1184588Sdfr/*-
2184588Sdfr * Copyright (c) 2008 Doug Rabson
3184588Sdfr * All rights reserved.
4184588Sdfr *
5184588Sdfr * Redistribution and use in source and binary forms, with or without
6184588Sdfr * modification, are permitted provided that the following conditions
7184588Sdfr * are met:
8184588Sdfr * 1. Redistributions of source code must retain the above copyright
9184588Sdfr *    notice, this list of conditions and the following disclaimer.
10184588Sdfr * 2. Redistributions in binary form must reproduce the above copyright
11184588Sdfr *    notice, this list of conditions and the following disclaimer in the
12184588Sdfr *    documentation and/or other materials provided with the distribution.
13184588Sdfr *
14184588Sdfr * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
15184588Sdfr * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
16184588Sdfr * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
17184588Sdfr * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
18184588Sdfr * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
19184588Sdfr * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
20184588Sdfr * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
21184588Sdfr * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
22184588Sdfr * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
23184588Sdfr * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
24184588Sdfr * SUCH DAMAGE.
25184588Sdfr *
26184588Sdfr *	$FreeBSD$
27184588Sdfr */
28184588Sdfr
29184588Sdfr#ifndef _RPCSEC_GSS_H
30184588Sdfr#define _RPCSEC_GSS_H
31184588Sdfr
32184588Sdfr#include <kgssapi/gssapi.h>
33184588Sdfr
34184588Sdfr#ifndef MAX_GSS_MECH
35184588Sdfr#define MAX_GSS_MECH	64
36184588Sdfr#endif
37184588Sdfr
38184588Sdfr/*
39184588Sdfr * Define the types of security service required for rpc_gss_seccreate().
40184588Sdfr */
41184588Sdfrtypedef enum {
42184588Sdfr	rpc_gss_svc_default	= 0,
43184588Sdfr	rpc_gss_svc_none	= 1,
44184588Sdfr	rpc_gss_svc_integrity	= 2,
45184588Sdfr	rpc_gss_svc_privacy	= 3
46184588Sdfr} rpc_gss_service_t;
47184588Sdfr
48184588Sdfr/*
49184588Sdfr * Structure containing options for rpc_gss_seccreate().
50184588Sdfr */
51184588Sdfrtypedef struct {
52184588Sdfr	int		req_flags;	/* GSS request bits */
53184588Sdfr	int		time_req;	/* requested credential lifetime */
54184588Sdfr	gss_cred_id_t	my_cred;	/* GSS credential */
55184588Sdfr	gss_channel_bindings_t input_channel_bindings;
56184588Sdfr} rpc_gss_options_req_t;
57184588Sdfr
58184588Sdfr/*
59184588Sdfr * Structure containing options returned by rpc_gss_seccreate().
60184588Sdfr */
61184588Sdfrtypedef struct {
62184588Sdfr	int		major_status;
63184588Sdfr	int		minor_status;
64184588Sdfr	u_int		rpcsec_version;
65184588Sdfr	int		ret_flags;
66184588Sdfr	int		time_req;
67184588Sdfr	gss_ctx_id_t	gss_context;
68184588Sdfr	char		actual_mechanism[MAX_GSS_MECH];
69184588Sdfr} rpc_gss_options_ret_t;
70184588Sdfr
71184588Sdfr/*
72184588Sdfr * Client principal type. Used as an argument to
73184588Sdfr * rpc_gss_get_principal_name(). Also referenced by the
74184588Sdfr * rpc_gss_rawcred_t structure.
75184588Sdfr */
76184588Sdfrtypedef struct {
77184588Sdfr	int		len;
78184588Sdfr	char		name[1];
79184588Sdfr} *rpc_gss_principal_t;
80184588Sdfr
81184588Sdfr/*
82184588Sdfr * Structure for raw credentials used by rpc_gss_getcred() and
83184588Sdfr * rpc_gss_set_callback().
