Linux Audio

Check our new training course

Loading...
v4.17
 
  1/*
  2 *  linux/net/sunrpc/gss_rpc_upcall.c
  3 *
  4 *  Copyright (C) 2012 Simo Sorce <simo@redhat.com>
  5 *
  6 * This program is free software; you can redistribute it and/or modify
  7 * it under the terms of the GNU General Public License as published by
  8 * the Free Software Foundation; either version 2 of the License, or
  9 * (at your option) any later version.
 10 *
 11 * This program is distributed in the hope that it will be useful,
 12 * but WITHOUT ANY WARRANTY; without even the implied warranty of
 13 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 14 * GNU General Public License for more details.
 15 *
 16 * You should have received a copy of the GNU General Public License
 17 * along with this program; if not, write to the Free Software
 18 * Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
 19 */
 20
 21#include <linux/types.h>
 22#include <linux/un.h>
 23
 24#include <linux/sunrpc/svcauth.h>
 25#include "gss_rpc_upcall.h"
 26
 27#define GSSPROXY_SOCK_PATHNAME	"/var/run/gssproxy.sock"
 28
 29#define GSSPROXY_PROGRAM	(400112u)
 30#define GSSPROXY_VERS_1		(1u)
 31
 32/*
 33 * Encoding/Decoding functions
 34 */
 35
 36enum {
 37	GSSX_NULL = 0,	/* Unused */
 38        GSSX_INDICATE_MECHS = 1,
 39        GSSX_GET_CALL_CONTEXT = 2,
 40        GSSX_IMPORT_AND_CANON_NAME = 3,
 41        GSSX_EXPORT_CRED = 4,
 42        GSSX_IMPORT_CRED = 5,
 43        GSSX_ACQUIRE_CRED = 6,
 44        GSSX_STORE_CRED = 7,
 45        GSSX_INIT_SEC_CONTEXT = 8,
 46        GSSX_ACCEPT_SEC_CONTEXT = 9,
 47        GSSX_RELEASE_HANDLE = 10,
 48        GSSX_GET_MIC = 11,
 49        GSSX_VERIFY = 12,
 50        GSSX_WRAP = 13,
 51        GSSX_UNWRAP = 14,
 52        GSSX_WRAP_SIZE_LIMIT = 15,
 53};
 54
 55#define PROC(proc, name)				\
 56[GSSX_##proc] = {					\
 57	.p_proc   = GSSX_##proc,			\
 58	.p_encode = gssx_enc_##name,	\
 59	.p_decode = gssx_dec_##name,	\
 60	.p_arglen = GSSX_ARG_##name##_sz,		\
 61	.p_replen = GSSX_RES_##name##_sz, 		\
 62	.p_statidx = GSSX_##proc,			\
 63	.p_name   = #proc,				\
 64}
 65
 66static const struct rpc_procinfo gssp_procedures[] = {
 67	PROC(INDICATE_MECHS, indicate_mechs),
 68        PROC(GET_CALL_CONTEXT, get_call_context),
 69        PROC(IMPORT_AND_CANON_NAME, import_and_canon_name),
 70        PROC(EXPORT_CRED, export_cred),
 71        PROC(IMPORT_CRED, import_cred),
 72        PROC(ACQUIRE_CRED, acquire_cred),
 73        PROC(STORE_CRED, store_cred),
 74        PROC(INIT_SEC_CONTEXT, init_sec_context),
 75        PROC(ACCEPT_SEC_CONTEXT, accept_sec_context),
 76        PROC(RELEASE_HANDLE, release_handle),
 77        PROC(GET_MIC, get_mic),
 78        PROC(VERIFY, verify),
 79        PROC(WRAP, wrap),
 80        PROC(UNWRAP, unwrap),
 81        PROC(WRAP_SIZE_LIMIT, wrap_size_limit),
 82};
 83
 84
 85
 86/*
 87 * Common transport functions
 88 */
 89
 90static const struct rpc_program gssp_program;
 91
 92static int gssp_rpc_create(struct net *net, struct rpc_clnt **_clnt)
 93{
 94	static const struct sockaddr_un gssp_localaddr = {
 95		.sun_family		= AF_LOCAL,
 96		.sun_path		= GSSPROXY_SOCK_PATHNAME,
 97	};
 98	struct rpc_create_args args = {
 99		.net		= net,
100		.protocol	= XPRT_TRANSPORT_LOCAL,
101		.address	= (struct sockaddr *)&gssp_localaddr,
102		.addrsize	= sizeof(gssp_localaddr),
103		.servername	= "localhost",
104		.program	= &gssp_program,
105		.version	= GSSPROXY_VERS_1,
106		.authflavor	= RPC_AUTH_NULL,
107		/*
108		 * Note we want connection to be done in the caller's
109		 * filesystem namespace.  We therefore turn off the idle
110		 * timeout, which would result in reconnections being
111		 * done without the correct namespace:
112		 */
113		.flags		= RPC_CLNT_CREATE_NOPING |
 
