1dfdcada3SDoug Rabson /* $NetBSD: auth.h,v 1.15 2000/06/02 22:57:55 fvdl Exp $ */ 2dfdcada3SDoug Rabson 32e322d37SHiroki Sato /*- 451369649SPedro F. Giffuni * SPDX-License-Identifier: BSD-3-Clause 551369649SPedro F. Giffuni * 62e322d37SHiroki Sato * Copyright (c) 2009, Sun Microsystems, Inc. 72e322d37SHiroki Sato * All rights reserved. 8dfdcada3SDoug Rabson * 92e322d37SHiroki Sato * Redistribution and use in source and binary forms, with or without 102e322d37SHiroki Sato * modification, are permitted provided that the following conditions are met: 112e322d37SHiroki Sato * - Redistributions of source code must retain the above copyright notice, 122e322d37SHiroki Sato * this list of conditions and the following disclaimer. 132e322d37SHiroki Sato * - Redistributions in binary form must reproduce the above copyright notice, 142e322d37SHiroki Sato * this list of conditions and the following disclaimer in the documentation 152e322d37SHiroki Sato * and/or other materials provided with the distribution. 162e322d37SHiroki Sato * - Neither the name of Sun Microsystems, Inc. nor the names of its 172e322d37SHiroki Sato * contributors may be used to endorse or promote products derived 182e322d37SHiroki Sato * from this software without specific prior written permission. 19dfdcada3SDoug Rabson * 202e322d37SHiroki Sato * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 212e322d37SHiroki Sato * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 222e322d37SHiroki Sato * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 232e322d37SHiroki Sato * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 242e322d37SHiroki Sato * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 252e322d37SHiroki Sato * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 262e322d37SHiroki Sato * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 272e322d37SHiroki Sato * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 282e322d37SHiroki Sato * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 292e322d37SHiroki Sato * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 302e322d37SHiroki Sato * POSSIBILITY OF SUCH DAMAGE. 31dfdcada3SDoug Rabson * 32dfdcada3SDoug Rabson * from: @(#)auth.h 1.17 88/02/08 SMI 33dfdcada3SDoug Rabson * from: @(#)auth.h 2.3 88/08/07 4.0 RPCSRC 34dfdcada3SDoug Rabson * from: @(#)auth.h 1.43 98/02/02 SMI 35dfdcada3SDoug Rabson * $FreeBSD$ 36dfdcada3SDoug Rabson */ 37dfdcada3SDoug Rabson 38dfdcada3SDoug Rabson /* 39dfdcada3SDoug Rabson * auth.h, Authentication interface. 40dfdcada3SDoug Rabson * 41dfdcada3SDoug Rabson * Copyright (C) 1984, Sun Microsystems, Inc. 42dfdcada3SDoug Rabson * 43dfdcada3SDoug Rabson * The data structures are completely opaque to the client. The client 44dfdcada3SDoug Rabson * is required to pass an AUTH * to routines that create rpc 45dfdcada3SDoug Rabson * "sessions". 