Blame view

kernel/linux-rt-4.4.41/include/linux/sunrpc/auth_gss.h 2.27 KB
5113f6f70   김현기   kernel add
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
  /*
   * linux/include/linux/sunrpc/auth_gss.h
   *
   * Declarations for RPCSEC_GSS
   *
   * Dug Song <dugsong@monkey.org>
   * Andy Adamson <andros@umich.edu>
   * Bruce Fields <bfields@umich.edu>
   * Copyright (c) 2000 The Regents of the University of Michigan
   */
  
  #ifndef _LINUX_SUNRPC_AUTH_GSS_H
  #define _LINUX_SUNRPC_AUTH_GSS_H
  
  #ifdef __KERNEL__
  #include <linux/sunrpc/auth.h>
  #include <linux/sunrpc/svc.h>
  #include <linux/sunrpc/gss_api.h>
  
  #define RPC_GSS_VERSION		1
  
  #define MAXSEQ 0x80000000 /* maximum legal sequence number, from rfc 2203 */
  
  enum rpc_gss_proc {
  	RPC_GSS_PROC_DATA = 0,
  	RPC_GSS_PROC_INIT = 1,
  	RPC_GSS_PROC_CONTINUE_INIT = 2,
  	RPC_GSS_PROC_DESTROY = 3
  };
  
  enum rpc_gss_svc {
  	RPC_GSS_SVC_NONE = 1,
  	RPC_GSS_SVC_INTEGRITY = 2,
  	RPC_GSS_SVC_PRIVACY = 3
  };
  
  /* on-the-wire gss cred: */
  struct rpc_gss_wire_cred {
  	u32			gc_v;		/* version */
  	u32			gc_proc;	/* control procedure */
  	u32			gc_seq;		/* sequence number */
  	u32			gc_svc;		/* service */
  	struct xdr_netobj	gc_ctx;		/* context handle */
  };
  
  /* on-the-wire gss verifier: */
  struct rpc_gss_wire_verf {
  	u32			gv_flavor;
  	struct xdr_netobj	gv_verf;
  };
  
  /* return from gss NULL PROC init sec context */
  struct rpc_gss_init_res {
  	struct xdr_netobj	gr_ctx;		/* context handle */
  	u32			gr_major;	/* major status */
  	u32			gr_minor;	/* minor status */
  	u32			gr_win;		/* sequence window */
  	struct xdr_netobj	gr_token;	/* token */
  };
  
  /* The gss_cl_ctx struct holds all the information the rpcsec_gss client
   * code needs to know about a single security context.  In particular,
   * gc_gss_ctx is the context handle that is used to do gss-api calls, while
   * gc_wire_ctx is the context handle that is used to identify the context on
   * the wire when communicating with a server. */
  
  struct gss_cl_ctx {
  	atomic_t		count;
  	enum rpc_gss_proc	gc_proc;
  	u32			gc_seq;
  	spinlock_t		gc_seq_lock;
  	struct gss_ctx		*gc_gss_ctx;
  	struct xdr_netobj	gc_wire_ctx;
  	struct xdr_netobj	gc_acceptor;
  	u32			gc_win;
  	unsigned long		gc_expiry;
  	struct rcu_head		gc_rcu;
  };
  
  struct gss_upcall_msg;
  struct gss_cred {
  	struct rpc_cred		gc_base;
  	enum rpc_gss_svc	gc_service;
  	struct gss_cl_ctx __rcu	*gc_ctx;
  	struct gss_upcall_msg	*gc_upcall;
  	const char		*gc_principal;
  	unsigned long		gc_upcall_timestamp;
  };
  
  #endif /* __KERNEL__ */
  #endif /* _LINUX_SUNRPC_AUTH_GSS_H */