16d49e1aeSJan Lentfer /*
26d49e1aeSJan Lentfer  * IKEv2 common routines for initiator and responder
36d49e1aeSJan Lentfer  * Copyright (c) 2007, Jouni Malinen <j@w1.fi>
46d49e1aeSJan Lentfer  *
53ff40c12SJohn Marino  * This software may be distributed under the terms of the BSD license.
63ff40c12SJohn Marino  * See README for more details.
76d49e1aeSJan Lentfer  */
86d49e1aeSJan Lentfer 
96d49e1aeSJan Lentfer #include "includes.h"
106d49e1aeSJan Lentfer 
116d49e1aeSJan Lentfer #include "common.h"
123ff40c12SJohn Marino #include "crypto/crypto.h"
133ff40c12SJohn Marino #include "crypto/md5.h"
143ff40c12SJohn Marino #include "crypto/sha1.h"
153ff40c12SJohn Marino #include "crypto/random.h"
166d49e1aeSJan Lentfer #include "ikev2_common.h"
176d49e1aeSJan Lentfer 
186d49e1aeSJan Lentfer 
19*a1157835SDaniel Fojt static const struct ikev2_integ_alg ikev2_integ_algs[] = {
206d49e1aeSJan Lentfer 	{ AUTH_HMAC_SHA1_96, 20, 12 },
216d49e1aeSJan Lentfer 	{ AUTH_HMAC_MD5_96, 16, 12 }
226d49e1aeSJan Lentfer };
236d49e1aeSJan Lentfer 
243ff40c12SJohn Marino #define NUM_INTEG_ALGS ARRAY_SIZE(ikev2_integ_algs)
256d49e1aeSJan Lentfer 
266d49e1aeSJan Lentfer 
27*a1157835SDaniel Fojt static const struct ikev2_prf_alg ikev2_prf_algs[] = {
286d49e1aeSJan Lentfer 	{ PRF_HMAC_SHA1, 20, 20 },
296d49e1aeSJan Lentfer 	{ PRF_HMAC_MD5, 16, 16 }
306d49e1aeSJan Lentfer };
316d49e1aeSJan Lentfer 
323ff40c12SJohn Marino #define NUM_PRF_ALGS ARRAY_SIZE(ikev2_prf_algs)
336d49e1aeSJan Lentfer 
346d49e1aeSJan Lentfer 
35*a1157835SDaniel Fojt static const struct ikev2_encr_alg ikev2_encr_algs[] = {
366d49e1aeSJan Lentfer 	{ ENCR_AES_CBC, 16, 16 }, /* only 128-bit keys supported for now */
376d49e1aeSJan Lentfer 	{ ENCR_3DES, 24, 8 }
386d49e1aeSJan Lentfer };
396d49e1aeSJan Lentfer 
403ff40c12SJohn Marino #define NUM_ENCR_ALGS ARRAY_SIZE(ikev2_encr_algs)
416d49e1aeSJan Lentfer 
426d49e1aeSJan Lentfer 
ikev2_get_integ(int id)436d49e1aeSJan Lentfer const struct ikev2_integ_alg * ikev2_get_integ(int id)
446d49e1aeSJan Lentfer {
456d49e1aeSJan Lentfer 	size_t i;
466d49e1aeSJan Lentfer 
476d49e1aeSJan Lentfer 	for (i = 0; i < NUM_INTEG_ALGS; i++) {
486d49e1aeSJan Lentfer 		if (ikev2_integ_algs[i].id == id)
496d49e1aeSJan Lentfer 			return &ikev2_integ_algs[i];
506d49e1aeSJan Lentfer 	}
516d49e1aeSJan Lentfer 
526d49e1aeSJan Lentfer 	return NULL;
536d49e1aeSJan Lentfer }
546d49e1aeSJan Lentfer 
556d49e1aeSJan Lentfer 
ikev2_integ_hash(int alg,const u8 * key,size_t key_len,const u8 * data,size_t data_len,u8 * hash)566d49e1aeSJan Lentfer int ikev2_integ_hash(int alg, const u8 *key, size_t key_len, const u8 *data,
576d49e1aeSJan Lentfer 		     size_t data_len, u8 *hash)
586d49e1aeSJan Lentfer {
596d49e1aeSJan Lentfer 	u8 tmphash[IKEV2_MAX_HASH_LEN];
606d49e1aeSJan Lentfer 
616d49e1aeSJan Lentfer 	switch (alg) {
626d49e1aeSJan Lentfer 	case AUTH_HMAC_SHA1_96:
636d49e1aeSJan Lentfer 		if (key_len != 20)
646d49e1aeSJan Lentfer 			return -1;
65*a1157835SDaniel Fojt 		if (hmac_sha1(key, key_len, data, data_len, tmphash) < 0)
66*a1157835SDaniel Fojt 			return -1;
676d49e1aeSJan Lentfer 		os_memcpy(hash, tmphash, 12);
686d49e1aeSJan Lentfer 		break;
696d49e1aeSJan Lentfer 	case AUTH_HMAC_MD5_96:
706d49e1aeSJan Lentfer 		if (key_len != 16)
716d49e1aeSJan Lentfer 			return -1;
72*a1157835SDaniel Fojt 		if (hmac_md5(key, key_len, data, data_len, tmphash) < 0)
73*a1157835SDaniel Fojt 			return -1;
746d49e1aeSJan Lentfer 		os_memcpy(hash, tmphash, 12);
756d49e1aeSJan Lentfer 		break;
766d49e1aeSJan Lentfer 	default:
776d49e1aeSJan Lentfer 		return -1;
786d49e1aeSJan Lentfer 	}
796d49e1aeSJan Lentfer 
806d49e1aeSJan Lentfer 	return 0;
816d49e1aeSJan Lentfer }
826d49e1aeSJan Lentfer 
836d49e1aeSJan Lentfer 
ikev2_get_prf(int id)846d49e1aeSJan Lentfer const struct ikev2_prf_alg * ikev2_get_prf(int id)
856d49e1aeSJan Lentfer {
866d49e1aeSJan Lentfer 	size_t i;
876d49e1aeSJan Lentfer 
886d49e1aeSJan Lentfer 	for (i = 0; i < NUM_PRF_ALGS; i++) {
896d49e1aeSJan Lentfer 		if (ikev2_prf_algs[i].id == id)
906d49e1aeSJan Lentfer 			return &ikev2_prf_algs[i];
916d49e1aeSJan Lentfer 	}
926d49e1aeSJan Lentfer 
936d49e1aeSJan Lentfer 	return NULL;
946d49e1aeSJan Lentfer }
956d49e1aeSJan Lentfer 
966d49e1aeSJan Lentfer 
