1 /* $NetBSD: pfkey.c,v 1.13.4.2 2007/10/15 16:05:22 vanhu Exp $ */ 2 3 /* $KAME: pfkey.c,v 1.47 2003/10/02 19:52:12 itojun Exp $ */ 4 5 /* 6 * Copyright (C) 1995, 1996, 1997, 1998, and 1999 WIDE Project. 7 * All rights reserved. 8 * 9 * Redistribution and use in source and binary forms, with or without 10 * modification, are permitted provided that the following conditions 11 * are met: 12 * 1. Redistributions of source code must retain the above copyright 13 * notice, this list of conditions and the following disclaimer. 14 * 2. Redistributions in binary form must reproduce the above copyright 15 * notice, this list of conditions and the following disclaimer in the 16 * documentation and/or other materials provided with the distribution. 17 * 3. Neither the name of the project nor the names of its contributors 18 * may be used to endorse or promote products derived from this software 19 * without specific prior written permission. 20 * 21 * THIS SOFTWARE IS PROVIDED BY THE PROJECT AND CONTRIBUTORS ``AS IS'' AND 22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 24 * ARE DISCLAIMED. IN NO EVENT SHALL THE PROJECT OR CONTRIBUTORS BE LIABLE 25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 31 * SUCH DAMAGE. 32 */ 33 34 #ifdef HAVE_CONFIG_H 35 #include "config.h" 36 #endif 37 38 #include <sys/types.h> 39 #include <sys/param.h> 40 #include <sys/socket.h> 41 #include <net/pfkeyv2.h> 42 #include <netinet/in.h> 43 #include PATH_IPSEC_H 44 45 #include <stdlib.h> 46 #include <unistd.h> 47 #include <string.h> 48 #include <errno.h> 49 #include <stdio.h> 50 51 #include "ipsec_strerror.h" 52 #include "libpfkey.h" 53 54 #define CALLOC(size, cast) (cast)calloc(1, (size)) 55 56 static int findsupportedmap __P((int)); 57 static int setsupportedmap __P((struct sadb_supported *)); 58 static struct sadb_alg *findsupportedalg __P((u_int, u_int)); 59 static int pfkey_send_x1 __P((struct pfkey_send_sa_args *)); 60 static int pfkey_send_x2 __P((int, u_int, u_int, u_int, 61 struct sockaddr *, struct sockaddr *, u_int32_t)); 62 static int pfkey_send_x3 __P((int, u_int, u_int)); 63 static int pfkey_send_x4 __P((int, u_int, struct sockaddr *, u_int, 64 struct sockaddr *, u_int, u_int, u_int64_t, u_int64_t, 65 char *, int, u_int32_t)); 66 static int pfkey_send_x5 __P((int, u_int, u_int32_t)); 67 68 static caddr_t pfkey_setsadbmsg __P((caddr_t, caddr_t, u_int, u_int, 69 u_int, u_int32_t, pid_t)); 70 static caddr_t pfkey_setsadbsa __P((caddr_t, caddr_t, u_int32_t, u_int, 71 u_int, u_int, u_int32_t)); 72 static caddr_t pfkey_setsadbaddr __P((caddr_t, caddr_t, u_int, 73 struct sockaddr *, u_int, u_int)); 74 static caddr_t pfkey_setsadbkey __P((caddr_t, caddr_t, u_int, caddr_t, u_int)); 75 static caddr_t pfkey_setsadblifetime __P((caddr_t, caddr_t, u_int, u_int32_t, 76 u_int32_t, u_int32_t, u_int32_t)); 77 static caddr_t pfkey_setsadbxsa2 __P((caddr_t, caddr_t, u_int32_t, u_int32_t)); 78 79 #ifdef SADB_X_EXT_NAT_T_TYPE 80 static caddr_t pfkey_set_natt_type __P((caddr_t, caddr_t, u_int, u_int8_t)); 81 static caddr_t pfkey_set_natt_port __P((caddr_t, caddr_t, u_int, u_int16_t)); 82 #endif 83 #ifdef SADB_X_EXT_NAT_T_FRAG 84 static caddr_t pfkey_set_natt_frag __P((caddr_t, caddr_t, u_int, u_int16_t)); 85 #endif 86 87 #ifdef SADB_X_EXT_SEC_CTX 88 static caddr_t pfkey_setsecctx __P((caddr_t, caddr_t, u_int, u_int8_t, u_int8_t, 89 caddr_t, u_int16_t)); 90 #endif 91 92 int libipsec_opt = 0 93 #ifdef SADB_X_EXT_NAT_T_TYPE 94 | LIBIPSEC_OPT_NATT 95 #endif 96 #ifdef SADB_X_EXT_NAT_T_FRAG 97 | LIBIPSEC_OPT_FRAG 98 #endif 99 #ifdef SADB_X_EXT_NAT_T_SEC_CTX 100 | LIBIPSEC_OPT_SEC_CTX 101 #endif 102 ; 103 104 /* 105 * make and search supported algorithm structure. 106 */ 107 static struct sadb_supported *ipsec_supported[] = { NULL, NULL, NULL, 108 #ifdef SADB_X_SATYPE_TCPSIGNATURE 109 NULL, 110 #endif 111 }; 112 113 static int supported_map[] = { 114 SADB_SATYPE_AH, 115 SADB_SATYPE_ESP, 116 SADB_X_SATYPE_IPCOMP, 117 #ifdef SADB_X_SATYPE_TCPSIGNATURE 118 SADB_X_SATYPE_TCPSIGNATURE, 119 #endif 120 }; 121 122 static int 123 findsupportedmap(satype) 124 int satype; 125 { 126 int i; 127 128 for (i = 0; i < sizeof(supported_map)/sizeof(supported_map[0]); i++) 129 if (supported_map[i] == satype) 130 return i; 131 return -1; 132 } 133 134 static struct sadb_alg * 135 findsupportedalg(satype, alg_id) 136 u_int satype, alg_id; 137 { 138 int algno; 139 int tlen; 140 caddr_t p; 141 142 /* validity check */ 143 algno = findsupportedmap((int)satype); 144 if (algno == -1) { 145 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 146 return NULL; 147 } 148 if (ipsec_supported[algno] == NULL) { 149 __ipsec_errcode = EIPSEC_DO_GET_SUPP_LIST; 150 return NULL; 151 } 152 153 tlen = ipsec_supported[algno]->sadb_supported_len 154 - sizeof(struct sadb_supported); 155 p = (void *)(ipsec_supported[algno] + 1); 156 while (tlen > 0) { 157 if (tlen < sizeof(struct sadb_alg)) { 158 /* invalid format */ 159 break; 160 } 161 if (((struct sadb_alg *)(void *)p)->sadb_alg_id == alg_id) 162 return (void *)p; 163 164 tlen -= sizeof(struct sadb_alg); 165 p += sizeof(struct sadb_alg); 166 } 167 168 __ipsec_errcode = EIPSEC_NOT_SUPPORTED; 169 return NULL; 170 } 171 172 static int 173 setsupportedmap(sup) 174 struct sadb_supported *sup; 175 { 176 struct sadb_supported **ipsup; 177 178 switch (sup->sadb_supported_exttype) { 179 case SADB_EXT_SUPPORTED_AUTH: 180 ipsup = &ipsec_supported[findsupportedmap(SADB_SATYPE_AH)]; 181 break; 182 case SADB_EXT_SUPPORTED_ENCRYPT: 183 ipsup = &ipsec_supported[findsupportedmap(SADB_SATYPE_ESP)]; 184 break; 185 default: 186 __ipsec_errcode = EIPSEC_INVAL_SATYPE; 187 return -1; 188 } 189 190 if (*ipsup) 191 free(*ipsup); 192 193 *ipsup = malloc((size_t)sup->sadb_supported_len); 194 if (!*ipsup) { 195 __ipsec_set_strerror(strerror(errno)); 196 return -1; 197 } 198 memcpy(*ipsup, sup, (size_t)sup->sadb_supported_len); 199 200 return 0; 201 } 202 203 /* 204 * check key length against algorithm specified. 205 * This function is called with SADB_EXT_SUPPORTED_{AUTH,ENCRYPT} as the 206 * augument, and only calls to ipsec_check_keylen2(); 207 * keylen is the unit of bit. 208 * OUT: 209 * -1: invalid. 210 * 0: valid. 211 */ 212 int 213 ipsec_check_keylen(supported, alg_id, keylen) 214 u_int supported; 215 u_int alg_id; 216 u_int keylen; 217 { 218 u_int satype; 219 220 /* validity check */ 221 switch (supported) { 222 case SADB_EXT_SUPPORTED_AUTH: 223 satype = SADB_SATYPE_AH; 224 break; 225 case SADB_EXT_SUPPORTED_ENCRYPT: 226 satype = SADB_SATYPE_ESP; 227 break; 228 default: 229 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 230 return -1; 231 } 232 233 return ipsec_check_keylen2(satype, alg_id, keylen); 234 } 235 236 /* 237 * check key length against algorithm specified. 238 * satype is one of satype defined at pfkeyv2.h. 239 * keylen is the unit of bit. 240 * OUT: 241 * -1: invalid. 242 * 0: valid. 243 */ 244 int 245 ipsec_check_keylen2(satype, alg_id, keylen) 246 u_int satype; 247 u_int alg_id; 248 u_int keylen; 249 { 250 struct sadb_alg *alg; 251 252 alg = findsupportedalg(satype, alg_id); 253 if (!alg) 254 return -1; 255 256 if (keylen < alg->sadb_alg_minbits || keylen > alg->sadb_alg_maxbits) { 257 fprintf(stderr, "%d %d %d\n", keylen, alg->sadb_alg_minbits, 258 alg->sadb_alg_maxbits); 259 __ipsec_errcode = EIPSEC_INVAL_KEYLEN; 260 return -1; 261 } 262 263 __ipsec_errcode = EIPSEC_NO_ERROR; 264 return 0; 265 } 266 267 /* 268 * get max/min key length against algorithm specified. 269 * satype is one of satype defined at pfkeyv2.h. 270 * keylen is the unit of bit. 271 * OUT: 272 * -1: invalid. 273 * 0: valid. 