2 KRB5_AUTH_CONTEXT(3) UNIX Programmer's Manual KRB5_AUTH_CONTEXT(3)
5 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bnt
\bte
\bex
\bxt
\bt, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_i
\bin
\bni
\bit
\bt, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_f
\bfr
\bre
\bee
\be,
6 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btf
\bfl
\bla
\bag
\bgs
\bs, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btf
\bfl
\bla
\bag
\bgs
\bs, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\bta
\bad
\bdd
\bdr
\brs
\bs,
7 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\bta
\bad
\bdd
\bdr
\brs
\bs_
\b_f
\bfr
\bro
\bom
\bm_
\b_f
\bfd
\bd, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\bta
\bad
\bdd
\bdr
\brs
\bs,
8 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\ben
\bna
\bad
\bdd
\bdr
\brs
\bs, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btk
\bke
\bey
\by, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btk
\bke
\bey
\by,
9 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btu
\bus
\bse
\ber
\brk
\bke
\bey
\by, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btu
\bus
\bse
\ber
\brk
\bke
\bey
\by,
10 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btl
\blo
\boc
\bca
\bal
\bls
\bsu
\bub
\bbk
\bke
\bey
\by, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btl
\blo
\boc
\bca
\bal
\bls
\bsu
\bub
\bbk
\bke
\bey
\by,
11 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btr
\bre
\bem
\bmo
\bot
\bte
\bes
\bsu
\bub
\bbk
\bke
\bey
\by, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btr
\bre
\bem
\bmo
\bot
\bte
\bes
\bsu
\bub
\bbk
\bke
\bey
\by,
12 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_s
\bse
\bet
\btc
\bck
\bks
\bsu
\bum
\bmt
\bty
\byp
\bpe
\be, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_g
\bge
\bet
\btc
\bck
\bks
\bsu
\bum
\bmt
\bty
\byp
\bpe
\be, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_s
\bse
\bet
\btk
\bke
\bey
\byt
\bty
\byp
\bpe
\be,
13 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_g
\bge
\bet
\btk
\bke
\bey
\byt
\bty
\byp
\bpe
\be, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_g
\bge
\bet
\btl
\blo
\boc
\bca
\bal
\bls
\bse
\beq
\bqn
\bnu
\bum
\bmb
\bbe
\ber
\br,
14 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_s
\bse
\bet
\btl
\blo
\boc
\bca
\bal
\bls
\bse
\beq
\bqn
\bnu
\bum
\bmb
\bbe
\ber
\br, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_g
\bge
\bet
\btr
\bre
\bem
\bmo
\bot
\bte
\bes
\bse
\beq
\bqn
\bnu
\bum
\bmb
\bbe
\ber
\br,
15 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_s
\bse
\bet
\btr
\bre
\bem
\bmo
\bot
\bte
\bes
\bse
\beq
\bqn
\bnu
\bum
\bmb
\bbe
\ber
\br, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_g
\bge
\bet
\bta
\bau
\but
\bth
\bhe
\ben
\bnt
\bti
\bic
\bca
\bat
\bto
\bor
\br,
16 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btr
\brc
\bca
\bac
\bch
\bhe
\be, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btr
\brc
\bca
\bac
\bch
\bhe
\be,
17 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_i
\bin
\bni
\bit
\bti
\biv
\bve
\bec
\bct
\bto
\bor
\br, k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\bti
\biv
\bve
\bec
\bct
\bto
\bor
\br - manage authentica-
18 tion on connection level
20 L
\bLI
\bIB
\bBR
\bRA
\bAR
\bRY
\bY
21 Kerberos 5 Library (libkrb5, -lkrb5)
23 S
\bSY
\bYN
\bNO
\bOP
\bPS
\bSI
\bIS
\bS
24 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
25 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_i
\bin
\bni
\bit
\bt(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\b*_
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt)
28 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_f
\bfr
\bre
\bee
\be(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt)
30 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
31 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btf
\bfl
\bla
\bag
\bgs
\bs(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt,
32 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bi_
\bn_
\bt_
\b3_
\b2_
\b__
\bt _
\bf_
\bl_
\ba_
\bg_
\bs)
34 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
35 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btf
\bfl
\bla
\bag
\bgs
\bs(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt,
36 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bi_
\bn_
\bt_
\b3_
\b2_
\b__
\bt _
\b*_
\bf_
\bl_
\ba_
\bg_
\bs)
38 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
39 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\bta
\bad
\bdd
\bdr
\brs
\bs(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt,
40 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bd_
