Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
/* $NetBSD: ah_core.c,v 1.39 2006/01/21 00:15:36 rpaulo Exp $ */
|
2003-07-25 14:00:49 +04:00
|
|
|
/* $KAME: ah_core.c,v 1.57 2003/07/25 09:33:36 itojun Exp $ */
|
1999-07-04 01:24:45 +04:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*
|
|
|
|
* Copyright (C) 1995, 1996, 1997, and 1998 WIDE Project.
|
|
|
|
* All rights reserved.
|
2000-06-02 22:20:15 +04:00
|
|
|
*
|
1999-06-28 10:36:47 +04:00
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions
|
|
|
|
* are met:
|
|
|
|
* 1. Redistributions of source code must retain the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer.
|
|
|
|
* 2. Redistributions in binary form must reproduce the above copyright
|
|
|
|
* notice, this list of conditions and the following disclaimer in the
|
|
|
|
* documentation and/or other materials provided with the distribution.
|
|
|
|
* 3. Neither the name of the project nor the names of its contributors
|
|
|
|
* may be used to endorse or promote products derived from this software
|
|
|
|
* without specific prior written permission.
|
2000-06-02 22:20:15 +04:00
|
|
|
*
|
1999-06-28 10:36:47 +04:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND
|
|
|
|
* ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE
|
|
|
|
* FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
|
|
|
|
* DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
|
|
|
|
* OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
|
|
|
|
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
|
|
|
|
* LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
|
|
|
|
* OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
|
|
|
|
* SUCH DAMAGE.
|
|
|
|
*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* RFC1826/2402 authentication header.
|
|
|
|
*/
|
|
|
|
|
2001-11-13 03:56:55 +03:00
|
|
|
#include <sys/cdefs.h>
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
__KERNEL_RCSID(0, "$NetBSD: ah_core.c,v 1.39 2006/01/21 00:15:36 rpaulo Exp $");
|
2001-11-13 03:56:55 +03:00
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
#include "opt_inet.h"
|
1999-07-10 02:57:15 +04:00
|
|
|
#include "opt_ipsec.h"
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
#include <sys/param.h>
|
|
|
|
#include <sys/systm.h>
|
|
|
|
#include <sys/malloc.h>
|
|
|
|
#include <sys/mbuf.h>
|
|
|
|
#include <sys/domain.h>
|
|
|
|
#include <sys/protosw.h>
|
|
|
|
#include <sys/socket.h>
|
|
|
|
#include <sys/socketvar.h>
|
|
|
|
#include <sys/errno.h>
|
|
|
|
#include <sys/time.h>
|
|
|
|
#include <sys/kernel.h>
|
2000-01-31 17:18:52 +03:00
|
|
|
#include <sys/syslog.h>
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
#include <net/if.h>
|
|
|
|
#include <net/route.h>
|
|
|
|
|
|
|
|
#include <netinet/in.h>
|
|
|
|
#include <netinet/in_systm.h>
|
|
|
|
#include <netinet/ip.h>
|
|
|
|
#include <netinet/in_var.h>
|
|
|
|
|
|
|
|
#ifdef INET6
|
2000-02-06 15:49:37 +03:00
|
|
|
#include <netinet/ip6.h>
|
1999-06-28 10:36:47 +04:00
|
|
|
#include <netinet6/ip6_var.h>
|
2000-02-06 15:49:37 +03:00
|
|
|
#include <netinet/icmp6.h>
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
#include <netinet6/scope6_var.h>
|
1999-06-28 10:36:47 +04:00
|
|
|
#endif
|
|
|
|
|
|
|
|
#include <netinet6/ipsec.h>
|
|
|
|
#include <netinet6/ah.h>
|
2003-07-25 14:00:49 +04:00
|
|
|
#include <netinet6/ah_aesxcbcmac.h>
|
1999-07-01 12:12:45 +04:00
|
|
|
#ifdef IPSEC_ESP
|
1999-06-28 10:36:47 +04:00
|
|
|
#include <netinet6/esp.h>
|
1999-07-01 12:12:45 +04:00
|
|
|
#endif
|
2000-02-06 15:49:37 +03:00
|
|
|
#include <net/pfkeyv2.h>
|
1999-06-28 10:36:47 +04:00
|
|
|
#include <netkey/keydb.h>
|
|
|
|
#include <sys/md5.h>
|
2003-07-22 07:24:23 +04:00
|
|
|
#define MD5_RESULTLEN 16
|
1999-06-28 10:36:47 +04:00
|
|
|
#include <sys/sha1.h>
|
|
|
|
#define SHA1_RESULTLEN 20
|
2003-07-22 07:24:23 +04:00
|
|
|
#include <crypto/sha2/sha2.h>
|
2003-07-25 14:00:49 +04:00
|
|
|
#include <crypto/ripemd160/rmd160.h>
|
|
|
|
#define RIPEMD160_RESULTLEN 20
|
2000-01-31 17:18:52 +03:00
|
|
|
|
|
|
|
#include <net/net_osdep.h>
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-01-31 17:18:52 +03:00
|
|
|
static int ah_sumsiz_1216 __P((struct secasvar *));
|
|
|
|
static int ah_sumsiz_zero __P((struct secasvar *));
|
2003-07-22 07:24:23 +04:00
|
|
|
static int ah_common_mature __P((struct secasvar *));
|
2000-01-31 17:18:52 +03:00
|
|
|
static int ah_none_mature __P((struct secasvar *));
|
2000-07-18 18:56:42 +04:00
|
|
|
static int ah_none_init __P((struct ah_algorithm_state *, struct secasvar *));
|
2002-09-11 07:45:44 +04:00
|
|
|
static void ah_none_loop __P((struct ah_algorithm_state *, u_int8_t *, size_t));
|
2003-07-20 22:01:41 +04:00
|
|
|
static void ah_none_result __P((struct ah_algorithm_state *,
|
|
|
|
u_int8_t *, size_t));
|
2000-01-31 17:18:52 +03:00
|
|
|
static int ah_keyed_md5_mature __P((struct secasvar *));
|
2000-06-02 22:20:15 +04:00
|
|
|
static int ah_keyed_md5_init __P((struct ah_algorithm_state *,
|
2000-01-31 17:18:52 +03:00
|
|
|
struct secasvar *));
|
2002-09-11 07:45:44 +04:00
|
|
|
static void ah_keyed_md5_loop __P((struct ah_algorithm_state *, u_int8_t *,
|
1999-06-28 10:36:47 +04:00
|
|
|
size_t));
|
2003-07-20 22:01:41 +04:00
|
|
|
static void ah_keyed_md5_result __P((struct ah_algorithm_state *,
|
|
|
|
u_int8_t *, size_t));
|
2000-06-02 22:20:15 +04:00
|
|
|
static int ah_keyed_sha1_init __P((struct ah_algorithm_state *,
|
2000-01-31 17:18:52 +03:00
|
|
|
struct secasvar *));
|
2002-09-11 07:45:44 +04:00
|
|
|
static void ah_keyed_sha1_loop __P((struct ah_algorithm_state *, u_int8_t *,
|
1999-06-28 10:36:47 +04:00
|
|
|
size_t));
|
2003-07-20 22:01:41 +04:00
|
|
|
static void ah_keyed_sha1_result __P((struct ah_algorithm_state *, u_int8_t *,
|
|
|
|
size_t));
|
2000-06-02 22:20:15 +04:00
|
|
|
static int ah_hmac_md5_init __P((struct ah_algorithm_state *,
|
2000-01-31 17:18:52 +03:00
|
|
|
struct secasvar *));
|
2002-09-11 07:45:44 +04:00
|
|
|
static void ah_hmac_md5_loop __P((struct ah_algorithm_state *, u_int8_t *,
|
1999-06-28 10:36:47 +04:00
|
|
|
size_t));
|
2003-07-20 22:01:41 +04:00
|
|
|
static void ah_hmac_md5_result __P((struct ah_algorithm_state *,
|
|
|
|
u_int8_t *, size_t));
|
2000-06-02 22:20:15 +04:00
|
|
|
static int ah_hmac_sha1_init __P((struct ah_algorithm_state *,
|
2000-01-31 17:18:52 +03:00
|
|
|
struct secasvar *));
|
2002-09-11 07:45:44 +04:00
|
|
|
static void ah_hmac_sha1_loop __P((struct ah_algorithm_state *, u_int8_t *,
|
1999-06-28 10:36:47 +04:00
|
|
|
size_t));
|
2003-07-20 22:01:41 +04:00
|
|
|
static void ah_hmac_sha1_result __P((struct ah_algorithm_state *,
|
|
|
|
u_int8_t *, size_t));
|
2003-07-22 07:24:23 +04:00
|
|
|
static int ah_hmac_sha2_256_init __P((struct ah_algorithm_state *,
|
|
|
|
struct secasvar *));
|
|
|
|
static void ah_hmac_sha2_256_loop __P((struct ah_algorithm_state *, u_int8_t *,
|
|
|
|
size_t));
|
|
|
|
static void ah_hmac_sha2_256_result __P((struct ah_algorithm_state *,
|
|
|
|
u_int8_t *, size_t));
|
|
|
|
static int ah_hmac_sha2_384_init __P((struct ah_algorithm_state *,
|
|
|
|
struct secasvar *));
|
|
|
|
static void ah_hmac_sha2_384_loop __P((struct ah_algorithm_state *, u_int8_t *,
|
|
|
|
size_t));
|
|
|
|
static void ah_hmac_sha2_384_result __P((struct ah_algorithm_state *,
|
|
|
|
u_int8_t *, size_t));
|
|
|
|
static int ah_hmac_sha2_512_init __P((struct ah_algorithm_state *,
|
|
|
|
struct secasvar *));
|
|
|
|
static void ah_hmac_sha2_512_loop __P((struct ah_algorithm_state *, u_int8_t *,
|
|
|
|
size_t));
|
|
|
|
static void ah_hmac_sha2_512_result __P((struct ah_algorithm_state *,
|
|
|
|
