hjl / source-git / glibc

Forked from source-git/glibc 3 years ago
Clone

Blame sunrpc/key_call.c

Packit 6c4009
/*
Packit 6c4009
 * Copyright (c) 2010, Oracle America, Inc.
Packit 6c4009
 *
Packit 6c4009
 * Redistribution and use in source and binary forms, with or without
Packit 6c4009
 * modification, are permitted provided that the following conditions are
Packit 6c4009
 * met:
Packit 6c4009
 *
Packit 6c4009
 *     * Redistributions of source code must retain the above copyright
Packit 6c4009
 *       notice, this list of conditions and the following disclaimer.
Packit 6c4009
 *     * Redistributions in binary form must reproduce the above
Packit 6c4009
 *       copyright notice, this list of conditions and the following
Packit 6c4009
 *       disclaimer in the documentation and/or other materials
Packit 6c4009
 *       provided with the distribution.
Packit 6c4009
 *     * Neither the name of the "Oracle America, Inc." nor the names of its
Packit 6c4009
 *       contributors may be used to endorse or promote products derived
Packit 6c4009
 *       from this software without specific prior written permission.
Packit 6c4009
 *
Packit 6c4009
 *   THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
Packit 6c4009
 *   "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
Packit 6c4009
 *   LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
Packit 6c4009
 *   FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
Packit 6c4009
 *   COPYRIGHT HOLDER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT,
Packit 6c4009
 *   INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
Packit 6c4009
 *   DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE
Packit 6c4009
 *   GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
Packit 6c4009
 *   INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
Packit 6c4009
 *   WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING
Packit 6c4009
 *   NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE
Packit 6c4009
 *   OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
Packit 6c4009
 */
Packit 6c4009
/*
Packit 6c4009
 * The original source is from the RPCSRC 4.0 package from Sun Microsystems.
Packit 6c4009
 * The Interface to keyserver protocoll 2, RPC over AF_UNIX and Linux/doors
Packit 6c4009
 * was added by Thorsten Kukuk <kukuk@suse.de>
Packit 6c4009
 * Since the Linux/doors project was stopped, I doubt that this code will
Packit 6c4009
 * ever be useful <kukuk@suse.de>.
Packit 6c4009
 */
Packit 6c4009
Packit 6c4009
#include <stdio.h>
Packit 6c4009
#include <errno.h>
Packit 6c4009
#include <fcntl.h>
Packit 6c4009
#include <signal.h>
Packit 6c4009
#include <unistd.h>
Packit 6c4009
#include <string.h>
Packit 6c4009
#include <rpc/rpc.h>
Packit 6c4009
#include <rpc/auth.h>
Packit 6c4009
#include <sys/wait.h>
Packit 6c4009
#include <sys/param.h>
Packit 6c4009
#include <sys/socket.h>
Packit 6c4009
#include <rpc/key_prot.h>
Packit 6c4009
#include <libc-lock.h>
Packit 6c4009
#include <shlib-compat.h>
Packit 6c4009
