/* * RFC2367 PF_KEYv2 Key management API message parser * Copyright (C) 1999, 2000, 2001 Richard Guy Briggs. * Copyright (C) 2012 Paul Wouters * * This program is free software; you can redistribute it and/or modify it * under the terms of the GNU General Public License as published by the * Free Software Foundation; either version 2 of the License, or (at your * option) any later version. See . * * This program is distributed in the hope that it will be useful, but * WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY * or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License * for more details. */ /* * Template from klips/net/ipsec/ipsec/ipsec_parser.c. */ /* * Some ugly stuff to allow consistent debugging code for use in the * kernel and in user space */ #if defined(__KERNEL__) && (defined(linux) || defined(__linux__)) # include /* for printk */ # include "libreswan/ipsec_kversion.h" /* for malloc switch */ # include /* kmalloc() */ # include /* error codes */ # include /* size_t */ # include /* mark_bh */ # include /* struct device, and other headers */ # include /* eth_type_trans */ # include /* struct iphdr */ # if defined(CONFIG_KLIPS_IPV6) # include /* struct ipv6hdr */ # endif /* if defined(CONFIG_KLIPS_IPV6) */ # define MALLOC(size) kmalloc(size, GFP_ATOMIC) # define FREE(obj) kfree(obj) # include #else /* __KERNEL__ */ # include # include # include # include # include # include /* memset */ # include #endif /* __KERNEL__ */ #include #include #ifdef __KERNEL__ #include "libreswan/radij.h" /* rd_nodes */ #include "libreswan/ipsec_encap.h" /* sockaddr_encap */ #endif /* __KERNEL__ */ #include "libreswan/ipsec_sa.h" /* IPSEC_SAREF_NULL, IPSEC_SA_REF_TABLE_IDX_WIDTH */ #include "libreswan/pfkey_debug.h" #define SENDERR(_x) do { error = -(_x); goto errlab; } while (0) void pfkey_extensions_init(struct sadb_ext *extensions[K_SADB_EXT_MAX + 1]) { int i; for (i = 0; i != K_SADB_EXT_MAX + 1; i++) extensions[i] = NULL; } void pfkey_extensions_free(struct sadb_ext *extensions[K_SADB_EXT_MAX + 1]) { int i; if (!extensions) return; if (extensions[0]) { DEBUGGING(PF_KEY_DEBUG_BUILD, "%s:Free extension %d (%zu)\n", "pfkey_extensions_free", 0, sizeof(struct sadb_msg)); memset(extensions[0], 0, sizeof(struct sadb_msg)); FREE(extensions[0]); extensions[0] = NULL; } for (i = 1; i != K_SADB_EXT_MAX + 1; i++) { if (extensions[i]) { DEBUGGING(PF_KEY_DEBUG_BUILD, "%s:Free extension %d (%zu)\n", "pfkey_extensions_free", i, extensions[i]->sadb_ext_len * IPSEC_PFKEYv2_ALIGN); memset(extensions[i], 0, extensions[i]->sadb_ext_len * IPSEC_PFKEYv2_ALIGN); FREE(extensions[i]); extensions[i] = NULL; } } } void pfkey_msg_free(struct sadb_msg **pfkey_msg) { if (*pfkey_msg) { memset(*pfkey_msg, 0, (*pfkey_msg)->sadb_msg_len * IPSEC_PFKEYv2_ALIGN); FREE(*pfkey_msg); *pfkey_msg = NULL; } } /* Default extension builders taken from the KLIPS code */ int pfkey_msg_hdr_build(struct sadb_ext** pfkey_ext, uint8_t msg_type, uint8_t satype, uint8_t msg_errno, uint32_t seq, uint32_t pid) { int error = 0; struct sadb_msg *pfkey_msg = (struct sadb_msg *)*pfkey_ext; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_msg_hdr_build:\n"); DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_msg_hdr_build: " "on_entry &pfkey_ext=0p%p pfkey_ext=0p%p *pfkey_ext=0p%p.\n", &pfkey_ext, pfkey_ext, *pfkey_ext); /* sanity checks... */ if (pfkey_msg) { ERROR("pfkey_msg_hdr_build: " "why is pfkey_msg already pointing to something?\n"); SENDERR(EINVAL); } if (!msg_type) { ERROR("pfkey_msg_hdr_build: " "msg type not set, must be non-zero..\n"); SENDERR(EINVAL); } if (msg_type > K_SADB_MAX) { ERROR("pfkey_msg_hdr_build: " "msg type too large:%d.\n", msg_type); SENDERR(EINVAL); } if (satype > K_SADB_SATYPE_MAX) { ERROR("pfkey_msg_hdr_build: " "satype %d > max %d\n", satype, SADB_SATYPE_MAX); SENDERR(EINVAL); } pfkey_msg = (struct sadb_msg*)MALLOC(sizeof(struct sadb_msg)); *pfkey_ext = (struct sadb_ext*)pfkey_msg; if (pfkey_msg == NULL) { ERROR("pfkey_msg_hdr_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_msg, 0, sizeof(struct sadb_msg)); pfkey_msg->sadb_msg_len = sizeof(struct sadb_msg) / IPSEC_PFKEYv2_ALIGN; pfkey_msg->sadb_msg_type = msg_type; pfkey_msg->sadb_msg_satype = satype; pfkey_msg->sadb_msg_version = PF_KEY_V2; pfkey_msg->sadb_msg_errno = msg_errno; pfkey_msg->sadb_msg_reserved = 0; pfkey_msg->sadb_msg_seq = seq; pfkey_msg->sadb_msg_pid = pid; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_msg_hdr_build: " "on_exit &pfkey_ext=0p%p pfkey_ext=0p%p *pfkey_ext=0p%p.