diff options
Diffstat (limited to 'crypto/krb5/doc/html/_sources/appdev/refs')
49 files changed, 263 insertions, 93 deletions
diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/index.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/index.rst.txt index d12be47c3ce1..648dc2ed9933 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/index.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/index.rst.txt @@ -25,6 +25,7 @@ Frequently used public interfaces krb5_change_password.rst krb5_chpw_message.rst krb5_expand_hostname.rst + krb5_free_config_files.rst krb5_free_context.rst krb5_free_error_message.rst krb5_free_principal.rst @@ -33,6 +34,7 @@ Frequently used public interfaces krb5_get_error_message.rst krb5_get_host_realm.rst krb5_get_credentials.rst + krb5_get_default_config_files.rst krb5_get_fallback_host_realm.rst krb5_get_init_creds_keytab.rst krb5_get_init_creds_opt_alloc.rst diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_principal.rst.txt index 0b715e119a0d..658eb36e5a6e 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_principal.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_principal.rst.txt @@ -39,7 +39,7 @@ This function returns constant storage that must not be freed. .. .. seealso:: - #KRB5_ANONYMOUS_PRINCSTR + KRB5_ANONYMOUS_PRINCSTR diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_realm.rst.txt index ec3cc4e3108e..f2d1b5f5540f 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_realm.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_realm.rst.txt @@ -39,7 +39,7 @@ This function returns constant storage that must not be freed. .. .. seealso:: - #KRB5_ANONYMOUS_REALMSTR + KRB5_ANONYMOUS_REALMSTR diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_genaddrs.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_genaddrs.rst.txt index f61c23185316..d84399972211 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_genaddrs.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_genaddrs.rst.txt @@ -40,16 +40,16 @@ This function sets the local and/or remote addresses in *auth_context* based on - - #KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR Generate local address. + - KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR Generate local address. - - #KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR Generate remote address. + - KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR Generate remote address. - - #KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR Generate local address and port. + - KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR Generate local address and port. - - #KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR Generate remote address and port. + - KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR Generate remote address and port. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getflags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getflags.rst.txt index db9020e2d30b..e7a9fbc1b9cf 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getflags.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getflags.rst.txt @@ -34,16 +34,16 @@ krb5_auth_con_getflags - Retrieve flags from a krb5_auth_context structure. Valid values for *flags* are: - - #KRB5_AUTH_CONTEXT_DO_TIME Use timestamps + - KRB5_AUTH_CONTEXT_DO_TIME Use timestamps - - #KRB5_AUTH_CONTEXT_RET_TIME Save timestamps + - KRB5_AUTH_CONTEXT_RET_TIME Save timestamps - - #KRB5_AUTH_CONTEXT_DO_SEQUENCE Use sequence numbers + - KRB5_AUTH_CONTEXT_DO_SEQUENCE Use sequence numbers - - #KRB5_AUTH_CONTEXT_RET_SEQUENCE Save sequence numbers + - KRB5_AUTH_CONTEXT_RET_SEQUENCE Save sequence numbers diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getlocalseqnumber.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getlocalseqnumber.rst.txt index 0b340a3fb521..957f89755033 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getlocalseqnumber.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getlocalseqnumber.rst.txt @@ -32,7 +32,7 @@ krb5_auth_con_getlocalseqnumber - Retrieve the local sequence number from an au -Retrieve the local sequence number from *auth_context* and return it in *seqnumber* . The #KRB5_AUTH_CONTEXT_DO_SEQUENCE flag must be set in *auth_context* for this function to be useful. +Retrieve the local sequence number from *auth_context* and return it in *seqnumber* . The KRB5_AUTH_CONTEXT_DO_SEQUENCE flag must be set in *auth_context* for this function to be useful. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getremoteseqnumber.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getremoteseqnumber.rst.txt index 8f2a7ffdb486..61bcef6583b3 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getremoteseqnumber.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getremoteseqnumber.rst.txt @@ -32,7 +32,7 @@ krb5_auth_con_getremoteseqnumber - Retrieve the remote sequence number from an -Retrieve the remote sequence number from *auth_context* and return it in *seqnumber* . The #KRB5_AUTH_CONTEXT_DO_SEQUENCE flag must be set in *auth_context* for this function to be useful. +Retrieve the remote sequence number from *auth_context* and return it in *seqnumber* . The KRB5_AUTH_CONTEXT_DO_SEQUENCE flag must be set in *auth_context* for this function to be useful. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_init.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_init.rst.txt index 9f61f30be4e6..58bec34929f6 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_init.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_init.rst.txt @@ -34,7 +34,7 @@ This function creates an authentication context to hold configuration and state -By default, flags for the context are set to enable the use of the replay cache (#KRB5_AUTH_CONTEXT_DO_TIME), but not sequence numbers. Use krb5_auth_con_setflags() to change the flags. +By default, flags for the context are set to enable the use of the replay cache (KRB5_AUTH_CONTEXT_DO_TIME), but not sequence numbers. Use krb5_auth_con_setflags() to change the flags. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setflags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setflags.rst.txt index d8cb6e71c5d0..e376185e987b 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setflags.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setflags.rst.txt @@ -34,16 +34,16 @@ krb5_auth_con_setflags - Set a flags field in a krb5_auth_context structure. Valid values for *flags* are: - - #KRB5_AUTH_CONTEXT_DO_TIME Use timestamps + - KRB5_AUTH_CONTEXT_DO_TIME Use timestamps - - #KRB5_AUTH_CONTEXT_RET_TIME Save timestamps + - KRB5_AUTH_CONTEXT_RET_TIME Save timestamps - - #KRB5_AUTH_CONTEXT_DO_SEQUENCE Use sequence numbers + - KRB5_AUTH_CONTEXT_DO_SEQUENCE Use sequence numbers - - #KRB5_AUTH_CONTEXT_RET_SEQUENCE Save sequence numbers + - KRB5_AUTH_CONTEXT_RET_SEQUENCE Save sequence numbers diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_crypto_length_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_crypto_length_iov.rst.txt index cb4d18d1db0e..238d04e9ca55 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_crypto_length_iov.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_crypto_length_iov.rst.txt @@ -34,7 +34,7 @@ krb5_c_crypto_length_iov - Fill in lengths for header, trailer and padding in a -Padding is set to the actual padding required based on the provided *data* buffers. Typically this API is used after setting up the data buffers and #KRB5_CRYPTO_TYPE_SIGN_ONLY buffers, but before actually allocating header, trailer and padding. +Padding is set to the actual padding required based on the provided *data* buffers. Typically this API is used after setting up the data buffers and KRB5_CRYPTO_TYPE_SIGN_ONLY buffers, but before actually allocating header, trailer and padding. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt.rst.txt index b67a8db61b24..d3a12af8df76 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt.rst.txt @@ -38,7 +38,7 @@ krb5_c_encrypt - Encrypt data using a key (operates on keyblock). -This function encrypts the data block *input* and stores the outputinto *output* . The actual encryption key will be derived from *key* and *usage* if key derivation is specified for the encryption type. If non-null, *cipher_state* specifies the beginning state for the encryption operation, and is updated with the state to be passed as input to the next operation. +This function encrypts the data block *input* and stores the output into *output* . The actual encryption key will be derived from *key* and *usage* if key derivation is specified for the encryption type. If non-null, *cipher_state* specifies the beginning state for the encryption operation, and is updated with the state to be passed as input to the next operation. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_checksum_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_checksum_iov.rst.txt index fe1d921cc039..b152676fbac3 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_checksum_iov.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_checksum_iov.rst.txt @@ -38,7 +38,7 @@ krb5_c_make_checksum_iov - Fill in a checksum element in IOV array (operates on -Create a checksum in the #KRB5_CRYPTO_TYPE_CHECKSUM element over #KRB5_CRYPTO_TYPE_DATA and #KRB5_CRYPTO_TYPE_SIGN_ONLY chunks in *data* . Only the #KRB5_CRYPTO_TYPE_CHECKSUM region is modified. +Create a checksum in the KRB5_CRYPTO_TYPE_CHECKSUM element over KRB5_CRYPTO_TYPE_DATA and KRB5_CRYPTO_TYPE_SIGN_ONLY chunks in *data* . Only the KRB5_CRYPTO_TYPE_CHECKSUM region is modified. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_verify_checksum_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_verify_checksum_iov.rst.txt index 237c01f1779a..639fc882ca08 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_verify_checksum_iov.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_verify_checksum_iov.rst.txt @@ -40,7 +40,7 @@ krb5_c_verify_checksum_iov - Validate a checksum element in IOV array (operates -Confirm that the checksum in the #KRB5_CRYPTO_TYPE_CHECKSUM element is a valid checksum of the #KRB5_CRYPTO_TYPE_DATA and #KRB5_CRYPTO_TYPE_SIGN_ONLY regions in the iov. +Confirm that the checksum in the KRB5_CRYPTO_TYPE_CHECKSUM element is a valid checksum of the KRB5_CRYPTO_TYPE_DATA and KRB5_CRYPTO_TYPE_SIGN_ONLY regions in the iov. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_cache_match.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_cache_match.rst.txt index 3e01accab529..2c56506902d5 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_cache_match.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_cache_match.rst.txt @@ -22,7 +22,7 @@ krb5_cc_cache_match - Find a credential cache with a specified client principal :retval: - 0 Success - - KRB5_CC_NOTFOUND None + - KRB5_CC_NOTFOUND .. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_retrieve_cred.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_retrieve_cred.rst.txt index 3674f97dd9d5..22413b5cfbe1 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_retrieve_cred.