/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | authdes_prot.c | 50 xdr_authdes_cred(XDR *xdrs, struct authdes_cred *cred) argument 55 if (!xdr_enum(xdrs, (enum_t *)&cred->adc_namekind)) 57 switch (cred->adc_namekind) { 59 if (!xdr_string(xdrs, &cred->adc_fullname.name, 62 if (!xdr_opaque(xdrs, (caddr_t)&cred->adc_fullname.key, 65 return (xdr_opaque(xdrs, (caddr_t)&cred->adc_fullname.window, 66 (uint_t)sizeof (cred->adc_fullname.window))); 68 return (xdr_opaque(xdrs, (caddr_t)&cred->adc_nickname, 69 (uint_t)sizeof (cred->adc_nickname)));
|
H A D | auth_des.c | 250 struct authdes_cred *cred = &ad->ad_cred; local 321 if (!xdr_authdes_cred(xdrs, cred)) 404 struct authdes_cred *cred = &ad->ad_cred; local 429 cred->adc_fullname.key = ad->ad_xkey; 430 cred->adc_namekind = ADN_FULLNAME; 431 cred->adc_fullname.name = ad->ad_fullname;
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | rel_cred.c | 35 krb5_gss_cred_id_t cred; local 56 cred = (krb5_gss_cred_id_t)*cred_handle; 58 k5_mutex_destroy(&cred->lock); 61 if (cred->ccache) { 71 if (strcmp("MEMORY", krb5_cc_get_type(context, cred->ccache)) == 0) 72 code1 = krb5_cc_destroy(context, cred->ccache); 74 code1 = krb5_cc_close(context, cred->ccache); 79 if (cred->keytab) 80 code2 = krb5_kt_close(context, cred->keytab); 85 if (cred [all...] |
H A D | inq_cred.c | 88 krb5_gss_cred_id_t cred; local 113 if ((major = kg_get_defcred(minor_status, (gss_cred_id_t *)&cred)) && 126 cred = (krb5_gss_cred_id_t) cred_handle; 135 code = k5_mutex_lock(&cred->lock); 141 if (cred->tgt_expire > 0) { 142 if ((lifetime = cred->tgt_expire - now) < 0) 149 if (cred->name && 150 (code = kg_duplicate_name(context, cred->name, 152 k5_mutex_unlock(&cred->lock); 164 (cred 232 krb5_gss_cred_id_t cred; local [all...] |
H A D | set_allowable_enctypes.c | 71 krb5_gss_cred_id_t cred; local 83 /* verify and valildate cred handle */ 93 cred = (krb5_gss_cred_id_t) cred_handle; 103 kerr = k5_mutex_lock(&cred->lock); 106 if (cred->req_enctypes) 107 free(cred->req_enctypes); 108 cred->req_enctypes = NULL; 109 k5_mutex_unlock(&cred->lock); 113 /* Copy the requested ktypes into the cred structure */ 122 kerr = k5_mutex_lock(&cred [all...] |
H A D | acquire_cred_with_pw.c | 93 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred) 98 krb5_gss_cred_id_rec *cred; 108 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred) 113 krb5_gss_cred_id_rec *cred; 121 cred->ccache = NULL; 187 cred->ccache = ccache2; 223 krb5_gss_cred_id_t cred; local 290 /* create the gss cred structure */ 291 if ((cred = (krb5_gss_cred_id_t) 297 memset(cred, [all...] |
H A D | add_cred.c | 88 krb5_gss_cred_id_t cred; local 135 cred = (krb5_gss_cred_id_t) input_cred_handle; 136 k5_mutex_assert_locked(&cred->lock); 138 /* check if the cred_usage is equal or "less" than the passed-in cred 141 if (!((cred->usage == cred_usage) || 142 ((cred->usage == GSS_C_BOTH) && 151 if ((g_OID_equal(desired_mech, gss_mech_krb5_old) && cred->prerfc_mech) || 152 (g_OID_equal(desired_mech, gss_mech_krb5) && cred->rfc_mech)) { 177 !kg_compare_name(context, (krb5_gss_name_t)desired_name, cred->name)) { 182 int kret1 = krb5_unparse_name(context, cred [all...] |
H A D | store_cred.c | 42 store_init_cred(ct, minor_status, cred, dflt) 45 const krb5_gss_cred_id_t cred; 67 * client principals other than the given cred's 69 * c) copy the given cred's tickets to that same tmp ccache 71 * princ as before (!dflt) or with the input cred's princ as the 75 * (dflt), and copy the input cred's tickets to it. 90 cred->name->princ))) { 101 if ((code = krb5_cc_copy_creds(ct, cred->ccache, ccache))) { 132 krb5_gss_cred_id_t cred = (krb5_gss_cred_id_t)input_cred; local 135 OM_uint32 in_time_rec; /* lifetime of input cred */ [all...] |
H A D | krb5_gss_glue.c | 188 gss_cred_id_t cred, 206 cred, 373 gss_cred_id_t cred, 386 cred, 187 gss_krb5_set_allowable_enctypes(OM_uint32 *minor_status, gss_cred_id_t cred, OM_uint32 num_ktypes, krb5_enctype *ktypes) argument 372 gss_krb5_set_cred_rcache(OM_uint32 *minor_status, gss_cred_id_t cred, krb5_rcache rcache) argument
|
