gss_spkm3_seal.c 4.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132
  1. /*
  2. * linux/net/sunrpc/gss_spkm3_seal.c
  3. *
  4. * Copyright (c) 2003 The Regents of the University of Michigan.
  5. * All rights reserved.
  6. *
  7. * Andy Adamson <andros@umich.edu>
  8. *
  9. * Redistribution and use in source and binary forms, with or without
  10. * modification, are permitted provided that the following conditions
  11. * are met:
  12. *
  13. * 1. Redistributions of source code must retain the above copyright
  14. * notice, this list of conditions and the following disclaimer.
  15. * 2. Redistributions in binary form must reproduce the above copyright
  16. * notice, this list of conditions and the following disclaimer in the
  17. * documentation and/or other materials provided with the distribution.
  18. * 3. Neither the name of the University nor the names of its
  19. * contributors may be used to endorse or promote products derived
  20. * from this software without specific prior written permission.
  21. *
  22. * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
  23. * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
  24. * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
  25. * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
  26. * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
  27. * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
  28. * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
  29. * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
  30. * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
  31. * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
  32. * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
  33. *
  34. */
  35. #include <linux/types.h>
  36. #include <linux/slab.h>
  37. #include <linux/jiffies.h>
  38. #include <linux/sunrpc/gss_spkm3.h>
  39. #include <linux/random.h>
  40. #include <linux/crypto.h>
  41. #ifdef RPC_DEBUG
  42. # define RPCDBG_FACILITY RPCDBG_AUTH
  43. #endif
  44. /*
  45. * spkm3_make_token()
  46. *
  47. * Only SPKM_MIC_TOK with md5 intg-alg is supported
  48. */
  49. u32
  50. spkm3_make_token(struct spkm3_ctx *ctx, int qop_req,
  51. struct xdr_buf * text, struct xdr_netobj * token,
  52. int toktype)
  53. {
  54. s32 checksum_type;
  55. char tokhdrbuf[25];
  56. struct xdr_netobj md5cksum = {.len = 0, .data = NULL};
  57. struct xdr_netobj mic_hdr = {.len = 0, .data = tokhdrbuf};
  58. int tmsglen, tokenlen = 0;
  59. unsigned char *ptr;
  60. s32 now;
  61. int ctxelen = 0, ctxzbit = 0;
  62. int md5elen = 0, md5zbit = 0;
  63. dprintk("RPC: spkm3_make_token\n");
  64. now = jiffies;
  65. if (qop_req != 0)
  66. goto out_err;
  67. if (ctx->ctx_id.len != 16) {
  68. dprintk("RPC: spkm3_make_token BAD ctx_id.len %d\n",
  69. ctx->ctx_id.len);
  70. goto out_err;
  71. }
  72. switch (ctx->intg_alg) {
  73. case NID_md5:
  74. checksum_type = CKSUMTYPE_RSA_MD5;
  75. break;
  76. default:
  77. dprintk("RPC: gss_spkm3_seal: ctx->signalg %d not"
  78. " supported\n", ctx->intg_alg);
  79. goto out_err;
  80. }
  81. /* XXX since we don't support WRAP, perhaps we don't care... */
  82. if (ctx->conf_alg != NID_cast5_cbc) {
  83. dprintk("RPC: gss_spkm3_seal: ctx->sealalg %d not supported\n",
  84. ctx->conf_alg);
  85. goto out_err;
  86. }
  87. if (toktype == SPKM_MIC_TOK) {
  88. tmsglen = 0;
  89. /* Calculate checksum over the mic-header */
  90. asn1_bitstring_len(&ctx->ctx_id, &ctxelen, &ctxzbit);
  91. spkm3_mic_header(&mic_hdr.data, &mic_hdr.len, ctx->ctx_id.data,
  92. ctxelen, ctxzbit);
  93. if (make_checksum(checksum_type, mic_hdr.data, mic_hdr.len,
  94. text, &md5cksum))
  95. goto out_err;
  96. asn1_bitstring_len(&md5cksum, &md5elen, &md5zbit);
  97. tokenlen = 10 + ctxelen + 1 + 2 + md5elen + 1;
  98. /* Create token header using generic routines */
  99. token->len = g_token_size(&ctx->mech_used, tokenlen + tmsglen);
  100. ptr = token->data;
  101. g_make_token_header(&ctx->mech_used, tokenlen + tmsglen, &ptr);
  102. spkm3_make_mic_token(&ptr, tokenlen, &mic_hdr, &md5cksum, md5elen, md5zbit);
  103. } else if (toktype == SPKM_WRAP_TOK) { /* Not Supported */
  104. dprintk("RPC: gss_spkm3_seal: SPKM_WRAP_TOK not supported\n");
  105. goto out_err;
  106. }
  107. kfree(md5cksum.data);
  108. /* XXX need to implement sequence numbers, and ctx->expired */
  109. return GSS_S_COMPLETE;
  110. out_err:
  111. if (md5cksum.data)
  112. kfree(md5cksum.data);
  113. token->data = NULL;
  114. token->len = 0;
  115. return GSS_S_FAILURE;
  116. }