diff options
Diffstat (limited to 'crypto/krb5/doc/html/_sources/appdev')
860 files changed, 0 insertions, 32317 deletions
diff --git a/crypto/krb5/doc/html/_sources/appdev/gssapi.rst.txt b/crypto/krb5/doc/html/_sources/appdev/gssapi.rst.txt deleted file mode 100644 index b58f4122bca5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/gssapi.rst.txt +++ /dev/null @@ -1,763 +0,0 @@ -Developing with GSSAPI -====================== - -The GSSAPI (Generic Security Services API) allows applications to -communicate securely using Kerberos 5 or other security mechanisms. -We recommend using the GSSAPI (or a higher-level framework which -encompasses GSSAPI, such as SASL) for secure network communication -over using the libkrb5 API directly. - -GSSAPIv2 is specified in :rfc:`2743` and :rfc:`2744`. Also see -:rfc:`7546` for a description of how to use the GSSAPI in a client or -server program. - -This documentation will describe how various ways of using the -GSSAPI will behave with the krb5 mechanism as implemented in MIT krb5, -as well as krb5-specific extensions to the GSSAPI. - - -Name types ----------- - -A GSSAPI application can name a local or remote entity by calling -gss_import_name_, specifying a name type and a value. The following -name types are supported by the krb5 mechanism: - -* **GSS_C_NT_HOSTBASED_SERVICE**: The value should be a string of the - form ``service`` or ``service@hostname``. This is the most common - way to name target services when initiating a security context, and - is the most likely name type to work across multiple mechanisms. - -* **GSS_KRB5_NT_PRINCIPAL_NAME**: The value should be a principal name - string. This name type only works with the krb5 mechanism, and is - defined in the ``<gssapi/gssapi_krb5.h>`` header. - -* **GSS_C_NT_USER_NAME** or **GSS_C_NULL_OID**: The value is treated - as an unparsed principal name string, as above. These name types - may work with mechanisms other than krb5, but will have different - interpretations in those mechanisms. **GSS_C_NT_USER_NAME** is - intended to be used with a local username, which will parse into a - single-component principal in the default realm. - -* **GSS_C_NT_ANONYMOUS**: The value is ignored. The anonymous - principal is used, allowing a client to authenticate to a server - without asserting a particular identity (which may or may not be - allowed by a particular server or Kerberos realm). - -* **GSS_C_NT_MACHINE_UID_NAME**: The value is uid_t object. On - Unix-like systems, the username of the uid is looked up in the - system user database and the resulting username is parsed as a - principal name. - -* **GSS_C_NT_STRING_UID_NAME**: As above, but the value is a decimal - string representation of the uid. - -* **GSS_C_NT_EXPORT_NAME**: The value must be the result of a - gss_export_name_ call. - -* **GSS_KRB5_NT_ENTERPRISE_NAME**: The value should be a krb5 - enterprise name string (see :rfc:`6806` section 5), in the form - ``user@suffix``. This name type is used to convey alias names, and - is defined in the ``<gssapi/gssapi_krb5.h>`` header. (New in - release 1.17.) - -* **GSS_KRB5_NT_X509_CERT**: The value should be an X.509 certificate - encoded according to :rfc:`5280`. This name form can be used for - the desired_name parameter of gss_acquire_cred_impersonate_name(), - to identify the S4U2Self user by certificate. (New in release - 1.19.) - - -Initiator credentials ---------------------- - -A GSSAPI client application uses gss_init_sec_context_ to establish a -security context. The *initiator_cred_handle* parameter determines -what tickets are used to establish the connection. An application can -either pass **GSS_C_NO_CREDENTIAL** to use the default client -credential, or it can use gss_acquire_cred_ beforehand to acquire an -initiator credential. The call to gss_acquire_cred_ may include a -*desired_name* parameter, or it may pass **GSS_C_NO_NAME** if it does -not have a specific name preference. - -If the desired name for a krb5 initiator credential is a host-based -name, it is converted to a principal name of the form -``service/hostname`` in the local realm, where *hostname* is the local -hostname if not specified. The hostname will be canonicalized using -forward name resolution, and possibly also using reverse name -resolution depending on the value of the **rdns** variable in -:ref:`libdefaults`. - -If a desired name is specified in the call to gss_acquire_cred_, the -krb5 mechanism will attempt to find existing tickets for that client -principal name in the default credential cache or collection. If the -default cache type does not support a collection, and the default -cache contains credentials for a different principal than the desired -name, a **GSS_S_CRED_UNAVAIL** error will be returned with a minor -code indicating a mismatch. - -If no existing tickets are available for the desired name, but the -name has an entry in the default client :ref:`keytab_definition`, the -krb5 mechanism will acquire initial tickets for the name using the -default client keytab. - -If no desired name is specified, credential acquisition will be -deferred until the credential is used in a call to -gss_init_sec_context_ or gss_inquire_cred_. If the call is to -gss_init_sec_context_, the target name will be used to choose a client -principal name using the credential cache selection facility. (This -facility might, for instance, try to choose existing tickets for a -client principal in the same realm as the target service). If there -are no existing tickets for the chosen principal, but it is present in -the default client keytab, the krb5 mechanism will acquire initial -tickets using the keytab. - -If the target name cannot be used to select a client principal -(because the credentials are used in a call to gss_inquire_cred_), or -if the credential cache selection facility cannot choose a principal -for it, the default credential cache will be selected if it exists and -contains tickets. - -If the default credential cache does not exist, but the default client -keytab does, the krb5 mechanism will try to acquire initial tickets -for the first principal in the default client keytab. - -If the krb5 mechanism acquires initial tickets using the default -client keytab, the resulting tickets will be stored in the default -cache or collection, and will be refreshed by future calls to -gss_acquire_cred_ as they approach their expire time. - - -Acceptor names --------------- - -A GSSAPI server application uses gss_accept_sec_context_ to establish -a security context based on tokens provided by the client. The -*acceptor_cred_handle* parameter determines what -:ref:`keytab_definition` entries may be authenticated to by the -client, if the krb5 mechanism is used. - -The simplest choice is to pass **GSS_C_NO_CREDENTIAL** as the acceptor -credential. In this case, clients may authenticate to any service -principal in the default keytab (typically |keytab|, or the value of -the **KRB5_KTNAME** environment variable). This is the recommended -approach if the server application has no specific requirements to the -contrary. - -A server may acquire an acceptor credential with gss_acquire_cred_ and -a *cred_usage* of **GSS_C_ACCEPT** or **GSS_C_BOTH**. If the -*desired_name* parameter is **GSS_C_NO_NAME**, then clients will be -allowed to authenticate to any service principal in the default -keytab, just as if no acceptor credential was supplied. - -If a server wishes to specify a *desired_name* to gss_acquire_cred_, -the most common choice is a host-based name. If the host-based -*desired_name* contains just a *service*, then clients will be allowed -to authenticate to any host-based service principal (that is, a -principal of the form ``service/hostname@REALM``) for the named -service, regardless of hostname or realm, as long as it is present in -the default keytab. If the input name contains both a *service* and a -*hostname*, clients will be allowed to authenticate to any host-based -principal for the named service and hostname, regardless of realm. - -.. note:: - - If a *hostname* is specified, it will be canonicalized - using forward name resolution, and possibly also using - reverse name resolution depending on the value of the - **rdns** variable in :ref:`libdefaults`. - -.. note:: - - If the **ignore_acceptor_hostname** variable in - :ref:`libdefaults` is enabled, then *hostname* will be - ignored even if one is specified in the input name. - -.. note:: - - In MIT krb5 versions prior to 1.10, and in Heimdal's - implementation of the krb5 mechanism, an input name with - just a *service* is treated like an input name of - ``service@localhostname``, where *localhostname* is the - string returned by gethostname(). - -If the *desired_name* is a krb5 principal name or a local system name -type which is mapped to a krb5 principal name, clients will only be -allowed to authenticate to that principal in the default keytab. - - -Name Attributes ---------------- - -In release 1.8 or later, the gss_inquire_name_ and -gss_get_name_attribute_ functions, specified in :rfc:`6680`, can be -used to retrieve name attributes from the *src_name* returned by -gss_accept_sec_context_. The following attributes are defined when -the krb5 mechanism is used: - -.. _gssapi_authind_attr: - -* "auth-indicators" attribute: - -This attribute will be included in the gss_inquire_name_ output if the -ticket contains :ref:`authentication indicators <auth_indicator>`. -One indicator is returned per invocation of gss_get_name_attribute_, -so multiple invocations may be necessary to retrieve all of the -indicators from the ticket. (New in release 1.15.) - - -Credential store extensions ---------------------------- - -Beginning with release 1.11, the following GSSAPI extensions declared -in ``<gssapi/gssapi_ext.h>`` can be used to specify how credentials -are acquired or stored:: - - struct gss_key_value_element_struct { - const char *key; - const char *value; - }; - typedef struct gss_key_value_element_struct gss_key_value_element_desc; - - struct gss_key_value_set_struct { - OM_uint32 count; - gss_key_value_element_desc *elements; - }; - typedef const struct gss_key_value_set_struct gss_key_value_set_desc; - typedef const gss_key_value_set_desc *gss_const_key_value_set_t; - - OM_uint32 gss_acquire_cred_from(OM_uint32 *minor_status, - const gss_name_t desired_name, - OM_uint32 time_req, - const gss_OID_set desired_mechs, - gss_cred_usage_t cred_usage, - gss_const_key_value_set_t cred_store, - gss_cred_id_t *output_cred_handle, - gss_OID_set *actual_mechs, - OM_uint32 *time_rec); - - OM_uint32 gss_store_cred_into(OM_uint32 *minor_status, - gss_cred_id_t input_cred_handle, - gss_cred_usage_t cred_usage, - const gss_OID desired_mech, - OM_uint32 overwrite_cred, - OM_uint32 default_cred, - gss_const_key_value_set_t cred_store, - gss_OID_set *elements_stored, - gss_cred_usage_t *cred_usage_stored); - -The additional *cred_store* parameter allows the caller to specify -information about how the credentials should be obtained and stored. -The following options are supported by the krb5 mechanism: - -* **ccache**: For acquiring initiator credentials, the name of the - :ref:`credential cache <ccache_definition>` to which the handle will - refer. For storing credentials, the name of the cache or collection - where the credentials will be stored (see below). - -* **client_keytab**: For acquiring initiator credentials, the name of - the :ref:`keytab <keytab_definition>` which will be used, if - necessary, to refresh the credentials in the cache. - -* **keytab**: For acquiring acceptor credentials, the name of the - :ref:`keytab <keytab_definition>` to which the handle will refer. - In release 1.19 and later, this option also determines the keytab to - be used for verification when initiator credentials are acquired - using a password and verified. - -* **password**: For acquiring initiator credentials, this option - instructs the mechanism to acquire fresh credentials into a unique - memory credential cache. This option may not be used with the - **ccache** or **client_keytab** options, and a *desired_name* must - be specified. (New in release 1.19.) - -* **rcache**: For acquiring acceptor credentials, the name of the - :ref:`replay cache <rcache_definition>` to be used when processing - the initiator tokens. (New in release 1.13.) - -* **verify**: For acquiring initiator credentials, this option - instructs the mechanism to verify the credentials by obtaining a - ticket to a service with a known key. The service key is obtained - from the keytab specified with the **keytab** option or the default - keytab. The value may be the name of a principal in the keytab, or - the empty string. If the empty string is given, any ``host`` - service principal in the keytab may be used. (New in release 1.19.) - -In release 1.20 or later, if a collection name is specified for -**cache** in a call to gss_store_cred_into(), an existing cache for -the client principal within the collection will be selected, or a new -cache will be created within the collection. If *overwrite_cred* is -false and the selected credential cache already exists, a -**GSS_S_DUPLICATE_ELEMENT** error will be returned. If *default_cred* -is true, the primary cache of the collection will be switched to the -selected cache. - - -Importing and exporting credentials ------------------------------------ - -The following GSSAPI extensions can be used to import and export -credentials (declared in ``<gssapi/gssapi_ext.h>``):: - - OM_uint32 gss_export_cred(OM_uint32 *minor_status, - gss_cred_id_t cred_handle, - gss_buffer_t token); - - OM_uint32 gss_import_cred(OM_uint32 *minor_status, - gss_buffer_t token, - gss_cred_id_t *cred_handle); - -The first function serializes a GSSAPI credential handle into a -buffer; the second unseralizes a buffer into a GSSAPI credential -handle. Serializing a credential does not destroy it. If any of the -mechanisms used in *cred_handle* do not support serialization, -gss_export_cred will return **GSS_S_UNAVAILABLE**. As with other -GSSAPI serialization functions, these extensions are only intended to -work with a matching implementation on the other side; they do not -serialize credentials in a standardized format. - -A serialized credential may contain secret information such as ticket -session keys. The serialization format does not protect this -information from eavesdropping or tampering. The calling application -must take care to protect the serialized credential when communicating -it over an insecure channel or to an untrusted party. - -A krb5 GSSAPI credential may contain references to a credential cache, -a client keytab, an acceptor keytab, and a replay cache. These -resources are normally serialized as references to their external -locations (such as the filename of the credential cache). Because of -this, a serialized krb5 credential can only be imported by a process -with similar privileges to the exporter. A serialized credential -should not be trusted if it originates from a source with lower -privileges than the importer, as it may contain references to external -credential cache, keytab, or replay cache resources not accessible to -the originator. - -An exception to the above rule applies when a krb5 GSSAPI credential -refers to a memory credential cache, as is normally the case for -delegated credentials received by gss_accept_sec_context_. In this -case, the contents of the credential cache are serialized, so that the -resulting token may be imported even if the original memory credential -cache no longer exists. - - -Constrained delegation (S4U) ----------------------------- - -The Microsoft S4U2Self and S4U2Proxy Kerberos protocol extensions -allow an intermediate service to acquire credentials from a client to -a target service without requiring the client to delegate a -ticket-granting ticket, if the KDC is configured to allow it. - -To perform a constrained delegation operation, the intermediate -service must submit to the KDC an "evidence ticket" from the client to -the intermediate service. An evidence ticket can be acquired when the -client authenticates to the intermediate service with Kerberos, or -with an S4U2Self request if the KDC allows it. The MIT krb5 GSSAPI -library represents an evidence ticket using a "proxy credential", -which is a special kind of gss_cred_id_t object whose underlying -credential cache contains the evidence ticket and a krbtgt ticket for -the intermediate service. - -To acquire a proxy credential during client authentication, the -service should first create an acceptor credential using the -**GSS_C_BOTH** usage. The application should then pass this -credential as the *acceptor_cred_handle* to gss_accept_sec_context_, -and also pass a *delegated_cred_handle* output parameter to receive a -proxy credential containing the evidence ticket. The output value of -*delegated_cred_handle* may be a delegated ticket-granting ticket if -the client sent one, or a proxy credential if not. If the library can -determine that the client's ticket is not a valid evidence ticket, it -will place **GSS_C_NO_CREDENTIAL** in *delegated_cred_handle*. - -To acquire a proxy credential using an S4U2Self request, the service -can use the following GSSAPI extension:: - - OM_uint32 gss_acquire_cred_impersonate_name(OM_uint32 *minor_status, - gss_cred_id_t icred, - gss_name_t desired_name, - OM_uint32 time_req, - gss_OID_set desired_mechs, - gss_cred_usage_t cred_usage, - gss_cred_id_t *output_cred, - gss_OID_set *actual_mechs, - OM_uint32 *time_rec); - -The parameters to this function are similar to those of -gss_acquire_cred_, except that *icred* is used to make an S4U2Self -request to the KDC for a ticket from *desired_name* to the -intermediate service. Both *icred* and *desired_name* are required -for this function; passing **GSS_C_NO_CREDENTIAL** or -**GSS_C_NO_NAME** will cause the call to fail. *icred* must contain a -krbtgt ticket for the intermediate service. The result of this -operation is a proxy credential. (Prior to release 1.18, the result -of this operation may be a regular credential for *desired_name*, if -the KDC issues a non-forwardable ticket.) - -Once the intermediate service has a proxy credential, it can simply -pass it to gss_init_sec_context_ as the *initiator_cred_handle* -parameter, and the desired service as the *target_name* parameter. -The GSSAPI library will present the krbtgt ticket and evidence ticket -in the proxy credential to the KDC in an S4U2Proxy request; if the -intermediate service has the appropriate permissions, the KDC will -issue a ticket from the client to the target service. The GSSAPI -library will then use this ticket to authenticate to the target -service. - -If an application needs to find out whether a credential it holds is a -proxy credential and the name of the intermediate service, it can -query the credential with the **GSS_KRB5_GET_CRED_IMPERSONATOR** OID -(new in release 1.16, declared in ``<gssapi/gssapi_krb5.h>``) using -the gss_inquire_cred_by_oid extension (declared in -``<gssapi/gssapi_ext.h>``):: - - OM_uint32 gss_inquire_cred_by_oid(OM_uint32 *minor_status, - const gss_cred_id_t cred_handle, - gss_OID desired_object, - gss_buffer_set_t *data_set); - -If the call succeeds and *cred_handle* is a proxy credential, -*data_set* will be set to a single-element buffer set containing the -unparsed principal name of the intermediate service. If *cred_handle* -is not a proxy credential, *data_set* will be set to an empty buffer -set. If the library does not support the query, -gss_inquire_cred_by_oid will return **GSS_S_UNAVAILABLE**. - - -Channel binding behavior and GSS_C_CHANNEL_BOUND_FLAG ------------------------------------------------------ - -GSSAPI channel bindings can be used to limit the scope of a context -establishment token to a particular protected channel or endpoint, -such as a TLS channel or server certificate. Channel bindings can be -supplied via the *input_chan_bindings* parameter to either -gss_init_sec_context() or gss_accept_sec_context(). - -If both the initiator and acceptor of a GSSAPI exchange supply -matching channel bindings, **GSS_C_CHANNEL_BOUND_FLAG** will be -included in the gss_accept_sec_context() *ret_flags* result. If -either the initiator or acceptor (or both) do not supply channel -bindings, the exchange will succeed, but **GSS_C_CHANNEL_BOUND_FLAG** -will not be included in the return flags. If the acceptor and -initiator both inlude channel bindings but they do not match, the -exchange will fail. - -If **GSS_C_CHANNEL_BOUND_FLAG** is included in the *req_flags* -parameter of gss_init_sec_context(), the initiator will add the -Microsoft KERB_AP_OPTIONS_CBT extension to the Kerberos authenticator. -This extension requests that the acceptor strictly enforce channel -bindings, causing the exchange to fail if the acceptor supplies -channel bindings and the initiator does not. The KERB_AP_OPTIONS_CBT -extension will also be included if the -**client_aware_channel_bindings** variable is set to ``true`` in -:ref:`libdefaults`. - -Prior to release 1.19, **GSS_C_CHANNEL_BOUND_FLAG** is not -implemented, and the exchange will fail if the acceptor supply channel -bindings and the initiator does not (but not vice versa). Between -releases 1.19 and 1.21, **GSS_C_CHANNEL_BOUND_FLAG** is not recognized -as an initiator flag, so **client_aware_channel_bindings** is the only -way to cause KERB_AP_OPTIONS_CBT to be included. - - -AEAD message wrapping ---------------------- - -The following GSSAPI extensions (declared in -``<gssapi/gssapi_ext.h>``) can be used to wrap and unwrap messages -with additional "associated data" which is integrity-checked but is -not included in the output buffer:: - - OM_uint32 gss_wrap_aead(OM_uint32 *minor_status, - gss_ctx_id_t context_handle, - int conf_req_flag, gss_qop_t qop_req, - gss_buffer_t input_assoc_buffer, - gss_buffer_t input_payload_buffer, - int *conf_state, - gss_buffer_t output_message_buffer); - - OM_uint32 gss_unwrap_aead(OM_uint32 *minor_status, - gss_ctx_id_t context_handle, - gss_buffer_t input_message_buffer, - gss_buffer_t input_assoc_buffer, - gss_buffer_t output_payload_buffer, - int *conf_state, - gss_qop_t *qop_state); - -Wrap tokens created with gss_wrap_aead will successfully unwrap only -if the same *input_assoc_buffer* contents are presented to -gss_unwrap_aead. - - -IOV message wrapping --------------------- - -The following extensions (declared in ``<gssapi/gssapi_ext.h>``) can -be used for in-place encryption, fine-grained control over wrap token -layout, and for constructing wrap tokens compatible with Microsoft DCE -RPC:: - - typedef struct gss_iov_buffer_desc_struct { - OM_uint32 type; - gss_buffer_desc buffer; - } gss_iov_buffer_desc, *gss_iov_buffer_t; - - OM_uint32 gss_wrap_iov(OM_uint32 *minor_status, - gss_ctx_id_t context_handle, - int conf_req_flag, gss_qop_t qop_req, - int *conf_state, - gss_iov_buffer_desc *iov, int iov_count); - - OM_uint32 gss_unwrap_iov(OM_uint32 *minor_status, - gss_ctx_id_t context_handle, - int *conf_state, gss_qop_t *qop_state, - gss_iov_buffer_desc *iov, int iov_count); - - OM_uint32 gss_wrap_iov_length(OM_uint32 *minor_status, - gss_ctx_id_t context_handle, - int conf_req_flag, - gss_qop_t qop_req, int *conf_state, - gss_iov_buffer_desc *iov, - int iov_count); - - OM_uint32 gss_release_iov_buffer(OM_uint32 *minor_status, - gss_iov_buffer_desc *iov, - int iov_count); - -The caller of gss_wrap_iov provides an array of gss_iov_buffer_desc -structures, each containing a type and a gss_buffer_desc structure. -Valid types include: - -* **GSS_C_BUFFER_TYPE_DATA**: A data buffer to be included in the - token, and to be encrypted or decrypted in-place if the token is - confidentiality-protected. - -* **GSS_C_BUFFER_TYPE_HEADER**: The GSSAPI wrap token header and - underlying cryptographic header. - -* **GSS_C_BUFFER_TYPE_TRAILER**: The cryptographic trailer, if one is - required. - -* **GSS_C_BUFFER_TYPE_PADDING**: Padding to be combined with the data - during encryption and decryption. (The implementation may choose to - place padding in the trailer buffer, in which case it will set the - padding buffer length to 0.) - -* **GSS_C_BUFFER_TYPE_STREAM**: For unwrapping only, a buffer - containing a complete wrap token in standard format to be unwrapped. - -* **GSS_C_BUFFER_TYPE_SIGN_ONLY**: A buffer to be included in the - token's integrity protection checksum, but not to be encrypted or - included in the token itself. - -For gss_wrap_iov, the IOV list should contain one HEADER buffer, -followed by zero or more SIGN_ONLY buffers, followed by one or more -DATA buffers, followed by a TRAILER buffer. The memory pointed to by -the buffers is not required to be contiguous or in any particular -order. If *conf_req_flag* is true, DATA buffers will be encrypted -in-place, while SIGN_ONLY buffers will not be modified. - -The type of an output buffer may be combined with -**GSS_C_BUFFER_FLAG_ALLOCATE** to request that gss_wrap_iov allocate -the buffer contents. If gss_wrap_iov allocates a buffer, it sets the -**GSS_C_BUFFER_FLAG_ALLOCATED** flag on the buffer type. -gss_release_iov_buffer can be used to release all allocated buffers -within an iov list and unset their allocated flags. Here is an -example of how gss_wrap_iov can be used with allocation requested -(*ctx* is assumed to be a previously established gss_ctx_id_t):: - - OM_uint32 major, minor; - gss_iov_buffer_desc iov[4]; - char str[] = "message"; - - iov[0].type = GSS_IOV_BUFFER_TYPE_HEADER | GSS_IOV_BUFFER_FLAG_ALLOCATE; - iov[1].type = GSS_IOV_BUFFER_TYPE_DATA; - iov[1].buffer.value = str; - iov[1].buffer.length = strlen(str); - iov[2].type = GSS_IOV_BUFFER_TYPE_PADDING | GSS_IOV_BUFFER_FLAG_ALLOCATE; - iov[3].type = GSS_IOV_BUFFER_TYPE_TRAILER | GSS_IOV_BUFFER_FLAG_ALLOCATE; - - major = gss_wrap_iov(&minor, ctx, 1, GSS_C_QOP_DEFAULT, NULL, - iov, 4); - if (GSS_ERROR(major)) - handle_error(major, minor); - - /* Transmit or otherwise use resulting buffers. */ - - (void)gss_release_iov_buffer(&minor, iov, 4); - -If the caller does not choose to request buffer allocation by -gss_wrap_iov, it should first call gss_wrap_iov_length to query the -lengths of the HEADER, PADDING, and TRAILER buffers. DATA buffers -must be provided in the iov list so that padding length can be -computed correctly, but the output buffers need not be initialized. -Here is an example of using gss_wrap_iov_length and gss_wrap_iov:: - - OM_uint32 major, minor; - gss_iov_buffer_desc iov[4]; - char str[1024] = "message", *ptr; - - iov[0].type = GSS_IOV_BUFFER_TYPE_HEADER; - iov[1].type = GSS_IOV_BUFFER_TYPE_DATA; - iov[1].buffer.value = str; - iov[1].buffer.length = strlen(str); - - iov[2].type = GSS_IOV_BUFFER_TYPE_PADDING; - iov[3].type = GSS_IOV_BUFFER_TYPE_TRAILER; - - major = gss_wrap_iov_length(&minor, ctx, 1, GSS_C_QOP_DEFAULT, - NULL, iov, 4); - if (GSS_ERROR(major)) - handle_error(major, minor); - if (strlen(str) + iov[0].buffer.length + iov[2].buffer.length + - iov[3].buffer.length > sizeof(str)) - handle_out_of_space_error(); - ptr = str + strlen(str); - iov[0].buffer.value = ptr; - ptr += iov[0].buffer.length; - iov[2].buffer.value = ptr; - ptr += iov[2].buffer.length; - iov[3].buffer.value = ptr; - - major = gss_wrap_iov(&minor, ctx, 1, GSS_C_QOP_DEFAULT, NULL, - iov, 4); - if (GSS_ERROR(major)) - handle_error(major, minor); - -If the context was established using the **GSS_C_DCE_STYLE** flag -(described in :rfc:`4757`), wrap tokens compatible with Microsoft DCE -RPC can be constructed. In this case, the IOV list must include a -SIGN_ONLY buffer, a DATA buffer, a second SIGN_ONLY buffer, and a -HEADER buffer in that order (the order of the buffer contents remains -arbitrary). The application must pad the DATA buffer to a multiple of -16 bytes as no padding or trailer buffer is used. - -gss_unwrap_iov may be called with an IOV list just like one which -would be provided to gss_wrap_iov. DATA buffers will be decrypted -in-place if they were encrypted, and SIGN_ONLY buffers will not be -modified. - -Alternatively, gss_unwrap_iov may be called with a single STREAM -buffer, zero or more SIGN_ONLY buffers, and a single DATA buffer. The -STREAM buffer is interpreted as a complete wrap token. The STREAM -buffer will be modified in-place to decrypt its contents. The DATA -buffer will be initialized to point to the decrypted data within the -STREAM buffer, unless it has the **GSS_C_BUFFER_FLAG_ALLOCATE** flag -set, in which case it will be initialized with a copy of the decrypted -data. Here is an example (*token* and *token_len* are assumed to be a -pre-existing pointer and length for a modifiable region of data):: - - OM_uint32 major, minor; - gss_iov_buffer_desc iov[2]; - - iov[0].type = GSS_IOV_BUFFER_TYPE_STREAM; - iov[0].buffer.value = token; - iov[0].buffer.length = token_len; - iov[1].type = GSS_IOV_BUFFER_TYPE_DATA; - major = gss_unwrap_iov(&minor, ctx, NULL, NULL, iov, 2); - if (GSS_ERROR(major)) - handle_error(major, minor); - - /* Decrypted data is in iov[1].buffer, pointing to a subregion of - * token. */ - -.. _gssapi_mic_token: - -IOV MIC tokens --------------- - -The following extensions (declared in ``<gssapi/gssapi_ext.h>``) can -be used in release 1.12 or later to construct and verify MIC tokens -using an IOV list:: - - OM_uint32 gss_get_mic_iov(OM_uint32 *minor_status, - gss_ctx_id_t context_handle, - gss_qop_t qop_req, - gss_iov_buffer_desc *iov, - int iov_count); - - OM_uint32 gss_get_mic_iov_length(OM_uint32 *minor_status, - gss_ctx_id_t context_handle, - gss_qop_t qop_req, - gss_iov_buffer_desc *iov, - iov_count); - - OM_uint32 gss_verify_mic_iov(OM_uint32 *minor_status, - gss_ctx_id_t context_handle, - gss_qop_t *qop_state, - gss_iov_buffer_desc *iov, - int iov_count); - -The caller of gss_get_mic_iov provides an array of gss_iov_buffer_desc -structures, each containing a type and a gss_buffer_desc structure. -Valid types include: - -* **GSS_C_BUFFER_TYPE_DATA** and **GSS_C_BUFFER_TYPE_SIGN_ONLY**: The - corresponding buffer for each of these types will be signed for the - MIC token, in the order provided. - -* **GSS_C_BUFFER_TYPE_MIC_TOKEN**: The GSSAPI MIC token. - -The type of the MIC_TOKEN buffer may be combined with -**GSS_C_BUFFER_FLAG_ALLOCATE** to request that gss_get_mic_iov -allocate the buffer contents. If gss_get_mic_iov allocates the -buffer, it sets the **GSS_C_BUFFER_FLAG_ALLOCATED** flag on the buffer -type. gss_release_iov_buffer can be used to release all allocated -buffers within an iov list and unset their allocated flags. Here is -an example of how gss_get_mic_iov can be used with allocation -requested (*ctx* is assumed to be a previously established -gss_ctx_id_t):: - - OM_uint32 major, minor; - gss_iov_buffer_desc iov[3]; - - iov[0].type = GSS_IOV_BUFFER_TYPE_DATA; - iov[0].buffer.value = "sign1"; - iov[0].buffer.length = 5; - iov[1].type = GSS_IOV_BUFFER_TYPE_SIGN_ONLY; - iov[1].buffer.value = "sign2"; - iov[1].buffer.length = 5; - iov[2].type = GSS_IOV_BUFFER_TYPE_MIC_TOKEN | GSS_IOV_BUFFER_FLAG_ALLOCATE; - - major = gss_get_mic_iov(&minor, ctx, GSS_C_QOP_DEFAULT, iov, 3); - if (GSS_ERROR(major)) - handle_error(major, minor); - - /* Transmit or otherwise use iov[2].buffer. */ - - (void)gss_release_iov_buffer(&minor, iov, 3); - -If the caller does not choose to request buffer allocation by -gss_get_mic_iov, it should first call gss_get_mic_iov_length to query -the length of the MIC_TOKEN buffer. Here is an example of using -gss_get_mic_iov_length and gss_get_mic_iov:: - - OM_uint32 major, minor; - gss_iov_buffer_desc iov[2]; - char data[1024]; - - iov[0].type = GSS_IOV_BUFFER_TYPE_MIC_TOKEN; - iov[1].type = GSS_IOV_BUFFER_TYPE_DATA; - iov[1].buffer.value = "message"; - iov[1].buffer.length = 7; - - major = gss_get_mic_iov_length(&minor, ctx, GSS_C_QOP_DEFAULT, iov, 2); - if (GSS_ERROR(major)) - handle_error(major, minor); - if (iov[0].buffer.length > sizeof(data)) - handle_out_of_space_error(); - iov[0].buffer.value = data; - - major = gss_get_mic_iov(&minor, ctx, GSS_C_QOP_DEFAULT, iov, 2); - if (GSS_ERROR(major)) - handle_error(major, minor); - - -.. _gss_accept_sec_context: https://tools.ietf.org/html/rfc2744.html#section-5.1 -.. _gss_acquire_cred: https://tools.ietf.org/html/rfc2744.html#section-5.2 -.. _gss_export_name: https://tools.ietf.org/html/rfc2744.html#section-5.13 -.. _gss_get_name_attribute: https://tools.ietf.org/html/6680.html#section-7.5 -.. _gss_import_name: https://tools.ietf.org/html/rfc2744.html#section-5.16 -.. _gss_init_sec_context: https://tools.ietf.org/html/rfc2744.html#section-5.19 -.. _gss_inquire_name: https://tools.ietf.org/html/rfc6680.txt#section-7.4 -.. _gss_inquire_cred: https://tools.ietf.org/html/rfc2744.html#section-5.21 diff --git a/crypto/krb5/doc/html/_sources/appdev/h5l_mit_apidiff.rst.txt b/crypto/krb5/doc/html/_sources/appdev/h5l_mit_apidiff.rst.txt deleted file mode 100644 index b721b57be689..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/h5l_mit_apidiff.rst.txt +++ /dev/null @@ -1,28 +0,0 @@ -Differences between Heimdal and MIT Kerberos API -================================================ - -.. tabularcolumns:: |l|l| - -.. table:: - - ======================================== ================================================= - :c:func:`krb5_auth_con_getaddrs()` H5l: If either of the pointers to local_addr - and remote_addr is not NULL, it is freed - first and then reallocated before being - populated with the content of corresponding - address from authentication context. - :c:func:`krb5_auth_con_setaddrs()` H5l: If either address is NULL, the previous - address remains in place - :c:func:`krb5_auth_con_setports()` H5l: Not implemented as of version 1.3.3 - :c:func:`krb5_auth_con_setrecvsubkey()` H5l: If either port is NULL, the previous - port remains in place - :c:func:`krb5_auth_con_setsendsubkey()` H5l: Not implemented as of version 1.3.3 - :c:func:`krb5_cc_set_config()` MIT: Before version 1.10 it was assumed that - the last argument *data* is ALWAYS non-zero. - :c:func:`krb5_cccol_last_change_time()` MIT: not implemented - :c:func:`krb5_set_default_realm()` H5l: Caches the computed default realm context - field. If the second argument is NULL, - it tries to retrieve it from libdefaults or DNS. - MIT: Computes the default realm each time - if it wasn't explicitly set in the context - ======================================== ================================================= diff --git a/crypto/krb5/doc/html/_sources/appdev/index.rst.txt b/crypto/krb5/doc/html/_sources/appdev/index.rst.txt deleted file mode 100644 index 961bb1e9e23a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/index.rst.txt +++ /dev/null @@ -1,16 +0,0 @@ -For application developers -========================== - -.. toctree:: - :maxdepth: 1 - - gssapi.rst - y2038.rst - h5l_mit_apidiff.rst - init_creds.rst - princ_handle.rst - -.. toctree:: - :maxdepth: 1 - - refs/index.rst diff --git a/crypto/krb5/doc/html/_sources/appdev/init_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/init_creds.rst.txt deleted file mode 100644 index 5c3c0a87c5da..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/init_creds.rst.txt +++ /dev/null @@ -1,304 +0,0 @@ -Initial credentials -=================== - -Software that performs tasks such as logging users into a computer -when they type their Kerberos password needs to get initial -credentials (usually ticket granting tickets) from Kerberos. Such -software shares some behavior with the :ref:`kinit(1)` program. - -Whenever a program grants access to a resource (such as a local login -session on a desktop computer) based on a user successfully getting -initial Kerberos credentials, it must verify those credentials against -a secure shared secret (e.g., a host keytab) to ensure that the user -credentials actually originate from a legitimate KDC. Failure to -perform this verification is a critical vulnerability, because a -malicious user can execute the "Zanarotti attack": the user constructs -a fake response that appears to come from the legitimate KDC, but -whose contents come from an attacker-controlled KDC. - -Some applications read a Kerberos password over the network (ideally -over a secure channel), which they then verify against the KDC. While -this technique may be the only practical way to integrate Kerberos -into some existing legacy systems, its use is contrary to the original -design goals of Kerberos. - -The function :c:func:`krb5_get_init_creds_password` will get initial -credentials for a client using a password. An application that needs -to verify the credentials can call :c:func:`krb5_verify_init_creds`. -Here is an example of code to obtain and verify TGT credentials, given -strings *princname* and *password* for the client principal name and -password:: - - krb5_error_code ret; - krb5_creds creds; - krb5_principal client_princ = NULL; - - memset(&creds, 0, sizeof(creds)); - ret = krb5_parse_name(context, princname, &client_princ); - if (ret) - goto cleanup; - ret = krb5_get_init_creds_password(context, &creds, client_princ, - password, NULL, NULL, 0, NULL, NULL); - if (ret) - goto cleanup; - ret = krb5_verify_init_creds(context, &creds, NULL, NULL, NULL, NULL); - - cleanup: - krb5_free_principal(context, client_princ); - krb5_free_cred_contents(context, &creds); - return ret; - -Options for get_init_creds --------------------------- - -The function :c:func:`krb5_get_init_creds_password` takes an options -parameter (which can be a null pointer). Use the function -:c:func:`krb5_get_init_creds_opt_alloc` to allocate an options -structure, and :c:func:`krb5_get_init_creds_opt_free` to free it. For -example:: - - krb5_error_code ret; - krb5_get_init_creds_opt *opt = NULL; - krb5_creds creds; - - memset(&creds, 0, sizeof(creds)); - ret = krb5_get_init_creds_opt_alloc(context, &opt); - if (ret) - goto cleanup; - krb5_get_init_creds_opt_set_tkt_life(opt, 24 * 60 * 60); - ret = krb5_get_init_creds_password(context, &creds, client_princ, - password, NULL, NULL, 0, NULL, opt); - if (ret) - goto cleanup; - - cleanup: - krb5_get_init_creds_opt_free(context, opt); - krb5_free_cred_contents(context, &creds); - return ret; - -Getting anonymous credentials ------------------------------ - -As of release 1.8, it is possible to obtain fully anonymous or -partially anonymous (realm-exposed) credentials, if the KDC supports -it. The MIT KDC supports issuing fully anonymous credentials as of -release 1.8 if configured appropriately (see :ref:`anonymous_pkinit`), -but does not support issuing realm-exposed anonymous credentials at -this time. - -To obtain fully anonymous credentials, call -:c:func:`krb5_get_init_creds_opt_set_anonymous` on the options -structure to set the anonymous flag, and specify a client principal -with the KDC's realm and a single empty data component (the principal -obtained by parsing ``@``\ *realmname*). Authentication will take -place using anonymous PKINIT; if successful, the client principal of -the resulting tickets will be -``WELLKNOWN/ANONYMOUS@WELLKNOWN:ANONYMOUS``. Here is an example:: - - krb5_get_init_creds_opt_set_anonymous(opt, 1); - ret = krb5_build_principal(context, &client_princ, strlen(myrealm), - myrealm, "", (char *)NULL); - if (ret) - goto cleanup; - ret = krb5_get_init_creds_password(context, &creds, client_princ, - password, NULL, NULL, 0, NULL, opt); - if (ret) - goto cleanup; - -To obtain realm-exposed anonymous credentials, set the anonymous flag -on the options structure as above, but specify a normal client -principal in order to prove membership in the realm. Authentication -will take place as it normally does; if successful, the client -principal of the resulting tickets will be ``WELLKNOWN/ANONYMOUS@``\ -*realmname*. - -User interaction ----------------- - -Authenticating a user usually requires the entry of secret -information, such as a password. A password can be supplied directly -to :c:func:`krb5_get_init_creds_password` via the *password* -parameter, or the application can supply prompter and/or responder -callbacks instead. If callbacks are used, the user can also be -queried for other secret information such as a PIN, informed of -impending password expiration, or prompted to change a password which -has expired. - -Prompter callback -~~~~~~~~~~~~~~~~~ - -A prompter callback can be specified via the *prompter* and *data* -parameters to :c:func:`krb5_get_init_creds_password`. The prompter -will be invoked each time the krb5 library has a question to ask or -information to present. When the prompter callback is invoked, the -*banner* argument (if not null) is intended to be displayed to the -user, and the questions to be answered are specified in the *prompts* -array. Each prompt contains a text question in the *prompt* field, a -*hidden* bit to indicate whether the answer should be hidden from -display, and a storage area for the answer in the *reply* field. The -callback should fill in each question's ``reply->data`` with the -answer, up to a maximum number of ``reply->length`` bytes, and then -reset ``reply->length`` to the length of the answer. - -A prompter callback can call :c:func:`krb5_get_prompt_types` to get an -array of type constants corresponding to the prompts, to get -programmatic information about the semantic meaning of the questions. -:c:func:`krb5_get_prompt_types` may return a null pointer if no prompt -type information is available. - -Text-based applications can use a built-in text prompter -implementation by supplying :c:func:`krb5_prompter_posix` as the -*prompter* parameter and a null pointer as the *data* parameter. For -example:: - - ret = krb5_get_init_creds_password(context, &creds, client_princ, - NULL, krb5_prompter_posix, NULL, 0, - NULL, NULL); - -Responder callback -~~~~~~~~~~~~~~~~~~ - -A responder callback can be specified through the init_creds options -using the :c:func:`krb5_get_init_creds_opt_set_responder` function. -Responder callbacks can present a more sophisticated user interface -for authentication secrets. The responder callback is usually invoked -only once per authentication, with a list of questions produced by all -of the allowed preauthentication mechanisms. - -When the responder callback is invoked, the *rctx* argument can be -accessed to obtain the list of questions and to answer them. The -:c:func:`krb5_responder_list_questions` function retrieves an array of -question types. For each question type, the -:c:func:`krb5_responder_get_challenge` function retrieves additional -information about the question, if applicable, and the -:c:func:`krb5_responder_set_answer` function sets the answer. - -Responder question types, challenges, and answers are UTF-8 strings. -The question type is a well-known string; the meaning of the challenge -and answer depend on the question type. If an application does not -understand a question type, it cannot interpret the challenge or -provide an answer. Failing to answer a question typically results in -the prompter callback being used as a fallback. - -Password question -################# - -The :c:macro:`KRB5_RESPONDER_QUESTION_PASSWORD` (or ``"password"``) -question type requests the user's password. This question does not -have a challenge, and the response is simply the password string. - -One-time password question -########################## - -The :c:macro:`KRB5_RESPONDER_QUESTION_OTP` (or ``"otp"``) question -type requests a choice among one-time password tokens and the PIN and -value for the chosen token. The challenge and answer are JSON-encoded -strings, but an application can use convenience functions to avoid -doing any JSON processing itself. - -The :c:func:`krb5_responder_otp_get_challenge` function decodes the -challenge into a krb5_responder_otp_challenge structure. The -:c:func:`krb5_responder_otp_set_answer` function selects one of the -token information elements from the challenge and supplies the value -and pin for that token. - -PKINIT password or PIN question -############################### - -The :c:macro:`KRB5_RESPONDER_QUESTION_PKINIT` (or ``"pkinit"``) question -type requests PINs for hardware devices and/or passwords for encrypted -credentials which are stored on disk, potentially also supplying -information about the state of the hardware devices. The challenge and -answer are JSON-encoded strings, but an application can use convenience -functions to avoid doing any JSON processing itself. - -The :c:func:`krb5_responder_pkinit_get_challenge` function decodes the -challenges into a krb5_responder_pkinit_challenge structure. The -:c:func:`krb5_responder_pkinit_set_answer` function can be used to -supply the PIN or password for a particular client credential, and can -be called multiple times. - -Example -####### - -Here is an example of using a responder callback:: - - static krb5_error_code - my_responder(krb5_context context, void *data, - krb5_responder_context rctx) - { - krb5_error_code ret; - krb5_responder_otp_challenge *chl; - - if (krb5_responder_get_challenge(context, rctx, - KRB5_RESPONDER_QUESTION_PASSWORD)) { - ret = krb5_responder_set_answer(context, rctx, - KRB5_RESPONDER_QUESTION_PASSWORD, - "open sesame"); - if (ret) - return ret; - } - ret = krb5_responder_otp_get_challenge(context, rctx, &chl); - if (ret == 0 && chl != NULL) { - ret = krb5_responder_otp_set_answer(context, rctx, 0, "1234", - NULL); - krb5_responder_otp_challenge_free(context, rctx, chl); - if (ret) - return ret; - } - return 0; - } - - static krb5_error_code - get_creds(krb5_context context, krb5_principal client_princ) - { - krb5_error_code ret; - krb5_get_init_creds_opt *opt = NULL; - krb5_creds creds; - - memset(&creds, 0, sizeof(creds)); - ret = krb5_get_init_creds_opt_alloc(context, &opt); - if (ret) - goto cleanup; - ret = krb5_get_init_creds_opt_set_responder(context, opt, my_responder, - NULL); - if (ret) - goto cleanup; - ret = krb5_get_init_creds_password(context, &creds, client_princ, - NULL, NULL, NULL, 0, NULL, opt); - - cleanup: - krb5_get_init_creds_opt_free(context, opt); - krb5_free_cred_contents(context, &creds); - return ret; - } - -Verifying initial credentials ------------------------------ - -Use the function :c:func:`krb5_verify_init_creds` to verify initial -credentials. It takes an options structure (which can be a null -pointer). Use :c:func:`krb5_verify_init_creds_opt_init` to initialize -the caller-allocated options structure, and -:c:func:`krb5_verify_init_creds_opt_set_ap_req_nofail` to set the -"nofail" option. For example:: - - krb5_verify_init_creds_opt vopt; - - krb5_verify_init_creds_opt_init(&vopt); - krb5_verify_init_creds_opt_set_ap_req_nofail(&vopt, 1); - ret = krb5_verify_init_creds(context, &creds, NULL, NULL, NULL, &vopt); - -The confusingly named "nofail" option, when set, means that the -verification must actually succeed in order for -:c:func:`krb5_verify_init_creds` to indicate success. The default -state of this option (cleared) means that if there is no key material -available to verify the user credentials, the verification will -succeed anyway. (The default can be changed by a configuration file -setting.) - -This accommodates a use case where a large number of unkeyed shared -desktop workstations need to allow users to log in using Kerberos. -The security risks from this practice are mitigated by the absence of -valuable state on the shared workstations---any valuable resources -that the users would access reside on networked servers. diff --git a/crypto/krb5/doc/html/_sources/appdev/princ_handle.rst.txt b/crypto/krb5/doc/html/_sources/appdev/princ_handle.rst.txt deleted file mode 100644 index 455f00a4b6e7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/princ_handle.rst.txt +++ /dev/null @@ -1,79 +0,0 @@ -Principal manipulation and parsing -================================== - -Kerberos principal structure - -.. - -:c:type:`krb5_principal_data` - -:c:type:`krb5_principal` - -.. - -Create and free principal - -.. - -:c:func:`krb5_build_principal()` - -:c:func:`krb5_build_principal_alloc_va()` - -:c:func:`krb5_build_principal_ext()` - -:c:func:`krb5_copy_principal()` - -:c:func:`krb5_free_principal()` - -:c:func:`krb5_cc_get_principal()` - -.. - -Comparing - -.. - -:c:func:`krb5_principal_compare()` - -:c:func:`krb5_principal_compare_flags()` - -:c:func:`krb5_principal_compare_any_realm()` - -:c:func:`krb5_sname_match()` - -:c:func:`krb5_sname_to_principal()` - -.. - - -Parsing: - -.. - -:c:func:`krb5_parse_name()` - -:c:func:`krb5_parse_name_flags()` - -:c:func:`krb5_unparse_name()` - -:c:func:`krb5_unparse_name_flags()` - -.. - -Utilities: - -.. - -:c:func:`krb5_is_config_principal()` - -:c:func:`krb5_kuserok()` - -:c:func:`krb5_set_password()` - -:c:func:`krb5_set_password_using_ccache()` - -:c:func:`krb5_set_principal_realm()` - -:c:func:`krb5_realm_compare()` - -.. diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/index.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/index.rst.txt deleted file mode 100644 index 648dc2ed9933..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/index.rst.txt +++ /dev/null @@ -1,415 +0,0 @@ -krb5 API -======== - - -Frequently used public interfaces ----------------------------------- - -.. toctree:: - :maxdepth: 1 - - krb5_build_principal.rst - krb5_build_principal_alloc_va.rst - krb5_build_principal_ext.rst - krb5_cc_close.rst - krb5_cc_default.rst - krb5_cc_default_name.rst - krb5_cc_destroy.rst - krb5_cc_dup.rst - krb5_cc_get_name.rst - krb5_cc_get_principal.rst - krb5_cc_get_type.rst - krb5_cc_initialize.rst - krb5_cc_new_unique.rst - krb5_cc_resolve.rst - krb5_change_password.rst - krb5_chpw_message.rst - krb5_expand_hostname.rst - krb5_free_config_files.rst - krb5_free_context.rst - krb5_free_error_message.rst - krb5_free_principal.rst - krb5_fwd_tgt_creds.rst - krb5_get_default_realm.rst - krb5_get_error_message.rst - krb5_get_host_realm.rst - krb5_get_credentials.rst - krb5_get_default_config_files.rst - krb5_get_fallback_host_realm.rst - krb5_get_init_creds_keytab.rst - krb5_get_init_creds_opt_alloc.rst - krb5_get_init_creds_opt_free.rst - krb5_get_init_creds_opt_get_fast_flags.rst - krb5_get_init_creds_opt_set_address_list.rst - krb5_get_init_creds_opt_set_anonymous.rst - krb5_get_init_creds_opt_set_canonicalize.rst - krb5_get_init_creds_opt_set_change_password_prompt.rst - krb5_get_init_creds_opt_set_etype_list.rst - krb5_get_init_creds_opt_set_expire_callback.rst - krb5_get_init_creds_opt_set_fast_ccache.rst - krb5_get_init_creds_opt_set_fast_ccache_name.rst - krb5_get_init_creds_opt_set_fast_flags.rst - krb5_get_init_creds_opt_set_forwardable.rst - krb5_get_init_creds_opt_set_in_ccache.rst - krb5_get_init_creds_opt_set_out_ccache.rst - krb5_get_init_creds_opt_set_pa.rst - krb5_get_init_creds_opt_set_pac_request.rst - krb5_get_init_creds_opt_set_preauth_list.rst - krb5_get_init_creds_opt_set_proxiable.rst - krb5_get_init_creds_opt_set_renew_life.rst - krb5_get_init_creds_opt_set_responder.rst - krb5_get_init_creds_opt_set_salt.rst - krb5_get_init_creds_opt_set_tkt_life.rst - krb5_get_init_creds_password.rst - krb5_get_profile.rst - krb5_get_prompt_types.rst - krb5_get_renewed_creds.rst - krb5_get_validated_creds.rst - krb5_init_context.rst - krb5_init_secure_context.rst - krb5_is_config_principal.rst - krb5_is_thread_safe.rst - krb5_kt_close.rst - krb5_kt_client_default.rst - krb5_kt_default.rst - krb5_kt_default_name.rst - krb5_kt_dup.rst - krb5_kt_get_name.rst - krb5_kt_get_type.rst - krb5_kt_resolve.rst - krb5_kuserok.rst - krb5_parse_name.rst - krb5_parse_name_flags.rst - krb5_principal_compare.rst - krb5_principal_compare_any_realm.rst - krb5_principal_compare_flags.rst - krb5_prompter_posix.rst - krb5_realm_compare.rst - krb5_responder_get_challenge.rst - krb5_responder_list_questions.rst - krb5_responder_set_answer.rst - krb5_responder_otp_get_challenge.rst - krb5_responder_otp_set_answer.rst - krb5_responder_otp_challenge_free.rst - krb5_responder_pkinit_get_challenge.rst - krb5_responder_pkinit_set_answer.rst - krb5_responder_pkinit_challenge_free.rst - krb5_set_default_realm.rst - krb5_set_password.rst - krb5_set_password_using_ccache.rst - krb5_set_principal_realm.rst - krb5_set_trace_callback.rst - krb5_set_trace_filename.rst - krb5_sname_match.rst - krb5_sname_to_principal.rst - krb5_unparse_name.rst - krb5_unparse_name_ext.rst - krb5_unparse_name_flags.rst - krb5_unparse_name_flags_ext.rst - krb5_us_timeofday.rst - krb5_verify_authdata_kdc_issued.rst - -Rarely used public interfaces --------------------------------- - -.. toctree:: - :maxdepth: 1 - - krb5_425_conv_principal.rst - krb5_524_conv_principal.rst - krb5_address_compare.rst - krb5_address_order.rst - krb5_address_search.rst - krb5_allow_weak_crypto.rst - krb5_aname_to_localname.rst - krb5_anonymous_principal.rst - krb5_anonymous_realm.rst - krb5_appdefault_boolean.rst - krb5_appdefault_string.rst - krb5_auth_con_free.rst - krb5_auth_con_genaddrs.rst - krb5_auth_con_get_checksum_func.rst - krb5_auth_con_getaddrs.rst - krb5_auth_con_getauthenticator.rst - krb5_auth_con_getflags.rst - krb5_auth_con_getkey.rst - krb5_auth_con_getkey_k.rst - krb5_auth_con_getlocalseqnumber.rst - krb5_auth_con_getrcache.rst - krb5_auth_con_getrecvsubkey.rst - krb5_auth_con_getrecvsubkey_k.rst - krb5_auth_con_getremoteseqnumber.rst - krb5_auth_con_getsendsubkey.rst - krb5_auth_con_getsendsubkey_k.rst - krb5_auth_con_init.rst - krb5_auth_con_set_checksum_func.rst - krb5_auth_con_set_req_cksumtype.rst - krb5_auth_con_setaddrs.rst - krb5_auth_con_setflags.rst - krb5_auth_con_setports.rst - krb5_auth_con_setrcache.rst - krb5_auth_con_setrecvsubkey.rst - krb5_auth_con_setrecvsubkey_k.rst - krb5_auth_con_setsendsubkey.rst - krb5_auth_con_setsendsubkey_k.rst - krb5_auth_con_setuseruserkey.rst - krb5_cc_cache_match.rst - krb5_cc_copy_creds.rst - krb5_cc_end_seq_get.rst - krb5_cc_get_config.rst - krb5_cc_get_flags.rst - krb5_cc_get_full_name.rst - krb5_cc_move.rst - krb5_cc_next_cred.rst - krb5_cc_remove_cred.rst - krb5_cc_retrieve_cred.rst - krb5_cc_select.rst - krb5_cc_set_config.rst - krb5_cc_set_default_name.rst - krb5_cc_set_flags.rst - krb5_cc_start_seq_get.rst - krb5_cc_store_cred.rst - krb5_cc_support_switch.rst - krb5_cc_switch.rst - krb5_cccol_cursor_free.rst - krb5_cccol_cursor_new.rst - krb5_cccol_cursor_next.rst - krb5_cccol_have_content.rst - krb5_clear_error_message.rst - krb5_check_clockskew.rst - krb5_copy_addresses.rst - krb5_copy_authdata.rst - krb5_copy_authenticator.rst - krb5_copy_checksum.rst - krb5_copy_context.rst - krb5_copy_creds.rst - krb5_copy_data.rst - krb5_copy_error_message.rst - krb5_copy_keyblock.rst - krb5_copy_keyblock_contents.rst - krb5_copy_principal.rst - krb5_copy_ticket.rst - krb5_find_authdata.rst - krb5_free_addresses.rst - krb5_free_ap_rep_enc_part.rst - krb5_free_authdata.rst - krb5_free_authenticator.rst - krb5_free_cred_contents.rst - krb5_free_creds.rst - krb5_free_data.rst - krb5_free_data_contents.rst - krb5_free_default_realm.rst - krb5_free_enctypes.rst - krb5_free_error.rst - krb5_free_host_realm.rst - krb5_free_keyblock.rst - krb5_free_keyblock_contents.rst - krb5_free_keytab_entry_contents.rst - krb5_free_string.rst - krb5_free_ticket.rst - krb5_free_unparsed_name.rst - krb5_get_etype_info.rst - krb5_get_permitted_enctypes.rst - krb5_get_server_rcache.rst - krb5_get_time_offsets.rst - krb5_init_context_profile.rst - krb5_init_creds_free.rst - krb5_init_creds_get.rst - krb5_init_creds_get_creds.rst - krb5_init_creds_get_error.rst - krb5_init_creds_get_times.rst - krb5_init_creds_init.rst - krb5_init_creds_set_keytab.rst - krb5_init_creds_set_password.rst - krb5_init_creds_set_service.rst - krb5_init_creds_step.rst - krb5_init_keyblock.rst - krb5_is_referral_realm.rst - krb5_kdc_sign_ticket.rst - krb5_kdc_verify_ticket.rst - krb5_kt_add_entry.rst - krb5_kt_end_seq_get.rst - krb5_kt_get_entry.rst - krb5_kt_have_content.rst - krb5_kt_next_entry.rst - krb5_kt_read_service_key.rst - krb5_kt_remove_entry.rst - krb5_kt_start_seq_get.rst - krb5_make_authdata_kdc_issued.rst - krb5_marshal_credentials.rst - krb5_merge_authdata.rst - krb5_mk_1cred.rst - krb5_mk_error.rst - krb5_mk_ncred.rst - krb5_mk_priv.rst - krb5_mk_rep.rst - krb5_mk_rep_dce.rst - krb5_mk_req.rst - krb5_mk_req_extended.rst - krb5_mk_safe.rst - krb5_os_localaddr.rst - krb5_pac_add_buffer.rst - krb5_pac_free.rst - krb5_pac_get_buffer.rst - krb5_pac_get_types.rst - krb5_pac_init.rst - krb5_pac_parse.rst - krb5_pac_sign.rst - krb5_pac_sign_ext.rst - krb5_pac_verify.rst - krb5_pac_verify_ext.rst - krb5_pac_get_client_info.rst - krb5_prepend_error_message.rst - krb5_principal2salt.rst - krb5_rd_cred.rst - krb5_rd_error.rst - krb5_rd_priv.rst - krb5_rd_rep.rst - krb5_rd_rep_dce.rst - krb5_rd_req.rst - krb5_rd_safe.rst - krb5_read_password.rst - krb5_salttype_to_string.rst - krb5_server_decrypt_ticket_keytab.rst - krb5_set_default_tgs_enctypes.rst - krb5_set_error_message.rst - krb5_set_kdc_recv_hook.rst - krb5_set_kdc_send_hook.rst - krb5_set_real_time.rst - krb5_string_to_cksumtype.rst - krb5_string_to_deltat.rst - krb5_string_to_enctype.rst - krb5_string_to_salttype.rst - krb5_string_to_timestamp.rst - krb5_timeofday.rst - krb5_timestamp_to_sfstring.rst - krb5_timestamp_to_string.rst - krb5_tkt_creds_free.rst - krb5_tkt_creds_get.rst - krb5_tkt_creds_get_creds.rst - krb5_tkt_creds_get_times.rst - krb5_tkt_creds_init.rst - krb5_tkt_creds_step.rst - krb5_unmarshal_credentials.rst - krb5_verify_init_creds.rst - krb5_verify_init_creds_opt_init.rst - krb5_verify_init_creds_opt_set_ap_req_nofail.rst - krb5_vprepend_error_message.rst - krb5_vset_error_message.rst - krb5_vwrap_error_message.rst - krb5_wrap_error_message.rst - - -Public interfaces that should not be called directly -------------------------------------------------------- - -.. toctree:: - :maxdepth: 1 - - krb5_c_block_size.rst - krb5_c_checksum_length.rst - krb5_c_crypto_length.rst - krb5_c_crypto_length_iov.rst - krb5_c_decrypt.rst - krb5_c_decrypt_iov.rst - krb5_c_derive_prfplus.rst - krb5_c_encrypt.rst - krb5_c_encrypt_iov.rst - krb5_c_encrypt_length.rst - krb5_c_enctype_compare.rst - krb5_c_free_state.rst - krb5_c_fx_cf2_simple.rst - krb5_c_init_state.rst - krb5_c_is_coll_proof_cksum.rst - krb5_c_is_keyed_cksum.rst - krb5_c_keyed_checksum_types.rst - krb5_c_keylengths.rst - krb5_c_make_checksum.rst - krb5_c_make_checksum_iov.rst - krb5_c_make_random_key.rst - krb5_c_padding_length.rst - krb5_c_prf.rst - krb5_c_prfplus.rst - krb5_c_prf_length.rst - krb5_c_random_add_entropy.rst - krb5_c_random_make_octets.rst - krb5_c_random_os_entropy.rst - krb5_c_random_to_key.rst - krb5_c_string_to_key.rst - krb5_c_string_to_key_with_params.rst - krb5_c_valid_cksumtype.rst - krb5_c_valid_enctype.rst - krb5_c_verify_checksum.rst - krb5_c_verify_checksum_iov.rst - krb5_cksumtype_to_string.rst - krb5_decode_authdata_container.rst - krb5_decode_ticket.rst - krb5_deltat_to_string.rst - krb5_encode_authdata_container.rst - krb5_enctype_to_name.rst - krb5_enctype_to_string.rst - krb5_free_checksum.rst - krb5_free_checksum_contents.rst - krb5_free_cksumtypes.rst - krb5_free_tgt_creds.rst - krb5_k_create_key.rst - krb5_k_decrypt.rst - krb5_k_decrypt_iov.rst - krb5_k_encrypt.rst - krb5_k_encrypt_iov.rst - krb5_k_free_key.rst - krb5_k_key_enctype.rst - krb5_k_key_keyblock.rst - krb5_k_make_checksum.rst - krb5_k_make_checksum_iov.rst - krb5_k_prf.rst - krb5_k_reference_key.rst - krb5_k_verify_checksum.rst - krb5_k_verify_checksum_iov.rst - - -Legacy convenience interfaces ------------------------------- - -.. toctree:: - :maxdepth: 1 - - krb5_recvauth.rst - krb5_recvauth_version.rst - krb5_sendauth.rst - - -Deprecated public interfaces ------------------------------- - -.. toctree:: - :maxdepth: 1 - - krb5_524_convert_creds.rst - krb5_auth_con_getlocalsubkey.rst - krb5_auth_con_getremotesubkey.rst - krb5_auth_con_initivector.rst - krb5_build_principal_va.rst - krb5_c_random_seed.rst - krb5_calculate_checksum.rst - krb5_checksum_size.rst - krb5_encrypt.rst - krb5_decrypt.rst - krb5_eblock_enctype.rst - krb5_encrypt_size.rst - krb5_finish_key.rst - krb5_finish_random_key.rst - krb5_cc_gen_new.rst - krb5_get_credentials_renew.rst - krb5_get_credentials_validate.rst - krb5_get_in_tkt_with_password.rst - krb5_get_in_tkt_with_skey.rst - krb5_get_in_tkt_with_keytab.rst - krb5_get_init_creds_opt_init.rst - krb5_init_random_key.rst - krb5_kt_free_entry.rst - krb5_random_key.rst - krb5_process_key.rst - krb5_string_to_key.rst - krb5_use_enctype.rst - krb5_verify_checksum.rst diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_425_conv_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_425_conv_principal.rst.txt deleted file mode 100644 index 6673b5bde865..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_425_conv_principal.rst.txt +++ /dev/null @@ -1,59 +0,0 @@ -krb5_425_conv_principal - Convert a Kerberos V4 principal to a Kerberos V5 principal. -======================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_425_conv_principal(krb5_context context, const char * name, const char * instance, const char * realm, krb5_principal * princ) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **name** - V4 name - - **[in]** **instance** - V4 instance - - **[in]** **realm** - Realm - - **[out]** **princ** - V5 principal - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function builds a *princ* from V4 specification based on given input *name.instance@realm* . - - - -Use krb5_free_principal() to free *princ* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_524_conv_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_524_conv_principal.rst.txt deleted file mode 100644 index 14b2fc10137e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_524_conv_principal.rst.txt +++ /dev/null @@ -1,60 +0,0 @@ -krb5_524_conv_principal - Convert a Kerberos V5 principal to a Kerberos V4 principal. -======================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_524_conv_principal(krb5_context context, krb5_const_principal princ, char * name, char * inst, char * realm) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **princ** - V5 Principal - - **[out]** **name** - V4 principal's name to be filled in - - **[out]** **inst** - V4 principal's instance name to be filled in - - **[out]** **realm** - Principal's realm name to be filled in - - -.. - - -:retval: - - 0 Success - - KRB5_INVALID_PRINCIPAL Invalid principal name - - KRB5_CONFIG_CANTOPEN Can't open or find Kerberos configuration file - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function separates a V5 principal *princ* into *name* , *instance* , and *realm* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_524_convert_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_524_convert_creds.rst.txt deleted file mode 100644 index f8d96f0da7a1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_524_convert_creds.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_524_convert_creds - Convert a Kerberos V5 credentials to a Kerberos V4 credentials. -========================================================================================== - -.. - -.. c:function:: int krb5_524_convert_creds(krb5_context context, krb5_creds * v5creds, struct credentials * v4creds) - -.. - - -:param: - - **context** - - **v5creds** - - **v4creds** - - -.. - - -:retval: - - KRB524_KRB4_DISABLED (always) - - -.. - - - - - - - - - - - - - - -.. - - - - - - -.. note:: - - Not implemented - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_address_compare.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_address_compare.rst.txt deleted file mode 100644 index 7665fc705c2e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_address_compare.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_address_compare - Compare two Kerberos addresses. -======================================================== - -.. - -.. c:function:: krb5_boolean krb5_address_compare(krb5_context context, const krb5_address * addr1, const krb5_address * addr2) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **addr1** - First address to be compared - - **[in]** **addr2** - Second address to be compared - - -.. - - - -:return: - - TRUE if the addresses are the same, FALSE otherwise - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_address_order.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_address_order.rst.txt deleted file mode 100644 index 2ba9aab67bbf..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_address_order.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_address_order - Return an ordering of the specified addresses. -===================================================================== - -.. - -.. c:function:: int krb5_address_order(krb5_context context, const krb5_address * addr1, const krb5_address * addr2) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **addr1** - First address - - **[in]** **addr2** - Second address - - -.. - - -:retval: - - 0 if The two addresses are the same - - < 0 First address is less than second - - > 0 First address is greater than second - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_address_search.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_address_search.rst.txt deleted file mode 100644 index 2bc68c490111..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_address_search.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_address_search - Search a list of addresses for a specified address. -=========================================================================== - -.. - -.. c:function:: krb5_boolean krb5_address_search(krb5_context context, const krb5_address * addr, krb5_address *const * addrlist) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **addr** - Address to search for - - **[in]** **addrlist** - Address list to be searched (or NULL) - - -.. - - - -:return: - - TRUE if addr is listed in addrlist , or addrlist is NULL; FALSE otherwise - -.. - - - - - - - - - - - - - - -.. - - - - - - -.. note:: - - If *addrlist* contains only a NetBIOS addresses, it will be treated as a null list. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_allow_weak_crypto.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_allow_weak_crypto.rst.txt deleted file mode 100644 index 87e69ed281d4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_allow_weak_crypto.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_allow_weak_crypto - Allow the application to override the profile's allow_weak_crypto setting. -===================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_allow_weak_crypto(krb5_context context, krb5_boolean enable) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enable** - Boolean flag - - -.. - - -:retval: - - 0 (always) - - -.. - - - - - - - -This function allows an application to override the allow_weak_crypto setting. It is primarily for use by aklog. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_aname_to_localname.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_aname_to_localname.rst.txt deleted file mode 100644 index c6162940839d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_aname_to_localname.rst.txt +++ /dev/null @@ -1,61 +0,0 @@ -krb5_aname_to_localname - Convert a principal name to a local name. -===================================================================== - -.. - -.. c:function:: krb5_error_code krb5_aname_to_localname(krb5_context context, krb5_const_principal aname, int lnsize_in, char * lname) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **aname** - Principal name - - **[in]** **lnsize_in** - Space available in *lname* - - **[out]** **lname** - Local name buffer to be filled in - - -.. - - -:retval: - - 0 Success - - System errors - - -:return: - - Kerberos error codes - -.. - - - - - - - -If *aname* does not correspond to any local account, KRB5_LNAME_NOTRANS is returned. If *lnsize_in* is too small for the local name, KRB5_CONFIG_NOTENUFSPACE is returned. - - - -Local names, rather than principal names, can be used by programs that translate to an environment-specific name (for example, a user account name). - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_principal.rst.txt deleted file mode 100644 index 658eb36e5a6e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_principal.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_anonymous_principal - Build an anonymous principal. -========================================================== - -.. - -.. c:function:: krb5_const_principal krb5_anonymous_principal(void None) - -.. - - -:param: - - **None** - - -.. - - - -.. - - - - - - - -This function returns constant storage that must not be freed. - - - - - - - - - - -.. - -.. seealso:: - KRB5_ANONYMOUS_PRINCSTR - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_realm.rst.txt deleted file mode 100644 index f2d1b5f5540f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_anonymous_realm.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_anonymous_realm - Return an anonymous realm data. -======================================================== - -.. - -.. c:function:: const krb5_data * krb5_anonymous_realm(void None) - -.. - - -:param: - - **None** - - -.. - - - -.. - - - - - - - -This function returns constant storage that must not be freed. - - - - - - - - - - -.. - -.. seealso:: - KRB5_ANONYMOUS_REALMSTR - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_appdefault_boolean.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_appdefault_boolean.rst.txt deleted file mode 100644 index 60802e5be065..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_appdefault_boolean.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_appdefault_boolean - Retrieve a boolean value from the appdefaults section of krb5.conf. -=============================================================================================== - -.. - -.. c:function:: void krb5_appdefault_boolean(krb5_context context, const char * appname, const krb5_data * realm, const char * option, int default_value, int * ret_value) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **appname** - Application name - - **[in]** **realm** - Realm name - - **[in]** **option** - Option to be checked - - **[in]** **default_value** - Default value to return if no match is found - - **[out]** **ret_value** - Boolean value of *option* - - -.. - - - -.. - - - - - - - -This function gets the application defaults for *option* based on the given *appname* and/or *realm* . - - - - - - - - - - -.. - -.. seealso:: - krb5_appdefault_string() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_appdefault_string.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_appdefault_string.rst.txt deleted file mode 100644 index 1909f1b3f8b3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_appdefault_string.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_appdefault_string - Retrieve a string value from the appdefaults section of krb5.conf. -============================================================================================= - -.. - -.. c:function:: void krb5_appdefault_string(krb5_context context, const char * appname, const krb5_data * realm, const char * option, const char * default_value, char ** ret_value) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **appname** - Application name - - **[in]** **realm** - Realm name - - **[in]** **option** - Option to be checked - - **[in]** **default_value** - Default value to return if no match is found - - **[out]** **ret_value** - String value of *option* - - -.. - - - -.. - - - - - - - -This function gets the application defaults for *option* based on the given *appname* and/or *realm* . - - - - - - - - - - -.. - -.. seealso:: - krb5_appdefault_boolean() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_free.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_free.rst.txt deleted file mode 100644 index 93a8d690fb5d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_free.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_auth_con_free - Free a krb5_auth_context structure. -========================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_free(krb5_context context, krb5_auth_context auth_context) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context to be freed - - -.. - - -:retval: - - 0 (always) - - -.. - - - - - - - -This function frees an auth context allocated by krb5_auth_con_init(). - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_genaddrs.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_genaddrs.rst.txt deleted file mode 100644 index d84399972211..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_genaddrs.rst.txt +++ /dev/null @@ -1,66 +0,0 @@ -krb5_auth_con_genaddrs - Generate auth context addresses from a connected socket. -=================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_genaddrs(krb5_context context, krb5_auth_context auth_context, int infd, int flags) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **infd** - Connected socket descriptor - - **[in]** **flags** - Flags - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function sets the local and/or remote addresses in *auth_context* based on the local and remote endpoints of the socket *infd* . The following flags determine the operations performed: - - - - - - - KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR Generate local address. - - - - KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR Generate remote address. - - - - KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR Generate local address and port. - - - - KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR Generate remote address and port. - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_get_checksum_func.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_get_checksum_func.rst.txt deleted file mode 100644 index e3a427427ffd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_get_checksum_func.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_auth_con_get_checksum_func - Get the checksum callback from an auth context. -=================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_get_checksum_func(krb5_context context, krb5_auth_context auth_context, krb5_mk_req_checksum_func * func, void ** data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[out]** **func** - Checksum callback - - **[out]** **data** - Callback argument - - -.. - - -:retval: - - 0 (always) - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getaddrs.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getaddrs.rst.txt deleted file mode 100644 index 1225294092e5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getaddrs.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_auth_con_getaddrs - Retrieve address fields from an auth context. -======================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getaddrs(krb5_context context, krb5_auth_context auth_context, krb5_address ** local_addr, krb5_address ** remote_addr) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[out]** **local_addr** - Local address (NULL if not needed) - - **[out]** **remote_addr** - Remote address (NULL if not needed) - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getauthenticator.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getauthenticator.rst.txt deleted file mode 100644 index 0e67df91bdbc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getauthenticator.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_getauthenticator - Retrieve the authenticator from an auth context. -=================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getauthenticator(krb5_context context, krb5_auth_context auth_context, krb5_authenticator ** authenticator) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[out]** **authenticator** - Authenticator - - -.. - - -:retval: - - 0 Success. Otherwise - Kerberos error codes - - -.. - - - - - - - -Use krb5_free_authenticator() to free *authenticator* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getflags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getflags.rst.txt deleted file mode 100644 index e7a9fbc1b9cf..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getflags.rst.txt +++ /dev/null @@ -1,60 +0,0 @@ -krb5_auth_con_getflags - Retrieve flags from a krb5_auth_context structure. -============================================================================= - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getflags(krb5_context context, krb5_auth_context auth_context, krb5_int32 * flags) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[out]** **flags** - Flags bit mask - - -.. - - -:retval: - - 0 (always) - - -.. - - - - - - - -Valid values for *flags* are: - - - KRB5_AUTH_CONTEXT_DO_TIME Use timestamps - - - - KRB5_AUTH_CONTEXT_RET_TIME Save timestamps - - - - KRB5_AUTH_CONTEXT_DO_SEQUENCE Use sequence numbers - - - - KRB5_AUTH_CONTEXT_RET_SEQUENCE Save sequence numbers - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getkey.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getkey.rst.txt deleted file mode 100644 index b5abc85536ec..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getkey.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_getkey - Retrieve the session key from an auth context as a keyblock. -===================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock ** keyblock) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[out]** **keyblock** - Session key - - -.. - - -:retval: - - 0 Success. Otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a keyblock containing the session key from *auth_context* . Use krb5_free_keyblock() to free *keyblock* when it is no longer needed - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getkey_k.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getkey_k.rst.txt deleted file mode 100644 index 4d87db9232d3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getkey_k.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_getkey_k - Retrieve the session key from an auth context. -========================================================================= - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getkey_k(krb5_context context, krb5_auth_context auth_context, krb5_key * key) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[out]** **key** - Session key - - -.. - - -:retval: - - 0 (always) - - -.. - - - - - - - -This function sets *key* to the session key from *auth_context* . Use krb5_k_free_key() to release *key* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getlocalseqnumber.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getlocalseqnumber.rst.txt deleted file mode 100644 index 957f89755033..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getlocalseqnumber.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_getlocalseqnumber - Retrieve the local sequence number from an auth context. -============================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getlocalseqnumber(krb5_context context, krb5_auth_context auth_context, krb5_int32 * seqnumber) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[out]** **seqnumber** - Local sequence number - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Retrieve the local sequence number from *auth_context* and return it in *seqnumber* . The KRB5_AUTH_CONTEXT_DO_SEQUENCE flag must be set in *auth_context* for this function to be useful. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getlocalsubkey.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getlocalsubkey.rst.txt deleted file mode 100644 index a938d7495f62..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getlocalsubkey.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_auth_con_getlocalsubkey -============================ - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getlocalsubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock ** keyblock) - -.. - - -:param: - - **context** - - **auth_context** - - **keyblock** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_auth_con_getsendsubkey(). - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getrcache.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getrcache.rst.txt deleted file mode 100644 index c50663643508..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getrcache.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_getrcache - Retrieve the replay cache from an auth context. -=========================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getrcache(krb5_context context, krb5_auth_context auth_context, krb5_rcache * rcache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[out]** **rcache** - Replay cache handle - - -.. - - -:retval: - - 0 (always) - - -.. - - - - - - - -This function fetches the replay cache from *auth_context* . The caller should not close *rcache* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getrecvsubkey.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getrecvsubkey.rst.txt deleted file mode 100644 index ece6d0c1529d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getrecvsubkey.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_getrecvsubkey - Retrieve the receiving subkey from an auth context as a keyblock. -================================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getrecvsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock ** keyblock) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **ac** - Authentication context - - **[out]** **keyblock** - Receiving subkey - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a keyblock containing the receiving subkey from *auth_context* . Use krb5_free_keyblock() to free *keyblock* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getrecvsubkey_k.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getrecvsubkey_k.rst.txt deleted file mode 100644 index 7caf5b03f92e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getrecvsubkey_k.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_getrecvsubkey_k - Retrieve the receiving subkey from an auth context as a keyblock. -=================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getrecvsubkey_k(krb5_context ctx, krb5_auth_context ac, krb5_key * key) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **ac** - Authentication context - - **[out]** **key** - Receiving subkey - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function sets *key* to the receiving subkey from *auth_context* . Use krb5_k_free_key() to release *key* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getremoteseqnumber.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getremoteseqnumber.rst.txt deleted file mode 100644 index 61bcef6583b3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getremoteseqnumber.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_getremoteseqnumber - Retrieve the remote sequence number from an auth context. -============================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getremoteseqnumber(krb5_context context, krb5_auth_context auth_context, krb5_int32 * seqnumber) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[out]** **seqnumber** - Remote sequence number - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Retrieve the remote sequence number from *auth_context* and return it in *seqnumber* . The KRB5_AUTH_CONTEXT_DO_SEQUENCE flag must be set in *auth_context* for this function to be useful. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getremotesubkey.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getremotesubkey.rst.txt deleted file mode 100644 index 25f42d905ed1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getremotesubkey.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_auth_con_getremotesubkey -============================= - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getremotesubkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock ** keyblock) - -.. - - -:param: - - **context** - - **auth_context** - - **keyblock** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_auth_con_getrecvsubkey(). - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getsendsubkey.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getsendsubkey.rst.txt deleted file mode 100644 index fa7c6cf9b2c9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getsendsubkey.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_getsendsubkey - Retrieve the send subkey from an auth context as a keyblock. -============================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getsendsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock ** keyblock) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **ac** - Authentication context - - **[out]** **keyblock** - Send subkey - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a keyblock containing the send subkey from *auth_context* . Use krb5_free_keyblock() to free *keyblock* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getsendsubkey_k.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getsendsubkey_k.rst.txt deleted file mode 100644 index bfbbf574955f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_getsendsubkey_k.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_getsendsubkey_k - Retrieve the send subkey from an auth context. -================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_auth_con_getsendsubkey_k(krb5_context ctx, krb5_auth_context ac, krb5_key * key) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **ac** - Authentication context - - **[out]** **key** - Send subkey - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function sets *key* to the send subkey from *auth_context* . Use krb5_k_free_key() to release *key* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_init.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_init.rst.txt deleted file mode 100644 index 58bec34929f6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_init.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_auth_con_init - Create and initialize an authentication context. -======================================================================= - -.. - -.. c:function:: krb5_error_code krb5_auth_con_init(krb5_context context, krb5_auth_context * auth_context) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **auth_context** - Authentication context - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates an authentication context to hold configuration and state relevant to krb5 functions for authenticating principals and protecting messages once authentication has occurred. - - - -By default, flags for the context are set to enable the use of the replay cache (KRB5_AUTH_CONTEXT_DO_TIME), but not sequence numbers. Use krb5_auth_con_setflags() to change the flags. - - - -The allocated *auth_context* must be freed with krb5_auth_con_free() when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_initivector.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_initivector.rst.txt deleted file mode 100644 index 31e8403db8eb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_initivector.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_auth_con_initivector - Cause an auth context to use cipher state. -======================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_initivector(krb5_context context, krb5_auth_context auth_context) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Prepare *auth_context* to use cipher state when krb5_mk_priv() or krb5_rd_priv() encrypt or decrypt data. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_set_checksum_func.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_set_checksum_func.rst.txt deleted file mode 100644 index c7f19f0d8eff..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_set_checksum_func.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_auth_con_set_checksum_func - Set a checksum callback in an auth context. -=============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_set_checksum_func(krb5_context context, krb5_auth_context auth_context, krb5_mk_req_checksum_func func, void * data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **func** - Checksum callback - - **[in]** **data** - Callback argument - - -.. - - -:retval: - - 0 (always) - - -.. - - - - - - - -Set a callback to obtain checksum data in krb5_mk_req(). The callback will be invoked after the subkey and local sequence number are stored in *auth_context* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_set_req_cksumtype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_set_req_cksumtype.rst.txt deleted file mode 100644 index 4a79bfd6e5f6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_set_req_cksumtype.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_set_req_cksumtype - Set checksum type in an an auth context. -============================================================================ - -.. - -.. c:function:: krb5_error_code krb5_auth_con_set_req_cksumtype(krb5_context context, krb5_auth_context auth_context, krb5_cksumtype cksumtype) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **cksumtype** - Checksum type - - -.. - - -:retval: - - 0 Success. Otherwise - Kerberos error codes - - -.. - - - - - - - -This function sets the checksum type in *auth_context* to be used by krb5_mk_req() for the authenticator checksum. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setaddrs.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setaddrs.rst.txt deleted file mode 100644 index 0a9a8e805ae0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setaddrs.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_auth_con_setaddrs - Set the local and remote addresses in an auth context. -================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_auth_con_setaddrs(krb5_context context, krb5_auth_context auth_context, krb5_address * local_addr, krb5_address * remote_addr) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **local_addr** - Local address - - **[in]** **remote_addr** - Remote address - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function releases the storage assigned to the contents of the local and remote addresses of *auth_context* and then sets them to *local_addr* and *remote_addr* respectively. - - - - - - - - - - -.. - -.. seealso:: - krb5_auth_con_genaddrs() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setflags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setflags.rst.txt deleted file mode 100644 index e376185e987b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setflags.rst.txt +++ /dev/null @@ -1,60 +0,0 @@ -krb5_auth_con_setflags - Set a flags field in a krb5_auth_context structure. -============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_setflags(krb5_context context, krb5_auth_context auth_context, krb5_int32 flags) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **flags** - Flags bit mask - - -.. - - -:retval: - - 0 (always) - - -.. - - - - - - - -Valid values for *flags* are: - - - KRB5_AUTH_CONTEXT_DO_TIME Use timestamps - - - - KRB5_AUTH_CONTEXT_RET_TIME Save timestamps - - - - KRB5_AUTH_CONTEXT_DO_SEQUENCE Use sequence numbers - - - - KRB5_AUTH_CONTEXT_RET_SEQUENCE Save sequence numbers - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setports.