| /** @file | |
| The general interfaces of the IKEv2. | |
| Copyright (c) 2010 - 2015, Intel Corporation. All rights reserved.<BR> | |
| This program and the accompanying materials | |
| are licensed and made available under the terms and conditions of the BSD License | |
| which accompanies this distribution. The full text of the license may be found at | |
| http://opensource.org/licenses/bsd-license.php. | |
| THE PROGRAM IS DISTRIBUTED UNDER THE BSD LICENSE ON AN "AS IS" BASIS, | |
| WITHOUT WARRANTIES OR REPRESENTATIONS OF ANY KIND, EITHER EXPRESS OR IMPLIED. | |
| **/ | |
| #include "Utility.h" | |
| #include "IpSecDebug.h" | |
| #include "IkeService.h" | |
| #include "IpSecConfigImpl.h" | |
| /** | |
| General interface to intialize a IKEv2 negotiation. | |
| @param[in] UdpService Point to Udp Servcie used for the IKE packet sending. | |
| @param[in] SpdEntry Point to SPD entry related to this IKE negotiation. | |
| @param[in] PadEntry Point to PAD entry related to this IKE negotiation. | |
| @param[in] RemoteIp Point to IP Address which the remote peer to negnotiate. | |
| @retval EFI_SUCCESS The operation is successful. | |
| @retval EFI_OUT_OF_RESOURCES The required system resource can't be allocated. | |
| @retval EFI_INVALID_PARAMETER If UdpService or RemoteIp is NULL. | |
| @return Others The operation is failed. | |
| **/ | |
| EFI_STATUS | |
| Ikev2NegotiateSa ( | |
| IN IKE_UDP_SERVICE *UdpService, | |
| IN IPSEC_SPD_ENTRY *SpdEntry, | |
| IN IPSEC_PAD_ENTRY *PadEntry, | |
| IN EFI_IP_ADDRESS *RemoteIp | |
| ) | |
| { | |
| IPSEC_PRIVATE_DATA *Private; | |
| IKEV2_SA_SESSION *IkeSaSession; | |
| IKEV2_SESSION_COMMON *SessionCommon; | |
| IKEV2_PACKET_HANDLER Handler; | |
| IKE_PACKET *IkePacket; | |
| EFI_STATUS Status; | |
| if (UdpService == NULL || RemoteIp == NULL) { | |
| return EFI_INVALID_PARAMETER; | |
| } | |
| IkePacket = NULL; | |
| Private = (UdpService->IpVersion == IP_VERSION_4) ? | |
| IPSEC_PRIVATE_DATA_FROM_UDP4LIST(UdpService->ListHead) : | |
| IPSEC_PRIVATE_DATA_FROM_UDP6LIST(UdpService->ListHead); | |
| // | |
| // Lookup the remote ip address in the processing IKE SA session list. | |
| // | |
| IkeSaSession = Ikev2SaSessionLookup (&Private->Ikev2SessionList, RemoteIp); | |
| if (IkeSaSession != NULL) { | |
| // | |
| // Drop the packet if already in process. | |
| // | |
| return EFI_SUCCESS; | |
| } | |
| // | |
| // Create a new IkeSaSession and initiate the common parameters. | |
| // | |
| IkeSaSession = Ikev2SaSessionAlloc (Private, UdpService); | |
| if (IkeSaSession == NULL) { | |
| return EFI_OUT_OF_RESOURCES; | |
| } | |
| // | |
| // Set the specific parameters and state(IKE_STATE_INIT). | |
| // | |
| IkeSaSession->Spd = SpdEntry; | |
| IkeSaSession->Pad = PadEntry; | |
| SessionCommon = &IkeSaSession->SessionCommon; | |
| SessionCommon->IsInitiator = TRUE; | |
| SessionCommon->State = IkeStateInit; | |
| // | |
| // TODO: Get the prefer DH Group from the IPsec Configuration, after the IPsecconfig application update | |
| // to support it. | |
| // | |
