Home | History | Annotate | Line # | Download | only in krb5
krb5.h revision 1.1.1.2.12.1
      1 /*	$NetBSD: krb5.h,v 1.1.1.2.12.1 2017/08/30 06:54:30 snj Exp $	*/
      2 
      3 /*
      4  * Copyright (c) 1997 - 2007 Kungliga Tekniska Hgskolan
      5  * (Royal Institute of Technology, Stockholm, Sweden).
      6  * All rights reserved.
      7  *
      8  * Portions Copyright (c) 2009 Apple Inc. All rights reserved.
      9  *
     10  * Redistribution and use in source and binary forms, with or without
     11  * modification, are permitted provided that the following conditions
     12  * are met:
     13  *
     14  * 1. Redistributions of source code must retain the above copyright
     15  *    notice, this list of conditions and the following disclaimer.
     16  *
     17  * 2. Redistributions in binary form must reproduce the above copyright
     18  *    notice, this list of conditions and the following disclaimer in the
     19  *    documentation and/or other materials provided with the distribution.
     20  *
     21  * 3. Neither the name of the Institute nor the names of its contributors
     22  *    may be used to endorse or promote products derived from this software
     23  *    without specific prior written permission.
     24  *
     25  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
     26  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
     27  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
     28  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
     29  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
     30  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
     31  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
     32  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
     33  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
     34  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
     35  * SUCH DAMAGE.
     36  */
     37 
     38 /* Id */
     39 
     40 #ifndef __KRB5_H__
     41 #define __KRB5_H__
     42 
     43 #include <time.h>
     44 #include <krb5/krb5-types.h>
     45 
     46 #include <krb5/asn1_err.h>
     47 #include <krb5/krb5_err.h>
     48 #include <krb5/heim_err.h>
     49 #include <krb5/k524_err.h>
     50 
     51 #include <krb5/krb5_asn1.h>
     52 
     53 /* name confusion with MIT */
     54 #ifndef KRB5KDC_ERR_KEY_EXP
     55 #define KRB5KDC_ERR_KEY_EXP KRB5KDC_ERR_KEY_EXPIRED
     56 #endif
     57 
     58 #ifdef _WIN32
     59 #define KRB5_CALLCONV __stdcall
     60 #else
     61 #define KRB5_CALLCONV
     62 #endif
     63 
     64 /* simple constants */
     65 
     66 #ifndef TRUE
     67 #define TRUE  1
     68 #define FALSE 0
     69 #endif
     70 
     71 typedef int krb5_boolean;
     72 
     73 typedef int32_t krb5_error_code;
     74 
     75 typedef int32_t krb5_kvno;
     76 
     77 typedef uint32_t krb5_flags;
     78 
     79 typedef void *krb5_pointer;
     80 typedef const void *krb5_const_pointer;
     81 
     82 struct krb5_crypto_data;
     83 typedef struct krb5_crypto_data *krb5_crypto;
     84 
     85 struct krb5_get_creds_opt_data;
     86 typedef struct krb5_get_creds_opt_data *krb5_get_creds_opt;
     87 
     88 struct krb5_digest_data;
     89 typedef struct krb5_digest_data *krb5_digest;
     90 struct krb5_ntlm_data;
     91 typedef struct krb5_ntlm_data *krb5_ntlm;
     92 
     93 struct krb5_pac_data;
     94 typedef struct krb5_pac_data *krb5_pac;
     95 
     96 typedef struct krb5_rd_req_in_ctx_data *krb5_rd_req_in_ctx;
     97 typedef struct krb5_rd_req_out_ctx_data *krb5_rd_req_out_ctx;
     98 
     99 typedef CKSUMTYPE krb5_cksumtype;
    100 
    101 typedef Checksum krb5_checksum;
    102 
    103 typedef ENCTYPE krb5_enctype;
    104 
    105 typedef struct krb5_get_init_creds_ctx *krb5_init_creds_context;
    106 
    107 typedef heim_octet_string krb5_data;
    108 
    109 /* PKINIT related forward declarations */
    110 struct ContentInfo;
    111 struct krb5_pk_identity;
    112 struct krb5_pk_cert;
    113 
    114 /* krb5_enc_data is a mit compat structure */
    115 typedef struct krb5_enc_data {
    116     krb5_enctype enctype;
    117     krb5_kvno kvno;
    118     krb5_data ciphertext;
    119 } krb5_enc_data;
    120 
    121 /* alternative names */
    122 enum {
    123     ENCTYPE_NULL		= KRB5_ENCTYPE_NULL,
    124     ENCTYPE_DES_CBC_CRC		= KRB5_ENCTYPE_DES_CBC_CRC,
    125     ENCTYPE_DES_CBC_MD4		= KRB5_ENCTYPE_DES_CBC_MD4,
    126     ENCTYPE_DES_CBC_MD5		= KRB5_ENCTYPE_DES_CBC_MD5,
    127     ENCTYPE_DES3_CBC_MD5	= KRB5_ENCTYPE_DES3_CBC_MD5,
    128     ENCTYPE_OLD_DES3_CBC_SHA1	= KRB5_ENCTYPE_OLD_DES3_CBC_SHA1,
    129     ENCTYPE_SIGN_DSA_GENERATE	= KRB5_ENCTYPE_SIGN_DSA_GENERATE,
    130     ENCTYPE_ENCRYPT_RSA_PRIV	= KRB5_ENCTYPE_ENCRYPT_RSA_PRIV,
    131     ENCTYPE_ENCRYPT_RSA_PUB	= KRB5_ENCTYPE_ENCRYPT_RSA_PUB,
    132     ENCTYPE_DES3_CBC_SHA1	= KRB5_ENCTYPE_DES3_CBC_SHA1,
    133     ENCTYPE_AES128_CTS_HMAC_SHA1_96 = KRB5_ENCTYPE_AES128_CTS_HMAC_SHA1_96,
    134     ENCTYPE_AES256_CTS_HMAC_SHA1_96 = KRB5_ENCTYPE_AES256_CTS_HMAC_SHA1_96,