ikev2_prf_hash(int alg,const u8 * key,size_t key_len,size_t num_elem,const u8 * addr[],const size_t * len,u8 * hash)976d49e1aeSJan Lentfer int ikev2_prf_hash(int alg, const u8 *key, size_t key_len,
986d49e1aeSJan Lentfer 		   size_t num_elem, const u8 *addr[], const size_t *len,
996d49e1aeSJan Lentfer 		   u8 *hash)
1006d49e1aeSJan Lentfer {
1016d49e1aeSJan Lentfer 	switch (alg) {
1026d49e1aeSJan Lentfer 	case PRF_HMAC_SHA1:
103*a1157835SDaniel Fojt 		return hmac_sha1_vector(key, key_len, num_elem, addr, len,
104*a1157835SDaniel Fojt 					hash);
1056d49e1aeSJan Lentfer 	case PRF_HMAC_MD5:
106*a1157835SDaniel Fojt 		return hmac_md5_vector(key, key_len, num_elem, addr, len, hash);
1076d49e1aeSJan Lentfer 	default:
1086d49e1aeSJan Lentfer 		return -1;
1096d49e1aeSJan Lentfer 	}
1106d49e1aeSJan Lentfer }
1116d49e1aeSJan Lentfer 
1126d49e1aeSJan Lentfer 
ikev2_prf_plus(int alg,const u8 * key,size_t key_len,const u8 * data,size_t data_len,u8 * out,size_t out_len)1136d49e1aeSJan Lentfer int ikev2_prf_plus(int alg, const u8 *key, size_t key_len,
1146d49e1aeSJan Lentfer 		   const u8 *data, size_t data_len,
1156d49e1aeSJan Lentfer 		   u8 *out, size_t out_len)
1166d49e1aeSJan Lentfer {
1176d49e1aeSJan Lentfer 	u8 hash[IKEV2_MAX_HASH_LEN];
1186d49e1aeSJan Lentfer 	size_t hash_len;
1196d49e1aeSJan Lentfer 	u8 iter, *pos, *end;
1206d49e1aeSJan Lentfer 	const u8 *addr[3];
1216d49e1aeSJan Lentfer 	size_t len[3];
1226d49e1aeSJan Lentfer 	const struct ikev2_prf_alg *prf;
1236d49e1aeSJan Lentfer 	int res;
1246d49e1aeSJan Lentfer 
1256d49e1aeSJan Lentfer 	prf = ikev2_get_prf(alg);
1266d49e1aeSJan Lentfer 	if (prf == NULL)
1276d49e1aeSJan Lentfer 		return -1;
1286d49e1aeSJan Lentfer 	hash_len = prf->hash_len;
1296d49e1aeSJan Lentfer 
1306d49e1aeSJan Lentfer 	addr[0] = hash;
1316d49e1aeSJan Lentfer 	len[0] = hash_len;
1326d49e1aeSJan Lentfer 	addr[1] = data;
1336d49e1aeSJan Lentfer 	len[1] = data_len;
1346d49e1aeSJan Lentfer 	addr[2] = &iter;
1356d49e1aeSJan Lentfer 	len[2] = 1;
1366d49e1aeSJan Lentfer 
1376d49e1aeSJan Lentfer 	pos = out;
1386d49e1aeSJan Lentfer 	end = out + out_len;
1396d49e1aeSJan Lentfer 	iter = 1;
1406d49e1aeSJan Lentfer 	while (pos < end) {
1416d49e1aeSJan Lentfer 		size_t clen;
1426d49e1aeSJan Lentfer 		if (iter == 1)
1436d49e1aeSJan Lentfer 			res = ikev2_prf_hash(alg, key, key_len, 2, &addr[1],
1446d49e1aeSJan Lentfer 					     &len[1], hash);
1456d49e1aeSJan Lentfer 		else
1466d49e1aeSJan Lentfer 			res = ikev2_prf_hash(alg, key, key_len, 3, addr, len,
1476d49e1aeSJan Lentfer 					     hash);
1486d49e1aeSJan Lentfer 		if (res < 0)
1496d49e1aeSJan Lentfer 			return -1;
1506d49e1aeSJan Lentfer 		clen = hash_len;
1516d49e1aeSJan Lentfer 		if ((int) clen > end - pos)
1526d49e1aeSJan Lentfer 			clen = end - pos;
1536d49e1aeSJan Lentfer 		os_memcpy(pos, hash, clen);
1546d49e1aeSJan Lentfer 		pos += clen;
1556d49e1aeSJan Lentfer 		iter++;
1566d49e1aeSJan Lentfer 	}
1576d49e1aeSJan Lentfer 
1586d49e1aeSJan Lentfer 	return 0;
1596d49e1aeSJan Lentfer }
1606d49e1aeSJan Lentfer 
1616d49e1aeSJan Lentfer 
ikev2_get_encr(int id)1626d49e1aeSJan Lentfer const struct ikev2_encr_alg * ikev2_get_encr(int id)
1636d49e1aeSJan Lentfer {
1646d49e1aeSJan Lentfer 	size_t i;
1656d49e1aeSJan Lentfer 
1666d49e1aeSJan Lentfer 	for (i = 0; i < NUM_ENCR_ALGS; i++) {
1676d49e1aeSJan Lentfer 		if (ikev2_encr_algs[i].id == id)
1686d49e1aeSJan Lentfer 			return &ikev2_encr_algs[i];
1696d49e1aeSJan Lentfer 	}
1706d49e1aeSJan Lentfer 
1716d49e1aeSJan Lentfer 	return NULL;
1726d49e1aeSJan Lentfer }
1736d49e1aeSJan Lentfer 
1746d49e1aeSJan Lentfer 
ikev2_encr_encrypt(int alg,const u8 * key,size_t key_len,const u8 * iv,const u8 * plain,u8 * crypt,size_t len)1756d49e1aeSJan Lentfer int ikev2_encr_encrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
1766d49e1aeSJan Lentfer 		       const u8 *plain, u8 *crypt, size_t len)
1776d49e1aeSJan Lentfer {
1786d49e1aeSJan Lentfer 	struct crypto_cipher *cipher;
1796d49e1aeSJan Lentfer 	int encr_alg;
1806d49e1aeSJan Lentfer 
1816d49e1aeSJan Lentfer 	switch (alg) {
1826d49e1aeSJan Lentfer 	case ENCR_3DES:
1836d49e1aeSJan Lentfer 		encr_alg = CRYPTO_CIPHER_ALG_3DES;
1846d49e1aeSJan Lentfer 		break;
1856d49e1aeSJan Lentfer 	case ENCR_AES_CBC:
1866d49e1aeSJan Lentfer 		encr_alg = CRYPTO_CIPHER_ALG_AES;
