46d1f3a998
Existing work is underway to import a newer version of heimdal, but this patchset gets us to a fully working tree to enable more wide spread testing of OpenSSL 1.1 for now. I've also enabled WARNS=1 for kerberos (which is the reason for the change in libroken). Having -Werror enabled was useful during the 1.1 updates and we probably should have warnings enabled by default for kerberos anyway. This passes make tinderbox, and I have also done some very light runtime testing on amd64. Reviewed by: bjk, jkim, emaste Differential Revision: https://reviews.freebsd.org/D17276
195 lines
3.8 KiB
C
195 lines
3.8 KiB
C
/* This is a generated file */
|
|
#ifndef __heimntlm_protos_h__
|
|
#define __heimntlm_protos_h__
|
|
|
|
#include <stdarg.h>
|
|
|
|
#ifdef __cplusplus
|
|
extern "C" {
|
|
#endif
|
|
|
|
int
|
|
heim_ntlm_build_ntlm1_master (
|
|
void */*key*/,
|
|
size_t /*len*/,
|
|
struct ntlm_buf */*session*/,
|
|
struct ntlm_buf */*master*/);
|
|
|
|
int
|
|
heim_ntlm_build_ntlm2_master (
|
|
void */*key*/,
|
|
size_t /*len*/,
|
|
struct ntlm_buf */*blob*/,
|
|
struct ntlm_buf */*session*/,
|
|
struct ntlm_buf */*master*/);
|
|
|
|
int
|
|
heim_ntlm_calculate_lm2 (
|
|
const void */*key*/,
|
|
size_t /*len*/,
|
|
const char */*username*/,
|
|
const char */*target*/,
|
|
const unsigned char serverchallenge[8],
|
|
unsigned char ntlmv2[16],
|
|
struct ntlm_buf */*answer*/);
|
|
|
|
int
|
|
heim_ntlm_calculate_ntlm1 (
|
|
void */*key*/,
|
|
size_t /*len*/,
|
|
unsigned char challenge[8],
|
|
struct ntlm_buf */*answer*/);
|
|
|
|
int
|
|
heim_ntlm_calculate_ntlm2 (
|
|
const void */*key*/,
|
|
size_t /*len*/,
|
|
const char */*username*/,
|
|
const char */*target*/,
|
|
const unsigned char serverchallenge[8],
|
|
const struct ntlm_buf */*infotarget*/,
|
|
unsigned char ntlmv2[16],
|
|
struct ntlm_buf */*answer*/);
|
|
|
|
int
|
|
heim_ntlm_calculate_ntlm2_sess (
|
|
const unsigned char clnt_nonce[8],
|
|
const unsigned char svr_chal[8],
|
|
const unsigned char ntlm_hash[16],
|
|
struct ntlm_buf */*lm*/,
|
|
struct ntlm_buf */*ntlm*/);
|
|
|
|
int
|
|
heim_ntlm_calculate_ntlm2_sess_hash (
|
|
const unsigned char clnt_nonce[8],
|
|
const unsigned char svr_chal[8],
|
|
unsigned char verifier[8]);
|
|
|
|
int
|
|
heim_ntlm_decode_targetinfo (
|
|
const struct ntlm_buf */*data*/,
|
|
int /*ucs2*/,
|
|
struct ntlm_targetinfo */*ti*/);
|
|
|
|
int
|
|
heim_ntlm_decode_type1 (
|
|
const struct ntlm_buf */*buf*/,
|
|
struct ntlm_type1 */*data*/);
|
|
|
|
int
|
|
heim_ntlm_decode_type2 (
|
|
const struct ntlm_buf */*buf*/,
|
|