H A D | s4u_gss_glue.c | 36 krb5_gss_cred_id_t cred) 41 cred->prerfc_mech = 1; 42 cred->rfc_mech = 1; 44 cred->prerfc_mech = 0; 45 cred->rfc_mech = 0; 49 cred->prerfc_mech = 1; 51 cred->rfc_mech = 1; 54 if (!cred->prerfc_mech && !cred->rfc_mech) { 65 krb5_gss_cred_id_t cred, 34 kg_set_desired_mechs(OM_uint32 *minor_status, const gss_OID_set desired_mechs, krb5_gss_cred_id_t cred) argument 64 kg_return_mechs(OM_uint32 *minor_status, krb5_gss_cred_id_t cred, gss_OID_set *actual_mechs) argument 103 kg_is_initiator_cred(krb5_gss_cred_id_t cred) argument 193 krb5_gss_cred_id_t cred; local 262 krb5_gss_cred_id_t cred = NULL; local [all...] |
H A D | acquire_cred.c | 143 If successful, set the keytab-specific fields in cred 151 krb5_gss_cred_id_rec *cred) 159 cred->keytab = NULL; 220 &cred->rcache))) { 229 cred->keytab = kt; 239 If successful, set the ccache-specific fields in cred. 247 krb5_gss_cred_id_rec *cred) 258 cred->ccache = NULL; 440 cred->tgt_expire = creds.times.endtime; 448 cred 147 acquire_accept_cred(krb5_context context, OM_uint32 *minor_status, krb5_gss_name_t desired_name, krb5_gss_name_t *output_name, krb5_gss_cred_id_rec *cred) argument 243 acquire_init_cred(krb5_context context, OM_uint32 *minor_status, krb5_gss_name_t desired_name, krb5_gss_name_t *output_name, krb5_gss_cred_id_rec *cred) argument 511 krb5_gss_cred_id_t cred; local 783 krb5_gss_cred_id_t cred; local [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | validate.c | 74 * __dh_validate_cred: Check the cred database if the supplied crediential 80 __dh_validate_cred(dh_cred_id_t cred) argument 86 * __dh_install_cred: Installed the cred into the credential database 91 __dh_install_cred(dh_cred_id_t cred) argument 97 * __dh_remove_cred: Remove the supplied cred from the database. 102 __dh_remove_cred(dh_cred_id_t cred) argument
|
H A D | cred.c | 53 gss_cred_id_t *cred, /* The return credential */ 61 if (minor == 0 || cred == 0) 70 *cred = GSS_C_NO_CREDENTIAL; 133 /* Return the Diffie-Hellman credential through cred */ 134 *cred = (gss_cred_id_t)dh_cred; 165 gss_cred_id_t cred, /* cred of interest */ 171 /* cred is a Diffie-Hellman credential */ 172 dh_cred_id_t crid = (dh_cred_id_t)cred; 181 if (cred 47 __dh_gss_acquire_cred( OM_uint32 *minor, gss_name_t principal, OM_uint32 expire_req, gss_OID_set desired_mechs, gss_cred_usage_t usage, gss_cred_id_t *cred, gss_OID_set *mechs, OM_uint32 *expire_rec ) argument 163 __dh_gss_inquire_cred( OM_uint32 *minor, gss_cred_id_t cred, gss_name_t *name, OM_uint32 *lifetime, gss_cred_usage_t *usage, gss_OID_set *mechs ) argument 232 __dh_gss_inquire_cred_by_mech( OM_uint32 *minor, gss_cred_id_t cred, gss_OID mech, gss_name_t *name, OM_uint32 *init_time, OM_uint32 *accept_time, gss_cred_usage_t *usage ) argument [all...] |
H A D | context_establish.c | 193 dh_cred_id_t cred, /* Diffie-Hellman credential */ 221 * Check if the supplied cred is valid for the requested usage. 222 * The default cred never expires and has a usage of GSS_C_BOTH. 225 if ((gss_cred_id_t)cred != GSS_C_NO_CREDENTIAL) { 226 if ((cred->usage != usage && 227 cred->usage != GSS_C_BOTH) || 228 strcmp(*netname, cred->principal) != 0) { 233 /* See if the cred is still valid */ 234 if (cred->expire != GSS_C_INDEFINITE && 235 time(0) > cred 191 validate_cred( OM_uint32 *minor, dh_cred_id_t cred, gss_cred_usage_t usage, dh_principal *netname ) argument 354 __dh_gss_accept_sec_context( OM_uint32 *minor, gss_ctx_id_t *gss_ctx, gss_cred_id_t cred, gss_buffer_t input, gss_channel_bindings_t channel, gss_name_t *principal, gss_OID* mech, gss_buffer_t output, OM_uint32 *flags, OM_uint32 *expire, gss_cred_id_t *del_cred ) argument 878 __dh_gss_init_sec_context( OM_uint32 *minor, gss_cred_id_t cred, gss_ctx_id_t *context, gss_name_t target, gss_OID mech, OM_uint32 req_flags, OM_uint32 time_req, gss_channel_bindings_t channel, gss_buffer_t input_token, gss_OID *mech_rec, gss_buffer_t output_token, OM_uint32 *flags_rec, OM_uint32 *time_rec ) argument [all...] |
/osnet-11/usr/src/lib/libproc/common/ |
H A D | proc_set.c | 34 * Convenience wrapper to set the cred attributes of a victim process 45 prcred_t cred; member in struct:__anon2369 56 (void) memcpy(&ctlp->cred, credp, ctlsize);
