2 * Copyright (c) 1997 - 2004 Kungliga Tekniska Högskolan
3 * (Royal Institute of Technology, Stockholm, Sweden).
6 * Redistribution and use in source and binary forms, with or without
7 * modification, are permitted provided that the following conditions
10 * 1. Redistributions of source code must retain the above copyright
11 * notice, this list of conditions and the following disclaimer.
13 * 2. Redistributions in binary form must reproduce the above copyright
14 * notice, this list of conditions and the following disclaimer in the
15 * documentation and/or other materials provided with the distribution.
17 * 3. Neither the name of the Institute nor the names of its contributors
18 * may be used to endorse or promote products derived from this software
19 * without specific prior written permission.
21 * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24 * ARE DISCLAIMED. IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
40 #include <krb5-types.h>
47 #include <krb5_asn1.h>
49 /* name confusion with MIT */
50 #ifndef KRB5KDC_ERR_KEY_EXP
51 #define KRB5KDC_ERR_KEY_EXP KRB5KDC_ERR_KEY_EXPIRED
54 /* simple constants */
61 typedef int krb5_boolean
;
63 typedef int32_t krb5_error_code
;
65 typedef int krb5_kvno
;
67 typedef u_int32_t krb5_flags
;
69 typedef void *krb5_pointer
;
70 typedef const void *krb5_const_pointer
;
72 struct krb5_crypto_data
;
73 typedef struct krb5_crypto_data
*krb5_crypto
;
75 typedef CKSUMTYPE krb5_cksumtype
;
77 typedef Checksum krb5_checksum
;
79 typedef ENCTYPE krb5_enctype
;
81 typedef heim_octet_string krb5_data
;
83 /* PKINIT related forward declarations */
85 struct krb5_pk_identity
;
88 /* krb5_enc_data is a mit compat structure */
89 typedef struct krb5_enc_data
{
95 /* alternative names */
97 ENCTYPE_NULL
= ETYPE_NULL
,
98 ENCTYPE_DES_CBC_CRC
= ETYPE_DES_CBC_CRC
,
99 ENCTYPE_DES_CBC_MD4
= ETYPE_DES_CBC_MD4
,
100 ENCTYPE_DES_CBC_MD5
= ETYPE_DES_CBC_MD5
,
101 ENCTYPE_DES3_CBC_MD5
= ETYPE_DES3_CBC_MD5
,
102 ENCTYPE_OLD_DES3_CBC_SHA1
= ETYPE_OLD_DES3_CBC_SHA1
,
103 ENCTYPE_SIGN_DSA_GENERATE
= ETYPE_SIGN_DSA_GENERATE
,
104 ENCTYPE_ENCRYPT_RSA_PRIV
= ETYPE_ENCRYPT_RSA_PRIV
,
105 ENCTYPE_ENCRYPT_RSA_PUB
= ETYPE_ENCRYPT_RSA_PUB
,
106 ENCTYPE_DES3_CBC_SHA1
= ETYPE_DES3_CBC_SHA1
,
107 ENCTYPE_AES128_CTS_HMAC_SHA1_96
= ETYPE_AES128_CTS_HMAC_SHA1_96
,
108 ENCTYPE_AES256_CTS_HMAC_SHA1_96
= ETYPE_AES256_CTS_HMAC_SHA1_96
,
109 ENCTYPE_ARCFOUR_HMAC
= ETYPE_ARCFOUR_HMAC_MD5
,
110 ENCTYPE_ARCFOUR_HMAC_MD5
= ETYPE_ARCFOUR_HMAC_MD5
,
111 ENCTYPE_ARCFOUR_HMAC_MD5_56
= ETYPE_ARCFOUR_HMAC_MD5_56
,
112 ENCTYPE_ENCTYPE_PK_CROSS
= ETYPE_ENCTYPE_PK_CROSS
,
113 ENCTYPE_DES_CBC_NONE
= ETYPE_DES_CBC_NONE
,
114 ENCTYPE_DES3_CBC_NONE
= ETYPE_DES3_CBC_NONE
,
115 ENCTYPE_DES_CFB64_NONE
= ETYPE_DES_CFB64_NONE
,
116 ENCTYPE_DES_PCBC_NONE
= ETYPE_DES_PCBC_NONE
119 typedef PADATA_TYPE krb5_preauthtype
;
121 typedef enum krb5_key_usage
{
122 KRB5_KU_PA_ENC_TIMESTAMP
= 1,
123 /* AS-REQ PA-ENC-TIMESTAMP padata timestamp, encrypted with the
