162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-only 262306a36Sopenharmony_ci#define pr_fmt(fmt) "IPsec: " fmt 362306a36Sopenharmony_ci 462306a36Sopenharmony_ci#include <crypto/aead.h> 562306a36Sopenharmony_ci#include <crypto/authenc.h> 662306a36Sopenharmony_ci#include <linux/err.h> 762306a36Sopenharmony_ci#include <linux/module.h> 862306a36Sopenharmony_ci#include <net/ip.h> 962306a36Sopenharmony_ci#include <net/xfrm.h> 1062306a36Sopenharmony_ci#include <net/esp.h> 1162306a36Sopenharmony_ci#include <linux/scatterlist.h> 1262306a36Sopenharmony_ci#include <linux/kernel.h> 1362306a36Sopenharmony_ci#include <linux/pfkeyv2.h> 1462306a36Sopenharmony_ci#include <linux/rtnetlink.h> 1562306a36Sopenharmony_ci#include <linux/slab.h> 1662306a36Sopenharmony_ci#include <linux/spinlock.h> 1762306a36Sopenharmony_ci#include <linux/in6.h> 1862306a36Sopenharmony_ci#include <net/icmp.h> 1962306a36Sopenharmony_ci#include <net/protocol.h> 2062306a36Sopenharmony_ci#include <net/udp.h> 2162306a36Sopenharmony_ci#include <net/tcp.h> 2262306a36Sopenharmony_ci#include <net/espintcp.h> 2362306a36Sopenharmony_ci 2462306a36Sopenharmony_ci#include <linux/highmem.h> 2562306a36Sopenharmony_ci 2662306a36Sopenharmony_cistruct esp_skb_cb { 2762306a36Sopenharmony_ci struct xfrm_skb_cb xfrm; 2862306a36Sopenharmony_ci void *tmp; 2962306a36Sopenharmony_ci}; 3062306a36Sopenharmony_ci 3162306a36Sopenharmony_cistruct esp_output_extra { 3262306a36Sopenharmony_ci __be32 seqhi; 3362306a36Sopenharmony_ci u32 esphoff; 3462306a36Sopenharmony_ci}; 3562306a36Sopenharmony_ci 3662306a36Sopenharmony_ci#define ESP_SKB_CB(__skb) ((struct esp_skb_cb *)&((__skb)->cb[0])) 3762306a36Sopenharmony_ci 3862306a36Sopenharmony_ci/* 3962306a36Sopenharmony_ci * Allocate an AEAD request structure with extra space for SG and IV. 4062306a36Sopenharmony_ci * 4162306a36Sopenharmony_ci * For alignment considerations the IV is placed at the front, followed 4262306a36Sopenharmony_ci * by the request and finally the SG list. 4362306a36Sopenharmony_ci * 4462306a36Sopenharmony_ci * TODO: Use spare space in skb for this where possible. 4562306a36Sopenharmony_ci */ 4662306a36Sopenharmony_cistatic void *esp_alloc_tmp(struct crypto_aead *aead, int nfrags, int extralen) 4762306a36Sopenharmony_ci{ 4862306a36Sopenharmony_ci unsigned int len; 4962306a36Sopenharmony_ci 5062306a36Sopenharmony_ci len = extralen; 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_ci len += crypto_aead_ivsize(aead); 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_ci if (len) { 5562306a36Sopenharmony_ci len += crypto_aead_alignmask(aead) & 5662306a36Sopenharmony_ci ~(crypto_tfm_ctx_alignment() - 1); 5762306a36Sopenharmony_ci len = ALIGN(len, crypto_tfm_ctx_alignment()); 5862306a36Sopenharmony_ci } 5962306a36Sopenharmony_ci 6062306a36Sopenharmony_ci len += sizeof(struct aead_request) + crypto_aead_reqsize(aead); 6162306a36Sopenharmony_ci len = ALIGN(len, __alignof__(struct scatterlist)); 6262306a36Sopenharmony_ci 6362306a36Sopenharmony_ci len += sizeof(struct scatterlist) * nfrags; 6462306a36Sopenharmony_ci 6562306a36Sopenharmony_ci return kmalloc(len, GFP_ATOMIC); 6662306a36Sopenharmony_ci} 6762306a36Sopenharmony_ci 6862306a36Sopenharmony_cistatic inline void *esp_tmp_extra(void *tmp) 6962306a36Sopenharmony_ci{ 7062306a36Sopenharmony_ci return PTR_ALIGN(tmp, __alignof__(struct esp_output_extra)); 7162306a36Sopenharmony_ci} 7262306a36Sopenharmony_ci 7362306a36Sopenharmony_cistatic inline u8 *esp_tmp_iv(struct crypto_aead *aead, void *tmp, int extralen) 7462306a36Sopenharmony_ci{ 7562306a36Sopenharmony_ci return crypto_aead_ivsize(aead) ? 7662306a36Sopenharmony_ci PTR_ALIGN((u8 *)tmp + extralen, 7762306a36Sopenharmony_ci crypto_aead_alignmask(aead) + 1) : tmp + extralen; 7862306a36Sopenharmony_ci} 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_cistatic inline struct aead_request *esp_tmp_req(struct crypto_aead *aead, u8 *iv) 8162306a36Sopenharmony_ci{ 8262306a36Sopenharmony_ci struct aead_request *req; 8362306a36Sopenharmony_ci 8462306a36Sopenharmony_ci req = (void *)PTR_ALIGN(iv + crypto_aead_ivsize(aead), 8562306a36Sopenharmony_ci crypto_tfm_ctx_alignment()); 8662306a36Sopenharmony_ci aead_request_set_tfm(req, aead); 8762306a36Sopenharmony_ci return req; 8862306a36Sopenharmony_ci} 8962306a36Sopenharmony_ci 9062306a36Sopenharmony_cistatic inline struct scatterlist *esp_req_sg(struct crypto_aead *aead, 9162306a36Sopenharmony_ci struct aead_request *req) 9262306a36Sopenharmony_ci{ 9362306a36Sopenharmony_ci return (void *)ALIGN((unsigned long)(req + 1) + 9462306a36Sopenharmony_ci crypto_aead_reqsize(aead), 9562306a36Sopenharmony_ci __alignof__(struct scatterlist)); 9662306a36Sopenharmony_ci} 9762306a36Sopenharmony_ci 9862306a36Sopenharmony_cistatic void esp_ssg_unref(struct xfrm_state *x, void *tmp) 9962306a36Sopenharmony_ci{ 10062306a36Sopenharmony_ci struct crypto_aead *aead = x->data; 10162306a36Sopenharmony_ci int extralen = 0; 10262306a36Sopenharmony_ci u8 *iv; 10362306a36Sopenharmony_ci struct aead_request *req; 10462306a36Sopenharmony_ci struct scatterlist *sg; 10562306a36Sopenharmony_ci 10662306a36Sopenharmony_ci if (x->props.flags & XFRM_STATE_ESN) 10762306a36Sopenharmony_ci extralen += sizeof(struct esp_output_extra); 10862306a36Sopenharmony_ci 10962306a36Sopenharmony_ci iv = esp_tmp_iv(aead, tmp, extralen); 11062306a36Sopenharmony_ci req = esp_tmp_req(aead, iv); 11162306a36Sopenharmony_ci 11262306a36Sopenharmony_ci /* Unref skb_frag_pages in the src scatterlist if necessary. 11362306a36Sopenharmony_ci * Skip the first sg which comes from skb->data. 11462306a36Sopenharmony_ci */ 11562306a36Sopenharmony_ci if (req->src != req->dst) 11662306a36Sopenharmony_ci for (sg = sg_next(req->src); sg; sg = sg_next(sg)) 11762306a36Sopenharmony_ci put_page(sg_page(sg)); 11862306a36Sopenharmony_ci} 11962306a36Sopenharmony_ci 12062306a36Sopenharmony_ci#ifdef CONFIG_INET_ESPINTCP 12162306a36Sopenharmony_cistruct esp_tcp_sk { 12262306a36Sopenharmony_ci struct sock *sk; 12362306a36Sopenharmony_ci struct rcu_head rcu; 12462306a36Sopenharmony_ci}; 12562306a36Sopenharmony_ci 12662306a36Sopenharmony_cistatic void esp_free_tcp_sk(struct rcu_head *head) 12762306a36Sopenharmony_ci{ 12862306a36Sopenharmony_ci struct esp_tcp_sk *esk = container_of(head, struct esp_tcp_sk, rcu); 12962306a36Sopenharmony_ci 13062306a36Sopenharmony_ci sock_put(esk->sk); 13162306a36Sopenharmony_ci kfree(esk); 13262306a36Sopenharmony_ci} 13362306a36Sopenharmony_ci 13462306a36Sopenharmony_cistatic struct sock *esp_find_tcp_sk(struct xfrm_state *x) 13562306a36Sopenharmony_ci{ 13662306a36Sopenharmony_ci struct xfrm_encap_tmpl *encap = x->encap; 13762306a36Sopenharmony_ci struct net *net = xs_net(x); 13862306a36Sopenharmony_ci struct esp_tcp_sk *esk; 13962306a36Sopenharmony_ci __be16 sport, dport; 14062306a36Sopenharmony_ci struct sock *nsk; 14162306a36Sopenharmony_ci struct sock *sk; 14262306a36Sopenharmony_ci 14362306a36Sopenharmony_ci sk = rcu_dereference(x->encap_sk); 14462306a36Sopenharmony_ci if (sk && sk->sk_state == TCP_ESTABLISHED) 14562306a36Sopenharmony_ci return sk; 14662306a36Sopenharmony_ci 14762306a36Sopenharmony_ci spin_lock_bh(&x->lock); 14862306a36Sopenharmony_ci sport = encap->encap_sport; 14962306a36Sopenharmony_ci dport = encap->encap_dport; 15062306a36Sopenharmony_ci nsk = rcu_dereference_protected(x->encap_sk, 15162306a36Sopenharmony_ci lockdep_is_held(&x->lock)); 15262306a36Sopenharmony_ci if (sk && sk == nsk) { 15362306a36Sopenharmony_ci esk = kmalloc(sizeof(*esk), GFP_ATOMIC); 15462306a36Sopenharmony_ci if (!esk) { 15562306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 