2 * Copyright (c) 2008-2011 Apple Inc. All rights reserved.
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
29 /* $FreeBSD: src/sys/netinet6/ah_core.c,v 1.2.2.4 2001/07/03 11:01:49 ume Exp $ */
30 /* $KAME: ah_core.c,v 1.44 2001/03/12 11:24:39 itojun Exp $ */
33 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
34 * All rights reserved.
36 * Redistribution and use in source and binary forms, with or without
37 * modification, are permitted provided that the following conditions
39 * 1. Redistributions of source code must retain the above copyright
40 * notice, this list of conditions and the following disclaimer.
41 * 2. Redistributions in binary form must reproduce the above copyright
42 * notice, this list of conditions and the following disclaimer in the
43 * documentation and/or other materials provided with the distribution.
44 * 3. Neither the name of the project nor the names of its contributors
45 * may be used to endorse or promote products derived from this software
46 * without specific prior written permission.
48 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
49 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
50 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
51 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
52 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
53 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
54 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
55 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
56 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
57 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
62 * RFC1826/2402 authentication header.
65 /* TODO: have shared routines for hmac-* algorithms */
67 #include <sys/param.h>
68 #include <sys/systm.h>
69 #include <sys/malloc.h>
71 #include <sys/domain.h>
72 #include <sys/protosw.h>
73 #include <sys/socket.h>
74 #include <sys/socketvar.h>
75 #include <sys/errno.h>
77 #include <sys/syslog.h>
80 #include <net/route.h>
82 #include <netinet/in.h>
83 #include <netinet/in_systm.h>
84 #include <netinet/ip.h>
85 #include <netinet/in_var.h>
88 #include <netinet/ip6.h>
89 #include <netinet6/ip6_var.h>
90 #include <netinet/icmp6.h>
93 #include <netinet6/ipsec.h>
95 #include <netinet6/ipsec6.h>
97 #include <netinet6/ah.h>
99 #include <netinet6/ah6.h>
102 #include <netinet6/esp.h>
104 #include <netinet6/esp6.h>
107 #include <net/pfkeyv2.h>
108 #include <netkey/keydb.h>
109 #include <libkern/crypto/md5.h>
110 #include <libkern/crypto/sha1.h>
111 #include <libkern/crypto/sha2.h>
113 #include <net/net_osdep.h>
117 static int ah_sumsiz_1216(struct secasvar
*);
118 static int ah_sumsiz_zero(struct secasvar
*);
119 static int ah_none_mature(struct secasvar
*);
120 static int ah_none_init(struct ah_algorithm_state
*, struct secasvar
*);
121 static void ah_none_loop(struct ah_algorithm_state
*, caddr_t
, size_t);
122 static void ah_none_result(struct ah_algorithm_state
*, caddr_t
, size_t);
123 static int ah_keyed_md5_mature(struct secasvar
*);
124 static int ah_keyed_md5_init(struct ah_algorithm_state
*, struct secasvar
*);
125 static void ah_keyed_md5_loop(struct ah_algorithm_state
*, caddr_t
, size_t);
126 static void ah_keyed_md5_result(struct ah_algorithm_state
*, caddr_t
, size_t);
127 static int ah_keyed_sha1_mature(struct secasvar
*);
128 static int ah_keyed_sha1_init(struct ah_algorithm_state
*, struct secasvar
*);
129 static void ah_keyed_sha1_loop(struct ah_algorithm_state
*, caddr_t
, size_t);
130 static void ah_keyed_sha1_result(struct ah_algorithm_state
*, caddr_t
, size_t);
131 static int ah_hmac_md5_mature(struct secasvar
*);
132 static int ah_hmac_md5_init(struct ah_algorithm_state
*, struct secasvar
*);
133 static void ah_hmac_md5_loop(struct ah_algorithm_state
*, caddr_t
, size_t);
134 static void ah_hmac_md5_result(struct ah_algorithm_state
*, caddr_t
, size_t);
135 static int ah_hmac_sha1_mature(struct secasvar
*);
136 static int ah_hmac_sha1_init(struct ah_algorithm_state
*, struct secasvar
*);
137 static void ah_hmac_sha1_loop(struct ah_algorithm_state
*, caddr_t
, size_t);
138 static void ah_hmac_sha1_result(struct ah_algorithm_state
*, caddr_t
, size_t);
140 static int ah_sumsiz_sha2_256(struct secasvar