124 client key (section 5.4.1) */
126 /* AS-REP Ticket and TGS-REP Ticket (includes tgs session key or
127 application session key), encrypted with the service key
129 KRB5_KU_AS_REP_ENC_PART
= 3,
130 /* AS-REP encrypted part (includes tgs session key or application
131 session key), encrypted with the client key (section 5.4.2) */
132 KRB5_KU_TGS_REQ_AUTH_DAT_SESSION
= 4,
133 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
134 session key (section 5.4.1) */
135 KRB5_KU_TGS_REQ_AUTH_DAT_SUBKEY
= 5,
136 /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
137 authenticator subkey (section 5.4.1) */
138 KRB5_KU_TGS_REQ_AUTH_CKSUM
= 6,
139 /* TGS-REQ PA-TGS-REQ padata AP-REQ Authenticator cksum, keyed
140 with the tgs session key (sections 5.3.2, 5.4.1) */
141 KRB5_KU_TGS_REQ_AUTH
= 7,
142 /* TGS-REQ PA-TGS-REQ padata AP-REQ Authenticator (includes tgs
143 authenticator subkey), encrypted with the tgs session key
145 KRB5_KU_TGS_REP_ENC_PART_SESSION
= 8,
146 /* TGS-REP encrypted part (includes application session key),
147 encrypted with the tgs session key (section 5.4.2) */
148 KRB5_KU_TGS_REP_ENC_PART_SUB_KEY
= 9,
149 /* TGS-REP encrypted part (includes application session key),
150 encrypted with the tgs authenticator subkey (section 5.4.2) */
151 KRB5_KU_AP_REQ_AUTH_CKSUM
= 10,
152 /* AP-REQ Authenticator cksum, keyed with the application session
153 key (section 5.3.2) */
154 KRB5_KU_AP_REQ_AUTH
= 11,
155 /* AP-REQ Authenticator (includes application authenticator
156 subkey), encrypted with the application session key (section
158 KRB5_KU_AP_REQ_ENC_PART
= 12,
159 /* AP-REP encrypted part (includes application session subkey),
160 encrypted with the application session key (section 5.5.2) */
161 KRB5_KU_KRB_PRIV
= 13,
162 /* KRB-PRIV encrypted part, encrypted with a key chosen by the
163 application (section 5.7.1) */
164 KRB5_KU_KRB_CRED
= 14,
165 /* KRB-CRED encrypted part, encrypted with a key chosen by the
166 application (section 5.8.1) */
167 KRB5_KU_KRB_SAFE_CKSUM
= 15,
168 /* KRB-SAFE cksum, keyed with a key chosen by the application
170 KRB5_KU_OTHER_ENCRYPTED
= 16,
171 /* Data which is defined in some specification outside of
172 Kerberos to be encrypted using an RFC1510 encryption type. */
173 KRB5_KU_OTHER_CKSUM
= 17,
174 /* Data which is defined in some specification outside of
175 Kerberos to be checksummed using an RFC1510 checksum type. */
176 KRB5_KU_KRB_ERROR
= 18,
177 /* Krb-error checksum */
178 KRB5_KU_AD_KDC_ISSUED
= 19,
179 /* AD-KDCIssued checksum */
180 KRB5_KU_MANDATORY_TICKET_EXTENSION
= 20,
181 /* Checksum for Mandatory Ticket Extensions */
182 KRB5_KU_AUTH_DATA_TICKET_EXTENSION
= 21,
183 /* Checksum in Authorization Data in Ticket Extensions */
184 KRB5_KU_USAGE_SEAL
= 22,
185 /* seal in GSSAPI krb5 mechanism */
186 KRB5_KU_USAGE_SIGN
= 23,
187 /* sign in GSSAPI krb5 mechanism */
188 KRB5_KU_USAGE_SEQ
= 24,
189 /* SEQ in GSSAPI krb5 mechanism */
190 KRB5_KU_USAGE_ACCEPTOR_SEAL
