| /osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
| H A D | cccopy.c | 10 krb5_creds creds; local 26 while (!(code = krb5_cc_next_cred(context, incc, &cur, &creds))) { 27 code = krb5_cc_store_cred(context, outcc, &creds); 28 krb5_free_cred_contents(context, &creds);
|
| H A D | cc_retr.c | 69 standard_fields_match(krb5_context context, const krb5_creds *mcreds, const krb5_creds *creds) argument 71 return (krb5_principal_compare(context, mcreds->client,creds->client) 72 && krb5_principal_compare(context, mcreds->server,creds->server)); 78 srvname_match(krb5_context context, const krb5_creds *mcreds, const krb5_creds *creds) argument 83 retval = krb5_principal_compare(context, mcreds->client,creds->client); 90 p2 = *creds->server; 149 * returned in creds, which should be freed by the caller with 157 * requires only the set bits in mcreds be set in creds; 173 krb5int_cc_creds_match_request(krb5_context context, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds) argument 176 srvname_match(context, mcreds, creds)) || 207 krb5_cc_retrieve_cred_seq(krb5_context context, krb5_ccache id, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds, int nktypes, krb5_enctype *ktypes) argument 218 krb5_creds creds; member in struct:__anon1026 286 krb5_cc_retrieve_cred_default(krb5_context context, krb5_ccache id, krb5_flags flags, krb5_creds *mcreds, krb5_creds *creds) argument [all...] |
| H A D | ccfns.c | 67 krb5_creds *creds) 74 krb5_cc_remove_cred(context, cache, KRB5_TC_MATCH_AUTHDATA, creds); 76 ret = cache->ops->store(context, cache, creds); 80 * If creds->server and the server in the decoded ticket differ, 83 s1 = creds->server; 84 ret = decode_krb5_ticket(&creds->ticket, &tkt); 89 creds->server = s2; 91 krb5_cc_remove_cred(context, cache, KRB5_TC_MATCH_AUTHDATA, creds); 92 ret = cache->ops->store(context, cache, creds); 93 creds 66 krb5_cc_store_cred(krb5_context context, krb5_ccache cache, krb5_creds *creds) argument 100 krb5_cc_retrieve_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *mcreds, krb5_creds *creds) argument 138 krb5_cc_next_cred(krb5_context context, krb5_ccache cache, krb5_cc_cursor *cursor, krb5_creds *creds) argument 152 krb5_cc_remove_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *creds) argument [all...] |
| H A D | cc_memory.c | 63 krb5_creds *creds ); 73 krb5_creds *creds ); 79 (krb5_context, krb5_ccache id , krb5_creds *creds ); 111 krb5_creds *creds; member in struct:_krb5_mcc_link 199 krb5_free_creds(context, curr->creds); 345 * cursor, creds 348 * Fills in creds with the "next" credentals structure from the cache 349 * id. The actual order the creds are returned in is arbitrary. 361 krb5_cc_cursor *cursor, krb5_creds *creds) 372 memset(creds, 360 krb5_mcc_next_cred(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument 593 krb5_mcc_retrieve(krb5_context context, krb5_ccache id, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds) argument 607 krb5_mcc_remove_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *creds) argument 650 krb5_mcc_store(krb5_context ctx, krb5_ccache id, krb5_creds *creds) argument [all...] |
| /osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
| H A D | mk_req.c | 61 krb5_creds creds; local 69 memset(&creds, 0, sizeof(creds)); 70 if ((retval = krb5_copy_principal(context, server, &creds.server))) 73 if ((retval = krb5_cc_get_principal(context, ccache, &creds.client))) 77 ccache, &creds, &credsp))) 86 krb5_free_cred_contents(context, &creds);
|
| H A D | sendauth.c | 56 krb5_creds creds; local 100 memset(&creds, 0, sizeof(creds)); 113 &creds.server))) 117 &creds.client); 120 &creds.client); 122 krb5_free_principal(context, creds.server); 125 /* creds.times.endtime = 0; -- memset 0 takes care of this 127 /* creds.keyblock.enctype = 0; -- as well as this. 130 in_creds = &creds; [all...] |
| H A D | fwd_tgt.c | 59 krb5_creds creds, tgt; local 68 memset(&creds, 0, sizeof(creds)); 69 memset(&tgt, 0, sizeof(creds)); 106 if ((retval = krb5_copy_principal(context, client, &creds.client))) 109 if ((retval = krb5_build_principal_ext(context, &creds.server, 122 &creds, &tgt); 127 /* tgt->client must be equal to creds.client */ 128 if (!krb5_principal_compare(context, tgt.client, creds.client)) { 134 r_err = krb5_unparse_name(context, creds [all...] |
| H A D | get_creds.c | 306 validate_or_renew_creds(krb5_context context, krb5_creds *creds, argument 364 *creds = *out_creds; 379 krb5_get_validated_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument 381 return(validate_or_renew_creds(context, creds, client, ccache, 386 krb5_get_renewed_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument 388 return(validate_or_renew_creds(context, creds, client, ccache,