15662306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 15762306a36Sopenharmony_ci } 15862306a36Sopenharmony_ci RCU_INIT_POINTER(x->encap_sk, NULL); 15962306a36Sopenharmony_ci esk->sk = sk; 16062306a36Sopenharmony_ci call_rcu(&esk->rcu, esp_free_tcp_sk); 16162306a36Sopenharmony_ci } 16262306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 16362306a36Sopenharmony_ci 16462306a36Sopenharmony_ci sk = inet_lookup_established(net, net->ipv4.tcp_death_row.hashinfo, x->id.daddr.a4, 16562306a36Sopenharmony_ci dport, x->props.saddr.a4, sport, 0); 16662306a36Sopenharmony_ci if (!sk) 16762306a36Sopenharmony_ci return ERR_PTR(-ENOENT); 16862306a36Sopenharmony_ci 16962306a36Sopenharmony_ci if (!tcp_is_ulp_esp(sk)) { 17062306a36Sopenharmony_ci sock_put(sk); 17162306a36Sopenharmony_ci return ERR_PTR(-EINVAL); 17262306a36Sopenharmony_ci } 17362306a36Sopenharmony_ci 17462306a36Sopenharmony_ci spin_lock_bh(&x->lock); 17562306a36Sopenharmony_ci nsk = rcu_dereference_protected(x->encap_sk, 17662306a36Sopenharmony_ci lockdep_is_held(&x->lock)); 17762306a36Sopenharmony_ci if (encap->encap_sport != sport || 17862306a36Sopenharmony_ci encap->encap_dport != dport) { 17962306a36Sopenharmony_ci sock_put(sk); 18062306a36Sopenharmony_ci sk = nsk ?: ERR_PTR(-EREMCHG); 18162306a36Sopenharmony_ci } else if (sk == nsk) { 18262306a36Sopenharmony_ci sock_put(sk); 18362306a36Sopenharmony_ci } else { 18462306a36Sopenharmony_ci rcu_assign_pointer(x->encap_sk, sk); 18562306a36Sopenharmony_ci } 18662306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 18762306a36Sopenharmony_ci 18862306a36Sopenharmony_ci return sk; 18962306a36Sopenharmony_ci} 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_cistatic int esp_output_tcp_finish(struct xfrm_state *x, struct sk_buff *skb) 19262306a36Sopenharmony_ci{ 19362306a36Sopenharmony_ci struct sock *sk; 19462306a36Sopenharmony_ci int err; 19562306a36Sopenharmony_ci 19662306a36Sopenharmony_ci rcu_read_lock(); 19762306a36Sopenharmony_ci 19862306a36Sopenharmony_ci sk = esp_find_tcp_sk(x); 19962306a36Sopenharmony_ci err = PTR_ERR_OR_ZERO(sk); 20062306a36Sopenharmony_ci if (err) 20162306a36Sopenharmony_ci goto out; 20262306a36Sopenharmony_ci 20362306a36Sopenharmony_ci bh_lock_sock(sk); 20462306a36Sopenharmony_ci if (sock_owned_by_user(sk)) 20562306a36Sopenharmony_ci err = espintcp_queue_out(sk, skb); 20662306a36Sopenharmony_ci else 20762306a36Sopenharmony_ci err = espintcp_push_skb(sk, skb); 20862306a36Sopenharmony_ci bh_unlock_sock(sk); 20962306a36Sopenharmony_ci 21062306a36Sopenharmony_ciout: 21162306a36Sopenharmony_ci rcu_read_unlock(); 21262306a36Sopenharmony_ci return err; 21362306a36Sopenharmony_ci} 21462306a36Sopenharmony_ci 21562306a36Sopenharmony_cistatic int esp_output_tcp_encap_cb(struct net *net, struct sock *sk, 21662306a36Sopenharmony_ci struct sk_buff *skb) 21762306a36Sopenharmony_ci{ 21862306a36Sopenharmony_ci struct dst_entry *dst = skb_dst(skb); 21962306a36Sopenharmony_ci struct xfrm_state *x = dst->xfrm; 22062306a36Sopenharmony_ci 22162306a36Sopenharmony_ci return esp_output_tcp_finish(x, skb); 22262306a36Sopenharmony_ci} 22362306a36Sopenharmony_ci 22462306a36Sopenharmony_cistatic int esp_output_tail_tcp(struct xfrm_state *x, struct sk_buff *skb) 22562306a36Sopenharmony_ci{ 22662306a36Sopenharmony_ci int err; 22762306a36Sopenharmony_ci 22862306a36Sopenharmony_ci local_bh_disable(); 22962306a36Sopenharmony_ci err = xfrm_trans_queue_net(xs_net(x), skb, esp_output_tcp_encap_cb); 23062306a36Sopenharmony_ci local_bh_enable(); 23162306a36Sopenharmony_ci 23262306a36Sopenharmony_ci /* EINPROGRESS just happens to do the right thing. It 23362306a36Sopenharmony_ci * actually means that the skb has been consumed and 23462306a36Sopenharmony_ci * isn't coming back. 23562306a36Sopenharmony_ci */ 23662306a36Sopenharmony_ci return err ?: -EINPROGRESS; 23762306a36Sopenharmony_ci} 23862306a36Sopenharmony_ci#else 23962306a36Sopenharmony_cistatic int esp_output_tail_tcp(struct xfrm_state *x, struct sk_buff *skb) 24062306a36Sopenharmony_ci{ 24162306a36Sopenharmony_ci kfree_skb(skb); 24262306a36Sopenharmony_ci 24362306a36Sopenharmony_ci return -EOPNOTSUPP; 24462306a36Sopenharmony_ci} 24562306a36Sopenharmony_ci#endif 24662306a36Sopenharmony_ci 24762306a36Sopenharmony_cistatic void esp_output_done(void *data, int err) 24862306a36Sopenharmony_ci{ 24962306a36Sopenharmony_ci struct sk_buff *skb = data; 25062306a36Sopenharmony_ci struct xfrm_offload *xo = xfrm_offload(skb); 25162306a36Sopenharmony_ci void *tmp; 25262306a36Sopenharmony_ci struct xfrm_state *x; 25362306a36Sopenharmony_ci 25462306a36Sopenharmony_ci if (xo && (xo->flags & XFRM_DEV_RESUME)) { 25562306a36Sopenharmony_ci struct sec_path *sp = skb_sec_path(skb); 25662306a36Sopenharmony_ci 25762306a36Sopenharmony_ci x = sp->xvec[sp->len - 1]; 25862306a36Sopenharmony_ci } else { 25962306a36Sopenharmony_ci x = skb_dst(skb)->xfrm; 26062306a36Sopenharmony_ci } 26162306a36Sopenharmony_ci 26262306a36Sopenharmony_ci tmp = ESP_SKB_CB(skb)->tmp; 26362306a36Sopenharmony_ci esp_ssg_unref(x, tmp); 26462306a36Sopenharmony_ci kfree(tmp); 26562306a36Sopenharmony_ci 26662306a36Sopenharmony_ci if (xo && (xo->flags & XFRM_DEV_RESUME)) { 26762306a36Sopenharmony_ci if (err) { 26862306a36Sopenharmony_ci XFRM_INC_STATS(xs_net(x), LINUX_MIB_XFRMOUTSTATEPROTOERROR); 26962306a36Sopenharmony_ci kfree_skb(skb); 27062306a36Sopenharmony_ci return; 27162306a36Sopenharmony_ci } 27262306a36Sopenharmony_ci 27362306a36Sopenharmony_ci skb_push(skb, skb->data - skb_mac_header(skb)); 27462306a36Sopenharmony_ci secpath_reset(skb); 27562306a36Sopenharmony_ci xfrm_dev_resume(skb); 27662306a36Sopenharmony_ci } else { 27762306a36Sopenharmony_ci if (!err && 27862306a36Sopenharmony_ci x->encap && x->encap->encap_type == TCP_ENCAP_ESPINTCP) 27962306a36Sopenharmony_ci esp_output_tail_tcp(x, skb); 28062306a36Sopenharmony_ci else 28162306a36Sopenharmony_ci xfrm_output_resume(skb->sk, skb, err); 28262306a36Sopenharmony_ci } 28362306a36Sopenharmony_ci} 28462306a36Sopenharmony_ci 28562306a36Sopenharmony_ci/* Move ESP header back into place. */ 28662306a36Sopenharmony_cistatic void esp_restore_header(struct sk_buff *skb, unsigned int offset) 28762306a36Sopenharmony_ci{ 28862306a36Sopenharmony_ci struct ip_esp_hdr *esph = (void *)(skb->data + offset); 28962306a36Sopenharmony_ci void *tmp = ESP_SKB_CB(skb)->tmp; 29062306a36Sopenharmony_ci __be32 *seqhi = esp_tmp_extra(tmp); 29162306a36Sopenharmony_ci 29262306a36Sopenharmony_ci esph->seq_no = esph->spi; 29362306a36Sopenharmony_ci esph->spi = *seqhi; 29462306a36Sopenharmony_ci} 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_cistatic void esp_output_restore_header(struct sk_buff *skb) 29762306a36Sopenharmony_ci{ 29862306a36Sopenharmony_ci void *tmp = ESP_SKB_CB(skb)->tmp; 29962306a36Sopenharmony_ci struct esp_output_extra *extra = esp_tmp_extra(tmp); 30062306a36Sopenharmony_ci 30162306a36Sopenharmony_ci esp_restore_header(skb, skb_transport_offset(skb) + extra->esphoff - 30262306a36Sopenharmony_ci sizeof(__be32)); 30362306a36Sopenharmony_ci} 30462306a36Sopenharmony_ci 30562306a36Sopenharmony_cistatic struct ip_esp_hdr *esp_output_set_extra(struct sk_buff *skb, 30662306a36Sopenharmony_ci struct xfrm_state *x, 30762306a36Sopenharmony_ci struct ip_esp_hdr *esph, 30862306a36Sopenharmony_ci struct esp_output_extra *extra) 30962306a36Sopenharmony_ci{ 31062306a36Sopenharmony_ci /* For ESN we move the header forward by 4 bytes to 31162306a36Sopenharmony_ci * accommodate the high bits. We will move it back after 31262306a36Sopenharmony_ci * encryption. 