= 22,
191 /* acceptor sign in GSSAPI CFX krb5 mechanism */
192 KRB5_KU_USAGE_ACCEPTOR_SIGN
= 23,
193 /* acceptor seal in GSSAPI CFX krb5 mechanism */
194 KRB5_KU_USAGE_INITIATOR_SEAL
= 24,
195 /* initiator sign in GSSAPI CFX krb5 mechanism */
196 KRB5_KU_USAGE_INITIATOR_SIGN
= 25,
197 /* initiator seal in GSSAPI CFX krb5 mechanism */
198 KRB5_KU_PA_SERVER_REFERRAL_DATA
= 22,
199 /* encrypted server referral data */
200 KRB5_KU_SAM_CHECKSUM
= 25,
201 /* Checksum for the SAM-CHECKSUM field */
202 KRB5_KU_SAM_ENC_TRACK_ID
= 26,
203 /* Encryption of the SAM-TRACK-ID field */
204 KRB5_KU_PA_SERVER_REFERRAL
= 26,
205 /* Keyusage for the server referral in a TGS req */
206 KRB5_KU_SAM_ENC_NONCE_SAD
= 27
207 /* Encryption of the SAM-NONCE-OR-SAD field */
210 typedef krb5_key_usage krb5_keyusage
;
212 typedef enum krb5_salttype
{
213 KRB5_PW_SALT
= KRB5_PADATA_PW_SALT
,
214 KRB5_AFS3_SALT
= KRB5_PADATA_AFS3_SALT
217 typedef struct krb5_salt
{
218 krb5_salttype salttype
;
222 typedef ETYPE_INFO krb5_preauthinfo
;
225 krb5_preauthtype type
;
226 krb5_preauthinfo info
; /* list of preauthinfo for this type */
227 } krb5_preauthdata_entry
;
229 typedef struct krb5_preauthdata
{
231 krb5_preauthdata_entry
*val
;
234 typedef enum krb5_address_type
{
235 KRB5_ADDRESS_INET
= 2,
236 KRB5_ADDRESS_INET6
= 24,
237 KRB5_ADDRESS_ADDRPORT
= 256,
238 KRB5_ADDRESS_IPPORT
= 257
242 AP_OPTS_USE_SESSION_KEY
= 1,
243 AP_OPTS_MUTUAL_REQUIRED
= 2,
244 AP_OPTS_USE_SUBKEY
= 4 /* library internal */
247 typedef HostAddress krb5_address
;
249 typedef HostAddresses krb5_addresses
;
251 typedef enum krb5_keytype
{
257 KEYTYPE_ARCFOUR
= 23,
258 KEYTYPE_ARCFOUR_56
= 24,
259 KEYTYPE_RC2
= -0x1005,
260 KEYTYPE_AES192
= -0x1006
263 typedef EncryptionKey krb5_keyblock
;
265 typedef AP_REQ krb5_ap_req
;
269 #define KRB5_DEFAULT_CCFILE_ROOT "/tmp/krb5cc_"
271 #define KRB5_DEFAULT_CCROOT "FILE:" KRB5_DEFAULT_CCFILE_ROOT
273 #define KRB5_ACCEPT_NULL_ADDRESSES(C) \
274 krb5_config_get_bool_default((C), NULL, TRUE, \
275 "libdefaults", "accept_null_addresses", \
278 typedef void *krb5_cc_cursor
;
280 typedef struct krb5_ccache_data
{
281 const struct krb5_cc_ops
*ops
;
285 typedef struct krb5_ccache_data
*krb5_ccache
;
287 typedef struct krb5_context_data
*krb5_context
;
289 typedef Realm krb5_realm
;
290 typedef const char *krb5_const_realm
; /* stupid language */
292 #define krb5_realm_length(r) strlen(r)
293 #define krb5_realm_data(r) (r)
295 typedef Principal krb5_principal_data
;
296 typedef struct Principal
*krb5_principal
;
297 typedef const struct Principal
*krb5_const_principal
;
299 typedef time_t krb5_deltat
;
300 typedef time_t krb5_timestamp
;
302 typedef struct krb5_times
{
303 krb5_timestamp authtime
;
304 krb5_timestamp starttime
;
305 krb5_timestamp endtime
;
306 krb5_timestamp renew_till
;
314 /* options for krb5_get_in_tkt() */
315 #define KDC_OPT_FORWARDABLE (1 << 1)
316 #define KDC_OPT_FORWARDED (1 << 2)
317 #define KDC_OPT_PROXIABLE (1 << 3)
