| // SPDX-License-Identifier: GPL-2.0-or-later | 
 |  | 
 | #include <linux/module.h> | 
 | #include <linux/kernel.h> | 
 | #include <linux/oid_registry.h> | 
 | #include "cifsglob.h" | 
 | #include "cifs_debug.h" | 
 | #include "cifsproto.h" | 
 | #include "cifs_spnego_negtokeninit.asn1.h" | 
 |  | 
 | int | 
 | decode_negTokenInit(unsigned char *security_blob, int length, | 
 | 		    struct TCP_Server_Info *server) | 
 | { | 
 | 	if (asn1_ber_decoder(&cifs_spnego_negtokeninit_decoder, server, | 
 | 			     security_blob, length) == 0) | 
 | 		return 1; | 
 | 	else | 
 | 		return 0; | 
 | } | 
 |  | 
 | int cifs_gssapi_this_mech(void *context, size_t hdrlen, | 
 | 			  unsigned char tag, const void *value, size_t vlen) | 
 | { | 
 | 	enum OID oid; | 
 |  | 
 | 	oid = look_up_OID(value, vlen); | 
 | 	if (oid != OID_spnego) { | 
 | 		char buf[50]; | 
 |  | 
 | 		sprint_oid(value, vlen, buf, sizeof(buf)); | 
 | 		cifs_dbg(FYI, "Error decoding negTokenInit header: unexpected OID %s\n", | 
 | 			 buf); | 
 | 		return -EBADMSG; | 
 | 	} | 
 | 	return 0; | 
 | } | 
 |  | 
 | int cifs_neg_token_init_mech_type(void *context, size_t hdrlen, | 
 | 				  unsigned char tag, | 
 | 				  const void *value, size_t vlen) | 
 | { | 
 | 	struct TCP_Server_Info *server = context; | 
 | 	enum OID oid; | 
 |  | 
 | 	oid = look_up_OID(value, vlen); | 
 | 	if (oid == OID_mskrb5) | 
 | 		server->sec_mskerberos = true; | 
 | 	else if (oid == OID_krb5u2u) | 
 | 		server->sec_kerberosu2u = true; | 
 | 	else if (oid == OID_krb5) | 
 | 		server->sec_kerberos = true; | 
 | 	else if (oid == OID_ntlmssp) | 
 | 		server->sec_ntlmssp = true; | 
 | 	else { | 
 | 		char buf[50]; | 
 |  | 
 | 		sprint_oid(value, vlen, buf, sizeof(buf)); | 
 | 		cifs_dbg(FYI, "Decoding negTokenInit: unsupported OID %s\n", | 
 | 			 buf); | 
 | 	} | 
 | 	return 0; | 
 | } |