1 krb5_verify_init_creds - Verify initial credentials against a keytab.
2 =======================================================================
6 .. c:function:: krb5_error_code krb5_verify_init_creds(krb5_context context, krb5_creds * creds, krb5_principal server, krb5_keytab keytab, krb5_ccache * ccache, krb5_verify_init_creds_opt * options)
13 **[in]** **context** - Library context
15 **[in]** **creds** - Initial credentials to be verified
17 **[in]** **server** - Server principal (or NULL)
19 **[in]** **keytab** - Key table (NULL to use default keytab)
21 **[in]** **ccache** - Credential cache for fetched creds (or NULL)
23 **[in]** **options** - Verification options (NULL for default options)
30 - 0 Success; otherwise - Kerberos error codes
41 This function attempts to verify that *creds* were obtained from a KDC with knowledge of a key in *keytab* , or the default keytab if *keytab* is NULL. If *server* is provided, the highest-kvno key entry for that principal name is used to verify the credentials; otherwise, all unique"host"service principals in the keytab are tried.
45 If the specified keytab does not exist, or is empty, or cannot be read, or does not contain an entry for *server* , then credential verification may be skipped unless configuration demands that it succeed. The caller can control this behavior by providing a verification options structure; see :c:func:`krb5_verify_init_creds_opt_init()` and :c:func:`krb5_verify_init_creds_opt_set_ap_req_nofail()` .
49 If *ccache* is NULL, any additional credentials fetched during the verification process will be destroyed. If *ccache* points to NULL, a memory ccache will be created for the additional credentials and returned in *ccache* . If *ccache* points to a valid credential cache handle, the additional credentials will be stored in that cache.