File: krb5_cc_retrieve_cred.txt

package info (click to toggle)
krb5 1.15-1%2Bdeb9u1
  • links: PTS, VCS
  • area: main
  • in suites: stretch
  • size: 54,220 kB
  • ctags: 32,381
  • sloc: ansic: 310,596; cpp: 16,220; exp: 13,350; python: 7,990; makefile: 7,223; sh: 6,185; perl: 3,518; asm: 1,460; yacc: 1,006; xml: 503; awk: 396; csh: 147; lisp: 104; sed: 43
file content (94 lines) | stat: -rw-r--r-- 1,860 bytes parent folder | download | duplicates (6)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
krb5_cc_retrieve_cred -  Retrieve a specified credentials from a credential cache. 
===================================================================================

..

.. c:function:: krb5_error_code krb5_cc_retrieve_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds * mcreds, krb5_creds * creds)

..


:param:

	          **[in]** **context** - Library context

	          **[in]** **cache** - Credential cache handle

	          **[in]** **flags** - Flags bit mask

	          **[in]** **mcreds** - Credentials to match

	          **[out]** **creds** - Credentials matching the requested value


..


:retval:
         -   0   Success; otherwise - Kerberos error codes


..







This function searches a credential cache for credentials matching *mcreds* and returns it if found.



Valid values for *flags* are:



 
 
	 - :data:`KRB5_TC_MATCH_TIMES` The requested lifetime must be at least as great as in *mcreds* .
 
 
	 - :data:`KRB5_TC_MATCH_IS_SKEY` The *is_skey* field much match exactly.
 
 
	 - :data:`KRB5_TC_MATCH_FLAGS` Flags set in *mcreds* must be set.
 
 
	 - :data:`KRB5_TC_MATCH_TIMES_EXACT` The requested lifetime must match exactly.
 
 
	 - :data:`KRB5_TC_MATCH_FLAGS_EXACT` Flags must match exactly.
 
 
	 - :data:`KRB5_TC_MATCH_AUTHDATA` The authorization data must match.
 
 
	 - :data:`KRB5_TC_MATCH_SRV_NAMEONLY` Only the name portion of the principal name must match, not the realm.
 
 
	 - :data:`KRB5_TC_MATCH_2ND_TKT` The second tickets must match.
 
 
	 - :data:`KRB5_TC_MATCH_KTYPE` The encryption key types must match.
 
 
	 - :data:`KRB5_TC_SUPPORTED_KTYPES` Check all matching entries that have any supported encryption type and return the one with the encryption type listed earliest.
 
 Use :c:func:`krb5_free_cred_contents()` to free *creds* when it is no longer needed.










..