1/*-
2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3 *
4 * Copyright (c) 2008 Isilon Inc http://www.isilon.com/
5 * Authors: Doug Rabson <dfr@rabson.org>
6 * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org>
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 *    notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 *    notice, this list of conditions and the following disclaimer in the
15 *    documentation and/or other materials provided with the distribution.
16 *
17 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
18 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
20 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
21 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
22 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
23 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
24 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
25 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
26 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
27 * SUCH DAMAGE.
28 */
29
30#include <sys/cdefs.h>
31__FBSDID("$FreeBSD$");
32
33#include "opt_inet6.h"
34
35#include <sys/param.h>
36#include <sys/kernel.h>
37#include <sys/kobj.h>
38#include <sys/lock.h>
39#include <sys/malloc.h>
40#include <sys/mbuf.h>
41#include <sys/module.h>
42#include <sys/mutex.h>
43#include <kgssapi/gssapi.h>
44#include <kgssapi/gssapi_impl.h>
45
46#include "kgss_if.h"
47#include "kcrypto.h"
48
49#define GSS_TOKEN_SENT_BY_ACCEPTOR	1
50#define GSS_TOKEN_SEALED		2
51#define GSS_TOKEN_ACCEPTOR_SUBKEY	4
52
53static gss_OID_desc krb5_mech_oid =
54{9, (void *) "\x2a\x86\x48\x86\xf7\x12\x01\x02\x02" };
55
56struct krb5_data {
57	size_t		kd_length;
58	void		*kd_data;
59};
60
61struct krb5_keyblock {
62	uint16_t	kk_type; /* encryption type */
63	struct krb5_data kk_key; /* key data */
64};
65
66struct krb5_address {
67	uint16_t	ka_type;
68	struct krb5_data ka_addr;
69};
70
71/*
72 * The km_elem array is ordered so that the highest received sequence
73 * number is listed first.
74 */
75struct krb5_msg_order {
76	uint32_t		km_flags;
77	uint32_t		km_start;
78	uint32_t		km_length;
79	uint32_t		km_jitter_window;
80	uint32_t		km_first_seq;
81	uint32_t		*km_elem;
82};
83
84struct krb5_context {
85	struct _gss_ctx_id_t	kc_common;
86	struct mtx		kc_lock;
87	uint32_t		kc_ac_flags;
88	uint32_t		kc_ctx_flags;
89	uint32_t		kc_more_flags;
90#define LOCAL			1
91#define OPEN			2
92#define COMPAT_OLD_DES3		4
93#define COMPAT_OLD_DES3_SELECTED 8
94#define ACCEPTOR_SUBKEY		16
95	struct krb5_address	kc_local_address;
96	struct krb5_address	kc_remote_address;
97	uint16_t		kc_local_port;
98	uint16_t		kc_remote_port;
99	struct krb5_keyblock	kc_keyblock;
100	struct krb5_keyblock	kc_local_subkey;
101	struct krb5_keyblock	kc_remote_subkey;
102	volatile uint32_t	kc_local_seqnumber;
103	uint32_t		kc_remote_seqnumber;
104	uint32_t		kc_keytype;
105	uint32_t		kc_cksumtype;
106	struct krb5_data	kc_source_name;
107	struct krb5_data	kc_target_name;
108	uint32_t		kc_lifetime;
109	struct krb5_msg_order	kc_msg_order;
110	struct krb5_key_state	*kc_tokenkey;
111	struct krb5_key_state	*kc_encryptkey;
112	struct krb5_key_state	*kc_checksumkey;
113
114	struct krb5_key_state	*kc_send_seal_Ke;
115	struct krb5_key_state	*kc_send_seal_Ki;
116	struct krb5_key_state	*kc_send_seal_Kc;
117	struct krb5_key_state	*kc_send_sign_Kc;
118
119	struct krb5_key_state	*kc_recv_seal_Ke;
120	struct krb5_key_state	*kc_recv_seal_Ki;
121	struct krb5_key_state	*kc_recv_seal_Kc;
122	struct krb5_key_state	*kc_recv_sign_Kc;
123};
124
125static uint16_t
126get_uint16(const uint8_t **pp, size_t *lenp)
127{
128	const uint8_t *p = *pp;
129	uint16_t v;
130
131	if (*lenp < 2)
132		return (0);
133
134	v = (p[0] << 8) | p[1];
135	*pp = p + 2;
136	*lenp = *lenp - 2;
137
138	return (v);
139}
140
141static uint32_t
142get_uint32(const uint8_t **pp, size_t *lenp)
143{
144	const uint8_t *p = *pp;
145	uint32_t v;
146
147	if (*lenp < 4)
148		return (0);
149
150	v = (p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3];
151	*pp = p + 4;
152	*lenp = *lenp - 4;
153
154	return (v);
155}
156
157static void
158get_data(const uint8_t **pp, size_t *lenp, struct krb5_data *dp)
159{
160	size_t sz = get_uint32(pp, lenp);
161
162	dp->kd_length = sz;
163	dp->kd_data = malloc(sz, M_GSSAPI, M_WAITOK);
164
165	if (*lenp < sz)
166		sz = *lenp;
167	bcopy(*pp, dp->kd_data, sz);
168	(*pp) += sz;
169	(*lenp) -= sz;
170}
171
172static void
173delete_data(struct krb5_data *dp)
174{
175	if (dp->kd_data) {
176		free(dp->kd_data, M_GSSAPI);
177		dp->kd_length = 0;
178		dp->kd_data = NULL;
179	}
180}
181
182static void
183get_address(const uint8_t **pp, size_t *lenp, struct krb5_address *ka)
184{
185
186	ka->ka_type = get_uint16(pp, lenp);
187	get_data(pp, lenp, &ka->ka_addr);
188}
189
190static void
191delete_address(struct krb5_address *ka)
192{
193	delete_data(&ka->ka_addr);
194}
195
196static void
197get_keyblock(const uint8_t **pp, size_t *lenp, struct krb5_keyblock *kk)
198{
199
200	kk->kk_type = get_uint16(pp, lenp);
201	get_data(pp, lenp, &kk->kk_key);
202}
203
204static void
205delete_keyblock(struct krb5_keyblock *kk)
206{
207	if (kk->kk_key.kd_data)
208		bzero(kk->kk_key.kd_data, kk->kk_key.kd_length);
209	delete_data(&kk->kk_key);
210}
211
212static void
213copy_key(struct krb5_keyblock *from, struct krb5_keyblock **to)
214{
215
216	if (from->kk_key.kd_length)
217		*to = from;
218	else
219		*to = NULL;
220}
221
222/*
223 * Return non-zero if we are initiator.
224 */
225static __inline int
226is_initiator(struct krb5_context *kc)
227{
228	return (kc->kc_more_flags & LOCAL);
229}
230
231/*
232 * Return non-zero if we are acceptor.
233 */
234static __inline int
235is_acceptor(struct krb5_context *kc)
236{
237	return !(kc->kc_more_flags & LOCAL);
238}
239
240static void
241get_initiator_subkey(struct krb5_context *kc, struct krb5_keyblock **kdp)
242{
243
244	if (is_initiator(kc))
245		copy_key(&kc->kc_local_subkey, kdp);
246	else
247		copy_key(&kc->kc_remote_subkey, kdp);
248	if (!*kdp)
249		copy_key(&kc->kc_keyblock, kdp);
250}
251
252static void
253get_acceptor_subkey(struct krb5_context *kc, struct krb5_keyblock **kdp)
254{
255
256	if (is_initiator(kc))
257		copy_key(&kc->kc_remote_subkey, kdp);
258	else
259		copy_key(&kc->kc_local_subkey, kdp);
260}
261
262static OM_uint32
263get_keys(struct krb5_context *kc)
264{
265	struct krb5_keyblock *keydata;
266	struct krb5_encryption_class *ec;
267	struct krb5_key_state *key;
268	int etype;
269
270	keydata = NULL;
271	get_acceptor_subkey(kc, &keydata);
272	if (!keydata)
273		if ((kc->kc_more_flags & ACCEPTOR_SUBKEY) == 0)
274			get_initiator_subkey(kc, &keydata);
275	if (!keydata)
276		return (GSS_S_FAILURE);
277
278	/*
279	 * GSS-API treats all DES etypes the same and all DES3 etypes
280	 * the same.
281	 */
282	switch (keydata->kk_type) {
283	case ETYPE_DES_CBC_CRC:
284	case ETYPE_DES_CBC_MD4:
285	case ETYPE_DES_CBC_MD5:
286		etype = ETYPE_DES_CBC_CRC;
287		break;
288
289	case ETYPE_DES3_CBC_MD5:
290	case ETYPE_DES3_CBC_SHA1:
291	case ETYPE_OLD_DES3_CBC_SHA1:
292		etype = ETYPE_DES3_CBC_SHA1;
293		break;
294
295	default:
296		etype = keydata->kk_type;
297	}
298
299	ec = krb5_find_encryption_class(etype);
300	if (!ec)
301		return (GSS_S_FAILURE);
302
303	key = krb5_create_key(ec);
304	krb5_set_key(key, keydata->kk_key.kd_data);
305	kc->kc_tokenkey = key;
306
307	switch (etype) {
308	case ETYPE_DES_CBC_CRC:
309	case ETYPE_ARCFOUR_HMAC_MD5:
310	case ETYPE_ARCFOUR_HMAC_MD5_56: {
311		/*
312		 * Single DES and ARCFOUR uses a 'derived' key (XOR
313		 * with 0xf0) for encrypting wrap tokens. The original
314		 * key is used for checksums and sequence numbers.
