Merge from vendor branch HEIMDAL:
[dragonfly.git] / crypto / heimdal-0.6.3 / lib / krb5 / krb5_auth_context.cat3
1
2 KRB5_AUTH_CONTEXT(3)       UNIX Programmer's Manual       KRB5_AUTH_CONTEXT(3)
3
4 N\bNA\bAM\bME\bE
5      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bnt\bte\bex\bxt\bt, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_i\bin\bni\bit\bt, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_f\bfr\bre\bee\be,
6      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btf\bfl\bla\bag\bgs\bs, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btf\bfl\bla\bag\bgs\bs, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\bta\bad\bdd\bdr\brs\bs,
7      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\bta\bad\bdd\bdr\brs\bs_\b_f\bfr\bro\bom\bm_\b_f\bfd\bd, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\bta\bad\bdd\bdr\brs\bs,
8      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\ben\bna\bad\bdd\bdr\brs\bs, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btk\bke\bey\by, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btk\bke\bey\by,
9      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btu\bus\bse\ber\brk\bke\bey\by, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btu\bus\bse\ber\brk\bke\bey\by,
10      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btl\blo\boc\bca\bal\bls\bsu\bub\bbk\bke\bey\by, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btl\blo\boc\bca\bal\bls\bsu\bub\bbk\bke\bey\by,
11      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btr\bre\bem\bmo\bot\bte\bes\bsu\bub\bbk\bke\bey\by, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btr\bre\bem\bmo\bot\bte\bes\bsu\bub\bbk\bke\bey\by,
12      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_s\bse\bet\btc\bck\bks\bsu\bum\bmt\bty\byp\bpe\be, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_g\bge\bet\btc\bck\bks\bsu\bum\bmt\bty\byp\bpe\be, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_s\bse\bet\btk\bke\bey\byt\bty\byp\bpe\be,
13      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_g\bge\bet\btk\bke\bey\byt\bty\byp\bpe\be, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_g\bge\bet\btl\blo\boc\bca\bal\bls\bse\beq\bqn\bnu\bum\bmb\bbe\ber\br,
14      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_s\bse\bet\btl\blo\boc\bca\bal\bls\bse\beq\bqn\bnu\bum\bmb\bbe\ber\br, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_g\bge\bet\btr\bre\bem\bmo\bot\bte\bes\bse\beq\bqn\bnu\bum\bmb\bbe\ber\br,
15      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_s\bse\bet\btr\bre\bem\bmo\bot\bte\bes\bse\beq\bqn\bnu\bum\bmb\bbe\ber\br, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_g\bge\bet\bta\bau\but\bth\bhe\ben\bnt\bti\bic\bca\bat\bto\bor\br,
16      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btr\brc\bca\bac\bch\bhe\be, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btr\brc\bca\bac\bch\bhe\be,
17      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_i\bin\bni\bit\bti\biv\bve\bec\bct\bto\bor\br, k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\bti\biv\bve\bec\bct\bto\bor\br - manage authentica-
18      tion on connection level
19
20 L\bLI\bIB\bBR\bRA\bAR\bRY\bY
21      Kerberos 5 Library (libkrb5, -lkrb5)
22
23 S\bSY\bYN\bNO\bOP\bPS\bSI\bIS\bS
24      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
25      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_i\bin\bni\bit\bt(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\b*_\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt)
26
27      _\bv_\bo_\bi_\bd
28      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_f\bfr\bre\bee\be(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt)
29
30      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
31      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btf\bfl\bla\bag\bgs\bs(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt,
32              _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bi_\bn_\bt_\b3_\b2_\b__\bt _\bf_\bl_\ba_\bg_\bs)
33
34      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
35      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btf\bfl\bla\bag\bgs\bs(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt,
36              _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bi_\bn_\bt_\b3_\b2_\b__\bt _\b*_\bf_\bl_\ba_\bg_\bs)
