⭐ 欢迎来到虫虫下载站! | 📦 资源下载 📁 资源专辑 ℹ️ 关于我们
⭐ 虫虫下载站

📄 auth_gss.c

📁 linux-2.6.15.6
💻 C
📖 第 1 页 / 共 3 页
字号:
		cred->cr_flags &= ~RPCAUTH_CRED_UPTODATE;	} else if (maj_stat != 0) {		printk("gss_marshal: gss_get_mic FAILED (%d)\n", maj_stat);		goto out_put_ctx;	}	p = xdr_encode_opaque(p, NULL, mic.len);	gss_put_ctx(ctx);	return p;out_put_ctx:	gss_put_ctx(ctx);	return NULL;}/** Refresh credentials. XXX - finish*/static intgss_refresh(struct rpc_task *task){	if (!gss_cred_is_uptodate_ctx(task->tk_msg.rpc_cred))		return gss_refresh_upcall(task);	return 0;}static u32 *gss_validate(struct rpc_task *task, u32 *p){	struct rpc_cred *cred = task->tk_msg.rpc_cred;	struct gss_cl_ctx *ctx = gss_cred_get_ctx(cred);	u32		seq;	struct kvec	iov;	struct xdr_buf	verf_buf;	struct xdr_netobj mic;	u32		flav,len;	u32		maj_stat;	dprintk("RPC: %4u gss_validate\n", task->tk_pid);	flav = ntohl(*p++);	if ((len = ntohl(*p++)) > RPC_MAX_AUTH_SIZE)                goto out_bad;	if (flav != RPC_AUTH_GSS)		goto out_bad;	seq = htonl(task->tk_rqstp->rq_seqno);	iov.iov_base = &seq;	iov.iov_len = sizeof(seq);	xdr_buf_from_iov(&iov, &verf_buf);	mic.data = (u8 *)p;	mic.len = len;	maj_stat = gss_verify_mic(ctx->gc_gss_ctx, &verf_buf, &mic);	if (maj_stat == GSS_S_CONTEXT_EXPIRED)		cred->cr_flags &= ~RPCAUTH_CRED_UPTODATE;	if (maj_stat)		goto out_bad;	/* We leave it to unwrap to calculate au_rslack. For now we just	 * calculate the length of the verifier: */	task->tk_auth->au_verfsize = XDR_QUADLEN(len) + 2;	gss_put_ctx(ctx);	dprintk("RPC: %4u GSS gss_validate: gss_verify_mic succeeded.\n",			task->tk_pid);	return p + XDR_QUADLEN(len);out_bad:	gss_put_ctx(ctx);	dprintk("RPC: %4u gss_validate failed.\n", task->tk_pid);	return NULL;}static inline intgss_wrap_req_integ(struct rpc_cred *cred, struct gss_cl_ctx *ctx,		kxdrproc_t encode, struct rpc_rqst *rqstp, u32 *p, void *obj){	struct xdr_buf	*snd_buf = &rqstp->rq_snd_buf;	struct xdr_buf	integ_buf;	u32             *integ_len = NULL;	struct xdr_netobj mic;	u32		offset, *q;	struct kvec	*iov;	u32             maj_stat = 0;	int		status = -EIO;	integ_len = p++;	offset = (u8 *)p - (u8 *)snd_buf->head[0].iov_base;	*p++ = htonl(rqstp->rq_seqno);	status = encode(rqstp, p, obj);	if (status)		return status;	if (xdr_buf_subsegment(snd_buf, &integ_buf,				offset, snd_buf->len - offset))		return status;	*integ_len = htonl(integ_buf.len);	/* guess whether we're in the head or the tail: */	if (snd_buf->page_len || snd_buf->tail[0].iov_len) 		iov = snd_buf->tail;	else		iov = snd_buf->head;	p = iov->iov_base + iov->iov_len;	mic.data = (u8 *)(p + 1);	maj_stat = gss_get_mic(ctx->gc_gss_ctx, &integ_buf, &mic);	status = -EIO; /* XXX? */	if (maj_stat == GSS_S_CONTEXT_EXPIRED)		cred->cr_flags &= ~RPCAUTH_CRED_UPTODATE;	else if (maj_stat)		return status;	q = xdr_encode_opaque(p, NULL, mic.len);	offset = (u8 *)q - (u8 *)p;	iov->iov_len += offset;	snd_buf->len += offset;	return 0;}static voidpriv_release_snd_buf(struct rpc_rqst *rqstp){	int i;	for (i=0; i < rqstp->rq_enc_pages_num; i++)		__free_page(rqstp->rq_enc_pages[i]);	kfree(rqstp->rq_enc_pages);}static intalloc_enc_pages(struct rpc_rqst *rqstp){	struct xdr_buf *snd_buf = &rqstp->rq_snd_buf;	int first, last, i;	if (snd_buf->page_len == 0) {		rqstp->rq_enc_pages_num = 0;		return 0;	}	first = snd_buf->page_base >> PAGE_CACHE_SHIFT;	last = (snd_buf->page_base + snd_buf->page_len - 1) >> PAGE_CACHE_SHIFT;	rqstp->rq_enc_pages_num = last - first + 1 + 1;	rqstp->rq_enc_pages		= kmalloc(rqstp->rq_enc_pages_num * sizeof(struct page *),				GFP_NOFS);	if (!rqstp->rq_enc_pages)		