Provided by: heimdal-dev_7.8.git20221117.28daf24+dfsg-5ubuntu3_amd64 bug

NAME

     krb5_verify_user, krb5_verify_user_lrealm, krb5_verify_user_opt, krb5_verify_opt_init,
     krb5_verify_opt_alloc, krb5_verify_opt_free, krb5_verify_opt_set_ccache,
     krb5_verify_opt_set_flags, krb5_verify_opt_set_service, krb5_verify_opt_set_secure,
     krb5_verify_opt_set_keytab — Heimdal password verifying functions

LIBRARY

     Kerberos 5 Library (libkrb5, -lkrb5)

SYNOPSIS

     #include <krb5.h>

     krb5_error_code
     krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache,
         const char *password, krb5_boolean secure, const char *service);

     krb5_error_code
     krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache,
         const char *password, krb5_boolean secure, const char *service);

     void
     krb5_verify_opt_init(krb5_verify_opt *opt);

     void
     krb5_verify_opt_alloc(krb5_verify_opt **opt);

     void
     krb5_verify_opt_free(krb5_verify_opt *opt);

     void
     krb5_verify_opt_set_ccache(krb5_verify_opt *opt, krb5_ccache ccache);

     void
     krb5_verify_opt_set_keytab(krb5_verify_opt *opt, krb5_keytab keytab);

     void
     krb5_verify_opt_set_secure(krb5_verify_opt *opt, krb5_boolean secure);

     void
     krb5_verify_opt_set_service(krb5_verify_opt *opt, const char *service);

     void
     krb5_verify_opt_set_flags(krb5_verify_opt *opt, unsigned int flags);

     krb5_error_code
     krb5_verify_user_opt(krb5_context context, krb5_principal principal, const char *password,
         krb5_verify_opt *opt);

DESCRIPTION

     The krb5_verify_user function verifies the password supplied by a user.  The principal whose
     password will be verified is specified in principal.  New tickets will be obtained as a
     side-effect and stored in ccache (if NULL, the default ccache is used).  krb5_verify_user()
     will call krb5_cc_initialize() on the given ccache, so ccache must only initialized with
     krb5_cc_resolve() or krb5_cc_gen_new().  If the password is not supplied in password (and is
     given as NULL) the user will be prompted for it.  If secure the ticket will be verified
     against the locally stored service key service (by default ‘host’ if given as NULL ).

     The krb5_verify_user_lrealm() function does the same, except that it ignores the realm in
     principal and tries all the local realms (see krb5.conf(5)).  After a successful return, the
     principal is set to the authenticated realm. If the call fails, the principal will not be
     meaningful, and should only be freed with krb5_free_principal(3).

     krb5_verify_opt_alloc() and krb5_verify_opt_free() allocates and frees a krb5_verify_opt.
     You should use the the alloc and free function instead of allocation the structure yourself,
     this is because in a future release the structure wont be exported.

     krb5_verify_opt_init() resets all opt to default values.

     None of the krb5_verify_opt_set function makes a copy of the data structure that they are
     called with. It's up the caller to free them after the krb5_verify_user_opt() is called.

     krb5_verify_opt_set_ccache() sets the ccache that user of opt will use. If not set, the
     default credential cache will be used.

     krb5_verify_opt_set_keytab() sets the keytab that user of opt will use. If not set, the
     default keytab will be used.

     krb5_verify_opt_set_secure() if secure if true, the password verification will require that
     the ticket will be verified against the locally stored service key. If not set, default
     value is true.

     krb5_verify_opt_set_service() sets the service principal that user of opt will use. If not
     set, the ‘host’ service will be used.

     krb5_verify_opt_set_flags() sets flags that user of opt will use.  If the flag
     KRB5_VERIFY_LREALMS is used, the principal will be modified like krb5_verify_user_lrealm()
     modifies it.

     krb5_verify_user_opt() function verifies the password supplied by a user.  The principal
     whose password will be verified is specified in principal.  Options the to the verification
     process is pass in in opt.

EXAMPLES

     Here is a example program that verifies a password. it uses the ‘host/`hostname`’ service
     principal in krb5.keytab.

     #include <krb5.h>

     int
     main(int argc, char **argv)
     {
         char *user;
         krb5_error_code error;
         krb5_principal princ;
         krb5_context context;

         if (argc != 2)
             errx(1, "usage: verify_passwd <principal-name>");

         user = argv[1];

         if (krb5_init_context(&context) < 0)
             errx(1, "krb5_init_context");

         if ((error = krb5_parse_name(context, user, &princ)) != 0)
             krb5_err(context, 1, error, "krb5_parse_name");

         error = krb5_verify_user(context, princ, NULL, NULL, TRUE, NULL);
         if (error)
             krb5_err(context, 1, error, "krb5_verify_user");

         return 0;
     }

SEE ALSO

     krb5_cc_gen_new(3), krb5_cc_initialize(3), krb5_cc_resolve(3), krb5_err(3),
     krb5_free_principal(3), krb5_init_context(3), krb5_kt_default(3), krb5.conf(5)