summaryrefslogtreecommitdiff
path: root/lib-src/pop.h
diff options
context:
space:
mode:
authorKarl Heuer <kwzh@gnu.org>1998-04-06 22:16:30 +0000
committerKarl Heuer <kwzh@gnu.org>1998-04-06 22:16:30 +0000
commit0ea95737509844797b92adc062c010e06c9632b2 (patch)
tree479cad1271203a8bfbe0fca424c1cf969b27fbaa /lib-src/pop.h
parenta51623bcfff298ffaa85055ab7e1270093635ce8 (diff)
Integrate support for GSS-API
authentication, implemented by Kevin L. Mitchel <klmitch@mit.edu>.
Diffstat (limited to 'lib-src/pop.h')
-rw-r--r--lib-src/pop.h25
1 files changed, 25 insertions, 0 deletions
diff --git a/lib-src/pop.h b/lib-src/pop.h
index cfd333ccaf..7a56947a36 100644
--- a/lib-src/pop.h
+++ b/lib-src/pop.h
@@ -36,6 +36,7 @@ struct _popserver
int buffer_size, buffer_index;
int in_multi;
int trash_started;
+ void *extra;
};
typedef struct _popserver *popserver;
@@ -47,6 +48,30 @@ typedef struct _popserver *popserver;
#define POP_NO_KERBEROS (1<<0)
#define POP_NO_HESIOD (1<<1)
#define POP_NO_GETPASS (1<<2)
+#define POP_NO_GSSAPI (1<<3) /* don't use the GSSAPI */
+#define POP_NO_NOPROT (1<<4) /* prohibit no protection; this *only* */
+ /* makes sense if you use GSSAPI */
+#define POP_NO_INTEG (1<<5) /* don't use plain integrity */
+#define POP_NO_ENCRYPT (1<<6) /* don't use encryption */
+
+/*
+ * GSSAPI documentation
+ *
+ * This version will attempt to perform a GSSAPI handshake first; if this
+ * fails, then it will attempt standard POP authentication. Note that
+ * library conflicts may prevent the use of this with the Kerberos
+ * kpop hack.
+ *
+ * If you specify POP_NO_NOPROT and this library is unable to provide either
+ * integrity protection or encryption, pop_open() will fail. The pop_open()
+ * call will attempt the highest level protection available; i.e., if both
+ * server and client support encryption (and you do not provide the
+ * POP_NO_ENCRYPT flag), that will be used; if both server and client support
+ * integrity protection (and you do not provide the POP_NO_INTEG flag), that
+ * will be used. If neither of these are available, and you have not
+ * specified the POP_NO_NOPROT flag, then this will be a normal, unprotected
+ * connection.
+ */
#ifdef __STDC__
#define _ARGS(a) a