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setports.rst.txt deleted file mode 100644 index e64c42193cfb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setports.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_auth_con_setports - Set local and remote port fields in an auth context. -=============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_setports(krb5_context context, krb5_auth_context auth_context, krb5_address * local_port, krb5_address * remote_port) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **local_port** - Local port - - **[in]** **remote_port** - Remote port - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function releases the storage assigned to the contents of the local and remote ports of *auth_context* and then sets them to *local_port* and *remote_port* respectively. - - - - - - - - - - -.. - -.. seealso:: - krb5_auth_con_genaddrs() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setrcache.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setrcache.rst.txt deleted file mode 100644 index 0a37e8aef22c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setrcache.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_setrcache - Set the replay cache in an auth context. -==================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_setrcache(krb5_context context, krb5_auth_context auth_context, krb5_rcache rcache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **rcache** - Replay cache haddle - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function sets the replay cache in *auth_context* to *rcache* . *rcache* will be closed when *auth_context* is freed, so the caller should relinquish that responsibility. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setrecvsubkey.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setrecvsubkey.rst.txt deleted file mode 100644 index 7e43d9148dcd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setrecvsubkey.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_setrecvsubkey - Set the receiving subkey in an auth context with a keyblock. -============================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_auth_con_setrecvsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock * keyblock) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **ac** - Authentication context - - **[in]** **keyblock** - Receiving subkey - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function sets the receiving subkey in *ac* to a copy of *keyblock* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setrecvsubkey_k.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setrecvsubkey_k.rst.txt deleted file mode 100644 index feafaabff0b4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setrecvsubkey_k.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_auth_con_setrecvsubkey_k - Set the receiving subkey in an auth context. -============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_setrecvsubkey_k(krb5_context ctx, krb5_auth_context ac, krb5_key key) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **ac** - Authentication context - - **[in]** **key** - Receiving subkey - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function sets the receiving subkey in *ac* to *key* , incrementing its reference count. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setsendsubkey.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setsendsubkey.rst.txt deleted file mode 100644 index 47f746b57035..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setsendsubkey.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_auth_con_setsendsubkey - Set the send subkey in an auth context with a keyblock. -======================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_auth_con_setsendsubkey(krb5_context ctx, krb5_auth_context ac, krb5_keyblock * keyblock) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **ac** - Authentication context - - **[in]** **keyblock** - Send subkey - - -.. - - -:retval: - - 0 Success. Otherwise - Kerberos error codes - - -.. - - - - - - - -This function sets the send subkey in *ac* to a copy of *keyblock* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setsendsubkey_k.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setsendsubkey_k.rst.txt deleted file mode 100644 index 59fd7392b96a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setsendsubkey_k.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_auth_con_setsendsubkey_k - Set the send subkey in an auth context. -========================================================================= - -.. - -.. c:function:: krb5_error_code krb5_auth_con_setsendsubkey_k(krb5_context ctx, krb5_auth_context ac, krb5_key key) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **ac** - Authentication context - - **[out]** **key** - Send subkey - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function sets the send subkey in *ac* to *key* , incrementing its reference count. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setuseruserkey.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setuseruserkey.rst.txt deleted file mode 100644 index 11d9249dd9b5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_auth_con_setuseruserkey.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_auth_con_setuseruserkey - Set the session key in an auth context. -======================================================================== - -.. - -.. c:function:: krb5_error_code krb5_auth_con_setuseruserkey(krb5_context context, krb5_auth_context auth_context, krb5_keyblock * keyblock) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **keyblock** - User key - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal.rst.txt deleted file mode 100644 index fddcb462de8c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal.rst.txt +++ /dev/null @@ -1,72 +0,0 @@ -krb5_build_principal - Build a principal name using null-terminated strings. -============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_build_principal(krb5_context context, krb5_principal * princ, unsigned int rlen, const char * realm, ... ) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **princ** - Principal name - - **[in]** **rlen** - Realm name length - - **[in]** **realm** - Realm name - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Call krb5_free_principal() to free *princ* when it is no longer needed. - - - -Beginning with release 1.20, the name type of the principal will be inferred as **KRB5_NT_SRV_INST** or **KRB5_NT_WELLKNOWN** based on the principal name. The type will be **KRB5_NT_PRINCIPAL** if a type cannot be inferred. - - - - - - - - - - - - - - -.. - - - - - - -.. note:: - - krb5_build_principal() and krb5_build_principal_alloc_va() perform the same task. krb5_build_principal() takes variadic arguments. krb5_build_principal_alloc_va() takes a pre-computed *varargs* pointer. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal_alloc_va.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal_alloc_va.rst.txt deleted file mode 100644 index 904f41612006..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal_alloc_va.rst.txt +++ /dev/null @@ -1,66 +0,0 @@ -krb5_build_principal_alloc_va - Build a principal name, using a precomputed variable argument list. -===================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_build_principal_alloc_va(krb5_context context, krb5_principal * princ, unsigned int rlen, const char * realm, va_list ap) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **princ** - Principal structure - - **[in]** **rlen** - Realm name length - - **[in]** **realm** - Realm name - - **[in]** **ap** - List of char * components, ending with NULL - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Similar to krb5_build_principal(), this function builds a principal name, but its name components are specified as a va_list. - - - -Use krb5_free_principal() to deallocate *princ* when it is no longer needed. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal_ext.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal_ext.rst.txt deleted file mode 100644 index 6f1b3ba61057..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal_ext.rst.txt +++ /dev/null @@ -1,64 +0,0 @@ -krb5_build_principal_ext - Build a principal name using length-counted strings. -================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_build_principal_ext(krb5_context context, krb5_principal * princ, unsigned int rlen, const char * realm, ... ) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **princ** - Principal name - - **[in]** **rlen** - Realm name length - - **[in]** **realm** - Realm name - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function creates a principal from a length-counted string and a variable-length list of length-counted components. The list of components ends with the first 0 length argument (so it is not possible to specify an empty component with this function). Call krb5_free_principal() to free allocated memory for principal when it is no longer needed. - - - -Beginning with release 1.20, the name type of the principal will be inferred as **KRB5_NT_SRV_INST** or **KRB5_NT_WELLKNOWN** based on the principal name. The type will be **KRB5_NT_PRINCIPAL** if a type cannot be inferred. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal_va.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal_va.rst.txt deleted file mode 100644 index a30c39f11d01..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_build_principal_va.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -krb5_build_principal_va -======================= - -.. - -.. c:function:: krb5_error_code krb5_build_principal_va(krb5_context context, krb5_principal princ, unsigned int rlen, const char * realm, va_list ap) - -.. - - -:param: - - **context** - - **princ** - - **rlen** - - **realm** - - **ap** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_build_principal_alloc_va(). - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_block_size.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_block_size.rst.txt deleted file mode 100644 index 4c4a13eafaab..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_block_size.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_c_block_size - Return cipher block size. -=============================================== - -.. - -.. c:function:: krb5_error_code krb5_c_block_size(krb5_context context, krb5_enctype enctype, size_t * blocksize) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[out]** **blocksize** - Block size for *enctype* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_checksum_length.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_checksum_length.rst.txt deleted file mode 100644 index 644e34bf2b9a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_checksum_length.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_c_checksum_length - Return the length of checksums for a checksum type. -============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_checksum_length(krb5_context context, krb5_cksumtype cksumtype, size_t * length) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cksumtype** - Checksum type - - **[out]** **length** - Checksum length - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_crypto_length.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_crypto_length.rst.txt deleted file mode 100644 index 5a38d3b0c480..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_crypto_length.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_c_crypto_length - Return a length of a message field specific to the encryption type. -============================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_c_crypto_length(krb5_context context, krb5_enctype enctype, krb5_cryptotype type, unsigned int * size) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[in]** **type** - Type field (See KRB5_CRYPTO_TYPE macros) - - **[out]** **size** - Length of the *type* specific to *enctype* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_crypto_length_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_crypto_length_iov.rst.txt deleted file mode 100644 index 238d04e9ca55..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_crypto_length_iov.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_c_crypto_length_iov - Fill in lengths for header, trailer and padding in a IOV array. -============================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_c_crypto_length_iov(krb5_context context, krb5_enctype enctype, krb5_crypto_iov * data, size_t num_data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[inout]** **data** - IOV array - - **[in]** **num_data** - Size of *data* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Padding is set to the actual padding required based on the provided *data* buffers. Typically this API is used after setting up the data buffers and KRB5_CRYPTO_TYPE_SIGN_ONLY buffers, but before actually allocating header, trailer and padding. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_decrypt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_decrypt.rst.txt deleted file mode 100644 index e8371559db62..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_decrypt.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -krb5_c_decrypt - Decrypt data using a key (operates on keyblock). -=================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_decrypt(krb5_context context, const krb5_keyblock * key, krb5_keyusage usage, const krb5_data * cipher_state, const krb5_enc_data * input, krb5_data * output) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Encryption key - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[inout]** **cipher_state** - Cipher state; specify NULL if not needed - - **[in]** **input** - Encrypted data - - **[out]** **output** - Decrypted data - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function decrypts the data block *input* and stores the output into *output* . The actual decryption key will be derived from *key* and *usage* if key derivation is specified for the encryption type. If non-null, *cipher_state* specifies the beginning state for the decryption operation, and is updated with the state to be passed as input to the next operation. - - - - - - - - - - -.. - - - - - - -.. note:: - - The caller must initialize *output* and allocate at least enough space for the result. The usual practice is to allocate an output buffer as long as the ciphertext, and let krb5_c_decrypt() trim *output->length* . For some enctypes, the resulting *output->length* may include padding bytes. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_decrypt_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_decrypt_iov.rst.txt deleted file mode 100644 index 96dd9a258caf..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_decrypt_iov.rst.txt +++ /dev/null @@ -1,68 +0,0 @@ -krb5_c_decrypt_iov - Decrypt data in place supporting AEAD (operates on keyblock). -==================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_decrypt_iov(krb5_context context, const krb5_keyblock * keyblock, krb5_keyusage usage, const krb5_data * cipher_state, krb5_crypto_iov * data, size_t num_data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keyblock** - Encryption key - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[in]** **cipher_state** - Cipher state; specify NULL if not needed - - **[inout]** **data** - IOV array. Modified in-place. - - **[in]** **num_data** - Size of *data* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function decrypts the data block *data* and stores the output in-place. The actual decryption key will be derived from *keyblock* and *usage* if key derivation is specified for the encryption type. If non-null, *cipher_state* specifies the beginning state for the decryption operation, and is updated with the state to be passed as input to the next operation. The caller must allocate the right number of krb5_crypto_iov structures before calling into this API. - - - - - - - - - - -.. - -.. seealso:: - krb5_c_decrypt_iov() - - - - - - -.. note:: - - On return from a krb5_c_decrypt_iov() call, the *data->length* in the iov structure are adjusted to reflect actual lengths of the ciphertext used. For example, if the padding length is too large, the length will be reduced. Lengths are never increased. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_derive_prfplus.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_derive_prfplus.rst.txt deleted file mode 100644 index fdb62c501b24..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_derive_prfplus.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_c_derive_prfplus - Derive a key using some input data (via RFC 6113 PRF+). -================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_c_derive_prfplus(krb5_context context, const krb5_keyblock * k, const krb5_data * input, krb5_enctype enctype, krb5_keyblock ** out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **k** - KDC contribution key - - **[in]** **input** - Input string - - **[in]** **enctype** - Output key enctype (or **ENCTYPE_NULL** ) - - **[out]** **out** - Derived keyblock - - -.. - - - -.. - - - - - - - -This function uses PRF+ as defined in RFC 6113 to derive a key from another key and an input string. If *enctype* is **ENCTYPE_NULL** , the output key will have the same enctype as the input key. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt.rst.txt deleted file mode 100644 index d3a12af8df76..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -krb5_c_encrypt - Encrypt data using a key (operates on keyblock). -=================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_encrypt(krb5_context context, const krb5_keyblock * key, krb5_keyusage usage, const krb5_data * cipher_state, const krb5_data * input, krb5_enc_data * output) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Encryption key - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[inout]** **cipher_state** - Cipher state; specify NULL if not needed - - **[in]** **input** - Data to be encrypted - - **[out]** **output** - Encrypted data - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function encrypts the data block *input* and stores the output into *output* . The actual encryption key will be derived from *key* and *usage* if key derivation is specified for the encryption type. If non-null, *cipher_state* specifies the beginning state for the encryption operation, and is updated with the state to be passed as input to the next operation. - - - - - - - - - - -.. - - - - - - -.. note:: - - The caller must initialize *output* and allocate at least enough space for the result (using krb5_c_encrypt_length() to determine the amount of space needed). *output->length* will be set to the actual length of the ciphertext. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt_iov.rst.txt deleted file mode 100644 index 619bc8c54b40..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt_iov.rst.txt +++ /dev/null @@ -1,68 +0,0 @@ -krb5_c_encrypt_iov - Encrypt data in place supporting AEAD (operates on keyblock). -==================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_encrypt_iov(krb5_context context, const krb5_keyblock * keyblock, krb5_keyusage usage, const krb5_data * cipher_state, krb5_crypto_iov * data, size_t num_data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keyblock** - Encryption key - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[in]** **cipher_state** - Cipher state; specify NULL if not needed - - **[inout]** **data** - IOV array. Modified in-place. - - **[in]** **num_data** - Size of *data* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function encrypts the data block *data* and stores the output in-place. The actual encryption key will be derived from *keyblock* and *usage* if key derivation is specified for the encryption type. If non-null, *cipher_state* specifies the beginning state for the encryption operation, and is updated with the state to be passed as input to the next operation. The caller must allocate the right number of krb5_crypto_iov structures before calling into this API. - - - - - - - - - - -.. - -.. seealso:: - krb5_c_decrypt_iov() - - - - - - -.. note:: - - On return from a krb5_c_encrypt_iov() call, the *data->length* in the iov structure are adjusted to reflect actual lengths of the ciphertext used. For example, if the padding length is too large, the length will be reduced. Lengths are never increased. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt_length.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt_length.rst.txt deleted file mode 100644 index a459c3a48698..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_encrypt_length.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_c_encrypt_length - Compute encrypted data length. -======================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_encrypt_length(krb5_context context, krb5_enctype enctype, size_t inputlen, size_t * length) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[in]** **inputlen** - Length of the data to be encrypted - - **[out]** **length** - Length of the encrypted data - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function computes the length of the ciphertext produced by encrypting *inputlen* bytes including padding, confounder, and checksum. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_enctype_compare.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_enctype_compare.rst.txt deleted file mode 100644 index 156cdd23ebf0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_enctype_compare.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_c_enctype_compare - Compare two encryption types. -======================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_enctype_compare(krb5_context context, krb5_enctype e1, krb5_enctype e2, krb5_boolean * similar) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **e1** - First encryption type - - **[in]** **e2** - Second encryption type - - **[out]** **similar** - **TRUE** if types are similar, **FALSE** if not - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function determines whether two encryption types use the same kind of keys. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_free_state.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_free_state.rst.txt deleted file mode 100644 index 18da478c3785..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_free_state.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_c_free_state - Free a cipher state previously allocated by krb5_c_init_state(). -====================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_free_state(krb5_context context, const krb5_keyblock * key, krb5_data * state) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Key - - **[in]** **state** - Cipher state to be freed - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_fx_cf2_simple.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_fx_cf2_simple.rst.txt deleted file mode 100644 index 0d9cf9d5c6fd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_fx_cf2_simple.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_c_fx_cf2_simple - Compute the KRB-FX-CF2 combination of two keys and pepper strings. -=========================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_fx_cf2_simple(krb5_context context, const krb5_keyblock * k1, const char * pepper1, const krb5_keyblock * k2, const char * pepper2, krb5_keyblock ** out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **k1** - KDC contribution key - - **[in]** **pepper1** - String"PKINIT" - - **[in]** **k2** - Reply key - - **[in]** **pepper2** - String"KeyExchange" - - **[out]** **out** - Output key - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function computes the KRB-FX-CF2 function over its inputs and places the results in a newly allocated keyblock. This function is simple in that it assumes that *pepper1* and *pepper2* are C strings with no internal nulls and that the enctype of the result will be the same as that of *k1* . *k1* and *k2* may be of different enctypes. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_init_state.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_init_state.rst.txt deleted file mode 100644 index b6a3065d8c80..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_init_state.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_c_init_state - Initialize a new cipher state. -==================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_init_state(krb5_context context, const krb5_keyblock * key, krb5_keyusage usage, krb5_data * new_state) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Key - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[out]** **new_state** - New cipher state - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_is_coll_proof_cksum.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_is_coll_proof_cksum.rst.txt deleted file mode 100644 index 478f24668a57..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_is_coll_proof_cksum.rst.txt +++ /dev/null @@ -1,43 +0,0 @@ -krb5_c_is_coll_proof_cksum - Test whether a checksum type is collision-proof. -=============================================================================== - -.. - -.. c:function:: krb5_boolean krb5_c_is_coll_proof_cksum(krb5_cksumtype ctype) - -.. - - -:param: - - **[in]** **ctype** - Checksum type - - -.. - - - -:return: - - TRUE if ctype is collision-proof, FALSE if it is not collision-proof or not a valid checksum type. - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_is_keyed_cksum.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_is_keyed_cksum.rst.txt deleted file mode 100644 index ed6e6ab4079a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_is_keyed_cksum.rst.txt +++ /dev/null @@ -1,43 +0,0 @@ -krb5_c_is_keyed_cksum - Test whether a checksum type is keyed. -================================================================ - -.. - -.. c:function:: krb5_boolean krb5_c_is_keyed_cksum(krb5_cksumtype ctype) - -.. - - -:param: - - **[in]** **ctype** - Checksum type - - -.. - - - -:return: - - TRUE if ctype is a keyed checksum type, FALSE otherwise. - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_keyed_checksum_types.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_keyed_checksum_types.rst.txt deleted file mode 100644 index 37e18000fb97..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_keyed_checksum_types.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_c_keyed_checksum_types - Return a list of keyed checksum types usable with an encryption type. -===================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_keyed_checksum_types(krb5_context context, krb5_enctype enctype, unsigned int * count, krb5_cksumtype ** cksumtypes) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[out]** **count** - Count of allowable checksum types - - **[out]** **cksumtypes** - Array of allowable checksum types - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Use krb5_free_cksumtypes() to free *cksumtypes* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_keylengths.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_keylengths.rst.txt deleted file mode 100644 index 9b195c436db9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_keylengths.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_c_keylengths - Return length of the specified key in bytes. -================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_keylengths(krb5_context context, krb5_enctype enctype, size_t * keybytes, size_t * keylength) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[out]** **keybytes** - Number of bytes required to make a key - - **[out]** **keylength** - Length of final key - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_checksum.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_checksum.rst.txt deleted file mode 100644 index bf057e201d19..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_checksum.rst.txt +++ /dev/null @@ -1,68 +0,0 @@ -krb5_c_make_checksum - Compute a checksum (operates on keyblock). -=================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_make_checksum(krb5_context context, krb5_cksumtype cksumtype, const krb5_keyblock * key, krb5_keyusage usage, const krb5_data * input, krb5_checksum * cksum) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cksumtype** - Checksum type (0 for mandatory type) - - **[in]** **key** - Encryption key for a keyed checksum - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[in]** **input** - Input data - - **[out]** **cksum** - Generated checksum - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function computes a checksum of type *cksumtype* over *input* , using *key* if the checksum type is a keyed checksum. If *cksumtype* is 0 and *key* is non-null, the checksum type will be the mandatory-to-implement checksum type for the key's encryption type. The actual checksum key will be derived from *key* and *usage* if key derivation is specified for the checksum type. The newly created *cksum* must be released by calling krb5_free_checksum_contents() when it is no longer needed. - - - - - - - - - - -.. - -.. seealso:: - krb5_c_verify_checksum() - - - - - - -.. note:: - - This function is similar to krb5_k_make_checksum(), but operates on keyblock *key* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_checksum_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_checksum_iov.rst.txt deleted file mode 100644 index b152676fbac3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_checksum_iov.rst.txt +++ /dev/null @@ -1,68 +0,0 @@ -krb5_c_make_checksum_iov - Fill in a checksum element in IOV array (operates on keyblock) -=========================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_make_checksum_iov(krb5_context context, krb5_cksumtype cksumtype, const krb5_keyblock * key, krb5_keyusage usage, krb5_crypto_iov * data, size_t num_data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cksumtype** - Checksum type (0 for mandatory type) - - **[in]** **key** - Encryption key for a keyed checksum - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[inout]** **data** - IOV array - - **[in]** **num_data** - Size of *data* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Create a checksum in the KRB5_CRYPTO_TYPE_CHECKSUM element over KRB5_CRYPTO_TYPE_DATA and KRB5_CRYPTO_TYPE_SIGN_ONLY chunks in *data* . Only the KRB5_CRYPTO_TYPE_CHECKSUM region is modified. - - - - - - - - - - -.. - -.. seealso:: - krb5_c_verify_checksum_iov() - - - - - - -.. note:: - - This function is similar to krb5_k_make_checksum_iov(), but operates on keyblock *key* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_random_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_random_key.rst.txt deleted file mode 100644 index bcf7e28d05d1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_make_random_key.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_c_make_random_key - Generate an enctype-specific random encryption key. -============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_make_random_key(krb5_context context, krb5_enctype enctype, krb5_keyblock * k5_random_key) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type of the generated key - - **[out]** **k5_random_key** - An allocated and initialized keyblock - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Use krb5_free_keyblock_contents() to free *k5_random_key* when no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_padding_length.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_padding_length.rst.txt deleted file mode 100644 index 35471bf12e03..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_padding_length.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_c_padding_length - Return a number of padding octets. -============================================================ - -.. - -.. c:function:: krb5_error_code krb5_c_padding_length(krb5_context context, krb5_enctype enctype, size_t data_length, unsigned int * size) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[in]** **data_length** - Length of the plaintext to pad - - **[out]** **size** - Number of padding octets - - -.. - - -:retval: - - 0 Success; otherwise - KRB5_BAD_ENCTYPE - - -.. - - - - - - - -This function returns the number of the padding octets required to pad *data_length* octets of plaintext. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_prf.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_prf.rst.txt deleted file mode 100644 index 2bf18e570bd2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_prf.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_c_prf - Generate enctype-specific pseudo-random bytes. -============================================================= - -.. - -.. c:function:: krb5_error_code krb5_c_prf(krb5_context context, const krb5_keyblock * keyblock, krb5_data * input, krb5_data * output) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keyblock** - Key - - **[in]** **input** - Input data - - **[out]** **output** - Output data - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function selects a pseudo-random function based on *keyblock* and computes its value over *input* , placing the result into *output* . The caller must preinitialize *output* and allocate space for the result, using krb5_c_prf_length() to determine the required length. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_prf_length.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_prf_length.rst.txt deleted file mode 100644 index ff20e291c29e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_prf_length.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_c_prf_length - Get the output length of pseudo-random functions for an encryption type. -============================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_prf_length(krb5_context context, krb5_enctype enctype, size_t * len) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[out]** **len** - Length of PRF output - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_prfplus.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_prfplus.rst.txt deleted file mode 100644 index 682a8f4614c3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_prfplus.rst.txt +++ /dev/null @@ -1,61 +0,0 @@ -krb5_c_prfplus - Generate pseudo-random bytes using RFC 6113 PRF+. -==================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_prfplus(krb5_context context, const krb5_keyblock * k, const krb5_data * input, krb5_data * output) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **k** - KDC contribution key - - **[in]** **input** - Input data - - **[out]** **output** - Pseudo-random output buffer - - -.. - - - -:return: - - 0 on success, E2BIG if output->length is too large for PRF+ to generate, ENOMEM on allocation failure, or an error code from krb5_c_prf() - -.. - - - - - - - -This function fills *output* with PRF+(k, input) as defined in RFC 6113 section 5.1. The caller must preinitialize *output* and allocate the desired amount of space. The length of the pseudo-random output will match the length of *output* . - - - - - - - - - - -.. - - - - - - -.. note:: - - RFC 4402 defines a different PRF+ operation. This function does not implement that operation. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_add_entropy.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_add_entropy.rst.txt deleted file mode 100644 index cfd8779786aa..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_add_entropy.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_c_random_add_entropy -========================= - -.. - -.. c:function:: krb5_error_code krb5_c_random_add_entropy(krb5_context context, unsigned int randsource, const krb5_data * data) - -.. - - -:param: - - **context** - - **randsource** - - **data** - - -.. - - - -.. - - -DEPRECATED This call is no longer necessary. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_make_octets.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_make_octets.rst.txt deleted file mode 100644 index 91a1159b65fd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_make_octets.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_c_random_make_octets - Generate pseudo-random bytes. -=========================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_random_make_octets(krb5_context context, krb5_data * data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **data** - Random data - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Fills in *data* with bytes from the PRNG used by krb5 crypto operations. The caller must preinitialize *data* and allocate the desired amount of space. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_os_entropy.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_os_entropy.rst.txt deleted file mode 100644 index d4a66bdde5eb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_os_entropy.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_c_random_os_entropy -======================== - -.. - -.. c:function:: krb5_error_code krb5_c_random_os_entropy(krb5_context context, int strong, int * success) - -.. - - -:param: - - **context** - - **strong** - - **success** - - -.. - - - -.. - - -DEPRECATED This call is no longer necessary. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_seed.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_seed.rst.txt deleted file mode 100644 index 0b47a86e662c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_seed.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_c_random_seed -================== - -.. - -.. c:function:: krb5_error_code krb5_c_random_seed(krb5_context context, krb5_data * data) - -.. - - -:param: - - **context** - - **data** - - -.. - - - -.. - - -DEPRECATED This call is no longer necessary. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_to_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_to_key.rst.txt deleted file mode 100644 index 192e9d7eac85..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_random_to_key.rst.txt +++ /dev/null @@ -1,64 +0,0 @@ -krb5_c_random_to_key - Generate an enctype-specific key from random data. -=========================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_random_to_key(krb5_context context, krb5_enctype enctype, krb5_data * random_data, krb5_keyblock * k5_random_key) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[in]** **random_data** - Random input data - - **[out]** **k5_random_key** - Resulting key - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function takes random input data *random_data* and produces a valid key *k5_random_key* for a given *enctype* . - - - - - - - - - - -.. - -.. seealso:: - krb5_c_keylengths() - - - - - - -.. note:: - - It is assumed that *k5_random_key* has already been initialized and *k5_random_key->contents* has been allocated with the correct length. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_string_to_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_string_to_key.rst.txt deleted file mode 100644 index 0720b6347ec7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_string_to_key.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_c_string_to_key - Convert a string (such a password) to a key. -===================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_string_to_key(krb5_context context, krb5_enctype enctype, const krb5_data * string, const krb5_data * salt, krb5_keyblock * key) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[in]** **string** - String to be converted - - **[in]** **salt** - Salt value - - **[out]** **key** - Generated key - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function converts *string* to a *key* of encryption type *enctype* , using the specified *salt* . The newly created *key* must be released by calling krb5_free_keyblock_contents() when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_string_to_key_with_params.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_string_to_key_with_params.rst.txt deleted file mode 100644 index 6348a40a689b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_string_to_key_with_params.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_c_string_to_key_with_params - Convert a string (such as a password) to a key with additional parameters. -=============================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_string_to_key_with_params(krb5_context context, krb5_enctype enctype, const krb5_data * string, const krb5_data * salt, const krb5_data * params, krb5_keyblock * key) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[in]** **string** - String to be converted - - **[in]** **salt** - Salt value - - **[in]** **params** - Parameters - - **[out]** **key** - Generated key - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function is similar to krb5_c_string_to_key(), but also takes parameters which may affect the algorithm in an enctype-dependent way. The newly created *key* must be released by calling krb5_free_keyblock_contents() when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_valid_cksumtype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_valid_cksumtype.rst.txt deleted file mode 100644 index 0cc7787fde3f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_valid_cksumtype.rst.txt +++ /dev/null @@ -1,43 +0,0 @@ -krb5_c_valid_cksumtype - Verify that specified checksum type is a valid Kerberos checksum type. -================================================================================================= - -.. - -.. c:function:: krb5_boolean krb5_c_valid_cksumtype(krb5_cksumtype ctype) - -.. - - -:param: - - **[in]** **ctype** - Checksum type - - -.. - - - -:return: - - TRUE if ctype is valid, FALSE if not - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_valid_enctype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_valid_enctype.rst.txt deleted file mode 100644 index f5adeee863de..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_valid_enctype.rst.txt +++ /dev/null @@ -1,43 +0,0 @@ -krb5_c_valid_enctype - Verify that a specified encryption type is a valid Kerberos encryption type. -===================================================================================================== - -.. - -.. c:function:: krb5_boolean krb5_c_valid_enctype(krb5_enctype ktype) - -.. - - -:param: - - **[in]** **ktype** - Encryption type - - -.. - - - -:return: - - TRUE if ktype is valid, FALSE if not - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_verify_checksum.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_verify_checksum.rst.txt deleted file mode 100644 index 823d570764dd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_verify_checksum.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -krb5_c_verify_checksum - Verify a checksum (operates on keyblock). -==================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_verify_checksum(krb5_context context, const krb5_keyblock * key, krb5_keyusage usage, const krb5_data * data, const krb5_checksum * cksum, krb5_boolean * valid) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Encryption key for a keyed checksum - - **[in]** **usage** - *key* usage - - **[in]** **data** - Data to be used to compute a new checksum using *key* to compare *cksum* against - - **[in]** **cksum** - Checksum to be verified - - **[out]** **valid** - Non-zero for success, zero for failure - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function verifies that *cksum* is a valid checksum for *data* . If the checksum type of *cksum* is a keyed checksum, *key* is used to verify the checksum. If the checksum type in *cksum* is 0 and *key* is not NULL, the mandatory checksum type for *key* will be used. The actual checksum key will be derived from *key* and *usage* if key derivation is specified for the checksum type. - - - - - - - - - - -.. - - - - - - -.. note:: - - This function is similar to krb5_k_verify_checksum(), but operates on keyblock *key* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_verify_checksum_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_verify_checksum_iov.rst.txt deleted file mode 100644 index 639fc882ca08..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_c_verify_checksum_iov.rst.txt +++ /dev/null @@ -1,70 +0,0 @@ -krb5_c_verify_checksum_iov - Validate a checksum element in IOV array (operates on keyblock). -=============================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_c_verify_checksum_iov(krb5_context context, krb5_cksumtype cksumtype, const krb5_keyblock * key, krb5_keyusage usage, const krb5_crypto_iov * data, size_t num_data, krb5_boolean * valid) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cksumtype** - Checksum type (0 for mandatory type) - - **[in]** **key** - Encryption key for a keyed checksum - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[in]** **data** - IOV array - - **[in]** **num_data** - Size of *data* - - **[out]** **valid** - Non-zero for success, zero for failure - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Confirm that the checksum in the KRB5_CRYPTO_TYPE_CHECKSUM element is a valid checksum of the KRB5_CRYPTO_TYPE_DATA and KRB5_CRYPTO_TYPE_SIGN_ONLY regions in the iov. - - - - - - - - - - -.. - -.. seealso:: - krb5_c_make_checksum_iov() - - - - - - -.. note:: - - This function is similar to krb5_k_verify_checksum_iov(), but operates on keyblock *key* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_calculate_checksum.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_calculate_checksum.rst.txt deleted file mode 100644 index ef40b12e32db..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_calculate_checksum.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_calculate_checksum -======================= - -.. - -.. c:function:: krb5_error_code krb5_calculate_checksum(krb5_context context, krb5_cksumtype ctype, krb5_const_pointer in, size_t in_length, krb5_const_pointer seed, size_t seed_length, krb5_checksum * outcksum) - -.. - - -:param: - - **context** - - **ctype** - - **in** - - **in_length** - - **seed** - - **seed_length** - - **outcksum** - - -.. - - - -.. - - -DEPRECATED See krb5_c_make_checksum() - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_cache_match.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_cache_match.rst.txt deleted file mode 100644 index 2c56506902d5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_cache_match.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_cc_cache_match - Find a credential cache with a specified client principal. -================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_cache_match(krb5_context context, krb5_principal client, krb5_ccache * cache_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **client** - Client principal - - **[out]** **cache_out** - Credential cache handle - - -.. - - -:retval: - - 0 Success - - KRB5_CC_NOTFOUND - - -.. - - - - - - - -Find a cache within the collection whose default principal is *client* . Use *krb5_cc_close* to close *ccache* when it is no longer needed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.10 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_close.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_close.rst.txt deleted file mode 100644 index 6a58c9a214ab..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_close.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_cc_close - Close a credential cache handle. -================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_close(krb5_context context, krb5_ccache cache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function closes a credential cache handle *cache* without affecting the contents of the cache. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_copy_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_copy_creds.rst.txt deleted file mode 100644 index f3af7c11665f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_copy_creds.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_cc_copy_creds - Copy a credential cache. -=============================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_copy_creds(krb5_context context, krb5_ccache incc, krb5_ccache outcc) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **incc** - Credential cache to be copied - - **[out]** **outcc** - Copy of credential cache to be filled in - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_default.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_default.rst.txt deleted file mode 100644 index a734335f2c8f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_default.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_cc_default - Resolve the default credential cache name. -============================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_default(krb5_context context, krb5_ccache * ccache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **ccache** - Pointer to credential cache name - - -.. - - -:retval: - - 0 Success - - KV5M_CONTEXT Bad magic number for _krb5_context structure - - KRB5_FCC_INTERNAL The name of the default credential cache cannot be obtained - - -:return: - - Kerberos error codes - -.. - - - - - - - -Create a handle to the default credential cache as given by krb5_cc_default_name(). - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_default_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_default_name.rst.txt deleted file mode 100644 index d9f3e7d034e1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_default_name.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_cc_default_name - Return the name of the default credential cache. -========================================================================= - -.. - -.. c:function:: const char * krb5_cc_default_name(krb5_context context) - -.. - - -:param: - - **[in]** **context** - Library context - - -.. - - - -:return: - - Name of default credential cache for the current user. - -.. - - - - - - - -Return a pointer to the default credential cache name for *context* , as determined by a prior call to krb5_cc_set_default_name(), by the KRB5CCNAME environment variable, by the default_ccache_name profile variable, or by the operating system or build-time default value. The returned value must not be modified or freed by the caller. The returned value becomes invalid when *context* is destroyed krb5_free_context() or if a subsequent call to krb5_cc_set_default_name() is made on *context* . - - - -The default credential cache name is cached in *context* between calls to this function, so if the value of KRB5CCNAME changes in the process environment after the first call to this function on, that change will not be reflected in later calls with the same context. The caller can invoke krb5_cc_set_default_name() with a NULL value of *name* to clear the cached value and force the default name to be recomputed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_destroy.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_destroy.rst.txt deleted file mode 100644 index 12254719d3d0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_destroy.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_cc_destroy - Destroy a credential cache. -=============================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_destroy(krb5_context context, krb5_ccache cache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - -.. - - -:retval: - - 0 Success - - -:return: - - Permission errors - -.. - - - - - - - -This function destroys any existing contents of *cache* and closes the handle to it. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_dup.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_dup.rst.txt deleted file mode 100644 index 00179a0bf06c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_dup.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_cc_dup - Duplicate ccache handle. -======================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_dup(krb5_context context, krb5_ccache in, krb5_ccache * out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **in** - Credential cache handle to be duplicated - - **[out]** **out** - Credential cache handle - - -.. - - - -.. - - - - - - - -Create a new handle referring to the same cache as *in* . The new handle and *in* can be closed independently. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_end_seq_get.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_end_seq_get.rst.txt deleted file mode 100644 index 0b4fb65676fb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_end_seq_get.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_cc_end_seq_get - Finish a series of sequential processing credential cache entries. -========================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_end_seq_get(krb5_context context, krb5_ccache cache, krb5_cc_cursor * cursor) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - **[in]** **cursor** - Cursor - - -.. - - -:retval: - - 0 (always) - - -.. - - - - - - - -This function finishes processing credential cache entries and invalidates *cursor* . - - - - - - - - - - -.. - -.. seealso:: - krb5_cc_start_seq_get(), krb5_cc_next_cred() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_gen_new.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_gen_new.rst.txt deleted file mode 100644 index 3672b36274c8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_gen_new.rst.txt +++ /dev/null @@ -1,39 +0,0 @@ -krb5_cc_gen_new -=============== - -.. - -.. c:function:: krb5_error_code krb5_cc_gen_new(krb5_context context, krb5_ccache * cache) - -.. - - -:param: - - **context** - - **cache** - - -.. - - - -.. - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_config.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_config.rst.txt deleted file mode 100644 index 3c5576ed32fb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_config.rst.txt +++ /dev/null @@ -1,58 +0,0 @@ -krb5_cc_get_config - Get a configuration value from a credential cache. -========================================================================= - -.. - -.. c:function:: krb5_error_code krb5_cc_get_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char * key, krb5_data * data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **id** - Credential cache handle - - **[in]** **principal** - Configuration for this principal; if NULL, global for the whole cache - - **[in]** **key** - Name of config variable - - **[out]** **data** - Data to be fetched - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Use krb5_free_data_contents() to free *data* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_flags.rst.txt deleted file mode 100644 index ca764c8b4f06..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_flags.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_cc_get_flags - Retrieve flags from a credential cache structure. -======================================================================= - -.. - -.. c:function:: krb5_error_code krb5_cc_get_flags(krb5_context context, krb5_ccache cache, krb5_flags * flags) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - **[out]** **flags** - Flag bit mask - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - -.. warning:: - - For memory credential cache always returns a flag mask of 0. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_full_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_full_name.rst.txt deleted file mode 100644 index fdab6616a2ab..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_full_name.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_cc_get_full_name - Retrieve the full name of a credential cache. -======================================================================= - -.. - -.. c:function:: krb5_error_code krb5_cc_get_full_name(krb5_context context, krb5_ccache cache, char ** fullname_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - **[out]** **fullname_out** - Full name of cache - - -.. - - - -.. - - - - - - - -Use krb5_free_string() to free *fullname_out* when it is no longer needed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.10 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_name.rst.txt deleted file mode 100644 index 3115b0b0871c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_name.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_cc_get_name - Retrieve the name, but not type of a credential cache. -=========================================================================== - -.. - -.. c:function:: const char * krb5_cc_get_name(krb5_context context, krb5_ccache cache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - -.. - - - -:return: - - On success - the name of the credential cache. - -.. - - - - - - - - - - - - - - -.. - - - - - -.. warning:: - - Returns the name of the credential cache. The result is an alias into *cache* and should not be freed or modified by the caller. This name does not include the cache type, so should not be used as input to krb5_cc_resolve(). - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_principal.rst.txt deleted file mode 100644 index 059d10a25657..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_principal.rst.txt +++ /dev/null @@ -1,58 +0,0 @@ -krb5_cc_get_principal - Get the default principal of a credential cache. -========================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal * principal) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - **[out]** **principal** - Primary principal - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Returns the default client principal of a credential cache as set by krb5_cc_initialize(). - - - -Use krb5_free_principal() to free *principal* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_type.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_type.rst.txt deleted file mode 100644 index a970bd6d1974..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_get_type.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -krb5_cc_get_type - Retrieve the type of a credential cache. -============================================================= - -.. - -.. c:function:: const char * krb5_cc_get_type(krb5_context context, krb5_ccache cache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - -.. - - - -:return: - - The type of a credential cache as an alias that must not be modified or freed by the caller. - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_initialize.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_initialize.rst.txt deleted file mode 100644 index d306a2924db0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_initialize.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_cc_initialize - Initialize a credential cache. -===================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_initialize(krb5_context context, krb5_ccache cache, krb5_principal principal) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - **[in]** **principal** - Default principal name - - -.. - - -:retval: - - 0 Success - - -:return: - - System errors; Permission errors; Kerberos error codes - -.. - - - - - - - -Destroy any existing contents of *cache* and initialize it for the default principal *principal* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_move.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_move.rst.txt deleted file mode 100644 index ba9f0fd1ee7d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_move.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_cc_move - Move a credential cache. -========================================= - -.. - -.. c:function:: krb5_error_code krb5_cc_move(krb5_context context, krb5_ccache src, krb5_ccache dst) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **src** - The credential cache to move the content from - - **[in]** **dst** - The credential cache to move the content to - - -.. - - -:retval: - - 0 Success; src is closed. - - -:return: - - Kerberos error codes; src is still allocated. - -.. - - - - - - - -This function reinitializes *dst* and populates it with the credentials and default principal of *src* ; then, if successful, destroys *src* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_new_unique.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_new_unique.rst.txt deleted file mode 100644 index e4313c07c636..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_new_unique.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_cc_new_unique - Create a new credential cache of the specified type with a unique name. -============================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_new_unique(krb5_context context, const char * type, const char * hint, krb5_ccache * id) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **type** - Credential cache type name - - **[in]** **hint** - Unused - - **[out]** **id** - Credential cache handle - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_next_cred.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_next_cred.rst.txt deleted file mode 100644 index e9d7b1e4c12e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_next_cred.rst.txt +++ /dev/null @@ -1,60 +0,0 @@ -krb5_cc_next_cred - Retrieve the next entry from the credential cache. -======================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_next_cred(krb5_context context, krb5_ccache cache, krb5_cc_cursor * cursor, krb5_creds * creds) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - **[in]** **cursor** - Cursor - - **[out]** **creds** - Next credential cache entry - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function fills in *creds* with the next entry in *cache* and advances *cursor* . - - - -Use krb5_free_cred_contents() to free *creds* when it is no longer needed. - - - - - - - - - - -.. - -.. seealso:: - krb5_cc_start_seq_get(), krb5_end_seq_get() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_remove_cred.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_remove_cred.rst.txt deleted file mode 100644 index 274f8c50f61a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_remove_cred.rst.txt +++ /dev/null @@ -1,64 +0,0 @@ -krb5_cc_remove_cred - Remove credentials from a credential cache. -=================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_remove_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds * creds) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - **[in]** **flags** - Bitwise-ORed search flags - - **[in]** **creds** - Credentials to be matched - - -.. - - -:retval: - - KRB5_CC_NOSUPP Not implemented for this cache type - - -:return: - - No matches found; Data cannot be deleted; Kerberos error codes - -.. - - - - - - - -This function accepts the same flag values as krb5_cc_retrieve_cred(). - - - - - - - - - - -.. - - - - - -.. warning:: - - This function is not implemented for some cache types. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_resolve.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_resolve.rst.txt deleted file mode 100644 index 746ac6c2632c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_resolve.rst.txt +++ /dev/null @@ -1,58 +0,0 @@ -krb5_cc_resolve - Resolve a credential cache name. -==================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_resolve(krb5_context context, const char * name, krb5_ccache * cache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **name** - Credential cache name to be resolved - - **[out]** **cache** - Credential cache handle - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Fills in *cache* with a *cache* handle that corresponds to the name in *name* . *name* should be of the form **type:residual** , and *type* must be a type known to the library. If the *name* does not contain a colon, interpret it as a file name. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_retrieve_cred.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_retrieve_cred.rst.txt deleted file mode 100644 index 22413b5cfbe1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_retrieve_cred.rst.txt +++ /dev/null @@ -1,94 +0,0 @@ -krb5_cc_retrieve_cred - Retrieve a specified credentials from a credential cache. -=================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_retrieve_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds * mcreds, krb5_creds * creds) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - **[in]** **flags** - Flags bit mask - - **[in]** **mcreds** - Credentials to match - - **[out]** **creds** - Credentials matching the requested value - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function searches a credential cache for credentials matching *mcreds* and returns it if found. - - - -Valid values for *flags* are: - - - - - - - KRB5_TC_MATCH_TIMES The requested lifetime must be at least as great as in *mcreds* . - - - - KRB5_TC_MATCH_IS_SKEY The *is_skey* field much match exactly. - - - - KRB5_TC_MATCH_FLAGS Flags set in *mcreds* must be set. - - - - KRB5_TC_MATCH_TIMES_EXACT The requested lifetime must match exactly. - - - - KRB5_TC_MATCH_FLAGS_EXACT Flags must match exactly. - - - - KRB5_TC_MATCH_AUTHDATA The authorization data must match. - - - - KRB5_TC_MATCH_SRV_NAMEONLY Only the name portion of the principal name must match, not the realm. - - - - KRB5_TC_MATCH_2ND_TKT The second tickets must match. - - - - KRB5_TC_MATCH_KTYPE The encryption key types must match. - - - - KRB5_TC_SUPPORTED_KTYPES Check all matching entries that have any supported encryption type and return the one with the encryption type listed earliest. - - Use krb5_free_cred_contents() to free *creds* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_select.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_select.rst.txt deleted file mode 100644 index c221a65b0a49..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_select.rst.txt +++ /dev/null @@ -1,73 +0,0 @@ -krb5_cc_select - Select a credential cache to use with a server principal. -============================================================================ - -.. - -.. c:function:: krb5_error_code krb5_cc_select(krb5_context context, krb5_principal server, krb5_ccache * cache_out, krb5_principal * princ_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **server** - Server principal - - **[out]** **cache_out** - Credential cache handle - - **[out]** **princ_out** - Client principal - - -.. - - - -:return: - - If an appropriate cache is found, 0 is returned, cache_out is set to the selected cache, and princ_out is set to the default principal of that cache. - -.. - - - - - - - -Select a cache within the collection containing credentials most appropriate for use with *server* , according to configured rules and heuristics. - - - -Use krb5_cc_close() to release *cache_out* when it is no longer needed. Use krb5_free_principal() to release *princ_out* when it is no longer needed. Note that *princ_out* is set in some error conditions. - - - -If the appropriate client principal can be authoritatively determined but the cache collection contains no credentials for that principal, then KRB5_CC_NOTFOUND is returned, *cache_out* is set to NULL, and *princ_out* is set to the appropriate client principal. - - - -If no configured mechanism can determine the appropriate cache or principal, KRB5_CC_NOTFOUND is returned and *cache_out* and *princ_out* are set to NULL. - - - -Any other error code indicates a fatal error in the processing of a cache selection mechanism. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.10 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_set_config.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_set_config.rst.txt deleted file mode 100644 index fdcc61391db3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_set_config.rst.txt +++ /dev/null @@ -1,66 +0,0 @@ -krb5_cc_set_config - Store a configuration value in a credential cache. -========================================================================= - -.. - -.. c:function:: krb5_error_code krb5_cc_set_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char * key, krb5_data * data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **id** - Credential cache handle - - **[in]** **principal** - Configuration for a specific principal; if NULL, global for the whole cache - - **[in]** **key** - Name of config variable - - **[in]** **data** - Data to store, or NULL to remove - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - - - - - - - - -.. - - - - - -.. warning:: - - Before version 1.10 *data* was assumed to be always non-null. - - -.. note:: - - Existing configuration under the same key is over-written. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_set_default_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_set_default_name.rst.txt deleted file mode 100644 index 6c78ac6c805e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_set_default_name.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_cc_set_default_name - Set the default credential cache name. -=================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_set_default_name(krb5_context context, const char * name) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **name** - Default credential cache name or NULL - - -.. - - -:retval: - - 0 Success - - KV5M_CONTEXT Bad magic number for _krb5_context structure - - -:return: - - Kerberos error codes - -.. - - - - - - - -Set the default credential cache name to *name* for future operations using *context* . If *name* is NULL, clear any previous application-set default name and forget any cached value of the default name for *context* . - - - -Calls to this function invalidate the result of any previous calls to krb5_cc_default_name() using *context* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_set_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_set_flags.rst.txt deleted file mode 100644 index d68d874835e0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_set_flags.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_cc_set_flags - Set options flags on a credential cache. -============================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_set_flags(krb5_context context, krb5_ccache cache, krb5_flags flags) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - **[in]** **flags** - Flag bit mask - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function resets *cache* flags to *flags* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_start_seq_get.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_start_seq_get.rst.txt deleted file mode 100644 index 84fa02bad24b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_start_seq_get.rst.txt +++ /dev/null @@ -1,59 +0,0 @@ -krb5_cc_start_seq_get - Prepare to sequentially read every credential in a credential cache. -============================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_start_seq_get(krb5_context context, krb5_ccache cache, krb5_cc_cursor * cursor) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - **[out]** **cursor** - Cursor - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -krb5_cc_end_seq_get() must be called to complete the retrieve operation. - - - - - - - - - - -.. - - - - - - -.. note:: - - If the cache represented by *cache* is modified between the time of the call to this function and the time of the final krb5_cc_end_seq_get(), these changes may not be reflected in the results of krb5_cc_next_cred() calls. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_store_cred.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_store_cred.rst.txt deleted file mode 100644 index 1cc27ccc8685..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_store_cred.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_cc_store_cred - Store credentials in a credential cache. -=============================================================== - -.. - -.. c:function:: krb5_error_code krb5_cc_store_cred(krb5_context context, krb5_ccache cache, krb5_creds * creds) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - **[in]** **creds** - Credentials to be stored in cache - - -.. - - -:retval: - - 0 Success - - -:return: - - Permission errors; storage failure errors; Kerberos error codes - -.. - - - - - - - -This function stores *creds* into *cache* . If *creds->server* and the server in the decoded ticket *creds->ticket* differ, the credentials will be stored under both server principal names. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_support_switch.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_support_switch.rst.txt deleted file mode 100644 index 394629b0f939..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_support_switch.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -krb5_cc_support_switch - Determine whether a credential cache type supports switching. -======================================================================================== - -.. - -.. c:function:: krb5_boolean krb5_cc_support_switch(krb5_context context, const char * type) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **type** - Credential cache type - - -.. - - -:retval: - - TRUE if type supports switching - - FALSE if it does not or is not a valid credential cache type. - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.10 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_switch.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_switch.rst.txt deleted file mode 100644 index ef4c570d4c74..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cc_switch.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_cc_switch - Make a credential cache the primary cache for its collection. -================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_cc_switch(krb5_context context, krb5_ccache cache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cache** - Credential cache handle - - -.. - - -:retval: - - 0 Success, or the type of cache doesn't support switching - - -:return: - - Kerberos error codes - -.. - - - - - - - -If the type of *cache* supports it, set *cache* to be the primary credential cache for the collection it belongs to. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_cursor_free.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_cursor_free.rst.txt deleted file mode 100644 index ce397b92a015..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_cursor_free.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_cccol_cursor_free - Free a credential cache collection cursor. -===================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cccol_cursor_free(krb5_context context, krb5_cccol_cursor * cursor) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cursor** - Cursor - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - -.. seealso:: - krb5_cccol_cursor_new(), krb5_cccol_cursor_next() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_cursor_new.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_cursor_new.rst.txt deleted file mode 100644 index b1673332bf8d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_cursor_new.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_cccol_cursor_new - Prepare to iterate over the collection of known credential caches. -============================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_cccol_cursor_new(krb5_context context, krb5_cccol_cursor * cursor) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **cursor** - Cursor - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Get a new cache iteration *cursor* that will iterate over all known credential caches independent of type. - - - -Use krb5_cccol_cursor_free() to release *cursor* when it is no longer needed. - - - - - - - - - - -.. - -.. seealso:: - krb5_cccol_cursor_next() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_cursor_next.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_cursor_next.rst.txt deleted file mode 100644 index d019a0495c76..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_cursor_next.rst.txt +++ /dev/null @@ -1,62 +0,0 @@ -krb5_cccol_cursor_next - Get the next credential cache in the collection. -=========================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cccol_cursor_next(krb5_context context, krb5_cccol_cursor cursor, krb5_ccache * ccache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cursor** - Cursor - - **[out]** **ccache** - Credential cache handle - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Use krb5_cc_close() to close *ccache* when it is no longer needed. - - - - - - - - - - -.. - -.. seealso:: - krb5_cccol_cursor_new(), krb5_cccol_cursor_free() - - - - - - -.. note:: - - When all caches are iterated over and the end of the list is reached, *ccache* is set to NULL. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_have_content.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_have_content.rst.txt deleted file mode 100644 index d1c7426ee887..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cccol_have_content.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_cccol_have_content - Check if the credential cache collection contains any initialized caches. -===================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_cccol_have_content(krb5_context context) - -.. - - -:param: - - **[in]** **context** - Library context - - -.. - - -:retval: - - 0 At least one initialized cache is present in the collection - - KRB5_CC_NOTFOUND The collection contains no caches - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_change_password.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_change_password.rst.txt deleted file mode 100644 index 8d4691790ee1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_change_password.rst.txt +++ /dev/null @@ -1,77 +0,0 @@ -krb5_change_password - Change a password for an existing Kerberos account. -============================================================================ - -.. - -.. c:function:: krb5_error_code krb5_change_password(krb5_context context, krb5_creds * creds, const char * newpw, int * result_code, krb5_data * result_code_string, krb5_data * result_string) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **creds** - Credentials for kadmin/changepw service - - **[in]** **newpw** - New password - - **[out]** **result_code** - Numeric error code from server - - **[out]** **result_code_string** - String equivalent to *result_code* - - **[out]** **result_string** - Change password response from the KDC - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Change the password for the existing principal identified by *creds* . - - - -The possible values of the output *result_code* are: - - - - - - - KRB5_KPASSWD_SUCCESS (0) - success - - - - KRB5_KPASSWD_MALFORMED (1) - Malformed request error - - - - KRB5_KPASSWD_HARDERROR (2) - Server error - - - - KRB5_KPASSWD_AUTHERROR (3) - Authentication error - - - - KRB5_KPASSWD_SOFTERROR (4) - Password change rejected - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_check_clockskew.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_check_clockskew.rst.txt deleted file mode 100644 index 4999d4851800..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_check_clockskew.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_check_clockskew - Check if a timestamp is within the allowed clock skew of the current time. -=================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_check_clockskew(krb5_context context, krb5_timestamp date) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **date** - Timestamp to check - - -.. - - -:retval: - - 0 Success - - KRB5KRB_AP_ERR_SKEW date is not within allowable clock skew - - -.. - - - - - - - -This function checks if *date* is close enough to the current time according to the configured allowable clock skew. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.10 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_checksum_size.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_checksum_size.rst.txt deleted file mode 100644 index 5a6769914f13..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_checksum_size.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_checksum_size -================== - -.. - -.. c:function:: size_t krb5_checksum_size(krb5_context context, krb5_cksumtype ctype) - -.. - - -:param: - - **context** - - **ctype** - - -.. - - - -.. - - -DEPRECATED See krb5_c_checksum_length() - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_chpw_message.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_chpw_message.rst.txt deleted file mode 100644 index 3f4919e5970a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_chpw_message.rst.txt +++ /dev/null @@ -1,62 +0,0 @@ -krb5_chpw_message - Get a result message for changing or setting a password. -============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_chpw_message(krb5_context context, const krb5_data * server_string, char ** message_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **server_string** - Data returned from the remote system - - **[out]** **message_out** - A message displayable to the user - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function processes the *server_string* returned in the *result_string* parameter of krb5_change_password(), krb5_set_password(), and related functions, and returns a displayable string. If *server_string* contains Active Directory structured policy information, it will be converted into human-readable text. - - - -Use krb5_free_string() to free *message_out* when it is no longer needed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cksumtype_to_string.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cksumtype_to_string.rst.txt deleted file mode 100644 index a297c8f9666d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_cksumtype_to_string.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_cksumtype_to_string - Convert a checksum type to a string. -================================================================= - -.. - -.. c:function:: krb5_error_code krb5_cksumtype_to_string(krb5_cksumtype cksumtype, char * buffer, size_t buflen) - -.. - - -:param: - - **[in]** **cksumtype** - Checksum type - - **[out]** **buffer** - Buffer to hold converted checksum type - - **[in]** **buflen** - Storage available in *buffer* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_clear_error_message.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_clear_error_message.rst.txt deleted file mode 100644 index c988ca3ab07b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_clear_error_message.rst.txt +++ /dev/null @@ -1,40 +0,0 @@ -krb5_clear_error_message - Clear the extended error message in a context. -=========================================================================== - -.. - -.. c:function:: void krb5_clear_error_message(krb5_context ctx) - -.. - - -:param: - - **[in]** **ctx** - Library context - - -.. - - - -.. - - - - - - - -This function unsets the extended error message in a context, to ensure that it is not mistakenly applied to another occurrence of the same error code. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_addresses.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_addresses.rst.txt deleted file mode 100644 index e1f85b899bb2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_addresses.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_copy_addresses - Copy an array of addresses. -=================================================== - -.. - -.. c:function:: krb5_error_code krb5_copy_addresses(krb5_context context, krb5_address *const * inaddr, krb5_address *** outaddr) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **inaddr** - Array of addresses to be copied - - **[out]** **outaddr** - Copy of array of addresses - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a new address array containing a copy of *inaddr* . Use krb5_free_addresses() to free *outaddr* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_authdata.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_authdata.rst.txt deleted file mode 100644 index 518b95e620c5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_authdata.rst.txt +++ /dev/null @@ -1,59 +0,0 @@ -krb5_copy_authdata - Copy an authorization data list. -======================================================= - -.. - -.. c:function:: krb5_error_code krb5_copy_authdata(krb5_context context, krb5_authdata *const * in_authdat, krb5_authdata *** out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **in_authdat** - List of *krb5_authdata* structures - - **[out]** **out** - New array of *krb5_authdata* structures - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a new authorization data list containing a copy of *in_authdat* , which must be null-terminated. Use krb5_free_authdata() to free *out* when it is no longer needed. - - - - - - - - - - -.. - - - - - - -.. note:: - - The last array entry in *in_authdat* must be a NULL pointer. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_authenticator.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_authenticator.rst.txt deleted file mode 100644 index a3d043cd9870..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_authenticator.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_copy_authenticator - Copy a krb5_authenticator structure. -================================================================ - -.. - -.. c:function:: krb5_error_code krb5_copy_authenticator(krb5_context context, const krb5_authenticator * authfrom, krb5_authenticator ** authto) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **authfrom** - krb5_authenticator structure to be copied - - **[out]** **authto** - Copy of krb5_authenticator structure - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a new krb5_authenticator structure with the content of *authfrom* . Use krb5_free_authenticator() to free *authto* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_checksum.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_checksum.rst.txt deleted file mode 100644 index 3e94c3ca7d6a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_checksum.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_copy_checksum - Copy a krb5_checksum structure. -====================================================== - -.. - -.. c:function:: krb5_error_code krb5_copy_checksum(krb5_context context, const krb5_checksum * ckfrom, krb5_checksum ** ckto) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ckfrom** - Checksum to be copied - - **[out]** **ckto** - Copy of krb5_checksum structure - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a new krb5_checksum structure with the contents of *ckfrom* . Use krb5_free_checksum() to free *ckto* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_context.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_context.rst.txt deleted file mode 100644 index 50df96fcae8d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_context.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_copy_context - Copy a krb5_context structure. -==================================================== - -.. - -.. c:function:: krb5_error_code krb5_copy_context(krb5_context ctx, krb5_context * nctx_out) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[out]** **nctx_out** - New context structure - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -The newly created context must be released by calling krb5_free_context() when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_creds.rst.txt deleted file mode 100644 index ac7df3562685..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_creds.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_copy_creds - Copy a krb5_creds structure. -================================================ - -.. - -.. c:function:: krb5_error_code krb5_copy_creds(krb5_context context, const krb5_creds * incred, krb5_creds ** outcred) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **incred** - Credentials structure to be copied - - **[out]** **outcred** - Copy of *incred* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a new credential with the contents of *incred* . Use krb5_free_creds() to free *outcred* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_data.rst.txt deleted file mode 100644 index a7714f0ef72d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_data.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_copy_data - Copy a krb5_data object. -=========================================== - -.. - -.. c:function:: krb5_error_code krb5_copy_data(krb5_context context, const krb5_data * indata, krb5_data ** outdata) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **indata** - Data object to be copied - - **[out]** **outdata** - Copy of *indata* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a new krb5_data object with the contents of *indata* . Use krb5_free_data() to free *outdata* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_error_message.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_error_message.rst.txt deleted file mode 100644 index 3904cabfff44..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_error_message.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_copy_error_message - Copy the most recent extended error message from one context to another. -==================================================================================================== - -.. - -.. c:function:: void krb5_copy_error_message(krb5_context dest_ctx, krb5_context src_ctx) - -.. - - -:param: - - **[in]** **dest_ctx** - Library context to copy message to - - **[in]** **src_ctx** - Library context with current message - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_keyblock.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_keyblock.rst.txt deleted file mode 100644 index a9b1bcf2edc5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_keyblock.