\bd_
\br_
\be_
\bs_
\bs _
\b*_
\bl_
\bo_
\bc_
\ba_
\bl_
\b__
\ba_
\bd_
\bd_
\br,
41 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bd_
\bd_
\br_
\be_
\bs_
\bs _
\b*_
\br_
\be_
\bm_
\bo_
\bt_
\be_
\b__
\ba_
\bd_
\bd_
\br)
43 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
44 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\bta
\bad
\bdd
\bdr
\brs
\bs(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt,
45 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bd_
\bd_
\br_
\be_
\bs_
\bs _
\b*_
\b*_
\bl_
\bo_
\bc_
\ba_
\bl_
\b__
\ba_
\bd_
\bd_
\br,
46 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bd_
\bd_
\br_
\be_
\bs_
\bs _
\b*_
\b*_
\br_
\be_
\bm_
\bo_
\bt_
\be_
\b__
\ba_
\bd_
\bd_
\br)
48 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
49 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\ben
\bna
\bad
\bdd
\bdr
\brs
\bs(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt,
50 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bi_
\bn_
\bt _
\bf_
\bd, _
\bi_
\bn_
\bt _
\bf_
\bl_
\ba_
\bg_
\bs)
52 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
53 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\bta
\bad
\bdd
\bdr
\brs
\bs_
\b_f
\bfr
\bro
\bom
\bm_
\b_f
\bfd
\bd(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt,
54 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bv_
\bo_
\bi_
\bd _
\b*_
\bp_
\b__
\bf_
\bd)
56 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
57 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btk
\bke
\bey
\by(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt,
58 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\bk_
\be_
\by_
\bb_
\bl_
\bo_
\bc_
\bk _
\b*_
\b*_
\bk_
\be_
\by_
\bb_
\bl_
\bo_
\bc_
\bk)
60 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
61 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btl
\blo
\boc
\bca
\bal
\bls
\bsu
\bub
\bbk
\bke
\bey
\by(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt,
62 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\bk_
\be_
\by_
\bb_
\bl_
\bo_
\bc_
\bk _
\b*_
\b*_
\bk_
\be_
\by_
\bb_
\bl_
\bo_
\bc_
\bk)
64 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
65 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btr
\bre
\bem
\bmo
\bot
\bte
\bes
\bsu
\bub
\bbk
\bke
\bey
\by(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt,
66 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\bk_
\be_
\by_
\bb_
\bl_
\bo_
\bc_
\bk _
\b*_
\b*_
\bk_
\be_
\by_
\bb_
\bl_
\bo_
\bc_
\bk)
68 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
69 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_i
\bin
\bni
\bit
\bti
\biv
\bve
\bec
\bct
\bto
\bor
\br(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt,
70 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt)
72 _
\bk_
\br_
\bb_
\b5_
\b__
\be_
\br_
\br_
\bo_
\br_
\b__
\bc_
\bo_
\bd_
\be
73 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\bti
\biv
\bve
\bec
\bct
\bto
\bor
\br(_
\bk_
\br_
\bb_
\b5_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt,
74 _
\bk_
\br_
\bb_
\b5_
\b__
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt _
\b*_
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt, _
\bk_
\br_
\bb_
\b5_
\b__
\bp_
\bo_
\bi_
\bn_
\bt_
\be_
\br _
\bi_
\bv_
\be_
\bc_
\bt_
\bo_
\br)
76 D
\bDE
\bES
\bSC
\bCR
\bRI
\bIP
\bPT
\bTI
\bIO
\bON
\bN
77 The k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bnt
\bte
\bex
\bxt
\bt structure holds all context related to an authenti-
78 cated connection, in a similar way to k
\bkr
\brb
\bb5
\b5_
\b_c
\bco
\bon
\bnt
\bte
\bex
\bxt
\bt that holds the context
79 for the thread or process. k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bnt
\bte
\bex
\bxt
\bt is used by various func-
80 tions that are directly related to authentication between the serv-
81 er/client. Example of data that this structure contains are various
82 flags, addresses of client and server, port numbers, keyblocks (and sub-
83 keys), sequence numbers, replay cache, and checksum-type.
85 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_i
\bin
\bni
\bit
\bt() allocates and initializes the k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bnt
\bte
\bex
\bxt
\bt
86 structure. Default values can be changed with
87 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btc
\bck
\bks
\bsu
\bum
\bmt
\bty
\byp
\bpe
\be() and k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btf
\bfl
\bla
\bag
\bgs
\bs(). The
88 a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bnt
\bte
\bex
\bxt
\bt structure must be freed by k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_f
\bfr
\bre
\bee
\be().
