| /sssd-io/src/responder/kcm/ |
| H A D | kcmsrv_ccache_pvt.h | 59 struct kcm_cred *creds; member in struct:kcm_ccache
|
| H A D | kcmsrv_ccache_json.c | 39 * /ntlm - stores NTLM creds [Not implement yet] 367 static json_t *creds_to_json_array(struct kcm_cred *creds) argument 378 DLIST_FOR_EACH(crd, creds) { 405 * creds : [ 420 json_t *creds = NULL; local 431 creds = creds_to_json_array(cc->creds); 432 if (creds == NULL) { 434 "Cannot convert creds to JSON array\n"); 445 "creds", cred 822 json_t *creds = NULL; local [all...] |
| H A D | kcmsrv_ccache_mem.c | 142 if (ccwrap->cc->creds) { 143 safezero(sss_iobuf_get_data(ccwrap->cc->creds->cred_blob), 144 sss_iobuf_get_size(ccwrap->cc->creds->cred_blob));
|
| H A D | kcmsrv_cmd.c | 383 req_ctx->cctx->creds,
|
| H A D | kcmsrv_ccache.c | 177 return cc->creds; 209 DLIST_ADD(cc->creds, crd);
|
| /sssd-io/src/providers/krb5/ |
| H A D | krb5_child.c | 52 (*k5_init_creds_password_fn_t)(krb5_context context, krb5_creds *creds, 79 krb5_creds *creds; member in struct:krb5_req 951 static krb5_error_code create_ccache(char *ccname, krb5_creds *creds) argument 999 kerr = krb5_cc_cache_match(kctx, creds->client, &cckcc); 1015 kerr = krb5_cc_initialize(kctx, kcc, creds->client); 1022 kerr = krb5_cc_store_cred(kctx, kcc, creds); 1272 t[0] = (int64_t) kr->creds->times.authtime; 1273 t[1] = (int64_t) kr->creds->times.starttime; 1274 t[2] = (int64_t) kr->creds->times.endtime; 1275 t[3] = (int64_t) kr->creds 1457 krb5_creds creds; local 1577 sss_krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, const char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *k5_gic_options) argument 2307 krb5_creds *creds = NULL; local [all...] |
| H A D | krb5_ccache.c | 265 struct sss_creds *creds; member in struct:sss_krb5_ccache 278 restore_creds(cc->creds); 297 ret = switch_creds(cc, uid, gid, 0, NULL, &cc->creds);
|
| /sssd-io/src/tests/cmocka/ |
| H A D | test_copy_ccache.c | 163 krb5_creds creds; local 189 memset(&creds, 0, sizeof(mcreds)); 192 kerr = krb5_cc_retrieve_cred(test_ctx->kctx, ccache, 0, &mcreds, &creds); 194 krb5_free_cred_contents(test_ctx->kctx, &creds);
|
| /sssd-io/src/responder/common/ |
| H A D | responder_common.c | 104 cctx->creds = talloc_zero(cctx, struct cli_creds); 105 if (!cctx->creds) return ENOMEM; 110 cctx->creds->ucred.uid = -1; 111 cctx->creds->ucred.gid = -1; 112 cctx->creds->ucred.pid = -1; 114 ret = getsockopt(cctx->cfd, SOL_SOCKET, SO_PEERCRED, &cctx->creds->ucred, 129 "Client creds: euid[%d] egid[%d] pid[%d].\n", 130 cctx->creds->ucred.uid, cctx->creds->ucred.gid, 131 cctx->creds 151 client_euid(struct cli_creds *creds) argument [all...] |
| H A D | responder.h | 174 struct cli_creds *creds; member in struct:cli_ctx 428 uid_t client_euid(struct cli_creds *creds);
|
| /sssd-io/src/monitor/ |
| H A D | monitor_netlink.c | 474 struct ucred *creds; local 476 creds = nlmsg_get_creds(msg); 477 if (!creds || creds->uid != 0) { 480 creds ? creds->uid : (uid_t)-1);
|
| /sssd-io/src/tests/ |
| H A D | krb5_child-test.c | 351 krb5_creds creds; local 375 while (!(kret = krb5_cc_next_cred(kcontext, cache, &cur, &creds))) { 377 print_creds(kcontext, &creds, defname); 378 krb5_free_cred_contents(kcontext, &creds);
|
| /sssd-io/src/responder/pam/ |
| H A D | pamsrv_cmd.c | 1249 static bool is_uid_trusted(struct cli_creds *creds, argument 1256 if (client_euid(creds) == 0) { 1265 ret = check_allowed_uids(client_euid(creds), trusted_uids_count, trusted_uids); 1374 preq->is_uid_trusted = is_uid_trusted(cctx->creds, 1380 client_euid(cctx->creds)); 2023 client_euid(preq->cctx->creds), preq->pd->domain);
|
| /sssd-io/src/responder/secrets/ |
| H A D | providers.c | 41 c_euid = client_euid(secreq->cctx->creds); 64 c_euid = client_euid(secreq->cctx->creds);
|