blob: 746b3e139aede6de4091cb931bc6980a6fbab6b1 [file] [log] [blame]
Linus Torvalds1da177e2005-04-16 15:20:36 -07001/*
2 * linux/net/sunrpc/gss_krb5_crypto.c
3 *
4 * Copyright (c) 2000 The Regents of the University of Michigan.
5 * All rights reserved.
6 *
7 * Andy Adamson <andros@umich.edu>
8 * Bruce Fields <bfields@umich.edu>
9 */
10
11/*
12 * Copyright (C) 1998 by the FundsXpress, INC.
13 *
14 * All rights reserved.
15 *
16 * Export of this software from the United States of America may require
17 * a specific license from the United States Government. It is the
18 * responsibility of any person or organization contemplating export to
19 * obtain such a license before exporting.
20 *
21 * WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
22 * distribute this software and its documentation for any purpose and
23 * without fee is hereby granted, provided that the above copyright
24 * notice appear in all copies and that both that copyright notice and
25 * this permission notice appear in supporting documentation, and that
26 * the name of FundsXpress. not be used in advertising or publicity pertaining
27 * to distribution of the software without specific, written prior
28 * permission. FundsXpress makes no representations about the suitability of
29 * this software for any purpose. It is provided "as is" without express
30 * or implied warranty.
31 *
32 * THIS SOFTWARE IS PROVIDED ``AS IS'' AND WITHOUT ANY EXPRESS OR
33 * IMPLIED WARRANTIES, INCLUDING, WITHOUT LIMITATION, THE IMPLIED
34 * WARRANTIES OF MERCHANTIBILITY AND FITNESS FOR A PARTICULAR PURPOSE.
35 */
36
Herbert Xu35058682006-08-24 19:10:20 +100037#include <linux/err.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070038#include <linux/types.h>
39#include <linux/mm.h>
David Hardeman378f0582005-09-17 17:55:31 +100040#include <linux/scatterlist.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070041#include <linux/crypto.h>
42#include <linux/highmem.h>
43#include <linux/pagemap.h>
44#include <linux/sunrpc/gss_krb5.h>
Olga Kornievskaia37a4e6c2006-12-04 20:22:33 -050045#include <linux/sunrpc/xdr.h>
Linus Torvalds1da177e2005-04-16 15:20:36 -070046
47#ifdef RPC_DEBUG
48# define RPCDBG_FACILITY RPCDBG_AUTH
49#endif
50
51u32
52krb5_encrypt(
Herbert Xu378c6692006-08-22 20:33:54 +100053 struct crypto_blkcipher *tfm,
Linus Torvalds1da177e2005-04-16 15:20:36 -070054 void * iv,
55 void * in,
56 void * out,
57 int length)
58{
59 u32 ret = -EINVAL;
YOSHIFUJI Hideakicca51722007-02-09 15:38:13 -080060 struct scatterlist sg[1];
Linus Torvalds1da177e2005-04-16 15:20:36 -070061 u8 local_iv[16] = {0};
Herbert Xu378c6692006-08-22 20:33:54 +100062 struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv };
Linus Torvalds1da177e2005-04-16 15:20:36 -070063
Herbert Xu378c6692006-08-22 20:33:54 +100064 if (length % crypto_blkcipher_blocksize(tfm) != 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -070065 goto out;
66
Herbert Xu378c6692006-08-22 20:33:54 +100067 if (crypto_blkcipher_ivsize(tfm) > 16) {
Kevin Coffman3d4a6882008-02-21 13:44:12 -050068 dprintk("RPC: gss_k5encrypt: tfm iv size too large %d\n",
69 crypto_blkcipher_ivsize(tfm));
Linus Torvalds1da177e2005-04-16 15:20:36 -070070 goto out;
71 }
72
73 if (iv)
Herbert Xu378c6692006-08-22 20:33:54 +100074 memcpy(local_iv, iv, crypto_blkcipher_ivsize(tfm));
Linus Torvalds1da177e2005-04-16 15:20:36 -070075
76 memcpy(out, in, length);
Herbert Xu68e3f5d2007-10-27 00:52:07 -070077 sg_init_one(sg, out, length);
Linus Torvalds1da177e2005-04-16 15:20:36 -070078
Herbert Xu378c6692006-08-22 20:33:54 +100079 ret = crypto_blkcipher_encrypt_iv(&desc, sg, sg, length);
Linus Torvalds1da177e2005-04-16 15:20:36 -070080out:
Chuck Lever8885cb32007-01-31 12:14:05 -050081 dprintk("RPC: krb5_encrypt returns %d\n", ret);
J. Bruce Fields8fc75002006-12-04 20:22:31 -050082 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -070083}
84
Linus Torvalds1da177e2005-04-16 15:20:36 -070085u32
86krb5_decrypt(
