]>
git.saurik.com Git - apple/xnu.git/blob - bsd/netinet6/esp_rijndael.c
1 /* $FreeBSD: src/sys/netinet6/esp_rijndael.c,v 1.1.2.1 2001/07/03 11:01:50 ume Exp $ */
2 /* $KAME: esp_rijndael.c,v 1.4 2001/03/02 05:53:05 itojun Exp $ */
5 * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
11 * 1. Redistributions of source code must retain the above copyright
12 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
16 * 3. Neither the name of the project nor the names of its contributors
17 * may be used to endorse or promote products derived from this software
18 * without specific prior written permission.
20 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
21 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
23 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
24 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
25 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
26 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
27 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
28 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
29 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
33 #include <sys/param.h>
34 #include <sys/systm.h>
35 #include <sys/socket.h>
36 #include <sys/queue.h>
37 #include <sys/syslog.h>
40 #include <kern/locks.h>
43 #include <net/route.h>
45 #include <netinet6/ipsec.h>
46 #include <netinet6/esp.h>
47 #include <netinet6/esp_rijndael.h>
49 #include <crypto/aes/aes.h>
51 #include <net/net_osdep.h>
53 #define AES_BLOCKLEN 16
55 extern lck_mtx_t
*sadb_mutex
;
58 esp_aes_schedlen(algo
)
59 const struct esp_algorithm
*algo
;
62 return sizeof(aes_ctx
);
66 esp_aes_schedule(algo
, sav
)
67 const struct esp_algorithm
*algo
;
70 aes_ctx
*ctx
= (aes_ctx
*)sav
->sched
;
73 aes_decrypt_key(_KEYBUF(sav
->key_enc
), _KEYLEN(sav
->key_enc
), &ctx
->decrypt
);
74 aes_encrypt_key(_KEYBUF(sav
->key_enc
), _KEYLEN(sav
->key_enc
), &ctx
->encrypt
);
80 /* The following 2 functions decrypt or encrypt the contents of
81 * the mbuf chain passed in keeping the IP and ESP header's in place,
83 * The code attempts to call the crypto code with the largest chunk
84 * of data it can based on the amount of source data in
85 * the current source mbuf and the space remaining in the current
86 * destination mbuf. The crypto code requires data to be a multiples
87 * of 16 bytes. A separate buffer is used when a 16 byte block spans
91 * off = offset to ESP header
93 * local vars for source:
94 * soff = offset from beginning of the chain to the head of the
96 * scut = last mbuf that contains headers to be retained
97 * scutoff = offset to end of the headers in scut
98 * s = the current mbuf
99 * sn = current offset to data in s (next source data to process)
101 * local vars for dest:
104 * dn = current offset in d (next location to store result)
109 esp_cbc_decrypt_aes(m
, off
, sav
, algo
, ivlen
)
112 struct secasvar
*sav
;
113 const struct esp_algorithm
*algo
;
117 struct mbuf
*d
, *d0
, *dp
;
118 int soff
; /* offset from the head of chain, to head of this mbuf */
119 int sn
, dn
; /* offset from the head of the mbuf, to meat */
120 size_t ivoff
, bodyoff
;
121 u_int8_t iv
[AES_BLOCKLEN
], *dptr
;
122 u_int8_t sbuf
[AES_BLOCKLEN
], *sp
;
128 if (ivlen
!= AES_BLOCKLEN
) {
129 ipseclog((LOG_ERR
, "esp_cbc_decrypt %s: "
130 "unsupported ivlen %d\n", algo
->name
, ivlen
));
135 if (sav
->flags
& SADB_X_EXT_OLD
) {
137 ivoff
= off
+ sizeof(struct esp
);
138 bodyoff
= off
+ sizeof(struct esp
) + ivlen
;
140 ivoff
= off
+ sizeof(struct newesp
);
141 bodyoff
= off
+ sizeof(struct newesp
) + ivlen
;
144 if (m
->m_pkthdr
.len
< bodyoff
) {
145 ipseclog((LOG_ERR
, "esp_cbc_decrypt %s: bad len %d/%lu\n",
146 algo
->name
, m
->m_pkthdr
.len
, (unsigned long)bodyoff
));
150 if ((m
->m_pkthdr
.len
- bodyoff
) % AES_BLOCKLEN
) {
151 ipseclog((LOG_ERR
, "esp_cbc_decrypt %s: "
152 "payload length must be multiple of %d\n",
153 algo
->name
, AES_BLOCKLEN
));
159 m_copydata(m
, ivoff
, ivlen
, iv
);
161 lck_mtx_unlock(sadb_mutex