274 */ 275 int 276 ipsec_get_keylen(supported, alg_id, alg0) 277 u_int supported, alg_id; 278 struct sadb_alg *alg0; 279 { 280 struct sadb_alg *alg; 281 u_int satype; 282 283 /* validity check */ 284 if (!alg0) { 285 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 286 return -1; 287 } 288 289 switch (supported) { 290 case SADB_EXT_SUPPORTED_AUTH: 291 satype = SADB_SATYPE_AH; 292 break; 293 case SADB_EXT_SUPPORTED_ENCRYPT: 294 satype = SADB_SATYPE_ESP; 295 break; 296 default: 297 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 298 return -1; 299 } 300 301 alg = findsupportedalg(satype, alg_id); 302 if (!alg) 303 return -1; 304 305 memcpy(alg0, alg, sizeof(*alg0)); 306 307 __ipsec_errcode = EIPSEC_NO_ERROR; 308 return 0; 309 } 310 311 /* 312 * set the rate for SOFT lifetime against HARD one. 313 * If rate is more than 100 or equal to zero, then set to 100. 314 */ 315 static u_int soft_lifetime_allocations_rate = PFKEY_SOFT_LIFETIME_RATE; 316 static u_int soft_lifetime_bytes_rate = PFKEY_SOFT_LIFETIME_RATE; 317 static u_int soft_lifetime_addtime_rate = PFKEY_SOFT_LIFETIME_RATE; 318 static u_int soft_lifetime_usetime_rate = PFKEY_SOFT_LIFETIME_RATE; 319 320 u_int 321 pfkey_set_softrate(type, rate) 322 u_int type, rate; 323 { 324 __ipsec_errcode = EIPSEC_NO_ERROR; 325 326 if (rate > 100 || rate == 0) 327 rate = 100; 328 329 switch (type) { 330 case SADB_X_LIFETIME_ALLOCATIONS: 331 soft_lifetime_allocations_rate = rate; 332 return 0; 333 case SADB_X_LIFETIME_BYTES: 334 soft_lifetime_bytes_rate = rate; 335 return 0; 336 case SADB_X_LIFETIME_ADDTIME: 337 soft_lifetime_addtime_rate = rate; 338 return 0; 339 case SADB_X_LIFETIME_USETIME: 340 soft_lifetime_usetime_rate = rate; 341 return 0; 342 } 343 344 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 345 return 1; 346 } 347 348 /* 349 * get current rate for SOFT lifetime against HARD one. 350 * ATTENTION: ~0 is returned if invalid type was passed. 351 */ 352 u_int 353 pfkey_get_softrate(type) 354 u_int type; 355 { 356 switch (type) { 357 case SADB_X_LIFETIME_ALLOCATIONS: 358 return soft_lifetime_allocations_rate; 359 case SADB_X_LIFETIME_BYTES: 360 return soft_lifetime_bytes_rate; 361 case SADB_X_LIFETIME_ADDTIME: 362 return soft_lifetime_addtime_rate; 363 case SADB_X_LIFETIME_USETIME: 364 return soft_lifetime_usetime_rate; 365 } 366 367 return (u_int)~0; 368 } 369 370 /* 371 * sending SADB_GETSPI message to the kernel. 372 * OUT: 373 * positive: success and return length sent. 374 * -1 : error occured, and set errno. 375 */ 376 int 377 pfkey_send_getspi(int so, u_int satype, u_int mode, struct sockaddr *src, 378 struct sockaddr *dst, u_int32_t min, u_int32_t max, u_int32_t reqid, 379 u_int32_t seq) 380 { 381 struct sadb_msg *newmsg; 382 caddr_t ep; 383 int len; 384 int need_spirange = 0; 385 caddr_t p; 386 int plen; 387 388 /* validity check */ 389 if (src == NULL || dst == NULL) { 390 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 391 return -1; 392 } 393 if (src->sa_family != dst->sa_family) { 394 __ipsec_errcode = EIPSEC_FAMILY_MISMATCH; 395 return -1; 396 } 397 if (min > max || (min > 0 && min <= 255)) { 398 __ipsec_errcode = EIPSEC_INVAL_SPI; 399 return -1; 400 } 401 switch (src->sa_family) { 402 case AF_INET: 403 plen = sizeof(struct in_addr) << 3; 404 break; 405 case AF_INET6: 406 plen = sizeof(struct in6_addr) << 3; 407 break; 408 default: 409 __ipsec_errcode = EIPSEC_INVAL_FAMILY; 410 return -1; 411 } 412 413 /* create new sadb_msg to send. */ 414 len = sizeof(struct sadb_msg) 415 + sizeof(struct sadb_x_sa2) 416 + sizeof(struct sadb_address) 417 + PFKEY_ALIGN8(sysdep_sa_len(src)) 418 + sizeof(struct sadb_address) 419 + PFKEY_ALIGN8(sysdep_sa_len(dst)); 420 421 if (min > 255 && max < (u_int)~0) { 422 need_spirange++; 423 len += sizeof(struct sadb_spirange); 424 } 425 426 if ((newmsg = CALLOC((size_t)len, struct sadb_msg *)) == NULL) { 427 __ipsec_set_strerror(strerror(errno)); 428 return -1; 429 } 430 ep = ((caddr_t)(void *)newmsg) + len; 431 432 p = pfkey_setsadbmsg((void *)newmsg, ep, SADB_GETSPI, 433 (u_int)len, satype, seq, getpid()); 434 if (!p) { 435 free(newmsg); 436 return -1; 437 } 438 439 p = pfkey_setsadbxsa2(p, ep, mode, reqid); 440 if (!p) { 441 free(newmsg); 442 return -1; 443 } 444 445 /* set sadb_address for source */ 446 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, (u_int)plen, 447 IPSEC_ULPROTO_ANY); 448 if (!p) { 449 free(newmsg); 450 return -1; 451 } 452 453 /* set sadb_address for destination */ 454 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, (u_int)plen, 455 IPSEC_ULPROTO_ANY); 456 if (!p) { 457 free(newmsg); 458 return -1; 459 } 460 461 /* proccessing spi range */ 462 if (need_spirange) { 463 struct sadb_spirange spirange; 464 465 if (p + sizeof(spirange) > ep) { 466 free(newmsg); 467 return -1; 468 } 469 470 memset(&spirange, 0, sizeof(spirange)); 471 spirange.sadb_spirange_len = PFKEY_UNIT64(sizeof(spirange)); 472 spirange.sadb_spirange_exttype = SADB_EXT_SPIRANGE; 473 spirange.sadb_spirange_min = min; 474 spirange.sadb_spirange_max = max; 475 476 memcpy(p, &spirange, sizeof(spirange)); 477 478 p += sizeof(spirange); 479 } 480 if (p != ep) { 481 free(newmsg); 482 return -1; 483 } 484 485 /* send message */ 486 len = pfkey_send(so, newmsg, len); 487 free(newmsg); 488 489 if (len < 0) 490 return -1; 491 492 __ipsec_errcode = EIPSEC_NO_ERROR; 493 return len; 494 } 495 496 /* 497 * sending SADB_UPDATE message to the kernel. 498 * The length of key material is a_keylen + e_keylen. 499 * OUT: 500 * positive: success and return length sent. 501 * -1 : error occured, and set errno. 502 */ 503 int 504 pfkey_send_update2(struct pfkey_send_sa_args *sa_parms) 505 { 506 int len; 507 508 509 sa_parms->type = SADB_UPDATE; 510 if ((len = pfkey_send_x1(sa_parms)) < 0) 511 return -1; 512 513 return len; 514 } 515 516 /* 517 * sending SADB_ADD message to the kernel. 518 * The length of key material is a_keylen + e_keylen. 519 * OUT: 520 * positive: success and return length sent. 521 * -1 : error occured, and set errno. 522 */ 523 int 524 pfkey_send_add2(struct pfkey_send_sa_args *sa_parms) 525 { 526 int len; 527 528 sa_parms->type = SADB_ADD; 529 if ((len = pfkey_send_x1(sa_parms)) < 0) 530 return -1; 531 532 return len; 533 } 534 535 /* 536 * sending SADB_DELETE message to the kernel. 537 * OUT: 538 * positive: success and return length sent. 539 * -1 : error occured, and set errno. 540 */ 541 int 542 pfkey_send_delete(int so, u_int satype, u_int mode, struct sockaddr *src, 543 struct sockaddr *dst, u_int32_t spi) 544 { 545 int len; 546 if ((len = pfkey_send_x2(so, SADB_DELETE, satype, mode, src, dst, spi)) < 0) 547 return -1; 548 549 return len; 550 } 551 552 /* 553 * sending SADB_DELETE without spi to the kernel. This is 554 * the "delete all" request (an extension also present in 555 * Solaris). 556 * 557 * OUT: 558 * positive: success and return length sent 559 * -1 : error occured, and set errno 560 */ 561 /*ARGSUSED*/ 562 int 563 pfkey_send_delete_all(int so, u_int satype, u_int mode, struct sockaddr *src, 564 struct sockaddr *dst) 565 { 566 struct sadb_msg *newmsg; 567 int len; 568 caddr_t p; 569 int plen; 570 caddr_t ep; 571 572 /* validity check */ 573 if (src == NULL || dst == NULL) { 574 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 575 return -1; 576 } 577 if (src->sa_family != dst->sa_family) { 578 __ipsec_errcode = EIPSEC_FAMILY_MISMATCH; 579 return -1; 580 } 581 switch (src->sa_family) { 582 case AF_INET: 583 plen = sizeof(struct in_addr) << 3; 584 break; 585 case AF_INET6: 586 plen = sizeof(struct in6_addr) << 3; 587 break; 588 default: 589 __ipsec_errcode = EIPSEC_INVAL_FAMILY; 590 return -1; 591 } 592 593 /* create new sadb_msg to reply. */ 594 len = sizeof(struct sadb_msg) 595 + sizeof(struct sadb_address) 596 + PFKEY_ALIGN8(sysdep_sa_len(src)) 597 + sizeof(struct sadb_address) 598 + PFKEY_ALIGN8(sysdep_sa_len(dst)); 599 600 if ((newmsg = CALLOC((size_t)len, struct sadb_msg *)) == NULL) { 601 __ipsec_set_strerror(strerror(errno)); 602 return -1; 603 } 604 ep = ((caddr_t)(void *)newmsg) + len; 605 606 p = pfkey_setsadbmsg((void *)newmsg, ep, SADB_DELETE, (u_int)len, 607 satype, 0, getpid()); 608 if (!p) { 609 free(newmsg); 610 return -1; 611 } 612 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, (u_int)plen, 613 IPSEC_ULPROTO_ANY); 614 if (!p) { 615 free(newmsg); 616 return -1; 617 } 618 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, (u_int)plen, 619 IPSEC_ULPROTO_ANY); 620 if (!p || p != ep) { 621 free(newmsg); 622 return -1; 623 } 624 625 /* send message */ 626 len = pfkey_send(so, newmsg, len); 627 free(newmsg); 628 629 if (len < 0) 630 return -1; 631 632 __ipsec_errcode = EIPSEC_NO_ERROR; 633 return len; 634 } 635 636 /* 637 * sending SADB_GET message to the kernel. 