1/*	$NetBSD: auth.h,v 1.15 2000/06/02 22:57:55 fvdl Exp $	*/
  2
  3/*-
  4 * SPDX-License-Identifier: BSD-3-Clause
  5 *
  6 * Copyright (c) 2009, Sun Microsystems, Inc.
  7 * All rights reserved.
  8 *
  9 * Redistribution and use in source and binary forms, with or without
 10 * modification, are permitted provided that the following conditions are met:
 11 * - Redistributions of source code must retain the above copyright notice,
 12 *   this list of conditions and the following disclaimer.
 13 * - Redistributions in binary form must reproduce the above copyright notice,
 14 *   this list of conditions and the following disclaimer in the documentation
 15 *   and/or other materials provided with the distribution.
 16 * - Neither the name of Sun Microsystems, Inc. nor the names of its
 17 *   contributors may be used to endorse or promote products derived
 18 *   from this software without specific prior written permission.
 19 *
 20 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
 21 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
 22 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
 23 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
 24 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
 25 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
 26 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
 27 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
 28 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
 29 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
 30 * POSSIBILITY OF SUCH DAMAGE.
 31 *
 32 *	from: @(#)auth.h 1.17 88/02/08 SMI
 33 *	from: @(#)auth.h	2.3 88/08/07 4.0 RPCSRC
 34 *	from: @(#)auth.h	1.43 	98/02/02 SMI
 35 */
 36
 37/*
 38 * auth.h, Authentication interface.
 39 *
 40 * Copyright (C) 1984, Sun Microsystems, Inc.
 41 *
 42 * The data structures are completely opaque to the client.  The client
 43 * is required to pass an AUTH * to routines that create rpc
 44 * "sessions".
 45 */
 46
 47#ifndef _RPC_AUTH_H
 48#define _RPC_AUTH_H
 49#include <rpc/xdr.h>
 50#include <rpc/clnt_stat.h>
 51#include <sys/cdefs.h>
 52#include <sys/socket.h>
 53
 54#define MAX_AUTH_BYTES	400
 55#define MAXNETNAMELEN	255	/* maximum length of network user's name */
 56
 57/*
 58 *  Client side authentication/security data
 59 */
 60
 61typedef struct sec_data {
 62	u_int	secmod;		/* security mode number e.g. in nfssec.conf */
 63	u_int	rpcflavor;	/* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */
 64	int	flags;		/* AUTH_F_xxx flags */
 65	caddr_t data;		/* opaque data per flavor */
 66} sec_data_t;
 67
 68#ifdef _SYSCALL32_IMPL
 69struct sec_data32 {
 70	uint32_t secmod;	/* security mode number e.g. in nfssec.conf */
 71	uint32_t rpcflavor;	/* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */
 72	int32_t flags;		/* AUTH_F_xxx flags */
 73	caddr32_t data;		/* opaque data per flavor */
 74};
 75#endif /* _SYSCALL32_IMPL */
 76
 77/*
 78 * AUTH_DES flavor specific data from sec_data opaque data field.
 79 * AUTH_KERB has the same structure.
 80 */
 81typedef struct des_clnt_data {
 82	struct netbuf	syncaddr;	/* time sync addr */
 83	struct knetconfig *knconf;	/* knetconfig info that associated */
 84					/* with the syncaddr. */
 85	char		*netname;	/* server's netname */
 86	int		netnamelen;	/* server's netname len */
 87} dh_k4_clntdata_t;
 88
 89#ifdef _SYSCALL32_IMPL
 90struct des_clnt_data32 {
 91	struct netbuf32 syncaddr;	/* time sync addr */
 92	caddr32_t knconf;		/* knetconfig info that associated */
 93					/* with the syncaddr. */
 94	caddr32_t netname;		/* server's netname */
 95	int32_t netnamelen;		/* server's netname len */
 96};
 97#endif /* _SYSCALL32_IMPL */
 98
 99#ifdef KERBEROS
100/*
101 * flavor specific data to hold the data for AUTH_DES/AUTH_KERB(v4)
102 * in sec_data->data opaque field.
