]> git.saurik.com Git - apple/xnu.git/blob - bsd/netinet6/esp_core.c
xnu-3247.10.11.tar.gz
[apple/xnu.git] / bsd / netinet6 / esp_core.c
1 /*
2 * Copyright (c) 2008 Apple Inc. All rights reserved.
3 *
4 * @APPLE_OSREFERENCE_LICENSE_HEADER_START@
5 *
6 * This file contains Original Code and/or Modifications of Original Code
7 * as defined in and that are subject to the Apple Public Source License
8 * Version 2.0 (the 'License'). You may not use this file except in
9 * compliance with the License. The rights granted to you under the License
10 * may not be used to create, or enable the creation or redistribution of,
11 * unlawful or unlicensed copies of an Apple operating system, or to
12 * circumvent, violate, or enable the circumvention or violation of, any
13 * terms of an Apple operating system software license agreement.
14 *
15 * Please obtain a copy of the License at
16 * http://www.opensource.apple.com/apsl/ and read it before using this file.
17 *
18 * The Original Code and all software distributed under the License are
19 * distributed on an 'AS IS' basis, WITHOUT WARRANTY OF ANY KIND, EITHER
20 * EXPRESS OR IMPLIED, AND APPLE HEREBY DISCLAIMS ALL SUCH WARRANTIES,
21 * INCLUDING WITHOUT LIMITATION, ANY WARRANTIES OF MERCHANTABILITY,
22 * FITNESS FOR A PARTICULAR PURPOSE, QUIET ENJOYMENT OR NON-INFRINGEMENT.
23 * Please see the License for the specific language governing rights and
24 * limitations under the License.
25 *
26 * @APPLE_OSREFERENCE_LICENSE_HEADER_END@
27 */
28
29 /* $FreeBSD: src/sys/netinet6/esp_core.c,v 1.1.2.4 2002/03/26 10:12:29 ume Exp $ */
30 /* $KAME: esp_core.c,v 1.50 2000/11/02 12:27:38 itojun Exp $ */
31
32 /*
33 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
34 * All rights reserved.
35 *
36 * Redistribution and use in source and binary forms, with or without
37 * modification, are permitted provided that the following conditions
38 * are met:
39 * 1. Redistributions of source code must retain the above copyright
40 * notice, this list of conditions and the following disclaimer.
41 * 2. Redistributions in binary form must reproduce the above copyright
42 * notice, this list of conditions and the following disclaimer in the
43 * documentation and/or other materials provided with the distribution.
44 * 3. Neither the name of the project nor the names of its contributors
45 * may be used to endorse or promote products derived from this software
46 * without specific prior written permission.
47 *
48 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
49 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
50 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
51 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
52 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
53 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
54 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
55 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
56 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
57 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
58 * SUCH DAMAGE.
59 */
60
61 #define _IP_VHL
62
63 #include <sys/param.h>
64 #include <sys/systm.h>
65 #include <sys/malloc.h>
66 #include <sys/mbuf.h>
67 #include <sys/domain.h>
68 #include <sys/protosw.h>
69 #include <sys/socket.h>
70 #include <sys/errno.h>
71 #include <sys/time.h>
72 #include <sys/kernel.h>
73 #include <sys/syslog.h>
74
75 #include <kern/locks.h>
76
77 #include <net/if.h>
78 #include <net/route.h>
79
80 #include <netinet/in.h>
81 #include <netinet/in_var.h>
82 #if INET6
83 #include <netinet/ip6.h>
84 #include <netinet6/ip6_var.h>
85 #include <netinet/icmp6.h>
86 #endif
87
88 #include <netinet6/ipsec.h>
89 #if INET6
90 #include <netinet6/ipsec6.h>
91 #endif
92 #include <netinet6/ah.h>
93 #if INET6
94 #include <netinet6/ah6.h>
95 #endif
96 #include <netinet6/esp.h>
97 #if INET6
98 #include <netinet6/esp6.h>
99 #endif
100 #include <netinet6/esp_rijndael.h>
101 #include <net/pfkeyv2.h>
102 #include <netkey/keydb.h>
103 #include <netkey/key.h>
104 #include <libkern/crypto/des.h>
105
106 #include <net/net_osdep.h>
107
108 #include <sys/kdebug.h>
109 #define DBG_LAYER_BEG NETDBG_CODE(DBG_NETIPSEC, 1)
110 #define DBG_LAYER_END NETDBG_CODE(DBG_NETIPSEC, 3)
111 #define DBG_FNC_ESPAUTH NETDBG_CODE(DBG_NETIPSEC, (8 << 8))
112 #define MAX_SBUF_LEN 2000
113
114 extern lck_mtx_t *sadb_mutex;
115
116 static int esp_null_mature(struct secasvar *);
117 static int esp_null_decrypt(struct mbuf *, size_t,
118 struct secasvar *, const struct esp_algorithm *, int);
119 static int esp_null_encrypt(struct mbuf *, size_t, size_t,
120 struct secasvar *, const struct esp_algorithm *, int);
