krb5_verify_user krb5_verify_user_lrealm krb5_verify_user_opt krb5_verify_opt_init krb5_verify_opt_set_flags krb5_verify_opt_set_service krb5_verify_opt_set_secure krb5_verify_opt_set_keytab - Heimdal password verifying functions.
Kerberos 5 Library (libkrb5, -lkrb5)
The krb5_verify_user_lrealm function does the same, except that it ignores the realm in Fa principal and tries all the local realms (see krb5.conf5). After a successful return, the principal is set to the authenticated realm. If the call fails, the principal will not be meaningful, and should only be freed with krb5_free_principal3.
krb5_verify_opt_init ();
resets all opt to default values.
None of the krb5_verify_opt_set function makes a copy of the data
structure that they are called with. Its up the caller to free them
after the
krb5_verify_user_opt ();
is called.
krb5_verify_opt_set_ccache ();
sets the
Fa ccache
that user of
Fa opt
will use. If not set, the default credential cache will be used.
krb5_verify_opt_set_keytab ();
sets the
Fa keytab
that user of
Fa opt
will use. If not set, the default keytab will be used.
krb5_verify_opt_set_secure ();
if
Fa secure
if true, the password verification will require that the ticket will
be verified against the locally stored service key. If not set,
default value is true.
krb5_verify_opt_set_service ();
sets the
Fa service
principal that user of
Fa opt
will use. If not set, the
`host'
service will be used.
krb5_verify_opt_set_flags ();
sets
Fa flags
that user of
Fa opt
will use.
If the flag
KRB5_VERIFY_LREALMS
is used, the
Fa principal
will be modified like
krb5_verify_user_lrealm ();
modifies it.
krb5_verify_user_opt ();
function verifies the
Fa password
supplied by a user.
The principal whose password will be verified is specified in
Fa principal .
Options the to the verification process is pass in in
Fa opt .
#include <krb5.h> int main(int argc, char **argv) { char *user; krb5_error_code error; krb5_principal princ; krb5_context context; if (argc != 2) errx(1, "usage: verify_passwd <principal-name>"); user = argv[1]; if (krb5_init_context(&context) < 0) errx(1, "krb5_init_context"); if ((error = krb5_parse_name(context, user, &princ)) != 0) krb5_err(context, 1, error, "krb5_parse_name"); error = krb5_verify_user(context, princ, NULL, NULL, TRUE, NULL); if (error) krb5_err(context, 1, error, "krb5_verify_user"); return 0; }
Закладки на сайте Проследить за страницей |
Created 1996-2024 by Maxim Chirkov Добавить, Поддержать, Вебмастеру |