| SessionCommon->PreferDhGroup = IKEV2_TRANSFORM_ID_DH_1024MODP; | |
| CopyMem ( | |
| &SessionCommon->RemotePeerIp, | |
| RemoteIp, | |
| sizeof (EFI_IP_ADDRESS) | |
| ); | |
| CopyMem ( | |
| &SessionCommon->LocalPeerIp, | |
| &UdpService->DefaultAddress, | |
| sizeof (EFI_IP_ADDRESS) | |
| ); | |
| IKEV2_DUMP_STATE (SessionCommon->State, IkeStateInit); | |
| // | |
| // Initiate the SAD data of the IkeSaSession. | |
| // | |
| IkeSaSession->SaData = Ikev2InitializeSaData (SessionCommon); | |
| if (IkeSaSession->SaData == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto ON_ERROR; | |
| } | |
| // | |
| // Generate an IKE request packet and send it out. | |
| // | |
| Handler = mIkev2Initial[IkeSaSession->Pad->Data->AuthMethod][SessionCommon->State]; | |
| IkePacket = Handler.Generator ((UINT8 *) IkeSaSession, NULL); | |
| if (IkePacket == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto ON_ERROR; | |
| } | |
| Status = Ikev2SendIkePacket (UdpService, (UINT8 *) SessionCommon, IkePacket, 0); | |
| if (EFI_ERROR (Status)) { | |
| goto ON_ERROR; | |
| } | |
| // | |
| // Insert the current IkeSaSession into the processing IKE SA list. | |
| // | |
| Ikev2SaSessionInsert (&Private->Ikev2SessionList, IkeSaSession, RemoteIp); | |
| return EFI_SUCCESS; | |
| ON_ERROR: | |
| if (IkePacket != NULL) { | |
| IkePacketFree (IkePacket); | |
| } | |
| Ikev2SaSessionFree (IkeSaSession); | |
| return Status; | |
| } | |
| /** | |
| It is general interface to negotiate the Child SA. | |
| There are three situations which will invoke this function. First, create a CHILD | |
| SA if the input Context is NULL. Second, rekeying the existing IKE SA if the Context | |
| is a IKEv2_SA_SESSION. Third, rekeying the existing CHILD SA if the context is a | |
| IKEv2_CHILD_SA_SESSION. | |
| @param[in] IkeSaSession Pointer to IKEv2_SA_SESSION related to this operation. | |
| @param[in] SpdEntry Pointer to IPSEC_SPD_ENTRY related to this operation. | |
| @param[in] Context The data pass from the caller. | |
| @retval EFI_SUCCESS The operation is successful. | |
| @retval EFI_OUT_OF_RESOURCES The required system resource can't be allocated. | |
| @retval EFI_UNSUPPORTED The condition is not support yet. | |
| @return Others The operation is failed. | |
| **/ | |
| EFI_STATUS | |
| Ikev2NegotiateChildSa ( | |
| IN UINT8 *IkeSaSession, | |
| IN IPSEC_SPD_ENTRY *SpdEntry, | |
| IN UINT8 *Context | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| IKEV2_SA_SESSION *SaSession; | |
| IKEV2_CHILD_SA_SESSION *ChildSaSession; | |
| IKEV2_SESSION_COMMON *ChildSaCommon; | |
| IKE_PACKET *IkePacket; | |
| IKE_UDP_SERVICE *UdpService; | |
| SaSession = (IKEV2_SA_SESSION*) IkeSaSession; | |
| UdpService = SaSession->SessionCommon.UdpService; | |
| IkePacket = NULL; | |
| // | |
| // 1. Create another child SA session if context is null. | |
| // 2. Rekeying the IKE SA session if the context is IKE SA session. | |
| // 3. Rekeying the child SA session if the context is child SA session. | |
| // | |
| if (Context == NULL) { | |
