2013-11-25 19:04:36 +00:00
|
|
|
/*-
|
|
|
|
* Copyright (c) 2009, Sun Microsystems, Inc.
|
|
|
|
* All rights reserved.
|
|
|
|
*
|
|
|
|
* Redistribution and use in source and binary forms, with or without
|
|
|
|
* modification, are permitted provided that the following conditions are met:
|
|
|
|
* - Redistributions of source code must retain the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer.
|
|
|
|
* - Redistributions in binary form must reproduce the above copyright notice,
|
|
|
|
* this list of conditions and the following disclaimer in the documentation
|
|
|
|
* and/or other materials provided with the distribution.
|
|
|
|
* - Neither the name of Sun Microsystems, Inc. nor the names of its
|
|
|
|
* contributors may be used to endorse or promote products derived
|
|
|
|
* from this software without specific prior written permission.
|
1997-05-28 05:00:11 +00:00
|
|
|
*
|
2013-11-25 19:04:36 +00:00
|
|
|
* THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
|
|
|
|
* AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
|
|
|
|
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
|
|
|
|
* ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
|
|
|
|
* LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
|
|
|
|
* CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
|
|
|
|
* SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
|
|
|
|
* INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
|
|
|
|
* CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
|
|
|
|
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
|
|
|
|
* POSSIBILITY OF SUCH DAMAGE.
|
1997-05-28 05:00:11 +00:00
|
|
|
*/
|
|
|
|
/*
|
|
|
|
* Copyright (c) 1986-1991 by Sun Microsystems Inc.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#ident "@(#)key_call.c 1.25 94/04/24 SMI"
|
2002-03-22 23:18:37 +00:00
|
|
|
#include <sys/cdefs.h>
|
|
|
|
__FBSDID("$FreeBSD$");
|
2001-03-24 00:22:13 +00:00
|
|
|
|
1997-05-28 05:00:11 +00:00
|
|
|
/*
|
|
|
|
* key_call.c, Interface to keyserver
|
|
|
|
*
|
|
|
|
* setsecretkey(key) - set your secret key
|
|
|
|
* encryptsessionkey(agent, deskey) - encrypt a session key to talk to agent
|
|
|
|
* decryptsessionkey(agent, deskey) - decrypt ditto
|
|
|
|
* gendeskey(deskey) - generate a secure des key
|
|
|
|
*/
|
|
|
|
|
2001-01-24 13:01:12 +00:00
|
|
|
#include "namespace.h"
|
2001-04-02 21:41:44 +00:00
|
|
|
#include "reentrant.h"
|
1997-05-28 05:00:11 +00:00
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <unistd.h>
|
|
|
|
#include <errno.h>
|
|
|
|
#include <rpc/rpc.h>
|
|
|
|
#include <rpc/auth.h>
|
|
|
|
#include <rpc/auth_unix.h>
|
|
|
|
#include <rpc/key_prot.h>
|
|
|
|
#include <string.h>
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
#include <netconfig.h>
|
1997-05-28 05:00:11 +00:00
|
|
|
#include <sys/utsname.h>
|
|
|
|
#include <stdlib.h>
|
|
|
|
#include <signal.h>
|
|
|
|
#include <sys/wait.h>
|
|
|
|
#include <sys/fcntl.h>
|
2001-01-24 13:01:12 +00:00
|
|
|
#include "un-namespace.h"
|
2006-02-27 22:10:59 +00:00
|
|
|
#include "mt_misc.h"
|
1997-05-28 05:00:11 +00:00
|
|
|
|
|
|
|
|
|
|
|
#define KEY_TIMEOUT 5 /* per-try timeout in seconds */
|
|
|
|
#define KEY_NRETRY 12 /* number of retries */
|
|
|
|
|
|
|
|
#ifdef DEBUG
|
|
|
|
#define debug(msg) (void) fprintf(stderr, "%s\n", msg);
|
|
|
|
#else
|
|
|
|
#define debug(msg)
|
|
|
|
#endif /* DEBUG */
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Hack to allow the keyserver to use AUTH_DES (for authenticated
|
|
|
|
* NIS+ calls, for example). The only functions that get called
|
|
|
|
* are key_encryptsession_pk, key_decryptsession_pk, and key_gendes.
