1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
243
244
245
246
247
248
249
250
251
252
253
254
255
256
257
258
259
260
261
262
263
264
265
266
267
268
269
270
271
272
273
274
275
276
277
278
279
280
281
282
283
284
285
286
287
288
289
290
291
292
293
294
295
296
297
298
299
300
301
302
303
304
305
306
307
308
309
310
311
312
313
314
315
316
317
318
319
320
321
322
323
324
325
326
327
328
329
330
331
332
333
334
335
336
337
338
339
340
341
342
343
344
345
346
347
348
349
350
351
352
353
354
355
356
357
358
359
360
361
362
363
364
365
366
367
368
369
370
371
372
373
374
375
376
377
378
379
380
381
382
383
384
385
386
387
388
389
390
391
392
393
394
395
396
397
398
399
400
401
402
403
404
405
406
407
408
409
410
411
412
413
414
415
416
417
418
419
420
421
422
423
424
425
426
427
428
429
430
431
432
433
434
435
436
437
438
439
440
441
442
443
444
445
446
447
448
449
450
451
452
453
454
455
456
457
458
459
460
461
462
463
464
465
466
467
468
469
470
471
472
473
474
475
476
477
478
479
480
481
482
483
484
485
486
487
488
489
490
491
492
493
494
495
496
497
498
499
500
501
502
503
504
505
506
507
508
509
510
511
512
513
514
515
516
517
518
519
520
521
522
523
524
525
526
527
528
529
530
531
532
533
534
535
536
537
538
539
540
541
542
543
544
545
546
547
548
549
550
551
552
553
554
555
556
557
558
559
560
561
562
563
564
565
566
567
568
569
570
571
572
573
574
575
576
577
578
579
580
581
582
583
584
585
586
587
588
589
590
591
592
593
594
595
596
597
598
599
600
601
602
603
604
605
606
607
608
609
610
611
612
613
614
615
616
617
618
619
620
621
622
623
624
625
626
627
628
629
630
631
632
633
634
635
636
637
638
639
640
641
642
643
644
645
646
647
648
649
650
651
652
653
654
655
656
657
658
659
660
661
662
663
664
665
666
667
668
|
/*
* include/kerberosIV/krb.h
*
* Copyright 1987, 1988, 1994, 2001 by the Massachusetts Institute of
* Technology. All Rights Reserved.
*
* Export of this software from the United States of America may
* require a specific license from the United States Government.
* It is the responsibility of any person or organization contemplating
* export to obtain such a license before exporting.
*
* WITHIN THAT CONSTRAINT, permission to use, copy, modify, and
* distribute this software and its documentation for any purpose and
* without fee is hereby granted, provided that the above copyright
* notice appear in all copies and that both that copyright notice and
* this permission notice appear in supporting documentation, and that
* the name of M.I.T. not be used in advertising or publicity pertaining
* to distribution of the software without specific, written prior
* permission. Furthermore if you modify this software you must label
* your software as modified software and not distribute it in such a
* fashion that it might be confused with the original M.I.T. software.
* M.I.T. makes no representations about the suitability of
* this software for any purpose. It is provided "as is" without express
* or implied warranty.
*
* Include file for the Kerberos V4 library.
*/
/* Only one time, please */
#ifndef KRB_DEFS
#define KRB_DEFS
/* Need some defs from des.h */
#include <kerberosIV/des.h>
#ifdef _WINDOWS
#include <winsock.h>
#include <time.h>
#endif /* _WINDOWS */
#include <port-sockets.h>
/* Text describing error codes */
#define MAX_KRB_ERRORS 256
extern const char *const krb_err_txt[MAX_KRB_ERRORS];
/* These are not defined for at least SunOS 3.3 and Ultrix 2.2 */
#if defined(ULTRIX022) || (defined(SunOS) && SunOS < 40)
#define FD_ZERO(p) ((p)->fds_bits[0] = 0)
#define FD_SET(n, p) ((p)->fds_bits[0] |= (1 << (n)))
#define FD_ISSET(n, p) ((p)->fds_bits[0] & (1 << (n)))
#endif /* ULTRIX022 || SunOS */
/* General definitions */
#define KSUCCESS 0
#define KFAILURE 255
#ifdef NO_UIDGID_T
typedef unsigned short uid_t;
typedef unsigned short gid_t;
#endif /* NO_UIDGID_T */
/*
* Kerberos specific definitions
*
* KRBLOG is the log file for the kerberos master server. KRB_CONF is
* the configuration file where different host machines running master
* and slave servers can be found. KRB_MASTER is the name of the
* machine with the master database. The admin_server runs on this
* machine, and all changes to the db (as opposed to read-only
* requests, which can go to slaves) must go to it. KRB_HOST is the
* default machine * when looking for a kerberos slave server. Other
* possibilities are * in the KRB_CONF file. KRB_REALM is the name of
* the realm.