315		 */
316		struct krb5_key_state *ekey;
317		uint8_t *ekp, *kp;
318		int i;
319
320		ekey = krb5_create_key(ec);
321		ekp = ekey->ks_key;
322		kp = key->ks_key;
323		for (i = 0; i < ec->ec_keylen; i++)
324			ekp[i] = kp[i] ^ 0xf0;
325		krb5_set_key(ekey, ekp);
326		kc->kc_encryptkey = ekey;
327		refcount_acquire(&key->ks_refs);
328		kc->kc_checksumkey = key;
329		break;
330	}
331
332	case ETYPE_DES3_CBC_SHA1:
333		/*
334		 * Triple DES uses a RFC 3961 style derived key with
335		 * usage number KG_USAGE_SIGN for checksums. The
336		 * original key is used for encryption and sequence
337		 * numbers.
338		 */
339		kc->kc_checksumkey = krb5_get_checksum_key(key, KG_USAGE_SIGN);
340		refcount_acquire(&key->ks_refs);
341		kc->kc_encryptkey = key;
342		break;
343
344	default:
345		/*
346		 * We need eight derived keys four for sending and
347		 * four for receiving.
348		 */
349		if (is_initiator(kc)) {
350			/*
351			 * We are initiator.
352			 */
353			kc->kc_send_seal_Ke = krb5_get_encryption_key(key,
354			    KG_USAGE_INITIATOR_SEAL);
355			kc->kc_send_seal_Ki = krb5_get_integrity_key(key,
356			    KG_USAGE_INITIATOR_SEAL);
357			kc->kc_send_seal_Kc = krb5_get_checksum_key(key,
358			    KG_USAGE_INITIATOR_SEAL);
359			kc->kc_send_sign_Kc = krb5_get_checksum_key(key,
360			    KG_USAGE_INITIATOR_SIGN);
361
362			kc->kc_recv_seal_Ke = krb5_get_encryption_key(key,
363			    KG_USAGE_ACCEPTOR_SEAL);
364			kc->kc_recv_seal_Ki = krb5_get_integrity_key(key,
365			    KG_USAGE_ACCEPTOR_SEAL);
366			kc->kc_recv_seal_Kc = krb5_get_checksum_key(key,
367			    KG_USAGE_ACCEPTOR_SEAL);
368			kc->kc_recv_sign_Kc = krb5_get_checksum_key(key,
369			    KG_USAGE_ACCEPTOR_SIGN);
370		} else {
371			/*
372			 * We are acceptor.
373			 */
374			kc->kc_send_seal_Ke = krb5_get_encryption_key(key,
375			    KG_USAGE_ACCEPTOR_SEAL);
376			kc->kc_send_seal_Ki = krb5_get_integrity_key(key,
377			    KG_USAGE_ACCEPTOR_SEAL);
378			kc->kc_send_seal_Kc = krb5_get_checksum_key(key,
379			    KG_USAGE_ACCEPTOR_SEAL);
380			kc->kc_send_sign_Kc = krb5_get_checksum_key(key,
381			    KG_USAGE_ACCEPTOR_SIGN);
382
383			kc->kc_recv_seal_Ke = krb5_get_encryption_key(key,
384			    KG_USAGE_INITIATOR_SEAL);
385			kc->kc_recv_seal_Ki = krb5_get_integrity_key(key,
386			    KG_USAGE_INITIATOR_SEAL);
387			kc->kc_recv_seal_Kc = krb5_get_checksum_key(key,
388			    KG_USAGE_INITIATOR_SEAL);
389			kc->kc_recv_sign_Kc = krb5_get_checksum_key(key,
390			    KG_USAGE_INITIATOR_SIGN);
391		}
392		break;
393	}
394
395	return (GSS_S_COMPLETE);
396}
397
398static void
399krb5_init(gss_ctx_id_t ctx)
400{
401	struct krb5_context *kc = (struct krb5_context *)ctx;
402
403	mtx_init(&kc->kc_lock, "krb5 gss lock", NULL, MTX_DEF);
404}
405
406static OM_uint32
407krb5_import(gss_ctx_id_t ctx,
408    enum sec_context_format format,
409    const gss_buffer_t context_token)
410{
411	struct krb5_context *kc = (struct krb5_context *)ctx;
412	OM_uint32 res;
413	const uint8_t *p = (const uint8_t *) context_token->value;
414	size_t len = context_token->length;
415	uint32_t flags;
416	int i;
417
418	/*
419	 * We support heimdal 0.6 and heimdal 1.1
420	 */
421	if (format != KGSS_HEIMDAL_0_6 && format != KGSS_HEIMDAL_1_1)
422		return (GSS_S_DEFECTIVE_TOKEN);
423
424#define SC_LOCAL_ADDRESS	1
425#define SC_REMOTE_ADDRESS	2
426#define SC_KEYBLOCK		4
427#define SC_LOCAL_SUBKEY		8
428#define SC_REMOTE_SUBKEY	16
429
430	/*
431	 * Ensure that the token starts with krb5 oid.
432	 */
433	if (p[0] != 0x00 || p[1] != krb5_mech_oid.length
434	    || len < krb5_mech_oid.length + 2
435	    || bcmp(krb5_mech_oid.elements, p + 2,
436		krb5_mech_oid.length))
437		return (GSS_S_DEFECTIVE_TOKEN);
438	p += krb5_mech_oid.length + 2;
439	len -= krb5_mech_oid.length + 2;
440
441	flags = get_uint32(&p, &len);
442	kc->kc_ac_flags = get_uint32(&p, &len);
443	if (flags & SC_LOCAL_ADDRESS)
444		get_address(&p, &len, &kc->kc_local_address);
445	if (flags & SC_REMOTE_ADDRESS)
446		get_address(&p, &len, &kc->kc_remote_address);
447	kc->kc_local_port = get_uint16(&p, &len);
448	kc->kc_remote_port = get_uint16(&p, &len);
449	if (flags & SC_KEYBLOCK)
450		get_keyblock(&p, &len, &kc->kc_keyblock);
451	if (flags & SC_LOCAL_SUBKEY)
452		get_keyblock(&p, &len, &kc->kc_local_subkey);
453	if (flags & SC_REMOTE_SUBKEY)
454		get_keyblock(&p, &len, &kc->kc_remote_subkey);
455	kc->kc_local_seqnumber = get_uint32(&p, &len);
456	kc->kc_remote_seqnumber = get_uint32(&p, &len);
457	kc->kc_keytype = get_uint32(&p, &len);
458	kc->kc_cksumtype = get_uint32(&p, &len);
459	get_data(&p, &len, &kc->kc_source_name);
460	get_data(&p, &len, &kc->kc_target_name);
461	kc->kc_ctx_flags = get_uint32(&p, &len);
462	kc->kc_more_flags = get_uint32(&p, &len);
463	kc->kc_lifetime = get_uint32(&p, &len);
464	/*
465	 * Heimdal 1.1 adds the message order stuff.
466	 */
467	if (format == KGSS_HEIMDAL_1_1) {
468		kc->kc_msg_order.km_flags = get_uint32(&p, &len);
469		kc->kc_msg_order.km_start = get_uint32(&p, &len);
470		kc->kc_msg_order.km_length = get_uint32(&p, &len);
471		kc->kc_msg_order.km_jitter_window = get_uint32(&p, &len);
472		kc->kc_msg_order.km_first_seq = get_uint32(&p, &len);
473		kc->kc_msg_order.km_elem =
474			malloc(kc->kc_msg_order.km_jitter_window * sizeof(uint32_t),
475			    M_GSSAPI, M_WAITOK);
476		for (i = 0; i < kc->kc_msg_order.km_jitter_window; i++)
477			kc->kc_msg_order.km_elem[i] = get_uint32(&p, &len);
478	} else {
479		kc->kc_msg_order.km_flags = 0;
480	}
481
482	res = get_keys(kc);
483	if (GSS_ERROR(res))
484		return (res);
485
486	/*
487	 * We don't need these anymore.
488	 */
489	delete_keyblock(&kc->kc_keyblock);
490	delete_keyblock(&kc->kc_local_subkey);
491	delete_keyblock(&kc->kc_remote_subkey);
492
493	return (GSS_S_COMPLETE);
494}
495
496static void
497krb5_delete(gss_ctx_id_t ctx, gss_buffer_t output_token)
498{
499	struct krb5_context *kc = (struct krb5_context *)ctx;
500
501	delete_address(&kc->kc_local_address);
502	delete_address(&kc->kc_remote_address);
503	delete_keyblock(&kc->kc_keyblock);
504	delete_keyblock(&kc->kc_local_subkey);
505	delete_keyblock(&kc->kc_remote_subkey);
506	delete_data(&kc->kc_source_name);
507	delete_data(&kc->kc_target_name);
508	if (kc->kc_msg_order.km_elem)
509		free(kc->kc_msg_order.km_elem, M_GSSAPI);
510	if (output_token) {
511		output_token->length = 0;
512		output_token->value = NULL;
513	}
514	if (kc->kc_tokenkey) {
515		krb5_free_key(kc->kc_tokenkey);
516		if (kc->kc_encryptkey) {
517			krb5_free_key(kc->kc_encryptkey);
518			krb5_free_key(kc->kc_checksumkey);
519		} else {
520			krb5_free_key(kc->kc_send_seal_Ke);
521			krb5_free_key(kc->kc_send_seal_Ki);
522			krb5_free_key(kc->kc_send_seal_Kc);
523			krb5_free_key(kc->kc_send_sign_Kc);
524			krb5_free_key(kc->kc_recv_seal_Ke);
525			krb5_free_key(kc->kc_recv_seal_Ki);
526			krb5_free_key(kc->kc_recv_seal_Kc);
527			krb5_free_key(kc->kc_recv_sign_Kc);
528		}
529	}
530	mtx_destroy(&kc->kc_lock);
531}
532
533static gss_OID
534krb5_mech_type(gss_ctx_id_t ctx)
535{
536
537	return (&krb5_mech_oid);
538}
539
540/*
541 * Make a token with the given type and length (the length includes
542 * the TOK_ID), initialising the token header appropriately. Return a
543 * pointer to the TOK_ID of the token.  A new mbuf is allocated with
544 * the framing header plus hlen bytes of space.
