Changes in 4.9.208 btrfs: skip log replay on orphaned roots btrfs: do not leak reloc root if we fail to read the fs root btrfs: handle ENOENT in btrfs_uuid_tree_iterate ALSA: pcm: Avoid possible info leaks from PCM stream buffers ALSA: hda/ca0132 - Keep power on during processing DSP response ALSA: hda/ca0132 - Avoid endless loop drm: mst: Fix query_payload ack reply struct drm/bridge: analogix-anx78xx: silence -EPROBE_DEFER warnings iio: light: bh1750: Resolve compiler warning and make code more readable spi: Add call to spi_slave_abort() function when spidev driver is released staging: rtl8192u: fix multiple memory leaks on error path staging: rtl8188eu: fix possible null dereference rtlwifi: prevent memory leak in rtl_usb_probe libertas: fix a potential NULL pointer dereference IB/iser: bound protection_sg size by data_sg size media: am437x-vpfe: Setting STD to current value is not an error media: i2c: ov2659: fix s_stream return value media: i2c: ov2659: Fix missing 720p register config media: ov6650: Fix stored frame format not in sync with hardware tools/power/cpupower: Fix initializer override in hsw_ext_cstates usb: renesas_usbhs: add suspend event support in gadget mode hwrng: omap3-rom - Call clk_disable_unprepare() on exit only if not idled regulator: max8907: Fix the usage of uninitialized variable in max8907_regulator_probe() media: flexcop-usb: fix NULL-ptr deref in flexcop_usb_transfer_init() media: cec-funcs.h: add status_req checks samples: pktgen: fix proc_cmd command result check logic mwifiex: pcie: Fix memory leak in mwifiex_pcie_init_evt_ring media: ti-vpe: vpe: fix a v4l2-compliance warning about invalid pixel format media: ti-vpe: vpe: fix a v4l2-compliance failure about frame sequence number media: ti-vpe: vpe: Make sure YUYV is set as default format extcon: sm5502: Reset registers during initialization x86/mm: Use the correct function type for native_set_fixmap() perf test: Report failure for mmap events perf report: Add warning when libunwind not compiled in usb: usbfs: Suppress problematic bind and unbind uevents. iio: adc: max1027: Reset the device at probe time Bluetooth: hci_core: fix init for HCI_USER_CHANNEL x86/mce: Lower throttling MCE messages' priority to warning drm/gma500: fix memory disclosures due to uninitialized bytes rtl8xxxu: fix RTL8723BU connection failure issue after warm reboot x86/ioapic: Prevent inconsistent state when moving an interrupt arm64: psci: Reduce the waiting time for cpu_psci_cpu_kill() libata: Ensure ata_port probe has completed before detach pinctrl: sh-pfc: sh7734: Fix duplicate TCLK1_B Bluetooth: Fix advertising duplicated flags bnx2x: Fix PF-VF communication over multi-cos queues. spi: img-spfi: fix potential double release ALSA: timer: Limit max amount of slave instances rtlwifi: fix memory leak in rtl92c_set_fw_rsvdpagepkt() perf probe: Fix to find range-only function instance perf probe: Fix to list probe event with correct line number perf probe: Walk function lines in lexical blocks perf probe: Fix to probe an inline function which has no entry pc perf probe: Fix to show ranges of variables in functions without entry_pc perf probe: Fix to show inlined function callsite without entry_pc perf probe: Fix to probe a function which has no entry pc perf probe: Skip overlapped location on searching variables perf probe: Return a better scope DIE if there is no best scope perf probe: Fix to show calling lines of inlined functions perf probe: Skip end-of-sequence and non statement lines perf probe: Filter out instances except for inlined subroutine and subprogram ath10k: fix get invalid tx rate for Mesh metric media: pvrusb2: Fix oops on tear-down when radio support is not present media: si470x-i2c: add missed operations in remove EDAC/ghes: Fix grain calculation