84184588Sdfr */
85184588Sdfrtypedef struct {
86184588Sdfr	u_int		version;	/* RPC version number */
87184588Sdfr	const char	*mechanism;	/* security mechanism */
88184588Sdfr	const char	*qop;		/* quality of protection */
89184588Sdfr	rpc_gss_principal_t client_principal; /* client name */
90184588Sdfr	const char	*svc_principal;	/* server name */
91184588Sdfr	rpc_gss_service_t service;	/* service type */
92184588Sdfr} rpc_gss_rawcred_t;
93184588Sdfr
94184588Sdfr/*
95184588Sdfr * Unix credentials derived from raw credentials. Returned by
96184588Sdfr * rpc_gss_getcred().
97184588Sdfr */
98184588Sdfrtypedef struct {
99184588Sdfr	uid_t		uid;		/* user ID */
100184588Sdfr	gid_t		gid;		/* group ID */
101184588Sdfr	short		gidlen;
102184588Sdfr	gid_t		*gidlist;	/* list of groups */
103184588Sdfr} rpc_gss_ucred_t;
104184588Sdfr
105184588Sdfr/*
106184588Sdfr * Structure used to enforce a particular QOP and service.
107184588Sdfr */
108184588Sdfrtypedef struct {
109184588Sdfr	bool_t		locked;
110184588Sdfr	rpc_gss_rawcred_t *raw_cred;
111184588Sdfr} rpc_gss_lock_t;
112184588Sdfr
113184588Sdfr/*
114184588Sdfr * Callback structure used by rpc_gss_set_callback().
115184588Sdfr */
116184588Sdfrtypedef struct {
117184588Sdfr	u_int		program;	/* RPC program number */
118184588Sdfr	u_int		version;	/* RPC version number */
119184588Sdfr					/* user defined callback */
120184588Sdfr	bool_t		(*callback)(struct svc_req *req,
121184588Sdfr				    gss_cred_id_t deleg,
122184588Sdfr				    gss_ctx_id_t gss_context,
123184588Sdfr				    rpc_gss_lock_t *lock,
124184588Sdfr				    void **cookie);
125184588Sdfr} rpc_gss_callback_t;
126184588Sdfr
127184588Sdfr/*
128184588Sdfr * Structure used to return error information by rpc_gss_get_error()
129184588Sdfr */
130184588Sdfrtypedef struct {
131184588Sdfr	int		rpc_gss_error;
132184588Sdfr	int		system_error;	/* same as errno */
133184588Sdfr} rpc_gss_error_t;
134184588Sdfr
135184588Sdfr/*
136184588Sdfr * Values for rpc_gss_error
137184588Sdfr */
138184588Sdfr#define RPC_GSS_ER_SUCCESS	0	/* no error */
139184588Sdfr#define RPC_GSS_ER_SYSTEMERROR	1	/* system error */
140184588Sdfr
141184588Sdfr__BEGIN_DECLS
142184588Sdfr
143184588Sdfr#ifdef _KERNEL
144223309Srmacklem/*
145223309Srmacklem * Set up a structure of entry points for the kgssapi module and inline
146223309Srmacklem * functions named rpc_gss_XXX_call() to use them, so that the kgssapi
147223309Srmacklem * module doesn't need to be loaded for the NFS modules to work using
148223309Srmacklem * AUTH_SYS. The kgssapi modules will be loaded by the gssd(8) daemon
149223309Srmacklem * when it is started up and the entry points will then be filled in.
