2N/A * Copyright (c) 1999, 2011, Oracle and/or its affiliates. All rights reserved. 2N/A * COPYRIGHT (C) 2006,2007 2N/A * THE REGENTS OF THE UNIVERSITY OF MICHIGAN 2N/A * ALL RIGHTS RESERVED 2N/A * Permission is granted to use, copy, create derivative works 2N/A * and redistribute this software and such derivative works 2N/A * for any purpose, so long as the name of The University of 2N/A * Michigan is not used in any advertising or publicity 2N/A * pertaining to the use of distribution of this software 2N/A * without specific, written prior authorization. If the 2N/A * above copyright notice or any other identification of the 2N/A * University of Michigan is included in any copy of any 2N/A * portion of this software, then the disclaimer below must 2N/A * THIS SOFTWARE IS PROVIDED AS IS, WITHOUT REPRESENTATION 2N/A * FROM THE UNIVERSITY OF MICHIGAN AS TO ITS FITNESS FOR ANY 2N/A * PURPOSE, AND WITHOUT WARRANTY BY THE UNIVERSITY OF 2N/A * MICHIGAN OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING 2N/A * WITHOUT LIMITATION THE IMPLIED WARRANTIES OF 2N/A * MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. THE 2N/A * REGENTS OF THE UNIVERSITY OF MICHIGAN SHALL NOT BE LIABLE 2N/A * FOR ANY DAMAGES, INCLUDING SPECIAL, INDIRECT, INCIDENTAL, OR 2N/A * CONSEQUENTIAL DAMAGES, WITH RESPECT TO ANY CLAIM ARISING 2N/A * OUT OF OR IN CONNECTION WITH THE USE OF THE SOFTWARE, EVEN 2N/A * IF IT HAS BEEN OR IS HEREAFTER ADVISED OF THE POSSIBILITY OF 2N/A * Copyright (c) 2008, 2011, Oracle and/or its affiliates. All rights reserved. 2N/A/* Solaris Kerberos */ 2N/A * It is anticipated that all the special checks currently 2N/A * required when talking to a Longhorn server will go away 2N/A * by the time it is officially released and all references 2N/A * to the longhorn global can be removed and any code 2N/A * #ifdef'd with LONGHORN_BETA_COMPAT can be removed. 2N/Aextern int longhorn;
/* XXX Talking to a Longhorn server? */ 2N/A/* Solaris Kerberos */ 2N/A/* Solaris Kerberos */ 2N/A/* Make pkiDebug(fmt,...) print, or not. */ 2N/A/* Still evaluates for side effects. */ 2N/A/* This is better if the compiler doesn't inline variadic functions 2N/A well, but gcc will warn about "left-hand operand of comma 2N/A expression has no effect". Still evaluates for side effects. */ 2N/A/* #define pkiDebug (void) */ 2N/A/* Solaris compiler doesn't grok __FUNCTION__ 2N/A * hack for now. Fix all the uses eventually. */ 2N/A/* Macros to deal with converting between various data types... */ 2N/A * notes about crypto contexts: 2N/A * the basic idea is that there are crypto contexts that live at 2N/A * both the plugin level and request level. the identity context (that 2N/A * keeps info about your own certs and such) is separate because 2N/A * it is needed at different levels for the kdc and and the client. 2N/A * (the kdc's identity is at the plugin level, the client's identity 2N/A * information could change per-request.) 2N/A * the identity context is meant to have the entity's cert, 2N/A * a list of trusted and intermediate cas, a list of crls, and any 2N/A * pkcs11 information. the req context is meant to have the 2N/A * received certificate and the DH related information. the plugin 2N/A * context is meant to have global crypto information, i.e., OIDs 2N/A * and constant DH parameter information. 2N/A * plugin crypto context should keep plugin common information, 2N/A * eg., OIDs, known DHparams 2N/A * request crypto context should keep reqyest common information, 2N/A * eg., received credentials, DH parameters of this request 2N/A * identity context should keep information about credentials 2N/A * for the request, eg., my credentials, trusted ca certs, 2N/A * intermediate ca certs, crls, pkcs11 info 2N/A * this structure keeps information about the config options 2N/A * this structure keeps options used for a given request 2N/A int dh_size;
/* initial request DH modulus size (default=1024) */ 2N/A * information about identity from config file or command line 2N/A char *
PIN;
/* Solaris Kerberos */ 2N/A * Client's plugin context 2N/A * Client's per-request context 2N/A * KDC's (per-realm) plugin context 2N/A * KDC's per-request context 2N/A * initialization and free functions 2N/A * debugging functions 2N/A/* Solaris Kerberos - make const to work with openssl 1.0 */ 2N/A * Now get crypto function declarations 2N/A#
endif /* _PKINIT_H */