121 static int esp_descbc_mature(struct secasvar *);
122 static int esp_descbc_ivlen(const struct esp_algorithm *,
123 struct secasvar *);
124 static int esp_des_schedule(const struct esp_algorithm *,
125 struct secasvar *);
126 static int esp_des_schedlen(const struct esp_algorithm *);
127 static int esp_des_blockdecrypt(const struct esp_algorithm *,
128 struct secasvar *, u_int8_t *, u_int8_t *);
129 static int esp_des_blockencrypt(const struct esp_algorithm *,
130 struct secasvar *, u_int8_t *, u_int8_t *);
131 static int esp_cbc_mature(struct secasvar *);
132 static int esp_3des_schedule(const struct esp_algorithm *,
133 struct secasvar *);
134 static int esp_3des_schedlen(const struct esp_algorithm *);
135 static int esp_3des_blockdecrypt(const struct esp_algorithm *,
136 struct secasvar *, u_int8_t *, u_int8_t *);
137 static int esp_3des_blockencrypt(const struct esp_algorithm *,
138 struct secasvar *, u_int8_t *, u_int8_t *);
139 static int esp_common_ivlen(const struct esp_algorithm *,
140 struct secasvar *);
141 static int esp_cbc_decrypt(struct mbuf *, size_t,
142 struct secasvar *, const struct esp_algorithm *, int);
143 static int esp_cbc_encrypt(struct mbuf *, size_t, size_t,
144 struct secasvar *, const struct esp_algorithm *, int);
145 static int esp_gcm_mature(struct secasvar *);
146
147 #define MAXIVLEN 16
148
149 #define ESP_AESGCM_KEYLEN128 160 // 16-bytes key + 4 bytes salt
150 #define ESP_AESGCM_KEYLEN192 224 // 24-bytes key + 4 bytes salt
151 #define ESP_AESGCM_KEYLEN256 288 // 32-bytes key + 4 bytes salt
152
153 static const struct esp_algorithm des_cbc =
154 { 8, -1, esp_descbc_mature, 64, 64, esp_des_schedlen,
155 "des-cbc",
156 esp_descbc_ivlen, esp_cbc_decrypt,
157 esp_cbc_encrypt, esp_des_schedule,
158 esp_des_blockdecrypt, esp_des_blockencrypt,
159 0, 0, 0 };
160 static const struct esp_algorithm des3_cbc =
161 { 8, 8, esp_cbc_mature, 192, 192, esp_3des_schedlen,
162 "3des-cbc",
163 esp_common_ivlen, esp_cbc_decrypt,
164 esp_cbc_encrypt, esp_3des_schedule,
165 esp_3des_blockdecrypt, esp_3des_blockencrypt,
166 0, 0, 0 };
167 static const struct esp_algorithm null_esp =
168 { 1, 0, esp_null_mature, 0, 2048, 0, "null",
169 esp_common_ivlen, esp_null_decrypt,
170 esp_null_encrypt, NULL, NULL, NULL,
171 0, 0, 0 };
172 static const struct esp_algorithm aes_cbc =
173 { 16, 16, esp_cbc_mature, 128, 256, esp_aes_schedlen,
174 "aes-cbc",
175 esp_common_ivlen, esp_cbc_decrypt_aes,
176 esp_cbc_encrypt_aes, esp_aes_schedule,
177 0, 0,
178 0, 0, 0 };
179 static const struct esp_algorithm aes_gcm =
180 { 4, 8, esp_gcm_mature, ESP_AESGCM_KEYLEN128, ESP_AESGCM_KEYLEN256, esp_gcm_schedlen,
181 "aes-gcm",
182 esp_common_ivlen, esp_gcm_decrypt_aes,
183 esp_gcm_encrypt_aes, esp_gcm_schedule,
184 0, 0,
185 16, esp_gcm_decrypt_finalize, esp_gcm_encrypt_finalize};
186
187 static const struct esp_algorithm *esp_algorithms[] = {
188 &des_cbc,
189 &des3_cbc,
190 &null_esp,
191 &aes_cbc,
192 &aes_gcm,
193 };
194
195 const struct esp_algorithm *
196 esp_algorithm_lookup(idx)
197 int idx;
198 {
199 switch (idx) {
200 case SADB_EALG_DESCBC:
201 return &des_cbc;
202 case SADB_EALG_3DESCBC:
203 return &des3_cbc;
204 case SADB_EALG_NULL:
205 return &null_esp;
206 case SADB_X_EALG_RIJNDAELCBC:
207 return &aes_cbc;
208 case SADB_X_EALG_AES_GCM:
209 return &aes_gcm;
210 default:
211 return NULL;
212 }
213 }
214
215 int
216 esp_max_ivlen()
217 {
218 int idx;
219 int ivlen;
220
221 ivlen = 0;
222 for (idx = 0; idx < sizeof(esp_algorithms)/sizeof(esp_algorithms[0]);
223 idx++) {
224 if (esp_algorithms[idx]->ivlenval > ivlen)
225 ivlen = esp_algorithms[idx]->ivlenval;
226 }
227
228 return ivlen;
229 }
230
231 int
232 esp_schedule(algo, sav)
233 const struct esp_algorithm *algo;
234 struct secasvar *sav;
235 {
236 int error;
237
238 /* check for key length */
239 if (_KEYBITS(sav->key_enc) < algo->keymin ||
240 _KEYBITS(sav->key_enc) > algo->keymax) {
241 ipseclog((LOG_ERR,
242 "esp_schedule %s: unsupported key length %d: "
243 "needs %d to %d bits\n", algo->name, _KEYBITS(sav->key_enc),
244 algo->keymin, algo->keymax));
245 return EINVAL;
246 }
247
248 lck_mtx_lock(sadb_mutex);
249 /* already allocated */
250 if (sav->sched && sav->schedlen != 0) {
251 lck_mtx_unlock(sadb_mutex);
252 return 0;
253 }
254 /* no schedule necessary */
255 if (!algo->schedule || !algo->schedlen) {
256 lck_mtx_unlock(sadb_mutex);
257 return 0;
258 }
259
260 sav->schedlen = (*algo->schedlen)(algo);
261 if ((signed) sav->schedlen < 0) {
262 lck_mtx_unlock(sadb_mutex);
263 return EINVAL;
264 }
265
266 //#### that malloc should be replaced by a saved buffer...
