/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | rd_error.c | 73 const krb5_creds *creds) 84 if (creds != NULL) { 85 krb5_unparse_name_fixed(context, creds->client, 87 krb5_unparse_name_fixed(context, creds->server, 95 creds ? "(" : "", 96 creds ? clientname : "", 97 creds ? ")" : ""); 102 creds ? "(" : "", 103 creds ? servername : "", 104 creds 71 krb5_error_from_rd_error(krb5_context context, const krb5_error *error, const krb5_creds *creds) argument [all...] |
H A D | rd_cred.c | 180 "in received creds", "")); 202 "in received creds", "")); 211 "in received creds", "")); 246 /* Convert to NULL terminated list of creds */ 260 krb5_creds *creds; local 262 creds = calloc(1, sizeof(*creds)); 263 if(creds == NULL) { 270 ASN1_MALLOC_ENCODE(Ticket, creds->ticket.data, creds 333 krb5_creds **creds; local [all...] |
H A D | creds.c | 183 * Return TRUE if `mcreds' and `creds' are equal (`whichfields' 191 * - KRB5_TC_MATCH_FLAGS Make sure that all ticket flags set in mcreds are also present in creds . 193 * - KRB5_TC_MATCH_TIMES Compares only the expiration times of the creds. 201 * @param creds cred to compare with. 203 * @return return TRUE if mcred and creds are equal, FALSE if not. 210 const krb5_creds * mcreds, const krb5_creds * creds) 217 creds->server); 220 creds->server); 226 creds->client); 229 creds 209 krb5_compare_creds(krb5_context context, krb5_flags whichfields, const krb5_creds * mcreds, const krb5_creds * creds) argument 282 krb5_creds_get_ticket_flags(krb5_creds *creds) argument [all...] |
H A D | store.c | 1296 * @param creds the creds block to write. 1304 krb5_store_creds(krb5_storage *sp, krb5_creds *creds) argument 1308 ret = krb5_store_principal(sp, creds->client); 1311 ret = krb5_store_principal(sp, creds->server); 1314 ret = krb5_store_keyblock(sp, creds->session); 1317 ret = krb5_store_times(sp, creds->times); 1320 ret = krb5_store_int8(sp, creds->second_ticket.length != 0); /* is_skey */ 1325 ret = krb5_store_int32(sp, creds->flags.i); 1327 ret = krb5_store_int32(sp, bitswap32(TicketFlags2int(creds 1356 krb5_ret_creds(krb5_storage *sp, krb5_creds *creds) argument 1428 krb5_store_creds_tag(krb5_storage *sp, krb5_creds *creds) argument 1520 krb5_ret_creds_tag(krb5_storage *sp, krb5_creds *creds) argument [all...] |
H A D | verify_init.c | 79 krb5_creds *creds, 138 creds->client); 143 creds); 148 if (!krb5_principal_compare (context, server, creds->server)) { 153 match_cred.client = creds->client; 166 creds = new_creds; 173 creds, 218 * @param creds the credentials to verify 230 krb5_creds *creds, 239 if (krb5_principal_compare(context, creds 78 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal ap_req_server, krb5_keytab ap_req_keytab, krb5_ccache *ccache, krb5_verify_init_creds_opt *options) argument 229 krb5_get_validated_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *service) argument [all...] |
H A D | mcache.c | 46 } *creds; member in struct:krb5_mcache 65 l = m->creds; 74 m->creds = NULL; 116 m->creds = NULL; 258 krb5_creds *creds) 273 l->next = m->creds; 274 m->creds = l; 276 ret = krb5_copy_creds_contents (context, creds, &l->cred); 278 m->creds = l->next; 310 *cursor = m->creds; 256 mcc_store_cred(krb5_context context, krb5_ccache id, krb5_creds *creds) argument 315 mcc_get_next(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument 441 struct link *creds; local [all...] |
H A D | ticket.c | 658 krb5_creds *creds, 727 creds->session.keyvalue.length = 0; 728 creds->session.keyvalue.data = NULL; 729 creds->session.keytype = rep->enc_part.key.keytype; 730 ret = krb5_data_copy (&creds->session.keyvalue, 750 creds->client, 752 &creds->session); 758 krb5_free_principal (context, creds->client); 759 creds->client = tmp_principal; 772 creds 656 _krb5_extract_ticket(krb5_context context, krb5_kdc_rep *rep, krb5_creds *creds, krb5_keyblock *key, krb5_key_usage key_usage, krb5_addresses *addrs, unsigned nonce, unsigned flags, krb5_data *request, krb5_decrypt_proc decrypt_proc, krb5_const_pointer decryptarg) argument [all...] |
