Home | History | Annotate | Line # | Download | only in netinet
      1  1.1  rjs /*	$KAME: sctp_hashdriver.c,v 1.6 2004/02/24 21:52:26 itojun Exp $	*/
      2  1.1  rjs /*	$NetBSD: sctp_hashdriver.c,v 1.1 2015/10/13 21:28:35 rjs Exp $	*/
      3  1.1  rjs 
      4  1.1  rjs /*
      5  1.1  rjs  * Copyright (c) 2001, 2002, 2003, 2004 Cisco Systems, Inc.
      6  1.1  rjs  * All rights reserved.
      7  1.1  rjs  *
      8  1.1  rjs  * Redistribution and use in source and binary forms, with or without
      9  1.1  rjs  * modification, are permitted provided that the following conditions
     10  1.1  rjs  * are met:
     11  1.1  rjs  * 1. Redistributions of source code must retain the above copyright
     12  1.1  rjs  *    notice, this list of conditions and the following disclaimer.
     13  1.1  rjs  * 2. Redistributions in binary form must reproduce the above copyright
     14  1.1  rjs  *    notice, this list of conditions and the following disclaimer in the
     15  1.1  rjs  *    documentation and/or other materials provided with the distribution.
     16  1.1  rjs  * 3. All advertising materials mentioning features or use of this software
     17  1.1  rjs  *    must display the following acknowledgement:
     18  1.1  rjs  *      This product includes software developed by Cisco Systems, Inc.
     19  1.1  rjs  * 4. Neither the name of the project nor the names of its contributors
     20  1.1  rjs  *    may be used to endorse or promote products derived from this software
     21  1.1  rjs  *    without specific prior written permission.
     22  1.1  rjs  *
     23  1.1  rjs  * THIS SOFTWARE IS PROVIDED BY CISCO SYSTEMS AND CONTRIBUTORS ``AS IS'' AND
     24  1.1  rjs  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     25  1.1  rjs  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     26  1.1  rjs  * ARE DISCLAIMED.  IN NO EVENT SHALL CISCO SYSTEMS OR CONTRIBUTORS BE LIABLE
     27  1.1  rjs  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     28  1.1  rjs  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     29  1.1  rjs  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     30  1.1  rjs  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     31  1.1  rjs  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     32  1.1  rjs  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     33  1.1  rjs  * SUCH DAMAGE.
     34  1.1  rjs  */
     35  1.1  rjs #include <sys/cdefs.h>
     36  1.1  rjs __KERNEL_RCSID(0, "$NetBSD: sctp_hashdriver.c,v 1.1 2015/10/13 21:28:35 rjs Exp $");
     37  1.1  rjs 
     38  1.1  rjs #include <sys/param.h>
     39  1.1  rjs #include <sys/systm.h>
     40  1.1  rjs #include <sys/malloc.h>
     41  1.1  rjs #include <sys/mbuf.h>
     42  1.1  rjs #include <sys/domain.h>
     43  1.1  rjs #include <sys/protosw.h>
     44  1.1  rjs #include <sys/socket.h>
     45  1.1  rjs #include <sys/socketvar.h>
     46  1.1  rjs #include <sys/proc.h>
     47  1.1  rjs #include <sys/kernel.h>
     48  1.1  rjs #include <sys/sysctl.h>
     49  1.1  rjs #include <sys/types.h>
     50  1.1  rjs #include <netinet/sctp_constants.h>
     51  1.1  rjs #ifdef USE_MD5
     52  1.1  rjs #include <sys/md5.h>
     53  1.1  rjs #else
     54  1.1  rjs #include <sys/sha1.h>
     55  1.1  rjs #endif
     56  1.1  rjs #include <netinet/sctp_hashdriver.h>
     57  1.1  rjs 
     58  1.1  rjs /*
     59  1.1  rjs  * Main driver for SCTP's hashing.
     60  1.1  rjs  * passing a two pointers and two lengths, returning a digest pointer
     61  1.1  rjs  * filled. The md5 code was taken directly from the RFC (2104) so to
     62  1.1  rjs  * understand it you may want to go look at the RFC referenced in the
     63  1.1  rjs  * SCTP spec. We did modify this code to either user OURs implementation
     64  1.1  rjs  * of SLA1 or the MD5 that comes from its RFC. SLA1 may have IPR issues
     65  1.1  rjs  * so you need to check in to this if you wish to use it... Or at least
     66  1.1  rjs  * that is what the FIP-180.1 web page says.