Packit 6c4009
#define KEY_TIMEOUT	5	/* per-try timeout in seconds */
Packit 6c4009
#define KEY_NRETRY	12	/* number of retries */
Packit 6c4009
Packit 6c4009
#define debug(msg)		/* turn off debugging */
Packit 6c4009
Packit 6c4009
#ifndef SO_PASSCRED
Packit 6c4009
extern int _openchild (const char *command, FILE **fto, FILE **ffrom);
Packit 6c4009
#endif
Packit 6c4009
Packit 6c4009
static int key_call (u_long, xdrproc_t xdr_arg, char *,
Packit 6c4009
		     xdrproc_t xdr_rslt, char *);
Packit 6c4009
Packit 6c4009
static const struct timeval trytimeout = {KEY_TIMEOUT, 0};
Packit 6c4009
static const struct timeval tottimeout = {KEY_TIMEOUT *KEY_NRETRY, 0};
Packit 6c4009
Packit 6c4009
int
Packit 6c4009
key_setsecret (char *secretkey)
Packit 6c4009
{
Packit 6c4009
  keystatus status;
Packit 6c4009
Packit 6c4009
  if (!key_call ((u_long) KEY_SET, (xdrproc_t) xdr_keybuf, secretkey,
Packit 6c4009
		 (xdrproc_t) xdr_keystatus, (char *) &status))
Packit 6c4009
    return -1;
Packit 6c4009
  if (status != KEY_SUCCESS)
Packit 6c4009
    {
Packit 6c4009
      debug ("set status is nonzero");
Packit 6c4009
      return -1;
Packit 6c4009
    }
Packit 6c4009
  return 0;
Packit 6c4009
}
Packit 6c4009
libc_hidden_nolink_sunrpc (key_setsecret, GLIBC_2_1)
Packit 6c4009
Packit 6c4009
/* key_secretkey_is_set() returns 1 if the keyserver has a secret key
Packit 6c4009
 * stored for the caller's effective uid; it returns 0 otherwise
Packit 6c4009
 *
Packit 6c4009
 * N.B.:  The KEY_NET_GET key call is undocumented.  Applications shouldn't
Packit 6c4009
 * be using it, because it allows them to get the user's secret key.
Packit 6c4009
 */
Packit 6c4009
int
Packit 6c4009
key_secretkey_is_set (void)
Packit 6c4009
{
Packit 6c4009
  struct key_netstres kres;
Packit 6c4009
Packit 6c4009
  memset (&kres, 0, sizeof (kres));
Packit 6c4009
  if (key_call ((u_long) KEY_NET_GET, (xdrproc_t) xdr_void,
Packit 6c4009
		(char *) NULL, (xdrproc_t) xdr_key_netstres,
Packit 6c4009
		(char *) &kres) &&
Packit 6c4009
      (kres.status == KEY_SUCCESS) &&
Packit 6c4009
      (kres.key_netstres_u.knet.st_priv_key[0] != 0))
Packit 6c4009
    {
Packit 6c4009
      /* avoid leaving secret key in memory */
Packit 6c4009
      memset (kres.key_netstres_u.knet.st_priv_key, 0, HEXKEYBYTES);
Packit 6c4009
      return 1;
Packit 6c4009
    }
Packit 6c4009
  return 0;
Packit 6c4009
}
Packit 6c4009
#ifdef EXPORT_RPC_SYMBOLS
Packit 6c4009
libc_hidden_def (key_secretkey_is_set)
Packit 6c4009
#else
Packit 6c4009
libc_hidden_nolink_sunrpc (key_secretkey_is_set, GLIBC_2_1)
Packit 6c4009
#endif
Packit 6c4009
Packit 6c4009
int
Packit 6c4009
key_encryptsession (char *remotename, des_block *deskey)
Packit 6c4009
{
Packit 6c4009
  cryptkeyarg arg;
Packit 6c4009
  cryptkeyres res;
Packit 6c4009
Packit 6c4009
  arg.remotename = remotename;
Packit 6c4009
  arg.deskey = *deskey;
Packit 6c4009
  if (!key_call ((u_long) KEY_ENCRYPT, (xdrproc_t) xdr_cryptkeyarg,
Packit 6c4009
		 (char *) &arg, (xdrproc_t) xdr_cryptkeyres,
