Home | History | Annotate | Line # | Download | only in iscsi
iscsi_text.c revision 1.1.2.1
      1  1.1.2.1  yamt /*	$NetBSD: iscsi_text.c,v 1.1.2.1 2012/04/17 00:07:40 yamt Exp $	*/
      2      1.1   agc 
      3      1.1   agc /*-
      4      1.1   agc  * Copyright (c) 2005,2006,2011 The NetBSD Foundation, Inc.
      5      1.1   agc  * All rights reserved.
      6      1.1   agc  *
      7      1.1   agc  * This code is derived from software contributed to The NetBSD Foundation
      8      1.1   agc  * by Wasabi Systems, Inc.
      9      1.1   agc  *
     10      1.1   agc  * Redistribution and use in source and binary forms, with or without
     11      1.1   agc  * modification, are permitted provided that the following conditions
     12      1.1   agc  * are met:
     13      1.1   agc  * 1. Redistributions of source code must retain the above copyright
     14      1.1   agc  *    notice, this list of conditions and the following disclaimer.
     15      1.1   agc  * 2. Redistributions in binary form must reproduce the above copyright
     16      1.1   agc  *    notice, this list of conditions and the following disclaimer in the
     17      1.1   agc  *    documentation and/or other materials provided with the distribution.
     18      1.1   agc  *
     19      1.1   agc  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     20      1.1   agc  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     21      1.1   agc  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     22      1.1   agc  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     23      1.1   agc  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     24      1.1   agc  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     25      1.1   agc  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     26      1.1   agc  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     27      1.1   agc  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     28      1.1   agc  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     29      1.1   agc  * POSSIBILITY OF SUCH DAMAGE.
     30      1.1   agc  */
     31      1.1   agc 
     32      1.1   agc #include "iscsi_globals.h"
     33      1.1   agc #include "base64.h"
     34      1.1   agc #include <sys/md5.h>
     35  1.1.2.1  yamt #include <sys/cprng.h>
     36      1.1   agc 
     37      1.1   agc #define isdigit(x) ((x) >= '0' && (x) <= '9')
     38      1.1   agc #define toupper(x) ((x) & ~0x20)
     39      1.1   agc 
     40      1.1   agc /*****************************************************************************/
     41      1.1   agc 
     42      1.1   agc #define MAX_STRING   255	/* Maximum length of parameter value */
     43      1.1   agc #define MAX_LIST     4		/* Maximum number of list elements we'll ever send */
     44      1.1   agc 
     45      1.1   agc /* Maximum number of negotiation parameters in the operational negotiation phase */
     46      1.1   agc /* 48 should be more than enough even with the target defining its own keys */
     47      1.1   agc #define MAX_NEG      48
     48      1.1   agc 
     49      1.1   agc #define CHAP_CHALLENGE_LEN    32	/* Number of bytes to send in challenge */
     50      1.1   agc #define CHAP_MD5_SIZE         16	/* Number of bytes in MD5 hash */
     51      1.1   agc 
     52      1.1   agc /*****************************************************************************/
     53      1.1   agc 
     54      1.1   agc /* authentication states */
     55      1.1   agc 
     56      1.1   agc typedef enum
     57      1.1   agc {
     58      1.1   agc 	AUTH_INITIAL,				/* sending choice of algorithms */
     59      1.1   agc 	AUTH_METHOD_SELECTED,		/* received choice, sending first parameter */
     60      1.1   agc 	/* from here it's alg dependent */
     61      1.1   agc 	AUTH_CHAP_ALG_SENT,			/* CHAP: Algorithm selected */
     62      1.1   agc 	AUTH_CHAP_RSP_SENT,			/* CHAP: Response sent */
     63      1.1   agc 	/* for all algorithms */
     64      1.1   agc 	AUTH_DONE					/* in parameter negotiation stage */
     65      1.1   agc } auth_state_t;
     66      1.1   agc 
     67      1.1   agc 
     68      1.1   agc /* enumeration of all the keys we know, and a place for the ones we don't */
     69      1.1   agc 
     70      1.1   agc typedef enum
     71      1.1   agc {
     72      1.1   agc 	K_AuthMethod,
     73      1.1   agc 	K_Auth_CHAP_Algorithm,
     74      1.1   agc 	K_Auth_CHAP_Challenge,
     75      1.1   agc 	K_Auth_CHAP_Identifier,
     76      1.1   agc 	K_Auth_CHAP_Name,
     77      1.1   agc 	K_Auth_CHAP_Response,
     78      1.1   agc 	K_DataDigest,
     79      1.1   agc 	K_DataPDUInOrder,
     80      1.1   agc 	K_DataSequenceInOrder,
     81      1.1   agc 	K_DefaultTime2Retain,
     82      1.1   agc 	K_DefaultTime2Wait,
     83      1.1   agc 	K_ErrorRecoveryLevel,
     84      1.1   agc 	K_FirstBurstLength,
     85      1.1   agc 	K_HeaderDigest,
     86      1.1   agc 	K_IFMarker,
     87      1.1   agc 	K_IFMarkInt,
     88      1.1   agc 	K_ImmediateData,
     89      1.1   agc 	K_InitialR2T,
     90      1.1   agc 	K_InitiatorAlias,
     91      1.1   agc 	K_InitiatorName,
     92      1.1   agc 	K_MaxBurstLength,
     93      1.1   agc 	K_MaxConnections,
     94      1.1   agc 	K_MaxOutstandingR2T,
     95      1.1   agc 	K_MaxRecvDataSegmentLength,
     96      1.1   agc 	K_OFMarker,
     97      1.1   agc 	K_OFMarkInt,
     98      1.1   agc 	K_SendTargets,
     99      1.1   agc 	K_SessionType,
    100      1.1   agc 	K_TargetAddress,
    101      1.1   agc 	K_TargetAlias,
    102      1.1   agc 	K_TargetName,
    103      1.1   agc 	K_TargetPortalGroupTag,
    104      1.1   agc 	K_NotUnderstood
    105      1.1   agc } text_key_t;
    106      1.1   agc 
    107      1.1   agc /* maximum known key */
    108      1.1   agc #define MAX_KEY   K_TargetPortalGroupTag
    109      1.1   agc 
    110      1.1   agc 
    111      1.1   agc #undef DEBOUT
    112      1.1   agc #define DEBOUT(x)	printf x
    113      1.1   agc 
    114      1.1   agc 
    115      1.1   agc 
    116      1.1   agc /* value types */
    117      1.1   agc typedef enum
    118      1.1   agc {						/* Value is... */
    119      1.1   agc 	T_NUM,					/* numeric */
    120      1.1   agc 	T_BIGNUM,				/* large numeric */
    121      1.1   agc 	T_STRING,				/* string */
    122      1.1   agc 	T_YESNO,				/* boolean (Yes or No) */
    123      1.1   agc 	T_AUTH,					/* authentication type (CHAP or None for now) */
    124      1.1   agc 	T_DIGEST,				/* digest (None or CRC32C) */
    125      1.1   agc 	T_RANGE,				/* numeric range */
    126      1.1   agc 	T_SENDT,				/* send target options (ALL, target-name, empty) */
    127      1.1   agc 	T_SESS					/* session type (Discovery or Normal) */
    128      1.1   agc } val_kind_t;
    129      1.1   agc 
    130      1.1   agc 
    131      1.1   agc /* table of negotiation key strings with value type and default */
    132      1.1   agc 
    133      1.1   agc typedef struct
    134      1.1   agc {
    135      1.1   agc 	const uint8_t *name;				/* the key name */
    136      1.1   agc 	val_kind_t val;				/* the value type */
    137      1.1   agc 	uint32_t defval;			/* default value */
    138      1.1   agc } key_entry_t;
    139      1.1   agc 
    140      1.1   agc STATIC key_entry_t entries[] = {
    141      1.1   agc 	{"AuthMethod", T_AUTH, 0},
    142      1.1   agc 	{"CHAP_A", T_NUM, 5},
    143      1.1   agc 	{"CHAP_C", T_BIGNUM, 0},
    144      1.1   agc 	{"CHAP_I", T_NUM, 0},
    145      1.1   agc 	{"CHAP_N", T_STRING, 0},
    146      1.1   agc 	{"CHAP_R", T_BIGNUM, 0},
    147      1.1   agc 	{"DataDigest", T_DIGEST, 0},
    148      1.1   agc 	{"DataPDUInOrder", T_YESNO, 1},
    149      1.1   agc 	{"DataSequenceInOrder", T_YESNO, 1},
    150      1.1   agc 	{"DefaultTime2Retain", T_NUM, 20},
    151      1.1   agc 	{"DefaultTime2Wait", T_NUM, 2},
    152      1.1   agc 	{"ErrorRecoveryLevel", T_NUM, 0},
    153      1.1   agc 	{"FirstBurstLength", T_NUM, 64 * 1024},
    154      1.1   agc 	{"HeaderDigest", T_DIGEST, 0},
    155      1.1   agc 	{"IFMarker", T_YESNO, 0},
    156      1.1   agc 	{"IFMarkInt", T_RANGE, 2048},
    157      1.1   agc 	{"ImmediateData", T_YESNO, 1},
    158      1.1   agc 	{"InitialR2T", T_YESNO, 1},
    159      1.1   agc 	{"InitiatorAlias", T_STRING, 0},
    160      1.1   agc 	{"InitiatorName", T_STRING, 0},
    161      1.1   agc 	{"MaxBurstLength", T_NUM, 256 * 1024},
    162      1.1   agc 	{"MaxConnections", T_NUM, 1},
    163      1.1   agc 	{"MaxOutstandingR2T", T_NUM, 1},
    164      1.1   agc 	{"MaxRecvDataSegmentLength", T_NUM, 8192},
    165      1.1   agc 	{"OFMarker", T_YESNO, 0},
    166      1.1   agc 	{"OFMarkInt", T_RANGE, 2048},
    167      1.1   agc 	{"SendTargets", T_SENDT, 0},
    168      1.1   agc 	{"SessionType", T_SESS, 0},
    169      1.1   agc 	{"TargetAddress", T_STRING, 0},
    170      1.1   agc 	{"TargetAlias", T_STRING, 0},
    171      1.1   agc 	{"TargetName", T_STRING, 0},
    172      1.1   agc 	{"TargetPortalGroupTag", T_NUM, 0},
    173      1.1   agc 	{NULL, T_STRING, 0}
    174      1.1   agc };
    175      1.1   agc 
    176      1.1   agc /* a negotiation parameter: key and values (there may be more than 1 for lists) */
    177      1.1   agc typedef struct
    178      1.1   agc {
    179      1.1   agc 	text_key_t key;				/* the key */
    180      1.1   agc 	int list_num;				/* number of elements in list, doubles as */
    181      1.1   agc 	/* data size for large numeric values */
    182      1.1   agc 	union
    183      1.1   agc 	{
    184      1.1   agc 		uint32_t nval[MAX_LIST];	/* numeric or enumeration values */
    185      1.1   agc 		uint8_t *sval;				/* string or data pointer */
    186      1.1   agc 	} val;
    187      1.1   agc } negotiation_parameter_t;
    188      1.1   agc 
    189      1.1   agc 
    190      1.1   agc /* Negotiation state flags */
    191      1.1   agc #define NS_SENT      0x01		/* key was sent to target */
    192      1.1   agc #define NS_RECEIVED  0x02		/* key was received from target */
    193      1.1   agc 
    194      1.1   agc typedef struct
    195      1.1   agc {
    196      1.1   agc 	negotiation_parameter_t pars[MAX_NEG];	/* the parameters to send */
    197      1.1   agc 	negotiation_parameter_t *cpar;			/* the last parameter set */
    198      1.1   agc 	uint16_t num_pars;						/* number of parameters to send */
    199      1.1   agc 	auth_state_t auth_state;				/* authentication state */
    200      1.1   agc 	iscsi_auth_types_t auth_alg;			/* authentication algorithm */
    201      1.1   agc 	uint8_t kflags[MAX_KEY + 2];			/* negotiation flags for each key */
    202      1.1   agc 	uint8_t password[MAX_STRING + 1];		/* authentication secret */
    203      1.1   agc 	uint8_t target_password[MAX_STRING + 1];	/* target authentication secret */
    204      1.1   agc 	uint8_t user_name[MAX_STRING + 1];		/* authentication user ID */
    205      1.1   agc 	uint8_t temp_buf[MAX_STRING + 1];		/* scratch buffer */
    206      1.1   agc 
    207      1.1   agc 	bool HeaderDigest;
    208      1.1   agc 	bool DataDigest;
    209      1.1   agc 	bool InitialR2T;
    210      1.1   agc 	bool ImmediateData;
    211      1.1   agc 	uint32_t ErrorRecoveryLevel;
    212      1.1   agc 	uint32_t MaxRecvDataSegmentLength;
    213      1.1   agc 	uint32_t MaxConnections;
    214      1.1   agc 	uint32_t DefaultTime2Wait;
    215      1.1   agc 	uint32_t DefaultTime2Retain;
    216      1.1   agc 	uint32_t MaxBurstLength;
    217      1.1   agc 	uint32_t FirstBurstLength;
    218      1.1   agc 	uint32_t MaxOutstandingR2T;
    219      1.1   agc 
    220      1.1   agc } negotiation_state_t;
    221      1.1   agc 
    222      1.1   agc 
    223      1.1   agc #define TX(state, key) (state->kflags [key] & NS_SENT)
    224      1.1   agc #define RX(state, key) (state->kflags [key] & NS_RECEIVED)
    225      1.1   agc 
    226      1.1   agc /*****************************************************************************/
    227      1.1   agc 
    228      1.1   agc 
    229      1.1   agc STATIC void
    230      1.1   agc chap_md5_response(uint8_t *buffer, uint8_t identifier, uint8_t *secret,
    231      1.1   agc 				  uint8_t *challenge, int challenge_size)
    232      1.1   agc {
    233      1.1   agc 	MD5_CTX md5;
    234      1.1   agc 
    235      1.1   agc 	MD5Init(&md5);
    236      1.1   agc 	MD5Update(&md5, &identifier, 1);
    237      1.1   agc 	MD5Update(&md5, secret, strlen(secret));
    238      1.1   agc 	MD5Update(&md5, challenge, challenge_size);
    239      1.1   agc 	MD5Final(buffer, &md5);
    240      1.1   agc }
    241      1.1   agc 
    242      1.1   agc 
    243      1.1   agc /*****************************************************************************/
    244      1.1   agc 
    245      1.1   agc /*
    246      1.1   agc  * hexdig:
    247      1.1   agc  *    Return value of hex digit.