114				  RPC_CLNT_CREATE_NO_IDLE_TIMEOUT
115	};
116	struct rpc_clnt *clnt;
117	int result = 0;
118
119	clnt = rpc_create(&args);
120	if (IS_ERR(clnt)) {
121		dprintk("RPC:       failed to create AF_LOCAL gssproxy "
122				"client (errno %ld).\n", PTR_ERR(clnt));
123		result = PTR_ERR(clnt);
124		*_clnt = NULL;
125		goto out;
126	}
127
128	dprintk("RPC:       created new gssp local client (gssp_local_clnt: "
129			"%p)\n", clnt);
130	*_clnt = clnt;
131
132out:
133	return result;
134}
135
136void init_gssp_clnt(struct sunrpc_net *sn)
137{
138	mutex_init(&sn->gssp_lock);
139	sn->gssp_clnt = NULL;
140}
141
142int set_gssp_clnt(struct net *net)
143{
144	struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
145	struct rpc_clnt *clnt;
146	int ret;
147
148	mutex_lock(&sn->gssp_lock);
149	ret = gssp_rpc_create(net, &clnt);
150	if (!ret) {
151		if (sn->gssp_clnt)
152			rpc_shutdown_client(sn->gssp_clnt);
153		sn->gssp_clnt = clnt;
154	}
155	mutex_unlock(&sn->gssp_lock);
156	return ret;
157}
158
159void clear_gssp_clnt(struct sunrpc_net *sn)
160{
161	mutex_lock(&sn->gssp_lock);
162	if (sn->gssp_clnt) {
163		rpc_shutdown_client(sn->gssp_clnt);
164		sn->gssp_clnt = NULL;
165	}
166	mutex_unlock(&sn->gssp_lock);
167}
168
169static struct rpc_clnt *get_gssp_clnt(struct sunrpc_net *sn)
170{
171	struct rpc_clnt *clnt;
172
173	mutex_lock(&sn->gssp_lock);
174	clnt = sn->gssp_clnt;
175	if (clnt)
176		atomic_inc(&clnt->cl_count);
177	mutex_unlock(&sn->gssp_lock);
178	return clnt;
179}
180
181static int gssp_call(struct net *net, struct rpc_message *msg)
182{
183	struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
184	struct rpc_clnt *clnt;
185	int status;
186
187	clnt = get_gssp_clnt(sn);
188	if (!clnt)
189		return -EIO;
190	status = rpc_call_sync(clnt, msg, 0);
191	if (status < 0) {
192		dprintk("gssp: rpc_call returned error %d\n", -status);
193		switch (status) {
194		case -EPROTONOSUPPORT:
195			status = -EINVAL;
196			break;
197		case -ECONNREFUSED:
198		case -ETIMEDOUT:
199		case -ENOTCONN:
200			status = -EAGAIN;
201			break;
202		case -ERESTARTSYS:
203			if (signalled ())
204				status = -EINTR;
205			break;
206		default:
207			break;
208		}
209	}
210	rpc_release_client(clnt);
211	return status;
212}
213
214static void gssp_free_receive_pages(struct gssx_arg_accept_sec_context *arg)
215{
216	int i;
217
218	for (i = 0; i < arg->npages && arg->pages[i]; i++)
219		__free_page(arg->pages[i]);
220
221	kfree(arg->pages);
222}
223
224static int gssp_alloc_receive_pages(struct gssx_arg_accept_sec_context *arg)
225{
 
