2 * Sun RPC is a product of Sun Microsystems, Inc. and is provided for
3 * unrestricted use provided that this legend is included on all tape
4 * media and as a part of the software program in whole or part. Users
5 * may copy or modify Sun RPC without charge, but are not authorized
6 * to license or distribute it to anyone else except as part of a product or
7 * program developed by the user.
9 * SUN RPC IS PROVIDED AS IS WITH NO WARRANTIES OF ANY KIND INCLUDING THE
10 * WARRANTIES OF DESIGN, MERCHANTIBILITY AND FITNESS FOR A PARTICULAR
11 * PURPOSE, OR ARISING FROM A COURSE OF DEALING, USAGE OR TRADE PRACTICE.
13 * Sun RPC is provided with no support and without any obligation on the
14 * part of Sun Microsystems, Inc. to assist in its use, correction,
15 * modification or enhancement.
17 * SUN MICROSYSTEMS, INC. SHALL HAVE NO LIABILITY WITH RESPECT TO THE
18 * INFRINGEMENT OF COPYRIGHTS, TRADE SECRETS OR ANY PATENTS BY SUN RPC
19 * OR ANY PART THEREOF.
21 * In no event will Sun Microsystems, Inc. be liable for any lost revenue
22 * or profits or other special, indirect and consequential damages, even if
23 * Sun has been advised of the possibility of such damages.
25 * Sun Microsystems, Inc.
27 * Mountain View, California 94043
29 * @(#)auth_unix.c 1.19 87/08/11 Copyr 1984 Sun Micro
30 * @(#)auth_unix.c 2.2 88/08/01 4.0 RPCSRC
31 * $NetBSD: auth_unix.c,v 1.18 2000/07/06 03:03:30 christos Exp $
32 * $FreeBSD: src/lib/libc/rpc/auth_unix.c,v 1.18 2007/06/14 20:07:35 harti Exp $
36 * auth_unix.c, Implements UNIX style authentication parameters.
38 * Copyright (C) 1984, Sun Microsystems, Inc.
40 * The system is very weak. The client uses no encryption for it's
41 * credentials and only sends null verifiers. The server sends backs
42 * null verifiers or optionally a verifier that suggests a new short hand
43 * for the credentials.
47 #include "namespace.h"
48 #include "reentrant.h"
49 #include <sys/param.h>
58 #include <rpc/types.h>
61 #include <rpc/auth_unix.h>
62 #include "un-namespace.h"
66 static void authunix_destroy(AUTH *);
67 static bool_t authunix_marshal(AUTH *, XDR *);
68 static void authunix_nextverf(AUTH *);
69 static struct auth_ops *authunix_ops(void);
70 static bool_t authunix_refresh(AUTH *, void *);
71 static bool_t authunix_validate(AUTH *, struct opaque_auth *);
72 static void marshal_new_auth(AUTH *);
75 * This struct is pointed to by the ah_private field of an auth_handle.
78 struct opaque_auth au_origcred; /* original credentials */
79 struct opaque_auth au_shcred; /* short hand cred */
80 u_long au_shfaults; /* short hand cache faults */
81 char au_marshed[MAX_AUTH_BYTES];
82 u_int au_mpos; /* xdr pos at end of marshed */
84 #define AUTH_PRIVATE(auth) ((struct audata *)auth->ah_private)
87 * Create a unix style authenticator.
88 * Returns an auth handle with the given stuff in it.
91 authunix_create(char *machname, int uid, int gid, int len, int *aup_gids)
93 struct authunix_parms aup;
94 char mymem[MAX_AUTH_BYTES];
101 * Allocate and set up auth handle
104 auth = mem_alloc(sizeof(*auth));
107 warnx("authunix_create: out of memory");
108 goto cleanup_authunix_create;
111 au = mem_alloc(sizeof(*au));
114 warnx("authunix_create: out of memory");
115 goto cleanup_authunix_create;
118 auth->ah_ops = authunix_ops();
119 auth->ah_private = (caddr_t)au;
120 auth->ah_verf = au->au_shcred = _null_auth;
122 au->au_origcred.oa_base = NULL;
125 * fill in param struct from the given params
127 gettimeofday(&now, NULL);
128 aup.aup_time = now.tv_sec;
129 aup.aup_machname = machname;
132 aup.aup_len = (u_int)len;
133 aup.aup_gids = aup_gids;
136 * Serialize the parameters into origcred
138 xdrmem_create(&xdrs, mymem, MAX_AUTH_BYTES, XDR_ENCODE);
139 if (! xdr_authunix_parms(&xdrs, &aup))
141 au->au_origcred.oa_length = len = XDR_GETPOS(&xdrs);
142 au->au_origcred.oa_flavor = AUTH_UNIX;
144 au->au_origcred.oa_base = mem_alloc((u_int) len);
146 if ((au->au_origcred.oa_base = mem_alloc((u_int) len)) == NULL) {
147 warnx("authunix_create: out of memory");
148 goto cleanup_authunix_create;
151 memmove(au->au_origcred.oa_base, mymem, (size_t)len);
154 * set auth handle to reflect new cred.
