1*043036a2SApple OSS Distributions #include <darwintest.h>
2*043036a2SApple OSS Distributions #include <darwintest_utils.h>
3*043036a2SApple OSS Distributions #include <dispatch/dispatch.h>
4*043036a2SApple OSS Distributions #include <net/if_var_private.h>
5*043036a2SApple OSS Distributions #include <System/net/pfkeyv2.h>
6*043036a2SApple OSS Distributions #include <netinet6/ipsec.h>
7*043036a2SApple OSS Distributions #include <arpa/inet.h>
8*043036a2SApple OSS Distributions
9*043036a2SApple OSS Distributions T_GLOBAL_META(
10*043036a2SApple OSS Distributions T_META_NAMESPACE("xnu.pfkey"),
11*043036a2SApple OSS Distributions T_META_ASROOT(true),
12*043036a2SApple OSS Distributions T_META_RADAR_COMPONENT_NAME("xnu"),
13*043036a2SApple OSS Distributions T_META_RADAR_COMPONENT_VERSION("NetworkExtension"),
14*043036a2SApple OSS Distributions T_META_CHECK_LEAKS(false));
15*043036a2SApple OSS Distributions
16*043036a2SApple OSS Distributions #define MAX_SPD_CHECK 100
17*043036a2SApple OSS Distributions #define TEST_SRC_ADDRESS_IPv4 "192.168.2.2"
18*043036a2SApple OSS Distributions #define TEST_DST_ADDRESS_IPv4 "192.168.2.3"
19*043036a2SApple OSS Distributions #define TEST_SRC_ADDRESS_IPv6 "fd04:5c6b:8df7:7092:0000:0000:0000:0002"
20*043036a2SApple OSS Distributions #define TEST_DST_ADDRESS_IPv6 "fd04:5c6b:8df7:7092:0000:0000:0000:0003"
21*043036a2SApple OSS Distributions #define TEST_MIGRATE_SRC_ADDRESS_IPv4 "192.168.2.10"
22*043036a2SApple OSS Distributions #define TEST_MIGRATE_DST_ADDRESS_IPv4 "192.168.2.11"
23*043036a2SApple OSS Distributions #define TEST_MIGRATE_SRC_ADDRESS_IPv6 "fd04:5c6b:8df7:7092:0000:0000:0002:0000"
24*043036a2SApple OSS Distributions #define TEST_MIGRATE_DST_ADDRESS_IPv6 "fd04:5c6b:8df7:7092:0000:0000:0003:0000"
25*043036a2SApple OSS Distributions
26*043036a2SApple OSS Distributions typedef enum {
27*043036a2SApple OSS Distributions TEST_INVALID = 0,
28*043036a2SApple OSS Distributions TEST_SADB_X_GET_OVERFLOW_60822136 = 1,
29*043036a2SApple OSS Distributions TEST_SADB_X_SPDENABLE_OVERFLOW_60822924 = 2,
30*043036a2SApple OSS Distributions TEST_SADB_X_SPDDISABLE_OVERFLOW_60822956 = 3,
31*043036a2SApple OSS Distributions TEST_SADB_UPDATE_USE_AFTER_FREE_60679513 = 4,
32*043036a2SApple OSS Distributions TEST_SADB_DUMP_HEAP_OVERFLOW_60768729 = 5,
33*043036a2SApple OSS Distributions TEST_SADB_POLICY_DUMP_HEAP_OVERFLOW_60769680 = 6,
34*043036a2SApple OSS Distributions TEST_SADB_GETSASTAT_OOB_READ_60822823 = 7,
35*043036a2SApple OSS Distributions TEST_SADB_GETSASTAT_OOB_READ_SUCCESS = 8,
36*043036a2SApple OSS Distributions TEST_SADB_EXT_MIGRATE_ADDRESS_IPv4 = 9,
37*043036a2SApple OSS Distributions TEST_SADB_EXT_MIGRATE_ADDRESS_IPv6 = 10,
38*043036a2SApple OSS Distributions TEST_SADB_EXT_MIGRATE_BAD_ADDRESS = 11,
39*043036a2SApple OSS Distributions TEST_TCP_INPUT_IPSEC_COPY_POLICY = 12,
40*043036a2SApple OSS Distributions TEST_SADB_X_SPDADD_MEMORY_LEAK_78944570 = 13,
41*043036a2SApple OSS Distributions TEST_SADB_EXT_MIGRATE_AFTER_EXPIRY_134671927 = 14,
42*043036a2SApple OSS Distributions } test_identifier;
43*043036a2SApple OSS Distributions
44*043036a2SApple OSS Distributions static test_identifier test_id = TEST_INVALID;
45*043036a2SApple OSS Distributions static dispatch_source_t pfkey_source = NULL;
46*043036a2SApple OSS Distributions static unsigned long oldmax;
47*043036a2SApple OSS Distributions
48*043036a2SApple OSS Distributions static void pfkey_cleanup(void);
49*043036a2SApple OSS Distributions
50*043036a2SApple OSS Distributions static void pfkey_process_message_test_60822136(uint8_t **mhp, int pfkey_socket);
51*043036a2SApple OSS Distributions static void pfkey_process_message_test_60822924(uint8_t **mhp, int pfkey_socket);
52*043036a2SApple OSS Distributions static void pfkey_process_message_test_60822956(uint8_t **mhp, int pfkey_socket);
53*043036a2SApple OSS Distributions static void pfkey_process_message_test_60679513(uint8_t **mhp, int pfkey_socket);
54*043036a2SApple OSS Distributions static void pfkey_process_message_test_60768729(uint8_t **mhp, int pfkey_socket);
55*043036a2SApple OSS Distributions static void pfkey_process_message_test_60769680(uint8_t **mhp, int pfkey_socket);
56*043036a2SApple OSS Distributions static void pfkey_process_message_test_60822823(uint8_t **mhp, int pfkey_socket);
57*043036a2SApple OSS Distributions static void pfkey_process_message_test_60822823_1(uint8_t **mhp, int pfkey_socket);
58*043036a2SApple OSS Distributions static void pfkey_process_message_test_60687183(uint8_t **mhp, int pfkey_socket);
59*043036a2SApple OSS Distributions static void pfkey_process_message_test_60687183_1(uint8_t **mhp, int pfkey_socket);
60*043036a2SApple OSS Distributions static void pfkey_process_message_test_60687183_2(uint8_t **mhp, int pfkey_socket);
61*043036a2SApple OSS Distributions static void pfkey_process_message_test_78944570(uint8_t **mhp, int pfkey_socket);
62*043036a2SApple OSS Distributions static void pfkey_process_message_test_134671927(uint8_t **mhp, int pfkey_socket);
63*043036a2SApple OSS Distributions
64*043036a2SApple OSS Distributions static void(*const process_pfkey_message_tests[])(uint8_t * *mhp, int pfkey_socket) =
65*043036a2SApple OSS Distributions {
66*043036a2SApple OSS Distributions NULL,
67*043036a2SApple OSS Distributions pfkey_process_message_test_60822136, // TEST_SADB_X_GET_OVERFLOW_60822136
68*043036a2SApple OSS Distributions pfkey_process_message_test_60822924, // TEST_SADB_X_SPDENABLE_OVERFLOW_60822924
69*043036a2SApple OSS Distributions pfkey_process_message_test_60822956, // TEST_SADB_X_SPDDISABLE_OVERFLOW_60822956
70*043036a2SApple OSS Distributions pfkey_process_message_test_60679513, // TEST_SADB_UPDATE_USE_AFTER_FREE_60679513
71*043036a2SApple OSS Distributions pfkey_process_message_test_60768729, // TEST_SADB_DUMP_HEAP_OVERFLOW_60768729
72*043036a2SApple OSS Distributions pfkey_process_message_test_60769680, // TEST_SADB_POLICY_DUMP_HEAP_OVERFLOW_60769680
73*043036a2SApple OSS Distributions pfkey_process_message_test_60822823, // TEST_SADB_GETSASTAT_OOB_READ_60822823
74*043036a2SApple OSS Distributions pfkey_process_message_test_60822823_1, // TEST_SADB_GETSASTAT_OOB_READ_SUCCESS
75*043036a2SApple OSS Distributions pfkey_process_message_test_60687183, // TEST_SADB_EXT_MIGRATE_ADDRESS_IPv4
76*043036a2SApple OSS Distributions pfkey_process_message_test_60687183_1, // TEST_SADB_EXT_MIGRATE_ADDRESS_IPv6
77*043036a2SApple OSS Distributions pfkey_process_message_test_60687183_2, // TEST_SADB_EXT_MIGRATE_BAD_ADDRESS
78*043036a2SApple OSS Distributions NULL, // TEST_TCP_INPUT_IPSEC_COPY_POLICY
79*043036a2SApple OSS Distributions pfkey_process_message_test_78944570, // TEST_SADB_X_SPDADD_MEMORY_LEAK_78944570
80*043036a2SApple OSS Distributions pfkey_process_message_test_134671927, // TEST_SADB_EXT_MIGRATE_AFTER_EXPIRY_134671927
81*043036a2SApple OSS Distributions };
82*043036a2SApple OSS Distributions
83*043036a2SApple OSS Distributions static void
pfkey_align(struct sadb_msg * msg,uint8_t ** mhp)84*043036a2SApple OSS Distributions pfkey_align(struct sadb_msg *msg, uint8_t **mhp)
85*043036a2SApple OSS Distributions {
86*043036a2SApple OSS Distributions struct sadb_ext *ext;
87*043036a2SApple OSS Distributions int i;
88*043036a2SApple OSS Distributions uint8_t *p;
89*043036a2SApple OSS Distributions uint8_t *ep; /* XXX should be passed from upper layer */
90*043036a2SApple OSS Distributions
91*043036a2SApple OSS Distributions /* validity check */
92*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(msg, "pfkey align msg");
93*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(mhp, "pfkey align mhp");
94*043036a2SApple OSS Distributions
95*043036a2SApple OSS Distributions /* initialize */
96*043036a2SApple OSS Distributions for (i = 0; i < SADB_EXT_MAX + 1; i++) {
97*043036a2SApple OSS Distributions mhp[i] = NULL;
98*043036a2SApple OSS Distributions }
99*043036a2SApple OSS Distributions
100*043036a2SApple OSS Distributions mhp[0] = (void *)msg;
101*043036a2SApple OSS Distributions
102*043036a2SApple OSS Distributions /* initialize */
103*043036a2SApple OSS Distributions p = (void *) msg;
104*043036a2SApple OSS Distributions ep = p + PFKEY_UNUNIT64(msg->sadb_msg_len);
105*043036a2SApple OSS Distributions
106*043036a2SApple OSS Distributions /* skip base header */
107*043036a2SApple OSS Distributions p += sizeof(struct sadb_msg);
108*043036a2SApple OSS Distributions
109*043036a2SApple OSS Distributions while (p < ep) {
110*043036a2SApple OSS Distributions ext = (void *)p;
111*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_GE_PTR((void *)ep, (void *)(p + sizeof(*ext)), "pfkey extension header beyond end of buffer");
112*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_GE_ULONG((unsigned long)PFKEY_EXTLEN(ext), sizeof(*ext), "pfkey extension shorter than extension header");
113*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_GE_PTR((void *)ep, (void *)(p + PFKEY_EXTLEN(ext)), "pfkey extension length beyond end of buffer");
114*043036a2SApple OSS Distributions
115*043036a2SApple OSS Distributions T_QUIET; T_EXPECT_NULL(mhp[ext->sadb_ext_type], "duplicate extension type %u payload", ext->sadb_ext_type);
116*043036a2SApple OSS Distributions
117*043036a2SApple OSS Distributions /* set pointer */
118*043036a2SApple OSS Distributions switch (ext->sadb_ext_type) {
119*043036a2SApple OSS Distributions case SADB_EXT_SA:
120*043036a2SApple OSS Distributions case SADB_EXT_LIFETIME_CURRENT:
121*043036a2SApple OSS Distributions case SADB_EXT_LIFETIME_HARD:
122*043036a2SApple OSS Distributions case SADB_EXT_LIFETIME_SOFT:
123*043036a2SApple OSS Distributions case SADB_EXT_ADDRESS_SRC:
124*043036a2SApple OSS Distributions case SADB_EXT_ADDRESS_DST:
125*043036a2SApple OSS Distributions case SADB_EXT_ADDRESS_PROXY:
126*043036a2SApple OSS Distributions case SADB_EXT_KEY_AUTH:
127*043036a2SApple OSS Distributions /* XXX should to be check weak keys. */
128*043036a2SApple OSS Distributions case SADB_EXT_KEY_ENCRYPT:
129*043036a2SApple OSS Distributions /* XXX should to be check weak keys. */
130*043036a2SApple OSS Distributions case SADB_EXT_IDENTITY_SRC:
131*043036a2SApple OSS Distributions case SADB_EXT_IDENTITY_DST:
132*043036a2SApple OSS Distributions case SADB_EXT_SENSITIVITY:
133*043036a2SApple OSS Distributions case SADB_EXT_PROPOSAL:
134*043036a2SApple OSS Distributions case SADB_EXT_SUPPORTED_AUTH:
135*043036a2SApple OSS Distributions case SADB_EXT_SUPPORTED_ENCRYPT:
136*043036a2SApple OSS Distributions case SADB_EXT_SPIRANGE:
137*043036a2SApple OSS Distributions case SADB_X_EXT_POLICY:
138*043036a2SApple OSS Distributions case SADB_X_EXT_SA2:
139*043036a2SApple OSS Distributions case SADB_EXT_SESSION_ID:
140*043036a2SApple OSS Distributions case SADB_EXT_SASTAT:
141*043036a2SApple OSS Distributions #ifdef SADB_X_EXT_NAT_T_TYPE
142*043036a2SApple OSS Distributions case SADB_X_EXT_NAT_T_TYPE:
143*043036a2SApple OSS Distributions case SADB_X_EXT_NAT_T_SPORT:
144*043036a2SApple OSS Distributions case SADB_X_EXT_NAT_T_DPORT:
145*043036a2SApple OSS Distributions case SADB_X_EXT_NAT_T_OA:
146*043036a2SApple OSS Distributions #endif
147*043036a2SApple OSS Distributions #ifdef SADB_X_EXT_TAG
148*043036a2SApple OSS Distributions case SADB_X_EXT_TAG:
149*043036a2SApple OSS Distributions #endif
150*043036a2SApple OSS Distributions #ifdef SADB_X_EXT_PACKET
151*043036a2SApple OSS Distributions case SADB_X_EXT_PACKET:
152*043036a2SApple OSS Distributions #endif
153*043036a2SApple OSS Distributions case SADB_X_EXT_IPSECIF:
154*043036a2SApple OSS Distributions case SADB_X_EXT_ADDR_RANGE_SRC_START:
155*043036a2SApple OSS Distributions case SADB_X_EXT_ADDR_RANGE_SRC_END:
156*043036a2SApple OSS Distributions case SADB_X_EXT_ADDR_RANGE_DST_START:
157*043036a2SApple OSS Distributions case SADB_X_EXT_ADDR_RANGE_DST_END:
158*043036a2SApple OSS Distributions #ifdef SADB_MIGRATE
159*043036a2SApple OSS Distributions case SADB_EXT_MIGRATE_ADDRESS_SRC:
160*043036a2SApple OSS Distributions case SADB_EXT_MIGRATE_ADDRESS_DST:
161*043036a2SApple OSS Distributions case SADB_X_EXT_MIGRATE_IPSECIF:
162*043036a2SApple OSS Distributions #endif
163*043036a2SApple OSS Distributions mhp[ext->sadb_ext_type] = (void *)ext;
164*043036a2SApple OSS Distributions break;
165*043036a2SApple OSS Distributions default:
166*043036a2SApple OSS Distributions T_FAIL("bad extension type %u", ext->sadb_ext_type);
167*043036a2SApple OSS Distributions T_END;
168*043036a2SApple OSS Distributions }
169*043036a2SApple OSS Distributions
170*043036a2SApple OSS Distributions p += PFKEY_EXTLEN(ext);
171*043036a2SApple OSS Distributions }
172*043036a2SApple OSS Distributions
173*043036a2SApple OSS Distributions T_QUIET; T_EXPECT_EQ_PTR((void *)ep, (void *)p, "invalid pfkey message length");
174*043036a2SApple OSS Distributions return;
175*043036a2SApple OSS Distributions }
176*043036a2SApple OSS Distributions
177*043036a2SApple OSS Distributions
178*043036a2SApple OSS Distributions static void
recv_pfkey_message(int pfkey_socket)179*043036a2SApple OSS Distributions recv_pfkey_message(int pfkey_socket)
180*043036a2SApple OSS Distributions {
181*043036a2SApple OSS Distributions uint8_t buffer[8192] __attribute__((aligned(4)));
182*043036a2SApple OSS Distributions struct iovec iovecs[1] = {
183*043036a2SApple OSS Distributions { buffer, sizeof(buffer) },
184*043036a2SApple OSS Distributions };
185*043036a2SApple OSS Distributions struct msghdr msg = {
186*043036a2SApple OSS Distributions NULL,
187*043036a2SApple OSS Distributions 0,
188*043036a2SApple OSS Distributions iovecs,
189*043036a2SApple OSS Distributions sizeof(iovecs) / sizeof(iovecs[0]),
190*043036a2SApple OSS Distributions NULL,
191*043036a2SApple OSS Distributions 0,
192*043036a2SApple OSS Distributions 0,
193*043036a2SApple OSS Distributions };
194*043036a2SApple OSS Distributions
195*043036a2SApple OSS Distributions do {
196*043036a2SApple OSS Distributions ssize_t result = -1;
197*043036a2SApple OSS Distributions memset(buffer, 0, sizeof(buffer));
198*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(result = recvmsg(pfkey_socket, &msg, 0), NULL);
199*043036a2SApple OSS Distributions
200*043036a2SApple OSS Distributions if (result > 0) {
201*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_GE_ULONG((size_t)result, sizeof(struct sadb_msg), "Invalid PFKey message size: %zu", result);
202*043036a2SApple OSS Distributions struct sadb_msg *hdr = (struct sadb_msg *)buffer;
203*043036a2SApple OSS Distributions uint8_t *mhp[SADB_EXT_MAX + 1];
204*043036a2SApple OSS Distributions pfkey_align(hdr, mhp);
205*043036a2SApple OSS Distributions (*process_pfkey_message_tests[test_id])(mhp, pfkey_socket);
206*043036a2SApple OSS Distributions } else if (result == 0) {
207*043036a2SApple OSS Distributions T_LOG("PFKey socket received EOF");
208*043036a2SApple OSS Distributions break;
209*043036a2SApple OSS Distributions }
210*043036a2SApple OSS Distributions } while (1);
211*043036a2SApple OSS Distributions }
212*043036a2SApple OSS Distributions
213*043036a2SApple OSS Distributions static void
send_pfkey_spd_add_message(int pfkey_socket,uint8_t proto)214*043036a2SApple OSS Distributions send_pfkey_spd_add_message(int pfkey_socket, uint8_t proto)
215*043036a2SApple OSS Distributions {
216*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
217*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
218*043036a2SApple OSS Distributions uint16_t tlen = 0;
219*043036a2SApple OSS Distributions
220*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)payload;
221*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
222*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_X_SPDADD;
223*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
224*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_UNSPEC;
225*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
226*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
227*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
228*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (u_int32_t)getpid();
229*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
230*043036a2SApple OSS Distributions
231*043036a2SApple OSS Distributions struct sadb_address *src_address_payload = (struct sadb_address *)(void *)(payload + tlen);
232*043036a2SApple OSS Distributions src_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_SRC & 0xffff;
233*043036a2SApple OSS Distributions src_address_payload->sadb_address_proto = proto & 0xff;
234*043036a2SApple OSS Distributions src_address_payload->sadb_address_prefixlen = (sizeof(struct in_addr) << 3);
235*043036a2SApple OSS Distributions src_address_payload->sadb_address_reserved = 0;
236*043036a2SApple OSS Distributions tlen += sizeof(*src_address_payload);
237*043036a2SApple OSS Distributions
238*043036a2SApple OSS Distributions struct sockaddr_in *src = (struct sockaddr_in *)(void *)(payload + tlen);
239*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, TEST_SRC_ADDRESS_IPv4, &src->sin_addr), 1, "src address fail");
240*043036a2SApple OSS Distributions src->sin_family = AF_INET;
241*043036a2SApple OSS Distributions src->sin_len = sizeof(*src);
242*043036a2SApple OSS Distributions uint16_t len = sizeof(*src_address_payload) + PFKEY_ALIGN8(src->sin_len);
243*043036a2SApple OSS Distributions src_address_payload->sadb_address_len = PFKEY_UNIT64(len);
244*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(src->sin_len);
245*043036a2SApple OSS Distributions
246*043036a2SApple OSS Distributions struct sadb_address *dst_address_payload = (struct sadb_address *)(void *)(payload + tlen);
247*043036a2SApple OSS Distributions dst_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_DST & 0xffff;