638 * OUT: 639 * positive: success and return length sent. 640 * -1 : error occured, and set errno. 641 */ 642 int 643 pfkey_send_get(int so, u_int satype, u_int mode, struct sockaddr *src, 644 struct sockaddr *dst, u_int32_t spi) 645 { 646 int len; 647 if ((len = pfkey_send_x2(so, SADB_GET, satype, mode, src, dst, spi)) < 0) 648 return -1; 649 650 return len; 651 } 652 653 /* 654 * sending SADB_REGISTER message to the kernel. 655 * OUT: 656 * positive: success and return length sent. 657 * -1 : error occured, and set errno. 658 */ 659 int 660 pfkey_send_register(int so, u_int satype) 661 { 662 int len, algno; 663 664 if (satype == PF_UNSPEC) { 665 for (algno = 0; 666 algno < sizeof(supported_map)/sizeof(supported_map[0]); 667 algno++) { 668 if (ipsec_supported[algno]) { 669 free(ipsec_supported[algno]); 670 ipsec_supported[algno] = NULL; 671 } 672 } 673 } else { 674 algno = findsupportedmap((int)satype); 675 if (algno == -1) { 676 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 677 return -1; 678 } 679 680 if (ipsec_supported[algno]) { 681 free(ipsec_supported[algno]); 682 ipsec_supported[algno] = NULL; 683 } 684 } 685 686 if ((len = pfkey_send_x3(so, SADB_REGISTER, satype)) < 0) 687 return -1; 688 689 return len; 690 } 691 692 /* 693 * receiving SADB_REGISTER message from the kernel, and copy buffer for 694 * sadb_supported returned into ipsec_supported. 695 * OUT: 696 * 0: success and return length sent. 697 * -1: error occured, and set errno. 698 */ 699 int 700 pfkey_recv_register(int so) 701 { 702 pid_t pid = getpid(); 703 struct sadb_msg *newmsg; 704 int error = -1; 705 706 /* receive message */ 707 for (;;) { 708 if ((newmsg = pfkey_recv(so)) == NULL) 709 return -1; 710 if (newmsg->sadb_msg_type == SADB_REGISTER && 711 newmsg->sadb_msg_pid == pid) 712 break; 713 free(newmsg); 714 } 715 716 /* check and fix */ 717 newmsg->sadb_msg_len = PFKEY_UNUNIT64(newmsg->sadb_msg_len); 718 719 error = pfkey_set_supported(newmsg, newmsg->sadb_msg_len); 720 free(newmsg); 721 722 if (error == 0) 723 __ipsec_errcode = EIPSEC_NO_ERROR; 724 725 return error; 726 } 727 728 /* 729 * receiving SADB_REGISTER message from the kernel, and copy buffer for 730 * sadb_supported returned into ipsec_supported. 731 * NOTE: sadb_msg_len must be host order. 732 * IN: 733 * tlen: msg length, it's to makeing sure. 734 * OUT: 735 * 0: success and return length sent. 736 * -1: error occured, and set errno. 737 */ 738 int 739 pfkey_set_supported(struct sadb_msg *msg, int tlen) 740 { 741 struct sadb_supported *sup; 742 caddr_t p; 743 caddr_t ep; 744 745 /* validity */ 746 if (msg->sadb_msg_len != tlen) { 747 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 748 return -1; 749 } 750 751 p = (void *)msg; 752 ep = p + tlen; 753 754 p += sizeof(struct sadb_msg); 755 756 while (p < ep) { 757 sup = (void *)p; 758 if (ep < p + sizeof(*sup) || 759 PFKEY_EXTLEN(sup) < sizeof(*sup) || 760 ep < p + sup->sadb_supported_len) { 761 /* invalid format */ 762 break; 763 } 764 765 switch (sup->sadb_supported_exttype) { 766 case SADB_EXT_SUPPORTED_AUTH: 767 case SADB_EXT_SUPPORTED_ENCRYPT: 768 break; 769 default: 770 __ipsec_errcode = EIPSEC_INVAL_SATYPE; 771 return -1; 772 } 773 774 /* fixed length */ 775 sup->sadb_supported_len = PFKEY_EXTLEN(sup); 776 777 /* set supported map */ 778 if (setsupportedmap(sup) != 0) 779 return -1; 780 781 p += sup->sadb_supported_len; 782 } 783 784 if (p != ep) { 785 __ipsec_errcode = EIPSEC_INVAL_SATYPE; 786 return -1; 787 } 788 789 __ipsec_errcode = EIPSEC_NO_ERROR; 790 791 return 0; 792 } 793 794 /* 795 * sending SADB_FLUSH message to the kernel. 796 * OUT: 797 * positive: success and return length sent. 798 * -1 : error occured, and set errno. 799 */ 800 int 801 pfkey_send_flush(int so, u_int satype) 802 { 803 int len; 804 805 if ((len = pfkey_send_x3(so, SADB_FLUSH, satype)) < 0) 806 return -1; 807 808 return len; 809 } 810 811 /* 812 * sending SADB_DUMP message to the kernel. 813 * OUT: 814 * positive: success and return length sent. 815 * -1 : error occured, and set errno. 816 */ 817 int 818 pfkey_send_dump(int so, u_int satype) 819 { 820 int len; 821 822 if ((len = pfkey_send_x3(so, SADB_DUMP, satype)) < 0) 823 return -1; 824 825 return len; 826 } 827 828 /* 829 * sending SADB_X_PROMISC message to the kernel. 830 * NOTE that this function handles promisc mode toggle only. 831 * IN: 832 * flag: set promisc off if zero, set promisc on if non-zero. 833 * OUT: 834 * positive: success and return length sent. 835 * -1 : error occured, and set errno. 836 * 0 : error occured, and set errno. 837 * others: a pointer to new allocated buffer in which supported 838 * algorithms is. 839 */ 840 int 841 pfkey_send_promisc_toggle(int so, int flag) 842 { 843 int len; 844 845 if ((len = pfkey_send_x3(so, SADB_X_PROMISC, 846 (u_int)(flag ? 1 : 0))) < 0) 847 return -1; 848 849 return len; 850 } 851 852 /* 853 * sending SADB_X_SPDADD message to the kernel. 854 * OUT: 855 * positive: success and return length sent. 856 * -1 : error occured, and set errno. 857 */ 858 int 859 pfkey_send_spdadd(int so, struct sockaddr *src, u_int prefs, 860 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, 861 int policylen, u_int32_t seq) 862 { 863 int len; 864 865 if ((len = pfkey_send_x4(so, SADB_X_SPDADD, 866 src, prefs, dst, prefd, proto, 867 (u_int64_t)0, (u_int64_t)0, 868 policy, policylen, seq)) < 0) 869 return -1; 870 871 return len; 872 } 873 874 /* 875 * sending SADB_X_SPDADD message to the kernel. 876 * OUT: 877 * positive: success and return length sent. 878 * -1 : error occured, and set errno. 879 */ 880 int 881 pfkey_send_spdadd2(int so, struct sockaddr *src, u_int prefs, 882 struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, 883 u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) 884 { 885 int len; 886 887 if ((len = pfkey_send_x4(so, SADB_X_SPDADD, 888 src, prefs, dst, prefd, proto, 889 ltime, vtime, 890 policy, policylen, seq)) < 0) 891 return -1; 892 893 return len; 894 } 895 896 /* 897 * sending SADB_X_SPDUPDATE message to the kernel. 898 * OUT: 899 * positive: success and return length sent. 900 * -1 : error occured, and set errno. 901 */ 902 int 903 pfkey_send_spdupdate(int so, struct sockaddr *src, u_int prefs, 904 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, 905 int policylen, u_int32_t seq) 906 { 907 int len; 908 909 if ((len = pfkey_send_x4(so, SADB_X_SPDUPDATE, 910 src, prefs, dst, prefd, proto, 911 (u_int64_t)0, (u_int64_t)0, 912 policy, policylen, seq)) < 0) 913 return -1; 914 915 return len; 916 } 917 918 /* 919 * sending SADB_X_SPDUPDATE message to the kernel. 920 * OUT: 921 * positive: success and return length sent. 922 * -1 : error occured, and set errno. 923 */ 924 int 925 pfkey_send_spdupdate2(int so, struct sockaddr *src, u_int prefs, 926 struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, 927 u_int64_t vtime, caddr_t policy, int policylen, u_int32_t seq) 928 { 929 int len; 930 931 if ((len = pfkey_send_x4(so, SADB_X_SPDUPDATE, 932 src, prefs, dst, prefd, proto, 933 ltime, vtime, 934 policy, policylen, seq)) < 0) 935 return -1; 936 937 return len; 938 } 939 940 /* 941 * sending SADB_X_SPDDELETE message to the kernel. 942 * OUT: 943 * positive: success and return length sent. 944 * -1 : error occured, and set errno. 945 */ 946 int 947 pfkey_send_spddelete(int so, struct sockaddr *src, u_int prefs, 948 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, 949 int policylen, u_int32_t seq) 950 { 951 int len; 952 953 if (policylen != sizeof(struct sadb_x_policy)) { 954 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 955 return -1; 956 } 957 958 if ((len = pfkey_send_x4(so, SADB_X_SPDDELETE, 959 src, prefs, dst, prefd, proto, 960 (u_int64_t)0, (u_int64_t)0, 961 policy, policylen, seq)) < 0) 962 return -1; 963 964 return len; 965 } 966 967 /* 968 * sending SADB_X_SPDDELETE message to the kernel. 