gss_krb5_crypto.c 8.1 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
/*
 *  linux/net/sunrpc/gss_krb5_crypto.c
 *
 *  Copyright (c) 2000 The Regents of the University of Michigan.
 *  All rights reserved.
 *
 *  Andy Adamson   <andros@umich.edu>
 *  Bruce Fields   <bfields@umich.edu>
 */

/*
 * Copyright (C) 1998 by the FundsXpress, INC.
 *
 * All rights reserved.
 *
 * Export of this software from the United States of America may require
 * a specific license from the United States Government.  It is the
 * responsibility of any person or organization contemplating export to
 * obtain such a license before exporting.
 *
 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
 * distribute this software and its documentation for any purpose and
 * without fee is hereby granted, provided that the above copyright
 * notice appear in all copies and that both that copyright notice and
 * this permission notice appear in supporting documentation, and that
 * the name of FundsXpress. not be used in advertising or publicity pertaining
 * to distribution of the software without specific, written prior
 * permission.  FundsXpress makes no representations about the suitability of
 * this software for any purpose.  It is provided "as is" without express
 * or implied warranty.
 *
 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
 */

37
#include <linux/err.h>
L
Linus Torvalds 已提交
38 39 40
#include <linux/types.h>
#include <linux/mm.h>
#include <linux/slab.h>
41
#include <linux/scatterlist.h>
L
Linus Torvalds 已提交
42 43 44 45
#include <linux/crypto.h>
#include <linux/highmem.h>
#include <linux/pagemap.h>
#include <linux/sunrpc/gss_krb5.h>
O
Olga Kornievskaia 已提交
46
#include <linux/sunrpc/xdr.h>
L
Linus Torvalds 已提交
47 48 49 50 51 52 53

#ifdef RPC_DEBUG
# define RPCDBG_FACILITY        RPCDBG_AUTH
#endif

u32
krb5_encrypt(
54
	struct crypto_blkcipher *tfm,
L
Linus Torvalds 已提交
55 56 57 58 59 60 61 62
	void * iv,
	void * in,
	void * out,
	int length)
{
	u32 ret = -EINVAL;
        struct scatterlist sg[1];
	u8 local_iv[16] = {0};
63
	struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv };
L
Linus Torvalds 已提交
64

65
	if (length % crypto_blkcipher_blocksize(tfm) != 0)
L
Linus Torvalds 已提交
66 67
		goto out;

68
	if (crypto_blkcipher_ivsize(tfm) > 16) {
L
Linus Torvalds 已提交
69
		dprintk("RPC:      gss_k5encrypt: tfm iv size to large %d\n",
70
		         crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
71 72 73 74
		goto out;
	}

	if (iv)
75
		memcpy(local_iv, iv, crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
76 77

	memcpy(out, in, length);
78
	sg_set_buf(sg, out, length);
L
Linus Torvalds 已提交
79

80
	ret = crypto_blkcipher_encrypt_iv(&desc, sg, sg, length);
L
Linus Torvalds 已提交
81 82
out:
	dprintk("RPC:      krb5_encrypt returns %d\n",ret);
83
	return ret;
L
Linus Torvalds 已提交
84 85 86 87 88 89
}

EXPORT_SYMBOL(krb5_encrypt);

u32
krb5_decrypt(
90
     struct crypto_blkcipher *tfm,
L
Linus Torvalds 已提交
91 92 93 94 95 96 97 98
     void * iv,
     void * in,
     void * out,
     int length)
{
	u32 ret = -EINVAL;
	struct scatterlist sg[1];
	u8 local_iv[16] = {0};
99
	struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv };
L
Linus Torvalds 已提交
100

101
	if (length % crypto_blkcipher_blocksize(tfm) != 0)
L
Linus Torvalds 已提交
102 103
		goto out;

104
	if (crypto_blkcipher_ivsize(tfm) > 16) {
L
Linus Torvalds 已提交
105
		dprintk("RPC:      gss_k5decrypt: tfm iv size to large %d\n",
106
			crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
107 108 109
		goto out;
	}
	if (iv)
110
		memcpy(local_iv,iv, crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
111 112

	memcpy(out, in, length);
113
	sg_set_buf(sg, out, length);
L
Linus Torvalds 已提交
114