545 *
546 * Format is as follows:
547 *
548 *	0x60			[APPLICATION 0] SEQUENCE
549 *	DER encoded length	length of oid + type + inner token length
550 *	0x06 NN <oid data>	OID of mechanism type
551 *	TT TT			TOK_ID
552 *	<inner token>		data for inner token
553 *
554 * 1:		der encoded length
555 */
556static void *
557krb5_make_token(char tok_id[2], size_t hlen, size_t len, struct mbuf **mp)
558{
559	size_t inside_len, len_len, tlen;
560	gss_OID oid = &krb5_mech_oid;
561	struct mbuf *m;
562	uint8_t *p;
563
564	inside_len = 2 + oid->length + len;
565	if (inside_len < 128)
566		len_len = 1;
567	else if (inside_len < 0x100)
568		len_len = 2;
569	else if (inside_len < 0x10000)
570		len_len = 3;
571	else if (inside_len < 0x1000000)
572		len_len = 4;
573	else
574		len_len = 5;
575
576	tlen = 1 + len_len + 2 + oid->length + hlen;
577	KASSERT(tlen <= MLEN, ("token head too large"));
578	MGET(m, M_WAITOK, MT_DATA);
579	M_ALIGN(m, tlen);
580	m->m_len = tlen;
581
582	p = (uint8_t *) m->m_data;
583	*p++ = 0x60;
584	switch (len_len) {
585	case 1:
586		*p++ = inside_len;
587		break;
588	case 2:
589		*p++ = 0x81;
590		*p++ = inside_len;
591		break;
592	case 3:
593		*p++ = 0x82;
594		*p++ = inside_len >> 8;
595		*p++ = inside_len;
596		break;
597	case 4:
598		*p++ = 0x83;
599		*p++ = inside_len >> 16;
600		*p++ = inside_len >> 8;
601		*p++ = inside_len;
602		break;
603	case 5:
604		*p++ = 0x84;
605		*p++ = inside_len >> 24;
606		*p++ = inside_len >> 16;
607		*p++ = inside_len >> 8;
608		*p++ = inside_len;
609		break;
610	}
611
612	*p++ = 0x06;
613	*p++ = oid->length;
614	bcopy(oid->elements, p, oid->length);
615	p += oid->length;
616
617	p[0] = tok_id[0];
618	p[1] = tok_id[1];
619
620	*mp = m;
621
622	return (p);
623}
624
625/*
626 * Verify a token, checking the inner token length and mechanism oid.
627 * pointer to the first byte of the TOK_ID. The length of the
628 * encapsulated data is checked to be at least len bytes; the actual
629 * length of the encapsulated data (including TOK_ID) is returned in
630 * *encap_len.
631 *
632 * If can_pullup is TRUE and the token header is fragmented, we will
633 * rearrange it.
634 *
635 * Format is as follows:
636 *
637 *	0x60			[APPLICATION 0] SEQUENCE
638 *	DER encoded length	length of oid + type + inner token length
639 *	0x06 NN <oid data>	OID of mechanism type
640 *	TT TT			TOK_ID
641 *	<inner token>		data for inner token
642 *
643 * 1:		der encoded length
644 */
645static void *
646krb5_verify_token(char tok_id[2], size_t len, struct mbuf **mp,
647    size_t *encap_len, bool_t can_pullup)
648{
649	struct mbuf *m;
650	size_t tlen, hlen, len_len, inside_len;
651	gss_OID oid = &krb5_mech_oid;
652	uint8_t *p;
653
654	m = *mp;
655	tlen = m_length(m, NULL);
656	if (tlen < 2)
657		return (NULL);
658
659	/*
660	 * Ensure that at least the framing part of the token is
661	 * contigous.
662	 */
663	if (m->m_len < 2) {
664		if (can_pullup)
665			*mp = m = m_pullup(m, 2);
666		else
667			return (NULL);
668	}
669
670	p = m->m_data;
671
672	if (*p++ != 0x60)
673		return (NULL);
674
675	if (*p < 0x80) {
676		inside_len = *p++;
677		len_len = 1;
678	} else {
679		/*
680		 * Ensure there is enough space for the DER encoded length.
681		 */
682		len_len = (*p & 0x7f) + 1;
683		if (tlen < len_len + 1)
684			return (NULL);
685		if (m->m_len < len_len + 1) {
686			if (can_pullup)
687				*mp = m = m_pullup(m, len_len + 1);
688			else
689				return (NULL);
690			p = m->m_data + 1;
691		}
692
693		switch (*p++) {
694		case 0x81:
695			inside_len = *p++;
696			break;
697
698		case 0x82:
699			inside_len = (p[0] << 8) | p[1];
700			p += 2;
701			break;
702
703		case 0x83:
704			inside_len = (p[0] << 16) | (p[1] << 8) | p[2];
705			p += 3;
706			break;
707
708		case 0x84:
709			inside_len = (p[0] << 24) | (p[1] << 16)
710				| (p[2] << 8) | p[3];
711			p += 4;
712			break;
713
714		default:
715			return (NULL);
716		}
717	}
718
719	if (tlen != inside_len + len_len + 1)
720		return (NULL);
721	if (inside_len < 2 + oid->length + len)
722		return (NULL);
723
724	/*
725	 * Now that we know the value of len_len, we can pullup the
726	 * whole header. The header is 1 + len_len + 2 + oid->length +
727	 * len bytes.
728	 */
729	hlen = 1 + len_len + 2 + oid->length + len;
730	if (m->m_len < hlen) {
731		if (can_pullup)
732			*mp = m = m_pullup(m, hlen);
733		else
734			return (NULL);
735		p = m->m_data + 1 + len_len;
736	}
737
738	if (*p++ != 0x06)
739		return (NULL);
740	if (*p++ != oid->length)
741		return (NULL);
742	if (bcmp(oid->elements, p, oid->length))
743		return (NULL);
744	p += oid->length;
745
746	if (p[0] != tok_id[0])
747		return (NULL);
748
749	if (p[1] != tok_id[1])
750		return (NULL);
751
752	*encap_len = inside_len - 2 - oid->length;
753
754	return (p);
755}
756
757static void
758krb5_insert_seq(struct krb5_msg_order *mo, uint32_t seq, int index)
759{
760	int i;
761
762	if (mo->km_length < mo->km_jitter_window)
763		mo->km_length++;
764
765	for (i = mo->km_length - 1; i > index; i--)
766		mo->km_elem[i] = mo->km_elem[i - 1];
767	mo->km_elem[index] = seq;
768}
769
770/*
771 * Check sequence numbers according to RFC 2743 section 1.2.3.
772 */
773static OM_uint32
774krb5_sequence_check(struct krb5_context *kc, uint32_t seq)
775{
776	OM_uint32 res = GSS_S_FAILURE;
777	struct krb5_msg_order *mo = &kc->kc_msg_order;
778	int check_sequence = mo->km_flags & GSS_C_SEQUENCE_FLAG;
779	int check_replay = mo->km_flags & GSS_C_REPLAY_FLAG;
780	int i;
781
782	mtx_lock(&kc->kc_lock);
783
784	/*
785	 * Message is in-sequence with no gap.
786	 */
787	if (mo->km_length == 0 || seq == mo->km_elem[0] + 1) {
788		/*
789		 * This message is received in-sequence with no gaps.
790		 */
791		krb5_insert_seq(mo, seq, 0);
792		res = GSS_S_COMPLETE;
793		goto out;
794	}
795
796	if (seq > mo->km_elem[0]) {
797		/*
798		 * This message is received in-sequence with a gap.
799		 */
800		krb5_insert_seq(mo, seq, 0);
801		if (check_sequence)
802			res = GSS_S_GAP_TOKEN;
803		else
804			res = GSS_S_COMPLETE;
805		goto out;
806	}
807
808	if (seq < mo->km_elem[mo->km_length - 1]) {
809		if (check_replay && !check_sequence)
810			res = GSS_S_OLD_TOKEN;
811		else
812			res = GSS_S_UNSEQ_TOKEN;
813		goto out;
814	}
815
816	for (i = 0; i < mo->km_length; i++) {
817		if (mo->km_elem[i] == seq) {
818			res = GSS_S_DUPLICATE_TOKEN;
819			goto out;
820		}
821		if (mo->km_elem[i] < seq) {
822			/*
823			 * We need to insert this seq here,
824			 */
825			krb5_insert_seq(mo, seq, i);
826			if (check_replay && !check_sequence)
827				res = GSS_S_COMPLETE;
828			else
829				res = GSS_S_UNSEQ_TOKEN;
830			goto out;
831		}
832	}
833
834out:
835	mtx_unlock(&kc->kc_lock);
836
837	return (res);
838}
839
840static uint8_t sgn_alg_des_md5[] = { 0x00, 0x00 };
841static uint8_t seal_alg_des[] = { 0x00, 0x00 };
842static uint8_t sgn_alg_des3_sha1[] = { 0x04, 0x00 };
843static uint8_t seal_alg_des3[] = { 0x02, 0x00 };
844static uint8_t seal_alg_rc4[] = { 0x10, 0x00 };
845static uint8_t sgn_alg_hmac_md5[] = { 0x11, 0x00 };
846
847/*
848 * Return the size of the inner token given the use of the key's
849 * encryption class. For wrap tokens, the length of the padded
850 * plaintext will be added to this.
