Searched refs:cred (Results 1 - 25 of 87) sorted by relevance

1234

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Drel_cred.c35 krb5_gss_cred_id_t cred; local
56 cred = (krb5_gss_cred_id_t)*cred_handle;
58 k5_mutex_destroy(&cred->lock);
61 if (cred->ccache) {
71 if (strcmp("MEMORY", krb5_cc_get_type(context, cred->ccache)) == 0)
72 code1 = krb5_cc_destroy(context, cred->ccache);
74 code1 = krb5_cc_close(context, cred->ccache);
79 if (cred->keytab)
80 code2 = krb5_kt_close(context, cred->keytab);
85 if (cred
[all...]
H A Dacquire_cred_with_pw.c93 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred)
98 krb5_gss_cred_id_rec *cred;
108 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred)
113 krb5_gss_cred_id_rec *cred;
121 cred->ccache = NULL;
187 cred->ccache = ccache2;
223 krb5_gss_cred_id_t cred; local
290 /* create the gss cred structure */
291 if ((cred = (krb5_gss_cred_id_t)
297 memset(cred,
[all...]
H A Dinq_cred.c88 krb5_gss_cred_id_t cred; local
113 if ((major = kg_get_defcred(minor_status, (gss_cred_id_t *)&cred)) &&
126 cred = (krb5_gss_cred_id_t) cred_handle;
135 code = k5_mutex_lock(&cred->lock);
141 if (cred->tgt_expire > 0) {
142 if ((lifetime = cred->tgt_expire - now) < 0)
149 if (cred->name &&
150 (code = kg_duplicate_name(context, cred->name,
152 k5_mutex_unlock(&cred->lock);
164 (cred
232 krb5_gss_cred_id_t cred; local
[all...]
H A Dutl_nohash_validate.c50 int g_save_cred_id(vdb, cred)
52 gss_cred_id_t *cred;
77 int g_validate_cred_id(vdb, cred)
79 gss_cred_id_t *cred;
104 int g_delete_cred_id(vdb, cred)
106 gss_cred_id_t *cred;
H A Dset_allowable_enctypes.c71 krb5_gss_cred_id_t cred; local
83 /* verify and valildate cred handle */
93 cred = (krb5_gss_cred_id_t) cred_handle;
103 kerr = k5_mutex_lock(&cred->lock);
106 if (cred->req_enctypes)
107 free(cred->req_enctypes);
108 cred->req_enctypes = NULL;
109 k5_mutex_unlock(&cred->lock);
113 /* Copy the requested ktypes into the cred structure */
122 kerr = k5_mutex_lock(&cred
[all...]
H A Ds4u_gss_glue.c36 krb5_gss_cred_id_t cred)
41 cred->prerfc_mech = 1;
42 cred->rfc_mech = 1;
44 cred->prerfc_mech = 0;
45 cred->rfc_mech = 0;
49 cred->prerfc_mech = 1;
51 cred->rfc_mech = 1;
54 if (!cred->prerfc_mech && !cred->rfc_mech) {
65 krb5_gss_cred_id_t cred,
34 kg_set_desired_mechs(OM_uint32 *minor_status, const gss_OID_set desired_mechs, krb5_gss_cred_id_t cred) argument
64 kg_return_mechs(OM_uint32 *minor_status, krb5_gss_cred_id_t cred, gss_OID_set *actual_mechs) argument
103 kg_is_initiator_cred(krb5_gss_cred_id_t cred) argument
193 krb5_gss_cred_id_t cred; local
262 krb5_gss_cred_id_t cred = NULL; local
[all...]
H A Dacquire_cred.c143 If successful, set the keytab-specific fields in cred
151 krb5_gss_cred_id_rec *cred)
159 cred->keytab = NULL;
220 &cred->rcache))) {
229 cred->keytab = kt;
239 If successful, set the ccache-specific fields in cred.
247 krb5_gss_cred_id_rec *cred)
258 cred->ccache = NULL;
440 cred->tgt_expire = creds.times.endtime;
448 cred
147 acquire_accept_cred(krb5_context context, OM_uint32 *minor_status, krb5_gss_name_t desired_name, krb5_gss_name_t *output_name, krb5_gss_cred_id_rec *cred) argument
243 acquire_init_cred(krb5_context context, OM_uint32 *minor_status, krb5_gss_name_t desired_name, krb5_gss_name_t *output_name, krb5_gss_cred_id_rec *cred) argument
511 krb5_gss_cred_id_t cred; local
783 krb5_gss_cred_id_t cred; local
[all...]