Herbert Xu378c6692006-08-22 20:33:54 +100087 struct crypto_blkcipher *tfm,
Linus Torvalds1da177e2005-04-16 15:20:36 -070088 void * iv,
89 void * in,
90 void * out,
91 int length)
92{
93 u32 ret = -EINVAL;
94 struct scatterlist sg[1];
95 u8 local_iv[16] = {0};
Herbert Xu378c6692006-08-22 20:33:54 +100096 struct blkcipher_desc desc = { .tfm = tfm, .info = local_iv };
Linus Torvalds1da177e2005-04-16 15:20:36 -070097
Herbert Xu378c6692006-08-22 20:33:54 +100098 if (length % crypto_blkcipher_blocksize(tfm) != 0)
Linus Torvalds1da177e2005-04-16 15:20:36 -070099 goto out;
100
Herbert Xu378c6692006-08-22 20:33:54 +1000101 if (crypto_blkcipher_ivsize(tfm) > 16) {
Kevin Coffman3d4a6882008-02-21 13:44:12 -0500102 dprintk("RPC: gss_k5decrypt: tfm iv size too large %d\n",
Herbert Xu378c6692006-08-22 20:33:54 +1000103 crypto_blkcipher_ivsize(tfm));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700104 goto out;
105 }
106 if (iv)
Herbert Xu378c6692006-08-22 20:33:54 +1000107 memcpy(local_iv,iv, crypto_blkcipher_ivsize(tfm));
Linus Torvalds1da177e2005-04-16 15:20:36 -0700108
109 memcpy(out, in, length);
Herbert Xu68e3f5d2007-10-27 00:52:07 -0700110 sg_init_one(sg, out, length);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700111
Herbert Xu378c6692006-08-22 20:33:54 +1000112 ret = crypto_blkcipher_decrypt_iv(&desc, sg, sg, length);
Linus Torvalds1da177e2005-04-16 15:20:36 -0700113out:
Chuck Lever8885cb32007-01-31 12:14:05 -0500114 dprintk("RPC: gss_k5decrypt returns %d\n",ret);
J. Bruce Fields8fc75002006-12-04 20:22:31 -0500115 return ret;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700116}
117
J. Bruce Fieldsf7b3af62005-10-13 16:55:03 -0400118static int
J. Bruce Fieldsf7b3af62005-10-13 16:55:03 -0400119checksummer(struct scatterlist *sg, void *data)
120{
Herbert Xu35058682006-08-24 19:10:20 +1000121 struct hash_desc *desc = data;
J. Bruce Fieldsf7b3af62005-10-13 16:55:03 -0400122
Herbert Xu35058682006-08-24 19:10:20 +1000123 return crypto_hash_update(desc, sg, sg->length);
J. Bruce Fieldsf7b3af62005-10-13 16:55:03 -0400124}
125
Linus Torvalds1da177e2005-04-16 15:20:36 -0700126/* checksum the plaintext data and hdrlen bytes of the token header */
127s32
J. Bruce Fieldsca54f892006-12-04 20:22:38 -0500128make_checksum(char *cksumname, char *header, int hdrlen, struct xdr_buf *body,
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400129 int body_offset, struct xdr_netobj *cksum)
Linus Torvalds1da177e2005-04-16 15:20:36 -0700130{
Herbert Xu35058682006-08-24 19:10:20 +1000131 struct hash_desc desc; /* XXX add to ctx? */
Linus Torvalds1da177e2005-04-16 15:20:36 -0700132 struct scatterlist sg[1];
Herbert Xu35058682006-08-24 19:10:20 +1000133 int err;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700134
Herbert Xu35058682006-08-24 19:10:20 +1000135 desc.tfm = crypto_alloc_hash(cksumname, 0, CRYPTO_ALG_ASYNC);
136 if (IS_ERR(desc.tfm))
J. Bruce Fieldsd4a30e72006-04-18 13:14:02 -0400137 return GSS_S_FAILURE;
Herbert Xu35058682006-08-24 19:10:20 +1000138 cksum->len = crypto_hash_digestsize(desc.tfm);
139 desc.flags = CRYPTO_TFM_REQ_MAY_SLEEP;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700140
Herbert Xu35058682006-08-24 19:10:20 +1000141 err = crypto_hash_init(&desc);
142 if (err)
143 goto out;
Herbert Xu68e3f5d2007-10-27 00:52:07 -0700144 sg_init_one(sg, header, hdrlen);
Herbert Xu35058682006-08-24 19:10:20 +1000145 err = crypto_hash_update(&desc, sg, hdrlen);
146 if (err)
147 goto out;
Olga Kornievskaia37a4e6c2006-12-04 20:22:33 -0500148 err = xdr_process_buf(body, body_offset, body->len - body_offset,
Herbert Xu35058682006-08-24 19:10:20 +1000149 checksummer, &desc);
150 if (err)
151 goto out;
152 err = crypto_hash_final(&desc, cksum->data);
153
154out:
155 crypto_free_hash(desc.tfm);
156 return err ? GSS_S_FAILURE : 0;
Linus Torvalds1da177e2005-04-16 15:20:36 -0700157}
158
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400159struct encryptor_desc {
160 u8 iv[8]; /* XXX hard-coded blocksize */