851 */
852static size_t
853token_length(struct krb5_key_state *key)
854{
855
856	return (16 + key->ks_class->ec_checksumlen);
857}
858
859static OM_uint32
860krb5_get_mic_old(struct krb5_context *kc, struct mbuf *m,
861    struct mbuf **micp, uint8_t sgn_alg[2])
862{
863	struct mbuf *mlast, *mic, *tm;
864	uint8_t *p, dir;
865	size_t tlen, mlen, cklen;
866	uint32_t seq;
867	char buf[8];
868
869	mlen = m_length(m, &mlast);
870
871	tlen = token_length(kc->kc_tokenkey);
872	p = krb5_make_token("\x01\x01", tlen, tlen, &mic);
873	p += 2;			/* TOK_ID */
874	*p++ = sgn_alg[0];	/* SGN_ALG */
875	*p++ = sgn_alg[1];
876
877	*p++ = 0xff;		/* filler */
878	*p++ = 0xff;
879	*p++ = 0xff;
880	*p++ = 0xff;
881
882	/*
883	 * SGN_CKSUM:
884	 *
885	 * Calculate the keyed checksum of the token header plus the
886	 * message.
887	 */
888	cklen = kc->kc_checksumkey->ks_class->ec_checksumlen;
889
890	mic->m_len = p - (uint8_t *) mic->m_data;
891	mic->m_next = m;
892	MGET(tm, M_WAITOK, MT_DATA);
893	tm->m_len = cklen;
894	mlast->m_next = tm;
895
896	krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8,
897	    8 + mlen, cklen);
898	bcopy(tm->m_data, p + 8, cklen);
899	mic->m_next = NULL;
900	mlast->m_next = NULL;
901	m_free(tm);
902
903	/*
904	 * SND_SEQ:
905	 *
906	 * Take the four bytes of the sequence number least
907	 * significant first followed by four bytes of direction
908	 * marker (zero for initiator and 0xff for acceptor). Encrypt
909	 * that data using the SGN_CKSUM as IV. Note: ARC4 wants the
910	 * sequence number big-endian.
911	 */
912	seq = atomic_fetchadd_32(&kc->kc_local_seqnumber, 1);
913	if (sgn_alg[0] == 0x11) {
914		p[0] = (seq >> 24);
915		p[1] = (seq >> 16);
916		p[2] = (seq >> 8);
917		p[3] = (seq >> 0);
918	} else {
919		p[0] = (seq >> 0);
920		p[1] = (seq >> 8);
921		p[2] = (seq >> 16);
922		p[3] = (seq >> 24);
923	}
924	if (is_initiator(kc)) {
925		dir = 0;
926	} else {
927		dir = 0xff;
928	}
929	p[4] = dir;
930	p[5] = dir;
931	p[6] = dir;
932	p[7] = dir;
933	bcopy(p + 8, buf, 8);
934
935	/*
936	 * Set the mic buffer to its final size so that the encrypt
937	 * can see the SND_SEQ part.
938	 */
939	mic->m_len += 8 + cklen;
940	krb5_encrypt(kc->kc_tokenkey, mic, mic->m_len - cklen - 8, 8, buf, 8);
941
942	*micp = mic;
943	return (GSS_S_COMPLETE);
944}
945
946static OM_uint32
947krb5_get_mic_new(struct krb5_context *kc,  struct mbuf *m,
948    struct mbuf **micp)
949{
950	struct krb5_key_state *key = kc->kc_send_sign_Kc;
951	struct mbuf *mlast, *mic;
952	uint8_t *p;
953	int flags;
954	size_t mlen, cklen;
955	uint32_t seq;
956
957	mlen = m_length(m, &mlast);
958	cklen = key->ks_class->ec_checksumlen;
959
960	KASSERT(16 + cklen <= MLEN, ("checksum too large for an mbuf"));
961	MGET(mic, M_WAITOK, MT_DATA);
962	M_ALIGN(mic, 16 + cklen);
963	mic->m_len = 16 + cklen;
964	p = mic->m_data;
965
966	/* TOK_ID */
967	p[0] = 0x04;
968	p[1] = 0x04;
969
970	/* Flags */
971	flags = 0;
972	if (is_acceptor(kc))
973		flags |= GSS_TOKEN_SENT_BY_ACCEPTOR;
974	if (kc->kc_more_flags & ACCEPTOR_SUBKEY)
975		flags |= GSS_TOKEN_ACCEPTOR_SUBKEY;
976	p[2] = flags;
977
978	/* Filler */
979	p[3] = 0xff;
980	p[4] = 0xff;
981	p[5] = 0xff;
982	p[6] = 0xff;
983	p[7] = 0xff;
984
985	/* SND_SEQ */
986	p[8] = 0;
987	p[9] = 0;
988	p[10] = 0;
989	p[11] = 0;
990	seq = atomic_fetchadd_32(&kc->kc_local_seqnumber, 1);
991	p[12] = (seq >> 24);
992	p[13] = (seq >> 16);
993	p[14] = (seq >> 8);
994	p[15] = (seq >> 0);
995
996	/*
997	 * SGN_CKSUM:
998	 *
999	 * Calculate the keyed checksum of the message plus the first
1000	 * 16 bytes of the token header.
1001	 */
1002	mlast->m_next = mic;
1003	krb5_checksum(key, 0, m, 0, mlen + 16, cklen);
1004	mlast->m_next = NULL;
1005
1006	*micp = mic;
1007	return (GSS_S_COMPLETE);
1008}
1009
1010static OM_uint32
1011krb5_get_mic(gss_ctx_id_t ctx, OM_uint32 *minor_status,
1012    gss_qop_t qop_req, struct mbuf *m, struct mbuf **micp)
1013{
1014	struct krb5_context *kc = (struct krb5_context *)ctx;
1015
1016	*minor_status = 0;
1017
1018	if (qop_req != GSS_C_QOP_DEFAULT)
1019		return (GSS_S_BAD_QOP);
1020
1021	if (time_uptime > kc->kc_lifetime)
1022		return (GSS_S_CONTEXT_EXPIRED);
1023
1024	switch (kc->kc_tokenkey->ks_class->ec_type) {
1025	case ETYPE_DES_CBC_CRC:
1026		return (krb5_get_mic_old(kc, m, micp, sgn_alg_des_md5));
1027
1028	case ETYPE_DES3_CBC_SHA1:
1029		return (krb5_get_mic_old(kc, m, micp, sgn_alg_des3_sha1));
1030
1031	case ETYPE_ARCFOUR_HMAC_MD5:
1032	case ETYPE_ARCFOUR_HMAC_MD5_56:
1033		return (krb5_get_mic_old(kc, m, micp, sgn_alg_hmac_md5));
1034
1035	default:
1036		return (krb5_get_mic_new(kc, m, micp));
1037	}
1038
1039	return (GSS_S_FAILURE);
1040}
1041
1042static OM_uint32
1043krb5_verify_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic,
1044    uint8_t sgn_alg[2])
1045{
1046	struct mbuf *mlast, *tm;
1047	uint8_t *p, *tp, dir;
1048	size_t mlen, tlen, elen, miclen;
1049	size_t cklen;
1050	uint32_t seq;
1051
1052	mlen = m_length(m, &mlast);
1053
1054	tlen = token_length(kc->kc_tokenkey);
1055	p = krb5_verify_token("\x01\x01", tlen, &mic, &elen, FALSE);
1056	if (!p)
1057		return (GSS_S_DEFECTIVE_TOKEN);
1058#if 0
1059	/*
1060	 * Disable this check - heimdal-1.1 generates DES3 MIC tokens
1061	 * that are 2 bytes too big.
1062	 */
1063	if (elen != tlen)
1064		return (GSS_S_DEFECTIVE_TOKEN);
1065#endif
1066	/* TOK_ID */
1067	p += 2;
1068
1069	/* SGN_ALG */
1070	if (p[0] != sgn_alg[0] || p[1] != sgn_alg[1])
1071		return (GSS_S_DEFECTIVE_TOKEN);
1072	p += 2;
1073
1074	if (p[0] != 0xff || p[1] != 0xff || p[2] != 0xff || p[3] != 0xff)
1075		return (GSS_S_DEFECTIVE_TOKEN);
1076	p += 4;
1077
1078	/*
1079	 * SGN_CKSUM:
1080	 *
1081	 * Calculate the keyed checksum of the token header plus the
1082	 * message.
1083	 */
1084	cklen = kc->kc_checksumkey->ks_class->ec_checksumlen;
1085	miclen = mic->m_len;
1086	mic->m_len = p - (uint8_t *) mic->m_data;
1087	mic->m_next = m;
1088	MGET(tm, M_WAITOK, MT_DATA);
1089	tm->m_len = cklen;
1090	mlast->m_next = tm;
1091
1092	krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8,
1093	    8 + mlen, cklen);
1094	mic->m_next = NULL;
1095	mlast->m_next = NULL;
1096	if (bcmp(tm->m_data, p + 8, cklen)) {
1097		m_free(tm);
1098		return (GSS_S_BAD_SIG);
1099	}
1100
1101	/*
1102	 * SND_SEQ:
1103	 *
1104	 * Take the four bytes of the sequence number least
1105	 * significant first followed by four bytes of direction
1106	 * marker (zero for initiator and 0xff for acceptor). Encrypt
1107	 * that data using the SGN_CKSUM as IV.  Note: ARC4 wants the
1108	 * sequence number big-endian.
