esp_input.c

来自「eCos操作系统源码」· C语言 代码 · 共 1,072 行 · 第 1/2 页

C
1,072
字号
//==========================================================================////      src/sys/netinet6/esp_input.c////==========================================================================//####BSDCOPYRIGHTBEGIN####//// -------------------------------------------//// Portions of this software may have been derived from OpenBSD, // FreeBSD or other sources, and are covered by the appropriate// copyright disclaimers included herein.//// Portions created by Red Hat are// Copyright (C) 2002 Red Hat, Inc. All Rights Reserved.//// -------------------------------------------////####BSDCOPYRIGHTEND####//==========================================================================/*	$KAME: esp_input.c,v 1.61 2001/10/19 05:20:55 itojun Exp $	*//* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors *    may be used to endorse or promote products derived from this software *    without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. *//* * RFC1827/2406 Encapsulated Security Payload. */#include <sys/param.h>#if !(defined(__FreeBSD__) && __FreeBSD__ >= 4)#include <sys/malloc.h>#endif#include <sys/mbuf.h>#include <sys/domain.h>#include <sys/protosw.h>#include <sys/socket.h>#include <sys/errno.h>#include <sys/time.h>#include <net/if.h>#include <net/route.h>#include <net/netisr.h>#include <netinet/in.h>#include <netinet/in_systm.h>#include <netinet/ip.h>#include <netinet/ip_var.h>#include <netinet/in_var.h>#include <netinet/ip_ecn.h>#if defined(__NetBSD__) && __NetBSD_Version__ >= 105080000	/* 1.5H */#include <netinet/ip_icmp.h>#endif#ifdef INET6#include <netinet/ip6.h>#include <netinet/in_pcb.h>#include <netinet6/in6_pcb.h>#include <netinet6/ip6_var.h>#include <netinet/icmp6.h>#include <netinet6/ip6protosw.h>#endif#include <netinet6/ipsec.h>#include <netinet6/ah.h>#include <netinet6/esp.h>#include <netkey/key.h>#include <netkey/keydb.h>#include <netkey/key_debug.h>#define IPLEN_FLIPPED#define ESPMAXLEN \	(sizeof(struct esp) < sizeof(struct newesp) \		? sizeof(struct newesp) : sizeof(struct esp))#ifdef INETextern struct protosw inetsw[];#if defined(__bsdi__) || defined(__NetBSD__)extern u_char ip_protox[];#endifvoid#if (defined(__FreeBSD__) && __FreeBSD__ >= 4)esp4_input(m, off)	struct mbuf *m;	int off;#else#if __STDC__esp4_input(struct mbuf *m, ...)#elseesp4_input(m, va_alist)	struct mbuf *m;	va_dcl#endif#endif /* (defined(__FreeBSD__) && __FreeBSD__ >= 4) */{	struct ip *ip;	struct esp *esp;	struct esptail esptail;	u_int32_t spi;	struct secasvar *sav = NULL;	size_t taillen;	u_int16_t nxt;	const struct esp_algorithm *algo;	int ivlen;	size_t hlen;	size_t esplen;	int s;#if !(defined(__FreeBSD__) && __FreeBSD__ >= 4)	va_list ap;	int off, proto;#endif /* !(defined(__FreeBSD__) && __FreeBSD__ >= 4) */#if !(defined(__FreeBSD__) && __FreeBSD__ >= 4)	va_start(ap, m);	off = va_arg(ap, int);	proto = va_arg(ap, int);	va_end(ap);#endif /* !