 
226	arg->npages = DIV_ROUND_UP(NGROUPS_MAX * 4, PAGE_SIZE);
227	arg->pages = kzalloc(arg->npages * sizeof(struct page *), GFP_KERNEL);
228	/*
229	 * XXX: actual pages are allocated by xdr layer in
230	 * xdr_partial_copy_from_skb.
231	 */
232	if (!arg->pages)
233		return -ENOMEM;
 
 
 
 
 
 
 
234	return 0;
235}
236
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
237/*
238 * Public functions
239 */
240
241/* numbers somewhat arbitrary but large enough for current needs */
242#define GSSX_MAX_OUT_HANDLE	128
243#define GSSX_MAX_SRC_PRINC	256
244#define GSSX_KMEMBUF (GSSX_max_output_handle_sz + \
245			GSSX_max_oid_sz + \
246			GSSX_max_princ_sz + \
247			sizeof(struct svc_cred))
248
249int gssp_accept_sec_context_upcall(struct net *net,
250				struct gssp_upcall_data *data)
251{
252	struct gssx_ctx ctxh = {
253		.state = data->in_handle
254	};
255	struct gssx_arg_accept_sec_context arg = {
256		.input_token = data->in_token,
257	};
258	struct gssx_ctx rctxh = {
259		/*
260		 * pass in the max length we expect for each of these
261		 * buffers but let the xdr code kmalloc them:
262		 */
263		.exported_context_token.len = GSSX_max_output_handle_sz,
264		.mech.len = GSS_OID_MAX_LEN,
 
265		.src_name.display_name.len = GSSX_max_princ_sz
266	};
267	struct gssx_res_accept_sec_context res = {
268		.context_handle = &rctxh,
269		.output_token = &data->out_token
270	};
271	struct rpc_message msg = {
272		.rpc_proc = &gssp_procedures[GSSX_ACCEPT_SEC_CONTEXT],
273		.rpc_argp = &arg,
274		.rpc_resp = &res,
275		.rpc_cred = NULL, /* FIXME ? */
276	};
277	struct xdr_netobj client_name = { 0 , NULL };
 
278	int ret;
279
280	if (data->in_handle.len != 0)
281		arg.context_handle = &ctxh;
282	res.output_token->len = GSSX_max_output_token_sz;
283
284	ret = gssp_alloc_receive_pages(&arg);
285	if (ret)
286		return ret;
287
288	/* use nfs/ for targ_name ? */
289
290	ret = gssp_call(net, &msg);
291
292	gssp_free_receive_pages(&arg);
293
294	/* we need to fetch all data even in case of error so
295	 * that we can free special strctures is they have been allocated */
296	data->major_status = res.status.major_status;
297	data->minor_status = res.status.minor_status;
298	if (res.context_handle) {
299		data->out_handle = rctxh.exported_context_token;
300		data->mech_oid.len = rctxh.mech.len;
301		if (rctxh.mech.data)
302			memcpy(data->mech_oid.data, rctxh.mech.data,
303						data->mech_oid.len);
 
 
304		client_name = rctxh.src_name.display_name;
 
305	}
306
307	if (res.options.count == 1) {
308		gssx_buffer *value = &res.options.data[0].value;
309		/* Currently we only decode CREDS_VALUE, if we add
310		 * anything else we'll have to loop and match on the
311		 * option name */
312		if (value->len == 1) {
313			/* steal group info from struct svc_cred */
314			data->creds = *(struct svc_cred *)value->data;
315			data->found_creds = 1;
316		}
317		/* whether we use it or not, free data */
318		kfree(value->data);
319	}
320
321	if (res.options.count != 0) {
322		kfree(res.options.data);
323	}
324
325	/* convert to GSS_NT_HOSTBASED_SERVICE form and set into creds */
326	if (data->found_creds && client_name.data != NULL) {
327		char *c;
328
329		data->creds.cr_raw_principal = kstrndup(client_name.data,
330						client_name.len, GFP_KERNEL);
331
332		data->creds.cr_principal = kstrndup(client_name.data,
333						client_name.len, GFP_KERNEL);
334		if (data->creds.cr_principal) {
335			/* terminate and remove realm part */
336			c = strchr(data->creds.cr_principal, '@');
337			if (c) {
338				*c = '\0';
339
340				/* change service-hostname delimiter */
341				c = strchr(data->creds.cr_principal, '/');
342				if (c) *c = '@';
343			}
344			if (!c) {
345				/* not a service principal */
346				kfree(data->creds.cr_principal);
347				data->creds.cr_principal = NULL;
348			}
349		}
350	}
351	kfree(client_name.data);
 
