/freebsd-10.2-release/lib/libpam/modules/pam_ksu/ |
H A D | pam_ksu.c | 55 krb5_context context; local 71 rv = krb5_init_context(&context); 73 const char *msg = krb5_get_error_message(context, rv); 75 krb5_free_error_message(context, msg); 78 rv = get_su_principal(context, user, ruser, &su_principal_name, &su_principal); 82 rv = krb5_kuserok(context, su_principal, user); 83 pamret = rv ? auth_krb5(pamh, context, su_principal_name, su_principal) : PAM_AUTH_ERR; 85 krb5_free_principal(context, su_principal); 86 krb5_free_context(context); 100 * context 112 auth_krb5(pam_handle_t *pamh, krb5_context context, const char *su_principal_name, krb5_principal su_principal) argument 181 get_su_principal(krb5_context context, const char *target_user, const char *current_user, char **su_principal_name, krb5_principal *su_principal) argument [all...] |
/freebsd-10.2-release/crypto/heimdal/kdc/ |
H A D | misc.c | 39 _kdc_db_fetch(krb5_context context, argument 59 krb5_set_error_message(context, ENOMEM, "malloc: out of memory"); 69 krb5_set_error_message(context, ret, 76 ret = krb5_parse_name(context, principal->name.name_string.val[0], 86 ret = config->db[i]->hdb_open(context, config->db[i], O_RDONLY, 0); 88 const char *msg = krb5_get_error_message(context, ret); 89 kdc_log(context, config, 0, "Failed to open database: %s", msg); 90 krb5_free_error_message(context, msg); 94 ret = config->db[i]->hdb_fetch_kvno(context, 101 krb5_free_principal(context, enterprise_principa 118 _kdc_free_ent(krb5_context context, hdb_entry_ex *ent) argument 130 _kdc_get_preferred_key(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *h, const char *name, krb5_enctype *enctype, Key **key) argument [all...] |
H A D | krb5tgs.c | 60 find_KRB5SignedPath(krb5_context context, argument 81 krb5_set_error_message(context, ret, "Failed to decode " 103 _kdc_add_KRB5SignedPath(krb5_context context, argument 137 krb5_abortx(context, "internal asn.1 encoder error"); 142 ret = hdb_enctype2key(context, &krbtgt->entry, enctype, &key); 144 ret = krb5_crypto_init(context, &key->key, 0, &crypto); 159 ret = krb5_create_checksum(context, crypto, KRB5_KU_KRB5SIGNEDPATH, 0, 161 krb5_crypto_destroy(context, crypto); 171 krb5_abortx(context, "internal asn.1 encoder error"); 179 ret = _kdc_tkt_add_if_relevant_ad(context, tk 187 check_KRB5SignedPath(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *krbtgt, krb5_principal cp, EncTicketPart *tkt, krb5_principals *delegated, int *signedpath) argument 279 check_PAC(krb5_context context, krb5_kdc_configuration *config, const krb5_principal client_principal, const krb5_principal delegated_proxy_principal, hdb_entry_ex *client, hdb_entry_ex *server, hdb_entry_ex *krbtgt, const EncryptionKey *server_check_key, const EncryptionKey *krbtgt_check_key, const EncryptionKey *server_sign_key, const EncryptionKey *krbtgt_sign_key, EncTicketPart *tkt, krb5_data *rspac, int *signedpath) argument 374 check_tgs_flags(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et) argument 506 check_constrained_delegation(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, hdb_entry_ex *server, krb5_const_principal target) argument 566 check_s4u2self(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, krb5_const_principal server) argument 593 verify_flags(krb5_context context, krb5_kdc_configuration *config, const EncTicketPart *et, const char *pstr) argument 614 fix_transited_encoding(krb5_context context, krb5_kdc_configuration *config, krb5_boolean check_policy, const TransitedEncoding *tr, EncTicketPart *et, const char *client_realm, const char *server_realm, const char *tgt_realm) argument 724 tgs_make_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, const krb5_keyblock *replykey, int rk_is_subkey, const EncryptionKey *serverkey, const krb5_keyblock *sessionkey, krb5_kvno kvno, AuthorizationData *auth_data, hdb_entry_ex *server, krb5_principal server_principal, const char *server_name, hdb_entry_ex *client, krb5_principal client_principal, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, krb5_principals spp, const krb5_data *rspac, const METHOD_DATA *enc_pa_data, const char **e_text, krb5_data *reply) argument 1016 tgs_check_authenticator(krb5_context context, krb5_kdc_configuration *config, krb5_auth_context ac, KDC_REQ_BODY *b, const char **e_text, krb5_keyblock *key) argument 1100 find_rpath(krb5_context context, Realm crealm, Realm srealm) argument 1113 need_referral(krb5_context context, krb5_kdc_configuration *config, const KDCOptions * const options, krb5_principal server, krb5_realm **realms) argument 1135 tgs_parse_request(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, const PA_DATA *tgs_req, hdb_entry_ex **krbtgt, krb5_enctype *krbtgt_etype, krb5_ticket **ticket, const char **e_text, const char *from, const struct sockaddr *from_addr, time_t **csec, int **cusec, AuthorizationData **auth_data, krb5_keyblock **replykey, int *rk_is_subkey) argument 1393 build_server_referral(krb5_context context, krb5_kdc_configuration *config, krb5_crypto session, krb5_const_realm referred_realm, const PrincipalName *true_principal_name, const PrincipalName *requested_principal, krb5_data *outdata) argument 1469 tgs_build_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ *req, KDC_REQ_BODY *b, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, const krb5_keyblock *replykey, int rk_is_subkey, krb5_ticket *ticket, krb5_data *reply, const char *from, const char **e_text, AuthorizationData **auth_data, const struct sockaddr *from_addr) argument 2280 _kdc_tgs_rep(krb5_context context, krb5_kdc_configuration *config, KDC_REQ *req, krb5_data *data, const char *from, struct sockaddr *from_addr, int datagram_reply) argument [all...] |
H A D | pkinit.c | 95 pk_check_pkauthenticator_win2k(krb5_context context, argument 101 krb5_timeofday (context, &now); 104 if (a->ctime == 0 || abs(a->ctime - now) > context->max_skew) { 105 krb5_clear_error_message(context); 112 pk_check_pkauthenticator(krb5_context context, argument 123 krb5_timeofday (context, &now); 126 if (a->ctime == 0 || abs(a->ctime - now) > context->max_skew) { 127 krb5_clear_error_message(context); 133 krb5_clear_error_message(context); 137 krb5_abortx(context, "Interna 170 _kdc_pk_free_client_param(krb5_context context, pk_client_params *cp) argument 204 generate_dh_keyblock(krb5_context context, pk_client_params *client_params, krb5_enctype enctype) argument 312 integer_to_BN(krb5_context context, const char *field, heim_integer *f) argument 327 get_dh_param(krb5_context context, krb5_kdc_configuration *config, SubjectPublicKeyInfo *dh_key_info, pk_client_params *client_params) argument 425 get_ecdh_param(krb5_context context, krb5_kdc_configuration *config, SubjectPublicKeyInfo *dh_key_info, pk_client_params *client_params) argument 488 _kdc_pk_rd_padata(krb5_context context, krb5_kdc_configuration *config, const KDC_REQ *req, const PA_DATA *pa, hdb_entry_ex *client, pk_client_params **ret_params) argument 898 BN_to_integer(krb5_context context, BIGNUM *bn, heim_integer *integer) argument 912 pk_mk_pa_reply_enckey(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, const KDC_REQ *req, const krb5_data *req_buffer, krb5_keyblock *reply_key, ContentInfo *content_info, hx509_cert *kdc_cert) argument 1092 pk_mk_pa_reply_dh(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, ContentInfo *content_info, hx509_cert *kdc_cert) argument 1233 _kdc_pk_mk_pa_reply(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, const hdb_entry_ex *client, krb5_enctype sessionetype, const KDC_REQ *req, const krb5_data *req_buffer, krb5_keyblock **reply_key, krb5_keyblock *sessionkey, METHOD_DATA *md) argument 1571 match_rfc_san(krb5_context