diff options
author | 2004-10-29 21:14:30 +0000 | |
---|---|---|
committer | 2004-10-29 21:14:30 +0000 | |
commit | 89f535abfa6dfd4e9fbd789af477b7f97045a498 (patch) | |
tree | fa95888caa9d6a7a5a979de2933b412928b9b5e4 | |
parent | fix typo in comment (diff) | |
download | wireguard-openbsd-89f535abfa6dfd4e9fbd789af477b7f97045a498.tar.xz wireguard-openbsd-89f535abfa6dfd4e9fbd789af477b7f97045a498.zip |
Remove unneeded files. ok beck@
55 files changed, 0 insertions, 5053 deletions
diff --git a/kerberosV/src/appl/afsutil/afslog.cat1 b/kerberosV/src/appl/afsutil/afslog.cat1 deleted file mode 100644 index d662b4eadfe..00000000000 --- a/kerberosV/src/appl/afsutil/afslog.cat1 +++ /dev/null @@ -1,60 +0,0 @@ - -AFSLOG(1) UNIX Reference Manual AFSLOG(1) - -NNAAMMEE - aaffsslloogg - obtain AFS tokens - -SSYYNNOOPPSSIISS - aaffsslloogg [--cc _c_e_l_l | ----cceellll==_c_e_l_l] [--pp _p_a_t_h | ----ffiillee==_p_a_t_h] [--kk _r_e_a_l_m | - ----rreeaallmm==_r_e_a_l_m] [----nnoo--vv44] [----nnoo--vv55] [--uu | ----uunnlloogg] [--vv | ----vveerrbboossee] - [----vveerrssiioonn] [--hh | ----hheellpp] [_c_e_l_l | _p_a_t_h _._._.] - -DDEESSCCRRIIPPTTIIOONN - aaffsslloogg obtains AFS tokens for a number of cells. What cells to get tokens - for can either be specified as an explicit list, as file paths to get to- - kens for, or be left unspecified, in which case aaffsslloogg will use whatever - magic krb_afslog(3) decides upon. - - Supported options: - - --cc _c_e_l_l_, ----cceellll==_c_e_l_l - This specified one or more cell names to get tokens for. - - --pp _p_a_t_h, ----ffiillee==_p_a_t_h - This specified one or more file paths for which tokens should be - obtained. - - --kk _r_e_a_l_m, ----rreeaallmm==_r_e_a_l_m - This is the Kerberos realm the AFS servers live in, this should - normally not be specified. - - ----nnoo--vv44 - This makes aaffsslloogg not try using Kerberos 4. - - ----nnoo--vv55 - This makes aaffsslloogg not try using Kerberos 5. - - --uu, ----uunnlloogg - Destroy tokens instead of obtaining new. If this is specified, - all other options are ignored (except for ----hheellpp and ----vveerrssiioonn). - - --vv, ----vveerrbboossee - Adds more verbosity for what is actually going on. - Instead of using --cc and --pp, you may also pass a list of cells and file - paths after any other options. These arguments are considered files if - they are either the strings ``.'' or ``..'' or they contain a slash, or - if there exists a file by that name. - -EEXXAAMMPPLLEESS - Assuming that there is no file called ``openafs.org'' in the current di- - rectory, and that _/_a_f_s_/_o_p_e_n_a_f_s_._o_r_g points to that cell, the follwing - should be identical: - - $ afslog -c openafs.org - $ afslog openafs.org - $ afslog /afs/openafs.org/some/file - -SSEEEE AALLSSOO - krb_afslog(3) - - HEIMDAL November 26, 2002 1 diff --git a/kerberosV/src/appl/login/login.1 b/kerberosV/src/appl/login/login.1 deleted file mode 100644 index 707cb290d42..00000000000 --- a/kerberosV/src/appl/login/login.1 +++ /dev/null @@ -1,226 +0,0 @@ -.\" $KTH: login.1,v 1.1 2003/03/24 16:15:12 joda Exp $ -.\" -.Dd March 24, 2003 -.Dt LOGIN 1 -.Os HEIMDAL -.Sh NAME -.Nm login -.Nd -authenticate a user and start new session -.Sh SYNOPSIS -.Nm -.Op Fl fp -.Op Fl a Ar level -.Op Fl h Ar hostname -.Ar [username] -.Sh DESCRIPTION -This manual page documents the -.Nm login -program distributed with the Heimdal Kerberos 5 implementation, it may -differ in important ways from your system version. -.Pp -The -.Nm login -programs logs users into the system. It is intended to be run by -system daemons like -.Xr getty 8 -or -.Xr telnetd 8 . -If you are already logged in, but want to change to another user, you -should use -.Xr su 1 . -.Pp -A username can be given on the command line, else one will be prompted -for. -.Pp -A password is required to login, unless the -.Fl f -option is given (indicating that the calling program has already done -proper authentication). With -.Fl f -the user will be logged in without further questions. -.Pp -For password authentication Kerberos 5, Kerberos 4 (if compiled in), -OTP (if compiled in) and local -.No ( Pa /etc/passwd ) -passwords are supported. OTP will be used if the the user is -registered to use it, and -.Nm login -is given the option -.Fl a Li otp . -When using OTP, a challenge is shown to the user. -.Pp -Further options are: -.Bl -tag -width Ds -.It Fl a Ar string -Which authentication mode to use, the only supported value is -currently -.Dq otp . -.It Fl f -Indicates that the user is already authenticated. This happens, for -instance, when login is started by telnetd, and the user has proved -authentic via Kerberos. -.It Fl h Ar hostname -Indicates which host the user is logging in from. This is passed from -telnetd, and is entered into the login database. -.It Fl p -This tells -.Nm login -to preserve all environment variables. If not given, only the -.Dv TERM -and -.Dv TZ -variables are preserved. It could be a security risk to pass random -variables to -.Nm login -or the user shell, so the calling daemon should make sure it only -passes -.Dq safe -variables. -.El -.Pp -The process of logging user in proceeds as follows. -.Pp -First a check is made that logins are allowed at all. This usually -means checking -.Pa /etc/nologin . -If it exists, and the user trying to login is not root, the contents -is printed, and then login exits. -.Pp -Then various system parameters are set up, like changing the owner of -the tty to the user, setting up signals, setting the group list, and -user and group id. Also various machine specific tasks are performed. -.Pp -Next -.Nm login -changes to the users home directory, or if that fails, to -.Pa / . -The environment is setup, by adding some required variables (such as -.Dv PATH ) , -and also authentication related ones (such as -.Dv KRB5CCNAME ) . -If an environment file exists -.No ( Pa /etc/environment ) , -variables are set according to -it. -.Pp -If one or more login message files are configured, their contents is -printed to the terminal. -.Pp -If a login time command is configured, it is executed. A logout time -command can also be configured, which makes -.Nm login -fork, and wait for the user shell to exit, and then run the command. -This can be used to clean up user credentials. -.Pp -Finally, the user's shell is executed. If the user logging in is root, -and root's login shell does not exist, a default shell (usually -.Pa /bin/sh ) -is also tried before giving up. -.Sh ENVIRONMENT -These environment variables are set by login (not including ones set by -.Pa /etc/environment ) : -.Pp -.Bl -tag -compact -width USERXXLOGNAME -.It Dv PATH -the default system path -.It Dv HOME -the user's home directory (or possibly -.Pa / ) -.It Dv USER , Dv LOGNAME -both set to the username -.It Dv SHELL -the user's shell -.It Dv TERM , Dv TZ -set to whatever is passed to -.Nm login -.It Dv KRB5CCNAME -if the password is verified via Kerberos 5, this will point to the -credentials cache file -.It Dv KRBTKFILE -if the password is verified via Kerberos 4, this will point to the -ticket file -.El -.Sh FILES -.Bl -tag -compact -width Ds -.It Pa /etc/environment -Contains a set of environment variables that should be set in addition -to the ones above. It should contain sh-style assignments like -.Dq VARIABLE=value . -Note that they are not parsed the way a shell would. No variable -expansion is performed, and all strings are literal, and quotation -marks should not be used. Everything after a hash mark is considered a -comment. The following are all different (the last will set the -variable -.Dv BAR , -not -.Dv FOO ) . -.Bd -literal -offset indent -FOO=this is a string -FOO="this is a string" -BAR= FOO='this is a string' -.Ed -.It Pa /etc/login.access -See -.Xr login.access 5 . -.It Pa /etc/login.conf -This is a termcap style configuration file, that contains various -settings used by -.Nm login . -Currently only the -.Dq default -capability record is used. The possible capability strings include: -.Pp -.Bl -tag -compact -width Ds -.It Li environment -This is a comma separated list of environment files that are read in -the order specified. If this is missing the default -.Pa /etc/environment -is used. -.It Li login_program -This program will be executed just before the user's shell is started. -It will be called without arguments. -.It Li logout_program -This program will be executed just after the user's shell has -terminated. It will be called without arguments. This program will be -the parent process of the spawned shell. -.It Li motd -A comma separated list of text files that will be printed to the -user's terminal before starting the shell. The string -.Li welcome -works similarly, but points to a single file. -.El -.It Pa /etc/nologin -If it exists, login is denied to all but root. The contents of this -file is printed before login exits. -.El -.Pp -Other -.Nm login -programs typically print all sorts of information by default, such as -last time you logged in, if you have mail, and system message files. -This version of -.Nm login -does not, so there is no reason for -.Pa .hushlogin -files or similar. We feel that these tasks are best left to the user's -shell, but the -.Li login_program -facility allows for a shell independent solution, if that is desired. -.Sh EXAMPLES -A -.Pa login.conf -file could look like: -.Bd -literal -offset indent -default:\\ - :motd=/etc/motd,/etc/motd.local: -.Ed -.Sh SEE ALSO -.Xr su 1 , -.Xr login.access 5 , -.Xr getty 8 , -.Xr telnetd 8 -.Sh AUTHORS -This login program was written for the Heimdal Kerberos 5 -implementation. The login.access code was written by Wietse Venema. -.\".Sh BUGS diff --git a/kerberosV/src/appl/login/login.access.5 b/kerberosV/src/appl/login/login.access.5 deleted file mode 100644 index 38cb71facb0..00000000000 --- a/kerberosV/src/appl/login/login.access.5 +++ /dev/null @@ -1,56 +0,0 @@ -.\" $KTH: login.access.5,v 1.1 2003/03/24 15:49:30 joda Exp $ -.\" -.Dd March 21, 2003 -.Dt LOGIN.ACCESS 5 -.Os HEIMDAL -.Sh NAME -.Nm login.access -.Nd -login access control table -.Sh DESCRIPTION -The -.Nm login.access -file specifies on which ttys or from which hosts certain users are -allowed to login. -.Pp -At login, the -.Pa /etc/login.access -file is checked for the first entry that matches a specific user/host -or user/tty combination. That entry can either allow or deny login -access to that user. -.Pp -Each entry have three fields separated by colon: -.Bl -bullet -.It -The first field indicates the permission given if the entry matches. -It can be either -.Dq + -(allow access) -or -.Dq - -(deny access) . -.It -The second field is a comma separated list of users or groups for -which the current entry applies. NIS netgroups can used (if -configured) if preceeded by @. The magic string ALL matches all users. -A group will match if the user is a member of that group, or it is the -user's primary group. -.It -The third field is a list of ttys, or network names. A network name -can be either a hostname, a domain (indicated by a starting period), -or a netgroup. As with the user list, ALL matches anything. LOCAL -matches a string not containing a period. -.El -.Pp -If the string EXCEPT is found in either the user or from list, the -rest of the list are exceptions to the list before EXCEPT. -.Sh BUGS -If there's a user and a group with the same name, there is no way to -make the group match if the user also matches. -.Sh SEE ALSO -.Xr login 1 -.Sh AUTHORS -The -.Fn login_access -function was written by -Wietse Venema. This manual page was written for Heimdal. diff --git a/kerberosV/src/appl/login/login.access.cat5 b/kerberosV/src/appl/login/login.access.cat5 deleted file mode 100644 index 8d53505c5b2..00000000000 --- a/kerberosV/src/appl/login/login.access.cat5 +++ /dev/null @@ -1,45 +0,0 @@ - -LOGIN.ACCESS(5) UNIX Programmer's Manual LOGIN.ACCESS(5) - -NNAAMMEE - llooggiinn..aacccceessss - login access control table - -DDEESSCCRRIIPPTTIIOONN - The llooggiinn..aacccceessss file specifies on which ttys or from which hosts certain - users are allowed to login. - - At login, the _/_e_t_c_/_l_o_g_i_n_._a_c_c_e_s_s file is checked for the first entry that - matches a specific user/host or user/tty combination. That entry can ei- - ther allow or deny login access to that user. - - Each entry have three fields separated by colon: - - ++oo The first field indicates the permission given if the entry matches. - It can be either ``+'' (allow access) or ``-'' (deny access) . - - ++oo The second field is a comma separated list of users or groups for - which the current entry applies. NIS netgroups can used (if config- - ured) if preceeded by @. The magic string ALL matches all users. A - group will match if the user is a member of that group, or it is the - user's primary group. - - ++oo The third field is a list of ttys, or network names. A network name - can be either a hostname, a domain (indicated by a starting period), - or a netgroup. As with the user list, ALL matches anything. LOCAL - matches a string not containing a period. - - If the string EXCEPT is found in either the user or from list, the rest - of the list are exceptions to the list before EXCEPT. - -BBUUGGSS - If there's a user and a group with the same name, there is no way to make - the group match if the user also matches. - -SSEEEE AALLSSOO - login(1) - -AAUUTTHHOORRSS - The llooggiinn__aacccceessss() function was written by Wietse Venema. This manual - page was written for Heimdal. - - HEIMDAL March 21, 2003 1 diff --git a/kerberosV/src/appl/login/login.cat1 b/kerberosV/src/appl/login/login.cat1 deleted file mode 100644 index 21ca2a53d07..00000000000 --- a/kerberosV/src/appl/login/login.cat1 +++ /dev/null @@ -1,153 +0,0 @@ - -LOGIN(1) UNIX Reference Manual LOGIN(1) - -NNAAMMEE - llooggiinn - authenticate a user and start new session - -SSYYNNOOPPSSIISS - llooggiinn [--ffpp] [--aa _l_e_v_e_l] [--hh _h_o_s_t_n_a_m_e] _[_u_s_e_r_n_a_m_e_] - -DDEESSCCRRIIPPTTIIOONN - This manual page documents the llooggiinn program distributed with the Heim- - dal Kerberos 5 implementation, it may differ in important ways from your - system version. - - The llooggiinn programs logs users into the system. It is intended to be run - by system daemons like getty(8) or telnetd(8). If you are already logged - in, but want to change to another user, you should use su(1). - - A username can be given on the command line, else one will be prompted - for. - - A password is required to login, unless the --ff option is given (indicat- - ing that the calling program has already done proper authentication). - With --ff the user will be logged in without further questions. - - For password authentication Kerberos 5, Kerberos 4 (if compiled in), OTP - (if compiled in) and local (_/_e_t_c_/_p_a_s_s_w_d) passwords are supported. OTP - will be used if the the user is registered to use it, and llooggiinn is given - the option --aa otp. When using OTP, a challenge is shown to the user. - - Further options are: - - --aa _s_t_r_i_n_g - Which authentication mode to use, the only supported value is - currently ``otp''. - - --ff Indicates that the user is already authenticated. This happens, - for instance, when login is started by telnetd, and the user has - proved authentic via Kerberos. - - --hh _h_o_s_t_n_a_m_e - Indicates which host the user is logging in from. This is passed - from telnetd, and is entered into the login database. - - --pp This tells llooggiinn to preserve all environment variables. If not - given, only the TERM and TZ variables are preserved. It could be - a security risk to pass random variables to llooggiinn or the user - shell, so the calling daemon should make sure it only passes - ``safe'' variables. - - The process of logging user in proceeds as follows. - - First a check is made that logins are allowed at all. This usually means - checking _/_e_t_c_/_n_o_l_o_g_i_n. If it exists, and the user trying to login is not - root, the contents is printed, and then login exits. - - Then various system parameters are set up, like changing the owner of the - tty to the user, setting up signals, setting the group list, and user and - group id. Also various machine specific tasks are performed. - - Next llooggiinn changes to the users home directory, or if that fails, to _/. - The environment is setup, by adding some required variables (such as - PATH), and also authentication related ones (such as KRB5CCNAME). If an - environment file exists (_/_e_t_c_/_e_n_v_i_r_o_n_m_e_n_t), variables are set according - to it. - - If one or more login message files are configured, their contents is - printed to the terminal. - - If a login time command is configured, it is executed. A logout time com- - mand can also be configured, which makes llooggiinn fork, and wait for the us- - er shell to exit, and then run the command. This can be used to clean up - user credentials. - - Finally, the user's shell is executed. If the user logging in is root, - and root's login shell does not exist, a default shell (usually _/_b_i_n_/_s_h) - is also tried before giving up. - -EENNVVIIRROONNMMEENNTT - These environment variables are set by login (not including ones set by - _/_e_t_c_/_e_n_v_i_r_o_n_m_e_n_t): - - PATH the default system path - HOME the user's home directory (or possibly _/) - USER, LOGNAME both set to the username - SHELL the user's shell - TERM, TZ set to whatever is passed to llooggiinn - KRB5CCNAME if the password is verified via Kerberos 5, this will - point to the credentials cache file - KRBTKFILE if the password is verified via Kerberos 4, this will - point to the ticket file - -FFIILLEESS - /etc/environment - Contains a set of environment variables that should be set in ad- - dition to the ones above. It should contain sh-style assignments - like ``VARIABLE=value''. Note that they are not parsed the way a - shell would. No variable expansion is performed, and all strings - are literal, and quotation marks should not be used. Everything - after a hash mark is considered a comment. The following are all - different (the last will set the variable BAR, not FOO). - - FOO=this is a string - FOO="this is a string" - BAR= FOO='this is a string' - /etc/login.access - See login.access(5). - /etc/login.conf - This is a termcap style configuration file, that contains various - settings used by llooggiinn. Currently only the ``default'' capability - record is used. The possible capability strings include: - - environment - This is a comma separated list of environment files that - are read in the order specified. If this is missing the - default _/_e_t_c_/_e_n_v_i_r_o_n_m_e_n_t is used. - login_program - This program will be executed just before the user's - shell is started. It will be called without arguments. - logout_program - This program will be executed just after the user's shell - has terminated. It will be called without arguments. This - program will be the parent process of the spawned shell. - motd A comma separated list of text files that will be printed - to the user's terminal before starting the shell. The - string welcome works similarly, but points to a single - file. - /etc/nologin - If it exists, login is denied to all but root. The contents of - this file is printed before login exits. - - - Other llooggiinn programs typically print all sorts of information by default, - such as last time you logged in, if you have mail, and system message - files. This version of llooggiinn does not, so there is no reason for - _._h_u_s_h_l_o_g_i_n files or similar. We feel that these tasks are best left to - the user's shell, but the login_program facility allows for a shell inde- - pendent solution, if that is desired. - -EEXXAAMMPPLLEESS - A _l_o_g_i_n_._c_o_n_f file could look like: - - default:\ - :motd=/etc/motd,/etc/motd.local: - -SSEEEE AALLSSOO - su(1), login.access(5), getty(8), telnetd(8) - -AAUUTTHHOORRSS - This login program was written for the Heimdal Kerberos 5 implementation. - The login.access code was written by Wietse Venema. - - HEIMDAL March 24, 2003 3 diff --git a/kerberosV/src/appl/popper/popper.cat8 b/kerberosV/src/appl/popper/popper.cat8 deleted file mode 100644 index f2f3ebfc1d6..00000000000 --- a/kerberosV/src/appl/popper/popper.cat8 +++ /dev/null @@ -1,54 +0,0 @@ - -POPPER(8) UNIX System Manager's Manual POPPER(8) - -NNAAMMEE - ppooppppeerr - POP3 server - -SSYYNNOOPPSSIISS - ppooppppeerr [--kk] [--aa _n_o_n_e|otp] [--tt _f_i_l_e] [--TT _s_e_c_o_n_d_s] [--dd] [--ii] [--pp _p_o_r_t] - [----aaddddrreessss--lloogg==_f_i_l_e] - -DDEESSCCRRIIPPTTIIOONN - ppooppppeerr serves mail via the Post Office Protocol. Supported options in- - clude: - - --aa _n_o_n_e|otp, ----aauutthh--mmooddee==_n_o_n_e|otp - tells ppooppppeerr what authentication modes are acceptable, passing - _o_t_p disables clear text passwords. Otp doesn't disable Kerberos - authentication, only cleartext passwords. - - ----aaddddrreessss--lloogg==_f_i_l_e - logs the addresses of all clients to the specified file - - --dd, ----ddeebbuugg - enables more verbose log messages - - --ii, ----iinntteerraaccttiivvee - when not started by inetd, this flag tells ppooppppeerr that it has to - create a socket by itself - - --kk, ----kkeerrbbeerrooss - tells ppooppppeerr to use the Kerberos for authentication. - - --pp _p_o_r_t, ----ppoorrtt==_p_o_r_t - port to listen to, in combination with --ii - - --tt _f_i_l_e, ----ttrraaccee--ffiillee==_f_i_l_e - trace all commands to file - - --TT _s_e_c_o_n_d_s, ----ttiimmeeoouutt==_s_e_c_o_n_d_s - set timeout to something other than the default of 120 seconds - -SSEEEE AALLSSOO - push(8), movemail(8) - -SSTTAANNDDAARRDDSS - RFC1939 (Post Office Protocol - Version 3) - -AAUUTTHHOORRSS - The server was initially developed at the University of California, - Berkeley. - - Many changes have been made as part of the KTH Kerberos distributions. - - HEIMDAL April 16, 2003 1 diff --git a/kerberosV/src/appl/rcp/rcp.1 b/kerberosV/src/appl/rcp/rcp.1 deleted file mode 100644 index 5bd0a6b4186..00000000000 --- a/kerberosV/src/appl/rcp/rcp.1 +++ /dev/null @@ -1,67 +0,0 @@ -.\" $KTH: rcp.1,v 1.2 2003/04/16 12:20:43 joda Exp $ -.\" -.Dd April 16, 2003 -.Dt RCP 1 -.Os HEIMDAL -.Sh NAME -.Nm rcp -.Nd -copy file to and from remote machines -.Sh SYNOPSIS -.Nm rcp -.Op Fl 45FKpxz -.Op Fl P Ar port -.Ar file1 file2 -.Nm rcp -.Op Fl 45FKprxz -.Op Fl P Ar port -.Ar file... directory -.Sh DESCRIPTION -.Nm rcp -copies files between machines. Each file argument is either a remote file name of the form -.Dq rname@rhost:path -or a local file (containing no colon or with a slash before the first -colon). -.Pp -Supported options: -.Bl -tag -width Ds -.It Xo -.Fl 4 , -.Fl 5 , -.Fl K , -.Fl F , -.Fl x , -.Fl z -.Xc -These options are passed on to -.Xr rsh 1 . -.It Fl P Ar port -This will pass the option -.Fl p Ar port -to -.Xr rsh 1 . -.It Fl p -Preserve file permissions. -.It Fl r -Copy source directories recursively. -.El -.\".Sh ENVIRONMENT -.\".Sh FILES -.\".Sh EXAMPLES -.Sh DIAGNOSTICS -.Nm rcp -is implemented as a protocol on top of -.Xr rsh 1 , -and thus requires a working rsh. If you intend to use Kerberos -authentication, rsh needs to be Kerberos aware, else you may see more -or less strange errors, such as "login incorrect", or "lost -connection". -.\".Sh SEE ALSO -.\".Sh STANDARDS -.Sh HISTORY -The -.Nm rcp -utility first appeared in 4.2BSD. This version is derived from -4.3BSD-Reno. -.\".Sh AUTHORS -.