source: rtems/cpukit/libnetworking/nfs/rpcv2.h @ 9eadce0

4.104.114.84.95
Last change on this file since 9eadce0 was 39e6e65a, checked in by Joel Sherrill <joel.sherrill@…>, on 08/19/98 at 21:32:28

Base files

  • Property mode set to 100644
File size: 4.1 KB
Line 
1/*
2 * Copyright (c) 1989, 1993
3 *      The Regents of the University of California.  All rights reserved.
4 *
5 * This code is derived from software contributed to Berkeley by
6 * Rick Macklem at The University of Guelph.
7 *
8 * Redistribution and use in source and binary forms, with or without
9 * modification, are permitted provided that the following conditions
10 * are met:
11 * 1. Redistributions of source code must retain the above copyright
12 *    notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 *    notice, this list of conditions and the following disclaimer in the
15 *    documentation and/or other materials provided with the distribution.
16 * 3. All advertising materials mentioning features or use of this software
17 *    must display the following acknowledgement:
18 *      This product includes software developed by the University of
19 *      California, Berkeley and its contributors.
20 * 4. Neither the name of the University nor the names of its contributors
21 *    may be used to endorse or promote products derived from this software
22 *    without specific prior written permission.
23 *
24 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
25 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
26 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
27 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
28 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
29 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
30 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
31 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
32 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
33 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
34 * SUCH DAMAGE.
35 *
36 *      @(#)rpcv2.h     8.1 (Berkeley) 6/10/93
37 * $Id$
38 */
39
40#ifndef _NFS_RPCV2_H_
41#define _NFS_RPCV2_H_
42
43/*
44 * Definitions for Sun RPC Version 2, from
45 * "RPC: Remote Procedure Call Protocol Specification" RFC1057
46 */
47
48/* Version # */
49#define RPC_VER2        2
50
51/* Authentication */
52#define RPCAUTH_NULL    0
53#define RPCAUTH_UNIX    1
54#define RPCAUTH_SHORT   2
55#define RPCAUTH_KERB4   4
56#define RPCAUTH_NQNFS   300000
57#define RPCAUTH_MAXSIZ  400
58#define RPCVERF_MAXSIZ  12      /* For Kerb, can actually be 400 */
59#define RPCAUTH_UNIXGIDS 16
60
61/*
62 * Constants associated with authentication flavours.
63 */
64#define RPCAKN_FULLNAME 0
65#define RPCAKN_NICKNAME 1
66
67/* Rpc Constants */
68#define RPC_CALL        0
69#define RPC_REPLY       1
70#define RPC_MSGACCEPTED 0
71#define RPC_MSGDENIED   1
72#define RPC_PROGUNAVAIL 1
73#define RPC_PROGMISMATCH        2
74#define RPC_PROCUNAVAIL 3
75#define RPC_GARBAGE     4               /* I like this one */
76#define RPC_MISMATCH    0
77#define RPC_AUTHERR     1
78
79/* Authentication failures */
80#define AUTH_BADCRED    1
81#define AUTH_REJECTCRED 2
82#define AUTH_BADVERF    3
83#define AUTH_REJECTVERF 4
84#define AUTH_TOOWEAK    5               /* Give em wheaties */
85
86/* Sizes of rpc header parts */
87#define RPC_SIZ         24
88#define RPC_REPLYSIZ    28
89
90/* RPC Prog definitions */
91#define RPCPROG_MNT     100005
92#define RPCMNT_VER1     1
93#define RPCMNT_VER3     3
94#define RPCMNT_MOUNT    1
95#define RPCMNT_DUMP     2
96#define RPCMNT_UMOUNT   3
97#define RPCMNT_UMNTALL  4
98#define RPCMNT_EXPORT   5
99#define RPCMNT_NAMELEN  255
100#define RPCMNT_PATHLEN  1024
101#define RPCPROG_NFS     100003
102
103/*
104 * Structures used for RPCAUTH_KERB4.
105 */
106struct nfsrpc_fullverf {
107        u_long          t1;
108        u_long          t2;
109        u_long          w2;
110};
111
112struct nfsrpc_fullblock {
113        u_long          t1;
114        u_long          t2;
115        u_long          w1;
116        u_long          w2;
117};
118
119struct nfsrpc_nickverf {
120        u_long                  kind;
121        struct nfsrpc_fullverf  verf;
122};
123
124/*
125 * and their sizes in bytes.. If sizeof (struct nfsrpc_xx) != these
126 * constants, well then things will break in mount_nfs and nfsd.
127 */
128#define RPCX_FULLVERF   12
129#define RPCX_FULLBLOCK  16
130#define RPCX_NICKVERF   16
131
132#ifdef NFSKERB
133XXX
134#else
135typedef u_char                  NFSKERBKEY_T[2];
136typedef u_char                  NFSKERBKEYSCHED_T[2];
137#endif
138#define NFS_KERBSRV     "rcmd"          /* Kerberos Service for NFS */
139#define NFS_KERBTTL     (30 * 60)       /* Credential ttl (sec) */
140#define NFS_KERBCLOCKSKEW (5 * 60)      /* Clock skew (sec) */
141#define NFS_KERBW1(t)   (*((u_long *)(&((t).dat[((t).length + 3) & ~0x3]))))
142#endif
Note: See TracBrowser for help on using the repository browser.