    135     ENCTYPE_ARCFOUR_HMAC	= KRB5_ENCTYPE_ARCFOUR_HMAC_MD5,
    136     ENCTYPE_ARCFOUR_HMAC_MD5	= KRB5_ENCTYPE_ARCFOUR_HMAC_MD5,
    137     ENCTYPE_ARCFOUR_HMAC_MD5_56	= KRB5_ENCTYPE_ARCFOUR_HMAC_MD5_56,
    138     ENCTYPE_ENCTYPE_PK_CROSS	= KRB5_ENCTYPE_ENCTYPE_PK_CROSS,
    139     ENCTYPE_DES_CBC_NONE	= KRB5_ENCTYPE_DES_CBC_NONE,
    140     ENCTYPE_DES3_CBC_NONE	= KRB5_ENCTYPE_DES3_CBC_NONE,
    141     ENCTYPE_DES_CFB64_NONE	= KRB5_ENCTYPE_DES_CFB64_NONE,
    142     ENCTYPE_DES_PCBC_NONE	= KRB5_ENCTYPE_DES_PCBC_NONE,
    143     ETYPE_NULL			= KRB5_ENCTYPE_NULL,
    144     ETYPE_DES_CBC_CRC		= KRB5_ENCTYPE_DES_CBC_CRC,
    145     ETYPE_DES_CBC_MD4		= KRB5_ENCTYPE_DES_CBC_MD4,
    146     ETYPE_DES_CBC_MD5		= KRB5_ENCTYPE_DES_CBC_MD5,
    147     ETYPE_DES3_CBC_MD5		= KRB5_ENCTYPE_DES3_CBC_MD5,
    148     ETYPE_OLD_DES3_CBC_SHA1	= KRB5_ENCTYPE_OLD_DES3_CBC_SHA1,
    149     ETYPE_SIGN_DSA_GENERATE	= KRB5_ENCTYPE_SIGN_DSA_GENERATE,
    150     ETYPE_ENCRYPT_RSA_PRIV	= KRB5_ENCTYPE_ENCRYPT_RSA_PRIV,
    151     ETYPE_ENCRYPT_RSA_PUB	= KRB5_ENCTYPE_ENCRYPT_RSA_PUB,
    152     ETYPE_DES3_CBC_SHA1		= KRB5_ENCTYPE_DES3_CBC_SHA1,
    153     ETYPE_AES128_CTS_HMAC_SHA1_96	= KRB5_ENCTYPE_AES128_CTS_HMAC_SHA1_96,
    154     ETYPE_AES256_CTS_HMAC_SHA1_96	= KRB5_ENCTYPE_AES256_CTS_HMAC_SHA1_96,
    155     ETYPE_AES128_CTS_HMAC_SHA256_128	= KRB5_ENCTYPE_AES128_CTS_HMAC_SHA256_128,
    156     ETYPE_AES256_CTS_HMAC_SHA384_192	= KRB5_ENCTYPE_AES256_CTS_HMAC_SHA384_192,
    157     ETYPE_ARCFOUR_HMAC_MD5	= KRB5_ENCTYPE_ARCFOUR_HMAC_MD5,
    158     ETYPE_ARCFOUR_HMAC_MD5_56	= KRB5_ENCTYPE_ARCFOUR_HMAC_MD5_56,
    159     ETYPE_ENCTYPE_PK_CROSS	= KRB5_ENCTYPE_ENCTYPE_PK_CROSS,
    160     ETYPE_ARCFOUR_MD4		= KRB5_ENCTYPE_ARCFOUR_MD4,
    161     ETYPE_ARCFOUR_HMAC_OLD	= KRB5_ENCTYPE_ARCFOUR_HMAC_OLD,
    162     ETYPE_ARCFOUR_HMAC_OLD_EXP	= KRB5_ENCTYPE_ARCFOUR_HMAC_OLD_EXP,
    163     ETYPE_DES_CBC_NONE		= KRB5_ENCTYPE_DES_CBC_NONE,
    164     ETYPE_DES3_CBC_NONE		= KRB5_ENCTYPE_DES3_CBC_NONE,
    165     ETYPE_DES_CFB64_NONE	= KRB5_ENCTYPE_DES_CFB64_NONE,
    166     ETYPE_DES_PCBC_NONE		= KRB5_ENCTYPE_DES_PCBC_NONE,
    167     ETYPE_DIGEST_MD5_NONE	= KRB5_ENCTYPE_DIGEST_MD5_NONE,
    168     ETYPE_CRAM_MD5_NONE		= KRB5_ENCTYPE_CRAM_MD5_NONE
    169 
    170 };
    171 
    172 /* PDU types */
    173 typedef enum krb5_pdu {
    174     KRB5_PDU_ERROR = 0,
    175     KRB5_PDU_TICKET = 1,
    176     KRB5_PDU_AS_REQUEST = 2,
    177     KRB5_PDU_AS_REPLY = 3,
    178     KRB5_PDU_TGS_REQUEST = 4,
    179     KRB5_PDU_TGS_REPLY = 5,
    180     KRB5_PDU_AP_REQUEST = 6,
    181     KRB5_PDU_AP_REPLY = 7,
    182     KRB5_PDU_KRB_SAFE = 8,
    183     KRB5_PDU_KRB_PRIV = 9,
    184     KRB5_PDU_KRB_CRED = 10,
    185     KRB5_PDU_NONE = 11 /* See krb5_get_permitted_enctypes() */
    186 } krb5_pdu;
    187 
    188 typedef PADATA_TYPE krb5_preauthtype;
    189 
    190 typedef enum krb5_key_usage {
    191     KRB5_KU_PA_ENC_TIMESTAMP = 1,
    192     /* AS-REQ PA-ENC-TIMESTAMP padata timestamp, encrypted with the
    193        client key (section 5.4.1) */
    194     KRB5_KU_TICKET = 2,
    195     /* AS-REP Ticket and TGS-REP Ticket (includes tgs session key or
    196        application session key), encrypted with the service key
    197        (section 5.4.2) */
    198     KRB5_KU_AS_REP_ENC_PART = 3,
    199     /* AS-REP encrypted part (includes tgs session key or application
    200        session key), encrypted with the client key (section 5.4.2) */
    201     KRB5_KU_TGS_REQ_AUTH_DAT_SESSION = 4,
    202     /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
    203        session key (section 5.4.1) */
    204     KRB5_KU_TGS_REQ_AUTH_DAT_SUBKEY = 5,
    205     /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
    206           authenticator subkey (section 5.4.1) */
    207     KRB5_KU_TGS_REQ_AUTH_CKSUM = 6,
    208     /* TGS-REQ PA-TGS-REQ padata AP-REQ Authenticator cksum, keyed
    209        with the tgs session key (sections 5.3.2, 5.4.1) */
    210     KRB5_KU_TGS_REQ_AUTH = 7,
    211     /* TGS-REQ PA-TGS-REQ padata AP-REQ Authenticator (includes tgs
    212        authenticator subkey), encrypted with the tgs session key
    213        (section 5.3.2) */
    214     KRB5_KU_TGS_REP_ENC_PART_SESSION = 8,
    215     /* TGS-REP encrypted part (includes application session key),
    216        encrypted with the tgs session key (section 5.4.2) */
    217     KRB5_KU_TGS_REP_ENC_PART_SUB_KEY = 9,
    218     /* TGS-REP encrypted part (includes application session key),
    219        encrypted with the tgs authenticator subkey (section 5.4.2) */
    220     KRB5_KU_AP_REQ_AUTH_CKSUM = 10,
    221     /* AP-REQ Authenticator cksum, keyed with the application session
    222        key (section 5.3.2) */
    223     KRB5_KU_AP_REQ_AUTH = 11,
    224     /* AP-REQ Authenticator (includes application authenticator
    225        subkey), encrypted with the application session key (section
    226        5.3.2) */
    227     KRB5_KU_AP_REQ_ENC_PART = 12,
