Searched refs:realm (Results 226 - 250 of 657) sorted by relevance

1234567891011>>

/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/utils/
H A Dnet_ads.c32 * we always fall back to our own realm - Guenther*/
52 if ( !ads_cldap_netlogon_5(talloc_tos(), addr, ads->server.realm, &reply ) ) {
145 if (!ads->config.realm) {
146 ads->config.realm = CONST_DISCARD(char *, c->opt_target_workgroup);
177 if (!ads || !ads->config.realm) {
194 d_printf(_("Realm: %s\n"), ads->config.realm);
221 const char *realm = NULL; local
225 However, the join requires that realm be set in smb.conf
226 and compares our realm with the remote server's so this is
233 realm
339 net_ads_check_int(const char *realm, const char *workgroup, const char *host) argument
1976 char *realm = NULL; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/krb5/
H A Dticket.c340 N_("Referral EncryptedData wrong for realm %s",
341 "realm"), requested->realm);
366 if (strcmp(requested->realm, returned->realm) != 0) {
369 N_("server ref realm mismatch, "
370 "requested realm %s got back %s", ""),
371 requested->realm, returned->realm);
378 const char *realm local
[all...]
H A Dkeytab_keyfile.c58 char *realm; member in struct:akf_data
62 * set `d->cell' and `d->realm'
105 N_("No realm in ThisCell file %s", ""),
116 d->realm = strdup (buf);
117 if (d->realm == NULL) {
152 free (d->realm);
246 d->realm, "afs", d->cell, NULL);
H A Dv4_glue.c261 RCHECK(ret, krb5_store_stringz(sp, v4creds->realm), error);
391 const char *instance, const char *realm)
397 if (realm) {
398 RCHECK(ret, krb5_store_stringz(sp, realm), error);
472 const char *realm,
501 RCHECK(ret, put_nir(sp, service, instance, realm), error);
584 const char *realm,
597 if (realm == NULL) realm = "";
609 RCHECK(ret, put_nir(sp, name, inst, realm), erro
390 put_nir(krb5_storage *sp, const char *name, const char *instance, const char *realm) argument
468 _krb5_krb_create_ciph(krb5_context context, const krb5_keyblock *session, const char *service, const char *instance, const char *realm, uint32_t life, unsigned char kvno, const krb5_data *ticket, uint32_t kdc_time, const krb5_keyblock *key, krb5_data *enc_data) argument
581 _krb5_krb_cr_err_reply(krb5_context context, const char *name, const char *inst, const char *realm, uint32_t time_ws, uint32_t e, const char *e_string, krb5_data *data) argument
762 char *realm = NULL; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/heimdal/lib/krb5/
H A Dticket.c340 N_("Referral EncryptedData wrong for realm %s",
341 "realm"), requested->realm);
366 if (strcmp(requested->realm, returned->realm) != 0) {
369 N_("server ref realm mismatch, "
370 "requested realm %s got back %s", ""),
371 requested->realm, returned->realm);
378 const char *realm local
[all...]
H A Dkeytab_keyfile.c58 char *realm; member in struct:akf_data
62 * set `d->cell' and `d->realm'
105 N_("No realm in ThisCell file %s", ""),
116 d->realm = strdup (buf);
117 if (d->realm == NULL) {
152 free (d->realm);
246 d->realm, "afs", d->cell, NULL);
H A Dv4_glue.c261 RCHECK(ret, krb5_store_stringz(sp, v4creds->realm), error);
391 const char *instance, const char *realm)
397 if (realm) {
398 RCHECK(ret, krb5_store_stringz(sp, realm), error);
472 const char *realm,
501 RCHECK(ret, put_nir(sp, service, instance, realm), error);
584 const char *realm,
597 if (realm == NULL) realm = "";
609 RCHECK(ret, put_nir(sp, name, inst, realm), erro
390 put_nir(krb5_storage *sp, const char *name, const char *instance, const char *realm) argument
468 _krb5_krb_create_ciph(krb5_context context, const krb5_keyblock *session, const char *service, const char *instance, const char *realm, uint32_t life, unsigned char kvno, const krb5_data *ticket, uint32_t kdc_time, const krb5_keyblock *key, krb5_data *enc_data) argument
581 _krb5_krb_cr_err_reply(krb5_context context, const char *name, const char *inst, const char *realm, uint32_t time_ws, uint32_t e, const char *e_string, krb5_data *data) argument
762 char *realm = NULL; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/heimdal/lib/krb5/
H A Dticket.c340 N_("Referral EncryptedData wrong for realm %s",
341 "realm"), requested->realm);
366 if (strcmp(requested->realm, returned->realm) != 0) {
369 N_("server ref realm mismatch, "
370 "requested realm %s got back %s", ""),
371 requested->realm, returned->realm);
378 const char *realm local
[all...]
