Lines Matching refs:server

177     krb5_principal client, krb5_principal server,
258 retval = krb5_unparse_name(ts->ctx, ts->cur_tgt->server, &cur_tgt_str);
301 * krbtgt/realm_of(DST)@realm_of(SRC) as the server principal. Zeroes
321 krb5_princ_realm(ctx, src), &mcreds->server);
339 krb5_principal client, krb5_principal server)
345 krb5_princ_realm(ts->ctx, server),
470 if (krb5_princ_size(ts->ctx, ts->nxt_tgt->server) != 2) {
473 int err = krb5_unparse_name(ts->ctx, ts->nxt_tgt->server, &s_name);
477 "KDC reply did not match expectations: server '%s' principal size should be 2"),
483 "KDC reply did not match expectations: server principal size should be 2"));
486 r1 = krb5_princ_component(ts->ctx, ts->nxt_tgt->server, 1);
566 * This can happen when the server returns a TGT "closer" to the
569 if (!(krb5_principal_compare(ts->ctx, tgtq->server, tmp_out_cred->server))) {
592 * krbtgt/remote_realm(NXT_KDC)@local_realm(CUR_KDC) as the server
611 retval = krb5_tgtname(ts->ctx, rdst, rsrc, &mcreds->server);
769 krb5_principal server,
785 retval = init_rtree(ts, client, server);
831 * Retrieve credentials for client IN_CRED->CLIENT, server
835 * Request credentials from the KDC for the server's realm. Point
838 * the server's KDC; if no intermediate credentials were obtained,
867 krb5_principal client, server, supplied_server, out_supplied_server;
874 * Set up client and server pointers. Make a fresh and modifyable
875 * copy of the in_cred server and save the supplied version.
878 if ((retval=krb5_copy_principal(context, in_cred->server, &server)))
881 if ((retval = krb5_copy_principal(context, server,
883 krb5_free_principal(context, server);
886 supplied_server = in_cred->server;
887 in_cred->server=server;
890 DUMP_PRINC("gc_from_kdc initial server", server);
900 /* Copy client realm to server if no hint. */
901 if (krb5_is_referral_realm(&server->realm)) {
903 DPRINTF(("gc_from_kdc: no server realm supplied, "
905 krb5_free_data_contents(context, &server->realm);
906 if (!( server->realm.data = (char *)malloc(client->realm.length+1)))
908 memcpy(server->realm.data, client->realm.data, client->realm.length);
909 server->realm.length = client->realm.length;
910 server->realm.data[server->realm.length] = 0;
913 * Retreive initial TGT to match the specified server, either for the
917 retval = tgt_mcred(context, client, server, client, &tgtq);
939 retval = do_traversal(context, ccache, client, server,
947 DUMP_PRINC("gc_from_kdc: server as requested", supplied_server);
959 DUMP_PRINC("gc_from_kdc: referral loop: tgt in use", tgtptr->server);
960 DUMP_PRINC("gc_from_kdc: referral loop: request is for", server);
994 if (krb5_principal_compare(context, in_cred->server,
995 (*out_cred)->server)) {
997 "for requested server principal\n"));
999 in_cred->server);
1034 else if (IS_TGS_PRINC(context, (*out_cred)->server)) {
1039 (*out_cred)->server);
1042 r1 = &tgtptr->server->data[1];
1044 r1 = &referral_tgts[referral_count-1]->server->data[1];
1046 r2 = &(*out_cred)->server->data[1];
1059 (*out_cred)->server);
1061 referral_tgts[i]->server);
1064 (*out_cred)->server,
1065 referral_tgts[i]->server)) {
1080 /* Copy krbtgt realm to server principal. */
1081 krb5_free_data_contents(context, &server->realm);
1083 &tgtptr->server->data[1],
1084 &server->realm);
1088 * Future work: rewrite server principal per any
1100 DUMP_PRINC("gc_from_kdc server at fallback", server);
1104 * back to the server principal as originally issued and try the
1113 if (server->length >= 2) {
1114 retval=krb5_get_fallback_host_realm(context, &server->data[1],
1121 krb5_free_data_contents(context,&in_cred->server->realm);
1122 server->realm.data=hrealms[0];
1123 server->realm.length=strlen(hrealms[0]);
1136 s_err = krb5_unparse_name(context, server, &s_name);
1154 DUMP_PRINC("gc_from_kdc server at fallback after fallback rewrite",
1155 server);
1162 retval = tgt_mcred(context, client, server, client, &tgtq);
1192 retval = do_traversal(context, ccache, client, server,
1222 DUMP_PRINC("gc_from_kdc: final hacked server principal at cleanup",
1223 server);
1224 krb5_free_principal(context, server);
1225 in_cred->server = supplied_server;
1227 /* Success: free server, swap supplied server back in. */
1228 krb5_free_principal (context, (*out_cred)->server);
1229 (*out_cred)->server= out_supplied_server;
1239 DUMP_PRINC("gc_from_kdc: final server after reversion", in_cred->server);
1270 (*tgts)[0]->server);