u_int8_t *, size_t));
|
2003-07-25 14:00:49 +04:00
|
|
|
static int ah_hmac_ripemd160_init __P((struct ah_algorithm_state *,
|
|
|
|
struct secasvar *));
|
|
|
|
static void ah_hmac_ripemd160_loop __P((struct ah_algorithm_state *, u_int8_t *,
|
|
|
|
size_t));
|
|
|
|
static void ah_hmac_ripemd160_result __P((struct ah_algorithm_state *,
|
|
|
|
u_int8_t *, size_t));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-07-18 18:56:42 +04:00
|
|
|
static void ah_update_mbuf __P((struct mbuf *, int, int,
|
|
|
|
const struct ah_algorithm *, struct ah_algorithm_state *));
|
|
|
|
|
2004-03-10 06:45:04 +03:00
|
|
|
/* checksum algorithms */
|
|
|
|
static const struct ah_algorithm ah_algorithms[] = {
|
|
|
|
{ ah_sumsiz_1216, ah_common_mature, 128, 128, "hmac-md5",
|
|
|
|
ah_hmac_md5_init, ah_hmac_md5_loop,
|
|
|
|
ah_hmac_md5_result, },
|
|
|
|
{ ah_sumsiz_1216, ah_common_mature, 160, 160, "hmac-sha1",
|
|
|
|
ah_hmac_sha1_init, ah_hmac_sha1_loop,
|
|
|
|
ah_hmac_sha1_result, },
|
|
|
|
{ ah_sumsiz_1216, ah_keyed_md5_mature, 128, 128, "keyed-md5",
|
|
|
|
ah_keyed_md5_init, ah_keyed_md5_loop,
|
|
|
|
ah_keyed_md5_result, },
|
|
|
|
{ ah_sumsiz_1216, ah_common_mature, 160, 160, "keyed-sha1",
|
|
|
|
ah_keyed_sha1_init, ah_keyed_sha1_loop,
|
|
|
|
ah_keyed_sha1_result, },
|
|
|
|
{ ah_sumsiz_zero, ah_none_mature, 0, 2048, "none",
|
|
|
|
ah_none_init, ah_none_loop, ah_none_result, },
|
|
|
|
{ ah_sumsiz_1216, ah_common_mature, 256, 256,
|
|
|
|
"hmac-sha2-256",
|
|
|
|
ah_hmac_sha2_256_init, ah_hmac_sha2_256_loop,
|
|
|
|
ah_hmac_sha2_256_result, },
|
|
|
|
{ ah_sumsiz_1216, ah_common_mature, 384, 384,
|
|
|
|
"hmac-sha2-384",
|
|
|
|
ah_hmac_sha2_384_init, ah_hmac_sha2_384_loop,
|
|
|
|
ah_hmac_sha2_384_result, },
|
|
|
|
{ ah_sumsiz_1216, ah_common_mature, 512, 512,
|
|
|
|
"hmac-sha2-512",
|
|
|
|
ah_hmac_sha2_512_init, ah_hmac_sha2_512_loop,
|
|
|
|
ah_hmac_sha2_512_result, },
|
|
|
|
{ ah_sumsiz_1216, ah_common_mature, 160, 160,
|
|
|
|
"hmac-ripemd160",
|
|
|
|
ah_hmac_ripemd160_init, ah_hmac_ripemd160_loop,
|
|
|
|
ah_hmac_ripemd160_result, },
|
|
|
|
{ ah_sumsiz_1216, ah_common_mature, 128, 128,
|
|
|
|
"aes-xcbc-mac",
|
|
|
|
ah_aes_xcbc_mac_init, ah_aes_xcbc_mac_loop,
|
|
|
|
ah_aes_xcbc_mac_result, },
|
|
|
|
};
|
|
|
|
|
2000-07-18 18:56:42 +04:00
|
|
|
const struct ah_algorithm *
|
|
|
|
ah_algorithm_lookup(idx)
|
|
|
|
int idx;
|
|
|
|
{
|
|
|
|
|
|
|
|
switch (idx) {
|
|
|
|
case SADB_AALG_MD5HMAC:
|
|
|
|
return &ah_algorithms[0];
|
|
|
|
case SADB_AALG_SHA1HMAC:
|
|
|
|
return &ah_algorithms[1];
|
|
|
|
case SADB_X_AALG_MD5:
|
|
|
|
return &ah_algorithms[2];
|
|
|
|
case SADB_X_AALG_SHA:
|
|
|
|
return &ah_algorithms[3];
|
|
|
|
case SADB_X_AALG_NULL:
|
|
|
|
return &ah_algorithms[4];
|
2003-07-22 07:24:23 +04:00
|
|
|
case SADB_X_AALG_SHA2_256:
|
|
|
|
return &ah_algorithms[5];
|
|
|
|
case SADB_X_AALG_SHA2_384:
|
|
|
|
return &ah_algorithms[6];
|
|
|
|
case SADB_X_AALG_SHA2_512:
|
|
|
|
return &ah_algorithms[7];
|
2003-07-25 14:00:49 +04:00
|
|
|
case SADB_X_AALG_RIPEMD160HMAC:
|
|
|
|
return &ah_algorithms[8];
|
|
|
|
case SADB_X_AALG_AES_XCBC_MAC:
|
|
|
|
return &ah_algorithms[9];
|
2000-07-18 18:56:42 +04:00
|
|
|
default:
|
|
|
|
return NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
static int
|
2000-01-31 17:18:52 +03:00
|
|
|
ah_sumsiz_1216(sav)
|
|
|
|
struct secasvar *sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
2000-01-31 17:18:52 +03:00
|
|
|
if (!sav)
|
2002-06-08 03:42:41 +04:00
|
|
|
panic("ah_sumsiz_1216: null pointer is passed");
|
2000-01-31 17:18:52 +03:00
|
|
|
if (sav->flags & SADB_X_EXT_OLD)
|
1999-06-28 10:36:47 +04:00
|
|
|
return 16;
|
|
|
|
else
|
|
|
|
return 12;
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2000-01-31 17:18:52 +03:00
|
|
|
ah_sumsiz_zero(sav)
|
|
|
|
struct secasvar *sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
2000-01-31 17:18:52 +03:00
|
|
|
if (!sav)
|
2002-06-08 03:42:41 +04:00
|
|
|
panic("ah_sumsiz_zero: null pointer is passed");
|
1999-06-28 10:36:47 +04:00
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-07-22 07:24:23 +04:00
|
|
|
static int
|
|
|
|
ah_common_mature(sav)
|
|
|
|
struct secasvar *sav;
|
|
|
|
{
|
|
|
|
const struct ah_algorithm *algo;
|
|
|
|
|
|
|
|
if (!sav->key_auth) {
|
|
|
|
ipseclog((LOG_ERR, "ah_common_mature: no key is given.\n"));
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
algo = ah_algorithm_lookup(sav->alg_auth);
|
|
|
|
if (!algo) {
|
|
|
|
ipseclog((LOG_ERR, "ah_common_mature: unsupported algorithm.\n"));
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
2003-07-25 14:17:36 +04:00
|
|
|
if (sav->key_auth->sadb_key_bits < algo->keymin ||
|
|
|
|
algo->keymax < sav->key_auth->sadb_key_bits) {
|
2003-07-22 07:24:23 +04:00
|
|
|
ipseclog((LOG_ERR,
|
|
|
|
"ah_common_mature: invalid key length %d for %s.\n",
|
|
|
|
sav->key_auth->sadb_key_bits, algo->name));
|
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
static int
|
2000-01-31 17:18:52 +03:00
|
|
|
ah_none_mature(sav)
|
|
|
|
struct secasvar *sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
2000-01-31 17:18:52 +03:00
|
|
|
if (sav->sah->saidx.proto == IPPROTO_AH) {
|
|
|
|
ipseclog((LOG_ERR,
|
|
|
|
"ah_none_mature: protocol and algorithm mismatch.\n"));
|
1999-06-28 10:36:47 +04:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-06-02 22:20:15 +04:00
|
|
|
static int
|
2000-01-31 17:18:52 +03:00
|
|
|
ah_none_init(state, sav)
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ah_algorithm_state *state;
|
2000-01-31 17:18:52 +03:00
|
|
|
struct secasvar *sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
state->foo = NULL;
|
2000-06-02 22:20:15 +04:00
|
|
|
return 0;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_none_loop(state, addr, len)
|
|
|
|
struct ah_algorithm_state *state;
|
2002-09-11 07:45:44 +04:00
|
|
|
u_int8_t * addr;
|
1999-06-28 10:36:47 +04:00
|
|
|
size_t len;
|
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2003-07-20 22:01:41 +04:00
|
|
|
ah_none_result(state, addr, l)
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ah_algorithm_state *state;
|
2003-07-20 22:01:41 +04:00
|
|
|
u_int8_t *addr;
|
|
|
|
size_t l;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
2000-01-31 17:18:52 +03:00
|
|
|
ah_keyed_md5_mature(sav)
|
|
|
|
struct secasvar *sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
/* anything is okay */
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2000-06-02 22:20:15 +04:00
|
|
|
static int
|
2000-01-31 17:18:52 +03:00
|
|
|
ah_keyed_md5_init(state, sav)
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ah_algorithm_state *state;
|
2000-01-31 17:18:52 +03:00
|
|
|
struct secasvar *sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
2000-06-02 22:20:15 +04:00
|
|
|
size_t padlen;
|
|
|
|
size_t keybitlen;
|
|
|
|
u_int8_t buf[32];
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
if (!state)
|
|
|
|
panic("ah_keyed_md5_init: what?");
|
|
|
|
|
2000-01-31 17:18:52 +03:00
|
|
|
state->sav = sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
state->foo = (void *)malloc(sizeof(MD5_CTX), M_TEMP, M_NOWAIT);
|
|
|
|
if (state->foo == NULL)
|
2000-06-02 22:20:15 +04:00
|
|
|
return ENOBUFS;
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
MD5Init((MD5_CTX *)state->foo);
|
2000-01-31 17:18:52 +03:00
|
|
|
if (state->sav) {
|
2000-06-02 22:20:15 +04:00
|
|
|
MD5Update((MD5_CTX *)state->foo,
|
2000-01-31 17:18:52 +03:00
|
|
|
(u_int8_t *)_KEYBUF(state->sav->key_auth),
|
|
|
|
(u_int)_KEYLEN(state->sav->key_auth));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Pad after the key.