156 auth->ah_cred = au->au_origcred;
157 marshal_new_auth(auth);
160 cleanup_authunix_create:
162 mem_free(auth, sizeof(*auth));
164 if (au->au_origcred.oa_base)
165 mem_free(au->au_origcred.oa_base, (u_int)len);
166 mem_free(au, sizeof(*au));
173 * Returns an auth handle with parameters determined by doing lots of
177 authunix_create_default(void)
180 char machname[MAXHOSTNAMELEN + 1];
183 gid_t gids[NGROUPS_MAX];
185 if (gethostname(machname, sizeof machname) == -1)
187 machname[sizeof(machname) - 1] = 0;
190 if ((len = getgroups(NGROUPS_MAX, gids)) < 0)
194 /* XXX: interface problem; those should all have been unsigned */
195 return (authunix_create(machname, (int)uid, (int)gid, len,
200 * authunix operations
205 authunix_nextverf(AUTH *auth __unused)
207 /* no action necessary */
211 authunix_marshal(AUTH *auth, XDR *xdrs)
215 assert(auth != NULL);
216 assert(xdrs != NULL);
218 au = AUTH_PRIVATE(auth);
219 return (XDR_PUTBYTES(xdrs, au->au_marshed, au->au_mpos));
223 authunix_validate(AUTH *auth, struct opaque_auth *verf)
228 assert(auth != NULL);
229 assert(verf != NULL);
231 if (verf->oa_flavor == AUTH_SHORT) {
232 au = AUTH_PRIVATE(auth);
233 xdrmem_create(&xdrs, verf->oa_base, verf->oa_length,
236 if (au->au_shcred.oa_base != NULL) {
237 mem_free(au->au_shcred.oa_base,
238 au->au_shcred.oa_length);
239 au->au_shcred.oa_base = NULL;
241 if (xdr_opaque_auth(&xdrs, &au->au_shcred)) {
242 auth->ah_cred = au->au_shcred;
244 xdrs.x_op = XDR_FREE;
245 xdr_opaque_auth(&xdrs, &au->au_shcred);
246 au->au_shcred.oa_base = NULL;
247 auth->ah_cred = au->au_origcred;
249 marshal_new_auth(auth);
255 authunix_refresh(AUTH *auth, void *dummy __unused)
257 struct audata *au = AUTH_PRIVATE(auth);
258 struct authunix_parms aup;
263 assert(auth != NULL);
265 if (auth->ah_cred.oa_base == au->au_origcred.oa_base) {
266 /* there is no hope. Punt */
271 /* first deserialize the creds back into a struct authunix_parms */
272 aup.aup_machname = NULL;
274 xdrmem_create(&xdrs, au->au_origcred.oa_base,
275 au->au_origcred.oa_length, XDR_DECODE);
276 stat = xdr_authunix_parms(&xdrs, &aup);
280 /* update the time and serialize in place */
281 gettimeofday(&now, NULL);
282 aup.aup_time = now.tv_sec;
283 xdrs.x_op = XDR_ENCODE;
284 XDR_SETPOS(&xdrs, 0);
285 stat = xdr_authunix_parms(&xdrs, &aup);
288 auth->ah_cred = au->au_origcred;
289 marshal_new_auth(auth);
291 /* free the struct authunix_parms created by deserializing */
292 xdrs.x_op = XDR_FREE;
293 xdr_authunix_parms(&xdrs, &aup);
299 authunix_destroy(AUTH *auth)
303 assert(auth != NULL);
305 au = AUTH_PRIVATE(auth);
306 mem_free(au->au_origcred.oa_base, au->au_origcred.oa_length);
308 if (au->au_shcred.oa_base != NULL)
309 mem_free(au->au_shcred.oa_base, au->au_shcred.oa_length);
311 mem_free(auth->ah_private, sizeof(struct audata));
313 if (auth->ah_verf.oa_base != NULL)
314 mem_free(auth->ah_verf.oa_base, auth->ah_verf.oa_length);
316 mem_free(auth, sizeof(*auth));
320 * Marshals (pre-serializes) an auth struct.
321 * sets private data, au_marshed and au_mpos
324 marshal_new_auth(AUTH *auth)
327 XDR *xdrs = &xdr_stream;
330 assert(auth != NULL);
332 au = AUTH_PRIVATE(auth);
333 xdrmem_create(xdrs, au->au_marshed, MAX_AUTH_BYTES, XDR_ENCODE);
334 if ((! xdr_opaque_auth(xdrs, &(auth->ah_cred))) ||
335 (! xdr_opaque_auth(xdrs, &(auth->ah_verf))))
336 warnx("auth_none.c - Fatal marshalling problem");
338 au->au_mpos = XDR_GETPOS(xdrs);
342 static struct auth_ops *
345 static struct auth_ops ops;
347 /* VARIABLES PROTECTED BY ops_lock: ops */
349 mutex_lock(&ops_lock);
350 if (ops.ah_nextverf == NULL) {
351 ops.ah_nextverf = authunix_nextverf;
352 ops.ah_marshal = authunix_marshal;
353 ops.ah_validate = authunix_validate;
354 ops.ah_refresh = authunix_refresh;
355 ops.ah_destroy = authunix_destroy;
357 mutex_unlock(&ops_lock);