*/
#define KRB_CONF "/etc/krb.conf"
#define KRB_RLM_TRANS "/etc/krb.realms"
#define KRB_MASTER "kerberos"
#define KRB_HOST KRB_MASTER
#define KRB_REALM "ATHENA.MIT.EDU"
/* The maximum sizes for aname, realm, sname, and instance +1 */
#define ANAME_SZ 40
#define REALM_SZ 40
#define SNAME_SZ 40
#define INST_SZ 40
/* include space for '.' and '@' */
#define MAX_K_NAME_SZ (ANAME_SZ + INST_SZ + REALM_SZ + 2)
#define KKEY_SZ 100
#define VERSION_SZ 1
#define MSG_TYPE_SZ 1
#define DATE_SZ 26 /* RTI date output */
#define MAX_HSTNM 100
#ifndef DEFAULT_TKT_LIFE /* allow compile-time override */
#define DEFAULT_TKT_LIFE 255 /* default lifetime for krb_mk_req */
#endif
/* Definition of text structure used to pass text around */
#define MAX_KTXT_LEN 1250
struct ktext {
int length; /* Length of the text */
unsigned char dat[MAX_KTXT_LEN]; /* The data itself */
unsigned long mbz; /* zero to catch runaway strings */
};
typedef struct ktext *KTEXT;
typedef struct ktext KTEXT_ST;
/* Definitions for send_to_kdc */
#define CLIENT_KRB_TIMEOUT 4 /* time between retries */
#define CLIENT_KRB_RETRY 5 /* retry this many times */
#define CLIENT_KRB_BUFLEN 512 /* max unfragmented packet */
/* Definitions for ticket file utilities */
#define R_TKT_FIL 0
#define W_TKT_FIL 1
/* Definitions for cl_get_tgt */
#ifdef PC
#define CL_GTGT_INIT_FILE "\\kerberos\\k_in_tkts"
#else
#define CL_GTGT_INIT_FILE "/etc/k_in_tkts"
#endif /* PC */
/* Parameters for rd_ap_req */
/* Maximum alloable clock skew in seconds */
#define CLOCK_SKEW 5*60
/* Filename for readservkey */
#define KEYFILE ((char*)krb__get_srvtabname("/etc/srvtab"))
/* Structure definition for rd_ap_req */
struct auth_dat {
unsigned char k_flags; /* Flags from ticket */
char pname[ANAME_SZ]; /* Principal's name */
char pinst[INST_SZ]; /* His Instance */
char prealm[REALM_SZ]; /* His Realm */
unsigned KRB4_32 checksum; /* Data checksum (opt) */
C_Block session; /* Session Key */
int life; /* Life of ticket */
unsigned KRB4_32 time_sec; /* Time ticket issued */
unsigned KRB4_32 address; /* Address in ticket */
KTEXT_ST reply; /* Auth reply (opt) */
};
typedef struct auth_dat AUTH_DAT;
/* Structure definition for credentials returned by get_cred */
struct credentials {
char service[ANAME_SZ]; /* Service name */
char instance[INST_SZ]; /* Instance */
char realm[REALM_SZ]; /* Auth domain */
C_Block session; /* Session key */
int lifetime; /* Lifetime */
int kvno; /* Key version number */
KTEXT_ST ticket_st; /* The ticket itself */
KRB4_32 issue_date; /* The issue time */
char pname[ANAME_SZ]; /* Principal's name */
char pinst[INST_SZ]; /* Principal's instance */
};
typedef struct credentials CREDENTIALS;
/* Structure definition for rd_private_msg and rd_safe_msg */
struct msg_dat {
unsigned char FAR *app_data; /* pointer to appl data */
unsigned KRB4_32 app_length; /* length of appl data */
unsigned KRB4_32 hash; /* hash to lookup replay */
int swap; /* swap bytes? */
KRB4_32 time_sec; /* msg timestamp seconds */
unsigned char time_5ms; /* msg timestamp 5ms units */
};
