1*467adba8Smiod /* $OpenBSD: rpc.c,v 1.15 2015/08/15 19:42:56 miod Exp $ */
279dbd5ceSniklas /* $NetBSD: rpc.c,v 1.16 1996/10/13 02:29:06 christos Exp $ */
3df930be7Sderaadt
4df930be7Sderaadt /*
5df930be7Sderaadt * Copyright (c) 1992 Regents of the University of California.
6df930be7Sderaadt * All rights reserved.
7df930be7Sderaadt *
8df930be7Sderaadt * This software was developed by the Computer Systems Engineering group
9df930be7Sderaadt * at Lawrence Berkeley Laboratory under DARPA contract BG 91-66 and
10df930be7Sderaadt * contributed to Berkeley.
11df930be7Sderaadt *
12df930be7Sderaadt * Redistribution and use in source and binary forms, with or without
13df930be7Sderaadt * modification, are permitted provided that the following conditions
14df930be7Sderaadt * are met:
15df930be7Sderaadt * 1. Redistributions of source code must retain the above copyright
16df930be7Sderaadt * notice, this list of conditions and the following disclaimer.
17df930be7Sderaadt * 2. Redistributions in binary form must reproduce the above copyright
18df930be7Sderaadt * notice, this list of conditions and the following disclaimer in the
19df930be7Sderaadt * documentation and/or other materials provided with the distribution.
20df930be7Sderaadt * 3. All advertising materials mentioning features or use of this software
21df930be7Sderaadt * must display the following acknowledgement:
22df930be7Sderaadt * This product includes software developed by the University of
23df930be7Sderaadt * California, Lawrence Berkeley Laboratory and its contributors.
24df930be7Sderaadt * 4. Neither the name of the University nor the names of its contributors
25df930be7Sderaadt * may be used to endorse or promote products derived from this software
26df930be7Sderaadt * without specific prior written permission.
27df930be7Sderaadt *
28df930be7Sderaadt * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
29df930be7Sderaadt * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
30df930be7Sderaadt * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
31df930be7Sderaadt * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
32df930be7Sderaadt * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
33df930be7Sderaadt * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
34df930be7Sderaadt * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
35df930be7Sderaadt * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
36df930be7Sderaadt * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
37df930be7Sderaadt * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
38df930be7Sderaadt * SUCH DAMAGE.
39df930be7Sderaadt *
40df930be7Sderaadt * @(#) Header: rpc.c,v 1.12 93/09/28 08:31:56 leres Exp (LBL)
41df930be7Sderaadt */
42df930be7Sderaadt
43df930be7Sderaadt /*
44df930be7Sderaadt * RPC functions used by NFS and bootparams.
45df930be7Sderaadt * Note that bootparams requires the ability to find out the
46df930be7Sderaadt * address of the server from which its response has come.
