FreeBSD/Linux Kernel Cross Reference
sys/rpc/auth.h
1 /* $NetBSD: auth.h,v 1.15 2000/06/02 22:57:55 fvdl Exp $ */
2
3 /*
4 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
5 * unrestricted use provided that this legend is included on all tape
6 * media and as a part of the software program in whole or part. Users
7 * may copy or modify Sun RPC without charge, but are not authorized
8 * to license or distribute it to anyone else except as part of a product or
9 * program developed by the user.
10 *
11 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
12 * WARRANTIES OF DESIGN, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
13 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
14 *
15 * Sun RPC is provided with no support and without any obligation on the
16 * part of Sun Microsystems, Inc. to assist in its use, correction,
17 * modification or enhancement.
18 *
19 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
20 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
21 * OR ANY PART THEREOF.
22 *
23 * In no event will Sun Microsystems, Inc. be liable for any lost revenue
24 * or profits or other special, indirect and consequential damages, even if
25 * Sun has been advised of the possibility of such damages.
26 *
27 * Sun Microsystems, Inc.
28 * 2550 Garcia Avenue
29 * Mountain View, California 94043
30 *
31 * from: @(#)auth.h 1.17 88/02/08 SMI
32 * from: @(#)auth.h 2.3 88/08/07 4.0 RPCSRC
33 * from: @(#)auth.h 1.43 98/02/02 SMI
34 * $FreeBSD$
35 */
36
37 /*
38 * auth.h, Authentication interface.
39 *
40 * Copyright (C) 1984, Sun Microsystems, Inc.
41 *
42 * The data structures are completely opaque to the client. The client
43 * is required to pass an AUTH * to routines that create rpc
44 * "sessions".
45 */
46
47 #ifndef _RPC_AUTH_H
48 #define _RPC_AUTH_H
49 #include <rpc/xdr.h>
50 #include <rpc/clnt_stat.h>
51 #include <sys/cdefs.h>
52 #include <sys/socket.h>
53
54 #define MAX_AUTH_BYTES 400
55 #define MAXNETNAMELEN 255 /* maximum length of network user's name */
56
57 /*
58 * Client side authentication/security data
59 */
60
61 typedef struct sec_data {
62 u_int secmod; /* security mode number e.g. in nfssec.conf */
63 u_int rpcflavor; /* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */
64 int flags; /* AUTH_F_xxx flags */
65 caddr_t data; /* opaque data per flavor */
66 } sec_data_t;
67
68 #ifdef _SYSCALL32_IMPL
69 struct sec_data32 {
70 uint32_t secmod; /* security mode number e.g. in nfssec.conf */
71 uint32_t rpcflavor; /* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */
72 int32_t flags; /* AUTH_F_xxx flags */
73 caddr32_t data; /* opaque data per flavor */
74 };
75 #endif /* _SYSCALL32_IMPL */
76
77 /*
78 * AUTH_DES flavor specific data from sec_data opaque data field.
79 * AUTH_KERB has the same structure.
80 */
81 typedef struct des_clnt_data {
82 struct netbuf syncaddr; /* time sync addr */
83 struct knetconfig *knconf; /* knetconfig info that associated */
84 /* with the syncaddr. */
85 char *netname; /* server's netname */
86 int netnamelen; /* server's netname len */
87 } dh_k4_clntdata_t;
88
89 #ifdef _SYSCALL32_IMPL
90 struct des_clnt_data32 {
91 struct netbuf32 syncaddr; /* time sync addr */
92 caddr32_t knconf; /* knetconfig info that associated */
93 /* with the syncaddr. */
94 caddr32_t netname; /* server's netname */
95 int32_t netnamelen; /* server's netname len */
96 };
97 #endif /* _SYSCALL32_IMPL */
98
99 #ifdef KERBEROS
100 /*
101 * flavor specific data to hold the data for AUTH_DES/AUTH_KERB(v4)
102 * in sec_data->data opaque field.
