Linux Audio

Check our new training course

Loading...
v5.9
  1/* SPDX-License-Identifier: GPL-2.0-or-later */
  2/* RxRPC key type
  3 *
  4 * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
  5 * Written by David Howells (dhowells@redhat.com)
  6 */
  7
  8#ifndef _KEYS_RXRPC_TYPE_H
  9#define _KEYS_RXRPC_TYPE_H
 10
 11#include <linux/key.h>
 12
 13/*
 14 * key type for AF_RXRPC keys
 15 */
 16extern struct key_type key_type_rxrpc;
 17
 18extern struct key *rxrpc_get_null_key(const char *);
 19
 20/*
 21 * RxRPC key for Kerberos IV (type-2 security)
 22 */
 23struct rxkad_key {
 24	u32	vice_id;
 25	u32	start;			/* time at which ticket starts */
 26	u32	expiry;			/* time at which ticket expires */
 27	u32	kvno;			/* key version number */
 28	u8	primary_flag;		/* T if key for primary cell for this user */
 29	u16	ticket_len;		/* length of ticket[] */
 30	u8	session_key[8];		/* DES session key */
 31	u8	ticket[];		/* the encrypted ticket */
 32};
 33
 34/*
 35 * Kerberos 5 principal
 36 *	name/name/name@realm
 37 */
 38struct krb5_principal {
 39	u8	n_name_parts;		/* N of parts of the name part of the principal */
 40	char	**name_parts;		/* parts of the name part of the principal */
 41	char	*realm;			/* parts of the realm part of the principal */
 42};
 43
 44/*
 45 * Kerberos 5 tagged data
 46 */
 47struct krb5_tagged_data {
 48	/* for tag value, see /usr/include/krb5/krb5.h
 49	 * - KRB5_AUTHDATA_* for auth data
 50	 * -
 51	 */
 52	s32		tag;
 53	u32		data_len;
 54	u8		*data;
 55};
 56
 57/*
 58 * RxRPC key for Kerberos V (type-5 security)
 59 */
 60struct rxk5_key {
 61	u64			authtime;	/* time at which auth token generated */
 62	u64			starttime;	/* time at which auth token starts */
 63	u64			endtime;	/* time at which auth token expired */
 64	u64			renew_till;	/* time to which auth token can be renewed */
 65	s32			is_skey;	/* T if ticket is encrypted in another ticket's
 66						 * skey */
 67	s32			flags;		/* mask of TKT_FLG_* bits (krb5/krb5.h) */
 68	struct krb5_principal	client;		/* client principal name */
 69	struct krb5_principal	server;		/* server principal name */
 70	u16			ticket_len;	/* length of ticket */
 71	u16			ticket2_len;	/* length of second ticket */
 72	u8			n_authdata;	/* number of authorisation data elements */
 73	u8			n_addresses;	/* number of addresses */
 74	struct krb5_tagged_data	session;	/* session data; tag is enctype */
 75	struct krb5_tagged_data *addresses;	/* addresses */
 76	u8			*ticket;	/* krb5 ticket */
 77	u8			*ticket2;	/* second krb5 ticket, if related to ticket (via
 78						 * DUPLICATE-SKEY or ENC-TKT-IN-SKEY) */
 79	struct krb5_tagged_data *authdata;	/* authorisation data */
 80};
 81
 82/*
 83 * list of tokens attached to an rxrpc key
 84 */
 85struct rxrpc_key_token {
 86	u16	security_index;		/* RxRPC header security index */
 
