162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0-or-later 262306a36Sopenharmony_ci/* 362306a36Sopenharmony_ci * Copyright (C)2002 USAGI/WIDE Project 462306a36Sopenharmony_ci * 562306a36Sopenharmony_ci * Authors 662306a36Sopenharmony_ci * 762306a36Sopenharmony_ci * Mitsuru KANDA @USAGI : IPv6 Support 862306a36Sopenharmony_ci * Kazunori MIYAZAWA @USAGI : 962306a36Sopenharmony_ci * Kunihiro Ishiguro <kunihiro@ipinfusion.com> 1062306a36Sopenharmony_ci * 1162306a36Sopenharmony_ci * This file is derived from net/ipv4/esp.c 1262306a36Sopenharmony_ci */ 1362306a36Sopenharmony_ci 1462306a36Sopenharmony_ci#define pr_fmt(fmt) "IPv6: " fmt 1562306a36Sopenharmony_ci 1662306a36Sopenharmony_ci#include <crypto/aead.h> 1762306a36Sopenharmony_ci#include <crypto/authenc.h> 1862306a36Sopenharmony_ci#include <linux/err.h> 1962306a36Sopenharmony_ci#include <linux/module.h> 2062306a36Sopenharmony_ci#include <net/ip.h> 2162306a36Sopenharmony_ci#include <net/xfrm.h> 2262306a36Sopenharmony_ci#include <net/esp.h> 2362306a36Sopenharmony_ci#include <linux/scatterlist.h> 2462306a36Sopenharmony_ci#include <linux/kernel.h> 2562306a36Sopenharmony_ci#include <linux/pfkeyv2.h> 2662306a36Sopenharmony_ci#include <linux/random.h> 2762306a36Sopenharmony_ci#include <linux/slab.h> 2862306a36Sopenharmony_ci#include <linux/spinlock.h> 2962306a36Sopenharmony_ci#include <net/ip6_checksum.h> 3062306a36Sopenharmony_ci#include <net/ip6_route.h> 3162306a36Sopenharmony_ci#include <net/icmp.h> 3262306a36Sopenharmony_ci#include <net/ipv6.h> 3362306a36Sopenharmony_ci#include <net/protocol.h> 3462306a36Sopenharmony_ci#include <net/udp.h> 3562306a36Sopenharmony_ci#include <linux/icmpv6.h> 3662306a36Sopenharmony_ci#include <net/tcp.h> 3762306a36Sopenharmony_ci#include <net/espintcp.h> 3862306a36Sopenharmony_ci#include <net/inet6_hashtables.h> 3962306a36Sopenharmony_ci 4062306a36Sopenharmony_ci#include <linux/highmem.h> 4162306a36Sopenharmony_ci 4262306a36Sopenharmony_cistruct esp_skb_cb { 4362306a36Sopenharmony_ci struct xfrm_skb_cb xfrm; 4462306a36Sopenharmony_ci void *tmp; 4562306a36Sopenharmony_ci}; 4662306a36Sopenharmony_ci 4762306a36Sopenharmony_cistruct esp_output_extra { 4862306a36Sopenharmony_ci __be32 seqhi; 4962306a36Sopenharmony_ci u32 esphoff; 5062306a36Sopenharmony_ci}; 5162306a36Sopenharmony_ci 5262306a36Sopenharmony_ci#define ESP_SKB_CB(__skb) ((struct esp_skb_cb *)&((__skb)->cb[0])) 5362306a36Sopenharmony_ci 5462306a36Sopenharmony_ci/* 5562306a36Sopenharmony_ci * Allocate an AEAD request structure with extra space for SG and IV. 5662306a36Sopenharmony_ci * 5762306a36Sopenharmony_ci * For alignment considerations the upper 32 bits of the sequence number are 5862306a36Sopenharmony_ci * placed at the front, if present. Followed by the IV, the request and finally 5962306a36Sopenharmony_ci * the SG list. 6062306a36Sopenharmony_ci * 6162306a36Sopenharmony_ci * TODO: Use spare space in skb for this where possible. 6262306a36Sopenharmony_ci */ 6362306a36Sopenharmony_cistatic void *esp_alloc_tmp(struct crypto_aead *aead, int nfrags, int seqihlen) 6462306a36Sopenharmony_ci{ 6562306a36Sopenharmony_ci unsigned int len; 6662306a36Sopenharmony_ci 6762306a36Sopenharmony_ci len = seqihlen; 6862306a36Sopenharmony_ci 6962306a36Sopenharmony_ci len += crypto_aead_ivsize(aead); 7062306a36Sopenharmony_ci 7162306a36Sopenharmony_ci if (len) { 7262306a36Sopenharmony_ci len += crypto_aead_alignmask(aead) & 7362306a36Sopenharmony_ci ~(crypto_tfm_ctx_alignment() - 1); 7462306a36Sopenharmony_ci len = ALIGN(len, crypto_tfm_ctx_alignment()); 7562306a36Sopenharmony_ci } 7662306a36Sopenharmony_ci 7762306a36Sopenharmony_ci len += sizeof(struct aead_request) + crypto_aead_reqsize(aead); 7862306a36Sopenharmony_ci len = ALIGN(len, __alignof__(struct scatterlist)); 7962306a36Sopenharmony_ci 8062306a36Sopenharmony_ci len += sizeof(struct scatterlist) * nfrags; 8162306a36Sopenharmony_ci 8262306a36Sopenharmony_ci return kmalloc(len, GFP_ATOMIC); 8362306a36Sopenharmony_ci} 8462306a36Sopenharmony_ci 8562306a36Sopenharmony_cistatic inline void *esp_tmp_extra(void *tmp) 8662306a36Sopenharmony_ci{ 8762306a36Sopenharmony_ci return PTR_ALIGN(tmp, __alignof__(struct esp_output_extra)); 8862306a36Sopenharmony_ci} 8962306a36Sopenharmony_ci 9062306a36Sopenharmony_cistatic inline u8 *esp_tmp_iv(struct crypto_aead *aead, void *tmp, int seqhilen) 9162306a36Sopenharmony_ci{ 9262306a36Sopenharmony_ci return crypto_aead_ivsize(aead) ? 9362306a36Sopenharmony_ci PTR_ALIGN((u8 *)tmp + seqhilen, 9462306a36Sopenharmony_ci crypto_aead_alignmask(aead) + 1) : tmp + seqhilen; 9562306a36Sopenharmony_ci} 9662306a36Sopenharmony_ci 9762306a36Sopenharmony_cistatic inline struct aead_request *esp_tmp_req(struct crypto_aead *aead, u8 *iv) 9862306a36Sopenharmony_ci{ 9962306a36Sopenharmony_ci struct aead_request *req; 10062306a36Sopenharmony_ci 10162306a36Sopenharmony_ci req = (void *)PTR_ALIGN(iv + crypto_aead_ivsize(aead), 10262306a36Sopenharmony_ci crypto_tfm_ctx_alignment()); 10362306a36Sopenharmony_ci aead_request_set_tfm(req, aead); 10462306a36Sopenharmony_ci return req; 10562306a36Sopenharmony_ci} 10662306a36Sopenharmony_ci 10762306a36Sopenharmony_cistatic inline struct scatterlist *esp_req_sg(struct crypto_aead *aead, 10862306a36Sopenharmony_ci struct aead_request *req) 10962306a36Sopenharmony_ci{ 11062306a36Sopenharmony_ci return (void *)ALIGN((unsigned long)(req + 1) + 11162306a36Sopenharmony_ci crypto_aead_reqsize(aead), 11262306a36Sopenharmony_ci __alignof__(struct scatterlist)); 11362306a36Sopenharmony_ci} 11462306a36Sopenharmony_ci 11562306a36Sopenharmony_cistatic void esp_ssg_unref(struct xfrm_state *x, void *tmp) 11662306a36Sopenharmony_ci{ 11762306a36Sopenharmony_ci struct crypto_aead *aead = x->data; 11862306a36Sopenharmony_ci int extralen = 0; 11962306a36Sopenharmony_ci u8 *iv; 12062306a36Sopenharmony_ci struct aead_request *req; 12162306a36Sopenharmony_ci struct scatterlist *sg; 12262306a36Sopenharmony_ci 12362306a36Sopenharmony_ci if (x->props.flags & XFRM_STATE_ESN) 12462306a36Sopenharmony_ci extralen += sizeof(struct esp_output_extra); 12562306a36Sopenharmony_ci 12662306a36Sopenharmony_ci iv = esp_tmp_iv(aead, tmp, extralen); 12762306a36Sopenharmony_ci req = esp_tmp_req(aead, iv); 12862306a36Sopenharmony_ci 12962306a36Sopenharmony_ci /* Unref skb_frag_pages in the src scatterlist if necessary. 13062306a36Sopenharmony_ci * Skip the first sg which comes from skb->data. 13162306a36Sopenharmony_ci */ 13262306a36Sopenharmony_ci if (req->src != req->dst) 13362306a36Sopenharmony_ci for (sg = sg_next(req->src); sg; sg = sg_next(sg)) 13462306a36Sopenharmony_ci put_page(sg_page(sg)); 13562306a36Sopenharmony_ci} 13662306a36Sopenharmony_ci 13762306a36Sopenharmony_ci#ifdef CONFIG_INET6_ESPINTCP 13862306a36Sopenharmony_cistruct esp_tcp_sk { 13962306a36Sopenharmony_ci struct sock *sk; 14062306a36Sopenharmony_ci struct rcu_head rcu; 14162306a36Sopenharmony_ci}; 14262306a36Sopenharmony_ci 14362306a36Sopenharmony_cistatic void esp_free_tcp_sk(struct rcu_head *head) 14462306a36Sopenharmony_ci{ 14562306a36Sopenharmony_ci struct esp_tcp_sk *esk = container_of(head, struct esp_tcp_sk, rcu); 14662306a36Sopenharmony_ci 14762306a36Sopenharmony_ci sock_put(esk->sk); 14862306a36Sopenharmony_ci kfree(esk); 14962306a36Sopenharmony_ci} 15062306a36Sopenharmony_ci 15162306a36Sopenharmony_cistatic struct sock *esp6_find_tcp_sk(struct xfrm_state *x) 15262306a36Sopenharmony_ci{ 15362306a36Sopenharmony_ci struct xfrm_encap_tmpl *encap = x->encap; 15462306a36Sopenharmony_ci struct net *net = xs_net(x); 15562306a36Sopenharmony_ci struct esp_tcp_sk *esk; 15662306a36Sopenharmony_ci __be16 sport, dport; 15762306a36Sopenharmony_ci struct sock *nsk; 15862306a36Sopenharmony_ci struct sock *sk; 15962306a36Sopenharmony_ci 16062306a36Sopenharmony_ci sk = rcu_dereference(x->encap_sk); 16162306a36Sopenharmony_ci if (sk && sk->sk_state == TCP_ESTABLISHED) 16262306a36Sopenharmony_ci return sk; 16362306a36Sopenharmony_ci 