150223309Srmacklem */
151223309Srmacklemtypedef AUTH	*rpc_gss_secfind_ftype(CLIENT *clnt, struct ucred *cred,
152223309Srmacklem		    const char *principal, gss_OID mech_oid,
153223309Srmacklem		    rpc_gss_service_t service);
154223309Srmacklemtypedef void	rpc_gss_secpurge_ftype(CLIENT *clnt);
155223309Srmacklemtypedef AUTH	*rpc_gss_seccreate_ftype(CLIENT *clnt, struct ucred *cred,
156253049Srmacklem		    const char *clnt_principal, const char *principal,
157253049Srmacklem		    const char *mechanism, rpc_gss_service_t service,
158253049Srmacklem		    const char *qop, rpc_gss_options_req_t *options_req,
159223309Srmacklem		    rpc_gss_options_ret_t *options_ret);
160223309Srmacklemtypedef bool_t	rpc_gss_set_defaults_ftype(AUTH *auth,
161223309Srmacklem		    rpc_gss_service_t service, const char *qop);
162223309Srmacklemtypedef int	rpc_gss_max_data_length_ftype(AUTH *handle,
163223309Srmacklem		    int max_tp_unit_len);
164223309Srmacklemtypedef void	rpc_gss_get_error_ftype(rpc_gss_error_t *error);
165223309Srmacklemtypedef bool_t	rpc_gss_mech_to_oid_ftype(const char *mech, gss_OID *oid_ret);
166223309Srmacklemtypedef bool_t	rpc_gss_oid_to_mech_ftype(gss_OID oid, const char **mech_ret);
167223309Srmacklemtypedef bool_t	rpc_gss_qop_to_num_ftype(const char *qop, const char *mech,
168223309Srmacklem		    u_int *num_ret);
169223309Srmacklemtypedef const char **rpc_gss_get_mechanisms_ftype(void);
170223309Srmacklemtypedef bool_t	rpc_gss_get_versions_ftype(u_int *vers_hi, u_int *vers_lo);
171223309Srmacklemtypedef bool_t	rpc_gss_is_installed_ftype(const char *mech);
172223309Srmacklemtypedef bool_t	rpc_gss_set_svc_name_ftype(const char *principal,
173223309Srmacklem		    const char *mechanism, u_int req_time, u_int program,
174223309Srmacklem		    u_int version);
175223309Srmacklemtypedef void	rpc_gss_clear_svc_name_ftype(u_int program, u_int version);
176223309Srmacklemtypedef bool_t	rpc_gss_getcred_ftype(struct svc_req *req,
177223309Srmacklem		    rpc_gss_rawcred_t **rcred,
178223309Srmacklem		    rpc_gss_ucred_t **ucred, void **cookie);
179223309Srmacklemtypedef bool_t	rpc_gss_set_callback_ftype(rpc_gss_callback_t *cb);
180223309Srmacklemtypedef void	rpc_gss_clear_callback_ftype(rpc_gss_callback_t *cb);
181223309Srmacklemtypedef bool_t	rpc_gss_get_principal_name_ftype(rpc_gss_principal_t *principal,
182223309Srmacklem		    const char *mech, const char *name, const char *node,
183223309Srmacklem		    const char *domain);
184223309Srmacklemtypedef int	rpc_gss_svc_max_data_length_ftype(struct svc_req *req,
185223309Srmacklem		    int max_tp_unit_len);
186253049Srmacklemtypedef void	rpc_gss_refresh_auth_ftype(AUTH *auth);
187223309Srmacklem
188223309Srmacklemstruct rpc_gss_entries {
189223309Srmacklem	rpc_gss_secfind_ftype		*rpc_gss_secfind;
190223309Srmacklem	rpc_gss_secpurge_ftype		*rpc_gss_secpurge;
191223309Srmacklem	rpc_gss_seccreate_ftype		*rpc_gss_seccreate;
192223309Srmacklem	rpc_gss_set_defaults_ftype	*rpc_gss_set_defaults;
193223309Srmacklem	rpc_gss_max_data_length_ftype	*rpc_gss_max_data_length;
194223309Srmacklem	rpc_gss_get_error_ftype		*rpc_gss_get_error;
195223309Srmacklem	rpc_gss_mech_to_oid_ftype	*rpc_gss_mech_to_oid;
196223309Srmacklem	rpc_gss_oid_to_mech_ftype	*rpc_gss_oid_to_mech;