spi: pxa2xx: Add missed security checks ASoC: rt5677: Mark reg RT5677_PWR_ANLG2 as volatile s390/disassembler: don't hide instruction addresses parport: load lowlevel driver if ports not found cpufreq: Register drivers only after CPU devices have been registered x86/crash: Add a forward declaration of struct kimage iwlwifi: mvm: fix unaligned read of rx_pkt_status spi: tegra20-slink: add missed clk_unprepare mmc: tmio: Add MMC_CAP_ERASE to allow erase/discard/trim requests btrfs: don't prematurely free work in end_workqueue_fn() btrfs: don't prematurely free work in run_ordered_work() spi: st-ssc4: add missed pm_runtime_disable x86/insn: Add some Intel instructions to the opcode map iwlwifi: check kasprintf() return value fbtft: Make sure string is NULL terminated crypto: sun4i-ss - Fix 64-bit size_t warnings on sun4i-ss-hash.c crypto: vmx - Avoid weird build failures libtraceevent: Fix memory leakage in copy_filter_type net: phy: initialise phydev speed and duplex sanely btrfs: don't prematurely free work in reada_start_machine_worker() Revert "mmc: sdhci: Fix incorrect switch to HS mode" usb: xhci: Fix build warning seen with CONFIG_PM=n btrfs: don't double lock the subvol_sem for rename exchange btrfs: do not call synchronize_srcu() in inode_tree_del btrfs: return error pointer from alloc_test_extent_buffer btrfs: abort transaction after failed inode updates in create_subvol Btrfs: fix removal logic of the tree mod log that leads to use-after-free issues af_packet: set defaule value for tmo fjes: fix missed check in fjes_acpi_add mod_devicetable: fix PHY module format net: hisilicon: Fix a BUG trigered by wrong bytes_compl net: nfc: nci: fix a possible sleep-in-atomic-context bug in nci_uart_tty_receive() net: qlogic: Fix error paths in ql_alloc_large_buffers() net: usb: lan78xx: Fix suspend/resume PHY register access error sctp: fully initialize v4 addr in some functions net: dst: Force 4-byte alignment of dst_metrics usbip: Fix error path of vhci_recv_ret_submit() USB: EHCI: Do not return -EPIPE when hub is disconnected platform/x86: hp-wmi: Make buffer for HPWMI_FEATURE2_QUERY 128 bytes staging: comedi: gsc_hpdi: check dma_alloc_coherent() return value ext4: fix ext4_empty_dir() for directories with holes ext4: check for directory entries too close to block end powerpc/irq: fix stack overflow verification mmc: sdhci-of-esdhc: fix P2020 errata handling perf probe: Fix to show function entry line as probe-able scsi: mpt3sas: Fix clear pending bit in ioctl status scsi: lpfc: Fix locking on mailbox command completion Input: atmel_mxt_ts - disable IRQ across suspend iommu/tegra-smmu: Fix page tables in > 4 GiB memory scsi: target: compare full CHAP_A Algorithm strings scsi: lpfc: Fix SLI3 hba in loop mode not discovering devices scsi: csiostor: Don't enable IRQs too early powerpc/pseries: Mark accumulate_stolen_time() as notrace powerpc/pseries: Don't fail hash page table insert for bolted mapping dma-debug: add a schedule point in debug_dma_dump_mappings() clocksource/drivers/asm9260: Add a check for of_clk_get powerpc/security/book3s64: Report L1TF status in sysfs powerpc/book3s64/hash: Add cond_resched to avoid soft lockup warning jbd2: Fix statistics for the number of logged blocks scsi: tracing: Fix handling of TRANSFER LENGTH == 0 for READ(6) and WRITE(6) scsi: lpfc: Fix duplicate unreg_rpi error in port offline flow clk: qcom: Allow constant ratio freq tables for rcg irqchip/irq-bcm7038-l1: Enable parent IRQ if necessary irqchip: ingenic: Error out if IRQ domain creation failed fs/quota: handle overflows of sysctl fs.quota.