|
|
|
|
* We cannot simply use md5_pad() since the function
|
|
|
|
* won't update the total length.
|
|
|
|
*/
|
2000-01-31 17:18:52 +03:00
|
|
|
if (_KEYLEN(state->sav->key_auth) < 56)
|
|
|
|
padlen = 64 - 8 - _KEYLEN(state->sav->key_auth);
|
1999-06-28 10:36:47 +04:00
|
|
|
else
|
2000-01-31 17:18:52 +03:00
|
|
|
padlen = 64 + 64 - 8 - _KEYLEN(state->sav->key_auth);
|
|
|
|
keybitlen = _KEYLEN(state->sav->key_auth);
|
1999-06-28 10:36:47 +04:00
|
|
|
keybitlen *= 8;
|
|
|
|
|
|
|
|
buf[0] = 0x80;
|
|
|
|
MD5Update((MD5_CTX *)state->foo, &buf[0], 1);
|
|
|
|
padlen--;
|
|
|
|
|
|
|
|
bzero(buf, sizeof(buf));
|
|
|
|
while (sizeof(buf) < padlen) {
|
|
|
|
MD5Update((MD5_CTX *)state->foo, &buf[0], sizeof(buf));
|
|
|
|
padlen -= sizeof(buf);
|
|
|
|
}
|
|
|
|
if (padlen) {
|
|
|
|
MD5Update((MD5_CTX *)state->foo, &buf[0], padlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
buf[0] = (keybitlen >> 0) & 0xff;
|
|
|
|
buf[1] = (keybitlen >> 8) & 0xff;
|
|
|
|
buf[2] = (keybitlen >> 16) & 0xff;
|
|
|
|
buf[3] = (keybitlen >> 24) & 0xff;
|
|
|
|
MD5Update((MD5_CTX *)state->foo, buf, 8);
|
|
|
|
}
|
2000-06-02 22:20:15 +04:00
|
|
|
|
|
|
|
return 0;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_keyed_md5_loop(state, addr, len)
|
|
|
|
struct ah_algorithm_state *state;
|
2002-09-11 07:45:44 +04:00
|
|
|
u_int8_t * addr;
|
1999-06-28 10:36:47 +04:00
|
|
|
size_t len;
|
|
|
|
{
|
|
|
|
if (!state)
|
|
|
|
panic("ah_keyed_md5_loop: what?");
|
|
|
|
|
|
|
|
MD5Update((MD5_CTX *)state->foo, addr, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2003-07-20 22:01:41 +04:00
|
|
|
ah_keyed_md5_result(state, addr, l)
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ah_algorithm_state *state;
|
2003-07-20 22:01:41 +04:00
|
|
|
u_int8_t *addr;
|
|
|
|
size_t l;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
2003-07-22 07:24:23 +04:00
|
|
|
u_char digest[MD5_RESULTLEN];
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
if (!state)
|
|
|
|
panic("ah_keyed_md5_result: what?");
|
|
|
|
|
2000-01-31 17:18:52 +03:00
|
|
|
if (state->sav) {
|
2000-06-02 22:20:15 +04:00
|
|
|
MD5Update((MD5_CTX *)state->foo,
|
2000-01-31 17:18:52 +03:00
|
|
|
(u_int8_t *)_KEYBUF(state->sav->key_auth),
|
|
|
|
(u_int)_KEYLEN(state->sav->key_auth));
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
2003-07-20 22:01:41 +04:00
|
|
|
MD5Final(digest, (MD5_CTX *)state->foo);
|
1999-06-28 10:36:47 +04:00
|
|
|
free(state->foo, M_TEMP);
|
2003-07-20 22:01:41 +04:00
|
|
|
bcopy(digest, addr, sizeof(digest) > l ? l : sizeof(digest));
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
2000-06-02 22:20:15 +04:00
|
|
|
static int
|
2000-01-31 17:18:52 +03:00
|
|
|
ah_keyed_sha1_init(state, sav)
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ah_algorithm_state *state;
|
2000-01-31 17:18:52 +03:00
|
|
|
struct secasvar *sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
SHA1_CTX *ctxt;
|
2000-06-02 22:20:15 +04:00
|
|
|
size_t padlen;
|
|
|
|
size_t keybitlen;
|
|
|
|
u_int8_t buf[32];
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
if (!state)
|
|
|
|
panic("ah_keyed_sha1_init: what?");
|
|
|
|
|
2000-01-31 17:18:52 +03:00
|
|
|
state->sav = sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
state->foo = (void *)malloc(sizeof(SHA1_CTX), M_TEMP, M_NOWAIT);
|
|
|
|
if (!state->foo)
|
2000-06-02 22:20:15 +04:00
|
|
|
return ENOBUFS;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
ctxt = (SHA1_CTX *)state->foo;
|
|
|
|
SHA1Init(ctxt);
|
|
|
|
|
2000-01-31 17:18:52 +03:00
|
|
|
if (state->sav) {
|
|
|
|
SHA1Update(ctxt, (u_int8_t *)_KEYBUF(state->sav->key_auth),
|
|
|
|
(u_int)_KEYLEN(state->sav->key_auth));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Pad after the key.
|
|
|
|
*/
|
2000-01-31 17:18:52 +03:00
|
|
|
if (_KEYLEN(state->sav->key_auth) < 56)
|
|
|
|
padlen = 64 - 8 - _KEYLEN(state->sav->key_auth);
|
1999-06-28 10:36:47 +04:00
|
|
|
else
|
2000-01-31 17:18:52 +03:00
|
|
|
padlen = 64 + 64 - 8 - _KEYLEN(state->sav->key_auth);
|
|
|
|
keybitlen = _KEYLEN(state->sav->key_auth);
|
1999-06-28 10:36:47 +04:00
|
|
|
keybitlen *= 8;
|
|
|
|
|
|
|
|
buf[0] = 0x80;
|
|
|
|
SHA1Update(ctxt, &buf[0], 1);
|
|
|
|
padlen--;
|
|
|
|
|
|
|
|
bzero(buf, sizeof(buf));
|
|
|
|
while (sizeof(buf) < padlen) {
|
|
|
|
SHA1Update(ctxt, &buf[0], sizeof(buf));
|
|
|
|
padlen -= sizeof(buf);
|
|
|
|
}
|
|
|
|
if (padlen) {
|
|
|
|
SHA1Update(ctxt, &buf[0], padlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
buf[0] = (keybitlen >> 0) & 0xff;
|
|
|
|
buf[1] = (keybitlen >> 8) & 0xff;
|
|
|
|
buf[2] = (keybitlen >> 16) & 0xff;
|
|
|
|
buf[3] = (keybitlen >> 24) & 0xff;
|
|
|
|
SHA1Update(ctxt, buf, 8);
|
|
|
|
}
|
2000-06-02 22:20:15 +04:00
|
|
|
|
|
|
|
return 0;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_keyed_sha1_loop(state, addr, len)
|
|
|
|
struct ah_algorithm_state *state;
|
2002-09-11 07:45:44 +04:00
|
|
|
u_int8_t * addr;
|
1999-06-28 10:36:47 +04:00
|
|
|
size_t len;
|
|
|
|
{
|
|
|
|
SHA1_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_keyed_sha1_loop: what?");
|
|
|
|
ctxt = (SHA1_CTX *)state->foo;
|
|
|
|
|
2002-09-11 07:45:44 +04:00
|
|
|
SHA1Update(ctxt, (u_int8_t *)addr, (size_t)len);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2003-07-20 22:01:41 +04:00
|
|
|
ah_keyed_sha1_result(state, addr, l)
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ah_algorithm_state *state;
|
2003-07-20 22:01:41 +04:00
|
|
|
u_int8_t *addr;
|
|
|
|
size_t l;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
u_char digest[SHA1_RESULTLEN]; /* SHA-1 generates 160 bits */
|
|
|
|
SHA1_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_keyed_sha1_result: what?");
|
|
|
|
ctxt = (SHA1_CTX *)state->foo;
|
|
|
|
|
2000-01-31 17:18:52 +03:00
|
|
|
if (state->sav) {
|
|
|
|
SHA1Update(ctxt, (u_int8_t *)_KEYBUF(state->sav->key_auth),
|
|
|
|
(u_int)_KEYLEN(state->sav->key_auth));
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
2003-07-20 22:01:41 +04:00
|
|
|
SHA1Final((u_int8_t *)digest, ctxt);
|
|
|
|
bcopy(digest, addr, sizeof(digest) > l ? l : sizeof(digest));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
free(state->foo, M_TEMP);
|
|
|
|
}
|
|
|
|
|
2000-06-02 22:20:15 +04:00
|
|
|
static int
|
2000-01-31 17:18:52 +03:00
|
|
|
ah_hmac_md5_init(state, sav)
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ah_algorithm_state *state;
|
2000-01-31 17:18:52 +03:00
|
|
|
struct secasvar *sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
2003-07-22 07:24:23 +04:00
|
|
|
u_char tk[MD5_RESULTLEN];
|
1999-06-28 10:36:47 +04:00
|
|
|
u_char *key;
|
|
|
|
size_t keylen;
|
|
|
|
size_t i;
|
|
|
|
MD5_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state)
|
|
|
|
panic("ah_hmac_md5_init: what?");
|
|
|
|
|
2000-01-31 17:18:52 +03:00
|
|
|
state->sav = sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
state->foo = (void *)malloc(64 + 64 + sizeof(MD5_CTX), M_TEMP, M_NOWAIT);
|
|
|
|
if (!state->foo)
|
2000-06-02 22:20:15 +04:00
|
|
|
return ENOBUFS;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (MD5_CTX *)(opad + 64);
|
|
|
|
|
|
|
|
/* compress the key if necessery */
|
2000-01-31 17:18:52 +03:00
|
|
|
if (64 < _KEYLEN(state->sav->key_auth)) {
|
1999-06-28 10:36:47 +04:00