37
38      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
39      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\bta\bad\bdd\bdr\brs\bs(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt,
40              _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bk_\br_\bb_\b5_\b__\ba_\bd_\bd_\br_\be_\bs_\bs _\b*_\bl_\bo_\bc_\ba_\bl_\b__\ba_\bd_\bd_\br,
41              _\bk_\br_\bb_\b5_\b__\ba_\bd_\bd_\br_\be_\bs_\bs _\b*_\br_\be_\bm_\bo_\bt_\be_\b__\ba_\bd_\bd_\br)
42
43      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
44      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\bta\bad\bdd\bdr\brs\bs(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt,
45              _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bk_\br_\bb_\b5_\b__\ba_\bd_\bd_\br_\be_\bs_\bs _\b*_\b*_\bl_\bo_\bc_\ba_\bl_\b__\ba_\bd_\bd_\br,
46              _\bk_\br_\bb_\b5_\b__\ba_\bd_\bd_\br_\be_\bs_\bs _\b*_\b*_\br_\be_\bm_\bo_\bt_\be_\b__\ba_\bd_\bd_\br)
47
48      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
49      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\ben\bna\bad\bdd\bdr\brs\bs(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt,
50              _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bi_\bn_\bt _\bf_\bd, _\bi_\bn_\bt _\bf_\bl_\ba_\bg_\bs)
51
52      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
53      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\bta\bad\bdd\bdr\brs\bs_\b_f\bfr\bro\bom\bm_\b_f\bfd\bd(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt,
54              _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bv_\bo_\bi_\bd _\b*_\bp_\b__\bf_\bd)
55
56      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
57      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btk\bke\bey\by(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt,
58              _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bk_\br_\bb_\b5_\b__\bk_\be_\by_\bb_\bl_\bo_\bc_\bk _\b*_\b*_\bk_\be_\by_\bb_\bl_\bo_\bc_\bk)
59
60      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
61      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btl\blo\boc\bca\bal\bls\bsu\bub\bbk\bke\bey\by(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt,
62              _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bk_\br_\bb_\b5_\b__\bk_\be_\by_\bb_\bl_\bo_\bc_\bk _\b*_\b*_\bk_\be_\by_\bb_\bl_\bo_\bc_\bk)
63
64      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
65      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btr\bre\bem\bmo\bot\bte\bes\bsu\bub\bbk\bke\bey\by(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt,
66              _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bk_\br_\bb_\b5_\b__\bk_\be_\by_\bb_\bl_\bo_\bc_\bk _\b*_\b*_\bk_\be_\by_\bb_\bl_\bo_\bc_\bk)
67
68      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
69      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_i\bin\bni\bit\bti\biv\bve\bec\bct\bto\bor\br(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt,
70              _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt)
71
72      _\bk_\br_\bb_\b5_\b__\be_\br_\br_\bo_\br_\b__\bc_\bo_\bd_\be
73      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\bti\biv\bve\bec\bct\bto\bor\br(_\bk_\br_\bb_\b5_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\bc_\bo_\bn_\bt_\be_\bx_\bt,
74              _\bk_\br_\bb_\b5_\b__\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt _\b*_\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt, _\bk_\br_\bb_\b5_\b__\bp_\bo_\bi_\bn_\bt_\be_\br _\bi_\bv_\be_\bc_\bt_\bo_\br)
75
76 D\bDE\bES\bSC\bCR\bRI\bIP\bPT\bTI\bIO\bON\bN
77      The k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bnt\bte\bex\bxt\bt structure holds all context related to an authenti-
78      cated connection, in a similar way to k\bkr\brb\bb5\b5_\b_c\bco\bon\bnt\bte\bex\bxt\bt that holds the context
79      for the thread or process.  k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bnt\bte\bex\bxt\bt is used by various func-
80      tions that are directly related to authentication between the serv-
81      er/client. Example of data that this structure contains are various
82      flags, addresses of client and server, port numbers, keyblocks (and sub-
83      keys), sequence numbers, replay cache, and checksum-type.
