Searched refs:context (Results 176 - 200 of 1190) sorted by relevance

1234567891011>>

/freebsd-10.2-release/lib/libpam/modules/pam_ksu/
H A Dpam_ksu.c55 krb5_context context; local
71 rv = krb5_init_context(&context);
73 const char *msg = krb5_get_error_message(context, rv);
75 krb5_free_error_message(context, msg);
78 rv = get_su_principal(context, user, ruser, &su_principal_name, &su_principal);
82 rv = krb5_kuserok(context, su_principal, user);
83 pamret = rv ? auth_krb5(pamh, context, su_principal_name, su_principal) : PAM_AUTH_ERR;
85 krb5_free_principal(context, su_principal);
86 krb5_free_context(context);
100 * context
112 auth_krb5(pam_handle_t *pamh, krb5_context context, const char *su_principal_name, krb5_principal su_principal) argument
181 get_su_principal(krb5_context context, const char *target_user, const char *current_user, char **su_principal_name, krb5_principal *su_principal) argument
[all...]
/freebsd-10.2-release/crypto/heimdal/kdc/
H A Dmisc.c39 _kdc_db_fetch(krb5_context context, argument
59 krb5_set_error_message(context, ENOMEM, "malloc: out of memory");
69 krb5_set_error_message(context, ret,
76 ret = krb5_parse_name(context, principal->name.name_string.val[0],
86 ret = config->db[i]->hdb_open(context, config->db[i], O_RDONLY, 0);
88 const char *msg = krb5_get_error_message(context, ret);
89 kdc_log(context, config, 0, "Failed to open database: %s", msg);
90 krb5_free_error_message(context, msg);
94 ret = config->db[i]->hdb_fetch_kvno(context,
101 krb5_free_principal(context, enterprise_principa
118 _kdc_free_ent(krb5_context context, hdb_entry_ex *ent) argument
130 _kdc_get_preferred_key(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *h, const char *name, krb5_enctype *enctype, Key **key) argument
[all...]
H A Dkrb5tgs.c60 find_KRB5SignedPath(krb5_context context, argument
81 krb5_set_error_message(context, ret, "Failed to decode "
103 _kdc_add_KRB5SignedPath(krb5_context context, argument
137 krb5_abortx(context, "internal asn.1 encoder error");
142 ret = hdb_enctype2key(context, &krbtgt->entry, enctype, &key);
144 ret = krb5_crypto_init(context, &key->key, 0, &crypto);
159 ret = krb5_create_checksum(context, crypto, KRB5_KU_KRB5SIGNEDPATH, 0,
161 krb5_crypto_destroy(context, crypto);
171 krb5_abortx(context, "internal asn.1 encoder error");
179 ret = _kdc_tkt_add_if_relevant_ad(context, tk
187 check_KRB5SignedPath(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *krbtgt, krb5_principal cp, EncTicketPart *tkt, krb5_principals *delegated, int *signedpath) argument
279 check_PAC(krb5_context context, krb5_kdc_configuration *config, const krb5_principal client_principal, const krb5_principal delegated_proxy_principal, hdb_entry_ex *client, hdb_entry_ex *server, hdb_entry_ex *krbtgt, const EncryptionKey *server_check_key, const EncryptionKey *krbtgt_check_key, const EncryptionKey *server_sign_key, const EncryptionKey *krbtgt_sign_key, EncTicketPart *tkt, krb5_data *rspac, int *signedpath) argument
374 check_tgs_flags(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, const EncTicketPart *tgt, EncTicketPart *et) argument
506 check_constrained_delegation(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, hdb_entry_ex *server, krb5_const_principal target) argument
566 check_s4u2self(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, krb5_const_principal server) argument
593 verify_flags(krb5_context context, krb5_kdc_configuration *config, const EncTicketPart *et, const char *pstr) argument
614 fix_transited_encoding(krb5_context context, krb5_kdc_configuration *config, krb5_boolean check_policy, const TransitedEncoding *tr, EncTicketPart *et, const char *client_realm, const char *server_realm, const char *tgt_realm) argument