46dfdcada3SDoug Rabson */ 47dfdcada3SDoug Rabson 48dfdcada3SDoug Rabson #ifndef _RPC_AUTH_H 49dfdcada3SDoug Rabson #define _RPC_AUTH_H 50dfdcada3SDoug Rabson #include <rpc/xdr.h> 51dfdcada3SDoug Rabson #include <rpc/clnt_stat.h> 52dfdcada3SDoug Rabson #include <sys/cdefs.h> 53dfdcada3SDoug Rabson #include <sys/socket.h> 54dfdcada3SDoug Rabson 55dfdcada3SDoug Rabson #define MAX_AUTH_BYTES 400 56dfdcada3SDoug Rabson #define MAXNETNAMELEN 255 /* maximum length of network user's name */ 57dfdcada3SDoug Rabson 58dfdcada3SDoug Rabson /* 59dfdcada3SDoug Rabson * Client side authentication/security data 60dfdcada3SDoug Rabson */ 61dfdcada3SDoug Rabson 62dfdcada3SDoug Rabson typedef struct sec_data { 63dfdcada3SDoug Rabson u_int secmod; /* security mode number e.g. in nfssec.conf */ 64dfdcada3SDoug Rabson u_int rpcflavor; /* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */ 65dfdcada3SDoug Rabson int flags; /* AUTH_F_xxx flags */ 66dfdcada3SDoug Rabson caddr_t data; /* opaque data per flavor */ 67dfdcada3SDoug Rabson } sec_data_t; 68dfdcada3SDoug Rabson 69dfdcada3SDoug Rabson #ifdef _SYSCALL32_IMPL 70dfdcada3SDoug Rabson struct sec_data32 { 71dfdcada3SDoug Rabson uint32_t secmod; /* security mode number e.g. in nfssec.conf */ 72dfdcada3SDoug Rabson uint32_t rpcflavor; /* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */ 73dfdcada3SDoug Rabson int32_t flags; /* AUTH_F_xxx flags */ 74dfdcada3SDoug Rabson caddr32_t data; /* opaque data per flavor */ 75dfdcada3SDoug Rabson }; 76dfdcada3SDoug Rabson #endif /* _SYSCALL32_IMPL */ 77dfdcada3SDoug Rabson 78dfdcada3SDoug Rabson /* 79dfdcada3SDoug Rabson * AUTH_DES flavor specific data from sec_data opaque data field. 80dfdcada3SDoug Rabson * AUTH_KERB has the same structure. 81dfdcada3SDoug Rabson */ 82dfdcada3SDoug Rabson typedef struct des_clnt_data { 83dfdcada3SDoug Rabson struct netbuf syncaddr; /* time sync addr */ 84dfdcada3SDoug Rabson struct knetconfig *knconf; /* knetconfig info that associated */ 85dfdcada3SDoug Rabson /* with the syncaddr. */ 86dfdcada3SDoug Rabson char *netname; /* server's netname */ 87dfdcada3SDoug Rabson int netnamelen; /* server's netname len */ 88dfdcada3SDoug Rabson } dh_k4_clntdata_t; 89dfdcada3SDoug Rabson 90dfdcada3SDoug Rabson #ifdef _SYSCALL32_IMPL 91dfdcada3SDoug Rabson struct des_clnt_data32 { 92dfdcada3SDoug Rabson struct netbuf32 syncaddr; /* time sync addr */ 93dfdcada3SDoug Rabson caddr32_t knconf; /* knetconfig info that associated */ 94dfdcada3SDoug Rabson /* with the syncaddr. */ 95dfdcada3SDoug Rabson caddr32_t netname; /* server's netname */ 96dfdcada3SDoug Rabson int32_t netnamelen; /* server's netname len */ 97dfdcada3SDoug Rabson }; 98dfdcada3SDoug Rabson #endif /* _SYSCALL32_IMPL */ 99dfdcada3SDoug Rabson 100dfdcada3SDoug Rabson #ifdef KERBEROS 101dfdcada3SDoug Rabson /* 102dfdcada3SDoug Rabson * flavor specific data to hold the data for AUTH_DES/AUTH_KERB(v4) 103dfdcada3SDoug Rabson * in sec_data->data opaque field. 104dfdcada3SDoug Rabson */ 105dfdcada3SDoug Rabson typedef struct krb4_svc_data { 106dfdcada3SDoug Rabson int window; /* window option value */ 107dfdcada3SDoug Rabson } krb4_svcdata_t; 108dfdcada3SDoug Rabson 109dfdcada3SDoug Rabson typedef struct krb4_svc_data des_svcdata_t; 110dfdcada3SDoug Rabson #endif /* KERBEROS */ 111dfdcada3SDoug Rabson 112dfdcada3SDoug Rabson /* 113dfdcada3SDoug Rabson * authentication/security specific flags 114dfdcada3SDoug Rabson */ 115dfdcada3SDoug Rabson #define AUTH_F_RPCTIMESYNC 0x001 /* use RPC to do time sync */ 116dfdcada3SDoug Rabson #define AUTH_F_TRYNONE 0x002 /* allow fall back to