47df930be7Sderaadt * This is supported by keeping the IP/UDP headers in the
48df930be7Sderaadt * buffer space provided by the caller. (See rpc_fromaddr)
49df930be7Sderaadt */
50df930be7Sderaadt
51df930be7Sderaadt #include <sys/param.h>
52df930be7Sderaadt #include <sys/socket.h>
53df930be7Sderaadt
54df930be7Sderaadt #include <netinet/in.h>
55df930be7Sderaadt
565feffa41Smickey #include <nfs/rpcv2.h>
570c0430f8Sniklas
58df930be7Sderaadt #include "stand.h"
59df930be7Sderaadt #include "net.h"
60df930be7Sderaadt #include "netif.h"
61df930be7Sderaadt #include "rpc.h"
62df930be7Sderaadt
63df930be7Sderaadt struct auth_info {
64df930be7Sderaadt int32_t authtype; /* auth type */
65df930be7Sderaadt u_int32_t authlen; /* auth length */
66df930be7Sderaadt };
67df930be7Sderaadt
68df930be7Sderaadt struct auth_unix {
69df930be7Sderaadt int32_t ua_time;
70df930be7Sderaadt int32_t ua_hostname; /* null */
71df930be7Sderaadt int32_t ua_uid;
72df930be7Sderaadt int32_t ua_gid;
73df930be7Sderaadt int32_t ua_gidlist; /* null */
74df930be7Sderaadt };
75df930be7Sderaadt
76df930be7Sderaadt struct rpc_call {
77df930be7Sderaadt u_int32_t rp_xid; /* request transaction id */
78df930be7Sderaadt int32_t rp_direction; /* call direction (0) */
79df930be7Sderaadt u_int32_t rp_rpcvers; /* rpc version (2) */
80df930be7Sderaadt u_int32_t rp_prog; /* program */
81df930be7Sderaadt u_int32_t rp_vers; /* version */
82df930be7Sderaadt u_int32_t rp_proc; /* procedure */
83df930be7Sderaadt };
84df930be7Sderaadt
85df930be7Sderaadt struct rpc_reply {
86df930be7Sderaadt u_int32_t rp_xid; /* request transaction id */
87df930be7Sderaadt int32_t rp_direction; /* call direction (1) */
88df930be7Sderaadt int32_t rp_astatus; /* accept status (0: accepted) */
89df930be7Sderaadt union {
90df930be7Sderaadt u_int32_t rpu_errno;
91df930be7Sderaadt struct {
92df930be7Sderaadt struct auth_info rok_auth;
93df930be7Sderaadt u_int32_t rok_status;
94df930be7Sderaadt } rpu_rok;
95df930be7Sderaadt } rp_u;
96df930be7Sderaadt };
97df930be7Sderaadt
98df930be7Sderaadt /* Local forwards */
99c4071fd1Smillert static ssize_t recvrpc(struct iodesc *, void *, size_t, time_t);
100eb76c208Smpi static int rpc_getport(struct iodesc *, u_int32_t, u_int32_t);
101df930be7Sderaadt
102df930be7Sderaadt int rpc_xid;
103df930be7Sderaadt int rpc_port = 0x400; /* predecrement */
104df930be7Sderaadt
105df930be7Sderaadt /*
106df930be7Sderaadt * Make a rpc call; return length of answer
107df930be7Sderaadt * Note: Caller must leave room for headers.
108df930be7Sderaadt */
109df930be7Sderaadt ssize_t
rpc_call(struct iodesc * d,u_int32_t prog,u_int32_t vers,u_int32_t proc,void * sdata,size_t slen,void * rdata,size_t rlen)110eb76c208Smpi rpc_call(struct iodesc *d, u_int32_t prog, u_int32_t vers, u_int32_t proc, void *sdata,
111599546b3Sderaadt size_t slen, void *rdata, size_t rlen)
112df930be7Sderaadt {
113599546b3Sderaadt ssize_t cc;
114df930be7Sderaadt struct auth_info *auth;
115df930be7Sderaadt struct rpc_call *call;
116df930be7Sderaadt struct rpc_reply *reply;
117df930be7Sderaadt char *send_head, *send_tail;
118df930be7Sderaadt char *recv_head, *recv_tail;
119eb76c208Smpi u_int32_t x;
120df930be7Sderaadt int port; /* host order */
121df930be7Sderaadt
122df930be7Sderaadt #ifdef RPC_DEBUG
123df930be7Sderaadt if (debug)
124df930be7Sderaadt printf("rpc_call: prog=0x%x vers=%d proc=%d\n",
125df930be7Sderaadt prog, vers, proc);
126df930be7Sderaadt #endif
127df930be7Sderaadt
128df930be7Sderaadt port = rpc_getport(d, prog, vers);
129df930be7Sderaadt if (port == -1)
130df930be7Sderaadt return (-1);
131df930be7Sderaadt
132df930be7Sderaadt d->destport = htons(port);
133df930be7Sderaadt
134df930be7Sderaadt /*
135df930be7Sderaadt * Prepend authorization stuff and headers.
136df930be7Sderaadt * Note, must prepend things in reverse order.
