File:  [ELWIX - Embedded LightWeight unIX -] / embedaddon / ntp / include / ntp_request.h
Revision 1.1.1.1 (vendor branch): download - view: text, annotated - select for diffs - revision graph
Tue May 29 12:08:38 2012 UTC (12 years, 1 month ago) by misho
Branches: ntp, MAIN
CVS tags: v4_2_6p5p0, v4_2_6p5, HEAD
ntp 4.2.6p5

    1: /*
    2:  * ntp_request.h - definitions for the ntpd remote query facility
    3:  */
    4: 
    5: #ifndef NTP_REQUEST_H
    6: #define NTP_REQUEST_H
    7: 
    8: #include "stddef.h"
    9: #include "ntp_types.h"
   10: #include "recvbuff.h"
   11: 
   12: /*
   13:  * A mode 7 packet is used exchanging data between an NTP server
   14:  * and a client for purposes other than time synchronization, e.g.
   15:  * monitoring, statistics gathering and configuration.  A mode 7
   16:  * packet has the following format:
   17:  *
   18:  *    0			  1		      2			  3
   19:  *    0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1 2 3 4 5 6 7 8 9 0 1
   20:  *   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   21:  *   |R|M| VN  | Mode|A|  Sequence   | Implementation|   Req Code    |
   22:  *   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   23:  *   |  Err  | Number of data items  |  MBZ  |   Size of data item   |
   24:  *   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   25:  *   |								     |
   26:  *   |            Data (Minimum 0 octets, maximum 500 octets)        |
   27:  *   |								     |
   28:  *                            [...]
   29:  *   |								     |
   30:  *   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   31:  *   |               Encryption Keyid (when A bit set)               |
   32:  *   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   33:  *   |								     |
   34:  *   |          Message Authentication Code (when A bit set)         |
   35:  *   |								     |
   36:  *   +-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+-+
   37:  *
   38:  * where the fields are (note that the client sends requests, the server
   39:  * responses):
   40:  *
   41:  * Response Bit:  This packet is a response (if clear, packet is a request).
   42:  *
   43:  * More Bit:	Set for all packets but the last in a response which
   44:  *		requires more than one packet.
   45:  *
   46:  * Version Number: 2 for current version
   47:  *
   48:  * Mode:	Always 7
   49:  *
   50:  * Authenticated bit: If set, this packet is authenticated.
   51:  *
   52:  * Sequence number: For a multipacket response, contains the sequence
   53:  *		number of this packet.  0 is the first in the sequence,
   54:  *		127 (or less) is the last.  The More Bit must be set in
   55:  *		all packets but the last.
   56:  *
   57:  * Implementation number: The number of the implementation this request code
   58:  *		is defined by.  An implementation number of zero is used
   59:  *		for requst codes/data formats which all implementations
   60:  *		agree on.  Implementation number 255 is reserved (for
   61:  *		extensions, in case we run out).
   62:  *
   63:  * Request code: An implementation-specific code which specifies the
   64:  *		operation to be (which has been) performed and/or the
   65:  *		format and semantics of the data included in the packet.
   66:  *
   67:  * Err:		Must be 0 for a request.  For a response, holds an error
   68:  *		code relating to the request.  If nonzero, the operation
   69:  *		requested wasn't performed.
   70:  *
   71:  *		0 - no error
   72:  *		1 - incompatable implementation number
   73:  *		2 - unimplemented request code
   74:  *		3 - format error (wrong data items, data size, packet size etc.)
   75:  *		4 - no data available (e.g. request for details on unknown peer)
   76:  *		5-6 I don't know
   77:  *		7 - authentication failure (i.e. permission denied)
   78:  *
   79:  * Number of data items: number of data items in packet.  0 to 500
   80:  *
   81:  * MBZ:		A reserved data field, must be zero in requests and responses.
   82:  *
   83:  * Size of data item: size of each data item in packet.  0 to 500
   84:  *
   85:  * Data:	Variable sized area containing request/response data.  For
   86:  *		requests and responses the size in octets must be greater
   87:  *		than or equal to the product of the number of data items
   88:  *		and the size of a data item.  For requests the data area
   89:  *		must be exactly 40 octets in length.  For responses the
   90:  *		data area may be any length between 0 and 500 octets
   91:  *		inclusive.
   92:  *
   93:  * Message Authentication Code: Same as NTP spec, in definition and function.
   94:  *		May optionally be included in requests which require
   95:  *		authentication, is never included in responses.
   96:  *
   97:  * The version number, mode and keyid have the same function and are
   98:  * in the same location as a standard NTP packet.  The request packet
   99:  * is the same size as a standard NTP packet to ease receive buffer
  100:  * management, and to allow the same encryption procedure to be used
  101:  * both on mode 7 and standard NTP packets.  The mac is included when
  102:  * it is required that a request be authenticated, the keyid should be
  103:  * zero in requests in which the mac is not included.
  104:  *
  105:  * The data format depends on the implementation number/request code pair
  106:  * and whether the packet is a request or a response.  The only requirement
  107:  * is that data items start in the octet immediately following the size
  108:  * word and that data items be concatenated without padding between (i.e.
  109:  * if the data area is larger than data_items*size, all padding is at
  110:  * the end).  Padding is ignored, other than for encryption purposes.
  111:  * Implementations using encryption might want to include a time stamp
  112:  * or other data in the request packet padding.  The key used for requests
  113:  * is implementation defined, but key 15 is suggested as a default.
  114:  */
  115: 
  116: /*
  117:  * union of raw addresses to save space
  118:  */
  119: union addrun
  120: {
  121: 	struct in6_addr addr6;
  122: 	struct in_addr  addr;
  123: };
  124: 
  125: /*
  126:  * A request packet.  These are almost a fixed length.
