1*5d5fbe79SDavid van Moolenbroek /*
2*5d5fbe79SDavid van Moolenbroek * mppe.c - interface MPPE to the PPP code.
3*5d5fbe79SDavid van Moolenbroek *
4*5d5fbe79SDavid van Moolenbroek * By Frank Cusack <fcusack@fcusack.com>.
5*5d5fbe79SDavid van Moolenbroek * Copyright (c) 2002,2003,2004 Google, Inc.
6*5d5fbe79SDavid van Moolenbroek * All rights reserved.
7*5d5fbe79SDavid van Moolenbroek *
8*5d5fbe79SDavid van Moolenbroek * License:
9*5d5fbe79SDavid van Moolenbroek * Permission to use, copy, modify, and distribute this software and its
10*5d5fbe79SDavid van Moolenbroek * documentation is hereby granted, provided that the above copyright
11*5d5fbe79SDavid van Moolenbroek * notice appears in all copies. This software is provided without any
12*5d5fbe79SDavid van Moolenbroek * warranty, express or implied.
13*5d5fbe79SDavid van Moolenbroek *
14*5d5fbe79SDavid van Moolenbroek * Changelog:
15*5d5fbe79SDavid van Moolenbroek * 08/12/05 - Matt Domsch <Matt_Domsch@dell.com>
16*5d5fbe79SDavid van Moolenbroek * Only need extra skb padding on transmit, not receive.
17*5d5fbe79SDavid van Moolenbroek * 06/18/04 - Matt Domsch <Matt_Domsch@dell.com>, Oleg Makarenko <mole@quadra.ru>
18*5d5fbe79SDavid van Moolenbroek * Use Linux kernel 2.6 arc4 and sha1 routines rather than
19*5d5fbe79SDavid van Moolenbroek * providing our own.
20*5d5fbe79SDavid van Moolenbroek * 2/15/04 - TS: added #include <version.h> and testing for Kernel
21*5d5fbe79SDavid van Moolenbroek * version before using
22*5d5fbe79SDavid van Moolenbroek * MOD_DEC_USAGE_COUNT/MOD_INC_USAGE_COUNT which are
23*5d5fbe79SDavid van Moolenbroek * deprecated in 2.6
24*5d5fbe79SDavid van Moolenbroek */
25*5d5fbe79SDavid van Moolenbroek
26*5d5fbe79SDavid van Moolenbroek #include "netif/ppp/ppp_opts.h"
27*5d5fbe79SDavid van Moolenbroek #if PPP_SUPPORT && MPPE_SUPPORT /* don't build if not configured for use in lwipopts.h */
28*5d5fbe79SDavid van Moolenbroek
29*5d5fbe79SDavid van Moolenbroek #include <string.h>
30*5d5fbe79SDavid van Moolenbroek
31*5d5fbe79SDavid van Moolenbroek #include "lwip/err.h"
32*5d5fbe79SDavid van Moolenbroek
33*5d5fbe79SDavid van Moolenbroek #include "netif/ppp/ppp_impl.h"
34*5d5fbe79SDavid van Moolenbroek #include "netif/ppp/ccp.h"
35*5d5fbe79SDavid van Moolenbroek #include "netif/ppp/mppe.h"
36*5d5fbe79SDavid van Moolenbroek #include "netif/ppp/pppdebug.h"
37*5d5fbe79SDavid van Moolenbroek #include "netif/ppp/pppcrypt.h"
38*5d5fbe79SDavid van Moolenbroek
39*5d5fbe79SDavid van Moolenbroek #define SHA1_SIGNATURE_SIZE 20
40*5d5fbe79SDavid van Moolenbroek
41*5d5fbe79SDavid van Moolenbroek /* ppp_mppe_state.bits definitions */
42*5d5fbe79SDavid van Moolenbroek #define MPPE_BIT_A 0x80 /* Encryption table were (re)inititalized */
43*5d5fbe79SDavid van Moolenbroek #define MPPE_BIT_B 0x40 /* MPPC only (not implemented) */
44*5d5fbe79SDavid van Moolenbroek #define MPPE_BIT_C 0x20 /* MPPC only (not implemented) */
45*5d5fbe79SDavid van Moolenbroek #define MPPE_BIT_D 0x10 /* This is an encrypted frame */
46*5d5fbe79SDavid van Moolenbroek
47*5d5fbe79SDavid van Moolenbroek #define MPPE_BIT_FLUSHED MPPE_BIT_A
48*5d5fbe79SDavid van Moolenbroek #define MPPE_BIT_ENCRYPTED MPPE_BIT_D
49*5d5fbe79SDavid van Moolenbroek
50*5d5fbe79SDavid van Moolenbroek #define MPPE_BITS(p) ((p)[0] & 0xf0)
51*5d5fbe79SDavid van Moolenbroek #define MPPE_CCOUNT(p) ((((p)[0] & 0x0f) << 8) + (p)[1])
52*5d5fbe79SDavid van Moolenbroek #define MPPE_CCOUNT_SPACE 0x1000 /* The size of the ccount space */
53*5d5fbe79SDavid van Moolenbroek
54*5d5fbe79SDavid van Moolenbroek #define MPPE_OVHD 2 /* MPPE overhead/packet */
55*5d5fbe79SDavid van Moolenbroek #define SANITY_MAX 1600 /* Max bogon factor we will tolerate */
56*5d5fbe79SDavid van Moolenbroek
57*5d5fbe79SDavid van Moolenbroek /*
58*5d5fbe79SDavid van Moolenbroek * Perform the MPPE rekey algorithm, from RFC 3078, sec. 7.3.
