2 * linux/net/sunrpc/gss_spkm3_token.c
4 * Copyright (c) 2003 The Regents of the University of Michigan.
7 * Andy Adamson <andros@umich.edu>
9 * Redistribution and use in source and binary forms, with or without
10 * modification, are permitted provided that the following conditions
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
18 * 3. Neither the name of the University nor the names of its
19 * contributors may be used to endorse or promote products derived
20 * from this software without specific prior written permission.
22 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
23 * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
24 * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
25 * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
26 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
27 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
28 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
29 * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
30 * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
31 * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
32 * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
36 #include <linux/types.h>
37 #include <linux/slab.h>
38 #include <linux/jiffies.h>
39 #include <linux/sunrpc/gss_spkm3.h>
40 #include <linux/random.h>
41 #include <linux/crypto.h>
44 # define RPCDBG_FACILITY RPCDBG_AUTH
48 * asn1_bitstring_len()
50 * calculate the asn1 bitstring length of the xdr_netobject
53 asn1_bitstring_len(struct xdr_netobj
*in
, int *enclen
, int *zerobits
)
55 int i
, zbit
= 0,elen
= in
->len
;
58 ptr
= &in
->data
[in
->len
-1];
60 /* count trailing 0's */
61 for(i
= in
->len
; i
> 0; i
--) {
69 /* count number of 0 bits in final octet */
70 ptr
= &in
->data
[elen
- 1];
71 for(i
= 0; i
< 8; i
++) {
74 if (!((mask
<< i
) & *ptr
))
84 * decode_asn1_bitstring()
86 * decode a bitstring into a buffer of the expected length.
87 * enclen = bit string length
88 * explen = expected length (define in rfc)
91 decode_asn1_bitstring(struct xdr_netobj
*out
, char *in
, int enclen
, int explen
)
93 if (!(out
->data
= kmalloc(explen
,GFP_KERNEL
)))
96 memset(out
->data
, 0, explen
);
97 memcpy(out
->data
, in
, enclen
);
102 * SPKMInnerContextToken choice SPKM_MIC asn1 token layout
104 * contextid is always 16 bytes plain data. max asn1 bitstring len = 17.
106 * tokenlen = pos[0] to end of token (max pos[45] with MD5 cksum)
110 * [0] a4 SPKM-MIC tag
111 * [1] ?? innertoken length (max 44)
114 * tok_hdr piece of checksum data starts here
116 * the maximum mic-header len = 9 + 17 = 26
119 * [2] 30 SEQUENCE tag
120 * [3] ?? mic-header length: (max 23) = TokenID + ContextID
122 * TokenID - all fields constant and can be hardcoded
126 * [6][7] 01 01 TokenID (SPKM_MIC_TOK)
128 * ContextID - encoded length not constant, calculated
131 * [9] ?? encoded length
135 * mic_header piece of checksum data ends here.
137 * int-cksum - encoded length not constant, calculated
140 * [??] ?? encoded length
142 * [??] int-cksum (NID_md5 = 16)
144 * maximum SPKM-MIC innercontext token length =
145 * 10 + encoded contextid_size(17 max) + 2 + encoded
146 * cksum_size (17 maxfor NID_md5) = 46
152 * Prepare the SPKM_MIC_TOK mic-header for check-sum calculation
153 * elen: 16 byte context id asn1 bitstring encoded length
156 spkm3_mic_header(unsigned char **hdrbuf
, unsigned int *hdrlen
, unsigned char *ctxdata
, int elen
, int zbit
)
158 char *hptr
= *hdrbuf
;
161 *(u8
*)hptr
++ = 0x30;
162 *(u8
*)hptr
++ = elen
+ 7; /* on the wire header length */
165 *(u8
*)hptr
++ = 0x02;
166 *(u8
*)hptr
++ = 0x02;
167 *(u8
*)hptr
++ = 0x01;
168 *(u8
*)hptr
++ = 0x01;
171 *(u8
*)hptr
++ = 0x03;
172 *(u8
*)hptr
++ = elen
+ 1; /* add 1 to include zbit */
173 *(u8
*)hptr
++ = zbit
;
174 memcpy(hptr
, ctxdata
, elen
);
176 *hdrlen
= hptr
- top
;
180 * spkm3_mic_innercontext_token()
182 * *tokp points to the beginning of the SPKM_MIC token described
183 * in rfc 2025, section 3.2.1:
185 * toklen is the inner token length
188 spkm3_make_mic_token(unsigned char **tokp
, int toklen
, struct xdr_netobj
*mic_hdr
, struct xdr_netobj
*md5cksum
, int md5elen
, int md5zbit
)
190 unsigned char *ict
= *tokp
;
193 *(u8
*)ict
++ = toklen
;
194 memcpy(ict
, mic_hdr
->data
, mic_hdr
->len
);
198 *(u8
*)ict
++ = md5elen
+ 1; /* add 1 to include zbit */
199 *(u8
*)ict
++ = md5zbit
;
200 memcpy(ict
, md5cksum
->data
, md5elen
);
204 spkm3_verify_mic_token(unsigned char **tokp
, int *mic_hdrlen
, unsigned char **cksum
)
206 struct xdr_netobj spkm3_ctx_id
= {.len
=0, .data
= NULL
};
207 unsigned char *ptr
= *tokp
;
209 u32 ret
= GSS_S_DEFECTIVE_TOKEN
;
211 /* spkm3 innercontext token preamble */
212 if ((ptr
[0] != 0xa4) || (ptr
[2] != 0x30)) {
213 dprintk("RPC: BAD SPKM ictoken preamble\n");
217 *mic_hdrlen
= ptr
[3];
220 if ((ptr
[4] != 0x02) || (ptr
[5] != 0x02)) {
221 dprintk("RPC: BAD asn1 SPKM3 token type\n");
225 /* only support SPKM_MIC_TOK */
226 if((ptr
[6] != 0x01) || (ptr
[7] != 0x01)) {
227 dprintk("RPC: ERROR unsupported SPKM3 token \n");
232 if (ptr
[8] != 0x03) {
233 dprintk("RPC: BAD SPKM3 asn1 context-id type\n");
238 if (ctxelen
> 17) { /* length includes asn1 zbit octet */
239 dprintk("RPC: BAD SPKM3 contextid len %d\n", ctxelen
);
245 if(!decode_asn1_bitstring(&spkm3_ctx_id
, &ptr
[11], ctxelen
- 1, 16))
249 * in the current implementation: the optional int-alg is not present
250 * so the default int-alg (md5) is used the optional snd-seq field is
254 if (*mic_hdrlen
!= 6 + ctxelen
) {
255 dprintk("RPC: BAD SPKM_ MIC_TOK header len %d: we only support default int-alg (should be absent) and do not support snd-seq\n", *mic_hdrlen
);
259 *cksum
= (&ptr
[10] + ctxelen
); /* ctxelen includes ptr[10] */
261 ret
= GSS_S_COMPLETE
;
263 kfree(spkm3_ctx_id
.data
);