| /illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/ |
| H A D | copy_ccache.c | 16 krb5_creds creds; local 52 while (!code && !krb5_cc_next_cred(context, k5creds->ccache, &cursor, &creds)) 53 code = krb5_cc_store_cred(context, out_ccache, &creds);
|
| H A D | acquire_cred_with_pw.c | 122 krb5_creds creds; local 147 (void) memset(&creds, 0, sizeof (creds)); 149 code = krb5_get_init_creds_password(context, &creds, desired_name, pw, 180 if ((code = krb5_cc_initialize(context, ccache2, creds.client)) != 0) 183 if ((code = krb5_cc_store_cred(context, ccache2, &creds)) != 0) 186 krb5_free_cred_contents(context, &creds);
|
| H A D | acquire_cred.c | 246 krb5_creds creds; local 399 while (!(code = krb5_cc_next_cred(context, ccache, &cur, &creds))) { 400 if (krb5_principal_compare(context, tmp_princ, creds.server)) { 401 cred->tgt_expire = creds.times.endtime; 405 krb5_free_cred_contents(context, &creds); 409 cred->tgt_expire = creds.times.endtime; 412 krb5_free_cred_contents(context, &creds);
|
| H A D | accept_sec_context.c | 92 * Decode, decrypt and store the forwarded creds in the local ccache. 103 krb5_creds ** creds = NULL; local 140 if ((retval = krb5_rd_cred(context, auth_context, inbuf, &creds, NULL))) { 166 &creds, NULL))) { 179 if ((retval = krb5_cc_initialize(context, ccache, creds[0]->client))) { 186 if ((retval = krb5_cc_store_cred(context, ccache, creds[0]))) { 216 krb5_copy_principal(context, creds[0]->client, &(cred->princ)))) { 232 cred->tgt_expire = creds[0]->times.endtime; /* store the end time */ 243 if (creds) 244 krb5_free_tgt_creds(context, creds); [all...] |
| /illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
| H A D | cccopy.c | 11 krb5_creds creds; local 27 while (!(code = krb5_cc_next_cred(context, incc, &cur, &creds))) { 28 code = krb5_cc_store_cred(context, outcc, &creds); 29 krb5_free_cred_contents(context, &creds);
|
| H A D | ccfns.c | 66 krb5_creds *creds) 72 ret = cache->ops->store(context, cache, creds); 76 * If creds->server and the server in the decoded ticket differ, 79 s1 = creds->server; 80 ret = decode_krb5_ticket(&creds->ticket, &tkt); 85 creds->server = s2; 86 ret = cache->ops->store(context, cache, creds); 87 creds->server = s1; 96 krb5_creds *creds) 101 ret = cache->ops->retrieve(context, cache, flags, mcreds, creds); 65 krb5_cc_store_cred(krb5_context context, krb5_ccache cache, krb5_creds *creds) argument 94 krb5_cc_retrieve_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *mcreds, krb5_creds *creds) argument 132 krb5_cc_next_cred(krb5_context context, krb5_ccache cache, krb5_cc_cursor *cursor, krb5_creds *creds) argument 146 krb5_cc_remove_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *creds) argument [all...] |
| H A D | cc_retr.c | 60 standard_fields_match(krb5_context context, const krb5_creds *mcreds, const krb5_creds *creds) argument 62 return (krb5_principal_compare(context, mcreds->client,creds->client) 63 && krb5_principal_compare(context, mcreds->server,creds->server)); 69 srvname_match(krb5_context context, const krb5_creds *mcreds, const krb5_creds *creds) argument 74 retval = krb5_principal_compare(context, mcreds->client,creds->client); 81 p2 = *creds->server; 145 * returned in creds, which should be freed by the caller with 153 * requires only the set bits in mcreds be set in creds; 169 krb5int_cc_creds_match_request(krb5_context context, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds) argument 172 srvname_match(context, mcreds, creds)) || 203 krb5_cc_retrieve_cred_seq(krb5_context context, krb5_ccache id, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds, int nktypes, krb5_enctype *ktypes) argument 214 krb5_creds creds; member in struct:__anon2528 282 krb5_cc_retrieve_cred_default(krb5_context context, krb5_ccache id, krb5_flags flags, krb5_creds *mcreds, krb5_creds *creds) argument [all...] |
