diff options
| author | Cy Schubert <cy@FreeBSD.org> | 2025-03-19 22:12:25 +0000 |
|---|---|---|
| committer | Cy Schubert <cy@FreeBSD.org> | 2025-03-19 22:12:25 +0000 |
| commit | 8f7d3ef26dec89a92ec0665de84a5936310a5574 (patch) | |
| tree | 9a465418bd4056bf0d369751320a414eaed29fa4 /doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt | |
| parent | 1a79b20663ca26acc2998b90ea2ff2aefd8af5b1 (diff) | |
Diffstat (limited to 'doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt')
| -rw-r--r-- | doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt b/doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt index 85516e3df54b..e5b9d73cc5d1 100644 --- a/doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt +++ b/doc/html/_sources/appdev/refs/api/krb5_rd_req.rst.txt @@ -44,11 +44,11 @@ This function parses, decrypts and verifies a AP-REQ message from *inbuf* and st -If a keyblock was specified in *auth_context* using :c:func:`krb5_auth_con_setuseruserkey()` , that key is used to decrypt the ticket in AP-REQ message and *keytab* is ignored. In this case, *server* should be specified as a complete principal name to allow for proper transited-path checking and replay cache selection. +If a keyblock was specified in *auth_context* using krb5_auth_con_setuseruserkey(), that key is used to decrypt the ticket in AP-REQ message and *keytab* is ignored. In this case, *server* should be specified as a complete principal name to allow for proper transited-path checking and replay cache selection. -Otherwise, the decryption key is obtained from *keytab* , or from the default keytab if it is NULL. In this case, *server* may be a complete principal name, a matching principal (see :c:func:`krb5_sname_match()` ), or NULL to match any principal name. The keys tried against the encrypted part of the ticket are determined as follows: +Otherwise, the decryption key is obtained from *keytab* , or from the default keytab if it is NULL. In this case, *server* may be a complete principal name, a matching principal (see krb5_sname_match()), or NULL to match any principal name. The keys tried against the encrypted part of the ticket are determined as follows: @@ -82,11 +82,11 @@ Various other checks are performed on the decoded data, including cross-realm po -On success the authenticator, subkey, and remote sequence number of the request are stored in *auth_context* . If the :data:`AP_OPTS_MUTUAL_REQUIRED` bit is set, the local sequence number is XORed with the remote sequence number in the request. +On success the authenticator, subkey, and remote sequence number of the request are stored in *auth_context* . If the #AP_OPTS_MUTUAL_REQUIRED bit is set, the local sequence number is XORed with the remote sequence number in the request. -Use :c:func:`krb5_free_ticket()` to free *ticket* when it is no longer needed. +Use krb5_free_ticket() to free *ticket* when it is no longer needed. |