16462306a36Sopenharmony_ci spin_lock_bh(&x->lock); 16562306a36Sopenharmony_ci sport = encap->encap_sport; 16662306a36Sopenharmony_ci dport = encap->encap_dport; 16762306a36Sopenharmony_ci nsk = rcu_dereference_protected(x->encap_sk, 16862306a36Sopenharmony_ci lockdep_is_held(&x->lock)); 16962306a36Sopenharmony_ci if (sk && sk == nsk) { 17062306a36Sopenharmony_ci esk = kmalloc(sizeof(*esk), GFP_ATOMIC); 17162306a36Sopenharmony_ci if (!esk) { 17262306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 17362306a36Sopenharmony_ci return ERR_PTR(-ENOMEM); 17462306a36Sopenharmony_ci } 17562306a36Sopenharmony_ci RCU_INIT_POINTER(x->encap_sk, NULL); 17662306a36Sopenharmony_ci esk->sk = sk; 17762306a36Sopenharmony_ci call_rcu(&esk->rcu, esp_free_tcp_sk); 17862306a36Sopenharmony_ci } 17962306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 18062306a36Sopenharmony_ci 18162306a36Sopenharmony_ci sk = __inet6_lookup_established(net, net->ipv4.tcp_death_row.hashinfo, &x->id.daddr.in6, 18262306a36Sopenharmony_ci dport, &x->props.saddr.in6, ntohs(sport), 0, 0); 18362306a36Sopenharmony_ci if (!sk) 18462306a36Sopenharmony_ci return ERR_PTR(-ENOENT); 18562306a36Sopenharmony_ci 18662306a36Sopenharmony_ci if (!tcp_is_ulp_esp(sk)) { 18762306a36Sopenharmony_ci sock_put(sk); 18862306a36Sopenharmony_ci return ERR_PTR(-EINVAL); 18962306a36Sopenharmony_ci } 19062306a36Sopenharmony_ci 19162306a36Sopenharmony_ci spin_lock_bh(&x->lock); 19262306a36Sopenharmony_ci nsk = rcu_dereference_protected(x->encap_sk, 19362306a36Sopenharmony_ci lockdep_is_held(&x->lock)); 19462306a36Sopenharmony_ci if (encap->encap_sport != sport || 19562306a36Sopenharmony_ci encap->encap_dport != dport) { 19662306a36Sopenharmony_ci sock_put(sk); 19762306a36Sopenharmony_ci sk = nsk ?: ERR_PTR(-EREMCHG); 19862306a36Sopenharmony_ci } else if (sk == nsk) { 19962306a36Sopenharmony_ci sock_put(sk); 20062306a36Sopenharmony_ci } else { 20162306a36Sopenharmony_ci rcu_assign_pointer(x->encap_sk, sk); 20262306a36Sopenharmony_ci } 20362306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 20462306a36Sopenharmony_ci 20562306a36Sopenharmony_ci return sk; 20662306a36Sopenharmony_ci} 20762306a36Sopenharmony_ci 20862306a36Sopenharmony_cistatic int esp_output_tcp_finish(struct xfrm_state *x, struct sk_buff *skb) 20962306a36Sopenharmony_ci{ 21062306a36Sopenharmony_ci struct sock *sk; 21162306a36Sopenharmony_ci int err; 21262306a36Sopenharmony_ci 21362306a36Sopenharmony_ci rcu_read_lock(); 21462306a36Sopenharmony_ci 21562306a36Sopenharmony_ci sk = esp6_find_tcp_sk(x); 21662306a36Sopenharmony_ci err = PTR_ERR_OR_ZERO(sk); 21762306a36Sopenharmony_ci if (err) 21862306a36Sopenharmony_ci goto out; 21962306a36Sopenharmony_ci 22062306a36Sopenharmony_ci bh_lock_sock(sk); 22162306a36Sopenharmony_ci if (sock_owned_by_user(sk)) 22262306a36Sopenharmony_ci err = espintcp_queue_out(sk, skb); 22362306a36Sopenharmony_ci else 22462306a36Sopenharmony_ci err = espintcp_push_skb(sk, skb); 22562306a36Sopenharmony_ci bh_unlock_sock(sk); 22662306a36Sopenharmony_ci 22762306a36Sopenharmony_ciout: 22862306a36Sopenharmony_ci rcu_read_unlock(); 22962306a36Sopenharmony_ci return err; 23062306a36Sopenharmony_ci} 23162306a36Sopenharmony_ci 23262306a36Sopenharmony_cistatic int esp_output_tcp_encap_cb(struct net *net, struct sock *sk, 23362306a36Sopenharmony_ci struct sk_buff *skb) 23462306a36Sopenharmony_ci{ 23562306a36Sopenharmony_ci struct dst_entry *dst = skb_dst(skb); 23662306a36Sopenharmony_ci struct xfrm_state *x = dst->xfrm; 23762306a36Sopenharmony_ci 23862306a36Sopenharmony_ci return esp_output_tcp_finish(x, skb); 23962306a36Sopenharmony_ci} 24062306a36Sopenharmony_ci 24162306a36Sopenharmony_cistatic int esp_output_tail_tcp(struct xfrm_state *x, struct sk_buff *skb) 24262306a36Sopenharmony_ci{ 24362306a36Sopenharmony_ci int err; 24462306a36Sopenharmony_ci 24562306a36Sopenharmony_ci local_bh_disable(); 24662306a36Sopenharmony_ci err = xfrm_trans_queue_net(xs_net(x), skb, esp_output_tcp_encap_cb); 24762306a36Sopenharmony_ci local_bh_enable(); 24862306a36Sopenharmony_ci 24962306a36Sopenharmony_ci /* EINPROGRESS just happens to do the right thing. It 25062306a36Sopenharmony_ci * actually means that the skb has been consumed and 25162306a36Sopenharmony_ci * isn't coming back. 25262306a36Sopenharmony_ci */ 25362306a36Sopenharmony_ci return err ?: -EINPROGRESS; 25462306a36Sopenharmony_ci} 25562306a36Sopenharmony_ci#else 25662306a36Sopenharmony_cistatic int esp_output_tail_tcp(struct xfrm_state *x, struct sk_buff *skb) 25762306a36Sopenharmony_ci{ 25862306a36Sopenharmony_ci kfree_skb(skb); 25962306a36Sopenharmony_ci 26062306a36Sopenharmony_ci return -EOPNOTSUPP; 26162306a36Sopenharmony_ci} 26262306a36Sopenharmony_ci#endif 26362306a36Sopenharmony_ci 26462306a36Sopenharmony_cistatic void esp_output_encap_csum(struct sk_buff *skb) 26562306a36Sopenharmony_ci{ 26662306a36Sopenharmony_ci /* UDP encap with IPv6 requires a valid checksum */ 26762306a36Sopenharmony_ci if (*skb_mac_header(skb) == IPPROTO_UDP) { 26862306a36Sopenharmony_ci struct udphdr *uh = udp_hdr(skb); 26962306a36Sopenharmony_ci struct ipv6hdr *ip6h = ipv6_hdr(skb); 27062306a36Sopenharmony_ci int len = ntohs(uh->len); 27162306a36Sopenharmony_ci unsigned int offset = skb_transport_offset(skb); 27262306a36Sopenharmony_ci __wsum csum = skb_checksum(skb, offset, skb->len - offset, 0); 27362306a36Sopenharmony_ci 27462306a36Sopenharmony_ci uh->check = csum_ipv6_magic(&ip6h->saddr, &ip6h->daddr, 27562306a36Sopenharmony_ci len, IPPROTO_UDP, csum); 27662306a36Sopenharmony_ci if (uh->check == 0) 27762306a36Sopenharmony_ci uh->check = CSUM_MANGLED_0; 27862306a36Sopenharmony_ci } 27962306a36Sopenharmony_ci} 28062306a36Sopenharmony_ci 28162306a36Sopenharmony_cistatic void esp_output_done(void *data, int err) 28262306a36Sopenharmony_ci{ 28362306a36Sopenharmony_ci struct sk_buff *skb = data; 28462306a36Sopenharmony_ci struct xfrm_offload *xo = xfrm_offload(skb); 28562306a36Sopenharmony_ci void *tmp; 28662306a36Sopenharmony_ci struct xfrm_state *x; 28762306a36Sopenharmony_ci 28862306a36Sopenharmony_ci if (xo && (xo->flags & XFRM_DEV_RESUME)) { 28962306a36Sopenharmony_ci struct sec_path *sp = skb_sec_path(skb); 29062306a36Sopenharmony_ci 29162306a36Sopenharmony_ci x = sp->xvec[sp->len - 1]; 29262306a36Sopenharmony_ci } else { 29362306a36Sopenharmony_ci x = skb_dst(skb)->xfrm; 29462306a36Sopenharmony_ci } 29562306a36Sopenharmony_ci 29662306a36Sopenharmony_ci tmp = ESP_SKB_CB(skb)->tmp; 29762306a36Sopenharmony_ci esp_ssg_unref(x, tmp); 29862306a36Sopenharmony_ci kfree(tmp); 29962306a36Sopenharmony_ci 30062306a36Sopenharmony_ci esp_output_encap_csum(skb); 30162306a36Sopenharmony_ci 30262306a36Sopenharmony_ci if (xo && (xo->flags & XFRM_DEV_RESUME)) { 30362306a36Sopenharmony_ci if (err) { 30462306a36Sopenharmony_ci XFRM_INC_STATS(xs_net(x), LINUX_MIB_XFRMOUTSTATEPROTOERROR); 30562306a36Sopenharmony_ci kfree_skb(skb); 30662306a36Sopenharmony_ci return; 30762306a36Sopenharmony_ci } 30862306a36Sopenharmony_ci 30962306a36Sopenharmony_ci skb_push(skb, skb->data - skb_mac_header(skb)); 31062306a36Sopenharmony_ci secpath_reset(skb); 31162306a36Sopenharmony_ci xfrm_dev_resume(skb); 31262306a36Sopenharmony_ci } else { 31362306a36Sopenharmony_ci if (!err && 31462306a36Sopenharmony_ci x->encap && x->encap->encap_type == TCP_ENCAP_ESPINTCP) 31562306a36Sopenharmony_ci esp_output_tail_tcp(x, skb); 31662306a36Sopenharmony_ci else 31762306a36Sopenharmony_ci xfrm_output_resume(skb->sk, skb, err); 31862306a36Sopenharmony_ci } 31962306a36Sopenharmony_ci} 32062306a36Sopenharmony_ci 32162306a36Sopenharmony_ci/* Move ESP header back into place. */ 32262306a36Sopenharmony_cistatic void esp_restore_header(struct sk_buff *skb, unsigned int offset) 32362306a36Sopenharmony_ci{ 32462306a36Sopenharmony_ci struct ip_esp_hdr *esph = (void *)(skb->data + offset); 32562306a36Sopenharmony_ci void *tmp = ESP_SKB_CB(skb)->tmp; 32662306a36Sopenharmony_ci __be32 *seqhi = esp_tmp_extra(tmp); 32762306a36Sopenharmony_ci 32862306a36Sopenharmony_ci esph->seq_no = esph->spi; 32962306a36Sopenharmony_ci esph->spi = *seqhi; 33062306a36Sopenharmony_ci} 33162306a36Sopenharmony_ci 33262306a36Sopenharmony_cistatic void esp_output_restore_header(struct sk_buff *skb) 33362306a36Sopenharmony_ci{ 33462306a36Sopenharmony_ci void *tmp = ESP_SKB_CB(skb)->tmp; 33562306a36Sopenharmony_ci struct esp_output_extra *extra = esp_tmp_extra(tmp); 33662306a36Sopenharmony_ci 33762306a36Sopenharmony_ci esp_restore_header(skb, skb_transport_offset(skb) + extra->esphoff - 33862306a36Sopenharmony_ci sizeof(__be32)); 33962306a36Sopenharmony_ci} 34062306a36Sopenharmony_ci 34162306a36Sopenharmony_cistatic struct ip_esp_hdr *esp_output_set_esn(struct sk_buff *skb, 34262306a36Sopenharmony_ci struct xfrm_state *x, 34362306a36Sopenharmony_ci struct ip_esp_hdr *esph, 34462306a36Sopenharmony_ci struct esp_output_extra *extra) 34562306a36Sopenharmony_ci{ 34662306a36Sopenharmony_ci /* For ESN we move the header forward by 4 bytes to 34762306a36Sopenharmony_ci * accommodate the high bits. We will move it back after 34862306a36Sopenharmony_ci * encryption. 