\".Sh BUGS diff --git a/kerberosV/src/appl/rsh/rsh.cat1 b/kerberosV/src/appl/rsh/rsh.cat1 deleted file mode 100644 index e6d46ff0d4c..00000000000 --- a/kerberosV/src/appl/rsh/rsh.cat1 +++ /dev/null @@ -1,130 +0,0 @@ - -RSH(1) UNIX Reference Manual RSH(1) - -NNAAMMEE - rrsshh - remote shell - -SSYYNNOOPPSSIISS - rrsshh [--4455FFGGKKddeeffnnuuxxzz] [--UU _s_t_r_i_n_g] [--pp _p_o_r_t] [--ll _u_s_e_r_n_a_m_e] [--PP _N_|_O] _h_o_s_t - _[_c_o_m_m_a_n_d_] - -DDEESSCCRRIIPPTTIIOONN - rrsshh authenticates to the rshd(8) daemon on the remote _h_o_s_t, and then exe- - cutes the specified _c_o_m_m_a_n_d. - - rrsshh copies its standard input to the remote command, and the standard - output and error of the remote command to its own. - - Valid options are: - - --44, ----kkrrbb44 - The --44 option requests Kerberos 4 authentication. Normally all - supported authentication mechanisms will be tried, but in some - cases more explicit control is desired. - - --55, ----kkrrbb55 - The --55 option requests Kerberos 5 authentication. This is analo- - gous to the --44 option. - - --KK, ----bbrrookkeenn - The --KK option turns off all Kerberos authentication. The long - name implies that this is more or less totally unsecure. The se- - curity in this mode relies on reserved ports, which is not very - secure. - - --nn, ----nnoo--iinnppuutt - The --nn option directs the input from the _/_d_e_v_/_n_u_l_l device (see - the _B_U_G_S section of this manual page). - - --ee, ----nnoo--ssttddeerrrr - Don't use a separate socket for the stderr stream. This can be - necessary if rsh-ing through a NAT bridge. - - --xx, ----eennccrryypptt - The --xx option enables encryption for all data exchange. This is - only valid for Kerberos authenticated connections (see the _B_U_G_S - section for limitations). - - --zz The opposite of --xx. This is the default, but encryption can be - enabled when using Kerberos 5, by setting the libdefaults/encrypt - option in krb5.conf(5). - - --ff, ----ffoorrwwaarrdd - Forward Kerberos 5 credentials to the remote host. Also con- - trolled by libdefaults/forward in krb5.conf(5). - - --GG The opposite of --ff. - - --FF, ----ffoorrwwaarrddaabbllee - Make the forwarded credentials re-forwardable. Also controlled by - libdefaults/forwardable in krb5.conf(5). - - --uu, ----uunniiqquuee - Make sure the remote credentials cache is unique, that is, don't - - - reuse any existing cache. Mutually exclusive to --UU. - - --UU _s_t_r_i_n_g, ----ttkkffiillee==_s_t_r_i_n_g - Name of the remote credentials cache. Mutually exclusive to --uu. - - --pp _n_u_m_b_e_r_-_o_r_-_s_e_r_v_i_c_e, ----ppoorrtt==_n_u_m_b_e_r_-_o_r_-_s_e_r_v_i_c_e - Connect to this port instead of the default (which is 514 when - using old port based authentication, 544 for Kerberos 5 and non- - encrypted Kerberos 4, and 545 for encrytpted Kerberos 4; subject - of course to the contents of _/_e_t_c_/_s_e_r_v_i_c_e_s). - - --ll _s_t_r_i_n_g, ----uusseerr==_s_t_r_i_n_g - By default the remote username is the same as the local. The --ll - option or the _u_s_e_r_n_a_m_e_@_h_o_s_t format allow the remote name to be - specified. - - --PP _N_|_O_|_1_|_2, ----pprroottooccooll==_N_|_O_|_1_|_2 - Specifies which protocol version to use with Kerberos 5. _N and _2 - selects protocol version 2, while _O and _1 selects version 1. Ver- - sion 2 is believed to be more secure, and is the default. Unless - asked for a specific version, rrsshh will try both. This behaviour - may change in the future. - -EEXXAAMMPPLLEESS - Care should be taken when issuing commands containing shell meta charac- - ters. Without quoting, these will be expanded on the local machine. - - The following command: - - rsh otherhost cat remotefile > localfile - - will write the contents of the remote _r_e_m_o_t_e_f_i_l_e to the local _l_o_c_a_l_f_i_l_e, - but: - - rsh otherhost 'cat remotefile > remotefile2' - - will write it to the remote _r_e_m_o_t_e_f_i_l_e_2. - -FFIILLEESS - /etc/hosts - -SSEEEE AALLSSOO - rlogin(1), krb_realmofhost(3), krb_sendauth(3), hosts.equiv(5), - krb5.conf(5), rhosts(5), kerberos(8) rshd(8) - -HHIISSTTOORRYY - The rrsshh command appeared in 4.2BSD. - -AAUUTTHHOORRSS - This implementation of rrsshh was written as part of the Heimdal Kerberos 5 - implementation. - -BBUUGGSS - Some shells (notably csh(1)) will cause rrsshh to block if run in the back- - ground, unless the standard input is directed away from the terminal. - This is what the --nn option is for. - - The --xx options enables encryption for the session, but for both Kerberos - 4 and 5 the actual command is sent unencrypted, so you should not send - any secret information in the command line (which is probably a bad idea - anyway, since the command line can usually be read with tools like - ps(1)). Forthermore in Kerberos 4 the command is not even integrity pro- - tected, so anyone with the right tools can modify the command. - - HEIMDAL September 4, 2002 2 diff --git a/kerberosV/src/appl/rsh/rshd.cat8 b/kerberosV/src/appl/rsh/rshd.cat8 deleted file mode 100644 index 2b09091aadd..00000000000 --- a/kerberosV/src/appl/rsh/rshd.cat8 +++ /dev/null @@ -1,79 +0,0 @@ - -RSHD(8) UNIX System Manager's Manual RSHD(8) - -NNAAMMEE - rrsshhdd - remote shell server - -SSYYNNOOPPSSIISS - rrsshhdd [--aaiikkllnnvvxxPPLL] [--pp _p_o_r_t] - -DDEESSCCRRIIPPTTIIOONN - rrsshhdd is the server for the rsh(1) program. It provides an authenticated - remote command execution service. Supported options are: - - --nn, ----nnoo--kkeeeeppaalliivvee - Disables keep-alive messages. Keep-alives are packets sent at - certain intervals to make sure that the client is still there, - even when it doesn't send any data. - - --kk, ----kkeerrbbeerrooss - Assume that clients connecting to this server will use some form - of Kerberos authentication. See the _E_X_A_M_P_L_E_S section for a sample - inetd.conf(5) configuration. - - --xx, ----eennccrryypptt - For Kerberos 4 this means that the connections are encrypted. - Kerberos 5 can negotiate encryption even without this option, but - if it's present rrsshhdd will deny unencrypted connections. This op- - tion implies --kk. - - --vv, ----vvaaccuuoouuss - If the connecting client does not use any Kerberised authentica- - tion, print a message that complains about this fact, and exit. - This is helpful if you want to move away from old port-based au- - thentication. - - --PP When using the AFS filesystem, users' authentication tokens are - put in something called a PAG (Process Authentication Group). - Multiple processes can share a PAG, but normally each login ses- - sion has its own PAG. This option disables the sseettppaagg() call, so - all tokens will be put in the default (uid-based) PAG, making it - possible to share tokens between sessions. This is only useful in - peculiar environments, such as some batch systems. - - --ii, ----nnoo--iinneettdd - The --ii option will cause rrsshhdd to create a socket, instead of as- - suming that its stdin came from inetd(8). This is mostly useful - for debugging. - - --pp _p_o_r_t, ----ppoorrtt==_p_o_r_t - Port to use with --ii. - - --aa This flag is for backwards compatibility only. - - --LL This flag enables logging of connections to syslogd(8). This op- - tion is always on in this implementation. - -FFIILLEESS - /etc/hosts.equiv - ~/.rhosts - -EEXXAAMMPPLLEESS - The following can be used to enable Kerberised rsh in inetd.cond(5), - while disabling non-Kerberised connections: - - shell stream tcp nowait root /usr/libexec/rshd rshd -v - kshell stream tcp nowait root /usr/libexec/rshd rshd -k - ekshell stream tcp nowait root /usr/libexec/rshd rshd -kx - -SSEEEE AALLSSOO - rsh(1), iruserok(3) - -HHIISSTTOORRYY - The rrsshhdd command appeared in 4.2BSD. - -AAUUTTHHOORRSS - This implementation of rrsshhdd was written as part of the Heimdal Kerberos 5 - implementation. - - HEIMDAL November 22, 2002 2 diff --git a/kerberosV/src/cf/destdirs.m4 b/kerberosV/src/cf/destdirs.m4 deleted file mode 100644 index ff1a4a9614f..00000000000 --- a/kerberosV/src/cf/destdirs.m4 +++ /dev/null @@ -1,18 +0,0 @@ -dnl -dnl $KTH: destdirs.m4,v 1.2 2002/08/12 15:12:50 joda Exp $ -dnl - -AC_DEFUN([rk_DESTDIRS], [ -# This is done by AC_OUTPUT but we need the result here. -test "x$prefix" = xNONE && prefix=$ac_default_prefix -test "x$exec_prefix" = xNONE && exec_prefix='${prefix}' - -AC_FOREACH([rk_dir], [bin lib libexec localstate sbin sysconf], [ - x="${rk_dir[]dir}" - eval y="$x" - while test "x$y" != "x$x"; do - x="$y" - eval y="$x" - done - AC_DEFINE_UNQUOTED(AS_TR_CPP(rk_dir[]dir), "$x", [path to ]rk_dir[])]) -]) diff --git a/kerberosV/src/cf/dlopen.m4 b/kerberosV/src/cf/dlopen.m4 deleted file mode 100644 index 155c05ff385..00000000000 --- a/kerberosV/src/cf/dlopen.m4 +++ /dev/null @@ -1,8 +0,0 @@ -dnl -dnl $KTH: dlopen.m4,v 1.1 2002/08/28 16:32:16 joda Exp $ -dnl - -AC_DEFUN([rk_DLOPEN], [ - AC_FIND_FUNC_NO_LIBS(dlopen, dl) - AM_CONDITIONAL(HAVE_DLOPEN, test "$ac_cv_funclib_dlopen" != no) -]) diff --git a/kerberosV/src/cf/irix.m4 b/kerberosV/src/cf/irix.m4 deleted file mode 100644 index c7e98538e43..00000000000 --- a/kerberosV/src/cf/irix.m4 +++ /dev/null @@ -1,26 +0,0 @@ -dnl -dnl $KTH: irix.m4,v 1.1 2002/08/28 19:11:44 joda Exp $ -dnl - -AC_DEFUN([rk_IRIX], -[ -irix=no -case "$host" in -*-*-irix4*) - AC_DEFINE([IRIX4], 1, - [Define if you are running IRIX 4.]) - irix=yes - ;; -*-*-irix*) - irix=yes - ;; -esac -AM_CONDITIONAL(IRIX, test "$irix" != no)dnl - -AH_BOTTOM([ -/* IRIX 4 braindamage */ -#if IRIX == 4 && !defined(__STDC__) -#define __STDC__ 0 -#endif -]) -]) diff --git a/kerberosV/src/cf/otp.m4 b/kerberosV/src/cf/otp.m4 deleted file mode 100644 index f3770beccb5..00000000000 --- a/kerberosV/src/cf/otp.m4 +++ /dev/null @@ -1,27 +0,0 @@ -dnl $KTH: otp.m4,v 1.2 2002/05/19 20:51:08 joda Exp $ -dnl -dnl check requirements for OTP library -dnl -AC_DEFUN([rk_OTP],[ -AC_REQUIRE([rk_DB])dnl -AC_ARG_ENABLE(otp, - AC_HELP_STRING([--disable-otp],[if you don't want OTP support])) -if test "$enable_otp" = yes -a "$db_type" = unknown; then - AC_MSG_ERROR([OTP requires a NDBM/DB compatible library]) -fi -if test "$enable_otp" != no; then - if test "$db_type" != unknown; then - enable_otp=yes - else - enable_otp=no - fi -fi -if test "$enable_otp" = yes; then - AC_DEFINE(OTP, 1, [Define if you want OTP support in applications.]) - LIB_otp='$(top_builddir)/lib/otp/libotp.la' - AC_SUBST(LIB_otp) -fi -AC_MSG_CHECKING([whether to enable OTP library]) -AC_MSG_RESULT($enable_otp) -AM_CONDITIONAL(OTP, test "$enable_otp" = yes)dnl -]) diff --git a/kerberosV/src/cf/sunos.m4 b/kerberosV/src/cf/sunos.m4 deleted file mode 100644 index fa4dab87979..00000000000 --- a/kerberosV/src/cf/sunos.m4 +++ /dev/null @@ -1,25 +0,0 @@ -dnl -dnl $KTH: sunos.m4,v 1.2 2002/10/16 14:42:13 joda Exp $ -dnl - -AC_DEFUN([rk_SUNOS],[ -sunos=no -case "$host" in -*-*-sunos4*) - sunos=40 - ;; -*-*-solaris2.7) - sunos=57 - ;; -*-*-solaris2.[[89]]) - sunos=58 - ;; -*-*-solaris2*) - sunos=50 - ;; -esac -if test "$sunos" != no; then - AC_DEFINE_UNQUOTED(SunOS, $sunos, - [Define to what version of SunOS you are running.]) -fi -]) diff --git a/kerberosV/src/cf/telnet.m4 b/kerberosV/src/cf/telnet.m4 deleted file mode 100644 index 428e499e666..00000000000 --- a/kerberosV/src/cf/telnet.m4 +++ /dev/null @@ -1,78 +0,0 @@ -dnl -dnl $KTH: telnet.m4,v 1.1 2002/08/28 19:19:01 joda Exp $ -dnl -dnl stuff used by telnet - -AC_DEFUN([rk_TELNET],[ -AC_DEFINE(AUTHENTICATION, 1, - [Define if you want authentication support in telnet.])dnl -AC_DEFINE(ENCRYPTION, 1, - [Define if you want encryption support in telnet.])dnl -AC_DEFINE(DES_ENCRYPTION, 1, - [Define if you want to use DES encryption in telnet.])dnl -AC_DEFINE(DIAGNOSTICS, 1, - [Define this to enable diagnostics in telnet.])dnl -AC_DEFINE(OLD_ENVIRON, 1, - [Define this to enable old environment option in telnet.])dnl -if false; then - AC_DEFINE(ENV_HACK, 1, - [Define this if you want support for broken ENV_{VAR,VAL} telnets.]) -fi - -# Simple test for streamspty, based on the existance of getmsg(), alas -# this breaks on SunOS4 which have streams but BSD-like ptys -# -# And also something wierd has happend with dec-osf1, fallback to bsd-ptys - -case "$host" in -*-*-aix3*|*-*-sunos4*|*-*-osf*|*-*-hpux1[[01]]*) - ;; -*) - AC_CHECK_FUNC(getmsg) - if test "$ac_cv_func_getmsg" = "yes"; then - AC_CACHE_CHECK([if getmsg works], ac_cv_func_getmsg_works, - AC_TRY_RUN([ - #include <stdio.h> - #include <errno.h> - - int main() - { - int ret; - ret = getmsg(open("/dev/null", 0), NULL, NULL, NULL); - if(ret < 0 && errno == ENOSYS) - return 1; - return 0; - } - ], ac_cv_func_getmsg_works=yes, - ac_cv_func_getmsg_works=no, - ac_cv_func_getmsg_works=no)) - if test "$ac_cv_func_getmsg_works" = "yes"; then - AC_DEFINE(HAVE_GETMSG, 1, - [Define if you have a working getmsg.]) - AC_DEFINE(STREAMSPTY, 1, - [Define if you have streams ptys.]) - fi - fi - ;; -esac - -AH_BOTTOM([ -#if defined(ENCRYPTION) && !defined(AUTHENTICATION) -#define AUTHENTICATION 1 -#endif - -/* Set this to the default system lead string for telnetd - * can contain %-escapes: %s=sysname, %m=machine, %r=os-release - * %v=os-version, %t=tty, %h=hostname, %d=date and time - */ -#undef USE_IM - -/* Used with login -p */ -#undef LOGIN_ARGS - -/* set this to a sensible login */ -#ifndef LOGIN_PATH -#define LOGIN_PATH BINDIR "/login" -#endif -]) -]) diff --git a/kerberosV/src/lib/des/des.cat1 b/kerberosV/src/lib/des/des.cat1 deleted file mode 100644 index 9a78c18de35..00000000000 --- a/kerberosV/src/lib/des/des.cat1 +++ /dev/null @@ -1,132 +0,0 @@ - - - -DES(1) DES(1) - - - -NAME - des - encrypt or decrypt data using Data Encryption Standard - -SYNOPSIS - ddeess ( --ee | --EE ) | ( --dd | --DD ) | ( --[ccCC][cckknnaammee] ) | [ --bb33hhffss ] [ --kk _k_e_y ] ] - [ --uu[_u_u_n_a_m_e] [ _i_n_p_u_t_-_f_i_l_e [ _o_u_t_p_u_t_-_f_i_l_e ] ] - -DESCRIPTION - ddeess encrypts and decrypts data using the Data Encryption Standard algo- - rithm. One of --ee,, --EE (for encrypt) or --dd,, --DD (for decrypt) must be speci- - fied. It is also possible to use --cc or --CC in conjunction or instead of the - a encrypt/decrypt option to generate a 16 character hexadecimal checksum, - generated via the _d_e_s___c_b_c___c_k_s_u_m_. - - Two standard encryption modes are supported by the ddeess program, Cipher - Block Chaining (the default) and Electronic Code Book (specified with --bb ). - - The key used for the DES algorithm is obtained by prompting the user unless - the ``--kk _k_e_y_' option is given. If the key is an argument to the ddeess com- - mand, it is potentially visible to users executing ppss(1) or a derivative. - To minimise this possibility, ddeess takes care to destroy the key argument - immediately upon entry. If your shell keeps a history file be careful to - make sure it is not world readable. - - Since this program attempts to maintain compatibility with SunOS's des(1) - command, there are 2 different methods used to convert the user supplied - key to a des key. Whenever and one or more of --EE,, --DD,, --CC or --33 options are - used, the key conversion procedure will not be compatible with the SunOS - des(1) version but will use all the user supplied character to generate the - des key. ddeess command reads from standard input unless _i_n_p_u_t_-_f_i_l_e is speci- - fied and writes to standard output unless _o_u_t_p_u_t_-_f_i_l_e is given. - -OPTIONS - - --bb Select ECB (eight bytes at a time) encryption mode. - - --33 Encrypt using triple encryption. By default triple cbc encryption is - used but if the --bb option is used then triple ecb encryption is per- - formed. If the key is less than 8 characters long, the flag has no - effect. - - --ee Encrypt data using an 8 byte key in a manner compatible with SunOS - des(1). - - --EE Encrypt data using a key of nearly unlimited length (1024 bytes). - This will product a more secure encryption. - - --dd Decrypt data that was encrypted with the -e option. - - --DD Decrypt data that was encrypted with the -E option. - - --cc Generate a 16 character hexadecimal cbc checksum and output this to - stderr. If a filename was specified after the --cc option, the checksum - is output to that file. The checksum is generated using a key gener- - ated in a SunOS compatible manner. - - --CC A cbc checksum is generated in the same manner as described for the --cc - option but the DES key is generated in the same manner as used for the - --EE and --DD options - - --ff Does nothing - allowed for compatibility with SunOS des(1) command. - - --ss Does nothing - allowed for compatibility with SunOS des(1) command. - - --kk _k_e_y - Use the encryption _k_e_y specified. - - --hh The _k_e_y is assumed to be a 16 character hexadecimal number. If the --33 - option is used the key is assumed to be a 32 character hexadecimal - number. - - --uu This flag is used to read and write uuencoded files. If decrypting, - the input file is assumed to contain uuencoded, DES encrypted data. - If encrypting, the characters following the -u are used as the name of - the uuencoded file to embed in the begin line of the uuencoded output. - If there is no name specified after the -u, the name text.des will be - embedded in the header. - -SEE ALSO - ppss ((11)) ddeess__ccrryypptt((33)) - -BUGS - - The problem with using the --ee option is the short key length. It would be - better to use a real 56-bit key rather than an ASCII-based 56-bit pattern. - Knowing that the key was derived from ASCII radically reduces the time nec- - essary for a brute-force cryptographic attack. My attempt to remove this - problem is to add an alternative text-key to DES-key function. This alter- - native function (accessed via --EE,, --DD,, --SS and --33 ) uses DES to help generate - the key. - - Be carefully when using the -u option. Doing des -ud <filename> will not - decrypt filename (the -u option will gobble the d option). - - The VMS operating system operates in a world where files are always a mul- - tiple of 512 bytes. This causes problems when encrypted data is send from - unix to VMS since a 88 byte file will suddenly be padded with 424 null - bytes. To get around this problem, use the -u option to uuencode the data - before it is send to the VMS system. - -AUTHOR - - Eric Young (eay@mincom.oz.au or eay@psych.psy.uq.oz.au) - - - - - - - - - - - - - - - - - - - - - - diff --git a/kerberosV/src/lib/des/des_crypt.cat3 b/kerberosV/src/lib/des/des_crypt.cat3 deleted file mode 100644 index f7370a3af59..00000000000 --- a/kerberosV/src/lib/des/des_crypt.cat3 +++ /dev/null @@ -1,264 +0,0 @@ - - - -DES_CRYPT(3) DES_CRYPT(3) - - - -NAME - des_read_password, des_string_to_key, des_random_key, des_set_key, - des_ecb_encrypt, des_cbc_encrypt, des_pcbc_encrypt, des_cbc_cksum, - des_quad_cksum, - (new) DES encryption - -SYNOPSIS - ##iinncclluuddee <<ddeess..hh>> - - iinntt ddeess__rreeaadd__ppaasssswwoorrdd((kkeeyy,,pprroommpptt,,vveerriiffyy)) - des_cblock *key; - char *prompt; - int verify; - - iinntt ddeess__ssttrriinngg__ttoo__kkeeyy((ssttrr,,kkeeyy)) - cchhaarr **ssttrr;; - ddeess__ccbblloocckk kkeeyy;; - - iinntt ddeess__rraannddoomm__kkeeyy((kkeeyy)) - ddeess__ccbblloocckk **kkeeyy;; - - iinntt ddeess__sseett__kkeeyy((kkeeyy,,sscchheedduullee)) - ddeess__ccbblloocckk **kkeeyy;; - ddeess__kkeeyy__sscchheedduullee sscchheedduullee;; - - iinntt ddeess__eeccbb__eennccrryypptt((iinnppuutt,,oouuttppuutt,,sscchheedduullee,,eennccrryypptt)) - ddeess__ccbblloocckk **iinnppuutt;; - ddeess__ccbblloocckk **oouuttppuutt;; - ddeess__kkeeyy__sscchheedduullee sscchheedduullee;; - iinntt eennccrryypptt;; - - iinntt ddeess__ccbbcc__eennccrryypptt((iinnppuutt,,oouuttppuutt,,lleennggtthh,,sscchheedduullee,,iivveecc,,eennccrryypptt)) - ddeess__ccbblloocckk **iinnppuutt;; - ddeess__ccbblloocckk **oouuttppuutt;; - lloonngg lleennggtthh;; - ddeess__kkeeyy__sscchheedduullee sscchheedduullee;; - ddeess__ccbblloocckk **iivveecc;; - iinntt eennccrryypptt;; - - iinntt ddeess__ppccbbcc__eennccrryypptt((iinnppuutt,,oouuttppuutt,,lleennggtthh,,sscchheedduullee,,iivveecc,,eennccrryypptt)) - ddeess__ccbblloocckk **iinnppuutt;; - ddeess__ccbblloocckk **oouuttppuutt;; - lloonngg lleennggtthh;; - ddeess__kkeeyy__sscchheedduullee sscchheedduullee;; - ddeess__ccbblloocckk **iivveecc;; - iinntt eennccrryypptt;; - - uunnssiiggnneedd lloonngg ddeess__ccbbcc__cckkssuumm((iinnppuutt,,oouuttppuutt,,lleennggtthh,,sscchheedduullee,,iivveecc)) - ddeess__ccbblloocckk **iinnppuutt;; - ddeess__ccbblloocckk **oouuttppuutt;; - lloonngg lleennggtthh;; - ddeess__kkeeyy__sscchheedduullee sscchheedduullee;; - ddeess__ccbblloocckk **iivveecc;; - - uunnssiiggnneedd lloonngg qquuaadd__cckkssuumm((iinnppuutt,,oouuttppuutt,,lleennggtthh,,oouutt__ccoouunntt,,sseeeedd)) - ddeess__ccbblloocckk **iinnppuutt;; - ddeess__ccbblloocckk **oouuttppuutt;; - lloonngg lleennggtthh;; - iinntt oouutt__ccoouunntt;; - ddeess__ccbblloocckk **sseeeedd;; - -DESCRIPTION - This library supports various DES encryption related operations. It differs - from the _c_r_y_p_t_, _s_e_t_k_e_y_, _a_n_d _e_n_c_r_y_p_t library routines in that it provides a - true DES encryption, without modifying the algorithm, and executes much - faster. - - For each key that may be simultaneously active, create a ddeess__kkeeyy__sscchheedduullee - struct, defined in "des.h". Next, create key schedules (from the 8-byte - keys) as needed, via _d_e_s___s_e_t___k_e_y_, prior to using the encryption or checksum - routines. Then setup the input and output areas. Make sure to note the - restrictions on lengths being multiples of eight bytes. Finally, invoke the - encryption/decryption routines, _d_e_s___e_c_b___e_n_c_r_y_p_t or _d_e_s___c_b_c___e_n_c_r_y_p_t or - _d_e_s___p_c_b_c___e_n_c_r_y_p_t_, or, to generate a cryptographic checksum, use _q_u_a_d___c_k_s_u_m - (fast) or _d_e_s___c_b_c___c_k_s_u_m (slow). - - A _d_e_s___c_b_l_o_c_k struct is an 8 byte block used as the fundamental unit for DES - data and keys, and is defined as: - - ttyyppeeddeeff uunnssiiggnneedd cchhaarr ddeess__ccbblloocckk[[88]];; - - and a _d_e_s___k_e_y___s_c_h_e_d_u_l_e_, is defined as: - - ttyyppeeddeeff ssttrruucctt ddeess__kkss__ssttrruucctt {{ddeess__ccbblloocckk __;;}} ddeess__kkeeyy__sscchheedduullee[[1166]];; - - _d_e_s___r_e_a_d___p_a_s_s_w_o_r_d writes the string specified by _p_r_o_m_p_t to the standard - output, turns off echo (if possible) and reads an input string from stan- - dard input until terminated with a newline. If _v_e_r_i_f_y is non-zero, it - prompts and reads input again, for use in applications such as changing a - password; both versions are compared, and the input is requested repeatedly - until they match. Then _d_e_s___r_e_a_d___p_a_s_s_w_o_r_d converts the input string into a - valid DES key, internally using the _d_e_s___s_t_r_i_n_g___t_o___k_e_y routine. The newly - created key is copied to the area pointed to by the _k_e_y argument. - _d_e_s___r_e_a_d___p_a_s_s_w_o_r_d returns a zero if no errors occurred, or a -1 indicating - that an error occurred trying to manipulate the terminal echo. - - _d_e_s___s_t_r_i_n_g___t_o___k_e_y converts an arbitrary length null-terminated string to an - 8 byte DES key, with odd byte parity, per FIPS specification. A one-way - function is used to convert the string to a key, making it very difficult - to reconstruct the string from the key. The _s_t_r argument is a pointer to - the string, and _k_e_y should point to a _d_e_s___c_b_l_o_c_k supplied by the caller to - receive the generated key. No meaningful value is returned. Void is not - used for compatibility with other compilers. - - _d_e_s___r_a_n_d_o_m___k_e_y generates a random DES encryption key (eight bytes), set to - odd parity per FIPS specifications. This routine uses the current time, - process id, and a counter as a seed for the random number generator. The - caller must supply space for the output key, pointed to by argument _k_e_y_, - then after calling _d_e_s___r_a_n_d_o_m___k_e_y should call the _d_e_s___s_e_t___k_e_y routine when - needed. No meaningful value is returned. Void is not used for compatibil- - ity with other compilers. - - _d_e_s___s_e_t___k_e_y calculates a key schedule from all eight bytes of the input - key, pointed to by the _k_e_y argument, and outputs the schedule into the - _d_e_s___k_e_y___s_c_h_e_d_u_l_e indicated by the _s_c_h_e_d_u_l_e argument. Make sure to pass a - valid eight byte key; no padding is done. The key schedule may then be - used in subsequent encryption/decryption/checksum operations. Many key - schedules may be cached for later use. The user is responsible to clear - keys and schedules as soon as no longer needed, to prevent their disclo- - sure. The routine also checks the key parity, and returns a zero if the - key parity is correct (odd), a -1 indicating a key parity error, or a -2 - indicating use of an illegal weak key. If an error is returned, the key - schedule was not created. - - _d_e_s___e_c_b___e_n_c_r_y_p_t is the basic DES encryption routine that encrypts or - decrypts a single 8-byte block in eelleeccttrroonniicc ccooddee bbooookk mode. It always - transforms the input data, pointed to by _i_n_p_u_t_, into the output data, - pointed to by the _o_u_t_p_u_t argument. - - If the _e_n_c_r_y_p_t argument is non-zero, the _i_n_p_u_t (cleartext) is encrypted - into the _o_u_t_p_u_t (ciphertext) using the key_schedule specified by the _s_c_h_e_d_- - _u_l_e argument, previously set via _d_e_s___s_e_t___k_e_y - - If encrypt is zero, the _i_n_p_u_t (now ciphertext) is decrypted into the _o_u_t_p_u_t - (now cleartext). - - Input and output may overlap. - - No meaningful value is returned. Void is not used for compatibility with - other compilers. - - _d_e_s___c_b_c___e_n_c_r_y_p_t encrypts/decrypts using the cciipphheerr--bblloocckk--cchhaaiinniinngg mmooddee ooff - DDEESS.. If the _e_n_c_r_y_p_t argument is non-zero, the routine cipher-block-chain - encrypts the cleartext data pointed to by the _i_n_p_u_t argument into the - ciphertext pointed to by the _o_u_t_p_u_t argument, using the key schedule pro- - vided by the _s_c_h_e_d_u_l_e argument, and initialization vector provided by the - _i_v_e_c argument. If the _l_e_n_g_t_h argument is not an integral multiple of eight - bytes, the last block is copied to a temp and zero filled (highest - addresses). The output is ALWAYS an integral multiple of eight bytes. - - If _e_n_c_r_y_p_t is zero, the routine cipher-block chain decrypts the (now) - ciphertext data pointed to by the _i_n_p_u_t argument into (now) cleartext - pointed to by the _o_u_t_p_u_t argument using the key schedule provided by the - _s_c_h_e_d_u_l_e argument, and initialization vector provided by the _i_v_e_c argument. - Decryption ALWAYS operates on integral multiples of 8 bytes, so it will - round the _l_e_n_g_t_h provided up to the appropriate multiple. Consequently, it - will always produce the rounded-up number of bytes of output cleartext. The - application must determine if the output cleartext was zero-padded due to - original cleartext lengths that were not integral multiples of 8. - - No errors or meaningful values are returned. Void is not used for compati- - bility with other compilers. - - A characteristic of cbc mode is that changing a single bit of the cleart- - ext, then encrypting using cbc mode, affects ALL the subsequent ciphertext. - This makes cryptanalysis much more difficult. However, modifying a single - bit of the ciphertext, then decrypting, only affects the resulting cleart- - ext from the modified block and the succeeding block. Therefore, - _d_e_s___p_c_b_c___e_n_c_r_y_p_t is STRONGLY recommended for applications where indefinite - propagation of errors is required in order to detect modifications. - - _d_e_s___p_c_b_c___e_n_c_r_y_p_t encrypts/decrypts using a modified block chaining mode. - Its calling sequence is identical to _d_e_s___c_b_c___e_n_c_r_y_p_t_. It differs in its - error propagation characteristics. - - _d_e_s___p_c_b_c___e_n_c_r_y_p_t is highly recommended for most encryption purposes, in - that modification of a single bit of the ciphertext will affect ALL the - subsequent (decrypted) cleartext. Similarly, modifying a single bit of the - cleartext will affect ALL the subsequent (encrypted) ciphertext. "PCBC" - mode, on encryption, "xors" both the cleartext of block N and the cipher- - text resulting from block N with the cleartext for block N+1 prior to - encrypting block N+1. - - _d_e_s___c_b_c___c_k_s_u_m produces an 8 byte cryptographic checksum by cipher-block- - chain encrypting the cleartext data pointed to by the _i_n_p_u_t argument. All - of the ciphertext output is discarded, except the last 8-byte ciphertext - block, which is written into the area pointed to by the _o_u_t_p_u_t argument. - It uses the key schedule, provided by the _s_c_h_e_d_u_l_e argument and initializa- - tion vector provided by the _i_v_e_c argument. If the _l_e_n_g_t_h argument is not - an integral multiple of eight bytes, the last cleartext block is copied to - a temp and zero filled (highest addresses). The output is ALWAYS eight - bytes. - - The routine also returns an unsigned long, which is the last (highest - address) half of the 8 byte checksum computed. - - _q_u_a_d___c_k_s_u_m produces a checksum by chaining quadratic operations on the - cleartext data pointed to by the _i_n_p_u_t argument. The _l_e_n_g_t_h argument speci- - fies the length of the input -- only exactly that many bytes are included - for the checksum, without any