1876d49e1aeSJan Lentfer 		break;
1886d49e1aeSJan Lentfer 	default:
1896d49e1aeSJan Lentfer 		wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
1906d49e1aeSJan Lentfer 		return -1;
1916d49e1aeSJan Lentfer 	}
1926d49e1aeSJan Lentfer 
1936d49e1aeSJan Lentfer 	cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
1946d49e1aeSJan Lentfer 	if (cipher == NULL) {
1956d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
1966d49e1aeSJan Lentfer 		return -1;
1976d49e1aeSJan Lentfer 	}
1986d49e1aeSJan Lentfer 
1996d49e1aeSJan Lentfer 	if (crypto_cipher_encrypt(cipher, plain, crypt, len) < 0) {
2006d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Encryption failed");
2016d49e1aeSJan Lentfer 		crypto_cipher_deinit(cipher);
2026d49e1aeSJan Lentfer 		return -1;
2036d49e1aeSJan Lentfer 	}
2046d49e1aeSJan Lentfer 	crypto_cipher_deinit(cipher);
2056d49e1aeSJan Lentfer 
2066d49e1aeSJan Lentfer 	return 0;
2076d49e1aeSJan Lentfer }
2086d49e1aeSJan Lentfer 
2096d49e1aeSJan Lentfer 
ikev2_encr_decrypt(int alg,const u8 * key,size_t key_len,const u8 * iv,const u8 * crypt,u8 * plain,size_t len)2106d49e1aeSJan Lentfer int ikev2_encr_decrypt(int alg, const u8 *key, size_t key_len, const u8 *iv,
2116d49e1aeSJan Lentfer 		       const u8 *crypt, u8 *plain, size_t len)
2126d49e1aeSJan Lentfer {
2136d49e1aeSJan Lentfer 	struct crypto_cipher *cipher;
2146d49e1aeSJan Lentfer 	int encr_alg;
2156d49e1aeSJan Lentfer 
2166d49e1aeSJan Lentfer 	switch (alg) {
2176d49e1aeSJan Lentfer 	case ENCR_3DES:
2186d49e1aeSJan Lentfer 		encr_alg = CRYPTO_CIPHER_ALG_3DES;
2196d49e1aeSJan Lentfer 		break;
2206d49e1aeSJan Lentfer 	case ENCR_AES_CBC:
2216d49e1aeSJan Lentfer 		encr_alg = CRYPTO_CIPHER_ALG_AES;
2226d49e1aeSJan Lentfer 		break;
2236d49e1aeSJan Lentfer 	default:
2246d49e1aeSJan Lentfer 		wpa_printf(MSG_DEBUG, "IKEV2: Unsupported encr alg %d", alg);
2256d49e1aeSJan Lentfer 		return -1;
2266d49e1aeSJan Lentfer 	}
2276d49e1aeSJan Lentfer 
2286d49e1aeSJan Lentfer 	cipher = crypto_cipher_init(encr_alg, iv, key, key_len);
2296d49e1aeSJan Lentfer 	if (cipher == NULL) {
2306d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Failed to initialize cipher");
2316d49e1aeSJan Lentfer 		return -1;
2326d49e1aeSJan Lentfer 	}
2336d49e1aeSJan Lentfer 
2346d49e1aeSJan Lentfer 	if (crypto_cipher_decrypt(cipher, crypt, plain, len) < 0) {
2356d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Decryption failed");
2366d49e1aeSJan Lentfer 		crypto_cipher_deinit(cipher);
2376d49e1aeSJan Lentfer 		return -1;
2386d49e1aeSJan Lentfer 	}
2396d49e1aeSJan Lentfer 	crypto_cipher_deinit(cipher);
2406d49e1aeSJan Lentfer 
2416d49e1aeSJan Lentfer 	return 0;
2426d49e1aeSJan Lentfer }
2436d49e1aeSJan Lentfer 
2446d49e1aeSJan Lentfer 
ikev2_parse_payloads(struct ikev2_payloads * payloads,u8 next_payload,const u8 * pos,const u8 * end)2456d49e1aeSJan Lentfer int ikev2_parse_payloads(struct ikev2_payloads *payloads,
2466d49e1aeSJan Lentfer 			 u8 next_payload, const u8 *pos, const u8 *end)
2476d49e1aeSJan Lentfer {
2486d49e1aeSJan Lentfer 	const struct ikev2_payload_hdr *phdr;
2496d49e1aeSJan Lentfer 
2506d49e1aeSJan Lentfer 	os_memset(payloads, 0, sizeof(*payloads));
2516d49e1aeSJan Lentfer 
2526d49e1aeSJan Lentfer 	while (next_payload != IKEV2_PAYLOAD_NO_NEXT_PAYLOAD) {
253*a1157835SDaniel Fojt 		unsigned int plen, pdatalen, left;
2546d49e1aeSJan Lentfer 		const u8 *pdata;
2556d49e1aeSJan Lentfer 		wpa_printf(MSG_DEBUG, "IKEV2: Processing payload %u",
2566d49e1aeSJan Lentfer 			   next_payload);
257*a1157835SDaniel Fojt 		if (end < pos)
258*a1157835SDaniel Fojt 			return -1;
259*a1157835SDaniel Fojt 		left = end - pos;
260*a1157835SDaniel Fojt 		if (left < sizeof(*phdr)) {
2616d49e1aeSJan Lentfer 			wpa_printf(MSG_INFO, "IKEV2:   Too short message for "
2626d49e1aeSJan Lentfer 				   "payload header (left=%ld)",
2636d49e1aeSJan Lentfer 				   (long) (end - pos));
264*a1157835SDaniel Fojt 			return -1;
2656d49e1aeSJan Lentfer 		}
2666d49e1aeSJan Lentfer 		phdr = (const struct ikev2_payload_hdr *) pos;
2676d49e1aeSJan Lentfer 		plen = WPA_GET_BE16(phdr->payload_length);
268*a1157835SDaniel Fojt 		if (plen < sizeof(*phdr) || plen > left) {
2696d49e1aeSJan Lentfer 			wpa_printf(MSG_INFO, "IKEV2:   Invalid payload header "