197223309Srmacklem	rpc_gss_qop_to_num_ftype	*rpc_gss_qop_to_num;
198223309Srmacklem	rpc_gss_get_mechanisms_ftype	*rpc_gss_get_mechanisms;
199223309Srmacklem	rpc_gss_get_versions_ftype	*rpc_gss_get_versions;
200223309Srmacklem	rpc_gss_is_installed_ftype	*rpc_gss_is_installed;
201223309Srmacklem	rpc_gss_set_svc_name_ftype	*rpc_gss_set_svc_name;
202223309Srmacklem	rpc_gss_clear_svc_name_ftype	*rpc_gss_clear_svc_name;
203223309Srmacklem	rpc_gss_getcred_ftype		*rpc_gss_getcred;
204223309Srmacklem	rpc_gss_set_callback_ftype	*rpc_gss_set_callback;
205223309Srmacklem	rpc_gss_clear_callback_ftype	*rpc_gss_clear_callback;
206223309Srmacklem	rpc_gss_get_principal_name_ftype *rpc_gss_get_principal_name;
207223309Srmacklem	rpc_gss_svc_max_data_length_ftype *rpc_gss_svc_max_data_length;
208253049Srmacklem	rpc_gss_refresh_auth_ftype	*rpc_gss_refresh_auth;
209223309Srmacklem};
210223309Srmacklemextern struct rpc_gss_entries	rpc_gss_entries;
211223309Srmacklem
212223309Srmacklem/* Functions to access the entry points. */
213223309Srmacklemstatic __inline AUTH *
214223309Srmacklemrpc_gss_secfind_call(CLIENT *clnt, struct ucred *cred, const char *principal,
215223309Srmacklem    gss_OID mech_oid, rpc_gss_service_t service)
216223309Srmacklem{
217223309Srmacklem	AUTH *ret = NULL;
218223309Srmacklem
219223309Srmacklem	if (rpc_gss_entries.rpc_gss_secfind != NULL)
220223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_secfind)(clnt, cred, principal,
221223309Srmacklem		    mech_oid, service);
222223309Srmacklem	return (ret);
223223309Srmacklem}
224223309Srmacklem
225223309Srmacklemstatic __inline void
226223309Srmacklemrpc_gss_secpurge_call(CLIENT *clnt)
227223309Srmacklem{
228223309Srmacklem
229223309Srmacklem	if (rpc_gss_entries.rpc_gss_secpurge != NULL)
230223309Srmacklem		(*rpc_gss_entries.rpc_gss_secpurge)(clnt);
231223309Srmacklem}
232223309Srmacklem
233223309Srmacklemstatic __inline AUTH *
234253049Srmacklemrpc_gss_seccreate_call(CLIENT *clnt, struct ucred *cred,
235253049Srmacklem    const char *clnt_principal, const char *principal, const char *mechanism,
236253049Srmacklem    rpc_gss_service_t service, const char *qop,
237223309Srmacklem    rpc_gss_options_req_t *options_req, rpc_gss_options_ret_t *options_ret)
238223309Srmacklem{
239223309Srmacklem	AUTH *ret = NULL;
240223309Srmacklem
241223309Srmacklem	if (rpc_gss_entries.rpc_gss_seccreate != NULL)
242223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_seccreate)(clnt, cred,
243253049Srmacklem		    clnt_principal, principal, mechanism, service, qop,
244253049Srmacklem		    options_req, options_ret);
245223309Srmacklem	return (ret);
246223309Srmacklem}
247223309Srmacklem
248223309Srmacklemstatic __inline bool_t
249223309Srmacklemrpc_gss_set_defaults_call(AUTH *auth, rpc_gss_service_t service,
250223309Srmacklem    const char *qop)
251223309Srmacklem{
252223309Srmacklem	bool_t ret = 1;
253223309Srmacklem
254223309Srmacklem	if (rpc_gss_entries.rpc_gss_set_defaults != NULL)
255223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_set_defaults)(auth, service,
256223309Srmacklem		    qop);
257223309Srmacklem	return (ret);
258223309Srmacklem}
259223309Srmacklem
260223309Srmacklemstatic __inline int
261223309Srmacklemrpc_gss_max_data_length_call(AUTH *handle, int max_tp_unit_len)
