Lines Matching refs:creds
285 CREDENTIALS creds; in auth_krb4_tgt() local
293 if (!radix_to_creds(string, &creds)) { in auth_krb4_tgt()
297 if (strncmp(creds.service, "", 1) == 0) /* backward compatibility */ in auth_krb4_tgt()
298 strlcpy(creds.service, "krbtgt", sizeof creds.service); in auth_krb4_tgt()
300 if (strcmp(creds.service, "krbtgt")) { in auth_krb4_tgt()
302 creds.pname, creds.pinst[0] ? "." : "", creds.pinst, in auth_krb4_tgt()
303 creds.realm, pw->pw_name); in auth_krb4_tgt()
309 if (in_tkt(creds.pname, creds.pinst) != KSUCCESS) in auth_krb4_tgt()
312 if (save_credentials(creds.service, creds.instance, creds.realm, in auth_krb4_tgt()
313 creds.session, creds.lifetime, creds.kvno, &creds.ticket_st, in auth_krb4_tgt()
314 creds.issue_date) != KSUCCESS) { in auth_krb4_tgt()
322 creds.pname, creds.pinst[0] ? "." : "", creds.pinst, creds.realm); in auth_krb4_tgt()
323 memset(&creds, 0, sizeof(creds)); in auth_krb4_tgt()
331 memset(&creds, 0, sizeof(creds)); in auth_krb4_tgt()
340 CREDENTIALS creds; in auth_afs_token() local
347 if (!radix_to_creds(token_string, &creds)) { in auth_afs_token()
351 if (strncmp(creds.service, "", 1) == 0) /* backward compatibility */ in auth_afs_token()
352 strlcpy(creds.service, "afs", sizeof creds.service); in auth_afs_token()
354 if (strncmp(creds.pname, "AFS ID ", 7) == 0) in auth_afs_token()
355 uid = atoi(creds.pname + 7); in auth_afs_token()
359 if (kafs_settoken(creds.realm, uid, &creds)) { in auth_afs_token()
361 creds.pname, creds.realm, pw->pw_name); in auth_afs_token()
362 memset(&creds, 0, sizeof(creds)); in auth_afs_token()
365 debug("AFS token accepted (%s@%s)", creds.pname, creds.realm); in auth_afs_token()
366 memset(&creds, 0, sizeof(creds)); in auth_afs_token()