Packit 6c4009
		 (char *) &res))
Packit 6c4009
    return -1;
Packit 6c4009
Packit 6c4009
  if (res.status != KEY_SUCCESS)
Packit 6c4009
    {
Packit 6c4009
      debug ("encrypt status is nonzero");
Packit 6c4009
      return -1;
Packit 6c4009
    }
Packit 6c4009
  *deskey = res.cryptkeyres_u.deskey;
Packit 6c4009
  return 0;
Packit 6c4009
}
Packit 6c4009
libc_hidden_nolink_sunrpc (key_encryptsession, GLIBC_2_1)
Packit 6c4009
Packit 6c4009
int
Packit 6c4009
key_decryptsession (char *remotename, des_block *deskey)
Packit 6c4009
{
Packit 6c4009
  cryptkeyarg arg;
Packit 6c4009
  cryptkeyres res;
Packit 6c4009
Packit 6c4009
  arg.remotename = remotename;
Packit 6c4009
  arg.deskey = *deskey;
Packit 6c4009
  if (!key_call ((u_long) KEY_DECRYPT, (xdrproc_t) xdr_cryptkeyarg,
Packit 6c4009
		 (char *) &arg, (xdrproc_t) xdr_cryptkeyres,
Packit 6c4009
		 (char *) &res))
Packit 6c4009
    return -1;
Packit 6c4009
  if (res.status != KEY_SUCCESS)
Packit 6c4009
    {
Packit 6c4009
      debug ("decrypt status is nonzero");
Packit 6c4009
      return -1;
Packit 6c4009
    }
Packit 6c4009
  *deskey = res.cryptkeyres_u.deskey;
Packit 6c4009
  return 0;
Packit 6c4009
}
Packit 6c4009
libc_hidden_nolink_sunrpc (key_decryptsession, GLIBC_2_1)
Packit 6c4009
Packit 6c4009
int
Packit 6c4009
key_encryptsession_pk (char *remotename, netobj *remotekey,
Packit 6c4009
		       des_block *deskey)
Packit 6c4009
{
Packit 6c4009
  cryptkeyarg2 arg;
Packit 6c4009
  cryptkeyres res;
Packit 6c4009
Packit 6c4009
  arg.remotename = remotename;
Packit 6c4009
  arg.remotekey = *remotekey;
Packit 6c4009
  arg.deskey = *deskey;
Packit 6c4009
  if (!key_call ((u_long) KEY_ENCRYPT_PK, (xdrproc_t) xdr_cryptkeyarg2,
Packit 6c4009
		 (char *) &arg, (xdrproc_t) xdr_cryptkeyres,
Packit 6c4009
		 (char *) &res))
Packit 6c4009
    return -1;
Packit 6c4009
Packit 6c4009
  if (res.status != KEY_SUCCESS)
Packit 6c4009
    {
Packit 6c4009
      debug ("encrypt status is nonzero");
Packit 6c4009
      return -1;
Packit 6c4009
    }
Packit 6c4009
  *deskey = res.cryptkeyres_u.deskey;
Packit 6c4009
  return 0;
Packit 6c4009
}
Packit 6c4009
libc_hidden_nolink_sunrpc (key_encryptsession_pk, GLIBC_2_1)
Packit 6c4009
Packit 6c4009
int
Packit 6c4009
key_decryptsession_pk (char *remotename, netobj *remotekey,
Packit 6c4009
		       des_block *deskey)
Packit 6c4009
{
Packit 6c4009
  cryptkeyarg2 arg;
Packit 6c4009
  cryptkeyres res;
Packit 6c4009
Packit 6c4009
  arg.remotename = remotename;
Packit 6c4009
  arg.remotekey = *remotekey;
Packit 6c4009
  arg.deskey = *deskey;
Packit 6c4009
  if (!key_call ((u_long) KEY_DECRYPT_PK, (xdrproc_t) xdr_cryptkeyarg2,
Packit 6c4009
		 (char *) &arg, (xdrproc_t) xdr_cryptkeyres,
Packit 6c4009
		 (char *) &res))
Packit 6c4009
    return -1;
Packit 6c4009
Packit 6c4009
  if (res.status != KEY_SUCCESS)
Packit 6c4009
    {
Packit 6c4009
      debug ("decrypt status is nonzero");
Packit 6c4009
      return -1;
Packit 6c4009
    }
Packit 6c4009
  *deskey = res.cryptkeyres_u.deskey;
Packit 6c4009
