Searched refs:creds (Results 1 - 9 of 9) sorted by relevance
/sssd/src/providers/krb5/ |
H A D | krb5_child.c | 64 krb5_creds *creds; member in struct:krb5_req 783 static krb5_error_code create_ccache(char *ccname, krb5_creds *creds) argument 831 kerr = krb5_cc_cache_match(kctx, creds->client, &cckcc); 847 kerr = krb5_cc_initialize(kctx, kcc, creds->client); 854 kerr = krb5_cc_store_cred(kctx, kcc, creds); 1047 t[0] = (int64_t) kr->creds->times.authtime; 1048 t[1] = (int64_t) kr->creds->times.starttime; 1049 t[2] = (int64_t) kr->creds->times.endtime; 1050 t[3] = (int64_t) kr->creds->times.renew_till; 1059 kerr = krb5_unparse_name_ext(kr->ctx, kr->creds 1232 krb5_creds creds; local 1813 krb5_creds *creds = NULL; local [all...] |
H A D | krb5_ccache.c | 265 struct sss_creds *creds; member in struct:sss_krb5_ccache 278 restore_creds(cc->creds); 297 ret = switch_creds(cc, uid, gid, 0, NULL, &cc->creds);
|
/sssd/src/responder/common/ |
H A D | responder_common.c | 99 cctx->creds = talloc(cctx, struct cli_creds); 100 if (!cctx->creds) return ENOMEM; 105 cctx->creds->ucred.uid = -1; 106 cctx->creds->ucred.gid = -1; 107 cctx->creds->ucred.pid = -1; 109 ret = getsockopt(cctx->cfd, SOL_SOCKET, SO_PEERCRED, &cctx->creds->ucred, 124 "Client creds: euid[%d] egid[%d] pid[%d].\n", 125 cctx->creds->ucred.uid, cctx->creds->ucred.gid, 126 cctx->creds 146 client_euid(struct cli_creds *creds) argument [all...] |
H A D | responder.h | 142 struct cli_creds *creds; member in struct:cli_ctx 342 uid_t client_euid(struct cli_creds *creds);
|
/sssd/src/tests/cmocka/ |
H A D | test_copy_ccache.c | 163 krb5_creds creds; local 189 memset(&creds, 0, sizeof(mcreds)); 192 kerr = krb5_cc_retrieve_cred(test_ctx->kctx, ccache, 0, &mcreds, &creds); 194 krb5_free_cred_contents(test_ctx->kctx, &creds);
|
/sssd/src/monitor/ |
H A D | monitor_netlink.c | 474 struct ucred *creds; local 476 creds = nlmsg_get_creds(msg); 477 if (!creds || creds->uid != 0) { 480 creds ? creds->uid : (uid_t)-1);
|
/sssd/src/tests/ |
H A D | krb5_child-test.c | 341 krb5_creds creds; local 365 while (!(kret = krb5_cc_next_cred(kcontext, cache, &cur, &creds))) { 367 print_creds(kcontext, &creds, defname); 368 krb5_free_cred_contents(kcontext, &creds);
|
/sssd/src/responder/pam/ |
H A D | pamsrv_cmd.c | 1138 static bool is_uid_trusted(struct cli_creds *creds, argument 1145 if (client_euid(creds) == 0) { 1154 ret = check_allowed_uids(client_euid(creds), trusted_uids_count, trusted_uids); 1245 preq->is_uid_trusted = is_uid_trusted(cctx->creds, 1251 client_euid(cctx->creds)); 1966 client_euid(preq->cctx->creds), preq->pd->domain);
|
/sssd/src/responder/secrets/ |
H A D | providers.c | 32 c_euid = client_euid(secreq->cctx->creds);
|
Completed in 56 milliseconds