90 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btf
\bfl
\bla
\bag
\bgs
\bs() and k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btf
\bfl
\bla
\bag
\bgs
\bs() gets and modifies
91 the flags for a k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bnt
\bte
\bex
\bxt
\bt structure. Possible flags to set are:
93 KRB5_AUTH_CONTEXT_DO_TIME
94 check timestamp on incoming packets.
96 KRB5_AUTH_CONTEXT_DO_SEQUENCE
97 Generate and check sequence-number on each packet.
99 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\bta
\bad
\bdd
\bdr
\brs
\bs(), k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\bta
\bad
\bdd
\bdr
\brs
\bs_
\b_f
\bfr
\bro
\bom
\bm_
\b_f
\bfd
\bd() and
100 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\bta
\bad
\bdd
\bdr
\brs
\bs() gets and sets the addresses that are checked
101 when a packet is received. It is mandatory to set an address for the re-
102 mote host. If the local address is not set, it iss deduced from the un-
103 derlaying operating system. k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\bta
\bad
\bdd
\bdr
\brs
\bs() will call
104 k
\bkr
\brb
\bb5
\b5_
\b_f
\bfr
\bre
\bee
\be_
\b_a
\bad
\bdd
\bdr
\bre
\bes
\bss
\bs() on any address that is passed in _
\bl_
\bo_
\bc_
\ba_
\bl_
\b__
\ba_
\bd_
\bd_
\br or
105 _
\br_
\be_
\bm_
\bo_
\bt_
\be_
\b__
\ba_
\bd_
\bd_
\br. k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\bta
\bad
\bdd
\bdr
\br() allows passing in a NULL pointer as
106 _
\bl_
\bo_
\bc_
\ba_
\bl_
\b__
\ba_
\bd_
\bd_
\br and _
\br_
\be_
\bm_
\bo_
\bt_
\be_
\b__
\ba_
\bd_
\bd_
\br, in that case it will just not set that ad-
109 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\bta
\bad
\bdd
\bdr
\brs
\bs_
\b_f
\bfr
\bro
\bom
\bm_
\b_f
\bfd
\bd() fetches the addresses from a file de-
112 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\ben
\bna
\bad
\bdd
\bdr
\brs
\bs() fetches the address information from the given
113 file descriptor _
\bf_
\bd depending on the bitmap argument _
\bf_
\bl_
\ba_
\bg_
\bs.
115 Possible values on _
\bf_
\bl_
\ba_
\bg_
\bs are:
117 _
\bK_
\bR_
\bB_
\b5_
\b__
\bA_
\bU_
\bT_
\bH_
\b__
\bC_
\bO_
\bN_
\bT_
\bE_
\bX_
\bT_
\b__
\bG_
\bE_
\bN_
\bE_
\bR_
\bA_
\bT_
\bE_
\b__
\bL_
\bO_
\bC_
\bA_
\bL_
\b__
\bA_
\bD_
\bD_
\bR
118 fetches the local address from _
\bf_
\bd.
120 _
\bK_
\bR_
\bB_
\b5_
\b__
\bA_
\bU_
\bT_
\bH_
\b__
\bC_
\bO_
\bN_
\bT_
\bE_
\bX_
\bT_
\b__
\bG_
\bE_
\bN_
\bE_
\bR_
\bA_
\bT_
\bE_
\b__
\bR_
\bE_
\bM_
\bO_
\bT_
\bE_
\b__
\bA_
\bD_
\bD_
\bR
121 fetches the remote address from _
\bf_
\bd.
123 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btk
\bke
\bey
\by(), k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btu
\bus
\bse
\ber
\brk
\bke
\bey
\by() and
124 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btk
\bke
\bey
\by() gets and sets the key used for this auth context.
125 The keyblock returned by k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btk
\bke
\bey
\by() should be freed with
126 k
\bkr
\brb
\bb5
\b5_
\b_f
\bfr
\bre
\bee
\be_
\b_k
\bke
\bey
\byb
\bbl
\blo
\boc
\bck
\bk(). The keyblock send into k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btk
\bke
\bey
\by() is
127 copied into the k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bnt
\bte
\bex
\bxt
\bt, and thus no special handling is need-
128 ed. NULL is not a valid keyblock to k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btk
\bke
\bey
\by().
