Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Chuck Lever | 1688 | 100.00% | 7 | 100.00% |
Total | 1688 | 7 |
// SPDX-License-Identifier: GPL-2.0-only /* * Establish a TLS session for a kernel socket consumer * using the tlshd user space handler. * * Author: Chuck Lever <chuck.lever@oracle.com> * * Copyright (c) 2021-2023, Oracle and/or its affiliates. */ #include <linux/types.h> #include <linux/socket.h> #include <linux/kernel.h> #include <linux/module.h> #include <linux/slab.h> #include <linux/key.h> #include <net/sock.h> #include <net/handshake.h> #include <net/genetlink.h> #include <net/tls_prot.h> #include <uapi/linux/keyctl.h> #include <uapi/linux/handshake.h> #include "handshake.h" struct tls_handshake_req { void (*th_consumer_done)(void *data, int status, key_serial_t peerid); void *th_consumer_data; int th_type; unsigned int th_timeout_ms; int th_auth_mode; const char *th_peername; key_serial_t th_keyring; key_serial_t th_certificate; key_serial_t th_privkey; unsigned int th_num_peerids; key_serial_t th_peerid[5]; }; static struct tls_handshake_req * tls_handshake_req_init(struct handshake_req *req, const struct tls_handshake_args *args) { struct tls_handshake_req *treq = handshake_req_private(req); treq->th_timeout_ms = args->ta_timeout_ms; treq->th_consumer_done = args->ta_done; treq->th_consumer_data = args->ta_data; treq->th_peername = args->ta_peername; treq->th_keyring = args->ta_keyring; treq->th_num_peerids = 0; treq->th_certificate = TLS_NO_CERT; treq->th_privkey = TLS_NO_PRIVKEY; return treq; } static void tls_handshake_remote_peerids(struct tls_handshake_req *treq, struct genl_info *info) { struct nlattr *head = nlmsg_attrdata(info->nlhdr, GENL_HDRLEN); int rem, len = nlmsg_attrlen(info->nlhdr, GENL_HDRLEN); struct nlattr *nla; unsigned int i; i = 0; nla_for_each_attr(nla, head, len, rem) { if (nla_type(nla) == HANDSHAKE_A_DONE_REMOTE_AUTH) i++; } if (!i) return; treq->th_num_peerids = min_t(unsigned int, i, ARRAY_SIZE(treq->th_peerid)); i = 0; nla_for_each_attr(nla, head, len, rem) { if (nla_type(nla) == HANDSHAKE_A_DONE_REMOTE_AUTH) treq->th_peerid[i++] = nla_get_u32(nla); if (i >= treq->th_num_peerids) break; } } /** * tls_handshake_done - callback to handle a CMD_DONE request * @req: socket on which the handshake was performed * @status: session status code * @info: full results of session establishment * */ static void tls_handshake_done(struct handshake_req *req, unsigned int status, struct genl_info *info) { struct tls_handshake_req *treq = handshake_req_private(req); treq->th_peerid[0] = TLS_NO_PEERID; if (info) tls_handshake_remote_peerids(treq, info); if (!status) set_bit(HANDSHAKE_F_REQ_SESSION, &req->hr_flags); treq->th_consumer_done(treq->th_consumer_data, -status, treq->th_peerid[0]); } #if IS_ENABLED(CONFIG_KEYS) static int tls_handshake_private_keyring(struct tls_handshake_req *treq) { key_ref_t process_keyring_ref, keyring_ref; int ret; if (treq->th_keyring == TLS_NO_KEYRING) return 0; process_keyring_ref = lookup_user_key(KEY_SPEC_PROCESS_KEYRING, KEY_LOOKUP_CREATE, KEY_NEED_WRITE); if (IS_ERR(process_keyring_ref)) { ret = PTR_ERR(process_keyring_ref); goto out; } keyring_ref = lookup_user_key(treq->th_keyring, KEY_LOOKUP_CREATE, KEY_NEED_LINK); if (IS_ERR(keyring_ref)) { ret = PTR_ERR(keyring_ref); goto out_put_key; } ret = key_link(key_ref_to_ptr(process_keyring_ref), key_ref_to_ptr(keyring_ref)); key_ref_put(keyring_ref); out_put_key: key_ref_put(process_keyring_ref); out: return ret; } #else static int tls_handshake_private_keyring(struct tls_handshake_req *treq) { return 0; } #endif static int tls_handshake_put_peer_identity(struct sk_buff *msg, struct tls_handshake_req *treq) { unsigned int i; for (i = 0; i < treq->th_num_peerids; i++) if (nla_put_u32(msg, HANDSHAKE_A_ACCEPT_PEER_IDENTITY, treq->th_peerid[i]) < 0) return -EMSGSIZE; return 0; } static int tls_handshake_put_certificate(struct