724 tgs_make_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, const krb5_keyblock *replykey, int rk_is_subkey, const EncryptionKey *serverkey, const krb5_keyblock *sessionkey, krb5_kvno kvno, AuthorizationData *auth_data, hdb_entry_ex *server, krb5_principal server_principal, const char *server_name, hdb_entry_ex *client, krb5_principal client_principal, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, krb5_principals spp, const krb5_data *rspac, const METHOD_DATA *enc_pa_data, const char **e_text, krb5_data *reply) argument
1016 tgs_check_authenticator(krb5_context context, krb5_kdc_configuration *config, krb5_auth_context ac, KDC_REQ_BODY *b, const char **e_text, krb5_keyblock *key) argument
1100 find_rpath(krb5_context context, Realm crealm, Realm srealm) argument
1113 need_referral(krb5_context context, krb5_kdc_configuration *config, const KDCOptions * const options, krb5_principal server, krb5_realm **realms) argument
1135 tgs_parse_request(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, const PA_DATA *tgs_req, hdb_entry_ex **krbtgt, krb5_enctype *krbtgt_etype, krb5_ticket **ticket, const char **e_text, const char *from, const struct sockaddr *from_addr, time_t **csec, int **cusec, AuthorizationData **auth_data, krb5_keyblock **replykey, int *rk_is_subkey) argument
1393 build_server_referral(krb5_context context, krb5_kdc_configuration *config, krb5_crypto session, krb5_const_realm referred_realm, const PrincipalName *true_principal_name, const PrincipalName *requested_principal, krb5_data *outdata) argument
1469 tgs_build_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ *req, KDC_REQ_BODY *b, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, const krb5_keyblock *replykey, int rk_is_subkey, krb5_ticket *ticket, krb5_data *reply, const char *from, const char **e_text, AuthorizationData **auth_data, const struct sockaddr *from_addr) argument
2280 _kdc_tgs_rep(krb5_context context, krb5_kdc_configuration *config, KDC_REQ *req, krb5_data *data, const char *from, struct sockaddr *from_addr, int datagram_reply) argument
[all...]
H A Dpkinit.c95 pk_check_pkauthenticator_win2k(krb5_context context, argument
101 krb5_timeofday (context, &now);
104 if (a->ctime == 0 || abs(a->ctime - now) > context->max_skew) {
105 krb5_clear_error_message(context);
112 pk_check_pkauthenticator(krb5_context context, argument
123 krb5_timeofday (context, &now);
126 if (a->ctime == 0 || abs(a->ctime - now) > context->max_skew) {
127 krb5_clear_error_message(context);
133 krb5_clear_error_message(context);
137 krb5_abortx(context, "Interna
170 _kdc_pk_free_client_param(krb5_context context, pk_client_params *cp) argument
204 generate_dh_keyblock(krb5_context context, pk_client_params *client_params, krb5_enctype enctype) argument
312 integer_to_BN(krb5_context context, const char *field, heim_integer *f) argument
327 get_dh_param(krb5_context context, krb5_kdc_configuration *config, SubjectPublicKeyInfo *dh_key_info, pk_client_params *client_params) argument
425 get_ecdh_param(krb5_context context, krb5_kdc_configuration *config, SubjectPublicKeyInfo *dh_key_info, pk_client_params *client_params) argument
488 _kdc_pk_rd_padata(krb5_context context, krb5_kdc_configuration *config, const KDC_REQ *req, const PA_DATA *pa, hdb_entry_ex *client, pk_client_params **ret_params) argument
898 BN_to_integer(krb5_context context, BIGNUM *bn, heim_integer *integer) argument
912 pk_mk_pa_reply_enckey(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, const KDC_REQ *req, const krb5_data *req_buffer, krb5_keyblock *reply_key, ContentInfo *content_info, hx509_cert *kdc_cert) argument
1092 pk_mk_pa_reply_dh(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, ContentInfo *content_info, hx509_cert *kdc_cert) argument
1233 _kdc_pk_mk_pa_reply(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, const hdb_entry_ex *client, krb5_enctype sessionetype, const KDC_REQ *req, const krb5_data *req_buffer, krb5_keyblock **reply_key, krb5_keyblock *sessionkey, METHOD_DATA *md) argument
