xref: /freebsd/crypto/heimdal/lib/krb5/krb5.h (revision 1c43270a)
1 /*
2  * Copyright (c) 1997 - 2002 Kungliga Tekniska H�gskolan
3  * (Royal Institute of Technology, Stockholm, Sweden).
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  *
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  *
13  * 2. Redistributions in binary form must reproduce the above copyright
14  *    notice, this list of conditions and the following disclaimer in the
15  *    documentation and/or other materials provided with the distribution.
16  *
17  * 3. Neither the name of the Institute nor the names of its contributors
18  *    may be used to endorse or promote products derived from this software
19  *    without specific prior written permission.
20  *
21  * THIS SOFTWARE IS PROVIDED BY THE INSTITUTE AND CONTRIBUTORS ``AS IS'' AND
22  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
23  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
24  * ARE DISCLAIMED.  IN NO EVENT SHALL THE INSTITUTE OR CONTRIBUTORS BE LIABLE
25  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
26  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
27  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
28  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
29  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
30  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
31  * SUCH DAMAGE.
32  */
33 
34 /* $Id: krb5.h,v 1.209.2.1 2003/09/18 20:50:40 lha Exp $ */
35 
36 #ifndef __KRB5_H__
37 #define __KRB5_H__
38 
39 #include <time.h>
40 #include <krb5-types.h>
41 
42 #include <asn1_err.h>
43 #include <krb5_err.h>
44 #include <heim_err.h>
45 #include <k524_err.h>
46 
47 #include <krb5_asn1.h>
48 
49 /* name confusion with MIT */
50 #ifndef KRB5KDC_ERR_KEY_EXP
51 #define KRB5KDC_ERR_KEY_EXP KRB5KDC_ERR_KEY_EXPIRED
52 #endif
53 
54 /* simple constants */
55 
56 #ifndef TRUE
57 #define TRUE  1
58 #define FALSE 0
59 #endif
60 
61 typedef int krb5_boolean;
62 
63 typedef int32_t krb5_error_code;
64 
65 typedef int krb5_kvno;
66 
67 typedef u_int32_t krb5_flags;
68 
69 typedef void *krb5_pointer;
70 typedef const void *krb5_const_pointer;
71 
72 typedef octet_string krb5_data;
73 
74 struct krb5_crypto_data;
75 typedef struct krb5_crypto_data *krb5_crypto;
76 
77 typedef CKSUMTYPE krb5_cksumtype;
78 
79 typedef Checksum krb5_checksum;
80 
81 typedef ENCTYPE krb5_enctype;
82 
83 /* alternative names */
84 enum {
85     ENCTYPE_NULL		= ETYPE_NULL,
86     ENCTYPE_DES_CBC_CRC		= ETYPE_DES_CBC_CRC,
87     ENCTYPE_DES_CBC_MD4		= ETYPE_DES_CBC_MD4,
88     ENCTYPE_DES_CBC_MD5		= ETYPE_DES_CBC_MD5,
89     ENCTYPE_DES3_CBC_MD5	= ETYPE_DES3_CBC_MD5,
90     ENCTYPE_OLD_DES3_CBC_SHA1	= ETYPE_OLD_DES3_CBC_SHA1,
91     ENCTYPE_SIGN_DSA_GENERATE	= ETYPE_SIGN_DSA_GENERATE,
92     ENCTYPE_ENCRYPT_RSA_PRIV	= ETYPE_ENCRYPT_RSA_PRIV,
93     ENCTYPE_ENCRYPT_RSA_PUB	= ETYPE_ENCRYPT_RSA_PUB,
94     ENCTYPE_DES3_CBC_SHA1	= ETYPE_DES3_CBC_SHA1,
95     ENCTYPE_ARCFOUR_HMAC_MD5	= ETYPE_ARCFOUR_HMAC_MD5,
96     ENCTYPE_ARCFOUR_HMAC_MD5_56	= ETYPE_ARCFOUR_HMAC_MD5_56,
97     ENCTYPE_ENCTYPE_PK_CROSS	= ETYPE_ENCTYPE_PK_CROSS,
98     ENCTYPE_DES_CBC_NONE	= ETYPE_DES_CBC_NONE,
99     ENCTYPE_DES3_CBC_NONE	= ETYPE_DES3_CBC_NONE,
100     ENCTYPE_DES_CFB64_NONE	= ETYPE_DES_CFB64_NONE,