267 sav->sched = _MALLOC(sav->schedlen, M_SECA, M_DONTWAIT);
268 if (!sav->sched) {
269 sav->schedlen = 0;
270 lck_mtx_unlock(sadb_mutex);
271 return ENOBUFS;
272 }
273
274 error = (*algo->schedule)(algo, sav);
275 if (error) {
276 ipseclog((LOG_ERR, "esp_schedule %s: error %d\n",
277 algo->name, error));
278 bzero(sav->sched, sav->schedlen);
279 FREE(sav->sched, M_SECA);
280 sav->sched = NULL;
281 sav->schedlen = 0;
282 }
283 lck_mtx_unlock(sadb_mutex);
284 return error;
285 }
286
287 static int
288 esp_null_mature(
289 __unused struct secasvar *sav)
290 {
291
292 /* anything is okay */
293 return 0;
294 }
295
296 static int
297 esp_null_decrypt(
298 __unused struct mbuf *m,
299 __unused size_t off, /* offset to ESP header */
300 __unused struct secasvar *sav,
301 __unused const struct esp_algorithm *algo,
302 __unused int ivlen)
303 {
304
305 return 0; /* do nothing */
306 }
307
308 static int
309 esp_null_encrypt(
310 __unused struct mbuf *m,
311 __unused size_t off, /* offset to ESP header */
312 __unused size_t plen, /* payload length (to be encrypted) */
313 __unused struct secasvar *sav,
314 __unused const struct esp_algorithm *algo,
315 __unused int ivlen)
316 {
317
318 return 0; /* do nothing */
319 }
320
321 static int
322 esp_descbc_mature(sav)
323 struct secasvar *sav;
324 {
325 const struct esp_algorithm *algo;
326
327 if (!(sav->flags & SADB_X_EXT_OLD) && (sav->flags & SADB_X_EXT_IV4B)) {
328 ipseclog((LOG_ERR, "esp_cbc_mature: "
329 "algorithm incompatible with 4 octets IV length\n"));
330 return 1;
331 }
332
333 if (!sav->key_enc) {
334 ipseclog((LOG_ERR, "esp_descbc_mature: no key is given.\n"));
335 return 1;
336 }
337
338 algo = esp_algorithm_lookup(sav->alg_enc);
339 if (!algo) {
340 ipseclog((LOG_ERR,
341 "esp_descbc_mature: unsupported algorithm.\n"));
342 return 1;
343 }
344
345 if (_KEYBITS(sav->key_enc) < algo->keymin ||
346 _KEYBITS(sav->key_enc) > algo->keymax) {
347 ipseclog((LOG_ERR,
348 "esp_descbc_mature: invalid key length %d.\n",
349 _KEYBITS(sav->key_enc)));
350 return 1;
351 }
352
353 /* weak key check */
354 if (des_is_weak_key((des_cblock *)_KEYBUF(sav->key_enc))) {
355 ipseclog((LOG_ERR,
356 "esp_descbc_mature: weak key was passed.\n"));
357 return 1;
358 }
359
360 return 0;
361 }
362
363 static int
364 esp_descbc_ivlen(
365 __unused const struct esp_algorithm *algo,
366 struct secasvar *sav)
367 {
368
369 if (!sav)
370 return 8;
371 if ((sav->flags & SADB_X_EXT_OLD) && (sav->flags & SADB_X_EXT_IV4B))
372 return 4;
373 if (!(sav->flags & SADB_X_EXT_OLD) && (sav->flags & SADB_X_EXT_DERIV))
374 return 4;
375 return 8;
376 }
377
378 static int
379 esp_des_schedlen(
380 __unused const struct esp_algorithm *algo)
381 {
382 return sizeof(des_ecb_key_schedule);
383 }
384
385 static int
386 esp_des_schedule(
387 __unused const struct esp_algorithm *algo,
388 struct secasvar *sav)
389 {
390
391 lck_mtx_assert(sadb_mutex, LCK_MTX_ASSERT_OWNED);
392 if (des_ecb_key_sched((des_cblock *)_KEYBUF(sav->key_enc),
393 (des_ecb_key_schedule *)sav->sched))
394 return EINVAL;
395 else
396 return 0;
397 }
398
399 static int
400 esp_des_blockdecrypt(
401 __unused const struct esp_algorithm *algo,
402 struct secasvar *sav,
403 u_int8_t *s,
404 u_int8_t *d)
405 {
406 /* assumption: d has a good alignment */
407 bcopy(s, d, sizeof(DES_LONG) * 2);
408 des_ecb_encrypt((des_cblock *)d, (des_cblock *)d,
409 (des_ecb_key_schedule *)sav->sched, DES_DECRYPT);
410 return 0;
411 }
412
413 static int
414 esp_des_blockencrypt(
415 __unused const struct esp_algorithm *algo,
416 struct secasvar *sav,
417 u_int8_t *s,
418 u_int8_t *d)
419 {
420 /* assumption: d has a good alignment */
421 bcopy(s, d, sizeof(DES_LONG) * 2);
422 des_ecb_encrypt((des_cblock *)d, (des_cblock *)d,
423 (des_ecb_key_schedule *)sav->sched, DES_ENCRYPT);