1109	 */
1110	bcopy(p, tm->m_data, 8);
1111	tm->m_len = 8;
1112	krb5_decrypt(kc->kc_tokenkey, tm, 0, 8, p + 8, 8);
1113
1114	tp = tm->m_data;
1115	if (sgn_alg[0] == 0x11) {
1116		seq = tp[3] | (tp[2] << 8) | (tp[1] << 16) | (tp[0] << 24);
1117	} else {
1118		seq = tp[0] | (tp[1] << 8) | (tp[2] << 16) | (tp[3] << 24);
1119	}
1120
1121	if (is_initiator(kc)) {
1122		dir = 0xff;
1123	} else {
1124		dir = 0;
1125	}
1126	if (tp[4] != dir || tp[5] != dir || tp[6] != dir || tp[7] != dir) {
1127		m_free(tm);
1128		return (GSS_S_DEFECTIVE_TOKEN);
1129	}
1130	m_free(tm);
1131
1132	if (kc->kc_msg_order.km_flags &
1133		(GSS_C_REPLAY_FLAG | GSS_C_SEQUENCE_FLAG)) {
1134		return (krb5_sequence_check(kc, seq));
1135	}
1136
1137	return (GSS_S_COMPLETE);
1138}
1139
1140static OM_uint32
1141krb5_verify_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic)
1142{
1143	OM_uint32 res;
1144	struct krb5_key_state *key = kc->kc_recv_sign_Kc;
1145	struct mbuf *mlast;
1146	uint8_t *p;
1147	int flags;
1148	size_t mlen, cklen;
1149	char buf[32];
1150
1151	mlen = m_length(m, &mlast);
1152	cklen = key->ks_class->ec_checksumlen;
1153
1154	KASSERT(mic->m_next == NULL, ("MIC should be contiguous"));
1155	if (mic->m_len != 16 + cklen)
1156		return (GSS_S_DEFECTIVE_TOKEN);
1157	p = mic->m_data;
1158
1159	/* TOK_ID */
1160	if (p[0] != 0x04)
1161		return (GSS_S_DEFECTIVE_TOKEN);
1162	if (p[1] != 0x04)
1163		return (GSS_S_DEFECTIVE_TOKEN);
1164
1165	/* Flags */
1166	flags = 0;
1167	if (is_initiator(kc))
1168		flags |= GSS_TOKEN_SENT_BY_ACCEPTOR;
1169	if (kc->kc_more_flags & ACCEPTOR_SUBKEY)
1170		flags |= GSS_TOKEN_ACCEPTOR_SUBKEY;
1171	if (p[2] != flags)
1172		return (GSS_S_DEFECTIVE_TOKEN);
1173
1174	/* Filler */
1175	if (p[3] != 0xff)
1176		return (GSS_S_DEFECTIVE_TOKEN);
1177	if (p[4] != 0xff)
1178		return (GSS_S_DEFECTIVE_TOKEN);
1179	if (p[5] != 0xff)
1180		return (GSS_S_DEFECTIVE_TOKEN);
1181	if (p[6] != 0xff)
1182		return (GSS_S_DEFECTIVE_TOKEN);
1183	if (p[7] != 0xff)
1184		return (GSS_S_DEFECTIVE_TOKEN);
1185
1186	/* SND_SEQ */
1187	if (kc->kc_msg_order.km_flags &
1188		(GSS_C_REPLAY_FLAG | GSS_C_SEQUENCE_FLAG)) {
1189		uint32_t seq;
1190		if (p[8] || p[9] || p[10] || p[11]) {
1191			res = GSS_S_UNSEQ_TOKEN;
1192		} else {
1193			seq = (p[12] << 24) | (p[13] << 16)
1194				| (p[14] << 8) | p[15];
1195			res = krb5_sequence_check(kc, seq);
1196		}
1197		if (GSS_ERROR(res))
1198			return (res);
1199	} else {
1200		res = GSS_S_COMPLETE;
1201	}
1202
1203	/*
1204	 * SGN_CKSUM:
1205	 *
1206	 * Calculate the keyed checksum of the message plus the first
1207	 * 16 bytes of the token header.
1208	 */
1209	m_copydata(mic, 16, cklen, buf);
1210	mlast->m_next = mic;
1211	krb5_checksum(key, 0, m, 0, mlen + 16, cklen);
1212	mlast->m_next = NULL;
1213	if (bcmp(buf, p + 16, cklen)) {
1214		return (GSS_S_BAD_SIG);
1215	}
1216
1217	return (GSS_S_COMPLETE);
1218}
1219
1220static OM_uint32
1221krb5_verify_mic(gss_ctx_id_t ctx, OM_uint32 *minor_status,
1222    struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state)
1223{
1224	struct krb5_context *kc = (struct krb5_context *)ctx;
1225
1226	*minor_status = 0;
1227	if (qop_state)
1228		*qop_state = GSS_C_QOP_DEFAULT;
1229
1230	if (time_uptime > kc->kc_lifetime)
1231		return (GSS_S_CONTEXT_EXPIRED);
1232
1233	switch (kc->kc_tokenkey->ks_class->ec_type) {
1234	case ETYPE_DES_CBC_CRC:
1235		return (krb5_verify_mic_old(kc, m, mic, sgn_alg_des_md5));
1236
1237	case ETYPE_ARCFOUR_HMAC_MD5:
1238	case ETYPE_ARCFOUR_HMAC_MD5_56:
1239		return (krb5_verify_mic_old(kc, m, mic, sgn_alg_hmac_md5));
1240
1241	case ETYPE_DES3_CBC_SHA1:
1242		return (krb5_verify_mic_old(kc, m, mic, sgn_alg_des3_sha1));
1243
1244	default:
1245		return (krb5_verify_mic_new(kc, m, mic));
1246	}
1247
1248	return (GSS_S_FAILURE);
1249}
1250
1251static OM_uint32
1252krb5_wrap_old(struct krb5_context *kc, int conf_req_flag,
1253    struct mbuf **mp, int *conf_state,
1254    uint8_t sgn_alg[2], uint8_t seal_alg[2])
1255{
1256	struct mbuf *m, *mlast, *tm, *cm, *pm;
1257	size_t mlen, tlen, padlen, datalen;
1258	uint8_t *p, dir;
1259	size_t cklen;
1260	uint8_t buf[8];
1261	uint32_t seq;
1262
1263	/*
1264	 * How many trailing pad bytes do we need?
1265	 */
1266	m = *mp;
1267	mlen = m_length(m, &mlast);
1268	tlen = kc->kc_tokenkey->ks_class->ec_msgblocklen;
1269	padlen = tlen - (mlen % tlen);
1270
1271	/*
1272	 * The data part of the token has eight bytes of random
1273	 * confounder prepended and followed by up to eight bytes of
1274	 * padding bytes each of which is set to the number of padding
1275	 * bytes.
1276	 */
1277	datalen = mlen + 8 + padlen;
1278	tlen = token_length(kc->kc_tokenkey);
1279
1280	p = krb5_make_token("\x02\x01", tlen, datalen + tlen, &tm);
1281	p += 2;			/* TOK_ID */
1282	*p++ = sgn_alg[0];	/* SGN_ALG */
1283	*p++ = sgn_alg[1];
1284	if (conf_req_flag) {
1285		*p++ = seal_alg[0]; /* SEAL_ALG */
1286		*p++ = seal_alg[1];
1287	} else {
1288		*p++ = 0xff;	/* SEAL_ALG = none */
1289		*p++ = 0xff;
1290	}
1291
1292	*p++ = 0xff;		/* filler */
1293	*p++ = 0xff;
1294
1295	/*
1296	 * Copy the padded message data.
1297	 */
1298	if (M_LEADINGSPACE(m) >= 8) {
1299		m->m_data -= 8;
1300		m->m_len += 8;
1301	} else {
1302		MGET(cm, M_WAITOK, MT_DATA);
1303		cm->m_len = 8;
1304		cm->m_next = m;
1305		m = cm;
1306	}
1307	arc4rand(m->m_data, 8, 0);
1308	if (M_TRAILINGSPACE(mlast) >= padlen) {
1309		memset(mlast->m_data + mlast->m_len, padlen, padlen);
1310		mlast->m_len += padlen;
1311	} else {
1312		MGET(pm, M_WAITOK, MT_DATA);
1313		memset(pm->m_data, padlen, padlen);
1314		pm->m_len = padlen;
1315		mlast->m_next = pm;
1316		mlast = pm;
1317	}
1318	tm->m_next = m;
1319
1320	/*
1321	 * SGN_CKSUM:
1322	 *
1323	 * Calculate the keyed checksum of the token header plus the
1324	 * padded message. Fiddle with tm->m_len so that we only
1325	 * checksum the 8 bytes of head that we care about.
1326	 */
1327	cklen = kc->kc_checksumkey->ks_class->ec_checksumlen;
1328	tlen = tm->m_len;
1329	tm->m_len = p - (uint8_t *) tm->m_data;
1330	MGET(cm, M_WAITOK, MT_DATA);
1331	cm->m_len = cklen;
1332	mlast->m_next = cm;
1333	krb5_checksum(kc->kc_checksumkey, 13, tm, tm->m_len - 8,
1334	    datalen + 8, cklen);
1335	tm->m_len = tlen;
1336	mlast->m_next = NULL;
1337	bcopy(cm->m_data, p + 8, cklen);
1338	m_free(cm);
1339
1340	/*
1341	 * SND_SEQ:
1342	 *
1343	 * Take the four bytes of the sequence number least
1344	 * significant first (most significant first for ARCFOUR)
1345	 * followed by four bytes of direction marker (zero for
1346	 * initiator and 0xff for acceptor). Encrypt that data using
1347	 * the SGN_CKSUM as IV.
1348	 */
1349	seq = atomic_fetchadd_32(&kc->kc_local_seqnumber, 1);
1350	if (sgn_alg[0] == 0x11) {
1351		p[0] = (seq >> 24);
1352		p[1] = (seq >> 16);
1353		p[2] = (seq >> 8);
1354		p[3] = (seq >> 0);
1355	} else {
1356		p[0] = (seq >> 0);
1357		p[1] = (seq >> 8);
1358		p[2] = (seq >> 16);
1359		p[3] = (seq >> 24);
1360	}
1361	if (is_initiator(kc)) {
1362		dir = 0;
1363	} else {
1364		dir = 0xff;
1365	}
1366	p[4] = dir;
1367	p[5] = dir;
1368	p[6] = dir;
1369	p[7] = dir;
1370	krb5_encrypt(kc->kc_tokenkey, tm, p - (uint8_t *) tm->m_data,
1371	    8, p + 8, 8);
1372
1373	if (conf_req_flag) {
1374		/*
1375		 * Encrypt the padded message with an IV of zero for
1376		 * DES and DES3, or an IV of the sequence number in
1377		 * big-endian format for ARCFOUR.
