1/*-
2 * Copyright (c) 2008 Isilon Inc http://www.isilon.com/
3 * Authors: Doug Rabson <dfr@rabson.org>
4 * Developed with Red Inc: Alfred Perlstein <alfred@freebsd.org>
5 *
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
8 * are met:
9 * 1. Redistributions of source code must retain the above copyright
10 *    notice, this list of conditions and the following disclaimer.
11 * 2. Redistributions in binary form must reproduce the above copyright
12 *    notice, this list of conditions and the following disclaimer in the
13 *    documentation and/or other materials provided with the distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18 * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25 * SUCH DAMAGE.
26 */
27
28#include <sys/cdefs.h>
29__FBSDID("$FreeBSD$");
30
31#include "opt_inet6.h"
32
33#include <sys/param.h>
34#include <sys/kernel.h>
35#include <sys/kobj.h>
36#include <sys/lock.h>
37#include <sys/malloc.h>
38#include <sys/mbuf.h>
39#include <sys/module.h>
40#include <sys/mutex.h>
41#include <kgssapi/gssapi.h>
42#include <kgssapi/gssapi_impl.h>
43
44#include "kgss_if.h"
45#include "kcrypto.h"
46
47#define GSS_TOKEN_SENT_BY_ACCEPTOR	1
48#define GSS_TOKEN_SEALED		2
49#define GSS_TOKEN_ACCEPTOR_SUBKEY	4
50
51static gss_OID_desc krb5_mech_oid =
52{9, (void *) "\x2a\x86\x48\x86\xf7\x12\x01\x02\x02" };
53
54struct krb5_data {
55	size_t		kd_length;
56	void		*kd_data;
57};
58
59struct krb5_keyblock {
60	uint16_t	kk_type; /* encryption type */
61	struct krb5_data kk_key; /* key data */
62};
63
64struct krb5_address {
65	uint16_t	ka_type;
66	struct krb5_data ka_addr;
67};
68
69/*
70 * The km_elem array is ordered so that the highest received sequence
71 * number is listed first.
72 */
73struct krb5_msg_order {
74	uint32_t		km_flags;
75	uint32_t		km_start;
76	uint32_t		km_length;
77	uint32_t		km_jitter_window;
78	uint32_t		km_first_seq;
79	uint32_t		*km_elem;
80};
81
82struct krb5_context {
83	struct _gss_ctx_id_t	kc_common;
84	struct mtx		kc_lock;
85	uint32_t		kc_ac_flags;
86	uint32_t		kc_ctx_flags;
87	uint32_t		kc_more_flags;
88#define LOCAL			1
89#define OPEN			2
90#define COMPAT_OLD_DES3		4
91#define COMPAT_OLD_DES3_SELECTED 8
92#define ACCEPTOR_SUBKEY		16
93	struct krb5_address	kc_local_address;
94	struct krb5_address	kc_remote_address;
95	uint16_t		kc_local_port;
96	uint16_t		kc_remote_port;
97	struct krb5_keyblock	kc_keyblock;
98	struct krb5_keyblock	kc_local_subkey;
99	struct krb5_keyblock	kc_remote_subkey;
100	volatile uint32_t	kc_local_seqnumber;
101	uint32_t		kc_remote_seqnumber;
102	uint32_t		kc_keytype;
103	uint32_t		kc_cksumtype;
104	struct krb5_data	kc_source_name;
105	struct krb5_data	kc_target_name;
106	uint32_t		kc_lifetime;
107	struct krb5_msg_order	kc_msg_order;
108	struct krb5_key_state	*kc_tokenkey;
109	struct krb5_key_state	*kc_encryptkey;
110	struct krb5_key_state	*kc_checksumkey;
111
112	struct krb5_key_state	*kc_send_seal_Ke;
113	struct krb5_key_state	*kc_send_seal_Ki;
114	struct krb5_key_state	*kc_send_seal_Kc;
115	struct krb5_key_state	*kc_send_sign_Kc;
116
117	struct krb5_key_state	*kc_recv_seal_Ke;
118	struct krb5_key_state	*kc_recv_seal_Ki;
119	struct krb5_key_state	*kc_recv_seal_Kc;
120	struct krb5_key_state	*kc_recv_sign_Kc;
121};
122
123static uint16_t
124get_uint16(const uint8_t **pp, size_t *lenp)
125{
126	const uint8_t *p = *pp;
127	uint16_t v;
128
129	if (*lenp < 2)
130		return (0);
131
132	v = (p[0] << 8) | p[1];
133	*pp = p + 2;
134	*lenp = *lenp - 2;
135
136	return (v);
137}
138
139static uint32_t
140get_uint32(const uint8_t **pp, size_t *lenp)
141{
142	const uint8_t *p = *pp;
143	uint32_t v;
144
145	if (*lenp < 4)
146		return (0);
147
148	v = (p[0] << 24) | (p[1] << 16) | (p[2] << 8) | p[3];
149	*pp = p + 4;
150	*lenp = *lenp - 4;
151
152	return (v);
153}
154
155static void
156get_data(const uint8_t **pp, size_t *lenp, struct krb5_data *dp)
157{
158	size_t sz = get_uint32(pp, lenp);
159
160	dp->kd_length = sz;
161	dp->kd_data = malloc(sz, M_GSSAPI, M_WAITOK);
162
163	if (*lenp < sz)
164		sz = *lenp;
165	bcopy(*pp, dp->kd_data, sz);
166	(*pp) += sz;
167	(*lenp) -= sz;
168}
169
170static void
171delete_data(struct krb5_data *dp)
172{
173	if (dp->kd_data) {
174		free(dp->kd_data, M_GSSAPI);
175		dp->kd_length = 0;
176		dp->kd_data = NULL;
177	}
178}
179
180static void
181get_address(const uint8_t **pp, size_t *lenp, struct krb5_address *ka)
182{
183
184	ka->ka_type = get_uint16(pp, lenp);
185	get_data(pp, lenp, &ka->ka_addr);
186}
187
188static void
189delete_address(struct krb5_address *ka)
190{
191	delete_data(&ka->ka_addr);
192}
193
194static void
195get_keyblock(const uint8_t **pp, size_t *lenp, struct krb5_keyblock *kk)
196{
197
198	kk->kk_type = get_uint16(pp, lenp);
199	get_data(pp, lenp, &kk->kk_key);
200}
201
202static void
203delete_keyblock(struct krb5_keyblock *kk)
204{
205	if (kk->kk_key.kd_data)
206		bzero(kk->kk_key.kd_data, kk->kk_key.kd_length);
207	delete_data(&kk->kk_key);
208}
209
210static void
211copy_key(struct krb5_keyblock *from, struct krb5_keyblock **to)
212{
213
214	if (from->kk_key.kd_length)
215		*to = from;
216	else
217		*to = NULL;
218}
219
220/*
221 * Return non-zero if we are initiator.
222 */
223static __inline int
224is_initiator(struct krb5_context *kc)
225{
226	return (kc->kc_more_flags & LOCAL);
227}
228
229/*
230 * Return non-zero if we are acceptor.
231 */
232static __inline int
233is_acceptor(struct krb5_context *kc)
234{
235	return !(kc->kc_more_flags & LOCAL);
236}
237
238static void
239get_initiator_subkey(struct krb5_context *kc, struct krb5_keyblock **kdp)
240{
241
242	if (is_initiator(kc))
243		copy_key(&kc->kc_local_subkey, kdp);
244	else
245		copy_key(&kc->kc_remote_subkey, kdp);
246	if (!*kdp)
247		copy_key(&kc->kc_keyblock, kdp);
248}
249
250static void
251get_acceptor_subkey(struct krb5_context *kc, struct krb5_keyblock **kdp)
252{
253
254	if (is_initiator(kc))
255		copy_key(&kc->kc_remote_subkey, kdp);
256	else
257		copy_key(&kc->kc_local_subkey, kdp);
258}
259
260static OM_uint32
261get_keys(struct krb5_context *kc)
262{
263	struct krb5_keyblock *keydata;
264	struct krb5_encryption_class *ec;
265	struct krb5_key_state *key;
266	int etype;
267
268	keydata = NULL;
269	get_acceptor_subkey(kc, &keydata);
270	if (!keydata)
271		if ((kc->kc_more_flags & ACCEPTOR_SUBKEY) == 0)
272			get_initiator_subkey(kc, &keydata);
273	if (!keydata)
274		return (GSS_S_FAILURE);
275
276	/*
277	 * GSS-API treats all DES etypes the same and all DES3 etypes
278	 * the same.
279	 */
280	switch (keydata->kk_type) {
281	case ETYPE_DES_CBC_CRC:
282	case ETYPE_DES_CBC_MD4:
283	case ETYPE_DES_CBC_MD5:
284		etype = ETYPE_DES_CBC_CRC;
285		break;
286
287	case ETYPE_DES3_CBC_MD5:
288	case ETYPE_DES3_CBC_SHA1:
289	case ETYPE_OLD_DES3_CBC_SHA1:
290		etype = ETYPE_DES3_CBC_SHA1;
291		break;
292
293	default:
294		etype = keydata->kk_type;
295	}
296
297	ec = krb5_find_encryption_class(etype);
298	if (!ec)
299		return (GSS_S_FAILURE);
300
301	key = krb5_create_key(ec);
302	krb5_set_key(key, keydata->kk_key.kd_data);
303	kc->kc_tokenkey = key;
304
305	switch (etype) {
306	case ETYPE_DES_CBC_CRC:
307	case ETYPE_ARCFOUR_HMAC_MD5:
308	case ETYPE_ARCFOUR_HMAC_MD5_56: {
309		/*
310		 * Single DES and ARCFOUR uses a 'derived' key (XOR
311		 * with 0xf0) for encrypting wrap tokens. The original
312		 * key is used for checksums and sequence numbers.
