summaryrefslogtreecommitdiff
path: root/ssl/kssl.h
diff options
context:
space:
mode:
authorRichard Levitte <levitte@openssl.org>2001-07-11 19:03:58 +0000
committerRichard Levitte <levitte@openssl.org>2001-07-11 19:03:58 +0000
commita5224c3420d20ef08a1db9cc1f90e952dcd75826 (patch)
treebb94c0cfaca8da857e0374b8c7e3cc4de9f4f3ae /ssl/kssl.h
parentaf436bc1580949f49c25370f8ad1042303f92259 (diff)
downloadopenssl-new-a5224c3420d20ef08a1db9cc1f90e952dcd75826.tar.gz
Changes to the Kerberos SSL code by Jeffrey Altman <jaltman@columbia.edu>
His comments are: . adds use of replay cache to protect against replay attacks . adds functions kssl_tgt_is_available() and kssl_keytab_is_available() which are used within s3_lib.c and ssl_lib.c to determine at runtime whether or not KRB5 ciphers can be supported during the current session.
Diffstat (limited to 'ssl/kssl.h')
-rw-r--r--ssl/kssl.h2
1 files changed, 2 insertions, 0 deletions
diff --git a/ssl/kssl.h b/ssl/kssl.h
index 7319b3daf2..a96d588cef 100644
--- a/ssl/kssl.h
+++ b/ssl/kssl.h
@@ -152,6 +152,8 @@ char *knumber(int len, krb5_octet *contents);
EVP_CIPHER *kssl_map_enc(krb5_enctype enctype);
+int kssl_keytab_is_available(KSSL_CTX *kssl_ctx);
+int kssl_tgt_is_available(KSSL_CTX *kssl_ctx);
/* Public (for use by applications that use OpenSSL with Kerberos 5 support */
krb5_error_code kssl_ctx_setstring(KSSL_CTX *kssl_ctx, int which, char *text);