/osnet-11/usr/src/lib/gss_mechs/mech_krb5/mech/ |
H A D | rel_cred.c | 35 krb5_gss_cred_id_t cred; local 56 cred = (krb5_gss_cred_id_t)*cred_handle; 58 k5_mutex_destroy(&cred->lock); 61 if (cred->ccache) { 71 if (strcmp("MEMORY", krb5_cc_get_type(context, cred->ccache)) == 0) 72 code1 = krb5_cc_destroy(context, cred->ccache); 74 code1 = krb5_cc_close(context, cred->ccache); 79 if (cred->keytab) 80 code2 = krb5_kt_close(context, cred->keytab); 85 if (cred [all...] |
H A D | acquire_cred_with_pw.c | 93 acquire_accept_cred_with_pw(context, minor_status, desired_name, password, cred) 98 krb5_gss_cred_id_rec *cred; 108 acquire_init_cred_with_pw(context, minor_status, desired_name, password, cred) 113 krb5_gss_cred_id_rec *cred; 121 cred->ccache = NULL; 187 cred->ccache = ccache2; 223 krb5_gss_cred_id_t cred; local 290 /* create the gss cred structure */ 291 if ((cred = (krb5_gss_cred_id_t) 297 memset(cred, [all...] |
H A D | inq_cred.c | 88 krb5_gss_cred_id_t cred; local 113 if ((major = kg_get_defcred(minor_status, (gss_cred_id_t *)&cred)) && 126 cred = (krb5_gss_cred_id_t) cred_handle; 135 code = k5_mutex_lock(&cred->lock); 141 if (cred->tgt_expire > 0) { 142 if ((lifetime = cred->tgt_expire - now) < 0) 149 if (cred->name && 150 (code = kg_duplicate_name(context, cred->name, 152 k5_mutex_unlock(&cred->lock); 164 (cred 232 krb5_gss_cred_id_t cred; local [all...] |
H A D | utl_nohash_validate.c | 50 int g_save_cred_id(vdb, cred) 52 gss_cred_id_t *cred; 77 int g_validate_cred_id(vdb, cred) 79 gss_cred_id_t *cred; 104 int g_delete_cred_id(vdb, cred) 106 gss_cred_id_t *cred;
|
H A D | set_allowable_enctypes.c | 71 krb5_gss_cred_id_t cred; local 83 /* verify and valildate cred handle */ 93 cred = (krb5_gss_cred_id_t) cred_handle; 103 kerr = k5_mutex_lock(&cred->lock); 106 if (cred->req_enctypes) 107 free(cred->req_enctypes); 108 cred->req_enctypes = NULL; 109 k5_mutex_unlock(&cred->lock); 113 /* Copy the requested ktypes into the cred structure */ 122 kerr = k5_mutex_lock(&cred [all...] |
H A D | s4u_gss_glue.c | 36 krb5_gss_cred_id_t cred) 41 cred->prerfc_mech = 1; 42 cred->rfc_mech = 1; 44 cred->prerfc_mech = 0; 45 cred->rfc_mech = 0; 49 cred->prerfc_mech = 1; 51 cred->rfc_mech = 1; 54 if (!cred->prerfc_mech && !cred->rfc_mech) { 65 krb5_gss_cred_id_t cred, 34 kg_set_desired_mechs(OM_uint32 *minor_status, const gss_OID_set desired_mechs, krb5_gss_cred_id_t cred) argument 64 kg_return_mechs(OM_uint32 *minor_status, krb5_gss_cred_id_t cred, gss_OID_set *actual_mechs) argument 103 kg_is_initiator_cred(krb5_gss_cred_id_t cred) argument 193 krb5_gss_cred_id_t cred; local 262 krb5_gss_cred_id_t cred = NULL; local [all...] |
H A D | acquire_cred.c | 143 If successful, set the keytab-specific fields in cred 151 krb5_gss_cred_id_rec *cred) 159 cred->keytab = NULL; 220 &cred->rcache))) { 229 cred->keytab = kt; 239 If successful, set the ccache-specific fields in cred. 247 krb5_gss_cred_id_rec *cred) 258 cred->ccache = NULL; 440 cred->tgt_expire = creds.times.endtime; 448 cred 147 acquire_accept_cred(krb5_context context, OM_uint32 *minor_status, krb5_gss_name_t desired_name, krb5_gss_name_t *output_name, krb5_gss_cred_id_rec *cred) argument 243 acquire_init_cred(krb5_context context, OM_uint32 *minor_status, krb5_gss_name_t desired_name, krb5_gss_name_t *output_name, krb5_gss_cred_id_rec *cred) argument 511 krb5_gss_cred_id_t cred; local 783 krb5_gss_cred_id_t cred; local [all...] |
