.\" DO NOT MODIFY THIS FILE! It was generated by gdoc. .TH "shishi_authorized_p" 3 "1.0.2" "shishi" "shishi" .SH NAME shishi_authorized_p \- API function .SH SYNOPSIS .B #include .sp .BI "int shishi_authorized_p(Shishi * " handle ", Shishi_tkt * " tkt ", const char * " authzname ");" .SH ARGUMENTS .IP "Shishi * handle" 12 shishi handle allocated by \fBshishi_init()\fP. .IP "Shishi_tkt * tkt" 12 input variable with ticket info. .IP "const char * authzname" 12 authorization name. .SH "DESCRIPTION" Simplistic authorization of \fIauthzname\fP against encrypted client principal name inside ticket. For "basic" authentication type, the principal name must coincide with \fIauthzname\fP. The "k5login" authentication type attempts the MIT/Heimdal method of parsing the file "~/.k5login" for additional equivalence names. .SH "RETURN VALUE" Returns 1 if \fIauthzname\fP is authorized for services by the encrypted principal, and 0 otherwise. .SH "REPORTING BUGS" Report bugs to . .SH COPYRIGHT Copyright \(co 2002-2010 Simon Josefsson. .br Copying and distribution of this file, with or without modification, are permitted in any medium without royalty provided the copyright notice and this notice are preserved. .SH "SEE ALSO" The full documentation for .B shishi is maintained as a Texinfo manual. If the .B info and .B shishi programs are properly installed at your site, the command .IP .B info shishi .PP should give you access to the complete manual.