H A Dkeytab_keyfile.c58 char *realm; member in struct:akf_data
62 * set `d->cell' and `d->realm'
105 N_("No realm in ThisCell file %s", ""),
116 d->realm = strdup (buf);
117 if (d->realm == NULL) {
152 free (d->realm);
246 d->realm, "afs", d->cell, NULL);
H A Dv4_glue.c261 RCHECK(ret, krb5_store_stringz(sp, v4creds->realm), error);
391 const char *instance, const char *realm)
397 if (realm) {
398 RCHECK(ret, krb5_store_stringz(sp, realm), error);
472 const char *realm,
501 RCHECK(ret, put_nir(sp, service, instance, realm), error);
584 const char *realm,
597 if (realm == NULL) realm = "";
609 RCHECK(ret, put_nir(sp, name, inst, realm), erro
390 put_nir(krb5_storage *sp, const char *name, const char *instance, const char *realm) argument
468 _krb5_krb_create_ciph(krb5_context context, const krb5_keyblock *session, const char *service, const char *instance, const char *realm, uint32_t life, unsigned char kvno, const krb5_data *ticket, uint32_t kdc_time, const krb5_keyblock *key, krb5_data *enc_data) argument
581 _krb5_krb_cr_err_reply(krb5_context context, const char *name, const char *inst, const char *realm, uint32_t time_ws, uint32_t e, const char *e_string, krb5_data *data) argument
762 char *realm = NULL; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/gssapi/krb5/
H A Dacquire_cred.c44 krb5_const_realm realm; local
50 realm = krb5_principal_get_realm(context, principal);
51 if (realm == NULL) {
58 realm, KRB5_TGS_NAME, realm, NULL);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/heimdal/lib/gssapi/krb5/
H A Dacquire_cred.c44 krb5_const_realm realm; local
50 realm = krb5_principal_get_realm(context, principal);
51 if (realm == NULL) {
58 realm, KRB5_TGS_NAME, realm, NULL);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/heimdal/lib/gssapi/krb5/
H A Dacquire_cred.c44 krb5_const_realm realm; local
50 realm = krb5_principal_get_realm(context, principal);
51 if (realm == NULL) {
58 realm, KRB5_TGS_NAME, realm, NULL);
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/neon/src/
H A Dne_auth.c121 const char *realm, *nonce, *opaque, *domain; member in struct:auth_challenge
190 char *realm; member in struct:__anon4776
278 if (sess->realm) ne_free(sess->realm);
279 sess->realm = sess->basic = sess->cnonce = sess->nonce =
379 if (chall->handler->creds(chall->handler->userdata, sess->realm,
397 /* Verify challenge... must have a realm */
398 if (parms->realm == NULL) {
399 challenge_error(errmsg, _("missing realm in Basic challenge"));
405 sess->realm
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/neon/src/
H A Dne_auth.c121 const char *realm, *nonce, *opaque, *domain; member in struct:auth_challenge
190 char *realm; member in struct:__anon5681
278 if (sess->realm) ne_free(sess->realm);
279 sess->realm = sess->basic = sess->cnonce = sess->nonce =
379 if (chall->handler->creds(chall->handler->userdata, sess->realm,
397 /* Verify challenge... must have a realm */
398 if (parms->realm == NULL) {
399 challenge_error(errmsg, _("missing realm in Basic challenge"));
405 sess->realm
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/neon/src/
H A Dne_auth.c121 const char *realm, *nonce, *opaque, *domain; member in struct:auth_challenge
190 char *realm; member in struct:__anon39706
278 if (sess->realm) ne_free(sess->realm);
279 sess->realm = sess->basic = sess->cnonce = sess->nonce =
379 if (chall->handler->creds(chall->handler->userdata, sess->realm,
397 /* Verify challenge... must have a realm */
398 if (parms->realm == NULL) {
399 challenge_error(errmsg, _("missing realm in Basic challenge"));
405 sess->realm
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/libads/
H A Dkrb5_setpw.c65 char* realm = NULL; local
88 realm = c;
90 /* We must have a realm component. */
122 asn1_write_GeneralString(&req, realm);
547 char *realm = NULL; local
576 realm = strchr_m(princ, '@');
577 if (!realm) {
580 DEBUG(1,("Failed to get realm\n"));
583 realm++;
585 asprintf(&princ_name, "kadmin/changepw@%s", realm);
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/libads/
H A Dkrb5_setpw.c65 char* realm = NULL; local
88 realm = c;
90 /* We must have a realm component. */
125 asn1_write_GeneralString(req, realm);
578 char *realm = NULL; local
607 realm = strchr_m(princ, '@');
608 if (!realm) {
611 DEBUG(1,("Failed to get realm\n"));
614 realm++;
616 if (asprintf(&princ_name, "kadmin/changepw@%s", realm)
[all...]