     67  1.1  rjs  */
     68  1.1  rjs 
     69  1.1  rjs void sctp_hash_digest(char *key, int key_len, char *text, int text_len,
     70  1.1  rjs     unsigned char *digest)
     71  1.1  rjs {
     72  1.1  rjs #ifdef USE_MD5
     73  1.1  rjs 	MD5Context context;
     74  1.1  rjs #else
     75  1.1  rjs 	SHA1_CTX context;
     76  1.1  rjs #endif /* USE_MD5 */
     77  1.1  rjs 	/* inner padding - key XORd with ipad */
     78  1.1  rjs 	unsigned char k_ipad[65];
     79  1.1  rjs 	/* outer padding - key XORd with opad */
     80  1.1  rjs 	unsigned char k_opad[65];
     81  1.1  rjs 	unsigned char tk[20];
     82  1.1  rjs 	int i;
     83  1.1  rjs 
     84  1.1  rjs 	if (key_len > 64) {
     85  1.1  rjs #ifdef USE_MD5
     86  1.1  rjs 		md5_ctxt tctx;
     87  1.1  rjs 		MD5Init(&tctx);
     88  1.1  rjs 		MD5Update(&tctx, key, key_len);
     89  1.1  rjs 		MD5Final(tk, &tctx);
     90  1.1  rjs 		key = tk;
     91  1.1  rjs 		key_len = 16;
     92  1.1  rjs #else
     93  1.1  rjs 		SHA1_CTX tctx;
     94  1.1  rjs 		SHA1Init(&tctx);
     95  1.1  rjs 		SHA1Update(&tctx, key, key_len);
     96  1.1  rjs 		SHA1Final(tk, &tctx);
     97  1.1  rjs 		key = tk;
     98  1.1  rjs 		key_len = 20;
     99  1.1  rjs #endif /* USE_MD5 */
    100  1.1  rjs 	}
    101  1.1  rjs 
    102  1.1  rjs 	/*
    103  1.1  rjs 	 * the HMAC_MD5 transform looks like:
    104  1.1  rjs 	 *
    105  1.1  rjs 	 * MD5(K XOR opad, MD5(K XOR ipad, text))
    106  1.1  rjs 	 *
    107  1.1  rjs 	 * where K is an n byte key
    108  1.1  rjs 	 * ipad is the byte 0x36 repeated 64 times
    109  1.1  rjs 	 * opad is the byte 0x5c repeated 64 times
    110  1.1  rjs 	 * and text is the data being protected
    111  1.1  rjs 	 */
    112  1.1  rjs 
    113  1.1  rjs 	/* start out by storing key in pads */
    114  1.1  rjs 	memset(k_ipad, 0, sizeof k_ipad);
    115  1.1  rjs 	memset(k_opad, 0, sizeof k_opad);
    116  1.1  rjs 	bcopy(key, k_ipad, key_len);
    117  1.1  rjs 	bcopy(key, k_opad, key_len);
    118  1.1  rjs 
    119  1.1  rjs 	/* XOR key with ipad and opad values */
    120  1.1  rjs 	for (i = 0; i < 64; i++) {
    121  1.1  rjs 		k_ipad[i] ^= 0x36;
    122  1.1  rjs 		k_opad[i] ^= 0x5c;
    123  1.1  rjs 	}
    124  1.1  rjs 	/*
    125  1.1  rjs 	 * perform inner MD5
    126  1.1  rjs 	 */
    127  1.1  rjs #ifdef USE_MD5
    128  1.1  rjs 	MD5Init(&context);			/* init context for 1st pass */
    129  1.1  rjs 	MD5Update(&context, k_ipad, 64);	/* start with inner pad */
    130  1.1  rjs 	MD5Update(&context, text, text_len);	/* then text of datagram */
    131  1.1  rjs 	MD5Final(digest, &context);		/* finish up 1st pass */
    132  1.1  rjs #else
    133  1.1  rjs 	SHA1Init(&context);			/* init context for 1st pass */
    134  1.1  rjs 	SHA1Update(&context, k_ipad, 64);	/* start with inner pad */
    135  1.1  rjs 	SHA1Update(&context, text, text_len);	/* then text of datagram */