  127:  */
  128: struct req_pkt {
  129: 	u_char rm_vn_mode;		/* response, more, version, mode */
  130: 	u_char auth_seq;		/* key, sequence number */
  131: 	u_char implementation;		/* implementation number */
  132: 	u_char request;			/* request number */
  133: 	u_short err_nitems;		/* error code/number of data items */
  134: 	u_short mbz_itemsize;		/* item size */
  135: 	char data[MAXFILENAME + 48];	/* data area [32 prev](176 byte max) */
  136: 					/* struct conf_peer must fit */
  137: 	l_fp tstamp;			/* time stamp, for authentication */
  138: 	keyid_t keyid;			/* (optional) encryption key */
  139: 	char mac[MAX_MAC_LEN-sizeof(keyid_t)]; /* (optional) auth code */
  140: };
  141: 
  142: /*
  143:  * The req_pkt_tail structure is used by ntpd to adjust for different
  144:  * packet sizes that may arrive.
  145:  */
  146: struct req_pkt_tail {
  147: 	l_fp tstamp;			/* time stamp, for authentication */
  148: 	keyid_t keyid;			/* (optional) encryption key */
  149: 	char mac[MAX_MAC_LEN-sizeof(keyid_t)]; /* (optional) auth code */
  150: };
  151: 
  152: /* MODE_PRIVATE request packet header length before optional items. */
  153: #define	REQ_LEN_HDR	(offsetof(struct req_pkt, data))
  154: /* MODE_PRIVATE request packet fixed length without MAC. */
  155: #define	REQ_LEN_NOMAC	(offsetof(struct req_pkt, keyid))
  156: /* MODE_PRIVATE req_pkt_tail minimum size (16 octet digest) */
  157: #define REQ_TAIL_MIN	\
  158: 	(sizeof(struct req_pkt_tail) - (MAX_MAC_LEN - MAX_MD5_LEN))
  159: 
  160: /*
  161:  * A MODE_PRIVATE response packet.  The length here is variable, this
  162:  * is a maximally sized one.  Note that this implementation doesn't
  163:  * authenticate responses.
  164:  */
  165: #define	RESP_HEADER_SIZE	(offsetof(struct resp_pkt, data))
  166: #define	RESP_DATA_SIZE		(500)
  167: 
  168: struct resp_pkt {
  169: 	u_char rm_vn_mode;		/* response, more, version, mode */
  170: 	u_char auth_seq;		/* key, sequence number */
  171: 	u_char implementation;		/* implementation number */
  172: 	u_char request;			/* request number */
  173: 	u_short err_nitems;		/* error code/number of data items */
  174: 	u_short mbz_itemsize;		/* item size */
  175: 	char data[RESP_DATA_SIZE];	/* data area */
  176: };
  177: 
  178: 
  179: /*
  180:  * Information error codes
  181:  */
  182: #define	INFO_OKAY	0
  183: #define	INFO_ERR_IMPL	1	/* incompatable implementation */
  184: #define	INFO_ERR_REQ	2	/* unknown request code */
  185: #define	INFO_ERR_FMT	3	/* format error */
  186: #define	INFO_ERR_NODATA	4	/* no data for this request */
  187: #define	INFO_ERR_AUTH	7	/* authentication failure */
  188: 
  189: /*
  190:  * Maximum sequence number.
  191:  */
  192: #define	MAXSEQ	127
  193: 
  194: 
  195: /*
  196:  * Bit setting macros for multifield items.
  197:  */
  198: #define	RESP_BIT	0x80
  199: #define	MORE_BIT	0x40
  200: 
  201: #define	ISRESPONSE(rm_vn_mode)	(((rm_vn_mode)&RESP_BIT)!=0)
  202: #define	ISMORE(rm_vn_mode)	(((rm_vn_mode)&MORE_BIT)!=0)
  203: #define INFO_VERSION(rm_vn_mode) ((u_char)(((rm_vn_mode)>>3)&0x7))
  204: #define	INFO_MODE(rm_vn_mode)	((rm_vn_mode)&0x7)
  205: 
  206: #define	RM_VN_MODE(resp, more, version)		\
  207: 				((u_char)(((resp)?RESP_BIT:0)\
  208: 				|((more)?MORE_BIT:0)\
  209: 				|((version?version:(NTP_OLDVERSION+1))<<3)\
  210: 				|(MODE_PRIVATE)))
  211: 
  212: #define	INFO_IS_AUTH(auth_seq)	(((auth_seq) & 0x80) != 0)
  213: #define	INFO_SEQ(auth_seq)	((auth_seq)&0x7f)
  214: #define	AUTH_SEQ(auth, seq)	((u_char)((((auth)!=0)?0x80:0)|((seq)&0x7f)))
  215: 
  216: #define	INFO_ERR(err_nitems)	((u_short)((ntohs(err_nitems)>>12)&0xf))
  217: #define	INFO_NITEMS(err_nitems)	((u_short)(ntohs(err_nitems)&0xfff))
  218: #define	ERR_NITEMS(err, nitems)	(htons((u_short)((((u_short)(err)<<12)&0xf000)\
  219: 				|((u_short)(nitems)&0xfff))))
  220: 
  221: #define	INFO_MBZ(mbz_itemsize)	((ntohs(mbz_itemsize)>>12)&0xf)
  222: #define	INFO_ITEMSIZE(mbz_itemsize)	((u_short)(ntohs(mbz_itemsize)&0xfff))
  223: #define	MBZ_ITEMSIZE(itemsize)	(htons((u_short)(itemsize)))
  224: 
  225: 
  226: /*
  227:  * Implementation numbers.  One for universal use and one for ntpd.
