xref: /freebsd/sys/rpc/rpcsec_gss.h (revision 4b9d6057)
1 /*-
2  * SPDX-License-Identifier: BSD-2-Clause
3  *
4  * Copyright (c) 2008 Doug Rabson
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
17  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
20  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
21  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
22  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
23  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
24  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
25  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26  * SUCH DAMAGE.
27  */
28 
29 #ifndef _RPCSEC_GSS_H
30 #define _RPCSEC_GSS_H
31 
32 #include <kgssapi/gssapi.h>
33 
34 #ifndef MAX_GSS_MECH
35 #define MAX_GSS_MECH	64
36 #endif
37 
38 /*
39  * Define the types of security service required for rpc_gss_seccreate().
40  */
41 typedef enum {
42 	rpc_gss_svc_default	= 0,
43 	rpc_gss_svc_none	= 1,
44 	rpc_gss_svc_integrity	= 2,
45 	rpc_gss_svc_privacy	= 3
46 } rpc_gss_service_t;
47 
48 /*
49  * Structure containing options for rpc_gss_seccreate().
50  */
51 typedef struct {
52 	int		req_flags;	/* GSS request bits */
53 	int		time_req;	/* requested credential lifetime */
54 	gss_cred_id_t	my_cred;	/* GSS credential */
55 	gss_channel_bindings_t input_channel_bindings;
56 } rpc_gss_options_req_t;
57 
58 /*
59  * Structure containing options returned by rpc_gss_seccreate().
60  */
61 typedef struct {
62 	int		major_status;
63 	int		minor_status;
64 	u_int		rpcsec_version;
65 	int		ret_flags;
66 	int		time_req;
67 	gss_ctx_id_t	gss_context;
68 	char		actual_mechanism[MAX_GSS_MECH];
69 } rpc_gss_options_ret_t;
70 
71 /*
72  * Client principal type. Used as an argument to
73  * rpc_gss_get_principal_name(). Also referenced by the
74  * rpc_gss_rawcred_t structure.
75  */
76 typedef struct {
77 	int		len;
78 	char		name[1];
79 } *rpc_gss_principal_t;
80 
81 /*
82  * Structure for raw credentials used by rpc_gss_getcred() and
83  * rpc_gss_set_callback().
84  */
85 typedef struct {
86 	u_int		version;	/* RPC version number */
87 	const char	*mechanism;	/* security mechanism */
88 	const char	*qop;		/* quality of protection */
89 	rpc_gss_principal_t client_principal; /* client name */
90 	const char	*svc_principal;	/* server name */
91 	rpc_gss_service_t service;	/* service type */
92 } rpc_gss_rawcred_t;
93 
94 /*
95  * Unix credentials derived from raw credentials. Returned by
96  * rpc_gss_getcred().
97  */
98 typedef struct {
99 	uid_t		uid;		/* user ID */
100 	gid_t		gid;		/* group ID */
101 	short		gidlen;
102 	gid_t		*gidlist;	/* list of groups */
103 } rpc_gss_ucred_t;
104 
105 /*
106  * Structure used to enforce a particular QOP and service.
107  */
108 typedef struct {
109 	bool_t		locked;
110 	rpc_gss_rawcred_t *raw_cred;
111 } rpc_gss_lock_t;
112 
113 /*
114  * Callback structure used by rpc_gss_set_callback().
115  */
116 typedef struct {
117 	u_int		program;	/* RPC program number */
118 	u_int		version;	/* RPC version number */
119 					/* user defined callback */
120 	bool_t		(*callback)(struct svc_req *req,
121 				    gss_cred_id_t deleg,
122 				    gss_ctx_id_t gss_context,
123 				    rpc_gss_lock_t *lock,
124 				    void **cookie);
125 } rpc_gss_callback_t;
126 
127 /*
128  * Structure used to return error information by rpc_gss_get_error()
129  */
130 typedef struct {
131 	int		rpc_gss_error;
132 	int		system_error;	/* same as errno */
133 } rpc_gss_error_t;
134 
135 /*
136  * Values for rpc_gss_error
137  */
138 #define RPC_GSS_ER_SUCCESS	0	/* no error */
139 #define RPC_GSS_ER_SYSTEMERROR	1	/* system error */
140 
141 __BEGIN_DECLS
142 
143 #ifdef _KERNEL
144 /*
145  * Set up a structure of entry points for the kgssapi module and inline
146  * functions named rpc_gss_XXX_call() to use them, so that the kgssapi
147  * module doesn't need to be loaded for the NFS modules to work using
148  * AUTH_SYS. The kgssapi modules will be loaded by the gssd(8) daemon
149  * when it is started up and the entry points will then be filled in.
