/sssd/src/tests/cmocka/ |
H A D | common_mock_krb5.c | 28 int mock_keytab(krb5_context kctx, argument 37 kerr = krb5_kt_resolve(kctx, kt_path, &keytab); 41 kerr = krb5_kt_add_entry(kctx, keytab, &kt_keys[n]); 45 kerr = krb5_kt_close(kctx, keytab); 74 krb5_context kctx; local 81 kerr = krb5_init_context(&kctx); 87 kerr = krb5_parse_name(kctx, keytab_princ, &principal); 95 kerr = mock_keytab(kctx, keytab_file_name, keys, nkeys); 98 krb5_free_principal(kctx, principal); 99 krb5_free_context(kctx); [all...] |
H A D | test_copy_keytab.c | 37 krb5_context kctx; member in struct:keytab_test_ctx 56 kerr = krb5_init_context(&test_ctx->kctx); 61 kerr = krb5_parse_name(test_ctx->kctx, KEYTAB_TEST_PRINC, 72 kerr = mock_keytab(test_ctx->kctx, test_ctx->keytab_file_name, keys, nkeys); 87 krb5_free_principal(test_ctx->kctx, test_ctx->principal); 88 krb5_free_context(test_ctx->kctx); 114 kerr = copy_keytab_into_memory(test_ctx, test_ctx->kctx, 120 kerr = krb5_kt_resolve(test_ctx->kctx, mem_keytab_name, &keytab); 123 kerr = krb5_kt_get_entry(test_ctx->kctx, keytab, test_ctx->principal, 9, 9, 127 kerr = krb5_kt_get_entry(test_ctx->kctx, keyta [all...] |
H A D | test_copy_ccache.c | 36 krb5_context kctx; member in struct:ccache_test_ctx 63 kerr = krb5_init_context(&test_ctx->kctx); 73 kerr = krb5_parse_name(test_ctx->kctx, CCACHE_TEST_CLIENT_PRINC, 77 kerr = krb5_parse_name(test_ctx->kctx, CCACHE_TEST_SERVER_PRINC, 117 kerr = krb5_cc_resolve(test_ctx->kctx, test_ctx->ccache_file_name, 121 kerr = krb5_cc_initialize(test_ctx->kctx, ccache, test_creds.client); 124 kerr = krb5_cc_store_cred(test_ctx->kctx, ccache, &test_creds); 127 kerr = krb5_cc_close(test_ctx->kctx, ccache); 133 krb5_free_authdata(test_ctx->kctx, test_creds.authdata); 144 krb5_free_principal(test_ctx->kctx, test_ct [all...] |
H A D | common_mock_krb5.h | 37 int mock_keytab(krb5_context kctx,
|
/sssd/src/providers/krb5/ |
H A D | krb5_keytab.c | 29 static krb5_error_code do_keytab_copy(krb5_context kctx, krb5_keytab s_keytab, argument 38 kerr = krb5_kt_start_seq_get(kctx, s_keytab, &cursor); 45 while ((kt_err = krb5_kt_next_entry(kctx, s_keytab, &entry, 47 kerr = krb5_kt_add_entry(kctx, d_keytab, &entry); 50 kt_err = krb5_kt_end_seq_get(kctx, s_keytab, &cursor); 59 kerr = sss_krb5_free_keytab_entry_contents(kctx, &entry); 62 kt_err = krb5_kt_end_seq_get(kctx, s_keytab, &cursor); 73 kerr = krb5_kt_end_seq_get(kctx, s_keytab, &cursor); 88 krb5_error_code copy_keytab_into_memory(TALLOC_CTX *mem_ctx, krb5_context kctx, argument 106 kerr = krb5_kt_default_name(kctx, default_keytab_nam [all...] |
H A D | krb5_ccache.h | 42 errno_t sss_krb5_check_ccache_princ(krb5_context kctx, 61 * @param[in] kctx Kerberos context 70 krb5_error_code copy_ccache_into_memory(TALLOC_CTX *mem_ctx, krb5_context kctx,
|
H A D | krb5_ccache.c | 382 errno_t sss_krb5_check_ccache_princ(krb5_context kctx, argument 392 kerr = krb5_cc_resolve(kctx, ccname, &kcc); 398 cc_type = krb5_cc_get_type(kctx, kcc); 400 kerr = krb5_cc_get_principal(kctx, kcc, &ccprinc); 402 KRB5_DEBUG(SSSDBG_OP_FAILURE, kctx, kerr); 407 if (krb5_principal_compare(kctx, user_princ, ccprinc) == TRUE) { 416 if (krb5_cc_support_switch(kctx, cc_type)) { 418 krb5_cc_close(kctx, kcc); 421 kerr = krb5_cc_set_default_name(kctx, ccname); 423 KRB5_DEBUG(SSSDBG_MINOR_FAILURE, kctx, ker 681 copy_ccache_into_memory(TALLOC_CTX *mem_ctx, krb5_context kctx, const char *ccache_file, char **_mem_name) argument [all...] |
H A D | krb5_common.h | 201 * @param[in] kctx Kerberos context 221 krb5_error_code copy_keytab_into_memory(TALLOC_CTX *mem_ctx, krb5_context kctx,
|
H A D | krb5_child.c | 785 krb5_context kctx = NULL; local 800 kerr = krb5_init_context(&kctx); 812 kerr = krb5_cc_resolve(kctx, ccname, &kcc); 818 type = krb5_cc_get_type(kctx, kcc); 822 if (krb5_cc_support_switch(kctx, type)) { 824 kerr = krb5_cc_set_default_name(kctx, ccname); 831 kerr = krb5_cc_cache_match(kctx, creds->client, &cckcc); 834 kerr = krb5_cc_new_unique(kctx, type, NULL, &cckcc); 842 krb5_cc_close(kctx, kcc); 847 kerr = krb5_cc_initialize(kctx, kc [all...] |