84
85      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_i\bin\bni\bit\bt() allocates and initializes the k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bnt\bte\bex\bxt\bt
86      structure. Default values can be changed with
87      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btc\bck\bks\bsu\bum\bmt\bty\byp\bpe\be() and k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btf\bfl\bla\bag\bgs\bs().  The
88      a\bau\but\bth\bh_\b_c\bco\bon\bnt\bte\bex\bxt\bt structure must be freed by k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_f\bfr\bre\bee\be().
89
90      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btf\bfl\bla\bag\bgs\bs() and k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btf\bfl\bla\bag\bgs\bs() gets and modifies
91      the flags for a k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bnt\bte\bex\bxt\bt structure. Possible flags to set are:
92
93      KRB5_AUTH_CONTEXT_DO_TIME
94              check timestamp on incoming packets.
95
96      KRB5_AUTH_CONTEXT_DO_SEQUENCE
97              Generate and check sequence-number on each packet.
98
99      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\bta\bad\bdd\bdr\brs\bs(), k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\bta\bad\bdd\bdr\brs\bs_\b_f\bfr\bro\bom\bm_\b_f\bfd\bd() and
100      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\bta\bad\bdd\bdr\brs\bs() gets and sets the addresses that are checked
101      when a packet is received.  It is mandatory to set an address for the re-
102      mote host. If the local address is not set, it iss deduced from the un-
103      derlaying operating system.  k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\bta\bad\bdd\bdr\brs\bs() will call
104      k\bkr\brb\bb5\b5_\b_f\bfr\bre\bee\be_\b_a\bad\bdd\bdr\bre\bes\bss\bs() on any address that is passed in _\bl_\bo_\bc_\ba_\bl_\b__\ba_\bd_\bd_\br or
105      _\br_\be_\bm_\bo_\bt_\be_\b__\ba_\bd_\bd_\br. k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\bta\bad\bdd\bdr\br() allows passing in a NULL pointer as
106      _\bl_\bo_\bc_\ba_\bl_\b__\ba_\bd_\bd_\br and _\br_\be_\bm_\bo_\bt_\be_\b__\ba_\bd_\bd_\br, in that case it will just not set that ad-
107      dress.
108
109      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\bta\bad\bdd\bdr\brs\bs_\b_f\bfr\bro\bom\bm_\b_f\bfd\bd() fetches the addresses from a file de-
110      scriptor.
111
112      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\ben\bna\bad\bdd\bdr\brs\bs() fetches the address information from the given
113      file descriptor _\bf_\bd depending on the bitmap argument _\bf_\bl_\ba_\bg_\bs.
114
115      Possible values on _\bf_\bl_\ba_\bg_\bs are:
116
117      _\bK_\bR_\bB_\b5_\b__\bA_\bU_\bT_\bH_\b__\bC_\bO_\bN_\bT_\bE_\bX_\bT_\b__\bG_\bE_\bN_\bE_\bR_\bA_\bT_\bE_\b__\bL_\bO_\bC_\bA_\bL_\b__\bA_\bD_\bD_\bR
118              fetches the local address from _\bf_\bd.
119
120      _\bK_\bR_\bB_\b5_\b__\bA_\bU_\bT_\bH_\b__\bC_\bO_\bN_\bT_\bE_\bX_\bT_\b__\bG_\bE_\bN_\bE_\bR_\bA_\bT_\bE_\b__\bR_\bE_\bM_\bO_\bT_\bE_\b__\bA_\bD_\bD_\bR
121              fetches the remote address from _\bf_\bd.
122
123      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btk\bke\bey\by(), k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btu\bus\bse\ber\brk\bke\bey\by() and
124      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btk\bke\bey\by() gets and sets the key used for this auth context.
125      The keyblock returned by k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btk\bke\bey\by() should be freed with
126      k\bkr\brb\bb5\b5_\b_f\bfr\bre\bee\be_\b_k\bke\bey\byb\bbl\blo\boc\bck\bk().  The keyblock send into k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btk\bke\bey\by() is
127      copied into the k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bnt\bte\bex\bxt\bt, and thus no special handling is need-
128      ed.  NULL is not a valid keyblock to k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btk\bke\bey\by().