context, krb5_kdc_configuration *config, hx509_context hx509ctx, hx509_cert client_cert, krb5_const_principal match) argument 1631 match_ms_upn_san(krb5_context context, krb5_kdc_configuration *config, hx509_context hx509ctx, hx509_cert client_cert, HDB *clientdb, hdb_entry_ex *client) argument 1702 _kdc_pk_check_client(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, pk_client_params *cp, char **subject_name) argument 1836 add_principal_mapping(krb5_context context, const char *principal_name, const char * subject) argument 1867 _kdc_add_inital_verified_cas(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, EncTicketPart *tkt) argument 1900 load_mappings(krb5_context context, const char *fn) argument 1947 krb5_kdc_pk_initialize(krb5_context context, krb5_kdc_configuration *config, const char *user_id, const char *anchors, char **pool, char **revoke_list) argument [all...] |
/freebsd-10.2-release/crypto/heimdal/lib/hdb/ |
H A D | hdb-keytab.c | 49 hkt_close(krb5_context context, HDB *db) argument 56 ret = krb5_kt_close(context, k->keytab); 63 hkt_destroy(krb5_context context, HDB *db) argument 68 ret = hdb_clear_master_key (context, db); 79 hkt_lock(krb5_context context, HDB *db, int operation) argument 85 hkt_unlock(krb5_context context, HDB *db) argument 91 hkt_firstkey(krb5_context context, HDB *db, argument 98 hkt_nextkey(krb5_context context, HDB * db, unsigned flags, argument 105 hkt_open(krb5_context context, HDB * db, int flags, mode_t mode) argument 112 ret = krb5_kt_resolve(context, 120 hkt_fetch_kvno(krb5_context context, HDB * db, krb5_const_principal principal, unsigned flags, krb5_kvno kvno, hdb_entry_ex * entry) argument 174 hkt_store(krb5_context context, HDB * db, unsigned flags, hdb_entry_ex * entry) argument 182 hdb_keytab_create(krb5_context context, HDB ** db, const char *arg) argument [all...] |
H A D | hdb-sqlite.c | 118 * @param context The current krb5 context 126 hdb_sqlite_prepare_stmt(krb5_context context, argument 138 krb5_warnx(context, "hdb-sqlite: prepare busy"); 144 krb5_set_error_message(context, EINVAL, 156 * @param context The current krb5 context 164 hdb_sqlite_exec_stmt(krb5_context context, argument 176 krb5_warnx(context, "hdb-sqlite: exec busy: %d", (int)getpid()); 182 krb5_set_error_message(context, error_cod 201 hdb_sqlite_open_database(krb5_context context, HDB *db, int flags) argument 226 hdb_sqlite_step(krb5_context context, sqlite3 *db, sqlite3_stmt *stmt) argument 248 hdb_sqlite_close_database(krb5_context context, HDB *db) argument 279 hdb_sqlite_make_database(krb5_context context, HDB *db, const char *filename) argument 387 hdb_sqlite_fetch_kvno(krb5_context context, HDB *db, krb5_const_principal principal, unsigned flags, krb5_kvno kvno, hdb_entry_ex *entry) argument 456 hdb_sqlite_step_once(krb5_context context, HDB *db, sqlite3_stmt *statement) argument 481 hdb_sqlite_store(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry) argument 635 hdb_sqlite_close(krb5_context context, HDB *db) argument 653 hdb_sqlite_open(krb5_context context, HDB *db, int flags, mode_t mode) argument 667 hdb_sqlite_destroy(krb5_context context, HDB *db) argument 689 hdb_sqlite_lock(krb5_context context, HDB *db, int operation) argument 700 hdb_sqlite_unlock(krb5_context context, HDB *db) argument 711 hdb_sqlite_nextkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry) argument 746 hdb_sqlite_firstkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry) argument 765 hdb_sqlite_rename(krb5_context context, HDB *db, const char *new_name) argument 789 hdb_sqlite_remove(krb5_context context, HDB *db, krb5_const_principal principal) argument 831 hdb_sqlite_create(krb5_context context, HDB **db, const char *argument) argument [all...] |
/freebsd-10.2-release/crypto/heimdal/lib/krb5/ |