248*043036a2SApple OSS Distributions dst_address_payload->sadb_address_proto = proto & 0xff;
249*043036a2SApple OSS Distributions dst_address_payload->sadb_address_prefixlen = (sizeof(struct in_addr) << 3);
250*043036a2SApple OSS Distributions dst_address_payload->sadb_address_reserved = 0;
251*043036a2SApple OSS Distributions tlen += sizeof(*dst_address_payload);
252*043036a2SApple OSS Distributions
253*043036a2SApple OSS Distributions struct sockaddr_in *dst = (struct sockaddr_in *)(void *)(payload + tlen);
254*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, TEST_DST_ADDRESS_IPv4, &dst->sin_addr), 1, "dst address fail");
255*043036a2SApple OSS Distributions dst->sin_family = AF_INET;
256*043036a2SApple OSS Distributions dst->sin_len = sizeof(*dst);
257*043036a2SApple OSS Distributions len = sizeof(*dst_address_payload) + PFKEY_ALIGN8(dst->sin_len);
258*043036a2SApple OSS Distributions dst_address_payload->sadb_address_len = PFKEY_UNIT64(len);
259*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(dst->sin_len);
260*043036a2SApple OSS Distributions
261*043036a2SApple OSS Distributions struct sadb_lifetime *lifetime_payload = (struct sadb_lifetime *)(void *)(payload + tlen);
262*043036a2SApple OSS Distributions lifetime_payload->sadb_lifetime_len = PFKEY_UNIT64(sizeof(*lifetime_payload));
263*043036a2SApple OSS Distributions lifetime_payload->sadb_lifetime_exttype = SADB_EXT_LIFETIME_HARD;
264*043036a2SApple OSS Distributions tlen += sizeof(*lifetime_payload);
265*043036a2SApple OSS Distributions
266*043036a2SApple OSS Distributions struct sadb_x_policy *policy_payload = (struct sadb_x_policy *)(void *)(payload + tlen);
267*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_len = PFKEY_UNIT64(sizeof(*policy_payload));
268*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_exttype = SADB_X_EXT_POLICY;
269*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_type = IPSEC_POLICY_DISCARD;
270*043036a2SApple OSS Distributions if (test_id == TEST_SADB_X_SPDADD_MEMORY_LEAK_78944570) {
271*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_dir = IPSEC_DIR_INVALID;
272*043036a2SApple OSS Distributions } else {
273*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_dir = IPSEC_DIR_OUTBOUND;
274*043036a2SApple OSS Distributions }
275*043036a2SApple OSS Distributions tlen += sizeof(*policy_payload);
276*043036a2SApple OSS Distributions
277*043036a2SApple OSS Distributions // Update the total length
278*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
279*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send spd add");
280*043036a2SApple OSS Distributions }
281*043036a2SApple OSS Distributions
282*043036a2SApple OSS Distributions static void
send_pfkey_spd_get_message(int pfkey_socket,uint32_t policy_id)283*043036a2SApple OSS Distributions send_pfkey_spd_get_message(int pfkey_socket, uint32_t policy_id)
284*043036a2SApple OSS Distributions {
285*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
286*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
287*043036a2SApple OSS Distributions uint16_t tlen = 0;
288*043036a2SApple OSS Distributions
289*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)(void *)payload;
290*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
291*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_X_SPDGET;
292*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
293*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_UNSPEC;
294*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
295*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
296*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
297*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (uint32_t)getpid();
298*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
299*043036a2SApple OSS Distributions
300*043036a2SApple OSS Distributions struct sadb_x_policy *policy_payload = (struct sadb_x_policy *)(void *)(payload + tlen);
301*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_len = PFKEY_UNIT64(sizeof(*policy_payload));
302*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_exttype = SADB_X_EXT_POLICY;
303*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_id = policy_id;
304*043036a2SApple OSS Distributions tlen += sizeof(*policy_payload);
305*043036a2SApple OSS Distributions
306*043036a2SApple OSS Distributions // Update the total length
307*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
308*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send spd get failed");
309*043036a2SApple OSS Distributions }
310*043036a2SApple OSS Distributions
311*043036a2SApple OSS Distributions static void
send_pfkey_spd_enable_message(int pfkey_socket,uint32_t policy_id)312*043036a2SApple OSS Distributions send_pfkey_spd_enable_message(int pfkey_socket, uint32_t policy_id)
313*043036a2SApple OSS Distributions {
314*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
315*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
316*043036a2SApple OSS Distributions uint16_t tlen = 0;
317*043036a2SApple OSS Distributions
318*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)(void *)payload;
319*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
320*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_X_SPDENABLE;
321*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
322*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_UNSPEC;
323*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
324*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
325*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
326*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (uint32_t)getpid();
327*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
328*043036a2SApple OSS Distributions
329*043036a2SApple OSS Distributions struct sadb_x_policy *policy_payload = (struct sadb_x_policy *)(void *)(payload + tlen);
330*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_len = PFKEY_UNIT64(sizeof(*policy_payload));
331*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_exttype = SADB_X_EXT_POLICY;
332*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_id = policy_id;
333*043036a2SApple OSS Distributions tlen += sizeof(*policy_payload);
334*043036a2SApple OSS Distributions
335*043036a2SApple OSS Distributions // Update the total length
336*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
337*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send spd enable failed");
338*043036a2SApple OSS Distributions }
339*043036a2SApple OSS Distributions
340*043036a2SApple OSS Distributions static void
send_pfkey_spd_disable_message(int pfkey_socket,uint32_t policy_id)341*043036a2SApple OSS Distributions send_pfkey_spd_disable_message(int pfkey_socket, uint32_t policy_id)
342*043036a2SApple OSS Distributions {
343*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
344*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
345*043036a2SApple OSS Distributions uint16_t tlen = 0;
346*043036a2SApple OSS Distributions
347*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)(void *)payload;
348*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
349*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_X_SPDDISABLE;
350*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
351*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_UNSPEC;
352*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
353*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
354*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
355*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (uint32_t)getpid();
356*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
357*043036a2SApple OSS Distributions
358*043036a2SApple OSS Distributions struct sadb_x_policy *policy_payload = (struct sadb_x_policy *)(void *)(payload + tlen);
359*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_len = PFKEY_UNIT64(sizeof(*policy_payload));
360*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_exttype = SADB_X_EXT_POLICY;
361*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_id = policy_id;
362*043036a2SApple OSS Distributions tlen += sizeof(*policy_payload);
363*043036a2SApple OSS Distributions
364*043036a2SApple OSS Distributions // Update the total length
365*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
366*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send spd disable failed");
367*043036a2SApple OSS Distributions }
368*043036a2SApple OSS Distributions
369*043036a2SApple OSS Distributions static void
send_pfkey_spd_delete_message(int pfkey_socket,uint32_t policy_id)370*043036a2SApple OSS Distributions send_pfkey_spd_delete_message(int pfkey_socket, uint32_t policy_id)
371*043036a2SApple OSS Distributions {
372*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
373*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
374*043036a2SApple OSS Distributions uint16_t tlen = 0;
375*043036a2SApple OSS Distributions
376*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)payload;
377*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
378*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_X_SPDDELETE2;
379*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
380*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_UNSPEC;
381*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
382*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
383*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
384*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (uint32_t)getpid();
385*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
386*043036a2SApple OSS Distributions
387*043036a2SApple OSS Distributions struct sadb_x_policy *policy_payload = (struct sadb_x_policy *)(void *)(payload + tlen);
388*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_len = PFKEY_UNIT64(sizeof(*policy_payload));
389*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_exttype = SADB_X_EXT_POLICY;
390*043036a2SApple OSS Distributions policy_payload->sadb_x_policy_id = policy_id;
391*043036a2SApple OSS Distributions tlen += sizeof(*policy_payload);
392*043036a2SApple OSS Distributions
393*043036a2SApple OSS Distributions // Update the total length
394*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
395*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send spd delete failed");
396*043036a2SApple OSS Distributions }
397*043036a2SApple OSS Distributions
398*043036a2SApple OSS Distributions static void
send_pfkey_spd_dump_message(int pfkey_socket)399*043036a2SApple OSS Distributions send_pfkey_spd_dump_message(int pfkey_socket)
400*043036a2SApple OSS Distributions {
401*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
402*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
403*043036a2SApple OSS Distributions uint16_t tlen = 0;
404*043036a2SApple OSS Distributions
405*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)(void *)payload;
406*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
407*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_X_SPDDUMP;
408*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
409*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_UNSPEC;
410*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
411*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
412*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
413*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (uint32_t)getpid();
414*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
415*043036a2SApple OSS Distributions
416*043036a2SApple OSS Distributions // Update the total length
417*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
418*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send spd dump failed");
419*043036a2SApple OSS Distributions }
420*043036a2SApple OSS Distributions
421*043036a2SApple OSS Distributions static void
send_pfkey_flush_sp(int pfkey_socket)422*043036a2SApple OSS Distributions send_pfkey_flush_sp(int pfkey_socket)
423*043036a2SApple OSS Distributions {
424*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
425*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
426*043036a2SApple OSS Distributions uint16_t tlen = 0;
427*043036a2SApple OSS Distributions
428*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)payload;
429*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
430*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_X_SPDFLUSH;
431*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
432*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_UNSPEC;
433*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
434*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
435*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
436*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (u_int32_t)getpid();
437*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
438*043036a2SApple OSS Distributions
439*043036a2SApple OSS Distributions // Update the total length
440*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
441*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey flush security policies");
442*043036a2SApple OSS Distributions }
443*043036a2SApple OSS Distributions
444*043036a2SApple OSS Distributions static void
send_pfkey_register(int pfkey_socket)445*043036a2SApple OSS Distributions send_pfkey_register(int pfkey_socket)
446*043036a2SApple OSS Distributions {
447*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
448*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
449*043036a2SApple OSS Distributions uint16_t tlen = 0;
450*043036a2SApple OSS Distributions
451*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)payload;
452*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
453*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_REGISTER;
454*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
455*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_ESP;
456*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
457*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
458*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
459*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (u_int32_t)getpid();
460*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
461*043036a2SApple OSS Distributions
462*043036a2SApple OSS Distributions // Update the total length
463*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
464*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey flush security policies");
465*043036a2SApple OSS Distributions }
466*043036a2SApple OSS Distributions
467*043036a2SApple OSS Distributions static void
send_pkey_get_spi(int pfkey_socket)468*043036a2SApple OSS Distributions send_pkey_get_spi(int pfkey_socket)
469*043036a2SApple OSS Distributions {
470*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
471*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
472*043036a2SApple OSS Distributions uint16_t tlen = 0;
473*043036a2SApple OSS Distributions
474*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)payload;
475*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
476*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_GETSPI;
477*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
478*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_ESP;
479*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
480*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
481*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
482*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (u_int32_t)getpid();
483*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
484*043036a2SApple OSS Distributions
485*043036a2SApple OSS Distributions struct sadb_x_sa2 *sa2_payload = (struct sadb_x_sa2 *)(void *)(payload + tlen);
486*043036a2SApple OSS Distributions sa2_payload->sadb_x_sa2_len = PFKEY_UNIT64(sizeof(*sa2_payload));
487*043036a2SApple OSS Distributions sa2_payload->sadb_x_sa2_exttype = SADB_X_EXT_SA2;
488*043036a2SApple OSS Distributions sa2_payload->sadb_x_sa2_mode = IPSEC_MODE_TRANSPORT;
489*043036a2SApple OSS Distributions sa2_payload->sadb_x_sa2_reqid = 0;
490*043036a2SApple OSS Distributions tlen += sizeof(*sa2_payload);
491*043036a2SApple OSS Distributions
492*043036a2SApple OSS Distributions struct sadb_address *src_address_payload = (struct sadb_address *)(void *)(payload + tlen);
493*043036a2SApple OSS Distributions src_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_SRC & 0xffff;
494*043036a2SApple OSS Distributions src_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
495*043036a2SApple OSS Distributions src_address_payload->sadb_address_prefixlen = (sizeof(struct in_addr) << 3);
496*043036a2SApple OSS Distributions src_address_payload->sadb_address_reserved = 0;
497*043036a2SApple OSS Distributions tlen += sizeof(*src_address_payload);
498*043036a2SApple OSS Distributions
499*043036a2SApple OSS Distributions struct sockaddr_in *src = (struct sockaddr_in *)(void *)(payload + tlen);
500*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, TEST_SRC_ADDRESS_IPv4, &src->sin_addr), 1, "src address fail");
501*043036a2SApple OSS Distributions src->sin_family = AF_INET;
502*043036a2SApple OSS Distributions src->sin_len = sizeof(*src);
503*043036a2SApple OSS Distributions uint16_t len = sizeof(*src_address_payload) + PFKEY_ALIGN8(src->sin_len);
504*043036a2SApple OSS Distributions src_address_payload->sadb_address_len = PFKEY_UNIT64(len);
505*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(src->sin_len);
506*043036a2SApple OSS Distributions
507*043036a2SApple OSS Distributions struct sadb_address *dst_address_payload = (struct sadb_address *)(void *)(payload + tlen);
508*043036a2SApple OSS Distributions dst_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_DST & 0xffff;
509*043036a2SApple OSS Distributions dst_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
