1 | /* |
---|
2 | * Copyright (c) 1989, 1993 |
---|
3 | * The Regents of the University of California. All rights reserved. |
---|
4 | * |
---|
5 | * This code is derived from software contributed to Berkeley by |
---|
6 | * Rick Macklem at The University of Guelph. |
---|
7 | * |
---|
8 | * Redistribution and use in source and binary forms, with or without |
---|
9 | * modification, are permitted provided that the following conditions |
---|
10 | * are met: |
---|
11 | * 1. Redistributions of source code must retain the above copyright |
---|
12 | * notice, this list of conditions and the following disclaimer. |
---|
13 | * 2. Redistributions in binary form must reproduce the above copyright |
---|
14 | * notice, this list of conditions and the following disclaimer in the |
---|
15 | * documentation and/or other materials provided with the distribution. |
---|
16 | * 3. All advertising materials mentioning features or use of this software |
---|
17 | * must display the following acknowledgement: |
---|
18 | * This product includes software developed by the University of |
---|
19 | * California, Berkeley and its contributors. |
---|
20 | * 4. Neither the name of the University nor the names of its contributors |
---|
21 | * may be used to endorse or promote products derived from this software |
---|
22 | * without specific prior written permission. |
---|
23 | * |
---|
24 | * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND |
---|
25 | * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE |
---|
26 | * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE |
---|
27 | * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE |
---|
28 | * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL |
---|
29 | * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS |
---|
30 | * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) |
---|
31 | * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT |
---|
32 | * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY |
---|
33 | * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
---|
34 | * SUCH DAMAGE. |
---|
35 | * |
---|
36 | * @(#)rpcv2.h 8.1 (Berkeley) 6/10/93 |
---|
37 | * $Id$ |
---|
38 | */ |
---|
39 | |
---|
40 | #ifndef _NFS_RPCV2_H_ |
---|
41 | #define _NFS_RPCV2_H_ |
---|
42 | |
---|
43 | /* |
---|
44 | * Definitions for Sun RPC Version 2, from |
---|
45 | * "RPC: Remote Procedure Call Protocol Specification" RFC1057 |
---|
46 | */ |
---|
47 | |
---|
48 | /* Version # */ |
---|
49 | #define RPC_VER2 2 |
---|
50 | |
---|
51 | /* Authentication */ |
---|
52 | #define RPCAUTH_NULL 0 |
---|
53 | #define RPCAUTH_UNIX 1 |
---|
54 | #define RPCAUTH_SHORT 2 |
---|
55 | #define RPCAUTH_KERB4 4 |
---|
56 | #define RPCAUTH_NQNFS 300000 |
---|
57 | #define RPCAUTH_MAXSIZ 400 |
---|
58 | #define RPCVERF_MAXSIZ 12 /* For Kerb, can actually be 400 */ |
---|
59 | #define RPCAUTH_UNIXGIDS 16 |
---|
60 | |
---|
61 | /* |
---|
62 | * Constants associated with authentication flavours. |
---|
63 | */ |
---|
64 | #define RPCAKN_FULLNAME 0 |
---|
65 | #define RPCAKN_NICKNAME 1 |
---|
66 | |
---|
67 | /* Rpc Constants */ |
---|
68 | #define RPC_CALL 0 |
---|
69 | #define RPC_REPLY 1 |
---|
70 | #define RPC_MSGACCEPTED 0 |
---|
71 | #define RPC_MSGDENIED 1 |
---|
72 | #define RPC_PROGUNAVAIL 1 |
---|
73 | #define RPC_PROGMISMATCH 2 |
---|
74 | #define RPC_PROCUNAVAIL 3 |
---|
75 | #define RPC_GARBAGE 4 /* I like this one */ |
---|
76 | #define RPC_MISMATCH 0 |
---|
77 | #define RPC_AUTHERR 1 |
---|
78 | |
---|
79 | /* Authentication failures */ |
---|
80 | #define AUTH_BADCRED 1 |
---|
81 | #define AUTH_REJECTCRED 2 |
---|
82 | #define AUTH_BADVERF 3 |
---|
83 | #define AUTH_REJECTVERF 4 |
---|
84 | #define AUTH_TOOWEAK 5 /* Give em wheaties */ |
---|
85 | |
---|
86 | /* Sizes of rpc header parts */ |
---|
87 | #define RPC_SIZ 24 |
---|
88 | #define RPC_REPLYSIZ 28 |
---|
89 | |
---|
90 | /* RPC Prog definitions */ |
---|
91 | #define RPCPROG_MNT 100005 |
---|
92 | #define RPCMNT_VER1 1 |
---|
93 | #define RPCMNT_VER3 3 |
---|
94 | #define RPCMNT_MOUNT 1 |
---|
95 | #define RPCMNT_DUMP 2 |
---|
96 | #define RPCMNT_UMOUNT 3 |
---|
97 | #define RPCMNT_UMNTALL 4 |
---|
98 | #define RPCMNT_EXPORT 5 |
---|
99 | #define RPCMNT_NAMELEN 255 |
---|
100 | #define RPCMNT_PATHLEN 1024 |
---|
101 | #define RPCPROG_NFS 100003 |
---|
102 | |
---|
103 | /* |
---|
104 | * Structures used for RPCAUTH_KERB4. |
---|
105 | */ |
---|
106 | struct nfsrpc_fullverf { |
---|
107 | u_long t1; |
---|
108 | u_long t2; |
---|
109 | u_long w2; |
---|
110 | }; |
---|
111 | |
---|
112 | struct nfsrpc_fullblock { |
---|
113 | u_long t1; |
---|
114 | u_long t2; |
---|
115 | u_long w1; |
---|
116 | u_long w2; |
---|
117 | }; |
---|
118 | |
---|
119 | struct nfsrpc_nickverf { |
---|
120 | u_long kind; |
---|
121 | struct nfsrpc_fullverf verf; |
---|
122 | }; |
---|
123 | |
---|
124 | /* |
---|
125 | * and their sizes in bytes.. If sizeof (struct nfsrpc_xx) != these |
---|
126 | * constants, well then things will break in mount_nfs and nfsd. |
---|
127 | */ |
---|
128 | #define RPCX_FULLVERF 12 |
---|
129 | #define RPCX_FULLBLOCK 16 |
---|
130 | #define RPCX_NICKVERF 16 |
---|
131 | |
---|
132 | #ifdef NFSKERB |
---|
133 | XXX |
---|
134 | #else |
---|
135 | typedef u_char NFSKERBKEY_T[2]; |
---|
136 | typedef u_char NFSKERBKEYSCHED_T[2]; |
---|
137 | #endif |
---|
138 | #define NFS_KERBSRV "rcmd" /* Kerberos Service for NFS */ |
---|
139 | #define NFS_KERBTTL (30 * 60) /* Credential ttl (sec) */ |
---|
140 | #define NFS_KERBCLOCKSKEW (5 * 60) /* Clock skew (sec) */ |
---|
141 | #define NFS_KERBW1(t) (*((u_long *)(&((t).dat[((t).length + 3) & ~0x3])))) |
---|
142 | #endif |
---|