|
| H A D | gic_keytab.c | 99 krb5_creds *creds, 154 ret = krb5int_get_init_creds(context, creds, client, NULL, NULL, 178 ret2 = krb5int_get_init_creds(context, creds, client, NULL, NULL, 222 krb5_creds *creds, krb5_kdc_rep **ret_as_reply) 233 pre_auth_types, creds); 244 retval = krb5_unparse_name( context, creds->server, &server); 247 server_princ = creds->server; 248 client_princ = creds->client; 249 retval = krb5int_get_init_creds(context, creds, creds 98 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab arg_keytab, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument 218 krb5_get_in_tkt_with_keytab(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, krb5_keytab arg_keytab, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument [all...] |
| H A D | vfy_increds.c | 16 krb5_creds *creds) 23 if (krb5int_libdefault_boolean(context, &creds->client->realm, 38 krb5_creds creds; local 49 while (!(code = krb5_cc_next_cred(context, incc, &cur, &creds))) { 50 if (krb5_principal_compare(context, princ, creds.server)) 53 code = krb5_cc_store_cred(context, outcc, &creds); 54 krb5_free_cred_contents(context, &creds); 81 get_vfy_cred(krb5_context context, krb5_creds *creds, krb5_principal server, argument 94 /* If the creds are for the server principal, we're set, just do a mk_req. 98 if (krb5_principal_compare(context, server, creds 15 nofail(krb5_context context, krb5_verify_init_creds_opt *options, krb5_creds *creds) argument 298 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal server, krb5_keytab keytab, krb5_ccache *ccache, krb5_verify_init_creds_opt *options) argument [all...] |
| H A D | gic_pwd.c | 133 krb5_creds *creds, 151 return (__krb5_get_init_creds_password(context, creds, client, password, 163 krb5_creds *creds, 213 ret = krb5int_get_init_creds(context, creds, client, prompter, data, 245 ret2 = krb5int_get_init_creds(context, creds, client, prompter, data, 382 ret = krb5int_get_init_creds(context, creds, client, prompter, data, 496 Attempts to get an initial ticket for creds->client to use server 497 creds->server, (realm is taken from creds->client), with options 498 options, and using creds 132 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument 162 __krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options, krb5_kdc_rep **ptr_as_reply) argument 515 krb5_get_in_tkt_with_password(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, const char *password, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument [all...] |
| H A D | preauth.c | 122 krb5_error_code krb5_obtain_padata(krb5_context context, krb5_pa_data **preauth_to_use, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request) argument 197 key_proc, key_seed, creds, 228 krb5_process_padata(krb5_context context, krb5_kdc_req *request, krb5_kdc_rep *as_reply, git_key_proc key_proc, krb5_const_pointer keyseed, git_decrypt_proc decrypt_proc, krb5_keyblock **decrypt_key, krb5_creds *creds, krb5_int32 *do_more) argument 248 decrypt_key, creds, do_more, &done); 265 obtain_enc_ts_padata(krb5_context context, krb5_pa_data *in_padata, krb5_etype_info etype_info, krb5_keyblock *def_enc_key, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request, krb5_pa_data **out_padata) argument 319 process_pw_salt(krb5_context context, krb5_pa_data *padata, krb5_kdc_req *request, krb5_kdc_rep *as_reply, git_key_proc key_proc, krb5_const_pointer keyseed, git_decrypt_proc decrypt_proc, krb5_keyblock **decrypt_key, krb5_creds *creds, krb5_int32 *do_more, krb5_int32 *done) argument 443 obtain_sam_padata(krb5_context context, krb5_pa_data *in_padata, krb5_etype_info etype_info, krb5_keyblock *def_enc_key, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request, krb5_pa_data **out_padata) argument
|
| H A D | fast.c | 62 krb5_creds creds, *out_creds = NULL; local 68 memset(&creds, 0, sizeof(creds)); 69 creds.server = target_principal; 70 retval = krb5_cc_get_principal(context, ccache, &creds.client); 72 retval = krb5_get_credentials(context, 0, ccache, &creds, &out_creds); 101 creds.server = NULL; 102 krb5_free_cred_contents(context, &creds);
|
| H A D | s4u_creds.c | 66 krb5_creds creds; local 85 memset(&creds, 0, sizeof(creds)); 113 code = krb5int_get_init_creds(context, &creds, client, 126 krb5_free_cred_contents(context, &creds);
|
| /osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
