]> git.saurik.com Git - apple/xnu.git/blob - bsd/netinet6/nd6_send.c
2b99a3bf4282afa8fa07aab686d153805090aa82
[apple/xnu.git] / bsd / netinet6 / nd6_send.c
1 /*
2 * Copyright (c) 2013-2016 Apple Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28
29 #include <sys/types.h>
30 #include <sys/malloc.h>
31 #include <sys/proc.h>
32 #include <sys/sysctl.h>
33 #include <sys/syslog.h>
34
35 #include <libkern/crypto/sha1.h>
36
37 #include <net/if.h>
38
39 #include <netinet/in.h>
40 #include <netinet6/in6_var.h>
41 #include <netinet/ip6.h>
42 #include <netinet6/ip6_var.h>
43 #include <netinet6/nd6.h>
44
45 #if CONFIG_MACF
46 #include <sys/kauth.h>
47 #include <security/mac_framework.h>
48 #endif
49
50 SYSCTL_DECL(_net_inet6); /* Note: Not in any common header. */
51
52 SYSCTL_NODE(_net_inet6, OID_AUTO, send, CTLFLAG_RW | CTLFLAG_LOCKED, 0,
53 "IPv6 Secure Neighbor Discovery");
54
55 static int nd6_send_opmode = ND6_SEND_OPMODE_CGA_QUIET;
56 SYSCTL_INT(_net_inet6_send, OID_AUTO, opstate, CTLFLAG_RD | CTLFLAG_LOCKED,
57 &nd6_send_opstate, 0, "current SEND operating state");
58
59 int nd6_send_opstate = ND6_SEND_OPMODE_DISABLED;
60 SYSCTL_INT(_net_inet6_send, OID_AUTO, opmode, CTLFLAG_RW | CTLFLAG_LOCKED,
61 &nd6_send_opmode, 0, "configured SEND operating mode");
62
63 static int sysctl_cga_parameters SYSCTL_HANDLER_ARGS;
64
65 SYSCTL_PROC(_net_inet6_send, OID_AUTO, cga_parameters,
66 CTLTYPE_OPAQUE | CTLFLAG_RW | CTLFLAG_LOCKED, 0, 0,
67 sysctl_cga_parameters, "S,nd6_send_nodecfg", "");
68
69 /*
70 * The size of the buffer is sufficient to contain a public key, its size in
71 * machine binary type for the kernel, and the CGA precalc for the global
72 * scope. This interface is not a public API, so we don't anticipate that the
73 * userland and the kernel will be mismatched between ILP32 and LP64.
74 */
75 #define SYSCTL_CGA_PARAMETERS_BUFFER_SIZE \
76 (2 * (sizeof (u_int16_t) + IN6_CGA_KEY_MAXSIZE) + \
77 sizeof (struct in6_cga_prepare))
78
79 static int
80 sysctl_cga_parameters SYSCTL_HANDLER_ARGS
81 {
82 #pragma unused(oidp, arg1)
83 u_int namelen;
84 char *oldp, *newp;
85 const char *fin;
86 struct in6_cga_nodecfg cfg;
87 struct iovec *iov;
88 int error;
89 char *buffer;
90 u_int16_t u16;
91 #if CONFIG_MACF
92 kauth_cred_t cred;
93 #endif
94
95 namelen = arg2;
96 if (namelen != 0) {
97 log(LOG_ERR, "%s: name length err [len=%u]\n", __func__,
98 namelen);
99 return (EINVAL);
100 }
101
102 if (req->newlen > SYSCTL_CGA_PARAMETERS_BUFFER_SIZE) {
103 log(LOG_ERR, "%s: input buffer size error [len=%u]\n", __func__,
104 req->newlen);
105 return (EINVAL);
106 }
107
108 #if CONFIG_MACF
109 cred = kauth_cred_proc_ref(current_proc());
110 error = mac_system_check_info(cred, "net.inet6.send.cga_parameters");
111 kauth_cred_unref(&cred);
112 if (error != 0) {
113 log(LOG_ERR, "%s: mac_system_check_info denied.\n", __func__);
114 return (EPERM);
115 }
116 #endif
117