101     ENCTYPE_DES_PCBC_NONE	= ETYPE_DES_PCBC_NONE
102 };
103 
104 typedef PADATA_TYPE krb5_preauthtype;
105 
106 typedef enum krb5_key_usage {
107     KRB5_KU_PA_ENC_TIMESTAMP = 1,
108     /* AS-REQ PA-ENC-TIMESTAMP padata timestamp, encrypted with the
109        client key (section 5.4.1) */
110     KRB5_KU_TICKET = 2,
111     /* AS-REP Ticket and TGS-REP Ticket (includes tgs session key or
112        application session key), encrypted with the service key
113        (section 5.4.2) */
114     KRB5_KU_AS_REP_ENC_PART = 3,
115     /* AS-REP encrypted part (includes tgs session key or application
116        session key), encrypted with the client key (section 5.4.2) */
117     KRB5_KU_TGS_REQ_AUTH_DAT_SESSION = 4,
118     /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
119        session key (section 5.4.1) */
120     KRB5_KU_TGS_REQ_AUTH_DAT_SUBKEY = 5,
121     /* TGS-REQ KDC-REQ-BODY AuthorizationData, encrypted with the tgs
122           authenticator subkey (section 5.4.1) */
123     KRB5_KU_TGS_REQ_AUTH_CKSUM = 6,
124     /* TGS-REQ PA-TGS-REQ padata AP-REQ Authenticator cksum, keyed
125        with the tgs session key (sections 5.3.2, 5.4.1) */
126     KRB5_KU_TGS_REQ_AUTH = 7,
127     /* TGS-REQ PA-TGS-REQ padata AP-REQ Authenticator (includes tgs
128        authenticator subkey), encrypted with the tgs session key
129        (section 5.3.2) */
130     KRB5_KU_TGS_REP_ENC_PART_SESSION = 8,
131     /* TGS-REP encrypted part (includes application session key),
132        encrypted with the tgs session key (section 5.4.2) */
133     KRB5_KU_TGS_REP_ENC_PART_SUB_KEY = 9,
134     /* TGS-REP encrypted part (includes application session key),
135        encrypted with the tgs authenticator subkey (section 5.4.2) */
136     KRB5_KU_AP_REQ_AUTH_CKSUM = 10,
137     /* AP-REQ Authenticator cksum, keyed with the application session
138        key (section 5.3.2) */
139     KRB5_KU_AP_REQ_AUTH = 11,
140     /* AP-REQ Authenticator (includes application authenticator
141        subkey), encrypted with the application session key (section
142        5.3.2) */
143     KRB5_KU_AP_REQ_ENC_PART = 12,
144     /* AP-REP encrypted part (includes application session subkey),
145        encrypted with the application session key (section 5.5.2) */
146     KRB5_KU_KRB_PRIV = 13,
147     /* KRB-PRIV encrypted part, encrypted with a key chosen by the
148        application (section 5.7.1) */
149     KRB5_KU_KRB_CRED = 14,
150     /* KRB-CRED encrypted part, encrypted with a key chosen by the
151        application (section 5.8.1) */
152     KRB5_KU_KRB_SAFE_CKSUM = 15,
153     /* KRB-SAFE cksum, keyed with a key chosen by the application
154        (section 5.6.1) */
155     KRB5_KU_OTHER_ENCRYPTED = 16,
156     /* Data which is defined in some specification outside of
157        Kerberos to be encrypted using an RFC1510 encryption type. */
158     KRB5_KU_OTHER_CKSUM = 17,
159     /* Data which is defined in some specification outside of
160        Kerberos to be checksummed using an RFC1510 checksum type. */
161     KRB5_KU_KRB_ERROR = 18,
162     /* Krb-error checksum */
163     KRB5_KU_AD_KDC_ISSUED = 19,
164     /* AD-KDCIssued checksum */
165     KRB5_KU_MANDATORY_TICKET_EXTENSION = 20,
166     /* Checksum for Mandatory Ticket Extensions */
