gss_krb5_crypto.c 9.6 KB
Newer Older
L
Linus Torvalds 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36
/*
 *  linux/net/sunrpc/gss_krb5_crypto.c
 *
 *  Copyright (c) 2000 The Regents of the University of Michigan.
 *  All rights reserved.
 *
 *  Andy Adamson   <andros@umich.edu>
 *  Bruce Fields   <bfields@umich.edu>
 */

/*
 * Copyright (C) 1998 by the FundsXpress, INC.
 *
 * All rights reserved.
 *
 * Export of this software from the United States of America may require
 * a specific license from the United States Government.  It is the
 * responsibility of any person or organization contemplating export to
 * obtain such a license before exporting.
 *
 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
 * distribute this software and its documentation for any purpose and
 * without fee is hereby granted, provided that the above copyright
 * notice appear in all copies and that both that copyright notice and
 * this permission notice appear in supporting documentation, and that
 * the name of FundsXpress. not be used in advertising or publicity pertaining
 * to distribution of the software without specific, written prior
 * permission.  FundsXpress makes no representations about the suitability of
 * this software for any purpose.  It is provided "as is" without express
 * or implied warranty.
 *
 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
 */

37
#include <linux/err.h>
L
Linus Torvalds 已提交
38 39 40
#include <linux/types.h>
#include <linux/mm.h>
#include <linux/slab.h>
41
#include <linux/scatterlist.h>
L
Linus Torvalds 已提交
42 43 44 45 46 47 48 49 50 51 52
#include <linux/crypto.h>
#include <linux/highmem.h>
#include <linux/pagemap.h>
#include <linux/sunrpc/gss_krb5.h>

#ifdef RPC_DEBUG
# define RPCDBG_FACILITY        RPCDBG_AUTH
#endif

u32
krb5_encrypt(
53
	struct crypto_blkcipher *tfm,
L
Linus Torvalds 已提交
54 55 56 57 58 59 60 61
	void * iv,
	void * in,
	void * out,
	int length)
{
	u32 ret = -EINVAL;
        struct scatterlist sg[1];
	u8 local_iv[16] = {0};
62
	struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv };
L
Linus Torvalds 已提交
63

64
	if (length % crypto_blkcipher_blocksize(tfm) != 0)
L
Linus Torvalds 已提交
65 66
		goto out;

67
	if (crypto_blkcipher_ivsize(tfm) > 16) {
L
Linus Torvalds 已提交
68
		dprintk("RPC:      gss_k5encrypt: tfm iv size to large %d\n",
69
		         crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
70 71 72 73
		goto out;
	}

	if (iv)
74
		memcpy(local_iv, iv, crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
75 76

	memcpy(out, in, length);
77
	sg_set_buf(sg, out, length);
L
Linus Torvalds 已提交
78

79
	ret = crypto_blkcipher_encrypt_iv(&desc, sg, sg, length);
L
Linus Torvalds 已提交
80 81
out:
	dprintk("RPC:      krb5_encrypt returns %d\n",ret);
82
	return ret;
L
Linus Torvalds 已提交
83 84 85 86 87 88
}

EXPORT_SYMBOL(krb5_encrypt);

u32
krb5_decrypt(
89
     struct crypto_blkcipher *tfm,
L
Linus Torvalds 已提交
90 91 92 93 94 95 96 97
     void * iv,
     void * in,
     void * out,
     int length)
{
	u32 ret = -EINVAL;
	struct scatterlist sg[1];
	u8 local_iv[16] = {0};
98
	struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv };
L
Linus Torvalds 已提交
99

100
	if (length % crypto_blkcipher_blocksize(tfm) != 0)
L
Linus Torvalds 已提交
101 102
		goto out;

103
	if (crypto_blkcipher_ivsize(tfm) > 16) {
L
Linus Torvalds 已提交
104
		dprintk("RPC:      gss_k5decrypt: tfm iv size to large %d\n",
105
			crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
106 107 108
		goto out;
	}
	if (iv)
109
		memcpy(local_iv,iv, crypto_blkcipher_ivsize(tfm));
L
Linus Torvalds 已提交
110 111

	memcpy(out, in, length);
112
	sg_set_buf(sg, out, length);
L
Linus Torvalds 已提交
113

114
	ret = crypto_blkcipher_decrypt_iv(&desc, sg, sg, length);
L
Linus Torvalds 已提交
115 116
out:
	dprintk("RPC:      gss_k5decrypt returns %d\n",ret);
117
	return ret;
L
Linus Torvalds 已提交
118 119 120 121
}

EXPORT_SYMBOL(krb5_decrypt);