137df930be7Sderaadt */
138df930be7Sderaadt send_head = sdata;
139df930be7Sderaadt send_tail = (char *)sdata + slen;
140df930be7Sderaadt
141df930be7Sderaadt /* Auth verifier is always auth_null */
142df930be7Sderaadt send_head -= sizeof(*auth);
143df930be7Sderaadt auth = (struct auth_info *)send_head;
144df930be7Sderaadt auth->authtype = htonl(RPCAUTH_NULL);
145df930be7Sderaadt auth->authlen = 0;
146df930be7Sderaadt
147df930be7Sderaadt #if 1
148df930be7Sderaadt /* Auth credentials: always auth unix (as root) */
149df930be7Sderaadt send_head -= sizeof(struct auth_unix);
150df930be7Sderaadt bzero(send_head, sizeof(struct auth_unix));
151df930be7Sderaadt send_head -= sizeof(*auth);
152df930be7Sderaadt auth = (struct auth_info *)send_head;
153df930be7Sderaadt auth->authtype = htonl(RPCAUTH_UNIX);
154df930be7Sderaadt auth->authlen = htonl(sizeof(struct auth_unix));
155df930be7Sderaadt #else
156df930be7Sderaadt /* Auth credentials: always auth_null (XXX OK?) */
157df930be7Sderaadt send_head -= sizeof(*auth);
158df930be7Sderaadt auth = send_head;
159df930be7Sderaadt auth->authtype = htonl(RPCAUTH_NULL);
160df930be7Sderaadt auth->authlen = 0;
161df930be7Sderaadt #endif
162df930be7Sderaadt
163df930be7Sderaadt /* RPC call structure. */
164df930be7Sderaadt send_head -= sizeof(*call);
165df930be7Sderaadt call = (struct rpc_call *)send_head;
166df930be7Sderaadt rpc_xid++;
167df930be7Sderaadt call->rp_xid = htonl(rpc_xid);
168df930be7Sderaadt call->rp_direction = htonl(RPC_CALL);
169df930be7Sderaadt call->rp_rpcvers = htonl(RPC_VER2);
170df930be7Sderaadt call->rp_prog = htonl(prog);
171df930be7Sderaadt call->rp_vers = htonl(vers);
172df930be7Sderaadt call->rp_proc = htonl(proc);
173df930be7Sderaadt
174df930be7Sderaadt /* Make room for the rpc_reply header. */
175df930be7Sderaadt recv_head = rdata;
176df930be7Sderaadt recv_tail = (char *)rdata + rlen;
177df930be7Sderaadt recv_head -= sizeof(*reply);
178df930be7Sderaadt
179df930be7Sderaadt cc = sendrecv(d,
180dcd641d1Sniklas sendudp, send_head, send_tail - send_head,
181dcd641d1Sniklas recvrpc, recv_head, recv_tail - recv_head);
182df930be7Sderaadt
183df930be7Sderaadt #ifdef RPC_DEBUG
184df930be7Sderaadt if (debug)
185df930be7Sderaadt printf("callrpc: cc=%d rlen=%d\n", cc, rlen);
186df930be7Sderaadt #endif
187*467adba8Smiod if (cc <= -1)
188df930be7Sderaadt return (-1);
189df930be7Sderaadt
190bfcf73bfSniklas if ((size_t)cc <= sizeof(*reply)) {
191df930be7Sderaadt errno = EBADRPC;
192df930be7Sderaadt return (-1);
193df930be7Sderaadt }
194df930be7Sderaadt
195df930be7Sderaadt recv_tail = recv_head + cc;
196df930be7Sderaadt
197df930be7Sderaadt /*
198df930be7Sderaadt * Check the RPC reply status.
199df930be7Sderaadt * The xid, dir, astatus were already checked.