2706d49e1aeSJan Lentfer 				   "length %d", plen);
2716d49e1aeSJan Lentfer 			return -1;
2726d49e1aeSJan Lentfer 		}
2736d49e1aeSJan Lentfer 
2746d49e1aeSJan Lentfer 		wpa_printf(MSG_DEBUG, "IKEV2:   Next Payload: %u  Flags: 0x%x"
275*a1157835SDaniel Fojt 			   "  Payload Length: %u",
2766d49e1aeSJan Lentfer 			   phdr->next_payload, phdr->flags, plen);
2776d49e1aeSJan Lentfer 
2786d49e1aeSJan Lentfer 		pdata = (const u8 *) (phdr + 1);
2796d49e1aeSJan Lentfer 		pdatalen = plen - sizeof(*phdr);
2806d49e1aeSJan Lentfer 
2816d49e1aeSJan Lentfer 		switch (next_payload) {
2826d49e1aeSJan Lentfer 		case IKEV2_PAYLOAD_SA:
2836d49e1aeSJan Lentfer 			wpa_printf(MSG_DEBUG, "IKEV2:   Payload: Security "
2846d49e1aeSJan Lentfer 				   "Association");
2856d49e1aeSJan Lentfer 			payloads->sa = pdata;
2866d49e1aeSJan Lentfer 			payloads->sa_len = pdatalen;
2876d49e1aeSJan Lentfer 			break;
2886d49e1aeSJan Lentfer 		case IKEV2_PAYLOAD_KEY_EXCHANGE:
2896d49e1aeSJan Lentfer 			wpa_printf(MSG_DEBUG, "IKEV2:   Payload: Key "
2906d49e1aeSJan Lentfer 				   "Exchange");
2916d49e1aeSJan Lentfer 			payloads->ke = pdata;
2926d49e1aeSJan Lentfer 			payloads->ke_len = pdatalen;
2936d49e1aeSJan Lentfer 			break;
2946d49e1aeSJan Lentfer 		case IKEV2_PAYLOAD_IDi:
2956d49e1aeSJan Lentfer 			wpa_printf(MSG_DEBUG, "IKEV2:   Payload: IDi");
2966d49e1aeSJan Lentfer 			payloads->idi = pdata;
2976d49e1aeSJan Lentfer 			payloads->idi_len = pdatalen;
2986d49e1aeSJan Lentfer 			break;
2996d49e1aeSJan Lentfer 		case IKEV2_PAYLOAD_IDr:
3006d49e1aeSJan Lentfer 			wpa_printf(MSG_DEBUG, "IKEV2:   Payload: IDr");
3016d49e1aeSJan Lentfer 			payloads->idr = pdata;
3026d49e1aeSJan Lentfer 			payloads->idr_len = pdatalen;
3036d49e1aeSJan Lentfer 			break;
3046d49e1aeSJan Lentfer 		case IKEV2_PAYLOAD_CERTIFICATE:
3056d49e1aeSJan Lentfer 			wpa_printf(MSG_DEBUG, "IKEV2:   Payload: Certificate");
3066d49e1aeSJan Lentfer 			payloads->cert = pdata;
3076d49e1aeSJan Lentfer 			payloads->cert_len = pdatalen;
3086d49e1aeSJan Lentfer 			break;
3096d49e1aeSJan Lentfer 		case IKEV2_PAYLOAD_AUTHENTICATION:
3106d49e1aeSJan Lentfer 			wpa_printf(MSG_DEBUG, "IKEV2:   Payload: "
3116d49e1aeSJan Lentfer 				   "Authentication");
3126d49e1aeSJan Lentfer 			payloads->auth = pdata;
3136d49e1aeSJan Lentfer 			payloads->auth_len = pdatalen;
3146d49e1aeSJan Lentfer 			break;
3156d49e1aeSJan Lentfer 		case IKEV2_PAYLOAD_NONCE:
3166d49e1aeSJan Lentfer 			wpa_printf(MSG_DEBUG, "IKEV2:   Payload: Nonce");
3176d49e1aeSJan Lentfer 			payloads->nonce = pdata;
3186d49e1aeSJan Lentfer 			payloads->nonce_len = pdatalen;
3196d49e1aeSJan Lentfer 			break;
3206d49e1aeSJan Lentfer 		case IKEV2_PAYLOAD_ENCRYPTED:
3216d49e1aeSJan Lentfer 			wpa_printf(MSG_DEBUG, "IKEV2:   Payload: Encrypted");
3226d49e1aeSJan Lentfer 			payloads->encrypted = pdata;
3236d49e1aeSJan Lentfer 			payloads->encrypted_len = pdatalen;
3246d49e1aeSJan Lentfer 			break;
3256d49e1aeSJan Lentfer 		case IKEV2_PAYLOAD_NOTIFICATION:
3266d49e1aeSJan Lentfer 			wpa_printf(MSG_DEBUG, "IKEV2:   Payload: "
3276d49e1aeSJan Lentfer 				   "Notification");
3286d49e1aeSJan Lentfer 			payloads->notification = pdata;
3296d49e1aeSJan Lentfer 			payloads->notification_len = pdatalen;
3306d49e1aeSJan Lentfer 			break;
3316d49e1aeSJan Lentfer 		default:
3326d49e1aeSJan Lentfer 			if (phdr->flags & IKEV2_PAYLOAD_FLAGS_CRITICAL) {
3336d49e1aeSJan Lentfer 				wpa_printf(MSG_INFO, "IKEV2:   Unsupported "
3346d49e1aeSJan Lentfer 					   "critical payload %u - reject the "
3356d49e1aeSJan Lentfer 					   "entire message", next_payload);
3366d49e1aeSJan Lentfer 				return -1;
3376d49e1aeSJan Lentfer 			} else {
3386d49e1aeSJan Lentfer 				wpa_printf(MSG_DEBUG, "IKEV2:   Skipped "
3396d49e1aeSJan Lentfer 					   "unsupported payload %u",
3406d49e1aeSJan Lentfer 					   next_payload);
3416d49e1aeSJan Lentfer 			}
3426d49e1aeSJan Lentfer 		}
3436d49e1aeSJan Lentfer 
3446d49e1aeSJan Lentfer 		if (next_payload == IKEV2_PAYLOAD_ENCRYPTED &&
3456d49e1aeSJan Lentfer 		    pos + plen == end) {
3466d49e1aeSJan Lentfer 			/*
3476d49e1aeSJan Lentfer 			 * Next Payload in the case of Encrypted Payload is
3486d49e1aeSJan Lentfer 			 * actually the payload type for the first embedded
3496d49e1aeSJan Lentfer 			 * payload.