\n", &pfkey_ext, pfkey_ext, *pfkey_ext); errlab: return error; } int pfkey_sa_builds(struct sadb_ext **pfkey_ext, struct sadb_builds sab) { int error = 0; struct k_sadb_sa *pfkey_sa = (struct k_sadb_sa *)*pfkey_ext; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sa_build: " "spi=%08x replay=%d sa_state=%d auth=%d encrypt=%d flags=%d\n", ntohl(sab.sa_base.sadb_sa_spi), /* in network order */ sab.sa_base.sadb_sa_replay, sab.sa_base.sadb_sa_state, sab.sa_base.sadb_sa_auth, sab.sa_base.sadb_sa_encrypt, sab.sa_base.sadb_sa_flags); /* sanity checks... */ if (pfkey_sa) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sa_build: " "why is pfkey_sa already pointing to something?\n"); SENDERR(EINVAL); } if (sab.sa_base.sadb_sa_exttype != SADB_EXT_SA && sab.sa_base.sadb_sa_exttype != K_SADB_X_EXT_SA2) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sa_build: " "invalid exttype=%d.\n", sab.sa_base.sadb_sa_exttype); SENDERR(EINVAL); } if (sab.sa_base.sadb_sa_replay > 64) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sa_build: " "replay window size: %d -- must be 0 <= size <= 64\n", sab.sa_base.sadb_sa_replay); SENDERR(EINVAL); } #if SADB_AALG_MAX < 255 if (sab.sa_base.sadb_sa_auth > SADB_AALG_MAX) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sa_build: " "auth=%d > SADB_AALG_MAX=%d.\n", sab.sa_base.sadb_sa_auth, SADB_AALG_MAX); SENDERR(EINVAL); } #endif #if K_SADB_EALG_MAX < 255 if (sab.sa_base.sadb_sa_encrypt > K_SADB_EALG_MAX) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sa_build: " "encrypt=%d > K_SADB_EALG_MAX=%d.\n", sab.sa_base.sadb_sa_encrypt, K_SADB_EALG_MAX); SENDERR(EINVAL); } #endif if (sab.sa_base.sadb_sa_state > K_SADB_SASTATE_MAX) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sa_build: " "sa_state=%d exceeds MAX=%d.\n", sab.sa_base.sadb_sa_state, K_SADB_SASTATE_MAX); SENDERR(EINVAL); } if (sab.sa_base.sadb_sa_state == K_SADB_SASTATE_DEAD) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sa_build: " "sa_state=%d is DEAD=%d is not allowed.\n", sab.sa_base.sadb_sa_state, K_SADB_SASTATE_DEAD); SENDERR(EINVAL); } if ((IPSEC_SAREF_NULL != sab.sa_base.sadb_x_sa_ref) && (sab.sa_base.sadb_x_sa_ref >= (1 << IPSEC_SA_REF_TABLE_IDX_WIDTH))) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sa_build: " "SAref=%d must be (SAref == IPSEC_SAREF_NULL(%d) || SAref < IPSEC_SA_REF_TABLE_NUM_ENTRIES(%d)).\n", sab.sa_base.sadb_x_sa_ref, IPSEC_SAREF_NULL, IPSEC_SA_REF_TABLE_NUM_ENTRIES); SENDERR(EINVAL); } pfkey_sa = (struct k_sadb_sa*)MALLOC(sizeof(struct k_sadb_sa)); *pfkey_ext = (struct sadb_ext*)pfkey_sa; if (pfkey_sa == NULL) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sa_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_sa, 0, sizeof(struct k_sadb_sa)); *pfkey_sa = sab.sa_base; pfkey_sa->sadb_sa_len = sizeof(*pfkey_sa) / IPSEC_PFKEYv2_ALIGN; errlab: return error; } int pfkey_sa_build(struct sadb_ext **pfkey_ext, uint16_t exttype, uint32_t spi, uint8_t replay_window, uint8_t sa_state, uint8_t auth, uint8_t encrypt, uint32_t flags) { struct sadb_builds sab; memset(&sab, 0, sizeof(sab)); sab.sa_base.sadb_sa_exttype = exttype; sab.sa_base.sadb_sa_spi = spi; sab.sa_base.sadb_sa_replay = replay_window; sab.sa_base.sadb_sa_state = sa_state; sab.sa_base.sadb_sa_auth = auth; sab.sa_base.sadb_sa_encrypt = encrypt; sab.sa_base.sadb_sa_flags = flags; sab.sa_base.sadb_x_sa_ref = IPSEC_SAREF_NULL; return pfkey_sa_builds(pfkey_ext, sab); } int pfkey_lifetime_build(struct sadb_ext ** pfkey_ext, uint16_t exttype, uint32_t allocations, uint64_t bytes, uint64_t addtime, uint64_t usetime, uint32_t packets UNUSED) { int error = 0; struct sadb_lifetime *pfkey_lifetime = (struct sadb_lifetime *)*pfkey_ext; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_lifetime_build:\n"); /* sanity checks... */ if (pfkey_lifetime) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_lifetime_build: " "why is pfkey_lifetime already pointing to something?\n"); SENDERR(EINVAL); } if (exttype != SADB_EXT_LIFETIME_CURRENT && exttype != SADB_EXT_LIFETIME_HARD && exttype != SADB_EXT_LIFETIME_SOFT) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_lifetime_build: " "invalid exttype=%d.