Lines Matching defs:context

106 static krb5_error_code get_credentials(context, cred, server, now,
108 krb5_context context;
121 if ((code = krb5_copy_principal(context, cred->princ, &in_creds.client)))
123 if ((code = krb5_copy_principal(context, server, &in_creds.server)))
129 code = krb5_get_credentials(context, 0, cred->ccache,
147 krb5_free_principal(context, in_creds.client);
149 krb5_free_principal(context, in_creds.server);
163 make_gss_checksum (krb5_context context, krb5_auth_context auth_context,
181 krb5_auth_con_getflags(context, auth_context, &con_flags);
182 krb5_auth_con_setflags(context, auth_context,
185 code = krb5_fwd_tgt_creds(context, auth_context, 0,
191 krb5_auth_con_setflags(context, auth_context, con_flags);
201 krb5_free_data_contents(context, &credmsg);
232 krb5_free_data_contents(context, &credmsg);
251 krb5_free_data_contents(context, &credmsg);
260 make_ap_req_v1(context, ctx, cred, k_cred, chan_bindings, mech_type, token)
261 krb5_context context;
284 if ((code = kg_checksum_channel_bindings(context, chan_bindings, &md5, 0)))
287 krb5_auth_con_set_req_cksumtype(context, ctx->auth_context,
298 code = make_gss_checksum(context, ctx->auth_context, &cksum_struct,
304 krb5_auth_con_set_checksum_func(context, ctx->auth_context,
317 code = krb5_mk_req_extended(context, &ctx->auth_context, mk_req_flags,
319 krb5_free_data_contents(context, &cksum_struct.checksum_data);
355 krb5_free_data_contents(context, checksum_data);
357 krb5_free_data_contents(context, &ap_req);
371 krb5_context context)
395 if ((code = krb5_copy_keyblock(context, ctx->subkey, &ctx->enc)))
411 code = krb5_copy_keyblock (context, ctx->subkey, &ctx->enc);
415 code = krb5_copy_keyblock (context, ctx->subkey, &ctx->seq);
417 krb5_free_keyblock (context, ctx->enc);
437 code = (*kaccess.krb5int_c_mandatory_cksumtype)(context, ctx->subkey->enctype,
441 code = krb5_c_checksum_length(context, ctx->cksumtype,
461 * Do the grunt work of setting up a new context.
478 krb5_context context,
519 if ((code = krb5_auth_con_init(context, &ctx->auth_context)))
521 krb5_auth_con_setflags(context, ctx->auth_context,
526 if ((code = krb5_set_default_tgs_enctypes(context,
541 if ((code = krb5_timeofday(context, &now)))
550 if ((code = krb5_copy_principal(context, cred->princ, &ctx->here)))
553 if ((code = krb5_copy_principal(context, (krb5_principal) target_name,
557 code = get_credentials(context, cred, ctx->there, now,
579 if ((code = make_ap_req_v1(context, ctx,
590 krb5_auth_con_getlocalseqnumber(context, ctx->auth_context,
593 krb5_auth_con_getsendsubkey(context, ctx->auth_context,
597 major_status = setup_enc(minor_status, ctx, context);
600 krb5_free_creds(context, k_cred);
604 /* at this point, the context is constructed and valid,
607 /* intern the context handle */
618 if ((code = krb5_timeofday(context, &now)))
651 krb5_auth_con_free(context, ctx_free->auth_context);
653 krb5_free_principal(context, ctx_free->here);
655 krb5_free_principal(context, ctx_free->there);
657 krb5_free_keyblock(context, ctx_free->subkey);
685 krb5_context context)
704 /* validate the context handle */
713 /* make sure the context is non-established, and that certain
722 if (! krb5_principal_compare(context, ctx->there,
727 int kret = krb5_unparse_name(context, tname, &s_name);
