ikev2_common.c 17 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725
  1. /*
  2. * IKEv2 common routines for initiator and responder
  3. * Copyright (c) 2007, Jouni Malinen <j@w1.fi>
  4. *
  5. * This software may be distributed under the terms of the BSD license.
  6. * See README for more details.
  7. */
  8. #include "includes.h"
  9. #include "common.h"
  10. #include "crypto/crypto.h"
  11. #include "crypto/md5.h"
  12. #include "crypto/sha1.h"
  13. #include "crypto/random.h"
  14. #include "ikev2_common.h"
  15. static const struct ikev2_integ_alg ikev2_integ_algs[] = {
  16. { AUTH_HMAC_SHA1_96, 20, 12 },
  17. { AUTH_HMAC_MD5_96, 16, 12 }
  18. };
  19. #define NUM_INTEG_ALGS ARRAY_SIZE(ikev2_integ_algs)
  20. static const struct ikev2_prf_alg ikev2_prf_algs[] = {
  21. { PRF_HMAC_SHA1, 20, 20 },
  22. { PRF_HMAC_MD5, 16, 16 }
  23. };
  24. #define NUM_PRF_ALGS ARRAY_SIZE(ikev2_prf_algs)
  25. static const struct ikev2_encr_alg ikev2_encr_algs[] = {
  26. { ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */
  27. { ENCR_3DES, 24, 8 }
  28. };
  29. #define NUM_ENCR_ALGS ARRAY_SIZE(ikev2_encr_algs)
  30. const struct ikev2_integ_alg * ikev2_get_integ(int id)
  31. {
  32. size_t i;
  33. for (i = 0; i < NUM_INTEG_ALGS; i++) {
  34. if (ikev2_integ_algs[i].id == id)
  35. return &ikev2_integ_algs[i];
  36. }
  37. return NULL;
  38. }
  39. int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data,
  40. size_t data_len, u8 *hash)
  41. {
  42. u8 tmphash[IKEV2_MAX_HASH_LEN];
  43. switch (alg) {
  44. case AUTH_HMAC_SHA1_96:
  45. if (key_len != 20)
  46. return -1;
  47. if (hmac_sha1(key, key_len, data, data_len, tmphash) < 0)
  48. return -1;
  49. os_memcpy(hash, tmphash, 12);
  50. break;
  51. case AUTH_HMAC_MD5_96:
  52. if (key_len != 16)
  53. return -1;
  54. if (hmac_md5(key, key_len, data, data_len, tmphash) < 0)
  55. return -1;
  56. os_memcpy(hash, tmphash, 12);
  57. break;
  58. default:
  59. return -1;
  60. }
  61. return 0;
  62. }
  63. const struct ikev2_prf_alg * ikev2_get_prf(int id)
  64. {
  65. size_t i;
  66. for (i = 0; i < NUM_PRF_ALGS; i++) {
  67. if (ikev2_prf_algs[i].id == id)
  68. return &ikev2_prf_algs[i];
  69. }
  70. return NULL;
  71. }
  72. int ikev2_prf_hash(int alg, const u8 *key, size_t key_len,
  73. size_t num_elem, const u8 *addr[], const size_t *len,
  74. u8 *hash)
  75. {
  76. switch (alg) {
  77. case PRF_HMAC_SHA1:
  78. return hmac_sha1_vector(key, key_len, num_elem, addr, len,
  79. hash);
  80. case PRF_HMAC_MD5:
  81. return hmac_md5_vector(key, key_len, num_elem, addr, len, hash);
  82. default:
  83. return -1;
  84. }
  85. }
  86. int ikev2_prf_plus(int alg, const u8 *key, size_t key_len,
  87. const u8 *data, size_t data_len,
  88. u8 *out, size_t out_len)
  89. {
  90. u8 hash[IKEV2_MAX_HASH_LEN];
  91. size_t hash_len;
  92. u8 iter, *pos, *end;
  93. const u8 *addr[3];
  94. size_t len[3];
  95. const struct ikev2_prf_alg *prf;
  96. int res;
  97. prf = ikev2_get_prf(alg);
  98. if (prf == NULL)
  99. return -1;
  100. hash_len = prf->hash_len;