167     KRB5_KU_AUTH_DATA_TICKET_EXTENSION = 21,
168     /* Checksum in Authorization Data in Ticket Extensions */
169     KRB5_KU_USAGE_SEAL = 22,
170     /* seal in GSSAPI krb5 mechanism */
171     KRB5_KU_USAGE_SIGN = 23,
172     /* sign in GSSAPI krb5 mechanism */
173     KRB5_KU_USAGE_SEQ = 24
174     /* SEQ in GSSAPI krb5 mechanism */
175 } krb5_key_usage;
176 
177 typedef krb5_key_usage krb5_keyusage;
178 
179 typedef enum krb5_salttype {
180     KRB5_PW_SALT = KRB5_PADATA_PW_SALT,
181     KRB5_AFS3_SALT = KRB5_PADATA_AFS3_SALT
182 }krb5_salttype;
183 
184 typedef struct krb5_salt {
185     krb5_salttype salttype;
186     krb5_data saltvalue;
187 } krb5_salt;
188 
189 typedef ETYPE_INFO krb5_preauthinfo;
190 
191 typedef struct {
192     krb5_preauthtype type;
193     krb5_preauthinfo info; /* list of preauthinfo for this type */
194 } krb5_preauthdata_entry;
195 
196 typedef struct krb5_preauthdata {
197     unsigned len;
198     krb5_preauthdata_entry *val;
199 }krb5_preauthdata;
200 
201 typedef enum krb5_address_type {
202     KRB5_ADDRESS_INET     =   2,
203     KRB5_ADDRESS_INET6    =  24,
204     KRB5_ADDRESS_ADDRPORT = 256,
205     KRB5_ADDRESS_IPPORT   = 257
206 } krb5_address_type;
207 
208 enum {
209   AP_OPTS_USE_SESSION_KEY = 1,
210   AP_OPTS_MUTUAL_REQUIRED = 2,
211   AP_OPTS_USE_SUBKEY = 4		/* library internal */
212 };
213 
214 typedef HostAddress krb5_address;
215 
216 typedef HostAddresses krb5_addresses;
217 
218 typedef enum krb5_keytype {
219     KEYTYPE_NULL	= 0,
220     KEYTYPE_DES		= 1,
221     KEYTYPE_DES3	= 7,
222     KEYTYPE_AES128	= 17,
223     KEYTYPE_AES256	= 18,
224     KEYTYPE_ARCFOUR	= 23,
225     KEYTYPE_ARCFOUR_56	= 24
226 } krb5_keytype;
227 
228 typedef EncryptionKey krb5_keyblock;
229 
230 typedef AP_REQ krb5_ap_req;
231 
232 struct krb5_cc_ops;
233 
234 #define KRB5_DEFAULT_CCFILE_ROOT "/tmp/krb5cc_"
235 
236 #define KRB5_DEFAULT_CCROOT "FILE:" KRB5_DEFAULT_CCFILE_ROOT
237 
238 #define KRB5_ACCEPT_NULL_ADDRESSES(C) 					 \
239     krb5_config_get_bool_default((C), NULL, TRUE, 			 \
240 				 "libdefaults", "accept_null_addresses", \
241 				 NULL)
242 
243 typedef void *krb5_cc_cursor;
244 
245 typedef struct krb5_ccache_data {
246     const struct krb5_cc_ops *ops;
247     krb5_data data;
248 }krb5_ccache_data;
249 
250 typedef struct krb5_ccache_data *krb5_ccache;
251 
252 typedef struct krb5_context_data *krb5_context;
253 
254 typedef Realm krb5_realm;
255 typedef const char *krb5_const_realm; /* stupid language */
256 
257 #define krb5_realm_length(r) strlen(r)
258 #define krb5_realm_data(r) (r)
259 
260 typedef Principal krb5_principal_data;
261 typedef struct Principal *krb5_principal;
262 typedef const struct Principal *krb5_const_principal;
263 
264 typedef time_t krb5_deltat;
265 typedef time_t krb5_timestamp;
266 
267 typedef struct krb5_times {
268   krb5_timestamp authtime;
269   krb5_timestamp starttime;
270   krb5_timestamp endtime;
271   krb5_timestamp renew_till;
272 } krb5_times;
273 
274 typedef union {
275     TicketFlags b;
276     krb5_flags i;
277 } krb5_ticket_flags;
278 
279 /* options for krb5_get_in_tkt() */
280 #define KDC_OPT_FORWARDABLE		(1 << 1)
281 #define KDC_OPT_FORWARDED		(1 << 2)
282 #define KDC_OPT_PROXIABLE		(1 << 3)
