mirror of
https://github.com/AuxXxilium/linux_dsm_epyc7002.git
synced 2024-11-25 16:40:52 +07:00
6a1a1e34dc
The gss_mech_list_pseudoflavors() function provides a list of currently registered GSS pseudoflavors. This list does not include any non-GSS flavors that have been registered with the RPC client. nfs4_find_root_sec() currently adds these extra flavors by hand. Instead, nfs4_find_root_sec() should be looking at the set of flavors that have been explicitly registered via rpcauth_register(). And, other areas of code will soon need the same kind of list that contains all flavors the kernel currently knows about (see below). Rather than cloning the open-coded logic in nfs4_find_root_sec() to those new places, introduce a generic RPC function that generates a full list of registered auth flavors and pseudoflavors. A new rpc_authops method is added that lists a flavor's pseudoflavors, if it has any. I encountered an interesting module loader loop when I tried to get the RPC client to invoke gss_mech_list_pseudoflavors() by name. This patch is a pre-requisite for server trunking discovery, and a pre-requisite for fixing up the in-kernel mount client to do better automatic security flavor selection. Signed-off-by: Chuck Lever <chuck.lever@oracle.com> Signed-off-by: Trond Myklebust <Trond.Myklebust@netapp.com>
143 lines
4.0 KiB
C
143 lines
4.0 KiB
C
/*
|
|
* linux/include/linux/sunrpc/gss_api.h
|
|
*
|
|
* Somewhat simplified version of the gss api.
|
|
*
|
|
* Dug Song <dugsong@monkey.org>
|
|
* Andy Adamson <andros@umich.edu>
|
|
* Bruce Fields <bfields@umich.edu>
|
|
* Copyright (c) 2000 The Regents of the University of Michigan
|
|
*/
|
|
|
|
#ifndef _LINUX_SUNRPC_GSS_API_H
|
|
#define _LINUX_SUNRPC_GSS_API_H
|
|
|
|
#ifdef __KERNEL__
|
|
#include <linux/sunrpc/xdr.h>
|
|
#include <linux/sunrpc/msg_prot.h>
|
|
#include <linux/uio.h>
|
|
|
|
/* The mechanism-independent gss-api context: */
|
|
struct gss_ctx {
|
|
struct gss_api_mech *mech_type;
|
|
void *internal_ctx_id;
|
|
};
|
|
|
|
#define GSS_C_NO_BUFFER ((struct xdr_netobj) 0)
|
|
#define GSS_C_NO_CONTEXT ((struct gss_ctx *) 0)
|
|
#define GSS_C_NULL_OID ((struct xdr_netobj) 0)
|
|
|
|
/*XXX arbitrary length - is this set somewhere? */
|
|
#define GSS_OID_MAX_LEN 32
|
|
|
|
/* gss-api prototypes; note that these are somewhat simplified versions of
|
|
* the prototypes specified in RFC 2744. */
|
|
int gss_import_sec_context(
|
|
const void* input_token,
|
|
size_t bufsize,
|
|
struct gss_api_mech *mech,
|
|
struct gss_ctx **ctx_id,
|
|
gfp_t gfp_mask);
|
|
u32 gss_get_mic(
|
|
struct gss_ctx *ctx_id,
|
|
struct xdr_buf *message,
|
|
struct xdr_netobj *mic_token);
|
|
u32 gss_verify_mic(
|
|
struct gss_ctx *ctx_id,
|
|
struct xdr_buf *message,
|
|
struct xdr_netobj *mic_token);
|
|
u32 gss_wrap(
|
|
struct gss_ctx *ctx_id,
|
|
int offset,
|
|
struct xdr_buf *outbuf,
|
|
struct page **inpages);
|
|
u32 gss_unwrap(
|
|
struct gss_ctx *ctx_id,
|
|
int offset,
|
|
struct xdr_buf *inbuf);
|
|
u32 gss_delete_sec_context(
|
|
struct gss_ctx **ctx_id);
|
|
|
|
u32 gss_svc_to_pseudoflavor(struct gss_api_mech *, u32 service);
|
|
u32 gss_pseudoflavor_to_service(struct gss_api_mech *, u32 pseudoflavor);
|
|
char *gss_service_to_auth_domain_name(struct gss_api_mech *, u32 service);
|
|
|
|
struct pf_desc {
|
|
u32 pseudoflavor;
|
|
u32 service;
|
|
char *name;
|
|
char *auth_domain_name;
|
|
};
|
|
|
|
/* Different mechanisms (e.g., krb5 or spkm3) may implement gss-api, and
|
|
* mechanisms may be dynamically registered or unregistered by modules. */
|
|
|
|
/* Each mechanism is described by the following struct: */
|
|
struct gss_api_mech {
|
|
struct list_head gm_list;
|
|
struct module *gm_owner;
|
|
struct xdr_netobj gm_oid;
|
|
char *gm_name;
|
|
const struct gss_api_ops *gm_ops;
|
|
/* pseudoflavors supported by this mechanism: */
|
|
int gm_pf_num;
|
|
struct pf_desc * gm_pfs;
|
|
/* Should the following be a callback operation instead? */
|
|
const char *gm_upcall_enctypes;
|
|
};
|
|
|
|
/* and must provide the following operations: */
|
|
struct gss_api_ops {
|
|
int (*gss_import_sec_context)(
|
|
const void *input_token,
|
|
size_t bufsize,
|
|
struct gss_ctx *ctx_id,
|
|
gfp_t gfp_mask);
|
|
u32 (*gss_get_mic)(
|
|
struct gss_ctx *ctx_id,
|
|
struct xdr_buf *message,
|
|
struct xdr_netobj *mic_token);
|
|
u32 (*gss_verify_mic)(
|
|
struct gss_ctx *ctx_id,
|
|
struct xdr_buf *message,
|
|
struct xdr_netobj *mic_token);
|
|
u32 (*gss_wrap)(
|
|
struct gss_ctx *ctx_id,
|
|
int offset,
|
|
struct xdr_buf *outbuf,
|
|
struct page **inpages);
|
|
u32 (*gss_unwrap)(
|
|
struct gss_ctx *ctx_id,
|
|
int offset,
|
|
struct xdr_buf *buf);
|
|
void (*gss_delete_sec_context)(
|
|
void *internal_ctx_id);
|
|
};
|
|
|
|
int gss_mech_register(struct gss_api_mech *);
|
|
void gss_mech_unregister(struct gss_api_mech *);
|
|
|
|
/* returns a mechanism descriptor given an OID, and increments the mechanism's
|
|
* reference count. */
|
|
struct gss_api_mech * gss_mech_get_by_OID(struct xdr_netobj *);
|
|
|
|
/* Returns a reference to a mechanism, given a name like "krb5" etc. */
|
|
struct gss_api_mech *gss_mech_get_by_name(const char *);
|
|
|
|
/* Similar, but get by pseudoflavor. */
|
|
struct gss_api_mech *gss_mech_get_by_pseudoflavor(u32);
|
|
|
|
/* Fill in an array with a list of supported pseudoflavors */
|
|
int gss_mech_list_pseudoflavors(rpc_authflavor_t *, int);
|
|
|
|
/* Just increments the mechanism's reference count and returns its input: */
|
|
struct gss_api_mech * gss_mech_get(struct gss_api_mech *);
|
|
|
|
/* For every successful gss_mech_get or gss_mech_get_by_* call there must be a
|
|
* corresponding call to gss_mech_put. */
|
|
void gss_mech_put(struct gss_api_mech *);
|
|
|
|
#endif /* __KERNEL__ */
|
|
#endif /* _LINUX_SUNRPC_GSS_API_H */
|
|
|