keytab_entry() = #{realm => string(), principal => [string()], timestamp => krb_proto:krbtime(), version => integer(), key => krb_crypto:base_key()}
file/1 | Reads and parses the given filename as an MIT-format keytab. |
filter_for_ticket/2 | Filters a keytab for keys which can be used to decrypt a given Kerberos ticket. |
parse/1 | Parses an MIT-format keytab file. |
file(Filename::string()) -> {ok, [keytab_entry()]} | {error, term()}
Reads and parses the given filename as an MIT-format keytab.
filter_for_ticket(KeyTab::[keytab_entry()], X2::#'Ticket'{}) -> {ok, [keytab_entry()]} | {error, not_found}
Filters a keytab for keys which can be used to decrypt a given Kerberos ticket.
Matches based on realm, principal and key version. EType matching can be done bykrb_proto:decrypt()
.
parse(X1::binary()) -> {ok, [keytab_entry()]} | {error, term()}
Parses an MIT-format keytab file.
Returns a list of maps representing each entry in the keytab, consisting of a Keberos key and associated meta-data.Generated by EDoc