_descbc_mature: no key is given.\n"));
184 return 1;
185 }
186 algo = &esp_algorithms[sav->alg_enc];
187 if (_KEYBITS(sav->key_enc) < algo->keymin
188 || algo->keymax < _KEYBITS(sav->key_enc)) {
189 ipseclog((LOG_ERR,
190 "esp_descbc_mature: invalid key length %d.\n",
191 _KEYBITS(sav->key_enc)));
192 return 1;
193 }
194
195 /* weak key check */
196 if (des_is_weak_key((C_Block *)_KEYBUF(sav->key_enc))) {
197 ipseclog((LOG_ERR,
198 "esp_descbc_mature: weak key was passed.\n"));
199 return 1;
200 }
201
202 return 0;
203 }
204
205 static int
206 esp_descbc_ivlen(sav)
207 struct secasvar *sav;
208 {
209 if (sav && (sav->flags & SADB_X_EXT_OLD) && (sav->flags & SADB_X_EXT_IV4B))
210 return 4;
211
212 if (sav && !(sav->flags & SADB_X_EXT_OLD) && (sav->flags & SADB_X_EXT_DERIV))
213 return 4;
214 else
215 return 8;
216 }
217
218 static int
219 esp_descbc_decrypt(m, off, sav, algo, ivlen)
220 struct mbuf *m;
221 size_t off; /* offset to ESP header */
222 struct secasvar *sav;
223 struct esp_algorithm *algo;
224 int ivlen;
225 {
226 size_t ivoff = 0;
227 size_t bodyoff = 0;
228 u_int8_t *iv;
229 size_t plen;
230 u_int8_t tiv[8];
231 int derived;
232
233 derived = 0;
234 /* sanity check */
235 if (ivlen != sav->ivlen) {
236 ipseclog((LOG_ERR, "esp_descbc_decrypt: bad ivlen %d/%d\n",
237 ivlen, sav->ivlen));
238 return EINVAL;
239 }
240 if (_KEYBITS(sav->key_enc) < algo->keymin
241 || algo->keymax < _KEYBITS(sav->key_enc)) {
242 ipseclog((LOG_ERR, "esp_descbc_decrypt: bad keylen %d\n",
243 _KEYBITS(sav->key_enc)));
244 return EINVAL;
245 }
246
247 if (sav->flags & SADB_X_EXT_OLD) {
248 /* RFC 1827 */
249 ivoff = off + sizeof(struct esp);
250 bodyoff = off + sizeof(struct esp) + ivlen;
251 derived = 0;
252 } else {
253 /* RFC 2406 */
254 if (sav->flags & SADB_X_EXT_DERIV) {
255 /*
256 * draft-ietf-ipsec-ciph-des-derived-00.txt
257 * uses sequence number field as IV field.
258 * This draft has been deleted, but you can get from
259 * ftp://ftp.kame.net/pub/internet-drafts/.
260 */
261 ivoff = off + sizeof(struct esp);
262 bodyoff = off + sizeof(struct esp) + sizeof(u_int32_t);
263 ivlen = sizeof(u_int32_t);
264 derived = 1;
265 } else {
266 ivoff = off + sizeof(struct newesp);
267 bodyoff = off + sizeof(struct newesp) + ivlen;
268 derived = 0;
269 }
270 }
271 if (ivlen == 4) {
272 iv = &tiv[0];
273 m_copydata(m, ivoff, 4, &tiv[0]);
274 m_copydata(m, ivoff, 4, &tiv[4]);
275 tiv[4] ^= 0xff;
276 tiv[5] ^= 0xff;
277 tiv[6] ^= 0xff;
278 tiv[7] ^= 0xff;
279 } else if (ivlen == 8) {
280 iv = &tiv[0];
281 m_copydata(m, ivoff, 8, &tiv[0]);
282 } else {
283 ipseclog((LOG_ERR, "esp_descbc_decrypt: unsupported ivlen %d\n",
284 ivlen));
285 return EINVAL;
286 }
287
288 plen = m->m_pkthdr.len;
289 if (plen < bodyoff)
290 panic("esp_descbc_decrypt: too short packet: len=%lu",
291 (u_long)plen);
292 plen -= bodyoff;
293
294 if (plen % 8) {
295 ipseclog((LOG_ERR, "esp_descbc_decrypt: "
296 "payload length must be multiple of 8\n"));
297 return EINVAL;
298 }
299
300 {
301 int deserr;
302 des_key_schedule ks;
303
304 deserr = des_key_sched((C_Block *)_KEYBUF(sav->key_enc), ks);
305 if (deserr != 0) {
306 ipseclog((LOG_ERR,
307 "esp_descbc_decrypt: key error %d\n", deserr));
308 return EINVAL;
309 }
310
311 des_cbc_encrypt(m, bodyoff, plen, ks, (C_Block *)iv, DES_DECRYPT);
312
313 /* for safety */
314 bzero(&ks, sizeof(des_key_schedule));
315 }
316
317 /* for safety */
318 bzero(&tiv[0], sizeof(tiv));
