Commit | Line | Data |
---|---|---|
1da177e4 LT |
1 | /* |
2 | * linux/net/sunrpc/gss_spkm3_unseal.c | |
3 | * | |
4 | * Copyright (c) 2003 The Regents of the University of Michigan. | |
5 | * All rights reserved. | |
6 | * | |
7 | * Andy Adamson <andros@umich.edu> | |
8 | * | |
9 | * Redistribution and use in source and binary forms, with or without | |
10 | * modification, are permitted provided that the following conditions | |
11 | * are met: | |
12 | * | |
13 | * 1. Redistributions of source code must retain the above copyright | |
14 | * notice, this list of conditions and the following disclaimer. | |
15 | * 2. Redistributions in binary form must reproduce the above copyright | |
16 | * notice, this list of conditions and the following disclaimer in the | |
17 | * documentation and/or other materials provided with the distribution. | |
18 | * 3. Neither the name of the University nor the names of its | |
19 | * contributors may be used to endorse or promote products derived | |
20 | * from this software without specific prior written permission. | |
21 | * | |
22 | * THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED | |
23 | * WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF | |
24 | * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE | |
25 | * DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE | |
26 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR | |
27 | * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF | |
28 | * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR | |
29 | * BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF | |
30 | * LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING | |
31 | * NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS | |
32 | * SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE. | |
33 | * | |
34 | */ | |
35 | ||
36 | #include <linux/types.h> | |
37 | #include <linux/slab.h> | |
38 | #include <linux/jiffies.h> | |
39 | #include <linux/sunrpc/gss_spkm3.h> | |
40 | #include <linux/crypto.h> | |
41 | ||
42 | #ifdef RPC_DEBUG | |
43 | # define RPCDBG_FACILITY RPCDBG_AUTH | |
44 | #endif | |
45 | ||
46 | /* | |
47 | * spkm3_read_token() | |
48 | * | |
49 | * only SPKM_MIC_TOK with md5 intg-alg is supported | |
50 | */ | |
51 | u32 | |
52 | spkm3_read_token(struct spkm3_ctx *ctx, | |
53 | struct xdr_netobj *read_token, /* checksum */ | |
54 | struct xdr_buf *message_buffer, /* signbuf */ | |
00fd6e14 | 55 | int toktype) |
1da177e4 LT |
56 | { |
57 | s32 code; | |
58 | struct xdr_netobj wire_cksum = {.len =0, .data = NULL}; | |
9e57b302 BF |
59 | char cksumdata[16]; |
60 | struct xdr_netobj md5cksum = {.len = 0, .data = cksumdata}; | |
1da177e4 LT |
61 | unsigned char *ptr = (unsigned char *)read_token->data; |
62 | unsigned char *cksum; | |
63 | int bodysize, md5elen; | |
64 | int mic_hdrlen; | |
65 | u32 ret = GSS_S_DEFECTIVE_TOKEN; | |
66 | ||
67 | dprintk("RPC: spkm3_read_token read_token->len %d\n", read_token->len); | |
68 | ||
69 | if (g_verify_token_header((struct xdr_netobj *) &ctx->mech_used, | |
70 | &bodysize, &ptr, read_token->len)) | |
71 | goto out; | |
72 | ||
73 | /* decode the token */ | |
74 | ||
75 | if (toktype == SPKM_MIC_TOK) { | |
76 | ||
77 | if ((ret = spkm3_verify_mic_token(&ptr, &mic_hdrlen, &cksum))) | |
78 | goto out; | |
79 | ||
80 | if (*cksum++ != 0x03) { | |
81 | dprintk("RPC: spkm3_read_token BAD checksum type\n"); | |
82 | goto out; | |
83 | } | |
84 | md5elen = *cksum++; | |
85 | cksum++; /* move past the zbit */ | |
86 | ||
87 | if(!decode_asn1_bitstring(&wire_cksum, cksum, md5elen - 1, 16)) | |
88 | goto out; | |
89 | ||
90 | /* HARD CODED FOR MD5 */ | |
91 | ||
92 | /* compute the checksum of the message. | |
93 | * ptr + 2 = start of header piece of checksum | |
94 | * mic_hdrlen + 2 = length of header piece of checksum | |
95 | */ | |
96 | ret = GSS_S_DEFECTIVE_TOKEN; | |
97 | code = make_checksum(CKSUMTYPE_RSA_MD5, ptr + 2, | |
98 | mic_hdrlen + 2, | |
9eed129b | 99 | message_buffer, 0, &md5cksum); |
1da177e4 LT |
100 | |
101 | if (code) | |
102 | goto out; | |
103 | ||
104 | dprintk("RPC: spkm3_read_token: digest wire_cksum.len %d:\n", | |
105 | wire_cksum.len); | |
106 | dprintk(" md5cksum.data\n"); | |
107 | print_hexl((u32 *) md5cksum.data, 16, 0); | |
108 | dprintk(" cksum.data:\n"); | |
109 | print_hexl((u32 *) wire_cksum.data, wire_cksum.len, 0); | |
110 | ||
111 | ret = GSS_S_BAD_SIG; | |
112 | code = memcmp(md5cksum.data, wire_cksum.data, wire_cksum.len); | |
113 | if (code) | |
114 | goto out; | |
115 | ||
116 | } else { | |
117 | dprintk("RPC: BAD or UNSUPPORTED SPKM3 token type: %d\n",toktype); | |
118 | goto out; | |
119 | } | |
120 | ||
121 | /* XXX: need to add expiration and sequencing */ | |
122 | ret = GSS_S_COMPLETE; | |
123 | out: | |
a51482bd | 124 | kfree(wire_cksum.data); |
1da177e4 LT |
125 | return ret; |
126 | } |