sk_buff *msg, struct tls_handshake_req *treq) { struct nlattr *entry_attr; if (treq->th_certificate == TLS_NO_CERT && treq->th_privkey == TLS_NO_PRIVKEY) return 0; entry_attr = nla_nest_start(msg, HANDSHAKE_A_ACCEPT_CERTIFICATE); if (!entry_attr) return -EMSGSIZE; if (nla_put_s32(msg, HANDSHAKE_A_X509_CERT, treq->th_certificate) || nla_put_s32(msg, HANDSHAKE_A_X509_PRIVKEY, treq->th_privkey)) { nla_nest_cancel(msg, entry_attr); return -EMSGSIZE; } nla_nest_end(msg, entry_attr); return 0; } /** * tls_handshake_accept - callback to construct a CMD_ACCEPT response * @req: handshake parameters to return * @info: generic netlink message context * @fd: file descriptor to be returned * * Returns zero on success, or a negative errno on failure. */ static int tls_handshake_accept(struct handshake_req *req, struct genl_info *info, int fd) { struct tls_handshake_req *treq = handshake_req_private(req); struct nlmsghdr *hdr; struct sk_buff *msg; int ret; ret = tls_handshake_private_keyring(treq); if (ret < 0) goto out; ret = -ENOMEM; msg = genlmsg_new(GENLMSG_DEFAULT_SIZE, GFP_KERNEL); if (!msg) goto out; hdr = handshake_genl_put(msg, info); if (!hdr) goto out_cancel; ret = -EMSGSIZE; ret = nla_put_s32(msg, HANDSHAKE_A_ACCEPT_SOCKFD, fd); if (ret < 0) goto out_cancel; ret = nla_put_u32(msg, HANDSHAKE_A_ACCEPT_MESSAGE_TYPE, treq->th_type); if (ret < 0) goto out_cancel; if (treq->th_peername) { ret = nla_put_string(msg, HANDSHAKE_A_ACCEPT_PEERNAME, treq->th_peername); if (ret < 0) goto out_cancel; } if (treq->th_timeout_ms) { ret = nla_put_u32(msg, HANDSHAKE_A_ACCEPT_TIMEOUT, treq->th_timeout_ms); if (ret < 0) goto out_cancel; } ret = nla_put_u32(msg, HANDSHAKE_A_ACCEPT_AUTH_MODE, treq->th_auth_mode); if (ret < 0) goto out_cancel; switch (treq->th_auth_mode) { case HANDSHAKE_AUTH_PSK: ret = tls_handshake_put_peer_identity(msg, treq); if (ret < 0) goto out_cancel; break; case HANDSHAKE_AUTH_X509: ret = tls_handshake_put_certificate(msg, treq); if (ret < 0) goto out_cancel; break; } genlmsg_end(msg, hdr); return genlmsg_reply(msg, info); out_cancel: genlmsg_cancel(msg, hdr); out: return ret; } static const struct handshake_proto tls_handshake_proto = { .hp_handler_class = HANDSHAKE_HANDLER_CLASS_TLSHD, .hp_privsize = sizeof(struct tls_handshake_req), .hp_flags = BIT(HANDSHAKE_F_PROTO_NOTIFY), .hp_accept = tls_handshake_accept, .hp_done = tls_handshake_done, }; /** * tls_client_hello_anon - request an anonymous TLS handshake on a socket * @args: socket and handshake parameters for this request * @flags: memory allocation control flags * * Return values: * %0: Handshake request enqueue; ->done will be called when complete * %-ESRCH: No user agent is available * %-ENOMEM: Memory allocation failed */ int tls_client_hello_anon(const struct tls_handshake_args *args, gfp_t flags) { struct tls_handshake_req *treq; struct handshake_req *req; req = handshake_req_alloc(&tls_handshake_proto, flags); if (!req) return -ENOMEM; treq = tls_handshake_req_init(req, args); treq->th_type = HANDSHAKE_MSG_TYPE_CLIENTHELLO; treq->th_auth_mode = HANDSHAKE_AUTH_UNAUTH; return handshake_req_submit(args->ta_sock, req, flags); } EXPORT_SYMBOL(tls_client_hello_anon); /** * tls_client_hello_x509 - request an x.509-based TLS handshake on a socket * @args: socket and handshake parameters for this request * @flags: memory allocation control flags * * Return values: * %0: Handshake request enqueue; ->done will be called when complete * %-ESRCH: No user agent is available * %-ENOMEM: Memory allocation failed */ int tls_client_hello_x509(const struct tls_handshake_args *args, gfp_t flags) { struct tls_handshake_req *treq; struct handshake_req *req; req = handshake_req_alloc(&tls_handshake_proto, flags); if (!req) return -ENOMEM; treq = tls_handshake_req_init(req, args); treq->th_type = HANDSHAKE_MSG_TYPE_CLIENTHELLO; treq->th_auth_mode = HANDSHAKE_AUTH_X509; treq->th_certificate = args->ta_my_cert; treq->th_privkey = args->ta_my_privkey; return handshake_req_submit(args->ta_sock, req, flags); } EXPORT_SYMBOL(tls_client_hello_x509); /** * tls_client_hello_psk - request a PSK-based TLS handshake on a socket * @args: socket and handshake parameters for this request * @flags: memory allocation control flags * * Return values: * %0: Handshake request enqueue; ->done will be called when complete * %-EINVAL: Wrong number of local peer IDs * %-ESRCH: No user agent is available * %-ENOMEM: Memory allocation failed */ int tls_client_hello_psk(const struct tls_handshake_args *args, gfp_t flags) { struct tls_handshake_req *treq; struct handshake_req *req; unsigned int i; if (!args->ta_num_peerids || args->ta_num_peerids > ARRAY_SIZE(treq->th_peerid)) return -EINVAL; req = handshake_req_alloc(&tls_handshake_proto, flags); if (!req) return -ENOMEM; treq = tls_handshake_req_init(req, args); treq->th_type = HANDSHAKE_MSG_TYPE_CLIENTHELLO; treq->th_auth_mode = HANDSHAKE_AUTH_PSK; treq->th_num_peerids = args->ta_num_peerids; for (i = 0; i < args->ta_num_peerids; i++) treq->th_peerid[i] = args->ta_my_peerids[i]; return handshake_req_submit(args->ta_sock, req, flags); } EXPORT_SYMBOL(tls_client_hello_psk); /** * tls_server_hello_x509 - request a server TLS handshake on a socket * @args: socket and handshake parameters for this request * @flags: memory allocation control flags * * Return values: * %0: Handshake request enqueue; ->done will be called when complete * %-ESRCH: No user agent is available * %-ENOMEM: Memory allocation failed */ int tls_server_hello_x509(const struct tls_handshake_args *args, gfp_t flags) { struct tls_handshake_req *treq; struct handshake_req *req; req = handshake_req_alloc(&tls_handshake_proto, flags); if (!req) return -ENOMEM; treq = tls_handshake_req_init(req, args); treq->th_type = HANDSHAKE_MSG_TYPE_SERVERHELLO; treq->th_auth_mode = HANDSHAKE_AUTH_X509; treq->th_certificate = args->ta_my_cert; treq->th_privkey = args->ta_my_privkey; return handshake_req_submit(args->ta_sock, req, flags); } EXPORT_SYMBOL(tls_server_hello_x509); /** * tls_server_hello_psk - request a server TLS handshake on a socket * @args: socket and handshake parameters for this request * @flags: memory allocation control flags * * Return values: * %0: Handshake request enqueue; ->done will be called when complete * %-ESRCH: No user agent is available * %-ENOMEM: Memory allocation failed */ int tls_server_hello_psk(const struct tls_handshake_args *args, gfp_t flags) { struct tls_handshake_req *treq; struct handshake_req *req; req = handshake_req_alloc(&tls_handshake_proto, flags); if (!req) return -ENOMEM; treq = tls_handshake_req_init(req, args); treq->th_type = HANDSHAKE_MSG_TYPE_SERVERHELLO; treq->th_auth_mode = HANDSHAKE_AUTH_PSK; treq->th_num_peerids = 1; treq->th_peerid[0] = args->ta_my_peerids[0]; return handshake_req_submit(args->ta_sock, req, flags); } EXPORT_SYMBOL(tls_server_hello_psk); /** * tls_handshake_cancel - cancel a pending handshake * @sk: socket on which there is an ongoing handshake * * Request cancellation races with request completion. To determine * who won, callers examine the return value from this function. * * Return values: * %true - Uncompleted handshake request was canceled * %false - Handshake request already completed or not found */ bool tls_handshake_cancel(struct sock *sk) { return handshake_req_cancel(sk); } EXPORT_SYMBOL(tls_handshake_cancel); /** * tls_handshake_close - send a Closure alert * @sock: an open socket * */ void tls_handshake_close(struct socket *sock) { struct handshake_req *req; req = handshake_req_hash_lookup(sock->sk); if (!req) return; if (!test_and_clear_bit(HANDSHAKE_F_REQ_SESSION, &req->hr_flags)) return; tls_alert_send(sock, TLS_ALERT_LEVEL_WARNING, TLS_ALERT_DESC_CLOSE_NOTIFY); } EXPORT_SYMBOL(tls_handshake_close);
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1