NetworkPkg: Clean up source files
1. Do not use tab characters 2. No trailing white space in one line 3. All files must end with CRLF Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Liming Gao <liming.gao@intel.com>
This commit is contained in:
@@ -1,7 +1,7 @@
|
||||
/** @file
|
||||
The operations for Child SA.
|
||||
|
||||
Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2010 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
@@ -16,12 +16,12 @@
|
||||
#include "Utility.h"
|
||||
|
||||
/**
|
||||
Generate IKE Packet for CREATE_CHILD_SA exchange.
|
||||
Generate IKE Packet for CREATE_CHILD_SA exchange.
|
||||
|
||||
This IKE Packet would be the packet for creating new CHILD SA, or the packet for
|
||||
rekeying existing IKE SA, or the packet for existing CHILD SA.
|
||||
|
||||
@param[in] SaSession Pointer to related SA session.
|
||||
|
||||
@param[in] SaSession Pointer to related SA session.
|
||||
@param[in] Context The data passed by the caller.
|
||||
|
||||
return a pointer of IKE packet.
|
||||
@@ -42,12 +42,12 @@ Ikev2CreateChildGenerator (
|
||||
|
||||
NotifyPayload = NULL;
|
||||
MessageId = NULL;
|
||||
|
||||
|
||||
ChildSaSession = (IKEV2_CHILD_SA_SESSION *) SaSession;
|
||||
if (ChildSaSession == NULL) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
IkePacket = IkePacketAlloc();
|
||||
if (IkePacket == NULL) {
|
||||
return NULL;
|
||||
@@ -57,28 +57,28 @@ Ikev2CreateChildGenerator (
|
||||
if (Context != NULL) {
|
||||
MessageId = (UINT32 *) Context;
|
||||
}
|
||||
|
||||
|
||||
IkePacket->Header->Version = (UINT8) (2 << 4);
|
||||
IkePacket->Header->NextPayload = IKEV2_PAYLOAD_TYPE_NOTIFY;
|
||||
IkePacket->Header->ExchangeType = IKE_XCG_TYPE_CREATE_CHILD_SA;
|
||||
|
||||
|
||||
if (ChildSaSession->SessionCommon.IkeSessionType == IkeSessionTypeChildSa) {
|
||||
//
|
||||
// 1.a Fill the IkePacket->Hdr
|
||||
//
|
||||
//
|
||||
IkePacket->Header->InitiatorCookie = ChildSaSession->IkeSaSession->InitiatorCookie;
|
||||
IkePacket->Header->ResponderCookie = ChildSaSession->IkeSaSession->ResponderCookie;
|
||||
|
||||
|
||||
if (MessageId != NULL) {
|
||||
IkePacket->Header->MessageId = *MessageId;
|
||||
} else {
|
||||
IkePacket->Header->MessageId = ChildSaSession->MessageId;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
if (ChildSaSession->SessionCommon.IsInitiator) {
|
||||
IkePacket->Header->Flags = IKE_HEADER_FLAGS_INIT;
|
||||
}
|
||||
|
||||
|
||||
} else {
|
||||
IkeSaSession = (IKEV2_SA_SESSION *) SaSession;
|
||||
//
|
||||
@@ -91,8 +91,8 @@ Ikev2CreateChildGenerator (
|
||||
IkePacket->Header->MessageId = *MessageId;
|
||||
} else {
|
||||
IkePacket->Header->MessageId = IkeSaSession->MessageId;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
if (IkeSaSession->SessionCommon.IsInitiator) {
|
||||
IkePacket->Header->Flags = IKE_HEADER_FLAGS_INIT;
|
||||
}
|
||||
@@ -101,7 +101,7 @@ Ikev2CreateChildGenerator (
|
||||
if (MessageId != NULL) {
|
||||
IkePacket->Header->Flags |= IKE_HEADER_FLAGS_RESPOND;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// According to RFC4306, Chapter 4.
|
||||
// A minimal implementation may support the CREATE_CHILD_SA exchange only to
|
||||
@@ -110,33 +110,33 @@ Ikev2CreateChildGenerator (
|
||||
NotifyPayload = Ikev2GenerateNotifyPayload (
|
||||
0,
|
||||
IKEV2_PAYLOAD_TYPE_NONE,
|
||||
0,
|
||||
0,
|
||||
IKEV2_NOTIFICATION_NO_ADDITIONAL_SAS,
|
||||
NULL,
|
||||
NULL,
|
||||
0
|
||||
);
|
||||
if (NotifyPayload == NULL) {
|
||||
if (NotifyPayload == NULL) {
|
||||
IkePacketFree (IkePacket);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
IKE_PACKET_APPEND_PAYLOAD (IkePacket, NotifyPayload);
|
||||
//
|
||||
// TODO: Support the CREATE_CHILD_SA exchange.
|
||||
//
|
||||
// TODO: Support the CREATE_CHILD_SA exchange.
|
||||
//
|
||||
return IkePacket;
|
||||
}
|
||||
|
||||
/**
|
||||
Parse the IKE packet of CREATE_CHILD_SA exchange.
|
||||
|
||||
|
||||
This function parse the IKE packet and save the related information to further
|
||||
calculation.
|
||||
|
||||
calculation.
|
||||
|
||||
@param[in] SaSession Pointer to IKEv2_CHILD_SA_SESSION related to this Exchange.
|
||||
@param[in] IkePacket Received packet to be parsed.
|
||||
|
||||
|
||||
|
||||
@retval EFI_SUCCESS The IKE Packet is acceptable.
|
||||
@retval EFI_UNSUPPORTED Not support the CREATE_CHILD_SA request.
|
||||
|
@@ -1,7 +1,7 @@
|
||||
/** @file
|
||||
The general interfaces of the IKEv2.
|
||||
|
||||
Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2010 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
@@ -498,7 +498,7 @@ Ikev2HandleSa (
|
||||
if (ChildSaSession == NULL) {
|
||||
goto ON_ERROR;
|
||||
}
|
||||
|
||||
|
||||
ChildSaCommon = &ChildSaSession->SessionCommon;
|
||||
}
|
||||
|
||||
@@ -526,7 +526,7 @@ Ikev2HandleSa (
|
||||
if (ChildSaSession == NULL) {
|
||||
goto ON_ERROR;
|
||||
}
|
||||
|
||||
|
||||
ChildSaCommon = &ChildSaSession->SessionCommon;
|
||||
|
||||
//
|
||||
|
@@ -1,7 +1,7 @@
|
||||
/** @file
|
||||
IKEv2 related definitions.
|
||||
|
||||
Copyright (c) 2010, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2010 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
@@ -231,7 +231,7 @@ typedef struct {
|
||||
UINT8 *Data;
|
||||
} PRF_DATA_FRAGMENT;
|
||||
|
||||
typedef
|
||||
typedef
|
||||
IKE_PACKET *
|
||||
(*IKEV2_PACKET_GENERATOR) (
|
||||
IN UINT8 *SaSession,
|
||||
|
@@ -2,7 +2,7 @@
|
||||
The Implementations for Information Exchange.
|
||||
|
||||
(C) Copyright 2015 Hewlett-Packard Development Company, L.P.<BR>
|
||||
Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2010 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
@@ -11,7 +11,7 @@
|
||||
|
||||
THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS,
|
||||
WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED.
|
||||
|
||||
|
||||
**/
|
||||
|
||||
#include "Utility.h"
|
||||
@@ -21,14 +21,14 @@
|
||||
/**
|
||||
Generate Information Packet.
|
||||
|
||||
The information Packet may contain one Delete Payload, or Notify Payload, which
|
||||
The information Packet may contain one Delete Payload, or Notify Payload, which
|
||||
dependes on the Context's parameters.
|
||||
|
||||
@param[in] SaSession Pointer to IKE SA Session or Child SA Session which is
|
||||
@param[in] SaSession Pointer to IKE SA Session or Child SA Session which is
|
||||
related to the information Exchange.
|
||||
@param[in] Context The Data passed from the caller. If the Context is not NULL
|
||||
it should contain the information for Notification Data.
|
||||
|
||||
|
||||
@retval Pointer of IKE_PACKET generated.
|
||||
|
||||
**/
|
||||
@@ -55,7 +55,7 @@ Ikev2InfoGenerator (
|
||||
// Fill IkePacket Header.
|
||||
//
|
||||
IkePacket->Header->ExchangeType = IKEV2_EXCHANGE_TYPE_INFO;
|
||||
IkePacket->Header->Version = (UINT8) (2 << 4);
|
||||
IkePacket->Header->Version = (UINT8) (2 << 4);
|
||||
|
||||
if (Context != NULL) {
|
||||
InfoContext = (IKEV2_INFO_EXCHANGE_CONTEXT *) Context;
|
||||
@@ -64,8 +64,8 @@ Ikev2InfoGenerator (
|
||||
//
|
||||
// For Liveness Check
|
||||
//
|
||||
if (InfoContext != NULL &&
|
||||
(InfoContext->InfoType == Ikev2InfoLiveCheck || InfoContext->InfoType == Ikev2InfoNotify)
|
||||
if (InfoContext != NULL &&
|
||||
(InfoContext->InfoType == Ikev2InfoLiveCheck || InfoContext->InfoType == Ikev2InfoNotify)
|
||||
) {
|
||||
IkePacket->Header->MessageId = InfoContext->MessageId;
|
||||
IkePacket->Header->InitiatorCookie = IkeSaSession->InitiatorCookie;
|
||||
@@ -77,10 +77,10 @@ Ikev2InfoGenerator (
|
||||
//
|
||||
return IkePacket;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// For delete SAs
|
||||
//
|
||||
//
|
||||
if (IkeSaSession->SessionCommon.IkeSessionType == IkeSessionTypeIkeSa) {
|
||||
|
||||
IkePacket->Header->InitiatorCookie = IkeSaSession->InitiatorCookie;
|
||||
@@ -101,12 +101,12 @@ Ikev2InfoGenerator (
|
||||
//
|
||||
if (IkeSaSession->SessionCommon.State == IkeStateSaDeleting ) {
|
||||
IkePayload = Ikev2GenerateDeletePayload (
|
||||
IkeSaSession,
|
||||
IKEV2_PAYLOAD_TYPE_NONE,
|
||||
0,
|
||||
0,
|
||||
IkeSaSession,
|
||||
IKEV2_PAYLOAD_TYPE_NONE,
|
||||
0,
|
||||
0,
|
||||
NULL
|
||||
);
|
||||
);
|
||||
if (IkePayload == NULL) {
|
||||
goto ERROR_EXIT;
|
||||
}
|
||||
@@ -118,7 +118,7 @@ Ikev2InfoGenerator (
|
||||
IkePacket->Private = IkeSaSession->SessionCommon.Private;
|
||||
IkePacket->Spi = 0;
|
||||
IkePacket->IsDeleteInfo = TRUE;
|
||||
|
||||
|
||||
} else if (Context != NULL) {
|
||||
//
|
||||
// TODO: If contest is not NULL Generate a Notify Payload.
