diff options
Diffstat (limited to 'crypto/heimdal/lib/krb5/context.c')
| -rw-r--r-- | crypto/heimdal/lib/krb5/context.c | 622 | 
1 files changed, 555 insertions, 67 deletions
diff --git a/crypto/heimdal/lib/krb5/context.c b/crypto/heimdal/lib/krb5/context.c index d3982e8e9a8f..256783310e93 100644 --- a/crypto/heimdal/lib/krb5/context.c +++ b/crypto/heimdal/lib/krb5/context.c @@ -1,5 +1,5 @@  /* - * Copyright (c) 1997 - 2002 Kungliga Tekniska Högskolan + * Copyright (c) 1997 - 2005 Kungliga Tekniska Högskolan   * (Royal Institute of Technology, Stockholm, Sweden).    * All rights reserved.    * @@ -34,12 +34,19 @@  #include "krb5_locl.h"  #include <com_err.h> -RCSID("$Id: context.c,v 1.83.2.1 2004/08/20 15:30:24 lha Exp $"); +RCSID("$Id: context.c 22293 2007-12-14 05:25:59Z lha $");  #define INIT_FIELD(C, T, E, D, F)					\      (C)->E = krb5_config_get_ ## T ## _default ((C), NULL, (D), 	\  						"libdefaults", F, NULL) +#define INIT_FLAG(C, O, V, D, F)					\ +    do {								\ +	if (krb5_config_get_bool_default((C), NULL, (D),"libdefaults", F, NULL)) { \ +	    (C)->O |= V;						\ +        }								\ +    } while(0) +  /*   * Set the list of etypes `ret_etypes' from the configuration variable   * `name' @@ -65,8 +72,12 @@ set_etypes (krb5_context context,  	    return ENOMEM;  	}  	for(j = 0, k = 0; j < i; j++) { -	    if(krb5_string_to_enctype(context, etypes_str[j], &etypes[k]) == 0) -		k++; +	    krb5_enctype e; +	    if(krb5_string_to_enctype(context, etypes_str[j], &e) != 0) +		continue; +	    if (krb5_enctype_valid(context, e) != 0) +		continue; +	    etypes[k++] = e;  	}  	etypes[k] = ETYPE_NULL;  	krb5_config_free_strings(etypes_str); @@ -176,21 +187,49 @@ init_context_from_config_file(krb5_context context)      /* prefer dns_lookup_kdc over srv_lookup. */      INIT_FIELD(context, bool, srv_lookup, TRUE, "srv_lookup");      INIT_FIELD(context, bool, srv_lookup, context->srv_lookup, "dns_lookup_kdc"); +    INIT_FIELD(context, int, large_msg_size, 1400, "large_message_size"); +    INIT_FLAG(context, flags, KRB5_CTX_F_DNS_CANONICALIZE_HOSTNAME, TRUE, "dns_canonicalize_hostname"); +    INIT_FLAG(context, flags, KRB5_CTX_F_CHECK_PAC, TRUE, "check_pac");      context->default_cc_name = NULL; +    context->default_cc_name_set = 0;      return 0;  } -krb5_error_code +/** + * Initializes the context structure and reads the configuration file + * /etc/krb5.conf. The structure should be freed by calling + * krb5_free_context() when it is no longer being used. + * + * @param context pointer to returned context + * + * @return Returns 0 to indicate success.  Otherwise an errno code is + * returned.  Failure means either that something bad happened during + * initialization (typically ENOMEM) or that Kerberos should not be + * used ENXIO. + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  krb5_init_context(krb5_context *context)  {      krb5_context p;      krb5_error_code ret;      char **files; +    *context = NULL; +      p = calloc(1, sizeof(*p));      if(!p)  	return ENOMEM; +    p->mutex = malloc(sizeof(HEIMDAL_MUTEX)); +    if (p->mutex == NULL) { +	free(p); +	return ENOMEM; +    } +    HEIMDAL_MUTEX_init(p->mutex); +      ret = krb5_get_default_config_files(&files);      if(ret)   	goto out; @@ -204,12 +243,18 @@ krb5_init_context(krb5_context *context)      p->cc_ops = NULL;      p->num_cc_ops = 0; +    krb5_cc_register(p, &krb5_acc_ops, TRUE);      krb5_cc_register(p, &krb5_fcc_ops, TRUE);      krb5_cc_register(p, &krb5_mcc_ops, TRUE); +#ifdef HAVE_KCM +    krb5_cc_register(p, &krb5_kcm_ops, TRUE); +#endif      