    228     /* AP-REP encrypted part (includes application session subkey),
    229        encrypted with the application session key (section 5.5.2) */
    230     KRB5_KU_KRB_PRIV = 13,
    231     /* KRB-PRIV encrypted part, encrypted with a key chosen by the
    232        application (section 5.7.1) */
    233     KRB5_KU_KRB_CRED = 14,
    234     /* KRB-CRED encrypted part, encrypted with a key chosen by the
    235        application (section 5.8.1) */
    236     KRB5_KU_KRB_SAFE_CKSUM = 15,
    237     /* KRB-SAFE cksum, keyed with a key chosen by the application
    238        (section 5.6.1) */
    239     KRB5_KU_OTHER_ENCRYPTED = 16,
    240     /* Data which is defined in some specification outside of
    241        Kerberos to be encrypted using an RFC1510 encryption type. */
    242     KRB5_KU_OTHER_CKSUM = 17,
    243     /* Data which is defined in some specification outside of
    244        Kerberos to be checksummed using an RFC1510 checksum type. */
    245     KRB5_KU_KRB_ERROR = 18,
    246     /* Krb-error checksum */
    247     KRB5_KU_AD_KDC_ISSUED = 19,
    248     /* AD-KDCIssued checksum */
    249     KRB5_KU_MANDATORY_TICKET_EXTENSION = 20,
    250     /* Checksum for Mandatory Ticket Extensions */
    251     KRB5_KU_AUTH_DATA_TICKET_EXTENSION = 21,
    252     /* Checksum in Authorization Data in Ticket Extensions */
    253     KRB5_KU_USAGE_SEAL = 22,
    254     /* seal in GSSAPI krb5 mechanism */
    255     KRB5_KU_USAGE_SIGN = 23,
    256     /* sign in GSSAPI krb5 mechanism */
    257     KRB5_KU_USAGE_SEQ = 24,
    258     /* SEQ in GSSAPI krb5 mechanism */
    259     KRB5_KU_USAGE_ACCEPTOR_SEAL = 22,
    260     /* acceptor sign in GSSAPI CFX krb5 mechanism */
    261     KRB5_KU_USAGE_ACCEPTOR_SIGN = 23,
    262     /* acceptor seal in GSSAPI CFX krb5 mechanism */
    263     KRB5_KU_USAGE_INITIATOR_SEAL = 24,
    264     /* initiator sign in GSSAPI CFX krb5 mechanism */
    265     KRB5_KU_USAGE_INITIATOR_SIGN = 25,
    266     /* initiator seal in GSSAPI CFX krb5 mechanism */
    267     KRB5_KU_PA_SERVER_REFERRAL_DATA = 22,
    268     /* encrypted server referral data */
    269     KRB5_KU_SAM_CHECKSUM = 25,
    270     /* Checksum for the SAM-CHECKSUM field */
    271     KRB5_KU_SAM_ENC_TRACK_ID = 26,
    272     /* Encryption of the SAM-TRACK-ID field */
    273     KRB5_KU_PA_SERVER_REFERRAL = 26,
    274     /* Keyusage for the server referral in a TGS req */
    275     KRB5_KU_SAM_ENC_NONCE_SAD = 27,
    276     /* Encryption of the SAM-NONCE-OR-SAD field */
    277     KRB5_KU_PA_PKINIT_KX = 44,
    278     /* Encryption type of the kdc session contribution in pk-init */
    279     KRB5_KU_AS_REQ = 56,
    280     /* Checksum of over the AS-REQ send by the KDC in PA-REQ-ENC-PA-REP */
    281     KRB5_KU_FAST_REQ_CHKSUM = 50,
    282     /* FAST armor checksum */
    283     KRB5_KU_FAST_ENC = 51,
    284     /* FAST armor encryption */
    285     KRB5_KU_FAST_REP = 52,
    286     /* FAST armor reply */
    287     KRB5_KU_FAST_FINISHED = 53,
    288     /* FAST finished checksum */
    289     KRB5_KU_ENC_CHALLENGE_CLIENT = 54,
    290     /* fast challenge from client */
    291     KRB5_KU_ENC_CHALLENGE_KDC = 55,
    292     /* fast challenge from kdc */
    293     KRB5_KU_DIGEST_ENCRYPT = -18,
    294     /* Encryption key usage used in the digest encryption field */
    295     KRB5_KU_DIGEST_OPAQUE = -19,
    296     /* Checksum key usage used in the digest opaque field */
    297     KRB5_KU_KRB5SIGNEDPATH = -21,
    298     /* Checksum key usage on KRB5SignedPath */
    299     KRB5_KU_CANONICALIZED_NAMES = -23,
    300     /* Checksum key usage on PA-CANONICALIZED */
    301     KRB5_KU_H5L_COOKIE = -25
    302     /* encrypted foo */
    303 } krb5_key_usage;
    304 
    305 typedef krb5_key_usage krb5_keyusage;
    306 
    307 typedef enum krb5_salttype {
    308     KRB5_PW_SALT = KRB5_PADATA_PW_SALT,
    309     KRB5_AFS3_SALT = KRB5_PADATA_AFS3_SALT
    310 }krb5_salttype;
    311 
    312 typedef struct krb5_salt {
    313     krb5_salttype salttype;
    314     krb5_data saltvalue;
    315 } krb5_salt;
    316 
    317 typedef ETYPE_INFO krb5_preauthinfo;
    318 
    319 typedef struct {
    320     krb5_preauthtype type;
    321     krb5_preauthinfo info; /* list of preauthinfo for this type */
    322 } krb5_preauthdata_entry;
    323 
    324 typedef struct krb5_preauthdata {
    325     unsigned len;
    326     krb5_preauthdata_entry *val;
    327 }krb5_preauthdata;
    328 
    329 typedef enum krb5_address_type {
    330     KRB5_ADDRESS_INET     =   2,
    331     KRB5_ADDRESS_NETBIOS  =  20,
    332     KRB5_ADDRESS_INET6    =  24,
    333     KRB5_ADDRESS_ADDRPORT = 256,
    334     KRB5_ADDRESS_IPPORT   = 257
    335 } krb5_address_type;
    336 
    337 enum {
    338   AP_OPTS_USE_SESSION_KEY = 1,
    339   AP_OPTS_MUTUAL_REQUIRED = 2,
    340   AP_OPTS_USE_SUBKEY = 4		/* library internal */
    341 };
    342 
    343 typedef HostAddress krb5_address;
    344 
    345 typedef HostAddresses krb5_addresses;
    346 