59*5d5fbe79SDavid van Moolenbroek * Well, not what's written there, but rather what they meant.
60*5d5fbe79SDavid van Moolenbroek */
mppe_rekey(ppp_mppe_state * state,int initial_key)61*5d5fbe79SDavid van Moolenbroek static void mppe_rekey(ppp_mppe_state * state, int initial_key)
62*5d5fbe79SDavid van Moolenbroek {
63*5d5fbe79SDavid van Moolenbroek lwip_sha1_context sha1_ctx;
64*5d5fbe79SDavid van Moolenbroek u8_t sha1_digest[SHA1_SIGNATURE_SIZE];
65*5d5fbe79SDavid van Moolenbroek
66*5d5fbe79SDavid van Moolenbroek /*
67*5d5fbe79SDavid van Moolenbroek * Key Derivation, from RFC 3078, RFC 3079.
68*5d5fbe79SDavid van Moolenbroek * Equivalent to Get_Key() for MS-CHAP as described in RFC 3079.
69*5d5fbe79SDavid van Moolenbroek */
70*5d5fbe79SDavid van Moolenbroek lwip_sha1_init(&sha1_ctx);
71*5d5fbe79SDavid van Moolenbroek lwip_sha1_starts(&sha1_ctx);
72*5d5fbe79SDavid van Moolenbroek lwip_sha1_update(&sha1_ctx, state->master_key, state->keylen);
73*5d5fbe79SDavid van Moolenbroek lwip_sha1_update(&sha1_ctx, mppe_sha1_pad1, SHA1_PAD_SIZE);
74*5d5fbe79SDavid van Moolenbroek lwip_sha1_update(&sha1_ctx, state->session_key, state->keylen);
75*5d5fbe79SDavid van Moolenbroek lwip_sha1_update(&sha1_ctx, mppe_sha1_pad2, SHA1_PAD_SIZE);
76*5d5fbe79SDavid van Moolenbroek lwip_sha1_finish(&sha1_ctx, sha1_digest);
77*5d5fbe79SDavid van Moolenbroek lwip_sha1_free(&sha1_ctx);
78*5d5fbe79SDavid van Moolenbroek MEMCPY(state->session_key, sha1_digest, state->keylen);
79*5d5fbe79SDavid van Moolenbroek
80*5d5fbe79SDavid van Moolenbroek if (!initial_key) {
81*5d5fbe79SDavid van Moolenbroek lwip_arc4_init(&state->arc4);
82*5d5fbe79SDavid van Moolenbroek lwip_arc4_setup(&state->arc4, sha1_digest, state->keylen);
83*5d5fbe79SDavid van Moolenbroek lwip_arc4_crypt(&state->arc4, state->session_key, state->keylen);
84*5d5fbe79SDavid van Moolenbroek lwip_arc4_free(&state->arc4);
85*5d5fbe79SDavid van Moolenbroek }
86*5d5fbe79SDavid van Moolenbroek if (state->keylen == 8) {
87*5d5fbe79SDavid van Moolenbroek /* See RFC 3078 */
88*5d5fbe79SDavid van Moolenbroek state->session_key[0] = 0xd1;
89*5d5fbe79SDavid van Moolenbroek state->session_key[1] = 0x26;
90*5d5fbe79SDavid van Moolenbroek state->session_key[2] = 0x9e;
91*5d5fbe79SDavid van Moolenbroek }
92*5d5fbe79SDavid van Moolenbroek lwip_arc4_init(&state->arc4);
93*5d5fbe79SDavid van Moolenbroek lwip_arc4_setup(&state->arc4, state->session_key, state->keylen);
94*5d5fbe79SDavid van Moolenbroek }
95*5d5fbe79SDavid van Moolenbroek
96*5d5fbe79SDavid van Moolenbroek /*
97*5d5fbe79SDavid van Moolenbroek * Set key, used by MSCHAP before mppe_init() is actually called by CCP so we
98*5d5fbe79SDavid van Moolenbroek * don't have to keep multiple copies of keys.