318 #define KDC_OPT_PROXY (1 << 4)
319 #define KDC_OPT_ALLOW_POSTDATE (1 << 5)
320 #define KDC_OPT_POSTDATED (1 << 6)
321 #define KDC_OPT_RENEWABLE (1 << 8)
322 #define KDC_OPT_REQUEST_ANONYMOUS (1 << 14)
323 #define KDC_OPT_DISABLE_TRANSITED_CHECK (1 << 26)
324 #define KDC_OPT_RENEWABLE_OK (1 << 27)
325 #define KDC_OPT_ENC_TKT_IN_SKEY (1 << 28)
326 #define KDC_OPT_RENEW (1 << 30)
327 #define KDC_OPT_VALIDATE (1 << 31)
334 /* flags for krb5_verify_ap_req */
336 #define KRB5_VERIFY_AP_REQ_IGNORE_INVALID (1 << 0)
338 #define KRB5_GC_CACHED (1U << 0)
339 #define KRB5_GC_USER_USER (1U << 1)
340 #define KRB5_GC_EXPIRED_OK (1U << 2)
342 /* constants for compare_creds (and cc_retrieve_cred) */
343 #define KRB5_TC_DONT_MATCH_REALM (1U << 31)
344 #define KRB5_TC_MATCH_KEYTYPE (1U << 30)
345 #define KRB5_TC_MATCH_KTYPE KRB5_TC_MATCH_KEYTYPE /* MIT name */
346 #define KRB5_TC_MATCH_SRV_NAMEONLY (1 << 29)
347 #define KRB5_TC_MATCH_FLAGS_EXACT (1 << 28)
348 #define KRB5_TC_MATCH_FLAGS (1 << 27)
349 #define KRB5_TC_MATCH_TIMES_EXACT (1 << 26)
350 #define KRB5_TC_MATCH_TIMES (1 << 25)
351 #define KRB5_TC_MATCH_AUTHDATA (1 << 24)
352 #define KRB5_TC_MATCH_2ND_TKT (1 << 23)
353 #define KRB5_TC_MATCH_IS_SKEY (1 << 22)
355 typedef AuthorizationData krb5_authdata
;
357 typedef KRB_ERROR krb5_error
;
359 typedef struct krb5_creds
{
360 krb5_principal client
;
361 krb5_principal server
;
362 krb5_keyblock session
;
365 krb5_data second_ticket
;
366 krb5_authdata authdata
;
367 krb5_addresses addresses
;
368 krb5_ticket_flags flags
;
371 typedef struct krb5_cc_ops
{
373 const char* (*get_name
)(krb5_context
, krb5_ccache
);
374 krb5_error_code (*resolve
)(krb5_context
, krb5_ccache
*, const char *);
375 krb5_error_code (*gen_new
)(krb5_context
, krb5_ccache
*);
376 krb5_error_code (*init
)(krb5_context
, krb5_ccache
, krb5_principal
);
377 krb5_error_code (*destroy
)(krb5_context
, krb5_ccache
);
378 krb5_error_code (*close
)(krb5_context
, krb5_ccache
);
379 krb5_error_code (*store
)(krb5_context
, krb5_ccache
, krb5_creds
*);
380 krb5_error_code (*retrieve
)(krb5_context
, krb5_ccache
,
381 krb5_flags
, const krb5_creds
*, krb5_creds
*);
382 krb5_error_code (*get_princ
)(krb5_context
, krb5_ccache
, krb5_principal
*);
383 krb5_error_code (*get_first
)(krb5_context
, krb5_ccache
, krb5_cc_cursor
*);
384 krb5_error_code (*get_next
)(krb5_context
, krb5_ccache
,
385 krb5_cc_cursor
*, krb5_creds
*);
386 krb5_error_code (*end_get
)(krb5_context
, krb5_ccache
, krb5_cc_cursor
*);
387 krb5_error_code (*remove_cred
)(krb5_context
, krb5_ccache
,
388 krb5_flags
, krb5_creds
*);
389 krb5_error_code (*set_flags
)(krb5_context
, krb5_ccache
, krb5_flags
);
390 int (*get_version
)(krb5_context
, krb5_ccache
);
393 struct krb5_log_facility
;
395 struct krb5_config_binding
{
396 enum { krb5_config_string
, krb5_config_list
} type
;
398 struct krb5_config_binding
*next
;
401 struct krb5_config_binding
*list
;
406 typedef struct krb5_config_binding krb5_config_binding
