esp_core.c

来自「eCos操作系统源码」· C语言 代码 · 共 1,150 行 · 第 1/2 页

C
1,150
字号
//==========================================================================////      src/sys/netinet6/esp_core.c////==========================================================================//####BSDCOPYRIGHTBEGIN####//// -------------------------------------------//// Portions of this software may have been derived from OpenBSD, // FreeBSD or other sources, and are covered by the appropriate// copyright disclaimers included herein.//// Portions created by Red Hat are// Copyright (C) 2002 Red Hat, Inc. All Rights Reserved.//// -------------------------------------------////####BSDCOPYRIGHTEND####//==========================================================================/*	$KAME: esp_core.c,v 1.54 2001/12/07 07:07:08 itojun Exp $	*//* * Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project. * All rights reserved. * * Redistribution and use in source and binary forms, with or without * modification, are permitted provided that the following conditions * are met: * 1. Redistributions of source code must retain the above copyright *    notice, this list of conditions and the following disclaimer. * 2. Redistributions in binary form must reproduce the above copyright *    notice, this list of conditions and the following disclaimer in the *    documentation and/or other materials provided with the distribution. * 3. Neither the name of the project nor the names of its contributors *    may be used to endorse or promote products derived from this software *    without specific prior written permission. * * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE * ARE DISCLAIMED.  IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF * SUCH DAMAGE. */#include <sys/param.h>#include <sys/malloc.h>#include <sys/mbuf.h>#include <sys/domain.h>#include <sys/protosw.h>#include <sys/socket.h>#include <sys/errno.h>#include <sys/time.h>#include <net/if.h>#include <net/route.h>#include <netinet/in.h>#include <netinet/in_var.h>#ifdef INET6#include <netinet/ip6.h>#include <netinet6/ip6_var.h>#include <netinet/icmp6.h>#endif#include <netinet6/ipsec.h>#include <netinet6/ah.h>#include <netinet6/esp.h>#include <netinet6/esp_twofish.h>#include <netinet6/esp_rijndael.h>#include <net/pfkeyv2.h>#include <netkey/keydb.h>#include <netkey/key.h>#include <crypto/des/des.h>#include <crypto/blowfish/blowfish.h>#include <crypto/cast128/cast128.h>static int esp_null_mature __P((struct secasvar *));static int esp_null_decrypt __P((struct mbuf *, size_t,	struct secasvar *, const struct esp_algorithm *, int));static int esp_null_encrypt __P((struct mbuf *, size_t, size_t,	struct secasvar *, const struct esp_algorithm *, int));static int esp_descbc_mature __P((struct secasvar *));static int esp_descbc_ivlen __P((const struct esp_algorithm *,	struct secasvar *));static int esp_des_schedule __P((const struct esp_algorithm *,	struct secasvar *));static int esp_des_schedlen __P((const struct esp_algorithm *));static int esp_des_blockdecrypt __P((const struct esp_algorithm *,	struct secasvar *, u_int8_t *, u_int8_t *));static int esp_des_blockencrypt __P((const struct esp_algorithm *,	struct secasvar *, u_int8_t *, u_int8_t *));static int esp_cbc_mature __P((struct secasvar *));static int esp_blowfish_schedule __P((const struct esp_algorithm *,	struct secasvar *));static int esp_blowfish_schedlen __P((const struct esp_algorithm *));static int esp_blowfish_blockdecrypt __P((const struct esp_algorithm *,	struct secasvar *, u_int8_t *, u_int8_t *));static int