Searched refs:creds (Results 1 - 25 of 161) sorted by relevance

1234567

/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/
H A Drd_error.c73 const krb5_creds *creds)
84 if (creds != NULL) {
85 krb5_unparse_name_fixed(context, creds->client,
87 krb5_unparse_name_fixed(context, creds->server,
95 creds ? "(" : "",
96 creds ? clientname : "",
97 creds ? ")" : "");
102 creds ? "(" : "",
103 creds ? servername : "",
104 creds
71 krb5_error_from_rd_error(krb5_context context, const krb5_error *error, const krb5_creds *creds) argument
[all...]
H A Drd_cred.c180 "in received creds", ""));
202 "in received creds", ""));
211 "in received creds", ""));
246 /* Convert to NULL terminated list of creds */
260 krb5_creds *creds; local
262 creds = calloc(1, sizeof(*creds));
263 if(creds == NULL) {
270 ASN1_MALLOC_ENCODE(Ticket, creds->ticket.data, creds
333 krb5_creds **creds; local
[all...]
H A Dcreds.c183 * Return TRUE if `mcreds' and `creds' are equal (`whichfields'
191 * - KRB5_TC_MATCH_FLAGS Make sure that all ticket flags set in mcreds are also present in creds .
193 * - KRB5_TC_MATCH_TIMES Compares only the expiration times of the creds.
201 * @param creds cred to compare with.
203 * @return return TRUE if mcred and creds are equal, FALSE if not.
210 const krb5_creds * mcreds, const krb5_creds * creds)
217 creds->server);
220 creds->server);
226 creds->client);
229 creds
209 krb5_compare_creds(krb5_context context, krb5_flags whichfields, const krb5_creds * mcreds, const krb5_creds * creds) argument
282 krb5_creds_get_ticket_flags(krb5_creds *creds) argument
[all...]
H A Dstore.c1296 * @param creds the creds block to write.
1304 krb5_store_creds(krb5_storage *sp, krb5_creds *creds) argument
1308 ret = krb5_store_principal(sp, creds->client);
1311 ret = krb5_store_principal(sp, creds->server);
1314 ret = krb5_store_keyblock(sp, creds->session);
1317 ret = krb5_store_times(sp, creds->times);
1320 ret = krb5_store_int8(sp, creds->second_ticket.length != 0); /* is_skey */
1325 ret = krb5_store_int32(sp, creds->flags.i);
1327 ret = krb5_store_int32(sp, bitswap32(TicketFlags2int(creds
1356 krb5_ret_creds(krb5_storage *sp, krb5_creds *creds) argument
1428 krb5_store_creds_tag(krb5_storage *sp, krb5_creds *creds) argument
1520 krb5_ret_creds_tag(krb5_storage *sp, krb5_creds *creds) argument
[all...]
H A Dverify_init.c79 krb5_creds *creds,
138 creds->client);
143 creds);
148 if (!krb5_principal_compare (context, server, creds->server)) {
153 match_cred.client = creds->client;
166 creds = new_creds;
173 creds,
218 * @param creds the credentials to verify
230 krb5_creds *creds,
239 if (krb5_principal_compare(context, creds
78 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal ap_req_server, krb5_keytab ap_req_keytab, krb5_ccache *ccache, krb5_verify_init_creds_opt *options) argument
229 krb5_get_validated_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *service) argument
[all...]
H A Dmcache.c46 } *creds; member in struct:krb5_mcache
65 l = m->creds;
74 m->creds = NULL;
116 m->creds = NULL;
258 krb5_creds *creds)
273 l->next = m->creds;
274 m->creds = l;
276 ret = krb5_copy_creds_contents (context, creds, &l->cred);
278 m->creds = l->next;
310 *cursor = m->creds;
256 mcc_store_cred(krb5_context context, krb5_ccache id, krb5_creds *creds) argument
315 mcc_get_next(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument
441 struct link *creds; local
[all...]
H A Dticket.c658 krb5_creds *creds,
727 creds->session.keyvalue.length = 0;
728 creds->session.keyvalue.data = NULL;
729 creds->session.keytype = rep->enc_part.key.keytype;
730 ret = krb5_data_copy (&creds->session.keyvalue,
750 creds->client,
752 &creds->session);
758 krb5_free_principal (context, creds->client);
759 creds->client = tmp_principal;
772 creds
656 _krb5_extract_ticket(krb5_context context, krb5_kdc_rep *rep, krb5_creds *creds, krb5_keyblock *key, krb5_key_usage key_usage, krb5_addresses *addrs, unsigned nonce, unsigned flags, krb5_data *request, krb5_decrypt_proc decrypt_proc, krb5_const_pointer decryptarg) argument
[all...]
