[NETAPI32]
[reactos.git] / reactos / dll / win32 / libtirpc / src / key_call.c
1 /*
2 * Copyright (c) 2009, Sun Microsystems, Inc.
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions are met:
7 * - Redistributions of source code must retain the above copyright notice,
8 * this list of conditions and the following disclaimer.
9 * - Redistributions in binary form must reproduce the above copyright notice,
10 * this list of conditions and the following disclaimer in the documentation
11 * and/or other materials provided with the distribution.
12 * - Neither the name of Sun Microsystems, Inc. nor the names of its
13 * contributors may be used to endorse or promote products derived
14 * from this software without specific prior written permission.
15 *
16 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS"
17 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
18 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
19 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE
20 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 * POSSIBILITY OF SUCH DAMAGE.
27 */
28 /*
29 * Copyright (c) 1986-1991 by Sun Microsystems Inc.
30 */
31
32
33 //#include <sys/cdefs.h>
34
35 /*
36 * key_call.c, Interface to keyserver
37 *
38 * setsecretkey(key) - set your secret key
39 * encryptsessionkey(agent, deskey) - encrypt a session key to talk to agent
40 * decryptsessionkey(agent, deskey) - decrypt ditto
41 * gendeskey(deskey) - generate a secure des key
42 */
43
44 #ifndef _WIN32
45
46 #include <pthread.h>
47 #include <reentrant.h>
48 #include <stdio.h>
49 #include <stdlib.h>
50 #include <unistd.h>
51 #include <errno.h>
52 #include <rpc/rpc.h>
53 #include <rpc/auth.h>
54 #include <rpc/auth_unix.h>
55 #include <rpc/key_prot.h>
56 #include <string.h>
57 #include <netconfig.h>
58 #include <sys/utsname.h>
59 #include <stdlib.h>
60 #include <signal.h>
61 #include <sys/wait.h>
62 #include <sys/fcntl.h>
63
64
65 #define KEY_TIMEOUT 5 /* per-try timeout in seconds */
66 #define KEY_NRETRY 12 /* number of retries */
67
68 #ifdef DEBUG
69 #define debug(msg) (void) fprintf(stderr, "%s\n", msg);
70 #else
71 #define debug(msg)
72 #endif /* DEBUG */
73
74 /*
75 * Hack to allow the keyserver to use AUTH_DES (for authenticated
76 * NIS+ calls, for example). The only functions that get called
77 * are key_encryptsession_pk, key_decryptsession_pk, and key_gendes.
78 *
79 * The approach is to have the keyserver fill in pointers to local
80 * implementations of these functions, and to call those in key_call().
81 */
82
83 cryptkeyres *(*__key_encryptsession_pk_LOCAL)() = 0;
84 cryptkeyres *(*__key_decryptsession_pk_LOCAL)() = 0;
85 des_block *(*__key_gendes_LOCAL)() = 0;
86
87 static int key_call( u_long, xdrproc_t, void *, xdrproc_t, void *);
88
89 int
90 key_setsecret(secretkey)
91 const char *secretkey;
92 {
93 keystatus status;
94
95 if (!key_call((u_long) KEY_SET, (xdrproc_t)xdr_keybuf,
96 (void *)secretkey,
97 (xdrproc_t)xdr_keystatus, &status)) {
98 return (-1);
99 }
100 if (status != KEY_SUCCESS) {
101 debug("set status is nonzero");
102 return (-1);
103 }
104 return (0);
105 }
106
107
108 /* key_secretkey_is_set() returns 1 if the keyserver has a secret key
109 * stored for the caller's effective uid; it returns 0 otherwise
110 *
111 * N.B.: The KEY_NET_GET key call is undocumented. Applications shouldn't
112 * be using it, because it allows them to get the user's secret key.