313		 */
314		struct krb5_key_state *ekey;
315		uint8_t *ekp, *kp;
316		int i;
317
318		ekey = krb5_create_key(ec);
319		ekp = ekey->ks_key;
320		kp = key->ks_key;
321		for (i = 0; i < ec->ec_keylen; i++)
322			ekp[i] = kp[i] ^ 0xf0;
323		krb5_set_key(ekey, ekp);
324		kc->kc_encryptkey = ekey;
325		refcount_acquire(&key->ks_refs);
326		kc->kc_checksumkey = key;
327		break;
328	}
329
330	case ETYPE_DES3_CBC_SHA1:
331		/*
332		 * Triple DES uses a RFC 3961 style derived key with
333		 * usage number KG_USAGE_SIGN for checksums. The
334		 * original key is used for encryption and sequence
335		 * numbers.
336		 */
337		kc->kc_checksumkey = krb5_get_checksum_key(key, KG_USAGE_SIGN);
338		refcount_acquire(&key->ks_refs);
339		kc->kc_encryptkey = key;
340		break;
341
342	default:
343		/*
344		 * We need eight derived keys four for sending and
345		 * four for receiving.
346		 */
347		if (is_initiator(kc)) {
348			/*
349			 * We are initiator.
350			 */
351			kc->kc_send_seal_Ke = krb5_get_encryption_key(key,
352			    KG_USAGE_INITIATOR_SEAL);
353			kc->kc_send_seal_Ki = krb5_get_integrity_key(key,
354			    KG_USAGE_INITIATOR_SEAL);
355			kc->kc_send_seal_Kc = krb5_get_checksum_key(key,
356			    KG_USAGE_INITIATOR_SEAL);
357			kc->kc_send_sign_Kc = krb5_get_checksum_key(key,
358			    KG_USAGE_INITIATOR_SIGN);
359
360			kc->kc_recv_seal_Ke = krb5_get_encryption_key(key,
361			    KG_USAGE_ACCEPTOR_SEAL);
362			kc->kc_recv_seal_Ki = krb5_get_integrity_key(key,
363			    KG_USAGE_ACCEPTOR_SEAL);
364			kc->kc_recv_seal_Kc = krb5_get_checksum_key(key,
365			    KG_USAGE_ACCEPTOR_SEAL);
366			kc->kc_recv_sign_Kc = krb5_get_checksum_key(key,
367			    KG_USAGE_ACCEPTOR_SIGN);
368		} else {
369			/*
370			 * We are acceptor.
371			 */
372			kc->kc_send_seal_Ke = krb5_get_encryption_key(key,
373			    KG_USAGE_ACCEPTOR_SEAL);
374			kc->kc_send_seal_Ki = krb5_get_integrity_key(key,
375			    KG_USAGE_ACCEPTOR_SEAL);
376			kc->kc_send_seal_Kc = krb5_get_checksum_key(key,
377			    KG_USAGE_ACCEPTOR_SEAL);
378			kc->kc_send_sign_Kc = krb5_get_checksum_key(key,
379			    KG_USAGE_ACCEPTOR_SIGN);
380
381			kc->kc_recv_seal_Ke = krb5_get_encryption_key(key,
382			    KG_USAGE_INITIATOR_SEAL);
383			kc->kc_recv_seal_Ki = krb5_get_integrity_key(key,
384			    KG_USAGE_INITIATOR_SEAL);
385			kc->kc_recv_seal_Kc = krb5_get_checksum_key(key,
386			    KG_USAGE_INITIATOR_SEAL);
387			kc->kc_recv_sign_Kc = krb5_get_checksum_key(key,
388			    KG_USAGE_INITIATOR_SIGN);
389		}
390		break;
391	}
392
393	return (GSS_S_COMPLETE);
394}
395
396static void
397krb5_init(gss_ctx_id_t ctx)
398{
399	struct krb5_context *kc = (struct krb5_context *)ctx;
400
401	mtx_init(&kc->kc_lock, "krb5 gss lock", NULL, MTX_DEF);
402}
403
404static OM_uint32
405krb5_import(gss_ctx_id_t ctx,
406    enum sec_context_format format,
407    const gss_buffer_t context_token)
408{
409	struct krb5_context *kc = (struct krb5_context *)ctx;
410	OM_uint32 res;
411	const uint8_t *p = (const uint8_t *) context_token->value;
412	size_t len = context_token->length;
413	uint32_t flags;
414	int i;
415
416	/*
417	 * We support heimdal 0.6 and heimdal 1.1
418	 */
419	if (format != KGSS_HEIMDAL_0_6 && format != KGSS_HEIMDAL_1_1)
420		return (GSS_S_DEFECTIVE_TOKEN);
421
422#define SC_LOCAL_ADDRESS	1
423#define SC_REMOTE_ADDRESS	2
424#define SC_KEYBLOCK		4
425#define SC_LOCAL_SUBKEY		8
426#define SC_REMOTE_SUBKEY	16
427
428	/*
429	 * Ensure that the token starts with krb5 oid.
430	 */
431	if (p[0] != 0x00 || p[1] != krb5_mech_oid.length
432	    || len < krb5_mech_oid.length + 2
433	    || bcmp(krb5_mech_oid.elements, p + 2,
434		krb5_mech_oid.length))
435		return (GSS_S_DEFECTIVE_TOKEN);
436	p += krb5_mech_oid.length + 2;
437	len -= krb5_mech_oid.length + 2;
438
439	flags = get_uint32(&p, &len);
440	kc->kc_ac_flags = get_uint32(&p, &len);
441	if (flags & SC_LOCAL_ADDRESS)
442		get_address(&p, &len, &kc->kc_local_address);
443	if (flags & SC_REMOTE_ADDRESS)
444		get_address(&p, &len, &kc->kc_remote_address);
445	kc->kc_local_port = get_uint16(&p, &len);
446	kc->kc_remote_port = get_uint16(&p, &len);
447	if (flags & SC_KEYBLOCK)
448		get_keyblock(&p, &len, &kc->kc_keyblock);
449	if (flags & SC_LOCAL_SUBKEY)
450		get_keyblock(&p, &len, &kc->kc_local_subkey);
451	if (flags & SC_REMOTE_SUBKEY)
452		get_keyblock(&p, &len, &kc->kc_remote_subkey);
453	kc->kc_local_seqnumber = get_uint32(&p, &len);
454	kc->kc_remote_seqnumber = get_uint32(&p, &len);
455	kc->kc_keytype = get_uint32(&p, &len);
456	kc->kc_cksumtype = get_uint32(&p, &len);
457	get_data(&p, &len, &kc->kc_source_name);
458	get_data(&p, &len, &kc->kc_target_name);
459	kc->kc_ctx_flags = get_uint32(&p, &len);
460	kc->kc_more_flags = get_uint32(&p, &len);
461	kc->kc_lifetime = get_uint32(&p, &len);
462	/*
463	 * Heimdal 1.1 adds the message order stuff.
464	 */
465	if (format == KGSS_HEIMDAL_1_1) {
466		kc->kc_msg_order.km_flags = get_uint32(&p, &len);
467		kc->kc_msg_order.km_start = get_uint32(&p, &len);
468		kc->kc_msg_order.km_length = get_uint32(&p, &len);
469		kc->kc_msg_order.km_jitter_window = get_uint32(&p, &len);
470		kc->kc_msg_order.km_first_seq = get_uint32(&p, &len);
471		kc->kc_msg_order.km_elem =
472			malloc(kc->kc_msg_order.km_jitter_window * sizeof(uint32_t),
473			    M_GSSAPI, M_WAITOK);
474		for (i = 0; i < kc->kc_msg_order.km_jitter_window; i++)
475			kc->kc_msg_order.km_elem[i] = get_uint32(&p, &len);
476	} else {
477		kc->kc_msg_order.km_flags = 0;
478	}
479
480	res = get_keys(kc);
481	if (GSS_ERROR(res))
482		return (res);
483
484	/*
485	 * We don't need these anymore.
486	 */
487	delete_keyblock(&kc->kc_keyblock);
488	delete_keyblock(&kc->kc_local_subkey);
489	delete_keyblock(&kc->kc_remote_subkey);
490
491	return (GSS_S_COMPLETE);
492}
493
494static void
495krb5_delete(gss_ctx_id_t ctx, gss_buffer_t output_token)
496{
497	struct krb5_context *kc = (struct krb5_context *)ctx;
498
499	delete_address(&kc->kc_local_address);
500	delete_address(&kc->kc_remote_address);
501	delete_keyblock(&kc->kc_keyblock);
502	delete_keyblock(&kc->kc_local_subkey);
503	delete_keyblock(&kc->kc_remote_subkey);
504	delete_data(&kc->kc_source_name);
505	delete_data(&kc->kc_target_name);
506	if (kc->kc_msg_order.km_elem)
507		free(kc->kc_msg_order.km_elem, M_GSSAPI);
508	if (output_token) {
509		output_token->length = 0;
510		output_token->value = NULL;
511	}
512	if (kc->kc_tokenkey) {
513		krb5_free_key(kc->kc_tokenkey);
514		if (kc->kc_encryptkey) {
515			krb5_free_key(kc->kc_encryptkey);
516			krb5_free_key(kc->kc_checksumkey);
517		} else {
518			krb5_free_key(kc->kc_send_seal_Ke);
519			krb5_free_key(kc->kc_send_seal_Ki);
520			krb5_free_key(kc->kc_send_seal_Kc);
521			krb5_free_key(kc->kc_send_sign_Kc);
522			krb5_free_key(kc->kc_recv_seal_Ke);
523			krb5_free_key(kc->kc_recv_seal_Ki);
524			krb5_free_key(kc->kc_recv_seal_Kc);
525			krb5_free_key(kc->kc_recv_sign_Kc);
526		}
527	}
528	mtx_destroy(&kc->kc_lock);
529}
530
531static gss_OID
532krb5_mech_type(gss_ctx_id_t ctx)
533{
534
535	return (&krb5_mech_oid);
536}
537
538/*
539 * Make a token with the given type and length (the length includes
540 * the TOK_ID), initialising the token header appropriately. Return a
541 * pointer to the TOK_ID of the token.  A new mbuf is allocated with
542 * the framing header plus hlen bytes of space.