H A Dadd_cred.c88 krb5_gss_cred_id_t cred; local
135 cred = (krb5_gss_cred_id_t) input_cred_handle;
136 k5_mutex_assert_locked(&cred->lock);
138 /* check if the cred_usage is equal or "less" than the passed-in cred
141 if (!((cred->usage == cred_usage) ||
142 ((cred->usage == GSS_C_BOTH) &&
151 if ((g_OID_equal(desired_mech, gss_mech_krb5_old) && cred->prerfc_mech) ||
152 (g_OID_equal(desired_mech, gss_mech_krb5) && cred->rfc_mech)) {
177 !kg_compare_name(context, (krb5_gss_name_t)desired_name, cred->name)) {
182 int kret1 = krb5_unparse_name(context, cred
[all...]
H A Dinit_sec_context.c135 static krb5_error_code get_credentials(context, cred, server, now,
138 krb5_gss_cred_id_t cred;
149 k5_mutex_assert_locked(&cred->lock);
154 assert(cred->name != NULL);
156 if ((code = krb5_cc_get_principal(context, cred->ccache, &cc_princ)))
164 if (cred->proxy_cred &&
175 mcreds.times.endtime = cred->tgt_expire;
177 mcreds.client = cred->name->princ;
179 code = krb5_cc_retrieve_cred(context, cred->ccache,
191 in_creds.client = cred
246 krb5_gss_cred_id_t cred; member in struct:gss_checksum_data
476 kg_new_connection( OM_uint32 *minor_status, krb5_gss_cred_id_t cred, gss_ctx_id_t *context_handle, gss_name_t target_name, gss_OID mech_type, OM_uint32 req_flags, OM_uint32 time_req, gss_channel_bindings_t input_chan_bindings, gss_buffer_t input_token, gss_OID *actual_mech_type, gss_buffer_t output_token, OM_uint32 *ret_flags, OM_uint32 *time_rec, krb5_context context, int default_mech) argument
934 krb5_gss_cred_id_t cred; local
1471 krb5_gss_cred_id_t cred; local
[all...]
H A Dstore_cred.c42 store_init_cred(ct, minor_status, cred, dflt)
45 const krb5_gss_cred_id_t cred;
67 * client principals other than the given cred's
69 * c) copy the given cred's tickets to that same tmp ccache
71 * princ as before (!dflt) or with the input cred's princ as the
75 * (dflt), and copy the input cred's tickets to it.
90 cred->name->princ))) {
101 if ((code = krb5_cc_copy_creds(ct, cred->ccache, ccache))) {
132 krb5_gss_cred_id_t cred = (krb5_gss_cred_id_t)input_cred; local
135 OM_uint32 in_time_rec; /* lifetime of input cred */
[all...]
H A Daccept_sec_context.c179 krb5_gss_cred_id_t cred = NULL; local
258 if (!(cred =
265 memset(cred, 0, sizeof(krb5_gss_cred_id_rec));
267 retval = k5_mutex_init(&cred->lock);
269 xfree(cred);
270 cred = NULL;
276 kg_init_name(context, creds[0]->client, NULL, 0, &cred->name))) {
277 k5_mutex_destroy(&cred->lock);
279 xfree(cred); /* clean up memory on failure */
280 cred
441 krb5_gss_cred_id_t cred = 0; local
[all...]
