Searched defs:creds (Results 1 - 25 of 40) sorted by relevance

12

/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/mech/
H A Dcopy_ccache.c16 krb5_creds creds; local
52 while (!code && !krb5_cc_next_cred(context, k5creds->ccache, &cursor, &creds))
53 code = krb5_cc_store_cred(context, out_ccache, &creds);
H A Dacquire_cred_with_pw.c122 krb5_creds creds; local
147 (void) memset(&creds, 0, sizeof (creds));
149 code = krb5_get_init_creds_password(context, &creds, desired_name, pw,
180 if ((code = krb5_cc_initialize(context, ccache2, creds.client)) != 0)
183 if ((code = krb5_cc_store_cred(context, ccache2, &creds)) != 0)
186 krb5_free_cred_contents(context, &creds);
H A Dacquire_cred.c246 krb5_creds creds; local
399 while (!(code = krb5_cc_next_cred(context, ccache, &cur, &creds))) {
400 if (krb5_principal_compare(context, tmp_princ, creds.server)) {
401 cred->tgt_expire = creds.times.endtime;
405 krb5_free_cred_contents(context, &creds);
409 cred->tgt_expire = creds.times.endtime;
412 krb5_free_cred_contents(context, &creds);
H A Daccept_sec_context.c92 * Decode, decrypt and store the forwarded creds in the local ccache.
103 krb5_creds ** creds = NULL; local
140 if ((retval = krb5_rd_cred(context, auth_context, inbuf, &creds, NULL))) {
166 &creds, NULL))) {
179 if ((retval = krb5_cc_initialize(context, ccache, creds[0]->client))) {
186 if ((retval = krb5_cc_store_cred(context, ccache, creds[0]))) {
216 krb5_copy_principal(context, creds[0]->client, &(cred->princ)))) {
232 cred->tgt_expire = creds[0]->times.endtime; /* store the end time */
243 if (creds)
244 krb5_free_tgt_creds(context, creds);
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/
H A Dcccopy.c11 krb5_creds creds; local
27 while (!(code = krb5_cc_next_cred(context, incc, &cur, &creds))) {
28 code = krb5_cc_store_cred(context, outcc, &creds);
29 krb5_free_cred_contents(context, &creds);
H A Dccfns.c66 krb5_creds *creds)
72 ret = cache->ops->store(context, cache, creds);
76 * If creds->server and the server in the decoded ticket differ,
79 s1 = creds->server;
80 ret = decode_krb5_ticket(&creds->ticket, &tkt);
85 creds->server = s2;
86 ret = cache->ops->store(context, cache, creds);
87 creds->server = s1;
96 krb5_creds *creds)
101 ret = cache->ops->retrieve(context, cache, flags, mcreds, creds);
65 krb5_cc_store_cred(krb5_context context, krb5_ccache cache, krb5_creds *creds) argument
94 krb5_cc_retrieve_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *mcreds, krb5_creds *creds) argument
132 krb5_cc_next_cred(krb5_context context, krb5_ccache cache, krb5_cc_cursor *cursor, krb5_creds *creds) argument
146 krb5_cc_remove_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *creds) argument
[all...]
H A Dcc_retr.c60 standard_fields_match(krb5_context context, const krb5_creds *mcreds, const krb5_creds *creds) argument
62 return (krb5_principal_compare(context, mcreds->client,creds->client)
63 && krb5_principal_compare(context, mcreds->server,creds->server));
69 srvname_match(krb5_context context, const krb5_creds *mcreds, const krb5_creds *creds) argument
74 retval = krb5_principal_compare(context, mcreds->client,creds->client);
81 p2 = *creds->server;
145 * returned in creds, which should be freed by the caller with
153 * requires only the set bits in mcreds be set in creds;
169 krb5int_cc_creds_match_request(krb5_context context, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds) argument
172 srvname_match(context, mcreds, creds)) ||
203 krb5_cc_retrieve_cred_seq(krb5_context context, krb5_ccache id, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds, int nktypes, krb5_enctype *ktypes) argument
214 krb5_creds creds; member in struct:__anon2528
282 krb5_cc_retrieve_cred_default(krb5_context context, krb5_ccache id, krb5_flags flags, krb5_creds *mcreds, krb5_creds *creds) argument
[all...]