543 *
544 * Format is as follows:
545 *
546 *	0x60			[APPLICATION 0] SEQUENCE
547 *	DER encoded length	length of oid + type + inner token length
548 *	0x06 NN <oid data>	OID of mechanism type
549 *	TT TT			TOK_ID
550 *	<inner token>		data for inner token
551 *
552 * 1:		der encoded length
553 */
554static void *
555krb5_make_token(char tok_id[2], size_t hlen, size_t len, struct mbuf **mp)
556{
557	size_t inside_len, len_len, tlen;
558	gss_OID oid = &krb5_mech_oid;
559	struct mbuf *m;
560	uint8_t *p;
561
562	inside_len = 2 + oid->length + len;
563	if (inside_len < 128)
564		len_len = 1;
565	else if (inside_len < 0x100)
566		len_len = 2;
567	else if (inside_len < 0x10000)
568		len_len = 3;
569	else if (inside_len < 0x1000000)
570		len_len = 4;
571	else
572		len_len = 5;
573
574	tlen = 1 + len_len + 2 + oid->length + hlen;
575	KASSERT(tlen <= MLEN, ("token head too large"));
576	MGET(m, M_WAITOK, MT_DATA);
577	M_ALIGN(m, tlen);
578	m->m_len = tlen;
579
580	p = (uint8_t *) m->m_data;
581	*p++ = 0x60;
582	switch (len_len) {
583	case 1:
584		*p++ = inside_len;
585		break;
586	case 2:
587		*p++ = 0x81;
588		*p++ = inside_len;
589		break;
590	case 3:
591		*p++ = 0x82;
592		*p++ = inside_len >> 8;
593		*p++ = inside_len;
594		break;
595	case 4:
596		*p++ = 0x83;
597		*p++ = inside_len >> 16;
598		*p++ = inside_len >> 8;
599		*p++ = inside_len;
600		break;
601	case 5:
602		*p++ = 0x84;
603		*p++ = inside_len >> 24;
604		*p++ = inside_len >> 16;
605		*p++ = inside_len >> 8;
606		*p++ = inside_len;
607		break;
608	}
609
610	*p++ = 0x06;
611	*p++ = oid->length;
612	bcopy(oid->elements, p, oid->length);
613	p += oid->length;
614
615	p[0] = tok_id[0];
616	p[1] = tok_id[1];
617
618	*mp = m;
619
620	return (p);
621}
622
623/*
624 * Verify a token, checking the inner token length and mechanism oid.
625 * pointer to the first byte of the TOK_ID. The length of the
626 * encapsulated data is checked to be at least len bytes; the actual
627 * length of the encapsulated data (including TOK_ID) is returned in
628 * *encap_len.
629 *
630 * If can_pullup is TRUE and the token header is fragmented, we will
631 * rearrange it.
632 *
633 * Format is as follows:
634 *
635 *	0x60			[APPLICATION 0] SEQUENCE
636 *	DER encoded length	length of oid + type + inner token length
637 *	0x06 NN <oid data>	OID of mechanism type
638 *	TT TT			TOK_ID
639 *	<inner token>		data for inner token
640 *
641 * 1:		der encoded length
642 */
643static void *
644krb5_verify_token(char tok_id[2], size_t len, struct mbuf **mp,
645    size_t *encap_len, bool_t can_pullup)
646{
647	struct mbuf *m;
648	size_t tlen, hlen, len_len, inside_len;
649	gss_OID oid = &krb5_mech_oid;
650	uint8_t *p;
651
652	m = *mp;
653	tlen = m_length(m, NULL);
654	if (tlen < 2)
655		return (NULL);
656
657	/*
658	 * Ensure that at least the framing part of the token is
659	 * contigous.
660	 */
661	if (m->m_len < 2) {
662		if (can_pullup)
663			*mp = m = m_pullup(m, 2);
664		else
665			return (NULL);
666	}
667
668	p = m->m_data;
669
670	if (*p++ != 0x60)
671		return (NULL);
672
673	if (*p < 0x80) {
674		inside_len = *p++;
675		len_len = 1;
676	} else {
677		/*
678		 * Ensure there is enough space for the DER encoded length.
679		 */
680		len_len = (*p & 0x7f) + 1;
681		if (tlen < len_len + 1)
682			return (NULL);
683		if (m->m_len < len_len + 1) {
684			if (can_pullup)
685				*mp = m = m_pullup(m, len_len + 1);
686			else
687				return (NULL);
688			p = m->m_data + 1;
689		}
690
691		switch (*p++) {
692		case 0x81:
693			inside_len = *p++;
694			break;
695
696		case 0x82:
697			inside_len = (p[0] << 8) | p[1];
698			p += 2;
699			break;
700
701		case 0x83:
702			inside_len = (p[0] << 16) | (p[1] << 8) | p[2];
703			p += 3;
704			break;
705
706		case 0x84:
707			inside_len = (p[0] << 24) | (p[1] << 16)
708				| (p[2] << 8) | p[3];
709			p += 4;
710			break;
711
712		default:
713			return (NULL);
714		}
715	}
716
717	if (tlen != inside_len + len_len + 1)
718		return (NULL);
719	if (inside_len < 2 + oid->length + len)
720		return (NULL);
721
722	/*
723	 * Now that we know the value of len_len, we can pullup the
724	 * whole header. The header is 1 + len_len + 2 + oid->length +
725	 * len bytes.
726	 */
727	hlen = 1 + len_len + 2 + oid->length + len;
728	if (m->m_len < hlen) {
729		if (can_pullup)
730			*mp = m = m_pullup(m, hlen);
731		else
732			return (NULL);
733		p = m->m_data + 1 + len_len;
734	}
735
736	if (*p++ != 0x06)
737		return (NULL);
738	if (*p++ != oid->length)
739		return (NULL);
740	if (bcmp(oid->elements, p, oid->length))
741		return (NULL);
742	p += oid->length;
743
744	if (p[0] != tok_id[0])
745		return (NULL);
746
747	if (p[1] != tok_id[1])
748		return (NULL);
749
750	*encap_len = inside_len - 2 - oid->length;
751
752	return (p);
753}
754
755static void
756krb5_insert_seq(struct krb5_msg_order *mo, uint32_t seq, int index)
757{
758	int i;
759
760	if (mo->km_length < mo->km_jitter_window)
761		mo->km_length++;
762
763	for (i = mo->km_length - 1; i > index; i--)
764		mo->km_elem[i] = mo->km_elem[i - 1];
765	mo->km_elem[index] = seq;
766}
767
768/*
769 * Check sequence numbers according to RFC 2743 section 1.2.3.
770 */
771static OM_uint32
772krb5_sequence_check(struct krb5_context *kc, uint32_t seq)
773{
774	OM_uint32 res = GSS_S_FAILURE;
775	struct krb5_msg_order *mo = &kc->kc_msg_order;
776	int check_sequence = mo->km_flags & GSS_C_SEQUENCE_FLAG;
777	int check_replay = mo->km_flags & GSS_C_REPLAY_FLAG;
778	int i;
779
780	mtx_lock(&kc->kc_lock);
781
782	/*
783	 * Message is in-sequence with no gap.
784	 */
785	if (mo->km_length == 0 || seq == mo->km_elem[0] + 1) {
786		/*
787		 * This message is received in-sequence with no gaps.
788		 */
789		krb5_insert_seq(mo, seq, 0);
790		res = GSS_S_COMPLETE;
791		goto out;
792	}
793
794	if (seq > mo->km_elem[0]) {
795		/*
796		 * This message is received in-sequence with a gap.
797		 */
798		krb5_insert_seq(mo, seq, 0);
799		if (check_sequence)
800			res = GSS_S_GAP_TOKEN;
801		else
802			res = GSS_S_COMPLETE;
803		goto out;
804	}
805
806	if (seq < mo->km_elem[mo->km_length - 1]) {
807		if (check_replay && !check_sequence)
808			res = GSS_S_OLD_TOKEN;
809		else
810			res = GSS_S_UNSEQ_TOKEN;
811		goto out;
812	}
813
814	for (i = 0; i < mo->km_length; i++) {
815		if (mo->km_elem[i] == seq) {
816			res = GSS_S_DUPLICATE_TOKEN;
817			goto out;
818		}
819		if (mo->km_elem[i] < seq) {
820			/*
821			 * We need to insert this seq here,
822			 */
823			krb5_insert_seq(mo, seq, i);
824			if (check_replay && !check_sequence)
825				res = GSS_S_COMPLETE;
826			else
827				res = GSS_S_UNSEQ_TOKEN;
828			goto out;
829		}
830	}
831
832out:
833	mtx_unlock(&kc->kc_lock);
834
835	return (res);
836}
837
838static uint8_t sgn_alg_des_md5[] = { 0x00, 0x00 };
839static uint8_t seal_alg_des[] = { 0x00, 0x00 };
840static uint8_t sgn_alg_des3_sha1[] = { 0x04, 0x00 };
841static uint8_t seal_alg_des3[] = { 0x02, 0x00 };
842static uint8_t seal_alg_rc4[] = { 0x10, 0x00 };
843static uint8_t sgn_alg_hmac_md5[] = { 0x11, 0x00 };
844
845/*
846 * Return the size of the inner token given the use of the key's
847 * encryption class. For wrap tokens, the length of the padded
848 * plaintext will be added to this.
