diff options
| author | Greg Hudson <ghudson@mit.edu> | 2012-01-07 15:50:14 +0000 |
|---|---|---|
| committer | Greg Hudson <ghudson@mit.edu> | 2012-01-07 15:50:14 +0000 |
| commit | cb8dc48cfaf273d0e93e4ad383484a7849b64099 (patch) | |
| tree | 5fb26eec69e943c02b53f96dfaa6c2347a501026 /src/include | |
| parent | a20df816b34da7a36b5b518793e0d9ccfd26f547 (diff) | |
| download | krb5-cb8dc48cfaf273d0e93e4ad383484a7849b64099.tar.gz krb5-cb8dc48cfaf273d0e93e4ad383484a7849b64099.tar.xz krb5-cb8dc48cfaf273d0e93e4ad383484a7849b64099.zip | |
Remove SAM encoders and structures
r24403 removed the old SAM support, but left behind the structures,
free functions, and ASN.1 encoders/decoders. Remove those now.
(SAM-2 support is still present.)
git-svn-id: svn://anonsvn.mit.edu/krb5/trunk@25618 dc483132-0cff-0310-8789-dd5450dbe970
Diffstat (limited to 'src/include')
| -rw-r--r-- | src/include/k5-int.h | 135 |
1 files changed, 0 insertions, 135 deletions
diff --git a/src/include/k5-int.h b/src/include/k5-int.h index f25c4fa20f..c10d8aaac6 100644 --- a/src/include/k5-int.h +++ b/src/include/k5-int.h @@ -422,30 +422,6 @@ typedef struct _krb5_etype_list { krb5_enctype *etypes; } krb5_etype_list; -/* - * a sam_challenge is returned for alternate preauth - */ -/* - SAMFlags ::= BIT STRING { - use-sad-as-key[0], - send-encrypted-sad[1], - must-pk-encrypt-sad[2] - } -*/ -/* - PA-SAM-CHALLENGE ::= SEQUENCE { - sam-type[0] INTEGER, - sam-flags[1] SAMFlags, - sam-type-name[2] GeneralString OPTIONAL, - sam-track-id[3] GeneralString OPTIONAL, - sam-challenge-label[4] GeneralString OPTIONAL, - sam-challenge[5] GeneralString OPTIONAL, - sam-response-prompt[6] GeneralString OPTIONAL, - sam-pk-for-sad[7] EncryptionKey OPTIONAL, - sam-nonce[8] INTEGER OPTIONAL, - sam-cksum[9] Checksum OPTIONAL - } -*/ /* sam_type values -- informational only */ #define PA_SAM_TYPE_ENIGMA 1 /* Enigma Logic */ #define PA_SAM_TYPE_DIGI_PATH 2 /* Digital Pathways */ @@ -462,54 +438,6 @@ typedef struct _krb5_etype_list { #define PA_SAM_TYPE_GRAIL (PA_SAM_TYPE_EXP_BASE+0) /* testing */ #define PA_SAM_TYPE_SECURID_PREDICT (PA_SAM_TYPE_EXP_BASE+1) /* special */ -typedef struct _krb5_predicted_sam_response { - krb5_magic magic; - krb5_keyblock sam_key; - krb5_flags sam_flags; /* Makes key munging easier */ - krb5_timestamp stime; /* time on server, for replay detection */ - krb5_int32 susec; - krb5_principal client; - krb5_data msd; /* mechanism specific data */ -} krb5_predicted_sam_response; - -typedef struct _krb5_sam_challenge { - krb5_magic magic; - krb5_int32 sam_type; /* information */ - krb5_flags sam_flags; /* KRB5_SAM_* values */ - krb5_data sam_type_name; - krb5_data sam_track_id; - krb5_data sam_challenge_label; - krb5_data sam_challenge; - krb5_data sam_response_prompt; - krb5_data sam_pk_for_sad; - krb5_int32 sam_nonce; - krb5_checksum sam_cksum; -} krb5_sam_challenge; - -typedef struct _krb5_sam_key { /* reserved for future use */ - krb5_magic magic; - krb5_keyblock sam_key; -} krb5_sam_key; - -typedef struct _krb5_enc_sam_response_enc { - krb5_magic magic; - krb5_int32 sam_nonce; - krb5_timestamp sam_timestamp; - krb5_int32 sam_usec; - krb5_data sam_sad; -} krb5_enc_sam_response_enc; - -typedef struct _krb5_sam_response { - krb5_magic magic; - krb5_int32 sam_type; /* informational */ - krb5_flags sam_flags; /* KRB5_SAM_* values */ - krb5_data sam_track_id; /* copied */ - krb5_enc_data sam_enc_key; /* krb5_sam_key - future use */ - krb5_enc_data sam_enc_nonce_or_ts; /* krb5_enc_sam_response_enc */ - krb5_int32 sam_nonce; - krb5_timestamp sam_patimestamp; -} krb5_sam_response; - typedef struct _krb5_sam_challenge_2 { krb5_data sam_challenge_2_body; krb5_checksum **sam_cksum; /* Array