From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received-SPF: Pass (sender SPF authorized) identity=mailfrom; client-ip=134.134.136.24; helo=mga09.intel.com; envelope-from=jiaxin.wu@intel.com; receiver=edk2-devel@lists.01.org Received: from mga09.intel.com (mga09.intel.com [134.134.136.24]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by ml01.01.org (Postfix) with ESMTPS id CB84821173C77 for ; Thu, 18 Oct 2018 01:44:32 -0700 (PDT) X-Amp-Result: SKIPPED(no attachment in message) X-Amp-File-Uploaded: False Received: from fmsmga001.fm.intel.com ([10.253.24.23]) by orsmga102.jf.intel.com with ESMTP/TLS/DHE-RSA-AES256-GCM-SHA384; 18 Oct 2018 01:44:32 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.54,395,1534834800"; d="scan'208";a="100254890" Received: from jiaxinwu-mobl.ccr.corp.intel.com ([10.239.192.155]) by fmsmga001.fm.intel.com with ESMTP; 18 Oct 2018 01:44:30 -0700 From: Jiaxin Wu To: edk2-devel@lists.01.org Cc: Fu Siyuan , Ye Ting , Wu Jiaxin Date: Thu, 18 Oct 2018 16:44:23 +0800 Message-Id: <20181018084423.12388-1-Jiaxin.wu@intel.com> X-Mailer: git-send-email 2.17.1.windows.2 Subject: [PATCH v2] NetworkPkg/IpSecDxe: Fix issue to parse SA Payload. X-BeenThere: edk2-devel@lists.01.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: EDK II Development List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 18 Oct 2018 08:44:33 -0000 Ref: https://bugzilla.tianocore.org/show_bug.cgi?id=1251 *v2: Correct the type of parameters in Ikev2ParseProposalData(), and refined the corresponding description. IpSecDxe failed to create the Child SA during parsing SA Payload, the issue was caused by the below commit: SHA-1: 1e0db7b11987d0ec93be7dfe26102a327860fdbd * MdeModulePkg/NetworkPkg: Checking for NULL pointer before use. In above commit, it changed the value of IsMatch in Ikev2ChildSaParseSaPayload() to FALSE. That's correct but it exposed the potential bug in to match the correct proposal Data, which will cause the issue happen. Cc: Fu Siyuan Cc: Ye Ting Contributed-under: TianoCore Contribution Agreement 1.1 Signed-off-by: Wu Jiaxin --- NetworkPkg/IpSecDxe/Ikev2/Utility.c | 64 ++++++++++++++++++----------- 1 file changed, 41 insertions(+), 23 deletions(-) diff --git a/NetworkPkg/IpSecDxe/Ikev2/Utility.c b/NetworkPkg/IpSecDxe/Ikev2/Utility.c index 0c9c929705..63de56f09e 100644 --- a/NetworkPkg/IpSecDxe/Ikev2/Utility.c +++ b/NetworkPkg/IpSecDxe/Ikev2/Utility.c @@ -1993,34 +1993,51 @@ Ikev2IsSupportAlg ( } /** Get the preferred algorithm types from ProposalData. - @param[in] ProposalData Pointer to related IKEV2_PROPOSAL_DATA. - @param[out] PreferEncryptAlgorithm Output of preferred encrypt algorithm. - @param[out] PreferIntegrityAlgorithm Output of preferred integrity algorithm. - @param[out] PreferPrfAlgorithm Output of preferred PRF algorithm. Only - for IKE SA. - @param[out] PreferDhGroup Output of preferred DH group. Only for - IKE SA. - @param[out] PreferEncryptKeylength Output of preferred encrypt key length - in bytes. - @param[out] IsSupportEsn Output of value about the Extented Sequence - Number is support or not. Only for Child SA. - @param[in] IsChildSa If it is ture, the ProposalData is for IKE - SA. Otherwise the proposalData is for Child SA. + @param[in] ProposalData Pointer to related IKEV2_PROPOSAL_DATA. + @param[in, out] PreferEncryptAlgorithm Pointer to buffer which is used to store the + preferred encrypt algorithm. + Input value shall be initialized to zero that + indicates to be parsed from ProposalData. + Output of preferred encrypt algorithm. + @param[in, out] PreferIntegrityAlgorithm Pointer to buffer which is used to store the + preferred integrity algorithm. + Input value shall be initialized to zero that + indicates to be parsed from ProposalData. + Output of preferred integrity algorithm. + @param[in, out] PreferPrfAlgorithm Pointer to buffer which is used to store the + preferred PRF algorithm. + Input value shall be initialized to zero that + indicates to be parsed from ProposalData. + Output of preferred PRF algorithm. Only + for IKE SA. + @param[in, out] PreferDhGroup Pointer to buffer which is used to store the + preferred DH group. + Input value shall be initialized to zero that + indicates to be parsed from ProposalData. + Output of preferred DH group. Only for + IKE SA. + @param[in, out] PreferEncryptKeylength Pointer to buffer which is used to store the + preferred encrypt key length in bytes. + @param[in, out] IsSupportEsn Pointer to buffer which is used to store the + value about the Extented Sequence Number is + support or not. Only for Child SA. + @param[in] IsChildSa If it is ture, the ProposalData is for IKE + SA. Otherwise the proposalData is for Child SA. **/ VOID Ikev2ParseProposalData ( IN IKEV2_PROPOSAL_DATA *ProposalData, - OUT UINT16 *PreferEncryptAlgorithm, - OUT UINT16 *PreferIntegrityAlgorithm, - OUT UINT16 *PreferPrfAlgorithm, - OUT UINT16 *PreferDhGroup, - OUT UINTN *PreferEncryptKeylength, - OUT BOOLEAN *IsSupportEsn, + IN OUT UINT16 *PreferEncryptAlgorithm, + IN OUT UINT16 *PreferIntegrityAlgorithm, + IN OUT UINT16 *PreferPrfAlgorithm, + IN OUT UINT16 *PreferDhGroup, + IN OUT UINTN *PreferEncryptKeylength, + IN OUT BOOLEAN *IsSupportEsn, IN BOOLEAN IsChildSa ) { IKEV2_TRANSFORM_DATA *TransformData; UINT8 TransformIndex; @@ -2502,15 +2519,16 @@ Ikev2ChildSaParseSaPayload ( IntegrityAlgorithm == PreferIntegrityAlgorithm && IsSupportEsn == PreferIsSupportEsn ) { IsMatch = TRUE; } else { - PreferEncryptAlgorithm = 0; - PreferIntegrityAlgorithm = 0; - IsSupportEsn = TRUE; + IntegrityAlgorithm = 0; + EncryptAlgorithm = 0; + EncryptKeylength = 0; + IsSupportEsn = FALSE; } - ProposalData = (IKEV2_PROPOSAL_DATA*)((UINT8*)(ProposalData + 1) + + ProposalData = (IKEV2_PROPOSAL_DATA*)((UINT8*)(ProposalData + 1) + ProposalData->NumTransforms * sizeof (IKEV2_TRANSFORM_DATA)); } ProposalData = (IKEV2_PROPOSAL_DATA *)((IKEV2_SA_DATA *)SaPayload->PayloadBuf + 1); if (IsMatch) { -- 2.17.1.windows.2