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_retrieve_cred.rst.txt @@ -46,34 +46,34 @@ Valid values for *flags* are: - - #KRB5_TC_MATCH_TIMES The requested lifetime must be at least as great as in *mcreds* . + - KRB5_TC_MATCH_TIMES The requested lifetime must be at least as great as in *mcreds* . - - #KRB5_TC_MATCH_IS_SKEY The *is_skey* field much match exactly. + - KRB5_TC_MATCH_IS_SKEY The *is_skey* field much match exactly. - - #KRB5_TC_MATCH_FLAGS Flags set in *mcreds* must be set. + - KRB5_TC_MATCH_FLAGS Flags set in *mcreds* must be set. - - #KRB5_TC_MATCH_TIMES_EXACT The requested lifetime must match exactly. + - KRB5_TC_MATCH_TIMES_EXACT The requested lifetime must match exactly. - - #KRB5_TC_MATCH_FLAGS_EXACT Flags must match exactly. + - KRB5_TC_MATCH_FLAGS_EXACT Flags must match exactly. - - #KRB5_TC_MATCH_AUTHDATA The authorization data must match. + - KRB5_TC_MATCH_AUTHDATA The authorization data must match. - - #KRB5_TC_MATCH_SRV_NAMEONLY Only the name portion of the principal name must match, not the realm. + - KRB5_TC_MATCH_SRV_NAMEONLY Only the name portion of the principal name must match, not the realm. - - #KRB5_TC_MATCH_2ND_TKT The second tickets must match. + - KRB5_TC_MATCH_2ND_TKT The second tickets must match. - - #KRB5_TC_MATCH_KTYPE The encryption key types must match. + - KRB5_TC_MATCH_KTYPE The encryption key types must match. - - #KRB5_TC_SUPPORTED_KTYPES Check all matching entries that have any supported encryption type and return the one with the encryption type listed earliest. + - KRB5_TC_SUPPORTED_KTYPES Check all matching entries that have any supported encryption type and return the one with the encryption type listed earliest. Use krb5_free_cred_contents() to free *creds* when it is no longer needed. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_change_password.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_change_password.rst.txt index 05a3eb9512bd..8d4691790ee1 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_change_password.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_change_password.rst.txt @@ -48,19 +48,19 @@ The possible values of the output *result_code* are: - - #KRB5_KPASSWD_SUCCESS (0) - success + - KRB5_KPASSWD_SUCCESS (0) - success - - #KRB5_KPASSWD_MALFORMED (1) - Malformed request error + - KRB5_KPASSWD_MALFORMED (1) - Malformed request error - - #KRB5_KPASSWD_HARDERROR (2) - Server error + - KRB5_KPASSWD_HARDERROR (2) - Server error - - #KRB5_KPASSWD_AUTHERROR (3) - Authentication error + - KRB5_KPASSWD_AUTHERROR (3) - Authentication error - - #KRB5_KPASSWD_SOFTERROR (4) - Password change rejected + - KRB5_KPASSWD_SOFTERROR (4) - Password change rejected diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_config_files.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_config_files.rst.txt new file mode 100644 index 000000000000..620fe7e232ef --- /dev/null +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_config_files.rst.txt @@ -0,0 +1,44 @@ +krb5_free_config_files - Free a list allocated by krb5_get_default_config_files() +=================================================================================== + +.. + +.. c:function:: void krb5_free_config_files(char ** filenames) + +.. + + +:param: + + **[in]** **filenames** - Configuration filename list + + +.. + + + +.. + + + + + + + + + + + + + + +.. + + + + +.. note:: + + New in 1.22 + + diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_fwd_tgt_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_fwd_tgt_creds.rst.txt index bfda237f445f..939faad6a8cc 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_fwd_tgt_creds.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_fwd_tgt_creds.rst.txt @@ -49,7 +49,7 @@ krb5_fwd_tgt_creds - Get a forwarded TGT and format a KRB-CRED message. -Get a TGT for use at the remote host *rhost* and format it into a KRB-CRED message. If *rhost* is NULL and *server* is of type #KRB5_NT_SRV_HST, the second component of *server* will be used. +Get a TGT for use at the remote host *rhost* and format it into a KRB-CRED message. If *rhost* is NULL and *server* is of type KRB5_NT_SRV_HST, the second component of *server* will be used. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials.rst.txt index 7a72b39af08f..b4fbcd69b0e7 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials.rst.txt @@ -45,16 +45,16 @@ Use *ccache* or a TGS exchange to get a service ticket matching *in_creds* . Valid values for *options* are: - - #KRB5_GC_CACHED Search only credential cache for the ticket + - KRB5_GC_CACHED Search only credential cache for the ticket - - #KRB5_GC_USER_USER Return a user to user authentication ticket + - KRB5_GC_USER_USER Return a user to user authentication ticket *in_creds* must be non-null. *in_creds->client* and *in_creds->server* must be filled in to specify the client and the server respectively. If any authorization data needs to be requested for the service ticket (such as restrictions on how the ticket can be used), specify it in *in_creds->authdata* ; otherwise set *in_creds->authdata* to NULL. The session key type is specified in *in_creds->keyblock.enctype* , if it is nonzero. -The expiration date is specified in *in_creds->times.endtime* . The KDC may return tickets with an earlier expiration date. If *in_creds->times.endtime* is set to 0, the latest possible expiration date will be requested. +If *in_creds->times.endtime* is specified, it is used as the requested expiration date if a TGS request is made. If *in_creds->times.endtime* is set to 0, the latest possible expiration date will be requested. The KDC or cache may return a ticket with an earlier expiration date. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_default_config_files.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_default_config_files.rst.txt new file mode 100644 index 000000000000..292eed4c82f0 --- /dev/null +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_default_config_files.rst.txt @@ -0,0 +1,52 @@ +krb5_get_default_config_files - Return a list of default configuration filenames. +=================================================================================== + +.. + +.. c:function:: krb5_error_code krb5_get_default_config_files(char *** filenames) + +.. + + +:param: + + **[out]** **filenames** - Configuration filename list + + +.. + + + +.. + + + + + + + +Fill in *filenames* with a null-terminated list of configuration files which will be read by krb5_init_context() in the current process environment. + + + +Use krb5_free_config_files() to free *filenames* when it is no longer needed. + + + + + + + + + + +.. + + + + +.. note:: + + New in 1.22 + + diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_flags.rst.txt index 77e9fa04d7e6..203e9c71c37d 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_flags.