283 #define KDC_OPT_PROXY			(1 << 4)
284 #define KDC_OPT_ALLOW_POSTDATE		(1 << 5)
285 #define KDC_OPT_POSTDATED		(1 << 6)
286 #define KDC_OPT_RENEWABLE		(1 << 8)
287 #define KDC_OPT_REQUEST_ANONYMOUS	(1 << 14)
288 #define KDC_OPT_DISABLE_TRANSITED_CHECK	(1 << 26)
289 #define KDC_OPT_RENEWABLE_OK		(1 << 27)
290 #define KDC_OPT_ENC_TKT_IN_SKEY		(1 << 28)
291 #define KDC_OPT_RENEW			(1 << 30)
292 #define KDC_OPT_VALIDATE		(1 << 31)
293 
294 typedef union {
295     KDCOptions b;
296     krb5_flags i;
297 } krb5_kdc_flags;
298 
299 /* flags for krb5_verify_ap_req */
300 
301 #define KRB5_VERIFY_AP_REQ_IGNORE_INVALID	(1 << 0)
302 
303 #define KRB5_GC_CACHED			(1U << 0)
304 #define KRB5_GC_USER_USER		(1U << 1)
305 
306 /* constants for compare_creds (and cc_retrieve_cred) */
307 #define KRB5_TC_DONT_MATCH_REALM	(1U << 31)
308 #define KRB5_TC_MATCH_KEYTYPE		(1U << 30)
309 
310 typedef AuthorizationData krb5_authdata;
311 
312 typedef KRB_ERROR krb5_error;
313 
314 typedef struct krb5_creds {
315     krb5_principal client;
316     krb5_principal server;
317     krb5_keyblock session;
318     krb5_times times;
319     krb5_data ticket;
320     krb5_data second_ticket;
321     krb5_authdata authdata;
322     krb5_addresses addresses;
323     krb5_ticket_flags flags;
324 } krb5_creds;
325 
326 typedef struct krb5_cc_ops {
327     const char *prefix;
328     const char* (*get_name)(krb5_context, krb5_ccache);
329     krb5_error_code (*resolve)(krb5_context, krb5_ccache *, const char *);
330     krb5_error_code (*gen_new)(krb5_context, krb5_ccache *);
331     krb5_error_code (*init)(krb5_context, krb5_ccache, krb5_principal);
332     krb5_error_code (*destroy)(krb5_context, krb5_ccache);
333     krb5_error_code (*close)(krb5_context, krb5_ccache);
334     krb5_error_code (*store)(krb5_context, krb5_ccache, krb5_creds*);
335     krb5_error_code (*retrieve)(krb5_context, krb5_ccache,
336 				krb5_flags, krb5_creds*, krb5_creds);
337     krb5_error_code (*get_princ)(krb5_context, krb5_ccache, krb5_principal*);
338     krb5_error_code (*get_first)(krb5_context, krb5_ccache, krb5_cc_cursor *);
339     krb5_error_code (*get_next)(krb5_context, krb5_ccache,
340 				krb5_cc_cursor*, krb5_creds*);
341     krb5_error_code (*end_get)(krb5_context, krb5_ccache, krb5_cc_cursor*);
342     krb5_error_code (*remove_cred)(krb5_context, krb5_ccache,
343 				   krb5_flags, krb5_creds*);
344     krb5_error_code (*set_flags)(krb5_context, krb5_ccache, krb5_flags);
345     int (*get_version)(krb5_context, krb5_ccache);
346 } krb5_cc_ops;
347 
348 struct krb5_log_facility;
349 
350 struct krb5_config_binding {
351     enum { krb5_config_string, krb5_config_list } type;
352     char *name;
353     struct krb5_config_binding *next;
354     union {
355 	char *string;
356 	struct krb5_config_binding *list;
357 	void *generic;
358     } u;
359 };
360 
361 typedef struct krb5_config_binding krb5_config_binding;
362 
363 typedef krb5_config_binding krb5_config_section;
364 
365 typedef struct krb5_context_data {
366     krb5_enctype *etypes;
367     krb5_enctype *etypes_des;
368     char **default_realms;
369     time_t max_skew;
370     time_t kdc_timeout;
371     unsigned max_retries;
372     int32_t kdc_sec_offset;
373     int32_t kdc_usec_offset;
374     krb5_config_section *cf;