 87	struct rxrpc_key_token *next;	/* the next token in the list */
 88	union {
 89		struct rxkad_key *kad;
 90		struct rxk5_key *k5;
 91	};
 92};
 93
 94/*
 95 * structure of raw payloads passed to add_key() or instantiate key
 96 */
 97struct rxrpc_key_data_v1 {
 98	u16		security_index;
 99	u16		ticket_length;
100	u32		expiry;			/* time_t */
101	u32		kvno;
102	u8		session_key[8];
103	u8		ticket[];
104};
105
106/*
107 * AF_RXRPC key payload derived from XDR format
108 * - based on openafs-1.4.10/src/auth/afs_token.xg
109 */
110#define AFSTOKEN_LENGTH_MAX		16384	/* max payload size */
111#define AFSTOKEN_STRING_MAX		256	/* max small string length */
112#define AFSTOKEN_DATA_MAX		64	/* max small data length */
113#define AFSTOKEN_CELL_MAX		64	/* max cellname length */
114#define AFSTOKEN_MAX			8	/* max tokens per payload */
115#define AFSTOKEN_BDATALN_MAX		16384	/* max big data length */
116#define AFSTOKEN_RK_TIX_MAX		12000	/* max RxKAD ticket size */
117#define AFSTOKEN_GK_KEY_MAX		64	/* max GSSAPI key size */
118#define AFSTOKEN_GK_TOKEN_MAX		16384	/* max GSSAPI token size */
119#define AFSTOKEN_K5_COMPONENTS_MAX	16	/* max K5 components */
120#define AFSTOKEN_K5_NAME_MAX		128	/* max K5 name length */
121#define AFSTOKEN_K5_REALM_MAX		64	/* max K5 realm name length */
122#define AFSTOKEN_K5_TIX_MAX		16384	/* max K5 ticket size */
123#define AFSTOKEN_K5_ADDRESSES_MAX	16	/* max K5 addresses */
124#define AFSTOKEN_K5_AUTHDATA_MAX	16	/* max K5 pieces of auth data */
125
126/*
127 * Truncate a time64_t to the range from 1970 to 2106 as in the network
128 * protocol.
129 */
130static inline u32 rxrpc_time64_to_u32(time64_t time)
131{
132	if (time < 0)
133		return 0;
134
135	if (time > UINT_MAX)
136		return UINT_MAX;
137
138	return (u32)time;
139}
140
141/*
142 * Extend u32 back to time64_t using the same 1970-2106 range.
143 */
144static inline time64_t rxrpc_u32_to_time64(u32 time)
145{
146	return (time64_t)time;
147}
148
149#endif /* _KEYS_RXRPC_TYPE_H */
v6.13.7
 1/* SPDX-License-Identifier: GPL-2.0-or-later */
 2/* RxRPC key type
 3 *
 4 * Copyright (C) 2007 Red Hat, Inc. All Rights Reserved.
 5 * Written by David Howells (dhowells@redhat.com)
 6 */
 7
 8#ifndef _KEYS_RXRPC_TYPE_H
 9#define _KEYS_RXRPC_TYPE_H
10
11#include <linux/key.h>
12
13/*
14 * key type for AF_RXRPC keys
15 */
16extern struct key_type key_type_rxrpc;
17
18extern struct key *rxrpc_get_null_key(const char *);
19
20/*
21 * RxRPC key for Kerberos IV (type-2 security)
22 */
23struct rxkad_key {
24	u32	vice_id;
25	u32	start;			/* time at which ticket starts */
26	u32	expiry;			/* time at which ticket expires */
27	u32	kvno;			/* key version number */
28	u8	primary_flag;		/* T if key for primary cell for this user */
29	u16	ticket_len;		/* length of ticket[] */
30	u8	session_key[8];		/* DES session key */
31	u8	ticket[];		/* the encrypted ticket */
32};
33
34/*
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
35 * list of tokens attached to an rxrpc key
36 */
37struct rxrpc_key_token {
38	u16	security_index;		/* RxRPC header security index */
39	bool	no_leak_key;		/* Don't copy the key to userspace */
40	struct rxrpc_key_token *next;	/* the next token in the list */
41	union {
42		struct rxkad_key *kad;
 
43	};
44};
45
46/*
47 * structure of raw payloads passed to add_key() or instantiate key
48 */
49struct rxrpc_key_data_v1 {
50	u16		security_index;
51	u16		ticket_length;
52	u32		expiry;			/* time_t */
53	u32		kvno;
54	u8		session_key[8];
55	u8		ticket[];
56};
57
58/*
59 * AF_RXRPC key payload derived from XDR format
60 * - based on openafs-1.4.10/src/auth/afs_token.xg
61 */
62#define AFSTOKEN_LENGTH_MAX		16384	/* max payload size */
63#define AFSTOKEN_STRING_MAX		256	/* max small string length */
64#define AFSTOKEN_DATA_MAX		64	/* max small data length */
65#define AFSTOKEN_CELL_MAX		64	/* max cellname length */
66#define AFSTOKEN_MAX			8	/* max tokens per payload */
67#define AFSTOKEN_BDATALN_MAX		16384	/* max big data length */
68#define AFSTOKEN_RK_TIX_MAX		12000	/* max RxKAD ticket size */
69#define AFSTOKEN_GK_KEY_MAX		64	/* max GSSAPI key size */
70#define AFSTOKEN_GK_TOKEN_MAX		16384	/* max GSSAPI token size */
 
 
 
 
 
 
71
72/*
73 * Truncate a time64_t to the range from 1970 to 2106 as in the network
74 * protocol.
75 */
76static inline u32 rxrpc_time64_to_u32(time64_t time)
77{
78	if (time < 0)
79		return 0;
80
81	if (time > UINT_MAX)
82		return UINT_MAX;
83
84	return (u32)time;
85}
86
87/*
88 * Extend u32 back to time64_t using the same 1970-2106 range.
89 */
90static inline time64_t rxrpc_u32_to_time64(u32 time)
91{
92	return (time64_t)time;
93}
94
95#endif /* _KEYS_RXRPC_TYPE_H */