*);
141 static int ah_hmac_sha2_256_mature(struct secasvar
*);
142 static int ah_hmac_sha2_256_init(struct ah_algorithm_state
*,
144 static void ah_hmac_sha2_256_loop(struct ah_algorithm_state
*, caddr_t
, size_t);
145 static void ah_hmac_sha2_256_result(struct ah_algorithm_state
*, caddr_t
, size_t);
146 static int ah_sumsiz_sha2_384(struct secasvar
*);
147 static int ah_hmac_sha2_384_mature(struct secasvar
*);
148 static int ah_hmac_sha2_384_init(struct ah_algorithm_state
*,
150 static void ah_hmac_sha2_384_loop(struct ah_algorithm_state
*, caddr_t
, size_t);
151 static void ah_hmac_sha2_384_result(struct ah_algorithm_state
*, caddr_t
, size_t);
152 static int ah_sumsiz_sha2_512(struct secasvar
*);
153 static int ah_hmac_sha2_512_mature(struct secasvar
*);
154 static int ah_hmac_sha2_512_init(struct ah_algorithm_state
*,
156 static void ah_hmac_sha2_512_loop(struct ah_algorithm_state
*, caddr_t
, size_t);
157 static void ah_hmac_sha2_512_result(struct ah_algorithm_state
*, caddr_t
, size_t);
158 #endif /* AH_ALL_CRYPTO */
160 static void ah_update_mbuf(struct mbuf
*, int, int,
161 const struct ah_algorithm
*, struct ah_algorithm_state
*);
163 const struct ah_algorithm
*
164 ah_algorithm_lookup(idx
)
167 /* checksum algorithms */
168 static struct ah_algorithm hmac_md5
=
169 { ah_sumsiz_1216
, ah_hmac_md5_mature
, 128, 128, "hmac-md5",
170 ah_hmac_md5_init
, ah_hmac_md5_loop
,
171 ah_hmac_md5_result
, };
172 static struct ah_algorithm keyed_md5
=
173 { ah_sumsiz_1216
, ah_keyed_md5_mature
, 128, 128, "keyed-md5",
174 ah_keyed_md5_init
, ah_keyed_md5_loop
,
175 ah_keyed_md5_result
, };
176 static struct ah_algorithm hmac_sha1
=
177 { ah_sumsiz_1216
, ah_hmac_sha1_mature
, 160, 160, "hmac-sha1",
178 ah_hmac_sha1_init
, ah_hmac_sha1_loop
,
179 ah_hmac_sha1_result
, };
180 static struct ah_algorithm keyed_sha1
=
181 { ah_sumsiz_1216
, ah_keyed_sha1_mature
, 160, 160, "keyed-sha1",
182 ah_keyed_sha1_init
, ah_keyed_sha1_loop
,
183 ah_keyed_sha1_result
, };
184 static struct ah_algorithm ah_none
=
185 { ah_sumsiz_zero
, ah_none_mature
, 0, 2048, "none",
186 ah_none_init
, ah_none_loop
, ah_none_result
, };
188 static struct ah_algorithm hmac_sha2_256
=
189 { ah_sumsiz_sha2_256
, ah_hmac_sha2_256_mature
, 256, 256,
191 ah_hmac_sha2_256_init
, ah_hmac_sha2_256_loop
,
192 ah_hmac_sha2_256_result
, };
193 static struct ah_algorithm hmac_sha2_384
=
194 { ah_sumsiz_sha2_384
, ah_hmac_sha2_384_mature
, 384, 384,
196 ah_hmac_sha2_384_init
, ah_hmac_sha2_384_loop
,
197 ah_hmac_sha2_384_result
, };
198 static struct ah_algorithm hmac_sha2_512
=
199 { ah_sumsiz_sha2_512
, ah_hmac_sha2_512_mature
, 512, 512,
201 ah_hmac_sha2_512_init
, ah_hmac_sha2_512_loop
,
202 ah_hmac_sha2_512_result
, };
203 #endif /* AH_ALL_CRYPTO */
206 case SADB_AALG_MD5HMAC
:
208 case SADB_AALG_SHA1HMAC
:
210 case SADB_X_AALG_MD5
:
212 case SADB_X_AALG_SHA
:
214 case SADB_X_AALG_NULL
:
217 case SADB_X_AALG_SHA2_256
:
218 return &hmac_sha2_256
;
219 case SADB_X_AALG_SHA2_384
:
220 return &hmac_sha2_384
;
221 case SADB_X_AALG_SHA2_512
:
222 return &hmac_sha2_512
;
223 #endif /* AH_ALL_CRYPTO */
232 struct secasvar
*sav
;
236 if (sav
->flags
& SADB_X_EXT_OLD
)
244 struct secasvar
*sav
;
253 struct secasvar
*sav
;
255 if (sav
->sah
->saidx
.proto
== IPPROTO_AH
) {
257 "ah_none_mature: protocol and algorithm mismatch.\n"));
265 struct ah_algorithm_state
*state
,
266 __unused
struct secasvar
*sav
)
274 __unused
struct ah_algorithm_state
*state
,
275 __unused caddr_t addr
,
282 __unused
struct ah_algorithm_state
*state
,
283 __unused caddr_t addr
,
290 __unused
struct secasvar
*sav
)
292 /* anything is okay */
297 ah_keyed_md5_init(state
, sav
)
298 struct ah_algorithm_state
*state
;
299 struct secasvar
*sav
;
303 u_int8_t buf
[32] __attribute__((aligned(4)));
306 panic("ah_keyed_md5_init: what?");
309 state
->foo
= (void *)_MALLOC(sizeof(MD5_CTX
), M_TEMP
, M_NOWAIT
);
310 if (state
->foo
== NULL
)
313 MD5Init((MD5_CTX
*)state
->foo
);
315 MD5Update((MD5_CTX
*)state
->foo
,
316 (u_int8_t
*)_KEYBUF(state
->sav
->key_auth
),
317 (u_int
)_KEYLEN(state
->sav
->key_auth
));
321 * We cannot simply use md5_pad() since the function
322 * won't update the total length.