99*5d5fbe79SDavid van Moolenbroek */
mppe_set_key(ppp_pcb * pcb,ppp_mppe_state * state,u8_t * key)100*5d5fbe79SDavid van Moolenbroek void mppe_set_key(ppp_pcb *pcb, ppp_mppe_state *state, u8_t *key) {
101*5d5fbe79SDavid van Moolenbroek LWIP_UNUSED_ARG(pcb);
102*5d5fbe79SDavid van Moolenbroek MEMCPY(state->master_key, key, MPPE_MAX_KEY_LEN);
103*5d5fbe79SDavid van Moolenbroek }
104*5d5fbe79SDavid van Moolenbroek
105*5d5fbe79SDavid van Moolenbroek /*
106*5d5fbe79SDavid van Moolenbroek * Initialize (de)compressor state.
107*5d5fbe79SDavid van Moolenbroek */
108*5d5fbe79SDavid van Moolenbroek void
mppe_init(ppp_pcb * pcb,ppp_mppe_state * state,u8_t options)109*5d5fbe79SDavid van Moolenbroek mppe_init(ppp_pcb *pcb, ppp_mppe_state *state, u8_t options)
110*5d5fbe79SDavid van Moolenbroek {
111*5d5fbe79SDavid van Moolenbroek #if PPP_DEBUG
112*5d5fbe79SDavid van Moolenbroek const u8_t *debugstr = (const u8_t*)"mppe_comp_init";
113*5d5fbe79SDavid van Moolenbroek if (&pcb->mppe_decomp == state) {
114*5d5fbe79SDavid van Moolenbroek debugstr = (const u8_t*)"mppe_decomp_init";
115*5d5fbe79SDavid van Moolenbroek }
116*5d5fbe79SDavid van Moolenbroek #endif /* PPP_DEBUG */
117*5d5fbe79SDavid van Moolenbroek
118*5d5fbe79SDavid van Moolenbroek /* Save keys. */
119*5d5fbe79SDavid van Moolenbroek MEMCPY(state->session_key, state->master_key, sizeof(state->master_key));
120*5d5fbe79SDavid van Moolenbroek
121*5d5fbe79SDavid van Moolenbroek if (options & MPPE_OPT_128)
122*5d5fbe79SDavid van Moolenbroek state->keylen = 16;
123*5d5fbe79SDavid van Moolenbroek else if (options & MPPE_OPT_40)
124*5d5fbe79SDavid van Moolenbroek state->keylen = 8;
125*5d5fbe79SDavid van Moolenbroek else {
126*5d5fbe79SDavid van Moolenbroek PPPDEBUG(LOG_DEBUG, ("%s[%d]: unknown key length\n", debugstr,
127*5d5fbe79SDavid van Moolenbroek pcb->netif->num));
128*5d5fbe79SDavid van Moolenbroek lcp_close(pcb, "MPPE required but peer negotiation failed");
129*5d5fbe79SDavid van Moolenbroek return;
130*5d5fbe79SDavid van Moolenbroek }
131*5d5fbe79SDavid van Moolenbroek if (options & MPPE_OPT_STATEFUL)
132*5d5fbe79SDavid van Moolenbroek state->stateful = 1;
133*5d5fbe79SDavid van Moolenbroek
134*5d5fbe79SDavid van Moolenbroek /* Generate the initial session key. */
135*5d5fbe79SDavid van Moolenbroek mppe_rekey(state, 1);
136*5d5fbe79SDavid van Moolenbroek
137*5d5fbe79SDavid van Moolenbroek #if PPP_DEBUG
138*5d5fbe79SDavid van Moolenbroek {
139*5d5fbe79SDavid van Moolenbroek int i;
140*5d5fbe79SDavid van Moolenbroek char mkey[sizeof(state->master_key) * 2 + 1];
141*5d5fbe79SDavid van Moolenbroek char skey[sizeof(state->session_key) * 2 + 1];
142*5d5fbe79SDavid van Moolenbroek
143*5d5fbe79SDavid van Moolenbroek PPPDEBUG(LOG_DEBUG, ("%s[%d]: initialized with %d-bit %s mode\n",
144*5d5fbe79SDavid van Moolenbroek debugstr, pcb->netif->num, (state->keylen == 16) ? 128 : 40,
145*5d5fbe79SDavid van Moolenbroek (state->stateful) ? "stateful" : "stateless"));
146*5d5fbe79SDavid van Moolenbroek
147*5d5fbe79SDavid van Moolenbroek for (i = 0; i < (int)sizeof(state->master_key); i++)
148*5d5fbe79SDavid van Moolenbroek sprintf(mkey + i * 2, "%02x", state->master_key[i]);
149*5d5fbe79SDavid van Moolenbroek for (i = 0; i < (int)sizeof(state->session_key); i++)
150*5d5fbe79SDavid van Moolenbroek sprintf(skey + i * 2, "%02x", state->session_key[i]);
151*5d5fbe79SDavid van Moolenbroek PPPDEBUG(LOG_DEBUG,
152*5d5fbe79SDavid van Moolenbroek ("%s[%d]: keys: master: %s initial session: %s\n",
153*5d5fbe79SDavid van Moolenbroek debugstr, pcb->netif->num, mkey, skey));
154*5d5fbe79SDavid van Moolenbroek }
155*5d5fbe79SDavid van Moolenbroek #endif /* PPP_DEBUG */
156*5d5fbe79SDavid van Moolenbroek
157*5d5fbe79SDavid van Moolenbroek /*
158*5d5fbe79SDavid van Moolenbroek * Initialize the coherency count. The initial value is not specified
159*5d5fbe79SDavid van Moolenbroek * in RFC 3078, but we can make a reasonable assumption that it will
160*5d5fbe79SDavid van Moolenbroek * start at 0. Setting it to the max here makes the comp/decomp code
161*5d5fbe79SDavid van Moolenbroek * do the right thing (determined through experiment).