    248      1.1   agc  *    Note: a null character is acceptable, and returns 0.
    249      1.1   agc  *
    250      1.1   agc  *    Parameter:
    251      1.1   agc  *          c     The character
    252      1.1   agc  *
    253      1.1   agc  *    Returns:    The value, -1 on error.
    254      1.1   agc  */
    255      1.1   agc 
    256      1.1   agc static __inline int
    257      1.1   agc hexdig(uint8_t c)
    258      1.1   agc {
    259      1.1   agc 
    260      1.1   agc 	if (!c) {
    261      1.1   agc 		return 0;
    262      1.1   agc 	}
    263      1.1   agc 	if (isdigit(c)) {
    264      1.1   agc 		return c - '0';
    265      1.1   agc 	}
    266      1.1   agc 	c = toupper(c);
    267      1.1   agc 	if (c >= 'A' && c <= 'F') {
    268      1.1   agc 		return c - 'A' + 10;
    269      1.1   agc 	}
    270      1.1   agc 	return -1;
    271      1.1   agc }
    272      1.1   agc 
    273      1.1   agc /*
    274      1.1   agc  * skiptozero:
    275      1.1   agc  *    Skip to next zero character in buffer.
    276      1.1   agc  *
    277      1.1   agc  *    Parameter:
    278      1.1   agc  *          buf      The buffer pointer
    279      1.1   agc  *
    280      1.1   agc  *    Returns:    The pointer to the character after the zero character.
    281      1.1   agc  */
    282      1.1   agc 
    283      1.1   agc static __inline uint8_t *
    284      1.1   agc skiptozero(uint8_t *buf)
    285      1.1   agc {
    286      1.1   agc 
    287      1.1   agc 	while (*buf) {
    288      1.1   agc 		buf++;
    289      1.1   agc 	}
    290      1.1   agc 	return buf + 1;
    291      1.1   agc }
    292      1.1   agc 
    293      1.1   agc 
    294      1.1   agc /*
    295      1.1   agc  * get_bignumval:
    296      1.1   agc  *    Get a large numeric value.
    297      1.1   agc  *    NOTE: Overwrites source string.
    298      1.1   agc  *
    299      1.1   agc  *    Parameter:
    300      1.1   agc  *          buf      The buffer pointer
    301      1.1   agc  *          par      The parameter
    302      1.1   agc  *
    303      1.1   agc  *    Returns:    The pointer to the next parameter, NULL on error.
    304      1.1   agc  */
    305      1.1   agc 
    306      1.1   agc STATIC uint8_t *
    307      1.1   agc get_bignumval(uint8_t *buf, negotiation_parameter_t *par)
    308      1.1   agc {
    309      1.1   agc 	int val;
    310      1.1   agc 	char c;
    311      1.1   agc 	uint8_t *dp = buf;
    312      1.1   agc 
    313      1.1   agc 	par->val.sval = buf;
    314      1.1   agc 
    315      1.1   agc 	if (buf[0] == '0' && (buf[1] == 'x' || buf[1] == 'X')) {
    316      1.1   agc 		buf += 2;
    317      1.1   agc 		while ((c = *buf) != 0x0) {
    318      1.1   agc 			buf++;
    319      1.1   agc 			val = (hexdig(c) << 4) | hexdig(*buf);
    320      1.1   agc 			if (val < 0) {
    321      1.1   agc 				return NULL;
    322      1.1   agc 			}
    323      1.1   agc 			*dp++ = (uint8_t) val;
    324      1.1   agc 			if (*buf) {
    325      1.1   agc 				buf++;
    326      1.1   agc 			}
    327      1.1   agc 		}
    328      1.1   agc 		buf++;
    329      1.1   agc 		par->list_num = dp - par->val.sval;
    330      1.1   agc 	} else if (buf[0] == '0' && (buf[1] == 'b' || buf[1] == 'B')) {
    331      1.1   agc 		buf = base64_decode(&buf[2], par->val.sval, &par->list_num);
    332      1.1   agc 	} else {
    333      1.1   agc 		DEBOUT(("Ill-formatted large number <%s>\n", buf));
    334      1.1   agc 		return NULL;
    335      1.1   agc 	}
    336      1.1   agc 
    337      1.1   agc 	return buf;
    338      1.1   agc }
    339      1.1   agc 
    340      1.1   agc 
    341      1.1   agc /*
    342      1.1   agc  * get_numval:
    343      1.1   agc  *    Get a numeric value.
    344      1.1   agc  *
    345      1.1   agc  *    Parameter:
    346      1.1   agc  *          buf      The buffer pointer
    347      1.1   agc  *          pval     The pointer to the result.
    348      1.1   agc  *
    349      1.1   agc  *    Returns:    The pointer to the next parameter, NULL on error.
    350      1.1   agc  */
    351      1.1   agc 
    352      1.1   agc STATIC uint8_t *
    353      1.1   agc get_numval(uint8_t *buf, uint32_t *pval)
    354      1.1   agc {
    355      1.1   agc 	uint32_t val = 0;
    356      1.1   agc 	char c;
    357      1.1   agc 
    358      1.1   agc 	if (buf[0] == '0' && (buf[1] == 'x' || buf[1] == 'X')) {
    359      1.1   agc 		buf += 2;
    360      1.1   agc 		while (*buf && *buf != '~') {
    361      1.1   agc 			int n;
    362      1.1   agc 
    363      1.1   agc 			if ((n = hexdig(*buf++)) < 0)
    364      1.1   agc 				return NULL;
    365      1.1   agc 			val = (val << 4) | n;
    366      1.1   agc 		}
    367      1.1   agc 	} else
    368      1.1   agc 		while (*buf && *buf != '~') {
    369      1.1   agc 			c = *buf++;
    370      1.1   agc 			if (!isdigit(c))
    371      1.1   agc 				return NULL;
    372      1.1   agc 			val = val * 10 + (c - '0');
    373      1.1   agc 		}
    374      1.1   agc 
    375      1.1   agc 	*pval = val;
    376      1.1   agc 
    377      1.1   agc 	return buf + 1;
    378      1.1   agc }
    379      1.1   agc 
    380      1.1   agc 
    381      1.1   agc /*
    382      1.1   agc  * get_range:
    383      1.1   agc  *    Get a numeric range.
    384      1.1   agc  *
    385      1.1   agc  *    Parameter:
    386      1.1   agc  *          buf      The buffer pointer
    387      1.1   agc  *          pval1    The pointer to the first result.
    388      1.1   agc  *          pval2    The pointer to the second result.
    389      1.1   agc  *
    390      1.1   agc  *    Returns:    The pointer to the next parameter, NULL on error.
    391      1.1   agc  */
    392      1.1   agc 
    393      1.1   agc STATIC uint8_t *
    394      1.1   agc get_range(uint8_t *buf, uint32_t *pval1, uint32_t *pval2)
    395      1.1   agc {
    396      1.1   agc 
    397      1.1   agc 	if ((buf = get_numval(buf, pval1)) == NULL)
    398      1.1   agc 		return NULL;
    399      1.1   agc 	if (!*buf)
    400      1.1   agc 		return NULL;
    401      1.1   agc 	if ((buf = get_numval(buf, pval2)) == NULL)
    402      1.1   agc 		return NULL;
    403      1.1   agc 	return buf;
    404      1.1   agc }
    405      1.1   agc 
    406      1.1   agc 
    407      1.1   agc /*
    408      1.1   agc  * get_ynval:
    409      1.1   agc  *    Get a yes/no selection.
    410      1.1   agc  *
    411      1.1   agc  *    Parameter:
    412      1.1   agc  *          buf      The buffer pointer
    413      1.1   agc  *          pval     The pointer to the result.
    414      1.1   agc  *
    415      1.1   agc  *    Returns:    The pointer to the next parameter, NULL on error.
    416      1.1   agc  */
    417      1.1   agc 
    418      1.1   agc STATIC uint8_t *
    419      1.1   agc get_ynval(uint8_t *buf, uint32_t *pval)
    420      1.1   agc {
    421      1.1   agc 
    422      1.1   agc 	if (strcmp(buf, "Yes") == 0)
    423      1.1   agc 		*pval = 1;
    424      1.1   agc 	else if (strcmp(buf, "No") == 0)
    425      1.1   agc 		*pval = 0;
    426      1.1   agc 	else
    427      1.1   agc 		return NULL;
    428      1.1   agc 
    429      1.1   agc 	return skiptozero(buf);
    430      1.1   agc }
    431      1.1   agc 
    432      1.1   agc 
    433      1.1   agc /*
    434      1.1   agc  * get_digestval:
    435      1.1   agc  *    Get a digest selection.
    436      1.1   agc  *
    437      1.1   agc  *    Parameter:
    438      1.1   agc  *          buf      The buffer pointer
    439      1.1   agc  *          pval     The pointer to the result.
    440      1.1   agc  *
    441      1.1   agc  *    Returns:    The pointer to the next parameter, NULL on error.
    442      1.1   agc  */
    443      1.1   agc 
    444      1.1   agc STATIC uint8_t *
    445      1.1   agc get_digestval(uint8_t *buf, uint32_t *pval)
    446      1.1   agc {
    447      1.1   agc 
    448      1.1   agc 	if (strcmp(buf, "CRC32C") == 0)
    449      1.1   agc 		*pval = 1;
    450      1.1   agc 	else if (strcmp(buf, "None") == 0)
    451      1.1   agc 		*pval = 0;
    452      1.1   agc 	else
    453      1.1   agc 		return NULL;
    454      1.1   agc 
    455      1.1   agc 	return skiptozero(buf);
    456      1.1   agc }
    457      1.1   agc 
    458      1.1   agc 
    459      1.1   agc /*
    460      1.1   agc  * get_authval:
    461      1.1   agc  *    Get an authentication method.
    462      1.1   agc  *
    463      1.1   agc  *    Parameter:
    464      1.1   agc  *          buf      The buffer pointer
    465      1.1   agc  *          pval     The pointer to the result.
    466      1.1   agc  *
    467      1.1   agc  *    Returns:    The pointer to the next parameter, NULL on error.