goto out;	for (i=0; i < rqstp->rq_enc_pages_num; i++) {		rqstp->rq_enc_pages[i] = alloc_page(GFP_NOFS);		if (rqstp->rq_enc_pages[i] == NULL)			goto out_free;	}	rqstp->rq_release_snd_buf = priv_release_snd_buf;	return 0;out_free:	for (i--; i >= 0; i--) {		__free_page(rqstp->rq_enc_pages[i]);	}out:	return -EAGAIN;}static inline intgss_wrap_req_priv(struct rpc_cred *cred, struct gss_cl_ctx *ctx,		kxdrproc_t encode, struct rpc_rqst *rqstp, u32 *p, void *obj){	struct xdr_buf	*snd_buf = &rqstp->rq_snd_buf;	u32		offset;	u32             maj_stat;	int		status;	u32		*opaque_len;	struct page	**inpages;	int		first;	int		pad;	struct kvec	*iov;	char		*tmp;	opaque_len = p++;	offset = (u8 *)p - (u8 *)snd_buf->head[0].iov_base;	*p++ = htonl(rqstp->rq_seqno);	status = encode(rqstp, p, obj);	if (status)		return status;	status = alloc_enc_pages(rqstp);	if (status)		return status;	first = snd_buf->page_base >> PAGE_CACHE_SHIFT;	inpages = snd_buf->pages + first;	snd_buf->pages = rqstp->rq_enc_pages;	snd_buf->page_base -= first << PAGE_CACHE_SHIFT;	/* Give the tail its own page, in case we need extra space in the	 * head when wrapping: */	if (snd_buf->page_len || snd_buf->tail[0].iov_len) {		tmp = page_address(rqstp->rq_enc_pages[rqstp->rq_enc_pages_num - 1]);		memcpy(tmp, snd_buf->tail[0].iov_base, snd_buf->tail[0].iov_len);		snd_buf->tail[0].iov_base = tmp;	}	maj_stat = gss_wrap(ctx->gc_gss_ctx, offset, snd_buf, inpages);	/* RPC_SLACK_SPACE should prevent this ever happening: */	BUG_ON(snd_buf->len > snd_buf->buflen);        status = -EIO;	/* We're assuming that when GSS_S_CONTEXT_EXPIRED, the encryption was	 * done anyway, so it's safe to put the request on the wire: */	if (maj_stat == GSS_S_CONTEXT_EXPIRED)		cred->cr_flags &= ~RPCAUTH_CRED_UPTODATE;	else if (maj_stat)		return status;	*opaque_len = htonl(snd_buf->len - offset);	/* guess whether we're in the head or the tail: */	if (snd_buf->page_len || snd_buf->tail[0].iov_len)		iov = snd_buf->tail;	else		iov = snd_buf->head;	p = iov->iov_base + iov->iov_len;	pad = 3 - ((snd_buf->len - offset - 1) & 3);	memset(p, 0, pad);	iov->iov_len += pad;	snd_buf->len += pad;	return 0;}static intgss_wrap_req(struct rpc_task *task,	     kxdrproc_t encode, void *rqstp, u32 *p, void *obj){	struct rpc_cred *cred = task->tk_msg.rpc_cred;	struct gss_cred	*gss_cred = container_of(cred, struct gss_cred,			gc_base);	struct gss_cl_ctx *ctx = gss_cred_get_ctx(cred);	int             status = -EIO;	dprintk("RPC: %4u gss_wrap_req\n", task->tk_pid);	if (ctx->gc_proc != RPC_GSS_PROC_DATA) {		/* The spec seems a little ambiguous here, but I think that not		 * wrapping context destruction requests makes the most sense.		 */		status = encode(rqstp, p, obj);		goto out;	}	switch (gss_cred->gc_service) {		case RPC_GSS_SVC_NONE:			status = encode(rqstp, p, obj);			break;		case RPC_GSS_SVC_INTEGRITY:			status = gss_wrap_req_integ(cred, ctx, encode,								rqstp, p, obj);			break;       		case RPC_GSS_SVC_PRIVACY:			status = gss_wrap_req_priv(cred, ctx, encode,					rqstp, p, obj);			break;	}out:	gss_put_ctx(ctx);	dprintk("RPC: %4u gss_wrap_req returning %d\n", task->tk_pid, status);	return status;}static inline intgss_unwrap_resp_integ(struct rpc_cred *cred, struct gss_cl_ctx *ctx,		struct rpc_rqst *rqstp, u32 **p){	struct xdr_buf	*rcv_buf = &rqstp->rq_rcv_buf;	struct xdr_buf integ_buf;	struct xdr_netobj mic;	u32 data_offset, mic_offset;	u32 integ_len;	u32 maj_stat;	int status = -EIO;	integ_len = ntohl(*(*p)++);	if (integ_len & 3)		return status;	data_offset = (u8 *)(*p) - (u8 *)rcv_buf->head[0].iov_base;	