162*5d5fbe79SDavid van Moolenbroek */
163*5d5fbe79SDavid van Moolenbroek state->ccount = MPPE_CCOUNT_SPACE - 1;
164*5d5fbe79SDavid van Moolenbroek
165*5d5fbe79SDavid van Moolenbroek /*
166*5d5fbe79SDavid van Moolenbroek * Note that even though we have initialized the key table, we don't
167*5d5fbe79SDavid van Moolenbroek * set the FLUSHED bit. This is contrary to RFC 3078, sec. 3.1.
168*5d5fbe79SDavid van Moolenbroek */
169*5d5fbe79SDavid van Moolenbroek state->bits = MPPE_BIT_ENCRYPTED;
170*5d5fbe79SDavid van Moolenbroek }
171*5d5fbe79SDavid van Moolenbroek
172*5d5fbe79SDavid van Moolenbroek /*
173*5d5fbe79SDavid van Moolenbroek * We received a CCP Reset-Request (actually, we are sending a Reset-Ack),
174*5d5fbe79SDavid van Moolenbroek * tell the compressor to rekey. Note that we MUST NOT rekey for
175*5d5fbe79SDavid van Moolenbroek * every CCP Reset-Request; we only rekey on the next xmit packet.
176*5d5fbe79SDavid van Moolenbroek * We might get multiple CCP Reset-Requests if our CCP Reset-Ack is lost.
177*5d5fbe79SDavid van Moolenbroek * So, rekeying for every CCP Reset-Request is broken as the peer will not
178*5d5fbe79SDavid van Moolenbroek * know how many times we've rekeyed. (If we rekey and THEN get another
179*5d5fbe79SDavid van Moolenbroek * CCP Reset-Request, we must rekey again.)
180*5d5fbe79SDavid van Moolenbroek */
mppe_comp_reset(ppp_pcb * pcb,ppp_mppe_state * state)181*5d5fbe79SDavid van Moolenbroek void mppe_comp_reset(ppp_pcb *pcb, ppp_mppe_state *state)
182*5d5fbe79SDavid van Moolenbroek {
183*5d5fbe79SDavid van Moolenbroek LWIP_UNUSED_ARG(pcb);
184*5d5fbe79SDavid van Moolenbroek state->bits |= MPPE_BIT_FLUSHED;
185*5d5fbe79SDavid van Moolenbroek }
186*5d5fbe79SDavid van Moolenbroek
187*5d5fbe79SDavid van Moolenbroek /*
188*5d5fbe79SDavid van Moolenbroek * Compress (encrypt) a packet.
189*5d5fbe79SDavid van Moolenbroek * It's strange to call this a compressor, since the output is always
190*5d5fbe79SDavid van Moolenbroek * MPPE_OVHD + 2 bytes larger than the input.