| // | |
| // Create a new ChildSaSession and initiate the common parameters. | |
| // | |
| ChildSaSession = Ikev2ChildSaSessionAlloc (UdpService, SaSession); | |
| if (ChildSaSession == NULL) { | |
| return EFI_OUT_OF_RESOURCES; | |
| } | |
| // | |
| // Set the specific parameters and state as IKE_STATE_CREATE_CHILD. | |
| // | |
| ChildSaSession->Spd = SpdEntry; | |
| ChildSaCommon = &ChildSaSession->SessionCommon; | |
| ChildSaCommon->IsInitiator = TRUE; | |
| ChildSaCommon->State = IkeStateCreateChild; | |
| IKEV2_DUMP_STATE (ChildSaCommon->State, IkeStateCreateChild); | |
| if (SpdEntry->Selector->NextLayerProtocol != EFI_IPSEC_ANY_PROTOCOL) { | |
| ChildSaSession->ProtoId = SpdEntry->Selector->NextLayerProtocol; | |
| } | |
| if (SpdEntry->Selector->LocalPort != EFI_IPSEC_ANY_PORT) { | |
| ChildSaSession->LocalPort = SpdEntry->Selector->LocalPort; | |
| } | |
| if (SpdEntry->Selector->RemotePort != EFI_IPSEC_ANY_PORT) { | |
| ChildSaSession->RemotePort = SpdEntry->Selector->RemotePort; | |
| } | |
| // | |
| // Initiate the SAD data parameters of the ChildSaSession. | |
| // | |
| ChildSaSession->SaData = Ikev2InitializeSaData (ChildSaCommon); | |
| if (ChildSaSession->SaData == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto ON_ERROR; | |
| } | |
| // | |
| // Generate an IKE request packet and send it out. | |
| // | |
| IkePacket = mIkev2CreateChild.Generator ((UINT8 *) ChildSaSession, NULL); | |
| if (IkePacket == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto ON_ERROR; | |
| } | |
| Status = Ikev2SendIkePacket (UdpService, (UINT8 *) ChildSaCommon, IkePacket, 0); | |
| if (EFI_ERROR (Status)) { | |
| goto ON_ERROR; | |
| } | |
| // | |
| // Insert the ChildSaSession into processing child SA list. | |
| // | |
| Ikev2ChildSaSessionInsert (&SaSession->ChildSaSessionList, ChildSaSession); | |
| } else { | |
| // | |
| // TODO: Rekeying IkeSaSession or ChildSaSession, NOT support yet. | |
| // | |
| // Rekey IkeSa, set IkeSaSession->State and pass over IkeSaSession | |
| // Rekey ChildSa, set ChildSaSession->State and pass over ChildSaSession | |
| // | |
| return EFI_UNSUPPORTED; | |
| } | |
| return EFI_SUCCESS; | |
| ON_ERROR: | |
| if (ChildSaSession->SaData != NULL) { | |
| FreePool (ChildSaSession->SaData); | |
| } | |
| if (ChildSaSession->SessionCommon.TimeoutEvent != NULL) { | |
| gBS->CloseEvent (ChildSaSession->SessionCommon.TimeoutEvent); | |
| } | |
| if (IkePacket != NULL) { | |
| IkePacketFree (IkePacket); | |
| } | |
| Ikev2ChildSaSessionFree (ChildSaSession); | |
| return Status; | |
| } | |
| /** | |
| It is general interface to start the Information Exchange. | |
| There are three situations which will invoke this function. First, deliver a Delete Information | |
| to delete the IKE SA if the input Context is NULL and the state of related IkeSaSeesion's is on | |
| deleting.Second, deliver a Notify Information without the contents if the input Context is NULL. | |
| Third, deliver a Notify Information if the input Context is not NULL. | |