510*043036a2SApple OSS Distributions dst_address_payload->sadb_address_prefixlen = (sizeof(struct in_addr) << 3);
511*043036a2SApple OSS Distributions dst_address_payload->sadb_address_reserved = 0;
512*043036a2SApple OSS Distributions tlen += sizeof(*dst_address_payload);
513*043036a2SApple OSS Distributions
514*043036a2SApple OSS Distributions struct sockaddr_in *dst = (struct sockaddr_in *)(void *)(payload + tlen);
515*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, TEST_DST_ADDRESS_IPv4, &dst->sin_addr), 1, "dst address fail");
516*043036a2SApple OSS Distributions dst->sin_family = AF_INET;
517*043036a2SApple OSS Distributions dst->sin_len = sizeof(*dst);
518*043036a2SApple OSS Distributions len = sizeof(*dst_address_payload) + PFKEY_ALIGN8(dst->sin_len);
519*043036a2SApple OSS Distributions dst_address_payload->sadb_address_len = PFKEY_UNIT64(len);
520*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(dst->sin_len);
521*043036a2SApple OSS Distributions
522*043036a2SApple OSS Distributions // Update the total length
523*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
524*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send get spi");
525*043036a2SApple OSS Distributions }
526*043036a2SApple OSS Distributions
527*043036a2SApple OSS Distributions static void
send_pkey_add_sa(int pfkey_socket,uint32_t spi,const char * src,const char * dst,int family)528*043036a2SApple OSS Distributions send_pkey_add_sa(int pfkey_socket, uint32_t spi, const char *src, const char *dst, int family)
529*043036a2SApple OSS Distributions {
530*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
531*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
532*043036a2SApple OSS Distributions uint16_t tlen = 0;
533*043036a2SApple OSS Distributions
534*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)payload;
535*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
536*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_ADD;
537*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
538*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_ESP;
539*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
540*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
541*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
542*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (u_int32_t)getpid();
543*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
544*043036a2SApple OSS Distributions
545*043036a2SApple OSS Distributions struct sadb_sa_2 *sa2_payload = (struct sadb_sa_2 *)(void *)(payload + tlen);
546*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_len = PFKEY_UNIT64(sizeof(*sa2_payload));
547*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_exttype = SADB_EXT_SA;
548*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_spi = htonl(spi);
549*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_replay = 4;
550*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_state = SADB_SASTATE_LARVAL;
551*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_auth = SADB_X_AALG_SHA2_256;
552*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_encrypt = SADB_X_EALG_AESCBC;
553*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_flags |= (SADB_X_EXT_NATT | SADB_X_EXT_NATT_KEEPALIVE);
554*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_src_port = htons(4500);
555*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_port = 4500;
556*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_interval = 20;
557*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_offload_interval = 0;
558*043036a2SApple OSS Distributions tlen += sizeof(*sa2_payload);
559*043036a2SApple OSS Distributions
560*043036a2SApple OSS Distributions struct sadb_x_sa2 *sa2_x_payload = (struct sadb_x_sa2 *)(void *)(payload + tlen);
561*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_len = PFKEY_UNIT64(sizeof(*sa2_x_payload));
562*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_exttype = SADB_X_EXT_SA2;
563*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_mode = IPSEC_MODE_TRANSPORT;
564*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_reqid = 0;
565*043036a2SApple OSS Distributions if (test_id == TEST_SADB_EXT_MIGRATE_AFTER_EXPIRY_134671927) {
566*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_alwaysexpire = 1;
567*043036a2SApple OSS Distributions }
568*043036a2SApple OSS Distributions tlen += sizeof(*sa2_x_payload);
569*043036a2SApple OSS Distributions
570*043036a2SApple OSS Distributions uint8_t prefixlen = (family == AF_INET) ? (sizeof(struct in_addr) << 3) : (sizeof(struct in6_addr) << 3);
571*043036a2SApple OSS Distributions
572*043036a2SApple OSS Distributions struct sadb_address *src_address_payload = (struct sadb_address *)(void *)(payload + tlen);
573*043036a2SApple OSS Distributions src_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_SRC & 0xffff;
574*043036a2SApple OSS Distributions src_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
575*043036a2SApple OSS Distributions src_address_payload->sadb_address_prefixlen = prefixlen;
576*043036a2SApple OSS Distributions src_address_payload->sadb_address_reserved = 0;
577*043036a2SApple OSS Distributions tlen += sizeof(*src_address_payload);
578*043036a2SApple OSS Distributions
579*043036a2SApple OSS Distributions if (family == AF_INET) {
580*043036a2SApple OSS Distributions struct sockaddr_in *src4 = (struct sockaddr_in *)(void *)(payload + tlen);
581*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, src, &src4->sin_addr), 1, "src address fail");
582*043036a2SApple OSS Distributions src4->sin_family = AF_INET;
583*043036a2SApple OSS Distributions src4->sin_len = sizeof(*src4);
584*043036a2SApple OSS Distributions uint16_t len = sizeof(*src_address_payload) + PFKEY_ALIGN8(src4->sin_len);
585*043036a2SApple OSS Distributions src_address_payload->sadb_address_len = PFKEY_UNIT64(len);
586*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(src4->sin_len);
587*043036a2SApple OSS Distributions } else {
588*043036a2SApple OSS Distributions struct sockaddr_in6 *src6 = (struct sockaddr_in6 *)(void *)(payload + tlen);
589*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET6, src, &src6->sin6_addr), 1, "src address fail");
590*043036a2SApple OSS Distributions src6->sin6_family = AF_INET6;
591*043036a2SApple OSS Distributions src6->sin6_len = sizeof(*src6);
592*043036a2SApple OSS Distributions uint16_t len = sizeof(*src_address_payload) + PFKEY_ALIGN8(src6->sin6_len);
593*043036a2SApple OSS Distributions src_address_payload->sadb_address_len = PFKEY_UNIT64(len);
594*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(src6->sin6_len);
595*043036a2SApple OSS Distributions }
596*043036a2SApple OSS Distributions
597*043036a2SApple OSS Distributions struct sadb_address *dst_address_payload = (struct sadb_address *)(void *)(payload + tlen);
598*043036a2SApple OSS Distributions dst_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_DST & 0xffff;
599*043036a2SApple OSS Distributions dst_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
600*043036a2SApple OSS Distributions dst_address_payload->sadb_address_prefixlen = prefixlen;
601*043036a2SApple OSS Distributions dst_address_payload->sadb_address_reserved = 0;
602*043036a2SApple OSS Distributions tlen += sizeof(*dst_address_payload);
603*043036a2SApple OSS Distributions
604*043036a2SApple OSS Distributions if (family == AF_INET) {
605*043036a2SApple OSS Distributions struct sockaddr_in *dst4 = (struct sockaddr_in *)(void *)(payload + tlen);
606*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, dst, &dst4->sin_addr), 1, "dst address fail");
607*043036a2SApple OSS Distributions dst4->sin_family = AF_INET;
608*043036a2SApple OSS Distributions dst4->sin_len = sizeof(*dst4);
609*043036a2SApple OSS Distributions uint16_t len = sizeof(*dst_address_payload) + PFKEY_ALIGN8(dst4->sin_len);
610*043036a2SApple OSS Distributions dst_address_payload->sadb_address_len = PFKEY_UNIT64(len);
611*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(dst4->sin_len);
612*043036a2SApple OSS Distributions } else {
613*043036a2SApple OSS Distributions struct sockaddr_in6 *dst6 = (struct sockaddr_in6 *)(void *)(payload + tlen);
614*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET6, dst, &dst6->sin6_addr), 1, "dst address fail");
615*043036a2SApple OSS Distributions dst6->sin6_family = AF_INET6;
616*043036a2SApple OSS Distributions dst6->sin6_len = sizeof(*dst6);
617*043036a2SApple OSS Distributions uint16_t len = sizeof(*dst_address_payload) + PFKEY_ALIGN8(dst6->sin6_len);
618*043036a2SApple OSS Distributions dst_address_payload->sadb_address_len = PFKEY_UNIT64(len);
619*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(dst6->sin6_len);
620*043036a2SApple OSS Distributions }
621*043036a2SApple OSS Distributions
622*043036a2SApple OSS Distributions struct sadb_key *encrypt_key_payload = (struct sadb_key *)(void *)(payload + tlen);
623*043036a2SApple OSS Distributions uint16_t len = sizeof(*encrypt_key_payload) + PFKEY_ALIGN8(32);
624*043036a2SApple OSS Distributions encrypt_key_payload->sadb_key_len = PFKEY_UNIT64(len);
625*043036a2SApple OSS Distributions encrypt_key_payload->sadb_key_exttype = SADB_EXT_KEY_ENCRYPT;
626*043036a2SApple OSS Distributions encrypt_key_payload->sadb_key_bits = (uint16_t)(32 << 3);
627*043036a2SApple OSS Distributions encrypt_key_payload->sadb_key_reserved = 0;
628*043036a2SApple OSS Distributions tlen += sizeof(*encrypt_key_payload);
629*043036a2SApple OSS Distributions arc4random_buf(payload + tlen, 32);
630*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(32);
631*043036a2SApple OSS Distributions
632*043036a2SApple OSS Distributions struct sadb_key *auth_key_payload = (struct sadb_key *)(void *)(payload + tlen);
633*043036a2SApple OSS Distributions len = sizeof(*auth_key_payload) + PFKEY_ALIGN8(32);
634*043036a2SApple OSS Distributions auth_key_payload->sadb_key_len = PFKEY_UNIT64(len);
635*043036a2SApple OSS Distributions auth_key_payload->sadb_key_exttype = SADB_EXT_KEY_AUTH;
636*043036a2SApple OSS Distributions auth_key_payload->sadb_key_bits = (uint16_t)(32 << 3);
637*043036a2SApple OSS Distributions auth_key_payload->sadb_key_reserved = 0;
638*043036a2SApple OSS Distributions tlen += sizeof(*auth_key_payload);
639*043036a2SApple OSS Distributions arc4random_buf(payload + tlen, 32);
640*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(32);
641*043036a2SApple OSS Distributions
642*043036a2SApple OSS Distributions struct sadb_lifetime *hard_lifetime_payload = (struct sadb_lifetime *)(void *)(payload + tlen);
643*043036a2SApple OSS Distributions hard_lifetime_payload->sadb_lifetime_len = PFKEY_UNIT64(sizeof(*hard_lifetime_payload));
644*043036a2SApple OSS Distributions hard_lifetime_payload->sadb_lifetime_exttype = SADB_EXT_LIFETIME_HARD;
645*043036a2SApple OSS Distributions tlen += sizeof(*hard_lifetime_payload);
646*043036a2SApple OSS Distributions
647*043036a2SApple OSS Distributions struct sadb_lifetime *soft_lifetime_payload = (struct sadb_lifetime *)(void *)(payload + tlen);
648*043036a2SApple OSS Distributions soft_lifetime_payload->sadb_lifetime_len = PFKEY_UNIT64(sizeof(*soft_lifetime_payload));
649*043036a2SApple OSS Distributions soft_lifetime_payload->sadb_lifetime_exttype = SADB_EXT_LIFETIME_SOFT;
650*043036a2SApple OSS Distributions if (test_id == TEST_SADB_EXT_MIGRATE_AFTER_EXPIRY_134671927) {
651*043036a2SApple OSS Distributions soft_lifetime_payload->sadb_lifetime_addtime = 1;
652*043036a2SApple OSS Distributions }
653*043036a2SApple OSS Distributions tlen += sizeof(*soft_lifetime_payload);
654*043036a2SApple OSS Distributions
655*043036a2SApple OSS Distributions // Update the total length
656*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
657*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send update sa");
658*043036a2SApple OSS Distributions }
659*043036a2SApple OSS Distributions
660*043036a2SApple OSS Distributions static void
send_pkey_update_sa(int pfkey_socket,uint32_t spi)661*043036a2SApple OSS Distributions send_pkey_update_sa(int pfkey_socket, uint32_t spi)
662*043036a2SApple OSS Distributions {
663*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
664*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
665*043036a2SApple OSS Distributions uint16_t tlen = 0;
666*043036a2SApple OSS Distributions
667*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)payload;
668*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
669*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_UPDATE;
670*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
671*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_ESP;
672*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
673*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
674*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
675*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (u_int32_t)getpid();
676*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
677*043036a2SApple OSS Distributions
678*043036a2SApple OSS Distributions struct sadb_sa_2 *sa2_payload = (struct sadb_sa_2 *)(void *)(payload + tlen);
679*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_len = PFKEY_UNIT64(sizeof(*sa2_payload));
680*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_exttype = SADB_EXT_SA;
681*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_spi = htonl(spi);
682*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_replay = 4;
683*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_state = SADB_SASTATE_LARVAL;
684*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_auth = SADB_X_AALG_SHA2_256;
685*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_encrypt = SADB_X_EALG_AESCBC;
686*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_flags |= (SADB_X_EXT_NATT | SADB_X_EXT_NATT_KEEPALIVE);
687*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_src_port = htons(4500);
688*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_port = 0; // Bad value to trigger failure
689*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_interval = 20;
690*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_offload_interval = 0;
691*043036a2SApple OSS Distributions tlen += sizeof(*sa2_payload);
692*043036a2SApple OSS Distributions
693*043036a2SApple OSS Distributions struct sadb_x_sa2 *sa2_x_payload = (struct sadb_x_sa2 *)(void *)(payload + tlen);
694*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_len = PFKEY_UNIT64(sizeof(*sa2_x_payload));
695*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_exttype = SADB_X_EXT_SA2;
696*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_mode = IPSEC_MODE_TRANSPORT;
697*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_reqid = 0;
698*043036a2SApple OSS Distributions tlen += sizeof(*sa2_x_payload);
699*043036a2SApple OSS Distributions
700*043036a2SApple OSS Distributions struct sadb_address *src_address_payload = (struct sadb_address *)(void *)(payload + tlen);
701*043036a2SApple OSS Distributions src_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_SRC & 0xffff;
702*043036a2SApple OSS Distributions src_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
703*043036a2SApple OSS Distributions src_address_payload->sadb_address_prefixlen = (sizeof(struct in_addr) << 3);
704*043036a2SApple OSS Distributions src_address_payload->sadb_address_reserved = 0;
705*043036a2SApple OSS Distributions tlen += sizeof(*src_address_payload);
706*043036a2SApple OSS Distributions
707*043036a2SApple OSS Distributions struct sockaddr_in *src = (struct sockaddr_in *)(void *)(payload + tlen);
708*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, TEST_SRC_ADDRESS_IPv4, &src->sin_addr), 1, "src address fail");
709*043036a2SApple OSS Distributions src->sin_family = AF_INET;
710*043036a2SApple OSS Distributions src->sin_len = sizeof(*src);
711*043036a2SApple OSS Distributions uint16_t len = sizeof(*src_address_payload) + PFKEY_ALIGN8(src->sin_len);
712*043036a2SApple OSS Distributions src_address_payload->sadb_address_len = PFKEY_UNIT64(len);
713*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(src->sin_len);
714*043036a2SApple OSS Distributions
715*043036a2SApple OSS Distributions struct sadb_address *dst_address_payload = (struct sadb_address *)(void *)(payload + tlen);
716*043036a2SApple OSS Distributions dst_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_DST & 0xffff;
717*043036a2SApple OSS Distributions dst_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
718*043036a2SApple OSS Distributions dst_address_payload->sadb_address_prefixlen = (sizeof(struct in_addr) << 3);
719*043036a2SApple OSS Distributions dst_address_payload->sadb_address_reserved = 0;
720*043036a2SApple OSS Distributions tlen += sizeof(*dst_address_payload);
721*043036a2SApple OSS Distributions
722*043036a2SApple OSS Distributions struct sockaddr_in *dst = (struct sockaddr_in *)(void *)(payload + tlen);
723*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, TEST_DST_ADDRESS_IPv4, &dst->sin_addr), 1, "dst address fail");
724*043036a2SApple OSS Distributions dst->sin_family = AF_INET;
725*043036a2SApple OSS Distributions dst->sin_len = sizeof(*dst);
726*043036a2SApple OSS Distributions len = sizeof(*dst_address_payload) + PFKEY_ALIGN8(dst->sin_len);
727*043036a2SApple OSS Distributions dst_address_payload->sadb_address_len = PFKEY_UNIT64(len);
728*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(dst->sin_len);
729*043036a2SApple OSS Distributions
730*043036a2SApple OSS Distributions struct sadb_key *encrypt_key_payload = (struct sadb_key *)(void *)(payload + tlen);
731*043036a2SApple OSS Distributions len = sizeof(*encrypt_key_payload) + PFKEY_ALIGN8(32);
732*043036a2SApple OSS Distributions encrypt_key_payload->sadb_key_len = PFKEY_UNIT64(len);