|
|
|
|
*
|
|
|
|
* The approach is to have the keyserver fill in pointers to local
|
|
|
|
* implementations of these functions, and to call those in key_call().
|
|
|
|
*/
|
|
|
|
|
|
|
|
cryptkeyres *(*__key_encryptsession_pk_LOCAL)() = 0;
|
|
|
|
cryptkeyres *(*__key_decryptsession_pk_LOCAL)() = 0;
|
|
|
|
des_block *(*__key_gendes_LOCAL)() = 0;
|
|
|
|
|
2002-04-28 15:18:50 +00:00
|
|
|
static int key_call( u_long, xdrproc_t, void *, xdrproc_t, void *);
|
1997-05-28 05:00:11 +00:00
|
|
|
|
|
|
|
int
|
|
|
|
key_setsecret(secretkey)
|
|
|
|
const char *secretkey;
|
|
|
|
{
|
|
|
|
keystatus status;
|
|
|
|
|
2002-07-14 23:20:08 +00:00
|
|
|
if (!key_call((u_long) KEY_SET, (xdrproc_t)xdr_keybuf,
|
|
|
|
(void *)secretkey,
|
2002-04-28 15:18:50 +00:00
|
|
|
(xdrproc_t)xdr_keystatus, &status)) {
|
1997-05-28 05:00:11 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
if (status != KEY_SUCCESS) {
|
|
|
|
debug("set status is nonzero");
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
/* key_secretkey_is_set() returns 1 if the keyserver has a secret key
|
|
|
|
* stored for the caller's effective uid; it returns 0 otherwise
|
|
|
|
*
|
|
|
|
* N.B.: The KEY_NET_GET key call is undocumented. Applications shouldn't
|
|
|
|
* be using it, because it allows them to get the user's secret key.
|
|
|
|
*/
|
|
|
|
|
|
|
|
int
|
|
|
|
key_secretkey_is_set(void)
|
|
|
|
{
|
|
|
|
struct key_netstres kres;
|
|
|
|
|
|
|
|
memset((void*)&kres, 0, sizeof (kres));
|
2002-04-28 15:18:50 +00:00
|
|
|
if (key_call((u_long) KEY_NET_GET, (xdrproc_t)xdr_void, NULL,
|
|
|
|
(xdrproc_t)xdr_key_netstres, &kres) &&
|
1997-05-28 05:00:11 +00:00
|
|
|
(kres.status == KEY_SUCCESS) &&
|
|
|
|
(kres.key_netstres_u.knet.st_priv_key[0] != 0)) {
|
|
|
|
/* avoid leaving secret key in memory */
|
|
|
|
memset(kres.key_netstres_u.knet.st_priv_key, 0, HEXKEYBYTES);
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
key_encryptsession_pk(remotename, remotekey, deskey)
|
|
|
|
char *remotename;
|
|
|
|
netobj *remotekey;
|
|
|
|
des_block *deskey;
|
|
|
|
{
|
|
|
|
cryptkeyarg2 arg;
|
|
|
|
cryptkeyres res;
|
|
|
|
|
|
|
|
arg.remotename = remotename;
|
|
|
|
arg.remotekey = *remotekey;
|
|
|
|
arg.deskey = *deskey;
|
2002-04-28 15:18:50 +00:00
|
|
|
if (!key_call((u_long)KEY_ENCRYPT_PK, (xdrproc_t)xdr_cryptkeyarg2, &arg,
|
|
|
|
(xdrproc_t)xdr_cryptkeyres, &res)) {
|
1997-05-28 05:00:11 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
if (res.status != KEY_SUCCESS) {
|
|
|
|
debug("encrypt status is nonzero");
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
*deskey = res.cryptkeyres_u.deskey;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
key_decryptsession_pk(remotename, remotekey, deskey)
|
|
|
|
char *remotename;
|
|
|
|
netobj *remotekey;
|
|
|
|
des_block *deskey;
|
|
|
|
{
|
|
|
|
cryptkeyarg2 arg;
|
|
|
|
cryptkeyres res;
|
|
|
|
|
|
|
|
arg.remotename = remotename;
|
|
|
|
arg.remotekey = *remotekey;
|
|
|
|
arg.deskey = *deskey;
|
2002-04-28 15:18:50 +00:00
|
|
|
if (!key_call((u_long)KEY_DECRYPT_PK, (xdrproc_t)xdr_cryptkeyarg2, &arg,
|
|
|
|
(xdrproc_t)xdr_cryptkeyres, &res)) {
|
1997-05-28 05:00:11 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
if (res.status != KEY_SUCCESS) {
|
|
|
|
debug("decrypt status is nonzero");
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
*deskey = res.cryptkeyres_u.deskey;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
key_encryptsession(remotename, deskey)
|
|
|
|
const char *remotename;
|
|
|
|
des_block *deskey;
|
|
|
|
{
|
|
|
|
cryptkeyarg arg;
|
|
|
|
cryptkeyres res;
|
|
|
|
|
|
|
|
arg.remotename = (char *) remotename;