191*5d5fbe79SDavid van Moolenbroek */
192*5d5fbe79SDavid van Moolenbroek err_t
mppe_compress(ppp_pcb * pcb,ppp_mppe_state * state,struct pbuf ** pb,u16_t protocol)193*5d5fbe79SDavid van Moolenbroek mppe_compress(ppp_pcb *pcb, ppp_mppe_state *state, struct pbuf **pb, u16_t protocol)
194*5d5fbe79SDavid van Moolenbroek {
195*5d5fbe79SDavid van Moolenbroek struct pbuf *n, *np;
196*5d5fbe79SDavid van Moolenbroek u8_t *pl;
197*5d5fbe79SDavid van Moolenbroek err_t err;
198*5d5fbe79SDavid van Moolenbroek
199*5d5fbe79SDavid van Moolenbroek LWIP_UNUSED_ARG(pcb);
200*5d5fbe79SDavid van Moolenbroek
201*5d5fbe79SDavid van Moolenbroek /* TCP stack requires that we don't change the packet payload, therefore we copy
202*5d5fbe79SDavid van Moolenbroek * the whole packet before encryption.
203*5d5fbe79SDavid van Moolenbroek */
204*5d5fbe79SDavid van Moolenbroek np = pbuf_alloc(PBUF_RAW, MPPE_OVHD + sizeof(protocol) + (*pb)->tot_len, PBUF_POOL);
205*5d5fbe79SDavid van Moolenbroek if (!np) {
206*5d5fbe79SDavid van Moolenbroek return ERR_MEM;
207*5d5fbe79SDavid van Moolenbroek }
208*5d5fbe79SDavid van Moolenbroek
209*5d5fbe79SDavid van Moolenbroek /* Hide MPPE header + protocol */
210*5d5fbe79SDavid van Moolenbroek pbuf_header(np, -(s16_t)(MPPE_OVHD + sizeof(protocol)));
211*5d5fbe79SDavid van Moolenbroek
212*5d5fbe79SDavid van Moolenbroek if ((err = pbuf_copy(np, *pb)) != ERR_OK) {
213*5d5fbe79SDavid van Moolenbroek pbuf_free(np);
214*5d5fbe79SDavid van Moolenbroek return err;
215*5d5fbe79SDavid van Moolenbroek }
216*5d5fbe79SDavid van Moolenbroek
217*5d5fbe79SDavid van Moolenbroek /* Reveal MPPE header + protocol */
218*5d5fbe79SDavid van Moolenbroek pbuf_header(np, (s16_t)(MPPE_OVHD + sizeof(protocol)));
219*5d5fbe79SDavid van Moolenbroek
220*5d5fbe79SDavid van Moolenbroek *pb = np;
221*5d5fbe79SDavid van Moolenbroek pl = (u8_t*)np->payload;
222*5d5fbe79SDavid van Moolenbroek
223*5d5fbe79SDavid van Moolenbroek state->ccount = (state->ccount + 1) % MPPE_CCOUNT_SPACE;
224*5d5fbe79SDavid van Moolenbroek PPPDEBUG(LOG_DEBUG, ("mppe_compress[%d]: ccount %d\n", pcb->netif->num, state->ccount));
225*5d5fbe79SDavid van Moolenbroek /* FIXME: use PUT* macros */
226*5d5fbe79SDavid van Moolenbroek pl[0] = state->ccount>>8;
227*5d5fbe79SDavid van Moolenbroek pl[1] = state->ccount;
228*5d5fbe79SDavid van Moolenbroek
229*5d5fbe79SDavid van Moolenbroek if (!state->stateful || /* stateless mode */
230*5d5fbe79SDavid van Moolenbroek ((state->ccount & 0xff) == 0xff) || /* "flag" packet */
231*5d5fbe79SDavid van Moolenbroek (state->bits & MPPE_BIT_FLUSHED)) { /* CCP Reset-Request */
232*5d5fbe79SDavid van Moolenbroek /* We must rekey */
233*5d5fbe79SDavid van Moolenbroek if (state->stateful) {
234*5d5fbe79SDavid van Moolenbroek PPPDEBUG(LOG_DEBUG, ("mppe_compress[%d]: rekeying\n", pcb->netif->num));
235*5d5fbe79SDavid van Moolenbroek }
236*5d5fbe79SDavid van Moolenbroek mppe_rekey(state, 0);
237*5d5fbe79SDavid van Moolenbroek state->bits |= MPPE_BIT_FLUSHED;
238*5d5fbe79SDavid van Moolenbroek }
239*5d5fbe79SDavid van Moolenbroek pl[0] |= state->bits;
240*5d5fbe79SDavid van Moolenbroek state->bits &= ~MPPE_BIT_FLUSHED; /* reset for next xmit */