728 int kret1 = krb5_unparse_name(context, ctx->there, &s_princ);
731 krb5_set_error_message(context, code,
735 save_error_info(code, context);
738 krb5_free_unparsed_name(context, s_name);
740 krb5_free_unparsed_name(context, s_princ);
774 code = krb5_rd_error(context, &ap_rep, &krb_error);
781 krb5_free_error(context, krb_error);
793 if ((code = krb5_rd_rep(context, ctx->auth_context, &ap_rep,
799 krb5_auth_con_setuseruserkey(context, ctx->auth_context,
801 if ((krb5_rd_rep(context, ctx->auth_context, &ap_rep,
815 code = krb5_copy_keyblock(context, ap_rep_data->subkey,
819 code = (*kaccess.krb5int_c_mandatory_cksumtype)(context,
827 krb5_free_ap_rep_enc_part(context, ap_rep_data);
835 if ((code = krb5_timeofday(context, &now)))
878 krb5_context context;
887 kerr = krb5_gss_init_context(&context);
892 if (GSS_ERROR(kg_sync_ccache_name(context, minor_status))) {
893 save_error_info(*minor_status, context);
894 krb5_free_context(context);
898 context = ((krb5_gss_ctx_id_rec *)*context_handle)->k5_context;
915 int kret = krb5_unparse_name(context, princ, &s_name);
918 krb5_set_error_message(context, *minor_status,
922 krb5_free_unparsed_name(context, s_name);
923 save_error_info(*minor_status, context);
927 krb5_free_context(context);
939 major_status = get_default_cred(minor_status, context,
942 save_error_info(*minor_status, context);
944 krb5_free_context(context);
950 save_error_info(*minor_status, context);
952 krb5_free_context(context);
959 krb5_free_context(context);
995 krb5_free_context(context);
1008 context, default_mech);
1011 save_error_info (*minor_status, context);
1012 krb5_free_context(context);
1014 ((krb5_gss_ctx_id_rec *) *context_handle)->k5_context = context;
1023 context);
1025 delete_sec_context, which would've zapped the krb5 context
1093 principal_ignore_inst_compare(context, princ1, princ2)
1094 krb5_context context;
1100 nelem = krb5_princ_size(context, princ1);
1101 if (nelem != krb5_princ_size(context, princ2))
1115 const krb5_data *p = krb5_princ_component(context, princ1, 1);
1121 const krb5_data *p1 = krb5_princ_component(context, princ1, 0);
1122 const krb5_data *p2 = krb5_princ_component(context, princ2, 0);
1146 ktfile_get_entry(context, id, principal, kvno, enctype, entry)
1147 krb5_context context;
1163 if ((kerror = krb5_ktfileint_openr(context, id))){
1178 if ((kerror = krb5_ktfileint_read_entry(context, id, &new_entry)))
1192 if (!principal_ignore_inst_compare(context, principal,
1194 krb5_kt_free_entry(context, &new_entry);
1204 if ((kerror = krb5_c_enctype_compare(context, enctype,
1207 krb5_kt_free_entry(context, &new_entry);
1212 krb5_kt_free_entry(context, &new_entry);
1248 krb5_kt_free_entry(context, &cur_entry);
1251 krb5_kt_free_entry(context, &new_entry);
1268 krb5_kt_free_entry(context, &cur_entry);
1273 krb5_kt_free_entry(context, &new_entry);
1287 (void) krb5_ktfileint_close(context, id);
1288 krb5_kt_free_entry(context, &cur_entry);
1293 if ((kerror = krb5_ktfileint_close(context, id)) != 0) {
1294 krb5_kt_free_entry(context, &cur_entry);
1302 (void) krb5_ktfileint_close(context, id);
1320 krb5_context context,
1341 ret = krb5_build_principal(context, &client, strlen(realm),
1347 ret = ktfile_get_entry(context, keytab, client,
1356 nelem = krb5_princ_size(context, princ);
1362 p = krb5_princ_component(context, princ, 1);