| H A D | copy_ccache.c | 12 krb5_creds creds; local 54 &creds)) { 55 code = krb5_cc_store_cred(context, out_ccache, &creds); 56 krb5_free_cred_contents(context, &creds);
|
| H A D | acquire_cred_with_pw.c | 118 krb5_creds creds; local 143 (void) memset(&creds, 0, sizeof (creds)); 146 &creds, 179 if ((code = krb5_cc_initialize(context, ccache2, creds.client)) != 0) 182 if ((code = krb5_cc_store_cred(context, ccache2, &creds)) != 0) 185 krb5_free_cred_contents(context, &creds);
|
| H A D | acquire_cred.c | 254 krb5_creds creds; local 438 while (!(code = krb5_cc_next_cred(context, ccache, &cur, &creds))) { 439 if (krb5_principal_compare(context, tmp_princ, creds.server)) { 440 cred->tgt_expire = creds.times.endtime; 444 krb5_free_cred_contents(context, &creds); 448 cred->tgt_expire = creds.times.endtime; 451 krb5_free_cred_contents(context, &creds);
|
| H A D | accept_sec_context.c | 168 /* Decode, decrypt and store the forwarded creds in the local ccache. */ 176 krb5_creds ** creds = NULL; local 209 if (krb5_rd_cred(context, auth_context, inbuf, &creds, NULL)) { 240 &creds, NULL))) 249 if ((retval = krb5_cc_initialize(context, ccache, creds[0]->client))) 252 if ((retval = krb5_cc_store_cred(context, ccache, creds[0]))) 276 kg_init_name(context, creds[0]->client, NULL, 0, &cred->name))) { 289 cred->tgt_expire = creds[0]->times.endtime; /* store the end time */ 300 if (creds) 301 krb5_free_tgt_creds(context, creds); [all...] |
| /osnet-11/usr/src/lib/libldap4/common/ |
| H A D | saslbind.c | 23 BerElement * ldap_build_sasl_bind_req( LDAP *ld, char *dn, char *mechanism, struct berval *creds, LDAPControl ** serverctrls) argument 57 if (creds != NULL && creds->bv_val != NULL) { 58 if (ber_printf(ber, "o", creds->bv_val, creds->bv_len) == -1){
|
| /osnet-11/usr/src/lib/libgss/ |
| H A D | g_acquire_cred_with_pw.c | 108 gss_union_cred_t creds; local 153 creds = (gss_union_cred_t)malloc(sizeof (gss_union_cred_desc)); 154 if (creds == NULL) 158 (void) memset(creds, 0, sizeof (gss_union_cred_desc)); 159 creds->loopback = creds; 164 (gss_cred_id_t)creds, 194 if (creds->count < 1) { 195 free(creds); 204 if ((*actual_mechs = create_actual_mechs(creds [all...] |
| H A D | g_acquire_cred.c | 154 gss_union_cred_t creds; local 193 creds = (gss_union_cred_t)malloc(sizeof (gss_union_cred_desc)); 194 if (creds == NULL) 198 (void) memset(creds, 0, sizeof (gss_union_cred_desc)); 199 creds->loopback = creds; 203 major = gss_add_cred(minor_status, (gss_cred_id_t)creds, 232 if (creds->count < 1) { 233 free(creds); 242 if ((*actual_mechs = create_actual_mechs(creds [all...] |
| /osnet-11/usr/src/lib/pam_modules/krb5/ |
| H A D | krb5_setcred.c | 368 krb5_creds creds; local 384 (void) memset(&creds, 0, sizeof (krb5_creds)); 386 server, &creds.server))) { 397 kmd->ccache, &creds.client); 438 * If we only wanted to refresh the creds but failed 443 0, kmd->ccache, &creds, &renewed_cred)) { 459 "PAM-KRB5 (setcred): Cannot find creds" 590 krb5_free_cred_contents(kmd->kcontext, &creds);
|
| /osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
| H A D | changepw.c | 217 krb5_creds *creds, 251 creds, 261 creds->server), 380 krb5_creds *creds, 386 return change_set_password(context, creds, newpw, NULL, 397 krb5_creds *creds, 405 return change_set_password(context, creds, newpw, change_password_for, 419 krb5_creds creds; local 424 ** get the proper creds for use with krb5_set_password - 426 memset (&creds, 216 change_set_password(krb5_context context, krb5_creds *creds, char *newpw, krb5_principal set_password_for, int *result_code, krb5_data *result_code_string, krb5_data *result_string) argument 379 krb5_change_password(krb5_context context, krb5_creds *creds, char *newpw, int *result_code, krb5_data *result_code_string, krb5_data *result_string) argument 396 krb5_set_password(krb5_context context, krb5_creds *creds, char *newpw, krb5_principal change_password_for, int *result_code, krb5_data *result_code_string, krb5_data *result_string ) argument [all...] |
| /osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/ |
| H A D | pkinit_crypto_openssl.h | 68 pkinit_cred_info creds[MAX_CREDS_ALLOWED+1]; member in struct:_pkinit_identity_crypto_context 137 unsigned int index; /* Index of this cred in the creds[] array */
|
| /osnet-11/usr/src/lib/rpcsec_gss/ |
| H A D | rpcsec_gss.c | 458 struct opaque_auth creds; local 483 creds.oa_flavor = RPCSEC_GSS; 484 creds.oa_base = cred_buf; 485 creds.oa_length = xdr_getpos(&cred_xdrs); 488 if (!xdr_opaque_auth(xdrs, &creds)) 755 * Non-default creds need to be released by user.
|