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_flags.rst.txt @@ -34,7 +34,7 @@ krb5_get_init_creds_opt_set_fast_flags - Set FAST flags in initial credential o The following flag values are valid: - - #KRB5_FAST_REQUIRED - Require FAST to be used + - KRB5_FAST_REQUIRED - Require FAST to be used diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_prompt_types.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_prompt_types.rst.txt index 4cf9748c4dd4..39156ca153af 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_prompt_types.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_prompt_types.rst.txt @@ -18,7 +18,7 @@ krb5_get_prompt_types - Get prompt types array from a context. :return: - - Pointer to an array of prompt types corresponding to the prompter's prompts arguments. Each type has one of the following values: #KRB5_PROMPT_TYPE_PASSWORD #KRB5_PROMPT_TYPE_NEW_PASSWORD #KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN #KRB5_PROMPT_TYPE_PREAUTH + - Pointer to an array of prompt types corresponding to the prompter's prompts arguments. Each type has one of the following values: KRB5_PROMPT_TYPE_PASSWORD KRB5_PROMPT_TYPE_NEW_PASSWORD KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN KRB5_PROMPT_TYPE_PREAUTH .. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_context_profile.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_context_profile.rst.txt index d92f0995af6e..3afab4fecf75 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_context_profile.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_context_profile.rst.txt @@ -35,10 +35,10 @@ Create a context structure, optionally using a specified profile and initializat - - #KRB5_INIT_CONTEXT_SECURE Ignore environment variables + - KRB5_INIT_CONTEXT_SECURE Ignore environment variables - - #KRB5_INIT_CONTEXT_KDC Use KDC configuration if creating profile + - KRB5_INIT_CONTEXT_KDC Use KDC configuration if creating profile diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_step.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_step.rst.txt index 4f4255104170..f4258e38832d 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_step.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_step.rst.txt @@ -42,7 +42,7 @@ This function constructs the next KDC request in an initial credential exchange, -If more requests are needed, *flags* will be set to #KRB5_INIT_CREDS_STEP_FLAG_CONTINUE and the next request will be placed in *out* . If no more requests are needed, *flags* will not contain #KRB5_INIT_CREDS_STEP_FLAG_CONTINUE and *out* will be empty. +If more requests are needed, *flags* will be set to KRB5_INIT_CREDS_STEP_FLAG_CONTINUE and the next request will be placed in *out* . If no more requests are needed, *flags* will not contain KRB5_INIT_CREDS_STEP_FLAG_CONTINUE and *out* will be empty. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_make_checksum_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_make_checksum_iov.rst.txt index a25d8ec13510..3f4cb6b5f860 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_make_checksum_iov.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_make_checksum_iov.rst.txt @@ -38,7 +38,7 @@ krb5_k_make_checksum_iov - Fill in a checksum element in IOV array (operates on -Create a checksum in the #KRB5_CRYPTO_TYPE_CHECKSUM element over #KRB5_CRYPTO_TYPE_DATA and #KRB5_CRYPTO_TYPE_SIGN_ONLY chunks in *data* . Only the #KRB5_CRYPTO_TYPE_CHECKSUM region is modified. +Create a checksum in the KRB5_CRYPTO_TYPE_CHECKSUM element over KRB5_CRYPTO_TYPE_DATA and KRB5_CRYPTO_TYPE_SIGN_ONLY chunks in *data* . Only the KRB5_CRYPTO_TYPE_CHECKSUM region is modified. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_verify_checksum_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_verify_checksum_iov.rst.txt index af4cffee62c9..e364a76cbe0e 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_verify_checksum_iov.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_verify_checksum_iov.rst.txt @@ -40,7 +40,7 @@ krb5_k_verify_checksum_iov - Validate a checksum element in IOV array (operates -Confirm that the checksum in the #KRB5_CRYPTO_TYPE_CHECKSUM element is a valid checksum of the #KRB5_CRYPTO_TYPE_DATA and #KRB5_CRYPTO_TYPE_SIGN_ONLY regions in the iov. +Confirm that the checksum in the KRB5_CRYPTO_TYPE_CHECKSUM element is a valid checksum of the KRB5_CRYPTO_TYPE_DATA and KRB5_CRYPTO_TYPE_SIGN_ONLY regions in the iov. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_ncred.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_ncred.rst.txt index 7a074b6d2c04..e7e88aebc1e9 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_ncred.