34962306a36Sopenharmony_ci */ 35062306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) { 35162306a36Sopenharmony_ci __u32 seqhi; 35262306a36Sopenharmony_ci struct xfrm_offload *xo = xfrm_offload(skb); 35362306a36Sopenharmony_ci 35462306a36Sopenharmony_ci if (xo) 35562306a36Sopenharmony_ci seqhi = xo->seq.hi; 35662306a36Sopenharmony_ci else 35762306a36Sopenharmony_ci seqhi = XFRM_SKB_CB(skb)->seq.output.hi; 35862306a36Sopenharmony_ci 35962306a36Sopenharmony_ci extra->esphoff = (unsigned char *)esph - 36062306a36Sopenharmony_ci skb_transport_header(skb); 36162306a36Sopenharmony_ci esph = (struct ip_esp_hdr *)((unsigned char *)esph - 4); 36262306a36Sopenharmony_ci extra->seqhi = esph->spi; 36362306a36Sopenharmony_ci esph->seq_no = htonl(seqhi); 36462306a36Sopenharmony_ci } 36562306a36Sopenharmony_ci 36662306a36Sopenharmony_ci esph->spi = x->id.spi; 36762306a36Sopenharmony_ci 36862306a36Sopenharmony_ci return esph; 36962306a36Sopenharmony_ci} 37062306a36Sopenharmony_ci 37162306a36Sopenharmony_cistatic void esp_output_done_esn(void *data, int err) 37262306a36Sopenharmony_ci{ 37362306a36Sopenharmony_ci struct sk_buff *skb = data; 37462306a36Sopenharmony_ci 37562306a36Sopenharmony_ci esp_output_restore_header(skb); 37662306a36Sopenharmony_ci esp_output_done(data, err); 37762306a36Sopenharmony_ci} 37862306a36Sopenharmony_ci 37962306a36Sopenharmony_cistatic struct ip_esp_hdr *esp6_output_udp_encap(struct sk_buff *skb, 38062306a36Sopenharmony_ci int encap_type, 38162306a36Sopenharmony_ci struct esp_info *esp, 38262306a36Sopenharmony_ci __be16 sport, 38362306a36Sopenharmony_ci __be16 dport) 38462306a36Sopenharmony_ci{ 38562306a36Sopenharmony_ci struct udphdr *uh; 38662306a36Sopenharmony_ci __be32 *udpdata32; 38762306a36Sopenharmony_ci unsigned int len; 38862306a36Sopenharmony_ci 38962306a36Sopenharmony_ci len = skb->len + esp->tailen - skb_transport_offset(skb); 39062306a36Sopenharmony_ci if (len > U16_MAX) 39162306a36Sopenharmony_ci return ERR_PTR(-EMSGSIZE); 39262306a36Sopenharmony_ci 39362306a36Sopenharmony_ci uh = (struct udphdr *)esp->esph; 39462306a36Sopenharmony_ci uh->source = sport; 39562306a36Sopenharmony_ci uh->dest = dport; 39662306a36Sopenharmony_ci uh->len = htons(len); 39762306a36Sopenharmony_ci uh->check = 0; 39862306a36Sopenharmony_ci 39962306a36Sopenharmony_ci *skb_mac_header(skb) = IPPROTO_UDP; 40062306a36Sopenharmony_ci 40162306a36Sopenharmony_ci if (encap_type == UDP_ENCAP_ESPINUDP_NON_IKE) { 40262306a36Sopenharmony_ci udpdata32 = (__be32 *)(uh + 1); 40362306a36Sopenharmony_ci udpdata32[0] = udpdata32[1] = 0; 40462306a36Sopenharmony_ci return (struct ip_esp_hdr *)(udpdata32 + 2); 40562306a36Sopenharmony_ci } 40662306a36Sopenharmony_ci 40762306a36Sopenharmony_ci return (struct ip_esp_hdr *)(uh + 1); 40862306a36Sopenharmony_ci} 40962306a36Sopenharmony_ci 41062306a36Sopenharmony_ci#ifdef CONFIG_INET6_ESPINTCP 41162306a36Sopenharmony_cistatic struct ip_esp_hdr *esp6_output_tcp_encap(struct xfrm_state *x, 41262306a36Sopenharmony_ci struct sk_buff *skb, 41362306a36Sopenharmony_ci struct esp_info *esp) 41462306a36Sopenharmony_ci{ 41562306a36Sopenharmony_ci __be16 *lenp = (void *)esp->esph; 41662306a36Sopenharmony_ci struct ip_esp_hdr *esph; 41762306a36Sopenharmony_ci unsigned int len; 41862306a36Sopenharmony_ci struct sock *sk; 41962306a36Sopenharmony_ci 42062306a36Sopenharmony_ci len = skb->len + esp->tailen - skb_transport_offset(skb); 42162306a36Sopenharmony_ci if (len > IP_MAX_MTU) 42262306a36Sopenharmony_ci return ERR_PTR(-EMSGSIZE); 42362306a36Sopenharmony_ci 42462306a36Sopenharmony_ci rcu_read_lock(); 42562306a36Sopenharmony_ci sk = esp6_find_tcp_sk(x); 42662306a36Sopenharmony_ci rcu_read_unlock(); 42762306a36Sopenharmony_ci 42862306a36Sopenharmony_ci if (IS_ERR(sk)) 42962306a36Sopenharmony_ci return ERR_CAST(sk); 43062306a36Sopenharmony_ci 43162306a36Sopenharmony_ci *lenp = htons(len); 43262306a36Sopenharmony_ci esph = (struct ip_esp_hdr *)(lenp + 1); 43362306a36Sopenharmony_ci 43462306a36Sopenharmony_ci return esph; 43562306a36Sopenharmony_ci} 43662306a36Sopenharmony_ci#else 43762306a36Sopenharmony_cistatic struct ip_esp_hdr *esp6_output_tcp_encap(struct xfrm_state *x, 43862306a36Sopenharmony_ci struct sk_buff *skb, 43962306a36Sopenharmony_ci struct esp_info *esp) 44062306a36Sopenharmony_ci{ 44162306a36Sopenharmony_ci return ERR_PTR(-EOPNOTSUPP); 44262306a36Sopenharmony_ci} 44362306a36Sopenharmony_ci#endif 44462306a36Sopenharmony_ci 44562306a36Sopenharmony_cistatic int esp6_output_encap(struct xfrm_state *x, struct sk_buff *skb, 44662306a36Sopenharmony_ci struct esp_info *esp) 44762306a36Sopenharmony_ci{ 44862306a36Sopenharmony_ci struct xfrm_encap_tmpl *encap = x->encap; 44962306a36Sopenharmony_ci struct ip_esp_hdr *esph; 45062306a36Sopenharmony_ci __be16 sport, dport; 45162306a36Sopenharmony_ci int encap_type; 45262306a36Sopenharmony_ci 45362306a36Sopenharmony_ci spin_lock_bh(&x->lock); 45462306a36Sopenharmony_ci sport = encap->encap_sport; 45562306a36Sopenharmony_ci dport = encap->encap_dport; 45662306a36Sopenharmony_ci encap_type = encap->encap_type; 45762306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 45862306a36Sopenharmony_ci 45962306a36Sopenharmony_ci switch (encap_type) { 46062306a36Sopenharmony_ci default: 46162306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP: 46262306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP_NON_IKE: 46362306a36Sopenharmony_ci esph = esp6_output_udp_encap(skb, encap_type, esp, sport, dport); 46462306a36Sopenharmony_ci break; 46562306a36Sopenharmony_ci case TCP_ENCAP_ESPINTCP: 46662306a36Sopenharmony_ci esph = esp6_output_tcp_encap(x, skb, esp); 46762306a36Sopenharmony_ci break; 46862306a36Sopenharmony_ci } 46962306a36Sopenharmony_ci 47062306a36Sopenharmony_ci if (IS_ERR(esph)) 47162306a36Sopenharmony_ci return PTR_ERR(esph); 47262306a36Sopenharmony_ci 47362306a36Sopenharmony_ci esp->esph = esph; 47462306a36Sopenharmony_ci 47562306a36Sopenharmony_ci return 0; 47662306a36Sopenharmony_ci} 47762306a36Sopenharmony_ci 47862306a36Sopenharmony_ciint esp6_output_head(struct xfrm_state *x, struct sk_buff *skb, struct esp_info *esp) 47962306a36Sopenharmony_ci{ 48062306a36Sopenharmony_ci u8 *tail; 48162306a36Sopenharmony_ci int nfrags; 48262306a36Sopenharmony_ci int esph_offset; 48362306a36Sopenharmony_ci struct page *page; 48462306a36Sopenharmony_ci struct sk_buff *trailer; 48562306a36Sopenharmony_ci int tailen = esp->tailen; 48662306a36Sopenharmony_ci 48762306a36Sopenharmony_ci if (x->encap) { 48862306a36Sopenharmony_ci int err = esp6_output_encap(x, skb, esp); 48962306a36Sopenharmony_ci 49062306a36Sopenharmony_ci if (err < 0) 49162306a36Sopenharmony_ci return err; 49262306a36Sopenharmony_ci } 49362306a36Sopenharmony_ci 49462306a36Sopenharmony_ci if (ALIGN(tailen, L1_CACHE_BYTES) > PAGE_SIZE || 