|
||||
@@ -132,7 +132,7 @@ Ikev2InfoGenerator (
|
||||
|
||||
if (IkeSaSession->SessionCommon.IsInitiator) {
|
||||
IkePacket->Header->Flags = IKE_HEADER_FLAGS_INIT ;
|
||||
}
|
||||
}
|
||||
} else {
|
||||
//
|
||||
// Delete the Child SA Information Exchagne
|
||||
@@ -152,7 +152,7 @@ Ikev2InfoGenerator (
|
||||
IkePacket->Header->MessageId = ChildSaSession->IkeSaSession->MessageId;
|
||||
Ikev2SaSessionIncreaseMessageId (IkeSaSession);
|
||||
}
|
||||
|
||||
|
||||
IkePayload = Ikev2GenerateDeletePayload (
|
||||
ChildSaSession->IkeSaSession,
|
||||
IKEV2_PAYLOAD_TYPE_DELETE,
|
||||
@@ -193,7 +193,7 @@ Ikev2InfoGenerator (
|
||||
if (InfoContext != NULL) {
|
||||
IkePacket->Header->Flags |= IKE_HEADER_FLAGS_RESPOND;
|
||||
}
|
||||
|
||||
|
||||
return IkePacket;
|
||||
|
||||
ERROR_EXIT:
|
||||
@@ -233,16 +233,16 @@ Ikev2InfoParser (
|
||||
UINT8 Value;
|
||||
EFI_STATUS Status;
|
||||
IKE_PACKET *RespondPacket;
|
||||
|
||||
|
||||
IKEV2_INFO_EXCHANGE_CONTEXT Context;
|
||||
|
||||
|
||||
IkeSaSession = (IKEV2_SA_SESSION *) SaSession;
|
||||
|
||||
DeletePayload = NULL;
|
||||
Private = NULL;
|
||||
RespondPacket = NULL;
|
||||
Status = EFI_SUCCESS;
|
||||
|
||||
|
||||
//
|
||||
// For Liveness Check
|
||||
//
|
||||
@@ -279,13 +279,13 @@ Ikev2InfoParser (
|
||||
//
|
||||
// For SA Delete
|
||||
//
|
||||
NET_LIST_FOR_EACH (Entry, &(IkePacket)->PayloadList) {
|
||||
NET_LIST_FOR_EACH (Entry, &(IkePacket)->PayloadList) {
|
||||
|
||||
//
|
||||
// Iterate payloads to find the Delete/Notify Payload.
|
||||
//
|
||||
IkePayload = IKE_PAYLOAD_BY_PACKET (Entry);
|
||||
|
||||
|
||||
if (IkePayload->PayloadType == IKEV2_PAYLOAD_TYPE_DELETE) {
|
||||
DeletePayload = IkePayload;
|
||||
Delete = (IKEV2_DELETE *)DeletePayload->PayloadBuf;
|
||||
@@ -310,7 +310,7 @@ Ikev2InfoParser (
|
||||
// After all IKE SAs were deleted, set the IPSEC_STATUS_DISABLED value in
|
||||
// IPsec status variable.
|
||||
//
|
||||
if (IsListEmpty (&Private->Ikev1EstablishedList) &&
|
||||
if (IsListEmpty (&Private->Ikev1EstablishedList) &&
|
||||
(IsListEmpty (&Private->Ikev2EstablishedList))
|
||||
) {
|
||||
Value = IPSEC_STATUS_DISABLED;
|
||||
@@ -341,9 +341,9 @@ Ikev2InfoParser (
|
||||
return Status;
|
||||
}
|
||||
Status = Ikev2SendIkePacket (
|
||||
IkeSaSession->SessionCommon.UdpService,
|
||||
(UINT8 *)(&IkeSaSession->SessionCommon),
|
||||
RespondPacket,
|
||||
IkeSaSession->SessionCommon.UdpService,
|
||||
(UINT8 *)(&IkeSaSession->SessionCommon),
|
||||
RespondPacket,
|
||||
0
|
||||
);
|
||||
}
|
||||
@@ -373,7 +373,7 @@ Ikev2InfoParser (
|
||||
|
||||
Context.InfoType = Ikev2InfoDelete;
|
||||
Context.MessageId = IkePacket->Header->MessageId;
|
||||
|
||||
|
||||
RespondPacket = Ikev2InfoGenerator ((UINT8 *)ChildSaSession, &Context);
|
||||
if (RespondPacket == NULL) {
|
||||
Status = EFI_INVALID_PARAMETER;
|
||||
@@ -382,7 +382,7 @@ Ikev2InfoParser (
|
||||
Status = Ikev2SendIkePacket (
|
||||
ChildSaSession->SessionCommon.UdpService,
|
||||
(UINT8 *)(&ChildSaSession->SessionCommon),
|
||||
RespondPacket,
|
||||
RespondPacket,
|
||||
0
|
||||
);
|
||||
} else {
|
||||
@@ -399,7 +399,7 @@ Ikev2InfoParser (
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
@@ -2,7 +2,7 @@
|
||||
The implementation of Payloads Creation.
|
||||
|
||||
(C) Copyright 2015 Hewlett-Packard Development Company, L.P.<BR>
|
||||
Copyright (c) 2010 - 2017, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2010 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
@@ -55,7 +55,7 @@ Ikev2GenerateSaPayload (
|
||||
if (SaPayload == NULL) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// TODO: Get the Proposal Number and Transform Number from IPsec Config,
|
||||
// after the Ipsecconfig Application is support it.
|
||||
@@ -127,7 +127,7 @@ Ikev2GenerateNoncePayload (
|
||||
if (Nonce == NULL) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
CopyMem (Nonce + 1, NonceBlock, Size - sizeof (IKEV2_NONCE));
|
||||
|
||||
Nonce->Header.NextPayload = NextPayload;
|
||||
@@ -137,7 +137,7 @@ Ikev2GenerateNoncePayload (
|
||||
FreePool (Nonce);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
NoncePayload->PayloadType = IKEV2_PAYLOAD_TYPE_NONCE;
|
||||
NoncePayload->PayloadBuf = (UINT8 *) Nonce;
|
||||
NoncePayload->PayloadSize = Size;
|
||||
@@ -428,11 +428,11 @@ Ikev2PskGenerateAuthPayload (
|
||||
if (Digest == NULL) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
if (IdPayload == NULL) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Calcualte Prf(Seceret, "Key Pad for IKEv2");
|
||||
//
|
||||
@@ -460,7 +460,7 @@ Ikev2PskGenerateAuthPayload (
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto EXIT;
|
||||
}
|
||||
|
||||
|
||||
CopyMem (KeyBuf, Digest, DigestSize);
|
||||
KeySize = DigestSize;
|
||||
|
||||
@@ -522,7 +522,7 @@ Ikev2PskGenerateAuthPayload (
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto EXIT;
|
||||
}
|
||||
|
||||
|
||||
Fragments[2].DataSize = DigestSize;
|
||||
CopyMem (Fragments[2].Data, Digest, DigestSize);
|
||||
|
||||
@@ -557,7 +557,7 @@ Ikev2PskGenerateAuthPayload (
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto EXIT;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Fill in Auth payload.
|
||||
//
|
||||
@@ -761,7 +761,7 @@ Ikev2CertGenerateAuthPayload (
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto EXIT;
|
||||
}
|
||||
|
||||
|
||||
Fragments[2].DataSize = DigestSize;
|
||||
CopyMem (Fragments[2].Data, Digest, DigestSize);
|
||||
|
||||
@@ -820,7 +820,7 @@ Ikev2CertGenerateAuthPayload (
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto EXIT;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Fill in Auth payload.
|
||||
//
|
||||
@@ -1229,7 +1229,7 @@ Ikev2GenerateNotifyPayload (
|
||||
FreePool (Notify);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
NotifyPayload->PayloadType = IKEV2_PAYLOAD_TYPE_NOTIFY;
|
||||
NotifyPayload->PayloadBuf = (UINT8 *) Notify;
|
||||
NotifyPayload->PayloadSize = NotifyPayloadLen;
|
||||
@@ -1320,7 +1320,7 @@ Ikev2GenerateDeletePayload (
|
||||
FreePool (Del);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
DelPayload->PayloadType = IKEV2_PAYLOAD_TYPE_DELETE;
|
||||
DelPayload->PayloadBuf = (UINT8 *) Del;
|
||||
DelPayload->PayloadSize = DelPayloadLen;
|
||||
@@ -1687,7 +1687,7 @@ Ikev2EncodeSa (
|
||||
if (Sa == NULL) {
|
||||
return NULL;
|
||||
}
|
||||
|
||||
|
||||
CopyMem (Sa, SaData, sizeof (IKEV2_SA));
|
||||
Sa->Header.PayloadLength = (UINT16) sizeof (IKEV2_SA);
|
||||
ProposalsSize = 0;
|
||||
@@ -1884,7 +1884,7 @@ Ikev2DecodeSa (
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
|
||||
CopyMem (SaData, Sa, sizeof (IKEV2_SA));
|
||||
SaData->NumProposals = TotalProposals;
|
||||
ProposalData = (IKEV2_PROPOSAL_DATA *) (SaData + 1);
|
||||
@@ -1921,7 +1921,7 @@ Ikev2DecodeSa (
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
|
||||
CopyMem (Spi, (UINT32 *) (Proposal + 1), Proposal->SpiSize);
|
||||
*((UINT32*) Spi) = NTOHL (*((UINT32*) Spi));
|
||||
ProposalData->Spi = Spi;
|
||||
@@ -2357,7 +2357,7 @@ Ikev2DecodePacket (
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
|
||||
CopyMem (IkeHeader, IkePacket->Header, sizeof (IKE_HEADER));
|
||||
|
||||
//
|
||||
@@ -2565,7 +2565,7 @@ Ikev2EncodePacket (
|
||||
if (IkeSaSession->InitPacket == NULL) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
||||
|
||||
CopyMem (IkeSaSession->InitPacket, IkePacket->Header, sizeof (IKE_HEADER));
|
||||
PayloadTotalSize = 0;
|
||||
for (Entry = IkePacket->PayloadList.ForwardLink; Entry != &(IkePacket->PayloadList);) {
|
||||
@@ -2584,7 +2584,7 @@ Ikev2EncodePacket (
|
||||
if (IkeSaSession->RespPacket == NULL) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
||||
|
||||
CopyMem (IkeSaSession->RespPacket, IkePacket->Header, sizeof (IKE_HEADER));
|
||||
PayloadTotalSize = 0;
|
||||
for (Entry = IkePacket->PayloadList.ForwardLink; Entry != &(IkePacket->PayloadList);) {
|
||||
@@ -2695,7 +2695,7 @@ Ikev2DecryptPacket (
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto ON_EXIT;
|
||||
}
|
||||
|
||||
|
||||
CopyMem (IntegrityBuffer, IkePacket->Header, sizeof(IKE_HEADER));
|
||||
CopyMem (IntegrityBuffer + sizeof (IKE_HEADER), IkePacket->PayloadsBuf, IkePacket->PayloadTotalSize);
|
||||
|
||||
@@ -2910,7 +2910,7 @@ Ikev2EncryptPacket (
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto ON_EXIT;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Copy all payload into EncryptedIkePayload
|
||||
//
|
||||
|
@@ -1,7 +1,7 @@
|
||||
/** @file
|
||||
The Definitions related to IKEv2 payload.