\n", exttype); SENDERR(EINVAL); } pfkey_lifetime = (struct sadb_lifetime*)MALLOC(sizeof(struct sadb_lifetime)); *pfkey_ext = (struct sadb_ext*) pfkey_lifetime; if (pfkey_lifetime == NULL) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_lifetime_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_lifetime, 0, sizeof(struct sadb_lifetime)); pfkey_lifetime->sadb_lifetime_len = sizeof(struct sadb_lifetime) / IPSEC_PFKEYv2_ALIGN; pfkey_lifetime->sadb_lifetime_exttype = exttype; pfkey_lifetime->sadb_lifetime_allocations = allocations; pfkey_lifetime->sadb_lifetime_bytes = bytes; pfkey_lifetime->sadb_lifetime_addtime = addtime; pfkey_lifetime->sadb_lifetime_usetime = usetime; #ifdef NOT_YET /* XXX it is defined in struct sadb_lifetime, but not found?? */ pfkey_lifetime->sadb_x_lifetime_packets = packets; #endif errlab: return error; } int pfkey_address_build(struct sadb_ext** pfkey_ext, uint16_t exttype, uint8_t proto, uint8_t prefixlen, struct sockaddr* address) { int error = 0; int saddr_len = 0; int len; char ipaddr_txt[ADDRTOT_BUF + 6 /*extra for port number*/]; struct sadb_address *pfkey_address = (struct sadb_address *)*pfkey_ext; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_address_build: " "exttype=%d proto=%d prefixlen=%d\n", exttype, proto, prefixlen); /* sanity checks... */ if (pfkey_address) { ERROR("pfkey_address_build: " "why is pfkey_address already pointing to something?\n"); SENDERR(EINVAL); } if (!address) { ERROR("pfkey_address_build: " "address is NULL\n"); SENDERR(EINVAL); } switch (exttype) { case SADB_EXT_ADDRESS_SRC: case SADB_EXT_ADDRESS_DST: case SADB_EXT_ADDRESS_PROXY: case K_SADB_X_EXT_ADDRESS_DST2: case K_SADB_X_EXT_ADDRESS_SRC_FLOW: case K_SADB_X_EXT_ADDRESS_DST_FLOW: case K_SADB_X_EXT_ADDRESS_SRC_MASK: case K_SADB_X_EXT_ADDRESS_DST_MASK: case K_SADB_X_EXT_NAT_T_OA: break; default: ERROR("pfkey_address_build: " "unrecognised ext_type=%d.\n", exttype); SENDERR(EINVAL); } switch (address->sa_family) { case AF_INET: DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_address_build: " "found address family AF_INET.\n"); saddr_len = sizeof(struct sockaddr_in); len = sin_addrtot(address, 0, ipaddr_txt, sizeof(ipaddr_txt)); if (len > 0 && len < (int)sizeof(ipaddr_txt)) { snprintf(&ipaddr_txt[len - 1], sizeof(ipaddr_txt) - len, ":%d", ntohs(((struct sockaddr_in*)address)-> sin_port)); } break; case AF_INET6: DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_address_build: " "found address family AF_INET6.\n"); saddr_len = sizeof(struct sockaddr_in6); /* IPv6 convention with a port is [addr]:port */ len = sin_addrtot(address, 0, &ipaddr_txt[1], sizeof(ipaddr_txt) - 2); if (len > 0) { ipaddr_txt[0] = '['; snprintf(&ipaddr_txt[len], sizeof(ipaddr_txt) - len, "]:%d", ntohs(((struct sockaddr_in6*)address)-> sin6_port)); } break; default: ERROR("pfkey_address_build: " "address->sa_family=%d not supported.\n", address->sa_family); SENDERR(EPFNOSUPPORT); } DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_address_build: " "found address=%s.\n", ipaddr_txt); if (prefixlen != 0) { ERROR("pfkey_address_build: " "address prefixes not supported yet.\n"); SENDERR(EAFNOSUPPORT); /* not supported yet */ } /* allocate some memory for the extension */ pfkey_address = (struct sadb_address*) MALLOC(ALIGN_N(sizeof(struct sadb_address) + saddr_len, IPSEC_PFKEYv2_ALIGN)); *pfkey_ext = (struct sadb_ext*)pfkey_address; if (pfkey_address == NULL ) { ERROR("pfkey_lifetime_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_address, 0, ALIGN_N(sizeof(struct sadb_address) + saddr_len, IPSEC_PFKEYv2_ALIGN)); pfkey_address->sadb_address_len = DIVUP( sizeof(struct sadb_address) + saddr_len, IPSEC_PFKEYv2_ALIGN); pfkey_address->sadb_address_exttype = exttype; pfkey_address->sadb_address_proto = proto; pfkey_address->sadb_address_prefixlen = prefixlen; pfkey_address->sadb_address_reserved = 0; memcpy((char*)pfkey_address + sizeof(struct sadb_address), address, saddr_len); #if 0 for (i = 0; i < sizeof(struct sockaddr_in) - offsetof(struct sockaddr_in, sin_zero); i++) pfkey_address_s_ska.sin_zero[i] = 0; #endif DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_address_build: " "successful created len: %d.\n", pfkey_address->sadb_address_len); errlab: return error; } int pfkey_key_build(struct sadb_ext** pfkey_ext, uint16_t exttype, uint16_t key_bits, unsigned char * key) { int error = 0; struct sadb_key *pfkey_key = (struct sadb_key *)*pfkey_ext; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_key_build:\n"); /* sanity checks... */ if (pfkey_key) { ERROR("pfkey_key_build: " "why is pfkey_key already pointing to something?