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_ncred.rst.txt @@ -49,11 +49,11 @@ The local and remote addresses in *auth_context* are optional; if either is spec -If the #KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , an entry for the message is entered in an in-memory replay cache to detect if the message is reflected by an attacker. If #KRB5_AUTH_CONTEXT_DO_TIME is not set, no replay cache is used. If #KRB5_AUTH_CONTEXT_RET_TIME is set in *auth_context* , the timestamp used for the KRB-CRED message is stored in *rdata_out* . +If the KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , an entry for the message is entered in an in-memory replay cache to detect if the message is reflected by an attacker. If KRB5_AUTH_CONTEXT_DO_TIME is not set, no replay cache is used. If KRB5_AUTH_CONTEXT_RET_TIME is set in *auth_context* , the timestamp used for the KRB-CRED message is stored in *rdata_out* . -If either #KRB5_AUTH_CONTEXT_DO_SEQUENCE or #KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the *auth_context* local sequence number is included in the KRB-CRED message and then incremented. If #KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the sequence number used is stored in *rdata_out* . +If either KRB5_AUTH_CONTEXT_DO_SEQUENCE or KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the *auth_context* local sequence number is included in the KRB-CRED message and then incremented. If KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the sequence number used is stored in *rdata_out* . @@ -81,7 +81,7 @@ The message will be encrypted using the send subkey of *auth_context* if it is p .. note:: - The *rdata_out* argument is required if the #KRB5_AUTH_CONTEXT_RET_TIME or #KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . + The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_priv.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_priv.rst.txt index 0d9922ecb2af..6046a9dbab4b 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_priv.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_priv.rst.txt @@ -44,11 +44,11 @@ The local address in *auth_context* must be set, and is used to form the sender -If the #KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , a timestamp is included in the KRB-PRIV message, and an entry for the message is entered in an in-memory replay cache to detect if the message is reflected by an attacker. If #KRB5_AUTH_CONTEXT_DO_TIME is not set, no replay cache is used. If #KRB5_AUTH_CONTEXT_RET_TIME is set in *auth_context* , a timestamp is included in the KRB-PRIV message and is stored in *rdata_out* . +If the KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , a timestamp is included in the KRB-PRIV message, and an entry for the message is entered in an in-memory replay cache to detect if the message is reflected by an attacker. If KRB5_AUTH_CONTEXT_DO_TIME is not set, no replay cache is used. If KRB5_AUTH_CONTEXT_RET_TIME is set in *auth_context* , a timestamp is included in the KRB-PRIV message and is stored in *rdata_out* . -If either #KRB5_AUTH_CONTEXT_DO_SEQUENCE or #KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the *auth_context* local sequence number is included in the KRB-PRIV message and then incremented. If #KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the sequence number used is stored in *rdata_out* . +If either KRB5_AUTH_CONTEXT_DO_SEQUENCE or KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the *auth_context* local sequence number is included in the KRB-PRIV message and then incremented. If KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the sequence number used is stored in *rdata_out* . @@ -72,7 +72,7 @@ Use krb5_free_data_contents() to free *der_out* when it is no longer needed. .. note:: - The *rdata_out* argument is required if the #KRB5_AUTH_CONTEXT_RET_TIME or #KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . + The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_rep.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_rep.rst.txt index 29091a1bf13c..4b94141039a9 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_rep.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_rep.rst.txt @@ -36,7 +36,7 @@ This function fills in *outbuf* with an AP-REP message using information from *a -If the flags in *auth_context* indicate that a sequence number should be used (either #KRB5_AUTH_CONTEXT_DO_SEQUENCE or #KRB5_AUTH_CONTEXT_RET_SEQUENCE) and the local sequence number in *auth_context* is 0, a new number will be generated with krb5_generate_seq_number(). +If the flags in *auth_context* indicate that a sequence number should be used (either KRB5_AUTH_CONTEXT_DO_SEQUENCE or KRB5_AUTH_CONTEXT_RET_SEQUENCE) and the local sequence number in *auth_context* is 0, a new number will be generated with krb5_generate_seq_number(). diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_req_extended.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_req_extended.rst.txt index 532af9775589..d29a37616df6 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_req_extended.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_req_extended.rst.txt @@ -40,13 +40,13 @@ krb5_mk_req_extended - Create a KRB_AP_REQ message using supplied credentials. Valid *ap_req_options* are: - - #AP_OPTS_USE_SESSION_KEY - Use the session key when creating the request used for user to user authentication. + - AP_OPTS_USE_SESSION_KEY - Use the session key when creating the request used for user to user authentication. - - #AP_OPTS_MUTUAL_REQUIRED - Request a mutual authentication packet from the receiver. + - AP_OPTS_MUTUAL_REQUIRED - Request a mutual authentication packet from the receiver. - - #AP_OPTS_USE_SUBKEY - Generate a subsession key from the current session key obtained from the credentials. + - AP_OPTS_USE_SUBKEY - Generate a subsession key from the current session key obtained from the credentials. This function creates a KRB_AP_REQ message using supplied credentials *in_creds* . *auth_context* may point to an existing auth context or to NULL, in which case a new one will be created. If *in_data* is non-null, a checksum of it will be included in the authenticator contained in the KRB_AP_REQ message. Use krb5_free_data_contents() to free *outbuf* when it is no longer needed. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_safe.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_safe.rst.txt index f9a67be4ee11..1526e7d4071e 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_safe.