849 */
850static size_t
851token_length(struct krb5_key_state *key)
852{
853
854	return (16 + key->ks_class->ec_checksumlen);
855}
856
857static OM_uint32
858krb5_get_mic_old(struct krb5_context *kc, struct mbuf *m,
859    struct mbuf **micp, uint8_t sgn_alg[2])
860{
861	struct mbuf *mlast, *mic, *tm;
862	uint8_t *p, dir;
863	size_t tlen, mlen, cklen;
864	uint32_t seq;
865	char buf[8];
866
867	mlen = m_length(m, &mlast);
868
869	tlen = token_length(kc->kc_tokenkey);
870	p = krb5_make_token("\x01\x01", tlen, tlen, &mic);
871	p += 2;			/* TOK_ID */
872	*p++ = sgn_alg[0];	/* SGN_ALG */
873	*p++ = sgn_alg[1];
874
875	*p++ = 0xff;		/* filler */
876	*p++ = 0xff;
877	*p++ = 0xff;
878	*p++ = 0xff;
879
880	/*
881	 * SGN_CKSUM:
882	 *
883	 * Calculate the keyed checksum of the token header plus the
884	 * message.
885	 */
886	cklen = kc->kc_checksumkey->ks_class->ec_checksumlen;
887
888	mic->m_len = p - (uint8_t *) mic->m_data;
889	mic->m_next = m;
890	MGET(tm, M_WAITOK, MT_DATA);
891	tm->m_len = cklen;
892	mlast->m_next = tm;
893
894	krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8,
895	    8 + mlen, cklen);
896	bcopy(tm->m_data, p + 8, cklen);
897	mic->m_next = NULL;
898	mlast->m_next = NULL;
899	m_free(tm);
900
901	/*
902	 * SND_SEQ:
903	 *
904	 * Take the four bytes of the sequence number least
905	 * significant first followed by four bytes of direction
906	 * marker (zero for initiator and 0xff for acceptor). Encrypt
907	 * that data using the SGN_CKSUM as IV. Note: ARC4 wants the
908	 * sequence number big-endian.
909	 */
910	seq = atomic_fetchadd_32(&kc->kc_local_seqnumber, 1);
911	if (sgn_alg[0] == 0x11) {
912		p[0] = (seq >> 24);
913		p[1] = (seq >> 16);
914		p[2] = (seq >> 8);
915		p[3] = (seq >> 0);
916	} else {
917		p[0] = (seq >> 0);
918		p[1] = (seq >> 8);
919		p[2] = (seq >> 16);
920		p[3] = (seq >> 24);
921	}
922	if (is_initiator(kc)) {
923		dir = 0;
924	} else {
925		dir = 0xff;
926	}
927	p[4] = dir;
928	p[5] = dir;
929	p[6] = dir;
930	p[7] = dir;
931	bcopy(p + 8, buf, 8);
932
933	/*
934	 * Set the mic buffer to its final size so that the encrypt
935	 * can see the SND_SEQ part.
936	 */
937	mic->m_len += 8 + cklen;
938	krb5_encrypt(kc->kc_tokenkey, mic, mic->m_len - cklen - 8, 8, buf, 8);
939
940	*micp = mic;
941	return (GSS_S_COMPLETE);
942}
943
944static OM_uint32
945krb5_get_mic_new(struct krb5_context *kc,  struct mbuf *m,
946    struct mbuf **micp)
947{
948	struct krb5_key_state *key = kc->kc_send_sign_Kc;
949	struct mbuf *mlast, *mic;
950	uint8_t *p;
951	int flags;
952	size_t mlen, cklen;
953	uint32_t seq;
954
955	mlen = m_length(m, &mlast);
956	cklen = key->ks_class->ec_checksumlen;
957
958	KASSERT(16 + cklen <= MLEN, ("checksum too large for an mbuf"));
959	MGET(mic, M_WAITOK, MT_DATA);
960	M_ALIGN(mic, 16 + cklen);
961	mic->m_len = 16 + cklen;
962	p = mic->m_data;
963
964	/* TOK_ID */
965	p[0] = 0x04;
966	p[1] = 0x04;
967
968	/* Flags */
969	flags = 0;
970	if (is_acceptor(kc))
971		flags |= GSS_TOKEN_SENT_BY_ACCEPTOR;
972	if (kc->kc_more_flags & ACCEPTOR_SUBKEY)
973		flags |= GSS_TOKEN_ACCEPTOR_SUBKEY;
974	p[2] = flags;
975
976	/* Filler */
977	p[3] = 0xff;
978	p[4] = 0xff;
979	p[5] = 0xff;
980	p[6] = 0xff;
981	p[7] = 0xff;
982
983	/* SND_SEQ */
984	p[8] = 0;
985	p[9] = 0;
986	p[10] = 0;
987	p[11] = 0;
988	seq = atomic_fetchadd_32(&kc->kc_local_seqnumber, 1);
989	p[12] = (seq >> 24);
990	p[13] = (seq >> 16);
991	p[14] = (seq >> 8);
992	p[15] = (seq >> 0);
993
994	/*
995	 * SGN_CKSUM:
996	 *
997	 * Calculate the keyed checksum of the message plus the first
998	 * 16 bytes of the token header.
999	 */
1000	mlast->m_next = mic;
1001	krb5_checksum(key, 0, m, 0, mlen + 16, cklen);
1002	mlast->m_next = NULL;
1003
1004	*micp = mic;
1005	return (GSS_S_COMPLETE);
1006}
1007
1008static OM_uint32
1009krb5_get_mic(gss_ctx_id_t ctx, OM_uint32 *minor_status,
1010    gss_qop_t qop_req, struct mbuf *m, struct mbuf **micp)
1011{
1012	struct krb5_context *kc = (struct krb5_context *)ctx;
1013
1014	*minor_status = 0;
1015
1016	if (qop_req != GSS_C_QOP_DEFAULT)
1017		return (GSS_S_BAD_QOP);
1018
1019	if (time_uptime > kc->kc_lifetime)
1020		return (GSS_S_CONTEXT_EXPIRED);
1021
1022	switch (kc->kc_tokenkey->ks_class->ec_type) {
1023	case ETYPE_DES_CBC_CRC:
1024		return (krb5_get_mic_old(kc, m, micp, sgn_alg_des_md5));
1025
1026	case ETYPE_DES3_CBC_SHA1:
1027		return (krb5_get_mic_old(kc, m, micp, sgn_alg_des3_sha1));
1028
1029	case ETYPE_ARCFOUR_HMAC_MD5:
1030	case ETYPE_ARCFOUR_HMAC_MD5_56:
1031		return (krb5_get_mic_old(kc, m, micp, sgn_alg_hmac_md5));
1032
1033	default:
1034		return (krb5_get_mic_new(kc, m, micp));
1035	}
1036
1037	return (GSS_S_FAILURE);
1038}
1039
1040static OM_uint32
1041krb5_verify_mic_old(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic,
1042    uint8_t sgn_alg[2])
1043{
1044	struct mbuf *mlast, *tm;
1045	uint8_t *p, *tp, dir;
1046	size_t mlen, tlen, elen, miclen;
1047	size_t cklen;
1048	uint32_t seq;
1049
1050	mlen = m_length(m, &mlast);
1051
1052	tlen = token_length(kc->kc_tokenkey);
1053	p = krb5_verify_token("\x01\x01", tlen, &mic, &elen, FALSE);
1054	if (!p)
1055		return (GSS_S_DEFECTIVE_TOKEN);
1056#if 0
1057	/*
1058	 * Disable this check - heimdal-1.1 generates DES3 MIC tokens
1059	 * that are 2 bytes too big.
1060	 */
1061	if (elen != tlen)
1062		return (GSS_S_DEFECTIVE_TOKEN);
1063#endif
1064	/* TOK_ID */
1065	p += 2;
1066
1067	/* SGN_ALG */
1068	if (p[0] != sgn_alg[0] || p[1] != sgn_alg[1])
1069		return (GSS_S_DEFECTIVE_TOKEN);
1070	p += 2;
1071
1072	if (p[0] != 0xff || p[1] != 0xff || p[2] != 0xff || p[3] != 0xff)
1073		return (GSS_S_DEFECTIVE_TOKEN);
1074	p += 4;
1075
1076	/*
1077	 * SGN_CKSUM:
1078	 *
1079	 * Calculate the keyed checksum of the token header plus the
1080	 * message.
1081	 */
1082	cklen = kc->kc_checksumkey->ks_class->ec_checksumlen;
1083	miclen = mic->m_len;
1084	mic->m_len = p - (uint8_t *) mic->m_data;
1085	mic->m_next = m;
1086	MGET(tm, M_WAITOK, MT_DATA);
1087	tm->m_len = cklen;
1088	mlast->m_next = tm;
1089
1090	krb5_checksum(kc->kc_checksumkey, 15, mic, mic->m_len - 8,
1091	    8 + mlen, cklen);
1092	mic->m_next = NULL;
1093	mlast->m_next = NULL;
1094	if (bcmp(tm->m_data, p + 8, cklen)) {
1095		m_free(tm);
1096		return (GSS_S_BAD_SIG);
1097	}
1098
1099	/*
1100	 * SND_SEQ:
1101	 *
1102	 * Take the four bytes of the sequence number least
1103	 * significant first followed by four bytes of direction
1104	 * marker (zero for initiator and 0xff for acceptor). Encrypt
1105	 * that data using the SGN_CKSUM as IV.  Note: ARC4 wants the
1106	 * sequence number big-endian.