p->num_kt_types = 0;      p->kt_types     = NULL;      krb5_kt_register (p, &krb5_fkt_ops); +    krb5_kt_register (p, &krb5_wrfkt_ops); +    krb5_kt_register (p, &krb5_javakt_ops);      krb5_kt_register (p, &krb5_mkt_ops);      krb5_kt_register (p, &krb5_akf_ops);      krb5_kt_register (p, &krb4_fkt_ops); @@ -225,11 +270,21 @@ out:      return ret;  } -void +/** + * Frees the krb5_context allocated by krb5_init_context(). + * + * @param context context to be freed. + * + *  @ingroup krb5 +*/ + +void KRB5_LIB_FUNCTION  krb5_free_context(krb5_context context)  {      if (context->default_cc_name)  	free(context->default_cc_name); +    if (context->default_cc_name_env) +	free(context->default_cc_name_env);      free(context->etypes);      free(context->etypes_des);      krb5_free_host_realm (context, context->default_realms); @@ -242,17 +297,35 @@ krb5_free_context(krb5_context context)  	krb5_closelog(context, context->warn_dest);      krb5_set_extra_addresses(context, NULL);      krb5_set_ignore_addresses(context, NULL); +    krb5_set_send_to_kdc_func(context, NULL, NULL); +    if (context->mutex != NULL) { +	HEIMDAL_MUTEX_destroy(context->mutex); +	free(context->mutex); +    } +    memset(context, 0, sizeof(*context));      free(context);  } -krb5_error_code +/** + * Reinit the context from a new set of filenames. + * + * @param context context to add configuration too. + * @param filenames array of filenames, end of list is indicated with a NULL filename. + * + * @return Returns 0 to indicate success.  Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  krb5_set_config_files(krb5_context context, char **filenames)  {      krb5_error_code ret;      krb5_config_binding *tmp = NULL;      while(filenames != NULL && *filenames != NULL && **filenames != '\0') {  	ret = krb5_config_parse_file_multi(context, *filenames, &tmp); -	if(ret != 0 && ret != ENOENT) { +	if(ret != 0 && ret != ENOENT && ret != EACCES) {  	    krb5_config_file_free(context, tmp);  	    return ret;  	} @@ -270,54 +343,158 @@ krb5_set_config_files(krb5_context context, char **filenames)      return ret;  } -krb5_error_code  -krb5_get_default_config_files(char ***pfilenames) +static krb5_error_code +add_file(char ***pfilenames, int *len, char *file)  { -    const char *p, *q; -    char **pp; -    int n, i; +    char **pp = *pfilenames; +    int i; -    const char *files = NULL; -    if (pfilenames == NULL) -        return EINVAL; -    if(!issuid()) -	files = getenv("KRB5_CONFIG"); -    if (files == NULL) -	files = krb5_config_file; +    for(i = 0; i < *len; i++) { +	if(strcmp(pp[i], file) == 0) { +	    free(file); +	    return 0; +	} +    } -    for(n = 0, p = files; strsep_copy(&p, ":", NULL, 0) != -1; n++); -    pp = malloc((n + 1) * sizeof(*pp)); -    if(pp == NULL) +    pp = realloc(*pfilenames, (*len + 2) * sizeof(*pp)); +    if (pp == NULL) { +	free(file);  	return ENOMEM; +    } + +    pp[*len] = file; +    pp[*len + 1] = NULL; +    *pfilenames = pp; +    *len += 1; +    return 0; +} + +/* + *  `pq' isn't free, it's up the the caller + */ + +krb5_error_code KRB5_LIB_FUNCTION +krb5_prepend_config_files(const char *filelist, char **pq, char ***ret_pp) +{ +    krb5_error_code ret; +    const char *p, *q; +    char **pp; +    int len; +    char *fn; -    n = 0; -    p = files; +    pp = NULL; + +    len = 0; +    p = filelist;      while(1) {  	ssize_t l;  	q = p;  	l = strsep_copy(&q, ":", NULL, 0);  	if(l == -1)  	    break; -	pp[n] = malloc(l + 1); -	if(pp[n] == NULL) { +	fn = malloc(l + 1); +	if(fn == NULL) {  	    