352
353	return ret;
354}
355
356void gssp_free_upcall_data(struct gssp_upcall_data *data)
357{
358	kfree(data->in_handle.data);
359	kfree(data->out_handle.data);
360	kfree(data->out_token.data);
361	free_svc_cred(&data->creds);
362}
363
364/*
365 * Initialization stuff
366 */
367static unsigned int gssp_version1_counts[ARRAY_SIZE(gssp_procedures)];
368static const struct rpc_version gssp_version1 = {
369	.number		= GSSPROXY_VERS_1,
370	.nrprocs	= ARRAY_SIZE(gssp_procedures),
371	.procs		= gssp_procedures,
372	.counts		= gssp_version1_counts,
373};
374
375static const struct rpc_version *gssp_version[] = {
376	NULL,
377	&gssp_version1,
378};
379
380static struct rpc_stat gssp_stats;
381
382static const struct rpc_program gssp_program = {
383	.name		= "gssproxy",
384	.number		= GSSPROXY_PROGRAM,
385	.nrvers		= ARRAY_SIZE(gssp_version),
386	.version	= gssp_version,
387	.stats		= &gssp_stats,
388};
v6.13.7
  1// SPDX-License-Identifier: GPL-2.0+
  2/*
  3 *  linux/net/sunrpc/gss_rpc_upcall.c
  4 *
  5 *  Copyright (C) 2012 Simo Sorce <simo@redhat.com>
 
 
 
 
 
 
 
 
 
 
 
 
 