H A D | test_config.c | 38 check_config_file(krb5_context context, char *filelist, char **res, int def) argument 52 krb5_err(context, 1, ret, "prepend_config_files"); 56 krb5_errx(context, 1, "'%s' != '%s'", pp[i], res[i]); 59 krb5_errx(context, 1, "pp ended before res list"); 67 krb5_err(context, 1, ret, "get_default_config_files"); 71 krb5_errx(context, 1, "'%s' != '%s'", pp[i], deflist[j]); 74 krb5_errx(context, 1, "pp ended before def list"); 79 krb5_errx(context, 1, "pp ended after res (and def) list"); 102 krb5_context context; local 106 ret = krb5_init_context(&context); 192 krb5_context context; local [all...] |
H A D | init_creds_pw.c | 90 free_paid(krb5_context context, struct pa_info_data *ppaid) argument 92 krb5_free_salt(context, ppaid->salt); 94 krb5_free_data(context, ppaid->s2kparams); 98 default_s2k_func(krb5_context context, krb5_enctype type, argument 107 _krb5_debug(context, 5, "krb5_get_init_creds: using default_s2k_func"); 119 ret = krb5_string_to_key_data_salt_opaque(context, type, password, 129 free_init_creds_ctx(krb5_context context, krb5_init_creds_context ctx) argument 144 krb5_free_cred_contents(context, &ctx->cred); 151 free_paid(context, ctx->ppaid); 158 get_config_time (krb5_context context, argument 182 init_cred(krb5_context context, krb5_creds *cred, krb5_principal client, krb5_deltat start_time, krb5_get_init_creds_opt *options) argument 231 report_expiration(krb5_context context, krb5_prompter_fct prompter, krb5_data *data, const char *str, time_t now) argument 255 process_last_request(krb5_context context, krb5_get_init_creds_opt *options, krb5_init_creds_context ctx) argument 347 get_init_creds_common(krb5_context context, krb5_principal client, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context ctx) argument 477 change_password(krb5_context context, krb5_principal client, const char *password, char *newpw, size_t newpw_sz, krb5_prompter_fct prompter, void *data, krb5_get_init_creds_opt *old_options) argument 599 krb5_keyblock_key_proc(krb5_context context, krb5_keytype type, krb5_data *salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument 613 init_as_req(krb5_context context, KDCOptions opts, const krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, AS_REQ *a) argument 723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument 754 pa_etype_info2(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument 803 pa_etype_info(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument 855 pa_pw_or_afs3_salt(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument 905 process_pa_info(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, METHOD_DATA *md) argument 926 make_pa_enc_timestamp(krb5_context context, METHOD_DATA *md, krb5_enctype etype, krb5_keyblock *key) argument 980 add_enc_ts_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_s2k_proc keyproc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt, krb5_data *s2kparams) argument 1029 pa_data_to_md_ts_enc(krb5_context context, const AS_REQ *a, const krb5_principal client, krb5_get_init_creds_ctx *ctx, struct pa_info_data *ppaid, METHOD_DATA *md) argument 1067 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument 1084 pa_data_to_md_pkinit(krb5_context context, const AS_REQ *a, const krb5_principal client, int win2k, krb5_get_init_creds_ctx *ctx, METHOD_DATA *md) argument 1109 pa_data_add_pac_request(krb5_context context, krb5_get_init_creds_ctx *ctx, METHOD_DATA *md) argument 1147 process_pa_data_to_md(krb5_context context, const krb5_creds *creds, const AS_REQ *a, krb5_get_init_creds_ctx *ctx, METHOD_DATA *in_md, METHOD_DATA **out_md, krb5_prompter_fct prompter, void *prompter_data) argument 1249 process_pa_data_to_key(krb5_context context, krb5_get_init_creds_ctx *ctx, krb5_creds *creds, AS_REQ *a, AS_REP *rep, const krb5_krbhst_info *hi, krb5_keyblock **key) argument 1346 krb5_init_creds_init(krb5_context context, krb5_principal