xref: /freebsd/sys/rpc/auth.h (revision 6ae1554a5d9b318f8ad53ccc39fa5a961403da73)
1 /*	$NetBSD: auth.h,v 1.15 2000/06/02 22:57:55 fvdl Exp $	*/
2 
3 /*-
4  * Copyright (c) 2009, Sun Microsystems, Inc.
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions are met:
9  * - Redistributions of source code must retain the above copyright notice,
10  *   this list of conditions and the following disclaimer.
11  * - Redistributions in binary form must reproduce the above copyright notice,
12  *   this list of conditions and the following disclaimer in the documentation
13  *   and/or other materials provided with the distribution.
14  * - Neither the name of Sun Microsystems, Inc. nor the names of its
15  *   contributors may be used to endorse or promote products derived
16  *   from this software without specific prior written permission.
17  *
18  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
19  * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
20  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
21  * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
22  * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
23  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
24  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
25  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
26  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
27  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
28  * POSSIBILITY OF SUCH DAMAGE.
29  *
30  *	from: @(#)auth.h 1.17 88/02/08 SMI
31  *	from: @(#)auth.h	2.3 88/08/07 4.0 RPCSRC
32  *	from: @(#)auth.h	1.43 	98/02/02 SMI
33  * $FreeBSD$
34  */
35 
36 /*
37  * auth.h, Authentication interface.
38  *
39  * Copyright (C) 1984, Sun Microsystems, Inc.
40  *
41  * The data structures are completely opaque to the client.  The client
42  * is required to pass an AUTH * to routines that create rpc
43  * "sessions".
44  */
45 
46 #ifndef _RPC_AUTH_H
47 #define _RPC_AUTH_H
48 #include <rpc/xdr.h>
49 #include <rpc/clnt_stat.h>
50 #include <sys/cdefs.h>
51 #include <sys/socket.h>
52 
53 #define MAX_AUTH_BYTES	400
54 #define MAXNETNAMELEN	255	/* maximum length of network user's name */
55 
56 /*
57  *  Client side authentication/security data
58  */
59 
60 typedef struct sec_data {
61 	u_int	secmod;		/* security mode number e.g. in nfssec.conf */
62 	u_int	rpcflavor;	/* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */
63 	int	flags;		/* AUTH_F_xxx flags */
64 	caddr_t data;		/* opaque data per flavor */
65 } sec_data_t;
66 
67 #ifdef _SYSCALL32_IMPL
68 struct sec_data32 {
69 	uint32_t secmod;	/* security mode number e.g. in nfssec.conf */
70 	uint32_t rpcflavor;	/* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */
71 	int32_t flags;		/* AUTH_F_xxx flags */
72 	caddr32_t data;		/* opaque data per flavor */
73 };
74 #endif /* _SYSCALL32_IMPL */
75 
76 /*
77  * AUTH_DES flavor specific data from sec_data opaque data field.
78  * AUTH_KERB has the same structure.
79  */
80 typedef struct des_clnt_data {
81 	struct netbuf	syncaddr;	/* time sync addr */
82 	struct knetconfig *knconf;	/* knetconfig info that associated */
83 					/* with the syncaddr. */
84 	char		*netname;	/* server's netname */
85 	int		netnamelen;	/* server's netname len */
86 } dh_k4_clntdata_t;
87 
88 #ifdef _SYSCALL32_IMPL
89 struct des_clnt_data32 {
90 	struct netbuf32 syncaddr;	/* time sync addr */
91 	caddr32_t knconf;		/* knetconfig info that associated */
92 					/* with the syncaddr. */
93 	caddr32_t netname;		/* server's netname */
94 	int32_t netnamelen;		/* server's netname len */
95 };
96 #endif /* _SYSCALL32_IMPL */
97 
98 #ifdef KERBEROS
99 /*
100  * flavor specific data to hold the data for AUTH_DES/AUTH_KERB(v4)
101  * in sec_data->data opaque field.