319
320 return 0;
321 }
322
323 static int
324 esp_descbc_encrypt(m, off, plen, sav, algo, ivlen)
325 struct mbuf *m;
326 size_t off; /* offset to ESP header */
327 size_t plen; /* payload length (to be decrypted) */
328 struct secasvar *sav;
329 struct esp_algorithm *algo;
330 int ivlen;
331 {
332 size_t ivoff = 0;
333 size_t bodyoff = 0;
334 u_int8_t *iv;
335 u_int8_t tiv[8];
336 int derived;
337
338 derived = 0;
339
340 /* sanity check */
341 if (plen % 8) {
342 ipseclog((LOG_ERR, "esp_descbc_encrypt: "
343 "payload length must be multiple of 8\n"));
344 return EINVAL;
345 }
346 if (sav->ivlen != ivlen) {
347 ipseclog((LOG_ERR, "esp_descbc_encrypt: bad ivlen %d/%d\n",
348 ivlen, sav->ivlen));
349 return EINVAL;
350 }
351 if (_KEYBITS(sav->key_enc) < algo->keymin
352 || algo->keymax < _KEYBITS(sav->key_enc)) {
353 ipseclog((LOG_ERR, "esp_descbc_encrypt: bad keylen %d\n",
354 _KEYBITS(sav->key_enc)));
355 return EINVAL;
356 }
357
358 if (sav->flags & SADB_X_EXT_OLD) {
359 /* RFC 1827 */
360 /*
361 * draft-ietf-ipsec-ciph-des-derived-00.txt
362 * uses sequence number field as IV field.
363 * This draft has been deleted, see above.
364 */
365 ivoff = off + sizeof(struct esp);
366 bodyoff = off + sizeof(struct esp) + ivlen;
367 derived = 0;
368 } else {
369 /* RFC 2406 */
370 if (sav->flags & SADB_X_EXT_DERIV) {
371 /*
372 * draft-ietf-ipsec-ciph-des-derived-00.txt
373 * uses sequence number field as IV field.
374 * This draft has been deleted, see above.
375 */
376 ivoff = off + sizeof(struct esp);
377 bodyoff = off + sizeof(struct esp) + sizeof(u_int32_t);
378 ivlen = sizeof(u_int32_t);
379 derived = 1;
380 } else {
381 ivoff = off + sizeof(struct newesp);
382 bodyoff = off + sizeof(struct newesp) + ivlen;
383 derived = 0;
384 }
385 }
386
387 if (m->m_pkthdr.len < bodyoff)
388 panic("assumption failed: mbuf too short");
389 iv = mbuf_find_offset(m, ivoff, ivlen);
390 if (!iv)
391 panic("assumption failed: bad mbuf chain");
392 if (ivlen == 4) {
393 if (!derived) {
394 bcopy(sav->iv, &tiv[0], 4);
395 bcopy(sav->iv, &tiv[4], 4);
396 tiv[4] ^= 0xff;
397 tiv[5] ^= 0xff;
398 tiv[6] ^= 0xff;
399 tiv[7] ^= 0xff;
400 bcopy(&tiv[0], iv, 4);
401 iv = &tiv[0];
402 } else {
403 bcopy(iv, &tiv[0], 4);
404 bcopy(iv, &tiv[4], 4);
405 tiv[4] ^= 0xff;
406 tiv[5] ^= 0xff;
407 tiv[6] ^= 0xff;
408 tiv[7] ^= 0xff;
409 iv = &tiv[0];
410 }
411 } else if (ivlen == 8)
412 bcopy((caddr_t)sav->iv, (caddr_t)iv, ivlen);
413 else {
414 ipseclog((LOG_ERR,
415 "esp_descbc_encrypt: unsupported ivlen %d\n", ivlen));
416 return EINVAL;
417 }
418
419 {
420 int deserr;
421 des_key_schedule ks;
422
423 deserr = des_key_sched((C_Block *)_KEYBUF(sav->key_enc), ks);
424 if (deserr != 0) {
425 ipseclog((LOG_ERR,
426 "esp_descbc_encrypt: key error %d\n", deserr));
427 return EINVAL;
428 }
429
430 des_cbc_encrypt(m, bodyoff, plen, ks, (C_Block *)iv, DES_ENCRYPT);
431
432 /* for safety */
433 bzero(&ks, sizeof(des_key_schedule));
434 }
435
436 esp_increment_iv(sav);
437
438 /* for safety */
439 bzero(&tiv[0], sizeof(tiv));
440
441 return 0;
442 }
443
444 static int
445 esp_cbc_mature(sav)
446 struct secasvar *sav;
447 {
448 int keylen;
449 struct esp_algorithm *algo;
450
451 if (sav->flags & SADB_X_EXT_OLD) {
452 ipseclog((LOG_ERR,
453 "esp_cbc_mature: algorithm incompatible with esp-old\n"));
454 return 1;
455 }
456 if (sav->flags & SADB_X_EXT_DERIV) {
457 ipseclog((LOG_ERR,
458 "esp_cbc_mature: algorithm incompatible with derived\n"));