* and report as unsigned long scsi: lpfc: fix: Coverity: lpfc_cmpl_els_rsp(): Null pointer dereferences scsi: ufs: fix potential bug which ends in system hang powerpc/pseries/cmm: Implement release() function for sysfs device powerpc/security: Fix wrong message when RFI Flush is disable scsi: atari_scsi: sun3_scsi: Set sg_tablesize to 1 instead of SG_NONE clk: pxa: fix one of the pxa RTC clocks bcache: at least try to shrink 1 node in bch_mca_scan() HID: Improve Windows Precision Touchpad detection. ext4: work around deleting a file with i_nlink == 0 safely scsi: pm80xx: Fix for SATA device discovery scsi: scsi_debug: num_tgts must be >= 0 scsi: target: iscsi: Wait for all commands to finish before freeing a session gpio: mpc8xxx: Don't overwrite default irq_set_type callback scripts/kallsyms: fix definitely-lost memory leak cdrom: respect device capabilities during opening action perf regs: Make perf_reg_name() return "unknown" instead of NULL libfdt: define INT32_MAX and UINT32_MAX in libfdt_env.h s390/cpum_sf: Check for SDBT and SDB consistency ocfs2: fix passing zero to 'PTR_ERR' warning kernel: sysctl: make drop_caches write-only x86/mce: Fix possibly incorrect severity calculation on AMD net, sysctl: Fix compiler warning when only cBPF is present ALSA: hda - Downgrade error message for single-cmd fallback perf strbuf: Remove redundant va_end() in strbuf_addv() Make filldir[64]() verify the directory entry filename is valid filldir[64]: remove WARN_ON_ONCE() for bad directory entries netfilter: ebtables: compat: reject all padding in matches/watchers 6pack,mkiss: fix possible deadlock netfilter: bridge: make sure to pull arp header in br_nf_forward_arp() net: icmp: fix data-race in cmp_global_allow() hrtimer: Annotate lockless access to timer->state tty/serial: atmel: fix out of range clock divider handling pinctrl: baytrail: Really serialize all register accesses mmc: sdhci: Update the tuning failed messages to pr_debug level net: ena: fix napi handler misbehavior when the napi budget is zero vhost/vsock: accept only packets with the right dst_cid tcp/dccp: fix possible race __inet_lookup_established() tcp: do not send empty skb from tcp_write_xmit() gtp: fix wrong condition in gtp_genl_dump_pdp() gtp: avoid zero size hashtable Linux 4.9.208 Signed-off-by: Greg Kroah-Hartman <gregkh@google.com>
467 lines
11 KiB
C
467 lines
11 KiB
C
/*******************************************************************************
|
|
* This file houses the main functions for the iSCSI CHAP support
|
|
*
|
|
* (c) Copyright 2007-2013 Datera, Inc.
|
|
*
|
|
* Author: Nicholas A. Bellinger <nab@linux-iscsi.org>
|
|
*
|
|
* This program is free software; you can redistribute it and/or modify
|
|
* it under the terms of the GNU General Public License as published by
|
|
* the Free Software Foundation; either version 2 of the License, or
|
|
* (at your option) any later version.
|
|
*
|
|
* This program is distributed in the hope that it will be useful,
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
|
|
* GNU General Public License for more details.
|
|
******************************************************************************/
|
|
|
|
#include <crypto/hash.h>
|
|
#include <linux/kernel.h>
|
|
#include <linux/string.h>
|
|
#include <linux/err.h>
|
|
#include <linux/scatterlist.h>
|
|
|
|
#include <target/iscsi/iscsi_target_core.h>
|
|
#include "iscsi_target_nego.h"
|
|
#include "iscsi_target_auth.h"
|
|
|
|
static void chap_gen_challenge(
|
|
struct iscsi_conn *conn,
|
|
int caller,
|
|
char *c_str,
|
|
unsigned int *c_len)
|
|
{
|
|
unsigned char challenge_asciihex[CHAP_CHALLENGE_LENGTH * 2 + 1];
|
|
struct iscsi_chap *chap = conn->auth_protocol;
|
|
|
|
memset(challenge_asciihex, 0, CHAP_CHALLENGE_LENGTH * 2 + 1);
|
|
|
|
get_random_bytes(chap->challenge, CHAP_CHALLENGE_LENGTH);
|
|
bin2hex(challenge_asciihex, chap->challenge,
|
|
CHAP_CHALLENGE_LENGTH);
|
|
/*
|
|
* Set CHAP_C, and copy the generated challenge into c_str.