  228:  */
  229: #define	IMPL_UNIV	0
  230: #define	IMPL_XNTPD_OLD	2	/* Used by pre ipv6 ntpdc */
  231: #define	IMPL_XNTPD	3	/* Used by post ipv6 ntpdc */
  232: 
  233: /*
  234:  * Some limits related to authentication.  Frames which are
  235:  * authenticated must include a time stamp which differs from
  236:  * the receive time stamp by no more than 10 seconds.
  237:  */
  238: #define	INFO_TS_MAXSKEW	10.
  239: 
  240: /*
  241:  * Universal request codes go here.  There aren't any.
  242:  */
  243: 
  244: /*
  245:  * NTPD request codes go here.
  246:  */
  247: #define	REQ_PEER_LIST		0	/* return list of peers */
  248: #define	REQ_PEER_LIST_SUM	1	/* return summary info for all peers */
  249: #define	REQ_PEER_INFO		2	/* get standard information on peer */
  250: #define	REQ_PEER_STATS		3	/* get statistics for peer */
  251: #define	REQ_SYS_INFO		4	/* get system information */
  252: #define	REQ_SYS_STATS		5	/* get system stats */
  253: #define	REQ_IO_STATS		6	/* get I/O stats */
  254: #define REQ_MEM_STATS		7	/* stats related to peer list maint */
  255: #define	REQ_LOOP_INFO		8	/* info from the loop filter */
  256: #define	REQ_TIMER_STATS		9	/* get timer stats */
  257: #define	REQ_CONFIG		10	/* configure a new peer */
  258: #define	REQ_UNCONFIG		11	/* unconfigure an existing peer */
  259: #define	REQ_SET_SYS_FLAG	12	/* set system flags */
  260: #define	REQ_CLR_SYS_FLAG	13	/* clear system flags */
  261: #define	REQ_MONITOR		14	/* (not used) */
  262: #define	REQ_NOMONITOR		15	/* (not used) */
  263: #define	REQ_GET_RESTRICT	16	/* return restrict list */
  264: #define	REQ_RESADDFLAGS		17	/* add flags to restrict list */
  265: #define	REQ_RESSUBFLAGS		18	/* remove flags from restrict list */
  266: #define	REQ_UNRESTRICT		19	/* remove entry from restrict list */
  267: #define	REQ_MON_GETLIST		20	/* return data collected by monitor */
  268: #define	REQ_RESET_STATS		21	/* reset stat counters */
  269: #define	REQ_RESET_PEER		22	/* reset peer stat counters */
  270: #define	REQ_REREAD_KEYS		23	/* reread the encryption key file */
  271: #define	REQ_DO_DIRTY_HACK	24	/* (not used) */
  272: #define	REQ_DONT_DIRTY_HACK	25	/* (not used) */
  273: #define	REQ_TRUSTKEY		26	/* add a trusted key */
  274: #define	REQ_UNTRUSTKEY		27	/* remove a trusted key */
  275: #define	REQ_AUTHINFO		28	/* return authentication info */
  276: #define REQ_TRAPS		29	/* return currently set traps */
  277: #define	REQ_ADD_TRAP		30	/* add a trap */
  278: #define	REQ_CLR_TRAP		31	/* clear a trap */
  279: #define	REQ_REQUEST_KEY		32	/* define a new request keyid */
  280: #define	REQ_CONTROL_KEY		33	/* define a new control keyid */
  281: #define	REQ_GET_CTLSTATS	34	/* get stats from the control module */
  282: #define	REQ_GET_LEAPINFO	35	/* (not used) */
  283: #define	REQ_GET_CLOCKINFO	36	/* get clock information */
  284: #define	REQ_SET_CLKFUDGE	37	/* set clock fudge factors */
  285: #define REQ_GET_KERNEL		38	/* get kernel pll/pps information */
  286: #define	REQ_GET_CLKBUGINFO	39	/* get clock debugging info */
  287: #define	REQ_SET_PRECISION	41	/* (not used) */
  288: #define	REQ_MON_GETLIST_1	42	/* return collected v1 monitor data */
  289: #define	REQ_HOSTNAME_ASSOCID	43	/* Here is a hostname + assoc_id */
  290: #define REQ_IF_STATS		44	/* get interface statistics */
  291: #define REQ_IF_RELOAD		45	/* reload interface list */
  292: 
  293: /* Determine size of pre-v6 version of structures */
  294: #define v4sizeof(type)		offsetof(type, v6_flag)
  295: 
  296: /*
  297:  * Flags in the peer information returns
  298:  */
  299: #define	INFO_FLAG_CONFIG	0x1
  300: #define	INFO_FLAG_SYSPEER	0x2
  301: #define INFO_FLAG_BURST		0x4
  302: #define	INFO_FLAG_REFCLOCK	0x8
  303: #define	INFO_FLAG_PREFER	0x10
  304: #define	INFO_FLAG_AUTHENABLE	0x20
  305: #define	INFO_FLAG_SEL_CANDIDATE	0x40
  306: #define	INFO_FLAG_SHORTLIST	0x80
  307: #define	INFO_FLAG_IBURST	0x100
  308: 
  309: /*
  310:  * Flags in the system information returns
  311:  */
  312: #define INFO_FLAG_BCLIENT	0x1
  313: #define INFO_FLAG_AUTHENTICATE	0x2
  314: #define INFO_FLAG_NTP		0x4
  315: #define INFO_FLAG_KERNEL	0x8
  316: #define INFO_FLAG_MONITOR	0x40
  317: #define INFO_FLAG_FILEGEN	0x80
  318: #define INFO_FLAG_CAL		0x10
  319: #define INFO_FLAG_PPS_SYNC	0x20
  320: 
  321: /*
  322:  * Peer list structure.  Used to return raw lists of peers.  It goes
  323:  * without saying that everything returned is in network byte order.