1571 match_rfc_san(krb5_context context, krb5_kdc_configuration *config, hx509_context hx509ctx, hx509_cert client_cert, krb5_const_principal match) argument
1631 match_ms_upn_san(krb5_context context, krb5_kdc_configuration *config, hx509_context hx509ctx, hx509_cert client_cert, HDB *clientdb, hdb_entry_ex *client) argument
1702 _kdc_pk_check_client(krb5_context context, krb5_kdc_configuration *config, HDB *clientdb, hdb_entry_ex *client, pk_client_params *cp, char **subject_name) argument
1836 add_principal_mapping(krb5_context context, const char *principal_name, const char * subject) argument
1867 _kdc_add_inital_verified_cas(krb5_context context, krb5_kdc_configuration *config, pk_client_params *cp, EncTicketPart *tkt) argument
1900 load_mappings(krb5_context context, const char *fn) argument
1947 krb5_kdc_pk_initialize(krb5_context context, krb5_kdc_configuration *config, const char *user_id, const char *anchors, char **pool, char **revoke_list) argument
[all...]
/freebsd-10.2-release/crypto/heimdal/lib/hdb/
H A Dhdb-keytab.c49 hkt_close(krb5_context context, HDB *db) argument
56 ret = krb5_kt_close(context, k->keytab);
63 hkt_destroy(krb5_context context, HDB *db) argument
68 ret = hdb_clear_master_key (context, db);
79 hkt_lock(krb5_context context, HDB *db, int operation) argument
85 hkt_unlock(krb5_context context, HDB *db) argument
91 hkt_firstkey(krb5_context context, HDB *db, argument
98 hkt_nextkey(krb5_context context, HDB * db, unsigned flags, argument
105 hkt_open(krb5_context context, HDB * db, int flags, mode_t mode) argument
112 ret = krb5_kt_resolve(context,
120 hkt_fetch_kvno(krb5_context context, HDB * db, krb5_const_principal principal, unsigned flags, krb5_kvno kvno, hdb_entry_ex * entry) argument
174 hkt_store(krb5_context context, HDB * db, unsigned flags, hdb_entry_ex * entry) argument
182 hdb_keytab_create(krb5_context context, HDB ** db, const char *arg) argument
[all...]
H A Dhdb-sqlite.c118 * @param context The current krb5 context
126 hdb_sqlite_prepare_stmt(krb5_context context, argument
138 krb5_warnx(context, "hdb-sqlite: prepare busy");
144 krb5_set_error_message(context, EINVAL,
156 * @param context The current krb5 context
164 hdb_sqlite_exec_stmt(krb5_context context, argument
176 krb5_warnx(context, "hdb-sqlite: exec busy: %d", (int)getpid());
182 krb5_set_error_message(context, error_cod
201 hdb_sqlite_open_database(krb5_context context, HDB *db, int flags) argument
226 hdb_sqlite_step(krb5_context context, sqlite3 *db, sqlite3_stmt *stmt) argument
248 hdb_sqlite_close_database(krb5_context context, HDB *db) argument
279 hdb_sqlite_make_database(krb5_context context, HDB *db, const char *filename) argument
387 hdb_sqlite_fetch_kvno(krb5_context context, HDB *db, krb5_const_principal principal, unsigned flags, krb5_kvno kvno, hdb_entry_ex *entry) argument
456 hdb_sqlite_step_once(krb5_context context, HDB *db, sqlite3_stmt *statement) argument
481 hdb_sqlite_store(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry) argument
635 hdb_sqlite_close(krb5_context context, HDB *db) argument
653 hdb_sqlite_open(krb5_context context, HDB *db, int flags, mode_t mode) argument
667 hdb_sqlite_destroy(krb5_context context, HDB *db) argument
689 hdb_sqlite_lock(krb5_context context, HDB *db, int operation) argument
700 hdb_sqlite_unlock(krb5_context context, HDB *db) argument
711 hdb_sqlite_nextkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry) argument
746 hdb_sqlite_firstkey(krb5_context context, HDB *db, unsigned flags, hdb_entry_ex *entry) argument
765 hdb_sqlite_rename(krb5_context context, HDB *db, const char *new_name) argument
789 hdb_sqlite_remove(krb5_context context, HDB *db, krb5_const_principal principal) argument
831 hdb_sqlite_create(krb5_context context, HDB **db, const char *argument) argument
[all...]