    347 typedef krb5_enctype krb5_keytype;
    348 
    349 enum krb5_keytype_old {
    350     KEYTYPE_NULL	= ETYPE_NULL,
    351     KEYTYPE_DES		= ETYPE_DES_CBC_CRC,
    352     KEYTYPE_DES3	= ETYPE_OLD_DES3_CBC_SHA1,
    353     KEYTYPE_AES128	= ETYPE_AES128_CTS_HMAC_SHA1_96,
    354     KEYTYPE_AES256	= ETYPE_AES256_CTS_HMAC_SHA1_96,
    355     KEYTYPE_ARCFOUR	= ETYPE_ARCFOUR_HMAC_MD5,
    356     KEYTYPE_ARCFOUR_56	= ETYPE_ARCFOUR_HMAC_MD5_56
    357 };
    358 
    359 typedef EncryptionKey krb5_keyblock;
    360 
    361 typedef AP_REQ krb5_ap_req;
    362 
    363 struct krb5_cc_ops;
    364 
    365 #ifdef _WIN32
    366 #define KRB5_USE_PATH_TOKENS 1
    367 #endif
    368 
    369 #ifdef KRB5_USE_PATH_TOKENS
    370 #define KRB5_DEFAULT_CCFILE_ROOT "%{TEMP}/krb5cc_"
    371 #else
    372 #define KRB5_DEFAULT_CCFILE_ROOT "/tmp/krb5cc_"
    373 #endif
    374 
    375 #define KRB5_DEFAULT_CCROOT "FILE:" KRB5_DEFAULT_CCFILE_ROOT
    376 
    377 #define KRB5_ACCEPT_NULL_ADDRESSES(C) 					 \
    378     krb5_config_get_bool_default((C), NULL, TRUE, 			 \
    379 				 "libdefaults", "accept_null_addresses", \
    380 				 NULL)
    381 
    382 typedef void *krb5_cc_cursor;
    383 typedef struct krb5_cccol_cursor_data *krb5_cccol_cursor;
    384 
    385 typedef struct krb5_ccache_data {
    386     const struct krb5_cc_ops *ops;
    387     krb5_data data;
    388     int initialized; /* if non-zero: krb5_cc_initialize() called, now empty */
    389 }krb5_ccache_data;
    390 
    391 typedef struct krb5_ccache_data *krb5_ccache;
    392 
    393 typedef struct krb5_context_data *krb5_context;
    394 
    395 typedef Realm krb5_realm;
    396 typedef const char *krb5_const_realm; /* stupid language */
    397 
    398 #define krb5_realm_length(r) strlen(r)
    399 #define krb5_realm_data(r) (r)
    400 
    401 typedef Principal krb5_principal_data;
    402 typedef struct Principal *krb5_principal;
    403 typedef const struct Principal *krb5_const_principal;
    404 typedef struct Principals *krb5_principals;
    405 
    406 typedef time_t krb5_deltat;
    407 typedef time_t krb5_timestamp;
    408 
    409 typedef struct krb5_times {
    410   krb5_timestamp authtime;
    411   krb5_timestamp starttime;
    412   krb5_timestamp endtime;
    413   krb5_timestamp renew_till;
    414 } krb5_times;
    415 
    416 typedef union {
    417     TicketFlags b;
    418     krb5_flags i;
    419 } krb5_ticket_flags;
    420 
    421 /* options for krb5_get_in_tkt() */
    422 #define KDC_OPT_FORWARDABLE		(1 << 1)
    423 #define KDC_OPT_FORWARDED		(1 << 2)
    424 #define KDC_OPT_PROXIABLE		(1 << 3)
    425 #define KDC_OPT_PROXY			(1 << 4)
    426 #define KDC_OPT_ALLOW_POSTDATE		(1 << 5)
    427 #define KDC_OPT_POSTDATED		(1 << 6)
    428 #define KDC_OPT_RENEWABLE		(1 << 8)
    429 #define KDC_OPT_REQUEST_ANONYMOUS	(1 << 14)
    430 #define KDC_OPT_DISABLE_TRANSITED_CHECK	(1 << 26)
    431 #define KDC_OPT_RENEWABLE_OK		(1 << 27)
    432 #define KDC_OPT_ENC_TKT_IN_SKEY		(1 << 28)
    433 #define KDC_OPT_RENEW			(1 << 30)
    434 #define KDC_OPT_VALIDATE		(1 << 31)
    435 
    436 typedef union {
    437     KDCOptions b;
    438     krb5_flags i;
    439 } krb5_kdc_flags;
    440 
    441 /* flags for krb5_verify_ap_req */
    442 
    443 #define KRB5_VERIFY_AP_REQ_IGNORE_INVALID	(1 << 0)
    444 
    445 #define KRB5_GC_CACHED			(1U << 0)
    446 #define KRB5_GC_USER_USER		(1U << 1)
    447 #define KRB5_GC_EXPIRED_OK		(1U << 2)
    448 #define KRB5_GC_NO_STORE		(1U << 3)
    449 #define KRB5_GC_FORWARDABLE		(1U << 4)
    450 #define KRB5_GC_NO_TRANSIT_CHECK	(1U << 5)
    451 #define KRB5_GC_CONSTRAINED_DELEGATION	(1U << 6)
    452 #define KRB5_GC_CANONICALIZE		(1U << 7)
    453 
    454 /* constants for compare_creds (and cc_retrieve_cred) */
    455 #define KRB5_TC_DONT_MATCH_REALM	(1U << 31)
    456 #define KRB5_TC_MATCH_KEYTYPE		(1U << 30)
    457 #define KRB5_TC_MATCH_KTYPE		KRB5_TC_MATCH_KEYTYPE    /* MIT name */
    458 #define KRB5_TC_MATCH_SRV_NAMEONLY	(1 << 29)
    459 #define KRB5_TC_MATCH_FLAGS_EXACT	(1 << 28)
    460 #define KRB5_TC_MATCH_FLAGS		(1 << 27)
    461 #define KRB5_TC_MATCH_TIMES_EXACT	(1 << 26)
    462 #define KRB5_TC_MATCH_TIMES		(1 << 25)
    463 #define KRB5_TC_MATCH_AUTHDATA		(1 << 24)
    464 #define KRB5_TC_MATCH_2ND_TKT		(1 << 23)
    465 #define KRB5_TC_MATCH_IS_SKEY		(1 << 22)
    466 
    467 /* constants for get_flags and set_flags */
    468 #define KRB5_TC_OPENCLOSE 0x00000001
    469 #define KRB5_TC_NOTICKET  0x00000002
    470 
    471 typedef AuthorizationData krb5_authdata;
    472 
    473 typedef KRB_ERROR krb5_error;
    474 
    475 typedef struct krb5_creds {
    476     krb5_principal client;
    477     krb5_principal server;
    478     krb5_keyblock session;
    479     krb5_times times;
    480     krb5_data ticket;
    481     krb5_data second_ticket;
    482     krb5_authdata authdata;
    483     krb5_addresses addresses;
    484     krb5_ticket_flags flags;
    485 } krb5_creds;
    486 
    487 typedef struct krb5_cc_cache_cursor_data *krb5_cc_cache_cursor;
