/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
H A D | sendauth.c | 51 krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, 105 if (!in_creds || !in_creds->ticket.length) { 111 if (!in_creds) { 130 in_creds = &creds; 132 if (!in_creds->ticket.length) { 134 use_ccache, in_creds, &credsp))) 138 credsp = in_creds; 48 krb5_sendauth(krb5_context context, krb5_auth_context *auth_context, krb5_pointer fd, char *appl_version, krb5_principal client, krb5_principal server, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_ccache ccache, krb5_error **error, krb5_ap_rep_enc_part **rep_result, krb5_creds **out_creds) argument
|
H A D | get_creds.c | 39 client identified by in_creds->client, the server identified by 40 in_creds->server, with options options, expiration date specified in 41 in_creds->times.endtime (0 means as long as possible), session key type 42 specified in in_creds->keyblock.enctype (if non-zero) 57 * of in_creds, so the contents of *mcreds should not be freed. 61 krb5_creds *in_creds, krb5_creds *mcreds, 66 if (!in_creds || !in_creds->server || !in_creds->client) 71 if (in_creds 60 krb5int_construct_matching_creds(krb5_context context, krb5_flags options, krb5_creds *in_creds, krb5_creds *mcreds, krb5_flags *fields) argument 128 krb5_get_credentials(krb5_context context, krb5_flags options, krb5_ccache ccache, krb5_creds *in_creds, krb5_creds **out_creds) argument 241 get_credentials_val_renew_core(krb5_context context, krb5_flags options, krb5_ccache ccache, krb5_creds *in_creds, krb5_creds **out_creds, int which) argument 285 krb5_get_credentials_validate(krb5_context context, krb5_flags options, krb5_ccache ccache, krb5_creds *in_creds, krb5_creds **out_creds) argument 295 krb5_get_credentials_renew(krb5_context context, krb5_flags options, krb5_ccache ccache, krb5_creds *in_creds, krb5_creds **out_creds) argument 311 krb5_creds in_creds; /* only client and server need to be filled in */ local [all...] |
H A D | mk_req_ext.c | 92 krb5_creds *in_creds, krb5_data *outbuf) 108 if (!in_creds->ticket.length) 116 if ((retval = decode_krb5_ticket(&(in_creds)->ticket, &request.ticket))) 120 if ((retval = krb5_validate_times(context, &in_creds->times)) != 0) 136 if ((retval = krb5_k_create_key(context, &in_creds->keyblock, 144 if ((retval = krb5_generate_seq_number(context, &in_creds->keyblock, 151 &in_creds->keyblock, 152 in_creds->keyblock.enctype); 205 retval = krb5_get_tgs_ktypes(context, in_creds->server, &desired_etypes); 214 in_creds 90 krb5_mk_req_extended(krb5_context context, krb5_auth_context *auth_context, krb5_flags ap_req_options, krb5_data *in_data, krb5_creds *in_creds, krb5_data *outbuf) argument [all...] |
H A D | vfy_increds.c | 86 krb5_creds in_creds, *out_creds; local 154 memset(&in_creds, 0, sizeof(in_creds)); 155 in_creds.client = creds->client; 156 in_creds.server = server; 157 if ((ret = krb5_timeofday(context, &in_creds.times.endtime))) 159 in_creds.times.endtime += 5*60; 161 if ((ret = krb5_get_credentials(context, 0, ccache, &in_creds,
|
H A D | s4u_creds.c | 60 krb5_creds *in_creds, 75 if (in_creds->client == NULL && subject_cert == NULL) { 79 if (in_creds->client != NULL && 80 krb5_princ_type(context, in_creds->client) != 83 return krb5_copy_principal(context, in_creds->client, canon_user); 101 if (in_creds->client != NULL) 102 client = in_creds->client; 105 client_data.realm = in_creds->server->realm; 454 krb5_creds *in_creds, 474 if (in_creds 59 s4u_identify_user(krb5_context context, krb5_creds *in_creds, krb5_data *subject_cert, krb5_principal *canon_user) argument 451 krb5_get_self_cred_from_kdc(krb5_context context, krb5_flags options, krb5_ccache ccache, krb5_creds *in_creds, krb5_data *subject_cert, krb5_data *user_realm, krb5_creds **out_creds) argument 658 krb5_get_credentials_for_user(krb5_context context, krb5_flags options, krb5_ccache ccache, krb5_creds *in_creds, krb5_data *subject_cert, krb5_creds **out_creds) argument 727 krb5_get_credentials_for_proxy(krb5_context context, krb5_flags options, krb5_ccache ccache, krb5_creds *in_creds, krb5_ticket *evidence_tkt, krb5_creds **out_creds) argument [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | s4u_gss_glue.c | 122 krb5_creds in_creds, *out_creds = NULL; local 124 memset(&in_creds, 0, sizeof(in_creds)); 127 in_creds.client = user->princ; 128 in_creds.server = impersonator_cred->name->princ; 131 in_creds.keyblock.enctype = impersonator_cred->req_enctypes[0]; 143 &in_creds.authdata); 156 &in_creds, 159 krb5_free_authdata(context, in_creds.authdata); 174 krb5_free_authdata(context, in_creds [all...] |
H A D | init_sec_context.c | 145 krb5_creds in_creds, evidence_creds; local 150 memset(&in_creds, 0, sizeof(krb5_creds)); 152 in_creds.client = in_creds.server = NULL; 188 in_creds.client = cc_princ; 189 in_creds.second_ticket = evidence_creds.ticket; 191 in_creds.client = cred->name->princ; 194 in_creds.server = server->princ; 195 in_creds.times.endtime = endtime; 196 in_creds [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | cc_retr.c | 316 krb5_creds *in_creds, 323 equal = krb5_principal_compare (in_context, in_creds->client, 328 equal = krb5_principal_compare (in_context, in_creds->server, 333 equal = (in_creds->keyblock.enctype == in_compare_creds->keyblock.enctype && 334 in_creds->keyblock.length == in_compare_creds->keyblock.length && 335 (!in_creds->keyblock.length || 336 !memcmp (in_creds->keyblock.contents, in_compare_creds->keyblock.contents, 337 in_creds->keyblock.length))); 341 equal = (in_creds->times.authtime == in_compare_creds->times.authtime && 342 in_creds 315 krb5_creds_compare(krb5_context in_context, krb5_creds *in_creds, krb5_creds *in_compare_creds) argument [all...] |