ktc 520 source4/auth/credentials/credentials_krb5.c struct keytab_container *ktc; ktc 550 source4/auth/credentials/credentials_krb5.c enctype_strings, &ktc); ktc 559 source4/auth/credentials/credentials_krb5.c talloc_steal(cred, ktc); ktc 560 source4/auth/credentials/credentials_krb5.c cred->keytab = ktc; ktc 576 source4/auth/credentials/credentials_krb5.c struct keytab_container *ktc; ktc 595 source4/auth/credentials/credentials_krb5.c keytab_name, &ktc); ktc 602 source4/auth/credentials/credentials_krb5.c talloc_steal(cred, ktc); ktc 603 source4/auth/credentials/credentials_krb5.c cred->keytab = ktc; ktc 614 source4/auth/credentials/credentials_krb5.c struct keytab_container *ktc; ktc 632 source4/auth/credentials/credentials_krb5.c ret = cli_credentials_get_keytab(cred, event_ctx, lp_ctx, &ktc); ktc 638 source4/auth/credentials/credentials_krb5.c ret = smb_krb5_update_keytab(mem_ctx, cred, smb_krb5_context, enctype_strings, ktc); ktc 654 source4/auth/credentials/credentials_krb5.c struct keytab_container *ktc; ktc 671 source4/auth/credentials/credentials_krb5.c ret = cli_credentials_get_keytab(cred, event_ctx, lp_ctx, &ktc); ktc 698 source4/auth/credentials/credentials_krb5.c maj_stat = gss_krb5_import_cred(&min_stat, NULL, princ, ktc->keytab, ktc 244 source4/auth/kerberos/kerberos_util.c static krb5_error_code free_keytab(struct keytab_container *ktc) ktc 246 source4/auth/kerberos/kerberos_util.c return krb5_kt_close(ktc->smb_krb5_context->krb5_context, ktc->keytab); ktc 251 source4/auth/kerberos/kerberos_util.c const char *keytab_name, struct keytab_container **ktc) ktc 263 source4/auth/kerberos/kerberos_util.c *ktc = talloc(mem_ctx, struct keytab_container); ktc 264 source4/auth/kerberos/kerberos_util.c if (!*ktc) { ktc 268 source4/auth/kerberos/kerberos_util.c (*ktc)->smb_krb5_context = talloc_reference(*ktc, smb_krb5_context); ktc 269 source4/auth/kerberos/kerberos_util.c (*ktc)->keytab = keytab; ktc 270 source4/auth/kerberos/kerberos_util.c talloc_set_destructor(*ktc, free_keytab);