969 * OUT: 970 * positive: success and return length sent. 971 * -1 : error occured, and set errno. 972 */ 973 int 974 pfkey_send_spddelete2(int so, u_int32_t spid) 975 { 976 int len; 977 978 if ((len = pfkey_send_x5(so, SADB_X_SPDDELETE2, spid)) < 0) 979 return -1; 980 981 return len; 982 } 983 984 /* 985 * sending SADB_X_SPDGET message to the kernel. 986 * OUT: 987 * positive: success and return length sent. 988 * -1 : error occured, and set errno. 989 */ 990 int 991 pfkey_send_spdget(int so, u_int32_t spid) 992 { 993 int len; 994 995 if ((len = pfkey_send_x5(so, SADB_X_SPDGET, spid)) < 0) 996 return -1; 997 998 return len; 999 } 1000 1001 /* 1002 * sending SADB_X_SPDSETIDX message to the kernel. 1003 * OUT: 1004 * positive: success and return length sent. 1005 * -1 : error occured, and set errno. 1006 */ 1007 int 1008 pfkey_send_spdsetidx(int so, struct sockaddr *src, u_int prefs, 1009 struct sockaddr *dst, u_int prefd, u_int proto, caddr_t policy, 1010 int policylen, u_int32_t seq) 1011 { 1012 int len; 1013 1014 if (policylen != sizeof(struct sadb_x_policy)) { 1015 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 1016 return -1; 1017 } 1018 1019 if ((len = pfkey_send_x4(so, SADB_X_SPDSETIDX, 1020 src, prefs, dst, prefd, proto, 1021 (u_int64_t)0, (u_int64_t)0, 1022 policy, policylen, seq)) < 0) 1023 return -1; 1024 1025 return len; 1026 } 1027 1028 /* 1029 * sending SADB_SPDFLUSH message to the kernel. 1030 * OUT: 1031 * positive: success and return length sent. 1032 * -1 : error occured, and set errno. 1033 */ 1034 int 1035 pfkey_send_spdflush(int so) 1036 { 1037 int len; 1038 1039 if ((len = pfkey_send_x3(so, SADB_X_SPDFLUSH, SADB_SATYPE_UNSPEC)) < 0) 1040 return -1; 1041 1042 return len; 1043 } 1044 1045 /* 1046 * sending SADB_SPDDUMP message to the kernel. 1047 * OUT: 1048 * positive: success and return length sent. 1049 * -1 : error occured, and set errno. 1050 */ 1051 int 1052 pfkey_send_spddump(int so) 1053 { 1054 int len; 1055 1056 if ((len = pfkey_send_x3(so, SADB_X_SPDDUMP, SADB_SATYPE_UNSPEC)) < 0) 1057 return -1; 1058 1059 return len; 1060 } 1061 1062 1063 #ifdef SADB_X_MIGRATE 1064 /* 1065 * sending SADB_X_MIGRATE message to the kernel. 1066 * OUT: 1067 * positive: success and return length sent. 1068 * -1 : error occured, and set errno. 1069 */ 1070 int 1071 pfkey_send_migrate(int so, struct sockaddr *src, u_int prefs, 1072 struct sockaddr *dst, u_int prefd, 1073 u_int proto, caddr_t policy, int policylen, u_int32_t seq) 1074 { 1075 struct sadb_msg *newmsg; 1076 int len; 1077 caddr_t p; 1078 int plen; 1079 caddr_t ep; 1080 1081 /* validity check */ 1082 if (src == NULL || dst == NULL) { 1083 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 1084 return -1; 1085 } 1086 if (src->sa_family != dst->sa_family) { 1087 __ipsec_errcode = EIPSEC_FAMILY_MISMATCH; 1088 return -1; 1089 } 1090 1091 switch (src->sa_family) { 1092 case AF_INET: 1093 plen = sizeof(struct in_addr) << 3; 1094 break; 1095 case AF_INET6: 1096 plen = sizeof(struct in6_addr) << 3; 1097 break; 1098 default: 1099 __ipsec_errcode = EIPSEC_INVAL_FAMILY; 1100 return -1; 1101 } 1102 if (prefs > plen || prefd > plen) { 1103 __ipsec_errcode = EIPSEC_INVAL_PREFIXLEN; 1104 return -1; 1105 } 1106 1107 /* create new sadb_msg to reply. */ 1108 len = sizeof(struct sadb_msg) 1109 + sizeof(struct sadb_address) 1110 + PFKEY_ALIGN8(sysdep_sa_len(src)) 1111 + sizeof(struct sadb_address) 1112 + PFKEY_ALIGN8(sysdep_sa_len(dst)) 1113 + policylen; 1114 1115 if ((newmsg = CALLOC(len, struct sadb_msg *)) == NULL) { 1116 __ipsec_set_strerror(strerror(errno)); 1117 return -1; 1118 } 1119 ep = ((caddr_t)newmsg) + len; 1120 1121 p = pfkey_setsadbmsg((caddr_t)newmsg, ep, SADB_X_MIGRATE, (u_int)len, 1122 SADB_SATYPE_UNSPEC, seq, getpid()); 1123 if (!p) { 1124 free(newmsg); 1125 return -1; 1126 } 1127 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, prefs, proto); 1128 if (!p) { 1129 free(newmsg); 1130 return -1; 1131 } 1132 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, prefd, proto); 1133 if (!p || p + policylen != ep) { 1134 free(newmsg); 1135 return -1; 1136 } 1137 memcpy(p, policy, policylen); 1138 1139 /* send message */ 1140 len = pfkey_send(so, newmsg, len); 1141 free(newmsg); 1142 1143 if (len < 0) 1144 return -1; 1145 1146 __ipsec_errcode = EIPSEC_NO_ERROR; 1147 return len; 1148 } 1149 #endif 1150 1151 1152 /* sending SADB_ADD or SADB_UPDATE message to the kernel */ 1153 static int 1154 pfkey_send_x1(struct pfkey_send_sa_args *sa_parms) 1155 { 1156 struct sadb_msg *newmsg; 1157 int len; 1158 caddr_t p; 1159 int plen; 1160 caddr_t ep; 1161 1162 /* validity check */ 1163 if (sa_parms->src == NULL || sa_parms->dst == NULL) { 1164 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 1165 return -1; 1166 } 1167 if (sa_parms->src->sa_family != sa_parms->dst->sa_family) { 1168 __ipsec_errcode = EIPSEC_FAMILY_MISMATCH; 1169 return -1; 1170 } 1171 switch (sa_parms->src->sa_family) { 1172 case AF_INET: 1173 plen = sizeof(struct in_addr) << 3; 1174 break; 1175 case AF_INET6: 1176 plen = sizeof(struct in6_addr) << 3; 1177 break; 1178 default: 1179 __ipsec_errcode = EIPSEC_INVAL_FAMILY; 1180 return -1; 1181 } 1182 1183 switch (sa_parms->satype) { 1184 case SADB_SATYPE_ESP: 1185 if (sa_parms->e_type == SADB_EALG_NONE) { 1186 __ipsec_errcode = EIPSEC_NO_ALGS; 1187 return -1; 1188 } 1189 break; 1190 case SADB_SATYPE_AH: 1191 if (sa_parms->e_type != SADB_EALG_NONE) { 1192 __ipsec_errcode = EIPSEC_INVAL_ALGS; 1193 return -1; 1194 } 1195 if (sa_parms->a_type == SADB_AALG_NONE) { 1196 __ipsec_errcode = EIPSEC_NO_ALGS; 1197 return -1; 1198 } 1199 break; 1200 case SADB_X_SATYPE_IPCOMP: 1201 if (sa_parms->e_type == SADB_X_CALG_NONE) { 1202 __ipsec_errcode = EIPSEC_INVAL_ALGS; 1203 return -1; 1204 } 1205 if (sa_parms->a_type != SADB_AALG_NONE) { 1206 __ipsec_errcode = EIPSEC_NO_ALGS; 1207 return -1; 1208 } 1209 break; 1210 #ifdef SADB_X_AALG_TCP_MD5 1211 case SADB_X_SATYPE_TCPSIGNATURE: 1212 if (sa_parms->e_type != SADB_EALG_NONE) { 1213 __ipsec_errcode = EIPSEC_INVAL_ALGS; 1214 return -1; 1215 } 1216 if (sa_parms->a_type != SADB_X_AALG_TCP_MD5) { 1217 __ipsec_errcode = EIPSEC_INVAL_ALGS; 1218 return -1; 1219 } 1220 break; 1221 #endif 1222 default: 1223 __ipsec_errcode = EIPSEC_INVAL_SATYPE; 1224 return -1; 1225 } 1226 1227 /* create new sadb_msg to reply. */ 1228 len = sizeof(struct sadb_msg) 1229 + sizeof(struct sadb_sa) 1230 + sizeof(struct sadb_x_sa2) 1231 + sizeof(struct sadb_address) 1232 + PFKEY_ALIGN8(sysdep_sa_len(sa_parms->src)) 1233 + sizeof(struct sadb_address) 1234 + PFKEY_ALIGN8(sysdep_sa_len(sa_parms->dst)) 1235 + sizeof(struct sadb_lifetime) 1236 + sizeof(struct sadb_lifetime); 1237 1238 if (sa_parms->e_type != SADB_EALG_NONE && 1239 sa_parms->satype != SADB_X_SATYPE_IPCOMP) 1240 len += (sizeof(struct sadb_key) + 1241 PFKEY_ALIGN8(sa_parms->e_keylen)); 1242 if (sa_parms->a_type != SADB_AALG_NONE) 1243 len += (sizeof(struct sadb_key) + 1244 PFKEY_ALIGN8(sa_parms->a_keylen)); 1245 1246 #ifdef SADB_X_EXT_SEC_CTX 1247 if (sa_parms->ctxstr != NULL) 1248 len += (sizeof(struct sadb_x_sec_ctx) 1249 + PFKEY_ALIGN8(sa_parms->ctxstrlen)); 1250 #endif 1251 1252 #ifdef SADB_X_EXT_NAT_T_TYPE 1253 /* add nat-t packets */ 1254 if (sa_parms->l_natt_type) { 1255 switch(sa_parms->satype) { 1256 case SADB_SATYPE_ESP: 1257 case SADB_X_SATYPE_IPCOMP: 1258 break; 1259 default: 1260 __ipsec_errcode = EIPSEC_NO_ALGS; 1261 return -1; 1262 } 1263 1264 len += sizeof(struct sadb_x_nat_t_type); 1265 len += sizeof(struct sadb_x_nat_t_port); 1266 len += sizeof(struct sadb_x_nat_t_port); 1267 if (sa_parms->l_natt_oa) 1268 len += sizeof(struct sadb_address) + 1269 PFKEY_ALIGN8(sysdep_sa_len(sa_parms->l_natt_oa)); 1270 #ifdef SADB_X_EXT_NAT_T_FRAG 1271 if (sa_parms->l_natt_frag) 1272 len += sizeof(struct sadb_x_nat_t_frag); 1273 #endif 1274 } 