262223309Srmacklem{
263223309Srmacklem	int ret = 0;
264223309Srmacklem
265223309Srmacklem	if (rpc_gss_entries.rpc_gss_max_data_length != NULL)
266223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_max_data_length)(handle,
267223309Srmacklem		    max_tp_unit_len);
268223309Srmacklem	return (ret);
269223309Srmacklem}
270223309Srmacklem
271223309Srmacklemstatic __inline void
272223309Srmacklemrpc_gss_get_error_call(rpc_gss_error_t *error)
273223309Srmacklem{
274223309Srmacklem
275223309Srmacklem	if (rpc_gss_entries.rpc_gss_get_error != NULL)
276223309Srmacklem		(*rpc_gss_entries.rpc_gss_get_error)(error);
277223309Srmacklem}
278223309Srmacklem
279223309Srmacklemstatic __inline bool_t
280223309Srmacklemrpc_gss_mech_to_oid_call(const char *mech, gss_OID *oid_ret)
281223309Srmacklem{
282223309Srmacklem	bool_t ret = 1;
283223309Srmacklem
284223309Srmacklem	if (rpc_gss_entries.rpc_gss_mech_to_oid != NULL)
285223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_mech_to_oid)(mech, oid_ret);
286223309Srmacklem	return (ret);
287223309Srmacklem}
288223309Srmacklem
289223309Srmacklemstatic __inline bool_t
290223309Srmacklemrpc_gss_oid_to_mech_call(gss_OID oid, const char **mech_ret)
291223309Srmacklem{
292223309Srmacklem	bool_t ret = 1;
293223309Srmacklem
294223309Srmacklem	if (rpc_gss_entries.rpc_gss_oid_to_mech != NULL)
295223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_oid_to_mech)(oid, mech_ret);
296223309Srmacklem	return (ret);
297223309Srmacklem}
298223309Srmacklem
299223309Srmacklemstatic __inline bool_t
300223309Srmacklemrpc_gss_qop_to_num_call(const char *qop, const char *mech, u_int *num_ret)
301223309Srmacklem{
302223309Srmacklem	bool_t ret = 1;
303223309Srmacklem
304223309Srmacklem	if (rpc_gss_entries.rpc_gss_qop_to_num != NULL)
305223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_qop_to_num)(qop, mech, num_ret);
306223309Srmacklem	return (ret);
307223309Srmacklem}
308223309Srmacklem
309223309Srmacklemstatic __inline const char **
310223309Srmacklemrpc_gss_get_mechanisms_call(void)
311223309Srmacklem{
312223309Srmacklem	const char **ret = NULL;
313223309Srmacklem
314223309Srmacklem	if (rpc_gss_entries.rpc_gss_get_mechanisms != NULL)
315223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_get_mechanisms)();
316223309Srmacklem	return (ret);
317223309Srmacklem}
318223309Srmacklem
319223309Srmacklemstatic __inline bool_t
320223309Srmacklemrpc_gss_get_versions_call(u_int *vers_hi, u_int *vers_lo)
321223309Srmacklem{
322223309Srmacklem	bool_t ret = 1;
323223309Srmacklem
324223309Srmacklem	if (rpc_gss_entries.rpc_gss_get_versions != NULL)
325223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_get_versions)(vers_hi, vers_lo);
326223309Srmacklem	return (ret);
327223309Srmacklem}
328223309Srmacklem
329223309Srmacklemstatic __inline bool_t
330223309Srmacklemrpc_gss_is_installed_call(const char *mech)
331223309Srmacklem{
332223309Srmacklem	bool_t ret = 1;
333223309Srmacklem
334223309Srmacklem	if (rpc_gss_entries.rpc_gss_is_installed != NULL)
335223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_is_installed)(mech);
336223309Srmacklem	return (ret);
337223309Srmacklem}
338223309Srmacklem
339223309Srmacklemstatic __inline bool_t
340223309Srmacklemrpc_gss_set_svc_name_call(const char *principal, const char *mechanism,