459 return 1;
460 }
461
462 if (!sav->key_enc) {
463 ipseclog((LOG_ERR,
464 "esp_cbc_mature: no key is given.\n"));
465 return 1;
466 }
467 algo = &esp_algorithms[sav->alg_enc];
468 keylen = sav->key_enc->sadb_key_bits;
469 if (keylen < algo->keymin || algo->keymax < keylen) {
470 ipseclog((LOG_ERR, "esp_cbc_mature: invalid key length %d.\n",
471 sav->key_enc->sadb_key_bits));
472 return 1;
473 }
474 switch (sav->alg_enc) {
475 case SADB_EALG_3DESCBC:
476 /* weak key check */
477 if (des_is_weak_key((C_Block *)_KEYBUF(sav->key_enc))
478 || des_is_weak_key((C_Block *)(_KEYBUF(sav->key_enc) + 8))
479 || des_is_weak_key((C_Block *)(_KEYBUF(sav->key_enc) + 16))) {
480 ipseclog((LOG_ERR,
481 "esp_cbc_mature: weak key was passed.\n"));
482 return 1;
483 }
484 break;
485 case SADB_EALG_BLOWFISHCBC:
486 case SADB_EALG_CAST128CBC:
487 case SADB_EALG_RC5CBC:
488 break;
489 }
490
491 return 0;
492 }
493
494 static int
495 esp_blowfish_cbc_decrypt(m, off, sav, algo, ivlen)
496 struct mbuf *m;
497 size_t off; /* offset to ESP header */
498 struct secasvar *sav;
499 struct esp_algorithm *algo;
500 int ivlen;
501 {
502 size_t ivoff;
503 size_t bodyoff;
504 u_int8_t *iv;
505 u_int8_t tiv[8];
506 size_t plen;
507 static BF_KEY key; /* made static to avoid kernel stack overflow */
508 int s;
509
510 /* sanity check */
511 if (sav->ivlen != ivlen) {
512 ipseclog((LOG_ERR,
513 "esp_blowfish_cbc_decrypt: bad ivlen %d/%d\n",
514 ivlen, sav->ivlen));
515 return EINVAL;
516 }
517 if (_KEYBITS(sav->key_enc) < algo->keymin
518 || algo->keymax < _KEYBITS(sav->key_enc)) {
519 ipseclog((LOG_ERR,
520 "esp_blowfish_cbc_decrypt: unsupported key length %d: "
521 "need %d to %d bits\n", _KEYBITS(sav->key_enc),
522 algo->keymin, algo->keymax));
523 return EINVAL;
524 }
525 if (sav->flags & SADB_X_EXT_OLD) {
526 ipseclog((LOG_ERR,
527 "esp_blowfish_cbc_decrypt: unsupported ESP version\n"));
528 return EINVAL;
529 }
530 if (ivlen != 8) {
531 ipseclog((LOG_ERR,
532 "esp_blowfish_cbc_decrypt: unsupported ivlen %d\n", ivlen));
533 return EINVAL;
534 }
535
536 ivoff = off + sizeof(struct newesp);
537 bodyoff = off + sizeof(struct newesp) + ivlen;
538 iv = &tiv[0];
539 m_copydata(m, ivoff, 8, &tiv[0]);
540
541 plen = m->m_pkthdr.len;
542 if (plen < bodyoff)
543 panic("esp_blowfish_cbc_decrypt: too short packet: len=%lu",
544 (u_long)plen);
545 plen -= bodyoff;
546
547 if (plen % 8) {
548 ipseclog((LOG_ERR, "esp_blowfish_cbc_decrypt: "
549 "payload length must be multiple of 8\n"));
550 return EINVAL;
551 }
552
553 #if __NetBSD__
554 s = splsoftnet(); /* XXX correct? */
555 #else
556 s = splnet(); /* XXX correct? */
557 #endif
558
559 BF_set_key(&key, _KEYBITS(sav->key_enc) / 8, _KEYBUF(sav->key_enc));
560 BF_cbc_encrypt_m(m, bodyoff, plen, &key, iv, BF_DECRYPT);
561
562 /* for safety */
563 bzero(&key, sizeof(BF_KEY));
564
565 splx(s);
566
567 /* for safety */
568 bzero(&tiv[0], sizeof(tiv));
569
570 return 0;
571 }
572
573 static int
574 esp_blowfish_cbc_encrypt(m, off, plen, sav, algo, ivlen)
575 struct mbuf *m;
576 size_t off; /* offset to ESP header */
577 size_t plen; /* payload length (to be decrypted) */
578 struct secasvar *sav;
579 struct esp_algorithm *algo;
580 int ivlen;
581 {
582 size_t ivoff;
583 size_t bodyoff;
584 u_int8_t *iv;
585 static BF_KEY key; /* made static to avoid kernel stack overflow */
586 int s;
587
588 /* sanity check */
589 if (plen % 8) {