|
|
|
MD5Init(ctxt);
|
2000-01-31 17:18:52 +03:00
|
|
|
MD5Update(ctxt, _KEYBUF(state->sav->key_auth),
|
|
|
|
_KEYLEN(state->sav->key_auth));
|
1999-06-28 10:36:47 +04:00
|
|
|
MD5Final(&tk[0], ctxt);
|
|
|
|
key = &tk[0];
|
|
|
|
keylen = 16;
|
|
|
|
} else {
|
2000-01-31 17:18:52 +03:00
|
|
|
key = _KEYBUF(state->sav->key_auth);
|
|
|
|
keylen = _KEYLEN(state->sav->key_auth);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
bzero(ipad, 64);
|
|
|
|
bzero(opad, 64);
|
|
|
|
bcopy(key, ipad, keylen);
|
|
|
|
bcopy(key, opad, keylen);
|
|
|
|
for (i = 0; i < 64; i++) {
|
|
|
|
ipad[i] ^= 0x36;
|
|
|
|
opad[i] ^= 0x5c;
|
|
|
|
}
|
|
|
|
|
|
|
|
MD5Init(ctxt);
|
|
|
|
MD5Update(ctxt, ipad, 64);
|
2000-06-02 22:20:15 +04:00
|
|
|
|
|
|
|
return 0;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_hmac_md5_loop(state, addr, len)
|
|
|
|
struct ah_algorithm_state *state;
|
2002-09-11 07:45:44 +04:00
|
|
|
u_int8_t * addr;
|
1999-06-28 10:36:47 +04:00
|
|
|
size_t len;
|
|
|
|
{
|
|
|
|
MD5_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_md5_loop: what?");
|
2002-09-11 07:45:44 +04:00
|
|
|
ctxt = (MD5_CTX *)(((u_int8_t *)state->foo) + 128);
|
1999-06-28 10:36:47 +04:00
|
|
|
MD5Update(ctxt, addr, len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2003-07-20 22:01:41 +04:00
|
|
|
ah_hmac_md5_result(state, addr, l)
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ah_algorithm_state *state;
|
2003-07-20 22:01:41 +04:00
|
|
|
u_int8_t *addr;
|
|
|
|
size_t l;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
2003-07-22 07:24:23 +04:00
|
|
|
u_char digest[MD5_RESULTLEN];
|
1999-06-28 10:36:47 +04:00
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
|
|
|
MD5_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_md5_result: what?");
|
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (MD5_CTX *)(opad + 64);
|
|
|
|
|
2003-07-20 22:01:41 +04:00
|
|
|
MD5Final(digest, ctxt);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
MD5Init(ctxt);
|
|
|
|
MD5Update(ctxt, opad, 64);
|
2003-07-20 22:01:41 +04:00
|
|
|
MD5Update(ctxt, digest, sizeof(digest));
|
|
|
|
MD5Final(digest, ctxt);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2003-07-20 22:01:41 +04:00
|
|
|
bcopy(digest, addr, sizeof(digest) > l ? l : sizeof(digest));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
free(state->foo, M_TEMP);
|
|
|
|
}
|
|
|
|
|
2000-06-02 22:20:15 +04:00
|
|
|
static int
|
2000-01-31 17:18:52 +03:00
|
|
|
ah_hmac_sha1_init(state, sav)
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ah_algorithm_state *state;
|
2000-01-31 17:18:52 +03:00
|
|
|
struct secasvar *sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
|
|
|
SHA1_CTX *ctxt;
|
|
|
|
u_char tk[SHA1_RESULTLEN]; /* SHA-1 generates 160 bits */
|
|
|
|
u_char *key;
|
|
|
|
size_t keylen;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
if (!state)
|
|
|
|
panic("ah_hmac_sha1_init: what?");
|
|
|
|
|
2000-01-31 17:18:52 +03:00
|
|
|
state->sav = sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
state->foo = (void *)malloc(64 + 64 + sizeof(SHA1_CTX),
|
|
|
|
M_TEMP, M_NOWAIT);
|
|
|
|
if (!state->foo)
|
2000-06-02 22:20:15 +04:00
|
|
|
return ENOBUFS;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (SHA1_CTX *)(opad + 64);
|
|
|
|
|
|
|
|
/* compress the key if necessery */
|
2000-01-31 17:18:52 +03:00
|
|
|
if (64 < _KEYLEN(state->sav->key_auth)) {
|
1999-06-28 10:36:47 +04:00
|
|
|
SHA1Init(ctxt);
|
2000-01-31 17:18:52 +03:00
|
|
|
SHA1Update(ctxt, _KEYBUF(state->sav->key_auth),
|
|
|
|
_KEYLEN(state->sav->key_auth));
|
1999-06-28 10:36:47 +04:00
|
|
|
SHA1Final(&tk[0], ctxt);
|
|
|
|
key = &tk[0];
|
|
|
|
keylen = SHA1_RESULTLEN;
|
|
|
|
} else {
|
2000-01-31 17:18:52 +03:00
|
|
|
key = _KEYBUF(state->sav->key_auth);
|
|
|
|
keylen = _KEYLEN(state->sav->key_auth);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
bzero(ipad, 64);
|
|
|
|
bzero(opad, 64);
|
|
|
|
bcopy(key, ipad, keylen);
|
|
|
|
bcopy(key, opad, keylen);
|
|
|
|
for (i = 0; i < 64; i++) {
|
|
|
|
ipad[i] ^= 0x36;
|
|
|
|
opad[i] ^= 0x5c;
|
|
|
|
}
|
|
|
|
|
|
|
|
SHA1Init(ctxt);
|
|
|
|
SHA1Update(ctxt, ipad, 64);
|
2000-06-02 22:20:15 +04:00
|
|
|
|
|
|
|
return 0;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_hmac_sha1_loop(state, addr, len)
|
|
|
|
struct ah_algorithm_state *state;
|
2002-09-11 07:45:44 +04:00
|
|
|
u_int8_t * addr;
|
1999-06-28 10:36:47 +04:00
|
|
|
size_t len;
|
|
|
|
{
|
|
|
|
SHA1_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_sha1_loop: what?");
|
|
|
|
|
|
|
|
ctxt = (SHA1_CTX *)(((u_char *)state->foo) + 128);
|
2002-09-11 07:45:44 +04:00
|
|
|
SHA1Update(ctxt, (u_int8_t *)addr, (size_t)len);
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
2003-07-20 22:01:41 +04:00
|
|
|
ah_hmac_sha1_result(state, addr, l)
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ah_algorithm_state *state;
|
2003-07-20 22:01:41 +04:00
|
|
|
u_int8_t *addr;
|
|
|
|
size_t l;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
u_char digest[SHA1_RESULTLEN]; /* SHA-1 generates 160 bits */
|
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
|
|
|
SHA1_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_sha1_result: what?");
|
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (SHA1_CTX *)(opad + 64);
|
|
|
|
|
2003-07-20 22:01:41 +04:00
|
|
|
SHA1Final((u_int8_t *)digest, ctxt);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
SHA1Init(ctxt);
|
|
|
|
SHA1Update(ctxt, opad, 64);
|
2003-07-20 22:01:41 +04:00
|
|
|
SHA1Update(ctxt, (u_int8_t *)digest, sizeof(digest));
|
|
|
|
SHA1Final((u_int8_t *)digest, ctxt);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2003-07-20 22:01:41 +04:00
|
|
|
bcopy(digest, addr, sizeof(digest) > l ? l : sizeof(digest));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
free(state->foo, M_TEMP);
|
|
|
|
}
|
|
|
|
|
2003-07-22 07:24:23 +04:00
|
|
|
static int
|
|
|
|
ah_hmac_sha2_256_init(state, sav)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
struct secasvar *sav;
|
|
|
|
{
|
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
|
|
|
SHA256_CTX *ctxt;
|
|
|
|
u_char tk[SHA256_DIGEST_LENGTH];
|
|
|
|
u_char *key;
|
|
|
|
size_t keylen;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
if (!state)
|
|
|
|
panic("ah_hmac_sha2_256_init: what?");
|
|
|
|
|
|
|
|
state->sav = sav;
|
|
|
|
state->foo = (void *)malloc(64 + 64 + sizeof(SHA256_CTX),
|
|
|
|
M_TEMP, M_NOWAIT);
|
|
|
|
if (!state->foo)
|
|
|
|
return ENOBUFS;
|
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (SHA256_CTX *)(opad + 64);
|
|
|
|
|
|
|
|
/* compress the key if necessery */
|
|
|
|
if (64 < _KEYLEN(state->sav->key_auth)) {
|
|
|
|
bzero(tk, sizeof(tk));
|
|
|
|
SHA256_Init(ctxt);
|
|
|
|
SHA256_Update(ctxt, _KEYBUF(state->sav->key_auth),
|
|
|
|
_KEYLEN(state->sav->key_auth));
|
|
|
|
SHA256_Final(&tk[0], ctxt);
|
|
|
|
key = &tk[0];
|
|
|
|
keylen = sizeof(tk) < 64 ? sizeof(tk) : 64;
|
|
|
|
} else {
|
|
|
|
key = _KEYBUF(state->sav->key_auth);
|
|
|
|
keylen = _KEYLEN(state->sav->key_auth);
|
|
|
|
}
|
|
|
|
|
|
|
|
bzero(ipad, 64);
|
|
|
|
bzero(opad, 64);
|
|
|
|
bcopy(key, ipad, keylen);
|
|
|
|
bcopy(key, opad, keylen);
|
|
|
|
for (i = 0; i < 64; i++) {
|
|
|
|
ipad[i] ^= 0x36;
|
|