200df930be7Sderaadt */
201df930be7Sderaadt reply = (struct rpc_reply *)recv_head;
202df930be7Sderaadt auth = &reply->rp_u.rpu_rok.rok_auth;
203df930be7Sderaadt x = ntohl(auth->authlen);
204df930be7Sderaadt if (x != 0) {
205df930be7Sderaadt #ifdef RPC_DEBUG
206df930be7Sderaadt if (debug)
207df930be7Sderaadt printf("callrpc: reply auth != NULL\n");
208df930be7Sderaadt #endif
209df930be7Sderaadt errno = EBADRPC;
210df930be7Sderaadt return(-1);
211df930be7Sderaadt }
212df930be7Sderaadt x = ntohl(reply->rp_u.rpu_rok.rok_status);
213df930be7Sderaadt if (x != 0) {
214df930be7Sderaadt printf("callrpc: error = %d\n", x);
215df930be7Sderaadt errno = EBADRPC;
216df930be7Sderaadt return(-1);
217df930be7Sderaadt }
218df930be7Sderaadt recv_head += sizeof(*reply);
219df930be7Sderaadt
220dcd641d1Sniklas return (ssize_t)(recv_tail - recv_head);
221df930be7Sderaadt }
222df930be7Sderaadt
223df930be7Sderaadt /*
224df930be7Sderaadt * Returns true if packet is the one we're waiting for.
225df930be7Sderaadt * This just checks the XID, direction, acceptance.
226df930be7Sderaadt * Remaining checks are done by callrpc
227df930be7Sderaadt */
228df930be7Sderaadt static ssize_t
recvrpc(struct iodesc * d,void * pkt,size_t len,time_t tleft)229599546b3Sderaadt recvrpc(struct iodesc *d, void *pkt, size_t len, time_t tleft)
230df930be7Sderaadt {
231599546b3Sderaadt struct rpc_reply *reply;
232df930be7Sderaadt ssize_t n;
23379dbd5ceSniklas int x;
234df930be7Sderaadt
235df930be7Sderaadt errno = 0;
236df930be7Sderaadt #ifdef RPC_DEBUG
237df930be7Sderaadt if (debug)
238df930be7Sderaadt printf("recvrpc: called len=%d\n", len);
239df930be7Sderaadt #endif
240df930be7Sderaadt
241df930be7Sderaadt n = readudp(d, pkt, len, tleft);
242df930be7Sderaadt if (n <= (4 * 4))
243df930be7Sderaadt return -1;
244df930be7Sderaadt
245df930be7Sderaadt reply = (struct rpc_reply *)pkt;
246df930be7Sderaadt
247df930be7Sderaadt x = ntohl(reply->rp_xid);
248df930be7Sderaadt if (x != rpc_xid) {
249df930be7Sderaadt #ifdef RPC_DEBUG
250df930be7Sderaadt if (debug)
251b079feefSmickey printf("recvrpc: rp_xid %d != xid %d\n", x, rpc_xid);
252df930be7Sderaadt #endif
253df930be7Sderaadt return -1;
254df930be7Sderaadt }
255df930be7Sderaadt
256df930be7Sderaadt x = ntohl(reply->rp_direction);
257df930be7Sderaadt if (x != RPC_REPLY) {
258df930be7Sderaadt #ifdef RPC_DEBUG
259df930be7Sderaadt if (debug)
260b079feefSmickey printf("recvrpc: rp_direction %d != REPLY\n", x);
261df930be7Sderaadt #endif
262df930be7Sderaadt return -1;
263df930be7Sderaadt }
264df930be7Sderaadt
265df930be7Sderaadt x = ntohl(reply->rp_astatus);
266df930be7Sderaadt if (x != RPC_MSGACCEPTED) {
267df930be7Sderaadt errno = ntohl(reply->rp_u.rpu_errno);
268288136e7Smickey printf("recvrpc: reject, astat=%d, errno=%d\n", x, errno);
269df930be7Sderaadt return -1;
270df930be7Sderaadt }
271df930be7Sderaadt
272df930be7Sderaadt /* Return data count (thus indicating success) */
273df930be7Sderaadt return (n);
274df930be7Sderaadt }
275df930be7Sderaadt
276df930be7Sderaadt /*
277df930be7Sderaadt * Given a pointer to a reply just received,
278df930be7Sderaadt * dig out the IP address/port from the headers.