115
	ret = crypto_blkcipher_decrypt_iv(&desc, sg, sg, length);
L
Linus Torvalds 已提交
116 117
out:
	dprintk("RPC:      gss_k5decrypt returns %d\n",ret);
118
	return ret;
L
Linus Torvalds 已提交
119 120 121 122
}

EXPORT_SYMBOL(krb5_decrypt);

123 124 125
static int
checksummer(struct scatterlist *sg, void *data)
{
126
	struct hash_desc *desc = data;
127

128
	return crypto_hash_update(desc, sg, sg->length);
129 130
}

L
Linus Torvalds 已提交
131 132 133
/* checksum the plaintext data and hdrlen bytes of the token header */
s32
make_checksum(s32 cksumtype, char *header, int hdrlen, struct xdr_buf *body,
134
		   int body_offset, struct xdr_netobj *cksum)
L
Linus Torvalds 已提交
135 136
{
	char                            *cksumname;
137
	struct hash_desc                desc; /* XXX add to ctx? */
L
Linus Torvalds 已提交
138
	struct scatterlist              sg[1];
139
	int err;
L
Linus Torvalds 已提交
140 141 142 143 144 145 146 147

	switch (cksumtype) {
		case CKSUMTYPE_RSA_MD5:
			cksumname = "md5";
			break;
		default:
			dprintk("RPC:      krb5_make_checksum:"
				" unsupported checksum %d", cksumtype);
148
			return GSS_S_FAILURE;
L
Linus Torvalds 已提交
149
	}
150 151
	desc.tfm = crypto_alloc_hash(cksumname, 0, CRYPTO_ALG_ASYNC);
	if (IS_ERR(desc.tfm))
152
		return GSS_S_FAILURE;
153 154
	cksum->len = crypto_hash_digestsize(desc.tfm);
	desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
L
Linus Torvalds 已提交
155

156 157 158
	err = crypto_hash_init(&desc);
	if (err)
		goto out;
159
	sg_set_buf(sg, header, hdrlen);
160 161 162
	err = crypto_hash_update(&desc, sg, hdrlen);
	if (err)
		goto out;
O
Olga Kornievskaia 已提交
163
	err = xdr_process_buf(body, body_offset, body->len - body_offset,
164 165 166 167 168 169 170 171
			      checksummer, &desc);
	if (err)
		goto out;
	err = crypto_hash_final(&desc, cksum->data);

out:
	crypto_free_hash(desc.tfm);
	return err ? GSS_S_FAILURE : 0;
L
Linus Torvalds 已提交
172 173 174
}

EXPORT_SYMBOL(make_checksum);
175 176 177

struct encryptor_desc {
	u8 iv[8]; /* XXX hard-coded blocksize */
178
	struct blkcipher_desc desc;
179 180 181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198 199 200 201 202 203 204 205 206 207 208 209 210 211 212 213 214 215 216 217 218 219 220 221 222
	int pos;
	struct xdr_buf *outbuf;
	struct page **pages;
	struct scatterlist infrags[4];
	struct scatterlist outfrags[4];
	int fragno;
	int fraglen;
};

static int
encryptor(struct scatterlist *sg, void *data)
{
	struct encryptor_desc *desc = data;
	struct xdr_buf *outbuf = desc->outbuf;
	struct page *in_page;
	int thislen = desc->fraglen + sg->length;
	int fraglen, ret;
	int page_pos;

	/* Worst case is 4 fragments: head, end of page 1, start
	 * of page 2, tail.  Anything more is a bug. */
	BUG_ON(desc->fragno > 3);
	desc->infrags[desc->fragno] = *sg;
	desc->outfrags[desc->fragno] = *sg;

	page_pos = desc->pos - outbuf->head[0].iov_len;
	if (page_pos >= 0 && page_pos < outbuf->page_len) {
		/* pages are not in place: */
		int i = (page_pos + outbuf->page_base) >> PAGE_CACHE_SHIFT;
		in_page = desc->pages[i];
	} else {
		in_page = sg->page;
	}
	desc->infrags[desc->fragno].page = in_page;
	desc->fragno++;
	desc->fraglen += sg->length;
	desc->pos += sg->length;

	fraglen = thislen & 7; /* XXX hardcoded blocksize */
	thislen -= fraglen;

	if (thislen == 0)
		return 0;

