1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114
|
/* IKE SPI generation routines, for libreswan
*
* Copyright (C) 1997 Angelos D. Keromytis.
* Copyright (C) 1998-2002 D. Hugh Redelmeier.
* Copyright (C) 2018-2019 Andrew Cagney <cagney@gnu.org>
*
* This program is free software; you can redistribute it and/or modify it
* under the terms of the GNU General Public License as published by the
* Free Software Foundation; either version 2 of the License, or (at your
* option) any later version. See <https://www.gnu.org/licenses/gpl2.txt>.
*
* This program is distributed in the hope that it will be useful, but
* WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY
* or FITNESS FOR A PARTICULAR PURPOSE. See the GNU General Public License
* for more details.
*/
#include "ike_alg_hash.h"
#include "defs.h" /* for all_zero */
#include "log.h"
#include "state.h" /* for ike_sa */
#include "ike_spi.h"
#include "rnd.h"
#include "crypt_hash.h"
const ike_spi_t zero_ike_spi; /* guaranteed 0 */
bool ike_spi_is_zero(const ike_spi_t *spi)
{
return ike_spi_eq(spi, &zero_ike_spi);
}
bool ike_spi_eq(const ike_spi_t *lhs, const ike_spi_t *rhs)
{
return memeq(lhs, rhs, sizeof(*lhs));
}
bool ike_spis_eq(const ike_spis_t *lhs, const ike_spis_t *rhs)
{
return (ike_spi_eq(&lhs->initiator, &rhs->initiator) &&
ike_spi_eq(&lhs->responder, &rhs->responder));
}
static struct {
uint8_t bytes[SHA2_256_DIGEST_SIZE];
} ike_spi_secret;
void refresh_ike_spi_secret(void)
{
get_rnd_bytes(&ike_spi_secret, sizeof(ike_spi_secret));
}
/*
* Generate the IKE Initiator's SPI.
*/
ike_spi_t ike_initiator_spi(void)
{
if (impair.ike_initiator_spi.enabled) {
uintmax_t v = impair.ike_initiator_spi.value;
dbg("forcing IKE initiator SPI to 0x%jx", v);
ike_spi_t spi;
hton_chunk(v, THING_AS_CHUNK(spi));
return spi;
}
ike_spi_t spi;
do {
get_rnd_bytes(spi.bytes, sizeof(spi));
} while (ike_spi_is_zero(&spi)); /* probably never loops */
return spi;
}
/*
* Generate the IKE Responder's SPI.
*
* As responder, we use a hashing method to get a pseudo random
* value instead of using our own random pool. It will prevent
* an attacker from gaining raw data from our random pool and
* it will prevent an attacker from depleting our random pool
* or entropy.
*/
ike_spi_t ike_responder_spi(const ip_endpoint *initiator_endpoint, struct logger *logger)
{
if (impair.ike_responder_spi.enabled) {
uintmax_t v = impair.ike_responder_spi.value;
dbg("forcing IKE responder SPI to 0x%jx", v);
ike_spi_t spi;
hton_chunk(v, THING_AS_CHUNK(spi));
return spi;
}
ike_spi_t spi;
do {
static uint32_t counter = 0; /* STATIC */
struct crypt_hash *ctx = crypt_hash_init("IKE SPIr",
&ike_alg_hash_sha2_256,
logger);
crypt_hash_digest_thing(ctx, "addr", *initiator_endpoint);
crypt_hash_digest_thing(ctx, "sod", ike_spi_secret);
counter++;
crypt_hash_digest_thing(ctx, "counter", counter);
uint8_t buffer[SHA2_256_DIGEST_SIZE];
crypt_hash_final_bytes(&ctx, buffer, SHA2_256_DIGEST_SIZE);
/* cookie size is smaller than hash output size */
passert(IKE_SA_SPI_SIZE <= SHA2_256_DIGEST_SIZE);
passert(IKE_SA_SPI_SIZE == sizeof(spi));
memcpy(&spi, buffer, sizeof(spi));
} while (ike_spi_is_zero(&spi)); /* probably never loops */
return spi;
}
|