    468      1.1   agc  */
    469      1.1   agc 
    470      1.1   agc STATIC uint8_t *
    471      1.1   agc get_authval(uint8_t *buf, uint32_t *pval)
    472      1.1   agc {
    473      1.1   agc 
    474      1.1   agc 	if (strcmp(buf, "None") == 0)
    475      1.1   agc 		*pval = ISCSI_AUTH_None;
    476      1.1   agc 	else if (strcmp(buf, "CHAP") == 0)
    477      1.1   agc 		*pval = ISCSI_AUTH_CHAP;
    478      1.1   agc 	else if (strcmp(buf, "KRB5") == 0)
    479      1.1   agc 		*pval = ISCSI_AUTH_KRB5;
    480      1.1   agc 	else if (strcmp(buf, "SRP") == 0)
    481      1.1   agc 		*pval = ISCSI_AUTH_SRP;
    482      1.1   agc 	else
    483      1.1   agc 		return NULL;
    484      1.1   agc 
    485      1.1   agc 	return skiptozero(buf);
    486      1.1   agc }
    487      1.1   agc 
    488      1.1   agc 
    489      1.1   agc /*
    490      1.1   agc  * get_strval:
    491      1.1   agc  *    Get a string value (returns pointer to original buffer, not a copy).
    492      1.1   agc  *
    493      1.1   agc  *    Parameter:
    494      1.1   agc  *          buf      The buffer pointer
    495      1.1   agc  *          pval     The pointer to the result pointer.
    496      1.1   agc  *
    497      1.1   agc  *    Returns:    The pointer to the next parameter, NULL on error.
    498      1.1   agc  */
    499      1.1   agc 
    500      1.1   agc STATIC uint8_t *
    501      1.1   agc get_strval(uint8_t *buf, uint8_t **pval)
    502      1.1   agc {
    503      1.1   agc 
    504      1.1   agc 	if (strlen(buf) > MAX_STRING)
    505      1.1   agc 		return NULL;
    506      1.1   agc 
    507      1.1   agc 	*pval = buf;
    508      1.1   agc 
    509      1.1   agc 	return skiptozero(buf);
    510      1.1   agc }
    511      1.1   agc 
    512      1.1   agc 
    513      1.1   agc /*
    514      1.1   agc  * get_parameter:
    515      1.1   agc  *    Analyze a key=value string.
    516      1.1   agc  *    NOTE: The string is modified in the process.
    517      1.1   agc  *
    518      1.1   agc  *    Parameter:
    519      1.1   agc  *          buf      The buffer pointer
    520      1.1   agc  *          par      The parameter descriptor to be filled in
    521      1.1   agc  *
    522      1.1   agc  *    Returns:    The pointer to the next parameter, NULL on error.
    523      1.1   agc  */
    524      1.1   agc 
    525      1.1   agc STATIC uint8_t *
    526      1.1   agc get_parameter(uint8_t *buf, negotiation_parameter_t *par)
    527      1.1   agc {
    528      1.1   agc 	uint8_t *bp = buf;
    529      1.1   agc 	int i;
    530      1.1   agc 
    531      1.1   agc 	while (*bp && *bp != '=') {
    532      1.1   agc 		bp++;
    533      1.1   agc 	}
    534      1.1   agc 	if (!*bp) {
    535      1.1   agc 		DEBOUT(("get_parameter: Premature end of parameter\n"));
    536      1.1   agc 		return NULL;
    537      1.1   agc 	}
    538      1.1   agc 
    539      1.1   agc 	*bp++ = 0;
    540      1.1   agc 
    541      1.1   agc 	for (i = 0; i <= MAX_KEY; i++)
    542      1.1   agc 		if (!strcmp(buf, entries[i].name))
    543      1.1   agc 			break;
    544      1.1   agc 
    545      1.1   agc 	par->key = i;
    546      1.1   agc 	par->list_num = 1;
    547      1.1   agc 
    548      1.1   agc 	if (i > MAX_KEY) {
    549      1.1   agc 		DEBOUT(("get_parameter: unrecognized key <%s>\n", buf));
    550      1.1   agc 		if (strlen(buf) > MAX_STRING) {
    551      1.1   agc 			DEBOUT(("get_parameter: key name > MAX_STRING\n"));
    552      1.1   agc 			return NULL;
    553      1.1   agc 		}
    554      1.1   agc 		par->val.sval = buf;
    555      1.1   agc 		return skiptozero(bp);
    556      1.1   agc 	}
    557      1.1   agc 
    558      1.1   agc 	switch (entries[i].val) {
    559      1.1   agc 	case T_NUM:
    560      1.1   agc 		bp = get_numval(bp, &par->val.nval[0]);
    561      1.1   agc 		break;
    562      1.1   agc 
    563      1.1   agc 	case T_BIGNUM:
    564      1.1   agc 		bp = get_bignumval(bp, par);
    565      1.1   agc 		break;
    566      1.1   agc 
    567      1.1   agc 	case T_STRING:
    568      1.1   agc 		bp = get_strval(bp, &par->val.sval);
    569      1.1   agc 		break;
    570      1.1   agc 
    571      1.1   agc 	case T_YESNO:
    572      1.1   agc 		bp = get_ynval(bp, &par->val.nval[0]);
    573      1.1   agc 		break;
    574      1.1   agc 
    575      1.1   agc 	case T_AUTH:
    576      1.1   agc 		bp = get_authval(bp, &par->val.nval[0]);
    577      1.1   agc 		break;
    578      1.1   agc 
    579      1.1   agc 	case T_DIGEST:
    580      1.1   agc 		bp = get_digestval(bp, &par->val.nval[0]);
    581      1.1   agc 		break;
    582      1.1   agc 
    583      1.1   agc 	case T_RANGE:
    584      1.1   agc 		bp = get_range(bp, &par->val.nval[0], &par->val.nval[1]);
    585      1.1   agc 		break;
    586      1.1   agc 
    587      1.1   agc 	default:
    588      1.1   agc 		/* Target sending any other types is wrong */
    589      1.1   agc 		bp = NULL;
    590      1.1   agc 		break;
    591      1.1   agc 	}
    592      1.1   agc 	DEB(10, ("get_par: key <%s>=%d, val=%d, ret %p\n",
    593      1.1   agc 			buf, i, entries[i].val, bp));
    594      1.1   agc 	return bp;
    595      1.1   agc }
    596      1.1   agc 
    597      1.1   agc /*****************************************************************************/
    598      1.1   agc 
    599      1.1   agc /*
    600      1.1   agc  * my_strcpy:
    601      1.1   agc  *    Replacement for strcpy that returns the end of the result string
    602      1.1   agc  *
    603      1.1   agc  *    Parameter:
    604      1.1   agc  *          dest     The destination buffer pointer
    605      1.1   agc  *          src      The source string
    606      1.1   agc  *
    607      1.1   agc  *    Returns:    A pointer to the terminating zero of the result.
    608      1.1   agc  */
    609      1.1   agc 
    610      1.1   agc static __inline unsigned
    611      1.1   agc my_strcpy(uint8_t *dest, const uint8_t *src)
    612      1.1   agc {
    613      1.1   agc 	unsigned	cc;
    614      1.1   agc 
    615      1.1   agc 	for (cc = 0 ; (*dest = *src) != 0x0 ; cc++) {
    616      1.1   agc 		dest++;
    617      1.1   agc 		src++;
    618      1.1   agc 	}
    619      1.1   agc 	return cc;
    620      1.1   agc }
    621      1.1   agc 
    622      1.1   agc 
    623      1.1   agc /*
    624      1.1   agc  * put_parameter:
    625      1.1   agc  *    Create a key=value string.
    626      1.1   agc  *
    627      1.1   agc  *    Parameter:
    628      1.1   agc  *          buf      The buffer pointer
    629      1.1   agc  *          par      The parameter descriptor
    630      1.1   agc  *
    631      1.1   agc  *    Returns:    The pointer to the next free buffer space, NULL on error.
    632      1.1   agc  */
    633      1.1   agc 
    634      1.1   agc STATIC unsigned
    635      1.1   agc put_parameter(uint8_t *buf, unsigned len, negotiation_parameter_t *par)
    636      1.1   agc {
    637      1.1   agc 	int i;
    638      1.1   agc 	unsigned	cc;
    639      1.1   agc 	const uint8_t *sp;
    640      1.1   agc 
    641      1.1   agc 	if (par->key > MAX_KEY) {
    642      1.1   agc 		return snprintf(buf, len, "%s=NotUnderstood", par->val.sval);
    643      1.1   agc 	}
    644      1.1   agc 
    645      1.1   agc 	cc = snprintf(buf, len, "%s=", entries[par->key].name);
    646      1.1   agc 
    647      1.1   agc 	for (i = 0; i < par->list_num; i++) {
    648      1.1   agc 		switch (entries[par->key].val) {
    649      1.1   agc 		case T_NUM:
    650      1.1   agc 			cc += snprintf(&buf[cc], len - cc, "%d", par->val.nval[i]);
    651      1.1   agc 			break;
    652      1.1   agc 
    653      1.1   agc 		case T_BIGNUM:
    654      1.1   agc 			/* list_num holds value size */
    655      1.1   agc 			cc += base64_encode(par->val.sval, par->list_num, &buf[cc]);
    656      1.1   agc 			i = par->list_num;
    657      1.1   agc 			break;
    658      1.1   agc 
    659      1.1   agc 		case T_STRING:
    660      1.1   agc 			cc += my_strcpy(&buf[cc], par->val.sval);
    661      1.1   agc 			break;
    662      1.1   agc 
    663      1.1   agc 		case T_YESNO:
    664      1.1   agc 			cc += my_strcpy(&buf[cc],
    665      1.1   agc 				(par->val.nval[i]) ? "Yes" : "No");
    666      1.1   agc 			break;
    667      1.1   agc 
    668      1.1   agc 		case T_AUTH:
    669      1.1   agc 			switch (par->val.nval[i]) {
    670      1.1   agc 			case ISCSI_AUTH_CHAP:
    671      1.1   agc 				sp = "CHAP";
    672      1.1   agc 				break;
    673      1.1   agc 			case ISCSI_AUTH_KRB5:
    674      1.1   agc 				sp = "KRB5";
    675      1.1   agc 				break;
    676      1.1   agc 			case ISCSI_AUTH_SRP:
    677      1.1   agc 				sp = "SRP";
    678      1.1   agc 				break;
    679      1.1   agc 			default:
    680      1.1   agc 				sp = "None";
    681      1.1   agc 				break;
    682      1.1   agc 			}
    683      1.1   agc 			cc += my_strcpy(&buf[cc], sp);
    684      1.1   agc 			break;
    685      1.1   agc 
    686      1.1   agc 		case T_DIGEST:
    687      1.1   agc 			cc += my_strcpy(&buf[cc], (par->val.nval[i]) ? "CRC32C" : "None");
    688      1.1   agc 			break;
    689      1.1   agc 
    690      1.1   agc 		case T_RANGE:
    691      1.1   agc 			if ((i + 1) >= par->list_num) {
    692      1.1   agc 				cc += my_strcpy(&buf[cc], "Reject");
    693      1.1   agc 			} else {
    694      1.1   agc 				cc += snprintf(&buf[cc], len - cc,
    695      1.1   agc 						"%d~%d", par->val.nval[i],
    696      1.1   agc 						par->val.nval[i + 1]);
    697      1.1   agc 				i++;
    698      1.1   agc 			}
    699      1.1   agc 			break;
    700      1.1   agc 
    701      1.1   agc 		case T_SENDT:
    702      1.1   agc 			cc += my_strcpy(&buf[cc], par->val.sval);
    703      1.1   agc 			break;
    704      1.1   agc 
    705      1.1   agc 		case T_SESS:
    706      1.1   agc 			cc += my_strcpy(&buf[cc],
    707      1.1   agc 				(par->val.nval[i]) ? "Normal" : "Discovery");
    708      1.1   agc 			break;
    709      1.1   agc 
    710      1.1   agc 		default:
    711      1.1   agc 			/* We should't be here... */
    712      1.1   agc 			DEBOUT(("Invalid type %d in put_parameter!\n",
    713      1.1   agc 					entries[par->key].val));
    714      1.1   agc 			break;
    715      1.1   agc 		}
    716      1.1   agc 		if ((i + 1) < par->list_num) {
    717      1.1   agc 			buf[cc++] = ',';
    718      1.1   agc 		}
    719      1.1   agc 	}
    720      1.1   agc 
    721      1.1   agc 	buf[cc] = 0x0;					/* make sure it's terminated */
    722      1.1   agc 	return cc + 1;				/* return next place in list */
    723      1.1   agc }
    724      1.1   agc 
    725      1.1   agc 
    726      1.1   agc /*
    727      1.1   agc  * put_par_block:
    728      1.1   agc  *    Fill a parameter block
    729      1.1   agc  *
    730      1.1   agc  *    Parameter:
    731      1.1   agc  *          buf      The buffer pointer
    732      1.1   agc  *          pars     The parameter descriptor array
    733      1.1   agc  *          n        The number of elements
    734      1.1   agc  *
    735      1.1   agc  *    Returns:    result from put_parameter (ptr to buffer, NULL on error)
    736      1.1   agc  */
    737      1.1   agc 
    738      1.1   agc static __inline unsigned
    739      1.1   agc put_par_block(uint8_t *buf, unsigned len, negotiation_parameter_t *pars, int n)
    740      1.1   agc {
    741      1.1   agc 	unsigned	cc;
    742      1.1   agc 	int i;
    743      1.1   agc 
    744      1.1   agc 	for (cc = 0, i = 0; i < n; i++) {
    745      1.1   agc 		cc += put_parameter(&buf[cc], len - cc, pars++);
    746      1.1   agc 		if (cc >= len) {
    747      1.1   agc 			break;
    748      1.1   agc 		}
    749      1.1   agc 	}
    750      1.1   agc 	return cc;
    751      1.1   agc }
    752      1.1   agc 
    753      1.1   agc /*
    754      1.1   agc  * parameter_size:
    755      1.1   agc  *    Determine the size of a key=value string.