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_safe.rst.txt @@ -48,11 +48,11 @@ The local address in *auth_context* must be set, and is used to form the sender -If the #KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , a timestamp is included in the KRB-SAFE message, and an entry for the message is entered in an in-memory replay cache to detect if the message is reflected by an attacker. If #KRB5_AUTH_CONTEXT_DO_TIME is not set, no replay cache is used. If #KRB5_AUTH_CONTEXT_RET_TIME is set in *auth_context* , a timestamp is included in the KRB-SAFE message and is stored in *rdata_out* . +If the KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , a timestamp is included in the KRB-SAFE message, and an entry for the message is entered in an in-memory replay cache to detect if the message is reflected by an attacker. If KRB5_AUTH_CONTEXT_DO_TIME is not set, no replay cache is used. If KRB5_AUTH_CONTEXT_RET_TIME is set in *auth_context* , a timestamp is included in the KRB-SAFE message and is stored in *rdata_out* . -If either #KRB5_AUTH_CONTEXT_DO_SEQUENCE or #KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the *auth_context* local sequence number is included in the KRB-SAFE message and then incremented. If #KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the sequence number used is stored in *rdata_out* . +If either KRB5_AUTH_CONTEXT_DO_SEQUENCE or KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the *auth_context* local sequence number is included in the KRB-SAFE message and then incremented. If KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the sequence number used is stored in *rdata_out* . @@ -76,7 +76,7 @@ Use krb5_free_data_contents() to free *der_out* when it is no longer needed. .. note:: - The *rdata_out* argument is required if the #KRB5_AUTH_CONTEXT_RET_TIME or #KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . + The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_add_buffer.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_add_buffer.rst.txt index 4c153c2332b3..bfdcea7b78e9 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_add_buffer.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_add_buffer.rst.txt @@ -40,25 +40,25 @@ This function adds a buffer of type *type* and contents *data* to *pac* if there The valid values of *type* is one of the following: - - #KRB5_PAC_LOGON_INFO - Logon information + - KRB5_PAC_LOGON_INFO - Logon information - - #KRB5_PAC_CREDENTIALS_INFO - Credentials information + - KRB5_PAC_CREDENTIALS_INFO - Credentials information - - #KRB5_PAC_SERVER_CHECKSUM - Server checksum + - KRB5_PAC_SERVER_CHECKSUM - Server checksum - - #KRB5_PAC_PRIVSVR_CHECKSUM - KDC checksum + - KRB5_PAC_PRIVSVR_CHECKSUM - KDC checksum - - #KRB5_PAC_CLIENT_INFO - Client name and ticket information + - KRB5_PAC_CLIENT_INFO - Client name and ticket information - - #KRB5_PAC_DELEGATION_INFO - Constrained delegation information + - KRB5_PAC_DELEGATION_INFO - Constrained delegation information - - #KRB5_PAC_UPN_DNS_INFO - User principal name and DNS information + - KRB5_PAC_UPN_DNS_INFO - User principal name and DNS information diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_parse_name_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_parse_name_flags.rst.txt index 68cbc7c53b91..af762ce29aad 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_parse_name_flags.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_parse_name_flags.rst.txt @@ -43,16 +43,16 @@ Similar to krb5_parse_name(), this function converts a single-string representat The following flags are valid: - - #KRB5_PRINCIPAL_PARSE_NO_REALM - no realm must be present in *name* + - KRB5_PRINCIPAL_PARSE_NO_REALM - no realm must be present in *name* - - #KRB5_PRINCIPAL_PARSE_REQUIRE_REALM - realm must be present in *name* + - KRB5_PRINCIPAL_PARSE_REQUIRE_REALM - realm must be present in *name* - - #KRB5_PRINCIPAL_PARSE_ENTERPRISE - create single-component enterprise principal + - KRB5_PRINCIPAL_PARSE_ENTERPRISE - create single-component enterprise principal - - #KRB5_PRINCIPAL_PARSE_IGNORE_REALM - ignore realm if present in *name* + - KRB5_PRINCIPAL_PARSE_IGNORE_REALM - ignore realm if present in *name* If **KRB5_PRINCIPAL_PARSE_NO_REALM** or **KRB5_PRINCIPAL_PARSE_IGNORE_REALM** is specified in *flags* , the realm of the new principal will be empty. Otherwise, the default realm for *context* will be used if *name* does not specify a realm. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare_flags.rst.txt index df8fc5bdbf7d..d384ea103cd3 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare_flags.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare_flags.rst.txt @@ -36,16 +36,16 @@ krb5_principal_compare_flags - Compare two principals with additional flags. Valid flags are: - - #KRB5_PRINCIPAL_COMPARE_IGNORE_REALM - ignore realm component + - KRB5_PRINCIPAL_COMPARE_IGNORE_REALM - ignore realm component - - #KRB5_PRINCIPAL_COMPARE_ENTERPRISE - UPNs as real principals + - KRB5_PRINCIPAL_COMPARE_ENTERPRISE - UPNs as real principals - - #KRB5_PRINCIPAL_COMPARE_CASEFOLD case-insensitive + - KRB5_PRINCIPAL_COMPARE_CASEFOLD case-insensitive - - #KRB5_PRINCIPAL_COMPARE_UTF8 - treat principals as UTF-8 + - KRB5_PRINCIPAL_COMPARE_UTF8 - treat principals as UTF-8 diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_cred.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_cred.rst.txt index 556a26047162..e36cfd459b05 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_cred.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_cred.rst.txt @@ -60,7 +60,7 @@ Use krb5_free_tgt_creds() to free *creds_out* when it is no longer needed. .. note:: - The *rdata_out* argument is required if the #KRB5_AUTH_CONTEXT_RET_TIME or #KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* .` + The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* .` diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_priv.