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_copy_keyblock - Copy a keyblock. -======================================= - -.. - -.. c:function:: krb5_error_code krb5_copy_keyblock(krb5_context context, const krb5_keyblock * from, krb5_keyblock ** to) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **from** - Keyblock to be copied - - **[out]** **to** - Copy of keyblock *from* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a new keyblock with the same contents as *from* . Use krb5_free_keyblock() to free *to* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_keyblock_contents.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_keyblock_contents.rst.txt deleted file mode 100644 index c485dac87f2e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_keyblock_contents.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_copy_keyblock_contents - Copy the contents of a keyblock. -================================================================ - -.. - -.. c:function:: krb5_error_code krb5_copy_keyblock_contents(krb5_context context, const krb5_keyblock * from, krb5_keyblock * to) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **from** - Key to be copied - - **[out]** **to** - Output key - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function copies the contents of *from* to *to* . Use krb5_free_keyblock_contents() to free *to* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_principal.rst.txt deleted file mode 100644 index 1db2d06f3b76..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_principal.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_copy_principal - Copy a principal. -========================================= - -.. - -.. c:function:: krb5_error_code krb5_copy_principal(krb5_context context, krb5_const_principal inprinc, krb5_principal * outprinc) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **inprinc** - Principal to be copied - - **[out]** **outprinc** - Copy of *inprinc* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a new principal structure with the contents of *inprinc* . Use krb5_free_principal() to free *outprinc* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_ticket.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_ticket.rst.txt deleted file mode 100644 index db434f7b5066..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_copy_ticket.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_copy_ticket - Copy a krb5_ticket structure. -================================================== - -.. - -.. c:function:: krb5_error_code krb5_copy_ticket(krb5_context context, const krb5_ticket * from, krb5_ticket ** pto) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **from** - Ticket to be copied - - **[out]** **pto** - Copy of ticket - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a new krb5_ticket structure containing the contents of *from* . Use krb5_free_ticket() to free *pto* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_decode_authdata_container.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_decode_authdata_container.rst.txt deleted file mode 100644 index 6a93d7bba617..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_decode_authdata_container.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_decode_authdata_container - Unwrap authorization data. -============================================================= - -.. - -.. c:function:: krb5_error_code krb5_decode_authdata_container(krb5_context context, krb5_authdatatype type, const krb5_authdata * container, krb5_authdata *** authdata) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **type** - Container type (see KRB5_AUTHDATA macros) - - **[in]** **container** - Authorization data to be decoded - - **[out]** **authdata** - List of decoded authorization data - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - -.. seealso:: - krb5_encode_authdata_container() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_decode_ticket.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_decode_ticket.rst.txt deleted file mode 100644 index 8f2cf8210baf..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_decode_ticket.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -krb5_decode_ticket - Decode an ASN.1-formatted ticket. -======================================================== - -.. - -.. c:function:: krb5_error_code krb5_decode_ticket(const krb5_data * code, krb5_ticket ** rep) - -.. - - -:param: - - **[in]** **code** - ASN.1-formatted ticket - - **[out]** **rep** - Decoded ticket information - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_decrypt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_decrypt.rst.txt deleted file mode 100644 index eb8123ff54e0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_decrypt.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_decrypt -============ - -.. - -.. c:function:: krb5_error_code krb5_decrypt(krb5_context context, krb5_const_pointer inptr, krb5_pointer outptr, size_t size, krb5_encrypt_block * eblock, krb5_pointer ivec) - -.. - - -:param: - - **context** - - **inptr** - - **outptr** - - **size** - - **eblock** - - **ivec** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_c_* API family. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_deltat_to_string.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_deltat_to_string.rst.txt deleted file mode 100644 index 3b66ba3b2095..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_deltat_to_string.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_deltat_to_string - Convert a relative time value to a string. -==================================================================== - -.. - -.. c:function:: krb5_error_code krb5_deltat_to_string(krb5_deltat deltat, char * buffer, size_t buflen) - -.. - - -:param: - - **[in]** **deltat** - Relative time value to convert - - **[out]** **buffer** - Buffer to hold time string - - **[in]** **buflen** - Storage available in *buffer* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_eblock_enctype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_eblock_enctype.rst.txt deleted file mode 100644 index c621a6df3755..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_eblock_enctype.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_eblock_enctype -=================== - -.. - -.. c:function:: krb5_enctype krb5_eblock_enctype(krb5_context context, const krb5_encrypt_block * eblock) - -.. - - -:param: - - **context** - - **eblock** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_c_* API family. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_encode_authdata_container.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_encode_authdata_container.rst.txt deleted file mode 100644 index 3bf9d776e0a0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_encode_authdata_container.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_encode_authdata_container - Wrap authorization data in a container. -========================================================================== - -.. - -.. c:function:: krb5_error_code krb5_encode_authdata_container(krb5_context context, krb5_authdatatype type, krb5_authdata *const * authdata, krb5_authdata *** container) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **type** - Container type (see KRB5_AUTHDATA macros) - - **[in]** **authdata** - List of authorization data to be encoded - - **[out]** **container** - List of encoded authorization data - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -The result is returned in *container* as a single-element list. - - - - - - - - - - -.. - -.. seealso:: - krb5_decode_authdata_container() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_encrypt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_encrypt.rst.txt deleted file mode 100644 index 56e93be139cf..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_encrypt.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_encrypt -============ - -.. - -.. c:function:: krb5_error_code krb5_encrypt(krb5_context context, krb5_const_pointer inptr, krb5_pointer outptr, size_t size, krb5_encrypt_block * eblock, krb5_pointer ivec) - -.. - - -:param: - - **context** - - **inptr** - - **outptr** - - **size** - - **eblock** - - **ivec** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_c_* API family. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_encrypt_size.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_encrypt_size.rst.txt deleted file mode 100644 index f331490f5d2a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_encrypt_size.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_encrypt_size -================= - -.. - -.. c:function:: size_t krb5_encrypt_size(size_t length, krb5_enctype crypto) - -.. - - -:param: - - **length** - - **crypto** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_c_* API family. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_enctype_to_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_enctype_to_name.rst.txt deleted file mode 100644 index d830697cfd4b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_enctype_to_name.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_enctype_to_name - Convert an encryption type to a name or alias. -======================================================================= - -.. - -.. c:function:: krb5_error_code krb5_enctype_to_name(krb5_enctype enctype, krb5_boolean shortest, char * buffer, size_t buflen) - -.. - - -:param: - - **[in]** **enctype** - Encryption type - - **[in]** **shortest** - Flag - - **[out]** **buffer** - Buffer to hold encryption type string - - **[in]** **buflen** - Storage available in *buffer* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -If *shortest* is FALSE, this function returns the enctype's canonical name (like"aes128-cts-hmac-sha1-96"). If *shortest* is TRUE, it return the enctype's shortest alias (like"aes128-cts"). - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_enctype_to_string.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_enctype_to_string.rst.txt deleted file mode 100644 index d46d83eba426..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_enctype_to_string.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_enctype_to_string - Convert an encryption type to a string. -================================================================== - -.. - -.. c:function:: krb5_error_code krb5_enctype_to_string(krb5_enctype enctype, char * buffer, size_t buflen) - -.. - - -:param: - - **[in]** **enctype** - Encryption type - - **[out]** **buffer** - Buffer to hold encryption type string - - **[in]** **buflen** - Storage available in *buffer* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_expand_hostname.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_expand_hostname.rst.txt deleted file mode 100644 index 0acc95924e71..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_expand_hostname.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_expand_hostname - Canonicalize a hostname, possibly using name service. -============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_expand_hostname(krb5_context context, const char * host, char ** canonhost_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **host** - Input hostname - - **[out]** **canonhost_out** - Canonicalized hostname - - -.. - - - -.. - - - - - - - -This function canonicalizes orig_hostname, possibly using name service lookups if configuration permits. Use krb5_free_string() to free *canonhost_out* when it is no longer needed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.15 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_find_authdata.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_find_authdata.rst.txt deleted file mode 100644 index 793e65780884..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_find_authdata.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_find_authdata - Find authorization data elements. -======================================================== - -.. - -.. c:function:: krb5_error_code krb5_find_authdata(krb5_context context, krb5_authdata *const * ticket_authdata, krb5_authdata *const * ap_req_authdata, krb5_authdatatype ad_type, krb5_authdata *** results) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ticket_authdata** - Authorization data list from ticket - - **[in]** **ap_req_authdata** - Authorization data list from AP request - - **[in]** **ad_type** - Authorization data type to find - - **[out]** **results** - List of matching entries - - -.. - - - -.. - - - - - - - -This function searches *ticket_authdata* and *ap_req_authdata* for elements of type *ad_type* . Either input list may be NULL, in which case it will not be searched; otherwise, the input lists must be terminated by NULL entries. This function will search inside AD-IF-RELEVANT containers if found in either list. Use krb5_free_authdata() to free *results* when it is no longer needed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.10 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_finish_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_finish_key.rst.txt deleted file mode 100644 index a9f3da59e0a3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_finish_key.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_finish_key -=============== - -.. - -.. c:function:: krb5_error_code krb5_finish_key(krb5_context context, krb5_encrypt_block * eblock) - -.. - - -:param: - - **context** - - **eblock** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_c_* API family. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_finish_random_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_finish_random_key.rst.txt deleted file mode 100644 index 26c8b59d29d0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_finish_random_key.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_finish_random_key -====================== - -.. - -.. c:function:: krb5_error_code krb5_finish_random_key(krb5_context context, const krb5_encrypt_block * eblock, krb5_pointer * ptr) - -.. - - -:param: - - **context** - - **eblock** - - **ptr** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_c_* API family. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_addresses.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_addresses.rst.txt deleted file mode 100644 index 6717f529d8a4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_addresses.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_free_addresses - Free the data stored in array of addresses. -=================================================================== - -.. - -.. c:function:: void krb5_free_addresses(krb5_context context, krb5_address ** val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Array of addresses to be freed - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* and the array itself. - - - - - - - - - - -.. - - - - - - -.. note:: - - The last entry in the array must be a NULL pointer. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_ap_rep_enc_part.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_ap_rep_enc_part.rst.txt deleted file mode 100644 index 33f24e8926ff..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_ap_rep_enc_part.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_ap_rep_enc_part - Free a krb5_ap_rep_enc_part structure. -==================================================================== - -.. - -.. c:function:: void krb5_free_ap_rep_enc_part(krb5_context context, krb5_ap_rep_enc_part * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - AP-REP enc part to be freed - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* and the structure itself. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_authdata.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_authdata.rst.txt deleted file mode 100644 index e2b3e90b0826..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_authdata.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_free_authdata - Free the storage assigned to array of authentication data. -================================================================================= - -.. - -.. c:function:: void krb5_free_authdata(krb5_context context, krb5_authdata ** val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Array of authentication data to be freed - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* and the array itself. - - - - - - - - - - -.. - - - - - - -.. note:: - - The last entry in the array must be a NULL pointer. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_authenticator.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_authenticator.rst.txt deleted file mode 100644 index 505a508ae731..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_authenticator.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_authenticator - Free a krb5_authenticator structure. -================================================================ - -.. - -.. c:function:: void krb5_free_authenticator(krb5_context context, krb5_authenticator * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Authenticator structure to be freed - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* and the structure itself. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_checksum.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_checksum.rst.txt deleted file mode 100644 index 7809f6cffba9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_checksum.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_checksum - Free a krb5_checksum structure. -====================================================== - -.. - -.. c:function:: void krb5_free_checksum(krb5_context context, krb5_checksum * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Checksum structure to be freed - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* and the structure itself. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_checksum_contents.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_checksum_contents.rst.txt deleted file mode 100644 index 4ef12c3bcecb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_checksum_contents.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_checksum_contents - Free the contents of a krb5_checksum structure. -=============================================================================== - -.. - -.. c:function:: void krb5_free_checksum_contents(krb5_context context, krb5_checksum * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Checksum structure to free contents of - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* , but not the structure itself. It sets the checksum's data pointer to null and (beginning in release 1.19) sets its length to zero. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_cksumtypes.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_cksumtypes.rst.txt deleted file mode 100644 index d4d0d288d3cc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_cksumtypes.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_cksumtypes - Free an array of checksum types. -========================================================= - -.. - -.. c:function:: void krb5_free_cksumtypes(krb5_context context, krb5_cksumtype * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Array of checksum types to be freed - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_config_files.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_config_files.rst.txt deleted file mode 100644 index 620fe7e232ef..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_config_files.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_free_config_files - Free a list allocated by krb5_get_default_config_files() -=================================================================================== - -.. - -.. c:function:: void krb5_free_config_files(char ** filenames) - -.. - - -:param: - - **[in]** **filenames** - Configuration filename list - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.22 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_context.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_context.rst.txt deleted file mode 100644 index d403c21ffae5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_context.rst.txt +++ /dev/null @@ -1,40 +0,0 @@ -krb5_free_context - Free a krb5 library context. -================================================== - -.. - -.. c:function:: void krb5_free_context(krb5_context context) - -.. - - -:param: - - **[in]** **context** - Library context - - -.. - - - -.. - - - - - - - -This function frees a *context* that was created by krb5_init_context() or krb5_init_secure_context(). - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_cred_contents.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_cred_contents.rst.txt deleted file mode 100644 index cc26788018cb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_cred_contents.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_cred_contents - Free the contents of a krb5_creds structure. -======================================================================== - -.. - -.. c:function:: void krb5_free_cred_contents(krb5_context context, krb5_creds * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Credential structure to free contents of - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* , but not the structure itself. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_creds.rst.txt deleted file mode 100644 index c78ecdfcb83b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_creds.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_creds - Free a krb5_creds structure. -================================================ - -.. - -.. c:function:: void krb5_free_creds(krb5_context context, krb5_creds * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Credential structure to be freed. - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* and the structure itself. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_data.rst.txt deleted file mode 100644 index 8cd23a50cc69..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_data.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_data - Free a krb5_data structure. -============================================== - -.. - -.. c:function:: void krb5_free_data(krb5_context context, krb5_data * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Data structure to be freed - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* and the structure itself. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_data_contents.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_data_contents.rst.txt deleted file mode 100644 index c64ded129d26..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_data_contents.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_data_contents - Free the contents of a krb5_data structure and zero the data field. -=============================================================================================== - -.. - -.. c:function:: void krb5_free_data_contents(krb5_context context, krb5_data * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Data structure to free contents of - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* , but not the structure itself. It sets the structure's data pointer to null and (beginning in release 1.19) sets its length to zero. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_default_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_default_realm.rst.txt deleted file mode 100644 index a0a3babf205e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_default_realm.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_default_realm - Free a default realm string returned by krb5_get_default_realm(). -============================================================================================= - -.. - -.. c:function:: void krb5_free_default_realm(krb5_context context, char * lrealm) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **lrealm** - Realm to be freed - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_enctypes.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_enctypes.rst.txt deleted file mode 100644 index e1189cb0aade..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_enctypes.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_free_enctypes - Free an array of encryption types. -========================================================= - -.. - -.. c:function:: void krb5_free_enctypes(krb5_context context, krb5_enctype * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Array of enctypes to be freed - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.12 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_error.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_error.rst.txt deleted file mode 100644 index e31daf0900d0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_error.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_error - Free an error allocated by krb5_read_error() or krb5_sendauth(). -==================================================================================== - -.. - -.. c:function:: void krb5_free_error(krb5_context context, krb5_error * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Error data structure to be freed - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* and the structure itself. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_error_message.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_error_message.rst.txt deleted file mode 100644 index 923647aff7e6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_error_message.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_error_message - Free an error message generated by krb5_get_error_message(). -======================================================================================== - -.. - -.. c:function:: void krb5_free_error_message(krb5_context ctx, const char * msg) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **msg** - Pointer to error message - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_host_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_host_realm.rst.txt deleted file mode 100644 index 1a733b123b96..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_host_realm.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_free_host_realm - Free the memory allocated by krb5_get_host_realm(). -============================================================================ - -.. - -.. c:function:: krb5_error_code krb5_free_host_realm(krb5_context context, char *const * realmlist) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **realmlist** - List of realm names to be released - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_keyblock.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_keyblock.rst.txt deleted file mode 100644 index ec58604c65d3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_keyblock.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_keyblock - Free a krb5_keyblock structure. -====================================================== - -.. - -.. c:function:: void krb5_free_keyblock(krb5_context context, krb5_keyblock * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Keyblock to be freed - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* and the structure itself. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_keyblock_contents.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_keyblock_contents.rst.txt deleted file mode 100644 index 264444e71cbc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_keyblock_contents.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_keyblock_contents - Free the contents of a krb5_keyblock structure. -=============================================================================== - -.. - -.. c:function:: void krb5_free_keyblock_contents(krb5_context context, krb5_keyblock * key) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Keyblock to be freed - - -.. - - - -.. - - - - - - - -This function frees the contents of *key* , but not the structure itself. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_keytab_entry_contents.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_keytab_entry_contents.rst.txt deleted file mode 100644 index adecfe2fa9dc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_keytab_entry_contents.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_free_keytab_entry_contents - Free the contents of a key table entry. -=========================================================================== - -.. - -.. c:function:: krb5_error_code krb5_free_keytab_entry_contents(krb5_context context, krb5_keytab_entry * entry) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **entry** - Key table entry whose contents are to be freed - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - - -.. note:: - - The pointer is not freed. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_principal.rst.txt deleted file mode 100644 index 218369af551e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_principal.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_principal - Free the storage assigned to a principal. -================================================================= - -.. - -.. c:function:: void krb5_free_principal(krb5_context context, krb5_principal val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Principal to be freed - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_string.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_string.rst.txt deleted file mode 100644 index 4c7bcac3c100..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_string.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_free_string - Free a string allocated by a krb5 function. -================================================================ - -.. - -.. c:function:: void krb5_free_string(krb5_context context, char * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - String to be freed - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.10 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_tgt_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_tgt_creds.rst.txt deleted file mode 100644 index f885fc0c9a8d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_tgt_creds.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -krb5_free_tgt_creds - Free an array of credential structures. -=============================================================== - -.. - -.. c:function:: void krb5_free_tgt_creds(krb5_context context, krb5_creds ** tgts) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **tgts** - Null-terminated array of credentials to free - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - - -.. note:: - - The last entry in the array *tgts* must be a NULL pointer. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_ticket.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_ticket.rst.txt deleted file mode 100644 index f523917c8d7c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_ticket.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_ticket - Free a ticket. -=================================== - -.. - -.. c:function:: void krb5_free_ticket(krb5_context context, krb5_ticket * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Ticket to be freed - - -.. - - - -.. - - - - - - - -This function frees the contents of *val* and the structure itself. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_unparsed_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_unparsed_name.rst.txt deleted file mode 100644 index b6f9e1626b91..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_free_unparsed_name.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_free_unparsed_name - Free a string representation of a principal. -======================================================================== - -.. - -.. c:function:: void krb5_free_unparsed_name(krb5_context context, char * val) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **val** - Name string to be freed - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_fwd_tgt_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_fwd_tgt_creds.rst.txt deleted file mode 100644 index 939faad6a8cc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_fwd_tgt_creds.rst.txt +++ /dev/null @@ -1,68 +0,0 @@ -krb5_fwd_tgt_creds - Get a forwarded TGT and format a KRB-CRED message. -========================================================================= - -.. - -.. c:function:: krb5_error_code krb5_fwd_tgt_creds(krb5_context context, krb5_auth_context auth_context, const char * rhost, krb5_principal client, krb5_principal server, krb5_ccache cc, int forwardable, krb5_data * outbuf) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **rhost** - Remote host - - **[in]** **client** - Client principal of TGT - - **[in]** **server** - Principal of server to receive TGT - - **[in]** **cc** - Credential cache handle (NULL to use default) - - **[in]** **forwardable** - Whether TGT should be forwardable - - **[out]** **outbuf** - KRB-CRED message - - -.. - - -:retval: - - 0 Success - - ENOMEM Insufficient memory - - KRB5_PRINC_NOMATCH Requested principal and ticket do not match - - KRB5_NO_TKT_SUPPLIED Request did not supply a ticket - - KRB5_CC_BADNAME Credential cache name or principal name malformed - - -:return: - - Kerberos error codes - -.. - - - - - - - -Get a TGT for use at the remote host *rhost* and format it into a KRB-CRED message. If *rhost* is NULL and *server* is of type KRB5_NT_SRV_HST, the second component of *server* will be used. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials.rst.txt deleted file mode 100644 index b4fbcd69b0e7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials.rst.txt +++ /dev/null @@ -1,81 +0,0 @@ -krb5_get_credentials - Get an additional ticket. -================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_credentials(krb5_context context, krb5_flags options, krb5_ccache ccache, krb5_creds * in_creds, krb5_creds ** out_creds) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **options** - Options - - **[in]** **ccache** - Credential cache handle - - **[in]** **in_creds** - Input credentials - - **[out]** **out_creds** - Output updated credentials - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Use *ccache* or a TGS exchange to get a service ticket matching *in_creds* . - - - -Valid values for *options* are: - - - KRB5_GC_CACHED Search only credential cache for the ticket - - - - KRB5_GC_USER_USER Return a user to user authentication ticket - - *in_creds* must be non-null. *in_creds->client* and *in_creds->server* must be filled in to specify the client and the server respectively. If any authorization data needs to be requested for the service ticket (such as restrictions on how the ticket can be used), specify it in *in_creds->authdata* ; otherwise set *in_creds->authdata* to NULL. The session key type is specified in *in_creds->keyblock.enctype* , if it is nonzero. - - - -If *in_creds->times.endtime* is specified, it is used as the requested expiration date if a TGS request is made. If *in_creds->times.endtime* is set to 0, the latest possible expiration date will be requested. The KDC or cache may return a ticket with an earlier expiration date. - - - -Any returned ticket and intermediate ticket-granting tickets are stored in *ccache* . - - - -Use krb5_free_creds() to free *out_creds* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials_renew.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials_renew.rst.txt deleted file mode 100644 index 75aac54057ed..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials_renew.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -krb5_get_credentials_renew -========================== - -.. - -.. c:function:: krb5_error_code krb5_get_credentials_renew(krb5_context context, krb5_flags options, krb5_ccache ccache, krb5_creds * in_creds, krb5_creds ** out_creds) - -.. - - -:param: - - **context** - - **options** - - **ccache** - - **in_creds** - - **out_creds** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_get_renewed_creds. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials_validate.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials_validate.rst.txt deleted file mode 100644 index 29033b9d5c31..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_credentials_validate.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -krb5_get_credentials_validate -============================= - -.. - -.. c:function:: krb5_error_code krb5_get_credentials_validate(krb5_context context, krb5_flags options, krb5_ccache ccache, krb5_creds * in_creds, krb5_creds ** out_creds) - -.. - - -:param: - - **context** - - **options** - - **ccache** - - **in_creds** - - **out_creds** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_get_validated_creds. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_default_config_files.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_default_config_files.rst.txt deleted file mode 100644 index 292eed4c82f0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_default_config_files.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_get_default_config_files - Return a list of default configuration filenames. -=================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_default_config_files(char *** filenames) - -.. - - -:param: - - **[out]** **filenames** - Configuration filename list - - -.. - - - -.. - - - - - - - -Fill in *filenames* with a null-terminated list of configuration files which will be read by krb5_init_context() in the current process environment. - - - -Use krb5_free_config_files() to free *filenames* when it is no longer needed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.22 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_default_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_default_realm.rst.txt deleted file mode 100644 index 093bfa9e77bf..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_default_realm.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_get_default_realm - Retrieve the default realm. -====================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_default_realm(krb5_context context, char ** lrealm) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **lrealm** - Default realm name - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Retrieves the default realm to be used if no user-specified realm is available. - - - -Use krb5_free_default_realm() to free *lrealm* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_error_message.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_error_message.rst.txt deleted file mode 100644 index 16bac2f2eb8b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_error_message.rst.txt +++ /dev/null @@ -1,62 +0,0 @@ -krb5_get_error_message - Get the (possibly extended) error message for a code. -================================================================================ - -.. - -.. c:function:: const char * krb5_get_error_message(krb5_context ctx, krb5_error_code code) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **code** - Error code - - -.. - - - -.. - - - - - - - -The behavior of krb5_get_error_message() is only defined the first time it is called after a failed call to a krb5 function using the same context, and only when the error code passed in is the same as that returned by the krb5 function. - - - -This function never returns NULL, so its result may be used unconditionally as a C string. - - - -The string returned by this function must be freed using krb5_free_error_message() - - - - - - - - - - -.. - - - - - - -.. note:: - - Future versions may return the same string for the second and following calls. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_etype_info.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_etype_info.rst.txt deleted file mode 100644 index 63425f568423..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_etype_info.rst.txt +++ /dev/null @@ -1,72 +0,0 @@ -krb5_get_etype_info - Retrieve enctype, salt and s2kparams from KDC. -====================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_etype_info(krb5_context context, krb5_principal principal, krb5_get_init_creds_opt * opt, krb5_enctype * enctype_out, krb5_data * salt_out, krb5_data * s2kparams_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **principal** - Principal whose information is requested - - **[in]** **opt** - Initial credential options - - **[out]** **enctype_out** - The enctype chosen by KDC - - **[out]** **salt_out** - Salt returned from KDC - - **[out]** **s2kparams_out** - String-to-key parameters returned from KDC - - -.. - - -:retval: - - 0 Success - - -:return: - - A Kerberos error code - -.. - - - - - - - -Send an initial ticket request for *principal* and extract the encryption type, salt type, and string-to-key parameters from the KDC response. If the KDC provides no etype-info, set *enctype_out* to **ENCTYPE_NULL** and set *salt_out* and *s2kparams_out* to empty. If the KDC etype-info provides no salt, compute the default salt and place it in *salt_out* . If the KDC etype-info provides no string-to-key parameters, set *s2kparams_out* to empty. - - - - *opt* may be used to specify options which affect the initial request, such as request encryption types or a FAST armor cache (see krb5_get_init_creds_opt_set_etype_list() and krb5_get_init_creds_opt_set_fast_ccache_name()). - - - -Use krb5_free_data_contents() to free *salt_out* and *s2kparams_out* when they are no longer needed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.17 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_fallback_host_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_fallback_host_realm.rst.txt deleted file mode 100644 index 0a7d1a3ce870..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_fallback_host_realm.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_get_fallback_host_realm -============================ - -.. - -.. c:function:: krb5_error_code krb5_get_fallback_host_realm(krb5_context context, krb5_data * hdata, char *** realmsp) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **hdata** - Host name (or NULL) - - **[out]** **realmsp** - Null-terminated list of realm names - - -.. - - - -.. - - - - - - - -Fill in *realmsp* with a pointer to a null-terminated list of realm names obtained through heuristics or insecure resolution methods which have lower priority than KDC referrals. - - - -If *host* is NULL, the local host's realms are determined. - - - -Use krb5_free_host_realm() to release *realmsp* when it is no longer needed. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_host_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_host_realm.rst.txt deleted file mode 100644 index 32ceb2ad3857..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_host_realm.rst.txt +++ /dev/null @@ -1,63 +0,0 @@ -krb5_get_host_realm - Get the Kerberos realm names for a host. -================================================================ - -.. - -.. c:function:: krb5_error_code krb5_get_host_realm(krb5_context context, const char * host, char *** realmsp) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **host** - Host name (or NULL) - - **[out]** **realmsp** - Null-terminated list of realm names - - -.. - - -:retval: - - 0 Success - - ENOMEM Insufficient memory - - -:return: - - Kerberos error codes - -.. - - - - - - - -Fill in *realmsp* with a pointer to a null-terminated list of realm names. If there are no known realms for the host, a list containing the referral (empty) realm is returned. - - - -If *host* is NULL, the local host's realms are determined. - - - -Use krb5_free_host_realm() to release *realmsp* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_in_tkt_with_keytab.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_in_tkt_with_keytab.rst.txt deleted file mode 100644 index 23a25153912c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_in_tkt_with_keytab.rst.txt +++ /dev/null @@ -1,58 +0,0 @@ -krb5_get_in_tkt_with_keytab -=========================== - -.. - -.. c:function:: krb5_error_code krb5_get_in_tkt_with_keytab(krb5_context context, krb5_flags options, krb5_address *const * addrs, krb5_enctype * ktypes, krb5_preauthtype * pre_auth_types, krb5_keytab arg_keytab, krb5_ccache ccache, krb5_creds * creds, krb5_kdc_rep ** ret_as_reply) - -.. - - -:param: - - **context** - - **options** - - **addrs** - - **ktypes** - - **pre_auth_types** - - **arg_keytab** - - **ccache** - - **creds** - - **ret_as_reply** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_get_init_creds_keytab(). - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_in_tkt_with_password.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_in_tkt_with_password.rst.txt deleted file mode 100644 index c0782f8bee1e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_in_tkt_with_password.rst.txt +++ /dev/null @@ -1,58 +0,0 @@ -krb5_get_in_tkt_with_password -============================= - -.. - -.. c:function:: krb5_error_code krb5_get_in_tkt_with_password(krb5_context context, krb5_flags options, krb5_address *const * addrs, krb5_enctype * ktypes, krb5_preauthtype * pre_auth_types, const char * password, krb5_ccache ccache, krb5_creds * creds, krb5_kdc_rep ** ret_as_reply) - -.. - - -:param: - - **context** - - **options** - - **addrs** - - **ktypes** - - **pre_auth_types** - - **password** - - **ccache** - - **creds** - - **ret_as_reply** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_get_init_creds_password(). - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_in_tkt_with_skey.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_in_tkt_with_skey.rst.txt deleted file mode 100644 index fed7f0b47fec..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_in_tkt_with_skey.rst.txt +++ /dev/null @@ -1,58 +0,0 @@ -krb5_get_in_tkt_with_skey -========================= - -.. - -.. c:function:: krb5_error_code krb5_get_in_tkt_with_skey(krb5_context context, krb5_flags options, krb5_address *const * addrs, krb5_enctype * ktypes, krb5_preauthtype * pre_auth_types, const krb5_keyblock * key, krb5_ccache ccache, krb5_creds * creds, krb5_kdc_rep ** ret_as_reply) - -.. - - -:param: - - **context** - - **options** - - **addrs** - - **ktypes** - - **pre_auth_types** - - **key** - - **ccache** - - **creds** - - **ret_as_reply** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_get_init_creds(). - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_keytab.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_keytab.rst.txt deleted file mode 100644 index 32ce5cb62a71..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_keytab.rst.txt +++ /dev/null @@ -1,62 +0,0 @@ -krb5_get_init_creds_keytab - Get initial credentials using a key table. -========================================================================= - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_keytab(krb5_context context, krb5_creds * creds, krb5_principal client, krb5_keytab arg_keytab, krb5_deltat start_time, const char * in_tkt_service, krb5_get_init_creds_opt * k5_gic_options) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **creds** - New credentials - - **[in]** **client** - Client principal - - **[in]** **arg_keytab** - Key table handle - - **[in]** **start_time** - Time when ticket becomes valid (0 for now) - - **[in]** **in_tkt_service** - Service name of initial credentials (or NULL) - - **[in]** **k5_gic_options** - Initial credential options - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function requests KDC for an initial credentials for *client* using a client key stored in *arg_keytab* . If *in_tkt_service* is specified, it is parsed as a principal name (with the realm ignored) and used as the service principal for the request; otherwise the ticket-granting service is used. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_alloc.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_alloc.rst.txt deleted file mode 100644 index b882608907e2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_alloc.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_get_init_creds_opt_alloc - Allocate a new initial credential options structure. -====================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_opt_alloc(krb5_context context, krb5_get_init_creds_opt ** opt) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **opt** - New options structure - - -.. - - -:retval: - - 0 - Success; Kerberos errors otherwise. - - -.. - - - - - - - -This function is the preferred way to create an options structure for getting initial credentials, and is required to make use of certain options. Use krb5_get_init_creds_opt_free() to free *opt* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_free.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_free.rst.txt deleted file mode 100644 index 94ddbf6bfbc7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_free.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -krb5_get_init_creds_opt_free - Free initial credential options. -================================================================= - -.. - -.. c:function:: void krb5_get_init_creds_opt_free(krb5_context context, krb5_get_init_creds_opt * opt) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **opt** - Options structure to free - - -.. - - - -.. - - - - - - - - - - - - - - -.. - -.. seealso:: - krb5_get_init_creds_opt_alloc() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_get_fast_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_get_fast_flags.rst.txt deleted file mode 100644 index b38ddacf3087..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_get_fast_flags.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_get_init_creds_opt_get_fast_flags - Retrieve FAST flags from initial credential options. -=============================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_opt_get_fast_flags(krb5_context context, krb5_get_init_creds_opt * opt, krb5_flags * out_flags) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **opt** - Options - - **[out]** **out_flags** - FAST flags - - -.. - - -:retval: - - 0 - Success; Kerberos errors otherwise. - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_init.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_init.rst.txt deleted file mode 100644 index 1cbaa9abc864..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_init.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_get_init_creds_opt_init -============================ - -.. - -.. c:function:: void krb5_get_init_creds_opt_init(krb5_get_init_creds_opt * opt) - -.. - - -:param: - - **opt** - - -.. - - - -.. - - -DEPRECATED Use krb5_get_init_creds_opt_alloc() instead. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_address_list.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_address_list.rst.txt deleted file mode 100644 index e460a46e96e5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_address_list.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_get_init_creds_opt_set_address_list - Set address restrictions in initial credential options. -==================================================================================================== - -.. - -.. c:function:: void krb5_get_init_creds_opt_set_address_list(krb5_get_init_creds_opt * opt, krb5_address ** addresses) - -.. - - -:param: - - **[in]** **opt** - Options structure - - **[in]** **addresses** - Null-terminated array of addresses - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_anonymous.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_anonymous.rst.txt deleted file mode 100644 index 6953b2c526c6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_anonymous.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_get_init_creds_opt_set_anonymous - Set or unset the anonymous flag in initial credential options. -======================================================================================================== - -.. - -.. c:function:: void krb5_get_init_creds_opt_set_anonymous(krb5_get_init_creds_opt * opt, int anonymous) - -.. - - -:param: - - **[in]** **opt** - Options structure - - **[in]** **anonymous** - Whether to make an anonymous request - - -.. - - - -.. - - - - - - - -This function may be used to request anonymous credentials from the KDC by setting *anonymous* to non-zero. Note that anonymous credentials are only a request; clients must verify that credentials are anonymous if that is a requirement. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_canonicalize.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_canonicalize.rst.txt deleted file mode 100644 index 099644fea0da..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_canonicalize.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_get_init_creds_opt_set_canonicalize - Set or unset the canonicalize flag in initial credential options. -============================================================================================================== - -.. - -.. c:function:: void krb5_get_init_creds_opt_set_canonicalize(krb5_get_init_creds_opt * opt, int canonicalize) - -.. - - -:param: - - **[in]** **opt** - Options structure - - **[in]** **canonicalize** - Whether to canonicalize client principal - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_change_password_prompt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_change_password_prompt.rst.txt deleted file mode 100644 index f88593294bc6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_change_password_prompt.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_get_init_creds_opt_set_change_password_prompt - Set or unset change-password-prompt flag in initial credential options. -============================================================================================================================== - -.. - -.. c:function:: void krb5_get_init_creds_opt_set_change_password_prompt(krb5_get_init_creds_opt * opt, int prompt) - -.. - - -:param: - - **[in]** **opt** - Options structure - - **[in]** **prompt** - Whether to prompt to change password - - -.. - - - -.. - - - - - - - -This flag is on by default. It controls whether krb5_get_init_creds_password() will react to an expired-password error by prompting for a new password and attempting to change the old one. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_etype_list.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_etype_list.rst.txt deleted file mode 100644 index ac6f8ab6402a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_etype_list.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_get_init_creds_opt_set_etype_list - Set allowable encryption types in initial credential options. -======================================================================================================== - -.. - -.. c:function:: void krb5_get_init_creds_opt_set_etype_list(krb5_get_init_creds_opt * opt, krb5_enctype * etype_list, int etype_list_length) - -.. - - -:param: - - **[in]** **opt** - Options structure - - **[in]** **etype_list** - Array of encryption types - - **[in]** **etype_list_length** - Length of *etype_list* - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_expire_callback.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_expire_callback.rst.txt deleted file mode 100644 index 6715de3ecb87..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_expire_callback.rst.txt +++ /dev/null @@ -1,78 +0,0 @@ -krb5_get_init_creds_opt_set_expire_callback - Set an expiration callback in initial credential options. -========================================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_opt_set_expire_callback(krb5_context context, krb5_get_init_creds_opt * opt, krb5_expire_callback_func cb, void * data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **opt** - Options structure - - **[in]** **cb** - Callback function - - **[in]** **data** - Callback argument - - -.. - - - -.. - - - - - - - -Set a callback to receive password and account expiration times. - - - - *cb* will be invoked if and only if credentials are successfully acquired. The callback will receive the *context* from the calling function and the *data* argument supplied with this API. The remaining arguments should be interpreted as follows: - - - -If *is_last_req* is true, then the KDC reply contained last-req entries which unambiguously indicated the password expiration, account expiration, or both. (If either value was not present, the corresponding argument will be 0.) Furthermore, a non-zero *password_expiration* should be taken as a suggestion from the KDC that a warning be displayed. - - - -If *is_last_req* is false, then *account_expiration* will be 0 and *password_expiration* will contain the expiration time of either the password or account, or 0 if no expiration time was indicated in the KDC reply. The callback should independently decide whether to display a password expiration warning. - - - -Note that *cb* may be invoked even if credentials are being acquired for the kadmin/changepw service in order to change the password. It is the caller's responsibility to avoid displaying a password expiry warning in this case. - - - - - - - - - - -.. - - - - - -.. warning:: - - Setting an expire callback with this API will cause krb5_get_init_creds_password() not to send password expiry warnings to the prompter, as it ordinarily may. - - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_ccache.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_ccache.rst.txt deleted file mode 100644 index 0124a3c0edfa..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_ccache.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_get_init_creds_opt_set_fast_ccache - Set FAST armor cache in initial credential options. -=============================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_opt_set_fast_ccache(krb5_context context, krb5_get_init_creds_opt * opt, krb5_ccache ccache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **opt** - Options - - **[in]** **ccache** - Credential cache handle - - -.. - - - -.. - - - - - - - -This function is similar to krb5_get_init_creds_opt_set_fast_ccache_name(), but uses a credential cache handle instead of a name. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_ccache_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_ccache_name.rst.txt deleted file mode 100644 index b7d7710dea91..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_ccache_name.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_get_init_creds_opt_set_fast_ccache_name - Set location of FAST armor ccache in initial credential options. -================================================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_opt_set_fast_ccache_name(krb5_context context, krb5_get_init_creds_opt * opt, const char * fast_ccache_name) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **opt** - Options - - **[in]** **fast_ccache_name** - Credential cache name - - -.. - - - -.. - - - - - - - -Sets the location of a credential cache containing an armor ticket to protect an initial credential exchange using the FAST protocol extension. - - - -In version 1.7, setting an armor ccache requires that FAST be used for the exchange. In version 1.8 or later, setting the armor ccache causes FAST to be used if the KDC supports it; krb5_get_init_creds_opt_set_fast_flags() must be used to require that FAST be used. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_flags.rst.txt deleted file mode 100644 index 203e9c71c37d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_fast_flags.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_get_init_creds_opt_set_fast_flags - Set FAST flags in initial credential options. -======================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_opt_set_fast_flags(krb5_context context, krb5_get_init_creds_opt * opt, krb5_flags flags) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **opt** - Options - - **[in]** **flags** - FAST flags - - -.. - - -:retval: - - 0 - Success; Kerberos errors otherwise. - - -.. - - - - - - - -The following flag values are valid: - - - KRB5_FAST_REQUIRED - Require FAST to be used - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_forwardable.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_forwardable.rst.txt deleted file mode 100644 index 50d64b8cb505..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_forwardable.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_get_init_creds_opt_set_forwardable - Set or unset the forwardable flag in initial credential options. -============================================================================================================ - -.. - -.. c:function:: void krb5_get_init_creds_opt_set_forwardable(krb5_get_init_creds_opt * opt, int forwardable) - -.. - - -:param: - - **[in]** **opt** - Options structure - - **[in]** **forwardable** - Whether credentials should be forwardable - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_in_ccache.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_in_ccache.rst.txt deleted file mode 100644 index 41d511766714..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_in_ccache.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_get_init_creds_opt_set_in_ccache - Set an input credential cache in initial credential options. -====================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_opt_set_in_ccache(krb5_context context, krb5_get_init_creds_opt * opt, krb5_ccache ccache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **opt** - Options - - **[in]** **ccache** - Credential cache handle - - -.. - - - -.. - - - - - - - -If an input credential cache is set, then the krb5_get_init_creds family of APIs will read settings from it. Setting an input ccache is desirable when the application wishes to perform authentication in the same way (using the same preauthentication mechanisms, and making the same non-security- sensitive choices) as the previous authentication attempt, which stored information in the passed-in ccache. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_out_ccache.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_out_ccache.rst.txt deleted file mode 100644 index dcb1cf606c6a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_out_ccache.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_get_init_creds_opt_set_out_ccache - Set an output credential cache in initial credential options. -======================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_opt_set_out_ccache(krb5_context context, krb5_get_init_creds_opt * opt, krb5_ccache ccache) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **opt** - Options - - **[in]** **ccache** - Credential cache handle - - -.. - - - -.. - - - - - - - -If an output credential cache is set, then the krb5_get_init_creds family of APIs will write credentials to it. Setting an output ccache is desirable both because it simplifies calling code and because it permits the krb5_get_init_creds APIs to write out configuration information about the realm to the ccache. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_pa.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_pa.rst.txt deleted file mode 100644 index a610fa0cb557..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_pa.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_get_init_creds_opt_set_pa - Supply options for preauthentication in initial credential options. -====================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_opt_set_pa(krb5_context context, krb5_get_init_creds_opt * opt, const char * attr, const char * value) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **opt** - Options structure - - **[in]** **attr** - Preauthentication option name - - **[in]** **value** - Preauthentication option value - - -.. - - - -.. - - - - - - - -This function allows the caller to supply options for preauthentication. The values of *attr* and *value* are supplied to each preauthentication module available within *context* . - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_pac_request.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_pac_request.rst.txt deleted file mode 100644 index ed46081b99df..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_pac_request.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_get_init_creds_opt_set_pac_request - Ask the KDC to include or not include a PAC in the ticket. -====================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_opt_set_pac_request(krb5_context context, krb5_get_init_creds_opt * opt, krb5_boolean req_pac) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **opt** - Options structure - - **[in]** **req_pac** - Whether to request a PAC or not - - -.. - - - -.. - - - - - - - -If this option is set, the AS request will include a PAC-REQUEST pa-data item explicitly asking the KDC to either include or not include a privilege attribute certificate in the ticket authorization data. By default, no request is made; typically the KDC will default to including a PAC if it supports them. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.15 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_preauth_list.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_preauth_list.rst.txt deleted file mode 100644 index 1e7b647f3b2c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_preauth_list.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_get_init_creds_opt_set_preauth_list - Set preauthentication types in initial credential options. -======================================================================================================= - -.. - -.. c:function:: void krb5_get_init_creds_opt_set_preauth_list(krb5_get_init_creds_opt * opt, krb5_preauthtype * preauth_list, int preauth_list_length) - -.. - - -:param: - - **[in]** **opt** - Options structure - - **[in]** **preauth_list** - Array of preauthentication types - - **[in]** **preauth_list_length** - Length of *preauth_list* - - -.. - - - -.. - - - - - - - -This function can be used to perform optimistic preauthentication when getting initial credentials, in combination with krb5_get_init_creds_opt_set_salt() and krb5_get_init_creds_opt_set_pa(). - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_proxiable.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_proxiable.rst.txt deleted file mode 100644 index 7ced7273c668..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_proxiable.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_get_init_creds_opt_set_proxiable - Set or unset the proxiable flag in initial credential options. -======================================================================================================== - -.. - -.. c:function:: void krb5_get_init_creds_opt_set_proxiable(krb5_get_init_creds_opt * opt, int proxiable) - -.. - - -:param: - - **[in]** **opt** - Options structure - - **[in]** **proxiable** - Whether credentials should be proxiable - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_renew_life.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_renew_life.rst.txt deleted file mode 100644 index 58e938d9f079..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_renew_life.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_get_init_creds_opt_set_renew_life - Set the ticket renewal lifetime in initial credential options. -========================================================================================================= - -.. - -.. c:function:: void krb5_get_init_creds_opt_set_renew_life(krb5_get_init_creds_opt * opt, krb5_deltat renew_life) - -.. - - -:param: - - **[in]** **opt** - Pointer to *options* field - - **[in]** **renew_life** - Ticket renewal lifetime - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_responder.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_responder.rst.txt deleted file mode 100644 index 220ba403df7a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_responder.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -krb5_get_init_creds_opt_set_responder - Set the responder function in initial credential options. -=================================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_opt_set_responder(krb5_context context, krb5_get_init_creds_opt * opt, krb5_responder_fn responder, void * data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **opt** - Options structure - - **[in]** **responder** - Responder function - - **[in]** **data** - Responder data argument - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_salt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_salt.rst.txt deleted file mode 100644 index 22512f671ad7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_salt.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_get_init_creds_opt_set_salt - Set salt for optimistic preauthentication in initial credential options. -============================================================================================================= - -.. - -.. c:function:: void krb5_get_init_creds_opt_set_salt(krb5_get_init_creds_opt * opt, krb5_data * salt) - -.. - - -:param: - - **[in]** **opt** - Options structure - - **[in]** **salt** - Salt data - - -.. - - - -.. - - - - - - - -When getting initial credentials with a password, a salt string it used to convert the password to a key. Normally this salt is obtained from the first KDC reply, but when performing optimistic preauthentication, the client may need to supply the salt string with this function. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_tkt_life.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_tkt_life.rst.txt deleted file mode 100644 index a5c1f685ca52..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_opt_set_tkt_life.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_get_init_creds_opt_set_tkt_life - Set the ticket lifetime in initial credential options. -=============================================================================================== - -.. - -.. c:function:: void krb5_get_init_creds_opt_set_tkt_life(krb5_get_init_creds_opt * opt, krb5_deltat tkt_life) - -.. - - -:param: - - **[in]** **opt** - Options structure - - **[in]** **tkt_life** - Ticket lifetime - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_password.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_password.rst.txt deleted file mode 100644 index 1c6fd6853934..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_init_creds_password.rst.txt +++ /dev/null @@ -1,75 +0,0 @@ -krb5_get_init_creds_password - Get initial credentials using a password. -========================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_init_creds_password(krb5_context context, krb5_creds * creds, krb5_principal client, const char * password, krb5_prompter_fct prompter, void * data, krb5_deltat start_time, const char * in_tkt_service, krb5_get_init_creds_opt * k5_gic_options) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **creds** - New credentials - - **[in]** **client** - Client principal - - **[in]** **password** - Password (or NULL) - - **[in]** **prompter** - Prompter function - - **[in]** **data** - Prompter callback data - - **[in]** **start_time** - Time when ticket becomes valid (0 for now) - - **[in]** **in_tkt_service** - Service name of initial credentials (or NULL) - - **[in]** **k5_gic_options** - Initial credential options - - -.. - - -:retval: - - 0 Success - - EINVAL Invalid argument - - KRB5_KDC_UNREACH Cannot contact any KDC for requested realm - - KRB5_PREAUTH_FAILED Generic Pre-athentication failure - - KRB5_LIBOS_PWDINTR Password read interrupted - - KRB5_REALM_CANT_RESOLVE Cannot resolve network address for KDC in requested realm - - KRB5KDC_ERR_KEY_EXP Password has expired - - KRB5_LIBOS_BADPWDMATCH Password mismatch - - KRB5_CHPW_PWDNULL New password cannot be zero length - - KRB5_CHPW_FAIL Password change failed - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function requests KDC for an initial credentials for *client* using *password* . If *password* is NULL, a password will be prompted for using *prompter* if necessary. If *in_tkt_service* is specified, it is parsed as a principal name (with the realm ignored) and used as the service principal for the request; otherwise the ticket-granting service is used. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_permitted_enctypes.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_permitted_enctypes.rst.txt deleted file mode 100644 index a57764059667..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_permitted_enctypes.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_get_permitted_enctypes - Return a list of encryption types permitted for session keys. -============================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_get_permitted_enctypes(krb5_context context, krb5_enctype ** ktypes) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **ktypes** - Zero-terminated list of encryption types - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function returns the list of encryption types permitted for session keys within *context* , as determined by configuration or by a previous call to krb5_set_default_tgs_enctypes(). - - - -Use krb5_free_enctypes() to free *ktypes* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_profile.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_profile.rst.txt deleted file mode 100644 index 4ef2949a32df..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_profile.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_get_profile - Retrieve configuration profile from the context. -===================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_profile(krb5_context context, struct _profile_t ** profile) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **profile** - Pointer to data read from a configuration file - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function creates a new *profile* object that reflects profile in the supplied *context* . - - - -The *profile* object may be freed with profile_release() function. See profile.h and profile API for more details. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_prompt_types.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_prompt_types.rst.txt deleted file mode 100644 index 39156ca153af..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_prompt_types.rst.txt +++ /dev/null @@ -1,43 +0,0 @@ -krb5_get_prompt_types - Get prompt types array from a context. -================================================================ - -.. - -.. c:function:: krb5_prompt_type * krb5_get_prompt_types(krb5_context context) - -.. - - -:param: - - **[in]** **context** - Library context - - -.. - - - -:return: - - Pointer to an array of prompt types corresponding to the prompter's prompts arguments. Each type has one of the following values: KRB5_PROMPT_TYPE_PASSWORD KRB5_PROMPT_TYPE_NEW_PASSWORD KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN KRB5_PROMPT_TYPE_PREAUTH - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_renewed_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_renewed_creds.rst.txt deleted file mode 100644 index 21458f8531bd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_renewed_creds.rst.txt +++ /dev/null @@ -1,62 +0,0 @@ -krb5_get_renewed_creds - Get renewed credential from KDC using an existing credential. -======================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_renewed_creds(krb5_context context, krb5_creds * creds, krb5_principal client, krb5_ccache ccache, const char * in_tkt_service) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **creds** - Renewed credentials - - **[in]** **client** - Client principal name - - **[in]** **ccache** - Credential cache - - **[in]** **in_tkt_service** - Server principal string (or NULL) - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function gets a renewed credential using an existing one from *ccache* . If *in_tkt_service* is specified, it is parsed (with the realm part ignored) and used as the server principal of the credential; otherwise, the ticket-granting service is used. - - - -If successful, the renewed credential is placed in *creds* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_server_rcache.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_server_rcache.rst.txt deleted file mode 100644 index 38bb1305c1b1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_server_rcache.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_get_server_rcache - Generate a replay cache object for server use and open it. -===================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_server_rcache(krb5_context context, const krb5_data * piece, krb5_rcache * rcptr) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **piece** - Unused (replay cache identifier) - - **[out]** **rcptr** - Handle to an open rcache - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a handle to the default replay cache. Use krb5_rc_close() to close *rcptr* when it is no longer needed. - - - - - - - - - - -.. - - - - -.. note:: - - Prior to release 1.18, this function creates a handle to a different replay cache for each unique value of *piece* . - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_time_offsets.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_time_offsets.rst.txt deleted file mode 100644 index 9bdd8ecb5e69..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_time_offsets.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_get_time_offsets - Return the time offsets from the os context. -====================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_time_offsets(krb5_context context, krb5_timestamp * seconds, krb5_int32 * microseconds) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **seconds** - Time offset, seconds portion - - **[out]** **microseconds** - Time offset, microseconds portion - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function returns the time offsets in *context* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_validated_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_validated_creds.rst.txt deleted file mode 100644 index e1bf3107abb7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_get_validated_creds.rst.txt +++ /dev/null @@ -1,67 +0,0 @@ -krb5_get_validated_creds - Get validated credentials from the KDC. -==================================================================== - -.. - -.. c:function:: krb5_error_code krb5_get_validated_creds(krb5_context context, krb5_creds * creds, krb5_principal client, krb5_ccache ccache, const char * in_tkt_service) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **creds** - Validated credentials - - **[in]** **client** - Client principal name - - **[in]** **ccache** - Credential cache - - **[in]** **in_tkt_service** - Server principal string (or NULL) - - -.. - - -:retval: - - 0 Success - - KRB5_NO_2ND_TKT Request missing second ticket - - KRB5_NO_TKT_SUPPLIED Request did not supply a ticket - - KRB5_PRINC_NOMATCH Requested principal and ticket do not match - - KRB5_KDCREP_MODIFIED KDC reply did not match expectations - - KRB5_KDCREP_SKEW Clock skew too great in KDC reply - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function gets a validated credential using a postdated credential from *ccache* . If *in_tkt_service* is specified, it is parsed (with the realm part ignored) and used as the server principal of the credential; otherwise, the ticket-granting service is used. - - - -If successful, the validated credential is placed in *creds* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_context.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_context.rst.txt deleted file mode 100644 index df00c2dad693..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_context.rst.txt +++ /dev/null @@ -1,58 +0,0 @@ -krb5_init_context - Create a krb5 library context. -==================================================== - -.. - -.. c:function:: krb5_error_code krb5_init_context(krb5_context * context) - -.. - - -:param: - - **[out]** **context** - Library context - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -The *context* must be released by calling krb5_free_context() when it is no longer needed. - - - - - - - - - - -.. - - - - - -.. warning:: - - Any program or module that needs the Kerberos code to not trust the environment must use krb5_init_secure_context(), or clean out the environment. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_context_profile.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_context_profile.rst.txt deleted file mode 100644 index 3afab4fecf75..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_context_profile.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_init_context_profile - Create a krb5 library context using a specified profile. -====================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_init_context_profile(struct _profile_t * profile, krb5_flags flags, krb5_context * context) - -.. - - -:param: - - **[in]** **profile** - Profile object (NULL to create default profile) - - **[in]** **flags** - Context initialization flags - - **[out]** **context** - Library context - - -.. - - - -.. - - - - - - - -Create a context structure, optionally using a specified profile and initialization flags. If *profile* is NULL, the default profile will be created from config files. If *profile* is non-null, a copy of it will be made for the new context; the caller should still clean up its copy. Valid flag values are: - - - - - - - KRB5_INIT_CONTEXT_SECURE Ignore environment variables - - - - KRB5_INIT_CONTEXT_KDC Use KDC configuration if creating profile - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_free.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_free.rst.txt deleted file mode 100644 index 9b6f55005d8d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_free.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_init_creds_free - Free an initial credentials context. -============================================================= - -.. - -.. c:function:: void krb5_init_creds_free(krb5_context context, krb5_init_creds_context ctx) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - Initial credentials context - - -.. - - - -.. - - - - - - - - *context* must be the same as the one passed to krb5_init_creds_init() for this initial credentials context. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get.rst.txt deleted file mode 100644 index 00e070ae18c8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_init_creds_get - Acquire credentials using an initial credentials context. -================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_init_creds_get(krb5_context context, krb5_init_creds_context ctx) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - Initial credentials context - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function synchronously obtains credentials using a context created by krb5_init_creds_init(). On successful return, the credentials can be retrieved with krb5_init_creds_get_creds(). - - - - *context* must be the same as the one passed to krb5_init_creds_init() for this initial credentials context. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get_creds.rst.txt deleted file mode 100644 index 777f7f8842e8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get_creds.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_init_creds_get_creds - Retrieve acquired credentials from an initial credentials context. -================================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_init_creds_get_creds(krb5_context context, krb5_init_creds_context ctx, krb5_creds * creds) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - Initial credentials context - - **[out]** **creds** - Acquired credentials - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function copies the acquired initial credentials from *ctx* into *creds* , after the successful completion of krb5_init_creds_get() or krb5_init_creds_step(). Use krb5_free_cred_contents() to free *creds* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get_error.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get_error.rst.txt deleted file mode 100644 index 66aea0b85b7f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get_error.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_init_creds_get_error - Get the last error from KDC from an initial credentials context. -============================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_init_creds_get_error(krb5_context context, krb5_init_creds_context ctx, krb5_error ** error) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - Initial credentials context - - **[out]** **error** - Error from KDC, or NULL if none was received - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get_times.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get_times.rst.txt deleted file mode 100644 index e856df1ddf03..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_get_times.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_init_creds_get_times - Retrieve ticket times from an initial credentials context. -======================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_init_creds_get_times(krb5_context context, krb5_init_creds_context ctx, krb5_ticket_times * times) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - Initial credentials context - - **[out]** **times** - Ticket times for acquired credentials - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -The initial credentials context must have completed obtaining credentials via either krb5_init_creds_get() or krb5_init_creds_step(). - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_init.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_init.rst.txt deleted file mode 100644 index ed8096b89dc8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_init.rst.txt +++ /dev/null @@ -1,63 +0,0 @@ -krb5_init_creds_init - Create a context for acquiring initial credentials. -============================================================================ - -.. - -.. c:function:: krb5_error_code krb5_init_creds_init(krb5_context context, krb5_principal client, krb5_prompter_fct prompter, void * data, krb5_deltat start_time, krb5_get_init_creds_opt * options, krb5_init_creds_context * ctx) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **client** - Client principal to get initial creds for - - **[in]** **prompter** - Prompter callback - - **[in]** **data** - Prompter callback argument - - **[in]** **start_time** - Time when credentials become valid (0 for now) - - **[in]** **options** - Options structure (NULL for default) - - **[out]** **ctx** - New initial credentials context - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a new context for acquiring initial credentials. Use krb5_init_creds_free() to free *ctx* when it is no longer needed. - - - -Any subsequent calls to krb5_init_creds_step(), krb5_init_creds_get(), or krb5_init_creds_free() for this initial credentials context must use the same *context* argument as the one passed to this function. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_set_keytab.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_set_keytab.rst.txt deleted file mode 100644 index 222755aab8bb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_set_keytab.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_init_creds_set_keytab - Specify a keytab to use for acquiring initial credentials. -========================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_init_creds_set_keytab(krb5_context context, krb5_init_creds_context ctx, krb5_keytab keytab) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - Initial credentials context - - **[in]** **keytab** - Key table handle - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function supplies a keytab containing the client key for an initial credentials request. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_set_password.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_set_password.rst.txt deleted file mode 100644 index 10ad140d04d3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_set_password.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_init_creds_set_password - Set a password for acquiring initial credentials. -================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_init_creds_set_password(krb5_context context, krb5_init_creds_context ctx, const char * password) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - Initial credentials context - - **[in]** **password** - Password - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function supplies a password to be used to construct the client key for an initial credentials request. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_set_service.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_set_service.rst.txt deleted file mode 100644 index d08ffc7d629d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_set_service.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_init_creds_set_service - Specify a service principal for acquiring initial credentials. -============================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_init_creds_set_service(krb5_context context, krb5_init_creds_context ctx, const char * service) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - Initial credentials context - - **[in]** **service** - Service principal string - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function supplies a service principal string to acquire initial credentials for instead of the default krbtgt service. *service* is parsed as a principal name; any realm part is ignored. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_step.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_step.rst.txt deleted file mode 100644 index f4258e38832d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_creds_step.rst.txt +++ /dev/null @@ -1,69 +0,0 @@ -krb5_init_creds_step - Get the next KDC request for acquiring initial credentials. -==================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_init_creds_step(krb5_context context, krb5_init_creds_context ctx, krb5_data * in, krb5_data * out, krb5_data * realm, unsigned int * flags) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - Initial credentials context - - **[in]** **in** - KDC response (empty on the first call) - - **[out]** **out** - Next KDC request - - **[out]** **realm** - Realm for next KDC request - - **[out]** **flags** - Output flags - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function constructs the next KDC request in an initial credential exchange, allowing the caller to control the transport of KDC requests and replies. On the first call, *in* should be set to an empty buffer; on subsequent calls, it should be set to the KDC's reply to the previous request. - - - -If more requests are needed, *flags* will be set to KRB5_INIT_CREDS_STEP_FLAG_CONTINUE and the next request will be placed in *out* . If no more requests are needed, *flags* will not contain KRB5_INIT_CREDS_STEP_FLAG_CONTINUE and *out* will be empty. - - - -If this function returns **KRB5KRB_ERR_RESPONSE_TOO_BIG** , the caller should transmit the next request using TCP rather than UDP. If this function returns any other error, the initial credential exchange has failed. - - - - *context* must be the same as the one passed to krb5_init_creds_init() for this initial credentials context. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_keyblock.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_keyblock.rst.txt deleted file mode 100644 index cc6109dee668..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_keyblock.rst.txt +++ /dev/null @@ -1,61 +0,0 @@ -krb5_init_keyblock - Initialize an empty krb5_keyblock . -========================================================== - -.. - -.. c:function:: krb5_error_code krb5_init_keyblock(krb5_context context, krb5_enctype enctype, size_t length, krb5_keyblock ** out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enctype** - Encryption type - - **[in]** **length** - Length of keyblock (or 0) - - **[out]** **out** - New keyblock structure - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Initialize a new keyblock and allocate storage for the contents of the key. It is legal to pass in a length of 0, in which case contents are left unallocated. Use krb5_free_keyblock() to free *out* when it is no longer needed. - - - - - - - - - - -.. - - - - - - -.. note:: - - If *length* is set to 0, contents are left unallocated. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_random_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_random_key.rst.txt deleted file mode 100644 index 271d7274a122..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_random_key.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_init_random_key -==================== - -.. - -.. c:function:: krb5_error_code krb5_init_random_key(krb5_context context, const krb5_encrypt_block * eblock, const krb5_keyblock * keyblock, krb5_pointer * ptr) - -.. - - -:param: - - **context** - - **eblock** - - **keyblock** - - **ptr** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_c_* API family. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_secure_context.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_secure_context.rst.txt deleted file mode 100644 index 83c41cdb20a6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_init_secure_context.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_init_secure_context - Create a krb5 library context using only configuration files. -========================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_init_secure_context(krb5_context * context) - -.. - - -:param: - - **[out]** **context** - Library context - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Create a context structure, using only system configuration files. All information passed through the environment variables is ignored. - - - -The *context* must be released by calling krb5_free_context() when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_is_config_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_is_config_principal.rst.txt deleted file mode 100644 index 8c1ef8067c6b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_is_config_principal.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -krb5_is_config_principal - Test whether a principal is a configuration principal. -=================================================================================== - -.. - -.. c:function:: krb5_boolean krb5_is_config_principal(krb5_context context, krb5_const_principal principal) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **principal** - Principal to check - - -.. - - - -:return: - - TRUE if the principal is a configuration principal (generated part of krb5_cc_set_config()); FALSE otherwise. - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_is_referral_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_is_referral_realm.rst.txt deleted file mode 100644 index 89916c322a10..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_is_referral_realm.rst.txt +++ /dev/null @@ -1,43 +0,0 @@ -krb5_is_referral_realm - Check for a match with KRB5_REFERRAL_REALM. -====================================================================== - -.. - -.. c:function:: krb5_boolean krb5_is_referral_realm(const krb5_data * r) - -.. - - -:param: - - **[in]** **r** - Realm to check - - -.. - - - -:return: - - TRUE if r is zero-length, FALSE otherwise - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_is_thread_safe.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_is_thread_safe.rst.txt deleted file mode 100644 index 812a2c321121..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_is_thread_safe.rst.txt +++ /dev/null @@ -1,43 +0,0 @@ -krb5_is_thread_safe - Test whether the Kerberos library was built with multithread support. -============================================================================================= - -.. - -.. c:function:: krb5_boolean krb5_is_thread_safe(void None) - -.. - - -:param: - - **None** - - -.. - - -:retval: - - TRUE if the library is threadsafe; FALSE otherwise - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_create_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_create_key.rst.txt deleted file mode 100644 index 204d020947eb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_create_key.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_k_create_key - Create a krb5_key from the enctype and key data in a keyblock. -==================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_k_create_key(krb5_context context, const krb5_keyblock * key_data, krb5_key * out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key_data** - Keyblock - - **[out]** **out** - Opaque key - - -.. - - -:retval: - - 0 Success; otherwise - KRB5_BAD_ENCTYPE - - -.. - - - - - - - -The reference count on a key *out* is set to 1. Use krb5_k_free_key() to free *out* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_decrypt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_decrypt.rst.txt deleted file mode 100644 index 3c1700419f3c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_decrypt.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -krb5_k_decrypt - Decrypt data using a key (operates on opaque key). -===================================================================== - -.. - -.. c:function:: krb5_error_code krb5_k_decrypt(krb5_context context, krb5_key key, krb5_keyusage usage, const krb5_data * cipher_state, const krb5_enc_data * input, krb5_data * output) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Encryption key - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[inout]** **cipher_state** - Cipher state; specify NULL if not needed - - **[in]** **input** - Encrypted data - - **[out]** **output** - Decrypted data - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function decrypts the data block *input* and stores the output into *output* . The actual decryption key will be derived from *key* and *usage* if key derivation is specified for the encryption type. If non-null, *cipher_state* specifies the beginning state for the decryption operation, and is updated with the state to be passed as input to the next operation. - - - - - - - - - - -.. - - - - - - -.. note:: - - The caller must initialize *output* and allocate at least enough space for the result. The usual practice is to allocate an output buffer as long as the ciphertext, and let krb5_c_decrypt() trim *output->length* . For some enctypes, the resulting *output->length* may include padding bytes. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_decrypt_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_decrypt_iov.rst.txt deleted file mode 100644 index 3156b43952ce..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_decrypt_iov.rst.txt +++ /dev/null @@ -1,68 +0,0 @@ -krb5_k_decrypt_iov - Decrypt data in place supporting AEAD (operates on opaque key). -====================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_k_decrypt_iov(krb5_context context, krb5_key key, krb5_keyusage usage, const krb5_data * cipher_state, krb5_crypto_iov * data, size_t num_data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Encryption key - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[in]** **cipher_state** - Cipher state; specify NULL if not needed - - **[inout]** **data** - IOV array. Modified in-place. - - **[in]** **num_data** - Size of *data* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function decrypts the data block *data* and stores the output in-place. The actual decryption key will be derived from *key* and *usage* if key derivation is specified for the encryption type. If non-null, *cipher_state* specifies the beginning state for the decryption operation, and is updated with the state to be passed as input to the next operation. The caller must allocate the right number of krb5_crypto_iov structures before calling into this API. - - - - - - - - - - -.. - -.. seealso:: - krb5_k_encrypt_iov() - - - - - - -.. note:: - - On return from a krb5_c_decrypt_iov() call, the *data->length* in the iov structure are adjusted to reflect actual lengths of the ciphertext used. For example, if the padding length is too large, the length will be reduced. Lengths are never increased. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_encrypt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_encrypt.rst.txt deleted file mode 100644 index 797f9d2a2f17..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_encrypt.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -krb5_k_encrypt - Encrypt data using a key (operates on opaque key). -===================================================================== - -.. - -.. c:function:: krb5_error_code krb5_k_encrypt(krb5_context context, krb5_key key, krb5_keyusage usage, const krb5_data * cipher_state, const krb5_data * input, krb5_enc_data * output) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Encryption key - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[inout]** **cipher_state** - Cipher state; specify NULL if not needed - - **[in]** **input** - Data to be encrypted - - **[out]** **output** - Encrypted data - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function encrypts the data block *input* and stores the output into *output* . The actual encryption key will be derived from *key* and *usage* if key derivation is specified for the encryption type. If non-null, *cipher_state* specifies the beginning state for the encryption operation, and is updated with the state to be passed as input to the next operation. - - - - - - - - - - -.. - - - - - - -.. note:: - - The caller must initialize *output* and allocate at least enough space for the result (using krb5_c_encrypt_length() to determine the amount of space needed). *output->length* will be set to the actual length of the ciphertext. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_encrypt_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_encrypt_iov.rst.txt deleted file mode 100644 index e715e26ed6e1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_encrypt_iov.rst.txt +++ /dev/null @@ -1,68 +0,0 @@ -krb5_k_encrypt_iov - Encrypt data in place supporting AEAD (operates on opaque key). -====================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_k_encrypt_iov(krb5_context context, krb5_key key, krb5_keyusage usage, const krb5_data * cipher_state, krb5_crypto_iov * data, size_t num_data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Encryption key - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[in]** **cipher_state** - Cipher state; specify NULL if not needed - - **[inout]** **data** - IOV array. Modified in-place. - - **[in]** **num_data** - Size of *data* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function encrypts the data block *data* and stores the output in-place. The actual encryption key will be derived from *key* and *usage* if key derivation is specified for the encryption type. If non-null, *cipher_state* specifies the beginning state for the encryption operation, and is updated with the state to be passed as input to the next operation. The caller must allocate the right number of krb5_crypto_iov structures before calling into this API. - - - - - - - - - - -.. - -.. seealso:: - krb5_k_decrypt_iov() - - - - - - -.. note:: - - On return from a krb5_c_encrypt_iov() call, the *data->length* in the iov structure are adjusted to reflect actual lengths of the ciphertext used. For example, if the padding length is too large, the length will be reduced. Lengths are never increased. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_free_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_free_key.rst.txt deleted file mode 100644 index c1060f6dd4d8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_free_key.rst.txt +++ /dev/null @@ -1,39 +0,0 @@ -krb5_k_free_key - Decrement the reference count on a key and free it if it hits zero. -======================================================================================= - -.. - -.. c:function:: void krb5_k_free_key(krb5_context context, krb5_key key) - -.. - - -:param: - - **context** - - **key** - - -.. - - - -.. - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_key_enctype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_key_enctype.rst.txt deleted file mode 100644 index d77a541e9869..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_key_enctype.rst.txt +++ /dev/null @@ -1,39 +0,0 @@ -krb5_k_key_enctype - Retrieve the enctype of a krb5_key structure. -==================================================================== - -.. - -.. c:function:: krb5_enctype krb5_k_key_enctype(krb5_context context, krb5_key key) - -.. - - -:param: - - **context** - - **key** - - -.. - - - -.. - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_key_keyblock.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_key_keyblock.rst.txt deleted file mode 100644 index efd782c95ee5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_key_keyblock.rst.txt +++ /dev/null @@ -1,41 +0,0 @@ -krb5_k_key_keyblock - Retrieve a copy of the keyblock from a krb5_key structure. -================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_k_key_keyblock(krb5_context context, krb5_key key, krb5_keyblock ** key_data) - -.. - - -:param: - - **context** - - **key** - - **key_data** - - -.. - - - -.. - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_make_checksum.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_make_checksum.rst.txt deleted file mode 100644 index 3f66c0f0508a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_make_checksum.rst.txt +++ /dev/null @@ -1,68 +0,0 @@ -krb5_k_make_checksum - Compute a checksum (operates on opaque key). -===================================================================== - -.. - -.. c:function:: krb5_error_code krb5_k_make_checksum(krb5_context context, krb5_cksumtype cksumtype, krb5_key key, krb5_keyusage usage, const krb5_data * input, krb5_checksum * cksum) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cksumtype** - Checksum type (0 for mandatory type) - - **[in]** **key** - Encryption key for a keyed checksum - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[in]** **input** - Input data - - **[out]** **cksum** - Generated checksum - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function computes a checksum of type *cksumtype* over *input* , using *key* if the checksum type is a keyed checksum. If *cksumtype* is 0 and *key* is non-null, the checksum type will be the mandatory-to-implement checksum type for the key's encryption type. The actual checksum key will be derived from *key* and *usage* if key derivation is specified for the checksum type. The newly created *cksum* must be released by calling krb5_free_checksum_contents() when it is no longer needed. - - - - - - - - - - -.. - -.. seealso:: - krb5_c_verify_checksum() - - - - - - -.. note:: - - This function is similar to krb5_c_make_checksum(), but operates on opaque *key* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_make_checksum_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_make_checksum_iov.rst.txt deleted file mode 100644 index 3f4cb6b5f860..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_make_checksum_iov.rst.txt +++ /dev/null @@ -1,68 +0,0 @@ -krb5_k_make_checksum_iov - Fill in a checksum element in IOV array (operates on opaque key) -============================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_k_make_checksum_iov(krb5_context context, krb5_cksumtype cksumtype, krb5_key key, krb5_keyusage usage, krb5_crypto_iov * data, size_t num_data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cksumtype** - Checksum type (0 for mandatory type) - - **[in]** **key** - Encryption key for a keyed checksum - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[inout]** **data** - IOV array - - **[in]** **num_data** - Size of *data* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Create a checksum in the KRB5_CRYPTO_TYPE_CHECKSUM element over KRB5_CRYPTO_TYPE_DATA and KRB5_CRYPTO_TYPE_SIGN_ONLY chunks in *data* . Only the KRB5_CRYPTO_TYPE_CHECKSUM region is modified. - - - - - - - - - - -.. - -.. seealso:: - krb5_k_verify_checksum_iov() - - - - - - -.. note:: - - This function is similar to krb5_c_make_checksum_iov(), but operates on opaque *key* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_prf.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_prf.rst.txt deleted file mode 100644 index 69b75d830b1d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_prf.rst.txt +++ /dev/null @@ -1,61 +0,0 @@ -krb5_k_prf - Generate enctype-specific pseudo-random bytes (operates on opaque key). -====================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_k_prf(krb5_context context, krb5_key key, krb5_data * input, krb5_data * output) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Key - - **[in]** **input** - Input data - - **[out]** **output** - Output data - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function selects a pseudo-random function based on *key* and computes its value over *input* , placing the result into *output* . The caller must preinitialize *output* and allocate space for the result. - - - - - - - - - - -.. - - - - - - -.. note:: - - This function is similar to krb5_c_prf(), but operates on opaque *key* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_reference_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_reference_key.rst.txt deleted file mode 100644 index 06b4629eda7c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_reference_key.rst.txt +++ /dev/null @@ -1,39 +0,0 @@ -krb5_k_reference_key - Increment the reference count on a key. -================================================================ - -.. - -.. c:function:: void krb5_k_reference_key(krb5_context context, krb5_key key) - -.. - - -:param: - - **context** - - **key** - - -.. - - - -.. - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_verify_checksum.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_verify_checksum.rst.txt deleted file mode 100644 index fe591953122a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_verify_checksum.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -krb5_k_verify_checksum - Verify a checksum (operates on opaque key). -====================================================================== - -.. - -.. c:function:: krb5_error_code krb5_k_verify_checksum(krb5_context context, krb5_key key, krb5_keyusage usage, const krb5_data * data, const krb5_checksum * cksum, krb5_boolean * valid) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Encryption key for a keyed checksum - - **[in]** **usage** - *key* usage - - **[in]** **data** - Data to be used to compute a new checksum using *key* to compare *cksum* against - - **[in]** **cksum** - Checksum to be verified - - **[out]** **valid** - Non-zero for success, zero for failure - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function verifies that *cksum* is a valid checksum for *data* . If the checksum type of *cksum* is a keyed checksum, *key* is used to verify the checksum. If the checksum type in *cksum* is 0 and *key* is not NULL, the mandatory checksum type for *key* will be used. The actual checksum key will be derived from *key* and *usage* if key derivation is specified for the checksum type. - - - - - - - - - - -.. - - - - - - -.. note:: - - This function is similar to krb5_c_verify_checksum(), but operates on opaque *key* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_verify_checksum_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_verify_checksum_iov.rst.txt deleted file mode 100644 index e364a76cbe0e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_k_verify_checksum_iov.rst.txt +++ /dev/null @@ -1,70 +0,0 @@ -krb5_k_verify_checksum_iov - Validate a checksum element in IOV array (operates on opaque key). -================================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_k_verify_checksum_iov(krb5_context context, krb5_cksumtype cksumtype, krb5_key key, krb5_keyusage usage, const krb5_crypto_iov * data, size_t num_data, krb5_boolean * valid) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **cksumtype** - Checksum type (0 for mandatory type) - - **[in]** **key** - Encryption key for a keyed checksum - - **[in]** **usage** - Key usage (see KRB5_KEYUSAGE macros) - - **[in]** **data** - IOV array - - **[in]** **num_data** - Size of *data* - - **[out]** **valid** - Non-zero for success, zero for failure - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Confirm that the checksum in the KRB5_CRYPTO_TYPE_CHECKSUM element is a valid checksum of the KRB5_CRYPTO_TYPE_DATA and KRB5_CRYPTO_TYPE_SIGN_ONLY regions in the iov. - - - - - - - - - - -.. - -.. seealso:: - krb5_k_make_checksum_iov() - - - - - - -.. note:: - - This function is similar to krb5_c_verify_checksum_iov(), but operates on opaque *key* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kdc_sign_ticket.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kdc_sign_ticket.rst.txt deleted file mode 100644 index 4697e4550ca0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kdc_sign_ticket.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -krb5_kdc_sign_ticket - Sign a PAC, possibly including a ticket signature. -=========================================================================== - -.. - -.. c:function:: krb5_error_code krb5_kdc_sign_ticket(krb5_context context, krb5_enc_tkt_part * enc_tkt, const krb5_pac pac, krb5_const_principal server_princ, krb5_const_principal client_princ, const krb5_keyblock * server, const krb5_keyblock * privsvr, krb5_boolean with_realm) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enc_tkt** - The ticket for the signature - - **[in]** **pac** - PAC handle - - **[in]** **server_princ** - Canonical ticket server name - - **[in]** **client_princ** - PAC_CLIENT_INFO principal (or NULL) - - **[in]** **server** - Key for server checksum - - **[in]** **privsvr** - Key for KDC and ticket checksum - - **[in]** **with_realm** - If true, include the realm of *principal* - - -.. - - -:retval: - - 0 on success, otherwise - Kerberos error codes - - -.. - - - - - - - -Sign *pac* using the keys *server* and *privsvr* . Include a ticket signature over *enc_tkt* if *server_princ* is not a TGS or kadmin/changepw principal name. Add the signed PAC's encoding to the authorization data of *enc_tkt* in the first slot, wrapped in an AD-IF-RELEVANT container. If *client_princ* is non-null, add a PAC_CLIENT_INFO buffer, including the realm if *with_realm* is true. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.20 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kdc_verify_ticket.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kdc_verify_ticket.rst.txt deleted file mode 100644 index 29fdd3a30d9e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kdc_verify_ticket.rst.txt +++ /dev/null @@ -1,73 +0,0 @@ -krb5_kdc_verify_ticket - Verify a PAC, possibly including ticket signature. -============================================================================= - -.. - -.. c:function:: krb5_error_code krb5_kdc_verify_ticket(krb5_context context, const krb5_enc_tkt_part * enc_tkt, krb5_const_principal server_princ, const krb5_keyblock * server, const krb5_keyblock * privsvr, krb5_pac * pac_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enc_tkt** - Ticket enc-part, possibly containing a PAC - - **[in]** **server_princ** - Canonicalized name of ticket server - - **[in]** **server** - Key to validate server checksum (or NULL) - - **[in]** **privsvr** - Key to validate KDC checksum (or NULL) - - **[out]** **pac_out** - Verified PAC (NULL if no PAC included) - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -If a PAC is present in *enc_tkt* , verify its signatures. If *privsvr* is not NULL and *server_princ* is not a krbtgt or kadmin/changepw service, require a ticket signature over *enc_tkt* in addition to the KDC signature. Place the verified PAC in *pac_out* . If an invalid PAC signature is found, return an error matching the Windows KDC protocol code for that condition as closely as possible. - - - -If no PAC is present in *enc_tkt* , set *pac_out* to NULL and return successfully. - - - - - - - - - - -.. - - - - - - -.. note:: - - This function does not validate the PAC_CLIENT_INFO buffer. If a specific value is expected, the caller can make a separate call to krb5_pac_verify_ext() with a principal but no keys. - - - -.. note:: - - New in 1.20 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_add_entry.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_add_entry.rst.txt deleted file mode 100644 index f762d360ff70..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_add_entry.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_kt_add_entry - Add a new entry to a key table. -===================================================== - -.. - -.. c:function:: krb5_error_code krb5_kt_add_entry(krb5_context context, krb5_keytab id, krb5_keytab_entry * entry) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **id** - Key table handle - - **[in]** **entry** - Entry to be added - - -.. - - -:retval: - - 0 Success - - ENOMEM Insufficient memory - - KRB5_KT_NOWRITE Key table is not writeable - - -:return: - - Kerberos error codes - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_client_default.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_client_default.rst.txt deleted file mode 100644 index 8f5663bcc05b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_client_default.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_kt_client_default - Resolve the default client key table. -================================================================ - -.. - -.. c:function:: krb5_error_code krb5_kt_client_default(krb5_context context, krb5_keytab * keytab_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **keytab_out** - Key table handle - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Fill *keytab_out* with a handle to the default client key table. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_close.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_close.rst.txt deleted file mode 100644 index 4761ad689786..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_close.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -krb5_kt_close - Close a key table handle. -=========================================== - -.. - -.. c:function:: krb5_error_code krb5_kt_close(krb5_context context, krb5_keytab keytab) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keytab** - Key table handle - - -.. - - -:retval: - - 0 None - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_default.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_default.rst.txt deleted file mode 100644 index 35f5a66049fb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_default.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_kt_default - Resolve the default key table. -================================================== - -.. - -.. c:function:: krb5_error_code krb5_kt_default(krb5_context context, krb5_keytab * id) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **id** - Key table handle - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Set *id* to a handle to the default key table. The key table is not opened. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_default_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_default_name.rst.txt deleted file mode 100644 index 6f9e558f97f5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_default_name.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_kt_default_name - Get the default key table name. -======================================================== - -.. - -.. c:function:: krb5_error_code krb5_kt_default_name(krb5_context context, char * name, int name_size) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **name** - Default key table name - - **[in]** **name_size** - Space available in *name* - - -.. - - -:retval: - - 0 Success - - KRB5_CONFIG_NOTENUFSPACE Buffer is too short - - -:return: - - Kerberos error codes - -.. - - - - - - - -Fill *name* with the name of the default key table for *context* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_dup.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_dup.rst.txt deleted file mode 100644 index 745463503769..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_dup.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_kt_dup - Duplicate keytab handle. -======================================== - -.. - -.. c:function:: krb5_error_code krb5_kt_dup(krb5_context context, krb5_keytab in, krb5_keytab * out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **in** - Key table handle to be duplicated - - **[out]** **out** - Key table handle - - -.. - - - -.. - - - - - - - -Create a new handle referring to the same key table as *in* . The new handle and *in* can be closed independently. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.12 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_end_seq_get.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_end_seq_get.rst.txt deleted file mode 100644 index c22443ae0972..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_end_seq_get.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_kt_end_seq_get - Release a keytab cursor. -================================================ - -.. - -.. c:function:: krb5_error_code krb5_kt_end_seq_get(krb5_context context, krb5_keytab keytab, krb5_kt_cursor * cursor) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keytab** - Key table handle - - **[out]** **cursor** - Cursor - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function should be called to release the cursor created by krb5_kt_start_seq_get(). - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_free_entry.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_free_entry.rst.txt deleted file mode 100644 index 5eaa118f81c0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_free_entry.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_kt_free_entry -================== - -.. - -.. c:function:: krb5_error_code krb5_kt_free_entry(krb5_context context, krb5_keytab_entry * entry) - -.. - - -:param: - - **context** - - **entry** - - -.. - - - -.. - - -DEPRECATED Use krb5_free_keytab_entry_contents instead. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_get_entry.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_get_entry.rst.txt deleted file mode 100644 index d5779002dbeb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_get_entry.rst.txt +++ /dev/null @@ -1,70 +0,0 @@ -krb5_kt_get_entry - Get an entry from a key table. -==================================================== - -.. - -.. c:function:: krb5_error_code krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry * entry) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keytab** - Key table handle - - **[in]** **principal** - Principal name - - **[in]** **vno** - Key version number (0 for highest available) - - **[in]** **enctype** - Encryption type (0 zero for any enctype) - - **[out]** **entry** - Returned entry from key table - - -.. - - -:retval: - - 0 Success - - Kerberos error codes on failure - - -.. - - - - - - - -Retrieve an entry from a key table which matches the *keytab* , *principal* , *vno* , and *enctype* . If *vno* is zero, retrieve the highest-numbered kvno matching the other fields. If *enctype* is 0, match any enctype. - - - -Use krb5_free_keytab_entry_contents() to free *entry* when it is no longer needed. - - - - - - - - - - -.. - - - - - - -.. note:: - - If *vno* is zero, the function retrieves the highest-numbered-kvno entry that matches the specified principal. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_get_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_get_name.rst.txt deleted file mode 100644 index 5d36dbba68a8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_get_name.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_kt_get_name - Get a key table name. -========================================== - -.. - -.. c:function:: krb5_error_code krb5_kt_get_name(krb5_context context, krb5_keytab keytab, char * name, unsigned int namelen) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keytab** - Key table handle - - **[out]** **name** - Key table name - - **[in]** **namelen** - Maximum length to fill in name - - -.. - - -:retval: - - 0 Success - - KRB5_KT_NAME_TOOLONG Key table name does not fit in namelen bytes - - -:return: - - Kerberos error codes - -.. - - - - - - - -Fill *name* with the name of *keytab* including the type and delimiter. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_get_type.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_get_type.rst.txt deleted file mode 100644 index c675af8fa092..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_get_type.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -krb5_kt_get_type - Return the type of a key table. -==================================================== - -.. - -.. c:function:: const char * krb5_kt_get_type(krb5_context context, krb5_keytab keytab) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keytab** - Key table handle - - -.. - - - -:return: - - The type of a key table as an alias that must not be modified or freed by the caller. - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_have_content.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_have_content.rst.txt deleted file mode 100644 index dffa94e6ea54..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_have_content.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -krb5_kt_have_content - Check if a keytab exists and contains entries. -======================================================================= - -.. - -.. c:function:: krb5_error_code krb5_kt_have_content(krb5_context context, krb5_keytab keytab) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keytab** - Key table handle - - -.. - - -:retval: - - 0 Keytab exists and contains entries - - KRB5_KT_NOTFOUND Keytab does not contain entries - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_next_entry.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_next_entry.rst.txt deleted file mode 100644 index a8715175d2f9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_next_entry.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_kt_next_entry - Retrieve the next entry from the key table. -================================================================== - -.. - -.. c:function:: krb5_error_code krb5_kt_next_entry(krb5_context context, krb5_keytab keytab, krb5_keytab_entry * entry, krb5_kt_cursor * cursor) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keytab** - Key table handle - - **[out]** **entry** - Returned key table entry - - **[in]** **cursor** - Key table cursor - - -.. - - -:retval: - - 0 Success - - KRB5_KT_END - if the last entry was reached - - -:return: - - Kerberos error codes - -.. - - - - - - - -Return the next sequential entry in *keytab* and advance *cursor* . Callers must release the returned entry with krb5_kt_free_entry(). - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_read_service_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_read_service_key.rst.txt deleted file mode 100644 index acb8ca8626d7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_read_service_key.rst.txt +++ /dev/null @@ -1,68 +0,0 @@ -krb5_kt_read_service_key - Retrieve a service key from a key table. -===================================================================== - -.. - -.. c:function:: krb5_error_code krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock ** key) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keyprocarg** - Name of a key table (NULL to use default name) - - **[in]** **principal** - Service principal - - **[in]** **vno** - Key version number (0 for highest available) - - **[in]** **enctype** - Encryption type (0 for any type) - - **[out]** **key** - Service key from key table - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error code if not found or keyprocarg is invalid. - -.. - - - - - - - -Open and search the specified key table for the entry identified by *principal* , *enctype* , and *vno* . If no key is found, return an error code. - - - -The default key table is used, unless *keyprocarg* is non-null. *keyprocarg* designates a specific key table. - - - -Use krb5_free_keyblock() to free *key* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_remove_entry.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_remove_entry.rst.txt deleted file mode 100644 index 10c1705acf76..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_remove_entry.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_kt_remove_entry - Remove an entry from a key table. -========================================================== - -.. - -.. c:function:: krb5_error_code krb5_kt_remove_entry(krb5_context context, krb5_keytab id, krb5_keytab_entry * entry) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **id** - Key table handle - - **[in]** **entry** - Entry to remove from key table - - -.. - - -:retval: - - 0 Success - - KRB5_KT_NOWRITE Key table is not writable - - -:return: - - Kerberos error codes - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_resolve.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_resolve.rst.txt deleted file mode 100644 index 4ece77d8e9e9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_resolve.rst.txt +++ /dev/null @@ -1,66 +0,0 @@ -krb5_kt_resolve - Get a handle for a key table. -================================================= - -.. - -.. c:function:: krb5_error_code krb5_kt_resolve(krb5_context context, const char * name, krb5_keytab * ktid) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **name** - Name of the key table - - **[out]** **ktid** - Key table handle - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Resolve the key table name *name* and set *ktid* to a handle identifying the key table. Use krb5_kt_close() to free *ktid* when it is no longer needed. - - - - *name* must be of the form **type:residual** , where *type* must be a type known to the library and *residual* portion should be specific to the particular keytab type. If no *type* is given, the default is **FILE** . - - - -If *name* is of type **FILE** , the keytab file is not opened by this call. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_start_seq_get.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_start_seq_get.rst.txt deleted file mode 100644 index cbe107be4aca..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kt_start_seq_get.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_kt_start_seq_get - Start a sequential retrieval of key table entries. -============================================================================ - -.. - -.. c:function:: krb5_error_code krb5_kt_start_seq_get(krb5_context context, krb5_keytab keytab, krb5_kt_cursor * cursor) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **keytab** - Key table handle - - **[out]** **cursor** - Cursor - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Prepare to read sequentially every key in the specified key table. Use krb5_kt_end_seq_get() to release the cursor when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kuserok.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kuserok.rst.txt deleted file mode 100644 index 7dbd15f7646c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_kuserok.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_kuserok - Determine if a principal is authorized to log in as a local user. -================================================================================== - -.. - -.. c:function:: krb5_boolean krb5_kuserok(krb5_context context, krb5_principal principal, const char * luser) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **principal** - Principal name - - **[in]** **luser** - Local username - - -.. - - -:retval: - - TRUE Principal is authorized to log in as user; FALSE otherwise. - - -.. - - - - - - - -Determine whether *principal* is authorized to log in as a local user *luser* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_make_authdata_kdc_issued.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_make_authdata_kdc_issued.rst.txt deleted file mode 100644 index e671af5f8e85..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_make_authdata_kdc_issued.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_make_authdata_kdc_issued - Encode and sign AD-KDCIssued authorization data. -================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_make_authdata_kdc_issued(krb5_context context, const krb5_keyblock * key, krb5_const_principal issuer, krb5_authdata *const * authdata, krb5_authdata *** ad_kdcissued) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Session key - - **[in]** **issuer** - The name of the issuing principal - - **[in]** **authdata** - List of authorization data to be signed - - **[out]** **ad_kdcissued** - List containing AD-KDCIssued authdata - - -.. - - - -.. - - - - - - - -This function wraps a list of authorization data entries *authdata* in an AD-KDCIssued container (see RFC 4120 section 5.2.6.2) signed with *key* . The result is returned in *ad_kdcissued* as a single-element list. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_marshal_credentials.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_marshal_credentials.rst.txt deleted file mode 100644 index de1c8f8efa20..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_marshal_credentials.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_marshal_credentials - Serialize a krb5_creds object. -=========================================================== - -.. - -.. c:function:: krb5_error_code krb5_marshal_credentials(krb5_context context, krb5_creds * in_creds, krb5_data ** data_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **in_creds** - The credentials object to serialize - - **[out]** **data_out** - The serialized credentials - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Serialize *creds* in the format used by the FILE ccache format (vesion 4) and KCM ccache protocol. - - - -Use krb5_free_data() to free *data_out* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_merge_authdata.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_merge_authdata.rst.txt deleted file mode 100644 index 6be3fbef1f29..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_merge_authdata.rst.txt +++ /dev/null @@ -1,61 +0,0 @@ -krb5_merge_authdata - Merge two authorization data lists into a new list. -=========================================================================== - -.. - -.. c:function:: krb5_error_code krb5_merge_authdata(krb5_context context, krb5_authdata *const * inauthdat1, krb5_authdata *const * inauthdat2, krb5_authdata *** outauthdat) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **inauthdat1** - First list of *krb5_authdata* structures - - **[in]** **inauthdat2** - Second list of *krb5_authdata* structures - - **[out]** **outauthdat** - Merged list of *krb5_authdata* structures - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Merge two authdata arrays, such as the array from a ticket and authenticator. Use krb5_free_authdata() to free *outauthdat* when it is no longer needed. - - - - - - - - - - -.. - - - - - - -.. note:: - - The last array entry in *inauthdat1* and *inauthdat2* must be a NULL pointer. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_1cred.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_1cred.rst.txt deleted file mode 100644 index 7244e3be99fe..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_1cred.rst.txt +++ /dev/null @@ -1,60 +0,0 @@ -krb5_mk_1cred - Format a KRB-CRED message for a single set of credentials. -============================================================================ - -.. - -.. c:function:: krb5_error_code krb5_mk_1cred(krb5_context context, krb5_auth_context auth_context, krb5_creds * creds, krb5_data ** der_out, krb5_replay_data * rdata_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **creds** - Pointer to credentials - - **[out]** **der_out** - Encoded credentials - - **[out]** **rdata_out** - Replay cache data (NULL if not needed) - - -.. - - -:retval: - - 0 Success - - ENOMEM Insufficient memory - - KRB5_RC_REQUIRED Message replay detection requires rcache parameter - - -:return: - - Kerberos error codes - -.. - - - - - - - -This is a convenience function that calls krb5_mk_ncred() with a single set of credentials. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_error.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_error.rst.txt deleted file mode 100644 index 59405b26ef37..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_error.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_mk_error - Format and encode a KRB_ERROR message. -======================================================== - -.. - -.. c:function:: krb5_error_code krb5_mk_error(krb5_context context, const krb5_error * dec_err, krb5_data * enc_err) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **dec_err** - Error structure to be encoded - - **[out]** **enc_err** - Encoded error structure - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates a **KRB_ERROR** message in *enc_err* . Use krb5_free_data_contents() to free *enc_err* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_ncred.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_ncred.rst.txt deleted file mode 100644 index e7e88aebc1e9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_ncred.rst.txt +++ /dev/null @@ -1,88 +0,0 @@ -krb5_mk_ncred - Format a KRB-CRED message for an array of credentials. -======================================================================== - -.. - -.. c:function:: krb5_error_code krb5_mk_ncred(krb5_context context, krb5_auth_context auth_context, krb5_creds ** creds, krb5_data ** der_out, krb5_replay_data * rdata_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **creds** - Null-terminated array of credentials - - **[out]** **der_out** - Encoded credentials - - **[out]** **rdata_out** - Replay cache information (NULL if not needed) - - -.. - - -:retval: - - 0 Success - - ENOMEM Insufficient memory - - KRB5_RC_REQUIRED Message replay detection requires rcache parameter - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function takes an array of credentials *creds* and formats a **KRB-CRED** message *der_out* to pass to krb5_rd_cred(). - - - -The local and remote addresses in *auth_context* are optional; if either is specified, they are used to form the sender and receiver addresses in the KRB-CRED message. - - - -If the KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , an entry for the message is entered in an in-memory replay cache to detect if the message is reflected by an attacker. If KRB5_AUTH_CONTEXT_DO_TIME is not set, no replay cache is used. If KRB5_AUTH_CONTEXT_RET_TIME is set in *auth_context* , the timestamp used for the KRB-CRED message is stored in *rdata_out* . - - - -If either KRB5_AUTH_CONTEXT_DO_SEQUENCE or KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the *auth_context* local sequence number is included in the KRB-CRED message and then incremented. If KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the sequence number used is stored in *rdata_out* . - - - -Use krb5_free_data_contents() to free *der_out* when it is no longer needed. - - - -The message will be encrypted using the send subkey of *auth_context* if it is present, or the session key otherwise. If neither key is present, the credentials will not be encrypted, and the message should only be sent over a secure channel. No replay cache entry is used in this case. - - - - - - - - - - -.. - - - - - - -.. note:: - - The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_priv.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_priv.rst.txt deleted file mode 100644 index 6046a9dbab4b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_priv.rst.txt +++ /dev/null @@ -1,79 +0,0 @@ -krb5_mk_priv - Format a KRB-PRIV message. -=========================================== - -.. - -.. c:function:: krb5_error_code krb5_mk_priv(krb5_context context, krb5_auth_context auth_context, const krb5_data * userdata, krb5_data * der_out, krb5_replay_data * rdata_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **userdata** - User data for **KRB-PRIV** message - - **[out]** **der_out** - Formatted **KRB-PRIV** message - - **[out]** **rdata_out** - Replay data (NULL if not needed) - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function is similar to krb5_mk_safe(), but the message is encrypted and integrity-protected, not just integrity-protected. - - - -The local address in *auth_context* must be set, and is used to form the sender address used in the KRB-PRIV message. The remote address is optional; if specified, it will be used to form the receiver address used in the message. - - - -If the KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , a timestamp is included in the KRB-PRIV message, and an entry for the message is entered in an in-memory replay cache to detect if the message is reflected by an attacker. If KRB5_AUTH_CONTEXT_DO_TIME is not set, no replay cache is used. If KRB5_AUTH_CONTEXT_RET_TIME is set in *auth_context* , a timestamp is included in the KRB-PRIV message and is stored in *rdata_out* . - - - -If either KRB5_AUTH_CONTEXT_DO_SEQUENCE or KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the *auth_context* local sequence number is included in the KRB-PRIV message and then incremented. If KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the sequence number used is stored in *rdata_out* . - - - -Use krb5_free_data_contents() to free *der_out* when it is no longer needed. - - - - - - - - - - -.. - - - - - - -.. note:: - - The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_rep.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_rep.rst.txt deleted file mode 100644 index 4b94141039a9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_rep.rst.txt +++ /dev/null @@ -1,59 +0,0 @@ -krb5_mk_rep - Format and encrypt a KRB_AP_REP message. -======================================================== - -.. - -.. c:function:: krb5_error_code krb5_mk_rep(krb5_context context, krb5_auth_context auth_context, krb5_data * outbuf) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[out]** **outbuf** - **AP-REP** message - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function fills in *outbuf* with an AP-REP message using information from *auth_context* . - - - -If the flags in *auth_context* indicate that a sequence number should be used (either KRB5_AUTH_CONTEXT_DO_SEQUENCE or KRB5_AUTH_CONTEXT_RET_SEQUENCE) and the local sequence number in *auth_context* is 0, a new number will be generated with krb5_generate_seq_number(). - - - -Use krb5_free_data_contents() to free *outbuf* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_rep_dce.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_rep_dce.rst.txt deleted file mode 100644 index 31cc182893ee..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_rep_dce.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_mk_rep_dce - Format and encrypt a KRB_AP_REP message for DCE RPC. -======================================================================== - -.. - -.. c:function:: krb5_error_code krb5_mk_rep_dce(krb5_context context, krb5_auth_context auth_context, krb5_data * outbuf) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[out]** **outbuf** - **AP-REP** message - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Use krb5_free_data_contents() to free *outbuf* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_req.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_req.rst.txt deleted file mode 100644 index 08033bbdce8e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_req.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -krb5_mk_req - Create a KRB_AP_REQ message. -============================================ - -.. - -.. c:function:: krb5_error_code krb5_mk_req(krb5_context context, krb5_auth_context * auth_context, krb5_flags ap_req_options, const char * service, const char * hostname, krb5_data * in_data, krb5_ccache ccache, krb5_data * outbuf) - -.. - - -:param: - - **[in]** **context** - Library context - - **[inout]** **auth_context** - Pre-existing or newly created auth context - - **[in]** **ap_req_options** - Options (see AP_OPTS macros) - - **[in]** **service** - Service name, or NULL to use **"host"** - - **[in]** **hostname** - Host name, or NULL to use local hostname - - **[in]** **in_data** - Application data to be checksummed in the authenticator, or NULL - - **[in]** **ccache** - Credential cache used to obtain credentials for the desired service. - - **[out]** **outbuf** - **AP-REQ** message - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function is similar to krb5_mk_req_extended() except that it uses a given *hostname* , *service* , and *ccache* to construct a service principal name and obtain credentials. - - - -Use krb5_free_data_contents() to free *outbuf* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_req_extended.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_req_extended.rst.txt deleted file mode 100644 index d29a37616df6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_req_extended.rst.txt +++ /dev/null @@ -1,74 +0,0 @@ -krb5_mk_req_extended - Create a KRB_AP_REQ message using supplied credentials. -================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_mk_req_extended(krb5_context context, krb5_auth_context * auth_context, krb5_flags ap_req_options, krb5_data * in_data, krb5_creds * in_creds, krb5_data * outbuf) - -.. - - -:param: - - **[in]** **context** - Library context - - **[inout]** **auth_context** - Pre-existing or newly created auth context - - **[in]** **ap_req_options** - Options (see AP_OPTS macros) - - **[in]** **in_data** - Application data to be checksummed in the authenticator, or NULL - - **[in]** **in_creds** - Credentials for the service with valid ticket and key - - **[out]** **outbuf** - **AP-REQ** message - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Valid *ap_req_options* are: - - - AP_OPTS_USE_SESSION_KEY - Use the session key when creating the request used for user to user authentication. - - - - AP_OPTS_MUTUAL_REQUIRED - Request a mutual authentication packet from the receiver. - - - - AP_OPTS_USE_SUBKEY - Generate a subsession key from the current session key obtained from the credentials. - - This function creates a KRB_AP_REQ message using supplied credentials *in_creds* . *auth_context* may point to an existing auth context or to NULL, in which case a new one will be created. If *in_data* is non-null, a checksum of it will be included in the authenticator contained in the KRB_AP_REQ message. Use krb5_free_data_contents() to free *outbuf* when it is no longer needed. - - - -On successful return, the authenticator is stored in *auth_context* with the *client* and *checksum* fields nulled out. (This is to prevent pointer-sharing problems; the caller should not need these fields anyway, since the caller supplied them.) - - - - - - - - - - -.. - -.. seealso:: - krb5_mk_req() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_safe.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_safe.rst.txt deleted file mode 100644 index 1526e7d4071e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_mk_safe.rst.txt +++ /dev/null @@ -1,83 +0,0 @@ -krb5_mk_safe - Format a KRB-SAFE message. -=========================================== - -.. - -.. c:function:: krb5_error_code krb5_mk_safe(krb5_context context, krb5_auth_context auth_context, const krb5_data * userdata, krb5_data * der_out, krb5_replay_data * rdata_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **userdata** - User data in the message - - **[out]** **der_out** - Formatted **KRB-SAFE** buffer - - **[out]** **rdata_out** - Replay data. Specify NULL if not needed - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function creates an integrity protected **KRB-SAFE** message using data supplied by the application. - - - -Fields in *auth_context* specify the checksum type, the keyblock that can be used to seed the checksum, full addresses (host and port) for the sender and receiver, and KRB5_AUTH_CONTEXT flags. - - - -The local address in *auth_context* must be set, and is used to form the sender address used in the KRB-SAFE message. The remote address is optional; if specified, it will be used to form the receiver address used in the message. - - - -If the KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , a timestamp is included in the KRB-SAFE message, and an entry for the message is entered in an in-memory replay cache to detect if the message is reflected by an attacker. If KRB5_AUTH_CONTEXT_DO_TIME is not set, no replay cache is used. If KRB5_AUTH_CONTEXT_RET_TIME is set in *auth_context* , a timestamp is included in the KRB-SAFE message and is stored in *rdata_out* . - - - -If either KRB5_AUTH_CONTEXT_DO_SEQUENCE or KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the *auth_context* local sequence number is included in the KRB-SAFE message and then incremented. If KRB5_AUTH_CONTEXT_RET_SEQUENCE is set, the sequence number used is stored in *rdata_out* . - - - -Use krb5_free_data_contents() to free *der_out* when it is no longer needed. - - - - - - - - - - -.. - - - - - - -.. note:: - - The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_os_localaddr.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_os_localaddr.rst.txt deleted file mode 100644 index e0b01ff50d3c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_os_localaddr.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_os_localaddr - Return all interface addresses for this host. -=================================================================== - -.. - -.. c:function:: krb5_error_code krb5_os_localaddr(krb5_context context, krb5_address *** addr) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **addr** - Array of krb5_address pointers, ending with NULL - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Use krb5_free_addresses() to free *addr* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_add_buffer.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_add_buffer.rst.txt deleted file mode 100644 index bfdcea7b78e9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_add_buffer.rst.txt +++ /dev/null @@ -1,75 +0,0 @@ -krb5_pac_add_buffer - Add a buffer to a PAC handle. -===================================================== - -.. - -.. c:function:: krb5_error_code krb5_pac_add_buffer(krb5_context context, krb5_pac pac, krb5_ui_4 type, const krb5_data * data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **pac** - PAC handle - - **[in]** **type** - Buffer type - - **[in]** **data** - contents - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function adds a buffer of type *type* and contents *data* to *pac* if there isn't already a buffer of this type present. - - - -The valid values of *type* is one of the following: - - - KRB5_PAC_LOGON_INFO - Logon information - - - - KRB5_PAC_CREDENTIALS_INFO - Credentials information - - - - KRB5_PAC_SERVER_CHECKSUM - Server checksum - - - - KRB5_PAC_PRIVSVR_CHECKSUM - KDC checksum - - - - KRB5_PAC_CLIENT_INFO - Client name and ticket information - - - - KRB5_PAC_DELEGATION_INFO - Constrained delegation information - - - - KRB5_PAC_UPN_DNS_INFO - User principal name and DNS information - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_free.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_free.rst.txt deleted file mode 100644 index 9b204befa350..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_free.rst.txt +++ /dev/null @@ -1,42 +0,0 @@ -krb5_pac_free - Free a PAC handle. -==================================== - -.. - -.. c:function:: void krb5_pac_free(krb5_context context, krb5_pac pac) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **pac** - PAC to be freed - - -.. - - - -.. - - - - - - - -This function frees the contents of *pac* and the structure itself. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_get_buffer.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_get_buffer.rst.txt deleted file mode 100644 index b4361f9b7fb7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_get_buffer.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_pac_get_buffer - Retrieve a buffer value from a PAC. -=========================================================== - -.. - -.. c:function:: krb5_error_code krb5_pac_get_buffer(krb5_context context, krb5_pac pac, krb5_ui_4 type, krb5_data * data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **pac** - PAC handle - - **[in]** **type** - Type of buffer to retrieve - - **[out]** **data** - Buffer value - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Use krb5_free_data_contents() to free *data* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_get_client_info.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_get_client_info.rst.txt deleted file mode 100644 index 4c628c46f5e9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_get_client_info.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_pac_get_client_info - Read client information from a PAC. -================================================================ - -.. - -.. c:function:: krb5_error_code krb5_pac_get_client_info(krb5_context context, const krb5_pac pac, krb5_timestamp * authtime_out, char ** princname_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **pac** - PAC handle - - **[out]** **authtime_out** - Authentication timestamp (NULL if not needed) - - **[out]** **princname_out** - Client account name - - -.. - - -:retval: - - 0 on success, ENOENT if no PAC_CLIENT_INFO buffer is present in pac , ERANGE if the buffer contains invalid lengths. - - -.. - - - - - - - -Read the PAC_CLIENT_INFO buffer in *pac* . Place the client account name as a string in *princname_out* . If *authtime_out* is not NULL, place the initial authentication timestamp in *authtime_out* . - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.18 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_get_types.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_get_types.rst.txt deleted file mode 100644 index bce3b2c84fe6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_get_types.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_pac_get_types - Return an array of buffer types in a PAC handle. -======================================================================= - -.. - -.. c:function:: krb5_error_code krb5_pac_get_types(krb5_context context, krb5_pac pac, size_t * len, krb5_ui_4 ** types) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **pac** - PAC handle - - **[out]** **len** - Number of entries in *types* - - **[out]** **types** - Array of buffer types - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_init.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_init.rst.txt deleted file mode 100644 index d4a248bc3a30..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_init.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -krb5_pac_init - Create an empty Privilege Attribute Certificate (PAC) handle. -=============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_pac_init(krb5_context context, krb5_pac * pac) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **pac** - New PAC handle - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Use krb5_pac_free() to free *pac* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_parse.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_parse.rst.txt deleted file mode 100644 index e770e929349f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_parse.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_pac_parse - Unparse an encoded PAC into a new handle. -============================================================ - -.. - -.. c:function:: krb5_error_code krb5_pac_parse(krb5_context context, const void * ptr, size_t len, krb5_pac * pac) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ptr** - PAC buffer - - **[in]** **len** - Length of *ptr* - - **[out]** **pac** - PAC handle - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Use krb5_pac_free() to free *pac* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_sign.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_sign.rst.txt deleted file mode 100644 index 9b2499a83870..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_sign.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_pac_sign -============= - -.. - -.. c:function:: krb5_error_code krb5_pac_sign(krb5_context context, krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal, const krb5_keyblock * server_key, const krb5_keyblock * privsvr_key, krb5_data * data) - -.. - - -:param: - - **context** - - **pac** - - **authtime** - - **principal** - - **server_key** - - **privsvr_key** - - **data** - - -.. - - - -.. - - -DEPRECATED Use krb5_kdc_sign_ticket() instead. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_sign_ext.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_sign_ext.rst.txt deleted file mode 100644 index 46f1552bafa6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_sign_ext.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_pac_sign_ext -================= - -.. - -.. c:function:: krb5_error_code krb5_pac_sign_ext(krb5_context context, krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal, const krb5_keyblock * server_key, const krb5_keyblock * privsvr_key, krb5_boolean with_realm, krb5_data * data) - -.. - - -:param: - - **context** - - **pac** - - **authtime** - - **principal** - - **server_key** - - **privsvr_key** - - **with_realm** - - **data** - - -.. - - - -.. - - -DEPRECATED Use krb5_kdc_sign_ticket() instead. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_verify.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_verify.rst.txt deleted file mode 100644 index 338b43a1453e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_verify.rst.txt +++ /dev/null @@ -1,69 +0,0 @@ -krb5_pac_verify - Verify a PAC. -================================= - -.. - -.. c:function:: krb5_error_code krb5_pac_verify(krb5_context context, const krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal, const krb5_keyblock * server, const krb5_keyblock * privsvr) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **pac** - PAC handle - - **[in]** **authtime** - Expected timestamp - - **[in]** **principal** - Expected principal name (or NULL) - - **[in]** **server** - Key to validate server checksum (or NULL) - - **[in]** **privsvr** - Key to validate KDC checksum (or NULL) - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function validates *pac* against the supplied *server* , *privsvr* , *principal* and *authtime* . If *principal* is NULL, the principal and authtime are not verified. If *server* or *privsvr* is NULL, the corresponding checksum is not verified. - - - -If successful, *pac* is marked as verified. - - - - - - - - - - -.. - - - - - - -.. note:: - - A checksum mismatch can occur if the PAC was copied from a cross-realm TGT by an ignorant KDC; also macOS Server Open Directory (as of 10.6) generates PACs with no server checksum at all. One should consider not failing the whole authentication because of this reason, but, instead, treating the ticket as if it did not contain a PAC or marking the PAC information as non-verified. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_verify_ext.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_verify_ext.rst.txt deleted file mode 100644 index 41ffcdf63819..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_pac_verify_ext.rst.txt +++ /dev/null @@ -1,60 +0,0 @@ -krb5_pac_verify_ext - Verify a PAC, possibly from a specified realm. -====================================================================== - -.. - -.. c:function:: krb5_error_code krb5_pac_verify_ext(krb5_context context, const krb5_pac pac, krb5_timestamp authtime, krb5_const_principal principal, const krb5_keyblock * server, const krb5_keyblock * privsvr, krb5_boolean with_realm) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **pac** - PAC handle - - **[in]** **authtime** - Expected timestamp - - **[in]** **principal** - Expected principal name (or NULL) - - **[in]** **server** - Key to validate server checksum (or NULL) - - **[in]** **privsvr** - Key to validate KDC checksum (or NULL) - - **[in]** **with_realm** - If true, expect the realm of *principal* - - -.. - - - -.. - - - - - - - -This function is similar to krb5_pac_verify(), but adds a parameter *with_realm* . If *with_realm* is true, the PAC_CLIENT_INFO field is expected to include the realm of *principal* as well as the name. This flag is necessary to verify PACs in cross-realm S4U2Self referral TGTs. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.17 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_parse_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_parse_name.rst.txt deleted file mode 100644 index 835337d4e369..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_parse_name.rst.txt +++ /dev/null @@ -1,78 +0,0 @@ -krb5_parse_name - Convert a string principal name to a krb5_principal structure. -================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_parse_name(krb5_context context, const char * name, krb5_principal * principal_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **name** - String representation of a principal name - - **[out]** **principal_out** - New principal - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Convert a string representation of a principal name to a krb5_principal structure. - - - -A string representation of a Kerberos name consists of one or more principal name components, separated by slashes, optionally followed by the @ character and a realm name. If the realm name is not specified, the local realm is used. - - - -To use the slash and @ symbols as part of a component (quoted) instead of using them as a component separator or as a realm prefix), put a backslash () character in front of the symbol. Similarly, newline, tab, backspace, and NULL characters can be included in a component by using **n** , **t** , **b** or **0** , respectively. - - - -Beginning with release 1.20, the name type of the principal will be inferred as **KRB5_NT_SRV_INST** or **KRB5_NT_WELLKNOWN** based on the principal name. The type will be **KRB5_NT_PRINCIPAL** if a type cannot be inferred. - - - -Use krb5_free_principal() to free *principal_out* when it is no longer needed. - - - - - - - - - - -.. - - - - - - -.. note:: - - The realm in a Kerberos *name* cannot contain slash, colon, or NULL characters. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_parse_name_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_parse_name_flags.rst.txt deleted file mode 100644 index af762ce29aad..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_parse_name_flags.rst.txt +++ /dev/null @@ -1,77 +0,0 @@ -krb5_parse_name_flags - Convert a string principal name to a krb5_principal with flags. -========================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_parse_name_flags(krb5_context context, const char * name, int flags, krb5_principal * principal_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **name** - String representation of a principal name - - **[in]** **flags** - Flag - - **[out]** **principal_out** - New principal - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Similar to krb5_parse_name(), this function converts a single-string representation of a principal name to a krb5_principal structure. - - - -The following flags are valid: - - - KRB5_PRINCIPAL_PARSE_NO_REALM - no realm must be present in *name* - - - - KRB5_PRINCIPAL_PARSE_REQUIRE_REALM - realm must be present in *name* - - - - KRB5_PRINCIPAL_PARSE_ENTERPRISE - create single-component enterprise principal - - - - KRB5_PRINCIPAL_PARSE_IGNORE_REALM - ignore realm if present in *name* - - If **KRB5_PRINCIPAL_PARSE_NO_REALM** or **KRB5_PRINCIPAL_PARSE_IGNORE_REALM** is specified in *flags* , the realm of the new principal will be empty. Otherwise, the default realm for *context* will be used if *name* does not specify a realm. - - - -Use krb5_free_principal() to free *principal_out* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_prepend_error_message.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_prepend_error_message.rst.txt deleted file mode 100644 index 6503ab162196..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_prepend_error_message.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_prepend_error_message - Add a prefix to the message for an error code. -============================================================================= - -.. - -.. c:function:: void krb5_prepend_error_message(krb5_context ctx, krb5_error_code code, const char * fmt, ... ) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **code** - Error code - - **[in]** **fmt** - Format string for error message prefix - - -.. - - - -.. - - - - - - - -Format a message and prepend it to the current message for *code* . The prefix will be separated from the old message with a colon and space. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal2salt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal2salt.rst.txt deleted file mode 100644 index ff0f3416e54e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal2salt.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_principal2salt - Convert a principal name into the default salt for that principal. -========================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_principal2salt(krb5_context context, krb5_const_principal pr, krb5_data * ret) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **pr** - Principal name - - **[out]** **ret** - Default salt for *pr* to be filled in - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare.rst.txt deleted file mode 100644 index 269efe315b7b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_principal_compare - Compare two principals. -================================================== - -.. - -.. c:function:: krb5_boolean krb5_principal_compare(krb5_context context, krb5_const_principal princ1, krb5_const_principal princ2) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **princ1** - First principal - - **[in]** **princ2** - Second principal - - -.. - - -:retval: - - TRUE if the principals are the same; FALSE otherwise - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare_any_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare_any_realm.rst.txt deleted file mode 100644 index 72c02a6610b5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare_any_realm.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_principal_compare_any_realm - Compare two principals ignoring realm components. -====================================================================================== - -.. - -.. c:function:: krb5_boolean krb5_principal_compare_any_realm(krb5_context context, krb5_const_principal princ1, krb5_const_principal princ2) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **princ1** - First principal - - **[in]** **princ2** - Second principal - - -.. - - -:retval: - - TRUE if the principals are the same; FALSE otherwise - - -.. - - - - - - - -Similar to krb5_principal_compare(), but do not compare the realm components of the principals. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare_flags.rst.txt deleted file mode 100644 index d384ea103cd3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_principal_compare_flags.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -krb5_principal_compare_flags - Compare two principals with additional flags. -============================================================================== - -.. - -.. c:function:: krb5_boolean krb5_principal_compare_flags(krb5_context context, krb5_const_principal princ1, krb5_const_principal princ2, int flags) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **princ1** - First principal - - **[in]** **princ2** - Second principal - - **[in]** **flags** - Flags - - -.. - - -:retval: - - TRUE if the principal names are the same; FALSE otherwise - - -.. - - - - - - - -Valid flags are: - - - KRB5_PRINCIPAL_COMPARE_IGNORE_REALM - ignore realm component - - - - KRB5_PRINCIPAL_COMPARE_ENTERPRISE - UPNs as real principals - - - - KRB5_PRINCIPAL_COMPARE_CASEFOLD case-insensitive - - - - KRB5_PRINCIPAL_COMPARE_UTF8 - treat principals as UTF-8 - - - - - - - - -.. - -.. seealso:: - krb5_principal_compare() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_process_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_process_key.rst.txt deleted file mode 100644 index 3d08b5dcaea0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_process_key.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_process_key -================ - -.. - -.. c:function:: krb5_error_code krb5_process_key(krb5_context context, krb5_encrypt_block * eblock, const krb5_keyblock * key) - -.. - - -:param: - - **context** - - **eblock** - - **key** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_c_* API family. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_prompter_posix.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_prompter_posix.rst.txt deleted file mode 100644 index b4012cac5e2c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_prompter_posix.rst.txt +++ /dev/null @@ -1,64 +0,0 @@ -krb5_prompter_posix - Prompt user for password. -================================================= - -.. - -.. c:function:: krb5_error_code krb5_prompter_posix(krb5_context context, void * data, const char * name, const char * banner, int num_prompts, krb5_prompt prompts) - -.. - - -:param: - - **[in]** **context** - Library context - - **data** - Unused (callback argument) - - **[in]** **name** - Name to output during prompt - - **[in]** **banner** - Banner to output during prompt - - **[in]** **num_prompts** - Number of prompts in *prompts* - - **[in]** **prompts** - Array of prompts and replies - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function is intended to be used as a prompter callback for krb5_get_init_creds_password() or krb5_init_creds_init(). - - - -Writes *name* and *banner* to stdout, each followed by a newline, then writes each prompt field in the *prompts* array, followed by":", and sets the reply field of the entry to a line of input read from stdin. If the hidden flag is set for a prompt, then terminal echoing is turned off when input is read. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_random_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_random_key.rst.txt deleted file mode 100644 index d8e81ba33d79..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_random_key.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_random_key -=============== - -.. - -.. c:function:: krb5_error_code krb5_random_key(krb5_context context, const krb5_encrypt_block * eblock, krb5_pointer ptr, krb5_keyblock ** keyblock) - -.. - - -:param: - - **context** - - **eblock** - - **ptr** - - **keyblock** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_c_* API family. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_cred.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_cred.rst.txt deleted file mode 100644 index e36cfd459b05..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_cred.rst.txt +++ /dev/null @@ -1,67 +0,0 @@ -krb5_rd_cred - Read and validate a KRB-CRED message. -====================================================== - -.. - -.. c:function:: krb5_error_code krb5_rd_cred(krb5_context context, krb5_auth_context auth_context, krb5_data * creddata, krb5_creds *** creds_out, krb5_replay_data * rdata_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **creddata** - **KRB-CRED** message - - **[out]** **creds_out** - Null-terminated array of forwarded credentials - - **[out]** **rdata_out** - Replay data (NULL if not needed) - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - *creddata* will be decrypted using the receiving subkey if it is present in *auth_context* , or the session key if the receiving subkey is not present or fails to decrypt the message. - - - -Use krb5_free_tgt_creds() to free *creds_out* when it is no longer needed. - - - - - - - - - - -.. - - - - - - -.. note:: - - The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* .` - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_error.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_error.rst.txt deleted file mode 100644 index a748a6209752..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_error.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_rd_error - Decode a KRB-ERROR message. -============================================= - -.. - -.. c:function:: krb5_error_code krb5_rd_error(krb5_context context, const krb5_data * enc_errbuf, krb5_error ** dec_error) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **enc_errbuf** - Encoded error message - - **[out]** **dec_error** - Decoded error message - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function processes **KRB-ERROR** message *enc_errbuf* and returns an allocated structure *dec_error* containing the error message. Use krb5_free_error() to free *dec_error* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_priv.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_priv.rst.txt deleted file mode 100644 index 0fd56df8f2a9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_priv.rst.txt +++ /dev/null @@ -1,79 +0,0 @@ -krb5_rd_priv - Process a KRB-PRIV message. -============================================ - -.. - -.. c:function:: krb5_error_code krb5_rd_priv(krb5_context context, krb5_auth_context auth_context, const krb5_data * inbuf, krb5_data * userdata_out, krb5_replay_data * rdata_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication structure - - **[in]** **inbuf** - **KRB-PRIV** message to be parsed - - **[out]** **userdata_out** - Data parsed from **KRB-PRIV** message - - **[out]** **rdata_out** - Replay data. Specify NULL if not needed - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function parses a **KRB-PRIV** message, verifies its integrity, and stores its unencrypted data into *userdata_out* . - - - -If *auth_context* has a remote address set, the address will be used to verify the sender address in the KRB-PRIV message. If *auth_context* has a local address set, it will be used to verify the receiver address in the KRB-PRIV message if the message contains one. - - - -If the KRB5_AUTH_CONTEXT_DO_SEQUENCE flag is set in *auth_context* , the sequence number of the KRB-PRIV message is checked against the remote sequence number field of *auth_context* . Otherwise, the sequence number is not used. - - - -If the KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , then the timestamp in the message is verified to be within the permitted clock skew of the current time, and the message is checked against an in-memory replay cache to detect reflections or replays. - - - -Use krb5_free_data_contents() to free *userdata_out* when it is no longer needed. - - - - - - - - - - -.. - - - - - - -.. note:: - - The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_rep.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_rep.rst.txt deleted file mode 100644 index e2acba84b1b4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_rep.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_rd_rep - Parse and decrypt a KRB_AP_REP message. -======================================================= - -.. - -.. c:function:: krb5_error_code krb5_rd_rep(krb5_context context, krb5_auth_context auth_context, const krb5_data * inbuf, krb5_ap_rep_enc_part ** repl) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **inbuf** - AP-REP message - - **[out]** **repl** - Decrypted reply message - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function parses, decrypts and verifies a message from *inbuf* and fills in *repl* with a pointer to allocated memory containing the fields from the encrypted response. - - - -Use krb5_free_ap_rep_enc_part() to free *repl* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_rep_dce.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_rep_dce.rst.txt deleted file mode 100644 index c82ef4317ce5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_rep_dce.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_rd_rep_dce - Parse and decrypt a KRB_AP_REP message for DCE RPC. -======================================================================= - -.. - -.. c:function:: krb5_error_code krb5_rd_rep_dce(krb5_context context, krb5_auth_context auth_context, const krb5_data * inbuf, krb5_ui_4 * nonce) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **inbuf** - AP-REP message - - **[out]** **nonce** - Sequence number from the decrypted reply - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function parses, decrypts and verifies a message from *inbuf* and fills in *nonce* with a decrypted reply sequence number. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt deleted file mode 100644 index 6a52fa16abb6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt +++ /dev/null @@ -1,105 +0,0 @@ -krb5_rd_req - Parse and decrypt a KRB_AP_REQ message. -======================================================= - -.. - -.. c:function:: krb5_error_code krb5_rd_req(krb5_context context, krb5_auth_context * auth_context, const krb5_data * inbuf, krb5_const_principal server, krb5_keytab keytab, krb5_flags * ap_req_options, krb5_ticket ** ticket) - -.. - - -:param: - - **[in]** **context** - Library context - - **[inout]** **auth_context** - Pre-existing or newly created auth context - - **[in]** **inbuf** - AP-REQ message to be parsed - - **[in]** **server** - Matching principal for server, or NULL to allow any principal in keytab - - **[in]** **keytab** - Key table, or NULL to use the default - - **[out]** **ap_req_options** - If non-null, the AP-REQ flags on output - - **[out]** **ticket** - If non-null, ticket from the AP-REQ message - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function parses, decrypts and verifies a AP-REQ message from *inbuf* and stores the authenticator in *auth_context* . - - - -If a keyblock was specified in *auth_context* using krb5_auth_con_setuseruserkey(), that key is used to decrypt the ticket in AP-REQ message and *keytab* is ignored. In this case, *server* should be specified as a complete principal name to allow for proper transited-path checking and replay cache selection. - - - -Otherwise, the decryption key is obtained from *keytab* , or from the default keytab if it is NULL. In this case, *server* may be a complete principal name, a matching principal (see krb5_sname_match()), or NULL to match any principal name. The keys tried against the encrypted part of the ticket are determined as follows: - - - - - - - If *server* is a complete principal name, then its entry in *keytab* is tried. - - - - Otherwise, if *keytab* is iterable, then all entries in *keytab* which match *server* are tried. - - - - Otherwise, the server principal in the ticket must match *server* , and its entry in *keytab* is tried. - - - - - -The client specified in the decrypted authenticator must match the client specified in the decrypted ticket. - - - -If the *remote_addr* field of *auth_context* is set, the request must come from that address. - - - -If a replay cache handle is provided in the *auth_context* , the authenticator and ticket are verified against it. If no conflict is found, the new authenticator is then stored in the replay cache of *auth_context* . - - - -Various other checks are performed on the decoded data, including cross-realm policy, clockskew, and ticket validation times. - - - -On success the authenticator, subkey, and remote sequence number of the request are stored in *auth_context* . If the AP_OPTS_MUTUAL_REQUIRED bit is set, the local sequence number is XORed with the remote sequence number in the request. - - - -Use krb5_free_ticket() to free *ticket* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_safe.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_safe.rst.txt deleted file mode 100644 index 4cf2307cdc80..