1275 #endif 1276 1277 if ((newmsg = CALLOC((size_t)len, struct sadb_msg *)) == NULL) { 1278 __ipsec_set_strerror(strerror(errno)); 1279 return -1; 1280 } 1281 ep = ((caddr_t)(void *)newmsg) + len; 1282 1283 p = pfkey_setsadbmsg((void *)newmsg, ep, sa_parms->type, (u_int)len, 1284 sa_parms->satype, sa_parms->seq, getpid()); 1285 if (!p) { 1286 free(newmsg); 1287 return -1; 1288 } 1289 p = pfkey_setsadbsa(p, ep, sa_parms->spi, sa_parms->wsize, 1290 sa_parms->a_type, sa_parms->e_type, 1291 sa_parms->flags); 1292 if (!p) { 1293 free(newmsg); 1294 return -1; 1295 } 1296 p = pfkey_setsadbxsa2(p, ep, sa_parms->mode, sa_parms->reqid); 1297 if (!p) { 1298 free(newmsg); 1299 return -1; 1300 } 1301 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, sa_parms->src, 1302 (u_int)plen, IPSEC_ULPROTO_ANY); 1303 if (!p) { 1304 free(newmsg); 1305 return -1; 1306 } 1307 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, sa_parms->dst, 1308 (u_int)plen, IPSEC_ULPROTO_ANY); 1309 if (!p) { 1310 free(newmsg); 1311 return -1; 1312 } 1313 1314 if (sa_parms->e_type != SADB_EALG_NONE && 1315 sa_parms->satype != SADB_X_SATYPE_IPCOMP) { 1316 p = pfkey_setsadbkey(p, ep, SADB_EXT_KEY_ENCRYPT, 1317 sa_parms->keymat, sa_parms->e_keylen); 1318 if (!p) { 1319 free(newmsg); 1320 return -1; 1321 } 1322 } 1323 if (sa_parms->a_type != SADB_AALG_NONE) { 1324 p = pfkey_setsadbkey(p, ep, SADB_EXT_KEY_AUTH, 1325 sa_parms->keymat + sa_parms->e_keylen, 1326 sa_parms->a_keylen); 1327 if (!p) { 1328 free(newmsg); 1329 return -1; 1330 } 1331 } 1332 1333 /* set sadb_lifetime for destination */ 1334 p = pfkey_setsadblifetime(p, ep, SADB_EXT_LIFETIME_HARD, 1335 sa_parms->l_alloc, sa_parms->l_bytes, 1336 sa_parms->l_addtime, sa_parms->l_usetime); 1337 if (!p) { 1338 free(newmsg); 1339 return -1; 1340 } 1341 p = pfkey_setsadblifetime(p, ep, SADB_EXT_LIFETIME_SOFT, 1342 sa_parms->l_alloc, sa_parms->l_bytes, 1343 sa_parms->l_addtime, sa_parms->l_usetime); 1344 if (!p) { 1345 free(newmsg); 1346 return -1; 1347 } 1348 #ifdef SADB_X_EXT_SEC_CTX 1349 if (sa_parms->ctxstr != NULL) { 1350 p = pfkey_setsecctx(p, ep, SADB_X_EXT_SEC_CTX, sa_parms->ctxdoi, 1351 sa_parms->ctxalg, sa_parms->ctxstr, 1352 sa_parms->ctxstrlen); 1353 if (!p) { 1354 free(newmsg); 1355 return -1; 1356 } 1357 } 1358 #endif 1359 1360 #ifdef SADB_X_EXT_NAT_T_TYPE 1361 /* Add nat-t messages */ 1362 if (sa_parms->l_natt_type) { 1363 p = pfkey_set_natt_type(p, ep, SADB_X_EXT_NAT_T_TYPE, 1364 sa_parms->l_natt_type); 1365 if (!p) { 1366 free(newmsg); 1367 return -1; 1368 } 1369 1370 p = pfkey_set_natt_port(p, ep, SADB_X_EXT_NAT_T_SPORT, 1371 sa_parms->l_natt_sport); 1372 if (!p) { 1373 free(newmsg); 1374 return -1; 1375 } 1376 1377 p = pfkey_set_natt_port(p, ep, SADB_X_EXT_NAT_T_DPORT, 1378 sa_parms->l_natt_dport); 1379 if (!p) { 1380 free(newmsg); 1381 return -1; 1382 } 1383 1384 if (sa_parms->l_natt_oa) { 1385 p = pfkey_setsadbaddr(p, ep, SADB_X_EXT_NAT_T_OA, 1386 sa_parms->l_natt_oa, 1387 (u_int)PFKEY_ALIGN8(sysdep_sa_len(sa_parms->l_natt_oa)), 1388 IPSEC_ULPROTO_ANY); 1389 if (!p) { 1390 free(newmsg); 1391 return -1; 1392 } 1393 } 1394 1395 #ifdef SADB_X_EXT_NAT_T_FRAG 1396 if (sa_parms->l_natt_frag) { 1397 p = pfkey_set_natt_frag(p, ep, SADB_X_EXT_NAT_T_FRAG, 1398 sa_parms->l_natt_frag); 1399 if (!p) { 1400 free(newmsg); 1401 return -1; 1402 } 1403 } 1404 #endif 1405 } 1406 #endif 1407 1408 if (p != ep) { 1409 free(newmsg); 1410 return -1; 1411 } 1412 1413 /* send message */ 1414 len = pfkey_send(sa_parms->so, newmsg, len); 1415 free(newmsg); 1416 1417 if (len < 0) 1418 return -1; 1419 1420 __ipsec_errcode = EIPSEC_NO_ERROR; 1421 return len; 1422 } 1423 1424 /* sending SADB_DELETE or SADB_GET message to the kernel */ 1425 /*ARGSUSED*/ 1426 static int 1427 pfkey_send_x2(int so, u_int type, u_int satype, u_int mode, 1428 struct sockaddr *src, struct sockaddr *dst, u_int32_t spi) 1429 { 1430 struct sadb_msg *newmsg; 1431 int len; 1432 caddr_t p; 1433 int plen; 1434 caddr_t ep; 1435 1436 /* validity check */ 1437 if (src == NULL || dst == NULL) { 1438 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 1439 return -1; 1440 } 1441 if (src->sa_family != dst->sa_family) { 1442 __ipsec_errcode = EIPSEC_FAMILY_MISMATCH; 1443 return -1; 1444 } 1445 switch (src->sa_family) { 1446 case AF_INET: 1447 plen = sizeof(struct in_addr) << 3; 1448 break; 1449 case AF_INET6: 1450 plen = sizeof(struct in6_addr) << 3; 1451 break; 1452 default: 1453 __ipsec_errcode = EIPSEC_INVAL_FAMILY; 1454 return -1; 1455 } 1456 1457 /* create new sadb_msg to reply. */ 1458 len = sizeof(struct sadb_msg) 1459 + sizeof(struct sadb_sa) 1460 + sizeof(struct sadb_address) 1461 + PFKEY_ALIGN8(sysdep_sa_len(src)) 1462 + sizeof(struct sadb_address) 1463 + PFKEY_ALIGN8(sysdep_sa_len(dst)); 1464 1465 if ((newmsg = CALLOC((size_t)len, struct sadb_msg *)) == NULL) { 1466 __ipsec_set_strerror(strerror(errno)); 1467 return -1; 1468 } 1469 ep = ((caddr_t)(void *)newmsg) + len; 1470 1471 p = pfkey_setsadbmsg((void *)newmsg, ep, type, (u_int)len, satype, 0, 1472 getpid()); 1473 if (!p) { 1474 free(newmsg); 1475 return -1; 1476 } 1477 p = pfkey_setsadbsa(p, ep, spi, 0, 0, 0, 0); 1478 if (!p) { 1479 free(newmsg); 1480 return -1; 1481 } 1482 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, (u_int)plen, 1483 IPSEC_ULPROTO_ANY); 1484 if (!p) { 1485 free(newmsg); 1486 return -1; 1487 } 1488 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, (u_int)plen, 1489 IPSEC_ULPROTO_ANY); 1490 if (!p || p != ep) { 1491 free(newmsg); 1492 return -1; 1493 } 1494 1495 /* send message */ 1496 len = pfkey_send(so, newmsg, len); 1497 free(newmsg); 1498 1499 if (len < 0) 1500 return -1; 1501 1502 __ipsec_errcode = EIPSEC_NO_ERROR; 1503 return len; 1504 } 1505 1506 /* 1507 * sending SADB_REGISTER, SADB_FLUSH, SADB_DUMP or SADB_X_PROMISC message 1508 * to the kernel 1509 */ 1510 static int 1511 pfkey_send_x3(int so, u_int type, u_int satype) 1512 { 1513 struct sadb_msg *newmsg; 1514 int len; 1515 caddr_t p; 1516 caddr_t ep; 1517 1518 /* validity check */ 1519 switch (type) { 1520 case SADB_X_PROMISC: 1521 if (satype != 0 && satype != 1) { 1522 __ipsec_errcode = EIPSEC_INVAL_SATYPE; 1523 return -1; 1524 } 1525 break; 1526 default: 1527 switch (satype) { 1528 case SADB_SATYPE_UNSPEC: 1529 case SADB_SATYPE_AH: 1530 case SADB_SATYPE_ESP: 1531 case SADB_X_SATYPE_IPCOMP: 1532 #ifdef SADB_X_SATYPE_TCPSIGNATURE 1533 case SADB_X_SATYPE_TCPSIGNATURE: 1534 #endif 1535 break; 1536 default: 1537 __ipsec_errcode = EIPSEC_INVAL_SATYPE; 1538 return -1; 1539 } 1540 } 1541 1542 /* create new sadb_msg to send. */ 1543 len = sizeof(struct sadb_msg); 1544 1545 if ((newmsg = CALLOC((size_t)len, struct sadb_msg *)) == NULL) { 1546 __ipsec_set_strerror(strerror(errno)); 1547 return -1; 1548 } 1549 ep = ((caddr_t)(void *)newmsg) + len; 1550 1551 p = pfkey_setsadbmsg((void *)newmsg, ep, type, (u_int)len, satype, 0, 1552 getpid()); 1553 if (!p || p != ep) { 1554 free(newmsg); 1555 return -1; 1556 } 1557 1558 /* send message */ 1559 len = pfkey_send(so, newmsg, len); 1560 free(newmsg); 1561 1562 if (len < 0) 1563 return -1; 1564 1565 __ipsec_errcode = EIPSEC_NO_ERROR; 1566 return len; 1567 } 1568 1569 /* sending SADB_X_SPDADD message to the kernel */ 1570 static int 1571 pfkey_send_x4(int so, u_int type, struct sockaddr *src, u_int prefs, 1572 struct sockaddr *dst, u_int prefd, u_int proto, u_int64_t ltime, 1573 u_int64_t vtime, char *policy, int policylen, u_int32_t seq) 1574 { 1575 struct sadb_msg *newmsg; 1576 int len; 1577 caddr_t p; 1578 int plen; 1579 caddr_t ep; 1580 1581 /* validity check */ 1582 if (src == NULL || dst == NULL) { 1583 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 1584 return -1; 1585 } 1586 if (src->sa_family != dst->sa_family) { 1587 __ipsec_errcode = EIPSEC_FAMILY_MISMATCH; 1588 return -1; 1589 } 1590 1591 switch (src->sa_family) { 1592 case AF_INET: 1593 plen = sizeof(struct in_addr) << 3; 1594 break; 1595 case AF_INET6: 1596 plen = sizeof(struct in6_addr) << 3; 1597 break; 1598 default: 1599 __ipsec_errcode = EIPSEC_INVAL_FAMILY; 1600 return -1; 1601 } 1602 if (prefs > plen || prefd > plen) { 1603 __ipsec_errcode = EIPSEC_INVAL_PREFIXLEN; 1604 return -1; 1605 } 1606 1607 /* create new sadb_msg to reply. */ 1608 len = sizeof(struct sadb_msg) 1609 + sizeof(struct sadb_address) 1610 + PFKEY_ALIGN8(sysdep_sa_len(src)) 1611 + sizeof(struct sadb_address) 1612 + PFKEY_ALIGN8(sysdep_sa_len(src)) 1613 + sizeof(struct sadb_lifetime) 1614 + policylen; 1615 1616 if ((newmsg = CALLOC((size_t)len, struct sadb_msg *)) == NULL) { 1617 __ipsec_set_strerror(strerror(errno)); 1618 return -1; 1619 } 1620 ep = ((caddr_t)(void *)newmsg) + len; 1621 1622 p = pfkey_setsadbmsg((void *)newmsg, ep, type, (u_int)len, 1623 SADB_SATYPE_UNSPEC, seq, getpid()); 1624 if (!p) { 1625 free(newmsg); 1626 return -1; 1627 } 1628 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_SRC, src, prefs, proto); 1629 if (!p) { 1630 free(newmsg); 1631 return -1; 1632 } 1633 p = pfkey_setsadbaddr(p, ep, SADB_EXT_ADDRESS_DST, dst, prefd, proto); 1634 if (!p) { 1635 free(newmsg); 1636 return -1; 1637 } 1638 p = pfkey_setsadblifetime(p, ep, SADB_EXT_LIFETIME_HARD, 1639 0, 0, (u_int)ltime, (u_int)vtime); 1640 if (!p || p + policylen != ep) { 1641 free(newmsg); 1642 return -1; 1643 } 1644 memcpy(p, policy, (size_t)policylen); 1645 1646 /* send message */ 1647 len = pfkey_send(so, newmsg, len); 1648 free(newmsg); 1649 1650 if (len < 0) 1651 return -1; 1652 1653 __ipsec_errcode = EIPSEC_NO_ERROR; 1654 return len; 1655 } 1656 1657 /* sending SADB_X_SPDGET or SADB_X_SPDDELETE message to the kernel */ 1658 static int 1659 pfkey_send_x5(int so, u_int type, u_int32_t spid) 1660 { 1661 struct sadb_msg *newmsg; 1662 struct sadb_x_policy xpl; 1663 int len; 1664 caddr_t p; 1665 caddr_t ep; 1666 1667 /* create new sadb_msg to reply. */ 1668 len = sizeof(struct sadb_msg) 1669 + sizeof(xpl); 1670 1671 if ((newmsg = CALLOC((size_t)len, struct sadb_msg *)) == NULL) { 1672 __ipsec_set_strerror(strerror(errno)); 1673 return -1; 1674 } 1675 ep = ((caddr_t)(void *)newmsg) + len; 1676 1677 p = pfkey_setsadbmsg((void *)newmsg, ep, type, (u_int)len, 1678 SADB_SATYPE_UNSPEC, 0, getpid()); 1679 if (!p) { 1680 free(newmsg); 1681 return -1; 1682 } 1683 1684 if (p + sizeof(xpl) != ep) { 1685 free(newmsg); 1686 return -1; 1687 } 1688 memset(&xpl, 0, sizeof(xpl)); 1689 xpl.sadb_x_policy_len = PFKEY_UNIT64(sizeof(xpl)); 1690 xpl.sadb_x_policy_exttype = SADB_X_EXT_POLICY; 1691 xpl.sadb_x_policy_id = spid; 1692 memcpy(p, &xpl, sizeof(xpl)); 1693 1694 /* send message */ 1695 len = pfkey_send(so, newmsg, len); 1696 free(newmsg); 1697 1698 if (len < 0) 1699 return -1; 1700 1701 __ipsec_errcode = EIPSEC_NO_ERROR; 1702 return len; 1703 } 1704 1705 /* 1706 * open a socket. 1707 * OUT: 1708 * -1: fail. 1709 * others : success and return value of socket. 1710 */ 1711 int 1712 pfkey_open(void) 1713 { 1714 int so; 1715 int bufsiz = 128 * 1024; /*is 128K enough?*/ 1716 1717 if ((so = socket(PF_KEY, SOCK_RAW, PF_KEY_V2)) < 0) { 1718 __ipsec_set_strerror(strerror(errno)); 1719 return -1; 1720 } 1721 1722 /* 1723 * This is a temporary workaround for KAME PR 154. 1724 * Don't really care even if it fails. 1725 */ 1726 (void)setsockopt(so, SOL_SOCKET, SO_SNDBUF, &bufsiz, sizeof(bufsiz)); 1727 (void)setsockopt(so, SOL_SOCKET, SO_RCVBUF, &bufsiz, sizeof(bufsiz)); 1728 bufsiz = 256 * 1024; 1729 (void)setsockopt(so, SOL_SOCKET, SO_RCVBUF, &bufsiz, sizeof(bufsiz)); 1730 bufsiz = 512 * 1024; 1731 (void)setsockopt(so, SOL_SOCKET, SO_RCVBUF, &bufsiz, sizeof(bufsiz)); 1732 bufsiz = 1024 * 1024; 1733 (void)setsockopt(so, SOL_SOCKET, SO_RCVBUF, &bufsiz, sizeof(bufsiz)); 1734 __ipsec_errcode = EIPSEC_NO_ERROR; 1735 return so; 1736 } 1737 1738 /* 1739 * close a socket. 1740 * OUT: 1741 * 0: success. 1742 * -1: fail. 1743 */ 1744 void 1745 pfkey_close(int so) 1746 { 1747 (void)close(so); 1748 1749 __ipsec_errcode = EIPSEC_NO_ERROR; 1750 return; 1751 } 1752 1753 /* 1754 * receive sadb_msg data, and return pointer to new buffer allocated. 1755 * Must free this buffer later. 1756 * OUT: 1757 * NULL : error occured. 1758 * others : a pointer to sadb_msg structure. 1759 * 1760 * XXX should be rewritten to pass length explicitly 1761 */ 1762 struct sadb_msg * 1763 pfkey_recv(int so) 1764 { 1765 struct sadb_msg buf, *newmsg; 1766 int len, reallen; 1767 1768 while ((len = recv(so, (void *)&buf, sizeof(buf), MSG_PEEK)) < 0) { 1769 if (errno == EINTR) 1770 continue; 1771 __ipsec_set_strerror(strerror(errno)); 1772 return NULL; 1773 } 1774 1775 if (len < sizeof(buf)) { 1776 recv(so, (void *)&buf, sizeof(buf), 0); 1777 __ipsec_errcode = EIPSEC_MAX; 1778 return NULL; 1779 } 1780 1781 /* read real message */ 1782 reallen = PFKEY_UNUNIT64(buf.sadb_msg_len); 1783 if ((newmsg = CALLOC((size_t)reallen, struct sadb_msg *)) == 0) { 1784 __ipsec_set_strerror(strerror(errno)); 1785 return NULL; 1786 } 1787 1788 while ((len = recv(so, (void *)newmsg, (socklen_t)reallen, 0)) < 0) { 1789 if (errno == EINTR) 1790 continue; 1791 __ipsec_set_strerror(strerror(errno)); 1792 free(newmsg); 1793 return NULL; 1794 } 1795 1796 if (len != reallen) { 1797 __ipsec_errcode = EIPSEC_SYSTEM_ERROR; 1798 free(newmsg); 1799 return NULL; 1800 } 1801 1802 /* don't trust what the kernel says, validate! */ 1803 if (PFKEY_UNUNIT64(newmsg->sadb_msg_len) != len) { 1804 __ipsec_errcode = EIPSEC_SYSTEM_ERROR; 1805 free(newmsg); 1806 return NULL; 1807 } 1808 1809 __ipsec_errcode = EIPSEC_NO_ERROR; 1810 return newmsg; 1811 } 1812 1813 /* 1814 * send message to a socket. 1815 * OUT: 1816 * others: success and return length sent. 1817 * -1 : fail. 1818 */ 1819 int 1820 pfkey_send(int so, struct sadb_msg *msg, int len) 1821 { 1822 if ((len = send(so, (void *)msg, (socklen_t)len, 0)) < 0) { 1823 __ipsec_set_strerror(strerror(errno)); 1824 return -1; 1825 } 1826 1827 __ipsec_errcode = EIPSEC_NO_ERROR; 1828 return len; 1829 } 1830 1831 /* 1832 * %%% Utilities 1833 * NOTE: These functions are derived from netkey/key.c in KAME. 1834 */ 1835 /* 1836 * set the pointer to each header in this message buffer. 1837 * IN: msg: pointer to message buffer. 1838 * mhp: pointer to the buffer initialized like below: 1839 * caddr_t mhp[SADB_EXT_MAX + 1]; 1840 * OUT: -1: invalid. 1841 * 0: valid. 1842 * 1843 * XXX should be rewritten to obtain length explicitly 1844 */ 1845 int 1846 pfkey_align(struct sadb_msg *msg, caddr_t *mhp) 1847 { 1848 struct sadb_ext *ext; 1849 int i; 1850 caddr_t p; 1851 caddr_t ep; /* XXX should be passed from upper layer */ 1852 1853 /* validity check */ 1854 if (msg == NULL || mhp == NULL) { 1855 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 1856 return -1; 1857 } 1858 1859 /* initialize */ 1860 for (i = 0; i < SADB_EXT_MAX + 1; i++) 1861 mhp[i] = NULL; 1862 1863 mhp[0] = (void *)msg; 1864 1865 /* initialize */ 1866 p = (void *) msg; 1867 ep = p + PFKEY_UNUNIT64(msg->sadb_msg_len); 1868 1869 /* skip base header */ 1870 p += sizeof(struct sadb_msg); 1871 1872 while (p < ep) { 1873 ext = (void *)p; 1874 if (ep < p + sizeof(*ext) || PFKEY_EXTLEN(ext) < sizeof(*ext) || 1875 ep < p + PFKEY_EXTLEN(ext)) { 1876 /* invalid format */ 1877 break; 1878 } 1879 1880 /* duplicate check */ 1881 /* XXX Are there duplication either KEY_AUTH or KEY_ENCRYPT ?