|
||||
|
||||
Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2010 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
@@ -37,12 +37,12 @@
|
||||
#define IKEV2_PAYLOAD_TYPE_EAP 48
|
||||
|
||||
//
|
||||
// IKE header Flag (1 octet) for IKEv2, defined in RFC 4306 section 3.1
|
||||
// IKE header Flag (1 octet) for IKEv2, defined in RFC 4306 section 3.1
|
||||
//
|
||||
// I(nitiator) (bit 3 of Flags, 0x08) - This bit MUST be set in messages sent by the
|
||||
// I(nitiator) (bit 3 of Flags, 0x08) - This bit MUST be set in messages sent by the
|
||||
// original initiator of the IKE_SA
|
||||
//
|
||||
// R(esponse) (bit 5 of Flags, 0x20) - This bit indicates that this message is a response to
|
||||
// R(esponse) (bit 5 of Flags, 0x20) - This bit indicates that this message is a response to
|
||||
// a message containing the same message ID.
|
||||
//
|
||||
#define IKE_HEADER_FLAGS_INIT 0x08
|
||||
@@ -67,7 +67,7 @@ typedef struct {
|
||||
#pragma pack(1)
|
||||
typedef struct {
|
||||
IKEV2_COMMON_PAYLOAD_HEADER Header;
|
||||
//
|
||||
//
|
||||
// Proposals
|
||||
//
|
||||
} IKEV2_SA;
|
||||
@@ -94,7 +94,7 @@ typedef struct {
|
||||
|
||||
//
|
||||
// IKEv2 Transform ID for Encrypt Algorithm (ENCR)
|
||||
//
|
||||
//
|
||||
#define IKEV2_TRANSFORM_ID_ENCR_DES_IV64 1
|
||||
#define IKEV2_TRANSFORM_ID_ENCR_DES 2
|
||||
#define IKEV2_TRANSFORM_ID_ENCR_3DES 3
|
||||
|
@@ -2,7 +2,7 @@
|
||||
The operations for IKEv2 SA.
|
||||
|
||||
(C) Copyright 2015 Hewlett-Packard Development Company, L.P.<BR>
|
||||
Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2010 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
@@ -23,7 +23,7 @@
|
||||
Generates the DH Key.
|
||||
|
||||
This generates the DH local public key and store it in the IKEv2 SA Session's GxBuffer.
|
||||
|
||||
|
||||
@param[in] IkeSaSession Pointer to related IKE SA Session.
|
||||
|
||||
@retval EFI_SUCCESS The operation succeeded.
|
||||
@@ -155,7 +155,7 @@ Ikev2InitPskGenerator (
|
||||
// IkeSaSession is responder. If resending IKE_SA_INIT with Cookie Notify
|
||||
// No need to recompute the Public key.
|
||||
//
|
||||
if ((IkeSaSession->SessionCommon.IsInitiator) && (IkeSaSession->NCookie == NULL)) {
|
||||
if ((IkeSaSession->SessionCommon.IsInitiator) && (IkeSaSession->NCookie == NULL)) {
|
||||
Status = Ikev2GenerateSaDhPublicKey (IkeSaSession);
|
||||
if (EFI_ERROR (Status)) {
|
||||
goto CheckError;
|
||||
@@ -166,7 +166,7 @@ Ikev2InitPskGenerator (
|
||||
// 4. Generate KE Payload according to SaParams->DhGroup
|
||||
//
|
||||
KePayload = Ikev2GenerateKePayload (
|
||||
IkeSaSession,
|
||||
IkeSaSession,
|
||||
IKEV2_PAYLOAD_TYPE_NONCE
|
||||
);
|
||||
|
||||
@@ -223,7 +223,7 @@ CheckError:
|
||||
if (SaPayload != NULL) {
|
||||
IkePayloadFree (SaPayload);
|
||||
}
|
||||
return NULL;
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -241,7 +241,7 @@ EFI_STATUS
|
||||
Ikev2InitPskParser (
|
||||
IN UINT8 *SaSession,
|
||||
IN IKE_PACKET *IkePacket
|
||||
)
|
||||
)
|
||||
{
|
||||
IKEV2_SA_SESSION *IkeSaSession;
|
||||
IKE_PAYLOAD *SaPayload;
|
||||
@@ -305,7 +305,7 @@ Ikev2InitPskParser (
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto CheckError;
|
||||
}
|
||||
|
||||
|
||||
CopyMem (
|
||||
NonceBuffer,
|
||||
NoncePayload->PayloadBuf + sizeof (IKEV2_COMMON_PAYLOAD_HEADER),
|
||||
@@ -410,7 +410,7 @@ CheckError:
|
||||
if (NonceBuffer != NULL) {
|
||||
FreePool (NonceBuffer);
|
||||
}
|
||||
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
@@ -439,7 +439,7 @@ Ikev2AuthPskGenerator (
|
||||
IKE_PAYLOAD *NotifyPayload;
|
||||
IKE_PAYLOAD *CpPayload;
|
||||
IKEV2_CHILD_SA_SESSION *ChildSaSession;
|
||||
|
||||
|
||||
|
||||
IkeSaSession = (IKEV2_SA_SESSION *) SaSession;
|
||||
ChildSaSession = IKEV2_CHILD_SA_SESSION_BY_IKE_SA (GetFirstNode (&IkeSaSession->ChildSaSessionList));
|
||||
@@ -453,7 +453,7 @@ Ikev2AuthPskGenerator (
|
||||
NotifyPayload = NULL;
|
||||
CpPayload = NULL;
|
||||
NotifyPayload = NULL;
|
||||
|
||||
|
||||
//
|
||||
// 1. Allocate IKE Packet
|
||||
//
|
||||
@@ -476,7 +476,7 @@ Ikev2AuthPskGenerator (
|
||||
}
|
||||
|
||||
//
|
||||
// According to RFC4306_2.2, For the IKE_SA_INIT message the MessageID should
|
||||
// According to RFC4306_2.2, For the IKE_SA_INIT message the MessageID should
|
||||
// be always number 0 and 1;
|
||||
//
|
||||
IkePacket->Header->MessageId = 1;
|
||||
@@ -623,7 +623,7 @@ CheckError:
|
||||
if (IkePacket != NULL) {
|
||||
IkePacketFree (IkePacket);
|
||||
}
|
||||
|
||||
|
||||
if (IdPayload != NULL) {
|
||||
IkePayloadFree (IdPayload);
|
||||
}
|
||||
@@ -631,7 +631,7 @@ CheckError:
|
||||
if (AuthPayload != NULL) {
|
||||
IkePayloadFree (AuthPayload);
|
||||
}
|
||||
|
||||
|
||||
if (CpPayload != NULL) {
|
||||
IkePayloadFree (CpPayload);
|
||||
}
|
||||
@@ -639,20 +639,20 @@ CheckError:
|
||||
if (SaPayload != NULL) {
|
||||
IkePayloadFree (SaPayload);
|
||||
}
|
||||
|
||||
|
||||
if (TsiPayload != NULL) {
|
||||
IkePayloadFree (TsiPayload);
|
||||
}
|
||||
|
||||
|
||||
if (TsrPayload != NULL) {
|
||||
IkePayloadFree (TsrPayload);
|
||||
}
|
||||
|
||||
|
||||
if (NotifyPayload != NULL) {
|
||||
IkePayloadFree (NotifyPayload);
|
||||
}
|
||||
|
||||
return NULL;
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -661,13 +661,13 @@ CheckError:
|
||||
@param[in] SaSession Pointer to the IKE_SA_SESSION related to this packet.
|
||||
@param[in] IkePacket Pointer to the IKE_AUTH packet to be parsered.
|
||||
|
||||
@retval EFI_INVALID_PARAMETER The IKE packet is malformed or the SA
|
||||
@retval EFI_INVALID_PARAMETER The IKE packet is malformed or the SA
|
||||
proposal is unacceptable.
|
||||
@retval EFI_SUCCESS The IKE packet is acceptable and the
|
||||
relative data is saved for furthure communication.
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
EFI_STATUS
|
||||
Ikev2AuthPskParser (
|
||||
IN UINT8 *SaSession,
|
||||
IN IKE_PACKET *IkePacket
|
||||
@@ -733,7 +733,7 @@ Ikev2AuthPskParser (
|
||||
// Check IkePacket Header is match the state
|
||||
//
|
||||
if (IkeSaSession->SessionCommon.IsInitiator) {
|
||||
|
||||
|
||||
//
|
||||
// 1. Check the IkePacket->Hdr == IKE_HEADER_FLAGS_RESPOND
|
||||
//
|
||||
@@ -830,7 +830,7 @@ Ikev2AuthPskParser (
|
||||
(((TRAFFIC_SELECTOR *)(TsrPayload->PayloadBuf + sizeof (IKEV2_TS)))->StartPort != ChildSaSession->RemotePort)
|
||||
) {
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
}
|
||||
if ((((TRAFFIC_SELECTOR *)(TsiPayload->PayloadBuf + sizeof (IKEV2_TS)))->StartPort != 0) &&
|
||||
(((TRAFFIC_SELECTOR *)(TsiPayload->PayloadBuf + sizeof (IKEV2_TS)))->StartPort != ChildSaSession->LocalPort)
|
||||
) {
|
||||
@@ -847,7 +847,7 @@ Ikev2AuthPskParser (
|
||||
return EFI_INVALID_PARAMETER;
|
||||
}
|
||||
//
|
||||
// Get the Virtual IP address from the Tsi traffic selector.
|
||||
// Get the Virtual IP address from the Tsi traffic selector.
|
||||
// TODO: check the CFG reply payload
|
||||
//
|
||||
CopyMem (
|
||||
@@ -856,7 +856,7 @@ Ikev2AuthPskParser (
|
||||
(ChildSaSession->SessionCommon.UdpService->IpVersion == IP_VERSION_4) ?
|
||||
sizeof (EFI_IPv4_ADDRESS) : sizeof (EFI_IPv6_ADDRESS)
|
||||
);
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
//
|
||||
@@ -866,7 +866,7 @@ Ikev2AuthPskParser (
|
||||
if (EFI_ERROR (Status)) {
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
if (IkeSaSession->SessionCommon.IsInitiator) {
|
||||
//
|
||||
// 6. Change the state of IkeSaSession
|
||||
@@ -874,7 +874,7 @@ Ikev2AuthPskParser (
|
||||
IKEV2_DUMP_STATE (IkeSaSession->SessionCommon.State, IkeStateIkeSaEstablished);
|
||||
IkeSaSession->SessionCommon.State = IkeStateIkeSaEstablished;
|
||||
}
|
||||
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
@@ -892,7 +892,7 @@ IKE_PACKET*
|
||||
Ikev2InitCertGenerator (
|
||||
IN UINT8 *SaSession,
|
||||
IN VOID *Context
|
||||
)
|
||||
)
|
||||
{
|
||||
IKE_PACKET *IkePacket;
|
||||
IKE_PAYLOAD *CertReqPayload;
|
||||
@@ -944,7 +944,7 @@ Ikev2InitCertGenerator (
|
||||
|
||||
@retval EFI_SUCCESS The IKEv2 packet is acceptable and the relative data is
|
||||
saved for furthure communication.
