summaryrefslogtreecommitdiff
path: root/sys/dev/pci/ubsec.c
diff options
context:
space:
mode:
authorTheo de Raadt <deraadt@cvs.openbsd.org>2000-08-13 22:03:10 +0000
committerTheo de Raadt <deraadt@cvs.openbsd.org>2000-08-13 22:03:10 +0000
commit0e73f306e49667008971cb4043dd46ca807521ef (patch)
treeabb7f39cee3f050d9af99169be8cfd3014ba2e18 /sys/dev/pci/ubsec.c
parent076394920371fce2e1a33f2150d5cb1594745fc6 (diff)
not completely working session code from jason
Diffstat (limited to 'sys/dev/pci/ubsec.c')
-rw-r--r--sys/dev/pci/ubsec.c225
1 files changed, 151 insertions, 74 deletions
diff --git a/sys/dev/pci/ubsec.c b/sys/dev/pci/ubsec.c
index 44cbf954117..0e569c43e3e 100644
--- a/sys/dev/pci/ubsec.c
+++ b/sys/dev/pci/ubsec.c
@@ -1,4 +1,4 @@
-/* $OpenBSD: ubsec.c,v 1.22 2000/08/13 21:58:06 deraadt Exp $ */
+/* $OpenBSD: ubsec.c,v 1.23 2000/08/13 22:03:09 deraadt Exp $ */
/*
* Copyright (c) 2000 Jason L. Wright (jason@thought.net)
@@ -358,16 +358,17 @@ feed1:
* Allocate a new 'session' and return an encoded session id. 'sidp'
* contains our registration id, and should contain an encoded session
* id on successful allocation.
- * XXX No allocation actually done here, all sessions are the same.
*/
int
ubsec_newsession(sidp, cri)
u_int32_t *sidp;
struct cryptoini *cri;
{
- struct cryptoini *c;
+ struct cryptoini *c, *encini = NULL, *macini = NULL;
struct ubsec_softc *sc = NULL;
- char mac = 0, cry = 0;
+ struct ubsec_session *ses;
+ MD5_CTX md5ctx;
+ SHA1_CTX sha1ctx;
int i;
if (sidp == NULL || cri == NULL)
@@ -384,33 +385,141 @@ ubsec_newsession(sidp, cri)
for (c = cri; c != NULL; c = c->cri_next) {
if (c->cri_alg == CRYPTO_MD5_HMAC96 ||
c->cri_alg == CRYPTO_SHA1_HMAC96) {
- if (mac)
+ if (macini)
return (EINVAL);
- mac = 1;
+ macini = c;
} else if (c->cri_alg == CRYPTO_DES_CBC ||
c->cri_alg == CRYPTO_3DES_CBC) {
- if (cry)
+ if (encini)
return (EINVAL);
- cry = 1;
+ encini = c;
} else
return (EINVAL);
}
- if (mac == 0 && cry == 0)
+ if (encini == NULL && macini == NULL)
return (EINVAL);
- *sidp = UBSEC_SID(sc->sc_dv.dv_unit, 0);
+ if (sc->sc_sessions == NULL) {
+ ses = sc->sc_sessions = (struct ubsec_session *)malloc(
+ sizeof(struct ubsec_session), M_DEVBUF, M_NOWAIT);
+ if (ses == NULL)
+ return (ENOMEM);
+ i = 0;
+ sc->sc_nsessions = 1;
+ } else {
+ for (i = 0; i < sc->sc_nsessions; i++) {
+ if (sc->sc_sessions[i].ses_used == 0) {
+ ses = &sc->sc_sessions[i];
+ break;
+ }
+ }
+
+ if (ses == NULL) {
+ ses = (struct ubsec_session *)malloc(