H A Dsendauth.c86 krb5_creds *creds; local
148 ret = krb5_get_credentials (context, 0, ccache, in_creds, &creds);
155 creds = in_creds;
163 creds,
167 *out_creds = creds;
169 krb5_free_creds(context, creds);
H A Dget_in_tkt.c147 krb5_creds *creds,
177 ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
180 ret = _krb5_principal2principalname (a->req_body.sname, creds->server);
183 ret = copy_Realm(&creds->client->realm, &a->req_body.realm);
187 if(creds->times.starttime) {
194 *a->req_body.from = creds->times.starttime;
196 if(creds->times.endtime){
198 *a->req_body.till = creds->times.endtime;
200 if(creds->times.renew_till){
207 *a->req_body.rtime = creds
145 init_as_req(krb5_context context, KDCOptions opts, krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *ptypes, const krb5_preauthdata *preauth, krb5_key_proc key_proc, krb5_const_pointer keyseed, unsigned nonce, AS_REQ *a) argument
[all...]
H A Dchangepw.c38 krb5_creds *creds; member in struct:request
74 request->creds,
157 request->creds,
373 * change the password using the credentials in `creds' (for the
432 realm = request->creds->client->realm;
450 if (request->creds->ticket.length > 700) {
452 (unsigned long)request->creds->ticket.length);
501 * @param creds
514 krb5_creds *creds,
533 request.creds
566 krb5_set_password(krb5_context context, krb5_creds *creds, const char *newpw, krb5_principal targprinc, int *result_code, krb5_data *result_code_string, krb5_data *result_string) argument
638 krb5_creds creds, *credsp = NULL; local
[all...]
/macosx-10.9.5/libtelnet-13/
H A Dforward.c34 /* Decode, decrypt and store the forwarded creds in the local ccache. */
42 krb5_creds **creds; local
50 if ((retval = krb5_rd_cred(context, auth_context, inbuf, &creds, NULL)))
62 if ((retval = krb5_cc_store_cred(context, ccache, *creds)))
66 krb5_free_creds(context, *creds);
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utilities/
H A Dcssmacl.h56 void credentials(const CSSM_ACCESS_CREDENTIALS *creds) argument
57 { AccessCred = const_cast<CSSM_ACCESS_CREDENTIALS *>(creds); }
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utilities/lib/
H A Dcssmacl.h56 void credentials(const CSSM_ACCESS_CREDENTIALS *creds) argument
57 { AccessCred = const_cast<CSSM_ACCESS_CREDENTIALS *>(creds); }
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/contrib/slapd-modules/kinit/
H A Dkinit.c58 krb5_creds creds; local
82 while (!(rc = krb5_cc_next_cred(kid->ctx, kid->ccache, &cursor, &creds))) {
83 if (krb5_is_config_principal(kid->ctx, creds.server)) {
84 krb5_free_cred_contents(kid->ctx, &creds);
88 if (creds.server->length==2 &&
89 (!strcmp(creds.server->data[0].data, "krbtgt")) &&
90 (!strcmp(creds.server->data[1].data, princ->realm.data))) {
92 krb5_unparse_name(kid->ctx, creds.server, &name);
94 *remaining = (time_t)creds.times.endtime-now;
106 if (creds
138 krb5_creds creds; local
[all...]
/macosx-10.9.5/dcerpc-58/dcerpc/include/dce/
H A Dsmb.idl101 [in] void* creds,
/macosx-10.9.5/OpenSSH-186/openssh/
H A Dplatform.c113 * If we have both LOGIN_CAP and PAM, we want to establish creds
167 * If we have a chroot directory, we set all creds except real
172 char **creds = NULL, *chroot_creds[] = local
177 creds = chroot_creds;
179 if (setpcred(pw->pw_name, creds) == -1)
/macosx-10.9.5/Heimdal-323.92.1/kcm/
H A Dglue.c115 krb5_creds *creds)
122 ret = kcm_ccache_store_cred_internal(context, c, creds, NULL, 1);
132 krb5_creds *creds)
145 ret = krb5_copy_creds_contents(context, credp, creds);
177 *cursor = c->creds;
186 krb5_creds *creds)
195 creds);
113 kcmss_store_cred(krb5_context context, krb5_ccache id, krb5_creds *creds) argument
128 kcmss_retrieve(krb5_context context, krb5_ccache id, krb5_flags which, const krb5_creds *mcred, krb5_creds *creds) argument
183 kcmss_get_next(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument
/macosx-10.9.5/MITKerberosShim-62.1/
H A Dgic.c174 mit_krb5_creds *creds,
193 memset(creds, 0, sizeof(*creds));
213 mshim_hcred2mcred(HC(context), &hcreds, creds);
222 mit_krb5_creds *creds,
238 memset(creds, 0, sizeof(*creds));
249 mshim_hcred2mcred(HC(context), &hcreds, creds);
316 mit_krb5_creds *creds,
333 mshim_mcred2hcred(HC(context), creds, local
173 krb5_get_init_creds_password(mit_krb5_context context, mit_krb5_creds *creds, mit_krb5_principal client, char *password, mit_krb5_prompter_fct prompter, void *data, mit_krb5_deltat start_time, char *in_tkt_service, mit_krb5_get_init_creds_opt *mopt) argument
221 krb5_get_init_creds_keytab(mit_krb5_context context, mit_krb5_creds *creds, mit_krb5_principal client, mit_krb5_keytab arg_keytab, mit_krb5_deltat start_time, char *in_tkt_service, mit_krb5_get_init_creds_opt *mopt) argument
315 krb5_verify_init_creds(mit_krb5_context context, mit_krb5_creds *creds, mit_krb5_principal ap_req_server, mit_krb5_keytab ap_req_keytab, mit_krb5_ccache *ccache, mit_krb5_verify_init_creds_opt *options) argument
[all...]
