1/*
2 * CDDL HEADER START
3 *
4 * The contents of this file are subject to the terms of the
5 * Common Development and Distribution License, Version 1.0 only
6 * (the "License").  You may not use this file except in compliance
7 * with the License.
8 *
9 * You can obtain a copy of the license at usr/src/OPENSOLARIS.LICENSE
10 * or http://www.opensolaris.org/os/licensing.
11 * See the License for the specific language governing permissions
12 * and limitations under the License.
13 *
14 * When distributing Covered Code, include this CDDL HEADER in each
15 * file and include the License file at usr/src/OPENSOLARIS.LICENSE.
16 * If applicable, add the following below this CDDL HEADER, with the
17 * fields enclosed by brackets "[]" replaced with your own identifying
18 * information: Portions Copyright [yyyy] [name of copyright owner]
19 *
20 * CDDL HEADER END
21 */
22/*
23 * Copyright 2004 Sun Microsystems, Inc.  All rights reserved.
24 * Use is subject to license terms.
25 */
26
27/* Copyright (c) 1983, 1984, 1985, 1986, 1987, 1988, 1989 AT&T */
28/* All Rights Reserved */
29
30/*
31 * Portions of this source code were derived from Berkeley 4.3 BSD
32 * under license from the Regents of the University of California.
33 */
34
35#pragma ident	"%Z%%M%	%I%	%E% SMI"
36
37/*
38 * Adapted for use by the boot program.
39 *
40 * auth_unix.c, Implements UNIX style authentication parameters.
41 *
42 * The system is very weak.  The client uses no encryption for its
43 * credentials and only sends null verifiers.  The server sends backs
44 * null verifiers or optionally a verifier that suggests a new short hand
45 * for the credentials.
46 */
47
48#include <stdlib.h>
49#include <sys/sysmacros.h>
50#include <rpc/types.h>
51#include <rpc/xdr.h>
52#include <rpc/auth.h>
53#include "clnt.h"
54#include <rpc/auth_unix.h>
55#include <sys/promif.h>
56#include <sys/salib.h>
57#include <sys/bootdebug.h>
58#include "nfs_inet.h"
59
60static struct auth_ops *authunix_ops();
61/*
62 * This struct is pointed to by the ah_private field of an auth_handle.
63 */
64struct audata {
65	struct opaque_auth	au_origcred;	/* original credentials */
66	struct opaque_auth	au_shcred;	/* short hand cred */
67	uint_t			au_shfaults;	/* short hand cache faults */
68	char			au_marshed[MAX_AUTH_BYTES];
69	uint_t			au_mpos;	/* xdr pos at end of marshed */
70};
71#define	AUTH_PRIVATE(auth)	((struct audata *)auth->ah_private)
72
73static void marshal_new_auth(AUTH *);
74
75#define	dprintf	if (boothowto & RB_DEBUG) printf
76
77/*
78 * Create a unix style authenticator.
79 * Returns an auth handle with the given stuff in it.
80 */
81AUTH *
82authunix_create(char *machname, uid_t uid, gid_t gid, int len, gid_t *aup_gids)
83{
84	struct authunix_parms aup;
85	char mymem[MAX_AUTH_BYTES];
86	XDR xdrs;
87	AUTH *auth;
88	struct audata *au;
89
90	/*
91	 * Allocate and set up auth handle
92	 */
93	auth = (AUTH *) bkmem_alloc(sizeof (*auth));
94	if (auth == NULL) {
95		prom_panic("authunix_create: Cannot allocate memory.");
96		return (NULL);
97	}
98
99	au = (struct audata *)bkmem_alloc(sizeof (*au));
100	if (au == NULL) {
101		prom_panic("authunix_create: Cannot allocate memory.");
102		return (NULL);
103	}
104
105	/* setup authenticator. */
106	auth->ah_ops = authunix_ops();
107	auth->ah_private = (caddr_t)au;
108
109	/* structure copies */
110	auth->ah_verf = au->au_shcred = _null_auth;
111
112	au->au_shfaults = 0;
113
114	/*
115	 * fill in param struct from the given params
116	 */
117	aup.aup_time = prom_gettime() / 1000;
118	aup.aup_machname = machname;
119	aup.aup_uid = uid;
120	aup.aup_gid = gid;
121	aup.aup_len = (uint_t)len;
122	aup.aup_gids = (gid_t *)aup_gids;
123
124	/*
125	 * Serialize the parameters into origcred
126	 */
127	xdrmem_create(&xdrs, mymem, MAX_AUTH_BYTES, XDR_ENCODE);
128	if (!xdr_authunix_parms(&xdrs, &aup)) {
129		prom_panic("authunix_create:  xdr_authunix_parms failed");
130		bkmem_free(auth->ah_private, sizeof (struct audata));
131		bkmem_free((caddr_t)auth, sizeof (*auth));
132		return ((AUTH *)0);
133	}
134	au->au_origcred.oa_length = len = XDR_GETPOS(&xdrs);
135	au->au_origcred.oa_flavor = (uint_t)AUTH_UNIX;
136	if ((au->au_origcred.oa_base = bkmem_alloc((uint_t)len)) == NULL) {
137		prom_panic("authunix_create: memory alloc failed");
138		bkmem_free(auth->ah_private, sizeof (struct audata));
139		bkmem_free((caddr_t)auth, sizeof (*auth));
140		return ((AUTH *)0);
141	}
142	(void) bcopy(mymem, au->au_origcred.oa_base, (uint_t)len);
143
144	/*
145	 * set auth handle to reflect new cred.