);
167 /* skip header/IV offset */
168 while (soff
< bodyoff
) {
169 if (soff
+ s
->m_len
> bodyoff
) {
180 /* skip over empty mbuf */
181 while (s
&& s
->m_len
== 0)
184 while (soff
< m
->m_pkthdr
.len
) {
186 if (sn
+ AES_BLOCKLEN
<= s
->m_len
) {
187 /* body is continuous */
188 sp
= mtod(s
, u_int8_t
*) + sn
;
190 len
-= len
% AES_BLOCKLEN
; // full blocks only
192 /* body is non-continuous */
193 m_copydata(s
, sn
, AES_BLOCKLEN
, sbuf
);
195 len
= AES_BLOCKLEN
; // 1 block only in sbuf
199 if (!d
|| dn
+ AES_BLOCKLEN
> d
->m_len
) {
202 MGET(d
, M_DONTWAIT
, MT_DATA
);
203 i
= m
->m_pkthdr
.len
- (soff
+ sn
);
205 MCLGET(d
, M_DONTWAIT
);
206 if ((d
->m_flags
& M_EXT
) == 0) {
215 lck_mtx_lock(sadb_mutex
);
222 d
->m_len
= M_TRAILINGSPACE(d
);
223 d
->m_len
-= d
->m_len
% AES_BLOCKLEN
;
226 dptr
= mtod(d
, u_int8_t
*);
230 /* adjust len if greater than space available in dest */
231 if (len
> d
->m_len
- dn
)
235 aes_decrypt_cbc(sp
, iv
, len
>> 4, dptr
+ dn
,
236 (aes_decrypt_ctx
*)(&(((aes_ctx
*)sav
->sched
)->decrypt
)));
243 bcopy(sp
+ len
- AES_BLOCKLEN
, iv
, AES_BLOCKLEN
);
245 /* find the next source block */
246 while (s
&& sn
>= s
->m_len
) {
254 /* free un-needed source mbufs and add dest mbufs to chain */
255 m_freem(scut
->m_next
);
256 scut
->m_len
= scutoff
;
260 bzero(iv
, sizeof(iv
));
261 bzero(sbuf
, sizeof(sbuf
));
262 lck_mtx_lock(sadb_mutex
);
268 esp_cbc_encrypt_aes(m
, off
, plen
, sav
, algo
, ivlen
)
272 struct secasvar
*sav
;
273 const struct esp_algorithm
*algo
;
277 struct mbuf
*d
, *d0
, *dp
;
278 int soff
, doff
; /* offset from the head of chain, to head of this mbuf */
279 int sn
, dn
; /* offset from the head of the mbuf, to meat */
280 size_t ivoff
, bodyoff
;
281 u_int8_t
*ivp
, *dptr
;
282 u_int8_t sbuf
[AES_BLOCKLEN
], *sp
;
287 if (ivlen
!= AES_BLOCKLEN
) {
288 ipseclog((LOG_ERR
, "esp_cbc_encrypt %s: "
289 "unsupported ivlen %d\n", algo
->name
, ivlen
));
294 if (sav
->flags
& SADB_X_EXT_OLD
) {
296 ivoff
= off
+ sizeof(struct esp
);
297 bodyoff
= off
+ sizeof(struct esp
) + ivlen
;
299 ivoff
= off
+ sizeof(struct newesp
);
300 bodyoff
= off
+ sizeof(struct newesp
) + ivlen
;
303 /* put iv into the packet */
304 m_copyback(m
, ivoff
, ivlen
, sav
->iv
);
307 if (m
->m_pkthdr
.len
< bodyoff
) {
308 ipseclog((LOG_ERR
, "esp_cbc_encrypt %s: bad len %d/%lu\n",
309 algo
->name
, m
->m_pkthdr
.len
, (unsigned long)bodyoff
));
313 if ((m
->m_pkthdr
.len
- bodyoff
) % AES_BLOCKLEN
) {
314 ipseclog((LOG_ERR
, "esp_cbc_encrypt %s: "
315 "payload length must be multiple of %lu\n",
316 algo
->name
, AES_BLOCKLEN
));
320 lck_mtx_unlock(sadb_mutex
);
327 /* skip headers/IV */
328 while (soff
< bodyoff
) {
329 if (soff
+ s
->m_len
> bodyoff
) {
340 /* skip over empty mbuf */
341 while (s
&& s
->m_len
== 0)
344 while (soff
< m
->m_pkthdr
.len
) {
346 if (sn
+ AES_BLOCKLEN
<= s
->m_len
) {
347 /* body is continuous */
348 sp
= mtod(s
, u_int8_t
*) + sn
;
350 len
-= len
% AES_BLOCKLEN
; // full blocks only
352 /* body is non-continuous */
353 m_copydata(s
, sn
, AES_BLOCKLEN
, sbuf
);
355 len
= AES_BLOCKLEN
; // 1 block only in sbuf
359 if (!d
|| dn
+ AES_BLOCKLEN
> d
->m_len
) {
362 MGET(d
, M_DONTWAIT
, MT_DATA
);
363 i
= m
->m_pkthdr
.len
- (soff
+ sn
);
365 MCLGET(d
, M_DONTWAIT
);
366 if ((d
->m_flags
& M_EXT
) == 0) {
375 lck_mtx_lock(sadb_mutex
);
383 d
->m_len
= M_TRAILINGSPACE(d
);
384 d
->m_len
-= d
->m_len
% AES_BLOCKLEN
;
387 dptr
= mtod(d
, u_int8_t
*);
391 /* adjust len if greater than space available */
392 if (len
> d
->m_len
- dn
)
396 aes_encrypt_cbc(sp
, ivp
, len
>> 4, dptr
+ dn
,
397 (aes_encrypt_ctx
*)(&(((aes_ctx
*)sav
->sched
)->encrypt
)));
404 ivp
= dptr
+ dn
- AES_BLOCKLEN
; // last block encrypted
406 /* find the next source block and skip empty mbufs */
407 while (s
&& sn
>= s
->m_len
) {
415 /* free un-needed source mbufs and add dest mbufs to chain */
416 m_freem(scut
->m_next
);
417 scut
->m_len
= scutoff
;
421 bzero(sbuf
, sizeof(sbuf
));
422 lck_mtx_lock(sadb_mutex
);