241*5d5fbe79SDavid van Moolenbroek pl += MPPE_OVHD;
242*5d5fbe79SDavid van Moolenbroek
243*5d5fbe79SDavid van Moolenbroek /* Add protocol */
244*5d5fbe79SDavid van Moolenbroek /* FIXME: add PFC support */
245*5d5fbe79SDavid van Moolenbroek pl[0] = protocol >> 8;
246*5d5fbe79SDavid van Moolenbroek pl[1] = protocol;
247*5d5fbe79SDavid van Moolenbroek
248*5d5fbe79SDavid van Moolenbroek /* Hide MPPE header */
249*5d5fbe79SDavid van Moolenbroek pbuf_header(np, -(s16_t)MPPE_OVHD);
250*5d5fbe79SDavid van Moolenbroek
251*5d5fbe79SDavid van Moolenbroek /* Encrypt packet */
252*5d5fbe79SDavid van Moolenbroek for (n = np; n != NULL; n = n->next) {
253*5d5fbe79SDavid van Moolenbroek lwip_arc4_crypt(&state->arc4, (u8_t*)n->payload, n->len);
254*5d5fbe79SDavid van Moolenbroek if (n->tot_len == n->len) {
255*5d5fbe79SDavid van Moolenbroek break;
256*5d5fbe79SDavid van Moolenbroek }
257*5d5fbe79SDavid van Moolenbroek }
258*5d5fbe79SDavid van Moolenbroek
259*5d5fbe79SDavid van Moolenbroek /* Reveal MPPE header */
260*5d5fbe79SDavid van Moolenbroek pbuf_header(np, (s16_t)MPPE_OVHD);
261*5d5fbe79SDavid van Moolenbroek
262*5d5fbe79SDavid van Moolenbroek return ERR_OK;
263*5d5fbe79SDavid van Moolenbroek }
264*5d5fbe79SDavid van Moolenbroek
265*5d5fbe79SDavid van Moolenbroek /*
266*5d5fbe79SDavid van Moolenbroek * We received a CCP Reset-Ack. Just ignore it.
267*5d5fbe79SDavid van Moolenbroek */
mppe_decomp_reset(ppp_pcb * pcb,ppp_mppe_state * state)268*5d5fbe79SDavid van Moolenbroek void mppe_decomp_reset(ppp_pcb *pcb, ppp_mppe_state *state)
269*5d5fbe79SDavid van Moolenbroek {
270*5d5fbe79SDavid van Moolenbroek LWIP_UNUSED_ARG(pcb);
271*5d5fbe79SDavid van Moolenbroek LWIP_UNUSED_ARG(state);
272*5d5fbe79SDavid van Moolenbroek return;
273*5d5fbe79SDavid van Moolenbroek }
274*5d5fbe79SDavid van Moolenbroek
275*5d5fbe79SDavid van Moolenbroek /*
276*5d5fbe79SDavid van Moolenbroek * Decompress (decrypt) an MPPE packet.
277*5d5fbe79SDavid van Moolenbroek */
278*5d5fbe79SDavid van Moolenbroek err_t
mppe_decompress(ppp_pcb * pcb,ppp_mppe_state * state,struct pbuf ** pb)279*5d5fbe79SDavid van Moolenbroek mppe_decompress(ppp_pcb *pcb, ppp_mppe_state *state, struct pbuf **pb)
280*5d5fbe79SDavid van Moolenbroek {
281*5d5fbe79SDavid van Moolenbroek struct pbuf *n0 = *pb, *n;
282*5d5fbe79SDavid van Moolenbroek u8_t *pl;
283*5d5fbe79SDavid van Moolenbroek u16_t ccount;
284*5d5fbe79SDavid van Moolenbroek u8_t flushed;
285*5d5fbe79SDavid van Moolenbroek
286*5d5fbe79SDavid van Moolenbroek /* MPPE Header */
287*5d5fbe79SDavid van Moolenbroek if (n0->len < MPPE_OVHD) {
288*5d5fbe79SDavid van Moolenbroek PPPDEBUG(LOG_DEBUG,
289*5d5fbe79SDavid van Moolenbroek ("mppe_decompress[%d]: short pkt (%d)\n",
290*5d5fbe79SDavid van Moolenbroek pcb->netif->num, n0->len));
291*5d5fbe79SDavid van Moolenbroek state->sanity_errors += 100;
292*5d5fbe79SDavid van Moolenbroek goto sanity_error;
293*5d5fbe79SDavid van Moolenbroek }
294*5d5fbe79SDavid van Moolenbroek
295*5d5fbe79SDavid van Moolenbroek pl = (u8_t*)n0->payload;
296*5d5fbe79SDavid van Moolenbroek flushed = MPPE_BITS(pl) & MPPE_BIT_FLUSHED;
297*5d5fbe79SDavid van Moolenbroek ccount = MPPE_CCOUNT(pl);