typedef struct msg_dat MSG_DAT;
/* Location of ticket file for save_cred and get_cred */
#ifdef _WINDOWS
#define TKT_FILE "\\kerberos\\ticket.ses"
#else
#define TKT_FILE tkt_string()
#define TKT_ROOT "/tmp/tkt"
#endif /* PC */
/* Error codes returned from the KDC */
#define KDC_OK 0 /* Request OK */
#define KDC_NAME_EXP 1 /* Principal expired */
#define KDC_SERVICE_EXP 2 /* Service expired */
#define KDC_AUTH_EXP 3 /* Auth expired */
#define KDC_PKT_VER 4 /* Protocol version unknown */
#define KDC_P_MKEY_VER 5 /* Wrong master key version */
#define KDC_S_MKEY_VER 6 /* Wrong master key version */
#define KDC_BYTE_ORDER 7 /* Byte order unknown */
#define KDC_PR_UNKNOWN 8 /* Principal unknown */
#define KDC_PR_N_UNIQUE 9 /* Principal not unique */
#define KDC_NULL_KEY 10 /* Principal has null key */
#define KDC_GEN_ERR 20 /* Generic error from KDC */
/* Values returned by get_credentials */
#define GC_OK 0 /* Retrieve OK */
#define RET_OK 0 /* Retrieve OK */
#define GC_TKFIL 21 /* Can't read ticket file */
#define RET_TKFIL 21 /* Can't read ticket file */
#define GC_NOTKT 22 /* Can't find ticket or TGT */
#define RET_NOTKT 22 /* Can't find ticket or TGT */
/* Values returned by mk_ap_req */
#define MK_AP_OK 0 /* Success */
#define MK_AP_TGTEXP 26 /* TGT Expired */
/* Values returned by rd_ap_req */
#define RD_AP_OK 0 /* Request authentic */
#define RD_AP_UNDEC 31 /* Can't decode authenticator */
#define RD_AP_EXP 32 /* Ticket expired */
#define RD_AP_NYV 33 /* Ticket not yet valid */
#define RD_AP_REPEAT 34 /* Repeated request */
#define RD_AP_NOT_US 35 /* The ticket isn't for us */
#define RD_AP_INCON 36 /* Request is inconsistent */
#define RD_AP_TIME 37 /* delta_t too big */
#define RD_AP_BADD 38 /* Incorrect net address */
#define RD_AP_VERSION 39 /* protocol version mismatch */
#define RD_AP_MSG_TYPE 40 /* invalid msg type */
#define RD_AP_MODIFIED 41 /* message stream modified */
#define RD_AP_ORDER 42 /* message out of order */
#define RD_AP_UNAUTHOR 43 /* unauthorized request */
/* Values returned by get_pw_tkt */
#define GT_PW_OK 0 /* Got password changing tkt */
#define GT_PW_NULL 51 /* Current PW is null */
#define GT_PW_BADPW 52 /* Incorrect current password */
#define GT_PW_PROT 53 /* Protocol Error */
#define GT_PW_KDCERR 54 /* Error returned by KDC */
#define GT_PW_NULLTKT 55 /* Null tkt returned by KDC */
/* Values returned by send_to_kdc */
#define SKDC_OK 0 /* Response received */
#define SKDC_RETRY 56 /* Retry count exceeded */
#define SKDC_CANT 57 /* Can't send request */
/*
* Values returned by get_intkt
* (can also return SKDC_* and KDC errors)
*/
#define INTK_OK 0 /* Ticket obtained */
#define INTK_W_NOTALL 61 /* Not ALL tickets returned */
#define INTK_BADPW 62 /* Incorrect password */
#define INTK_PROT 63 /* Protocol Error */
#define INTK_ERR 70 /* Other error */
/* Values returned by get_adtkt */
#define AD_OK 0 /* Ticket Obtained */
#define AD_NOTGT 71 /* Don't have tgt */
/* Error codes returned by ticket file utilities */
#define NO_TKT_FIL 76 /* No ticket file found */