324 if (_KEYLEN(state
->sav
->key_auth
) < 56)
325 padlen
= 64 - 8 - _KEYLEN(state
->sav
->key_auth
);
327 padlen
= 64 + 64 - 8 - _KEYLEN(state
->sav
->key_auth
);
328 keybitlen
= _KEYLEN(state
->sav
->key_auth
);
332 MD5Update((MD5_CTX
*)state
->foo
, &buf
[0], 1);
335 bzero(buf
, sizeof(buf
));
336 while (sizeof(buf
) < padlen
) {
337 MD5Update((MD5_CTX
*)state
->foo
, &buf
[0], sizeof(buf
));
338 padlen
-= sizeof(buf
);
341 MD5Update((MD5_CTX
*)state
->foo
, &buf
[0], padlen
);
344 buf
[0] = (keybitlen
>> 0) & 0xff;
345 buf
[1] = (keybitlen
>> 8) & 0xff;
346 buf
[2] = (keybitlen
>> 16) & 0xff;
347 buf
[3] = (keybitlen
>> 24) & 0xff;
348 MD5Update((MD5_CTX
*)state
->foo
, buf
, 8);
355 ah_keyed_md5_loop(state
, addr
, len
)
356 struct ah_algorithm_state
*state
;
361 panic("ah_keyed_md5_loop: what?");
363 MD5Update((MD5_CTX
*)state
->foo
, addr
, len
);
367 ah_keyed_md5_result(state
, addr
, l
)
368 struct ah_algorithm_state
*state
;
372 u_char digest
[16] __attribute__((aligned(4)));
375 panic("ah_keyed_md5_result: what?");
378 MD5Update((MD5_CTX
*)state
->foo
,
379 (u_int8_t
*)_KEYBUF(state
->sav
->key_auth
),
380 (u_int
)_KEYLEN(state
->sav
->key_auth
));
382 MD5Final(&digest
[0], (MD5_CTX
*)state
->foo
);
383 FREE(state
->foo
, M_TEMP
);
384 bcopy(&digest
[0], (void *)addr
, sizeof(digest
) > l
? l
: sizeof(digest
));
388 ah_keyed_sha1_mature(sav
)
389 struct secasvar
*sav
;
391 const struct ah_algorithm
*algo
;
393 if (!sav
->key_auth
) {
394 ipseclog((LOG_ERR
, "ah_keyed_sha1_mature: no key is given.\n"));
398 algo
= ah_algorithm_lookup(sav
->alg_auth
);
400 ipseclog((LOG_ERR
, "ah_keyed_sha1_mature: unsupported algorithm.\n"));
404 if (sav
->key_auth
->sadb_key_bits
< algo
->keymin
405 || algo
->keymax
< sav
->key_auth
->sadb_key_bits
) {
407 "ah_keyed_sha1_mature: invalid key length %d.\n",
408 sav
->key_auth
->sadb_key_bits
));
416 ah_keyed_sha1_init(state
, sav
)
417 struct ah_algorithm_state
*state
;
418 struct secasvar
*sav
;
423 u_int8_t buf
[32] __attribute__((aligned(4)));
426 panic("ah_keyed_sha1_init: what?");
429 state
->foo
= (void *)_MALLOC(sizeof(SHA1_CTX
), M_TEMP
, M_NOWAIT
);
433 ctxt
= (SHA1_CTX
*)state
->foo
;
437 SHA1Update(ctxt
, (u_int8_t
*)_KEYBUF(state
->sav
->key_auth
),
438 (u_int
)_KEYLEN(state
->sav
->key_auth
));
443 if (_KEYLEN(state
->sav
->key_auth
) < 56)
444 padlen
= 64 - 8 - _KEYLEN(state
->sav
->key_auth
);
446 padlen
= 64 + 64 - 8 - _KEYLEN(state
->sav
->key_auth
);
447 keybitlen
= _KEYLEN(state
->sav
->key_auth
);
451 SHA1Update(ctxt
, &buf
[0], 1);
454 bzero(buf
, sizeof(buf
));
455 while (sizeof(buf
) < padlen
) {
456 SHA1Update(ctxt
, &buf
[0], sizeof(buf
));
457 padlen
-= sizeof(buf
);
460 SHA1Update(ctxt
, &buf
[0], padlen
);
463 buf
[0] = (keybitlen
>> 0) & 0xff;
464 buf
[1] = (keybitlen
>> 8) & 0xff;
465 buf
[2] = (keybitlen
>> 16) & 0xff;
466 buf
[3] = (keybitlen
>> 24) & 0xff;
467 SHA1Update(ctxt
, buf
, 8);
474 ah_keyed_sha1_loop(state
, addr
, len
)
475 struct ah_algorithm_state
*state
;
481 if (!state
|| !state
->foo
)
482 panic("ah_keyed_sha1_loop: what?");
483 ctxt
= (SHA1_CTX
*)state
->foo
;
485 SHA1Update(ctxt
, (caddr_t
)addr
, (size_t)len
);
489 ah_keyed_sha1_result(state
, addr
, l
)
490 struct ah_algorithm_state
*state
;
494 u_char digest
[SHA1_RESULTLEN
] __attribute__((aligned(4))); /* SHA-1 generates 160 bits */
497 if (!state
|| !state
->foo
)
498 panic("ah_keyed_sha1_result: what?");
499 ctxt
= (SHA1_CTX
*)state
->foo
;
502 SHA1Update(ctxt
, (u_int8_t
*)_KEYBUF(state
->sav
->key_auth
),
503 (u_int
)_KEYLEN(state
->sav
->key_auth
));
505 SHA1Final((caddr_t
)&digest
[0], ctxt
);
506 bcopy(&digest
[0], (void *)addr
, sizeof(digest
) > l
? l
: sizeof(digest
));
508 FREE(state
->foo
, M_TEMP
);
512 ah_hmac_md5_mature(sav
)
513 struct secasvar
*sav
;
515 const struct ah_algorithm
*algo
;
517 if (!sav
->key_auth
) {
518 ipseclog((LOG_ERR
, "ah_hmac_md5_mature: no key is given.\n"));
522 algo
= ah_algorithm_lookup(sav
->alg_auth
);
524 ipseclog((LOG_ERR
, "ah_hmac_md5_mature: unsupported algorithm.\n"));
528 if (sav
->key_auth
->sadb_key_bits
< algo
->keymin
