FreeBSD/Linux Kernel Cross Reference
sys/rpc/auth.h
1 /* $NetBSD: auth.h,v 1.15 2000/06/02 22:57:55 fvdl Exp $ */
2
3 /*-
4 * Copyright (c) 2009, Sun Microsystems, Inc.
5 * All rights reserved.
6 *
7 * Redistribution and use in source and binary forms, with or without
8 * modification, are permitted provided that the following conditions are met:
9 * - Redistributions of source code must retain the above copyright notice,
10 * this list of conditions and the following disclaimer.
11 * - Redistributions in binary form must reproduce the above copyright notice,
12 * this list of conditions and the following disclaimer in the documentation
13 * and/or other materials provided with the distribution.
14 * - Neither the name of Sun Microsystems, Inc. nor the names of its
15 * contributors may be used to endorse or promote products derived
16 * from this software without specific prior written permission.
17 *
18 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28 * POSSIBILITY OF SUCH DAMAGE.
29 *
30 * from: @(#)auth.h 1.17 88/02/08 SMI
31 * from: @(#)auth.h 2.3 88/08/07 4.0 RPCSRC
32 * from: @(#)auth.h 1.43 98/02/02 SMI
33 * $FreeBSD$
34 */
35
36 /*
37 * auth.h, Authentication interface.
38 *
39 * Copyright (C) 1984, Sun Microsystems, Inc.
40 *
41 * The data structures are completely opaque to the client. The client
42 * is required to pass an AUTH * to routines that create rpc
43 * "sessions".
44 */
45
46 #ifndef _RPC_AUTH_H
47 #define _RPC_AUTH_H
48 #include <rpc/xdr.h>
49 #include <rpc/clnt_stat.h>
50 #include <sys/cdefs.h>
51 #include <sys/socket.h>
52
53 #define MAX_AUTH_BYTES 400
54 #define MAXNETNAMELEN 255 /* maximum length of network user's name */
55
56 /*
57 * Client side authentication/security data
58 */
59
60 typedef struct sec_data {
61 u_int secmod; /* security mode number e.g. in nfssec.conf */
62 u_int rpcflavor; /* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */
63 int flags; /* AUTH_F_xxx flags */
64 caddr_t data; /* opaque data per flavor */
65 } sec_data_t;
66
67 #ifdef _SYSCALL32_IMPL
68 struct sec_data32 {
69 uint32_t secmod; /* security mode number e.g. in nfssec.conf */
70 uint32_t rpcflavor; /* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */
71 int32_t flags; /* AUTH_F_xxx flags */
72 caddr32_t data; /* opaque data per flavor */
73 };
74 #endif /* _SYSCALL32_IMPL */
75
76 /*
77 * AUTH_DES flavor specific data from sec_data opaque data field.
78 * AUTH_KERB has the same structure.
79 */
80 typedef struct des_clnt_data {
81 struct netbuf syncaddr; /* time sync addr */
82 struct knetconfig *knconf; /* knetconfig info that associated */
83 /* with the syncaddr. */
84 char *netname; /* server's netname */
85 int netnamelen; /* server's netname len */
86 } dh_k4_clntdata_t;
87
88 #ifdef _SYSCALL32_IMPL
89 struct des_clnt_data32 {
90 struct netbuf32 syncaddr; /* time sync addr */
91 caddr32_t knconf; /* knetconfig info that associated */
92 /* with the syncaddr. */
93 caddr32_t netname; /* server's netname */
94 int32_t netnamelen; /* server's netname len */
95 };
96 #endif /* _SYSCALL32_IMPL */
97
98 #ifdef KERBEROS
99 /*
100 * flavor specific data to hold the data for AUTH_DES/AUTH_KERB(v4)
101 * in sec_data->data opaque field.