client, krb5_prompter_fct prompter, void *prompter_data, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context *rctx) argument 1400 krb5_init_creds_set_service(krb5_context context, krb5_init_creds_context ctx, const char *service) argument 1451 krb5_init_creds_set_password(krb5_context context, krb5_init_creds_context ctx, const char *password) argument 1475 keytab_key_proc(krb5_context context, krb5_enctype enctype, krb5_const_pointer keyseed, krb5_salt salt, krb5_data *s2kparms, krb5_keyblock **key) argument 1519 krb5_init_creds_set_keytab(krb5_context context, krb5_init_creds_context ctx, krb5_keytab keytab) argument 1602 keyblock_key_proc(krb5_context context, krb5_enctype enctype, krb5_const_pointer keyseed, krb5_salt salt, krb5_data *s2kparms, krb5_keyblock **key) argument 1611 krb5_init_creds_set_keyblock(krb5_context context, krb5_init_creds_context ctx, krb5_keyblock *keyblock) argument 1643 krb5_init_creds_step(krb5_context context, krb5_init_creds_context ctx, krb5_data *in, krb5_data *out, krb5_krbhst_info *hostinfo, unsigned int *flags) argument 1856 krb5_init_creds_get_creds(krb5_context context, krb5_init_creds_context ctx, krb5_creds *cred) argument 1872 krb5_init_creds_get_error(krb5_context context, krb5_init_creds_context ctx, KRB_ERROR *error) argument 1895 krb5_init_creds_free(krb5_context context, krb5_init_creds_context ctx) argument 1912 krb5_init_creds_get(krb5_context context, krb5_init_creds_context ctx) argument 1960 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, const char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument 2066 krb5_get_init_creds_keyblock(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keyblock *keyblock, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument 2113 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab keytab, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument [all...] |
H A D | convert_creds.c | 45 * @param context Kerberos 5 context. 56 krb524_convert_creds_kdc(krb5_context context, 62 krb5_set_error_message(context, EINVAL, 71 * @param context Kerberos 5 context. 83 krb524_convert_creds_kdc_ccache(krb5_context context, 90 krb5_set_error_message(context, EINVAL,
|
H A D | get_port.c | 37 krb5_getportbyname (krb5_context context, argument 46 krb5_warnx(context, "%s/%s unknown service, using default port %d",
|
H A D | salt-aes.c | 39 AES_string_to_key(krb5_context context, argument 67 krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", "")); 73 krb5_set_error_message (context, ret, N_("malloc: out of memory", "")); 82 _krb5_free_key_data(context, &kd, et); 83 krb5_set_error_message(context, KRB5_PROG_KEYTYPE_NOSUPP, 88 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos")); 90 ret = krb5_copy_keyblock_contents(context, kd.key, key); 91 _krb5_free_key_data(context, &kd, et);
|
H A D | test_kuserok.c | 60 krb5_context context; local 82 ret = krb5_init_context(&context); 89 ret = krb5_parse_name(context, argv[0], &principal); 91 krb5_err(context, 1, ret, "krb5_parse_name"); 93 ret = krb5_unparse_name(context, principal, &p); 95 krb5_err(context, 1, ret, "krb5_unparse_name"); 97 ret = krb5_kuserok(context, principal, argv[1]); 99 krb5_free_context(context);
|
H A D | warn.c | 37 static krb5_error_code _warnerr(krb5_context context, int do_errtext, 42 _warnerr(krb5_context context, int do_errtext, argument 62 if(context && do_errtext){ 65 err_str = krb5_get_error_message(context, code); 73 if(context && context->warn_dest) 74 krb5_log(context, context->warn_dest, level, xfmt, args[0], args[1]); 78 krb5_free_error_message(context, err_str); 86 ret = _warnerr(context, ETEX 105 krb5_vwarn(krb5_context context, krb5_error_code code, const char *fmt, va_list ap) argument 124 krb5_warn(krb5_context context, krb5_error_code code, const char *fmt, ...) argument 142 krb5_vwarnx(krb5_context