529 || algo
->keymax
< sav
->key_auth
->sadb_key_bits
) {
531 "ah_hmac_md5_mature: invalid key length %d.\n",
532 sav
->key_auth
->sadb_key_bits
));
540 ah_hmac_md5_init(state
, sav
)
541 struct ah_algorithm_state
*state
;
542 struct secasvar
*sav
;
546 u_char tk
[16] __attribute__((aligned(4)));
553 panic("ah_hmac_md5_init: what?");
556 state
->foo
= (void *)_MALLOC(64 + 64 + sizeof(MD5_CTX
), M_TEMP
, M_NOWAIT
);
560 ipad
= (u_char
*)state
->foo
;
561 opad
= (u_char
*)(ipad
+ 64);
562 ctxt
= (MD5_CTX
*)(void *)(opad
+ 64);
564 /* compress the key if necessery */
565 if (64 < _KEYLEN(state
->sav
->key_auth
)) {
567 MD5Update(ctxt
, _KEYBUF(state
->sav
->key_auth
),
568 _KEYLEN(state
->sav
->key_auth
));
569 MD5Final(&tk
[0], ctxt
);
573 key
= (u_char
*) _KEYBUF(state
->sav
->key_auth
);
574 keylen
= _KEYLEN(state
->sav
->key_auth
);
579 bcopy(key
, ipad
, keylen
);
580 bcopy(key
, opad
, keylen
);
581 for (i
= 0; i
< 64; i
++) {
587 MD5Update(ctxt
, ipad
, 64);
593 ah_hmac_md5_loop(state
, addr
, len
)
594 struct ah_algorithm_state
*state
;
600 if (!state
|| !state
->foo
)
601 panic("ah_hmac_md5_loop: what?");
602 ctxt
= (MD5_CTX
*)(void *)(((caddr_t
)state
->foo
) + 128);
603 MD5Update(ctxt
, addr
, len
);
607 ah_hmac_md5_result(state
, addr
, l
)
608 struct ah_algorithm_state
*state
;
612 u_char digest
[16] __attribute__((aligned(4)));
617 if (!state
|| !state
->foo
)
618 panic("ah_hmac_md5_result: what?");
620 ipad
= (u_char
*)state
->foo
;
621 opad
= (u_char
*)(ipad
+ 64);
622 ctxt
= (MD5_CTX
*)(void *)(opad
+ 64);
624 MD5Final(&digest
[0], ctxt
);
627 MD5Update(ctxt
, opad
, 64);
628 MD5Update(ctxt
, &digest
[0], sizeof(digest
));
629 MD5Final(&digest
[0], ctxt
);
631 bcopy(&digest
[0], (void *)addr
, sizeof(digest
) > l
? l
: sizeof(digest
));
633 FREE(state
->foo
, M_TEMP
);
637 ah_hmac_sha1_mature(sav
)
638 struct secasvar
*sav
;
640 const struct ah_algorithm
*algo
;
642 if (!sav
->key_auth
) {
643 ipseclog((LOG_ERR
, "ah_hmac_sha1_mature: no key is given.\n"));
647 algo
= ah_algorithm_lookup(sav
->alg_auth
);
649 ipseclog((LOG_ERR
, "ah_hmac_sha1_mature: unsupported algorithm.\n"));
653 if (sav
->key_auth
->sadb_key_bits
< algo
->keymin
654 || algo
->keymax
< sav
->key_auth
->sadb_key_bits
) {
656 "ah_hmac_sha1_mature: invalid key length %d.\n",
657 sav
->key_auth
->sadb_key_bits
));
665 ah_hmac_sha1_init(state
, sav
)
666 struct ah_algorithm_state
*state
;
667 struct secasvar
*sav
;
672 u_char tk
[SHA1_RESULTLEN
] __attribute__((aligned(4))); /* SHA-1 generates 160 bits */
678 panic("ah_hmac_sha1_init: what?");
681 state
->foo
= (void *)_MALLOC(64 + 64 + sizeof(SHA1_CTX
),
686 ipad
= (u_char
*)state
->foo
;
687 opad
= (u_char
*)(ipad
+ 64);
688 ctxt
= (SHA1_CTX
*)(void *)(opad
+ 64);
690 /* compress the key if necessery */
691 if (64 < _KEYLEN(state
->sav
->key_auth
)) {
693 SHA1Update(ctxt
, _KEYBUF(state
->sav
->key_auth
),
694 _KEYLEN(state
->sav
->key_auth
));
695 SHA1Final(&tk
[0], ctxt
);
697 keylen
= SHA1_RESULTLEN
;
699 key
= (u_char
*) _KEYBUF(state
->sav
->key_auth
);
700 keylen
= _KEYLEN(state
->sav
->key_auth
);
705 bcopy(key
, ipad
, keylen
);
706 bcopy(key
, opad
, keylen
);
707 for (i
= 0; i
< 64; i
++) {
713 SHA1Update(ctxt
, ipad
, 64);
719 ah_hmac_sha1_loop(state
, addr
, len
)
720 struct ah_algorithm_state
*state
;
726 if (!state
|| !state
->foo
)
727 panic("ah_hmac_sha1_loop: what?");
729 ctxt
= (SHA1_CTX
*)(void *)(((u_char
*)state
->foo
) + 128);
730 SHA1Update(ctxt
, (caddr_t
)addr
, (size_t)len
);
734 ah_hmac_sha1_result(state
, addr
, l
)
735 struct ah_algorithm_state
*state
;
739 u_char digest
[SHA1_RESULTLEN
] __attribute__((aligned(4))); /* SHA-1 generates 160 bits */
744 if (!state
|| !state
->foo
)
745 panic("ah_hmac_sha1_result: what?");
747 ipad
= (u_char
*)state
->foo
;
748 opad
= (u_char
*)(ipad
+ 64);
749 ctxt
= (SHA1_CTX
*)(void *)(opad
+ 64);
751 SHA1Final((caddr_t
)&digest
[0], ctxt
);
754 SHA1Update(ctxt
, opad
, 64);
755 SHA1Update(ctxt
, (caddr_t
)&digest
[0], sizeof(digest
));
756 SHA1Final((caddr_t
)&digest
[0], ctxt
);
758 bcopy(&digest
[0], (void *)addr
, sizeof(digest
) > l
