Searched refs:creds (Results 1 - 25 of 77) sorted by relevance

1234

/freebsd-11-stable/tools/regression/security/proc_to_proc/
H A Dscenario.c70 static struct cred creds[] = { variable in typeref:struct:cred
94 { &creds[0], &creds[0], 0, 0, 0, 0, 0, 0, "0. priv on priv"},
95 { &creds[0], &creds[1], 0, 0, 0, 0, 0, 0, "1. priv on priv"},
96 { &creds[1], &creds[0], 0, 0, 0, 0, 0, 0, "2. priv on priv"},
97 { &creds[1], &creds[1], 0, 0, 0, 0, 0, 0, "3. priv on priv"},
99 { &creds[
[all...]
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Drd_error.c73 const krb5_creds *creds)
83 if (creds != NULL) {
84 krb5_unparse_name_fixed(context, creds->client,
86 krb5_unparse_name_fixed(context, creds->server,
94 creds ? "(" : "",
95 creds ? clientname : "",
96 creds ? ")" : "");
101 creds ? "(" : "",
102 creds ? servername : "",
103 creds
71 krb5_error_from_rd_error(krb5_context context, const krb5_error *error, const krb5_creds *creds) argument
[all...]
H A Drd_cred.c180 "in received creds", ""));
202 "in received creds", ""));
211 "in received creds", ""));
246 /* Convert to NULL terminated list of creds */
260 krb5_creds *creds; local
262 creds = calloc(1, sizeof(*creds));
263 if(creds == NULL) {
270 ASN1_MALLOC_ENCODE(Ticket, creds->ticket.data, creds
333 krb5_creds **creds; local
[all...]
H A Dcreds.c183 * Return TRUE if `mcreds' and `creds' are equal (`whichfields'
191 * - KRB5_TC_MATCH_FLAGS Make sure that all ticket flags set in mcreds are also present in creds .
193 * - KRB5_TC_MATCH_TIMES Compares only the expiration times of the creds.
201 * @param creds cred to compare with.
203 * @return return TRUE if mcred and creds are equal, FALSE if not.
210 const krb5_creds * mcreds, const krb5_creds * creds)
217 creds->server);
220 creds->server);
226 creds->client);
229 creds
209 krb5_compare_creds(krb5_context context, krb5_flags whichfields, const krb5_creds * mcreds, const krb5_creds * creds) argument
282 krb5_creds_get_ticket_flags(krb5_creds *creds) argument
[all...]
H A Dstore.c1296 * @param creds the creds block to write.
1304 krb5_store_creds(krb5_storage *sp, krb5_creds *creds) argument
1308 ret = krb5_store_principal(sp, creds->client);
1311 ret = krb5_store_principal(sp, creds->server);
1314 ret = krb5_store_keyblock(sp, creds->session);
1317 ret = krb5_store_times(sp, creds->times);
1320 ret = krb5_store_int8(sp, creds->second_ticket.length != 0); /* is_skey */
1325 ret = krb5_store_int32(sp, creds->flags.i);
1327 ret = krb5_store_int32(sp, bitswap32(TicketFlags2int(creds
1356 krb5_ret_creds(krb5_storage *sp, krb5_creds *creds) argument
1428 krb5_store_creds_tag(krb5_storage *sp, krb5_creds *creds) argument
1520 krb5_ret_creds_tag(krb5_storage *sp, krb5_creds *creds) argument
[all...]
H A Dverify_init.c72 krb5_creds *creds,
124 creds->client);
129 creds);
134 if (!krb5_principal_compare (context, server, creds->server)) {
139 match_cred.client = creds->client;
152 creds = new_creds;
159 creds,
204 * @param creds the credentials to verify
216 krb5_creds *creds,
225 if (krb5_principal_compare(context, creds
71 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal ap_req_server, krb5_keytab ap_req_keytab, krb5_ccache *ccache, krb5_verify_init_creds_opt *options) argument
215 krb5_get_validated_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *service) argument
[all...]