113 */
114
115 int
116 key_secretkey_is_set(void)
117 {
118 struct key_netstres kres;
119
120 memset((void*)&kres, 0, sizeof (kres));
121 if (key_call((u_long) KEY_NET_GET, (xdrproc_t)xdr_void, NULL,
122 (xdrproc_t)xdr_key_netstres, &kres) &&
123 (kres.status == KEY_SUCCESS) &&
124 (kres.key_netstres_u.knet.st_priv_key[0] != 0)) {
125 /* avoid leaving secret key in memory */
126 memset(kres.key_netstres_u.knet.st_priv_key, 0, HEXKEYBYTES);
127 return (1);
128 }
129 return (0);
130 }
131
132 int
133 key_encryptsession_pk(remotename, remotekey, deskey)
134 char *remotename;
135 netobj *remotekey;
136 des_block *deskey;
137 {
138 cryptkeyarg2 arg;
139 cryptkeyres res;
140
141 arg.remotename = remotename;
142 arg.remotekey = *remotekey;
143 arg.deskey = *deskey;
144 if (!key_call((u_long)KEY_ENCRYPT_PK, (xdrproc_t)xdr_cryptkeyarg2, &arg,
145 (xdrproc_t)xdr_cryptkeyres, &res)) {
146 return (-1);
147 }
148 if (res.status != KEY_SUCCESS) {
149 debug("encrypt status is nonzero");
150 return (-1);
151 }
152 *deskey = res.cryptkeyres_u.deskey;
153 return (0);
154 }
155
156 int
157 key_decryptsession_pk(remotename, remotekey, deskey)
158 char *remotename;
159 netobj *remotekey;
160 des_block *deskey;
161 {
162 cryptkeyarg2 arg;
163 cryptkeyres res;
164
165 arg.remotename = remotename;
166 arg.remotekey = *remotekey;
167 arg.deskey = *deskey;
168 if (!key_call((u_long)KEY_DECRYPT_PK, (xdrproc_t)xdr_cryptkeyarg2, &arg,
169 (xdrproc_t)xdr_cryptkeyres, &res)) {
170 return (-1);
171 }
172 if (res.status != KEY_SUCCESS) {
173 debug("decrypt status is nonzero");
174 return (-1);
175 }
176 *deskey = res.cryptkeyres_u.deskey;
177 return (0);
178 }
179
180 int
181 key_encryptsession(remotename, deskey)
182 const char *remotename;
183 des_block *deskey;
184 {
185 cryptkeyarg arg;
186 cryptkeyres res;
187
188 arg.remotename = (char *) remotename;
189 arg.deskey = *deskey;
190 if (!key_call((u_long)KEY_ENCRYPT, (xdrproc_t)xdr_cryptkeyarg, &arg,
191 (xdrproc_t)xdr_cryptkeyres, &res)) {
192 return (-1);
193 }
194 if (res.status != KEY_SUCCESS) {
195 debug("encrypt status is nonzero");
196 return (-1);
197 }
198 *deskey = res.cryptkeyres_u.deskey;
199 return (0);
200 }
201
202 int
203 key_decryptsession(remotename, deskey)
204 const char *remotename;
205 des_block *deskey;
206 {
207 cryptkeyarg arg;
208 cryptkeyres res;
209
210 arg.remotename = (char *) remotename;
211 arg.deskey = *deskey;
212 if (!key_call((u_long)KEY_DECRYPT, (xdrproc_t)xdr_cryptkeyarg, &arg,
213 (xdrproc_t)xdr_cryptkeyres, &res)) {
214 return (-1);
215 }
216 if (res.status != KEY_SUCCESS) {
217 debug("decrypt status is nonzero");
218 return (-1);
219 }
220 *deskey = res.cryptkeyres_u.deskey;
221 return (0);
222 }
223
224 int
225 key_gendes(key)
226 des_block *key;
227 {
228 if (!key_call((u_long)KEY_GEN, (xdrproc_t)xdr_void, NULL,
229 (xdrproc_t)xdr_des_block, key)) {
230 return (-1);
231 }
232 return (0);
233 }
234
235 int
236 key_setnet(arg)
237 struct key_netstarg *arg;
238 {
239 keystatus status;
240
241
242 if (!key_call((u_long) KEY_NET_PUT, (xdrproc_t)xdr_key_netstarg, arg,
243 (xdrproc_t)xdr_keystatus, &status)){