|
|
|
|
arg.deskey = *deskey;
|
2002-04-28 15:18:50 +00:00
|
|
|
if (!key_call((u_long)KEY_ENCRYPT, (xdrproc_t)xdr_cryptkeyarg, &arg,
|
|
|
|
(xdrproc_t)xdr_cryptkeyres, &res)) {
|
1997-05-28 05:00:11 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
if (res.status != KEY_SUCCESS) {
|
|
|
|
debug("encrypt status is nonzero");
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
*deskey = res.cryptkeyres_u.deskey;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
key_decryptsession(remotename, deskey)
|
|
|
|
const char *remotename;
|
|
|
|
des_block *deskey;
|
|
|
|
{
|
|
|
|
cryptkeyarg arg;
|
|
|
|
cryptkeyres res;
|
|
|
|
|
|
|
|
arg.remotename = (char *) remotename;
|
|
|
|
arg.deskey = *deskey;
|
2002-04-28 15:18:50 +00:00
|
|
|
if (!key_call((u_long)KEY_DECRYPT, (xdrproc_t)xdr_cryptkeyarg, &arg,
|
|
|
|
(xdrproc_t)xdr_cryptkeyres, &res)) {
|
1997-05-28 05:00:11 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
if (res.status != KEY_SUCCESS) {
|
|
|
|
debug("decrypt status is nonzero");
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
*deskey = res.cryptkeyres_u.deskey;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
key_gendes(key)
|
|
|
|
des_block *key;
|
|
|
|
{
|
2002-04-28 15:18:50 +00:00
|
|
|
if (!key_call((u_long)KEY_GEN, (xdrproc_t)xdr_void, NULL,
|
|
|
|
(xdrproc_t)xdr_des_block, key)) {
|
1997-05-28 05:00:11 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
int
|
|
|
|
key_setnet(arg)
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
struct key_netstarg *arg;
|
1997-05-28 05:00:11 +00:00
|
|
|
{
|
|
|
|
keystatus status;
|
|
|
|
|
|
|
|
|
2002-04-28 15:18:50 +00:00
|
|
|
if (!key_call((u_long) KEY_NET_PUT, (xdrproc_t)xdr_key_netstarg, arg,
|
|
|
|
(xdrproc_t)xdr_keystatus, &status)){
|
1997-05-28 05:00:11 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (status != KEY_SUCCESS) {
|
|
|
|
debug("key_setnet status is nonzero");
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
int
|
|
|
|
key_get_conv(pkey, deskey)
|
|
|
|
char *pkey;
|
|
|
|
des_block *deskey;
|
|
|
|
{
|
|
|
|
cryptkeyres res;
|
|
|
|
|
2002-04-28 15:18:50 +00:00
|
|
|
if (!key_call((u_long) KEY_GET_CONV, (xdrproc_t)xdr_keybuf, pkey,
|
|
|
|
(xdrproc_t)xdr_cryptkeyres, &res)) {
|
1997-05-28 05:00:11 +00:00
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
if (res.status != KEY_SUCCESS) {
|
|
|
|
debug("get_conv status is nonzero");
|
|
|
|
return (-1);
|
|
|
|
}
|
|
|
|
*deskey = res.cryptkeyres_u.deskey;
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
struct key_call_private {
|
|
|
|
CLIENT *client; /* Client handle */
|
|
|
|
pid_t pid; /* process-id at moment of creation */
|
|
|
|
uid_t uid; /* user-id at last authorization */
|
|
|
|
};
|
|
|
|
static struct key_call_private *key_call_private_main = NULL;
|
2010-03-10 13:23:25 +00:00
|
|
|
static thread_key_t key_call_key;
|
|
|
|
static once_t key_call_once = ONCE_INITIALIZER;
|
|
|
|
static int key_call_key_error;
|
1997-05-28 05:00:11 +00:00
|
|
|
|
|
|
|
static void
|
|
|
|
key_call_destroy(void *vp)
|
|
|
|
{
|
2002-03-21 18:49:23 +00:00
|
|
|
struct key_call_private *kcp = (struct key_call_private *)vp;
|
1997-05-28 05:00:11 +00:00
|
|
|
|
|
|
|
if (kcp) {
|
|
|
|
if (kcp->client)
|
|
|
|
clnt_destroy(kcp->client);
|
|
|
|
free(kcp);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2010-03-10 13:23:25 +00:00
|
|
|
static void
|
|
|
|
key_call_init(void)
|
|
|
|
{
|
|
|
|
|
|
|
|
key_call_key_error = thr_keycreate(&key_call_key, key_call_destroy);
|
|
|
|
}
|
|
|
|
|
1997-05-28 05:00:11 +00:00
|
|
|
/*
|
|
|
|
* Keep the handle cached. This call may be made quite often.
