This commit was manufactured by cvs2svn to create branch 'vserver'.
[linux-2.6.git] / net / sunrpc / auth_gss / gss_spkm3_unseal.c
diff --git a/net/sunrpc/auth_gss/gss_spkm3_unseal.c b/net/sunrpc/auth_gss/gss_spkm3_unseal.c
new file mode 100644 (file)
index 0000000..65ce81b
--- /dev/null
@@ -0,0 +1,128 @@
+/*
+ *  linux/net/sunrpc/gss_spkm3_unseal.c
+ *
+ *  Copyright (c) 2003 The Regents of the University of Michigan.
+ *  All rights reserved.
+ *
+ *  Andy Adamson <andros@umich.edu>
+ *
+ *  Redistribution and use in source and binary forms, with or without
+ *  modification, are permitted provided that the following conditions
+ *  are met:
+ *
+ *  1. Redistributions of source code must retain the above copyright
+ *     notice, this list of conditions and the following disclaimer.
+ *  2. Redistributions in binary form must reproduce the above copyright
+ *     notice, this list of conditions and the following disclaimer in the
+ *     documentation and/or other materials provided with the distribution.
+ *  3. Neither the name of the University nor the names of its
+ *     contributors may be used to endorse or promote products derived
+ *     from this software without specific prior written permission.
+ *
+ *  THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED
+ *  WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF
+ *  MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE
+ *  DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
+ *  FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
+ *  CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
+ *  SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
+ *  BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF
+ *  LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
+ *  NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS
+ *  SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
+ *
+ */
+
+#include <linux/types.h>
+#include <linux/slab.h>
+#include <linux/jiffies.h>
+#include <linux/sunrpc/gss_spkm3.h>
+#include <linux/crypto.h>
+
+#ifdef RPC_DEBUG
+# define RPCDBG_FACILITY        RPCDBG_AUTH
+#endif
+
+/*
+ * spkm3_read_token()
+ * 
+ * only SPKM_MIC_TOK with md5 intg-alg is supported
+ */
+u32
+spkm3_read_token(struct spkm3_ctx *ctx,
+               struct xdr_netobj *read_token,    /* checksum */
+               struct xdr_buf *message_buffer, /* signbuf */
+               int *qop_state, int toktype)
+{
+       s32                     code;
+       struct xdr_netobj       wire_cksum = {.len =0, .data = NULL};
+       struct xdr_netobj       md5cksum = {.len = 0, .data = NULL};
+       unsigned char           *ptr = (unsigned char *)read_token->data;
+       unsigned char           *cksum;
+       int                     bodysize, md5elen;
+       int                     mic_hdrlen;
+       u32                     ret = GSS_S_DEFECTIVE_TOKEN;
+
+       dprintk("RPC: spkm3_read_token read_token->len %d\n", read_token->len);
+
+       if (g_verify_token_header((struct xdr_netobj *) &ctx->mech_used,
+                                       &bodysize, &ptr, read_token->len))
+               goto out;
+
+       /* decode the token */
+
+       if (toktype == SPKM_MIC_TOK) {
+
+               if ((ret = spkm3_verify_mic_token(&ptr, &mic_hdrlen, &cksum))) 
+                       goto out;
+
+               if (*cksum++ != 0x03) {
+                       dprintk("RPC: spkm3_read_token BAD checksum type\n");
+                       goto out;
+               }
+               md5elen = *cksum++; 
+               cksum++;        /* move past the zbit */
+       
+               if(!decode_asn1_bitstring(&wire_cksum, cksum, md5elen - 1, 16))
+                       goto out;
+
+               /* HARD CODED FOR MD5 */
+
+               /* compute the checksum of the message.
+               *  ptr + 2 = start of header piece of checksum
+               *  mic_hdrlen + 2 = length of header piece of checksum
+               */
+               ret = GSS_S_DEFECTIVE_TOKEN;
+               code = make_checksum(CKSUMTYPE_RSA_MD5, ptr + 2, 
+                                       mic_hdrlen + 2, 
+                                       message_buffer, &md5cksum);
+
+               if (code)
+                       goto out;
+
+               dprintk("RPC: spkm3_read_token: digest wire_cksum.len %d:\n", 
+                       wire_cksum.len);
+               dprintk("          md5cksum.data\n");
+               print_hexl((u32 *) md5cksum.data, 16, 0);
+               dprintk("          cksum.data:\n");
+               print_hexl((u32 *) wire_cksum.data, wire_cksum.len, 0);
+
+               ret = GSS_S_BAD_SIG;
+               code = memcmp(md5cksum.data, wire_cksum.data, wire_cksum.len);
+               if (code)
+                       goto out;
+
+       } else { 
+               dprintk("RPC: BAD or UNSUPPORTED SPKM3 token type: %d\n",toktype);
+               goto out;
+       }
+
+       /* XXX: need to add expiration and sequencing */
+       ret = GSS_S_COMPLETE;
+out:
+       if (md5cksum.data) 
+               kfree(md5cksum.data);
+       if (wire_cksum.data) 
+               kfree(wire_cksum.data);
+       return ret;
+}