1184588Sdfr/*- 2184588Sdfr * Copyright (c) 2008 Doug Rabson 3184588Sdfr * All rights reserved. 4184588Sdfr * 5184588Sdfr * Redistribution and use in source and binary forms, with or without 6184588Sdfr * modification, are permitted provided that the following conditions 7184588Sdfr * are met: 8184588Sdfr * 1. Redistributions of source code must retain the above copyright 9184588Sdfr * notice, this list of conditions and the following disclaimer. 10184588Sdfr * 2. Redistributions in binary form must reproduce the above copyright 11184588Sdfr * notice, this list of conditions and the following disclaimer in the 12184588Sdfr * documentation and/or other materials provided with the distribution. 13184588Sdfr * 14184588Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 15184588Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 16184588Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 17184588Sdfr * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 18184588Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 19184588Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 20184588Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 21184588Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 22184588Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 23184588Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 24184588Sdfr * SUCH DAMAGE. 25184588Sdfr * 26184588Sdfr * $FreeBSD: releng/10.3/sys/rpc/rpcsec_gss.h 253049 2013-07-09 01:05:28Z rmacklem $ 27184588Sdfr */ 28184588Sdfr 29184588Sdfr#ifndef _RPCSEC_GSS_H 30184588Sdfr#define _RPCSEC_GSS_H 31184588Sdfr 32184588Sdfr#include <kgssapi/gssapi.h> 33184588Sdfr 34184588Sdfr#ifndef MAX_GSS_MECH 35184588Sdfr#define MAX_GSS_MECH 64 36184588Sdfr#endif 37184588Sdfr 38184588Sdfr/* 39184588Sdfr * Define the types of security service required for rpc_gss_seccreate(). 40184588Sdfr */ 41184588Sdfrtypedef enum { 42184588Sdfr rpc_gss_svc_default = 0, 43184588Sdfr rpc_gss_svc_none = 1, 44184588Sdfr rpc_gss_svc_integrity = 2, 45184588Sdfr rpc_gss_svc_privacy = 3 46184588Sdfr} rpc_gss_service_t; 47184588Sdfr 48184588Sdfr/* 49184588Sdfr * Structure containing options for rpc_gss_seccreate(). 50184588Sdfr */ 51184588Sdfrtypedef struct { 52184588Sdfr int req_flags; /* GSS request bits */ 53184588Sdfr int time_req; /* requested credential lifetime */ 54184588Sdfr gss_cred_id_t my_cred; /* GSS credential */ 55184588Sdfr gss_channel_bindings_t input_channel_bindings; 56184588Sdfr} rpc_gss_options_req_t; 57184588Sdfr 58184588Sdfr/* 59184588Sdfr * Structure containing options returned by rpc_gss_seccreate(). 60184588Sdfr */ 61184588Sdfrtypedef struct { 62184588Sdfr int major_status; 63184588Sdfr int minor_status; 64184588Sdfr u_int rpcsec_version; 65184588Sdfr int ret_flags; 66184588Sdfr int time_req; 67184588Sdfr gss_ctx_id_t gss_context; 68184588Sdfr char actual_mechanism[MAX_GSS_MECH]; 69184588Sdfr} rpc_gss_options_ret_t; 70184588Sdfr 71184588Sdfr/* 72184588Sdfr * Client principal type. Used as an argument to 73184588Sdfr * rpc_gss_get_principal_name(). Also referenced by the 74184588Sdfr * rpc_gss_rawcred_t structure. 