|
|
*/
|
|
*c_len += sprintf(c_str + *c_len, "CHAP_C=0x%s", challenge_asciihex);
|
|
*c_len += 1;
|
|
|
|
pr_debug("[%s] Sending CHAP_C=0x%s\n\n", (caller) ? "server" : "client",
|
|
challenge_asciihex);
|
|
}
|
|
|
|
static int chap_check_algorithm(const char *a_str)
|
|
{
|
|
char *tmp, *orig, *token;
|
|
|
|
tmp = kstrdup(a_str, GFP_KERNEL);
|
|
if (!tmp) {
|
|
pr_err("Memory allocation failed for CHAP_A temporary buffer\n");
|
|
return CHAP_DIGEST_UNKNOWN;
|
|
}
|
|
orig = tmp;
|
|
|
|
token = strsep(&tmp, "=");
|
|
if (!token)
|
|
goto out;
|
|
|
|
if (strcmp(token, "CHAP_A")) {
|
|
pr_err("Unable to locate CHAP_A key\n");
|
|
goto out;
|
|
}
|
|
while (token) {
|
|
token = strsep(&tmp, ",");
|
|
if (!token)
|
|
goto out;
|
|
|
|
if (!strcmp(token, "5")) {
|
|
pr_debug("Selected MD5 Algorithm\n");
|
|
kfree(orig);
|
|
return CHAP_DIGEST_MD5;
|
|
}
|
|
}
|
|
out:
|
|
kfree(orig);
|
|
return CHAP_DIGEST_UNKNOWN;
|
|
}
|
|
|
|
static struct iscsi_chap *chap_server_open(
|
|
struct iscsi_conn *conn,
|
|
struct iscsi_node_auth *auth,
|
|
const char *a_str,
|
|
char *aic_str,
|
|
unsigned int *aic_len)
|
|
{
|
|
int ret;
|
|
struct iscsi_chap *chap;
|
|
|
|
if (!(auth->naf_flags & NAF_USERID_SET) ||
|
|
!(auth->naf_flags & NAF_PASSWORD_SET)) {
|
|
pr_err("CHAP user or password not set for"
|
|
" Initiator ACL\n");
|
|
return NULL;
|
|
}
|
|
|
|
conn->auth_protocol = kzalloc(sizeof(struct iscsi_chap), GFP_KERNEL);
|
|
if (!conn->auth_protocol)
|
|
return NULL;
|
|
|
|
chap = conn->auth_protocol;
|
|
ret = chap_check_algorithm(a_str);
|
|
switch (ret) {
|
|
case CHAP_DIGEST_MD5:
|
|
pr_debug("[server] Got CHAP_A=5\n");
|
|
/*
|
|
* Send back CHAP_A set to MD5.
|
|
*/
|
|
*aic_len = sprintf(aic_str, "CHAP_A=5");
|
|
*aic_len += 1;
|
|
chap->digest_type = CHAP_DIGEST_MD5;
|
|
pr_debug("[server] Sending CHAP_A=%d\n", chap->digest_type);
|
|
break;
|
|
case CHAP_DIGEST_UNKNOWN:
|
|
default:
|
|
pr_err("Unsupported CHAP_A value\n");
|
|
return NULL;
|
|
}
|
|
|
|
/*
|
|
* Set Identifier.
|
|
*/
|
|
chap->id = conn->tpg->tpg_chap_id++;
|
|
*aic_len += sprintf(aic_str + *aic_len, "CHAP_I=%d", chap->id);
|
|
*aic_len += 1;
|
|
pr_debug("[server] Sending CHAP_I=%d\n", chap->id);
|
|
/*
|
|
* Generate Challenge.