375     struct et_list *et_list;
376     struct krb5_log_facility *warn_dest;
377     krb5_cc_ops *cc_ops;
378     int num_cc_ops;
379     const char *http_proxy;
380     const char *time_fmt;
381     krb5_boolean log_utc;
382     const char *default_keytab;
383     const char *default_keytab_modify;
384     krb5_boolean use_admin_kdc;
385     krb5_addresses *extra_addresses;
386     krb5_boolean scan_interfaces;	/* `ifconfig -a' */
387     krb5_boolean srv_lookup;		/* do SRV lookups */
388     krb5_boolean srv_try_txt;		/* try TXT records also */
389     int32_t fcache_vno;			/* create cache files w/ this
390                                            version */
391     int num_kt_types;			/* # of registered keytab types */
392     struct krb5_keytab_data *kt_types;  /* registered keytab types */
393     const char *date_fmt;
394     char *error_string;
395     char error_buf[256];
396     krb5_addresses *ignore_addresses;
397     char *default_cc_name;
398 } krb5_context_data;
399 
400 typedef struct krb5_ticket {
401     EncTicketPart ticket;
402     krb5_principal client;
403     krb5_principal server;
404 } krb5_ticket;
405 
406 typedef Authenticator krb5_authenticator_data;
407 
408 typedef krb5_authenticator_data *krb5_authenticator;
409 
410 struct krb5_rcache_data;
411 typedef struct krb5_rcache_data *krb5_rcache;
412 typedef Authenticator krb5_donot_replay;
413 
414 #define KRB5_STORAGE_HOST_BYTEORDER			0x01 /* old */
415 #define KRB5_STORAGE_PRINCIPAL_WRONG_NUM_COMPONENTS	0x02
416 #define KRB5_STORAGE_PRINCIPAL_NO_NAME_TYPE		0x04
417 #define KRB5_STORAGE_KEYBLOCK_KEYTYPE_TWICE		0x08
418 #define KRB5_STORAGE_BYTEORDER_MASK			0x60
419 #define KRB5_STORAGE_BYTEORDER_BE			0x00 /* default */
420 #define KRB5_STORAGE_BYTEORDER_LE			0x20
421 #define KRB5_STORAGE_BYTEORDER_HOST			0x40
422 
423 struct krb5_storage_data;
424 typedef struct krb5_storage_data krb5_storage;
425 
426 typedef struct krb5_keytab_entry {
427     krb5_principal principal;
428     krb5_kvno vno;
429     krb5_keyblock keyblock;
430     u_int32_t timestamp;
431 } krb5_keytab_entry;
432 
433 typedef struct krb5_kt_cursor {
434     int fd;
435     krb5_storage *sp;
436     void *data;
437 } krb5_kt_cursor;
438 
439 struct krb5_keytab_data;
440 
441 typedef struct krb5_keytab_data *krb5_keytab;
442 
443 #define KRB5_KT_PREFIX_MAX_LEN	30
444 
445 struct krb5_keytab_data {
446     const char *prefix;
447     krb5_error_code (*resolve)(krb5_context, const char*, krb5_keytab);
448     krb5_error_code (*get_name)(krb5_context, krb5_keytab, char*, size_t);
449     krb5_error_code (*close)(krb5_context, krb5_keytab);
450     krb5_error_code (*get)(krb5_context, krb5_keytab, krb5_const_principal,
451 			   krb5_kvno, krb5_enctype, krb5_keytab_entry*);
452     krb5_error_code (*start_seq_get)(krb5_context, krb5_keytab, krb5_kt_cursor*);
453     krb5_error_code (*next_entry)(krb5_context, krb5_keytab,
454 				  krb5_keytab_entry*, krb5_kt_cursor*);
455     krb5_error_code (*end_seq_get)(krb5_context, krb5_keytab, krb5_kt_cursor*);
456     krb5_error_code (*add)(krb5_context, krb5_keytab, krb5_keytab_entry*);
457     krb5_error_code (*remove)(krb5_context, krb5_keytab, krb5_keytab_entry*);
458     void *data;
459     int32_t version;
460 };
461 