H A Dcc_memory.c63 krb5_creds *creds );
73 krb5_creds *creds );
79 (krb5_context, krb5_ccache id , krb5_creds *creds );
104 krb5_creds *creds; member in struct:_krb5_mcc_link
176 krb5_free_creds(context, curr->creds);
321 * cursor, creds
324 * Fills in creds with the "next" credentals structure from the cache
325 * id. The actual order the creds are returned in is arbitrary.
337 krb5_cc_cursor *cursor, krb5_creds *creds)
349 memset(creds,
336 krb5_mcc_next_cred(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument
610 krb5_mcc_retrieve(krb5_context context, krb5_ccache id, krb5_flags whichfields, krb5_creds *mcreds, krb5_creds *creds) argument
624 krb5_mcc_remove_cred(krb5_context context, krb5_ccache cache, krb5_flags flags, krb5_creds *creds) argument
657 krb5_mcc_store(krb5_context ctx, krb5_ccache id, krb5_creds *creds) argument
[all...]
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/krb/
H A Dmk_req.c66 krb5_creds creds; local
74 memset((char *)&creds, 0, sizeof(creds));
75 if ((retval = krb5_copy_principal(context, server, &creds.server)))
79 if ((retval = krb5_cc_get_principal(context, ccache, &creds.client)) != 0)
84 ccache, &creds, &credsp)) != 0)
93 krb5_free_cred_contents(context, &creds);
H A Dsendauth.c50 krb5_creds creds; local
96 memset((char *)&creds, 0, sizeof(creds));
110 &creds.server)))
114 &creds.client);
117 &creds.client);
119 krb5_free_principal(context, creds.server);
122 /* creds.times.endtime = 0; -- memset 0 takes care of this
124 /* creds.keyblock.enctype = 0; -- as well as this.
127 in_creds = &creds;
[all...]
H A Dvfy_increds.c18 krb5_creds creds; local
33 while ((code = krb5_cc_next_cred(context, incc, &cur, &creds)) == NULL) {
34 if (krb5_principal_compare(context, princ, creds.server))
37 code = krb5_cc_store_cred(context, outcc, &creds);
38 krb5_free_cred_contents(context, &creds);
68 krb5_creds *creds,
134 (void) krb5_libdefault_boolean(context, &creds->client->realm,
147 /* If the creds are for the server principal, we're set, just do
150 if (krb5_principal_compare(context, server, creds->server)) {
152 if ((ret = krb5_mk_req_extended(context, &authcon, 0, NULL, creds,
67 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal server_arg, krb5_keytab keytab_arg, krb5_ccache *ccache_arg, krb5_verify_init_creds_opt *options) argument
[all...]
H A Dfwd_tgt.c55 krb5_creds creds, tgt; local
64 memset((char *)&creds, 0, sizeof(creds));
65 memset((char *)&tgt, 0, sizeof(creds));
102 if ((retval = krb5_copy_principal(context, client, &creds.client)))
105 if ((retval = krb5_build_principal_ext(context, &creds.server,
118 &creds, &tgt);
123 /* tgt->client must be equal to creds.client */
124 if (!krb5_principal_compare(context, tgt.client, creds.client)) {
130 r_err = krb5_unparse_name(context, creds
[all...]
H A Dget_creds.c71 * expired creds. If endtime is set to 0 (which it almost always
77 * is 0, so that krb5_cc_retrieve_cred fails and we get fresh creds,
288 krb5_validate_or_renew_creds(krb5_context context, krb5_creds *creds, argument
346 *creds = *out_creds;
361 krb5_get_validated_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument
363 return(krb5_validate_or_renew_creds(context, creds, client, ccache,
368 krb5_get_renewed_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *in_tkt_service) argument
370 return(krb5_validate_or_renew_creds(context, creds, client, ccache,
H A Dgic_keytab.c92 krb5_creds *creds,
153 ret = krb5_get_init_creds(context, creds, client, NULL, NULL,
174 ret2 = krb5_get_init_creds(context, creds, client, NULL, NULL,
211 krb5_creds *creds, krb5_kdc_rep **ret_as_reply)
222 pre_auth_types, creds);
233 retval = krb5_unparse_name( context, creds->server, &server);
236 server_princ = creds->server;
237 client_princ = creds->client;
239 creds, creds
91 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab arg_keytab, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument
207 krb5_get_in_tkt_with_keytab(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, krb5_keytab arg_keytab, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument
[all...]