? l
: sizeof(digest
));
760 FREE(state
->foo
, M_TEMP
);
765 ah_sumsiz_sha2_256(sav
)
766 struct secasvar
*sav
;
770 // return half the output size (in bytes), as per rfc 4868
771 return 16; // 256/(8*2)
775 ah_hmac_sha2_256_mature(sav
)
776 struct secasvar
*sav
;
778 const struct ah_algorithm
*algo
;
780 if (!sav
->key_auth
) {
782 "ah_hmac_sha2_256_mature: no key is given.\n"));
786 algo
= ah_algorithm_lookup(sav
->alg_auth
);
789 "ah_hmac_sha2_256_mature: unsupported algorithm.\n"));
793 if (sav
->key_auth
->sadb_key_bits
< algo
->keymin
||
794 algo
->keymax
< sav
->key_auth
->sadb_key_bits
) {
796 "ah_hmac_sha2_256_mature: invalid key length %d.\n",
797 sav
->key_auth
->sadb_key_bits
));
805 ah_hmac_sha2_256_init(state
, sav
)
806 struct ah_algorithm_state
*state
;
807 struct secasvar
*sav
;
812 u_char tk
[SHA256_DIGEST_LENGTH
] __attribute__((aligned(4)));
818 panic("ah_hmac_sha2_256_init: what?");
821 state
->foo
= (void *)_MALLOC(64 + 64 + sizeof(SHA256_CTX
),
826 ipad
= (u_char
*)state
->foo
;
827 opad
= (u_char
*)(ipad
+ 64);
828 ctxt
= (SHA256_CTX
*)(void *)(opad
+ 64);
830 /* compress the key if necessery */
831 if (64 < _KEYLEN(state
->sav
->key_auth
)) {
832 bzero(tk
, sizeof(tk
));
833 bzero(ctxt
, sizeof(*ctxt
));
835 SHA256_Update(ctxt
, (const u_int8_t
*) _KEYBUF(state
->sav
->key_auth
),
836 _KEYLEN(state
->sav
->key_auth
));
837 SHA256_Final(&tk
[0], ctxt
);
839 keylen
= sizeof(tk
) < 64 ? sizeof(tk
) : 64;
841 key
= (u_char
*) _KEYBUF(state
->sav
->key_auth
);
842 keylen
= _KEYLEN(state
->sav
->key_auth
);
847 bcopy(key
, ipad
, keylen
);
848 bcopy(key
, opad
, keylen
);
849 for (i
= 0; i
< 64; i
++) {
854 bzero(ctxt
, sizeof(*ctxt
));
856 SHA256_Update(ctxt
, ipad
, 64);
862 ah_hmac_sha2_256_loop(state
, addr
, len
)
863 struct ah_algorithm_state
*state
;
869 if (!state
|| !state
->foo
)
870 panic("ah_hmac_sha2_256_loop: what?");
872 ctxt
= (SHA256_CTX
*)(void *)(((u_char
*)state
->foo
) + 128);
873 SHA256_Update(ctxt
, (const u_int8_t
*)addr
, (size_t)len
);
877 ah_hmac_sha2_256_result(state
, addr
, l
)
878 struct ah_algorithm_state
*state
;
882 u_char digest
[SHA256_DIGEST_LENGTH
] __attribute__((aligned(4)));
887 if (!state
|| !state
->foo
)
888 panic("ah_hmac_sha2_256_result: what?");
890 ipad
= (u_char
*)state
->foo
;
891 opad
= (u_char
*)(ipad
+ 64);
892 ctxt
= (SHA256_CTX
*)(void *)(opad
+ 64);
894 SHA256_Final((u_int8_t
*)digest
, ctxt
);
897 SHA256_Update(ctxt
, opad
, 64);
898 SHA256_Update(ctxt
, (const u_int8_t
*)digest
, sizeof(digest
));
899 SHA256_Final((u_int8_t
*)digest
, ctxt
);
901 bcopy(&digest
[0], (void *)addr
, sizeof(digest
) > l
? l
: sizeof(digest
));
903 FREE(state
->foo
, M_TEMP
);
907 ah_sumsiz_sha2_384(sav
)
908 struct secasvar
*sav
;
912 // return half the output size (in bytes), as per rfc 4868
913 return 24; // 384/(8*2)
917 ah_hmac_sha2_384_mature(sav
)
918 struct secasvar
*sav
;
920 const struct ah_algorithm
*algo
;
922 if (!sav
->key_auth
) {
924 "ah_hmac_sha2_384_mature: no key is given.\n"));
928 algo
= ah_algorithm_lookup(sav
->alg_auth
);
931 "ah_hmac_sha2_384_mature: unsupported algorithm.\n"));
935 if (sav
->key_auth
->sadb_key_bits
< algo
->keymin
||
936 algo
->keymax
< sav
->key_auth
->sadb_key_bits
) {
938 "ah_hmac_sha2_384_mature: invalid key length %d.\n",
939 sav
->key_auth
->sadb_key_bits
));
947 ah_hmac_sha2_384_init(state
, sav
)
948 struct ah_algorithm_state
*state
;
949 struct secasvar
*sav
;
954 u_char tk
[SHA384_DIGEST_LENGTH
] __attribute__((aligned(4)));
960 panic("ah_hmac_sha2_384_init: what?");
963 state
->foo
= (void *)_MALLOC(128 + 128 + sizeof(SHA384_CTX
),
964 M_TEMP
, M_NOWAIT
| M_ZERO
);
968 ipad
= (u_char
*)state
->foo
;
969 opad
= (u_char
*)(ipad
+ 128);
970 ctxt
= (SHA384_CTX
*)(void *)(opad
+ 128);
972 /* compress the key if necessery */
973 if (128 < _KEYLEN(state
->sav
->key_auth
)) {
974 bzero(tk
, sizeof(tk
));
975 bzero(ctxt
, sizeof(*ctxt
));
977 SHA384_Update(ctxt
, (const u_int8_t
*) _KEYBUF(state
->sav
->key_auth
),
978 _KEYLEN(state
->sav
->key_auth
));
979 SHA384_Final(&tk
[0], ctxt
);
981 keylen
= sizeof(tk
) < 128 ? sizeof(tk