| @param[in] IkeSaSession Pointer to IKEv2_SA_SESSION related to this operation. | |
| @param[in] Context Data passed by caller. | |
| @retval EFI_SUCCESS The operation is successful. | |
| @retval EFI_OUT_OF_RESOURCES The required system resource can't be allocated. | |
| @retval EFI_UNSUPPORTED The condition is not support yet. | |
| @return Otherwise The operation is failed. | |
| **/ | |
| EFI_STATUS | |
| Ikev2NegotiateInfo ( | |
| IN UINT8 *IkeSaSession, | |
| IN UINT8 *Context | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| IKEV2_SA_SESSION *Ikev2SaSession; | |
| IKEV2_CHILD_SA_SESSION *ChildSaSession; | |
| IKEV2_SESSION_COMMON *SaCommon; | |
| IKE_PACKET *IkePacket; | |
| IKE_UDP_SERVICE *UdpService; | |
| LIST_ENTRY *Entry; | |
| LIST_ENTRY *NextEntry; | |
| Ikev2SaSession = (IKEV2_SA_SESSION *) IkeSaSession; | |
| UdpService = Ikev2SaSession->SessionCommon.UdpService; | |
| SaCommon = &Ikev2SaSession->SessionCommon; | |
| IkePacket = NULL; | |
| Status = EFI_SUCCESS; | |
| // | |
| // Delete the IKE SA. | |
| // | |
| if (Ikev2SaSession->SessionCommon.State == IkeStateSaDeleting && Context == NULL) { | |
| // | |
| // Generate Information Packet which contains the Delete Payload. | |
| // | |
| IkePacket = mIkev2Info.Generator ((UINT8 *) Ikev2SaSession, NULL); | |
| if (IkePacket == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto ON_ERROR; | |
| } | |
| // | |
| // Send out the Packet | |
| // | |
| if (UdpService != NULL && UdpService->Output != NULL) { | |
| Status = Ikev2SendIkePacket (UdpService, (UINT8 *) SaCommon, IkePacket, 0); | |
| if (EFI_ERROR (Status)) { | |
| goto ON_ERROR; | |
| } | |
| } | |
| } else if (!IsListEmpty (&Ikev2SaSession->DeleteSaList)) { | |
| // | |
| // Iterate all Deleting Child SAs. | |
| // | |
| NET_LIST_FOR_EACH_SAFE (Entry, NextEntry, &Ikev2SaSession->DeleteSaList) { | |
| ChildSaSession = IKEV2_CHILD_SA_SESSION_BY_DEL_SA (Entry); | |
| ChildSaSession->SessionCommon.State = IkeStateSaDeleting; | |
| // | |
| // Generate Information Packet which contains the Child SA Delete Payload. | |
| // | |
| IkePacket = mIkev2Info.Generator ((UINT8 *) ChildSaSession, NULL); | |
| if (IkePacket == NULL) { | |
| Status = EFI_OUT_OF_RESOURCES; | |
| goto ON_ERROR; | |
| } | |
| // | |
| // Send out the Packet | |
| // | |
| if (UdpService != NULL && UdpService->Output != NULL) { | |
| Status = Ikev2SendIkePacket (UdpService, (UINT8 *) &ChildSaSession->SessionCommon, IkePacket, 0); | |
| if (EFI_ERROR (Status)) { | |
| goto ON_ERROR; | |
| } | |
| } | |
| } | |
| } else if (Context == NULL) { | |
| // | |
| // TODO: Deliver null notification message. | |
| // | |
| } else if (Context != NULL) { | |
| // | |
| // TODO: Send out the Information Exchange which contains the Notify Payload. | |
| // | |
| } | |
| ON_ERROR: | |
| if (IkePacket != NULL) { | |
| IkePacketFree (IkePacket); | |
| } | |
| return Status; | |
| } | |
| /** | |
| The general interface when received a IKEv2 packet for the IKE SA establishing. | |
| This function first find the related IKE SA Session according to the IKE packet's | |