  324:  * Well, it *would* have gone without saying, but somebody said it.
  325:  */
  326: struct info_peer_list {
  327: 	u_int32 addr;		/* address of peer */
  328: 	u_short port;		/* port number of peer */
  329: 	u_char hmode;		/* mode for this peer */
  330: 	u_char flags;		/* flags (from above) */
  331: 	u_int v6_flag;		/* is this v6 or not */
  332: 	u_int unused1;		/* (unused) padding for addr6 */
  333: 	struct in6_addr addr6;	/* v6 address of peer */
  334: };
  335: 
  336: 
  337: /*
  338:  * Peer summary structure.  Sort of the info that ntpdc returns by default.
  339:  */
  340: struct info_peer_summary {
  341: 	u_int32 dstadr;		/* local address (zero for undetermined) */
  342: 	u_int32 srcadr;		/* source address */
  343: 	u_short srcport;	/* source port */
  344: 	u_char stratum;		/* stratum of peer */
  345: 	s_char hpoll;		/* host polling interval */
  346: 	s_char ppoll;		/* peer polling interval */
  347: 	u_char reach;		/* reachability register */
  348: 	u_char flags;		/* flags, from above */
  349: 	u_char hmode;		/* peer mode */
  350: 	s_fp delay;		/* peer.estdelay */
  351: 	l_fp offset;		/* peer.estoffset */
  352: 	u_fp dispersion;	/* peer.estdisp */
  353: 	u_int v6_flag;			/* is this v6 or not */
  354: 	u_int unused1;			/* (unused) padding for dstadr6 */
  355: 	struct in6_addr dstadr6;	/* local address (v6) */
  356: 	struct in6_addr srcadr6;	/* source address (v6) */
  357: };
  358: 
  359: 
  360: /*
  361:  * Peer information structure.
  362:  */
  363: struct info_peer {
  364: 	u_int32 dstadr;		/* local address */
  365: 	u_int32	srcadr;		/* source address */
  366: 	u_short srcport;	/* remote port */
  367: 	u_char flags;		/* peer flags */
  368: 	u_char leap;		/* peer.leap */
  369: 	u_char hmode;		/* peer.hmode */
  370: 	u_char pmode;		/* peer.pmode */
  371: 	u_char stratum;		/* peer.stratum */
  372: 	u_char ppoll;		/* peer.ppoll */
  373: 	u_char hpoll;		/* peer.hpoll */
  374: 	s_char precision;	/* peer.precision */
  375: 	u_char version;		/* peer.version */
  376: 	u_char unused8;
  377: 	u_char reach;		/* peer.reach */
  378: 	u_char unreach;		/* peer.unreach */
  379: 	u_char flash;		/* old peer.flash */
  380: 	u_char ttl;		/* peer.ttl */
  381: 	u_short flash2;		/* new peer.flash */
  382: 	associd_t associd;	/* association ID */
  383: 	keyid_t keyid;		/* peer.keyid */
  384: 	u_int32 pkeyid;		/* unused */
  385: 	u_int32 refid;		/* peer.refid */
  386: 	u_int32 timer;		/* peer.timer */
  387: 	s_fp rootdelay;		/* peer.delay */
  388: 	u_fp rootdispersion;	/* peer.dispersion */
  389: 	l_fp reftime;		/* peer.reftime */
  390: 	l_fp org;		/* peer.org */
  391: 	l_fp rec;		/* peer.rec */
  392: 	l_fp xmt;		/* peer.xmt */
  393: 	s_fp filtdelay[NTP_SHIFT];	/* delay shift register */
  394: 	l_fp filtoffset[NTP_SHIFT];	/* offset shift register */
  395: 	u_char order[NTP_SHIFT];	/* order of peers from last filter */
  396: 	s_fp delay;		/* peer.estdelay */
  397: 	u_fp dispersion;	/* peer.estdisp */
  398: 	l_fp offset;		/* peer.estoffset */
  399: 	u_fp selectdisp;	/* peer select dispersion */
  400: 	int32 unused1;		/* (obsolete) */
  401: 	int32 unused2;
  402: 	int32 unused3;
  403: 	int32 unused4;
  404: 	int32 unused5;
  405: 	int32 unused6;
  406: 	int32 unused7;
  407: 	s_fp estbdelay;		/* broadcast offset */
  408: 	u_int v6_flag;			/* is this v6 or not */
  409: 	u_int unused9;			/* (unused) padding for dstadr6 */
  410: 	struct in6_addr dstadr6; 	/* local address (v6-like) */
  411: 	struct in6_addr srcadr6; 	/* sources address (v6-like) */
  412: };
  413: 
  414: 
  415: /*
  416:  * Peer statistics structure
  417:  */
  418: struct info_peer_stats {
  419: 	u_int32 dstadr;		/* local address */
  420: 	u_int32 srcadr;		/* remote address */
  421: 	u_short srcport;	/* remote port */
  422: 	u_short flags;		/* peer flags */
  423: 	u_int32 timereset;	/* time counters were reset */
  424: 	u_int32 timereceived;	/* time since a packet received */
  425: 	u_int32 timetosend;	/* time until a packet sent */
  426: 	u_int32 timereachable;	/* time peer has been reachable */
  427: 	u_int32 sent;		/* number sent */
  428: 	u_int32 unused1;	/* (unused) */
  429: 	u_int32 processed;	/* number processed */
  430: 	u_int32 unused2;	/* (unused) */
  431: 	u_int32 badauth;	/* bad authentication */
  432: 	u_int32 bogusorg;	/* bogus origin */
  433: 	u_int32 oldpkt;		/* duplicate */
  434: 	u_int32 unused3;	/* (unused) */
  435: 	u_int32 unused4;	/* (unused) */
  436: 	u_int32 seldisp;	/* bad dispersion */
  437: 	u_int32 selbroken;	/* bad reference time */
  438: 	u_int32 unused5;	/* (unused) */
  439: 	u_char candidate;	/* select order */
  440: 	u_char unused6;		/* (unused) */
  441: 	u_char unused7;		/* (unused) */
  442: 	u_char unused8;		/* (unused) */
  443: 	u_int v6_flag;			/* is this v6 or not */
  444: 	u_int unused9;			/* (unused) padding for dstadr6 */
  445: 	struct in6_addr dstadr6;	/* local address */
  446: 	struct in6_addr srcadr6;	/* remote address */
  447: };
  448: 
  449: 
  450: /*
  451:  * Loop filter variables
  452:  */
  453: struct info_loop {
  454: 	l_fp last_offset;
  455: 	l_fp drift_comp;
  456: 	u_int32 compliance;
  457: 	u_int32 watchdog_timer;
  458: };
  459: 
  460: 
  461: /*
  462:  * System info.  Mostly the sys.* variables, plus a few unique to
  463:  * the implementation.