H A Dticket.c652 krb5_creds *creds,
679 creds->session.keyvalue.length = 0;
680 creds->session.keyvalue.data = NULL;
681 creds->session.keytype = rep->enc_part.key.keytype;
682 ret = krb5_data_copy (&creds->session.keyvalue,
702 creds->client,
704 &creds->session);
710 krb5_free_principal (context, creds->client);
711 creds->client = tmp_principal;
724 creds
650 _krb5_extract_ticket(krb5_context context, krb5_kdc_rep *rep, krb5_creds *creds, krb5_keyblock *key, krb5_const_pointer keyseed, krb5_key_usage key_usage, krb5_addresses *addrs, unsigned nonce, unsigned flags, krb5_decrypt_proc decrypt_proc, krb5_const_pointer decryptarg) argument
[all...]
H A Dmcache.c46 } *creds; member in struct:krb5_mcache
98 m->creds = NULL;
220 l = m->creds;
229 m->creds = NULL;
237 krb5_creds *creds)
252 l->next = m->creds;
253 m->creds = l;
255 ret = krb5_copy_creds_contents (context, creds, &l->cred);
257 m->creds = l->next;
289 *cursor = m->creds;
235 mcc_store_cred(krb5_context context, krb5_ccache id, krb5_creds *creds) argument
294 mcc_get_next(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument
420 struct link *creds; local
[all...]
H A Dsendauth.c85 krb5_creds *creds; local
147 ret = krb5_get_credentials (context, 0, ccache, in_creds, &creds);
154 creds = in_creds;
162 creds,
166 *out_creds = creds;
168 krb5_free_creds(context, creds);
H A Dget_in_tkt.c147 krb5_creds *creds,
177 ret = _krb5_principal2principalname (a->req_body.cname, creds->client);
180 ret = _krb5_principal2principalname (a->req_body.sname, creds->server);
183 ret = copy_Realm(&creds->client->realm, &a->req_body.realm);
187 if(creds->times.starttime) {
194 *a->req_body.from = creds->times.starttime;
196 if(creds->times.endtime){
198 *a->req_body.till = creds->times.endtime;
200 if(creds->times.renew_till){
207 *a->req_body.rtime = creds
145 init_as_req(krb5_context context, KDCOptions opts, krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *ptypes, const krb5_preauthdata *preauth, krb5_key_proc key_proc, krb5_const_pointer keyseed, unsigned nonce, AS_REQ *a) argument
[all...]
H A Dchangepw.c70 krb5_creds *creds,
90 krb5_principal_compare(context, creds->client, targprinc) != TRUE)
99 creds,
162 krb5_creds *creds,
186 creds,
455 * change the password using the credentials in `creds' (for the
506 krb5_creds *creds,
526 realm = creds->client->realm;
592 creds,
676 * @param creds
68 chgpw_send_request(krb5_context context, krb5_auth_context *auth_context, krb5_creds *creds, krb5_principal targprinc, int is_stream, rk_socket_t sock, const char *passwd, const char *host) argument
160 setpw_send_request(krb5_context context, krb5_auth_context *auth_context, krb5_creds *creds, krb5_principal targprinc, int is_stream, rk_socket_t sock, const char *passwd, const char *host) argument
505 change_password_loop(krb5_context context, krb5_creds *creds, krb5_principal targprinc, const char *newpw, int *result_code, krb5_data *result_code_string, krb5_data *result_string, struct kpwd_proc *proc) argument
730 krb5_set_password(krb5_context context, krb5_creds *creds, const char *newpw, krb5_principal targprinc, int *result_code, krb5_data *result_code_string, krb5_data *result_string) argument
781 krb5_creds creds, *credsp; local
[all...]