#define TKT_FIL_ACC 77 /* Couldn't access tkt file */
#define TKT_FIL_LCK 78 /* Couldn't lock ticket file */
#define TKT_FIL_FMT 79 /* Bad ticket file format */
#define TKT_FIL_INI 80 /* tf_init not called first */
/* Error code returned by kparse_name */
#define KNAME_FMT 81 /* Bad Kerberos name format */
/* Error code returned by krb_mk_safe */
#define SAFE_PRIV_ERROR -1 /* syscall error */
/* Kerberos ticket flag field bit definitions */
#define K_FLAG_ORDER 0 /* bit 0 --> lsb */
#define K_FLAG_1 /* reserved */
#define K_FLAG_2 /* reserved */
#define K_FLAG_3 /* reserved */
#define K_FLAG_4 /* reserved */
#define K_FLAG_5 /* reserved */
#define K_FLAG_6 /* reserved */
#define K_FLAG_7 /* reserved, bit 7 --> msb */
#ifdef OLDNAMES
#define krb_mk_req mk_ap_req
#define krb_rd_req rd_ap_req
#define krb_kntoln an_to_ln
#define krb_set_key set_serv_key
#define krb_get_cred get_credentials
#define krb_mk_priv mk_private_msg
#define krb_rd_priv rd_private_msg
#define krb_mk_safe mk_safe_msg
#define krb_rd_safe rd_safe_msg
#define krb_mk_err mk_appl_err_msg
#define krb_rd_err rd_appl_err_msg
#define krb_ck_repl check_replay
#define krb_get_pw_in_tkt get_in_tkt
#define krb_get_svc_in_tkt get_svc_in_tkt
#define krb_get_pw_tkt get_pw_tkt
#define krb_realmofhost krb_getrealm
#define krb_get_phost get_phost
#define krb_get_krbhst get_krbhst
#define krb_get_lrealm get_krbrlm
#endif /* OLDNAMES */
/* Defines for krb_sendauth and krb_recvauth */
#define KOPT_DONT_MK_REQ 0x00000001 /* don't call krb_mk_req */
#define KOPT_DO_MUTUAL 0x00000002 /* do mutual auth */
#define KOPT_DONT_CANON 0x00000004 /* don't canonicalize inst as a host */
#define KRB_SENDAUTH_VLEN 8 /* length for version strings */
#ifdef ATHENA_COMPAT
#define KOPT_DO_OLDSTYLE 0x00000008 /* use the old-style protocol */
#endif /* ATHENA_COMPAT */
#ifdef _WINDOWS
#define TIME_GMT_UNIXSEC win_time_gmt_unixsec((unsigned KRB4_32 *)0)
#define TIME_GMT_UNIXSEC_US(us) win_time_gmt_unixsec((us))
#define CONVERT_TIME_EPOCH win_time_get_epoch()
#else
/* until we do V4 compat under DOS, just turn this off */
#define _fmemcpy memcpy
#define _fstrncpy strncpy
#define far_fputs fputs
/* and likewise, just drag in the unix time interface */
#define TIME_GMT_UNIXSEC unix_time_gmt_unixsec((unsigned KRB4_32 *)0)
#define TIME_GMT_UNIXSEC_US(us) unix_time_gmt_unixsec((us))
#define CONVERT_TIME_EPOCH ((long)0) /* Unix epoch is Krb epoch */
#endif /*_WINDOWS*/
/* Define u_char, u_short, u_int, and u_long. */
#include <sys/types.h>
#if !defined(_WINDOWS)
#ifdef NEED_TIME_H
#include <time.h> /* For localtime, etc */
#include <sys/time.h>
#endif
#endif /* !_WINDOWS */
/* ask to disable IP address checking in the library */
extern int krb_ignore_ip_address;
/* Debugging printfs shouldn't even be compiled on many systems that don't
support printf! Use it like DEB (("Oops - %s\n", string)); */
#ifdef DEBUG
#define DEB(x) if (krb_debug) printf x
extern int krb_debug;
#else
#define DEB(x) /* nothing */
#endif
/*
* Some Unixes don't declare errno in <errno.h>...