\n"); SENDERR(EINVAL); } if (!key_bits) { ERROR("pfkey_key_build: " "key_bits is zero, it must be non-zero.\n"); SENDERR(EINVAL); } if ( !((exttype == SADB_EXT_KEY_AUTH) || (exttype == SADB_EXT_KEY_ENCRYPT))) { ERROR("pfkey_key_build: " "unsupported extension type=%d.\n", exttype); SENDERR(EINVAL); } pfkey_key = (struct sadb_key*) MALLOC(sizeof(struct sadb_key) + DIVUP(key_bits, 64) * IPSEC_PFKEYv2_ALIGN); *pfkey_ext = (struct sadb_ext*)pfkey_key; if (pfkey_key == NULL) { ERROR("pfkey_key_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_key, 0, sizeof(struct sadb_key) + DIVUP(key_bits, 64) * IPSEC_PFKEYv2_ALIGN); pfkey_key->sadb_key_len = DIVUP( sizeof(struct sadb_key) * IPSEC_PFKEYv2_ALIGN + key_bits, 64); pfkey_key->sadb_key_exttype = exttype; pfkey_key->sadb_key_bits = key_bits; pfkey_key->sadb_key_reserved = 0; memcpy((char*)pfkey_key + sizeof(struct sadb_key), key, DIVUP(key_bits, 8)); errlab: return error; } int pfkey_ident_build(struct sadb_ext** pfkey_ext, uint16_t exttype, uint16_t ident_type, uint64_t ident_id, uint8_t ident_len, char* ident_string) { int error = 0; struct sadb_ident *pfkey_ident = (struct sadb_ident *)*pfkey_ext; int data_len = ident_len * IPSEC_PFKEYv2_ALIGN - sizeof(struct sadb_ident); DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_ident_build:\n"); /* sanity checks... */ if (pfkey_ident) { ERROR("pfkey_ident_build: " "why is pfkey_ident already pointing to something?\n"); SENDERR(EINVAL); } if ( !((exttype == SADB_EXT_IDENTITY_SRC) || (exttype == SADB_EXT_IDENTITY_DST))) { ERROR("pfkey_ident_build: " "unsupported extension type=%d.\n", exttype); SENDERR(EINVAL); } if (ident_type == SADB_IDENTTYPE_RESERVED) { ERROR("pfkey_ident_build: " "ident_type must be non-zero.\n"); SENDERR(EINVAL); } if (ident_type > SADB_IDENTTYPE_MAX) { ERROR("pfkey_ident_build: " "identtype=%d out of range.\n", ident_type); SENDERR(EINVAL); } if (((ident_type == SADB_IDENTTYPE_PREFIX) || (ident_type == SADB_IDENTTYPE_FQDN)) && !ident_string) { ERROR("pfkey_ident_build: " "string required to allocate size of extension.\n"); SENDERR(EINVAL); } #if 0 if ((ident_type == SADB_IDENTTYPE_USERFQDN) ) { } #endif pfkey_ident = (struct sadb_ident*) MALLOC(ident_len * IPSEC_PFKEYv2_ALIGN); *pfkey_ext = (struct sadb_ext*)pfkey_ident; if (pfkey_ident == NULL) { ERROR("pfkey_ident_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_ident, 0, ident_len * IPSEC_PFKEYv2_ALIGN); pfkey_ident->sadb_ident_len = ident_len; pfkey_ident->sadb_ident_exttype = exttype; pfkey_ident->sadb_ident_type = ident_type; pfkey_ident->sadb_ident_reserved = 0; pfkey_ident->sadb_ident_id = ident_id; memcpy((char*)pfkey_ident + sizeof(struct sadb_ident), ident_string, data_len); errlab: return error; } #if 0 /* ??? not yet used or working */ int pfkey_sens_build(struct sadb_ext **pfkey_ext, uint32_t dpd, uint8_t sens_level, uint8_t sens_len, uint64_t *sens_bitmap, uint8_t integ_level, uint8_t integ_len, uint64_t *integ_bitmap) { int error = 0; struct sadb_sens *pfkey_sens = (struct sadb_sens *)*pfkey_ext; int i; uint64_t* bitmap; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sens_build:\n"); /* sanity checks... */ if (pfkey_sens != NULL) { ERROR("pfkey_sens_build: " "why is pfkey_sens already pointing to something?\n"); SENDERR(EINVAL); } /* * ??? we've just determined that *pfkey_ext == NULL, why are we dereferencing it? * I guess that this is an insanity check. */ DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_sens_build: " "Sorry, I can't build exttype=%d yet.\n", (*pfkey_ext)->sadb_ext_type); SENDERR(EINVAL); /* don't process these yet */ pfkey_sens = (struct sadb_sens*) MALLOC(sizeof(struct sadb_sens) + (sens_len + integ_len) * sizeof(uint64_t)); *pfkey_ext = (struct sadb_ext*)pfkey_sens; if (pfkey_sens == NULL) { ERROR("pfkey_sens_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_sens, 0, sizeof(struct sadb_sens) + (sens_len + integ_len) * sizeof(uint64_t)); pfkey_sens->sadb_sens_len = (sizeof(struct sadb_sens) + (sens_len + integ_len) * sizeof(uint64_t)) / IPSEC_PFKEYv2_ALIGN; pfkey_sens->sadb_sens_exttype = SADB_EXT_SENSITIVITY; pfkey_sens->sadb_sens_dpd = dpd; pfkey_sens->sadb_sens_sens_level = sens_level; pfkey_sens->sadb_sens_sens_len = sens_len; pfkey_sens->sadb_sens_integ_level = integ_level; pfkey_sens->sadb_sens_integ_len = integ_len; pfkey_sens->sadb_sens_reserved = 0; bitmap = (uint64_t*)((char*)pfkey_ext + sizeof(struct sadb_sens)); for (i = 0; i < sens_len; i++) { *bitmap = sens_bitmap[i]; bitmap++; } for (i = 0; i < integ_len; i++) { *bitmap = integ_bitmap[i]; bitmap++; } errlab: return error; } #endif int pfkey_prop_build(struct sadb_ext** pfkey_ext, uint8_t replay, unsigned int comb_num, struct sadb_comb* comb) { int error = 0; int i; struct sadb_prop *pfkey_prop = (struct sadb_prop *)*pfkey_ext; struct sadb_comb *combp; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_prop_build:\n"); /* sanity checks... */ if (pfkey_prop) { ERROR("pfkey_prop_build: " "why is pfkey_prop already pointing to something?