summaryrefslogtreecommitdiff
path: root/fs/ksmbd/asn1.c
diff options
context:
space:
mode:
authorSteve French <stfrench@microsoft.com>2023-05-21 20:46:30 -0500
committerSteve French <stfrench@microsoft.com>2023-05-24 16:29:21 -0500
commit38c8a9a52082579090e34c033d439ed2cd1a462d (patch)
treeca6c3bf5b2b912f32735c1aa0a045cd21a47a205 /fs/ksmbd/asn1.c
parentcb8b02fd6343228966324528adf920bfb8b8e681 (diff)
smb: move client and server files to common directory fs/smb
Move CIFS/SMB3 related client and server files (cifs.ko and ksmbd.ko and helper modules) to new fs/smb subdirectory: fs/cifs --> fs/smb/client fs/ksmbd --> fs/smb/server fs/smbfs_common --> fs/smb/common Suggested-by: Linus Torvalds <torvalds@linux-foundation.org> Acked-by: Namjae Jeon <linkinjeon@kernel.org> Signed-off-by: Steve French <stfrench@microsoft.com>
Diffstat (limited to 'fs/ksmbd/asn1.c')
-rw-r--r--fs/ksmbd/asn1.c238
1 files changed, 0 insertions, 238 deletions
diff --git a/fs/ksmbd/asn1.c b/fs/ksmbd/asn1.c
deleted file mode 100644
index cc6384f79675..000000000000
--- a/fs/ksmbd/asn1.c
+++ /dev/null
@@ -1,238 +0,0 @@
-// SPDX-License-Identifier: GPL-2.0-or-later
-/*
- * The ASB.1/BER parsing code is derived from ip_nat_snmp_basic.c which was in
- * turn derived from the gxsnmp package by Gregory McLean & Jochen Friedrich
- *
- * Copyright (c) 2000 RP Internet (www.rpi.net.au).
- */
-
-#include <linux/module.h>
-#include <linux/types.h>
-#include <linux/kernel.h>
-#include <linux/mm.h>
-#include <linux/slab.h>
-#include <linux/oid_registry.h>
-
-#include "glob.h"
-
-#include "asn1.h"
-#include "connection.h"
-#include "auth.h"
-#include "ksmbd_spnego_negtokeninit.asn1.h"
-#include "ksmbd_spnego_negtokentarg.asn1.h"
-
-#define NTLMSSP_OID_LEN 10
-
-static char NTLMSSP_OID_STR[NTLMSSP_OID_LEN] = { 0x2b, 0x06, 0x01, 0x04, 0x01,
- 0x82, 0x37, 0x02, 0x02, 0x0a };
-
-int
-ksmbd_decode_negTokenInit(unsigned char *security_blob, int length,
- struct ksmbd_conn *conn)
-{
- return asn1_ber_decoder(&ksmbd_spnego_negtokeninit_decoder, conn,
- security_blob, length);
-}
-
-int
-ksmbd_decode_negTokenTarg(unsigned char *security_blob, int length,
- struct ksmbd_conn *conn)
-{
- return asn1_ber_decoder(&ksmbd_spnego_negtokentarg_decoder, conn,
- security_blob, length);
-}
-
-static int compute_asn_hdr_len_bytes(int len)
-{
- if (len > 0xFFFFFF)
- return 4;
- else if (len > 0xFFFF)
- return 3;
- else if (len > 0xFF)
- return 2;
- else if (len > 0x7F)
- return 1;
- else
- return 0;
-}
-
-static void encode_asn_tag(char *buf, unsigned int *ofs, char tag, char seq,
- int length)
-{
- int i;
- int index = *ofs;
- char hdr_len = compute_asn_hdr_len_bytes(length);
- int len = length + 2 + hdr_len;
-
- /* insert tag */
- buf[index++] = tag;
-
- if (!hdr_len) {
- buf[index++] = len;
- } else {
- buf[index++] = 0x80 | hdr_len;
- for (i = hdr_len - 1; i >= 0; i--)
- buf[index++] = (len >> (i * 8)) & 0xFF;
- }
-
- /* insert seq */
- len = len - (index - *ofs);
- buf[index++] = seq;
-
- if (!hdr_len) {
- buf[index++] = len;
- } else {
- buf[index++] = 0x80 | hdr_len;
- for (i = hdr_len - 1; i >= 0; i--)
- buf[index++] = (len >> (i * 8)) & 0xFF;
- }
-
- *ofs += (index - *ofs);
-}
-
-int build_spnego_ntlmssp_neg_blob(unsigned char **pbuffer, u16 *buflen,
- char *ntlm_blob, int ntlm_blob_len)
-{
- char *buf;
- unsigned int ofs = 0;
- int neg_result_len = 4 + compute_asn_hdr_len_bytes(1) * 2 + 1;
- int oid_len = 4 + compute_asn_hdr_len_bytes(NTLMSSP_OID_LEN) * 2 +