 
  6 */
  7
  8#include <linux/types.h>
  9#include <linux/un.h>
 10
 11#include <linux/sunrpc/svcauth.h>
 12#include "gss_rpc_upcall.h"
 13
 14#define GSSPROXY_SOCK_PATHNAME	"/var/run/gssproxy.sock"
 15
 16#define GSSPROXY_PROGRAM	(400112u)
 17#define GSSPROXY_VERS_1		(1u)
 18
 19/*
 20 * Encoding/Decoding functions
 21 */
 22
 23enum {
 24	GSSX_NULL = 0,	/* Unused */
 25        GSSX_INDICATE_MECHS = 1,
 26        GSSX_GET_CALL_CONTEXT = 2,
 27        GSSX_IMPORT_AND_CANON_NAME = 3,
 28        GSSX_EXPORT_CRED = 4,
 29        GSSX_IMPORT_CRED = 5,
 30        GSSX_ACQUIRE_CRED = 6,
 31        GSSX_STORE_CRED = 7,
 32        GSSX_INIT_SEC_CONTEXT = 8,
 33        GSSX_ACCEPT_SEC_CONTEXT = 9,
 34        GSSX_RELEASE_HANDLE = 10,
 35        GSSX_GET_MIC = 11,
 36        GSSX_VERIFY = 12,
 37        GSSX_WRAP = 13,
 38        GSSX_UNWRAP = 14,
 39        GSSX_WRAP_SIZE_LIMIT = 15,
 40};
 41
 42#define PROC(proc, name)				\
 43[GSSX_##proc] = {					\
 44	.p_proc   = GSSX_##proc,			\
 45	.p_encode = gssx_enc_##name,	\
 46	.p_decode = gssx_dec_##name,	\
 47	.p_arglen = GSSX_ARG_##name##_sz,		\
 48	.p_replen = GSSX_RES_##name##_sz, 		\
 49	.p_statidx = GSSX_##proc,			\
 50	.p_name   = #proc,				\
 51}
 52
 53static const struct rpc_procinfo gssp_procedures[] = {
 54	PROC(INDICATE_MECHS, indicate_mechs),
 55        PROC(GET_CALL_CONTEXT, get_call_context),
 56        PROC(IMPORT_AND_CANON_NAME, import_and_canon_name),
 57        PROC(EXPORT_CRED, export_cred),
 58        PROC(IMPORT_CRED, import_cred),
 59        PROC(ACQUIRE_CRED, acquire_cred),
 60        PROC(STORE_CRED, store_cred),
 61        PROC(INIT_SEC_CONTEXT, init_sec_context),
 62        PROC(ACCEPT_SEC_CONTEXT, accept_sec_context),
 63        PROC(RELEASE_HANDLE, release_handle),
 64        PROC(GET_MIC, get_mic),
 65        PROC(VERIFY, verify),
 66        PROC(WRAP, wrap),
 67        PROC(UNWRAP, unwrap),
 68        PROC(WRAP_SIZE_LIMIT, wrap_size_limit),
 69};
 70
 71
 72
 73/*
 74 * Common transport functions
 75 */
 76
 77static const struct rpc_program gssp_program;
 78
 79static int gssp_rpc_create(struct net *net, struct rpc_clnt **_clnt)
 80{
 81	static const struct sockaddr_un gssp_localaddr = {
 82		.sun_family		= AF_LOCAL,
 83		.sun_path		= GSSPROXY_SOCK_PATHNAME,
 84	};
 85	struct rpc_create_args args = {
 86		.net		= net,
 87		.protocol	= XPRT_TRANSPORT_LOCAL,
 88		.address	= (struct sockaddr *)&gssp_localaddr,
 89		.addrsize	= sizeof(gssp_localaddr),
 90		.servername	= "localhost",
 91		.program	= &gssp_program,
 92		.version	= GSSPROXY_VERS_1,
 93		.authflavor	= RPC_AUTH_NULL,
 94		/*
 95		 * Note we want connection to be done in the caller's
 96		 * filesystem namespace.  We therefore turn off the idle
 97		 * timeout, which would result in reconnections being
 98		 * done without the correct namespace:
 99		 */
100		.flags		= RPC_CLNT_CREATE_NOPING |
101				  RPC_CLNT_CREATE_CONNECTED |
102				  RPC_CLNT_CREATE_NO_IDLE_TIMEOUT
103	};
104	struct rpc_clnt *clnt;
105	int result = 0;
106
107	clnt = rpc_create(&args);
108	if (IS_ERR(clnt)) {
109		dprintk("RPC:       failed to create AF_LOCAL gssproxy "
110				"client (errno %ld).\n", PTR_ERR(clnt));
111		result = PTR_ERR(clnt);
112		*_clnt = NULL;
113		goto out;
114	}
115
116	dprintk("RPC:       created new gssp local client (gssp_local_clnt: "
117			"%p)\n", clnt);
118	*_clnt = clnt;
119
120out:
121	return result;
122}
123
124void init_gssp_clnt(struct sunrpc_net *sn)
125{
126	mutex_init(&sn->gssp_lock);
127	sn->gssp_clnt = NULL;
128}
129
130int set_gssp_clnt(struct net *net)
131{
132	struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
133	struct rpc_clnt *clnt;
134	int ret;
135
136	mutex_lock(&sn->gssp_lock);
137	ret = gssp_rpc_create(net, &clnt);
138	if (!ret) {
139		if (sn->gssp_clnt)
140			rpc_shutdown_client(sn->gssp_clnt);
141		sn->gssp_clnt = clnt;
142	}
143	mutex_unlock(&sn->gssp_lock);
144	return ret;
145}
146
147void clear_gssp_clnt(struct sunrpc_net *sn)
148{
149	mutex_lock(&sn->gssp_lock);
150	if (sn->gssp_clnt) {
151		rpc_shutdown_client(sn->gssp_clnt);
152		sn->gssp_clnt = NULL;
153	}
154	mutex_unlock(&sn->gssp_lock);
155}
156
157static struct rpc_clnt *get_gssp_clnt(struct sunrpc_net *sn)
158{
159	struct rpc_clnt *clnt;
160
161	mutex_lock(&sn->gssp_lock);
162	clnt = sn->gssp_clnt;
163	if (clnt)
164		refcount_inc(&clnt->cl_count);
165	mutex_unlock(&sn->gssp_lock);
166	return clnt;
167}
168
169static int gssp_call(struct net *net, struct rpc_message *msg)
170{
171	struct sunrpc_net *sn = net_generic(net, sunrpc_net_id);
172	struct rpc_clnt *clnt;
173	int status;
174
175	clnt = get_gssp_clnt(sn);
176	if (!clnt)
177		return -EIO;
178	status = rpc_call_sync(clnt, msg, 0);
179	if (status < 0) {
180		dprintk("gssp: rpc_call returned error %d\n", -status);
181		switch (status) {
182		case -EPROTONOSUPPORT:
183			status = -EINVAL;
184			break;
185		case -ECONNREFUSED:
186		case -ETIMEDOUT:
187		case -ENOTCONN:
188			status = -EAGAIN;
189			break;
190		case -ERESTARTSYS:
191			if (signalled ())
192				status = -EINTR;
193			break;
194		default:
195			break;
196		}
197	}
198	rpc_release_client(clnt);
199	return status;
200}
201
202static void gssp_free_receive_pages(struct gssx_arg_accept_sec_context *arg)
203{
204	unsigned int i;
205
206	for (i = 0; i < arg->npages && arg->pages[i]; i++)
207		__free_page(arg->pages[i]);
208
209	kfree(arg->pages);
210}
211
212static int gssp_alloc_receive_pages(struct gssx_arg_accept_sec_context *arg)
213{
214	unsigned int i;
215
216	arg->npages = DIV_ROUND_UP(NGROUPS_MAX * 4, PAGE_SIZE);
217	arg->pages = kcalloc(arg->npages, sizeof(struct page *), GFP_KERNEL);
 