3506d49e1aeSJan Lentfer 			 */
3516d49e1aeSJan Lentfer 			payloads->encr_next_payload = phdr->next_payload;
3526d49e1aeSJan Lentfer 			next_payload = IKEV2_PAYLOAD_NO_NEXT_PAYLOAD;
3536d49e1aeSJan Lentfer 		} else
3546d49e1aeSJan Lentfer 			next_payload = phdr->next_payload;
3556d49e1aeSJan Lentfer 
3566d49e1aeSJan Lentfer 		pos += plen;
3576d49e1aeSJan Lentfer 	}
3586d49e1aeSJan Lentfer 
3596d49e1aeSJan Lentfer 	if (pos != end) {
3606d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Unexpected extra data after "
3616d49e1aeSJan Lentfer 			   "payloads");
3626d49e1aeSJan Lentfer 		return -1;
3636d49e1aeSJan Lentfer 	}
3646d49e1aeSJan Lentfer 
3656d49e1aeSJan Lentfer 	return 0;
3666d49e1aeSJan Lentfer }
3676d49e1aeSJan Lentfer 
3686d49e1aeSJan Lentfer 
ikev2_derive_auth_data(int prf_alg,const struct wpabuf * sign_msg,const u8 * ID,size_t ID_len,u8 ID_type,struct ikev2_keys * keys,int initiator,const u8 * shared_secret,size_t shared_secret_len,const u8 * nonce,size_t nonce_len,const u8 * key_pad,size_t key_pad_len,u8 * auth_data)3696d49e1aeSJan Lentfer int ikev2_derive_auth_data(int prf_alg, const struct wpabuf *sign_msg,
3706d49e1aeSJan Lentfer 			   const u8 *ID, size_t ID_len, u8 ID_type,
3716d49e1aeSJan Lentfer 			   struct ikev2_keys *keys, int initiator,
3726d49e1aeSJan Lentfer 			   const u8 *shared_secret, size_t shared_secret_len,
3736d49e1aeSJan Lentfer 			   const u8 *nonce, size_t nonce_len,
3746d49e1aeSJan Lentfer 			   const u8 *key_pad, size_t key_pad_len,
3756d49e1aeSJan Lentfer 			   u8 *auth_data)
3766d49e1aeSJan Lentfer {
3776d49e1aeSJan Lentfer 	size_t sign_len, buf_len;
3786d49e1aeSJan Lentfer 	u8 *sign_data, *pos, *buf, hash[IKEV2_MAX_HASH_LEN];
3796d49e1aeSJan Lentfer 	const struct ikev2_prf_alg *prf;
3806d49e1aeSJan Lentfer 	const u8 *SK_p = initiator ? keys->SK_pi : keys->SK_pr;
3816d49e1aeSJan Lentfer 
3826d49e1aeSJan Lentfer 	prf = ikev2_get_prf(prf_alg);
3836d49e1aeSJan Lentfer 	if (sign_msg == NULL || ID == NULL || SK_p == NULL ||
3846d49e1aeSJan Lentfer 	    shared_secret == NULL || nonce == NULL || prf == NULL)
3856d49e1aeSJan Lentfer 		return -1;
3866d49e1aeSJan Lentfer 
3876d49e1aeSJan Lentfer 	/* prf(SK_pi/r,IDi/r') */
3886d49e1aeSJan Lentfer 	buf_len = 4 + ID_len;
3896d49e1aeSJan Lentfer 	buf = os_zalloc(buf_len);
3906d49e1aeSJan Lentfer 	if (buf == NULL)
3916d49e1aeSJan Lentfer 		return -1;
3926d49e1aeSJan Lentfer 	buf[0] = ID_type;
3936d49e1aeSJan Lentfer 	os_memcpy(buf + 4, ID, ID_len);
3946d49e1aeSJan Lentfer 	if (ikev2_prf_hash(prf->id, SK_p, keys->SK_prf_len,
3956d49e1aeSJan Lentfer 			   1, (const u8 **) &buf, &buf_len, hash) < 0) {
3966d49e1aeSJan Lentfer 		os_free(buf);
3976d49e1aeSJan Lentfer 		return -1;
3986d49e1aeSJan Lentfer 	}
3996d49e1aeSJan Lentfer 	os_free(buf);
4006d49e1aeSJan Lentfer 
4016d49e1aeSJan Lentfer 	/* sign_data = msg | Nr/i | prf(SK_pi/r,IDi/r') */
4026d49e1aeSJan Lentfer 	sign_len = wpabuf_len(sign_msg) + nonce_len + prf->hash_len;
4036d49e1aeSJan Lentfer 	sign_data = os_malloc(sign_len);
4046d49e1aeSJan Lentfer 	if (sign_data == NULL)
4056d49e1aeSJan Lentfer 		return -1;
4066d49e1aeSJan Lentfer 	pos = sign_data;
4076d49e1aeSJan Lentfer 	os_memcpy(pos, wpabuf_head(sign_msg), wpabuf_len(sign_msg));
4086d49e1aeSJan Lentfer 	pos += wpabuf_len(sign_msg);
4096d49e1aeSJan Lentfer 	os_memcpy(pos, nonce, nonce_len);
4106d49e1aeSJan Lentfer 	pos += nonce_len;
4116d49e1aeSJan Lentfer 	os_memcpy(pos, hash, prf->hash_len);
4126d49e1aeSJan Lentfer 
4136d49e1aeSJan Lentfer 	/* AUTH = prf(prf(Shared Secret, key pad, sign_data) */
4146d49e1aeSJan Lentfer 	if (ikev2_prf_hash(prf->id, shared_secret, shared_secret_len, 1,
4156d49e1aeSJan Lentfer 			   &key_pad, &key_pad_len, hash) < 0 ||
4166d49e1aeSJan Lentfer 	    ikev2_prf_hash(prf->id, hash, prf->hash_len, 1,
4176d49e1aeSJan Lentfer 			   (const u8 **) &sign_data, &sign_len, auth_data) < 0)
4186d49e1aeSJan Lentfer 	{
4196d49e1aeSJan Lentfer 		os_free(sign_data);
4206d49e1aeSJan Lentfer 		return -1;
4216d49e1aeSJan Lentfer 	}
4226d49e1aeSJan Lentfer 	os_free(sign_data);
4236d49e1aeSJan Lentfer 
4246d49e1aeSJan Lentfer 	return 0;
4256d49e1aeSJan Lentfer }
4266d49e1aeSJan Lentfer 
4276d49e1aeSJan Lentfer 
ikev2_decrypt_payload(int encr_id,int integ_id,struct ikev2_keys * keys,int initiator,const struct ikev2_hdr * hdr,const u8 * encrypted,size_t encrypted_len,size_t * res_len)4286d49e1aeSJan Lentfer u8 * ikev2_decrypt_payload(int encr_id, int integ_id,
4296d49e1aeSJan Lentfer 			   struct ikev2_keys *keys, int initiator,
4306d49e1aeSJan Lentfer 			   const struct ikev2_hdr *hdr,
4316d49e1aeSJan Lentfer 			   const u8 *encrypted, size_t encrypted_len,
4326d49e1aeSJan Lentfer 			   size_t *res_len)
4336d49e1aeSJan Lentfer {
4346d49e1aeSJan Lentfer 	size_t iv_len;
4356d49e1aeSJan Lentfer 	const u8 *pos, *end, *iv, *integ;
4366d49e1aeSJan Lentfer 	u8 hash[IKEV2_MAX_HASH_LEN], *decrypted;
4376d49e1aeSJan Lentfer 	size_t decrypted_len, pad_len;