150  */
151 typedef AUTH	*rpc_gss_secfind_ftype(CLIENT *clnt, struct ucred *cred,
152 		    const char *principal, gss_OID mech_oid,
153 		    rpc_gss_service_t service);
154 typedef void	rpc_gss_secpurge_ftype(CLIENT *clnt);
155 typedef AUTH	*rpc_gss_seccreate_ftype(CLIENT *clnt, struct ucred *cred,
156 		    const char *clnt_principal, const char *principal,
157 		    const char *mechanism, rpc_gss_service_t service,
158 		    const char *qop, rpc_gss_options_req_t *options_req,
159 		    rpc_gss_options_ret_t *options_ret);
160 typedef bool_t	rpc_gss_set_defaults_ftype(AUTH *auth,
161 		    rpc_gss_service_t service, const char *qop);
162 typedef int	rpc_gss_max_data_length_ftype(AUTH *handle,
163 		    int max_tp_unit_len);
164 typedef void	rpc_gss_get_error_ftype(rpc_gss_error_t *error);
165 typedef bool_t	rpc_gss_mech_to_oid_ftype(const char *mech, gss_OID *oid_ret);
166 typedef bool_t	rpc_gss_oid_to_mech_ftype(gss_OID oid, const char **mech_ret);
167 typedef bool_t	rpc_gss_qop_to_num_ftype(const char *qop, const char *mech,
168 		    u_int *num_ret);
169 typedef const char **rpc_gss_get_mechanisms_ftype(void);
170 typedef bool_t	rpc_gss_get_versions_ftype(u_int *vers_hi, u_int *vers_lo);
171 typedef bool_t	rpc_gss_is_installed_ftype(const char *mech);
172 typedef bool_t	rpc_gss_set_svc_name_ftype(const char *principal,
173 		    const char *mechanism, u_int req_time, u_int program,
174 		    u_int version);
175 typedef void	rpc_gss_clear_svc_name_ftype(u_int program, u_int version);
176 typedef bool_t	rpc_gss_getcred_ftype(struct svc_req *req,
177 		    rpc_gss_rawcred_t **rcred,
178 		    rpc_gss_ucred_t **ucred, void **cookie);
179 typedef bool_t	rpc_gss_set_callback_ftype(rpc_gss_callback_t *cb);
180 typedef void	rpc_gss_clear_callback_ftype(rpc_gss_callback_t *cb);
181 typedef bool_t	rpc_gss_get_principal_name_ftype(rpc_gss_principal_t *principal,
182 		    const char *mech, const char *name, const char *node,
183 		    const char *domain);
184 typedef int	rpc_gss_svc_max_data_length_ftype(struct svc_req *req,
185 		    int max_tp_unit_len);
186 typedef void	rpc_gss_refresh_auth_ftype(AUTH *auth);
187 typedef bool_t	rpc_gss_ip_to_srv_principal_ftype(char *ip_addr,
188 		    const char *srv_name, char *dns_name);
189 
190 struct rpc_gss_entries {
191 	rpc_gss_secfind_ftype		*rpc_gss_secfind;
192 	rpc_gss_secpurge_ftype		*rpc_gss_secpurge;
193 	rpc_gss_seccreate_ftype		*rpc_gss_seccreate;
194 	rpc_gss_set_defaults_ftype	*rpc_gss_set_defaults;
195 	rpc_gss_max_data_length_ftype	*rpc_gss_max_data_length;
196 	rpc_gss_get_error_ftype		*rpc_gss_get_error;
197 	rpc_gss_mech_to_oid_ftype	*rpc_gss_mech_to_oid;
198 	rpc_gss_oid_to_mech_ftype	*rpc_gss_oid_to_mech;
199 	rpc_gss_qop_to_num_ftype	*rpc_gss_qop_to_num;
200 	rpc_gss_get_mechanisms_ftype	*rpc_gss_get_mechanisms;
201 	rpc_gss_get_versions_ftype	*rpc_gss_get_versions;
202 	rpc_gss_is_installed_ftype	*rpc_gss_is_installed;
203 	rpc_gss_set_svc_name_ftype	*rpc_gss_set_svc_name;
204 	rpc_gss_clear_svc_name_ftype	*rpc_gss_clear_svc_name;
205 	rpc_gss_getcred_ftype		*rpc_gss_getcred;
206 	rpc_gss_set_callback_ftype	*rpc_gss_set_callback;