146	 */
147	auth->ah_cred = au->au_origcred;
148	marshal_new_auth(auth);
149	return (auth);
150}
151
152/*
153 * authunix operations
154 */
155
156/* ARGSUSED */
157static void
158authunix_nextverf(AUTH *auth)
159{
160}
161
162/* ARGSUSED */
163static bool_t
164authunix_marshal(AUTH *auth, XDR *xdrs, cred_t *cr)
165{
166	struct audata *au = AUTH_PRIVATE(auth);
167
168	return (XDR_PUTBYTES(xdrs, au->au_marshed, au->au_mpos));
169}
170
171static bool_t
172authunix_validate(AUTH *auth, struct opaque_auth *verf)
173{
174	struct audata *au;
175	XDR xdrs;
176
177	if (verf->oa_flavor == AUTH_SHORT) {
178		au = AUTH_PRIVATE(auth);
179
180
181		xdrmem_create(&xdrs, verf->oa_base, verf->oa_length,
182		    XDR_DECODE);
183
184		if (xdr_opaque_auth(&xdrs, &au->au_shcred)) {
185			auth->ah_cred = au->au_shcred;
186		} else {
187			xdrs.x_op = XDR_FREE;
188			(void) xdr_opaque_auth(&xdrs, &au->au_shcred);
189			au->au_shcred.oa_base = 0;
190			auth->ah_cred = au->au_origcred;
191		}
192		marshal_new_auth(auth);
193	}
194
195	return (TRUE);
196}
197
198/*ARGSUSED*/
199static bool_t
200authunix_refresh(AUTH *auth, struct rpc_msg *msg, cred_t *cr)
201{
202	struct audata *au = AUTH_PRIVATE(auth);
203	struct authunix_parms aup;
204	XDR xdrs;
205	int stat;
206
207	if (auth->ah_cred.oa_base == au->au_origcred.oa_base) {
208		/* there is no hope.  Punt */
209		return (FALSE);
210	}
211	au->au_shfaults ++;
212
213	/* first deserialize the creds back into a struct authunix_parms */
214	aup.aup_machname = (char *)0;
215	aup.aup_gids = (gid_t *)0;
216	xdrmem_create(&xdrs, au->au_origcred.oa_base,
217			au->au_origcred.oa_length, XDR_DECODE);
218	stat = xdr_authunix_parms(&xdrs, &aup);
219	if (!stat)
220		goto done;
221
222	/* update the time and serialize in place */
223	aup.aup_time = (prom_gettime() / 1000);
224	xdrs.x_op = XDR_ENCODE;
225	XDR_SETPOS(&xdrs, 0);
226	stat = xdr_authunix_parms(&xdrs, &aup);
227	if (!stat)
228		goto done;
229	auth->ah_cred = au->au_origcred;
230	marshal_new_auth(auth);
231done:
232	/* free the struct authunix_parms created by deserializing */
233	xdrs.x_op = XDR_FREE;
234	(void) xdr_authunix_parms(&xdrs, &aup);
235	XDR_DESTROY(&xdrs);
236	return (stat);
237}
238
239static void
240authunix_destroy(AUTH *auth)
241{
242	struct audata *au = AUTH_PRIVATE(auth);
243
244	if (au->au_shcred.oa_base != NULL)
245		bkmem_free(au->au_shcred.oa_base, au->au_shcred.oa_length);
246	bkmem_free(auth->ah_private, sizeof (struct audata));
247	if (auth->ah_verf.oa_base != NULL)
248		bkmem_free(auth->ah_verf.oa_base, auth->ah_verf.oa_length);
249	bkmem_free((caddr_t)auth, sizeof (*auth));
250}
251
252/*
253 * Marshals (pre-serializes) an auth struct.
254 * sets private data, au_marshed and au_mpos
255 */
256static void
257marshal_new_auth(AUTH *auth)
258{
259	XDR xdr_stream;
260	XDR *xdrs = &xdr_stream;
261	struct audata *au = AUTH_PRIVATE(auth);
262
263	xdrmem_create(xdrs, au->au_marshed, MAX_AUTH_BYTES, XDR_ENCODE);
264	if ((!xdr_opaque_auth(xdrs, &(auth->ah_cred))) ||
265	    (!xdr_opaque_auth(xdrs, &(auth->ah_verf)))) {
266		dprintf("marshal_new_auth - Fatal marshalling problem");
267	} else {
268		au->au_mpos = XDR_GETPOS(xdrs);
269	}
270	XDR_DESTROY(xdrs);
271}
272
273
274static struct auth_ops *
275authunix_ops(void)
276{
277	static struct auth_ops ops;
278
279	if (ops.ah_nextverf == 0) {
280		ops.ah_nextverf = authunix_nextverf;
281		ops.ah_marshal = authunix_marshal;
282		ops.ah_validate = authunix_validate;
283		ops.ah_refresh = authunix_refresh;
284		ops.ah_destroy = authunix_destroy;
285	}
286	return (&ops);
287}
288
289/*
290 * XDR for unix authentication parameters.
291 */
292bool_t
293xdr_authunix_parms(XDR *xdrs, struct authunix_parms *p)
294{
295	if (xdr_u_int(xdrs, &(p->aup_time)) &&
296	    xdr_string(xdrs, &(p->aup_machname), MAX_MACHINE_NAME) &&
297	    xdr_int(xdrs, (int *)&(p->aup_uid)) &&
298	    xdr_int(xdrs, (int *)&(p->aup_gid)) &&
299	    xdr_array(xdrs, (caddr_t *)&(p->aup_gids),
300		    &(p->aup_len), NGRPS, sizeof (int), xdr_int)) {
301		return (TRUE);
302	}
303	return (FALSE);
304}
305