2 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
3 * unrestricted use provided that this legend is included on all tape
4 * media and as a part of the software program in whole or part. Users
5 * may copy or modify Sun RPC without charge, but are not authorized
6 * to license or distribute it to anyone else except as part of a product or
7 * program developed by the user.
9 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
10 * WARRANTIES OF DESIGN, MERCHANTABILITY AND FITNESS FOR A PARTICULAR
11 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
13 * Sun RPC is provided with no support and without any obligation on the
14 * part of Sun Microsystems, Inc. to assist in its use, correction,
15 * modification or enhancement.
17 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
18 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
19 * OR ANY PART THEREOF.
21 * In no event will Sun Microsystems, Inc. be liable for any lost revenue
22 * or profits or other special, indirect and consequential damages, even if
23 * Sun has been advised of the possibility of such damages.
25 * Sun Microsystems, Inc.
27 * Mountain View, California 94043
29 * from: @(#)auth.h 1.17 88/02/08 SMI
30 * from: @(#)auth.h 2.3 88/08/07 4.0 RPCSRC
31 * from: @(#)auth.h 1.43 98/02/02 SMI
32 * $NetBSD: auth.h,v 1.15 2000/06/02 22:57:55 fvdl Exp $
33 * $FreeBSD: src/include/rpc/auth.h,v 1.21 2006/02/28 16:02:26 deischen Exp $
34 * $DragonFly: src/include/rpc/auth.h,v 1.4 2004/02/26 13:58:26 joerg Exp $
38 * auth.h, Authentication interface.
40 * Copyright (C) 1984, Sun Microsystems, Inc.
42 * The data structures are completely opaque to the client. The client
43 * is required to pass an AUTH * to routines that create rpc
50 #include <rpc/clnt_stat.h>
51 #include <sys/cdefs.h>
52 #include <sys/socket.h>
54 #define MAX_AUTH_BYTES 400
55 #define MAXNETNAMELEN 255 /* maximum length of network user's name */
58 * Client side authentication/security data
61 typedef struct sec_data
{
62 u_int secmod
; /* security mode number e.g. in nfssec.conf */
63 u_int rpcflavor
; /* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */
64 int flags
; /* AUTH_F_xxx flags */
65 caddr_t data
; /* opaque data per flavor */
68 #ifdef _SYSCALL32_IMPL
70 uint32_t secmod
; /* security mode number e.g. in nfssec.conf */
71 uint32_t rpcflavor
; /* rpc flavors:AUTH_UNIX,AUTH_DES,RPCSEC_GSS */
72 int32_t flags
; /* AUTH_F_xxx flags */
73 caddr32_t data
; /* opaque data per flavor */
75 #endif /* _SYSCALL32_IMPL */
78 * AUTH_DES flavor specific data from sec_data opaque data field.
79 * AUTH_KERB has the same structure.
81 typedef struct des_clnt_data
{
82 struct netbuf syncaddr
; /* time sync addr */
83 struct knetconfig
*knconf
; /* knetconfig info that associated */
84 /* with the syncaddr. */
85 char *netname
; /* server's netname */
86 int netnamelen
; /* server's netname len */
89 #ifdef _SYSCALL32_IMPL
90 struct des_clnt_data32
{
91 struct netbuf32 syncaddr
; /* time sync addr */
92 caddr32_t knconf
; /* knetconfig info that associated */
93 /* with the syncaddr. */
94 caddr32_t netname
; /* server's netname */
95 int32_t netnamelen
; /* server's netname len */
97 #endif /* _SYSCALL32_IMPL */
101 * flavor specific data to hold the data for AUTH_DES/AUTH_KERB(v4)
102 * in sec_data->data opaque field.
104 typedef struct krb4_svc_data
{
105 int window
; /* window option value */
108 typedef struct krb4_svc_data des_svcdata_t
;
109 #endif /* KERBEROS */
112 * authentication/security specific flags
114 #define AUTH_F_RPCTIMESYNC 0x001 /* use RPC to do time sync */
115 #define AUTH_F_TRYNONE 0x002 /* allow fall back to AUTH_NONE */
119 * Status returned from authentication check
124 * failed at remote end
126 AUTH_BADCRED
=1, /* bogus credentials (seal broken) */
127 AUTH_REJECTEDCRED
=2, /* client should begin new session */
128 AUTH_BADVERF
=3, /* bogus verifier (seal broken) */
129 AUTH_REJECTEDVERF
=4, /* verifier expired or was replayed */
130 AUTH_TOOWEAK
=5, /* rejected due to security reasons */
134 AUTH_INVALIDRESP
=6, /* bogus response verifier */
135 AUTH_FAILED
=7 /* some unknown reason */
141 AUTH_KERB_GENERIC
= 8, /* kerberos generic error */
142 AUTH_TIMEEXPIRE
= 9, /* time of credential expired */
143 AUTH_TKT_FILE
= 10, /* something wrong with ticket file */
144 AUTH_DECODE
= 11, /* can't decode authenticator */
145 AUTH_NET_ADDR
= 12 /* wrong net address in ticket */
146 #endif /* KERBEROS */
156 typedef union des_block des_block
;
158 bool_t
xdr_des_block(XDR
*, des_block
*);
162 * Authentication info. Opaque to client.
165 enum_t oa_flavor
; /* flavor of auth */
166 caddr_t oa_base
; /* address of more auth stuff */
167 u_int oa_length
; /* not to exceed MAX_AUTH_BYTES */
172 * Auth handle, interface to client side authenticators.