* Move this out to individual c-*.h files if it becomes troublesome.
*/
#if !defined(errno) && !defined(_WINDOWS)
extern int errno;
#endif
/* Define a couple of function types including parameters. These
are needed on MS-Windows to convert arguments of the function pointers
to the proper types during calls. */
typedef int (KRB5_CALLCONV *key_proc_type)
(char FAR *, char FAR *, char FAR *,
char FAR *, C_Block);
#define KEY_PROC_TYPE_DEFINED
typedef int (KRB5_CALLCONV *decrypt_tkt_type)
(char FAR *, char FAR *, char FAR *,
char FAR *, key_proc_type, KTEXT FAR *);
#define DECRYPT_TKT_TYPE_DEFINED
extern struct _krb5_context FAR * krb5__krb4_context;
/*
* Function Prototypes for Kerberos V4.
*/
struct sockaddr_in;
/* dest_tkt.c */
int KRB5_CALLCONV dest_tkt
(void);
/* err_txt.c */
const char FAR * KRB5_CALLCONV krb_get_err_text
(int errnum);
/* g_ad_tkt.c */
int get_ad_tkt
(char *service, char *sinst, char *realm, int lifetime);
/* g_admhst.c */
int KRB5_CALLCONV krb_get_admhst
(char FAR *host, char FAR *realm, int idx);
/* g_cred.c */
int KRB5_CALLCONV krb_get_cred
(char FAR *service, char FAR *instance, char FAR *realm,
CREDENTIALS FAR *c);
/* g_in_tkt.c */
int krb_get_in_tkt
(char *k_user, char *instance, char *realm,
char *service, char *sinst, int life,
key_proc_type, decrypt_tkt_type, char *arg);
int krb_get_in_tkt_preauth
(char *k_user, char *instance, char *realm,
char *service, char *sinst, int life,
key_proc_type, decrypt_tkt_type, char *arg,
char *preauth_p, int preauth_len);
/* g_krbhst.c */
int KRB5_CALLCONV krb_get_krbhst
(char FAR *host, char FAR *realm, int idx);
/* g_krbrlm.c */
int KRB5_CALLCONV krb_get_lrealm
(char FAR *realm, int idx);
/* g_phost.c */
char FAR * KRB5_CALLCONV krb_get_phost
(char FAR * alias);
/* get_pw_tkt */
int KRB5_CALLCONV get_pw_tkt
(char *, char *, char *, char *);
/* g_pw_in_tkt.c */
int KRB5_CALLCONV krb_get_pw_in_tkt
(char FAR *k_user, char FAR *instance, char FAR *realm,
char FAR *service, char FAR *sinstance,
int life, char FAR *password);
int KRB5_CALLCONV krb_get_pw_in_tkt_preauth
(char FAR *k_user, char FAR *instance, char FAR *realm,
char FAR *service, char FAR *sinstance,
int life, char FAR *password);
/* g_svc_in_tkt.c */
int KRB5_CALLCONV krb_get_svc_in_tkt
(char FAR *k_user, char FAR *instance, char FAR *realm,
char FAR *service, char FAR *sinstance,
int life, char FAR *srvtab);
/* g_tf_fname.c */
int KRB5_CALLCONV krb_get_tf_fullname
(char *ticket_file, char *name, char *inst, char *realm);
/* g_tf_realm.c */
int KRB5_CALLCONV krb_get_tf_realm
(char *ticket_file, char *realm);
/* g_tkt_svc.c */
int KRB5_CALLCONV krb_get_ticket_for_service
(char FAR *serviceName,
char FAR *buf, unsigned KRB4_32 FAR *buflen,
int checksum, des_cblock, Key_schedule,
char FAR *version, int includeVersion);
/* in_tkt.c */
int KRB5_CALLCONV in_tkt
(char *name, char *inst);
int KRB5_CALLCONV krb_in_tkt
(char *pname, char *pinst, char *realm);