/freebsd-10.2-release/crypto/heimdal/lib/krb5/
H A Dtest_config.c38 check_config_file(krb5_context context, char *filelist, char **res, int def) argument
52 krb5_err(context, 1, ret, "prepend_config_files");
56 krb5_errx(context, 1, "'%s' != '%s'", pp[i], res[i]);
59 krb5_errx(context, 1, "pp ended before res list");
67 krb5_err(context, 1, ret, "get_default_config_files");
71 krb5_errx(context, 1, "'%s' != '%s'", pp[i], deflist[j]);
74 krb5_errx(context, 1, "pp ended before def list");
79 krb5_errx(context, 1, "pp ended after res (and def) list");
102 krb5_context context; local
106 ret = krb5_init_context(&context);
192 krb5_context context; local
[all...]
H A Dinit_creds_pw.c90 free_paid(krb5_context context, struct pa_info_data *ppaid) argument
92 krb5_free_salt(context, ppaid->salt);
94 krb5_free_data(context, ppaid->s2kparams);
98 default_s2k_func(krb5_context context, krb5_enctype type, argument
107 _krb5_debug(context, 5, "krb5_get_init_creds: using default_s2k_func");
119 ret = krb5_string_to_key_data_salt_opaque(context, type, password,
129 free_init_creds_ctx(krb5_context context, krb5_init_creds_context ctx) argument
144 krb5_free_cred_contents(context, &ctx->cred);
151 free_paid(context, ctx->ppaid);
158 get_config_time (krb5_context context, argument
182 init_cred(krb5_context context, krb5_creds *cred, krb5_principal client, krb5_deltat start_time, krb5_get_init_creds_opt *options) argument
231 report_expiration(krb5_context context, krb5_prompter_fct prompter, krb5_data *data, const char *str, time_t now) argument
255 process_last_request(krb5_context context, krb5_get_init_creds_opt *options, krb5_init_creds_context ctx) argument
347 get_init_creds_common(krb5_context context, krb5_principal client, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context ctx) argument
477 change_password(krb5_context context, krb5_principal client, const char *password, char *newpw, size_t newpw_sz, krb5_prompter_fct prompter, void *data, krb5_get_init_creds_opt *old_options) argument
599 krb5_keyblock_key_proc(krb5_context context, krb5_keytype type, krb5_data *salt, krb5_const_pointer keyseed, krb5_keyblock **key) argument
613 init_as_req(krb5_context context, KDCOptions opts, const krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, AS_REQ *a) argument
723 set_paid(struct pa_info_data *paid, krb5_context context, krb5_enctype etype, krb5_salttype salttype, void *salt_string, size_t salt_len, krb5_data *s2kparams) argument
754 pa_etype_info2(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument
803 pa_etype_info(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument
855 pa_pw_or_afs3_salt(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, heim_octet_string *data) argument
905 process_pa_info(krb5_context context, const krb5_principal client, const AS_REQ *asreq, struct pa_info_data *paid, METHOD_DATA *md) argument
926 make_pa_enc_timestamp(krb5_context context, METHOD_DATA *md, krb5_enctype etype, krb5_keyblock *key) argument
980 add_enc_ts_padata(krb5_context context, METHOD_DATA *md, krb5_principal client, krb5_s2k_proc keyproc, krb5_const_pointer keyseed, krb5_enctype *enctypes, unsigned netypes, krb5_salt *salt, krb5_data *s2kparams) argument