    136  1.1  rjs 	SHA1Final(digest, &context);		/* finish up 1st pass */
    137  1.1  rjs #endif /* USE_MD5 */
    138  1.1  rjs 
    139  1.1  rjs 	/*
    140  1.1  rjs 	 * perform outer MD5
    141  1.1  rjs 	 */
    142  1.1  rjs #ifdef USE_MD5
    143  1.1  rjs 	MD5Init(&context);			/* init context for 2nd pass */
    144  1.1  rjs 	MD5Update(&context, k_opad, 64);	/* start with outer pad */
    145  1.1  rjs 	MD5Update(&context, digest, 16);	/* then results of 1st hash */
    146  1.1  rjs 	MD5Final(digest, &context);		/* finish up 2nd pass */
    147  1.1  rjs #else
    148  1.1  rjs 	SHA1Init(&context);			/* init context for 2nd pass */
    149  1.1  rjs 	SHA1Update(&context, k_opad, 64);	/* start with outer pad */
    150  1.1  rjs 	SHA1Update(&context, digest, 20);	/* then results of 1st hash */
    151  1.1  rjs 	SHA1Final(digest, &context);		/* finish up 2nd pass */
    152  1.1  rjs #endif /* USE_MD5 */
    153  1.1  rjs }
    154  1.1  rjs 
    155  1.1  rjs void sctp_hash_digest_m(char *key, int key_len, struct mbuf *m, int offset,
    156  1.1  rjs     unsigned char *digest)
    157  1.1  rjs {
    158  1.1  rjs 	struct mbuf *m_at;
    159  1.1  rjs #ifdef USE_MD5
    160  1.1  rjs 	MD5Context context;
    161  1.1  rjs #else
    162  1.1  rjs 	SHA1_CTX context;
    163  1.1  rjs #endif /* USE_MD5 */
    164  1.1  rjs 	/* inner padding - key XORd with ipad */
    165  1.1  rjs 	unsigned char k_ipad[65];
    166  1.1  rjs 	/* outer padding - key XORd with opad */
    167  1.1  rjs 	unsigned char k_opad[65];
    168  1.1  rjs 	unsigned char tk[20];
    169  1.1  rjs 	int i;
    170  1.1  rjs 
    171  1.1  rjs 	if (key_len > 64) {
    172  1.1  rjs #ifdef USE_MD5
    173  1.1  rjs 		MD5Context tctx;
    174  1.1  rjs 		MD5Init(&tctx);
    175  1.1  rjs 		MD5Update(&tctx, key, key_len);
    176  1.1  rjs 		MD5Final(tk, &tctx);
    177  1.1  rjs 		key = tk;
    178  1.1  rjs 		key_len = 16;
    179  1.1  rjs #else
    180  1.1  rjs 		SHA1_CTX tctx;
    181  1.1  rjs 		SHA1Init(&tctx);
    182  1.1  rjs 		SHA1Update(&tctx, key, key_len);
    183  1.1  rjs 		SHA1Final(tk, &tctx);
    184  1.1  rjs 		key = tk;
    185  1.1  rjs 		key_len = 20;
    186  1.1  rjs #endif /* USE_MD5 */
    187  1.1  rjs 	}
    188  1.1  rjs 
    189  1.1  rjs 	/*
    190  1.1  rjs 	 * the HMAC_MD5 transform looks like:
    191  1.1  rjs 	 *
    192  1.1  rjs 	 * MD5(K XOR opad, MD5(K XOR ipad, text))
    193  1.1  rjs 	 *
    194  1.1  rjs 	 * where K is an n byte key
    195  1.1  rjs 	 * ipad is the byte 0x36 repeated 64 times
    196  1.1  rjs 	 * opad is the byte 0x5c repeated 64 times
    197  1.1  rjs 	 * and text is the data being protected
    198  1.1  rjs 	 */
    199  1.1  rjs 
    200  1.1  rjs 	/* start out by storing key in pads */
    201  1.1  rjs 	memset(k_ipad, 0, sizeof k_ipad);
    202  1.1  rjs 	memset(k_opad, 0, sizeof k_opad);
    203  1.1  rjs 	bcopy(key, k_ipad, key_len);
