rpcv2.h revision 1.3
1/*	$NetBSD: rpcv2.h,v 1.8 1996/02/18 11:54:11 fvdl Exp $	*/
2
3/*
4 * Copyright (c) 1989, 1993
5 *	The Regents of the University of California.  All rights reserved.
6 *
7 * This code is derived from software contributed to Berkeley by
8 * Rick Macklem at The University of Guelph.
9 *
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
12 * are met:
13 * 1. Redistributions of source code must retain the above copyright
14 *    notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 *    notice, this list of conditions and the following disclaimer in the
17 *    documentation and/or other materials provided with the distribution.
18 * 3. All advertising materials mentioning features or use of this software
19 *    must display the following acknowledgement:
20 *	This product includes software developed by the University of
21 *	California, Berkeley and its contributors.
22 * 4. Neither the name of the University nor the names of its contributors
23 *    may be used to endorse or promote products derived from this software
24 *    without specific prior written permission.
25 *
26 * THIS SOFTWARE IS PROVIDED BY THE REGENTS AND CONTRIBUTORS ``AS IS'' AND
27 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
28 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
29 * ARE DISCLAIMED.  IN NO EVENT SHALL THE REGENTS OR CONTRIBUTORS BE LIABLE
30 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
31 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
32 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
33 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
34 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
35 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
36 * SUCH DAMAGE.
37 *
38 *	@(#)rpcv2.h	8.2 (Berkeley) 3/30/95
39 */
40
41
42#ifndef _NFS_RPCV2_H_
43#define _NFS_RPCV2_H_
44
45/*
46 * Definitions for Sun RPC Version 2, from
47 * "RPC: Remote Procedure Call Protocol Specification" RFC1057
48 */
49
50/* Version # */
51#define	RPC_VER2	2
52
53/* Authentication */
54#define	RPCAUTH_NULL	0
55#define	RPCAUTH_UNIX	1
56#define	RPCAUTH_SHORT	2
57#define RPCAUTH_KERB4	4
58#define	RPCAUTH_NQNFS	300000
59#define	RPCAUTH_MAXSIZ	400
60#define	RPCVERF_MAXSIZ	12	/* For Kerb, can actually be 400 */
61#define	RPCAUTH_UNIXGIDS 16
62
63/*
64 * Constants associated with authentication flavours.
65 */
66#define RPCAKN_FULLNAME	0
67#define RPCAKN_NICKNAME	1
68
69/* Rpc Constants */
70#define	RPC_CALL	0
71#define	RPC_REPLY	1
72#define	RPC_MSGACCEPTED	0
73#define	RPC_MSGDENIED	1
74#define	RPC_PROGUNAVAIL	1
75#define	RPC_PROGMISMATCH	2
76#define	RPC_PROCUNAVAIL	3
77#define	RPC_GARBAGE	4		/* I like this one */
78#define	RPC_MISMATCH	0
79#define	RPC_AUTHERR	1
80
81/* Authentication failures */
82#define	AUTH_BADCRED	1
83#define	AUTH_REJECTCRED	2
84#define	AUTH_BADVERF	3
85#define	AUTH_REJECTVERF	4
86#define	AUTH_TOOWEAK	5		/* Give em wheaties */
87
88/* Sizes of rpc header parts */
89#define	RPC_SIZ		24
90#define	RPC_REPLYSIZ	28
91
92/* RPC Prog definitions */
93#define	RPCPROG_MNT	100005
94#define	RPCMNT_VER1	1
95#define	RPCMNT_VER3	3
96#define	RPCMNT_MOUNT	1
97#define	RPCMNT_DUMP	2
98#define	RPCMNT_UMOUNT	3
99#define	RPCMNT_UMNTALL	4
100#define	RPCMNT_EXPORT	5
101#define	RPCMNT_NAMELEN	255
102#define	RPCMNT_PATHLEN	1024
103#define	RPCPROG_NFS	100003
104
105/* Structs for common parts of the rpc's */
106struct rpcv2_time {
107	u_int32_t rpc_sec;
108	u_int32_t rpc_usec;
109};
110
111/*
112 * Structures used for RPCAUTH_KERB4.
113 */
114struct nfsrpc_fullverf {
115	u_int32_t t1;
116	u_int32_t t2;
117	u_int32_t w2;
118};
119
120struct nfsrpc_fullblock {
121	u_int32_t t1;
122	u_int32_t t2;
123	u_int32_t w1;
124	u_int32_t w2;
125};
126
127struct nfsrpc_nickverf {
128	u_int32_t kind;
129	struct nfsrpc_fullverf	verf;
130};
131
132/*
133 * and their sizes in bytes.. If sizeof (struct nfsrpc_xx) != these
134 * constants, well then things will break in mount_nfs and nfsd.
135 */
136#define RPCX_FULLVERF	12
137#define RPCX_FULLBLOCK	16
138#define RPCX_NICKVERF	16
139
140#ifdef NFSKERB
141XXX
142#else
143typedef u_char			NFSKERBKEY_T[2];
144typedef u_char			NFSKERBKEYSCHED_T[2];
145#endif
146#define NFS_KERBSRV	"rcmd"		/* Kerberos Service for NFS */
147#define NFS_KERBTTL	(30 * 60)	/* Credential ttl (sec) */
148#define NFS_KERBCLOCKSKEW (5 * 60)	/* Clock skew (sec) */
149#define NFS_KERBW1(t)	(*((u_long *)(&((t).dat[((t).length + 3) & ~0x3]))))
150#endif
151