    756      1.1   agc  *
    757      1.1   agc  *    Parameter:
    758      1.1   agc  *          par      The parameter descriptor
    759      1.1   agc  *
    760      1.1   agc  *    Returns:    The size of the resulting string.
    761      1.1   agc  */
    762      1.1   agc 
    763      1.1   agc STATIC int
    764      1.1   agc parameter_size(negotiation_parameter_t *par)
    765      1.1   agc {
    766      1.1   agc 	int i, size;
    767      1.1   agc 	char buf[24];	/* max. 2 10-digit numbers + sep. */
    768      1.1   agc 
    769      1.1   agc 	if (par->key > MAX_KEY) {
    770      1.1   agc 		return strlen(par->val.sval) + 15;
    771      1.1   agc 	}
    772      1.1   agc 	/* count '=' and terminal zero */
    773      1.1   agc 	size = strlen(entries[par->key].name) + 2;
    774      1.1   agc 
    775      1.1   agc 	for (i = 0; i < par->list_num; i++) {
    776      1.1   agc 		switch (entries[par->key].val) {
    777      1.1   agc 		case T_NUM:
    778      1.1   agc 			size += snprintf(buf, sizeof(buf), "%d",
    779      1.1   agc 					par->val.nval[i]);
    780      1.1   agc 			break;
    781      1.1   agc 
    782      1.1   agc 		case T_BIGNUM:
    783      1.1   agc 			/* list_num holds value size */
    784      1.1   agc 			size += base64_enclen(par->list_num);
    785      1.1   agc 			i = par->list_num;
    786      1.1   agc 			break;
    787      1.1   agc 
    788      1.1   agc 		case T_STRING:
    789      1.1   agc 		case T_SENDT:
    790      1.1   agc 			size += strlen(par->val.sval);
    791      1.1   agc 			break;
    792      1.1   agc 
    793      1.1   agc 		case T_YESNO:
    794      1.1   agc 			size += (par->val.nval[i]) ? 3 : 2;
    795      1.1   agc 			break;
    796      1.1   agc 
    797      1.1   agc 		case T_AUTH:
    798      1.1   agc 			size += (par->val.nval[i] == ISCSI_AUTH_SRP) ? 3 : 4;
    799      1.1   agc 			break;
    800      1.1   agc 
    801      1.1   agc 		case T_DIGEST:
    802      1.1   agc 			size += (par->val.nval[i]) ? 6 : 4;
    803      1.1   agc 			break;
    804      1.1   agc 
    805      1.1   agc 		case T_RANGE:
    806      1.1   agc 			assert((i + 1) < par->list_num);
    807      1.1   agc 			size += snprintf(buf, sizeof(buf), "%d~%d",
    808      1.1   agc 				par->val.nval[i],
    809      1.1   agc 							par->val.nval[i + 1]);
    810      1.1   agc 			i++;
    811      1.1   agc 			break;
    812      1.1   agc 
    813      1.1   agc 		case T_SESS:
    814      1.1   agc 			size += (par->val.nval[i]) ? 6 : 9;
    815      1.1   agc 			break;
    816      1.1   agc 
    817      1.1   agc 		default:
    818      1.1   agc 			/* We should't be here... */
    819      1.1   agc 			DEBOUT(("Invalid type %d in parameter_size!\n",
    820      1.1   agc 					entries[par->key].val));
    821      1.1   agc 			break;
    822      1.1   agc 		}
    823      1.1   agc 		if ((i + 1) < par->list_num) {
    824      1.1   agc 			size++;
    825      1.1   agc 		}
    826      1.1   agc 	}
    827      1.1   agc 
    828      1.1   agc 	return size;
    829      1.1   agc }
    830      1.1   agc 
    831      1.1   agc 
    832      1.1   agc /*
    833      1.1   agc  * total_size:
    834      1.1   agc  *    Determine the size of a negotiation data block
    835      1.1   agc  *
    836      1.1   agc  *    Parameter:
    837      1.1   agc  *          pars     The parameter descriptor array
    838      1.1   agc  *          n        The number of elements
    839      1.1   agc  *
    840      1.1   agc  *    Returns:    The size of the block
    841      1.1   agc  */
    842      1.1   agc 
    843      1.1   agc static __inline int
    844      1.1   agc total_size(negotiation_parameter_t *pars, int n)
    845      1.1   agc {
    846      1.1   agc 	int i, size;
    847      1.1   agc 
    848      1.1   agc 	for (i = 0, size = 0; i < n; i++) {
    849      1.1   agc 		size += parameter_size(pars++);
    850      1.1   agc 	}
    851      1.1   agc 	return size;
    852      1.1   agc }
    853      1.1   agc 
    854      1.1   agc /*****************************************************************************/
    855      1.1   agc 
    856      1.1   agc 
    857      1.1   agc /*
    858      1.1   agc  * complete_pars:
    859      1.1   agc  *    Allocate space for text parameters, translate parameter values into
    860      1.1   agc  *    text.
    861      1.1   agc  *
    862      1.1   agc  *    Parameter:
    863      1.1   agc  *          state    Negotiation state
    864      1.1   agc  *          pdu      The transmit PDU
    865      1.1   agc  *
    866      1.1   agc  *    Returns:    0     On success
    867      1.1   agc  *                > 0   (an ISCSI error code) if an error occurred.
    868      1.1   agc  */
    869      1.1   agc 
    870      1.1   agc STATIC int
    871      1.1   agc complete_pars(negotiation_state_t *state, pdu_t *pdu)
    872      1.1   agc {
    873      1.1   agc 	int len;
    874      1.1   agc 	uint8_t *bp;
    875      1.1   agc #ifdef ISCSI_TEST_MODE
    876      1.1   agc 	test_pars_t *tp = pdu->connection->test_pars;
    877      1.1   agc 	neg_desc_t *nd = NULL;
    878      1.1   agc #endif
    879      1.1   agc 
    880      1.1   agc 	len = total_size(state->pars, state->num_pars);
    881      1.1   agc 
    882      1.1   agc #ifdef ISCSI_TEST_MODE
    883      1.1   agc 	if (tp != NULL) {
    884      1.1   agc 		while ((nd = TAILQ_FIRST(&pdu->connection->test_pars->negs)) != NULL &&
    885      1.1   agc 			   nd->entry.state < state->auth_state) {
    886      1.1   agc 			TAILQ_REMOVE(&tp->negs, nd, link);
    887      1.1   agc 			free(nd, M_TEMP);
    888      1.1   agc 		}
    889      1.1   agc 		if (nd != NULL && nd->entry.state == state->auth_state) {
    890      1.1   agc 			if (nd->entry.flags & ISCSITEST_NEGOPT_REPLACE)
    891      1.1   agc 				len = 0;
    892      1.1   agc 			len += nd->entry.size;
    893      1.1   agc 		} else
    894      1.1   agc 			nd = NULL;
    895      1.1   agc 	}
    896      1.1   agc #endif
    897      1.1   agc 
    898      1.1   agc 	DEB(10, ("complete_pars: n=%d, len=%d\n", state->num_pars, len));
    899      1.1   agc 
    900      1.1   agc 	if ((bp = malloc(len, M_TEMP, M_WAITOK)) == NULL) {
    901      1.1   agc 		DEBOUT(("*** Out of memory in complete_pars\n"));
    902      1.1   agc 		return ISCSI_STATUS_NO_RESOURCES;
    903      1.1   agc 	}
    904      1.1   agc 	pdu->temp_data = bp;
    905      1.1   agc 
    906      1.1   agc #ifdef ISCSI_TEST_MODE
    907      1.1   agc 	if (nd == NULL || !(nd->entry.flags & ISCSITEST_NEGOPT_REPLACE))
    908      1.1   agc 		if ((bp = put_par_block(pdu->temp_data, len,
    909      1.1   agc 				state->pars, state->num_pars)) == NULL) {
    910      1.1   agc 			DEBOUT(("Bad parameter in complete_pars\n"));
    911      1.1   agc 			return ISCSI_STATUS_PARAMETER_INVALID;
    912      1.1   agc 		}
    913      1.1   agc 	if (nd != NULL) {
    914      1.1   agc 		memcpy(bp, nd->entry.value, nd->entry.size);
    915      1.1   agc 		TAILQ_REMOVE(&tp->negs, nd, link);
    916      1.1   agc 		free(nd, M_TEMP);
    917      1.1   agc 	}
    918      1.1   agc #else
    919      1.1   agc 	if (put_par_block(pdu->temp_data, len, state->pars,
    920      1.1   agc 			state->num_pars) == 0) {
    921      1.1   agc 		DEBOUT(("Bad parameter in complete_pars\n"));
    922      1.1   agc 		return ISCSI_STATUS_PARAMETER_INVALID;
    923      1.1   agc 	}
    924      1.1   agc #endif
    925      1.1   agc 
    926      1.1   agc 	pdu->temp_data_len = len;
    927      1.1   agc 	return 0;
    928      1.1   agc }
    929      1.1   agc 
    930      1.1   agc 
    931      1.1   agc /*
    932      1.1   agc  * set_key_n:
    933      1.1   agc  *    Initialize a key and its numeric value.
    934      1.1   agc  *
    935      1.1   agc  *    Parameter:
    936      1.1   agc  *          state    Negotiation state
    937      1.1   agc  *          key      The key
    938      1.1   agc  *          val      The value
    939      1.1   agc  */
    940      1.1   agc 
    941      1.1   agc STATIC negotiation_parameter_t *
    942      1.1   agc set_key_n(negotiation_state_t *state, text_key_t key, uint32_t val)
    943      1.1   agc {
    944      1.1   agc 	negotiation_parameter_t *par;
    945      1.1   agc 
    946      1.1   agc 	if (state->num_pars >= MAX_NEG) {
    947      1.1   agc 		DEBOUT(("set_key_n: num_pars (%d) >= MAX_NEG (%d)\n",
    948      1.1   agc 				state->num_pars, MAX_NEG));
    949      1.1   agc 		return NULL;
    950      1.1   agc 	}
    951      1.1   agc 	par = &state->pars[state->num_pars];
    952      1.1   agc 	par->key = key;
    953      1.1   agc 	par->list_num = 1;
    954      1.1   agc 	par->val.nval[0] = val;
    955      1.1   agc 	state->num_pars++;
    956      1.1   agc 	state->kflags[key] |= NS_SENT;
    957      1.1   agc 
    958      1.1   agc 	return par;
    959      1.1   agc }
    960      1.1   agc 
    961      1.1   agc /*
    962      1.1   agc  * set_key_s:
    963      1.1   agc  *    Initialize a key and its string value.