733*043036a2SApple OSS Distributions encrypt_key_payload->sadb_key_exttype = SADB_EXT_KEY_ENCRYPT;
734*043036a2SApple OSS Distributions encrypt_key_payload->sadb_key_bits = (uint16_t)(32 << 3);
735*043036a2SApple OSS Distributions encrypt_key_payload->sadb_key_reserved = 0;
736*043036a2SApple OSS Distributions tlen += sizeof(*encrypt_key_payload);
737*043036a2SApple OSS Distributions arc4random_buf(payload + tlen, 32);
738*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(32);
739*043036a2SApple OSS Distributions
740*043036a2SApple OSS Distributions struct sadb_key *auth_key_payload = (struct sadb_key *)(void *)(payload + tlen);
741*043036a2SApple OSS Distributions len = sizeof(*auth_key_payload) + PFKEY_ALIGN8(32);
742*043036a2SApple OSS Distributions auth_key_payload->sadb_key_len = PFKEY_UNIT64(len);
743*043036a2SApple OSS Distributions auth_key_payload->sadb_key_exttype = SADB_EXT_KEY_AUTH;
744*043036a2SApple OSS Distributions auth_key_payload->sadb_key_bits = (uint16_t)(32 << 3);
745*043036a2SApple OSS Distributions auth_key_payload->sadb_key_reserved = 0;
746*043036a2SApple OSS Distributions tlen += sizeof(*auth_key_payload);
747*043036a2SApple OSS Distributions arc4random_buf(payload + tlen, 32);
748*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(32);
749*043036a2SApple OSS Distributions
750*043036a2SApple OSS Distributions struct sadb_lifetime *hard_lifetime_payload = (struct sadb_lifetime *)(void *)(payload + tlen);
751*043036a2SApple OSS Distributions hard_lifetime_payload->sadb_lifetime_len = PFKEY_UNIT64(sizeof(*hard_lifetime_payload));
752*043036a2SApple OSS Distributions hard_lifetime_payload->sadb_lifetime_exttype = SADB_EXT_LIFETIME_HARD;
753*043036a2SApple OSS Distributions tlen += sizeof(*hard_lifetime_payload);
754*043036a2SApple OSS Distributions
755*043036a2SApple OSS Distributions struct sadb_lifetime *soft_lifetime_payload = (struct sadb_lifetime *)(void *)(payload + tlen);
756*043036a2SApple OSS Distributions soft_lifetime_payload->sadb_lifetime_len = PFKEY_UNIT64(sizeof(*soft_lifetime_payload));
757*043036a2SApple OSS Distributions soft_lifetime_payload->sadb_lifetime_exttype = SADB_EXT_LIFETIME_SOFT;
758*043036a2SApple OSS Distributions tlen += sizeof(*soft_lifetime_payload);
759*043036a2SApple OSS Distributions
760*043036a2SApple OSS Distributions // Update the total length
761*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
762*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send update sa");
763*043036a2SApple OSS Distributions }
764*043036a2SApple OSS Distributions
765*043036a2SApple OSS Distributions static void
send_pkey_migrate_sa(int pfkey_socket,uint32_t spi,const char * src,const char * dst,int family,const char * migrate_src,const char * migrate_dst,int migrate_family)766*043036a2SApple OSS Distributions send_pkey_migrate_sa(int pfkey_socket, uint32_t spi, const char *src, const char *dst, int family,
767*043036a2SApple OSS Distributions const char *migrate_src, const char *migrate_dst, int migrate_family)
768*043036a2SApple OSS Distributions {
769*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
770*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
771*043036a2SApple OSS Distributions uint16_t tlen = 0;
772*043036a2SApple OSS Distributions
773*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)payload;
774*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
775*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_MIGRATE;
776*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
777*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_ESP;
778*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
779*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
780*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
781*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (u_int32_t)getpid();
782*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
783*043036a2SApple OSS Distributions
784*043036a2SApple OSS Distributions struct sadb_sa_2 *sa2_payload = (struct sadb_sa_2 *)(void *)(payload + tlen);
785*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_len = PFKEY_UNIT64(sizeof(*sa2_payload));
786*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_exttype = SADB_EXT_SA;
787*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_spi = htonl(spi);
788*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_replay = 4;
789*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_state = SADB_SASTATE_LARVAL;
790*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_auth = SADB_X_AALG_SHA2_256;
791*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_encrypt = SADB_X_EALG_AESCBC;
792*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_flags |= (SADB_X_EXT_NATT | SADB_X_EXT_NATT_KEEPALIVE);
793*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_src_port = htons(4500);
794*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_port = 0; // Bad value to trigger failure
795*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_interval = 20;
796*043036a2SApple OSS Distributions sa2_payload->sadb_sa_natt_offload_interval = 0;
797*043036a2SApple OSS Distributions tlen += sizeof(*sa2_payload);
798*043036a2SApple OSS Distributions
799*043036a2SApple OSS Distributions struct sadb_x_sa2 *sa2_x_payload = (struct sadb_x_sa2 *)(void *)(payload + tlen);
800*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_len = PFKEY_UNIT64(sizeof(*sa2_x_payload));
801*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_exttype = SADB_X_EXT_SA2;
802*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_mode = IPSEC_MODE_TRANSPORT;
803*043036a2SApple OSS Distributions sa2_x_payload->sadb_x_sa2_reqid = 0;
804*043036a2SApple OSS Distributions tlen += sizeof(*sa2_x_payload);
805*043036a2SApple OSS Distributions
806*043036a2SApple OSS Distributions uint8_t prefixlen = (family == AF_INET) ? (sizeof(struct in_addr) << 3) : (sizeof(struct in6_addr) << 3);
807*043036a2SApple OSS Distributions
808*043036a2SApple OSS Distributions struct sadb_address *src_address_payload = (struct sadb_address *)(void *)(payload + tlen);
809*043036a2SApple OSS Distributions src_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_SRC & 0xffff;
810*043036a2SApple OSS Distributions src_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
811*043036a2SApple OSS Distributions src_address_payload->sadb_address_prefixlen = prefixlen;
812*043036a2SApple OSS Distributions src_address_payload->sadb_address_reserved = 0;
813*043036a2SApple OSS Distributions tlen += sizeof(*src_address_payload);
814*043036a2SApple OSS Distributions
815*043036a2SApple OSS Distributions if (family == AF_INET) {
816*043036a2SApple OSS Distributions struct sockaddr_in *src4 = (struct sockaddr_in *)(void *)(payload + tlen);
817*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, src, &src4->sin_addr), 1, "src address fail");
818*043036a2SApple OSS Distributions src4->sin_family = AF_INET;
819*043036a2SApple OSS Distributions src4->sin_len = sizeof(*src4);
820*043036a2SApple OSS Distributions uint16_t len = sizeof(*src_address_payload) + PFKEY_ALIGN8(src4->sin_len);
821*043036a2SApple OSS Distributions src_address_payload->sadb_address_len = PFKEY_UNIT64(len);
822*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(src4->sin_len);
823*043036a2SApple OSS Distributions } else {
824*043036a2SApple OSS Distributions struct sockaddr_in6 *src6 = (struct sockaddr_in6 *)(void *)(payload + tlen);
825*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET6, src, &src6->sin6_addr), 1, "src address fail");
826*043036a2SApple OSS Distributions src6->sin6_family = AF_INET6;
827*043036a2SApple OSS Distributions src6->sin6_len = sizeof(*src6);
828*043036a2SApple OSS Distributions uint16_t len = sizeof(*src_address_payload) + PFKEY_ALIGN8(src6->sin6_len);
829*043036a2SApple OSS Distributions src_address_payload->sadb_address_len = PFKEY_UNIT64(len);
830*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(src6->sin6_len);
831*043036a2SApple OSS Distributions }
832*043036a2SApple OSS Distributions
833*043036a2SApple OSS Distributions struct sadb_address *dst_address_payload = (struct sadb_address *)(void *)(payload + tlen);
834*043036a2SApple OSS Distributions dst_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_DST & 0xffff;
835*043036a2SApple OSS Distributions dst_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
836*043036a2SApple OSS Distributions dst_address_payload->sadb_address_prefixlen = prefixlen;
837*043036a2SApple OSS Distributions dst_address_payload->sadb_address_reserved = 0;
838*043036a2SApple OSS Distributions tlen += sizeof(*dst_address_payload);
839*043036a2SApple OSS Distributions
840*043036a2SApple OSS Distributions if (family == AF_INET) {
841*043036a2SApple OSS Distributions struct sockaddr_in *dst4 = (struct sockaddr_in *)(void *)(payload + tlen);
842*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, dst, &dst4->sin_addr), 1, "dst address fail");
843*043036a2SApple OSS Distributions dst4->sin_family = AF_INET;
844*043036a2SApple OSS Distributions dst4->sin_len = sizeof(*dst4);
845*043036a2SApple OSS Distributions uint16_t len = sizeof(*dst_address_payload) + PFKEY_ALIGN8(dst4->sin_len);
846*043036a2SApple OSS Distributions dst_address_payload->sadb_address_len = PFKEY_UNIT64(len);
847*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(dst4->sin_len);
848*043036a2SApple OSS Distributions } else {
849*043036a2SApple OSS Distributions struct sockaddr_in6 *dst6 = (struct sockaddr_in6 *)(void *)(payload + tlen);
850*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET6, dst, &dst6->sin6_addr), 1, "dst address fail");
851*043036a2SApple OSS Distributions dst6->sin6_family = AF_INET6;
852*043036a2SApple OSS Distributions dst6->sin6_len = sizeof(*dst6);
853*043036a2SApple OSS Distributions uint16_t len = sizeof(*dst_address_payload) + PFKEY_ALIGN8(dst6->sin6_len);
854*043036a2SApple OSS Distributions dst_address_payload->sadb_address_len = PFKEY_UNIT64(len);
855*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(dst6->sin6_len);
856*043036a2SApple OSS Distributions }
857*043036a2SApple OSS Distributions
858*043036a2SApple OSS Distributions prefixlen = (migrate_family == AF_INET) ? (sizeof(struct in_addr) << 3) : (sizeof(struct in6_addr) << 3);
859*043036a2SApple OSS Distributions
860*043036a2SApple OSS Distributions struct sadb_address *migrate_src_address_payload = (struct sadb_address *)(void *)(payload + tlen);
861*043036a2SApple OSS Distributions migrate_src_address_payload->sadb_address_exttype = SADB_EXT_MIGRATE_ADDRESS_SRC & 0xffff;
862*043036a2SApple OSS Distributions migrate_src_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
863*043036a2SApple OSS Distributions migrate_src_address_payload->sadb_address_prefixlen = prefixlen;
864*043036a2SApple OSS Distributions migrate_src_address_payload->sadb_address_reserved = 0;
865*043036a2SApple OSS Distributions tlen += sizeof(*migrate_src_address_payload);
866*043036a2SApple OSS Distributions
867*043036a2SApple OSS Distributions if (migrate_family == AF_INET) {
868*043036a2SApple OSS Distributions struct sockaddr_in *migrate_src4 = (struct sockaddr_in *)(void *)(payload + tlen);
869*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, migrate_src, &migrate_src4->sin_addr), 1, "migrate src fail");
870*043036a2SApple OSS Distributions migrate_src4->sin_family = AF_INET;
871*043036a2SApple OSS Distributions migrate_src4->sin_len = sizeof(*migrate_src4);
872*043036a2SApple OSS Distributions uint16_t len = sizeof(*migrate_src_address_payload) + PFKEY_ALIGN8(migrate_src4->sin_len);
873*043036a2SApple OSS Distributions migrate_src_address_payload->sadb_address_len = PFKEY_UNIT64(len);
874*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(migrate_src4->sin_len);
875*043036a2SApple OSS Distributions } else if (migrate_family == AF_INET6) {
876*043036a2SApple OSS Distributions struct sockaddr_in6 *migrate_src6 = (struct sockaddr_in6 *)(void *)(payload + tlen);
877*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET6, migrate_src, &migrate_src6->sin6_addr), 1, "migrate src fail");
878*043036a2SApple OSS Distributions migrate_src6->sin6_family = AF_INET6;
879*043036a2SApple OSS Distributions migrate_src6->sin6_len = sizeof(*migrate_src6);
880*043036a2SApple OSS Distributions uint16_t len = sizeof(*migrate_src_address_payload) + PFKEY_ALIGN8(migrate_src6->sin6_len);
881*043036a2SApple OSS Distributions migrate_src_address_payload->sadb_address_len = PFKEY_UNIT64(len);
882*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(migrate_src6->sin6_len);
883*043036a2SApple OSS Distributions } else if (migrate_family == AF_CHAOS) {
884*043036a2SApple OSS Distributions struct sockaddr_in6 *migrate_src6 = (struct sockaddr_in6 *)(void *)(payload + tlen);
885*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET6, migrate_src, &migrate_src6->sin6_addr), 1, "migrate src fail");
886*043036a2SApple OSS Distributions migrate_src6->sin6_family = AF_INET6;
887*043036a2SApple OSS Distributions migrate_src6->sin6_len = sizeof(*migrate_src6) + 100; // Bad value to trigger exploit
888*043036a2SApple OSS Distributions uint16_t len = sizeof(*migrate_src_address_payload) + PFKEY_ALIGN8(migrate_src6->sin6_len);
889*043036a2SApple OSS Distributions migrate_src_address_payload->sadb_address_len = PFKEY_UNIT64(len);
890*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(migrate_src6->sin6_len);
891*043036a2SApple OSS Distributions }
892*043036a2SApple OSS Distributions
893*043036a2SApple OSS Distributions struct sadb_address *migrate_dst_address_payload = (struct sadb_address *)(void *)(payload + tlen);
894*043036a2SApple OSS Distributions migrate_dst_address_payload->sadb_address_exttype = SADB_EXT_MIGRATE_ADDRESS_DST & 0xffff;
895*043036a2SApple OSS Distributions migrate_dst_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
896*043036a2SApple OSS Distributions migrate_dst_address_payload->sadb_address_prefixlen = prefixlen;
897*043036a2SApple OSS Distributions migrate_dst_address_payload->sadb_address_reserved = 0;
898*043036a2SApple OSS Distributions
899*043036a2SApple OSS Distributions tlen += sizeof(*migrate_dst_address_payload);
900*043036a2SApple OSS Distributions
901*043036a2SApple OSS Distributions if (migrate_family == AF_INET) {
902*043036a2SApple OSS Distributions struct sockaddr_in *migrate_dst4 = (struct sockaddr_in *)(void *)(payload + tlen);
903*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, migrate_dst, &migrate_dst4->sin_addr), 1, "migrate dst fail");
904*043036a2SApple OSS Distributions migrate_dst4->sin_family = AF_INET;
905*043036a2SApple OSS Distributions migrate_dst4->sin_len = sizeof(*migrate_dst4);
906*043036a2SApple OSS Distributions uint16_t len = sizeof(*migrate_dst_address_payload) + PFKEY_ALIGN8(migrate_dst4->sin_len);
907*043036a2SApple OSS Distributions migrate_dst_address_payload->sadb_address_len = PFKEY_UNIT64(len);
908*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(migrate_dst4->sin_len);
909*043036a2SApple OSS Distributions } else if (migrate_family == AF_INET6) {
910*043036a2SApple OSS Distributions struct sockaddr_in6 *migrate_dst6 = (struct sockaddr_in6 *)(void *)(payload + tlen);
911*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET6, migrate_dst, &migrate_dst6->sin6_addr), 1, "migrate dst fail");
912*043036a2SApple OSS Distributions migrate_dst6->sin6_family = AF_INET6;
913*043036a2SApple OSS Distributions migrate_dst6->sin6_len = sizeof(*migrate_dst6);
914*043036a2SApple OSS Distributions uint16_t len = sizeof(*migrate_dst_address_payload) + PFKEY_ALIGN8(migrate_dst6->sin6_len);
915*043036a2SApple OSS Distributions migrate_dst_address_payload->sadb_address_len = PFKEY_UNIT64(len);
916*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(migrate_dst6->sin6_len);
917*043036a2SApple OSS Distributions } else if (migrate_family == AF_CHAOS) {
918*043036a2SApple OSS Distributions struct sockaddr_in6 *migrate_dst6 = (struct sockaddr_in6 *)(void *)(payload + tlen);
919*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET6, migrate_dst, &migrate_dst6->sin6_addr), 1, "migrate dst fail");
920*043036a2SApple OSS Distributions migrate_dst6->sin6_family = AF_INET6;
921*043036a2SApple OSS Distributions migrate_dst6->sin6_len = sizeof(*migrate_dst6) + 100; // Bad value to trigger exploit
922*043036a2SApple OSS Distributions uint16_t len = sizeof(*migrate_dst_address_payload) + PFKEY_ALIGN8(migrate_dst6->sin6_len);
923*043036a2SApple OSS Distributions migrate_dst_address_payload->sadb_address_len = PFKEY_UNIT64(len);
924*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(migrate_dst6->sin6_len);
925*043036a2SApple OSS Distributions }
926*043036a2SApple OSS Distributions
927*043036a2SApple OSS Distributions // Update the total length
928*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
929*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send migrate sa");
930*043036a2SApple OSS Distributions }
931*043036a2SApple OSS Distributions
932*043036a2SApple OSS Distributions static void
send_pfkey_get_sa_stat(int pfkey_socket,uint32_t spi,uint32_t stat_length)933*043036a2SApple OSS Distributions send_pfkey_get_sa_stat(int pfkey_socket, uint32_t spi, uint32_t stat_length)
934*043036a2SApple OSS Distributions {
935*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
936*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
937*043036a2SApple OSS Distributions uint16_t tlen = 0;
938*043036a2SApple OSS Distributions
939*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)payload;
940*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
941*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_GETSASTAT;
942*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