122 123 124 125 126 127 128 129 130 131 132 133 134
static int
process_xdr_buf(struct xdr_buf *buf, int offset, int len,
		int (*actor)(struct scatterlist *, void *), void *data)
{
	int i, page_len, thislen, page_offset, ret = 0;
	struct scatterlist	sg[1];

	if (offset >= buf->head[0].iov_len) {
		offset -= buf->head[0].iov_len;
	} else {
		thislen = buf->head[0].iov_len - offset;
		if (thislen > len)
			thislen = len;
135
		sg_set_buf(sg, buf->head[0].iov_base + offset, thislen);
136 137 138 139 140 141 142 143 144 145 146 147 148 149 150 151 152 153 154 155 156 157 158 159 160 161 162 163 164 165 166 167 168 169 170 171 172 173 174 175 176 177
		ret = actor(sg, data);
		if (ret)
			goto out;
		offset = 0;
		len -= thislen;
	}
	if (len == 0)
		goto out;

	if (offset >= buf->page_len) {
		offset -= buf->page_len;
	} else {
		page_len = buf->page_len - offset;
		if (page_len > len)
			page_len = len;
		len -= page_len;
		page_offset = (offset + buf->page_base) & (PAGE_CACHE_SIZE - 1);
		i = (offset + buf->page_base) >> PAGE_CACHE_SHIFT;
		thislen = PAGE_CACHE_SIZE - page_offset;
		do {
			if (thislen > page_len)
				thislen = page_len;
			sg->page = buf->pages[i];
			sg->offset = page_offset;
			sg->length = thislen;
			ret = actor(sg, data);
			if (ret)
				goto out;
			page_len -= thislen;
			i++;
			page_offset = 0;
			thislen = PAGE_CACHE_SIZE;
		} while (page_len != 0);
		offset = 0;
	}
	if (len == 0)
		goto out;

	if (offset < buf->tail[0].iov_len) {
		thislen = buf->tail[0].iov_len - offset;
		if (thislen > len)
			thislen = len;
178
		sg_set_buf(sg, buf->tail[0].iov_base + offset, thislen);
179 180 181 182 183 184 185 186 187 188 189 190
		ret = actor(sg, data);
		len -= thislen;
	}
	if (len != 0)
		ret = -EINVAL;
out:
	return ret;
}

static int
checksummer(struct scatterlist *sg, void *data)
{
191
	struct hash_desc *desc = data;
192

193
	return crypto_hash_update(desc, sg, sg->length);
194 195
}

L
Linus Torvalds 已提交
196 197 198
/* checksum the plaintext data and hdrlen bytes of the token header */
s32
make_checksum(s32 cksumtype, char *header, int hdrlen, struct xdr_buf *body,
199
		   int body_offset, struct xdr_netobj *cksum)
L
Linus Torvalds 已提交
200 201
{
	char                            *cksumname;
202
	struct hash_desc                desc; /* XXX add to ctx? */
L
Linus Torvalds 已提交
203
	struct scatterlist              sg[1];
204
	int err;
L
Linus Torvalds 已提交
205 206 207 208 209 210 211 212

	switch (cksumtype) {
		case CKSUMTYPE_RSA_MD5:
			cksumname = "md5";
			break;
		default:
			dprintk("RPC:      krb5_make_checksum:"
				" unsupported checksum %d", cksumtype);
213
			return GSS_S_FAILURE;
L
Linus Torvalds 已提交
214
	}
215 216
	desc.tfm = crypto_alloc_hash(cksumname, 0, CRYPTO_ALG_ASYNC);
	if (IS_ERR(desc.tfm))
217
		return GSS_S_FAILURE;
218 219
	cksum->len = crypto_hash_digestsize(desc.tfm);
	desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
L
Linus Torvalds 已提交
220

221 222 223
	err = crypto_hash_init(&desc);
	if (err)
		goto out;
224
	sg_set_buf(sg, header, hdrlen);
225 226 227 228 229 230 231 232 233 234 235 236
	err = crypto_hash_update(&desc, sg, hdrlen);
	if (err)
		goto out;
	err = process_xdr_buf(body, body_offset, body->len - body_offset,
			      checksummer, &desc);
	if (err)
		goto out;
	err = crypto_hash_final(&desc, cksum->data);

out:
	crypto_free_hash(desc.tfm);
	return err ? GSS_S_FAILURE : 0;
L
Linus Torvalds 已提交
237 238 239
}

EXPORT_SYMBOL(make_checksum);
240 241 242

struct encryptor_desc {
	u8 iv[8]; /* XXX hard-coded blocksize */
243
	struct blkcipher_desc desc;
244 245 246 247 248 249 250 251 252 253 254 255 256 257 258 259 260 261 262 263 264 265 266 267 268 269 270 271 272 273 274 275 276 277 278 279 280 281 282 283 284 285 286 287
	int pos;
	struct xdr_buf *outbuf;
	struct page **pages;
	struct scatterlist infrags[4];
	struct scatterlist outfrags[4];
	int fragno;
	int fraglen;
};

static int
encryptor(struct scatterlist *sg, void *data)
{
	struct encryptor_desc *desc = data;
	struct xdr_buf *outbuf = desc->outbuf;
	struct page *in_page;
	int thislen = desc->fraglen + sg->length;
	int fraglen, ret;
	int page_pos;