  101. addr[0] = hash;
  102. len[0] = hash_len;
  103. addr[1] = data;
  104. len[1] = data_len;
  105. addr[2] = &iter;
  106. len[2] = 1;
  107. pos = out;
  108. end = out + out_len;
  109. iter = 1;
  110. while (pos < end) {
  111. size_t clen;
  112. if (iter == 1)
  113. res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1],
  114. &len[1], hash);
  115. else
  116. res = ikev2_prf_hash(alg, key, key_len, 3, addr, len,
  117. hash);
  118. if (res < 0)
  119. return -1;
  120. clen = hash_len;
  121. if ((int) clen > end - pos)
  122. clen = end - pos;
  123. os_memcpy(pos, hash, clen);
  124. pos += clen;
  125. iter++;
  126. }
  127. return 0;
  128. }
  129. const struct ikev2_encr_alg * ikev2_get_encr(int id)
  130. {
  131. size_t i;
  132. for (i = 0; i < NUM_ENCR_ALGS; i++) {
  133. if (ikev2_encr_algs[i].id == id)
  134. return &ikev2_encr_algs[i];
  135. }
  136. return NULL;
  137. }
  138. int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
  139. const u8 *plain, u8 *crypt, size_t len)
  140. {
  141. struct crypto_cipher *cipher;
  142. int encr_alg;
  143. switch (alg) {
  144. case ENCR_3DES:
  145. encr_alg = CRYPTO_CIPHER_ALG_3DES;
  146. break;
  147. case ENCR_AES_CBC:
  148. encr_alg = CRYPTO_CIPHER_ALG_AES;
  149. break;
  150. default:
  151. wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
  152. return -1;
  153. }
  154. cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
  155. if (cipher == NULL) {
  156. wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
  157. return -1;
  158. }
  159. if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
  160. wpa_printf(MSG_INFO, "IKEV2: Encryption failed");
  161. crypto_cipher_deinit(cipher);
  162. return -1;
  163. }
  164. crypto_cipher_deinit(cipher);
  165. return 0;
  166. }
  167. int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
  168. const u8 *crypt, u8 *plain, size_t len)
  169. {
  170. struct crypto_cipher *cipher;
  171. int encr_alg;
  172. switch (alg) {
  173. case ENCR_3DES:
  174. encr_alg = CRYPTO_CIPHER_ALG_3DES;
  175. break;
  176. case ENCR_AES_CBC:
  177. encr_alg = CRYPTO_CIPHER_ALG_AES;
  178. break;
  179. default:
  180. wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
  181. return -1;
  182. }
  183. cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
  184. if (cipher == NULL) {
  185. wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
  186. return -1;
  187. }
  188. if (crypto_cipher_decrypt(cipher, crypt, plain, len) < 0) {
  189. wpa_printf(MSG_INFO, "IKEV2: Decryption failed");
  190. crypto_cipher_deinit(cipher);
  191. return -1;
  192. }
  193. crypto_cipher_deinit(cipher);
  194. return 0;
  195. }
  196. int ikev2_parse_payloads(struct ikev2_payloads *payloads,
  197. u8 next_payload, const u8 *pos, const u8 *end)
  198. {
  199. const struct ikev2_payload_hdr *phdr;
  200. os_memset(payloads, 0, sizeof(*payloads));
  201. while (next_payload != IKEV2_PAYLOAD_NO_NEXT_PAYLOAD) {
  202. unsigned int plen, pdatalen, left;
  203. const u8 *pdata;
  204. wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u",
