| // SPDX-License-Identifier: GPL-2.0 | 
 | /*  OpenVPN data channel offload | 
 |  * | 
 |  *  Copyright (C) 2020-2025 OpenVPN, Inc. | 
 |  * | 
 |  *  Author:	James Yonan <james@openvpn.net> | 
 |  *		Antonio Quartulli <antonio@openvpn.net> | 
 |  */ | 
 |  | 
 | #include <linux/types.h> | 
 | #include <linux/net.h> | 
 | #include <linux/netdevice.h> | 
 | #include <uapi/linux/ovpn.h> | 
 |  | 
 | #include "ovpnpriv.h" | 
 | #include "main.h" | 
 | #include "pktid.h" | 
 | #include "crypto_aead.h" | 
 | #include "crypto.h" | 
 |  | 
 | static void ovpn_ks_destroy_rcu(struct rcu_head *head) | 
 | { | 
 | 	struct ovpn_crypto_key_slot *ks; | 
 |  | 
 | 	ks = container_of(head, struct ovpn_crypto_key_slot, rcu); | 
 | 	ovpn_aead_crypto_key_slot_destroy(ks); | 
 | } | 
 |  | 
 | void ovpn_crypto_key_slot_release(struct kref *kref) | 
 | { | 
 | 	struct ovpn_crypto_key_slot *ks; | 
 |  | 
 | 	ks = container_of(kref, struct ovpn_crypto_key_slot, refcount); | 
 | 	call_rcu(&ks->rcu, ovpn_ks_destroy_rcu); | 
 | } | 
 |  | 
 | /* can only be invoked when all peer references have been dropped (i.e. RCU | 
 |  * release routine) | 
 |  */ | 
 | void ovpn_crypto_state_release(struct ovpn_crypto_state *cs) | 
 | { | 
 | 	struct ovpn_crypto_key_slot *ks; | 
 |  | 
 | 	ks = rcu_access_pointer(cs->slots[0]); | 
 | 	if (ks) { | 
 | 		RCU_INIT_POINTER(cs->slots[0], NULL); | 
 | 		ovpn_crypto_key_slot_put(ks); | 
 | 	} | 
 |  | 
 | 	ks = rcu_access_pointer(cs->slots[1]); | 
 | 	if (ks) { | 
 | 		RCU_INIT_POINTER(cs->slots[1], NULL); | 
 | 		ovpn_crypto_key_slot_put(ks); | 
 | 	} | 
 | } | 
 |  | 
 | /* removes the key matching the specified id from the crypto context */ | 
 | bool ovpn_crypto_kill_key(struct ovpn_crypto_state *cs, u8 key_id) | 
 | { | 
 | 	struct ovpn_crypto_key_slot *ks = NULL; | 
 |  | 
 | 	spin_lock_bh(&cs->lock); | 
 | 	if (rcu_access_pointer(cs->slots[0])->key_id == key_id) { | 
 | 		ks = rcu_replace_pointer(cs->slots[0], NULL, | 
 | 					 lockdep_is_held(&cs->lock)); | 
 | 	} else if (rcu_access_pointer(cs->slots[1])->key_id == key_id) { | 
 | 		ks = rcu_replace_pointer(cs->slots[1], NULL, | 
 | 					 lockdep_is_held(&cs->lock)); | 
 | 	} | 
 | 	spin_unlock_bh(&cs->lock); | 
 |  | 
 | 	if (ks) | 
 | 		ovpn_crypto_key_slot_put(ks); | 
 |  | 
 | 	/* let the caller know if a key was actually killed */ | 
 | 	return ks; | 
 | } | 
 |  | 
 | /* Reset the ovpn_crypto_state object in a way that is atomic | 
 |  * to RCU readers. | 
 |  */ | 
 | int ovpn_crypto_state_reset(struct ovpn_crypto_state *cs, | 
 | 			    const struct ovpn_peer_key_reset *pkr) | 
 | { | 
 | 	struct ovpn_crypto_key_slot *old = NULL, *new; | 
 | 	u8 idx; | 
 |  | 
 | 	if (pkr->slot != OVPN_KEY_SLOT_PRIMARY && | 
 | 	    pkr->slot != OVPN_KEY_SLOT_SECONDARY) | 
 | 		return -EINVAL; | 
 |  | 
 | 	new = ovpn_aead_crypto_key_slot_new(&pkr->key); | 
 | 	if (IS_ERR(new)) | 
 | 		return PTR_ERR(new); | 
 |  | 
 | 	spin_lock_bh(&cs->lock); | 
 | 	idx = cs->primary_idx; | 
 | 	switch (pkr->slot) { | 
 | 	case OVPN_KEY_SLOT_PRIMARY: | 
 | 		old = rcu_replace_pointer(cs->slots[idx], new, | 
 | 					  lockdep_is_held(&cs->lock)); | 
 | 		break; | 
 | 	case OVPN_KEY_SLOT_SECONDARY: | 