49562306a36Sopenharmony_ci ALIGN(skb->data_len, L1_CACHE_BYTES) > PAGE_SIZE) 49662306a36Sopenharmony_ci goto cow; 49762306a36Sopenharmony_ci 49862306a36Sopenharmony_ci if (!skb_cloned(skb)) { 49962306a36Sopenharmony_ci if (tailen <= skb_tailroom(skb)) { 50062306a36Sopenharmony_ci nfrags = 1; 50162306a36Sopenharmony_ci trailer = skb; 50262306a36Sopenharmony_ci tail = skb_tail_pointer(trailer); 50362306a36Sopenharmony_ci 50462306a36Sopenharmony_ci goto skip_cow; 50562306a36Sopenharmony_ci } else if ((skb_shinfo(skb)->nr_frags < MAX_SKB_FRAGS) 50662306a36Sopenharmony_ci && !skb_has_frag_list(skb)) { 50762306a36Sopenharmony_ci int allocsize; 50862306a36Sopenharmony_ci struct sock *sk = skb->sk; 50962306a36Sopenharmony_ci struct page_frag *pfrag = &x->xfrag; 51062306a36Sopenharmony_ci 51162306a36Sopenharmony_ci esp->inplace = false; 51262306a36Sopenharmony_ci 51362306a36Sopenharmony_ci allocsize = ALIGN(tailen, L1_CACHE_BYTES); 51462306a36Sopenharmony_ci 51562306a36Sopenharmony_ci spin_lock_bh(&x->lock); 51662306a36Sopenharmony_ci 51762306a36Sopenharmony_ci if (unlikely(!skb_page_frag_refill(allocsize, pfrag, GFP_ATOMIC))) { 51862306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 51962306a36Sopenharmony_ci goto cow; 52062306a36Sopenharmony_ci } 52162306a36Sopenharmony_ci 52262306a36Sopenharmony_ci page = pfrag->page; 52362306a36Sopenharmony_ci get_page(page); 52462306a36Sopenharmony_ci 52562306a36Sopenharmony_ci tail = page_address(page) + pfrag->offset; 52662306a36Sopenharmony_ci 52762306a36Sopenharmony_ci esp_output_fill_trailer(tail, esp->tfclen, esp->plen, esp->proto); 52862306a36Sopenharmony_ci 52962306a36Sopenharmony_ci nfrags = skb_shinfo(skb)->nr_frags; 53062306a36Sopenharmony_ci 53162306a36Sopenharmony_ci __skb_fill_page_desc(skb, nfrags, page, pfrag->offset, 53262306a36Sopenharmony_ci tailen); 53362306a36Sopenharmony_ci skb_shinfo(skb)->nr_frags = ++nfrags; 53462306a36Sopenharmony_ci 53562306a36Sopenharmony_ci pfrag->offset = pfrag->offset + allocsize; 53662306a36Sopenharmony_ci 53762306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 53862306a36Sopenharmony_ci 53962306a36Sopenharmony_ci nfrags++; 54062306a36Sopenharmony_ci 54162306a36Sopenharmony_ci skb->len += tailen; 54262306a36Sopenharmony_ci skb->data_len += tailen; 54362306a36Sopenharmony_ci skb->truesize += tailen; 54462306a36Sopenharmony_ci if (sk && sk_fullsock(sk)) 54562306a36Sopenharmony_ci refcount_add(tailen, &sk->sk_wmem_alloc); 54662306a36Sopenharmony_ci 54762306a36Sopenharmony_ci goto out; 54862306a36Sopenharmony_ci } 54962306a36Sopenharmony_ci } 55062306a36Sopenharmony_ci 55162306a36Sopenharmony_cicow: 55262306a36Sopenharmony_ci esph_offset = (unsigned char *)esp->esph - skb_transport_header(skb); 55362306a36Sopenharmony_ci 55462306a36Sopenharmony_ci nfrags = skb_cow_data(skb, tailen, &trailer); 55562306a36Sopenharmony_ci if (nfrags < 0) 55662306a36Sopenharmony_ci goto out; 55762306a36Sopenharmony_ci tail = skb_tail_pointer(trailer); 55862306a36Sopenharmony_ci esp->esph = (struct ip_esp_hdr *)(skb_transport_header(skb) + esph_offset); 55962306a36Sopenharmony_ci 56062306a36Sopenharmony_ciskip_cow: 56162306a36Sopenharmony_ci esp_output_fill_trailer(tail, esp->tfclen, esp->plen, esp->proto); 56262306a36Sopenharmony_ci pskb_put(skb, trailer, tailen); 56362306a36Sopenharmony_ci 56462306a36Sopenharmony_ciout: 56562306a36Sopenharmony_ci return nfrags; 56662306a36Sopenharmony_ci} 56762306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(esp6_output_head); 56862306a36Sopenharmony_ci 56962306a36Sopenharmony_ciint esp6_output_tail(struct xfrm_state *x, struct sk_buff *skb, struct esp_info *esp) 57062306a36Sopenharmony_ci{ 57162306a36Sopenharmony_ci u8 *iv; 57262306a36Sopenharmony_ci int alen; 57362306a36Sopenharmony_ci void *tmp; 57462306a36Sopenharmony_ci int ivlen; 57562306a36Sopenharmony_ci int assoclen; 57662306a36Sopenharmony_ci int extralen; 57762306a36Sopenharmony_ci struct page *page; 57862306a36Sopenharmony_ci struct ip_esp_hdr *esph; 57962306a36Sopenharmony_ci struct aead_request *req; 58062306a36Sopenharmony_ci struct crypto_aead *aead; 58162306a36Sopenharmony_ci struct scatterlist *sg, *dsg; 58262306a36Sopenharmony_ci struct esp_output_extra *extra; 58362306a36Sopenharmony_ci int err = -ENOMEM; 58462306a36Sopenharmony_ci 58562306a36Sopenharmony_ci assoclen = sizeof(struct ip_esp_hdr); 58662306a36Sopenharmony_ci extralen = 0; 58762306a36Sopenharmony_ci 58862306a36Sopenharmony_ci if (x->props.flags & XFRM_STATE_ESN) { 58962306a36Sopenharmony_ci extralen += sizeof(*extra); 59062306a36Sopenharmony_ci assoclen += sizeof(__be32); 59162306a36Sopenharmony_ci } 59262306a36Sopenharmony_ci 59362306a36Sopenharmony_ci aead = x->data; 59462306a36Sopenharmony_ci alen = crypto_aead_authsize(aead); 59562306a36Sopenharmony_ci ivlen = crypto_aead_ivsize(aead); 59662306a36Sopenharmony_ci 59762306a36Sopenharmony_ci tmp = esp_alloc_tmp(aead, esp->nfrags + 2, extralen); 59862306a36Sopenharmony_ci if (!tmp) 59962306a36Sopenharmony_ci goto error; 60062306a36Sopenharmony_ci 60162306a36Sopenharmony_ci extra = esp_tmp_extra(tmp); 60262306a36Sopenharmony_ci iv = esp_tmp_iv(aead, tmp, extralen); 60362306a36Sopenharmony_ci req = esp_tmp_req(aead, iv); 60462306a36Sopenharmony_ci sg = esp_req_sg(aead, req); 60562306a36Sopenharmony_ci 60662306a36Sopenharmony_ci if (esp->inplace) 60762306a36Sopenharmony_ci dsg = sg; 60862306a36Sopenharmony_ci else 60962306a36Sopenharmony_ci dsg = &sg[esp->nfrags]; 61062306a36Sopenharmony_ci 61162306a36Sopenharmony_ci esph = esp_output_set_esn(skb, x, esp->esph, extra); 61262306a36Sopenharmony_ci esp->esph = esph; 61362306a36Sopenharmony_ci 61462306a36Sopenharmony_ci sg_init_table(sg, esp->nfrags); 61562306a36Sopenharmony_ci err = skb_to_sgvec(skb, sg, 61662306a36Sopenharmony_ci (unsigned char *)esph - skb->data, 61762306a36Sopenharmony_ci assoclen + ivlen + esp->clen + alen); 61862306a36Sopenharmony_ci if (unlikely(err < 0)) 61962306a36Sopenharmony_ci goto error_free; 62062306a36Sopenharmony_ci 62162306a36Sopenharmony_ci if (!esp->inplace) { 62262306a36Sopenharmony_ci int allocsize; 62362306a36Sopenharmony_ci struct page_frag *pfrag = &x->xfrag; 62462306a36Sopenharmony_ci 62562306a36Sopenharmony_ci allocsize = ALIGN(skb->data_len, L1_CACHE_BYTES); 62662306a36Sopenharmony_ci 62762306a36Sopenharmony_ci spin_lock_bh(&x->lock); 62862306a36Sopenharmony_ci if (unlikely(!skb_page_frag_refill(allocsize, pfrag, GFP_ATOMIC))) { 62962306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 63062306a36Sopenharmony_ci goto error_free; 63162306a36Sopenharmony_ci } 63262306a36Sopenharmony_ci 63362306a36Sopenharmony_ci skb_shinfo(skb)->nr_frags = 1; 63462306a36Sopenharmony_ci 63562306a36Sopenharmony_ci page = pfrag->page; 63662306a36Sopenharmony_ci get_page(page); 63762306a36Sopenharmony_ci /* replace page frags in skb with new page */ 63862306a36Sopenharmony_ci __skb_fill_page_desc(skb, 0, page, pfrag->offset, skb->data_len); 63962306a36Sopenharmony_ci pfrag->offset = pfrag->offset + allocsize; 64062306a36Sopenharmony_ci spin_unlock_bh(&x->lock); 64162306a36Sopenharmony_ci 64262306a36Sopenharmony_ci sg_init_table(dsg, skb_shinfo(skb)->nr_frags + 1); 64362306a36Sopenharmony_ci err = skb_to_sgvec(skb, dsg, 64462306a36Sopenharmony_ci (unsigned char *)esph - skb->data, 64562306a36Sopenharmony_ci assoclen + ivlen + esp->clen + alen); 64662306a36Sopenharmony_ci if (unlikely(err < 0)) 64762306a36Sopenharmony_ci goto error_free; 64862306a36Sopenharmony_ci } 64962306a36Sopenharmony_ci 65062306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) 65162306a36Sopenharmony_ci aead_request_set_callback(req, 0, esp_output_done_esn, skb); 65262306a36Sopenharmony_ci else 65362306a36Sopenharmony_ci aead_request_set_callback(req, 0, esp_output_done, skb); 65462306a36Sopenharmony_ci 65562306a36Sopenharmony_ci aead_request_set_crypt(req, sg, dsg, ivlen + esp->clen, iv); 65662306a36Sopenharmony_ci aead_request_set_ad(req, assoclen); 