krb5_free_config_files(pp);  	    return ENOMEM;  	} -	l = strsep_copy(&p, ":", pp[n], l + 1); -	for(i = 0; i < n; i++) -	    if(strcmp(pp[i], pp[n]) == 0) { -		free(pp[n]); -		goto skip; +	l = strsep_copy(&p, ":", fn, l + 1); +	ret = add_file(&pp, &len, fn); +	if (ret) { +	    krb5_free_config_files(pp); +	    return ret; +	} +    } + +    if (pq != NULL) { +	int i; + +	for (i = 0; pq[i] != NULL; i++) { +	    fn = strdup(pq[i]); +	    if (fn == NULL) { +		krb5_free_config_files(pp); +		return ENOMEM;  	    } -	n++; -    skip:; +	    ret = add_file(&pp, &len, fn); +	    if (ret) { +		krb5_free_config_files(pp); +		return ret; +	    } +	}      } -    pp[n] = NULL; + +    *ret_pp = pp; +    return 0; +} + +/** + * Prepend the filename to the global configuration list. + * + * @param filelist a filename to add to the default list of filename + * @param pfilenames return array of filenames, should be freed with krb5_free_config_files(). + * + * @return Returns 0 to indicate success.  Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION +krb5_prepend_config_files_default(const char *filelist, char ***pfilenames) +{ +    krb5_error_code ret; +    char **defpp, **pp = NULL; +     +    ret = krb5_get_default_config_files(&defpp); +    if (ret) +	return ret; + +    ret = krb5_prepend_config_files(filelist, defpp, &pp); +    krb5_free_config_files(defpp); +    if (ret) { +	return ret; +    }	      *pfilenames = pp;      return 0;  } -void +/** + * Get the global configuration list. + * + * @param pfilenames return array of filenames, should be freed with krb5_free_config_files(). + * + * @return Returns 0 to indicate success.  Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  +krb5_get_default_config_files(char ***pfilenames) +{ +    const char *files = NULL; + +    if (pfilenames == NULL) +        return EINVAL; +    if(!issuid()) +	files = getenv("KRB5_CONFIG"); +    if (files == NULL) +	files = krb5_config_file; + +    return krb5_prepend_config_files(files, NULL, pfilenames); +} + +/** + * Free a list of configuration files. + * + * @param filenames list to be freed. + * + * @return Returns 0 to indicate success. Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +void KRB5_LIB_FUNCTION  krb5_free_config_files(char **filenames)  {      char **p; @@ -326,14 +503,25 @@ krb5_free_config_files(char **filenames)      free(filenames);  } -/* - * set `etype' to a malloced list of the default enctypes +/** + * Returns the list of Kerberos encryption types sorted in order of + * most preferred to least preferred encryption type.  Note that some + * encryption types might be disabled, so you need to check with + * krb5_enctype_valid() before using the encryption type. + * + * @return list of enctypes, terminated with ETYPE_NULL. Its a static + * array completed into the Kerberos library so the content doesn't + * need to be freed. + * + * @ingroup krb5   */ -static krb5_error_code -default_etypes(krb5_context context, krb5_enctype **etype) +const krb5_enctype * KRB5_LIB_FUNCTION +krb5_kerberos_enctypes(krb5_context context)  { -    krb5_enctype p[] = { +    static const krb5_enctype p[] = { +	ETYPE_AES256_CTS_HMAC_SHA1_96, +	ETYPE_AES128_CTS_HMAC_SHA1_96,  	ETYPE_DES3_CBC_SHA1,  	ETYPE_DES3_CBC_MD5,  	ETYPE_ARCFOUR_HMAC_MD5, @@ -342,30 +530,67 @@ default_etypes(krb5_context context, krb5_enctype **etype)  	ETYPE_DES_CBC_CRC,  	ETYPE_NULL      }; +    return p; +} -    *etype = malloc(sizeof(p)); -    if(*etype == NULL) { -	krb5_set_error_string (context, "malloc: out of memory"); -	return ENOMEM; +/* + * set `etype' to