1029 pa_data_to_md_ts_enc(krb5_context context, const AS_REQ *a, const krb5_principal client, krb5_get_init_creds_ctx *ctx, struct pa_info_data *ppaid, METHOD_DATA *md) argument
1067 pa_data_to_key_plain(krb5_context context, const krb5_principal client, krb5_get_init_creds_ctx *ctx, krb5_salt salt, krb5_data *s2kparams, krb5_enctype etype, krb5_keyblock **key) argument
1084 pa_data_to_md_pkinit(krb5_context context, const AS_REQ *a, const krb5_principal client, int win2k, krb5_get_init_creds_ctx *ctx, METHOD_DATA *md) argument
1109 pa_data_add_pac_request(krb5_context context, krb5_get_init_creds_ctx *ctx, METHOD_DATA *md) argument
1147 process_pa_data_to_md(krb5_context context, const krb5_creds *creds, const AS_REQ *a, krb5_get_init_creds_ctx *ctx, METHOD_DATA *in_md, METHOD_DATA **out_md, krb5_prompter_fct prompter, void *prompter_data) argument
1249 process_pa_data_to_key(krb5_context context, krb5_get_init_creds_ctx *ctx, krb5_creds *creds, AS_REQ *a, AS_REP *rep, const krb5_krbhst_info *hi, krb5_keyblock **key) argument
1346 krb5_init_creds_init(krb5_context context, krb5_principal client, krb5_prompter_fct prompter, void *prompter_data, krb5_deltat start_time, krb5_get_init_creds_opt *options, krb5_init_creds_context *rctx) argument
1400 krb5_init_creds_set_service(krb5_context context, krb5_init_creds_context ctx, const char *service) argument
1451 krb5_init_creds_set_password(krb5_context context, krb5_init_creds_context ctx, const char *password) argument
1475 keytab_key_proc(krb5_context context, krb5_enctype enctype, krb5_const_pointer keyseed, krb5_salt salt, krb5_data *s2kparms, krb5_keyblock **key) argument
1519 krb5_init_creds_set_keytab(krb5_context context, krb5_init_creds_context ctx, krb5_keytab keytab) argument
1602 keyblock_key_proc(krb5_context context, krb5_enctype enctype, krb5_const_pointer keyseed, krb5_salt salt, krb5_data *s2kparms, krb5_keyblock **key) argument
1611 krb5_init_creds_set_keyblock(krb5_context context, krb5_init_creds_context ctx, krb5_keyblock *keyblock) argument
1643 krb5_init_creds_step(krb5_context context, krb5_init_creds_context ctx, krb5_data *in, krb5_data *out, krb5_krbhst_info *hostinfo, unsigned int *flags) argument
1856 krb5_init_creds_get_creds(krb5_context context, krb5_init_creds_context ctx, krb5_creds *cred) argument
1872 krb5_init_creds_get_error(krb5_context context, krb5_init_creds_context ctx, KRB_ERROR *error) argument
1895 krb5_init_creds_free(krb5_context context, krb5_init_creds_context ctx) argument
1912 krb5_init_creds_get(krb5_context context, krb5_init_creds_context ctx) argument
1960 krb5_get_init_creds_password(krb5_context context, krb5_creds *creds, krb5_principal client, const char *password, krb5_prompter_fct prompter, void *data, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument
2066 krb5_get_init_creds_keyblock(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keyblock *keyblock, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument
2113 krb5_get_init_creds_keytab(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_keytab keytab, krb5_deltat start_time, const char *in_tkt_service, krb5_get_init_creds_opt *options) argument
[all...]