esp_blowfish_blockencrypt __P((const struct esp_algorithm *,	struct secasvar *, u_int8_t *, u_int8_t *));static int esp_cast128_schedule __P((const struct esp_algorithm *,	struct secasvar *));static int esp_cast128_schedlen __P((const struct esp_algorithm *));static int esp_cast128_blockdecrypt __P((const struct esp_algorithm *,	struct secasvar *, u_int8_t *, u_int8_t *));static int esp_cast128_blockencrypt __P((const struct esp_algorithm *,	struct secasvar *, u_int8_t *, u_int8_t *));static int esp_3des_schedule __P((const struct esp_algorithm *,	struct secasvar *));static int esp_3des_schedlen __P((const struct esp_algorithm *));static int esp_3des_blockdecrypt __P((const struct esp_algorithm *,	struct secasvar *, u_int8_t *, u_int8_t *));static int esp_3des_blockencrypt __P((const struct esp_algorithm *,	struct secasvar *, u_int8_t *, u_int8_t *));static int esp_common_ivlen __P((const struct esp_algorithm *,	struct secasvar *));static int esp_cbc_decrypt __P((struct mbuf *, size_t,	struct secasvar *, const struct esp_algorithm *, int));static int esp_cbc_encrypt __P((struct mbuf *, size_t, size_t,	struct secasvar *, const struct esp_algorithm *, int));#define MAXIVLEN	16static const struct esp_algorithm esp_algorithms[] = {	{ 8, -1, esp_descbc_mature, 64, 64, esp_des_schedlen,		"des-cbc",		esp_descbc_ivlen, esp_cbc_decrypt,		esp_cbc_encrypt, esp_des_schedule,		esp_des_blockdecrypt, esp_des_blockencrypt, },	{ 8, 8, esp_cbc_mature, 192, 192, esp_3des_schedlen,		"3des-cbc",		esp_common_ivlen, esp_cbc_decrypt,		esp_cbc_encrypt, esp_3des_schedule,		esp_3des_blockdecrypt, esp_3des_blockencrypt, },	{ 1, 0, esp_null_mature, 0, 2048, 0, "null",		esp_common_ivlen, esp_null_decrypt,		esp_null_encrypt, NULL, },	{ 8, 8, esp_cbc_mature, 40, 448, esp_blowfish_schedlen, "blowfish-cbc",		esp_common_ivlen, esp_cbc_decrypt,		esp_cbc_encrypt, esp_blowfish_schedule,		esp_blowfish_blockdecrypt, esp_blowfish_blockencrypt, },	{ 8, 8, esp_cbc_mature, 40, 128, esp_cast128_schedlen,		"cast128-cbc",		esp_common_ivlen, esp_cbc_decrypt,		esp_cbc_encrypt, esp_cast128_schedule,		esp_cast128_blockdecrypt, esp_cast128_blockencrypt, },	{ 16, 16, esp_cbc_mature, 128, 256, esp_rijndael_schedlen,		"rijndael-cbc",		esp_common_ivlen, esp_cbc_decrypt,		esp_cbc_encrypt, esp_rijndael_schedule,		esp_rijndael_blockdecrypt, esp_rijndael_blockencrypt },	{ 16, 16, esp_cbc_mature, 128, 256, esp_twofish_schedlen,		"twofish-cbc",		esp_common_ivlen, esp_cbc_decrypt,		esp_cbc_encrypt, esp_twofish_schedule,		esp_twofish_blockdecrypt, esp_twofish_blockencrypt },};const struct esp_algorithm *esp_algorithm_lookup(idx)	int idx;{	switch (idx) {	case SADB_EALG_DESCBC:		return &esp_algorithms[0];	case SADB_EALG_3DESCBC:		return &esp_algorithms[1];	case SADB_EALG_NULL:		return &esp_algorithms[2];	case SADB_X_EALG_BLOWFISHCBC:		return &esp_algorithms[3];	case SADB_X_EALG_CAST128CBC:		return &esp_algorithms[4];	case SADB_X_EALG_RIJNDAELCBC:		return &esp_algorithms[5];	case SADB_X_EALG_TWOFISHCBC:		return &esp_algorithms[6];	default:		return NULL;	}}intesp_max_ivlen(){	int idx;	int ivlen;	ivlen = 0;	for (idx = 0; idx < sizeof(esp_algorithms)/sizeof(esp_algorithms[0]);	     idx++) {		if (esp_algorithms[idx].ivlenval > ivlen)			ivlen = esp_algorithms[idx].ivlenval;	}	return ivlen;}intesp_schedule(algo, sav)	const struct esp_algorithm *algo;	struct secasvar *sav;{	int error;	/* check for key length */	if (_KEYBITS(sav->key_enc) < algo->keymin ||	    _KEYBITS(sav->key_enc) > algo->keymax) {		ipseclog((LOG_ERR,		    "esp_schedule %s: unsupported key length %d: "		    "needs %d to %d bits\n", algo->name, _KEYBITS(sav->key_enc),		    algo->keymin, algo->keymax));		return EINVAL;	}	/* already allocated */	if (sav->sched && sav->schedlen != 0)		return 0;	/* no schedule necessary */	if (!algo->schedule || !algo->schedlen)		return 0;	sav->schedlen = (*algo->schedlen)(algo);	if (sav->schedlen < 0)		return EINVAL;	sav->sched = malloc(sav->schedlen, M_SECA, M_DONTWAIT);	if (!sav->sched) {		sav->schedlen = 0;		return ENOBUFS;	}	error = (*algo->schedule)(algo, sav);	if (error) {		ipseclog((LOG_ERR, "esp_schedule %s: error %d\n",		    algo->name, error));		free(sav->sched, M_SECA);		sav->sched = NULL;		sav->schedlen = 0;	}	return error;}static intesp_null_mature(sav)	struct secasvar *sav;{	/* anything is okay */	return 0;}static intesp_null_decrypt(m, off, sav, algo, ivlen)	struct mbuf *m;	size_t off;		/* offset to ESP header */	struct secasvar *sav;	const struct esp_algorithm *algo;	int ivlen;{	return 0; /* do nothing */}static intesp_null_encrypt(m, off, plen, sav, algo, ivlen)	struct mbuf *m;	size_t off;	/* offset to ESP header */	size_t plen;	/* payload length (to be encrypted) */	struct secasvar *sav;	const struct esp_algorithm *algo;	int ivlen;{	return 0; /* do nothing */}static intesp_descbc_mature(sav)	struct secasvar *sav;{	const struct esp_algorithm *algo;	if (!(sav->flags & SADB_X_EXT_OLD) && (sav->flags & SADB_X_EXT_IV4B)) {		ipseclog((LOG_ERR, "esp_cbc_mature: "		    "algorithm incompatible with 4 octets IV length\n"));		return 1;	}	if (!sav->key_enc) {		ipseclog((LOG_ERR, "esp_descbc_mature: no key is given.\n"));		return 1;	}	algo = esp_algorithm_lookup(sav->alg_enc);	if (!algo) {		ipseclog((LOG_ERR,		    "esp_descbc_mature: unsupported algorithm.\n"));		return 1;	}	if (_KEYBITS(sav->key_enc) < algo->keymin ||	    _KEYBITS(sav->key_enc) > algo->keymax) {		ipseclog((LOG_ERR,		    "esp_descbc_mature: invalid key length %d.\n",		    _KEYBITS(sav->key_enc)));		return 1;	}	/* weak key check */	if (des_is_weak_key((des_cblock *)_KEYBUF(sav->key_enc))) {		ipseclog((LOG_ERR,		    "esp_descbc_mature: weak key was passed.\n"));		return 1;	}	return 0;}static intesp_descbc_ivlen(algo, sav)	const struct esp_algorithm *algo;	struct secasvar *sav;{	if (!sav)		return 8;	if ((sav->flags & SADB_X_EXT_OLD) && (sav->flags & SADB_X_EXT_IV4B))		return 4;	if (!(sav->flags & SADB_X_EXT_OLD) && (sav->flags & SADB_X_EXT_DERIV))		return 4;	return 8;}static intesp_des_schedlen(algo)	const struct esp_algorithm *algo;{	return sizeof(des_key_schedule);}static intesp_des_schedule(algo, sav)	const struct esp_algorithm *algo;	struct secasvar *sav;{	if (des_key_sched((des_cblock *)_KEYBUF(sav->key_enc),	    *(des_key_schedule *)sav->sched))		return EINVAL;	else		return 0;}static intesp_des_blockdecrypt(algo, sav, s, d)	const struct esp_algorithm *algo;	struct secasvar *sav;	u_int8_t *s;	u_int8_t *d;{	/* assumption: d has a good alignment */	bcopy(s, d, sizeof(DES_LONG) * 2);	des_ecb_encrypt((des_cblock *)d, (des_cblock *)d,	    *(des_key_schedule *)sav->sched, DES_DECRYPT);	return 0;}static intesp_des_blockencrypt(algo, sav, s, d)	const struct esp_algorithm *algo;	struct secasvar *sav;	u_int8_t *s;	u_int8_t *d;{	/* assumption: d has a good alignment */	bcopy(s, d, sizeof(DES_LONG) * 2);	des_ecb_encrypt((des_cblock *)d, (des_cblock *)d,	    *(des_key_schedule *)sav->sched, DES_ENCRYPT);	return 0;}static intesp_cbc_mature(sav)	struct secasvar *sav;{	int keylen;	const struct esp_algorithm *algo;	if (sav->flags & SADB_X_EXT_OLD) {		ipseclog((LOG_ERR,		    "esp_cbc_mature: algorithm incompatible with esp-old\n"));		return 1;	}	if (sav->flags & SADB_X_EXT_DERIV) {		ipseclog((LOG_ERR,		    "esp_cbc_mature: algorithm incompatible with derived\n"));		return 1;	}	if (!sav->key_enc) {		ipseclog((LOG_ERR, "esp_cbc_mature: no key is given.