a malloced list of the default enctypes + */ + +static krb5_error_code +default_etypes(krb5_context context, krb5_enctype **etype) +{ +    const krb5_enctype *p; +    krb5_enctype *e = NULL, *ep; +    int i, n = 0; + +    p = krb5_kerberos_enctypes(context); + +    for (i = 0; p[i] != ETYPE_NULL; i++) { +	if (krb5_enctype_valid(context, p[i]) != 0) +	    continue; +	ep = realloc(e, (n + 2) * sizeof(*e)); +	if (ep == NULL) { +	    free(e); +	    krb5_set_error_string (context, "malloc: out of memory"); +	    return ENOMEM; +	} +	e = ep; +	e[n] = p[i]; +	e[n + 1] = ETYPE_NULL; +	n++;      } -    memcpy(*etype, p, sizeof(p)); +    *etype = e;      return 0;  } -krb5_error_code +/** + * Set the default encryption types that will be use in communcation + * with the KDC, clients and servers. + * + * @param context Kerberos 5 context. + * @param etypes Encryption types, array terminated with ETYPE_NULL (0). + * + * @return Returns 0 to indicate success. Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  krb5_set_default_in_tkt_etypes(krb5_context context,   			       const krb5_enctype *etypes)  { -    int i;      krb5_enctype *p = NULL; +    int i;      if(etypes) { -	for (i = 0; etypes[i]; ++i) -	    if(!krb5_enctype_valid(context, etypes[i])) { -		krb5_set_error_string(context, "enctype %d not supported", -				      etypes[i]); -		return KRB5_PROG_ETYPE_NOSUPP; -	    } +	for (i = 0; etypes[i]; ++i) { +	    krb5_error_code ret; +	    ret = krb5_enctype_valid(context, etypes[i]); +	    if (ret) +		return ret; +	}  	++i;  	ALLOC(p, i);  	if(!p) { @@ -380,8 +605,21 @@ krb5_set_default_in_tkt_etypes(krb5_context context,      return 0;  } +/** + * Get the default encryption types that will be use in communcation + * with the KDC, clients and servers. + * + * @param context Kerberos 5 context. + * @param etypes Encryption types, array terminated with + * ETYPE_NULL(0), caller should free array with krb5_xfree(): + * + * @return Returns 0 to indicate success. Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ -krb5_error_code +krb5_error_code KRB5_LIB_FUNCTION  krb5_get_default_in_tkt_etypes(krb5_context context,  			       krb5_enctype **etypes)  { @@ -407,7 +645,19 @@ krb5_get_default_in_tkt_etypes(krb5_context context,    return 0;  } -const char * +/** + * Return the error string for the error code. The caller must not + * free the string. + * + * @param context Kerberos 5 context. + * @param code Kerberos error code. + * + * @return the error message matching code + * + * @ingroup krb5 + */ + +const char* KRB5_LIB_FUNCTION  krb5_get_err_text(krb5_context context, krb5_error_code code)  {      const char *p = NULL; @@ -420,7 +670,15 @@ krb5_get_err_text(krb5_context context, krb5_error_code code)      return p;  } -void +/** + * Init the built-in ets in the Kerberos library.  + * + * @param context kerberos context to add the ets too + * + * @ingroup krb5 + */ + +void KRB5_LIB_FUNCTION  krb5_init_ets(krb5_context context)  {      if(context->et_list == NULL){ @@ -428,22 +686,57 @@ krb5_init_ets(krb5_context context)  	krb5_add_et_list(context, initialize_asn1_error_table_r);  	krb5_add_et_list(context, initialize_heim_error_table_r);  	krb5_add_et_list(context, initialize_k524_error_table_r); +#ifdef PKINIT +	krb5_add_et_list(context, initialize_hx_error_table_r); +#endif      }  } -void +/** + * Make the kerberos library default to the admin KDC. + * + * @param context Kerberos 5 context. + * @param flag boolean flag to select if the use the admin KDC or not. + * + * @ingroup krb5 + */ + +void KRB5_LIB_FUNCTION  