|
||||
@retval EFI_INVALID_PARAMETER The IKE packet is malformed or the SA proposal is unacceptable.
|
||||
@retval EFI_INVALID_PARAMETER The IKE packet is malformed or the SA proposal is unacceptable.
|
||||
@retval EFI_UNSUPPORTED The certificate authentication is not supported.
|
||||
|
||||
**/
|
||||
@@ -956,11 +956,11 @@ Ikev2InitCertParser (
|
||||
{
|
||||
if (!FeaturePcdGet (PcdIpsecCertificateEnabled)) {
|
||||
return EFI_UNSUPPORTED;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
//
|
||||
// The first two messages exchange is same between PSK and Cert.
|
||||
// Todo: Parse Certificate Request from responder Initial Exchange.
|
||||
// Todo: Parse Certificate Request from responder Initial Exchange.
|
||||
//
|
||||
return Ikev2InitPskParser (SaSession, IkePacket);
|
||||
}
|
||||
@@ -1071,7 +1071,7 @@ Ikev2AuthCertGenerator (
|
||||
if (CertPayload == NULL) {
|
||||
goto CheckError;
|
||||
}
|
||||
|
||||
|
||||
if (IkeSaSession->SessionCommon.IsInitiator) {
|
||||
CertReqPayload = Ikev2GenerateCertificatePayload (
|
||||
IkeSaSession,
|
||||
@@ -1083,7 +1083,7 @@ Ikev2AuthCertGenerator (
|
||||
);
|
||||
if (CertReqPayload == NULL) {
|
||||
goto CheckError;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
//
|
||||
@@ -1126,15 +1126,15 @@ Ikev2AuthCertGenerator (
|
||||
IKEV2_CFG_ATTR_INTERNAL_IP6_ADDRESS
|
||||
);
|
||||
}
|
||||
|
||||
|
||||
if (CpPayload == NULL) {
|
||||
goto CheckError;
|
||||
}
|
||||
}
|
||||
}
|
||||
|
||||
if (AuthPayload == NULL) {
|
||||
goto CheckError;
|
||||
}
|
||||
}
|
||||
|
||||
//
|
||||
// 5. Generate SA Payload according to the Sa Data in ChildSaSession
|
||||
@@ -1165,7 +1165,7 @@ Ikev2AuthCertGenerator (
|
||||
);
|
||||
|
||||
//
|
||||
// Generate Notify Payload. If transport mode, there should have Notify
|
||||
// Generate Notify Payload. If transport mode, there should have Notify
|
||||
// payload with TRANSPORT_MODE notification.
|
||||
//
|
||||
NotifyPayload = Ikev2GenerateNotifyPayload (
|
||||
@@ -1222,7 +1222,7 @@ CheckError:
|
||||
if (IkePacket != NULL) {
|
||||
IkePacketFree (IkePacket);
|
||||
}
|
||||
|
||||
|
||||
if (IdPayload != NULL) {
|
||||
IkePayloadFree (IdPayload);
|
||||
}
|
||||
@@ -1230,7 +1230,7 @@ CheckError:
|
||||
if (CertPayload != NULL) {
|
||||
IkePayloadFree (CertPayload);
|
||||
}
|
||||
|
||||
|
||||
if (CertReqPayload != NULL) {
|
||||
IkePayloadFree (CertReqPayload);
|
||||
}
|
||||
@@ -1242,24 +1242,24 @@ CheckError:
|
||||
if (CpPayload != NULL) {
|
||||
IkePayloadFree (CpPayload);
|
||||
}
|
||||
|
||||
|
||||
if (SaPayload != NULL) {
|
||||
IkePayloadFree (SaPayload);
|
||||
}
|
||||
|
||||
|
||||
if (TsiPayload != NULL) {
|
||||
IkePayloadFree (TsiPayload);
|
||||
}
|
||||
|
||||
|
||||
if (TsrPayload != NULL) {
|
||||
IkePayloadFree (TsrPayload);
|
||||
}
|
||||
|
||||
|
||||
if (NotifyPayload != NULL) {
|
||||
IkePayloadFree (NotifyPayload);
|
||||
}
|
||||
|
||||
return NULL;
|
||||
|
||||
return NULL;
|
||||
}
|
||||
|
||||
/**
|
||||
@@ -1342,7 +1342,7 @@ Ikev2AuthCertParser (
|
||||
}
|
||||
}
|
||||
|
||||
if ((SaPayload == NULL) || (AuthPayload == NULL) || (TsiPayload == NULL) ||
|
||||
if ((SaPayload == NULL) || (AuthPayload == NULL) || (TsiPayload == NULL) ||
|
||||
(TsrPayload == NULL) || (CertPayload == NULL)) {
|
||||
goto Exit;
|
||||
}
|
||||
@@ -1354,7 +1354,7 @@ Ikev2AuthCertParser (
|
||||
// Check IkePacket Header is match the state
|
||||
//
|
||||
if (IkeSaSession->SessionCommon.IsInitiator) {
|
||||
|
||||
|
||||
//
|
||||
// 1. Check the IkePacket->Hdr == IKE_HEADER_FLAGS_RESPOND
|
||||
//
|
||||
@@ -1451,7 +1451,7 @@ Ikev2AuthCertParser (
|
||||
(((TRAFFIC_SELECTOR *)(TsrPayload->PayloadBuf + sizeof (IKEV2_TS)))->StartPort != ChildSaSession->RemotePort)
|
||||
) {
|
||||
goto Exit;
|
||||
}
|
||||
}
|
||||
if ((((TRAFFIC_SELECTOR *)(TsiPayload->PayloadBuf + sizeof (IKEV2_TS)))->StartPort != 0) &&
|
||||
(((TRAFFIC_SELECTOR *)(TsiPayload->PayloadBuf + sizeof (IKEV2_TS)))->StartPort != ChildSaSession->LocalPort)
|
||||
) {
|
||||
@@ -1468,7 +1468,7 @@ Ikev2AuthCertParser (
|
||||
goto Exit;
|
||||
}
|
||||
//
|
||||
// Get the Virtual IP address from the Tsi traffic selector.
|
||||
// Get the Virtual IP address from the Tsi traffic selector.
|
||||
// TODO: check the CFG reply payload
|
||||
//
|
||||
CopyMem (
|
||||
@@ -1479,7 +1479,7 @@ Ikev2AuthCertParser (
|
||||
);
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// 5. Generat keymats for IPsec protocol.
|
||||
//
|
||||
@@ -1487,7 +1487,7 @@ Ikev2AuthCertParser (
|
||||
if (EFI_ERROR (Status)) {
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
|
||||
if (IkeSaSession->SessionCommon.IsInitiator) {
|
||||
//
|
||||
// 6. Change the state of IkeSaSession
|
||||
@@ -1528,7 +1528,7 @@ Ikev2GenerateSaDhPublicKey (
|
||||
if (IkeSaSession->IkeKeys == NULL) {
|
||||
return EFI_OUT_OF_RESOURCES;
|
||||
}
|
||||
|
||||
|
||||
IkeKeys = IkeSaSession->IkeKeys;
|
||||
IkeKeys->DhBuffer = AllocateZeroPool (sizeof (IKEV2_DH_BUFFER));
|
||||
if (IkeKeys->DhBuffer == NULL) {
|
||||
@@ -1560,13 +1560,13 @@ Ikev2GenerateSaDhPublicKey (
|
||||
);
|
||||
if (EFI_ERROR (Status)) {
|
||||
DEBUG ((DEBUG_ERROR, "Error CPLKeyManGetKeyParam X public key error Status = %r\n", Status));
|
||||
|
||||
|
||||
FreePool (IkeKeys->DhBuffer->GxBuffer);
|
||||
|
||||
|
||||
FreePool (IkeKeys->DhBuffer);
|
||||
|
||||
|
||||
FreePool (IkeSaSession->IkeKeys);
|
||||
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
@@ -1583,7 +1583,7 @@ Ikev2GenerateSaDhPublicKey (
|
||||
|
||||
@param[in] DhBuffer Pointer to buffer of peer's puliic key.
|
||||
@param[in] KePayload Pointer to received key payload.
|
||||
|
||||
|
||||
@retval EFI_SUCCESS The operation succeeded.
|
||||
@retval Otherwise The operation failed.
|
||||
|
||||
@@ -1622,7 +1622,7 @@ Ikev2GenerateSaDhComputeKey (
|
||||
DEBUG ((DEBUG_ERROR, "Error CPLKeyManGetKeyParam Y session key error Status = %r\n", Status));
|
||||
|
||||
FreePool (DhBuffer->GxyBuffer);
|
||||
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
@@ -1633,10 +1633,10 @@ Ikev2GenerateSaDhComputeKey (
|
||||
DhBuffer->GyBuffer = AllocateZeroPool (DhBuffer->GySize);
|
||||
if (DhBuffer->GyBuffer == NULL) {
|
||||
FreePool (DhBuffer->GxyBuffer);
|
||||
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
|
||||
CopyMem (DhBuffer->GyBuffer, PubKey, DhBuffer->GySize);
|
||||
|
||||
IPSEC_DUMP_BUF ("DH Public Key (g^y) Dump", DhBuffer->GyBuffer, DhBuffer->GySize);
|
||||
@@ -1705,7 +1705,7 @@ Ikev2GenerateSaKeys (
|
||||
//
|
||||
// If one or more algorithm is not support, return EFI_UNSUPPORTED.
