/freebsd-11-stable/tools/regression/security/proc_to_proc/ |
H A D | scenario.c | 70 static struct cred creds[] = { variable in typeref:struct:cred 94 { &creds[0], &creds[0], 0, 0, 0, 0, 0, 0, "0. priv on priv"}, 95 { &creds[0], &creds[1], 0, 0, 0, 0, 0, 0, "1. priv on priv"}, 96 { &creds[1], &creds[0], 0, 0, 0, 0, 0, 0, "2. priv on priv"}, 97 { &creds[1], &creds[1], 0, 0, 0, 0, 0, 0, "3. priv on priv"}, 99 { &creds[ [all...] |
/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | rd_error.c | 73 const krb5_creds *creds) 83 if (creds != NULL) { 84 krb5_unparse_name_fixed(context, creds->client, 86 krb5_unparse_name_fixed(context, creds->server, 94 creds ? "(" : "", 95 creds ? clientname : "", 96 creds ? ")" : ""); 101 creds ? "(" : "", 102 creds ? servername : "", 103 creds 71 krb5_error_from_rd_error(krb5_context context, const krb5_error *error, const krb5_creds *creds) argument [all...] |
H A D | rd_cred.c | 180 "in received creds", "")); 202 "in received creds", "")); 211 "in received creds", "")); 246 /* Convert to NULL terminated list of creds */ 260 krb5_creds *creds; local 262 creds = calloc(1, sizeof(*creds)); 263 if(creds == NULL) { 270 ASN1_MALLOC_ENCODE(Ticket, creds->ticket.data, creds 333 krb5_creds **creds; local [all...] |
H A D | creds.c | 183 * Return TRUE if `mcreds' and `creds' are equal (`whichfields' 191 * - KRB5_TC_MATCH_FLAGS Make sure that all ticket flags set in mcreds are also present in creds . 193 * - KRB5_TC_MATCH_TIMES Compares only the expiration times of the creds. 201 * @param creds cred to compare with. 203 * @return return TRUE if mcred and creds are equal, FALSE if not. 210 const krb5_creds * mcreds, const krb5_creds * creds) 217 creds->server); 220 creds->server); 226 creds->client); 229 creds 209 krb5_compare_creds(krb5_context context, krb5_flags whichfields, const krb5_creds * mcreds, const krb5_creds * creds) argument 282 krb5_creds_get_ticket_flags(krb5_creds *creds) argument [all...] |
H A D | store.c | 1296 * @param creds the creds block to write. 1304 krb5_store_creds(krb5_storage *sp, krb5_creds *creds) argument 1308 ret = krb5_store_principal(sp, creds->client); 1311 ret = krb5_store_principal(sp, creds->server); 1314 ret = krb5_store_keyblock(sp, creds->session); 1317 ret = krb5_store_times(sp, creds->times); 1320 ret = krb5_store_int8(sp, creds->second_ticket.length != 0); /* is_skey */ 1325 ret = krb5_store_int32(sp, creds->flags.i); 1327 ret = krb5_store_int32(sp, bitswap32(TicketFlags2int(creds 1356 krb5_ret_creds(krb5_storage *sp, krb5_creds *creds) argument 1428 krb5_store_creds_tag(krb5_storage *sp, krb5_creds *creds) argument 1520 krb5_ret_creds_tag(krb5_storage *sp, krb5_creds *creds) argument [all...] |
H A D | verify_init.c | 72 krb5_creds *creds, 124 creds->client); 129 creds); 134 if (!krb5_principal_compare (context, server, creds->server)) { 139 match_cred.client = creds->client; 152 creds = new_creds; 159 creds, 204 * @param creds the credentials to verify 216 krb5_creds *creds, 225 if (krb5_principal_compare(context, creds 71 krb5_verify_init_creds(krb5_context context, krb5_creds *creds, krb5_principal ap_req_server, krb5_keytab ap_req_keytab, krb5_ccache *ccache, krb5_verify_init_creds_opt *options) argument 215 krb5_get_validated_creds(krb5_context context, krb5_creds *creds, krb5_principal client, krb5_ccache ccache, char *service) argument [all...] |