|
|
opad[i] ^= 0x5c;
|
|
|
|
}
|
|
|
|
|
|
|
|
SHA256_Init(ctxt);
|
|
|
|
SHA256_Update(ctxt, ipad, 64);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_hmac_sha2_256_loop(state, addr, len)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
u_int8_t *addr;
|
|
|
|
size_t len;
|
|
|
|
{
|
|
|
|
SHA256_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_sha2_256_loop: what?");
|
|
|
|
|
|
|
|
ctxt = (SHA256_CTX *)(((u_char *)state->foo) + 128);
|
|
|
|
SHA256_Update(ctxt, (caddr_t)addr, (size_t)len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_hmac_sha2_256_result(state, addr, l)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
u_int8_t *addr;
|
|
|
|
size_t l;
|
|
|
|
{
|
|
|
|
u_char digest[SHA256_DIGEST_LENGTH];
|
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
|
|
|
SHA256_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_sha2_256_result: what?");
|
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (SHA256_CTX *)(opad + 64);
|
|
|
|
|
|
|
|
SHA256_Final((caddr_t)digest, ctxt);
|
|
|
|
|
|
|
|
SHA256_Init(ctxt);
|
|
|
|
SHA256_Update(ctxt, opad, 64);
|
|
|
|
SHA256_Update(ctxt, (caddr_t)digest, sizeof(digest));
|
|
|
|
SHA256_Final((caddr_t)digest, ctxt);
|
|
|
|
|
|
|
|
bcopy(digest, addr, sizeof(digest) > l ? l : sizeof(digest));
|
|
|
|
|
|
|
|
free(state->foo, M_TEMP);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
ah_hmac_sha2_384_init(state, sav)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
struct secasvar *sav;
|
|
|
|
{
|
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
|
|
|
SHA384_CTX *ctxt;
|
|
|
|
u_char tk[SHA384_DIGEST_LENGTH];
|
|
|
|
u_char *key;
|
|
|
|
size_t keylen;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
if (!state)
|
|
|
|
panic("ah_hmac_sha2_384_init: what?");
|
|
|
|
|
|
|
|
state->sav = sav;
|
|
|
|
state->foo = (void *)malloc(64 + 64 + sizeof(SHA384_CTX),
|
|
|
|
M_TEMP, M_NOWAIT);
|
|
|
|
if (!state->foo)
|
|
|
|
return ENOBUFS;
|
|
|
|
bzero(state->foo, 64 + 64 + sizeof(SHA384_CTX));
|
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (SHA384_CTX *)(opad + 64);
|
|
|
|
|
|
|
|
/* compress the key if necessery */
|
|
|
|
if (64 < _KEYLEN(state->sav->key_auth)) {
|
|
|
|
bzero(tk, sizeof(tk));
|
|
|
|
SHA384_Init(ctxt);
|
|
|
|
SHA384_Update(ctxt, _KEYBUF(state->sav->key_auth),
|
|
|
|
_KEYLEN(state->sav->key_auth));
|
|
|
|
SHA384_Final(&tk[0], ctxt);
|
|
|
|
key = &tk[0];
|
|
|
|
keylen = sizeof(tk) < 64 ? sizeof(tk) : 64;
|
|
|
|
} else {
|
|
|
|
key = _KEYBUF(state->sav->key_auth);
|
|
|
|
keylen = _KEYLEN(state->sav->key_auth);
|
|
|
|
}
|
|
|
|
|
|
|
|
bzero(ipad, 64);
|
|
|
|
bzero(opad, 64);
|
|
|
|
bcopy(key, ipad, keylen);
|
|
|
|
bcopy(key, opad, keylen);
|
|
|
|
for (i = 0; i < 64; i++) {
|
|
|
|
ipad[i] ^= 0x36;
|
|
|
|
opad[i] ^= 0x5c;
|
|
|
|
}
|
|
|
|
|
|
|
|
SHA384_Init(ctxt);
|
|
|
|
SHA384_Update(ctxt, ipad, 64);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_hmac_sha2_384_loop(state, addr, len)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
u_int8_t *addr;
|
|
|
|
size_t len;
|
|
|
|
{
|
|
|
|
SHA384_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_sha2_384_loop: what?");
|
|
|
|
|
|
|
|
ctxt = (SHA384_CTX *)(((u_char *)state->foo) + 128);
|
|
|
|
SHA384_Update(ctxt, (caddr_t)addr, (size_t)len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_hmac_sha2_384_result(state, addr, l)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
u_int8_t *addr;
|
|
|
|
size_t l;
|
|
|
|
{
|
|
|
|
u_char digest[SHA384_DIGEST_LENGTH];
|
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
|
|
|
SHA384_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_sha2_384_result: what?");
|
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (SHA384_CTX *)(opad + 64);
|
|
|
|
|
|
|
|
SHA384_Final((caddr_t)digest, ctxt);
|
|
|
|
|
|
|
|
SHA384_Init(ctxt);
|
|
|
|
SHA384_Update(ctxt, opad, 64);
|
|
|
|
SHA384_Update(ctxt, (caddr_t)digest, sizeof(digest));
|
|
|
|
SHA384_Final((caddr_t)digest, ctxt);
|
|
|
|
|
|
|
|
bcopy(digest, addr, sizeof(digest) > l ? l : sizeof(digest));
|
|
|
|
|
|
|
|
free(state->foo, M_TEMP);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int
|
|
|
|
ah_hmac_sha2_512_init(state, sav)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
struct secasvar *sav;
|
|
|
|
{
|
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
|
|
|
SHA512_CTX *ctxt;
|
|
|
|
u_char tk[SHA512_DIGEST_LENGTH];
|
|
|
|
u_char *key;
|
|
|
|
size_t keylen;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
if (!state)
|
|
|
|
panic("ah_hmac_sha2_512_init: what?");
|
|
|
|
|
|
|
|
state->sav = sav;
|
|
|
|
state->foo = (void *)malloc(64 + 64 + sizeof(SHA512_CTX),
|
|
|
|
M_TEMP, M_NOWAIT);
|
|
|
|
if (!state->foo)
|
|
|
|
return ENOBUFS;
|
|
|
|
bzero(state->foo, 64 + 64 + sizeof(SHA512_CTX));
|
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (SHA512_CTX *)(opad + 64);
|
|
|
|
|
|
|
|
/* compress the key if necessery */
|
|
|
|
if (64 < _KEYLEN(state->sav->key_auth)) {
|
|
|
|
bzero(tk, sizeof(tk));
|
|
|
|
SHA512_Init(ctxt);
|
|
|
|
SHA512_Update(ctxt, _KEYBUF(state->sav->key_auth),
|
|
|
|
_KEYLEN(state->sav->key_auth));
|
|
|
|
SHA512_Final(&tk[0], ctxt);
|
|
|
|
key = &tk[0];
|
|
|
|
keylen = sizeof(tk) < 64 ? sizeof(tk) : 64;
|
|
|
|
} else {
|
|
|
|
key = _KEYBUF(state->sav->key_auth);
|
|
|
|
keylen = _KEYLEN(state->sav->key_auth);
|
|
|
|
}
|
|
|
|
|
|
|
|
bzero(ipad, 64);
|
|
|
|
bzero(opad, 64);
|
|
|
|
bcopy(key, ipad, keylen);
|
|
|
|
bcopy(key, opad, keylen);
|
|
|
|
for (i = 0; i < 64; i++) {
|
|
|
|
ipad[i] ^= 0x36;
|
|
|
|
opad[i] ^= 0x5c;
|
|
|
|
}
|
|
|
|
|
|
|
|
SHA512_Init(ctxt);
|
|
|
|
SHA512_Update(ctxt, ipad, 64);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_hmac_sha2_512_loop(state, addr, len)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
u_int8_t *addr;
|
|
|
|
size_t len;
|
|
|
|
{
|
|
|
|
SHA512_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_sha2_512_loop: what?");
|
|
|
|
|
|
|
|
ctxt = (SHA512_CTX *)(((u_char *)state->foo) + 128);
|
|
|
|
SHA512_Update(ctxt, (caddr_t)addr, (size_t)len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_hmac_sha2_512_result(state, addr, l)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
u_int8_t *addr;
|
|
|
|
size_t l;
|
|
|
|
{
|
|
|
|
u_char digest[SHA512_DIGEST_LENGTH];
|
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
|
|
|
SHA512_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_sha2_512_result: what?");
|
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (SHA512_CTX *)(opad + 64);
|
|
|
|
|
|
|
|
SHA512_Final((caddr_t)digest, ctxt);
|
|
|
|
|
|
|
|
SHA512_Init(ctxt);
|
|
|
|
SHA512_Update(ctxt, opad, 64);
|
|
|
|
SHA512_Update(ctxt, (caddr_t)digest, sizeof(digest));
|
|
|
|
SHA512_Final((caddr_t)digest, ctxt);
|
|
|
|
|
|
|
|
bcopy(digest, addr, sizeof(digest) > l ? l : sizeof(digest));
|
|
|
|
|
|
|
|
free(state->foo, M_TEMP);
|
|
|
|
}
|
|
|
|
|
2003-07-25 14:00:49 +04:00
|
|
|
static int
|
|
|
|
ah_hmac_ripemd160_init(state, sav)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
struct secasvar *sav;
|
|
|
|
{
|
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
|
|
|
RMD160_CTX *ctxt;
|
|
|
|
u_char tk[RIPEMD160_RESULTLEN];
|
|
|
|
u_char *key;
|
|
|
|
size_t keylen;
