|
DataMuseum.dkPresents historical artifacts from the history of: DKUUG/EUUG Conference tapes |
This is an automatic "excavation" of a thematic subset of
See our Wiki for more about DKUUG/EUUG Conference tapes Excavated with: AutoArchaeologist - Free & Open Source Software. |
top - metrics - downloadIndex: T a
Length: 2237 (0x8bd) Types: TextFile Names: »authen.h«
└─⟦2d1937cfd⟧ Bits:30007241 EUUGD22: P.P 5.0 └─⟦35176feda⟧ »EurOpenD22/isode/isode-6.tar.Z« └─⟦de7628f85⟧ └─⟦this⟧ »isode-6.0/h/quipu/authen.h«
/* authen.h - parameters for strong authentication */ /* * $Header: /f/osi/h/quipu/RCS/authen.h,v 7.0 89/11/23 21:56:23 mrose Rel $ * * * * $Log: authen.h,v $ * Revision 7.0 89/11/23 21:56:23 mrose * Release 6.0 * */ /* * NOTICE * * Acquisition, use, and distribution of this module and related * materials are subject to the restrictions of a license agreement. * Consult the Preface in the User's Manual for the full terms of * this agreement. * */ #ifndef QUIPUAUTHEN #define QUIPUAUTHEN #include "quipu/name.h" /* Structures for strong authentication */ struct alg_id { OID algorithm; PE asn; int p_type; #define ALG_PARM_ABSENT 0 #define ALG_PARM_UNKNOWN 1 #define ALG_PARM_NUMERIC 2 union { int numeric; } un; }; struct random_number { int n_bits; char *value; }; struct key_info { struct alg_id alg; int n_bits; char *value; }; struct validity { char *not_before; char *not_after; }; struct signature { struct alg_id alg; PE encoded; int n_bits; char *encrypted; }; struct certificate { struct alg_id alg; int version; int serial; DN issuer; DN subject; struct validity valid; struct key_info key; struct signature sig; }; struct certificate_list { struct certificate *cert; struct certificate *reverse; struct certificate_list *next; struct certificate_list *superior; }; struct revoked_certificate { struct alg_id alg; DN subject; int serial; char *revocation_date; struct revoked_certificate *next; }; struct revocation_list { struct alg_id alg; DN issuer; char *last_update; struct revoked_certificate *revoked; struct signature sig; struct signature sig2; }; struct ca_record { struct key_info key; DN name; /* parameters controlling jurisdiction would go here */ struct ca_record *next; }; struct protected_password { char *passwd; int n_octets; char protected; char *time1; char *time2; struct random_number *random1; struct random_number *random2; }; struct security_policy { OID oid; int p_type; #define POLICY_PARM_ABSENT 0 #define POLICY_PARM_UNKNOWN 1 #define POLICY_PARM_NUMERIC 2 #define POLICY_PARM_ACCESS 3 union { int numeric; } un; }; #define NULLPOLICY ((struct security_policy *) 0) #endif