| remote IP. Then call the corresponding function to handle this IKE packet according | |
| to the related IKE SA Session's State. | |
| @param[in] UdpService Pointer of related UDP Service. | |
| @param[in] IkePacket Data passed by caller. | |
| **/ | |
| VOID | |
| Ikev2HandleSa ( | |
| IN IKE_UDP_SERVICE *UdpService, | |
| IN IKE_PACKET *IkePacket | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| IKEV2_SA_SESSION *IkeSaSession; | |
| IKEV2_CHILD_SA_SESSION *ChildSaSession; | |
| IKEV2_SESSION_COMMON *IkeSaCommon; | |
| IKEV2_SESSION_COMMON *ChildSaCommon; | |
| IKEV2_PACKET_HANDLER Handler; | |
| IKE_PACKET *Reply; | |
| IPSEC_PAD_ENTRY *PadEntry; | |
| IPSEC_PRIVATE_DATA *Private; | |
| BOOLEAN IsNewSession; | |
| Private = (UdpService->IpVersion == IP_VERSION_4) ? | |
| IPSEC_PRIVATE_DATA_FROM_UDP4LIST(UdpService->ListHead) : | |
| IPSEC_PRIVATE_DATA_FROM_UDP6LIST(UdpService->ListHead); | |
| ChildSaSession = NULL; | |
| ChildSaCommon = NULL; | |
| // | |
| // Lookup the remote ip address in the processing IKE SA session list. | |
| // | |
| IkeSaSession = Ikev2SaSessionLookup (&Private->Ikev2SessionList, &IkePacket->RemotePeerIp); | |
| IsNewSession = FALSE; | |
| if (IkeSaSession == NULL) { | |
| // | |
| // Lookup the remote ip address in the pad. | |
| // | |
| PadEntry = IpSecLookupPadEntry (UdpService->IpVersion, &IkePacket->RemotePeerIp); | |
| if (PadEntry == NULL) { | |
| // | |
| // Drop the packet if no pad entry matched, this is the request from RFC 4301. | |
| // | |
| return ; | |
| } | |
| // | |
| // Create a new IkeSaSession and initiate the common parameters. | |
| // | |
| IkeSaSession = Ikev2SaSessionAlloc (Private, UdpService); | |
| if (IkeSaSession == NULL) { | |
| return; | |
| } | |
| IkeSaSession->Pad = PadEntry; | |
| IkeSaCommon = &IkeSaSession->SessionCommon; | |
| IkeSaCommon->IsInitiator = FALSE; | |
| IkeSaCommon->State = IkeStateInit; | |
| IKEV2_DUMP_STATE (IkeSaCommon->State, IkeStateInit); | |
| CopyMem ( | |
| &IkeSaCommon->RemotePeerIp, | |
| &IkePacket->RemotePeerIp, | |
| sizeof (EFI_IP_ADDRESS) | |
| ); | |
| CopyMem ( | |
| &IkeSaCommon->LocalPeerIp, | |
| &UdpService->DefaultAddress, | |
| sizeof (EFI_IP_ADDRESS) | |
| ); | |
| IsNewSession = TRUE; | |
| } | |
| // | |
| // Validate the IKE packet header. | |
| // | |
| if (!Ikev2ValidateHeader (IkeSaSession, IkePacket->Header)) { | |
| // | |
| // Drop the packet if invalid IKE header. | |
| // | |
| goto ON_ERROR; | |
| } | |
| // | |
| // Decode all the payloads in the IKE packet. | |
| // | |
| IkeSaCommon = &IkeSaSession->SessionCommon; | |
| Status = Ikev2DecodePacket (IkeSaCommon, IkePacket, IkeSessionTypeIkeSa); | |
| if (EFI_ERROR (Status)) { | |
| goto ON_ERROR; | |
| } | |
| // | |
| // Try to reate the first ChildSa Session of that IkeSaSession. | |
| // If the IkeSaSession is responder, here will create the first ChildSaSession. | |
| // | |
| if (IkeSaCommon->State == IkeStateAuth && IsListEmpty(&IkeSaSession->ChildSaSessionList)) { | |
| // | |
