Subversion Repositories shark

Rev

Blame | Last modification | View Log | RSS feed

/*
 *  ncp_fs_sb.h
 *
 *  Copyright (C) 1995, 1996 by Volker Lendecke
 *
 */


#ifndef _NCP_FS_SB
#define _NCP_FS_SB

#include <linux/types.h>
#include <linux/ncp_mount.h>
#include <linux/net.h>

#ifdef __KERNEL__

#include <linux/workqueue.h>

#define NCP_DEFAULT_OPTIONS 0           /* 2 for packet signatures */

struct sock;

struct ncp_server {

        struct ncp_mount_data_kernel m; /* Nearly all of the mount data is of
                                           interest for us later, so we store
                                           it completely. */


        __u8 name_space[NCP_NUMBER_OF_VOLUMES + 2];

        struct file *ncp_filp;  /* File pointer to ncp socket */
        struct socket *ncp_sock;/* ncp socket */
        struct file *info_filp;
        struct socket *info_sock;

        u8 sequence;
        u8 task;
        u16 connection;         /* Remote connection number */

        u8 completion;          /* Status message from server */
        u8 conn_status;         /* Bit 4 = 1 ==> Server going down, no
                                   requests allowed anymore.
                                   Bit 0 = 1 ==> Server is down. */


        int buffer_size;        /* Negotiated bufsize */

        int reply_size;         /* Size of last reply */

        int packet_size;
        unsigned char *packet;  /* Here we prepare requests and
                                   receive replies */


        int lock;               /* To prevent mismatch in protocols. */
        struct semaphore sem;

        int current_size;       /* for packet preparation */
        int has_subfunction;
        int ncp_reply_size;

        int root_setuped;

        /* info for packet signing */
        int sign_wanted;        /* 1=Server needs signed packets */
        int sign_active;        /* 0=don't do signing, 1=do */
        char sign_root[8];      /* generated from password and encr. key */
        char sign_last[16];    

        /* Authentication info: NDS or BINDERY, username */
        struct {
                int     auth_type;
                size_t  object_name_len;
                void*   object_name;
                int     object_type;
        } auth;
        /* Password info */
        struct {
                size_t  len;
                void*   data;
        } priv;

        /* nls info: codepage for volume and charset for I/O */
        struct nls_table *nls_vol;
        struct nls_table *nls_io;

        /* maximum age in jiffies */
        int dentry_ttl;

        /* miscellaneous */
        unsigned int flags;

        spinlock_t requests_lock;       /* Lock accesses to tx.requests, tx.creq and rcv.creq when STREAM mode */

        void (*data_ready)(struct sock* sk, int len);
        void (*error_report)(struct sock* sk);
        void (*write_space)(struct sock* sk);   /* STREAM mode only */
        struct {
                struct work_struct tq;          /* STREAM/DGRAM: data/error ready */
                struct ncp_request_reply* creq; /* STREAM/DGRAM: awaiting reply from this request */
                struct semaphore creq_sem;      /* DGRAM only: lock accesses to rcv.creq */

                unsigned int state;             /* STREAM only: receiver state */
                struct {
                        __u32 magic __attribute__((packed));
                        __u32 len __attribute__((packed));
                        __u16 type __attribute__((packed));
                        __u16 p1 __attribute__((packed));
                        __u16 p2 __attribute__((packed));
                        __u16 p3 __attribute__((packed));
                        __u16 type2 __attribute__((packed));
                } buf;                          /* STREAM only: temporary buffer */
                unsigned char* ptr;             /* STREAM only: pointer to data */
                size_t len;                     /* STREAM only: length of data to receive */
        } rcv;
        struct {
                struct list_head requests;      /* STREAM only: queued requests */
                struct work_struct tq;          /* STREAM only: transmitter ready */
                struct ncp_request_reply* creq; /* STREAM only: currently transmitted entry */
        } tx;
        struct timer_list timeout_tm;           /* DGRAM only: timeout timer */
        struct work_struct timeout_tq;          /* DGRAM only: associated queue, we run timers from process context */
        int timeout_last;                       /* DGRAM only: current timeout length */
        int timeout_retries;                    /* DGRAM only: retries left */
        struct {
                size_t len;
                __u8 data[128];
        } unexpected_packet;
};

extern void ncp_tcp_rcv_proc(void *server);
extern void ncp_tcp_tx_proc(void *server);
extern void ncpdgram_rcv_proc(void *server);
extern void ncpdgram_timeout_proc(void *server);
extern void ncpdgram_timeout_call(unsigned long server);
extern void ncp_tcp_data_ready(struct sock* sk, int len);
extern void ncp_tcp_write_space(struct sock* sk);
extern void ncp_tcp_error_report(struct sock* sk);

#define NCP_FLAG_UTF8   1

#define NCP_CLR_FLAG(server, flag)      ((server)->flags &= ~(flag))
#define NCP_SET_FLAG(server, flag)      ((server)->flags |= (flag))
#define NCP_IS_FLAG(server, flag)       ((server)->flags & (flag))

static inline int ncp_conn_valid(struct ncp_server *server)
{
        return ((server->conn_status & 0x11) == 0);
}

static inline void ncp_invalidate_conn(struct ncp_server *server)
{
        server->conn_status |= 0x01;
}

#endif                          /* __KERNEL__ */

#endif