75184588Sdfr */ 76184588Sdfrtypedef struct { 77184588Sdfr int len; 78184588Sdfr char name[1]; 79184588Sdfr} *rpc_gss_principal_t; 80184588Sdfr 81184588Sdfr/* 82184588Sdfr * Structure for raw credentials used by rpc_gss_getcred() and 83184588Sdfr * rpc_gss_set_callback(). 84184588Sdfr */ 85184588Sdfrtypedef struct { 86184588Sdfr u_int version; /* RPC version number */ 87184588Sdfr const char *mechanism; /* security mechanism */ 88184588Sdfr const char *qop; /* quality of protection */ 89184588Sdfr rpc_gss_principal_t client_principal; /* client name */ 90184588Sdfr const char *svc_principal; /* server name */ 91184588Sdfr rpc_gss_service_t service; /* service type */ 92184588Sdfr} rpc_gss_rawcred_t; 93184588Sdfr 94184588Sdfr/* 95184588Sdfr * Unix credentials derived from raw credentials. Returned by 96184588Sdfr * rpc_gss_getcred(). 97184588Sdfr */ 98184588Sdfrtypedef struct { 99184588Sdfr uid_t uid; /* user ID */ 100184588Sdfr gid_t gid; /* group ID */ 101184588Sdfr short gidlen; 102184588Sdfr gid_t *gidlist; /* list of groups */ 103184588Sdfr} rpc_gss_ucred_t; 104184588Sdfr 105184588Sdfr/* 106184588Sdfr * Structure used to enforce a particular QOP and service. 107184588Sdfr */ 108184588Sdfrtypedef struct { 109184588Sdfr bool_t locked; 110184588Sdfr rpc_gss_rawcred_t *raw_cred; 111184588Sdfr} rpc_gss_lock_t; 112184588Sdfr 113184588Sdfr/* 114184588Sdfr * Callback structure used by rpc_gss_set_callback(). 115184588Sdfr */ 116184588Sdfrtypedef struct { 117184588Sdfr u_int program; /* RPC program number */ 118184588Sdfr u_int version; /* RPC version number */ 119184588Sdfr /* user defined callback */ 120184588Sdfr bool_t (*callback)(struct svc_req *req, 121184588Sdfr gss_cred_id_t deleg, 122184588Sdfr gss_ctx_id_t gss_context, 123184588Sdfr rpc_gss_lock_t *lock, 124184588Sdfr void **cookie); 125184588Sdfr} rpc_gss_callback_t; 126184588Sdfr 127184588Sdfr/* 128184588Sdfr * Structure used to return error information by rpc_gss_get_error() 129184588Sdfr */ 130184588Sdfrtypedef struct { 131184588Sdfr int rpc_gss_error; 132184588Sdfr int system_error; /* same as errno */ 133184588Sdfr} rpc_gss_error_t; 134184588Sdfr 135184588Sdfr/* 136184588Sdfr * Values for rpc_gss_error 137184588Sdfr */ 138184588Sdfr#define RPC_GSS_ER_SUCCESS 0 /* no error */ 139184588Sdfr#define RPC_GSS_ER_SYSTEMERROR 1 /* system error */ 140184588Sdfr 141184588Sdfr__BEGIN_DECLS 142184588Sdfr 143184588Sdfr#ifdef _KERNEL 144223309Srmacklem/* 145223309Srmacklem * Set up a structure of entry points for the kgssapi module and inline 146223309Srmacklem * functions named rpc_gss_XXX_call() to use them, so that the kgssapi 147223309Srmacklem * module doesn't need to be loaded for the NFS modules to work using 148223309Srmacklem * AUTH_SYS. The kgssapi modules will be loaded by the gssd(8) daemon 149223309Srmacklem * when it is started up and the entry points will then be filled in. 150223309Srmacklem */ 151223309Srmacklemtypedef AUTH *rpc_gss_secfind_ftype(CLIENT *clnt, struct ucred *cred, 152223309Srmacklem const char *principal, gss_OID mech_oid, 153223309Srmacklem rpc_gss_service_t service); 154223309Srmacklemtypedef void rpc_gss_secpurge_ftype(CLIENT *clnt); 155223309Srmacklemtypedef AUTH *rpc_gss_seccreate_ftype(CLIENT *clnt, struct ucred *cred, 156253049Srmacklem const char *clnt_principal, const char *principal, 157253049Srmacklem const char *mechanism, rpc_gss_service_t service, 158253049Srmacklem const char *qop, rpc_gss_options_req_t *options_req, 159223309Srmacklem rpc_gss_options_ret_t *options_ret); 160223309Srmacklemtypedef bool_t rpc_gss_set_defaults_ftype(AUTH *auth, 161223309Srmacklem rpc_gss_service_t service, const char *qop); 162223309Srmacklemtypedef int rpc_gss_max_data_length_ftype(AUTH *handle, 163223309Srmacklem int max_tp_unit_len); 164223309Srmacklemtypedef void rpc_gss_get_error_ftype(rpc_gss_error_t *error); 165223309Srmacklemtypedef bool_t rpc_gss_mech_to_oid_ftype(const char *mech, gss_OID *oid_ret); 166223309Srmacklemtypedef bool_t rpc_gss_oid_to_mech_ftype(gss_OID oid, const char **mech_ret); 167223309Srmacklemtypedef bool_t rpc_gss_qop_to_num_ftype(const char *qop, const char *mech, 168223309Srmacklem u_int *num_ret); 169223309Srmacklemtypedef const char **rpc_gss_get_mechanisms_ftype(void); 170223309Srmacklemtypedef bool_t rpc_gss_get_versions_ftype(u_int *vers_hi, u_int *vers_lo); 171223309Srmacklemtypedef bool_t rpc_gss_is_installed_ftype(const char *mech); 172223309Srmacklemtypedef bool_t rpc_gss_set_svc_name_ftype(const char *principal, 173223309Srmacklem const char *mechanism, u_int req_time, u_int program, 174223309Srmacklem u_int version); 175223309Srmacklemtypedef void rpc_gss_clear_svc_name_ftype(u_int program, u_int version); 176223309Srmacklemtypedef bool_t rpc_gss_getcred_ftype(struct svc_req *req, 177223309Srmacklem rpc_gss_rawcred_t **rcred, 178223309Srmacklem rpc_gss_ucred_t **ucred, void **cookie); 179223309Srmacklemtypedef bool_t rpc_gss_set_callback_ftype(rpc_gss_callback_t *cb); 180223309Srmacklemtypedef void rpc_gss_clear_callback_ftype(rpc_gss_callback_t *cb); 181223309Srmacklemtypedef bool_t rpc_gss_get_principal_name_ftype(rpc_gss_principal_t *principal, 182223309Srmacklem const char *mech, const char *name, const char *node, 183223309Srmacklem const char *domain); 184223309Srmacklemtypedef int rpc_gss_svc_max_data_length_ftype(struct svc_req *req, 185223309Srmacklem int max_tp_unit_len); 186253049Srmacklemtypedef void rpc_gss_refresh_auth_ftype(AUTH *auth); 187223309Srmacklem 188223309Srmacklemstruct rpc_gss_entries { 189223309Srmacklem rpc_gss_secfind_ftype *rpc_gss_secfind; 190223309Srmacklem rpc_gss_secpurge_ftype *rpc_gss_secpurge; 191223309Srmacklem rpc_gss_seccreate_ftype *rpc_gss_seccreate; 192223309Srmacklem rpc_gss_set_defaults_ftype *rpc_gss_set_defaults; 193223309Srmacklem rpc_gss_max_data_length_ftype *rpc_gss_max_data_length; 194223309Srmacklem rpc_gss_get_error_ftype *rpc_gss_get_error; 195223309Srmacklem rpc_gss_mech_to_oid_ftype *rpc_gss_mech_to_oid; 196223309Srmacklem rpc_gss_oid_to_mech_ftype *rpc_gss_oid_to_mech; 197223309Srmacklem rpc_gss_qop_to_num_ftype *rpc_gss_qop_to_num; 198223309Srmacklem rpc_gss_get_mechanisms_ftype *rpc_gss_get_mechanisms; 199223309Srmacklem rpc_gss_get_versions_ftype *rpc_gss_get_versions; 200223309Srmacklem rpc_gss_is_installed_ftype *rpc_gss_is_installed; 201223309Srmacklem rpc_gss_set_svc_name_ftype *rpc_gss_set_svc_name; 202223309Srmacklem rpc_gss_clear_svc_name_ftype *rpc_gss_clear_svc_name; 203223309Srmacklem rpc_gss_getcred_ftype *rpc_gss_getcred; 204223309Srmacklem rpc_gss_set_callback_ftype *rpc_gss_set_callback; 205223309Srmacklem rpc_gss_clear_callback_ftype *rpc_gss_clear_callback; 206223309Srmacklem rpc_gss_get_principal_name_ftype *rpc_gss_get_principal_name; 207223309Srmacklem rpc_gss_svc_max_data_length_ftype *rpc_gss_svc_max_data_length; 208253049Srmacklem rpc_gss_refresh_auth_ftype *rpc_gss_refresh_auth; 209223309Srmacklem}; 210223309Srmacklemextern struct rpc_gss_entries rpc_gss_entries; 211223309Srmacklem 212223309Srmacklem/* Functions to access the entry points. */ 213223309Srmacklemstatic __inline AUTH * 214223309Srmacklemrpc_gss_secfind_call(CLIENT *clnt, struct ucred *cred, const char *principal, 215223309Srmacklem gss_OID mech_oid, rpc_gss_service_t service) 216223309Srmacklem{ 217223309Srmacklem AUTH *ret = NULL; 218223309Srmacklem 219223309Srmacklem if (rpc_gss_entries.rpc_gss_secfind != NULL) 220223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_secfind)(clnt, cred, principal, 221223309Srmacklem mech_oid, service); 222223309Srmacklem return (ret); 223223309Srmacklem} 224223309Srmacklem 225223309Srmacklemstatic __inline void 226223309Srmacklemrpc_gss_secpurge_call(CLIENT *clnt) 227223309Srmacklem{ 228223309Srmacklem 229223309Srmacklem if (rpc_gss_entries.rpc_gss_secpurge != NULL) 230223309Srmacklem (*rpc_gss_entries.rpc_gss_secpurge)(clnt); 231223309Srmacklem} 232223309Srmacklem 233223309Srmacklemstatic __inline AUTH * 234253049Srmacklemrpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred, 235253049Srmacklem const char *clnt_principal, const char *principal, const char *mechanism, 236253049Srmacklem rpc_gss_service_t service, const char *qop, 237223309Srmacklem rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret) 238223309Srmacklem{ 239223309Srmacklem AUTH *ret = NULL; 240223309Srmacklem 241223309Srmacklem if (rpc_gss_entries.rpc_gss_seccreate != NULL) 242223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_seccreate)(clnt, cred, 243253049Srmacklem clnt_principal, principal, mechanism, service, qop, 244253049Srmacklem options_req, options_ret); 245223309Srmacklem return (ret); 246223309Srmacklem} 247223309Srmacklem 248223309Srmacklemstatic __inline bool_t 249223309Srmacklemrpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service, 250223309Srmacklem const char *qop) 251223309Srmacklem{ 252223309Srmacklem bool_t ret = 1; 253223309Srmacklem 254223309Srmacklem if (rpc_gss_entries.rpc_gss_set_defaults != NULL) 255223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_set_defaults)(auth, service, 256223309Srmacklem qop); 257223309Srmacklem return (ret); 258223309Srmacklem} 259223309Srmacklem 260223309Srmacklemstatic __inline int 261223309Srmacklemrpc_gss_max_data_length_call(AUTH *handle, int max_tp_unit_len) 262223309Srmacklem{ 263223309Srmacklem int ret = 0; 264223309Srmacklem 265223309Srmacklem if (rpc_gss_entries.rpc_gss_max_data_length != NULL) 266223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_max_data_length)(handle, 267223309Srmacklem