  205. next_payload);
  206. if (end < pos)
  207. return -1;
  208. left = end - pos;
  209. if (left < sizeof(*phdr)) {
  210. wpa_printf(MSG_INFO, "IKEV2: Too short message for "
  211. "payload header (left=%ld)",
  212. (long) (end - pos));
  213. return -1;
  214. }
  215. phdr = (const struct ikev2_payload_hdr *) pos;
  216. plen = WPA_GET_BE16(phdr->payload_length);
  217. if (plen < sizeof(*phdr) || plen > left) {
  218. wpa_printf(MSG_INFO, "IKEV2: Invalid payload header "
  219. "length %d", plen);
  220. return -1;
  221. }
  222. wpa_printf(MSG_DEBUG, "IKEV2: Next Payload: %u Flags: 0x%x"
  223. " Payload Length: %u",
  224. phdr->next_payload, phdr->flags, plen);
  225. pdata = (const u8 *) (phdr + 1);
  226. pdatalen = plen - sizeof(*phdr);
  227. switch (next_payload) {
  228. case IKEV2_PAYLOAD_SA:
  229. wpa_printf(MSG_DEBUG, "IKEV2: Payload: Security "
  230. "Association");
  231. payloads->sa = pdata;
  232. payloads->sa_len = pdatalen;
  233. break;
  234. case IKEV2_PAYLOAD_KEY_EXCHANGE:
  235. wpa_printf(MSG_DEBUG, "IKEV2: Payload: Key "
  236. "Exchange");
  237. payloads->ke = pdata;
  238. payloads->ke_len = pdatalen;
  239. break;
  240. case IKEV2_PAYLOAD_IDi:
  241. wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDi");
  242. payloads->idi = pdata;
  243. payloads->idi_len = pdatalen;
  244. break;
  245. case IKEV2_PAYLOAD_IDr:
  246. wpa_printf(MSG_DEBUG, "IKEV2: Payload: IDr");
  247. payloads->idr = pdata;
  248. payloads->idr_len = pdatalen;
  249. break;
  250. case IKEV2_PAYLOAD_CERTIFICATE:
  251. wpa_printf(MSG_DEBUG, "IKEV2: Payload: Certificate");
  252. payloads->cert = pdata;
  253. payloads->cert_len = pdatalen;
  254. break;
  255. case IKEV2_PAYLOAD_AUTHENTICATION:
  256. wpa_printf(MSG_DEBUG, "IKEV2: Payload: "
  257. "Authentication");
  258. payloads->auth = pdata;
  259. payloads->auth_len = pdatalen;
  260. break;
  261. case IKEV2_PAYLOAD_NONCE:
  262. wpa_printf(MSG_DEBUG, "IKEV2: Payload: Nonce");
  263. payloads->nonce = pdata;
  264. payloads->nonce_len = pdatalen;
  265. break;
  266. case IKEV2_PAYLOAD_ENCRYPTED:
  267. wpa_printf(MSG_DEBUG, "IKEV2: Payload: Encrypted");
  268. payloads->encrypted = pdata;
  269. payloads->encrypted_len = pdatalen;
  270. break;
  271. case IKEV2_PAYLOAD_NOTIFICATION:
  272. wpa_printf(MSG_DEBUG, "IKEV2: Payload: "
  273. "Notification");
  274. payloads->notification = pdata;
  275. payloads->notification_len = pdatalen;
  276. break;
  277. default:
  278. if (phdr->flags & IKEV2_PAYLOAD_FLAGS_CRITICAL) {
  279. wpa_printf(MSG_INFO, "IKEV2: Unsupported "
  280. "critical payload %u - reject the "
  281. "entire message", next_payload);
  282. return -1;
  283. } else {
  284. wpa_printf(MSG_DEBUG, "IKEV2: Skipped "
  285. "unsupported payload %u",
  286. next_payload);
  287. }
  288. }
  289. if (next_payload == IKEV2_PAYLOAD_ENCRYPTED &&
  290. pos + plen == end) {
  291. /*
  292. * Next Payload in the case of Encrypted Payload is
  293. * actually the payload type for the first embedded
  294. * payload.