424 return 0;
425 }
426
427 static int
428 esp_cbc_mature(sav)
429 struct secasvar *sav;
430 {
431 int keylen;
432 const struct esp_algorithm *algo;
433
434 if (sav->flags & SADB_X_EXT_OLD) {
435 ipseclog((LOG_ERR,
436 "esp_cbc_mature: algorithm incompatible with esp-old\n"));
437 return 1;
438 }
439 if (sav->flags & SADB_X_EXT_DERIV) {
440 ipseclog((LOG_ERR,
441 "esp_cbc_mature: algorithm incompatible with derived\n"));
442 return 1;
443 }
444
445 if (!sav->key_enc) {
446 ipseclog((LOG_ERR, "esp_cbc_mature: no key is given.\n"));
447 return 1;
448 }
449
450 algo = esp_algorithm_lookup(sav->alg_enc);
451 if (!algo) {
452 ipseclog((LOG_ERR,
453 "esp_cbc_mature: unsupported algorithm.\n"));
454 return 1;
455 }
456
457 keylen = sav->key_enc->sadb_key_bits;
458 if (keylen < algo->keymin || algo->keymax < keylen) {
459 ipseclog((LOG_ERR,
460 "esp_cbc_mature %s: invalid key length %d.\n",
461 algo->name, sav->key_enc->sadb_key_bits));
462 return 1;
463 }
464 switch (sav->alg_enc) {
465 case SADB_EALG_3DESCBC:
466 /* weak key check */
467 if (des_is_weak_key((des_cblock *)_KEYBUF(sav->key_enc)) ||
468 des_is_weak_key((des_cblock *)(_KEYBUF(sav->key_enc) + 8)) ||
469 des_is_weak_key((des_cblock *)(_KEYBUF(sav->key_enc) + 16))) {
470 ipseclog((LOG_ERR,
471 "esp_cbc_mature %s: weak key was passed.\n",
472 algo->name));
473 return 1;
474 }
475 break;
476 case SADB_X_EALG_RIJNDAELCBC:
477 /* allows specific key sizes only */
478 if (!(keylen == 128 || keylen == 192 || keylen == 256)) {
479 ipseclog((LOG_ERR,
480 "esp_cbc_mature %s: invalid key length %d.\n",
481 algo->name, keylen));
482 return 1;
483 }
484 break;
485 }
486
487 return 0;
488 }
489
490 static int
491 esp_gcm_mature(sav)
492 struct secasvar *sav;
493 {
494 int keylen;
495 const struct esp_algorithm *algo;
496
497 if (sav->flags & SADB_X_EXT_OLD) {
498 ipseclog((LOG_ERR,
499 "esp_gcm_mature: algorithm incompatible with esp-old\n"));
500 return 1;
501 }
502 if (sav->flags & SADB_X_EXT_DERIV) {
503 ipseclog((LOG_ERR,
504 "esp_gcm_mature: algorithm incompatible with derived\n"));
505 return 1;
506 }
507
508 if (!sav->key_enc) {
509 ipseclog((LOG_ERR, "esp_gcm_mature: no key is given.\n"));
510 return 1;
511 }
512
513 algo = esp_algorithm_lookup(sav->alg_enc);
514 if (!algo) {
515 ipseclog((LOG_ERR,
516 "esp_gcm_mature: unsupported algorithm.\n"));
517 return 1;
518 }
519
520 keylen = sav->key_enc->sadb_key_bits;
521 if (keylen < algo->keymin || algo->keymax < keylen) {
522 ipseclog((LOG_ERR,
523 "esp_gcm_mature %s: invalid key length %d.\n",
524 algo->name, sav->key_enc->sadb_key_bits));
525 return 1;
526 }
527 switch (sav->alg_enc) {
528 case SADB_X_EALG_AES_GCM:
529 /* allows specific key sizes only */
530 if (!(keylen == ESP_AESGCM_KEYLEN128 || keylen == ESP_AESGCM_KEYLEN192 || keylen == ESP_AESGCM_KEYLEN256)) {
531 ipseclog((LOG_ERR,
532 "esp_gcm_mature %s: invalid key length %d.\n",
533 algo->name, keylen));
534 return 1;
535 }
536 break;
537 default:
538 ipseclog((LOG_ERR,
539 "esp_gcm_mature %s: invalid algo %d.\n", sav->alg_enc));
540 return 1;
541 }
542
543 return 0;
544 }
545
546 static int
547 esp_3des_schedlen(
548 __unused const struct esp_algorithm *algo)
549 {
550
551 return sizeof(des3_ecb_key_schedule);
552 }
553
554 static int
555 esp_3des_schedule(
556 __unused const struct esp_algorithm *algo,
557 struct secasvar *sav)
558 {
559 lck_mtx_assert(sadb_mutex, LCK_MTX_ASSERT_OWNED);
560
561 if (des3_ecb_key_sched((des_cblock *)_KEYBUF(sav->key_enc),
562 (des3_ecb_key_schedule *)sav->sched))
563 return EINVAL;
564 else
565 return 0;
566 }
567
568 static int
569 esp_3des_blockdecrypt(
570 __unused const struct esp_algorithm *algo,
571 struct secasvar *sav,
572 u_int8_t *s,
573 u_int8_t *d)
574 {
575 /* assumption: d has a good alignment */