462 typedef struct krb5_keytab_data krb5_kt_ops;
463 
464 struct krb5_keytab_key_proc_args {
465     krb5_keytab keytab;
466     krb5_principal principal;
467 };
468 
469 typedef struct krb5_keytab_key_proc_args krb5_keytab_key_proc_args;
470 
471 typedef struct krb5_replay_data {
472     krb5_timestamp timestamp;
473     u_int32_t usec;
474     u_int32_t seq;
475 } krb5_replay_data;
476 
477 /* flags for krb5_auth_con_setflags */
478 enum {
479     KRB5_AUTH_CONTEXT_DO_TIME      = 1,
480     KRB5_AUTH_CONTEXT_RET_TIME     = 2,
481     KRB5_AUTH_CONTEXT_DO_SEQUENCE  = 4,
482     KRB5_AUTH_CONTEXT_RET_SEQUENCE = 8,
483     KRB5_AUTH_CONTEXT_PERMIT_ALL   = 16
484 };
485 
486 /* flags for krb5_auth_con_genaddrs */
487 enum {
488     KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR       = 1,
489     KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR  = 3,
490     KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR      = 4,
491     KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR = 12
492 };
493 
494 typedef struct krb5_auth_context_data {
495     unsigned int flags;
496 
497     krb5_address *local_address;
498     krb5_address *remote_address;
499     int16_t local_port;
500     int16_t remote_port;
501     krb5_keyblock *keyblock;
502     krb5_keyblock *local_subkey;
503     krb5_keyblock *remote_subkey;
504 
505     u_int32_t local_seqnumber;
506     u_int32_t remote_seqnumber;
507 
508     krb5_authenticator authenticator;
509 
510     krb5_pointer i_vector;
511 
512     krb5_rcache rcache;
513 
514     krb5_keytype keytype;	/* �requested key type ? */
515     krb5_cksumtype cksumtype;	/* �requested checksum type! */
516 
517 }krb5_auth_context_data, *krb5_auth_context;
518 
519 typedef struct {
520     KDC_REP kdc_rep;
521     EncKDCRepPart enc_part;
522     KRB_ERROR error;
523 } krb5_kdc_rep;
524 
525 extern const char *heimdal_version, *heimdal_long_version;
526 
527 typedef void (*krb5_log_log_func_t)(const char*, const char*, void*);
528 typedef void (*krb5_log_close_func_t)(void*);
529 
530 typedef struct krb5_log_facility {
531     const char *program;
532     int len;
533     struct facility *val;
534 } krb5_log_facility;
535 
536 typedef EncAPRepPart krb5_ap_rep_enc_part;
537 
538 #define KRB5_RECVAUTH_IGNORE_VERSION 1
539 
540 #define KRB5_SENDAUTH_VERSION "KRB5_SENDAUTH_V1.0"
541 
542 #define KRB5_TGS_NAME_SIZE (6)
543 #define KRB5_TGS_NAME ("krbtgt")
544 
545 /* variables */
546 
547 extern const char *krb5_config_file;
548 extern const char *krb5_defkeyname;
549 
550 typedef enum {
551     KRB5_PROMPT_TYPE_PASSWORD		= 0x1,
552     KRB5_PROMPT_TYPE_NEW_PASSWORD	= 0x2,
553     KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN = 0x3,
554     KRB5_PROMPT_TYPE_PREAUTH		= 0x4
555 } krb5_prompt_type;
556 
557 typedef struct _krb5_prompt {
558     const char *prompt;
559     int hidden;
560     krb5_data *reply;
561     krb5_prompt_type type;
562 } krb5_prompt;
563 
564 typedef int (*krb5_prompter_fct)(krb5_context context,
565 				 void *data,
566 				 const char *name,
567 				 const char *banner,
568 				 int num_prompts,
569 				 krb5_prompt prompts[]);
570 
571 typedef krb5_error_code (*krb5_key_proc)(krb5_context context,
572 					 krb5_enctype type,
573 					 krb5_salt salt,