943*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_UNSPEC;
944*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
945*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
946*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
947*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (u_int32_t)getpid();
948*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
949*043036a2SApple OSS Distributions
950*043036a2SApple OSS Distributions struct sadb_session_id *session_id_payload = (struct sadb_session_id *)(void *)(payload + tlen);
951*043036a2SApple OSS Distributions session_id_payload->sadb_session_id_len = PFKEY_UNIT64(sizeof(*session_id_payload));
952*043036a2SApple OSS Distributions session_id_payload->sadb_session_id_exttype = SADB_EXT_SESSION_ID;
953*043036a2SApple OSS Distributions session_id_payload->sadb_session_id_v[0] = 1;
954*043036a2SApple OSS Distributions tlen += sizeof(*session_id_payload);
955*043036a2SApple OSS Distributions
956*043036a2SApple OSS Distributions struct sadb_sastat *sadb_stat_payload = (struct sadb_sastat *)(void *)(payload + tlen);
957*043036a2SApple OSS Distributions uint16_t length = sizeof(*sadb_stat_payload) + PFKEY_ALIGN8(sizeof(struct sastat));
958*043036a2SApple OSS Distributions sadb_stat_payload->sadb_sastat_len = PFKEY_UNIT64(length);
959*043036a2SApple OSS Distributions sadb_stat_payload->sadb_sastat_exttype = SADB_EXT_SASTAT;
960*043036a2SApple OSS Distributions sadb_stat_payload->sadb_sastat_dir = IPSEC_DIR_OUTBOUND;
961*043036a2SApple OSS Distributions sadb_stat_payload->sadb_sastat_list_len = stat_length;
962*043036a2SApple OSS Distributions tlen += sizeof(*sadb_stat_payload);
963*043036a2SApple OSS Distributions
964*043036a2SApple OSS Distributions struct sastat *sastat_payload = (struct sastat *)(void *)(payload + tlen);
965*043036a2SApple OSS Distributions sastat_payload->spi = htonl(spi);
966*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(sizeof(*sastat_payload));
967*043036a2SApple OSS Distributions
968*043036a2SApple OSS Distributions // Update the total length
969*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
970*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send get sa stat");
971*043036a2SApple OSS Distributions }
972*043036a2SApple OSS Distributions
973*043036a2SApple OSS Distributions static void
send_pkey_delete_sa(int pfkey_socket,uint32_t spi)974*043036a2SApple OSS Distributions send_pkey_delete_sa(int pfkey_socket, uint32_t spi)
975*043036a2SApple OSS Distributions {
976*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
977*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
978*043036a2SApple OSS Distributions uint16_t tlen = 0;
979*043036a2SApple OSS Distributions
980*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)payload;
981*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
982*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_DELETE;
983*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
984*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_ESP;
985*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
986*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
987*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
988*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (u_int32_t)getpid();
989*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
990*043036a2SApple OSS Distributions
991*043036a2SApple OSS Distributions struct sadb_sa_2 *sa2_payload = (struct sadb_sa_2 *)(void *)(payload + tlen);
992*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_len = PFKEY_UNIT64(sizeof(*sa2_payload));
993*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_exttype = SADB_EXT_SA;
994*043036a2SApple OSS Distributions sa2_payload->sa.sadb_sa_spi = htonl(spi);
995*043036a2SApple OSS Distributions tlen += sizeof(*sa2_payload);
996*043036a2SApple OSS Distributions
997*043036a2SApple OSS Distributions struct sadb_address *src_address_payload = (struct sadb_address *)(void *)(payload + tlen);
998*043036a2SApple OSS Distributions src_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_SRC & 0xffff;
999*043036a2SApple OSS Distributions src_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
1000*043036a2SApple OSS Distributions src_address_payload->sadb_address_prefixlen = (sizeof(struct in_addr) << 3);
1001*043036a2SApple OSS Distributions src_address_payload->sadb_address_reserved = 0;
1002*043036a2SApple OSS Distributions tlen += sizeof(*src_address_payload);
1003*043036a2SApple OSS Distributions
1004*043036a2SApple OSS Distributions struct sockaddr_in *src = (struct sockaddr_in *)(void *)(payload + tlen);
1005*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, TEST_SRC_ADDRESS_IPv4, &src->sin_addr), 1, "migrate src fail");
1006*043036a2SApple OSS Distributions src->sin_family = AF_INET;
1007*043036a2SApple OSS Distributions src->sin_len = sizeof(*src);
1008*043036a2SApple OSS Distributions uint16_t len = sizeof(*src_address_payload) + PFKEY_ALIGN8(src->sin_len);
1009*043036a2SApple OSS Distributions src_address_payload->sadb_address_len = PFKEY_UNIT64(len);
1010*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(src->sin_len);
1011*043036a2SApple OSS Distributions
1012*043036a2SApple OSS Distributions struct sadb_address *dst_address_payload = (struct sadb_address *)(void *)(payload + tlen);
1013*043036a2SApple OSS Distributions dst_address_payload->sadb_address_exttype = SADB_EXT_ADDRESS_DST & 0xffff;
1014*043036a2SApple OSS Distributions dst_address_payload->sadb_address_proto = IPSEC_ULPROTO_ANY & 0xff;
1015*043036a2SApple OSS Distributions dst_address_payload->sadb_address_prefixlen = (sizeof(struct in_addr) << 3);
1016*043036a2SApple OSS Distributions dst_address_payload->sadb_address_reserved = 0;
1017*043036a2SApple OSS Distributions tlen += sizeof(*dst_address_payload);
1018*043036a2SApple OSS Distributions
1019*043036a2SApple OSS Distributions struct sockaddr_in *dst = (struct sockaddr_in *)(void *)(payload + tlen);
1020*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ_INT(inet_pton(AF_INET, TEST_DST_ADDRESS_IPv4, &dst->sin_addr), 1, "migrate dst fail");
1021*043036a2SApple OSS Distributions dst->sin_family = AF_INET;
1022*043036a2SApple OSS Distributions dst->sin_len = sizeof(*dst);
1023*043036a2SApple OSS Distributions len = sizeof(*dst_address_payload) + PFKEY_ALIGN8(dst->sin_len);
1024*043036a2SApple OSS Distributions dst_address_payload->sadb_address_len = PFKEY_UNIT64(len);
1025*043036a2SApple OSS Distributions tlen += PFKEY_ALIGN8(dst->sin_len);
1026*043036a2SApple OSS Distributions
1027*043036a2SApple OSS Distributions // Update the total length
1028*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
1029*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send delete sa");
1030*043036a2SApple OSS Distributions }
1031*043036a2SApple OSS Distributions
1032*043036a2SApple OSS Distributions static void
send_pfkey_sa_dump_message(int pfkey_socket)1033*043036a2SApple OSS Distributions send_pfkey_sa_dump_message(int pfkey_socket)
1034*043036a2SApple OSS Distributions {
1035*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
1036*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
1037*043036a2SApple OSS Distributions uint16_t tlen = 0;
1038*043036a2SApple OSS Distributions
1039*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)(void *)payload;
1040*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
1041*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_DUMP;
1042*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
1043*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_UNSPEC;
1044*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
1045*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
1046*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
1047*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (uint32_t)getpid();
1048*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
1049*043036a2SApple OSS Distributions
1050*043036a2SApple OSS Distributions // Update the total length
1051*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
1052*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey send sa dump failed");
1053*043036a2SApple OSS Distributions }
1054*043036a2SApple OSS Distributions
1055*043036a2SApple OSS Distributions static void
send_pfkey_flush_sa(int pfkey_socket)1056*043036a2SApple OSS Distributions send_pfkey_flush_sa(int pfkey_socket)
1057*043036a2SApple OSS Distributions {
1058*043036a2SApple OSS Distributions uint8_t payload[MCLBYTES] __attribute__ ((aligned(32)));
1059*043036a2SApple OSS Distributions bzero(payload, sizeof(payload));
1060*043036a2SApple OSS Distributions uint16_t tlen = 0;
1061*043036a2SApple OSS Distributions
1062*043036a2SApple OSS Distributions struct sadb_msg *msg_payload = (struct sadb_msg *)payload;
1063*043036a2SApple OSS Distributions msg_payload->sadb_msg_version = PF_KEY_V2;
1064*043036a2SApple OSS Distributions msg_payload->sadb_msg_type = SADB_FLUSH;
1065*043036a2SApple OSS Distributions msg_payload->sadb_msg_errno = 0;
1066*043036a2SApple OSS Distributions msg_payload->sadb_msg_satype = SADB_SATYPE_UNSPEC;
1067*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
1068*043036a2SApple OSS Distributions msg_payload->sadb_msg_reserved = 0;
1069*043036a2SApple OSS Distributions msg_payload->sadb_msg_seq = 0;
1070*043036a2SApple OSS Distributions msg_payload->sadb_msg_pid = (u_int32_t)getpid();
1071*043036a2SApple OSS Distributions tlen += sizeof(*msg_payload);
1072*043036a2SApple OSS Distributions
1073*043036a2SApple OSS Distributions // Update the total length
1074*043036a2SApple OSS Distributions msg_payload->sadb_msg_len = PFKEY_UNIT64(tlen);
1075*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(send(pfkey_socket, payload, (size_t)PFKEY_UNUNIT64(msg_payload->sadb_msg_len), 0), "pfkey flush sa");
1076*043036a2SApple OSS Distributions }
1077*043036a2SApple OSS Distributions
1078*043036a2SApple OSS Distributions static void
pfkey_cleanup(void)1079*043036a2SApple OSS Distributions pfkey_cleanup(void)
1080*043036a2SApple OSS Distributions {
1081*043036a2SApple OSS Distributions if (pfkey_source != NULL) {
1082*043036a2SApple OSS Distributions int pfkey_socket = (int)dispatch_source_get_handle(pfkey_source);
1083*043036a2SApple OSS Distributions if (pfkey_socket > 0) {
1084*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1085*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1086*043036a2SApple OSS Distributions }
1087*043036a2SApple OSS Distributions dispatch_source_cancel(pfkey_source);
1088*043036a2SApple OSS Distributions pfkey_source = NULL;
1089*043036a2SApple OSS Distributions }
1090*043036a2SApple OSS Distributions
1091*043036a2SApple OSS Distributions if (oldmax != 0) {
1092*043036a2SApple OSS Distributions (void)sysctlbyname("kern.ipc.maxsockbuf", NULL, NULL, &oldmax, sizeof(oldmax));
1093*043036a2SApple OSS Distributions }
1094*043036a2SApple OSS Distributions }
1095*043036a2SApple OSS Distributions
1096*043036a2SApple OSS Distributions static int
pfkey_setup_socket(void)1097*043036a2SApple OSS Distributions pfkey_setup_socket(void)
1098*043036a2SApple OSS Distributions {
1099*043036a2SApple OSS Distributions int pfkey_socket = -1;
1100*043036a2SApple OSS Distributions int bufsiz = 0;
1101*043036a2SApple OSS Distributions const unsigned long newbufk = 1536;
1102*043036a2SApple OSS Distributions size_t oldmaxsize = sizeof(oldmax);
1103*043036a2SApple OSS Distributions unsigned long newmax = newbufk * (1024 + 128);
1104*043036a2SApple OSS Distributions
1105*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(pfkey_socket = socket(PF_KEY, SOCK_RAW, PF_KEY_V2), NULL);
1106*043036a2SApple OSS Distributions
1107*043036a2SApple OSS Distributions if (sysctlbyname("kern.ipc.maxsockbuf", &oldmax, &oldmaxsize, &newmax, sizeof(newmax)) != 0) {
1108*043036a2SApple OSS Distributions bufsiz = 233016; /* Max allowed by default */
1109*043036a2SApple OSS Distributions } else {
1110*043036a2SApple OSS Distributions bufsiz = newbufk * 800;
1111*043036a2SApple OSS Distributions }
1112*043036a2SApple OSS Distributions
1113*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(setsockopt(pfkey_socket, SOL_SOCKET, SO_SNDBUF, &bufsiz, sizeof(bufsiz)), "pfkey set snd socket buf failed %d", bufsiz);
1114*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(setsockopt(pfkey_socket, SOL_SOCKET, SO_RCVBUF, &bufsiz, sizeof(bufsiz)), "pfkey set recv socket buf failed %d", bufsiz);
1115*043036a2SApple OSS Distributions
1116*043036a2SApple OSS Distributions pfkey_source = dispatch_source_create(DISPATCH_SOURCE_TYPE_READ, (uintptr_t)pfkey_socket, 0, dispatch_get_main_queue());
1117*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(pfkey_source, "dispatch_source_create(DISPATCH_SOURCE_TYPE_READ, ...)");
1118*043036a2SApple OSS Distributions dispatch_source_set_event_handler(pfkey_source, ^{
1119*043036a2SApple OSS Distributions recv_pfkey_message(pfkey_socket);
1120*043036a2SApple OSS Distributions });
1121*043036a2SApple OSS Distributions dispatch_source_set_cancel_handler(pfkey_source, ^{
1122*043036a2SApple OSS Distributions close(pfkey_socket);
1123*043036a2SApple OSS Distributions });
1124*043036a2SApple OSS Distributions dispatch_resume(pfkey_source);
1125*043036a2SApple OSS Distributions return pfkey_socket;
1126*043036a2SApple OSS Distributions }
1127*043036a2SApple OSS Distributions
1128*043036a2SApple OSS Distributions static void
pfkey_process_message_test_60822136(uint8_t ** mhp,int pfkey_socket)1129*043036a2SApple OSS Distributions pfkey_process_message_test_60822136(uint8_t **mhp, int pfkey_socket)
1130*043036a2SApple OSS Distributions {
1131*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1132*043036a2SApple OSS Distributions static int counter = 0;
1133*043036a2SApple OSS Distributions static uint32_t policy_id = 0;
1134*043036a2SApple OSS Distributions
1135*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1136*043036a2SApple OSS Distributions return;
1137*043036a2SApple OSS Distributions }
1138*043036a2SApple OSS Distributions
1139*043036a2SApple OSS Distributions if (message->sadb_msg_errno) {
1140*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_type, SADB_X_SPDDUMP, "SADB error for type %u", message->sadb_msg_type);
1141*043036a2SApple OSS Distributions pfkey_cleanup();
1142*043036a2SApple OSS Distributions T_END;
1143*043036a2SApple OSS Distributions }
1144*043036a2SApple OSS Distributions
1145*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1146*043036a2SApple OSS Distributions case SADB_X_SPDADD:
1147*043036a2SApple OSS Distributions {
1148*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1149*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd add policy message is NULL");
1150*043036a2SApple OSS Distributions policy_id = policy_message->sadb_x_policy_id;
1151*043036a2SApple OSS Distributions T_LOG("Added policy id %u", policy_id);
1152*043036a2SApple OSS Distributions send_pfkey_spd_get_message(pfkey_socket, policy_id);
1153*043036a2SApple OSS Distributions break;
1154*043036a2SApple OSS Distributions }
1155*043036a2SApple OSS Distributions case SADB_X_SPDGET:
1156*043036a2SApple OSS Distributions {
1157*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1158*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd get policy message is NULL");
1159*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(policy_id, policy_message->sadb_x_policy_id, "spd_get: spid mismatch %u != %u", policy_id, policy_message->sadb_x_policy_id);
1160*043036a2SApple OSS Distributions if (counter < MAX_SPD_CHECK) {
1161*043036a2SApple OSS Distributions counter++;
1162*043036a2SApple OSS Distributions send_pfkey_spd_get_message(pfkey_socket, policy_id);
1163*043036a2SApple OSS Distributions } else {
1164*043036a2SApple OSS Distributions T_LOG("Deleting policy id %u", policy_id);
1165*043036a2SApple OSS Distributions send_pfkey_spd_delete_message(pfkey_socket, policy_id);
1166*043036a2SApple OSS Distributions }
1167*043036a2SApple OSS Distributions break;
1168*043036a2SApple OSS Distributions }
1169*043036a2SApple OSS Distributions case SADB_X_SPDDELETE2:
1170*043036a2SApple OSS Distributions {
1171*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1172*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd delete2 policy message is NULL");
1173*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(policy_id, policy_message->sadb_x_policy_id, "spd_delete2: spid mismatch %u != %u", policy_id, policy_message->sadb_x_policy_id);
1174*043036a2SApple OSS Distributions T_LOG("Deleted policy id %u", policy_id);
1175*043036a2SApple OSS Distributions sleep(2);
1176*043036a2SApple OSS Distributions send_pfkey_spd_dump_message(pfkey_socket);
1177*043036a2SApple OSS Distributions break;
1178*043036a2SApple OSS Distributions }
1179*043036a2SApple OSS Distributions case SADB_X_SPDDUMP:
1180*043036a2SApple OSS Distributions {
1181*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1182*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd dump policy message is NULL");
1183*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(policy_id, policy_message->sadb_x_policy_id, "spd_dump: spid mismatch %u != %u", policy_id, policy_message->sadb_x_policy_id);
1184*043036a2SApple OSS Distributions T_FAIL("Policy id %u still exists", policy_id);
1185*043036a2SApple OSS Distributions pfkey_cleanup();
1186*043036a2SApple OSS Distributions T_END;
1187*043036a2SApple OSS Distributions }
1188*043036a2SApple OSS Distributions case SADB_FLUSH:
1189*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1190*043036a2SApple OSS Distributions break;
1191*043036a2SApple OSS Distributions default:
1192*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1193*043036a2SApple OSS Distributions T_END;