1378		 */
1379		if (seal_alg[0] == 0x10) {
1380			buf[0] = (seq >> 24);
1381			buf[1] = (seq >> 16);
1382			buf[2] = (seq >> 8);
1383			buf[3] = (seq >> 0);
1384			krb5_encrypt(kc->kc_encryptkey, m, 0, datalen,
1385			    buf, 4);
1386		} else {
1387			krb5_encrypt(kc->kc_encryptkey, m, 0, datalen,
1388			    NULL, 0);
1389		}
1390	}
1391
1392	if (conf_state)
1393		*conf_state = conf_req_flag;
1394
1395	*mp = tm;
1396	return (GSS_S_COMPLETE);
1397}
1398
1399static OM_uint32
1400krb5_wrap_new(struct krb5_context *kc, int conf_req_flag,
1401    struct mbuf **mp, int *conf_state)
1402{
1403	struct krb5_key_state *Ke = kc->kc_send_seal_Ke;
1404	struct krb5_key_state *Ki = kc->kc_send_seal_Ki;
1405	struct krb5_key_state *Kc = kc->kc_send_seal_Kc;
1406	const struct krb5_encryption_class *ec = Ke->ks_class;
1407	struct mbuf *m, *mlast, *tm;
1408	uint8_t *p;
1409	int flags, EC;
1410	size_t mlen, blen, mblen, cklen, ctlen;
1411	uint32_t seq;
1412	static char zpad[32];
1413
1414	m = *mp;
1415	mlen = m_length(m, &mlast);
1416
1417	blen = ec->ec_blocklen;
1418	mblen = ec->ec_msgblocklen;
1419	cklen = ec->ec_checksumlen;
1420
1421	if (conf_req_flag) {
1422		/*
1423		 * For sealed messages, we need space for 16 bytes of
1424		 * header, blen confounder, plaintext, padding, copy
1425		 * of header and checksum.
1426		 *
1427		 * We pad to mblen (which may be different from
1428		 * blen). If the encryption class is using CTS, mblen
1429		 * will be one (i.e. no padding required).
1430		 */
1431		if (mblen > 1)
1432			EC = mlen % mblen;
1433		else
1434			EC = 0;
1435		ctlen = blen + mlen + EC + 16;
1436
1437		/*
1438		 * Put initial header and confounder before the
1439		 * message.
1440		 */
1441		M_PREPEND(m, 16 + blen, M_WAITOK);
1442
1443		/*
1444		 * Append padding + copy of header and checksum. Try
1445		 * to fit this into the end of the original message,
1446		 * otherwise allocate a trailer.
1447		 */
1448		if (M_TRAILINGSPACE(mlast) >= EC + 16 + cklen) {
1449			tm = NULL;
1450			mlast->m_len += EC + 16 + cklen;
1451		} else {
1452			MGET(tm, M_WAITOK, MT_DATA);
1453			tm->m_len = EC + 16 + cklen;
1454			mlast->m_next = tm;
1455		}
1456	} else {
1457		/*
1458		 * For unsealed messages, we need 16 bytes of header
1459		 * plus space for the plaintext and a checksum. EC is
1460		 * set to the checksum size. We leave space in tm for
1461		 * a copy of the header - this will be trimmed later.
1462		 */
1463		M_PREPEND(m, 16, M_WAITOK);
1464
1465		MGET(tm, M_WAITOK, MT_DATA);
1466		tm->m_len = cklen + 16;
1467		mlast->m_next = tm;
1468		ctlen = 0;
1469		EC = cklen;
1470	}
1471
1472	p = m->m_data;
1473
1474	/* TOK_ID */
1475	p[0] = 0x05;
1476	p[1] = 0x04;
1477
1478	/* Flags */
1479	flags = 0;
1480	if (conf_req_flag)
1481		flags = GSS_TOKEN_SEALED;
1482	if (is_acceptor(kc))
1483		flags |= GSS_TOKEN_SENT_BY_ACCEPTOR;
1484	if (kc->kc_more_flags & ACCEPTOR_SUBKEY)
1485		flags |= GSS_TOKEN_ACCEPTOR_SUBKEY;
1486	p[2] = flags;
1487
1488	/* Filler */
1489	p[3] = 0xff;
1490
1491	/* EC + RRC - set to zero initially */
1492	p[4] = 0;
1493	p[5] = 0;
1494	p[6] = 0;
1495	p[7] = 0;
1496
1497	/* SND_SEQ */
1498	p[8] = 0;
1499	p[9] = 0;
1500	p[10] = 0;
1501	p[11] = 0;
1502	seq = atomic_fetchadd_32(&kc->kc_local_seqnumber, 1);
1503	p[12] = (seq >> 24);
1504	p[13] = (seq >> 16);
1505	p[14] = (seq >> 8);
1506	p[15] = (seq >> 0);
1507
1508	if (conf_req_flag) {
1509		/*
1510		 * Encrypt according to RFC 4121 section 4.2 and RFC
1511		 * 3961 section 5.3. Note: we don't generate tokens
1512		 * with RRC values other than zero. If we did, we
1513		 * should zero RRC in the copied header.
1514		 */
1515		arc4rand(p + 16, blen, 0);
1516		if (EC) {
1517			m_copyback(m, 16 + blen + mlen, EC, zpad);
1518		}
1519		m_copyback(m, 16 + blen + mlen + EC, 16, p);
1520
1521		krb5_checksum(Ki, 0, m, 16, ctlen, cklen);
1522		krb5_encrypt(Ke, m, 16, ctlen, NULL, 0);
1523	} else {
1524		/*
1525		 * The plaintext message is followed by a checksum of
1526		 * the plaintext plus a version of the header where EC
1527		 * and RRC are set to zero. Also, the original EC must
1528		 * be our checksum size.
1529		 */
1530		bcopy(p, tm->m_data, 16);
1531		krb5_checksum(Kc, 0, m, 16, mlen + 16, cklen);
1532		tm->m_data += 16;
1533		tm->m_len -= 16;
1534	}
1535
1536	/*
1537	 * Finally set EC to its actual value
1538	 */
1539	p[4] = EC >> 8;
1540	p[5] = EC;
1541
1542	*mp = m;
1543	return (GSS_S_COMPLETE);
1544}
1545
1546static OM_uint32
1547krb5_wrap(gss_ctx_id_t ctx, OM_uint32 *minor_status,
1548    int conf_req_flag, gss_qop_t qop_req,
1549    struct mbuf **mp, int *conf_state)
1550{
1551	struct krb5_context *kc = (struct krb5_context *)ctx;
1552
1553	*minor_status = 0;
1554	if (conf_state)
1555		*conf_state = 0;
1556
1557	if (qop_req != GSS_C_QOP_DEFAULT)
1558		return (GSS_S_BAD_QOP);
1559
1560	if (time_uptime > kc->kc_lifetime)
1561		return (GSS_S_CONTEXT_EXPIRED);
1562
1563	switch (kc->kc_tokenkey->ks_class->ec_type) {
1564	case ETYPE_DES_CBC_CRC:
1565		return (krb5_wrap_old(kc, conf_req_flag,
1566			mp, conf_state, sgn_alg_des_md5, seal_alg_des));
1567
1568	case ETYPE_ARCFOUR_HMAC_MD5:
1569	case ETYPE_ARCFOUR_HMAC_MD5_56:
1570		return (krb5_wrap_old(kc, conf_req_flag,
1571			mp, conf_state, sgn_alg_hmac_md5, seal_alg_rc4));
1572
1573	case ETYPE_DES3_CBC_SHA1:
1574		return (krb5_wrap_old(kc, conf_req_flag,
1575			mp, conf_state, sgn_alg_des3_sha1, seal_alg_des3));
1576
1577	default:
1578		return (krb5_wrap_new(kc, conf_req_flag, mp, conf_state));
1579	}
1580
1581	return (GSS_S_FAILURE);
1582}
1583
1584static void
1585m_trim(struct mbuf *m, int len)
1586{
1587	struct mbuf *n;
1588	int off;
1589
1590	if (m == NULL)
1591		return;
1592	n = m_getptr(m, len, &off);
1593	if (n) {
1594		n->m_len = off;
1595		if (n->m_next) {
1596			m_freem(n->m_next);
1597			n->m_next = NULL;
1598		}
1599	}
1600}
1601
1602static OM_uint32
1603krb5_unwrap_old(struct krb5_context *kc, struct mbuf **mp, int *conf_state,
1604    uint8_t sgn_alg[2], uint8_t seal_alg[2])
1605{
1606	OM_uint32 res;
1607	struct mbuf *m, *mlast, *hm, *cm, *n;
1608	uint8_t *p, dir;
1609	size_t mlen, tlen, elen, datalen, padlen;
1610	size_t cklen;
1611	uint8_t buf[32];
1612	uint32_t seq;
1613	int i, conf;
1614
1615	m = *mp;
1616	mlen = m_length(m, &mlast);
1617
1618	tlen = token_length(kc->kc_tokenkey);
1619	cklen = kc->kc_tokenkey->ks_class->ec_checksumlen;
1620
1621	p = krb5_verify_token("\x02\x01", tlen, &m, &elen, TRUE);
1622	*mp = m;
1623	if (!p)
1624		return (GSS_S_DEFECTIVE_TOKEN);
1625	datalen = elen - tlen;
1626
1627	/*
1628	 * Trim the framing header first to make life a little easier
1629	 * later.