    488 
    489 #define KRB5_CC_OPS_VERSION 3
    490 
    491 typedef struct krb5_cc_ops {
    492     int version;
    493     const char *prefix;
    494     const char* (KRB5_CALLCONV * get_name)(krb5_context, krb5_ccache);
    495     krb5_error_code (KRB5_CALLCONV * resolve)(krb5_context, krb5_ccache *, const char *);
    496     krb5_error_code (KRB5_CALLCONV * gen_new)(krb5_context, krb5_ccache *);
    497     krb5_error_code (KRB5_CALLCONV * init)(krb5_context, krb5_ccache, krb5_principal);
    498     krb5_error_code (KRB5_CALLCONV * destroy)(krb5_context, krb5_ccache);
    499     krb5_error_code (KRB5_CALLCONV * close)(krb5_context, krb5_ccache);
    500     krb5_error_code (KRB5_CALLCONV * store)(krb5_context, krb5_ccache, krb5_creds*);
    501     krb5_error_code (KRB5_CALLCONV * retrieve)(krb5_context, krb5_ccache,
    502 					       krb5_flags, const krb5_creds*, krb5_creds *);
    503     krb5_error_code (KRB5_CALLCONV * get_princ)(krb5_context, krb5_ccache, krb5_principal*);
    504     krb5_error_code (KRB5_CALLCONV * get_first)(krb5_context, krb5_ccache, krb5_cc_cursor *);
    505     krb5_error_code (KRB5_CALLCONV * get_next)(krb5_context, krb5_ccache,
    506 					       krb5_cc_cursor*, krb5_creds*);
    507     krb5_error_code (KRB5_CALLCONV * end_get)(krb5_context, krb5_ccache, krb5_cc_cursor*);
    508     krb5_error_code (KRB5_CALLCONV * remove_cred)(krb5_context, krb5_ccache,
    509 						  krb5_flags, krb5_creds*);
    510     krb5_error_code (KRB5_CALLCONV * set_flags)(krb5_context, krb5_ccache, krb5_flags);
    511     int (KRB5_CALLCONV * get_version)(krb5_context, krb5_ccache);
    512     krb5_error_code (KRB5_CALLCONV * get_cache_first)(krb5_context, krb5_cc_cursor *);
    513     krb5_error_code (KRB5_CALLCONV * get_cache_next)(krb5_context, krb5_cc_cursor,
    514 						     krb5_ccache *);
    515     krb5_error_code (KRB5_CALLCONV * end_cache_get)(krb5_context, krb5_cc_cursor);
    516     krb5_error_code (KRB5_CALLCONV * move)(krb5_context, krb5_ccache, krb5_ccache);
    517     krb5_error_code (KRB5_CALLCONV * get_default_name)(krb5_context, char **);
    518     krb5_error_code (KRB5_CALLCONV * set_default)(krb5_context, krb5_ccache);
    519     krb5_error_code (KRB5_CALLCONV * lastchange)(krb5_context, krb5_ccache, krb5_timestamp *);
    520     krb5_error_code (KRB5_CALLCONV * set_kdc_offset)(krb5_context, krb5_ccache, krb5_deltat);
    521     krb5_error_code (KRB5_CALLCONV * get_kdc_offset)(krb5_context, krb5_ccache, krb5_deltat *);
    522 } krb5_cc_ops;
    523 
    524 struct krb5_log_facility;
    525 
    526 struct krb5_config_binding {
    527     enum { krb5_config_string, krb5_config_list } type;
    528     char *name;
    529     struct krb5_config_binding *next;
    530     union {
    531 	char *string;
    532 	struct krb5_config_binding *list;
    533 	void *generic;
    534     } u;
    535 };
    536 
    537 typedef struct krb5_config_binding krb5_config_binding;
    538 
    539 typedef krb5_config_binding krb5_config_section;
    540 
    541 typedef struct krb5_ticket {
    542     EncTicketPart ticket;
    543     krb5_principal client;
    544     krb5_principal server;
    545 } krb5_ticket;
    546 
    547 typedef Authenticator krb5_authenticator_data;
    548 
    549 typedef krb5_authenticator_data *krb5_authenticator;
    550 
    551 struct krb5_rcache_data;
    552 typedef struct krb5_rcache_data *krb5_rcache;
    553 typedef Authenticator krb5_donot_replay;
    554 
    555 #define KRB5_STORAGE_HOST_BYTEORDER			0x01 /* old */
    556 #define KRB5_STORAGE_PRINCIPAL_WRONG_NUM_COMPONENTS	0x02
    557 #define KRB5_STORAGE_PRINCIPAL_NO_NAME_TYPE		0x04
    558 #define KRB5_STORAGE_KEYBLOCK_KEYTYPE_TWICE		0x08
    559 #define KRB5_STORAGE_BYTEORDER_MASK			0x60
    560 #define KRB5_STORAGE_BYTEORDER_BE			0x00 /* default */
    561 #define KRB5_STORAGE_BYTEORDER_LE			0x20
    562 #define KRB5_STORAGE_BYTEORDER_HOST			0x40
    563 #define KRB5_STORAGE_CREDS_FLAGS_WRONG_BITORDER		0x80
    564 
    565 struct krb5_storage_data;
    566 typedef struct krb5_storage_data krb5_storage;
    567 
    568 typedef struct krb5_keytab_entry {
    569     krb5_principal principal;
    570     krb5_kvno vno;
    571     krb5_keyblock keyblock;
    572     uint32_t timestamp;
    573     uint32_t flags;
    574     krb5_principals aliases;
    575 } krb5_keytab_entry;
    576 
    577 typedef struct krb5_kt_cursor {
    578     int fd;
    579     krb5_storage *sp;
    580     void *data;
    581 } krb5_kt_cursor;
    582 
    583 struct krb5_keytab_data;
    584 
    585 typedef struct krb5_keytab_data *krb5_keytab;
    586 
    587 #define KRB5_KT_PREFIX_MAX_LEN	30
    588 
    589 struct krb5_keytab_data {
    590     const char *prefix;
    591     krb5_error_code (KRB5_CALLCONV * resolve)(krb5_context, const char*, krb5_keytab);
    592     krb5_error_code (KRB5_CALLCONV * get_name)(krb5_context, krb5_keytab, char*, size_t);
    593     krb5_error_code (KRB5_CALLCONV * close)(krb5_context, krb5_keytab);
    594     krb5_error_code (KRB5_CALLCONV * destroy)(krb5_context, krb5_keytab);