|
|
*/
|
|
chap_gen_challenge(conn, 1, aic_str, aic_len);
|
|
|
|
return chap;
|
|
}
|
|
|
|
static void chap_close(struct iscsi_conn *conn)
|
|
{
|
|
kfree(conn->auth_protocol);
|
|
conn->auth_protocol = NULL;
|
|
}
|
|
|
|
static int chap_server_compute_md5(
|
|
struct iscsi_conn *conn,
|
|
struct iscsi_node_auth *auth,
|
|
char *nr_in_ptr,
|
|
char *nr_out_ptr,
|
|
unsigned int *nr_out_len)
|
|
{
|
|
unsigned long id;
|
|
unsigned char id_as_uchar;
|
|
unsigned char digest[MD5_SIGNATURE_SIZE];
|
|
unsigned char type, response[MD5_SIGNATURE_SIZE * 2 + 2];
|
|
unsigned char identifier[10], *challenge = NULL;
|
|
unsigned char *challenge_binhex = NULL;
|
|
unsigned char client_digest[MD5_SIGNATURE_SIZE];
|
|
unsigned char server_digest[MD5_SIGNATURE_SIZE];
|
|
unsigned char chap_n[MAX_CHAP_N_SIZE], chap_r[MAX_RESPONSE_LENGTH];
|
|
size_t compare_len;
|
|
struct iscsi_chap *chap = conn->auth_protocol;
|
|
struct crypto_shash *tfm = NULL;
|
|
struct shash_desc *desc = NULL;
|
|
int auth_ret = -1, ret, challenge_len;
|
|
|
|
memset(identifier, 0, 10);
|
|
memset(chap_n, 0, MAX_CHAP_N_SIZE);
|
|
memset(chap_r, 0, MAX_RESPONSE_LENGTH);
|
|
memset(digest, 0, MD5_SIGNATURE_SIZE);
|
|
memset(response, 0, MD5_SIGNATURE_SIZE * 2 + 2);
|
|
memset(client_digest, 0, MD5_SIGNATURE_SIZE);
|
|
memset(server_digest, 0, MD5_SIGNATURE_SIZE);
|
|
|
|
challenge = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL);
|
|
if (!challenge) {
|
|
pr_err("Unable to allocate challenge buffer\n");
|
|
goto out;
|
|
}
|
|
|
|
challenge_binhex = kzalloc(CHAP_CHALLENGE_STR_LEN, GFP_KERNEL);
|
|
if (!challenge_binhex) {
|
|
pr_err("Unable to allocate challenge_binhex buffer\n");
|
|
goto out;
|
|
}
|
|
/*
|
|
* Extract CHAP_N.
|
|
*/
|
|
if (extract_param(nr_in_ptr, "CHAP_N", MAX_CHAP_N_SIZE, chap_n,
|
|
&type) < 0) {
|
|
pr_err("Could not find CHAP_N.\n");
|
|
goto out;
|
|
}
|
|
if (type == HEX) {
|
|
pr_err("Could not find CHAP_N.\n");
|
|
goto out;
|
|
}
|
|
|
|
/* Include the terminating NULL in the compare */
|
|
compare_len = strlen(auth->userid) + 1;
|
|
if (strncmp(chap_n, auth->userid, compare_len) != 0) {
|
|
pr_err("CHAP_N values do not match!\n");
|
|
goto out;
|
|
}
|
|
pr_debug("[server] Got CHAP_N=%s\n", chap_n);
|
|
/*
|
|
* Extract CHAP_R.
|
|
*/
|
|
if (extract_param(nr_in_ptr, "CHAP_R", MAX_RESPONSE_LENGTH, chap_r,
|
|
&type) < 0) {
|
|
pr_err("Could not find CHAP_R.\n");
|
|
goto out;
|
|
}
|
|
if (type != HEX) {
|
|
pr_err("Could not find CHAP_R.\n");
|
|
goto out;
|
|
}
|
|
if (strlen(chap_r) != MD5_SIGNATURE_SIZE * 2) {
|
|
pr_err("Malformed CHAP_R\n");
|
|
goto out;
|
|
}
|
|
if (hex2bin(client_digest, chap_r, MD5_SIGNATURE_SIZE) < 0) {
|
|
pr_err("Malformed CHAP_R\n");
|
|
goto out;
|
|
}
|
|
|
|
pr_debug("[server] Got CHAP_R=%s\n", chap_r);
|
|
|
|
tfm = crypto_alloc_shash("md5", 0, 0);
|
|
if (IS_ERR(tfm)) {
|
|
tfm = NULL;
|
|
pr_err("Unable to allocate struct crypto_shash\n");
|
|
goto out;
|
|
}
|
|
|
|
desc = kmalloc(sizeof(*desc) + crypto_shash_descsize(tfm), GFP_KERNEL);
|
|
if (!desc) {
|
|