590 ipseclog((LOG_ERR, "esp_blowfish_cbc_encrypt: "
591 "payload length must be multiple of 8\n"));
592 return EINVAL;
593 }
594 if (sav->ivlen != ivlen) {
595 ipseclog((LOG_ERR,
596 "esp_blowfish_cbc_encrypt: bad ivlen %d/%d\n",
597 ivlen, sav->ivlen));
598 return EINVAL;
599 }
600 if (_KEYBITS(sav->key_enc) < algo->keymin
601 || algo->keymax < _KEYBITS(sav->key_enc)) {
602 ipseclog((LOG_ERR,
603 "esp_blowfish_cbc_encrypt: unsupported key length %d: "
604 "need %d to %d bits\n", _KEYBITS(sav->key_enc),
605 algo->keymin, algo->keymax));
606 return EINVAL;
607 }
608 if (sav->flags & SADB_X_EXT_OLD) {
609 ipseclog((LOG_ERR,
610 "esp_blowfish_cbc_encrypt: unsupported ESP version\n"));
611 return EINVAL;
612 }
613 if (ivlen != 8) {
614 ipseclog((LOG_ERR,
615 "esp_blowfish_cbc_encrypt: unsupported ivlen %d\n", ivlen));
616 return EINVAL;
617 }
618
619 ivoff = off + sizeof(struct newesp);
620 bodyoff = off + sizeof(struct newesp) + ivlen;
621
622 if (m->m_pkthdr.len < bodyoff)
623 panic("assumption failed: mbuf too short");
624 iv = mbuf_find_offset(m, ivoff, ivlen);
625 if (!iv)
626 panic("assumption failed: bad mbuf chain");
627
628 bcopy((caddr_t)sav->iv, (caddr_t)iv, ivlen);
629
630 #if __NetBSD__
631 s = splsoftnet(); /* XXX correct? */
632 #else
633 s = splnet(); /* XXX correct? */
634 #endif
635
636 BF_set_key(&key, _KEYBITS(sav->key_enc) / 8, _KEYBUF(sav->key_enc));
637 BF_cbc_encrypt_m(m, bodyoff, plen, &key, iv, BF_ENCRYPT);
638
639 /* for safety */
640 bzero(&key, sizeof(BF_KEY));
641
642 splx(s);
643
644 esp_increment_iv(sav);
645
646 return 0;
647 }
648
649 static int
650 esp_blowfish_cbc_ivlen(sav)
651 struct secasvar *sav;
652 {
653 return 8;
654 }
655
656 static int
657 esp_cast128cbc_ivlen(sav)
658 struct secasvar *sav;
659 {
660 return 8;
661 }
662
663 static int
664 esp_cast128cbc_decrypt(m, off, sav, algo, ivlen)
665 struct mbuf *m;
666 size_t off;
667 struct secasvar *sav;
668 struct esp_algorithm *algo;
669 int ivlen;
670 {
671 size_t ivoff;
672 size_t bodyoff;
673 u_int8_t iv[8];
674 size_t plen;
675
676 /* sanity check */
677 if (ivlen != sav->ivlen) {
678 ipseclog((LOG_ERR, "esp_cast128cbc_decrypt: bad ivlen %d/%d\n",
679 ivlen, sav->ivlen));
680 return EINVAL;
681 }
682 if (_KEYBITS(sav->key_enc) < algo->keymin
683 || _KEYBITS(sav->key_enc) > algo->keymax) {
684 ipseclog((LOG_ERR,
685 "esp_cast128cbc_decrypt: unsupported key length %d: "
686 "need %d to %d bits\n", _KEYBITS(sav->key_enc),
687 algo->keymin, algo->keymax));
688 return EINVAL;
689 }
690 if (sav->flags & SADB_X_EXT_OLD) {
691 ipseclog((LOG_ERR,
692 "esp_cast128cbc_decrypt: unsupported ESP version\n"));
693 return EINVAL;
694 }
695 if (ivlen != 8) {
696 ipseclog((LOG_ERR,
697 "esp_cast128cbc_decrypt: unsupported ivlen %d\n", ivlen));
698 return EINVAL;
699 }
700
701 ivoff = off + sizeof(struct newesp);
702 bodyoff = off + sizeof(struct newesp) + ivlen;
703
704 /* copy mbuf's IV into iv */
705 m_copydata(m, ivoff, 8, iv);
706
707 plen = m->m_pkthdr.len;
708 if (plen < bodyoff) {
709 panic("esp_cast128cbc_decrypt: too short packet: len=%lu\n",
710 (u_long)plen);
711 }
712 plen -= bodyoff;
713
714 if (plen % 8) {
715 ipseclog((LOG_ERR, "esp_cast128cbc_decrypt: "
716 "payload length must be multiple of 8\n"));
717 return EINVAL;
718 }
719
720 /* decrypt */
721 {
722 u_int8_t key[16];
723 u_int32_t subkey[32];
724
725 bzero(key, sizeof(key));
726 bcopy(_KEYBUF(sav->key_enc), key, _KEYLEN(sav->key_enc));
727