H A Dcreds.c71 mit_krb5_creds **creds)
85 *creds = calloc(1, sizeof(**creds));
86 mshim_hcred2mcred(HC(context), hcreds, *creds); local
67 krb5_get_credentials(mit_krb5_context context, mit_krb5_flags flags, mit_krb5_ccache id, mit_krb5_creds *mcreds, mit_krb5_creds **creds) argument
H A Dcache.c67 mit_krb5_creds *creds)
72 mshim_mcred2hcred(HC(context), creds, &hcred); local
185 mit_krb5_creds *creds)
193 memset(creds, 0, sizeof(*creds));
203 mshim_hcred2mcred(HC(context), &hcreds, creds); local
214 mit_krb5_creds *creds)
223 mshim_hcred2mcred(HC(context), &c, creds); local
65 krb5_cc_store_cred(mit_krb5_context context, mit_krb5_ccache cache, mit_krb5_creds *creds) argument
181 krb5_cc_retrieve_cred(mit_krb5_context context, mit_krb5_ccache cache, mit_krb5_flags flags, mit_krb5_creds *mcreds, mit_krb5_creds *creds) argument
211 krb5_cc_next_cred(mit_krb5_context context, mit_krb5_ccache cache, mit_krb5_cc_cursor *cursor, mit_krb5_creds *creds) argument
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/contrib/slapd-modules/passwd/
H A Dkerberos.c103 krb5_creds creds; local
133 &creds, client, cred->bv_val, NULL,
164 &creds, server, NULL, NULL, &verify_options );
168 krb5_free_cred_contents( context, &creds );
/macosx-10.9.5/webdavfs-352.92.2/webdavlib/
H A Dwebdavlib.h79 // enum WEBDAVLIBAuthStatus connectToServer(CFURLRef a_url, CFDictionaryRef creds, boolean_t requireSecureLogin, int *error)
86 // in the 'creds' input argument. The input keys are:
122 extern enum WEBDAVLIBAuthStatus connectToServer(CFURLRef a_url, CFDictionaryRef creds, boolean_t requireSecureLogin, int *error);
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/tests/progs/
H A Dslapd-bind.c426 struct berval *creds = NULL; local
483 creds = realloc( creds, (ndns + 1)*sizeof(struct berval) );
486 creds[ndns].bv_len = 0;
487 creds[ndns].bv_val = nullstr;
509 ber_dupbv( &creds[ndns], &value );
553 if ( creds && !BER_BVISEMPTY( &creds[j] ) ) {
554 cred = creds[j];
599 if ( creds ) {
[all...]
/macosx-10.9.5/Heimdal-323.92.1/appl/kf/
H A Dkf.c120 * forward creds to `hostname'/`service' over `sock'
135 krb5_creds creds; local
204 memset (&creds, 0, sizeof(creds));
220 creds.client = principal;
223 &creds.server,
235 creds.times.endtime = 0;
246 &creds,
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/krb5/
H A Dcreds.c71 krb5_creds *creds; local
81 &creds);
88 ret = krb5_store_creds(sp, creds);
89 krb5_free_creds(context, creds);
196 krb5_creds creds; local
198 ret = krb5_ret_creds(sp, &creds);
211 ret = krb5_cc_initialize(context, id, creds.client);
218 ret = krb5_cc_store_cred(context, id, &creds);
219 krb5_free_cred_contents(context, &creds);

Completed in 364 milliseconds

1234567