244 return (-1);
245 }
246
247 if (status != KEY_SUCCESS) {
248 debug("key_setnet status is nonzero");
249 return (-1);
250 }
251 return (1);
252 }
253
254
255 int
256 key_get_conv(pkey, deskey)
257 char *pkey;
258 des_block *deskey;
259 {
260 cryptkeyres res;
261
262 if (!key_call((u_long) KEY_GET_CONV, (xdrproc_t)xdr_keybuf, pkey,
263 (xdrproc_t)xdr_cryptkeyres, &res)) {
264 return (-1);
265 }
266 if (res.status != KEY_SUCCESS) {
267 debug("get_conv status is nonzero");
268 return (-1);
269 }
270 *deskey = res.cryptkeyres_u.deskey;
271 return (0);
272 }
273
274 struct key_call_private {
275 CLIENT *client; /* Client handle */
276 pid_t pid; /* process-id at moment of creation */
277 uid_t uid; /* user-id at last authorization */
278 };
279 static struct key_call_private *key_call_private_main = NULL;
280
281 static void
282 key_call_destroy(void *vp)
283 {
284 struct key_call_private *kcp = (struct key_call_private *)vp;
285
286 if (kcp) {
287 if (kcp->client)
288 clnt_destroy(kcp->client);
289 free(kcp);
290 }
291 }
292
293 /*
294 * Keep the handle cached. This call may be made quite often.
295 */
296 static CLIENT *
297 getkeyserv_handle(vers)
298 int vers;
299 {
300 void *localhandle;
301 struct netconfig *nconf;
302 struct netconfig *tpconf;
303 struct key_call_private *kcp = key_call_private_main;
304 struct timeval wait_time;
305 struct utsname u;
306 int fd;
307 extern thread_key_t key_call_key;
308 extern mutex_t tsd_lock;
309
310 #define TOTAL_TIMEOUT 30 /* total timeout talking to keyserver */
311 #define TOTAL_TRIES 5 /* Number of tries */
312
313 if (key_call_key == -1) {
314 mutex_lock(&tsd_lock);
315 if (key_call_key == -1)
316 thr_keycreate(&key_call_key, key_call_destroy);
317 mutex_unlock(&tsd_lock);
318 }
319 kcp = (struct key_call_private *)thr_getspecific(key_call_key);
320 if (kcp == (struct key_call_private *)NULL) {
321 kcp = (struct key_call_private *)malloc(sizeof (*kcp));
322 if (kcp == (struct key_call_private *)NULL) {
323 return ((CLIENT *) NULL);
324 }
325 thr_setspecific(key_call_key, (void *) kcp);
326 kcp->client = NULL;
327 }
328
329 /* if pid has changed, destroy client and rebuild */
330 if (kcp->client != NULL && kcp->pid != getpid()) {
331 clnt_destroy(kcp->client);
332 kcp->client = NULL;
333 }
334
335 if (kcp->client != NULL) {
336 /* if uid has changed, build client handle again */
337 if (kcp->uid != geteuid()) {
338 kcp->uid = geteuid();
339 auth_destroy(kcp->client->cl_auth);
340 kcp->client->cl_auth =
341 authsys_create("", kcp->uid, 0, 0, NULL);
342 if (kcp->client->cl_auth == NULL) {
343 clnt_destroy(kcp->client);
344 kcp->client = NULL;
345 return ((CLIENT *) NULL);
346 }
347 }
348 /* Change the version number to the new one */
349 clnt_control(kcp->client, CLSET_VERS, (void *)&vers);
350 return (kcp->client);
351 }
352 if (!(localhandle = setnetconfig())) {
353 return ((CLIENT *) NULL);
354 }
355 tpconf = NULL;
356 #if defined(__FreeBSD__)
357 if (uname(&u) == -1)
358 #else
359 #if defined(i386)
360 if (uname(&u) == -1)
361 #elif defined(sparc)
362 if (uname(&u) == -1)
363 #else
364 #error Unknown architecture!