103 */
104typedef struct krb4_svc_data {
105	int		window;		/* window option value */
106} krb4_svcdata_t;
107 
108typedef struct krb4_svc_data	des_svcdata_t;
109#endif /* KERBEROS */
110
111/*
112 * authentication/security specific flags
113 */
114#define AUTH_F_RPCTIMESYNC	0x001	/* use RPC to do time sync */
115#define AUTH_F_TRYNONE		0x002	/* allow fall back to AUTH_NONE */
116
117
118/*
119 * Status returned from authentication check
120 */
121enum auth_stat {
122	AUTH_OK=0,
123	/*
124	 * failed at remote end
125	 */
126	AUTH_BADCRED=1,			/* bogus credentials (seal broken) */
127	AUTH_REJECTEDCRED=2,		/* client should begin new session */
128	AUTH_BADVERF=3,			/* bogus verifier (seal broken) */
129	AUTH_REJECTEDVERF=4,		/* verifier expired or was replayed */
130	AUTH_TOOWEAK=5,			/* rejected due to security reasons */
131	/*
132	 * failed locally
133	*/
134	AUTH_INVALIDRESP=6,		/* bogus response verifier */
135	AUTH_FAILED=7,			/* some unknown reason */
136#ifdef KERBEROS
137	/*
138	 * kerberos errors
139	 */
140	,
141	AUTH_KERB_GENERIC = 8,		/* kerberos generic error */
142	AUTH_TIMEEXPIRE = 9,		/* time of credential expired */
143	AUTH_TKT_FILE = 10,		/* something wrong with ticket file */
144	AUTH_DECODE = 11,			/* can't decode authenticator */
145	AUTH_NET_ADDR = 12,		/* wrong net address in ticket */
146#endif /* KERBEROS */
147	/*
148	 * RPCSEC_GSS errors
149	 */
150	RPCSEC_GSS_CREDPROBLEM = 13,
151	RPCSEC_GSS_CTXPROBLEM = 14,
152	RPCSEC_GSS_NODISPATCH = 0x8000000
153};
154
155union des_block {
156	struct {
157		uint32_t high;
158		uint32_t low;
159	} key;
160	char c[8];
161};
162typedef union des_block des_block;
163__BEGIN_DECLS
164extern bool_t xdr_des_block(XDR *, des_block *);
165__END_DECLS
166
167/*
168 * Authentication info.  Opaque to client.
169 */
170struct opaque_auth {
171	enum_t	oa_flavor;		/* flavor of auth */
172	caddr_t	oa_base;		/* address of more auth stuff */
173	u_int	oa_length;		/* not to exceed MAX_AUTH_BYTES */
174};
175
176
177/*
178 * Auth handle, interface to client side authenticators.
179 */
180typedef struct __auth {
181	struct	opaque_auth	ah_cred;
182	struct	opaque_auth	ah_verf;
183	union	des_block	ah_key;
184	struct auth_ops {
185		void	(*ah_nextverf) (struct __auth *);
186		/* nextverf & serialize */
187		int	(*ah_marshal) (struct __auth *, XDR *);
188		/* validate verifier */
189		int	(*ah_validate) (struct __auth *,
190			    struct opaque_auth *);
191		/* refresh credentials */
192		int	(*ah_refresh) (struct __auth *, void *);
193		/* destroy this structure */
194		void	(*ah_destroy) (struct __auth *);
195	} *ah_ops;
196	void *ah_private;
197} AUTH;
198
199
200/*
201 * Authentication ops.
202 * The ops and the auth handle provide the interface to the authenticators.
203 *
204 * AUTH	*auth;
205 * XDR	*xdrs;
206 * struct opaque_auth verf;
207 */
208#define AUTH_NEXTVERF(auth)		\
209		((*((auth)->ah_ops->ah_nextverf))(auth))
210#define auth_nextverf(auth)		\
211		((*((auth)->ah_ops->ah_nextverf))(auth))
212
213#define AUTH_MARSHALL(auth, xdrs)	\
214		((*((auth)->ah_ops->ah_marshal))(auth, xdrs))
215#define auth_marshall(auth, xdrs)	\
216		((*((auth)->ah_ops->ah_marshal))(auth, xdrs))
217
218#define AUTH_VALIDATE(auth, verfp)	\
219		((*((auth)->ah_ops->ah_validate))((auth), verfp))
220#define auth_validate(auth, verfp)	\
221		((*((auth)->ah_ops->ah_validate))((auth), verfp))
222
223#define AUTH_REFRESH(auth, msg)		\
224		((*((auth)->ah_ops->ah_refresh))(auth, msg))
225#define auth_refresh(auth, msg)		\
226		((*((auth)->ah_ops->ah_refresh))(auth, msg))
227
228#define AUTH_DESTROY(auth)		\
229		((*((auth)->ah_ops->ah_destroy))(auth))
230#define auth_destroy(auth)		\
231		((*((auth)->ah_ops->ah_destroy))(auth))
232
233
234__BEGIN_DECLS
235extern struct opaque_auth _null_auth;
236__END_DECLS
237
238/*
239 * These are the various implementations of client side authenticators.