  return 0;
Packit 6c4009
}
Packit 6c4009
libc_hidden_nolink_sunrpc (key_decryptsession_pk, GLIBC_2_1)
Packit 6c4009
Packit 6c4009
int
Packit 6c4009
key_gendes (des_block *key)
Packit 6c4009
{
Packit 6c4009
  struct sockaddr_in sin;
Packit 6c4009
  CLIENT *client;
Packit 6c4009
  int socket;
Packit 6c4009
  enum clnt_stat stat;
Packit 6c4009
Packit 6c4009
  sin.sin_family = AF_INET;
Packit 6c4009
  sin.sin_port = 0;
Packit 6c4009
  sin.sin_addr.s_addr = htonl (INADDR_LOOPBACK);
Packit 6c4009
  memset (sin.sin_zero, 0, sizeof (sin.sin_zero));
Packit 6c4009
  socket = RPC_ANYSOCK;
Packit 6c4009
  client = clntudp_bufcreate (&sin, (u_long) KEY_PROG, (u_long) KEY_VERS,
Packit 6c4009
			      trytimeout, &socket, RPCSMALLMSGSIZE,
Packit 6c4009
			      RPCSMALLMSGSIZE);
Packit 6c4009
  if (client == NULL)
Packit 6c4009
    return -1;
Packit 6c4009
Packit 6c4009
  stat = clnt_call (client, KEY_GEN, (xdrproc_t) xdr_void, NULL,
Packit 6c4009
		    (xdrproc_t) xdr_des_block, (caddr_t) key,
Packit 6c4009
		    tottimeout);
Packit 6c4009
  clnt_destroy (client);
Packit 6c4009
  __close (socket);
Packit 6c4009
  if (stat != RPC_SUCCESS)
Packit 6c4009
    return -1;
Packit 6c4009
Packit 6c4009
  return 0;
Packit 6c4009
}
Packit 6c4009
#ifdef EXPORT_RPC_SYMBOLS
Packit 6c4009
libc_hidden_def (key_gendes)
Packit 6c4009
#else
Packit 6c4009
libc_hidden_nolink_sunrpc (key_gendes, GLIBC_2_1)
Packit 6c4009
#endif
Packit 6c4009
Packit 6c4009
int
Packit 6c4009
key_setnet (struct key_netstarg *arg)
Packit 6c4009
{
Packit 6c4009
  keystatus status;
Packit 6c4009
Packit 6c4009
  if (!key_call ((u_long) KEY_NET_PUT, (xdrproc_t) xdr_key_netstarg,
Packit 6c4009
		 (char *) arg,(xdrproc_t) xdr_keystatus,
Packit 6c4009
		 (char *) &status))
Packit 6c4009
    return -1;
Packit 6c4009
Packit 6c4009
  if (status != KEY_SUCCESS)
Packit 6c4009
    {
Packit 6c4009
      debug ("key_setnet status is nonzero");
Packit 6c4009
      return -1;
Packit 6c4009
    }
Packit 6c4009
  return 1;
Packit 6c4009
}
Packit 6c4009
libc_hidden_nolink_sunrpc (key_setnet, GLIBC_2_1)
Packit 6c4009
Packit 6c4009
int
Packit 6c4009
key_get_conv (char *pkey, des_block *deskey)
Packit 6c4009
{
Packit 6c4009
  cryptkeyres res;
Packit 6c4009
Packit 6c4009
  if (!key_call ((u_long) KEY_GET_CONV, (xdrproc_t) xdr_keybuf, pkey,
Packit 6c4009
		 (xdrproc_t) xdr_cryptkeyres, (char *) &res))
Packit 6c4009
    return -1;
Packit 6c4009
Packit 6c4009
  if (res.status != KEY_SUCCESS)
Packit 6c4009
    {
Packit 6c4009
      debug ("get_conv status is nonzero");
Packit 6c4009
      return -1;
Packit 6c4009
    }
Packit 6c4009
  *deskey = res.cryptkeyres_u.deskey;
Packit 6c4009
  return 0;
Packit 6c4009
}
Packit 6c4009
libc_hidden_nolink_sunrpc (key_get_conv, GLIBC_2_1)
Packit 6c4009
Packit 6c4009
/*
Packit 6c4009
 * Hack to allow the keyserver to use AUTH_DES (for authenticated
Packit 6c4009
 * NIS+ calls, for example).  The only functions that get called
Packit 6c4009
 * are key_encryptsession_pk, key_decryptsession_pk, and key_gendes.