;
408 typedef krb5_config_binding krb5_config_section
;
410 typedef struct krb5_context_data
{
411 krb5_enctype
*etypes
;
412 krb5_enctype
*etypes_des
;
413 char **default_realms
;
416 unsigned max_retries
;
417 int32_t kdc_sec_offset
;
418 int32_t kdc_usec_offset
;
419 krb5_config_section
*cf
;
420 struct et_list
*et_list
;
421 struct krb5_log_facility
*warn_dest
;
424 const char *http_proxy
;
425 const char *time_fmt
;
426 krb5_boolean log_utc
;
427 const char *default_keytab
;
428 const char *default_keytab_modify
;
429 krb5_boolean use_admin_kdc
;
430 krb5_addresses
*extra_addresses
;
431 krb5_boolean scan_interfaces
; /* `ifconfig -a' */
432 krb5_boolean srv_lookup
; /* do SRV lookups */
433 krb5_boolean srv_try_txt
; /* try TXT records also */
434 int32_t fcache_vno
; /* create cache files w/ this
436 int num_kt_types
; /* # of registered keytab types */
437 struct krb5_keytab_data
*kt_types
; /* registered keytab types */
438 const char *date_fmt
;
441 krb5_addresses
*ignore_addresses
;
442 char *default_cc_name
;
444 void *mutex
; /* protects error_string/error_buf */
449 KRB5_PKINIT_WIN2K
= 1, /* wire compatible with Windows 2k */
450 KRB5_PKINIT_PACKET_CABLE
= 2 /* use packet cable standard */
453 typedef struct krb5_ticket
{
454 EncTicketPart ticket
;
455 krb5_principal client
;
456 krb5_principal server
;
459 typedef Authenticator krb5_authenticator_data
;
461 typedef krb5_authenticator_data
*krb5_authenticator
;
463 struct krb5_rcache_data
;
464 typedef struct krb5_rcache_data
*krb5_rcache
;
465 typedef Authenticator krb5_donot_replay
;
467 #define KRB5_STORAGE_HOST_BYTEORDER 0x01 /* old */
468 #define KRB5_STORAGE_PRINCIPAL_WRONG_NUM_COMPONENTS 0x02
469 #define KRB5_STORAGE_PRINCIPAL_NO_NAME_TYPE 0x04
470 #define KRB5_STORAGE_KEYBLOCK_KEYTYPE_TWICE 0x08
471 #define KRB5_STORAGE_BYTEORDER_MASK 0x60
472 #define KRB5_STORAGE_BYTEORDER_BE 0x00 /* default */
473 #define KRB5_STORAGE_BYTEORDER_LE 0x20
474 #define KRB5_STORAGE_BYTEORDER_HOST 0x40
475 #define KRB5_STORAGE_CREDS_FLAGS_WRONG_BITORDER 0x80
477 struct krb5_storage_data
;
478 typedef struct krb5_storage_data krb5_storage
;
480 typedef struct krb5_keytab_entry
{
481 krb5_principal principal
;
483 krb5_keyblock keyblock
;
487 typedef struct krb5_kt_cursor
{
493 struct krb5_keytab_data
;
495 typedef struct krb5_keytab_data
*krb5_keytab
;
497 #define KRB5_KT_PREFIX_MAX_LEN 30
499 struct krb5_keytab_data
{
501 krb5_error_code (*resolve
)(krb5_context
, const char*, krb5_keytab
);
502 krb5_error_code (*get_name
)(krb5_context
, krb5_keytab
, char*, size_t);
503 krb5_error_code (*close
)(krb5_context
, krb5_keytab
);
504 krb5_error_code (*get
)(krb5_context
, krb5_keytab
, krb5_const_principal
,
505 krb5_kvno
, krb5_enctype
, krb5_keytab_entry
*);
506 krb5_error_code (*start_seq_get
)(krb5_context
, krb5_keytab
, krb5_kt_cursor
*);
507 krb5_error_code (*next_entry
)(krb5_context
, krb5_keytab
,
508 krb5_keytab_entry
*, krb5_kt_cursor
*);