pr_err("Unable to allocate struct shash_desc\n");
|
|
goto out;
|
|
}
|
|
|
|
desc->tfm = tfm;
|
|
desc->flags = 0;
|
|
|
|
ret = crypto_shash_init(desc);
|
|
if (ret < 0) {
|
|
pr_err("crypto_shash_init() failed\n");
|
|
goto out;
|
|
}
|
|
|
|
ret = crypto_shash_update(desc, &chap->id, 1);
|
|
if (ret < 0) {
|
|
pr_err("crypto_shash_update() failed for id\n");
|
|
goto out;
|
|
}
|
|
|
|
ret = crypto_shash_update(desc, (char *)&auth->password,
|
|
strlen(auth->password));
|
|
if (ret < 0) {
|
|
pr_err("crypto_shash_update() failed for password\n");
|
|
goto out;
|
|
}
|
|
|
|
ret = crypto_shash_finup(desc, chap->challenge,
|
|
CHAP_CHALLENGE_LENGTH, server_digest);
|
|
if (ret < 0) {
|
|
pr_err("crypto_shash_finup() failed for challenge\n");
|
|
goto out;
|
|
}
|
|
|
|
bin2hex(response, server_digest, MD5_SIGNATURE_SIZE);
|
|
pr_debug("[server] MD5 Server Digest: %s\n", response);
|
|
|
|
if (memcmp(server_digest, client_digest, MD5_SIGNATURE_SIZE) != 0) {
|
|
pr_debug("[server] MD5 Digests do not match!\n\n");
|
|
goto out;
|
|
} else
|
|
pr_debug("[server] MD5 Digests match, CHAP connection"
|
|
" successful.\n\n");
|
|
/*
|
|
* One way authentication has succeeded, return now if mutual
|
|
* authentication is not enabled.
|
|
*/
|
|
if (!auth->authenticate_target) {
|
|
auth_ret = 0;
|
|
goto out;
|
|
}
|
|
/*
|
|
* Get CHAP_I.
|
|
*/
|
|
if (extract_param(nr_in_ptr, "CHAP_I", 10, identifier, &type) < 0) {
|
|
pr_err("Could not find CHAP_I.\n");
|
|
goto out;
|
|
}
|
|
|
|
if (type == HEX)
|
|
ret = kstrtoul(&identifier[2], 0, &id);
|
|
else
|
|
ret = kstrtoul(identifier, 0, &id);
|
|
|
|
if (ret < 0) {
|
|
pr_err("kstrtoul() failed for CHAP identifier: %d\n", ret);
|
|
goto out;
|
|
}
|
|
if (id > 255) {
|
|
pr_err("chap identifier: %lu greater than 255\n", id);
|
|
goto out;
|
|
}
|
|
/*
|
|
* RFC 1994 says Identifier is no more than octet (8 bits).
|
|
*/
|
|
pr_debug("[server] Got CHAP_I=%lu\n", id);
|
|
/*
|
|
* Get CHAP_C.
|
|
*/
|
|
if (extract_param(nr_in_ptr, "CHAP_C", CHAP_CHALLENGE_STR_LEN,
|
|
challenge, &type) < 0) {
|
|
pr_err("Could not find CHAP_C.\n");
|
|
goto out;
|
|
}
|
|
|
|
if (type != HEX) {
|
|
pr_err("Could not find CHAP_C.\n");
|
|
goto out;
|
|
}
|
|
challenge_len = DIV_ROUND_UP(strlen(challenge), 2);
|
|
if (!challenge_len) {
|
|
pr_err("Unable to convert incoming challenge\n");
|
|
goto out;
|
|
}
|
|
if (challenge_len > 1024) {
|
|
pr_err("CHAP_C exceeds maximum binary size of 1024 bytes\n");
|
|
goto out;
|
|
}
|
|
if (hex2bin(challenge_binhex, challenge, challenge_len) < 0) {
|
|
pr_err("Malformed CHAP_C\n");
|
|
goto out;
|
|
}
|
|
pr_debug("[server] Got CHAP_C=%s\n", challenge);
|
|
/*
|
|
* During mutual authentication, the CHAP_C generated by the
|
|
* initiator must not match the original CHAP_C generated by
|
|
* the target.
|
|
*/
|
|
if (!memcmp(challenge_binhex, chap->challenge, CHAP_CHALLENGE_LENGTH)) {
|
|
pr_err("initiator CHAP_C matches target CHAP_C, failing"
|
|
" login attempt\n");
|
|
goto out;
|
|
}
|
|
/*
|
|
* Generate CHAP_N and CHAP_R for mutual authentication.
