diff options
author | Karl Heuer <kwzh@gnu.org> | 1998-04-06 22:16:30 +0000 |
---|---|---|
committer | Karl Heuer <kwzh@gnu.org> | 1998-04-06 22:16:30 +0000 |
commit | 0ea95737509844797b92adc062c010e06c9632b2 (patch) | |
tree | 479cad1271203a8bfbe0fca424c1cf969b27fbaa /lib-src/pop.h | |
parent | a51623bcfff298ffaa85055ab7e1270093635ce8 (diff) |
Integrate support for GSS-API
authentication, implemented by Kevin L. Mitchel <klmitch@mit.edu>.
Diffstat (limited to 'lib-src/pop.h')
-rw-r--r-- | lib-src/pop.h | 25 |
1 files changed, 25 insertions, 0 deletions
diff --git a/lib-src/pop.h b/lib-src/pop.h index cfd333ccaf..7a56947a36 100644 --- a/lib-src/pop.h +++ b/lib-src/pop.h @@ -36,6 +36,7 @@ struct _popserver int buffer_size, buffer_index; int in_multi; int trash_started; + void *extra; }; typedef struct _popserver *popserver; @@ -47,6 +48,30 @@ typedef struct _popserver *popserver; #define POP_NO_KERBEROS (1<<0) #define POP_NO_HESIOD (1<<1) #define POP_NO_GETPASS (1<<2) +#define POP_NO_GSSAPI (1<<3) /* don't use the GSSAPI */ +#define POP_NO_NOPROT (1<<4) /* prohibit no protection; this *only* */ + /* makes sense if you use GSSAPI */ +#define POP_NO_INTEG (1<<5) /* don't use plain integrity */ +#define POP_NO_ENCRYPT (1<<6) /* don't use encryption */ + +/* + * GSSAPI documentation + * + * This version will attempt to perform a GSSAPI handshake first; if this + * fails, then it will attempt standard POP authentication. Note that + * library conflicts may prevent the use of this with the Kerberos + * kpop hack. + * + * If you specify POP_NO_NOPROT and this library is unable to provide either + * integrity protection or encryption, pop_open() will fail. The pop_open() + * call will attempt the highest level protection available; i.e., if both + * server and client support encryption (and you do not provide the + * POP_NO_ENCRYPT flag), that will be used; if both server and client support + * integrity protection (and you do not provide the POP_NO_INTEG flag), that + * will be used. If neither of these are available, and you have not + * specified the POP_NO_NOPROT flag, then this will be a normal, unprotected + * connection. + */ #ifdef __STDC__ #define _ARGS(a) a |