Packit 6c4009
 *
Packit 6c4009
 * The approach is to have the keyserver fill in pointers to local
Packit 6c4009
 * implementations of these functions, and to call those in key_call().
Packit 6c4009
 */
Packit 6c4009
Packit 6c4009
cryptkeyres *(*__key_encryptsession_pk_LOCAL) (uid_t, char *);
Packit 6c4009
cryptkeyres *(*__key_decryptsession_pk_LOCAL) (uid_t, char *);
Packit 6c4009
des_block *(*__key_gendes_LOCAL) (uid_t, char *);
Packit 6c4009
Packit 6c4009
#ifndef SO_PASSCRED
Packit 6c4009
static int
Packit 6c4009
key_call_keyenvoy (u_long proc, xdrproc_t xdr_arg, char *arg,
Packit 6c4009
		   xdrproc_t xdr_rslt, char *rslt)
Packit 6c4009
{
Packit 6c4009
  XDR xdrargs;
Packit 6c4009
  XDR xdrrslt;
Packit 6c4009
  FILE *fargs;
Packit 6c4009
  FILE *frslt;
Packit 6c4009
  sigset_t oldmask, mask;
Packit 6c4009
  int status;
Packit 6c4009
  int pid;
Packit 6c4009
  int success;
Packit 6c4009
  uid_t ruid;
Packit 6c4009
  uid_t euid;
Packit 6c4009
  static const char MESSENGER[] = "/usr/etc/keyenvoy";
Packit 6c4009
Packit 6c4009
  success = 1;
Packit 6c4009
  sigemptyset (&mask);
Packit 6c4009
  sigaddset (&mask, SIGCHLD);
Packit 6c4009
  __sigprocmask (SIG_BLOCK, &mask, &oldmask);
Packit 6c4009
Packit 6c4009
  /*
Packit 6c4009
   * We are going to exec a set-uid program which makes our effective uid
Packit 6c4009
   * zero, and authenticates us with our real uid. We need to make the
Packit 6c4009
   * effective uid be the real uid for the setuid program, and
Packit 6c4009
   * the real uid be the effective uid so that we can change things back.
Packit 6c4009
   */
Packit 6c4009
  euid = __geteuid ();
Packit 6c4009
  ruid = __getuid ();
Packit 6c4009
  __setreuid (euid, ruid);
Packit 6c4009
  pid = _openchild (MESSENGER, &fargs, &frslt);
Packit 6c4009
  __setreuid (ruid, euid);
Packit 6c4009
  if (pid < 0)
Packit 6c4009
    {
Packit 6c4009
      debug ("open_streams");
Packit 6c4009
      __sigprocmask (SIG_SETMASK, &oldmask, NULL);
Packit 6c4009
      return (0);
Packit 6c4009
    }
Packit 6c4009
  xdrstdio_create (&xdrargs, fargs, XDR_ENCODE);
Packit 6c4009
  xdrstdio_create (&xdrrslt, frslt, XDR_DECODE);
Packit 6c4009
Packit 6c4009
  if (!xdr_u_long (&xdrargs, &proc) || !(*xdr_arg) (&xdrargs, arg))
Packit 6c4009
    {
Packit 6c4009
      debug ("xdr args");
Packit 6c4009
      success = 0;
Packit 6c4009
    }
Packit 6c4009
  fclose (fargs);
Packit 6c4009
Packit 6c4009
  if (success && !(*xdr_rslt) (&xdrrslt, rslt))
Packit 6c4009
    {
Packit 6c4009
      debug ("xdr rslt");
Packit 6c4009
      success = 0;
Packit 6c4009
    }
Packit 6c4009
  fclose(frslt);
Packit 6c4009
Packit 6c4009
 wait_again:
Packit 6c4009
  if (__wait4 (pid, &status, 0, NULL) < 0)
Packit 6c4009
    {
Packit 6c4009
      if (errno == EINTR)
Packit 6c4009