Herbert Xu378c6692006-08-22 20:33:54 +1000161 struct blkcipher_desc desc;
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400162 int pos;
163 struct xdr_buf *outbuf;
164 struct page **pages;
165 struct scatterlist infrags[4];
166 struct scatterlist outfrags[4];
167 int fragno;
168 int fraglen;
169};
170
171static int
172encryptor(struct scatterlist *sg, void *data)
173{
174 struct encryptor_desc *desc = data;
175 struct xdr_buf *outbuf = desc->outbuf;
176 struct page *in_page;
177 int thislen = desc->fraglen + sg->length;
178 int fraglen, ret;
179 int page_pos;
180
181 /* Worst case is 4 fragments: head, end of page 1, start
182 * of page 2, tail. Anything more is a bug. */
183 BUG_ON(desc->fragno > 3);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400184
185 page_pos = desc->pos - outbuf->head[0].iov_len;
186 if (page_pos >= 0 && page_pos < outbuf->page_len) {
187 /* pages are not in place: */
188 int i = (page_pos + outbuf->page_base) >> PAGE_CACHE_SHIFT;
189 in_page = desc->pages[i];
190 } else {
Jens Axboefa05f122007-10-22 19:44:26 +0200191 in_page = sg_page(sg);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400192 }
Herbert Xu68e3f5d2007-10-27 00:52:07 -0700193 sg_set_page(&desc->infrags[desc->fragno], in_page, sg->length,
194 sg->offset);
195 sg_set_page(&desc->outfrags[desc->fragno], sg_page(sg), sg->length,
196 sg->offset);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400197 desc->fragno++;
198 desc->fraglen += sg->length;
199 desc->pos += sg->length;
200
201 fraglen = thislen & 7; /* XXX hardcoded blocksize */
202 thislen -= fraglen;
203
204 if (thislen == 0)
205 return 0;
206
Jens Axboec46f2332007-10-31 12:06:37 +0100207 sg_mark_end(&desc->infrags[desc->fragno - 1]);
208 sg_mark_end(&desc->outfrags[desc->fragno - 1]);
Herbert Xu68e3f5d2007-10-27 00:52:07 -0700209
Herbert Xu378c6692006-08-22 20:33:54 +1000210 ret = crypto_blkcipher_encrypt_iv(&desc->desc, desc->outfrags,
211 desc->infrags, thislen);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400212 if (ret)
213 return ret;
Herbert Xu68e3f5d2007-10-27 00:52:07 -0700214
215 sg_init_table(desc->infrags, 4);
216 sg_init_table(desc->outfrags, 4);
217
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400218 if (fraglen) {
Jens Axboe642f149032007-10-24 11:20:47 +0200219 sg_set_page(&desc->outfrags[0], sg_page(sg), fraglen,
220 sg->offset + sg->length - fraglen);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400221 desc->infrags[0] = desc->outfrags[0];
Jens Axboe642f149032007-10-24 11:20:47 +0200222 sg_assign_page(&desc->infrags[0], in_page);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400223 desc->fragno = 1;
224 desc->fraglen = fraglen;
225 } else {
226 desc->fragno = 0;
227 desc->fraglen = 0;
228 }
229 return 0;
230}
231
232int
Herbert Xu378c6692006-08-22 20:33:54 +1000233gss_encrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf,
234 int offset, struct page **pages)
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400235{
236 int ret;
237 struct encryptor_desc desc;
238
Herbert Xu378c6692006-08-22 20:33:54 +1000239 BUG_ON((buf->len - offset) % crypto_blkcipher_blocksize(tfm) != 0);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400240
241 memset(desc.iv, 0, sizeof(desc.iv));
Herbert Xu378c6692006-08-22 20:33:54 +1000242 desc.desc.tfm = tfm;
243 desc.desc.info = desc.iv;
244 desc.desc.flags = 0;
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400245 desc.pos = offset;
246 desc.outbuf = buf;
247 desc.pages = pages;
248 desc.fragno = 0;
249 desc.fraglen = 0;
250
Herbert Xu68e3f5d2007-10-27 00:52:07 -0700251 sg_init_table(desc.infrags, 4);
252 sg_init_table(desc.outfrags, 4);
253
Olga Kornievskaia37a4e6c2006-12-04 20:22:33 -0500254 ret = xdr_process_buf(buf, offset, buf->len - offset, encryptor, &desc);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400255 return ret;
256}
257
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400258struct decryptor_desc {
259 u8 iv[8]; /* XXX hard-coded blocksize */