\n"); SENDERR(EINVAL); } pfkey_prop = (struct sadb_prop*) MALLOC(sizeof(struct sadb_prop) + comb_num * sizeof(struct sadb_comb)); *pfkey_ext = (struct sadb_ext*)pfkey_prop; if (pfkey_prop == NULL) { ERROR("pfkey_prop_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_prop, 0, sizeof(struct sadb_prop) + comb_num * sizeof(struct sadb_comb)); pfkey_prop->sadb_prop_len = (sizeof(struct sadb_prop) + comb_num * sizeof(struct sadb_comb)) / IPSEC_PFKEYv2_ALIGN; pfkey_prop->sadb_prop_exttype = SADB_EXT_PROPOSAL; pfkey_prop->sadb_prop_replay = replay; for (i = 0; i < 3; i++) pfkey_prop->sadb_prop_reserved[i] = 0; combp = (struct sadb_comb*) ((char*)*pfkey_ext + sizeof(struct sadb_prop)); for (i = 0; i < (int)comb_num; i++) { memcpy(combp, &(comb[i]), sizeof(struct sadb_comb)); combp++; } #if 0 uint8_t sadb_comb_auth; uint8_t sadb_comb_encrypt; uint16_t sadb_comb_flags; uint16_t sadb_comb_auth_minbits; uint16_t sadb_comb_auth_maxbits; uint16_t sadb_comb_encrypt_minbits; uint16_t sadb_comb_encrypt_maxbits; uint32_t sadb_comb_reserved; uint32_t sadb_comb_soft_allocations; uint32_t sadb_comb_hard_allocations; uint64_t sadb_comb_soft_bytes; uint64_t sadb_comb_hard_bytes; uint64_t sadb_comb_soft_addtime; uint64_t sadb_comb_hard_addtime; uint64_t sadb_comb_soft_usetime; uint64_t sadb_comb_hard_usetime; uint32_t sadb_comb_soft_packets; uint32_t sadb_comb_hard_packets; #endif errlab: return error; } int pfkey_supported_build(struct sadb_ext** pfkey_ext, uint16_t exttype, unsigned int alg_num, struct sadb_alg* alg) { int error = 0; unsigned int i; struct sadb_supported *pfkey_supported = (struct sadb_supported *)*pfkey_ext; struct sadb_alg *pfkey_alg; /* sanity checks... */ if (pfkey_supported) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_supported_build: " "why is pfkey_supported already pointing to something?\n"); SENDERR(EINVAL); } if ( !((exttype == SADB_EXT_SUPPORTED_AUTH) || (exttype == SADB_EXT_SUPPORTED_ENCRYPT))) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_supported_build: " "unsupported extension type=%d.\n", exttype); SENDERR(EINVAL); } pfkey_supported = (struct sadb_supported*) MALLOC(sizeof(struct sadb_supported) + alg_num * sizeof(struct sadb_alg)); *pfkey_ext = (struct sadb_ext*)pfkey_supported; if (pfkey_supported == NULL) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_supported_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_supported, 0, sizeof(struct sadb_supported) + alg_num * sizeof(struct sadb_alg)); pfkey_supported->sadb_supported_len = (sizeof(struct sadb_supported) + alg_num * sizeof(struct sadb_alg)) / IPSEC_PFKEYv2_ALIGN; pfkey_supported->sadb_supported_exttype = exttype; pfkey_supported->sadb_supported_reserved = 0; pfkey_alg = (struct sadb_alg*) ((char*)pfkey_supported + sizeof(struct sadb_supported)); for (i = 0; i < alg_num; i++) { memcpy(pfkey_alg, &(alg[i]), sizeof(struct sadb_alg)); pfkey_alg->sadb_alg_reserved = 0; pfkey_alg++; } #if 0 DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_supported_build: " "Sorry, I can't build exttype=%d yet.\n", (*pfkey_ext)->sadb_ext_type); SENDERR(EINVAL); /* don't process these yet */ uint8_t sadb_alg_id; uint8_t sadb_alg_ivlen; uint16_t sadb_alg_minbits; uint16_t sadb_alg_maxbits; uint16_t sadb_alg_reserved; #endif errlab: return error; } #if 0 static int pfkey_spirange_build(struct sadb_ext** pfkey_ext, uint16_t exttype UNUSED, uint32_t min, /* in network order */ uint32_t max) /* in network order */ { int error = 0; struct sadb_spirange *pfkey_spirange = (struct sadb_spirange *)*pfkey_ext; /* sanity checks... */ if (pfkey_spirange) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_spirange_build: " "why is pfkey_spirange already pointing to something?\n"); SENDERR(EINVAL); } if (ntohl(max) < ntohl(min)) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_spirange_build: " "minspi=%08x must be < maxspi=%08x.