  464:  */
  465: struct info_sys {
  466: 	u_int32 peer;		/* system peer address (v4) */
  467: 	u_char peer_mode;	/* mode we are syncing to peer in */
  468: 	u_char leap;		/* system leap bits */
  469: 	u_char stratum;		/* our stratum */
  470: 	s_char precision;	/* local clock precision */
  471: 	s_fp rootdelay;		/* delay from sync source */
  472: 	u_fp rootdispersion;	/* dispersion from sync source */
  473: 	u_int32 refid;		/* reference ID of sync source */
  474: 	l_fp reftime;		/* system reference time */
  475: 	u_int32 poll;		/* system poll interval */
  476: 	u_char flags;		/* system flags */
  477: 	u_char unused1;		/* unused */
  478: 	u_char unused2;		/* unused */
  479: 	u_char unused3;		/* unused */
  480: 	s_fp bdelay;		/* default broadcast offset */
  481: 	s_fp frequency;		/* frequency residual (scaled ppm)  */
  482: 	l_fp authdelay;		/* default authentication delay */
  483: 	u_fp stability;		/* clock stability (scaled ppm) */
  484: 	u_int v6_flag;		/* is this v6 or not */
  485: 	u_int unused4;		/* unused, padding for peer6 */
  486: 	struct in6_addr peer6;	/* system peer address (v6) */
  487: };
  488: 
  489: 
  490: /*
  491:  * System stats.  These are collected in the protocol module
  492:  */
  493: struct info_sys_stats {
  494: 	u_int32 timeup;		/* time since restart */
  495: 	u_int32 timereset;	/* time since reset */
  496: 	u_int32 denied;		/* access denied */
  497: 	u_int32 oldversionpkt;	/* recent version */
  498: 	u_int32 newversionpkt;	/* current version */
  499: 	u_int32 unknownversion;	/* bad version */
  500: 	u_int32 badlength;	/* bad length or format */
  501: 	u_int32 processed;	/* packets processed */
  502: 	u_int32 badauth;	/* bad authentication */
  503: 	u_int32 received;	/* packets received */
  504: 	u_int32 limitrejected;	/* rate exceeded */
  505: };
  506: 
  507: 
  508: /*
  509:  * System stats - old version
  510:  */
  511: struct old_info_sys_stats {
  512: 	u_int32 timeup;		/* time since restart */
  513: 	u_int32 timereset;	/* time since reset */
  514: 	u_int32 denied;		/* access denied */
  515: 	u_int32 oldversionpkt;	/* recent version */
  516: 	u_int32 newversionpkt;	/* current version */
  517: 	u_int32 unknownversion;	/* bad version */
  518: 	u_int32 badlength;	/* bad length or format */
  519: 	u_int32 processed;	/* packets processed */
  520: 	u_int32 badauth;	/* bad authentication */
  521: 	u_int32 wanderhold;	/* (not used) */
  522: };
  523: 
  524: 
  525: /*
  526:  * Peer memory statistics.  Collected in the peer module.
  527:  */
  528: struct info_mem_stats {
  529: 	u_int32 timereset;	/* time since reset */
  530: 	u_short totalpeermem;
  531: 	u_short freepeermem;
  532: 	u_int32 findpeer_calls;
  533: 	u_int32 allocations;
  534: 	u_int32 demobilizations;
  535: 	u_char hashcount[NTP_HASH_SIZE];
  536: };
  537: 
  538: 
  539: /*
  540:  * I/O statistics.  Collected in the I/O module
  541:  */
  542: struct info_io_stats {
  543: 	u_int32 timereset;	/* time since reset */
  544: 	u_short totalrecvbufs;	/* total receive bufs */
  545: 	u_short freerecvbufs;	/* free buffers */
  546: 	u_short fullrecvbufs;	/* full buffers */
  547: 	u_short lowwater;	/* number of times we've added buffers */
  548: 	u_int32 dropped;	/* dropped packets */
  549: 	u_int32 ignored;	/* ignored packets */
  550: 	u_int32 received;	/* received packets */
  551: 	u_int32 sent;		/* packets sent */
  552: 	u_int32 notsent;	/* packets not sent */
  553: 	u_int32 interrupts;	/* interrupts we've handled */
  554: 	u_int32 int_received;	/* received by interrupt handler */
  555: };
  556: 
  557: 
  558: /*
  559:  * Timer stats.  Guess where from.