279df930be7Sderaadt */
280df930be7Sderaadt void
rpc_fromaddr(void * pkt,struct in_addr * addr,u_short * port)281599546b3Sderaadt rpc_fromaddr(void *pkt, struct in_addr *addr, u_short *port)
282df930be7Sderaadt {
283df930be7Sderaadt struct hackhdr {
284df930be7Sderaadt /* Tail of IP header: just IP addresses */
285eb76c208Smpi u_int32_t ip_src;
286eb76c208Smpi u_int32_t ip_dst;
287df930be7Sderaadt /* UDP header: */
288df930be7Sderaadt u_int16_t uh_sport; /* source port */
289df930be7Sderaadt u_int16_t uh_dport; /* destination port */
290df930be7Sderaadt int16_t uh_ulen; /* udp length */
291df930be7Sderaadt u_int16_t uh_sum; /* udp checksum */
292df930be7Sderaadt /* RPC reply header: */
293df930be7Sderaadt struct rpc_reply rpc;
294df930be7Sderaadt } *hhdr;
295df930be7Sderaadt
296df930be7Sderaadt hhdr = ((struct hackhdr *)pkt) - 1;
297df930be7Sderaadt addr->s_addr = hhdr->ip_src;
298df930be7Sderaadt *port = hhdr->uh_sport;
299df930be7Sderaadt }
300df930be7Sderaadt
301df930be7Sderaadt /*
302df930be7Sderaadt * RPC Portmapper cache
303df930be7Sderaadt */
304df930be7Sderaadt #define PMAP_NUM 8 /* need at most 5 pmap entries */
305df930be7Sderaadt
306df930be7Sderaadt int rpc_pmap_num;
307df930be7Sderaadt struct pmap_list {
308df930be7Sderaadt struct in_addr addr; /* server, net order */
30979dbd5ceSniklas u_int prog; /* host order */
31079dbd5ceSniklas u_int vers; /* host order */
311df930be7Sderaadt int port; /* host order */
312df930be7Sderaadt } rpc_pmap_list[PMAP_NUM];
313df930be7Sderaadt
314df930be7Sderaadt /* return port number in host order, or -1 */
315df930be7Sderaadt int
rpc_pmap_getcache(struct in_addr addr,u_int prog,u_int vers)316599546b3Sderaadt rpc_pmap_getcache(struct in_addr addr, u_int prog, u_int vers)
317df930be7Sderaadt {
318df930be7Sderaadt struct pmap_list *pl;
319df930be7Sderaadt
320df930be7Sderaadt for (pl = rpc_pmap_list; pl < &rpc_pmap_list[rpc_pmap_num]; pl++) {
321df930be7Sderaadt if (pl->addr.s_addr == addr.s_addr &&
322df930be7Sderaadt pl->prog == prog && pl->vers == vers)
323df930be7Sderaadt return (pl->port);
324df930be7Sderaadt }
325df930be7Sderaadt return (-1);
326df930be7Sderaadt }
327df930be7Sderaadt
328df930be7Sderaadt void
rpc_pmap_putcache(struct in_addr addr,u_int prog,u_int vers,int port)329599546b3Sderaadt rpc_pmap_putcache(struct in_addr addr, u_int prog, u_int vers, int port)
330df930be7Sderaadt {
331df930be7Sderaadt struct pmap_list *pl;
332df930be7Sderaadt
333df930be7Sderaadt /* Don't overflow cache... */
334df930be7Sderaadt if (rpc_pmap_num >= PMAP_NUM) {
335df930be7Sderaadt /* ... just re-use the last entry. */
336df930be7Sderaadt rpc_pmap_num = PMAP_NUM - 1;
337df930be7Sderaadt #ifdef RPC_DEBUG
338df930be7Sderaadt printf("rpc_pmap_putcache: cache overflow\n");
339df930be7Sderaadt #endif
340df930be7Sderaadt }
341df930be7Sderaadt
342df930be7Sderaadt pl = &rpc_pmap_list[rpc_pmap_num];
343df930be7Sderaadt rpc_pmap_num++;
344df930be7Sderaadt
345df930be7Sderaadt /* Cache answer */
346df930be7Sderaadt pl->addr = addr;
347df930be7Sderaadt pl->prog = prog;
348df930be7Sderaadt pl->vers = vers;
349df930be7Sderaadt pl->port = port;
350df930be7Sderaadt }
351df930be7Sderaadt
352df930be7Sderaadt
353df930be7Sderaadt /*
354df930be7Sderaadt * Request a port number from the port mapper.