H A Ddeprecated.c229 krb5_creds *creds,
242 creds,
271 krb5_creds *creds,
283 creds,
295 creds,
354 krb5_creds *creds,
360 a.principal = creds->client;
372 creds,
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/
H A Dinternal_auth.c78 void *creds; local
96 SVN_ERR(svn_auth_first_credentials(&creds, &iterstate,
99 if (!creds)
102 while (creds)
104 user = ((svn_auth_cred_simple_t *) creds)->username;
105 password = ((svn_auth_cred_simple_t *) creds)->password;
110 SVN_ERR(svn_auth_next_credentials(&creds, iterstate, pool));
112 if (!creds)
/freebsd-11-stable/contrib/subversion/subversion/include/private/
H A Dsvn_auth_private.h80 apr_hash_t *creds,
95 apr_hash_t *creds,
149 apr_hash_t *creds,
160 apr_hash_t *creds,
215 apr_hash_t *creds,
226 apr_hash_t *creds,
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/
H A Dusername_providers.c69 we failed to get the creds, so allow the auth system to try the
89 svn_auth_cred_simple_t *creds = apr_pcalloc(pool, sizeof(*creds));
90 creds->username = username;
91 creds->may_save = may_save;
92 *credentials = creds;
111 svn_auth_cred_simple_t *creds = credentials;
118 if (! creds->may_save)
126 svn_string_create(creds->username, pool));
87 svn_auth_cred_simple_t *creds = apr_pcalloc(pool, sizeof(*creds)); local
109 svn_auth_cred_simple_t *creds = credentials; local
H A Dssl_server_trust_providers.c88 /* If all failures are cleared now, we return the creds */
91 svn_auth_cred_ssl_server_trust_t *creds =
92 apr_pcalloc(pool, sizeof(*creds));
93 creds->may_save = FALSE; /* No need to save it again... */
94 *credentials = creds;
109 svn_auth_cred_ssl_server_trust_t *creds = credentials;
114 if (! creds->may_save)
126 (unsigned long)creds->accepted_failures));
163 /* Baton type for prompting to verify server ssl creds.
90 svn_auth_cred_ssl_server_trust_t *creds = local
108 svn_auth_cred_ssl_server_trust_t *creds = credentials; local
H A Dsimple_providers.c70 apr_hash_t *creds,
81 str = svn_hash_gets(creds, SVN_CONFIG_AUTHN_USERNAME_KEY);
84 str = svn_hash_gets(creds, SVN_CONFIG_AUTHN_PASSWORD_KEY);
99 apr_hash_t *creds,
107 svn_hash_sets(creds, SVN_CONFIG_AUTHN_PASSWORD_KEY,
118 apr_hash_t *creds,
123 str = svn_hash_gets(creds, SVN_CONFIG_AUTHN_USERNAME_KEY);
168 we failed to get the creds, so allow the auth system to try the
283 svn_auth_cred_simple_t *creds = apr_pcalloc(pool, sizeof(*creds));
65 svn_auth__simple_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
95 svn_auth__simple_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
114 simple_username_get(const char **username, apr_hash_t *creds, const char *realmstring, svn_boolean_t non_interactive) argument
280 svn_auth_cred_simple_t *creds = apr_pcalloc(pool, sizeof(*creds)); local
305 svn_auth_cred_simple_t *creds = credentials; local
[all...]
H A Dwin32_crypto.c115 apr_hash_t *creds,
129 SVN_ERR(svn_auth__simple_password_set(done, creds, realmstring, username,
143 apr_hash_t *creds,
153 SVN_ERR(svn_auth__simple_password_get(done, &in, creds, realmstring, username,
239 apr_hash_t *creds,
253 SVN_ERR(svn_auth__ssl_client_cert_pw_set(done, creds, realmstring,
268 apr_hash_t *creds,
278 SVN_ERR(svn_auth__ssl_client_cert_pw_get(done, &in, creds, realmstring,
481 /* If all failures are cleared now, we return the creds */
484 svn_auth_cred_ssl_server_trust_t *creds
112 windows_password_encrypter(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *in, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
139 windows_password_decrypter(svn_boolean_t *done, const char **out, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
235 windows_ssl_client_cert_pw_encrypter(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *in, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
263 windows_ssl_client_cert_pw_decrypter(svn_boolean_t *done, const char **out, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument
480 svn_auth_cred_ssl_server_trust_t *creds = local
[all...]