31362306a36Sopenharmony_ci */ 31462306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) { 31562306a36Sopenharmony_ci __u32 seqhi; 31662306a36Sopenharmony_ci struct xfrm_offload *xo = xfrm_offload(skb); 31762306a36Sopenharmony_ci 31862306a36Sopenharmony_ci if (xo) 31962306a36Sopenharmony_ci seqhi = xo->seq.hi; 32062306a36Sopenharmony_ci else 32162306a36Sopenharmony_ci seqhi = XFRM_SKB_CB(skb)->seq.output.hi; 32262306a36Sopenharmony_ci 32362306a36Sopenharmony_ci extra->esphoff = (unsigned char *)esph - 32462306a36Sopenharmony_ci skb_transport_header(skb); 32562306a36Sopenharmony_ci esph = (struct ip_esp_hdr *)((unsigned char *)esph - 4); 32662306a36Sopenharmony_ci extra->seqhi = esph->spi; 32762306a36Sopenharmony_ci esph->seq_no = htonl(seqhi); 32862306a36Sopenharmony_ci } 32962306a36Sopenharmony_ci 33062306a36Sopenharmony_ci esph->spi = x->id.spi; 33162306a36Sopenharmony_ci 33262306a36Sopenharmony_ci return esph; 33362306a36Sopenharmony_ci} 33462306a36Sopenharmony_ci 33562306a36Sopenharmony_cistatic void esp_output_done_esn(void *data, int err) 33662306a36Sopenharmony_ci{ 33762306a36Sopenharmony_ci struct sk_buff *skb = data; 33862306a36Sopenharmony_ci 33962306a36Sopenharmony_ci esp_output_restore_header(skb); 34062306a36Sopenharmony_ci esp_output_done(data, err); 34162306a36Sopenharmony_ci} 34262306a36Sopenharmony_ci 34362306a36Sopenharmony_cistatic struct ip_esp_hdr *esp_output_udp_encap(struct sk_buff *skb, 34462306a36Sopenharmony_ci int encap_type, 34562306a36Sopenharmony_ci struct esp_info *esp, 34662306a36Sopenharmony_ci __be16 sport, 34762306a36Sopenharmony_ci __be16 dport) 34862306a36Sopenharmony_ci{ 34962306a36Sopenharmony_ci struct udphdr *uh; 35062306a36Sopenharmony_ci __be32 *udpdata32; 35162306a36Sopenharmony_ci unsigned int len; 35262306a36Sopenharmony_ci 35362306a36Sopenharmony_ci len = skb->len + esp->tailen - skb_transport_offset(skb); 35462306a36Sopenharmony_ci if (len + sizeof(struct iphdr) > IP_MAX_MTU) 35562306a36Sopenharmony_ci return ERR_PTR(-EMSGSIZE); 35662306a36Sopenharmony_ci 35762306a36Sopenharmony_ci uh = (struct udphdr *)esp->esph; 35862306a36Sopenharmony_ci uh->source = sport; 35962306a36Sopenharmony_ci uh->dest = dport; 36062306a36Sopenharmony_ci uh->len = htons(len); 36162306a36Sopenharmony_ci uh->check = 0; 36262306a36Sopenharmony_ci 36362306a36Sopenharmony_ci *skb_mac_header(skb) = IPPROTO_UDP; 36462306a36Sopenharmony_ci 36562306a36Sopenharmony_ci if (encap_type == UDP_ENCAP_ESPINUDP_NON_IKE) { 36662306a36Sopenharmony_ci udpdata32 = (__be32 *)(uh + 1); 36762306a36Sopenharmony_ci udpdata32[0] = udpdata32[1] = 0; 36862306a36Sopenharmony_ci return (struct ip_esp_hdr *)(udpdata32 + 2); 36962306a36Sopenharmony_ci } 37062306a36Sopenharmony_ci 37162306a36Sopenharmony_ci return (struct ip_esp_hdr *)(uh + 1); 37262306a36Sopenharmony_ci} 37362306a36Sopenharmony_ci 37462306a36Sopenharmony_ci#ifdef CONFIG_INET_ESPINTCP 37562306a36Sopenharmony_cistatic struct ip_esp_hdr *esp_output_tcp_encap(struct xfrm_state *x, 37662306a36Sopenharmony_ci struct sk_buff *skb, 37762306a36Sopenharmony_ci struct esp_info *esp) 37862306a36Sopenharmony_ci{ 37962306a36Sopenharmony_ci __be16 *lenp = (void *)esp->esph; 38062306a36Sopenharmony_ci struct ip_esp_hdr *esph; 38162306a36Sopenharmony_ci unsigned int len; 38262306a36Sopenharmony_ci struct sock *sk; 38362306a36Sopenharmony_ci 38462306a36Sopenharmony_ci len = skb->len + esp->tailen - skb_transport_offset(skb); 38562306a36Sopenharmony_ci if (len > IP_MAX_MTU) 38662306a36Sopenharmony_ci return ERR_PTR(-EMSGSIZE); 38762306a36Sopenharmony_ci 38862306a36Sopenharmony_ci rcu_read_lock(); 38962306a36Sopenharmony_ci sk = esp_find_tcp_sk(x); 39062306a36Sopenharmony_ci rcu_read_unlock(); 39162306a36Sopenharmony_ci 39262306a36Sopenharmony_ci if (IS_ERR(sk)) 39362306a36Sopenharmony_ci return ERR_CAST(sk); 39462306a36Sopenharmony_ci 39562306a36Sopenharmony_ci *lenp = htons(len); 39662306a36Sopenharmony_ci esph = (struct ip_esp_hdr *)(lenp + 1); 39762306a36Sopenharmony_ci 39862306a36Sopenharmony_ci return esph; 39962306a36Sopenharmony_ci} 40062306a36Sopenharmony_ci#else 40162306a36Sopenharmony_cistatic struct ip_esp_hdr *esp_output_tcp_encap(struct xfrm_state *x, 40262306a36Sopenharmony_ci struct sk_buff *skb, 40362306a36Sopenharmony_ci struct esp_info *esp) 40462306a36Sopenharmony_ci{ 40562306a36Sopenharmony_ci return ERR_PTR(-EOPNOTSUPP); 40662306a36Sopenharmony_ci} 40762306a36Sopenharmony_ci#endif 40862306a36Sopenharmony_ci 40962306a36Sopenharmony_cistatic int esp_output_encap(struct xfrm_state *x, struct sk_buff *skb, 41062306a36Sopenharmony_ci struct esp_info *esp) 41162306a36Sopenharmony_ci{ 41262306a36Sopenharmony_ci struct xfrm_encap_tmpl *encap = x->encap; 41362306a36Sopenharmony_ci struct ip_esp_hdr *esph; 41462306a36Sopenharmony_ci __be16 sport, dport; 41562306a36Sopenharmony_ci int encap_type; 41662306a36Sopenharmony_ci 41762306a36Sopenharmony_ci spin_lock_bh(&x->lock); 41862306a36Sopenharmony_ci sport = encap->encap_sport; 41962306a36Sopenharmony_ci dport = encap->encap_dport; 42062306a36Sopenharmony_ci encap_type = encap->encap_type; 42162306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 42262306a36Sopenharmony_ci 42362306a36Sopenharmony_ci switch (encap_type) { 42462306a36Sopenharmony_ci default: 42562306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP: 42662306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP_NON_IKE: 42762306a36Sopenharmony_ci esph = esp_output_udp_encap(skb, encap_type, esp, sport, dport); 42862306a36Sopenharmony_ci break; 42962306a36Sopenharmony_ci case TCP_ENCAP_ESPINTCP: 43062306a36Sopenharmony_ci esph = esp_output_tcp_encap(x, skb, esp); 43162306a36Sopenharmony_ci break; 43262306a36Sopenharmony_ci } 43362306a36Sopenharmony_ci 43462306a36Sopenharmony_ci if (IS_ERR(esph)) 43562306a36Sopenharmony_ci return PTR_ERR(esph); 43662306a36Sopenharmony_ci 43762306a36Sopenharmony_ci esp->esph = esph; 43862306a36Sopenharmony_ci 43962306a36Sopenharmony_ci return 0; 44062306a36Sopenharmony_ci} 44162306a36Sopenharmony_ci 44262306a36Sopenharmony_ciint esp_output_head(struct xfrm_state *x, struct sk_buff *skb, struct esp_info *esp) 44362306a36Sopenharmony_ci{ 44462306a36Sopenharmony_ci u8 *tail; 44562306a36Sopenharmony_ci int nfrags; 44662306a36Sopenharmony_ci int esph_offset; 44762306a36Sopenharmony_ci struct page *page; 44862306a36Sopenharmony_ci struct sk_buff *trailer; 44962306a36Sopenharmony_ci int tailen = esp->tailen; 45062306a36Sopenharmony_ci 45162306a36Sopenharmony_ci /* this is non-NULL only with TCP/UDP Encapsulation */ 45262306a36Sopenharmony_ci if (x->encap) { 45362306a36Sopenharmony_ci int err = esp_output_encap(x, skb, esp); 45462306a36Sopenharmony_ci 45562306a36Sopenharmony_ci if (err < 0) 45662306a36Sopenharmony_ci return err; 45762306a36Sopenharmony_ci } 45862306a36Sopenharmony_ci 45962306a36Sopenharmony_ci if (ALIGN(tailen, L1_CACHE_BYTES) > PAGE_SIZE || 46062306a36Sopenharmony_ci ALIGN(skb->data_len, L1_CACHE_BYTES) > PAGE_SIZE) 46162306a36Sopenharmony_ci goto cow; 46262306a36Sopenharmony_ci 46362306a36Sopenharmony_ci if (!skb_cloned(skb)) { 46462306a36Sopenharmony_ci if (tailen <= skb_tailroom(skb)) { 46562306a36Sopenharmony_ci nfrags = 1; 46662306a36Sopenharmony_ci trailer = skb; 46762306a36Sopenharmony_ci tail = skb_tail_pointer(trailer); 46862306a36Sopenharmony_ci 46962306a36Sopenharmony_ci goto skip_cow; 47062306a36Sopenharmony_ci } else if ((skb_shinfo(skb)->nr_frags < MAX_SKB_FRAGS) 47162306a36Sopenharmony_ci && !skb_has_frag_list(skb)) { 47262306a36Sopenharmony_ci int allocsize; 47362306a36Sopenharmony_ci struct sock *sk = skb->sk; 47462306a36Sopenharmony_ci struct page_frag *pfrag = &x->xfrag; 