1630	 */
1631	m_adj(m, p - (uint8_t *) m->m_data);
1632
1633	/* TOK_ID */
1634	p += 2;
1635
1636	/* SGN_ALG */
1637	if (p[0] != sgn_alg[0] || p[1] != sgn_alg[1])
1638		return (GSS_S_DEFECTIVE_TOKEN);
1639	p += 2;
1640
1641	/* SEAL_ALG */
1642	if (p[0] == seal_alg[0] && p[1] == seal_alg[1])
1643		conf = 1;
1644	else if (p[0] == 0xff && p[1] == 0xff)
1645		conf = 0;
1646	else
1647		return (GSS_S_DEFECTIVE_TOKEN);
1648	p += 2;
1649
1650	if (p[0] != 0xff || p[1] != 0xff)
1651		return (GSS_S_DEFECTIVE_TOKEN);
1652	p += 2;
1653
1654	/*
1655	 * SND_SEQ:
1656	 *
1657	 * Take the four bytes of the sequence number least
1658	 * significant first (most significant for ARCFOUR) followed
1659	 * by four bytes of direction marker (zero for initiator and
1660	 * 0xff for acceptor). Encrypt that data using the SGN_CKSUM
1661	 * as IV.
1662	 */
1663	krb5_decrypt(kc->kc_tokenkey, m, 8, 8, p + 8, 8);
1664	if (sgn_alg[0] == 0x11) {
1665		seq = p[3] | (p[2] << 8) | (p[1] << 16) | (p[0] << 24);
1666	} else {
1667		seq = p[0] | (p[1] << 8) | (p[2] << 16) | (p[3] << 24);
1668	}
1669
1670	if (is_initiator(kc)) {
1671		dir = 0xff;
1672	} else {
1673		dir = 0;
1674	}
1675	if (p[4] != dir || p[5] != dir || p[6] != dir || p[7] != dir)
1676		return (GSS_S_DEFECTIVE_TOKEN);
1677
1678	if (kc->kc_msg_order.km_flags &
1679	    (GSS_C_REPLAY_FLAG | GSS_C_SEQUENCE_FLAG)) {
1680		res = krb5_sequence_check(kc, seq);
1681		if (GSS_ERROR(res))
1682			return (res);
1683	} else {
1684		res = GSS_S_COMPLETE;
1685	}
1686
1687	/*
1688	 * If the token was encrypted, decode it in-place.
1689	 */
1690	if (conf) {
1691		/*
1692		 * Decrypt the padded message with an IV of zero for
1693		 * DES and DES3 or an IV of the big-endian encoded
1694		 * sequence number for ARCFOUR.
1695		 */
1696		if (seal_alg[0] == 0x10) {
1697			krb5_decrypt(kc->kc_encryptkey, m, 16 + cklen,
1698			    datalen, p, 4);
1699		} else {
1700			krb5_decrypt(kc->kc_encryptkey, m, 16 + cklen,
1701			    datalen, NULL, 0);
1702		}
1703	}
1704	if (conf_state)
1705		*conf_state = conf;
1706
1707	/*
1708	 * Check the trailing pad bytes.
1709	 * RFC1964 specifies between 1<->8 bytes, each with a binary value
1710	 * equal to the number of bytes.
1711	 */
1712	if (mlast->m_len > 0)
1713		padlen = mlast->m_data[mlast->m_len - 1];
1714	else {
1715		n = m_getptr(m, tlen + datalen - 1, &i);
1716		/*
1717		 * When the position is exactly equal to the # of data bytes
1718		 * in the mbuf list, m_getptr() will return the last mbuf in
1719		 * the list and an off == m_len for that mbuf, so that case
1720		 * needs to be checked as well as a NULL return.
1721		 */
1722		if (n == NULL || n->m_len == i)
1723			return (GSS_S_DEFECTIVE_TOKEN);
1724		padlen = n->m_data[i];
1725	}
1726	if (padlen < 1 || padlen > 8 || padlen > tlen + datalen)
1727		return (GSS_S_DEFECTIVE_TOKEN);
1728	m_copydata(m, tlen + datalen - padlen, padlen, buf);
1729	for (i = 0; i < padlen; i++) {
1730		if (buf[i] != padlen) {
1731			return (GSS_S_DEFECTIVE_TOKEN);
1732		}
1733	}
1734
1735	/*
1736	 * SGN_CKSUM:
1737	 *
1738	 * Calculate the keyed checksum of the token header plus the
1739	 * padded message. We do a little mbuf surgery to trim out the
1740	 * parts we don't want to checksum.
1741	 */
1742	hm = m;
1743	*mp = m = m_split(m, 16 + cklen, M_WAITOK);
1744	mlast = m_last(m);
1745	hm->m_len = 8;
1746	hm->m_next = m;
1747	MGET(cm, M_WAITOK, MT_DATA);
1748	cm->m_len = cklen;
1749	mlast->m_next = cm;
1750
1751	krb5_checksum(kc->kc_checksumkey, 13, hm, 0, datalen + 8, cklen);
1752	hm->m_next = NULL;
1753	mlast->m_next = NULL;
1754
1755	if (bcmp(cm->m_data, hm->m_data + 16, cklen)) {
1756		m_freem(hm);
1757		m_free(cm);
1758		return (GSS_S_BAD_SIG);
1759	}
1760	m_freem(hm);
1761	m_free(cm);
1762
1763	/*
1764	 * Trim off the confounder and padding.
1765	 */
1766	m_adj(m, 8);
1767	if (mlast->m_len >= padlen) {
1768		mlast->m_len -= padlen;
1769	} else {
1770		m_trim(m, datalen - 8 - padlen);
1771	}
1772
1773	*mp = m;
1774	return (res);
1775}
1776
1777static OM_uint32
1778krb5_unwrap_new(struct krb5_context *kc, struct mbuf **mp, int *conf_state)
1779{
1780	OM_uint32 res;
1781	struct krb5_key_state *Ke = kc->kc_recv_seal_Ke;
1782	struct krb5_key_state *Ki = kc->kc_recv_seal_Ki;
1783	struct krb5_key_state *Kc = kc->kc_recv_seal_Kc;
1784	const struct krb5_encryption_class *ec = Ke->ks_class;
1785	struct mbuf *m, *mlast, *hm, *cm;
1786	uint8_t *p, *pp;
1787	int sealed, flags, EC, RRC;
1788	size_t blen, cklen, ctlen, mlen, plen, tlen;
1789	char buf[32], buf2[32];
1790
1791	m = *mp;
1792	mlen = m_length(m, &mlast);
1793
1794	if (mlen <= 16)
1795		return (GSS_S_DEFECTIVE_TOKEN);
1796	if (m->m_len < 16) {
1797		m = m_pullup(m, 16);
1798		*mp = m;
1799	}
1800	p = m->m_data;
1801
1802	/* TOK_ID */
1803	if (p[0] != 0x05)
1804		return (GSS_S_DEFECTIVE_TOKEN);
1805	if (p[1] != 0x04)
1806		return (GSS_S_DEFECTIVE_TOKEN);
1807
1808	/* Flags */
1809	sealed = p[2] & GSS_TOKEN_SEALED;
1810	flags = sealed;
1811	if (is_initiator(kc))
1812		flags |= GSS_TOKEN_SENT_BY_ACCEPTOR;
1813	if (kc->kc_more_flags & ACCEPTOR_SUBKEY)
1814		flags |= GSS_TOKEN_ACCEPTOR_SUBKEY;
1815	if (p[2] != flags)
1816		return (GSS_S_DEFECTIVE_TOKEN);
1817
1818	/* Filler */
1819	if (p[3] != 0xff)
1820		return (GSS_S_DEFECTIVE_TOKEN);
1821
1822	/* EC + RRC */
1823	EC = (p[4] << 8) + p[5];
1824	RRC = (p[6] << 8) + p[7];
1825
1826	/* SND_SEQ */
1827	if (kc->kc_msg_order.km_flags &
1828		(GSS_C_REPLAY_FLAG | GSS_C_SEQUENCE_FLAG)) {
1829		uint32_t seq;
1830		if (p[8] || p[9] || p[10] || p[11]) {
1831			res = GSS_S_UNSEQ_TOKEN;
1832		} else {
1833			seq = (p[12] << 24) | (p[13] << 16)
1834				| (p[14] << 8) | p[15];
1835			res = krb5_sequence_check(kc, seq);
1836		}
1837		if (GSS_ERROR(res))
1838			return (res);
1839	} else {
1840		res = GSS_S_COMPLETE;
1841	}
1842
1843	/*
1844	 * Separate the header before dealing with RRC. We only need
1845	 * to keep the header if the message isn't encrypted.
1846	 */
1847	if (sealed) {
1848		hm = NULL;
1849		m_adj(m, 16);
1850	} else {
1851		hm = m;
1852		*mp = m = m_split(m, 16, M_WAITOK);
1853		mlast = m_last(m);
1854	}
1855
1856	/*
1857	 * Undo the effects of RRC by rotating left.
1858	 */
1859	if (RRC > 0) {
1860		struct mbuf *rm;
1861		size_t rlen;
1862
1863		rlen = mlen - 16;
1864		if (RRC <= sizeof(buf) && m->m_len >= rlen) {
1865			/*
1866			 * Simple case, just rearrange the bytes in m.
1867			 */
1868			bcopy(m->m_data, buf, RRC);
1869			bcopy(m->m_data + RRC, m->m_data, rlen - RRC);
1870			bcopy(buf, m->m_data + rlen - RRC, RRC);
1871		} else {
1872			/*
1873			 * More complicated - rearrange the mbuf
1874			 * chain.