AUTH_NONE */ 117dfdcada3SDoug Rabson 118dfdcada3SDoug Rabson 119dfdcada3SDoug Rabson /* 120dfdcada3SDoug Rabson * Status returned from authentication check 121dfdcada3SDoug Rabson */ 122dfdcada3SDoug Rabson enum auth_stat { 123dfdcada3SDoug Rabson AUTH_OK=0, 124dfdcada3SDoug Rabson /* 125dfdcada3SDoug Rabson * failed at remote end 126dfdcada3SDoug Rabson */ 127dfdcada3SDoug Rabson AUTH_BADCRED=1, /* bogus credentials (seal broken) */ 128dfdcada3SDoug Rabson AUTH_REJECTEDCRED=2, /* client should begin new session */ 129dfdcada3SDoug Rabson AUTH_BADVERF=3, /* bogus verifier (seal broken) */ 130dfdcada3SDoug Rabson AUTH_REJECTEDVERF=4, /* verifier expired or was replayed */ 131dfdcada3SDoug Rabson AUTH_TOOWEAK=5, /* rejected due to security reasons */ 132dfdcada3SDoug Rabson /* 133dfdcada3SDoug Rabson * failed locally 134dfdcada3SDoug Rabson */ 135dfdcada3SDoug Rabson AUTH_INVALIDRESP=6, /* bogus response verifier */ 136a9148abdSDoug Rabson AUTH_FAILED=7, /* some unknown reason */ 137dfdcada3SDoug Rabson #ifdef KERBEROS 138dfdcada3SDoug Rabson /* 139dfdcada3SDoug Rabson * kerberos errors 140dfdcada3SDoug Rabson */ 141dfdcada3SDoug Rabson , 142dfdcada3SDoug Rabson AUTH_KERB_GENERIC = 8, /* kerberos generic error */ 143dfdcada3SDoug Rabson AUTH_TIMEEXPIRE = 9, /* time of credential expired */ 144dfdcada3SDoug Rabson AUTH_TKT_FILE = 10, /* something wrong with ticket file */ 145dfdcada3SDoug Rabson AUTH_DECODE = 11, /* can't decode authenticator */ 146a9148abdSDoug Rabson AUTH_NET_ADDR = 12, /* wrong net address in ticket */ 147dfdcada3SDoug Rabson #endif /* KERBEROS */ 148a9148abdSDoug Rabson /* 149a9148abdSDoug Rabson * RPCSEC_GSS errors 150a9148abdSDoug Rabson */ 151a9148abdSDoug Rabson RPCSEC_GSS_CREDPROBLEM = 13, 152a9148abdSDoug Rabson RPCSEC_GSS_CTXPROBLEM = 14, 153*ab0c29afSRick Macklem /* Also used by RPCSEC_TLS for the same purpose */ 154a9148abdSDoug Rabson RPCSEC_GSS_NODISPATCH = 0x8000000 155dfdcada3SDoug Rabson }; 156dfdcada3SDoug Rabson 157dfdcada3SDoug Rabson union des_block { 158dfdcada3SDoug Rabson struct { 159dfdcada3SDoug Rabson uint32_t high; 160dfdcada3SDoug Rabson uint32_t low; 161dfdcada3SDoug Rabson } key; 162dfdcada3SDoug Rabson char c[8]; 163dfdcada3SDoug Rabson }; 164dfdcada3SDoug Rabson typedef union des_block des_block; 165dfdcada3SDoug Rabson __BEGIN_DECLS 166dfdcada3SDoug Rabson extern bool_t xdr_des_block(XDR *, des_block *); 167dfdcada3SDoug Rabson __END_DECLS 168dfdcada3SDoug Rabson 169dfdcada3SDoug Rabson /* 170dfdcada3SDoug Rabson * Authentication info. Opaque to client. 171dfdcada3SDoug Rabson */ 172dfdcada3SDoug Rabson struct opaque_auth { 173dfdcada3SDoug Rabson enum_t oa_flavor; /* flavor of auth */ 174dfdcada3SDoug Rabson caddr_t oa_base; /* address of more auth stuff */ 175dfdcada3SDoug Rabson u_int oa_length; /* not to exceed MAX_AUTH_BYTES */ 176dfdcada3SDoug Rabson }; 177dfdcada3SDoug Rabson 178dfdcada3SDoug Rabson 179dfdcada3SDoug Rabson /* 180dfdcada3SDoug Rabson * Auth handle, interface to client side authenticators. 