xref: /freebsd/sys/rpc/rpcsec_gss.h (revision f0cfa1b168014f56c02b83e5f28412cc5f78d117)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
3  *
4  * Copyright (c) 2008 Doug Rabson
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  *
28  *	$FreeBSD$
29  */
30 
31 #ifndef _RPCSEC_GSS_H
32 #define _RPCSEC_GSS_H
33 
34 #include <kgssapi/gssapi.h>
35 
36 #ifndef MAX_GSS_MECH
37 #define MAX_GSS_MECH	64
38 #endif
39 
40 /*
41  * Define the types of security service required for rpc_gss_seccreate().
42  */
43 typedef enum {
44 	rpc_gss_svc_default	= 0,
45 	rpc_gss_svc_none	= 1,
46 	rpc_gss_svc_integrity	= 2,
47 	rpc_gss_svc_privacy	= 3
48 } rpc_gss_service_t;
49 
50 /*
51  * Structure containing options for rpc_gss_seccreate().
52  */
53 typedef struct {
54 	int		req_flags;	/* GSS request bits */
55 	int		time_req;	/* requested credential lifetime */
56 	gss_cred_id_t	my_cred;	/* GSS credential */
57 	gss_channel_bindings_t input_channel_bindings;
58 } rpc_gss_options_req_t;
59 
60 /*
61  * Structure containing options returned by rpc_gss_seccreate().
62  */
63 typedef struct {
64 	int		major_status;
65 	int		minor_status;
66 	u_int		rpcsec_version;
67 	int		ret_flags;
68 	int		time_req;
69 	gss_ctx_id_t	gss_context;
70 	char		actual_mechanism[MAX_GSS_MECH];
71 } rpc_gss_options_ret_t;
72 
73 /*
74  * Client principal type. Used as an argument to
75  * rpc_gss_get_principal_name(). Also referenced by the
76  * rpc_gss_rawcred_t structure.
77  */
78 typedef struct {
79 	int		len;
80 	char		name[1];
81 } *rpc_gss_principal_t;
82 
83 /*
84  * Structure for raw credentials used by rpc_gss_getcred() and
85  * rpc_gss_set_callback().
86  */
87 typedef struct {
88 	u_int		version;	/* RPC version number */
89 	const char	*mechanism;	/* security mechanism */
90 	const char	*qop;		/* quality of protection */
91 	rpc_gss_principal_t client_principal; /* client name */
92 	const char	*svc_principal;	/* server name */
93 	rpc_gss_service_t service;	/* service type */
94 } rpc_gss_rawcred_t;
95 
96 /*
97  * Unix credentials derived from raw credentials. Returned by
98  * rpc_gss_getcred().
99  */
100 typedef struct {
101 	uid_t		uid;		/* user ID */
102 	gid_t		gid;		/* group ID */
103 	short		gidlen;
104 	gid_t		*gidlist;	/* list of groups */
105 } rpc_gss_ucred_t;
106 
107 /*
108  * Structure used to enforce a particular QOP and service.
109  */
110 typedef struct {
111 	bool_t		locked;
112 	rpc_gss_rawcred_t *raw_cred;
113 } rpc_gss_lock_t;
114 
115 /*
116  * Callback structure used by rpc_gss_set_callback().
117  */
118 typedef struct {
119 	u_int		program;	/* RPC program number */
120 	u_int		version;	/* RPC version number */
121 					/* user defined callback */
122 	bool_t		(*callback)(struct svc_req *req,
123 				    gss_cred_id_t deleg,
124 				    gss_ctx_id_t gss_context,
125 				    rpc_gss_lock_t *lock,
126 				    void **cookie);
127 } rpc_gss_callback_t;
128 
129 /*
130  * Structure used to return error information by rpc_gss_get_error()
131  */
132 typedef struct {
133 	int		rpc_gss_error;
134 	int		system_error;	/* same as errno */
135 } rpc_gss_error_t;
136 
137 /*
138  * Values for rpc_gss_error
139  */
140 #define RPC_GSS_ER_SUCCESS	0	/* no error */
141 #define RPC_GSS_ER_SYSTEMERROR	1	/* system error */
142 
143 __BEGIN_DECLS
144 
145 #ifdef _KERNEL
146 /*
147  * Set up a structure of entry points for the kgssapi module and inline
148  * functions named rpc_gss_XXX_call() to use them, so that the kgssapi
149  * module doesn't need to be loaded for the NFS modules to work using
150  * AUTH_SYS. The kgssapi modules will be loaded by the gssd(8) daemon
151  * when it is started up and the entry points will then be filled in.