\n", ntohl(min), ntohl(max)); SENDERR(EINVAL); } if (ntohl(min) <= 255) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_spirange_build: " "minspi=%08x must be > 255.\n", ntohl(min)); SENDERR(EEXIST); } pfkey_spirange = (struct sadb_spirange*) MALLOC(sizeof(struct sadb_spirange)); *pfkey_ext = (struct sadb_ext*)pfkey_spirange; if (pfkey_spirange == NULL) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_spirange_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_spirange, 0, sizeof(struct sadb_spirange)); pfkey_spirange->sadb_spirange_len = sizeof(struct sadb_spirange) / IPSEC_PFKEYv2_ALIGN; pfkey_spirange->sadb_spirange_exttype = SADB_EXT_SPIRANGE; pfkey_spirange->sadb_spirange_min = min; pfkey_spirange->sadb_spirange_max = max; pfkey_spirange->sadb_spirange_reserved = 0; errlab: return error; } static int pfkey_x_kmprivate_build(struct sadb_ext **pfkey_ext) { int error = 0; struct sadb_x_kmprivate *pfkey_x_kmprivate = (struct sadb_x_kmprivate *)*pfkey_ext; /* sanity checks... */ if (pfkey_x_kmprivate) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_kmprivate_build: " "why is pfkey_x_kmprivate already pointing to something?\n"); SENDERR(EINVAL); } pfkey_x_kmprivate->sadb_x_kmprivate_reserved = 0; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_kmprivate_build: " "Sorry, I can't build exttype=%d yet.\n", (*pfkey_ext)->sadb_ext_type); SENDERR(EINVAL); /* don't process these yet */ pfkey_x_kmprivate = (struct sadb_x_kmprivate*) MALLOC(sizeof(struct sadb_x_kmprivate)); *pfkey_ext = (struct sadb_ext*)pfkey_x_kmprivate; if (pfkey_x_kmprivate == NULL) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_kmprivate_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_x_kmprivate, 0, sizeof(struct sadb_x_kmprivate)); pfkey_x_kmprivate->sadb_x_kmprivate_len = sizeof(struct sadb_x_kmprivate) / IPSEC_PFKEYv2_ALIGN; pfkey_x_kmprivate->sadb_x_kmprivate_exttype = K_SADB_X_EXT_KMPRIVATE; pfkey_x_kmprivate->sadb_x_kmprivate_reserved = 0; errlab: return error; } #endif int pfkey_x_satype_build(struct sadb_ext** pfkey_ext, uint8_t satype) { int error = 0; int i; struct sadb_x_satype *pfkey_x_satype = (struct sadb_x_satype *)*pfkey_ext; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_satype_build:\n"); /* sanity checks... */ if (pfkey_x_satype) { ERROR("pfkey_x_satype_build: " "why is pfkey_x_satype already pointing to something?\n"); SENDERR(EINVAL); } if (!satype) { ERROR("pfkey_x_satype_build: " "SA type not set, must be non-zero.\n"); SENDERR(EINVAL); } if (satype > K_SADB_SATYPE_MAX) { ERROR("pfkey_x_satype_build: " "satype %d > max %d\n", satype, K_SADB_SATYPE_MAX); SENDERR(EINVAL); } pfkey_x_satype = (struct sadb_x_satype*) MALLOC(sizeof(struct sadb_x_satype)); *pfkey_ext = (struct sadb_ext*)pfkey_x_satype; if (pfkey_x_satype == NULL) { ERROR("pfkey_x_satype_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } memset(pfkey_x_satype, 0, sizeof(struct sadb_x_satype)); pfkey_x_satype->sadb_x_satype_len = sizeof(struct sadb_x_satype) / IPSEC_PFKEYv2_ALIGN; pfkey_x_satype->sadb_x_satype_exttype = K_SADB_X_EXT_SATYPE2; pfkey_x_satype->sadb_x_satype_satype = satype; for (i = 0; i < 3; i++) pfkey_x_satype->sadb_x_satype_reserved[i] = 0; errlab: return error; } int pfkey_x_debug_build(struct sadb_ext** pfkey_ext, uint32_t tunnel, uint32_t netlink, uint32_t xform, uint32_t eroute, uint32_t spi, uint32_t radij, uint32_t esp, uint32_t ah, uint32_t rcv, uint32_t pfkey, uint32_t ipcomp, uint32_t verbose) { int error = 0; int i; struct sadb_x_debug *pfkey_x_debug = (struct sadb_x_debug *)*pfkey_ext; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_debug_build:\n"); /* sanity checks... */ if (pfkey_x_debug) { ERROR("pfkey_x_debug_build: " "why is pfkey_x_debug already pointing to something?\n"); SENDERR(EINVAL); } DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_debug_build: " "tunnel=%x netlink=%x xform=%x eroute=%x spi=%x radij=%x esp=%x ah=%x rcv=%x pfkey=%x ipcomp=%x verbose=%x?