struct ntlm_type2 */*type2*/);
|
|
|
|
int
|
|
heim_ntlm_decode_type3 (
|
|
const struct ntlm_buf */*buf*/,
|
|
int /*ucs2*/,
|
|
struct ntlm_type3 */*type3*/);
|
|
|
|
int
|
|
heim_ntlm_derive_ntlm2_sess (
|
|
const unsigned char sessionkey[16],
|
|
const unsigned char */*clnt_nonce*/,
|
|
size_t /*clnt_nonce_length*/,
|
|
const unsigned char svr_chal[8],
|
|
unsigned char derivedkey[16]);
|
|
|
|
int
|
|
heim_ntlm_encode_targetinfo (
|
|
const struct ntlm_targetinfo */*ti*/,
|
|
int /*ucs2*/,
|
|
struct ntlm_buf */*data*/);
|
|
|
|
int
|
|
heim_ntlm_encode_type1 (
|
|
const struct ntlm_type1 */*type1*/,
|
|
struct ntlm_buf */*data*/);
|
|
|
|
int
|
|
heim_ntlm_encode_type2 (
|
|
const struct ntlm_type2 */*type2*/,
|
|
struct ntlm_buf */*data*/);
|
|
|
|
int
|
|
heim_ntlm_encode_type3 (
|
|
const struct ntlm_type3 */*type3*/,
|
|
struct ntlm_buf */*data*/);
|
|
|
|
void
|
|
heim_ntlm_free_buf (struct ntlm_buf */*p*/);
|
|
|
|
void
|
|
heim_ntlm_free_targetinfo (struct ntlm_targetinfo */*ti*/);
|
|
|
|
void
|
|
heim_ntlm_free_type1 (struct ntlm_type1 */*data*/);
|
|
|
|
void
|
|
heim_ntlm_free_type2 (struct ntlm_type2 */*data*/);
|
|
|
|
void
|
|
heim_ntlm_free_type3 (struct ntlm_type3 */*data*/);
|
|
|
|
int
|
|
heim_ntlm_keyex_unwrap (
|
|
struct ntlm_buf */*baseKey*/,
|
|
struct ntlm_buf */*encryptedSession*/,
|
|
struct ntlm_buf */*session*/);
|
|
|
|
int
|
|
heim_ntlm_keyex_wrap (
|
|
struct ntlm_buf */*base_session*/,
|
|
struct ntlm_buf */*session*/,
|
|
struct ntlm_buf */*encryptedSession*/);
|
|
|
|
int
|
|
heim_ntlm_nt_key (
|
|
const char */*password*/,
|
|
struct ntlm_buf */*key*/);
|
|
|
|
int
|
|
heim_ntlm_ntlmv2_key (
|
|
const void */*key*/,
|
|
size_t /*len*/,
|
|
const char */*username*/,
|
|
const char */*target*/,
|
|
unsigned char ntlmv2[16]);
|
|
|
|
size_t
|
|
heim_ntlm_unparse_flags (
|
|
uint32_t /*flags*/,
|
|
char */*s*/,
|
|
size_t /*len*/);
|
|
|
|
int
|
|
heim_ntlm_v1_base_session (
|
|
void */*key*/,
|
|
size_t /*len*/,
|
|
struct ntlm_buf */*session*/);
|
|
|
|
int
|
|
heim_ntlm_v2_base_session (
|
|
void */*key*/,
|
|
size_t /*len*/,
|
|
struct ntlm_buf */*ntlmResponse*/,
|
|
struct ntlm_buf */*session*/);
|
|
|
|
int
|
|
heim_ntlm_verify_ntlm2 (
|
|
const void */*key*/,
|
|
size_t /*len*/,
|
|
const char */*username*/,
|
|
const char */*target*/,
|
|
time_t /*now*/,
|
|
const unsigned char serverchallenge[8],
|
|
const struct ntlm_buf */*answer*/,
|
|
struct ntlm_buf */*infotarget*/,
|
|
unsigned char ntlmv2[16]);
|
|
|
|
#ifdef __cplusplus
|
|
}
|
|
#endif
|
|
|
|
#endif /* __heimntlm_protos_h__ */
|