1194*043036a2SApple OSS Distributions }
1195*043036a2SApple OSS Distributions return;
1196*043036a2SApple OSS Distributions }
1197*043036a2SApple OSS Distributions
1198*043036a2SApple OSS Distributions static void
pfkey_process_message_test_60822924(uint8_t ** mhp,int pfkey_socket)1199*043036a2SApple OSS Distributions pfkey_process_message_test_60822924(uint8_t **mhp, int pfkey_socket)
1200*043036a2SApple OSS Distributions {
1201*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1202*043036a2SApple OSS Distributions static int counter = 0;
1203*043036a2SApple OSS Distributions static uint32_t policy_id = 0;
1204*043036a2SApple OSS Distributions
1205*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1206*043036a2SApple OSS Distributions return;
1207*043036a2SApple OSS Distributions }
1208*043036a2SApple OSS Distributions
1209*043036a2SApple OSS Distributions if (message->sadb_msg_errno) {
1210*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_type, SADB_X_SPDDUMP, "SADB error for type %u", message->sadb_msg_type);
1211*043036a2SApple OSS Distributions pfkey_cleanup();
1212*043036a2SApple OSS Distributions T_END;
1213*043036a2SApple OSS Distributions }
1214*043036a2SApple OSS Distributions
1215*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1216*043036a2SApple OSS Distributions case SADB_X_SPDADD:
1217*043036a2SApple OSS Distributions {
1218*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1219*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd add policy message is NULL");
1220*043036a2SApple OSS Distributions policy_id = policy_message->sadb_x_policy_id;
1221*043036a2SApple OSS Distributions T_LOG("Added policy id %u", policy_id);
1222*043036a2SApple OSS Distributions send_pfkey_spd_enable_message(pfkey_socket, policy_id);
1223*043036a2SApple OSS Distributions break;
1224*043036a2SApple OSS Distributions }
1225*043036a2SApple OSS Distributions case SADB_X_SPDENABLE:
1226*043036a2SApple OSS Distributions {
1227*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1228*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd enable policy message is NULL");
1229*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(policy_id, policy_message->sadb_x_policy_id, "spd_enable: spid mismatch %u != %u", policy_id, policy_message->sadb_x_policy_id);
1230*043036a2SApple OSS Distributions if (counter < MAX_SPD_CHECK) {
1231*043036a2SApple OSS Distributions counter++;
1232*043036a2SApple OSS Distributions send_pfkey_spd_enable_message(pfkey_socket, policy_id);
1233*043036a2SApple OSS Distributions } else {
1234*043036a2SApple OSS Distributions T_LOG("Deleting policy id %u", policy_id);
1235*043036a2SApple OSS Distributions send_pfkey_spd_delete_message(pfkey_socket, policy_id);
1236*043036a2SApple OSS Distributions }
1237*043036a2SApple OSS Distributions break;
1238*043036a2SApple OSS Distributions }
1239*043036a2SApple OSS Distributions case SADB_X_SPDDELETE2:
1240*043036a2SApple OSS Distributions {
1241*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1242*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd delete2 policy message is NULL");
1243*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(policy_id, policy_message->sadb_x_policy_id, "spd_delete2: spid mismatch %u != %u", policy_id, policy_message->sadb_x_policy_id);
1244*043036a2SApple OSS Distributions T_LOG("Deleted policy id %u", policy_id);
1245*043036a2SApple OSS Distributions sleep(2);
1246*043036a2SApple OSS Distributions send_pfkey_spd_dump_message(pfkey_socket);
1247*043036a2SApple OSS Distributions break;
1248*043036a2SApple OSS Distributions }
1249*043036a2SApple OSS Distributions case SADB_X_SPDDUMP:
1250*043036a2SApple OSS Distributions {
1251*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1252*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd dump policy message is NULL");
1253*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(policy_id, policy_message->sadb_x_policy_id, "spd_dump: spid mismatch %u != %u", policy_id, policy_message->sadb_x_policy_id);
1254*043036a2SApple OSS Distributions T_FAIL("Policy id %u still exists", policy_id);
1255*043036a2SApple OSS Distributions pfkey_cleanup();
1256*043036a2SApple OSS Distributions T_END;
1257*043036a2SApple OSS Distributions }
1258*043036a2SApple OSS Distributions case SADB_FLUSH:
1259*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1260*043036a2SApple OSS Distributions break;
1261*043036a2SApple OSS Distributions default:
1262*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1263*043036a2SApple OSS Distributions T_END;
1264*043036a2SApple OSS Distributions }
1265*043036a2SApple OSS Distributions return;
1266*043036a2SApple OSS Distributions }
1267*043036a2SApple OSS Distributions
1268*043036a2SApple OSS Distributions static void
pfkey_process_message_test_60822956(uint8_t ** mhp,int pfkey_socket)1269*043036a2SApple OSS Distributions pfkey_process_message_test_60822956(uint8_t **mhp, int pfkey_socket)
1270*043036a2SApple OSS Distributions {
1271*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1272*043036a2SApple OSS Distributions static int counter = 0;
1273*043036a2SApple OSS Distributions static uint32_t policy_id = 0;
1274*043036a2SApple OSS Distributions
1275*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1276*043036a2SApple OSS Distributions return;
1277*043036a2SApple OSS Distributions }
1278*043036a2SApple OSS Distributions
1279*043036a2SApple OSS Distributions if (message->sadb_msg_errno) {
1280*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_type, SADB_X_SPDDUMP, "SADB error for type %u", message->sadb_msg_type);
1281*043036a2SApple OSS Distributions pfkey_cleanup();
1282*043036a2SApple OSS Distributions T_END;
1283*043036a2SApple OSS Distributions }
1284*043036a2SApple OSS Distributions
1285*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1286*043036a2SApple OSS Distributions case SADB_X_SPDADD:
1287*043036a2SApple OSS Distributions {
1288*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1289*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd add policy message is NULL");
1290*043036a2SApple OSS Distributions policy_id = policy_message->sadb_x_policy_id;
1291*043036a2SApple OSS Distributions T_LOG("Added policy id %u", policy_id);
1292*043036a2SApple OSS Distributions send_pfkey_spd_disable_message(pfkey_socket, policy_id);
1293*043036a2SApple OSS Distributions break;
1294*043036a2SApple OSS Distributions }
1295*043036a2SApple OSS Distributions case SADB_X_SPDDISABLE:
1296*043036a2SApple OSS Distributions {
1297*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1298*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd disable policy message is NULL");
1299*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(policy_id, policy_message->sadb_x_policy_id, "spd_disable: spid mismatch %u != %u", policy_id, policy_message->sadb_x_policy_id);
1300*043036a2SApple OSS Distributions if (counter < MAX_SPD_CHECK) {
1301*043036a2SApple OSS Distributions counter++;
1302*043036a2SApple OSS Distributions send_pfkey_spd_disable_message(pfkey_socket, policy_id);
1303*043036a2SApple OSS Distributions } else {
1304*043036a2SApple OSS Distributions T_LOG("Deleting policy id %u", policy_id);
1305*043036a2SApple OSS Distributions send_pfkey_spd_delete_message(pfkey_socket, policy_id);
1306*043036a2SApple OSS Distributions }
1307*043036a2SApple OSS Distributions break;
1308*043036a2SApple OSS Distributions }
1309*043036a2SApple OSS Distributions case SADB_X_SPDDELETE2:
1310*043036a2SApple OSS Distributions {
1311*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1312*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd delete2 policy message is NULL");
1313*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(policy_id, policy_message->sadb_x_policy_id, "spd_delete2: spid mismatch %u != %u", policy_id, policy_message->sadb_x_policy_id);
1314*043036a2SApple OSS Distributions T_LOG("Deleted policy id %u", policy_id);
1315*043036a2SApple OSS Distributions sleep(2);
1316*043036a2SApple OSS Distributions send_pfkey_spd_dump_message(pfkey_socket);
1317*043036a2SApple OSS Distributions break;
1318*043036a2SApple OSS Distributions }
1319*043036a2SApple OSS Distributions case SADB_X_SPDDUMP:
1320*043036a2SApple OSS Distributions {
1321*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1322*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd dump policy message is NULL");
1323*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(policy_id, policy_message->sadb_x_policy_id, "spd_dump: spid mismatch %u != %u", policy_id, policy_message->sadb_x_policy_id);
1324*043036a2SApple OSS Distributions T_FAIL("Policy id %u still exists", policy_id);
1325*043036a2SApple OSS Distributions pfkey_cleanup();
1326*043036a2SApple OSS Distributions T_END;
1327*043036a2SApple OSS Distributions }
1328*043036a2SApple OSS Distributions case SADB_FLUSH:
1329*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1330*043036a2SApple OSS Distributions break;
1331*043036a2SApple OSS Distributions default:
1332*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1333*043036a2SApple OSS Distributions T_END;
1334*043036a2SApple OSS Distributions }
1335*043036a2SApple OSS Distributions return;
1336*043036a2SApple OSS Distributions }
1337*043036a2SApple OSS Distributions
1338*043036a2SApple OSS Distributions static void
pfkey_process_message_test_60679513(uint8_t ** mhp,int pfkey_socket)1339*043036a2SApple OSS Distributions pfkey_process_message_test_60679513(uint8_t **mhp, int pfkey_socket)
1340*043036a2SApple OSS Distributions {
1341*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1342*043036a2SApple OSS Distributions static uint32_t spi = 0;
1343*043036a2SApple OSS Distributions
1344*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1345*043036a2SApple OSS Distributions return;
1346*043036a2SApple OSS Distributions }
1347*043036a2SApple OSS Distributions
1348*043036a2SApple OSS Distributions if (message->sadb_msg_errno) {
1349*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_type, SADB_UPDATE, "SADB error for type %u", message->sadb_msg_type);
1350*043036a2SApple OSS Distributions }
1351*043036a2SApple OSS Distributions
1352*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1353*043036a2SApple OSS Distributions case SADB_GETSPI:
1354*043036a2SApple OSS Distributions {
1355*043036a2SApple OSS Distributions struct sadb_sa *sa_message = (struct sadb_sa *)(void *)mhp[SADB_EXT_SA];
1356*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(sa_message, "sa get spi message is NULL");
1357*043036a2SApple OSS Distributions spi = ntohl(sa_message->sadb_sa_spi);
1358*043036a2SApple OSS Distributions T_LOG("get spi 0x%x", spi);
1359*043036a2SApple OSS Distributions send_pkey_update_sa(pfkey_socket, spi);
1360*043036a2SApple OSS Distributions break;
1361*043036a2SApple OSS Distributions }
1362*043036a2SApple OSS Distributions case SADB_UPDATE:
1363*043036a2SApple OSS Distributions {
1364*043036a2SApple OSS Distributions struct sadb_sa *sa_message = (struct sadb_sa *)(void *)mhp[SADB_EXT_SA];
1365*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(sa_message, "update sa message is NULL");
1366*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(spi, ntohl(sa_message->sadb_sa_spi), "sadb update: spi mismatch %u != %u", spi, ntohl(sa_message->sadb_sa_spi));
1367*043036a2SApple OSS Distributions T_LOG("update sa 0x%x", spi);
1368*043036a2SApple OSS Distributions send_pkey_delete_sa(pfkey_socket, spi);
1369*043036a2SApple OSS Distributions break;
1370*043036a2SApple OSS Distributions }
1371*043036a2SApple OSS Distributions case SADB_DELETE:
1372*043036a2SApple OSS Distributions {
1373*043036a2SApple OSS Distributions struct sadb_sa *sa_message = (struct sadb_sa *)(void *)mhp[SADB_EXT_SA];
1374*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(sa_message, "delete sa message is NULL");
1375*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(spi, ntohl(sa_message->sadb_sa_spi), "sadb delete: spi mismatch %u != %u", spi, ntohl(sa_message->sadb_sa_spi));
1376*043036a2SApple OSS Distributions T_LOG("delete sa 0x%x", spi);
1377*043036a2SApple OSS Distributions pfkey_cleanup();
1378*043036a2SApple OSS Distributions T_END;
1379*043036a2SApple OSS Distributions }
1380*043036a2SApple OSS Distributions case SADB_FLUSH:
1381*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1382*043036a2SApple OSS Distributions break;
1383*043036a2SApple OSS Distributions default:
1384*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1385*043036a2SApple OSS Distributions T_END;
1386*043036a2SApple OSS Distributions }
1387*043036a2SApple OSS Distributions return;
1388*043036a2SApple OSS Distributions }
1389*043036a2SApple OSS Distributions
1390*043036a2SApple OSS Distributions static void
pfkey_process_message_test_60768729(uint8_t ** mhp,int pfkey_socket)1391*043036a2SApple OSS Distributions pfkey_process_message_test_60768729(uint8_t **mhp, int pfkey_socket)
1392*043036a2SApple OSS Distributions {
1393*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1394*043036a2SApple OSS Distributions uint32_t spi = 0;
1395*043036a2SApple OSS Distributions static int counter = 0;
1396*043036a2SApple OSS Distributions
1397*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1398*043036a2SApple OSS Distributions return;
1399*043036a2SApple OSS Distributions }
1400*043036a2SApple OSS Distributions
1401*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_errno, 0, "SADB error for type %u", message->sadb_msg_type);
1402*043036a2SApple OSS Distributions
1403*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1404*043036a2SApple OSS Distributions case SADB_GETSPI:
1405*043036a2SApple OSS Distributions {
1406*043036a2SApple OSS Distributions struct sadb_sa *sa_message = (struct sadb_sa *)(void *)mhp[SADB_EXT_SA];
1407*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(sa_message, "sa get spi message is NULL");
1408*043036a2SApple OSS Distributions spi = ntohl(sa_message->sadb_sa_spi);
1409*043036a2SApple OSS Distributions counter++;
1410*043036a2SApple OSS Distributions if (counter <= 1000) {
1411*043036a2SApple OSS Distributions send_pkey_get_spi(pfkey_socket);
1412*043036a2SApple OSS Distributions } else {
1413*043036a2SApple OSS Distributions T_LOG("SADB added 1000 Larval SPIs");
1414*043036a2SApple OSS Distributions send_pfkey_sa_dump_message(pfkey_socket);
1415*043036a2SApple OSS Distributions }
1416*043036a2SApple OSS Distributions break;
1417*043036a2SApple OSS Distributions }
1418*043036a2SApple OSS Distributions case SADB_DUMP:
1419*043036a2SApple OSS Distributions {
1420*043036a2SApple OSS Distributions counter--;
1421*043036a2SApple OSS Distributions if (counter == 0) {
1422*043036a2SApple OSS Distributions T_PASS("SADB dump successful");
1423*043036a2SApple OSS Distributions pfkey_cleanup();
1424*043036a2SApple OSS Distributions T_END;
1425*043036a2SApple OSS Distributions }
1426*043036a2SApple OSS Distributions break;
1427*043036a2SApple OSS Distributions }
1428*043036a2SApple OSS Distributions
1429*043036a2SApple OSS Distributions case SADB_FLUSH:
1430*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1431*043036a2SApple OSS Distributions break;
1432*043036a2SApple OSS Distributions default:
1433*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1434*043036a2SApple OSS Distributions T_END;
1435*043036a2SApple OSS Distributions }
1436*043036a2SApple OSS Distributions return;
1437*043036a2SApple OSS Distributions }
1438*043036a2SApple OSS Distributions
1439*043036a2SApple OSS Distributions static void
pfkey_process_message_test_60769680(uint8_t ** mhp,int pfkey_socket)1440*043036a2SApple OSS Distributions pfkey_process_message_test_60769680(uint8_t **mhp, int pfkey_socket)
1441*043036a2SApple OSS Distributions {
1442*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1443*043036a2SApple OSS Distributions static uint8_t counter = 0;
1444*043036a2SApple OSS Distributions
1445*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1446*043036a2SApple OSS Distributions return;
1447*043036a2SApple OSS Distributions }
1448*043036a2SApple OSS Distributions
1449*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_errno, 0, "SADB error for type %u error %d", message->sadb_msg_type, message->sadb_msg_errno);
1450*043036a2SApple OSS Distributions
1451*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1452*043036a2SApple OSS Distributions case SADB_X_SPDADD:
1453*043036a2SApple OSS Distributions {
1454*043036a2SApple OSS Distributions struct sadb_x_policy *policy_message = (struct sadb_x_policy *)(void *)mhp[SADB_X_EXT_POLICY];
1455*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(policy_message, "spd add policy message is NULL");
1456*043036a2SApple OSS Distributions counter++;
1457*043036a2SApple OSS Distributions if (counter <= 240) {
1458*043036a2SApple OSS Distributions send_pfkey_spd_add_message(pfkey_socket, counter + 1);
1459*043036a2SApple OSS Distributions } else {
1460*043036a2SApple OSS Distributions T_LOG("SADB added 240 security policies");
1461*043036a2SApple OSS Distributions send_pfkey_spd_dump_message(pfkey_socket);
1462*043036a2SApple OSS Distributions }
1463*043036a2SApple OSS Distributions break;
1464*043036a2SApple OSS Distributions }
1465*043036a2SApple OSS Distributions case SADB_X_SPDDUMP:
1466*043036a2SApple OSS Distributions {
1467*043036a2SApple OSS Distributions counter--;
1468*043036a2SApple OSS Distributions if (counter == 0) {
1469*043036a2SApple OSS Distributions T_PASS("SADB policy dump successful");
1470*043036a2SApple OSS Distributions pfkey_cleanup();
1471*043036a2SApple OSS Distributions T_END;
1472*043036a2SApple OSS Distributions }
1473*043036a2SApple OSS Distributions break;
1474*043036a2SApple OSS Distributions }