207 	rpc_gss_clear_callback_ftype	*rpc_gss_clear_callback;
208 	rpc_gss_get_principal_name_ftype *rpc_gss_get_principal_name;
209 	rpc_gss_svc_max_data_length_ftype *rpc_gss_svc_max_data_length;
210 	rpc_gss_refresh_auth_ftype	*rpc_gss_refresh_auth;
211 	rpc_gss_ip_to_srv_principal_ftype *rpc_gss_ip_to_srv_principal;
212 };
213 extern struct rpc_gss_entries	rpc_gss_entries;
214 
215 /* Functions to access the entry points. */
216 static __inline AUTH *
217 rpc_gss_secfind_call(CLIENT *clnt, struct ucred *cred, const char *principal,
218     gss_OID mech_oid, rpc_gss_service_t service)
219 {
220 	AUTH *ret = NULL;
221 
222 	if (rpc_gss_entries.rpc_gss_secfind != NULL)
223 		ret = (*rpc_gss_entries.rpc_gss_secfind)(clnt, cred, principal,
224 		    mech_oid, service);
225 	return (ret);
226 }
227 
228 static __inline void
229 rpc_gss_secpurge_call(CLIENT *clnt)
230 {
231 
232 	if (rpc_gss_entries.rpc_gss_secpurge != NULL)
233 		(*rpc_gss_entries.rpc_gss_secpurge)(clnt);
234 }
235 
236 static __inline AUTH *
237 rpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred,
238     const char *clnt_principal, const char *principal, const char *mechanism,
239     rpc_gss_service_t service, const char *qop,
240     rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret)
241 {
242 	AUTH *ret = NULL;
243 
244 	if (rpc_gss_entries.rpc_gss_seccreate != NULL)
245 		ret = (*rpc_gss_entries.rpc_gss_seccreate)(clnt, cred,
246 		    clnt_principal, principal, mechanism, service, qop,
247 		    options_req, options_ret);
248 	return (ret);
249 }
250 
251 static __inline bool_t
252 rpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service,
253     const char *qop)
254 {
255 	bool_t ret = 1;
256 
257 	if (rpc_gss_entries.rpc_gss_set_defaults != NULL)
258 		ret = (*rpc_gss_entries.rpc_gss_set_defaults)(auth, service,
259 		    qop);
260 	return (ret);
261 }
262 
263 static __inline int
264 rpc_gss_max_data_length_call(AUTH *handle, int max_tp_unit_len)
265 {
266 	int ret = 0;
267 
268 	if (rpc_gss_entries.rpc_gss_max_data_length != NULL)
269 		ret = (*rpc_gss_entries.rpc_gss_max_data_length)(handle,
270 		    max_tp_unit_len);
271 	return (ret);
272 }
273 
274 static __inline void
275 rpc_gss_get_error_call(rpc_gss_error_t *error)
276 {
277 
278 	if (rpc_gss_entries.rpc_gss_get_error != NULL)
279 		(*rpc_gss_entries.rpc_gss_get_error)(error);
280 }
281 
282 static __inline bool_t
283 rpc_gss_mech_to_oid_call(const char *mech, gss_OID *oid_ret)
284 {
285 	bool_t ret = 1;
286 
287 	if (rpc_gss_entries.rpc_gss_mech_to_oid != NULL)
288 		ret = (*rpc_gss_entries.rpc_gss_mech_to_oid)(mech, oid_ret);
289 	return (ret);
290 }
291 
292 static __inline bool_t
293 rpc_gss_oid_to_mech_call(gss_OID oid, const char **mech_ret)
294 {
295 	bool_t ret = 1;
296 
297 	if (rpc_gss_entries.rpc_gss_oid_to_mech != NULL)
298 		ret = (*rpc_gss_entries.rpc_gss_oid_to_mech)(oid, mech_ret);
299 	return (ret);
300 }
301 
302 static __inline bool_t
303 rpc_gss_qop_to_num_call(const char *qop, const char *mech, u_int *num_ret)
304 {
305 	bool_t ret = 1;
306 
307 	if (rpc_gss_entries.rpc_gss_qop_to_num != NULL)