) : 128;
983 key
= (u_char
*) _KEYBUF(state
->sav
->key_auth
);
984 keylen
= _KEYLEN(state
->sav
->key_auth
);
989 bcopy(key
, ipad
, keylen
);
990 bcopy(key
, opad
, keylen
);
991 for (i
= 0; i
< 128; i
++) {
996 bzero(ctxt
, sizeof(*ctxt
));
998 SHA384_Update(ctxt
, ipad
, 128);
1004 ah_hmac_sha2_384_loop(state
, addr
, len
)
1005 struct ah_algorithm_state
*state
;
1011 if (!state
|| !state
->foo
)
1012 panic("ah_hmac_sha2_384_loop: what?");
1014 ctxt
= (SHA384_CTX
*)(void *)(((u_char
*)state
->foo
) + 256);
1015 SHA384_Update(ctxt
, (const u_int8_t
*)addr
, (size_t)len
);
1019 ah_hmac_sha2_384_result(state
, addr
, l
)
1020 struct ah_algorithm_state
*state
;
1024 u_char digest
[SHA384_DIGEST_LENGTH
];
1029 if (!state
|| !state
->foo
)
1030 panic("ah_hmac_sha2_384_result: what?");
1032 ipad
= (u_char
*)state
->foo
;
1033 opad
= (u_char
*)(ipad
+ 128);
1034 ctxt
= (SHA384_CTX
*)(void *)(opad
+ 128);
1036 SHA384_Final((u_int8_t
*)digest
, ctxt
);
1039 SHA384_Update(ctxt
, opad
, 128);
1040 SHA384_Update(ctxt
, (const u_int8_t
*)digest
, sizeof(digest
));
1041 SHA384_Final((u_int8_t
*)digest
, ctxt
);
1043 bcopy(&digest
[0], (void *)addr
, sizeof(digest
) > l
? l
: sizeof(digest
));
1045 FREE(state
->foo
, M_TEMP
);
1049 ah_sumsiz_sha2_512(sav
)
1050 struct secasvar
*sav
;
1054 // return half the output size (in bytes), as per rfc 4868
1055 return 32; // 512/(8*2)
1059 ah_hmac_sha2_512_mature(sav
)
1060 struct secasvar
*sav
;
1062 const struct ah_algorithm
*algo
;
1064 if (!sav
->key_auth
) {
1066 "ah_hmac_sha2_512_mature: no key is given.\n"));
1070 algo
= ah_algorithm_lookup(sav
->alg_auth
);
1073 "ah_hmac_sha2_512_mature: unsupported algorithm.\n"));
1077 if (sav
->key_auth
->sadb_key_bits
< algo
->keymin
||
1078 algo
->keymax
< sav
->key_auth
->sadb_key_bits
) {
1080 "ah_hmac_sha2_512_mature: invalid key length %d.\n",
1081 sav
->key_auth
->sadb_key_bits
));
1089 ah_hmac_sha2_512_init(state
, sav
)
1090 struct ah_algorithm_state
*state
;
1091 struct secasvar
*sav
;
1096 u_char tk
[SHA512_DIGEST_LENGTH
] __attribute__((aligned(4)));
1102 panic("ah_hmac_sha2_512_init: what?");
1105 state
->foo
= (void *)_MALLOC(128 + 128 + sizeof(SHA512_CTX
),
1106 M_TEMP
, M_NOWAIT
| M_ZERO
);
1110 ipad
= (u_char
*)state
->foo
;
1111 opad
= (u_char
*)(ipad
+ 128);
1112 ctxt
= (SHA512_CTX
*)(void *)(opad
+ 128);
1114 /* compress the key if necessery */
1115 if (128 < _KEYLEN(state
->sav
->key_auth
)) {
1116 bzero(tk
, sizeof(tk
));
1117 bzero(ctxt
, sizeof(*ctxt
));
1119 SHA512_Update(ctxt
, (const u_int8_t
*) _KEYBUF(state
->sav
->key_auth
),
1120 _KEYLEN(state
->sav
->key_auth
));
1121 SHA512_Final(&tk
[0], ctxt
);
1123 keylen
= sizeof(tk
) < 128 ? sizeof(tk
) : 128;
1125 key
= (u_char
*) _KEYBUF(state
->sav
->key_auth
);
1126 keylen
= _KEYLEN(state
->sav
->key_auth
);
1131 bcopy(key
, ipad
, keylen
);
1132 bcopy(key
, opad
, keylen
);
1133 for (i
= 0; i
< 128; i
++) {
1138 bzero(ctxt
, sizeof(*ctxt
));
1140 SHA512_Update(ctxt
, ipad
, 128);
1146 ah_hmac_sha2_512_loop(state
, addr
, len
)
1147 struct ah_algorithm_state
*state
;
1153 if (!state
|| !state
->foo
)
1154 panic("ah_hmac_sha2_512_loop: what?");
1156 ctxt
= (SHA512_CTX
*)(void *)(((u_char
*)state
->foo
) + 256);
1157 SHA512_Update(ctxt
, (const u_int8_t
*) addr
, (size_t)len
);
1161 ah_hmac_sha2_512_result(state
, addr
, l
)
1162 struct ah_algorithm_state
*state
;
1166 u_char digest
[SHA512_DIGEST_LENGTH
] __attribute__((aligned(4)));
1171 if (!state
|| !state
->foo
)
1172 panic("ah_hmac_sha2_512_result: what?");
1174 ipad
= (u_char
*)state
->foo
;
1175 opad
= (u_char
*)(ipad
+ 128);
1176 ctxt
= (SHA512_CTX
*)(void *)(opad
+ 128);
1178 SHA512_Final((u_int8_t
*)digest
, ctxt
);
1181 SHA512_Update(ctxt
, opad
, 128);
1182 SHA512_Update(ctxt
, (const u_int8_t
*)digest
, sizeof(digest
));
1183 SHA512_Final((u_int8_t
*)digest
, ctxt
);
1185 bcopy(&digest
[0], (void *)addr
, sizeof(digest
) > l
? l
: sizeof(digest
));
1187 FREE(state
->foo
, M_TEMP
);
1189 #endif /* AH_ALL_CRYPTO */
1191 /*------------------------------------------------------------*/
1194 * go generate the checksum.