|
|
|
|
*/
|
|
|
|
static CLIENT *
|
|
|
|
getkeyserv_handle(vers)
|
|
|
|
int vers;
|
|
|
|
{
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
void *localhandle;
|
|
|
|
struct netconfig *nconf;
|
|
|
|
struct netconfig *tpconf;
|
2009-11-25 04:45:45 +00:00
|
|
|
struct key_call_private *kcp;
|
1997-05-28 05:00:11 +00:00
|
|
|
struct timeval wait_time;
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
struct utsname u;
|
|
|
|
int main_thread;
|
1997-05-28 05:00:11 +00:00
|
|
|
int fd;
|
|
|
|
|
|
|
|
#define TOTAL_TIMEOUT 30 /* total timeout talking to keyserver */
|
|
|
|
#define TOTAL_TRIES 5 /* Number of tries */
|
|
|
|
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
if ((main_thread = thr_main())) {
|
|
|
|
kcp = key_call_private_main;
|
|
|
|
} else {
|
2010-03-10 13:23:25 +00:00
|
|
|
if (thr_once(&key_call_once, key_call_init) != 0 ||
|
|
|
|
key_call_key_error != 0)
|
|
|
|
return ((CLIENT *) NULL);
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
kcp = (struct key_call_private *)thr_getspecific(key_call_key);
|
|
|
|
}
|
1997-05-28 05:00:11 +00:00
|
|
|
if (kcp == (struct key_call_private *)NULL) {
|
|
|
|
kcp = (struct key_call_private *)malloc(sizeof (*kcp));
|
|
|
|
if (kcp == (struct key_call_private *)NULL) {
|
|
|
|
return ((CLIENT *) NULL);
|
|
|
|
}
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
if (main_thread)
|
|
|
|
key_call_private_main = kcp;
|
|
|
|
else
|
|
|
|
thr_setspecific(key_call_key, (void *) kcp);
|
1997-05-28 05:00:11 +00:00
|
|
|
kcp->client = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* if pid has changed, destroy client and rebuild */
|
|
|
|
if (kcp->client != NULL && kcp->pid != getpid()) {
|
|
|
|
clnt_destroy(kcp->client);
|
|
|
|
kcp->client = NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (kcp->client != NULL) {
|
|
|
|
/* if uid has changed, build client handle again */
|
|
|
|
if (kcp->uid != geteuid()) {
|
|
|
|
kcp->uid = geteuid();
|
|
|
|
auth_destroy(kcp->client->cl_auth);
|
|
|
|
kcp->client->cl_auth =
|
|
|
|
authsys_create("", kcp->uid, 0, 0, NULL);
|
|
|
|
if (kcp->client->cl_auth == NULL) {
|
|
|
|
clnt_destroy(kcp->client);
|
|
|
|
kcp->client = NULL;
|
|
|
|
return ((CLIENT *) NULL);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
/* Change the version number to the new one */
|
|
|
|
clnt_control(kcp->client, CLSET_VERS, (void *)&vers);
|
|
|
|
return (kcp->client);
|
|
|
|
}
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
if (!(localhandle = setnetconfig())) {
|
|
|
|
return ((CLIENT *) NULL);
|
|
|
|
}
|
|
|
|
tpconf = NULL;
|
2001-03-24 00:22:13 +00:00
|
|
|
#if defined(__FreeBSD__)
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
if (uname(&u) == -1)
|
2001-03-24 00:22:13 +00:00
|
|
|
#else
|
|
|
|
#if defined(i386)
|
|
|
|
if (_nuname(&u) == -1)
|
|
|
|
#elif defined(sparc)
|
|
|
|
if (_uname(&u) == -1)
|
|
|
|
#else
|
|
|
|
#error Unknown architecture!