(defined(__FreeBSD__) && __FreeBSD__ >= 4) */	/* sanity check for alignment. */	if (off % 4 != 0 || m->m_pkthdr.len % 4 != 0) {		ipseclog((LOG_ERR, "IPv4 ESP input: packet alignment problem "			"(off=%d, pktlen=%d)\n", off, m->m_pkthdr.len));		ipsecstat.in_inval++;		goto bad;	}	if (m->m_len < off + ESPMAXLEN) {		m = m_pullup(m, off + ESPMAXLEN);		if (!m) {			ipseclog((LOG_DEBUG,			    "IPv4 ESP input: can't pullup in esp4_input\n"));			ipsecstat.in_inval++;			goto bad;		}	}	ip = mtod(m, struct ip *);	esp = (struct esp *)(((u_int8_t *)ip) + off);#ifdef _IP_VHL	hlen = IP_VHL_HL(ip->ip_vhl) << 2;#else	hlen = ip->ip_hl << 2;#endif	/* find the sassoc. */	spi = esp->esp_spi;	if ((sav = key_allocsa(AF_INET,	                      (caddr_t)&ip->ip_src, (caddr_t)&ip->ip_dst,	                      IPPROTO_ESP, spi)) == 0) {		ipseclog((LOG_WARNING,		    "IPv4 ESP input: no key association found for spi %u\n",		    (u_int32_t)ntohl(spi)));		ipsecstat.in_nosa++;		goto bad;	}	KEYDEBUG(KEYDEBUG_IPSEC_STAMP,		printf("DP esp4_input called to allocate SA:%p\n", sav));	if (sav->state != SADB_SASTATE_MATURE	 && sav->state != SADB_SASTATE_DYING) {		ipseclog((LOG_DEBUG,		    "IPv4 ESP input: non-mature/dying SA found for spi %u\n",		    (u_int32_t)ntohl(spi)));		ipsecstat.in_badspi++;		goto bad;	}	algo = esp_algorithm_lookup(sav->alg_enc);	if (!algo) {		ipseclog((LOG_DEBUG, "IPv4 ESP input: "		    "unsupported encryption algorithm for spi %u\n",		    (u_int32_t)ntohl(spi)));		ipsecstat.in_badspi++;		goto bad;	}	/* check if we have proper ivlen information */	ivlen = sav->ivlen;	if (ivlen < 0) {		ipseclog((LOG_ERR, "inproper ivlen in IPv4 ESP input: %s %s\n",		    ipsec4_logpacketstr(ip, spi), ipsec_logsastr(sav)));		ipsecstat.in_inval++;		goto bad;	}	if (!((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay	 && (sav->alg_auth && sav->key_auth)))		goto noreplaycheck;	if (sav->alg_auth == SADB_X_AALG_NULL ||	    sav->alg_auth == SADB_AALG_NONE)		goto noreplaycheck;	/*	 * check for sequence number.	 */	if (ipsec_chkreplay(ntohl(((struct newesp *)esp)->esp_seq), sav))		; /* okey */	else {		ipsecstat.in_espreplay++;		ipseclog((LOG_WARNING,		    "replay packet in IPv4 ESP input: %s %s\n",		    ipsec4_logpacketstr(ip, spi), ipsec_logsastr(sav)));		goto bad;	}	/* check ICV */    {	u_char sum0[AH_MAXSUMSIZE];	u_char sum[AH_MAXSUMSIZE];	const struct ah_algorithm *sumalgo;	size_t siz;	sumalgo = ah_algorithm_lookup(sav->alg_auth);	if (!sumalgo)		goto noreplaycheck;	siz = (((*sumalgo->sumsiz)(sav) + 3) & ~(4 - 1));	if (AH_MAXSUMSIZE < siz) {		ipseclog((LOG_DEBUG,		    "internal error: AH_MAXSUMSIZE must be larger than %lu\n",		    (u_long)siz));		ipsecstat.in_inval++;		goto bad;	}	m_copydata(m, m->m_pkthdr.len - siz, siz, &sum0[0]);	if (esp_auth(m, off, m->m_pkthdr.len - off - siz, sav, sum)) {		ipseclog((LOG_WARNING, "auth fail in IPv4 ESP input: %s %s\n",		    ipsec4_logpacketstr(ip, spi), ipsec_logsastr(sav)));		ipsecstat.in_espauthfail++;		goto bad;	}	if (bcmp(sum0, sum, siz) != 0) {		ipseclog((LOG_WARNING, "auth fail in IPv4 ESP input: %s %s\n",		    ipsec4_logpacketstr(ip, spi), ipsec_logsastr(sav)));		ipsecstat.in_espauthfail++;		goto bad;	}	/* strip off the authentication data */	m_adj(m, -siz);	ip = mtod(m, struct ip *);#ifdef IPLEN_FLIPPED	ip->ip_len = ip->ip_len - siz;#else	ip->ip_len = htons(ntohs(ip->ip_len) - siz);#endif	m->m_flags |= M_AUTHIPDGM;	ipsecstat.in_espauthsucc++;    }	/*	 * update sequence number.	 */	if ((sav->flags & SADB_X_EXT_OLD) == 0 && sav->replay) {		if (ipsec_updatereplay(ntohl(((struct newesp *)esp)->esp_seq), sav)) {			ipsecstat.in_espreplay++;			goto bad;		}	}noreplaycheck:	/* process main esp header. */	if (sav->flags & SADB_X_EXT_OLD) {		/* RFC 1827 */		esplen = sizeof(struct esp);	} else {		/* RFC 2406 */		if (sav->flags & SADB_X_EXT_DERIV)			esplen = sizeof(struct esp);		else			esplen = sizeof(struct newesp);	}	if (m->m_pkthdr.len < off + esplen + ivlen + sizeof(esptail)) {		ipseclog((LOG_WARNING,		    "IPv4 ESP input: packet too short\n"));		ipsecstat.in_inval++;		goto bad;	}	if (m->m_len < off + esplen + ivlen) {		m = m_pullup(m, off + esplen + ivlen);		if (!m) {			ipseclog((LOG_DEBUG,			    "IPv4 ESP input: can't pullup in esp4_input\n"));			ipsecstat.in_inval++;			goto bad;		}	}	/*	 * pre-compute and cache intermediate key	 */	if (esp_schedule(algo, sav) != 0) {		ipsecstat.in_inval++;		goto bad;	}	/*	 * decrypt the packet.	 */	if (!algo->decrypt)		panic("internal error: no decrypt function");	if ((*algo->decrypt)(m, off, sav, algo, ivlen)) {		/* m is already freed */		m = NULL;		ipseclog((LOG_ERR, "decrypt fail in IPv4 ESP input: %s\n",		    ipsec_logsastr(sav)));		ipsecstat.in_inval++;		goto bad;	}	ipsecstat.in_esphist[sav->alg_enc]++;	m->m_flags |= M_DECRYPTED;	/*	 * find the trailer of the ESP.	 */	m_copydata(m, m->m_pkthdr.len - sizeof(esptail), sizeof(esptail),	     (caddr_t)&esptail);	nxt = esptail.esp_nxt;	taillen = esptail.esp_padlen + sizeof(esptail);	if (m->m_pkthdr.len < taillen	 || m->m_pkthdr.len - taillen < hlen) {	/* ? */		ipseclog((LOG_WARNING,		    "bad pad length in IPv4 ESP input: %s %s\n",		    ipsec4_logpacketstr(ip, spi), ipsec_logsastr(sav)));		ipsecstat.in_inval++;		goto bad;	}	/* strip off the trailing pad area. */	m_adj(m, -taillen);#ifdef IPLEN_FLIPPED	ip->ip_len = ip->ip_len - taillen;#else	ip->ip_len = htons(ntohs(ip->ip_len) - taillen);#endif	/* was it transmitted over the IPsec tunnel SA? */	if (!ipsec_tunnel_device &&	    ipsec4_tunnel_validate(m, off + esplen + ivlen, nxt, sav)) {		/*		 * strip off all the headers that precedes ESP header.		 *	IP4 xx ESP IP4' payload -> IP4' payload		 *		 * XXX more sanity checks		 * XXX relationship with gif?		 */		u_int8_t tos;		tos = ip->ip_tos;		m_adj(m, off + esplen + ivlen);		if (m->m_len < sizeof(*ip)) {			m = m_pullup(m, sizeof(*ip));			if (!m) {				ipsecstat.in_inval++;				goto bad;			}		}		ip = mtod(m, struct ip *);		/* ECN consideration. */		ip_ecn_egress(ip4_ipsec_ecn, &tos, &ip->ip_tos);		if (!key_checktunnelsanity(sav, AF_INET,			    (caddr_t)&ip->ip_src, (caddr_t)&ip->ip_dst)) {			ipseclog((LOG_ERR, "ipsec tunnel address mismatch "			    "in IPv4 ESP input: %s %s\n",			    ipsec4_logpacketstr(ip, spi), ipsec_logsastr(sav)));			