    964      1.1   agc  *
    965      1.1   agc  *    Parameter:
    966      1.1   agc  *          state    Negotiation state
    967      1.1   agc  *          key      The key
    968      1.1   agc  *          val      The value
    969      1.1   agc  */
    970      1.1   agc 
    971      1.1   agc STATIC negotiation_parameter_t *
    972      1.1   agc set_key_s(negotiation_state_t *state, text_key_t key, uint8_t *val)
    973      1.1   agc {
    974      1.1   agc 	negotiation_parameter_t *par;
    975      1.1   agc 
    976      1.1   agc 	if (state->num_pars >= MAX_NEG) {
    977      1.1   agc 		DEBOUT(("set_key_s: num_pars (%d) >= MAX_NEG (%d)\n",
    978      1.1   agc 				state->num_pars, MAX_NEG));
    979      1.1   agc 		return NULL;
    980      1.1   agc 	}
    981      1.1   agc 	par = &state->pars[state->num_pars];
    982      1.1   agc 	par->key = key;
    983      1.1   agc 	par->list_num = 1;
    984      1.1   agc 	par->val.sval = val;
    985      1.1   agc 	state->num_pars++;
    986      1.1   agc 	state->kflags[key] |= NS_SENT;
    987      1.1   agc 
    988      1.1   agc 	return par;
    989      1.1   agc }
    990      1.1   agc 
    991      1.1   agc 
    992      1.1   agc /*****************************************************************************/
    993      1.1   agc 
    994      1.1   agc /*
    995      1.1   agc  * eval_parameter:
    996      1.1   agc  *    Evaluate a received negotiation value.
    997      1.1   agc  *
    998      1.1   agc  *    Parameter:
    999      1.1   agc  *          conn     The connection
   1000      1.1   agc  *          state    The negotiation state
   1001      1.1   agc  *          par      The parameter
   1002      1.1   agc  *
   1003      1.1   agc  *    Returns:    0 on success, else an ISCSI status value.
   1004      1.1   agc  */
   1005      1.1   agc 
   1006      1.1   agc STATIC int
   1007      1.1   agc eval_parameter(connection_t *conn, negotiation_state_t *state,
   1008      1.1   agc 			   negotiation_parameter_t *par)
   1009      1.1   agc {
   1010      1.1   agc 	uint32_t n = par->val.nval[0];
   1011      1.1   agc 	size_t sz;
   1012      1.1   agc 	text_key_t key = par->key;
   1013      1.1   agc 	bool sent = (state->kflags[key] & NS_SENT) != 0;
   1014      1.1   agc 
   1015      1.1   agc 	state->kflags[key] |= NS_RECEIVED;
   1016      1.1   agc 
   1017      1.1   agc 	switch (key) {
   1018      1.1   agc 		/*
   1019      1.1   agc 		 *  keys connected to security negotiation
   1020      1.1   agc 		 */
   1021      1.1   agc 	case K_AuthMethod:
   1022      1.1   agc 		if (n) {
   1023      1.1   agc 			DEBOUT(("eval_par: AuthMethod nonzero (%d)\n", n));
   1024      1.1   agc 			return ISCSI_STATUS_NEGOTIATION_ERROR;
   1025      1.1   agc 		}
   1026      1.1   agc 		break;
   1027      1.1   agc 
   1028      1.1   agc 	case K_Auth_CHAP_Algorithm:
   1029      1.1   agc 	case K_Auth_CHAP_Challenge:
   1030      1.1   agc 	case K_Auth_CHAP_Identifier:
   1031      1.1   agc 	case K_Auth_CHAP_Name:
   1032      1.1   agc 	case K_Auth_CHAP_Response:
   1033      1.1   agc 		DEBOUT(("eval_par: Authorization Key in Operational Phase\n"));
   1034      1.1   agc 		return ISCSI_STATUS_NEGOTIATION_ERROR;
   1035      1.1   agc 
   1036      1.1   agc 		/*
   1037      1.1   agc 		 * keys we always send
   1038      1.1   agc 		 */
   1039      1.1   agc 	case K_DataDigest:
   1040      1.1   agc 		state->DataDigest = n;
   1041      1.1   agc 		if (!sent)
   1042      1.1   agc 			set_key_n(state, key, n);
   1043      1.1   agc 		break;
   1044      1.1   agc 
   1045      1.1   agc 	case K_HeaderDigest:
   1046      1.1   agc 		state->HeaderDigest = n;
   1047      1.1   agc 		if (!sent)
   1048      1.1   agc 			set_key_n(state, key, n);
   1049      1.1   agc 		break;
   1050      1.1   agc 
   1051      1.1   agc 	case K_ErrorRecoveryLevel:
   1052      1.1   agc 		state->ErrorRecoveryLevel = n;
   1053      1.1   agc 		if (!sent)
   1054      1.1   agc 			set_key_n(state, key, n);
   1055      1.1   agc 		break;
   1056      1.1   agc 
   1057      1.1   agc 	case K_ImmediateData:
   1058      1.1   agc 		state->ImmediateData = n;
   1059      1.1   agc 		if (!sent)
   1060      1.1   agc 			set_key_n(state, key, n);
   1061      1.1   agc 		break;
   1062      1.1   agc 
   1063      1.1   agc 	case K_InitialR2T:
   1064      1.1   agc 		state->InitialR2T = n;
   1065      1.1   agc 		if (!sent)
   1066      1.1   agc 			set_key_n(state, key, n);
   1067      1.1   agc 		break;
   1068      1.1   agc 
   1069      1.1   agc 	case K_MaxRecvDataSegmentLength:
   1070      1.1   agc 		state->MaxRecvDataSegmentLength = n;
   1071      1.1   agc 		/* this is basically declarative, not negotiated */
   1072      1.1   agc 		/* (each side has its own value) */
   1073      1.1   agc 		break;
   1074      1.1   agc 
   1075      1.1   agc 		/*
   1076      1.1   agc 		 * keys we don't always send, so we may have to reflect the value
   1077      1.1   agc 		 */
   1078      1.1   agc 	case K_DefaultTime2Retain:
   1079      1.1   agc 		state->DefaultTime2Retain = n = min(state->DefaultTime2Retain, n);
   1080      1.1   agc 		if (!sent)
   1081      1.1   agc 			set_key_n(state, key, n);
   1082      1.1   agc 		break;
   1083      1.1   agc 
   1084      1.1   agc 	case K_DefaultTime2Wait:
   1085      1.1   agc 		state->DefaultTime2Wait = n = min(state->DefaultTime2Wait, n);
   1086      1.1   agc 		if (!sent)
   1087      1.1   agc 			set_key_n(state, key, n);
   1088      1.1   agc 		break;
   1089      1.1   agc 
   1090      1.1   agc 	case K_MaxConnections:
   1091      1.1   agc 		if (state->MaxConnections)
   1092      1.1   agc 			state->MaxConnections = n = min(state->MaxConnections, n);
   1093      1.1   agc 		else
   1094      1.1   agc 			state->MaxConnections = n;
   1095      1.1   agc 
   1096      1.1   agc 		if (!sent)
   1097      1.1   agc 			set_key_n(state, key, n);
   1098      1.1   agc 		break;
   1099      1.1   agc 
   1100      1.1   agc 	case K_MaxOutstandingR2T:
   1101      1.1   agc 		state->MaxOutstandingR2T = n;
   1102      1.1   agc 		if (!sent)
   1103      1.1   agc 			set_key_n(state, key, n);
   1104      1.1   agc 		break;
   1105      1.1   agc 
   1106      1.1   agc 	case K_FirstBurstLength:
   1107      1.1   agc 		state->FirstBurstLength = n;
   1108      1.1   agc 		if (!sent)
   1109      1.1   agc 			set_key_n(state, key, n);
   1110      1.1   agc 		break;
   1111      1.1   agc 
   1112      1.1   agc 	case K_MaxBurstLength:
   1113      1.1   agc 		state->MaxBurstLength = n;
   1114      1.1   agc 		if (!sent)
   1115      1.1   agc 			set_key_n(state, key, n);
   1116      1.1   agc 		break;
   1117      1.1   agc 
   1118      1.1   agc 	case K_IFMarker:
   1119      1.1   agc 	case K_OFMarker:
   1120      1.1   agc 		/* not (yet) supported */
   1121      1.1   agc 		if (!sent)
   1122      1.1   agc 			set_key_n(state, key, 0);
   1123      1.1   agc 		break;
   1124      1.1   agc 
   1125      1.1   agc 	case K_IFMarkInt:
   1126      1.1   agc 	case K_OFMarkInt:
   1127      1.1   agc 		/* it's a range, and list_num will be 1, so this will reply "Reject" */
   1128      1.1   agc 		if (!sent)
   1129      1.1   agc 			set_key_n(state, key, 0);
   1130      1.1   agc 		break;
   1131      1.1   agc 
   1132      1.1   agc 	case K_DataPDUInOrder:
   1133      1.1   agc 	case K_DataSequenceInOrder:
   1134      1.1   agc 		/* values are don't care */
   1135      1.1   agc 		if (!sent)
   1136      1.1   agc 			set_key_n(state, key, n);
   1137      1.1   agc 		break;
   1138      1.1   agc 
   1139      1.1   agc 	case K_NotUnderstood:
   1140      1.1   agc 		/* return "NotUnderstood" */
   1141      1.1   agc 		set_key_s(state, key, par->val.sval);
   1142      1.1   agc 		break;
   1143      1.1   agc 
   1144      1.1   agc 		/*
   1145      1.1   agc 		 * Declarative keys (no response required)
   1146      1.1   agc 		 */
   1147      1.1   agc 	case K_TargetAddress:
   1148      1.1   agc 		/* ignore for now... */
   1149      1.1   agc 		break;
   1150      1.1   agc 
   1151      1.1   agc 	case K_TargetAlias:
   1152      1.1   agc 		if (conn->login_par->is_present.TargetAlias) {
   1153      1.1   agc 			copyoutstr(par->val.sval, conn->login_par->TargetAlias,
   1154      1.1   agc 				ISCSI_STRING_LENGTH - 1, &sz);
   1155      1.1   agc 			/* do anything with return code?? */
   1156      1.1   agc 		}
   1157      1.1   agc 		break;
   1158      1.1   agc 
   1159      1.1   agc 	case K_TargetPortalGroupTag:
   1160      1.1   agc 		/* ignore for now... */
   1161      1.1   agc 		break;
   1162      1.1   agc 
   1163      1.1   agc 	default:
   1164      1.1   agc 		DEBOUT(("eval_par: Invalid parameter type %d\n", par->key));
   1165      1.1   agc 		return ISCSI_STATUS_NEGOTIATION_ERROR;
   1166      1.1   agc 	}
   1167      1.1   agc 	return 0;
   1168      1.1   agc }
   1169      1.1   agc 
   1170      1.1   agc /*****************************************************************************/
   1171      1.1   agc 
   1172      1.1   agc 
   1173      1.1   agc /*
   1174      1.1   agc  * init_session_parameters:
   1175      1.1   agc  *    Initialize session-related negotiation parameters from existing session
   1176      1.1   agc  *
   1177      1.1   agc  *    Parameter:
   1178      1.1   agc  *          sess     The session
   1179      1.1   agc  *          state    The negotiation state
   1180      1.1   agc  */
   1181      1.1   agc 
   1182      1.1   agc STATIC void
   1183      1.1   agc init_session_parameters(session_t *sess, negotiation_state_t *state)
   1184      1.1   agc {
   1185      1.1   agc 
   1186      1.1   agc 	state->ErrorRecoveryLevel = sess->ErrorRecoveryLevel;
   1187      1.1   agc 	state->InitialR2T = sess->InitialR2T;
   1188      1.1   agc 	state->ImmediateData = sess->ImmediateData;
   1189      1.1   agc 	state->MaxConnections = sess->MaxConnections;
   1190      1.1   agc 	state->DefaultTime2Wait = sess->DefaultTime2Wait;
   1191      1.1   agc 	state->DefaultTime2Retain = sess->DefaultTime2Retain;
   1192      1.1   agc 	state->MaxBurstLength = sess->MaxBurstLength;
   1193      1.1   agc 	state->FirstBurstLength = sess->FirstBurstLength;
   1194      1.1   agc 	state->MaxOutstandingR2T = sess->MaxOutstandingR2T;
   1195      1.1   agc }
   1196      1.1   agc 
   1197      1.1   agc 
   1198      1.1   agc 
   1199      1.1   agc /*
   1200      1.1   agc  * assemble_login_parameters:
   1201      1.1   agc  *    Assemble the initial login negotiation parameters.