129
130      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btu\bus\bse\ber\brk\bke\bey\by() is only useful when doing user to user authen-
131      tication.  k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btk\bke\bey\by() is equivalent to
132      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btu\bus\bse\ber\brk\bke\bey\by().
133
134      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btl\blo\boc\bca\bal\bls\bsu\bub\bbk\bke\bey\by(), k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btl\blo\boc\bca\bal\bls\bsu\bub\bbk\bke\bey\by(),
135      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btr\bre\bem\bmo\bot\bte\bes\bsu\bub\bbk\bke\bey\by() and k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btr\bre\bem\bmo\bot\bte\bes\bsu\bub\bbk\bke\bey\by() gets
136      and sets the keyblock for the local and remote subkey. The keyblock re-
137      turned by k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btl\blo\boc\bca\bal\bls\bsu\bub\bbk\bke\bey\by() and
138      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btr\bre\bem\bmo\bot\bte\bes\bsu\bub\bbk\bke\bey\by() must be freed with k\bkr\brb\bb5\b5_\b_f\bfr\bre\bee\be_\b_k\bke\bey\byb\bbl\blo\boc\bck\bk().
139
140      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_s\bse\bet\btc\bck\bks\bsu\bum\bmt\bty\byp\bpe\be() and k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_g\bge\bet\btc\bck\bks\bsu\bum\bmt\bty\byp\bpe\be() sets and gets the
141      checksum type that should be used for this connection.
142
143      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_g\bge\bet\btr\bre\bem\bmo\bot\bte\bes\bse\beq\bqn\bnu\bum\bmb\bbe\ber\br() k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_s\bse\bet\btr\bre\bem\bmo\bot\bte\bes\bse\beq\bqn\bnu\bum\bmb\bbe\ber\br(),
144      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_g\bge\bet\btl\blo\boc\bca\bal\bls\bse\beq\bqn\bnu\bum\bmb\bbe\ber\br() and k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_s\bse\bet\btl\blo\boc\bca\bal\bls\bse\beq\bqn\bnu\bum\bmb\bbe\ber\br() gets and
145      sets the sequence-number for the local and remote sequence-number
146      counter.
147
148      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_s\bse\bet\btk\bke\bey\byt\bty\byp\bpe\be() and k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_g\bge\bet\btk\bke\bey\byt\bty\byp\bpe\be() gets and gets the key-
149      type of the keyblock in k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bnt\bte\bex\bxt\bt.
150
151      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_g\bge\bet\bta\bau\but\bth\bhe\ben\bnt\bti\bic\bca\bat\bto\bor\br() Retrieves the authenticator that was used
152      during mutual authentication. The authenticator returned should be freed
153      by calling k\bkr\brb\bb5\b5_\b_f\bfr\bre\bee\be_\b_a\bau\but\bth\bhe\ben\bnt\bti\bic\bca\bat\bto\bor\br().
154
155      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_g\bge\bet\btr\brc\bca\bac\bch\bhe\be() and k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\btr\brc\bca\bac\bch\bhe\be() gets and sets the
156      replay-cache.
157
158      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_i\bin\bni\bit\bti\biv\bve\bec\bct\bto\bor\br() allocates memory for and zeros the initial
159      vector in the _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt keyblock.
160
161      k\bkr\brb\bb5\b5_\b_a\bau\but\bth\bh_\b_c\bco\bon\bn_\b_s\bse\bet\bti\biv\bve\bec\bct\bto\bor\br() sets the i_vector portion of _\ba_\bu_\bt_\bh_\b__\bc_\bo_\bn_\bt_\be_\bx_\bt to
162      _\bi_\bv_\be_\bc_\bt_\bo_\br.
163
164 S\bSE\bEE\bE A\bAL\bLS\bSO\bO
165      krb5_context(3),  kerberos(8)
166
167  HEIMDAL                       January 21, 2001                              3