102 */
103 typedef struct krb4_svc_data {
104 int window; /* window option value */
105 } krb4_svcdata_t;
106
107 typedef struct krb4_svc_data des_svcdata_t;
108 #endif /* KERBEROS */
109
110 /*
111 * authentication/security specific flags
112 */
113 #define AUTH_F_RPCTIMESYNC 0x001 /* use RPC to do time sync */
114 #define AUTH_F_TRYNONE 0x002 /* allow fall back to AUTH_NONE */
115
116
117 /*
118 * Status returned from authentication check
119 */
120 enum auth_stat {
121 AUTH_OK=0,
122 /*
123 * failed at remote end
124 */
125 AUTH_BADCRED=1, /* bogus credentials (seal broken) */
126 AUTH_REJECTEDCRED=2, /* client should begin new session */
127 AUTH_BADVERF=3, /* bogus verifier (seal broken) */
128 AUTH_REJECTEDVERF=4, /* verifier expired or was replayed */
129 AUTH_TOOWEAK=5, /* rejected due to security reasons */
130 /*
131 * failed locally
132 */
133 AUTH_INVALIDRESP=6, /* bogus response verifier */
134 AUTH_FAILED=7, /* some unknown reason */
135 #ifdef KERBEROS
136 /*
137 * kerberos errors
138 */
139 ,
140 AUTH_KERB_GENERIC = 8, /* kerberos generic error */
141 AUTH_TIMEEXPIRE = 9, /* time of credential expired */
142 AUTH_TKT_FILE = 10, /* something wrong with ticket file */
143 AUTH_DECODE = 11, /* can't decode authenticator */
144 AUTH_NET_ADDR = 12, /* wrong net address in ticket */
145 #endif /* KERBEROS */
146 /*
147 * RPCSEC_GSS errors
148 */
149 RPCSEC_GSS_CREDPROBLEM = 13,
150 RPCSEC_GSS_CTXPROBLEM = 14,
151 RPCSEC_GSS_NODISPATCH = 0x8000000
152 };
153
154 union des_block {
155 struct {
156 uint32_t high;
157 uint32_t low;
158 } key;
159 char c[8];
160 };
161 typedef union des_block des_block;
162 __BEGIN_DECLS
163 extern bool_t xdr_des_block(XDR *, des_block *);
164 __END_DECLS
165
166 /*
167 * Authentication info. Opaque to client.
168 */
169 struct opaque_auth {
170 enum_t oa_flavor; /* flavor of auth */
171 caddr_t oa_base; /* address of more auth stuff */
172 u_int oa_length; /* not to exceed MAX_AUTH_BYTES */
173 };
174
175
176 /*
177 * Auth handle, interface to client side authenticators.
178 */
179 struct rpc_err;
180 typedef struct __auth {
181 struct opaque_auth ah_cred;
182 struct opaque_auth ah_verf;
183 union des_block ah_key;
184 struct auth_ops {
185 void (*ah_nextverf) (struct __auth *);
186 /* nextverf & serialize */
187 int (*ah_marshal) (struct __auth *, uint32_t, XDR *,
188 struct mbuf *);
189 /* validate verifier */
190 int (*ah_validate) (struct __auth *, uint32_t,
191 struct opaque_auth *, struct mbuf **);
192 /* refresh credentials */
193 int (*ah_refresh) (struct __auth *, void *);
194 /* destroy this structure */
195 void (*ah_destroy) (struct __auth *);
196 } *ah_ops;
197 void *ah_private;
198 } AUTH;
199
200
201 /*
202 * Authentication ops.
203 * The ops and the auth handle provide the interface to the authenticators.
204 *
205 * AUTH *auth;
206 * XDR *xdrs;
207 * struct opaque_auth verf;
208 */
209 #define AUTH_NEXTVERF(auth) \
210 ((*((auth)->ah_ops->ah_nextverf))(auth))
211
212 #define AUTH_MARSHALL(auth, xid, xdrs, args) \
213 ((*((auth)->ah_ops->ah_marshal))(auth, xid, xdrs, args))
214
215 #define AUTH_VALIDATE(auth, xid, verfp, resultsp) \
216 ((*((auth)->ah_ops->ah_validate))((auth), xid, verfp, resultsp))
217
218 #define AUTH_REFRESH(auth, msg) \
219 ((*((auth)->ah_ops->ah_refresh))(auth, msg))
220
221 #define AUTH_DESTROY(auth) \
222 ((*((auth)->ah_ops->ah_destroy))(auth))
223
224 __BEGIN_DECLS
225 extern struct opaque_auth _null_auth;
226 __END_DECLS
227
228 /*
229 * These are the various implementations of client side authenticators.