   1202      1.1   agc  *
   1203      1.1   agc  *    Parameter:
   1204      1.1   agc  *          conn     The connection
   1205      1.1   agc  *          ccb      The CCB for the login exchange
   1206      1.1   agc  *          pdu      The PDU to use for sending
   1207      1.1   agc  *
   1208      1.1   agc  *    Returns:    < 0   if more security negotiation is required
   1209      1.1   agc  *                0     if this is the last security negotiation block
   1210      1.1   agc  *                > 0   (an ISCSI error code) if an error occurred.
   1211      1.1   agc  */
   1212      1.1   agc 
   1213      1.1   agc int
   1214      1.1   agc assemble_login_parameters(connection_t *conn, ccb_t *ccb, pdu_t *pdu)
   1215      1.1   agc {
   1216      1.1   agc 	iscsi_login_parameters_t *par = conn->login_par;
   1217      1.1   agc 	size_t sz;
   1218      1.1   agc 	int rc, i, next;
   1219      1.1   agc 	negotiation_state_t *state;
   1220      1.1   agc 	negotiation_parameter_t *cpar;
   1221      1.1   agc 
   1222      1.1   agc 	state = malloc(sizeof(*state), M_TEMP, M_WAITOK | M_ZERO);
   1223      1.1   agc 	if (state == NULL) {
   1224      1.1   agc 		DEBOUT(("*** Out of memory in assemble_login_params\n"));
   1225      1.1   agc 		return ISCSI_STATUS_NO_RESOURCES;
   1226      1.1   agc 	}
   1227      1.1   agc 	ccb->temp_data = state;
   1228      1.1   agc 
   1229      1.1   agc 	if (!InitiatorName[0]) {
   1230      1.1   agc 		DEBOUT(("No InitiatorName\n"));
   1231      1.1   agc 		return ISCSI_STATUS_PARAMETER_MISSING;
   1232      1.1   agc 	}
   1233      1.1   agc 	set_key_s(state, K_InitiatorName, InitiatorName);
   1234      1.1   agc 
   1235      1.1   agc 	if (InitiatorAlias[0])
   1236      1.1   agc 		set_key_s(state, K_InitiatorAlias, InitiatorAlias);
   1237      1.1   agc 
   1238      1.1   agc 	conn->Our_MaxRecvDataSegmentLength =
   1239      1.1   agc 		(par->is_present.MaxRecvDataSegmentLength)
   1240      1.1   agc 		? par->MaxRecvDataSegmentLength : DEFAULT_MaxRecvDataSegmentLength;
   1241      1.1   agc 
   1242      1.1   agc 	/* setup some values for authentication */
   1243      1.1   agc 	if (par->is_present.password)
   1244      1.1   agc 		copyinstr(par->password, state->password, MAX_STRING, &sz);
   1245      1.1   agc 	if (par->is_present.target_password)
   1246      1.1   agc 		copyinstr(par->target_password, state->target_password,
   1247      1.1   agc 			MAX_STRING, &sz);
   1248      1.1   agc 	if (par->is_present.user_name)
   1249      1.1   agc 		copyinstr(par->user_name, state->user_name, MAX_STRING, &sz);
   1250      1.1   agc 	else
   1251      1.1   agc 		strlcpy(state->user_name, InitiatorName,
   1252      1.1   agc 			sizeof(state->user_name));
   1253      1.1   agc 
   1254      1.1   agc 	next = TRUE;
   1255      1.1   agc 
   1256      1.1   agc 	set_key_n(state, K_SessionType,
   1257      1.1   agc 			  par->login_type > ISCSI_LOGINTYPE_DISCOVERY);
   1258      1.1   agc 
   1259      1.1   agc 	cpar = set_key_n(state, K_AuthMethod, ISCSI_AUTH_None);
   1260      1.1   agc 
   1261      1.1   agc 	if (cpar != NULL && par->is_present.auth_info &&
   1262      1.1   agc 		par->auth_info.auth_number > 0) {
   1263      1.1   agc 		if (par->auth_info.auth_number > ISCSI_AUTH_OPTIONS) {
   1264      1.1   agc 			DEBOUT(("Auth number too big in asm_login\n"));
   1265      1.1   agc 			return ISCSI_STATUS_PARAMETER_INVALID;
   1266      1.1   agc 		}
   1267      1.1   agc 		cpar->list_num = par->auth_info.auth_number;
   1268      1.1   agc 		for (i = 0; i < cpar->list_num; i++) {
   1269      1.1   agc 			cpar->val.nval[i] = par->auth_info.auth_type[i];
   1270      1.1   agc 			if (par->auth_info.auth_type[i])
   1271      1.1   agc 				next = FALSE;
   1272      1.1   agc 		}
   1273      1.1   agc 	}
   1274      1.1   agc 
   1275      1.1   agc 	if (par->is_present.TargetName)
   1276      1.1   agc 		copyinstr(par->TargetName, state->temp_buf, ISCSI_STRING_LENGTH - 1,
   1277      1.1   agc 				  &sz);
   1278      1.1   agc 	else {
   1279      1.1   agc 		state->temp_buf[0] = 0;
   1280      1.1   agc 		sz = 0;
   1281      1.1   agc 	}
   1282      1.1   agc 
   1283      1.1   agc 	if ((!sz || !state->temp_buf[0]) &&
   1284      1.1   agc 		par->login_type != ISCSI_LOGINTYPE_DISCOVERY) {
   1285      1.1   agc 		DEBOUT(("No TargetName\n"));
   1286      1.1   agc 		return ISCSI_STATUS_PARAMETER_MISSING;
   1287      1.1   agc 	}
   1288      1.1   agc 
   1289      1.1   agc 	if (state->temp_buf[0]) {
   1290      1.1   agc 		set_key_s(state, K_TargetName, state->temp_buf);
   1291      1.1   agc 	}
   1292      1.1   agc 
   1293      1.1   agc 	if ((rc = complete_pars(state, pdu)) != 0)
   1294      1.1   agc 		return rc;
   1295      1.1   agc 
   1296      1.1   agc 	return (next) ? 0 : -1;
   1297      1.1   agc }
   1298      1.1   agc 
   1299      1.1   agc 
   1300      1.1   agc /*
   1301      1.1   agc  * assemble_security_parameters:
   1302      1.1   agc  *    Assemble the security negotiation parameters.
   1303      1.1   agc  *
   1304      1.1   agc  *    Parameter:
   1305      1.1   agc  *          conn     The connection
   1306      1.1   agc  *          rx_pdu   The received login response PDU
   1307      1.1   agc  *          tx_pdu   The transmit PDU
   1308      1.1   agc  *
   1309      1.1   agc  *    Returns:    < 0   if more security negotiation is required
   1310      1.1   agc  *                0     if this is the last security negotiation block
   1311      1.1   agc  *                > 0   (an ISCSI error code) if an error occurred.
   1312      1.1   agc  */
   1313      1.1   agc 
   1314      1.1   agc int
   1315      1.1   agc assemble_security_parameters(connection_t *conn, ccb_t *ccb, pdu_t *rx_pdu,
   1316      1.1   agc 							 pdu_t *tx_pdu)
   1317      1.1   agc {
   1318      1.1   agc 	negotiation_state_t *state = (negotiation_state_t *) ccb->temp_data;
   1319      1.1   agc 	iscsi_login_parameters_t *par = conn->login_par;
   1320      1.1   agc 	negotiation_parameter_t rxp, *cpar;
   1321      1.1   agc 	uint8_t *rxpars;
   1322      1.1   agc 	int rc, next;
   1323      1.1   agc 	uint8_t identifier = 0;
   1324      1.1   agc 	uint8_t *challenge = NULL;
   1325      1.1   agc 	int challenge_size = 0;
   1326      1.1   agc 	uint8_t *response = NULL;
   1327      1.1   agc 	int response_size = 0;
   1328      1.1   agc 
   1329      1.1   agc 	state->num_pars = 0;
   1330      1.1   agc 	next = 0;
   1331      1.1   agc 
   1332      1.1   agc 	rxpars = (uint8_t *) rx_pdu->temp_data;
   1333      1.1   agc 	if (rxpars == NULL) {
   1334      1.1   agc 		DEBOUT(("No received parameters!\n"));
   1335      1.1   agc 		return ISCSI_STATUS_NEGOTIATION_ERROR;
   1336      1.1   agc 	}
   1337      1.1   agc 	/* Note: There are always at least 2 extra bytes past temp_data_len */
   1338      1.1   agc 	rxpars[rx_pdu->temp_data_len] = '\0';
   1339      1.1   agc 	rxpars[rx_pdu->temp_data_len + 1] = '\0';
   1340      1.1   agc 
   1341      1.1   agc 	while (*rxpars) {
   1342      1.1   agc 		if ((rxpars = get_parameter(rxpars, &rxp)) == NULL) {
   1343      1.1   agc 			DEBOUT(("get_parameter returned error\n"));
   1344      1.1   agc 			return ISCSI_STATUS_NEGOTIATION_ERROR;
   1345      1.1   agc 		}
   1346      1.1   agc 
   1347      1.1   agc 		state->kflags[rxp.key] |= NS_RECEIVED;
   1348      1.1   agc 
   1349      1.1   agc 		switch (rxp.key) {
   1350      1.1   agc 		case K_AuthMethod:
   1351      1.1   agc 			if (state->auth_state != AUTH_INITIAL) {
   1352      1.1   agc 				DEBOUT(("AuthMethod received, auth_state = %d\n",
   1353      1.1   agc 						state->auth_state));
   1354      1.1   agc 				return ISCSI_STATUS_NEGOTIATION_ERROR;
   1355      1.1   agc 			}
   1356      1.1   agc 
   1357      1.1   agc 			/* Note: if the selection is None, we shouldn't be here,
   1358      1.1   agc 			 * the target should have transited the state to op-neg.