	/* Worst case is 4 fragments: head, end of page 1, start
	 * of page 2, tail.  Anything more is a bug. */
	BUG_ON(desc->fragno > 3);
	desc->infrags[desc->fragno] = *sg;
	desc->outfrags[desc->fragno] = *sg;

	page_pos = desc->pos - outbuf->head[0].iov_len;
	if (page_pos >= 0 && page_pos < outbuf->page_len) {
		/* pages are not in place: */
		int i = (page_pos + outbuf->page_base) >> PAGE_CACHE_SHIFT;
		in_page = desc->pages[i];
	} else {
		in_page = sg->page;
	}
	desc->infrags[desc->fragno].page = in_page;
	desc->fragno++;
	desc->fraglen += sg->length;
	desc->pos += sg->length;

	fraglen = thislen & 7; /* XXX hardcoded blocksize */
	thislen -= fraglen;

	if (thislen == 0)
		return 0;

288 289
	ret = crypto_blkcipher_encrypt_iv(&desc->desc, desc->outfrags,
					  desc->infrags, thislen);
290 291 292 293 294 295 296 297 298 299 300 301 302 303 304 305 306 307
	if (ret)
		return ret;
	if (fraglen) {
		desc->outfrags[0].page = sg->page;
		desc->outfrags[0].offset = sg->offset + sg->length - fraglen;
		desc->outfrags[0].length = fraglen;
		desc->infrags[0] = desc->outfrags[0];
		desc->infrags[0].page = in_page;
		desc->fragno = 1;
		desc->fraglen = fraglen;
	} else {
		desc->fragno = 0;
		desc->fraglen = 0;
	}
	return 0;
}

int
308 309
gss_encrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf,
		    int offset, struct page **pages)
310 311 312 313
{
	int ret;
	struct encryptor_desc desc;

314
	BUG_ON((buf->len - offset) % crypto_blkcipher_blocksize(tfm) != 0);
315 316

	memset(desc.iv, 0, sizeof(desc.iv));
317 318 319
	desc.desc.tfm = tfm;
	desc.desc.info = desc.iv;
	desc.desc.flags = 0;
320 321 322 323 324 325 326 327 328 329 330 331 332 333
	desc.pos = offset;
	desc.outbuf = buf;
	desc.pages = pages;
	desc.fragno = 0;
	desc.fraglen = 0;

	ret = process_xdr_buf(buf, offset, buf->len - offset, encryptor, &desc);
	return ret;
}

EXPORT_SYMBOL(gss_encrypt_xdr_buf);

struct decryptor_desc {
	u8 iv[8]; /* XXX hard-coded blocksize */
334
	struct blkcipher_desc desc;
335 336 337 338 339 340 341 342 343 344 345 346 347 348 349 350 351 352 353 354 355 356 357 358 359
	struct scatterlist frags[4];
	int fragno;
	int fraglen;
};

static int
decryptor(struct scatterlist *sg, void *data)
{
	struct decryptor_desc *desc = data;
	int thislen = desc->fraglen + sg->length;
	int fraglen, ret;

	/* Worst case is 4 fragments: head, end of page 1, start
	 * of page 2, tail.  Anything more is a bug. */
	BUG_ON(desc->fragno > 3);
	desc->frags[desc->fragno] = *sg;
	desc->fragno++;
	desc->fraglen += sg->length;

	fraglen = thislen & 7; /* XXX hardcoded blocksize */
	thislen -= fraglen;

	if (thislen == 0)
		return 0;

360 361
	ret = crypto_blkcipher_decrypt_iv(&desc->desc, desc->frags,
					  desc->frags, thislen);
362 363 364 365 366 367 368 369 370 371 372 373 374 375 376 377
	if (ret)
		return ret;
	if (fraglen) {
		desc->frags[0].page = sg->page;
		desc->frags[0].offset = sg->offset + sg->length - fraglen;
		desc->frags[0].length = fraglen;
		desc->fragno = 1;
		desc->fraglen = fraglen;
	} else {
		desc->fragno = 0;
		desc->fraglen = 0;
	}
	return 0;
}

int
378 379
gss_decrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf,
		    int offset)
380 381 382 383
{
	struct decryptor_desc desc;

	/* XXXJBF: */
384
	BUG_ON((buf->len - offset) % crypto_blkcipher_blocksize(tfm) != 0);
385 386

	memset(desc.iv, 0, sizeof(desc.iv));
387 388 389
	desc.desc.tfm = tfm;
	desc.desc.info = desc.iv;
	desc.desc.flags = 0;
390 391 392 393 394 395
	desc.fragno = 0;
	desc.fraglen = 0;
	return process_xdr_buf(buf, offset, buf->len - offset, decryptor, &desc);
}

EXPORT_SYMBOL(gss_decrypt_xdr_buf);