47562306a36Sopenharmony_ci 47662306a36Sopenharmony_ci esp->inplace = false; 47762306a36Sopenharmony_ci 47862306a36Sopenharmony_ci allocsize = ALIGN(tailen, L1_CACHE_BYTES); 47962306a36Sopenharmony_ci 48062306a36Sopenharmony_ci spin_lock_bh(&x->lock); 48162306a36Sopenharmony_ci 48262306a36Sopenharmony_ci if (unlikely(!skb_page_frag_refill(allocsize, pfrag, GFP_ATOMIC))) { 48362306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 48462306a36Sopenharmony_ci goto cow; 48562306a36Sopenharmony_ci } 48662306a36Sopenharmony_ci 48762306a36Sopenharmony_ci page = pfrag->page; 48862306a36Sopenharmony_ci get_page(page); 48962306a36Sopenharmony_ci 49062306a36Sopenharmony_ci tail = page_address(page) + pfrag->offset; 49162306a36Sopenharmony_ci 49262306a36Sopenharmony_ci esp_output_fill_trailer(tail, esp->tfclen, esp->plen, esp->proto); 49362306a36Sopenharmony_ci 49462306a36Sopenharmony_ci nfrags = skb_shinfo(skb)->nr_frags; 49562306a36Sopenharmony_ci 49662306a36Sopenharmony_ci __skb_fill_page_desc(skb, nfrags, page, pfrag->offset, 49762306a36Sopenharmony_ci tailen); 49862306a36Sopenharmony_ci skb_shinfo(skb)->nr_frags = ++nfrags; 49962306a36Sopenharmony_ci 50062306a36Sopenharmony_ci pfrag->offset = pfrag->offset + allocsize; 50162306a36Sopenharmony_ci 50262306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 50362306a36Sopenharmony_ci 50462306a36Sopenharmony_ci nfrags++; 50562306a36Sopenharmony_ci 50662306a36Sopenharmony_ci skb_len_add(skb, tailen); 50762306a36Sopenharmony_ci if (sk && sk_fullsock(sk)) 50862306a36Sopenharmony_ci refcount_add(tailen, &sk->sk_wmem_alloc); 50962306a36Sopenharmony_ci 51062306a36Sopenharmony_ci goto out; 51162306a36Sopenharmony_ci } 51262306a36Sopenharmony_ci } 51362306a36Sopenharmony_ci 51462306a36Sopenharmony_cicow: 51562306a36Sopenharmony_ci esph_offset = (unsigned char *)esp->esph - skb_transport_header(skb); 51662306a36Sopenharmony_ci 51762306a36Sopenharmony_ci nfrags = skb_cow_data(skb, tailen, &trailer); 51862306a36Sopenharmony_ci if (nfrags < 0) 51962306a36Sopenharmony_ci goto out; 52062306a36Sopenharmony_ci tail = skb_tail_pointer(trailer); 52162306a36Sopenharmony_ci esp->esph = (struct ip_esp_hdr *)(skb_transport_header(skb) + esph_offset); 52262306a36Sopenharmony_ci 52362306a36Sopenharmony_ciskip_cow: 52462306a36Sopenharmony_ci esp_output_fill_trailer(tail, esp->tfclen, esp->plen, esp->proto); 52562306a36Sopenharmony_ci pskb_put(skb, trailer, tailen); 52662306a36Sopenharmony_ci 52762306a36Sopenharmony_ciout: 52862306a36Sopenharmony_ci return nfrags; 52962306a36Sopenharmony_ci} 53062306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(esp_output_head); 53162306a36Sopenharmony_ci 53262306a36Sopenharmony_ciint esp_output_tail(struct xfrm_state *x, struct sk_buff *skb, struct esp_info *esp) 53362306a36Sopenharmony_ci{ 53462306a36Sopenharmony_ci u8 *iv; 53562306a36Sopenharmony_ci int alen; 53662306a36Sopenharmony_ci void *tmp; 53762306a36Sopenharmony_ci int ivlen; 53862306a36Sopenharmony_ci int assoclen; 53962306a36Sopenharmony_ci int extralen; 54062306a36Sopenharmony_ci struct page *page; 54162306a36Sopenharmony_ci struct ip_esp_hdr *esph; 54262306a36Sopenharmony_ci struct crypto_aead *aead; 54362306a36Sopenharmony_ci struct aead_request *req; 54462306a36Sopenharmony_ci struct scatterlist *sg, *dsg; 54562306a36Sopenharmony_ci struct esp_output_extra *extra; 54662306a36Sopenharmony_ci int err = -ENOMEM; 54762306a36Sopenharmony_ci 54862306a36Sopenharmony_ci assoclen = sizeof(struct ip_esp_hdr); 54962306a36Sopenharmony_ci extralen = 0; 55062306a36Sopenharmony_ci 55162306a36Sopenharmony_ci if (x->props.flags & XFRM_STATE_ESN) { 55262306a36Sopenharmony_ci extralen += sizeof(*extra); 55362306a36Sopenharmony_ci assoclen += sizeof(__be32); 55462306a36Sopenharmony_ci } 55562306a36Sopenharmony_ci 55662306a36Sopenharmony_ci aead = x->data; 55762306a36Sopenharmony_ci alen = crypto_aead_authsize(aead); 55862306a36Sopenharmony_ci ivlen = crypto_aead_ivsize(aead); 55962306a36Sopenharmony_ci 56062306a36Sopenharmony_ci tmp = esp_alloc_tmp(aead, esp->nfrags + 2, extralen); 56162306a36Sopenharmony_ci if (!tmp) 56262306a36Sopenharmony_ci goto error; 56362306a36Sopenharmony_ci 56462306a36Sopenharmony_ci extra = esp_tmp_extra(tmp); 56562306a36Sopenharmony_ci iv = esp_tmp_iv(aead, tmp, extralen); 56662306a36Sopenharmony_ci req = esp_tmp_req(aead, iv); 56762306a36Sopenharmony_ci sg = esp_req_sg(aead, req); 56862306a36Sopenharmony_ci 56962306a36Sopenharmony_ci if (esp->inplace) 57062306a36Sopenharmony_ci dsg = sg; 57162306a36Sopenharmony_ci else 57262306a36Sopenharmony_ci dsg = &sg[esp->nfrags]; 57362306a36Sopenharmony_ci 57462306a36Sopenharmony_ci esph = esp_output_set_extra(skb, x, esp->esph, extra); 57562306a36Sopenharmony_ci esp->esph = esph; 57662306a36Sopenharmony_ci 57762306a36Sopenharmony_ci sg_init_table(sg, esp->nfrags); 57862306a36Sopenharmony_ci err = skb_to_sgvec(skb, sg, 57962306a36Sopenharmony_ci (unsigned char *)esph - skb->data, 58062306a36Sopenharmony_ci assoclen + ivlen + esp->clen + alen); 58162306a36Sopenharmony_ci if (unlikely(err < 0)) 58262306a36Sopenharmony_ci goto error_free; 58362306a36Sopenharmony_ci 58462306a36Sopenharmony_ci if (!esp->inplace) { 58562306a36Sopenharmony_ci int allocsize; 58662306a36Sopenharmony_ci struct page_frag *pfrag = &x->xfrag; 58762306a36Sopenharmony_ci 58862306a36Sopenharmony_ci allocsize = ALIGN(skb->data_len, L1_CACHE_BYTES); 58962306a36Sopenharmony_ci 59062306a36Sopenharmony_ci spin_lock_bh(&x->lock); 59162306a36Sopenharmony_ci if (unlikely(!skb_page_frag_refill(allocsize, pfrag, GFP_ATOMIC))) { 59262306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 59362306a36Sopenharmony_ci goto error_free; 59462306a36Sopenharmony_ci } 59562306a36Sopenharmony_ci 59662306a36Sopenharmony_ci skb_shinfo(skb)->nr_frags = 1; 59762306a36Sopenharmony_ci 59862306a36Sopenharmony_ci page = pfrag->page; 59962306a36Sopenharmony_ci get_page(page); 60062306a36Sopenharmony_ci /* replace page frags in skb with new page */ 60162306a36Sopenharmony_ci __skb_fill_page_desc(skb, 0, page, pfrag->offset, skb->data_len); 60262306a36Sopenharmony_ci pfrag->offset = pfrag->offset + allocsize; 60362306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 60462306a36Sopenharmony_ci 60562306a36Sopenharmony_ci sg_init_table(dsg, skb_shinfo(skb)->nr_frags + 1); 60662306a36Sopenharmony_ci err = skb_to_sgvec(skb, dsg, 60762306a36Sopenharmony_ci (unsigned char *)esph - skb->data, 60862306a36Sopenharmony_ci assoclen + ivlen + esp->clen + alen); 60962306a36Sopenharmony_ci if (unlikely(err < 0)) 61062306a36Sopenharmony_ci goto error_free; 61162306a36Sopenharmony_ci } 61262306a36Sopenharmony_ci 61362306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) 61462306a36Sopenharmony_ci aead_request_set_callback(req, 0, esp_output_done_esn, skb); 61562306a36Sopenharmony_ci else 61662306a36Sopenharmony_ci aead_request_set_callback(req, 0, esp_output_done, skb); 61762306a36Sopenharmony_ci 61862306a36Sopenharmony_ci aead_request_set_crypt(req, sg, dsg, ivlen + esp->clen, iv); 61962306a36Sopenharmony_ci aead_request_set_ad(req, assoclen); 62062306a36Sopenharmony_ci 62162306a36Sopenharmony_ci memset(iv, 0, ivlen); 62262306a36Sopenharmony_ci memcpy(iv + ivlen - min(ivlen, 8), (u8 *)&esp->seqno + 8 - min(ivlen, 8), 62362306a36Sopenharmony_ci min(ivlen, 8)); 62462306a36Sopenharmony_ci 62562306a36Sopenharmony_ci ESP_SKB_CB(skb)->tmp = tmp; 62662306a36Sopenharmony_ci err = crypto_aead_encrypt(req); 62762306a36Sopenharmony_ci 62862306a36Sopenharmony_ci switch (err) { 62962306a36Sopenharmony_ci case -EINPROGRESS: 63062306a36Sopenharmony_ci goto error; 