+ (sc->sc_nsessions + 1) *
+ sizeof(struct ubsec_session), M_DEVBUF, M_NOWAIT);
+ if (ses == NULL)
+ return (ENOMEM);
+ for (i = 0; i < sc->sc_nsessions; i++) {
+ bcopy(&sc->sc_sessions[i], &ses[i],
+ sizeof(struct ubsec_session));
+ bzero(&sc->sc_sessions[i],
+ sizeof(struct ubsec_session));
+ }
+ free(sc->sc_sessions, M_DEVBUF);
+ sc->sc_sessions = ses;
+ ses = &sc->sc_sessions[sc->sc_nsessions];
+ sc->sc_nsessions++;
+ }
+ }
+
+ bzero(ses, sizeof(struct ubsec_session));
+ ses->ses_used = 1;
+ if (encini) {
+ /* get an IV, network byte order */
+ get_random_bytes(ses->ses_iv, sizeof(ses->ses_iv));
+
+ /* Go ahead and compute key in ubsec's byte order */
+ if (encini->cri_alg == CRYPTO_DES_CBC) {
+ bcopy(encini->cri_key, &ses->ses_deskey[0], 8);
+ bcopy(encini->cri_key, &ses->ses_deskey[2], 8);
+ bcopy(encini->cri_key, &ses->ses_deskey[4], 8);
+ }
+ else
+ bcopy(encini->cri_key, &ses->ses_deskey[0], 24);
+ SWAP32(ses->ses_deskey[0]);
+ SWAP32(ses->ses_deskey[1]);
+ SWAP32(ses->ses_deskey[2]);
+ SWAP32(ses->ses_deskey[3]);
+ SWAP32(ses->ses_deskey[4]);
+ SWAP32(ses->ses_deskey[5]);
+ }
+ if (macini) {
+ if (macini->cri_alg == CRYPTO_MD5_HMAC96) {
+ MD5Init(&md5ctx);
+ MD5Update(&md5ctx, macini->cri_key,
+ macini->cri_klen / 8);
+ MD5Update(&md5ctx, hmac_ipad_buffer,
+ HMAC_BLOCK_LEN - (macini->cri_klen / 8));
+ bcopy(md5ctx.state, ses->ses_hminner,
+ sizeof(md5ctx.state));
+ } else {
+ SHA1Init(&sha1ctx);
+ SHA1Update(&sha1ctx, macini->cri_key,
+ macini->cri_klen / 8);
+ SHA1Update(&sha1ctx, hmac_ipad_buffer,
+ HMAC_BLOCK_LEN - (macini->cri_klen / 8));
+ bcopy(sha1ctx.state, ses->ses_hminner,
+ sizeof(sha1ctx.state));
+ }
+
+ for (i = 0; i < macini->cri_klen / 8; i++)
+ macini->cri_key[i] ^= (HMAC_IPAD_VAL ^ HMAC_OPAD_VAL);
+
+ if (macini->cri_alg == CRYPTO_MD5_HMAC96) {
+ MD5Init(&md5ctx);
+ MD5Update(&md5ctx, macini->cri_key,
+ macini->cri_klen / 8);
+ MD5Update(&md5ctx, hmac_opad_buffer,
+ HMAC_BLOCK_LEN - (macini->cri_klen / 8));
+ bcopy(md5ctx.state, ses->ses_hmouter,
+ sizeof(md5ctx.state));
+ } else {
+ SHA1Init(&sha1ctx);
+ SHA1Update(&sha1ctx, macini->cri_key,
+ macini->cri_klen / 8);
+ SHA1Update(&sha1ctx, hmac_opad_buffer,
+ HMAC_BLOCK_LEN - (macini->cri_klen / 8));
+ bcopy(sha1ctx.state, ses->ses_hmouter,
+ sizeof(sha1ctx.state));
+ }
+
+ for (i = 0; i < macini->cri_klen / 8; i++)
+ macini->cri_key[i] ^= HMAC_OPAD_VAL;
+ }
+
+ *sidp = UBSEC_SID(sc->sc_dv.dv_unit, i);
return (0);
}
/*
* Deallocate a session.
- * XXX Nothing to do yet.