65762306a36Sopenharmony_ci 65862306a36Sopenharmony_ci memset(iv, 0, ivlen); 65962306a36Sopenharmony_ci memcpy(iv + ivlen - min(ivlen, 8), (u8 *)&esp->seqno + 8 - min(ivlen, 8), 66062306a36Sopenharmony_ci min(ivlen, 8)); 66162306a36Sopenharmony_ci 66262306a36Sopenharmony_ci ESP_SKB_CB(skb)->tmp = tmp; 66362306a36Sopenharmony_ci err = crypto_aead_encrypt(req); 66462306a36Sopenharmony_ci 66562306a36Sopenharmony_ci switch (err) { 66662306a36Sopenharmony_ci case -EINPROGRESS: 66762306a36Sopenharmony_ci goto error; 66862306a36Sopenharmony_ci 66962306a36Sopenharmony_ci case -ENOSPC: 67062306a36Sopenharmony_ci err = NET_XMIT_DROP; 67162306a36Sopenharmony_ci break; 67262306a36Sopenharmony_ci 67362306a36Sopenharmony_ci case 0: 67462306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) 67562306a36Sopenharmony_ci esp_output_restore_header(skb); 67662306a36Sopenharmony_ci esp_output_encap_csum(skb); 67762306a36Sopenharmony_ci } 67862306a36Sopenharmony_ci 67962306a36Sopenharmony_ci if (sg != dsg) 68062306a36Sopenharmony_ci esp_ssg_unref(x, tmp); 68162306a36Sopenharmony_ci 68262306a36Sopenharmony_ci if (!err && x->encap && x->encap->encap_type == TCP_ENCAP_ESPINTCP) 68362306a36Sopenharmony_ci err = esp_output_tail_tcp(x, skb); 68462306a36Sopenharmony_ci 68562306a36Sopenharmony_cierror_free: 68662306a36Sopenharmony_ci kfree(tmp); 68762306a36Sopenharmony_cierror: 68862306a36Sopenharmony_ci return err; 68962306a36Sopenharmony_ci} 69062306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(esp6_output_tail); 69162306a36Sopenharmony_ci 69262306a36Sopenharmony_cistatic int esp6_output(struct xfrm_state *x, struct sk_buff *skb) 69362306a36Sopenharmony_ci{ 69462306a36Sopenharmony_ci int alen; 69562306a36Sopenharmony_ci int blksize; 69662306a36Sopenharmony_ci struct ip_esp_hdr *esph; 69762306a36Sopenharmony_ci struct crypto_aead *aead; 69862306a36Sopenharmony_ci struct esp_info esp; 69962306a36Sopenharmony_ci 70062306a36Sopenharmony_ci esp.inplace = true; 70162306a36Sopenharmony_ci 70262306a36Sopenharmony_ci esp.proto = *skb_mac_header(skb); 70362306a36Sopenharmony_ci *skb_mac_header(skb) = IPPROTO_ESP; 70462306a36Sopenharmony_ci 70562306a36Sopenharmony_ci /* skb is pure payload to encrypt */ 70662306a36Sopenharmony_ci 70762306a36Sopenharmony_ci aead = x->data; 70862306a36Sopenharmony_ci alen = crypto_aead_authsize(aead); 70962306a36Sopenharmony_ci 71062306a36Sopenharmony_ci esp.tfclen = 0; 71162306a36Sopenharmony_ci if (x->tfcpad) { 71262306a36Sopenharmony_ci struct xfrm_dst *dst = (struct xfrm_dst *)skb_dst(skb); 71362306a36Sopenharmony_ci u32 padto; 71462306a36Sopenharmony_ci 71562306a36Sopenharmony_ci padto = min(x->tfcpad, xfrm_state_mtu(x, dst->child_mtu_cached)); 71662306a36Sopenharmony_ci if (skb->len < padto) 71762306a36Sopenharmony_ci esp.tfclen = padto - skb->len; 71862306a36Sopenharmony_ci } 71962306a36Sopenharmony_ci blksize = ALIGN(crypto_aead_blocksize(aead), 4); 72062306a36Sopenharmony_ci esp.clen = ALIGN(skb->len + 2 + esp.tfclen, blksize); 72162306a36Sopenharmony_ci esp.plen = esp.clen - skb->len - esp.tfclen; 72262306a36Sopenharmony_ci esp.tailen = esp.tfclen + esp.plen + alen; 72362306a36Sopenharmony_ci 72462306a36Sopenharmony_ci esp.esph = ip_esp_hdr(skb); 72562306a36Sopenharmony_ci 72662306a36Sopenharmony_ci esp.nfrags = esp6_output_head(x, skb, &esp); 72762306a36Sopenharmony_ci if (esp.nfrags < 0) 72862306a36Sopenharmony_ci return esp.nfrags; 72962306a36Sopenharmony_ci 73062306a36Sopenharmony_ci esph = esp.esph; 73162306a36Sopenharmony_ci esph->spi = x->id.spi; 73262306a36Sopenharmony_ci 73362306a36Sopenharmony_ci esph->seq_no = htonl(XFRM_SKB_CB(skb)->seq.output.low); 73462306a36Sopenharmony_ci esp.seqno = cpu_to_be64(XFRM_SKB_CB(skb)->seq.output.low + 73562306a36Sopenharmony_ci ((u64)XFRM_SKB_CB(skb)->seq.output.hi << 32)); 73662306a36Sopenharmony_ci 73762306a36Sopenharmony_ci skb_push(skb, -skb_network_offset(skb)); 73862306a36Sopenharmony_ci 73962306a36Sopenharmony_ci return esp6_output_tail(x, skb, &esp); 74062306a36Sopenharmony_ci} 74162306a36Sopenharmony_ci 74262306a36Sopenharmony_cistatic inline int esp_remove_trailer(struct sk_buff *skb) 74362306a36Sopenharmony_ci{ 74462306a36Sopenharmony_ci struct xfrm_state *x = xfrm_input_state(skb); 74562306a36Sopenharmony_ci struct crypto_aead *aead = x->data; 74662306a36Sopenharmony_ci int alen, hlen, elen; 74762306a36Sopenharmony_ci int padlen, trimlen; 74862306a36Sopenharmony_ci __wsum csumdiff; 74962306a36Sopenharmony_ci u8 nexthdr[2]; 75062306a36Sopenharmony_ci int ret; 75162306a36Sopenharmony_ci 75262306a36Sopenharmony_ci alen = crypto_aead_authsize(aead); 75362306a36Sopenharmony_ci hlen = sizeof(struct ip_esp_hdr) + crypto_aead_ivsize(aead); 75462306a36Sopenharmony_ci elen = skb->len - hlen; 75562306a36Sopenharmony_ci 75662306a36Sopenharmony_ci ret = skb_copy_bits(skb, skb->len - alen - 2, nexthdr, 2); 75762306a36Sopenharmony_ci BUG_ON(ret); 75862306a36Sopenharmony_ci 75962306a36Sopenharmony_ci ret = -EINVAL; 76062306a36Sopenharmony_ci padlen = nexthdr[0]; 76162306a36Sopenharmony_ci if (padlen + 2 + alen >= elen) { 76262306a36Sopenharmony_ci net_dbg_ratelimited("ipsec esp packet is garbage padlen=%d, elen=%d\n", 76362306a36Sopenharmony_ci padlen + 2, elen - alen); 76462306a36Sopenharmony_ci goto out; 76562306a36Sopenharmony_ci } 76662306a36Sopenharmony_ci 76762306a36Sopenharmony_ci trimlen = alen + padlen + 2; 76862306a36Sopenharmony_ci if (skb->ip_summed == CHECKSUM_COMPLETE) { 76962306a36Sopenharmony_ci csumdiff = skb_checksum(skb, skb->len - trimlen, trimlen, 0); 77062306a36Sopenharmony_ci skb->csum = csum_block_sub(skb->csum, csumdiff, 77162306a36Sopenharmony_ci skb->len - trimlen); 77262306a36Sopenharmony_ci } 77362306a36Sopenharmony_ci ret = pskb_trim(skb, skb->len - trimlen); 77462306a36Sopenharmony_ci if (unlikely(ret)) 77562306a36Sopenharmony_ci return ret; 77662306a36Sopenharmony_ci 77762306a36Sopenharmony_ci ret = nexthdr[1]; 77862306a36Sopenharmony_ci 77962306a36Sopenharmony_ciout: 78062306a36Sopenharmony_ci return ret; 78162306a36Sopenharmony_ci} 78262306a36Sopenharmony_ci 78362306a36Sopenharmony_ciint esp6_input_done2(struct sk_buff *skb, int err) 78462306a36Sopenharmony_ci{ 78562306a36Sopenharmony_ci struct xfrm_state *x = xfrm_input_state(skb); 78662306a36Sopenharmony_ci struct xfrm_offload *xo = xfrm_offload(skb); 78762306a36Sopenharmony_ci struct crypto_aead *aead = x->data; 78862306a36Sopenharmony_ci int hlen = sizeof(struct ip_esp_hdr) + crypto_aead_ivsize(aead); 78962306a36Sopenharmony_ci int hdr_len = skb_network_header_len(skb); 79062306a36Sopenharmony_ci 79162306a36Sopenharmony_ci if (!xo || !(xo->flags & CRYPTO_DONE)) 79262306a36Sopenharmony_ci kfree(ESP_SKB_CB(skb)->tmp); 79362306a36Sopenharmony_ci 79462306a36Sopenharmony_ci if (unlikely(err)) 79562306a36Sopenharmony_ci goto out; 79662306a36Sopenharmony_ci 79762306a36Sopenharmony_ci err = esp_remove_trailer(skb); 79862306a36Sopenharmony_ci if (unlikely(err < 0)) 79962306a36Sopenharmony_ci goto out; 80062306a36Sopenharmony_ci 80162306a36Sopenharmony_ci if (x->encap) { 80262306a36Sopenharmony_ci const struct ipv6hdr *ip6h = ipv6_hdr(skb); 80362306a36Sopenharmony_ci int offset = skb_network_offset(skb) + sizeof(*ip6h); 80462306a36Sopenharmony_ci struct xfrm_encap_tmpl *encap = x->encap; 80562306a36Sopenharmony_ci u8 nexthdr = ip6h->nexthdr; 80662306a36Sopenharmony_ci __be16 frag_off, source; 80762306a36Sopenharmony_ci struct udphdr *uh; 80862306a36Sopenharmony_ci struct tcphdr *th; 80962306a36Sopenharmony_ci 81062306a36Sopenharmony_ci offset = ipv6_skip_exthdr(skb, offset, &nexthdr, &frag_off); 81162306a36Sopenharmony_ci if (offset == -1) { 81262306a36Sopenharmony_ci err = -EINVAL; 81362306a36Sopenharmony_ci goto out; 81462306a36Sopenharmony_ci } 81562306a36Sopenharmony_ci 81662306a36Sopenharmony_ci uh = (void *)(skb->data + offset); 81762306a36Sopenharmony_ci th = (void *)(skb->data + offset); 81862306a36Sopenharmony_ci hdr_len += offset; 81962306a36Sopenharmony_ci 82062306a36Sopenharmony_ci switch (x->encap->encap_type) { 82162306a36Sopenharmony_ci case TCP_ENCAP_ESPINTCP: 82262306a36Sopenharmony_ci source = th->source; 82362306a36Sopenharmony_ci break; 82462306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP: 82562306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP_NON_IKE: 82662306a36Sopenharmony_ci source = uh->source; 82762306a36Sopenharmony_ci break; 82862306a36Sopenharmony_ci default: 82962306a36Sopenharmony_ci WARN_ON_ONCE(1); 83062306a36Sopenharmony_ci err = -EINVAL; 83162306a36Sopenharmony_ci goto out; 83262306a36Sopenharmony_ci } 83362306a36Sopenharmony_ci 83462306a36Sopenharmony_ci /* 83562306a36Sopenharmony_ci * 1) if the NAT-T peer's IP or port changed then 83662306a36Sopenharmony_ci * advertise the change to the keying daemon. 