355df930be7Sderaadt * Returns the port in host order.
356df930be7Sderaadt */
357df930be7Sderaadt int
rpc_getport(struct iodesc * d,u_int32_t prog,u_int32_t vers)358eb76c208Smpi rpc_getport(struct iodesc *d, u_int32_t prog, u_int32_t vers)
359df930be7Sderaadt {
360df930be7Sderaadt struct args {
361eb76c208Smpi u_int32_t prog; /* call program */
362eb76c208Smpi u_int32_t vers; /* call version */
363eb76c208Smpi u_int32_t proto; /* call protocol */
364eb76c208Smpi u_int32_t port; /* call port (unused) */
365df930be7Sderaadt } *args;
366df930be7Sderaadt struct res {
367eb76c208Smpi u_int32_t port;
368df930be7Sderaadt } *res;
369df930be7Sderaadt struct {
370eb76c208Smpi u_int32_t h[RPC_HEADER_WORDS];
371df930be7Sderaadt struct args d;
372df930be7Sderaadt } sdata;
373df930be7Sderaadt struct {
374eb76c208Smpi u_int32_t h[RPC_HEADER_WORDS];
375df930be7Sderaadt struct res d;
376eb76c208Smpi u_int32_t pad;
377df930be7Sderaadt } rdata;
378df930be7Sderaadt ssize_t cc;
379df930be7Sderaadt int port;
380df930be7Sderaadt
381df930be7Sderaadt #ifdef RPC_DEBUG
382df930be7Sderaadt if (debug)
383df930be7Sderaadt printf("getport: prog=0x%x vers=%d\n", prog, vers);
384df930be7Sderaadt #endif
385df930be7Sderaadt
386df930be7Sderaadt /* This one is fixed forever. */
387df930be7Sderaadt if (prog == PMAPPROG)
388df930be7Sderaadt return (PMAPPORT);
389df930be7Sderaadt
390df930be7Sderaadt /* Try for cached answer first */
391df930be7Sderaadt port = rpc_pmap_getcache(d->destip, prog, vers);
392df930be7Sderaadt if (port != -1)
393df930be7Sderaadt return (port);
394df930be7Sderaadt
395df930be7Sderaadt args = &sdata.d;
396df930be7Sderaadt args->prog = htonl(prog);
397df930be7Sderaadt args->vers = htonl(vers);
398df930be7Sderaadt args->proto = htonl(IPPROTO_UDP);
399df930be7Sderaadt args->port = 0;
400df930be7Sderaadt res = &rdata.d;
401df930be7Sderaadt
402df930be7Sderaadt cc = rpc_call(d, PMAPPROG, PMAPVERS, PMAPPROC_GETPORT,
403df930be7Sderaadt args, sizeof(*args), res, sizeof(*res));
404bfcf73bfSniklas if (cc < 0 || (size_t)cc < sizeof(*res)) {
405df930be7Sderaadt printf("getport: %s", strerror(errno));
406df930be7Sderaadt errno = EBADRPC;
407df930be7Sderaadt return (-1);
408df930be7Sderaadt }
409df930be7Sderaadt port = (int)ntohl(res->port);
410df930be7Sderaadt
411df930be7Sderaadt rpc_pmap_putcache(d->destip, prog, vers, port);
412df930be7Sderaadt
413df930be7Sderaadt return (port);
414df930be7Sderaadt }
415