H A D | ticket.c | 652 krb5_creds *creds, 679 creds->session.keyvalue.length = 0; 680 creds->session.keyvalue.data = NULL; 681 creds->session.keytype = rep->enc_part.key.keytype; 682 ret = krb5_data_copy (&creds->session.keyvalue, 702 creds->client, 704 &creds->session); 710 krb5_free_principal (context, creds->client); 711 creds->client = tmp_principal; 724 creds 650 _krb5_extract_ticket(krb5_context context, krb5_kdc_rep *rep, krb5_creds *creds, krb5_keyblock *key, krb5_const_pointer keyseed, krb5_key_usage key_usage, krb5_addresses *addrs, unsigned nonce, unsigned flags, krb5_decrypt_proc decrypt_proc, krb5_const_pointer decryptarg) argument [all...] |
H A D | mcache.c | 46 } *creds; member in struct:krb5_mcache 98 m->creds = NULL; 220 l = m->creds; 229 m->creds = NULL; 237 krb5_creds *creds) 252 l->next = m->creds; 253 m->creds = l; 255 ret = krb5_copy_creds_contents (context, creds, &l->cred); 257 m->creds = l->next; 289 *cursor = m->creds; 235 mcc_store_cred(krb5_context context, krb5_ccache id, krb5_creds *creds) argument 294 mcc_get_next(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument 420 struct link *creds; local [all...] |
H A D | sendauth.c | 85 krb5_creds *creds; local 147 ret = krb5_get_credentials (context, 0, ccache, in_creds, &creds); 154 creds = in_creds; 162 creds, 166 *out_creds = creds; 168 krb5_free_creds(context, creds);
|
H A D | get_in_tkt.c | 147 krb5_creds *creds, 177 ret = _krb5_principal2principalname (a->req_body.cname, creds->client); 180 ret = _krb5_principal2principalname (a->req_body.sname, creds->server); 183 ret = copy_Realm(&creds->client->realm, &a->req_body.realm); 187 if(creds->times.starttime) { 194 *a->req_body.from = creds->times.starttime; 196 if(creds->times.endtime){ 198 *a->req_body.till = creds->times.endtime; 200 if(creds->times.renew_till){ 207 *a->req_body.rtime = creds 145 init_as_req(krb5_context context, KDCOptions opts, krb5_creds *creds, const krb5_addresses *addrs, const krb5_enctype *etypes, const krb5_preauthtype *ptypes, const krb5_preauthdata *preauth, krb5_key_proc key_proc, krb5_const_pointer keyseed, unsigned nonce, AS_REQ *a) argument [all...] |
H A D | changepw.c | 70 krb5_creds *creds, 90 krb5_principal_compare(context, creds->client, targprinc) != TRUE) 99 creds, 162 krb5_creds *creds, 186 creds, 455 * change the password using the credentials in `creds' (for the 506 krb5_creds *creds, 526 realm = creds->client->realm; 592 creds, 676 * @param creds 68 chgpw_send_request(krb5_context context, krb5_auth_context *auth_context, krb5_creds *creds, krb5_principal targprinc, int is_stream, rk_socket_t sock, const char *passwd, const char *host) argument 160 setpw_send_request(krb5_context context, krb5_auth_context *auth_context, krb5_creds *creds, krb5_principal targprinc, int is_stream, rk_socket_t sock, const char *passwd, const char *host) argument 505 change_password_loop(krb5_context context, krb5_creds *creds, krb5_principal targprinc, const char *newpw, int *result_code, krb5_data *result_code_string, krb5_data *result_string, struct kpwd_proc *proc) argument 730 krb5_set_password(krb5_context context, krb5_creds *creds, const char *newpw, krb5_principal targprinc, int *result_code, krb5_data *result_code_string, krb5_data *result_string) argument 781 krb5_creds creds, *credsp; local [all...] |
H A D | deprecated.c | 229 krb5_creds *creds, 242 creds, 271 krb5_creds *creds, 283 creds, 295 creds, 354 krb5_creds *creds, 360 a.principal = creds->client; 372 creds,
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/ |