130 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btu
\bus
\bse
\ber
\brk
\bke
\bey
\by() is only useful when doing user to user authen-
131 tication. k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btk
\bke
\bey
\by() is equivalent to
132 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btu
\bus
\bse
\ber
\brk
\bke
\bey
\by().
134 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btl
\blo
\boc
\bca
\bal
\bls
\bsu
\bub
\bbk
\bke
\bey
\by(), k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btl
\blo
\boc
\bca
\bal
\bls
\bsu
\bub
\bbk
\bke
\bey
\by(),
135 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btr
\bre
\bem
\bmo
\bot
\bte
\bes
\bsu
\bub
\bbk
\bke
\bey
\by() and k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btr
\bre
\bem
\bmo
\bot
\bte
\bes
\bsu
\bub
\bbk
\bke
\bey
\by() gets
136 and sets the keyblock for the local and remote subkey. The keyblock re-
137 turned by k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btl
\blo
\boc
\bca
\bal
\bls
\bsu
\bub
\bbk
\bke
\bey
\by() and
138 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btr
\bre
\bem
\bmo
\bot
\bte
\bes
\bsu
\bub
\bbk
\bke
\bey
\by() must be freed with k
\bkr
\brb
\bb5
\b5_
\b_f
\bfr
\bre
\bee
\be_
\b_k
\bke
\bey
\byb
\bbl
\blo
\boc
\bck
\bk().
140 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_s
\bse
\bet
\btc
\bck
\bks
\bsu
\bum
\bmt
\bty
\byp
\bpe
\be() and k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_g
\bge
\bet
\btc
\bck
\bks
\bsu
\bum
\bmt
\bty
\byp
\bpe
\be() sets and gets the
141 checksum type that should be used for this connection.
143 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_g
\bge
\bet
\btr
\bre
\bem
\bmo
\bot
\bte
\bes
\bse
\beq
\bqn
\bnu
\bum
\bmb
\bbe
\ber
\br() k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_s
\bse
\bet
\btr
\bre
\bem
\bmo
\bot
\bte
\bes
\bse
\beq
\bqn
\bnu
\bum
\bmb
\bbe
\ber
\br(),
144 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_g
\bge
\bet
\btl
\blo
\boc
\bca
\bal
\bls
\bse
\beq
\bqn
\bnu
\bum
\bmb
\bbe
\ber
\br() and k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_s
\bse
\bet
\btl
\blo
\boc
\bca
\bal
\bls
\bse
\beq
\bqn
\bnu
\bum
\bmb
\bbe
\ber
\br() gets and
145 sets the sequence-number for the local and remote sequence-number
148 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_s
\bse
\bet
\btk
\bke
\bey
\byt
\bty
\byp
\bpe
\be() and k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_g
\bge
\bet
\btk
\bke
\bey
\byt
\bty
\byp
\bpe
\be() gets and gets the key-
149 type of the keyblock in k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bnt
\bte
\bex
\bxt
\bt.
151 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_g
\bge
\bet
\bta
\bau
\but
\bth
\bhe
\ben
\bnt
\bti
\bic
\bca
\bat
\bto
\bor
\br() Retrieves the authenticator that was used
152 during mutual authentication. The authenticator returned should be freed
153 by calling k
\bkr
\brb
\bb5
\b5_
\b_f
\bfr
\bre
\bee
\be_
\b_a
\bau
\but
\bth
\bhe
\ben
\bnt
\bti
\bic
\bca
\bat
\bto
\bor
\br().
155 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_g
\bge
\bet
\btr
\brc
\bca
\bac
\bch
\bhe
\be() and k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\btr
\brc
\bca
\bac
\bch
\bhe
\be() gets and sets the
158 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_i
\bin
\bni
\bit
\bti
\biv
\bve
\bec
\bct
\bto
\bor
\br() allocates memory for and zeros the initial
159 vector in the _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt keyblock.
161 k
\bkr
\brb
\bb5
\b5_
\b_a
\bau
\but
\bth
\bh_
\b_c
\bco
\bon
\bn_
\b_s
\bse
\bet
\bti
\biv
\bve
\bec
\bct
\bto
\bor
\br() sets the i_vector portion of _
\ba_
\bu_
\bt_
\bh_
\b__
\bc_
\bo_
\bn_
\bt_
\be_
\bx_
\bt to
162 _
\bi_
\bv_
\be_
\bc_
\bt_
\bo_
\br.
164 S
\bSE
\bEE
\bE A
\bAL
\bLS
\bSO
\bO
165 krb5_context(3), kerberos(8)
167 HEIMDAL January 21, 2001 3