H A Dauth.c123 svn_boolean_t got_first; /* did we get the provider's first creds? */
237 void *creds = NULL; local
275 /* First, see if we have cached creds in the auth_baton. */
277 creds = svn_hash_gets(auth_baton->creds_cache, cache_key);
278 if (creds)
290 SVN_ERR(provider->vtable->first_credentials(&creds, &iter_baton,
296 if (creds != NULL)
304 if (! creds)
322 /* Put the creds in the cache */
325 creds);
342 void *creds = NULL; local
396 void *creds; local
[all...]
/freebsd-11-stable/crypto/openssh/
H A Dplatform.c122 * If we have both LOGIN_CAP and PAM, we want to establish creds
170 * If we have a chroot directory, we set all creds except real
175 char **creds = NULL, *chroot_creds[] = local
180 creds = chroot_creds;
182 if (setpcred(pw->pw_name, creds) == -1)
H A Dssh-gss.h75 gss_cred_id_t creds; member in struct:__anon6157
96 gss_cred_id_t creds; /* server */ member in struct:__anon6158
/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/
H A Dcreds.c64 krb5_creds *creds; local
74 &creds);
81 ret = krb5_store_creds(sp, creds);
82 krb5_free_creds(context, creds);
189 krb5_creds creds; local
191 ret = krb5_ret_creds(sp, &creds);
204 ret = krb5_cc_initialize(context, id, creds.client);
211 ret = krb5_cc_store_cred(context, id, &creds);
212 krb5_free_cred_contents(context, &creds);
/freebsd-11-stable/crypto/heimdal/kcm/
H A Dcache.c164 for (k = p->creds; k != NULL; k = k->next)
318 slot->creds = NULL;
346 k = ccache->creds;
355 ccache->creds = NULL;
489 if (ccache->creds == NULL) {
500 krb5_creds *creds,
509 ret = kcm_ccache_store_cred_internal(context, ccache, creds, copy, &tmp);
522 for (c = ccache->creds; c != NULL; c = c->next)
534 krb5_creds *creds,
541 for (c = &ccache->creds; *
498 kcm_ccache_store_cred(krb5_context context, kcm_ccache ccache, krb5_creds *creds, int copy) argument
532 kcm_ccache_store_cred_internal(krb5_context context, kcm_ccache ccache, krb5_creds *creds, int copy, krb5_creds **credp) argument
611 kcm_ccache_retrieve_cred_internal(krb5_context context, kcm_ccache ccache, krb5_flags whichfields, const krb5_creds *mcreds, krb5_creds **creds) argument
[all...]
H A Dglue.c117 krb5_creds *creds)
125 ret = kcm_ccache_store_cred_internal(context, c, creds, 1, &tmp);
135 krb5_creds *creds)
148 ret = krb5_copy_creds_contents(context, credp, creds);
180 *cursor = c->creds;
189 krb5_creds *creds)
198 creds);
115 kcmss_store_cred(krb5_context context, krb5_ccache id, krb5_creds *creds) argument
131 kcmss_retrieve(krb5_context context, krb5_ccache id, krb5_flags which, const krb5_creds *mcred, krb5_creds *creds) argument
186 kcmss_get_next(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument
/freebsd-11-stable/crypto/heimdal/appl/kf/
H A Dkf.c120 * forward creds to `hostname'/`service' over `sock'
135 krb5_creds creds; local
204 memset (&creds, 0, sizeof(creds));
220 creds.client = principal;
223 &creds.server,
235 creds.times.endtime = 0;
246 &creds,

Completed in 143 milliseconds

1234