576 bcopy(s, d, sizeof(DES_LONG) * 2);
577 des3_ecb_encrypt((des_cblock *)d, (des_cblock *)d,
578 (des3_ecb_key_schedule *)sav->sched, DES_DECRYPT);
579 return 0;
580 }
581
582 static int
583 esp_3des_blockencrypt(
584 __unused const struct esp_algorithm *algo,
585 struct secasvar *sav,
586 u_int8_t *s,
587 u_int8_t *d)
588 {
589 /* assumption: d has a good alignment */
590 bcopy(s, d, sizeof(DES_LONG) * 2);
591 des3_ecb_encrypt((des_cblock *)d, (des_cblock *)d,
592 (des3_ecb_key_schedule *)sav->sched, DES_ENCRYPT);
593 return 0;
594 }
595
596 static int
597 esp_common_ivlen(
598 const struct esp_algorithm *algo,
599 __unused struct secasvar *sav)
600 {
601
602 if (!algo)
603 panic("esp_common_ivlen: unknown algorithm");
604 return algo->ivlenval;
605 }
606
607 static int
608 esp_cbc_decrypt(m, off, sav, algo, ivlen)
609 struct mbuf *m;
610 size_t off;
611 struct secasvar *sav;
612 const struct esp_algorithm *algo;
613 int ivlen;
614 {
615 struct mbuf *s;
616 struct mbuf *d, *d0, *dp;
617 int soff, doff; /* offset from the head of chain, to head of this mbuf */
618 int sn, dn; /* offset from the head of the mbuf, to meat */
619 size_t ivoff, bodyoff;
620 u_int8_t iv[MAXIVLEN] __attribute__((aligned(4))), *ivp;
621 u_int8_t *sbuf = NULL, *sp, *sp_unaligned;
622 u_int8_t *p, *q;
623 struct mbuf *scut;
624 int scutoff;
625 int i, result = 0;
626 int blocklen;
627 int derived;
628
629 if (ivlen != sav->ivlen || ivlen > sizeof(iv)) {
630 ipseclog((LOG_ERR, "esp_cbc_decrypt %s: "
631 "unsupported ivlen %d\n", algo->name, ivlen));
632 m_freem(m);
633 return EINVAL;
634 }
635
636 /* assumes blocklen == padbound */
637 blocklen = algo->padbound;
638
639 #if DIAGNOSTIC
640 if (blocklen > sizeof(iv)) {
641 ipseclog((LOG_ERR, "esp_cbc_decrypt %s: "
642 "unsupported blocklen %d\n", algo->name, blocklen));
643 m_freem(m);
644 return EINVAL;
645 }
646 #endif
647
648 if (sav->flags & SADB_X_EXT_OLD) {
649 /* RFC 1827 */
650 ivoff = off + sizeof(struct esp);
651 bodyoff = off + sizeof(struct esp) + ivlen;
652 derived = 0;
653 } else {
654 /* RFC 2406 */
655 if (sav->flags & SADB_X_EXT_DERIV) {
656 /*
657 * draft-ietf-ipsec-ciph-des-derived-00.txt
658 * uses sequence number field as IV field.
659 */
660 ivoff = off + sizeof(struct esp);
661 bodyoff = off + sizeof(struct esp) + sizeof(u_int32_t);
662 ivlen = sizeof(u_int32_t);
663 derived = 1;
664 } else {
665 ivoff = off + sizeof(struct newesp);
666 bodyoff = off + sizeof(struct newesp) + ivlen;
667 derived = 0;
668 }
669 }
670
671 /* grab iv */
672 m_copydata(m, ivoff, ivlen, (caddr_t) iv);
673
674 /* extend iv */
675 if (ivlen == blocklen)
676 ;
677 else if (ivlen == 4 && blocklen == 8) {
678 bcopy(&iv[0], &iv[4], 4);
679 iv[4] ^= 0xff;
680 iv[5] ^= 0xff;
681 iv[6] ^= 0xff;
682 iv[7] ^= 0xff;
683 } else {
684 ipseclog((LOG_ERR, "esp_cbc_encrypt %s: "
685 "unsupported ivlen/blocklen: %d %d\n",
686 algo->name, ivlen, blocklen));
687 m_freem(m);
688 return EINVAL;
689 }
690
691 if (m->m_pkthdr.len < bodyoff) {
692 ipseclog((LOG_ERR, "esp_cbc_decrypt %s: bad len %d/%lu\n",
693 algo->name, m->m_pkthdr.len, (u_int32_t)bodyoff));
694 m_freem(m);
695 return EINVAL;
696 }
697 if ((m->m_pkthdr.len - bodyoff) % blocklen) {
698 ipseclog((LOG_ERR, "esp_cbc_decrypt %s: "
699 "payload length must be multiple of %d\n",
700 algo->name, blocklen));
701 m_freem(m);
702 return EINVAL;
703 }
704
705 s = m;
706 d = d0 = dp = NULL;
707 soff = doff = sn = dn = 0;
708 ivp = sp = NULL;
709
710 /* skip bodyoff */
711 while (soff < bodyoff) {
712 if (soff + s->m_len > bodyoff) {
713 sn = bodyoff - soff;
714 break;
715 }
716
717 soff += s->m_len;
718 s = s->m_next;
719 }
720 scut = s;
721 scutoff = sn;
722
723 /* skip over empty mbuf */
724 while (s && s->m_len == 0)
725 s = s->m_next;
726
727 // Allocate blocksized buffer for unaligned or non-contiguous access