	goto wait_again;
Packit 6c4009
      debug ("wait4");
Packit 6c4009
      if (errno == ECHILD || errno == ESRCH)
Packit 6c4009
	perror ("wait");
Packit 6c4009
      else
Packit 6c4009
	success = 0;
Packit 6c4009
    }
Packit 6c4009
  else
Packit 6c4009
    if (status != 0)
Packit 6c4009
      {
Packit 6c4009
	debug ("wait4 1");
Packit 6c4009
	success = 0;
Packit 6c4009
      }
Packit 6c4009
  __sigprocmask (SIG_SETMASK, &oldmask, NULL);
Packit 6c4009
Packit 6c4009
  return success;
Packit 6c4009
}
Packit 6c4009
#endif
Packit 6c4009
Packit 6c4009
struct  key_call_private {
Packit 6c4009
  CLIENT  *client;        /* Client handle */
Packit 6c4009
  pid_t   pid;            /* process-id at moment of creation */
Packit 6c4009
  uid_t   uid;            /* user-id at last authorization */
Packit 6c4009
};
Packit 6c4009
#define key_call_private_main RPC_THREAD_VARIABLE(key_call_private_s)
Packit 6c4009
__libc_lock_define_initialized (static, keycall_lock)
Packit 6c4009
Packit 6c4009
/*
Packit 6c4009
 * Keep the handle cached.  This call may be made quite often.
Packit 6c4009
 */
Packit 6c4009
static CLIENT *
Packit 6c4009
getkeyserv_handle (int vers)
Packit 6c4009
{
Packit 6c4009
  struct key_call_private *kcp = key_call_private_main;
Packit 6c4009
  struct timeval wait_time;
Packit 6c4009
  int fd;
Packit 6c4009
  struct sockaddr_un name;
Packit 6c4009
  socklen_t namelen = sizeof(struct sockaddr_un);
Packit 6c4009
Packit 6c4009
#define TOTAL_TIMEOUT   30      /* total timeout talking to keyserver */
Packit 6c4009
#define TOTAL_TRIES     5       /* Number of tries */
Packit 6c4009
Packit 6c4009
  if (kcp == (struct key_call_private *)NULL)
Packit 6c4009
    {
Packit 6c4009
      kcp = (struct key_call_private *)malloc (sizeof (*kcp));
Packit 6c4009
      if (kcp == (struct key_call_private *)NULL)
Packit 6c4009
	return (CLIENT *) NULL;
Packit 6c4009
Packit 6c4009
      key_call_private_main = kcp;
Packit 6c4009
      kcp->client = NULL;
Packit 6c4009
    }
Packit 6c4009
Packit 6c4009
  /* if pid has changed, destroy client and rebuild */
Packit 6c4009
  if (kcp->client != NULL && kcp->pid != __getpid ())
Packit 6c4009
    {
Packit 6c4009
      auth_destroy (kcp->client->cl_auth);
Packit 6c4009
      clnt_destroy (kcp->client);
Packit 6c4009
      kcp->client = NULL;
Packit 6c4009
    }
Packit 6c4009
Packit 6c4009
  if (kcp->client != NULL)
Packit 6c4009
    {
Packit 6c4009
      /* if other side closed socket, build handle again */
Packit 6c4009
      clnt_control (kcp->client, CLGET_FD, (char *)&fd;;
Packit 6c4009
      if (__getpeername (fd,(struct sockaddr *)&name,&namelen) == -1)
Packit 6c4009
	{
Packit 6c4009
	  auth_destroy (kcp->client->cl_auth);
Packit 6c4009
	  clnt_destroy (kcp->client);
Packit 6c4009
	  kcp->client = NULL;