krb5_set_use_admin_kdc (krb5_context context, krb5_boolean flag)  {      context->use_admin_kdc = flag;  } -krb5_boolean +/** + * Make the kerberos library default to the admin KDC. + * + * @param context Kerberos 5 context. + * + * @return boolean flag to telling the context will use admin KDC as the default KDC. + * + * @ingroup krb5 + */ + +krb5_boolean KRB5_LIB_FUNCTION  krb5_get_use_admin_kdc (krb5_context context)  {      return context->use_admin_kdc;  } -krb5_error_code +/** + * Add extra address to the address list that the library will add to + * the client's address list when communicating with the KDC. + * + * @param context Kerberos 5 context. + * @param addresses addreses to add + * + * @return Returns 0 to indicate success. Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  krb5_add_extra_addresses(krb5_context context, krb5_addresses *addresses)  { @@ -454,7 +747,20 @@ krb5_add_extra_addresses(krb5_context context, krb5_addresses *addresses)  	return krb5_set_extra_addresses(context, addresses);  } -krb5_error_code +/** + * Set extra address to the address list that the library will add to + * the client's address list when communicating with the KDC. + * + * @param context Kerberos 5 context. + * @param addresses addreses to set + * + * @return Returns 0 to indicate success. Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  krb5_set_extra_addresses(krb5_context context, const krb5_addresses *addresses)  {      if(context->extra_addresses) @@ -477,7 +783,20 @@ krb5_set_extra_addresses(krb5_context context, const krb5_addresses *addresses)      return krb5_copy_addresses(context, addresses, context->extra_addresses);  } -krb5_error_code +/** + * Get extra address to the address list that the library will add to + * the client's address list when communicating with the KDC. + * + * @param context Kerberos 5 context. + * @param addresses addreses to set + * + * @return Returns 0 to indicate success. Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  krb5_get_extra_addresses(krb5_context context, krb5_addresses *addresses)  {      if(context->extra_addresses == NULL) { @@ -487,7 +806,20 @@ krb5_get_extra_addresses(krb5_context context, krb5_addresses *addresses)      return krb5_copy_addresses(context,context->extra_addresses, addresses);  } -krb5_error_code +/** + * Add extra addresses to ignore when fetching addresses from the + * underlaying operating system. + * + * @param context Kerberos 5 context. + * @param addresses addreses to ignore + * + * @return Returns 0 to indicate success. Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  krb5_add_ignore_addresses(krb5_context context, krb5_addresses *addresses)  { @@ -498,7 +830,20 @@ krb5_add_ignore_addresses(krb5_context context, krb5_addresses *addresses)  	return krb5_set_ignore_addresses(context, addresses);  } -krb5_error_code +/** + * Set extra addresses to ignore when fetching addresses from the + * underlaying operating system. + * + * @param context Kerberos 5 context. + * @param addresses addreses to ignore + * + * @return Returns 0 to indicate success. Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  krb5_set_ignore_addresses(krb5_context context, const krb5_addresses *addresses)  {      if(context->ignore_addresses) @@ -520,7 +865,20 @@ krb5_set_ignore_addresses(krb5_context context, const krb5_addresses *addresses)      return krb5_copy_addresses(context, addresses, context->ignore_addresses);  } -krb5_error_code +/** + * Get extra addresses to ignore when fetching addresses from the + * underlaying operating system. + * + * @param context Kerberos 5 context. + * @param addresses list addreses ignored + * + * @return Returns 0 to indicate success. Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  krb5_get_ignore_addresses(krb5_context context, krb5_addresses *addresses)  {      if(context->ignore_addresses == NULL) { @@ -530,16 +888,146 @@ krb5_get_ignore_addresses(krb5_context context, krb5_addresses *addresses)      return krb5_copy_addresses(context, context->ignore_addresses, addresses);  } -krb5_error_code +/** + * Set version of fcache that the library should use. + * + * @param context Kerberos 5 context. + * @param version version number. + * + * @return Returns 0 to indicate success. Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  krb5_set_fcache_version(krb5_context context, int version)  {      context->fcache_vno = version;      return 0;  } -krb5_error_code +/** + * Get version of fcache that the library should use. + * + * @param context Kerberos 5 context. + * @param version version number. + * + * @return Returns 0 to indicate success. Otherwise an kerberos et + * error code is returned, see krb5_get_error_message(). + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION  krb5_get_fcache_version(krb5_context context, int *version)  {      *version = context->fcache_vno;      return 0;  } + +/** + * Runtime check if the Kerberos library was complied with thread support. + * + * @return TRUE if the library was compiled with thread support, FALSE if not. + * + * @ingroup krb5 + */ + + +krb5_boolean KRB5_LIB_FUNCTION +krb5_is_thread_safe(void) +{ +#ifdef ENABLE_PTHREAD_SUPPORT +    return TRUE; +#else +    return FALSE; +#endif +} + +/** + * Set if the library should use DNS to canonicalize hostnames. + * + * @param context Kerberos 5 context. + * @param flag if its dns canonicalizion is used or not. + * + * @ingroup krb5 + */ + +void KRB5_LIB_FUNCTION +krb5_set_dns_canonicalize_hostname (krb5_context context, krb5_boolean flag) +{ +    if (flag) +	context->flags |= KRB5_CTX_F_DNS_CANONICALIZE_HOSTNAME; +    else +	context->flags &= ~KRB5_CTX_F_DNS_CANONICALIZE_HOSTNAME; +} + +/** + * Get if the library uses DNS to canonicalize hostnames. + * + * @param context Kerberos 5 context. + * + * @return return non zero if the library uses DNS to canonicalize hostnames. + * + * @ingroup krb5 + */ + +krb5_boolean KRB5_LIB_FUNCTION +krb5_get_dns_canonicalize_hostname (krb5_context context) +{ +    return (context->flags & KRB5_CTX_F_DNS_CANONICALIZE_HOSTNAME) ? 1 : 0; +} + +/** + * Get current offset in time to the KDC. + * + * @param context Kerberos 5 context. + * @param sec seconds part of offset. + * @param usec micro seconds part of offset. + * + * @return return non zero if the library uses DNS to canonicalize hostnames. + * + * @ingroup krb5 + */ + +krb5_error_code KRB5_LIB_FUNCTION +krb5_get_kdc_sec_offset (krb5_context context, int32_t *sec, int32_t *usec) +{ +    if (sec) +	*sec = context->kdc_sec_offset; +    if (usec) +	*usec = context->kdc_usec_offset; +    return 0; +} + +/** + * Get max time skew allowed. + * + * @param context Kerberos 5 context. + * + * @return timeskew in seconds. + * + * @ingroup krb5 + */ + +time_t KRB5_LIB_FUNCTION +krb5_get_max_time_skew (krb5_context context) +{ +    return context->max_skew; +} + +/** + * Set max time skew allowed. + * + * @param context Kerberos 5 context. + * @param t timeskew in seconds. + * + * @ingroup krb5 + */ + +void KRB5_LIB_FUNCTION +krb5_set_max_time_skew (krb5_context context, time_t t) +{ +    context->max_skew = t; +}  | 