padding. - - The algorithm may be iterated over the same input data, if the _o_u_t___c_o_u_n_t - argument is 2, 3 or 4, and the optional _o_u_t_p_u_t argument is a non-null - pointer . The default is one iteration, and it will not run more than 4 - times. Multiple iterations run slower, but provide a longer checksum if - desired. The _s_e_e_d argument provides an 8-byte seed for the first iteration. - If multiple iterations are requested, the results of one iteration are - automatically used as the seed for the next iteration. - - It returns both an unsigned long checksum value, and if the _o_u_t_p_u_t argument - is not a null pointer, up to 16 bytes of the computed checksum are written - into the output. - -FILES - /usr/include/des.h - /usr/lib/libdes.a - -SEE ALSO - -DIAGNOSTICS - -BUGS - This software has not yet been compiled or tested on machines other than - the VAX and the IBM PC. - -AUTHORS - Steve Miller, MIT Project Athena/Digital Equipment Corporation - -RESTRICTIONS - COPYRIGHT 1985,1986 Massachusetts Institute of Technology - - This software may not be exported outside of the US without a special - license from the US Dept of Commerce. It may be replaced by any secret key - block cipher with block length and key length of 8 bytes, as long as the - interface is the same as described here. - - - - - - - - - - - - - - - - - - - - - - - diff --git a/kerberosV/src/lib/gssapi/gss_acquire_cred.cat3 b/kerberosV/src/lib/gssapi/gss_acquire_cred.cat3 deleted file mode 100644 index 37f2c744551..00000000000 --- a/kerberosV/src/lib/gssapi/gss_acquire_cred.cat3 +++ /dev/null @@ -1,275 +0,0 @@ - -GSS_ACQUIRE_CRED(3) UNIX Programmer's Manual GSS_ACQUIRE_CRED(3) - -NNAAMMEE - ggssss__aacccceepptt__sseecc__ccoonntteexxtt, ggssss__aaccqquuiirree__ccrreedd, ggssss__aadddd__ccrreedd, - ggssss__aadddd__ooiidd__sseett__mmeemmbbeerr, ggssss__ccaannoonniiccaalliizzee__nnaammee, ggssss__ccoommppaarree__nnaammee, - ggssss__ccoonntteexxtt__ttiimmee, ggssss__ccrreeaattee__eemmppttyy__ooiidd__sseett, ggssss__ddeelleettee__sseecc__ccoonntteexxtt, - ggssss__ddiissppllaayy__nnaammee, ggssss__ddiissppllaayy__ssttaattuuss, ggssss__dduupplliiccaattee__nnaammee, - ggssss__eexxppoorrtt__nnaammee, ggssss__eexxppoorrtt__sseecc__ccoonntteexxtt, ggssss__ggeett__mmiicc, ggssss__iimmppoorrtt__nnaammee, - ggssss__iimmppoorrtt__sseecc__ccoonntteexxtt, ggssss__iinnddiiccaattee__mmeecchhss, ggssss__iinniitt__sseecc__ccoonntteexxtt, - ggssss__iinnqquuiirree__ccoonntteexxtt, ggssss__iinnqquuiirree__ccrreedd, ggssss__iinnqquuiirree__ccrreedd__bbyy__mmeecchh, - ggssss__iinnqquuiirree__mmeecchhss__ffoorr__nnaammee, ggssss__iinnqquuiirree__nnaammeess__ffoorr__mmeecchh, - ggssss__kkrrbb55__ccooppyy__ccccaacchhee, ggssss__kkrrbb55__ccoommppaatt__ddeess33__mmiicc, - ggssss__pprroocceessss__ccoonntteexxtt__ttookkeenn, ggssss__rreelleeaassee__bbuuffffeerr, ggssss__rreelleeaassee__ccrreedd, - ggssss__rreelleeaassee__nnaammee, ggssss__rreelleeaassee__ooiidd__sseett, ggssss__sseeaall, ggssss__ssiiggnn, - ggssss__tteesstt__ooiidd__sseett__mmeemmbbeerr, ggssss__uunnsseeaall, ggssss__uunnwwrraapp, ggssss__vveerriiffyy, - ggssss__vveerriiffyy__mmiicc, ggssss__wwrraapp, ggssss__wwrraapp__ssiizzee__lliimmiitt - Generic Security Service - Application Program Interface library - -LLIIBBRRAARRYY - GSS-API library (libgssapi, -lgssapi) - -SSYYNNOOPPSSIISS - _O_M___u_i_n_t_3_2 - ggssss__aacccceepptt__sseecc__ccoonntteexxtt(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _g_s_s___c_t_x___i_d___t _* _c_o_n_t_e_x_t___h_a_n_d_l_e, - _c_o_n_s_t _g_s_s___c_r_e_d___i_d___t _a_c_c_e_p_t_o_r___c_r_e_d___h_a_n_d_l_e, - _c_o_n_s_t _g_s_s___b_u_f_f_e_r___t _i_n_p_u_t___t_o_k_e_n___b_u_f_f_e_r, - _c_o_n_s_t _g_s_s___c_h_a_n_n_e_l___b_i_n_d_i_n_g_s___t _i_n_p_u_t___c_h_a_n___b_i_n_d_i_n_g_s, - _g_s_s___n_a_m_e___t _* _s_r_c___n_a_m_e, _g_s_s___O_I_D _* _m_e_c_h___t_y_p_e, - _g_s_s___b_u_f_f_e_r___t _o_u_t_p_u_t___t_o_k_e_n, _O_M___u_i_n_t_3_2 _* _r_e_t___f_l_a_g_s, - _O_M___u_i_n_t_3_2 _* _t_i_m_e___r_e_c, _g_s_s___c_r_e_d___i_d___t _* _d_e_l_e_g_a_t_e_d___c_r_e_d___h_a_n_d_l_e) - - _O_M___u_i_n_t_3_2 - ggssss__aaccqquuiirree__ccrreedd(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _c_o_n_s_t _g_s_s___n_a_m_e___t _d_e_s_i_r_e_d___n_a_m_e, - _O_M___u_i_n_t_3_2 _t_i_m_e___r_e_q, _c_o_n_s_t _g_s_s___O_I_D___s_e_t _d_e_s_i_r_e_d___m_e_c_h_s, - _g_s_s___c_r_e_d___u_s_a_g_e___t _c_r_e_d___u_s_a_g_e, _g_s_s___c_r_e_d___i_d___t _* _o_u_t_p_u_t___c_r_e_d___h_a_n_d_l_e, - _g_s_s___O_I_D___s_e_t _* _a_c_t_u_a_l___m_e_c_h_s, _O_M___u_i_n_t_3_2 _* _t_i_m_e___r_e_c) - - _O_M___u_i_n_t_3_2 - ggssss__aadddd__ooiidd__sseett__mmeemmbbeerr(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _c_o_n_s_t _g_s_s___O_I_D _m_e_m_b_e_r___o_i_d, _g_s_s___O_I_D___s_e_t _* _o_i_d___s_e_t) - - _O_M___u_i_n_t_3_2 - ggssss__ccaannoonniiccaalliizzee__nnaammee(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _c_o_n_s_t _g_s_s___n_a_m_e___t _i_n_p_u_t___n_a_m_e, _c_o_n_s_t _g_s_s___O_I_D _m_e_c_h___t_y_p_e, - _g_s_s___n_a_m_e___t _* _o_u_t_p_u_t___n_a_m_e) - - _O_M___u_i_n_t_3_2 - ggssss__ccoommppaarree__nnaammee(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _c_o_n_s_t _g_s_s___n_a_m_e___t _n_a_m_e_1, - _c_o_n_s_t _g_s_s___n_a_m_e___t _n_a_m_e_2, _i_n_t _* _n_a_m_e___e_q_u_a_l) - - _O_M___u_i_n_t_3_2 - ggssss__ccoonntteexxtt__ttiimmee(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _c_o_n_s_t _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, _O_M___u_i_n_t_3_2 _* _t_i_m_e___r_e_c) - - _O_M___u_i_n_t_3_2 - ggssss__ccrreeaattee__eemmppttyy__ooiidd__sseett(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _g_s_s___O_I_D___s_e_t _* _o_i_d___s_e_t) - - _O_M___u_i_n_t_3_2 - ggssss__ddeelleettee__sseecc__ccoonntteexxtt(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _g_s_s___c_t_x___i_d___t _* _c_o_n_t_e_x_t___h_a_n_d_l_e, _g_s_s___b_u_f_f_e_r___t _o_u_t_p_u_t___t_o_k_e_n) - - _O_M___u_i_n_t_3_2 - ggssss__ddiissppllaayy__nnaammee(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _c_o_n_s_t _g_s_s___n_a_m_e___t _i_n_p_u_t___n_a_m_e, - _g_s_s___b_u_f_f_e_r___t _o_u_t_p_u_t___n_a_m_e___b_u_f_f_e_r, _g_s_s___O_I_D _* _o_u_t_p_u_t___n_a_m_e___t_y_p_e) - - _O_M___u_i_n_t_3_2 - ggssss__ddiissppllaayy__ssttaattuuss(_O_M___u_i_n_t_3_2 _*_m_i_n_o_r___s_t_a_t_u_s, _O_M___u_i_n_t_3_2 _s_t_a_t_u_s___v_a_l_u_e, - _i_n_t _s_t_a_t_u_s___t_y_p_e, _c_o_n_s_t _g_s_s___O_I_D _m_e_c_h___t_y_p_e, - _O_M___u_i_n_t_3_2 _*_m_e_s_s_a_g_e___c_o_n_t_e_x_t, _g_s_s___b_u_f_f_e_r___t _s_t_a_t_u_s___s_t_r_i_n_g) - - _O_M___u_i_n_t_3_2 - ggssss__dduupplliiccaattee__nnaammee(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _c_o_n_s_t _g_s_s___n_a_m_e___t _s_r_c___n_a_m_e, - _g_s_s___n_a_m_e___t _* _d_e_s_t___n_a_m_e) - - _O_M___u_i_n_t_3_2 - ggssss__eexxppoorrtt__nnaammee(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _c_o_n_s_t _g_s_s___n_a_m_e___t _i_n_p_u_t___n_a_m_e, - _g_s_s___b_u_f_f_e_r___t _e_x_p_o_r_t_e_d___n_a_m_e) - - _O_M___u_i_n_t_3_2 - ggssss__eexxppoorrtt__sseecc__ccoonntteexxtt(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _g_s_s___c_t_x___i_d___t _* _c_o_n_t_e_x_t___h_a_n_d_l_e, _g_s_s___b_u_f_f_e_r___t _i_n_t_e_r_p_r_o_c_e_s_s___t_o_k_e_n) - - _O_M___u_i_n_t_3_2 - ggssss__ggeett__mmiicc(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _c_o_n_s_t _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, - _g_s_s___q_o_p___t _q_o_p___r_e_q, _c_o_n_s_t _g_s_s___b_u_f_f_e_r___t _m_e_s_s_a_g_e___b_u_f_f_e_r, - _g_s_s___b_u_f_f_e_r___t _m_e_s_s_a_g_e___t_o_k_e_n) - - _O_M___u_i_n_t_3_2 - ggssss__iimmppoorrtt__nnaammee(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s_,, - _c_o_n_s_t _g_s_s___b_u_f_f_e_r___t _i_n_p_u_t___n_a_m_e___b_u_f_f_e_r, - _c_o_n_s_t _g_s_s___O_I_D _i_n_p_u_t___n_a_m_e___t_y_p_e, _g_s_s___n_a_m_e___t _* _o_u_t_p_u_t___n_a_m_e) - - _O_M___u_i_n_t_3_2 - ggssss__iimmppoorrtt__sseecc__ccoonntteexxtt(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _c_o_n_s_t _g_s_s___b_u_f_f_e_r___t _i_n_t_e_r_p_r_o_c_e_s_s___t_o_k_e_n, - _g_s_s___c_t_x___i_d___t _* _c_o_n_t_e_x_t___h_a_n_d_l_e) - - _O_M___u_i_n_t_3_2 - ggssss__iinnddiiccaattee__mmeecchhss(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _g_s_s___O_I_D___s_e_t _* _m_e_c_h___s_e_t) - - _O_M___u_i_n_t_3_2 - ggssss__iinniitt__sseecc__ccoonntteexxtt(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _c_o_n_s_t _g_s_s___c_r_e_d___i_d___t _i_n_i_t_i_a_t_o_r___c_r_e_d___h_a_n_d_l_e, - _g_s_s___c_t_x___i_d___t _* _c_o_n_t_e_x_t___h_a_n_d_l_e, _c_o_n_s_t _g_s_s___n_a_m_e___t _t_a_r_g_e_t___n_a_m_e, - _c_o_n_s_t _g_s_s___O_I_D _m_e_c_h___t_y_p_e, _O_M___u_i_n_t_3_2 _r_e_q___f_l_a_g_s, _O_M___u_i_n_t_3_2 _t_i_m_e___r_e_q, - _c_o_n_s_t _g_s_s___c_h_a_n_n_e_l___b_i_n_d_i_n_g_s___t _i_n_p_u_t___c_h_a_n___b_i_n_d_i_n_g_s, - _c_o_n_s_t _g_s_s___b_u_f_f_e_r___t _i_n_p_u_t___t_o_k_e_n, _g_s_s___O_I_D _* _a_c_t_u_a_l___m_e_c_h___t_y_p_e, - _g_s_s___b_u_f_f_e_r___t _o_u_t_p_u_t___t_o_k_e_n, _O_M___u_i_n_t_3_2 _* _r_e_t___f_l_a_g_s, - _O_M___u_i_n_t_3_2 _* _t_i_m_e___r_e_c) - - _O_M___u_i_n_t_3_2 - ggssss__iinnqquuiirree__ccoonntteexxtt(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _c_o_n_s_t _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, _g_s_s___n_a_m_e___t _* _s_r_c___n_a_m_e, - _g_s_s___n_a_m_e___t _* _t_a_r_g___n_a_m_e, _O_M___u_i_n_t_3_2 _* _l_i_f_e_t_i_m_e___r_e_c, - _g_s_s___O_I_D _* _m_e_c_h___t_y_p_e, _O_M___u_i_n_t_3_2 _* _c_t_x___f_l_a_g_s, - _i_n_t _* _l_o_c_a_l_l_y___i_n_i_t_i_a_t_e_d, _i_n_t _* _o_p_e_n___c_o_n_t_e_x_t) - - _O_M___u_i_n_t_3_2 - ggssss__iinnqquuiirree__ccrreedd(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _c_o_n_s_t _g_s_s___c_r_e_d___i_d___t _c_r_e_d___h_a_n_d_l_e, _g_s_s___n_a_m_e___t _* _n_a_m_e, - _O_M___u_i_n_t_3_2 _* _l_i_f_e_t_i_m_e, _g_s_s___c_r_e_d___u_s_a_g_e___t _* _c_r_e_d___u_s_a_g_e, - _g_s_s___O_I_D___s_e_t _* _m_e_c_h_a_n_i_s_m_s) - - _O_M___u_i_n_t_3_2 - ggssss__iinnqquuiirree__ccrreedd__bbyy__mmeecchh() - - _O_M___u_i_n_t_3_2 - ggssss__iinnqquuiirree__mmeecchhss__ffoorr__nnaammee() - - - _O_M___u_i_n_t_3_2 - ggssss__iinnqquuiirree__nnaammeess__ffoorr__mmeecchh() - - _O_M___u_i_n_t_3_2 - ggssss__kkrrbb55__ccooppyy__ccccaacchhee(_O_M___u_i_n_t_3_2 _*_m_i_n_o_r, _g_s_s___c_r_e_d___i_d___t _c_r_e_d, - _k_r_b_5___c_c_a_c_h_e _o_u_t) - - _O_M___u_i_n_t_3_2 - ggssss__kkrrbb55__ccoommppaatt__ddeess33__mmiicc(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, _i_n_t _o_n_o_f_f) - - _O_M___u_i_n_t_3_2 - ggssss__pprroocceessss__ccoonntteexxtt__ttookkeenn() - - _O_M___u_i_n_t_3_2 - ggssss__rreelleeaassee__bbuuffffeerr(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _g_s_s___b_u_f_f_e_r___t _b_u_f_f_e_r) - - _O_M___u_i_n_t_3_2 - ggssss__rreelleeaassee__ccrreedd(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _g_s_s___c_r_e_d___i_d___t _* _c_r_e_d___h_a_n_d_l_e) - - _O_M___u_i_n_t_3_2 - ggssss__rreelleeaassee__nnaammee(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _g_s_s___n_a_m_e___t _* _i_n_p_u_t___n_a_m_e) - - - ggssss__rreelleeaassee__ooiidd__sseett(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _g_s_s___O_I_D___s_e_t _* _s_e_t) - - _O_M___u_i_n_t_3_2 - ggssss__sseeaall(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, - _i_n_t _c_o_n_f___r_e_q___f_l_a_g, _i_n_t _q_o_p___r_e_q, - _g_s_s___b_u_f_f_e_r___t _i_n_p_u_t___m_e_s_s_a_g_e___b_u_f_f_e_r, _i_n_t _* _c_o_n_f___s_t_a_t_e, - _g_s_s___b_u_f_f_e_r___t _o_u_t_p_u_t___m_e_s_s_a_g_e___b_u_f_f_e_r) - - _O_M___u_i_n_t_3_2 - ggssss__ssiiggnn(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, - _i_n_t _q_o_p___r_e_q, _g_s_s___b_u_f_f_e_r___t _m_e_s_s_a_g_e___b_u_f_f_e_r, - _g_s_s___b_u_f_f_e_r___t _m_e_s_s_a_g_e___t_o_k_e_n) - - _O_M___u_i_n_t_3_2 - ggssss__tteesstt__ooiidd__sseett__mmeemmbbeerr(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _c_o_n_s_t _g_s_s___O_I_D _m_e_m_b_e_r, - _c_o_n_s_t _g_s_s___O_I_D___s_e_t _s_e_t, _i_n_t _* _p_r_e_s_e_n_t) - - _O_M___u_i_n_t_3_2 - ggssss__uunnsseeaall(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, - _g_s_s___b_u_f_f_e_r___t _i_n_p_u_t___m_e_s_s_a_g_e___b_u_f_f_e_r, - _g_s_s___b_u_f_f_e_r___t _o_u_t_p_u_t___m_e_s_s_a_g_e___b_u_f_f_e_r, _i_n_t _* _c_o_n_f___s_t_a_t_e, - _i_n_t _* _q_o_p___s_t_a_t_e) - - _O_M___u_i_n_t_3_2 - ggssss__uunnwwrraapp(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _c_o_n_s_t _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, - _c_o_n_s_t _g_s_s___b_u_f_f_e_r___t _i_n_p_u_t___m_e_s_s_a_g_e___b_u_f_f_e_r, - _g_s_s___b_u_f_f_e_r___t _o_u_t_p_u_t___m_e_s_s_a_g_e___b_u_f_f_e_r, _i_n_t _* _c_o_n_f___s_t_a_t_e, - _g_s_s___q_o_p___t _* _q_o_p___s_t_a_t_e) - - _O_M___u_i_n_t_3_2 - ggssss__vveerriiffyy(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, - _g_s_s___b_u_f_f_e_r___t _m_e_s_s_a_g_e___b_u_f_f_e_r, _g_s_s___b_u_f_f_e_r___t _t_o_k_e_n___b_u_f_f_e_r, - _i_n_t _* _q_o_p___s_t_a_t_e) - - _O_M___u_i_n_t_3_2 - ggssss__vveerriiffyy__mmiicc(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _c_o_n_s_t _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, - _c_o_n_s_t _g_s_s___b_u_f_f_e_r___t _m_e_s_s_a_g_e___b_u_f_f_e_r, - _c_o_n_s_t _g_s_s___b_u_f_f_e_r___t _t_o_k_e_n___b_u_f_f_e_r, _g_s_s___q_o_p___t _* _q_o_p___s_t_a_t_e) - - - - ggssss__wwrraapp(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, _c_o_n_s_t _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, - _i_n_t _c_o_n_f___r_e_q___f_l_a_g, _g_s_s___q_o_p___t _q_o_p___r_e_q, - _c_o_n_s_t _g_s_s___b_u_f_f_e_r___t _i_n_p_u_t___m_e_s_s_a_g_e___b_u_f_f_e_r, _i_n_t _* _c_o_n_f___s_t_a_t_e, - _g_s_s___b_u_f_f_e_r___t _o_u_t_p_u_t___m_e_s_s_a_g_e___b_u_f_f_e_r) - - _O_M___u_i_n_t_3_2 - ggssss__wwrraapp__ssiizzee__lliimmiitt(_O_M___u_i_n_t_3_2 _* _m_i_n_o_r___s_t_a_t_u_s, - _c_o_n_s_t _g_s_s___c_t_x___i_d___t _c_o_n_t_e_x_t___h_a_n_d_l_e, _i_n_t _c_o_n_f___r_e_q___f_l_a_g, - _g_s_s___q_o_p___t _q_o_p___r_e_q, _O_M___u_i_n_t_3_2 _r_e_q___o_u_t_p_u_t___s_i_z_e, - _O_M___u_i_n_t_3_2 _* _m_a_x___i_n_p_u_t___s_i_z_e) - -DDEESSCCRRIIPPTTIIOONN - Generic Security Service API (GSS-API) version 2, and its C binding, is - described in RFC2743 and RFC2744. Version 1 (deprecated) of the C binding - is described in RFC1509. - - Heimdals GSS-API implementation supports the following mechanisms - - ++oo GSS_KRB5_MECHANISM - - GSS-API have generic name types that all mechanism are supposed to imple- - ment (if possible) - - ++oo GSS_C_NT_USER_NAME - - ++oo GSS_C_NT_MACHINE_UID_NAME - - ++oo GSS_C_NT_STRING_UID_NAME - - ++oo GSS_C_NT_HOSTBASED_SERVICE - - ++oo GSS_C_NT_ANONYMOUS - - ++oo GSS_C_NT_EXPORT_NAME - - GSS-API implementations that supports Kerberos 5 have some additional - name types - - ++oo GSS_KRB5_NT_PRINCIPAL_NAME - - ++oo GSS_KRB5_NT_USER_NAME - - ++oo GSS_KRB5_NT_MACHINE_UID_NAME - - ++oo GSS_KRB5_NT_STRING_UID_NAME - - ggssss__ddiissppllaayy__nnaammee() takes the gss name in _i_n_p_u_t___n_a_m_e and put a printable - form in _o_u_t_p_u_t___n_a_m_e___b_u_f_f_e_r. _o_u_t_p_u_t___n_a_m_e___b_u_f_f_e_r should be freed when done - using ggssss__rreelleeaassee__bbuuffffeerr(). _o_u_t_p_u_t___n_a_m_e___t_y_p_e can either be NULL or a - pointer to a gss_OID and will in the later case contain the OID type of - the name. The name should only be used for printing. Access control - should be done with the result of ggssss__eexxppoorrtt__nnaammee(). - - ggssss__ssiiggnn(), ggssss__vveerriiffyy(), ggssss__sseeaall(), and ggssss__uunnsseeaall() are part of the - GSS-API V1 interface and are obsolete. The functions should not be used - for new applications. They are provided so that version 1 applications - can link against the library. - - ggssss__kkrrbb55__ccooppyy__ccccaacchhee() is an extension to the GSS-API API. The function - will extract the krb5 credential that are transfered from the initiator - to the acceptor when using token delegation in the Kerberos mechanism. - The acceptor receives the delegated token in the last argument to - ggssss__aacccceepptt__sseecc__ccoonntteexxtt(). - - - ggssss__kkrrbb55__ccoommppaatt__ddeess33__mmiicc turns on or off the compatibly with older ver- - sion of Heimdal using des3 get and verify mic, this is way to programmat- - ically set the [gssapi]broken_des3_mic and [gssapi]correct_des3_mic flags - (see COMPATIBILITY section in gssapi(3)). If the CPP symbol - GSS_C_KRB5_COMPAT_DES3_MIC is present, ggssss__kkrrbb55__ccoommppaatt__ddeess33__mmiicc exists. - ggssss__kkrrbb55__ccoommppaatt__ddeess33__mmiicc will be removed in a later version of the GSS- - API library. - -SSEEEE AALLSSOO - krb5(3), krb5_ccache(3), gssapi(3), kerberos(8) - - HEIMDAL April 2, 2003 5 diff --git a/kerberosV/src/lib/gssapi/gssapi.cat3 b/kerberosV/src/lib/gssapi/gssapi.cat3 deleted file mode 100644 index 5969ecc2bcd..00000000000 --- a/kerberosV/src/lib/gssapi/gssapi.cat3 +++ /dev/null @@ -1,101 +0,0 @@ - -GSSAPI(3) UNIX Programmer's Manual GSSAPI(3) - -NNAAMMEE - ggssssaappii - Generic Security Service Application Program Interface library - -LLIIBBRRAARRYY - GSS-API Library (libgssapi, -lgssapi) - -DDEESSCCRRIIPPTTIIOONN - The Generic Security Service Application Program Interface (GSS-API) pro- - vides security services to callers in a generic fashion, supportable with - a range of underlying mechanisms and technologies and hence allowing - source-level portability of applications to different environments. - -LLIISSTT OOFF FFUUNNCCTTIIOONNSS - These functions constitute the gssapi library, _l_i_b_g_s_s_a_p_i. Declarations - for these functions may be obtained from the include file _g_s_s_a_p_i_._h. - - - _N_a_m_e_/_P_a_g_e _D_e_s_c_r_i_p_t_i_o_n - gss_accept_sec_context.3 - gss_acquire_cred.3 - gss_add_cred.3 - gss_add_oid_set_member.3 - gss_canonicalize_name.3 - gss_compare_name.3 - gss_context_time.3 - gss_create_empty_oid_set.3 - gss_delete_sec_context.3 - gss_display_name.3 - gss_display_status.3 - gss_duplicate_name.3 - gss_export_name.3 - gss_export_sec_context.3 - gss_get_mic.3 - gss_import_name.3 - gss_import_sec_context.3 - gss_indicate_mechs.3 - gss_init_sec_context.3 - gss_inquire_context.3 - gss_inquire_cred.3 - gss_inquire_cred_by_mech.3 - gss_inquire_mechs_for_name.3 - gss_inquire_names_for_mech.3 - gss_krb5_copy_ccache.3 - gss_process_context_token.3 - gss_release_buffer.3 - gss_release_cred.3 - gss_release_name.3 - gss_release_oid_set.3 - gss_seal.3 - gss_sign.3 - gss_test_oid_set_member.3 - gss_unseal.3 - gss_unwrap.3 - gss_verify.3 - gss_verify_mic.3 - gss_wrap.3 - gss_wrap_size_limit.3 - -CCOOMMPPAATTIIBBIILLIITTYY - The HHeeiimmddaall GSS-API implementation had a bug in releases before 0.6 that - made it fail to inter-operate when using DES3 with other GSS-API imple- - mentations when using ggssss__ggeett__mmiicc() / ggssss__vveerriiffyy__mmiicc(). Its possible to - modify the behavior of the generator of the MIC with the _k_r_b_5_._c_o_n_f con- - figuration file so that old clients/servers will still work. - - New clients/servers will try both the old and new MIC in Heimdal 0.6. In - 0.7 it will check only if configured and the compatibility code will be - removed in 0.8. - - Heimdal 0.6 still generates by default the broken GSS-API DES3 mic, this - will change in 0.7 to generate correct des3 mic. - - To turn on compatibility with older clients and servers, change the - [[ggssssaappii]] _b_r_o_k_e_n___d_e_s_3___m_i_c in _k_r_b_5_._c_o_n_f that contains a list of globbing - expressions that will be matched against the server name. To turn off - generation of the old (incompatible) mic of the MIC use [[ggssssaappii]] - _c_o_r_r_e_c_t___d_e_s_3___m_i_c. - - If a match for a entry is in both [[ggssssaappii]] _c_o_r_r_e_c_t___d_e_s_3___m_i_c and [[ggssssaappii]] - _c_o_r_r_e_c_t___d_e_s_3___m_i_c, the later will override. - - This config option modifies behaviour for both clients and servers. - - Example: - - [gssapi] - broken_des3_mic = cvs/*@SU.SE - broken_des3_mic = host/*@E.KTH.SE - correct_des3_mic = host/*@SU.SE - -BBUUGGSS - All of 0.5.x versions of hheeiimmddaall had broken token delegations in the - client side, the server side was correct. - -SSEEEE AALLSSOO - krb5(3), krb5.conf(5), kerberos(8) - -BSD Experimental January 23, 2003 2 diff --git a/kerberosV/src/lib/krb5/kerberos.cat8 b/kerberosV/src/lib/krb5/kerberos.cat8 deleted file mode 100644 index 532f38cd177..00000000000 --- a/kerberosV/src/lib/krb5/kerberos.cat8 +++ /dev/null @@ -1,55 +0,0 @@ - -KERBEROS(8) UNIX System Manager's Manual KERBEROS(8) - -NNAAMMEE - kkeerrbbeerrooss - introduction to the Kerberos system - -DDEESSCCRRIIPPTTIIOONN - Kerberos is a network authentication system. Its purpose is to securely - authenticate users and services in an insecure network environment. - - This is done with a Kerberos server acting as a trusted third party, - keeping a database with secret keys for all users and services (collec- - tively called _p_r_i_n_c_i_p_a_l_s). - - Each principal belongs to exactly one _r_e_a_l_m, which is the administrative - domain in Kerberos. A realm usually corresponds to an organisation, and - the realm should normally be derived from that organisation's domain - name. A realm is served by one or more Kerberos servers. - - The authentication process involves exchange of `tickets' and - `authenticators' which together prove the principal's identity. - - When you login to the Kerberos system, either through the normal system - login or with the kinit(1) program, you acquire a _t_i_c_k_e_t _g_r_a_n_t_i_n_g _t_i_c_k_e_t - which allows you to get new tickets for other services, such as tteellnneett or - ffttpp, without giving your password. - - For more information on how Kerberos works, and other general Kerberos - questions see the Kerberos FAQ at - _h_t_t_p_:_/_/_w_w_w_._n_r_l_._n_a_v_y_._m_i_l_/_C_C_S_/_p_e_o_p_l_e_/_k_e_n_h_/_k_e_r_b_e_r_o_s_-_f_a_q_._h_t_m_l. - - For setup instructions see the Heimdal Texinfo manual. - -SSEEEE AALLSSOO - ftp(1), kdestroy(1), kinit(1), klist(1), kpasswd(1), telnet(1) - -HHIISSTTOORRYY - The Kerberos authentication system was developed in the late 1980's as - part of the Athena Project at the Massachusetts Institute of Technology. - Versions one through three never reached outside MIT, but version 4 was - (and still is) quite popular, especially in the academic community, but - is also used in commercial products like the AFS filesystem. - - The problems with version 4 are that it has many limitations, the code - was not too well written (since it had been developed over a long time), - and it has a number of known security problems. To resolve many of these - issues work on version five started, and resulted in IETF RFC1510 in - 1993. Since then much work has been put into the further development, and - a new RFC will hopefully appear soon. - - This manual manual page is part of the HHeeiimmddaall Kerberos 5 distribution, - which has been in development at the Royal Institute of Technology in - Stockholm, Sweden, since about 1997. - - HEIMDAL September 1, 2000 1 diff --git a/kerberosV/src/lib/krb5/krb5.cat3 b/kerberosV/src/lib/krb5/krb5.cat3 deleted file mode 100644 index 83cd5de34aa..00000000000 --- a/kerberosV/src/lib/krb5/krb5.cat3 +++ /dev/null @@ -1,204 +0,0 @@ - -KRB5(3) UNIX Programmer's Manual KRB5(3) - -NNAAMMEE - kkrrbb55 - kerberos 5 library - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -DDEESSCCRRIIPPTTIIOONN - These functions constitute the Kerberos 5 library, _l_i_b_k_r_b_5. Declarations - for these functions may be obtained from the include file _k_r_b_5_._h. - -LLIISSTT OOFF FFUUNNCCTTIIOONNSS - _N_a_m_e_/_P_a_g_e _D_e_s_c_r_i_p_t_i_o_n - krb5_425_conv_principal.3 - krb5_425_conv_principal_ext.3 - krb5_524_conv_principal.3 - krb5_addlog_dest.3 - krb5_addlog_func.3 - krb5_addr2sockaddr.3 - krb5_address.3 - krb5_address_compare.3 - krb5_address_order.3 - krb5_address_search.3 - krb5_addresses.3 - krb5_anyaddr.3 - krb5_appdefault_boolean.3 - krb5_appdefault_string.3 - krb5_appdefault_time.3 - krb5_append_addresses.3 - krb5_auth_con_free.3 - krb5_auth_con_genaddrs.3 - krb5_auth_con_getaddrs.3 - krb5_auth_con_getflags.3 - krb5_auth_con_getkey.3 - krb5_auth_con_getlocalsubkey.3 - krb5_auth_con_getrcache.3 - krb5_auth_con_getremotesubkey.3 - krb5_auth_con_getuserkey.3 - krb5_auth_con_init.3 - krb5_auth_con_initivector.3 - krb5_auth_con_setaddrs.3 - krb5_auth_con_setaddrs_from_fd.3 - krb5_auth_con_setflags.3 - krb5_auth_con_setivector.3 - krb5_auth_con_setkey.3 - krb5_auth_con_setlocalsubkey.3 - krb5_auth_con_setrcache.3 - krb5_auth_con_setremotesubkey.3 - krb5_auth_con_setuserkey.3 - krb5_auth_context.3 - krb5_auth_getauthenticator.3 - krb5_auth_getcksumtype.3 - krb5_auth_getkeytype.3 - krb5_auth_getlocalseqnumber.3 - krb5_auth_getremoteseqnumber.3 - krb5_auth_setcksumtype.3 - krb5_auth_setkeytype.3 - krb5_auth_setlocalseqnumber.3 - krb5_auth_setremoteseqnumber.3 - krb5_build_principal.3 - krb5_build_principal_ext.3 - krb5_build_principal_va.3 - krb5_build_principal_va_ext.3 - krb5_cc_close.3 - krb5_cc_copy_cache.3 - krb5_cc_default.3 - krb5_cc_default_name.3 - krb5_cc_destroy.3 - krb5_cc_end_seq_get.3 - krb5_cc_gen_new.3 - krb5_cc_get_name.3 - krb5_cc_get_principal.3 - krb5_cc_get_type.3 - krb5_cc_get_version.3 - krb5_cc_initialize.3 - krb5_cc_next_cred.3 - krb5_cc_register.3 - krb5_cc_remove_cred.3 - krb5_cc_resolve.3 - krb5_cc_retrieve_cred.3 - krb5_cc_set_default_name.3 - krb5_cc_set_flags.3 - krb5_cc_store_cred.3 - krb5_checksum_is_collision_proof.3 - krb5_checksum_is_keyed.3 - krb5_checksumsize.3 - krb5_closelog.3 - krb5_config_get_bool_default.3 - krb5_config_get_int_default.3 - krb5_config_get_string_default.3 - krb5_config_get_time_default.3 - krb5_context.3 - krb5_copy_address.3 - krb5_copy_addresses.3 - krb5_copy_data.3 - krb5_create_checksum.3 - krb5_crypto_destroy.3 - krb5_crypto_init.3 - krb5_data_alloc.3 - krb5_data_copy.3 - krb5_data_free.3 - krb5_data_realloc.3 - krb5_data_zero.3 - krb5_decrypt.3 - krb5_decrypt_EncryptedData.3 - krb5_encrypt.3 - krb5_encrypt_EncryptedData.3 - krb5_err.3 - krb5_errx.3 - krb5_free_address.3 - krb5_free_addresses.3 - krb5_free_context.3 - krb5_free_data.3 - krb5_free_data_contents.3 - krb5_free_host_realm.3 - krb5_free_krbhst.3 - krb5_free_principal.3 - krb5_get_all_client_addrs.3 - krb5_get_all_server_addrs.3 - krb5_get_default_realm.3 - krb5_get_default_realms.3 - krb5_get_host_realm.3 - krb5_get_krb524hst.3 - krb5_get_krb_admin_hst.3 - krb5_get_krb_changepw_hst.3 - krb5_get_krbhst.3 - krb5_h_addr2addr.3 - krb5_h_addr2sockaddr.3 - krb5_init_context.3 - krb5_initlog.3 - krb5_keytab_entry.3 - krb5_krbhst_format_string.3 - krb5_krbhst_free.3 - krb5_krbhst_get_addrinfo.3 - krb5_krbhst_init.3 - krb5_krbhst_next.3 - krb5_krbhst_next_as_string.3 - krb5_krbhst_reset.3 - krb5_kt_add_entry.3 - krb5_kt_close.3 - krb5_kt_compare.3 - krb5_kt_copy_entry_contents.3 - krb5_kt_cursor.3 - krb5_kt_cursor.3 - krb5_kt_default.3 - krb5_kt_default_name.3 - krb5_kt_end_seq_get.3 - krb5_kt_free_entry.3 - krb5_kt_get_entry.3 - krb5_kt_get_name.3 - krb5_kt_next_entry.3 - krb5_kt_ops.3 - krb5_kt_read_service_key.3 - krb5_kt_register.3 - krb5_kt_remove_entry.3 - krb5_kt_resolve.3.3 - krb5_kt_start_seq_get - krb5_log.3 - krb5_log_msg.3 - krb5_make_addrport.3 - krb5_make_principal.3 - krb5_max_sockaddr_size.3 - krb5_openlog.3 - krb5_parse_address.3 - krb5_parse_name.3 - krb5_principal.3 - krb5_principal_get_comp_string.3 - krb5_principal_get_realm.3 - krb5_print_address.3 - krb5_set_default_realm.3 - krb5_set_warn_dest.3 - krb5_sname_to_principal.3 - krb5_sock_to_principal.3 - krb5_sockaddr2address.3 - krb5_sockaddr2port.3 - krb5_sockaddr_uninteresting.3 - krb5_timeofday.3 - krb5_unparse_name.3 - krb5_us_timeofday.3 - krb5_verify_checksum.3 - krb5_verify_opt_init.3 - krb5_verify_opt_set_flags.3 - krb5_verify_opt_set_keytab.3 - krb5_verify_opt_set_secure.3 - krb5_verify_opt_set_service.3 - krb5_verify_user.3 - krb5_verify_user_lrealm.3 - krb5_verify_user_opt.3 - krb5_verr.3 - krb5_verrx.3 - krb5_vlog.3 - krb5_vlog_msg.3 - krb5_vwarn.3 - krb5_vwarnx.3 - krb5_warn.3 - krb5_warnx.3 - krn5_kuserok.3 - -SSEEEE AALLSSOO - krb5.conf(5), kerberos(8) - -BSD Experimental March 20, 2003 4 diff --git a/kerberosV/src/lib/krb5/krb5.conf.cat5 b/kerberosV/src/lib/krb5/krb5.conf.cat5 deleted file mode 100644 index 7c7bc6d68d3..00000000000 --- a/kerberosV/src/lib/krb5/krb5.conf.cat5 +++ /dev/null @@ -1,476 +0,0 @@ - -KRB5.CONF(5) UNIX Programmer's Manual KRB5.CONF(5) - -NNAAMMEE - kkrrbb55..ccoonnff - configuration file for Kerberos 5 - -SSYYNNOOPPSSIISS -DDEESSCCRRIIPPTTIIOONN - The kkrrbb55..ccoonnff file specifies several configuration parameters for the - Kerberos 5 library, as well as for some programs. - - The file consists of one or more sections, containing a number of bind- - ings. The value of each binding can be either a string or a list of oth- - er bindings. The grammar looks like: - - file: - /* empty */ - sections - - sections: - section sections - section - - section: - '[' section_name ']' bindings - - section_name: - STRING - - bindings: - binding bindings - binding - - binding: - name '=' STRING - name '=' '{' bindings '}' - - name: - STRING - - STRINGs consists of one or more non-whitespace characters. - - STRINGs that are specified later in this man-page uses the following no- - tation. - - boolean - values can be either yes/true or no/false. - - time - values can be a list of year, month, day, hour, min, second. - Example: 1 month 2 days 30 min. - - etypes - valid encryption types are: des-cbc-crc, des-cbc-md4, des-cbc- - md5, des3-cbc-sha1, arcfour-hmac-md5, aes128-cts-hmac-sha1-96, - and aes256-cts-hmac-sha1-96 . - - address - an address can be either a IPv4 or a IPv6 address. - - Currently recognised sections and bindings are: - - [appdefaults] - Specifies the default values to be used for Kerberos applica- - tions. You can specify defaults per application, realm, or a - - combination of these. The preference order is: - 1. _a_p_p_l_i_c_a_t_i_o_n _r_e_a_l_m _o_p_t_i_o_n - 2. _a_p_p_l_i_c_a_t_i_o_n _o_p_t_i_o_n - 3. _r_e_a_l_m _o_p_t_i_o_n - 4. _o_p_t_i_o_n - - The supported options are: - - forwardable = _b_o_o_l_e_a_n - When obtaining initial credentials, make the cre- - dentials forwardable. - - proxiable = _b_o_o_l_e_a_n - When obtaining initial credentials, make the cre- - dentials proxiable. - - no-addresses = _b_o_o_l_e_a_n - When obtaining initial credentials, request them - for an empty set of addresses, making the tickets - valid from any address. - - ticket_lifetime = _t_i_m_e - Default ticket lifetime. - - renew_lifetime = _t_i_m_e - Default renewable ticket lifetime. - - encrypt = _b_o_o_l_e_a_n - Use encryption, when available. - - forward = _b_o_o_l_e_a_n - Forward credentials to remote host (for rsh(1), - telnet(1), etc). - - [libdefaults] - - default_realm = _R_E_A_L_M - Default realm to use, this is also known as your - ``local realm''. The default is the result of - kkrrbb55__ggeett__hhoosstt__rreeaallmm(_l_o_c_a_l _h_o_s_t_n_a_m_e). - - clockskew = _t_i_m_e - Maximum time differential (in seconds) allowed when - comparing times. Default is 300 seconds (five min- - utes). - - kdc_timeout = _t_i_m_e - Maximum time to wait for a reply from the kdc, de- - fault is 3 seconds. - - v4_name_convert - - v4_instance_resolve - These are described in the krb5_425_conv_princi- - pal(3) manual page. - - capath = { - - _d_e_s_t_i_n_a_t_i_o_n_-_r_e_a_l_m = _n_e_x_t_-_h_o_p_-_r_e_a_l_m - - ... - - } - - - This is deprecated, see the capaths section below. - - default_etypes = _e_t_y_p_e_s _._._. - A list of default encryption types to use. - - default_etypes_des = _e_t_y_p_e_s _._._. - A list of default encryption types to use when re- - questing a DES credential. - - default_keytab_name = _k_e_y_t_a_b - The keytab to use if no other is specified, default - is ``FILE:/etc/krb5.keytab''. - - dns_lookup_kdc = _b_o_o_l_e_a_n - Use DNS SRV records to lookup KDC services loca- - tion. - - dns_lookup_realm = _b_o_o_l_e_a_n - Use DNS TXT records to lookup domain to realm map- - pings. - - kdc_timesync = _b_o_o_l_e_a_n - Try to keep track of the time differential between - the local machine and the KDC, and then compensate - for that when issuing requests. - - max_retries = _n_u_m_b_e_r - The max number of times to try to contact each KDC. - - ticket_lifetime = _t_i_m_e - Default ticket lifetime. - - renew_lifetime = _t_i_m_e - Default renewable ticket lifetime. - - forwardable = _b_o_o_l_e_a_n - When obtaining initial credentials, make the cre- - dentials forwardable. This option is also valid in - the [realms] section. - - proxiable = _b_o_o_l_e_a_n - When obtaining initial credentials, make the cre- - dentials proxiable. This option is also valid in - the [realms] section. - - verify_ap_req_nofail = _b_o_o_l_e_a_n - If enabled, failure to verify credentials against a - local key is a fatal error. The application has to - be able to read the corresponding service key for - this to work. Some applications, like su(1), en- - able this option unconditionally. - - warn_pwexpire = _t_i_m_e - How soon to warn for expiring password. Default is - seven days. - - http_proxy = _p_r_o_x_y_-_s_p_e_c - A HTTP-proxy to use when talking to the KDC via - HTTP. - - dns_proxy = _p_r_o_x_y_-_s_p_e_c - Enable using DNS via HTTP. - - extra_addresses = _a_d_d_r_e_s_s _._._. - A list of addresses to get tickets for along with - - all local addresses. - - time_format = _s_t_r_i_n_g - How to print time strings in logs, this string is - passed to strftime(3). - - date_format = _s_t_r_i_n_g - How to print date strings in logs, this string is - passed to strftime(3). - - log_utc = _b_o_o_l_e_a_n - Write log-entries using UTC instead of your local - time zone. - - scan_interfaces = _b_o_o_l_e_a_n - Scan all network interfaces for addresses, as op- - posed to simply using the address associated with - the system's host name. - - fcache_version = _i_n_t - Use file credential cache format version specified. - - krb4_get_tickets = _b_o_o_l_e_a_n - Also get Kerberos 4 tickets in kkiinniitt, llooggiinn, and - other programs. This option is also valid in the - [realms] section. - - fcc-mit-ticketflags = _b_o_o_l_e_a_n - Use MIT compatible format for file credential - cache. It's the field ticketflags that is stored - in reverse bit order for older than Heimdal 0.7. - Setting this flag to TRUE make it store the MIT - way, this is default for Heimdal 0.7. - - [domain_realm] - This is a list of mappings from DNS domain to Kerberos realm. - Each binding in this section looks like: - - domain = realm - - The domain can be either a full name of a host or a trailing - component, in the latter case the domain-string should start - with a period. The realm may be the token `dns_locate', in - which case the actual realm will be determined using DNS (in- - dependently of the setting of the `dns_lookup_realm' option). - - [realms] - - _R_E_A_L_M = { - - kdc = _[_s_e_r_v_i_c_e_/_]_h_o_s_t_[_:_p_o_r_t_] - Specifies a list of kdcs for this realm. - If the optional _p_o_r_t is absent, the de- - fault value for the ``kerberos/udp'' - ``kerberos/tcp'', and ``http/tcp'' port - (depending on service) will be used. - The kdcs will be used in the order that - they are specified. - - The optional _s_e_r_v_i_c_e specifies over what - medium the kdc should be contacted. - Possible services are ``udp'', ``tcp'', - and ``http''. Http can also be written - as ``http://''. Default service is - - - ``udp'' and ``tcp''. - - admin_server = _h_o_s_t_[_:_p_o_r_t_] - Specifies the admin server for this - realm, where all the modifications to - the database are performed. - - kpasswd_server = _h_o_s_t_[_:_p_o_r_t_] - Points to the server where all the pass- - word changes are performed. If there is - no such entry, the kpasswd port on the - admin_server host will be tried. - - krb524_server = _h_o_s_t_[_:_p_o_r_t_] - Points to the server that does 524 con- - versions. If it is not mentioned, the - krb524 port on the kdcs will be tried. - - v4_instance_convert - - v4_name_convert - - default_domain - See krb5_425_conv_principal(3). - - tgs_require_subkey - a boolan variable that defaults to - false. Old DCE secd (pre 1.1) might - need this to be true. - - } - - [capaths] - - _c_l_i_e_n_t_-_r_e_a_l_m = { - - _s_e_r_v_e_r_-_r_e_a_l_m = _h_o_p_-_r_e_a_l_m _._._. - This serves two purposes. First the - first listed _h_o_p_-_r_e_a_l_m tells a client - which realm it should contact in order - to ultimately obtain credentials for a - service in the _s_e_r_v_e_r_-_r_e_a_l_m. Secondly, - it tells the KDC (and other servers) - which realms are allowed in a multi-hop - traversal from _c_l_i_e_n_t_-_r_e_a_l_m to _s_e_r_v_e_r_- - _r_e_a_l_m. Except for the client case, the - order of the realms are not important. - - _} - - [logging] - - _e_n_t_i_t_y = _d_e_s_t_i_n_a_t_i_o_n - Specifies that _e_n_t_i_t_y should use the specified - destination for logging. See the krb5_openlog(3) - manual page for a list of defined destinations. - - [kdc] - - database = { - - dbname = _D_A_T_A_B_A_S_E_N_A_M_E - Use this database for this realm. - - realm = _R_E_A_L_M - Specifies the realm that will be stored - - in this database. - - mkey_file = _F_I_L_E_N_A_M_E - Use this keytab file for the master key - of this database. If not specified - _D_A_T_A_B_A_S_E_N_A_M_E.mkey will be used. - - acl_file = PA FILENAME - Use this file for the ACL list of this - database. - - log_file = _F_I_L_E_N_A_M_E - Use this file as the log of changes per- - formed to the database. This file is - used by iipprrooppdd--mmaasstteerr for propagating - changes to slaves. - - } - - max-request = _S_I_Z_E - Maximum size of a kdc request. - - require-preauth = _B_O_O_L - If set pre-authentication is required. Since krb4 - requests are not pre-authenticated they will be re- - jected. - - ports = _l_i_s_t _o_f _p_o_r_t_s - List of ports the kdc should listen to. - - addresses = _l_i_s_t _o_f _i_n_t_e_r_f_a_c_e_s - List of addresses the kdc should bind to. - - enable-kerberos4 = _B_O_O_L - Turn on Kerberos 4 support. - - v4-realm = _R_E_A_L_M - To what realm v4 requests should be mapped. - - enable-524 = _B_O_O_L - Should the Kerberos 524 converting facility be - turned on. Default is same as _e_n_a_b_l_e_-_k_e_r_b_e_r_o_s_4. - - enable-http = _B_O_O_L - Should the kdc answer kdc-requests over http. - - enable-kaserver = _B_O_O_L - If this kdc should emulate the AFS kaserver. - - check-ticket-addresses = _B_O_O_L - verify the addresses in the tickets used in tgs re- - quests. - - allow-null-ticket-addresses = _B_O_O_L - Allow addresses-less tickets. - - allow-anonymous = _B_O_O_L - If the kdc is allowed to hand out anonymous tick- - ets. - - encode_as_rep_as_tgs_rep = _B_O_O_L - Encode as-rep as tgs-rep tobe compatible with mis- - takes older DCE secd did. - - kdc_warn_pwexpire = _T_I_M_E - The time before expiration that the user should be - warned that her password is about to expire. - - logging = _L_o_g_g_i_n_g - What type of logging the kdc should use, see also - [logging]/kdc. - - use_2b = _p_r_i_n_c_i_p_a_l _l_i_s_t - List of principals to use AFS 2b tokens for. - - [kadmin] - - require-preauth = _B_O_O_L - If pre-authentication is required to talk to the - kadmin server. - - default_keys = _k_e_y_t_y_p_e_s_._._. - for each entry in _d_e_f_a_u_l_t___k_e_y_s try to parse it as a - sequence of _e_t_y_p_e_:_s_a_l_t_t_y_p_e_:_s_a_l_t syntax of this if - something like: - - [(des|des3|etype):](pw-salt|afs3-salt)[:string] - - If _e_t_y_p_e is omitted it means everything, and if - string is omitted it means the default salt string - (for that principal and encryption type). Addi- - tional special values of keytypes are: - - v5 The Kerberos 5 salt _p_w_-_s_a_l_t - - v4 The Kerberos 4 salt _d_e_s_:_p_w_-_s_a_l_t_: - - use_v4_salt = _B_O_O_L - When true, this is the same as - - _d_e_f_a_u_l_t___k_e_y_s _= _d_e_s_3_:_p_w_-_s_a_l_t _v_4 - - and is only left for backwards compatibility. - -EENNVVIIRROONNMMEENNTT - KRB5_CONFIG points to the configuration file to read. - -FFIILLEESS - /etc/krb5.conf configuration file for Kerberos 5. - -EEXXAAMMPPLLEESS - [libdefaults] - default_realm = FOO.SE - [domain_realm] - .foo.se = FOO.SE - .bar.se = FOO.SE - [realms] - FOO.SE = { - kdc = kerberos.foo.se - v4_name_convert = { - rcmd = host - } - v4_instance_convert = { - xyz = xyz.bar.se - } - default_domain = foo.se - } - [logging] - kdc = FILE:/var/heimdal/kdc.log - kdc = SYSLOG:INFO - default = SYSLOG:INFO:USER - -DDIIAAGGNNOOSSTTIICCSS - Since kkrrbb55..ccoonnff is read and parsed by the krb5 library, there is not a - lot of opportunities for programs to report parsing errors in any useful - format. To help overcome this problem, there is a program - vveerriiffyy__kkrrbb55__ccoonnff that reads kkrrbb55..ccoonnff and tries to emit useful diagnos- - tics from parsing errors. Note that this program does not have any way - of knowing what options are actually used and thus cannot warn about un- - known or misspelled ones. - -SSEEEE AALLSSOO - kinit(1), krb5_425_conv_principal(3), krb5_openlog(3), strftime(3), - verify_krb5_conf(8) - - HEIMDAL March 9, 2004 8 diff --git a/kerberosV/src/lib/krb5/krb5_425_conv_principal.cat3 b/kerberosV/src/lib/krb5/krb5_425_conv_principal.cat3 deleted file mode 100644 index 9927c43e862..00000000000 --- a/kerberosV/src/lib/krb5/krb5_425_conv_principal.cat3 +++ /dev/null @@ -1,141 +0,0 @@ - -KRB5_425_CONV_PRINCIPAL(3) UNIX Programmer's Manual KRB5_425_CONV_PRINCIPAL(3) - -NNAAMMEE - kkrrbb55__442255__ccoonnvv__pprriinncciippaall, kkrrbb55__442255__ccoonnvv__pprriinncciippaall__eexxtt, - kkrrbb55__552244__ccoonnvv__pprriinncciippaall - converts to and from version 4 principals - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__442255__ccoonnvv__pprriinncciippaall(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_n_a_m_e, - _c_o_n_s_t _c_h_a_r _*_i_n_s_t_a_n_c_e, _c_o_n_s_t _c_h_a_r _*_r_e_a_l_m, - _k_r_b_5___p_r_i_n_c_i_p_a_l _*_p_r_i_n_c_i_p_a_l) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__442255__ccoonnvv__pprriinncciippaall__eexxtt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_n_a_m_e, - _c_o_n_s_t _c_h_a_r _*_i_n_s_t_a_n_c_e, _c_o_n_s_t _c_h_a_r _*_r_e_a_l_m, - _k_r_b_5___b_o_o_l_e_a_n _(_*_f_u_n_c_)_(_k_r_b_5___c_o_n_t_e_x_t_, _k_r_b_5___p_r_i_n_c_i_p_a_l_), - _k_r_b_5___b_o_o_l_e_a_n _r_e_s_o_l_v_e, _k_r_b_5___p_r_i_n_c_i_p_a_l _*_p_r_i_n_c_i_p_a_l) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__552244__ccoonnvv__pprriinncciippaall(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _c_o_n_s_t _k_r_b_5___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l, _c_h_a_r _*_n_a_m_e, _c_h_a_r _*_i_n_s_t_a_n_c_e, - _c_h_a_r _*_r_e_a_l_m) - -DDEESSCCRRIIPPTTIIOONN - Converting between version 4 and version 5 principals can at best be de- - scribed as a mess. - - A version 4 principal consists of a name, an instance, and a realm. A - version 5 principal consists of one or more components, and a realm. In - some cases also the first component/name will differ between version 4 - and version 5. Furthermore the second component of a host principal will - be the fully qualified domain name of the host in question, while the in- - stance of a version 4 principal will only contain the first part (short - hostname). Because of these problems the conversion between principals - will have to be site customized. - - kkrrbb55__442255__ccoonnvv__pprriinncciippaall__eexxtt() will try to convert a version 4 principal, - given by _n_a_m_e, _i_n_s_t_a_n_c_e, and _r_e_a_l_m, to a version 5 principal. This can - result in several possible principals, and if _f_u_n_c is non-NULL, it will - be called for each candidate principal. _f_u_n_c should return true if the - principal was ``good''. To accomplish this, kkrrbb55__442255__ccoonnvv__pprriinncciippaall__eexxtt() - will look up the name in _k_r_b_5_._c_o_n_f. It first looks in the - v4_name_convert/host subsection, which should contain a list of version 4 - names whose instance should be treated as a hostname. This list can be - specified for each realm (in the realms section), or in the libdefaults - section. If the name is found the resulting name of the principal will - be the value of this binding. The instance is then first looked up in - v4_instance_convert for the specified realm. If found the resulting value - will be used as instance (this can be used for special cases), no further - attempts will be made to find a conversion if this fails (with _f_u_n_c). If - the _r_e_s_o_l_v_e parameter is true, the instance will be looked up with - ggeetthhoossttbbyynnaammee(). This can be a time consuming, error prone, and unsafe - operation. Next a list of hostnames will be created from the instance - and the v4_domains variable, which should contain a list of possible do- - mains for the specific realm. - - On the other hand, if the name is not found in a host section, it is - looked up in a v4_name_convert/plain binding. If found here the name will - be converted, but the instance will be untouched. - - - This list of default host-type conversions is compiled-in: - - v4_name_convert = { - host = { - ftp = ftp - hprop = hprop - imap = imap - pop = pop - rcmd = host - smtp = smtp - } - } - - It will only be used if there isn't an entry for these names in the con- - fig file, so you can override these defaults. - - kkrrbb55__442255__ccoonnvv__pprriinncciippaall() will call kkrrbb55__442255__ccoonnvv__pprriinncciippaall__eexxtt() with - NULL as _f_u_n_c, and the value of v4_instance_resolve (from the libdefaults - section) as _r_e_s_o_l_v_e. - - kkrrbb55__552244__ccoonnvv__pprriinncciippaall() basically does the opposite of - kkrrbb55__442255__ccoonnvv__pprriinncciippaall(), it just doesn't have to look up any names, but - will instead truncate instances found to belong to a host principal. The - _n_a_m_e, _i_n_s_t_a_n_c_e, and _r_e_a_l_m should be at least 40 characters long. - -EEXXAAMMPPLLEESS - Since this is confusing an example is in place. - - Assume that we have the ``foo.com'', and ``bar.com'' domains that have - shared a single version 4 realm, FOO.COM. The version 4 _k_r_b_._r_e_a_l_m_s file - looked like: - - foo.com FOO.COM - .foo.com FOO.COM - .bar.com FOO.COM - - A _k_r_b_5_._c_o_n_f file that covers this case might look like: - - [libdefaults] - v4_instance_resolve = yes - [realms] - FOO.COM = { - kdc = kerberos.foo.com - v4_instance_convert = { - foo = foo.com - } - v4_domains = foo.com - } - - With this setup and the following host table: - - foo.com - a-host.foo.com - b-host.bar.com - the following conversions will be made: - - rcmd.a-host -> host/a-host.foo.com - ftp.b-host -> ftp/b-host.bar.com - pop.foo -> pop/foo.com - ftp.other -> ftp/other.foo.com - other.a-host -> other/a-host - - The first three are what you expect. If you remove the ``v4_domains'', - the fourth entry will result in an error (since the host ``other'' can't - be found). Even if ``a-host'' is a valid host name, the last entry will - not be converted, since the ``other'' name is not known to represent a - host-type principal. If you turn off ``v4_instance_resolve'' the second - example will result in ``ftp/b-host.foo.com'' (because of the default do- - main). And all of this is of course only valid if you have working name - resolving. - -SSEEEE AALLSSOO - krb5_build_principal(3), krb5_free_principal(3), krb5_parse_name(3), - krb5_sname_to_principal(3), krb5_unparse_name(3), krb5.conf(5) - - HEIMDAL April 11, 1999 3 diff --git a/kerberosV/src/lib/krb5/krb5_address.cat3 b/kerberosV/src/lib/krb5/krb5_address.cat3 deleted file mode 100644 index 423b1d8d563..00000000000 --- a/kerberosV/src/lib/krb5/krb5_address.cat3 +++ /dev/null @@ -1,163 +0,0 @@ - -KRB5_ADDRESS(3) UNIX Programmer's Manual KRB5_ADDRESS(3) - -NNAAMMEE - kkrrbb55__aaddddrreessss, kkrrbb55__aaddddrreesssseess, kkrrbb55__ssoocckkaaddddrr22aaddddrreessss, kkrrbb55__ssoocckkaaddddrr22ppoorrtt, - kkrrbb55__aaddddrr22ssoocckkaaddddrr, kkrrbb55__mmaaxx__ssoocckkaaddddrr__ssiizzee, kkrrbb55__ssoocckkaaddddrr__uunniinntteerreessttiinngg, - kkrrbb55__hh__aaddddrr22ssoocckkaaddddrr, kkrrbb55__hh__aaddddrr22aaddddrr, kkrrbb55__aannyyaaddddrr, kkrrbb55__pprriinntt__aaddddrreessss, - kkrrbb55__ppaarrssee__aaddddrreessss, kkrrbb55__aaddddrreessss__oorrddeerr, kkrrbb55__aaddddrreessss__ccoommppaarree, - kkrrbb55__aaddddrreessss__sseeaarrcchh, kkrrbb55__ffrreeee__aaddddrreessss, kkrrbb55__ffrreeee__aaddddrreesssseess, - kkrrbb55__ccooppyy__aaddddrreessss, kkrrbb55__ccooppyy__aaddddrreesssseess, kkrrbb55__aappppeenndd__aaddddrreesssseess, - kkrrbb55__mmaakkee__aaddddrrppoorrtt - mange addresses in Kerberos. - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ssoocckkaaddddrr22aaddddrreessss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _s_t_r_u_c_t _s_o_c_k_a_d_d_r _*_s_a, - _k_r_b_5___a_d_d_r_e_s_s _*_a_d_d_r) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ssoocckkaaddddrr22ppoorrtt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _s_t_r_u_c_t _s_o_c_k_a_d_d_r _*_s_a, - _i_n_t_1_6___t _*_p_o_r_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aaddddrr22ssoocckkaaddddrr(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s _*_a_d_d_r, - _s_t_r_u_c_t _s_o_c_k_a_d_d_r _*_s_a, _k_r_b_5___s_o_c_k_l_e_n___t _*_s_a___s_i_z_e, _i_n_t _p_o_r_t) - - _s_i_z_e___t - kkrrbb55__mmaaxx__ssoocckkaaddddrr__ssiizzee(_v_o_i_d) - - _k_r_b_5___b_o_o_l_e_a_n - kkrrbb55__ssoocckkaaddddrr__uunniinntteerreessttiinngg(_c_o_n_s_t _s_t_r_u_c_t _s_o_c_k_a_d_d_r _*_s_a) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__hh__aaddddrr22ssoocckkaaddddrr(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _i_n_t _a_f, _c_o_n_s_t _c_h_a_r _*_a_d_d_r, - _s_t_r_u_c_t _s_o_c_k_a_d_d_r _*_s_a, _k_r_b_5___s_o_c_k_l_e_n___t _*_s_a___s_i_z_e, _i_n_t _p_o_r_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__hh__aaddddrr22aaddddrr(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _i_n_t _a_f, _c_o_n_s_t _c_h_a_r _*_h_a_d_d_r, - _k_r_b_5___a_d_d_r_e_s_s _*_a_d_d_r) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aannyyaaddddrr(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _i_n_t _a_f, _s_t_r_u_c_t _s_o_c_k_a_d_d_r _*_s_a, - _k_r_b_5___s_o_c_k_l_e_n___t _*_s_a___s_i_z_e, _i_n_t _p_o_r_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__pprriinntt__aaddddrreessss(_c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s _*_a_d_d_r, _c_h_a_r _*_s_t_r, _s_i_z_e___t _l_e_n, - _s_i_z_e___t _*_r_e_t___l_e_n) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ppaarrssee__aaddddrreessss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_s_t_r_i_n_g, - _k_r_b_5___a_d_d_r_e_s_s_e_s _*_a_d_d_r_e_s_s_e_s) - - _i_n_t - kkrrbb55__aaddddrreessss__oorrddeerr(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s _*_a_d_d_r_1, - _c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s _*_a_d_d_r_2) - - _k_r_b_5___b_o_o_l_e_a_n - kkrrbb55__aaddddrreessss__ccoommppaarree(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s _*_a_d_d_r_1, - _c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s _*_a_d_d_r_2) - - _k_r_b_5___b_o_o_l_e_a_n - kkrrbb55__aaddddrreessss__sseeaarrcchh(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s _*_a_d_d_r, - _c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s_e_s _*_a_d_d_r_l_i_s_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ffrreeee__aaddddrreessss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___a_d_d_r_e_s_s _*_a_d_d_r_e_s_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ffrreeee__aaddddrreesssseess(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___a_d_d_r_e_s_s_e_s _*_a_d_d_r_e_s_s_e_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ccooppyy__aaddddrreessss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s _*_i_n_a_d_d_r, - _k_r_b_5___a_d_d_r_e_s_s _*_o_u_t_a_d_d_r) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ccooppyy__aaddddrreesssseess(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s_e_s _*_i_n_a_d_d_r, - _k_r_b_5___a_d_d_r_e_s_s_e_s _*_o_u_t_a_d_d_r) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aappppeenndd__aaddddrreesssseess(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___a_d_d_r_e_s_s_e_s _*_d_e_s_t, - _c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s_e_s _*_s_o_u_r_c_e) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__mmaakkee__aaddddrrppoorrtt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___a_d_d_r_e_s_s _*_*_r_e_s, - _c_o_n_s_t _k_r_b_5___a_d_d_r_e_s_s _*_a_d_d_r, _i_n_t_1_6___t _p_o_r_t) - -DDEESSCCRRIIPPTTIIOONN - The krb5_address structure holds a address that can be used in Kerberos - API calls. There are help functions to set and extract address informa- - tion of the address. - - The krb5_addresses structure holds a set of krb5_address:es. - - kkrrbb55__ssoocckkaaddddrr22aaddddrreessss() stores a address a struct sockaddr _s_a in the - krb5_address _a_d_d_r. - - kkrrbb55__ssoocckkaaddddrr22ppoorrtt() extracts a _p_o_r_t (if possible) from a struct sockaddr - _s_a. - - kkrrbb55__aaddddrr22ssoocckkaaddddrr() sets the struct sockaddr _s_o_c_k_a_d_d_r from _a_d_d_r and - _p_o_r_t. _S_a___s_i_z_e should be initially contain the size of the _s_a, and after - the call, it will contain the actual length of the address. - - kkrrbb55__mmaaxx__ssoocckkaaddddrr__ssiizzee() returns the max size of the struct sockaddr that - the Kerberos library will return. - - kkrrbb55__ssoocckkaaddddrr__uunniinntteerreessttiinngg() returns TRUE for all _s_a that for that the - kerberos library thinks are uninteresting. One example are link local - addresses. - - kkrrbb55__hh__aaddddrr22ssoocckkaaddddrr() initializes a struct sockaddr _s_a from _a_f and the - struct hostent (see gethostbyname(3)) _h___a_d_d_r___l_i_s_t component. _S_a___s_i_z_e - should be initially contain the size of the _s_a, and after the call, it - will contain the actual length of the address. _s_a argument. - - kkrrbb55__hh__aaddddrr22aaddddrr() works like kkrrbb55__hh__aaddddrr22ssoocckkaaddddrr() with the exception - that it operates on a krb5_address instead of a struct sockaddr - - kkrrbb55__aannyyaaddddrr() fills in a struct sockaddr _s_a that can be used to to. - _S_a___s_i_z_e should be initially contain the size of the _s_a, and after the - call, it will contain the actual length of the address. - - kkrrbb55__pprriinntt__aaddddrreessss() prints the address in _a_d_d_r to the a string _s_t_r_i_n_g - that have the length _l_e_n. If _r_e_t___l_e_n if not NULL, it will be filled in - length of the string. - - kkrrbb55__ppaarrssee__aaddddrreessss() Returns the resolving a hostname in _s_t_r_i_n_g to the - krb5_addresses _a_d_d_r_e_s_s_e_s. - - - kkrrbb55__aaddddrreessss__oorrddeerr() compares to addresses _a_d_d_r_1 and _a_d_d_r_2 so that it can - be used for sorting addresses. If the addresses are the same address - _k_r_b_5___a_d_d_r_e_s_s___o_r_d_e_r _w_i_l_l _b_e _r_e_t_u_r_n _0_. - - kkrrbb55__aaddddrreessss__ccoommppaarree() compares the addresses _a_d_d_r_1 and _a_d_d_r_2. returns - TRUE if the two addresses are the same. - - kkrrbb55__aaddddrreessss__sseeaarrcchh() checks if the address _a_d_d_r is a member of the ad- - dress set list _a_d_d_r_l_i_s_t. - - kkrrbb55__ffrreeee__aaddddrreessss() frees the data stored in the _a_d_d_r_e_s_s that is alloced - with any of the krb5_address functions. - - kkrrbb55__ffrreeee__aaddddrreesssseess() frees the data stored in the _a_d_d_r_e_s_s_e_s that is al- - loced with any of the krb5_address functions. - - kkrrbb55__ccooppyy__aaddddrreessss() copies the content of address _i_n_a_d_d_r to _o_u_t_a_d_d_r. - - kkrrbb55__ccooppyy__aaddddrreesssseess() copies the content of the address list _i_n_a_d_d_r to - _o_u_t_a_d_d_r. - - kkrrbb55__aappppeenndd__aaddddrreesssseess() adds the set of addresses in _s_o_u_r_c_e to _d_e_s_t. - While copying the addresses, duplicates are also sorted out. - - kkrrbb55__mmaakkee__aaddddrrppoorrtt() allocates and creates an krb5_address in _r_e_s of type - KRB5_ADDRESS_ADDRPORT from (_a_d_d_r, _p_o_r_t). - -SSEEEE AALLSSOO - krb5(3), krb5.conf(5), kerberos(8) - - HEIMDAL March 11, 2002 3 diff --git a/kerberosV/src/lib/krb5/krb5_aname_to_localname.cat3 b/kerberosV/src/lib/krb5/krb5_aname_to_localname.cat3 deleted file mode 100644 index 5a662c8b379..00000000000 --- a/kerberosV/src/lib/krb5/krb5_aname_to_localname.cat3 +++ /dev/null @@ -1,37 +0,0 @@ - -KRB5_ANAME_TO_LOCALNAME(3) UNIX Programmer's Manual KRB5_ANAME_TO_LOCALNAME(3) - -NNAAMMEE - kkrrbb55__aannaammee__ttoo__llooccaallnnaammee - converts a principal to a system local name. - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___b_o_o_l_e_a_n - kkrrbb55__aannaammee__ttoo__llooccaallnnaammee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_o_n_s_t___p_r_i_n_c_i_p_a_l _n_a_m_e, - _s_i_z_e___t _l_n_s_i_z_e, _c_h_a_r _*_l_n_a_m_e) - -DDEESSCCRRIIPPTTIIOONN - This function takes a principal _n_a_m_e, verifies its in the local realm - (using kkrrbb55__ggeett__ddeeffaauulltt__rreeaallmmss()) and then returns the local name of the - principal. - - If _n_a_m_e isn't in one of the local realms and error is returned. - - If size (_l_n_s_i_z_e) of the local name (_l_n_a_m_e) is to small, an error is re- - turned. - - kkrrbb55__aannaammee__ttoo__llooccaallnnaammee() should only be use by application that imple- - ments protocols that doesn't transport the login name and thus needs to - convert a principal to a local name. - - Protocols should be designed so that the it autheticates using Kerberos, - send over the login name and then verifies in the principal that authen- - ticated is allowed to login and the login name. A way to check if a user - is allowed to login is using the function kkrrbb55__kkuusseerrookk(). - -SSEEEE AALLSSOO - krb5_get_default_realms(3), krb5_kuserok(3) - - HEIMDAL March 17, 2003 1 diff --git a/kerberosV/src/lib/krb5/krb5_appdefault.cat3 b/kerberosV/src/lib/krb5/krb5_appdefault.cat3 deleted file mode 100644 index 0b5f485d958..00000000000 --- a/kerberosV/src/lib/krb5/krb5_appdefault.cat3 +++ /dev/null @@ -1,55 +0,0 @@ - -KRB5_APPDEFAULT(3) UNIX Programmer's Manual KRB5_APPDEFAULT(3) - -NNAAMMEE - kkrrbb55__aappppddeeffaauulltt__bboooolleeaann, kkrrbb55__aappppddeeffaauulltt__ssttrriinngg, kkrrbb55__aappppddeeffaauulltt__ttiimmee - - get application configuration value - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _v_o_i_d - kkrrbb55__aappppddeeffaauulltt__bboooolleeaann(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_a_p_p_n_a_m_e, - _k_r_b_5___r_e_a_l_m _r_e_a_l_m, _c_o_n_s_t _c_h_a_r _*_o_p_t_i_o_n, _k_r_b_5___b_o_o_l_e_a_n _d_e_f___v_a_l, - _k_r_b_5___b_o_o_l_e_a_n _*_r_e_t___v_a_l) - - _v_o_i_d - kkrrbb55__aappppddeeffaauulltt__ssttrriinngg(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_a_p_p_n_a_m_e, - _k_r_b_5___r_e_a_l_m _r_e_a_l_m, _c_o_n_s_t _c_h_a_r _*_o_p_t_i_o_n, _c_o_n_s_t _c_h_a_r _*_d_e_f___v_a_l, - _c_h_a_r _*_*_r_e_t___v_a_l) - - _v_o_i_d - kkrrbb55__aappppddeeffaauulltt__ttiimmee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_a_p_p_n_a_m_e, - _k_r_b_5___r_e_a_l_m _r_e_a_l_m, _c_o_n_s_t _c_h_a_r _*_o_p_t_i_o_n, _t_i_m_e___t _d_e_f___v_a_l, - _t_i_m_e___t _*_r_e_t___v_a_l) - -DDEESSCCRRIIPPTTIIOONN - These functions get application defaults from the appdefaults section of - the krb5.conf(5) configuration file. These defaults can be specified per - application, and/or per realm. - - These values will be looked for in krb5.conf(5), in order of descending - importance. - - [appdefaults] - appname = { - realm = { - option = value - } - } - appname = { - option = value - } - realm = { - option = value - } - option = value - _a_p_p_n_a_m_e is the name of the application, and _r_e_a_l_m is the realm name. If - the realm is omitted it will not be used for resolving values. _d_e_f___v_a_l - is the value to return if no value is found in krb5.conf(5). - -SSEEEE AALLSSOO - krb5_config(3), krb5.conf(5) - - HEIMDAL July 25, 2000 1 diff --git a/kerberosV/src/lib/krb5/krb5_auth_context.cat3 b/kerberosV/src/lib/krb5/krb5_auth_context.cat3 deleted file mode 100644 index 025e739f459..00000000000 --- a/kerberosV/src/lib/krb5/krb5_auth_context.cat3 +++ /dev/null @@ -1,167 +0,0 @@ - -KRB5_AUTH_CONTEXT(3) UNIX Programmer's Manual KRB5_AUTH_CONTEXT(3) - -NNAAMMEE - kkrrbb55__aauutthh__ccoonntteexxtt, kkrrbb55__aauutthh__ccoonn__iinniitt, kkrrbb55__aauutthh__ccoonn__ffrreeee, - kkrrbb55__aauutthh__ccoonn__sseettffllaaggss, kkrrbb55__aauutthh__ccoonn__ggeettffllaaggss, kkrrbb55__aauutthh__ccoonn__sseettaaddddrrss, - kkrrbb55__aauutthh__ccoonn__sseettaaddddrrss__ffrroomm__ffdd, kkrrbb55__aauutthh__ccoonn__ggeettaaddddrrss, - kkrrbb55__aauutthh__ccoonn__ggeennaaddddrrss, kkrrbb55__aauutthh__ccoonn__ggeettkkeeyy, kkrrbb55__aauutthh__ccoonn__sseettkkeeyy, - kkrrbb55__aauutthh__ccoonn__ggeettuusseerrkkeeyy, kkrrbb55__aauutthh__ccoonn__sseettuusseerrkkeeyy, - kkrrbb55__aauutthh__ccoonn__ggeettllooccaallssuubbkkeeyy, kkrrbb55__aauutthh__ccoonn__sseettllooccaallssuubbkkeeyy, - kkrrbb55__aauutthh__ccoonn__ggeettrreemmootteessuubbkkeeyy, kkrrbb55__aauutthh__ccoonn__sseettrreemmootteessuubbkkeeyy, - kkrrbb55__aauutthh__sseettcckkssuummttyyppee, kkrrbb55__aauutthh__ggeettcckkssuummttyyppee, kkrrbb55__aauutthh__sseettkkeeyyttyyppee, - kkrrbb55__aauutthh__ggeettkkeeyyttyyppee, kkrrbb55__aauutthh__ggeettllooccaallsseeqqnnuummbbeerr, - kkrrbb55__aauutthh__sseettllooccaallsseeqqnnuummbbeerr, kkrrbb55__aauutthh__ggeettrreemmootteesseeqqnnuummbbeerr, - kkrrbb55__aauutthh__sseettrreemmootteesseeqqnnuummbbeerr, kkrrbb55__aauutthh__ggeettaauutthheennttiiccaattoorr, - kkrrbb55__aauutthh__ccoonn__ggeettrrccaacchhee, kkrrbb55__aauutthh__ccoonn__sseettrrccaacchhee, - kkrrbb55__aauutthh__ccoonn__iinniittiivveeccttoorr, kkrrbb55__aauutthh__ccoonn__sseettiivveeccttoorr - manage authentica- - tion on connection level - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__iinniitt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _*_a_u_t_h___c_o_n_t_e_x_t) - - _v_o_i_d - kkrrbb55__aauutthh__ccoonn__ffrreeee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _a_u_t_h___c_o_n_t_e_x_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__sseettffllaaggss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _a_u_t_h___c_o_n_t_e_x_t, _i_n_t_3_2___t _f_l_a_g_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__ggeettffllaaggss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _a_u_t_h___c_o_n_t_e_x_t, _i_n_t_3_2___t _*_f_l_a_g_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__sseettaaddddrrss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _a_u_t_h___c_o_n_t_e_x_t, _k_r_b_5___a_d_d_r_e_s_s _*_l_o_c_a_l___a_d_d_r, - _k_r_b_5___a_d_d_r_e_s_s _*_r_e_m_o_t_e___a_d_d_r) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__ggeettaaddddrrss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _a_u_t_h___c_o_n_t_e_x_t, _k_r_b_5___a_d_d_r_e_s_s _*_*_l_o_c_a_l___a_d_d_r, - _k_r_b_5___a_d_d_r_e_s_s _*_*_r_e_m_o_t_e___a_d_d_r) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__ggeennaaddddrrss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _a_u_t_h___c_o_n_t_e_x_t, _i_n_t _f_d, _i_n_t _f_l_a_g_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__sseettaaddddrrss__ffrroomm__ffdd(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _a_u_t_h___c_o_n_t_e_x_t, _v_o_i_d _*_p___f_d) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__ggeettkkeeyy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _a_u_t_h___c_o_n_t_e_x_t, _k_r_b_5___k_e_y_b_l_o_c_k _*_*_k_e_y_b_l_o_c_k) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__ggeettllooccaallssuubbkkeeyy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _a_u_t_h___c_o_n_t_e_x_t, _k_r_b_5___k_e_y_b_l_o_c_k _*_*_k_e_y_b_l_o_c_k) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__ggeettrreemmootteessuubbkkeeyy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _a_u_t_h___c_o_n_t_e_x_t, _k_r_b_5___k_e_y_b_l_o_c_k _*_*_k_e_y_b_l_o_c_k) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__iinniittiivveeccttoorr(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _a_u_t_h___c_o_n_t_e_x_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aauutthh__ccoonn__sseettiivveeccttoorr(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___a_u_t_h___c_o_n_t_e_x_t _*_a_u_t_h___c_o_n_t_e_x_t, _k_r_b_5___p_o_i_n_t_e_r _i_v_e_c_t_o_r) - -DDEESSCCRRIIPPTTIIOONN - The kkrrbb55__aauutthh__ccoonntteexxtt structure holds all context related to an authenti- - cated connection, in a similar way to kkrrbb55__ccoonntteexxtt that holds the context - for the thread or process. kkrrbb55__aauutthh__ccoonntteexxtt is used by various func- - tions that are directly related to authentication between the serv- - er/client. Example of data that this structure contains are various - flags, addresses of client and server, port numbers, keyblocks (and sub- - keys), sequence numbers, replay cache, and checksum-type. - - kkrrbb55__aauutthh__ccoonn__iinniitt() allocates and initializes the kkrrbb55__aauutthh__ccoonntteexxtt - structure. Default values can be changed with - kkrrbb55__aauutthh__ccoonn__sseettcckkssuummttyyppee() and kkrrbb55__aauutthh__ccoonn__sseettffllaaggss(). The - aauutthh__ccoonntteexxtt structure must be freed by kkrrbb55__aauutthh__ccoonn__ffrreeee(). - - kkrrbb55__aauutthh__ccoonn__ggeettffllaaggss() and kkrrbb55__aauutthh__ccoonn__sseettffllaaggss() gets and modifies - the flags for a kkrrbb55__aauutthh__ccoonntteexxtt structure. Possible flags to set are: - - KRB5_AUTH_CONTEXT_DO_TIME - check timestamp on incoming packets. - - KRB5_AUTH_CONTEXT_DO_SEQUENCE - Generate and check sequence-number on each packet. - - kkrrbb55__aauutthh__ccoonn__sseettaaddddrrss(), kkrrbb55__aauutthh__ccoonn__sseettaaddddrrss__ffrroomm__ffdd() and - kkrrbb55__aauutthh__ccoonn__ggeettaaddddrrss() gets and sets the addresses that are checked - when a packet is received. It is mandatory to set an address for the re- - mote host. If the local address is not set, it iss deduced from the un- - derlaying operating system. kkrrbb55__aauutthh__ccoonn__ggeettaaddddrrss() will call - kkrrbb55__ffrreeee__aaddddrreessss() on any address that is passed in _l_o_c_a_l___a_d_d_r or - _r_e_m_o_t_e___a_d_d_r. kkrrbb55__aauutthh__ccoonn__sseettaaddddrr() allows passing in a NULL pointer as - _l_o_c_a_l___a_d_d_r and _r_e_m_o_t_e___a_d_d_r, in that case it will just not set that ad- - dress. - - kkrrbb55__aauutthh__ccoonn__sseettaaddddrrss__ffrroomm__ffdd() fetches the addresses from a file de- - scriptor. - - kkrrbb55__aauutthh__ccoonn__ggeennaaddddrrss() fetches the address information from the given - file descriptor _f_d depending on the bitmap argument _f_l_a_g_s. - - Possible values on _f_l_a_g_s are: - - _K_R_B_5___A_U_T_H___C_O_N_T_E_X_T___G_E_N_E_R_A_T_E___L_O_C_A_L___A_D_D_R - fetches the local address from _f_d. - - _K_R_B_5___A_U_T_H___C_O_N_T_E_X_T___G_E_N_E_R_A_T_E___R_E_M_O_T_E___A_D_D_R - fetches the remote address from _f_d. - - kkrrbb55__aauutthh__ccoonn__sseettkkeeyy(), kkrrbb55__aauutthh__ccoonn__sseettuusseerrkkeeyy() and - kkrrbb55__aauutthh__ccoonn__ggeettkkeeyy() gets and sets the key used for this auth context. - The keyblock returned by kkrrbb55__aauutthh__ccoonn__ggeettkkeeyy() should be freed with - kkrrbb55__ffrreeee__kkeeyybblloocckk(). The keyblock send into kkrrbb55__aauutthh__ccoonn__sseettkkeeyy() is - copied into the kkrrbb55__aauutthh__ccoonntteexxtt, and thus no special handling is need- - ed. NULL is not a valid keyblock to kkrrbb55__aauutthh__ccoonn__sseettkkeeyy(). - - kkrrbb55__aauutthh__ccoonn__sseettuusseerrkkeeyy() is only useful when doing user to user authen- - tication. kkrrbb55__aauutthh__ccoonn__sseettkkeeyy() is equivalent to - kkrrbb55__aauutthh__ccoonn__sseettuusseerrkkeeyy(). - - kkrrbb55__aauutthh__ccoonn__ggeettllooccaallssuubbkkeeyy(), kkrrbb55__aauutthh__ccoonn__sseettllooccaallssuubbkkeeyy(), - kkrrbb55__aauutthh__ccoonn__ggeettrreemmootteessuubbkkeeyy() and kkrrbb55__aauutthh__ccoonn__sseettrreemmootteessuubbkkeeyy() gets - and sets the keyblock for the local and remote subkey. The keyblock re- - turned by kkrrbb55__aauutthh__ccoonn__ggeettllooccaallssuubbkkeeyy() and - kkrrbb55__aauutthh__ccoonn__ggeettrreemmootteessuubbkkeeyy() must be freed with kkrrbb55__ffrreeee__kkeeyybblloocckk(). - - kkrrbb55__aauutthh__sseettcckkssuummttyyppee() and kkrrbb55__aauutthh__ggeettcckkssuummttyyppee() sets and gets the - checksum type that should be used for this connection. - - kkrrbb55__aauutthh__ggeettrreemmootteesseeqqnnuummbbeerr() kkrrbb55__aauutthh__sseettrreemmootteesseeqqnnuummbbeerr(), - kkrrbb55__aauutthh__ggeettllooccaallsseeqqnnuummbbeerr() and kkrrbb55__aauutthh__sseettllooccaallsseeqqnnuummbbeerr() gets and - sets the sequence-number for the local and remote sequence-number - counter. - - kkrrbb55__aauutthh__sseettkkeeyyttyyppee() and kkrrbb55__aauutthh__ggeettkkeeyyttyyppee() gets and gets the key- - type of the keyblock in kkrrbb55__aauutthh__ccoonntteexxtt. - - kkrrbb55__aauutthh__ggeettaauutthheennttiiccaattoorr() Retrieves the authenticator that was used - during mutual authentication. The authenticator returned should be freed - by calling kkrrbb55__ffrreeee__aauutthheennttiiccaattoorr(). - - kkrrbb55__aauutthh__ccoonn__ggeettrrccaacchhee() and kkrrbb55__aauutthh__ccoonn__sseettrrccaacchhee() gets and sets the - replay-cache. - - kkrrbb55__aauutthh__ccoonn__iinniittiivveeccttoorr() allocates memory for and zeros the initial - vector in the _a_u_t_h___c_o_n_t_e_x_t keyblock. - - kkrrbb55__aauutthh__ccoonn__sseettiivveeccttoorr() sets the i_vector portion of _a_u_t_h___c_o_n_t_e_x_t to - _i_v_e_c_t_o_r. - -SSEEEE AALLSSOO - krb5_context(3), kerberos(8) - - HEIMDAL January 21, 2001 3 diff --git a/kerberosV/src/lib/krb5/krb5_build_principal.cat3 b/kerberosV/src/lib/krb5/krb5_build_principal.cat3 deleted file mode 100644 index 087dd93eafd..00000000000 --- a/kerberosV/src/lib/krb5/krb5_build_principal.cat3 +++ /dev/null @@ -1,58 +0,0 @@ - -KRB5_BUILD_PRINCIPAL(3) UNIX Programmer's Manual KRB5_BUILD_PRINCIPAL(3) - -NNAAMMEE - kkrrbb55__bbuuiilldd__pprriinncciippaall, kkrrbb55__bbuuiilldd__pprriinncciippaall__eexxtt, kkrrbb55__bbuuiilldd__pprriinncciippaall__vvaa, - kkrrbb55__bbuuiilldd__pprriinncciippaall__vvaa__eexxtt, kkrrbb55__mmaakkee__pprriinncciippaall - principal creation - functions - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__bbuuiilldd__pprriinncciippaall(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_r_i_n_c_i_p_a_l _*_p_r_i_n_c_i_p_a_l, - _i_n_t _r_e_a_l_m___l_e_n, _k_r_b_5___c_o_n_s_t___r_e_a_l_m _r_e_a_l_m, _._._.) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__bbuuiilldd__pprriinncciippaall__eexxtt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_r_i_n_c_i_p_a_l _*_p_r_i_n_c_i_p_a_l, - _i_n_t _r_e_a_l_m___l_e_n, _k_r_b_5___c_o_n_s_t___r_e_a_l_m _r_e_a_l_m, _._._.) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__bbuuiilldd__pprriinncciippaall__vvaa(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_r_i_n_c_i_p_a_l _*_p_r_i_n_c_i_p_a_l, - _i_n_t _r_e_a_l_m___l_e_n, _k_r_b_5___c_o_n_s_t___r_e_a_l_m _r_e_a_l_m, _v_a___l_i_s_t _a_p) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__bbuuiilldd__pprriinncciippaall__vvaa__eexxtt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___p_r_i_n_c_i_p_a_l _*_p_r_i_n_c_i_p_a_l, _i_n_t _r_e_a_l_m___l_e_n, _k_r_b_5___c_o_n_s_t___r_e_a_l_m _r_e_a_l_m, - _v_a___l_i_s_t _a_p) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__mmaakkee__pprriinncciippaall(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_r_i_n_c_i_p_a_l _*_p_r_i_n_c_i_p_a_l, - _k_r_b_5___c_o_n_s_t___r_e_a_l_m _r_e_a_l_m, _._._.) - -DDEESSCCRRIIPPTTIIOONN - These functions create a Kerberos 5 principal from a realm and a list of - components. All of these functions return an allocated principal in the - _p_r_i_n_c_i_p_a_l parameter, this should be freed with kkrrbb55__ffrreeee__pprriinncciippaall() af- - ter use. - - The ``build'' functions take a _r_e_a_l_m and the length of the realm. The - kkrrbb55__bbuuiilldd__pprriinncciippaall() and kkrrbb55__bbuuiilldd__pprriinncciippaall__vvaa() also takes a list of - components (zero-terminated strings), terminated with NULL. The - kkrrbb55__bbuuiilldd__pprriinncciippaall__eexxtt() and kkrrbb55__bbuuiilldd__pprriinncciippaall__vvaa__eexxtt() takes a list - of length-value pairs, the list is terminated with a zero length. - - The kkrrbb55__mmaakkee__pprriinncciippaall() is a wrapper around kkrrbb55__bbuuiilldd__pprriinncciippaall(). If - the realm is NULL, the default realm will be used. - -BBUUGGSS - You can not have a NUL in a component. Until someone can give a good ex- - ample of where it would be a good idea to have NUL's in a component, this - will not be fixed. - -SSEEEE AALLSSOO - krb5_425_conv_principal(3), krb5_free_principal(3), krb5_parse_name(3), - krb5_sname_to_principal(3), krb5_unparse_name(3) - - HEIMDAL August 8, 1997 1 diff --git a/kerberosV/src/lib/krb5/krb5_ccache.cat3 b/kerberosV/src/lib/krb5/krb5_ccache.cat3 deleted file mode 100644 index 19624ffb117..00000000000 --- a/kerberosV/src/lib/krb5/krb5_ccache.cat3 +++ /dev/null @@ -1,176 +0,0 @@ - -KRB5_CCACHE(3) UNIX Programmer's Manual KRB5_CCACHE(3) - -NNAAMMEE - kkrrbb55__ccccaacchhee, kkrrbb55__cccc__ccuurrssoorr, kkrrbb55__cccc__ooppss, kkrrbb55__ffcccc__ooppss, kkrrbb55__mmcccc__ooppss, - kkrrbb55__cccc__cclloossee, kkrrbb55__cccc__ccooppyy__ccaacchhee, kkrrbb55__cccc__ddeeffaauulltt, kkrrbb55__cccc__ddeeffaauulltt__nnaammee, - kkrrbb55__cccc__ddeessttrrooyy, kkrrbb55__cccc__eenndd__sseeqq__ggeett, kkrrbb55__cccc__ggeenn__nneeww, kkrrbb55__cccc__ggeett__nnaammee, - kkrrbb55__cccc__ggeett__pprriinncciippaall, kkrrbb55__cccc__ggeett__ttyyppee, kkrrbb55__cccc__ggeett__ooppss, - kkrrbb55__cccc__ggeett__vveerrssiioonn, kkrrbb55__cccc__iinniittiiaalliizzee, kkrrbb55__cccc__rreeggiisstteerr, - kkrrbb55__cccc__rreessoollvvee, kkrrbb55__cccc__rreettrriieevvee__ccrreedd, kkrrbb55__cccc__rreemmoovvee__ccrreedd, - kkrrbb55__cccc__sseett__ddeeffaauulltt__nnaammee, kkrrbb55__cccc__ssttoorree__ccrreedd, kkrrbb55__cccc__sseett__ffllaaggss, - kkrrbb55__cccc__nneexxtt__ccrreedd - mange credential cache. - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - struct krb5_ccache; - - struct krb5_cc_cursor; - - struct krb5_cc_ops; - - struct krb5_cc_ops *krb5_fcc_ops; - - struct krb5_cc_ops *krb5_mcc_ops; - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__cclloossee(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _i_d) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__ccooppyy__ccaacchhee(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___c_c_a_c_h_e _f_r_o_m, - _k_r_b_5___c_c_a_c_h_e _t_o) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__ddeeffaauulltt(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _*_i_d) - - _c_o_n_s_t _c_h_a_r _* - kkrrbb55__cccc__ddeeffaauulltt__nnaammee(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__ddeessttrrooyy(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _i_d) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__eenndd__sseeqq__ggeett(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___c_c_a_c_h_e _i_d, - _k_r_b_5___c_c___c_u_r_s_o_r _*_c_u_r_s_o_r) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__ggeenn__nneeww(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___c_c___o_p_s _*_o_p_s, - _k_r_b_5___c_c_a_c_h_e _*_i_d) - - _c_o_n_s_t _c_h_a_r _* - kkrrbb55__cccc__ggeett__nnaammee(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _i_d) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__ggeett__pprriinncciippaall(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _i_d, - _k_r_b_5___p_r_i_n_c_i_p_a_l _*_p_r_i_n_c_i_p_a_l) - - _c_o_n_s_t _c_h_a_r _* - kkrrbb55__cccc__ggeett__ttyyppee(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _i_d) - - _c_o_n_s_t _k_r_b_5___c_c___o_p_s _* - kkrrbb55__cccc__ggeett__ooppss(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _i_d) - - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__ggeett__vveerrssiioonn(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___c_c_a_c_h_e _i_d) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__iinniittiiaalliizzee(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _i_d, - _k_r_b_5___p_r_i_n_c_i_p_a_l _p_r_i_m_a_r_y___p_r_i_n_c_i_p_a_l) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__rreeggiisstteerr(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___c_c___o_p_s _*_o_p_s, - _k_r_b_5___b_o_o_l_e_a_n _o_v_e_r_r_i_d_e) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__rreessoollvvee(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_n_a_m_e, _k_r_b_5___c_c_a_c_h_e _*_i_d) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__rreettrriieevvee__ccrreedd(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _i_d, - _k_r_b_5___f_l_a_g_s _w_h_i_c_h_f_i_e_l_d_s, _c_o_n_s_t _k_r_b_5___c_r_e_d_s _*_m_c_r_e_d_s, - _k_r_b_5___c_r_e_d_s _*_c_r_e_d_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__rreemmoovvee__ccrreedd(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _i_d, - _k_r_b_5___f_l_a_g_s _w_h_i_c_h, _k_r_b_5___c_r_e_d_s _*_c_r_e_d) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__sseett__ddeeffaauulltt__nnaammee(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_n_a_m_e) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__ssttoorree__ccrreedd(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _i_d, - _k_r_b_5___c_r_e_d_s _*_c_r_e_d_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__sseett__ffllaaggss(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _k_r_b_5___c_c___s_e_t___f_l_a_g_s _i_d, - _k_r_b_5___f_l_a_g_s _f_l_a_g_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cccc__nneexxtt__ccrreedd(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___c_c_a_c_h_e _i_d, - _k_r_b_5___c_c___c_u_r_s_o_r _*_c_u_r_s_o_r, _k_r_b_5___c_r_e_d_s _*_c_r_e_d_s) - -DDEESSCCRRIIPPTTIIOONN - The krb5_ccache structure holds a Kerberos credential cache. - - The krb5_cc_cursor structure holds current position in a credential cache - when iterating over the cache. - - The krb5_cc_ops structure holds a set of operations that can me preformed - on a credential cache. - - There is no component inside krb5_ccache, krb5_cc_cursor nor krb5_fcc_ops - that is directly referable. - - The krb5_creds holds a Kerberos credential, see manpage for - krb5_creds(3). - - kkrrbb55__cccc__ddeeffaauulltt__nnaammee() and kkrrbb55__cccc__sseett__ddeeffaauulltt__nnaammee() gets and sets the - default name for the _c_o_n_t_e_x_t. - - kkrrbb55__cccc__ddeeffaauulltt() opens the default ccache in _i_d. Return 0 or an error - code. - - kkrrbb55__cccc__ggeenn__nneeww() generates a new ccache of type _o_p_s in _i_d. Return 0 or - an error code. - - kkrrbb55__cccc__rreessoollvvee() finds and allocates a ccache in _i_d from the specifica- - tion in _r_e_s_i_d_u_a_l. If the ccache name doesn't contain any colon (:), in- - terpret it as a file name. Return 0 or an error code. - - - kkrrbb55__cccc__iinniittiiaalliizzee() creates a new ccache in _i_d for _p_r_i_m_a_r_y___p_r_i_n_c_i_p_a_l. - Return 0 or an error code. - - kkrrbb55__cccc__cclloossee() stops using the ccache _i_d and frees the related re- - sources. Return 0 or an error code. kkrrbb55__cccc__ddeessttrrooyy() removes the - ccache and closes (by calling kkrrbb55__cccc__cclloossee()) _i_d. Return 0 or an error - code. - - kkrrbb55__cccc__ccooppyy__ccaacchhee() copys the contents of _f_r_o_m to _t_o. - - kkrrbb55__cccc__ggeett__nnaammee() returns the name of the ccache _i_d. - - kkrrbb55__cccc__ggeett__pprriinncciippaall() returns