240 */
241
242/*
243 * System style authentication
244 * AUTH *authunix_create(machname, uid, gid, len, aup_gids)
245 *	char *machname;
246 *	u_int uid;
247 *	u_int gid;
248 *	int len;
249 *	u_int *aup_gids;
250 */
251__BEGIN_DECLS
252extern AUTH *authunix_create(char *, u_int, u_int, int, u_int *);
253extern AUTH *authunix_create_default(void);	/* takes no parameters */
254extern AUTH *authnone_create(void);		/* takes no parameters */
255__END_DECLS
256/*
257 * DES style authentication
258 * AUTH *authsecdes_create(servername, window, timehost, ckey)
259 * 	char *servername;		- network name of server
260 *	u_int window;			- time to live
261 * 	const char *timehost;			- optional hostname to sync with
262 * 	des_block *ckey;		- optional conversation key to use
263 */
264__BEGIN_DECLS
265extern AUTH *authdes_create (char *, u_int, struct sockaddr *, des_block *);
266extern AUTH *authdes_seccreate (const char *, const u_int, const  char *,
267    const  des_block *);
268__END_DECLS
269
270__BEGIN_DECLS
271extern bool_t xdr_opaque_auth		(XDR *, struct opaque_auth *);
272__END_DECLS
273
274#define authsys_create(c,i1,i2,i3,ip) authunix_create((c),(i1),(i2),(i3),(ip))
275#define authsys_create_default() authunix_create_default()
276
277/*
278 * Netname manipulation routines.
279 */
280__BEGIN_DECLS
281extern int getnetname(char [MAXNETNAMELEN + 1]);
282extern int host2netname(char [MAXNETNAMELEN + 1], const char *, const char *);
283extern int user2netname(char [MAXNETNAMELEN + 1], const uid_t, const char *);
284extern int netname2user(char [MAXNETNAMELEN + 1], uid_t *, gid_t *, int *,
285    gid_t *);
286extern int netname2host(char [MAXNETNAMELEN + 1], char *, const int);
287extern void passwd2des ( char *, char * );
288__END_DECLS
289
290/*
291 *
292 * These routines interface to the keyserv daemon
293 *
294 */
295__BEGIN_DECLS
296extern int key_decryptsession(const char *, des_block *);
297extern int key_encryptsession(const char *, des_block *);
298extern int key_gendes(des_block *);
299extern int key_setsecret(const char *);
300extern int key_secretkey_is_set(void);
301__END_DECLS
302
303/*
304 * Publickey routines.
305 */
306__BEGIN_DECLS
307extern int getpublickey (const char *, char *);
308extern int getpublicandprivatekey (const char *, char *);
309extern int getsecretkey (char *, char *, char *);
310__END_DECLS
311
312#ifdef KERBEROS
313/*
314 * Kerberos style authentication
315 * AUTH *authkerb_seccreate(service, srv_inst, realm, window, timehost, status)
316 *	const char *service;			- service name
317 *	const char *srv_inst;			- server instance
318 *	const char *realm;			- server realm
319 *	const u_int window;			- time to live
320 *	const char *timehost;			- optional hostname to sync with
321 *	int *status;				- kerberos status returned
322 */
323__BEGIN_DECLS
324extern AUTH	*authkerb_seccreate(const char *, const char *, const  char *,
325		    const u_int, const char *, int *);
326__END_DECLS
327
328/*
329 * Map a kerberos credential into a unix cred.
330 *
331 *	authkerb_getucred(rqst, uid, gid, grouplen, groups)
332 *	const struct svc_req *rqst;		- request pointer
333 *	uid_t *uid;
334 *	gid_t *gid;
335 *	short *grouplen;
336 *	int *groups;
337 *
338 */
339__BEGIN_DECLS
340extern int	authkerb_getucred(/* struct svc_req *, uid_t *, gid_t *,
341		    short *, int * */);
342__END_DECLS
343#endif /* KERBEROS */
344
345__BEGIN_DECLS
346struct svc_req;
347struct rpc_msg;
348enum auth_stat _svcauth_null (struct svc_req *, struct rpc_msg *);
349enum auth_stat _svcauth_short (struct svc_req *, struct rpc_msg *);
350enum auth_stat _svcauth_unix (struct svc_req *, struct rpc_msg *);
351__END_DECLS
352
353#define AUTH_NONE	0		/* no authentication */
354#define	AUTH_NULL	0		/* backward compatibility */
355#define	AUTH_SYS	1		/* unix style (uid, gids) */
356#define AUTH_UNIX	AUTH_SYS
357#define	AUTH_SHORT	2		/* short hand unix style */
358#define AUTH_DH		3		/* for Diffie-Hellman mechanism */
359#define AUTH_DES	AUTH_DH		/* for backward compatibility */
360#define AUTH_KERB	4		/* kerberos style */
361#define RPCSEC_GSS	6		/* RPCSEC_GSS */
362
363/*
364 * Pseudo auth flavors for RPCSEC_GSS.
365 */
366#define	RPCSEC_GSS_KRB5		390003
367#define	RPCSEC_GSS_KRB5I	390004
368#define	RPCSEC_GSS_KRB5P	390005
369
370#endif /* !_RPC_AUTH_H */