Searched defs:creds (Results 1 - 25 of 32) sorted by relevance

12

/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dcccopy.c10 krb5_creds creds; local
26 while (!(code = krb5_cc_next_cred(context, incc, &cur, &creds))) {
27 code = krb5_cc_store_cred(context, outcc, &creds);
28 krb5_free_cred_contents(context, &creds);
H A Dcc_retr.c69 standard_fields_match(krb5_context context, const krb5_creds *mcreds, const krb5_creds *creds) argument
71 return (krb5_principal_compare(context, mcreds->client,creds->client)
72 && krb5_principal_compare(context, mcreds->server,creds->server));
78 srvname_match(krb5_context context, const krb5_creds *mcreds, const krb5_creds *creds) argument
83 retval = krb5_principal_compare(context, mcreds->client,creds->client);
90 p2 = *creds->server;
149 * returned in creds, which should be freed by the caller with
157 * requires only the set bits in mcreds be set in creds;
173 krb5int_cc_creds_match_request(krb5_context context, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds) argument
176 srvname_match(context, mcreds, creds)) ||
207 krb5_cc_retrieve_cred_seq(krb5_context context, krb5_ccache id, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds, int nktypes, krb5_enctype *ktypes) argument
218 krb5_creds creds; member in struct:__anon1026
286 krb5_cc_retrieve_cred_default(krb5_context context, krb5_ccache id, krb5_flags flags, krb5_creds *mcreds, krb5_creds *creds) argument
[all...]
H A Dccfns.c67 krb5_creds *creds)
74 krb5_cc_remove_cred(context, cache, KRB5_TC_MATCH_AUTHDATA, creds);
76 ret = cache->ops->store(context, cache, creds);
80 * If creds->server and the server in the decoded ticket differ,
83 s1 = creds->server;
84 ret = decode_krb5_ticket(&creds->ticket, &tkt);
89 creds->server = s2;
91 krb5_cc_remove_cred(context, cache, KRB5_TC_MATCH_AUTHDATA, creds);
92 ret = cache->ops->store(context, cache, creds);
93 creds
66 krb5_cc_store_cred(krb5_context context, krb5_ccache cache, krb5_creds *creds) argument
100 krb5_cc_retrieve_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *mcreds, krb5_creds *creds) argument
138 krb5_cc_next_cred(krb5_context context, krb5_ccache cache, krb5_cc_cursor *cursor, krb5_creds *creds) argument
152 krb5_cc_remove_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *creds) argument
[all...]
H A Dcc_memory.c63 krb5_creds *creds );
73 krb5_creds *creds );
79 (krb5_context, krb5_ccache id , krb5_creds *creds );
111 krb5_creds *creds; member in struct:_krb5_mcc_link
199 krb5_free_creds(context, curr->creds);
345 * cursor, creds
348 * Fills in creds with the "next" credentals structure from the cache
349 * id. The actual order the creds are returned in is arbitrary.
361 krb5_cc_cursor *cursor, krb5_creds *creds)
372 memset(creds,
360 krb5_mcc_next_cred(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument
593 krb5_mcc_retrieve(krb5_context context, krb5_ccache id, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds) argument
607 krb5_mcc_remove_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *creds) argument
650 krb5_mcc_store(krb5_context ctx, krb5_ccache id, krb5_creds *creds) argument
[all...]
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dmk_req.c61 krb5_creds creds; local
69 memset(&creds, 0, sizeof(creds));
70 if ((retval = krb5_copy_principal(context, server, &creds.server)))
73 if ((retval = krb5_cc_get_principal(context, ccache, &creds.client)))
77 ccache, &creds, &credsp)))
86 krb5_free_cred_contents(context, &creds);
H A Dsendauth.c56 krb5_creds creds; local
100 memset(&creds, 0, sizeof(creds));
113 &creds.server)))
117 &creds.client);
120 &creds.client);
122 krb5_free_principal(context, creds.server);
125 /* creds.times.endtime = 0; -- memset 0 takes care of this
127 /* creds.keyblock.enctype = 0; -- as well as this.
130 in_creds = &creds;
[all...]
H A Dfwd_tgt.c59 krb5_creds creds, tgt; local
68 memset(&creds, 0, sizeof(creds));
69 memset(&tgt, 0, sizeof(creds));
106 if ((retval = krb5_copy_principal(context, client, &creds.client)))
109 if ((retval = krb5_build_principal_ext(context, &creds.server,
122 &creds, &tgt);
127 /* tgt->client must be equal to creds.client */
128 if (!krb5_principal_compare(context, tgt.client, creds.client)) {
134 r_err = krb5_unparse_name(context, creds
[all...]