4386d49e1aeSJan Lentfer 	const struct ikev2_integ_alg *integ_alg;
4396d49e1aeSJan Lentfer 	const struct ikev2_encr_alg *encr_alg;
4406d49e1aeSJan Lentfer 	const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
4416d49e1aeSJan Lentfer 	const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
4426d49e1aeSJan Lentfer 
4436d49e1aeSJan Lentfer 	if (encrypted == NULL) {
4446d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: No Encrypted payload in SA_AUTH");
4456d49e1aeSJan Lentfer 		return NULL;
4466d49e1aeSJan Lentfer 	}
4476d49e1aeSJan Lentfer 
4486d49e1aeSJan Lentfer 	encr_alg = ikev2_get_encr(encr_id);
4496d49e1aeSJan Lentfer 	if (encr_alg == NULL) {
4506d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type");
4516d49e1aeSJan Lentfer 		return NULL;
4526d49e1aeSJan Lentfer 	}
4536d49e1aeSJan Lentfer 	iv_len = encr_alg->block_size;
4546d49e1aeSJan Lentfer 
4556d49e1aeSJan Lentfer 	integ_alg = ikev2_get_integ(integ_id);
4566d49e1aeSJan Lentfer 	if (integ_alg == NULL) {
4576d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Unsupported intergrity type");
4586d49e1aeSJan Lentfer 		return NULL;
4596d49e1aeSJan Lentfer 	}
4606d49e1aeSJan Lentfer 
4616d49e1aeSJan Lentfer 	if (encrypted_len < iv_len + 1 + integ_alg->hash_len) {
4626d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: No room for IV or Integrity "
4636d49e1aeSJan Lentfer 			  "Checksum");
4646d49e1aeSJan Lentfer 		return NULL;
4656d49e1aeSJan Lentfer 	}
4666d49e1aeSJan Lentfer 
4676d49e1aeSJan Lentfer 	iv = encrypted;
4686d49e1aeSJan Lentfer 	pos = iv + iv_len;
4696d49e1aeSJan Lentfer 	end = encrypted + encrypted_len;
4706d49e1aeSJan Lentfer 	integ = end - integ_alg->hash_len;
4716d49e1aeSJan Lentfer 
4726d49e1aeSJan Lentfer 	if (SK_a == NULL) {
4736d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: No SK_a available");
4746d49e1aeSJan Lentfer 		return NULL;
4756d49e1aeSJan Lentfer 	}
4766d49e1aeSJan Lentfer 	if (ikev2_integ_hash(integ_id, SK_a, keys->SK_integ_len,
4776d49e1aeSJan Lentfer 			     (const u8 *) hdr,
4786d49e1aeSJan Lentfer 			     integ - (const u8 *) hdr, hash) < 0) {
4796d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Failed to calculate integrity "
4806d49e1aeSJan Lentfer 			   "hash");
4816d49e1aeSJan Lentfer 		return NULL;
4826d49e1aeSJan Lentfer 	}
483*a1157835SDaniel Fojt 	if (os_memcmp_const(integ, hash, integ_alg->hash_len) != 0) {
4846d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Incorrect Integrity Checksum "
4856d49e1aeSJan Lentfer 			   "Data");
4866d49e1aeSJan Lentfer 		return NULL;
4876d49e1aeSJan Lentfer 	}
4886d49e1aeSJan Lentfer 
4896d49e1aeSJan Lentfer 	if (SK_e == NULL) {
4906d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: No SK_e available");
4916d49e1aeSJan Lentfer 		return NULL;
4926d49e1aeSJan Lentfer 	}
4936d49e1aeSJan Lentfer 
4946d49e1aeSJan Lentfer 	decrypted_len = integ - pos;
4956d49e1aeSJan Lentfer 	decrypted = os_malloc(decrypted_len);
4966d49e1aeSJan Lentfer 	if (decrypted == NULL)
4976d49e1aeSJan Lentfer 		return NULL;
4986d49e1aeSJan Lentfer 
4996d49e1aeSJan Lentfer 	if (ikev2_encr_decrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv, pos,
5006d49e1aeSJan Lentfer 			       decrypted, decrypted_len) < 0) {
5016d49e1aeSJan Lentfer 		os_free(decrypted);
5026d49e1aeSJan Lentfer 		return NULL;
5036d49e1aeSJan Lentfer 	}
5046d49e1aeSJan Lentfer 
5056d49e1aeSJan Lentfer 	pad_len = decrypted[decrypted_len - 1];
5066d49e1aeSJan Lentfer 	if (decrypted_len < pad_len + 1) {
5076d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Invalid padding in encrypted "
5086d49e1aeSJan Lentfer 			   "payload");
5096d49e1aeSJan Lentfer 		os_free(decrypted);
5106d49e1aeSJan Lentfer 		return NULL;
5116d49e1aeSJan Lentfer 	}
5126d49e1aeSJan Lentfer 
5136d49e1aeSJan Lentfer 	decrypted_len -= pad_len + 1;
5146d49e1aeSJan Lentfer 
5156d49e1aeSJan Lentfer 	*res_len = decrypted_len;
5166d49e1aeSJan Lentfer 	return decrypted;
5176d49e1aeSJan Lentfer }
5186d49e1aeSJan Lentfer 
5196d49e1aeSJan Lentfer 
ikev2_update_hdr(struct wpabuf * msg)5206d49e1aeSJan Lentfer void ikev2_update_hdr(struct wpabuf *msg)
5216d49e1aeSJan Lentfer {
5226d49e1aeSJan Lentfer 	struct ikev2_hdr *hdr;
5236d49e1aeSJan Lentfer 
5246d49e1aeSJan Lentfer 	/* Update lenth field in HDR */
5256d49e1aeSJan Lentfer 	hdr = wpabuf_mhead(msg);
5266d49e1aeSJan Lentfer 	WPA_PUT_BE32(hdr->length, wpabuf_len(msg));
5276d49e1aeSJan Lentfer }
5286d49e1aeSJan Lentfer 
5296d49e1aeSJan Lentfer 
ikev2_build_encrypted(int encr_id,int integ_id,struct ikev2_keys * keys,int initiator,struct wpabuf * msg,struct wpabuf * plain,u8 next_payload)5306d49e1aeSJan Lentfer int ikev2_build_encrypted(int encr_id, int integ_id, struct ikev2_keys *keys,
5316d49e1aeSJan Lentfer 			  int initiator, struct wpabuf *msg,
5326d49e1aeSJan Lentfer 			  struct wpabuf *plain, u8 next_payload)
5336d49e1aeSJan Lentfer {
5346d49e1aeSJan Lentfer 	struct ikev2_payload_hdr *phdr;