728 set_cast128_subkey(subkey, key);
729 cast128_cbc_process(m, bodyoff, plen, subkey, iv,
730 _KEYBITS(sav->key_enc) / 8, CAST128_DECRYPT);
731
732 /* for safety */
733 bzero(subkey, sizeof(subkey));
734 bzero(key, sizeof(key));
735 }
736
737 return 0;
738 }
739
740 static int
741 esp_cast128cbc_encrypt(m, off, plen, sav, algo, ivlen)
742 struct mbuf *m;
743 size_t off;
744 size_t plen;
745 struct secasvar *sav;
746 struct esp_algorithm *algo;
747 int ivlen;
748 {
749 size_t ivoff;
750 size_t bodyoff;
751 u_int8_t *iv;
752
753 /* sanity check */
754 if (plen % 8) {
755 ipseclog((LOG_ERR, "esp_cast128cbc_encrypt: "
756 "payload length must be multiple of 8\n"));
757 return EINVAL;
758 }
759 if (sav->ivlen != ivlen) {
760 ipseclog((LOG_ERR, "esp_cast128cbc_encrypt: bad ivlen %d/%d\n",
761 ivlen, sav->ivlen));
762 return EINVAL;
763 }
764 if (_KEYBITS(sav->key_enc) < algo->keymin
765 || _KEYBITS(sav->key_enc) > algo->keymax) {
766 ipseclog((LOG_ERR,
767 "esp_cast128cbc_encrypt: unsupported key length %d: "
768 "needs %d to %d bits\n", _KEYBITS(sav->key_enc),
769 algo->keymin, algo->keymax));
770 return EINVAL;
771 }
772 if (sav->flags & SADB_X_EXT_OLD) {
773 ipseclog((LOG_ERR,
774 "esp_cast128cbc_encrypt: unsupported ESP version\n"));
775 return EINVAL;
776 }
777 if (ivlen != 8) {
778 ipseclog((LOG_ERR,
779 "esp_cast128cbc_encrypt: unsupported ivlen %d\n", ivlen));
780 return EINVAL;
781 }
782
783 ivoff = off + sizeof(struct newesp);
784 bodyoff = off + sizeof(struct newesp) + ivlen;
785
786 if (m->m_pkthdr.len < bodyoff)
787 panic("assumption failed: mbuf too short");
788 iv = mbuf_find_offset(m, ivoff, ivlen);
789 if (!iv)
790 panic("assumption failed: bad mbuf chain");
791
792 bcopy(sav->iv, iv, ivlen);
793
794 /* encrypt */
795 {
796 u_int8_t key[16];
797 u_int32_t subkey[32];
798
799 bzero(key, sizeof(key));
800 bcopy(_KEYBUF(sav->key_enc), key, _KEYLEN(sav->key_enc));
801
802 set_cast128_subkey(subkey, key);
803 cast128_cbc_process(m, bodyoff, plen, subkey, iv,
804 _KEYBITS(sav->key_enc) / 8, CAST128_ENCRYPT);
805
806 /* for safety */
807 bzero(subkey, sizeof(subkey));
808 bzero(key, sizeof(key));
809 }
810
811 esp_increment_iv(sav);
812
813 return 0;
814 }
815
816 static int
817 esp_3descbc_ivlen(sav)
818 struct secasvar *sav;
819 {
820 return 8;
821 }
822
823 static int
824 esp_3descbc_decrypt(m, off, sav, algo, ivlen)
825 struct mbuf *m;
826 size_t off;
827 struct secasvar *sav;
828 struct esp_algorithm *algo;
829 int ivlen;
830 {
831 size_t ivoff;
832 size_t bodyoff;
833 u_int8_t *iv;
834 size_t plen;
835 u_int8_t tiv[8];
836
837 /* sanity check */
838 if (ivlen != sav->ivlen) {
839 ipseclog((LOG_ERR, "esp_3descbc_decrypt: bad ivlen %d/%d\n",
840 ivlen, sav->ivlen));
841 return EINVAL;
842 }
843 if (_KEYBITS(sav->key_enc) < algo->keymin
844 || algo->keymax < _KEYBITS(sav->key_enc)) {
845 ipseclog((LOG_ERR, "esp_3descbc_decrypt: bad keylen %d\n",
846 _KEYBITS(sav->key_enc)));
847 return EINVAL;
848 }
849 if (sav->flags & SADB_X_EXT_OLD) {
850 ipseclog((LOG_ERR,
851 "esp_3descbc_decrypt: unsupported ESP version\n"));
852 return EINVAL;
853 }
854 if (ivlen != 8) {
855 ipseclog((LOG_ERR,
856 "esp_3descbc_decrypt: unsupported ivlen %d\n", ivlen));
857 return EINVAL;
858 }
859
860 ivoff = off + sizeof(struct newesp);
861 bodyoff = off + sizeof(struct newesp) + ivlen;
862 iv = &tiv[0];
863 m_copydata(m, ivoff, 8, &tiv[0]);
864
865 plen = m->m_pkthdr.len;
866 if (plen < bodyoff)