*/ 1882 if (mhp[ext->sadb_ext_type] != NULL) { 1883 __ipsec_errcode = EIPSEC_INVAL_EXTTYPE; 1884 return -1; 1885 } 1886 1887 /* set pointer */ 1888 switch (ext->sadb_ext_type) { 1889 case SADB_EXT_SA: 1890 case SADB_EXT_LIFETIME_CURRENT: 1891 case SADB_EXT_LIFETIME_HARD: 1892 case SADB_EXT_LIFETIME_SOFT: 1893 case SADB_EXT_ADDRESS_SRC: 1894 case SADB_EXT_ADDRESS_DST: 1895 case SADB_EXT_ADDRESS_PROXY: 1896 case SADB_EXT_KEY_AUTH: 1897 /* XXX should to be check weak keys. */ 1898 case SADB_EXT_KEY_ENCRYPT: 1899 /* XXX should to be check weak keys. */ 1900 case SADB_EXT_IDENTITY_SRC: 1901 case SADB_EXT_IDENTITY_DST: 1902 case SADB_EXT_SENSITIVITY: 1903 case SADB_EXT_PROPOSAL: 1904 case SADB_EXT_SUPPORTED_AUTH: 1905 case SADB_EXT_SUPPORTED_ENCRYPT: 1906 case SADB_EXT_SPIRANGE: 1907 case SADB_X_EXT_POLICY: 1908 case SADB_X_EXT_SA2: 1909 #ifdef SADB_X_EXT_NAT_T_TYPE 1910 case SADB_X_EXT_NAT_T_TYPE: 1911 case SADB_X_EXT_NAT_T_SPORT: 1912 case SADB_X_EXT_NAT_T_DPORT: 1913 case SADB_X_EXT_NAT_T_OA: 1914 #endif 1915 #ifdef SADB_X_EXT_TAG 1916 case SADB_X_EXT_TAG: 1917 #endif 1918 #ifdef SADB_X_EXT_PACKET 1919 case SADB_X_EXT_PACKET: 1920 #endif 1921 #ifdef SADB_X_EXT_SEC_CTX 1922 case SADB_X_EXT_SEC_CTX: 1923 #endif 1924 mhp[ext->sadb_ext_type] = (void *)ext; 1925 break; 1926 default: 1927 __ipsec_errcode = EIPSEC_INVAL_EXTTYPE; 1928 return -1; 1929 } 1930 1931 p += PFKEY_EXTLEN(ext); 1932 } 1933 1934 if (p != ep) { 1935 __ipsec_errcode = EIPSEC_INVAL_SADBMSG; 1936 return -1; 1937 } 1938 1939 __ipsec_errcode = EIPSEC_NO_ERROR; 1940 return 0; 1941 } 1942 1943 /* 1944 * check basic usage for sadb_msg, 1945 * NOTE: This routine is derived from netkey/key.c in KAME. 1946 * IN: msg: pointer to message buffer. 1947 * mhp: pointer to the buffer initialized like below: 1948 * 1949 * caddr_t mhp[SADB_EXT_MAX + 1]; 1950 * 1951 * OUT: -1: invalid. 1952 * 0: valid. 1953 */ 1954 int 1955 pfkey_check(caddr_t *mhp) 1956 { 1957 struct sadb_msg *msg; 1958 1959 /* validity check */ 1960 if (mhp == NULL || mhp[0] == NULL) { 1961 __ipsec_errcode = EIPSEC_INVAL_ARGUMENT; 1962 return -1; 1963 } 1964 1965 msg = (void *)mhp[0]; 1966 1967 /* check version */ 1968 if (msg->sadb_msg_version != PF_KEY_V2) { 1969 __ipsec_errcode = EIPSEC_INVAL_VERSION; 1970 return -1; 1971 } 1972 1973 /* check type */ 1974 if (msg->sadb_msg_type > SADB_MAX) { 1975 __ipsec_errcode = EIPSEC_INVAL_MSGTYPE; 1976 return -1; 1977 } 1978 1979 /* check SA type */ 1980 switch (msg->sadb_msg_satype) { 1981 case SADB_SATYPE_UNSPEC: 1982 switch (msg->sadb_msg_type) { 1983 case SADB_GETSPI: 1984 case SADB_UPDATE: 1985 case SADB_ADD: 1986 case SADB_DELETE: 1987 case SADB_GET: 1988 case SADB_ACQUIRE: 1989 case SADB_EXPIRE: 1990 #ifdef SADB_X_NAT_T_NEW_MAPPING 1991 case SADB_X_NAT_T_NEW_MAPPING: 1992 #endif 1993 __ipsec_errcode = EIPSEC_INVAL_SATYPE; 1994 return -1; 1995 } 1996 break; 1997 case SADB_SATYPE_ESP: 1998 case SADB_SATYPE_AH: 1999 case SADB_X_SATYPE_IPCOMP: 2000 #ifdef SADB_X_SATYPE_TCPSIGNATURE 2001 case SADB_X_SATYPE_TCPSIGNATURE: 2002 #endif 2003 switch (msg->sadb_msg_type) { 2004 case SADB_X_SPDADD: 2005 case SADB_X_SPDDELETE: 2006 case SADB_X_SPDGET: 2007 case SADB_X_SPDDUMP: 2008 case SADB_X_SPDFLUSH: 2009 __ipsec_errcode = EIPSEC_INVAL_SATYPE; 2010 return -1; 2011 } 2012 #ifdef SADB_X_NAT_T_NEW_MAPPING 2013 if (msg->sadb_msg_type == SADB_X_NAT_T_NEW_MAPPING && 2014 msg->sadb_msg_satype != SADB_SATYPE_ESP) { 2015 __ipsec_errcode = EIPSEC_INVAL_SATYPE; 2016 return -1; 2017 } 2018 #endif 2019 break; 2020 case SADB_SATYPE_RSVP: 2021 case SADB_SATYPE_OSPFV2: 2022 case SADB_SATYPE_RIPV2: 2023 case SADB_SATYPE_MIP: 2024 __ipsec_errcode = EIPSEC_NOT_SUPPORTED; 2025 return -1; 2026 case 1: /* XXX: What does it do ? */ 2027 if (msg->sadb_msg_type == SADB_X_PROMISC) 2028 break; 2029 /*FALLTHROUGH*/ 2030 default: 2031 __ipsec_errcode = EIPSEC_INVAL_SATYPE; 2032 return -1; 2033 } 2034 2035 /* check field of upper layer protocol and address family */ 2036 if (mhp[SADB_EXT_ADDRESS_SRC] != NULL 2037 && mhp[SADB_EXT_ADDRESS_DST] != NULL) { 2038 struct sadb_address *src0, *dst0; 2039 2040 src0 = (void *)(mhp[SADB_EXT_ADDRESS_SRC]); 2041 dst0 = (void *)(mhp[SADB_EXT_ADDRESS_DST]); 2042 2043 if (src0->sadb_address_proto != dst0->sadb_address_proto) { 2044 __ipsec_errcode = EIPSEC_PROTO_MISMATCH; 2045 return -1; 2046 } 2047 2048 if (PFKEY_ADDR_SADDR(src0)->sa_family 2049 != PFKEY_ADDR_SADDR(dst0)->sa_family) { 2050 __ipsec_errcode = EIPSEC_FAMILY_MISMATCH; 2051 return -1; 2052 } 2053 2054 switch (PFKEY_ADDR_SADDR(src0)->sa_family) { 2055 case AF_INET: 2056 case AF_INET6: 2057 break; 2058 default: 2059 __ipsec_errcode = EIPSEC_INVAL_FAMILY; 2060 return -1; 2061 } 2062 2063 /* 2064 * prefixlen == 0 is valid because there must be the case 2065 * all addresses are matched. 2066 */ 2067 } 2068 2069 __ipsec_errcode = EIPSEC_NO_ERROR; 2070 return 0; 2071 } 2072 2073 /* 2074 * set data into sadb_msg. 2075 * `buf' must has been allocated sufficiently. 2076 */ 2077 static caddr_t 2078 pfkey_setsadbmsg(caddr_t buf, caddr_t lim, u_int type, u_int tlen, 2079 u_int satype, u_int32_t seq, pid_t pid) 2080 { 2081 struct sadb_msg *p; 2082 u_int len; 2083 2084 p = (void *)buf; 2085 len = sizeof(struct sadb_msg); 2086 2087 if (buf + len > lim) 2088 return NULL; 2089 2090 memset(p, 0, len); 2091 p->sadb_msg_version = PF_KEY_V2; 2092 p->sadb_msg_type = type; 2093 p->sadb_msg_errno = 0; 2094 p->sadb_msg_satype = satype; 2095 p->sadb_msg_len = PFKEY_UNIT64(tlen); 2096 p->sadb_msg_reserved = 0; 2097 p->sadb_msg_seq = seq; 2098 p->sadb_msg_pid = (u_int32_t)pid; 2099 2100 return(buf + len); 2101 } 2102 2103 /* 2104 * copy secasvar data into sadb_address. 2105 * `buf' must has been allocated sufficiently. 2106 */ 2107 static caddr_t 2108 pfkey_setsadbsa(caddr_t buf, caddr_t lim, u_int32_t spi, u_int wsize, 2109 u_int auth, u_int enc, u_int32_t flags) 2110 { 2111 struct sadb_sa *p; 2112 u_int len; 2113 2114 p = (void *)buf; 2115 len = sizeof(struct sadb_sa); 2116 2117 if (buf + len > lim) 2118 return NULL; 2119 2120 memset(p, 0, len); 2121 p->sadb_sa_len = PFKEY_UNIT64(len); 2122 p->sadb_sa_exttype = SADB_EXT_SA; 2123 p->sadb_sa_spi = spi; 2124 p->sadb_sa_replay = wsize; 2125 p->sadb_sa_state = SADB_SASTATE_LARVAL; 2126 p->sadb_sa_auth = auth; 2127 p->sadb_sa_encrypt = enc; 2128 p->sadb_sa_flags = flags; 2129 2130 return(buf + len); 2131 } 2132 2133 /* 2134 * set data into sadb_address. 2135 * `buf' must has been allocated sufficiently. 2136 * prefixlen is in bits. 2137 */ 2138 static caddr_t 2139 pfkey_setsadbaddr(caddr_t buf, caddr_t lim, u_int exttype, 2140 struct sockaddr *saddr, u_int prefixlen, u_int ul_proto) 2141 { 2142 struct sadb_address *p; 2143 u_int len; 2144 2145 p = (void *)buf; 2146 len = sizeof(struct sadb_address) + PFKEY_ALIGN8(sysdep_sa_len(saddr)); 2147 2148 if (buf + len > lim) 2149 return NULL; 2150 2151 memset(p, 0, len); 2152 p->sadb_address_len = PFKEY_UNIT64(len); 2153 p->sadb_address_exttype = exttype & 0xffff; 2154 p->sadb_address_proto = ul_proto & 0xff; 2155 p->sadb_address_prefixlen = prefixlen; 2156 p->sadb_address_reserved = 0; 2157 2158 memcpy(p + 1, saddr, (size_t)sysdep_sa_len(saddr)); 2159 2160 return(buf + len); 2161 } 2162 2163 /* 2164 * set sadb_key structure after clearing buffer with zero. 2165 * OUT: the pointer of buf + len. 2166 */ 2167 static caddr_t 2168 pfkey_setsadbkey(caddr_t buf, caddr_t lim, u_int type, caddr_t key, 2169 u_int keylen) 2170 { 2171 struct sadb_key *p; 2172 u_int len; 2173 2174 p = (void *)buf; 2175 len = sizeof(struct sadb_key) + PFKEY_ALIGN8(keylen); 2176 2177 if (buf + len > lim) 2178 return NULL; 2179 2180 memset(p, 0, len); 2181 p->sadb_key_len = PFKEY_UNIT64(len); 2182 p->sadb_key_exttype = type; 2183 p->sadb_key_bits = keylen << 3; 2184 p->sadb_key_reserved = 0; 2185 2186 memcpy(p + 1, key, keylen); 2187 2188 return buf + len; 2189 } 2190 2191 /* 2192 * set sadb_lifetime structure after clearing buffer with zero. 2193 * OUT: the pointer of buf + len. 2194 */ 2195 static caddr_t 2196 pfkey_setsadblifetime(caddr_t buf, caddr_t lim, u_int type, u_int32_t l_alloc, 2197 u_int32_t l_bytes, u_int32_t l_addtime, u_int32_t l_usetime) 2198 { 2199 struct sadb_lifetime *p; 2200 u_int len; 2201 2202 p = (void *)buf; 2203 len = sizeof(struct sadb_lifetime); 2204 2205 if (buf + len > lim) 2206 return NULL; 2207 2208 memset(p, 0, len); 2209 p->sadb_lifetime_len = PFKEY_UNIT64(len); 2210 p->sadb_lifetime_exttype = type; 2211 2212 switch (type) { 2213 case SADB_EXT_LIFETIME_SOFT: 2214 p->sadb_lifetime_allocations 2215 = (l_alloc * soft_lifetime_allocations_rate) /100; 2216 p->sadb_lifetime_bytes 2217 = (l_bytes * soft_lifetime_bytes_rate) /100; 2218 p->sadb_lifetime_addtime 2219 = (l_addtime * soft_lifetime_addtime_rate) /100; 2220 p->sadb_lifetime_usetime 2221 = (l_usetime * soft_lifetime_usetime_rate) /100; 2222 break; 2223 case SADB_EXT_LIFETIME_HARD: 2224 p->sadb_lifetime_allocations = l_alloc; 2225 p->sadb_lifetime_bytes = l_bytes; 2226 p->sadb_lifetime_addtime = l_addtime; 2227 p->sadb_lifetime_usetime = l_usetime; 2228 break; 2229 } 2230 2231 return buf + len; 2232 } 2233 2234 /* 2235 * copy secasvar data into sadb_address. 