1197 ah_update_mbuf(m
, off
, len
, algo
, algos
)
1201 const struct ah_algorithm
*algo
;
1202 struct ah_algorithm_state
*algos
;
1207 /* easy case first */
1208 if (off
+ len
<= m
->m_len
) {
1209 (algo
->update
)(algos
, mtod(m
, caddr_t
) + off
, len
);
1213 for (n
= m
; n
; n
= n
->m_next
) {
1221 panic("ah_update_mbuf: wrong offset specified");
1223 for (/*nothing*/; n
&& len
> 0; n
= n
->m_next
) {
1226 if (n
->m_len
- off
< len
)
1227 tlen
= n
->m_len
- off
;
1231 (algo
->update
)(algos
, mtod(n
, caddr_t
) + off
, tlen
);
1240 * Go generate the checksum. This function won't modify the mbuf chain
1243 * NOTE: the function does not free mbuf on failure.
1244 * Don't use m_copy(), it will try to share cluster mbuf by using refcnt.
1247 ah4_calccksum(m
, ahdat
, len
, algo
, sav
)
1251 const struct ah_algorithm
*algo
;
1252 struct secasvar
*sav
;
1256 size_t advancewidth
;
1257 struct ah_algorithm_state algos
;
1258 u_char sumbuf
[AH_MAXSUMSIZE
] __attribute__((aligned(4)));
1261 struct mbuf
*n
= NULL
;
1263 if ((m
->m_flags
& M_PKTHDR
) == 0)
1267 hdrtype
= -1; /*dummy, it is called IPPROTO_IP*/
1271 error
= (algo
->init
)(&algos
, sav
);
1275 advancewidth
= 0; /*safety*/
1280 case -1: /*first one only*/
1283 * copy ip hdr, modify to fit the AH checksum rule,
1284 * then take a checksum.
1289 m_copydata(m
, off
, sizeof(iphdr
), (caddr_t
)&iphdr
);
1291 hlen
= IP_VHL_HL(iphdr
.ip_vhl
) << 2;
1293 hlen
= iphdr
.ip_hl
<< 2;
1296 iphdr
.ip_sum
= htons(0);
1297 if (ip4_ah_cleartos
)
1299 iphdr
.ip_off
= htons(ntohs(iphdr
.ip_off
) & ip4_ah_offsetmask
);
1300 (algo
->update
)(&algos
, (caddr_t
)&iphdr
, sizeof(struct ip
));
1302 if (hlen
!= sizeof(struct ip
)) {
1306 if (hlen
> MCLBYTES
) {
1310 MGET(n
, M_DONTWAIT
, MT_DATA
);
1311 if (n
&& hlen
> MLEN
) {
1312 MCLGET(n
, M_DONTWAIT
);
1313 if ((n
->m_flags
& M_EXT
) == 0) {
1322 m_copydata(m
, off
, hlen
, mtod(n
, caddr_t
));
1325 * IP options processing.
1326 * See RFC2402 appendix A.
1328 p
= mtod(n
, u_char
*);
1329 i
= sizeof(struct ip
);
1331 if (i
+ IPOPT_OPTVAL
>= hlen
) {
1332 ipseclog((LOG_ERR
, "ah4_calccksum: "
1333 "invalid IP option\n"));
1337 if (p
[i
+ IPOPT_OPTVAL
] == IPOPT_EOL
||
1338 p
[i
+ IPOPT_OPTVAL
] == IPOPT_NOP
||
1339 i
+ IPOPT_OLEN
< hlen
)
1343 "ah4_calccksum: invalid IP option "
1345 p
[i
+ IPOPT_OPTVAL
]));
1351 switch (p
[i
+ IPOPT_OPTVAL
]) {
1357 case IPOPT_SECURITY
: /* 0x82 */
1358 case 0x85: /* Extended security */
1359 case 0x86: /* Commercial security */
1360 case 0x94: /* Router alert */
1361 case 0x95: /* RFC1770 */
1362 l
= p
[i
+ IPOPT_OLEN
];
1368 l
= p
[i
+ IPOPT_OLEN
];
1374 if (l
< 1 || hlen
- i
< l
) {
1377 "ah4_calccksum: invalid IP option "
1378 "(type=%02x len=%02x)\n",
1379 p
[i
+ IPOPT_OPTVAL
],
1380 p
[i
+ IPOPT_OLEN
]));
1386 if (p
[i
+ IPOPT_OPTVAL
] == IPOPT_EOL
)
1391 p
= mtod(n
, u_char
*) + sizeof(struct ip
);
1392 (algo
->update
)(&algos
, (caddr_t
)p
, hlen
- sizeof(struct ip
));
1398 hdrtype
= (iphdr
.ip_p
) & 0xff;
1399 advancewidth
= hlen
;
1410 m_copydata(m
, off
, sizeof(ah
), (caddr_t
)&ah
);
1411 hdrsiz
= (sav
->flags
& SADB_X_EXT_OLD
)
1413 : sizeof(struct newah
);
1414 siz
= (*algo
->sumsiz
)(sav
);
1415 totlen
= (ah
.ah_len
+ 2) << 2;
1418 * special treatment is necessary for the first one, not others
1421 if (totlen
> m
->m_pkthdr
.len
- off
||
1422 totlen
> MCLBYTES
) {
1426 MGET(n
, M_DONTWAIT
, MT_DATA
);
1427 if (n
&& totlen
> MLEN
) {
1428 MCLGET(n
, M_DONTWAIT
);
1429 if ((n
->m_flags
& M_EXT
) == 0) {
1438 m_copydata(m
, off
, totlen
, mtod(n
, caddr_t
));
1440 bzero(mtod(n
, caddr_t
) + hdrsiz
, siz
);
1441 (algo
->update
)(&algos
, mtod(n
, caddr_t
), n
->m_len
);
1445 ah_update_mbuf(m
, off
, totlen
, algo
, &algos
);
1448 hdrtype
= ah
.ah_nxt
;
1449 advancewidth
= totlen
;
1454 ah_update_mbuf(m
, off
, m
->m_pkthdr
.len
- off
, algo
, &algos
);
1455 advancewidth
= m
->m_pkthdr
.len
- off
;
1459 off
+= advancewidth
;
1460 if (off
< m
->m_pkthdr
.len
)
1463 if (len
< (*algo
->sumsiz
)(sav
)) {
1468 (algo
->result
)(&algos
, (caddr_t
) &sumbuf
[0], sizeof(sumbuf
));
1469 bcopy(&sumbuf
[0], ahdat
, (*algo
->sumsiz
)(sav
));
1484 * Go generate the checksum. This function won't modify the mbuf chain
1487 * NOTE: the function does not free mbuf on failure.