867 panic("esp_3descbc_decrypt: too short packet: len=%lu",
868 (u_long)plen);
869
870 plen -= bodyoff;
871
872 if (plen % 8) {
873 ipseclog((LOG_ERR, "esp_3descbc_decrypt: "
874 "payload length must be multiple of 8\n"));
875 return EINVAL;
876 }
877
878 /* decrypt packet */
879 {
880 int deserr[3];
881 des_key_schedule ks[3];
882
883 deserr[0] = des_key_sched((C_Block *)_KEYBUF(sav->key_enc),ks[0]);
884 deserr[1] = des_key_sched((C_Block *)(_KEYBUF(sav->key_enc) + 8), ks[1]);
885 deserr[2] = des_key_sched((C_Block *)(_KEYBUF(sav->key_enc) + 16), ks[2]);
886 if ((deserr[0] != 0) || (deserr[1] != 0) || (deserr[2] != 0)) {
887 ipseclog((LOG_ERR, "esp_3descbc_decrypt: key error %d/%d/%d\n",
888 deserr[0], deserr[1], deserr[2]));
889 return EINVAL;
890 }
891
892 des_3cbc_process(m, bodyoff, plen, ks, (C_Block *)iv, DES_DECRYPT);
893
894 /* for safety */
895 bzero(ks[0], sizeof(des_key_schedule)*3);
896 }
897
898 /* for safety */
899 bzero(&tiv[0], sizeof(tiv));
900
901 return 0;
902 }
903
904 static int
905 esp_3descbc_encrypt(m, off, plen, sav, algo, ivlen)
906 struct mbuf *m;
907 size_t off;
908 size_t plen;
909 struct secasvar *sav;
910 struct esp_algorithm *algo;
911 int ivlen;
912 {
913 size_t ivoff;
914 size_t bodyoff;
915 u_int8_t *iv;
916
917 /* sanity check */
918 if (plen % 8) {
919 ipseclog((LOG_ERR, "esp_3descbc_encrypt: "
920 "payload length must be multiple of 8\n"));
921 return EINVAL;
922 }
923 if (sav->ivlen != ivlen) {
924 ipseclog((LOG_ERR, "esp_3descbc_encrypt: bad ivlen %d/%d\n",
925 ivlen, sav->ivlen));
926 return EINVAL;
927 }
928 if (_KEYBITS(sav->key_enc) < algo->keymin
929 || algo->keymax < _KEYBITS(sav->key_enc)) {
930 ipseclog((LOG_ERR, "esp_3descbc_encrypt: bad keylen %d\n",
931 _KEYBITS(sav->key_enc)));
932 return EINVAL;
933 }
934 if (sav->flags & SADB_X_EXT_OLD) {
935 ipseclog((LOG_ERR,
936 "esp_3descbc_encrypt: unsupported ESP version\n"));
937 return EINVAL;
938 }
939 if (ivlen != 8) {
940 ipseclog((LOG_ERR,
941 "esp_3descbc_encrypt: unsupported ivlen %d\n", ivlen));
942 return EINVAL;
943 }
944
945 ivoff = off + sizeof(struct newesp);
946 bodyoff = off + sizeof(struct newesp) + ivlen;
947
948 if (m->m_pkthdr.len < bodyoff)
949 panic("assumption failed: mbuf too short");
950 iv = mbuf_find_offset(m, ivoff, ivlen);
951 if (!iv)
952 panic("assumption failed: bad mbuf chain");
953
954 bcopy((caddr_t)sav->iv, (caddr_t)iv, ivlen);
955
956 /* encrypt packet */
957 {
958 int deserr[3];
959 des_key_schedule ks[3];
960
961 deserr[0] = des_key_sched((C_Block *)_KEYBUF(sav->key_enc), ks[0]);
962 deserr[1] = des_key_sched((C_Block *)(_KEYBUF(sav->key_enc) + 8), ks[1]);
963 deserr[2] = des_key_sched((C_Block *)(_KEYBUF(sav->key_enc) + 16), ks[2]);
964 if ((deserr[0] != 0) || (deserr[1] != 0) || (deserr[2] != 0)) {
965 ipseclog((LOG_ERR, "esp_3descbc_encrypt: key error %d/%d/%d\n",
966 deserr[0], deserr[1], deserr[2]));
967 return EINVAL;
968 }
969
970 des_3cbc_process(m, bodyoff, plen, ks, (C_Block *)iv, DES_ENCRYPT);
971
972 /* for safety */
973 bzero(ks[0], sizeof(des_key_schedule)*3);
974 }
975
976 esp_increment_iv(sav);
977
978 return 0;
979 }
980
981 static int
982 esp_rc5cbc_ivlen(sav)
983 struct secasvar *sav;
984 {
985 return 8;
986 }
987
988 static int
989 esp_rc5cbc_decrypt(m, off, sav, algo, ivlen)
990 struct mbuf *m;
991 size_t off;
992 struct secasvar *sav;
993 struct esp_algorithm *algo;
994 int ivlen;
995 {
996 size_t ivoff;