| // Generate a piggyback child SA in IKE_STATE_AUTH state. | |
| // | |
| ASSERT (IsListEmpty (&IkeSaSession->ChildSaSessionList) && | |
| IsListEmpty (&IkeSaSession->ChildSaEstablishSessionList)); | |
| ChildSaSession = Ikev2ChildSaSessionCreate (IkeSaSession, UdpService); | |
| ChildSaCommon = &ChildSaSession->SessionCommon; | |
| } | |
| // | |
| // Parse the IKE request packet according to the auth method and current state. | |
| // | |
| Handler = mIkev2Initial[IkeSaSession->Pad->Data->AuthMethod][IkeSaCommon->State]; | |
| Status = Handler.Parser ((UINT8 *)IkeSaSession, IkePacket); | |
| if (EFI_ERROR (Status)) { | |
| goto ON_ERROR; | |
| } | |
| // | |
| // Try to reate the first ChildSa Session of that IkeSaSession. | |
| // If the IkeSaSession is initiator, here will create the first ChildSaSession. | |
| // | |
| if (IkeSaCommon->State == IkeStateAuth && IsListEmpty(&IkeSaSession->ChildSaSessionList)) { | |
| // | |
| // Generate a piggyback child SA in IKE_STATE_AUTH state. | |
| // | |
| ASSERT (IsListEmpty (&IkeSaSession->ChildSaSessionList) && | |
| IsListEmpty (&IkeSaSession->ChildSaEstablishSessionList)); | |
| ChildSaSession = Ikev2ChildSaSessionCreate (IkeSaSession, UdpService); | |
| ChildSaCommon = &ChildSaSession->SessionCommon; | |
| // | |
| // Initialize the SA data for Child SA. | |
| // | |
| ChildSaSession->SaData = Ikev2InitializeSaData (ChildSaCommon); | |
| } | |
| // | |
| // Generate the IKE response packet and send it out if not established. | |
| // | |
| if (IkeSaCommon->State != IkeStateIkeSaEstablished) { | |
| Handler = mIkev2Initial[IkeSaSession->Pad->Data->AuthMethod][IkeSaCommon->State]; | |
| Reply = Handler.Generator ((UINT8 *) IkeSaSession, NULL); | |
| if (Reply == NULL) { | |
| goto ON_ERROR; | |
| } | |
| Status = Ikev2SendIkePacket (UdpService, (UINT8 *) IkeSaCommon, Reply, 0); | |
| if (EFI_ERROR (Status)) { | |
| goto ON_ERROR; | |
| } | |
| if (!IkeSaCommon->IsInitiator) { | |
| IkeSaCommon->State ++; | |
| IKEV2_DUMP_STATE (IkeSaCommon->State - 1, IkeSaCommon->State); | |
| } | |
| } | |
| // | |
| // Insert the new IkeSaSession into the Private processing IkeSaSession List. | |
| // | |
| if (IsNewSession) { | |
| Ikev2SaSessionInsert (&Private->Ikev2SessionList, IkeSaSession, &IkePacket->RemotePeerIp); | |
| } | |
| // | |
| // Register the IkeSaSession and remove it from processing list. | |
| // | |
| if (IkeSaCommon->State == IkeStateIkeSaEstablished) { | |
| // | |
| // Remove the Established IKE SA Session from the IKE SA Session Negotiating list | |
| // and insert it into IKE SA Session Established list. | |
| // | |
| Ikev2SaSessionRemove (&Private->Ikev2SessionList, &IkePacket->RemotePeerIp); | |
| Ikev2SaSessionReg (IkeSaSession, Private); | |
| // | |
| // Remove the Established Child SA Session from the IkeSaSession->ChildSaSessionList | |
| // ,insert it into IkeSaSession->ChildSaEstablishSessionList and save this Child SA | |
| // into SAD. | |
| // | |
| ChildSaSession = IKEV2_CHILD_SA_SESSION_BY_IKE_SA (IkeSaSession->ChildSaSessionList.BackLink); | |