341223309Srmacklem    u_int req_time, u_int program, u_int version)
342223309Srmacklem{
343223309Srmacklem	bool_t ret = 1;
344223309Srmacklem
345223309Srmacklem	if (rpc_gss_entries.rpc_gss_set_svc_name != NULL)
346223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_set_svc_name)(principal,
347223309Srmacklem		    mechanism, req_time, program, version);
348223309Srmacklem	return (ret);
349223309Srmacklem}
350223309Srmacklem
351223309Srmacklemstatic __inline void
352223309Srmacklemrpc_gss_clear_svc_name_call(u_int program, u_int version)
353223309Srmacklem{
354223309Srmacklem
355223309Srmacklem	if (rpc_gss_entries.rpc_gss_clear_svc_name != NULL)
356223309Srmacklem		(*rpc_gss_entries.rpc_gss_clear_svc_name)(program, version);
357223309Srmacklem}
358223309Srmacklem
359223309Srmacklemstatic __inline bool_t
360223309Srmacklemrpc_gss_getcred_call(struct svc_req *req, rpc_gss_rawcred_t **rcred,
361223309Srmacklem    rpc_gss_ucred_t **ucred, void **cookie)
362223309Srmacklem{
363223309Srmacklem	bool_t ret = 1;
364223309Srmacklem
365223309Srmacklem	if (rpc_gss_entries.rpc_gss_getcred != NULL)
366223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_getcred)(req, rcred, ucred,
367223309Srmacklem		    cookie);
368223309Srmacklem	return (ret);
369223309Srmacklem}
370223309Srmacklem
371223309Srmacklemstatic __inline bool_t
372223309Srmacklemrpc_gss_set_callback_call(rpc_gss_callback_t *cb)
373223309Srmacklem{
374223309Srmacklem	bool_t ret = 1;
375223309Srmacklem
376223309Srmacklem	if (rpc_gss_entries.rpc_gss_set_callback != NULL)
377223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_set_callback)(cb);
378223309Srmacklem	return (ret);
379223309Srmacklem}
380223309Srmacklem
381223309Srmacklemstatic __inline void
382223309Srmacklemrpc_gss_clear_callback_call(rpc_gss_callback_t *cb)
383223309Srmacklem{
384223309Srmacklem
385223309Srmacklem	if (rpc_gss_entries.rpc_gss_clear_callback != NULL)
386223309Srmacklem		(*rpc_gss_entries.rpc_gss_clear_callback)(cb);
387223309Srmacklem}
388223309Srmacklem
389223309Srmacklemstatic __inline bool_t
390223309Srmacklemrpc_gss_get_principal_name_call(rpc_gss_principal_t *principal,
391223309Srmacklem    const char *mech, const char *name, const char *node, const char *domain)
392223309Srmacklem{
393223309Srmacklem	bool_t ret = 1;
394223309Srmacklem
395223309Srmacklem	if (rpc_gss_entries.rpc_gss_get_principal_name != NULL)
396223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_get_principal_name)(principal,
397223309Srmacklem		    mech, name, node, domain);
398223309Srmacklem	return (ret);
399223309Srmacklem}
400223309Srmacklem
401223309Srmacklemstatic __inline int
402223309Srmacklemrpc_gss_svc_max_data_length_call(struct svc_req *req, int max_tp_unit_len)
403223309Srmacklem{
404223309Srmacklem	int ret = 0;
405223309Srmacklem
406223309Srmacklem	if (rpc_gss_entries.rpc_gss_svc_max_data_length != NULL)
407223309Srmacklem		ret = (*rpc_gss_entries.rpc_gss_svc_max_data_length)(req,
408223309Srmacklem		    max_tp_unit_len);
409223309Srmacklem	return (ret);
410223309Srmacklem}
411223309Srmacklem
412253049Srmacklemstatic __inline void
413253049Srmacklemrpc_gss_refresh_auth_call(AUTH *auth)
414253049Srmacklem{
415253049Srmacklem
416253049Srmacklem	if (rpc_gss_entries.rpc_gss_refresh_auth != NULL)