1875			 */
1876			rm = m;
1877			*mp = m = m_split(m, RRC, M_WAITOK);
1878			m_cat(m, rm);
1879			mlast = rm;
1880		}
1881	}
1882
1883	blen = ec->ec_blocklen;
1884	cklen = ec->ec_checksumlen;
1885	if (sealed) {
1886		/*
1887		 * Decrypt according to RFC 4121 section 4.2 and RFC
1888		 * 3961 section 5.3. The message must be large enough
1889		 * for a blocksize confounder, at least one block of
1890		 * cyphertext and a checksum.
1891		 */
1892		if (mlen < 16 + 2*blen + cklen)
1893			return (GSS_S_DEFECTIVE_TOKEN);
1894
1895		ctlen = mlen - 16 - cklen;
1896		krb5_decrypt(Ke, m, 0, ctlen, NULL, 0);
1897
1898		/*
1899		 * The size of the plaintext is ctlen minus blocklen
1900		 * (for the confounder), 16 (for the copy of the token
1901		 * header) and EC (for the filler). The actual
1902		 * plaintext starts after the confounder.
1903		 */
1904		plen = ctlen - blen - 16 - EC;
1905		pp = p + 16 + blen;
1906
1907		/*
1908		 * Checksum the padded plaintext.
1909		 */
1910		m_copydata(m, ctlen, cklen, buf);
1911		krb5_checksum(Ki, 0, m, 0, ctlen, cklen);
1912		m_copydata(m, ctlen, cklen, buf2);
1913
1914		if (bcmp(buf, buf2, cklen))
1915			return (GSS_S_BAD_SIG);
1916
1917		/*
1918		 * Trim the message back to just plaintext.
1919		 */
1920		m_adj(m, blen);
1921		tlen = 16 + EC + cklen;
1922		if (mlast->m_len >= tlen) {
1923			mlast->m_len -= tlen;
1924		} else {
1925			m_trim(m, plen);
1926		}
1927	} else {
1928		/*
1929		 * The plaintext message is followed by a checksum of
1930		 * the plaintext plus a version of the header where EC
1931		 * and RRC are set to zero. Also, the original EC must
1932		 * be our checksum size.
1933		 */
1934		if (mlen < 16 + cklen || EC != cklen)
1935			return (GSS_S_DEFECTIVE_TOKEN);
1936
1937		/*
1938		 * The size of the plaintext is simply the message
1939		 * size less header and checksum. The plaintext starts
1940		 * right after the header (which we have saved in hm).
1941		 */
1942		plen = mlen - 16 - cklen;
1943
1944		/*
1945		 * Insert a copy of the header (with EC and RRC set to
1946		 * zero) between the plaintext message and the
1947		 * checksum.
1948		 */
1949		p = hm->m_data;
1950		p[4] = p[5] = p[6] = p[7] = 0;
1951
1952		cm = m_split(m, plen, M_WAITOK);
1953		mlast = m_last(m);
1954		m->m_next = hm;
1955		hm->m_next = cm;
1956
1957		bcopy(cm->m_data, buf, cklen);
1958		krb5_checksum(Kc, 0, m, 0, plen + 16, cklen);
1959		if (bcmp(cm->m_data, buf, cklen))
1960			return (GSS_S_BAD_SIG);
1961
1962		/*
1963		 * The checksum matches, discard all buf the plaintext.
1964		 */
1965		mlast->m_next = NULL;
1966		m_freem(hm);
1967	}
1968
1969	if (conf_state)
1970		*conf_state = (sealed != 0);
1971
1972	return (res);
1973}
1974
1975static OM_uint32
1976krb5_unwrap(gss_ctx_id_t ctx, OM_uint32 *minor_status,
1977    struct mbuf **mp, int *conf_state, gss_qop_t *qop_state)
1978{
1979	struct krb5_context *kc = (struct krb5_context *)ctx;
1980	OM_uint32 maj_stat;
1981
1982	*minor_status = 0;
1983	if (qop_state)
1984		*qop_state = GSS_C_QOP_DEFAULT;
1985	if (conf_state)
1986		*conf_state = 0;
1987
1988	if (time_uptime > kc->kc_lifetime)
1989		return (GSS_S_CONTEXT_EXPIRED);
1990
1991	switch (kc->kc_tokenkey->ks_class->ec_type) {
1992	case ETYPE_DES_CBC_CRC:
1993		maj_stat = krb5_unwrap_old(kc, mp, conf_state,
1994			sgn_alg_des_md5, seal_alg_des);
1995		break;
1996
1997	case ETYPE_ARCFOUR_HMAC_MD5:
1998	case ETYPE_ARCFOUR_HMAC_MD5_56:
1999		maj_stat = krb5_unwrap_old(kc, mp, conf_state,
2000			sgn_alg_hmac_md5, seal_alg_rc4);
2001		break;
2002
2003	case ETYPE_DES3_CBC_SHA1:
2004		maj_stat = krb5_unwrap_old(kc, mp, conf_state,
2005			sgn_alg_des3_sha1, seal_alg_des3);
2006		break;
2007
2008	default:
2009		maj_stat = krb5_unwrap_new(kc, mp, conf_state);
2010		break;
2011	}
2012
2013	if (GSS_ERROR(maj_stat)) {
2014		m_freem(*mp);
2015		*mp = NULL;
2016	}
2017
2018	return (maj_stat);
2019}
2020
2021static OM_uint32
2022krb5_wrap_size_limit(gss_ctx_id_t ctx, OM_uint32 *minor_status,
2023    int conf_req_flag, gss_qop_t qop_req, OM_uint32 req_output_size,
2024    OM_uint32 *max_input_size)
2025{
2026	struct krb5_context *kc = (struct krb5_context *)ctx;
2027	const struct krb5_encryption_class *ec;
2028	OM_uint32 overhead;
2029
2030	*minor_status = 0;
2031	*max_input_size = 0;
2032
2033	if (qop_req != GSS_C_QOP_DEFAULT)
2034		return (GSS_S_BAD_QOP);
2035
2036	ec = kc->kc_tokenkey->ks_class;
2037	switch (ec->ec_type) {
2038	case ETYPE_DES_CBC_CRC:
2039	case ETYPE_DES3_CBC_SHA1:
2040	case ETYPE_ARCFOUR_HMAC_MD5:
2041	case ETYPE_ARCFOUR_HMAC_MD5_56:
2042		/*
2043		 * up to 5 bytes for [APPLICATION 0] SEQUENCE
2044		 * 2 + krb5 oid length
2045		 * 8 bytes of header
2046		 * 8 bytes of confounder
2047		 * maximum of 8 bytes of padding
2048		 * checksum
2049		 */
2050		overhead = 5 + 2 + krb5_mech_oid.length;
2051		overhead += 8 + 8 + ec->ec_msgblocklen;
2052		overhead += ec->ec_checksumlen;
2053		break;
2054
2055	default:
2056		if (conf_req_flag) {
2057			/*
2058			 * 16 byts of header
2059			 * blocklen bytes of confounder
2060			 * up to msgblocklen - 1 bytes of padding
2061			 * 16 bytes for copy of header
2062			 * checksum
2063			 */
2064			overhead = 16 + ec->ec_blocklen;
2065			overhead += ec->ec_msgblocklen - 1;
2066			overhead += 16;
2067			overhead += ec->ec_checksumlen;
2068		} else {
2069			/*
2070			 * 16 bytes of header plus checksum.
2071			 */
2072			overhead = 16 + ec->ec_checksumlen;
2073		}
2074	}
2075
2076	*max_input_size = req_output_size - overhead;
2077
2078	return (GSS_S_COMPLETE);
2079}
2080
2081static kobj_method_t krb5_methods[] = {
2082	KOBJMETHOD(kgss_init,		krb5_init),
2083	KOBJMETHOD(kgss_import,		krb5_import),
2084	KOBJMETHOD(kgss_delete,		krb5_delete),
2085	KOBJMETHOD(kgss_mech_type,	krb5_mech_type),
2086	KOBJMETHOD(kgss_get_mic,	krb5_get_mic),
2087	KOBJMETHOD(kgss_verify_mic,	krb5_verify_mic),
2088	KOBJMETHOD(kgss_wrap,		krb5_wrap),
2089	KOBJMETHOD(kgss_unwrap,		krb5_unwrap),
2090	KOBJMETHOD(kgss_wrap_size_limit, krb5_wrap_size_limit),
2091	{ 0, 0 }
2092};
2093
2094static struct kobj_class krb5_class = {
2095	"kerberosv5",
2096	krb5_methods,
2097	sizeof(struct krb5_context)
2098};
2099
2100/*
2101 * Kernel module glue
2102 */
2103static int
2104kgssapi_krb5_modevent(module_t mod, int type, void *data)
2105{
2106
2107	switch (type) {
2108	case MOD_LOAD:
2109		kgss_install_mech(&krb5_mech_oid, "kerberosv5", &krb5_class);
2110		break;
2111
2112	case MOD_UNLOAD:
2113		kgss_uninstall_mech(&krb5_mech_oid);
2114		break;
2115	}
2116
2117
2118	return (0);
2119}
2120static moduledata_t kgssapi_krb5_mod = {
2121	"kgssapi_krb5",
2122	kgssapi_krb5_modevent,
2123	NULL,
2124};
2125DECLARE_MODULE(kgssapi_krb5, kgssapi_krb5_mod, SI_SUB_VFS, SI_ORDER_ANY);
2126MODULE_DEPEND(kgssapi_krb5, kgssapi, 1, 1, 1);
2127MODULE_DEPEND(kgssapi_krb5, crypto, 1, 1, 1);
2128MODULE_DEPEND(kgssapi_krb5, rc4, 1, 1, 1);
2129MODULE_VERSION(kgssapi_krb5, 1);
2130