574 					 krb5_const_pointer keyseed,
575 					 krb5_keyblock **key);
576 typedef krb5_error_code (*krb5_decrypt_proc)(krb5_context context,
577 					     krb5_keyblock *key,
578 					     krb5_key_usage usage,
579 					     krb5_const_pointer decrypt_arg,
580 					     krb5_kdc_rep *dec_rep);
581 
582 
583 typedef struct _krb5_get_init_creds_opt {
584     krb5_flags flags;
585     krb5_deltat tkt_life;
586     krb5_deltat renew_life;
587     int forwardable;
588     int proxiable;
589     int anonymous;
590     krb5_enctype *etype_list;
591     int etype_list_length;
592     krb5_addresses *address_list;
593 #if 0 /* this is the MIT-way */
594     krb5_address **address_list;
595 #endif
596     /* XXX the next three should not be used, as they may be
597        removed later */
598     krb5_preauthtype *preauth_list;
599     int preauth_list_length;
600     krb5_data *salt;
601 } krb5_get_init_creds_opt;
602 
603 #define KRB5_GET_INIT_CREDS_OPT_TKT_LIFE	0x0001
604 #define KRB5_GET_INIT_CREDS_OPT_RENEW_LIFE	0x0002
605 #define KRB5_GET_INIT_CREDS_OPT_FORWARDABLE	0x0004
606 #define KRB5_GET_INIT_CREDS_OPT_PROXIABLE	0x0008
607 #define KRB5_GET_INIT_CREDS_OPT_ETYPE_LIST	0x0010
608 #define KRB5_GET_INIT_CREDS_OPT_ADDRESS_LIST	0x0020
609 #define KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST	0x0040
610 #define KRB5_GET_INIT_CREDS_OPT_SALT		0x0080
611 #define KRB5_GET_INIT_CREDS_OPT_ANONYMOUS	0x0100
612 
613 typedef struct _krb5_verify_init_creds_opt {
614     krb5_flags flags;
615     int ap_req_nofail;
616 } krb5_verify_init_creds_opt;
617 
618 #define KRB5_VERIFY_INIT_CREDS_OPT_AP_REQ_NOFAIL	0x0001
619 
620 typedef struct krb5_verify_opt {
621     unsigned int flags;
622     krb5_ccache ccache;
623     krb5_keytab keytab;
624     krb5_boolean secure;
625     const char *service;
626 } krb5_verify_opt;
627 
628 #define KRB5_VERIFY_LREALMS		1
629 #define KRB5_VERIFY_NO_ADDRESSES	2
630 
631 extern const krb5_cc_ops krb5_fcc_ops;
632 extern const krb5_cc_ops krb5_mcc_ops;
633 
634 extern const krb5_kt_ops krb5_fkt_ops;
635 extern const krb5_kt_ops krb5_mkt_ops;
636 extern const krb5_kt_ops krb5_akf_ops;
637 extern const krb5_kt_ops krb4_fkt_ops;
638 extern const krb5_kt_ops krb5_srvtab_fkt_ops;
639 extern const krb5_kt_ops krb5_any_ops;
640 
641 #define KRB5_KPASSWD_SUCCESS	0
642 #define KRB5_KPASSWD_MALFORMED	1
643 #define KRB5_KPASSWD_HARDERROR	2
644 #define KRB5_KPASSWD_AUTHERROR	3
645 #define KRB5_KPASSWD_SOFTERROR	4
646 
647 #define KPASSWD_PORT 464
648 
649 /* types for the new krbhst interface */
650 struct krb5_krbhst_data;
651 typedef struct krb5_krbhst_data *krb5_krbhst_handle;
652 
653 #define KRB5_KRBHST_KDC		1
654 #define KRB5_KRBHST_ADMIN	2
655 #define KRB5_KRBHST_CHANGEPW	3
656 #define KRB5_KRBHST_KRB524	4
657 
658 typedef struct krb5_krbhst_info {
659     enum { KRB5_KRBHST_UDP,
660 	   KRB5_KRBHST_TCP,
661 	   KRB5_KRBHST_HTTP } proto;
662     unsigned short port;
663     unsigned short def_port;
664     struct addrinfo *ai;
665     struct krb5_krbhst_info *next;
666     char hostname[1]; /* has to come last */
667 } krb5_krbhst_info;
668 
669 
670 struct credentials; /* this is to keep the compiler happy */
671 struct getargs;
672 struct sockaddr;
673 
674 #include <krb5-protos.h>
675 
676 #endif /* __KRB5_H__ */
677 
678