 | 		old = rcu_replace_pointer(cs->slots[!idx], new, | 
 | 					  lockdep_is_held(&cs->lock)); | 
 | 		break; | 
 | 	} | 
 | 	spin_unlock_bh(&cs->lock); | 
 |  | 
 | 	if (old) | 
 | 		ovpn_crypto_key_slot_put(old); | 
 |  | 
 | 	return 0; | 
 | } | 
 |  | 
 | void ovpn_crypto_key_slot_delete(struct ovpn_crypto_state *cs, | 
 | 				 enum ovpn_key_slot slot) | 
 | { | 
 | 	struct ovpn_crypto_key_slot *ks = NULL; | 
 | 	u8 idx; | 
 |  | 
 | 	if (slot != OVPN_KEY_SLOT_PRIMARY && | 
 | 	    slot != OVPN_KEY_SLOT_SECONDARY) { | 
 | 		pr_warn("Invalid slot to release: %u\n", slot); | 
 | 		return; | 
 | 	} | 
 |  | 
 | 	spin_lock_bh(&cs->lock); | 
 | 	idx = cs->primary_idx; | 
 | 	switch (slot) { | 
 | 	case OVPN_KEY_SLOT_PRIMARY: | 
 | 		ks = rcu_replace_pointer(cs->slots[idx], NULL, | 
 | 					 lockdep_is_held(&cs->lock)); | 
 | 		break; | 
 | 	case OVPN_KEY_SLOT_SECONDARY: | 
 | 		ks = rcu_replace_pointer(cs->slots[!idx], NULL, | 
 | 					 lockdep_is_held(&cs->lock)); | 
 | 		break; | 
 | 	} | 
 | 	spin_unlock_bh(&cs->lock); | 
 |  | 
 | 	if (!ks) { | 
 | 		pr_debug("Key slot already released: %u\n", slot); | 
 | 		return; | 
 | 	} | 
 |  | 
 | 	pr_debug("deleting key slot %u, key_id=%u\n", slot, ks->key_id); | 
 | 	ovpn_crypto_key_slot_put(ks); | 
 | } | 
 |  | 
 | void ovpn_crypto_key_slots_swap(struct ovpn_crypto_state *cs) | 
 | { | 
 | 	const struct ovpn_crypto_key_slot *old_primary, *old_secondary; | 
 | 	u8 idx; | 
 |  | 
 | 	spin_lock_bh(&cs->lock); | 
 | 	idx = cs->primary_idx; | 
 | 	old_primary = rcu_dereference_protected(cs->slots[idx], | 
 | 						lockdep_is_held(&cs->lock)); | 
 | 	old_secondary = rcu_dereference_protected(cs->slots[!idx], | 
 | 						  lockdep_is_held(&cs->lock)); | 
 | 	/* perform real swap by switching the index of the primary key */ | 
 | 	WRITE_ONCE(cs->primary_idx, !cs->primary_idx); | 
 |  | 
 | 	pr_debug("key swapped: (old primary) %d <-> (new primary) %d\n", | 
 | 		 old_primary ? old_primary->key_id : -1, | 
 | 		 old_secondary ? old_secondary->key_id : -1); | 
 |  | 
 | 	spin_unlock_bh(&cs->lock); | 
 | } | 
 |  | 
 | /** | 
 |  * ovpn_crypto_config_get - populate keyconf object with non-sensible key data | 
 |  * @cs: the crypto state to extract the key data from | 
 |  * @slot: the specific slot to inspect | 
 |  * @keyconf: the output object to populate | 
 |  * | 
 |  * Return: 0 on success or a negative error code otherwise | 
 |  */ | 
 | int ovpn_crypto_config_get(struct ovpn_crypto_state *cs, | 
 | 			   enum ovpn_key_slot slot, | 
 | 			   struct ovpn_key_config *keyconf) | 
 | { | 
 | 	struct ovpn_crypto_key_slot *ks; | 
 | 	int idx; | 
 |  | 
 | 	switch (slot) { | 
 | 	case OVPN_KEY_SLOT_PRIMARY: | 
 | 		idx = cs->primary_idx; | 
 | 		break; | 
 | 	case OVPN_KEY_SLOT_SECONDARY: | 
 | 		idx = !cs->primary_idx; | 
 | 		break; | 
 | 	default: | 
 | 		return -EINVAL; | 
 | 	} | 
 |  | 
 | 	rcu_read_lock(); | 
 | 	ks = rcu_dereference(cs->slots[idx]); | 
 | 	if (!ks) { | 
 | 		rcu_read_unlock(); | 
 | 		return -ENOENT; | 
 | 	} | 
 |  | 
 | 	keyconf->cipher_alg = ovpn_aead_crypto_alg(ks); | 
 | 	keyconf->key_id = ks->key_id; | 
 | 	rcu_read_unlock(); | 
 |  | 
 | 	return 0; | 
 | } |