mirror of
https://github.com/zeek/zeek.git
synced 2025-10-15 13:08:20 +00:00
Kerberos: A couple more formatting fixes.
This commit is contained in:
parent
a8373b60e7
commit
5bba7ad1eb
1 changed files with 40 additions and 40 deletions
|
@ -2978,35 +2978,35 @@ export {
|
|||
## KDC Options. See :rfc:`4120`
|
||||
type KRB::KDC_Options: record {
|
||||
## The ticket to be issued should have its forwardable flag set.
|
||||
forwardable : bool;
|
||||
forwardable : bool;
|
||||
## A (TGT) request for forwarding.
|
||||
forwarded : bool;
|
||||
forwarded : bool;
|
||||
## The ticket to be issued should have its proxiable flag set.
|
||||
proxiable : bool;
|
||||
proxiable : bool;
|
||||
## A request for a proxy.
|
||||
proxy : bool;
|
||||
proxy : bool;
|
||||
## The ticket to be issued should have its may-postdate flag set.
|
||||
allow_postdate : bool;
|
||||
allow_postdate : bool;
|
||||
## A request for a postdated ticket.
|
||||
postdated : bool;
|
||||
postdated : bool;
|
||||
## The ticket to be issued should have its renewable flag set.
|
||||
renewable : bool;
|
||||
renewable : bool;
|
||||
## Reserved for opt_hardware_auth
|
||||
opt_hardware_auth : bool;
|
||||
opt_hardware_auth : bool;
|
||||
## Request that the KDC not check the transited field of a TGT against
|
||||
## the policy of the local realm before it will issue derivative tickets
|
||||
## based on the TGT.
|
||||
disable_transited_check : bool;
|
||||
disable_transited_check : bool;
|
||||
## If a ticket with the requested lifetime cannot be issued, a renewable
|
||||
## ticket is acceptable
|
||||
renewable_ok : bool;
|
||||
renewable_ok : bool;
|
||||
## The ticket for the end server is to be encrypted in the session key
|
||||
## from the additional TGT provided
|
||||
enc_tkt_in_skey : bool;
|
||||
enc_tkt_in_skey : bool;
|
||||
## The request is for a renewal
|
||||
renew : bool;
|
||||
renew : bool;
|
||||
## The request is to validate a postdated ticket.
|
||||
validate : bool;
|
||||
validate : bool;
|
||||
};
|
||||
|
||||
## AP Options. See :rfc:`4120`
|
||||
|
@ -3032,11 +3032,11 @@ export {
|
|||
## A Kerberos host address See :rfc:`4120`.
|
||||
type KRB::Host_Address: record {
|
||||
## IPv4 or IPv6 address
|
||||
ip : addr &log &optional;
|
||||
ip : addr &log &optional;
|
||||
## NetBIOS address
|
||||
netbios : string &log &optional;
|
||||
netbios : string &log &optional;
|
||||
## Some other type that we don't support yet
|
||||
unknown : KRB::Type_Value &optional;
|
||||
unknown : KRB::Type_Value &optional;
|
||||
};
|
||||
|
||||
type KRB::Host_Address_Vector: vector of KRB::Host_Address;