  560:  */
  561: struct info_timer_stats {
  562: 	u_int32 timereset;	/* time since reset */
  563: 	u_int32 alarms;		/* alarms we've handled */
  564: 	u_int32 overflows;	/* timer overflows */
  565: 	u_int32 xmtcalls;	/* calls to xmit */
  566: };
  567: 
  568: 
  569: /*
  570:  * Structure for passing peer configuration information
  571:  */
  572: struct old_conf_peer {
  573: 	u_int32 peeraddr;	/* address to poll */
  574: 	u_char hmode;		/* mode, either broadcast, active or client */
  575: 	u_char version;		/* version number to poll with */
  576: 	u_char minpoll;		/* min host poll interval */
  577: 	u_char maxpoll;		/* max host poll interval */
  578: 	u_char flags;		/* flags for this request */
  579: 	u_char ttl;		/* time to live (multicast) or refclock mode */
  580: 	u_short unused;		/* unused */
  581: 	keyid_t keyid;		/* key to use for this association */
  582: };
  583: 
  584: struct conf_peer {
  585: 	u_int32 peeraddr;	/* address to poll */
  586: 	u_char hmode;		/* mode, either broadcast, active or client */
  587: 	u_char version;		/* version number to poll with */
  588: 	u_char minpoll;		/* min host poll interval */
  589: 	u_char maxpoll;		/* max host poll interval */
  590: 	u_char flags;		/* flags for this request */
  591: 	u_char ttl;		/* time to live (multicast) or refclock mode */
  592: 	u_short unused1;	/* unused */
  593: 	keyid_t keyid;		/* key to use for this association */
  594: 	char keystr[MAXFILENAME]; /* public key file name*/
  595: 	u_int v6_flag;		/* is this v6 or not */
  596: 	u_int unused2;			/* unused, padding for peeraddr6 */
  597: 	struct in6_addr peeraddr6;	/* ipv6 address to poll */
  598: };
  599: 
  600: #define	CONF_FLAG_AUTHENABLE	0x01
  601: #define CONF_FLAG_PREFER	0x02
  602: #define CONF_FLAG_BURST		0x04
  603: #define CONF_FLAG_IBURST	0x08
  604: #define CONF_FLAG_NOSELECT	0x10
  605: #define CONF_FLAG_SKEY		0x20
  606: 
  607: /*
  608:  * Structure for passing peer deletion information.  Currently
  609:  * we only pass the address and delete all configured peers with
  610:  * this addess.
  611:  */
  612: struct conf_unpeer {
  613: 	u_int32 peeraddr;		/* address of peer */
  614: 	u_int v6_flag;			/* is this v6 or not */
  615: 	struct in6_addr peeraddr6;	/* address of peer (v6) */
  616: };
  617: 
  618: /*
  619:  * Structure for carrying system flags.
  620:  */
  621: struct conf_sys_flags {
  622: 	u_int32 flags;
  623: };
  624: 
  625: /*
  626:  * System flags we can set/clear
  627:  */
  628: #define	SYS_FLAG_BCLIENT	0x01
  629: #define	SYS_FLAG_PPS		0x02
  630: #define SYS_FLAG_NTP		0x04
  631: #define SYS_FLAG_KERNEL		0x08
  632: #define SYS_FLAG_MONITOR	0x10
  633: #define SYS_FLAG_FILEGEN	0x20
  634: #define SYS_FLAG_AUTH		0x40
  635: #define SYS_FLAG_CAL		0x80
  636: 
  637: /*
  638:  * Structure used for returning restrict entries
  639:  */
  640: struct info_restrict {
  641: 	u_int32 addr;		/* match address */
  642: 	u_int32 mask;		/* match mask */
  643: 	u_int32 count;		/* number of packets matched */
  644: 	u_short flags;		/* restrict flags */
  645: 	u_short mflags;		/* match flags */
  646: 	u_int v6_flag;		/* is this v6 or not */
  647: 	u_int unused1;		/* unused, padding for addr6 */
  648: 	struct in6_addr addr6;	/* match address (v6) */
  649: 	struct in6_addr mask6; 	/* match mask (v6) */
  650: };
  651: 
  652: 
  653: /*
  654:  * Structure used for specifying restrict entries
  655:  */
  656: struct conf_restrict {
  657: 	u_int32	addr;		/* match address */
  658: 	u_int32 mask;		/* match mask */
  659: 	u_short flags;		/* restrict flags */
  660: 	u_short mflags;		/* match flags */
  661: 	u_int v6_flag;		/* is this v6 or not */
  662: 	struct in6_addr addr6; 	/* match address (v6) */
  663: 	struct in6_addr mask6; 	/* match mask (v6) */
  664: };
  665: 
  666: 
  667: /*
  668:  * Structure used for returning monitor data
  669:  */
  670: struct info_monitor_1 {	
  671: 	u_int32 lasttime;	/* last packet from this host */
  672: 	u_int32 firsttime;	/* first time we received a packet */
  673: 	u_int32 restr;		/* restrict bits (was named lastdrop) */
  674: 	u_int32 count;		/* count of packets received */
  675: 	u_int32 addr;		/* host address V4 style */
  676: 	u_int32 daddr;		/* destination host address */
  677: 	u_int32 flags;		/* flags about destination */
  678: 	u_short port;		/* port number of last reception */
  679: 	u_char mode;		/* mode of last packet */
  680: 	u_char version;		/* version number of last packet */
  681: 	u_int v6_flag;		/* is this v6 or not */
  682: 	u_int unused1;		/* unused, padding for addr6 */
