/* static char sccsid[] = "@(#)65 1.8 src/bos/usr/include/rpc/auth_unix.h, libcrpc, bos720 9/26/06 14:16:27"; */ /* * COMPONENT_NAME: LIBCRPC * * FUNCTIONS: * * ORIGINS: 24 * * * Copyright (c) 1990 by Sun Microsystems, Inc. */ /* @(#)auth_unix.h 1.2 90/07/17 4.1NFSSRC SMI */ /* * auth_unix.h, Protocol for UNIX style authentication parameters for RPC */ #ifdef _AIX_TIRPC #include #else #ifndef _RPC_AUTH_UNIX_H #define _RPC_AUTH_UNIX_H /* * The system is very weak. The client uses no encryption for it * credentials and only sends null verifiers. The server sends backs * null verifiers or optionally a verifier that suggests a new short hand * for the credentials. */ /* The machine name is part of a credential; it may not exceed 255 bytes */ #define MAX_MACHINE_NAME 255 /* gids compose part of a credential; there may not be more than 16 of them */ #define NGRPS 16 /* * Unix style credentials. */ struct authunix_parms { #ifndef __64BIT__ u_long aup_time; #else u_int aup_time; #endif char *aup_machname; u_int aup_uid; u_int aup_gid; u_int aup_len; u_int *aup_gids; }; #if __cplusplus extern "C" bool_t xdr_authunix_parms(XDR *, struct authunix_parms *); #else extern bool_t xdr_authunix_parms(XDR *, struct authunix_parms *); #endif /*__cplusplus*/ /* * If a response verifier has flavor AUTH_SHORT, * then the body of the response verifier encapsulates the following structure; * again it is serialized in the obvious fashion. */ struct short_hand_verf { struct opaque_auth new_cred; }; #endif #endif /*!_RPC_AUTH_UNIX_H*/