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_priv.rst.txt index f2690f41eadc..0fd56df8f2a9 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_priv.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_priv.rst.txt @@ -44,11 +44,11 @@ If *auth_context* has a remote address set, the address will be used to verify t -If the #KRB5_AUTH_CONTEXT_DO_SEQUENCE flag is set in *auth_context* , the sequence number of the KRB-PRIV message is checked against the remote sequence number field of *auth_context* . Otherwise, the sequence number is not used. +If the KRB5_AUTH_CONTEXT_DO_SEQUENCE flag is set in *auth_context* , the sequence number of the KRB-PRIV message is checked against the remote sequence number field of *auth_context* . Otherwise, the sequence number is not used. -If the #KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , then the timestamp in the message is verified to be within the permitted clock skew of the current time, and the message is checked against an in-memory replay cache to detect reflections or replays. +If the KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , then the timestamp in the message is verified to be within the permitted clock skew of the current time, and the message is checked against an in-memory replay cache to detect reflections or replays. @@ -72,7 +72,7 @@ Use krb5_free_data_contents() to free *userdata_out* when it is no longer needed .. note:: - The *rdata_out* argument is required if the #KRB5_AUTH_CONTEXT_RET_TIME or #KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . + The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt index e5b9d73cc5d1..6a52fa16abb6 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt @@ -82,7 +82,7 @@ Various other checks are performed on the decoded data, including cross-realm po -On success the authenticator, subkey, and remote sequence number of the request are stored in *auth_context* . If the #AP_OPTS_MUTUAL_REQUIRED bit is set, the local sequence number is XORed with the remote sequence number in the request. +On success the authenticator, subkey, and remote sequence number of the request are stored in *auth_context* . If the AP_OPTS_MUTUAL_REQUIRED bit is set, the local sequence number is XORed with the remote sequence number in the request. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_safe.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_safe.rst.txt index 5166c5501de6..4cf2307cdc80 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_safe.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_safe.rst.txt @@ -44,11 +44,11 @@ If *auth_context* has a remote address set, the address will be used to verify t -If the #KRB5_AUTH_CONTEXT_DO_SEQUENCE flag is set in *auth_context* , the sequence number of the KRB-SAFE message is checked against the remote sequence number field of *auth_context* . Otherwise, the sequence number is not used. +If the KRB5_AUTH_CONTEXT_DO_SEQUENCE flag is set in *auth_context* , the sequence number of the KRB-SAFE message is checked against the remote sequence number field of *auth_context* . Otherwise, the sequence number is not used. -If the #KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , then the timestamp in the message is verified to be within the permitted clock skew of the current time, and the message is checked against an in-memory replay cache to detect reflections or replays. +If the KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , then the timestamp in the message is verified to be within the permitted clock skew of the current time, and the message is checked against an in-memory replay cache to detect reflections or replays. @@ -72,7 +72,7 @@ Use krb5_free_data_contents() to free *userdata_out* when it is no longer needed .. note:: - The *rdata_out* argument is required if the #KRB5_AUTH_CONTEXT_RET_TIME or #KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . + The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sendauth.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sendauth.rst.txt index 40ef384b5bfe..b1059b09e920 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sendauth.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sendauth.rst.txt @@ -32,7 +32,7 @@ krb5_sendauth - Client function for sendauth protocol. **[out]** **error** - If non-null, contains KRB_ERROR message returned from server - **[out]** **rep_result** - If non-null and *ap_req_options* is #AP_OPTS_MUTUAL_REQUIRED, contains the result of mutual authentication exchange + **[out]** **rep_result** - If non-null and *ap_req_options* is AP_OPTS_MUTUAL_REQUIRED, contains the result of mutual authentication exchange **[out]** **out_creds** - If non-null, the retrieved credentials diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_password.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_password.rst.txt index ff80c966ad41..3e7ef2ce64f0 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_password.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_password.rst.txt @@ -29,7 +29,7 @@ krb5_set_password - Set a password for a principal using specified credentials. :retval: - - 0 Success and result_code is set to #KRB5_KPASSWD_SUCCESS. + - 0 Success and result_code is set to KRB5_KPASSWD_SUCCESS. :return: diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_match.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_match.rst.txt index c37500068263..21785890f667 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_match.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_match.rst.txt @@ -32,7 +32,7 @@ krb5_sname_match - Test whether a principal matches a matching principal. -If *matching* is NULL, return TRUE. If *matching* is not a matching principal, return the value of krb5_principal_compare(context, matching, princ). +If *matching* is NULL, return TRUE. If *matching* is not a matching principal, return the value of krb5_principal_compare(context, matching,princ). diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_to_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_to_principal.rst.txt index 6dd15ddbb338..f6e167995bee 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_to_principal.