    595     krb5_error_code (KRB5_CALLCONV * get)(krb5_context, krb5_keytab, krb5_const_principal,
    596 					  krb5_kvno, krb5_enctype, krb5_keytab_entry*);
    597     krb5_error_code (KRB5_CALLCONV * start_seq_get)(krb5_context, krb5_keytab, krb5_kt_cursor*);
    598     krb5_error_code (KRB5_CALLCONV * next_entry)(krb5_context, krb5_keytab,
    599 						 krb5_keytab_entry*, krb5_kt_cursor*);
    600     krb5_error_code (KRB5_CALLCONV * end_seq_get)(krb5_context, krb5_keytab, krb5_kt_cursor*);
    601     krb5_error_code (KRB5_CALLCONV * add)(krb5_context, krb5_keytab, krb5_keytab_entry*);
    602     krb5_error_code (KRB5_CALLCONV * remove)(krb5_context, krb5_keytab, krb5_keytab_entry*);
    603     void *data;
    604     int32_t version;
    605 };
    606 
    607 typedef struct krb5_keytab_data krb5_kt_ops;
    608 
    609 struct krb5_keytab_key_proc_args {
    610     krb5_keytab keytab;
    611     krb5_principal principal;
    612 };
    613 
    614 typedef struct krb5_keytab_key_proc_args krb5_keytab_key_proc_args;
    615 
    616 typedef struct krb5_replay_data {
    617     krb5_timestamp timestamp;
    618     int32_t usec;
    619     uint32_t seq;
    620 } krb5_replay_data;
    621 
    622 /* flags for krb5_auth_con_setflags */
    623 enum {
    624     KRB5_AUTH_CONTEXT_DO_TIME      		= 1,
    625     KRB5_AUTH_CONTEXT_RET_TIME     		= 2,
    626     KRB5_AUTH_CONTEXT_DO_SEQUENCE  		= 4,
    627     KRB5_AUTH_CONTEXT_RET_SEQUENCE 		= 8,
    628     KRB5_AUTH_CONTEXT_PERMIT_ALL   		= 16,
    629     KRB5_AUTH_CONTEXT_USE_SUBKEY   		= 32,
    630     KRB5_AUTH_CONTEXT_CLEAR_FORWARDED_CRED	= 64
    631 };
    632 
    633 /* flags for krb5_auth_con_genaddrs */
    634 enum {
    635     KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR       = 1,
    636     KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR  = 3,
    637     KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR      = 4,
    638     KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR = 12
    639 };
    640 
    641 typedef struct krb5_auth_context_data {
    642     unsigned int flags;
    643 
    644     krb5_address *local_address;
    645     krb5_address *remote_address;
    646     int16_t local_port;
    647     int16_t remote_port;
    648     krb5_keyblock *keyblock;
    649     krb5_keyblock *local_subkey;
    650     krb5_keyblock *remote_subkey;
    651 
    652     uint32_t local_seqnumber;
    653     uint32_t remote_seqnumber;
    654 
    655     krb5_authenticator authenticator;
    656 
    657     krb5_pointer i_vector;
    658 
    659     krb5_rcache rcache;
    660 
    661     krb5_keytype keytype;	/* requested key type ? */
    662     krb5_cksumtype cksumtype;	/* requested checksum type! */
    663 
    664     AuthorizationData *auth_data;
    665 
    666 }krb5_auth_context_data, *krb5_auth_context;
    667 
    668 typedef struct {
    669     KDC_REP kdc_rep;
    670     EncKDCRepPart enc_part;
    671     KRB_ERROR error;
    672 } krb5_kdc_rep;
    673 
    674 extern const char *heimdal_version, *heimdal_long_version;
    675 
    676 typedef void (KRB5_CALLCONV * krb5_log_log_func_t)(const char*, const char*, void*);
    677 typedef void (KRB5_CALLCONV * krb5_log_close_func_t)(void*);
    678 
    679 typedef struct krb5_log_facility {
    680     char *program;
    681     int len;
    682     struct facility *val;
    683 } krb5_log_facility;
    684 
    685 typedef EncAPRepPart krb5_ap_rep_enc_part;
    686 
    687 #define KRB5_RECVAUTH_IGNORE_VERSION 1
    688 
    689 #define KRB5_SENDAUTH_VERSION "KRB5_SENDAUTH_V1.0"
    690 
    691 #define KRB5_TGS_NAME_SIZE (6)
    692 #define KRB5_TGS_NAME ("krbtgt")
    693 #define KRB5_WELLKNOWN_NAME ("WELLKNOWN")
    694 #define KRB5_ANON_NAME ("ANONYMOUS")
    695 #define KRB5_ANON_REALM ("WELLKNOWN:ANONYMOUS")
    696 #define KRB5_WELLKNOWN_ORG_H5L_REALM ("WELLKNOWN:ORG.H5L")
    697 #define KRB5_DIGEST_NAME ("digest")
    698 
    699 
    700 #define KRB5_PKU2U_REALM_NAME ("WELLKNOWN:PKU2U")
    701 #define KRB5_LKDC_REALM_NAME ("WELLKNOWN:COM.APPLE.LKDC")
    702 
    703 #define KRB5_GSS_HOSTBASED_SERVICE_NAME ("WELLKNOWN:ORG.H5L.HOSTBASED-SERVICE")
    704 #define KRB5_GSS_REFERALS_REALM_NAME ("WELLKNOWN:ORG.H5L.REFERALS-REALM")
    705 
    706 typedef enum {
    707     KRB5_PROMPT_TYPE_PASSWORD		= 0x1,
    708     KRB5_PROMPT_TYPE_NEW_PASSWORD	= 0x2,
    709     KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN = 0x3,
    710     KRB5_PROMPT_TYPE_PREAUTH		= 0x4,
    711     KRB5_PROMPT_TYPE_INFO		= 0x5
    712 } krb5_prompt_type;
    713 
    714 typedef struct _krb5_prompt {
    715     const char *prompt;
    716     int hidden;
    717     krb5_data *reply;
    718     krb5_prompt_type type;
    719 } krb5_prompt;
    720 
    721 typedef int (KRB5_CALLCONV * krb5_prompter_fct)(krb5_context /*context*/,
    722 						void * /*data*/,
    723 						const char * /*name*/,
    724 						const char * /*banner*/,
    725 						int /*num_prompts*/,
    726 						krb5_prompt /*prompts*/[]);