728 sbuf = (u_int8_t *)_MALLOC(blocklen, M_SECA, M_DONTWAIT);
729 if (sbuf == NULL)
730 return ENOBUFS;
731 while (soff < m->m_pkthdr.len) {
732 /* source */
733 if (sn + blocklen <= s->m_len) {
734 /* body is continuous */
735 sp = mtod(s, u_int8_t *) + sn;
736 } else {
737 /* body is non-continuous */
738 m_copydata(s, sn, blocklen, (caddr_t) sbuf);
739 sp = sbuf;
740 }
741
742 /* destination */
743 if (!d || dn + blocklen > d->m_len) {
744 if (d)
745 dp = d;
746 MGET(d, M_DONTWAIT, MT_DATA);
747 i = m->m_pkthdr.len - (soff + sn);
748 if (d && i > MLEN) {
749 MCLGET(d, M_DONTWAIT);
750 if ((d->m_flags & M_EXT) == 0) {
751 m_free(d);
752 d = NULL;
753 }
754 }
755 if (!d) {
756 m_freem(m);
757 if (d0)
758 m_freem(d0);
759 result = ENOBUFS;
760 goto end;
761 }
762 if (!d0)
763 d0 = d;
764 if (dp)
765 dp->m_next = d;
766
767 // try to make mbuf data aligned
768 if (!IPSEC_IS_P2ALIGNED(d->m_data)) {
769 m_adj(d, IPSEC_GET_P2UNALIGNED_OFS(d->m_data));
770 }
771
772 d->m_len = 0;
773 d->m_len = (M_TRAILINGSPACE(d) / blocklen) * blocklen;
774 if (d->m_len > i)
775 d->m_len = i;
776 dn = 0;
777 }
778
779 /* decrypt */
780 // check input pointer alignment and use a separate aligned buffer (if sp is unaligned on 4-byte boundary).
781 if (IPSEC_IS_P2ALIGNED(sp)) {
782 sp_unaligned = NULL;
783 } else {
784 sp_unaligned = sp;
785 sp = sbuf;
786 memcpy(sp, sp_unaligned, blocklen);
787 }
788 // no need to check output pointer alignment
789 (*algo->blockdecrypt)(algo, sav, sp, mtod(d, u_int8_t *) + dn);
790
791 // update unaligned pointers
792 if (!IPSEC_IS_P2ALIGNED(sp_unaligned)) {
793 sp = sp_unaligned;
794 }
795
796 /* xor */
797 p = ivp ? ivp : iv;
798 q = mtod(d, u_int8_t *) + dn;
799 for (i = 0; i < blocklen; i++)
800 q[i] ^= p[i];
801
802 /* next iv */
803 if (sp == sbuf) {
804 bcopy(sbuf, iv, blocklen);
805 ivp = NULL;
806 } else
807 ivp = sp;
808
809 sn += blocklen;
810 dn += blocklen;
811
812 /* find the next source block */
813 while (s && sn >= s->m_len) {
814 sn -= s->m_len;
815 soff += s->m_len;
816 s = s->m_next;
817 }
818 }
819
820 m_freem(scut->m_next);
821 scut->m_len = scutoff;
822 scut->m_next = d0;
823
824 /* just in case */
825 bzero(iv, sizeof(iv));
826 bzero(sbuf, blocklen);
827 end:
828 if (sbuf != NULL)
829 FREE(sbuf, M_SECA);
830 return result;
831 }
832
833 static int
834 esp_cbc_encrypt(
835 struct mbuf *m,
836 size_t off,
837 __unused size_t plen,
838 struct secasvar *sav,
839 const struct esp_algorithm *algo,
840 int ivlen)
841 {
842 struct mbuf *s;
843 struct mbuf *d, *d0, *dp;
844 int soff, doff; /* offset from the head of chain, to head of this mbuf */
845 int sn, dn; /* offset from the head of the mbuf, to meat */
846 size_t ivoff, bodyoff;
847 u_int8_t iv[MAXIVLEN] __attribute__((aligned(4))), *ivp;
848 u_int8_t *sbuf = NULL, *sp, *sp_unaligned;
849 u_int8_t *p, *q;
850 struct mbuf *scut;
851 int scutoff;
852 int i, result = 0;
853 int blocklen;
854 int derived;
855
856 if (ivlen != sav->ivlen || ivlen > sizeof(iv)) {
857 ipseclog((LOG_ERR, "esp_cbc_encrypt %s: "
858 "unsupported ivlen %d\n", algo->name, ivlen));
859 m_freem(m);
860 return EINVAL;
861 }
862
863 /* assumes blocklen == padbound */
864 blocklen = algo->padbound;
865
866 #if DIAGNOSTIC
867 if (blocklen > sizeof(iv)) {
868 ipseclog((LOG_ERR, "esp_cbc_encrypt %s: "
869 "unsupported blocklen %d\n", algo->name, blocklen));
870 m_freem(m);
871 return EINVAL;
872 }
873 #endif
874
875 if (sav->flags & SADB_X_EXT_OLD) {
876 /* RFC 1827 */
877 ivoff = off + sizeof(struct esp);
878 bodyoff = off + sizeof(struct esp) + ivlen;
879 derived = 0;
880 } else {
881 /* RFC 2406 */
882 if (sav->flags & SADB_X_EXT_DERIV) {
883 /*
884 * draft-ietf-ipsec-ciph-des-derived-00.txt
885 * uses sequence number field as IV field.