308 		ret = (*rpc_gss_entries.rpc_gss_qop_to_num)(qop, mech, num_ret);
309 	return (ret);
310 }
311 
312 static __inline const char **
313 rpc_gss_get_mechanisms_call(void)
314 {
315 	const char **ret = NULL;
316 
317 	if (rpc_gss_entries.rpc_gss_get_mechanisms != NULL)
318 		ret = (*rpc_gss_entries.rpc_gss_get_mechanisms)();
319 	return (ret);
320 }
321 
322 static __inline bool_t
323 rpc_gss_get_versions_call(u_int *vers_hi, u_int *vers_lo)
324 {
325 	bool_t ret = 1;
326 
327 	if (rpc_gss_entries.rpc_gss_get_versions != NULL)
328 		ret = (*rpc_gss_entries.rpc_gss_get_versions)(vers_hi, vers_lo);
329 	return (ret);
330 }
331 
332 static __inline bool_t
333 rpc_gss_is_installed_call(const char *mech)
334 {
335 	bool_t ret = 1;
336 
337 	if (rpc_gss_entries.rpc_gss_is_installed != NULL)
338 		ret = (*rpc_gss_entries.rpc_gss_is_installed)(mech);
339 	return (ret);
340 }
341 
342 static __inline bool_t
343 rpc_gss_set_svc_name_call(const char *principal, const char *mechanism,
344     u_int req_time, u_int program, u_int version)
345 {
346 	bool_t ret = 1;
347 
348 	if (rpc_gss_entries.rpc_gss_set_svc_name != NULL)
349 		ret = (*rpc_gss_entries.rpc_gss_set_svc_name)(principal,
350 		    mechanism, req_time, program, version);
351 	return (ret);
352 }
353 
354 static __inline void
355 rpc_gss_clear_svc_name_call(u_int program, u_int version)
356 {
357 
358 	if (rpc_gss_entries.rpc_gss_clear_svc_name != NULL)
359 		(*rpc_gss_entries.rpc_gss_clear_svc_name)(program, version);
360 }
361 
362 static __inline bool_t
363 rpc_gss_getcred_call(struct svc_req *req, rpc_gss_rawcred_t **rcred,
364     rpc_gss_ucred_t **ucred, void **cookie)
365 {
366 	bool_t ret = 1;
367 
368 	if (rpc_gss_entries.rpc_gss_getcred != NULL)
369 		ret = (*rpc_gss_entries.rpc_gss_getcred)(req, rcred, ucred,
370 		    cookie);
371 	return (ret);
372 }
373 
374 static __inline bool_t
375 rpc_gss_set_callback_call(rpc_gss_callback_t *cb)
376 {
377 	bool_t ret = 1;
378 
379 	if (rpc_gss_entries.rpc_gss_set_callback != NULL)
380 		ret = (*rpc_gss_entries.rpc_gss_set_callback)(cb);
381 	return (ret);
382 }
383 
384 static __inline void
385 rpc_gss_clear_callback_call(rpc_gss_callback_t *cb)
386 {
387 
388 	if (rpc_gss_entries.rpc_gss_clear_callback != NULL)
389 		(*rpc_gss_entries.rpc_gss_clear_callback)(cb);
390 }
391 
392 static __inline bool_t
393 rpc_gss_get_principal_name_call(rpc_gss_principal_t *principal,
394     const char *mech, const char *name, const char *node, const char *domain)
395 {
396 	bool_t ret = 1;
397 
398 	if (rpc_gss_entries.rpc_gss_get_principal_name != NULL)
399 		ret = (*rpc_gss_entries.rpc_gss_get_principal_name)(principal,
400 		    mech, name, node, domain);
401 	return (ret);
402 }
403 
404 static __inline int
405 rpc_gss_svc_max_data_length_call(struct svc_req *req, int max_tp_unit_len)
406 {
407 	int ret = 0;
408 
409 	if (rpc_gss_entries.rpc_gss_svc_max_data_length != NULL)
410 		ret = (*rpc_gss_entries.rpc_gss_svc_max_data_length)(req,
411 		    max_tp_unit_len);
412 	return (ret);
413 }
414 
415 static __inline void
416 rpc_gss_refresh_auth_call(AUTH *auth)
417 {
418 
419 	if (rpc_gss_entries.rpc_gss_refresh_auth != NULL)