/osnet-11/usr/src/lib/libnsl/rpc/
H A Dauthdes_prot.c50 xdr_authdes_cred(XDR *xdrs, struct authdes_cred *cred) argument
55 if (!xdr_enum(xdrs, (enum_t *)&cred->adc_namekind))
57 switch (cred->adc_namekind) {
59 if (!xdr_string(xdrs, &cred->adc_fullname.name,
62 if (!xdr_opaque(xdrs, (caddr_t)&cred->adc_fullname.key,
65 return (xdr_opaque(xdrs, (caddr_t)&cred->adc_fullname.window,
66 (uint_t)sizeof (cred->adc_fullname.window)));
68 return (xdr_opaque(xdrs, (caddr_t)&cred->adc_nickname,
69 (uint_t)sizeof (cred->adc_nickname)));
H A Dsvcauth_des.c123 struct authdes_cred *cred; local
153 cred = (struct authdes_cred *)&area->area_cred;
162 cred->adc_namekind = IXDR_GET_ENUM(ixdr, enum authdes_namekind);
163 switch (cred->adc_namekind) {
168 cred->adc_fullname.name = area->area_netname;
169 (void) memcpy(cred->adc_fullname.name, ixdr, (uint_t)namelen);
170 cred->adc_fullname.name[namelen] = 0;
172 cred->adc_fullname.key.key.high = (uint32_t)*ixdr++;
173 cred->adc_fullname.key.key.low = (uint32_t)*ixdr++;
174 cred
612 invalidate(char *cred) argument
635 struct bsdcred *cred; local
[all...]
/osnet-11/usr/src/lib/libfru/libfruraw/
H A Dfru_access.h82 int fru_get_num_sections(container_hdl_t container, door_cred_t *cred);
84 int max_sections, door_cred_t *cred);
89 section_hdl_t *newsection, door_cred_t *cred);
91 door_cred_t *cred);
93 door_cred_t *cred);
95 segment_hdl_t *newsegment, door_cred_t *cred);
96 int fru_get_num_packets(segment_hdl_t segment, door_cred_t *cred);
98 int max_packets, door_cred_t *cred);
100 size_t nbytes, door_cred_t *cred);
102 packet_hdl_t *newpacket, door_cred_t *cred);
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/
H A Dvalidate.c74 * __dh_validate_cred: Check the cred database if the supplied crediential
80 __dh_validate_cred(dh_cred_id_t cred) argument
86 * __dh_install_cred: Installed the cred into the credential database
91 __dh_install_cred(dh_cred_id_t cred) argument
97 * __dh_remove_cred: Remove the supplied cred from the database.
102 __dh_remove_cred(dh_cred_id_t cred) argument
H A Dcred.c53 gss_cred_id_t *cred, /* The return credential */
61 if (minor == 0 || cred == 0)
70 *cred = GSS_C_NO_CREDENTIAL;
133 /* Return the Diffie-Hellman credential through cred */
134 *cred = (gss_cred_id_t)dh_cred;
165 gss_cred_id_t cred, /* cred of interest */
171 /* cred is a Diffie-Hellman credential */
172 dh_cred_id_t crid = (dh_cred_id_t)cred;
181 if (cred
47 __dh_gss_acquire_cred( OM_uint32 *minor, gss_name_t principal, OM_uint32 expire_req, gss_OID_set desired_mechs, gss_cred_usage_t usage, gss_cred_id_t *cred, gss_OID_set *mechs, OM_uint32 *expire_rec ) argument
163 __dh_gss_inquire_cred( OM_uint32 *minor, gss_cred_id_t cred, gss_name_t *name, OM_uint32 *lifetime, gss_cred_usage_t *usage, gss_OID_set *mechs ) argument
232 __dh_gss_inquire_cred_by_mech( OM_uint32 *minor, gss_cred_id_t cred, gss_OID mech, gss_name_t *name, OM_uint32 *init_time, OM_uint32 *accept_time, gss_cred_usage_t *usage ) argument
[all...]
/osnet-11/usr/src/lib/libsldap/common/
H A Dllib-lsldap46 const ns_cred_t *cred,
60 const ns_cred_t *cred,
71 const ns_cred_t *cred,
79 const ns_cred_t *cred,
87 const ns_cred_t *cred,
95 const ns_cred_t *cred,
104 const ns_cred_t *cred,
111 const ns_cred_t *cred,
122 const ns_cred_t *cred,
150 const ns_cred_t *cred,
[all...]
H A Dns_sldap.h195 } cred; member in struct:ns_cred
606 char *cred; /* A credential level to be used */ member in struct:ns_dir_server
630 #define SA_CRED ds_profile.server.cred
664 * cred
680 const ns_cred_t *cred,
752 const ns_cred_t *cred,
765 const ns_cred_t *cred,
782 const ns_cred_t *cred,
799 const ns_cred_t *cred,
817 const ns_cred_t *cred,
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dccfns.c201 const char *name, krb5_creds *cred)
207 memset(cred, 0, sizeof(*cred));
219 ret = krb5_build_principal(context, &cred->server,
227 ret = krb5_copy_principal(context, client, &cred->client);
282 krb5_creds cred; local
283 memset(&cred, 0, sizeof(cred));
285 ret = build_conf_principals(context, id, principal, key, &cred);
289 ret = krb5_cc_remove_cred(context, id, 0, &cred);
199 build_conf_principals(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_creds *cred) argument
325 krb5_creds mcred, cred; local
[all...]