223 224
	ret = crypto_blkcipher_encrypt_iv(&desc->desc, desc->outfrags,
					  desc->infrags, thislen);
225 226 227 228 229 230 231 232 233 234 235 236 237 238 239 240 241 242
	if (ret)
		return ret;
	if (fraglen) {
		desc->outfrags[0].page = sg->page;
		desc->outfrags[0].offset = sg->offset + sg->length - fraglen;
		desc->outfrags[0].length = fraglen;
		desc->infrags[0] = desc->outfrags[0];
		desc->infrags[0].page = in_page;
		desc->fragno = 1;
		desc->fraglen = fraglen;
	} else {
		desc->fragno = 0;
		desc->fraglen = 0;
	}
	return 0;
}

int
243 244
gss_encrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf,
		    int offset, struct page **pages)
245 246 247 248
{
	int ret;
	struct encryptor_desc desc;

249
	BUG_ON((buf->len - offset) % crypto_blkcipher_blocksize(tfm) != 0);
250 251

	memset(desc.iv, 0, sizeof(desc.iv));
252 253 254
	desc.desc.tfm = tfm;
	desc.desc.info = desc.iv;
	desc.desc.flags = 0;
255 256 257 258 259 260
	desc.pos = offset;
	desc.outbuf = buf;
	desc.pages = pages;
	desc.fragno = 0;
	desc.fraglen = 0;

O
Olga Kornievskaia 已提交
261
	ret = xdr_process_buf(buf, offset, buf->len - offset, encryptor, &desc);
262 263 264 265 266 267 268
	return ret;
}

EXPORT_SYMBOL(gss_encrypt_xdr_buf);

struct decryptor_desc {
	u8 iv[8]; /* XXX hard-coded blocksize */
269
	struct blkcipher_desc desc;
270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287 288 289 290 291 292 293 294
	struct scatterlist frags[4];
	int fragno;
	int fraglen;
};

static int
decryptor(struct scatterlist *sg, void *data)
{
	struct decryptor_desc *desc = data;
	int thislen = desc->fraglen + sg->length;
	int fraglen, ret;

	/* Worst case is 4 fragments: head, end of page 1, start
	 * of page 2, tail.  Anything more is a bug. */
	BUG_ON(desc->fragno > 3);
	desc->frags[desc->fragno] = *sg;
	desc->fragno++;
	desc->fraglen += sg->length;

	fraglen = thislen & 7; /* XXX hardcoded blocksize */
	thislen -= fraglen;

	if (thislen == 0)
		return 0;

295 296
	ret = crypto_blkcipher_decrypt_iv(&desc->desc, desc->frags,
					  desc->frags, thislen);
297 298 299 300 301 302 303 304 305 306 307 308 309 310 311 312
	if (ret)
		return ret;
	if (fraglen) {
		desc->frags[0].page = sg->page;
		desc->frags[0].offset = sg->offset + sg->length - fraglen;
		desc->frags[0].length = fraglen;
		desc->fragno = 1;
		desc->fraglen = fraglen;
	} else {
		desc->fragno = 0;
		desc->fraglen = 0;
	}
	return 0;
}

int
313 314
gss_decrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf,
		    int offset)
315 316 317 318
{
	struct decryptor_desc desc;

	/* XXXJBF: */
319
	BUG_ON((buf->len - offset) % crypto_blkcipher_blocksize(tfm) != 0);
320 321

	memset(desc.iv, 0, sizeof(desc.iv));
322 323 324
	desc.desc.tfm = tfm;
	desc.desc.info = desc.iv;
	desc.desc.flags = 0;
325 326
	desc.fragno = 0;
	desc.fraglen = 0;
O
Olga Kornievskaia 已提交
327
	return xdr_process_buf(buf, offset, buf->len - offset, decryptor, &desc);
328 329 330
}

EXPORT_SYMBOL(gss_decrypt_xdr_buf);