| H A D | cc_memory.c | 63 krb5_creds *creds ); 73 krb5_creds *creds ); 79 (krb5_context, krb5_ccache id , krb5_creds *creds ); 104 krb5_creds *creds; member in struct:_krb5_mcc_link 176 krb5_free_creds(context, curr->creds); 321 * cursor, creds 324 * Fills in creds with the "next" credentals structure from the cache 325 * id. The actual order the creds are returned in is arbitrary. 337 krb5_cc_cursor *cursor, krb5_creds *creds) 349 memset(creds, 336 krb5_mcc_next_cred(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument 610 krb5_mcc_retrieve(krb5_context context, krb5_ccache id, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds) argument 624 krb5_mcc_remove_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *creds) argument 657 krb5_mcc_store(krb5_context ctx, krb5_ccache id, krb5_creds *creds) argument [all...] |
| /illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/ |
| H A D | mk_req.c | 66 krb5_creds creds; local 74 memset((char *)&creds, 0, sizeof(creds)); 75 if ((retval = krb5_copy_principal(context, server, &creds.server))) 79 if ((retval = krb5_cc_get_principal(context, ccache, &creds.client)) != 0) 84 ccache, &creds, &credsp)) != 0) 93 krb5_free_cred_contents(context, &creds);
|
| H A D | sendauth.c | 50 krb5_creds creds; local 96 memset((char *)&creds, 0, sizeof(creds)); 110 &creds.server))) 114 &creds.client); 117 &creds.client); 119 krb5_free_principal(context, creds.server); 122 /* creds.times.endtime = 0; -- memset 0 takes care of this 124 /* creds.keyblock.enctype = 0; -- as well as this. 127 in_creds = &creds; [all...] |
| H A D | vfy_increds.c | 18 krb5_creds creds; local 33 while ((code = krb5_cc_next_cred(context, incc, &cur, &creds)) == NULL) { 34 if (krb5_principal_compare(context, princ, creds.server)) 37 code = krb5_cc_store_cred(context, outcc, &creds); 38 krb5_free_cred_contents(context, &creds); 68 krb5_creds *creds, 134 (void) krb5_libdefault_boolean(context, &creds->client->realm, 147 /* If the creds are for the server principal, we're set, just do 150 if (krb5_principal_compare(context, server, creds->server)) { 152 if ((ret = krb5_mk_req_extended(context, &authcon, 0, NULL, creds, 67 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal server_arg, krb5_keytab keytab_arg, krb5_ccache *ccache_arg, krb5_verify_init_creds_opt *options) argument [all...] |
| H A D | fwd_tgt.c | 55 krb5_creds creds, tgt; local 64 memset((char *)&creds, 0, sizeof(creds)); 65 memset((char *)&tgt, 0, sizeof(creds)); 102 if ((retval = krb5_copy_principal(context, client, &creds.client))) 105 if ((retval = krb5_build_principal_ext(context, &creds.server, 118 &creds, &tgt); 123 /* tgt->client must be equal to creds.client */ 124 if (!krb5_principal_compare(context, tgt.client, creds.client)) { 130 r_err = krb5_unparse_name(context, creds [all...] |
| H A D | get_creds.c | 71 * expired creds. If endtime is set to 0 (which it almost always 77 * is 0, so that krb5_cc_retrieve_cred fails and we get fresh creds, 288 krb5_validate_or_renew_creds(krb5_context context, krb5_creds *creds, argument 346 *creds = *out_creds; 361 krb5_get_validated_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument 363 return(krb5_validate_or_renew_creds(context, creds, client, ccache, 368 krb5_get_renewed_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument 370 return(krb5_validate_or_renew_creds(context, creds, client, ccache,