- NTLMSSP_OID_LEN;
- int ntlmssp_len = 4 + compute_asn_hdr_len_bytes(ntlm_blob_len) * 2 +
- ntlm_blob_len;
- int total_len = 4 + compute_asn_hdr_len_bytes(neg_result_len +
- oid_len + ntlmssp_len) * 2 +
- neg_result_len + oid_len + ntlmssp_len;
-
- buf = kmalloc(total_len, GFP_KERNEL);
- if (!buf)
- return -ENOMEM;
-
- /* insert main gss header */
- encode_asn_tag(buf, &ofs, 0xa1, 0x30, neg_result_len + oid_len +
- ntlmssp_len);
-
- /* insert neg result */
- encode_asn_tag(buf, &ofs, 0xa0, 0x0a, 1);
- buf[ofs++] = 1;
-
- /* insert oid */
- encode_asn_tag(buf, &ofs, 0xa1, 0x06, NTLMSSP_OID_LEN);
- memcpy(buf + ofs, NTLMSSP_OID_STR, NTLMSSP_OID_LEN);
- ofs += NTLMSSP_OID_LEN;
-
- /* insert response token - ntlmssp blob */
- encode_asn_tag(buf, &ofs, 0xa2, 0x04, ntlm_blob_len);
- memcpy(buf + ofs, ntlm_blob, ntlm_blob_len);
- ofs += ntlm_blob_len;
-
- *pbuffer = buf;
- *buflen = total_len;
- return 0;
-}
-
-int build_spnego_ntlmssp_auth_blob(unsigned char **pbuffer, u16 *buflen,
- int neg_result)
-{
- char *buf;
- unsigned int ofs = 0;
- int neg_result_len = 4 + compute_asn_hdr_len_bytes(1) * 2 + 1;
- int total_len = 4 + compute_asn_hdr_len_bytes(neg_result_len) * 2 +
- neg_result_len;
-
- buf = kmalloc(total_len, GFP_KERNEL);
- if (!buf)
- return -ENOMEM;
-
- /* insert main gss header */
- encode_asn_tag(buf, &ofs, 0xa1, 0x30, neg_result_len);
-
- /* insert neg result */
- encode_asn_tag(buf, &ofs, 0xa0, 0x0a, 1);
- if (neg_result)
- buf[ofs++] = 2;
- else
- buf[ofs++] = 0;
-
- *pbuffer = buf;
- *buflen = total_len;
- return 0;
-}
-
-int ksmbd_gssapi_this_mech(void *context, size_t hdrlen, unsigned char tag,
- const void *value, size_t vlen)
-{
- enum OID oid;
-
- oid = look_up_OID(value, vlen);
- if (oid != OID_spnego) {
- char buf[50];
-
- sprint_oid(value, vlen, buf, sizeof(buf));
- ksmbd_debug(AUTH, "Unexpected OID: %s\n", buf);
- return -EBADMSG;
- }
-
- return 0;
-}
-
-int ksmbd_neg_token_init_mech_type(void *context, size_t hdrlen,
- unsigned char tag, const void *value,
- size_t vlen)
-{
- struct ksmbd_conn *conn = context;
- enum OID oid;
- int mech_type;
-
- oid = look_up_OID(value, vlen);
- if (oid == OID_ntlmssp) {
- mech_type = KSMBD_AUTH_NTLMSSP;
- } else if (oid == OID_mskrb5) {
- mech_type = KSMBD_AUTH_MSKRB5;
- } else if (oid == OID_krb5) {
- mech_type = KSMBD_AUTH_KRB5;
- } else if (oid == OID_krb5u2u) {
- mech_type = KSMBD_AUTH_KRB5U2U;
- } else {
- char buf[50];
-
- sprint_oid(value, vlen, buf, sizeof(buf));
- ksmbd_debug(AUTH, "Unexpected OID: %s\n", buf);
- return -EBADMSG;
- }
-
- conn->auth_mechs |= mech_type;
- if (conn->preferred_auth_mech == 0)
- conn->preferred_auth_mech = mech_type;
-
- return 0;
-}
-
-static int ksmbd_neg_token_alloc(void *context, size_t hdrlen,
- unsigned char tag, const void *value,
- size_t vlen)
-{
- struct ksmbd_conn *conn = context;
-
- conn->mechToken = kmalloc(vlen + 1, GFP_KERNEL);
- if (!conn->mechToken)
- return -ENOMEM;
-
- memcpy(conn->mechToken, value, vlen);
- conn->mechToken[vlen] = '\0';
- return 0;
-}
-
-int ksmbd_neg_token_init_mech_token(void *context, size_t hdrlen,
- unsigned char tag, const void *value,
- size_t vlen)
-{
- return ksmbd_neg_token_alloc(context, hdrlen, tag, value, vlen);
-}
-
-int ksmbd_neg_token_targ_resp_token(void *context, size_t hdrlen,
- unsigned char tag, const void *value,
- size_t vlen)
-{
- return ksmbd_neg_token_alloc(context, hdrlen, tag, value, vlen);
-}