| Modifier and Type | Class and Description |
|---|---|
class |
AdToken
The AdToken component as defined in "Token Pre-Authentication for Kerberos", "draft-ietf-kitten-kerb-token-preauth-01"
(not yet published, but stored in docs/Token-preauth.pdf) :
|
class |
AuthorizationDataEntry
The AuthorizationData component as defined in RFC 4120 :
|
| Modifier and Type | Class and Description |
|---|---|
class |
CheckSum
The CheckSum as defined in RFC 4120 :
|
class |
EncryptedData
The EncryptedData structure, as defined in RFC 4120 :
|
class |
EncryptionKey
EncryptionKey ::= SEQUENCE {
keytype [0] Int32 -- actually encryption type --,
keyvalue [1] OCTET STRING
}
|
class |
EtypeInfo2Entry
ETYPE-INFO2-ENTRY ::= SEQUENCE {
etype [0] Int32,
salt [1] KerberosString OPTIONAL,
s2kparams [2] OCTET STRING OPTIONAL
}
|
class |
EtypeInfoEntry
ETYPE-INFO-ENTRY ::= SEQUENCE {
etype [0] Int32,
salt [1] OCTET STRING OPTIONAL
}
|
class |
HostAddress
The HostAddress as defined in RFC 4120 :
|
class |
KrbToken
KRB-TOKEN_VALUE ::= SEQUENCE {
token-format [0] INTEGER,
token-value [1] OCTET STRING,
}
|
class |
LastReqEntry
LastReq ::= SEQUENCE OF SEQUENCE {
lr-type [0] Int32,
lr-value [1] KerberosTime
}
|
class |
PrincipalName
The PrincipalName as defined in RFC 4120 :
|
class |
TransitedEncoding
TransitedEncoding ::= SEQUENCE {
tr-type [0] Int32 -- must be registered --,
contents [1] OCTET STRING
}
|
| Modifier and Type | Class and Description |
|---|---|
class |
KrbFastArmor
KrbFastArmor ::= SEQUENCE {
armor-type [0] Int32,
-- Type of the armor.
|
class |
KrbFastArmoredRep
KrbFastArmoredRep ::= SEQUENCE {
enc-fast-rep [0] EncryptedData, -- KrbFastResponse --
-- The encryption key is the armor key in the request, and
-- the key usage number is KEY_USAGE_FAST_REP.
|
class |
KrbFastArmoredReq
KrbFastArmoredReq ::= SEQUENCE {
armor [0] KrbFastArmor OPTIONAL,
-- Contains the armor that identifies the armor key.
|
class |
KrbFastFinished
KrbFastFinished ::= SEQUENCE {
timestamp [0] KerberosTime,
usec [1] Microseconds,
-- timestamp and usec represent the time on the KDC when
-- the reply was generated.
|
class |
KrbFastReq
KrbFastReq ::= SEQUENCE {
fast-options [0] FastOptions,
-- Additional options.
|
class |
KrbFastResponse
KrbFastResponse ::= SEQUENCE {
padata [0] SEQUENCE OF PA-DATA,
-- padata typed holes.
|
class |
PaAuthnEntry
PA-AUTHENTICATION-SET-ELEM ::= SEQUENCE {
pa-type [0] Int32,
pa-hint [1] OCTET STRING OPTIONAL,
pa-value [2] OCTET STRING OPTIONAL,
}
|
| Modifier and Type | Class and Description |
|---|---|
class |
KdcReqBody
KDC-REQ-BODY ::= SEQUENCE {
kdc-options [0] KDCOptions,
cname [1] PrincipalName OPTIONAL
-- Used only in AS-REQ --,
realm [2] Realm
-- Server's realm
-- Also client's in AS-REQ --,
sname [3] PrincipalName OPTIONAL,
from [4] KerberosTime OPTIONAL,
till [5] KerberosTime,
rtime [6] KerberosTime OPTIONAL,
nonce [7] UInt32,
etype [8] SEQUENCE OF Int32 -- EncryptionType
-- in preference order --,
addresses [9] HostAddresses OPTIONAL,
enc-authorization-data [10] EncryptedData OPTIONAL
-- AuthorizationData --,
additional-tickets [11] SEQUENCE OF Ticket OPTIONAL
-- NOTE: not empty
}
|
| Modifier and Type | Class and Description |
|---|---|
class |
PaAuthenticationSetElem
PA-AUTHENTICATION-SET-ELEM ::= SEQUENCE {
pa-type [0] Int32,
-- same as padata-type.