the principal of _i_d in _p_r_i_n_c_i_p_a_l. Return - 0 or an error code. - - kkrrbb55__cccc__ggeett__ttyyppee() returns the type of the ccache _i_d. - - kkrrbb55__cccc__ggeett__ooppss() returns the ops of the ccache _i_d. - - kkrrbb55__cccc__ggeett__vveerrssiioonn() returns the version of _i_d. - - kkrrbb55__cccc__rreeggiisstteerr() Adds a new ccache type with operations _o_p_s, overwrit- - ing any existing one if _o_v_e_r_r_i_d_e. Return an error code or 0. - - kkrrbb55__cccc__rreemmoovvee__ccrreedd() removes the credential identified by (_c_r_e_d, _w_h_i_c_h) - from _i_d. - - kkrrbb55__cccc__ssttoorree__ccrreedd() stores _c_r_e_d_s in the ccache _i_d. Return 0 or an error - code. - - kkrrbb55__cccc__sseett__ffllaaggss() sets the flags of _i_d to _f_l_a_g_s. - - kkrrbb55__cccc__rreettrriieevvee__ccrreedd(), retrieves the credential identified by _m_c_r_e_d_s - (and _w_h_i_c_h_f_i_e_l_d_s) from _i_d in _c_r_e_d_s. Return 0 or an error code. - - kkrrbb55__cccc__nneexxtt__ccrreedd() retrieves the next cred pointed to by (_i_d, _c_u_r_s_o_r) in - _c_r_e_d_s, and advance _c_u_r_s_o_r. Return 0 or an error code. - - kkrrbb55__cccc__eenndd__sseeqq__ggeett() Destroys the cursor _c_u_r_s_o_r. - -SSEEEE AALLSSOO - krb5(3), krb5.conf(5), kerberos(8) - - HEIMDAL March 16, 2003 3 diff --git a/kerberosV/src/lib/krb5/krb5_config.cat3 b/kerberosV/src/lib/krb5/krb5_config.cat3 deleted file mode 100644 index 9b8bab29535..00000000000 --- a/kerberosV/src/lib/krb5/krb5_config.cat3 +++ /dev/null @@ -1,57 +0,0 @@ - -KRB5_CONFIG(3) UNIX Programmer's Manual KRB5_CONFIG(3) - -NNAAMMEE - kkrrbb55__ccoonnffiigg__ggeett__bbooooll__ddeeffaauulltt, kkrrbb55__ccoonnffiigg__ggeett__iinntt__ddeeffaauulltt, - kkrrbb55__ccoonnffiigg__ggeett__ssttrriinngg__ddeeffaauulltt, kkrrbb55__ccoonnffiigg__ggeett__ttiimmee__ddeeffaauulltt - get con- - figuration value - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___b_o_o_l_e_a_n - kkrrbb55__ccoonnffiigg__ggeett__bbooooll__ddeeffaauulltt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___c_o_n_f_i_g___s_e_c_t_i_o_n _*_c, _k_r_b_5___b_o_o_l_e_a_n _d_e_f___v_a_l_u_e, _._._.) - - _i_n_t - kkrrbb55__ccoonnffiigg__ggeett__iinntt__ddeeffaauulltt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_o_n_f_i_g___s_e_c_t_i_o_n _*_c, - _i_n_t _d_e_f___v_a_l_u_e, _._._.) - - _c_o_n_s_t _c_h_a_r_* - kkrrbb55__ccoonnffiigg__ggeett__ssttrriinngg__ddeeffaauulltt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___c_o_n_f_i_g___s_e_c_t_i_o_n _*_c, _c_o_n_s_t _c_h_a_r _*_d_e_f___v_a_l_u_e, _._._.) - - _i_n_t - kkrrbb55__ccoonnffiigg__ggeett__ttiimmee__ddeeffaauulltt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___c_o_n_f_i_g___s_e_c_t_i_o_n _*_c, _i_n_t _d_e_f___v_a_l_u_e, _._._.) - -DDEESSCCRRIIPPTTIIOONN - These functions get values from the krb5.conf(5) configuration file, or - another configuration database specified by the _c parameter. - - The variable arguments should be a list of strings naming each subsection - to look for. For example: - - krb5_config_get_bool_default(context, NULL, FALSE, "libdefaults", "log_utc", NULL) - - gets the boolean value for the log_utc option, defaulting to FALSE. - - kkrrbb55__ccoonnffiigg__ggeett__bbooooll__ddeeffaauulltt() will convert the option value to a boolean - value, where `yes', `true', and any non-zero number means TRUE, and any - other value FALSE. - - kkrrbb55__ccoonnffiigg__ggeett__iinntt__ddeeffaauulltt() will convert the value to an integer. - - kkrrbb55__ccoonnffiigg__ggeett__ttiimmee__ddeeffaauulltt() will convert the value to a period of time - (not a time stamp) in seconds, so the string `2 weeks' will be converted - to 1209600 (2 * 7 * 24 * 60 * 60). - -BBUUGGSS - Other than for the string case, there's no way to tell whether there was - a value specified or not. - -SSEEEE AALLSSOO - krb5_appdefault(3), krb5.conf(5) - - HEIMDAL July 25, 2000 1 diff --git a/kerberosV/src/lib/krb5/krb5_context.cat3 b/kerberosV/src/lib/krb5/krb5_context.cat3 deleted file mode 100644 index 0f8abc1b98e..00000000000 --- a/kerberosV/src/lib/krb5/krb5_context.cat3 +++ /dev/null @@ -1,19 +0,0 @@ - -KRB5_CONTEXT(3) UNIX Programmer's Manual KRB5_CONTEXT(3) - -NNAAMMEE - kkrrbb55__ccoonntteexxtt - krb5 state structure - -DDEESSCCRRIIPPTTIIOONN - The kkrrbb55__ccoonntteexxtt structure is designed to hold all per thread state. All - global variables that are context specific are stored in this structure, - including default encryption types, credentials-cache (ticket file), and - default realms. - - The internals of the structure should never be accessed directly, func- - tions exist for extracting information. - -SSEEEE AALLSSOO - krb5_init_context(3), kerberos(8) - - HEIMDAL January 21, 2001 1 diff --git a/kerberosV/src/lib/krb5/krb5_create_checksum.cat3 b/kerberosV/src/lib/krb5/krb5_create_checksum.cat3 deleted file mode 100644 index 9a0d1d99090..00000000000 --- a/kerberosV/src/lib/krb5/krb5_create_checksum.cat3 +++ /dev/null @@ -1,52 +0,0 @@ - -NAME(3) UNIX Programmer's Manual NAME(3) - -NNAAMMEE - kkrrbb55__cchheecckkssuumm__iiss__ccoolllliissiioonn__pprrooooff, kkrrbb55__cchheecckkssuumm__iiss__kkeeyyeedd, - kkrrbb55__cchheecckkssuummssiizzee, kkrrbb55__ccrreeaattee__cchheecckkssuumm, kkrrbb55__vveerriiffyy__cchheecckkssuumm - creates - and verifies checksums - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ccrreeaattee__cchheecckkssuumm(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_r_y_p_t_o _c_r_y_p_t_o, - _u_n_s_i_g_n_e_d _u_s_a_g_e___o_r___t_y_p_e, _v_o_i_d _*_d_a_t_a, _s_i_z_e___t _l_e_n, _C_h_e_c_k_s_u_m _*_r_e_s_u_l_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__vveerriiffyy__cchheecckkssuumm(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_r_y_p_t_o _c_r_y_p_t_o, - _k_r_b_5___k_e_y___u_s_a_g_e _u_s_a_g_e, _v_o_i_d _*_d_a_t_a, _s_i_z_e___t _l_e_n, _C_h_e_c_k_s_u_m _*_c_k_s_u_m) - - _k_r_b_5___b_o_o_l_e_a_n - kkrrbb55__cchheecckkssuumm__iiss__ccoolllliissiioonn__pprrooooff(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___c_k_s_u_m_t_y_p_e _t_y_p_e) - - _k_r_b_5___b_o_o_l_e_a_n - kkrrbb55__cchheecckkssuumm__iiss__kkeeyyeedd(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_k_s_u_m_t_y_p_e _t_y_p_e) - -DDEESSCCRRIIPPTTIIOONN - These functions are used to create and verify checksums. - kkrrbb55__ccrreeaattee__cchheecckkssuumm() creates a checksum of the specified data, and puts - it in _r_e_s_u_l_t. If _c_r_y_p_t_o is NULL, _u_s_a_g_e___o_r___t_y_p_e specifies the checksum - type to use; it must not be keyed. Otherwise _c_r_y_p_t_o is an encryption con- - text created by kkrrbb55__ccrryyppttoo__iinniitt(), and _u_s_a_g_e___o_r___t_y_p_e specifies a key-us- - age. - - kkrrbb55__vveerriiffyy__cchheecckkssuumm() verifies the _c_h_e_c_k_s_u_m, against the provided data. - - kkrrbb55__cchheecckkssuumm__iiss__ccoolllliissiioonn__pprrooooff() returns true is the specified checksum - is collision proof (that it's very unlikely that two strings has the same - hash value, and that it's hard to find two strings that has the same - hash). Examples of collision proof checksums are MD5, and SHA1, while - CRC32 is not. - - kkrrbb55__cchheecckkssuumm__iiss__kkeeyyeedd() returns true if the specified checksum type is - keyed (that the hash value is a function of both the data, and a separate - key). Examples of keyed hash algorithms are HMAC-SHA1-DES3, and RSA- - MD5-DES. The ``plain'' hash functions MD5, and SHA1 are not keyed. - -SSEEEE AALLSSOO - krb5_crypto_init(3), krb5_encrypt(3) - - HEIMDAL April 7, 1999 1 diff --git a/kerberosV/src/lib/krb5/krb5_crypto_init.cat3 b/kerberosV/src/lib/krb5/krb5_crypto_init.cat3 deleted file mode 100644 index f59863aa021..00000000000 --- a/kerberosV/src/lib/krb5/krb5_crypto_init.cat3 +++ /dev/null @@ -1,32 +0,0 @@ - -NAME(3) UNIX Programmer's Manual NAME(3) - -NNAAMMEE - kkrrbb55__ccrryyppttoo__iinniitt, kkrrbb55__ccrryyppttoo__ddeessttrrooyy - initialize encryption context - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ccrryyppttoo__iinniitt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_b_l_o_c_k _*_k_e_y, - _k_r_b_5___e_n_c_t_y_p_e _e_n_c_t_y_p_e, _k_r_b_5___c_r_y_p_t_o _*_c_r_y_p_t_o) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ccrryyppttoo__ddeessttrrooyy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_r_y_p_t_o _c_r_y_p_t_o) - -DDEESSCCRRIIPPTTIIOONN - These functions are used to initialize an encryption context that can be - used to encrypt or checksum data. - - The kkrrbb55__ccrryypptt__iinniitt() initializes the encrytion context _c_r_y_p_t_o. The _k_e_y - parameter is the key to use for encryption, and checksums. The encryption - type to use is taken from the key, but can be overridden with the _e_n_c_t_y_p_e - _p_a_r_a_m_e_t_e_r. - - kkrrbb55__ccrryyppttoo__ddeessttrrooyy() frees a previously allocated encrypion context. - -SSEEEE AALLSSOO - krb5_create_checksum(3), krb5_encrypt(3) - - HEIMDAL April 7, 1999 1 diff --git a/kerberosV/src/lib/krb5/krb5_data.cat3 b/kerberosV/src/lib/krb5/krb5_data.cat3 deleted file mode 100644 index 70aa5e247a1..00000000000 --- a/kerberosV/src/lib/krb5/krb5_data.cat3 +++ /dev/null @@ -1,71 +0,0 @@ - -KRB5_DATA(3) UNIX Programmer's Manual KRB5_DATA(3) - -NNAAMMEE - kkrrbb55__ddaattaa kkrrbb55__ddaattaa__zzeerroo kkrrbb55__ddaattaa__ffrreeee kkrrbb55__ffrreeee__ddaattaa__ccoonntteennttss - kkrrbb55__ffrreeee__ddaattaa kkrrbb55__ddaattaa__aalllloocc kkrrbb55__ddaattaa__rreeaalllloocc kkrrbb55__ddaattaa__ccooppyy - kkrrbb55__ccooppyy__ddaattaa - operates on the Kerberos datatype krb5_data. - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - struct krb5_data; _v_o_i_d - kkrrbb55__ddaattaa__zzeerroo(_k_r_b_5___d_a_t_a _*_p) - - _v_o_i_d - kkrrbb55__ddaattaa__ffrreeee(_k_r_b_5___d_a_t_a _*_p) - - _v_o_i_d - kkrrbb55__ffrreeee__ddaattaa__ccoonntteennttss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___d_a_t_a _*_p) - - _v_o_i_d - kkrrbb55__ffrreeee__ddaattaa(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___d_a_t_a _*_p) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ddaattaa__aalllloocc(_k_r_b_5___d_a_t_a _*_p, _i_n_t _l_e_n) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ddaattaa__rreeaalllloocc(_k_r_b_5___d_a_t_a _*_p, _i_n_t _l_e_n) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ddaattaa__ccooppyy(_k_r_b_5___d_a_t_a _*_p, _c_o_n_s_t _v_o_i_d _*_d_a_t_a, _s_i_z_e___t _l_e_n) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ccooppyy__ddaattaa(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___d_a_t_a _*_i_n_d_a_t_a, - _k_r_b_5___d_a_t_a _*_*_o_u_t_d_a_t_a) - -DDEESSCCRRIIPPTTIIOONN - The krb5_data structure holds a data element. The structure contains two - public accessible elements _l_e_n_g_t_h (the length of data) and _d_a_t_a (the data - itself). The structure must always be initiated and freed by the func- - tions documented in this manual. - - kkrrbb55__ddaattaa__zzeerroo() resets the content of _p. - - kkrrbb55__ddaattaa__ffrreeee() free the data in _p. - - kkrrbb55__ffrreeee__ddaattaa__ccoonntteennttss() works the same way as _k_r_b_5___d_a_t_a___f_r_e_e. The - diffrence is that krb5_free_data_contents is more portable (exists in MIT - api). - - kkrrbb55__ffrreeee__ddaattaa() frees the data in _p and _p itself . - - kkrrbb55__ddaattaa__aalllloocc() allocates _l_e_n bytes in _p Returns 0 or an error. - - kkrrbb55__ddaattaa__rreeaalllloocc() reallocates the length of _p to the length in _l_e_n. Re- - turns 0 or an error. - - kkrrbb55__ddaattaa__ccooppyy() copies the _d_a_t_a that have the length _l_e_n into _p. _p is - not freed so the calling function should make sure the _p doesn't contain - anything needs to be freed. Returns 0 or an error. - - kkrrbb55__ccooppyy__ddaattaa() copies the krb5_data in _i_n_d_a_t_a to _o_u_t_d_a_t_a. _o_u_t_d_a_t_a is - not freed so the calling function should make sure the _o_u_t_d_a_t_a doesn't - contain anything needs to be freed. _o_u_t_d_a_t_a should be freed using - kkrrbb55__ffrreeee__ddaattaa(). Returns 0 or an error. - -SSEEEE AALLSSOO - krb5(3), krb5_storage(3), kerberos(8) - - HEIMDAL March 20, 2003 2 diff --git a/kerberosV/src/lib/krb5/krb5_encrypt.cat3 b/kerberosV/src/lib/krb5/krb5_encrypt.cat3 deleted file mode 100644 index 0188acd39e2..00000000000 --- a/kerberosV/src/lib/krb5/krb5_encrypt.cat3 +++ /dev/null @@ -1,44 +0,0 @@ - -KRB5_ENCRYPT(3) UNIX Programmer's Manual KRB5_ENCRYPT(3) - -NNAAMMEE - kkrrbb55__ddeeccrryypptt, kkrrbb55__ddeeccrryypptt__EEnnccrryypptteeddDDaattaa, kkrrbb55__eennccrryypptt, - kkrrbb55__eennccrryypptt__EEnnccrryypptteeddDDaattaa - encrypt and decrypt data - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__eennccrryypptt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_r_y_p_t_o _c_r_y_p_t_o, _u_n_s_i_g_n_e_d _u_s_a_g_e, - _v_o_i_d _*_d_a_t_a, _s_i_z_e___t _l_e_n, _k_r_b_5___d_a_t_a _*_r_e_s_u_l_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__eennccrryypptt__EEnnccrryypptteeddDDaattaa(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_r_y_p_t_o _c_r_y_p_t_o, - _u_n_s_i_g_n_e_d _u_s_a_g_e, _v_o_i_d _*_d_a_t_a, _s_i_z_e___t _l_e_n, _i_n_t _k_v_n_o, - _E_n_c_r_y_p_t_e_d_D_a_t_a _*_r_e_s_u_l_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ddeeccrryypptt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_r_y_p_t_o _c_r_y_p_t_o, _u_n_s_i_g_n_e_d _u_s_a_g_e, - _v_o_i_d _*_d_a_t_a, _s_i_z_e___t _l_e_n, _k_r_b_5___d_a_t_a _*_r_e_s_u_l_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ddeeccrryypptt__EEnnccrryypptteeddDDaattaa(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_r_y_p_t_o _c_r_y_p_t_o, - _u_n_s_i_g_n_e_d _u_s_a_g_e, _E_n_c_r_y_p_t_e_d_D_a_t_a _*_e, _k_r_b_5___d_a_t_a _*_r_e_s_u_l_t) - -DDEESSCCRRIIPPTTIIOONN - These functions are used to encrypt and decrypt data. - - kkrrbb55__eennccrryypptt() puts the encrypted version of _d_a_t_a (of size _l_e_n) in - _r_e_s_u_l_t. If the encryption type supports using derived keys, _u_s_a_g_e should - be the appropriate key-usage. kkrrbb55__eennccrryypptt__EEnnccrryypptteeddDDaattaa() does the same - as kkrrbb55__eennccrryypptt(), but it puts the encrypted data in a _E_n_c_r_y_p_t_e_d_D_a_t_a - structure instead. If _k_v_n_o is not zero, it will be put in the _k_v_n_o _f_i_e_l_d - _i_n _t_h_e _E_n_c_r_y_p_t_e_d_D_a_t_a. - - kkrrbb55__ddeeccrryypptt(), and kkrrbb55__ddeeccrryypptt__EEnnccrryypptteeddDDaattaa() works similarly. - -SSEEEE AALLSSOO - krb5_create_checksum(3), krb5_crypto_init(3) - - HEIMDAL April 7, 1999 1 diff --git a/kerberosV/src/lib/krb5/krb5_free_addresses.cat3 b/kerberosV/src/lib/krb5/krb5_free_addresses.cat3 deleted file mode 100644 index 4bf75c35f48..00000000000 --- a/kerberosV/src/lib/krb5/krb5_free_addresses.cat3 +++ /dev/null @@ -1,21 +0,0 @@ - -KRB5_FREE_ADDRESSES(3) UNIX Programmer's Manual KRB5_FREE_ADDRESSES(3) - -NNAAMMEE - kkrrbb55__ffrreeee__aaddddrreesssseess - free list of addresses - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _v_o_i_d - kkrrbb55__ffrreeee__aaddddrreesssseess(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___a_d_d_r_e_s_s_e_s _*_a_d_d_r_e_s_s_e_s) - -DDEESSCCRRIIPPTTIIOONN - The kkrrbb55__ffrreeee__aaddddrreesssseess() will free a list of addresses that has been - created with kkrrbb55__ggeett__aallll__cclliieenntt__aaddddrrss() or with some other function. - -SSEEEE AALLSSOO - krb5_get_all_client_addrs(3) - - HEIMDAL November 20, 2001 1 diff --git a/kerberosV/src/lib/krb5/krb5_free_principal.cat3 b/kerberosV/src/lib/krb5/krb5_free_principal.cat3 deleted file mode 100644 index 91aa5319cc7..00000000000 --- a/kerberosV/src/lib/krb5/krb5_free_principal.cat3 +++ /dev/null @@ -1,23 +0,0 @@ - -KRB5_FREE_PRINCIPAL(3) UNIX Programmer's Manual KRB5_FREE_PRINCIPAL(3) - -NNAAMMEE - kkrrbb55__ffrreeee__pprriinncciippaall - principal free function - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _v_o_i_d - kkrrbb55__ffrreeee__pprriinncciippaall(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l) - -DDEESSCCRRIIPPTTIIOONN - The kkrrbb55__ffrreeee__pprriinncciippaall() will free a principal that has been created - with kkrrbb55__bbuuiilldd__pprriinncciippaall(), kkrrbb55__ppaarrssee__nnaammee(), or with some other func- - tion. - -SSEEEE AALLSSOO - krb5_425_conv_principal(3), krb5_build_principal(3), - krb5_parse_name(3), krb5_sname_to_principal(3), krb5_unparse_name(3) - - HEIMDAL August 8, 1997 1 diff --git a/kerberosV/src/lib/krb5/krb5_get_all_client_addrs.cat3 b/kerberosV/src/lib/krb5/krb5_get_all_client_addrs.cat3 deleted file mode 100644 index 4093b1a9862..00000000000 --- a/kerberosV/src/lib/krb5/krb5_get_all_client_addrs.cat3 +++ /dev/null @@ -1,37 +0,0 @@ - -KRB5_GET_ADDRS(3) UNIX Programmer's Manual KRB5_GET_ADDRS(3) - -NNAAMMEE - kkrrbb55__ggeett__aallll__cclliieenntt__aaddddrrss, kkrrbb55__ggeett__aallll__sseerrvveerr__aaddddrrss - return local ad- - dresses - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ggeett__aallll__cclliieenntt__aaddddrrss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___a_d_d_r_e_s_s_e_s _*_a_d_d_r_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ggeett__aallll__sseerrvveerr__aaddddrrss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___a_d_d_r_e_s_s_e_s _*_a_d_d_r_s) - -DDEESSCCRRIIPPTTIIOONN - These functions return in _a_d_d_r_s a list of addresses associated with the - local host. - - The server variant returns all configured interface addresses (if possi- - ble), including loop-back addresses. This is useful if you want to create - sockets to listen to. - - The client version will also scan local interfaces (can be turned off by - setting libdefaults/scan_interfaces to false in _k_r_b_5_._c_o_n_f), but will not - include loop-back addresses, unless there are no other addresses found. - It will remove all addresses included in libdefaults/ignore_addresses but - will unconditionally include addresses in libdefaults/extra_addresses. - - The returned addresses should be freed by calling kkrrbb55__ffrreeee__aaddddrreesssseess(). - -SSEEEE AALLSSOO - krb5_free_addresses(3) - - July 1, 2001 1 diff --git a/kerberosV/src/lib/krb5/krb5_get_krbhst.cat3 b/kerberosV/src/lib/krb5/krb5_get_krbhst.cat3 deleted file mode 100644 index 493b55284f2..00000000000 --- a/kerberosV/src/lib/krb5/krb5_get_krbhst.cat3 +++ /dev/null @@ -1,54 +0,0 @@ - -KRB5_GET_KRBHST(3) UNIX Programmer's Manual KRB5_GET_KRBHST(3) - -NNAAMMEE - kkrrbb55__ggeett__kkrrbbhhsstt kkrrbb55__ggeett__kkrrbb__aaddmmiinn__hhsstt kkrrbb55__ggeett__kkrrbb__cchhaannggeeppww__hhsstt - kkrrbb55__ggeett__kkrrbb552244hhsstt kkrrbb55__ffrreeee__kkrrbbhhsstt - lookup Kerberos KDC hosts - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ggeett__kkrrbbhhsstt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___r_e_a_l_m _*_r_e_a_l_m, - _c_h_a_r _*_*_*_h_o_s_t_l_i_s_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ggeett__kkrrbb__aaddmmiinn__hhsstt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___r_e_a_l_m _*_r_e_a_l_m, - _c_h_a_r _*_*_*_h_o_s_t_l_i_s_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ggeett__kkrrbb__cchhaannggeeppww__hhsstt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___r_e_a_l_m _*_r_e_a_l_m, - _c_h_a_r _*_*_*_h_o_s_t_l_i_s_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ggeett__kkrrbb552244hhsstt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___r_e_a_l_m _*_r_e_a_l_m, - _c_h_a_r _*_*_*_h_o_s_t_l_i_s_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ffrreeee__kkrrbbhhsstt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_h_a_r _*_*_h_o_s_t_l_i_s_t) - -DDEESSCCRRIIPPTTIIOONN - These functions implement the old API to get a list of Kerberos hosts, - and are thus similar to the kkrrbb55__kkrrbbhhsstt__iinniitt() functions. However, since - these functions returns _a_l_l hosts in one go, they potentially have to do - more lookups than necessary. These functions remain for compatibility - reasons. - - After a call to one of these functions, _h_o_s_t_l_i_s_t is a NULL terminated - list of strings, pointing to the requested Kerberos hosts. These should - be freed with kkrrbb55__ffrreeee__kkrrbbhhsstt() when done with. - -EEXXAAMMPPLLEE - The following code will print the KDCs of the realm ``MY.REALM''. - - char **hosts, **p; - krb5_get_krbhst(context, "MY.REALM", &hosts); - for(p = hosts; *p; p++) - printf("%s\n", *p); - krb5_free_krbhst(context, hosts); - -SSEEEE AALLSSOO - krb5_krbhst_init(3) - - HEIMDAL June 17, 2001 1 diff --git a/kerberosV/src/lib/krb5/krb5_init_context.cat3 b/kerberosV/src/lib/krb5/krb5_init_context.cat3 deleted file mode 100644 index 4d47bafd5fe..00000000000 --- a/kerberosV/src/lib/krb5/krb5_init_context.cat3 +++ /dev/null @@ -1,34 +0,0 @@ - -KRB5_CONTEXT(3) UNIX Programmer's Manual KRB5_CONTEXT(3) - -NNAAMMEE - kkrrbb55__iinniitt__ccoonntteexxtt, kkrrbb55__ffrreeee__ccoonntteexxtt - create and delete krb5_context - structures - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__iinniitt__ccoonntteexxtt(_k_r_b_5___c_o_n_t_e_x_t _*_c_o_n_t_e_x_t) - - _v_o_i_d - kkrrbb55__ffrreeee__ccoonntteexxtt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t) - -DDEESSCCRRIIPPTTIIOONN - The kkrrbb55__iinniitt__ccoonntteexxtt() function initializes the _c_o_n_t_e_x_t structure and - reads the configuration file _/_e_t_c_/_k_r_b_5_._c_o_n_f. - - The structure should be freed by calling kkrrbb55__ffrreeee__ccoonntteexxtt() when it is - no longer being used. - -RREETTUURRNN VVAALLUUEESS - kkrrbb55__iinniitt__ccoonntteexxtt() returns 0 to indicate success. Otherwise an errno - code is returned. Failure means either that something bad happened dur- - ing initialization (typically [ENOMEM]) or that Kerberos should not be - used [ENXIO]. - -SSEEEE AALLSSOO - errno(2), krb5_context(3), kerberos(8) - - HEIMDAL January 21, 2001 1 diff --git a/kerberosV/src/lib/krb5/krb5_keytab.cat3 b/kerberosV/src/lib/krb5/krb5_keytab.cat3 deleted file mode 100644 index 301cb1e27c1..00000000000 --- a/kerberosV/src/lib/krb5/krb5_keytab.cat3 +++ /dev/null @@ -1,212 +0,0 @@ - -KRB5_KEYTAB(3) UNIX Programmer's Manual KRB5_KEYTAB(3) - -NNAAMMEE - kkrrbb55__kktt__ooppss, kkrrbb55__kkeeyyttaabb__eennttrryy, kkrrbb55__kktt__ccuurrssoorr, kkrrbb55__kktt__aadddd__eennttrryy, - kkrrbb55__kktt__cclloossee, kkrrbb55__kktt__ccoommppaarree, kkrrbb55__kktt__ccooppyy__eennttrryy__ccoonntteennttss, - kkrrbb55__kktt__ddeeffaauulltt, kkrrbb55__kktt__ddeeffaauulltt__nnaammee, kkrrbb55__kktt__eenndd__sseeqq__ggeett, - kkrrbb55__kktt__ffrreeee__eennttrryy, kkrrbb55__kktt__ggeett__eennttrryy, kkrrbb55__kktt__ggeett__nnaammee, - kkrrbb55__kktt__ggeett__ttyyppee, kkrrbb55__kktt__nneexxtt__eennttrryy, kkrrbb55__kktt__rreeaadd__sseerrvviiccee__kkeeyy, - kkrrbb55__kktt__rreeggiisstteerr, kkrrbb55__kktt__rreemmoovvee__eennttrryy, kkrrbb55__kktt__rreessoollvvee, - kkrrbb55__kktt__ssttaarrtt__sseeqq__ggeett - manage keytab (key storage) files - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__aadddd__eennttrryy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b _i_d, - _k_r_b_5___k_e_y_t_a_b___e_n_t_r_y _*_e_n_t_r_y) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__cclloossee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b _i_d) - - _k_r_b_5___b_o_o_l_e_a_n - kkrrbb55__kktt__ccoommppaarree(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b___e_n_t_r_y _*_e_n_t_r_y, - _k_r_b_5___c_o_n_s_t___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l, _k_r_b_5___k_v_n_o _v_n_o, - _k_r_b_5___e_n_c_t_y_p_e _e_n_c_t_y_p_e) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__ccooppyy__eennttrryy__ccoonntteennttss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _c_o_n_s_t _k_r_b_5___k_e_y_t_a_b___e_n_t_r_y _*_i_n, _k_r_b_5___k_e_y_t_a_b___e_n_t_r_y _*_o_u_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__ddeeffaauulltt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b _*_i_d) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__ddeeffaauulltt__nnaammee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_h_a_r _*_n_a_m_e, _s_i_z_e___t _n_a_m_e_s_i_z_e) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__eenndd__sseeqq__ggeett(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b _i_d, - _k_r_b_5___k_t___c_u_r_s_o_r _*_c_u_r_s_o_r) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__ffrreeee__eennttrryy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b___e_n_t_r_y _*_e_n_t_r_y) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__ggeett__eennttrryy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b _i_d, - _k_r_b_5___c_o_n_s_t___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l, _k_r_b_5___k_v_n_o _k_v_n_o, - _k_r_b_5___e_n_c_t_y_p_e _e_n_c_t_y_p_e, _k_r_b_5___k_e_y_t_a_b___e_n_t_r_y _*_e_n_t_r_y) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__ggeett__nnaammee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b _k_e_y_t_a_b, _c_h_a_r _*_n_a_m_e, - _s_i_z_e___t _n_a_m_e_s_i_z_e) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__ggeett__ttyyppee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b _k_e_y_t_a_b, _c_h_a_r _*_p_r_e_f_i_x, - _s_i_z_e___t _p_r_e_f_i_x_s_i_z_e) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__nneexxtt__eennttrryy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b _i_d, - _k_r_b_5___k_e_y_t_a_b___e_n_t_r_y _*_e_n_t_r_y, _k_r_b_5___k_t___c_u_r_s_o_r _*_c_u_r_s_o_r) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__rreeaadd__sseerrvviiccee__kkeeyy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_o_i_n_t_e_r _k_e_y_p_r_o_c_a_r_g, - _k_r_b_5___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l, _k_r_b_5___k_v_n_o _v_n_o, _k_r_b_5___e_n_c_t_y_p_e _e_n_c_t_y_p_e, - _k_r_b_5___k_e_y_b_l_o_c_k _*_*_k_e_y) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__rreeggiisstteerr(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _k_r_b_5___k_t___o_p_s _*_o_p_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__rreemmoovvee__eennttrryy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b _i_d, - _k_r_b_5___k_e_y_t_a_b___e_n_t_r_y _*_e_n_t_r_y) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__rreessoollvvee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_n_a_m_e, _k_r_b_5___k_e_y_t_a_b _*_i_d) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kktt__ssttaarrtt__sseeqq__ggeett(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_e_y_t_a_b _i_d, - _k_r_b_5___k_t___c_u_r_s_o_r _*_c_u_r_s_o_r) - -DDEESSCCRRIIPPTTIIOONN - A keytab name is on the form type:residual. The residual part is specific - to each keytab-type. - - When a keytab-name is resolved, the type is matched