context, const char *fmt, va_list ap) argument 158 krb5_warnx(krb5_context context, const char *fmt, ...) argument 179 krb5_verr(krb5_context context, int eval, krb5_error_code code, const char *fmt, va_list ap) argument 201 krb5_err(krb5_context context, int eval, krb5_error_code code, const char *fmt, ...) argument 222 krb5_verrx(krb5_context context, int eval, const char *fmt, va_list ap) argument 241 krb5_errx(krb5_context context, int eval, const char *fmt, ...) argument 262 krb5_vabort(krb5_context context, krb5_error_code code, const char *fmt, va_list ap) argument 283 krb5_abort(krb5_context context, krb5_error_code code, const char *fmt, ...) argument 292 krb5_vabortx(krb5_context context, const char *fmt, va_list ap) argument 311 krb5_abortx(krb5_context context, const char *fmt, ...) argument 329 krb5_set_warn_dest(krb5_context context, krb5_log_facility *fac) argument 344 krb5_get_warn_dest(krb5_context context) argument [all...] |
/freebsd-10.2-release/crypto/heimdal/admin/ |
H A D | purge.c | 55 if (krb5_principal_compare (context, princ, e->principal)) 76 krb5_errx (context, 1, "malloc: out of memory"); 77 ret = krb5_copy_principal (context, princ, &e->principal); 79 krb5_err (context, 1, ret, "krb5_copy_principal"); 91 krb5_free_principal (context, head->principal); 115 krb5_warnx(context, "unparasable time `%s'", opt->age_string); 122 ret = krb5_kt_start_seq_get(context, keytab, &cursor); 124 krb5_warn(context, ret, "%s", keytab_string); 128 while(krb5_kt_next_entry(context, keytab, &entry, &cursor) == 0) { 130 krb5_kt_free_entry(context, [all...] |
H A D | change.c | 51 ret = krb5_unparse_name (context, principal, &client_name); 53 krb5_warn (context, ret, "krb5_unparse_name"); 60 realm = krb5_principal_get_realm(context, principal); 64 krb5_set_error_message(context, ENOMEM, "malloc failed"); 74 krb5_set_error_message(context, ENOMEM, "malloc failed"); 85 ret = kadm5_init_with_skey_ctx (context, 94 krb5_warn (context, ret, 102 krb5_warn(context, ret, "kadm5_randkey_principal: %s:", client_name); 115 ret = krb5_kt_add_entry (context, keytab, &new_entry); 117 krb5_warn (context, re [all...] |
/freebsd-10.2-release/crypto/heimdal/kuser/ |
H A D | kinit.c | 213 get_server(krb5_context context, argument 220 return krb5_parse_name(context, server, princ); 222 realm = krb5_principal_get_realm(context, client); 223 return krb5_make_principal(context, princ, realm, 228 renew_validate(krb5_context context, argument 241 ret = krb5_cc_get_principal(context, cache, &in.client); 243 krb5_warn(context, ret, "krb5_cc_get_principal"); 246 ret = get_server(context, in.client, server, &in.server); 248 krb5_warn(context, ret, "get_server"); 257 krb5_get_credentials(context, KRB5_GC_CACHE 325 store_ntlmkey(krb5_context context, krb5_ccache id, const char *domain, struct ntlm_buf *buf) argument 348 get_new_tickets(krb5_context context, krb5_principal principal, krb5_ccache ccache, krb5_deltat ticket_life, int interactive) argument 651 ticket_lifetime(krb5_context context, krb5_ccache cache, krb5_principal client, const char *server) argument 688 krb5_context context; member in struct:renew_ctx 728 krb5_context context; local [all...] |
/freebsd-10.2-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | accept_sec_context.c | 40 validate_keytab(krb5_context context, const char *name, krb5_keytab *id) argument 44 ret = krb5_kt_resolve(context, name, id); 48 ret = krb5_kt_have_content(context, *id); 50 krb5_kt_close(context, *id); 60 krb5_context context; local 65 ret = _gsskrb5_init(&context); 72 krb5_kt_close(context, _gsskrb5_keytab); 76 ret = krb5_kt_default(context, &_gsskrb5_keytab); 81 ret = validate_keytab(context, identity, &_gsskrb5_keytab); 92 ret = validate_keytab(context, 105 _gsskrb5i_is_cfx(krb5_context context, gsskrb5_ctx ctx, int acceptor) argument 152 