H A D | internal_auth.c | 78 void *creds; local 96 SVN_ERR(svn_auth_first_credentials(&creds, &iterstate, 99 if (!creds) 102 while (creds) 104 user = ((svn_auth_cred_simple_t *) creds)->username; 105 password = ((svn_auth_cred_simple_t *) creds)->password; 110 SVN_ERR(svn_auth_next_credentials(&creds, iterstate, pool)); 112 if (!creds)
|
/freebsd-11-stable/contrib/subversion/subversion/include/private/ |
H A D | svn_auth_private.h | 80 apr_hash_t *creds, 95 apr_hash_t *creds, 149 apr_hash_t *creds, 160 apr_hash_t *creds, 215 apr_hash_t *creds, 226 apr_hash_t *creds,
|
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/ |
H A D | username_providers.c | 69 we failed to get the creds, so allow the auth system to try the 89 svn_auth_cred_simple_t *creds = apr_pcalloc(pool, sizeof(*creds)); 90 creds->username = username; 91 creds->may_save = may_save; 92 *credentials = creds; 111 svn_auth_cred_simple_t *creds = credentials; 118 if (! creds->may_save) 126 svn_string_create(creds->username, pool)); 87 svn_auth_cred_simple_t *creds = apr_pcalloc(pool, sizeof(*creds)); local 109 svn_auth_cred_simple_t *creds = credentials; local
|
H A D | ssl_server_trust_providers.c | 88 /* If all failures are cleared now, we return the creds */ 91 svn_auth_cred_ssl_server_trust_t *creds = 92 apr_pcalloc(pool, sizeof(*creds)); 93 creds->may_save = FALSE; /* No need to save it again... */ 94 *credentials = creds; 109 svn_auth_cred_ssl_server_trust_t *creds = credentials; 114 if (! creds->may_save) 126 (unsigned long)creds->accepted_failures)); 163 /* Baton type for prompting to verify server ssl creds. 90 svn_auth_cred_ssl_server_trust_t *creds = local 108 svn_auth_cred_ssl_server_trust_t *creds = credentials; local
|
H A D | simple_providers.c | 70 apr_hash_t *creds, 81 str = svn_hash_gets(creds, SVN_CONFIG_AUTHN_USERNAME_KEY); 84 str = svn_hash_gets(creds, SVN_CONFIG_AUTHN_PASSWORD_KEY); 99 apr_hash_t *creds, 107 svn_hash_sets(creds, SVN_CONFIG_AUTHN_PASSWORD_KEY, 118 apr_hash_t *creds, 123 str = svn_hash_gets(creds, SVN_CONFIG_AUTHN_USERNAME_KEY); 168 we failed to get the creds, so allow the auth system to try the 283 svn_auth_cred_simple_t *creds = apr_pcalloc(pool, sizeof(*creds)); 65 svn_auth__simple_password_get(svn_boolean_t *done, const char **password, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 95 svn_auth__simple_password_set(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *password, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 114 simple_username_get(const char **username, apr_hash_t *creds, const char *realmstring, svn_boolean_t non_interactive) argument 280 svn_auth_cred_simple_t *creds = apr_pcalloc(pool, sizeof(*creds)); local 305 svn_auth_cred_simple_t *creds = credentials; local [all...] |
H A D | win32_crypto.c | 115 apr_hash_t *creds, 129 SVN_ERR(svn_auth__simple_password_set(done, creds, realmstring, username, 143 apr_hash_t *creds, 153 SVN_ERR(svn_auth__simple_password_get(done, &in, creds, realmstring, username, 239 apr_hash_t *creds, 253 SVN_ERR(svn_auth__ssl_client_cert_pw_set(done, creds, realmstring, 268 apr_hash_t *creds, 278 SVN_ERR(svn_auth__ssl_client_cert_pw_get(done, &in, creds, realmstring, 481 /* If all failures are cleared now, we return the creds */ 484 svn_auth_cred_ssl_server_trust_t *creds 112 windows_password_encrypter(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *in, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 139 windows_password_decrypter(svn_boolean_t *done, const char **out, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 235 windows_ssl_client_cert_pw_encrypter(svn_boolean_t *done, apr_hash_t *creds, const char *realmstring, const char *username, const char *in, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 263 windows_ssl_client_cert_pw_decrypter(svn_boolean_t *done, const char **out, apr_hash_t *creds, const char *realmstring, const char *username, apr_hash_t *parameters, svn_boolean_t non_interactive, apr_pool_t *pool) argument 480 svn_auth_cred_ssl_server_trust_t *creds = local [all...] |