|
|
|
|
#endif
|
|
|
|
#endif
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
{
|
|
|
|
endnetconfig(localhandle);
|
|
|
|
return ((CLIENT *) NULL);
|
|
|
|
}
|
2002-02-05 23:43:43 +00:00
|
|
|
while ((nconf = getnetconfig(localhandle)) != NULL) {
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
if (strcmp(nconf->nc_protofmly, NC_LOOPBACK) == 0) {
|
|
|
|
/*
|
|
|
|
* We use COTS_ORD here so that the caller can
|
|
|
|
* find out immediately if the server is dead.
|
|
|
|
*/
|
|
|
|
if (nconf->nc_semantics == NC_TPI_COTS_ORD) {
|
|
|
|
kcp->client = clnt_tp_create(u.nodename,
|
|
|
|
KEY_PROG, vers, nconf);
|
|
|
|
if (kcp->client)
|
|
|
|
break;
|
|
|
|
} else {
|
|
|
|
tpconf = nconf;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if ((kcp->client == (CLIENT *) NULL) && (tpconf))
|
|
|
|
/* Now, try the CLTS or COTS loopback transport */
|
|
|
|
kcp->client = clnt_tp_create(u.nodename,
|
|
|
|
KEY_PROG, vers, tpconf);
|
|
|
|
endnetconfig(localhandle);
|
1997-05-28 05:00:11 +00:00
|
|
|
|
|
|
|
if (kcp->client == (CLIENT *) NULL) {
|
|
|
|
return ((CLIENT *) NULL);
|
Bring in a hybrid of SunSoft's transport-independent RPC (TI-RPC) and
associated changes that had to happen to make this possible as well as
bugs fixed along the way.
Bring in required TLI library routines to support this.
Since we don't support TLI we've essentially copied what NetBSD
has done, adding a thin layer to emulate direct the TLI calls
into BSD socket calls.
This is mostly from Sun's tirpc release that was made in 1994,
however some fixes were backported from the 1999 release (supposedly
only made available after this porting effort was underway).
The submitter has agreed to continue on and bring us up to the
1999 release.
Several key features are introduced with this update:
Client calls are thread safe. (1999 code has server side thread
safe)
Updated, a more modern interface.
Many userland updates were done to bring the code up to par with
the recent RPC API.
There is an update to the pthreads library, a function
pthread_main_np() was added to emulate a function of Sun's threads
library.
While we're at it, bring in NetBSD's lockd, it's been far too
long of a wait.
New rpcbind(8) replaces portmap(8) (supporting communication over
an authenticated Unix-domain socket, and by default only allowing
set and unset requests over that channel). It's much more secure
than the old portmapper.
Umount(8), mountd(8), mount_nfs(8), nfsd(8) have also been upgraded
to support TI-RPC and to support IPV6.
Umount(8) is also fixed to unmount pathnames longer than 80 chars,
which are currently truncated by the Kernel statfs structure.