886 */
887 ivoff = off + sizeof(struct esp);
888 bodyoff = off + sizeof(struct esp) + sizeof(u_int32_t);
889 ivlen = sizeof(u_int32_t);
890 derived = 1;
891 } else {
892 ivoff = off + sizeof(struct newesp);
893 bodyoff = off + sizeof(struct newesp) + ivlen;
894 derived = 0;
895 }
896 }
897
898 /* put iv into the packet. if we are in derived mode, use seqno. */
899 if (derived)
900 m_copydata(m, ivoff, ivlen, (caddr_t) iv);
901 else {
902 bcopy(sav->iv, iv, ivlen);
903 /* maybe it is better to overwrite dest, not source */
904 m_copyback(m, ivoff, ivlen, (caddr_t) iv);
905 }
906
907 /* extend iv */
908 if (ivlen == blocklen)
909 ;
910 else if (ivlen == 4 && blocklen == 8) {
911 bcopy(&iv[0], &iv[4], 4);
912 iv[4] ^= 0xff;
913 iv[5] ^= 0xff;
914 iv[6] ^= 0xff;
915 iv[7] ^= 0xff;
916 } else {
917 ipseclog((LOG_ERR, "esp_cbc_encrypt %s: "
918 "unsupported ivlen/blocklen: %d %d\n",
919 algo->name, ivlen, blocklen));
920 m_freem(m);
921 return EINVAL;
922 }
923
924 if (m->m_pkthdr.len < bodyoff) {
925 ipseclog((LOG_ERR, "esp_cbc_encrypt %s: bad len %d/%lu\n",
926 algo->name, m->m_pkthdr.len, (u_int32_t)bodyoff));
927 m_freem(m);
928 return EINVAL;
929 }
930 if ((m->m_pkthdr.len - bodyoff) % blocklen) {
931 ipseclog((LOG_ERR, "esp_cbc_encrypt %s: "
932 "payload length must be multiple of %lu\n",
933 algo->name, (u_int32_t)algo->padbound));
934 m_freem(m);
935 return EINVAL;
936 }
937
938 s = m;
939 d = d0 = dp = NULL;
940 soff = doff = sn = dn = 0;
941 ivp = sp = NULL;
942
943 /* skip bodyoff */
944 while (soff < bodyoff) {
945 if (soff + s->m_len > bodyoff) {
946 sn = bodyoff - soff;
947 break;
948 }
949
950 soff += s->m_len;
951 s = s->m_next;
952 }
953 scut = s;
954 scutoff = sn;
955
956 /* skip over empty mbuf */
957 while (s && s->m_len == 0)
958 s = s->m_next;
959
960 // Allocate blocksized buffer for unaligned or non-contiguous access
961 sbuf = (u_int8_t *)_MALLOC(blocklen, M_SECA, M_DONTWAIT);
962 if (sbuf == NULL)
963 return ENOBUFS;
964 while (soff < m->m_pkthdr.len) {
965 /* source */
966 if (sn + blocklen <= s->m_len) {
967 /* body is continuous */
968 sp = mtod(s, u_int8_t *) + sn;
969 } else {
970 /* body is non-continuous */
971 m_copydata(s, sn, blocklen, (caddr_t) sbuf);
972 sp = sbuf;
973 }
974
975 /* destination */
976 if (!d || dn + blocklen > d->m_len) {
977 if (d)
978 dp = d;
979 MGET(d, M_DONTWAIT, MT_DATA);
980 i = m->m_pkthdr.len - (soff + sn);
981 if (d && i > MLEN) {
982 MCLGET(d, M_DONTWAIT);
983 if ((d->m_flags & M_EXT) == 0) {
984 m_free(d);
985 d = NULL;
986 }
987 }
988 if (!d) {
989 m_freem(m);
990 if (d0)
991 m_freem(d0);
992 result = ENOBUFS;
993 goto end;
994 }
995 if (!d0)
996 d0 = d;
997 if (dp)
998 dp->m_next = d;
999
1000 // try to make mbuf data aligned
1001 if (!IPSEC_IS_P2ALIGNED(d->m_data)) {
1002 m_adj(d, IPSEC_GET_P2UNALIGNED_OFS(d->m_data));
1003 }
1004
1005 d->m_len = 0;
1006 d->m_len = (M_TRAILINGSPACE(d) / blocklen) * blocklen;
1007 if (d->m_len > i)
1008 d->m_len = i;
1009 dn = 0;
1010 }
1011
1012 /* xor */
1013 p = ivp ? ivp : iv;
1014 q = sp;
1015 for (i = 0; i < blocklen; i++)
1016 q[i] ^= p[i];
1017
1018 /* encrypt */
1019 // check input pointer alignment and use a separate aligned buffer (if sp is not aligned on 4-byte boundary).