5356d49e1aeSJan Lentfer 	size_t plen;
5366d49e1aeSJan Lentfer 	size_t iv_len, pad_len;
5376d49e1aeSJan Lentfer 	u8 *icv, *iv;
5386d49e1aeSJan Lentfer 	const struct ikev2_integ_alg *integ_alg;
5396d49e1aeSJan Lentfer 	const struct ikev2_encr_alg *encr_alg;
5406d49e1aeSJan Lentfer 	const u8 *SK_e = initiator ? keys->SK_ei : keys->SK_er;
5416d49e1aeSJan Lentfer 	const u8 *SK_a = initiator ? keys->SK_ai : keys->SK_ar;
5426d49e1aeSJan Lentfer 
5436d49e1aeSJan Lentfer 	wpa_printf(MSG_DEBUG, "IKEV2: Adding Encrypted payload");
5446d49e1aeSJan Lentfer 
5456d49e1aeSJan Lentfer 	/* Encr - RFC 4306, Sect. 3.14 */
5466d49e1aeSJan Lentfer 
5476d49e1aeSJan Lentfer 	encr_alg = ikev2_get_encr(encr_id);
5486d49e1aeSJan Lentfer 	if (encr_alg == NULL) {
5496d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Unsupported encryption type");
5506d49e1aeSJan Lentfer 		return -1;
5516d49e1aeSJan Lentfer 	}
5526d49e1aeSJan Lentfer 	iv_len = encr_alg->block_size;
5536d49e1aeSJan Lentfer 
5546d49e1aeSJan Lentfer 	integ_alg = ikev2_get_integ(integ_id);
5556d49e1aeSJan Lentfer 	if (integ_alg == NULL) {
5566d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Unsupported intergrity type");
5576d49e1aeSJan Lentfer 		return -1;
5586d49e1aeSJan Lentfer 	}
5596d49e1aeSJan Lentfer 
5606d49e1aeSJan Lentfer 	if (SK_e == NULL) {
5616d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: No SK_e available");
5626d49e1aeSJan Lentfer 		return -1;
5636d49e1aeSJan Lentfer 	}
5646d49e1aeSJan Lentfer 
5656d49e1aeSJan Lentfer 	if (SK_a == NULL) {
5666d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: No SK_a available");
5676d49e1aeSJan Lentfer 		return -1;
5686d49e1aeSJan Lentfer 	}
5696d49e1aeSJan Lentfer 
5706d49e1aeSJan Lentfer 	phdr = wpabuf_put(msg, sizeof(*phdr));
5716d49e1aeSJan Lentfer 	phdr->next_payload = next_payload;
5726d49e1aeSJan Lentfer 	phdr->flags = 0;
5736d49e1aeSJan Lentfer 
5746d49e1aeSJan Lentfer 	iv = wpabuf_put(msg, iv_len);
5753ff40c12SJohn Marino 	if (random_get_bytes(iv, iv_len)) {
5766d49e1aeSJan Lentfer 		wpa_printf(MSG_INFO, "IKEV2: Could not generate IV");
5776d49e1aeSJan Lentfer 		return -1;
5786d49e1aeSJan Lentfer 	}
5796d49e1aeSJan Lentfer 
5806d49e1aeSJan Lentfer 	pad_len = iv_len - (wpabuf_len(plain) + 1) % iv_len;
5816d49e1aeSJan Lentfer 	if (pad_len == iv_len)
5826d49e1aeSJan Lentfer 		pad_len = 0;
5836d49e1aeSJan Lentfer 	wpabuf_put(plain, pad_len);
5846d49e1aeSJan Lentfer 	wpabuf_put_u8(plain, pad_len);
5856d49e1aeSJan Lentfer 
5866d49e1aeSJan Lentfer 	if (ikev2_encr_encrypt(encr_alg->id, SK_e, keys->SK_encr_len, iv,
5876d49e1aeSJan Lentfer 			       wpabuf_head(plain), wpabuf_mhead(plain),
5886d49e1aeSJan Lentfer 			       wpabuf_len(plain)) < 0)
5896d49e1aeSJan Lentfer 		return -1;
5906d49e1aeSJan Lentfer 
5916d49e1aeSJan Lentfer 	wpabuf_put_buf(msg, plain);
5926d49e1aeSJan Lentfer 
5936d49e1aeSJan Lentfer 	/* Need to update all headers (Length fields) prior to hash func */
5946d49e1aeSJan Lentfer 	icv = wpabuf_put(msg, integ_alg->hash_len);
5956d49e1aeSJan Lentfer 	plen = (u8 *) wpabuf_put(msg, 0) - (u8 *) phdr;
5966d49e1aeSJan Lentfer 	WPA_PUT_BE16(phdr->payload_length, plen);
5976d49e1aeSJan Lentfer 
5986d49e1aeSJan Lentfer 	ikev2_update_hdr(msg);
5996d49e1aeSJan Lentfer 
6006d49e1aeSJan Lentfer 	return ikev2_integ_hash(integ_id, SK_a, keys->SK_integ_len,
6016d49e1aeSJan Lentfer 				wpabuf_head(msg),
6026d49e1aeSJan Lentfer 				wpabuf_len(msg) - integ_alg->hash_len, icv);
6036d49e1aeSJan Lentfer 
6046d49e1aeSJan Lentfer 	return 0;
6056d49e1aeSJan Lentfer }
6066d49e1aeSJan Lentfer 
6076d49e1aeSJan Lentfer 
ikev2_keys_set(struct ikev2_keys * keys)6086d49e1aeSJan Lentfer int ikev2_keys_set(struct ikev2_keys *keys)
6096d49e1aeSJan Lentfer {
6106d49e1aeSJan Lentfer 	return keys->SK_d && keys->SK_ai && keys->SK_ar && keys->SK_ei &&
6116d49e1aeSJan Lentfer 		keys->SK_er && keys->SK_pi && keys->SK_pr;
6126d49e1aeSJan Lentfer }
6136d49e1aeSJan Lentfer 
6146d49e1aeSJan Lentfer 
ikev2_free_keys(struct ikev2_keys * keys)6156d49e1aeSJan Lentfer void ikev2_free_keys(struct ikev2_keys *keys)
6166d49e1aeSJan Lentfer {
6176d49e1aeSJan Lentfer 	os_free(keys->SK_d);
6186d49e1aeSJan Lentfer 	os_free(keys->SK_ai);
6196d49e1aeSJan Lentfer 	os_free(keys->SK_ar);
6206d49e1aeSJan Lentfer 	os_free(keys->SK_ei);
6216d49e1aeSJan Lentfer 	os_free(keys->SK_er);
6226d49e1aeSJan Lentfer 	os_free(keys->SK_pi);
6236d49e1aeSJan Lentfer 	os_free(keys->SK_pr);
6246d49e1aeSJan Lentfer 	keys->SK_d = keys->SK_ai = keys->SK_ar = keys->SK_ei = keys->SK_er =
6256d49e1aeSJan Lentfer 		keys->SK_pi = keys->SK_pr = NULL;
6266d49e1aeSJan Lentfer }
6276d49e1aeSJan Lentfer 
6286d49e1aeSJan Lentfer 
ikev2_derive_sk_keys(const struct ikev2_prf_alg * prf,const struct ikev2_integ_alg * integ,const struct ikev2_encr_alg * encr,const u8 * skeyseed,const u8 * data,size_t data_len,struct ikev2_keys * keys)6296d49e1aeSJan Lentfer int ikev2_derive_sk_keys(const struct ikev2_prf_alg *prf,