Herbert Xu378c6692006-08-22 20:33:54 +1000260 struct blkcipher_desc desc;
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400261 struct scatterlist frags[4];
262 int fragno;
263 int fraglen;
264};
265
266static int
267decryptor(struct scatterlist *sg, void *data)
268{
269 struct decryptor_desc *desc = data;
270 int thislen = desc->fraglen + sg->length;
271 int fraglen, ret;
272
273 /* Worst case is 4 fragments: head, end of page 1, start
274 * of page 2, tail. Anything more is a bug. */
275 BUG_ON(desc->fragno > 3);
Herbert Xu68e3f5d2007-10-27 00:52:07 -0700276 sg_set_page(&desc->frags[desc->fragno], sg_page(sg), sg->length,
277 sg->offset);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400278 desc->fragno++;
279 desc->fraglen += sg->length;
280
281 fraglen = thislen & 7; /* XXX hardcoded blocksize */
282 thislen -= fraglen;
283
284 if (thislen == 0)
285 return 0;
286
Jens Axboec46f2332007-10-31 12:06:37 +0100287 sg_mark_end(&desc->frags[desc->fragno - 1]);
Herbert Xu68e3f5d2007-10-27 00:52:07 -0700288
Herbert Xu378c6692006-08-22 20:33:54 +1000289 ret = crypto_blkcipher_decrypt_iv(&desc->desc, desc->frags,
290 desc->frags, thislen);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400291 if (ret)
292 return ret;
Herbert Xu68e3f5d2007-10-27 00:52:07 -0700293
294 sg_init_table(desc->frags, 4);
295
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400296 if (fraglen) {
Jens Axboe642f149032007-10-24 11:20:47 +0200297 sg_set_page(&desc->frags[0], sg_page(sg), fraglen,
298 sg->offset + sg->length - fraglen);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400299 desc->fragno = 1;
300 desc->fraglen = fraglen;
301 } else {
302 desc->fragno = 0;
303 desc->fraglen = 0;
304 }
305 return 0;
306}
307
308int
Herbert Xu378c6692006-08-22 20:33:54 +1000309gss_decrypt_xdr_buf(struct crypto_blkcipher *tfm, struct xdr_buf *buf,
310 int offset)
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400311{
312 struct decryptor_desc desc;
313
314 /* XXXJBF: */
Herbert Xu378c6692006-08-22 20:33:54 +1000315 BUG_ON((buf->len - offset) % crypto_blkcipher_blocksize(tfm) != 0);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400316
317 memset(desc.iv, 0, sizeof(desc.iv));
Herbert Xu378c6692006-08-22 20:33:54 +1000318 desc.desc.tfm = tfm;
319 desc.desc.info = desc.iv;
320 desc.desc.flags = 0;
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400321 desc.fragno = 0;
322 desc.fraglen = 0;
Herbert Xu68e3f5d2007-10-27 00:52:07 -0700323
324 sg_init_table(desc.frags, 4);
325
Olga Kornievskaia37a4e6c2006-12-04 20:22:33 -0500326 return xdr_process_buf(buf, offset, buf->len - offset, decryptor, &desc);
J. Bruce Fields14ae1622005-10-13 16:55:13 -0400327}
Kevin Coffman725f2862010-03-17 13:02:46 -0400328
329/*
330 * This function makes the assumption that it was ultimately called
331 * from gss_wrap().
332 *
333 * The client auth_gss code moves any existing tail data into a
334 * separate page before calling gss_wrap.
335 * The server svcauth_gss code ensures that both the head and the
336 * tail have slack space of RPC_MAX_AUTH_SIZE before calling gss_wrap.
337 *
338 * Even with that guarantee, this function may be called more than
339 * once in the processing of gss_wrap(). The best we can do is
340 * verify at compile-time (see GSS_KRB5_SLACK_CHECK) that the
341 * largest expected shift will fit within RPC_MAX_AUTH_SIZE.
342 * At run-time we can verify that a single invocation of this
343 * function doesn't attempt to use more the RPC_MAX_AUTH_SIZE.
344 */
345
346int
347xdr_extend_head(struct xdr_buf *buf, unsigned int base, unsigned int shiftlen)
348{
349 u8 *p;
350
351 if (shiftlen == 0)
352 return 0;
353
354 BUILD_BUG_ON(GSS_KRB5_MAX_SLACK_NEEDED > RPC_MAX_AUTH_SIZE);
355 BUG_ON(shiftlen > RPC_MAX_AUTH_SIZE);
356
357 p = buf->head[0].iov_base + base;
358
359 memmove(p + shiftlen, p, buf->head[0].iov_len - base);
360
361 buf->head[0].iov_len += shiftlen;
362 buf->len += shiftlen;
363
364 return 0;
365}