|
||||
//
|
||||
if (AuthAlgKeyLen == 0 ||
|
||||
if (AuthAlgKeyLen == 0 ||
|
||||
EncryptAlgKeyLen == 0 ||
|
||||
IntegrityAlgKeyLen == 0 ||
|
||||
PrfAlgKeyLen == 0
|
||||
@@ -1767,8 +1767,8 @@ Ikev2GenerateSaKeys (
|
||||
IPSEC_DUMP_BUF (">>> NrBlock", IkeSaSession->NrBlock, IkeSaSession->NrBlkSize);
|
||||
IPSEC_DUMP_BUF (">>> InitiatorCookie", (UINT8 *)&IkeSaSession->InitiatorCookie, sizeof(UINT64));
|
||||
IPSEC_DUMP_BUF (">>> ResponderCookie", (UINT8 *)&IkeSaSession->ResponderCookie, sizeof(UINT64));
|
||||
|
||||
OutputKeyLength = PrfAlgKeyLen +
|
||||
|
||||
OutputKeyLength = PrfAlgKeyLen +
|
||||
2 * EncryptAlgKeyLen +
|
||||
2 * AuthAlgKeyLen +
|
||||
2 * IntegrityAlgKeyLen;
|
||||
@@ -1818,7 +1818,7 @@ Ikev2GenerateSaKeys (
|
||||
}
|
||||
IkeSaSession->IkeKeys->SkAiKeySize = IntegrityAlgKeyLen;
|
||||
CopyMem (IkeSaSession->IkeKeys->SkAiKey, OutputKey + PrfAlgKeyLen, IntegrityAlgKeyLen);
|
||||
|
||||
|
||||
IPSEC_DUMP_BUF (">>> SK_Ai Key", IkeSaSession->IkeKeys->SkAiKey, IkeSaSession->IkeKeys->SkAiKeySize);
|
||||
|
||||
//
|
||||
@@ -1835,7 +1835,7 @@ Ikev2GenerateSaKeys (
|
||||
OutputKey + PrfAlgKeyLen + IntegrityAlgKeyLen,
|
||||
IntegrityAlgKeyLen
|
||||
);
|
||||
|
||||
|
||||
IPSEC_DUMP_BUF (">>> SK_Ar Key", IkeSaSession->IkeKeys->SkArKey, IkeSaSession->IkeKeys->SkArKeySize);
|
||||
|
||||
//
|
||||
@@ -1847,14 +1847,14 @@ Ikev2GenerateSaKeys (
|
||||
goto Exit;
|
||||
}
|
||||
IkeSaSession->IkeKeys->SkEiKeySize = EncryptAlgKeyLen;
|
||||
|
||||
|
||||
CopyMem (
|
||||
IkeSaSession->IkeKeys->SkEiKey,
|
||||
OutputKey + AuthAlgKeyLen + 2 * IntegrityAlgKeyLen,
|
||||
EncryptAlgKeyLen
|
||||
);
|
||||
IPSEC_DUMP_BUF (
|
||||
">>> SK_Ei Key",
|
||||
">>> SK_Ei Key",
|
||||
OutputKey + AuthAlgKeyLen + 2 * IntegrityAlgKeyLen,
|
||||
EncryptAlgKeyLen
|
||||
);
|
||||
@@ -1915,7 +1915,7 @@ Ikev2GenerateSaKeys (
|
||||
IkeSaSession->IkeKeys->SkPrKey,
|
||||
OutputKey + AuthAlgKeyLen + 2 * IntegrityAlgKeyLen + 2 * EncryptAlgKeyLen + AuthAlgKeyLen,
|
||||
AuthAlgKeyLen
|
||||
);
|
||||
);
|
||||
IPSEC_DUMP_BUF (
|
||||
">>> SK_Pr Key",
|
||||
OutputKey + AuthAlgKeyLen + 2 * IntegrityAlgKeyLen + 2 * EncryptAlgKeyLen + AuthAlgKeyLen,
|
||||
@@ -1958,7 +1958,7 @@ Exit:
|
||||
}
|
||||
}
|
||||
|
||||
|
||||
|
||||
return Status;
|
||||
}
|
||||
|
||||
@@ -1988,16 +1988,16 @@ Ikev2GenerateChildSaKeys (
|
||||
|
||||
Status = EFI_SUCCESS;
|
||||
OutputKey = NULL;
|
||||
|
||||
|
||||
if (KePayload != NULL) {
|
||||
//
|
||||
// Generate Gxy
|
||||
// Generate Gxy
|
||||
//
|
||||
Status = Ikev2GenerateSaDhComputeKey (ChildSaSession->DhBuffer, KePayload);
|
||||
if (EFI_ERROR (Status)) {
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
|
||||
Fragments[0].Data = ChildSaSession->DhBuffer->GxyBuffer;
|
||||
Fragments[0].DataSize = ChildSaSession->DhBuffer->GxySize;
|
||||
}
|
||||
@@ -2021,7 +2021,7 @@ Ikev2GenerateChildSaKeys (
|
||||
}
|
||||
|
||||
//
|
||||
//
|
||||
//
|
||||
// If KePayload is not NULL, calculate KEYMAT = prf+(SK_d, g^ir (new) | Ni | Nr ),
|
||||
// otherwise, KEYMAT = prf+(SK_d, Ni | Nr )
|
||||
//
|
||||
@@ -2045,16 +2045,16 @@ Ikev2GenerateChildSaKeys (
|
||||
);
|
||||
|
||||
if (EFI_ERROR (Status)) {
|
||||
goto Exit;
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
|
||||
//
|
||||
// Copy KEYMATE (SK_ENCRYPT_i | SK_ENCRYPT_r | SK_INTEG_i | SK_INTEG_r) to
|
||||
// ChildKeyMates.
|
||||
//
|
||||
//
|
||||
if (!ChildSaSession->SessionCommon.IsInitiator) {
|
||||
|
||||
//
|
||||
//
|
||||
// Initiator Encryption Key
|
||||
//
|
||||
ChildSaSession->ChildKeymats.LocalPeerInfo.EspAlgoInfo.EncAlgoId = (UINT8)SaParams->EncAlgId;
|
||||
@@ -2080,8 +2080,8 @@ Ikev2GenerateChildSaKeys (
|
||||
if (ChildSaSession->ChildKeymats.LocalPeerInfo.EspAlgoInfo.AuthKey == NULL) {
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
CopyMem (
|
||||
ChildSaSession->ChildKeymats.LocalPeerInfo.EspAlgoInfo.AuthKey,
|
||||
OutputKey + EncryptAlgKeyLen,
|
||||
@@ -2097,8 +2097,8 @@ Ikev2GenerateChildSaKeys (
|
||||
if (ChildSaSession->ChildKeymats.RemotePeerInfo.EspAlgoInfo.EncKey == NULL) {
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
CopyMem (
|
||||
ChildSaSession->ChildKeymats.RemotePeerInfo.EspAlgoInfo.EncKey,
|
||||
OutputKey + EncryptAlgKeyLen + IntegrityAlgKeyLen,
|
||||
@@ -2114,8 +2114,8 @@ Ikev2GenerateChildSaKeys (
|
||||
if (ChildSaSession->ChildKeymats.RemotePeerInfo.EspAlgoInfo.AuthKey == NULL) {
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
CopyMem (
|
||||
ChildSaSession->ChildKeymats.RemotePeerInfo.EspAlgoInfo.AuthKey,
|
||||
OutputKey + 2 * EncryptAlgKeyLen + IntegrityAlgKeyLen,
|
||||
@@ -2131,8 +2131,8 @@ Ikev2GenerateChildSaKeys (
|
||||
if (ChildSaSession->ChildKeymats.RemotePeerInfo.EspAlgoInfo.EncKey == NULL) {
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
CopyMem (
|
||||
ChildSaSession->ChildKeymats.RemotePeerInfo.EspAlgoInfo.EncKey,
|
||||
OutputKey,
|
||||
@@ -2148,8 +2148,8 @@ Ikev2GenerateChildSaKeys (
|
||||
if (ChildSaSession->ChildKeymats.RemotePeerInfo.EspAlgoInfo.AuthKey == NULL) {
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
CopyMem (
|
||||
ChildSaSession->ChildKeymats.RemotePeerInfo.EspAlgoInfo.AuthKey,
|
||||
OutputKey + EncryptAlgKeyLen,
|
||||
@@ -2165,8 +2165,8 @@ Ikev2GenerateChildSaKeys (
|
||||
if (ChildSaSession->ChildKeymats.LocalPeerInfo.EspAlgoInfo.EncKey == NULL) {
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
CopyMem (
|
||||
ChildSaSession->ChildKeymats.LocalPeerInfo.EspAlgoInfo.EncKey,
|
||||
OutputKey + EncryptAlgKeyLen + IntegrityAlgKeyLen,
|
||||
@@ -2182,8 +2182,8 @@ Ikev2GenerateChildSaKeys (
|
||||
if (ChildSaSession->ChildKeymats.LocalPeerInfo.EspAlgoInfo.AuthKey == NULL) {
|
||||
Status = EFI_OUT_OF_RESOURCES;
|
||||
goto Exit;
|
||||
}
|
||||
|
||||
}
|
||||
|
||||
CopyMem (
|
||||
ChildSaSession->ChildKeymats.LocalPeerInfo.EspAlgoInfo.AuthKey,
|
||||
OutputKey + 2 * EncryptAlgKeyLen + IntegrityAlgKeyLen,
|
||||
@@ -2233,7 +2233,7 @@ Exit:
|
||||
if (OutputKey != NULL) {
|
||||
FreePool (OutputKey);
|
||||
}
|
||||
|
||||
|
||||
return EFI_SUCCESS;
|
||||
}
|
||||
|
||||
|
File diff suppressed because it is too large
Load Diff
@@ -1,8 +1,8 @@
|
||||
/** @file
|
||||
The interfaces of IKE/Child session operations and payload related operations
|
||||
The interfaces of IKE/Child session operations and payload related operations
|
||||
used by IKE Exchange Process.
|
||||
|
||||
Copyright (c) 2010 - 2016, Intel Corporation. All rights reserved.<BR>
|
||||
Copyright (c) 2010 - 2018, Intel Corporation. All rights reserved.<BR>
|
||||
|
||||
This program and the accompanying materials
|
||||
are licensed and made available under the terms and conditions of the BSD License
|
||||
@@ -76,8 +76,8 @@ Ikev2SaSessionLookup (
|
||||
Private->Ikev2SaSession list or Private->Ikev2EstablishedList list.
|
||||
|
||||
@param[in] SaSessionList Pointer to list to be inserted into.
|
||||
@param[in] IkeSaSession Pointer to IKEV2_SA_SESSION to be inserted.
|
||||
@param[in] RemotePeerIp Pointer to EFI_IP_ADDRESSS to indicate the
|
||||
@param[in] IkeSaSession Pointer to IKEV2_SA_SESSION to be inserted.
|
||||
@param[in] RemotePeerIp Pointer to EFI_IP_ADDRESSS to indicate the
|
||||
unique IKEV2_SA_SESSION.
|
||||
|
||||
**/
|
||||
@@ -94,7 +94,7 @@ Ikev2SaSessionInsert (
|
||||
@param[in] SaSessionList Pointer to list to be searched.
|
||||
@param[in] RemotePeerIp Pointer to EFI_IP_ADDRESS to use for SA Session search.
|
||||
|
||||
@retval Pointer to IKEV2_SA_SESSION with the specified remote IP address.
|
||||
@retval Pointer to IKEV2_SA_SESSION with the specified remote IP address.
|
||||
|
||||
**/
|
||||
IKEV2_SA_SESSION *
|
||||
@@ -129,7 +129,7 @@ Ikev2SessionCommonRefresh (
|
||||
);
|
||||
|
||||
/**
|
||||
Free specified IKEV2 SA Session.
|
||||
Free specified IKEV2 SA Session.
|
||||
|
||||
@param[in] IkeSaSession Pointer to IKEV2_SA_SESSION to be freed.
|
||||
|
||||
@@ -140,7 +140,7 @@ Ikev2SaSessionFree (
|
||||
);
|
||||
|
||||
/**
|
||||
Free specified Seession Common. The session common would belong to a IKE SA or
|
||||
Free specified Seession Common. The session common would belong to a IKE SA or
|
||||
a Child SA.