118 MALLOC(buffer, char *, SYSCTL_CGA_PARAMETERS_BUFFER_SIZE, M_IP6CGA,
119 M_WAITOK);
120 if (buffer == NULL) {
121 log(LOG_ERR, "%s: could not allocate marshaling buffer.\n",
122 __func__);
123 return (ENOMEM);
124 }
125
126 in6_cga_node_lock();
127
128 if (req->oldptr != USER_ADDR_NULL && req->oldlen > 0) {
129 oldp = buffer;
130 fin = &buffer[SYSCTL_CGA_PARAMETERS_BUFFER_SIZE];
131 if (req->oldlen < SYSCTL_CGA_PARAMETERS_BUFFER_SIZE)
132 fin = &buffer[req->oldlen];
133
134 in6_cga_query(&cfg);
135 iov = &cfg.cga_pubkey;
136 if (iov->iov_len > 0) {
137 VERIFY(iov->iov_len < UINT16_MAX);
138
139 if (&oldp[sizeof (cfg.cga_prepare)] <= fin)
140 bcopy(&cfg.cga_prepare, oldp,
141 sizeof (cfg.cga_prepare));
142 oldp += sizeof (cfg.cga_prepare);
143
144 if (&oldp[sizeof (u16)] < fin) {
145 u16 = (u_int16_t) iov->iov_len;
146 bcopy(&u16, oldp, sizeof (u16));
147 }
148 oldp += sizeof (u16);
149
150 if (&oldp[iov->iov_len] < fin)
151 bcopy(iov->iov_base, oldp, iov->iov_len);
152 oldp += iov->iov_len;
153
154 if (oldp > fin) {
155 req->oldlen = oldp - buffer;
156 log(LOG_ERR, "%s: marshalled data too large.\n",
157 __func__);
158 error = ENOMEM;
159 goto done;
160 }
161 }
162
163 error = SYSCTL_OUT(req, buffer, oldp - buffer);
164 if (error)
165 goto done;
166 }
167
168 if (req->newptr == USER_ADDR_NULL)
169 goto done;
170
171 error = proc_suser(current_proc());
172 if (error)
173 goto done;
174
175 if (req->newlen == 0) {
176 in6_cga_stop();
177 nd6_send_opstate = ND6_SEND_OPMODE_DISABLED;
178 goto done;
179 }
180
181 error = SYSCTL_IN(req, buffer, req->newlen);
182 if (error)
183 goto done;
184
185 newp = buffer;
186 fin = &buffer[req->newlen];
187
188 bzero(&cfg, sizeof cfg);
189
190 if (&newp[sizeof (cfg.cga_prepare)] <= fin)
191 bcopy(newp, &cfg.cga_prepare, sizeof (cfg.cga_prepare));
192 newp += sizeof (cfg.cga_prepare);
193
194 iov = &cfg.cga_privkey;
195 if (&newp[sizeof (u16)] < fin) {
196 bcopy(newp, &u16, sizeof (u16));
197 iov->iov_len = u16;
198
199 if (iov->iov_len > IN6_CGA_KEY_MAXSIZE) {
200 error = EINVAL;
201 goto done;
202 }
203 }
204 newp += sizeof (u16);
205
206 iov->iov_base = newp;
207 newp += iov->iov_len;
208
209 iov = &cfg.cga_pubkey;
210 if (&newp[sizeof (u16)] < fin) {
211 bcopy(newp, &u16, sizeof (u16));
212 iov->iov_len = u16;
213
214 if (iov->iov_len > IN6_CGA_KEY_MAXSIZE) {
215 error = EINVAL;
216 goto done;
217 }
218 }
219 newp += sizeof (u16);
220
221 iov->iov_base = newp;
222 newp += iov->iov_len;
223
224 if (newp > fin) {
225 log(LOG_ERR, "%s: input too large [octets=%ld].\n", __func__,
226 newp - fin);
227 error = ENOMEM;
228 goto done;
229 }
230
231 error = in6_cga_start(&cfg);
232 if (!error)
233 nd6_send_opstate = nd6_send_opmode;
234 else
235 log(LOG_ERR, "%s: in6_cga_start error=%d.\n", __func__,
236 error);
237
238 done:
239 in6_cga_node_unlock();
240 FREE(buffer, M_IP6CGA);
241 return (error);
242 }
243
244 /* End of file */