1488 * Don't use m_copy(), it will try to share cluster mbuf by using refcnt.
1491 ah6_calccksum(m
, ahdat
, len
, algo
, sav
)
1495 const struct ah_algorithm
*algo
;
1496 struct secasvar
*sav
;
1500 struct mbuf
*n
= NULL
;
1503 struct ah_algorithm_state algos
;
1504 u_char sumbuf
[AH_MAXSUMSIZE
] __attribute__((aligned(4)));
1506 if ((m
->m_flags
& M_PKTHDR
) == 0)
1509 error
= (algo
->init
)(&algos
, sav
);
1514 proto
= IPPROTO_IPV6
;
1519 newoff
= ip6_nexthdr(m
, off
, proto
, &nxt
);
1521 newoff
= m
->m_pkthdr
.len
;
1522 else if (newoff
<= off
) {
1530 * special treatment is necessary for the first one, not others
1533 struct ip6_hdr ip6copy
;
1535 if (newoff
- off
!= sizeof(struct ip6_hdr
)) {
1540 m_copydata(m
, off
, newoff
- off
, (caddr_t
)&ip6copy
);
1542 ip6copy
.ip6_flow
= 0;
1543 ip6copy
.ip6_vfc
&= ~IPV6_VERSION_MASK
;
1544 ip6copy
.ip6_vfc
|= IPV6_VERSION
;
1545 ip6copy
.ip6_hlim
= 0;
1546 if (IN6_IS_ADDR_LINKLOCAL(&ip6copy
.ip6_src
))
1547 ip6copy
.ip6_src
.s6_addr16
[1] = 0x0000;
1548 if (IN6_IS_ADDR_LINKLOCAL(&ip6copy
.ip6_dst
))
1549 ip6copy
.ip6_dst
.s6_addr16
[1] = 0x0000;
1550 (algo
->update
)(&algos
, (caddr_t
)&ip6copy
,
1551 sizeof(struct ip6_hdr
));
1553 newoff
= m
->m_pkthdr
.len
;
1554 ah_update_mbuf(m
, off
, m
->m_pkthdr
.len
- off
, algo
,
1564 hdrsiz
= (sav
->flags
& SADB_X_EXT_OLD
)
1566 : sizeof(struct newah
);
1567 siz
= (*algo
->sumsiz
)(sav
);
1570 * special treatment is necessary for the first one, not others
1573 if (newoff
- off
> MCLBYTES
) {
1577 MGET(n
, M_DONTWAIT
, MT_DATA
);
1578 if (n
&& newoff
- off
> MLEN
) {
1579 MCLGET(n
, M_DONTWAIT
);
1580 if ((n
->m_flags
& M_EXT
) == 0) {
1589 m_copydata(m
, off
, newoff
- off
, mtod(n
, caddr_t
));
1590 n
->m_len
= newoff
- off
;
1591 bzero(mtod(n
, caddr_t
) + hdrsiz
, siz
);
1592 (algo
->update
)(&algos
, mtod(n
, caddr_t
), n
->m_len
);
1596 ah_update_mbuf(m
, off
, newoff
- off
, algo
, &algos
);
1601 case IPPROTO_HOPOPTS
:
1602 case IPPROTO_DSTOPTS
:
1604 struct ip6_ext
*ip6e
;
1606 u_int8_t
*p
, *optend
, *optp
;
1608 if (newoff
- off
> MCLBYTES
) {
1612 MGET(n
, M_DONTWAIT
, MT_DATA
);
1613 if (n
&& newoff
- off
> MLEN
) {
1614 MCLGET(n
, M_DONTWAIT
);
1615 if ((n
->m_flags
& M_EXT
) == 0) {
1624 m_copydata(m
, off
, newoff
- off
, mtod(n
, caddr_t
));
1625 n
->m_len
= newoff
- off
;
1627 ip6e
= mtod(n
, struct ip6_ext
*);
1628 hdrlen
= (ip6e
->ip6e_len
+ 1) << 3;
1629 if (newoff
- off
< hdrlen
) {
1635 p
= mtod(n
, u_int8_t
*);
1636 optend
= p
+ hdrlen
;
1639 * ICV calculation for the options header including all
1640 * options. This part is a little tricky since there are
1641 * two type of options; mutable and immutable. We try to
1642 * null-out mutable ones here.
1645 while (optp
< optend
) {
1646 if (optp
[0] == IP6OPT_PAD1
)
1649 if (optp
+ 2 > optend
) {
1655 optlen
= optp
[1] + 2;
1657 if (optp
[0] & IP6OPT_MUTABLE
)
1658 bzero(optp
+ 2, optlen
- 2);
1664 (algo
->update
)(&algos
, mtod(n
, caddr_t
), n
->m_len
);
1670 case IPPROTO_ROUTING
:
1672 * For an input packet, we can just calculate `as is'.
1673 * For an output packet, we assume ip6_output have already
1674 * made packet how it will be received at the final
1680 ah_update_mbuf(m
, off
, newoff
- off
, algo
, &algos
);
1684 if (newoff
< m
->m_pkthdr
.len
) {
1690 if (len
< (*algo
->sumsiz
)(sav
)) {
1695 (algo
->result
)(&algos
, (caddr_t
) &sumbuf
[0], sizeof(sumbuf
));
1696 bcopy(&sumbuf
[0], ahdat
, (*algo
->sumsiz
)(sav
));