1107	 */
1108	bcopy(p, tm->m_data, 8);
1109	tm->m_len = 8;
1110	krb5_decrypt(kc->kc_tokenkey, tm, 0, 8, p + 8, 8);
1111
1112	tp = tm->m_data;
1113	if (sgn_alg[0] == 0x11) {
1114		seq = tp[3] | (tp[2] << 8) | (tp[1] << 16) | (tp[0] << 24);
1115	} else {
1116		seq = tp[0] | (tp[1] << 8) | (tp[2] << 16) | (tp[3] << 24);
1117	}
1118
1119	if (is_initiator(kc)) {
1120		dir = 0xff;
1121	} else {
1122		dir = 0;
1123	}
1124	if (tp[4] != dir || tp[5] != dir || tp[6] != dir || tp[7] != dir) {
1125		m_free(tm);
1126		return (GSS_S_DEFECTIVE_TOKEN);
1127	}
1128	m_free(tm);
1129
1130	if (kc->kc_msg_order.km_flags &
1131		(GSS_C_REPLAY_FLAG | GSS_C_SEQUENCE_FLAG)) {
1132		return (krb5_sequence_check(kc, seq));
1133	}
1134
1135	return (GSS_S_COMPLETE);
1136}
1137
1138static OM_uint32
1139krb5_verify_mic_new(struct krb5_context *kc, struct mbuf *m, struct mbuf *mic)
1140{
1141	OM_uint32 res;
1142	struct krb5_key_state *key = kc->kc_recv_sign_Kc;
1143	struct mbuf *mlast;
1144	uint8_t *p;
1145	int flags;
1146	size_t mlen, cklen;
1147	char buf[32];
1148
1149	mlen = m_length(m, &mlast);
1150	cklen = key->ks_class->ec_checksumlen;
1151
1152	KASSERT(mic->m_next == NULL, ("MIC should be contiguous"));
1153	if (mic->m_len != 16 + cklen)
1154		return (GSS_S_DEFECTIVE_TOKEN);
1155	p = mic->m_data;
1156
1157	/* TOK_ID */
1158	if (p[0] != 0x04)
1159		return (GSS_S_DEFECTIVE_TOKEN);
1160	if (p[1] != 0x04)
1161		return (GSS_S_DEFECTIVE_TOKEN);
1162
1163	/* Flags */
1164	flags = 0;
1165	if (is_initiator(kc))
1166		flags |= GSS_TOKEN_SENT_BY_ACCEPTOR;
1167	if (kc->kc_more_flags & ACCEPTOR_SUBKEY)
1168		flags |= GSS_TOKEN_ACCEPTOR_SUBKEY;
1169	if (p[2] != flags)
1170		return (GSS_S_DEFECTIVE_TOKEN);
1171
1172	/* Filler */
1173	if (p[3] != 0xff)
1174		return (GSS_S_DEFECTIVE_TOKEN);
1175	if (p[4] != 0xff)
1176		return (GSS_S_DEFECTIVE_TOKEN);
1177	if (p[5] != 0xff)
1178		return (GSS_S_DEFECTIVE_TOKEN);
1179	if (p[6] != 0xff)
1180		return (GSS_S_DEFECTIVE_TOKEN);
1181	if (p[7] != 0xff)
1182		return (GSS_S_DEFECTIVE_TOKEN);
1183
1184	/* SND_SEQ */
1185	if (kc->kc_msg_order.km_flags &
1186		(GSS_C_REPLAY_FLAG | GSS_C_SEQUENCE_FLAG)) {
1187		uint32_t seq;
1188		if (p[8] || p[9] || p[10] || p[11]) {
1189			res = GSS_S_UNSEQ_TOKEN;
1190		} else {
1191			seq = (p[12] << 24) | (p[13] << 16)
1192				| (p[14] << 8) | p[15];
1193			res = krb5_sequence_check(kc, seq);
1194		}
1195		if (GSS_ERROR(res))
1196			return (res);
1197	} else {
1198		res = GSS_S_COMPLETE;
1199	}
1200
1201	/*
1202	 * SGN_CKSUM:
1203	 *
1204	 * Calculate the keyed checksum of the message plus the first
1205	 * 16 bytes of the token header.
1206	 */
1207	m_copydata(mic, 16, cklen, buf);
1208	mlast->m_next = mic;
1209	krb5_checksum(key, 0, m, 0, mlen + 16, cklen);
1210	mlast->m_next = NULL;
1211	if (bcmp(buf, p + 16, cklen)) {
1212		return (GSS_S_BAD_SIG);
1213	}
1214
1215	return (GSS_S_COMPLETE);
1216}
1217
1218static OM_uint32
1219krb5_verify_mic(gss_ctx_id_t ctx, OM_uint32 *minor_status,
1220    struct mbuf *m, struct mbuf *mic, gss_qop_t *qop_state)
1221{
1222	struct krb5_context *kc = (struct krb5_context *)ctx;
1223
1224	*minor_status = 0;
1225	if (qop_state)
1226		*qop_state = GSS_C_QOP_DEFAULT;
1227
1228	if (time_uptime > kc->kc_lifetime)
1229		return (GSS_S_CONTEXT_EXPIRED);
1230
1231	switch (kc->kc_tokenkey->ks_class->ec_type) {
1232	case ETYPE_DES_CBC_CRC:
1233		return (krb5_verify_mic_old(kc, m, mic, sgn_alg_des_md5));
1234
1235	case ETYPE_ARCFOUR_HMAC_MD5:
1236	case ETYPE_ARCFOUR_HMAC_MD5_56:
1237		return (krb5_verify_mic_old(kc, m, mic, sgn_alg_hmac_md5));
1238
1239	case ETYPE_DES3_CBC_SHA1:
1240		return (krb5_verify_mic_old(kc, m, mic, sgn_alg_des3_sha1));
1241
1242	default:
1243		return (krb5_verify_mic_new(kc, m, mic));
1244	}
1245
1246	return (GSS_S_FAILURE);
1247}
1248
1249static OM_uint32
1250krb5_wrap_old(struct krb5_context *kc, int conf_req_flag,
1251    struct mbuf **mp, int *conf_state,
1252    uint8_t sgn_alg[2], uint8_t seal_alg[2])
1253{
1254	struct mbuf *m, *mlast, *tm, *cm, *pm;
1255	size_t mlen, tlen, padlen, datalen;
1256	uint8_t *p, dir;
1257	size_t cklen;
1258	uint8_t buf[8];
1259	uint32_t seq;
1260
1261	/*
1262	 * How many trailing pad bytes do we need?
1263	 */
1264	m = *mp;
1265	mlen = m_length(m, &mlast);
1266	tlen = kc->kc_tokenkey->ks_class->ec_msgblocklen;
1267	padlen = tlen - (mlen % tlen);
1268
1269	/*
1270	 * The data part of the token has eight bytes of random
1271	 * confounder prepended and followed by up to eight bytes of
1272	 * padding bytes each of which is set to the number of padding
1273	 * bytes.
1274	 */
1275	datalen = mlen + 8 + padlen;
1276	tlen = token_length(kc->kc_tokenkey);
1277
1278	p = krb5_make_token("\x02\x01", tlen, datalen + tlen, &tm);
1279	p += 2;			/* TOK_ID */
1280	*p++ = sgn_alg[0];	/* SGN_ALG */
1281	*p++ = sgn_alg[1];
1282	if (conf_req_flag) {
1283		*p++ = seal_alg[0]; /* SEAL_ALG */
1284		*p++ = seal_alg[1];
1285	} else {
1286		*p++ = 0xff;	/* SEAL_ALG = none */
1287		*p++ = 0xff;
1288	}
1289
1290	*p++ = 0xff;		/* filler */
1291	*p++ = 0xff;
1292
1293	/*
1294	 * Copy the padded message data.
1295	 */
1296	if (M_LEADINGSPACE(m) >= 8) {
1297		m->m_data -= 8;
1298		m->m_len += 8;
1299	} else {
1300		MGET(cm, M_WAITOK, MT_DATA);
1301		cm->m_len = 8;
1302		cm->m_next = m;
1303		m = cm;
1304	}
1305	arc4rand(m->m_data, 8, 0);
1306	if (M_TRAILINGSPACE(mlast) >= padlen) {
1307		memset(mlast->m_data + mlast->m_len, padlen, padlen);
1308		mlast->m_len += padlen;
1309	} else {
1310		MGET(pm, M_WAITOK, MT_DATA);
1311		memset(pm->m_data, padlen, padlen);
1312		pm->m_len = padlen;
1313		mlast->m_next = pm;
1314		mlast = pm;
1315	}
1316	tm->m_next = m;
1317
1318	/*
1319	 * SGN_CKSUM:
1320	 *
1321	 * Calculate the keyed checksum of the token header plus the
1322	 * padded message. Fiddle with tm->m_len so that we only
1323	 * checksum the 8 bytes of head that we care about.
1324	 */
1325	cklen = kc->kc_checksumkey->ks_class->ec_checksumlen;
1326	tlen = tm->m_len;
1327	tm->m_len = p - (uint8_t *) tm->m_data;
1328	MGET(cm, M_WAITOK, MT_DATA);
1329	cm->m_len = cklen;
1330	mlast->m_next = cm;
1331	krb5_checksum(kc->kc_checksumkey, 13, tm, tm->m_len - 8,
1332	    datalen + 8, cklen);
1333	tm->m_len = tlen;
1334	mlast->m_next = NULL;
1335	bcopy(cm->m_data, p + 8, cklen);
1336	m_free(cm);
1337
1338	/*
1339	 * SND_SEQ:
1340	 *
1341	 * Take the four bytes of the sequence number least
1342	 * significant first (most signficant first for ARCFOUR)
1343	 * followed by four bytes of direction marker (zero for
1344	 * initiator and 0xff for acceptor). Encrypt that data using
1345	 * the SGN_CKSUM as IV.