63162306a36Sopenharmony_ci 63262306a36Sopenharmony_ci case -ENOSPC: 63362306a36Sopenharmony_ci err = NET_XMIT_DROP; 63462306a36Sopenharmony_ci break; 63562306a36Sopenharmony_ci 63662306a36Sopenharmony_ci case 0: 63762306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) 63862306a36Sopenharmony_ci esp_output_restore_header(skb); 63962306a36Sopenharmony_ci } 64062306a36Sopenharmony_ci 64162306a36Sopenharmony_ci if (sg != dsg) 64262306a36Sopenharmony_ci esp_ssg_unref(x, tmp); 64362306a36Sopenharmony_ci 64462306a36Sopenharmony_ci if (!err && x->encap && x->encap->encap_type == TCP_ENCAP_ESPINTCP) 64562306a36Sopenharmony_ci err = esp_output_tail_tcp(x, skb); 64662306a36Sopenharmony_ci 64762306a36Sopenharmony_cierror_free: 64862306a36Sopenharmony_ci kfree(tmp); 64962306a36Sopenharmony_cierror: 65062306a36Sopenharmony_ci return err; 65162306a36Sopenharmony_ci} 65262306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(esp_output_tail); 65362306a36Sopenharmony_ci 65462306a36Sopenharmony_cistatic int esp_output(struct xfrm_state *x, struct sk_buff *skb) 65562306a36Sopenharmony_ci{ 65662306a36Sopenharmony_ci int alen; 65762306a36Sopenharmony_ci int blksize; 65862306a36Sopenharmony_ci struct ip_esp_hdr *esph; 65962306a36Sopenharmony_ci struct crypto_aead *aead; 66062306a36Sopenharmony_ci struct esp_info esp; 66162306a36Sopenharmony_ci 66262306a36Sopenharmony_ci esp.inplace = true; 66362306a36Sopenharmony_ci 66462306a36Sopenharmony_ci esp.proto = *skb_mac_header(skb); 66562306a36Sopenharmony_ci *skb_mac_header(skb) = IPPROTO_ESP; 66662306a36Sopenharmony_ci 66762306a36Sopenharmony_ci /* skb is pure payload to encrypt */ 66862306a36Sopenharmony_ci 66962306a36Sopenharmony_ci aead = x->data; 67062306a36Sopenharmony_ci alen = crypto_aead_authsize(aead); 67162306a36Sopenharmony_ci 67262306a36Sopenharmony_ci esp.tfclen = 0; 67362306a36Sopenharmony_ci if (x->tfcpad) { 67462306a36Sopenharmony_ci struct xfrm_dst *dst = (struct xfrm_dst *)skb_dst(skb); 67562306a36Sopenharmony_ci u32 padto; 67662306a36Sopenharmony_ci 67762306a36Sopenharmony_ci padto = min(x->tfcpad, xfrm_state_mtu(x, dst->child_mtu_cached)); 67862306a36Sopenharmony_ci if (skb->len < padto) 67962306a36Sopenharmony_ci esp.tfclen = padto - skb->len; 68062306a36Sopenharmony_ci } 68162306a36Sopenharmony_ci blksize = ALIGN(crypto_aead_blocksize(aead), 4); 68262306a36Sopenharmony_ci esp.clen = ALIGN(skb->len + 2 + esp.tfclen, blksize); 68362306a36Sopenharmony_ci esp.plen = esp.clen - skb->len - esp.tfclen; 68462306a36Sopenharmony_ci esp.tailen = esp.tfclen + esp.plen + alen; 68562306a36Sopenharmony_ci 68662306a36Sopenharmony_ci esp.esph = ip_esp_hdr(skb); 68762306a36Sopenharmony_ci 68862306a36Sopenharmony_ci esp.nfrags = esp_output_head(x, skb, &esp); 68962306a36Sopenharmony_ci if (esp.nfrags < 0) 69062306a36Sopenharmony_ci return esp.nfrags; 69162306a36Sopenharmony_ci 69262306a36Sopenharmony_ci esph = esp.esph; 69362306a36Sopenharmony_ci esph->spi = x->id.spi; 69462306a36Sopenharmony_ci 69562306a36Sopenharmony_ci esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq.output.low); 69662306a36Sopenharmony_ci esp.seqno = cpu_to_be64(XFRM_SKB_CB(skb)->seq.output.low + 69762306a36Sopenharmony_ci ((u64)XFRM_SKB_CB(skb)->seq.output.hi << 32)); 69862306a36Sopenharmony_ci 69962306a36Sopenharmony_ci skb_push(skb, -skb_network_offset(skb)); 70062306a36Sopenharmony_ci 70162306a36Sopenharmony_ci return esp_output_tail(x, skb, &esp); 70262306a36Sopenharmony_ci} 70362306a36Sopenharmony_ci 70462306a36Sopenharmony_cistatic inline int esp_remove_trailer(struct sk_buff *skb) 70562306a36Sopenharmony_ci{ 70662306a36Sopenharmony_ci struct xfrm_state *x = xfrm_input_state(skb); 70762306a36Sopenharmony_ci struct crypto_aead *aead = x->data; 70862306a36Sopenharmony_ci int alen, hlen, elen; 70962306a36Sopenharmony_ci int padlen, trimlen; 71062306a36Sopenharmony_ci __wsum csumdiff; 71162306a36Sopenharmony_ci u8 nexthdr[2]; 71262306a36Sopenharmony_ci int ret; 71362306a36Sopenharmony_ci 71462306a36Sopenharmony_ci alen = crypto_aead_authsize(aead); 71562306a36Sopenharmony_ci hlen = sizeof(struct ip_esp_hdr) + crypto_aead_ivsize(aead); 71662306a36Sopenharmony_ci elen = skb->len - hlen; 71762306a36Sopenharmony_ci 71862306a36Sopenharmony_ci if (skb_copy_bits(skb, skb->len - alen - 2, nexthdr, 2)) 71962306a36Sopenharmony_ci BUG(); 72062306a36Sopenharmony_ci 72162306a36Sopenharmony_ci ret = -EINVAL; 72262306a36Sopenharmony_ci padlen = nexthdr[0]; 72362306a36Sopenharmony_ci if (padlen + 2 + alen >= elen) { 72462306a36Sopenharmony_ci net_dbg_ratelimited("ipsec esp packet is garbage padlen=%d, elen=%d\n", 72562306a36Sopenharmony_ci padlen + 2, elen - alen); 72662306a36Sopenharmony_ci goto out; 72762306a36Sopenharmony_ci } 72862306a36Sopenharmony_ci 72962306a36Sopenharmony_ci trimlen = alen + padlen + 2; 73062306a36Sopenharmony_ci if (skb->ip_summed == CHECKSUM_COMPLETE) { 73162306a36Sopenharmony_ci csumdiff = skb_checksum(skb, skb->len - trimlen, trimlen, 0); 73262306a36Sopenharmony_ci skb->csum = csum_block_sub(skb->csum, csumdiff, 73362306a36Sopenharmony_ci skb->len - trimlen); 73462306a36Sopenharmony_ci } 73562306a36Sopenharmony_ci ret = pskb_trim(skb, skb->len - trimlen); 73662306a36Sopenharmony_ci if (unlikely(ret)) 73762306a36Sopenharmony_ci return ret; 73862306a36Sopenharmony_ci 73962306a36Sopenharmony_ci ret = nexthdr[1]; 74062306a36Sopenharmony_ci 74162306a36Sopenharmony_ciout: 74262306a36Sopenharmony_ci return ret; 74362306a36Sopenharmony_ci} 74462306a36Sopenharmony_ci 74562306a36Sopenharmony_ciint esp_input_done2(struct sk_buff *skb, int err) 74662306a36Sopenharmony_ci{ 74762306a36Sopenharmony_ci const struct iphdr *iph; 74862306a36Sopenharmony_ci struct xfrm_state *x = xfrm_input_state(skb); 74962306a36Sopenharmony_ci struct xfrm_offload *xo = xfrm_offload(skb); 75062306a36Sopenharmony_ci struct crypto_aead *aead = x->data; 75162306a36Sopenharmony_ci int hlen = sizeof(struct ip_esp_hdr) + crypto_aead_ivsize(aead); 75262306a36Sopenharmony_ci int ihl; 75362306a36Sopenharmony_ci 75462306a36Sopenharmony_ci if (!xo || !(xo->flags & CRYPTO_DONE)) 75562306a36Sopenharmony_ci kfree(ESP_SKB_CB(skb)->tmp); 75662306a36Sopenharmony_ci 75762306a36Sopenharmony_ci if (unlikely(err)) 75862306a36Sopenharmony_ci goto out; 75962306a36Sopenharmony_ci 76062306a36Sopenharmony_ci err = esp_remove_trailer(skb); 76162306a36Sopenharmony_ci if (unlikely(err < 0)) 76262306a36Sopenharmony_ci goto out; 76362306a36Sopenharmony_ci 76462306a36Sopenharmony_ci iph = ip_hdr(skb); 76562306a36Sopenharmony_ci ihl = iph->ihl * 4; 76662306a36Sopenharmony_ci 76762306a36Sopenharmony_ci if (x->encap) { 76862306a36Sopenharmony_ci struct xfrm_encap_tmpl *encap = x->encap; 76962306a36Sopenharmony_ci struct tcphdr *th = (void *)(skb_network_header(skb) + ihl); 77062306a36Sopenharmony_ci struct udphdr *uh = (void *)(skb_network_header(skb) + ihl); 77162306a36Sopenharmony_ci __be16 source; 77262306a36Sopenharmony_ci 77362306a36Sopenharmony_ci switch (x->encap->encap_type) { 77462306a36Sopenharmony_ci case TCP_ENCAP_ESPINTCP: 77562306a36Sopenharmony_ci source = th->source; 77662306a36Sopenharmony_ci break; 77762306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP: 77862306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP_NON_IKE: 77962306a36Sopenharmony_ci source = uh->source; 78062306a36Sopenharmony_ci break; 78162306a36Sopenharmony_ci default: 78262306a36Sopenharmony_ci WARN_ON_ONCE(1); 78362306a36Sopenharmony_ci err = -EINVAL; 78462306a36Sopenharmony_ci goto out; 78562306a36Sopenharmony_ci } 78662306a36Sopenharmony_ci 78762306a36Sopenharmony_ci /* 78862306a36Sopenharmony_ci * 1) if the NAT-T peer's IP or port changed then 78962306a36Sopenharmony_ci * advertise the change to the keying daemon. 