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_rd_safe.rst.txt +++ /dev/null @@ -1,79 +0,0 @@ -krb5_rd_safe - Process KRB-SAFE message. -========================================== - -.. - -.. c:function:: krb5_error_code krb5_rd_safe(krb5_context context, krb5_auth_context auth_context, const krb5_data * inbuf, krb5_data * userdata_out, krb5_replay_data * rdata_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **auth_context** - Authentication context - - **[in]** **inbuf** - **KRB-SAFE** message to be parsed - - **[out]** **userdata_out** - Data parsed from **KRB-SAFE** message - - **[out]** **rdata_out** - Replay data. Specify NULL if not needed - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function parses a **KRB-SAFE** message, verifies its integrity, and stores its data into *userdata_out* . - - - -If *auth_context* has a remote address set, the address will be used to verify the sender address in the KRB-SAFE message. If *auth_context* has a local address set, it will be used to verify the receiver address in the KRB-SAFE message if the message contains one. - - - -If the KRB5_AUTH_CONTEXT_DO_SEQUENCE flag is set in *auth_context* , the sequence number of the KRB-SAFE message is checked against the remote sequence number field of *auth_context* . Otherwise, the sequence number is not used. - - - -If the KRB5_AUTH_CONTEXT_DO_TIME flag is set in *auth_context* , then the timestamp in the message is verified to be within the permitted clock skew of the current time, and the message is checked against an in-memory replay cache to detect reflections or replays. - - - -Use krb5_free_data_contents() to free *userdata_out* when it is no longer needed. - - - - - - - - - - -.. - - - - - - -.. note:: - - The *rdata_out* argument is required if the KRB5_AUTH_CONTEXT_RET_TIME or KRB5_AUTH_CONTEXT_RET_SEQUENCE flag is set in *auth_context* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_read_password.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_read_password.rst.txt deleted file mode 100644 index 877fe6e6f762..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_read_password.rst.txt +++ /dev/null @@ -1,71 +0,0 @@ -krb5_read_password - Read a password from keyboard input. -=========================================================== - -.. - -.. c:function:: krb5_error_code krb5_read_password(krb5_context context, const char * prompt, const char * prompt2, char * return_pwd, unsigned int * size_return) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **prompt** - First user prompt when reading password - - **[in]** **prompt2** - Second user prompt (NULL to prompt only once) - - **[out]** **return_pwd** - Returned password - - **[inout]** **size_return** - On input, maximum size of password; on output, size of password read - - -.. - - -:retval: - - 0 Success - - -:return: - - Error in reading or verifying the password - - Kerberos error codes - -.. - - - - - - - -This function reads a password from keyboard input and stores it in *return_pwd* . *size_return* should be set by the caller to the amount of storage space available in *return_pwd* ; on successful return, it will be set to the length of the password read. - - - - *prompt* is printed to the terminal, followed by":", and then a password is read from the keyboard. - - - -If *prompt2* is NULL, the password is read only once. Otherwise, *prompt2* is printed to the terminal and a second password is read. If the two passwords entered are not identical, KRB5_LIBOS_BADPWDMATCH is returned. - - - -Echoing is turned off when the password is read. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_realm_compare.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_realm_compare.rst.txt deleted file mode 100644 index f9df1b029aa2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_realm_compare.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_realm_compare - Compare the realms of two principals. -============================================================ - -.. - -.. c:function:: krb5_boolean krb5_realm_compare(krb5_context context, krb5_const_principal princ1, krb5_const_principal princ2) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **princ1** - First principal - - **[in]** **princ2** - Second principal - - -.. - - -:retval: - - TRUE if the realm names are the same; FALSE otherwise - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_recvauth.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_recvauth.rst.txt deleted file mode 100644 index 0cc70cf8c16c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_recvauth.rst.txt +++ /dev/null @@ -1,68 +0,0 @@ -krb5_recvauth - Server function for sendauth protocol. -======================================================== - -.. - -.. c:function:: krb5_error_code krb5_recvauth(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char * appl_version, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket) - -.. - - -:param: - - **[in]** **context** - Library context - - **[inout]** **auth_context** - Pre-existing or newly created auth context - - **[in]** **fd** - File descriptor - - **[in]** **appl_version** - Application protocol version to be matched against the client's application version - - **[in]** **server** - Server principal (NULL for any in *keytab* ) - - **[in]** **flags** - Additional specifications - - **[in]** **keytab** - Key table containing service keys - - **[out]** **ticket** - Ticket (NULL if not needed) - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function performs the server side of a sendauth/recvauth exchange by sending and receiving messages over *fd* . - - - -Use krb5_free_ticket() to free *ticket* when it is no longer needed. - - - - - - - - - - -.. - -.. seealso:: - krb5_sendauth() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_recvauth_version.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_recvauth_version.rst.txt deleted file mode 100644 index 4ec26ab033e8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_recvauth_version.rst.txt +++ /dev/null @@ -1,61 +0,0 @@ -krb5_recvauth_version - Server function for sendauth protocol with version parameter. -======================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_recvauth_version(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, krb5_principal server, krb5_int32 flags, krb5_keytab keytab, krb5_ticket ** ticket, krb5_data * version) - -.. - - -:param: - - **[in]** **context** - Library context - - **[inout]** **auth_context** - Pre-existing or newly created auth context - - **[in]** **fd** - File descriptor - - **[in]** **server** - Server principal (NULL for any in *keytab* ) - - **[in]** **flags** - Additional specifications - - **[in]** **keytab** - Decryption key - - **[out]** **ticket** - Ticket (NULL if not needed) - - **[out]** **version** - sendauth protocol version (NULL if not needed) - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function is similar to krb5_recvauth() with the additional output information place into *version* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_get_challenge.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_get_challenge.rst.txt deleted file mode 100644 index ae1edc9a4656..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_get_challenge.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_responder_get_challenge - Retrieve the challenge data for a given question in the responder context. -=========================================================================================================== - -.. - -.. c:function:: const char * krb5_responder_get_challenge(krb5_context ctx, krb5_responder_context rctx, const char * question) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **rctx** - Responder context - - **[in]** **question** - Question name - - -.. - - - -.. - - - - - - - -Return a pointer to a C string containing the challenge for *question* within *rctx* , or NULL if the question is not present in *rctx* . The structure of the question depends on the question name, but will always be printable UTF-8 text. The returned pointer is an alias, valid only as long as the lifetime of *rctx* , and should not be modified or freed by the caller. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_list_questions.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_list_questions.rst.txt deleted file mode 100644 index 03491ced4f7d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_list_questions.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -krb5_responder_list_questions - List the question names contained in the responder context. -============================================================================================= - -.. - -.. c:function:: const char *const * krb5_responder_list_questions(krb5_context ctx, krb5_responder_context rctx) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **rctx** - Responder context - - -.. - - - -.. - - - - - - - -Return a pointer to a null-terminated list of question names which are present in *rctx* . The pointer is an alias, valid only as long as the lifetime of *rctx* , and should not be modified or freed by the caller. A question's challenge can be retrieved using krb5_responder_get_challenge() and answered using krb5_responder_set_answer(). - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_otp_challenge_free.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_otp_challenge_free.rst.txt deleted file mode 100644 index a92db44d86c7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_otp_challenge_free.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_responder_otp_challenge_free - Free the value returned by krb5_responder_otp_get_challenge(). -==================================================================================================== - -.. - -.. c:function:: void krb5_responder_otp_challenge_free(krb5_context ctx, krb5_responder_context rctx, krb5_responder_otp_challenge * chl) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **rctx** - Responder context - - **[in]** **chl** - The challenge to free - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_otp_get_challenge.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_otp_get_challenge.rst.txt deleted file mode 100644 index 7f7755db9dee..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_otp_get_challenge.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_responder_otp_get_challenge - Decode the KRB5_RESPONDER_QUESTION_OTP to a C struct. -========================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_responder_otp_get_challenge(krb5_context ctx, krb5_responder_context rctx, krb5_responder_otp_challenge ** chl) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **rctx** - Responder context - - **[out]** **chl** - Challenge structure - - -.. - - - -.. - - - - - - - -A convenience function which parses the KRB5_RESPONDER_QUESTION_OTP question challenge data, making it available in native C. The main feature of this function is the ability to interact with OTP tokens without parsing the JSON. - - - -The returned value must be passed to krb5_responder_otp_challenge_free() to be freed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_otp_set_answer.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_otp_set_answer.rst.txt deleted file mode 100644 index 0535a206aa19..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_otp_set_answer.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_responder_otp_set_answer - Answer the KRB5_RESPONDER_QUESTION_OTP question. -================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_responder_otp_set_answer(krb5_context ctx, krb5_responder_context rctx, size_t ti, const char * value, const char * pin) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **rctx** - Responder context - - **[in]** **ti** - The index of the tokeninfo selected - - **[in]** **value** - The value to set, or NULL for none - - **[in]** **pin** - The pin to set, or NULL for none - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_pkinit_challenge_free.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_pkinit_challenge_free.rst.txt deleted file mode 100644 index a017b2e61cee..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_pkinit_challenge_free.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_responder_pkinit_challenge_free - Free the value returned by krb5_responder_pkinit_get_challenge(). -========================================================================================================== - -.. - -.. c:function:: void krb5_responder_pkinit_challenge_free(krb5_context ctx, krb5_responder_context rctx, krb5_responder_pkinit_challenge * chl) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **rctx** - Responder context - - **[in]** **chl** - The challenge to free - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.12 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_pkinit_get_challenge.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_pkinit_get_challenge.rst.txt deleted file mode 100644 index 4204e50a5cea..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_pkinit_get_challenge.rst.txt +++ /dev/null @@ -1,56 +0,0 @@ -krb5_responder_pkinit_get_challenge - Decode the KRB5_RESPONDER_QUESTION_PKINIT to a C struct. -================================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_responder_pkinit_get_challenge(krb5_context ctx, krb5_responder_context rctx, krb5_responder_pkinit_challenge ** chl_out) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **rctx** - Responder context - - **[out]** **chl_out** - Challenge structure - - -.. - - - -.. - - - - - - - -A convenience function which parses the KRB5_RESPONDER_QUESTION_PKINIT question challenge data, making it available in native C. The main feature of this function is the ability to read the challenge without parsing the JSON. - - - -The returned value must be passed to krb5_responder_pkinit_challenge_free() to be freed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.12 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_pkinit_set_answer.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_pkinit_set_answer.rst.txt deleted file mode 100644 index dc8fa57cc4a6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_pkinit_set_answer.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -krb5_responder_pkinit_set_answer - Answer the KRB5_RESPONDER_QUESTION_PKINIT question for one identity. -========================================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_responder_pkinit_set_answer(krb5_context ctx, krb5_responder_context rctx, const char * identity, const char * pin) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **rctx** - Responder context - - **[in]** **identity** - The identity for which a PIN is being supplied - - **[in]** **pin** - The provided PIN, or NULL for none - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.12 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_set_answer.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_set_answer.rst.txt deleted file mode 100644 index c5b588aacbbb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_responder_set_answer.rst.txt +++ /dev/null @@ -1,57 +0,0 @@ -krb5_responder_set_answer - Answer a named question in the responder context. -=============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_responder_set_answer(krb5_context ctx, krb5_responder_context rctx, const char * question, const char * answer) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **rctx** - Responder context - - **[in]** **question** - Question name - - **[in]** **answer** - The string to set (MUST be printable UTF-8) - - -.. - - -:retval: - - EINVAL question is not present within rctx - - -.. - - - - - - - -This function supplies an answer to *question* within *rctx* . The appropriate form of the answer depends on the question name. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.11 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_salttype_to_string.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_salttype_to_string.rst.txt deleted file mode 100644 index e0e44a6bfba5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_salttype_to_string.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -krb5_salttype_to_string - Convert a salt type to a string. -============================================================ - -.. - -.. c:function:: krb5_error_code krb5_salttype_to_string(krb5_int32 salttype, char * buffer, size_t buflen) - -.. - - -:param: - - **[in]** **salttype** - Salttype to convert - - **[out]** **buffer** - Buffer to receive the converted string - - **[in]** **buflen** - Storage available in *buffer* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sendauth.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sendauth.rst.txt deleted file mode 100644 index b1059b09e920..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sendauth.rst.txt +++ /dev/null @@ -1,98 +0,0 @@ -krb5_sendauth - Client function for sendauth protocol. -======================================================== - -.. - -.. c:function:: krb5_error_code krb5_sendauth(krb5_context context, krb5_auth_context * auth_context, krb5_pointer fd, char * appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data * in_data, krb5_creds * in_creds, krb5_ccache ccache, krb5_error ** error, krb5_ap_rep_enc_part ** rep_result, krb5_creds ** out_creds) - -.. - - -:param: - - **[in]** **context** - Library context - - **[inout]** **auth_context** - Pre-existing or newly created auth context - - **[in]** **fd** - File descriptor that describes network socket - - **[in]** **appl_version** - Application protocol version to be matched with the receiver's application version - - **[in]** **client** - Client principal - - **[in]** **server** - Server principal - - **[in]** **ap_req_options** - Options (see AP_OPTS macros) - - **[in]** **in_data** - Data to be sent to the server - - **[in]** **in_creds** - Input credentials, or NULL to use *ccache* - - **[in]** **ccache** - Credential cache - - **[out]** **error** - If non-null, contains KRB_ERROR message returned from server - - **[out]** **rep_result** - If non-null and *ap_req_options* is AP_OPTS_MUTUAL_REQUIRED, contains the result of mutual authentication exchange - - **[out]** **out_creds** - If non-null, the retrieved credentials - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function performs the client side of a sendauth/recvauth exchange by sending and receiving messages over *fd* . - - - -Credentials may be specified in three ways: - - - - - - - If *in_creds* is NULL, credentials are obtained with krb5_get_credentials() using the principals *client* and *server* . *server* must be non-null; *client* may NULL to use the default principal of *ccache* . - - - - - If *in_creds* is non-null, but does not contain a ticket, credentials for the exchange are obtained with krb5_get_credentials() using *in_creds* . In this case, the values of *client* and *server* are unused. - - - - - If *in_creds* is a complete credentials structure, it used directly. In this case, the values of *client* , *server* , and *ccache* are unused. - - If the server is using a different application protocol than that specified in *appl_version* , an error will be returned. - - - -Use krb5_free_creds() to free *out_creds* , krb5_free_ap_rep_enc_part() to free *rep_result* , and krb5_free_error() to free *error* when they are no longer needed. - - - - - - - - - - -.. - -.. seealso:: - krb5_recvauth() - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_server_decrypt_ticket_keytab.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_server_decrypt_ticket_keytab.rst.txt deleted file mode 100644 index 0ec0337159f2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_server_decrypt_ticket_keytab.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_server_decrypt_ticket_keytab - Decrypt a ticket using the specified key table. -===================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_server_decrypt_ticket_keytab(krb5_context context, const krb5_keytab kt, krb5_ticket * ticket) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **kt** - Key table - - **[in]** **ticket** - Ticket to be decrypted - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function takes a *ticket* as input and decrypts it using key data from *kt* . The result is placed into *ticket->enc_part2* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_default_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_default_realm.rst.txt deleted file mode 100644 index d9ac43d5efc3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_default_realm.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_set_default_realm - Override the default realm for the specified context. -================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_set_default_realm(krb5_context context, const char * lrealm) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **lrealm** - Realm name for the default realm - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -If *lrealm* is NULL, clear the default realm setting. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_default_tgs_enctypes.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_default_tgs_enctypes.rst.txt deleted file mode 100644 index 870ca63dc202..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_default_tgs_enctypes.rst.txt +++ /dev/null @@ -1,61 +0,0 @@ -krb5_set_default_tgs_enctypes - Set default TGS encryption types in a krb5_context structure. -=============================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_set_default_tgs_enctypes(krb5_context context, const krb5_enctype * etypes) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **etypes** - Encryption type(s) to set - - -.. - - -:retval: - - 0 Success - - KRB5_PROG_ETYPE_NOSUPP Program lacks support for encryption type - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function sets the default enctype list for TGS requests made using *context* to *etypes* . - - - - - - - - - - -.. - - - - - - -.. note:: - - This overrides the default list (from config file or built-in). - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_error_message.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_error_message.rst.txt deleted file mode 100644 index 86bf9b7c7dde..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_error_message.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -krb5_set_error_message - Set an extended error message for an error code. -=========================================================================== - -.. - -.. c:function:: void krb5_set_error_message(krb5_context ctx, krb5_error_code code, const char * fmt, ... ) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **code** - Error code - - **[in]** **fmt** - Error string for the error code - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_kdc_recv_hook.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_kdc_recv_hook.rst.txt deleted file mode 100644 index 70c48ccab3b8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_kdc_recv_hook.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_set_kdc_recv_hook - Set a KDC post-receive hook function. -================================================================ - -.. - -.. c:function:: void krb5_set_kdc_recv_hook(krb5_context context, krb5_post_recv_fn recv_hook, void * data) - -.. - - -:param: - - **[in]** **context** - The library context. - - **[in]** **recv_hook** - Hook function (or NULL to disable the hook) - - **[in]** **data** - Callback data to be passed to *recv_hook* - - -.. - - - -.. - - - - - - - - *recv_hook* will be called after a reply is received from a KDC during a call to a library function such as krb5_get_credentials(). The hook function may inspect or override the reply. This hook will not be executed if the pre-send hook returns a synthetic reply. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.15 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_kdc_send_hook.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_kdc_send_hook.rst.txt deleted file mode 100644 index d2696db9f96a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_kdc_send_hook.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_set_kdc_send_hook - Set a KDC pre-send hook function. -============================================================ - -.. - -.. c:function:: void krb5_set_kdc_send_hook(krb5_context context, krb5_pre_send_fn send_hook, void * data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **send_hook** - Hook function (or NULL to disable the hook) - - **[in]** **data** - Callback data to be passed to *send_hook* - - -.. - - - -.. - - - - - - - - *send_hook* will be called before messages are sent to KDCs by library functions such as krb5_get_credentials(). The hook function may inspect, override, or synthesize its own reply to the message. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.15 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_password.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_password.rst.txt deleted file mode 100644 index 3e7ef2ce64f0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_password.rst.txt +++ /dev/null @@ -1,74 +0,0 @@ -krb5_set_password - Set a password for a principal using specified credentials. -================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_set_password(krb5_context context, krb5_creds * creds, const char * newpw, krb5_principal change_password_for, int * result_code, krb5_data * result_code_string, krb5_data * result_string) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **creds** - Credentials for kadmin/changepw service - - **[in]** **newpw** - New password - - **[in]** **change_password_for** - Change the password for this principal - - **[out]** **result_code** - Numeric error code from server - - **[out]** **result_code_string** - String equivalent to *result_code* - - **[out]** **result_string** - Data returned from the remote system - - -.. - - -:retval: - - 0 Success and result_code is set to KRB5_KPASSWD_SUCCESS. - - -:return: - - Kerberos error codes. - -.. - - - - - - - -This function uses the credentials *creds* to set the password *newpw* for the principal *change_password_for* . It implements the set password operation of RFC 3244, for interoperability with Microsoft Windows implementations. - - - -The error code and strings are returned in *result_code* , *result_code_string* and *result_string* . - - - - - - - - - - -.. - - - - - - -.. note:: - - If *change_password_for* is NULL, the change is performed on the current principal. If *change_password_for* is non-null, the change is performed on the principal name passed in *change_password_for* . - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_password_using_ccache.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_password_using_ccache.rst.txt deleted file mode 100644 index 24bf4be7edd6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_password_using_ccache.rst.txt +++ /dev/null @@ -1,74 +0,0 @@ -krb5_set_password_using_ccache - Set a password for a principal using cached credentials. -=========================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_set_password_using_ccache(krb5_context context, krb5_ccache ccache, const char * newpw, krb5_principal change_password_for, int * result_code, krb5_data * result_code_string, krb5_data * result_string) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ccache** - Credential cache - - **[in]** **newpw** - New password - - **[in]** **change_password_for** - Change the password for this principal - - **[out]** **result_code** - Numeric error code from server - - **[out]** **result_code_string** - String equivalent to *result_code* - - **[out]** **result_string** - Data returned from the remote system - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function uses the cached credentials from *ccache* to set the password *newpw* for the principal *change_password_for* . It implements RFC 3244 set password operation (interoperable with MS Windows implementations) using the credential cache. - - - -The error code and strings are returned in *result_code* , *result_code_string* and *result_string* . - - - - - - - - - - -.. - - - - - - -.. note:: - - If *change_password_for* is set to NULL, the change is performed on the default principal in *ccache* . If *change_password_for* is non null, the change is performed on the specified principal. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_principal_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_principal_realm.rst.txt deleted file mode 100644 index 0319b338aa78..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_principal_realm.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_set_principal_realm - Set the realm field of a principal. -================================================================ - -.. - -.. c:function:: krb5_error_code krb5_set_principal_realm(krb5_context context, krb5_principal principal, const char * realm) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **principal** - Principal name - - **[in]** **realm** - Realm name - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -Set the realm name part of *principal* to *realm* , overwriting the previous realm. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_real_time.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_real_time.rst.txt deleted file mode 100644 index 18d7a6b5f913..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_real_time.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_set_real_time - Set time offset field in a krb5_context structure. -========================================================================= - -.. - -.. c:function:: krb5_error_code krb5_set_real_time(krb5_context context, krb5_timestamp seconds, krb5_int32 microseconds) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **seconds** - Real time, seconds portion - - **[in]** **microseconds** - Real time, microseconds portion - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function sets the time offset in *context* to the difference between the system time and the real time as determined by *seconds* and *microseconds* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_trace_callback.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_trace_callback.rst.txt deleted file mode 100644 index 4c31ddb61001..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_trace_callback.rst.txt +++ /dev/null @@ -1,63 +0,0 @@ -krb5_set_trace_callback - Specify a callback function for trace events. -========================================================================= - -.. - -.. c:function:: krb5_error_code krb5_set_trace_callback(krb5_context context, krb5_trace_callback fn, void * cb_data) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **fn** - Callback function - - **[in]** **cb_data** - Callback data - - -.. - - - -:return: - - Returns KRB5_TRACE_NOSUPP if tracing is not supported in the library (unless fn is NULL). - -.. - - - - - - - -Specify a callback for trace events occurring in krb5 operations performed within *context* . *fn* will be invoked with *context* as the first argument, *cb_data* as the last argument, and a pointer to a krb5_trace_info as the second argument. If the trace callback is reset via this function or *context* is destroyed, *fn* will be invoked with a NULL second argument so it can clean up *cb_data* . Supply a NULL value for *fn* to disable trace callbacks within *context* . - - - - - - - - - - -.. - - - - - - -.. note:: - - This function overrides the information passed through the *KRB5_TRACE* environment variable. - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_trace_filename.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_trace_filename.rst.txt deleted file mode 100644 index 6d75325a3489..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_set_trace_filename.rst.txt +++ /dev/null @@ -1,61 +0,0 @@ -krb5_set_trace_filename - Specify a file name for directing trace events. -=========================================================================== - -.. - -.. c:function:: krb5_error_code krb5_set_trace_filename(krb5_context context, const char * filename) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **filename** - File name - - -.. - - -:retval: - - KRB5_TRACE_NOSUPP Tracing is not supported in the library. - - -.. - - - - - - - -Open *filename* for appending (creating it, if necessary) and set up a callback to write trace events to it. - - - - - - - - - - -.. - - - - - - -.. note:: - - This function overrides the information passed through the *KRB5_TRACE* environment variable. - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_match.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_match.rst.txt deleted file mode 100644 index 21785890f667..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_match.rst.txt +++ /dev/null @@ -1,59 +0,0 @@ -krb5_sname_match - Test whether a principal matches a matching principal. -=========================================================================== - -.. - -.. c:function:: krb5_boolean krb5_sname_match(krb5_context context, krb5_const_principal matching, krb5_const_principal princ) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **matching** - Matching principal - - **[in]** **princ** - Principal to test - - -.. - - - -:return: - - TRUE if princ matches matching , FALSE otherwise. - -.. - - - - - - - -If *matching* is NULL, return TRUE. If *matching* is not a matching principal, return the value of krb5_principal_compare(context, matching,princ). - - - - - - - - - - -.. - - - - - - -.. note:: - - A matching principal is a host-based principal with an empty realm and/or second data component (hostname). Profile configuration may cause the hostname to be ignored even if it is present. A principal matches a matching principal if the former has the same non-empty (and non-ignored) components of the latter. - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_to_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_to_principal.rst.txt deleted file mode 100644 index f6e167995bee..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_sname_to_principal.rst.txt +++ /dev/null @@ -1,74 +0,0 @@ -krb5_sname_to_principal - Generate a full principal name from a service name. -=============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_sname_to_principal(krb5_context context, const char * hostname, const char * sname, krb5_int32 type, krb5_principal * ret_princ) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **hostname** - Host name, or NULL to use local host - - **[in]** **sname** - Service name, or NULL to use **"host"** - - **[in]** **type** - Principal type - - **[out]** **ret_princ** - Generated principal - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function converts a *hostname* and *sname* into *krb5_principal* structure *ret_princ* . The returned principal will be of the form *sname\/hostname@REALM* where REALM is determined by krb5_get_host_realm(). In some cases this may be the referral (empty) realm. - - - -The *type* can be one of the following: - - - - - - - KRB5_NT_SRV_HST canonicalizes the host name before looking up the realm and generating the principal. - - - - - KRB5_NT_UNKNOWN accepts the hostname as given, and does not canonicalize it. - - Use krb5_free_principal to free *ret_princ* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_cksumtype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_cksumtype.rst.txt deleted file mode 100644 index 8ad07f795d83..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_cksumtype.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -krb5_string_to_cksumtype - Convert a string to a checksum type. -================================================================= - -.. - -.. c:function:: krb5_error_code krb5_string_to_cksumtype(char * string, krb5_cksumtype * cksumtypep) - -.. - - -:param: - - **[in]** **string** - String to be converted - - **[out]** **cksumtypep** - Checksum type to be filled in - - -.. - - -:retval: - - 0 Success; otherwise - EINVAL - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_deltat.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_deltat.rst.txt deleted file mode 100644 index 0f1b9584bfef..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_deltat.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -krb5_string_to_deltat - Convert a string to a delta time value. -================================================================= - -.. - -.. c:function:: krb5_error_code krb5_string_to_deltat(char * string, krb5_deltat * deltatp) - -.. - - -:param: - - **[in]** **string** - String to be converted - - **[out]** **deltatp** - Delta time to be filled in - - -.. - - -:retval: - - 0 Success; otherwise - KRB5_DELTAT_BADFORMAT - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_enctype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_enctype.rst.txt deleted file mode 100644 index 173251f6d98f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_enctype.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -krb5_string_to_enctype - Convert a string to an encryption type. -================================================================== - -.. - -.. c:function:: krb5_error_code krb5_string_to_enctype(char * string, krb5_enctype * enctypep) - -.. - - -:param: - - **[in]** **string** - String to convert to an encryption type - - **[out]** **enctypep** - Encryption type - - -.. - - -:retval: - - 0 Success; otherwise - EINVAL - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_key.rst.txt deleted file mode 100644 index 3f44b9d5ab28..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_key.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -krb5_string_to_key -================== - -.. - -.. c:function:: krb5_error_code krb5_string_to_key(krb5_context context, const krb5_encrypt_block * eblock, krb5_keyblock * keyblock, const krb5_data * data, const krb5_data * salt) - -.. - - -:param: - - **context** - - **eblock** - - **keyblock** - - **data** - - **salt** - - -.. - - - -.. - - -DEPRECATED See krb5_c_string_to_key() - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_salttype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_salttype.rst.txt deleted file mode 100644 index 36978f4b1bdc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_salttype.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -krb5_string_to_salttype - Convert a string to a salt type. -============================================================ - -.. - -.. c:function:: krb5_error_code krb5_string_to_salttype(char * string, krb5_int32 * salttypep) - -.. - - -:param: - - **[in]** **string** - String to convert to an encryption type - - **[out]** **salttypep** - Salt type to be filled in - - -.. - - -:retval: - - 0 Success; otherwise - EINVAL - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_timestamp.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_timestamp.rst.txt deleted file mode 100644 index 11b6d1e976a9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_string_to_timestamp.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -krb5_string_to_timestamp - Convert a string to a timestamp. -============================================================= - -.. - -.. c:function:: krb5_error_code krb5_string_to_timestamp(char * string, krb5_timestamp * timestampp) - -.. - - -:param: - - **[in]** **string** - String to be converted - - **[out]** **timestampp** - Pointer to timestamp - - -.. - - -:retval: - - 0 Success; otherwise - EINVAL - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_timeofday.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_timeofday.rst.txt deleted file mode 100644 index dc1c90290942..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_timeofday.rst.txt +++ /dev/null @@ -1,52 +0,0 @@ -krb5_timeofday - Retrieve the current time with context specific time offset adjustment. -========================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_timeofday(krb5_context context, krb5_timestamp * timeret) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **timeret** - Timestamp to fill in - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function retrieves the system time of day with the context specific time offset adjustment. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_timestamp_to_sfstring.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_timestamp_to_sfstring.rst.txt deleted file mode 100644 index 3750c45d010a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_timestamp_to_sfstring.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_timestamp_to_sfstring - Convert a timestamp to a string, with optional output padding. -============================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_timestamp_to_sfstring(krb5_timestamp timestamp, char * buffer, size_t buflen, char * pad) - -.. - - -:param: - - **[in]** **timestamp** - Timestamp to convert - - **[out]** **buffer** - Buffer to hold the converted timestamp - - **[in]** **buflen** - Length of buffer - - **[in]** **pad** - Optional value to pad *buffer* if converted timestamp does not fill it - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -If *pad* is not NULL, *buffer* is padded out to *buflen* - 1 characters with the value of * *pad* . - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_timestamp_to_string.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_timestamp_to_string.rst.txt deleted file mode 100644 index 1c4c71eb2e1e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_timestamp_to_string.rst.txt +++ /dev/null @@ -1,51 +0,0 @@ -krb5_timestamp_to_string - Convert a timestamp to a string. -============================================================= - -.. - -.. c:function:: krb5_error_code krb5_timestamp_to_string(krb5_timestamp timestamp, char * buffer, size_t buflen) - -.. - - -:param: - - **[in]** **timestamp** - Timestamp to convert - - **[out]** **buffer** - Buffer to hold converted timestamp - - **[in]** **buflen** - Storage available in *buffer* - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -The string is returned in the locale's appropriate date and time representation. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_free.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_free.rst.txt deleted file mode 100644 index 623ed5be390b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_free.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_tkt_creds_free - Free a TGS request context. -=================================================== - -.. - -.. c:function:: void krb5_tkt_creds_free(krb5_context context, krb5_tkt_creds_context ctx) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - TGS request context - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_get.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_get.rst.txt deleted file mode 100644 index a193ce92bd18..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_get.rst.txt +++ /dev/null @@ -1,53 +0,0 @@ -krb5_tkt_creds_get - Synchronously obtain credentials using a TGS request context. -==================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_tkt_creds_get(krb5_context context, krb5_tkt_creds_context ctx) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - TGS request context - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function synchronously obtains credentials using a context created by krb5_tkt_creds_init(). On successful return, the credentials can be retrieved with krb5_tkt_creds_get_creds(). - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_get_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_get_creds.rst.txt deleted file mode 100644 index 309e8d47b1fa..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_get_creds.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_tkt_creds_get_creds - Retrieve acquired credentials from a TGS request context. -====================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_tkt_creds_get_creds(krb5_context context, krb5_tkt_creds_context ctx, krb5_creds * creds) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - TGS request context - - **[out]** **creds** - Acquired credentials - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function copies the acquired initial credentials from *ctx* into *creds* , after the successful completion of krb5_tkt_creds_get() or krb5_tkt_creds_step(). Use krb5_free_cred_contents() to free *creds* when it is no longer needed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_get_times.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_get_times.rst.txt deleted file mode 100644 index 19c9f98066b3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_get_times.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_tkt_creds_get_times - Retrieve ticket times from a TGS request context. -============================================================================== - -.. - -.. c:function:: krb5_error_code krb5_tkt_creds_get_times(krb5_context context, krb5_tkt_creds_context ctx, krb5_ticket_times * times) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - TGS request context - - **[out]** **times** - Ticket times for acquired credentials - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -The TGS request context must have completed obtaining credentials via either krb5_tkt_creds_get() or krb5_tkt_creds_step(). - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_init.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_init.rst.txt deleted file mode 100644 index 3ec4a35dca13..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_init.rst.txt +++ /dev/null @@ -1,67 +0,0 @@ -krb5_tkt_creds_init - Create a context to get credentials from a KDC's Ticket Granting Service. -================================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_tkt_creds_init(krb5_context context, krb5_ccache ccache, krb5_creds * creds, krb5_flags options, krb5_tkt_creds_context * ctx) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ccache** - Credential cache handle - - **[in]** **creds** - Input credentials - - **[in]** **options** - Options (see KRB5_GC macros) - - **[out]** **ctx** - New TGS request context - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function prepares to obtain credentials matching *creds* , either by retrieving them from *ccache* or by making requests to ticket-granting services beginning with a ticket-granting ticket for the client principal's realm. - - - -The resulting TGS acquisition context can be used asynchronously with krb5_tkt_creds_step() or synchronously with krb5_tkt_creds_get(). See also krb5_get_credentials() for synchronous use. - - - -Use krb5_tkt_creds_free() to free *ctx* when it is no longer needed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_step.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_step.rst.txt deleted file mode 100644 index 53759557ee3b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_tkt_creds_step.rst.txt +++ /dev/null @@ -1,69 +0,0 @@ -krb5_tkt_creds_step - Get the next KDC request in a TGS exchange. -=================================================================== - -.. - -.. c:function:: krb5_error_code krb5_tkt_creds_step(krb5_context context, krb5_tkt_creds_context ctx, krb5_data * in, krb5_data * out, krb5_data * realm, unsigned int * flags) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **ctx** - TGS request context - - **[in]** **in** - KDC response (empty on the first call) - - **[out]** **out** - Next KDC request - - **[out]** **realm** - Realm for next KDC request - - **[out]** **flags** - Output flags - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function constructs the next KDC request for a TGS exchange, allowing the caller to control the transport of KDC requests and replies. On the first call, *in* should be set to an empty buffer; on subsequent calls, it should be set to the KDC's reply to the previous request. - - - -If more requests are needed, *flags* will be set to KRB5_TKT_CREDS_STEP_FLAG_CONTINUE and the next request will be placed in *out* . If no more requests are needed, *flags* will not contain KRB5_TKT_CREDS_STEP_FLAG_CONTINUE and *out* will be empty. - - - -If this function returns **KRB5KRB_ERR_RESPONSE_TOO_BIG** , the caller should transmit the next request using TCP rather than UDP. If this function returns any other error, the TGS exchange has failed. - - - - - - - - - - -.. - - - - -.. note:: - - New in 1.9 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unmarshal_credentials.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unmarshal_credentials.rst.txt deleted file mode 100644 index bbab8765b880..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unmarshal_credentials.rst.txt +++ /dev/null @@ -1,55 +0,0 @@ -krb5_unmarshal_credentials - Deserialize a krb5_creds object. -=============================================================== - -.. - -.. c:function:: krb5_error_code krb5_unmarshal_credentials(krb5_context context, const krb5_data * data, krb5_creds ** creds_out) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **data** - The serialized credentials - - **[out]** **creds_out** - The resulting creds object - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -Deserialize *data* to credentials in the format used by the FILE ccache format (vesion 4) and KCM ccache protocol. - - - -Use krb5_free_creds() to free *creds_out* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name.rst.txt deleted file mode 100644 index 90ecea7056c7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name.rst.txt +++ /dev/null @@ -1,58 +0,0 @@ -krb5_unparse_name - Convert a krb5_principal structure to a string representation. -==================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_unparse_name(krb5_context context, krb5_const_principal principal, char ** name) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **principal** - Principal - - **[out]** **name** - String representation of principal name - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -The resulting string representation uses the format and quoting conventions described for krb5_parse_name(). - - - -Use krb5_free_unparsed_name() to free *name* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_ext.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_ext.rst.txt deleted file mode 100644 index 6456632fa3a6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_ext.rst.txt +++ /dev/null @@ -1,60 +0,0 @@ -krb5_unparse_name_ext - Convert krb5_principal structure to string and length. -================================================================================ - -.. - -.. c:function:: krb5_error_code krb5_unparse_name_ext(krb5_context context, krb5_const_principal principal, char ** name, unsigned int * size) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **principal** - Principal - - **[inout]** **name** - String representation of principal name - - **[inout]** **size** - Size of unparsed name - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes. On failure name is set to NULL - -.. - - - - - - - -This function is similar to krb5_unparse_name(), but allows the use of an existing buffer for the result. If size is not NULL, then *name* must point to either NULL or an existing buffer of at least the size pointed to by *size* . The buffer will be allocated or resized if necessary, with the new pointer stored into *name* . Whether or not the buffer is resized, the necessary space for the result, including null terminator, will be stored into *size* . - - - -If size is NULL, this function behaves exactly as krb5_unparse_name(). - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_flags.rst.txt deleted file mode 100644 index 6ae0b40f9718..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_flags.rst.txt +++ /dev/null @@ -1,70 +0,0 @@ -krb5_unparse_name_flags - Convert krb5_principal structure to a string with flags. -==================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal, int flags, char ** name) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **principal** - Principal - - **[in]** **flags** - Flags - - **[out]** **name** - String representation of principal name - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes. On failure name is set to NULL - -.. - - - - - - - -Similar to krb5_unparse_name(), this function converts a krb5_principal structure to a string representation. - - - -The following flags are valid: - - - KRB5_PRINCIPAL_UNPARSE_SHORT - omit realm if it is the local realm - - - - KRB5_PRINCIPAL_UNPARSE_NO_REALM - omit realm - - - - KRB5_PRINCIPAL_UNPARSE_DISPLAY - do not quote special characters - - Use krb5_free_unparsed_name() to free *name* when it is no longer needed. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_flags_ext.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_flags_ext.rst.txt deleted file mode 100644 index aa713bda494f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_unparse_name_flags_ext.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_unparse_name_flags_ext - Convert krb5_principal structure to string format with flags. -============================================================================================= - -.. - -.. c:function:: krb5_error_code krb5_unparse_name_flags_ext(krb5_context context, krb5_const_principal principal, int flags, char ** name, unsigned int * size) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **principal** - Principal - - **[in]** **flags** - Flags - - **[out]** **name** - Single string format of principal name - - **[out]** **size** - Size of unparsed name buffer - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes. On failure name is set to NULL - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_us_timeofday.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_us_timeofday.rst.txt deleted file mode 100644 index ba4ef8084f2c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_us_timeofday.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_us_timeofday - Retrieve the system time of day, in sec and ms, since the epoch. -====================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_us_timeofday(krb5_context context, krb5_timestamp * seconds, krb5_int32 * microseconds) - -.. - - -:param: - - **[in]** **context** - Library context - - **[out]** **seconds** - System timeofday, seconds portion - - **[out]** **microseconds** - System timeofday, microseconds portion - - -.. - - -:retval: - - 0 Success - - -:return: - - Kerberos error codes - -.. - - - - - - - -This function retrieves the system time of day with the context specific time offset adjustment. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_use_enctype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_use_enctype.rst.txt deleted file mode 100644 index 10b3fa712482..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_use_enctype.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_use_enctype -================ - -.. - -.. c:function:: krb5_error_code krb5_use_enctype(krb5_context context, krb5_encrypt_block * eblock, krb5_enctype enctype) - -.. - - -:param: - - **context** - - **eblock** - - **enctype** - - -.. - - - -.. - - -DEPRECATED Replaced by krb5_c_* API family. - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_authdata_kdc_issued.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_authdata_kdc_issued.rst.txt deleted file mode 100644 index 30971392e3ec..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_authdata_kdc_issued.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_verify_authdata_kdc_issued - Unwrap and verify AD-KDCIssued authorization data. -====================================================================================== - -.. - -.. c:function:: krb5_error_code krb5_verify_authdata_kdc_issued(krb5_context context, const krb5_keyblock * key, const krb5_authdata * ad_kdcissued, krb5_principal * issuer, krb5_authdata *** authdata) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **key** - Session key - - **[in]** **ad_kdcissued** - AD-KDCIssued authorization data to be unwrapped - - **[out]** **issuer** - Name of issuing principal (or NULL) - - **[out]** **authdata** - Unwrapped list of authorization data - - -.. - - - -.. - - - - - - - -This function unwraps an AD-KDCIssued authdatum (see RFC 4120 section 5.2.6.2) and verifies its signature against *key* . The issuer field of the authdatum element is returned in *issuer* , and the unwrapped list of authdata is returned in *authdata* . - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_checksum.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_checksum.rst.txt deleted file mode 100644 index 0ddf63185d72..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_checksum.rst.txt +++ /dev/null @@ -1,54 +0,0 @@ -krb5_verify_checksum -==================== - -.. - -.. c:function:: krb5_error_code krb5_verify_checksum(krb5_context context, krb5_cksumtype ctype, const krb5_checksum * cksum, krb5_const_pointer in, size_t in_length, krb5_const_pointer seed, size_t seed_length) - -.. - - -:param: - - **context** - - **ctype** - - **cksum** - - **in** - - **in_length** - - **seed** - - **seed_length** - - -.. - - - -.. - - -DEPRECATED See krb5_c_verify_checksum() - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_init_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_init_creds.rst.txt deleted file mode 100644 index 1788cad3ce7a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_init_creds.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -krb5_verify_init_creds - Verify initial credentials against a keytab. -======================================================================= - -.. - -.. c:function:: krb5_error_code krb5_verify_init_creds(krb5_context context, krb5_creds * creds, krb5_principal server, krb5_keytab keytab, krb5_ccache * ccache, krb5_verify_init_creds_opt * options) - -.. - - -:param: - - **[in]** **context** - Library context - - **[in]** **creds** - Initial credentials to be verified - - **[in]** **server** - Server principal (or NULL) - - **[in]** **keytab** - Key table (NULL to use default keytab) - - **[in]** **ccache** - Credential cache for fetched creds (or NULL) - - **[in]** **options** - Verification options (NULL for default options) - - -.. - - -:retval: - - 0 Success; otherwise - Kerberos error codes - - -.. - - - - - - - -This function attempts to verify that *creds* were obtained from a KDC with knowledge of a key in *keytab* , or the default keytab if *keytab* is NULL. If *server* is provided, the highest-kvno key entry for that principal name is used to verify the credentials; otherwise, all unique"host"service principals in the keytab are tried. - - - -If the specified keytab does not exist, or is empty, or cannot be read, or does not contain an entry for *server* , then credential verification may be skipped unless configuration demands that it succeed. The caller can control this behavior by providing a verification options structure; see krb5_verify_init_creds_opt_init() and krb5_verify_init_creds_opt_set_ap_req_nofail(). - - - -If *ccache* is NULL, any additional credentials fetched during the verification process will be destroyed. If *ccache* points to NULL, a memory ccache will be created for the additional credentials and returned in *ccache* . If *ccache* points to a valid credential cache handle, the additional credentials will be stored in that cache. - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_init_creds_opt_init.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_init_creds_opt_init.rst.txt deleted file mode 100644 index a55fd3aa5094..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_init_creds_opt_init.rst.txt +++ /dev/null @@ -1,40 +0,0 @@ -krb5_verify_init_creds_opt_init - Initialize a credential verification options structure. -=========================================================================================== - -.. - -.. c:function:: void krb5_verify_init_creds_opt_init(krb5_verify_init_creds_opt * k5_vic_options) - -.. - - -:param: - - **[in]** **k5_vic_options** - Verification options structure - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_init_creds_opt_set_ap_req_nofail.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_init_creds_opt_set_ap_req_nofail.rst.txt deleted file mode 100644 index 870f448fc7bf..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_verify_init_creds_opt_set_ap_req_nofail.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_verify_init_creds_opt_set_ap_req_nofail - Set whether credential verification is required. -================================================================================================= - -.. - -.. c:function:: void krb5_verify_init_creds_opt_set_ap_req_nofail(krb5_verify_init_creds_opt * k5_vic_options, int ap_req_nofail) - -.. - - -:param: - - **[in]** **k5_vic_options** - Verification options structure - - **[in]** **ap_req_nofail** - Whether to require successful verification - - -.. - - - -.. - - - - - - - -This function determines how krb5_verify_init_creds() behaves if no keytab information is available. If *ap_req_nofail* is **FALSE** , verification will be skipped in this case and krb5_verify_init_creds() will return successfully. If *ap_req_nofail* is **TRUE** , krb5_verify_init_creds() will not return successfully unless verification can be performed. - - - -If this function is not used, the behavior of krb5_verify_init_creds() is determined through configuration. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_vprepend_error_message.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_vprepend_error_message.rst.txt deleted file mode 100644 index 53003d1c67a9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_vprepend_error_message.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_vprepend_error_message - Add a prefix to the message for an error code using a va_list. -============================================================================================== - -.. - -.. c:function:: void krb5_vprepend_error_message(krb5_context ctx, krb5_error_code code, const char * fmt, va_list args) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **code** - Error code - - **[in]** **fmt** - Format string for error message prefix - - **[in]** **args** - List of vprintf(3) style arguments - - -.. - - - -.. - - - - - - - -This function is similar to krb5_prepend_error_message(), but uses a va_list instead of variadic arguments. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_vset_error_message.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_vset_error_message.rst.txt deleted file mode 100644 index fcb4b6996f62..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_vset_error_message.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_vset_error_message - Set an extended error message for an error code using a va_list. -============================================================================================ - -.. - -.. c:function:: void krb5_vset_error_message(krb5_context ctx, krb5_error_code code, const char * fmt, va_list args) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **code** - Error code - - **[in]** **fmt** - Error string for the error code - - **[in]** **args** - List of vprintf(3) style arguments - - -.. - - - -.. - - - - - - - - - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_vwrap_error_message.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_vwrap_error_message.rst.txt deleted file mode 100644 index d860efe4fc90..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_vwrap_error_message.rst.txt +++ /dev/null @@ -1,48 +0,0 @@ -krb5_vwrap_error_message - Add a prefix to a different error code's message using a va_list. -============================================================================================== - -.. - -.. c:function:: void krb5_vwrap_error_message(krb5_context ctx, krb5_error_code old_code, krb5_error_code code, const char * fmt, va_list args) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **old_code** - Previous error code - - **[in]** **code** - Error code - - **[in]** **fmt** - Format string for error message prefix - - **[in]** **args** - List of vprintf(3) style arguments - - -.. - - - -.. - - - - - - - -This function is similar to krb5_wrap_error_message(), but uses a va_list instead of variadic arguments. - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_wrap_error_message.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_wrap_error_message.rst.txt deleted file mode 100644 index b599ae78ff71..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/api/krb5_wrap_error_message.rst.txt +++ /dev/null @@ -1,46 +0,0 @@ -krb5_wrap_error_message - Add a prefix to a different error code's message. -============================================================================= - -.. - -.. c:function:: void krb5_wrap_error_message(krb5_context ctx, krb5_error_code old_code, krb5_error_code code, const char * fmt, ... ) - -.. - - -:param: - - **[in]** **ctx** - Library context - - **[in]** **old_code** - Previous error code - - **[in]** **code** - Error code - - **[in]** **fmt** - Format string for error message prefix - - -.. - - - -.. - - - - - - - -Format a message and prepend it to the message for *old_code* . The prefix will be separated from the old message with a colon and space. Set the resulting message as the extended error message for *code* . - - - - - - -.. - - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/index.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/index.rst.txt deleted file mode 100644 index 37a895f3bee4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/index.rst.txt +++ /dev/null @@ -1,9 +0,0 @@ -Complete reference - API and datatypes -====================================== - -.. toctree:: - :maxdepth: 1 - - api/index.rst - types/index.rst - macros/index.rst diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_ADDRPORT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_ADDRPORT.rst.txt deleted file mode 100644 index ec4c2835fad4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_ADDRPORT.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-ADDRPORT-data: - -ADDRTYPE_ADDRPORT -================= - -.. -.. data:: ADDRTYPE_ADDRPORT -.. - - - - -======================== ====================== -``ADDRTYPE_ADDRPORT`` ``0x0100`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_CHAOS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_CHAOS.rst.txt deleted file mode 100644 index 7285be14226e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_CHAOS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-CHAOS-data: - -ADDRTYPE_CHAOS -============== - -.. -.. data:: ADDRTYPE_CHAOS -.. - - - - -===================== ====================== -``ADDRTYPE_CHAOS`` ``0x0005`` -===================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_DDP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_DDP.rst.txt deleted file mode 100644 index bbf67c14577c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_DDP.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-DDP-data: - -ADDRTYPE_DDP -============ - -.. -.. data:: ADDRTYPE_DDP -.. - - - - -=================== ====================== -``ADDRTYPE_DDP`` ``0x0010`` -=================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_DIRECTIONAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_DIRECTIONAL.rst.txt deleted file mode 100644 index 678730ab5529..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_DIRECTIONAL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-DIRECTIONAL-data: - -ADDRTYPE_DIRECTIONAL -==================== - -.. -.. data:: ADDRTYPE_DIRECTIONAL -.. - - - - -=========================== ====================== -``ADDRTYPE_DIRECTIONAL`` ``0x0003`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_INET.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_INET.rst.txt deleted file mode 100644 index e40013b0cddc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_INET.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-INET-data: - -ADDRTYPE_INET -============= - -.. -.. data:: ADDRTYPE_INET -.. - - - - -==================== ====================== -``ADDRTYPE_INET`` ``0x0002`` -==================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_INET6.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_INET6.rst.txt deleted file mode 100644 index f1c6c8521152..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_INET6.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-INET6-data: - -ADDRTYPE_INET6 -============== - -.. -.. data:: ADDRTYPE_INET6 -.. - - - - -===================== ====================== -``ADDRTYPE_INET6`` ``0x0018`` -===================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_IPPORT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_IPPORT.rst.txt deleted file mode 100644 index 09030d66e91f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_IPPORT.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-IPPORT-data: - -ADDRTYPE_IPPORT -=============== - -.. -.. data:: ADDRTYPE_IPPORT -.. - - - - -====================== ====================== -``ADDRTYPE_IPPORT`` ``0x0101`` -====================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_ISO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_ISO.rst.txt deleted file mode 100644 index 3feb1fb0ccce..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_ISO.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-ISO-data: - -ADDRTYPE_ISO -============ - -.. -.. data:: ADDRTYPE_ISO -.. - - - - -=================== ====================== -``ADDRTYPE_ISO`` ``0x0007`` -=================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_IS_LOCAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_IS_LOCAL.rst.txt deleted file mode 100644 index 9f091b417dd8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_IS_LOCAL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-IS-LOCAL-data: - -ADDRTYPE_IS_LOCAL -================= - -.. -.. data:: ADDRTYPE_IS_LOCAL -.. - - - - -================================== ====================== -``ADDRTYPE_IS_LOCAL (addrtype)`` ``(addrtype & 0x8000)`` -================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_NETBIOS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_NETBIOS.rst.txt deleted file mode 100644 index 1c62e3d837cc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_NETBIOS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-NETBIOS-data: - -ADDRTYPE_NETBIOS -================ - -.. -.. data:: ADDRTYPE_NETBIOS -.. - - - - -======================= ====================== -``ADDRTYPE_NETBIOS`` ``0x0014`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_UNIXSOCK.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_UNIXSOCK.rst.txt deleted file mode 100644 index 052f6cf49adb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_UNIXSOCK.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-UNIXSOCK-data: - -ADDRTYPE_UNIXSOCK -================= - -.. -.. data:: ADDRTYPE_UNIXSOCK -.. - - - - -======================== ====================== -``ADDRTYPE_UNIXSOCK`` ``(0x8000 | 0x0001)`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_XNS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_XNS.rst.txt deleted file mode 100644 index 8c30dcddec41..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ADDRTYPE_XNS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ADDRTYPE-XNS-data: - -ADDRTYPE_XNS -============ - -.. -.. data:: ADDRTYPE_XNS -.. - - - - -=================== ====================== -``ADDRTYPE_XNS`` ``0x0006`` -=================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_EXTERNAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_EXTERNAL.rst.txt deleted file mode 100644 index eacafc20ae83..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_EXTERNAL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _AD-TYPE-EXTERNAL-data: - -AD_TYPE_EXTERNAL -================ - -.. -.. data:: AD_TYPE_EXTERNAL -.. - - - - -======================= ====================== -``AD_TYPE_EXTERNAL`` ``0x4000`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_FIELD_TYPE_MASK.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_FIELD_TYPE_MASK.rst.txt deleted file mode 100644 index fefb9843ef34..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_FIELD_TYPE_MASK.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _AD-TYPE-FIELD-TYPE-MASK-data: - -AD_TYPE_FIELD_TYPE_MASK -======================= - -.. -.. data:: AD_TYPE_FIELD_TYPE_MASK -.. - - - - -============================== ====================== -``AD_TYPE_FIELD_TYPE_MASK`` ``0x1fff`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_REGISTERED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_REGISTERED.rst.txt deleted file mode 100644 index 4907e15969a2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_REGISTERED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _AD-TYPE-REGISTERED-data: - -AD_TYPE_REGISTERED -================== - -.. -.. data:: AD_TYPE_REGISTERED -.. - - - - -========================= ====================== -``AD_TYPE_REGISTERED`` ``0x2000`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_RESERVED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_RESERVED.rst.txt deleted file mode 100644 index 5ae5ea33df02..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AD_TYPE_RESERVED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _AD-TYPE-RESERVED-data: - -AD_TYPE_RESERVED -================ - -.. -.. data:: AD_TYPE_RESERVED -.. - - - - -======================= ====================== -``AD_TYPE_RESERVED`` ``0x8000`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_CBT_FLAG.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_CBT_FLAG.rst.txt deleted file mode 100644 index e056aeac383b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_CBT_FLAG.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _AP-OPTS-CBT-FLAG-data: - -AP_OPTS_CBT_FLAG -================ - -.. -.. data:: AP_OPTS_CBT_FLAG -.. - - - - -======================= ====================== -``AP_OPTS_CBT_FLAG`` ``0x00000004 /* include KERB_AP_OPTIONS_CBT */`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_ETYPE_NEGOTIATION.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_ETYPE_NEGOTIATION.rst.txt deleted file mode 100644 index 4bea16d07f7d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_ETYPE_NEGOTIATION.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _AP-OPTS-ETYPE-NEGOTIATION-data: - -AP_OPTS_ETYPE_NEGOTIATION -========================= - -.. -.. data:: AP_OPTS_ETYPE_NEGOTIATION -.. - - - - -================================ ====================== -``AP_OPTS_ETYPE_NEGOTIATION`` ``0x00000002`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_MUTUAL_REQUIRED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_MUTUAL_REQUIRED.rst.txt deleted file mode 100644 index b3e6e592968d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_MUTUAL_REQUIRED.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _AP-OPTS-MUTUAL-REQUIRED-data: - -AP_OPTS_MUTUAL_REQUIRED -======================= - -.. -.. data:: AP_OPTS_MUTUAL_REQUIRED -.. - -Perform a mutual authentication exchange. - - - -============================== ====================== -``AP_OPTS_MUTUAL_REQUIRED`` ``0x20000000`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_RESERVED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_RESERVED.rst.txt deleted file mode 100644 index 7961b63c08c5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_RESERVED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _AP-OPTS-RESERVED-data: - -AP_OPTS_RESERVED -================ - -.. -.. data:: AP_OPTS_RESERVED -.. - - - - -======================= ====================== -``AP_OPTS_RESERVED`` ``0x80000000`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_USE_SESSION_KEY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_USE_SESSION_KEY.rst.txt deleted file mode 100644 index 1742a2ff4be0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_USE_SESSION_KEY.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _AP-OPTS-USE-SESSION-KEY-data: - -AP_OPTS_USE_SESSION_KEY -======================= - -.. -.. data:: AP_OPTS_USE_SESSION_KEY -.. - -Use session key. - - - -============================== ====================== -``AP_OPTS_USE_SESSION_KEY`` ``0x40000000`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_USE_SUBKEY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_USE_SUBKEY.rst.txt deleted file mode 100644 index 77bf41d92e4b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_USE_SUBKEY.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _AP-OPTS-USE-SUBKEY-data: - -AP_OPTS_USE_SUBKEY -================== - -.. -.. data:: AP_OPTS_USE_SUBKEY -.. - -Generate a subsession key from the current session key obtained from the credentials. - - - -========================= ====================== -``AP_OPTS_USE_SUBKEY`` ``0x00000001`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_WIRE_MASK.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_WIRE_MASK.rst.txt deleted file mode 100644 index 36328d5593cd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/AP_OPTS_WIRE_MASK.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _AP-OPTS-WIRE-MASK-data: - -AP_OPTS_WIRE_MASK -================= - -.. -.. data:: AP_OPTS_WIRE_MASK -.. - - - - -======================== ====================== -``AP_OPTS_WIRE_MASK`` ``0xfffffff0`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_CMAC_CAMELLIA128.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_CMAC_CAMELLIA128.rst.txt deleted file mode 100644 index 1a61f15456a3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_CMAC_CAMELLIA128.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-CMAC-CAMELLIA128-data: - -CKSUMTYPE_CMAC_CAMELLIA128 -========================== - -.. -.. data:: CKSUMTYPE_CMAC_CAMELLIA128 -.. - -RFC 6803. - - - -================================= ====================== -``CKSUMTYPE_CMAC_CAMELLIA128`` ``0x0011`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_CMAC_CAMELLIA256.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_CMAC_CAMELLIA256.rst.txt deleted file mode 100644 index 91f2c1662c2c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_CMAC_CAMELLIA256.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-CMAC-CAMELLIA256-data: - -CKSUMTYPE_CMAC_CAMELLIA256 -========================== - -.. -.. data:: CKSUMTYPE_CMAC_CAMELLIA256 -.. - -RFC 6803. - - - -================================= ====================== -``CKSUMTYPE_CMAC_CAMELLIA256`` ``0x0012`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_CRC32.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_CRC32.rst.txt deleted file mode 100644 index 6d0c4a312908..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_CRC32.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-CRC32-data: - -CKSUMTYPE_CRC32 -=============== - -.. -.. data:: CKSUMTYPE_CRC32 -.. - - - - -====================== ====================== -``CKSUMTYPE_CRC32`` ``0x0001`` -====================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_DESCBC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_DESCBC.rst.txt deleted file mode 100644 index 830ddb8848e2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_DESCBC.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-DESCBC-data: - -CKSUMTYPE_DESCBC -================ - -.. -.. data:: CKSUMTYPE_DESCBC -.. - - - - -======================= ====================== -``CKSUMTYPE_DESCBC`` ``0x0004`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_MD5_ARCFOUR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_MD5_ARCFOUR.rst.txt deleted file mode 100644 index 9163bd3646d0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_MD5_ARCFOUR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-HMAC-MD5-ARCFOUR-data: - -CKSUMTYPE_HMAC_MD5_ARCFOUR -========================== - -.. -.. data:: CKSUMTYPE_HMAC_MD5_ARCFOUR -.. - -RFC 4757. - - - -================================= ====================== -``CKSUMTYPE_HMAC_MD5_ARCFOUR`` ``-138`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA1_96_AES128.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA1_96_AES128.rst.txt deleted file mode 100644 index 5d28bbe08bce..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA1_96_AES128.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-HMAC-SHA1-96-AES128-data: - -CKSUMTYPE_HMAC_SHA1_96_AES128 -============================= - -.. -.. data:: CKSUMTYPE_HMAC_SHA1_96_AES128 -.. - -RFC 3962. - -Used with ENCTYPE_AES128_CTS_HMAC_SHA1_96 - -==================================== ====================== -``CKSUMTYPE_HMAC_SHA1_96_AES128`` ``0x000f`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA1_96_AES256.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA1_96_AES256.rst.txt deleted file mode 100644 index 71ba018c3cdf..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA1_96_AES256.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-HMAC-SHA1-96-AES256-data: - -CKSUMTYPE_HMAC_SHA1_96_AES256 -============================= - -.. -.. data:: CKSUMTYPE_HMAC_SHA1_96_AES256 -.. - -RFC 3962. - -Used with ENCTYPE_AES256_CTS_HMAC_SHA1_96 - -==================================== ====================== -``CKSUMTYPE_HMAC_SHA1_96_AES256`` ``0x0010`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA1_DES3.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA1_DES3.rst.txt deleted file mode 100644 index c6c76f2ab909..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA1_DES3.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-HMAC-SHA1-DES3-data: - -CKSUMTYPE_HMAC_SHA1_DES3 -======================== - -.. -.. data:: CKSUMTYPE_HMAC_SHA1_DES3 -.. - - - - -=============================== ====================== -``CKSUMTYPE_HMAC_SHA1_DES3`` ``0x000c`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA256_128_AES128.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA256_128_AES128.rst.txt deleted file mode 100644 index 77f956e034b7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA256_128_AES128.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-HMAC-SHA256-128-AES128-data: - -CKSUMTYPE_HMAC_SHA256_128_AES128 -================================ - -.. -.. data:: CKSUMTYPE_HMAC_SHA256_128_AES128 -.. - -RFC 8009. - - - -======================================= ====================== -``CKSUMTYPE_HMAC_SHA256_128_AES128`` ``0x0013`` -======================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA384_192_AES256.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA384_192_AES256.rst.txt deleted file mode 100644 index b95628d58c68..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_HMAC_SHA384_192_AES256.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-HMAC-SHA384-192-AES256-data: - -CKSUMTYPE_HMAC_SHA384_192_AES256 -================================ - -.. -.. data:: CKSUMTYPE_HMAC_SHA384_192_AES256 -.. - -RFC 8009. - - - -======================================= ====================== -``CKSUMTYPE_HMAC_SHA384_192_AES256`` ``0x0014`` -======================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_MD5_HMAC_ARCFOUR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_MD5_HMAC_ARCFOUR.rst.txt deleted file mode 100644 index 97d84fe8a56a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_MD5_HMAC_ARCFOUR.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-MD5-HMAC-ARCFOUR-data: - -CKSUMTYPE_MD5_HMAC_ARCFOUR -========================== - -.. -.. data:: CKSUMTYPE_MD5_HMAC_ARCFOUR -.. - - - - -================================= ====================== -``CKSUMTYPE_MD5_HMAC_ARCFOUR`` ``-137 /* Microsoft netlogon */`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_NIST_SHA.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_NIST_SHA.rst.txt deleted file mode 100644 index 3524028ec01b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_NIST_SHA.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-NIST-SHA-data: - -CKSUMTYPE_NIST_SHA -================== - -.. -.. data:: CKSUMTYPE_NIST_SHA -.. - - - - -========================= ====================== -``CKSUMTYPE_NIST_SHA`` ``0x0009`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD4.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD4.rst.txt deleted file mode 100644 index 02a4248b8186..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD4.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-RSA-MD4-data: - -CKSUMTYPE_RSA_MD4 -================= - -.. -.. data:: CKSUMTYPE_RSA_MD4 -.. - - - - -======================== ====================== -``CKSUMTYPE_RSA_MD4`` ``0x0002`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD4_DES.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD4_DES.rst.txt deleted file mode 100644 index 7e5cc058cb09..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD4_DES.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-RSA-MD4-DES-data: - -CKSUMTYPE_RSA_MD4_DES -===================== - -.. -.. data:: CKSUMTYPE_RSA_MD4_DES -.. - - - - -============================ ====================== -``CKSUMTYPE_RSA_MD4_DES`` ``0x0003`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD5.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD5.rst.txt deleted file mode 100644 index e94f0b458202..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD5.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-RSA-MD5-data: - -CKSUMTYPE_RSA_MD5 -================= - -.. -.. data:: CKSUMTYPE_RSA_MD5 -.. - - - - -======================== ====================== -``CKSUMTYPE_RSA_MD5`` ``0x0007`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD5_DES.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD5_DES.rst.txt deleted file mode 100644 index 87c321f5033f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_RSA_MD5_DES.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-RSA-MD5-DES-data: - -CKSUMTYPE_RSA_MD5_DES -===================== - -.. -.. data:: CKSUMTYPE_RSA_MD5_DES -.. - - - - -============================ ====================== -``CKSUMTYPE_RSA_MD5_DES`` ``0x0008`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_SHA1.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_SHA1.rst.txt deleted file mode 100644 index a0f24bd5425a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/CKSUMTYPE_SHA1.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _CKSUMTYPE-SHA1-data: - -CKSUMTYPE_SHA1 -============== - -.. -.. data:: CKSUMTYPE_SHA1 -.. - -RFC 3961. - - - -===================== ====================== -``CKSUMTYPE_SHA1`` ``0x000e`` -===================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES128_CTS_HMAC_SHA1_96.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES128_CTS_HMAC_SHA1_96.rst.txt deleted file mode 100644 index b66ae72be1c9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES128_CTS_HMAC_SHA1_96.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-AES128-CTS-HMAC-SHA1-96-data: - -ENCTYPE_AES128_CTS_HMAC_SHA1_96 -=============================== - -.. -.. data:: ENCTYPE_AES128_CTS_HMAC_SHA1_96 -.. - -RFC 3962. - - - -====================================== ====================== -``ENCTYPE_AES128_CTS_HMAC_SHA1_96`` ``0x0011`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES128_CTS_HMAC_SHA256_128.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES128_CTS_HMAC_SHA256_128.rst.txt deleted file mode 100644 index 3f83a1bf6abe..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES128_CTS_HMAC_SHA256_128.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-AES128-CTS-HMAC-SHA256-128-data: - -ENCTYPE_AES128_CTS_HMAC_SHA256_128 -================================== - -.. -.. data:: ENCTYPE_AES128_CTS_HMAC_SHA256_128 -.. - -RFC 8009. - - - -========================================= ====================== -``ENCTYPE_AES128_CTS_HMAC_SHA256_128`` ``0x0013`` -========================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES256_CTS_HMAC_SHA1_96.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES256_CTS_HMAC_SHA1_96.rst.txt deleted file mode 100644 index 4d216964da4b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES256_CTS_HMAC_SHA1_96.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-AES256-CTS-HMAC-SHA1-96-data: - -ENCTYPE_AES256_CTS_HMAC_SHA1_96 -=============================== - -.. -.. data:: ENCTYPE_AES256_CTS_HMAC_SHA1_96 -.. - -RFC 3962. - - - -====================================== ====================== -``ENCTYPE_AES256_CTS_HMAC_SHA1_96`` ``0x0012`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES256_CTS_HMAC_SHA384_192.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES256_CTS_HMAC_SHA384_192.rst.txt deleted file mode 100644 index 76c8e4b73482..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_AES256_CTS_HMAC_SHA384_192.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-AES256-CTS-HMAC-SHA384-192-data: - -ENCTYPE_AES256_CTS_HMAC_SHA384_192 -================================== - -.. -.. data:: ENCTYPE_AES256_CTS_HMAC_SHA384_192 -.. - -RFC 8009. - - - -========================================= ====================== -``ENCTYPE_AES256_CTS_HMAC_SHA384_192`` ``0x0014`` -========================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_ARCFOUR_HMAC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_ARCFOUR_HMAC.rst.txt deleted file mode 100644 index 54200453fc23..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_ARCFOUR_HMAC.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-ARCFOUR-HMAC-data: - -ENCTYPE_ARCFOUR_HMAC -==================== - -.. -.. data:: ENCTYPE_ARCFOUR_HMAC -.. - -RFC 4757. - - - -=========================== ====================== -``ENCTYPE_ARCFOUR_HMAC`` ``0x0017`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_ARCFOUR_HMAC_EXP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_ARCFOUR_HMAC_EXP.rst.txt deleted file mode 100644 index 140c34127b84..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_ARCFOUR_HMAC_EXP.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-ARCFOUR-HMAC-EXP-data: - -ENCTYPE_ARCFOUR_HMAC_EXP -======================== - -.. -.. data:: ENCTYPE_ARCFOUR_HMAC_EXP -.. - -RFC 4757. - - - -=============================== ====================== -``ENCTYPE_ARCFOUR_HMAC_EXP`` ``0x0018`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_CAMELLIA128_CTS_CMAC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_CAMELLIA128_CTS_CMAC.rst.txt deleted file mode 100644 index e08e8e3f324c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_CAMELLIA128_CTS_CMAC.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-CAMELLIA128-CTS-CMAC-data: - -ENCTYPE_CAMELLIA128_CTS_CMAC -============================ - -.. -.. data:: ENCTYPE_CAMELLIA128_CTS_CMAC -.. - -RFC 6803. - - - -=================================== ====================== -``ENCTYPE_CAMELLIA128_CTS_CMAC`` ``0x0019`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_CAMELLIA256_CTS_CMAC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_CAMELLIA256_CTS_CMAC.rst.txt deleted file mode 100644 index 7f7d64c89299..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_CAMELLIA256_CTS_CMAC.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-CAMELLIA256-CTS-CMAC-data: - -ENCTYPE_CAMELLIA256_CTS_CMAC -============================ - -.. -.. data:: ENCTYPE_CAMELLIA256_CTS_CMAC -.. - -RFC 6803. - - - -=================================== ====================== -``ENCTYPE_CAMELLIA256_CTS_CMAC`` ``0x001a`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_ENV.