1020 if (IPSEC_IS_P2ALIGNED(sp)) {
1021 sp_unaligned = NULL;
1022 } else {
1023 sp_unaligned = sp;
1024 sp = sbuf;
1025 memcpy(sp, sp_unaligned, blocklen);
1026 }
1027 // no need to check output pointer alignment
1028 (*algo->blockencrypt)(algo, sav, sp, mtod(d, u_int8_t *) + dn);
1029
1030 // update unaligned pointers
1031 if (!IPSEC_IS_P2ALIGNED(sp_unaligned)) {
1032 sp = sp_unaligned;
1033 }
1034
1035 /* next iv */
1036 ivp = mtod(d, u_int8_t *) + dn;
1037
1038 sn += blocklen;
1039 dn += blocklen;
1040
1041 /* find the next source block */
1042 while (s && sn >= s->m_len) {
1043 sn -= s->m_len;
1044 soff += s->m_len;
1045 s = s->m_next;
1046 }
1047 }
1048
1049 m_freem(scut->m_next);
1050 scut->m_len = scutoff;
1051 scut->m_next = d0;
1052
1053 /* just in case */
1054 bzero(iv, sizeof(iv));
1055 bzero(sbuf, blocklen);
1056
1057 key_sa_stir_iv(sav);
1058 end:
1059 if (sbuf != NULL)
1060 FREE(sbuf, M_SECA);
1061 return result;
1062 }
1063
1064 /*------------------------------------------------------------*/
1065
1066 /* does not free m0 on error */
1067 int
1068 esp_auth(m0, skip, length, sav, sum)
1069 struct mbuf *m0;
1070 size_t skip; /* offset to ESP header */
1071 size_t length; /* payload length */
1072 struct secasvar *sav;
1073 u_char *sum;
1074 {
1075 struct mbuf *m;
1076 size_t off;
1077 struct ah_algorithm_state s;
1078 u_char sumbuf[AH_MAXSUMSIZE] __attribute__((aligned(4)));
1079 const struct ah_algorithm *algo;
1080 size_t siz;
1081 int error;
1082
1083 /* sanity checks */
1084 if (m0->m_pkthdr.len < skip) {
1085 ipseclog((LOG_DEBUG, "esp_auth: mbuf length < skip\n"));
1086 return EINVAL;
1087 }
1088 if (m0->m_pkthdr.len < skip + length) {
1089 ipseclog((LOG_DEBUG,
1090 "esp_auth: mbuf length < skip + length\n"));
1091 return EINVAL;
1092 }
1093
1094 KERNEL_DEBUG(DBG_FNC_ESPAUTH | DBG_FUNC_START, skip,length,0,0,0);
1095 /*
1096 * length of esp part (excluding authentication data) must be 4n,
1097 * since nexthdr must be at offset 4n+3.
1098 */
1099 if (length % 4) {
1100 ipseclog((LOG_ERR, "esp_auth: length is not multiple of 4\n"));
1101 KERNEL_DEBUG(DBG_FNC_ESPAUTH | DBG_FUNC_END, 1,0,0,0,0);
1102 return EINVAL;
1103 }
1104 if (!sav) {
1105 ipseclog((LOG_DEBUG, "esp_auth: NULL SA passed\n"));
1106 KERNEL_DEBUG(DBG_FNC_ESPAUTH | DBG_FUNC_END, 2,0,0,0,0);
1107 return EINVAL;
1108 }
1109 algo = ah_algorithm_lookup(sav->alg_auth);
1110 if (!algo) {
1111 ipseclog((LOG_ERR,
1112 "esp_auth: bad ESP auth algorithm passed: %d\n",
1113 sav->alg_auth));
1114 KERNEL_DEBUG(DBG_FNC_ESPAUTH | DBG_FUNC_END, 3,0,0,0,0);
1115 return EINVAL;
1116 }
1117
1118 m = m0;
1119 off = 0;
1120
1121 siz = (((*algo->sumsiz)(sav) + 3) & ~(4 - 1));
1122 if (sizeof(sumbuf) < siz) {
1123 ipseclog((LOG_DEBUG,
1124 "esp_auth: AH_MAXSUMSIZE is too small: siz=%lu\n",
1125 (u_int32_t)siz));
1126 KERNEL_DEBUG(DBG_FNC_ESPAUTH | DBG_FUNC_END, 4,0,0,0,0);
1127 return EINVAL;
1128 }
1129
1130 /* skip the header */
1131 while (skip) {
1132 if (!m)
1133 panic("mbuf chain?");
1134 if (m->m_len <= skip) {
1135 skip -= m->m_len;
1136 m = m->m_next;
1137 off = 0;
1138 } else {
1139 off = skip;
1140 skip = 0;
1141 }
1142 }
1143
1144 error = (*algo->init)(&s, sav);
1145 if (error) {
1146 KERNEL_DEBUG(DBG_FNC_ESPAUTH | DBG_FUNC_END, 5,0,0,0,0);
1147 return error;
1148 }
1149 while (0 < length) {
1150 if (!m)
1151 panic("mbuf chain?");
1152
1153 if (m->m_len - off < length) {
1154 (*algo->update)(&s, (caddr_t)(mtod(m, u_char *) + off),
1155 m->m_len - off);
1156 length -= m->m_len - off;
1157 m = m->m_next;
1158 off = 0;
1159 } else {
1160 (*algo->update)(&s, (caddr_t)(mtod(m, u_char *) + off), length);
1161 break;
1162 }
1163 }
1164 (*algo->result)(&s, (caddr_t) sumbuf, sizeof(sumbuf));
1165 bcopy(sumbuf, sum, siz); /*XXX*/
1166 KERNEL_DEBUG(DBG_FNC_ESPAUTH | DBG_FUNC_END, 6,0,0,0,0);
1167 return 0;
1168 }