997 size_t bodyoff;
998 u_int8_t iv[8];
999 size_t plen;
1000
1001 /* sanity check */
1002 if (sav->ivlen != ivlen) {
1003 ipseclog((LOG_ERR, "esp_rc5cbc_decrypt: bad ivlen %d/%d\n",
1004 ivlen, sav->ivlen));
1005 return EINVAL;
1006 }
1007 if ((_KEYBITS(sav->key_enc) < 40) || (_KEYBITS(sav->key_enc) > 2040)) {
1008 ipseclog((LOG_ERR,
1009 "esp_rc5cbc_decrypt: unsupported key length %d: "
1010 "need 40 to 2040 bit\n", _KEYBITS(sav->key_enc)));
1011 return EINVAL;
1012 }
1013 if (sav->flags & SADB_X_EXT_OLD) {
1014 ipseclog((LOG_ERR,
1015 "esp_rc5cbc_decrypt: unsupported ESP version\n"));
1016 return EINVAL;
1017 }
1018 if (ivlen != 8) {
1019 ipseclog((LOG_ERR, "esp_rc5cbc_decrypt: unsupported ivlen %d\n",
1020 ivlen));
1021 return EINVAL;
1022 }
1023
1024 ivoff = off + sizeof(struct newesp);
1025 bodyoff = off + sizeof(struct newesp) + ivlen;
1026
1027 /* copy mbuf's IV into iv */
1028 m_copydata(m, ivoff, 8, iv);
1029
1030 plen = m->m_pkthdr.len;
1031 if (plen < bodyoff) {
1032 panic("esp_rc5cbc_decrypt: too short packet: len=%lu",
1033 (u_long)plen);
1034 }
1035 plen -= bodyoff;
1036
1037 if (plen % 8) {
1038 ipseclog((LOG_ERR, "esp_rc5cbc_decrypt: "
1039 "payload length must be multiple of 8\n"));
1040 return EINVAL;
1041 }
1042
1043 /* decrypt */
1044 {
1045 RC5_WORD e_key[34];
1046
1047 set_rc5_expandkey(e_key, _KEYBUF(sav->key_enc),
1048 _KEYBITS(sav->key_enc) / 8, 16);
1049 rc5_cbc_process(m, bodyoff, plen, e_key, iv, RC5_DECRYPT);
1050
1051 /* for safety */
1052 bzero(e_key, sizeof(e_key));
1053 }
1054
1055 return 0;
1056 }
1057
1058 static int
1059 esp_rc5cbc_encrypt(m, off, plen, sav, algo, ivlen)
1060 struct mbuf *m;
1061 size_t off;
1062 size_t plen;
1063 struct secasvar *sav;
1064 struct esp_algorithm *algo;
1065 int ivlen;
1066 {
1067 size_t ivoff;
1068 size_t bodyoff;
1069 u_int8_t *iv;
1070
1071 /* sanity check */
1072 if (plen % 8) {
1073 ipseclog((LOG_ERR, "esp_rc5cbc_encrypt: "
1074 "payload length must be multiple of 8\n"));
1075 return EINVAL;
1076 }
1077 if (sav->ivlen != ivlen) {
1078 ipseclog((LOG_ERR, "esp_rc5cbc_encrypt: bad ivlen %d/%d\n",
1079 ivlen, sav->ivlen));
1080 return EINVAL;
1081 }
1082 if (_KEYBITS(sav->key_enc) < algo->keymin
1083 || _KEYBITS(sav->key_enc) > algo->keymax) {
1084 ipseclog((LOG_ERR,
1085 "esp_rc5cbc_encrypt: unsupported key length %d: "
1086 "need %d to %d bits\n", _KEYBITS(sav->key_enc),
1087 algo->keymin, algo->keymax));
1088 return EINVAL;
1089 }
1090 if (sav->flags & SADB_X_EXT_OLD) {
1091 ipseclog((LOG_ERR,
1092 "esp_rc5cbc_encrypt: unsupported ESP version\n"));
1093 return EINVAL;
1094 }
1095 if (ivlen != 8) {
1096 ipseclog((LOG_ERR, "esp_rc5cbc_encrypt: unsupported ivlen %d\n",
1097 ivlen));
1098 return EINVAL;
1099 }
1100
1101 ivoff = off + sizeof(struct newesp);
1102 bodyoff = off + sizeof(struct newesp) + ivlen;
1103
1104 if (m->m_pkthdr.len < bodyoff)
1105 panic("assumption failed: mbuf too short");
1106 iv = mbuf_find_offset(m, ivoff, ivlen);
1107 if (!iv)
1108 panic("assumption failed: bad mbuf chain");
1109
1110 bcopy(sav->iv, iv, ivlen);
1111
1112 /* encrypt */
1113 {
1114 RC5_WORD e_key[34];
1115
1116 set_rc5_expandkey(e_key, _KEYBUF(sav->key_enc),
1117 _KEYBITS(sav->key_enc) / 8, 16);
1118 rc5_cbc_process(m, bodyoff, plen, e_key, iv, RC5_ENCRYPT);
1119
1120 /* for safety */
1121 bzero(e_key, sizeof(e_key));
1122 }
1123
1124 esp_increment_iv(sav);
1125
1126 return 0;
1127 }
1128
1129 /*
1130 * increment iv.