with an internal list - of keytab types. If there is no matching keytab type, the default keytab - is used. The current default type is ffiillee. The default value can be - changed in the configuration file _/_e_t_c_/_k_r_b_5_._c_o_n_f by setting the variable - [defaults]default_keytab_name. - - The keytab types that are implemented in Heimdal are: - - ffiillee store the keytab in a file, the type's name is KEYFILE. The - residual part is a filename. - - kkeeyyffiillee - store the keytab in a AFS keyfile (usually _/_u_s_r_/_a_f_s_/_e_t_c_/_K_e_y_F_i_l_e), - the type's name is AFSKEYFILE. The residual part is a filename. - - kkrrbb44 the keytab is a Kerberos 4 _s_r_v_t_a_b that is on-the-fly converted to - a keytab. The type's name is krb4. The residual part is a file- - name. - - mmeemmoorryy The keytab is stored in a memory segment. This allows sensitive - and/or temporary data not to be stored on disk. The type's name - is MEMORY. There are no residual part, the only pointer back to - the keytab is the _i_d returned by kkrrbb55__kktt__rreessoollvvee(). - - kkrrbb55__kkeeyyttaabb__eennttrryy holds all data for an entry in a keytab file, like - principal name, key-type, key, key-version number, etc. kkrrbb55__kktt__ccuurrssoorr - holds the current position that is used when iterating through a keytab - entry with kkrrbb55__kktt__ssttaarrtt__sseeqq__ggeett(), kkrrbb55__kktt__nneexxtt__eennttrryy(), and - kkrrbb55__kktt__eenndd__sseeqq__ggeett(). - - kkrrbb55__kktt__ooppss contains the different operations that can be done to a - keytab. This structure is normally only used when doing a new keytab-type - implementation. - - kkrrbb55__kktt__rreessoollvvee() is the equivalent of an open(2) on keytab. Resolve the - keytab name in _n_a_m_e into a keytab in _i_d. Returns 0 or an error. The oppo- - site of kkrrbb55__kktt__rreessoollvvee() is kkrrbb55__kktt__cclloossee(). kkrrbb55__kktt__cclloossee() frees all - resources allocated to the keytab. - - kkrrbb55__kktt__ddeeffaauulltt() sets the argument _i_d to the default keytab. Returns 0 - or an error. - - kkrrbb55__kktt__ddeeffaauulltt__nnaammee() copy the name of the default keytab into _n_a_m_e. Re- - turn 0 or KRB5_CONFIG_NOTENUFSPACE if _n_a_m_e_s_i_z_e is too short. - - - kkrrbb55__kktt__aadddd__eennttrryy() Add a new _e_n_t_r_y to the keytab _i_d. KRB5_KT_NOWRITE is - returned if the keytab is a readonly keytab. - - kkrrbb55__kktt__ccoommppaarree() compares the passed in _e_n_t_r_y against _p_r_i_n_c_i_p_a_l, _v_n_o, - and _e_n_c_t_y_p_e. Any of _p_r_i_n_c_i_p_a_l, _v_n_o or _e_n_c_t_y_p_e might be 0 which acts as a - wildcard. Return TRUE if they compare the same, FALSE otherwise. - - kkrrbb55__kktt__ccooppyy__eennttrryy__ccoonntteennttss() copies the contents of _i_n into _o_u_t. Returns - 0 or an error. - - kkrrbb55__kktt__ggeett__nnaammee() retrieves the name of the keytab _k_e_y_t_a_b into _n_a_m_e, - _n_a_m_e_s_i_z_e. Returns 0 or an error. - - kkrrbb55__kktt__ggeett__ttyyppee() retrieves the type of the keytab _k_e_y_t_a_b and store the - prefix/name for type of the keytab into _p_r_e_f_i_x, _p_r_e_f_i_x_s_i_z_e. The prefix - will have the maximum length of KRB5_KT_PREFIX_MAX_LEN (including termi- - nating NUL). Returns 0 or an error. - - kkrrbb55__kktt__ffrreeee__eennttrryy() frees the contents of _e_n_t_r_y. - - kkrrbb55__kktt__ssttaarrtt__sseeqq__ggeett() sets _c_u_r_s_o_r to point at the beginning of _i_d. Re- - turns 0 or an error. - - kkrrbb55__kktt__nneexxtt__eennttrryy() gets the next entry from _i_d pointed to by _c_u_r_s_o_r and - advance the _c_u_r_s_o_r. Returns 0 or an error. - - kkrrbb55__kktt__eenndd__sseeqq__ggeett() releases all resources associated with _c_u_r_s_o_r. - - kkrrbb55__kktt__ggeett__eennttrryy() retrieves the keytab entry for _p_r_i_n_c_i_p_a_l, _k_v_n_o_, - _e_n_c_t_y_p_e into _e_n_t_r_y from the keytab _i_d. Returns 0 or an error. - - kkrrbb55__kktt__rreeaadd__sseerrvviiccee__kkeeyy() reads the key identified by (_p_r_i_n_c_i_p_a_l, _v_n_o, - _e_n_c_t_y_p_e) from the keytab in _k_e_y_p_r_o_c_a_r_g (the default if == NULL) into - _*_k_e_y. Returns 0 or an error. - - kkrrbb55__kktt__rreemmoovvee__eennttrryy() removes the entry _e_n_t_r_y from the keytab _i_d. Re- - turns 0 or an error. - - kkrrbb55__kktt__rreeggiisstteerr() registers a new keytab type _o_p_s. Returns 0 or an er- - ror. - -EEXXAAMMPPLLEE - This is a minimalistic version of kkttuuttiill. - - int - main (int argc, char **argv) - { - krb5_context context; - krb5_keytab keytab; - krb5_kt_cursor cursor; - krb5_keytab_entry entry; - krb5_error_code ret; - char *principal; - - if (krb5_init_context (&context) != 0) - errx(1, "krb5_context"); - - ret = krb5_kt_default (context, &keytab); - if (ret) - krb5_err(context, 1, ret, "krb5_kt_default"); - - ret = krb5_kt_start_seq_get(context, keytab, &cursor); - if (ret) - krb5_err(context, 1, ret, "krb5_kt_start_seq_get"); - while((ret = krb5_kt_next_entry(context, keytab, &entry, &cursor)) == 0){ - krb5_unparse_name_short(context, entry.principal, &principal); - printf("principal: %s\n", principal); - free(principal); - krb5_kt_free_entry(context, &entry); - } - ret = krb5_kt_end_seq_get(context, keytab, &cursor); - if (ret) - krb5_err(context, 1, ret, "krb5_kt_end_seq_get"); - krb5_free_context(context); - return 0; - } - -SSEEEE AALLSSOO - krb5.conf(5), kerberos(8) - - HEIMDAL February 5, 2001 4 diff --git a/kerberosV/src/lib/krb5/krb5_krbhst_init.cat3 b/kerberosV/src/lib/krb5/krb5_krbhst_init.cat3 deleted file mode 100644 index a4f925f53bd..00000000000 --- a/kerberosV/src/lib/krb5/krb5_krbhst_init.cat3 +++ /dev/null @@ -1,104 +0,0 @@ - -KRB5_KRBHST_INIT(3) UNIX Programmer's Manual KRB5_KRBHST_INIT(3) - -NNAAMMEE - kkrrbb55__kkrrbbhhsstt__iinniitt, kkrrbb55__kkrrbbhhsstt__nneexxtt, kkrrbb55__kkrrbbhhsstt__nneexxtt__aass__ssttrriinngg, - kkrrbb55__kkrrbbhhsstt__rreesseett, kkrrbb55__kkrrbbhhsstt__ffrreeee, kkrrbb55__kkrrbbhhsstt__ffoorrmmaatt__ssttrriinngg, - kkrrbb55__kkrrbbhhsstt__ggeett__aaddddrriinnffoo - lookup Kerberos KDC hosts - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kkrrbbhhsstt__iinniitt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_r_e_a_l_m, - _u_n_s_i_g_n_e_d _i_n_t _t_y_p_e, _k_r_b_5___k_r_b_h_s_t___h_a_n_d_l_e _*_h_a_n_d_l_e) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kkrrbbhhsstt__nneexxtt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_r_b_h_s_t___h_a_n_d_l_e _h_a_n_d_l_e, - _k_r_b_5___k_r_b_h_s_t___i_n_f_o _*_*_h_o_s_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kkrrbbhhsstt__nneexxtt__aass__ssttrriinngg(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___k_r_b_h_s_t___h_a_n_d_l_e _h_a_n_d_l_e, _c_h_a_r _*_h_o_s_t_n_a_m_e, _s_i_z_e___t _h_o_s_t_l_e_n) - - _v_o_i_d - kkrrbb55__kkrrbbhhsstt__rreesseett(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_r_b_h_s_t___h_a_n_d_l_e _h_a_n_d_l_e) - - _v_o_i_d - kkrrbb55__kkrrbbhhsstt__ffrreeee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_r_b_h_s_t___h_a_n_d_l_e _h_a_n_d_l_e) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kkrrbbhhsstt__ffoorrmmaatt__ssttrriinngg(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _c_o_n_s_t _k_r_b_5___k_r_b_h_s_t___i_n_f_o _*_h_o_s_t, _c_h_a_r _*_h_o_s_t_n_a_m_e, _s_i_z_e___t _h_o_s_t_l_e_n) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__kkrrbbhhsstt__ggeett__aaddddrriinnffoo(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___k_r_b_h_s_t___i_n_f_o _*_h_o_s_t, - _s_t_r_u_c_t _a_d_d_r_i_n_f_o _*_*_a_i) - -DDEESSCCRRIIPPTTIIOONN - These functions are used to sequence through all Kerberos hosts of a par- - ticular realm and service. The service type can be the KDCs, the adminis- - trative servers, the password changing servers, or the servers for Ker- - beros 4 ticket conversion. - - First a handle to a particular service is obtained by calling - kkrrbb55__kkrrbbhhsstt__iinniitt() with the _r_e_a_l_m of interest and the type of service to - lookup. The _t_y_p_e can be one of: - - KRB5_KRBHST_KDC - KRB5_KRBHST_ADMIN - KRB5_KRBHST_CHANGEPW - KRB5_KRBHST_KRB524 - - The _h_a_n_d_l_e is returned to the caller, and should be passed to the other - functions. - - For each call to kkrrbb55__kkrrbbhhsstt__nneexxtt() information a new host is returned. - The former function returns in _h_o_s_t a pointer to a structure containing - information about the host, such as protocol, hostname, and port: - - typedef struct krb5_krbhst_info { - enum { KRB5_KRBHST_UDP, - KRB5_KRBHST_TCP, - KRB5_KRBHST_HTTP } proto; - unsigned short port; - struct addrinfo *ai; - struct krb5_krbhst_info *next; - char hostname[1]; - } krb5_krbhst_info; - - The related function, kkrrbb55__kkrrbbhhsstt__nneexxtt__aass__ssttrriinngg(), return the same in- - formation as a url-like string. - - When there are no more hosts, these functions return KRB5_KDC_UNREACH. - - To re-iterate over all hosts, call kkrrbb55__kkrrbbhhsstt__rreesseett() and the next call - to kkrrbb55__kkrrbbhhsstt__nneexxtt() will return the first host. - - When done with the handle, kkrrbb55__kkrrbbhhsstt__ffrreeee() should be called. - - To use a _k_r_b_5___k_r_b_h_s_t___i_n_f_o, there are two functions: - kkrrbb55__kkrrbbhhsstt__ffoorrmmaatt__ssttrriinngg() that will return a printable representation - of that struct and kkrrbb55__kkrrbbhhsstt__ggeett__aaddddrriinnffoo() that will return a _s_t_r_u_c_t - _a_d_d_r_i_n_f_o that can then be used for communicating with the server men- - tioned. - -EEXXAAMMPPLLEE - The following code will print the KDCs of the realm ``MY.REALM''. - - krb5_krbhst_handle handle; - char host[MAXHOSTNAMELEN]; - krb5_krbhst_init(context, "MY.REALM", KRB5_KRBHST_KDC, &handle); - while(krb5_krbhst_next_as_string(context, handle, - host, sizeof(host)) == 0) - printf("%s\n", host); - krb5_krbhst_free(context, handle); - -HHIISSTTOORRYY - These functions first appeared in Heimdal 0.3g. - -SSEEEE AALLSSOO - getaddrinfo(3), krb5_get_krbhst(3) - - HEIMDAL June 17, 2001 2 diff --git a/kerberosV/src/lib/krb5/krb5_kuserok.cat3 b/kerberosV/src/lib/krb5/krb5_kuserok.cat3 deleted file mode 100644 index 379acb8fdfd..00000000000 --- a/kerberosV/src/lib/krb5/krb5_kuserok.cat3 +++ /dev/null @@ -1,36 +0,0 @@ - -KRB5_KUSEROK(3) UNIX Programmer's Manual KRB5_KUSEROK(3) - -NNAAMMEE - kkrrbb55__kkuusseerrookk - verifies if a principal can log in as a - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___b_o_o_l_e_a_n - kkrrbb55__kkuusseerrookk(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l, - _c_o_n_s_t _c_h_a_r _*_n_a_m_e) - -DDEESSCCRRIIPPTTIIOONN - This function takes a local user _n_a_m_e and verifies if _p_r_i_n_c_i_p_a_l is al- - lowed to log in as that user. - - First kkrrbb55__kkuusseerrookk check if there is a local account name _u_s_e_r_n_a_m_e_. If - there isn't, kkrrbb55__kkuusseerrookk returns FALSE. - - Then kkrrbb55__kkuusseerrookk checks if principal is the same as user@realm in any of - the default realms. If that is the case, kkrrbb55__kkuusseerrookk returns TRUE. - - After that it reads the file _._k_5_l_o_g_i_n (if it exists) in the users home - directory and checks if _p_r_i_n_c_i_p_a_l is in the file. If it does exists, - TRUE is returned. If neither of the above turns out to be true, is re- - turned. - - The _._k_5_l_o_g_i_n should contain one principal per line. - -SSEEEE AALLSSOO - krb5_get_default_realms(3), krb5_verify_user(3), - krb5_verify_user_lrealm(3), krb5_verify_user_opt(3,) krb5.conf(5) - - HEIMDAL Oct 17, 2002 1 diff --git a/kerberosV/src/lib/krb5/krb5_openlog.cat3 b/kerberosV/src/lib/krb5/krb5_openlog.cat3 deleted file mode 100644 index 47177bafb45..00000000000 --- a/kerberosV/src/lib/krb5/krb5_openlog.cat3 +++ /dev/null @@ -1,156 +0,0 @@ - -KRB5_OPENLOG(3) UNIX Programmer's Manual KRB5_OPENLOG(3) - -NNAAMMEE - kkrrbb55__iinniittlloogg, kkrrbb55__ooppeennlloogg, kkrrbb55__cclloosseelloogg, kkrrbb55__aaddddlloogg__ddeesstt, - kkrrbb55__aaddddlloogg__ffuunncc, kkrrbb55__lloogg, kkrrbb55__vvlloogg, kkrrbb55__lloogg__mmssgg, kkrrbb55__vvlloogg__mmssgg - - Heimdal logging functions - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _t_y_p_e_d_e_f _v_o_i_d - (**kkrrbb55__lloogg__lloogg__ffuunncc__tt)(_c_o_n_s_t _c_h_a_r _*_t_i_m_e, _c_o_n_s_t _c_h_a_r _*_m_e_s_s_a_g_e, _v_o_i_d _*_d_a_t_a) - - _t_y_p_e_d_e_f _v_o_i_d - (**kkrrbb55__lloogg__cclloossee__ffuunncc__tt)(_v_o_i_d _*_d_a_t_a) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aaddddlloogg__ddeesstt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___l_o_g___f_a_c_i_l_i_t_y _*_f_a_c_i_l_i_t_y, - _c_o_n_s_t _c_h_a_r _*_d_e_s_t_i_n_a_t_i_o_n) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__aaddddlloogg__ffuunncc(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___l_o_g___f_a_c_i_l_i_t_y _*_f_a_c_i_l_i_t_y, - _i_n_t _m_i_n, _i_n_t _m_a_x, _k_r_b_5___l_o_g___l_o_g___f_u_n_c___t _l_o_g, - _k_r_b_5___l_o_g___c_l_o_s_e___f_u_n_c___t _c_l_o_s_e, _v_o_i_d _*_d_a_t_a) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cclloosseelloogg(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___l_o_g___f_a_c_i_l_i_t_y _*_f_a_c_i_l_i_t_y) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__iinniittlloogg(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_p_r_o_g_r_a_m, - _k_r_b_5___l_o_g___f_a_c_i_l_i_t_y _*_*_f_a_c_i_l_i_t_y) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__lloogg(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___l_o_g___f_a_c_i_l_i_t_y _*_f_a_c_i_l_i_t_y, _i_n_t _l_e_v_e_l, - _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, _._._.) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__lloogg__mmssgg(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___l_o_g___f_a_c_i_l_i_t_y _*_f_a_c_i_l_i_t_y, - _c_h_a_r _*_*_r_e_p_l_y, _i_n_t _l_e_v_e_l, _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, _._._.) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ooppeennlloogg(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_p_r_o_g_r_a_m, - _k_r_b_5___l_o_g___f_a_c_i_l_i_t_y _*_*_f_a_c_i_l_i_t_y) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__vvlloogg(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___l_o_g___f_a_c_i_l_i_t_y _*_f_a_c_i_l_i_t_y, _i_n_t _l_e_v_e_l, - _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, _v_a___l_i_s_t _a_r_g_l_i_s_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__vvlloogg__mmssgg(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___l_o_g___f_a_c_i_l_i_t_y _*_f_a_c_i_l_i_t_y, - _c_h_a_r _*_*_r_e_p_l_y, _i_n_t _l_e_v_e_l, _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, _v_a___l_i_s_t _a_r_g_l_i_s_t) - -DDEESSCCRRIIPPTTIIOONN - These functions logs messages to one or more destinations. - - The kkrrbb55__ooppeennlloogg() function creates a logging _f_a_c_i_l_i_t_y, that is used to - log messages. A facility consists of one or more destinations (which can - be files or syslog or some other device). The _p_r_o_g_r_a_m parameter should be - the generic name of the program that is doing the logging. This name is - used to lookup which destinations to use. This information is contained - in the logging section of the _k_r_b_5_._c_o_n_f configuration file. If no entry - is found for _p_r_o_g_r_a_m, the entry for default is used, or if that is miss- - ing too, SYSLOG will be used as destination. - - To close a logging facility, use the kkrrbb55__cclloosseelloogg() function. - - To log a message to a facility use one of the functions kkrrbb55__lloogg(), - kkrrbb55__lloogg__mmssgg(), kkrrbb55__vvlloogg(), or kkrrbb55__vvlloogg__mmssgg(). The functions ending in - _msg return in _r_e_p_l_y a pointer to the message that just got logged. This - string is allocated, and should be freed with ffrreeee(). The _f_o_r_m_a_t is a - standard pprriinnttff() style format string (but see the BUGS section). - - If you want better control of where things gets logged, you can instead - of using kkrrbb55__ooppeennlloogg() call kkrrbb55__iinniittlloogg(), which just initializes a fa- - cility, but doesn't define any actual logging destinations. You can then - add destinations with the kkrrbb55__aaddddlloogg__ddeesstt() and kkrrbb55__aaddddlloogg__ffuunncc() func- - tions. The first of these takes a string specifying a logging destina- - tion, and adds this to the facility. If you want to do some non-standard - logging you can use the kkrrbb55__aaddddlloogg__ffuunncc() function, which takes a func- - tion to use when logging. The _l_o_g function is called for each message - with _t_i_m_e being a string specifying the current time, and _m_e_s_s_a_g_e the - message to log. _c_l_o_s_e is called when the facility is closed. You can - pass application specific data in the _d_a_t_a parameter. The _m_i_n and _m_a_x pa- - rameter are the same as in a destination (defined below). To specify a - max of infinity, pass -1. - - kkrrbb55__ooppeennlloogg() calls kkrrbb55__iinniittlloogg() and then calls kkrrbb55__aaddddlloogg__ddeesstt() for - each destination found. - - DDeessttiinnaattiioonnss - The defined destinations (as specified in _k_r_b_5_._c_o_n_f) follows: - - STDERR - This logs to the program's stderr. - - FILE:_/_f_i_l_e - - FILE=_/_f_i_l_e - Log to the specified file. The form using a colon appends to - the file, the form with an equal truncates the file. The trun- - cating form keeps the file open, while the appending form - closes it after each log message (which makes it possible to - rotate logs). The truncating form is mainly for compatibility - with the MIT libkrb5. - - DEVICE=_/_d_e_v_i_c_e - This logs to the specified device, at present this is the same - as FILE:/device. - - CONSOLE - Log to the console, this is the same as DEVICE=/dev/console. - - SYSLOG[:priority[:facility]] - Send messages to the syslog system, using priority, and facil- - ity. To get the name for one of these, you take the name of - the macro passed to syslog(3), and remove the leading LOG_ - (LOG_NOTICE becomes NOTICE). The default values (as well as - the values used for unrecognised values), are ERR, and AUTH, - respectively. See syslog(3) for a list of priorities and fa- - cilities. - - Each destination may optionally be prepended with a range of logging lev- - els, specified as min-max/. If the _l_e_v_e_l parameter to kkrrbb55__lloogg() is with- - in this range (inclusive) the message gets logged to this destination, - otherwise not. Either of the min and max valued may be omitted, in this - case min is assumed to be zero, and max is assumed to be infinity. If - you don't include a dash, both min and max gets set to the specified val- - ue. If no range is specified, all messages gets logged. - -EEXXAAMMPPLLEE - [logging] - kdc = 0/FILE:/var/log/kdc.log - kdc = 1-/SYSLOG:INFO:USER - default = STDERR - - This will log all messages from the kkddcc program with level 0 to - _/_v_a_r_/_l_o_g_/_k_d_c_._l_o_g, other messages will be logged to syslog with priority - LOG_INFO, and facility LOG_USER. All other programs will log all messages - to their stderr. - -BBUUGGSS - These functions use aasspprriinnttff() to format the message. If your operating - system does not have a working aasspprriinnttff(), a replacement will be used. At - present this replacement does not handle some correct conversion specifi- - cations (like floating point numbers). Until this is fixed, the use of - these conversions should be avoided. - - If logging is done to the syslog facility, these functions might not be - thread-safe, depending on the implementation of ooppeennlloogg(), and ssyysslloogg(). - -SSEEEE AALLSSOO - syslog(3), krb5.conf(5) - - HEIMDAL August 6, 1997 3 diff --git a/kerberosV/src/lib/krb5/krb5_parse_name.cat3 b/kerberosV/src/lib/krb5/krb5_parse_name.cat3 deleted file mode 100644 index 73c72a1d54a..00000000000 --- a/kerberosV/src/lib/krb5/krb5_parse_name.cat3 +++ /dev/null @@ -1,30 +0,0 @@ - -KRB5_PARSE_NAME(3) UNIX Programmer's Manual KRB5_PARSE_NAME(3) - -NNAAMMEE - kkrrbb55__ppaarrssee__nnaammee - string to principal conversion - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ppaarrssee__nnaammee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_n_a_m_e, - _k_r_b_5___p_r_i_n_c_i_p_a_l _*_p_r_i_n_c_i_p_a_l) - -DDEESSCCRRIIPPTTIIOONN - kkrrbb55__ppaarrssee__nnaammee() converts a string representation of a principal name to - kkrrbb55__pprriinncciippaall. The _p_r_i_n_c_i_p_a_l will point to allocated data that should be - freed with kkrrbb55__ffrreeee__pprriinncciippaall(). - - The string should consist of one or more name components separated with - slashes (``/''), optionally followed with an ``@'' and a realm name. A - slash or @ may be contained in a name component by quoting it with a - back-slash (`` .'') A realm should not contain slashes or colons. - -SSEEEE AALLSSOO - krb5_425_conv_principal(3), krb5_build_principal(3), - krb5_free_principal(3), krb5_sname_to_principal(3), krb5_un- - parse_name(3) - - HEIMDAL August 8, 1997 1 diff --git a/kerberosV/src/lib/krb5/krb5_principal_get_realm.cat3 b/kerberosV/src/lib/krb5/krb5_principal_get_realm.cat3 deleted file mode 100644 index 27cb8b45425..00000000000 --- a/kerberosV/src/lib/krb5/krb5_principal_get_realm.cat3 +++ /dev/null @@ -1,42 +0,0 @@ - -KRB5_PRINCIPAL_GET_REALM(3)UNIX Programmer's ManualKRB5_PRINCIPAL_GET_REALM(3) - -NNAAMMEE - kkrrbb55__pprriinncciippaall__ggeett__rreeaallmm, kkrrbb55__pprriinncciippaall__ggeett__ccoommpp__ssttrriinngg - decompose a - principal - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _c_o_n_s_t _c_h_a_r _* - kkrrbb55__pprriinncciippaall__ggeett__rreeaallmm(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l) - - _c_o_n_s_t _c_h_a_r _* - kkrrbb55__pprriinncciippaall__ggeett__ccoommpp__ssttrriinngg(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, - _k_r_b_5___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l, _u_n_s_i_g_n_e_d _i_n_t _c_o_m_p_o_n_e_n_t) - -DDEESSCCRRIIPPTTIIOONN - These functions return parts of the _p_r_i_n_c_i_p_a_l, either the realm or a spe- - cific component. The returned string points to data inside the principal, - so they are valid only as long as the principal exists. - - The _c_o_m_p_o_n_e_n_t argument to kkrrbb55__pprriinncciippaall__ggeett__ccoommpp__ssttrriinngg() is the compo- - nent number to return, from zero to the total number of components minus - one. If a the requested component number is out of range, NULL is re- - turned. - - These functions can be seen as a replacement for the kkrrbb55__pprriinncc__rreeaallmm(), - kkrrbb55__pprriinncc__ccoommppoonneenntt() and related macros, described as intermal in the - MIT API specification. A difference is that these functions return - strings, not krb5_data. A reason to return krb5_data was that it was be- - lieved that principal components could contain binary data, but this be- - lief was unfounded, and it has been decided that principal components are - infact UTF8, so it's safe to use zero terminated strings. - - It's generally not necessary to look at the components of a principal. - -SSEEEE AALLSSOO - krb5_unparse_name(3) - - HEIMDAL June 20, 2001 1 diff --git a/kerberosV/src/lib/krb5/krb5_set_default_realm.cat3 b/kerberosV/src/lib/krb5/krb5_set_default_realm.cat3 deleted file mode 100644 index 539e65c3e13..00000000000 --- a/kerberosV/src/lib/krb5/krb5_set_default_realm.cat3 +++ /dev/null @@ -1,61 +0,0 @@ - -KRB5_SET_DEFAULT_REALM(3) UNIX Programmer's Manual KRB5_SET_DEFAULT_REALM(3) - -NNAAMMEE - kkrrbb55__ffrreeee__hhoosstt__rreeaallmm kkrrbb55__ggeett__ddeeffaauulltt__rreeaallmm kkrrbb55__ggeett__ddeeffaauulltt__rreeaallmmss - kkrrbb55__ggeett__hhoosstt__rreeaallmm kkrrbb55__sseett__ddeeffaauulltt__rreeaallmm - default and host realm read - and manipulation routines - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ffrreeee__hhoosstt__rreeaallmm(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___r_e_a_l_m _*_r_e_a_l_m_l_i_s_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ggeett__ddeeffaauulltt__rreeaallmm(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___r_e_a_l_m _*_r_e_a_l_m) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ggeett__ddeeffaauulltt__rreeaallmmss(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___r_e_a_l_m _*_*_r_e_a_l_m) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ggeett__hhoosstt__rreeaallmm(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_h_o_s_t, - _k_r_b_5___r_e_a_l_m _*_*_r_e_a_l_m_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__sseett__ddeeffaauulltt__rreeaallmm(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_r_e_a_l_m) - -DDEESSCCRRIIPPTTIIOONN - kkrrbb55__ffrreeee__hhoosstt__rreeaallmm() frees all memory allocated by _r_e_a_l_m_l_i_s_t. - - kkrrbb55__ggeett__ddeeffaauulltt__rreeaallmm() returns the first default realm for this host. - The realm returned should be free with ffrreeee(). - - kkrrbb55__ggeett__ddeeffaauulltt__rreeaallmmss() returns a NULL terminated list of default - realms for this context. Realms returned by kkrrbb55__ggeett__ddeeffaauulltt__rreeaallmmss() - should be free with kkrrbb55__ffrreeee__hhoosstt__rreeaallmm(). - - kkrrbb55__ggeett__hhoosstt__rreeaallmm() returns a NULL terminated list of realms for _h_o_s_t - by looking up the information in the [domain_realm] in _k_r_b_5_._c_o_n_f or in - DNS. If the mapping in [domain_realm] results in the string dns_locate, - DNS is used to lookup the realm. - - When using DNS to a resolve the domain for the host a.b.c, - kkrrbb55__ggeett__hhoosstt__rreeaallmm() looks for a TXT resource record named - _kerberos.a.b.c, and if not found, it strips off the first component and - tries a again (_kerberos.b.c) until it reaches the root. - - If there is no configuration or DNS information found, - kkrrbb55__ggeett__hhoosstt__rreeaallmm() assumes it can use the domain part of the _h_o_s_t to - form a realm. - - kkrrbb55__sseett__ddeeffaauulltt__rreeaallmm() sets the default realm for the _c_o_n_t_e_x_t. If NULL - is used as a _r_e_a_l_m, the [libdefaults]default_realm stanza in _k_r_b_5_._c_o_n_f is - used. If there is no such stanza in the configuration file, the - kkrrbb55__ggeett__hhoosstt__rreeaallmm() function is used to form a default realm. - -SSEEEE AALLSSOO - krb5.conf(5), free(3) - - HEIMDAL Mar 16, 2003 1 diff --git a/kerberosV/src/lib/krb5/krb5_set_password.cat3 b/kerberosV/src/lib/krb5/krb5_set_password.cat3 deleted file mode 100644 index 5c1189674f4..00000000000 --- a/kerberosV/src/lib/krb5/krb5_set_password.cat3 +++ /dev/null @@ -1,46 +0,0 @@ - -KRB5_SET_PASSWORD(3) UNIX Programmer's Manual KRB5_SET_PASSWORD(3) - -NNAAMMEE - kkrrbb55__cchhaannggee__ppaasssswwoorrdd, kkrrbb55__sseett__ppaasssswwoorrdd, kkrrbb55__sseett__ppaasssswwoorrdd__uussiinngg__ccccaacchhee - - change password functions - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__cchhaannggee__ppaasssswwoorrdd(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_r_e_d_s _*_c_r_e_d_s, - _c_h_a_r _*_n_e_w_p_w, _i_n_t _*_r_e_s_u_l_t___c_o_d_e, _k_r_b_5___d_a_t_a _*_r_e_s_u_l_t___c_o_d_e___s_t_r_i_n_g, - _k_r_b_5___d_a_t_a _*_r_e_s_u_l_t___s_t_r_i_n_g) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__sseett__ppaasssswwoorrdd(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_r_e_d_s _*_c_r_e_d_s, - _c_h_a_r _*_n_e_w_p_w,_k_r_b_5___p_r_i_n_c_i_p_a_l _t_a_r_g_p_r_i_n_c, _,, _i_n_t _*_r_e_s_u_l_t___c_o_d_e, - _k_r_b_5___d_a_t_a _*_r_e_s_u_l_t___c_o_d_e___s_t_r_i_n_g, _k_r_b_5___d_a_t_a _*_r_e_s_u_l_t___s_t_r_i_n_g) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__sseett__ppaasssswwoorrdd__uussiinngg__ccccaacchhee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___c_c_a_c_h_e _c_c_a_c_h_e, - _c_h_a_r _*_n_e_w_p_w, _k_r_b_5___p_r_i_n_c_i_p_a_l _t_a_r_g_p_r_i_n_c, _i_n_t _*_r_e_s_u_l_t___c_o_d_e, - _k_r_b_5___d_a_t_a _*_r_e_s_u_l_t___c_o_d_e___s_t_r_i_n_g, _k_r_b_5___d_a_t_a _*_r_e_s_u_l_t___s_t_r_i_n_g) - -DDEESSCCRRIIPPTTIIOONN - These functions change the password for a given principal. - - kkrrbb55__sseett__ppaasssswwoorrdd() and _k_r_b_5___s_e_t___p_a_s_s_w_o_r_d___u_s_i_n_g___c_c_a_c_h_e is the newer two - of the three functions and uses a newer version of the protocol (and - falls back to the older when the newer doesn't work). - - kkrrbb55__cchhaannggee__ppaasssswwoorrdd() set the password _n_e_w_p_a_s_s_w_d for the client princi- - pal in _c_r_e_d_s. The server principal of creds must be kadmin/changepw. - - kkrrbb55__sseett__ppaasssswwoorrdd() changes the password for the principal _t_a_r_g_p_r_i_n_c, if - _t_a_r_g_p_r_i_n_c is NULL the default principal in _c_c_a_c_h_e is used. - - Both functions returns and error in _r_e_s_u_l_t___c_o_d_e and maybe an error - strings to print in _r_e_s_u_l_t___s_t_r_i_n_g. - -SSEEEE AALLSSOO - krb5_ccache(3), krb5_init_context(3) - - HEIMDAL June 2, 2004 1 diff --git a/kerberosV/src/lib/krb5/krb5_sname_to_principal.cat3 b/kerberosV/src/lib/krb5/krb5_sname_to_principal.cat3 deleted file mode 100644 index 25e0cde33b8..00000000000 --- a/kerberosV/src/lib/krb5/krb5_sname_to_principal.cat3 +++ /dev/null @@ -1,36 +0,0 @@ - -KRB5_PRINCIPAL(3) UNIX Programmer's Manual KRB5_PRINCIPAL(3) - -NNAAMMEE - kkrrbb55__ssnnaammee__ttoo__pprriinncciippaall, kkrrbb55__ssoocckk__ttoo__pprriinncciippaall - create a service prin- - cipal - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ssnnaammee__ttoo__pprriinncciippaall(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_h_o_s_t_n_a_m_e, - _c_o_n_s_t _c_h_a_r _*_s_n_a_m_e, _i_n_t_3_2___t _t_y_p_e, _k_r_b_5___p_r_i_n_c_i_p_a_l _*_p_r_i_n_c_i_p_a_l) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ssoocckk__ttoo__pprriinncciippaall(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _i_n_t _s_o_c_k_e_t, - _c_o_n_s_t _c_h_a_r _*_s_n_a_m_e, _i_n_t_3_2___t _t_y_p_e, _k_r_b_5___p_r_i_n_c_i_p_a_l _*_p_r_i_n_c_i_p_a_l) - -DDEESSCCRRIIPPTTIIOONN - These functions create a ``service'' principal that can, for instance, be - used to lookup a key in a keytab. For both these function the _s_n_a_m_e pa- - rameter will be used for the first component of the created principal. If - _s_n_a_m_e is NULL, ``host'' will be used instead. kkrrbb55__ssnnaammee__ttoo__pprriinncciippaall() - will use the passed _h_o_s_t_n_a_m_e for the second component. If type - KRB5_NT_SRV_HST this name will be looked up with ggeetthhoossttbbyynnaammee(). If - _h_o_s_t_n_a_m_e _i_s NULL, the local hostname will be used. - - kkrrbb55__ssoocckk__ttoo__pprriinncciippaall() will use the ``sockname'' of the passed _s_o_c_k_e_t, - which should be a bound AF_INET socket. - -SSEEEE AALLSSOO - krb5_425_conv_principal(3), krb5_build_principal(3), - krb5_free_principal(3), krb5_parse_name(3), krb5_unparse_name(3) - - HEIMDAL August 8, 1997 1 diff --git a/kerberosV/src/lib/krb5/krb5_timeofday.cat3 b/kerberosV/src/lib/krb5/krb5_timeofday.cat3 deleted file mode 100644 index fe0a2afe207..00000000000 --- a/kerberosV/src/lib/krb5/krb5_timeofday.cat3 +++ /dev/null @@ -1,25 +0,0 @@ - -KRB5_TIMEOFDAY(3) UNIX Programmer's Manual KRB5_TIMEOFDAY(3) - -NNAAMMEE - kkrrbb55__ttiimmeeooffddaayy, kkrrbb55__uuss__ttiimmeeooffddaayy - whatever these functions do - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__ttiimmeeooffddaayy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___t_i_m_e_s_t_a_m_p _*_t_i_m_e_r_e_t) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__uuss__ttiimmeeooffddaayy(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _i_n_t_3_2___t _*_s_e_c, _i_n_t_3_2___t _*_u_s_e_c) - -DDEESSCCRRIIPPTTIIOONN - kkrrbb55__ttiimmeeooffddaayy() returns the current time, but adjusted with the time - difference between the local host and the KDC. kkrrbb55__uuss__ttiimmeeooffddaayy() also - returns microseconds. - -SSEEEE AALLSSOO - gettimeofday(2) - - July 1, 2001 1 diff --git a/kerberosV/src/lib/krb5/krb5_unparse_name.cat3 b/kerberosV/src/lib/krb5/krb5_unparse_name.cat3 deleted file mode 100644 index 0eb8d76be51..00000000000 --- a/kerberosV/src/lib/krb5/krb5_unparse_name.cat3 +++ /dev/null @@ -1,24 +0,0 @@ - -KRB5_UNPARSE_NAME(3) UNIX Programmer's Manual KRB5_UNPARSE_NAME(3) - -NNAAMMEE - kkrrbb55__uunnppaarrssee__nnaammee - principal to string conversion - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__uunnppaarrssee__nnaammee(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l, - _c_h_a_r _*_*_n_a_m_e) - -DDEESSCCRRIIPPTTIIOONN - This function takes a _p_r_i_n_c_i_p_a_l, and will convert in to a printable rep- - resentation with the same syntax as described in krb5_parse_name(3). - _*_n_a_m_e will point to allocated data and should be freed by the caller. - -SSEEEE AALLSSOO - krb5_425_conv_principal(3), krb5_build_principal(3), - krb5_free_principal(3), krb5_parse_name(3), krb5_sname_to_principal(3) - - HEIMDAL August 8, 1997 1 diff --git a/kerberosV/src/lib/krb5/krb5_verify_user.cat3 b/kerberosV/src/lib/krb5/krb5_verify_user.cat3 deleted file mode 100644 index ef1250ed613..00000000000 --- a/kerberosV/src/lib/krb5/krb5_verify_user.cat3 +++ /dev/null @@ -1,128 +0,0 @@ - -KRB5_VERIFY_USER(3) UNIX Programmer's Manual KRB5_VERIFY_USER(3) - -NNAAMMEE - kkrrbb55__vveerriiffyy__uusseerr, kkrrbb55__vveerriiffyy__uusseerr__llrreeaallmm, kkrrbb55__vveerriiffyy__uusseerr__oopptt, - kkrrbb55__vveerriiffyy__oopptt__iinniitt kkrrbb55__vveerriiffyy__oopptt__sseett__ffllaaggss, - kkrrbb55__vveerriiffyy__oopptt__sseett__sseerrvviiccee, kkrrbb55__vveerriiffyy__oopptt__sseett__sseeccuurree, - kkrrbb55__vveerriiffyy__oopptt__sseett__kkeeyyttaabb - Heimdal password verifying functions. - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__vveerriiffyy__uusseerr(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l, - _k_r_b_5___c_c_a_c_h_e _c_c_a_c_h_e, _c_o_n_s_t _c_h_a_r _*_p_a_s_s_w_o_r_d, _k_r_b_5___b_o_o_l_e_a_n _s_e_c_u_r_e, - _c_o_n_s_t _c_h_a_r _*_s_e_r_v_i_c_e) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__vveerriiffyy__uusseerr__llrreeaallmm(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l, - _k_r_b_5___c_c_a_c_h_e _c_c_a_c_h_e, _c_o_n_s_t _c_h_a_r _*_p_a_s_s_w_o_r_d, _k_r_b_5___b_o_o_l_e_a_n _s_e_c_u_r_e, - _c_o_n_s_t _c_h_a_r _*_s_e_r_v_i_c_e) - - _v_o_i_d - kkrrbb55__vveerriiffyy__oopptt__iinniitt(_k_r_b_5___v_e_r_i_f_y___o_p_t _*_o_p_t) - - _v_o_i_d - kkrrbb55__vveerriiffyy__oopptt__sseett__ccccaacchhee(_k_r_b_5___v_e_r_i_f_y___o_p_t _*_o_p_t, _k_r_b_5___c_c_a_c_h_e _c_c_a_c_h_e) - - _v_o_i_d - kkrrbb55__vveerriiffyy__oopptt__sseett__kkeeyyttaabb(_k_r_b_5___v_e_r_i_f_y___o_p_t _*_o_p_t, _k_r_b_5___k_e_y_t_a_b _k_e_y_t_a_b) - - _v_o_i_d - kkrrbb55__vveerriiffyy__oopptt__sseett__sseeccuurree(_k_r_b_5___v_e_r_i_f_y___o_p_t _*_o_p_t, _k_r_b_5___b_o_o_l_e_a_n _s_e_c_u_r_e) - - _v_o_i_d - kkrrbb55__vveerriiffyy__oopptt__sseett__sseerrvviiccee(_k_r_b_5___v_e_r_i_f_y___o_p_t _*_o_p_t, _c_o_n_s_t _c_h_a_r _*_s_e_r_v_i_c_e) - - _v_o_i_d - kkrrbb55__vveerriiffyy__oopptt__sseett__ffllaaggss(_k_r_b_5___v_e_r_i_f_y___o_p_t _*_o_p_t, _u_n_s_i_g_n_e_d _i_n_t _f_l_a_g_s) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__vveerriiffyy__uusseerr__oopptt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___p_r_i_n_c_i_p_a_l _p_r_i_n_c_i_p_a_l, - _c_o_n_s_t _c_h_a_r _*_p_a_s_s_w_o_r_d, _k_r_b_5___v_e_r_i_f_y___o_p_t _*_o_p_t) - -DDEESSCCRRIIPPTTIIOONN - The kkrrbb55__vveerriiffyy__uusseerr function verifies the password supplied by a user. - The principal whose password will be verified is specified in _p_r_i_n_c_i_p_a_l. - New tickets will be obtained as a side-effect and stored in _c_c_a_c_h_e (if - NULL, the default ccache is used). kkrrbb55__vveerriiffyy__uusseerr() will call - kkrrbb55__cccc__iinniittiiaalliizzee() on the given _c_c_a_c_h_e, so _c_c_a_c_h_e must only initialized - with kkrrbb55__cccc__rreessoollvvee() or kkrrbb55__cccc__ggeenn__nneeww(). If the password is not sup- - plied in _p_a_s_s_w_o_r_d (and is given as NULL) the user will be prompted for - it. If _s_e_c_u_r_e the ticket will be verified against the locally stored - service key _s_e_r_v_i_c_e (by default `host' if given as NULL ). - - The kkrrbb55__vveerriiffyy__uusseerr__llrreeaallmm function does the same, except that it ig- - nores the realm in _p_r_i_n_c_i_p_a_l and tries all the local realms (see - krb5.conf(5)). After a successful return, the principal is set to the - authenticated realm. If the call fails, the principal will not be mean- - ingful, and should only be freed with krb5_free_principal(3). - - kkrrbb55__vveerriiffyy__oopptt__iinniitt() resets all opt to default values. - - - None of the krb5_verify_opt_set function makes a copy of the data struc- - ture that they are called with. Its up the caller to free them after the - kkrrbb55__vveerriiffyy__uusseerr__oopptt() is called. - - kkrrbb55__vveerriiffyy__oopptt__sseett__ccccaacchhee() sets the _c_c_a_c_h_e that user of _o_p_t will use. - If not set, the default credential cache will be used. - - kkrrbb55__vveerriiffyy__oopptt__sseett__kkeeyyttaabb() sets the _k_e_y_t_a_b that user of _o_p_t will use. - If not set, the default keytab will be used. - - kkrrbb55__vveerriiffyy__oopptt__sseett__sseeccuurree() if _s_e_c_u_r_e if true, the password verification - will require that the ticket will be verified against the locally stored - service key. If not set, default value is true. - - kkrrbb55__vveerriiffyy__oopptt__sseett__sseerrvviiccee() sets the _s_e_r_v_i_c_e principal that user of _o_p_t - will use. If not set, the `host' service will be used. - - kkrrbb55__vveerriiffyy__oopptt__sseett__ffllaaggss() sets _f_l_a_g_s that user of _o_p_t will use. If the - flag KRB5_VERIFY_LREALMS is used, the _p_r_i_n_c_i_p_a_l will be modified like - kkrrbb55__vveerriiffyy__uusseerr__llrreeaallmm() modifies it. - - kkrrbb55__vveerriiffyy__uusseerr__oopptt() function verifies the _p_a_s_s_w_o_r_d supplied by a user. - The principal whose password will be verified is specified in _p_r_i_n_c_i_p_a_l. - Options the to the verification process is pass in in _o_p_t. - -EEXXAAMMPPLLEE - Here is a example program that verifies a password. it uses the - `host/`hostname`' service principal in _k_r_b_5_._k_e_y_t_a_b. - - #include <krb5.h> - - int - main(int argc, char **argv) - { - char *user; - krb5_error_code error; - krb5_principal princ; - krb5_context context; - - if (argc != 2) - errx(1, "usage: verify_passwd <principal-name>"); - - user = argv[1]; - - if (krb5_init_context(&context) < 0) - errx(1, "krb5_init_context"); - - if ((error = krb5_parse_name(context, user, &princ)) != 0) - krb5_err(context, 1, error, "krb5_parse_name"); - - error = krb5_verify_user(context, princ, NULL, NULL, TRUE, NULL); - if (error) - krb5_err(context, 1, error, "krb5_verify_user"); - - return 0; - } - -SSEEEE AALLSSOO - krb5_err(3), krb5_cc_gen_new(3), krb5_cc_resolve(3), - krb5_cc_initialize(3), krb5_free_principal(3), krb5_init_context(3), - krb5_kt_default(3), krb5.conf(5) - - HEIMDAL March 25, 2003 2 diff --git a/kerberosV/src/lib/krb5/krb5_warn.cat3 b/kerberosV/src/lib/krb5/krb5_warn.cat3 deleted file mode 100644 index 72777bd8f92..00000000000 --- a/kerberosV/src/lib/krb5/krb5_warn.cat3 +++ /dev/null @@ -1,66 +0,0 @@ - -KRB5_WARN(3) UNIX Programmer's Manual KRB5_WARN(3) - -NNAAMMEE - kkrrbb55__wwaarrnn, kkrrbb55__wwaarrnnxx, kkrrbb55__vvwwaarrnn, kkrrbb55__vvwwaarrnnxx, kkrrbb55__eerrrr, kkrrbb55__eerrrrxx, - kkrrbb55__vveerrrr, kkrrbb55__vveerrrrxx, kkrrbb55__sseett__wwaarrnn__ddeesstt - Heimdal warning and error - functions - -LLIIBBRRAARRYY - Kerberos 5 Library (libkrb5, -lkrb5) - -SSYYNNOOPPSSIISS - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__eerrrr(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _i_n_t _e_v_a_l, _k_r_b_5___e_r_r_o_r___c_o_d_e _c_o_d_e, - _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, _._._.) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__eerrrrxx(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _i_n_t _e_v_a_l, _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, _._._.) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__vveerrrr(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _i_n_t _e_v_a_l, _k_r_b_5___e_r_r_o_r___c_o_d_e _c_o_d_e, - _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, _v_a___l_i_s_t _a_p) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__vveerrrrxx(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _i_n_t _e_v_a_l, _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, - _v_a___l_i_s_t _a_p) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__vvwwaarrnn(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___e_r_r_o_r___c_o_d_e _c_o_d_e, - _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, _v_a___l_i_s_t _a_p) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__vvwwaarrnnxx(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, _v_a___l_i_s_t _a_p) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__wwaarrnn(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___e_r_r_o_r___c_o_d_e _c_o_d_e, _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, - _._._.) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__wwaarrnnxx(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _c_o_n_s_t _c_h_a_r _*_f_o_r_m_a_t, _._._.) - - _k_r_b_5___e_r_r_o_r___c_o_d_e - kkrrbb55__sseett__wwaarrnn__ddeesstt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___l_o_g___f_a_c_i_l_i_t_y _*_f_a_c_i_l_i_t_y) - - _c_h_a_r _* - kkrrbb55__ggeett__eerrrr__tteexxtt(_k_r_b_5___c_o_n_t_e_x_t _c_o_n_t_e_x_t, _k_r_b_5___e_r_r_o_r___c_o_d_e _c_o_d_e) - -DDEESSCCRRIIPPTTIIOONN - These functions prints a warning message to some destination. _f_o_r_m_a_t is - a printf style format specifying the message to print. The forms not end- - ing in an ``x'' prints the error string associated with _c_o_d_e along with - the message. The ``err'' functions exits with exit status _e_v_a_l after - printing the message. - - The kkrrbb55__sseett__wwaarrnn__ffuunncc() function sets the destination for warning mes- - sages to the specified _f_a_c_i_l_i_t_y. Messages logged with the ``warn'' func- - tions have a log level of 1, while the ``err'' functions logs with level - 0. - - kkrrbb55__ggeett__eerrrr__tteexxtt() fetches the human readable strings describing the er- - ror-code. - -SSEEEE AALLSSOO - krb5_openlog(3) - - HEIMDAL August 8, 1997 1 diff --git a/kerberosV/src/lib/krb5/verify_krb5_conf.cat8 b/kerberosV/src/lib/krb5/verify_krb5_conf.cat8 deleted file mode 100644 index b9cbd32c99c..00000000000 --- a/kerberosV/src/lib/krb5/verify_krb5_conf.cat8 +++ /dev/null @@ -1,57 +0,0 @@ - -VERIFY_KRB5_CONF(8) UNIX System Manager's Manual VERIFY_KRB5_CONF(8) - -NNAAMMEE - vveerriiffyy__kkrrbb55__ccoonnff - checks krb5.conf for obvious errors - -SSYYNNOOPPSSIISS - vveerriiffyy__kkrrbb55__ccoonnff _[_c_o_n_f_i_g_-_f_i_l_e_] - -DDEESSCCRRIIPPTTIIOONN - vveerriiffyy__kkrrbb55__ccoonnff reads the configuration file _k_r_b_5_._c_o_n_f, or the file giv- - en on the command line, and parses it, thereby verifying that the syntax - is not correctly wrong. - - If the file is syntactically correct, vveerriiffyy__kkrrbb55__ccoonnff tries to verify - that the contents of the file is of relevant nature. - -DDIIAAGGNNOOSSTTIICCSS - Possible output from vveerriiffyy__kkrrbb55__ccoonnff include: - - <path>: failed to parse <something> as size/time/number/boolean - Usually means that <something> is misspelled, or that it contains - weird characters. The parsing done by vveerriiffyy__kkrrbb55__ccoonnff is more - strict than the one performed by libkrb5, and so strings that - work in real life, might be reported as bad. - - <path>: host not found (<hostname>) - Means that <path> is supposed to point to a host, but it can't be - recognised as one. - - <path>: unknown or wrong type - Means that <path> is either is a string when it should be a list, - vice versa, or just that vveerriiffyy__kkrrbb55__ccoonnff is confused. - - <path>: unknown entry - Means that <string> is not known by . - -EENNVVIIRROONNMMEENNTT - KRB5_CONFIG points to the configuration file to read. - -FFIILLEESS - /etc/krb5.conf Kerberos 5 configuration file - -SSEEEE AALLSSOO - krb5.conf(5) - -BBUUGGSS - Since each application can put almost anything in the config file, it's - hard to come up with a water tight verification process. Most of the de- - fault settings are sanity checked, but this does not mean that every - problem is discovered, or that everything that is reported as a possible - problem actually is one. This tool should thus be used with some care. - - It should warn about obsolete data, or bad practice, but currently - doesn't. - - HEIMDAL August 30, 2001 1 diff --git a/kerberosV/src/lib/roken/getarg.cat3 b/kerberosV/src/lib/roken/getarg.cat3 deleted file mode 100644 index 84611f04401..00000000000 --- a/kerberosV/src/lib/roken/getarg.cat3 +++ /dev/null @@ -1,230 +0,0 @@ - -GETARG(3) UNIX Programmer's Manual GETARG(3) - -NNAAMMEE - ggeettaarrgg, aarrgg__pprriinnttuussaaggee - collect command line options - -SSYYNNOOPPSSIISS - _i_n_t - ggeettaarrgg(_s_t_r_u_c_t _g_e_t_a_r_g_s _*_a_r_g_s, _s_i_z_e___t _n_u_m___a_r_g_s, _i_n_t _a_r_g_c, _c_h_a_r _*_*_a_r_g_v, - _i_n_t _*_o_p_t_i_n_d) - - _v_o_i_d - aarrgg__pprriinnttuussaaggee(_s_t_r_u_c_t _g_e_t_a_r_g_s _*_a_r_g_s, _s_i_z_e___t _n_u_m___a_r_g_s, - _c_o_n_s_t _c_h_a_r _*_p_r_o_g_n_a_m_e, _c_o_n_s_t _c_h_a_r _*_e_x_t_r_a___s_t_r_i_n_g) - -DDEESSCCRRIIPPTTIIOONN - ggeettaarrgg() collects any command line options given to a program in an easi- - ly used way. aarrgg__pprriinnttuussaaggee() pretty-prints the available options, with - a short help text. - - _a_r_g_s is the option specification to use, and it's an array of _s_t_r_u_c_t - _g_e_t_a_r_g_s elements. _n_u_m___a_r_g_s is the size of _a_r_g_s (in elements). _a_r_g_c and - _a_r_g_v are the argument count and argument vector to extract option from. - _o_p_t_i_n_d is a pointer to an integer where the index to the last processed - argument is stored, it must be initialised to the first index (minus one) - to process (normally 0) before the first call. - - _a_r_g___p_r_i_n_t_u_s_a_g_e take the same _a_r_g_s and _n_u_m___a_r_g_s as getarg; _p_r_o_g_n_a_m_e is the - name of the program (to be used in the help text), and _e_x_t_r_a___s_t_r_i_n_g is a - string to print after the actual options to indicate more arguments. The - usefulness of this function is realised only be people who has used pro- - grams that has help strings that doesn't match what the code does. - - The _g_e_t_a_r_g_s struct has the following elements. - - struct getargs{ - const char *long_name; - char short_name; - enum { arg_integer, - arg_string, - arg_flag, - arg_negative_flag, - arg_strings, - arg_double, - arg_collect - } type; - void *value; - const char *help; - const char *arg_help; - }; - - _l_o_n_g___n_a_m_e is the long name of the option, it can be NULL, if you don't - want a long name. _s_h_o_r_t___n_a_m_e is the characted to use as short option, it - can be zero. If the option has a value the _v_a_l_u_e field gets filled in - with that value interpreted as specified by the _t_y_p_e field. _h_e_l_p is a - longer help string for the option as a whole, if it's NULL the help text - for the option is omitted (but it's still displayed in the synopsis). - _a_r_g___h_e_l_p is a description of the argument, if NULL a default value will - be used, depending on the type of the option: - - arg_integer the argument is a signed integer, and _v_a_l_u_e should - point to an _i_n_t. - - _a_r_g___s_t_r_i_n_g the argument is a string, and _v_a_l_u_e should point to a - - _c_h_a_r_*. - - _a_r_g___f_l_a_g the argument is a flag, and _v_a_l_u_e should point to a - _i_n_t. It gets filled in with either zero or one, de- - pending on how the option is given, the normal case - being one. Note that if the option isn't given, the - value isn't altered, so it should be initialised to - some useful default. - - _a_r_g___n_e_g_a_t_i_v_e___f_l_a_g this is the same as _a_r_g___f_l_a_g but it reverses the mean- - ing of the flag (a given short option clears the - flag), and the synopsis of a long option is negated. - - _a_r_g___s_t_r_i_n_g_s the argument can be given multiple times, and the val- - ues are collected in an array; _v_a_l_u_e should be a - pointer to a _s_t_r_u_c_t _g_e_t_a_r_g___s_t_r_i_n_g_s structure, which - holds a length and a string pointer. - - _a_r_g___d_o_u_b_l_e argument is a double precision floating point value, - and _v_a_l_u_e should point to a _d_o_u_b_l_e. - - _a_r_g___c_o_l_l_e_c_t allows more fine-grained control of the option parsing - process. _v_a_l_u_e should be a pointer to a - _g_e_t_a_r_g___c_o_l_l_e_c_t___i_n_f_o structure: - - typedef int (*getarg_collect_func)(int short_opt, - int argc, - char **argv, - int *optind, - int *optarg, - void *data); - - typedef struct getarg_collect_info { - getarg_collect_func func; - void *data; - } getarg_collect_info; - - With the _f_u_n_c member set to a function to call, and - _d_a_t_a to some application specific data. The parameters - to the collect function are: - - _s_h_o_r_t___f_l_a_g non-zero if this call is via a short option - flag, zero otherwise - - _a_r_g_c, _a_r_g_v the whole argument list - - _o_p_t_i_n_d pointer to the index in argv where the flag is - - _o_p_t_a_r_g pointer to the index in argv[*optind] where the - flag name starts - - _d_a_t_a application specific data - - You can modify _*_o_p_t_i_n_d, and _*_o_p_t_a_r_g, but to do this - correct you (more or less) have to know about the in- - ner workings of getarg. - - You can skip parts of arguments by increasing _*_o_p_t_a_r_g - (you could implement the --zz_3 set of flags from ggzziipp - with this), or whole argument strings by increasing - _*_o_p_t_i_n_d (let's say you want a flag --cc _x _y _z to specify - a coordinate); if you also have to set _*_o_p_t_a_r_g to a - sane value. - - The collect function should return one of - ARG_ERR_NO_MATCH, ARG_ERR_BAD_ARG, ARG_ERR_NO_ARG on - error, zero otherwise. - - For your convenience there is a function, - ggeettaarrgg__ooppttaarrgg(), that returns the traditional argument - string, and you pass it all arguments, sans data, that - where given to the collection function. - - Don't use this more this unless you absolutely have - to. - - Option parsing is similar to what getopt uses. Short options without ar- - guments can be compressed (--xxyyzz is the same as --xx --yy --zz), and short op- - tions with arguments take these as either the rest of the argv-string or - as the next option (--oo_f_o_o, or --oo _f_o_o). - - Long option names are prefixed with -- (double dash), and the value with - a = (equal), ----ffoooo==_b_a_r. Long option flags can either be specified as they - are (----hheellpp), or with an (boolean parsable) option (----hheellpp==_y_e_s, - ----hheellpp==_t_r_u_e, or similar), or they can also be negated (----nnoo--hheellpp is the - same as ----hheellpp==no), and if you're really confused you can do it multiple - times (----nnoo--nnoo--hheellpp==_f_a_l_s_e, or even ----nnoo--nnoo--hheellpp==_m_a_y_b_e). - -EEXXAAMMPPLLEE - #include <stdio.h> - #include <string.h> - #include <getarg.h> - - char *source = "Ouagadougou"; - char *destination; - int weight; - int include_catalog = 1; - int help_flag; - - struct getargs args[] = { - { "source", 's', arg_string, &source, - "source of shippment", "city" }, - { "destination", 'd', arg_string, &destination, - "destination of shippment", "city" }, - { "weight", 'w', arg_integer, &weight, - "weight of shippment", "tons" }, - { "catalog", 'c', arg_negative_flag, &include_catalog, - "include product catalog" }, - { "help", 'h', arg_flag, &help_flag } - }; - - int num_args = sizeof(args) / sizeof(args[0]); /* number of elements in args */ - - const char *progname = "ship++"; - - int - main(int argc, char **argv) - { - int optind = 0; - if (getarg(args, num_args, argc, argv, &optind)) { - arg_printusage(args, num_args, progname, "stuff..."); - exit (1); - } - if (help_flag) { - arg_printusage(args, num_args, progname, "stuff..."); - exit (0); - } - if (destination == NULL) { - fprintf(stderr, "%s: must specify destination\n", progname); - exit(1); - } - if (strcmp(source, destination) == 0) { - fprintf(stderr, "%s: destination must be different from source\n"); - exit(1); - } - /* include more stuff here ... */ - exit(2); - } - - The output help output from this program looks like this: - - $ ship++ --help - Usage: ship++ [--source=city] [-s city] [--destination=city] [-d city] - [--weight=tons] [-w tons] [--no-catalog] [-c] [--help] [-h] stuff... - -s city, --source=city source of shippment - -d city, --destination=city destination of shippment - -w tons, --weight=tons weight of shippment - -c, --no-catalog include product catalog - -BBUUGGSS - It should be more flexible, so it would be possible to use other more - complicated option syntaxes, such as what ps(1), and tar(1), uses, or - the AFS model where you can skip the flag names as long as the options - come in the correct order. - - Options with multiple arguments should be handled better. - - Should be integreated with SL. - - It's very confusing that the struct you pass in is called getargS. - -SSEEEE AALLSSOO - getopt(3) - - ROKEN September 24, 1999 4 |