1475*043036a2SApple OSS Distributions
1476*043036a2SApple OSS Distributions case SADB_FLUSH:
1477*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1478*043036a2SApple OSS Distributions break;
1479*043036a2SApple OSS Distributions default:
1480*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1481*043036a2SApple OSS Distributions T_END;
1482*043036a2SApple OSS Distributions }
1483*043036a2SApple OSS Distributions return;
1484*043036a2SApple OSS Distributions }
1485*043036a2SApple OSS Distributions
1486*043036a2SApple OSS Distributions static void
pfkey_process_message_test_60822823(uint8_t ** mhp,int pfkey_socket)1487*043036a2SApple OSS Distributions pfkey_process_message_test_60822823(uint8_t **mhp, int pfkey_socket)
1488*043036a2SApple OSS Distributions {
1489*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1490*043036a2SApple OSS Distributions static uint32_t spi = 0;
1491*043036a2SApple OSS Distributions
1492*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1493*043036a2SApple OSS Distributions return;
1494*043036a2SApple OSS Distributions }
1495*043036a2SApple OSS Distributions
1496*043036a2SApple OSS Distributions if (message->sadb_msg_errno != 0) {
1497*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_type, SADB_GETSASTAT, "SADB error for type %u error %d", message->sadb_msg_type, message->sadb_msg_errno);
1498*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_errno, EINVAL, "SADB error for type %u error %d", message->sadb_msg_type, message->sadb_msg_errno);
1499*043036a2SApple OSS Distributions T_PASS("SADB get SA Stat received EINVAL");
1500*043036a2SApple OSS Distributions T_END;
1501*043036a2SApple OSS Distributions }
1502*043036a2SApple OSS Distributions
1503*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1504*043036a2SApple OSS Distributions case SADB_ADD:
1505*043036a2SApple OSS Distributions {
1506*043036a2SApple OSS Distributions struct sadb_sa *sa_message = (struct sadb_sa *)(void *)mhp[SADB_EXT_SA];
1507*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(sa_message, "add sa message is NULL");
1508*043036a2SApple OSS Distributions spi = ntohl(sa_message->sadb_sa_spi);
1509*043036a2SApple OSS Distributions T_LOG("added sa 0x%x", spi);
1510*043036a2SApple OSS Distributions send_pfkey_get_sa_stat(pfkey_socket, spi, 5);
1511*043036a2SApple OSS Distributions break;
1512*043036a2SApple OSS Distributions }
1513*043036a2SApple OSS Distributions case SADB_GETSASTAT:
1514*043036a2SApple OSS Distributions {
1515*043036a2SApple OSS Distributions T_FAIL("get sa stat should fail %u", message->sadb_msg_type);
1516*043036a2SApple OSS Distributions T_END;
1517*043036a2SApple OSS Distributions }
1518*043036a2SApple OSS Distributions case SADB_FLUSH:
1519*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1520*043036a2SApple OSS Distributions break;
1521*043036a2SApple OSS Distributions default:
1522*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1523*043036a2SApple OSS Distributions T_END;
1524*043036a2SApple OSS Distributions }
1525*043036a2SApple OSS Distributions return;
1526*043036a2SApple OSS Distributions }
1527*043036a2SApple OSS Distributions
1528*043036a2SApple OSS Distributions static void
pfkey_process_message_test_60822823_1(uint8_t ** mhp,int pfkey_socket)1529*043036a2SApple OSS Distributions pfkey_process_message_test_60822823_1(uint8_t **mhp, int pfkey_socket)
1530*043036a2SApple OSS Distributions {
1531*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1532*043036a2SApple OSS Distributions static uint32_t spi = 0;
1533*043036a2SApple OSS Distributions
1534*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1535*043036a2SApple OSS Distributions return;
1536*043036a2SApple OSS Distributions }
1537*043036a2SApple OSS Distributions
1538*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_errno, 0, "SADB error for type %u error %d", message->sadb_msg_type, message->sadb_msg_errno);
1539*043036a2SApple OSS Distributions
1540*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1541*043036a2SApple OSS Distributions case SADB_ADD:
1542*043036a2SApple OSS Distributions {
1543*043036a2SApple OSS Distributions struct sadb_sa *sa_message = (struct sadb_sa *)(void *)mhp[SADB_EXT_SA];
1544*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(sa_message, "add sa message is NULL");
1545*043036a2SApple OSS Distributions spi = ntohl(sa_message->sadb_sa_spi);
1546*043036a2SApple OSS Distributions T_LOG("added sa 0x%x", spi);
1547*043036a2SApple OSS Distributions send_pfkey_get_sa_stat(pfkey_socket, spi, 1);
1548*043036a2SApple OSS Distributions break;
1549*043036a2SApple OSS Distributions }
1550*043036a2SApple OSS Distributions case SADB_GETSASTAT:
1551*043036a2SApple OSS Distributions {
1552*043036a2SApple OSS Distributions struct sadb_session_id *session_id = (struct sadb_session_id *)(void *)mhp[SADB_EXT_SESSION_ID];
1553*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(session_id, "session id is NULL");
1554*043036a2SApple OSS Distributions T_QUIET; T_EXPECT_EQ_ULLONG(session_id->sadb_session_id_v[0], 1ULL, "Session id is not equal");
1555*043036a2SApple OSS Distributions T_PASS("get sa stat success %u", message->sadb_msg_type);
1556*043036a2SApple OSS Distributions T_END;
1557*043036a2SApple OSS Distributions }
1558*043036a2SApple OSS Distributions case SADB_FLUSH:
1559*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1560*043036a2SApple OSS Distributions break;
1561*043036a2SApple OSS Distributions default:
1562*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1563*043036a2SApple OSS Distributions T_END;
1564*043036a2SApple OSS Distributions }
1565*043036a2SApple OSS Distributions return;
1566*043036a2SApple OSS Distributions }
1567*043036a2SApple OSS Distributions
1568*043036a2SApple OSS Distributions static void
pfkey_process_message_test_60687183(uint8_t ** mhp,int pfkey_socket)1569*043036a2SApple OSS Distributions pfkey_process_message_test_60687183(uint8_t **mhp, int pfkey_socket)
1570*043036a2SApple OSS Distributions {
1571*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1572*043036a2SApple OSS Distributions static uint32_t spi = 0;
1573*043036a2SApple OSS Distributions
1574*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1575*043036a2SApple OSS Distributions return;
1576*043036a2SApple OSS Distributions }
1577*043036a2SApple OSS Distributions
1578*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_errno, 0, "SADB error for type %u error %d", message->sadb_msg_type, message->sadb_msg_errno);
1579*043036a2SApple OSS Distributions
1580*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1581*043036a2SApple OSS Distributions case SADB_ADD:
1582*043036a2SApple OSS Distributions {
1583*043036a2SApple OSS Distributions struct sadb_sa *sa_message = (struct sadb_sa *)(void *)mhp[SADB_EXT_SA];
1584*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(sa_message, "add sa message is NULL");
1585*043036a2SApple OSS Distributions spi = ntohl(sa_message->sadb_sa_spi);
1586*043036a2SApple OSS Distributions T_LOG("added sa 0x%x", spi);
1587*043036a2SApple OSS Distributions send_pkey_migrate_sa(pfkey_socket, spi, TEST_SRC_ADDRESS_IPv4, TEST_DST_ADDRESS_IPv4, AF_INET,
1588*043036a2SApple OSS Distributions TEST_MIGRATE_SRC_ADDRESS_IPv4, TEST_MIGRATE_DST_ADDRESS_IPv4, AF_INET);
1589*043036a2SApple OSS Distributions break;
1590*043036a2SApple OSS Distributions }
1591*043036a2SApple OSS Distributions case SADB_MIGRATE:
1592*043036a2SApple OSS Distributions {
1593*043036a2SApple OSS Distributions T_PASS("migrate SA success");
1594*043036a2SApple OSS Distributions T_END;
1595*043036a2SApple OSS Distributions }
1596*043036a2SApple OSS Distributions case SADB_FLUSH:
1597*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1598*043036a2SApple OSS Distributions break;
1599*043036a2SApple OSS Distributions default:
1600*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1601*043036a2SApple OSS Distributions T_END;
1602*043036a2SApple OSS Distributions }
1603*043036a2SApple OSS Distributions return;
1604*043036a2SApple OSS Distributions }
1605*043036a2SApple OSS Distributions
1606*043036a2SApple OSS Distributions static void
pfkey_process_message_test_60687183_1(uint8_t ** mhp,int pfkey_socket)1607*043036a2SApple OSS Distributions pfkey_process_message_test_60687183_1(uint8_t **mhp, int pfkey_socket)
1608*043036a2SApple OSS Distributions {
1609*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1610*043036a2SApple OSS Distributions static uint32_t spi = 0;
1611*043036a2SApple OSS Distributions
1612*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1613*043036a2SApple OSS Distributions return;
1614*043036a2SApple OSS Distributions }
1615*043036a2SApple OSS Distributions
1616*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_errno, 0, "SADB error for type %u error %d", message->sadb_msg_type, message->sadb_msg_errno);
1617*043036a2SApple OSS Distributions
1618*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1619*043036a2SApple OSS Distributions case SADB_ADD:
1620*043036a2SApple OSS Distributions {
1621*043036a2SApple OSS Distributions struct sadb_sa *sa_message = (struct sadb_sa *)(void *)mhp[SADB_EXT_SA];
1622*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(sa_message, "add sa message is NULL");
1623*043036a2SApple OSS Distributions spi = ntohl(sa_message->sadb_sa_spi);
1624*043036a2SApple OSS Distributions T_LOG("added sa 0x%x", spi);
1625*043036a2SApple OSS Distributions send_pkey_migrate_sa(pfkey_socket, spi, TEST_SRC_ADDRESS_IPv6, TEST_DST_ADDRESS_IPv6, AF_INET6,
1626*043036a2SApple OSS Distributions TEST_MIGRATE_SRC_ADDRESS_IPv6, TEST_MIGRATE_DST_ADDRESS_IPv6, AF_INET6);
1627*043036a2SApple OSS Distributions break;
1628*043036a2SApple OSS Distributions }
1629*043036a2SApple OSS Distributions case SADB_MIGRATE:
1630*043036a2SApple OSS Distributions {
1631*043036a2SApple OSS Distributions T_PASS("migrate SA success");
1632*043036a2SApple OSS Distributions T_END;
1633*043036a2SApple OSS Distributions }
1634*043036a2SApple OSS Distributions case SADB_FLUSH:
1635*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1636*043036a2SApple OSS Distributions break;
1637*043036a2SApple OSS Distributions default:
1638*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1639*043036a2SApple OSS Distributions T_END;
1640*043036a2SApple OSS Distributions }
1641*043036a2SApple OSS Distributions return;
1642*043036a2SApple OSS Distributions }
1643*043036a2SApple OSS Distributions
1644*043036a2SApple OSS Distributions static void
pfkey_process_message_test_60687183_2(uint8_t ** mhp,int pfkey_socket)1645*043036a2SApple OSS Distributions pfkey_process_message_test_60687183_2(uint8_t **mhp, int pfkey_socket)
1646*043036a2SApple OSS Distributions {
1647*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1648*043036a2SApple OSS Distributions static uint32_t spi = 0;
1649*043036a2SApple OSS Distributions
1650*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1651*043036a2SApple OSS Distributions return;
1652*043036a2SApple OSS Distributions }
1653*043036a2SApple OSS Distributions
1654*043036a2SApple OSS Distributions if (message->sadb_msg_errno != 0) {
1655*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_type, SADB_MIGRATE, "SADB error for type %u error %d", message->sadb_msg_type, message->sadb_msg_errno);
1656*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_errno, EINVAL, "SADB error for type %u error %d", message->sadb_msg_type, message->sadb_msg_errno);
1657*043036a2SApple OSS Distributions T_PASS("SADB migrate SA received EINVAL");
1658*043036a2SApple OSS Distributions T_END;
1659*043036a2SApple OSS Distributions }
1660*043036a2SApple OSS Distributions
1661*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_errno, 0, "SADB error for type %u error %d", message->sadb_msg_type, message->sadb_msg_errno);
1662*043036a2SApple OSS Distributions
1663*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1664*043036a2SApple OSS Distributions case SADB_ADD:
1665*043036a2SApple OSS Distributions {
1666*043036a2SApple OSS Distributions struct sadb_sa *sa_message = (struct sadb_sa *)(void *)mhp[SADB_EXT_SA];
1667*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(sa_message, "add sa message is NULL");
1668*043036a2SApple OSS Distributions spi = ntohl(sa_message->sadb_sa_spi);
1669*043036a2SApple OSS Distributions T_LOG("added sa 0x%x", spi);
1670*043036a2SApple OSS Distributions send_pkey_migrate_sa(pfkey_socket, spi, TEST_SRC_ADDRESS_IPv6, TEST_DST_ADDRESS_IPv6, AF_INET6,
1671*043036a2SApple OSS Distributions TEST_MIGRATE_SRC_ADDRESS_IPv6, TEST_MIGRATE_DST_ADDRESS_IPv6, AF_CHAOS);
1672*043036a2SApple OSS Distributions break;
1673*043036a2SApple OSS Distributions }
1674*043036a2SApple OSS Distributions case SADB_MIGRATE:
1675*043036a2SApple OSS Distributions {
1676*043036a2SApple OSS Distributions T_FAIL("migrate SA test for bad address failed");
1677*043036a2SApple OSS Distributions T_END;
1678*043036a2SApple OSS Distributions }
1679*043036a2SApple OSS Distributions case SADB_FLUSH:
1680*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1681*043036a2SApple OSS Distributions break;
1682*043036a2SApple OSS Distributions default:
1683*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1684*043036a2SApple OSS Distributions T_END;
1685*043036a2SApple OSS Distributions }
1686*043036a2SApple OSS Distributions return;
1687*043036a2SApple OSS Distributions }
1688*043036a2SApple OSS Distributions
1689*043036a2SApple OSS Distributions static void
pfkey_process_message_test_78944570(uint8_t ** mhp,__unused int pfkey_socket)1690*043036a2SApple OSS Distributions pfkey_process_message_test_78944570(uint8_t **mhp, __unused int pfkey_socket)
1691*043036a2SApple OSS Distributions {
1692*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1693*043036a2SApple OSS Distributions
1694*043036a2SApple OSS Distributions if (message->sadb_msg_pid != (uint32_t)getpid()) {
1695*043036a2SApple OSS Distributions return;
1696*043036a2SApple OSS Distributions }
1697*043036a2SApple OSS Distributions
1698*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1699*043036a2SApple OSS Distributions case SADB_X_SPDADD:
1700*043036a2SApple OSS Distributions {
1701*043036a2SApple OSS Distributions if (message->sadb_msg_errno != 0) {
1702*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_errno, EINVAL, "SADB error for type %u error %d", message->sadb_msg_type, message->sadb_msg_errno);
1703*043036a2SApple OSS Distributions T_PASS("SADB spd add received EINVAL");
1704*043036a2SApple OSS Distributions } else {
1705*043036a2SApple OSS Distributions T_FAIL("SADB spd add received success");
1706*043036a2SApple OSS Distributions }
1707*043036a2SApple OSS Distributions T_END;
1708*043036a2SApple OSS Distributions break;
1709*043036a2SApple OSS Distributions }
1710*043036a2SApple OSS Distributions case SADB_FLUSH:
1711*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1712*043036a2SApple OSS Distributions break;
1713*043036a2SApple OSS Distributions default:
1714*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1715*043036a2SApple OSS Distributions T_END;
1716*043036a2SApple OSS Distributions }
1717*043036a2SApple OSS Distributions return;
1718*043036a2SApple OSS Distributions }
1719*043036a2SApple OSS Distributions
1720*043036a2SApple OSS Distributions static void
pfkey_process_message_test_134671927(uint8_t ** mhp,int pfkey_socket)1721*043036a2SApple OSS Distributions pfkey_process_message_test_134671927(uint8_t **mhp, int pfkey_socket)
1722*043036a2SApple OSS Distributions {
1723*043036a2SApple OSS Distributions struct sadb_msg *message = (struct sadb_msg *)(void *)mhp[0];
1724*043036a2SApple OSS Distributions static uint32_t spi = 0;
1725*043036a2SApple OSS Distributions
1726*043036a2SApple OSS Distributions if (message->sadb_msg_type != SADB_EXPIRE && message->sadb_msg_pid != (uint32_t)getpid()) {
1727*043036a2SApple OSS Distributions return;
1728*043036a2SApple OSS Distributions }
1729*043036a2SApple OSS Distributions
1730*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_EQ(message->sadb_msg_errno, 0, "SADB error for type %u error %d", message->sadb_msg_type, message->sadb_msg_errno);
1731*043036a2SApple OSS Distributions
1732*043036a2SApple OSS Distributions switch (message->sadb_msg_type) {
1733*043036a2SApple OSS Distributions case SADB_REGISTER:
1734*043036a2SApple OSS Distributions {
1735*043036a2SApple OSS Distributions T_LOG("registered for SA updates");
1736*043036a2SApple OSS Distributions send_pkey_add_sa(pfkey_socket, 0x12345678, TEST_SRC_ADDRESS_IPv6, TEST_DST_ADDRESS_IPv6, AF_INET6);
1737*043036a2SApple OSS Distributions break;
1738*043036a2SApple OSS Distributions }
1739*043036a2SApple OSS Distributions case SADB_ADD:
1740*043036a2SApple OSS Distributions {
1741*043036a2SApple OSS Distributions struct sadb_sa *sa_message = (struct sadb_sa *)(void *)mhp[SADB_EXT_SA];
1742*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(sa_message, "add sa message is NULL");
1743*043036a2SApple OSS Distributions spi = ntohl(sa_message->sadb_sa_spi);
1744*043036a2SApple OSS Distributions T_LOG("added sa 0x%x", spi);
1745*043036a2SApple OSS Distributions break;
1746*043036a2SApple OSS Distributions }
1747*043036a2SApple OSS Distributions case SADB_EXPIRE:
1748*043036a2SApple OSS Distributions {
1749*043036a2SApple OSS Distributions struct sadb_sa *sa_message = (struct sadb_sa *)(void *)mhp[SADB_EXT_SA];
1750*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_NOTNULL(sa_message, "expire sa message is NULL");
1751*043036a2SApple OSS Distributions if (spi == 0 || spi != ntohl(sa_message->sadb_sa_spi)) {
1752*043036a2SApple OSS Distributions break;
1753*043036a2SApple OSS Distributions }