1346	 */
1347	seq = atomic_fetchadd_32(&kc->kc_local_seqnumber, 1);
1348	if (sgn_alg[0] == 0x11) {
1349		p[0] = (seq >> 24);
1350		p[1] = (seq >> 16);
1351		p[2] = (seq >> 8);
1352		p[3] = (seq >> 0);
1353	} else {
1354		p[0] = (seq >> 0);
1355		p[1] = (seq >> 8);
1356		p[2] = (seq >> 16);
1357		p[3] = (seq >> 24);
1358	}
1359	if (is_initiator(kc)) {
1360		dir = 0;
1361	} else {
1362		dir = 0xff;
1363	}
1364	p[4] = dir;
1365	p[5] = dir;
1366	p[6] = dir;
1367	p[7] = dir;
1368	krb5_encrypt(kc->kc_tokenkey, tm, p - (uint8_t *) tm->m_data,
1369	    8, p + 8, 8);
1370
1371	if (conf_req_flag) {
1372		/*
1373		 * Encrypt the padded message with an IV of zero for
1374		 * DES and DES3, or an IV of the sequence number in
1375		 * big-endian format for ARCFOUR.
1376		 */
1377		if (seal_alg[0] == 0x10) {
1378			buf[0] = (seq >> 24);
1379			buf[1] = (seq >> 16);
1380			buf[2] = (seq >> 8);
1381			buf[3] = (seq >> 0);
1382			krb5_encrypt(kc->kc_encryptkey, m, 0, datalen,
1383			    buf, 4);
1384		} else {
1385			krb5_encrypt(kc->kc_encryptkey, m, 0, datalen,
1386			    NULL, 0);
1387		}
1388	}
1389
1390	if (conf_state)
1391		*conf_state = conf_req_flag;
1392
1393	*mp = tm;
1394	return (GSS_S_COMPLETE);
1395}
1396
1397static OM_uint32
1398krb5_wrap_new(struct krb5_context *kc, int conf_req_flag,
1399    struct mbuf **mp, int *conf_state)
1400{
1401	struct krb5_key_state *Ke = kc->kc_send_seal_Ke;
1402	struct krb5_key_state *Ki = kc->kc_send_seal_Ki;
1403	struct krb5_key_state *Kc = kc->kc_send_seal_Kc;
1404	const struct krb5_encryption_class *ec = Ke->ks_class;
1405	struct mbuf *m, *mlast, *tm;
1406	uint8_t *p;
1407	int flags, EC;
1408	size_t mlen, blen, mblen, cklen, ctlen;
1409	uint32_t seq;
1410	static char zpad[32];
1411
1412	m = *mp;
1413	mlen = m_length(m, &mlast);
1414
1415	blen = ec->ec_blocklen;
1416	mblen = ec->ec_msgblocklen;
1417	cklen = ec->ec_checksumlen;
1418
1419	if (conf_req_flag) {
1420		/*
1421		 * For sealed messages, we need space for 16 bytes of
1422		 * header, blen confounder, plaintext, padding, copy
1423		 * of header and checksum.
1424		 *
1425		 * We pad to mblen (which may be different from
1426		 * blen). If the encryption class is using CTS, mblen
1427		 * will be one (i.e. no padding required).
1428		 */
1429		if (mblen > 1)
1430			EC = mlen % mblen;
1431		else
1432			EC = 0;
1433		ctlen = blen + mlen + EC + 16;
1434
1435		/*
1436		 * Put initial header and confounder before the
1437		 * message.
1438		 */
1439		M_PREPEND(m, 16 + blen, M_WAITOK);
1440
1441		/*
1442		 * Append padding + copy of header and checksum. Try
1443		 * to fit this into the end of the original message,
1444		 * otherwise allocate a trailer.
1445		 */
1446		if (M_TRAILINGSPACE(mlast) >= EC + 16 + cklen) {
1447			tm = NULL;
1448			mlast->m_len += EC + 16 + cklen;
1449		} else {
1450			MGET(tm, M_WAITOK, MT_DATA);
1451			tm->m_len = EC + 16 + cklen;
1452			mlast->m_next = tm;
1453		}
1454	} else {
1455		/*
1456		 * For unsealed messages, we need 16 bytes of header
1457		 * plus space for the plaintext and a checksum. EC is
1458		 * set to the checksum size. We leave space in tm for
1459		 * a copy of the header - this will be trimmed later.
1460		 */
1461		M_PREPEND(m, 16, M_WAITOK);
1462
1463		MGET(tm, M_WAITOK, MT_DATA);
1464		tm->m_len = cklen + 16;
1465		mlast->m_next = tm;
1466		ctlen = 0;
1467		EC = cklen;
1468	}
1469
1470	p = m->m_data;
1471
1472	/* TOK_ID */
1473	p[0] = 0x05;
1474	p[1] = 0x04;
1475
1476	/* Flags */
1477	flags = 0;
1478	if (conf_req_flag)
1479		flags = GSS_TOKEN_SEALED;
1480	if (is_acceptor(kc))
1481		flags |= GSS_TOKEN_SENT_BY_ACCEPTOR;
1482	if (kc->kc_more_flags & ACCEPTOR_SUBKEY)
1483		flags |= GSS_TOKEN_ACCEPTOR_SUBKEY;
1484	p[2] = flags;
1485
1486	/* Filler */
1487	p[3] = 0xff;
1488
1489	/* EC + RRC - set to zero initially */
1490	p[4] = 0;
1491	p[5] = 0;
1492	p[6] = 0;
1493	p[7] = 0;
1494
1495	/* SND_SEQ */
1496	p[8] = 0;
1497	p[9] = 0;
1498	p[10] = 0;
1499	p[11] = 0;
1500	seq = atomic_fetchadd_32(&kc->kc_local_seqnumber, 1);
1501	p[12] = (seq >> 24);
1502	p[13] = (seq >> 16);
1503	p[14] = (seq >> 8);
1504	p[15] = (seq >> 0);
1505
1506	if (conf_req_flag) {
1507		/*
1508		 * Encrypt according to RFC 4121 section 4.2 and RFC
1509		 * 3961 section 5.3. Note: we don't generate tokens
1510		 * with RRC values other than zero. If we did, we
1511		 * should zero RRC in the copied header.
1512		 */
1513		arc4rand(p + 16, blen, 0);
1514		if (EC) {
1515			m_copyback(m, 16 + blen + mlen, EC, zpad);
1516		}
1517		m_copyback(m, 16 + blen + mlen + EC, 16, p);
1518
1519		krb5_checksum(Ki, 0, m, 16, ctlen, cklen);
1520		krb5_encrypt(Ke, m, 16, ctlen, NULL, 0);
1521	} else {
1522		/*
1523		 * The plaintext message is followed by a checksum of
1524		 * the plaintext plus a version of the header where EC
1525		 * and RRC are set to zero. Also, the original EC must
1526		 * be our checksum size.
1527		 */
1528		bcopy(p, tm->m_data, 16);
1529		krb5_checksum(Kc, 0, m, 16, mlen + 16, cklen);
1530		tm->m_data += 16;
1531		tm->m_len -= 16;
1532	}
1533
1534	/*
1535	 * Finally set EC to its actual value
1536	 */
1537	p[4] = EC >> 8;
1538	p[5] = EC;
1539
1540	*mp = m;
1541	return (GSS_S_COMPLETE);
1542}
1543
1544static OM_uint32
1545krb5_wrap(gss_ctx_id_t ctx, OM_uint32 *minor_status,
1546    int conf_req_flag, gss_qop_t qop_req,
1547    struct mbuf **mp, int *conf_state)
1548{
1549	struct krb5_context *kc = (struct krb5_context *)ctx;
1550
1551	*minor_status = 0;
1552	if (conf_state)
1553		*conf_state = 0;
1554
1555	if (qop_req != GSS_C_QOP_DEFAULT)
1556		return (GSS_S_BAD_QOP);
1557
1558	if (time_uptime > kc->kc_lifetime)
1559		return (GSS_S_CONTEXT_EXPIRED);
1560
1561	switch (kc->kc_tokenkey->ks_class->ec_type) {
1562	case ETYPE_DES_CBC_CRC:
1563		return (krb5_wrap_old(kc, conf_req_flag,
1564			mp, conf_state, sgn_alg_des_md5, seal_alg_des));
1565
1566	case ETYPE_ARCFOUR_HMAC_MD5:
1567	case ETYPE_ARCFOUR_HMAC_MD5_56:
1568		return (krb5_wrap_old(kc, conf_req_flag,
1569			mp, conf_state, sgn_alg_hmac_md5, seal_alg_rc4));
1570
1571	case ETYPE_DES3_CBC_SHA1:
1572		return (krb5_wrap_old(kc, conf_req_flag,
1573			mp, conf_state, sgn_alg_des3_sha1, seal_alg_des3));
1574
1575	default:
1576		return (krb5_wrap_new(kc, conf_req_flag, mp, conf_state));
1577	}
1578
1579	return (GSS_S_FAILURE);
1580}
1581
1582static void
1583m_trim(struct mbuf *m, int len)
1584{
1585	struct mbuf *n;
1586	int off;
1587
1588	if (m == NULL)
1589		return;
1590	n = m_getptr(m, len, &off);
1591	if (n) {
1592		n->m_len = off;
1593		if (n->m_next) {
1594			m_freem(n->m_next);
1595			n->m_next = NULL;
1596		}
1597	}
1598}
1599
1600static OM_uint32
1601krb5_unwrap_old(struct krb5_context *kc, struct mbuf **mp, int *conf_state,
1602    uint8_t sgn_alg[2], uint8_t seal_alg[2])
1603{
1604	OM_uint32 res;
1605	struct mbuf *m, *mlast, *hm, *cm, *n;
1606	uint8_t *p, dir;
1607	size_t mlen, tlen, elen, datalen, padlen;
1608	size_t cklen;
1609	uint8_t buf[32];
1610	uint32_t seq;
1611	int i, conf;
1612
1613	m = *mp;
1614	mlen = m_length(m, &mlast);
1615
1616	tlen = token_length(kc->kc_tokenkey);
1617	cklen = kc->kc_tokenkey->ks_class->ec_checksumlen;
1618
1619	p = krb5_verify_token("\x02\x01", tlen, &m, &elen, TRUE);
1620	*mp = m;
1621	if (!p)
1622		return (GSS_S_DEFECTIVE_TOKEN);
1623	datalen = elen - tlen;
1624
1625	/*
1626	 * Trim the framing header first to make life a little easier
1627	 * later.