Packit 6c4009
	}
Packit 6c4009
    }
Packit 6c4009
Packit 6c4009
  if (kcp->client != NULL)
Packit 6c4009
    {
Packit 6c4009
      /* if uid has changed, build client handle again */
Packit 6c4009
      if (kcp->uid != __geteuid ())
Packit 6c4009
	{
Packit 6c4009
	kcp->uid = __geteuid ();
Packit 6c4009
	auth_destroy (kcp->client->cl_auth);
Packit 6c4009
	kcp->client->cl_auth =
Packit 6c4009
	  authunix_create ((char *)"", kcp->uid, 0, 0, NULL);
Packit 6c4009
	if (kcp->client->cl_auth == NULL)
Packit 6c4009
	  {
Packit 6c4009
	    clnt_destroy (kcp->client);
Packit 6c4009
	    kcp->client = NULL;
Packit 6c4009
	    return ((CLIENT *) NULL);
Packit 6c4009
	  }
Packit 6c4009
	}
Packit 6c4009
      /* Change the version number to the new one */
Packit 6c4009
      clnt_control (kcp->client, CLSET_VERS, (void *)&vers;;
Packit 6c4009
      return kcp->client;
Packit 6c4009
    }
Packit 6c4009
Packit 6c4009
  if ((kcp->client == (CLIENT *) NULL))
Packit 6c4009
    /* Use the AF_UNIX transport */
Packit 6c4009
    kcp->client = clnt_create ("/var/run/keyservsock", KEY_PROG, vers, "unix");
Packit 6c4009
Packit 6c4009
  if (kcp->client == (CLIENT *) NULL)
Packit 6c4009
    return (CLIENT *) NULL;
Packit 6c4009
Packit 6c4009
  kcp->uid = __geteuid ();
Packit 6c4009
  kcp->pid = __getpid ();
Packit 6c4009
  kcp->client->cl_auth = authunix_create ((char *)"", kcp->uid, 0, 0, NULL);
Packit 6c4009
  if (kcp->client->cl_auth == NULL)
Packit 6c4009
    {
Packit 6c4009
      clnt_destroy (kcp->client);
Packit 6c4009
      kcp->client = NULL;
Packit 6c4009
      return (CLIENT *) NULL;
Packit 6c4009
    }
Packit 6c4009
Packit 6c4009
  wait_time.tv_sec = TOTAL_TIMEOUT/TOTAL_TRIES;
Packit 6c4009
  wait_time.tv_usec = 0;
Packit 6c4009
  clnt_control (kcp->client, CLSET_RETRY_TIMEOUT,
Packit 6c4009
		(char *)&wait_time);
Packit 6c4009
  if (clnt_control (kcp->client, CLGET_FD, (char *)&fd))
Packit 6c4009
    __fcntl (fd, F_SETFD, FD_CLOEXEC);  /* make it "close on exec" */
Packit 6c4009
Packit 6c4009
  return kcp->client;
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
/* returns  0 on failure, 1 on success */
Packit 6c4009
static int
Packit 6c4009
key_call_socket (u_long proc, xdrproc_t xdr_arg, char *arg,
Packit 6c4009
	       xdrproc_t xdr_rslt, char *rslt)
Packit 6c4009
{
Packit 6c4009
  CLIENT *clnt;
Packit 6c4009
  struct timeval wait_time;
Packit 6c4009
  int result = 0;
Packit 6c4009
Packit 6c4009
  __libc_lock_lock (keycall_lock);
Packit 6c4009
  if ((proc == KEY_ENCRYPT_PK) || (proc == KEY_DECRYPT_PK) ||
Packit 6c4009
      (proc == KEY_NET_GET) || (proc == KEY_NET_PUT) ||
Packit 6c4009
      (proc == KEY_GET_CONV))
Packit 6c4009
    clnt = getkeyserv_handle(2); /* talk to version 2 */
Packit 6c4009
  else
Packit 6c4009