|
||||
|
||||
@param[in] SessionCommon Pointer to a Session Common.
|
||||
@@ -164,9 +164,9 @@ Ikev2SaSessionIncreaseMessageId (
|
||||
|
||||
/**
|
||||
Allocate Momery for IKEV2 Child SA Session.
|
||||
|
||||
|
||||
@param[in] UdpService Pointer to IKE_UDP_SERVICE.
|
||||
@param[in] IkeSaSession Pointer to IKEV2_SA_SESSION related to this Child SA
|
||||
@param[in] IkeSaSession Pointer to IKEV2_SA_SESSION related to this Child SA
|
||||
Session.
|
||||
|
||||
@retval Pointer of a new created IKEV2 Child SA Session.
|
||||
@@ -179,8 +179,8 @@ Ikev2ChildSaSessionAlloc (
|
||||
);
|
||||
|
||||
/**
|
||||
Register a established IKEv2 Child SA into IkeSaSession->ChildSaEstablishSessionList.
|
||||
If the there is IKEV2_CHILD_SA_SESSION with same remote peer IP, remove the old one
|
||||
Register a established IKEv2 Child SA into IkeSaSession->ChildSaEstablishSessionList.
|
||||
If the there is IKEV2_CHILD_SA_SESSION with same remote peer IP, remove the old one
|
||||
then register the new one.
|
||||
|
||||
@param[in] ChildSaSession Pointer to IKEV2_CHILD_SA_SESSION to be registered.
|
||||
@@ -198,7 +198,7 @@ Ikev2ChildSaSessionReg (
|
||||
|
||||
This functin find a ChildSA session by searching the ChildSaSessionlist of
|
||||
the input IKEV2_SA_SESSION by specified MessageID.
|
||||
|
||||
|
||||
@param[in] SaSessionList Pointer to List to be searched.
|
||||
@param[in] Spi Specified SPI.
|
||||
|
||||
@@ -241,20 +241,20 @@ Ikev2ChildSaSessionInsert (
|
||||
|
||||
/**
|
||||
Remove the IKEV2_CHILD_SA_SESSION from IkeSaSessionList.
|
||||
|
||||
|
||||
@param[in] SaSessionList The SA Session List to be iterated.
|
||||
@param[in] Spi Spi used to identify the IKEV2_CHILD_SA_SESSION.
|
||||
@param[in] ListType The type of the List to indicate whether it is a
|
||||
Established.
|
||||
@param[in] ListType The type of the List to indicate whether it is a
|
||||
Established.
|
||||
|
||||
@return The point to IKEV2_CHILD_SA_SESSION.
|
||||
|
||||
|
||||
**/
|
||||
IKEV2_CHILD_SA_SESSION *
|
||||
Ikev2ChildSaSessionRemove (
|
||||
IN LIST_ENTRY *SaSessionList,
|
||||
IN UINT32 Spi,
|
||||
IN UINT8 ListType
|
||||
IN UINT32 Spi,
|
||||
IN UINT8 ListType
|
||||
);
|
||||
|
||||
/**
|
||||
@@ -271,7 +271,7 @@ Ikev2ChildSaSessionOnDeleting (
|
||||
);
|
||||
|
||||
/**
|
||||
Free the memory located for the specified IKEV2_CHILD_SA_SESSION.
|
||||
Free the memory located for the specified IKEV2_CHILD_SA_SESSION.
|
||||
|
||||
@param[in] ChildSaSession Pointer to IKEV2_CHILD_SA_SESSION.
|
||||
|
||||
@@ -285,7 +285,7 @@ Ikev2ChildSaSessionFree (
|
||||
Free the specified DhBuffer.
|
||||
|
||||
@param[in] DhBuffer Pointer to IKEV2_DH_BUFFER to be freed.
|
||||
|
||||
|
||||
**/
|
||||
VOID
|
||||
Ikev2DhBufferFree (
|
||||
@@ -315,7 +315,7 @@ Ikev2ChildSaSilentDelete (
|
||||
|
||||
/**
|
||||
This function is to parse a request IKE packet and return its request type.
|
||||
The request type is one of IKE CHILD SA creation, IKE SA rekeying and
|
||||
The request type is one of IKE CHILD SA creation, IKE SA rekeying and
|
||||
IKE CHILD SA rekeying.
|
||||
|
||||
@param[in] IkePacket IKE packet to be prased.
|
||||
@@ -330,7 +330,7 @@ Ikev2ChildExchangeRequestType(
|
||||
|
||||
/**
|
||||
This function finds the SPI from Create Child Sa Exchange Packet.
|
||||
|
||||
|
||||
@param[in] IkePacket Pointer to IKE_PACKET to be searched.
|
||||
|
||||
@retval SPI number.
|
||||
@@ -345,10 +345,10 @@ Ikev2ChildExchangeRekeySpi(
|
||||
/**
|
||||
Associate a SPD selector to the Child SA Session.
|
||||
|
||||
This function is called when the Child SA is not the first child SA of its
|
||||
This function is called when the Child SA is not the first child SA of its
|
||||
IKE SA. It associate a SPD to this Child SA.
|
||||
|
||||
@param[in, out] ChildSaSession Pointer to the Child SA Session to be associated to
|
||||
@param[in, out] ChildSaSession Pointer to the Child SA Session to be associated to
|
||||
a SPD selector.
|
||||
|
||||
@retval EFI_SUCCESS Associate one SPD selector to this Child SA Session successfully.
|
||||
@@ -441,13 +441,13 @@ Ikev2ChildSaAfterEncodePayload (
|
||||
Generate Ikev2 SA payload according to SessionSaData
|
||||
|
||||
@param[in] SessionSaData The data used in SA payload.
|
||||
@param[in] NextPayload The payload type presented in NextPayload field of
|
||||
@param[in] NextPayload The payload type presented in NextPayload field of
|
||||
SA Payload header.
|
||||
@param[in] Type The SA type. It MUST be neither (1) for IKE_SA or
|
||||
(2) for CHILD_SA or (3) for INFO.
|
||||
|
||||
@retval a Pointer to SA IKE payload.
|
||||
|
||||
|
||||
**/
|
||||
IKE_PAYLOAD *
|
||||
Ikev2GenerateSaPayload (
|
||||
@@ -460,7 +460,7 @@ Ikev2GenerateSaPayload (
|
||||
Generate a ID payload.
|
||||
|
||||
@param[in] CommonSession Pointer to IKEV2_SESSION_COMMON related to ID payload.
|
||||
@param[in] NextPayload The payload type presented in the NextPayload field
|
||||
@param[in] NextPayload The payload type presented in the NextPayload field
|
||||
of ID Payload header.
|
||||
|
||||
@retval Pointer to ID IKE payload.
|
||||
@@ -476,7 +476,7 @@ Ikev2GenerateIdPayload (
|
||||
Generate a ID payload.
|
||||
|
||||
@param[in] CommonSession Pointer to IKEV2_SESSION_COMMON related to ID payload.
|
||||
@param[in] NextPayload The payload type presented in the NextPayload field
|
||||
@param[in] NextPayload The payload type presented in the NextPayload field
|
||||
of ID Payload header.
|
||||
@param[in] InCert Pointer to the Certificate which distinguished name
|
||||
will be added into the Id payload.
|
||||
@@ -488,7 +488,7 @@ Ikev2GenerateIdPayload (
|
||||
IKE_PAYLOAD *
|
||||
Ikev2GenerateCertIdPayload (
|
||||
IN IKEV2_SESSION_COMMON *CommonSession,
|
||||
IN UINT8 NextPayload,
|
||||
IN UINT8 NextPayload,
|
||||
IN UINT8 *InCert,
|
||||
IN UINTN CertSize
|
||||
);
|
||||
@@ -496,10 +496,10 @@ Ikev2GenerateCertIdPayload (
|
||||
/**
|
||||
Generate a Nonce payload contenting the input parameter NonceBuf.
|
||||
|
||||
@param[in] NonceBuf The nonce buffer content the whole Nonce payload block
|
||||
@param[in] NonceBuf The nonce buffer content the whole Nonce payload block
|
||||
except the payload header.
|
||||
@param[in] NonceSize The buffer size of the NonceBuf
|
||||
@param[in] NextPayload The payload type presented in the NextPayload field
|
||||
@param[in] NextPayload The payload type presented in the NextPayload field
|
||||
of Nonce Payload header.
|
||||
|
||||
@retval Pointer to Nonce IKE paload.
|
||||
@@ -516,23 +516,23 @@ Ikev2GenerateNoncePayload (
|
||||
Generate the Notify payload.
|
||||
|
||||
Since the structure of Notify payload which defined in RFC 4306 is simple, so
|
||||
there is no internal data structure for Notify payload. This function generate
|
||||
Notify payload defined in RFC 4306, but all the fields in this payload are still
|
||||
in host order and need call Ikev2EncodePayload() to convert those fields from
|
||||
there is no internal data structure for Notify payload. This function generate
|
||||
Notify payload defined in RFC 4306, but all the fields in this payload are still
|
||||
in host order and need call Ikev2EncodePayload() to convert those fields from
|
||||
the host order to network order beforing sending it.
|
||||
|
||||
@param[in] ProtocolId The protocol type ID. For IKE_SA it MUST be one (1).
|
||||
For IPsec SAs it MUST be neither (2) for AH or (3)
|
||||
for ESP.
|
||||
@param[in] NextPayload The next paylaod type in NextPayload field of
|
||||
@param[in] NextPayload The next paylaod type in NextPayload field of
|
||||
the Notify payload.
|
||||
@param[in] SpiSize Size of the SPI in SPI size field of the Notify Payload.
|
||||
@param[in] MessageType The message type in NotifyMessageType field of the
|
||||
@param[in] MessageType The message type in NotifyMessageType field of the
|
||||
Notify Payload.
|
||||
@param[in] SpiBuf Pointer to buffer contains the SPI value.
|
||||
@param[in] NotifyData Pointer to buffer contains the notification data.
|
||||
@param[in] NotifyDataSize The size of NotifyData in bytes.
|
||||
|
||||
|
||||
|
||||
@retval Pointer to IKE Notify Payload.
|
||||
|
||||
@@ -551,14 +551,14 @@ Ikev2GenerateNotifyPayload (
|
||||
/**
|
||||
Generate the Delete payload.
|
||||
|
||||
Since the structure of Delete payload which defined in RFC 4306 is simple,
|
||||
there is no internal data structure for Delete payload. This function generate
|
||||
Delete payload defined in RFC 4306, but all the fields in this payload are still
|
||||
in host order and need call Ikev2EncodePayload() to convert those fields from
|
||||
Since the structure of Delete payload which defined in RFC 4306 is simple,
|
||||
there is no internal data structure for Delete payload. This function generate
|
||||
Delete payload defined in RFC 4306, but all the fields in this payload are still
|
||||
in host order and need call Ikev2EncodePayload() to convert those fields from
|
||||
the host order to network order beforing sending it.