103 */
104 typedef struct krb4_svc_data {
105 int window; /* window option value */
106 } krb4_svcdata_t;
107
108 typedef struct krb4_svc_data des_svcdata_t;
109 #endif /* KERBEROS */
110
111 /*
112 * authentication/security specific flags
113 */
114 #define AUTH_F_RPCTIMESYNC 0x001 /* use RPC to do time sync */
115 #define AUTH_F_TRYNONE 0x002 /* allow fall back to AUTH_NONE */
116
117
118 /*
119 * Status returned from authentication check
120 */
121 enum auth_stat {
122 AUTH_OK=0,
123 /*
124 * failed at remote end
125 */
126 AUTH_BADCRED=1, /* bogus credentials (seal broken) */
127 AUTH_REJECTEDCRED=2, /* client should begin new session */
128 AUTH_BADVERF=3, /* bogus verifier (seal broken) */
129 AUTH_REJECTEDVERF=4, /* verifier expired or was replayed */
130 AUTH_TOOWEAK=5, /* rejected due to security reasons */
131 /*
132 * failed locally
133 */
134 AUTH_INVALIDRESP=6, /* bogus response verifier */
135 AUTH_FAILED=7, /* some unknown reason */
136 #ifdef KERBEROS
137 /*
138 * kerberos errors
139 */
140 ,
141 AUTH_KERB_GENERIC = 8, /* kerberos generic error */
142 AUTH_TIMEEXPIRE = 9, /* time of credential expired */
143 AUTH_TKT_FILE = 10, /* something wrong with ticket file */
144 AUTH_DECODE = 11, /* can't decode authenticator */
145 AUTH_NET_ADDR = 12, /* wrong net address in ticket */
146 #endif /* KERBEROS */
147 /*
148 * RPCSEC_GSS errors
149 */
150 RPCSEC_GSS_CREDPROBLEM = 13,
151 RPCSEC_GSS_CTXPROBLEM = 14,
152 RPCSEC_GSS_NODISPATCH = 0x8000000
153 };
154
155 union des_block {
156 struct {
157 uint32_t high;
158 uint32_t low;
159 } key;
160 char c[8];
161 };
162 typedef union des_block des_block;
163 __BEGIN_DECLS
164 extern bool_t xdr_des_block(XDR *, des_block *);
165 __END_DECLS
166
167 /*
168 * Authentication info. Opaque to client.
169 */
170 struct opaque_auth {
171 enum_t oa_flavor; /* flavor of auth */
172 caddr_t oa_base; /* address of more auth stuff */
173 u_int oa_length; /* not to exceed MAX_AUTH_BYTES */
174 };
175
176
177 /*
178 * Auth handle, interface to client side authenticators.
179 */
180 struct rpc_err;
181 typedef struct __auth {
182 struct opaque_auth ah_cred;
183 struct opaque_auth ah_verf;
184 union des_block ah_key;
185 struct auth_ops {
186 void (*ah_nextverf) (struct __auth *);
187 /* nextverf & serialize */
188 int (*ah_marshal) (struct __auth *, uint32_t, XDR *,
189 struct mbuf *);
190 /* validate verifier */
191 int (*ah_validate) (struct __auth *, uint32_t,
192 struct opaque_auth *, struct mbuf **);
193 /* refresh credentials */
194 int (*ah_refresh) (struct __auth *, void *);
195 /* destroy this structure */
196 void (*ah_destroy) (struct __auth *);
197 } *ah_ops;
198 void *ah_private;
199 } AUTH;
200
201
202 /*
203 * Authentication ops.
204 * The ops and the auth handle provide the interface to the authenticators.
205 *
206 * AUTH *auth;
207 * XDR *xdrs;
208 * struct opaque_auth verf;
209 */
210 #define AUTH_NEXTVERF(auth) \
211 ((*((auth)->ah_ops->ah_nextverf))(auth))
212
213 #define AUTH_MARSHALL(auth, xid, xdrs, args) \
214 ((*((auth)->ah_ops->ah_marshal))(auth, xid, xdrs, args))
215
216 #define AUTH_VALIDATE(auth, xid, verfp, resultsp) \
217 ((*((auth)->ah_ops->ah_validate))((auth), xid, verfp, resultsp))
218
219 #define AUTH_REFRESH(auth, msg) \
220 ((*((auth)->ah_ops->ah_refresh))(auth, msg))
221
222 #define AUTH_DESTROY(auth) \
223 ((*((auth)->ah_ops->ah_destroy))(auth))
224
225 __BEGIN_DECLS
226 extern struct opaque_auth _null_auth;
227 __END_DECLS
228
229 /*
230 * These are the various implementations of client side authenticators.