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_ENV.rst.txt deleted file mode 100644 index 62358d2f4f5e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_ENV.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-DES3-CBC-ENV-data: - -ENCTYPE_DES3_CBC_ENV -==================== - -.. -.. data:: ENCTYPE_DES3_CBC_ENV -.. - -DES-3 cbc mode, CMS enveloped data. - - - -=========================== ====================== -``ENCTYPE_DES3_CBC_ENV`` ``0x000f`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_RAW.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_RAW.rst.txt deleted file mode 100644 index 1f32313380ba..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_RAW.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-DES3-CBC-RAW-data: - -ENCTYPE_DES3_CBC_RAW -==================== - -.. -.. data:: ENCTYPE_DES3_CBC_RAW -.. - - - - -=========================== ====================== -``ENCTYPE_DES3_CBC_RAW`` ``0x0006`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_SHA.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_SHA.rst.txt deleted file mode 100644 index 3d14182b8002..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_SHA.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-DES3-CBC-SHA-data: - -ENCTYPE_DES3_CBC_SHA -==================== - -.. -.. data:: ENCTYPE_DES3_CBC_SHA -.. - - - - -=========================== ====================== -``ENCTYPE_DES3_CBC_SHA`` ``0x0005`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_SHA1.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_SHA1.rst.txt deleted file mode 100644 index 6ad9a1850839..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES3_CBC_SHA1.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-DES3-CBC-SHA1-data: - -ENCTYPE_DES3_CBC_SHA1 -===================== - -.. -.. data:: ENCTYPE_DES3_CBC_SHA1 -.. - - - - -============================ ====================== -``ENCTYPE_DES3_CBC_SHA1`` ``0x0010`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_CRC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_CRC.rst.txt deleted file mode 100644 index a442821ba171..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_CRC.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-DES-CBC-CRC-data: - -ENCTYPE_DES_CBC_CRC -=================== - -.. -.. data:: ENCTYPE_DES_CBC_CRC -.. - - - - -========================== ====================== -``ENCTYPE_DES_CBC_CRC`` ``0x0001`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_MD4.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_MD4.rst.txt deleted file mode 100644 index 2b227deb8a59..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_MD4.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-DES-CBC-MD4-data: - -ENCTYPE_DES_CBC_MD4 -=================== - -.. -.. data:: ENCTYPE_DES_CBC_MD4 -.. - - - - -========================== ====================== -``ENCTYPE_DES_CBC_MD4`` ``0x0002`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_MD5.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_MD5.rst.txt deleted file mode 100644 index d4edca906e18..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_MD5.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-DES-CBC-MD5-data: - -ENCTYPE_DES_CBC_MD5 -=================== - -.. -.. data:: ENCTYPE_DES_CBC_MD5 -.. - - - - -========================== ====================== -``ENCTYPE_DES_CBC_MD5`` ``0x0003`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_RAW.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_RAW.rst.txt deleted file mode 100644 index e3de8120618a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_CBC_RAW.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-DES-CBC-RAW-data: - -ENCTYPE_DES_CBC_RAW -=================== - -.. -.. data:: ENCTYPE_DES_CBC_RAW -.. - - - - -========================== ====================== -``ENCTYPE_DES_CBC_RAW`` ``0x0004`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_HMAC_SHA1.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_HMAC_SHA1.rst.txt deleted file mode 100644 index 9494faed89da..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DES_HMAC_SHA1.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-DES-HMAC-SHA1-data: - -ENCTYPE_DES_HMAC_SHA1 -===================== - -.. -.. data:: ENCTYPE_DES_HMAC_SHA1 -.. - - - - -============================ ====================== -``ENCTYPE_DES_HMAC_SHA1`` ``0x0008`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DSA_SHA1_CMS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DSA_SHA1_CMS.rst.txt deleted file mode 100644 index fca77e48c770..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_DSA_SHA1_CMS.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-DSA-SHA1-CMS-data: - -ENCTYPE_DSA_SHA1_CMS -==================== - -.. -.. data:: ENCTYPE_DSA_SHA1_CMS -.. - -DSA with SHA1, CMS signature. - - - -=========================== ====================== -``ENCTYPE_DSA_SHA1_CMS`` ``0x0009`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_MD5_RSA_CMS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_MD5_RSA_CMS.rst.txt deleted file mode 100644 index 5d4cc6b55985..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_MD5_RSA_CMS.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-MD5-RSA-CMS-data: - -ENCTYPE_MD5_RSA_CMS -=================== - -.. -.. data:: ENCTYPE_MD5_RSA_CMS -.. - -MD5 with RSA, CMS signature. - - - -========================== ====================== -``ENCTYPE_MD5_RSA_CMS`` ``0x000a`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_NULL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_NULL.rst.txt deleted file mode 100644 index 1a62c065c2e2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_NULL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-NULL-data: - -ENCTYPE_NULL -============ - -.. -.. data:: ENCTYPE_NULL -.. - - - - -=================== ====================== -``ENCTYPE_NULL`` ``0x0000`` -=================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_RC2_CBC_ENV.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_RC2_CBC_ENV.rst.txt deleted file mode 100644 index 3dc732bb0d5f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_RC2_CBC_ENV.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-RC2-CBC-ENV-data: - -ENCTYPE_RC2_CBC_ENV -=================== - -.. -.. data:: ENCTYPE_RC2_CBC_ENV -.. - -RC2 cbc mode, CMS enveloped data. - - - -========================== ====================== -``ENCTYPE_RC2_CBC_ENV`` ``0x000c`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_RSA_ENV.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_RSA_ENV.rst.txt deleted file mode 100644 index 0f0657160045..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_RSA_ENV.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-RSA-ENV-data: - -ENCTYPE_RSA_ENV -=============== - -.. -.. data:: ENCTYPE_RSA_ENV -.. - -RSA encryption, CMS enveloped data. - - - -====================== ====================== -``ENCTYPE_RSA_ENV`` ``0x000d`` -====================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_RSA_ES_OAEP_ENV.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_RSA_ES_OAEP_ENV.rst.txt deleted file mode 100644 index 1d7cfc0d7c1d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_RSA_ES_OAEP_ENV.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-RSA-ES-OAEP-ENV-data: - -ENCTYPE_RSA_ES_OAEP_ENV -======================= - -.. -.. data:: ENCTYPE_RSA_ES_OAEP_ENV -.. - -RSA w/OEAP encryption, CMS enveloped data. - - - -============================== ====================== -``ENCTYPE_RSA_ES_OAEP_ENV`` ``0x000e`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_SHA1_RSA_CMS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_SHA1_RSA_CMS.rst.txt deleted file mode 100644 index a8cfe754d746..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_SHA1_RSA_CMS.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-SHA1-RSA-CMS-data: - -ENCTYPE_SHA1_RSA_CMS -==================== - -.. -.. data:: ENCTYPE_SHA1_RSA_CMS -.. - -SHA1 with RSA, CMS signature. - - - -=========================== ====================== -``ENCTYPE_SHA1_RSA_CMS`` ``0x000b`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_UNKNOWN.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_UNKNOWN.rst.txt deleted file mode 100644 index 44f868795574..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/ENCTYPE_UNKNOWN.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _ENCTYPE-UNKNOWN-data: - -ENCTYPE_UNKNOWN -=============== - -.. -.. data:: ENCTYPE_UNKNOWN -.. - - - - -====================== ====================== -``ENCTYPE_UNKNOWN`` ``0x01ff`` -====================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_ALLOW_POSTDATE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_ALLOW_POSTDATE.rst.txt deleted file mode 100644 index 64508eebc898..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_ALLOW_POSTDATE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-ALLOW-POSTDATE-data: - -KDC_OPT_ALLOW_POSTDATE -====================== - -.. -.. data:: KDC_OPT_ALLOW_POSTDATE -.. - - - - -============================= ====================== -``KDC_OPT_ALLOW_POSTDATE`` ``0x04000000`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_CANONICALIZE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_CANONICALIZE.rst.txt deleted file mode 100644 index 05f20bdce615..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_CANONICALIZE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-CANONICALIZE-data: - -KDC_OPT_CANONICALIZE -==================== - -.. -.. data:: KDC_OPT_CANONICALIZE -.. - - - - -=========================== ====================== -``KDC_OPT_CANONICALIZE`` ``0x00010000`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_CNAME_IN_ADDL_TKT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_CNAME_IN_ADDL_TKT.rst.txt deleted file mode 100644 index bf9a9717c246..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_CNAME_IN_ADDL_TKT.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-CNAME-IN-ADDL-TKT-data: - -KDC_OPT_CNAME_IN_ADDL_TKT -========================= - -.. -.. data:: KDC_OPT_CNAME_IN_ADDL_TKT -.. - - - - -================================ ====================== -``KDC_OPT_CNAME_IN_ADDL_TKT`` ``0x00020000`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_DISABLE_TRANSITED_CHECK.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_DISABLE_TRANSITED_CHECK.rst.txt deleted file mode 100644 index c0ac52944079..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_DISABLE_TRANSITED_CHECK.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-DISABLE-TRANSITED-CHECK-data: - -KDC_OPT_DISABLE_TRANSITED_CHECK -=============================== - -.. -.. data:: KDC_OPT_DISABLE_TRANSITED_CHECK -.. - - - - -====================================== ====================== -``KDC_OPT_DISABLE_TRANSITED_CHECK`` ``0x00000020`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_ENC_TKT_IN_SKEY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_ENC_TKT_IN_SKEY.rst.txt deleted file mode 100644 index ca72eccdef2d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_ENC_TKT_IN_SKEY.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-ENC-TKT-IN-SKEY-data: - -KDC_OPT_ENC_TKT_IN_SKEY -======================= - -.. -.. data:: KDC_OPT_ENC_TKT_IN_SKEY -.. - - - - -============================== ====================== -``KDC_OPT_ENC_TKT_IN_SKEY`` ``0x00000008`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_FORWARDABLE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_FORWARDABLE.rst.txt deleted file mode 100644 index 171ea0020a7c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_FORWARDABLE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-FORWARDABLE-data: - -KDC_OPT_FORWARDABLE -=================== - -.. -.. data:: KDC_OPT_FORWARDABLE -.. - - - - -========================== ====================== -``KDC_OPT_FORWARDABLE`` ``0x40000000`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_FORWARDED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_FORWARDED.rst.txt deleted file mode 100644 index ddfd30c8823e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_FORWARDED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-FORWARDED-data: - -KDC_OPT_FORWARDED -================= - -.. -.. data:: KDC_OPT_FORWARDED -.. - - - - -======================== ====================== -``KDC_OPT_FORWARDED`` ``0x20000000`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_POSTDATED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_POSTDATED.rst.txt deleted file mode 100644 index a6af6435103f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_POSTDATED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-POSTDATED-data: - -KDC_OPT_POSTDATED -================= - -.. -.. data:: KDC_OPT_POSTDATED -.. - - - - -======================== ====================== -``KDC_OPT_POSTDATED`` ``0x02000000`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_PROXIABLE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_PROXIABLE.rst.txt deleted file mode 100644 index 5a87454761b2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_PROXIABLE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-PROXIABLE-data: - -KDC_OPT_PROXIABLE -================= - -.. -.. data:: KDC_OPT_PROXIABLE -.. - - - - -======================== ====================== -``KDC_OPT_PROXIABLE`` ``0x10000000`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_PROXY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_PROXY.rst.txt deleted file mode 100644 index 64c4f0ae33f4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_PROXY.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-PROXY-data: - -KDC_OPT_PROXY -============= - -.. -.. data:: KDC_OPT_PROXY -.. - - - - -==================== ====================== -``KDC_OPT_PROXY`` ``0x08000000`` -==================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_RENEW.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_RENEW.rst.txt deleted file mode 100644 index 23e48761ea36..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_RENEW.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-RENEW-data: - -KDC_OPT_RENEW -============= - -.. -.. data:: KDC_OPT_RENEW -.. - - - - -==================== ====================== -``KDC_OPT_RENEW`` ``0x00000002`` -==================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_RENEWABLE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_RENEWABLE.rst.txt deleted file mode 100644 index d7f13ca530cc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_RENEWABLE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-RENEWABLE-data: - -KDC_OPT_RENEWABLE -================= - -.. -.. data:: KDC_OPT_RENEWABLE -.. - - - - -======================== ====================== -``KDC_OPT_RENEWABLE`` ``0x00800000`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_RENEWABLE_OK.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_RENEWABLE_OK.rst.txt deleted file mode 100644 index 0d082e1ab6bf..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_RENEWABLE_OK.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-RENEWABLE-OK-data: - -KDC_OPT_RENEWABLE_OK -==================== - -.. -.. data:: KDC_OPT_RENEWABLE_OK -.. - - - - -=========================== ====================== -``KDC_OPT_RENEWABLE_OK`` ``0x00000010`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_REQUEST_ANONYMOUS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_REQUEST_ANONYMOUS.rst.txt deleted file mode 100644 index 7a14ec6eb1d2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_REQUEST_ANONYMOUS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-REQUEST-ANONYMOUS-data: - -KDC_OPT_REQUEST_ANONYMOUS -========================= - -.. -.. data:: KDC_OPT_REQUEST_ANONYMOUS -.. - - - - -================================ ====================== -``KDC_OPT_REQUEST_ANONYMOUS`` ``0x00008000`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_VALIDATE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_VALIDATE.rst.txt deleted file mode 100644 index 666beccbaff3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_OPT_VALIDATE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-OPT-VALIDATE-data: - -KDC_OPT_VALIDATE -================ - -.. -.. data:: KDC_OPT_VALIDATE -.. - - - - -======================= ====================== -``KDC_OPT_VALIDATE`` ``0x00000001`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_TKT_COMMON_MASK.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_TKT_COMMON_MASK.rst.txt deleted file mode 100644 index e2cb96038c58..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KDC_TKT_COMMON_MASK.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KDC-TKT-COMMON-MASK-data: - -KDC_TKT_COMMON_MASK -=================== - -.. -.. data:: KDC_TKT_COMMON_MASK -.. - - - - -========================== ====================== -``KDC_TKT_COMMON_MASK`` ``0x54800000`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ALTAUTH_ATT_CHALLENGE_RESPONSE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ALTAUTH_ATT_CHALLENGE_RESPONSE.rst.txt deleted file mode 100644 index ddc0ea0e7cdc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ALTAUTH_ATT_CHALLENGE_RESPONSE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-ALTAUTH-ATT-CHALLENGE-RESPONSE-data: - -KRB5_ALTAUTH_ATT_CHALLENGE_RESPONSE -=================================== - -.. -.. data:: KRB5_ALTAUTH_ATT_CHALLENGE_RESPONSE -.. - -alternate authentication types - - - -========================================== ====================== -``KRB5_ALTAUTH_ATT_CHALLENGE_RESPONSE`` ``64`` -========================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ANONYMOUS_PRINCSTR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ANONYMOUS_PRINCSTR.rst.txt deleted file mode 100644 index 1d1644e3ad05..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ANONYMOUS_PRINCSTR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-ANONYMOUS-PRINCSTR-data: - -KRB5_ANONYMOUS_PRINCSTR -======================= - -.. -.. data:: KRB5_ANONYMOUS_PRINCSTR -.. - -Anonymous principal name. - - - -============================== ====================== -``KRB5_ANONYMOUS_PRINCSTR`` ``"ANONYMOUS"`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ANONYMOUS_REALMSTR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ANONYMOUS_REALMSTR.rst.txt deleted file mode 100644 index e9ab94d0765a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ANONYMOUS_REALMSTR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-ANONYMOUS-REALMSTR-data: - -KRB5_ANONYMOUS_REALMSTR -======================= - -.. -.. data:: KRB5_ANONYMOUS_REALMSTR -.. - -Anonymous realm. - - - -============================== ====================== -``KRB5_ANONYMOUS_REALMSTR`` ``"WELLKNOWN:ANONYMOUS"`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AP_REP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AP_REP.rst.txt deleted file mode 100644 index 4e50adf48475..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AP_REP.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AP-REP-data: - -KRB5_AP_REP -=========== - -.. -.. data:: KRB5_AP_REP -.. - -Response to mutual AP request. - - - -================== ====================== -``KRB5_AP_REP`` ``((krb5_msgtype)15)`` -================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AP_REQ.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AP_REQ.rst.txt deleted file mode 100644 index e92d37ea0f5d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AP_REQ.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AP-REQ-data: - -KRB5_AP_REQ -=========== - -.. -.. data:: KRB5_AP_REQ -.. - -Auth req to application server. - - - -================== ====================== -``KRB5_AP_REQ`` ``((krb5_msgtype)14)`` -================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AS_REP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AS_REP.rst.txt deleted file mode 100644 index 69eb704144b6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AS_REP.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AS-REP-data: - -KRB5_AS_REP -=========== - -.. -.. data:: KRB5_AS_REP -.. - -Response to AS request. - - - -================== ====================== -``KRB5_AS_REP`` ``((krb5_msgtype)11)`` -================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AS_REQ.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AS_REQ.rst.txt deleted file mode 100644 index 8550106328fd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AS_REQ.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AS-REQ-data: - -KRB5_AS_REQ -=========== - -.. -.. data:: KRB5_AS_REQ -.. - -Initial authentication request. - - - -================== ====================== -``KRB5_AS_REQ`` ``((krb5_msgtype)10)`` -================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_AND_OR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_AND_OR.rst.txt deleted file mode 100644 index a1abcbd28407..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_AND_OR.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-AND-OR-data: - -KRB5_AUTHDATA_AND_OR -==================== - -.. -.. data:: KRB5_AUTHDATA_AND_OR -.. - - - - -=========================== ====================== -``KRB5_AUTHDATA_AND_OR`` ``5`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_AP_OPTIONS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_AP_OPTIONS.rst.txt deleted file mode 100644 index 879702525e55..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_AP_OPTIONS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-AP-OPTIONS-data: - -KRB5_AUTHDATA_AP_OPTIONS -======================== - -.. -.. data:: KRB5_AUTHDATA_AP_OPTIONS -.. - - - - -=============================== ====================== -``KRB5_AUTHDATA_AP_OPTIONS`` ``143`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_AUTH_INDICATOR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_AUTH_INDICATOR.rst.txt deleted file mode 100644 index ae1178ea6aba..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_AUTH_INDICATOR.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-AUTH-INDICATOR-data: - -KRB5_AUTHDATA_AUTH_INDICATOR -============================ - -.. -.. data:: KRB5_AUTHDATA_AUTH_INDICATOR -.. - - - - -=================================== ====================== -``KRB5_AUTHDATA_AUTH_INDICATOR`` ``97`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_CAMMAC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_CAMMAC.rst.txt deleted file mode 100644 index e6a239eaac7a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_CAMMAC.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-CAMMAC-data: - -KRB5_AUTHDATA_CAMMAC -==================== - -.. -.. data:: KRB5_AUTHDATA_CAMMAC -.. - - - - -=========================== ====================== -``KRB5_AUTHDATA_CAMMAC`` ``96`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_ETYPE_NEGOTIATION.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_ETYPE_NEGOTIATION.rst.txt deleted file mode 100644 index 04621391b69c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_ETYPE_NEGOTIATION.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-ETYPE-NEGOTIATION-data: - -KRB5_AUTHDATA_ETYPE_NEGOTIATION -=============================== - -.. -.. data:: KRB5_AUTHDATA_ETYPE_NEGOTIATION -.. - -RFC 4537. - - - -====================================== ====================== -``KRB5_AUTHDATA_ETYPE_NEGOTIATION`` ``129`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_FX_ARMOR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_FX_ARMOR.rst.txt deleted file mode 100644 index 1982e8356014..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_FX_ARMOR.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-FX-ARMOR-data: - -KRB5_AUTHDATA_FX_ARMOR -====================== - -.. -.. data:: KRB5_AUTHDATA_FX_ARMOR -.. - - - - -============================= ====================== -``KRB5_AUTHDATA_FX_ARMOR`` ``71`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_IF_RELEVANT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_IF_RELEVANT.rst.txt deleted file mode 100644 index ff0b24399ed4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_IF_RELEVANT.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-IF-RELEVANT-data: - -KRB5_AUTHDATA_IF_RELEVANT -========================= - -.. -.. data:: KRB5_AUTHDATA_IF_RELEVANT -.. - - - - -================================ ====================== -``KRB5_AUTHDATA_IF_RELEVANT`` ``1`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_INITIAL_VERIFIED_CAS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_INITIAL_VERIFIED_CAS.rst.txt deleted file mode 100644 index 5e76101c2e09..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_INITIAL_VERIFIED_CAS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-INITIAL-VERIFIED-CAS-data: - -KRB5_AUTHDATA_INITIAL_VERIFIED_CAS -================================== - -.. -.. data:: KRB5_AUTHDATA_INITIAL_VERIFIED_CAS -.. - - - - -========================================= ====================== -``KRB5_AUTHDATA_INITIAL_VERIFIED_CAS`` ``9`` -========================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_KDC_ISSUED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_KDC_ISSUED.rst.txt deleted file mode 100644 index e566040c3811..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_KDC_ISSUED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-KDC-ISSUED-data: - -KRB5_AUTHDATA_KDC_ISSUED -======================== - -.. -.. data:: KRB5_AUTHDATA_KDC_ISSUED -.. - - - - -=============================== ====================== -``KRB5_AUTHDATA_KDC_ISSUED`` ``4`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_MANDATORY_FOR_KDC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_MANDATORY_FOR_KDC.rst.txt deleted file mode 100644 index 50eacee7bd6e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_MANDATORY_FOR_KDC.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-MANDATORY-FOR-KDC-data: - -KRB5_AUTHDATA_MANDATORY_FOR_KDC -=============================== - -.. -.. data:: KRB5_AUTHDATA_MANDATORY_FOR_KDC -.. - - - - -====================================== ====================== -``KRB5_AUTHDATA_MANDATORY_FOR_KDC`` ``8`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_OSF_DCE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_OSF_DCE.rst.txt deleted file mode 100644 index a545b9facd69..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_OSF_DCE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-OSF-DCE-data: - -KRB5_AUTHDATA_OSF_DCE -===================== - -.. -.. data:: KRB5_AUTHDATA_OSF_DCE -.. - - - - -============================ ====================== -``KRB5_AUTHDATA_OSF_DCE`` ``64`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_SESAME.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_SESAME.rst.txt deleted file mode 100644 index c21e3a11d551..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_SESAME.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-SESAME-data: - -KRB5_AUTHDATA_SESAME -==================== - -.. -.. data:: KRB5_AUTHDATA_SESAME -.. - - - - -=========================== ====================== -``KRB5_AUTHDATA_SESAME`` ``65`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_SIGNTICKET.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_SIGNTICKET.rst.txt deleted file mode 100644 index cff5f6f7efcd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_SIGNTICKET.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-SIGNTICKET-data: - -KRB5_AUTHDATA_SIGNTICKET -======================== - -.. -.. data:: KRB5_AUTHDATA_SIGNTICKET -.. - - - - -=============================== ====================== -``KRB5_AUTHDATA_SIGNTICKET`` ``512`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_WIN2K_PAC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_WIN2K_PAC.rst.txt deleted file mode 100644 index b7ecde0bc933..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTHDATA_WIN2K_PAC.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTHDATA-WIN2K-PAC-data: - -KRB5_AUTHDATA_WIN2K_PAC -======================= - -.. -.. data:: KRB5_AUTHDATA_WIN2K_PAC -.. - - - - -============================== ====================== -``KRB5_AUTHDATA_WIN2K_PAC`` ``128`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_DO_SEQUENCE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_DO_SEQUENCE.rst.txt deleted file mode 100644 index b0e214c15a5e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_DO_SEQUENCE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTH-CONTEXT-DO-SEQUENCE-data: - -KRB5_AUTH_CONTEXT_DO_SEQUENCE -============================= - -.. -.. data:: KRB5_AUTH_CONTEXT_DO_SEQUENCE -.. - -Prevent replays with sequence numbers. - - - -==================================== ====================== -``KRB5_AUTH_CONTEXT_DO_SEQUENCE`` ``0x00000004`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_DO_TIME.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_DO_TIME.rst.txt deleted file mode 100644 index 09815b7bd28a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_DO_TIME.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTH-CONTEXT-DO-TIME-data: - -KRB5_AUTH_CONTEXT_DO_TIME -========================= - -.. -.. data:: KRB5_AUTH_CONTEXT_DO_TIME -.. - -Prevent replays with timestamps and replay cache. - - - -================================ ====================== -``KRB5_AUTH_CONTEXT_DO_TIME`` ``0x00000001`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR.rst.txt deleted file mode 100644 index 16a15cff2720..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTH-CONTEXT-GENERATE-LOCAL-ADDR-data: - -KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR -===================================== - -.. -.. data:: KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR -.. - -Generate the local network address. - - - -============================================ ====================== -``KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR`` ``0x00000001`` -============================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR.rst.txt deleted file mode 100644 index b74824f0fe72..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTH-CONTEXT-GENERATE-LOCAL-FULL-ADDR-data: - -KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR -========================================== - -.. -.. data:: KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR -.. - -Generate the local network address and the local port. - - - -================================================= ====================== -``KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR`` ``0x00000004`` -================================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR.rst.txt deleted file mode 100644 index d8ee93bd350d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTH-CONTEXT-GENERATE-REMOTE-ADDR-data: - -KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR -====================================== - -.. -.. data:: KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR -.. - -Generate the remote network address. - - - -============================================= ====================== -``KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR`` ``0x00000002`` -============================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR.rst.txt deleted file mode 100644 index a70428abebee..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTH-CONTEXT-GENERATE-REMOTE-FULL-ADDR-data: - -KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR -=========================================== - -.. -.. data:: KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR -.. - -Generate the remote network address and the remote port. - - - -================================================== ====================== -``KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR`` ``0x00000008`` -================================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_PERMIT_ALL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_PERMIT_ALL.rst.txt deleted file mode 100644 index 7ed17e797851..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_PERMIT_ALL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTH-CONTEXT-PERMIT-ALL-data: - -KRB5_AUTH_CONTEXT_PERMIT_ALL -============================ - -.. -.. data:: KRB5_AUTH_CONTEXT_PERMIT_ALL -.. - - - - -=================================== ====================== -``KRB5_AUTH_CONTEXT_PERMIT_ALL`` ``0x00000010`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_RET_SEQUENCE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_RET_SEQUENCE.rst.txt deleted file mode 100644 index d9e67d663f17..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_RET_SEQUENCE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTH-CONTEXT-RET-SEQUENCE-data: - -KRB5_AUTH_CONTEXT_RET_SEQUENCE -============================== - -.. -.. data:: KRB5_AUTH_CONTEXT_RET_SEQUENCE -.. - -Save sequence numbers for application. - - - -===================================== ====================== -``KRB5_AUTH_CONTEXT_RET_SEQUENCE`` ``0x00000008`` -===================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_RET_TIME.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_RET_TIME.rst.txt deleted file mode 100644 index bebc83d92edd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_RET_TIME.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTH-CONTEXT-RET-TIME-data: - -KRB5_AUTH_CONTEXT_RET_TIME -========================== - -.. -.. data:: KRB5_AUTH_CONTEXT_RET_TIME -.. - -Save timestamps for application. - - - -================================= ====================== -``KRB5_AUTH_CONTEXT_RET_TIME`` ``0x00000002`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_USE_SUBKEY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_USE_SUBKEY.rst.txt deleted file mode 100644 index 481e75578486..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_AUTH_CONTEXT_USE_SUBKEY.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-AUTH-CONTEXT-USE-SUBKEY-data: - -KRB5_AUTH_CONTEXT_USE_SUBKEY -============================ - -.. -.. data:: KRB5_AUTH_CONTEXT_USE_SUBKEY -.. - - - - -=================================== ====================== -``KRB5_AUTH_CONTEXT_USE_SUBKEY`` ``0x00000020`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRED.rst.txt deleted file mode 100644 index f4cb55e759a0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRED.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-CRED-data: - -KRB5_CRED -========= - -.. -.. data:: KRB5_CRED -.. - -Cred forwarding message. - - - -================ ====================== -``KRB5_CRED`` ``((krb5_msgtype)22)`` -================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_CHECKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_CHECKSUM.rst.txt deleted file mode 100644 index f882f79b6313..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_CHECKSUM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-CRYPTO-TYPE-CHECKSUM-data: - -KRB5_CRYPTO_TYPE_CHECKSUM -========================= - -.. -.. data:: KRB5_CRYPTO_TYPE_CHECKSUM -.. - -[out] checksum for MIC - - - -================================ ====================== -``KRB5_CRYPTO_TYPE_CHECKSUM`` ``6`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_DATA.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_DATA.rst.txt deleted file mode 100644 index 2dd2ea41f8e9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_DATA.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-CRYPTO-TYPE-DATA-data: - -KRB5_CRYPTO_TYPE_DATA -===================== - -.. -.. data:: KRB5_CRYPTO_TYPE_DATA -.. - -[in, out] plaintext - - - -============================ ====================== -``KRB5_CRYPTO_TYPE_DATA`` ``2`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_EMPTY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_EMPTY.rst.txt deleted file mode 100644 index dab70ced68c6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_EMPTY.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-CRYPTO-TYPE-EMPTY-data: - -KRB5_CRYPTO_TYPE_EMPTY -====================== - -.. -.. data:: KRB5_CRYPTO_TYPE_EMPTY -.. - -[in] ignored - - - -============================= ====================== -``KRB5_CRYPTO_TYPE_EMPTY`` ``0`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_HEADER.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_HEADER.rst.txt deleted file mode 100644 index a3263c24a9b9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_HEADER.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-CRYPTO-TYPE-HEADER-data: - -KRB5_CRYPTO_TYPE_HEADER -======================= - -.. -.. data:: KRB5_CRYPTO_TYPE_HEADER -.. - -[out] header - - - -============================== ====================== -``KRB5_CRYPTO_TYPE_HEADER`` ``1`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_PADDING.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_PADDING.rst.txt deleted file mode 100644 index 44d507289cb5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_PADDING.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-CRYPTO-TYPE-PADDING-data: - -KRB5_CRYPTO_TYPE_PADDING -======================== - -.. -.. data:: KRB5_CRYPTO_TYPE_PADDING -.. - -[out] padding - - - -=============================== ====================== -``KRB5_CRYPTO_TYPE_PADDING`` ``4`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_SIGN_ONLY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_SIGN_ONLY.rst.txt deleted file mode 100644 index a8b9f8a8e480..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_SIGN_ONLY.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-CRYPTO-TYPE-SIGN-ONLY-data: - -KRB5_CRYPTO_TYPE_SIGN_ONLY -========================== - -.. -.. data:: KRB5_CRYPTO_TYPE_SIGN_ONLY -.. - -[in] associated data - - - -================================= ====================== -``KRB5_CRYPTO_TYPE_SIGN_ONLY`` ``3`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_STREAM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_STREAM.rst.txt deleted file mode 100644 index e58f68255c70..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_STREAM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-CRYPTO-TYPE-STREAM-data: - -KRB5_CRYPTO_TYPE_STREAM -======================= - -.. -.. data:: KRB5_CRYPTO_TYPE_STREAM -.. - -[in] entire message without decomposing the structure into header, data and trailer buffers - - - -============================== ====================== -``KRB5_CRYPTO_TYPE_STREAM`` ``7`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_TRAILER.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_TRAILER.rst.txt deleted file mode 100644 index bf78ea02d6c8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CRYPTO_TYPE_TRAILER.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-CRYPTO-TYPE-TRAILER-data: - -KRB5_CRYPTO_TYPE_TRAILER -======================== - -.. -.. data:: KRB5_CRYPTO_TYPE_TRAILER -.. - -[out] checksum for encrypt - - - -=============================== ====================== -``KRB5_CRYPTO_TYPE_TRAILER`` ``5`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CYBERSAFE_SECUREID.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CYBERSAFE_SECUREID.rst.txt deleted file mode 100644 index 0b79861b38ab..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_CYBERSAFE_SECUREID.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-CYBERSAFE-SECUREID-data: - -KRB5_CYBERSAFE_SECUREID -======================= - -.. -.. data:: KRB5_CYBERSAFE_SECUREID -.. - -Cybersafe. - -RFC 4120 - -============================== ====================== -``KRB5_CYBERSAFE_SECUREID`` ``9`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_DOMAIN_X500_COMPRESS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_DOMAIN_X500_COMPRESS.rst.txt deleted file mode 100644 index 7bf71f8f8b8f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_DOMAIN_X500_COMPRESS.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-DOMAIN-X500-COMPRESS-data: - -KRB5_DOMAIN_X500_COMPRESS -========================= - -.. -.. data:: KRB5_DOMAIN_X500_COMPRESS -.. - -Transited encoding types. - - - -================================ ====================== -``KRB5_DOMAIN_X500_COMPRESS`` ``1`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ENCPADATA_REQ_ENC_PA_REP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ENCPADATA_REQ_ENC_PA_REP.rst.txt deleted file mode 100644 index fe828898b3d1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ENCPADATA_REQ_ENC_PA_REP.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-ENCPADATA-REQ-ENC-PA-REP-data: - -KRB5_ENCPADATA_REQ_ENC_PA_REP -============================= - -.. -.. data:: KRB5_ENCPADATA_REQ_ENC_PA_REP -.. - -RFC 6806. - - - -==================================== ====================== -``KRB5_ENCPADATA_REQ_ENC_PA_REP`` ``149`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ERROR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ERROR.rst.txt deleted file mode 100644 index 901f94520492..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_ERROR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-ERROR-data: - -KRB5_ERROR -========== - -.. -.. data:: KRB5_ERROR -.. - -Error response. - - - -================= ====================== -``KRB5_ERROR`` ``((krb5_msgtype)30)`` -================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_FAST_REQUIRED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_FAST_REQUIRED.rst.txt deleted file mode 100644 index 936423d2c5ea..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_FAST_REQUIRED.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-FAST-REQUIRED-data: - -KRB5_FAST_REQUIRED -================== - -.. -.. data:: KRB5_FAST_REQUIRED -.. - -Require KDC to support FAST. - - - -========================= ====================== -``KRB5_FAST_REQUIRED`` ``0x0001`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_CACHED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_CACHED.rst.txt deleted file mode 100644 index df1e7e5f24bd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_CACHED.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-GC-CACHED-data: - -KRB5_GC_CACHED -============== - -.. -.. data:: KRB5_GC_CACHED -.. - -Want cached ticket only. - - - -===================== ====================== -``KRB5_GC_CACHED`` ``2`` -===================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_CANONICALIZE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_CANONICALIZE.rst.txt deleted file mode 100644 index 93ea301ba393..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_CANONICALIZE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-GC-CANONICALIZE-data: - -KRB5_GC_CANONICALIZE -==================== - -.. -.. data:: KRB5_GC_CANONICALIZE -.. - -Set canonicalize KDC option. - - - -=========================== ====================== -``KRB5_GC_CANONICALIZE`` ``4`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_CONSTRAINED_DELEGATION.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_CONSTRAINED_DELEGATION.rst.txt deleted file mode 100644 index 3a3ed03a7050..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_CONSTRAINED_DELEGATION.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-GC-CONSTRAINED-DELEGATION-data: - -KRB5_GC_CONSTRAINED_DELEGATION -============================== - -.. -.. data:: KRB5_GC_CONSTRAINED_DELEGATION -.. - -Constrained delegation. - - - -===================================== ====================== -``KRB5_GC_CONSTRAINED_DELEGATION`` ``64`` -===================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_FORWARDABLE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_FORWARDABLE.rst.txt deleted file mode 100644 index 0fbe57a9f353..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_FORWARDABLE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-GC-FORWARDABLE-data: - -KRB5_GC_FORWARDABLE -=================== - -.. -.. data:: KRB5_GC_FORWARDABLE -.. - -Acquire forwardable tickets. - - - -========================== ====================== -``KRB5_GC_FORWARDABLE`` ``16`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_NO_STORE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_NO_STORE.rst.txt deleted file mode 100644 index 1640bc299485..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_NO_STORE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-GC-NO-STORE-data: - -KRB5_GC_NO_STORE -================ - -.. -.. data:: KRB5_GC_NO_STORE -.. - -Do not store in credential cache. - - - -======================= ====================== -``KRB5_GC_NO_STORE`` ``8`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_NO_TRANSIT_CHECK.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_NO_TRANSIT_CHECK.rst.txt deleted file mode 100644 index da1b5cd7bb96..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_NO_TRANSIT_CHECK.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-GC-NO-TRANSIT-CHECK-data: - -KRB5_GC_NO_TRANSIT_CHECK -======================== - -.. -.. data:: KRB5_GC_NO_TRANSIT_CHECK -.. - -Disable transited check. - - - -=============================== ====================== -``KRB5_GC_NO_TRANSIT_CHECK`` ``32`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_USER_USER.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_USER_USER.rst.txt deleted file mode 100644 index 2fc073f8da10..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GC_USER_USER.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-GC-USER-USER-data: - -KRB5_GC_USER_USER -================= - -.. -.. data:: KRB5_GC_USER_USER -.. - -Want user-user ticket. - - - -======================== ====================== -``KRB5_GC_USER_USER`` ``1`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_ADDRESS_LIST.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_ADDRESS_LIST.rst.txt deleted file mode 100644 index d0ae5fb98478..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_ADDRESS_LIST.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-GET-INIT-CREDS-OPT-ADDRESS-LIST-data: - -KRB5_GET_INIT_CREDS_OPT_ADDRESS_LIST -==================================== - -.. -.. data:: KRB5_GET_INIT_CREDS_OPT_ADDRESS_LIST -.. - - - - -=========================================== ====================== -``KRB5_GET_INIT_CREDS_OPT_ADDRESS_LIST`` ``0x0020`` -=========================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_ANONYMOUS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_ANONYMOUS.rst.txt deleted file mode 100644 index 2f4281ee7f46..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_ANONYMOUS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-GET-INIT-CREDS-OPT-ANONYMOUS-data: - -KRB5_GET_INIT_CREDS_OPT_ANONYMOUS -================================= - -.. -.. data:: KRB5_GET_INIT_CREDS_OPT_ANONYMOUS -.. - - - - -======================================== ====================== -``KRB5_GET_INIT_CREDS_OPT_ANONYMOUS`` ``0x0400`` -======================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_CANONICALIZE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_CANONICALIZE.rst.txt deleted file mode 100644 index 921c873044aa..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_CANONICALIZE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-GET-INIT-CREDS-OPT-CANONICALIZE-data: - -KRB5_GET_INIT_CREDS_OPT_CANONICALIZE -==================================== - -.. -.. data:: KRB5_GET_INIT_CREDS_OPT_CANONICALIZE -.. - - - - -=========================================== ====================== -``KRB5_GET_INIT_CREDS_OPT_CANONICALIZE`` ``0x0200`` -=========================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_CHG_PWD_PRMPT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_CHG_PWD_PRMPT.rst.txt deleted file mode 100644 index 5182abf85c1d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_CHG_PWD_PRMPT.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-GET-INIT-CREDS-OPT-CHG-PWD-PRMPT-data: - -KRB5_GET_INIT_CREDS_OPT_CHG_PWD_PRMPT -===================================== - -.. -.. data:: KRB5_GET_INIT_CREDS_OPT_CHG_PWD_PRMPT -.. - - - - -============================================ ====================== -``KRB5_GET_INIT_CREDS_OPT_CHG_PWD_PRMPT`` ``0x0100`` -============================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_ETYPE_LIST.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_ETYPE_LIST.rst.txt deleted file mode 100644 index 975417affeb1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_ETYPE_LIST.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-GET-INIT-CREDS-OPT-ETYPE-LIST-data: - -KRB5_GET_INIT_CREDS_OPT_ETYPE_LIST -================================== - -.. -.. data:: KRB5_GET_INIT_CREDS_OPT_ETYPE_LIST -.. - - - - -========================================= ====================== -``KRB5_GET_INIT_CREDS_OPT_ETYPE_LIST`` ``0x0010`` -========================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_FORWARDABLE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_FORWARDABLE.rst.txt deleted file mode 100644 index 8946b555bc60..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_FORWARDABLE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-GET-INIT-CREDS-OPT-FORWARDABLE-data: - -KRB5_GET_INIT_CREDS_OPT_FORWARDABLE -=================================== - -.. -.. data:: KRB5_GET_INIT_CREDS_OPT_FORWARDABLE -.. - - - - -========================================== ====================== -``KRB5_GET_INIT_CREDS_OPT_FORWARDABLE`` ``0x0004`` -========================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST.rst.txt deleted file mode 100644 index 023783c61926..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-GET-INIT-CREDS-OPT-PREAUTH-LIST-data: - -KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST -==================================== - -.. -.. data:: KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST -.. - - - - -=========================================== ====================== -``KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST`` ``0x0040`` -=========================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_PROXIABLE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_PROXIABLE.rst.txt deleted file mode 100644 index 5cb3217f4a97..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_PROXIABLE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-GET-INIT-CREDS-OPT-PROXIABLE-data: - -KRB5_GET_INIT_CREDS_OPT_PROXIABLE -================================= - -.. -.. data:: KRB5_GET_INIT_CREDS_OPT_PROXIABLE -.. - - - - -======================================== ====================== -``KRB5_GET_INIT_CREDS_OPT_PROXIABLE`` ``0x0008`` -======================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_RENEW_LIFE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_RENEW_LIFE.rst.txt deleted file mode 100644 index 342ad6fc01f4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_RENEW_LIFE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-GET-INIT-CREDS-OPT-RENEW-LIFE-data: - -KRB5_GET_INIT_CREDS_OPT_RENEW_LIFE -================================== - -.. -.. data:: KRB5_GET_INIT_CREDS_OPT_RENEW_LIFE -.. - - - - -========================================= ====================== -``KRB5_GET_INIT_CREDS_OPT_RENEW_LIFE`` ``0x0002`` -========================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_SALT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_SALT.rst.txt deleted file mode 100644 index f3854eb08b18..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_SALT.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-GET-INIT-CREDS-OPT-SALT-data: - -KRB5_GET_INIT_CREDS_OPT_SALT -============================ - -.. -.. data:: KRB5_GET_INIT_CREDS_OPT_SALT -.. - - - - -=================================== ====================== -``KRB5_GET_INIT_CREDS_OPT_SALT`` ``0x0080`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_TKT_LIFE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_TKT_LIFE.rst.txt deleted file mode 100644 index 9f719b86cfc4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_GET_INIT_CREDS_OPT_TKT_LIFE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-GET-INIT-CREDS-OPT-TKT-LIFE-data: - -KRB5_GET_INIT_CREDS_OPT_TKT_LIFE -================================ - -.. -.. data:: KRB5_GET_INIT_CREDS_OPT_TKT_LIFE -.. - - - - -======================================= ====================== -``KRB5_GET_INIT_CREDS_OPT_TKT_LIFE`` ``0x0001`` -======================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INIT_CONTEXT_KDC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INIT_CONTEXT_KDC.rst.txt deleted file mode 100644 index 7d2ecf0aeee0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INIT_CONTEXT_KDC.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-INIT-CONTEXT-KDC-data: - -KRB5_INIT_CONTEXT_KDC -===================== - -.. -.. data:: KRB5_INIT_CONTEXT_KDC -.. - -Use KDC configuration if available. - - - -============================ ====================== -``KRB5_INIT_CONTEXT_KDC`` ``0x2`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INIT_CONTEXT_SECURE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INIT_CONTEXT_SECURE.rst.txt deleted file mode 100644 index 299b48f8d426..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INIT_CONTEXT_SECURE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-INIT-CONTEXT-SECURE-data: - -KRB5_INIT_CONTEXT_SECURE -======================== - -.. -.. data:: KRB5_INIT_CONTEXT_SECURE -.. - -Use secure context configuration. - - - -=============================== ====================== -``KRB5_INIT_CONTEXT_SECURE`` ``0x1`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INIT_CREDS_STEP_FLAG_CONTINUE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INIT_CREDS_STEP_FLAG_CONTINUE.rst.txt deleted file mode 100644 index 7981dc0fc9b8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INIT_CREDS_STEP_FLAG_CONTINUE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-INIT-CREDS-STEP-FLAG-CONTINUE-data: - -KRB5_INIT_CREDS_STEP_FLAG_CONTINUE -================================== - -.. -.. data:: KRB5_INIT_CREDS_STEP_FLAG_CONTINUE -.. - -More responses needed. - - - -========================================= ====================== -``KRB5_INIT_CREDS_STEP_FLAG_CONTINUE`` ``0x1`` -========================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT16_MAX.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT16_MAX.rst.txt deleted file mode 100644 index ac18b5976572..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT16_MAX.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-INT16-MAX-data: - -KRB5_INT16_MAX -============== - -.. -.. data:: KRB5_INT16_MAX -.. - - - - -===================== ====================== -``KRB5_INT16_MAX`` ``65535`` -===================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT16_MIN.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT16_MIN.rst.txt deleted file mode 100644 index 1bcfaa825922..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT16_MIN.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-INT16-MIN-data: - -KRB5_INT16_MIN -============== - -.. -.. data:: KRB5_INT16_MIN -.. - - - - -===================== ====================== -``KRB5_INT16_MIN`` ``(-KRB5_INT16_MAX-1)`` -===================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT32_MAX.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT32_MAX.rst.txt deleted file mode 100644 index a041c979567f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT32_MAX.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-INT32-MAX-data: - -KRB5_INT32_MAX -============== - -.. -.. data:: KRB5_INT32_MAX -.. - - - - -===================== ====================== -``KRB5_INT32_MAX`` ``2147483647`` -===================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT32_MIN.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT32_MIN.rst.txt deleted file mode 100644 index 20192101e86c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_INT32_MIN.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-INT32-MIN-data: - -KRB5_INT32_MIN -============== - -.. -.. data:: KRB5_INT32_MIN -.. - - - - -===================== ====================== -``KRB5_INT32_MIN`` ``(-KRB5_INT32_MAX-1)`` -===================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_ITE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_ITE.rst.txt deleted file mode 100644 index efd512414fa8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_ITE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-AD-ITE-data: - -KRB5_KEYUSAGE_AD_ITE -==================== - -.. -.. data:: KRB5_KEYUSAGE_AD_ITE -.. - - - - -=========================== ====================== -``KRB5_KEYUSAGE_AD_ITE`` ``21`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_KDCISSUED_CKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_KDCISSUED_CKSUM.rst.txt deleted file mode 100644 index f2cdd0710c66..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_KDCISSUED_CKSUM.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-AD-KDCISSUED-CKSUM-data: - -KRB5_KEYUSAGE_AD_KDCISSUED_CKSUM -================================ - -.. -.. data:: KRB5_KEYUSAGE_AD_KDCISSUED_CKSUM -.. - - - - -======================================= ====================== -``KRB5_KEYUSAGE_AD_KDCISSUED_CKSUM`` ``19`` -======================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_MTE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_MTE.rst.txt deleted file mode 100644 index 0cab9a2dc99a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_MTE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-AD-MTE-data: - -KRB5_KEYUSAGE_AD_MTE -==================== - -.. -.. data:: KRB5_KEYUSAGE_AD_MTE -.. - - - - -=========================== ====================== -``KRB5_KEYUSAGE_AD_MTE`` ``20`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_SIGNEDPATH.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_SIGNEDPATH.rst.txt deleted file mode 100644 index fada88e0d6b0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AD_SIGNEDPATH.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-AD-SIGNEDPATH-data: - -KRB5_KEYUSAGE_AD_SIGNEDPATH -=========================== - -.. -.. data:: KRB5_KEYUSAGE_AD_SIGNEDPATH -.. - - - - -================================== ====================== -``KRB5_KEYUSAGE_AD_SIGNEDPATH`` ``-21`` -================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_APP_DATA_CKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_APP_DATA_CKSUM.rst.txt deleted file mode 100644 index 2f909eab6a2e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_APP_DATA_CKSUM.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-APP-DATA-CKSUM-data: - -KRB5_KEYUSAGE_APP_DATA_CKSUM -============================ - -.. -.. data:: KRB5_KEYUSAGE_APP_DATA_CKSUM -.. - - - - -=================================== ====================== -``KRB5_KEYUSAGE_APP_DATA_CKSUM`` ``17`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_APP_DATA_ENCRYPT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_APP_DATA_ENCRYPT.rst.txt deleted file mode 100644 index 2b3e840b6641..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_APP_DATA_ENCRYPT.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-APP-DATA-ENCRYPT-data: - -KRB5_KEYUSAGE_APP_DATA_ENCRYPT -============================== - -.. -.. data:: KRB5_KEYUSAGE_APP_DATA_ENCRYPT -.. - - - - -===================================== ====================== -``KRB5_KEYUSAGE_APP_DATA_ENCRYPT`` ``16`` -===================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AP_REP_ENCPART.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AP_REP_ENCPART.rst.txt deleted file mode 100644 index bab584ff14fb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AP_REP_ENCPART.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-AP-REP-ENCPART-data: - -KRB5_KEYUSAGE_AP_REP_ENCPART -============================ - -.. -.. data:: KRB5_KEYUSAGE_AP_REP_ENCPART -.. - - - - -=================================== ====================== -``KRB5_KEYUSAGE_AP_REP_ENCPART`` ``12`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AP_REQ_AUTH.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AP_REQ_AUTH.rst.txt deleted file mode 100644 index 83fe216ef9b3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AP_REQ_AUTH.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-AP-REQ-AUTH-data: - -KRB5_KEYUSAGE_AP_REQ_AUTH -========================= - -.. -.. data:: KRB5_KEYUSAGE_AP_REQ_AUTH -.. - - - - -================================ ====================== -``KRB5_KEYUSAGE_AP_REQ_AUTH`` ``11`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AP_REQ_AUTH_CKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AP_REQ_AUTH_CKSUM.rst.txt deleted file mode 100644 index 54d18a9dbd47..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AP_REQ_AUTH_CKSUM.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-AP-REQ-AUTH-CKSUM-data: - -KRB5_KEYUSAGE_AP_REQ_AUTH_CKSUM -=============================== - -.. -.. data:: KRB5_KEYUSAGE_AP_REQ_AUTH_CKSUM -.. - - - - -====================================== ====================== -``KRB5_KEYUSAGE_AP_REQ_AUTH_CKSUM`` ``10`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AS_REP_ENCPART.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AS_REP_ENCPART.rst.txt deleted file mode 100644 index d666d88c853b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AS_REP_ENCPART.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-AS-REP-ENCPART-data: - -KRB5_KEYUSAGE_AS_REP_ENCPART -============================ - -.. -.. data:: KRB5_KEYUSAGE_AS_REP_ENCPART -.. - - - - -=================================== ====================== -``KRB5_KEYUSAGE_AS_REP_ENCPART`` ``3`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AS_REQ.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AS_REQ.rst.txt deleted file mode 100644 index 0626b0ae65dd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AS_REQ.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-AS-REQ-data: - -KRB5_KEYUSAGE_AS_REQ -==================== - -.. -.. data:: KRB5_KEYUSAGE_AS_REQ -.. - - - - -=========================== ====================== -``KRB5_KEYUSAGE_AS_REQ`` ``56`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AS_REQ_PA_ENC_TS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AS_REQ_PA_ENC_TS.rst.txt deleted file mode 100644 index 6552938f4053..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_AS_REQ_PA_ENC_TS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-AS-REQ-PA-ENC-TS-data: - -KRB5_KEYUSAGE_AS_REQ_PA_ENC_TS -============================== - -.. -.. data:: KRB5_KEYUSAGE_AS_REQ_PA_ENC_TS -.. - - - - -===================================== ====================== -``KRB5_KEYUSAGE_AS_REQ_PA_ENC_TS`` ``1`` -===================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_CAMMAC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_CAMMAC.rst.txt deleted file mode 100644 index 0f7c7b121c64..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_CAMMAC.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-CAMMAC-data: - -KRB5_KEYUSAGE_CAMMAC -==================== - -.. -.. data:: KRB5_KEYUSAGE_CAMMAC -.. - - - - -=========================== ====================== -``KRB5_KEYUSAGE_CAMMAC`` ``64`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_ENC_CHALLENGE_CLIENT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_ENC_CHALLENGE_CLIENT.rst.txt deleted file mode 100644 index 1f27210cd366..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_ENC_CHALLENGE_CLIENT.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-ENC-CHALLENGE-CLIENT-data: - -KRB5_KEYUSAGE_ENC_CHALLENGE_CLIENT -================================== - -.. -.. data:: KRB5_KEYUSAGE_ENC_CHALLENGE_CLIENT -.. - - - - -========================================= ====================== -``KRB5_KEYUSAGE_ENC_CHALLENGE_CLIENT`` ``54`` -========================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_ENC_CHALLENGE_KDC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_ENC_CHALLENGE_KDC.rst.txt deleted file mode 100644 index ec53ab1a50ab..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_ENC_CHALLENGE_KDC.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-ENC-CHALLENGE-KDC-data: - -KRB5_KEYUSAGE_ENC_CHALLENGE_KDC -=============================== - -.. -.. data:: KRB5_KEYUSAGE_ENC_CHALLENGE_KDC -.. - - - - -====================================== ====================== -``KRB5_KEYUSAGE_ENC_CHALLENGE_KDC`` ``55`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_ENC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_ENC.rst.txt deleted file mode 100644 index 0936f56a3752..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_ENC.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-FAST-ENC-data: - -KRB5_KEYUSAGE_FAST_ENC -====================== - -.. -.. data:: KRB5_KEYUSAGE_FAST_ENC -.. - - - - -============================= ====================== -``KRB5_KEYUSAGE_FAST_ENC`` ``51`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_FINISHED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_FINISHED.rst.txt deleted file mode 100644 index e66fd0f46285..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_FINISHED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-FAST-FINISHED-data: - -KRB5_KEYUSAGE_FAST_FINISHED -=========================== - -.. -.. data:: KRB5_KEYUSAGE_FAST_FINISHED -.. - - - - -================================== ====================== -``KRB5_KEYUSAGE_FAST_FINISHED`` ``53`` -================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_REP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_REP.rst.txt deleted file mode 100644 index 076714bc8c06..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_REP.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-FAST-REP-data: - -KRB5_KEYUSAGE_FAST_REP -====================== - -.. -.. data:: KRB5_KEYUSAGE_FAST_REP -.. - - - - -============================= ====================== -``KRB5_KEYUSAGE_FAST_REP`` ``52`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_REQ_CHKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_REQ_CHKSUM.rst.txt deleted file mode 100644 index 257d006b721f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FAST_REQ_CHKSUM.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-FAST-REQ-CHKSUM-data: - -KRB5_KEYUSAGE_FAST_REQ_CHKSUM -============================= - -.. -.. data:: KRB5_KEYUSAGE_FAST_REQ_CHKSUM -.. - - - - -==================================== ====================== -``KRB5_KEYUSAGE_FAST_REQ_CHKSUM`` ``50`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FINISHED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FINISHED.rst.txt deleted file mode 100644 index d074e040f001..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_FINISHED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-FINISHED-data: - -KRB5_KEYUSAGE_FINISHED -====================== - -.. -.. data:: KRB5_KEYUSAGE_FINISHED -.. - - - - -============================= ====================== -``KRB5_KEYUSAGE_FINISHED`` ``41`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_GSS_TOK_MIC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_GSS_TOK_MIC.rst.txt deleted file mode 100644 index c1ae9317103d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_GSS_TOK_MIC.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-GSS-TOK-MIC-data: - -KRB5_KEYUSAGE_GSS_TOK_MIC -========================= - -.. -.. data:: KRB5_KEYUSAGE_GSS_TOK_MIC -.. - - - - -================================ ====================== -``KRB5_KEYUSAGE_GSS_TOK_MIC`` ``22`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_GSS_TOK_WRAP_INTEG.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_GSS_TOK_WRAP_INTEG.rst.txt deleted file mode 100644 index 35a1ba74997a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_GSS_TOK_WRAP_INTEG.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-GSS-TOK-WRAP-INTEG-data: - -KRB5_KEYUSAGE_GSS_TOK_WRAP_INTEG -================================ - -.. -.. data:: KRB5_KEYUSAGE_GSS_TOK_WRAP_INTEG -.. - - - - -======================================= ====================== -``KRB5_KEYUSAGE_GSS_TOK_WRAP_INTEG`` ``23`` -======================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_GSS_TOK_WRAP_PRIV.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_GSS_TOK_WRAP_PRIV.rst.txt deleted file mode 100644 index c3df9b360d62..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_GSS_TOK_WRAP_PRIV.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-GSS-TOK-WRAP-PRIV-data: - -KRB5_KEYUSAGE_GSS_TOK_WRAP_PRIV -=============================== - -.. -.. data:: KRB5_KEYUSAGE_GSS_TOK_WRAP_PRIV -.. - - - - -====================================== ====================== -``KRB5_KEYUSAGE_GSS_TOK_WRAP_PRIV`` ``24`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_IAKERB_FINISHED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_IAKERB_FINISHED.rst.txt deleted file mode 100644 index e17ba0b77454..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_IAKERB_FINISHED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-IAKERB-FINISHED-data: - -KRB5_KEYUSAGE_IAKERB_FINISHED -============================= - -.. -.. data:: KRB5_KEYUSAGE_IAKERB_FINISHED -.. - - - - -==================================== ====================== -``KRB5_KEYUSAGE_IAKERB_FINISHED`` ``42`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KDC_REP_TICKET.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KDC_REP_TICKET.rst.txt deleted file mode 100644 index 9203b56fb52f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KDC_REP_TICKET.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-KDC-REP-TICKET-data: - -KRB5_KEYUSAGE_KDC_REP_TICKET -============================ - -.. -.. data:: KRB5_KEYUSAGE_KDC_REP_TICKET -.. - - - - -=================================== ====================== -``KRB5_KEYUSAGE_KDC_REP_TICKET`` ``2`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_CRED_ENCPART.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_CRED_ENCPART.rst.txt deleted file mode 100644 index 823c2ead1155..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_CRED_ENCPART.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-KRB-CRED-ENCPART-data: - -KRB5_KEYUSAGE_KRB_CRED_ENCPART -============================== - -.. -.. data:: KRB5_KEYUSAGE_KRB_CRED_ENCPART -.. - - - - -===================================== ====================== -``KRB5_KEYUSAGE_KRB_CRED_ENCPART`` ``14`` -===================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_ERROR_CKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_ERROR_CKSUM.rst.txt deleted file mode 100644 index 8986ac08255e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_ERROR_CKSUM.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-KRB-ERROR-CKSUM-data: - -KRB5_KEYUSAGE_KRB_ERROR_CKSUM -============================= - -.. -.. data:: KRB5_KEYUSAGE_KRB_ERROR_CKSUM -.. - - - - -==================================== ====================== -``KRB5_KEYUSAGE_KRB_ERROR_CKSUM`` ``18`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_PRIV_ENCPART.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_PRIV_ENCPART.rst.txt deleted file mode 100644 index 696ab74b1fc7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_PRIV_ENCPART.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-KRB-PRIV-ENCPART-data: - -KRB5_KEYUSAGE_KRB_PRIV_ENCPART -============================== - -.. -.. data:: KRB5_KEYUSAGE_KRB_PRIV_ENCPART -.. - - - - -===================================== ====================== -``KRB5_KEYUSAGE_KRB_PRIV_ENCPART`` ``13`` -===================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_SAFE_CKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_SAFE_CKSUM.rst.txt deleted file mode 100644 index 07493e66a885..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_KRB_SAFE_CKSUM.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-KRB-SAFE-CKSUM-data: - -KRB5_KEYUSAGE_KRB_SAFE_CKSUM -============================ - -.. -.. data:: KRB5_KEYUSAGE_KRB_SAFE_CKSUM -.. - - - - -=================================== ====================== -``KRB5_KEYUSAGE_KRB_SAFE_CKSUM`` ``15`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_AS_FRESHNESS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_AS_FRESHNESS.rst.txt deleted file mode 100644 index 66e2962739dd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_AS_FRESHNESS.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-PA-AS-FRESHNESS-data: - -KRB5_KEYUSAGE_PA_AS_FRESHNESS -============================= - -.. -.. data:: KRB5_KEYUSAGE_PA_AS_FRESHNESS -.. - -Used for freshness tokens. - - - -==================================== ====================== -``KRB5_KEYUSAGE_PA_AS_FRESHNESS`` ``514`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_FX_COOKIE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_FX_COOKIE.rst.txt deleted file mode 100644 index 709c8c3942ca..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_FX_COOKIE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-PA-FX-COOKIE-data: - -KRB5_KEYUSAGE_PA_FX_COOKIE -========================== - -.. -.. data:: KRB5_KEYUSAGE_PA_FX_COOKIE -.. - -Used for encrypted FAST cookies. - - - -================================= ====================== -``KRB5_KEYUSAGE_PA_FX_COOKIE`` ``513`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_OTP_REQUEST.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_OTP_REQUEST.rst.txt deleted file mode 100644 index cfc6946db23f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_OTP_REQUEST.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-PA-OTP-REQUEST-data: - -KRB5_KEYUSAGE_PA_OTP_REQUEST -============================ - -.. -.. data:: KRB5_KEYUSAGE_PA_OTP_REQUEST -.. - -See RFC 6560 section 4.2. - - - -=================================== ====================== -``KRB5_KEYUSAGE_PA_OTP_REQUEST`` ``45`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_PKINIT_KX.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_PKINIT_KX.rst.txt deleted file mode 100644 index a0c6192164e6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_PKINIT_KX.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-PA-PKINIT-KX-data: - -KRB5_KEYUSAGE_PA_PKINIT_KX -========================== - -.. -.. data:: KRB5_KEYUSAGE_PA_PKINIT_KX -.. - - - - -================================= ====================== -``KRB5_KEYUSAGE_PA_PKINIT_KX`` ``44`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_S4U_X509_USER_REPLY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_S4U_X509_USER_REPLY.rst.txt deleted file mode 100644 index adab35dc54cd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_S4U_X509_USER_REPLY.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-PA-S4U-X509-USER-REPLY-data: - -KRB5_KEYUSAGE_PA_S4U_X509_USER_REPLY -==================================== - -.. -.. data:: KRB5_KEYUSAGE_PA_S4U_X509_USER_REPLY -.. - - - - -=========================================== ====================== -``KRB5_KEYUSAGE_PA_S4U_X509_USER_REPLY`` ``27`` -=========================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_S4U_X509_USER_REQUEST.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_S4U_X509_USER_REQUEST.rst.txt deleted file mode 100644 index 03fff049a7d3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_S4U_X509_USER_REQUEST.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-PA-S4U-X509-USER-REQUEST-data: - -KRB5_KEYUSAGE_PA_S4U_X509_USER_REQUEST -====================================== - -.. -.. data:: KRB5_KEYUSAGE_PA_S4U_X509_USER_REQUEST -.. - - - - -============================================= ====================== -``KRB5_KEYUSAGE_PA_S4U_X509_USER_REQUEST`` ``26`` -============================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_SAM_CHALLENGE_CKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_SAM_CHALLENGE_CKSUM.rst.txt deleted file mode 100644 index eff8ef82d046..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_SAM_CHALLENGE_CKSUM.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-PA-SAM-CHALLENGE-CKSUM-data: - -KRB5_KEYUSAGE_PA_SAM_CHALLENGE_CKSUM -==================================== - -.. -.. data:: KRB5_KEYUSAGE_PA_SAM_CHALLENGE_CKSUM -.. - - - - -=========================================== ====================== -``KRB5_KEYUSAGE_PA_SAM_CHALLENGE_CKSUM`` ``25`` -=========================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_SAM_CHALLENGE_TRACKID.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_SAM_CHALLENGE_TRACKID.rst.txt deleted file mode 100644 index 1928646ebec8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_SAM_CHALLENGE_TRACKID.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-PA-SAM-CHALLENGE-TRACKID-data: - -KRB5_KEYUSAGE_PA_SAM_CHALLENGE_TRACKID -====================================== - -.. -.. data:: KRB5_KEYUSAGE_PA_SAM_CHALLENGE_TRACKID -.. - - - - -============================================= ====================== -``KRB5_KEYUSAGE_PA_SAM_CHALLENGE_TRACKID`` ``26`` -============================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_SAM_RESPONSE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_SAM_RESPONSE.rst.txt deleted file mode 100644 index 93b83048903a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_PA_SAM_RESPONSE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-PA-SAM-RESPONSE-data: - -KRB5_KEYUSAGE_PA_SAM_RESPONSE -============================= - -.. -.. data:: KRB5_KEYUSAGE_PA_SAM_RESPONSE -.. - - - - -==================================== ====================== -``KRB5_KEYUSAGE_PA_SAM_RESPONSE`` ``27`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_SPAKE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_SPAKE.rst.txt deleted file mode 100644 index db6ccb67c31f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_SPAKE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-SPAKE-data: - -KRB5_KEYUSAGE_SPAKE -=================== - -.. -.. data:: KRB5_KEYUSAGE_SPAKE -.. - - - - -========================== ====================== -``KRB5_KEYUSAGE_SPAKE`` ``65`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REP_ENCPART_SESSKEY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REP_ENCPART_SESSKEY.rst.txt deleted file mode 100644 index 56151c1b0f9d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REP_ENCPART_SESSKEY.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-TGS-REP-ENCPART-SESSKEY-data: - -KRB5_KEYUSAGE_TGS_REP_ENCPART_SESSKEY -===================================== - -.. -.. data:: KRB5_KEYUSAGE_TGS_REP_ENCPART_SESSKEY -.. - - - - -============================================ ====================== -``KRB5_KEYUSAGE_TGS_REP_ENCPART_SESSKEY`` ``8`` -============================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REP_ENCPART_SUBKEY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REP_ENCPART_SUBKEY.rst.txt deleted file mode 100644 index ee0548c4c752..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REP_ENCPART_SUBKEY.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-TGS-REP-ENCPART-SUBKEY-data: - -KRB5_KEYUSAGE_TGS_REP_ENCPART_SUBKEY -==================================== - -.. -.. data:: KRB5_KEYUSAGE_TGS_REP_ENCPART_SUBKEY -.. - - - - -=========================================== ====================== -``KRB5_KEYUSAGE_TGS_REP_ENCPART_SUBKEY`` ``9`` -=========================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AD_SESSKEY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AD_SESSKEY.rst.txt deleted file mode 100644 index dc93ba77d4c4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AD_SESSKEY.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-TGS-REQ-AD-SESSKEY-data: - -KRB5_KEYUSAGE_TGS_REQ_AD_SESSKEY -================================ - -.. -.. data:: KRB5_KEYUSAGE_TGS_REQ_AD_SESSKEY -.. - - - - -======================================= ====================== -``KRB5_KEYUSAGE_TGS_REQ_AD_SESSKEY`` ``4`` -======================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AD_SUBKEY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AD_SUBKEY.rst.txt deleted file mode 100644 index c48b86431d49..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AD_SUBKEY.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-TGS-REQ-AD-SUBKEY-data: - -KRB5_KEYUSAGE_TGS_REQ_AD_SUBKEY -=============================== - -.. -.. data:: KRB5_KEYUSAGE_TGS_REQ_AD_SUBKEY -.. - - - - -====================================== ====================== -``KRB5_KEYUSAGE_TGS_REQ_AD_SUBKEY`` ``5`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AUTH.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AUTH.rst.txt deleted file mode 100644 index d50140f2b452..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AUTH.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-TGS-REQ-AUTH-data: - -KRB5_KEYUSAGE_TGS_REQ_AUTH -========================== - -.. -.. data:: KRB5_KEYUSAGE_TGS_REQ_AUTH -.. - - - - -================================= ====================== -``KRB5_KEYUSAGE_TGS_REQ_AUTH`` ``7`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AUTH_CKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AUTH_CKSUM.rst.txt deleted file mode 100644 index a9245b4c0ddc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KEYUSAGE_TGS_REQ_AUTH_CKSUM.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-KEYUSAGE-TGS-REQ-AUTH-CKSUM-data: - -KRB5_KEYUSAGE_TGS_REQ_AUTH_CKSUM -================================ - -.. -.. data:: KRB5_KEYUSAGE_TGS_REQ_AUTH_CKSUM -.. - - - - -======================================= ====================== -``KRB5_KEYUSAGE_TGS_REQ_AUTH_CKSUM`` ``6`` -======================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_ACCESSDENIED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_ACCESSDENIED.rst.txt deleted file mode 100644 index 56d44af25f8d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_ACCESSDENIED.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-KPASSWD-ACCESSDENIED-data: - -KRB5_KPASSWD_ACCESSDENIED -========================= - -.. -.. data:: KRB5_KPASSWD_ACCESSDENIED -.. - -Not authorized. - - - -================================ ====================== -``KRB5_KPASSWD_ACCESSDENIED`` ``5`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_AUTHERROR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_AUTHERROR.rst.txt deleted file mode 100644 index 356208ae1531..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_AUTHERROR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-KPASSWD-AUTHERROR-data: - -KRB5_KPASSWD_AUTHERROR -====================== - -.. -.. data:: KRB5_KPASSWD_AUTHERROR -.. - -Authentication error. - - - -============================= ====================== -``KRB5_KPASSWD_AUTHERROR`` ``3`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_BAD_VERSION.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_BAD_VERSION.rst.txt deleted file mode 100644 index 7c6d0908cc68..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_BAD_VERSION.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-KPASSWD-BAD-VERSION-data: - -KRB5_KPASSWD_BAD_VERSION -======================== - -.. -.. data:: KRB5_KPASSWD_BAD_VERSION -.. - -Unknown RPC version. - - - -=============================== ====================== -``KRB5_KPASSWD_BAD_VERSION`` ``6`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_HARDERROR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_HARDERROR.rst.txt deleted file mode 100644 index dbdb777e6b57..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_HARDERROR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-KPASSWD-HARDERROR-data: - -KRB5_KPASSWD_HARDERROR -====================== - -.. -.. data:: KRB5_KPASSWD_HARDERROR -.. - -Server error. - - - -============================= ====================== -``KRB5_KPASSWD_HARDERROR`` ``2`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_INITIAL_FLAG_NEEDED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_INITIAL_FLAG_NEEDED.rst.txt deleted file mode 100644 index e4385673eccd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_INITIAL_FLAG_NEEDED.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-KPASSWD-INITIAL-FLAG-NEEDED-data: - -KRB5_KPASSWD_INITIAL_FLAG_NEEDED -================================ - -.. -.. data:: KRB5_KPASSWD_INITIAL_FLAG_NEEDED -.. - -The presented credentials were not obtained using a password directly. - - - -======================================= ====================== -``KRB5_KPASSWD_INITIAL_FLAG_NEEDED`` ``7`` -======================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_MALFORMED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_MALFORMED.rst.txt deleted file mode 100644 index 8aa3a90c14d1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_MALFORMED.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-KPASSWD-MALFORMED-data: - -KRB5_KPASSWD_MALFORMED -====================== - -.. -.. data:: KRB5_KPASSWD_MALFORMED -.. - -Malformed request. - - - -============================= ====================== -``KRB5_KPASSWD_MALFORMED`` ``1`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_SOFTERROR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_SOFTERROR.rst.txt deleted file mode 100644 index 2d1cb307c9c5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_SOFTERROR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-KPASSWD-SOFTERROR-data: - -KRB5_KPASSWD_SOFTERROR -====================== - -.. -.. data:: KRB5_KPASSWD_SOFTERROR -.. - -Password change rejected. - - - -============================= ====================== -``KRB5_KPASSWD_SOFTERROR`` ``4`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_SUCCESS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_SUCCESS.rst.txt deleted file mode 100644 index 6cad3cf7a99b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_KPASSWD_SUCCESS.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-KPASSWD-SUCCESS-data: - -KRB5_KPASSWD_SUCCESS -==================== - -.. -.. data:: KRB5_KPASSWD_SUCCESS -.. - -Success. - - - -=========================== ====================== -``KRB5_KPASSWD_SUCCESS`` ``0`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_ACCT_EXPTIME.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_ACCT_EXPTIME.rst.txt deleted file mode 100644 index 3f33bd03ae57..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_ACCT_EXPTIME.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ALL-ACCT-EXPTIME-data: - -KRB5_LRQ_ALL_ACCT_EXPTIME -========================= - -.. -.. data:: KRB5_LRQ_ALL_ACCT_EXPTIME -.. - - - - -================================ ====================== -``KRB5_LRQ_ALL_ACCT_EXPTIME`` ``7`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_INITIAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_INITIAL.rst.txt deleted file mode 100644 index 5d90c8ef6957..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_INITIAL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ALL-LAST-INITIAL-data: - -KRB5_LRQ_ALL_LAST_INITIAL -========================= - -.. -.. data:: KRB5_LRQ_ALL_LAST_INITIAL -.. - - - - -================================ ====================== -``KRB5_LRQ_ALL_LAST_INITIAL`` ``2`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_RENEWAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_RENEWAL.rst.txt deleted file mode 100644 index f785496972f2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_RENEWAL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ALL-LAST-RENEWAL-data: - -KRB5_LRQ_ALL_LAST_RENEWAL -========================= - -.. -.. data:: KRB5_LRQ_ALL_LAST_RENEWAL -.. - - - - -================================ ====================== -``KRB5_LRQ_ALL_LAST_RENEWAL`` ``4`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_REQ.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_REQ.rst.txt deleted file mode 100644 index 2b98c98504a2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_REQ.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ALL-LAST-REQ-data: - -KRB5_LRQ_ALL_LAST_REQ -===================== - -.. -.. data:: KRB5_LRQ_ALL_LAST_REQ -.. - - - - -============================ ====================== -``KRB5_LRQ_ALL_LAST_REQ`` ``5`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_TGT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_TGT.rst.txt deleted file mode 100644 index 4a7b5b1e5286..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_TGT.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ALL-LAST-TGT-data: - -KRB5_LRQ_ALL_LAST_TGT -===================== - -.. -.. data:: KRB5_LRQ_ALL_LAST_TGT -.. - - - - -============================ ====================== -``KRB5_LRQ_ALL_LAST_TGT`` ``1`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_TGT_ISSUED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_TGT_ISSUED.rst.txt deleted file mode 100644 index 646b61a36078..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_LAST_TGT_ISSUED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ALL-LAST-TGT-ISSUED-data: - -KRB5_LRQ_ALL_LAST_TGT_ISSUED -============================ - -.. -.. data:: KRB5_LRQ_ALL_LAST_TGT_ISSUED -.. - - - - -=================================== ====================== -``KRB5_LRQ_ALL_LAST_TGT_ISSUED`` ``3`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_PW_EXPTIME.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_PW_EXPTIME.rst.txt deleted file mode 100644 index f88a1c7891c1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ALL_PW_EXPTIME.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ALL-PW-EXPTIME-data: - -KRB5_LRQ_ALL_PW_EXPTIME -======================= - -.. -.. data:: KRB5_LRQ_ALL_PW_EXPTIME -.. - - - - -============================== ====================== -``KRB5_LRQ_ALL_PW_EXPTIME`` ``6`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_NONE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_NONE.rst.txt deleted file mode 100644 index 1a816fed0c8f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_NONE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-NONE-data: - -KRB5_LRQ_NONE -============= - -.. -.. data:: KRB5_LRQ_NONE -.. - - - - -==================== ====================== -``KRB5_LRQ_NONE`` ``0`` -==================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_ACCT_EXPTIME.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_ACCT_EXPTIME.rst.txt deleted file mode 100644 index 842f1d786ecf..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_ACCT_EXPTIME.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ONE-ACCT-EXPTIME-data: - -KRB5_LRQ_ONE_ACCT_EXPTIME -========================= - -.. -.. data:: KRB5_LRQ_ONE_ACCT_EXPTIME -.. - - - - -================================ ====================== -``KRB5_LRQ_ONE_ACCT_EXPTIME`` ``(-7)`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_INITIAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_INITIAL.rst.txt deleted file mode 100644 index c79efccad51d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_INITIAL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ONE-LAST-INITIAL-data: - -KRB5_LRQ_ONE_LAST_INITIAL -========================= - -.. -.. data:: KRB5_LRQ_ONE_LAST_INITIAL -.. - - - - -================================ ====================== -``KRB5_LRQ_ONE_LAST_INITIAL`` ``(-2)`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_RENEWAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_RENEWAL.rst.txt deleted file mode 100644 index dd9f70ece6c4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_RENEWAL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ONE-LAST-RENEWAL-data: - -KRB5_LRQ_ONE_LAST_RENEWAL -========================= - -.. -.. data:: KRB5_LRQ_ONE_LAST_RENEWAL -.. - - - - -================================ ====================== -``KRB5_LRQ_ONE_LAST_RENEWAL`` ``(-4)`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_REQ.