|
||||
|
@ -3063,27 +3063,27 @@ export {
|
|||
## The data from the ERROR_MSG message. See :rfc:`4120`.
|
||||
type KRB::Error_Msg: record {
|
||||
## Protocol version number (5 for KRB5)
|
||||
pvno : count;
|
||||
pvno : count;
|
||||
## The message type (30 for ERROR_MSG)
|
||||
msg_type : count;
|
||||
msg_type : count;
|
||||
## Current time on the client
|
||||
client_time : time &optional;
|
||||
client_time : time &optional;
|
||||
## Current time on the server
|
||||
server_time : time;
|
||||
server_time : time;
|
||||
## The specific error code
|
||||
error_code : count;
|
||||
error_code : count;
|
||||
## Realm of the ticket
|
||||
client_realm : string &optional;
|
||||
## Name on the ticket
|
||||
client_name : string &optional;
|
||||
client_name : string &optional;
|
||||
## Realm of the service
|
||||
service_realm : string;
|
||||
## Name of the service
|
||||
service_name : string;
|
||||
## Additional text to explain the error
|
||||
error_text : string &optional;
|
||||
error_text : string &optional;
|
||||
## Optional pre-authentication data
|
||||
pa_data : vector of KRB::Type_Value &optional;
|
||||
pa_data : vector of KRB::Type_Value &optional;
|
||||
};
|
||||
|
||||
|
||||
|
@ -3094,7 +3094,7 @@ export {
|
|||
## Realm
|
||||
realm : string;
|
||||
## Name of the service
|
||||
service_name: string;
|
||||
service_name : string;
|
||||
## Cipher the ticket was encrypted with
|
||||
cipher : count;
|
||||
};
|
||||
|
@ -3104,33 +3104,33 @@ export {
|
|||
## The data from the AS_REQ and TGS_REQ messages. See :rfc:`4120`.
|
||||
type KRB::KDC_Request: record {
|
||||
## Protocol version number (5 for KRB5)
|
||||
pvno : count;
|
||||
pvno : count;
|
||||
## The message type (10 for AS_REQ, 12 for TGS_REQ)
|
||||
msg_type : count;
|
||||
msg_type : count;
|
||||
## Optional pre-authentication data
|
||||
pa_data : vector of KRB::Type_Value &optional;
|
||||
pa_data : vector of KRB::Type_Value &optional;
|
||||
## Options specified in the request
|
||||
kdc_options : KRB::KDC_Options;
|
||||
kdc_options : KRB::KDC_Options;
|
||||
## Name on the ticket
|
||||
client_name : string &optional;
|
||||
client_name : string &optional;
|
||||
|
||||
## Realm of the service
|
||||
service_realm : string;
|
||||
## Name of the service
|
||||
service_name : string &optional;
|
||||
## Time the ticket is good from
|
||||
from : time &optional;
|
||||
from : time &optional;
|
||||
## Time the ticket is good till
|
||||
till : time;
|
||||
till : time;
|
||||
## The requested renew-till time
|
||||
rtime : time &optional;
|
||||
rtime : time &optional;
|
||||
|
||||
## A random nonce generated by the client
|
||||
nonce : count;
|
||||
nonce : count;
|
||||
## The desired encryption algorithms, in order of preference
|
||||
encryption_types : vector of count;
|
||||
## Any additional addresses the ticket should be valid for
|
||||
host_addrs : vector of KRB::Host_Address &optional;
|
||||
host_addrs : vector of KRB::Host_Address &optional;
|
||||
## Additional tickets may be included for certain transactions
|
||||
additional_tickets : vector of KRB::Ticket &optional;
|
||||
};
|
||||
|
@ -3138,18 +3138,18 @@ export {
|
|||
## The data from the AS_REQ and TGS_REQ messages. See :rfc:`4120`.
|
||||
type KRB::KDC_Response: record {
|
||||
## Protocol version number (5 for KRB5)
|
||||
pvno : count;
|
||||
pvno : count;
|
||||
## The message type (11 for AS_REP, 13 for TGS_REP)
|
||||
msg_type : count;
|
||||
msg_type : count;
|
||||
## Optional pre-authentication data
|
||||
pa_data : vector of KRB::Type_Value &optional;
|
||||
pa_data : vector of KRB::Type_Value &optional;
|
||||
## Realm on the ticket
|
||||
client_realm : string &optional;
|
||||
## Name on the service
|
||||
client_name : string;
|
||||
client_name : string;
|
||||
|
||||
## The ticket that was issued
|
||||
ticket : KRB::Ticket;
|
||||
ticket : KRB::Ticket;
|
||||
};
|
||||
}
|
||||
|
||||
|
|
Loading…
Add table
Add a link
Reference in a new issue