1375 krb5_free_principal(context, client);
1377 (void) krb5_kt_free_entry(context, &kt_ent);
1387 krb5_context context,
1414 if (code = krb5_kt_default(context, &keytab)) {
1422 code = get_instance_keytab(context, sname, keytab, &instance);
1424 code = krb5_sname_to_principal(context,
1430 code = krb5_sname_to_principal(context, NULL, sname,
1437 code = krb5_kt_find_realm(context, keytab, me, &realm);
1439 krb5_free_data_contents(context, &me->realm);
1446 ret = krb5_unparse_name(context, me, &princ);
1448 krb5_set_error_message(context, code,
1453 krb5_free_unparsed_name(context, princ);
1458 (void) krb5_kt_close(context, keytab);
1465 if((code = krb5_build_principal_ext(context, &server,
1466 krb5_princ_realm(context, me)->length,
1467 krb5_princ_realm(context, me)->data,
1469 krb5_princ_realm(context, me)->length,
1470 krb5_princ_realm(context, me)->data,
1473 krb5_free_cred_contents(context, &my_creds);
1474 (void) krb5_kt_close(context, keytab);
1484 if ((code = krb5_timeofday(context, &now))) {
1486 krb5_free_cred_contents(context, &my_creds);
1487 (void) krb5_kt_close(context, keytab);
1498 code = krb5_unparse_name(context, server, &svcname);
1501 krb5_free_cred_contents(context, &my_creds);
1502 (void) krb5_kt_close(context, keytab);
1511 code = krb5_get_init_creds_keytab(context,
1515 (void) krb5_kt_close(context, keytab);
1521 krb5_free_cred_contents(context, &my_creds);
1526 krb5_free_principal(context, server);
1529 code = krb5_cc_resolve (context,
1530 krb5_cc_default_name(context),
1534 krb5_free_cred_contents(context, &my_creds);
1535 krb5_free_principal(context, me);
1539 code = krb5_cc_initialize (context, ccache, me);
1540 krb5_free_principal(context, me);
1544 krb5_free_cred_contents(context, &my_creds);
1545 (void) krb5_cc_close(context, ccache);
1550 code = krb5_cc_store_cred(context, ccache,
1552 krb5_free_cred_contents(context, &my_creds);
1553 (void) krb5_cc_close(context, ccache);
1570 renew_ccache(OM_uint32 *minor_status, krb5_context context, uid_t uid)
1591 if ((code = krb5_cc_default(context, &ccache))) {
1593 (void) krb5_cc_close(context, ccache);
1597 if ((code = krb5_cc_get_principal(context, ccache, &me)) != 0) {
1599 (void) krb5_cc_close(context, ccache);
1605 if((code = krb5_build_principal_ext(context, &server,
1606 krb5_princ_realm(context, me)->length,
1607 krb5_princ_realm(context, me)->data,
1609 krb5_princ_realm(context, me)->length,
1610 krb5_princ_realm(context, me)->data,
1612 krb5_free_principal(context, me);
1613 (void) krb5_cc_close(context, ccache);
1621 if ((krb5_cc_retrieve_cred(context, ccache, KRB5_TC_MATCH_FLAGS,
1623 (void) krb5_cc_close(context, ccache);
1628 code = krb5_get_credentials_renew(context, options, ccache,
1630 krb5_free_cred_contents(context, &creds);
1631 krb5_free_cred_contents(context, &tmpcreds);
1638 krb5_free_creds(context, out_creds);
1644 (void) krb5_cc_destroy(context, ccache);
1649 (void) krb5_cc_close(context, ccache);
1659 * setting up a valid context, only to have it expire before or while
1679 krb5_context context = (krb5_context)ct;
1702 context, "root", 1);
1706 context, "host", 1);
1709 context, "host", 0);
1724 if (krb5_timeofday(context, &now)) {
1734 context, "root", 1);
1738 context, "host", 1);
1742 context, "host", 0);
1756 major = renew_ccache(minor_status, context, uid);