83762306a36Sopenharmony_ci * This is an inbound SA, so just compare 83862306a36Sopenharmony_ci * SRC ports. 83962306a36Sopenharmony_ci */ 84062306a36Sopenharmony_ci if (!ipv6_addr_equal(&ip6h->saddr, &x->props.saddr.in6) || 84162306a36Sopenharmony_ci source != encap->encap_sport) { 84262306a36Sopenharmony_ci xfrm_address_t ipaddr; 84362306a36Sopenharmony_ci 84462306a36Sopenharmony_ci memcpy(&ipaddr.a6, &ip6h->saddr.s6_addr, sizeof(ipaddr.a6)); 84562306a36Sopenharmony_ci km_new_mapping(x, &ipaddr, source); 84662306a36Sopenharmony_ci 84762306a36Sopenharmony_ci /* XXX: perhaps add an extra 84862306a36Sopenharmony_ci * policy check here, to see 84962306a36Sopenharmony_ci * if we should allow or 85062306a36Sopenharmony_ci * reject a packet from a 85162306a36Sopenharmony_ci * different source 85262306a36Sopenharmony_ci * address/port. 85362306a36Sopenharmony_ci */ 85462306a36Sopenharmony_ci } 85562306a36Sopenharmony_ci 85662306a36Sopenharmony_ci /* 85762306a36Sopenharmony_ci * 2) ignore UDP/TCP checksums in case 85862306a36Sopenharmony_ci * of NAT-T in Transport Mode, or 85962306a36Sopenharmony_ci * perform other post-processing fixes 86062306a36Sopenharmony_ci * as per draft-ietf-ipsec-udp-encaps-06, 86162306a36Sopenharmony_ci * section 3.1.2 86262306a36Sopenharmony_ci */ 86362306a36Sopenharmony_ci if (x->props.mode == XFRM_MODE_TRANSPORT) 86462306a36Sopenharmony_ci skb->ip_summed = CHECKSUM_UNNECESSARY; 86562306a36Sopenharmony_ci } 86662306a36Sopenharmony_ci 86762306a36Sopenharmony_ci skb_postpull_rcsum(skb, skb_network_header(skb), 86862306a36Sopenharmony_ci skb_network_header_len(skb)); 86962306a36Sopenharmony_ci skb_pull_rcsum(skb, hlen); 87062306a36Sopenharmony_ci if (x->props.mode == XFRM_MODE_TUNNEL) 87162306a36Sopenharmony_ci skb_reset_transport_header(skb); 87262306a36Sopenharmony_ci else 87362306a36Sopenharmony_ci skb_set_transport_header(skb, -hdr_len); 87462306a36Sopenharmony_ci 87562306a36Sopenharmony_ci /* RFC4303: Drop dummy packets without any error */ 87662306a36Sopenharmony_ci if (err == IPPROTO_NONE) 87762306a36Sopenharmony_ci err = -EINVAL; 87862306a36Sopenharmony_ci 87962306a36Sopenharmony_ciout: 88062306a36Sopenharmony_ci return err; 88162306a36Sopenharmony_ci} 88262306a36Sopenharmony_ciEXPORT_SYMBOL_GPL(esp6_input_done2); 88362306a36Sopenharmony_ci 88462306a36Sopenharmony_cistatic void esp_input_done(void *data, int err) 88562306a36Sopenharmony_ci{ 88662306a36Sopenharmony_ci struct sk_buff *skb = data; 88762306a36Sopenharmony_ci 88862306a36Sopenharmony_ci xfrm_input_resume(skb, esp6_input_done2(skb, err)); 88962306a36Sopenharmony_ci} 89062306a36Sopenharmony_ci 89162306a36Sopenharmony_cistatic void esp_input_restore_header(struct sk_buff *skb) 89262306a36Sopenharmony_ci{ 89362306a36Sopenharmony_ci esp_restore_header(skb, 0); 89462306a36Sopenharmony_ci __skb_pull(skb, 4); 89562306a36Sopenharmony_ci} 89662306a36Sopenharmony_ci 89762306a36Sopenharmony_cistatic void esp_input_set_header(struct sk_buff *skb, __be32 *seqhi) 89862306a36Sopenharmony_ci{ 89962306a36Sopenharmony_ci struct xfrm_state *x = xfrm_input_state(skb); 90062306a36Sopenharmony_ci 90162306a36Sopenharmony_ci /* For ESN we move the header forward by 4 bytes to 90262306a36Sopenharmony_ci * accommodate the high bits. We will move it back after 90362306a36Sopenharmony_ci * decryption. 90462306a36Sopenharmony_ci */ 90562306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) { 90662306a36Sopenharmony_ci struct ip_esp_hdr *esph = skb_push(skb, 4); 90762306a36Sopenharmony_ci 90862306a36Sopenharmony_ci *seqhi = esph->spi; 90962306a36Sopenharmony_ci esph->spi = esph->seq_no; 91062306a36Sopenharmony_ci esph->seq_no = XFRM_SKB_CB(skb)->seq.input.hi; 91162306a36Sopenharmony_ci } 91262306a36Sopenharmony_ci} 91362306a36Sopenharmony_ci 91462306a36Sopenharmony_cistatic void esp_input_done_esn(void *data, int err) 91562306a36Sopenharmony_ci{ 91662306a36Sopenharmony_ci struct sk_buff *skb = data; 91762306a36Sopenharmony_ci 91862306a36Sopenharmony_ci esp_input_restore_header(skb); 91962306a36Sopenharmony_ci esp_input_done(data, err); 92062306a36Sopenharmony_ci} 92162306a36Sopenharmony_ci 92262306a36Sopenharmony_cistatic int esp6_input(struct xfrm_state *x, struct sk_buff *skb) 92362306a36Sopenharmony_ci{ 92462306a36Sopenharmony_ci struct crypto_aead *aead = x->data; 92562306a36Sopenharmony_ci struct aead_request *req; 92662306a36Sopenharmony_ci struct sk_buff *trailer; 92762306a36Sopenharmony_ci int ivlen = crypto_aead_ivsize(aead); 92862306a36Sopenharmony_ci int elen = skb->len - sizeof(struct ip_esp_hdr) - ivlen; 92962306a36Sopenharmony_ci int nfrags; 93062306a36Sopenharmony_ci int assoclen; 93162306a36Sopenharmony_ci int seqhilen; 93262306a36Sopenharmony_ci int ret = 0; 93362306a36Sopenharmony_ci void *tmp; 93462306a36Sopenharmony_ci __be32 *seqhi; 93562306a36Sopenharmony_ci u8 *iv; 93662306a36Sopenharmony_ci struct scatterlist *sg; 93762306a36Sopenharmony_ci 93862306a36Sopenharmony_ci if (!pskb_may_pull(skb, sizeof(struct ip_esp_hdr) + ivlen)) { 93962306a36Sopenharmony_ci ret = -EINVAL; 94062306a36Sopenharmony_ci goto out; 94162306a36Sopenharmony_ci } 94262306a36Sopenharmony_ci 94362306a36Sopenharmony_ci if (elen <= 0) { 94462306a36Sopenharmony_ci ret = -EINVAL; 94562306a36Sopenharmony_ci goto out; 94662306a36Sopenharmony_ci } 94762306a36Sopenharmony_ci 94862306a36Sopenharmony_ci assoclen = sizeof(struct ip_esp_hdr); 94962306a36Sopenharmony_ci seqhilen = 0; 95062306a36Sopenharmony_ci 95162306a36Sopenharmony_ci if (x->props.flags & XFRM_STATE_ESN) { 95262306a36Sopenharmony_ci seqhilen += sizeof(__be32); 95362306a36Sopenharmony_ci assoclen += seqhilen; 95462306a36Sopenharmony_ci } 95562306a36Sopenharmony_ci 95662306a36Sopenharmony_ci if (!skb_cloned(skb)) { 95762306a36Sopenharmony_ci if (!skb_is_nonlinear(skb)) { 95862306a36Sopenharmony_ci nfrags = 1; 95962306a36Sopenharmony_ci 96062306a36Sopenharmony_ci goto skip_cow; 96162306a36Sopenharmony_ci } else if (!skb_has_frag_list(skb)) { 96262306a36Sopenharmony_ci nfrags = skb_shinfo(skb)->nr_frags; 96362306a36Sopenharmony_ci nfrags++; 96462306a36Sopenharmony_ci 96562306a36Sopenharmony_ci goto skip_cow; 96662306a36Sopenharmony_ci } 96762306a36Sopenharmony_ci } 96862306a36Sopenharmony_ci 96962306a36Sopenharmony_ci nfrags = skb_cow_data(skb, 0, &trailer); 97062306a36Sopenharmony_ci if (nfrags < 0) { 97162306a36Sopenharmony_ci ret = -EINVAL; 97262306a36Sopenharmony_ci goto out; 97362306a36Sopenharmony_ci } 97462306a36Sopenharmony_ci 97562306a36Sopenharmony_ciskip_cow: 97662306a36Sopenharmony_ci ret = -ENOMEM; 97762306a36Sopenharmony_ci tmp = esp_alloc_tmp(aead, nfrags, seqhilen); 97862306a36Sopenharmony_ci if (!tmp) 97962306a36Sopenharmony_ci goto out; 98062306a36Sopenharmony_ci 98162306a36Sopenharmony_ci ESP_SKB_CB(skb)->tmp = tmp; 98262306a36Sopenharmony_ci seqhi = esp_tmp_extra(tmp); 98362306a36Sopenharmony_ci iv = esp_tmp_iv(aead, tmp, seqhilen); 98462306a36Sopenharmony_ci req = esp_tmp_req(aead, iv); 98562306a36Sopenharmony_ci sg = esp_req_sg(aead, req); 98662306a36Sopenharmony_ci 98762306a36Sopenharmony_ci esp_input_set_header(skb, seqhi); 98862306a36Sopenharmony_ci 98962306a36Sopenharmony_ci