1628	 */
1629	m_adj(m, p - (uint8_t *) m->m_data);
1630
1631	/* TOK_ID */
1632	p += 2;
1633
1634	/* SGN_ALG */
1635	if (p[0] != sgn_alg[0] || p[1] != sgn_alg[1])
1636		return (GSS_S_DEFECTIVE_TOKEN);
1637	p += 2;
1638
1639	/* SEAL_ALG */
1640	if (p[0] == seal_alg[0] && p[1] == seal_alg[1])
1641		conf = 1;
1642	else if (p[0] == 0xff && p[1] == 0xff)
1643		conf = 0;
1644	else
1645		return (GSS_S_DEFECTIVE_TOKEN);
1646	p += 2;
1647
1648	if (p[0] != 0xff || p[1] != 0xff)
1649		return (GSS_S_DEFECTIVE_TOKEN);
1650	p += 2;
1651
1652	/*
1653	 * SND_SEQ:
1654	 *
1655	 * Take the four bytes of the sequence number least
1656	 * significant first (most significant for ARCFOUR) followed
1657	 * by four bytes of direction marker (zero for initiator and
1658	 * 0xff for acceptor). Encrypt that data using the SGN_CKSUM
1659	 * as IV.
1660	 */
1661	krb5_decrypt(kc->kc_tokenkey, m, 8, 8, p + 8, 8);
1662	if (sgn_alg[0] == 0x11) {
1663		seq = p[3] | (p[2] << 8) | (p[1] << 16) | (p[0] << 24);
1664	} else {
1665		seq = p[0] | (p[1] << 8) | (p[2] << 16) | (p[3] << 24);
1666	}
1667
1668	if (is_initiator(kc)) {
1669		dir = 0xff;
1670	} else {
1671		dir = 0;
1672	}
1673	if (p[4] != dir || p[5] != dir || p[6] != dir || p[7] != dir)
1674		return (GSS_S_DEFECTIVE_TOKEN);
1675
1676	if (kc->kc_msg_order.km_flags &
1677	    (GSS_C_REPLAY_FLAG | GSS_C_SEQUENCE_FLAG)) {
1678		res = krb5_sequence_check(kc, seq);
1679		if (GSS_ERROR(res))
1680			return (res);
1681	} else {
1682		res = GSS_S_COMPLETE;
1683	}
1684
1685	/*
1686	 * If the token was encrypted, decode it in-place.
1687	 */
1688	if (conf) {
1689		/*
1690		 * Decrypt the padded message with an IV of zero for
1691		 * DES and DES3 or an IV of the big-endian encoded
1692		 * sequence number for ARCFOUR.
1693		 */
1694		if (seal_alg[0] == 0x10) {
1695			krb5_decrypt(kc->kc_encryptkey, m, 16 + cklen,
1696			    datalen, p, 4);
1697		} else {
1698			krb5_decrypt(kc->kc_encryptkey, m, 16 + cklen,
1699			    datalen, NULL, 0);
1700		}
1701	}
1702	if (conf_state)
1703		*conf_state = conf;
1704
1705	/*
1706	 * Check the trailing pad bytes.
1707	 * RFC1964 specifies between 1<->8 bytes, each with a binary value
1708	 * equal to the number of bytes.
1709	 */
1710	if (mlast->m_len > 0)
1711		padlen = mlast->m_data[mlast->m_len - 1];
1712	else {
1713		n = m_getptr(m, tlen + datalen - 1, &i);
1714		/*
1715		 * When the position is exactly equal to the # of data bytes
1716		 * in the mbuf list, m_getptr() will return the last mbuf in
1717		 * the list and an off == m_len for that mbuf, so that case
1718		 * needs to be checked as well as a NULL return.
1719		 */
1720		if (n == NULL || n->m_len == i)
1721			return (GSS_S_DEFECTIVE_TOKEN);
1722		padlen = n->m_data[i];
1723	}
1724	if (padlen < 1 || padlen > 8 || padlen > tlen + datalen)
1725		return (GSS_S_DEFECTIVE_TOKEN);
1726	m_copydata(m, tlen + datalen - padlen, padlen, buf);
1727	for (i = 0; i < padlen; i++) {
1728		if (buf[i] != padlen) {
1729			return (GSS_S_DEFECTIVE_TOKEN);
1730		}
1731	}
1732
1733	/*
1734	 * SGN_CKSUM:
1735	 *
1736	 * Calculate the keyed checksum of the token header plus the
1737	 * padded message. We do a little mbuf surgery to trim out the
1738	 * parts we don't want to checksum.
1739	 */
1740	hm = m;
1741	*mp = m = m_split(m, 16 + cklen, M_WAITOK);
1742	mlast = m_last(m);
1743	hm->m_len = 8;
1744	hm->m_next = m;
1745	MGET(cm, M_WAITOK, MT_DATA);
1746	cm->m_len = cklen;
1747	mlast->m_next = cm;
1748
1749	krb5_checksum(kc->kc_checksumkey, 13, hm, 0, datalen + 8, cklen);
1750	hm->m_next = NULL;
1751	mlast->m_next = NULL;
1752
1753	if (bcmp(cm->m_data, hm->m_data + 16, cklen)) {
1754		m_freem(hm);
1755		m_free(cm);
1756		return (GSS_S_BAD_SIG);
1757	}
1758	m_freem(hm);
1759	m_free(cm);
1760
1761	/*
1762	 * Trim off the confounder and padding.
1763	 */
1764	m_adj(m, 8);
1765	if (mlast->m_len >= padlen) {
1766		mlast->m_len -= padlen;
1767	} else {
1768		m_trim(m, datalen - 8 - padlen);
1769	}
1770
1771	*mp = m;
1772	return (res);
1773}
1774
1775static OM_uint32
1776krb5_unwrap_new(struct krb5_context *kc, struct mbuf **mp, int *conf_state)
1777{
1778	OM_uint32 res;
1779	struct krb5_key_state *Ke = kc->kc_recv_seal_Ke;
1780	struct krb5_key_state *Ki = kc->kc_recv_seal_Ki;
1781	struct krb5_key_state *Kc = kc->kc_recv_seal_Kc;
1782	const struct krb5_encryption_class *ec = Ke->ks_class;
1783	struct mbuf *m, *mlast, *hm, *cm;
1784	uint8_t *p, *pp;
1785	int sealed, flags, EC, RRC;
1786	size_t blen, cklen, ctlen, mlen, plen, tlen;
1787	char buf[32], buf2[32];
1788
1789	m = *mp;
1790	mlen = m_length(m, &mlast);
1791
1792	if (mlen <= 16)
1793		return (GSS_S_DEFECTIVE_TOKEN);
1794	if (m->m_len < 16) {
1795		m = m_pullup(m, 16);
1796		*mp = m;
1797	}
1798	p = m->m_data;
1799
1800	/* TOK_ID */
1801	if (p[0] != 0x05)
1802		return (GSS_S_DEFECTIVE_TOKEN);
1803	if (p[1] != 0x04)
1804		return (GSS_S_DEFECTIVE_TOKEN);
1805
1806	/* Flags */
1807	sealed = p[2] & GSS_TOKEN_SEALED;
1808	flags = sealed;
1809	if (is_initiator(kc))
1810		flags |= GSS_TOKEN_SENT_BY_ACCEPTOR;
1811	if (kc->kc_more_flags & ACCEPTOR_SUBKEY)
1812		flags |= GSS_TOKEN_ACCEPTOR_SUBKEY;
1813	if (p[2] != flags)
1814		return (GSS_S_DEFECTIVE_TOKEN);
1815
1816	/* Filler */
1817	if (p[3] != 0xff)
1818		return (GSS_S_DEFECTIVE_TOKEN);
1819
1820	/* EC + RRC */
1821	EC = (p[4] << 8) + p[5];
1822	RRC = (p[6] << 8) + p[7];
1823
1824	/* SND_SEQ */
1825	if (kc->kc_msg_order.km_flags &
1826		(GSS_C_REPLAY_FLAG | GSS_C_SEQUENCE_FLAG)) {
1827		uint32_t seq;
1828		if (p[8] || p[9] || p[10] || p[11]) {
1829			res = GSS_S_UNSEQ_TOKEN;
1830		} else {
1831			seq = (p[12] << 24) | (p[13] << 16)
1832				| (p[14] << 8) | p[15];
1833			res = krb5_sequence_check(kc, seq);
1834		}
1835		if (GSS_ERROR(res))
1836			return (res);
1837	} else {
1838		res = GSS_S_COMPLETE;
1839	}
1840
1841	/*
1842	 * Separate the header before dealing with RRC. We only need
1843	 * to keep the header if the message isn't encrypted.
1844	 */
1845	if (sealed) {
1846		hm = NULL;
1847		m_adj(m, 16);
1848	} else {
1849		hm = m;
1850		*mp = m = m_split(m, 16, M_WAITOK);
1851		mlast = m_last(m);
1852	}
1853
1854	/*
1855	 * Undo the effects of RRC by rotating left.
1856	 */
1857	if (RRC > 0) {
1858		struct mbuf *rm;
1859		size_t rlen;
1860
1861		rlen = mlen - 16;
1862		if (RRC <= sizeof(buf) && m->m_len >= rlen) {
1863			/*
1864			 * Simple case, just rearrange the bytes in m.
1865			 */
1866			bcopy(m->m_data, buf, RRC);
1867			bcopy(m->m_data + RRC, m->m_data, rlen - RRC);
1868			bcopy(buf, m->m_data + rlen - RRC, RRC);
1869		} else {
1870			/*
1871			 * More complicated - rearrange the mbuf
1872			 * chain.