H A D | auth.c | 123 svn_boolean_t got_first; /* did we get the provider's first creds? */ 237 void *creds = NULL; local 275 /* First, see if we have cached creds in the auth_baton. */ 277 creds = svn_hash_gets(auth_baton->creds_cache, cache_key); 278 if (creds) 290 SVN_ERR(provider->vtable->first_credentials(&creds, &iter_baton, 296 if (creds != NULL) 304 if (! creds) 322 /* Put the creds in the cache */ 325 creds); 342 void *creds = NULL; local 396 void *creds; local [all...] |
/freebsd-11-stable/crypto/openssh/ |
H A D | platform.c | 122 * If we have both LOGIN_CAP and PAM, we want to establish creds 170 * If we have a chroot directory, we set all creds except real 175 char **creds = NULL, *chroot_creds[] = local 180 creds = chroot_creds; 182 if (setpcred(pw->pw_name, creds) == -1)
|
H A D | ssh-gss.h | 75 gss_cred_id_t creds; member in struct:__anon6157 96 gss_cred_id_t creds; /* server */ member in struct:__anon6158
|
/freebsd-11-stable/crypto/heimdal/lib/gssapi/krb5/ |
H A D | creds.c | 64 krb5_creds *creds; local 74 &creds); 81 ret = krb5_store_creds(sp, creds); 82 krb5_free_creds(context, creds); 189 krb5_creds creds; local 191 ret = krb5_ret_creds(sp, &creds); 204 ret = krb5_cc_initialize(context, id, creds.client); 211 ret = krb5_cc_store_cred(context, id, &creds); 212 krb5_free_cred_contents(context, &creds);
|
/freebsd-11-stable/crypto/heimdal/kcm/ |
H A D | cache.c | 164 for (k = p->creds; k != NULL; k = k->next) 318 slot->creds = NULL; 346 k = ccache->creds; 355 ccache->creds = NULL; 489 if (ccache->creds == NULL) { 500 krb5_creds *creds, 509 ret = kcm_ccache_store_cred_internal(context, ccache, creds, copy, &tmp); 522 for (c = ccache->creds; c != NULL; c = c->next) 534 krb5_creds *creds, 541 for (c = &ccache->creds; * 498 kcm_ccache_store_cred(krb5_context context, kcm_ccache ccache, krb5_creds *creds, int copy) argument 532 kcm_ccache_store_cred_internal(krb5_context context, kcm_ccache ccache, krb5_creds *creds, int copy, krb5_creds **credp) argument 611 kcm_ccache_retrieve_cred_internal(krb5_context context, kcm_ccache ccache, krb5_flags whichfields, const krb5_creds *mcreds, krb5_creds **creds) argument [all...] |
H A D | glue.c | 117 krb5_creds *creds) 125 ret = kcm_ccache_store_cred_internal(context, c, creds, 1, &tmp); 135 krb5_creds *creds) 148 ret = krb5_copy_creds_contents(context, credp, creds); 180 *cursor = c->creds; 189 krb5_creds *creds) 198 creds); 115 kcmss_store_cred(krb5_context context, krb5_ccache id, krb5_creds *creds) argument 131 kcmss_retrieve(krb5_context context, krb5_ccache id, krb5_flags which, const krb5_creds *mcred, krb5_creds *creds) argument 186 kcmss_get_next(krb5_context context, krb5_ccache id, krb5_cc_cursor *cursor, krb5_creds *creds) argument
|
/freebsd-11-stable/crypto/heimdal/appl/kf/ |
H A D | kf.c | 120 * forward creds to `hostname'/`service' over `sock' 135 krb5_creds creds; local 204 memset (&creds, 0, sizeof(creds)); 220 creds.client = principal; 223 &creds.server, 235 creds.times.endtime = 0; 246 &creds,
|