298*5d5fbe79SDavid van Moolenbroek PPPDEBUG(LOG_DEBUG, ("mppe_decompress[%d]: ccount %d\n",
299*5d5fbe79SDavid van Moolenbroek pcb->netif->num, ccount));
300*5d5fbe79SDavid van Moolenbroek
301*5d5fbe79SDavid van Moolenbroek /* sanity checks -- terminate with extreme prejudice */
302*5d5fbe79SDavid van Moolenbroek if (!(MPPE_BITS(pl) & MPPE_BIT_ENCRYPTED)) {
303*5d5fbe79SDavid van Moolenbroek PPPDEBUG(LOG_DEBUG,
304*5d5fbe79SDavid van Moolenbroek ("mppe_decompress[%d]: ENCRYPTED bit not set!\n",
305*5d5fbe79SDavid van Moolenbroek pcb->netif->num));
306*5d5fbe79SDavid van Moolenbroek state->sanity_errors += 100;
307*5d5fbe79SDavid van Moolenbroek goto sanity_error;
308*5d5fbe79SDavid van Moolenbroek }
309*5d5fbe79SDavid van Moolenbroek if (!state->stateful && !flushed) {
310*5d5fbe79SDavid van Moolenbroek PPPDEBUG(LOG_DEBUG, ("mppe_decompress[%d]: FLUSHED bit not set in "
311*5d5fbe79SDavid van Moolenbroek "stateless mode!\n", pcb->netif->num));
312*5d5fbe79SDavid van Moolenbroek state->sanity_errors += 100;
313*5d5fbe79SDavid van Moolenbroek goto sanity_error;
314*5d5fbe79SDavid van Moolenbroek }
315*5d5fbe79SDavid van Moolenbroek if (state->stateful && ((ccount & 0xff) == 0xff) && !flushed) {
316*5d5fbe79SDavid van Moolenbroek PPPDEBUG(LOG_DEBUG, ("mppe_decompress[%d]: FLUSHED bit not set on "
317*5d5fbe79SDavid van Moolenbroek "flag packet!\n", pcb->netif->num));
318*5d5fbe79SDavid van Moolenbroek state->sanity_errors += 100;
319*5d5fbe79SDavid van Moolenbroek goto sanity_error;
320*5d5fbe79SDavid van Moolenbroek }
321*5d5fbe79SDavid van Moolenbroek
322*5d5fbe79SDavid van Moolenbroek /*
323*5d5fbe79SDavid van Moolenbroek * Check the coherency count.
324*5d5fbe79SDavid van Moolenbroek */
325*5d5fbe79SDavid van Moolenbroek
326*5d5fbe79SDavid van Moolenbroek if (!state->stateful) {
327*5d5fbe79SDavid van Moolenbroek /* Discard late packet */
328*5d5fbe79SDavid van Moolenbroek if ((ccount - state->ccount) % MPPE_CCOUNT_SPACE > MPPE_CCOUNT_SPACE / 2) {
329*5d5fbe79SDavid van Moolenbroek state->sanity_errors++;
330*5d5fbe79SDavid van Moolenbroek goto sanity_error;
331*5d5fbe79SDavid van Moolenbroek }
332*5d5fbe79SDavid van Moolenbroek
333*5d5fbe79SDavid van Moolenbroek /* RFC 3078, sec 8.1. Rekey for every packet. */
334*5d5fbe79SDavid van Moolenbroek while (state->ccount != ccount) {
335*5d5fbe79SDavid van Moolenbroek mppe_rekey(state, 0);
336*5d5fbe79SDavid van Moolenbroek state->ccount = (state->ccount + 1) % MPPE_CCOUNT_SPACE;
337*5d5fbe79SDavid van Moolenbroek }
338*5d5fbe79SDavid van Moolenbroek } else {
339*5d5fbe79SDavid van Moolenbroek /* RFC 3078, sec 8.2. */
340*5d5fbe79SDavid van Moolenbroek if (!state->discard) {
341*5d5fbe79SDavid van Moolenbroek /* normal state */
342*5d5fbe79SDavid van Moolenbroek state->ccount = (state->ccount + 1) % MPPE_CCOUNT_SPACE;
343*5d5fbe79SDavid van Moolenbroek if (ccount != state->ccount) {
344*5d5fbe79SDavid van Moolenbroek /*
345*5d5fbe79SDavid van Moolenbroek * (ccount > state->ccount)
346*5d5fbe79SDavid van Moolenbroek * Packet loss detected, enter the discard state.
347*5d5fbe79SDavid van Moolenbroek * Signal the peer to rekey (by sending a CCP Reset-Request).