Submitted by: Martin Blapp <mb@imp.ch>
Manpage review: ru
Secure RPC implemented by: wpaul
2001-03-19 12:50:13 +00:00
|
|
|
}
|
1997-05-28 05:00:11 +00:00
|
|
|
kcp->uid = geteuid();
|
|
|
|
kcp->pid = getpid();
|
|
|
|
kcp->client->cl_auth = authsys_create("", kcp->uid, 0, 0, NULL);
|
|
|
|
if (kcp->client->cl_auth == NULL) {
|
|
|
|
clnt_destroy(kcp->client);
|
|
|
|
kcp->client = NULL;
|
|
|
|
return ((CLIENT *) NULL);
|
|
|
|
}
|
|
|
|
|
|
|
|
wait_time.tv_sec = TOTAL_TIMEOUT/TOTAL_TRIES;
|
|
|
|
wait_time.tv_usec = 0;
|
|
|
|
(void) clnt_control(kcp->client, CLSET_RETRY_TIMEOUT,
|
|
|
|
(char *)&wait_time);
|
|
|
|
if (clnt_control(kcp->client, CLGET_FD, (char *)&fd))
|
Simplify sytem call renaming. Instead of _foo() <-- _libc_foo <-- foo(),
just use _foo() <-- foo(). In the case of a libpthread that doesn't do
call conversion (such as linuxthreads and our upcoming libpthread), this
is adequate. In the case of libc_r, we still need three names, which are
now _thread_sys_foo() <-- _foo() <-- foo().
Convert all internal libc usage of: aio_suspend(), close(), fsync(), msync(),
nanosleep(), open(), fcntl(), read(), and write() to _foo() instead of foo().
Remove all internal libc usage of: creat(), pause(), sleep(), system(),
tcdrain(), wait(), and waitpid().
Make thread cancellation fully POSIX-compliant.
Suggested by: deischen
2000-01-27 23:07:25 +00:00
|
|
|
_fcntl(fd, F_SETFD, 1); /* make it "close on exec" */
|
1997-05-28 05:00:11 +00:00
|
|
|
|
|
|
|
return (kcp->client);
|
|
|
|
}
|
|
|
|
|
|
|
|
/* returns 0 on failure, 1 on success */
|
|
|
|
|
|
|
|
static int
|
|
|
|
key_call(proc, xdr_arg, arg, xdr_rslt, rslt)
|
|
|
|
u_long proc;
|
|
|
|
xdrproc_t xdr_arg;
|
2002-04-28 15:18:50 +00:00
|
|
|
void *arg;
|
1997-05-28 05:00:11 +00:00
|
|
|
xdrproc_t xdr_rslt;
|
2002-04-28 15:18:50 +00:00
|
|
|
void *rslt;
|
1997-05-28 05:00:11 +00:00
|
|
|
{
|
|
|
|
CLIENT *clnt;
|
|
|
|
struct timeval wait_time;
|
|
|
|
|
|
|
|
if (proc == KEY_ENCRYPT_PK && __key_encryptsession_pk_LOCAL) {
|
|
|
|
cryptkeyres *res;
|
|
|
|
res = (*__key_encryptsession_pk_LOCAL)(geteuid(), arg);
|
|
|
|
*(cryptkeyres*)rslt = *res;
|
|
|
|
return (1);
|
|
|
|
} else if (proc == KEY_DECRYPT_PK && __key_decryptsession_pk_LOCAL) {
|
|
|
|
cryptkeyres *res;
|
|
|
|
res = (*__key_decryptsession_pk_LOCAL)(geteuid(), arg);
|
|
|
|
*(cryptkeyres*)rslt = *res;
|
|
|
|
return (1);
|
|
|
|
} else if (proc == KEY_GEN && __key_gendes_LOCAL) {
|
|
|
|
des_block *res;
|
|
|
|
res = (*__key_gendes_LOCAL)(geteuid(), 0);
|
|
|
|
*(des_block*)rslt = *res;
|
|
|
|
return (1);
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((proc == KEY_ENCRYPT_PK) || (proc == KEY_DECRYPT_PK) ||
|
|
|
|
(proc == KEY_NET_GET) || (proc == KEY_NET_PUT) ||
|
|
|
|
(proc == KEY_GET_CONV))
|
|
|
|
clnt = getkeyserv_handle(2); /* talk to version 2 */
|
|
|
|
else
|
|
|
|
clnt = getkeyserv_handle(1); /* talk to version 1 */
|
|
|
|
|
|
|
|
if (clnt == NULL) {
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
|
|
|
|
wait_time.tv_sec = TOTAL_TIMEOUT;
|
|
|
|
wait_time.tv_usec = 0;
|
|
|
|
|
|
|
|
if (clnt_call(clnt, proc, xdr_arg, arg, xdr_rslt, rslt,
|
|
|
|
wait_time) == RPC_SUCCESS) {
|
|
|
|
return (1);
|
|
|
|
} else {
|
|
|
|
return (0);
|
|
|
|
}
|
|
|
|
}
|