*/
int
-ubsec_freesession(sid)
- u_int64_t sid;
+ubsec_freesession(tid)
+ u_int64_t tid;
{
+ struct ubsec_softc *sc;
+ int card, session;
+ u_int32_t sid = ((u_int32_t) tid) & 0xffffffff;
+
+ card = UBSEC_CARD(sid);
+ if (card >= ubsec_cd.cd_ndevs || ubsec_cd.cd_devs[card] == NULL)
+ return (EINVAL);
+ sc = ubsec_cd.cd_devs[card];
+ session = UBSEC_SESSION(sid);
+ bzero(&sc->sc_sessions[session], sizeof(sc->sc_sessions[session]));
return (0);
}
@@ -418,14 +527,13 @@ int
ubsec_process(crp)
struct cryptop *crp;
{
- MD5_CTX md5ctx;
- SHA1_CTX sha1ctx;
struct ubsec_q *q = NULL;
int card, err, i, j, s, nicealign;
struct ubsec_softc *sc;
struct cryptodesc *crd1, *crd2, *maccrd, *enccrd;
int encoffset = 0, macoffset = 0, sskip, dskip, stheend, dtheend;
int16_t coffset;
+ struct ubsec_session *ses;
if (crp == NULL || crp->crp_callback == NULL)
return (EINVAL);
@@ -454,6 +562,8 @@ ubsec_process(crp)
}
bzero(q, sizeof(struct ubsec_q));
+ ses = q->q_ses = &sc->sc_sessions[UBSEC_SESSION(crp->crp_sid)];
+
q->q_mcr = (struct ubsec_mcr *)malloc(sizeof(struct ubsec_mcr),
M_DEVBUF, M_NOWAIT);
if (q->q_mcr == NULL) {
@@ -529,7 +639,7 @@ ubsec_process(crp)
if (enccrd->crd_flags & CRD_F_IV_EXPLICIT)
bcopy(enccrd->crd_iv, &q->q_ctx.pc_iv[0], 8);
else
- get_random_bytes(&q->q_ctx.pc_iv[0], 8);
+ bcopy(&ses->ses_iv[0], &q->q_ctx.pc_iv[0], 8);
m_copyback(q->q_src_m, enccrd->crd_inject, 8,
(caddr_t)&q->q_ctx.pc_iv);
@@ -547,73 +657,26 @@ ubsec_process(crp)
8, (caddr_t)&q->q_ctx.pc_iv[0]);
}
- if (enccrd->crd_alg == CRYPTO_DES_CBC) {
- /* Cheat: des == 3des with two of the keys the same */
- bcopy(enccrd->crd_key, &q->q_ctx.pc_deskey[0], 8);
- bcopy(enccrd->crd_key, &q->q_ctx.pc_deskey[2], 8);
- bcopy(enccrd->crd_key, &q->q_ctx.pc_deskey[4], 8);
- } else
- bcopy(enccrd->crd_key, &q->q_ctx.pc_deskey[0], 24);
-
+ q->q_ctx.pc_deskey[0] = ses->ses_deskey[0];
+ q->q_ctx.pc_deskey[1] = ses->ses_deskey[1];
+ q->q_ctx.pc_deskey[2] = ses->ses_deskey[2];
+ q->q_ctx.pc_deskey[3] = ses->ses_deskey[3];
+ q->q_ctx.pc_deskey[4] = ses->ses_deskey[4];
+ q->q_ctx.pc_deskey[5] = ses->ses_deskey[5];
SWAP32(q->q_ctx.pc_iv[0]);
SWAP32(q->q_ctx.pc_iv[1]);
- SWAP32(q->q_ctx.pc_deskey[0]);
- SWAP32(q->q_ctx.pc_deskey[1]);
- SWAP32(q->q_ctx.pc_deskey[2]);
- SWAP32(q->q_ctx.pc_deskey[3]);
- SWAP32(q->q_ctx.pc_deskey[4]);