509 krb5_error_code (*end_seq_get
)(krb5_context
, krb5_keytab
, krb5_kt_cursor
*);
510 krb5_error_code (*add
)(krb5_context
, krb5_keytab
, krb5_keytab_entry
*);
511 krb5_error_code (*remove
)(krb5_context
, krb5_keytab
, krb5_keytab_entry
*);
516 typedef struct krb5_keytab_data krb5_kt_ops
;
518 struct krb5_keytab_key_proc_args
{
520 krb5_principal principal
;
523 typedef struct krb5_keytab_key_proc_args krb5_keytab_key_proc_args
;
525 typedef struct krb5_replay_data
{
526 krb5_timestamp timestamp
;
531 /* flags for krb5_auth_con_setflags */
533 KRB5_AUTH_CONTEXT_DO_TIME
= 1,
534 KRB5_AUTH_CONTEXT_RET_TIME
= 2,
535 KRB5_AUTH_CONTEXT_DO_SEQUENCE
= 4,
536 KRB5_AUTH_CONTEXT_RET_SEQUENCE
= 8,
537 KRB5_AUTH_CONTEXT_PERMIT_ALL
= 16,
538 KRB5_AUTH_CONTEXT_USE_SUBKEY
= 32,
539 KRB5_AUTH_CONTEXT_CLEAR_FORWARDED_CRED
= 64
542 /* flags for krb5_auth_con_genaddrs */
544 KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR
= 1,
545 KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR
= 3,
546 KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR
= 4,
547 KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR
= 12
550 typedef struct krb5_auth_context_data
{
553 krb5_address
*local_address
;
554 krb5_address
*remote_address
;
557 krb5_keyblock
*keyblock
;
558 krb5_keyblock
*local_subkey
;
559 krb5_keyblock
*remote_subkey
;
561 u_int32_t local_seqnumber
;
562 u_int32_t remote_seqnumber
;
564 krb5_authenticator authenticator
;
566 krb5_pointer i_vector
;
570 krb5_keytype keytype
; /* ¿requested key type ? */
571 krb5_cksumtype cksumtype
; /* ¡requested checksum type! */
573 }krb5_auth_context_data
, *krb5_auth_context
;
577 EncKDCRepPart enc_part
;
581 extern const char *heimdal_version
, *heimdal_long_version
;
583 typedef void (*krb5_log_log_func_t
)(const char*, const char*, void*);
584 typedef void (*krb5_log_close_func_t
)(void*);
586 typedef struct krb5_log_facility
{
589 struct facility
*val
;
592 typedef EncAPRepPart krb5_ap_rep_enc_part
;
594 #define KRB5_RECVAUTH_IGNORE_VERSION 1
596 #define KRB5_SENDAUTH_VERSION "KRB5_SENDAUTH_V1.0"
598 #define KRB5_TGS_NAME_SIZE (6)
599 #define KRB5_TGS_NAME ("krbtgt")
603 extern const char *krb5_config_file
;
604 extern const char *krb5_defkeyname
;
607 KRB5_PROMPT_TYPE_PASSWORD
= 0x1,
608 KRB5_PROMPT_TYPE_NEW_PASSWORD
= 0x2,
609 KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN
= 0x3,
610 KRB5_PROMPT_TYPE_PREAUTH
= 0x4
613 typedef struct _krb5_prompt
{
617 krb5_prompt_type type
;
620 typedef int (*krb5_prompter_fct
)(krb5_context context
,
625 krb5_prompt prompts
[]);
626 typedef krb5_error_code (*krb5_key_proc
)(krb5_context context
,
629 krb5_const_pointer keyseed
,
630 krb5_keyblock
**key
);
631 typedef krb5_error_code (*krb5_decrypt_proc
)(krb5_context context
,
633 krb5_key_usage usage
,
634 krb5_const_pointer decrypt_arg
,
635 krb5_kdc_rep
*dec_rep
);
636 typedef krb5_error_code (*krb5_s2k_proc
)(krb5_context context
,
638 krb5_const_pointer keyseed
,
641 krb5_keyblock
**key
);