 
 
 
218	if (!arg->pages)
219		return -ENOMEM;
220	for (i = 0; i < arg->npages; i++) {
221		arg->pages[i] = alloc_page(GFP_KERNEL);
222		if (!arg->pages[i]) {
223			gssp_free_receive_pages(arg);
224			return -ENOMEM;
225		}
226	}
227	return 0;
228}
229
230static char *gssp_stringify(struct xdr_netobj *netobj)
231{
232	return kmemdup_nul(netobj->data, netobj->len, GFP_KERNEL);
233}
234
235static void gssp_hostbased_service(char **principal)
236{
237	char *c;
238
239	if (!*principal)
240		return;
241
242	/* terminate and remove realm part */
243	c = strchr(*principal, '@');
244	if (c) {
245		*c = '\0';
246
247		/* change service-hostname delimiter */
248		c = strchr(*principal, '/');
249		if (c)
250			*c = '@';
251	}
252	if (!c) {
253		/* not a service principal */
254		kfree(*principal);
255		*principal = NULL;
256	}
257}
258
259/*
260 * Public functions
261 */
262
263/* numbers somewhat arbitrary but large enough for current needs */
264#define GSSX_MAX_OUT_HANDLE	128
265#define GSSX_MAX_SRC_PRINC	256
266#define GSSX_KMEMBUF (GSSX_max_output_handle_sz + \
267			GSSX_max_oid_sz + \
268			GSSX_max_princ_sz + \
269			sizeof(struct svc_cred))
270
271int gssp_accept_sec_context_upcall(struct net *net,
272				struct gssp_upcall_data *data)
273{
274	struct gssx_ctx ctxh = {
275		.state = data->in_handle
276	};
277	struct gssx_arg_accept_sec_context arg = {
278		.input_token = data->in_token,
279	};
280	struct gssx_ctx rctxh = {
281		/*
282		 * pass in the max length we expect for each of these
283		 * buffers but let the xdr code kmalloc them:
284		 */
285		.exported_context_token.len = GSSX_max_output_handle_sz,
286		.mech.len = GSS_OID_MAX_LEN,
287		.targ_name.display_name.len = GSSX_max_princ_sz,
288		.src_name.display_name.len = GSSX_max_princ_sz
289	};
290	struct gssx_res_accept_sec_context res = {
291		.context_handle = &rctxh,
292		.output_token = &data->out_token
293	};
294	struct rpc_message msg = {
295		.rpc_proc = &gssp_procedures[GSSX_ACCEPT_SEC_CONTEXT],
296		.rpc_argp = &arg,
297		.rpc_resp = &res,
298		.rpc_cred = NULL, /* FIXME ? */
299	};
300	struct xdr_netobj client_name = { 0 , NULL };
301	struct xdr_netobj target_name = { 0, NULL };
302	int ret;
303
304	if (data->in_handle.len != 0)
305		arg.context_handle = &ctxh;
306	res.output_token->len = GSSX_max_output_token_sz;
307
308	ret = gssp_alloc_receive_pages(&arg);
309	if (ret)
310		return ret;
311
 