102  */
103 typedef struct krb4_svc_data {
104 	int		window;		/* window option value */
105 } krb4_svcdata_t;
106 
107 typedef struct krb4_svc_data	des_svcdata_t;
108 #endif /* KERBEROS */
109 
110 /*
111  * authentication/security specific flags
112  */
113 #define AUTH_F_RPCTIMESYNC	0x001	/* use RPC to do time sync */
114 #define AUTH_F_TRYNONE		0x002	/* allow fall back to AUTH_NONE */
115 
116 
117 /*
118  * Status returned from authentication check
119  */
120 enum auth_stat {
121 	AUTH_OK=0,
122 	/*
123 	 * failed at remote end
124 	 */
125 	AUTH_BADCRED=1,			/* bogus credentials (seal broken) */
126 	AUTH_REJECTEDCRED=2,		/* client should begin new session */
127 	AUTH_BADVERF=3,			/* bogus verifier (seal broken) */
128 	AUTH_REJECTEDVERF=4,		/* verifier expired or was replayed */
129 	AUTH_TOOWEAK=5,			/* rejected due to security reasons */
130 	/*
131 	 * failed locally
132 	*/
133 	AUTH_INVALIDRESP=6,		/* bogus response verifier */
134 	AUTH_FAILED=7,			/* some unknown reason */
135 #ifdef KERBEROS
136 	/*
137 	 * kerberos errors
138 	 */
139 	,
140 	AUTH_KERB_GENERIC = 8,		/* kerberos generic error */
141 	AUTH_TIMEEXPIRE = 9,		/* time of credential expired */
142 	AUTH_TKT_FILE = 10,		/* something wrong with ticket file */
143 	AUTH_DECODE = 11,			/* can't decode authenticator */
144 	AUTH_NET_ADDR = 12,		/* wrong net address in ticket */
145 #endif /* KERBEROS */
146 	/*
147 	 * RPCSEC_GSS errors
148 	 */
149 	RPCSEC_GSS_CREDPROBLEM = 13,
150 	RPCSEC_GSS_CTXPROBLEM = 14,
151 	RPCSEC_GSS_NODISPATCH = 0x8000000
152 };
153 
154 union des_block {
155 	struct {
156 		uint32_t high;
157 		uint32_t low;
158 	} key;
159 	char c[8];
160 };
161 typedef union des_block des_block;
162 __BEGIN_DECLS
163 extern bool_t xdr_des_block(XDR *, des_block *);
164 __END_DECLS
165 
166 /*
167  * Authentication info.  Opaque to client.
168  */
169 struct opaque_auth {
170 	enum_t	oa_flavor;		/* flavor of auth */
171 	caddr_t	oa_base;		/* address of more auth stuff */
172 	u_int	oa_length;		/* not to exceed MAX_AUTH_BYTES */
173 };
174 
175 
176 /*
177  * Auth handle, interface to client side authenticators.
178  */
179 struct rpc_err;
180 typedef struct __auth {
181 	struct	opaque_auth	ah_cred;
182 	struct	opaque_auth	ah_verf;
183 	union	des_block	ah_key;
184 	struct auth_ops {
185 		void	(*ah_nextverf) (struct __auth *);
186 		/* nextverf & serialize */
187 		int	(*ah_marshal) (struct __auth *, uint32_t, XDR *,
188 		    struct mbuf *);
189 		/* validate verifier */
190 		int	(*ah_validate) (struct __auth *, uint32_t,
191 		    struct opaque_auth *, struct mbuf **);
192 		/* refresh credentials */
193 		int	(*ah_refresh) (struct __auth *, void *);
194 		/* destroy this structure */
195 		void	(*ah_destroy) (struct __auth *);
196 	} *ah_ops;
197 	void *ah_private;
198 } AUTH;
199 
200 
201 /*
202  * Authentication ops.
203  * The ops and the auth handle provide the interface to the authenticators.
204  *
205  * AUTH	*auth;
206  * XDR	*xdrs;
207  * struct opaque_auth verf;
208  */
209 #define AUTH_NEXTVERF(auth)		\
210 		((*((auth)->ah_ops->ah_nextverf))(auth))
211 
212 #define AUTH_MARSHALL(auth, xid, xdrs, args)	\
213 		((*((auth)->ah_ops->ah_marshal))(auth, xid, xdrs, args))
214 
215 #define AUTH_VALIDATE(auth, xid, verfp, resultsp) \
216 		((*((auth)->ah_ops->ah_validate))((auth), xid, verfp, resultsp))
217 
218 #define AUTH_REFRESH(auth, msg)		\
219 		((*((auth)->ah_ops->ah_refresh))(auth, msg))
220 
221 #define AUTH_DESTROY(auth)		\
222 		((*((auth)->ah_ops->ah_destroy))(auth))
223 
224 __BEGIN_DECLS
225 extern struct opaque_auth _null_auth;
226 __END_DECLS
227 
228 /*
229  * These are the various implementations of client side authenticators.