    727 typedef krb5_error_code (KRB5_CALLCONV * krb5_key_proc)(krb5_context /*context*/,
    728 							krb5_enctype /*type*/,
    729 							krb5_salt /*salt*/,
    730 							krb5_const_pointer /*keyseed*/,
    731 							krb5_keyblock ** /*key*/);
    732 typedef krb5_error_code (KRB5_CALLCONV * krb5_decrypt_proc)(krb5_context /*context*/,
    733 							    krb5_keyblock * /*key*/,
    734 							    krb5_key_usage /*usage*/,
    735 							    krb5_const_pointer /*decrypt_arg*/,
    736 							    krb5_kdc_rep * /*dec_rep*/);
    737 typedef krb5_error_code (KRB5_CALLCONV * krb5_s2k_proc)(krb5_context /*context*/,
    738 							krb5_enctype /*type*/,
    739 							krb5_const_pointer /*keyseed*/,
    740 							krb5_salt /*salt*/,
    741 							krb5_data * /*s2kparms*/,
    742 							krb5_keyblock ** /*key*/);
    743 
    744 struct _krb5_get_init_creds_opt_private;
    745 
    746 struct _krb5_get_init_creds_opt {
    747     krb5_flags flags;
    748     krb5_deltat tkt_life;
    749     krb5_deltat renew_life;
    750     int forwardable;
    751     int proxiable;
    752     int anonymous;
    753     int change_password_prompt;
    754     krb5_enctype *etype_list;
    755     int etype_list_length;
    756     krb5_addresses *address_list;
    757     /* XXX the next three should not be used, as they may be
    758        removed later */
    759     krb5_preauthtype *preauth_list;
    760     int preauth_list_length;
    761     krb5_data *salt;
    762     struct _krb5_get_init_creds_opt_private *opt_private;
    763 };
    764 
    765 typedef struct _krb5_get_init_creds_opt krb5_get_init_creds_opt;
    766 
    767 #define KRB5_GET_INIT_CREDS_OPT_TKT_LIFE	0x0001
    768 #define KRB5_GET_INIT_CREDS_OPT_RENEW_LIFE	0x0002
    769 #define KRB5_GET_INIT_CREDS_OPT_FORWARDABLE	0x0004
    770 #define KRB5_GET_INIT_CREDS_OPT_PROXIABLE	0x0008
    771 #define KRB5_GET_INIT_CREDS_OPT_ETYPE_LIST	0x0010
    772 #define KRB5_GET_INIT_CREDS_OPT_ADDRESS_LIST	0x0020
    773 #define KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST	0x0040
    774 #define KRB5_GET_INIT_CREDS_OPT_SALT		0x0080 /* no supported */
    775 #define KRB5_GET_INIT_CREDS_OPT_ANONYMOUS	0x0100
    776 #define KRB5_GET_INIT_CREDS_OPT_DISABLE_TRANSITED_CHECK	0x0200
    777 #define KRB5_GET_INIT_CREDS_OPT_CHANGE_PASSWORD_PROMPT	0x0400
    778 
    779 /* krb5_init_creds_step flags argument */
    780 #define KRB5_INIT_CREDS_STEP_FLAG_CONTINUE	0x0001
    781 
    782 typedef struct _krb5_verify_init_creds_opt {
    783     krb5_flags flags;
    784     int ap_req_nofail;
    785 } krb5_verify_init_creds_opt;
    786 
    787 #define KRB5_VERIFY_INIT_CREDS_OPT_AP_REQ_NOFAIL	0x0001
    788 
    789 typedef struct krb5_verify_opt {
    790     unsigned int flags;
    791     krb5_ccache ccache;
    792     krb5_keytab keytab;
    793     krb5_boolean secure;
    794     const char *service;
    795 } krb5_verify_opt;
    796 
    797 #define KRB5_VERIFY_LREALMS		1
    798 #define KRB5_VERIFY_NO_ADDRESSES	2
    799 
    800 #define KRB5_KPASSWD_VERS_CHANGEPW      1
    801 #define KRB5_KPASSWD_VERS_SETPW         0xff80
    802 
    803 #define KRB5_KPASSWD_SUCCESS	0
    804 #define KRB5_KPASSWD_MALFORMED	1
    805 #define KRB5_KPASSWD_HARDERROR	2
    806 #define KRB5_KPASSWD_AUTHERROR	3
    807 #define KRB5_KPASSWD_SOFTERROR	4
    808 #define KRB5_KPASSWD_ACCESSDENIED 5
    809 #define KRB5_KPASSWD_BAD_VERSION 6
    810 #define KRB5_KPASSWD_INITIAL_FLAG_NEEDED 7
    811 
    812 #define KPASSWD_PORT 464
    813 
    814 /* types for the new krbhst interface */
    815 struct krb5_krbhst_data;
    816 typedef struct krb5_krbhst_data *krb5_krbhst_handle;
    817 
    818 #define KRB5_KRBHST_KDC		1
    819 #define KRB5_KRBHST_ADMIN	2
    820 #define KRB5_KRBHST_CHANGEPW	3
    821 #define KRB5_KRBHST_KRB524	4
    822 #define KRB5_KRBHST_KCA		5
    823 
    824 typedef struct krb5_krbhst_info {
    825     enum { KRB5_KRBHST_UDP,
    826 	   KRB5_KRBHST_TCP,
    827 	   KRB5_KRBHST_HTTP } proto;
    828     unsigned short port;
    829     unsigned short def_port;
    830     struct addrinfo *ai;
    831     struct krb5_krbhst_info *next;
    832     char hostname[1]; /* has to come last */
    833 } krb5_krbhst_info;
    834 
    835 /* flags for krb5_krbhst_init_flags (and krb5_send_to_kdc_flags) */
    836 enum {
    837     KRB5_KRBHST_FLAGS_MASTER      = 1,
    838     KRB5_KRBHST_FLAGS_LARGE_MSG	  = 2
    839 };
    840 
    841 typedef krb5_error_code (*krb5_sendto_prexmit)(krb5_context, int, void *, int, krb5_data *);
    842 typedef krb5_error_code
    843 (KRB5_CALLCONV * krb5_send_to_kdc_func)(krb5_context, void *, krb5_krbhst_info *, time_t,
    844 					const krb5_data *, krb5_data *);
    845 
    846 /** flags for krb5_parse_name_flags */
    847 enum {
    848     KRB5_PRINCIPAL_PARSE_NO_REALM = 1, /**< Require that there are no realm */
    849     KRB5_PRINCIPAL_PARSE_REQUIRE_REALM = 2, /**< Require a realm present */
    850     KRB5_PRINCIPAL_PARSE_ENTERPRISE = 4, /**< Parse as a NT-ENTERPRISE name */