  295. */
  296. payloads->encr_next_payload = phdr->next_payload;
  297. next_payload = IKEV2_PAYLOAD_NO_NEXT_PAYLOAD;
  298. } else
  299. next_payload = phdr->next_payload;
  300. pos += plen;
  301. }
  302. if (pos != end) {
  303. wpa_printf(MSG_INFO, "IKEV2: Unexpected extra data after "
  304. "payloads");
  305. return -1;
  306. }
  307. return 0;
  308. }
  309. int ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg,
  310. const u8 *ID, size_t ID_len, u8 ID_type,
  311. struct ikev2_keys *keys, int initiator,
  312. const u8 *shared_secret, size_t shared_secret_len,
  313. const u8 *nonce, size_t nonce_len,
  314. const u8 *key_pad, size_t key_pad_len,
  315. u8 *auth_data)
  316. {
  317. size_t sign_len, buf_len;
  318. u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN];
  319. const struct ikev2_prf_alg *prf;
  320. const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr;
  321. prf = ikev2_get_prf(prf_alg);
  322. if (sign_msg == NULL || ID == NULL || SK_p == NULL ||
  323. shared_secret == NULL || nonce == NULL || prf == NULL)
  324. return -1;
  325. /* prf(SK_pi/r,IDi/r') */
  326. buf_len = 4 + ID_len;
  327. buf = os_zalloc(buf_len);
  328. if (buf == NULL)
  329. return -1;
  330. buf[0] = ID_type;
  331. os_memcpy(buf + 4, ID, ID_len);
  332. if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len,
  333. 1, (const u8 **) &buf, &buf_len, hash) < 0) {
  334. os_free(buf);
  335. return -1;
  336. }
  337. os_free(buf);
  338. /* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') */
  339. sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len;
  340. sign_data = os_malloc(sign_len);
  341. if (sign_data == NULL)
  342. return -1;
  343. pos = sign_data;
  344. os_memcpy(pos, wpabuf_head(sign_msg), wpabuf_len(sign_msg));
  345. pos += wpabuf_len(sign_msg);
  346. os_memcpy(pos, nonce, nonce_len);
  347. pos += nonce_len;
  348. os_memcpy(pos, hash, prf->hash_len);
  349. /* AUTH = prf(prf(Shared Secret, key pad, sign_data) */
  350. if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1,
  351. &key_pad, &key_pad_len, hash) < 0 ||
  352. ikev2_prf_hash(prf->id, hash, prf->hash_len, 1,
  353. (const u8 **) &sign_data, &sign_len, auth_data) < 0)
  354. {
  355. os_free(sign_data);
  356. return -1;
  357. }
  358. os_free(sign_data);
  359. return 0;
  360. }
  361. u8 * ikev2_decrypt_payload(int encr_id, int integ_id,
  362. struct ikev2_keys *keys, int initiator,
  363. const struct ikev2_hdr *hdr,
  364. const u8 *encrypted, size_t encrypted_len,
  365. size_t *res_len)
  366. {
  367. size_t iv_len;
  368. const u8 *pos, *end, *iv, *integ;
  369. u8 hash[IKEV2_MAX_HASH_LEN], *decrypted;
  370. size_t decrypted_len, pad_len;
  371. const struct ikev2_integ_alg *integ_alg;
  372. const struct ikev2_encr_alg *encr_alg;
  373. const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
  374. const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
  375. if (encrypted == NULL) {
  376. wpa_printf(MSG_INFO, "IKEV2: No Encrypted payload in SA_AUTH");
  377. return NULL;
  378. }
  379. encr_alg = ikev2_get_encr(encr_id);
  380. if (encr_alg == NULL) {
  381. wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type");
  382. return NULL;
  383. }
  384. iv_len = encr_alg->block_size;
  385. integ_alg = ikev2_get_integ(integ_id);
  386. if (integ_alg == NULL) {
  387. wpa_printf(MSG_INFO, "IKEV2: Unsupported intergrity type");
  388. return NULL;
  389. }
  390. if (encrypted_len < iv_len + 1 + integ_alg->hash_len) {
  391. wpa_printf(MSG_INFO, "IKEV2: No room for IV or Integrity "
  392. "Checksum");
  393. return NULL;
  394. }
  395. iv = encrypted;
  396. pos = iv + iv_len;
  397. end = encrypted + encrypted_len;
  398. integ = end - integ_alg->hash_len;