H A D | add_cred.c | 88 krb5_gss_cred_id_t cred; local 135 cred = (krb5_gss_cred_id_t) input_cred_handle; 136 k5_mutex_assert_locked(&cred->lock); 138 /* check if the cred_usage is equal or "less" than the passed-in cred 141 if (!((cred->usage == cred_usage) || 142 ((cred->usage == GSS_C_BOTH) && 151 if ((g_OID_equal(desired_mech, gss_mech_krb5_old) && cred->prerfc_mech) || 152 (g_OID_equal(desired_mech, gss_mech_krb5) && cred->rfc_mech)) { 177 !kg_compare_name(context, (krb5_gss_name_t)desired_name, cred->name)) { 182 int kret1 = krb5_unparse_name(context, cred [all...] |
H A D | init_sec_context.c | 135 static krb5_error_code get_credentials(context, cred, server, now, 138 krb5_gss_cred_id_t cred; 149 k5_mutex_assert_locked(&cred->lock); 154 assert(cred->name != NULL); 156 if ((code = krb5_cc_get_principal(context, cred->ccache, &cc_princ))) 164 if (cred->proxy_cred && 175 mcreds.times.endtime = cred->tgt_expire; 177 mcreds.client = cred->name->princ; 179 code = krb5_cc_retrieve_cred(context, cred->ccache, 191 in_creds.client = cred 246 krb5_gss_cred_id_t cred; member in struct:gss_checksum_data 476 kg_new_connection( OM_uint32 *minor_status, krb5_gss_cred_id_t cred, gss_ctx_id_t *context_handle, gss_name_t target_name, gss_OID mech_type, OM_uint32 req_flags, OM_uint32 time_req, gss_channel_bindings_t input_chan_bindings, gss_buffer_t input_token, gss_OID *actual_mech_type, gss_buffer_t output_token, OM_uint32 *ret_flags, OM_uint32 *time_rec, krb5_context context, int default_mech) argument 934 krb5_gss_cred_id_t cred; local 1471 krb5_gss_cred_id_t cred; local [all...] |
H A D | store_cred.c | 42 store_init_cred(ct, minor_status, cred, dflt) 45 const krb5_gss_cred_id_t cred; 67 * client principals other than the given cred's 69 * c) copy the given cred's tickets to that same tmp ccache 71 * princ as before (!dflt) or with the input cred's princ as the 75 * (dflt), and copy the input cred's tickets to it. 90 cred->name->princ))) { 101 if ((code = krb5_cc_copy_creds(ct, cred->ccache, ccache))) { 132 krb5_gss_cred_id_t cred = (krb5_gss_cred_id_t)input_cred; local 135 OM_uint32 in_time_rec; /* lifetime of input cred */ [all...] |
H A D | accept_sec_context.c | 179 krb5_gss_cred_id_t cred = NULL; local 258 if (!(cred = 265 memset(cred, 0, sizeof(krb5_gss_cred_id_rec)); 267 retval = k5_mutex_init(&cred->lock); 269 xfree(cred); 270 cred = NULL; 276 kg_init_name(context, creds[0]->client, NULL, 0, &cred->name))) { 277 k5_mutex_destroy(&cred->lock); 279 xfree(cred); /* clean up memory on failure */ 280 cred 441 krb5_gss_cred_id_t cred = 0; local [all...] |
/osnet-11/usr/src/lib/libnsl/rpc/ |
H A D | authdes_prot.c | 50 xdr_authdes_cred(XDR *xdrs, struct authdes_cred *cred) argument 55 if (!xdr_enum(xdrs, (enum_t *)&cred->adc_namekind)) 57 switch (cred->adc_namekind) { 59 if (!xdr_string(xdrs, &cred->adc_fullname.name, 62 if (!xdr_opaque(xdrs, (caddr_t)&cred->adc_fullname.key, 65 return (xdr_opaque(xdrs, (caddr_t)&cred->adc_fullname.window, 66 (uint_t)sizeof (cred->adc_fullname.window))); 68 return (xdr_opaque(xdrs, (caddr_t)&cred->adc_nickname, 69 (uint_t)sizeof (cred->adc_nickname)));
|
H A D | svcauth_des.c | 123 struct authdes_cred *cred; local 153 cred = (struct authdes_cred *)&area->area_cred; 162 cred->adc_namekind = IXDR_GET_ENUM(ixdr, enum authdes_namekind); 163 switch (cred->adc_namekind) { 168 cred->adc_fullname.name = area->area_netname; 169 (void) memcpy(cred->adc_fullname.name, ixdr, (uint_t)namelen); 170 cred->adc_fullname.name[namelen] = 0; 172 cred->adc_fullname.key.key.high = (uint32_t)*ixdr++; 173 cred->adc_fullname.key.key.low = (uint32_t)*ixdr++; 174 cred 612 invalidate(char *cred) argument 635 struct bsdcred *cred; local [all...] |