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
if (!state)
|
|
|
|
panic("ah_hmac_ripemd160_init: what?");
|
|
|
|
|
|
|
|
state->sav = sav;
|
|
|
|
state->foo = (void *)malloc(64 + 64 + sizeof(RMD160_CTX),
|
|
|
|
M_TEMP, M_NOWAIT);
|
|
|
|
if (!state->foo)
|
|
|
|
return ENOBUFS;
|
|
|
|
bzero(state->foo, 64 + 64 + sizeof(RMD160_CTX));
|
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (RMD160_CTX *)(opad + 64);
|
|
|
|
|
|
|
|
/* compress the key if necessery */
|
|
|
|
if (64 < _KEYLEN(state->sav->key_auth)) {
|
|
|
|
bzero(tk, sizeof(tk));
|
|
|
|
RMD160Init(ctxt);
|
|
|
|
RMD160Update(ctxt, _KEYBUF(state->sav->key_auth),
|
|
|
|
_KEYLEN(state->sav->key_auth));
|
|
|
|
RMD160Final(&tk[0], ctxt);
|
|
|
|
key = &tk[0];
|
|
|
|
keylen = sizeof(tk) < 64 ? sizeof(tk) : 64;
|
|
|
|
} else {
|
|
|
|
key = _KEYBUF(state->sav->key_auth);
|
|
|
|
keylen = _KEYLEN(state->sav->key_auth);
|
|
|
|
}
|
|
|
|
|
|
|
|
bzero(ipad, 64);
|
|
|
|
bzero(opad, 64);
|
|
|
|
bcopy(key, ipad, keylen);
|
|
|
|
bcopy(key, opad, keylen);
|
|
|
|
for (i = 0; i < 64; i++) {
|
|
|
|
ipad[i] ^= 0x36;
|
|
|
|
opad[i] ^= 0x5c;
|
|
|
|
}
|
|
|
|
|
|
|
|
RMD160Init(ctxt);
|
|
|
|
RMD160Update(ctxt, ipad, 64);
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_hmac_ripemd160_loop(state, addr, len)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
u_int8_t *addr;
|
|
|
|
size_t len;
|
|
|
|
{
|
|
|
|
RMD160_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_ripemd160_loop: what?");
|
|
|
|
|
|
|
|
ctxt = (RMD160_CTX *)(((u_char *)state->foo) + 128);
|
|
|
|
RMD160Update(ctxt, (caddr_t)addr, (size_t)len);
|
|
|
|
}
|
|
|
|
|
|
|
|
static void
|
|
|
|
ah_hmac_ripemd160_result(state, addr, l)
|
|
|
|
struct ah_algorithm_state *state;
|
|
|
|
u_int8_t *addr;
|
|
|
|
size_t l;
|
|
|
|
{
|
|
|
|
u_char digest[RIPEMD160_RESULTLEN];
|
|
|
|
u_char *ipad;
|
|
|
|
u_char *opad;
|
|
|
|
RMD160_CTX *ctxt;
|
|
|
|
|
|
|
|
if (!state || !state->foo)
|
|
|
|
panic("ah_hmac_ripemd160_result: what?");
|
|
|
|
|
|
|
|
ipad = (u_char *)state->foo;
|
|
|
|
opad = (u_char *)(ipad + 64);
|
|
|
|
ctxt = (RMD160_CTX *)(opad + 64);
|
|
|
|
|
|
|
|
RMD160Final((caddr_t)digest, ctxt);
|
|
|
|
|
|
|
|
RMD160Init(ctxt);
|
|
|
|
RMD160Update(ctxt, opad, 64);
|
|
|
|
RMD160Update(ctxt, (caddr_t)digest, sizeof(digest));
|
|
|
|
RMD160Final((caddr_t)digest, ctxt);
|
|
|
|
|
|
|
|
bcopy(digest, addr, sizeof(digest) > l ? l : sizeof(digest));
|
|
|
|
|
|
|
|
free(state->foo, M_TEMP);
|
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
/*------------------------------------------------------------*/
|
|
|
|
|
|
|
|
/*
|
|
|
|
* go generate the checksum.
|
|
|
|
*/
|
2000-03-22 02:53:30 +03:00
|
|
|
static void
|
|
|
|
ah_update_mbuf(m, off, len, algo, algos)
|
|
|
|
struct mbuf *m;
|
|
|
|
int off;
|
|
|
|
int len;
|
2000-07-18 18:56:42 +04:00
|
|
|
const struct ah_algorithm *algo;
|
2000-03-22 02:53:30 +03:00
|
|
|
struct ah_algorithm_state *algos;
|
|
|
|
{
|
|
|
|
struct mbuf *n;
|
|
|
|
int tlen;
|
|
|
|
|
|
|
|
/* easy case first */
|
|
|
|
if (off + len <= m->m_len) {
|
2002-09-11 07:45:44 +04:00
|
|
|
(algo->update)(algos, mtod(m, u_int8_t *) + off, len);
|
2000-03-22 02:53:30 +03:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
for (n = m; n; n = n->m_next) {
|
|
|
|
if (off < n->m_len)
|
|
|
|
break;
|
|
|
|
|
|
|
|
off -= n->m_len;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!n)
|
|
|
|
panic("ah_update_mbuf: wrong offset specified");
|
|
|
|
|
2001-10-15 07:55:37 +04:00
|
|
|
for (/* nothing */; n && len > 0; n = n->m_next) {
|
2000-03-22 02:53:30 +03:00
|
|
|
if (n->m_len == 0)
|
|
|
|
continue;
|
|
|
|
if (n->m_len - off < len)
|
|
|
|
tlen = n->m_len - off;
|
|
|
|
else
|
|
|
|
tlen = len;
|
|
|
|
|
2002-09-11 07:45:44 +04:00
|
|
|
(algo->update)(algos, mtod(n, u_int8_t *) + off, tlen);
|
2000-03-22 02:53:30 +03:00
|
|
|
|
|
|
|
len -= tlen;
|
|
|
|
off = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2000-10-02 07:55:41 +04:00
|
|
|
#ifdef INET
|
2000-03-22 02:53:30 +03:00
|
|
|
/*
|
|
|
|
* Go generate the checksum. This function won't modify the mbuf chain
|
|
|
|
* except AH itself.
|
|
|
|
*
|
|
|
|
* NOTE: the function does not free mbuf on failure.
|
|
|
|
* Don't use m_copy(), it will try to share cluster mbuf by using refcnt.
|
|
|
|
*/
|
1999-06-28 10:36:47 +04:00
|
|
|
int
|
2000-06-02 22:20:15 +04:00
|
|
|
ah4_calccksum(m, ahdat, len, algo, sav)
|
2000-03-22 02:53:30 +03:00
|
|
|
struct mbuf *m;
|
2002-09-11 07:45:44 +04:00
|
|
|
u_int8_t * ahdat;
|
2000-06-02 22:20:15 +04:00
|
|
|
size_t len;
|
2000-07-18 18:56:42 +04:00
|
|
|
const struct ah_algorithm *algo;
|
2000-01-31 17:18:52 +03:00
|
|
|
struct secasvar *sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
2000-03-22 02:53:30 +03:00
|
|
|
int off;
|
1999-06-28 10:36:47 +04:00
|
|
|
int hdrtype;
|
|
|
|
size_t advancewidth;
|
|
|
|
struct ah_algorithm_state algos;
|
|
|
|
u_char sumbuf[AH_MAXSUMSIZE];
|
|
|
|
int error = 0;
|
2000-03-22 02:53:30 +03:00
|
|
|
int ahseen;
|
|
|
|
struct mbuf *n = NULL;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
if ((m->m_flags & M_PKTHDR) == 0)
|
|
|
|
return EINVAL;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
ahseen = 0;
|
2001-10-15 07:55:37 +04:00
|
|
|
hdrtype = -1; /* dummy, it is called IPPROTO_IP */
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
off = 0;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-06-02 22:20:15 +04:00
|
|
|
error = (algo->init)(&algos, sav);
|
|
|
|
if (error)
|
|
|
|
return error;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2001-10-15 07:55:37 +04:00
|
|
|
advancewidth = 0; /* safety */
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
again:
|
|
|
|
/* gory. */
|
|
|
|
switch (hdrtype) {
|
2001-10-15 07:55:37 +04:00
|
|
|
case -1: /* first one only */
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
|
|
|
/*
|
|
|
|
* copy ip hdr, modify to fit the AH checksum rule,
|
|
|
|
* then take a checksum.
|
|
|
|
*/
|
|
|
|
struct ip iphdr;
|
|
|
|
size_t hlen;
|
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
m_copydata(m, off, sizeof(iphdr), (caddr_t)&iphdr);
|
1999-06-28 10:36:47 +04:00
|
|
|
hlen = iphdr.ip_hl << 2;
|
|
|
|
iphdr.ip_ttl = 0;
|
|
|
|
iphdr.ip_sum = htons(0);
|
2000-03-22 02:53:30 +03:00
|
|
|
if (ip4_ah_cleartos)
|
|
|
|
iphdr.ip_tos = 0;
|
1999-06-28 10:36:47 +04:00
|
|
|
iphdr.ip_off = htons(ntohs(iphdr.ip_off) & ip4_ah_offsetmask);
|
2002-09-11 07:45:44 +04:00
|
|
|
(algo->update)(&algos, (u_int8_t *)&iphdr, sizeof(struct ip));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
if (hlen != sizeof(struct ip)) {
|
|
|
|
u_char *p;
|
2000-03-22 02:53:30 +03:00
|
|
|
int i, l, skip;
|
|
|
|
|
|
|
|
if (hlen > MCLBYTES) {
|
|
|
|
error = EMSGSIZE;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
MGET(n, M_DONTWAIT, MT_DATA);
|
|
|
|
if (n && hlen > MLEN) {
|
|
|
|
MCLGET(n, M_DONTWAIT);
|
|
|
|
if ((n->m_flags & M_EXT) == 0) {
|
|
|
|
m_free(n);
|
|
|
|
n = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (n == NULL) {
|
|
|
|
error = ENOBUFS;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
m_copydata(m, off, hlen, mtod(n, caddr_t));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
/*
|
|
|
|
* IP options processing.