  399. if (SK_a == NULL) {
  400. wpa_printf(MSG_INFO, "IKEV2: No SK_a available");
  401. return NULL;
  402. }
  403. if (ikev2_integ_hash(integ_id, SK_a, keys->SK_integ_len,
  404. (const u8 *) hdr,
  405. integ - (const u8 *) hdr, hash) < 0) {
  406. wpa_printf(MSG_INFO, "IKEV2: Failed to calculate integrity "
  407. "hash");
  408. return NULL;
  409. }
  410. if (os_memcmp_const(integ, hash, integ_alg->hash_len) != 0) {
  411. wpa_printf(MSG_INFO, "IKEV2: Incorrect Integrity Checksum "
  412. "Data");
  413. return NULL;
  414. }
  415. if (SK_e == NULL) {
  416. wpa_printf(MSG_INFO, "IKEV2: No SK_e available");
  417. return NULL;
  418. }
  419. decrypted_len = integ - pos;
  420. decrypted = os_malloc(decrypted_len);
  421. if (decrypted == NULL)
  422. return NULL;
  423. if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos,
  424. decrypted, decrypted_len) < 0) {
  425. os_free(decrypted);
  426. return NULL;
  427. }
  428. pad_len = decrypted[decrypted_len - 1];
  429. if (decrypted_len < pad_len + 1) {
  430. wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted "
  431. "payload");
  432. os_free(decrypted);
  433. return NULL;
  434. }
  435. decrypted_len -= pad_len + 1;
  436. *res_len = decrypted_len;
  437. return decrypted;
  438. }
  439. void ikev2_update_hdr(struct wpabuf *msg)
  440. {
  441. struct ikev2_hdr *hdr;
  442. /* Update lenth field in HDR */
  443. hdr = wpabuf_mhead(msg);
  444. WPA_PUT_BE32(hdr->length, wpabuf_len(msg));
  445. }
  446. int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys,
  447. int initiator, struct wpabuf *msg,
  448. struct wpabuf *plain, u8 next_payload)
  449. {
  450. struct ikev2_payload_hdr *phdr;
  451. size_t plen;
  452. size_t iv_len, pad_len;
  453. u8 *icv, *iv;
  454. const struct ikev2_integ_alg *integ_alg;
  455. const struct ikev2_encr_alg *encr_alg;
  456. const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
  457. const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
  458. wpa_printf(MSG_DEBUG, "IKEV2: Adding Encrypted payload");
  459. /* Encr - RFC 4306, Sect. 3.14 */
  460. encr_alg = ikev2_get_encr(encr_id);
  461. if (encr_alg == NULL) {
  462. wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type");
  463. return -1;
  464. }
  465. iv_len = encr_alg->block_size;
  466. integ_alg = ikev2_get_integ(integ_id);
  467. if (integ_alg == NULL) {
  468. wpa_printf(MSG_INFO, "IKEV2: Unsupported intergrity type");
  469. return -1;
  470. }
  471. if (SK_e == NULL) {
  472. wpa_printf(MSG_INFO, "IKEV2: No SK_e available");
  473. return -1;
  474. }
  475. if (SK_a == NULL) {
  476. wpa_printf(MSG_INFO, "IKEV2: No SK_a available");
  477. return -1;
  478. }
  479. phdr = wpabuf_put(msg, sizeof(*phdr));
  480. phdr->next_payload = next_payload;
  481. phdr->flags = 0;
  482. iv = wpabuf_put(msg, iv_len);
  483. if (random_get_bytes(iv, iv_len)) {
  484. wpa_printf(MSG_INFO, "IKEV2: Could not generate IV");
  485. return -1;
  486. }
  487. pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len;
  488. if (pad_len == iv_len)
  489. pad_len = 0;
  490. wpabuf_put(plain, pad_len);
  491. wpabuf_put_u8(plain, pad_len);
  492. if (ikev2_encr_encrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv,
  493. wpabuf_head(plain), wpabuf_mhead(plain),
  494. wpabuf_len(plain)) < 0)
  495. return -1;
  496. wpabuf_put_buf(msg, plain);
  497. /* Need to update all headers (Length fields) prior to hash func */
  498. icv = wpabuf_put(msg, integ_alg->hash_len);
  499. plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
  500. WPA_PUT_BE16(phdr->payload_length, plen);
  501. ikev2_update_hdr(msg);
  502. return ikev2_integ_hash(integ_id, SK_a, keys->SK_integ_len,