/* kname_parse.c */
int KRB5_CALLCONV kname_parse
(char FAR *name, char FAR *inst, char FAR *realm,
char FAR *fullname);
int KRB5_CALLCONV k_isname
(char FAR *);
int KRB5_CALLCONV k_isinst
(char FAR *);
int KRB5_CALLCONV k_isrealm
(char FAR *);
/* kuserok.c */
int KRB5_CALLCONV kuserok
(AUTH_DAT FAR *kdata, char FAR *luser);
/* lifetime.c */
KRB4_32 KRB5_CALLCONV krb_life_to_time
(KRB4_32 start, int life);
int KRB5_CALLCONV krb_time_to_life
(KRB4_32 start, KRB4_32 end);
/* mk_auth.c */
int KRB5_CALLCONV krb_check_auth
(KTEXT, unsigned KRB4_32 cksum, MSG_DAT FAR *,
C_Block, Key_schedule,
struct sockaddr_in FAR * local_addr,
struct sockaddr_in FAR * foreign_addr);
int KRB5_CALLCONV krb_mk_auth
(long k4_options, KTEXT ticket,
char FAR *service, char FAR *inst, char FAR *realm,
unsigned KRB4_32 checksum, char FAR *version, KTEXT buf);
/* mk_err.c */
long KRB5_CALLCONV krb_mk_err
(u_char FAR *out, KRB4_32 k4_code, char FAR *text);
/* mk_preauth.c */
int krb_mk_preauth
(char **preauth_p, int *preauth_len, key_proc_type,
char *name, char *inst, char *realm, char *password,
C_Block);
void krb_free_preauth
(char * preauth_p, int len);
/* mk_priv.c */
long KRB5_CALLCONV krb_mk_priv
(u_char FAR *in, u_char FAR *out,
unsigned KRB4_32 length,
Key_schedule, C_Block FAR *,
struct sockaddr_in FAR * sender,
struct sockaddr_in FAR * receiver);
/* mk_req.c */
int KRB5_CALLCONV krb_mk_req
(KTEXT authent,
char FAR *service, char FAR *instance, char FAR *realm,
KRB4_32 checksum);
/* mk_safe.c */
long KRB5_CALLCONV krb_mk_safe
(u_char FAR *in, u_char FAR *out, unsigned KRB4_32 length,
C_Block FAR *,
struct sockaddr_in FAR *sender,
struct sockaddr_in FAR *receiver);
/* netread.c */
int krb_net_read
(int fd, char *buf, int len);
/* netwrite.c */
int krb_net_write
(int fd, char *buf, int len);
/* pkt_clen.c */
int pkt_clen
(KTEXT);
/* put_svc_key.c */
int KRB5_CALLCONV put_svc_key
(char FAR *sfile,
char FAR *name, char FAR *inst, char FAR *realm,
int newvno, char FAR *key);
/* rd_err.c */
int KRB5_CALLCONV krb_rd_err
(u_char FAR *in, u_long in_length,
long FAR *k4_code, MSG_DAT FAR *m_data);
/* rd_priv.c */
long KRB5_CALLCONV krb_rd_priv
(u_char FAR *in,unsigned KRB4_32 in_length,
Key_schedule, C_Block FAR *,
struct sockaddr_in FAR *sender,
struct sockaddr_in FAR *receiver,
MSG_DAT FAR *m_data);
/* rd_req.c */
int KRB5_CALLCONV krb_rd_req
(KTEXT, char FAR *service, char FAR *inst,
unsigned KRB4_32 from_addr, AUTH_DAT FAR *,
char FAR *srvtab);
/* rd_safe.c */
long KRB5_CALLCONV krb_rd_safe
(u_char FAR *in, unsigned KRB4_32 in_length,
C_Block FAR *,
struct sockaddr_in FAR *sender,
struct sockaddr_in FAR *receiver,
MSG_DAT FAR *m_data);
/* rd_svc_key.c */
int KRB5_CALLCONV read_service_key
(char FAR *service, char FAR *instance, char FAR *realm,
int kvno, char FAR *file, char FAR *key);
int KRB5_CALLCONV get_service_key
(char FAR *service, char FAR *instance, char FAR *realm,