mic_offset = integ_len + data_offset;	if (mic_offset > rcv_buf->len)		return status;	if (ntohl(*(*p)++) != rqstp->rq_seqno)		return status;	if (xdr_buf_subsegment(rcv_buf, &integ_buf, data_offset,				mic_offset - data_offset))		return status;	if (xdr_buf_read_netobj(rcv_buf, &mic, mic_offset))		return status;	maj_stat = gss_verify_mic(ctx->gc_gss_ctx, &integ_buf, &mic);	if (maj_stat == GSS_S_CONTEXT_EXPIRED)		cred->cr_flags &= ~RPCAUTH_CRED_UPTODATE;	if (maj_stat != GSS_S_COMPLETE)		return status;	return 0;}static inline intgss_unwrap_resp_priv(struct rpc_cred *cred, struct gss_cl_ctx *ctx,		struct rpc_rqst *rqstp, u32 **p){	struct xdr_buf  *rcv_buf = &rqstp->rq_rcv_buf;	u32 offset;	u32 opaque_len;	u32 maj_stat;	int status = -EIO;	opaque_len = ntohl(*(*p)++);	offset = (u8 *)(*p) - (u8 *)rcv_buf->head[0].iov_base;	if (offset + opaque_len > rcv_buf->len)		return status;	/* remove padding: */	rcv_buf->len = offset + opaque_len;	maj_stat = gss_unwrap(ctx->gc_gss_ctx, offset, rcv_buf);	if (maj_stat == GSS_S_CONTEXT_EXPIRED)		cred->cr_flags &= ~RPCAUTH_CRED_UPTODATE;	if (maj_stat != GSS_S_COMPLETE)		return status;	if (ntohl(*(*p)++) != rqstp->rq_seqno)		return status;	return 0;}static intgss_unwrap_resp(struct rpc_task *task,		kxdrproc_t decode, void *rqstp, u32 *p, void *obj){	struct rpc_cred *cred = task->tk_msg.rpc_cred;	struct gss_cred *gss_cred = container_of(cred, struct gss_cred,			gc_base);	struct gss_cl_ctx *ctx = gss_cred_get_ctx(cred);	u32		*savedp = p;	struct kvec	*head = ((struct rpc_rqst *)rqstp)->rq_rcv_buf.head;	int		savedlen = head->iov_len;	int             status = -EIO;	if (ctx->gc_proc != RPC_GSS_PROC_DATA)		goto out_decode;	switch (gss_cred->gc_service) {		case RPC_GSS_SVC_NONE:			break;		case RPC_GSS_SVC_INTEGRITY:			status = gss_unwrap_resp_integ(cred, ctx, rqstp, &p);			if (status)				goto out;			break;       		case RPC_GSS_SVC_PRIVACY:			status = gss_unwrap_resp_priv(cred, ctx, rqstp, &p);			if (status)				goto out;			break;	}	/* take into account extra slack for integrity and privacy cases: */	task->tk_auth->au_rslack = task->tk_auth->au_verfsize + (p - savedp)						+ (savedlen - head->iov_len);out_decode:	status = decode(rqstp, p, obj);out:	gss_put_ctx(ctx);	dprintk("RPC: %4u gss_unwrap_resp returning %d\n", task->tk_pid,			status);	return status;}  static struct rpc_authops authgss_ops = {	.owner		= THIS_MODULE,	.au_flavor	= RPC_AUTH_GSS,#ifdef RPC_DEBUG	.au_name	= "RPCSEC_GSS",#endif	.create		= gss_create,	.destroy	= gss_destroy,	.lookup_cred	= gss_lookup_cred,	.crcreate	= gss_create_cred};static struct rpc_credops gss_credops = {	.cr_name	= "AUTH_GSS",	.crdestroy	= gss_destroy_cred,	.crmatch	= gss_match,	.crmarshal	= gss_marshal,	.crrefresh	= gss_refresh,	.crvalidate	= gss_validate,	.crwrap_req	= gss_wrap_req,	.crunwrap_resp	= gss_unwrap_resp,};static struct rpc_pipe_ops gss_upcall_ops = {	.upcall		= gss_pipe_upcall,	.downcall	= gss_pipe_downcall,	.destroy_msg	= gss_pipe_destroy_msg,	.release_pipe	= gss_pipe_release,};/* * Initialize RPCSEC_GSS module */static int __init init_rpcsec_gss(void){	int err = 0;	err = rpcauth_register(&authgss_ops);	if (err)		goto out;	err = gss_svc_init();	if (err)		goto out_unregister;	return 0;out_unregister:	rpcauth_unregister(&authgss_ops);out:	return err;}static void __exit exit_rpcsec_gss(void){	gss_svc_shutdown();	rpcauth_unregister(&authgss_ops);}MODULE_LICENSE("GPL");module_init(init_rpcsec_gss)module_exit(exit_rpcsec_gss)

⌨️ 快捷键说明

复制代码 Ctrl + C
搜索代码 Ctrl + F
全屏模式 F11
切换主题 Ctrl + Shift + D
显示快捷键 ?
增大字号 Ctrl + =
减小字号 Ctrl + -