H A Dldap.c225 DEBUG(5,("ads_try_connect: sending CLDAP request to %s (realm: %s)\n",
226 srv, ads->server.realm));
230 if ( !ads_cldap_netlogon_5(frame, srv, ads->server.realm, &cldap_reply ) ) {
247 SAFE_FREE(ads->config.realm);
256 ads->config.realm = SMB_STRDUP(cldap_reply.dns_domain);
257 strupper_m(ads->config.realm);
258 ads->config.bind_path = ads_build_dn(ads->config.realm);
292 Try the realm first and then then workgroup name if netbios is not
302 const char *realm; local
309 /* if the realm an
512 char *realm = ads->server.realm; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/libads/
H A Dkrb5_setpw.c65 char* realm = NULL; local
88 realm = c;
90 /* We must have a realm component. */
122 asn1_write_GeneralString(&req, realm);
547 char *realm = NULL; local
576 realm = strchr_m(princ, '@');
577 if (!realm) {
580 DEBUG(1,("Failed to get realm\n"));
583 realm++;
585 asprintf(&princ_name, "kadmin/changepw@%s", realm);
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/libads/
H A Dkrb5_setpw.c65 char* realm = NULL; local
88 realm = c;
90 /* We must have a realm component. */
125 asn1_write_GeneralString(req, realm);
578 char *realm = NULL; local
607 realm = strchr_m(princ, '@');
608 if (!realm) {
611 DEBUG(1,("Failed to get realm\n"));
614 realm++;
616 if (asprintf(&princ_name, "kadmin/changepw@%s", realm)
[all...]
H A Dldap.c225 DEBUG(5,("ads_try_connect: sending CLDAP request to %s (realm: %s)\n",
226 srv, ads->server.realm));
230 if ( !ads_cldap_netlogon_5(frame, srv, ads->server.realm, &cldap_reply ) ) {
247 SAFE_FREE(ads->config.realm);
256 ads->config.realm = SMB_STRDUP(cldap_reply.dns_domain);
257 strupper_m(ads->config.realm);
258 ads->config.bind_path = ads_build_dn(ads->config.realm);
292 Try the realm first and then then workgroup name if netbios is not
302 const char *realm; local
309 /* if the realm an
512 char *realm = ads->server.realm; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/libads/
H A Dkrb5_setpw.c65 char* realm = NULL; local
88 realm = c;
90 /* We must have a realm component. */
125 asn1_write_GeneralString(req, realm);
578 char *realm = NULL; local
607 realm = strchr_m(princ, '@');
608 if (!realm) {
611 DEBUG(1,("Failed to get realm\n"));
614 realm++;
616 if (asprintf(&princ_name, "kadmin/changepw@%s", realm)
[all...]
H A Dldap.c225 DEBUG(5,("ads_try_connect: sending CLDAP request to %s (realm: %s)\n",
226 srv, ads->server.realm));
230 if ( !ads_cldap_netlogon_5(frame, srv, ads->server.realm, &cldap_reply ) ) {
247 SAFE_FREE(ads->config.realm);
256 ads->config.realm = SMB_STRDUP(cldap_reply.dns_domain);
257 strupper_m(ads->config.realm);
258 ads->config.bind_path = ads_build_dn(ads->config.realm);
292 Try the realm first and then then workgroup name if netbios is not
302 const char *realm; local
309 /* if the realm an
512 char *realm = ads->server.realm; local
[all...]
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/libads/
H A Dkrb5_setpw.c65 char* realm = NULL; local
88 realm = c;
90 /* We must have a realm component. */
122 asn1_write_GeneralString(&req, realm);
547 char *realm = NULL; local
576 realm = strchr_m(princ, '@');
577 if (!realm) {
580 DEBUG(1,("Failed to get realm\n"));
583 realm++;
585 asprintf(&princ_name, "kadmin/changepw@%s", realm);
[all...]

Completed in 250 milliseconds

1234567891011>>