|
|
|
|
* See RFC2402 appendix A.
|
|
|
|
*/
|
2000-03-22 02:53:30 +03:00
|
|
|
p = mtod(n, u_char *);
|
1999-06-28 10:36:47 +04:00
|
|
|
i = sizeof(struct ip);
|
|
|
|
while (i < hlen) {
|
2001-02-19 06:47:01 +03:00
|
|
|
if (i + IPOPT_OPTVAL >= hlen) {
|
2001-02-21 04:27:58 +03:00
|
|
|
ipseclog((LOG_ERR, "ah4_calccksum: "
|
|
|
|
"invalid IP option\n"));
|
2001-02-19 06:47:01 +03:00
|
|
|
error = EINVAL;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
if (p[i + IPOPT_OPTVAL] == IPOPT_EOL ||
|
|
|
|
p[i + IPOPT_OPTVAL] == IPOPT_NOP ||
|
|
|
|
i + IPOPT_OLEN < hlen)
|
|
|
|
;
|
|
|
|
else {
|
2001-02-21 04:27:58 +03:00
|
|
|
ipseclog((LOG_ERR,
|
|
|
|
"ah4_calccksum: invalid IP option "
|
|
|
|
"(type=%02x)\n",
|
|
|
|
p[i + IPOPT_OPTVAL]));
|
2001-02-19 06:47:01 +03:00
|
|
|
error = EINVAL;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
1999-06-28 10:36:47 +04:00
|
|
|
skip = 1;
|
|
|
|
switch (p[i + IPOPT_OPTVAL]) {
|
|
|
|
case IPOPT_EOL:
|
|
|
|
case IPOPT_NOP:
|
|
|
|
l = 1;
|
|
|
|
skip = 0;
|
|
|
|
break;
|
|
|
|
case IPOPT_SECURITY: /* 0x82 */
|
|
|
|
case 0x85: /* Extended security */
|
|
|
|
case 0x86: /* Commercial security */
|
|
|
|
case 0x94: /* Router alert */
|
|
|
|
case 0x95: /* RFC1770 */
|
|
|
|
l = p[i + IPOPT_OLEN];
|
2001-02-21 04:27:58 +03:00
|
|
|
if (l < 2)
|
|
|
|
goto invalopt;
|
1999-06-28 10:36:47 +04:00
|
|
|
skip = 0;
|
|
|
|
break;
|
|
|
|
default:
|
|
|
|
l = p[i + IPOPT_OLEN];
|
2001-02-21 04:27:58 +03:00
|
|
|
if (l < 2)
|
|
|
|
goto invalopt;
|
1999-06-28 10:36:47 +04:00
|
|
|
skip = 1;
|
|
|
|
break;
|
|
|
|
}
|
2001-02-21 04:27:58 +03:00
|
|
|
if (l < 1 || hlen - i < l) {
|
|
|
|
invalopt:
|
2000-01-31 17:18:52 +03:00
|
|
|
ipseclog((LOG_ERR,
|
|
|
|
"ah4_calccksum: invalid IP option "
|
|
|
|
"(type=%02x len=%02x)\n",
|
|
|
|
p[i + IPOPT_OPTVAL],
|
|
|
|
p[i + IPOPT_OLEN]));
|
2000-03-22 02:53:30 +03:00
|
|
|
error = EINVAL;
|
|
|
|
goto fail;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
2000-03-22 02:53:30 +03:00
|
|
|
if (skip)
|
|
|
|
bzero(p + i, l);
|
1999-06-28 10:36:47 +04:00
|
|
|
if (p[i + IPOPT_OPTVAL] == IPOPT_EOL)
|
|
|
|
break;
|
|
|
|
i += l;
|
|
|
|
}
|
2000-03-22 02:53:30 +03:00
|
|
|
p = mtod(n, u_char *) + sizeof(struct ip);
|
|
|
|
(algo->update)(&algos, p, hlen - sizeof(struct ip));
|
|
|
|
|
|
|
|
m_free(n);
|
|
|
|
n = NULL;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
|
|
|
hdrtype = (iphdr.ip_p) & 0xff;
|
|
|
|
advancewidth = hlen;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
case IPPROTO_AH:
|
|
|
|
{
|
2000-03-22 02:53:30 +03:00
|
|
|
struct ah ah;
|
1999-06-28 10:36:47 +04:00
|
|
|
int siz;
|
|
|
|
int hdrsiz;
|
2000-03-22 02:53:30 +03:00
|
|
|
int totlen;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
m_copydata(m, off, sizeof(ah), (caddr_t)&ah);
|
|
|
|
hdrsiz = (sav->flags & SADB_X_EXT_OLD)
|
|
|
|
? sizeof(struct ah)
|
|
|
|
: sizeof(struct newah);
|
2000-01-31 17:18:52 +03:00
|
|
|
siz = (*algo->sumsiz)(sav);
|
2000-03-22 02:53:30 +03:00
|
|
|
totlen = (ah.ah_len + 2) << 2;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
/*
|
|
|
|
* special treatment is necessary for the first one, not others
|
|
|
|
*/
|
|
|
|
if (!ahseen) {
|
|
|
|
if (totlen > m->m_pkthdr.len - off ||
|
|
|
|
totlen > MCLBYTES) {
|
|
|
|
error = EMSGSIZE;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
MGET(n, M_DONTWAIT, MT_DATA);
|
|
|
|
if (n && totlen > MLEN) {
|
|
|
|
MCLGET(n, M_DONTWAIT);
|
|
|
|
if ((n->m_flags & M_EXT) == 0) {
|
|
|
|
m_free(n);
|
|
|
|
n = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (n == NULL) {
|
|
|
|
error = ENOBUFS;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
m_copydata(m, off, totlen, mtod(n, caddr_t));
|
|
|
|
n->m_len = totlen;
|
2002-09-11 07:45:44 +04:00
|
|
|
bzero(mtod(n, u_int8_t *) + hdrsiz, siz);
|
|
|
|
(algo->update)(&algos, mtod(n, u_int8_t *), n->m_len);
|
2000-03-22 02:53:30 +03:00
|
|
|
m_free(n);
|
|
|
|
n = NULL;
|
|
|
|
} else
|
|
|
|
ah_update_mbuf(m, off, totlen, algo, &algos);
|
|
|
|
ahseen++;
|
|
|
|
|
|
|
|
hdrtype = ah.ah_nxt;
|
|
|
|
advancewidth = totlen;
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
default:
|
2000-03-22 02:53:30 +03:00
|
|
|
ah_update_mbuf(m, off, m->m_pkthdr.len - off, algo, &algos);
|
|
|
|
advancewidth = m->m_pkthdr.len - off;
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
off += advancewidth;
|
|
|
|
if (off < m->m_pkthdr.len)
|
|
|
|
goto again;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-06-02 22:20:15 +04:00
|
|
|
if (len < (*algo->sumsiz)(sav)) {
|
|
|
|
error = EINVAL;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
2003-07-20 22:01:41 +04:00
|
|
|
(algo->result)(&algos, sumbuf, sizeof(sumbuf));
|
2000-01-31 17:18:52 +03:00
|
|
|
bcopy(&sumbuf[0], ahdat, (*algo->sumsiz)(sav));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
if (n)
|
|
|
|
m_free(n);
|
|
|
|
return error;
|
|
|
|
|
|
|
|
fail:
|
|
|
|
if (n)
|
|
|
|
m_free(n);
|
1999-06-28 10:36:47 +04:00
|
|
|
return error;
|
|
|
|
}
|
2000-10-02 07:55:41 +04:00
|
|
|
#endif
|
1999-06-28 10:36:47 +04:00
|
|
|
|
|
|
|
#ifdef INET6
|
|
|
|
/*
|
2000-03-22 02:53:30 +03:00
|
|
|
* Go generate the checksum. This function won't modify the mbuf chain
|
1999-06-28 10:36:47 +04:00
|
|
|
* except AH itself.
|
2000-03-22 02:53:30 +03:00
|
|
|
*
|
|
|
|
* NOTE: the function does not free mbuf on failure.
|
|
|
|
* Don't use m_copy(), it will try to share cluster mbuf by using refcnt.
|
1999-06-28 10:36:47 +04:00
|
|
|
*/
|
|
|
|
int
|
2000-06-02 22:20:15 +04:00
|
|
|
ah6_calccksum(m, ahdat, len, algo, sav)
|
2000-03-22 02:53:30 +03:00
|
|
|
struct mbuf *m;
|
2002-09-11 07:45:44 +04:00
|
|
|
u_int8_t * ahdat;
|
2000-06-02 22:20:15 +04:00
|
|
|
size_t len;
|
2000-07-18 18:56:42 +04:00
|
|
|
const struct ah_algorithm *algo;
|
2000-01-31 17:18:52 +03:00
|
|
|
struct secasvar *sav;
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
2000-03-22 02:53:30 +03:00
|
|
|
int newoff, off;
|
|
|
|
int proto, nxt;
|
|
|
|
struct mbuf *n = NULL;
|
|
|
|
int error;
|
|
|
|
int ahseen;
|
1999-06-28 10:36:47 +04:00
|
|
|
struct ah_algorithm_state algos;
|
|
|
|
u_char sumbuf[AH_MAXSUMSIZE];
|
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
if ((m->m_flags & M_PKTHDR) == 0)
|
|
|
|
return EINVAL;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-06-02 22:20:15 +04:00
|
|
|
error = (algo->init)(&algos, sav);
|
|
|
|
if (error)
|
|
|
|
return error;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
off = 0;
|
|
|
|
proto = IPPROTO_IPV6;
|
|
|
|
nxt = -1;
|
|
|
|
ahseen = 0;
|
|
|
|
|
|
|
|
again:
|
|
|
|
newoff = ip6_nexthdr(m, off, proto, &nxt);
|
|
|
|
if (newoff < 0)
|
|
|
|
newoff = m->m_pkthdr.len;
|
|
|
|
else if (newoff <= off) {
|
|
|
|
error = EINVAL;
|
|
|
|
goto fail;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
switch (proto) {
|
|
|
|
case IPPROTO_IPV6:
|
|
|
|
/*
|
|
|
|
* special treatment is necessary for the first one, not others
|
|
|
|
*/
|
|
|
|
if (off == 0) {
|
|
|
|
struct ip6_hdr ip6copy;
|
|
|
|
|
|
|
|
if (newoff - off != sizeof(struct ip6_hdr)) {
|
|
|
|
error = EINVAL;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
|
|
|
m_copydata(m, off, newoff - off, (caddr_t)&ip6copy);
|
|
|
|
/* RFC2402 */
|
|
|
|
ip6copy.ip6_flow = 0;
|
|
|
|
ip6copy.ip6_vfc &= ~IPV6_VERSION_MASK;
|
|
|
|
ip6copy.ip6_vfc |= IPV6_VERSION;
|
|
|
|
ip6copy.ip6_hlim = 0;
|
Better support of IPv6 scoped addresses.