231 */
232
233 /*
234 * System style authentication
235 * AUTH *authunix_create(machname, uid, gid, len, aup_gids)
236 * char *machname;
237 * int uid;
238 * int gid;
239 * int len;
240 * int *aup_gids;
241 */
242 __BEGIN_DECLS
243 #ifdef _KERNEL
244 struct ucred;
245 extern AUTH *authunix_create(struct ucred *);
246 #else
247 extern AUTH *authunix_create(char *, int, int, int,
248 int *);
249 extern AUTH *authunix_create_default(void); /* takes no parameters */
250 #endif
251 extern AUTH *authnone_create(void); /* takes no parameters */
252 __END_DECLS
253 /*
254 * DES style authentication
255 * AUTH *authsecdes_create(servername, window, timehost, ckey)
256 * char *servername; - network name of server
257 * u_int window; - time to live
258 * const char *timehost; - optional hostname to sync with
259 * des_block *ckey; - optional conversation key to use
260 */
261 __BEGIN_DECLS
262 extern AUTH *authdes_create (char *, u_int, struct sockaddr *, des_block *);
263 extern AUTH *authdes_seccreate (const char *, const u_int, const char *,
264 const des_block *);
265 __END_DECLS
266
267 __BEGIN_DECLS
268 extern bool_t xdr_opaque_auth (XDR *, struct opaque_auth *);
269 __END_DECLS
270
271 #define authsys_create(c,i1,i2,i3,ip) authunix_create((c),(i1),(i2),(i3),(ip))
272 #define authsys_create_default() authunix_create_default()
273
274 /*
275 * Netname manipulation routines.
276 */
277 __BEGIN_DECLS
278 extern int getnetname(char *);
279 extern int host2netname(char *, const char *, const char *);
280 extern int user2netname(char *, const uid_t, const char *);
281 extern int netname2user(char *, uid_t *, gid_t *, int *, gid_t *);
282 extern int netname2host(char *, char *, const int);
283 extern void passwd2des ( char *, char * );
284 __END_DECLS
285
286 /*
287 *
288 * These routines interface to the keyserv daemon
289 *
290 */
291 __BEGIN_DECLS
292 extern int key_decryptsession(const char *, des_block *);
293 extern int key_encryptsession(const char *, des_block *);
294 extern int key_gendes(des_block *);
295 extern int key_setsecret(const char *);
296 extern int key_secretkey_is_set(void);
297 __END_DECLS
298
299 /*
300 * Publickey routines.
301 */
302 __BEGIN_DECLS
303 extern int getpublickey (const char *, char *);
304 extern int getpublicandprivatekey (const char *, char *);
305 extern int getsecretkey (char *, char *, char *);
306 __END_DECLS
307
308 #ifdef KERBEROS
309 /*
310 * Kerberos style authentication
311 * AUTH *authkerb_seccreate(service, srv_inst, realm, window, timehost, status)
312 * const char *service; - service name
313 * const char *srv_inst; - server instance
314 * const char *realm; - server realm
315 * const u_int window; - time to live
316 * const char *timehost; - optional hostname to sync with
317 * int *status; - kerberos status returned
318 */
319 __BEGIN_DECLS
320 extern AUTH *authkerb_seccreate(const char *, const char *, const char *,
321 const u_int, const char *, int *);
322 __END_DECLS
323
324 /*
325 * Map a kerberos credential into a unix cred.
326 *
327 * authkerb_getucred(rqst, uid, gid, grouplen, groups)
328 * const struct svc_req *rqst; - request pointer
329 * uid_t *uid;
330 * gid_t *gid;
331 * short *grouplen;
332 * int *groups;
333 *
334 */
335 __BEGIN_DECLS
336 extern int authkerb_getucred(/* struct svc_req *, uid_t *, gid_t *,
337 short *, int * */);
338 __END_DECLS
339 #endif /* KERBEROS */
340
341 __BEGIN_DECLS
342 struct svc_req;
343 struct rpc_msg;
344 enum auth_stat _svcauth_null (struct svc_req *, struct rpc_msg *);
345 enum auth_stat _svcauth_short (struct svc_req *, struct rpc_msg *);
346 enum auth_stat _svcauth_unix (struct svc_req *, struct rpc_msg *);
347 __END_DECLS
348
349 #define AUTH_NONE 0 /* no authentication */
350 #define AUTH_NULL 0 /* backward compatibility */
351 #define AUTH_SYS 1 /* unix style (uid, gids) */
352 #define AUTH_UNIX AUTH_SYS
353 #define AUTH_SHORT 2 /* short hand unix style */
354 #define AUTH_DH 3 /* for Diffie-Hellman mechanism */
355 #define AUTH_DES AUTH_DH /* for backward compatibility */
356 #define AUTH_KERB 4 /* kerberos style */
357 #define RPCSEC_GSS 6 /* RPCSEC_GSS */
358
359 /*
360 * Pseudo auth flavors for RPCSEC_GSS.
361 */
362 #define RPCSEC_GSS_KRB5 390003
363 #define RPCSEC_GSS_KRB5I 390004
364 #define RPCSEC_GSS_KRB5P 390005
365
366 #endif /* !_RPC_AUTH_H */
Cache object: 49604b0bb8ae5b94f96c42b90cdb8642
|