643 struct _krb5_get_init_creds_opt_private
;
645 typedef struct _krb5_get_init_creds_opt
{
647 krb5_deltat tkt_life
;
648 krb5_deltat renew_life
;
652 krb5_enctype
*etype_list
;
653 int etype_list_length
;
654 krb5_addresses
*address_list
;
655 /* XXX the next three should not be used, as they may be
657 krb5_preauthtype
*preauth_list
;
658 int preauth_list_length
;
660 struct _krb5_get_init_creds_opt_private
*opt_private
;
661 } krb5_get_init_creds_opt
;
663 #define KRB5_GET_INIT_CREDS_OPT_TKT_LIFE 0x0001
664 #define KRB5_GET_INIT_CREDS_OPT_RENEW_LIFE 0x0002
665 #define KRB5_GET_INIT_CREDS_OPT_FORWARDABLE 0x0004
666 #define KRB5_GET_INIT_CREDS_OPT_PROXIABLE 0x0008
667 #define KRB5_GET_INIT_CREDS_OPT_ETYPE_LIST 0x0010
668 #define KRB5_GET_INIT_CREDS_OPT_ADDRESS_LIST 0x0020
669 #define KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST 0x0040
670 #define KRB5_GET_INIT_CREDS_OPT_SALT 0x0080
671 #define KRB5_GET_INIT_CREDS_OPT_ANONYMOUS 0x0100
672 #define KRB5_GET_INIT_CREDS_OPT_DISABLE_TRANSITED_CHECK 0x0200
674 typedef struct _krb5_verify_init_creds_opt
{
677 } krb5_verify_init_creds_opt
;
679 #define KRB5_VERIFY_INIT_CREDS_OPT_AP_REQ_NOFAIL 0x0001
681 typedef struct krb5_verify_opt
{
689 #define KRB5_VERIFY_LREALMS 1
690 #define KRB5_VERIFY_NO_ADDRESSES 2
692 extern const krb5_cc_ops krb5_acc_ops
;
693 extern const krb5_cc_ops krb5_fcc_ops
;
694 extern const krb5_cc_ops krb5_mcc_ops
;
695 extern const krb5_cc_ops krb5_kcm_ops
;
697 extern const krb5_kt_ops krb5_fkt_ops
;
698 extern const krb5_kt_ops krb5_wrfkt_ops
;
699 extern const krb5_kt_ops krb5_javakt_ops
;
700 extern const krb5_kt_ops krb5_mkt_ops
;
701 extern const krb5_kt_ops krb5_akf_ops
;
702 extern const krb5_kt_ops krb4_fkt_ops
;
703 extern const krb5_kt_ops krb5_srvtab_fkt_ops
;
704 extern const krb5_kt_ops krb5_any_ops
;
706 #define KRB5_KPASSWD_VERS_CHANGEPW 1
707 #define KRB5_KPASSWD_VERS_SETPW 0xff80
709 #define KRB5_KPASSWD_SUCCESS 0
710 #define KRB5_KPASSWD_MALFORMED 1
711 #define KRB5_KPASSWD_HARDERROR 2
712 #define KRB5_KPASSWD_AUTHERROR 3
713 #define KRB5_KPASSWD_SOFTERROR 4
714 #define KRB5_KPASSWD_ACCESSDENIED 5
715 #define KRB5_KPASSWD_BAD_VERSION 6
716 #define KRB5_KPASSWD_INITIAL_FLAG_NEEDED 7
718 #define KPASSWD_PORT 464
720 /* types for the new krbhst interface */
721 struct krb5_krbhst_data
;
722 typedef struct krb5_krbhst_data
*krb5_krbhst_handle
;
724 #define KRB5_KRBHST_KDC 1
725 #define KRB5_KRBHST_ADMIN 2
726 #define KRB5_KRBHST_CHANGEPW 3
727 #define KRB5_KRBHST_KRB524 4
729 typedef struct krb5_krbhst_info
{
730 enum { KRB5_KRBHST_UDP
,
732 KRB5_KRBHST_HTTP
} proto
;
734 unsigned short def_port
;
736 struct krb5_krbhst_info
*next
;
737 char hostname
[1]; /* has to come last */
740 /* flags for krb5_krbhst_init_flags (and krb5_send_to_kdc_flags) */
742 KRB5_KRBHST_FLAGS_MASTER
= 1,
743 KRB5_KRBHST_FLAGS_LARGE_MSG
= 2
746 struct credentials
; /* this is to keep the compiler happy */
750 #include <krb5-protos.h>
752 #endif /* __KRB5_H__ */