|
||||
|
||||
@param[in] IkeSaSession Pointer to IKE SA Session to be used of Delete payload generation.
|
||||
@param[in] NextPayload The next paylaod type in NextPayload field of
|
||||
@param[in] NextPayload The next paylaod type in NextPayload field of
|
||||
the Delete payload.
|
||||
@param[in] SpiSize Size of the SPI in SPI size field of the Delete Payload.
|
||||
@param[in] SpiNum Number of SPI in NumofSPIs field of the Delete Payload.
|
||||
@@ -573,19 +573,19 @@ Ikev2GenerateDeletePayload (
|
||||
IN UINT8 NextPayload,
|
||||
IN UINT8 SpiSize,
|
||||
IN UINT16 SpiNum,
|
||||
IN UINT8 *SpiBuf
|
||||
IN UINT8 *SpiBuf
|
||||
);
|
||||
|
||||
/**
|
||||
Generate the Configuration payload.
|
||||
|
||||
This function generates a configuration payload defined in RFC 4306, but all the
|
||||
fields in this payload are still in host order and need call Ikev2EncodePayload()
|
||||
This function generates a configuration payload defined in RFC 4306, but all the
|
||||
fields in this payload are still in host order and need call Ikev2EncodePayload()
|
||||
to convert those fields from the host order to network order beforing sending it.
|
||||
|
||||
@param[in] IkeSaSession Pointer to IKE SA Session to be used for Delete payload
|
||||
generation.
|
||||
@param[in] NextPayload The next paylaod type in NextPayload field of
|
||||
@param[in] NextPayload The next paylaod type in NextPayload field of
|
||||
the Delete payload.
|
||||
@param[in] CfgType The attribute type in the Configuration attribute.
|
||||
|
||||
@@ -602,15 +602,15 @@ Ikev2GenerateCpPayload (
|
||||
/**
|
||||
Generate a Authentication Payload.
|
||||
|
||||
This function is used for both Authentication generation and verification. When the
|
||||
IsVerify is TRUE, it create a Auth Data for verification. This function choose the
|
||||
This function is used for both Authentication generation and verification. When the
|
||||
IsVerify is TRUE, it create a Auth Data for verification. This function choose the
|
||||
related IKE_SA_INIT Message for Auth data creation according to the IKE Session's type
|
||||
and the value of IsVerify parameter.
|
||||
|
||||
@param[in] IkeSaSession Pointer to IKEV2_SA_SESSION related to.
|
||||
@param[in] IdPayload Pointer to the ID payload to be used for Authentication
|
||||
@param[in] IdPayload Pointer to the ID payload to be used for Authentication
|
||||
payload generation.
|
||||
@param[in] NextPayload The type filled into the Authentication Payload next
|
||||
@param[in] NextPayload The type filled into the Authentication Payload next
|
||||
payload field.
|
||||
@param[in] IsVerify If it is TURE, the Authentication payload is used for
|
||||
verification.
|
||||
@@ -627,26 +627,26 @@ Ikev2PskGenerateAuthPayload (
|
||||
);
|
||||
|
||||
/**
|
||||
Generate a Authentication Payload for Certificate Auth method.
|
||||
Generate a Authentication Payload for Certificate Auth method.
|
||||
|
||||
This function has two functions. One is creating a local Authentication
|
||||
Payload for sending and other is creating the remote Authentication data
|
||||
This function has two functions. One is creating a local Authentication
|
||||
Payload for sending and other is creating the remote Authentication data
|
||||
for verification when the IsVerify is TURE.
|
||||
|
||||
@param[in] IkeSaSession Pointer to IKEV2_SA_SESSION related to.
|
||||
@param[in] IdPayload Pointer to the ID payload to be used for Authentication
|
||||
@param[in] IdPayload Pointer to the ID payload to be used for Authentication
|
||||
payload generation.
|
||||
@param[in] NextPayload The type filled into the Authentication Payload
|
||||
@param[in] NextPayload The type filled into the Authentication Payload
|
||||
next payload field.
|
||||
@param[in] IsVerify If it is TURE, the Authentication payload is used
|
||||
@param[in] IsVerify If it is TURE, the Authentication payload is used
|
||||
for verification.
|
||||
@param[in] UefiPrivateKey Pointer to the UEFI private key. Ignore it when
|
||||
@param[in] UefiPrivateKey Pointer to the UEFI private key. Ignore it when
|
||||
verify the authenticate payload.
|
||||
@param[in] UefiPrivateKeyLen The size of UefiPrivateKey in bytes. Ignore it
|
||||
@param[in] UefiPrivateKeyLen The size of UefiPrivateKey in bytes. Ignore it
|
||||
when verify the authenticate payload.
|
||||
@param[in] UefiKeyPwd Pointer to the password of UEFI private key.
|
||||
@param[in] UefiKeyPwd Pointer to the password of UEFI private key.
|
||||
Ignore it when verify the authenticate payload.
|
||||
@param[in] UefiKeyPwdLen The size of UefiKeyPwd in bytes.Ignore it when
|
||||
@param[in] UefiKeyPwdLen The size of UefiKeyPwd in bytes.Ignore it when
|
||||
verify the authenticate payload.
|
||||
|
||||
@return pointer to IKE Authentication payload for certification method.
|
||||
@@ -670,9 +670,9 @@ Ikev2CertGenerateAuthPayload (
|
||||
This function generates TSi or TSr payload according to type of next payload.
|
||||
If the next payload is Responder TS, gereate TSi Payload. Otherwise, generate
|
||||
TSr payload
|
||||
|
||||
|
||||
@param[in] ChildSa Pointer to IKEV2_CHILD_SA_SESSION related to this TS payload.
|
||||
@param[in] NextPayload The payload type presented in the NextPayload field
|
||||
@param[in] NextPayload The payload type presented in the NextPayload field
|
||||
of ID Payload header.
|
||||
@param[in] IsTunnel It indicates that if the Ts Payload is after the CP payload.
|
||||
If yes, it means the Tsi and Tsr payload should be with
|
||||
@@ -696,7 +696,7 @@ Ikev2GenerateTsPayload (
|
||||
IPSEC_PROTO_ISAKMP or if the SpiSize is not zero or if the MessageType is not
|
||||
the COOKIE, return EFI_INVALID_PARAMETER.
|
||||
|
||||
@param[in] IkeNCookie Pointer to the IKE_PAYLOAD which contians the
|
||||
@param[in] IkeNCookie Pointer to the IKE_PAYLOAD which contians the
|
||||
Notify Cookie payload.
|
||||
the Notify payload.
|
||||
@param[in, out] IkeSaSession Pointer to the relevant IKE SA Session.
|
||||
@@ -715,16 +715,16 @@ Ikev2ParserNotifyCookiePayload (
|
||||
/**
|
||||
Generate the Certificate payload or Certificate Request Payload.
|
||||
|
||||
Since the Certificate Payload structure is same with Certificate Request Payload,
|
||||
Since the Certificate Payload structure is same with Certificate Request Payload,
|
||||
the only difference is that one contains the Certificate Data, other contains
|
||||
the acceptable certificateion CA. This function generate Certificate payload
|
||||
or Certificate Request Payload defined in RFC 4306, but all the fields
|
||||
in the payload are still in host order and need call Ikev2EncodePayload()
|
||||
the acceptable certificateion CA. This function generate Certificate payload
|
||||
or Certificate Request Payload defined in RFC 4306, but all the fields
|
||||
in the payload are still in host order and need call Ikev2EncodePayload()
|
||||
to convert those fields from the host order to network order beforing sending it.
|
||||
|
||||
@param[in] IkeSaSession Pointer to IKE SA Session to be used of Delete payload
|
||||
@param[in] IkeSaSession Pointer to IKE SA Session to be used of Delete payload
|
||||
generation.
|
||||
@param[in] NextPayload The next paylaod type in NextPayload field of
|
||||
@param[in] NextPayload The next paylaod type in NextPayload field of
|
||||
the Delete payload.
|
||||
@param[in] Certificate Pointer of buffer contains the certification data.
|
||||
@param[in] CertificateLen The length of Certificate in byte.
|
||||
@@ -747,15 +747,15 @@ Ikev2GenerateCertificatePayload (
|
||||
IN UINT8 EncodeType,
|
||||
IN BOOLEAN IsRequest
|
||||
);
|
||||
|
||||
|
||||
/**
|
||||
General interface of payload encoding.
|
||||
|
||||
This function encode the internal data structure into payload which
|
||||
is defined in RFC 4306. The IkePayload->PayloadBuf used to store both the input
|
||||
payload and converted payload. Only the SA payload use the interal structure
|
||||
to store the attribute. Other payload use structure which is same with the RFC
|
||||
defined, for this kind payloads just do host order to network order change of
|
||||
This function encode the internal data structure into payload which
|
||||
is defined in RFC 4306. The IkePayload->PayloadBuf used to store both the input
|
||||
payload and converted payload. Only the SA payload use the interal structure
|
||||
to store the attribute. Other payload use structure which is same with the RFC
|
||||
defined, for this kind payloads just do host order to network order change of
|
||||
some fields.
|
||||
|
||||
@param[in] SessionCommon Pointer to IKE Session Common used to encode the payload.
|
||||
@@ -779,7 +779,7 @@ Ikev2EncodePayload (
|
||||
|
||||
@param[in] SessionCommon Pointer to IKE Session Common to use for decoding.
|
||||
@param[in, out] IkePayload Pointer to IKE payload to be decode as input, and
|
||||
store the decoded result as output.
|
||||
store the decoded result as output.
|
||||
|
||||
@retval EFI_INVALID_PARAMETER Meet error when decode the SA payload.
|
||||
@retval EFI_SUCCESS Decode successfully.
|
||||
@@ -796,18 +796,18 @@ Ikev2DecodePayload (
|
||||
|
||||
This function decrpt the Encrypted IKE packet and put the result into IkePacket->PayloadBuf.
|
||||
|
||||
@param[in] SessionCommon Pointer to IKEV2_SESSION_COMMON containing
|
||||
@param[in] SessionCommon Pointer to IKEV2_SESSION_COMMON containing
|
||||
some parameter used during decrypting.
|
||||
@param[in, out] IkePacket Point to IKE_PACKET to be decrypted as input,
|
||||
@param[in, out] IkePacket Point to IKE_PACKET to be decrypted as input,
|
||||
and the decrypted reslult as output.
|
||||
@param[in, out] IkeType The type of IKE. IKE_SA_TYPE, IKE_INFO_TYPE and
|
||||
IKE_CHILD_TYPE are supportted.
|
||||
|
||||
@retval EFI_INVALID_PARAMETER If the IKE packet length is zero or the
|
||||
@retval EFI_INVALID_PARAMETER If the IKE packet length is zero or the
|
||||
IKE packet length is not Algorithm Block Size
|
||||
alignment.
|
||||
@retval EFI_SUCCESS Decrypt IKE packet successfully.