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_to_principal.rst.txt @@ -49,11 +49,11 @@ The *type* can be one of the following: - - #KRB5_NT_SRV_HST canonicalizes the host name before looking up the realm and generating the principal. + - KRB5_NT_SRV_HST canonicalizes the host name before looking up the realm and generating the principal. - - #KRB5_NT_UNKNOWN accepts the hostname as given, and does not canonicalize it. + - KRB5_NT_UNKNOWN accepts the hostname as given, and does not canonicalize it. Use krb5_free_principal to free *ret_princ* when it is no longer needed. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_step.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_step.rst.txt index 919f47c7770e..53759557ee3b 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_step.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_step.rst.txt @@ -42,7 +42,7 @@ This function constructs the next KDC request for a TGS exchange, allowing the c -If more requests are needed, *flags* will be set to #KRB5_TKT_CREDS_STEP_FLAG_CONTINUE and the next request will be placed in *out* . If no more requests are needed, *flags* will not contain #KRB5_TKT_CREDS_STEP_FLAG_CONTINUE and *out* will be empty. +If more requests are needed, *flags* will be set to KRB5_TKT_CREDS_STEP_FLAG_CONTINUE and the next request will be placed in *out* . If no more requests are needed, *flags* will not contain KRB5_TKT_CREDS_STEP_FLAG_CONTINUE and *out* will be empty. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_flags.rst.txt index dce935314128..6ae0b40f9718 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_flags.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_flags.rst.txt @@ -43,13 +43,13 @@ Similar to krb5_unparse_name(), this function converts a krb5_principal structur The following flags are valid: - - #KRB5_PRINCIPAL_UNPARSE_SHORT - omit realm if it is the local realm + - KRB5_PRINCIPAL_UNPARSE_SHORT - omit realm if it is the local realm - - #KRB5_PRINCIPAL_UNPARSE_NO_REALM - omit realm + - KRB5_PRINCIPAL_UNPARSE_NO_REALM - omit realm - - #KRB5_PRINCIPAL_UNPARSE_DISPLAY - do not quote special characters + - KRB5_PRINCIPAL_UNPARSE_DISPLAY - do not quote special characters Use krb5_free_unparsed_name() to free *name* when it is no longer needed. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_DIRECTIONAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_DIRECTIONAL.rst.txt new file mode 100644 index 000000000000..678730ab5529 --- /dev/null +++ b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_DIRECTIONAL.rst.txt @@ -0,0 +1,17 @@ +.. highlight:: c + +.. _ADDRTYPE-DIRECTIONAL-data: + +ADDRTYPE_DIRECTIONAL +==================== + +.. +.. data:: ADDRTYPE_DIRECTIONAL +.. + + + + +=========================== ====================== +``ADDRTYPE_DIRECTIONAL`` ``0x0003`` +=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_UNIXSOCK.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_UNIXSOCK.rst.txt new file mode 100644 index 000000000000..052f6cf49adb --- /dev/null +++ b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_UNIXSOCK.rst.txt @@ -0,0 +1,17 @@ +.. highlight:: c + +.. _ADDRTYPE-UNIXSOCK-data: + +ADDRTYPE_UNIXSOCK +================= + +.. +.. data:: ADDRTYPE_UNIXSOCK +.. + + + + +======================== ====================== +``ADDRTYPE_UNIXSOCK`` ``(0x8000 | 0x0001)`` +======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_CBT_FLAG.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_CBT_FLAG.rst.txt new file mode 100644 index 000000000000..e056aeac383b --- /dev/null +++ b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_CBT_FLAG.rst.txt @@ -0,0 +1,17 @@ +.. highlight:: c + +.. _AP-OPTS-CBT-FLAG-data: + +AP_OPTS_CBT_FLAG +================ + +.. +.. data:: AP_OPTS_CBT_FLAG +.. + + + + +======================= ====================== +``AP_OPTS_CBT_FLAG`` ``0x00000004 /* include KERB_AP_OPTIONS_CBT */`` +======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FINISHED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FINISHED.rst.txt new file mode 100644 index 000000000000..d074e040f001 --- /dev/null +++ b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FINISHED.rst.txt @@ -0,0 +1,17 @@ +.. highlight:: c + +.. _KRB5-KEYUSAGE-FINISHED-data: + +KRB5_KEYUSAGE_FINISHED +====================== + +.. +.. data:: KRB5_KEYUSAGE_FINISHED +.. + + + + +============================= ====================== +``KRB5_KEYUSAGE_FINISHED`` ``41`` +============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/index.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/index.rst.txt index 45fe160d7fb1..c1bda5c6c417 100644 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/index.rst.txt +++ b/crypto/krb5/doc/html/_sources/appdev/refs/macros/index.rst.txt @@ -9,6 +9,7 @@ Public ADDRTYPE_ADDRPORT.rst ADDRTYPE_CHAOS.rst + ADDRTYPE_DIRECTIONAL.rst ADDRTYPE_DDP.rst ADDRTYPE_INET.rst ADDRTYPE_INET6.rst @@ -17,11 +18,13 @@ Public ADDRTYPE_IS_LOCAL.rst ADDRTYPE_NETBIOS.rst ADDRTYPE_XNS.rst + ADDRTYPE_UNIXSOCK.rst AD_TYPE_EXTERNAL.rst AD_TYPE_FIELD_TYPE_MASK.rst AD_TYPE_REGISTERED.rst AD_TYPE_RESERVED.rst AP_OPTS_ETYPE_NEGOTIATION.rst + AP_OPTS_CBT_FLAG.rst AP_OPTS_MUTUAL_REQUIRED.rst AP_OPTS_RESERVED.rst AP_OPTS_USE_SESSION_KEY.rst @@ -177,6 +180,7 @@ Public KRB5_KEYUSAGE_GSS_TOK_MIC.rst KRB5_KEYUSAGE_GSS_TOK_WRAP_INTEG.rst KRB5_KEYUSAGE_GSS_TOK_WRAP_PRIV.rst + KRB5_KEYUSAGE_FINISHED.rst KRB5_KEYUSAGE_IAKERB_FINISHED.rst KRB5_KEYUSAGE_KDC_REP_TICKET.rst KRB5_KEYUSAGE_KRB_CRED_ENCPART.rst |