2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
4 * Copyright (c) 2014-2019 Netflix Inc.
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
9 * 1. Redistributions of source code must retain the above copyright
10 * notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 * notice, this list of conditions and the following disclaimer in the
13 * documentation and/or other materials provided with the distribution.
15 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
32 #include <sys/refcount.h>
33 #include <sys/_task.h>
35 struct tls_record_layer {
41 } __attribute__ ((packed));
43 #define TLS_MAX_MSG_SIZE_V10_2 16384
44 #define TLS_MAX_PARAM_SIZE 1024 /* Max key/mac/iv in sockopt */
45 #define TLS_AEAD_GCM_LEN 4
46 #define TLS_CBC_IMPLICIT_IV_LEN 16
48 /* Type values for the record layer */
49 #define TLS_RLTYPE_APP 23
54 struct tls_nonce_data {
55 uint8_t fixed[TLS_AEAD_GCM_LEN];
60 * AEAD additional data format per RFC.
62 struct tls_aead_data {
63 uint64_t seq; /* In network order */
71 * Stream Cipher MAC additional data input. This does not match the
72 * exact data on the wire (the sequence number is not placed on the
73 * wire, and any explicit IV after the record header is not covered by
84 #define TLS_MAJOR_VER_ONE 3
85 #define TLS_MINOR_VER_ZERO 1 /* 3, 1 */
86 #define TLS_MINOR_VER_ONE 2 /* 3, 2 */
87 #define TLS_MINOR_VER_TWO 3 /* 3, 3 */
89 /* For TCP_TXTLS_ENABLE */
91 const uint8_t *cipher_key;
92 const uint8_t *iv; /* Implicit IV. */
93 const uint8_t *auth_key;
94 int cipher_algorithm; /* e.g. CRYPTO_AES_CBC */
97 int auth_algorithm; /* e.g. CRYPTO_SHA2_256_HMAC */
104 struct tls_session_params {
107 uint8_t iv[TLS_CBC_IMPLICIT_IV_LEN];
108 int cipher_algorithm;
110 uint16_t cipher_key_len;
112 uint16_t auth_key_len;
113 uint16_t max_frame_len;
124 #define KTLS_API_VERSION 5
134 struct ktls_crypto_backend {
135 LIST_ENTRY(ktls_crypto_backend) next;
136 int (*try)(struct socket *so, struct ktls_session *tls);
143 struct ktls_session {
144 int (*sw_encrypt)(struct ktls_session *tls,
145 const struct tls_record_layer *hdr, uint8_t *trailer,
146 struct iovec *src, struct iovec *dst, int iovcnt,
150 struct m_snd_tag *snd_tag;
152 struct ktls_crypto_backend *be;
153 void (*free)(struct ktls_session *tls);
154 struct tls_session_params params;
156 volatile u_int refcount;
158 struct task reset_tag_task;
161 } __aligned(CACHE_LINE_SIZE);
163 int ktls_crypto_backend_register(struct ktls_crypto_backend *be);
164 int ktls_crypto_backend_deregister(struct ktls_crypto_backend *be);
165 int ktls_enable_tx(struct socket *so, struct tls_enable *en);
166 void ktls_destroy(struct ktls_session *tls);
167 int ktls_frame(struct mbuf *m, struct ktls_session *tls, int *enqueue_cnt,
168 uint8_t record_type);
169 void ktls_seq(struct sockbuf *sb, struct mbuf *m);
170 void ktls_enqueue(struct mbuf *m, struct socket *so, int page_count);
171 void ktls_enqueue_to_free(struct mbuf_ext_pgs *pgs);
172 int ktls_set_tx_mode(struct socket *so, int mode);
173 int ktls_get_tx_mode(struct socket *so);
174 int ktls_output_eagain(struct inpcb *inp, struct ktls_session *tls);
176 static inline struct ktls_session *
177 ktls_hold(struct ktls_session *tls)
181 refcount_acquire(&tls->refcount);
186 ktls_free(struct ktls_session *tls)
189 if (refcount_release(&tls->refcount))
193 #endif /* !_KERNEL */
194 #endif /* !_SYS_KTLS_H_ */