Kerberos: A couple more formatting fixes.

This commit is contained in:
Vlad Grigorescu 2015-02-05 16:06:31 -05:00
parent a8373b60e7
commit 5bba7ad1eb

View file

@ -2978,35 +2978,35 @@ export {
## KDC Options. See :rfc:`4120` ## KDC Options. See :rfc:`4120`
type KRB::KDC_Options: record { type KRB::KDC_Options: record {
## The ticket to be issued should have its forwardable flag set. ## The ticket to be issued should have its forwardable flag set.
forwardable : bool; forwardable : bool;
## A (TGT) request for forwarding. ## A (TGT) request for forwarding.
forwarded : bool; forwarded : bool;
## The ticket to be issued should have its proxiable flag set. ## The ticket to be issued should have its proxiable flag set.
proxiable : bool; proxiable : bool;
## A request for a proxy. ## A request for a proxy.
proxy : bool; proxy : bool;
## The ticket to be issued should have its may-postdate flag set. ## The ticket to be issued should have its may-postdate flag set.
allow_postdate : bool; allow_postdate : bool;
## A request for a postdated ticket. ## A request for a postdated ticket.
postdated : bool; postdated : bool;
## The ticket to be issued should have its renewable flag set. ## The ticket to be issued should have its renewable flag set.
renewable : bool; renewable : bool;
## Reserved for opt_hardware_auth ## Reserved for opt_hardware_auth
opt_hardware_auth : bool; opt_hardware_auth : bool;
## Request that the KDC not check the transited field of a TGT against ## Request that the KDC not check the transited field of a TGT against
## the policy of the local realm before it will issue derivative tickets ## the policy of the local realm before it will issue derivative tickets
## based on the TGT. ## based on the TGT.
disable_transited_check : bool; disable_transited_check : bool;
## If a ticket with the requested lifetime cannot be issued, a renewable ## If a ticket with the requested lifetime cannot be issued, a renewable
## ticket is acceptable ## ticket is acceptable
renewable_ok : bool; renewable_ok : bool;
## The ticket for the end server is to be encrypted in the session key ## The ticket for the end server is to be encrypted in the session key
## from the additional TGT provided ## from the additional TGT provided
enc_tkt_in_skey : bool; enc_tkt_in_skey : bool;
## The request is for a renewal ## The request is for a renewal
renew : bool; renew : bool;
## The request is to validate a postdated ticket. ## The request is to validate a postdated ticket.
validate : bool; validate : bool;
}; };
## AP Options. See :rfc:`4120` ## AP Options. See :rfc:`4120`
@ -3032,11 +3032,11 @@ export {
## A Kerberos host address See :rfc:`4120`. ## A Kerberos host address See :rfc:`4120`.
type KRB::Host_Address: record { type KRB::Host_Address: record {
## IPv4 or IPv6 address ## IPv4 or IPv6 address
ip : addr &log &optional; ip : addr &log &optional;
## NetBIOS address ## NetBIOS address
netbios : string &log &optional; netbios : string &log &optional;
## Some other type that we don't support yet ## Some other type that we don't support yet
unknown : KRB::Type_Value &optional; unknown : KRB::Type_Value &optional;
}; };
type KRB::Host_Address_Vector: vector of KRB::Host_Address; type KRB::Host_Address_Vector: vector of KRB::Host_Address;
@ -3063,27 +3063,27 @@ export {
## The data from the ERROR_MSG message. See :rfc:`4120`. ## The data from the ERROR_MSG message. See :rfc:`4120`.
type KRB::Error_Msg: record { type KRB::Error_Msg: record {
## Protocol version number (5 for KRB5) ## Protocol version number (5 for KRB5)
pvno : count; pvno : count;
## The message type (30 for ERROR_MSG) ## The message type (30 for ERROR_MSG)
msg_type : count; msg_type : count;
## Current time on the client ## Current time on the client
client_time : time &optional; client_time : time &optional;
## Current time on the server ## Current time on the server
server_time : time; server_time : time;
## The specific error code ## The specific error code
error_code : count; error_code : count;
## Realm of the ticket ## Realm of the ticket
client_realm : string &optional; client_realm : string &optional;