| Ikev2ChildSaSessionRemove ( | |
| &IkeSaSession->ChildSaSessionList, | |
| ChildSaSession->LocalPeerSpi, | |
| IKEV2_ESTABLISHING_CHILDSA_LIST | |
| ); | |
| Ikev2ChildSaSessionReg (ChildSaSession, Private); | |
| } | |
| return ; | |
| ON_ERROR: | |
| if (ChildSaSession != NULL) { | |
| // | |
| // Remove the ChildSa from the list (Established list or Negotiating list). | |
| // | |
| RemoveEntryList (&ChildSaSession->ByIkeSa); | |
| Ikev2ChildSaSessionFree (ChildSaSession); | |
| } | |
| if (IsNewSession && IkeSaSession != NULL) { | |
| // | |
| // Remove the IkeSa from the list (Established list or Negotiating list). | |
| // | |
| if ((&IkeSaSession->BySessionTable)->ForwardLink != NULL && | |
| !IsListEmpty (&IkeSaSession->BySessionTable | |
| )){ | |
| RemoveEntryList (&IkeSaSession->BySessionTable); | |
| } | |
| Ikev2SaSessionFree (IkeSaSession); | |
| } | |
| return ; | |
| } | |
| /** | |
| The general interface when received a IKEv2 packet for the IKE Child SA establishing | |
| or IKE SA/CHILD SA rekeying. | |
| This function first find the related IKE SA Session according to the IKE packet's | |
| remote IP. Then call the corresponding function to handle this IKE packet according | |
| to the related IKE Child Session's State. | |
| @param[in] UdpService Pointer of related UDP Service. | |
| @param[in] IkePacket Data passed by caller. | |
| **/ | |
| VOID | |
| Ikev2HandleChildSa ( | |
| IN IKE_UDP_SERVICE *UdpService, | |
| IN IKE_PACKET *IkePacket | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| IKEV2_SA_SESSION *IkeSaSession; | |
| IKEV2_CREATE_CHILD_REQUEST_TYPE RequestType; | |
| IKE_PACKET *Reply; | |
| IPSEC_PRIVATE_DATA *Private; | |
| Private = (UdpService->IpVersion == IP_VERSION_4) ? | |
| IPSEC_PRIVATE_DATA_FROM_UDP4LIST(UdpService->ListHead) : | |
| IPSEC_PRIVATE_DATA_FROM_UDP6LIST(UdpService->ListHead); | |
| Reply = NULL; | |
| // | |
| // Lookup the remote ip address in the processing IKE SA session list. | |
| // | |
| IkeSaSession = Ikev2SaSessionLookup (&Private->Ikev2EstablishedList, &IkePacket->RemotePeerIp); | |
| if (IkeSaSession == NULL) { | |
| // | |
| // Drop the packet if no IKE SA associated. | |
| // | |
| return ; | |
| } | |
| // | |
| // Validate the IKE packet header. | |
| // | |
| if (!Ikev2ValidateHeader (IkeSaSession, IkePacket->Header)) { | |
| // | |
| // Drop the packet if invalid IKE header. | |
| // | |
| return; | |
| } | |
| // | |
| // Decode all the payloads in the IKE packet. | |
| // | |
| Status = Ikev2DecodePacket (&IkeSaSession->SessionCommon, IkePacket, IkeSessionTypeIkeSa); | |
| if (EFI_ERROR (Status)) { | |
| return; | |
| } | |
| // | |
| // Get the request type: CreateChildSa/RekeyChildSa/RekeyIkeSa. | |
| // | |
| RequestType = Ikev2ChildExchangeRequestType (IkePacket); | |
| switch (RequestType) { | |
| case IkeRequestTypeCreateChildSa: | |
| case IkeRequestTypeRekeyChildSa: | |
| case IkeRequestTypeRekeyIkeSa: | |
| // | |
| // Parse the IKE request packet. Not support CREATE_CHILD_SA exchange yet, so | |