   1359      1.1   agc 			 */
   1360      1.1   agc 			if (rxp.val.nval[0] != ISCSI_AUTH_CHAP) {
   1361      1.1   agc 				DEBOUT(("AuthMethod isn't CHAP (%d)\n", rxp.val.nval[0]));
   1362      1.1   agc 				return ISCSI_STATUS_NEGOTIATION_ERROR;
   1363      1.1   agc 			}
   1364      1.1   agc 
   1365      1.1   agc 			state->auth_state = AUTH_METHOD_SELECTED;
   1366      1.1   agc 			state->auth_alg = rxp.val.nval[0];
   1367      1.1   agc 			break;
   1368      1.1   agc 
   1369      1.1   agc 		case K_Auth_CHAP_Algorithm:
   1370      1.1   agc 			if (state->auth_state != AUTH_CHAP_ALG_SENT ||
   1371      1.1   agc 				rxp.val.nval[0] != 5) {
   1372      1.1   agc 				DEBOUT(("Bad algorithm, auth_state = %d, alg %d\n",
   1373      1.1   agc 						state->auth_state, rxp.val.nval[0]));
   1374      1.1   agc 				return ISCSI_STATUS_NEGOTIATION_ERROR;
   1375      1.1   agc 			}
   1376      1.1   agc 			break;
   1377      1.1   agc 
   1378      1.1   agc 		case K_Auth_CHAP_Challenge:
   1379      1.1   agc 			if (state->auth_state != AUTH_CHAP_ALG_SENT || !rxp.list_num) {
   1380      1.1   agc 				DEBOUT(("Bad Challenge, auth_state = %d, len %d\n",
   1381      1.1   agc 						state->auth_state, rxp.list_num));
   1382      1.1   agc 				return ISCSI_STATUS_NEGOTIATION_ERROR;
   1383      1.1   agc 			}
   1384      1.1   agc 			challenge = rxp.val.sval;
   1385      1.1   agc 			challenge_size = rxp.list_num;
   1386      1.1   agc 			break;
   1387      1.1   agc 
   1388      1.1   agc 		case K_Auth_CHAP_Identifier:
   1389      1.1   agc 			if (state->auth_state != AUTH_CHAP_ALG_SENT) {
   1390      1.1   agc 				DEBOUT(("Bad ID, auth_state = %d, id %d\n",
   1391      1.1   agc 						state->auth_state, rxp.val.nval[0]));
   1392      1.1   agc 				return ISCSI_STATUS_NEGOTIATION_ERROR;
   1393      1.1   agc 			}
   1394      1.1   agc 			identifier = (uint8_t) rxp.val.nval[0];
   1395      1.1   agc 			break;
   1396      1.1   agc 
   1397      1.1   agc 		case K_Auth_CHAP_Name:
   1398      1.1   agc 			if (state->auth_state != AUTH_CHAP_RSP_SENT) {
   1399      1.1   agc 				DEBOUT(("Bad Name, auth_state = %d, name <%s>\n",
   1400      1.1   agc 						state->auth_state, rxp.val.sval));
   1401      1.1   agc 				return ISCSI_STATUS_NEGOTIATION_ERROR;
   1402      1.1   agc 			}
   1403      1.1   agc 			/* what do we do with the name?? */
   1404      1.1   agc 			break;
   1405      1.1   agc 
   1406      1.1   agc 		case K_Auth_CHAP_Response:
   1407      1.1   agc 			if (state->auth_state != AUTH_CHAP_RSP_SENT) {
   1408      1.1   agc 				DEBOUT(("Bad Response, auth_state = %d, size %d\n",
   1409      1.1   agc 						state->auth_state, rxp.list_num));
   1410      1.1   agc 				return ISCSI_STATUS_NEGOTIATION_ERROR;
   1411      1.1   agc 			}
   1412      1.1   agc 			response = rxp.val.sval;
   1413      1.1   agc 			response_size = rxp.list_num;
   1414      1.1   agc 			if (response_size != CHAP_MD5_SIZE)
   1415      1.1   agc 				return ISCSI_STATUS_NEGOTIATION_ERROR;
   1416      1.1   agc 			break;
   1417      1.1   agc 
   1418      1.1   agc 		default:
   1419      1.1   agc 			rc = eval_parameter(conn, state, &rxp);
   1420      1.1   agc 			if (rc)
   1421      1.1   agc 				return rc;
   1422      1.1   agc 			break;
   1423      1.1   agc 		}
   1424      1.1   agc 	}
   1425      1.1   agc 
   1426      1.1   agc 	switch (state->auth_state) {
   1427      1.1   agc 	case AUTH_INITIAL:
   1428      1.1   agc 		DEBOUT(("Didn't receive Method\n"));
   1429      1.1   agc 		return ISCSI_STATUS_NEGOTIATION_ERROR;
   1430      1.1   agc 
   1431      1.1   agc 	case AUTH_METHOD_SELECTED:
   1432      1.1   agc 		set_key_n(state, K_Auth_CHAP_Algorithm, 5);
   1433      1.1   agc 		state->auth_state = AUTH_CHAP_ALG_SENT;
   1434      1.1   agc 		next = -1;
   1435      1.1   agc 		break;
   1436      1.1   agc 
   1437      1.1   agc 	case AUTH_CHAP_ALG_SENT:
   1438      1.1   agc 		if (!RX(state, K_Auth_CHAP_Algorithm) ||
   1439      1.1   agc 			!RX(state, K_Auth_CHAP_Identifier) ||
   1440      1.1   agc 			!RX(state, K_Auth_CHAP_Challenge)) {
   1441      1.1   agc 			DEBOUT(("Didn't receive all parameters\n"));
   1442      1.1   agc 			return ISCSI_STATUS_NEGOTIATION_ERROR;
   1443      1.1   agc 		}
   1444      1.1   agc 
   1445      1.1   agc 		set_key_s(state, K_Auth_CHAP_Name, state->user_name);
   1446      1.1   agc 
   1447      1.1   agc 		chap_md5_response(state->temp_buf, identifier, state->password,
   1448      1.1   agc 						  challenge, challenge_size);
   1449      1.1   agc 
   1450      1.1   agc 		cpar = set_key_s(state, K_Auth_CHAP_Response, state->temp_buf);
   1451      1.1   agc 		if (cpar != NULL)
   1452      1.1   agc 			cpar->list_num = CHAP_MD5_SIZE;
   1453      1.1   agc 
   1454      1.1   agc 		if (par->auth_info.mutual_auth) {
   1455      1.1   agc 			if (!state->target_password[0]) {
   1456      1.1   agc 				DEBOUT(("No target password with mutual authentication!\n"));
   1457      1.1   agc 				return ISCSI_STATUS_PARAMETER_MISSING;
   1458      1.1   agc 			}
   1459      1.1   agc 
   1460  1.1.2.1  yamt 			cprng_strong(kern_cprng,
   1461  1.1.2.1  yamt 				     &state->temp_buf[CHAP_MD5_SIZE],
   1462  1.1.2.1  yamt 				     CHAP_CHALLENGE_LEN + 1, 0);
   1463      1.1   agc 			set_key_n(state, K_Auth_CHAP_Identifier,
   1464      1.1   agc 					  state->temp_buf[CHAP_MD5_SIZE]);
   1465      1.1   agc 			cpar = set_key_s(state, K_Auth_CHAP_Challenge,
   1466      1.1   agc 							 &state->temp_buf[CHAP_MD5_SIZE + 1]);
   1467      1.1   agc 			if (cpar != NULL)
   1468      1.1   agc 				cpar->list_num = CHAP_CHALLENGE_LEN;
   1469      1.1   agc 			next = -1;
   1470      1.1   agc 		}
   1471      1.1   agc 		state->auth_state = AUTH_CHAP_RSP_SENT;
   1472      1.1   agc 		break;
   1473      1.1   agc 
   1474      1.1   agc 	case AUTH_CHAP_RSP_SENT:
   1475      1.1   agc 		/* we can only be here for mutual authentication */
   1476      1.1   agc 		if (!par->auth_info.mutual_auth || response == NULL) {
   1477      1.1   agc 			DEBOUT(("Mutual authentication not requested\n"));
   1478      1.1   agc 			return ISCSI_STATUS_NEGOTIATION_ERROR;
   1479      1.1   agc 		}
   1480      1.1   agc 
   1481      1.1   agc 		chap_md5_response(state->temp_buf,
   1482      1.1   agc 				state->temp_buf[CHAP_MD5_SIZE],
   1483      1.1   agc 				state->password,
   1484      1.1   agc 				&state->temp_buf[CHAP_MD5_SIZE + 1],
   1485      1.1   agc 				CHAP_CHALLENGE_LEN);
   1486      1.1   agc 
   1487      1.1   agc 		if (memcmp(state->temp_buf, response, response_size)) {
   1488      1.1   agc 			DEBOUT(("Mutual authentication mismatch\n"));
   1489      1.1   agc 			return ISCSI_STATUS_AUTHENTICATION_FAILED;
   1490      1.1   agc 		}
   1491      1.1   agc 		break;
   1492      1.1   agc 
   1493      1.1   agc 	default:
   1494      1.1   agc 		break;
   1495      1.1   agc 	}
   1496      1.1   agc 
   1497      1.1   agc 	complete_pars(state, tx_pdu);
   1498      1.1   agc 
   1499      1.1   agc 	return next;
   1500      1.1   agc }
   1501      1.1   agc 
   1502      1.1   agc 
   1503      1.1   agc /*
   1504      1.1   agc  * set_first_opnegs:
   1505      1.1   agc  *    Set the operational negotiation parameters we want to negotiate in
   1506      1.1   agc  *    the first login request in op_neg phase.
   1507      1.1   agc  *
   1508      1.1   agc  *    Parameter:
   1509      1.1   agc  *          conn     The connection
   1510      1.1   agc  *          state    Negotiation state
   1511      1.1   agc  */
   1512      1.1   agc 
   1513      1.1   agc STATIC void
   1514      1.1   agc set_first_opnegs(connection_t *conn, negotiation_state_t *state)
   1515      1.1   agc {
   1516      1.1   agc 	iscsi_login_parameters_t *lpar = conn->login_par;
   1517      1.1   agc 	negotiation_parameter_t *cpar;
   1518      1.1   agc 
   1519      1.1   agc     /* Digests - suggest None,CRC32C unless the user forces a value */
   1520      1.1   agc 	cpar = set_key_n(state, K_HeaderDigest,
   1521      1.1   agc 					 (lpar->is_present.HeaderDigest) ? lpar->HeaderDigest : 0);
   1522      1.1   agc 	if (cpar != NULL && !lpar->is_present.HeaderDigest) {
   1523      1.1   agc 		cpar->list_num = 2;
   1524      1.1   agc 		cpar->val.nval[1] = 1;
   1525      1.1   agc 	}
   1526      1.1   agc 
   1527      1.1   agc 	cpar = set_key_n(state, K_DataDigest, (lpar->is_present.DataDigest)
   1528      1.1   agc 		? lpar->DataDigest : 0);
   1529      1.1   agc 	if (cpar != NULL && !lpar->is_present.DataDigest) {
   1530      1.1   agc 		cpar->list_num = 2;
   1531      1.1   agc 		cpar->val.nval[1] = 1;
   1532      1.1   agc 	}
   1533      1.1   agc 
   1534      1.1   agc 	set_key_n(state, K_MaxRecvDataSegmentLength,
   1535      1.1   agc 		conn->Our_MaxRecvDataSegmentLength);
   1536      1.1   agc 	/* This is direction-specific, we may have a different default */
   1537      1.1   agc 	state->MaxRecvDataSegmentLength =
   1538      1.1   agc 		entries[K_MaxRecvDataSegmentLength].defval;
   1539      1.1   agc 
   1540      1.1   agc 	/* First connection only */
   1541      1.1   agc 	if (!conn->session->TSIH) {
   1542      1.1   agc 		state->ErrorRecoveryLevel =
   1543      1.1   agc 			(lpar->is_present.ErrorRecoveryLevel) ? lpar->ErrorRecoveryLevel
   1544      1.1   agc 												  : 2;
   1545      1.1   agc 		/*
   1546      1.1   agc 		   Negotiate InitialR2T to FALSE and ImmediateData to TRUE, should
   1547      1.1   agc 		   be slightly more efficient than the default InitialR2T=TRUE.
   1548      1.1   agc 		 */
   1549      1.1   agc 		state->InitialR2T = FALSE;
   1550      1.1   agc 		state->ImmediateData = TRUE;
   1551      1.1   agc 
   1552      1.1   agc 		/* We don't really care about this, so don't negotiate by default */
   1553      1.1   agc 		state->MaxBurstLength = entries[K_MaxBurstLength].defval;
   1554      1.1   agc 		state->FirstBurstLength = entries[K_FirstBurstLength].defval;
   1555      1.1   agc 		state->MaxOutstandingR2T = entries[K_MaxOutstandingR2T].defval;
   1556      1.1   agc 
   1557      1.1   agc #ifdef ISCSI_TEST_MODE
   1558      1.1   agc 		if (conn->test_pars != NULL) {
   1559      1.1   agc 			test_pars_t *tp = conn->test_pars;
   1560      1.1   agc 
   1561      1.1   agc 			if (tp->options & ISCSITEST_OVERRIDE_INITIALR2T)
   1562      1.1   agc 				state->InitialR2T = TRUE;
   1563      1.1   agc 			if (tp->options & ISCSITEST_OVERRIDE_IMMDATA)
   1564      1.1   agc 				state->ImmediateData = FALSE;
   1565      1.1   agc 
   1566      1.1   agc 			if (tp->options & ISCSITEST_NEGOTIATE_MAXBURST) {
   1567      1.1   agc 				state->MaxBurstLength = tp->maxburst_val;
   1568      1.1   agc 				set_key_n(state, K_MaxBurstLength, state->MaxBurstLength);
   1569      1.1   agc 			}
   1570      1.1   agc 			if (tp->options & ISCSITEST_NEGOTIATE_FIRSTBURST) {
   1571      1.1   agc 				state->FirstBurstLength = tp->firstburst_val;
   1572      1.1   agc 				set_key_n(state, K_FirstBurstLength, state->FirstBurstLength);
   1573      1.1   agc 			}
   1574      1.1   agc 			if (tp->options & ISCSITEST_NEGOTIATE_R2T) {
   1575      1.1   agc 				state->MaxOutstandingR2T = tp->r2t_val;
   1576      1.1   agc 				set_key_n(state, K_MaxOutstandingR2T, state->MaxOutstandingR2T);
   1577      1.1   agc 			}
   1578      1.1   agc 		}
   1579      1.1   agc #endif
   1580      1.1   agc 
   1581      1.1   agc 		set_key_n(state, K_ErrorRecoveryLevel, state->ErrorRecoveryLevel);
   1582      1.1   agc 		set_key_n(state, K_InitialR2T, state->InitialR2T);
   1583      1.1   agc 		set_key_n(state, K_ImmediateData, state->ImmediateData);
   1584      1.1   agc 
   1585      1.1   agc 		if (lpar->is_present.MaxConnections) {
   1586      1.1   agc 			state->MaxConnections = lpar->MaxConnections;
   1587      1.1   agc 			set_key_n(state, K_MaxConnections, lpar->MaxConnections);
   1588      1.1   agc 		}
   1589      1.1   agc 
   1590      1.1   agc 		if (lpar->is_present.DefaultTime2Wait)
   1591      1.1   agc 			set_key_n(state, K_DefaultTime2Wait, lpar->DefaultTime2Wait);
   1592      1.1   agc 		else
   1593      1.1   agc 			state->DefaultTime2Wait = entries[K_DefaultTime2Wait].defval;
   1594      1.1   agc 
   1595      1.1   agc 		if (lpar->is_present.DefaultTime2Retain)
   1596      1.1   agc 			set_key_n(state, K_DefaultTime2Retain, lpar->DefaultTime2Retain);
   1597      1.1   agc 		else
   1598      1.1   agc 			state->DefaultTime2Retain = entries[K_DefaultTime2Retain].defval;
   1599      1.1   agc 	} else
   1600      1.1   agc 		init_session_parameters(conn->session, state);
   1601      1.1   agc 
   1602      1.1   agc 	DEBC(conn, 10, ("SetFirstOpnegs: recover=%d, MRDSL=%d\n",
   1603      1.1   agc 		conn->recover, state->MaxRecvDataSegmentLength));
   1604      1.1   agc }
   1605      1.1   agc 
   1606      1.1   agc 
   1607      1.1   agc /*
   1608      1.1   agc  * assemble_negotiation_parameters:
   1609      1.1   agc  *    Assemble any negotiation parameters requested by the other side.