230  */
231 
232 /*
233  * System style authentication
234  * AUTH *authunix_create(machname, uid, gid, len, aup_gids)
235  *	char *machname;
236  *	u_int uid;
237  *	u_int gid;
238  *	int len;
239  *	u_int *aup_gids;
240  */
241 __BEGIN_DECLS
242 #ifdef _KERNEL
243 struct ucred;
244 extern AUTH *authunix_create(struct ucred *);
245 #else
246 extern AUTH *authunix_create(char *, u_int, u_int, int, u_int *);
247 extern AUTH *authunix_create_default(void);	/* takes no parameters */
248 #endif
249 extern AUTH *authnone_create(void);		/* takes no parameters */
250 __END_DECLS
251 /*
252  * DES style authentication
253  * AUTH *authsecdes_create(servername, window, timehost, ckey)
254  * 	char *servername;		- network name of server
255  *	u_int window;			- time to live
256  * 	const char *timehost;			- optional hostname to sync with
257  * 	des_block *ckey;		- optional conversation key to use
258  */
259 __BEGIN_DECLS
260 extern AUTH *authdes_create (char *, u_int, struct sockaddr *, des_block *);
261 extern AUTH *authdes_seccreate (const char *, const u_int, const  char *,
262     const  des_block *);
263 __END_DECLS
264 
265 __BEGIN_DECLS
266 extern bool_t xdr_opaque_auth		(XDR *, struct opaque_auth *);
267 __END_DECLS
268 
269 #define authsys_create(c,i1,i2,i3,ip) authunix_create((c),(i1),(i2),(i3),(ip))
270 #define authsys_create_default() authunix_create_default()
271 
272 /*
273  * Netname manipulation routines.
274  */
275 __BEGIN_DECLS
276 extern int getnetname(char *);
277 extern int host2netname(char *, const char *, const char *);
278 extern int user2netname(char *, const uid_t, const char *);
279 extern int netname2user(char *, uid_t *, gid_t *, int *, gid_t *);
280 extern int netname2host(char *, char *, const int);
281 extern void passwd2des ( char *, char * );
282 __END_DECLS
283 
284 /*
285  *
286  * These routines interface to the keyserv daemon
287  *
288  */
289 __BEGIN_DECLS
290 extern int key_decryptsession(const char *, des_block *);
291 extern int key_encryptsession(const char *, des_block *);
292 extern int key_gendes(des_block *);
293 extern int key_setsecret(const char *);
294 extern int key_secretkey_is_set(void);
295 __END_DECLS
296 
297 /*
298  * Publickey routines.
299  */
300 __BEGIN_DECLS
301 extern int getpublickey (const char *, char *);
302 extern int getpublicandprivatekey (const char *, char *);
303 extern int getsecretkey (char *, char *, char *);
304 __END_DECLS
305 
306 #ifdef KERBEROS
307 /*
308  * Kerberos style authentication
309  * AUTH *authkerb_seccreate(service, srv_inst, realm, window, timehost, status)
310  *	const char *service;			- service name
311  *	const char *srv_inst;			- server instance
312  *	const char *realm;			- server realm
313  *	const u_int window;			- time to live
314  *	const char *timehost;			- optional hostname to sync with
315  *	int *status;				- kerberos status returned
316  */
317 __BEGIN_DECLS
318 extern AUTH	*authkerb_seccreate(const char *, const char *, const  char *,
319 		    const u_int, const char *, int *);
320 __END_DECLS
321 
322 /*
323  * Map a kerberos credential into a unix cred.
324  *
325  *	authkerb_getucred(rqst, uid, gid, grouplen, groups)
326  *	const struct svc_req *rqst;		- request pointer
327  *	uid_t *uid;
328  *	gid_t *gid;
329  *	short *grouplen;
330  *	int *groups;
331  *
332  */
333 __BEGIN_DECLS
334 extern int	authkerb_getucred(/* struct svc_req *, uid_t *, gid_t *,
335 		    short *, int * */);
336 __END_DECLS
337 #endif /* KERBEROS */
338 
339 __BEGIN_DECLS
340 struct svc_req;
341 struct rpc_msg;
342 enum auth_stat _svcauth_null (struct svc_req *, struct rpc_msg *);
343 enum auth_stat _svcauth_short (struct svc_req *, struct rpc_msg *);
344 enum auth_stat _svcauth_unix (struct svc_req *, struct rpc_msg *);
345 __END_DECLS
346 
347 #define AUTH_NONE	0		/* no authentication */
348 #define	AUTH_NULL	0		/* backward compatibility */
349 #define	AUTH_SYS	1		/* unix style (uid, gids) */
350 #define AUTH_UNIX	AUTH_SYS
351 #define	AUTH_SHORT	2		/* short hand unix style */
352 #define AUTH_DH		3		/* for Diffie-Hellman mechanism */
353 #define AUTH_DES	AUTH_DH		/* for backward compatibility */
354 #define AUTH_KERB	4		/* kerberos style */
355 #define RPCSEC_GSS	6		/* RPCSEC_GSS */
356 
357 /*
358  * Pseudo auth flavors for RPCSEC_GSS.
359  */
360 #define	RPCSEC_GSS_KRB5		390003
361 #define	RPCSEC_GSS_KRB5I	390004
362 #define	RPCSEC_GSS_KRB5P	390005
363 
364 #endif /* !_RPC_AUTH_H */
365