152  */
153 typedef AUTH	*rpc_gss_secfind_ftype(CLIENT *clnt, struct ucred *cred,
154 		    const char *principal, gss_OID mech_oid,
155 		    rpc_gss_service_t service);
156 typedef void	rpc_gss_secpurge_ftype(CLIENT *clnt);
157 typedef AUTH	*rpc_gss_seccreate_ftype(CLIENT *clnt, struct ucred *cred,
158 		    const char *clnt_principal, const char *principal,
159 		    const char *mechanism, rpc_gss_service_t service,
160 		    const char *qop, rpc_gss_options_req_t *options_req,
161 		    rpc_gss_options_ret_t *options_ret);
162 typedef bool_t	rpc_gss_set_defaults_ftype(AUTH *auth,
163 		    rpc_gss_service_t service, const char *qop);
164 typedef int	rpc_gss_max_data_length_ftype(AUTH *handle,
165 		    int max_tp_unit_len);
166 typedef void	rpc_gss_get_error_ftype(rpc_gss_error_t *error);
167 typedef bool_t	rpc_gss_mech_to_oid_ftype(const char *mech, gss_OID *oid_ret);
168 typedef bool_t	rpc_gss_oid_to_mech_ftype(gss_OID oid, const char **mech_ret);
169 typedef bool_t	rpc_gss_qop_to_num_ftype(const char *qop, const char *mech,
170 		    u_int *num_ret);
171 typedef const char **rpc_gss_get_mechanisms_ftype(void);
172 typedef bool_t	rpc_gss_get_versions_ftype(u_int *vers_hi, u_int *vers_lo);
173 typedef bool_t	rpc_gss_is_installed_ftype(const char *mech);
174 typedef bool_t	rpc_gss_set_svc_name_ftype(const char *principal,
175 		    const char *mechanism, u_int req_time, u_int program,
176 		    u_int version);
177 typedef void	rpc_gss_clear_svc_name_ftype(u_int program, u_int version);
178 typedef bool_t	rpc_gss_getcred_ftype(struct svc_req *req,
179 		    rpc_gss_rawcred_t **rcred,
180 		    rpc_gss_ucred_t **ucred, void **cookie);
181 typedef bool_t	rpc_gss_set_callback_ftype(rpc_gss_callback_t *cb);
182 typedef void	rpc_gss_clear_callback_ftype(rpc_gss_callback_t *cb);
183 typedef bool_t	rpc_gss_get_principal_name_ftype(rpc_gss_principal_t *principal,
184 		    const char *mech, const char *name, const char *node,
185 		    const char *domain);
186 typedef int	rpc_gss_svc_max_data_length_ftype(struct svc_req *req,
187 		    int max_tp_unit_len);
188 typedef void	rpc_gss_refresh_auth_ftype(AUTH *auth);
189 
190 struct rpc_gss_entries {
191 	rpc_gss_secfind_ftype		*rpc_gss_secfind;
192 	rpc_gss_secpurge_ftype		*rpc_gss_secpurge;
193 	rpc_gss_seccreate_ftype		*rpc_gss_seccreate;
194 	rpc_gss_set_defaults_ftype	*rpc_gss_set_defaults;
195 	rpc_gss_max_data_length_ftype	*rpc_gss_max_data_length;
196 	rpc_gss_get_error_ftype		*rpc_gss_get_error;
197 	rpc_gss_mech_to_oid_ftype	*rpc_gss_mech_to_oid;
198 	rpc_gss_oid_to_mech_ftype	*rpc_gss_oid_to_mech;
199 	rpc_gss_qop_to_num_ftype	*rpc_gss_qop_to_num;
200 	rpc_gss_get_mechanisms_ftype	*rpc_gss_get_mechanisms;
201 	rpc_gss_get_versions_ftype	*rpc_gss_get_versions;
202 	rpc_gss_is_installed_ftype	*rpc_gss_is_installed;
203 	rpc_gss_set_svc_name_ftype	*rpc_gss_set_svc_name;
204 	rpc_gss_clear_svc_name_ftype	*rpc_gss_clear_svc_name;
205 	rpc_gss_getcred_ftype		*rpc_gss_getcred;