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_REQ.rst.txt deleted file mode 100644 index da5023383ab9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_REQ.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ONE-LAST-REQ-data: - -KRB5_LRQ_ONE_LAST_REQ -===================== - -.. -.. data:: KRB5_LRQ_ONE_LAST_REQ -.. - - - - -============================ ====================== -``KRB5_LRQ_ONE_LAST_REQ`` ``(-5)`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_TGT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_TGT.rst.txt deleted file mode 100644 index f57c54738e23..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_TGT.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ONE-LAST-TGT-data: - -KRB5_LRQ_ONE_LAST_TGT -===================== - -.. -.. data:: KRB5_LRQ_ONE_LAST_TGT -.. - - - - -============================ ====================== -``KRB5_LRQ_ONE_LAST_TGT`` ``(-1)`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_TGT_ISSUED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_TGT_ISSUED.rst.txt deleted file mode 100644 index 44702a413659..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_LAST_TGT_ISSUED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ONE-LAST-TGT-ISSUED-data: - -KRB5_LRQ_ONE_LAST_TGT_ISSUED -============================ - -.. -.. data:: KRB5_LRQ_ONE_LAST_TGT_ISSUED -.. - - - - -=================================== ====================== -``KRB5_LRQ_ONE_LAST_TGT_ISSUED`` ``(-3)`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_PW_EXPTIME.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_PW_EXPTIME.rst.txt deleted file mode 100644 index 4710a605d32a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_LRQ_ONE_PW_EXPTIME.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-LRQ-ONE-PW-EXPTIME-data: - -KRB5_LRQ_ONE_PW_EXPTIME -======================= - -.. -.. data:: KRB5_LRQ_ONE_PW_EXPTIME -.. - - - - -============================== ====================== -``KRB5_LRQ_ONE_PW_EXPTIME`` ``(-6)`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_ENTERPRISE_PRINCIPAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_ENTERPRISE_PRINCIPAL.rst.txt deleted file mode 100644 index 3511088c3eb7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_ENTERPRISE_PRINCIPAL.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-ENTERPRISE-PRINCIPAL-data: - -KRB5_NT_ENTERPRISE_PRINCIPAL -============================ - -.. -.. data:: KRB5_NT_ENTERPRISE_PRINCIPAL -.. - -Windows 2000 UPN. - - - -=================================== ====================== -``KRB5_NT_ENTERPRISE_PRINCIPAL`` ``10`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_ENT_PRINCIPAL_AND_ID.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_ENT_PRINCIPAL_AND_ID.rst.txt deleted file mode 100644 index 28f7eb390885..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_ENT_PRINCIPAL_AND_ID.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-ENT-PRINCIPAL-AND-ID-data: - -KRB5_NT_ENT_PRINCIPAL_AND_ID -============================ - -.. -.. data:: KRB5_NT_ENT_PRINCIPAL_AND_ID -.. - -NT 4 style name and SID. - - - -=================================== ====================== -``KRB5_NT_ENT_PRINCIPAL_AND_ID`` ``-130`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_MS_PRINCIPAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_MS_PRINCIPAL.rst.txt deleted file mode 100644 index 80801f6dc097..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_MS_PRINCIPAL.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-MS-PRINCIPAL-data: - -KRB5_NT_MS_PRINCIPAL -==================== - -.. -.. data:: KRB5_NT_MS_PRINCIPAL -.. - -Windows 2000 UPN and SID. - - - -=========================== ====================== -``KRB5_NT_MS_PRINCIPAL`` ``-128`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_MS_PRINCIPAL_AND_ID.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_MS_PRINCIPAL_AND_ID.rst.txt deleted file mode 100644 index 7388c64a4ab5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_MS_PRINCIPAL_AND_ID.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-MS-PRINCIPAL-AND-ID-data: - -KRB5_NT_MS_PRINCIPAL_AND_ID -=========================== - -.. -.. data:: KRB5_NT_MS_PRINCIPAL_AND_ID -.. - -NT 4 style name. - - - -================================== ====================== -``KRB5_NT_MS_PRINCIPAL_AND_ID`` ``-129`` -================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_PRINCIPAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_PRINCIPAL.rst.txt deleted file mode 100644 index 49309a520b2d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_PRINCIPAL.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-PRINCIPAL-data: - -KRB5_NT_PRINCIPAL -================= - -.. -.. data:: KRB5_NT_PRINCIPAL -.. - -Just the name of the principal as in DCE, or for users. - - - -======================== ====================== -``KRB5_NT_PRINCIPAL`` ``1`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SMTP_NAME.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SMTP_NAME.rst.txt deleted file mode 100644 index 1d4113358bce..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SMTP_NAME.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-SMTP-NAME-data: - -KRB5_NT_SMTP_NAME -================= - -.. -.. data:: KRB5_NT_SMTP_NAME -.. - -Name in form of SMTP email name. - - - -======================== ====================== -``KRB5_NT_SMTP_NAME`` ``7`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SRV_HST.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SRV_HST.rst.txt deleted file mode 100644 index 7a96e40022f0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SRV_HST.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-SRV-HST-data: - -KRB5_NT_SRV_HST -=============== - -.. -.. data:: KRB5_NT_SRV_HST -.. - -Service with host name as instance (telnet, rcommands) - - - -====================== ====================== -``KRB5_NT_SRV_HST`` ``3`` -====================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SRV_INST.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SRV_INST.rst.txt deleted file mode 100644 index 8beee8177962..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SRV_INST.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-SRV-INST-data: - -KRB5_NT_SRV_INST -================ - -.. -.. data:: KRB5_NT_SRV_INST -.. - -Service and other unique instance (krbtgt) - - - -======================= ====================== -``KRB5_NT_SRV_INST`` ``2`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SRV_XHST.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SRV_XHST.rst.txt deleted file mode 100644 index 03e0f0d7ce29..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_SRV_XHST.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-SRV-XHST-data: - -KRB5_NT_SRV_XHST -================ - -.. -.. data:: KRB5_NT_SRV_XHST -.. - -Service with host as remaining components. - - - -======================= ====================== -``KRB5_NT_SRV_XHST`` ``4`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_UID.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_UID.rst.txt deleted file mode 100644 index 76f278c56841..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_UID.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-UID-data: - -KRB5_NT_UID -=========== - -.. -.. data:: KRB5_NT_UID -.. - -Unique ID. - - - -================== ====================== -``KRB5_NT_UID`` ``5`` -================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_UNKNOWN.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_UNKNOWN.rst.txt deleted file mode 100644 index 04636d46406b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_UNKNOWN.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-UNKNOWN-data: - -KRB5_NT_UNKNOWN -=============== - -.. -.. data:: KRB5_NT_UNKNOWN -.. - -Name type not known. - - - -====================== ====================== -``KRB5_NT_UNKNOWN`` ``0`` -====================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_WELLKNOWN.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_WELLKNOWN.rst.txt deleted file mode 100644 index 2d7c1b9b91be..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_WELLKNOWN.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-WELLKNOWN-data: - -KRB5_NT_WELLKNOWN -================= - -.. -.. data:: KRB5_NT_WELLKNOWN -.. - -Well-known (special) principal. - - - -======================== ====================== -``KRB5_NT_WELLKNOWN`` ``11`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_X500_PRINCIPAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_X500_PRINCIPAL.rst.txt deleted file mode 100644 index fdd994c6e2a7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_NT_X500_PRINCIPAL.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-NT-X500-PRINCIPAL-data: - -KRB5_NT_X500_PRINCIPAL -====================== - -.. -.. data:: KRB5_NT_X500_PRINCIPAL -.. - -PKINIT. - - - -============================= ====================== -``KRB5_NT_X500_PRINCIPAL`` ``6`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_ATTRIBUTES_INFO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_ATTRIBUTES_INFO.rst.txt deleted file mode 100644 index da248a8d2f9e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_ATTRIBUTES_INFO.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-ATTRIBUTES-INFO-data: - -KRB5_PAC_ATTRIBUTES_INFO -======================== - -.. -.. data:: KRB5_PAC_ATTRIBUTES_INFO -.. - -PAC attributes. - - - -=============================== ====================== -``KRB5_PAC_ATTRIBUTES_INFO`` ``17`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_CLIENT_CLAIMS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_CLIENT_CLAIMS.rst.txt deleted file mode 100644 index 4e94048646f7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_CLIENT_CLAIMS.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-CLIENT-CLAIMS-data: - -KRB5_PAC_CLIENT_CLAIMS -====================== - -.. -.. data:: KRB5_PAC_CLIENT_CLAIMS -.. - -Client claims information. - - - -============================= ====================== -``KRB5_PAC_CLIENT_CLAIMS`` ``13`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_CLIENT_INFO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_CLIENT_INFO.rst.txt deleted file mode 100644 index 846e21d023d3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_CLIENT_INFO.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-CLIENT-INFO-data: - -KRB5_PAC_CLIENT_INFO -==================== - -.. -.. data:: KRB5_PAC_CLIENT_INFO -.. - -Client name and ticket info. - - - -=========================== ====================== -``KRB5_PAC_CLIENT_INFO`` ``10`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_CREDENTIALS_INFO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_CREDENTIALS_INFO.rst.txt deleted file mode 100644 index ae454f0ef163..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_CREDENTIALS_INFO.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-CREDENTIALS-INFO-data: - -KRB5_PAC_CREDENTIALS_INFO -========================= - -.. -.. data:: KRB5_PAC_CREDENTIALS_INFO -.. - -Credentials information. - - - -================================ ====================== -``KRB5_PAC_CREDENTIALS_INFO`` ``2`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_DELEGATION_INFO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_DELEGATION_INFO.rst.txt deleted file mode 100644 index 6c93933bd756..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_DELEGATION_INFO.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-DELEGATION-INFO-data: - -KRB5_PAC_DELEGATION_INFO -======================== - -.. -.. data:: KRB5_PAC_DELEGATION_INFO -.. - -Constrained delegation info. - - - -=============================== ====================== -``KRB5_PAC_DELEGATION_INFO`` ``11`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_DEVICE_CLAIMS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_DEVICE_CLAIMS.rst.txt deleted file mode 100644 index 36659dee703d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_DEVICE_CLAIMS.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-DEVICE-CLAIMS-data: - -KRB5_PAC_DEVICE_CLAIMS -====================== - -.. -.. data:: KRB5_PAC_DEVICE_CLAIMS -.. - -Device claims information. - - - -============================= ====================== -``KRB5_PAC_DEVICE_CLAIMS`` ``15`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_DEVICE_INFO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_DEVICE_INFO.rst.txt deleted file mode 100644 index d7e8812731a2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_DEVICE_INFO.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-DEVICE-INFO-data: - -KRB5_PAC_DEVICE_INFO -==================== - -.. -.. data:: KRB5_PAC_DEVICE_INFO -.. - -Device information. - - - -=========================== ====================== -``KRB5_PAC_DEVICE_INFO`` ``14`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_FULL_CHECKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_FULL_CHECKSUM.rst.txt deleted file mode 100644 index c9512888ac89..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_FULL_CHECKSUM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-FULL-CHECKSUM-data: - -KRB5_PAC_FULL_CHECKSUM -====================== - -.. -.. data:: KRB5_PAC_FULL_CHECKSUM -.. - -KDC full checksum. - - - -============================= ====================== -``KRB5_PAC_FULL_CHECKSUM`` ``19`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_LOGON_INFO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_LOGON_INFO.rst.txt deleted file mode 100644 index 83424eb45dac..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_LOGON_INFO.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-LOGON-INFO-data: - -KRB5_PAC_LOGON_INFO -=================== - -.. -.. data:: KRB5_PAC_LOGON_INFO -.. - -Logon information. - - - -========================== ====================== -``KRB5_PAC_LOGON_INFO`` ``1`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_PRIVSVR_CHECKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_PRIVSVR_CHECKSUM.rst.txt deleted file mode 100644 index 75e1e667271a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_PRIVSVR_CHECKSUM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-PRIVSVR-CHECKSUM-data: - -KRB5_PAC_PRIVSVR_CHECKSUM -========================= - -.. -.. data:: KRB5_PAC_PRIVSVR_CHECKSUM -.. - -KDC checksum. - - - -================================ ====================== -``KRB5_PAC_PRIVSVR_CHECKSUM`` ``7`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_REQUESTOR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_REQUESTOR.rst.txt deleted file mode 100644 index 4bffb7f0bc1a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_REQUESTOR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-REQUESTOR-data: - -KRB5_PAC_REQUESTOR -================== - -.. -.. data:: KRB5_PAC_REQUESTOR -.. - -PAC requestor SID. - - - -========================= ====================== -``KRB5_PAC_REQUESTOR`` ``18`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_SERVER_CHECKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_SERVER_CHECKSUM.rst.txt deleted file mode 100644 index 1f094041a11f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_SERVER_CHECKSUM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-SERVER-CHECKSUM-data: - -KRB5_PAC_SERVER_CHECKSUM -======================== - -.. -.. data:: KRB5_PAC_SERVER_CHECKSUM -.. - -Server checksum. - - - -=============================== ====================== -``KRB5_PAC_SERVER_CHECKSUM`` ``6`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_TICKET_CHECKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_TICKET_CHECKSUM.rst.txt deleted file mode 100644 index 9ab24b14d5b3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_TICKET_CHECKSUM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-TICKET-CHECKSUM-data: - -KRB5_PAC_TICKET_CHECKSUM -======================== - -.. -.. data:: KRB5_PAC_TICKET_CHECKSUM -.. - -Ticket checksum. - - - -=============================== ====================== -``KRB5_PAC_TICKET_CHECKSUM`` ``16`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_UPN_DNS_INFO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_UPN_DNS_INFO.rst.txt deleted file mode 100644 index 08a5cbd1cbd2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PAC_UPN_DNS_INFO.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PAC-UPN-DNS-INFO-data: - -KRB5_PAC_UPN_DNS_INFO -===================== - -.. -.. data:: KRB5_PAC_UPN_DNS_INFO -.. - -User principal name and DNS info. - - - -============================ ====================== -``KRB5_PAC_UPN_DNS_INFO`` ``12`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AFS3_SALT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AFS3_SALT.rst.txt deleted file mode 100644 index f2609c6838f3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AFS3_SALT.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-AFS3-SALT-data: - -KRB5_PADATA_AFS3_SALT -===================== - -.. -.. data:: KRB5_PADATA_AFS3_SALT -.. - -Cygnus. - -RFC 4120, 3961 - -============================ ====================== -``KRB5_PADATA_AFS3_SALT`` ``10`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AP_REQ.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AP_REQ.rst.txt deleted file mode 100644 index 32b4d2ffa7bb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AP_REQ.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-AP-REQ-data: - -KRB5_PADATA_AP_REQ -================== - -.. -.. data:: KRB5_PADATA_AP_REQ -.. - - - - -========================= ====================== -``KRB5_PADATA_AP_REQ`` ``1`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AS_CHECKSUM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AS_CHECKSUM.rst.txt deleted file mode 100644 index d0487a01b80e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AS_CHECKSUM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-AS-CHECKSUM-data: - -KRB5_PADATA_AS_CHECKSUM -======================= - -.. -.. data:: KRB5_PADATA_AS_CHECKSUM -.. - -AS checksum. - - - -============================== ====================== -``KRB5_PADATA_AS_CHECKSUM`` ``132`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AS_FRESHNESS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AS_FRESHNESS.rst.txt deleted file mode 100644 index 084b39dbf16c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_AS_FRESHNESS.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-AS-FRESHNESS-data: - -KRB5_PADATA_AS_FRESHNESS -======================== - -.. -.. data:: KRB5_PADATA_AS_FRESHNESS -.. - -RFC 8070. - - - -=============================== ====================== -``KRB5_PADATA_AS_FRESHNESS`` ``150`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENCRYPTED_CHALLENGE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENCRYPTED_CHALLENGE.rst.txt deleted file mode 100644 index f0efc2e5847e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENCRYPTED_CHALLENGE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-ENCRYPTED-CHALLENGE-data: - -KRB5_PADATA_ENCRYPTED_CHALLENGE -=============================== - -.. -.. data:: KRB5_PADATA_ENCRYPTED_CHALLENGE -.. - -RFC 6113. - - - -====================================== ====================== -``KRB5_PADATA_ENCRYPTED_CHALLENGE`` ``138`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENC_SANDIA_SECURID.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENC_SANDIA_SECURID.rst.txt deleted file mode 100644 index 9aaec10e3972..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENC_SANDIA_SECURID.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-ENC-SANDIA-SECURID-data: - -KRB5_PADATA_ENC_SANDIA_SECURID -============================== - -.. -.. data:: KRB5_PADATA_ENC_SANDIA_SECURID -.. - -SecurId passcode. - -RFC 4120 - -===================================== ====================== -``KRB5_PADATA_ENC_SANDIA_SECURID`` ``6`` -===================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENC_TIMESTAMP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENC_TIMESTAMP.rst.txt deleted file mode 100644 index d40145f12d57..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENC_TIMESTAMP.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-ENC-TIMESTAMP-data: - -KRB5_PADATA_ENC_TIMESTAMP -========================= - -.. -.. data:: KRB5_PADATA_ENC_TIMESTAMP -.. - -RFC 4120. - - - -================================ ====================== -``KRB5_PADATA_ENC_TIMESTAMP`` ``2`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENC_UNIX_TIME.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENC_UNIX_TIME.rst.txt deleted file mode 100644 index 755a84e9f247..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ENC_UNIX_TIME.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-ENC-UNIX-TIME-data: - -KRB5_PADATA_ENC_UNIX_TIME -========================= - -.. -.. data:: KRB5_PADATA_ENC_UNIX_TIME -.. - -timestamp encrypted in key. - -RFC 4120 - -================================ ====================== -``KRB5_PADATA_ENC_UNIX_TIME`` ``5`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ETYPE_INFO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ETYPE_INFO.rst.txt deleted file mode 100644 index 4341a5265e00..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ETYPE_INFO.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-ETYPE-INFO-data: - -KRB5_PADATA_ETYPE_INFO -====================== - -.. -.. data:: KRB5_PADATA_ETYPE_INFO -.. - -Etype info for preauth. - -RFC 4120 - -============================= ====================== -``KRB5_PADATA_ETYPE_INFO`` ``11`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ETYPE_INFO2.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ETYPE_INFO2.rst.txt deleted file mode 100644 index 3335112a97ef..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_ETYPE_INFO2.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-ETYPE-INFO2-data: - -KRB5_PADATA_ETYPE_INFO2 -======================= - -.. -.. data:: KRB5_PADATA_ETYPE_INFO2 -.. - -RFC 4120. - - - -============================== ====================== -``KRB5_PADATA_ETYPE_INFO2`` ``19`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FOR_USER.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FOR_USER.rst.txt deleted file mode 100644 index cb914247746c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FOR_USER.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-FOR-USER-data: - -KRB5_PADATA_FOR_USER -==================== - -.. -.. data:: KRB5_PADATA_FOR_USER -.. - -username protocol transition request - - - -=========================== ====================== -``KRB5_PADATA_FOR_USER`` ``129`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FX_COOKIE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FX_COOKIE.rst.txt deleted file mode 100644 index f83907418848..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FX_COOKIE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-FX-COOKIE-data: - -KRB5_PADATA_FX_COOKIE -===================== - -.. -.. data:: KRB5_PADATA_FX_COOKIE -.. - -RFC 6113. - - - -============================ ====================== -``KRB5_PADATA_FX_COOKIE`` ``133`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FX_ERROR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FX_ERROR.rst.txt deleted file mode 100644 index 93cf047a89cc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FX_ERROR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-FX-ERROR-data: - -KRB5_PADATA_FX_ERROR -==================== - -.. -.. data:: KRB5_PADATA_FX_ERROR -.. - -RFC 6113. - - - -=========================== ====================== -``KRB5_PADATA_FX_ERROR`` ``137`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FX_FAST.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FX_FAST.rst.txt deleted file mode 100644 index 67ce1d8d3ab3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_FX_FAST.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-FX-FAST-data: - -KRB5_PADATA_FX_FAST -=================== - -.. -.. data:: KRB5_PADATA_FX_FAST -.. - -RFC 6113. - - - -========================== ====================== -``KRB5_PADATA_FX_FAST`` ``136`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_GET_FROM_TYPED_DATA.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_GET_FROM_TYPED_DATA.rst.txt deleted file mode 100644 index 75e7a8662227..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_GET_FROM_TYPED_DATA.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-GET-FROM-TYPED-DATA-data: - -KRB5_PADATA_GET_FROM_TYPED_DATA -=============================== - -.. -.. data:: KRB5_PADATA_GET_FROM_TYPED_DATA -.. - -Embedded in typed data. - -RFC 4120 - -====================================== ====================== -``KRB5_PADATA_GET_FROM_TYPED_DATA`` ``22`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_NONE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_NONE.rst.txt deleted file mode 100644 index f1c0d44e9287..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_NONE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-NONE-data: - -KRB5_PADATA_NONE -================ - -.. -.. data:: KRB5_PADATA_NONE -.. - - - - -======================= ====================== -``KRB5_PADATA_NONE`` ``0`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OSF_DCE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OSF_DCE.rst.txt deleted file mode 100644 index 2f83465c8eb0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OSF_DCE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-OSF-DCE-data: - -KRB5_PADATA_OSF_DCE -=================== - -.. -.. data:: KRB5_PADATA_OSF_DCE -.. - -OSF DCE. - -RFC 4120 - -========================== ====================== -``KRB5_PADATA_OSF_DCE`` ``8`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OTP_CHALLENGE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OTP_CHALLENGE.rst.txt deleted file mode 100644 index cfff48c67114..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OTP_CHALLENGE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-OTP-CHALLENGE-data: - -KRB5_PADATA_OTP_CHALLENGE -========================= - -.. -.. data:: KRB5_PADATA_OTP_CHALLENGE -.. - -RFC 6560 section 4.1. - - - -================================ ====================== -``KRB5_PADATA_OTP_CHALLENGE`` ``141`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OTP_PIN_CHANGE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OTP_PIN_CHANGE.rst.txt deleted file mode 100644 index 35a4b16397a6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OTP_PIN_CHANGE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-OTP-PIN-CHANGE-data: - -KRB5_PADATA_OTP_PIN_CHANGE -========================== - -.. -.. data:: KRB5_PADATA_OTP_PIN_CHANGE -.. - -RFC 6560 section 4.3. - - - -================================= ====================== -``KRB5_PADATA_OTP_PIN_CHANGE`` ``144`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OTP_REQUEST.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OTP_REQUEST.rst.txt deleted file mode 100644 index 90ba56e1d02c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_OTP_REQUEST.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-OTP-REQUEST-data: - -KRB5_PADATA_OTP_REQUEST -======================= - -.. -.. data:: KRB5_PADATA_OTP_REQUEST -.. - -RFC 6560 section 4.2. - - - -============================== ====================== -``KRB5_PADATA_OTP_REQUEST`` ``142`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PAC_OPTIONS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PAC_OPTIONS.rst.txt deleted file mode 100644 index 46722ce69c9f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PAC_OPTIONS.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-PAC-OPTIONS-data: - -KRB5_PADATA_PAC_OPTIONS -======================= - -.. -.. data:: KRB5_PADATA_PAC_OPTIONS -.. - -MS-KILE and MS-SFU. - - - -============================== ====================== -``KRB5_PADATA_PAC_OPTIONS`` ``167`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PAC_REQUEST.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PAC_REQUEST.rst.txt deleted file mode 100644 index 5147ce986be3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PAC_REQUEST.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-PAC-REQUEST-data: - -KRB5_PADATA_PAC_REQUEST -======================= - -.. -.. data:: KRB5_PADATA_PAC_REQUEST -.. - -include Windows PAC - - - -============================== ====================== -``KRB5_PADATA_PAC_REQUEST`` ``128`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PKINIT_KX.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PKINIT_KX.rst.txt deleted file mode 100644 index 719307459dd4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PKINIT_KX.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-PKINIT-KX-data: - -KRB5_PADATA_PKINIT_KX -===================== - -.. -.. data:: KRB5_PADATA_PKINIT_KX -.. - -RFC 6112. - - - -============================ ====================== -``KRB5_PADATA_PKINIT_KX`` ``147`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REP.rst.txt deleted file mode 100644 index 5d7be82477b0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REP.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-PK-AS-REP-data: - -KRB5_PADATA_PK_AS_REP -===================== - -.. -.. data:: KRB5_PADATA_PK_AS_REP -.. - -PKINIT. - -RFC 4556 - -============================ ====================== -``KRB5_PADATA_PK_AS_REP`` ``17`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REP_OLD.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REP_OLD.rst.txt deleted file mode 100644 index 1f782d2d003b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REP_OLD.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-PK-AS-REP-OLD-data: - -KRB5_PADATA_PK_AS_REP_OLD -========================= - -.. -.. data:: KRB5_PADATA_PK_AS_REP_OLD -.. - -PKINIT. - - - -================================ ====================== -``KRB5_PADATA_PK_AS_REP_OLD`` ``15`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REQ.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REQ.rst.txt deleted file mode 100644 index a291aa362453..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REQ.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-PK-AS-REQ-data: - -KRB5_PADATA_PK_AS_REQ -===================== - -.. -.. data:: KRB5_PADATA_PK_AS_REQ -.. - -PKINIT. - -RFC 4556 - -============================ ====================== -``KRB5_PADATA_PK_AS_REQ`` ``16`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REQ_OLD.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REQ_OLD.rst.txt deleted file mode 100644 index b3454c5f5217..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PK_AS_REQ_OLD.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-PK-AS-REQ-OLD-data: - -KRB5_PADATA_PK_AS_REQ_OLD -========================= - -.. -.. data:: KRB5_PADATA_PK_AS_REQ_OLD -.. - -PKINIT. - - - -================================ ====================== -``KRB5_PADATA_PK_AS_REQ_OLD`` ``14`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PW_SALT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PW_SALT.rst.txt deleted file mode 100644 index 9a006da75b38..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_PW_SALT.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-PW-SALT-data: - -KRB5_PADATA_PW_SALT -=================== - -.. -.. data:: KRB5_PADATA_PW_SALT -.. - -RFC 4120. - - - -========================== ====================== -``KRB5_PADATA_PW_SALT`` ``3`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_REDHAT_IDP_OAUTH2.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_REDHAT_IDP_OAUTH2.rst.txt deleted file mode 100644 index b88f79163afd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_REDHAT_IDP_OAUTH2.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-REDHAT-IDP-OAUTH2-data: - -KRB5_PADATA_REDHAT_IDP_OAUTH2 -============================= - -.. -.. data:: KRB5_PADATA_REDHAT_IDP_OAUTH2 -.. - -Red Hat IdP mechanism. - - - -==================================== ====================== -``KRB5_PADATA_REDHAT_IDP_OAUTH2`` ``152`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_REDHAT_PASSKEY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_REDHAT_PASSKEY.rst.txt deleted file mode 100644 index 76cb77b8875b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_REDHAT_PASSKEY.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-REDHAT-PASSKEY-data: - -KRB5_PADATA_REDHAT_PASSKEY -========================== - -.. -.. data:: KRB5_PADATA_REDHAT_PASSKEY -.. - -Red Hat Passkey mechanism. - - - -================================= ====================== -``KRB5_PADATA_REDHAT_PASSKEY`` ``153`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_REFERRAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_REFERRAL.rst.txt deleted file mode 100644 index eb2c571e11a9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_REFERRAL.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-REFERRAL-data: - -KRB5_PADATA_REFERRAL -==================== - -.. -.. data:: KRB5_PADATA_REFERRAL -.. - -draft referral system - - - -=========================== ====================== -``KRB5_PADATA_REFERRAL`` ``25`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_S4U_X509_USER.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_S4U_X509_USER.rst.txt deleted file mode 100644 index 566ed4dcd222..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_S4U_X509_USER.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-S4U-X509-USER-data: - -KRB5_PADATA_S4U_X509_USER -========================= - -.. -.. data:: KRB5_PADATA_S4U_X509_USER -.. - -certificate protocol transition request - - - -================================ ====================== -``KRB5_PADATA_S4U_X509_USER`` ``130`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_CHALLENGE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_CHALLENGE.rst.txt deleted file mode 100644 index fd1dc607eba4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_CHALLENGE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-SAM-CHALLENGE-data: - -KRB5_PADATA_SAM_CHALLENGE -========================= - -.. -.. data:: KRB5_PADATA_SAM_CHALLENGE -.. - -SAM/OTP. - - - -================================ ====================== -``KRB5_PADATA_SAM_CHALLENGE`` ``12`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_CHALLENGE_2.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_CHALLENGE_2.rst.txt deleted file mode 100644 index 9d77eb76809d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_CHALLENGE_2.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-SAM-CHALLENGE-2-data: - -KRB5_PADATA_SAM_CHALLENGE_2 -=========================== - -.. -.. data:: KRB5_PADATA_SAM_CHALLENGE_2 -.. - -draft challenge system, updated - - - -================================== ====================== -``KRB5_PADATA_SAM_CHALLENGE_2`` ``30`` -================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_REDIRECT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_REDIRECT.rst.txt deleted file mode 100644 index 93fbeac2997b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_REDIRECT.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-SAM-REDIRECT-data: - -KRB5_PADATA_SAM_REDIRECT -======================== - -.. -.. data:: KRB5_PADATA_SAM_REDIRECT -.. - -SAM/OTP. - -RFC 4120 - -=============================== ====================== -``KRB5_PADATA_SAM_REDIRECT`` ``21`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_RESPONSE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_RESPONSE.rst.txt deleted file mode 100644 index 14a18d481a2c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_RESPONSE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-SAM-RESPONSE-data: - -KRB5_PADATA_SAM_RESPONSE -======================== - -.. -.. data:: KRB5_PADATA_SAM_RESPONSE -.. - -SAM/OTP. - - - -=============================== ====================== -``KRB5_PADATA_SAM_RESPONSE`` ``13`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_RESPONSE_2.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_RESPONSE_2.rst.txt deleted file mode 100644 index 265c60b1a705..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SAM_RESPONSE_2.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-SAM-RESPONSE-2-data: - -KRB5_PADATA_SAM_RESPONSE_2 -========================== - -.. -.. data:: KRB5_PADATA_SAM_RESPONSE_2 -.. - -draft challenge system, updated - - - -================================= ====================== -``KRB5_PADATA_SAM_RESPONSE_2`` ``31`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SESAME.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SESAME.rst.txt deleted file mode 100644 index f653d8ea6866..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SESAME.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-SESAME-data: - -KRB5_PADATA_SESAME -================== - -.. -.. data:: KRB5_PADATA_SESAME -.. - -Sesame project. - -RFC 4120 - -========================= ====================== -``KRB5_PADATA_SESAME`` ``7`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SPAKE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SPAKE.rst.txt deleted file mode 100644 index 16887a6c5501..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SPAKE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-SPAKE-data: - -KRB5_PADATA_SPAKE -================= - -.. -.. data:: KRB5_PADATA_SPAKE -.. - - - - -======================== ====================== -``KRB5_PADATA_SPAKE`` ``151`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SVR_REFERRAL_INFO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SVR_REFERRAL_INFO.rst.txt deleted file mode 100644 index c3897c3db34d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_SVR_REFERRAL_INFO.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-SVR-REFERRAL-INFO-data: - -KRB5_PADATA_SVR_REFERRAL_INFO -============================= - -.. -.. data:: KRB5_PADATA_SVR_REFERRAL_INFO -.. - -Windows 2000 referrals. - -RFC 6820 - -==================================== ====================== -``KRB5_PADATA_SVR_REFERRAL_INFO`` ``20`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_TGS_REQ.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_TGS_REQ.rst.txt deleted file mode 100644 index 75f5a26e49d2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_TGS_REQ.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-TGS-REQ-data: - -KRB5_PADATA_TGS_REQ -=================== - -.. -.. data:: KRB5_PADATA_TGS_REQ -.. - - - - -========================== ====================== -``KRB5_PADATA_TGS_REQ`` ``KRB5_PADATA_AP_REQ`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_USE_SPECIFIED_KVNO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_USE_SPECIFIED_KVNO.rst.txt deleted file mode 100644 index 159c30267480..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PADATA_USE_SPECIFIED_KVNO.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PADATA-USE-SPECIFIED-KVNO-data: - -KRB5_PADATA_USE_SPECIFIED_KVNO -============================== - -.. -.. data:: KRB5_PADATA_USE_SPECIFIED_KVNO -.. - -RFC 4120. - - - -===================================== ====================== -``KRB5_PADATA_USE_SPECIFIED_KVNO`` ``20`` -===================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_CASEFOLD.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_CASEFOLD.rst.txt deleted file mode 100644 index 63c43ba74a38..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_CASEFOLD.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-COMPARE-CASEFOLD-data: - -KRB5_PRINCIPAL_COMPARE_CASEFOLD -=============================== - -.. -.. data:: KRB5_PRINCIPAL_COMPARE_CASEFOLD -.. - -case-insensitive - - - -====================================== ====================== -``KRB5_PRINCIPAL_COMPARE_CASEFOLD`` ``4`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_ENTERPRISE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_ENTERPRISE.rst.txt deleted file mode 100644 index 121f82640863..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_ENTERPRISE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-COMPARE-ENTERPRISE-data: - -KRB5_PRINCIPAL_COMPARE_ENTERPRISE -================================= - -.. -.. data:: KRB5_PRINCIPAL_COMPARE_ENTERPRISE -.. - -UPNs as real principals. - - - -======================================== ====================== -``KRB5_PRINCIPAL_COMPARE_ENTERPRISE`` ``2`` -======================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_IGNORE_REALM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_IGNORE_REALM.rst.txt deleted file mode 100644 index fdbe0dd91478..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_IGNORE_REALM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-COMPARE-IGNORE-REALM-data: - -KRB5_PRINCIPAL_COMPARE_IGNORE_REALM -=================================== - -.. -.. data:: KRB5_PRINCIPAL_COMPARE_IGNORE_REALM -.. - -ignore realm component - - - -========================================== ====================== -``KRB5_PRINCIPAL_COMPARE_IGNORE_REALM`` ``1`` -========================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_UTF8.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_UTF8.rst.txt deleted file mode 100644 index 9e0f76bc3a63..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_COMPARE_UTF8.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-COMPARE-UTF8-data: - -KRB5_PRINCIPAL_COMPARE_UTF8 -=========================== - -.. -.. data:: KRB5_PRINCIPAL_COMPARE_UTF8 -.. - -treat principals as UTF-8 - - - -================================== ====================== -``KRB5_PRINCIPAL_COMPARE_UTF8`` ``8`` -================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_ENTERPRISE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_ENTERPRISE.rst.txt deleted file mode 100644 index 5b5df427b942..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_ENTERPRISE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-PARSE-ENTERPRISE-data: - -KRB5_PRINCIPAL_PARSE_ENTERPRISE -=============================== - -.. -.. data:: KRB5_PRINCIPAL_PARSE_ENTERPRISE -.. - -Create single-component enterprise principle. - - - -====================================== ====================== -``KRB5_PRINCIPAL_PARSE_ENTERPRISE`` ``0x4`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_IGNORE_REALM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_IGNORE_REALM.rst.txt deleted file mode 100644 index 786cfce6f2d3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_IGNORE_REALM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-PARSE-IGNORE-REALM-data: - -KRB5_PRINCIPAL_PARSE_IGNORE_REALM -================================= - -.. -.. data:: KRB5_PRINCIPAL_PARSE_IGNORE_REALM -.. - -Ignore realm if present. - - - -======================================== ====================== -``KRB5_PRINCIPAL_PARSE_IGNORE_REALM`` ``0x8`` -======================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_NO_DEF_REALM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_NO_DEF_REALM.rst.txt deleted file mode 100644 index c07956ce9d9a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_NO_DEF_REALM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-PARSE-NO-DEF-REALM-data: - -KRB5_PRINCIPAL_PARSE_NO_DEF_REALM -================================= - -.. -.. data:: KRB5_PRINCIPAL_PARSE_NO_DEF_REALM -.. - -Don't add default realm. - - - -======================================== ====================== -``KRB5_PRINCIPAL_PARSE_NO_DEF_REALM`` ``0x10`` -======================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_NO_REALM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_NO_REALM.rst.txt deleted file mode 100644 index 6d241738fae8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_NO_REALM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-PARSE-NO-REALM-data: - -KRB5_PRINCIPAL_PARSE_NO_REALM -============================= - -.. -.. data:: KRB5_PRINCIPAL_PARSE_NO_REALM -.. - -Error if realm is present. - - - -==================================== ====================== -``KRB5_PRINCIPAL_PARSE_NO_REALM`` ``0x1`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_REQUIRE_REALM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_REQUIRE_REALM.rst.txt deleted file mode 100644 index ec3c424809e9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_PARSE_REQUIRE_REALM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-PARSE-REQUIRE-REALM-data: - -KRB5_PRINCIPAL_PARSE_REQUIRE_REALM -================================== - -.. -.. data:: KRB5_PRINCIPAL_PARSE_REQUIRE_REALM -.. - -Error if realm is not present. - - - -========================================= ====================== -``KRB5_PRINCIPAL_PARSE_REQUIRE_REALM`` ``0x2`` -========================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_UNPARSE_DISPLAY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_UNPARSE_DISPLAY.rst.txt deleted file mode 100644 index 2a648a23829c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_UNPARSE_DISPLAY.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-UNPARSE-DISPLAY-data: - -KRB5_PRINCIPAL_UNPARSE_DISPLAY -============================== - -.. -.. data:: KRB5_PRINCIPAL_UNPARSE_DISPLAY -.. - -Don't escape special characters. - - - -===================================== ====================== -``KRB5_PRINCIPAL_UNPARSE_DISPLAY`` ``0x4`` -===================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_UNPARSE_NO_REALM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_UNPARSE_NO_REALM.rst.txt deleted file mode 100644 index 277b53effe2d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_UNPARSE_NO_REALM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-UNPARSE-NO-REALM-data: - -KRB5_PRINCIPAL_UNPARSE_NO_REALM -=============================== - -.. -.. data:: KRB5_PRINCIPAL_UNPARSE_NO_REALM -.. - -Omit realm always. - - - -====================================== ====================== -``KRB5_PRINCIPAL_UNPARSE_NO_REALM`` ``0x2`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_UNPARSE_SHORT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_UNPARSE_SHORT.rst.txt deleted file mode 100644 index 08aeb625f7d9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRINCIPAL_UNPARSE_SHORT.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRINCIPAL-UNPARSE-SHORT-data: - -KRB5_PRINCIPAL_UNPARSE_SHORT -============================ - -.. -.. data:: KRB5_PRINCIPAL_UNPARSE_SHORT -.. - -Omit realm if it is the local realm. - - - -=================================== ====================== -``KRB5_PRINCIPAL_UNPARSE_SHORT`` ``0x1`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRIV.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRIV.rst.txt deleted file mode 100644 index a55392c08cc2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PRIV.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PRIV-data: - -KRB5_PRIV -========= - -.. -.. data:: KRB5_PRIV -.. - -Private application message. - - - -================ ====================== -``KRB5_PRIV`` ``((krb5_msgtype)21)`` -================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_NEW_PASSWORD.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_NEW_PASSWORD.rst.txt deleted file mode 100644 index 6af358ff41de..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_NEW_PASSWORD.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PROMPT-TYPE-NEW-PASSWORD-data: - -KRB5_PROMPT_TYPE_NEW_PASSWORD -============================= - -.. -.. data:: KRB5_PROMPT_TYPE_NEW_PASSWORD -.. - -Prompt for new password (during password change) - - - -==================================== ====================== -``KRB5_PROMPT_TYPE_NEW_PASSWORD`` ``0x2`` -==================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN.rst.txt deleted file mode 100644 index bd9e9233f19f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PROMPT-TYPE-NEW-PASSWORD-AGAIN-data: - -KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN -=================================== - -.. -.. data:: KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN -.. - -Prompt for new password again. - - - -========================================== ====================== -``KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN`` ``0x3`` -========================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_PASSWORD.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_PASSWORD.rst.txt deleted file mode 100644 index 135a56526f30..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_PASSWORD.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PROMPT-TYPE-PASSWORD-data: - -KRB5_PROMPT_TYPE_PASSWORD -========================= - -.. -.. data:: KRB5_PROMPT_TYPE_PASSWORD -.. - -Prompt for password. - - - -================================ ====================== -``KRB5_PROMPT_TYPE_PASSWORD`` ``0x1`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_PREAUTH.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_PREAUTH.rst.txt deleted file mode 100644 index 11b64feb6502..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PROMPT_TYPE_PREAUTH.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PROMPT-TYPE-PREAUTH-data: - -KRB5_PROMPT_TYPE_PREAUTH -======================== - -.. -.. data:: KRB5_PROMPT_TYPE_PREAUTH -.. - -Prompt for preauthentication data (such as an OTP value) - - - -=============================== ====================== -``KRB5_PROMPT_TYPE_PREAUTH`` ``0x4`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PVNO.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PVNO.rst.txt deleted file mode 100644 index 7bdda5d9f157..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_PVNO.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-PVNO-data: - -KRB5_PVNO -========= - -.. -.. data:: KRB5_PVNO -.. - -Protocol version number. - - - -================ ====================== -``KRB5_PVNO`` ``5`` -================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_REALM_BRANCH_CHAR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_REALM_BRANCH_CHAR.rst.txt deleted file mode 100644 index 96c3e58fe478..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_REALM_BRANCH_CHAR.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-REALM-BRANCH-CHAR-data: - -KRB5_REALM_BRANCH_CHAR -====================== - -.. -.. data:: KRB5_REALM_BRANCH_CHAR -.. - - - - -============================= ====================== -``KRB5_REALM_BRANCH_CHAR`` ``'.'`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RECVAUTH_BADAUTHVERS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RECVAUTH_BADAUTHVERS.rst.txt deleted file mode 100644 index c76664411eb6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RECVAUTH_BADAUTHVERS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-RECVAUTH-BADAUTHVERS-data: - -KRB5_RECVAUTH_BADAUTHVERS -========================= - -.. -.. data:: KRB5_RECVAUTH_BADAUTHVERS -.. - - - - -================================ ====================== -``KRB5_RECVAUTH_BADAUTHVERS`` ``0x0002`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RECVAUTH_SKIP_VERSION.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RECVAUTH_SKIP_VERSION.rst.txt deleted file mode 100644 index 63fd124dea40..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RECVAUTH_SKIP_VERSION.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-RECVAUTH-SKIP-VERSION-data: - -KRB5_RECVAUTH_SKIP_VERSION -========================== - -.. -.. data:: KRB5_RECVAUTH_SKIP_VERSION -.. - - - - -================================= ====================== -``KRB5_RECVAUTH_SKIP_VERSION`` ``0x0001`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_REFERRAL_REALM.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_REFERRAL_REALM.rst.txt deleted file mode 100644 index f5a65b1e6e47..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_REFERRAL_REALM.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-REFERRAL-REALM-data: - -KRB5_REFERRAL_REALM -=================== - -.. -.. data:: KRB5_REFERRAL_REALM -.. - -Constant for realm referrals. - - - -========================== ====================== -``KRB5_REFERRAL_REALM`` ``""`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_COLLECT_PIN.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_COLLECT_PIN.rst.txt deleted file mode 100644 index 413b6349d345..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_COLLECT_PIN.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-OTP-FLAGS-COLLECT-PIN-data: - -KRB5_RESPONDER_OTP_FLAGS_COLLECT_PIN -==================================== - -.. -.. data:: KRB5_RESPONDER_OTP_FLAGS_COLLECT_PIN -.. - -This flag indicates that the PIN value MUST be collected. - - - -=========================================== ====================== -``KRB5_RESPONDER_OTP_FLAGS_COLLECT_PIN`` ``0x0002`` -=========================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_COLLECT_TOKEN.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_COLLECT_TOKEN.rst.txt deleted file mode 100644 index 1a78999fed31..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_COLLECT_TOKEN.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-OTP-FLAGS-COLLECT-TOKEN-data: - -KRB5_RESPONDER_OTP_FLAGS_COLLECT_TOKEN -====================================== - -.. -.. data:: KRB5_RESPONDER_OTP_FLAGS_COLLECT_TOKEN -.. - -This flag indicates that the token value MUST be collected. - - - -============================================= ====================== -``KRB5_RESPONDER_OTP_FLAGS_COLLECT_TOKEN`` ``0x0001`` -============================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_NEXTOTP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_NEXTOTP.rst.txt deleted file mode 100644 index 26e230a09861..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_NEXTOTP.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-OTP-FLAGS-NEXTOTP-data: - -KRB5_RESPONDER_OTP_FLAGS_NEXTOTP -================================ - -.. -.. data:: KRB5_RESPONDER_OTP_FLAGS_NEXTOTP -.. - -This flag indicates that the token is now in re-synchronization mode with the server. - -The user is expected to reply with the next code displayed on the token. - -======================================= ====================== -``KRB5_RESPONDER_OTP_FLAGS_NEXTOTP`` ``0x0004`` -======================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_SEPARATE_PIN.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_SEPARATE_PIN.rst.txt deleted file mode 100644 index ddd3d488f5a4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FLAGS_SEPARATE_PIN.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-OTP-FLAGS-SEPARATE-PIN-data: - -KRB5_RESPONDER_OTP_FLAGS_SEPARATE_PIN -===================================== - -.. -.. data:: KRB5_RESPONDER_OTP_FLAGS_SEPARATE_PIN -.. - -This flag indicates that the PIN MUST be returned as a separate item. - -This flag only takes effect if KRB5_RESPONDER_OTP_FLAGS_COLLECT_PIN is set. If this flag is not set, the responder may either concatenate PIN + token value and store it as "value" in the answer or it may return them separately. If they are returned separately, they will be concatenated internally. - -============================================ ====================== -``KRB5_RESPONDER_OTP_FLAGS_SEPARATE_PIN`` ``0x0008`` -============================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FORMAT_ALPHANUMERIC.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FORMAT_ALPHANUMERIC.rst.txt deleted file mode 100644 index 96beff5f01cb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FORMAT_ALPHANUMERIC.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-OTP-FORMAT-ALPHANUMERIC-data: - -KRB5_RESPONDER_OTP_FORMAT_ALPHANUMERIC -====================================== - -.. -.. data:: KRB5_RESPONDER_OTP_FORMAT_ALPHANUMERIC -.. - - - - -============================================= ====================== -``KRB5_RESPONDER_OTP_FORMAT_ALPHANUMERIC`` ``2`` -============================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FORMAT_DECIMAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FORMAT_DECIMAL.rst.txt deleted file mode 100644 index 115445581c44..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FORMAT_DECIMAL.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-OTP-FORMAT-DECIMAL-data: - -KRB5_RESPONDER_OTP_FORMAT_DECIMAL -================================= - -.. -.. data:: KRB5_RESPONDER_OTP_FORMAT_DECIMAL -.. - -These format constants identify the format of the token value. - - - -======================================== ====================== -``KRB5_RESPONDER_OTP_FORMAT_DECIMAL`` ``0`` -======================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FORMAT_HEXADECIMAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FORMAT_HEXADECIMAL.rst.txt deleted file mode 100644 index 77ecfb119e56..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_OTP_FORMAT_HEXADECIMAL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-OTP-FORMAT-HEXADECIMAL-data: - -KRB5_RESPONDER_OTP_FORMAT_HEXADECIMAL -===================================== - -.. -.. data:: KRB5_RESPONDER_OTP_FORMAT_HEXADECIMAL -.. - - - - -============================================ ====================== -``KRB5_RESPONDER_OTP_FORMAT_HEXADECIMAL`` ``1`` -============================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_COUNT_LOW.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_COUNT_LOW.rst.txt deleted file mode 100644 index 99aa5478e8b1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_COUNT_LOW.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-PKINIT-FLAGS-TOKEN-USER-PIN-COUNT-LOW-data: - -KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_COUNT_LOW -==================================================== - -.. -.. data:: KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_COUNT_LOW -.. - -This flag indicates that an incorrect PIN was supplied at least once since the last time the correct PIN was supplied. - - - -=========================================================== ====================== -``KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_COUNT_LOW`` ``(1 << 0)`` -=========================================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_FINAL_TRY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_FINAL_TRY.rst.txt deleted file mode 100644 index ecf2ca0d7528..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_FINAL_TRY.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-PKINIT-FLAGS-TOKEN-USER-PIN-FINAL-TRY-data: - -KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_FINAL_TRY -==================================================== - -.. -.. data:: KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_FINAL_TRY -.. - -This flag indicates that supplying an incorrect PIN will cause the token to lock itself. - - - -=========================================================== ====================== -``KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_FINAL_TRY`` ``(1 << 1)`` -=========================================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_LOCKED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_LOCKED.rst.txt deleted file mode 100644 index 3974c52f89ae..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_LOCKED.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-PKINIT-FLAGS-TOKEN-USER-PIN-LOCKED-data: - -KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_LOCKED -================================================= - -.. -.. data:: KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_LOCKED -.. - -This flag indicates that the user PIN is locked, and you can't log in to the token with it. - - - -======================================================== ====================== -``KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_LOCKED`` ``(1 << 2)`` -======================================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_QUESTION_OTP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_QUESTION_OTP.rst.txt deleted file mode 100644 index 47ad1732e1a4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_QUESTION_OTP.rst.txt +++ /dev/null @@ -1,47 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-QUESTION-OTP-data: - -KRB5_RESPONDER_QUESTION_OTP -=========================== - -.. -.. data:: KRB5_RESPONDER_QUESTION_OTP -.. - -OTP responder question. - -The OTP responder question is asked when the KDC indicates that an OTP value is required in order to complete the authentication. The JSON format of the challenge is: -:: - - { - "service": <string (optional)>, - "tokenInfo": [ - { - "flags": <number>, - "vendor": <string (optional)>, - "challenge": <string (optional)>, - "length": <number (optional)>, - "format": <number (optional)>, - "tokenID": <string (optional)>, - "algID": <string (optional)>, - }, - ... - ] - } - -The answer to the question MUST be JSON formatted: -:: - - { - "tokeninfo": <number>, - "value": <string (optional)>, - "pin": <string (optional)>, - } - -For more detail, please see RFC 6560. - - -================================== ====================== -``KRB5_RESPONDER_QUESTION_OTP`` ``"otp"`` -================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_QUESTION_PASSWORD.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_QUESTION_PASSWORD.rst.txt deleted file mode 100644 index 057eac4ad249..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_QUESTION_PASSWORD.rst.txt +++ /dev/null @@ -1,19 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-QUESTION-PASSWORD-data: - -KRB5_RESPONDER_QUESTION_PASSWORD -================================ - -.. -.. data:: KRB5_RESPONDER_QUESTION_PASSWORD -.. - -Long-term password responder question. - -This question is asked when the long-term password is needed. It has no challenge and the response is simply the password string. - - -======================================= ====================== -``KRB5_RESPONDER_QUESTION_PASSWORD`` ``"password"`` -======================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_QUESTION_PKINIT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_QUESTION_PKINIT.rst.txt deleted file mode 100644 index 0fb11c73de4f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_RESPONDER_QUESTION_PKINIT.rst.txt +++ /dev/null @@ -1,34 +0,0 @@ -.. highlight:: c - -.. _KRB5-RESPONDER-QUESTION-PKINIT-data: - -KRB5_RESPONDER_QUESTION_PKINIT -============================== - -.. -.. data:: KRB5_RESPONDER_QUESTION_PKINIT -.. - -PKINIT responder question. - -The PKINIT responder question is asked when the client needs a password that's being used to protect key information, and is formatted as a JSON object. A specific identity's flags value, if not zero, is the bitwise-OR of one or more of the KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_* flags defined below, and possibly other flags to be added later. Any resemblance to similarly-named CKF_* values in the PKCS#11 API should not be depended on. -:: - - { - identity <string> : flags <number>, - ... - } - -The answer to the question MUST be JSON formatted: -:: - - { - identity <string> : password <string>, - ... - } - - - -===================================== ====================== -``KRB5_RESPONDER_QUESTION_PKINIT`` ``"pkinit"`` -===================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAFE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAFE.rst.txt deleted file mode 100644 index 4210e4f474b6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAFE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-SAFE-data: - -KRB5_SAFE -========= - -.. -.. data:: KRB5_SAFE -.. - -Safe application message. - - - -================ ====================== -``KRB5_SAFE`` ``((krb5_msgtype)20)`` -================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAM_MUST_PK_ENCRYPT_SAD.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAM_MUST_PK_ENCRYPT_SAD.rst.txt deleted file mode 100644 index e8c8c57007da..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAM_MUST_PK_ENCRYPT_SAD.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-SAM-MUST-PK-ENCRYPT-SAD-data: - -KRB5_SAM_MUST_PK_ENCRYPT_SAD -============================ - -.. -.. data:: KRB5_SAM_MUST_PK_ENCRYPT_SAD -.. - -currently must be zero - - - -=================================== ====================== -``KRB5_SAM_MUST_PK_ENCRYPT_SAD`` ``0x20000000`` -=================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAM_SEND_ENCRYPTED_SAD.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAM_SEND_ENCRYPTED_SAD.rst.txt deleted file mode 100644 index fcd56beaa3a1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAM_SEND_ENCRYPTED_SAD.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-SAM-SEND-ENCRYPTED-SAD-data: - -KRB5_SAM_SEND_ENCRYPTED_SAD -=========================== - -.. -.. data:: KRB5_SAM_SEND_ENCRYPTED_SAD -.. - - - - -================================== ====================== -``KRB5_SAM_SEND_ENCRYPTED_SAD`` ``0x40000000`` -================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAM_USE_SAD_AS_KEY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAM_USE_SAD_AS_KEY.rst.txt deleted file mode 100644 index beae65cde474..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_SAM_USE_SAD_AS_KEY.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-SAM-USE-SAD-AS-KEY-data: - -KRB5_SAM_USE_SAD_AS_KEY -======================= - -.. -.. data:: KRB5_SAM_USE_SAD_AS_KEY -.. - - - - -============================== ====================== -``KRB5_SAM_USE_SAD_AS_KEY`` ``0x80000000`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_2ND_TKT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_2ND_TKT.rst.txt deleted file mode 100644 index fb5e39b978e8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_2ND_TKT.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-MATCH-2ND-TKT-data: - -KRB5_TC_MATCH_2ND_TKT -===================== - -.. -.. data:: KRB5_TC_MATCH_2ND_TKT -.. - -The second ticket must match. - - - -============================ ====================== -``KRB5_TC_MATCH_2ND_TKT`` ``0x00000080`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_AUTHDATA.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_AUTHDATA.rst.txt deleted file mode 100644 index d78b84875d94..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_AUTHDATA.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-MATCH-AUTHDATA-data: - -KRB5_TC_MATCH_AUTHDATA -====================== - -.. -.. data:: KRB5_TC_MATCH_AUTHDATA -.. - -The authorization data must match. - - - -============================= ====================== -``KRB5_TC_MATCH_AUTHDATA`` ``0x00000020`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_FLAGS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_FLAGS.rst.txt deleted file mode 100644 index 0fac98fc4ecc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_FLAGS.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-MATCH-FLAGS-data: - -KRB5_TC_MATCH_FLAGS -=================== - -.. -.. data:: KRB5_TC_MATCH_FLAGS -.. - -All the flags set in the match credentials must be set. - - - -========================== ====================== -``KRB5_TC_MATCH_FLAGS`` ``0x00000004`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_FLAGS_EXACT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_FLAGS_EXACT.rst.txt deleted file mode 100644 index 9e3480abe801..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_FLAGS_EXACT.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-MATCH-FLAGS-EXACT-data: - -KRB5_TC_MATCH_FLAGS_EXACT -========================= - -.. -.. data:: KRB5_TC_MATCH_FLAGS_EXACT -.. - -All the flags must match exactly. - - - -================================ ====================== -``KRB5_TC_MATCH_FLAGS_EXACT`` ``0x00000010`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_IS_SKEY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_IS_SKEY.rst.txt deleted file mode 100644 index 98799934b1a3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_IS_SKEY.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-MATCH-IS-SKEY-data: - -KRB5_TC_MATCH_IS_SKEY -===================== - -.. -.. data:: KRB5_TC_MATCH_IS_SKEY -.. - -The is_skey field must match exactly. - - - -============================ ====================== -``KRB5_TC_MATCH_IS_SKEY`` ``0x00000002`` -============================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_KTYPE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_KTYPE.rst.txt deleted file mode 100644 index e5bf18c4d59c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_KTYPE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-MATCH-KTYPE-data: - -KRB5_TC_MATCH_KTYPE -=================== - -.. -.. data:: KRB5_TC_MATCH_KTYPE -.. - -The encryption key type must match. - - - -========================== ====================== -``KRB5_TC_MATCH_KTYPE`` ``0x00000100`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_SRV_NAMEONLY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_SRV_NAMEONLY.rst.txt deleted file mode 100644 index ca79db323e7e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_SRV_NAMEONLY.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-MATCH-SRV-NAMEONLY-data: - -KRB5_TC_MATCH_SRV_NAMEONLY -========================== - -.. -.. data:: KRB5_TC_MATCH_SRV_NAMEONLY -.. - -Only the name portion of the principal name must match. - - - -================================= ====================== -``KRB5_TC_MATCH_SRV_NAMEONLY`` ``0x00000040`` -================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_TIMES.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_TIMES.rst.txt deleted file mode 100644 index 628ee32e952e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_TIMES.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-MATCH-TIMES-data: - -KRB5_TC_MATCH_TIMES -=================== - -.. -.. data:: KRB5_TC_MATCH_TIMES -.. - -The requested lifetime must be at least as great as the time specified. - - - -========================== ====================== -``KRB5_TC_MATCH_TIMES`` ``0x00000001`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_TIMES_EXACT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_TIMES_EXACT.rst.txt deleted file mode 100644 index 9d0ffce62d6b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_MATCH_TIMES_EXACT.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-MATCH-TIMES-EXACT-data: - -KRB5_TC_MATCH_TIMES_EXACT -========================= - -.. -.. data:: KRB5_TC_MATCH_TIMES_EXACT -.. - -All the time fields must match exactly. - - - -================================ ====================== -``KRB5_TC_MATCH_TIMES_EXACT`` ``0x00000008`` -================================ ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_NOTICKET.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_NOTICKET.rst.txt deleted file mode 100644 index 76e9a01f428f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_NOTICKET.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-NOTICKET-data: - -KRB5_TC_NOTICKET -================ - -.. -.. data:: KRB5_TC_NOTICKET -.. - - - - -======================= ====================== -``KRB5_TC_NOTICKET`` ``0x00000002`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_OPENCLOSE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_OPENCLOSE.rst.txt deleted file mode 100644 index 83d94560123f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_OPENCLOSE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-OPENCLOSE-data: - -KRB5_TC_OPENCLOSE -================= - -.. -.. data:: KRB5_TC_OPENCLOSE -.. - -Open and close the file for each cache operation. - - - -======================== ====================== -``KRB5_TC_OPENCLOSE`` ``0x00000001`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_SUPPORTED_KTYPES.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_SUPPORTED_KTYPES.rst.txt deleted file mode 100644 index ecd203816bfd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TC_SUPPORTED_KTYPES.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TC-SUPPORTED-KTYPES-data: - -KRB5_TC_SUPPORTED_KTYPES -======================== - -.. -.. data:: KRB5_TC_SUPPORTED_KTYPES -.. - -The supported key types must match. - - - -=============================== ====================== -``KRB5_TC_SUPPORTED_KTYPES`` ``0x00000200`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_NAME.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_NAME.rst.txt deleted file mode 100644 index 32b22b00fb32..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_NAME.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-TGS-NAME-data: - -KRB5_TGS_NAME -============= - -.. -.. data:: KRB5_TGS_NAME -.. - - - - -==================== ====================== -``KRB5_TGS_NAME`` ``"krbtgt"`` -==================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_NAME_SIZE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_NAME_SIZE.rst.txt deleted file mode 100644 index 71adc91dae79..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_NAME_SIZE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-TGS-NAME-SIZE-data: - -KRB5_TGS_NAME_SIZE -================== - -.. -.. data:: KRB5_TGS_NAME_SIZE -.. - - - - -========================= ====================== -``KRB5_TGS_NAME_SIZE`` ``6`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_REP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_REP.rst.txt deleted file mode 100644 index f3dbfe87bc44..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_REP.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TGS-REP-data: - -KRB5_TGS_REP -============ - -.. -.. data:: KRB5_TGS_REP -.. - -Response to TGS request. - - - -=================== ====================== -``KRB5_TGS_REP`` ``((krb5_msgtype)13)`` -=================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_REQ.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_REQ.rst.txt deleted file mode 100644 index 1b5742275553..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TGS_REQ.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TGS-REQ-data: - -KRB5_TGS_REQ -============ - -.. -.. data:: KRB5_TGS_REQ -.. - -Ticket granting server request. - - - -=================== ====================== -``KRB5_TGS_REQ`` ``((krb5_msgtype)12)`` -=================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TKT_CREDS_STEP_FLAG_CONTINUE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TKT_CREDS_STEP_FLAG_CONTINUE.rst.txt deleted file mode 100644 index fa01e45ce771..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_TKT_CREDS_STEP_FLAG_CONTINUE.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-TKT-CREDS-STEP-FLAG-CONTINUE-data: - -KRB5_TKT_CREDS_STEP_FLAG_CONTINUE -================================= - -.. -.. data:: KRB5_TKT_CREDS_STEP_FLAG_CONTINUE -.. - -More responses needed. - - - -======================================== ====================== -``KRB5_TKT_CREDS_STEP_FLAG_CONTINUE`` ``0x1`` -======================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_VERIFY_INIT_CREDS_OPT_AP_REQ_NOFAIL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_VERIFY_INIT_CREDS_OPT_AP_REQ_NOFAIL.rst.txt deleted file mode 100644 index 1925137fe3d1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_VERIFY_INIT_CREDS_OPT_AP_REQ_NOFAIL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _KRB5-VERIFY-INIT-CREDS-OPT-AP-REQ-NOFAIL-data: - -KRB5_VERIFY_INIT_CREDS_OPT_AP_REQ_NOFAIL -======================================== - -.. -.. data:: KRB5_VERIFY_INIT_CREDS_OPT_AP_REQ_NOFAIL -.. - - - - -=============================================== ====================== -``KRB5_VERIFY_INIT_CREDS_OPT_AP_REQ_NOFAIL`` ``0x0001`` -=============================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_WELLKNOWN_NAMESTR.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_WELLKNOWN_NAMESTR.rst.txt deleted file mode 100644 index 6c24427e087a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/KRB5_WELLKNOWN_NAMESTR.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _KRB5-WELLKNOWN-NAMESTR-data: - -KRB5_WELLKNOWN_NAMESTR -====================== - -.. -.. data:: KRB5_WELLKNOWN_NAMESTR -.. - -First component of NT_WELLKNOWN principals. - - - -============================= ====================== -``KRB5_WELLKNOWN_NAMESTR`` ``"WELLKNOWN"`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/LR_TYPE_INTERPRETATION_MASK.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/LR_TYPE_INTERPRETATION_MASK.rst.txt deleted file mode 100644 index 47513d5639ff..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/LR_TYPE_INTERPRETATION_MASK.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _LR-TYPE-INTERPRETATION-MASK-data: - -LR_TYPE_INTERPRETATION_MASK -=========================== - -.. -.. data:: LR_TYPE_INTERPRETATION_MASK -.. - - - - -================================== ====================== -``LR_TYPE_INTERPRETATION_MASK`` ``0x7fff`` -================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/LR_TYPE_THIS_SERVER_ONLY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/LR_TYPE_THIS_SERVER_ONLY.rst.txt deleted file mode 100644 index 4db68f9a5408..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/LR_TYPE_THIS_SERVER_ONLY.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _LR-TYPE-THIS-SERVER-ONLY-data: - -LR_TYPE_THIS_SERVER_ONLY -======================== - -.. -.. data:: LR_TYPE_THIS_SERVER_ONLY -.. - - - - -=============================== ====================== -``LR_TYPE_THIS_SERVER_ONLY`` ``0x8000`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/MAX_KEYTAB_NAME_LEN.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/MAX_KEYTAB_NAME_LEN.rst.txt deleted file mode 100644 index ae0e1e2abc90..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/MAX_KEYTAB_NAME_LEN.rst.txt +++ /dev/null @@ -1,18 +0,0 @@ -.. highlight:: c - -.. _MAX-KEYTAB-NAME-LEN-data: - -MAX_KEYTAB_NAME_LEN -=================== - -.. -.. data:: MAX_KEYTAB_NAME_LEN -.. - -Long enough for MAXPATHLEN + some extra. - - - -========================== ====================== -``MAX_KEYTAB_NAME_LEN`` ``1100`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/MSEC_DIRBIT.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/MSEC_DIRBIT.rst.txt deleted file mode 100644 index e2686b0a93d8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/MSEC_DIRBIT.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _MSEC-DIRBIT-data: - -MSEC_DIRBIT -=========== - -.. -.. data:: MSEC_DIRBIT -.. - - - - -================== ====================== -``MSEC_DIRBIT`` ``0x8000`` -================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/MSEC_VAL_MASK.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/MSEC_VAL_MASK.rst.txt deleted file mode 100644 index 23905a4e0a2e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/MSEC_VAL_MASK.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _MSEC-VAL-MASK-data: - -MSEC_VAL_MASK -============= - -.. -.. data:: MSEC_VAL_MASK -.. - - - - -==================== ====================== -``MSEC_VAL_MASK`` ``0x7fff`` -==================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/SALT_TYPE_AFS_LENGTH.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/SALT_TYPE_AFS_LENGTH.rst.txt deleted file mode 100644 index 235b81f216c4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/SALT_TYPE_AFS_LENGTH.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _SALT-TYPE-AFS-LENGTH-data: - -SALT_TYPE_AFS_LENGTH -==================== - -.. -.. data:: SALT_TYPE_AFS_LENGTH -.. - - - - -=========================== ====================== -``SALT_TYPE_AFS_LENGTH`` ``UINT_MAX`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/SALT_TYPE_NO_LENGTH.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/SALT_TYPE_NO_LENGTH.rst.txt deleted file mode 100644 index 7cf62df50681..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/SALT_TYPE_NO_LENGTH.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _SALT-TYPE-NO-LENGTH-data: - -SALT_TYPE_NO_LENGTH -=================== - -.. -.. data:: SALT_TYPE_NO_LENGTH -.. - - - - -========================== ====================== -``SALT_TYPE_NO_LENGTH`` ``UINT_MAX`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/THREEPARAMOPEN.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/THREEPARAMOPEN.rst.txt deleted file mode 100644 index e61eb0ad6307..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/THREEPARAMOPEN.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _THREEPARAMOPEN-data: - -THREEPARAMOPEN -============== - -.. -.. data:: THREEPARAMOPEN -.. - - - - -============================== ====================== -``THREEPARAMOPEN (x, y, z)`` ``open(x,y,z)`` -============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_ANONYMOUS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_ANONYMOUS.rst.txt deleted file mode 100644 index 696ca8093b70..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_ANONYMOUS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-ANONYMOUS-data: - -TKT_FLG_ANONYMOUS -================= - -.. -.. data:: TKT_FLG_ANONYMOUS -.. - - - - -======================== ====================== -``TKT_FLG_ANONYMOUS`` ``0x00008000`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_ENC_PA_REP.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_ENC_PA_REP.rst.txt deleted file mode 100644 index b575553e913e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_ENC_PA_REP.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-ENC-PA-REP-data: - -TKT_FLG_ENC_PA_REP -================== - -.. -.. data:: TKT_FLG_ENC_PA_REP -.. - - - - -========================= ====================== -``TKT_FLG_ENC_PA_REP`` ``0x00010000`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_FORWARDABLE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_FORWARDABLE.rst.txt deleted file mode 100644 index ede984cb68b8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_FORWARDABLE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-FORWARDABLE-data: - -TKT_FLG_FORWARDABLE -=================== - -.. -.. data:: TKT_FLG_FORWARDABLE -.. - - - - -========================== ====================== -``TKT_FLG_FORWARDABLE`` ``0x40000000`` -========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_FORWARDED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_FORWARDED.rst.txt deleted file mode 100644 index 0f3d490d6cdb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_FORWARDED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-FORWARDED-data: - -TKT_FLG_FORWARDED -================= - -.. -.. data:: TKT_FLG_FORWARDED -.. - - - - -======================== ====================== -``TKT_FLG_FORWARDED`` ``0x20000000`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_HW_AUTH.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_HW_AUTH.rst.txt deleted file mode 100644 index 30baa34e5120..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_HW_AUTH.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-HW-AUTH-data: - -TKT_FLG_HW_AUTH -=============== - -.. -.. data:: TKT_FLG_HW_AUTH -.. - - - - -====================== ====================== -``TKT_FLG_HW_AUTH`` ``0x00100000`` -====================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_INITIAL.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_INITIAL.rst.txt deleted file mode 100644 index 6e3d8c318079..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_INITIAL.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-INITIAL-data: - -TKT_FLG_INITIAL -=============== - -.. -.. data:: TKT_FLG_INITIAL -.. - - - - -====================== ====================== -``TKT_FLG_INITIAL`` ``0x00400000`` -====================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_INVALID.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_INVALID.rst.txt deleted file mode 100644 index 8d4465bb2f09..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_INVALID.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-INVALID-data: - -TKT_FLG_INVALID -=============== - -.. -.. data:: TKT_FLG_INVALID -.. - - - - -====================== ====================== -``TKT_FLG_INVALID`` ``0x01000000`` -====================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_MAY_POSTDATE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_MAY_POSTDATE.rst.txt deleted file mode 100644 index 935d05e77218..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_MAY_POSTDATE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-MAY-POSTDATE-data: - -TKT_FLG_MAY_POSTDATE -==================== - -.. -.. data:: TKT_FLG_MAY_POSTDATE -.. - - - - -=========================== ====================== -``TKT_FLG_MAY_POSTDATE`` ``0x04000000`` -=========================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_OK_AS_DELEGATE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_OK_AS_DELEGATE.rst.txt deleted file mode 100644 index bee1deb21e0a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_OK_AS_DELEGATE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-OK-AS-DELEGATE-data: - -TKT_FLG_OK_AS_DELEGATE -====================== - -.. -.. data:: TKT_FLG_OK_AS_DELEGATE -.. - - - - -============================= ====================== -``TKT_FLG_OK_AS_DELEGATE`` ``0x00040000`` -============================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_POSTDATED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_POSTDATED.rst.txt deleted file mode 100644 index 46a5cf674d3f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_POSTDATED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-POSTDATED-data: - -TKT_FLG_POSTDATED -================= - -.. -.. data:: TKT_FLG_POSTDATED -.. - - - - -======================== ====================== -``TKT_FLG_POSTDATED`` ``0x02000000`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_PRE_AUTH.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_PRE_AUTH.rst.txt deleted file mode 100644 index 69735bd1e1ad..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_PRE_AUTH.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-PRE-AUTH-data: - -TKT_FLG_PRE_AUTH -================ - -.. -.. data:: TKT_FLG_PRE_AUTH -.. - - - - -======================= ====================== -``TKT_FLG_PRE_AUTH`` ``0x00200000`` -======================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_PROXIABLE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_PROXIABLE.rst.txt deleted file mode 100644 index c73a62d64560..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_PROXIABLE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-PROXIABLE-data: - -TKT_FLG_PROXIABLE -================= - -.. -.. data:: TKT_FLG_PROXIABLE -.. - - - - -======================== ====================== -``TKT_FLG_PROXIABLE`` ``0x10000000`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_PROXY.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_PROXY.rst.txt deleted file mode 100644 index b749830ebf1a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_PROXY.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-PROXY-data: - -TKT_FLG_PROXY -============= - -.. -.. data:: TKT_FLG_PROXY -.. - - - - -==================== ====================== -``TKT_FLG_PROXY`` ``0x08000000`` -==================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_RENEWABLE.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_RENEWABLE.rst.txt deleted file mode 100644 index 5d87dc970913..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_RENEWABLE.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-RENEWABLE-data: - -TKT_FLG_RENEWABLE -================= - -.. -.. data:: TKT_FLG_RENEWABLE -.. - - - - -======================== ====================== -``TKT_FLG_RENEWABLE`` ``0x00800000`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_TRANSIT_POLICY_CHECKED.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_TRANSIT_POLICY_CHECKED.rst.txt deleted file mode 100644 index 082a1f0996e1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/TKT_FLG_TRANSIT_POLICY_CHECKED.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _TKT-FLG-TRANSIT-POLICY-CHECKED-data: - -TKT_FLG_TRANSIT_POLICY_CHECKED -============================== - -.. -.. data:: TKT_FLG_TRANSIT_POLICY_CHECKED -.. - - - - -===================================== ====================== -``TKT_FLG_TRANSIT_POLICY_CHECKED`` ``0x00080000`` -===================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/VALID_INT_BITS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/VALID_INT_BITS.rst.txt deleted file mode 100644 index 0267d4215d25..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/VALID_INT_BITS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _VALID-INT-BITS-data: - -VALID_INT_BITS -============== - -.. -.. data:: VALID_INT_BITS -.. - - - - -===================== ====================== -``VALID_INT_BITS`` ``INT_MAX`` -===================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/VALID_UINT_BITS.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/VALID_UINT_BITS.rst.txt deleted file mode 100644 index efba9a80bb34..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/VALID_UINT_BITS.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _VALID-UINT-BITS-data: - -VALID_UINT_BITS -=============== - -.. -.. data:: VALID_UINT_BITS -.. - - - - -====================== ====================== -``VALID_UINT_BITS`` ``UINT_MAX`` -====================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/index.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/index.rst.txt deleted file mode 100644 index c1bda5c6c417..