/osnet-11/usr/src/lib/libfru/libfruraw/ |
H A D | fru_access.h | 82 int fru_get_num_sections(container_hdl_t container, door_cred_t *cred); 84 int max_sections, door_cred_t *cred); 89 section_hdl_t *newsection, door_cred_t *cred); 91 door_cred_t *cred); 93 door_cred_t *cred); 95 segment_hdl_t *newsegment, door_cred_t *cred); 96 int fru_get_num_packets(segment_hdl_t segment, door_cred_t *cred); 98 int max_packets, door_cred_t *cred); 100 size_t nbytes, door_cred_t *cred); 102 packet_hdl_t *newpacket, door_cred_t *cred); [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_dh/backend/mech/ |
H A D | validate.c | 74 * __dh_validate_cred: Check the cred database if the supplied crediential 80 __dh_validate_cred(dh_cred_id_t cred) argument 86 * __dh_install_cred: Installed the cred into the credential database 91 __dh_install_cred(dh_cred_id_t cred) argument 97 * __dh_remove_cred: Remove the supplied cred from the database. 102 __dh_remove_cred(dh_cred_id_t cred) argument
|
H A D | cred.c | 53 gss_cred_id_t *cred, /* The return credential */ 61 if (minor == 0 || cred == 0) 70 *cred = GSS_C_NO_CREDENTIAL; 133 /* Return the Diffie-Hellman credential through cred */ 134 *cred = (gss_cred_id_t)dh_cred; 165 gss_cred_id_t cred, /* cred of interest */ 171 /* cred is a Diffie-Hellman credential */ 172 dh_cred_id_t crid = (dh_cred_id_t)cred; 181 if (cred 47 __dh_gss_acquire_cred( OM_uint32 *minor, gss_name_t principal, OM_uint32 expire_req, gss_OID_set desired_mechs, gss_cred_usage_t usage, gss_cred_id_t *cred, gss_OID_set *mechs, OM_uint32 *expire_rec ) argument 163 __dh_gss_inquire_cred( OM_uint32 *minor, gss_cred_id_t cred, gss_name_t *name, OM_uint32 *lifetime, gss_cred_usage_t *usage, gss_OID_set *mechs ) argument 232 __dh_gss_inquire_cred_by_mech( OM_uint32 *minor, gss_cred_id_t cred, gss_OID mech, gss_name_t *name, OM_uint32 *init_time, OM_uint32 *accept_time, gss_cred_usage_t *usage ) argument [all...] |
/osnet-11/usr/src/lib/libsldap/common/ |
H A D | llib-lsldap | 46 const ns_cred_t *cred, 60 const ns_cred_t *cred, 71 const ns_cred_t *cred, 79 const ns_cred_t *cred, 87 const ns_cred_t *cred, 95 const ns_cred_t *cred, 104 const ns_cred_t *cred, 111 const ns_cred_t *cred, 122 const ns_cred_t *cred, 150 const ns_cred_t *cred, [all...] |
H A D | ns_sldap.h | 195 } cred; member in struct:ns_cred 606 char *cred; /* A credential level to be used */ member in struct:ns_dir_server 630 #define SA_CRED ds_profile.server.cred 664 * cred 680 const ns_cred_t *cred, 752 const ns_cred_t *cred, 765 const ns_cred_t *cred, 782 const ns_cred_t *cred, 799 const ns_cred_t *cred, 817 const ns_cred_t *cred, [all...] |
/osnet-11/usr/src/lib/gss_mechs/mech_krb5/krb5/ccache/ |
H A D | ccfns.c | 201 const char *name, krb5_creds *cred) 207 memset(cred, 0, sizeof(*cred)); 219 ret = krb5_build_principal(context, &cred->server, 227 ret = krb5_copy_principal(context, client, &cred->client); 282 krb5_creds cred; local 283 memset(&cred, 0, sizeof(cred)); 285 ret = build_conf_principals(context, id, principal, key, &cred); 289 ret = krb5_cc_remove_cred(context, id, 0, &cred); 199 build_conf_principals(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_creds *cred) argument 325 krb5_creds mcred, cred; local [all...] |
/osnet-11/usr/src/lib/libldap5/sources/ldap/common/ |