  683: 	struct in6_addr addr6;	/* host address V6 style */
  684: 	struct in6_addr daddr6;	/* host address V6 style */
  685: };
  686: 
  687: 
  688: /*
  689:  * Structure used for returning monitor data
  690:  */
  691: struct info_monitor {	
  692: 	u_int32 lasttime;	/* last packet from this host */
  693: 	u_int32 firsttime;	/* first time we received a packet */
  694: 	u_int32 restr;		/* restrict bits (was named lastdrop) */
  695: 	u_int32 count;		/* count of packets received */
  696: 	u_int32 addr;		/* host address */
  697: 	u_short port;		/* port number of last reception */
  698: 	u_char mode;		/* mode of last packet */
  699: 	u_char version;		/* version number of last packet */
  700: 	u_int v6_flag;		/* is this v6 or not */
  701: 	u_int unused1;		/* unused, padding for addr6 */
  702: 	struct in6_addr addr6;	/* host v6 address */
  703: };
  704: 
  705: /*
  706:  * Structure used for returning monitor data (old format)
  707:  */
  708: struct old_info_monitor {	
  709: 	u_int32 lasttime;	/* last packet from this host */
  710: 	u_int32 firsttime;	/* first time we received a packet */
  711: 	u_int32 count;		/* count of packets received */
  712: 	u_int32 addr;		/* host address */
  713: 	u_short port;		/* port number of last reception */
  714: 	u_char mode;		/* mode of last packet */
  715: 	u_char version;		/* version number of last packet */
  716: 	u_int v6_flag;		/* is this v6 or not */
  717: 	struct in6_addr addr6;	/* host address  (v6)*/
  718: };
  719: 
  720: /*
  721:  * Structure used for passing indication of flags to clear
  722:  */
  723: struct reset_flags {
  724: 	u_int32 flags;
  725: };
  726: 
  727: #define	RESET_FLAG_ALLPEERS	0x01
  728: #define	RESET_FLAG_IO		0x02
  729: #define	RESET_FLAG_SYS		0x04
  730: #define	RESET_FLAG_MEM		0x08
  731: #define	RESET_FLAG_TIMER	0x10
  732: #define	RESET_FLAG_AUTH		0x20
  733: #define	RESET_FLAG_CTL		0x40
  734: 
  735: #define	RESET_ALLFLAGS \
  736: 	(RESET_FLAG_ALLPEERS|RESET_FLAG_IO|RESET_FLAG_SYS \
  737: 	|RESET_FLAG_MEM|RESET_FLAG_TIMER|RESET_FLAG_AUTH|RESET_FLAG_CTL)
  738: 
  739: /*
  740:  * Structure used to return information concerning the authentication
  741:  * module.
  742:  */
  743: struct info_auth {
  744: 	u_int32 timereset;	/* time counters were reset */
  745: 	u_int32 numkeys;	/* number of keys we know */
  746: 	u_int32 numfreekeys;	/* number of free keys */
  747: 	u_int32 keylookups;	/* calls to authhavekey() */
  748: 	u_int32 keynotfound;	/* requested key unknown */
  749: 	u_int32 encryptions;	/* number of encryptions */
  750: 	u_int32 decryptions;	/* number of decryptions */
  751: 	u_int32 expired;	/* number of expired keys */
  752: 	u_int32 keyuncached;	/* calls to encrypt/decrypt with uncached key */
  753: };
  754: 
  755: 
  756: /*
  757:  * Structure used to pass trap information to the client
  758:  */
  759: struct info_trap {
  760: 	u_int32 local_address;	/* local interface addres (v4) */
  761: 	u_int32 trap_address;	/* remote client's addres (v4) */
  762: 	u_short trap_port;	/* remote port number */
  763: 	u_short sequence;	/* sequence number */
  764: 	u_int32 settime;	/* time trap last set */
  765: 	u_int32 origtime;	/* time trap originally set */
  766: 	u_int32 resets;		/* number of resets on this trap */
  767: 	u_int32 flags;		/* trap flags, as defined in ntp_control.h */
  768: 	u_int v6_flag;			/* is this v6 or not */
  769: 	struct in6_addr local_address6;	/* local interface address (v6) */
  770: 	struct in6_addr trap_address6;	/* remote client's address (v6) */
  771: };
  772: 
  773: /*
  774:  * Structure used to pass add/clear trap information to the client
  775:  */
  776: struct conf_trap {
  777: 	u_int32 local_address;	/* remote client's address */
  778: 	u_int32 trap_address;	/* local interface address */
  779: 	u_short trap_port;	/* remote client's port */
  780: 	u_short unused;		/* (unused) */
  781: 	u_int v6_flag;			/* is this v6 or not */
  782: 	struct in6_addr local_address6;	/* local interface address (v6) */
  783: 	struct in6_addr trap_address6;	/* remote client's address (v6) */
  784: };
  785: 
  786: 
  787: /*
  788:  * Structure used to return statistics from the control module
  789:  */
  790: struct info_control {
  791: 	u_int32 ctltimereset;
  792: 	u_int32 numctlreq;	/* number of requests we've received */
  793: 	u_int32 numctlbadpkts;	/* number of bad control packets */
  794: 	u_int32 numctlresponses;	/* # resp packets sent */
  795: 	u_int32 numctlfrags;	/* # of fragments sent */
  796: 	u_int32 numctlerrors;	/* number of error responses sent */
  797: 	u_int32 numctltooshort;	/* number of too short input packets */