|
/osnet-11/usr/src/lib/libldap4/common/ |
H A D | kbind.c | 61 char *cred; local 91 if ( (cred = get_kerberosv4_credentials( ld, dn, "ldapserver", 101 free( cred ); 117 ld->ld_version, dn, LDAP_AUTH_KRBV41, cred, credlen ); 126 free( cred ); 135 free( cred ); 188 char *cred; local 205 if ( (cred = get_kerberosv4_credentials( ld, dn, "x500dsa", &credlen )) 215 free( cred ); 231 ld->ld_version, dn, LDAP_AUTH_KRBV42, cred, credle 309 char realm[REALM_SZ], *cred, *krbinstance; local [all...] |
H A D | saslbind.c | 97 * dn, mechanism, cred, serverctrls, and clientctrls are supplied. 106 struct berval *cred, 122 if ( (ber = ldap_build_simple_bind_req(ld, dn, cred->bv_val, serverctrls)) == NULLBER){ 132 if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_CRAM_MD5, cred, serverctrls)) == NULLBER) { 142 if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_EXTERNAL, cred, serverctrls)) == NULLBER) { 157 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) { 172 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) { 187 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) { 202 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) { 217 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrl 102 ldap_sasl_bind( LDAP *ld, char *dn, char *mechanism, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp) argument 265 ldap_sasl_bind_s( LDAP *ld, char *dn, char *mechanism, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp) argument 288 ldap_sasl_cram_md5_bind_s( LDAP *ld, char *dn, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls ) argument [all...] |
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | cram_md5.c | 67 struct berval *cred, 94 (unsigned char *)cred->bv_val, cred->bv_len, digest); 64 ldap_sasl_cram_md5_bind_s( LDAP *ld, char *dn, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls ) argument
|
H A D | saslbind.c | 50 const struct berval *cred, 102 cred, LDAP_AUTH_SASL )) != 0 ) { 120 if ( cred == NULL ) { 123 cred = &tmpcred; 126 ldapversion, dn, LDAP_AUTH_SIMPLE, cred->bv_val, 127 (int)cred->bv_len /* XXX lossy cast */ ); 130 if ( cred == NULL ) { 137 mechanism, cred->bv_val, 138 (int)cred->bv_len /* XXX lossy cast */ ); 179 const struct berval *cred, 46 ldap_sasl_bind( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp ) argument 175 ldap_sasl_bind_s( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp ) argument [all...] |
/osnet-11/usr/src/lib/libpicltree/ |
H A D | picltree.h | 47 door_cred_t cred; member in struct:__anon2319 53 door_cred_t cred; member in struct:__anon2320
|
/osnet-11/usr/src/lib/libgss/ |
H A D | g_acquire_cred_with_pw.c | 249 gss_cred_id_t cred = NULL; local 325 GSS_C_NULL_OID_SET, cred_usage, &cred, NULL, 372 new_cred_array[union_cred->count] = cred; 422 if (cred != NULL && mech->gss_release_cred) 423 mech->gss_release_cred(&temp_minor_status, &cred);
|
H A D | g_acquire_cred.c | 342 gss_cred_id_t cred = NULL; local 431 &cred, NULL, &time_rec); 445 * If internal_name is GSS_C_NO_NAME a cred with no associated 485 new_cred_array[union_cred->count] = cred; 536 if (cred != NULL && mech->gss_release_cred) 537 mech->gss_release_cred(&temp_minor_status, &cred);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | init_creds_ctx.h | 21 krb5_creds cred; member in struct:_krb5_init_creds_context
|
/osnet-11/usr/src/lib/nsswitch/ldap/common/ |
H A D | ldap_utils.c | 107 const ns_cred_t *cred = NULL; local 138 (void) __ns_ldap_dn2domain(pdn, &domain, cred, &error);
|
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | ccfns.c | 201 const char *name, krb5_creds *cred) 207 memset(cred, 0, sizeof(*cred)); 219 ret = krb5_build_principal(context, &cred->server, 227 ret = krb5_copy_principal(context, client, &cred->client); 282 krb5_creds cred; local 283 memset(&cred, 0, sizeof(cred)); 285 ret = build_conf_principals(context, id, principal, key, &cred); 289 ret = krb5_cc_remove_cred(context, id, 0, &cred); 199 build_conf_principals(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_creds *cred) argument 325 krb5_creds mcred, cred; local [all...] |