sg_init_table(sg, nfrags); 99062306a36Sopenharmony_ci ret = skb_to_sgvec(skb, sg, 0, skb->len); 99162306a36Sopenharmony_ci if (unlikely(ret < 0)) { 99262306a36Sopenharmony_ci kfree(tmp); 99362306a36Sopenharmony_ci goto out; 99462306a36Sopenharmony_ci } 99562306a36Sopenharmony_ci 99662306a36Sopenharmony_ci skb->ip_summed = CHECKSUM_NONE; 99762306a36Sopenharmony_ci 99862306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) 99962306a36Sopenharmony_ci aead_request_set_callback(req, 0, esp_input_done_esn, skb); 100062306a36Sopenharmony_ci else 100162306a36Sopenharmony_ci aead_request_set_callback(req, 0, esp_input_done, skb); 100262306a36Sopenharmony_ci 100362306a36Sopenharmony_ci aead_request_set_crypt(req, sg, sg, elen + ivlen, iv); 100462306a36Sopenharmony_ci aead_request_set_ad(req, assoclen); 100562306a36Sopenharmony_ci 100662306a36Sopenharmony_ci ret = crypto_aead_decrypt(req); 100762306a36Sopenharmony_ci if (ret == -EINPROGRESS) 100862306a36Sopenharmony_ci goto out; 100962306a36Sopenharmony_ci 101062306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) 101162306a36Sopenharmony_ci esp_input_restore_header(skb); 101262306a36Sopenharmony_ci 101362306a36Sopenharmony_ci ret = esp6_input_done2(skb, ret); 101462306a36Sopenharmony_ci 101562306a36Sopenharmony_ciout: 101662306a36Sopenharmony_ci return ret; 101762306a36Sopenharmony_ci} 101862306a36Sopenharmony_ci 101962306a36Sopenharmony_cistatic int esp6_err(struct sk_buff *skb, struct inet6_skb_parm *opt, 102062306a36Sopenharmony_ci u8 type, u8 code, int offset, __be32 info) 102162306a36Sopenharmony_ci{ 102262306a36Sopenharmony_ci struct net *net = dev_net(skb->dev); 102362306a36Sopenharmony_ci const struct ipv6hdr *iph = (const struct ipv6hdr *)skb->data; 102462306a36Sopenharmony_ci struct ip_esp_hdr *esph = (struct ip_esp_hdr *)(skb->data + offset); 102562306a36Sopenharmony_ci struct xfrm_state *x; 102662306a36Sopenharmony_ci 102762306a36Sopenharmony_ci if (type != ICMPV6_PKT_TOOBIG && 102862306a36Sopenharmony_ci type != NDISC_REDIRECT) 102962306a36Sopenharmony_ci return 0; 103062306a36Sopenharmony_ci 103162306a36Sopenharmony_ci x = xfrm_state_lookup(net, skb->mark, (const xfrm_address_t *)&iph->daddr, 103262306a36Sopenharmony_ci esph->spi, IPPROTO_ESP, AF_INET6); 103362306a36Sopenharmony_ci if (!x) 103462306a36Sopenharmony_ci return 0; 103562306a36Sopenharmony_ci 103662306a36Sopenharmony_ci if (type == NDISC_REDIRECT) 103762306a36Sopenharmony_ci ip6_redirect(skb, net, skb->dev->ifindex, 0, 103862306a36Sopenharmony_ci sock_net_uid(net, NULL)); 103962306a36Sopenharmony_ci else 104062306a36Sopenharmony_ci ip6_update_pmtu(skb, net, info, 0, 0, sock_net_uid(net, NULL)); 104162306a36Sopenharmony_ci xfrm_state_put(x); 104262306a36Sopenharmony_ci 104362306a36Sopenharmony_ci return 0; 104462306a36Sopenharmony_ci} 104562306a36Sopenharmony_ci 104662306a36Sopenharmony_cistatic void esp6_destroy(struct xfrm_state *x) 104762306a36Sopenharmony_ci{ 104862306a36Sopenharmony_ci struct crypto_aead *aead = x->data; 104962306a36Sopenharmony_ci 105062306a36Sopenharmony_ci if (!aead) 105162306a36Sopenharmony_ci return; 105262306a36Sopenharmony_ci 105362306a36Sopenharmony_ci crypto_free_aead(aead); 105462306a36Sopenharmony_ci} 105562306a36Sopenharmony_ci 105662306a36Sopenharmony_cistatic int esp_init_aead(struct xfrm_state *x, struct netlink_ext_ack *extack) 105762306a36Sopenharmony_ci{ 105862306a36Sopenharmony_ci char aead_name[CRYPTO_MAX_ALG_NAME]; 105962306a36Sopenharmony_ci struct crypto_aead *aead; 106062306a36Sopenharmony_ci int err; 106162306a36Sopenharmony_ci 106262306a36Sopenharmony_ci if (snprintf(aead_name, CRYPTO_MAX_ALG_NAME, "%s(%s)", 106362306a36Sopenharmony_ci x->geniv, x->aead->alg_name) >= CRYPTO_MAX_ALG_NAME) { 106462306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Algorithm name is too long"); 106562306a36Sopenharmony_ci return -ENAMETOOLONG; 106662306a36Sopenharmony_ci } 106762306a36Sopenharmony_ci 106862306a36Sopenharmony_ci aead = crypto_alloc_aead(aead_name, 0, 0); 106962306a36Sopenharmony_ci err = PTR_ERR(aead); 107062306a36Sopenharmony_ci if (IS_ERR(aead)) 107162306a36Sopenharmony_ci goto error; 107262306a36Sopenharmony_ci 107362306a36Sopenharmony_ci x->data = aead; 107462306a36Sopenharmony_ci 107562306a36Sopenharmony_ci err = crypto_aead_setkey(aead, x->aead->alg_key, 107662306a36Sopenharmony_ci (x->aead->alg_key_len + 7) / 8); 107762306a36Sopenharmony_ci if (err) 107862306a36Sopenharmony_ci goto error; 107962306a36Sopenharmony_ci 108062306a36Sopenharmony_ci err = crypto_aead_setauthsize(aead, x->aead->alg_icv_len / 8); 108162306a36Sopenharmony_ci if (err) 108262306a36Sopenharmony_ci goto error; 108362306a36Sopenharmony_ci 108462306a36Sopenharmony_ci return 0; 108562306a36Sopenharmony_ci 108662306a36Sopenharmony_cierror: 108762306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Kernel was unable to initialize cryptographic operations"); 108862306a36Sopenharmony_ci return err; 108962306a36Sopenharmony_ci} 109062306a36Sopenharmony_ci 109162306a36Sopenharmony_cistatic int esp_init_authenc(struct xfrm_state *x, 109262306a36Sopenharmony_ci struct netlink_ext_ack *extack) 109362306a36Sopenharmony_ci{ 109462306a36Sopenharmony_ci struct crypto_aead *aead; 109562306a36Sopenharmony_ci struct crypto_authenc_key_param *param; 109662306a36Sopenharmony_ci struct rtattr *rta; 109762306a36Sopenharmony_ci char *key; 109862306a36Sopenharmony_ci char *p; 109962306a36Sopenharmony_ci char authenc_name[CRYPTO_MAX_ALG_NAME]; 110062306a36Sopenharmony_ci unsigned int keylen; 110162306a36Sopenharmony_ci int err; 110262306a36Sopenharmony_ci 110362306a36Sopenharmony_ci err = -ENAMETOOLONG; 110462306a36Sopenharmony_ci 110562306a36Sopenharmony_ci if ((x->props.flags & XFRM_STATE_ESN)) { 110662306a36Sopenharmony_ci if (snprintf(authenc_name, CRYPTO_MAX_ALG_NAME, 110762306a36Sopenharmony_ci "%s%sauthencesn(%s,%s)%s", 110862306a36Sopenharmony_ci x->geniv ?: "", x->geniv ? "(" : "", 110962306a36Sopenharmony_ci x->aalg ? x->aalg->alg_name : "digest_null", 111062306a36Sopenharmony_ci x->ealg->alg_name, 111162306a36Sopenharmony_ci x->geniv ? ")" : "") >= CRYPTO_MAX_ALG_NAME) { 111262306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Algorithm name is too long"); 111362306a36Sopenharmony_ci goto error; 111462306a36Sopenharmony_ci } 111562306a36Sopenharmony_ci } else { 111662306a36Sopenharmony_ci if (snprintf(authenc_name, CRYPTO_MAX_ALG_NAME, 111762306a36Sopenharmony_ci "%s%sauthenc(%s,%s)%s", 111862306a36Sopenharmony_ci x->geniv ?: "", x->geniv ? "(" : "", 111962306a36Sopenharmony_ci x->aalg ? x->aalg->alg_name : "digest_null", 112062306a36Sopenharmony_ci x->ealg->alg_name, 112162306a36Sopenharmony_ci x->geniv ? ")" : "") >= CRYPTO_MAX_ALG_NAME) { 112262306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Algorithm name is too long"); 112362306a36Sopenharmony_ci goto error; 112462306a36Sopenharmony_ci } 112562306a36Sopenharmony_ci } 112662306a36Sopenharmony_ci 112762306a36Sopenharmony_ci aead = crypto_alloc_aead(authenc_name, 0, 0); 112862306a36Sopenharmony_ci err = PTR_ERR(aead); 112962306a36Sopenharmony_ci if (IS_ERR(aead)) { 113062306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Kernel was unable to initialize cryptographic operations"); 113162306a36Sopenharmony_ci goto error; 113262306a36Sopenharmony_ci } 113362306a36Sopenharmony_ci 113462306a36Sopenharmony_ci x->data = aead; 113562306a36Sopenharmony_ci 113662306a36Sopenharmony_ci keylen = (x->aalg ? (x->aalg->alg_key_len + 7) / 8 : 0) + 113762306a36Sopenharmony_ci (x->ealg->alg_key_len + 7) / 8 + RTA_SPACE(sizeof(*param)); 113862306a36Sopenharmony_ci err = -ENOMEM; 113962306a36Sopenharmony_ci key = kmalloc(keylen, GFP_KERNEL); 114062306a36Sopenharmony_ci if (!key) 114162306a36Sopenharmony_ci goto error; 114262306a36Sopenharmony_ci 114362306a36Sopenharmony_ci p = key; 114462306a36Sopenharmony_ci rta = (void *)p; 114562306a36Sopenharmony_ci rta->rta_type = CRYPTO_AUTHENC_KEYA_PARAM; 