H A D | sendauth.c | 86 krb5_creds *creds; local 148 ret = krb5_get_credentials (context, 0, ccache, in_creds, &creds); 155 creds = in_creds; 163 creds, 167 *out_creds = creds; 169 krb5_free_creds(context, creds);
|
H A D | get_in_tkt.c | 147 krb5_creds *creds, 177 ret = _krb5_principal2principalname (a->req_body.cname, creds->client); 180 ret = _krb5_principal2principalname (a->req_body.sname, creds->server); 183 ret = copy_Realm(&creds->client->realm, &a->req_body.realm); 187 if(creds->times.starttime) { 194 *a->req_body.from = creds->times.starttime; 196 if(creds->times.endtime){ 198 *a->req_body.till = creds->times.endtime; 200 if(creds->times.renew_till){ 207 *a->req_body.rtime = creds 145 init_as_req(krb5_context context, KDCOptions opts, krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *ptypes, const krb5_preauthdata *preauth, krb5_key_proc key_proc, krb5_const_pointer keyseed, unsigned nonce, AS_REQ *a) argument [all...] |
H A D | changepw.c | 38 krb5_creds *creds; member in struct:request 74 request->creds, 157 request->creds, 373 * change the password using the credentials in `creds' (for the 432 realm = request->creds->client->realm; 450 if (request->creds->ticket.length > 700) { 452 (unsigned long)request->creds->ticket.length); 501 * @param creds 514 krb5_creds *creds, 533 request.creds 566 krb5_set_password(krb5_context context, krb5_creds *creds, const char *newpw, krb5_principal targprinc, int *result_code, krb5_data *result_code_string, krb5_data *result_string) argument 638 krb5_creds creds, *credsp = NULL; local [all...] |
/macosx-10.9.5/libtelnet-13/ |
H A D | forward.c | 34 /* Decode, decrypt and store the forwarded creds in the local ccache. */ 42 krb5_creds **creds; local 50 if ((retval = krb5_rd_cred(context, auth_context, inbuf, &creds, NULL))) 62 if ((retval = krb5_cc_store_cred(context, ccache, *creds))) 66 krb5_free_creds(context, *creds);
|
/macosx-10.9.5/Security-55471.14.18/include/security_cdsa_utilities/ |
H A D | cssmacl.h | 56 void credentials(const CSSM_ACCESS_CREDENTIALS *creds) argument 57 { AccessCred = const_cast<CSSM_ACCESS_CREDENTIALS *>(creds); }
|
/macosx-10.9.5/Security-55471.14.18/libsecurity_cdsa_utilities/lib/ |
H A D | cssmacl.h | 56 void credentials(const CSSM_ACCESS_CREDENTIALS *creds) argument 57 { AccessCred = const_cast<CSSM_ACCESS_CREDENTIALS *>(creds); }
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/contrib/slapd-modules/kinit/ |
H A D | kinit.c | 58 krb5_creds creds; local 82 while (!(rc = krb5_cc_next_cred(kid->ctx, kid->ccache, &cursor, &creds))) { 83 if (krb5_is_config_principal(kid->ctx, creds.server)) { 84 krb5_free_cred_contents(kid->ctx, &creds); 88 if (creds.server->length==2 && 89 (!strcmp(creds.server->data[0].data, "krbtgt")) && 90 (!strcmp(creds.server->data[1].data, princ->realm.data))) { 92 krb5_unparse_name(kid->ctx, creds.server, &name); 94 *remaining = (time_t)creds.times.endtime-now; 106 if (creds 138 krb5_creds creds; local [all...] |
/macosx-10.9.5/dcerpc-58/dcerpc/include/dce/ |
H A D | smb.idl | 101 [in] void* creds,
|
/macosx-10.9.5/OpenSSH-186/openssh/ |
H A D | platform.c | 113 * If we have both LOGIN_CAP and PAM, we want to establish creds 167 * If we have a chroot directory, we set all creds except real 172 char **creds = NULL, *chroot_creds[] = local 177 creds = chroot_creds; 179 if (setpcred(pw->pw_name, creds) == -1)
|
/macosx-10.9.5/Heimdal-323.92.1/kcm/ |
H A D | glue.c | 115 krb5_creds *creds) 122 ret = kcm_ccache_store_cred_internal(context, c, creds, NULL, 1); 132 krb5_creds *creds) 145 ret = krb5_copy_creds_contents(context, credp, creds); 177 *cursor = c->creds; 186 krb5_creds *creds) 195 creds); 113 kcmss_store_cred(krb5_context context, krb5_ccache id, krb5_creds *creds) argument 128 kcmss_retrieve(krb5_context context, krb5_ccache id, krb5_flags which, const krb5_creds *mcred, krb5_creds *creds) argument 183 kcmss_get_next(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument
|
/macosx-10.9.5/MITKerberosShim-62.1/ |
H A D | gic.c | 174 mit_krb5_creds *creds, 193 memset(creds, 0, sizeof(*creds)); 213 mshim_hcred2mcred(HC(context), &hcreds, creds); 222 mit_krb5_creds *creds, 238 memset(creds, 0, sizeof(*creds)); 249 mshim_hcred2mcred(HC(context), &hcreds, creds); 316 mit_krb5_creds *creds, 333 mshim_mcred2hcred(HC(context), creds, local 173 krb5_get_init_creds_password(mit_krb5_context context, mit_krb5_creds *creds, mit_krb5_principal client, char *password, mit_krb5_prompter_fct prompter, void *data, mit_krb5_deltat start_time, char *in_tkt_service, mit_krb5_get_init_creds_opt *mopt) argument 221 krb5_get_init_creds_keytab(mit_krb5_context context, mit_krb5_creds *creds, mit_krb5_principal client, mit_krb5_keytab arg_keytab, mit_krb5_deltat start_time, char *in_tkt_service, mit_krb5_get_init_creds_opt *mopt) argument 315 krb5_verify_init_creds(mit_krb5_context context, mit_krb5_creds *creds, mit_krb5_principal ap_req_server, mit_krb5_keytab ap_req_keytab, mit_krb5_ccache *ccache, mit_krb5_verify_init_creds_opt *options) argument [all...] |
H A D | creds.c | 71 mit_krb5_creds **creds) 85 *creds = calloc(1, sizeof(**creds)); 86 mshim_hcred2mcred(HC(context), hcreds, *creds); local 67 krb5_get_credentials(mit_krb5_context context, mit_krb5_flags flags, mit_krb5_ccache id, mit_krb5_creds *mcreds, mit_krb5_creds **creds) argument
|
H A D | cache.c | 67 mit_krb5_creds *creds) 72 mshim_mcred2hcred(HC(context), creds, &hcred); local 185 mit_krb5_creds *creds) 193 memset(creds, 0, sizeof(*creds)); 203 mshim_hcred2mcred(HC(context), &hcreds, creds); local 214 mit_krb5_creds *creds) 223 mshim_hcred2mcred(HC(context), &c, creds); local 65 krb5_cc_store_cred(mit_krb5_context context, mit_krb5_ccache cache, mit_krb5_creds *creds) argument 181 krb5_cc_retrieve_cred(mit_krb5_context context, mit_krb5_ccache cache, mit_krb5_flags flags, mit_krb5_creds *mcreds, mit_krb5_creds *creds) argument 211 krb5_cc_next_cred(mit_krb5_context context, mit_krb5_ccache cache, mit_krb5_cc_cursor *cursor, mit_krb5_creds *creds) argument
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/contrib/slapd-modules/passwd/ |
H A D | kerberos.c | 103 krb5_creds creds; local 133 &creds, client, cred->bv_val, NULL, 164 &creds, server, NULL, NULL, &verify_options ); 168 krb5_free_cred_contents( context, &creds );
|
/macosx-10.9.5/webdavfs-352.92.2/webdavlib/ |
H A D | webdavlib.h | 79 // enum WEBDAVLIBAuthStatus connectToServer(CFURLRef a_url, CFDictionaryRef creds, boolean_t requireSecureLogin, int *error) 86 // in the 'creds' input argument. The input keys are: 122 extern enum WEBDAVLIBAuthStatus connectToServer(CFURLRef a_url, CFDictionaryRef creds, boolean_t requireSecureLogin, int *error);
|
/macosx-10.9.5/OpenLDAP-491.1/OpenLDAP/tests/progs/ |
H A D | slapd-bind.c | 426 struct berval *creds = NULL; local 483 creds = realloc( creds, (ndns + 1)*sizeof(struct berval) ); 486 creds[ndns].bv_len = 0; 487 creds[ndns].bv_val = nullstr; 509 ber_dupbv( &creds[ndns], &value ); 553 if ( creds && !BER_BVISEMPTY( &creds[j] ) ) { 554 cred = creds[j]; 599 if ( creds ) { [all...] |
/macosx-10.9.5/Heimdal-323.92.1/appl/kf/ |
H A D | kf.c | 120 * forward creds to `hostname'/`service' over `sock' 135 krb5_creds creds; local 204 memset (&creds, 0, sizeof(creds)); 220 creds.client = principal; 223 &creds.server, 235 creds.times.endtime = 0; 246 &creds,
|
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/krb5/ |
H A D | creds.c | 71 krb5_creds *creds; local 81 &creds); 88 ret = krb5_store_creds(sp, creds); 89 krb5_free_creds(context, creds); 196 krb5_creds creds; local 198 ret = krb5_ret_creds(sp, &creds); 211 ret = krb5_cc_initialize(context, id, creds.client); 218 ret = krb5_cc_store_cred(context, id, &creds); 219 krb5_free_cred_contents(context, &creds);
|