| // only EFI_UNSUPPORTED will be returned and that will trigger a reply with a | |
| // Notify payload of type NO_ADDITIONAL_SAS. | |
| // | |
| Status = mIkev2CreateChild.Parser ((UINT8 *) IkeSaSession, IkePacket); | |
| if (EFI_ERROR (Status)) { | |
| goto ON_REPLY; | |
| } | |
| default: | |
| // | |
| // No support. | |
| // | |
| return ; | |
| } | |
| ON_REPLY: | |
| // | |
| // Generate the reply packet if needed and send it out. | |
| // | |
| if (IkePacket->Header->Flags != IKE_HEADER_FLAGS_RESPOND) { | |
| Reply = mIkev2CreateChild.Generator ((UINT8 *) IkeSaSession, &IkePacket->Header->MessageId); | |
| if (Reply != NULL) { | |
| Status = Ikev2SendIkePacket (UdpService, (UINT8 *) &(IkeSaSession->SessionCommon), Reply, 0); | |
| if (EFI_ERROR (Status)) { | |
| // | |
| // Delete Reply payload. | |
| // | |
| if (Reply != NULL) { | |
| IkePacketFree (Reply); | |
| } | |
| } | |
| } | |
| } | |
| return ; | |
| } | |
| /** | |
| It is general interface to handle IKEv2 information Exchange. | |
| @param[in] UdpService Point to IKE UPD Service related to this information exchange. | |
| @param[in] IkePacket The IKE packet to be parsed. | |
| **/ | |
| VOID | |
| Ikev2HandleInfo ( | |
| IN IKE_UDP_SERVICE *UdpService, | |
| IN IKE_PACKET *IkePacket | |
| ) | |
| { | |
| EFI_STATUS Status; | |
| IKEV2_SESSION_COMMON *SessionCommon; | |
| IKEV2_SA_SESSION *IkeSaSession; | |
| IPSEC_PRIVATE_DATA *Private; | |
| Private = (UdpService->IpVersion == IP_VERSION_4) ? | |
| IPSEC_PRIVATE_DATA_FROM_UDP4LIST(UdpService->ListHead) : | |
| IPSEC_PRIVATE_DATA_FROM_UDP6LIST(UdpService->ListHead); | |
| // | |
| // Lookup the remote ip address in the processing IKE SA session list. | |
| // | |
| IkeSaSession = Ikev2SaSessionLookup (&Private->Ikev2EstablishedList, &IkePacket->RemotePeerIp); | |
| if (IkeSaSession == NULL) { | |
| // | |
| // Drop the packet if no IKE SA associated. | |
| // | |
| return ; | |
| } | |
| // | |
| // Validate the IKE packet header. | |
| // | |
| if (!Ikev2ValidateHeader (IkeSaSession, IkePacket->Header)) { | |
| // | |
| // Drop the packet if invalid IKE header. | |
| // | |
| return; | |
| } | |
| SessionCommon = &IkeSaSession->SessionCommon; | |
| // | |
| // Decode all the payloads in the IKE packet. | |
| // | |
| Status = Ikev2DecodePacket (SessionCommon, IkePacket, IkeSessionTypeIkeSa); | |
| if (EFI_ERROR (Status)) { | |
| return; | |
| } | |
| Status = mIkev2Info.Parser ((UINT8 *)IkeSaSession, IkePacket); | |
| if (EFI_ERROR (Status)) { | |
| // | |
| // Drop the packet if fail to parse. | |
| // | |
| return; | |
| } | |
| } | |
| IKE_EXCHANGE_INTERFACE mIkev1Exchange = { | |
| 1, | |
| NULL, //Ikev1NegotiateSa | |
| NULL, //Ikev1NegotiateChildSa | |
| NULL, | |
| NULL, //Ikev1HandleSa, | |
| NULL, //Ikev1HandleChildSa | |
| NULL, //Ikev1HandleInfo | |
| }; | |
| IKE_EXCHANGE_INTERFACE mIkev2Exchange = { | |
| 2, | |
| Ikev2NegotiateSa, | |
| Ikev2NegotiateChildSa, | |
| Ikev2NegotiateInfo, | |
| Ikev2HandleSa, | |
| Ikev2HandleChildSa, | |
| Ikev2HandleInfo | |
| }; | |