1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
|
/* $OpenBSD: ip_ah.h,v 1.12 1998/05/18 21:10:31 provos Exp $ */
/*
* The authors of this code are John Ioannidis (ji@tla.org),
* Angelos D. Keromytis (kermit@csd.uch.gr) and
* Niels Provos (provos@physnet.uni-hamburg.de).
*
* This code was written by John Ioannidis for BSD/OS in Athens, Greece,
* in November 1995.
*
* Ported to OpenBSD and NetBSD, with additional transforms, in December 1996,
* by Angelos D. Keromytis.
*
* Additional transforms and features in 1997 and 1998 by Angelos D. Keromytis
* and Niels Provos.
*
* Copyright (C) 1995, 1996, 1997, 1998 by John Ioannidis, Angelos D. Keromytis
* and Niels Provos.
*
* Permission to use, copy, and modify this software without fee
* is hereby granted, provided that this entire notice is included in
* all copies of any software which is or includes a copy or
* modification of this software.
* You may use this code under the GNU public license if you so wish. Please
* contribute changes back to the authors under this freer than GPL license
* so that we may further the use of strong encryption without limitations to
* all.
*
* THIS SOFTWARE IS BEING PROVIDED "AS IS", WITHOUT ANY EXPRESS OR
* IMPLIED WARRANTY. IN PARTICULAR, NONE OF THE AUTHORS MAKES ANY
* REPRESENTATION OR WARRANTY OF ANY KIND CONCERNING THE
* MERCHANTABILITY OF THIS SOFTWARE OR ITS FITNESS FOR ANY PARTICULAR
* PURPOSE.
*/
/*
* Authentication Header Processing
* Per RFC1826 (Atkinson, 1995)
*/
#include <sys/md5k.h>
#include <netinet/ip_sha1.h>
#include <netinet/ip_rmd160.h>
struct ah_hash {
int type;
char *name;
u_int16_t hashsize;
u_int16_t ctxsize;
void (*Init)(void *);
void (*Update)(void *, u_int8_t *, u_int16_t);
void (*Final)(u_int8_t *, void *);
};
struct ah_old
{
u_int8_t ah_nh; /* Next header (protocol) */
u_int8_t ah_hl; /* AH length, in 32-bit words */
u_int16_t ah_rv; /* reserved, must be 0 */
u_int32_t ah_spi; /* Security Parameters Index */
u_int8_t ah_data[1]; /* More, really */
};
#define AH_OLD_FLENGTH 8 /* size of fixed part */
/* Authenticator lengths */
#define AH_MD5_ALEN 16
#define AH_SHA1_ALEN 20
#define AH_RMD160_ALEN 20
#define AH_ALEN_MAX AH_SHA1_ALEN /* Keep this updated */
struct ahstat
{
u_int32_t ahs_hdrops; /* packet shorter than header shows */
u_int32_t ahs_notdb;
u_int32_t ahs_badkcr;
u_int32_t ahs_badauth;
u_int32_t ahs_noxform;
u_int32_t ahs_qfull;
u_int32_t ahs_wrap;
u_int32_t ahs_replay;
u_int32_t ahs_badauthl; /* bad authenticator length */
u_int32_t ahs_input; /* Input AH packets */
u_int32_t ahs_output; /* Output AH packets */
u_int32_t ahs_invalid; /* Trying to use an invalid TDB */
u_int64_t ahs_ibytes; /* input bytes */
u_int64_t ahs_obytes; /* output bytes */
};
#define AH_HMAC_HASHLEN 12 /* 96 bits of authenticator */
#define AH_HMAC_RPLENGTH 4 /* 32 bits of replay counter */
#define AH_HMAC_INITIAL_RPL 1 /* Replay counter initial value */
#define HMAC_IPAD_VAL 0x36
#define HMAC_OPAD_VAL 0x5C
#define HMAC_BLOCK_LEN 64
struct ah_new
{
u_int8_t ah_nh; /* Next header (protocol) */
u_int8_t ah_hl; /* AH length, in 32-bit words */
u_int16_t ah_rv; /* reserved, must be 0 */
u_int32_t ah_spi; /* Security Parameters Index */
u_int32_t ah_rpl; /* Replay prevention */
u_int8_t ah_data[AH_HMAC_HASHLEN];/* Authenticator */
};
#define AH_NEW_FLENGTH (sizeof(struct ah_new))
struct ah_new_xencap
{
u_int32_t amx_hash_algorithm;
int32_t amx_wnd;
u_int32_t amx_keylen;
u_int8_t amx_key[1];
};
#define AH_NEW_XENCAP_LEN (3 * sizeof(u_int32_t))
struct ah_new_xdata
{
u_int32_t amx_hash_algorithm;
int32_t amx_wnd;
u_int32_t amx_rpl; /* Replay counter */
u_int32_t amx_bitmap;
struct ah_hash *amx_hash;
union
{
MD5_CTX amx_MD5_ictx; /* Internal key+padding */
SHA1_CTX amx_SHA1_ictx;
RMD160_CTX amx_RMD160_ictx;
} amx_ictx;
union
{
MD5_CTX amx_MD5_octx; /* External key+padding */
SHA1_CTX amx_SHA1_octx;
RMD160_CTX amx_RMD160_octx;
} amx_octx;
};
#define amx_md5_ictx amx_ictx.amx_MD5_ictx
#define amx_md5_octx amx_octx.amx_MD5_octx
#define amx_sha1_ictx amx_ictx.amx_SHA1_ictx
#define amx_sha1_octx amx_octx.amx_SHA1_octx
#define amx_rmd160_ictx amx_ictx.amx_RMD160_ictx
#define amx_rmd160_octx amx_octx.amx_RMD160_octx
struct ah_old_xdata
{
u_int32_t amx_hash_algorithm;
u_int32_t amx_keylen; /* Key material length */
struct ah_hash *amx_hash;
union
{
MD5_CTX amx_MD5_ctx;
SHA1_CTX amx_SHA1_ctx;
} amx_ctx;
u_int8_t amx_key[1]; /* Key material */
};
#define amx_md5_ctx amx_ctx.amx_MD5_ctx
#define amx_sha1_ctx amx_ctx.amx_SHA1_ctx
struct ah_old_xencap
{
u_int32_t amx_hash_algorithm;
u_int32_t amx_keylen;
u_int8_t amx_key[1];
};
#define AH_OLD_XENCAP_LEN (2 * sizeof(u_int32_t))
#define AH_HMAC_IPAD_VAL 0x36
#define AH_HMAC_OPAD_VAL 0x5C
#ifdef _KERNEL
struct ahstat ahstat;
#endif
|