79062306a36Sopenharmony_ci * This is an inbound SA, so just compare 79162306a36Sopenharmony_ci * SRC ports. 79262306a36Sopenharmony_ci */ 79362306a36Sopenharmony_ci if (iph->saddr != x->props.saddr.a4 || 79462306a36Sopenharmony_ci source != encap->encap_sport) { 79562306a36Sopenharmony_ci xfrm_address_t ipaddr; 79662306a36Sopenharmony_ci 79762306a36Sopenharmony_ci ipaddr.a4 = iph->saddr; 79862306a36Sopenharmony_ci km_new_mapping(x, &ipaddr, source); 79962306a36Sopenharmony_ci 80062306a36Sopenharmony_ci /* XXX: perhaps add an extra 80162306a36Sopenharmony_ci * policy check here, to see 80262306a36Sopenharmony_ci * if we should allow or 80362306a36Sopenharmony_ci * reject a packet from a 80462306a36Sopenharmony_ci * different source 80562306a36Sopenharmony_ci * address/port. 80662306a36Sopenharmony_ci */ 80762306a36Sopenharmony_ci } 80862306a36Sopenharmony_ci 80962306a36Sopenharmony_ci /* 81062306a36Sopenharmony_ci * 2) ignore UDP/TCP checksums in case 81162306a36Sopenharmony_ci * of NAT-T in Transport Mode, or 81262306a36Sopenharmony_ci * perform other post-processing fixes 81362306a36Sopenharmony_ci * as per draft-ietf-ipsec-udp-encaps-06, 81462306a36Sopenharmony_ci * section 3.1.2 81562306a36Sopenharmony_ci */ 81662306a36Sopenharmony_ci if (x->props.mode == XFRM_MODE_TRANSPORT) 81762306a36Sopenharmony_ci skb->ip_summed = CHECKSUM_UNNECESSARY; 81862306a36Sopenharmony_ci } 81962306a36Sopenharmony_ci 82062306a36Sopenharmony_ci skb_pull_rcsum(skb, hlen); 82162306a36Sopenharmony_ci if (x->props.mode == XFRM_MODE_TUNNEL) 82262306a36Sopenharmony_ci skb_reset_transport_header(skb); 82362306a36Sopenharmony_ci else 82462306a36Sopenharmony_ci skb_set_transport_header(skb, -ihl); 82562306a36Sopenharmony_ci 82662306a36Sopenharmony_ci /* RFC4303: Drop dummy packets without any error */ 82762306a36Sopenharmony_ci if (err == IPPROTO_NONE) 82862306a36Sopenharmony_ci err = -EINVAL; 82962306a36Sopenharmony_ci 83062306a36Sopenharmony_ciout: 83162306a36Sopenharmony_ci return err; 83262306a36Sopenharmony_ci} 83362306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(esp_input_done2); 83462306a36Sopenharmony_ci 83562306a36Sopenharmony_cistatic void esp_input_done(void *data, int err) 83662306a36Sopenharmony_ci{ 83762306a36Sopenharmony_ci struct sk_buff *skb = data; 83862306a36Sopenharmony_ci 83962306a36Sopenharmony_ci xfrm_input_resume(skb, esp_input_done2(skb, err)); 84062306a36Sopenharmony_ci} 84162306a36Sopenharmony_ci 84262306a36Sopenharmony_cistatic void esp_input_restore_header(struct sk_buff *skb) 84362306a36Sopenharmony_ci{ 84462306a36Sopenharmony_ci esp_restore_header(skb, 0); 84562306a36Sopenharmony_ci __skb_pull(skb, 4); 84662306a36Sopenharmony_ci} 84762306a36Sopenharmony_ci 84862306a36Sopenharmony_cistatic void esp_input_set_header(struct sk_buff *skb, __be32 *seqhi) 84962306a36Sopenharmony_ci{ 85062306a36Sopenharmony_ci struct xfrm_state *x = xfrm_input_state(skb); 85162306a36Sopenharmony_ci struct ip_esp_hdr *esph; 85262306a36Sopenharmony_ci 85362306a36Sopenharmony_ci /* For ESN we move the header forward by 4 bytes to 85462306a36Sopenharmony_ci * accommodate the high bits. We will move it back after 85562306a36Sopenharmony_ci * decryption. 85662306a36Sopenharmony_ci */ 85762306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) { 85862306a36Sopenharmony_ci esph = skb_push(skb, 4); 85962306a36Sopenharmony_ci *seqhi = esph->spi; 86062306a36Sopenharmony_ci esph->spi = esph->seq_no; 86162306a36Sopenharmony_ci esph->seq_no = XFRM_SKB_CB(skb)->seq.input.hi; 86262306a36Sopenharmony_ci } 86362306a36Sopenharmony_ci} 86462306a36Sopenharmony_ci 86562306a36Sopenharmony_cistatic void esp_input_done_esn(void *data, int err) 86662306a36Sopenharmony_ci{ 86762306a36Sopenharmony_ci struct sk_buff *skb = data; 86862306a36Sopenharmony_ci 86962306a36Sopenharmony_ci esp_input_restore_header(skb); 87062306a36Sopenharmony_ci esp_input_done(data, err); 87162306a36Sopenharmony_ci} 87262306a36Sopenharmony_ci 87362306a36Sopenharmony_ci/* 87462306a36Sopenharmony_ci * Note: detecting truncated vs. non-truncated authentication data is very 87562306a36Sopenharmony_ci * expensive, so we only support truncated data, which is the recommended 87662306a36Sopenharmony_ci * and common case. 87762306a36Sopenharmony_ci */ 87862306a36Sopenharmony_cistatic int esp_input(struct xfrm_state *x, struct sk_buff *skb) 87962306a36Sopenharmony_ci{ 88062306a36Sopenharmony_ci struct crypto_aead *aead = x->data; 88162306a36Sopenharmony_ci struct aead_request *req; 88262306a36Sopenharmony_ci struct sk_buff *trailer; 88362306a36Sopenharmony_ci int ivlen = crypto_aead_ivsize(aead); 88462306a36Sopenharmony_ci int elen = skb->len - sizeof(struct ip_esp_hdr) - ivlen; 88562306a36Sopenharmony_ci int nfrags; 88662306a36Sopenharmony_ci int assoclen; 88762306a36Sopenharmony_ci int seqhilen; 88862306a36Sopenharmony_ci __be32 *seqhi; 88962306a36Sopenharmony_ci void *tmp; 89062306a36Sopenharmony_ci u8 *iv; 89162306a36Sopenharmony_ci struct scatterlist *sg; 89262306a36Sopenharmony_ci int err = -EINVAL; 89362306a36Sopenharmony_ci 89462306a36Sopenharmony_ci if (!pskb_may_pull(skb, sizeof(struct ip_esp_hdr) + ivlen)) 89562306a36Sopenharmony_ci goto out; 89662306a36Sopenharmony_ci 89762306a36Sopenharmony_ci if (elen <= 0) 89862306a36Sopenharmony_ci goto out; 89962306a36Sopenharmony_ci 90062306a36Sopenharmony_ci assoclen = sizeof(struct ip_esp_hdr); 90162306a36Sopenharmony_ci seqhilen = 0; 90262306a36Sopenharmony_ci 90362306a36Sopenharmony_ci if (x->props.flags & XFRM_STATE_ESN) { 90462306a36Sopenharmony_ci seqhilen += sizeof(__be32); 90562306a36Sopenharmony_ci assoclen += seqhilen; 90662306a36Sopenharmony_ci } 90762306a36Sopenharmony_ci 90862306a36Sopenharmony_ci if (!skb_cloned(skb)) { 90962306a36Sopenharmony_ci if (!skb_is_nonlinear(skb)) { 91062306a36Sopenharmony_ci nfrags = 1; 91162306a36Sopenharmony_ci 91262306a36Sopenharmony_ci goto skip_cow; 91362306a36Sopenharmony_ci } else if (!skb_has_frag_list(skb)) { 91462306a36Sopenharmony_ci nfrags = skb_shinfo(skb)->nr_frags; 91562306a36Sopenharmony_ci nfrags++; 91662306a36Sopenharmony_ci 91762306a36Sopenharmony_ci goto skip_cow; 91862306a36Sopenharmony_ci } 91962306a36Sopenharmony_ci } 92062306a36Sopenharmony_ci 92162306a36Sopenharmony_ci err = skb_cow_data(skb, 0, &trailer); 92262306a36Sopenharmony_ci if (err < 0) 92362306a36Sopenharmony_ci goto out; 92462306a36Sopenharmony_ci 92562306a36Sopenharmony_ci nfrags = err; 92662306a36Sopenharmony_ci 92762306a36Sopenharmony_ciskip_cow: 92862306a36Sopenharmony_ci err = -ENOMEM; 92962306a36Sopenharmony_ci tmp = esp_alloc_tmp(aead, nfrags, seqhilen); 93062306a36Sopenharmony_ci if (!tmp) 93162306a36Sopenharmony_ci goto out; 93262306a36Sopenharmony_ci 93362306a36Sopenharmony_ci ESP_SKB_CB(skb)->tmp = tmp; 93462306a36Sopenharmony_ci seqhi = esp_tmp_extra(tmp); 93562306a36Sopenharmony_ci iv = esp_tmp_iv(aead, tmp, seqhilen); 93662306a36Sopenharmony_ci req = esp_tmp_req(aead, iv); 93762306a36Sopenharmony_ci sg = esp_req_sg(aead, req); 93862306a36Sopenharmony_ci 93962306a36Sopenharmony_ci esp_input_set_header(skb, seqhi); 94062306a36Sopenharmony_ci 94162306a36Sopenharmony_ci sg_init_table(sg, nfrags); 94262306a36Sopenharmony_ci err = skb_to_sgvec(skb, sg, 0, skb->len); 94362306a36Sopenharmony_ci if (unlikely(err < 0)) { 94462306a36Sopenharmony_ci kfree(tmp); 94562306a36Sopenharmony_ci goto out; 94662306a36Sopenharmony_ci } 94762306a36Sopenharmony_ci 94862306a36Sopenharmony_ci skb->ip_summed = CHECKSUM_NONE; 94962306a36Sopenharmony_ci 