int FAR *kvno, char FAR *file, char FAR *key);
/* realmofhost.c */
char FAR * KRB5_CALLCONV krb_realmofhost
(char FAR *host);
/* recvauth.c */
int KRB5_CALLCONV krb_recvauth
(long k4_options, int fd, KTEXT ticket,
char FAR *service, char FAR *instance,
struct sockaddr_in FAR *foreign_addr,
struct sockaddr_in FAR *local_addr,
AUTH_DAT FAR *kdata, char FAR *srvtab,
Key_schedule schedule, char FAR *version);
/* sendauth.c */
int KRB5_CALLCONV krb_sendauth
(long k4_options, int fd, KTEXT ticket,
char FAR *service, char FAR *inst, char FAR *realm,
unsigned KRB4_32 checksum, MSG_DAT *msg_data,
CREDENTIALS *cred, Key_schedule schedule,
struct sockaddr_in FAR *laddr, struct sockaddr_in *FAR faddr,
char FAR *version);
/* save_creds.c */
int KRB5_CALLCONV krb_save_credentials
(char FAR *service, char FAR *instance, char FAR *realm,
C_Block session, int lifetime, int kvno,
KTEXT ticket, long issue_date);
/* send_to_kdc.c */
int send_to_kdc
(KTEXT pkt, KTEXT rpkt, char *realm);
/* tkt_string.c */
char * tkt_string
(void);
void krb_set_tkt_string
(char *);
/* tf_util.c */
int KRB5_CALLCONV tf_init (char *tf_name, int rw);
int KRB5_CALLCONV tf_get_pname (char *p);
int KRB5_CALLCONV tf_get_pinst (char *p);
int KRB5_CALLCONV tf_get_cred (CREDENTIALS *c);
void KRB5_CALLCONV tf_close (void);
/* unix_time.c */
unsigned KRB4_32 KRB5_CALLCONV unix_time_gmt_unixsec
(unsigned KRB4_32 *);
/*
* Internal prototypes
*/
extern int krb_set_key
(char *key, int cvt);
extern int decomp_ticket
(KTEXT tkt, unsigned char *flags, char *pname,
char *pinstance, char *prealm, unsigned KRB4_32 *paddress,
C_Block session, int *life, unsigned KRB4_32 *time_sec,
char *sname, char *sinstance, C_Block,
Key_schedule key_s);
extern void cr_err_reply(KTEXT pkt, char *pname, char *pinst, char *prealm,
u_long time_ws, u_long e, char *e_string);
extern int create_ciph(KTEXT c, C_Block session, char *service,
char *instance, char *realm, unsigned long life,
int kvno, KTEXT tkt, unsigned long kdc_time,
C_Block key);
extern int krb_create_ticket(KTEXT tkt, unsigned int flags, char *pname,
char *pinstance, char *prealm, long paddress,
char *session, int life, long time_sec,
char *sname, char *sinstance, C_Block key);
extern char * krb__get_srvtabname(const char *);
extern int krb_kntoln(AUTH_DAT *, char *);
#ifdef KRB5_GENERAL__
extern int krb_cr_tkt_krb5(KTEXT tkt, unsigned int flags, char *pname,
char *pinstance, char *prealm, long paddress,
char *session, int life, long time_sec,
char *sname, char *sinstance,
krb5_keyblock *k5key);
extern int krb_set_key_krb5(krb5_context ctx, krb5_keyblock *key);
#endif
#ifdef _WINDOWS
HINSTANCE get_lib_instance(void);
unsigned int krb_get_notification_message(void);
char FAR * KRB5_CALLCONV krb_get_default_user(void);
int KRB5_CALLCONV krb_set_default_user(char *);
unsigned KRB4_32 win_time_gmt_unixsec(unsigned KRB4_32 *);
long win_time_get_epoch(void);
#endif
#endif /* KRB_DEFS */
|