H A Dgic_pwd.c124 krb5_creds *creds,
142 return (__krb5_get_init_creds_password(context, creds, client, password,
154 krb5_creds *creds,
209 ret = krb5_get_init_creds(context, creds, client, prompter, data,
240 ret2 = krb5_get_init_creds(context, creds, client, prompter, data,
411 ret = krb5_get_init_creds(context, creds, client, prompter, data,
518 krb5_preauthtype *pre_auth_types, krb5_creds *creds)
544 if (creds && creds->times.endtime) {
546 if (creds
123 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options) argument
152 __krb5_get_init_creds_password( krb5_context context, krb5_creds *creds, krb5_principal client, char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, char *in_tkt_service, krb5_get_init_creds_opt *options, krb5_kdc_rep **ptr_as_reply) argument
515 krb5int_populate_gic_opt( krb5_context context, krb5_gic_opt_ext **opte, krb5_flags options, krb5_address * const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, krb5_creds *creds) argument
574 krb5_get_in_tkt_with_password(krb5_context context, krb5_flags options, krb5_address *const *addrs, krb5_enctype *ktypes, krb5_preauthtype *pre_auth_types, const char *password, krb5_ccache ccache, krb5_creds *creds, krb5_kdc_rep **ret_as_reply) argument
[all...]
H A Dpreauth.c134 krb5_error_code krb5_obtain_padata(krb5_context context, krb5_pa_data **preauth_to_use, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request) argument
209 key_proc, key_seed, creds,
240 krb5_process_padata(krb5_context context, krb5_kdc_req *request, krb5_kdc_rep *as_reply, git_key_proc key_proc, krb5_const_pointer keyseed, git_decrypt_proc decrypt_proc, krb5_keyblock **decrypt_key, krb5_creds *creds, krb5_int32 *do_more) argument
260 decrypt_key, creds, do_more, &done);
277 obtain_enc_ts_padata(krb5_context context, krb5_pa_data *in_padata, krb5_etype_info etype_info, krb5_keyblock *def_enc_key, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request, krb5_pa_data **out_padata) argument
331 process_pw_salt(krb5_context context, krb5_pa_data *padata, krb5_kdc_req *request, krb5_kdc_rep *as_reply, git_key_proc key_proc, krb5_const_pointer keyseed, git_decrypt_proc decrypt_proc, krb5_keyblock **decrypt_key, krb5_creds *creds, krb5_int32 *do_more, krb5_int32 *done) argument
462 obtain_sam_padata(krb5_context context, krb5_pa_data *in_padata, krb5_etype_info etype_info, krb5_keyblock *def_enc_key, git_key_proc key_proc, krb5_const_pointer key_seed, krb5_creds *creds, krb5_kdc_req *request, krb5_pa_data **out_padata) argument
/illumos-gate/usr/src/cmd/cmd-inet/common/
H A Dstore_forw_creds.c40 * Store the forwarded creds in the user's local ccache and register
45 krb5_creds **creds,
80 if ((retval = krb5_cc_store_cred(context, *ccache, *creds)) != 0) {
90 if ((retval = krb5_unparse_name(context, (*creds)->client,
94 if (kwarn_add_warning(client_name, (*creds)->times.endtime) != 0) {
44 store_forw_creds(krb5_context context, krb5_creds **creds, krb5_ticket *ticket, char *lusername, krb5_ccache *ccache) argument
/illumos-gate/usr/src/cmd/cmd-inet/usr.sbin/kssl/kssladm/
H A Dksslutil.c107 KMF_CREDENTIAL creds; local
124 creds.cred = password_buf;
125 creds.credlen = strlen(password_buf);
127 rv = kmf_import_objects(kmfh, (char *)filename, &creds, &tcerts,
/illumos-gate/usr/src/lib/libgss/
H A Dg_acquire_cred_with_pw.c111 gss_union_cred_t creds; local
156 creds = (gss_union_cred_t)malloc(sizeof (gss_union_cred_desc));
157 if (creds == NULL)
161 (void) memset(creds, 0, sizeof (gss_union_cred_desc));
166 (gss_cred_id_t)creds,
196 if (creds->count < 1) {
197 free(creds);
206 if ((*actual_mechs = create_actual_mechs(creds->mechs_array,
207 creds->count)) == NULL) {
209 (gss_cred_id_t *)&creds);
[all...]