|
class |
PaDataEntry
The PaData component as defined in RFC 4120 :
|
class |
PaEncTsEnc
PA-ENC-TS-ENC ::= SEQUENCE {
patimestamp [0] KerberosTime -- client's time --,
pausec [1] Microseconds OPTIONAL
}
|
| Modifier and Type | Class and Description |
|---|---|
class |
OtpTokenInfo
OTP-TOKENINFO ::= SEQUENCE {
flags [0] OTPFlags,
otp-vendor [1] UTF8String OPTIONAL,
otp-challenge [2] OCTET STRING (SIZE(1..MAX)) OPTIONAL,
otp-length [3] Int32 OPTIONAL,
otp-format [4] OTPFormat OPTIONAL,
otp-tokenID [5] OCTET STRING OPTIONAL,
otp-algID [6] AnyURI OPTIONAL,
supportedHashAlg [7] SEQUENCE OF AlgorithmIdentifier OPTIONAL,
iterationCount [8] Int32 OPTIONAL
}
|
class |
PaOtpChallenge
PA-OTP-CHALLENGE ::= SEQUENCE {
nonce [0] OCTET STRING,
otp-service [1] UTF8String OPTIONAL,
otp-tokenInfo [2] SEQUENCE (SIZE(1..MAX)) OF OTP-TOKENINFO,
salt [3] KerberosString OPTIONAL,
s2kparams [4] OCTET STRING OPTIONAL,
}
|
| Modifier and Type | Class and Description |
|---|---|
class |
AuthPack
AuthPack ::= SEQUENCE {
pkAuthenticator [0] PKAuthenticator,
clientPublicValue [1] SubjectPublicKeyInfo OPTIONAL,
supportedCMSTypes [2] SEQUENCE OF AlgorithmIdentifier OPTIONAL,
clientDHNonce [3] DHNonce OPTIONAL
supportedKDFs [4] SEQUENCE OF KDFAlgorithmId OPTIONAL,
-- Contains an unordered set of KDFs supported by the client.
|
class |
DhRepInfo
DhRepInfo ::= SEQUENCE {
dhSignedData [0] IMPLICIT OCTET STRING,
serverDHNonce [1] DHNonce OPTIONAL
kdf [2] KDFAlgorithmId OPTIONAL,
-- The KDF picked by the KDC.
|
class |
ExternalPrincipalIdentifier
ExternalPrincipalIdentifier ::= SEQUENCE {
subjectName [0] IMPLICIT OCTET STRING OPTIONAL,
issuerAndSerialNumber [1] IMPLICIT OCTET STRING OPTIONAL,
subjectKeyIdentifier [2] IMPLICIT OCTET STRING OPTIONAL
}
|
class |
KdcDhKeyInfo
KDCDHKeyInfo ::= SEQUENCE {
subjectPublicKey [0] BIT STRING,
nonce [1] INTEGER (0..4294967295),
dhKeyExpiration [2] KerberosTime OPTIONAL,
}
|
class |
KdfAlgorithmId |
class |
Krb5PrincipalName
KRB5PrincipalName ::= SEQUENCE {
realm [0] Realm,
principalName [1] PrincipalName
}
|
class |
PaPkAsReq
PA-PK-AS-REQ ::= SEQUENCE {
signedAuthPack [0] IMPLICIT OCTET STRING,
trustedCertifiers [1] SEQUENCE OF ExternalPrincipalIdentifier OPTIONAL,
kdcPkId [2] IMPLICIT OCTET STRING OPTIONAL
}
|
class |
PkAuthenticator
PKAuthenticator ::= SEQUENCE {
cusec [0] INTEGER (0..999999),
ctime [1] KerberosTime,
-- cusec and ctime are used as in [RFC4120], for
-- replay prevention.
|
class |
ReplyKeyPack
ReplyKeyPack ::= SEQUENCE {
replyKey [0] EncryptionKey,
asChecksum [1] Checksum,
}
|
| Modifier and Type | Class and Description |
|---|---|
class |
PaTokenChallenge
PA-TOKEN-CHALLENGE ::= SEQUENCE {
tokenInfos [0] SEQUENCE (SIZE(1..MAX)) OF TokenInfo,
}
|
class |
PaTokenRequest
PA-TOKEN-REQUEST ::= SEQUENCE {
token [0] OCTET STRING,
tokenInfo [1] TokenInfo
}
|
class |
TokenInfo
TokenInfo ::= SEQUENCE {
flags [0] TokenFlags,
tokenVendor [1] UTF8String,
}
|
Copyright © 2014–2016 The Apache Software Foundation. All rights reserved.