Searched refs:creds (Results 1 - 14 of 14) sorted by relevance

/sssd-io/src/responder/kcm/
H A Dkcmsrv_ccache_pvt.h59 struct kcm_cred *creds; member in struct:kcm_ccache
H A Dkcmsrv_ccache_json.c39 * /ntlm - stores NTLM creds [Not implement yet]
367 static json_t *creds_to_json_array(struct kcm_cred *creds) argument
378 DLIST_FOR_EACH(crd, creds) {
405 * creds : [
420 json_t *creds = NULL; local
431 creds = creds_to_json_array(cc->creds);
432 if (creds == NULL) {
434 "Cannot convert creds to JSON array\n");
445 "creds", cred
822 json_t *creds = NULL; local
[all...]
H A Dkcmsrv_ccache_mem.c142 if (ccwrap->cc->creds) {
143 safezero(sss_iobuf_get_data(ccwrap->cc->creds->cred_blob),
144 sss_iobuf_get_size(ccwrap->cc->creds->cred_blob));
H A Dkcmsrv_cmd.c383 req_ctx->cctx->creds,
H A Dkcmsrv_ccache.c177 return cc->creds;
209 DLIST_ADD(cc->creds, crd);
/sssd-io/src/providers/krb5/
H A Dkrb5_child.c52 (*k5_init_creds_password_fn_t)(krb5_context context, krb5_creds *creds,
79 krb5_creds *creds; member in struct:krb5_req
951 static krb5_error_code create_ccache(char *ccname, krb5_creds *creds) argument
999 kerr = krb5_cc_cache_match(kctx, creds->client, &cckcc);
1015 kerr = krb5_cc_initialize(kctx, kcc, creds->client);
1022 kerr = krb5_cc_store_cred(kctx, kcc, creds);
1272 t[0] = (int64_t) kr->creds->times.authtime;
1273 t[1] = (int64_t) kr->creds->times.starttime;
1274 t[2] = (int64_t) kr->creds->times.endtime;
1275 t[3] = (int64_t) kr->creds
1457 krb5_creds creds; local
1577 sss_krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, const char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *k5_gic_options) argument
2307 krb5_creds *creds = NULL; local
[all...]
H A Dkrb5_ccache.c265 struct sss_creds *creds; member in struct:sss_krb5_ccache
278 restore_creds(cc->creds);
297 ret = switch_creds(cc, uid, gid, 0, NULL, &cc->creds);
/sssd-io/src/tests/cmocka/
H A Dtest_copy_ccache.c163 krb5_creds creds; local
189 memset(&creds, 0, sizeof(mcreds));
192 kerr = krb5_cc_retrieve_cred(test_ctx->kctx, ccache, 0, &mcreds, &creds);
194 krb5_free_cred_contents(test_ctx->kctx, &creds);
/sssd-io/src/responder/common/
H A Dresponder_common.c104 cctx->creds = talloc_zero(cctx, struct cli_creds);
105 if (!cctx->creds) return ENOMEM;
110 cctx->creds->ucred.uid = -1;
111 cctx->creds->ucred.gid = -1;
112 cctx->creds->ucred.pid = -1;
114 ret = getsockopt(cctx->cfd, SOL_SOCKET, SO_PEERCRED, &cctx->creds->ucred,
129 "Client creds: euid[%d] egid[%d] pid[%d].\n",
130 cctx->creds->ucred.uid, cctx->creds->ucred.gid,
131 cctx->creds
151 client_euid(struct cli_creds *creds) argument
[all...]
H A Dresponder.h174 struct cli_creds *creds; member in struct:cli_ctx
428 uid_t client_euid(struct cli_creds *creds);
/sssd-io/src/monitor/
H A Dmonitor_netlink.c474 struct ucred *creds; local
476 creds = nlmsg_get_creds(msg);
477 if (!creds || creds->uid != 0) {
480 creds ? creds->uid : (uid_t)-1);
/sssd-io/src/tests/
H A Dkrb5_child-test.c351 krb5_creds creds; local
375 while (!(kret = krb5_cc_next_cred(kcontext, cache, &cur, &creds))) {
377 print_creds(kcontext, &creds, defname);
378 krb5_free_cred_contents(kcontext, &creds);
/sssd-io/src/responder/pam/
H A Dpamsrv_cmd.c1249 static bool is_uid_trusted(struct cli_creds *creds, argument
1256 if (client_euid(creds) == 0) {
1265 ret = check_allowed_uids(client_euid(creds), trusted_uids_count, trusted_uids);
1374 preq->is_uid_trusted = is_uid_trusted(cctx->creds,
1380 client_euid(cctx->creds));
2023 client_euid(preq->cctx->creds), preq->pd->domain);
/sssd-io/src/responder/secrets/
H A Dproviders.c41 c_euid = client_euid(secreq->cctx->creds);
64 c_euid = client_euid(secreq->cctx->creds);

Completed in 40 milliseconds