1131 */
1132 static void
1133 esp_increment_iv(sav)
1134 struct secasvar *sav;
1135 {
1136 u_int8_t *x;
1137 u_int8_t y;
1138 int i;
1139
1140 #if !(defined(__FreeBSD__) && __FreeBSD__ >= 3)
1141 y = time.tv_sec & 0xff;
1142 #else
1143 y = time_second & 0xff;
1144 #endif
1145 if (!y) y++;
1146 x = (u_int8_t *)sav->iv;
1147 for (i = 0; i < sav->ivlen; i++) {
1148 *x = (*x + y) & 0xff;
1149 x++;
1150 }
1151 }
1152
1153 static caddr_t
1154 mbuf_find_offset(m, off, len)
1155 struct mbuf *m;
1156 size_t off;
1157 size_t len;
1158 {
1159 struct mbuf *n;
1160 size_t cnt;
1161
1162 if (m->m_pkthdr.len < off || m->m_pkthdr.len < off + len)
1163 return (caddr_t)NULL;
1164 cnt = 0;
1165 for (n = m; n; n = n->m_next) {
1166 if (cnt + n->m_len <= off) {
1167 cnt += n->m_len;
1168 continue;
1169 }
1170 if (cnt <= off && off < cnt + n->m_len
1171 && cnt <= off + len && off + len <= cnt + n->m_len) {
1172 return mtod(n, caddr_t) + off - cnt;
1173 } else
1174 return (caddr_t)NULL;
1175 }
1176 return (caddr_t)NULL;
1177 }
1178
1179 /*------------------------------------------------------------*/
1180
1181 int
1182 esp_auth(m0, skip, length, sav, sum)
1183 struct mbuf *m0;
1184 size_t skip; /* offset to ESP header */
1185 size_t length; /* payload length */
1186 struct secasvar *sav;
1187 u_char *sum;
1188 {
1189 struct mbuf *m;
1190 size_t off;
1191 struct ah_algorithm_state s;
1192 u_char sumbuf[AH_MAXSUMSIZE];
1193 struct ah_algorithm *algo;
1194 size_t siz;
1195
1196 /* sanity checks */
1197 if (m0->m_pkthdr.len < skip) {
1198 ipseclog((LOG_DEBUG, "esp_auth: mbuf length < skip\n"));
1199 return EINVAL;
1200 }
1201 if (m0->m_pkthdr.len < skip + length) {
1202 ipseclog((LOG_DEBUG,
1203 "esp_auth: mbuf length < skip + length\n"));
1204 return EINVAL;
1205 }
1206 /*
1207 * length of esp part (excluding authentication data) must be 4n,
1208 * since nexthdr must be at offset 4n+3.
1209 */
1210 if (length % 4) {
1211 ipseclog((LOG_ERR, "esp_auth: length is not multiple of 4\n"));
1212 return EINVAL;
1213 }
1214 if (!sav) {
1215 ipseclog((LOG_DEBUG, "esp_auth: NULL SA passed\n"));
1216 return EINVAL;
1217 }
1218 if (!sav->alg_auth) {
1219 ipseclog((LOG_ERR,
1220 "esp_auth: bad ESP auth algorithm passed: %d\n",
1221 sav->alg_auth));
1222 return EINVAL;
1223 }
1224
1225 m = m0;
1226 off = 0;
1227
1228 algo = &ah_algorithms[sav->alg_auth];
1229 siz = (((*algo->sumsiz)(sav) + 3) & ~(4 - 1));
1230 if (sizeof(sumbuf) < siz) {
1231 ipseclog((LOG_DEBUG,
1232 "esp_auth: AH_MAXSUMSIZE is too small: siz=%lu\n",
1233 (u_long)siz));
1234 return EINVAL;
1235 }
1236
1237 /* skip the header */
1238 while (skip) {
1239 if (!m)
1240 panic("mbuf chain?");
1241 if (m->m_len <= skip) {
1242 skip -= m->m_len;
1243 m = m->m_next;
1244 off = 0;
1245 } else {
1246 off = skip;
1247 skip = 0;
1248 }
1249 }
1250
1251 (*algo->init)(&s, sav);
1252 while (0 < length) {
1253 if (!m)
1254 panic("mbuf chain?");
1255
1256 if (m->m_len - off < length) {
1257 (*algo->update)(&s, mtod(m, u_char *) + off,
1258 m->m_len - off);
1259 length -= m->m_len - off;
1260 m = m->m_next;
1261 off = 0;
1262 } else {
1263 (*algo->update)(&s, mtod(m, u_char *) + off, length);
1264 break;
1265 }
1266 }
1267 (*algo->result)(&s, sumbuf);
1268 bcopy(sumbuf, sum, siz); /*XXX*/
1269
1270 return 0;
1271 }