348*5d5fbe79SDavid van Moolenbroek */
349*5d5fbe79SDavid van Moolenbroek state->discard = 1;
350*5d5fbe79SDavid van Moolenbroek ccp_resetrequest(pcb);
351*5d5fbe79SDavid van Moolenbroek return ERR_BUF;
352*5d5fbe79SDavid van Moolenbroek }
353*5d5fbe79SDavid van Moolenbroek } else {
354*5d5fbe79SDavid van Moolenbroek /* discard state */
355*5d5fbe79SDavid van Moolenbroek if (!flushed) {
356*5d5fbe79SDavid van Moolenbroek /* ccp.c will be silent (no additional CCP Reset-Requests). */
357*5d5fbe79SDavid van Moolenbroek return ERR_BUF;
358*5d5fbe79SDavid van Moolenbroek } else {
359*5d5fbe79SDavid van Moolenbroek /* Rekey for every missed "flag" packet. */
360*5d5fbe79SDavid van Moolenbroek while ((ccount & ~0xff) !=
361*5d5fbe79SDavid van Moolenbroek (state->ccount & ~0xff)) {
362*5d5fbe79SDavid van Moolenbroek mppe_rekey(state, 0);
363*5d5fbe79SDavid van Moolenbroek state->ccount =
364*5d5fbe79SDavid van Moolenbroek (state->ccount +
365*5d5fbe79SDavid van Moolenbroek 256) % MPPE_CCOUNT_SPACE;
366*5d5fbe79SDavid van Moolenbroek }
367*5d5fbe79SDavid van Moolenbroek
368*5d5fbe79SDavid van Moolenbroek /* reset */
369*5d5fbe79SDavid van Moolenbroek state->discard = 0;
370*5d5fbe79SDavid van Moolenbroek state->ccount = ccount;
371*5d5fbe79SDavid van Moolenbroek /*
372*5d5fbe79SDavid van Moolenbroek * Another problem with RFC 3078 here. It implies that the
373*5d5fbe79SDavid van Moolenbroek * peer need not send a Reset-Ack packet. But RFC 1962
374*5d5fbe79SDavid van Moolenbroek * requires it. Hopefully, M$ does send a Reset-Ack; even
375*5d5fbe79SDavid van Moolenbroek * though it isn't required for MPPE synchronization, it is
376*5d5fbe79SDavid van Moolenbroek * required to reset CCP state.
377*5d5fbe79SDavid van Moolenbroek */
378*5d5fbe79SDavid van Moolenbroek }
379*5d5fbe79SDavid van Moolenbroek }
380*5d5fbe79SDavid van Moolenbroek if (flushed)
381*5d5fbe79SDavid van Moolenbroek mppe_rekey(state, 0);
382*5d5fbe79SDavid van Moolenbroek }
383*5d5fbe79SDavid van Moolenbroek
384*5d5fbe79SDavid van Moolenbroek /* Hide MPPE header */
385*5d5fbe79SDavid van Moolenbroek pbuf_header(n0, -(s16_t)(MPPE_OVHD));
386*5d5fbe79SDavid van Moolenbroek
387*5d5fbe79SDavid van Moolenbroek /* Decrypt the packet. */
388*5d5fbe79SDavid van Moolenbroek for (n = n0; n != NULL; n = n->next) {
389*5d5fbe79SDavid van Moolenbroek lwip_arc4_crypt(&state->arc4, (u8_t*)n->payload, n->len);
390*5d5fbe79SDavid van Moolenbroek if (n->tot_len == n->len) {
391*5d5fbe79SDavid van Moolenbroek break;
392*5d5fbe79SDavid van Moolenbroek }
393*5d5fbe79SDavid van Moolenbroek }
394*5d5fbe79SDavid van Moolenbroek
395*5d5fbe79SDavid van Moolenbroek /* good packet credit */
396*5d5fbe79SDavid van Moolenbroek state->sanity_errors >>= 1;
397*5d5fbe79SDavid van Moolenbroek
398*5d5fbe79SDavid van Moolenbroek return ERR_OK;
399*5d5fbe79SDavid van Moolenbroek
400*5d5fbe79SDavid van Moolenbroek sanity_error:
401*5d5fbe79SDavid van Moolenbroek if (state->sanity_errors >= SANITY_MAX) {
402*5d5fbe79SDavid van Moolenbroek /*
403*5d5fbe79SDavid van Moolenbroek * Take LCP down if the peer is sending too many bogons.
404*5d5fbe79SDavid van Moolenbroek * We don't want to do this for a single or just a few
405*5d5fbe79SDavid van Moolenbroek * instances since it could just be due to packet corruption.
406*5d5fbe79SDavid van Moolenbroek */
407*5d5fbe79SDavid van Moolenbroek lcp_close(pcb, "Too many MPPE errors");
408*5d5fbe79SDavid van Moolenbroek }
409*5d5fbe79SDavid van Moolenbroek return ERR_BUF;
410*5d5fbe79SDavid van Moolenbroek }
411*5d5fbe79SDavid van Moolenbroek
412*5d5fbe79SDavid van Moolenbroek #endif /* PPP_SUPPORT && MPPE_SUPPORT */
413