1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94
|
krb5_cc_retrieve_cred - Retrieve a specified credentials from a credential cache.
===================================================================================
..
.. c:function:: krb5_error_code krb5_cc_retrieve_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds * mcreds, krb5_creds * creds)
..
:param:
**[in]** **context** - Library context
**[in]** **cache** - Credential cache handle
**[in]** **flags** - Flags bit mask
**[in]** **mcreds** - Credentials to match
**[out]** **creds** - Credentials matching the requested value
..
:retval:
- 0 Success; otherwise - Kerberos error codes
..
This function searches a credential cache for credentials matching *mcreds* and returns it if found.
Valid values for *flags* are:
- :data:`KRB5_TC_MATCH_TIMES` The requested lifetime must be at least as great as in *mcreds* .
- :data:`KRB5_TC_MATCH_IS_SKEY` The *is_skey* field much match exactly.
- :data:`KRB5_TC_MATCH_FLAGS` Flags set in *mcreds* must be set.
- :data:`KRB5_TC_MATCH_TIMES_EXACT` The requested lifetime must match exactly.
- :data:`KRB5_TC_MATCH_FLAGS_EXACT` Flags must match exactly.
- :data:`KRB5_TC_MATCH_AUTHDATA` The authorization data must match.
- :data:`KRB5_TC_MATCH_SRV_NAMEONLY` Only the name portion of the principal name must match, not the realm.
- :data:`KRB5_TC_MATCH_2ND_TKT` The second tickets must match.
- :data:`KRB5_TC_MATCH_KTYPE` The encryption key types must match.
- :data:`KRB5_TC_SUPPORTED_KTYPES` Check all matching entries that have any supported encryption type and return the one with the encryption type listed earliest.
Use :c:func:`krb5_free_cred_contents()` to free *creds* when it is no longer needed.
..
|