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/index.rst.txt +++ /dev/null @@ -1,401 +0,0 @@ -krb5 simple macros -========================= - -Public -------- - -.. toctree:: - :maxdepth: 1 - - ADDRTYPE_ADDRPORT.rst - ADDRTYPE_CHAOS.rst - ADDRTYPE_DIRECTIONAL.rst - ADDRTYPE_DDP.rst - ADDRTYPE_INET.rst - ADDRTYPE_INET6.rst - ADDRTYPE_IPPORT.rst - ADDRTYPE_ISO.rst - ADDRTYPE_IS_LOCAL.rst - ADDRTYPE_NETBIOS.rst - ADDRTYPE_XNS.rst - ADDRTYPE_UNIXSOCK.rst - AD_TYPE_EXTERNAL.rst - AD_TYPE_FIELD_TYPE_MASK.rst - AD_TYPE_REGISTERED.rst - AD_TYPE_RESERVED.rst - AP_OPTS_ETYPE_NEGOTIATION.rst - AP_OPTS_CBT_FLAG.rst - AP_OPTS_MUTUAL_REQUIRED.rst - AP_OPTS_RESERVED.rst - AP_OPTS_USE_SESSION_KEY.rst - AP_OPTS_USE_SUBKEY.rst - AP_OPTS_WIRE_MASK.rst - CKSUMTYPE_CMAC_CAMELLIA128.rst - CKSUMTYPE_CMAC_CAMELLIA256.rst - CKSUMTYPE_CRC32.rst - CKSUMTYPE_DESCBC.rst - CKSUMTYPE_HMAC_MD5_ARCFOUR.rst - CKSUMTYPE_HMAC_SHA1_96_AES128.rst - CKSUMTYPE_HMAC_SHA1_96_AES256.rst - CKSUMTYPE_HMAC_SHA256_128_AES128.rst - CKSUMTYPE_HMAC_SHA384_192_AES256.rst - CKSUMTYPE_HMAC_SHA1_DES3.rst - CKSUMTYPE_MD5_HMAC_ARCFOUR.rst - CKSUMTYPE_NIST_SHA.rst - CKSUMTYPE_RSA_MD4.rst - CKSUMTYPE_RSA_MD4_DES.rst - CKSUMTYPE_RSA_MD5.rst - CKSUMTYPE_RSA_MD5_DES.rst - CKSUMTYPE_SHA1.rst - ENCTYPE_AES128_CTS_HMAC_SHA1_96.rst - ENCTYPE_AES128_CTS_HMAC_SHA256_128.rst - ENCTYPE_AES256_CTS_HMAC_SHA1_96.rst - ENCTYPE_AES256_CTS_HMAC_SHA384_192.rst - ENCTYPE_ARCFOUR_HMAC.rst - ENCTYPE_ARCFOUR_HMAC_EXP.rst - ENCTYPE_CAMELLIA128_CTS_CMAC.rst - ENCTYPE_CAMELLIA256_CTS_CMAC.rst - ENCTYPE_DES3_CBC_ENV.rst - ENCTYPE_DES3_CBC_RAW.rst - ENCTYPE_DES3_CBC_SHA.rst - ENCTYPE_DES3_CBC_SHA1.rst - ENCTYPE_DES_CBC_CRC.rst - ENCTYPE_DES_CBC_MD4.rst - ENCTYPE_DES_CBC_MD5.rst - ENCTYPE_DES_CBC_RAW.rst - ENCTYPE_DES_HMAC_SHA1.rst - ENCTYPE_DSA_SHA1_CMS.rst - ENCTYPE_MD5_RSA_CMS.rst - ENCTYPE_NULL.rst - ENCTYPE_RC2_CBC_ENV.rst - ENCTYPE_RSA_ENV.rst - ENCTYPE_RSA_ES_OAEP_ENV.rst - ENCTYPE_SHA1_RSA_CMS.rst - ENCTYPE_UNKNOWN.rst - KDC_OPT_ALLOW_POSTDATE.rst - KDC_OPT_CANONICALIZE.rst - KDC_OPT_CNAME_IN_ADDL_TKT.rst - KDC_OPT_DISABLE_TRANSITED_CHECK.rst - KDC_OPT_ENC_TKT_IN_SKEY.rst - KDC_OPT_FORWARDABLE.rst - KDC_OPT_FORWARDED.rst - KDC_OPT_POSTDATED.rst - KDC_OPT_PROXIABLE.rst - KDC_OPT_PROXY.rst - KDC_OPT_RENEW.rst - KDC_OPT_RENEWABLE.rst - KDC_OPT_RENEWABLE_OK.rst - KDC_OPT_REQUEST_ANONYMOUS.rst - KDC_OPT_VALIDATE.rst - KDC_TKT_COMMON_MASK.rst - KRB5_ALTAUTH_ATT_CHALLENGE_RESPONSE.rst - KRB5_ANONYMOUS_PRINCSTR.rst - KRB5_ANONYMOUS_REALMSTR.rst - KRB5_AP_REP.rst - KRB5_AP_REQ.rst - KRB5_AS_REP.rst - KRB5_AS_REQ.rst - KRB5_AUTHDATA_AND_OR.rst - KRB5_AUTHDATA_AP_OPTIONS.rst - KRB5_AUTHDATA_AUTH_INDICATOR.rst - KRB5_AUTHDATA_CAMMAC.rst - KRB5_AUTHDATA_ETYPE_NEGOTIATION.rst - KRB5_AUTHDATA_FX_ARMOR.rst - KRB5_AUTHDATA_IF_RELEVANT.rst - KRB5_AUTHDATA_INITIAL_VERIFIED_CAS.rst - KRB5_AUTHDATA_KDC_ISSUED.rst - KRB5_AUTHDATA_MANDATORY_FOR_KDC.rst - KRB5_AUTHDATA_OSF_DCE.rst - KRB5_AUTHDATA_SESAME.rst - KRB5_AUTHDATA_SIGNTICKET.rst - KRB5_AUTHDATA_WIN2K_PAC.rst - KRB5_AUTH_CONTEXT_DO_SEQUENCE.rst - KRB5_AUTH_CONTEXT_DO_TIME.rst - KRB5_AUTH_CONTEXT_GENERATE_LOCAL_ADDR.rst - KRB5_AUTH_CONTEXT_GENERATE_LOCAL_FULL_ADDR.rst - KRB5_AUTH_CONTEXT_GENERATE_REMOTE_ADDR.rst - KRB5_AUTH_CONTEXT_GENERATE_REMOTE_FULL_ADDR.rst - KRB5_AUTH_CONTEXT_PERMIT_ALL.rst - KRB5_AUTH_CONTEXT_RET_SEQUENCE.rst - KRB5_AUTH_CONTEXT_RET_TIME.rst - KRB5_AUTH_CONTEXT_USE_SUBKEY.rst - KRB5_CRED.rst - KRB5_CRYPTO_TYPE_CHECKSUM.rst - KRB5_CRYPTO_TYPE_DATA.rst - KRB5_CRYPTO_TYPE_EMPTY.rst - KRB5_CRYPTO_TYPE_HEADER.rst - KRB5_CRYPTO_TYPE_PADDING.rst - KRB5_CRYPTO_TYPE_SIGN_ONLY.rst - KRB5_CRYPTO_TYPE_STREAM.rst - KRB5_CRYPTO_TYPE_TRAILER.rst - KRB5_CYBERSAFE_SECUREID.rst - KRB5_DOMAIN_X500_COMPRESS.rst - KRB5_ENCPADATA_REQ_ENC_PA_REP.rst - KRB5_ERROR.rst - KRB5_FAST_REQUIRED.rst - KRB5_GC_CACHED.rst - KRB5_GC_CANONICALIZE.rst - KRB5_GC_CONSTRAINED_DELEGATION.rst - KRB5_GC_FORWARDABLE.rst - KRB5_GC_NO_STORE.rst - KRB5_GC_NO_TRANSIT_CHECK.rst - KRB5_GC_USER_USER.rst - KRB5_GET_INIT_CREDS_OPT_ADDRESS_LIST.rst - KRB5_GET_INIT_CREDS_OPT_ANONYMOUS.rst - KRB5_GET_INIT_CREDS_OPT_CANONICALIZE.rst - KRB5_GET_INIT_CREDS_OPT_CHG_PWD_PRMPT.rst - KRB5_GET_INIT_CREDS_OPT_ETYPE_LIST.rst - KRB5_GET_INIT_CREDS_OPT_FORWARDABLE.rst - KRB5_GET_INIT_CREDS_OPT_PREAUTH_LIST.rst - KRB5_GET_INIT_CREDS_OPT_PROXIABLE.rst - KRB5_GET_INIT_CREDS_OPT_RENEW_LIFE.rst - KRB5_GET_INIT_CREDS_OPT_SALT.rst - KRB5_GET_INIT_CREDS_OPT_TKT_LIFE.rst - KRB5_INIT_CONTEXT_SECURE.rst - KRB5_INIT_CONTEXT_KDC.rst - KRB5_INIT_CREDS_STEP_FLAG_CONTINUE.rst - KRB5_INT16_MAX.rst - KRB5_INT16_MIN.rst - KRB5_INT32_MAX.rst - KRB5_INT32_MIN.rst - KRB5_KEYUSAGE_AD_ITE.rst - KRB5_KEYUSAGE_AD_KDCISSUED_CKSUM.rst - KRB5_KEYUSAGE_AD_MTE.rst - KRB5_KEYUSAGE_AD_SIGNEDPATH.rst - KRB5_KEYUSAGE_APP_DATA_CKSUM.rst - KRB5_KEYUSAGE_APP_DATA_ENCRYPT.rst - KRB5_KEYUSAGE_AP_REP_ENCPART.rst - KRB5_KEYUSAGE_AP_REQ_AUTH.rst - KRB5_KEYUSAGE_AP_REQ_AUTH_CKSUM.rst - KRB5_KEYUSAGE_AS_REP_ENCPART.rst - KRB5_KEYUSAGE_AS_REQ.rst - KRB5_KEYUSAGE_AS_REQ_PA_ENC_TS.rst - KRB5_KEYUSAGE_CAMMAC.rst - KRB5_KEYUSAGE_ENC_CHALLENGE_CLIENT.rst - KRB5_KEYUSAGE_ENC_CHALLENGE_KDC.rst - KRB5_KEYUSAGE_FAST_ENC.rst - KRB5_KEYUSAGE_FAST_FINISHED.rst - KRB5_KEYUSAGE_FAST_REP.rst - KRB5_KEYUSAGE_FAST_REQ_CHKSUM.rst - KRB5_KEYUSAGE_GSS_TOK_MIC.rst - KRB5_KEYUSAGE_GSS_TOK_WRAP_INTEG.rst - KRB5_KEYUSAGE_GSS_TOK_WRAP_PRIV.rst - KRB5_KEYUSAGE_FINISHED.rst - KRB5_KEYUSAGE_IAKERB_FINISHED.rst - KRB5_KEYUSAGE_KDC_REP_TICKET.rst - KRB5_KEYUSAGE_KRB_CRED_ENCPART.rst - KRB5_KEYUSAGE_KRB_ERROR_CKSUM.rst - KRB5_KEYUSAGE_KRB_PRIV_ENCPART.rst - KRB5_KEYUSAGE_KRB_SAFE_CKSUM.rst - KRB5_KEYUSAGE_PA_AS_FRESHNESS.rst - KRB5_KEYUSAGE_PA_FX_COOKIE.rst - KRB5_KEYUSAGE_PA_OTP_REQUEST.rst - KRB5_KEYUSAGE_PA_PKINIT_KX.rst - KRB5_KEYUSAGE_PA_S4U_X509_USER_REPLY.rst - KRB5_KEYUSAGE_PA_S4U_X509_USER_REQUEST.rst - KRB5_KEYUSAGE_PA_SAM_CHALLENGE_CKSUM.rst - KRB5_KEYUSAGE_PA_SAM_CHALLENGE_TRACKID.rst - KRB5_KEYUSAGE_PA_SAM_RESPONSE.rst - KRB5_KEYUSAGE_SPAKE.rst - KRB5_KEYUSAGE_TGS_REP_ENCPART_SESSKEY.rst - KRB5_KEYUSAGE_TGS_REP_ENCPART_SUBKEY.rst - KRB5_KEYUSAGE_TGS_REQ_AD_SESSKEY.rst - KRB5_KEYUSAGE_TGS_REQ_AD_SUBKEY.rst - KRB5_KEYUSAGE_TGS_REQ_AUTH.rst - KRB5_KEYUSAGE_TGS_REQ_AUTH_CKSUM.rst - KRB5_KPASSWD_ACCESSDENIED.rst - KRB5_KPASSWD_AUTHERROR.rst - KRB5_KPASSWD_BAD_VERSION.rst - KRB5_KPASSWD_HARDERROR.rst - KRB5_KPASSWD_INITIAL_FLAG_NEEDED.rst - KRB5_KPASSWD_MALFORMED.rst - KRB5_KPASSWD_SOFTERROR.rst - KRB5_KPASSWD_SUCCESS.rst - KRB5_LRQ_ALL_ACCT_EXPTIME.rst - KRB5_LRQ_ALL_LAST_INITIAL.rst - KRB5_LRQ_ALL_LAST_RENEWAL.rst - KRB5_LRQ_ALL_LAST_REQ.rst - KRB5_LRQ_ALL_LAST_TGT.rst - KRB5_LRQ_ALL_LAST_TGT_ISSUED.rst - KRB5_LRQ_ALL_PW_EXPTIME.rst - KRB5_LRQ_NONE.rst - KRB5_LRQ_ONE_ACCT_EXPTIME.rst - KRB5_LRQ_ONE_LAST_INITIAL.rst - KRB5_LRQ_ONE_LAST_RENEWAL.rst - KRB5_LRQ_ONE_LAST_REQ.rst - KRB5_LRQ_ONE_LAST_TGT.rst - KRB5_LRQ_ONE_LAST_TGT_ISSUED.rst - KRB5_LRQ_ONE_PW_EXPTIME.rst - KRB5_NT_ENTERPRISE_PRINCIPAL.rst - KRB5_NT_ENT_PRINCIPAL_AND_ID.rst - KRB5_NT_MS_PRINCIPAL.rst - KRB5_NT_MS_PRINCIPAL_AND_ID.rst - KRB5_NT_PRINCIPAL.rst - KRB5_NT_SMTP_NAME.rst - KRB5_NT_SRV_HST.rst - KRB5_NT_SRV_INST.rst - KRB5_NT_SRV_XHST.rst - KRB5_NT_UID.rst - KRB5_NT_UNKNOWN.rst - KRB5_NT_WELLKNOWN.rst - KRB5_NT_X500_PRINCIPAL.rst - KRB5_PAC_ATTRIBUTES_INFO.rst - KRB5_PAC_CLIENT_INFO.rst - KRB5_PAC_CLIENT_CLAIMS.rst - KRB5_PAC_CREDENTIALS_INFO.rst - KRB5_PAC_DELEGATION_INFO.rst - KRB5_PAC_DEVICE_CLAIMS.rst - KRB5_PAC_DEVICE_INFO.rst - KRB5_PAC_LOGON_INFO.rst - KRB5_PAC_PRIVSVR_CHECKSUM.rst - KRB5_PAC_REQUESTOR.rst - KRB5_PAC_SERVER_CHECKSUM.rst - KRB5_PAC_TICKET_CHECKSUM.rst - KRB5_PAC_UPN_DNS_INFO.rst - KRB5_PAC_FULL_CHECKSUM.rst - KRB5_PADATA_AFS3_SALT.rst - KRB5_PADATA_AP_REQ.rst - KRB5_PADATA_AS_CHECKSUM.rst - KRB5_PADATA_AS_FRESHNESS.rst - KRB5_PADATA_ENCRYPTED_CHALLENGE.rst - KRB5_PADATA_ENC_SANDIA_SECURID.rst - KRB5_PADATA_ENC_TIMESTAMP.rst - KRB5_PADATA_ENC_UNIX_TIME.rst - KRB5_PADATA_ETYPE_INFO.rst - KRB5_PADATA_ETYPE_INFO2.rst - KRB5_PADATA_FOR_USER.rst - KRB5_PADATA_FX_COOKIE.rst - KRB5_PADATA_FX_ERROR.rst - KRB5_PADATA_FX_FAST.rst - KRB5_PADATA_GET_FROM_TYPED_DATA.rst - KRB5_PADATA_NONE.rst - KRB5_PADATA_OSF_DCE.rst - KRB5_PADATA_OTP_CHALLENGE.rst - KRB5_PADATA_OTP_PIN_CHANGE.rst - KRB5_PADATA_OTP_REQUEST.rst - KRB5_PADATA_PAC_OPTIONS.rst - KRB5_PADATA_PAC_REQUEST.rst - KRB5_PADATA_PKINIT_KX.rst - KRB5_PADATA_PK_AS_REP.rst - KRB5_PADATA_PK_AS_REP_OLD.rst - KRB5_PADATA_PK_AS_REQ.rst - KRB5_PADATA_PK_AS_REQ_OLD.rst - KRB5_PADATA_PW_SALT.rst - KRB5_PADATA_REFERRAL.rst - KRB5_PADATA_S4U_X509_USER.rst - KRB5_PADATA_SAM_CHALLENGE.rst - KRB5_PADATA_SAM_CHALLENGE_2.rst - KRB5_PADATA_SAM_REDIRECT.rst - KRB5_PADATA_SAM_RESPONSE.rst - KRB5_PADATA_SAM_RESPONSE_2.rst - KRB5_PADATA_SESAME.rst - KRB5_PADATA_SPAKE.rst - KRB5_PADATA_REDHAT_IDP_OAUTH2.rst - KRB5_PADATA_REDHAT_PASSKEY.rst - KRB5_PADATA_SVR_REFERRAL_INFO.rst - KRB5_PADATA_TGS_REQ.rst - KRB5_PADATA_USE_SPECIFIED_KVNO.rst - KRB5_PRINCIPAL_COMPARE_CASEFOLD.rst - KRB5_PRINCIPAL_COMPARE_ENTERPRISE.rst - KRB5_PRINCIPAL_COMPARE_IGNORE_REALM.rst - KRB5_PRINCIPAL_COMPARE_UTF8.rst - KRB5_PRINCIPAL_PARSE_ENTERPRISE.rst - KRB5_PRINCIPAL_PARSE_IGNORE_REALM.rst - KRB5_PRINCIPAL_PARSE_NO_DEF_REALM.rst - KRB5_PRINCIPAL_PARSE_NO_REALM.rst - KRB5_PRINCIPAL_PARSE_REQUIRE_REALM.rst - KRB5_PRINCIPAL_UNPARSE_DISPLAY.rst - KRB5_PRINCIPAL_UNPARSE_NO_REALM.rst - KRB5_PRINCIPAL_UNPARSE_SHORT.rst - KRB5_PRIV.rst - KRB5_PROMPT_TYPE_NEW_PASSWORD.rst - KRB5_PROMPT_TYPE_NEW_PASSWORD_AGAIN.rst - KRB5_PROMPT_TYPE_PASSWORD.rst - KRB5_PROMPT_TYPE_PREAUTH.rst - KRB5_PVNO.rst - KRB5_REALM_BRANCH_CHAR.rst - KRB5_RECVAUTH_BADAUTHVERS.rst - KRB5_RECVAUTH_SKIP_VERSION.rst - KRB5_REFERRAL_REALM.rst - KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_COUNT_LOW.rst - KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_FINAL_TRY.rst - KRB5_RESPONDER_PKINIT_FLAGS_TOKEN_USER_PIN_LOCKED.rst - KRB5_RESPONDER_QUESTION_PKINIT.rst - KRB5_RESPONDER_OTP_FLAGS_COLLECT_PIN.rst - KRB5_RESPONDER_OTP_FLAGS_COLLECT_TOKEN.rst - KRB5_RESPONDER_OTP_FLAGS_NEXTOTP.rst - KRB5_RESPONDER_OTP_FLAGS_SEPARATE_PIN.rst - KRB5_RESPONDER_OTP_FORMAT_ALPHANUMERIC.rst - KRB5_RESPONDER_OTP_FORMAT_DECIMAL.rst - KRB5_RESPONDER_OTP_FORMAT_HEXADECIMAL.rst - KRB5_RESPONDER_QUESTION_OTP.rst - KRB5_RESPONDER_QUESTION_PASSWORD.rst - KRB5_SAFE.rst - KRB5_SAM_MUST_PK_ENCRYPT_SAD.rst - KRB5_SAM_SEND_ENCRYPTED_SAD.rst - KRB5_SAM_USE_SAD_AS_KEY.rst - KRB5_TC_MATCH_2ND_TKT.rst - KRB5_TC_MATCH_AUTHDATA.rst - KRB5_TC_MATCH_FLAGS.rst - KRB5_TC_MATCH_FLAGS_EXACT.rst - KRB5_TC_MATCH_IS_SKEY.rst - KRB5_TC_MATCH_KTYPE.rst - KRB5_TC_MATCH_SRV_NAMEONLY.rst - KRB5_TC_MATCH_TIMES.rst - KRB5_TC_MATCH_TIMES_EXACT.rst - KRB5_TC_NOTICKET.rst - KRB5_TC_OPENCLOSE.rst - KRB5_TC_SUPPORTED_KTYPES.rst - KRB5_TGS_NAME.rst - KRB5_TGS_NAME_SIZE.rst - KRB5_TGS_REP.rst - KRB5_TGS_REQ.rst - KRB5_TKT_CREDS_STEP_FLAG_CONTINUE.rst - KRB5_VERIFY_INIT_CREDS_OPT_AP_REQ_NOFAIL.rst - KRB5_WELLKNOWN_NAMESTR.rst - LR_TYPE_INTERPRETATION_MASK.rst - LR_TYPE_THIS_SERVER_ONLY.rst - MAX_KEYTAB_NAME_LEN.rst - MSEC_DIRBIT.rst - MSEC_VAL_MASK.rst - SALT_TYPE_AFS_LENGTH.rst - SALT_TYPE_NO_LENGTH.rst - THREEPARAMOPEN.rst - TKT_FLG_ANONYMOUS.rst - TKT_FLG_ENC_PA_REP.rst - TKT_FLG_FORWARDABLE.rst - TKT_FLG_FORWARDED.rst - TKT_FLG_HW_AUTH.rst - TKT_FLG_INITIAL.rst - TKT_FLG_INVALID.rst - TKT_FLG_MAY_POSTDATE.rst - TKT_FLG_OK_AS_DELEGATE.rst - TKT_FLG_POSTDATED.rst - TKT_FLG_PRE_AUTH.rst - TKT_FLG_PROXIABLE.rst - TKT_FLG_PROXY.rst - TKT_FLG_RENEWABLE.rst - TKT_FLG_TRANSIT_POLICY_CHECKED.rst - VALID_INT_BITS.rst - VALID_UINT_BITS.rst - krb5_const.rst - krb5_princ_component.rst - krb5_princ_name.rst - krb5_princ_realm.rst - krb5_princ_set_realm.rst - krb5_princ_set_realm_data.rst - krb5_princ_set_realm_length.rst - krb5_princ_size.rst - krb5_princ_type.rst - krb5_roundup.rst - krb5_x.rst - krb5_xc.rst - -Deprecated macros ------------------------------- - -.. toctree:: - :maxdepth: 1 - - krb524_convert_creds_kdc.rst - krb524_init_ets.rst diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb524_convert_creds_kdc.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb524_convert_creds_kdc.rst.txt deleted file mode 100644 index 9316160f7379..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb524_convert_creds_kdc.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb524-convert-creds-kdc-data: - -krb524_convert_creds_kdc -======================== - -.. -.. data:: krb524_convert_creds_kdc -.. - - - - -=============================== ====================== -``krb524_convert_creds_kdc`` ``krb5_524_convert_creds`` -=============================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb524_init_ets.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb524_init_ets.rst.txt deleted file mode 100644 index dfb8e2024266..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb524_init_ets.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb524-init-ets-data: - -krb524_init_ets -=============== - -.. -.. data:: krb524_init_ets -.. - - - - -========================= ====================== -``krb524_init_ets (x)`` ``(0)`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_const.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_const.rst.txt deleted file mode 100644 index 1baaa0968c9f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_const.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-const-data: - -krb5_const -========== - -.. -.. data:: krb5_const -.. - - - - -================= ====================== -``krb5_const`` ``const`` -================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_component.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_component.rst.txt deleted file mode 100644 index cdca4bffb034..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_component.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-princ-component-data: - -krb5_princ_component -==================== - -.. -.. data:: krb5_princ_component -.. - - - - -============================================== ====================== -``krb5_princ_component (context, princ, i)`` `` (((i) < krb5_princ_size(context, princ)) ? (princ)->data + (i) : NULL)`` -============================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_name.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_name.rst.txt deleted file mode 100644 index 31481305662e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_name.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-princ-name-data: - -krb5_princ_name -=============== - -.. -.. data:: krb5_princ_name -.. - - - - -====================================== ====================== -``krb5_princ_name (context, princ)`` ``(princ)->data`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_realm.rst.txt deleted file mode 100644 index 562a2675966b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_realm.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-princ-realm-data: - -krb5_princ_realm -================ - -.. -.. data:: krb5_princ_realm -.. - - - - -======================================= ====================== -``krb5_princ_realm (context, princ)`` ``(&(princ)->realm)`` -======================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_set_realm.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_set_realm.rst.txt deleted file mode 100644 index dc05314afe77..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_set_realm.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-princ-set-realm-data: - -krb5_princ_set_realm -==================== - -.. -.. data:: krb5_princ_set_realm -.. - - - - -================================================== ====================== -``krb5_princ_set_realm (context, princ, value)`` ``((princ)->realm = *(value))`` -================================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_set_realm_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_set_realm_data.rst.txt deleted file mode 100644 index 4ded1b3a8bfd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_set_realm_data.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-princ-set-realm-data-data: - -krb5_princ_set_realm_data -========================= - -.. -.. data:: krb5_princ_set_realm_data -.. - - - - -======================================================= ====================== -``krb5_princ_set_realm_data (context, princ, value)`` ``(princ)->realm.data = (value)`` -======================================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_set_realm_length.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_set_realm_length.rst.txt deleted file mode 100644 index 81ea192b5be5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_set_realm_length.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-princ-set-realm-length-data: - -krb5_princ_set_realm_length -=========================== - -.. -.. data:: krb5_princ_set_realm_length -.. - - - - -========================================================= ====================== -``krb5_princ_set_realm_length (context, princ, value)`` ``(princ)->realm.length = (value)`` -========================================================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_size.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_size.rst.txt deleted file mode 100644 index 251fad5daaaa..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_size.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-princ-size-data: - -krb5_princ_size -=============== - -.. -.. data:: krb5_princ_size -.. - - - - -====================================== ====================== -``krb5_princ_size (context, princ)`` ``(princ)->length`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_type.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_type.rst.txt deleted file mode 100644 index a4ff8a4bd883..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_princ_type.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-princ-type-data: - -krb5_princ_type -=============== - -.. -.. data:: krb5_princ_type -.. - - - - -====================================== ====================== -``krb5_princ_type (context, princ)`` ``(princ)->type`` -====================================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_roundup.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_roundup.rst.txt deleted file mode 100644 index db81d04b6dc3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_roundup.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-roundup-data: - -krb5_roundup -============ - -.. -.. data:: krb5_roundup -.. - - - - -========================= ====================== -``krb5_roundup (x, y)`` ``((((x) + (y) - 1)/(y))*(y))`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_x.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_x.rst.txt deleted file mode 100644 index eaf3f869b939..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_x.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-x-data: - -krb5_x -====== - -.. -.. data:: krb5_x -.. - - - - -======================== ====================== -``krb5_x (ptr, args)`` ``((ptr)?((*(ptr)) args):(abort(),1))`` -======================== ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_xc.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_xc.rst.txt deleted file mode 100644 index 4d452672afd6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/macros/krb5_xc.rst.txt +++ /dev/null @@ -1,17 +0,0 @@ -.. highlight:: c - -.. _krb5-xc-data: - -krb5_xc -======= - -.. -.. data:: krb5_xc -.. - - - - -========================= ====================== -``krb5_xc (ptr, args)`` ``((ptr)?((*(ptr)) args):(abort(),(char*)0))`` -========================= ====================== diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/index.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/index.rst.txt deleted file mode 100644 index d8d2a8f3cd2d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/index.rst.txt +++ /dev/null @@ -1,108 +0,0 @@ -krb5 types and structures -========================= - -Public -------- - -.. toctree:: - :maxdepth: 1 - - krb5_address.rst - krb5_addrtype.rst - krb5_ap_req.rst - krb5_ap_rep.rst - krb5_ap_rep_enc_part.rst - krb5_authdata.rst - krb5_authdatatype.rst - krb5_authenticator.rst - krb5_boolean.rst - krb5_checksum.rst - krb5_const_pointer.rst - krb5_const_principal.rst - krb5_cred.rst - krb5_cred_enc_part.rst - krb5_cred_info.rst - krb5_creds.rst - krb5_crypto_iov.rst - krb5_cryptotype.rst - krb5_data.rst - krb5_deltat.rst - krb5_enc_data.rst - krb5_enc_kdc_rep_part.rst - krb5_enc_tkt_part.rst - krb5_encrypt_block.rst - krb5_enctype.rst - krb5_error.rst - krb5_error_code.rst - krb5_expire_callback_func.rst - krb5_flags.rst - krb5_get_init_creds_opt.rst - krb5_gic_opt_pa_data.rst - krb5_int16.rst - krb5_int32.rst - krb5_kdc_rep.rst - krb5_kdc_req.rst - krb5_keyblock.rst - krb5_keytab_entry.rst - krb5_keyusage.rst - krb5_kt_cursor.rst - krb5_kvno.rst - krb5_last_req_entry.rst - krb5_magic.rst - krb5_mk_req_checksum_func.rst - krb5_msgtype.rst - krb5_octet.rst - krb5_pa_pac_req.rst - krb5_pa_server_referral_data.rst - krb5_pa_svr_referral_data.rst - krb5_pa_data.rst - krb5_pointer.rst - krb5_post_recv_fn.rst - krb5_pre_send_fn.rst - krb5_preauthtype.rst - krb5_principal.rst - krb5_principal_data.rst - krb5_prompt.rst - krb5_prompt_type.rst - krb5_prompter_fct.rst - krb5_pwd_data.rst - krb5_responder_context.rst - krb5_responder_fn.rst - krb5_responder_otp_challenge.rst - krb5_responder_otp_tokeninfo.rst - krb5_responder_pkinit_challenge.rst - krb5_responder_pkinit_identity.rst - krb5_response.rst - krb5_replay_data.rst - krb5_ticket.rst - krb5_ticket_times.rst - krb5_timestamp.rst - krb5_tkt_authent.rst - krb5_trace_callback.rst - krb5_trace_info.rst - krb5_transited.rst - krb5_typed_data.rst - krb5_ui_2.rst - krb5_ui_4.rst - krb5_verify_init_creds_opt.rst - passwd_phrase_element.rst - - -Internal ---------- - -.. toctree:: - :maxdepth: 1 - - krb5_auth_context.rst - krb5_cksumtype - krb5_context.rst - krb5_cc_cursor.rst - krb5_ccache.rst - krb5_cccol_cursor.rst - krb5_init_creds_context.rst - krb5_key.rst - krb5_keytab.rst - krb5_pac.rst - krb5_rcache.rst - krb5_tkt_creds_context.rst diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_address.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_address.rst.txt deleted file mode 100644 index 1b433789c6ce..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_address.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -.. highlight:: c - -.. _krb5-address-struct: - -krb5_address -============ - -.. -.. c:type:: krb5_address -.. - -Structure for address. - - - -Declaration ------------- - -typedef struct _krb5_address krb5_address - - -Members ---------- - - -.. c:member:: krb5_magic krb5_address.magic - - - - -.. c:member:: krb5_addrtype krb5_address.addrtype - - - - -.. c:member:: unsigned int krb5_address.length - - - - -.. c:member:: krb5_octet * krb5_address.contents - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_addrtype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_addrtype.rst.txt deleted file mode 100644 index 4c6191631b31..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_addrtype.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-addrtype-struct: - -krb5_addrtype -============= - -.. -.. c:type:: krb5_addrtype -.. - - - - -Declaration ------------- - -typedef krb5_int32 krb5_addrtype - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ap_rep.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ap_rep.rst.txt deleted file mode 100644 index e2e7e7dfcf54..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ap_rep.rst.txt +++ /dev/null @@ -1,35 +0,0 @@ -.. highlight:: c - -.. _krb5-ap-rep-struct: - -krb5_ap_rep -=========== - -.. -.. c:type:: krb5_ap_rep -.. - -C representaton of AP-REP message. - -The server's response to a client's request for mutual authentication. - -Declaration ------------- - -typedef struct _krb5_ap_rep krb5_ap_rep - - -Members ---------- - - -.. c:member:: krb5_magic krb5_ap_rep.magic - - - - -.. c:member:: krb5_enc_data krb5_ap_rep.enc_part - - Ciphertext of ApRepEncPart. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ap_rep_enc_part.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ap_rep_enc_part.rst.txt deleted file mode 100644 index b71917831e87..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ap_rep_enc_part.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -.. highlight:: c - -.. _krb5-ap-rep-enc-part-struct: - -krb5_ap_rep_enc_part -==================== - -.. -.. c:type:: krb5_ap_rep_enc_part -.. - -Cleartext that is encrypted and put into :c:type:`_krb5_ap_rep` . - - - -Declaration ------------- - -typedef struct _krb5_ap_rep_enc_part krb5_ap_rep_enc_part - - -Members ---------- - - -.. c:member:: krb5_magic krb5_ap_rep_enc_part.magic - - - - -.. c:member:: krb5_timestamp krb5_ap_rep_enc_part.ctime - - Client time, seconds portion. - - -.. c:member:: krb5_int32 krb5_ap_rep_enc_part.cusec - - Client time, microseconds portion. - - -.. c:member:: krb5_keyblock * krb5_ap_rep_enc_part.subkey - - Subkey (optional) - - -.. c:member:: krb5_ui_4 krb5_ap_rep_enc_part.seq_number - - Sequence number. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ap_req.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ap_req.rst.txt deleted file mode 100644 index 8d9642c7786c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ap_req.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -.. highlight:: c - -.. _krb5-ap-req-struct: - -krb5_ap_req -=========== - -.. -.. c:type:: krb5_ap_req -.. - -Authentication header. - - - -Declaration ------------- - -typedef struct _krb5_ap_req krb5_ap_req - - -Members ---------- - - -.. c:member:: krb5_magic krb5_ap_req.magic - - - - -.. c:member:: krb5_flags krb5_ap_req.ap_options - - Requested options. - - -.. c:member:: krb5_ticket * krb5_ap_req.ticket - - Ticket. - - -.. c:member:: krb5_enc_data krb5_ap_req.authenticator - - Encrypted authenticator. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_auth_context.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_auth_context.rst.txt deleted file mode 100644 index e0f302c5c9a3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_auth_context.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-auth-context-struct: - -krb5_auth_context -================= - -.. -.. c:type:: krb5_auth_context -.. - - - - -Declaration ------------- - -typedef struct _krb5_auth_context\* krb5_auth_context - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_authdata.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_authdata.rst.txt deleted file mode 100644 index 6419a059e1fd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_authdata.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -.. highlight:: c - -.. _krb5-authdata-struct: - -krb5_authdata -============= - -.. -.. c:type:: krb5_authdata -.. - -Structure for auth data. - - - -Declaration ------------- - -typedef struct _krb5_authdata krb5_authdata - - -Members ---------- - - -.. c:member:: krb5_magic krb5_authdata.magic - - - - -.. c:member:: krb5_authdatatype krb5_authdata.ad_type - - ADTYPE. - - -.. c:member:: unsigned int krb5_authdata.length - - Length of data. - - -.. c:member:: krb5_octet * krb5_authdata.contents - - Data. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_authdatatype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_authdatatype.rst.txt deleted file mode 100644 index 01c23d971df7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_authdatatype.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-authdatatype-struct: - -krb5_authdatatype -================= - -.. -.. c:type:: krb5_authdatatype -.. - - - - -Declaration ------------- - -typedef krb5_int32 krb5_authdatatype - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_authenticator.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_authenticator.rst.txt deleted file mode 100644 index 4b2b1c92d8fa..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_authenticator.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -.. highlight:: c - -.. _krb5-authenticator-struct: - -krb5_authenticator -================== - -.. -.. c:type:: krb5_authenticator -.. - -Ticket authenticator. - -The C representation of an unencrypted authenticator. - -Declaration ------------- - -typedef struct _krb5_authenticator krb5_authenticator - - -Members ---------- - - -.. c:member:: krb5_magic krb5_authenticator.magic - - - - -.. c:member:: krb5_principal krb5_authenticator.client - - client name/realm - - -.. c:member:: krb5_checksum * krb5_authenticator.checksum - - checksum, includes type, optional - - -.. c:member:: krb5_int32 krb5_authenticator.cusec - - client usec portion - - -.. c:member:: krb5_timestamp krb5_authenticator.ctime - - client sec portion - - -.. c:member:: krb5_keyblock * krb5_authenticator.subkey - - true session key, optional - - -.. c:member:: krb5_ui_4 krb5_authenticator.seq_number - - sequence #, optional - - -.. c:member:: krb5_authdata ** krb5_authenticator.authorization_data - - authoriazation data - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_boolean.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_boolean.rst.txt deleted file mode 100644 index f9be9b4197bc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_boolean.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-boolean-struct: - -krb5_boolean -============ - -.. -.. c:type:: krb5_boolean -.. - - - - -Declaration ------------- - -typedef unsigned int krb5_boolean - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cc_cursor.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cc_cursor.rst.txt deleted file mode 100644 index 97da560d0dc7..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cc_cursor.rst.txt +++ /dev/null @@ -1,21 +0,0 @@ -.. highlight:: c - -.. _krb5-cc-cursor-struct: - -krb5_cc_cursor -============== - -.. -.. c:type:: krb5_cc_cursor -.. - -Cursor for sequential lookup. - - - -Declaration ------------- - -typedef krb5_pointer krb5_cc_cursor - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ccache.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ccache.rst.txt deleted file mode 100644 index 86317f5fe30d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ccache.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-ccache-struct: - -krb5_ccache -=========== - -.. -.. c:type:: krb5_ccache -.. - - - - -Declaration ------------- - -typedef struct _krb5_ccache\* krb5_ccache - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cccol_cursor.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cccol_cursor.rst.txt deleted file mode 100644 index 13095b1c1301..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cccol_cursor.rst.txt +++ /dev/null @@ -1,21 +0,0 @@ -.. highlight:: c - -.. _krb5-cccol-cursor-struct: - -krb5_cccol_cursor -================= - -.. -.. c:type:: krb5_cccol_cursor -.. - -Cursor for iterating over all ccaches. - - - -Declaration ------------- - -typedef struct _krb5_cccol_cursor\* krb5_cccol_cursor - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_checksum.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_checksum.rst.txt deleted file mode 100644 index de4cc0116feb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_checksum.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -.. highlight:: c - -.. _krb5-checksum-struct: - -krb5_checksum -============= - -.. -.. c:type:: krb5_checksum -.. - - - - -Declaration ------------- - -typedef struct _krb5_checksum krb5_checksum - - -Members ---------- - - -.. c:member:: krb5_magic krb5_checksum.magic - - - - -.. c:member:: krb5_cksumtype krb5_checksum.checksum_type - - - - -.. c:member:: unsigned int krb5_checksum.length - - - - -.. c:member:: krb5_octet * krb5_checksum.contents - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cksumtype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cksumtype.rst.txt deleted file mode 100644 index 52a757a44403..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cksumtype.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-cksumtype-struct: - -krb5_cksumtype -============== - -.. -.. c:type:: krb5_cksumtype -.. - - - - -Declaration ------------- - -typedef krb5_int32 krb5_cksumtype - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_const_pointer.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_const_pointer.rst.txt deleted file mode 100644 index 7b70b4309b69..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_const_pointer.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-const-pointer-struct: - -krb5_const_pointer -================== - -.. -.. c:type:: krb5_const_pointer -.. - - - - -Declaration ------------- - -typedef void const\* krb5_const_pointer - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_const_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_const_principal.rst.txt deleted file mode 100644 index 37131f6a2edd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_const_principal.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -.. highlight:: c - -.. _krb5-const-principal-struct: - -krb5_const_principal -==================== - -.. -.. c:type:: krb5_const_principal -.. - -Constant version of :c:type:`krb5_principal_data` . - - - -Declaration ------------- - -typedef const krb5_principal_data\* krb5_const_principal - - -Members ---------- - - -.. c:member:: krb5_magic krb5_const_principal.magic - - - - -.. c:member:: krb5_data krb5_const_principal.realm - - - - -.. c:member:: krb5_data * krb5_const_principal.data - - An array of strings. - - -.. c:member:: krb5_int32 krb5_const_principal.length - - - - -.. c:member:: krb5_int32 krb5_const_principal.type - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_context.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_context.rst.txt deleted file mode 100644 index 8390b9cd9c97..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_context.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-context-struct: - -krb5_context -============ - -.. -.. c:type:: krb5_context -.. - - - - -Declaration ------------- - -typedef struct _krb5_context\* krb5_context - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cred.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cred.rst.txt deleted file mode 100644 index 500d016273af..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cred.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -.. highlight:: c - -.. _krb5-cred-struct: - -krb5_cred -========= - -.. -.. c:type:: krb5_cred -.. - -Credentials data structure. - - - -Declaration ------------- - -typedef struct _krb5_cred krb5_cred - - -Members ---------- - - -.. c:member:: krb5_magic krb5_cred.magic - - - - -.. c:member:: krb5_ticket ** krb5_cred.tickets - - Tickets. - - -.. c:member:: krb5_enc_data krb5_cred.enc_part - - Encrypted part. - - -.. c:member:: krb5_cred_enc_part * krb5_cred.enc_part2 - - Unencrypted version, if available. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cred_enc_part.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cred_enc_part.rst.txt deleted file mode 100644 index a69650a585ee..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cred_enc_part.rst.txt +++ /dev/null @@ -1,60 +0,0 @@ -.. highlight:: c - -.. _krb5-cred-enc-part-struct: - -krb5_cred_enc_part -================== - -.. -.. c:type:: krb5_cred_enc_part -.. - -Cleartext credentials information. - - - -Declaration ------------- - -typedef struct _krb5_cred_enc_part krb5_cred_enc_part - - -Members ---------- - - -.. c:member:: krb5_magic krb5_cred_enc_part.magic - - - - -.. c:member:: krb5_int32 krb5_cred_enc_part.nonce - - Nonce (optional) - - -.. c:member:: krb5_timestamp krb5_cred_enc_part.timestamp - - Generation time, seconds portion. - - -.. c:member:: krb5_int32 krb5_cred_enc_part.usec - - Generation time, microseconds portion. - - -.. c:member:: krb5_address * krb5_cred_enc_part.s_address - - Sender address (optional) - - -.. c:member:: krb5_address * krb5_cred_enc_part.r_address - - Recipient address (optional) - - -.. c:member:: krb5_cred_info ** krb5_cred_enc_part.ticket_info - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cred_info.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cred_info.rst.txt deleted file mode 100644 index f0dcc34a06d1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cred_info.rst.txt +++ /dev/null @@ -1,60 +0,0 @@ -.. highlight:: c - -.. _krb5-cred-info-struct: - -krb5_cred_info -============== - -.. -.. c:type:: krb5_cred_info -.. - -Credentials information inserted into *EncKrbCredPart* . - - - -Declaration ------------- - -typedef struct _krb5_cred_info krb5_cred_info - - -Members ---------- - - -.. c:member:: krb5_magic krb5_cred_info.magic - - - - -.. c:member:: krb5_keyblock * krb5_cred_info.session - - Session key used to encrypt ticket. - - -.. c:member:: krb5_principal krb5_cred_info.client - - Client principal and realm. - - -.. c:member:: krb5_principal krb5_cred_info.server - - Server principal and realm. - - -.. c:member:: krb5_flags krb5_cred_info.flags - - Ticket flags. - - -.. c:member:: krb5_ticket_times krb5_cred_info.times - - Auth, start, end, renew_till. - - -.. c:member:: krb5_address ** krb5_cred_info.caddrs - - Array of pointers to addrs (optional) - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_creds.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_creds.rst.txt deleted file mode 100644 index 68c0c663d5bc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_creds.rst.txt +++ /dev/null @@ -1,80 +0,0 @@ -.. highlight:: c - -.. _krb5-creds-struct: - -krb5_creds -========== - -.. -.. c:type:: krb5_creds -.. - -Credentials structure including ticket, session key, and lifetime info. - - - -Declaration ------------- - -typedef struct _krb5_creds krb5_creds - - -Members ---------- - - -.. c:member:: krb5_magic krb5_creds.magic - - - - -.. c:member:: krb5_principal krb5_creds.client - - client's principal identifier - - -.. c:member:: krb5_principal krb5_creds.server - - server's principal identifier - - -.. c:member:: krb5_keyblock krb5_creds.keyblock - - session encryption key info - - -.. c:member:: krb5_ticket_times krb5_creds.times - - lifetime info - - -.. c:member:: krb5_boolean krb5_creds.is_skey - - true if ticket is encrypted in another ticket's skey - - -.. c:member:: krb5_flags krb5_creds.ticket_flags - - flags in ticket - - -.. c:member:: krb5_address ** krb5_creds.addresses - - addrs in ticket - - -.. c:member:: krb5_data krb5_creds.ticket - - ticket string itself - - -.. c:member:: krb5_data krb5_creds.second_ticket - - second ticket, if related to ticket (via DUPLICATE-SKEY or ENC-TKT-IN-SKEY) - - -.. c:member:: krb5_authdata ** krb5_creds.authdata - - authorization data - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_crypto_iov.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_crypto_iov.rst.txt deleted file mode 100644 index e4eb787b13c3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_crypto_iov.rst.txt +++ /dev/null @@ -1,35 +0,0 @@ -.. highlight:: c - -.. _krb5-crypto-iov-struct: - -krb5_crypto_iov -=============== - -.. -.. c:type:: krb5_crypto_iov -.. - -Structure to describe a region of text to be encrypted or decrypted. - -The *flags* member describes the type of the iov. The *data* member points to the memory that will be manipulated. All iov APIs take a pointer to the first element of an array of krb5_crypto_iov's along with the size of that array. Buffer contents are manipulated in-place; data is overwritten. Callers must allocate the right number of krb5_crypto_iov structures before calling into an iov API. - -Declaration ------------- - -typedef struct _krb5_crypto_iov krb5_crypto_iov - - -Members ---------- - - -.. c:member:: krb5_cryptotype krb5_crypto_iov.flags - - iov type (see KRB5_CRYPTO_TYPE macros) - - -.. c:member:: krb5_data krb5_crypto_iov.data - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cryptotype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cryptotype.rst.txt deleted file mode 100644 index 1e49e35180d2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_cryptotype.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-cryptotype-struct: - -krb5_cryptotype -=============== - -.. -.. c:type:: krb5_cryptotype -.. - - - - -Declaration ------------- - -typedef krb5_int32 krb5_cryptotype - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_data.rst.txt deleted file mode 100644 index 98cc3a76d0df..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_data.rst.txt +++ /dev/null @@ -1,39 +0,0 @@ -.. highlight:: c - -.. _krb5-data-struct: - -krb5_data -========= - -.. -.. c:type:: krb5_data -.. - - - - -Declaration ------------- - -typedef struct _krb5_data krb5_data - - -Members ---------- - - -.. c:member:: krb5_magic krb5_data.magic - - - - -.. c:member:: unsigned int krb5_data.length - - - - -.. c:member:: char * krb5_data.data - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_deltat.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_deltat.rst.txt deleted file mode 100644 index bfefbe88cd36..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_deltat.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-deltat-struct: - -krb5_deltat -=========== - -.. -.. c:type:: krb5_deltat -.. - - - - -Declaration ------------- - -typedef krb5_int32 krb5_deltat - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enc_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enc_data.rst.txt deleted file mode 100644 index 0f874c7f5efd..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enc_data.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -.. highlight:: c - -.. _krb5-enc-data-struct: - -krb5_enc_data -============= - -.. -.. c:type:: krb5_enc_data -.. - - - - -Declaration ------------- - -typedef struct _krb5_enc_data krb5_enc_data - - -Members ---------- - - -.. c:member:: krb5_magic krb5_enc_data.magic - - - - -.. c:member:: krb5_enctype krb5_enc_data.enctype - - - - -.. c:member:: krb5_kvno krb5_enc_data.kvno - - - - -.. c:member:: krb5_data krb5_enc_data.ciphertext - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enc_kdc_rep_part.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enc_kdc_rep_part.rst.txt deleted file mode 100644 index 7c7a24606856..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enc_kdc_rep_part.rst.txt +++ /dev/null @@ -1,80 +0,0 @@ -.. highlight:: c - -.. _krb5-enc-kdc-rep-part-struct: - -krb5_enc_kdc_rep_part -===================== - -.. -.. c:type:: krb5_enc_kdc_rep_part -.. - -C representation of *EncKDCRepPart* protocol message. - -This is the cleartext message that is encrypted and inserted in *KDC-REP* . - -Declaration ------------- - -typedef struct _krb5_enc_kdc_rep_part krb5_enc_kdc_rep_part - - -Members ---------- - - -.. c:member:: krb5_magic krb5_enc_kdc_rep_part.magic - - - - -.. c:member:: krb5_msgtype krb5_enc_kdc_rep_part.msg_type - - krb5 message type - - -.. c:member:: krb5_keyblock * krb5_enc_kdc_rep_part.session - - Session key. - - -.. c:member:: krb5_last_req_entry ** krb5_enc_kdc_rep_part.last_req - - Array of pointers to entries. - - -.. c:member:: krb5_int32 krb5_enc_kdc_rep_part.nonce - - Nonce from request. - - -.. c:member:: krb5_timestamp krb5_enc_kdc_rep_part.key_exp - - Expiration date. - - -.. c:member:: krb5_flags krb5_enc_kdc_rep_part.flags - - Ticket flags. - - -.. c:member:: krb5_ticket_times krb5_enc_kdc_rep_part.times - - Lifetime info. - - -.. c:member:: krb5_principal krb5_enc_kdc_rep_part.server - - Server's principal identifier. - - -.. c:member:: krb5_address ** krb5_enc_kdc_rep_part.caddrs - - Array of ptrs to addrs, optional. - - -.. c:member:: krb5_pa_data ** krb5_enc_kdc_rep_part.enc_padata - - Encrypted preauthentication data. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enc_tkt_part.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enc_tkt_part.rst.txt deleted file mode 100644 index 05cbe481e048..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enc_tkt_part.rst.txt +++ /dev/null @@ -1,65 +0,0 @@ -.. highlight:: c - -.. _krb5-enc-tkt-part-struct: - -krb5_enc_tkt_part -================= - -.. -.. c:type:: krb5_enc_tkt_part -.. - -Encrypted part of ticket. - - - -Declaration ------------- - -typedef struct _krb5_enc_tkt_part krb5_enc_tkt_part - - -Members ---------- - - -.. c:member:: krb5_magic krb5_enc_tkt_part.magic - - - - -.. c:member:: krb5_flags krb5_enc_tkt_part.flags - - flags - - -.. c:member:: krb5_keyblock * krb5_enc_tkt_part.session - - session key: includes enctype - - -.. c:member:: krb5_principal krb5_enc_tkt_part.client - - client name/realm - - -.. c:member:: krb5_transited krb5_enc_tkt_part.transited - - list of transited realms - - -.. c:member:: krb5_ticket_times krb5_enc_tkt_part.times - - auth, start, end, renew_till - - -.. c:member:: krb5_address ** krb5_enc_tkt_part.caddrs - - array of ptrs to addresses - - -.. c:member:: krb5_authdata ** krb5_enc_tkt_part.authorization_data - - auth data - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_encrypt_block.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_encrypt_block.rst.txt deleted file mode 100644 index daf2fa501cc0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_encrypt_block.rst.txt +++ /dev/null @@ -1,39 +0,0 @@ -.. highlight:: c - -.. _krb5-encrypt-block-struct: - -krb5_encrypt_block -================== - -.. -.. c:type:: krb5_encrypt_block -.. - - - - -Declaration ------------- - -typedef struct _krb5_encrypt_block krb5_encrypt_block - - -Members ---------- - - -.. c:member:: krb5_magic krb5_encrypt_block.magic - - - - -.. c:member:: krb5_enctype krb5_encrypt_block.crypto_entry - - - - -.. c:member:: krb5_keyblock * krb5_encrypt_block.key - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enctype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enctype.rst.txt deleted file mode 100644 index c820bf8e3dbe..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_enctype.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-enctype-struct: - -krb5_enctype -============ - -.. -.. c:type:: krb5_enctype -.. - - - - -Declaration ------------- - -typedef krb5_int32 krb5_enctype - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_error.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_error.rst.txt deleted file mode 100644 index 29a646654c2d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_error.rst.txt +++ /dev/null @@ -1,75 +0,0 @@ -.. highlight:: c - -.. _krb5-error-struct: - -krb5_error -========== - -.. -.. c:type:: krb5_error -.. - -Error message structure. - - - -Declaration ------------- - -typedef struct _krb5_error krb5_error - - -Members ---------- - - -.. c:member:: krb5_magic krb5_error.magic - - - - -.. c:member:: krb5_timestamp krb5_error.ctime - - Client sec portion; optional. - - -.. c:member:: krb5_int32 krb5_error.cusec - - Client usec portion; optional. - - -.. c:member:: krb5_int32 krb5_error.susec - - Server usec portion. - - -.. c:member:: krb5_timestamp krb5_error.stime - - Server sec portion. - - -.. c:member:: krb5_ui_4 krb5_error.error - - Error code (protocol error #'s) - - -.. c:member:: krb5_principal krb5_error.client - - Client principal and realm. - - -.. c:member:: krb5_principal krb5_error.server - - Server principal and realm. - - -.. c:member:: krb5_data krb5_error.text - - Descriptive text. - - -.. c:member:: krb5_data krb5_error.e_data - - Additional error-describing data. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_error_code.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_error_code.rst.txt deleted file mode 100644 index 58d374ba301a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_error_code.rst.txt +++ /dev/null @@ -1,21 +0,0 @@ -.. highlight:: c - -.. _krb5-error-code-struct: - -krb5_error_code -=============== - -.. -.. c:type:: krb5_error_code -.. - -Used to convey an operation status. - -The value 0 indicates success; any other values are com_err codes. Use krb5_get_error_message() to obtain a string describing the error. - -Declaration ------------- - -typedef krb5_int32 krb5_error_code - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_expire_callback_func.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_expire_callback_func.rst.txt deleted file mode 100644 index 13b1f217bd64..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_expire_callback_func.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-expire-callback-func-struct: - -krb5_expire_callback_func -========================= - -.. -.. c:type:: krb5_expire_callback_func -.. - - - - -Declaration ------------- - -typedef void( \* krb5_expire_callback_func) (krb5_context context, void \*data, krb5_timestamp password_expiration, krb5_timestamp account_expiration, krb5_boolean is_last_req) - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_flags.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_flags.rst.txt deleted file mode 100644 index 398a5e95a1e6..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_flags.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-flags-struct: - -krb5_flags -========== - -.. -.. c:type:: krb5_flags -.. - - - - -Declaration ------------- - -typedef krb5_int32 krb5_flags - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_get_init_creds_opt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_get_init_creds_opt.rst.txt deleted file mode 100644 index 19742f207190..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_get_init_creds_opt.rst.txt +++ /dev/null @@ -1,80 +0,0 @@ -.. highlight:: c - -.. _krb5-get-init-creds-opt-struct: - -krb5_get_init_creds_opt -======================= - -.. -.. c:type:: krb5_get_init_creds_opt -.. - -Store options for *_krb5_get_init_creds* . - - - -Declaration ------------- - -typedef struct _krb5_get_init_creds_opt krb5_get_init_creds_opt - - -Members ---------- - - -.. c:member:: krb5_flags krb5_get_init_creds_opt.flags - - - - -.. c:member:: krb5_deltat krb5_get_init_creds_opt.tkt_life - - - - -.. c:member:: krb5_deltat krb5_get_init_creds_opt.renew_life - - - - -.. c:member:: int krb5_get_init_creds_opt.forwardable - - - - -.. c:member:: int krb5_get_init_creds_opt.proxiable - - - - -.. c:member:: krb5_enctype * krb5_get_init_creds_opt.etype_list - - - - -.. c:member:: int krb5_get_init_creds_opt.etype_list_length - - - - -.. c:member:: krb5_address ** krb5_get_init_creds_opt.address_list - - - - -.. c:member:: krb5_preauthtype * krb5_get_init_creds_opt.preauth_list - - - - -.. c:member:: int krb5_get_init_creds_opt.preauth_list_length - - - - -.. c:member:: krb5_data * krb5_get_init_creds_opt.salt - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_gic_opt_pa_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_gic_opt_pa_data.rst.txt deleted file mode 100644 index cef8a469bd92..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_gic_opt_pa_data.rst.txt +++ /dev/null @@ -1,35 +0,0 @@ -.. highlight:: c - -.. _krb5-gic-opt-pa-data-struct: - -krb5_gic_opt_pa_data -==================== - -.. -.. c:type:: krb5_gic_opt_pa_data -.. - -Generic preauth option attribute/value pairs. - - - -Declaration ------------- - -typedef struct _krb5_gic_opt_pa_data krb5_gic_opt_pa_data - - -Members ---------- - - -.. c:member:: char * krb5_gic_opt_pa_data.attr - - - - -.. c:member:: char * krb5_gic_opt_pa_data.value - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_init_creds_context.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_init_creds_context.rst.txt deleted file mode 100644 index 22c4af36e2c9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_init_creds_context.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-init-creds-context-struct: - -krb5_init_creds_context -======================= - -.. -.. c:type:: krb5_init_creds_context -.. - - - - -Declaration ------------- - -typedef struct _krb5_init_creds_context\* krb5_init_creds_context - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_int16.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_int16.rst.txt deleted file mode 100644 index 9686c3065df9..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_int16.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-int16-struct: - -krb5_int16 -========== - -.. -.. c:type:: krb5_int16 -.. - - - - -Declaration ------------- - -typedef int16_t krb5_int16 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_int32.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_int32.rst.txt deleted file mode 100644 index cab1a43fe073..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_int32.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-int32-struct: - -krb5_int32 -========== - -.. -.. c:type:: krb5_int32 -.. - - - - -Declaration ------------- - -typedef int32_t krb5_int32 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kdc_rep.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kdc_rep.rst.txt deleted file mode 100644 index 5e742dfcef55..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kdc_rep.rst.txt +++ /dev/null @@ -1,60 +0,0 @@ -.. highlight:: c - -.. _krb5-kdc-rep-struct: - -krb5_kdc_rep -============ - -.. -.. c:type:: krb5_kdc_rep -.. - -Representation of the *KDC-REP* protocol message. - - - -Declaration ------------- - -typedef struct _krb5_kdc_rep krb5_kdc_rep - - -Members ---------- - - -.. c:member:: krb5_magic krb5_kdc_rep.magic - - - - -.. c:member:: krb5_msgtype krb5_kdc_rep.msg_type - - KRB5_AS_REP or KRB5_KDC_REP. - - -.. c:member:: krb5_pa_data ** krb5_kdc_rep.padata - - Preauthentication data from KDC. - - -.. c:member:: krb5_principal krb5_kdc_rep.client - - Client principal and realm. - - -.. c:member:: krb5_ticket * krb5_kdc_rep.ticket - - Ticket. - - -.. c:member:: krb5_enc_data krb5_kdc_rep.enc_part - - Encrypted part of reply. - - -.. c:member:: krb5_enc_kdc_rep_part * krb5_kdc_rep.enc_part2 - - Unencrypted version, if available. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kdc_req.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kdc_req.rst.txt deleted file mode 100644 index 51e3512cece2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kdc_req.rst.txt +++ /dev/null @@ -1,105 +0,0 @@ -.. highlight:: c - -.. _krb5-kdc-req-struct: - -krb5_kdc_req -============ - -.. -.. c:type:: krb5_kdc_req -.. - -C representation of KDC-REQ protocol message, including KDC-REQ-BODY. - - - -Declaration ------------- - -typedef struct _krb5_kdc_req krb5_kdc_req - - -Members ---------- - - -.. c:member:: krb5_magic krb5_kdc_req.magic - - - - -.. c:member:: krb5_msgtype krb5_kdc_req.msg_type - - KRB5_AS_REQ or KRB5_TGS_REQ. - - -.. c:member:: krb5_pa_data ** krb5_kdc_req.padata - - Preauthentication data. - - -.. c:member:: krb5_flags krb5_kdc_req.kdc_options - - Requested options. - - -.. c:member:: krb5_principal krb5_kdc_req.client - - Client principal and realm. - - -.. c:member:: krb5_principal krb5_kdc_req.server - - Server principal and realm. - - -.. c:member:: krb5_timestamp krb5_kdc_req.from - - Requested start time. - - -.. c:member:: krb5_timestamp krb5_kdc_req.till - - Requested end time. - - -.. c:member:: krb5_timestamp krb5_kdc_req.rtime - - Requested renewable end time. - - -.. c:member:: krb5_int32 krb5_kdc_req.nonce - - Nonce to match request and response. - - -.. c:member:: int krb5_kdc_req.nktypes - - Number of enctypes. - - -.. c:member:: krb5_enctype * krb5_kdc_req.ktype - - Requested enctypes. - - -.. c:member:: krb5_address ** krb5_kdc_req.addresses - - Requested addresses (optional) - - -.. c:member:: krb5_enc_data krb5_kdc_req.authorization_data - - Encrypted authz data (optional) - - -.. c:member:: krb5_authdata ** krb5_kdc_req.unenc_authdata - - Unencrypted authz data. - - -.. c:member:: krb5_ticket ** krb5_kdc_req.second_ticket - - Second ticket array (optional) - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_key.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_key.rst.txt deleted file mode 100644 index 580d410736d4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_key.rst.txt +++ /dev/null @@ -1,21 +0,0 @@ -.. highlight:: c - -.. _krb5-key-struct: - -krb5_key -======== - -.. -.. c:type:: krb5_key -.. - -Opaque identifier for a key. - -Use with the krb5_k APIs for better performance for repeated operations with the same key and usage. Key identifiers must not be used simultaneously within multiple threads, as they may contain mutable internal state and are not mutex-protected. - -Declaration ------------- - -typedef struct krb5_key_st\* krb5_key - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keyblock.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keyblock.rst.txt deleted file mode 100644 index a6c08225c5e4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keyblock.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -.. highlight:: c - -.. _krb5-keyblock-struct: - -krb5_keyblock -============= - -.. -.. c:type:: krb5_keyblock -.. - -Exposed contents of a key. - - - -Declaration ------------- - -typedef struct _krb5_keyblock krb5_keyblock - - -Members ---------- - - -.. c:member:: krb5_magic krb5_keyblock.magic - - - - -.. c:member:: krb5_enctype krb5_keyblock.enctype - - - - -.. c:member:: unsigned int krb5_keyblock.length - - - - -.. c:member:: krb5_octet * krb5_keyblock.contents - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keytab.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keytab.rst.txt deleted file mode 100644 index 879a92b458e3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keytab.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-keytab-struct: - -krb5_keytab -=========== - -.. -.. c:type:: krb5_keytab -.. - - - - -Declaration ------------- - -typedef struct _krb5_kt\* krb5_keytab - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keytab_entry.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keytab_entry.rst.txt deleted file mode 100644 index a727744f6f5d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keytab_entry.rst.txt +++ /dev/null @@ -1,50 +0,0 @@ -.. highlight:: c - -.. _krb5-keytab-entry-struct: - -krb5_keytab_entry -================= - -.. -.. c:type:: krb5_keytab_entry -.. - -A key table entry. - - - -Declaration ------------- - -typedef struct krb5_keytab_entry_st krb5_keytab_entry - - -Members ---------- - - -.. c:member:: krb5_magic krb5_keytab_entry.magic - - - - -.. c:member:: krb5_principal krb5_keytab_entry.principal - - Principal of this key. - - -.. c:member:: krb5_timestamp krb5_keytab_entry.timestamp - - Time entry written to keytable. - - -.. c:member:: krb5_kvno krb5_keytab_entry.vno - - Key version number. - - -.. c:member:: krb5_keyblock krb5_keytab_entry.key - - The secret key. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keyusage.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keyusage.rst.txt deleted file mode 100644 index 6e2358f01d30..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_keyusage.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-keyusage-struct: - -krb5_keyusage -============= - -.. -.. c:type:: krb5_keyusage -.. - - - - -Declaration ------------- - -typedef krb5_int32 krb5_keyusage - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kt_cursor.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kt_cursor.rst.txt deleted file mode 100644 index 0b374624ecee..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kt_cursor.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-kt-cursor-struct: - -krb5_kt_cursor -============== - -.. -.. c:type:: krb5_kt_cursor -.. - - - - -Declaration ------------- - -typedef krb5_pointer krb5_kt_cursor - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kvno.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kvno.rst.txt deleted file mode 100644 index ad766bb72e31..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_kvno.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-kvno-struct: - -krb5_kvno -========= - -.. -.. c:type:: krb5_kvno -.. - - - - -Declaration ------------- - -typedef unsigned int krb5_kvno - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_last_req_entry.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_last_req_entry.rst.txt deleted file mode 100644 index 437472ed1f6a..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_last_req_entry.rst.txt +++ /dev/null @@ -1,40 +0,0 @@ -.. highlight:: c - -.. _krb5-last-req-entry-struct: - -krb5_last_req_entry -=================== - -.. -.. c:type:: krb5_last_req_entry -.. - -Last request entry. - - - -Declaration ------------- - -typedef struct _krb5_last_req_entry krb5_last_req_entry - - -Members ---------- - - -.. c:member:: krb5_magic krb5_last_req_entry.magic - - - - -.. c:member:: krb5_int32 krb5_last_req_entry.lr_type - - LR type. - - -.. c:member:: krb5_timestamp krb5_last_req_entry.value - - Timestamp. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_magic.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_magic.rst.txt deleted file mode 100644 index 7d3fc24cb7b8..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_magic.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-magic-struct: - -krb5_magic -========== - -.. -.. c:type:: krb5_magic -.. - - - - -Declaration ------------- - -typedef krb5_error_code krb5_magic - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_mk_req_checksum_func.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_mk_req_checksum_func.rst.txt deleted file mode 100644 index fa0dd01c1e7b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_mk_req_checksum_func.rst.txt +++ /dev/null @@ -1,21 +0,0 @@ -.. highlight:: c - -.. _krb5-mk-req-checksum-func-struct: - -krb5_mk_req_checksum_func -========================= - -.. -.. c:type:: krb5_mk_req_checksum_func -.. - -Type of function used as a callback to generate checksum data for mk_req. - - - -Declaration ------------- - -typedef krb5_error_code( \* krb5_mk_req_checksum_func) (krb5_context, krb5_auth_context, void \*, krb5_data \*\*) - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_msgtype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_msgtype.rst.txt deleted file mode 100644 index b1e08cd56632..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_msgtype.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-msgtype-struct: - -krb5_msgtype -============ - -.. -.. c:type:: krb5_msgtype -.. - - - - -Declaration ------------- - -typedef unsigned int krb5_msgtype - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_octet.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_octet.rst.txt deleted file mode 100644 index b6802e209045..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_octet.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-octet-struct: - -krb5_octet -========== - -.. -.. c:type:: krb5_octet -.. - - - - -Declaration ------------- - -typedef uint8_t krb5_octet - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_data.rst.txt deleted file mode 100644 index 390f810fef73..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_data.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -.. highlight:: c - -.. _krb5-pa-data-struct: - -krb5_pa_data -============ - -.. -.. c:type:: krb5_pa_data -.. - -Pre-authentication data. - - - -Declaration ------------- - -typedef struct _krb5_pa_data krb5_pa_data - - -Members ---------- - - -.. c:member:: krb5_magic krb5_pa_data.magic - - - - -.. c:member:: krb5_preauthtype krb5_pa_data.pa_type - - Preauthentication data type. - - -.. c:member:: unsigned int krb5_pa_data.length - - Length of data. - - -.. c:member:: krb5_octet * krb5_pa_data.contents - - Data. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_pac_req.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_pac_req.rst.txt deleted file mode 100644 index de072e95533c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_pac_req.rst.txt +++ /dev/null @@ -1,29 +0,0 @@ -.. highlight:: c - -.. _krb5-pa-pac-req-struct: - -krb5_pa_pac_req -=============== - -.. -.. c:type:: krb5_pa_pac_req -.. - - - - -Declaration ------------- - -typedef struct _krb5_pa_pac_req krb5_pa_pac_req - - -Members ---------- - - -.. c:member:: krb5_boolean krb5_pa_pac_req.include_pac - - TRUE if a PAC should be included in TGS-REP. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_server_referral_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_server_referral_data.rst.txt deleted file mode 100644 index f9037d2261bc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_server_referral_data.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -.. highlight:: c - -.. _krb5-pa-server-referral-data-struct: - -krb5_pa_server_referral_data -============================ - -.. -.. c:type:: krb5_pa_server_referral_data -.. - - - - -Declaration ------------- - -typedef struct _krb5_pa_server_referral_data krb5_pa_server_referral_data - - -Members ---------- - - -.. c:member:: krb5_data * krb5_pa_server_referral_data.referred_realm - - - - -.. c:member:: krb5_principal krb5_pa_server_referral_data.true_principal_name - - - - -.. c:member:: krb5_principal krb5_pa_server_referral_data.requested_principal_name - - - - -.. c:member:: krb5_timestamp krb5_pa_server_referral_data.referral_valid_until - - - - -.. c:member:: krb5_checksum krb5_pa_server_referral_data.rep_cksum - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_svr_referral_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_svr_referral_data.rst.txt deleted file mode 100644 index 8ec298d5f48c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pa_svr_referral_data.rst.txt +++ /dev/null @@ -1,29 +0,0 @@ -.. highlight:: c - -.. _krb5-pa-svr-referral-data-struct: - -krb5_pa_svr_referral_data -========================= - -.. -.. c:type:: krb5_pa_svr_referral_data -.. - - - - -Declaration ------------- - -typedef struct _krb5_pa_svr_referral_data krb5_pa_svr_referral_data - - -Members ---------- - - -.. c:member:: krb5_principal krb5_pa_svr_referral_data.principal - - Referred name, only realm is required. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pac.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pac.rst.txt deleted file mode 100644 index 603733c902e1..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pac.rst.txt +++ /dev/null @@ -1,21 +0,0 @@ -.. highlight:: c - -.. _krb5-pac-struct: - -krb5_pac -======== - -.. -.. c:type:: krb5_pac -.. - -PAC data structure to convey authorization information. - - - -Declaration ------------- - -typedef struct krb5_pac_data\* krb5_pac - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pointer.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pointer.rst.txt deleted file mode 100644 index e9a9ddd3aa3c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pointer.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-pointer-struct: - -krb5_pointer -============ - -.. -.. c:type:: krb5_pointer -.. - - - - -Declaration ------------- - -typedef void\* krb5_pointer - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_post_recv_fn.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_post_recv_fn.rst.txt deleted file mode 100644 index 54a64681856f..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_post_recv_fn.rst.txt +++ /dev/null @@ -1,22 +0,0 @@ -.. highlight:: c - -.. _krb5-post-recv-fn-struct: - -krb5_post_recv_fn -================= - -.. -.. c:type:: krb5_post_recv_fn -.. - -Hook function for inspecting or overriding KDC replies. - -If *code* is non-zero, KDC communication failed and *reply* should be ignored. The hook function may return *code* or a different error code, or may synthesize a reply by setting *new_reply_out* and return successfully. -The hook function should use krb5_copy_data() to construct the value for *new_reply_out* , to ensure that it can be freed correctly by the library. - -Declaration ------------- - -typedef krb5_error_code( \* krb5_post_recv_fn) (krb5_context context, void \*data, krb5_error_code code, const krb5_data \*realm, const krb5_data \*message, const krb5_data \*reply, krb5_data \*\*new_reply_out) - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pre_send_fn.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pre_send_fn.rst.txt deleted file mode 100644 index 76c3f9ab4a1d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pre_send_fn.rst.txt +++ /dev/null @@ -1,24 +0,0 @@ -.. highlight:: c - -.. _krb5-pre-send-fn-struct: - -krb5_pre_send_fn -================ - -.. -.. c:type:: krb5_pre_send_fn -.. - -Hook function for inspecting or modifying messages sent to KDCs. - -If the hook function sets *new_reply_out* , *message* will not be sent to the KDC, and the given reply will used instead. -If the hook function sets *new_message_out* , the given message will be sent to the KDC in place of *message* . -If the hook function returns successfully without setting either output, *message* will be sent to the KDC normally. -The hook function should use krb5_copy_data() to construct the value for *new_message_out* or *reply_out* , to ensure that it can be freed correctly by the library. - -Declaration ------------- - -typedef krb5_error_code( \* krb5_pre_send_fn) (krb5_context context, void \*data, const krb5_data \*realm, const krb5_data \*message, krb5_data \*\*new_message_out, krb5_data \*\*new_reply_out) - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_preauthtype.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_preauthtype.rst.txt deleted file mode 100644 index 7cd8587550e3..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_preauthtype.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-preauthtype-struct: - -krb5_preauthtype -================ - -.. -.. c:type:: krb5_preauthtype -.. - - - - -Declaration ------------- - -typedef krb5_int32 krb5_preauthtype - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_principal.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_principal.rst.txt deleted file mode 100644 index 818b66f10d76..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_principal.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -.. highlight:: c - -.. _krb5-principal-struct: - -krb5_principal -============== - -.. -.. c:type:: krb5_principal -.. - - - - -Declaration ------------- - -typedef krb5_principal_data\* krb5_principal - - -Members ---------- - - -.. c:member:: krb5_magic krb5_principal.magic - - - - -.. c:member:: krb5_data krb5_principal.realm - - - - -.. c:member:: krb5_data * krb5_principal.data - - An array of strings. - - -.. c:member:: krb5_int32 krb5_principal.length - - - - -.. c:member:: krb5_int32 krb5_principal.type - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_principal_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_principal_data.rst.txt deleted file mode 100644 index f58c45b77ef2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_principal_data.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -.. highlight:: c - -.. _krb5-principal-data-struct: - -krb5_principal_data -=================== - -.. -.. c:type:: krb5_principal_data -.. - - - - -Declaration ------------- - -typedef struct krb5_principal_data krb5_principal_data - - -Members ---------- - - -.. c:member:: krb5_magic krb5_principal_data.magic - - - - -.. c:member:: krb5_data krb5_principal_data.realm - - - - -.. c:member:: krb5_data * krb5_principal_data.data - - An array of strings. - - -.. c:member:: krb5_int32 krb5_principal_data.length - - - - -.. c:member:: krb5_int32 krb5_principal_data.type - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_prompt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_prompt.rst.txt deleted file mode 100644 index f31ac7030ece..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_prompt.rst.txt +++ /dev/null @@ -1,40 +0,0 @@ -.. highlight:: c - -.. _krb5-prompt-struct: - -krb5_prompt -=========== - -.. -.. c:type:: krb5_prompt -.. - -Text for prompt used in prompter callback function. - - - -Declaration ------------- - -typedef struct _krb5_prompt krb5_prompt - - -Members ---------- - - -.. c:member:: char * krb5_prompt.prompt - - The prompt to show to the user. - - -.. c:member:: int krb5_prompt.hidden - - Boolean; informative prompt or hidden (e.g. - PIN) - -.. c:member:: krb5_data * krb5_prompt.reply - - Must be allocated before call to prompt routine. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_prompt_type.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_prompt_type.rst.txt deleted file mode 100644 index e36044c4660b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_prompt_type.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-prompt-type-struct: - -krb5_prompt_type -================ - -.. -.. c:type:: krb5_prompt_type -.. - - - - -Declaration ------------- - -typedef krb5_int32 krb5_prompt_type - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_prompter_fct.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_prompter_fct.rst.txt deleted file mode 100644 index 99cdc95e54d4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_prompter_fct.rst.txt +++ /dev/null @@ -1,21 +0,0 @@ -.. highlight:: c - -.. _krb5-prompter-fct-struct: - -krb5_prompter_fct -================= - -.. -.. c:type:: krb5_prompter_fct -.. - -Pointer to a prompter callback function. - - - -Declaration ------------- - -typedef krb5_error_code( \* krb5_prompter_fct) (krb5_context context, void \*data, const char \*name, const char \*banner, int num_prompts, krb5_prompt prompts[]) - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pwd_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pwd_data.rst.txt deleted file mode 100644 index 5797d23f45b5..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_pwd_data.rst.txt +++ /dev/null @@ -1,39 +0,0 @@ -.. highlight:: c - -.. _krb5-pwd-data-struct: - -krb5_pwd_data -============= - -.. -.. c:type:: krb5_pwd_data -.. - - - - -Declaration ------------- - -typedef struct _krb5_pwd_data krb5_pwd_data - - -Members ---------- - - -.. c:member:: krb5_magic krb5_pwd_data.magic - - - - -.. c:member:: int krb5_pwd_data.sequence_count - - - - -.. c:member:: passwd_phrase_element ** krb5_pwd_data.element - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_rcache.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_rcache.rst.txt deleted file mode 100644 index 8d08c3a46fb0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_rcache.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-rcache-struct: - -krb5_rcache -=========== - -.. -.. c:type:: krb5_rcache -.. - - - - -Declaration ------------- - -typedef struct krb5_rc_st\* krb5_rcache - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_replay_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_replay_data.rst.txt deleted file mode 100644 index afd881274a21..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_replay_data.rst.txt +++ /dev/null @@ -1,40 +0,0 @@ -.. highlight:: c - -.. _krb5-replay-data-struct: - -krb5_replay_data -================ - -.. -.. c:type:: krb5_replay_data -.. - -Replay data. - -Sequence number and timestamp information output by krb5_rd_priv() and krb5_rd_safe(). - -Declaration ------------- - -typedef struct krb5_replay_data krb5_replay_data - - -Members ---------- - - -.. c:member:: krb5_timestamp krb5_replay_data.timestamp - - Timestamp, seconds portion. - - -.. c:member:: krb5_int32 krb5_replay_data.usec - - Timestamp, microseconds portion. - - -.. c:member:: krb5_ui_4 krb5_replay_data.seq - - Sequence number. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_context.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_context.rst.txt deleted file mode 100644 index be5ccc42deeb..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_context.rst.txt +++ /dev/null @@ -1,22 +0,0 @@ -.. highlight:: c - -.. _krb5-responder-context-struct: - -krb5_responder_context -====================== - -.. -.. c:type:: krb5_responder_context -.. - -A container for a set of preauthentication questions and answers. - -A responder context is supplied by the krb5 authentication system to a krb5_responder_fn callback. It contains a list of questions and can receive answers. Questions contained in a responder context can be listed using krb5_responder_list_questions(), retrieved using krb5_responder_get_challenge(), or answered using krb5_responder_set_answer(). The form of a question's challenge and answer depend on the question name. - - -Declaration ------------- - -typedef struct krb5_responder_context_st\* krb5_responder_context - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_fn.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_fn.rst.txt deleted file mode 100644 index a66fa6c0ebe0..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_fn.rst.txt +++ /dev/null @@ -1,21 +0,0 @@ -.. highlight:: c - -.. _krb5-responder-fn-struct: - -krb5_responder_fn -================= - -.. -.. c:type:: krb5_responder_fn -.. - -Responder function for an initial credential exchange. - -If a required question is unanswered, the prompter may be called. - -Declaration ------------- - -typedef krb5_error_code( \* krb5_responder_fn) (krb5_context ctx, void \*data, krb5_responder_context rctx) - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_otp_challenge.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_otp_challenge.rst.txt deleted file mode 100644 index 9001a574ff66..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_otp_challenge.rst.txt +++ /dev/null @@ -1,34 +0,0 @@ -.. highlight:: c - -.. _krb5-responder-otp-challenge-struct: - -krb5_responder_otp_challenge -============================ - -.. -.. c:type:: krb5_responder_otp_challenge -.. - - - - -Declaration ------------- - -typedef struct _krb5_responder_otp_challenge krb5_responder_otp_challenge - - -Members ---------- - - -.. c:member:: char * krb5_responder_otp_challenge.service - - - - -.. c:member:: krb5_responder_otp_tokeninfo ** krb5_responder_otp_challenge.tokeninfo - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_otp_tokeninfo.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_otp_tokeninfo.rst.txt deleted file mode 100644 index 18c53c881a8d..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_otp_tokeninfo.rst.txt +++ /dev/null @@ -1,59 +0,0 @@ -.. highlight:: c - -.. _krb5-responder-otp-tokeninfo-struct: - -krb5_responder_otp_tokeninfo -============================ - -.. -.. c:type:: krb5_responder_otp_tokeninfo -.. - - - - -Declaration ------------- - -typedef struct _krb5_responder_otp_tokeninfo krb5_responder_otp_tokeninfo - - -Members ---------- - - -.. c:member:: krb5_flags krb5_responder_otp_tokeninfo.flags - - - - -.. c:member:: krb5_int32 krb5_responder_otp_tokeninfo.format - - - - -.. c:member:: krb5_int32 krb5_responder_otp_tokeninfo.length - - - - -.. c:member:: char * krb5_responder_otp_tokeninfo.vendor - - - - -.. c:member:: char * krb5_responder_otp_tokeninfo.challenge - - - - -.. c:member:: char * krb5_responder_otp_tokeninfo.token_id - - - - -.. c:member:: char * krb5_responder_otp_tokeninfo.alg_id - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_pkinit_challenge.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_pkinit_challenge.rst.txt deleted file mode 100644 index 7e35621d3fc4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_pkinit_challenge.rst.txt +++ /dev/null @@ -1,29 +0,0 @@ -.. highlight:: c - -.. _krb5-responder-pkinit-challenge-struct: - -krb5_responder_pkinit_challenge -=============================== - -.. -.. c:type:: krb5_responder_pkinit_challenge -.. - - - - -Declaration ------------- - -typedef struct _krb5_responder_pkinit_challenge krb5_responder_pkinit_challenge - - -Members ---------- - - -.. c:member:: krb5_responder_pkinit_identity ** krb5_responder_pkinit_challenge.identities - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_pkinit_identity.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_pkinit_identity.rst.txt deleted file mode 100644 index 9535693be6fa..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_responder_pkinit_identity.rst.txt +++ /dev/null @@ -1,34 +0,0 @@ -.. highlight:: c - -.. _krb5-responder-pkinit-identity-struct: - -krb5_responder_pkinit_identity -============================== - -.. -.. c:type:: krb5_responder_pkinit_identity -.. - - - - -Declaration ------------- - -typedef struct _krb5_responder_pkinit_identity krb5_responder_pkinit_identity - - -Members ---------- - - -.. c:member:: char * krb5_responder_pkinit_identity.identity - - - - -.. c:member:: krb5_int32 krb5_responder_pkinit_identity.token_flags - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_response.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_response.rst.txt deleted file mode 100644 index 1e31caa63189..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_response.rst.txt +++ /dev/null @@ -1,49 +0,0 @@ -.. highlight:: c - -.. _krb5-response-struct: - -krb5_response -============= - -.. -.. c:type:: krb5_response -.. - - - - -Declaration ------------- - -typedef struct _krb5_response krb5_response - - -Members ---------- - - -.. c:member:: krb5_magic krb5_response.magic - - - - -.. c:member:: krb5_octet krb5_response.message_type - - - - -.. c:member:: krb5_data krb5_response.response - - - - -.. c:member:: krb5_int32 krb5_response.expected_nonce - - - - -.. c:member:: krb5_timestamp krb5_response.request_time - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ticket.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ticket.rst.txt deleted file mode 100644 index b1f9e6ad893c..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ticket.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -.. highlight:: c - -.. _krb5-ticket-struct: - -krb5_ticket -=========== - -.. -.. c:type:: krb5_ticket -.. - -Ticket structure. - -The C representation of the ticket message, with a pointer to the C representation of the encrypted part. - -Declaration ------------- - -typedef struct _krb5_ticket krb5_ticket - - -Members ---------- - - -.. c:member:: krb5_magic krb5_ticket.magic - - - - -.. c:member:: krb5_principal krb5_ticket.server - - server name/realm - - -.. c:member:: krb5_enc_data krb5_ticket.enc_part - - encryption type, kvno, encrypted encoding - - -.. c:member:: krb5_enc_tkt_part * krb5_ticket.enc_part2 - - ptr to decrypted version, if available - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ticket_times.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ticket_times.rst.txt deleted file mode 100644 index 60f7fd53d982..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ticket_times.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -.. highlight:: c - -.. _krb5-ticket-times-struct: - -krb5_ticket_times -================= - -.. -.. c:type:: krb5_ticket_times -.. - -Ticket start time, end time, and renewal duration. - - - -Declaration ------------- - -typedef struct _krb5_ticket_times krb5_ticket_times - - -Members ---------- - - -.. c:member:: krb5_timestamp krb5_ticket_times.authtime - - Time at which KDC issued the initial ticket that corresponds to this ticket. - - -.. c:member:: krb5_timestamp krb5_ticket_times.starttime - - optional in ticket, if not present, use *authtime* - - -.. c:member:: krb5_timestamp krb5_ticket_times.endtime - - Ticket expiration time. - - -.. c:member:: krb5_timestamp krb5_ticket_times.renew_till - - Latest time at which renewal of ticket can be valid. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_timestamp.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_timestamp.rst.txt deleted file mode 100644 index 4a13d6850f09..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_timestamp.rst.txt +++ /dev/null @@ -1,21 +0,0 @@ -.. highlight:: c - -.. _krb5-timestamp-struct: - -krb5_timestamp -============== - -.. -.. c:type:: krb5_timestamp -.. - -Represents a timestamp in seconds since the POSIX epoch. - -This legacy type is used frequently in the ABI, but cannot represent timestamps after 2038 as a positive number. Code which uses this type should cast values of it to uint32_t so that negative values are treated as timestamps between 2038 and 2106 on platforms with 64-bit time_t. - -Declaration ------------- - -typedef krb5_int32 krb5_timestamp - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_tkt_authent.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_tkt_authent.rst.txt deleted file mode 100644 index bbc53e77db15..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_tkt_authent.rst.txt +++ /dev/null @@ -1,45 +0,0 @@ -.. highlight:: c - -.. _krb5-tkt-authent-struct: - -krb5_tkt_authent -================ - -.. -.. c:type:: krb5_tkt_authent -.. - -Ticket authentication data. - - - -Declaration ------------- - -typedef struct _krb5_tkt_authent krb5_tkt_authent - - -Members ---------- - - -.. c:member:: krb5_magic krb5_tkt_authent.magic - - - - -.. c:member:: krb5_ticket * krb5_tkt_authent.ticket - - - - -.. c:member:: krb5_authenticator * krb5_tkt_authent.authenticator - - - - -.. c:member:: krb5_flags krb5_tkt_authent.ap_options - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_tkt_creds_context.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_tkt_creds_context.rst.txt deleted file mode 100644 index 95c9625f4c24..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_tkt_creds_context.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-tkt-creds-context-struct: - -krb5_tkt_creds_context -====================== - -.. -.. c:type:: krb5_tkt_creds_context -.. - - - - -Declaration ------------- - -typedef struct _krb5_tkt_creds_context\* krb5_tkt_creds_context - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_trace_callback.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_trace_callback.rst.txt deleted file mode 100644 index f201ec18e8cc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_trace_callback.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-trace-callback-struct: - -krb5_trace_callback -=================== - -.. -.. c:type:: krb5_trace_callback -.. - - - - -Declaration ------------- - -typedef void( \* krb5_trace_callback) (krb5_context context, const krb5_trace_info \*info, void \*cb_data) - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_trace_info.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_trace_info.rst.txt deleted file mode 100644 index 0a90a4efb6e2..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_trace_info.rst.txt +++ /dev/null @@ -1,30 +0,0 @@ -.. highlight:: c - -.. _krb5-trace-info-struct: - -krb5_trace_info -=============== - -.. -.. c:type:: krb5_trace_info -.. - -A wrapper for passing information to a *krb5_trace_callback* . - -Currently, it only contains the formatted message as determined the the format string and arguments of the tracing macro, but it may be extended to contain more fields in the future. - -Declaration ------------- - -typedef struct _krb5_trace_info krb5_trace_info - - -Members ---------- - - -.. c:member:: const char * krb5_trace_info.message - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_transited.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_transited.rst.txt deleted file mode 100644 index 2c3751ab8770..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_transited.rst.txt +++ /dev/null @@ -1,40 +0,0 @@ -.. highlight:: c - -.. _krb5-transited-struct: - -krb5_transited -============== - -.. -.. c:type:: krb5_transited -.. - -Structure for transited encoding. - - - -Declaration ------------- - -typedef struct _krb5_transited krb5_transited - - -Members ---------- - - -.. c:member:: krb5_magic krb5_transited.magic - - - - -.. c:member:: krb5_octet krb5_transited.tr_type - - Transited encoding type. - - -.. c:member:: krb5_data krb5_transited.tr_contents - - Contents. - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_typed_data.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_typed_data.rst.txt deleted file mode 100644 index 0894be9cda30..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_typed_data.rst.txt +++ /dev/null @@ -1,44 +0,0 @@ -.. highlight:: c - -.. _krb5-typed-data-struct: - -krb5_typed_data -=============== - -.. -.. c:type:: krb5_typed_data -.. - - - - -Declaration ------------- - -typedef struct _krb5_typed_data krb5_typed_data - - -Members ---------- - - -.. c:member:: krb5_magic krb5_typed_data.magic - - - - -.. c:member:: krb5_int32 krb5_typed_data.type - - - - -.. c:member:: unsigned int krb5_typed_data.length - - - - -.. c:member:: krb5_octet * krb5_typed_data.data - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ui_2.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ui_2.rst.txt deleted file mode 100644 index ed07896f08dc..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ui_2.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-ui-2-struct: - -krb5_ui_2 -========= - -.. -.. c:type:: krb5_ui_2 -.. - - - - -Declaration ------------- - -typedef uint16_t krb5_ui_2 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ui_4.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ui_4.rst.txt deleted file mode 100644 index 4e754133fc6b..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_ui_4.rst.txt +++ /dev/null @@ -1,20 +0,0 @@ -.. highlight:: c - -.. _krb5-ui-4-struct: - -krb5_ui_4 -========= - -.. -.. c:type:: krb5_ui_4 -.. - - - - -Declaration ------------- - -typedef uint32_t krb5_ui_4 - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_verify_init_creds_opt.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_verify_init_creds_opt.rst.txt deleted file mode 100644 index c46fd9d378ea..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/krb5_verify_init_creds_opt.rst.txt +++ /dev/null @@ -1,34 +0,0 @@ -.. highlight:: c - -.. _krb5-verify-init-creds-opt-struct: - -krb5_verify_init_creds_opt -========================== - -.. -.. c:type:: krb5_verify_init_creds_opt -.. - - - - -Declaration ------------- - -typedef struct _krb5_verify_init_creds_opt krb5_verify_init_creds_opt - - -Members ---------- - - -.. c:member:: krb5_flags krb5_verify_init_creds_opt.flags - - - - -.. c:member:: int krb5_verify_init_creds_opt.ap_req_nofail - - boolean - - diff --git a/crypto/krb5/doc/html/_sources/appdev/refs/types/passwd_phrase_element.rst.txt b/crypto/krb5/doc/html/_sources/appdev/refs/types/passwd_phrase_element.rst.txt deleted file mode 100644 index 41532ee15d7e..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/refs/types/passwd_phrase_element.rst.txt +++ /dev/null @@ -1,39 +0,0 @@ -.. highlight:: c - -.. _passwd-phrase-element-struct: - -passwd_phrase_element -===================== - -.. -.. c:type:: passwd_phrase_element -.. - - - - -Declaration ------------- - -typedef struct _passwd_phrase_element passwd_phrase_element - - -Members ---------- - - -.. c:member:: krb5_magic passwd_phrase_element.magic - - - - -.. c:member:: krb5_data * passwd_phrase_element.passwd - - - - -.. c:member:: krb5_data * passwd_phrase_element.phrase - - - - diff --git a/crypto/krb5/doc/html/_sources/appdev/y2038.rst.txt b/crypto/krb5/doc/html/_sources/appdev/y2038.rst.txt deleted file mode 100644 index bc4122dad0a4..000000000000 --- a/crypto/krb5/doc/html/_sources/appdev/y2038.rst.txt +++ /dev/null @@ -1,28 +0,0 @@ -Year 2038 considerations for uses of krb5_timestamp -=================================================== - -POSIX time values, which measure the number of seconds since January 1 -1970, will exceed the maximum value representable in a signed 32-bit -integer in January 2038. This documentation describes considerations -for consumers of the MIT krb5 libraries. - -Applications or libraries which use libkrb5 and consume the timestamps -included in credentials or other structures make use of the -:c:type:`krb5_timestamp` type. For historical reasons, krb5_timestamp -is a signed 32-bit integer, even on platforms where a larger type is -natively used to represent time values. To behave properly for time -values after January 2038, calling code should cast krb5_timestamp -values to uint32_t, and then to time_t:: - - (time_t)(uint32_t)timestamp - -Used in this way, krb5_timestamp values can represent time values up -until February 2106, provided that the platform uses a 64-bit or -larger time_t type. This usage will also remain safe if a later -version of MIT krb5 changes krb5_timestamp to an unsigned 32-bit -integer. - -The GSSAPI only uses representations of time intervals, not absolute -times. Callers of the GSSAPI should require no changes to behave -correctly after January 2038, provided that they use MIT krb5 release -1.16 or later. |