181dfdcada3SDoug Rabson */ 182a9148abdSDoug Rabson struct rpc_err; 183dfdcada3SDoug Rabson typedef struct __auth { 184dfdcada3SDoug Rabson struct opaque_auth ah_cred; 185dfdcada3SDoug Rabson struct opaque_auth ah_verf; 186dfdcada3SDoug Rabson union des_block ah_key; 187dfdcada3SDoug Rabson struct auth_ops { 188dfdcada3SDoug Rabson void (*ah_nextverf) (struct __auth *); 189dfdcada3SDoug Rabson /* nextverf & serialize */ 190a9148abdSDoug Rabson int (*ah_marshal) (struct __auth *, uint32_t, XDR *, 191a9148abdSDoug Rabson struct mbuf *); 192dfdcada3SDoug Rabson /* validate verifier */ 193a9148abdSDoug Rabson int (*ah_validate) (struct __auth *, uint32_t, 194a9148abdSDoug Rabson struct opaque_auth *, struct mbuf **); 195dfdcada3SDoug Rabson /* refresh credentials */ 196dfdcada3SDoug Rabson int (*ah_refresh) (struct __auth *, void *); 197dfdcada3SDoug Rabson /* destroy this structure */ 198dfdcada3SDoug Rabson void (*ah_destroy) (struct __auth *); 199dfdcada3SDoug Rabson } *ah_ops; 200dfdcada3SDoug Rabson void *ah_private; 201dfdcada3SDoug Rabson } AUTH; 202dfdcada3SDoug Rabson 203dfdcada3SDoug Rabson 204dfdcada3SDoug Rabson /* 205dfdcada3SDoug Rabson * Authentication ops. 206dfdcada3SDoug Rabson * The ops and the auth handle provide the interface to the authenticators. 207dfdcada3SDoug Rabson * 208dfdcada3SDoug Rabson * AUTH *auth; 209dfdcada3SDoug Rabson * XDR *xdrs; 210dfdcada3SDoug Rabson * struct opaque_auth verf; 211dfdcada3SDoug Rabson */ 212dfdcada3SDoug Rabson #define AUTH_NEXTVERF(auth) \ 213dfdcada3SDoug Rabson ((*((auth)->ah_ops->ah_nextverf))(auth)) 214dfdcada3SDoug Rabson 215a9148abdSDoug Rabson #define AUTH_MARSHALL(auth, xid, xdrs, args) \ 216a9148abdSDoug Rabson ((*((auth)->ah_ops->ah_marshal))(auth, xid, xdrs, args)) 217dfdcada3SDoug Rabson 218a9148abdSDoug Rabson #define AUTH_VALIDATE(auth, xid, verfp, resultsp) \ 219a9148abdSDoug Rabson ((*((auth)->ah_ops->ah_validate))((auth), xid, verfp, resultsp)) 220dfdcada3SDoug Rabson 221dfdcada3SDoug Rabson #define AUTH_REFRESH(auth, msg) \ 222dfdcada3SDoug Rabson ((*((auth)->ah_ops->ah_refresh))(auth, msg)) 223dfdcada3SDoug Rabson 224dfdcada3SDoug Rabson #define AUTH_DESTROY(auth) \ 225dfdcada3SDoug Rabson ((*((auth)->ah_ops->ah_destroy))(auth)) 226dfdcada3SDoug Rabson 227dfdcada3SDoug Rabson __BEGIN_DECLS 228dfdcada3SDoug Rabson extern struct opaque_auth _null_auth; 229dfdcada3SDoug Rabson __END_DECLS 230dfdcada3SDoug Rabson 231dfdcada3SDoug Rabson /* 232dfdcada3SDoug Rabson * These are the various implementations of client side authenticators. 233dfdcada3SDoug Rabson */ 234dfdcada3SDoug Rabson 235dfdcada3SDoug Rabson /* 236dfdcada3SDoug Rabson * System style authentication 237dfdcada3SDoug Rabson * AUTH *authunix_create(machname, uid, gid, len, aup_gids) 238dfdcada3SDoug Rabson * char *machname; 2390d1040e5SPedro F. Giffuni * u_int uid; 2400d1040e5SPedro F. Giffuni * u_int gid; 241dfdcada3SDoug Rabson * int len; 2420d1040e5SPedro F. Giffuni * u_int *aup_gids; 243dfdcada3SDoug Rabson */ 244dfdcada3SDoug Rabson __BEGIN_DECLS 245dfdcada3SDoug Rabson #ifdef _KERNEL 246dfdcada3SDoug Rabson struct ucred; 247dfdcada3SDoug Rabson extern AUTH *authunix_create(struct ucred *); 248dfdcada3SDoug Rabson #else 2490d1040e5SPedro F. Giffuni extern AUTH *authunix_create(char *, u_int, u_int, int, u_int *); 250dfdcada3SDoug Rabson extern AUTH *authunix_create_default(void); /* takes no parameters */ 251dfdcada3SDoug Rabson #endif 252dfdcada3SDoug Rabson extern AUTH *authnone_create(void); /* takes no parameters */ 253*ab0c29afSRick Macklem extern AUTH *authtls_create(void); /* takes no parameters */ 254dfdcada3SDoug Rabson __END_DECLS 255dfdcada3SDoug Rabson /* 256dfdcada3SDoug Rabson * DES style authentication 257dfdcada3SDoug Rabson * AUTH *authsecdes_create(servername, window, timehost, ckey) 258dfdcada3SDoug Rabson * char *servername; - network name of server 259dfdcada3SDoug Rabson * u_int window; - time to live 260dfdcada3SDoug Rabson * const char *timehost; - optional hostname to sync with 261dfdcada3SDoug Rabson * des_block *ckey; - optional conversation key to use 262dfdcada3SDoug Rabson */ 263dfdcada3SDoug Rabson __BEGIN_DECLS 264dfdcada3SDoug Rabson extern AUTH *authdes_create (char *, u_int, struct sockaddr *, des_block *); 265dfdcada3SDoug Rabson extern AUTH *authdes_seccreate (const char *, const u_int, const char *, 266dfdcada3SDoug Rabson const des_block *); 267dfdcada3SDoug Rabson __END_DECLS 268dfdcada3SDoug Rabson 269dfdcada3SDoug Rabson __BEGIN_DECLS 270dfdcada3SDoug Rabson extern bool_t xdr_opaque_auth (XDR *, struct opaque_auth *); 271dfdcada3SDoug Rabson __END_DECLS 272dfdcada3SDoug Rabson 273dfdcada3SDoug Rabson #define authsys_create(c,i1,i2,i3,ip) authunix_create((c),(i1),(i2),(i3),(ip)) 274dfdcada3SDoug Rabson #define authsys_create_default() authunix_create_default() 275dfdcada3SDoug Rabson 276dfdcada3SDoug Rabson /* 277dfdcada3SDoug Rabson * Netname manipulation routines. 278dfdcada3SDoug Rabson */ 279dfdcada3SDoug Rabson __BEGIN_DECLS 280dfdcada3SDoug Rabson extern int getnetname(char *); 281dfdcada3SDoug Rabson extern int host2netname(char *, const char *, const char *); 282dfdcada3SDoug Rabson extern int user2netname(char *, const uid_t, const char *); 283dfdcada3SDoug Rabson extern int netname2user(char *, uid_t *, gid_t *, int *, gid_t *); 284dfdcada3SDoug Rabson extern int netname2host(char *, char *, const int); 285dfdcada3SDoug Rabson extern void passwd2des ( char *, char * ); 286dfdcada3SDoug Rabson __END_DECLS 287dfdcada3SDoug Rabson 288dfdcada3SDoug Rabson /* 289dfdcada3SDoug Rabson * 290dfdcada3SDoug Rabson * These routines interface to the keyserv daemon 291dfdcada3SDoug Rabson * 292dfdcada3SDoug Rabson */ 293dfdcada3SDoug Rabson __BEGIN_DECLS 294dfdcada3SDoug Rabson extern int key_decryptsession(const char *, des_block *); 295dfdcada3SDoug Rabson extern int key_encryptsession(const char *, des_block *); 296dfdcada3SDoug Rabson extern int key_gendes(des_block *); 297dfdcada3SDoug Rabson extern int key_setsecret(const char *); 298dfdcada3SDoug Rabson extern int key_secretkey_is_set(void); 299dfdcada3SDoug Rabson __END_DECLS 300dfdcada3SDoug Rabson 301dfdcada3SDoug Rabson /* 302dfdcada3SDoug Rabson * Publickey routines. 