 
312	ret = gssp_call(net, &msg);
313
314	gssp_free_receive_pages(&arg);
315
316	/* we need to fetch all data even in case of error so
317	 * that we can free special strctures is they have been allocated */
318	data->major_status = res.status.major_status;
319	data->minor_status = res.status.minor_status;
320	if (res.context_handle) {
321		data->out_handle = rctxh.exported_context_token;
322		data->mech_oid.len = rctxh.mech.len;
323		if (rctxh.mech.data) {
324			memcpy(data->mech_oid.data, rctxh.mech.data,
325						data->mech_oid.len);
326			kfree(rctxh.mech.data);
327		}
328		client_name = rctxh.src_name.display_name;
329		target_name = rctxh.targ_name.display_name;
330	}
331
332	if (res.options.count == 1) {
333		gssx_buffer *value = &res.options.data[0].value;
334		/* Currently we only decode CREDS_VALUE, if we add
335		 * anything else we'll have to loop and match on the
336		 * option name */
337		if (value->len == 1) {
338			/* steal group info from struct svc_cred */
339			data->creds = *(struct svc_cred *)value->data;
340			data->found_creds = 1;
341		}
342		/* whether we use it or not, free data */
343		kfree(value->data);
344	}
345
346	if (res.options.count != 0) {
347		kfree(res.options.data);
348	}
349
350	/* convert to GSS_NT_HOSTBASED_SERVICE form and set into creds */
351	if (data->found_creds) {
352		if (client_name.data) {
353			data->creds.cr_raw_principal =
354					gssp_stringify(&client_name);
355			data->creds.cr_principal =
356					gssp_stringify(&client_name);
357			gssp_hostbased_service(&data->creds.cr_principal);
358		}
359		if (target_name.data) {
360			data->creds.cr_targ_princ =
361					gssp_stringify(&target_name);
362			gssp_hostbased_service(&data->creds.cr_targ_princ);
 
 
 
 
 
 
 
 
 
 
 
363		}
364	}
365	kfree(client_name.data);
366	kfree(target_name.data);
367
368	return ret;
369}
370
371void gssp_free_upcall_data(struct gssp_upcall_data *data)
372{
373	kfree(data->in_handle.data);
374	kfree(data->out_handle.data);
375	kfree(data->out_token.data);
376	free_svc_cred(&data->creds);
377}
378
379/*
380 * Initialization stuff
381 */
382static unsigned int gssp_version1_counts[ARRAY_SIZE(gssp_procedures)];
383static const struct rpc_version gssp_version1 = {
384	.number		= GSSPROXY_VERS_1,
385	.nrprocs	= ARRAY_SIZE(gssp_procedures),
386	.procs		= gssp_procedures,
387	.counts		= gssp_version1_counts,
388};
389
390static const struct rpc_version *gssp_version[] = {
391	NULL,
392	&gssp_version1,
393};
394
395static struct rpc_stat gssp_stats;
396
397static const struct rpc_program gssp_program = {
398	.name		= "gssproxy",
399	.number		= GSSPROXY_PROGRAM,
400	.nrvers		= ARRAY_SIZE(gssp_version),
401	.version	= gssp_version,
402	.stats		= &gssp_stats,
403};