rpcv2.h revision 1.3
1/* $NetBSD: rpcv2.h,v 1.8 1996/02/18 11:54:11 fvdl Exp $ */ 2 3/* 4 * Copyright (c) 1989, 1993 5 * The Regents of the University of California. All rights reserved. 6 * 7 * This code is derived from software contributed to Berkeley by 8 * Rick Macklem at The University of Guelph. 9 * 10 * Redistribution and use in source and binary forms, with or without 11 * modification, are permitted provided that the following conditions 12 * are met: 13 * 1. Redistributions of source code must retain the above copyright 14 * notice, this list of conditions and the following disclaimer. 15 * 2. Redistributions in binary form must reproduce the above copyright 16 * notice, this list of conditions and the following disclaimer in the 17 * documentation and/or other materials provided with the distribution. 18 * 3. All advertising materials mentioning features or use of this software 19 * must display the following acknowledgement: 20 * This product includes software developed by the University of 21 * California, Berkeley and its contributors. 22 * 4. Neither the name of the University nor the names of its contributors 23 * may be used to endorse or promote products derived from this software 24 * without specific prior written permission. 25 * 26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND 27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 29 * ARE DISCLAIMED. IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE 30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 36 * SUCH DAMAGE. 37 * 38 * @(#)rpcv2.h 8.2 (Berkeley) 3/30/95 39 */ 40 41 42#ifndef _NFS_RPCV2_H_ 43#define _NFS_RPCV2_H_ 44 45/* 46 * Definitions for Sun RPC Version 2, from 47 * "RPC: Remote Procedure Call Protocol Specification" RFC1057 48 */ 49 50/* Version # */ 51#define RPC_VER2 2 52 53/* Authentication */ 54#define RPCAUTH_NULL 0 55#define RPCAUTH_UNIX 1 56#define RPCAUTH_SHORT 2 57#define RPCAUTH_KERB4 4 58#define RPCAUTH_NQNFS 300000 59#define RPCAUTH_MAXSIZ 400 60#define RPCVERF_MAXSIZ 12 /* For Kerb, can actually be 400 */ 61#define RPCAUTH_UNIXGIDS 16 62 63/* 64 * Constants associated with authentication flavours. 65 */ 66#define RPCAKN_FULLNAME 0 67#define RPCAKN_NICKNAME 1 68 69/* Rpc Constants */ 70#define RPC_CALL 0 71#define RPC_REPLY 1 72#define RPC_MSGACCEPTED 0 73#define RPC_MSGDENIED 1 74#define RPC_PROGUNAVAIL 1 75#define RPC_PROGMISMATCH 2 76#define RPC_PROCUNAVAIL 3 77#define RPC_GARBAGE 4 /* I like this one */ 78#define RPC_MISMATCH 0 79#define RPC_AUTHERR 1 80 81/* Authentication failures */ 82#define AUTH_BADCRED 1 83#define AUTH_REJECTCRED 2 84#define AUTH_BADVERF 3 85#define AUTH_REJECTVERF 4 86#define AUTH_TOOWEAK 5 /* Give em wheaties */ 87 88/* Sizes of rpc header parts */ 89#define RPC_SIZ 24 90#define RPC_REPLYSIZ 28 91 92/* RPC Prog definitions */ 93#define RPCPROG_MNT 100005 94#define RPCMNT_VER1 1 95#define RPCMNT_VER3 3 96#define RPCMNT_MOUNT 1 97#define RPCMNT_DUMP 2 98#define RPCMNT_UMOUNT 3 99#define RPCMNT_UMNTALL 4 100#define RPCMNT_EXPORT 5 101#define RPCMNT_NAMELEN 255 102#define RPCMNT_PATHLEN 1024 103#define RPCPROG_NFS 100003 104 105/* Structs for common parts of the rpc's */ 106struct rpcv2_time { 107 u_int32_t rpc_sec; 108 u_int32_t rpc_usec; 109}; 110 111/* 112 * Structures used for RPCAUTH_KERB4. 113 */ 114struct nfsrpc_fullverf { 115 u_int32_t t1; 116 u_int32_t t2; 117 u_int32_t w2; 118}; 119 120struct nfsrpc_fullblock { 121 u_int32_t t1; 122 u_int32_t t2; 123 u_int32_t w1; 124 u_int32_t w2; 125}; 126 127struct nfsrpc_nickverf { 128 u_int32_t kind; 129 struct nfsrpc_fullverf verf; 130}; 131 132/* 133 * and their sizes in bytes.. If sizeof (struct nfsrpc_xx) != these 134 * constants, well then things will break in mount_nfs and nfsd. 135 */ 136#define RPCX_FULLVERF 12 137#define RPCX_FULLBLOCK 16 138#define RPCX_NICKVERF 16 139 140#ifdef NFSKERB 141XXX 142#else 143typedef u_char NFSKERBKEY_T[2]; 144typedef u_char NFSKERBKEYSCHED_T[2]; 145#endif 146#define NFS_KERBSRV "rcmd" /* Kerberos Service for NFS */ 147#define NFS_KERBTTL (30 * 60) /* Credential ttl (sec) */ 148#define NFS_KERBCLOCKSKEW (5 * 60) /* Clock skew (sec) */ 149#define NFS_KERBW1(t) (*((u_long *)(&((t).dat[((t).length + 3) & ~0x3])))) 150#endif 151