H A Dconvert_creds.c45 * @param context Kerberos 5 context.
56 krb524_convert_creds_kdc(krb5_context context,
62 krb5_set_error_message(context, EINVAL,
71 * @param context Kerberos 5 context.
83 krb524_convert_creds_kdc_ccache(krb5_context context,
90 krb5_set_error_message(context, EINVAL,
H A Dget_port.c37 krb5_getportbyname (krb5_context context, argument
46 krb5_warnx(context, "%s/%s unknown service, using default port %d",
H A Dsalt-aes.c39 AES_string_to_key(krb5_context context, argument
67 krb5_set_error_message (context, ENOMEM, N_("malloc: out of memory", ""));
73 krb5_set_error_message (context, ret, N_("malloc: out of memory", ""));
82 _krb5_free_key_data(context, &kd, et);
83 krb5_set_error_message(context, KRB5_PROG_KEYTYPE_NOSUPP,
88 ret = _krb5_derive_key(context, et, &kd, "kerberos", strlen("kerberos"));
90 ret = krb5_copy_keyblock_contents(context, kd.key, key);
91 _krb5_free_key_data(context, &kd, et);
H A Dtest_kuserok.c60 krb5_context context; local
82 ret = krb5_init_context(&context);
89 ret = krb5_parse_name(context, argv[0], &principal);
91 krb5_err(context, 1, ret, "krb5_parse_name");
93 ret = krb5_unparse_name(context, principal, &p);
95 krb5_err(context, 1, ret, "krb5_unparse_name");
97 ret = krb5_kuserok(context, principal, argv[1]);
99 krb5_free_context(context);
H A Dwarn.c37 static krb5_error_code _warnerr(krb5_context context, int do_errtext,
42 _warnerr(krb5_context context, int do_errtext, argument
62 if(context && do_errtext){
65 err_str = krb5_get_error_message(context, code);
73 if(context && context->warn_dest)
74 krb5_log(context, context->warn_dest, level, xfmt, args[0], args[1]);
78 krb5_free_error_message(context, err_str);
86 ret = _warnerr(context, ETEX
105 krb5_vwarn(krb5_context context, krb5_error_code code, const char *fmt, va_list ap) argument
124 krb5_warn(krb5_context context, krb5_error_code code, const char *fmt, ...) argument
142 krb5_vwarnx(krb5_context context, const char *fmt, va_list ap) argument
158 krb5_warnx(krb5_context context, const char *fmt, ...) argument
179 krb5_verr(krb5_context context, int eval, krb5_error_code code, const char *fmt, va_list ap) argument
201 krb5_err(krb5_context context, int eval, krb5_error_code code, const char *fmt, ...) argument
222 krb5_verrx(krb5_context context, int eval, const char *fmt, va_list ap) argument
241 krb5_errx(krb5_context context, int eval, const char *fmt, ...) argument
262 krb5_vabort(krb5_context context, krb5_error_code code, const char *fmt, va_list ap) argument
283 krb5_abort(krb5_context context, krb5_error_code code, const char *fmt, ...) argument
292 krb5_vabortx(krb5_context context, const char *fmt, va_list ap) argument
311 krb5_abortx(krb5_context context, const char *fmt, ...) argument
329 krb5_set_warn_dest(krb5_context context, krb5_log_facility *fac) argument
344 krb5_get_warn_dest(krb5_context context) argument
[all...]