    851     KRB5_PRINCIPAL_PARSE_IGNORE_REALM = 8, /**< Ignore realm if present */
    852     KRB5_PRINCIPAL_PARSE_NO_DEF_REALM = 16 /**< Don't default the realm */
    853 };
    854 
    855 /** flags for krb5_unparse_name_flags */
    856 enum {
    857     KRB5_PRINCIPAL_UNPARSE_SHORT = 1, /**< No realm if it is the default realm */
    858     KRB5_PRINCIPAL_UNPARSE_NO_REALM = 2, /**< No realm */
    859     KRB5_PRINCIPAL_UNPARSE_DISPLAY = 4 /**< No quoting */
    860 };
    861 
    862 typedef struct krb5_sendto_ctx_data *krb5_sendto_ctx;
    863 
    864 #define KRB5_SENDTO_DONE	0
    865 #define KRB5_SENDTO_RESET	1
    866 #define KRB5_SENDTO_CONTINUE	2
    867 #define KRB5_SENDTO_TIMEOUT	3
    868 #define KRB5_SENDTO_INITIAL	4
    869 #define KRB5_SENDTO_FILTER	5
    870 #define KRB5_SENDTO_FAILED	6
    871 #define KRB5_SENDTO_KRBHST	7
    872 
    873 typedef krb5_error_code
    874 (KRB5_CALLCONV * krb5_sendto_ctx_func)(krb5_context, krb5_sendto_ctx, void *,
    875 				       const krb5_data *, int *);
    876 
    877 struct krb5_plugin;
    878 enum krb5_plugin_type {
    879     PLUGIN_TYPE_DATA = 1,
    880     PLUGIN_TYPE_FUNC
    881 };
    882 
    883 #define KRB5_PLUGIN_INVOKE_ALL  1
    884 
    885 struct credentials; /* this is to keep the compiler happy */
    886 struct getargs;
    887 struct sockaddr;
    888 
    889 /**
    890  * Semi private, not stable yet
    891  */
    892 
    893 typedef struct krb5_crypto_iov {
    894     unsigned int flags;
    895     /* ignored */
    896 #define KRB5_CRYPTO_TYPE_EMPTY		0
    897     /* OUT krb5_crypto_length(KRB5_CRYPTO_TYPE_HEADER) */
    898 #define KRB5_CRYPTO_TYPE_HEADER		1
    899     /* IN and OUT */
    900 #define KRB5_CRYPTO_TYPE_DATA		2
    901     /* IN */
    902 #define KRB5_CRYPTO_TYPE_SIGN_ONLY	3
    903    /* (only for encryption) OUT krb5_crypto_length(KRB5_CRYPTO_TYPE_TRAILER) */
    904 #define KRB5_CRYPTO_TYPE_PADDING	4
    905    /* OUT krb5_crypto_length(KRB5_CRYPTO_TYPE_TRAILER) */
    906 #define KRB5_CRYPTO_TYPE_TRAILER	5
    907    /* OUT krb5_crypto_length(KRB5_CRYPTO_TYPE_CHECKSUM) */
    908 #define KRB5_CRYPTO_TYPE_CHECKSUM	6
    909     krb5_data data;
    910 } krb5_crypto_iov;
    911 
    912 
    913 /* Glue for MIT */
    914 
    915 typedef struct {
    916     int32_t lr_type;
    917     krb5_timestamp value;
    918 } krb5_last_req_entry;
    919 
    920 typedef krb5_error_code
    921 (KRB5_CALLCONV * krb5_gic_process_last_req)(krb5_context, krb5_last_req_entry **, void *);
    922 
    923 typedef struct {
    924     krb5_enctype	ks_enctype;
    925     krb5int32		ks_salttype;
    926 }krb5_key_salt_tuple;
    927 
    928 /*
    929  * Name canonicalization rule options
    930  */
    931 
    932 typedef enum krb5_name_canon_rule_options {
    933         KRB5_NCRO_GC_ONLY       = 1 << 0,
    934         KRB5_NCRO_USE_REFERRALS = 1 << 1,
    935         KRB5_NCRO_NO_REFERRALS  = 1 << 2,
    936         KRB5_NCRO_USE_FAST      = 1 << 3,
    937         KRB5_NCRO_USE_DNSSEC    = 1 << 4,
    938         KRB5_NCRO_LOOKUP_REALM  = 1 << 5
    939 } krb5_name_canon_rule_options;
    940 
    941 typedef struct krb5_name_canon_rule_data *krb5_name_canon_rule;
    942 typedef const struct krb5_name_canon_rule_data *krb5_const_name_canon_rule;
    943 typedef struct krb5_name_canon_iterator_data *krb5_name_canon_iterator;
    944 
    945 /*
    946  *
    947  */
    948 
    949 struct hx509_certs_data;
    950 
    951 #include <krb5/krb5-protos.h>
    952 
    953 /* variables */
    954 
    955 extern KRB5_LIB_VARIABLE const char *krb5_config_file;
    956 extern KRB5_LIB_VARIABLE const char *krb5_defkeyname;
    957 
    958 
    959 extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_acc_ops;
    960 extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_dcc_ops;
    961 extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_fcc_ops;
    962 extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_mcc_ops;
    963 extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_kcm_ops;
    964 extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_akcm_ops;
    965 extern KRB5_LIB_VARIABLE const krb5_cc_ops krb5_scc_ops;
    966 
    967 extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_fkt_ops;
    968 extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_wrfkt_ops;
    969 extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_javakt_ops;
    970 extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_mkt_ops;
    971 extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_akf_ops;
    972 extern KRB5_LIB_VARIABLE const krb5_kt_ops krb5_any_ops;
    973 
    974 extern KRB5_LIB_VARIABLE const char *krb5_cc_type_api;
    975 extern KRB5_LIB_VARIABLE const char *krb5_cc_type_file;
    976 extern KRB5_LIB_VARIABLE const char *krb5_cc_type_memory;
    977 extern KRB5_LIB_VARIABLE const char *krb5_cc_type_kcm;
    978 extern KRB5_LIB_VARIABLE const char *krb5_cc_type_scc;
    979 extern KRB5_LIB_VARIABLE const char *krb5_cc_type_dcc;
    980 
    981 #endif /* __KRB5_H__ */
    982 
    983