The C and C++ Include Header Files
/usr/include/ntirpc/rpc/auth_unix.h
$ cat -n /usr/include/ntirpc/rpc/auth_unix.h 1 /* 2 * Copyright (c) 2009, Sun Microsystems, Inc. 3 * Copyright (c) 2013-2018 Red Hat, Inc. and/or its affiliates. 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions are met: 8 * - Redistributions of source code must retain the above copyright notice, 9 * this list of conditions and the following disclaimer. 10 * - Redistributions in binary form must reproduce the above copyright notice, 11 * this list of conditions and the following disclaimer in the documentation 12 * and/or other materials provided with the distribution. 13 * - Neither the name of Sun Microsystems, Inc. nor the names of its 14 * contributors may be used to endorse or promote products derived 15 * from this software without specific prior written permission. 16 * 17 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS "AS IS" 18 * AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 19 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 20 * ARE DISCLAIMED. IN NO EVENT SHALL THE COPYRIGHT HOLDER OR CONTRIBUTORS BE 21 * LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR 22 * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF 23 * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS 24 * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN 25 * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) 26 * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE 27 * POSSIBILITY OF SUCH DAMAGE. 28 * 29 * from: @(#)auth_unix.h 1.8 88/02/08 SMI 30 * from: @(#)auth_unix.h 2.2 88/07/29 4.0 RPCSRC 31 * $FreeBSD: src/include/rpc/auth_unix.h,v 1.11 2002/03/23 17:24:55 imp Exp $ 32 */ 33 34 /* 35 * auth_unix.h, Protocol for UNIX style authentication parameters for RPC 36 * 37 * Copyright (C) 1984, Sun Microsystems, Inc. 38 */ 39 40 /* 41 * The system is very weak. The client uses no encryption for it 42 * credentials and only sends null verifiers. The server sends backs 43 * null verifiers or optionally a verifier that suggests a new short hand 44 * for the credentials. 45 */ 46 47 #ifndef _TIRPC_AUTH_UNIX_H 48 #define _TIRPC_AUTH_UNIX_H 49 #include
50 51 /* The machine name is part of a credential; it may not exceed 255 bytes */ 52 #define MAX_MACHINE_NAME 255 53 54 /* gids compose part of a credential; there may not be more than 16 of them */ 55 #define NGRPS 16 56 57 /* 58 * Unix style credentials. 59 */ 60 struct authunix_parms { 61 char *aup_machname; 62 gid_t *aup_gids; 63 u_int aup_len; /* count of aup_gids */ 64 uid_t aup_uid; 65 gid_t aup_gid; 66 int32_t aup_time; /* old protocol 32-bits not long time_t */ 67 }; 68 69 #define authsys_parms authunix_parms 70 71 __BEGIN_DECLS 72 extern bool xdr_authunix_parms(XDR *, struct authunix_parms *); 73 __END_DECLS 74 /* 75 * If a response verifier has flavor AUTH_SHORT, 76 * then the body of the response verifier encapsulates the following structure; 77 * again it is serialized in the obvious fashion. 78 */ 79 struct short_hand_verf { 80 struct opaque_auth new_cred; 81 }; 82 83 #endif /* !_TIRPC_AUTH_UNIX_H */
Contact us
|
About us
|
Term of use
|
Copyright © 2000-2024 MyWebUniversity.com ™