max_tp_unit_len); 268223309Srmacklem return (ret); 269223309Srmacklem} 270223309Srmacklem 271223309Srmacklemstatic __inline void 272223309Srmacklemrpc_gss_get_error_call(rpc_gss_error_t *error) 273223309Srmacklem{ 274223309Srmacklem 275223309Srmacklem if (rpc_gss_entries.rpc_gss_get_error != NULL) 276223309Srmacklem (*rpc_gss_entries.rpc_gss_get_error)(error); 277223309Srmacklem} 278223309Srmacklem 279223309Srmacklemstatic __inline bool_t 280223309Srmacklemrpc_gss_mech_to_oid_call(const char *mech, gss_OID *oid_ret) 281223309Srmacklem{ 282223309Srmacklem bool_t ret = 1; 283223309Srmacklem 284223309Srmacklem if (rpc_gss_entries.rpc_gss_mech_to_oid != NULL) 285223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_mech_to_oid)(mech, oid_ret); 286223309Srmacklem return (ret); 287223309Srmacklem} 288223309Srmacklem 289223309Srmacklemstatic __inline bool_t 290223309Srmacklemrpc_gss_oid_to_mech_call(gss_OID oid, const char **mech_ret) 291223309Srmacklem{ 292223309Srmacklem bool_t ret = 1; 293223309Srmacklem 294223309Srmacklem if (rpc_gss_entries.rpc_gss_oid_to_mech != NULL) 295223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_oid_to_mech)(oid, mech_ret); 296223309Srmacklem return (ret); 297223309Srmacklem} 298223309Srmacklem 299223309Srmacklemstatic __inline bool_t 300223309Srmacklemrpc_gss_qop_to_num_call(const char *qop, const char *mech, u_int *num_ret) 301223309Srmacklem{ 302223309Srmacklem bool_t ret = 1; 303223309Srmacklem 304223309Srmacklem if (rpc_gss_entries.rpc_gss_qop_to_num != NULL) 305223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_qop_to_num)(qop, mech, num_ret); 306223309Srmacklem return (ret); 307223309Srmacklem} 308223309Srmacklem 309223309Srmacklemstatic __inline const char ** 310223309Srmacklemrpc_gss_get_mechanisms_call(void) 311223309Srmacklem{ 312223309Srmacklem const char **ret = NULL; 313223309Srmacklem 314223309Srmacklem if (rpc_gss_entries.rpc_gss_get_mechanisms != NULL) 315223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_get_mechanisms)(); 316223309Srmacklem return (ret); 317223309Srmacklem} 318223309Srmacklem 319223309Srmacklemstatic __inline bool_t 320223309Srmacklemrpc_gss_get_versions_call(u_int *vers_hi, u_int *vers_lo) 321223309Srmacklem{ 322223309Srmacklem bool_t ret = 1; 323223309Srmacklem 324223309Srmacklem if (rpc_gss_entries.rpc_gss_get_versions != NULL) 325223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_get_versions)(vers_hi, vers_lo); 326223309Srmacklem return (ret); 327223309Srmacklem} 328223309Srmacklem 329223309Srmacklemstatic __inline bool_t 330223309Srmacklemrpc_gss_is_installed_call(const char *mech) 331223309Srmacklem{ 332223309Srmacklem bool_t ret = 1; 333223309Srmacklem 334223309Srmacklem if (rpc_gss_entries.rpc_gss_is_installed != NULL) 335223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_is_installed)(mech); 336223309Srmacklem return (ret); 337223309Srmacklem} 338223309Srmacklem 339223309Srmacklemstatic __inline bool_t 340223309Srmacklemrpc_gss_set_svc_name_call(const char *principal, const char *mechanism, 341223309Srmacklem u_int req_time, u_int program, u_int version) 342223309Srmacklem{ 343223309Srmacklem bool_t ret = 1; 344223309Srmacklem 345223309Srmacklem if (rpc_gss_entries.rpc_gss_set_svc_name != NULL) 346223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_set_svc_name)(principal, 347223309Srmacklem mechanism, req_time, program, version); 348223309Srmacklem return (ret); 349223309Srmacklem} 350223309Srmacklem 351223309Srmacklemstatic __inline void 352223309Srmacklemrpc_gss_clear_svc_name_call(u_int program, u_int version) 353223309Srmacklem{ 354223309Srmacklem 355223309Srmacklem if (rpc_gss_entries.rpc_gss_clear_svc_name != NULL) 356223309Srmacklem (*rpc_gss_entries.rpc_gss_clear_svc_name)(program, version); 357223309Srmacklem} 358223309Srmacklem 359223309Srmacklemstatic __inline bool_t 360223309Srmacklemrpc_gss_getcred_call(struct svc_req *req, rpc_gss_rawcred_t **rcred, 361223309Srmacklem rpc_gss_ucred_t **ucred, void **cookie) 362223309Srmacklem{ 363223309Srmacklem bool_t ret = 1; 364223309Srmacklem 365223309Srmacklem if (rpc_gss_entries.rpc_gss_getcred != NULL) 366223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_getcred)(req, rcred, ucred, 367223309Srmacklem cookie); 368223309Srmacklem return (ret); 369223309Srmacklem} 370223309Srmacklem 371223309Srmacklemstatic __inline bool_t 372223309Srmacklemrpc_gss_set_callback_call(rpc_gss_callback_t *cb) 373223309Srmacklem{ 374223309Srmacklem bool_t ret = 1; 375223309Srmacklem 376223309Srmacklem if (rpc_gss_entries.rpc_gss_set_callback != NULL) 377223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_set_callback)(cb); 378223309Srmacklem return (ret); 379223309Srmacklem} 380223309Srmacklem 381223309Srmacklemstatic __inline void 382223309Srmacklemrpc_gss_clear_callback_call(rpc_gss_callback_t *cb) 383223309Srmacklem{ 384223309Srmacklem 385223309Srmacklem if (rpc_gss_entries.rpc_gss_clear_callback != NULL) 386223309Srmacklem (*rpc_gss_entries.rpc_gss_clear_callback)(cb); 387223309Srmacklem} 388223309Srmacklem 389223309Srmacklemstatic __inline bool_t 390223309Srmacklemrpc_gss_get_principal_name_call(rpc_gss_principal_t *principal, 391223309Srmacklem const char *mech, const char *name, const char *node, const char *domain) 392223309Srmacklem{ 393223309Srmacklem bool_t ret = 1; 394223309Srmacklem 395223309Srmacklem if (rpc_gss_entries.rpc_gss_get_principal_name != NULL) 396223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_get_principal_name)(principal, 397223309Srmacklem mech, name, node, domain); 398223309Srmacklem return (ret); 399223309Srmacklem} 400223309Srmacklem 401223309Srmacklemstatic __inline int 402223309Srmacklemrpc_gss_svc_max_data_length_call(struct svc_req *req, int max_tp_unit_len) 403223309Srmacklem{ 404223309Srmacklem int ret = 0; 405223309Srmacklem 406223309Srmacklem if (rpc_gss_entries.rpc_gss_svc_max_data_length != NULL) 407223309Srmacklem ret = (*rpc_gss_entries.rpc_gss_svc_max_data_length)(req, 408223309Srmacklem max_tp_unit_len); 409223309Srmacklem return (ret); 410223309Srmacklem} 411223309Srmacklem 412253049Srmacklemstatic __inline void 413253049Srmacklemrpc_gss_refresh_auth_call(AUTH *auth) 414253049Srmacklem{ 415253049Srmacklem 416253049Srmacklem if (rpc_gss_entries.rpc_gss_refresh_auth != NULL) 417253049Srmacklem (*rpc_gss_entries.rpc_gss_refresh_auth)(auth); 418253049Srmacklem} 419253049Srmacklem 420184588SdfrAUTH *rpc_gss_secfind(CLIENT *clnt, struct ucred *cred, 421184588Sdfr const char *principal, gss_OID mech_oid, rpc_gss_service_t service); 422184588Sdfrvoid rpc_gss_secpurge(CLIENT *clnt); 423253049Srmacklemvoid rpc_gss_refresh_auth(AUTH *auth); 424184588SdfrAUTH *rpc_gss_seccreate(CLIENT *clnt, struct ucred *cred, 425253049Srmacklem const char *clnt_principal, const char *principal, 426253049Srmacklem const char *mechanism, rpc_gss_service_t service, 427253049Srmacklem const char *qop, rpc_gss_options_req_t *options_req, 428253049Srmacklem rpc_gss_options_ret_t *options_ret); 429253049Srmacklem#else /* !_KERNEL */ 430253049SrmacklemAUTH *rpc_gss_seccreate(CLIENT *clnt, struct ucred *cred, 431184588Sdfr const char *principal, const char *mechanism, rpc_gss_service_t service, 432184588Sdfr const char *qop, rpc_gss_options_req_t *options_req, 433184588Sdfr rpc_gss_options_ret_t *options_ret); 434253049Srmacklem#endif /* _KERNEL */ 435184588Sdfrbool_t rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service, 436184588Sdfr const char *qop); 437184588Sdfrint rpc_gss_max_data_length(AUTH *handle, int max_tp_unit_len); 438184588Sdfrvoid rpc_gss_get_error(rpc_gss_error_t *error); 439184588Sdfr 440184588Sdfrbool_t rpc_gss_mech_to_oid(const char *mech, gss_OID *oid_ret); 441184588Sdfrbool_t rpc_gss_oid_to_mech(gss_OID oid, const char **mech_ret); 442184588Sdfrbool_t rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret); 443184588Sdfrconst char **rpc_gss_get_mechanisms(void); 444184588Sdfrconst char **rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service); 445184588Sdfrbool_t rpc_gss_get_versions(u_int *vers_hi, u_int *vers_lo); 446184588Sdfrbool_t rpc_gss_is_installed(const char *mech); 447184588Sdfr 448184588Sdfrbool_t rpc_gss_set_svc_name(const char *principal, const char *mechanism, 449184588Sdfr u_int req_time, u_int program, u_int version); 450184588Sdfrvoid rpc_gss_clear_svc_name(u_int program, u_int version); 451184588Sdfrbool_t rpc_gss_getcred(struct svc_req *req, rpc_gss_rawcred_t **rcred, 452184588Sdfr rpc_gss_ucred_t **ucred, void **cookie); 453184588Sdfrbool_t rpc_gss_set_callback(rpc_gss_callback_t *cb); 454184588Sdfrvoid rpc_gss_clear_callback(rpc_gss_callback_t *cb); 455184588Sdfrbool_t rpc_gss_get_principal_name(rpc_gss_principal_t *principal, 456184588Sdfr const char *mech, const char *name, const char *node, const char *domain); 457184588Sdfrint rpc_gss_svc_max_data_length(struct svc_req *req, int max_tp_unit_len); 458184588Sdfr 459184588Sdfr/* 460184588Sdfr * Internal interface from the RPC implementation. 461184588Sdfr */ 462184588Sdfr#ifndef _KERNEL 463184588Sdfrbool_t __rpc_gss_wrap(AUTH *auth, void *header, size_t headerlen, 464184588Sdfr XDR* xdrs, xdrproc_t xdr_args, void *args_ptr); 465184588Sdfrbool_t __rpc_gss_unwrap(AUTH *auth, XDR* xdrs, xdrproc_t xdr_args, 466184588Sdfr void *args_ptr); 467184588Sdfr#endif 468184588Sdfrbool_t __rpc_gss_set_error(int rpc_gss_error, int system_error); 469184588Sdfr 470184588Sdfr__END_DECLS 471184588Sdfr 472184588Sdfr#endif /* !_RPCSEC_GSS_H */ 473