95062306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) 95162306a36Sopenharmony_ci aead_request_set_callback(req, 0, esp_input_done_esn, skb); 95262306a36Sopenharmony_ci else 95362306a36Sopenharmony_ci aead_request_set_callback(req, 0, esp_input_done, skb); 95462306a36Sopenharmony_ci 95562306a36Sopenharmony_ci aead_request_set_crypt(req, sg, sg, elen + ivlen, iv); 95662306a36Sopenharmony_ci aead_request_set_ad(req, assoclen); 95762306a36Sopenharmony_ci 95862306a36Sopenharmony_ci err = crypto_aead_decrypt(req); 95962306a36Sopenharmony_ci if (err == -EINPROGRESS) 96062306a36Sopenharmony_ci goto out; 96162306a36Sopenharmony_ci 96262306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) 96362306a36Sopenharmony_ci esp_input_restore_header(skb); 96462306a36Sopenharmony_ci 96562306a36Sopenharmony_ci err = esp_input_done2(skb, err); 96662306a36Sopenharmony_ci 96762306a36Sopenharmony_ciout: 96862306a36Sopenharmony_ci return err; 96962306a36Sopenharmony_ci} 97062306a36Sopenharmony_ci 97162306a36Sopenharmony_cistatic int esp4_err(struct sk_buff *skb, u32 info) 97262306a36Sopenharmony_ci{ 97362306a36Sopenharmony_ci struct net *net = dev_net(skb->dev); 97462306a36Sopenharmony_ci const struct iphdr *iph = (const struct iphdr *)skb->data; 97562306a36Sopenharmony_ci struct ip_esp_hdr *esph = (struct ip_esp_hdr *)(skb->data+(iph->ihl<<2)); 97662306a36Sopenharmony_ci struct xfrm_state *x; 97762306a36Sopenharmony_ci 97862306a36Sopenharmony_ci switch (icmp_hdr(skb)->type) { 97962306a36Sopenharmony_ci case ICMP_DEST_UNREACH: 98062306a36Sopenharmony_ci if (icmp_hdr(skb)->code != ICMP_FRAG_NEEDED) 98162306a36Sopenharmony_ci return 0; 98262306a36Sopenharmony_ci break; 98362306a36Sopenharmony_ci case ICMP_REDIRECT: 98462306a36Sopenharmony_ci break; 98562306a36Sopenharmony_ci default: 98662306a36Sopenharmony_ci return 0; 98762306a36Sopenharmony_ci } 98862306a36Sopenharmony_ci 98962306a36Sopenharmony_ci x = xfrm_state_lookup(net, skb->mark, (const xfrm_address_t *)&iph->daddr, 99062306a36Sopenharmony_ci esph->spi, IPPROTO_ESP, AF_INET); 99162306a36Sopenharmony_ci if (!x) 99262306a36Sopenharmony_ci return 0; 99362306a36Sopenharmony_ci 99462306a36Sopenharmony_ci if (icmp_hdr(skb)->type == ICMP_DEST_UNREACH) 99562306a36Sopenharmony_ci ipv4_update_pmtu(skb, net, info, 0, IPPROTO_ESP); 99662306a36Sopenharmony_ci else 99762306a36Sopenharmony_ci ipv4_redirect(skb, net, 0, IPPROTO_ESP); 99862306a36Sopenharmony_ci xfrm_state_put(x); 99962306a36Sopenharmony_ci 100062306a36Sopenharmony_ci return 0; 100162306a36Sopenharmony_ci} 100262306a36Sopenharmony_ci 100362306a36Sopenharmony_cistatic void esp_destroy(struct xfrm_state *x) 100462306a36Sopenharmony_ci{ 100562306a36Sopenharmony_ci struct crypto_aead *aead = x->data; 100662306a36Sopenharmony_ci 100762306a36Sopenharmony_ci if (!aead) 100862306a36Sopenharmony_ci return; 100962306a36Sopenharmony_ci 101062306a36Sopenharmony_ci crypto_free_aead(aead); 101162306a36Sopenharmony_ci} 101262306a36Sopenharmony_ci 101362306a36Sopenharmony_cistatic int esp_init_aead(struct xfrm_state *x, struct netlink_ext_ack *extack) 101462306a36Sopenharmony_ci{ 101562306a36Sopenharmony_ci char aead_name[CRYPTO_MAX_ALG_NAME]; 101662306a36Sopenharmony_ci struct crypto_aead *aead; 101762306a36Sopenharmony_ci int err; 101862306a36Sopenharmony_ci 101962306a36Sopenharmony_ci if (snprintf(aead_name, CRYPTO_MAX_ALG_NAME, "%s(%s)", 102062306a36Sopenharmony_ci x->geniv, x->aead->alg_name) >= CRYPTO_MAX_ALG_NAME) { 102162306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Algorithm name is too long"); 102262306a36Sopenharmony_ci return -ENAMETOOLONG; 102362306a36Sopenharmony_ci } 102462306a36Sopenharmony_ci 102562306a36Sopenharmony_ci aead = crypto_alloc_aead(aead_name, 0, 0); 102662306a36Sopenharmony_ci err = PTR_ERR(aead); 102762306a36Sopenharmony_ci if (IS_ERR(aead)) 102862306a36Sopenharmony_ci goto error; 102962306a36Sopenharmony_ci 103062306a36Sopenharmony_ci x->data = aead; 103162306a36Sopenharmony_ci 103262306a36Sopenharmony_ci err = crypto_aead_setkey(aead, x->aead->alg_key, 103362306a36Sopenharmony_ci (x->aead->alg_key_len + 7) / 8); 103462306a36Sopenharmony_ci if (err) 103562306a36Sopenharmony_ci goto error; 103662306a36Sopenharmony_ci 103762306a36Sopenharmony_ci err = crypto_aead_setauthsize(aead, x->aead->alg_icv_len / 8); 103862306a36Sopenharmony_ci if (err) 103962306a36Sopenharmony_ci goto error; 104062306a36Sopenharmony_ci 104162306a36Sopenharmony_ci return 0; 104262306a36Sopenharmony_ci 104362306a36Sopenharmony_cierror: 104462306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Kernel was unable to initialize cryptographic operations"); 104562306a36Sopenharmony_ci return err; 104662306a36Sopenharmony_ci} 104762306a36Sopenharmony_ci 104862306a36Sopenharmony_cistatic int esp_init_authenc(struct xfrm_state *x, 104962306a36Sopenharmony_ci struct netlink_ext_ack *extack) 105062306a36Sopenharmony_ci{ 105162306a36Sopenharmony_ci struct crypto_aead *aead; 105262306a36Sopenharmony_ci struct crypto_authenc_key_param *param; 105362306a36Sopenharmony_ci struct rtattr *rta; 105462306a36Sopenharmony_ci char *key; 105562306a36Sopenharmony_ci char *p; 105662306a36Sopenharmony_ci char authenc_name[CRYPTO_MAX_ALG_NAME]; 105762306a36Sopenharmony_ci unsigned int keylen; 105862306a36Sopenharmony_ci int err; 105962306a36Sopenharmony_ci 106062306a36Sopenharmony_ci err = -ENAMETOOLONG; 106162306a36Sopenharmony_ci 106262306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) { 106362306a36Sopenharmony_ci if (snprintf(authenc_name, CRYPTO_MAX_ALG_NAME, 106462306a36Sopenharmony_ci "%s%sauthencesn(%s,%s)%s", 106562306a36Sopenharmony_ci x->geniv ?: "", x->geniv ? "(" : "", 106662306a36Sopenharmony_ci x->aalg ? x->aalg->alg_name : "digest_null", 106762306a36Sopenharmony_ci x->ealg->alg_name, 106862306a36Sopenharmony_ci x->geniv ? ")" : "") >= CRYPTO_MAX_ALG_NAME) { 106962306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Algorithm name is too long"); 107062306a36Sopenharmony_ci goto error; 107162306a36Sopenharmony_ci } 107262306a36Sopenharmony_ci } else { 107362306a36Sopenharmony_ci if (snprintf(authenc_name, CRYPTO_MAX_ALG_NAME, 107462306a36Sopenharmony_ci "%s%sauthenc(%s,%s)%s", 107562306a36Sopenharmony_ci x->geniv ?: "", x->geniv ? "(" : "", 107662306a36Sopenharmony_ci x->aalg ? x->aalg->alg_name : "digest_null", 107762306a36Sopenharmony_ci x->ealg->alg_name, 107862306a36Sopenharmony_ci x->geniv ? ")" : "") >= CRYPTO_MAX_ALG_NAME) { 107962306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Algorithm name is too long"); 108062306a36Sopenharmony_ci goto error; 108162306a36Sopenharmony_ci } 108262306a36Sopenharmony_ci } 108362306a36Sopenharmony_ci 108462306a36Sopenharmony_ci aead = crypto_alloc_aead(authenc_name, 0, 0); 108562306a36Sopenharmony_ci err = PTR_ERR(aead); 108662306a36Sopenharmony_ci if (IS_ERR(aead)) { 108762306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Kernel was unable to initialize cryptographic operations"); 108862306a36Sopenharmony_ci goto error; 108962306a36Sopenharmony_ci } 109062306a36Sopenharmony_ci 109162306a36Sopenharmony_ci x->data = aead; 109262306a36Sopenharmony_ci 109362306a36Sopenharmony_ci keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + 109462306a36Sopenharmony_ci (x->ealg->alg_key_len + 7) / 8 + RTA_SPACE(sizeof(*param)); 109562306a36Sopenharmony_ci err = -ENOMEM; 109662306a36Sopenharmony_ci key = kmalloc(keylen, GFP_KERNEL); 109762306a36Sopenharmony_ci if (!key) 109862306a36Sopenharmony_ci goto error; 109962306a36Sopenharmony_ci 110062306a36Sopenharmony_ci p = key; 110162306a36Sopenharmony_ci rta = (void *)p; 110262306a36Sopenharmony_ci