\n"));		return 1;	}	algo = esp_algorithm_lookup(sav->alg_enc);	if (!algo) {		ipseclog((LOG_ERR,		    "esp_cbc_mature %s: unsupported algorithm.\n", algo->name));		return 1;	}	keylen = sav->key_enc->sadb_key_bits;	if (keylen < algo->keymin || algo->keymax < keylen) {		ipseclog((LOG_ERR,		    "esp_cbc_mature %s: invalid key length %d.\n",		    algo->name, sav->key_enc->sadb_key_bits));		return 1;	}	switch (sav->alg_enc) {	case SADB_EALG_3DESCBC:		/* weak key check */		if (des_is_weak_key((des_cblock *)_KEYBUF(sav->key_enc)) ||		    des_is_weak_key((des_cblock *)(_KEYBUF(sav->key_enc) + 8)) ||		    des_is_weak_key((des_cblock *)(_KEYBUF(sav->key_enc) + 16))) {			ipseclog((LOG_ERR,			    "esp_cbc_mature %s: weak key was passed.\n",			    algo->name));			return 1;		}		break;	case SADB_X_EALG_BLOWFISHCBC:	case SADB_X_EALG_CAST128CBC:	case SADB_X_EALG_TWOFISHCBC:		break;	case SADB_X_EALG_RIJNDAELCBC:		/* allows specific key sizes only */		if (!(keylen == 128 || keylen == 192 || keylen == 256)) {			ipseclog((LOG_ERR,			    "esp_cbc_mature %s: invalid key length %d.\n",			    algo->name, keylen));			return 1;		}		break;	}	return 0;}static intesp_blowfish_schedlen(algo)	const struct esp_algorithm *algo;{	return sizeof(BF_KEY);}static intesp_blowfish_schedule(algo, sav)	const struct esp_algorithm *algo;	struct secasvar *sav;{	BF_set_key((BF_KEY *)sav->sched, _KEYLEN(sav->key_enc),	    _KEYBUF(sav->key_enc));	return 0;}static intesp_blowfish_blockdecrypt(algo, sav, s, d)	const struct esp_algorithm *algo;	struct secasvar *sav;	u_int8_t *s;	u_int8_t *d;{	/* HOLY COW!  BF_encrypt() takes values in host byteorder */	BF_LONG t[2];	bcopy(s, t, sizeof(t));	t[0] = ntohl(t[0]);	t[1] = ntohl(t[1]);	BF_encrypt(t, (BF_KEY *)sav->sched, BF_DECRYPT);	t[0] = htonl(t[0]);	t[1] = htonl(t[1]);	bcopy(t, d, sizeof(t));	return 0;}static intesp_blowfish_blockencrypt(algo, sav, s, d)	const struct esp_algorithm *algo;	struct secasvar *sav;	u_int8_t *s;	u_int8_t *d;{	/* HOLY COW!  BF_encrypt() takes values in host byteorder */	BF_LONG t[2];	bcopy(s, t, sizeof(t));	t[0] = ntohl(t[0]);	t[1] = ntohl(t[1]);	BF_encrypt(t, (BF_KEY *)sav->sched, BF_ENCRYPT);	t[0] = htonl(t[0]);	t[1] = htonl(t[1]);	bcopy(t, d, sizeof(t));	return 0;}static intesp_cast128_schedlen(algo)	const struct esp_algorithm *algo;{	return sizeof(u_int32_t) * 32;}static intesp_cast128_schedule(algo, sav)	const struct esp_algorithm *algo;	struct secasvar *sav;{	set_cast128_subkey((u_int32_t *)sav->sched, _KEYBUF(sav->key_enc),		_KEYLEN(sav->key_enc));	return 0;}static intesp_cast128_blockdecrypt(algo, sav, s, d)	const struct esp_algorithm *algo;	struct secasvar *sav;	u_int8_t *s;	u_int8_t *d;{	if (_KEYLEN(sav->key_enc) <= 80 / 8)		cast128_decrypt_round12(d, s, (u_int32_t *)sav->sched);	else		cast128_decrypt_round16(d, s, (u_int32_t *)sav->sched);	return 0;}static intesp_cast128_blockencrypt(algo, sav, s, d)	const struct esp_algorithm *algo;	struct secasvar *sav;	u_int8_t *s;	u_int8_t *d;{	if (_KEYLEN(sav->key_enc) <= 80 / 8)		cast128_encrypt_round12(d, s, (u_int32_t *)sav->sched);	else		cast128_encrypt_round16(d, s, (u_int32_t *)sav->sched);	return 0;}static intesp_3des_schedlen(algo)	const struct esp_algorithm *algo;{	return sizeof(des_key_schedule) * 3;}

⌨️ 快捷键说明

复制代码Ctrl + C
搜索代码Ctrl + F
全屏模式F11
增大字号Ctrl + =
减小字号Ctrl + -
显示快捷键?