\n", tunnel, netlink, xform, eroute, spi, radij, esp, ah, rcv, pfkey, ipcomp, verbose); pfkey_x_debug = (struct sadb_x_debug*) MALLOC(sizeof(struct sadb_x_debug)); *pfkey_ext = (struct sadb_ext*)pfkey_x_debug; if (pfkey_x_debug == NULL) { ERROR("pfkey_x_debug_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } #if 0 memset(pfkey_x_debug, 0, sizeof(struct sadb_x_debug)); #endif pfkey_x_debug->sadb_x_debug_len = sizeof(struct sadb_x_debug) / IPSEC_PFKEYv2_ALIGN; pfkey_x_debug->sadb_x_debug_exttype = K_SADB_X_EXT_DEBUG; pfkey_x_debug->sadb_x_debug_tunnel = tunnel; pfkey_x_debug->sadb_x_debug_netlink = netlink; pfkey_x_debug->sadb_x_debug_xform = xform; pfkey_x_debug->sadb_x_debug_eroute = eroute; pfkey_x_debug->sadb_x_debug_spi = spi; pfkey_x_debug->sadb_x_debug_radij = radij; pfkey_x_debug->sadb_x_debug_esp = esp; pfkey_x_debug->sadb_x_debug_ah = ah; pfkey_x_debug->sadb_x_debug_rcv = rcv; pfkey_x_debug->sadb_x_debug_pfkey = pfkey; pfkey_x_debug->sadb_x_debug_ipcomp = ipcomp; pfkey_x_debug->sadb_x_debug_verbose = verbose; for (i = 0; i < 4; i++) pfkey_x_debug->sadb_x_debug_reserved[i] = 0; errlab: return error; } int pfkey_x_nat_t_type_build(struct sadb_ext** pfkey_ext, uint8_t type) { int error = 0; int i; struct sadb_x_nat_t_type *pfkey_x_nat_t_type = (struct sadb_x_nat_t_type *)*pfkey_ext; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_nat_t_type_build:\n"); /* sanity checks... */ if (pfkey_x_nat_t_type) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_nat_t_type_build: " "why is pfkey_x_nat_t_type already pointing to something?\n"); SENDERR(EINVAL); } DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_nat_t_type_build: " "type=%d\n", type); pfkey_x_nat_t_type = (struct sadb_x_nat_t_type*) MALLOC(sizeof(struct sadb_x_nat_t_type)); *pfkey_ext = (struct sadb_ext*)pfkey_x_nat_t_type; if (pfkey_x_nat_t_type == NULL) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_nat_t_type_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } pfkey_x_nat_t_type->sadb_x_nat_t_type_len = sizeof(struct sadb_x_nat_t_type) / IPSEC_PFKEYv2_ALIGN; pfkey_x_nat_t_type->sadb_x_nat_t_type_exttype = K_SADB_X_EXT_NAT_T_TYPE; pfkey_x_nat_t_type->sadb_x_nat_t_type_type = type; for (i = 0; i < 3; i++) pfkey_x_nat_t_type->sadb_x_nat_t_type_reserved[i] = 0; errlab: return error; } int pfkey_x_nat_t_port_build(struct sadb_ext** pfkey_ext, uint16_t exttype, uint16_t port) { int error = 0; struct sadb_x_nat_t_port *pfkey_x_nat_t_port = (struct sadb_x_nat_t_port *)*pfkey_ext; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_nat_t_port_build:\n"); /* sanity checks... */ if (pfkey_x_nat_t_port) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_nat_t_port_build: " "why is pfkey_x_nat_t_port already pointing to something?\n"); SENDERR(EINVAL); } switch (exttype) { case K_SADB_X_EXT_NAT_T_SPORT: case K_SADB_X_EXT_NAT_T_DPORT: break; default: DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_nat_t_port_build: " "unrecognised ext_type=%d.\n", exttype); SENDERR(EINVAL); } DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_nat_t_port_build: " "ext=%d, port=%d\n", exttype, port); pfkey_x_nat_t_port = (struct sadb_x_nat_t_port*) MALLOC(sizeof(struct sadb_x_nat_t_port)); *pfkey_ext = (struct sadb_ext*)pfkey_x_nat_t_port; if (pfkey_x_nat_t_port == NULL) { DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_nat_t_port_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } pfkey_x_nat_t_port->sadb_x_nat_t_port_len = sizeof(struct sadb_x_nat_t_port) / IPSEC_PFKEYv2_ALIGN; pfkey_x_nat_t_port->sadb_x_nat_t_port_exttype = exttype; pfkey_x_nat_t_port->sadb_x_nat_t_port_port = port; pfkey_x_nat_t_port->sadb_x_nat_t_port_reserved = 0; errlab: return error; } int pfkey_x_protocol_build(struct sadb_ext **pfkey_ext, uint8_t protocol) { int error = 0; struct sadb_protocol * p = (struct sadb_protocol *)*pfkey_ext; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_x_protocol_build: protocol=%u\n", protocol); /* sanity checks... */ if (p != 0) { ERROR("pfkey_x_protocol_build: bogus protocol pointer\n"); SENDERR(EINVAL); } if ((p = (struct sadb_protocol*)MALLOC(sizeof(*p))) == 0) { ERROR("pfkey_build: memory allocation failed\n"); SENDERR(ENOMEM); } *pfkey_ext = (struct sadb_ext *)p; p->sadb_protocol_len = sizeof(*p) / IPSEC_PFKEYv2_ALIGN; p->sadb_protocol_exttype = K_SADB_X_EXT_PROTOCOL; p->sadb_protocol_proto = protocol; p->sadb_protocol_flags = 0; p->sadb_protocol_reserved2 = 0; errlab: return error; } int pfkey_outif_build(struct sadb_ext **pfkey_ext, uint16_t outif) { int error = 0; struct sadb_x_plumbif *p; if ((p = (struct sadb_x_plumbif*)MALLOC(sizeof(*p))) == 0) { ERROR("pfkey_build: memory allocation failed\n"); SENDERR(ENOMEM); } *pfkey_ext = (struct sadb_ext *)p; p->sadb_x_outif_len = IPSEC_PFKEYv2_WORDS(sizeof(*p)); p->sadb_x_outif_exttype = K_SADB_X_EXT_PLUMBIF; p->sadb_x_outif_ifnum = outif; errlab: return error; } int pfkey_saref_build(struct sadb_ext **pfkey_ext, IPsecSAref_t in, IPsecSAref_t out) { int