diff --git a/scripts/base/init-bare.bro b/scripts/base/init-bare.bro index 9342890cdc..2c260a8cab 100644 --- a/scripts/base/init-bare.bro +++ b/scripts/base/init-bare.bro @@ -2978,35 +2978,35 @@ export { ## KDC Options. See :rfc:`4120` type KRB::KDC_Options: record { ## The ticket to be issued should have its forwardable flag set. - forwardable : bool; + forwardable : bool; ## A (TGT) request for forwarding. - forwarded : bool; + forwarded : bool; ## The ticket to be issued should have its proxiable flag set. - proxiable : bool; + proxiable : bool; ## A request for a proxy. - proxy : bool; + proxy : bool; ## The ticket to be issued should have its may-postdate flag set. - allow_postdate : bool; + allow_postdate : bool; ## A request for a postdated ticket. - postdated : bool; + postdated : bool; ## The ticket to be issued should have its renewable flag set. - renewable : bool; + renewable : bool; ## Reserved for opt_hardware_auth - opt_hardware_auth : bool; + opt_hardware_auth : bool; ## Request that the KDC not check the transited field of a TGT against ## the policy of the local realm before it will issue derivative tickets ## based on the TGT. - disable_transited_check : bool; + disable_transited_check : bool; ## If a ticket with the requested lifetime cannot be issued, a renewable ## ticket is acceptable - renewable_ok : bool; + renewable_ok : bool; ## The ticket for the end server is to be encrypted in the session key ## from the additional TGT provided - enc_tkt_in_skey : bool; + enc_tkt_in_skey : bool; ## The request is for a renewal - renew : bool; + renew : bool; ## The request is to validate a postdated ticket. - validate : bool; + validate : bool; }; ## AP Options. See :rfc:`4120` @@ -3032,11 +3032,11 @@ export { ## A Kerberos host address See :rfc:`4120`. type KRB::Host_Address: record { ## IPv4 or IPv6 address - ip : addr &log &optional; + ip : addr &log &optional; ## NetBIOS address - netbios : string &log &optional; + netbios : string &log &optional; ## Some other type that we don't support yet - unknown : KRB::Type_Value &optional; + unknown : KRB::Type_Value &optional; }; type KRB::Host_Address_Vector: vector of KRB::Host_Address; @@ -3063,27 +3063,27 @@ export { ## The data from the ERROR_MSG message. See :rfc:`4120`. type KRB::Error_Msg: record { ## Protocol version number (5 for KRB5) - pvno : count; + pvno : count; ## The message type (30 for ERROR_MSG) - msg_type : count; + msg_type : count; ## Current time on the client - client_time : time &optional; + client_time : time &optional; ## Current time on the server - server_time : time; + server_time : time; ## The specific error code - error_code : count; + error_code : count; ## Realm of the ticket client_realm : string &optional; ## Name on the ticket - client_name : string &optional; + client_name : string &optional; ## Realm of the service service_realm : string; ## Name of the service service_name : string; ## Additional text to explain the error - error_text : string &optional; + error_text : string &optional; ## Optional pre-authentication data - pa_data : vector of KRB::Type_Value &optional; + pa_data : vector of KRB::Type_Value &optional; }; @@ -3094,7 +3094,7 @@ export { ## Realm realm : string; ## Name of the service - service_name: string; + service_name : string; ## Cipher the ticket was encrypted with cipher : count; }; @@ -3104,33 +3104,33 @@ export { ## The data from the AS_REQ and TGS_REQ messages. See :rfc:`4120`. type KRB::KDC_Request: record { ## Protocol version number (5 for KRB5) - pvno : count; + pvno : count; ## The message type (10 for AS_REQ, 12 for TGS_REQ) - msg_type : count; + msg_type : count; ## Optional pre-authentication data - pa_data : vector of KRB::Type_Value &optional; + pa_data : vector of KRB::Type_Value &optional; ## Options specified in the request - kdc_options : KRB::KDC_Options; + kdc_options : KRB::KDC_Options; ## Name on the ticket - client_name : string &optional; + client_name : string &optional; ## Realm of the service service_realm : string; ## Name of the service service_name : string &optional; ## Time the ticket is good from - from : time &optional; + from : time &optional; ## Time the ticket is good till - till : time; + till : time; ## The requested renew-till time - rtime : time &optional; + rtime : time &optional; ## A random nonce generated by the client - nonce : count; + nonce : count; ## The desired encryption algorithms, in order of preference encryption_types : vector of count; ## Any additional addresses the ticket should be valid for - host_addrs : vector of KRB::Host_Address &optional; + host_addrs : vector of KRB::Host_Address &optional; ## Additional tickets may be included for certain transactions additional_tickets : vector of KRB::Ticket &optional; }; @@ -3138,18 +3138,18 @@ export { ## The data from the AS_REQ and TGS_REQ messages. See :rfc:`4120`. type KRB::KDC_Response: record { ## Protocol version number (5 for KRB5) - pvno : count; + pvno : count; ## The message type (11 for AS_REP, 13 for TGS_REP) - msg_type : count; + msg_type : count; ## Optional pre-authentication data - pa_data : vector of KRB::Type_Value &optional; + pa_data : vector of KRB::Type_Value &optional; ## Realm on the ticket client_realm : string &optional; ## Name on the service - client_name : string; + client_name : string; ## The ticket that was issued - ticket : KRB::Ticket; + ticket : KRB::Ticket; }; }