303dfdcada3SDoug Rabson */ 304dfdcada3SDoug Rabson __BEGIN_DECLS 305dfdcada3SDoug Rabson extern int getpublickey (const char *, char *); 306dfdcada3SDoug Rabson extern int getpublicandprivatekey (const char *, char *); 307dfdcada3SDoug Rabson extern int getsecretkey (char *, char *, char *); 308dfdcada3SDoug Rabson __END_DECLS 309dfdcada3SDoug Rabson 310dfdcada3SDoug Rabson #ifdef KERBEROS 311dfdcada3SDoug Rabson /* 312dfdcada3SDoug Rabson * Kerberos style authentication 313dfdcada3SDoug Rabson * AUTH *authkerb_seccreate(service, srv_inst, realm, window, timehost, status) 314dfdcada3SDoug Rabson * const char *service; - service name 315dfdcada3SDoug Rabson * const char *srv_inst; - server instance 316dfdcada3SDoug Rabson * const char *realm; - server realm 317dfdcada3SDoug Rabson * const u_int window; - time to live 318dfdcada3SDoug Rabson * const char *timehost; - optional hostname to sync with 319dfdcada3SDoug Rabson * int *status; - kerberos status returned 320dfdcada3SDoug Rabson */ 321dfdcada3SDoug Rabson __BEGIN_DECLS 322dfdcada3SDoug Rabson extern AUTH *authkerb_seccreate(const char *, const char *, const char *, 323dfdcada3SDoug Rabson const u_int, const char *, int *); 324dfdcada3SDoug Rabson __END_DECLS 325dfdcada3SDoug Rabson 326dfdcada3SDoug Rabson /* 327dfdcada3SDoug Rabson * Map a kerberos credential into a unix cred. 328dfdcada3SDoug Rabson * 329dfdcada3SDoug Rabson * authkerb_getucred(rqst, uid, gid, grouplen, groups) 330dfdcada3SDoug Rabson * const struct svc_req *rqst; - request pointer 331dfdcada3SDoug Rabson * uid_t *uid; 332dfdcada3SDoug Rabson * gid_t *gid; 333dfdcada3SDoug Rabson * short *grouplen; 334dfdcada3SDoug Rabson * int *groups; 335dfdcada3SDoug Rabson * 336dfdcada3SDoug Rabson */ 337dfdcada3SDoug Rabson __BEGIN_DECLS 338dfdcada3SDoug Rabson extern int authkerb_getucred(/* struct svc_req *, uid_t *, gid_t *, 339dfdcada3SDoug Rabson short *, int * */); 340dfdcada3SDoug Rabson __END_DECLS 341dfdcada3SDoug Rabson #endif /* KERBEROS */ 342dfdcada3SDoug Rabson 343dfdcada3SDoug Rabson __BEGIN_DECLS 344dfdcada3SDoug Rabson struct svc_req; 345dfdcada3SDoug Rabson struct rpc_msg; 346dfdcada3SDoug Rabson enum auth_stat _svcauth_null (struct svc_req *, struct rpc_msg *); 347dfdcada3SDoug Rabson enum auth_stat _svcauth_short (struct svc_req *, struct rpc_msg *); 348dfdcada3SDoug Rabson enum auth_stat _svcauth_unix (struct svc_req *, struct rpc_msg *); 349*ab0c29afSRick Macklem enum auth_stat _svcauth_rpcsec_tls (struct svc_req *, struct rpc_msg *); 350dfdcada3SDoug Rabson __END_DECLS 351dfdcada3SDoug Rabson 352dfdcada3SDoug Rabson #define AUTH_NONE 0 /* no authentication */ 353dfdcada3SDoug Rabson #define AUTH_NULL 0 /* backward compatibility */ 354dfdcada3SDoug Rabson #define AUTH_SYS 1 /* unix style (uid, gids) */ 355dfdcada3SDoug Rabson #define AUTH_UNIX AUTH_SYS 356dfdcada3SDoug Rabson #define AUTH_SHORT 2 /* short hand unix style */ 357dfdcada3SDoug Rabson #define AUTH_DH 3 /* for Diffie-Hellman mechanism */ 358dfdcada3SDoug Rabson #define AUTH_DES AUTH_DH /* for backward compatibility */ 359dfdcada3SDoug Rabson #define AUTH_KERB 4 /* kerberos style */ 360a9148abdSDoug Rabson #define RPCSEC_GSS 6 /* RPCSEC_GSS */ 361*ab0c29afSRick Macklem #define AUTH_TLS 7 /* Initiate RPC-over-TLS */ 362a9148abdSDoug Rabson 363a9148abdSDoug Rabson /* 364a9148abdSDoug Rabson * Pseudo auth flavors for RPCSEC_GSS. 365a9148abdSDoug Rabson */ 366a9148abdSDoug Rabson #define RPCSEC_GSS_KRB5 390003 367a9148abdSDoug Rabson #define RPCSEC_GSS_KRB5I 390004 368a9148abdSDoug Rabson #define RPCSEC_GSS_KRB5P 390005 369dfdcada3SDoug Rabson 370dfdcada3SDoug Rabson #endif /* !_RPC_AUTH_H */ 371