|
| H A D | gic_keytab.c | 92 krb5_creds *creds, 153 ret = krb5_get_init_creds(context, creds, client, NULL, NULL, 174 ret2 = krb5_get_init_creds(context, creds, client, NULL, NULL, 211 krb5_creds *creds, krb5_kdc_rep **ret_as_reply) 222 pre_auth_types, creds); 233 retval = krb5_unparse_name( context, creds->server, &server); 236 server_princ = creds->server; 237 client_princ = creds->client; 239 creds, creds 91 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab arg_keytab, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument 207 krb5_get_in_tkt_with_keytab(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, krb5_keytab arg_keytab, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument [all...] |
| H A D | gic_pwd.c | 124 krb5_creds *creds, 142 return (__krb5_get_init_creds_password(context, creds, client, password, 154 krb5_creds *creds, 209 ret = krb5_get_init_creds(context, creds, client, prompter, data, 240 ret2 = krb5_get_init_creds(context, creds, client, prompter, data, 411 ret = krb5_get_init_creds(context, creds, client, prompter, data, 518 krb5_preauthtype *pre_auth_types, krb5_creds *creds) 544 if (creds && creds->times.endtime) { 546 if (creds 123 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument 152 __krb5_get_init_creds_password( krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options, krb5_kdc_rep **ptr_as_reply) argument 515 krb5int_populate_gic_opt( krb5_context context, krb5_gic_opt_ext **opte, krb5_flags options, krb5_address * const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, krb5_creds *creds) argument 574 krb5_get_in_tkt_with_password(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, const char *password, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument [all...] |
| H A D | preauth.c | 134 krb5_error_code krb5_obtain_padata(krb5_context context, krb5_pa_data **preauth_to_use, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request) argument 209 key_proc, key_seed, creds, 240 krb5_process_padata(krb5_context context, krb5_kdc_req *request, krb5_kdc_rep *as_reply, git_key_proc key_proc, krb5_const_pointer keyseed, git_decrypt_proc decrypt_proc, krb5_keyblock **decrypt_key, krb5_creds *creds, krb5_int32 *do_more) argument 260 decrypt_key, creds, do_more, &done); 277 obtain_enc_ts_padata(krb5_context context, krb5_pa_data *in_padata, krb5_etype_info etype_info, krb5_keyblock *def_enc_key, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request, krb5_pa_data **out_padata) argument 331 process_pw_salt(krb5_context context, krb5_pa_data *padata, krb5_kdc_req *request, krb5_kdc_rep *as_reply, git_key_proc key_proc, krb5_const_pointer keyseed, git_decrypt_proc decrypt_proc, krb5_keyblock **decrypt_key, krb5_creds *creds, krb5_int32 *do_more, krb5_int32 *done) argument 462 obtain_sam_padata(krb5_context context, krb5_pa_data *in_padata, krb5_etype_info etype_info, krb5_keyblock *def_enc_key, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request, krb5_pa_data **out_padata) argument
|
| /illumos-gate/usr/src/cmd/cmd-inet/common/ |
| H A D | store_forw_creds.c | 40 * Store the forwarded creds in the user's local ccache and register 45 krb5_creds **creds, 80 if ((retval = krb5_cc_store_cred(context, *ccache, *creds)) != 0) { 90 if ((retval = krb5_unparse_name(context, (*creds)->client, 94 if (kwarn_add_warning(client_name, (*creds)->times.endtime) != 0) { 44 store_forw_creds(krb5_context context, krb5_creds **creds, krb5_ticket *ticket, char *lusername, krb5_ccache *ccache) argument
|
| /illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/ |