## Name on the ticket ## Name on the ticket
client_name : string &optional; client_name : string &optional;
## Realm of the service ## Realm of the service
service_realm : string; service_realm : string;
## Name of the service ## Name of the service
service_name : string; service_name : string;
## Additional text to explain the error ## Additional text to explain the error
error_text : string &optional; error_text : string &optional;
## Optional pre-authentication data ## Optional pre-authentication data
pa_data : vector of KRB::Type_Value &optional; pa_data : vector of KRB::Type_Value &optional;
}; };
@ -3094,7 +3094,7 @@ export {
## Realm ## Realm
realm : string; realm : string;
## Name of the service ## Name of the service
service_name: string; service_name : string;
## Cipher the ticket was encrypted with ## Cipher the ticket was encrypted with
cipher : count; cipher : count;
}; };
@ -3104,33 +3104,33 @@ export {
## The data from the AS_REQ and TGS_REQ messages. See :rfc:`4120`. ## The data from the AS_REQ and TGS_REQ messages. See :rfc:`4120`.
type KRB::KDC_Request: record { type KRB::KDC_Request: record {
## Protocol version number (5 for KRB5) ## Protocol version number (5 for KRB5)
pvno : count; pvno : count;
## The message type (10 for AS_REQ, 12 for TGS_REQ) ## The message type (10 for AS_REQ, 12 for TGS_REQ)
msg_type : count; msg_type : count;
## Optional pre-authentication data ## Optional pre-authentication data
pa_data : vector of KRB::Type_Value &optional; pa_data : vector of KRB::Type_Value &optional;
## Options specified in the request ## Options specified in the request
kdc_options : KRB::KDC_Options; kdc_options : KRB::KDC_Options;
## Name on the ticket ## Name on the ticket
client_name : string &optional; client_name : string &optional;
## Realm of the service ## Realm of the service
service_realm : string; service_realm : string;
## Name of the service ## Name of the service
service_name : string &optional; service_name : string &optional;
## Time the ticket is good from ## Time the ticket is good from
from : time &optional; from : time &optional;
## Time the ticket is good till ## Time the ticket is good till
till : time; till : time;
## The requested renew-till time ## The requested renew-till time
rtime : time &optional; rtime : time &optional;
## A random nonce generated by the client ## A random nonce generated by the client
nonce : count; nonce : count;
## The desired encryption algorithms, in order of preference ## The desired encryption algorithms, in order of preference
encryption_types : vector of count; encryption_types : vector of count;
## Any additional addresses the ticket should be valid for ## Any additional addresses the ticket should be valid for
host_addrs : vector of KRB::Host_Address &optional; host_addrs : vector of KRB::Host_Address &optional;
## Additional tickets may be included for certain transactions ## Additional tickets may be included for certain transactions
additional_tickets : vector of KRB::Ticket &optional; additional_tickets : vector of KRB::Ticket &optional;
}; };
@ -3138,18 +3138,18 @@ export {
## The data from the AS_REQ and TGS_REQ messages. See :rfc:`4120`. ## The data from the AS_REQ and TGS_REQ messages. See :rfc:`4120`.
type KRB::KDC_Response: record { type KRB::KDC_Response: record {
## Protocol version number (5 for KRB5) ## Protocol version number (5 for KRB5)
pvno : count; pvno : count;
## The message type (11 for AS_REP, 13 for TGS_REP) ## The message type (11 for AS_REP, 13 for TGS_REP)
msg_type : count; msg_type : count;
## Optional pre-authentication data ## Optional pre-authentication data
pa_data : vector of KRB::Type_Value &optional; pa_data : vector of KRB::Type_Value &optional;
## Realm on the ticket ## Realm on the ticket
client_realm : string &optional; client_realm : string &optional;
## Name on the service ## Name on the service
client_name : string; client_name : string;
## The ticket that was issued ## The ticket that was issued
ticket : KRB::Ticket; ticket : KRB::Ticket;
}; };
} }