rta->rta_type = CRYPTO_AUTHENC_KEYA_PARAM; 110362306a36Sopenharmony_ci rta->rta_len = RTA_LENGTH(sizeof(*param)); 110462306a36Sopenharmony_ci param = RTA_DATA(rta); 110562306a36Sopenharmony_ci p += RTA_SPACE(sizeof(*param)); 110662306a36Sopenharmony_ci 110762306a36Sopenharmony_ci if (x->aalg) { 110862306a36Sopenharmony_ci struct xfrm_algo_desc *aalg_desc; 110962306a36Sopenharmony_ci 111062306a36Sopenharmony_ci memcpy(p, x->aalg->alg_key, (x->aalg->alg_key_len + 7) / 8); 111162306a36Sopenharmony_ci p += (x->aalg->alg_key_len + 7) / 8; 111262306a36Sopenharmony_ci 111362306a36Sopenharmony_ci aalg_desc = xfrm_aalg_get_byname(x->aalg->alg_name, 0); 111462306a36Sopenharmony_ci BUG_ON(!aalg_desc); 111562306a36Sopenharmony_ci 111662306a36Sopenharmony_ci err = -EINVAL; 111762306a36Sopenharmony_ci if (aalg_desc->uinfo.auth.icv_fullbits / 8 != 111862306a36Sopenharmony_ci crypto_aead_authsize(aead)) { 111962306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Kernel was unable to initialize cryptographic operations"); 112062306a36Sopenharmony_ci goto free_key; 112162306a36Sopenharmony_ci } 112262306a36Sopenharmony_ci 112362306a36Sopenharmony_ci err = crypto_aead_setauthsize( 112462306a36Sopenharmony_ci aead, x->aalg->alg_trunc_len / 8); 112562306a36Sopenharmony_ci if (err) { 112662306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Kernel was unable to initialize cryptographic operations"); 112762306a36Sopenharmony_ci goto free_key; 112862306a36Sopenharmony_ci } 112962306a36Sopenharmony_ci } 113062306a36Sopenharmony_ci 113162306a36Sopenharmony_ci param->enckeylen = cpu_to_be32((x->ealg->alg_key_len + 7) / 8); 113262306a36Sopenharmony_ci memcpy(p, x->ealg->alg_key, (x->ealg->alg_key_len + 7) / 8); 113362306a36Sopenharmony_ci 113462306a36Sopenharmony_ci err = crypto_aead_setkey(aead, key, keylen); 113562306a36Sopenharmony_ci 113662306a36Sopenharmony_cifree_key: 113762306a36Sopenharmony_ci kfree_sensitive(key); 113862306a36Sopenharmony_ci 113962306a36Sopenharmony_cierror: 114062306a36Sopenharmony_ci return err; 114162306a36Sopenharmony_ci} 114262306a36Sopenharmony_ci 114362306a36Sopenharmony_cistatic int esp_init_state(struct xfrm_state *x, struct netlink_ext_ack *extack) 114462306a36Sopenharmony_ci{ 114562306a36Sopenharmony_ci struct crypto_aead *aead; 114662306a36Sopenharmony_ci u32 align; 114762306a36Sopenharmony_ci int err; 114862306a36Sopenharmony_ci 114962306a36Sopenharmony_ci x->data = NULL; 115062306a36Sopenharmony_ci 115162306a36Sopenharmony_ci if (x->aead) { 115262306a36Sopenharmony_ci err = esp_init_aead(x, extack); 115362306a36Sopenharmony_ci } else if (x->ealg) { 115462306a36Sopenharmony_ci err = esp_init_authenc(x, extack); 115562306a36Sopenharmony_ci } else { 115662306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "ESP: AEAD or CRYPT must be provided"); 115762306a36Sopenharmony_ci err = -EINVAL; 115862306a36Sopenharmony_ci } 115962306a36Sopenharmony_ci 116062306a36Sopenharmony_ci if (err) 116162306a36Sopenharmony_ci goto error; 116262306a36Sopenharmony_ci 116362306a36Sopenharmony_ci aead = x->data; 116462306a36Sopenharmony_ci 116562306a36Sopenharmony_ci x->props.header_len = sizeof(struct ip_esp_hdr) + 116662306a36Sopenharmony_ci crypto_aead_ivsize(aead); 116762306a36Sopenharmony_ci if (x->props.mode == XFRM_MODE_TUNNEL) 116862306a36Sopenharmony_ci x->props.header_len += sizeof(struct iphdr); 116962306a36Sopenharmony_ci else if (x->props.mode == XFRM_MODE_BEET && x->sel.family != AF_INET6) 117062306a36Sopenharmony_ci x->props.header_len += IPV4_BEET_PHMAXLEN; 117162306a36Sopenharmony_ci if (x->encap) { 117262306a36Sopenharmony_ci struct xfrm_encap_tmpl *encap = x->encap; 117362306a36Sopenharmony_ci 117462306a36Sopenharmony_ci switch (encap->encap_type) { 117562306a36Sopenharmony_ci default: 117662306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Unsupported encapsulation type for ESP"); 117762306a36Sopenharmony_ci err = -EINVAL; 117862306a36Sopenharmony_ci goto error; 117962306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP: 118062306a36Sopenharmony_ci x->props.header_len += sizeof(struct udphdr); 118162306a36Sopenharmony_ci break; 118262306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP_NON_IKE: 118362306a36Sopenharmony_ci x->props.header_len += sizeof(struct udphdr) + 2 * sizeof(u32); 118462306a36Sopenharmony_ci break; 118562306a36Sopenharmony_ci#ifdef CONFIG_INET_ESPINTCP 118662306a36Sopenharmony_ci case TCP_ENCAP_ESPINTCP: 118762306a36Sopenharmony_ci /* only the length field, TCP encap is done by 118862306a36Sopenharmony_ci * the socket 118962306a36Sopenharmony_ci */ 119062306a36Sopenharmony_ci x->props.header_len += 2; 119162306a36Sopenharmony_ci break; 119262306a36Sopenharmony_ci#endif 119362306a36Sopenharmony_ci } 119462306a36Sopenharmony_ci } 119562306a36Sopenharmony_ci 119662306a36Sopenharmony_ci align = ALIGN(crypto_aead_blocksize(aead), 4); 119762306a36Sopenharmony_ci x->props.trailer_len = align + 1 + crypto_aead_authsize(aead); 119862306a36Sopenharmony_ci 119962306a36Sopenharmony_cierror: 120062306a36Sopenharmony_ci return err; 120162306a36Sopenharmony_ci} 120262306a36Sopenharmony_ci 120362306a36Sopenharmony_cistatic int esp4_rcv_cb(struct sk_buff *skb, int err) 120462306a36Sopenharmony_ci{ 120562306a36Sopenharmony_ci return 0; 120662306a36Sopenharmony_ci} 120762306a36Sopenharmony_ci 120862306a36Sopenharmony_cistatic const struct xfrm_type esp_type = 120962306a36Sopenharmony_ci{ 121062306a36Sopenharmony_ci .owner = THIS_MODULE, 121162306a36Sopenharmony_ci .proto = IPPROTO_ESP, 121262306a36Sopenharmony_ci .flags = XFRM_TYPE_REPLAY_PROT, 121362306a36Sopenharmony_ci .init_state = esp_init_state, 121462306a36Sopenharmony_ci .destructor = esp_destroy, 121562306a36Sopenharmony_ci .input = esp_input, 121662306a36Sopenharmony_ci .output = esp_output, 121762306a36Sopenharmony_ci}; 121862306a36Sopenharmony_ci 121962306a36Sopenharmony_cistatic struct xfrm4_protocol esp4_protocol = { 122062306a36Sopenharmony_ci .handler = xfrm4_rcv, 122162306a36Sopenharmony_ci .input_handler = xfrm_input, 122262306a36Sopenharmony_ci .cb_handler = esp4_rcv_cb, 122362306a36Sopenharmony_ci .err_handler = esp4_err, 122462306a36Sopenharmony_ci .priority = 0, 122562306a36Sopenharmony_ci}; 122662306a36Sopenharmony_ci 122762306a36Sopenharmony_cistatic int __init esp4_init(void) 122862306a36Sopenharmony_ci{ 122962306a36Sopenharmony_ci if (xfrm_register_type(&esp_type, AF_INET) < 0) { 123062306a36Sopenharmony_ci pr_info("%s: can't add xfrm type\n", __func__); 123162306a36Sopenharmony_ci return -EAGAIN; 123262306a36Sopenharmony_ci } 123362306a36Sopenharmony_ci if (xfrm4_protocol_register(&esp4_protocol, IPPROTO_ESP) < 0) { 123462306a36Sopenharmony_ci pr_info("%s: can't add protocol\n", __func__); 123562306a36Sopenharmony_ci xfrm_unregister_type(&esp_type, AF_INET); 123662306a36Sopenharmony_ci return -EAGAIN; 123762306a36Sopenharmony_ci } 123862306a36Sopenharmony_ci return 0; 123962306a36Sopenharmony_ci} 124062306a36Sopenharmony_ci 124162306a36Sopenharmony_cistatic void __exit esp4_fini(void) 124262306a36Sopenharmony_ci{ 124362306a36Sopenharmony_ci if (xfrm4_protocol_deregister(&esp4_protocol, IPPROTO_ESP) < 0) 124462306a36Sopenharmony_ci pr_info("%s: can't remove protocol\n", __func__); 124562306a36Sopenharmony_ci xfrm_unregister_type(&esp_type, AF_INET); 124662306a36Sopenharmony_ci} 124762306a36Sopenharmony_ci 124862306a36Sopenharmony_cimodule_init(esp4_init); 124962306a36Sopenharmony_cimodule_exit(esp4_fini); 125062306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 125162306a36Sopenharmony_ciMODULE_ALIAS_XFRM_TYPE(AF_INET, XFRM_PROTO_ESP); 1252