   1610      1.1   agc  *
   1611      1.1   agc  *    Parameter:
   1612      1.1   agc  *          conn     The connection
   1613      1.1   agc  *          ccb      The login ccb
   1614      1.1   agc  *          rx_pdu   The received login response PDU
   1615      1.1   agc  *          tx_pdu   The transmit PDU
   1616      1.1   agc  *
   1617      1.1   agc  *    Returns:    0     On success
   1618      1.1   agc  *                > 0   (an ISCSI error code) if an error occurred.
   1619      1.1   agc  */
   1620      1.1   agc 
   1621      1.1   agc int
   1622      1.1   agc assemble_negotiation_parameters(connection_t *conn, ccb_t *ccb, pdu_t *rx_pdu,
   1623      1.1   agc 							    pdu_t *tx_pdu)
   1624      1.1   agc {
   1625      1.1   agc 	negotiation_state_t *state = (negotiation_state_t *) ccb->temp_data;
   1626      1.1   agc 	negotiation_parameter_t rxp;
   1627      1.1   agc 	uint8_t *rxpars;
   1628      1.1   agc 	int rc;
   1629      1.1   agc 
   1630      1.1   agc 	state->num_pars = 0;
   1631      1.1   agc 
   1632      1.1   agc 	DEBC(conn, 10, ("AsmNegParams: connState=%d, MRDSL=%d\n",
   1633      1.1   agc 		conn->state, state->MaxRecvDataSegmentLength));
   1634      1.1   agc 
   1635      1.1   agc 	if (conn->state == ST_SEC_NEG) {
   1636      1.1   agc 		conn->state = ST_OP_NEG;
   1637      1.1   agc 		set_first_opnegs(conn, state);
   1638      1.1   agc 	}
   1639      1.1   agc 
   1640      1.1   agc 	rxpars = (uint8_t *) rx_pdu->temp_data;
   1641      1.1   agc 	if (rxpars != NULL) {
   1642      1.1   agc 		/* Note: There are always at least 2 extra bytes past temp_data_len */
   1643      1.1   agc 		rxpars[rx_pdu->temp_data_len] = '\0';
   1644      1.1   agc 		rxpars[rx_pdu->temp_data_len + 1] = '\0';
   1645      1.1   agc 
   1646      1.1   agc 		while (*rxpars) {
   1647      1.1   agc 			if ((rxpars = get_parameter(rxpars, &rxp)) == NULL)
   1648      1.1   agc 				return ISCSI_STATUS_NEGOTIATION_ERROR;
   1649      1.1   agc 
   1650      1.1   agc 			rc = eval_parameter(conn, state, &rxp);
   1651      1.1   agc 			if (rc)
   1652      1.1   agc 				return rc;
   1653      1.1   agc 		}
   1654      1.1   agc 	}
   1655      1.1   agc 
   1656      1.1   agc 	if (tx_pdu == NULL)
   1657      1.1   agc 		return 0;
   1658      1.1   agc 
   1659      1.1   agc 	complete_pars(state, tx_pdu);
   1660      1.1   agc 
   1661      1.1   agc 	return 0;
   1662      1.1   agc }
   1663      1.1   agc 
   1664      1.1   agc /*
   1665      1.1   agc  * init_text_parameters:
   1666      1.1   agc  *    Initialize text negotiation.
   1667      1.1   agc  *
   1668      1.1   agc  *    Parameter:
   1669      1.1   agc  *          conn     The connection
   1670      1.1   agc  *          tx_pdu   The transmit PDU
   1671      1.1   agc  *
   1672      1.1   agc  *    Returns:    0     On success
   1673      1.1   agc  *                > 0   (an ISCSI error code) if an error occurred.
   1674      1.1   agc  */
   1675      1.1   agc 
   1676      1.1   agc int
   1677      1.1   agc init_text_parameters(connection_t *conn, ccb_t *ccb)
   1678      1.1   agc {
   1679      1.1   agc 	negotiation_state_t *state;
   1680      1.1   agc 
   1681      1.1   agc 	state = malloc(sizeof(*state), M_TEMP, M_WAITOK | M_ZERO);
   1682      1.1   agc 	if (state == NULL) {
   1683      1.1   agc 		DEBOUT(("*** Out of memory in init_text_params\n"));
   1684      1.1   agc 		return ISCSI_STATUS_NO_RESOURCES;
   1685      1.1   agc 	}
   1686      1.1   agc 	ccb->temp_data = state;
   1687      1.1   agc 
   1688      1.1   agc 	state->HeaderDigest = conn->HeaderDigest;
   1689      1.1   agc 	state->DataDigest = conn->DataDigest;
   1690      1.1   agc 	state->MaxRecvDataSegmentLength = conn->MaxRecvDataSegmentLength;
   1691      1.1   agc 	init_session_parameters(conn->session, state);
   1692      1.1   agc 
   1693      1.1   agc 	return 0;
   1694      1.1   agc }
   1695      1.1   agc 
   1696      1.1   agc 
   1697      1.1   agc /*
   1698      1.1   agc  * assemble_send_targets:
   1699      1.1   agc  *    Assemble send targets request
   1700      1.1   agc  *
   1701      1.1   agc  *    Parameter:
   1702      1.1   agc  *          pdu      The transmit PDU
   1703      1.1   agc  *          val      The SendTargets key value
   1704      1.1   agc  *
   1705      1.1   agc  *    Returns:    0     On success
   1706      1.1   agc  *                > 0   (an ISCSI error code) if an error occurred.
   1707      1.1   agc  */
   1708      1.1   agc 
   1709      1.1   agc int
   1710      1.1   agc assemble_send_targets(pdu_t *pdu, uint8_t *val)
   1711      1.1   agc {
   1712      1.1   agc 	negotiation_parameter_t par;
   1713      1.1   agc 	uint8_t *buf;
   1714      1.1   agc 	int len;
   1715      1.1   agc 
   1716      1.1   agc 	par.key = K_SendTargets;
   1717      1.1   agc 	par.list_num = 1;
   1718      1.1   agc 	par.val.sval = val;
   1719      1.1   agc 
   1720      1.1   agc 	len = parameter_size(&par);
   1721      1.1   agc 
   1722      1.1   agc 	if ((buf = malloc(len, M_TEMP, M_WAITOK)) == NULL) {
   1723      1.1   agc 		DEBOUT(("*** Out of memory in assemble_send_targets\n"));
   1724      1.1   agc 		return ISCSI_STATUS_NO_RESOURCES;
   1725      1.1   agc 	}
   1726      1.1   agc 	pdu->temp_data = buf;
   1727      1.1   agc 	pdu->temp_data_len = len;
   1728      1.1   agc 
   1729      1.1   agc 	if (put_parameter(buf, len, &par) == 0)
   1730      1.1   agc 		return ISCSI_STATUS_PARAMETER_INVALID;
   1731      1.1   agc 
   1732      1.1   agc 	return 0;
   1733      1.1   agc }
   1734      1.1   agc 
   1735      1.1   agc 
   1736      1.1   agc /*
   1737      1.1   agc  * set_negotiated_parameters:
   1738      1.1   agc  *    Copy the negotiated parameters into the connection and session structure.
   1739      1.1   agc  *
   1740      1.1   agc  *    Parameter:
   1741      1.1   agc  *          ccb      The ccb containing the state information
   1742      1.1   agc  */
   1743      1.1   agc 
   1744      1.1   agc void
   1745      1.1   agc set_negotiated_parameters(ccb_t *ccb)
   1746      1.1   agc {
   1747      1.1   agc 	negotiation_state_t *state = (negotiation_state_t *) ccb->temp_data;
   1748      1.1   agc 	connection_t *conn = ccb->connection;
   1749      1.1   agc 	session_t *sess = ccb->session;
   1750      1.1   agc 
   1751      1.1   agc 	conn->HeaderDigest = state->HeaderDigest;
   1752      1.1   agc 	conn->DataDigest = state->DataDigest;
   1753      1.1   agc 	sess->ErrorRecoveryLevel = state->ErrorRecoveryLevel;
   1754      1.1   agc 	sess->InitialR2T = state->InitialR2T;
   1755      1.1   agc 	sess->ImmediateData = state->ImmediateData;
   1756      1.1   agc 	conn->MaxRecvDataSegmentLength = state->MaxRecvDataSegmentLength;
   1757      1.1   agc 	sess->MaxConnections = state->MaxConnections;
   1758      1.1   agc 	sess->DefaultTime2Wait = conn->Time2Wait = state->DefaultTime2Wait;
   1759      1.1   agc 	sess->DefaultTime2Retain = conn->Time2Retain =
   1760      1.1   agc 		state->DefaultTime2Retain;
   1761      1.1   agc 
   1762      1.1   agc 	/* set idle connection timeout to half the Time2Retain window so we */
   1763      1.1   agc 	/* don't miss it, unless Time2Retain is ridiculously small. */
   1764      1.1   agc 	conn->idle_timeout_val = (conn->Time2Retain >= 10) ?
   1765      1.1   agc 		(conn->Time2Retain / 2) * hz : CONNECTION_IDLE_TIMEOUT;
   1766      1.1   agc 
   1767      1.1   agc 	sess->MaxBurstLength = state->MaxBurstLength;
   1768      1.1   agc 	sess->FirstBurstLength = state->FirstBurstLength;
   1769      1.1   agc 	sess->MaxOutstandingR2T = state->MaxOutstandingR2T;
   1770      1.1   agc 
   1771      1.1   agc 	DEBC(conn, 10,("SetNegPar: MRDSL=%d, MBL=%d, FBL=%d, IR2T=%d, ImD=%d\n",
   1772      1.1   agc 		state->MaxRecvDataSegmentLength, state->MaxBurstLength,
   1773      1.1   agc 		state->FirstBurstLength, state->InitialR2T,
   1774      1.1   agc 		state->ImmediateData));
   1775      1.1   agc 
   1776      1.1   agc 	conn->max_transfer = min(sess->MaxBurstLength,
   1777      1.1   agc 					conn->MaxRecvDataSegmentLength);
   1778      1.1   agc 
   1779      1.1   agc 	conn->max_firstimmed = (!sess->ImmediateData) ? 0 :
   1780      1.1   agc 				min(sess->FirstBurstLength, conn->max_transfer);
   1781      1.1   agc 
   1782      1.1   agc 	conn->max_firstdata = (sess->InitialR2T) ? 0 : sess->FirstBurstLength;
   1783      1.1   agc }
   1784