gsskrb5_accept_delegated_token(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, gss_cred_id_t * delegated_cred_handle ) argument 232 gsskrb5_acceptor_ready(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, gss_cred_id_t *delegated_cred_handle) argument 287 send_error_token(OM_uint32 *minor_status, krb5_context context, krb5_error_code kret, krb5_principal server, krb5_data *indata, gss_buffer_t output_token) argument 347 gsskrb5_acceptor_start(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, const gss_cred_id_t acceptor_cred_handle, const gss_buffer_t input_token_buffer, const gss_channel_bindings_t input_chan_bindings, gss_name_t * src_name, gss_OID * mech_type, gss_buffer_t output_token, OM_uint32 * ret_flags, OM_uint32 * time_rec, gss_cred_id_t * delegated_cred_handle) argument 675 acceptor_wait_for_dcestyle(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, const gss_cred_id_t acceptor_cred_handle, const gss_buffer_t input_token_buffer, const gss_channel_bindings_t input_chan_bindings, gss_name_t * src_name, gss_OID * mech_type, gss_buffer_t output_token, OM_uint32 * ret_flags, OM_uint32 * time_rec, gss_cred_id_t * delegated_cred_handle) argument 851 krb5_context context; local [all...] |
H A D | context_time.c | 38 krb5_context context, 50 kret = krb5_timeofday(context, &timeret); 71 krb5_context context; local 76 GSSAPI_KRB5_INIT (&context); 82 major_status = _gsskrb5_lifetime_left(minor_status, context, 37 _gsskrb5_lifetime_left(OM_uint32 *minor_status, krb5_context context, OM_uint32 lifetime, OM_uint32 *lifetime_rec) argument
|
/freebsd-10.2-release/contrib/ofed/libibverbs/examples/ |
H A D | pingpong.h | 41 uint16_t pp_get_local_lid(struct ibv_context *context, int port); 42 int pp_get_port_info(struct ibv_context *context, int port,
|
H A D | asyncwatch.c | 80 struct ibv_context *context; local 97 context = ibv_open_device(*dev_list); 98 if (!context) { 99 fprintf(stderr, "Couldn't get context for %s\n", 105 ibv_get_device_name(*dev_list), context->async_fd); 108 if (ibv_get_async_event(context, &event))
|
/freebsd-10.2-release/contrib/ntp/include/ |
H A D | intreswork.h | 18 void *context, const char *name, 25 const char *service, void *context);
|
/freebsd-10.2-release/contrib/apr-util/test/ |
H A D | testmd4.c | 80 apr_md4_ctx_t context; 84 apr_md4_init(&context); 85 apr_md4_update(&context, (unsigned char *)string, len); 86 apr_md4_final(digest, &context); 94 apr_md4_ctx_t context; local 100 ABTS_ASSERT(tc, "apr_md4_init", (apr_md4_init(&context) == 0)); 102 (apr_md4_update(&context, 105 ABTS_ASSERT(tc, "apr_md4_final", (apr_md4_final(digest, &context) ==0));
|
H A D | testmd5.c | 54 apr_md5_ctx_t context; local 60 ABTS_ASSERT(tc, "apr_md5_init", (apr_md5_init(&context) == 0)); 62 (apr_md5_update(&context, string, len) == 0)); 63 ABTS_ASSERT(tc, "apr_md5_final", (apr_md5_final(digest, &context) 71 apr_md5_ctx_t context; local 81 ABTS_ASSERT(tc, "apr_md5_init", (apr_md5_init(&context) == 0)); 84 (apr_md5_update(&context, string, strlen(string)) == 0)); 87 ABTS_ASSERT(tc, "apr_md5_final", (apr_md5_final(digest, &context)
|
/freebsd-10.2-release/sys/mips/nlm/dev/net/ucore/ |
H A D | ucore_app.c | 38 int intf, hw_parser_error, context; 49 context = (pktrdy >> 13) & 0x3ff;
|
/freebsd-10.2-release/crypto/heimdal/kadmin/ |
H A D | del_enctype.c | 58 krb5_warnx (context, "out of memory"); 63 ret = krb5_string_to_enctype (context, argv[i], &etypes[i]); 65 krb5_warnx (context, "bad enctype \"%s\"", argv[i]); 70 ret = krb5_parse_name(context, princ_name, &princ_ent); 72 krb5_warn (context, ret, "krb5_parse_name %s", princ_name); 79 krb5_free_principal (context, princ_ent); 80 krb5_warnx (context, "no such principal: %s", princ_name); 86 krb5_warnx (context, "out of memory"); 114 krb5_warn(context, ret, "kadm5_modify_principal"); 116 krb5_free_principal (context, princ_en [all...] |