of checksums */ @@ -1123,33 +1051,18 @@ void KRB5_CALLCONV krb5_preauth_request_context_init(krb5_context); void KRB5_CALLCONV krb5_preauth_request_context_fini(krb5_context); void KRB5_CALLCONV -krb5_free_sam_challenge(krb5_context, krb5_sam_challenge *); - -void KRB5_CALLCONV krb5_free_sam_challenge_2(krb5_context, krb5_sam_challenge_2 *); void KRB5_CALLCONV krb5_free_sam_challenge_2_body(krb5_context, krb5_sam_challenge_2_body *); void KRB5_CALLCONV -krb5_free_sam_response(krb5_context, krb5_sam_response *); - -void KRB5_CALLCONV krb5_free_sam_response_2(krb5_context, krb5_sam_response_2 *); void KRB5_CALLCONV -krb5_free_predicted_sam_response(krb5_context, krb5_predicted_sam_response *); - -void KRB5_CALLCONV -krb5_free_enc_sam_response_enc(krb5_context, krb5_enc_sam_response_enc *); - -void KRB5_CALLCONV krb5_free_enc_sam_response_enc_2(krb5_context, krb5_enc_sam_response_enc_2 *); void KRB5_CALLCONV -krb5_free_sam_challenge_contents(krb5_context, krb5_sam_challenge *); - -void KRB5_CALLCONV krb5_free_sam_challenge_2_contents(krb5_context, krb5_sam_challenge_2 *); void KRB5_CALLCONV @@ -1157,20 +1070,9 @@ krb5_free_sam_challenge_2_body_contents(krb5_context, krb5_sam_challenge_2_body *); void KRB5_CALLCONV -krb5_free_sam_response_contents(krb5_context, krb5_sam_response *); - -void KRB5_CALLCONV krb5_free_sam_response_2_contents(krb5_context, krb5_sam_response_2 *); void KRB5_CALLCONV -krb5_free_predicted_sam_response_contents(krb5_context, - krb5_predicted_sam_response * ); - -void KRB5_CALLCONV -krb5_free_enc_sam_response_enc_contents(krb5_context, - krb5_enc_sam_response_enc * ); - -void KRB5_CALLCONV krb5_free_enc_sam_response_enc_2_contents(krb5_context, krb5_enc_sam_response_enc_2 * ); @@ -1692,19 +1594,6 @@ krb5_error_code encode_krb5_pa_enc_ts(const krb5_pa_enc_ts *, krb5_data **); krb5_error_code -encode_krb5_sam_challenge(const krb5_sam_challenge * , krb5_data **); - -krb5_error_code -encode_krb5_sam_key(const krb5_sam_key * , krb5_data **); - -krb5_error_code -encode_krb5_enc_sam_response_enc(const krb5_enc_sam_response_enc *, - krb5_data **); - -krb5_error_code -encode_krb5_sam_response(const krb5_sam_response *, krb5_data **); - -krb5_error_code encode_krb5_sam_challenge_2(const krb5_sam_challenge_2 * , krb5_data **); krb5_error_code @@ -1718,10 +1607,6 @@ encode_krb5_enc_sam_response_enc_2(const krb5_enc_sam_response_enc_2 *, krb5_error_code encode_krb5_sam_response_2(const krb5_sam_response_2 * , krb5_data **); -krb5_error_code -encode_krb5_predicted_sam_response(const krb5_predicted_sam_response *, - krb5_data **); - struct krb5_setpw_req { krb5_principal target; krb5_data password; @@ -1784,23 +1669,6 @@ encode_krb5_ad_signedpath_data(const krb5_ad_signedpath_data *, krb5_data **); *************************************************************************/ krb5_error_code -decode_krb5_sam_challenge(const krb5_data *, krb5_sam_challenge **); - -krb5_error_code -decode_krb5_enc_sam_key(const krb5_data *, krb5_sam_key **); - -krb5_error_code -decode_krb5_enc_sam_response_enc(const krb5_data *, - krb5_enc_sam_response_enc **); - -krb5_error_code -decode_krb5_sam_response(const krb5_data *, krb5_sam_response **); - -krb5_error_code -decode_krb5_predicted_sam_response(const krb5_data *, - krb5_predicted_sam_response **); - -krb5_error_code decode_krb5_sam_challenge_2(const krb5_data *, krb5_sam_challenge_2 **); krb5_error_code @@ -1925,9 +1793,6 @@ krb5_error_code decode_krb5_pa_enc_ts(const krb5_data *output, krb5_pa_enc_ts **rep); krb5_error_code -decode_krb5_sam_key(const krb5_data *, krb5_sam_key **); - -krb5_error_code decode_krb5_setpw_req(const krb5_data *, krb5_data **, krb5_principal *); krb5_error_code |