| H A D | ksslutil.c | 107 KMF_CREDENTIAL creds; local 124 creds.cred = password_buf; 125 creds.credlen = strlen(password_buf); 127 rv = kmf_import_objects(kmfh, (char *)filename, &creds, &tcerts,
|
| /illumos-gate/usr/src/lib/libgss/ |
| H A D | g_acquire_cred_with_pw.c | 111 gss_union_cred_t creds; local 156 creds = (gss_union_cred_t)malloc(sizeof (gss_union_cred_desc)); 157 if (creds == NULL) 161 (void) memset(creds, 0, sizeof (gss_union_cred_desc)); 166 (gss_cred_id_t)creds, 196 if (creds->count < 1) { 197 free(creds); 206 if ((*actual_mechs = create_actual_mechs(creds->mechs_array, 207 creds->count)) == NULL) { 209 (gss_cred_id_t *)&creds); [all...] |
| H A D | g_acquire_cred.c | 154 gss_union_cred_t creds; local 193 creds = (gss_union_cred_t)malloc(sizeof (gss_union_cred_desc)); 194 if (creds == NULL) 198 (void) memset(creds, 0, sizeof (gss_union_cred_desc)); 202 major = gss_add_cred(minor_status, (gss_cred_id_t)creds, 231 if (creds->count < 1) { 232 free(creds); 241 if ((*actual_mechs = create_actual_mechs(creds->mechs_array, 242 creds->count)) == NULL) { 244 (gss_cred_id_t *)&creds); [all...] |
| /illumos-gate/usr/src/lib/pam_modules/krb5/ |
| H A D | krb5_setcred.c | 368 krb5_creds creds; local 384 (void) memset(&creds, 0, sizeof (krb5_creds)); 386 server, &creds.server))) { 397 kmd->ccache, &creds.client); 438 * If we only wanted to refresh the creds but failed 443 0, kmd->ccache, &creds, &renewed_cred)) { 459 "PAM-KRB5 (setcred): Cannot find creds" 590 krb5_free_cred_contents(kmd->kcontext, &creds);
|
| /illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/ |
| H A D | changepw.c | 193 krb5_change_set_password(krb5_context context, krb5_creds *creds, char *newpw, argument 224 creds, 231 creds->server), 338 krb5_change_password(krb5_context context, krb5_creds *creds, char *newpw, int *result_code, krb5_data *result_code_string, krb5_data *result_string) argument 341 context, creds, newpw, NULL, result_code, result_code_string, result_string ); 352 krb5_creds *creds, 359 context, creds, newpw, change_password_for, result_code, result_code_string, result_string ); 371 krb5_creds creds; local 376 ** get the proper creds for use with krb5_set_password - 378 memset (&creds, 350 krb5_set_password( krb5_context context, krb5_creds *creds, char *newpw, krb5_principal change_password_for, int *result_code, krb5_data *result_code_string, krb5_data *result_string ) argument [all...] |
| /illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/ |
| H A D | kerberos5.c | 200 krb5_creds creds; /* telnet gets session key from here */ local 225 (void) memset((char *)&creds, 0, sizeof (creds)); 229 "host", KRB5_NT_SRV_HST, &creds.server))) { 250 krb5_princ_set_realm(telnet_context, creds.server, &rdata); 258 &creds.client)) != NULL) { 264 krb5_free_cred_contents(telnet_context, &creds); 273 if ((retval = krb5_get_tgs_ktypes(telnet_context, creds.server, 282 krb5_free_cred_contents(telnet_context, &creds); 300 krb5_free_cred_contents(telnet_context, &creds); [all...] |
| /illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/ |
| H A D | pkinit_crypto_openssl.h | 68 pkinit_cred_info creds[MAX_CREDS_ALLOWED+1]; member in struct:_pkinit_identity_crypto_context 137 unsigned int index; /* Index of this cred in the creds[] array */
|
| /illumos-gate/usr/src/lib/rpcsec_gss/ |
| H A D | rpcsec_gss.c | 458 struct opaque_auth creds; local 483 creds.oa_flavor = RPCSEC_GSS; 484 creds.oa_base = cred_buf; 485 creds.oa_length = xdr_getpos(&cred_xdrs); 488 if (!xdr_opaque_auth(xdrs, &creds)) 755 * Non-default creds need to be released by user.
|