- SWAP32(q->q_ctx.pc_deskey[5]);
}
if (maccrd) {
macoffset = maccrd->crd_skip;
-
- for (i = 0; i < maccrd->crd_klen / 8; i++)
- maccrd->crd_key[i] ^= HMAC_IPAD_VAL;
-
- if (maccrd->crd_alg == CRYPTO_MD5_HMAC96) {
+ if (maccrd->crd_alg == CRYPTO_MD5_HMAC96)
q->q_ctx.pc_flags |= UBS_PKTCTX_AUTH_MD5;
- MD5Init(&md5ctx);
- MD5Update(&md5ctx, maccrd->crd_key,
- maccrd->crd_klen / 8);
- MD5Update(&md5ctx, hmac_ipad_buffer,
- HMAC_BLOCK_LEN - (maccrd->crd_klen / 8));
- bcopy(md5ctx.state, q->q_ctx.pc_hminner,
- sizeof(md5ctx.state));
- } else {
+ else
q->q_ctx.pc_flags |= UBS_PKTCTX_AUTH_SHA1;
- SHA1Init(&sha1ctx);
- SHA1Update(&sha1ctx, maccrd->crd_key,
- maccrd->crd_klen / 8);
- SHA1Update(&sha1ctx, hmac_ipad_buffer,
- HMAC_BLOCK_LEN - (maccrd->crd_klen / 8));
- bcopy(sha1ctx.state, q->q_ctx.pc_hminner,
- sizeof(sha1ctx.state));
+ for (i = 0; i < 5; i++) {
+ q->q_ctx.pc_hminner[i] = ses->ses_hminner[i];
+ q->q_ctx.pc_hmouter[i] = ses->ses_hmouter[i];
}
-
- for (i = 0; i < maccrd->crd_klen / 8; i++)
- maccrd->crd_key[i] ^= (HMAC_IPAD_VAL ^ HMAC_OPAD_VAL);
-
- if (maccrd->crd_alg == CRYPTO_MD5_HMAC96) {
- MD5Init(&md5ctx);
- MD5Update(&md5ctx, maccrd->crd_key,
- maccrd->crd_klen / 8);
- MD5Update(&md5ctx, hmac_opad_buffer,
- HMAC_BLOCK_LEN - (maccrd->crd_klen / 8));
- bcopy(md5ctx.state, q->q_ctx.pc_hmouter,
- sizeof(md5ctx.state));
- } else {
- SHA1Init(&sha1ctx);
- SHA1Update(&sha1ctx, maccrd->crd_key,
- maccrd->crd_klen / 8);
- SHA1Update(&sha1ctx, hmac_opad_buffer,
- HMAC_BLOCK_LEN - (maccrd->crd_klen / 8));
- bcopy(sha1ctx.state, q->q_ctx.pc_hmouter,
- sizeof(sha1ctx.state));
- }
-
- for (i = 0; i < maccrd->crd_klen / 8; i++)
- maccrd->crd_key[i] ^= HMAC_OPAD_VAL;
}
if (enccrd && maccrd) {
@@ -852,6 +915,20 @@ ubsec_callback(q)
crp->crp_buf = (caddr_t)q->q_dst_m;
}
+ /* copy out IV for future use */
+ if ((q->q_ctx.pc_flags & (UBS_PKTCTX_ENC_3DES | UBS_PKTCTX_INBOUND)) ==
+ UBS_PKTCTX_ENC_3DES) {
+ for (crd = crp->crp_desc; crd; crd = crd->crd_next) {
+ if (crd->crd_alg != CRYPTO_DES_CBC &&
+ crd->crd_alg != CRYPTO_3DES_CBC)
+ continue;
+ m_copydata((struct mbuf *)crp->crp_buf,
+ crd->crd_skip + crd->crd_len - 8, 8,
+ (u_int8_t *)q->q_ses->ses_iv);
+ break;
+ }
+ }
+
for (crd = crp->crp_desc; crd; crd = crd->crd_next) {
if (crd->crd_alg != CRYPTO_MD5_HMAC96 &&
crd->crd_alg != CRYPTO_SHA1_HMAC96)