417253049Srmacklem		(*rpc_gss_entries.rpc_gss_refresh_auth)(auth);
418253049Srmacklem}
419253049Srmacklem
420184588SdfrAUTH	*rpc_gss_secfind(CLIENT *clnt, struct ucred *cred,
421184588Sdfr    const char *principal, gss_OID mech_oid, rpc_gss_service_t service);
422184588Sdfrvoid	rpc_gss_secpurge(CLIENT *clnt);
423253049Srmacklemvoid	rpc_gss_refresh_auth(AUTH *auth);
424184588SdfrAUTH	*rpc_gss_seccreate(CLIENT *clnt, struct ucred *cred,
425253049Srmacklem    const char *clnt_principal, const char *principal,
426253049Srmacklem    const char *mechanism, rpc_gss_service_t service,
427253049Srmacklem    const char *qop, rpc_gss_options_req_t *options_req,
428253049Srmacklem    rpc_gss_options_ret_t *options_ret);
429253049Srmacklem#else	/* !_KERNEL */
430253049SrmacklemAUTH	*rpc_gss_seccreate(CLIENT *clnt, struct ucred *cred,
431184588Sdfr    const char *principal, const char *mechanism, rpc_gss_service_t service,
432184588Sdfr    const char *qop, rpc_gss_options_req_t *options_req,
433184588Sdfr    rpc_gss_options_ret_t *options_ret);
434253049Srmacklem#endif	/* _KERNEL */
435184588Sdfrbool_t	rpc_gss_set_defaults(AUTH *auth, rpc_gss_service_t service,
436184588Sdfr    const char *qop);
437184588Sdfrint	rpc_gss_max_data_length(AUTH *handle, int max_tp_unit_len);
438184588Sdfrvoid	rpc_gss_get_error(rpc_gss_error_t *error);
439184588Sdfr
440184588Sdfrbool_t	rpc_gss_mech_to_oid(const char *mech, gss_OID *oid_ret);
441184588Sdfrbool_t	rpc_gss_oid_to_mech(gss_OID oid, const char **mech_ret);
442184588Sdfrbool_t	rpc_gss_qop_to_num(const char *qop, const char *mech, u_int *num_ret);
443184588Sdfrconst char **rpc_gss_get_mechanisms(void);
444184588Sdfrconst char **rpc_gss_get_mech_info(const char *mech, rpc_gss_service_t *service);
445184588Sdfrbool_t	rpc_gss_get_versions(u_int *vers_hi, u_int *vers_lo);
446184588Sdfrbool_t	rpc_gss_is_installed(const char *mech);
447184588Sdfr
448184588Sdfrbool_t	rpc_gss_set_svc_name(const char *principal, const char *mechanism,
449184588Sdfr    u_int req_time, u_int program, u_int version);
450184588Sdfrvoid rpc_gss_clear_svc_name(u_int program, u_int version);
451184588Sdfrbool_t	rpc_gss_getcred(struct svc_req *req, rpc_gss_rawcred_t **rcred,
452184588Sdfr    rpc_gss_ucred_t **ucred, void **cookie);
453184588Sdfrbool_t	rpc_gss_set_callback(rpc_gss_callback_t *cb);
454184588Sdfrvoid rpc_gss_clear_callback(rpc_gss_callback_t *cb);
455184588Sdfrbool_t	rpc_gss_get_principal_name(rpc_gss_principal_t *principal,
456184588Sdfr    const char *mech, const char *name, const char *node, const char *domain);
457184588Sdfrint	rpc_gss_svc_max_data_length(struct svc_req *req, int max_tp_unit_len);
458184588Sdfr
459184588Sdfr/*
460184588Sdfr * Internal interface from the RPC implementation.
461184588Sdfr */
462184588Sdfr#ifndef _KERNEL
463184588Sdfrbool_t	__rpc_gss_wrap(AUTH *auth, void *header, size_t headerlen,
464184588Sdfr    XDR* xdrs, xdrproc_t xdr_args, void *args_ptr);
465184588Sdfrbool_t	__rpc_gss_unwrap(AUTH *auth, XDR* xdrs, xdrproc_t xdr_args,
466184588Sdfr    void *args_ptr);
467184588Sdfr#endif
468184588Sdfrbool_t __rpc_gss_set_error(int rpc_gss_error, int system_error);
469184588Sdfr
470184588Sdfr__END_DECLS
471184588Sdfr
472184588Sdfr#endif /* !_RPCSEC_GSS_H */
473