1754*043036a2SApple OSS Distributions T_LOG("expire sa 0x%x", spi);
1755*043036a2SApple OSS Distributions send_pkey_migrate_sa(pfkey_socket, spi, TEST_SRC_ADDRESS_IPv6, TEST_DST_ADDRESS_IPv6, AF_INET6,
1756*043036a2SApple OSS Distributions TEST_MIGRATE_SRC_ADDRESS_IPv6, TEST_MIGRATE_DST_ADDRESS_IPv6, AF_INET6);
1757*043036a2SApple OSS Distributions break;
1758*043036a2SApple OSS Distributions }
1759*043036a2SApple OSS Distributions case SADB_MIGRATE:
1760*043036a2SApple OSS Distributions {
1761*043036a2SApple OSS Distributions T_PASS("migrate SA success");
1762*043036a2SApple OSS Distributions T_END;
1763*043036a2SApple OSS Distributions }
1764*043036a2SApple OSS Distributions case SADB_FLUSH:
1765*043036a2SApple OSS Distributions case SADB_X_SPDFLUSH:
1766*043036a2SApple OSS Distributions break;
1767*043036a2SApple OSS Distributions default:
1768*043036a2SApple OSS Distributions T_FAIL("bad SADB message type %u", message->sadb_msg_type);
1769*043036a2SApple OSS Distributions T_END;
1770*043036a2SApple OSS Distributions }
1771*043036a2SApple OSS Distributions return;
1772*043036a2SApple OSS Distributions }
1773*043036a2SApple OSS Distributions
1774*043036a2SApple OSS Distributions static int
setup_tcp_server(uint16_t port)1775*043036a2SApple OSS Distributions setup_tcp_server(uint16_t port)
1776*043036a2SApple OSS Distributions {
1777*043036a2SApple OSS Distributions struct sockaddr_in server_addr = {};
1778*043036a2SApple OSS Distributions int server_fd = -1;
1779*043036a2SApple OSS Distributions
1780*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(server_fd = socket(AF_INET, SOCK_STREAM, 0),
1781*043036a2SApple OSS Distributions "tcp server socket creation failed");
1782*043036a2SApple OSS Distributions
1783*043036a2SApple OSS Distributions server_addr.sin_family = AF_INET;
1784*043036a2SApple OSS Distributions server_addr.sin_addr.s_addr = htonl(INADDR_ANY);
1785*043036a2SApple OSS Distributions server_addr.sin_port = htons(port);
1786*043036a2SApple OSS Distributions
1787*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(bind(server_fd, (struct sockaddr *)&server_addr,
1788*043036a2SApple OSS Distributions sizeof(server_addr)), "tcp server bind failed");
1789*043036a2SApple OSS Distributions
1790*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(listen(server_fd, 2), "tcp server listen failed");
1791*043036a2SApple OSS Distributions return server_fd;
1792*043036a2SApple OSS Distributions }
1793*043036a2SApple OSS Distributions
1794*043036a2SApple OSS Distributions static int
setup_loopback_tcp_client(uint16_t server_port)1795*043036a2SApple OSS Distributions setup_loopback_tcp_client(uint16_t server_port)
1796*043036a2SApple OSS Distributions {
1797*043036a2SApple OSS Distributions struct sockaddr_in conn_addr = {};
1798*043036a2SApple OSS Distributions int client_fd = -1;
1799*043036a2SApple OSS Distributions
1800*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(client_fd = socket(AF_INET, SOCK_STREAM, 0),
1801*043036a2SApple OSS Distributions "tcp client socket creation failed");
1802*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(inet_pton(AF_INET, "127.0.0.1", &conn_addr.sin_addr),
1803*043036a2SApple OSS Distributions "loopback address inet_pton failed");
1804*043036a2SApple OSS Distributions
1805*043036a2SApple OSS Distributions conn_addr.sin_family = AF_INET;
1806*043036a2SApple OSS Distributions conn_addr.sin_port = htons(server_port);
1807*043036a2SApple OSS Distributions
1808*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(connect(client_fd, (struct sockaddr *)&conn_addr, sizeof(conn_addr)),
1809*043036a2SApple OSS Distributions "tcp loopback client connect failed");
1810*043036a2SApple OSS Distributions return client_fd;
1811*043036a2SApple OSS Distributions }
1812*043036a2SApple OSS Distributions
1813*043036a2SApple OSS Distributions static void
setup_socket_policy(int socket_fd)1814*043036a2SApple OSS Distributions setup_socket_policy(int socket_fd)
1815*043036a2SApple OSS Distributions {
1816*043036a2SApple OSS Distributions uint8_t __attribute__((aligned(4))) buf[
1817*043036a2SApple OSS Distributions sizeof(struct sadb_x_policy) +
1818*043036a2SApple OSS Distributions sizeof(struct sadb_x_ipsecrequest) +
1819*043036a2SApple OSS Distributions sizeof(struct sockaddr_in) +
1820*043036a2SApple OSS Distributions sizeof(struct sockaddr_in)
1821*043036a2SApple OSS Distributions ];
1822*043036a2SApple OSS Distributions
1823*043036a2SApple OSS Distributions struct sadb_x_policy *xpl = (struct sadb_x_policy *)buf;
1824*043036a2SApple OSS Distributions struct sadb_x_ipsecrequest *xisr = (struct sadb_x_ipsecrequest *)(xpl + 1);
1825*043036a2SApple OSS Distributions struct sockaddr *sa;
1826*043036a2SApple OSS Distributions
1827*043036a2SApple OSS Distributions
1828*043036a2SApple OSS Distributions bzero(buf, sizeof(buf));
1829*043036a2SApple OSS Distributions /* xpl: */
1830*043036a2SApple OSS Distributions xpl->sadb_x_policy_len = sizeof(buf) >> 3;
1831*043036a2SApple OSS Distributions xpl->sadb_x_policy_dir = IPSEC_DIR_INBOUND;
1832*043036a2SApple OSS Distributions xpl->sadb_x_policy_type = IPSEC_POLICY_IPSEC;
1833*043036a2SApple OSS Distributions /* xisr: */
1834*043036a2SApple OSS Distributions xisr->sadb_x_ipsecrequest_len = sizeof(buf) - sizeof(*xpl);
1835*043036a2SApple OSS Distributions xisr->sadb_x_ipsecrequest_proto = IPPROTO_ESP;
1836*043036a2SApple OSS Distributions xisr->sadb_x_ipsecrequest_mode = IPSEC_MODE_TRANSPORT;
1837*043036a2SApple OSS Distributions xisr->sadb_x_ipsecrequest_level = IPSEC_LEVEL_DEFAULT;
1838*043036a2SApple OSS Distributions /* src sockaddr: */
1839*043036a2SApple OSS Distributions sa = (struct sockaddr *)(xisr + 1);
1840*043036a2SApple OSS Distributions sa->sa_len = sizeof(struct sockaddr_in);
1841*043036a2SApple OSS Distributions /* dst sockaddr: */
1842*043036a2SApple OSS Distributions sa = (struct sockaddr *)((char *)(xisr + 1) + sa->sa_len);
1843*043036a2SApple OSS Distributions sa->sa_len = sizeof(struct sockaddr_in);
1844*043036a2SApple OSS Distributions
1845*043036a2SApple OSS Distributions T_QUIET; T_ASSERT_POSIX_SUCCESS(setsockopt(socket_fd, IPPROTO_IP, IP_IPSEC_POLICY,
1846*043036a2SApple OSS Distributions buf, sizeof(buf)), "tcp server listen failed");
1847*043036a2SApple OSS Distributions }
1848*043036a2SApple OSS Distributions
1849*043036a2SApple OSS Distributions T_DECL(sadb_x_get_60822136, "security policy reference count overflow", T_META_TAG_VM_PREFERRED)
1850*043036a2SApple OSS Distributions {
1851*043036a2SApple OSS Distributions test_id = TEST_SADB_X_GET_OVERFLOW_60822136;
1852*043036a2SApple OSS Distributions
1853*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
1854*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1855*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1856*043036a2SApple OSS Distributions send_pfkey_spd_add_message(pfkey_socket, IPSEC_ULPROTO_ANY);
1857*043036a2SApple OSS Distributions
1858*043036a2SApple OSS Distributions dispatch_main();
1859*043036a2SApple OSS Distributions }
1860*043036a2SApple OSS Distributions
1861*043036a2SApple OSS Distributions T_DECL(sadb_x_spd_enable_60822924, "security policy reference count overflow", T_META_TAG_VM_PREFERRED)
1862*043036a2SApple OSS Distributions {
1863*043036a2SApple OSS Distributions test_id = TEST_SADB_X_SPDENABLE_OVERFLOW_60822924;
1864*043036a2SApple OSS Distributions
1865*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
1866*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1867*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1868*043036a2SApple OSS Distributions send_pfkey_spd_add_message(pfkey_socket, IPSEC_ULPROTO_ANY);
1869*043036a2SApple OSS Distributions
1870*043036a2SApple OSS Distributions dispatch_main();
1871*043036a2SApple OSS Distributions }
1872*043036a2SApple OSS Distributions
1873*043036a2SApple OSS Distributions T_DECL(sadb_x_spd_disable_60822956, "security policy reference count overflow", T_META_TAG_VM_PREFERRED)
1874*043036a2SApple OSS Distributions {
1875*043036a2SApple OSS Distributions test_id = TEST_SADB_X_SPDDISABLE_OVERFLOW_60822956;
1876*043036a2SApple OSS Distributions
1877*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
1878*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1879*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1880*043036a2SApple OSS Distributions send_pfkey_spd_add_message(pfkey_socket, IPSEC_ULPROTO_ANY);
1881*043036a2SApple OSS Distributions
1882*043036a2SApple OSS Distributions dispatch_main();
1883*043036a2SApple OSS Distributions }
1884*043036a2SApple OSS Distributions
1885*043036a2SApple OSS Distributions T_DECL(sadb_update_60679513, "security association use after free", T_META_TAG_VM_PREFERRED)
1886*043036a2SApple OSS Distributions {
1887*043036a2SApple OSS Distributions test_id = TEST_SADB_UPDATE_USE_AFTER_FREE_60679513;
1888*043036a2SApple OSS Distributions
1889*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
1890*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1891*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1892*043036a2SApple OSS Distributions send_pkey_get_spi(pfkey_socket);
1893*043036a2SApple OSS Distributions
1894*043036a2SApple OSS Distributions dispatch_main();
1895*043036a2SApple OSS Distributions }
1896*043036a2SApple OSS Distributions
1897*043036a2SApple OSS Distributions T_DECL(sadb_dump_60768729, "security association sa dump heap overflow", T_META_ENABLED(false), T_META_TAG_VM_PREFERRED)
1898*043036a2SApple OSS Distributions {
1899*043036a2SApple OSS Distributions test_id = TEST_SADB_DUMP_HEAP_OVERFLOW_60768729;
1900*043036a2SApple OSS Distributions
1901*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
1902*043036a2SApple OSS Distributions T_ATEND(pfkey_cleanup);
1903*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1904*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1905*043036a2SApple OSS Distributions send_pkey_get_spi(pfkey_socket);
1906*043036a2SApple OSS Distributions
1907*043036a2SApple OSS Distributions dispatch_main();
1908*043036a2SApple OSS Distributions }
1909*043036a2SApple OSS Distributions
1910*043036a2SApple OSS Distributions // Disabled due to rdar://92910783
1911*043036a2SApple OSS Distributions T_DECL(sadb_policy_dump_60769680, "security association sa policy dump heap overflow", T_META_ENABLED(false), T_META_TAG_VM_PREFERRED)
1912*043036a2SApple OSS Distributions {
1913*043036a2SApple OSS Distributions test_id = TEST_SADB_POLICY_DUMP_HEAP_OVERFLOW_60769680;
1914*043036a2SApple OSS Distributions
1915*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
1916*043036a2SApple OSS Distributions T_ATEND(pfkey_cleanup);
1917*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1918*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1919*043036a2SApple OSS Distributions send_pfkey_spd_add_message(pfkey_socket, 1);
1920*043036a2SApple OSS Distributions
1921*043036a2SApple OSS Distributions dispatch_main();
1922*043036a2SApple OSS Distributions }
1923*043036a2SApple OSS Distributions
1924*043036a2SApple OSS Distributions T_DECL(sadb_get_sastat_oob_60769680, "security association get sa stat oob read", T_META_TAG_VM_PREFERRED)
1925*043036a2SApple OSS Distributions {
1926*043036a2SApple OSS Distributions test_id = TEST_SADB_GETSASTAT_OOB_READ_60822823;
1927*043036a2SApple OSS Distributions
1928*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
1929*043036a2SApple OSS Distributions T_ATEND(pfkey_cleanup);
1930*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1931*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1932*043036a2SApple OSS Distributions send_pkey_add_sa(pfkey_socket, 0x12345678, TEST_SRC_ADDRESS_IPv4, TEST_DST_ADDRESS_IPv4, AF_INET);
1933*043036a2SApple OSS Distributions
1934*043036a2SApple OSS Distributions dispatch_main();
1935*043036a2SApple OSS Distributions }
1936*043036a2SApple OSS Distributions
1937*043036a2SApple OSS Distributions T_DECL(sadb_get_sastat_success, "security association get sa stat", T_META_TAG_VM_PREFERRED)
1938*043036a2SApple OSS Distributions {
1939*043036a2SApple OSS Distributions test_id = TEST_SADB_GETSASTAT_OOB_READ_SUCCESS;
1940*043036a2SApple OSS Distributions
1941*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
1942*043036a2SApple OSS Distributions T_ATEND(pfkey_cleanup);
1943*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1944*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1945*043036a2SApple OSS Distributions send_pkey_add_sa(pfkey_socket, 0x12345678, TEST_SRC_ADDRESS_IPv4, TEST_DST_ADDRESS_IPv4, AF_INET);
1946*043036a2SApple OSS Distributions
1947*043036a2SApple OSS Distributions dispatch_main();
1948*043036a2SApple OSS Distributions }
1949*043036a2SApple OSS Distributions
1950*043036a2SApple OSS Distributions T_DECL(sadb_key_migrate_address_ipv4, "security association migrate address ipv4", T_META_TAG_VM_PREFERRED)
1951*043036a2SApple OSS Distributions {
1952*043036a2SApple OSS Distributions test_id = TEST_SADB_EXT_MIGRATE_ADDRESS_IPv4;
1953*043036a2SApple OSS Distributions
1954*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
1955*043036a2SApple OSS Distributions T_ATEND(pfkey_cleanup);
1956*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1957*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1958*043036a2SApple OSS Distributions send_pkey_add_sa(pfkey_socket, 0x12345678, TEST_SRC_ADDRESS_IPv4, TEST_DST_ADDRESS_IPv4, AF_INET);
1959*043036a2SApple OSS Distributions
1960*043036a2SApple OSS Distributions dispatch_main();
1961*043036a2SApple OSS Distributions }
1962*043036a2SApple OSS Distributions
1963*043036a2SApple OSS Distributions T_DECL(sadb_key_migrate_address_ipv6, "security association migrate address ipv6", T_META_TAG_VM_PREFERRED)
1964*043036a2SApple OSS Distributions {
1965*043036a2SApple OSS Distributions test_id = TEST_SADB_EXT_MIGRATE_ADDRESS_IPv6;
1966*043036a2SApple OSS Distributions
1967*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
1968*043036a2SApple OSS Distributions T_ATEND(pfkey_cleanup);
1969*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1970*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1971*043036a2SApple OSS Distributions send_pkey_add_sa(pfkey_socket, 0x12345678, TEST_SRC_ADDRESS_IPv6, TEST_DST_ADDRESS_IPv6, AF_INET6);
1972*043036a2SApple OSS Distributions
1973*043036a2SApple OSS Distributions dispatch_main();
1974*043036a2SApple OSS Distributions }
1975*043036a2SApple OSS Distributions
1976*043036a2SApple OSS Distributions T_DECL(sadb_key_migrate_bad_address, "security association migrate bad address", T_META_TAG_VM_PREFERRED)
1977*043036a2SApple OSS Distributions {
1978*043036a2SApple OSS Distributions test_id = TEST_SADB_EXT_MIGRATE_BAD_ADDRESS;
1979*043036a2SApple OSS Distributions
1980*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
1981*043036a2SApple OSS Distributions T_ATEND(pfkey_cleanup);
1982*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
1983*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
1984*043036a2SApple OSS Distributions send_pkey_add_sa(pfkey_socket, 0x12345678, TEST_SRC_ADDRESS_IPv6, TEST_DST_ADDRESS_IPv6, AF_INET6);
1985*043036a2SApple OSS Distributions
1986*043036a2SApple OSS Distributions dispatch_main();
1987*043036a2SApple OSS Distributions }
1988*043036a2SApple OSS Distributions
1989*043036a2SApple OSS Distributions T_DECL(tcp_input_ipsec_copy_policy, "listener policy copied to child", T_META_TAG_VM_PREFERRED)
1990*043036a2SApple OSS Distributions {
1991*043036a2SApple OSS Distributions test_id = TEST_TCP_INPUT_IPSEC_COPY_POLICY;
1992*043036a2SApple OSS Distributions
1993*043036a2SApple OSS Distributions int server_fd = setup_tcp_server(4000);
1994*043036a2SApple OSS Distributions setup_socket_policy(server_fd);
1995*043036a2SApple OSS Distributions int client_fd = setup_loopback_tcp_client(4000);
1996*043036a2SApple OSS Distributions
1997*043036a2SApple OSS Distributions sleep(3);
1998*043036a2SApple OSS Distributions close(client_fd);
1999*043036a2SApple OSS Distributions close(server_fd);
2000*043036a2SApple OSS Distributions
2001*043036a2SApple OSS Distributions T_PASS("listener policy copied to child");
2002*043036a2SApple OSS Distributions }
2003*043036a2SApple OSS Distributions
2004*043036a2SApple OSS Distributions T_DECL(sadb_x_spd_add_78944570, "security policy add failure", T_META_TAG_VM_PREFERRED)
2005*043036a2SApple OSS Distributions {
2006*043036a2SApple OSS Distributions test_id = TEST_SADB_X_SPDADD_MEMORY_LEAK_78944570;
2007*043036a2SApple OSS Distributions
2008*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
2009*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
2010*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
2011*043036a2SApple OSS Distributions send_pfkey_spd_add_message(pfkey_socket, IPSEC_ULPROTO_ANY);
2012*043036a2SApple OSS Distributions
2013*043036a2SApple OSS Distributions dispatch_main();
2014*043036a2SApple OSS Distributions }
2015*043036a2SApple OSS Distributions
2016*043036a2SApple OSS Distributions T_DECL(sadb_key_migrate_after_expiry_134671927, "security association migrate after expiry", T_META_TAG_VM_PREFERRED)
2017*043036a2SApple OSS Distributions {
2018*043036a2SApple OSS Distributions test_id = TEST_SADB_EXT_MIGRATE_AFTER_EXPIRY_134671927;
2019*043036a2SApple OSS Distributions
2020*043036a2SApple OSS Distributions int pfkey_socket = pfkey_setup_socket();
2021*043036a2SApple OSS Distributions T_ATEND(pfkey_cleanup);
2022*043036a2SApple OSS Distributions send_pfkey_flush_sa(pfkey_socket);
2023*043036a2SApple OSS Distributions send_pfkey_flush_sp(pfkey_socket);
2024*043036a2SApple OSS Distributions send_pfkey_register(pfkey_socket);
2025*043036a2SApple OSS Distributions
2026*043036a2SApple OSS Distributions dispatch_main();
2027*043036a2SApple OSS Distributions }
2028