  503. wpabuf_head(msg),
  504. wpabuf_len(msg) - integ_alg->hash_len, icv);
  505. return 0;
  506. }
  507. int ikev2_keys_set(struct ikev2_keys *keys)
  508. {
  509. return keys->SK_d && keys->SK_ai && keys->SK_ar && keys->SK_ei &&
  510. keys->SK_er && keys->SK_pi && keys->SK_pr;
  511. }
  512. void ikev2_free_keys(struct ikev2_keys *keys)
  513. {
  514. os_free(keys->SK_d);
  515. os_free(keys->SK_ai);
  516. os_free(keys->SK_ar);
  517. os_free(keys->SK_ei);
  518. os_free(keys->SK_er);
  519. os_free(keys->SK_pi);
  520. os_free(keys->SK_pr);
  521. keys->SK_d = keys->SK_ai = keys->SK_ar = keys->SK_ei = keys->SK_er =
  522. keys->SK_pi = keys->SK_pr = NULL;
  523. }
  524. int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
  525. const struct ikev2_integ_alg *integ,
  526. const struct ikev2_encr_alg *encr,
  527. const u8 *skeyseed, const u8 *data, size_t data_len,
  528. struct ikev2_keys *keys)
  529. {
  530. u8 *keybuf, *pos;
  531. size_t keybuf_len;
  532. /*
  533. * {SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr } =
  534. * prf+(SKEYSEED, Ni | Nr | SPIi | SPIr )
  535. */
  536. ikev2_free_keys(keys);
  537. keys->SK_d_len = prf->key_len;
  538. keys->SK_integ_len = integ->key_len;
  539. keys->SK_encr_len = encr->key_len;
  540. keys->SK_prf_len = prf->key_len;
  541. keybuf_len = keys->SK_d_len + 2 * keys->SK_integ_len +
  542. 2 * keys->SK_encr_len + 2 * keys->SK_prf_len;
  543. keybuf = os_malloc(keybuf_len);
  544. if (keybuf == NULL)
  545. return -1;
  546. if (ikev2_prf_plus(prf->id, skeyseed, prf->hash_len,
  547. data, data_len, keybuf, keybuf_len)) {
  548. os_free(keybuf);
  549. return -1;
  550. }
  551. pos = keybuf;
  552. keys->SK_d = os_malloc(keys->SK_d_len);
  553. if (keys->SK_d) {
  554. os_memcpy(keys->SK_d, pos, keys->SK_d_len);
  555. wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_d",
  556. keys->SK_d, keys->SK_d_len);
  557. }
  558. pos += keys->SK_d_len;
  559. keys->SK_ai = os_malloc(keys->SK_integ_len);
  560. if (keys->SK_ai) {
  561. os_memcpy(keys->SK_ai, pos, keys->SK_integ_len);
  562. wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_ai",
  563. keys->SK_ai, keys->SK_integ_len);
  564. }
  565. pos += keys->SK_integ_len;
  566. keys->SK_ar = os_malloc(keys->SK_integ_len);
  567. if (keys->SK_ar) {
  568. os_memcpy(keys->SK_ar, pos, keys->SK_integ_len);
  569. wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_ar",
  570. keys->SK_ar, keys->SK_integ_len);
  571. }
  572. pos += keys->SK_integ_len;
  573. keys->SK_ei = os_malloc(keys->SK_encr_len);
  574. if (keys->SK_ei) {
  575. os_memcpy(keys->SK_ei, pos, keys->SK_encr_len);
  576. wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_ei",
  577. keys->SK_ei, keys->SK_encr_len);
  578. }
  579. pos += keys->SK_encr_len;
  580. keys->SK_er = os_malloc(keys->SK_encr_len);
  581. if (keys->SK_er) {
  582. os_memcpy(keys->SK_er, pos, keys->SK_encr_len);
  583. wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_er",
  584. keys->SK_er, keys->SK_encr_len);
  585. }
  586. pos += keys->SK_encr_len;
  587. keys->SK_pi = os_malloc(keys->SK_prf_len);
  588. if (keys->SK_pi) {
  589. os_memcpy(keys->SK_pi, pos, keys->SK_prf_len);
  590. wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_pi",
  591. keys->SK_pi, keys->SK_prf_len);
  592. }
  593. pos += keys->SK_prf_len;
  594. keys->SK_pr = os_malloc(keys->SK_prf_len);
  595. if (keys->SK_pr) {
  596. os_memcpy(keys->SK_pr, pos, keys->SK_prf_len);
  597. wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_pr",
  598. keys->SK_pr, keys->SK_prf_len);
  599. }
  600. os_free(keybuf);
  601. if (!ikev2_keys_set(keys)) {
  602. ikev2_free_keys(keys);
  603. return -1;
  604. }
  605. return 0;
  606. }