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
Ikev2DecryptPacket (
|
||||
@@ -821,7 +821,7 @@ Ikev2DecryptPacket (
|
||||
|
||||
This function encrypt IKE packet before sending it. The Encrypted IKE packet
|
||||
is put in to IKEV2 Encrypted Payload.
|
||||
|
||||
|
||||
@param[in] SessionCommon Pointer to IKEV2_SESSION_COMMON related to the IKE packet.
|
||||
@param[in, out] IkePacket Pointer to IKE packet to be encrypted.
|
||||
|
||||
@@ -840,9 +840,9 @@ Ikev2EncryptPacket (
|
||||
|
||||
This function put all Payloads into one payload then encrypt it if needed.
|
||||
|
||||
@param[in] SessionCommon Pointer to IKEV2_SESSION_COMMON containing
|
||||
@param[in] SessionCommon Pointer to IKEV2_SESSION_COMMON containing
|
||||
some parameter used during IKE packet encoding.
|
||||
@param[in, out] IkePacket Pointer to IKE_PACKET to be encoded as input,
|
||||
@param[in, out] IkePacket Pointer to IKE_PACKET to be encoded as input,
|
||||
and the encoded reslult as output.
|
||||
@param[in] IkeType The type of IKE. IKE_SA_TYPE, IKE_INFO_TYPE and
|
||||
IKE_CHILD_TYPE are supportted.
|
||||
@@ -861,12 +861,12 @@ Ikev2EncodePacket (
|
||||
/**
|
||||
Decode the IKE packet.
|
||||
|
||||
This function first decrypts the IKE packet if needed , then separats the whole
|
||||
This function first decrypts the IKE packet if needed , then separats the whole
|
||||
IKE packet from the IkePacket->PayloadBuf into IkePacket payload list.
|
||||
|
||||
@param[in] SessionCommon Pointer to IKEV1_SESSION_COMMON containing
|
||||
|
||||
@param[in] SessionCommon Pointer to IKEV1_SESSION_COMMON containing
|
||||
some parameter used by IKE packet decoding.
|
||||
@param[in, out] IkePacket The IKE Packet to be decoded on input, and
|
||||
@param[in, out] IkePacket The IKE Packet to be decoded on input, and
|
||||
the decoded result on return.
|
||||
@param[in] IkeType The type of IKE. IKE_SA_TYPE, IKE_INFO_TYPE and
|
||||
IKE_CHILD_TYPE are supportted.
|
||||
@@ -904,8 +904,8 @@ Ikev2OnPacketAccepted (
|
||||
@param[in] IkeUdpService Pointer to IKE_UDP_SERVICE used to send the IKE packet.
|
||||
@param[in] SessionCommon Pointer to IKEV1_SESSION_COMMON related to the IKE packet.
|
||||
@param[in] IkePacket Pointer to IKE_PACKET to be sent out.
|
||||
@param[in] IkeType The type of IKE to point what's kind of the IKE
|
||||
packet is to be sent out. IKE_SA_TYPE, IKE_INFO_TYPE
|
||||
@param[in] IkeType The type of IKE to point what's kind of the IKE
|
||||
packet is to be sent out. IKE_SA_TYPE, IKE_INFO_TYPE
|
||||
and IKE_CHILD_TYPE are supportted.
|
||||
|
||||
@retval EFI_SUCCESS The operation complete successfully.
|
||||
@@ -923,12 +923,12 @@ Ikev2SendIkePacket (
|
||||
/**
|
||||
Callback function for the IKE life time is over.
|
||||
|
||||
This function will mark the related IKE SA Session as deleting and trigger a
|
||||
This function will mark the related IKE SA Session as deleting and trigger a
|
||||
Information negotiation.
|
||||
|
||||
@param[in] Event The time out event.
|
||||
@param[in] Context Pointer to data passed by caller.
|
||||
|
||||
|
||||
**/
|
||||
VOID
|
||||
EFIAPI
|
||||
@@ -952,11 +952,11 @@ Ikev2ResendNotify (
|
||||
);
|
||||
|
||||
/**
|
||||
Generate a Key Exchange payload according to the DH group type and save the
|
||||
Generate a Key Exchange payload according to the DH group type and save the
|
||||
public Key into IkeSaSession IkeKey field.
|
||||
|
||||
@param[in, out] IkeSaSession Pointer of the IKE_SA_SESSION.
|
||||
@param[in] NextPayload The payload type presented in the NextPayload field of Key
|
||||
@param[in] NextPayload The payload type presented in the NextPayload field of Key
|
||||
Exchange Payload header.
|
||||
|
||||
@retval Pointer to Key IKE payload.
|
||||
@@ -964,28 +964,28 @@ Ikev2ResendNotify (
|
||||
**/
|
||||
IKE_PAYLOAD *
|
||||
Ikev2GenerateKePayload (
|
||||
IN OUT IKEV2_SA_SESSION *IkeSaSession,
|
||||
IN UINT8 NextPayload
|
||||
IN OUT IKEV2_SA_SESSION *IkeSaSession,
|
||||
IN UINT8 NextPayload
|
||||
);
|
||||
|
||||
/**
|
||||
Check if the SPD is related to the input Child SA Session.
|
||||
|
||||
This function is the subfunction of Ikev1AssociateSpdEntry(). It is the call
|
||||
back function of IpSecVisitConfigData().
|
||||
|
||||
back function of IpSecVisitConfigData().
|
||||
|
||||
|
||||
@param[in] Type Type of the input Config Selector.
|
||||
@param[in] Selector Pointer to the Configure Selector to be checked.
|
||||
@param[in] Data Pointer to the Configure Selector's Data passed
|
||||
@param[in] Selector Pointer to the Configure Selector to be checked.
|
||||
@param[in] Data Pointer to the Configure Selector's Data passed
|
||||
from the caller.
|
||||
@param[in] SelectorSize The buffer size of Selector.
|
||||
@param[in] DataSize The buffer size of the Data.
|
||||
@param[in] Context The data passed from the caller. It is a Child
|
||||
SA Session in this context.
|
||||
|
||||
@retval EFI_SUCCESS The SPD Selector is not related to the Child SA Session.
|
||||
@retval EFI_ABORTED The SPD Selector is related to the Child SA session and
|
||||
@retval EFI_SUCCESS The SPD Selector is not related to the Child SA Session.
|
||||
@retval EFI_ABORTED The SPD Selector is related to the Child SA session and
|
||||
set the ChildSaSession->Spd to point to this SPD Selector.
|
||||
|
||||
**/
|
||||
@@ -1033,14 +1033,14 @@ Ikev2ChildSaSessionCreate (
|
||||
|
||||
/**
|
||||
Parse the received Initial Exchange Packet.
|
||||
|
||||
This function parse the SA Payload and Key Payload to find out the cryptographic
|
||||
suite for the further IKE negotiation and fill it into the IKE SA Session's
|
||||
|
||||
This function parse the SA Payload and Key Payload to find out the cryptographic
|
||||
suite for the further IKE negotiation and fill it into the IKE SA Session's
|
||||
CommonSession->SaParams.
|
||||
|
||||
@param[in, out] IkeSaSession Pointer to related IKEV2_SA_SESSION.
|
||||
@param[in] SaPayload The received packet.
|
||||
@param[in] Type The received packet IKE header flag.
|
||||
@param[in] Type The received packet IKE header flag.
|
||||
|
||||
@retval TRUE If the SA proposal in Packet is acceptable.
|
||||
@retval FALSE If the SA proposal in Packet is not acceptable.
|
||||
@@ -1055,15 +1055,15 @@ Ikev2SaParseSaPayload (
|
||||
|
||||
/**
|
||||
Parse the received Authentication Exchange Packet.
|
||||
|
||||
|
||||
This function parse the SA Payload and Key Payload to find out the cryptographic
|
||||
suite for the ESP and fill it into the Child SA Session's CommonSession->SaParams.
|
||||
|
||||
@param[in, out] ChildSaSession Pointer to IKEV2_CHILD_SA_SESSION related to
|
||||
|
||||
@param[in, out] ChildSaSession Pointer to IKEV2_CHILD_SA_SESSION related to
|
||||
this Authentication Exchange.
|
||||
@param[in] SaPayload The received packet.
|
||||
@param[in] Type The IKE header's flag of received packet .
|
||||
|
||||
@param[in] Type The IKE header's flag of received packet .
|
||||
|
||||
@retval TRUE If the SA proposal in Packet is acceptable.
|
||||
@retval FALSE If the SA proposal in Packet is not acceptable.
|
||||
|
||||
@@ -1078,17 +1078,17 @@ Ikev2ChildSaParseSaPayload (
|
||||
/**
|
||||
Generate Key buffer from fragments.
|
||||
|
||||
If the digest length of specified HashAlgId is larger than or equal with the
|
||||
required output key length, derive the key directly. Otherwise, Key Material
|
||||
needs to be PRF-based concatenation according to 2.13 of RFC 4306:
|
||||
If the digest length of specified HashAlgId is larger than or equal with the
|
||||
required output key length, derive the key directly. Otherwise, Key Material
|
||||
needs to be PRF-based concatenation according to 2.13 of RFC 4306:
|
||||
prf+ (K,S) = T1 | T2 | T3 | T4 | ..., T1 = prf (K, S | 0x01),
|
||||
T2 = prf (K, T1 | S | 0x02), T3 = prf (K, T2 | S | 0x03),T4 = prf (K, T3 | S | 0x04)
|
||||
then derive the key from this key material.
|
||||
|
||||
|
||||
@param[in] HashAlgId The Hash Algorithm ID used to generate key.
|
||||
@param[in] HashKey Pointer to a key buffer which contains hash key.
|
||||
@param[in] HashKeyLength The length of HashKey in bytes.
|
||||
@param[in, out] OutputKey Pointer to buffer which is used to receive the
|
||||
@param[in, out] OutputKey Pointer to buffer which is used to receive the
|
||||
output key.
|
||||
@param[in] OutputKeyLength The length of OutPutKey buffer.
|
||||
@param[in] Fragments Pointer to the data to be used to generate key.
|
||||
@@ -1115,14 +1115,14 @@ Ikev2SaGenerateKey (
|
||||
Copy ChildSaSession->Spd->Selector to ChildSaSession->SpdSelector.
|
||||
|
||||
ChildSaSession->SpdSelector stores the real Spdselector for its SA. Sometime,
|
||||
the SpdSelector in ChildSaSession is more accurated or the scope is smaller
|
||||
the SpdSelector in ChildSaSession is more accurated or the scope is smaller
|
||||
than the one in ChildSaSession->Spd, especially for the tunnel mode.
|
||||
|
||||
|
||||
@param[in, out] ChildSaSession Pointer to IKEV2_CHILD_SA_SESSION related to.
|
||||
|
||||
@retval EFI_SUCCESS The operation complete successfully.
|
||||
@retval EFI_OUT_OF_RESOURCES If the required resource can't be allocated.
|
||||
|
||||
|
||||
**/
|
||||
EFI_STATUS
|
||||
Ikev2ChildSaSessionSpdSelectorCreate (
|
||||
|
Reference in New Issue
Block a user