H A Dg_acquire_cred.c154 gss_union_cred_t creds; local
193 creds = (gss_union_cred_t)malloc(sizeof (gss_union_cred_desc));
194 if (creds == NULL)
198 (void) memset(creds, 0, sizeof (gss_union_cred_desc));
202 major = gss_add_cred(minor_status, (gss_cred_id_t)creds,
231 if (creds->count < 1) {
232 free(creds);
241 if ((*actual_mechs = create_actual_mechs(creds->mechs_array,
242 creds->count)) == NULL) {
244 (gss_cred_id_t *)&creds);
[all...]
/illumos-gate/usr/src/lib/pam_modules/krb5/
H A Dkrb5_setcred.c368 krb5_creds creds; local
384 (void) memset(&creds, 0, sizeof (krb5_creds));
386 server, &creds.server))) {
397 kmd->ccache, &creds.client);
438 * If we only wanted to refresh the creds but failed
443 0, kmd->ccache, &creds, &renewed_cred)) {
459 "PAM-KRB5 (setcred): Cannot find creds"
590 krb5_free_cred_contents(kmd->kcontext, &creds);
/illumos-gate/usr/src/lib/gss_mechs/mech_krb5/krb5/os/
H A Dchangepw.c193 krb5_change_set_password(krb5_context context, krb5_creds *creds, char *newpw, argument
224 creds,
231 creds->server),
338 krb5_change_password(krb5_context context, krb5_creds *creds, char *newpw, int *result_code, krb5_data *result_code_string, krb5_data *result_string) argument
341 context, creds, newpw, NULL, result_code, result_code_string, result_string );
352 krb5_creds *creds,
359 context, creds, newpw, change_password_for, result_code, result_code_string, result_string );
371 krb5_creds creds; local
376 ** get the proper creds for use with krb5_set_password -
378 memset (&creds,
350 krb5_set_password( krb5_context context, krb5_creds *creds, char *newpw, krb5_principal change_password_for, int *result_code, krb5_data *result_code_string, krb5_data *result_string ) argument
[all...]
/illumos-gate/usr/src/cmd/cmd-inet/usr.bin/telnet/
H A Dkerberos5.c200 krb5_creds creds; /* telnet gets session key from here */ local
225 (void) memset((char *)&creds, 0, sizeof (creds));
229 "host", KRB5_NT_SRV_HST, &creds.server))) {
250 krb5_princ_set_realm(telnet_context, creds.server, &rdata);
258 &creds.client)) != NULL) {
264 krb5_free_cred_contents(telnet_context, &creds);
273 if ((retval = krb5_get_tgs_ktypes(telnet_context, creds.server,
282 krb5_free_cred_contents(telnet_context, &creds);
300 krb5_free_cred_contents(telnet_context, &creds);
[all...]
/illumos-gate/usr/src/lib/krb5/plugins/preauth/pkinit/
H A Dpkinit_crypto_openssl.h68 pkinit_cred_info creds[MAX_CREDS_ALLOWED+1]; member in struct:_pkinit_identity_crypto_context
137 unsigned int index; /* Index of this cred in the creds[] array */
/illumos-gate/usr/src/lib/rpcsec_gss/
H A Drpcsec_gss.c458 struct opaque_auth creds; local
483 creds.oa_flavor = RPCSEC_GSS;
484 creds.oa_base = cred_buf;
485 creds.oa_length = xdr_getpos(&cred_xdrs);
488 if (!xdr_opaque_auth(xdrs, &creds))
755 * Non-default creds need to be released by user.

Completed in 171 milliseconds

12