174 typedef struct __auth
{
175 struct opaque_auth ah_cred
;
176 struct opaque_auth ah_verf
;
177 union des_block ah_key
;
179 void (*ah_nextverf
) (struct __auth
*);
180 /* nextverf & serialize */
181 int (*ah_marshal
) (struct __auth
*, XDR
*);
182 /* validate verifier */
183 int (*ah_validate
) (struct __auth
*,
184 struct opaque_auth
*);
185 /* refresh credentials */
186 int (*ah_refresh
) (struct __auth
*, void *);
187 /* destroy this structure */
188 void (*ah_destroy
) (struct __auth
*);
195 * Authentication ops.
196 * The ops and the auth handle provide the interface to the authenticators.
200 * struct opaque_auth verf;
202 #define AUTH_NEXTVERF(auth) \
203 ((*((auth)->ah_ops->ah_nextverf))(auth))
204 #define auth_nextverf(auth) \
205 ((*((auth)->ah_ops->ah_nextverf))(auth))
207 #define AUTH_MARSHALL(auth, xdrs) \
208 ((*((auth)->ah_ops->ah_marshal))(auth, xdrs))
209 #define auth_marshall(auth, xdrs) \
210 ((*((auth)->ah_ops->ah_marshal))(auth, xdrs))
212 #define AUTH_VALIDATE(auth, verfp) \
213 ((*((auth)->ah_ops->ah_validate))((auth), verfp))
214 #define auth_validate(auth, verfp) \
215 ((*((auth)->ah_ops->ah_validate))((auth), verfp))
217 #define AUTH_REFRESH(auth, msg) \
218 ((*((auth)->ah_ops->ah_refresh))(auth, msg))
219 #define auth_refresh(auth, msg) \
220 ((*((auth)->ah_ops->ah_refresh))(auth, msg))
222 #define AUTH_DESTROY(auth) \
223 ((*((auth)->ah_ops->ah_destroy))(auth))
224 #define auth_destroy(auth) \
225 ((*((auth)->ah_ops->ah_destroy))(auth))
229 extern struct opaque_auth _null_auth
;
233 * These are the various implementations of client side authenticators.
237 * System style authentication
238 * AUTH *authunix_create(machname, uid, gid, len, aup_gids)
246 AUTH
*authunix_create(char *, int, int, int, int *);
247 AUTH
*authunix_create_default(void);
248 AUTH
*authnone_create(void);
251 * DES style authentication
252 * AUTH *authsecdes_create(servername, window, timehost, ckey)
253 * char *servername; - network name of server
254 * u_int window; - time to live
255 * const char *timehost; - optional hostname to sync with
256 * des_block *ckey; - optional conversation key to use
259 AUTH
*authdes_create(char *, u_int
, struct sockaddr
*, des_block
*);
260 AUTH
*authdes_seccreate(const char *, const u_int
, const char *,
265 bool_t
xdr_opaque_auth(XDR
*, struct opaque_auth
*);
268 #define authsys_create(c,i1,i2,i3,ip) authunix_create((c),(i1),(i2),(i3),(ip))
269 #define authsys_create_default() authunix_create_default()
272 * Netname manipulation routines.
275 int getnetname(char *);
276 int host2netname(char *, const char *, const char *);
277 int user2netname(char *, const uid_t
, const char *);
278 int netname2user(char *, uid_t
*, gid_t
*, int *, gid_t
*);
279 int netname2host(char *, char *, const int);
280 void passwd2des(char *, char *);
285 * These routines interface to the keyserv daemon
289 int key_decryptsession(const char *, des_block
*);
290 int key_encryptsession(const char *, des_block
*);
291 int key_gendes(des_block
*);
292 int key_setsecret(const char *);
293 int key_secretkey_is_set(void);
297 * Publickey routines.
300 int getpublickey(const char *, char *);
301 int getpublicandprivatekey(const char *, char *);
302 int getsecretkey(char *, char *, char *);
307 * Kerberos style authentication
308 * AUTH *authkerb_seccreate(service, srv_inst, realm, window, timehost, status)
309 * const char *service; - service name
310 * const char *srv_inst; - server instance
311 * const char *realm; - server realm
312 * const u_int window; - time to live
313 * const char *timehost; - optional hostname to sync with
314 * int *status; - kerberos status returned
317 AUTH
*authkerb_seccreate(const char *, const char *, const char *,
318 const u_int
, const char *, int *);
322 * Map a kerberos credential into a unix cred.
324 * authkerb_getucred(rqst, uid, gid, grouplen, groups)
325 * const struct svc_req *rqst; - request pointer
333 int authkerb_getucred(/* struct svc_req *, uid_t *, gid_t *,
336 #endif /* KERBEROS */
341 enum auth_stat
_svcauth_null (struct svc_req
*, struct rpc_msg
*);
342 enum auth_stat
_svcauth_short (struct svc_req
*, struct rpc_msg
*);
343 enum auth_stat
_svcauth_unix (struct svc_req
*, struct rpc_msg
*);
346 #define AUTH_NONE 0 /* no authentication */
347 #define AUTH_NULL 0 /* backward compatibility */
348 #define AUTH_SYS 1 /* unix style (uid, gids) */
349 #define AUTH_UNIX AUTH_SYS
350 #define AUTH_SHORT 2 /* short hand unix style */
351 #define AUTH_DH 3 /* for Diffie-Hellman mechanism */
352 #define AUTH_DES AUTH_DH /* for backward compatibility */
353 #define AUTH_KERB 4 /* kerberos style */
355 #endif /* !_RPC_AUTH_H */