H A D | saslbind.c | 50 const struct berval *cred, 102 cred, LDAP_AUTH_SASL )) != 0 ) { 120 if ( cred == NULL ) { 123 cred = &tmpcred; 126 ldapversion, dn, LDAP_AUTH_SIMPLE, cred->bv_val, 127 (int)cred->bv_len /* XXX lossy cast */ ); 130 if ( cred == NULL ) { 137 mechanism, cred->bv_val, 138 (int)cred->bv_len /* XXX lossy cast */ ); 179 const struct berval *cred, 46 ldap_sasl_bind( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp ) argument 175 ldap_sasl_bind_s( LDAP *ld, const char *dn, const char *mechanism, const struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp ) argument [all...] |
H A D | cram_md5.c | 67 struct berval *cred, 94 (unsigned char *)cred->bv_val, cred->bv_len, digest); 64 ldap_sasl_cram_md5_bind_s( LDAP *ld, char *dn, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls ) argument
|
/osnet-11/usr/src/lib/libldap4/common/ |
H A D | kbind.c | 61 char *cred; local 91 if ( (cred = get_kerberosv4_credentials( ld, dn, "ldapserver", 101 free( cred ); 117 ld->ld_version, dn, LDAP_AUTH_KRBV41, cred, credlen ); 126 free( cred ); 135 free( cred ); 188 char *cred; local 205 if ( (cred = get_kerberosv4_credentials( ld, dn, "x500dsa", &credlen )) 215 free( cred ); 231 ld->ld_version, dn, LDAP_AUTH_KRBV42, cred, credle 309 char realm[REALM_SZ], *cred, *krbinstance; local [all...] |
H A D | saslbind.c | 97 * dn, mechanism, cred, serverctrls, and clientctrls are supplied. 106 struct berval *cred, 122 if ( (ber = ldap_build_simple_bind_req(ld, dn, cred->bv_val, serverctrls)) == NULLBER){ 132 if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_CRAM_MD5, cred, serverctrls)) == NULLBER) { 142 if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_EXTERNAL, cred, serverctrls)) == NULLBER) { 157 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) { 172 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) { 187 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) { 202 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrls)) == NULLBER) { 217 * if (( ber = ldap_build_sasl_bind_req(ld, dn, LDAP_SASL_X511_PROTECTED, cred, serverctrl 102 ldap_sasl_bind( LDAP *ld, char *dn, char *mechanism, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, int *msgidp) argument 265 ldap_sasl_bind_s( LDAP *ld, char *dn, char *mechanism, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls, struct berval **servercredp) argument 288 ldap_sasl_cram_md5_bind_s( LDAP *ld, char *dn, struct berval *cred, LDAPControl **serverctrls, LDAPControl **clientctrls ) argument [all...] |
/osnet-11/usr/src/lib/libproc/common/ |
H A D | proc_set.c | 34 * Convenience wrapper to set the cred attributes of a victim process 45 prcred_t cred; member in struct:__anon2369 56 (void) memcpy(&ctlp->cred, credp, ctlsize);
|
/osnet-11/usr/src/lib/libsmbfs/common/ |
H A D | smbfs_gss.c | 215 gss_cred_id_t *cred, gss_name_t *trgt_name, gss_OID *mech_oid, 222 if (*cred != GSS_C_NO_CREDENTIAL) 223 (void) gss_release_cred(min_stat, cred); 246 smbfs_gss_inquire_cred(gss_cred_id_t *cred) argument 253 maj_stat = gss_inquire_cred(&min_stat, *cred, &name, &lifetime, 342 smbfs_gss_acquire_cred(struct smb_ctx *ctx, gss_cred_id_t *cred) argument 358 GSS_C_NULL_OID_SET, GSS_C_INITIATE, cred, 370 GSS_C_NULL_OID_SET, GSS_C_INITIATE, cred, 385 if (smbfs_gss_inquire_cred(cred) != 0) { 406 gss_cred_id_t cred local 214 smbfs_gss_cleanup(OM_uint32 *min_stat, gss_ctx_id_t *context, gss_cred_id_t *cred, gss_name_t *trgt_name, gss_OID *mech_oid, gss_buffer_desc *input_tok, gss_buffer_desc *send_tok) argument [all...] |