230 */
231
232 /*
233 * System style authentication
234 * AUTH *authunix_create(machname, uid, gid, len, aup_gids)
235 * char *machname;
236 * u_int uid;
237 * u_int gid;
238 * int len;
239 * u_int *aup_gids;
240 */
241 __BEGIN_DECLS
242 #ifdef _KERNEL
243 struct ucred;
244 extern AUTH *authunix_create(struct ucred *);
245 #else
246 extern AUTH *authunix_create(char *, u_int, u_int, int, u_int *);
247 extern AUTH *authunix_create_default(void); /* takes no parameters */
248 #endif
249 extern AUTH *authnone_create(void); /* takes no parameters */
250 __END_DECLS
251 /*
252 * DES style authentication
253 * AUTH *authsecdes_create(servername, window, timehost, ckey)
254 * char *servername; - network name of server
255 * u_int window; - time to live
256 * const char *timehost; - optional hostname to sync with
257 * des_block *ckey; - optional conversation key to use
258 */
259 __BEGIN_DECLS
260 extern AUTH *authdes_create (char *, u_int, struct sockaddr *, des_block *);
261 extern AUTH *authdes_seccreate (const char *, const u_int, const char *,
262 const des_block *);
263 __END_DECLS
264
265 __BEGIN_DECLS
266 extern bool_t xdr_opaque_auth (XDR *, struct opaque_auth *);
267 __END_DECLS
268
269 #define authsys_create(c,i1,i2,i3,ip) authunix_create((c),(i1),(i2),(i3),(ip))
270 #define authsys_create_default() authunix_create_default()
271
272 /*
273 * Netname manipulation routines.
274 */
275 __BEGIN_DECLS
276 extern int getnetname(char *);
277 extern int host2netname(char *, const char *, const char *);
278 extern int user2netname(char *, const uid_t, const char *);
279 extern int netname2user(char *, uid_t *, gid_t *, int *, gid_t *);
280 extern int netname2host(char *, char *, const int);
281 extern void passwd2des ( char *, char * );
282 __END_DECLS
283
284 /*
285 *
286 * These routines interface to the keyserv daemon
287 *
288 */
289 __BEGIN_DECLS
290 extern int key_decryptsession(const char *, des_block *);
291 extern int key_encryptsession(const char *, des_block *);
292 extern int key_gendes(des_block *);
293 extern int key_setsecret(const char *);
294 extern int key_secretkey_is_set(void);
295 __END_DECLS
296
297 /*
298 * Publickey routines.
299 */
300 __BEGIN_DECLS
301 extern int getpublickey (const char *, char *);
302 extern int getpublicandprivatekey (const char *, char *);
303 extern int getsecretkey (char *, char *, char *);
304 __END_DECLS
305
306 #ifdef KERBEROS
307 /*
308 * Kerberos style authentication
309 * AUTH *authkerb_seccreate(service, srv_inst, realm, window, timehost, status)
310 * const char *service; - service name
311 * const char *srv_inst; - server instance
312 * const char *realm; - server realm
313 * const u_int window; - time to live
314 * const char *timehost; - optional hostname to sync with
315 * int *status; - kerberos status returned
316 */
317 __BEGIN_DECLS
318 extern AUTH *authkerb_seccreate(const char *, const char *, const char *,
319 const u_int, const char *, int *);
320 __END_DECLS
321
322 /*
323 * Map a kerberos credential into a unix cred.
324 *
325 * authkerb_getucred(rqst, uid, gid, grouplen, groups)
326 * const struct svc_req *rqst; - request pointer
327 * uid_t *uid;
328 * gid_t *gid;
329 * short *grouplen;
330 * int *groups;
331 *
332 */
333 __BEGIN_DECLS
334 extern int authkerb_getucred(/* struct svc_req *, uid_t *, gid_t *,
335 short *, int * */);
336 __END_DECLS
337 #endif /* KERBEROS */
338
339 __BEGIN_DECLS
340 struct svc_req;
341 struct rpc_msg;
342 enum auth_stat _svcauth_null (struct svc_req *, struct rpc_msg *);
343 enum auth_stat _svcauth_short (struct svc_req *, struct rpc_msg *);
344 enum auth_stat _svcauth_unix (struct svc_req *, struct rpc_msg *);
345 __END_DECLS
346
347 #define AUTH_NONE 0 /* no authentication */
348 #define AUTH_NULL 0 /* backward compatibility */
349 #define AUTH_SYS 1 /* unix style (uid, gids) */
350 #define AUTH_UNIX AUTH_SYS
351 #define AUTH_SHORT 2 /* short hand unix style */
352 #define AUTH_DH 3 /* for Diffie-Hellman mechanism */
353 #define AUTH_DES AUTH_DH /* for backward compatibility */
354 #define AUTH_KERB 4 /* kerberos style */
355 #define RPCSEC_GSS 6 /* RPCSEC_GSS */
356
357 /*
358 * Pseudo auth flavors for RPCSEC_GSS.
359 */
360 #define RPCSEC_GSS_KRB5 390003
361 #define RPCSEC_GSS_KRB5I 390004
362 #define RPCSEC_GSS_KRB5P 390005
363
364 #endif /* !_RPC_AUTH_H */
Cache object: 48d9a34f758d5b9d70251705d8935ddf
|