H A Dget_creds.c306 validate_or_renew_creds(krb5_context context, krb5_creds *creds, argument
364 *creds = *out_creds;
379 krb5_get_validated_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument
381 return(validate_or_renew_creds(context, creds, client, ccache,
386 krb5_get_renewed_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument
388 return(validate_or_renew_creds(context, creds, client, ccache,
H A Dgic_keytab.c99 krb5_creds *creds,
154 ret = krb5int_get_init_creds(context, creds, client, NULL, NULL,
178 ret2 = krb5int_get_init_creds(context, creds, client, NULL, NULL,
222 krb5_creds *creds, krb5_kdc_rep **ret_as_reply)
233 pre_auth_types, creds);
244 retval = krb5_unparse_name( context, creds->server, &server);
247 server_princ = creds->server;
248 client_princ = creds->client;
249 retval = krb5int_get_init_creds(context, creds, creds
98 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab arg_keytab, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument
218 krb5_get_in_tkt_with_keytab(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, krb5_keytab arg_keytab, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument
[all...]
H A Dvfy_increds.c16 krb5_creds *creds)
23 if (krb5int_libdefault_boolean(context, &creds->client->realm,
38 krb5_creds creds; local
49 while (!(code = krb5_cc_next_cred(context, incc, &cur, &creds))) {
50 if (krb5_principal_compare(context, princ, creds.server))
53 code = krb5_cc_store_cred(context, outcc, &creds);
54 krb5_free_cred_contents(context, &creds);
81 get_vfy_cred(krb5_context context, krb5_creds *creds, krb5_principal server, argument
94 /* If the creds are for the server principal, we're set, just do a mk_req.
98 if (krb5_principal_compare(context, server, creds
15 nofail(krb5_context context, krb5_verify_init_creds_opt *options, krb5_creds *creds) argument
298 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal server, krb5_keytab keytab, krb5_ccache *ccache, krb5_verify_init_creds_opt *options) argument
[all...]
H A Dgic_pwd.c133 krb5_creds *creds,
151 return (__krb5_get_init_creds_password(context, creds, client, password,
163 krb5_creds *creds,
213 ret = krb5int_get_init_creds(context, creds, client, prompter, data,
245 ret2 = krb5int_get_init_creds(context, creds, client, prompter, data,
382 ret = krb5int_get_init_creds(context, creds, client, prompter, data,
496 Attempts to get an initial ticket for creds->client to use server
497 creds->server, (realm is taken from creds->client), with options
498 options, and using creds
132 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument
162 __krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options, krb5_kdc_rep **ptr_as_reply) argument
515 krb5_get_in_tkt_with_password(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, const char *password, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument
[all...]
H A Dpreauth.c122 krb5_error_code krb5_obtain_padata(krb5_context context, krb5_pa_data **preauth_to_use, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request) argument
197 key_proc, key_seed, creds,
228 krb5_process_padata(krb5_context context, krb5_kdc_req *request, krb5_kdc_rep *as_reply, git_key_proc key_proc, krb5_const_pointer keyseed, git_decrypt_proc decrypt_proc, krb5_keyblock **decrypt_key, krb5_creds *creds, krb5_int32 *do_more) argument
248 decrypt_key, creds, do_more, &done);
265 obtain_enc_ts_padata(krb5_context context, krb5_pa_data *in_padata, krb5_etype_info etype_info, krb5_keyblock *def_enc_key, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request, krb5_pa_data **out_padata) argument
319 process_pw_salt(krb5_context context, krb5_pa_data *padata, krb5_kdc_req *request, krb5_kdc_rep *as_reply, git_key_proc key_proc, krb5_const_pointer keyseed, git_decrypt_proc decrypt_proc, krb5_keyblock **decrypt_key, krb5_creds *creds, krb5_int32 *do_more, krb5_int32 *done) argument
443 obtain_sam_padata(krb5_context context, krb5_pa_data *in_padata, krb5_etype_info etype_info, krb5_keyblock *def_enc_key, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request, krb5_pa_data **out_padata) argument
H A Dfast.c62 krb5_creds creds, *out_creds = NULL; local
68 memset(&creds, 0, sizeof(creds));
69 creds.server = target_principal;
70 retval = krb5_cc_get_principal(context, ccache, &creds.client);
72 retval = krb5_get_credentials(context, 0, ccache, &creds, &out_creds);
101 creds.server = NULL;
102 krb5_free_cred_contents(context, &creds);
H A Ds4u_creds.c66 krb5_creds creds; local
85 memset(&creds, 0, sizeof(creds));
113 code = krb5int_get_init_creds(context, &creds, client,
126 krb5_free_cred_contents(context, &creds);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dcopy_ccache.c12 krb5_creds creds; local
54 &creds)) {
55 code = krb5_cc_store_cred(context, out_ccache, &creds);
56 krb5_free_cred_contents(context, &creds);
H A Dacquire_cred_with_pw.c118 krb5_creds creds; local
143 (void) memset(&creds, 0, sizeof (creds));
146 &creds,
179 if ((code = krb5_cc_initialize(context, ccache2, creds.client)) != 0)
182 if ((code = krb5_cc_store_cred(context, ccache2, &creds)) != 0)
185 krb5_free_cred_contents(context, &creds);
H A Dacquire_cred.c254 krb5_creds creds; local
438 while (!(code = krb5_cc_next_cred(context, ccache, &cur, &creds))) {
439 if (krb5_principal_compare(context, tmp_princ, creds.server)) {
440 cred->tgt_expire = creds.times.endtime;
444 krb5_free_cred_contents(context, &creds);
448 cred->tgt_expire = creds.times.endtime;
451 krb5_free_cred_contents(context, &creds);
H A Daccept_sec_context.c168 /* Decode, decrypt and store the forwarded creds in the local ccache. */
176 krb5_creds ** creds = NULL; local
209 if (krb5_rd_cred(context, auth_context, inbuf, &creds, NULL)) {
240 &creds, NULL)))
249 if ((retval = krb5_cc_initialize(context, ccache, creds[0]->client)))
252 if ((retval = krb5_cc_store_cred(context, ccache, creds[0])))
276 kg_init_name(context, creds[0]->client, NULL, 0, &cred->name))) {
289 cred->tgt_expire = creds[0]->times.endtime; /* store the end time */
300 if (creds)
301 krb5_free_tgt_creds(context, creds);
[all...]