|
|
*/
|
|
ret = crypto_shash_init(desc);
|
|
if (ret < 0) {
|
|
pr_err("crypto_shash_init() failed\n");
|
|
goto out;
|
|
}
|
|
|
|
/* To handle both endiannesses */
|
|
id_as_uchar = id;
|
|
ret = crypto_shash_update(desc, &id_as_uchar, 1);
|
|
if (ret < 0) {
|
|
pr_err("crypto_shash_update() failed for id\n");
|
|
goto out;
|
|
}
|
|
|
|
ret = crypto_shash_update(desc, auth->password_mutual,
|
|
strlen(auth->password_mutual));
|
|
if (ret < 0) {
|
|
pr_err("crypto_shash_update() failed for"
|
|
" password_mutual\n");
|
|
goto out;
|
|
}
|
|
/*
|
|
* Convert received challenge to binary hex.
|
|
*/
|
|
ret = crypto_shash_finup(desc, challenge_binhex, challenge_len,
|
|
digest);
|
|
if (ret < 0) {
|
|
pr_err("crypto_shash_finup() failed for ma challenge\n");
|
|
goto out;
|
|
}
|
|
|
|
/*
|
|
* Generate CHAP_N and CHAP_R.
|
|
*/
|
|
*nr_out_len = sprintf(nr_out_ptr, "CHAP_N=%s", auth->userid_mutual);
|
|
*nr_out_len += 1;
|
|
pr_debug("[server] Sending CHAP_N=%s\n", auth->userid_mutual);
|
|
/*
|
|
* Convert response from binary hex to ascii hext.
|
|
*/
|
|
bin2hex(response, digest, MD5_SIGNATURE_SIZE);
|
|
*nr_out_len += sprintf(nr_out_ptr + *nr_out_len, "CHAP_R=0x%s",
|
|
response);
|
|
*nr_out_len += 1;
|
|
pr_debug("[server] Sending CHAP_R=0x%s\n", response);
|
|
auth_ret = 0;
|
|
out:
|
|
kzfree(desc);
|
|
if (tfm)
|
|
crypto_free_shash(tfm);
|
|
kfree(challenge);
|
|
kfree(challenge_binhex);
|
|
return auth_ret;
|
|
}
|
|
|
|
static int chap_got_response(
|
|
struct iscsi_conn *conn,
|
|
struct iscsi_node_auth *auth,
|
|
char *nr_in_ptr,
|
|
char *nr_out_ptr,
|
|
unsigned int *nr_out_len)
|
|
{
|
|
struct iscsi_chap *chap = conn->auth_protocol;
|
|
|
|
switch (chap->digest_type) {
|
|
case CHAP_DIGEST_MD5:
|
|
if (chap_server_compute_md5(conn, auth, nr_in_ptr,
|
|
nr_out_ptr, nr_out_len) < 0)
|
|
return -1;
|
|
return 0;
|
|
default:
|
|
pr_err("Unknown CHAP digest type %d!\n",
|
|
chap->digest_type);
|
|
return -1;
|
|
}
|
|
}
|
|
|
|
u32 chap_main_loop(
|
|
struct iscsi_conn *conn,
|
|
struct iscsi_node_auth *auth,
|
|
char *in_text,
|
|
char *out_text,
|
|
int *in_len,
|
|
int *out_len)
|
|
{
|
|
struct iscsi_chap *chap = conn->auth_protocol;
|
|
|
|
if (!chap) {
|
|
chap = chap_server_open(conn, auth, in_text, out_text, out_len);
|
|
if (!chap)
|
|
return 2;
|
|
chap->chap_state = CHAP_STAGE_SERVER_AIC;
|
|
return 0;
|
|
} else if (chap->chap_state == CHAP_STAGE_SERVER_AIC) {
|
|
convert_null_to_semi(in_text, *in_len);
|
|
if (chap_got_response(conn, auth, in_text, out_text,
|
|
out_len) < 0) {
|
|
chap_close(conn);
|
|
return 2;
|
|
}
|
|
if (auth->authenticate_target)
|
|
chap->chap_state = CHAP_STAGE_SERVER_NR;
|
|
else
|
|
*out_len = 0;
|
|
chap_close(conn);
|
|
return 1;
|
|
}
|
|
|
|
return 2;
|
|
}
|