365 #endif
366 #endif
367 {
368 endnetconfig(localhandle);
369 return ((CLIENT *) NULL);
370 }
371 while ((nconf = getnetconfig(localhandle)) != NULL) {
372 if (strcmp(nconf->nc_protofmly, NC_LOOPBACK) == 0) {
373 /*
374 * We use COTS_ORD here so that the caller can
375 * find out immediately if the server is dead.
376 */
377 if (nconf->nc_semantics == NC_TPI_COTS_ORD) {
378 kcp->client = clnt_tp_create(u.nodename,
379 KEY_PROG, vers, nconf);
380 if (kcp->client)
381 break;
382 } else {
383 tpconf = nconf;
384 }
385 }
386 }
387 if ((kcp->client == (CLIENT *) NULL) && (tpconf))
388 /* Now, try the CLTS or COTS loopback transport */
389 kcp->client = clnt_tp_create(u.nodename,
390 KEY_PROG, vers, tpconf);
391 endnetconfig(localhandle);
392
393 if (kcp->client == (CLIENT *) NULL) {
394 return ((CLIENT *) NULL);
395 }
396 kcp->uid = geteuid();
397 kcp->pid = getpid();
398 kcp->client->cl_auth = authsys_create("", kcp->uid, 0, 0, NULL);
399 if (kcp->client->cl_auth == NULL) {
400 clnt_destroy(kcp->client);
401 kcp->client = NULL;
402 return ((CLIENT *) NULL);
403 }
404
405 wait_time.tv_sec = TOTAL_TIMEOUT/TOTAL_TRIES;
406 wait_time.tv_usec = 0;
407 (void) clnt_control(kcp->client, CLSET_RETRY_TIMEOUT,
408 (char *)&wait_time);
409 if (clnt_control(kcp->client, CLGET_FD, (char *)&fd))
410 fcntl(fd, F_SETFD, 1); /* make it "close on exec" */
411
412 return (kcp->client);
413 }
414
415 /* returns 0 on failure, 1 on success */
416
417 static int
418 key_call(proc, xdr_arg, arg, xdr_rslt, rslt)
419 u_long proc;
420 xdrproc_t xdr_arg;
421 void *arg;
422 xdrproc_t xdr_rslt;
423 void *rslt;
424 {
425 CLIENT *clnt;
426 struct timeval wait_time;
427
428 if (proc == KEY_ENCRYPT_PK && __key_encryptsession_pk_LOCAL) {
429 cryptkeyres *res;
430 res = (*__key_encryptsession_pk_LOCAL)(geteuid(), arg);
431 *(cryptkeyres*)rslt = *res;
432 return (1);
433 } else if (proc == KEY_DECRYPT_PK && __key_decryptsession_pk_LOCAL) {
434 cryptkeyres *res;
435 res = (*__key_decryptsession_pk_LOCAL)(geteuid(), arg);
436 *(cryptkeyres*)rslt = *res;
437 return (1);
438 } else if (proc == KEY_GEN && __key_gendes_LOCAL) {
439 des_block *res;
440 res = (*__key_gendes_LOCAL)(geteuid(), 0);
441 *(des_block*)rslt = *res;
442 return (1);
443 }
444
445 if ((proc == KEY_ENCRYPT_PK) || (proc == KEY_DECRYPT_PK) ||
446 (proc == KEY_NET_GET) || (proc == KEY_NET_PUT) ||
447 (proc == KEY_GET_CONV))
448 clnt = getkeyserv_handle(2); /* talk to version 2 */
449 else
450 clnt = getkeyserv_handle(1); /* talk to version 1 */
451
452 if (clnt == NULL) {
453 return (0);
454 }
455
456 wait_time.tv_sec = TOTAL_TIMEOUT;
457 wait_time.tv_usec = 0;
458
459 if (clnt_call(clnt, proc, xdr_arg, arg, xdr_rslt, rslt,
460 wait_time) == RPC_SUCCESS) {
461 return (1);
462 } else {
463 return (0);
464 }
465 }
466 #endif