/osnet-11/usr/src/lib/libldap4/common/
H A Dsaslbind.c23 BerElement * ldap_build_sasl_bind_req( LDAP *ld, char *dn, char *mechanism, struct berval *creds, LDAPControl ** serverctrls) argument
57 if (creds != NULL && creds->bv_val != NULL) {
58 if (ber_printf(ber, "o", creds->bv_val, creds->bv_len) == -1){
/osnet-11/usr/src/lib/libgss/
H A Dg_acquire_cred_with_pw.c108 gss_union_cred_t creds; local
153 creds = (gss_union_cred_t)malloc(sizeof (gss_union_cred_desc));
154 if (creds == NULL)
158 (void) memset(creds, 0, sizeof (gss_union_cred_desc));
159 creds->loopback = creds;
164 (gss_cred_id_t)creds,
194 if (creds->count < 1) {
195 free(creds);
204 if ((*actual_mechs = create_actual_mechs(creds
[all...]
H A Dg_acquire_cred.c154 gss_union_cred_t creds; local
193 creds = (gss_union_cred_t)malloc(sizeof (gss_union_cred_desc));
194 if (creds == NULL)
198 (void) memset(creds, 0, sizeof (gss_union_cred_desc));
199 creds->loopback = creds;
203 major = gss_add_cred(minor_status, (gss_cred_id_t)creds,
232 if (creds->count < 1) {
233 free(creds);
242 if ((*actual_mechs = create_actual_mechs(creds
[all...]
/osnet-11/usr/src/lib/pam_modules/krb5/
H A Dkrb5_setcred.c368 krb5_creds creds; local
384 (void) memset(&creds, 0, sizeof (krb5_creds));
386 server, &creds.server))) {
397 kmd->ccache, &creds.client);
438 * If we only wanted to refresh the creds but failed
443 0, kmd->ccache, &creds, &renewed_cred)) {
459 "PAM-KRB5 (setcred): Cannot find creds"
590 krb5_free_cred_contents(kmd->kcontext, &creds);
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dchangepw.c217 krb5_creds *creds,
251 creds,
261 creds->server),
380 krb5_creds *creds,
386 return change_set_password(context, creds, newpw, NULL,
397 krb5_creds *creds,
405 return change_set_password(context, creds, newpw, change_password_for,
419 krb5_creds creds; local
424 ** get the proper creds for use with krb5_set_password -
426 memset (&creds,
216 change_set_password(krb5_context context, krb5_creds *creds, char *newpw, krb5_principal set_password_for, int *result_code, krb5_data *result_code_string, krb5_data *result_string) argument
379 krb5_change_password(krb5_context context, krb5_creds *creds, char *newpw, int *result_code, krb5_data *result_code_string, krb5_data *result_string) argument
396 krb5_set_password(krb5_context context, krb5_creds *creds, char *newpw, krb5_principal change_password_for, int *result_code, krb5_data *result_code_string, krb5_data *result_string ) argument
[all...]
/osnet-11/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.h68 pkinit_cred_info creds[MAX_CREDS_ALLOWED+1]; member in struct:_pkinit_identity_crypto_context
137 unsigned int index; /* Index of this cred in the creds[] array */
/osnet-11/usr/src/lib/rpcsec_gss/
H A Drpcsec_gss.c458 struct opaque_auth creds; local
483 creds.oa_flavor = RPCSEC_GSS;
484 creds.oa_base = cred_buf;
485 creds.oa_length = xdr_getpos(&cred_xdrs);
488 if (!xdr_opaque_auth(xdrs, &creds))
755 * Non-default creds need to be released by user.

Completed in 100 milliseconds

12