114662306a36Sopenharmony_ci rta->rta_len = RTA_LENGTH(sizeof(*param)); 114762306a36Sopenharmony_ci param = RTA_DATA(rta); 114862306a36Sopenharmony_ci p += RTA_SPACE(sizeof(*param)); 114962306a36Sopenharmony_ci 115062306a36Sopenharmony_ci if (x->aalg) { 115162306a36Sopenharmony_ci struct xfrm_algo_desc *aalg_desc; 115262306a36Sopenharmony_ci 115362306a36Sopenharmony_ci memcpy(p, x->aalg->alg_key, (x->aalg->alg_key_len + 7) / 8); 115462306a36Sopenharmony_ci p += (x->aalg->alg_key_len + 7) / 8; 115562306a36Sopenharmony_ci 115662306a36Sopenharmony_ci aalg_desc = xfrm_aalg_get_byname(x->aalg->alg_name, 0); 115762306a36Sopenharmony_ci BUG_ON(!aalg_desc); 115862306a36Sopenharmony_ci 115962306a36Sopenharmony_ci err = -EINVAL; 116062306a36Sopenharmony_ci if (aalg_desc->uinfo.auth.icv_fullbits / 8 != 116162306a36Sopenharmony_ci crypto_aead_authsize(aead)) { 116262306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Kernel was unable to initialize cryptographic operations"); 116362306a36Sopenharmony_ci goto free_key; 116462306a36Sopenharmony_ci } 116562306a36Sopenharmony_ci 116662306a36Sopenharmony_ci err = crypto_aead_setauthsize( 116762306a36Sopenharmony_ci aead, x->aalg->alg_trunc_len / 8); 116862306a36Sopenharmony_ci if (err) { 116962306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Kernel was unable to initialize cryptographic operations"); 117062306a36Sopenharmony_ci goto free_key; 117162306a36Sopenharmony_ci } 117262306a36Sopenharmony_ci } 117362306a36Sopenharmony_ci 117462306a36Sopenharmony_ci param->enckeylen = cpu_to_be32((x->ealg->alg_key_len + 7) / 8); 117562306a36Sopenharmony_ci memcpy(p, x->ealg->alg_key, (x->ealg->alg_key_len + 7) / 8); 117662306a36Sopenharmony_ci 117762306a36Sopenharmony_ci err = crypto_aead_setkey(aead, key, keylen); 117862306a36Sopenharmony_ci 117962306a36Sopenharmony_cifree_key: 118062306a36Sopenharmony_ci kfree(key); 118162306a36Sopenharmony_ci 118262306a36Sopenharmony_cierror: 118362306a36Sopenharmony_ci return err; 118462306a36Sopenharmony_ci} 118562306a36Sopenharmony_ci 118662306a36Sopenharmony_cistatic int esp6_init_state(struct xfrm_state *x, struct netlink_ext_ack *extack) 118762306a36Sopenharmony_ci{ 118862306a36Sopenharmony_ci struct crypto_aead *aead; 118962306a36Sopenharmony_ci u32 align; 119062306a36Sopenharmony_ci int err; 119162306a36Sopenharmony_ci 119262306a36Sopenharmony_ci x->data = NULL; 119362306a36Sopenharmony_ci 119462306a36Sopenharmony_ci if (x->aead) { 119562306a36Sopenharmony_ci err = esp_init_aead(x, extack); 119662306a36Sopenharmony_ci } else if (x->ealg) { 119762306a36Sopenharmony_ci err = esp_init_authenc(x, extack); 119862306a36Sopenharmony_ci } else { 119962306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "ESP: AEAD or CRYPT must be provided"); 120062306a36Sopenharmony_ci err = -EINVAL; 120162306a36Sopenharmony_ci } 120262306a36Sopenharmony_ci 120362306a36Sopenharmony_ci if (err) 120462306a36Sopenharmony_ci goto error; 120562306a36Sopenharmony_ci 120662306a36Sopenharmony_ci aead = x->data; 120762306a36Sopenharmony_ci 120862306a36Sopenharmony_ci x->props.header_len = sizeof(struct ip_esp_hdr) + 120962306a36Sopenharmony_ci crypto_aead_ivsize(aead); 121062306a36Sopenharmony_ci switch (x->props.mode) { 121162306a36Sopenharmony_ci case XFRM_MODE_BEET: 121262306a36Sopenharmony_ci if (x->sel.family != AF_INET6) 121362306a36Sopenharmony_ci x->props.header_len += IPV4_BEET_PHMAXLEN + 121462306a36Sopenharmony_ci (sizeof(struct ipv6hdr) - sizeof(struct iphdr)); 121562306a36Sopenharmony_ci break; 121662306a36Sopenharmony_ci default: 121762306a36Sopenharmony_ci case XFRM_MODE_TRANSPORT: 121862306a36Sopenharmony_ci break; 121962306a36Sopenharmony_ci case XFRM_MODE_TUNNEL: 122062306a36Sopenharmony_ci x->props.header_len += sizeof(struct ipv6hdr); 122162306a36Sopenharmony_ci break; 122262306a36Sopenharmony_ci } 122362306a36Sopenharmony_ci 122462306a36Sopenharmony_ci if (x->encap) { 122562306a36Sopenharmony_ci struct xfrm_encap_tmpl *encap = x->encap; 122662306a36Sopenharmony_ci 122762306a36Sopenharmony_ci switch (encap->encap_type) { 122862306a36Sopenharmony_ci default: 122962306a36Sopenharmony_ci NL_SET_ERR_MSG(extack, "Unsupported encapsulation type for ESP"); 123062306a36Sopenharmony_ci err = -EINVAL; 123162306a36Sopenharmony_ci goto error; 123262306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP: 123362306a36Sopenharmony_ci x->props.header_len += sizeof(struct udphdr); 123462306a36Sopenharmony_ci break; 123562306a36Sopenharmony_ci case UDP_ENCAP_ESPINUDP_NON_IKE: 123662306a36Sopenharmony_ci x->props.header_len += sizeof(struct udphdr) + 2 * sizeof(u32); 123762306a36Sopenharmony_ci break; 123862306a36Sopenharmony_ci#ifdef CONFIG_INET6_ESPINTCP 123962306a36Sopenharmony_ci case TCP_ENCAP_ESPINTCP: 124062306a36Sopenharmony_ci /* only the length field, TCP encap is done by 124162306a36Sopenharmony_ci * the socket 124262306a36Sopenharmony_ci */ 124362306a36Sopenharmony_ci x->props.header_len += 2; 124462306a36Sopenharmony_ci break; 124562306a36Sopenharmony_ci#endif 124662306a36Sopenharmony_ci } 124762306a36Sopenharmony_ci } 124862306a36Sopenharmony_ci 124962306a36Sopenharmony_ci align = ALIGN(crypto_aead_blocksize(aead), 4); 125062306a36Sopenharmony_ci x->props.trailer_len = align + 1 + crypto_aead_authsize(aead); 125162306a36Sopenharmony_ci 125262306a36Sopenharmony_cierror: 125362306a36Sopenharmony_ci return err; 125462306a36Sopenharmony_ci} 125562306a36Sopenharmony_ci 125662306a36Sopenharmony_cistatic int esp6_rcv_cb(struct sk_buff *skb, int err) 125762306a36Sopenharmony_ci{ 125862306a36Sopenharmony_ci return 0; 125962306a36Sopenharmony_ci} 126062306a36Sopenharmony_ci 126162306a36Sopenharmony_cistatic const struct xfrm_type esp6_type = { 126262306a36Sopenharmony_ci .owner = THIS_MODULE, 126362306a36Sopenharmony_ci .proto = IPPROTO_ESP, 126462306a36Sopenharmony_ci .flags = XFRM_TYPE_REPLAY_PROT, 126562306a36Sopenharmony_ci .init_state = esp6_init_state, 126662306a36Sopenharmony_ci .destructor = esp6_destroy, 126762306a36Sopenharmony_ci .input = esp6_input, 126862306a36Sopenharmony_ci .output = esp6_output, 126962306a36Sopenharmony_ci}; 127062306a36Sopenharmony_ci 127162306a36Sopenharmony_cistatic struct xfrm6_protocol esp6_protocol = { 127262306a36Sopenharmony_ci .handler = xfrm6_rcv, 127362306a36Sopenharmony_ci .input_handler = xfrm_input, 127462306a36Sopenharmony_ci .cb_handler = esp6_rcv_cb, 127562306a36Sopenharmony_ci .err_handler = esp6_err, 127662306a36Sopenharmony_ci .priority = 0, 127762306a36Sopenharmony_ci}; 127862306a36Sopenharmony_ci 127962306a36Sopenharmony_cistatic int __init esp6_init(void) 128062306a36Sopenharmony_ci{ 128162306a36Sopenharmony_ci if (xfrm_register_type(&esp6_type, AF_INET6) < 0) { 128262306a36Sopenharmony_ci pr_info("%s: can't add xfrm type\n", __func__); 128362306a36Sopenharmony_ci return -EAGAIN; 128462306a36Sopenharmony_ci } 128562306a36Sopenharmony_ci if (xfrm6_protocol_register(&esp6_protocol, IPPROTO_ESP) < 0) { 128662306a36Sopenharmony_ci pr_info("%s: can't add protocol\n", __func__); 128762306a36Sopenharmony_ci xfrm_unregister_type(&esp6_type, AF_INET6); 128862306a36Sopenharmony_ci return -EAGAIN; 128962306a36Sopenharmony_ci } 129062306a36Sopenharmony_ci 129162306a36Sopenharmony_ci return 0; 129262306a36Sopenharmony_ci} 129362306a36Sopenharmony_ci 129462306a36Sopenharmony_cistatic void __exit esp6_fini(void) 129562306a36Sopenharmony_ci{ 129662306a36Sopenharmony_ci if (xfrm6_protocol_deregister(&esp6_protocol, IPPROTO_ESP) < 0) 129762306a36Sopenharmony_ci pr_info("%s: can't remove protocol\n", __func__); 129862306a36Sopenharmony_ci xfrm_unregister_type(&esp6_type, AF_INET6); 129962306a36Sopenharmony_ci} 130062306a36Sopenharmony_ci 130162306a36Sopenharmony_cimodule_init(esp6_init); 130262306a36Sopenharmony_cimodule_exit(esp6_fini); 130362306a36Sopenharmony_ci 130462306a36Sopenharmony_ciMODULE_LICENSE("GPL"); 130562306a36Sopenharmony_ciMODULE_ALIAS_XFRM_TYPE(AF_INET6, XFRM_PROTO_ESP); 1306