Path: blob/main/sys/rpc/rpcsec_gss/rpcsec_gss_prot.c
39536 views
/*1rpcsec_gss_prot.c23SPDX-License-Identifier: BSD-3-Clause45Copyright (c) 2000 The Regents of the University of Michigan.6All rights reserved.78Copyright (c) 2000 Dug Song <[email protected]>.9All rights reserved, all wrongs reversed.1011Redistribution and use in source and binary forms, with or without12modification, are permitted provided that the following conditions13are met:14151. Redistributions of source code must retain the above copyright16notice, this list of conditions and the following disclaimer.172. Redistributions in binary form must reproduce the above copyright18notice, this list of conditions and the following disclaimer in the19documentation and/or other materials provided with the distribution.203. Neither the name of the University nor the names of its21contributors may be used to endorse or promote products derived22from this software without specific prior written permission.2324THIS SOFTWARE IS PROVIDED ``AS IS'' AND ANY EXPRESS OR IMPLIED25WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE IMPLIED WARRANTIES OF26MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE ARE27DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE28FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR29CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF30SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR31BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF32LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING33NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS34SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.3536$Id: authgss_prot.c,v 1.18 2000/09/01 04:14:03 dugsong Exp $37*/3839#include <sys/param.h>40#include <sys/systm.h>41#include <sys/kobj.h>42#include <sys/lock.h>43#include <sys/malloc.h>44#include <sys/mbuf.h>45#include <sys/mutex.h>4647#include <rpc/rpc.h>48#include <rpc/rpcsec_gss.h>4950#include "rpcsec_gss_int.h"5152#define MAX_GSS_SIZE 10240 /* XXX */5354#if 0 /* use the one from kgssapi */55bool_t56xdr_gss_buffer_desc(XDR *xdrs, gss_buffer_desc *p)57{58char *val;59u_int len;60bool_t ret;6162val = p->value;63len = p->length;64ret = xdr_bytes(xdrs, &val, &len, MAX_GSS_SIZE);65p->value = val;66p->length = len;6768return (ret);69}70#endif7172bool_t73xdr_rpc_gss_cred(XDR *xdrs, struct rpc_gss_cred *p)74{75enum_t proc, svc;76bool_t ret;7778proc = p->gc_proc;79svc = p->gc_svc;80ret = (xdr_u_int(xdrs, &p->gc_version) &&81xdr_enum(xdrs, &proc) &&82xdr_u_int(xdrs, &p->gc_seq) &&83xdr_enum(xdrs, &svc) &&84xdr_gss_buffer_desc(xdrs, &p->gc_handle));85p->gc_proc = proc;86p->gc_svc = svc;8788return (ret);89}9091bool_t92xdr_rpc_gss_init_res(XDR *xdrs, struct rpc_gss_init_res *p)93{9495return (xdr_gss_buffer_desc(xdrs, &p->gr_handle) &&96xdr_u_int(xdrs, &p->gr_major) &&97xdr_u_int(xdrs, &p->gr_minor) &&98xdr_u_int(xdrs, &p->gr_win) &&99xdr_gss_buffer_desc(xdrs, &p->gr_token));100}101102static void103put_uint32(struct mbuf **mp, uint32_t v)104{105struct mbuf *m = *mp;106uint32_t n;107108M_PREPEND(m, sizeof(uint32_t), M_WAITOK);109n = htonl(v);110bcopy(&n, mtod(m, uint32_t *), sizeof(uint32_t));111*mp = m;112}113114bool_t115xdr_rpc_gss_wrap_data(struct mbuf **argsp,116gss_ctx_id_t ctx, gss_qop_t qop,117rpc_gss_service_t svc, u_int seq)118{119struct mbuf *args, *mic;120OM_uint32 maj_stat, min_stat;121int conf_state;122u_int len;123static char zpad[4];124125args = *argsp;126127/*128* Prepend the sequence number before calling gss_get_mic or gss_wrap.129*/130put_uint32(&args, seq);131len = m_length(args, NULL);132133if (svc == rpc_gss_svc_integrity) {134/* Checksum rpc_gss_data_t. */135maj_stat = gss_get_mic_mbuf(&min_stat, ctx, qop, args, &mic);136if (maj_stat != GSS_S_COMPLETE) {137rpc_gss_log_debug("gss_get_mic failed");138m_freem(args);139return (FALSE);140}141142/*143* Marshal databody_integ. Note that since args is144* already RPC encoded, there will be no padding.145*/146put_uint32(&args, len);147148/*149* Marshal checksum. This is likely to need padding.150*/151len = m_length(mic, NULL);152put_uint32(&mic, len);153if (len != RNDUP(len)) {154m_append(mic, RNDUP(len) - len, zpad);155}156157/*158* Concatenate databody_integ with checksum.159*/160m_cat(args, mic);161} else if (svc == rpc_gss_svc_privacy) {162/* Encrypt rpc_gss_data_t. */163maj_stat = gss_wrap_mbuf(&min_stat, ctx, TRUE, qop,164&args, &conf_state);165if (maj_stat != GSS_S_COMPLETE) {166rpc_gss_log_status("gss_wrap", NULL,167maj_stat, min_stat);168return (FALSE);169}170171/*172* Marshal databody_priv and deal with RPC padding.173*/174len = m_length(args, NULL);175put_uint32(&args, len);176if (len != RNDUP(len)) {177m_append(args, RNDUP(len) - len, zpad);178}179}180*argsp = args;181return (TRUE);182}183184static uint32_t185get_uint32(struct mbuf **mp)186{187struct mbuf *m = *mp;188uint32_t n;189190if (m->m_len < sizeof(uint32_t)) {191m = m_pullup(m, sizeof(uint32_t));192if (!m) {193*mp = NULL;194return (0);195}196}197bcopy(mtod(m, uint32_t *), &n, sizeof(uint32_t));198m_adj(m, sizeof(uint32_t));199*mp = m;200return (ntohl(n));201}202203static void204m_trim(struct mbuf *m, int len)205{206struct mbuf *n;207int off;208209if (m == NULL)210return;211n = m_getptr(m, len, &off);212if (n) {213n->m_len = off;214if (n->m_next) {215m_freem(n->m_next);216n->m_next = NULL;217}218}219}220221bool_t222xdr_rpc_gss_unwrap_data(struct mbuf **resultsp,223gss_ctx_id_t ctx, gss_qop_t qop,224rpc_gss_service_t svc, u_int seq)225{226struct mbuf *results, *message, *mic;227uint32_t len, cklen;228OM_uint32 maj_stat, min_stat;229u_int seq_num, conf_state, qop_state;230231results = *resultsp;232*resultsp = NULL;233234message = NULL;235if (svc == rpc_gss_svc_integrity) {236/*237* Extract the seq+message part. Remember that there238* may be extra RPC padding in the checksum. The239* message part is RPC encoded already so no240* padding.241*/242len = get_uint32(&results);243message = results;244results = m_split(results, len, M_WAITOK);245if (!results) {246m_freem(message);247return (FALSE);248}249250/*251* Extract the MIC and make it contiguous.252*/253cklen = get_uint32(&results);254if (!results) {255m_freem(message);256return (FALSE);257}258KASSERT(cklen <= MHLEN, ("unexpected large GSS-API checksum"));259mic = results;260if (cklen > mic->m_len) {261mic = m_pullup(mic, cklen);262if (!mic) {263m_freem(message);264return (FALSE);265}266}267if (cklen != RNDUP(cklen))268m_trim(mic, cklen);269270/* Verify checksum and QOP. */271maj_stat = gss_verify_mic_mbuf(&min_stat, ctx,272message, mic, &qop_state);273m_freem(mic);274275if (maj_stat != GSS_S_COMPLETE || qop_state != qop) {276m_freem(message);277rpc_gss_log_status("gss_verify_mic", NULL,278maj_stat, min_stat);279return (FALSE);280}281} else if (svc == rpc_gss_svc_privacy) {282/* Decode databody_priv. */283len = get_uint32(&results);284if (!results)285return (FALSE);286287/* Decrypt databody. */288message = results;289if (len != RNDUP(len))290m_trim(message, len);291maj_stat = gss_unwrap_mbuf(&min_stat, ctx, &message,292&conf_state, &qop_state);293294/* Verify encryption and QOP. */295if (maj_stat != GSS_S_COMPLETE) {296rpc_gss_log_status("gss_unwrap", NULL,297maj_stat, min_stat);298return (FALSE);299}300if (qop_state != qop || conf_state != TRUE) {301m_freem(results);302return (FALSE);303}304}305306/* Decode rpc_gss_data_t (sequence number + arguments). */307seq_num = get_uint32(&message);308if (!message)309return (FALSE);310311/* Verify sequence number. */312if (seq_num != seq) {313rpc_gss_log_debug("wrong sequence number in databody");314m_freem(message);315return (FALSE);316}317318*resultsp = message;319return (TRUE);320}321322#ifdef DEBUG323#include <sys/stdarg.h>324325void326rpc_gss_log_debug(const char *fmt, ...)327{328va_list ap;329330va_start(ap, fmt);331printf("rpcsec_gss: ");332vprintf(fmt, ap);333printf("\n");334va_end(ap);335}336337void338rpc_gss_log_status(const char *m, gss_OID mech, OM_uint32 maj_stat, OM_uint32 min_stat)339{340OM_uint32 min;341gss_buffer_desc msg;342int msg_ctx = 0;343344printf("rpcsec_gss: %s: ", m);345346gss_display_status(&min, maj_stat, GSS_C_GSS_CODE, GSS_C_NULL_OID,347&msg_ctx, &msg);348printf("%s - ", (char *)msg.value);349gss_release_buffer(&min, &msg);350351gss_display_status(&min, min_stat, GSS_C_MECH_CODE, mech,352&msg_ctx, &msg);353printf("%s\n", (char *)msg.value);354gss_release_buffer(&min, &msg);355}356357#else358359void360rpc_gss_log_debug(__unused const char *fmt, ...)361{362}363364void365rpc_gss_log_status(__unused const char *m, __unused gss_OID mech,366__unused OM_uint32 maj_stat, __unused OM_uint32 min_stat)367{368}369370#endif371372373374375