asn1.c 1.4 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. // SPDX-License-Identifier: GPL-2.0-or-later
  2. #include <linux/module.h>
  3. #include <linux/kernel.h>
  4. #include <linux/oid_registry.h>
  5. #include "cifsglob.h"
  6. #include "cifs_debug.h"
  7. #include "cifsproto.h"
  8. #include "cifs_spnego_negtokeninit.asn1.h"
  9. int
  10. decode_negTokenInit(unsigned char *security_blob, int length,
  11. struct TCP_Server_Info *server)
  12. {
  13. if (asn1_ber_decoder(&cifs_spnego_negtokeninit_decoder, server,
  14. security_blob, length) == 0)
  15. return 1;
  16. else
  17. return 0;
  18. }
  19. int cifs_gssapi_this_mech(void *context, size_t hdrlen,
  20. unsigned char tag, const void *value, size_t vlen)
  21. {
  22. enum OID oid;
  23. oid = look_up_OID(value, vlen);
  24. if (oid != OID_spnego) {
  25. char buf[50];
  26. sprint_oid(value, vlen, buf, sizeof(buf));
  27. cifs_dbg(FYI, "Error decoding negTokenInit header: unexpected OID %s\n",
  28. buf);
  29. return -EBADMSG;
  30. }
  31. return 0;
  32. }
  33. int cifs_neg_token_init_mech_type(void *context, size_t hdrlen,
  34. unsigned char tag,
  35. const void *value, size_t vlen)
  36. {
  37. struct TCP_Server_Info *server = context;
  38. enum OID oid;
  39. oid = look_up_OID(value, vlen);
  40. if (oid == OID_mskrb5)
  41. server->sec_mskerberos = true;
  42. else if (oid == OID_krb5u2u)
  43. server->sec_kerberosu2u = true;
  44. else if (oid == OID_krb5)
  45. server->sec_kerberos = true;
  46. else if (oid == OID_ntlmssp)
  47. server->sec_ntlmssp = true;
  48. else {
  49. char buf[50];
  50. sprint_oid(value, vlen, buf, sizeof(buf));
  51. cifs_dbg(FYI, "Decoding negTokenInit: unsupported OID %s\n",
  52. buf);
  53. }
  54. return 0;
  55. }