206 	rpc_gss_set_callback_ftype	*rpc_gss_set_callback;
207 	rpc_gss_clear_callback_ftype	*rpc_gss_clear_callback;
208 	rpc_gss_get_principal_name_ftype *rpc_gss_get_principal_name;
209 	rpc_gss_svc_max_data_length_ftype *rpc_gss_svc_max_data_length;
210 	rpc_gss_refresh_auth_ftype	*rpc_gss_refresh_auth;
211 };
212 extern struct rpc_gss_entries	rpc_gss_entries;
213 
214 /* Functions to access the entry points. */
215 static __inline AUTH *
216 rpc_gss_secfind_call(CLIENT *clnt, struct ucred *cred, const char *principal,
217     gss_OID mech_oid, rpc_gss_service_t service)
218 {
219 	AUTH *ret = NULL;
220 
221 	if (rpc_gss_entries.rpc_gss_secfind != NULL)
222 		ret = (*rpc_gss_entries.rpc_gss_secfind)(clnt, cred, principal,
223 		    mech_oid, service);
224 	return (ret);
225 }
226 
227 static __inline void
228 rpc_gss_secpurge_call(CLIENT *clnt)
229 {
230 
231 	if (rpc_gss_entries.rpc_gss_secpurge != NULL)
232 		(*rpc_gss_entries.rpc_gss_secpurge)(clnt);
233 }
234 
235 static __inline AUTH *
236 rpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred,
237     const char *clnt_principal, const char *principal, const char *mechanism,
238     rpc_gss_service_t service, const char *qop,
239     rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret)
240 {
241 	AUTH *ret = NULL;
242 
243 	if (rpc_gss_entries.rpc_gss_seccreate != NULL)
244 		ret = (*rpc_gss_entries.rpc_gss_seccreate)(clnt, cred,
245 		    clnt_principal, principal, mechanism, service, qop,
246 		    options_req, options_ret);
247 	return (ret);
248 }
249 
250 static __inline bool_t
251 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service,
252     const char *qop)
253 {
254 	bool_t ret = 1;
255 
256 	if (rpc_gss_entries.rpc_gss_set_defaults != NULL)
257 		ret = (*rpc_gss_entries.rpc_gss_set_defaults)(auth, service,
258 		    qop);
259 	return (ret);
260 }
261 
262 static __inline int
263 rpc_gss_max_data_length_call(AUTH *handle, int max_tp_unit_len)
264 {
265 	int ret = 0;
266 
267 	if (rpc_gss_entries.rpc_gss_max_data_length != NULL)
268 		ret = (*rpc_gss_entries.rpc_gss_max_data_length)(handle,
269 		    max_tp_unit_len);
270 	return (ret);
271 }
272 
273 static __inline void
274 rpc_gss_get_error_call(rpc_gss_error_t *error)
275 {
276 
277 	if (rpc_gss_entries.rpc_gss_get_error != NULL)
278 		(*rpc_gss_entries.rpc_gss_get_error)(error);
279 }
280 
281 static __inline bool_t
282 rpc_gss_mech_to_oid_call(const char *mech, gss_OID *oid_ret)
283 {
284 	bool_t ret = 1;
285 
286 	if (rpc_gss_entries.rpc_gss_mech_to_oid != NULL)
287 		ret = (*rpc_gss_entries.rpc_gss_mech_to_oid)(mech, oid_ret);
288 	return (ret);
289 }
290 
291 static __inline bool_t
292 rpc_gss_oid_to_mech_call(gss_OID oid, const char **mech_ret)
293 {
294 	bool_t ret = 1;
295 
296 	if (rpc_gss_entries.rpc_gss_oid_to_mech != NULL)
297 		ret = (*rpc_gss_entries.rpc_gss_oid_to_mech)(oid, mech_ret);
298 	return (ret);
299 }
300 
301 static __inline bool_t
302 rpc_gss_qop_to_num_call(const char *qop, const char *mech, u_int *num_ret)