ipsecstat.in_inval++;			goto bad;		}		key_sa_recordxfer(sav, m);		if (ipsec_addhist(m, IPPROTO_ESP, spi) != 0 ||		    ipsec_addhist(m, IPPROTO_IPV4, 0) != 0) {			ipsecstat.in_nomem++;			goto bad;		}		s = splimp();		if (IF_QFULL(&ipintrq)) {			ipsecstat.in_inval++;			splx(s);			goto bad;		}		IF_ENQUEUE(&ipintrq, m);		m = NULL;		schednetisr(NETISR_IP); /* can be skipped but to make sure */		splx(s);		nxt = IPPROTO_DONE;	} else {		/*		 * strip off ESP header and IV.		 * even in m_pulldown case, we need to strip off ESP so that		 * we can always compute checksum for AH correctly.		 */		size_t stripsiz;		stripsiz = esplen + ivlen;		ip = mtod(m, struct ip *);		ovbcopy((caddr_t)ip, (caddr_t)(((u_char *)ip) + stripsiz), off);		m->m_data += stripsiz;		m->m_len -= stripsiz;		m->m_pkthdr.len -= stripsiz;		ip = mtod(m, struct ip *);#ifdef IPLEN_FLIPPED		ip->ip_len = ip->ip_len - stripsiz;#else		ip->ip_len = htons(ntohs(ip->ip_len) - stripsiz);#endif		ip->ip_p = nxt;		key_sa_recordxfer(sav, m);		if (ipsec_addhist(m, IPPROTO_ESP, spi) != 0) {			ipsecstat.in_nomem++;			goto bad;		}		if (nxt != IPPROTO_DONE) {			if ((inetsw[ip_protox[nxt]].pr_flags & PR_LASTHDR) != 0 &&			    ipsec4_in_reject(m, NULL)) {				ipsecstat.in_polvio++;				goto bad;			}#if defined(__FreeBSD__) && __FreeBSD__ >= 4			(*inetsw[ip_protox[nxt]].pr_input)(m, off);#else			(*inetsw[ip_protox[nxt]].pr_input)(m, off, nxt);#endif		} else			m_freem(m);		m = NULL;	}	if (sav) {		KEYDEBUG(KEYDEBUG_IPSEC_STAMP,			printf("DP esp4_input call free SA:%p\n", sav));		key_freesav(sav);	}	ipsecstat.in_success++;	return;bad:	if (sav) {		KEYDEBUG(KEYDEBUG_IPSEC_STAMP,			printf("DP esp4_input call free SA:%p\n", sav));		key_freesav(sav);	}	if (m)		m_freem(m);	return;}#if defined(__NetBSD__) && __NetBSD_Version__ >= 105080000	/* 1.5H *//* assumes that ip header and esp header are contiguous on mbuf */void *esp4_ctlinput(cmd, sa, v)	int cmd;	struct sockaddr *sa;	void *v;{	struct ip *ip = v;	struct esp *esp;	struct icmp *icp;	struct secasvar *sav;	if (sa->sa_family != AF_INET ||	    sa->sa_len != sizeof(struct sockaddr_in))		return NULL;	if ((unsigned)cmd >= PRC_NCMDS)		return NULL;	if (cmd == PRC_MSGSIZE && ip_mtudisc && ip && ip->ip_v == 4) {		/*		 * Check to see if we have a valid SA corresponding to		 * the address in the ICMP message payload.		 */		esp = (struct esp *)((caddr_t)ip + (ip->ip_hl << 2));		if ((sav = key_allocsa(AF_INET,				       (caddr_t) &ip->ip_src,				       (caddr_t) &ip->ip_dst,				       IPPROTO_ESP, esp->esp_spi)) == NULL)			return NULL;		if (sav->state != SADB_SASTATE_MATURE &&		    sav->state != SADB_SASTATE_DYING) {			key_freesav(sav);			return NULL;		}		/* XXX Further validation? */		key_freesav(sav);		/*		 * Now that we've validated that we are actually communicating		 * with the host indicated in the ICMP message, locate the		 * ICMP header, recalculate the new MTU, and create the		 * corresponding routing entry.		 */		icp = (struct icmp *)((caddr_t)ip -

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?