/freebsd-10.2-release/crypto/heimdal/admin/
H A Dpurge.c55 if (krb5_principal_compare (context, princ, e->principal))
76 krb5_errx (context, 1, "malloc: out of memory");
77 ret = krb5_copy_principal (context, princ, &e->principal);
79 krb5_err (context, 1, ret, "krb5_copy_principal");
91 krb5_free_principal (context, head->principal);
115 krb5_warnx(context, "unparasable time `%s'", opt->age_string);
122 ret = krb5_kt_start_seq_get(context, keytab, &cursor);
124 krb5_warn(context, ret, "%s", keytab_string);
128 while(krb5_kt_next_entry(context, keytab, &entry, &cursor) == 0) {
130 krb5_kt_free_entry(context,
[all...]
H A Dchange.c51 ret = krb5_unparse_name (context, principal, &client_name);
53 krb5_warn (context, ret, "krb5_unparse_name");
60 realm = krb5_principal_get_realm(context, principal);
64 krb5_set_error_message(context, ENOMEM, "malloc failed");
74 krb5_set_error_message(context, ENOMEM, "malloc failed");
85 ret = kadm5_init_with_skey_ctx (context,
94 krb5_warn (context, ret,
102 krb5_warn(context, ret, "kadm5_randkey_principal: %s:", client_name);
115 ret = krb5_kt_add_entry (context, keytab, &new_entry);
117 krb5_warn (context, re
[all...]
/freebsd-10.2-release/crypto/heimdal/kuser/
H A Dkinit.c213 get_server(krb5_context context, argument
220 return krb5_parse_name(context, server, princ);
222 realm = krb5_principal_get_realm(context, client);
223 return krb5_make_principal(context, princ, realm,
228 renew_validate(krb5_context context, argument
241 ret = krb5_cc_get_principal(context, cache, &in.client);
243 krb5_warn(context, ret, "krb5_cc_get_principal");
246 ret = get_server(context, in.client, server, &in.server);
248 krb5_warn(context, ret, "get_server");
257 krb5_get_credentials(context, KRB5_GC_CACHE
325 store_ntlmkey(krb5_context context, krb5_ccache id, const char *domain, struct ntlm_buf *buf) argument
348 get_new_tickets(krb5_context context, krb5_principal principal, krb5_ccache ccache, krb5_deltat ticket_life, int interactive) argument
651 ticket_lifetime(krb5_context context, krb5_ccache cache, krb5_principal client, const char *server) argument
688 krb5_context context; member in struct:renew_ctx
728 krb5_context context; local
[all...]
/freebsd-10.2-release/crypto/heimdal/lib/gssapi/krb5/
H A Daccept_sec_context.c40 validate_keytab(krb5_context context, const char *name, krb5_keytab *id) argument
44 ret = krb5_kt_resolve(context, name, id);
48 ret = krb5_kt_have_content(context, *id);
50 krb5_kt_close(context, *id);
60 krb5_context context; local
65 ret = _gsskrb5_init(&context);
72 krb5_kt_close(context, _gsskrb5_keytab);
76 ret = krb5_kt_default(context, &_gsskrb5_keytab);
81 ret = validate_keytab(context, identity, &_gsskrb5_keytab);
92 ret = validate_keytab(context,
105 _gsskrb5i_is_cfx(krb5_context context, gsskrb5_ctx ctx, int acceptor) argument
152 gsskrb5_accept_delegated_token(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, gss_cred_id_t * delegated_cred_handle ) argument
232 gsskrb5_acceptor_ready(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, gss_cred_id_t *delegated_cred_handle) argument
287 send_error_token(OM_uint32 *minor_status, krb5_context context, krb5_error_code kret, krb5_principal server, krb5_data *indata, gss_buffer_t output_token) argument
347 gsskrb5_acceptor_start(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, const gss_cred_id_t acceptor_cred_handle, const gss_buffer_t input_token_buffer, const gss_channel_bindings_t input_chan_bindings, gss_name_t * src_name, gss_OID * mech_type, gss_buffer_t output_token, OM_uint32 * ret_flags, OM_uint32 * time_rec, gss_cred_id_t * delegated_cred_handle) argument
675 acceptor_wait_for_dcestyle(OM_uint32 * minor_status, gsskrb5_ctx ctx, krb5_context context, const gss_cred_id_t acceptor_cred_handle, const gss_buffer_t input_token_buffer, const gss_channel_bindings_t input_chan_bindings, gss_name_t * src_name, gss_OID * mech_type, gss_buffer_t output_token, OM_uint32 * ret_flags, OM_uint32 * time_rec, gss_cred_id_t * delegated_cred_handle) argument
851 krb5_context context; local
[all...]