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/
H A Dsaslbind.c50 const struct berval *cred,
102 cred, LDAP_AUTH_SASL )) != 0 ) {
120 if ( cred == NULL ) {
123 cred = &tmpcred;
126 ldapversion, dn, LDAP_AUTH_SIMPLE, cred->bv_val,
127 (int)cred->bv_len /* XXX lossy cast */ );
130 if ( cred == NULL ) {
137 mechanism, cred->bv_val,
138 (int)cred->bv_len /* XXX lossy cast */ );
179 const struct berval *cred,
46 ldap_sasl_bind( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp ) argument
175 ldap_sasl_bind_s( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp ) argument
[all...]
H A Dcram_md5.c67 struct berval *cred,
94 (unsigned char *)cred->bv_val, cred->bv_len, digest);
64 ldap_sasl_cram_md5_bind_s( LDAP *ld, char *dn, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls ) argument
/osnet-11/usr/src/lib/libldap4/common/
H A Dkbind.c61 char *cred; local
91 if ( (cred = get_kerberosv4_credentials( ld, dn, "ldapserver",
101 free( cred );
117 ld->ld_version, dn, LDAP_AUTH_KRBV41, cred, credlen );
126 free( cred );
135 free( cred );
188 char *cred; local
205 if ( (cred = get_kerberosv4_credentials( ld, dn, "x500dsa", &credlen ))
215 free( cred );
231 ld->ld_version, dn, LDAP_AUTH_KRBV42, cred, credle
309 char realm[REALM_SZ], *cred, *krbinstance; local
[all...]
H A Dsaslbind.c97 * dn, mechanism, cred, serverctrls, and clientctrls are supplied.
106 struct berval *cred,
122 if ( (ber = ldap_build_simple_bind_req(ld, dn, cred->bv_val, serverctrls)) == NULLBER){
132 if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_CRAM_MD5, cred, serverctrls)) == NULLBER) {
142 if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_EXTERNAL, cred, serverctrls)) == NULLBER) {
157 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) {
172 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) {
187 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) {
202 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) {
217 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrl
102 ldap_sasl_bind( LDAP *ld, char *dn, char *mechanism, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp) argument
265 ldap_sasl_bind_s( LDAP *ld, char *dn, char *mechanism, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp) argument
288 ldap_sasl_cram_md5_bind_s( LDAP *ld, char *dn, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls ) argument
[all...]
/osnet-11/usr/src/lib/libproc/common/
H A Dproc_set.c34 * Convenience wrapper to set the cred attributes of a victim process
45 prcred_t cred; member in struct:__anon2369
56 (void) memcpy(&ctlp->cred, credp, ctlsize);
/osnet-11/usr/src/lib/libsmbfs/common/
H A Dsmbfs_gss.c215 gss_cred_id_t *cred, gss_name_t *trgt_name, gss_OID *mech_oid,
222 if (*cred != GSS_C_NO_CREDENTIAL)
223 (void) gss_release_cred(min_stat, cred);
246 smbfs_gss_inquire_cred(gss_cred_id_t *cred) argument
253 maj_stat = gss_inquire_cred(&min_stat, *cred, &name, &lifetime,
342 smbfs_gss_acquire_cred(struct smb_ctx *ctx, gss_cred_id_t *cred) argument
358 GSS_C_NULL_OID_SET, GSS_C_INITIATE, cred,
370 GSS_C_NULL_OID_SET, GSS_C_INITIATE, cred,
385 if (smbfs_gss_inquire_cred(cred) != 0) {
406 gss_cred_id_t cred local
214 smbfs_gss_cleanup(OM_uint32 *min_stat, gss_ctx_id_t *context, gss_cred_id_t *cred, gss_name_t *trgt_name, gss_OID *mech_oid, gss_buffer_desc *input_tok, gss_buffer_desc *send_tok) argument
[all...]

Completed in 81 milliseconds

1234