6306d49e1aeSJan Lentfer 			 const struct ikev2_integ_alg *integ,
6316d49e1aeSJan Lentfer 			 const struct ikev2_encr_alg *encr,
6326d49e1aeSJan Lentfer 			 const u8 *skeyseed, const u8 *data, size_t data_len,
6336d49e1aeSJan Lentfer 			 struct ikev2_keys *keys)
6346d49e1aeSJan Lentfer {
6356d49e1aeSJan Lentfer 	u8 *keybuf, *pos;
6366d49e1aeSJan Lentfer 	size_t keybuf_len;
6376d49e1aeSJan Lentfer 
6386d49e1aeSJan Lentfer 	/*
6396d49e1aeSJan Lentfer 	 * {SK_d | SK_ai | SK_ar | SK_ei | SK_er | SK_pi | SK_pr } =
6406d49e1aeSJan Lentfer 	 *	prf+(SKEYSEED, Ni | Nr | SPIi | SPIr )
6416d49e1aeSJan Lentfer 	 */
6426d49e1aeSJan Lentfer 	ikev2_free_keys(keys);
6436d49e1aeSJan Lentfer 	keys->SK_d_len = prf->key_len;
6446d49e1aeSJan Lentfer 	keys->SK_integ_len = integ->key_len;
6456d49e1aeSJan Lentfer 	keys->SK_encr_len = encr->key_len;
6466d49e1aeSJan Lentfer 	keys->SK_prf_len = prf->key_len;
6476d49e1aeSJan Lentfer 
6486d49e1aeSJan Lentfer 	keybuf_len = keys->SK_d_len + 2 * keys->SK_integ_len +
6496d49e1aeSJan Lentfer 		2 * keys->SK_encr_len + 2 * keys->SK_prf_len;
6506d49e1aeSJan Lentfer 	keybuf = os_malloc(keybuf_len);
6516d49e1aeSJan Lentfer 	if (keybuf == NULL)
6526d49e1aeSJan Lentfer 		return -1;
6536d49e1aeSJan Lentfer 
6546d49e1aeSJan Lentfer 	if (ikev2_prf_plus(prf->id, skeyseed, prf->hash_len,
6556d49e1aeSJan Lentfer 			   data, data_len, keybuf, keybuf_len)) {
6566d49e1aeSJan Lentfer 		os_free(keybuf);
6576d49e1aeSJan Lentfer 		return -1;
6586d49e1aeSJan Lentfer 	}
6596d49e1aeSJan Lentfer 
6606d49e1aeSJan Lentfer 	pos = keybuf;
6616d49e1aeSJan Lentfer 
6626d49e1aeSJan Lentfer 	keys->SK_d = os_malloc(keys->SK_d_len);
6636d49e1aeSJan Lentfer 	if (keys->SK_d) {
6646d49e1aeSJan Lentfer 		os_memcpy(keys->SK_d, pos, keys->SK_d_len);
6656d49e1aeSJan Lentfer 		wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_d",
6666d49e1aeSJan Lentfer 				keys->SK_d, keys->SK_d_len);
6676d49e1aeSJan Lentfer 	}
6686d49e1aeSJan Lentfer 	pos += keys->SK_d_len;
6696d49e1aeSJan Lentfer 
6706d49e1aeSJan Lentfer 	keys->SK_ai = os_malloc(keys->SK_integ_len);
6716d49e1aeSJan Lentfer 	if (keys->SK_ai) {
6726d49e1aeSJan Lentfer 		os_memcpy(keys->SK_ai, pos, keys->SK_integ_len);
6736d49e1aeSJan Lentfer 		wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_ai",
6746d49e1aeSJan Lentfer 				keys->SK_ai, keys->SK_integ_len);
6756d49e1aeSJan Lentfer 	}
6766d49e1aeSJan Lentfer 	pos += keys->SK_integ_len;
6776d49e1aeSJan Lentfer 
6786d49e1aeSJan Lentfer 	keys->SK_ar = os_malloc(keys->SK_integ_len);
6796d49e1aeSJan Lentfer 	if (keys->SK_ar) {
6806d49e1aeSJan Lentfer 		os_memcpy(keys->SK_ar, pos, keys->SK_integ_len);
6816d49e1aeSJan Lentfer 		wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_ar",
6826d49e1aeSJan Lentfer 				keys->SK_ar, keys->SK_integ_len);
6836d49e1aeSJan Lentfer 	}
6846d49e1aeSJan Lentfer 	pos += keys->SK_integ_len;
6856d49e1aeSJan Lentfer 
6866d49e1aeSJan Lentfer 	keys->SK_ei = os_malloc(keys->SK_encr_len);
6876d49e1aeSJan Lentfer 	if (keys->SK_ei) {
6886d49e1aeSJan Lentfer 		os_memcpy(keys->SK_ei, pos, keys->SK_encr_len);
6896d49e1aeSJan Lentfer 		wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_ei",
6906d49e1aeSJan Lentfer 				keys->SK_ei, keys->SK_encr_len);
6916d49e1aeSJan Lentfer 	}
6926d49e1aeSJan Lentfer 	pos += keys->SK_encr_len;
6936d49e1aeSJan Lentfer 
6946d49e1aeSJan Lentfer 	keys->SK_er = os_malloc(keys->SK_encr_len);
6956d49e1aeSJan Lentfer 	if (keys->SK_er) {
6966d49e1aeSJan Lentfer 		os_memcpy(keys->SK_er, pos, keys->SK_encr_len);
6976d49e1aeSJan Lentfer 		wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_er",
6986d49e1aeSJan Lentfer 				keys->SK_er, keys->SK_encr_len);
6996d49e1aeSJan Lentfer 	}
7006d49e1aeSJan Lentfer 	pos += keys->SK_encr_len;
7016d49e1aeSJan Lentfer 
7026d49e1aeSJan Lentfer 	keys->SK_pi = os_malloc(keys->SK_prf_len);
7036d49e1aeSJan Lentfer 	if (keys->SK_pi) {
7046d49e1aeSJan Lentfer 		os_memcpy(keys->SK_pi, pos, keys->SK_prf_len);
7056d49e1aeSJan Lentfer 		wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_pi",
7066d49e1aeSJan Lentfer 				keys->SK_pi, keys->SK_prf_len);
7076d49e1aeSJan Lentfer 	}
7086d49e1aeSJan Lentfer 	pos += keys->SK_prf_len;
7096d49e1aeSJan Lentfer 
7106d49e1aeSJan Lentfer 	keys->SK_pr = os_malloc(keys->SK_prf_len);
7116d49e1aeSJan Lentfer 	if (keys->SK_pr) {
7126d49e1aeSJan Lentfer 		os_memcpy(keys->SK_pr, pos, keys->SK_prf_len);
7136d49e1aeSJan Lentfer 		wpa_hexdump_key(MSG_DEBUG, "IKEV2: SK_pr",
7146d49e1aeSJan Lentfer 				keys->SK_pr, keys->SK_prf_len);
7156d49e1aeSJan Lentfer 	}
7166d49e1aeSJan Lentfer 
7176d49e1aeSJan Lentfer 	os_free(keybuf);
7186d49e1aeSJan Lentfer 
7196d49e1aeSJan Lentfer 	if (!ikev2_keys_set(keys)) {
7206d49e1aeSJan Lentfer 		ikev2_free_keys(keys);
7216d49e1aeSJan Lentfer 		return -1;
7226d49e1aeSJan Lentfer 	}
7236d49e1aeSJan Lentfer 
7246d49e1aeSJan Lentfer 	return 0;
7256d49e1aeSJan Lentfer }
726