  798: 	u_int32 numctlinputresp;	/* number of responses on input */
  799: 	u_int32 numctlinputfrag;	/* number of fragments on input */
  800: 	u_int32 numctlinputerr;	/* # input pkts with err bit set */
  801: 	u_int32 numctlbadoffset;	/* # input pkts with nonzero offset */
  802: 	u_int32 numctlbadversion;	/* # input pkts with unknown version */
  803: 	u_int32 numctldatatooshort;	/* data too short for count */
  804: 	u_int32 numctlbadop;	/* bad op code found in packet */
  805: 	u_int32 numasyncmsgs;		/* # async messages we've sent */
  806: };
  807: 
  808: 
  809: /*
  810:  * Structure used to return clock information
  811:  */
  812: struct info_clock {
  813: 	u_int32 clockadr;
  814: 	u_char type;
  815: 	u_char flags;
  816: 	u_char lastevent;
  817: 	u_char currentstatus;
  818: 	u_int32 polls;
  819: 	u_int32 noresponse;
  820: 	u_int32 badformat;
  821: 	u_int32 baddata;
  822: 	u_int32 timestarted;
  823: 	l_fp fudgetime1;
  824: 	l_fp fudgetime2;
  825: 	int32 fudgeval1;
  826: 	u_int32 fudgeval2;
  827: };
  828: 
  829: 
  830: /*
  831:  * Structure used for setting clock fudge factors
  832:  */
  833: struct conf_fudge {
  834: 	u_int32 clockadr;
  835: 	u_int32 which;
  836: 	l_fp fudgetime;
  837: 	u_int32 fudgeval_flags;
  838: };
  839: 
  840: #define	FUDGE_TIME1	1
  841: #define	FUDGE_TIME2	2
  842: #define	FUDGE_VAL1	3
  843: #define	FUDGE_VAL2	4
  844: #define	FUDGE_FLAGS	5
  845: 
  846: 
  847: /*
  848:  * Structure used for returning clock debugging info
  849:  */
  850: #define	NUMCBUGVALUES	16
  851: #define	NUMCBUGTIMES	32
  852: 
  853: struct info_clkbug {
  854: 	u_int32 clockadr;
  855: 	u_char nvalues;
  856: 	u_char ntimes;
  857: 	u_short svalues;
  858: 	u_int32 stimes;
  859: 	u_int32 values[NUMCBUGVALUES];
  860: 	l_fp times[NUMCBUGTIMES];
  861: };
  862: 
  863: /*
  864:  * Structure used for returning kernel pll/PPS information
  865:  */
  866: struct info_kernel {
  867: 	int32 offset;
  868: 	int32 freq;
  869: 	int32 maxerror;
  870: 	int32 esterror;
  871: 	u_short status;
  872: 	u_short shift;
  873: 	int32 constant;
  874: 	int32 precision;
  875: 	int32 tolerance;
  876: 
  877: /*
  878:  * Variables used only if PPS signal discipline is implemented
  879:  */
  880: 	int32 ppsfreq;
  881: 	int32 jitter;
  882: 	int32 stabil;
  883: 	int32 jitcnt;
  884: 	int32 calcnt;
  885: 	int32 errcnt;
  886: 	int32 stbcnt;
  887: };
  888: 
  889: /*
  890:  * interface statistics
  891:  */
  892: struct info_if_stats {
  893: 	union addrun unaddr;            /* address */
  894:         union addrun unbcast;	        /* broadcast */
  895: 	union addrun unmask;	        /* mask */
  896: 	u_int32 v6_flag;                /* is this v6 */
  897: 	char name[32];			/* name of interface */
  898: 	int32 flags;			/* interface flags */
  899: 	int32 last_ttl;			/* last TTL specified */
  900: 	int32 num_mcast;		/* No. of IP addresses in multicast socket */
  901:         int32 received;	                /* number of incoming packets */
  902: 	int32 sent;			/* number of outgoing packets */
  903: 	int32 notsent;			/* number of send failures */
  904: 	int32 uptime;		        /* number of seconds this interface was active */
  905: 	u_int32 scopeid;		/* Scope used for Multicasting */
  906: 	u_int32 ifindex;		/* interface index - from system */
  907: 	u_int32 ifnum;		        /* sequential interface number */
  908:         u_int32 peercnt;		/* number of peers referencinf this interface - informational only */
  909: 	u_short family;			/* Address family */
  910: 	u_char ignore_packets;	        /* Specify whether the packet should be ignored */
  911:         u_char action;		        /* reason the item is listed */
  912: 	int32 _filler0;		        /* pad to a 64 bit size boundary */
  913: };
  914: 
  915: #define IFS_EXISTS	1	/* just exists */
  916: #define IFS_CREATED	2	/* was just created */
  917: #define IFS_DELETED	3	/* was just delete */
  918: 
  919: /*
  920:  * Info returned with IP -> hostname lookup
  921:  */
  922: /* 144 might need to become 32, matching data[] member of req_pkt */
  923: #define NTP_MAXHOSTNAME (32 - sizeof(u_int32) - sizeof(u_short))
  924: struct info_dns_assoc {
  925: 	u_int32 peeraddr;	/* peer address (HMS: being careful...) */
  926: 	associd_t associd;	/* association ID */
  927: 	char hostname[NTP_MAXHOSTNAME];	/* hostname */
  928: };
  929: 
  930: /*
  931:  * function declarations
  932:  */
  933: int get_packet_mode(struct recvbuf *rbufp); /* Return packet mode */
  934: 
  935: #endif /* NTP_REQUEST_H */

FreeBSD-CVSweb <freebsd-cvsweb@FreeBSD.org>