303 {
304 	bool_t ret = 1;
305 
306 	if (rpc_gss_entries.rpc_gss_qop_to_num != NULL)
307 		ret = (*rpc_gss_entries.rpc_gss_qop_to_num)(qop, mech, num_ret);
308 	return (ret);
309 }
310 
311 static __inline const char **
312 rpc_gss_get_mechanisms_call(void)
313 {
314 	const char **ret = NULL;
315 
316 	if (rpc_gss_entries.rpc_gss_get_mechanisms != NULL)
317 		ret = (*rpc_gss_entries.rpc_gss_get_mechanisms)();
318 	return (ret);
319 }
320 
321 static __inline bool_t
322 rpc_gss_get_versions_call(u_int *vers_hi, u_int *vers_lo)
323 {
324 	bool_t ret = 1;
325 
326 	if (rpc_gss_entries.rpc_gss_get_versions != NULL)
327 		ret = (*rpc_gss_entries.rpc_gss_get_versions)(vers_hi, vers_lo);
328 	return (ret);
329 }
330 
331 static __inline bool_t
332 rpc_gss_is_installed_call(const char *mech)
333 {
334 	bool_t ret = 1;
335 
336 	if (rpc_gss_entries.rpc_gss_is_installed != NULL)
337 		ret = (*rpc_gss_entries.rpc_gss_is_installed)(mech);
338 	return (ret);
339 }
340 
341 static __inline bool_t
342 rpc_gss_set_svc_name_call(const char *principal, const char *mechanism,
343     u_int req_time, u_int program, u_int version)
344 {
345 	bool_t ret = 1;
346 
347 	if (rpc_gss_entries.rpc_gss_set_svc_name != NULL)
348 		ret = (*rpc_gss_entries.rpc_gss_set_svc_name)(principal,
349 		    mechanism, req_time, program, version);
350 	return (ret);
351 }
352 
353 static __inline void
354 rpc_gss_clear_svc_name_call(u_int program, u_int version)
355 {
356 
357 	if (rpc_gss_entries.rpc_gss_clear_svc_name != NULL)
358 		(*rpc_gss_entries.rpc_gss_clear_svc_name)(program, version);
359 }
360 
361 static __inline bool_t
362 rpc_gss_getcred_call(struct svc_req *req, rpc_gss_rawcred_t **rcred,
363     rpc_gss_ucred_t **ucred, void **cookie)
364 {
365 	bool_t ret = 1;
366 
367 	if (rpc_gss_entries.rpc_gss_getcred != NULL)
368 		ret = (*rpc_gss_entries.rpc_gss_getcred)(req, rcred, ucred,
369 		    cookie);
370 	return (ret);
371 }
372 
373 static __inline bool_t
374 rpc_gss_set_callback_call(rpc_gss_callback_t *cb)
375 {
376 	bool_t ret = 1;
377 
378 	if (rpc_gss_entries.rpc_gss_set_callback != NULL)
379 		ret = (*rpc_gss_entries.rpc_gss_set_callback)(cb);
380 	return (ret);
381 }
382 
383 static __inline void
384 rpc_gss_clear_callback_call(rpc_gss_callback_t *cb)
385 {
386 
387 	if (rpc_gss_entries.rpc_gss_clear_callback != NULL)
388 		(*rpc_gss_entries.rpc_gss_clear_callback)(cb);
389 }
390 
391 static __inline bool_t
392 rpc_gss_get_principal_name_call(rpc_gss_principal_t *principal,
393     const char *mech, const char *name, const char *node, const char *domain)
394 {
395 	bool_t ret = 1;
396 
397 	if (rpc_gss_entries.rpc_gss_get_principal_name != NULL)
398 		ret = (*rpc_gss_entries.rpc_gss_get_principal_name)(principal,
399 		    mech, name, node, domain);
400 	return (ret);
401 }
402 
403 static __inline int
404 rpc_gss_svc_max_data_length_call(struct svc_req *req, int max_tp_unit_len)
405 {
406 	int ret = 0;
407 