H A Dcontext_time.c38 krb5_context context,
50 kret = krb5_timeofday(context, &timeret);
71 krb5_context context; local
76 GSSAPI_KRB5_INIT (&context);
82 major_status = _gsskrb5_lifetime_left(minor_status, context,
37 _gsskrb5_lifetime_left(OM_uint32 *minor_status, krb5_context context, OM_uint32 lifetime, OM_uint32 *lifetime_rec) argument
/freebsd-10.2-release/contrib/ofed/libibverbs/examples/
H A Dpingpong.h41 uint16_t pp_get_local_lid(struct ibv_context *context, int port);
42 int pp_get_port_info(struct ibv_context *context, int port,
H A Dasyncwatch.c80 struct ibv_context *context; local
97 context = ibv_open_device(*dev_list);
98 if (!context) {
99 fprintf(stderr, "Couldn't get context for %s\n",
105 ibv_get_device_name(*dev_list), context->async_fd);
108 if (ibv_get_async_event(context, &event))
/freebsd-10.2-release/contrib/ntp/include/
H A Dintreswork.h18 void *context, const char *name,
25 const char *service, void *context);
/freebsd-10.2-release/contrib/apr-util/test/
H A Dtestmd4.c80 apr_md4_ctx_t context;
84 apr_md4_init(&context);
85 apr_md4_update(&context, (unsigned char *)string, len);
86 apr_md4_final(digest, &context);
94 apr_md4_ctx_t context; local
100 ABTS_ASSERT(tc, "apr_md4_init", (apr_md4_init(&context) == 0));
102 (apr_md4_update(&context,
105 ABTS_ASSERT(tc, "apr_md4_final", (apr_md4_final(digest, &context) ==0));
H A Dtestmd5.c54 apr_md5_ctx_t context; local
60 ABTS_ASSERT(tc, "apr_md5_init", (apr_md5_init(&context) == 0));
62 (apr_md5_update(&context, string, len) == 0));
63 ABTS_ASSERT(tc, "apr_md5_final", (apr_md5_final(digest, &context)
71 apr_md5_ctx_t context; local
81 ABTS_ASSERT(tc, "apr_md5_init", (apr_md5_init(&context) == 0));
84 (apr_md5_update(&context, string, strlen(string)) == 0));
87 ABTS_ASSERT(tc, "apr_md5_final", (apr_md5_final(digest, &context)
/freebsd-10.2-release/sys/mips/nlm/dev/net/ucore/
H A Ducore_app.c38 int intf, hw_parser_error, context;
49 context = (pktrdy >> 13) & 0x3ff;
/freebsd-10.2-release/crypto/heimdal/kadmin/
H A Ddel_enctype.c58 krb5_warnx (context, "out of memory");
63 ret = krb5_string_to_enctype (context, argv[i], &etypes[i]);
65 krb5_warnx (context, "bad enctype \"%s\"", argv[i]);
70 ret = krb5_parse_name(context, princ_name, &princ_ent);
72 krb5_warn (context, ret, "krb5_parse_name %s", princ_name);
79 krb5_free_principal (context, princ_ent);
80 krb5_warnx (context, "no such principal: %s", princ_name);
86 krb5_warnx (context, "out of memory");
114 krb5_warn(context, ret, "kadm5_modify_principal");
116 krb5_free_principal (context, princ_en
[all...]

Completed in 106 milliseconds

1234567891011>>