error = 0; struct sadb_x_saref* s; /* +4 because sadb_x_saref is not a multiple of 8 bytes */ if ((s = (struct sadb_x_saref*)MALLOC(sizeof(*s) + 4)) == 0) { ERROR("pfkey_build: memory allocation failed\n"); SENDERR(ENOMEM); } *pfkey_ext = (struct sadb_ext *)s; s->sadb_x_saref_len = IPSEC_PFKEYv2_WORDS(sizeof(*s)); s->sadb_x_saref_exttype = K_SADB_X_EXT_SAREF; s->sadb_x_saref_me = in; s->sadb_x_saref_him = out; errlab: return error; } #if defined(I_DONT_THINK_THIS_WILL_BE_USEFUL) && \ I_DONT_THINK_THIS_WILL_BE_USEFUL int(*ext_default_builders[K_SADB_EXT_MAX + 1])(struct sadb_msg*, struct sadb_ext*) = { NULL, /* pfkey_msg_build, */ pfkey_sa_build, pfkey_lifetime_build, pfkey_lifetime_build, pfkey_lifetime_build, pfkey_address_build, pfkey_address_build, pfkey_address_build, pfkey_key_build, pfkey_key_build, pfkey_ident_build, pfkey_ident_build, pfkey_sens_build, pfkey_prop_build, pfkey_supported_build, pfkey_supported_build, pfkey_spirange_build, pfkey_x_kmprivate_build, pfkey_x_satype_build, pfkey_sa_build, pfkey_address_build, pfkey_address_build, pfkey_address_build, pfkey_address_build, pfkey_address_build, pfkey_x_ext_debug_build }; #endif int pfkey_msg_build(struct sadb_msg **pfkey_msg, struct sadb_ext *extensions[], int dir) { int error = 0; unsigned ext; unsigned total_size; struct sadb_ext *pfkey_ext; pfkey_ext_track extensions_seen = 0; #ifndef __KERNEL__ struct sadb_ext *extensions_check[K_SADB_EXT_MAX + 1]; #endif if (!extensions[0]) { ERROR("pfkey_msg_build: " "extensions[0] must be specified (struct sadb_msg).\n"); SENDERR(EINVAL); } /* figure out the total size for all the requested extensions */ total_size = IPSEC_PFKEYv2_WORDS(sizeof(struct sadb_msg)); DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_msg_build: extensions[%d] needs %zu bytes\n", 0, total_size * IPSEC_PFKEYv2_ALIGN); for (ext = 1; ext <= K_SADB_EXT_MAX; ext++) { if (extensions[ext]) { total_size += (extensions[ext])->sadb_ext_len; DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_msg_build: extensions[%d] needs %zu bytes\n", ext, (extensions[ext])->sadb_ext_len * IPSEC_PFKEYv2_ALIGN); } } /* allocate that much space */ *pfkey_msg = (struct sadb_msg*)MALLOC(total_size * IPSEC_PFKEYv2_ALIGN); if (*pfkey_msg == NULL) { ERROR("pfkey_msg_build: " "memory allocation failed\n"); SENDERR(ENOMEM); } DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_msg_build: " "pfkey_msg=0p%p allocated %lu bytes, &(extensions[0])=0p%p\n", *pfkey_msg, (unsigned long)(total_size * IPSEC_PFKEYv2_ALIGN), &(extensions[0])); memcpy(*pfkey_msg, extensions[0], sizeof(struct sadb_msg)); (*pfkey_msg)->sadb_msg_len = total_size; (*pfkey_msg)->sadb_msg_reserved = 0; extensions_seen = 1; /* * point pfkey_ext to immediately after the space for the header, * i.e. at the first extension location. */ pfkey_ext = (struct sadb_ext*) (((char*)(*pfkey_msg)) + sizeof(struct sadb_msg)); for (ext = 1; ext <= K_SADB_EXT_MAX; ext++) { /* copy from extension[ext] to buffer */ if (extensions[ext]) { /* Is this type of extension permitted for this type of message? */ if (!pfkey_permitted_extension(dir, (*pfkey_msg)-> sadb_msg_type, ext)) { ERROR("ext type %d not permitted for %d/%d (build)\n", ext, dir, (*pfkey_msg)->sadb_msg_type); SENDERR(EINVAL); } DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_msg_build: " "copying %lu bytes from extensions[%u] (type=%d)\n", (unsigned long)(extensions[ext]->sadb_ext_len * IPSEC_PFKEYv2_ALIGN), ext, extensions[ext]->sadb_ext_type); memcpy(pfkey_ext, extensions[ext], (extensions[ext])->sadb_ext_len * IPSEC_PFKEYv2_ALIGN); { char *pfkey_ext_c = (char *)pfkey_ext; pfkey_ext_c += (extensions[ext])->sadb_ext_len * IPSEC_PFKEYv2_ALIGN; pfkey_ext = (struct sadb_ext *)pfkey_ext_c; } /* Mark that we have seen this extension */ pfkey_mark_extension(ext, &extensions_seen); } } #if 0 /* check required extensions */ DEBUGGING(PF_KEY_DEBUG_BUILD, "pfkey_msg_build: " "extensions permitted=%08x, seen=%08x, required=%08x.\n", extensions_bitmaps[dir][EXT_BITS_PERM][(*pfkey_msg)-> sadb_msg_type], extensions_seen, extensions_bitmaps[dir][EXT_BITS_REQ][(*pfkey_msg)-> sadb_msg_type]); #endif #ifndef __KERNEL__ /* * this is silly, there is no need to reparse the message that we just built. * */ if ((error = pfkey_msg_parse(*pfkey_msg, NULL, extensions_check, dir))) { ERROR("pfkey_msg_build: " "Trouble parsing newly built pfkey message, error=%d.\n", error); SENDERR(-error); } #endif errlab: return error; }