408 	if (rpc_gss_entries.rpc_gss_svc_max_data_length != NULL)
409 		ret = (*rpc_gss_entries.rpc_gss_svc_max_data_length)(req,
410 		    max_tp_unit_len);
411 	return (ret);
412 }
413 
414 static __inline void
415 rpc_gss_refresh_auth_call(AUTH *auth)
416 {
417 
418 	if (rpc_gss_entries.rpc_gss_refresh_auth != NULL)
419 		(*rpc_gss_entries.rpc_gss_refresh_auth)(auth);
420 }
421 
422 AUTH	*rpc_gss_secfind(CLIENT *clnt, struct ucred *cred,
423     const char *principal, gss_OID mech_oid, rpc_gss_service_t service);
424 void	rpc_gss_secpurge(CLIENT *clnt);
425 void	rpc_gss_refresh_auth(AUTH *auth);
426 AUTH	*rpc_gss_seccreate(CLIENT *clnt, struct ucred *cred,
427     const char *clnt_principal, const char *principal,
428     const char *mechanism, rpc_gss_service_t service,
429     const char *qop, rpc_gss_options_req_t *options_req,
430     rpc_gss_options_ret_t *options_ret);
431 #else	/* !_KERNEL */
432 AUTH	*rpc_gss_seccreate(CLIENT *clnt, struct ucred *cred,
433     const char *principal, const char *mechanism, rpc_gss_service_t service,
434     const char *qop, rpc_gss_options_req_t *options_req,
435     rpc_gss_options_ret_t *options_ret);
436 #endif	/* _KERNEL */
437 bool_t	rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service,
438     const char *qop);
439 int	rpc_gss_max_data_length(AUTH *handle, int max_tp_unit_len);
440 void	rpc_gss_get_error(rpc_gss_error_t *error);
441 
442 bool_t	rpc_gss_mech_to_oid(const char *mech, gss_OID *oid_ret);
443 bool_t	rpc_gss_oid_to_mech(gss_OID oid, const char **mech_ret);
444 bool_t	rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret);
445 const char **rpc_gss_get_mechanisms(void);
446 const char **rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service);
447 bool_t	rpc_gss_get_versions(u_int *vers_hi, u_int *vers_lo);
448 bool_t	rpc_gss_is_installed(const char *mech);
449 
450 bool_t	rpc_gss_set_svc_name(const char *principal, const char *mechanism,
451     u_int req_time, u_int program, u_int version);
452 void rpc_gss_clear_svc_name(u_int program, u_int version);
453 bool_t	rpc_gss_getcred(struct svc_req *req, rpc_gss_rawcred_t **rcred,
454     rpc_gss_ucred_t **ucred, void **cookie);
455 bool_t	rpc_gss_set_callback(rpc_gss_callback_t *cb);
456 void rpc_gss_clear_callback(rpc_gss_callback_t *cb);
457 bool_t	rpc_gss_get_principal_name(rpc_gss_principal_t *principal,
458     const char *mech, const char *name, const char *node, const char *domain);
459 int	rpc_gss_svc_max_data_length(struct svc_req *req, int max_tp_unit_len);
460 
461 /*
462  * Internal interface from the RPC implementation.
463  */
464 #ifndef _KERNEL
465 bool_t	__rpc_gss_wrap(AUTH *auth, void *header, size_t headerlen,
466     XDR* xdrs, xdrproc_t xdr_args, void *args_ptr);
467 bool_t	__rpc_gss_unwrap(AUTH *auth, XDR* xdrs, xdrproc_t xdr_args,
468     void *args_ptr);
469 #endif
470 bool_t __rpc_gss_set_error(int rpc_gss_error, int system_error);
471 
472 __END_DECLS
473 
474 #endif /* !_RPCSEC_GSS_H */
475