2236 * `buf' must has been allocated sufficiently. 2237 */ 2238 static caddr_t 2239 pfkey_setsadbxsa2(caddr_t buf, caddr_t lim, u_int32_t mode0, u_int32_t reqid) 2240 { 2241 struct sadb_x_sa2 *p; 2242 u_int8_t mode = mode0 & 0xff; 2243 u_int len; 2244 2245 p = (void *)buf; 2246 len = sizeof(struct sadb_x_sa2); 2247 2248 if (buf + len > lim) 2249 return NULL; 2250 2251 memset(p, 0, len); 2252 p->sadb_x_sa2_len = PFKEY_UNIT64(len); 2253 p->sadb_x_sa2_exttype = SADB_X_EXT_SA2; 2254 p->sadb_x_sa2_mode = mode; 2255 p->sadb_x_sa2_reqid = reqid; 2256 2257 return(buf + len); 2258 } 2259 2260 #ifdef SADB_X_EXT_NAT_T_TYPE 2261 static caddr_t 2262 pfkey_set_natt_type(caddr_t buf, caddr_t lim, u_int type, u_int8_t l_natt_type) 2263 { 2264 struct sadb_x_nat_t_type *p; 2265 u_int len; 2266 2267 p = (void *)buf; 2268 len = sizeof(struct sadb_x_nat_t_type); 2269 2270 if (buf + len > lim) 2271 return NULL; 2272 2273 memset(p, 0, len); 2274 p->sadb_x_nat_t_type_len = PFKEY_UNIT64(len); 2275 p->sadb_x_nat_t_type_exttype = type; 2276 p->sadb_x_nat_t_type_type = l_natt_type; 2277 2278 return(buf + len); 2279 } 2280 2281 static caddr_t 2282 pfkey_set_natt_port(caddr_t buf, caddr_t lim, u_int type, u_int16_t l_natt_port) 2283 { 2284 struct sadb_x_nat_t_port *p; 2285 u_int len; 2286 2287 p = (void *)buf; 2288 len = sizeof(struct sadb_x_nat_t_port); 2289 2290 if (buf + len > lim) 2291 return NULL; 2292 2293 memset(p, 0, len); 2294 p->sadb_x_nat_t_port_len = PFKEY_UNIT64(len); 2295 p->sadb_x_nat_t_port_exttype = type; 2296 p->sadb_x_nat_t_port_port = htons(l_natt_port); 2297 2298 return(buf + len); 2299 } 2300 #endif 2301 2302 #ifdef SADB_X_EXT_NAT_T_FRAG 2303 static caddr_t 2304 pfkey_set_natt_frag(caddr_t buf, caddr_t lim, u_int type, 2305 u_int16_t l_natt_frag) 2306 { 2307 struct sadb_x_nat_t_frag *p; 2308 u_int len; 2309 2310 p = (void *)buf; 2311 len = sizeof(struct sadb_x_nat_t_frag); 2312 2313 if (buf + len > lim) 2314 return NULL; 2315 2316 memset(p, 0, len); 2317 p->sadb_x_nat_t_frag_len = PFKEY_UNIT64(len); 2318 p->sadb_x_nat_t_frag_exttype = type; 2319 p->sadb_x_nat_t_frag_fraglen = l_natt_frag; 2320 2321 return(buf + len); 2322 } 2323 #endif 2324 2325 #ifdef SADB_X_EXT_SEC_CTX 2326 static caddr_t 2327 pfkey_setsecctx(caddr_t buf, caddr_t lim, u_int type, u_int8_t ctx_doi, 2328 u_int8_t ctx_alg, caddr_t sec_ctx, u_int16_t sec_ctxlen) 2329 { 2330 struct sadb_x_sec_ctx *p; 2331 u_int len; 2332 2333 p = (struct sadb_x_sec_ctx *)buf; 2334 len = sizeof(struct sadb_x_sec_ctx) + PFKEY_ALIGN8(sec_ctxlen); 2335 2336 if (buf + len > lim) 2337 return NULL; 2338 2339 memset(p, 0, len); 2340 p->sadb_x_sec_len = PFKEY_UNIT64(len); 2341 p->sadb_x_sec_exttype = type; 2342 p->sadb_x_ctx_len = sec_ctxlen; 2343 p->sadb_x_ctx_doi = ctx_doi; 2344 p->sadb_x_ctx_alg = ctx_alg; 2345 2346 memcpy(p + 1, sec_ctx, sec_ctxlen); 2347 2348 return buf + len; 2349 } 2350 #endif 2351 2352 /* 2353 * Deprecated, available for backward compatibility with third party 2354 * libipsec users. Please use pfkey_send_update2 and pfkey_send_add2 instead 2355 */ 2356 int 2357 pfkey_send_update(int so, u_int satype, u_int mode, struct sockaddr *src, 2358 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, 2359 caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, 2360 u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, 2361 u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq) 2362 { 2363 struct pfkey_send_sa_args psaa; 2364 2365 memset(&psaa, 0, sizeof(psaa)); 2366 psaa.so = so; 2367 psaa.type = SADB_UPDATE; 2368 psaa.satype = satype; 2369 psaa.mode = mode; 2370 psaa.wsize = wsize; 2371 psaa.src = src; 2372 psaa.dst = dst; 2373 psaa.spi = spi; 2374 psaa.reqid = reqid; 2375 psaa.keymat = keymat; 2376 psaa.e_type = e_type; 2377 psaa.e_keylen = e_keylen; 2378 psaa.a_type = a_type; 2379 psaa.a_keylen = a_keylen; 2380 psaa.flags = flags; 2381 psaa.l_alloc = l_alloc; 2382 psaa.l_bytes = l_bytes; 2383 psaa.l_addtime = l_addtime; 2384 psaa.l_usetime = l_usetime; 2385 psaa.seq = seq; 2386 2387 return pfkey_send_update2(&psaa); 2388 } 2389 2390 int 2391 pfkey_send_update_nat(int so, u_int satype, u_int mode, struct sockaddr *src, 2392 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, 2393 caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, 2394 u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, 2395 u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq, 2396 u_int8_t l_natt_type, u_int16_t l_natt_sport, u_int16_t l_natt_dport, 2397 struct sockaddr *l_natt_oa, u_int16_t l_natt_frag) 2398 { 2399 struct pfkey_send_sa_args psaa; 2400 2401 memset(&psaa, 0, sizeof(psaa)); 2402 psaa.so = so; 2403 psaa.type = SADB_UPDATE; 2404 psaa.satype = satype; 2405 psaa.mode = mode; 2406 psaa.wsize = wsize; 2407 psaa.src = src; 2408 psaa.dst = dst; 2409 psaa.spi = spi; 2410 psaa.reqid = reqid; 2411 psaa.keymat = keymat; 2412 psaa.e_type = e_type; 2413 psaa.e_keylen = e_keylen; 2414 psaa.a_type = a_type; 2415 psaa.a_keylen = a_keylen; 2416 psaa.flags = flags; 2417 psaa.l_alloc = l_alloc; 2418 psaa.l_bytes = l_bytes; 2419 psaa.l_addtime = l_addtime; 2420 psaa.l_usetime = l_usetime; 2421 psaa.seq = seq; 2422 psaa.l_natt_type = l_natt_type; 2423 psaa.l_natt_sport = l_natt_sport; 2424 psaa.l_natt_dport = l_natt_dport; 2425 psaa.l_natt_oa = l_natt_oa; 2426 psaa.l_natt_frag = l_natt_frag; 2427 2428 return pfkey_send_update2(&psaa); 2429 } 2430 2431 int 2432 pfkey_send_add(int so, u_int satype, u_int mode, struct sockaddr *src, 2433 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, 2434 caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, 2435 u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, 2436 u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq) 2437 { 2438 struct pfkey_send_sa_args psaa; 2439 2440 memset(&psaa, 0, sizeof(psaa)); 2441 psaa.so = so; 2442 psaa.type = SADB_ADD; 2443 psaa.satype = satype; 2444 psaa.mode = mode; 2445 psaa.wsize = wsize; 2446 psaa.src = src; 2447 psaa.dst = dst; 2448 psaa.spi = spi; 2449 psaa.reqid = reqid; 2450 psaa.keymat = keymat; 2451 psaa.e_type = e_type; 2452 psaa.e_keylen = e_keylen; 2453 psaa.a_type = a_type; 2454 psaa.a_keylen = a_keylen; 2455 psaa.flags = flags; 2456 psaa.l_alloc = l_alloc; 2457 psaa.l_bytes = l_bytes; 2458 psaa.l_addtime = l_addtime; 2459 psaa.l_usetime = l_usetime; 2460 psaa.seq = seq; 2461 2462 return pfkey_send_add2(&psaa); 2463 } 2464 2465 int 2466 pfkey_send_add_nat(int so, u_int satype, u_int mode, struct sockaddr *src, 2467 struct sockaddr *dst, u_int32_t spi, u_int32_t reqid, u_int wsize, 2468 caddr_t keymat, u_int e_type, u_int e_keylen, u_int a_type, 2469 u_int a_keylen, u_int flags, u_int32_t l_alloc, u_int64_t l_bytes, 2470 u_int64_t l_addtime, u_int64_t l_usetime, u_int32_t seq, 2471 u_int8_t l_natt_type, u_int16_t l_natt_sport, u_int16_t l_natt_dport, 2472 struct sockaddr *l_natt_oa, u_int16_t l_natt_frag) 2473 { 2474 struct pfkey_send_sa_args psaa; 2475 2476 memset(&psaa, 0, sizeof(psaa)); 2477 psaa.so = so; 2478 psaa.type = SADB_ADD; 2479 psaa.satype = satype; 2480 psaa.mode = mode; 2481 psaa.wsize = wsize; 2482 psaa.src = src; 2483 psaa.dst = dst; 2484 psaa.spi = spi; 2485 psaa.reqid = reqid; 2486 psaa.keymat = keymat; 2487 psaa.e_type = e_type; 2488 psaa.e_keylen = e_keylen; 2489 psaa.a_type = a_type; 2490 psaa.a_keylen = a_keylen; 2491 psaa.flags = flags; 2492 psaa.l_alloc = l_alloc; 2493 psaa.l_bytes = l_bytes; 2494 psaa.l_addtime = l_addtime; 2495 psaa.l_usetime = l_usetime; 2496 psaa.seq = seq; 2497 psaa.l_natt_type = l_natt_type; 2498 psaa.l_natt_sport = l_natt_sport; 2499 psaa.l_natt_dport = l_natt_dport; 2500 psaa.l_natt_oa = l_natt_oa; 2501 psaa.l_natt_frag = l_natt_frag; 2502 2503 return pfkey_send_add2(&psaa); 2504 } 2505