    clnt = getkeyserv_handle(1); /* talk to version 1 */
Packit 6c4009
Packit 6c4009
  if (clnt != NULL)
Packit 6c4009
    {
Packit 6c4009
      wait_time.tv_sec = TOTAL_TIMEOUT;
Packit 6c4009
      wait_time.tv_usec = 0;
Packit 6c4009
Packit 6c4009
      if (clnt_call (clnt, proc, xdr_arg, arg, xdr_rslt, rslt,
Packit 6c4009
		     wait_time) == RPC_SUCCESS)
Packit 6c4009
	result = 1;
Packit 6c4009
    }
Packit 6c4009
Packit 6c4009
  __libc_lock_unlock (keycall_lock);
Packit 6c4009
Packit 6c4009
  return result;
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
Packit 6c4009
/* returns 0 on failure, 1 on success */
Packit 6c4009
static int
Packit 6c4009
key_call (u_long proc, xdrproc_t xdr_arg, char *arg,
Packit 6c4009
	  xdrproc_t xdr_rslt, char *rslt)
Packit 6c4009
{
Packit 6c4009
#ifndef SO_PASSCRED
Packit 6c4009
  static int use_keyenvoy;
Packit 6c4009
#endif
Packit 6c4009
Packit 6c4009
  if (proc == KEY_ENCRYPT_PK && __key_encryptsession_pk_LOCAL)
Packit 6c4009
    {
Packit 6c4009
      cryptkeyres *res;
Packit 6c4009
      res = (*__key_encryptsession_pk_LOCAL) (__geteuid (), arg);
Packit 6c4009
      *(cryptkeyres *) rslt = *res;
Packit 6c4009
      return 1;
Packit 6c4009
    }
Packit 6c4009
  else if (proc == KEY_DECRYPT_PK && __key_decryptsession_pk_LOCAL)
Packit 6c4009
    {
Packit 6c4009
      cryptkeyres *res;
Packit 6c4009
      res = (*__key_decryptsession_pk_LOCAL) (__geteuid (), arg);
Packit 6c4009
      *(cryptkeyres *) rslt = *res;
Packit 6c4009
      return 1;
Packit 6c4009
    }
Packit 6c4009
  else if (proc == KEY_GEN && __key_gendes_LOCAL)
Packit 6c4009
    {
Packit 6c4009
      des_block *res;
Packit 6c4009
      res = (*__key_gendes_LOCAL) (__geteuid (), 0);
Packit 6c4009
      *(des_block *) rslt = *res;
Packit 6c4009
      return 1;
Packit 6c4009
    }
Packit 6c4009
Packit 6c4009
#ifdef SO_PASSCRED
Packit 6c4009
  return key_call_socket (proc, xdr_arg, arg, xdr_rslt, rslt);
Packit 6c4009
#else
Packit 6c4009
  if (!use_keyenvoy)
Packit 6c4009
    {
Packit 6c4009
      if (key_call_socket (proc, xdr_arg, arg, xdr_rslt, rslt))
Packit 6c4009
	return 1;
Packit 6c4009
      use_keyenvoy = 1;
Packit 6c4009
    }
Packit 6c4009
  return key_call_keyenvoy (proc, xdr_arg, arg, xdr_rslt, rslt);
Packit 6c4009
#endif
Packit 6c4009
}
Packit 6c4009
Packit 6c4009
void
Packit 6c4009
__rpc_thread_key_cleanup (void)
Packit 6c4009
{
Packit 6c4009
	struct key_call_private *kcp = RPC_THREAD_VARIABLE(key_call_private_s);
Packit 6c4009
Packit 6c4009
	if (kcp) {
Packit 6c4009
		if (kcp->client) {
Packit 6c4009
			if (kcp->client->cl_auth)
Packit 6c4009
				auth_destroy (kcp->client->cl_auth);
Packit 6c4009
			clnt_destroy(kcp->client);
Packit 6c4009
		}
Packit 6c4009
		free (kcp);
Packit 6c4009
	}
Packit 6c4009
}