- most of the kernel code will not care about the actual encoding of
scope zone IDs and won't touch "s6_addr16[1]" directly.
- similarly, most of the kernel code will not care about link-local
scoped addresses as a special case.
- scope boundary check will be stricter. For example, the current
*BSD code allows a packet with src=::1 and dst=(some global IPv6
address) to be sent outside of the node, if the application do:
s = socket(AF_INET6);
bind(s, "::1");
sendto(s, some_global_IPv6_addr);
This is clearly wrong, since ::1 is only meaningful within a single
node, but the current implementation of the *BSD kernel cannot
reject this attempt.
- and, while there, don't try to remove the ff02::/32 interface route
entry in in6_ifdetach() as it's already gone.
This also includes some level of support for the standard source
address selection algorithm defined in RFC3484, which will be
completed on in the future.
From the KAME project via JINMEI Tatuya.
Approved by core@.
2006-01-21 03:15:35 +03:00
|
|
|
in6_clearscope(&ip6copy.ip6_src); /* XXX */
|
|
|
|
in6_clearscope(&ip6copy.ip6_dst); /* XXX */
|
2002-09-11 07:45:44 +04:00
|
|
|
(algo->update)(&algos, (u_int8_t *)&ip6copy,
|
2000-03-22 02:53:30 +03:00
|
|
|
sizeof(struct ip6_hdr));
|
|
|
|
} else {
|
|
|
|
newoff = m->m_pkthdr.len;
|
|
|
|
ah_update_mbuf(m, off, m->m_pkthdr.len - off, algo,
|
|
|
|
&algos);
|
|
|
|
}
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
|
|
|
|
case IPPROTO_AH:
|
|
|
|
{
|
|
|
|
int siz;
|
|
|
|
int hdrsiz;
|
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
hdrsiz = (sav->flags & SADB_X_EXT_OLD)
|
|
|
|
? sizeof(struct ah)
|
|
|
|
: sizeof(struct newah);
|
2000-01-31 17:18:52 +03:00
|
|
|
siz = (*algo->sumsiz)(sav);
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
/*
|
|
|
|
* special treatment is necessary for the first one, not others
|
|
|
|
*/
|
|
|
|
if (!ahseen) {
|
|
|
|
if (newoff - off > MCLBYTES) {
|
|
|
|
error = EMSGSIZE;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
MGET(n, M_DONTWAIT, MT_DATA);
|
|
|
|
if (n && newoff - off > MLEN) {
|
|
|
|
MCLGET(n, M_DONTWAIT);
|
|
|
|
if ((n->m_flags & M_EXT) == 0) {
|
|
|
|
m_free(n);
|
|
|
|
n = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (n == NULL) {
|
|
|
|
error = ENOBUFS;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
m_copydata(m, off, newoff - off, mtod(n, caddr_t));
|
|
|
|
n->m_len = newoff - off;
|
2002-09-11 07:45:44 +04:00
|
|
|
bzero(mtod(n, u_int8_t *) + hdrsiz, siz);
|
|
|
|
(algo->update)(&algos, mtod(n, u_int8_t *), n->m_len);
|
2000-03-22 02:53:30 +03:00
|
|
|
m_free(n);
|
|
|
|
n = NULL;
|
|
|
|
} else
|
|
|
|
ah_update_mbuf(m, off, newoff - off, algo, &algos);
|
|
|
|
ahseen++;
|
1999-06-28 10:36:47 +04:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2003-04-22 14:08:33 +04:00
|
|
|
case IPPROTO_HOPOPTS:
|
|
|
|
case IPPROTO_DSTOPTS:
|
1999-06-28 10:36:47 +04:00
|
|
|
{
|
2000-03-22 02:53:30 +03:00
|
|
|
struct ip6_ext *ip6e;
|
|
|
|
int hdrlen, optlen;
|
|
|
|
u_int8_t *p, *optend, *optp;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
if (newoff - off > MCLBYTES) {
|
|
|
|
error = EMSGSIZE;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
MGET(n, M_DONTWAIT, MT_DATA);
|
|
|
|
if (n && newoff - off > MLEN) {
|
|
|
|
MCLGET(n, M_DONTWAIT);
|
|
|
|
if ((n->m_flags & M_EXT) == 0) {
|
|
|
|
m_free(n);
|
|
|
|
n = NULL;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (n == NULL) {
|
|
|
|
error = ENOBUFS;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
m_copydata(m, off, newoff - off, mtod(n, caddr_t));
|
|
|
|
n->m_len = newoff - off;
|
|
|
|
|
|
|
|
ip6e = mtod(n, struct ip6_ext *);
|
|
|
|
hdrlen = (ip6e->ip6e_len + 1) << 3;
|
|
|
|
if (newoff - off < hdrlen) {
|
1999-06-28 10:36:47 +04:00
|
|
|
error = EINVAL;
|
2000-03-22 02:53:30 +03:00
|
|
|
m_free(n);
|
|
|
|
n = NULL;
|
|
|
|
goto fail;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
2000-03-22 02:53:30 +03:00
|
|
|
p = mtod(n, u_int8_t *);
|
|
|
|
optend = p + hdrlen;
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
/*
|
|
|
|
* ICV calculation for the options header including all
|
|
|
|
* options. This part is a little tricky since there are
|
|
|
|
* two type of options; mutable and immutable. We try to
|
|
|
|
* null-out mutable ones here.
|
|
|
|
*/
|
|
|
|
optp = p + 2;
|
|
|
|
while (optp < optend) {
|
|
|
|
if (optp[0] == IP6OPT_PAD1)
|
|
|
|
optlen = 1;
|
|
|
|
else {
|
|
|
|
if (optp + 2 > optend) {
|
|
|
|
error = EINVAL;
|
|
|
|
m_free(n);
|
|
|
|
n = NULL;
|
|
|
|
goto fail;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
2000-03-22 02:53:30 +03:00
|
|
|
optlen = optp[1] + 2;
|
2001-10-29 08:23:17 +03:00
|
|
|
}
|
2000-03-22 02:53:30 +03:00
|
|
|
|
2001-10-29 08:23:17 +03:00
|
|
|
if (optp + optlen > optend) {
|
|
|
|
error = EINVAL;
|
|
|
|
m_free(n);
|
|
|
|
n = NULL;
|
|
|
|
goto fail;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
2000-03-22 02:53:30 +03:00
|
|
|
|
2001-10-29 08:23:17 +03:00
|
|
|
if (optp[0] & IP6OPT_MUTABLE)
|
|
|
|
bzero(optp + 2, optlen - 2);
|
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
optp += optlen;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
2002-09-11 07:45:44 +04:00
|
|
|
(algo->update)(&algos, mtod(n, u_int8_t *), n->m_len);
|
2000-03-22 02:53:30 +03:00
|
|
|
m_free(n);
|
|
|
|
n = NULL;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
2003-04-22 14:08:33 +04:00
|
|
|
case IPPROTO_ROUTING:
|
2000-03-22 02:53:30 +03:00
|
|
|
/*
|
|
|
|
* For an input packet, we can just calculate `as is'.
|
|
|
|
* For an output packet, we assume ip6_output have already
|
|
|
|
* made packet how it will be received at the final
|
|
|
|
* destination.
|
|
|
|
*/
|
|
|
|
/* FALLTHROUGH */
|
|
|
|
|
|
|
|
default:
|
|
|
|
ah_update_mbuf(m, off, newoff - off, algo, &algos);
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (newoff < m->m_pkthdr.len) {
|
|
|
|
proto = nxt;
|
|
|
|
off = newoff;
|
|
|
|
goto again;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
|
2000-06-02 22:20:15 +04:00
|
|
|
if (len < (*algo->sumsiz)(sav)) {
|
|
|
|
error = EINVAL;
|
|
|
|
goto fail;
|
|
|
|
}
|
|
|
|
|
2003-07-20 22:01:41 +04:00
|
|
|
(algo->result)(&algos, sumbuf, sizeof(sumbuf));
|
2000-01-31 17:18:52 +03:00
|
|
|
bcopy(&sumbuf[0], ahdat, (*algo->sumsiz)(sav));
|
1999-06-28 10:36:47 +04:00
|
|
|
|
2000-03-22 02:53:30 +03:00
|
|
|
/* just in case */
|
|
|
|
if (n)
|
|
|
|
m_free(n);
|
|
|
|
return 0;
|
|
|
|
fail:
|
|
|
|
/* just in case */
|
|
|
|
if (n)
|
|
|
|
m_free(n);
|
|
|
|
return error;
|
1999-06-28 10:36:47 +04:00
|
|
|
}
|
|
|
|
#endif
|