420 		(*rpc_gss_entries.rpc_gss_refresh_auth)(auth);
421 }
422 
423 static __inline bool_t
424 rpc_gss_ip_to_srv_principal_call(char *ip_addr, const char *srv_name,
425     char *dns_name)
426 {
427 	bool_t ret = FALSE;
428 
429 	if (rpc_gss_entries.rpc_gss_ip_to_srv_principal != NULL)
430 		ret = (*rpc_gss_entries.rpc_gss_ip_to_srv_principal)(ip_addr,
431 		    srv_name, dns_name);
432 	return (ret);
433 }
434 
435 AUTH	*rpc_gss_secfind(CLIENT *clnt, struct ucred *cred,
436     const char *principal, gss_OID mech_oid, rpc_gss_service_t service);
437 void	rpc_gss_secpurge(CLIENT *clnt);
438 void	rpc_gss_refresh_auth(AUTH *auth);
439 AUTH	*rpc_gss_seccreate(CLIENT *clnt, struct ucred *cred,
440     const char *clnt_principal, const char *principal,
441     const char *mechanism, rpc_gss_service_t service,
442     const char *qop, rpc_gss_options_req_t *options_req,
443     rpc_gss_options_ret_t *options_ret);
444 #else	/* !_KERNEL */
445 AUTH	*rpc_gss_seccreate(CLIENT *clnt, struct ucred *cred,
446     const char *principal, const char *mechanism, rpc_gss_service_t service,
447     const char *qop, rpc_gss_options_req_t *options_req,
448     rpc_gss_options_ret_t *options_ret);
449 #endif	/* _KERNEL */
450 bool_t	rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service,
451     const char *qop);
452 int	rpc_gss_max_data_length(AUTH *handle, int max_tp_unit_len);
453 void	rpc_gss_get_error(rpc_gss_error_t *error);
454 
455 bool_t	rpc_gss_mech_to_oid(const char *mech, gss_OID *oid_ret);
456 bool_t	rpc_gss_oid_to_mech(gss_OID oid, const char **mech_ret);
457 bool_t	rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret);
458 const char **rpc_gss_get_mechanisms(void);
459 const char **rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service);
460 bool_t	rpc_gss_get_versions(u_int *vers_hi, u_int *vers_lo);
461 bool_t	rpc_gss_is_installed(const char *mech);
462 
463 bool_t	rpc_gss_set_svc_name(const char *principal, const char *mechanism,
464     u_int req_time, u_int program, u_int version);
465 void rpc_gss_clear_svc_name(u_int program, u_int version);
466 bool_t	rpc_gss_getcred(struct svc_req *req, rpc_gss_rawcred_t **rcred,
467     rpc_gss_ucred_t **ucred, void **cookie);
468 bool_t	rpc_gss_set_callback(rpc_gss_callback_t *cb);
469 void rpc_gss_clear_callback(rpc_gss_callback_t *cb);
470 bool_t	rpc_gss_get_principal_name(rpc_gss_principal_t *principal,
471     const char *mech, const char *name, const char *node, const char *domain);
472 int	rpc_gss_svc_max_data_length(struct svc_req *req, int max_tp_unit_len);
473 bool_t	rpc_gss_ip_to_srv_principal(char *ip_addr, const char *srv_name,
474     char *dns_name);
475 
476 /*
477  * Internal interface from the RPC implementation.
478  */
479 #ifndef _KERNEL
480 bool_t	__rpc_gss_wrap(AUTH *auth, void *header, size_t headerlen,
481     XDR* xdrs, xdrproc_t xdr_args, void *args_ptr);
482 bool_t	__rpc_gss_unwrap(AUTH *auth, XDR* xdrs, xdrproc_t xdr_args,
483     void *args_ptr);
484 #endif
485 bool_t __rpc_gss_set_error(int rpc_gss_error, int system_error);
486 
487 __END_DECLS
488 
489 #endif /* !_RPCSEC_GSS_H */
490