    204  1.1  rjs 	bcopy(key, k_opad, key_len);
    205  1.1  rjs 
    206  1.1  rjs 	/* XOR key with ipad and opad values */
    207  1.1  rjs 	for (i = 0; i < 64; i++) {
    208  1.1  rjs 		k_ipad[i] ^= 0x36;
    209  1.1  rjs 		k_opad[i] ^= 0x5c;
    210  1.1  rjs 	}
    211  1.1  rjs 
    212  1.1  rjs 	/* find the correct mbuf and offset into mbuf */
    213  1.1  rjs 	m_at = m;
    214  1.1  rjs 	while ((m_at != NULL) && (offset > m_at->m_len)) {
    215  1.1  rjs 		offset -= m_at->m_len;	/* update remaining offset left */
    216  1.1  rjs 		m_at = m_at->m_next;
    217  1.1  rjs 	}
    218  1.1  rjs 	/*
    219  1.1  rjs 	 * perform inner MD5
    220  1.1  rjs 	 */
    221  1.1  rjs #ifdef USE_MD5
    222  1.1  rjs 	MD5Init(&context);			/* init context for 1st pass */
    223  1.1  rjs 	MD5Update(&context, k_ipad, 64);	/* start with inner pad */
    224  1.1  rjs 	/******/
    225  1.1  rjs 	while (m_at != NULL) {
    226  1.1  rjs 		/* then text of datagram... */
    227  1.1  rjs 		MD5Update(&context, mtod(m_at, char *)+offset,
    228  1.1  rjs 			  m_at->m_len-offset);
    229  1.1  rjs 		/* only offset on the first mbuf */
    230  1.1  rjs 		offset = 0;
    231  1.1  rjs 		m_at = m_at->m_next;
    232  1.1  rjs 	}
    233  1.1  rjs 	/******/
    234  1.1  rjs 	MD5Final(digest, &context);		/* finish up 1st pass */
    235  1.1  rjs #else
    236  1.1  rjs 	SHA1Init(&context);			/* init context for 1st pass */
    237  1.1  rjs 	SHA1Update(&context, k_ipad, 64);	/* start with inner pad */
    238  1.1  rjs 	/******/
    239  1.1  rjs 	while (m_at != NULL) {
    240  1.1  rjs 		/* then text of datagram */
    241  1.1  rjs 		SHA1Update(&context, mtod(m_at, char *)+offset,
    242  1.1  rjs 			     m_at->m_len-offset);
    243  1.1  rjs 		/* only offset on the first mbuf */
    244  1.1  rjs 		offset = 0;
    245  1.1  rjs 		m_at = m_at->m_next;
    246  1.1  rjs 	}
    247  1.1  rjs 	/******/
    248  1.1  rjs 	SHA1Final(digest, &context);             /* finish up 1st pass */
    249  1.1  rjs #endif /* USE_MD5 */
    250  1.1  rjs 
    251  1.1  rjs 	/*
    252  1.1  rjs 	 * perform outer MD5
    253  1.1  rjs 	 */
    254  1.1  rjs #ifdef USE_MD5
    255  1.1  rjs 	MD5Init(&context);			/* init context for 2nd pass */
    256  1.1  rjs 	MD5Update(&context, k_opad, 64);	/* start with outer pad */
    257  1.1  rjs 	MD5Update(&context, digest, 16);	/* then results of 1st hash */
    258  1.1  rjs 	MD5Final(digest, &context);		/* finish up 2nd pass */
    259  1.1  rjs #else
    260  1.1  rjs 	SHA1Init(&context);			/* init context for 2nd pass */
    261  1.1  rjs 	SHA1Update(&context, k_opad, 64);	/* start with outer pad */
    262  1.1  rjs 	SHA1Update(&context, digest, 20);	/* then results of 1st hash */
    263  1.1  rjs 	SHA1Final(digest, &context);		/* finish up 2nd pass */
    264  1.1  rjs #endif /* USE_MD5 */
    265  1.1  rjs }
    266