1873			 */
1874			rm = m;
1875			*mp = m = m_split(m, RRC, M_WAITOK);
1876			m_cat(m, rm);
1877			mlast = rm;
1878		}
1879	}
1880
1881	blen = ec->ec_blocklen;
1882	cklen = ec->ec_checksumlen;
1883	if (sealed) {
1884		/*
1885		 * Decrypt according to RFC 4121 section 4.2 and RFC
1886		 * 3961 section 5.3. The message must be large enough
1887		 * for a blocksize confounder, at least one block of
1888		 * cyphertext and a checksum.
1889		 */
1890		if (mlen < 16 + 2*blen + cklen)
1891			return (GSS_S_DEFECTIVE_TOKEN);
1892
1893		ctlen = mlen - 16 - cklen;
1894		krb5_decrypt(Ke, m, 0, ctlen, NULL, 0);
1895
1896		/*
1897		 * The size of the plaintext is ctlen minus blocklen
1898		 * (for the confounder), 16 (for the copy of the token
1899		 * header) and EC (for the filler). The actual
1900		 * plaintext starts after the confounder.
1901		 */
1902		plen = ctlen - blen - 16 - EC;
1903		pp = p + 16 + blen;
1904
1905		/*
1906		 * Checksum the padded plaintext.
1907		 */
1908		m_copydata(m, ctlen, cklen, buf);
1909		krb5_checksum(Ki, 0, m, 0, ctlen, cklen);
1910		m_copydata(m, ctlen, cklen, buf2);
1911
1912		if (bcmp(buf, buf2, cklen))
1913			return (GSS_S_BAD_SIG);
1914
1915		/*
1916		 * Trim the message back to just plaintext.
1917		 */
1918		m_adj(m, blen);
1919		tlen = 16 + EC + cklen;
1920		if (mlast->m_len >= tlen) {
1921			mlast->m_len -= tlen;
1922		} else {
1923			m_trim(m, plen);
1924		}
1925	} else {
1926		/*
1927		 * The plaintext message is followed by a checksum of
1928		 * the plaintext plus a version of the header where EC
1929		 * and RRC are set to zero. Also, the original EC must
1930		 * be our checksum size.
1931		 */
1932		if (mlen < 16 + cklen || EC != cklen)
1933			return (GSS_S_DEFECTIVE_TOKEN);
1934
1935		/*
1936		 * The size of the plaintext is simply the message
1937		 * size less header and checksum. The plaintext starts
1938		 * right after the header (which we have saved in hm).
1939		 */
1940		plen = mlen - 16 - cklen;
1941
1942		/*
1943		 * Insert a copy of the header (with EC and RRC set to
1944		 * zero) between the plaintext message and the
1945		 * checksum.
1946		 */
1947		p = hm->m_data;
1948		p[4] = p[5] = p[6] = p[7] = 0;
1949
1950		cm = m_split(m, plen, M_WAITOK);
1951		mlast = m_last(m);
1952		m->m_next = hm;
1953		hm->m_next = cm;
1954
1955		bcopy(cm->m_data, buf, cklen);
1956		krb5_checksum(Kc, 0, m, 0, plen + 16, cklen);
1957		if (bcmp(cm->m_data, buf, cklen))
1958			return (GSS_S_BAD_SIG);
1959
1960		/*
1961		 * The checksum matches, discard all buf the plaintext.
1962		 */
1963		mlast->m_next = NULL;
1964		m_freem(hm);
1965	}
1966
1967	if (conf_state)
1968		*conf_state = (sealed != 0);
1969
1970	return (res);
1971}
1972
1973static OM_uint32
1974krb5_unwrap(gss_ctx_id_t ctx, OM_uint32 *minor_status,
1975    struct mbuf **mp, int *conf_state, gss_qop_t *qop_state)
1976{
1977	struct krb5_context *kc = (struct krb5_context *)ctx;
1978	OM_uint32 maj_stat;
1979
1980	*minor_status = 0;
1981	if (qop_state)
1982		*qop_state = GSS_C_QOP_DEFAULT;
1983	if (conf_state)
1984		*conf_state = 0;
1985
1986	if (time_uptime > kc->kc_lifetime)
1987		return (GSS_S_CONTEXT_EXPIRED);
1988
1989	switch (kc->kc_tokenkey->ks_class->ec_type) {
1990	case ETYPE_DES_CBC_CRC:
1991		maj_stat = krb5_unwrap_old(kc, mp, conf_state,
1992			sgn_alg_des_md5, seal_alg_des);
1993		break;
1994
1995	case ETYPE_ARCFOUR_HMAC_MD5:
1996	case ETYPE_ARCFOUR_HMAC_MD5_56:
1997		maj_stat = krb5_unwrap_old(kc, mp, conf_state,
1998			sgn_alg_hmac_md5, seal_alg_rc4);
1999		break;
2000
2001	case ETYPE_DES3_CBC_SHA1:
2002		maj_stat = krb5_unwrap_old(kc, mp, conf_state,
2003			sgn_alg_des3_sha1, seal_alg_des3);
2004		break;
2005
2006	default:
2007		maj_stat = krb5_unwrap_new(kc, mp, conf_state);
2008		break;
2009	}
2010
2011	if (GSS_ERROR(maj_stat)) {
2012		m_freem(*mp);
2013		*mp = NULL;
2014	}
2015
2016	return (maj_stat);
2017}
2018
2019static OM_uint32
2020krb5_wrap_size_limit(gss_ctx_id_t ctx, OM_uint32 *minor_status,
2021    int conf_req_flag, gss_qop_t qop_req, OM_uint32 req_output_size,
2022    OM_uint32 *max_input_size)
2023{
2024	struct krb5_context *kc = (struct krb5_context *)ctx;
2025	const struct krb5_encryption_class *ec;
2026	OM_uint32 overhead;
2027
2028	*minor_status = 0;
2029	*max_input_size = 0;
2030
2031	if (qop_req != GSS_C_QOP_DEFAULT)
2032		return (GSS_S_BAD_QOP);
2033
2034	ec = kc->kc_tokenkey->ks_class;
2035	switch (ec->ec_type) {
2036	case ETYPE_DES_CBC_CRC:
2037	case ETYPE_DES3_CBC_SHA1:
2038	case ETYPE_ARCFOUR_HMAC_MD5:
2039	case ETYPE_ARCFOUR_HMAC_MD5_56:
2040		/*
2041		 * up to 5 bytes for [APPLICATION 0] SEQUENCE
2042		 * 2 + krb5 oid length
2043		 * 8 bytes of header
2044		 * 8 bytes of confounder
2045		 * maximum of 8 bytes of padding
2046		 * checksum
2047		 */
2048		overhead = 5 + 2 + krb5_mech_oid.length;
2049		overhead += 8 + 8 + ec->ec_msgblocklen;
2050		overhead += ec->ec_checksumlen;
2051		break;
2052
2053	default:
2054		if (conf_req_flag) {
2055			/*
2056			 * 16 byts of header
2057			 * blocklen bytes of confounder
2058			 * up to msgblocklen - 1 bytes of padding
2059			 * 16 bytes for copy of header
2060			 * checksum
2061			 */
2062			overhead = 16 + ec->ec_blocklen;
2063			overhead += ec->ec_msgblocklen - 1;
2064			overhead += 16;
2065			overhead += ec->ec_checksumlen;
2066		} else {
2067			/*
2068			 * 16 bytes of header plus checksum.
2069			 */
2070			overhead = 16 + ec->ec_checksumlen;
2071		}
2072	}
2073
2074	*max_input_size = req_output_size - overhead;
2075
2076	return (GSS_S_COMPLETE);
2077}
2078
2079static kobj_method_t krb5_methods[] = {
2080	KOBJMETHOD(kgss_init,		krb5_init),
2081	KOBJMETHOD(kgss_import,		krb5_import),
2082	KOBJMETHOD(kgss_delete,		krb5_delete),
2083	KOBJMETHOD(kgss_mech_type,	krb5_mech_type),
2084	KOBJMETHOD(kgss_get_mic,	krb5_get_mic),
2085	KOBJMETHOD(kgss_verify_mic,	krb5_verify_mic),
2086	KOBJMETHOD(kgss_wrap,		krb5_wrap),
2087	KOBJMETHOD(kgss_unwrap,		krb5_unwrap),
2088	KOBJMETHOD(kgss_wrap_size_limit, krb5_wrap_size_limit),
2089	{ 0, 0 }
2090};
2091
2092static struct kobj_class krb5_class = {
2093	"kerberosv5",
2094	krb5_methods,
2095	sizeof(struct krb5_context)
2096};
2097
2098/*
2099 * Kernel module glue
2100 */
2101static int
2102kgssapi_krb5_modevent(module_t mod, int type, void *data)
2103{
2104
2105	switch (type) {
2106	case MOD_LOAD:
2107		kgss_install_mech(&krb5_mech_oid, "kerberosv5", &krb5_class);
2108		break;
2109
2110	case MOD_UNLOAD:
2111		kgss_uninstall_mech(&krb5_mech_oid);
2112		break;
2113	}
2114
2115
2116	return (0);
2117}
2118static moduledata_t kgssapi_krb5_mod = {
2119	"kgssapi_krb5",
2120	kgssapi_krb5_modevent,
2121	NULL,
2122};
2123DECLARE_MODULE(kgssapi_krb5, kgssapi_krb5_mod, SI_SUB_VFS, SI_ORDER_ANY);
2124MODULE_DEPEND(kgssapi_krb5, kgssapi, 1, 1, 1);
2125MODULE_DEPEND(kgssapi_krb5, crypto, 1, 1, 1);
2126MODULE_DEPEND(kgssapi_krb5, rc4, 1, 1, 1);
2127MODULE_VERSION(kgssapi_krb5, 1);
2128