/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/utils/ |
H A D | net_ads.c | 32 * we always fall back to our own realm - Guenther*/ 52 if ( !ads_cldap_netlogon_5(talloc_tos(), addr, ads->server.realm, &reply ) ) { 145 if (!ads->config.realm) { 146 ads->config.realm = CONST_DISCARD(char *, c->opt_target_workgroup); 177 if (!ads || !ads->config.realm) { 194 d_printf(_("Realm: %s\n"), ads->config.realm); 221 const char *realm = NULL; local 225 However, the join requires that realm be set in smb.conf 226 and compares our realm with the remote server's so this is 233 realm 339 net_ads_check_int(const char *realm, const char *workgroup, const char *host) argument 1976 char *realm = NULL; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/krb5/ |
H A D | ticket.c | 340 N_("Referral EncryptedData wrong for realm %s", 341 "realm"), requested->realm); 366 if (strcmp(requested->realm, returned->realm) != 0) { 369 N_("server ref realm mismatch, " 370 "requested realm %s got back %s", ""), 371 requested->realm, returned->realm); 378 const char *realm local [all...] |
H A D | keytab_keyfile.c | 58 char *realm; member in struct:akf_data 62 * set `d->cell' and `d->realm' 105 N_("No realm in ThisCell file %s", ""), 116 d->realm = strdup (buf); 117 if (d->realm == NULL) { 152 free (d->realm); 246 d->realm, "afs", d->cell, NULL);
|
H A D | v4_glue.c | 261 RCHECK(ret, krb5_store_stringz(sp, v4creds->realm), error); 391 const char *instance, const char *realm) 397 if (realm) { 398 RCHECK(ret, krb5_store_stringz(sp, realm), error); 472 const char *realm, 501 RCHECK(ret, put_nir(sp, service, instance, realm), error); 584 const char *realm, 597 if (realm == NULL) realm = ""; 609 RCHECK(ret, put_nir(sp, name, inst, realm), erro 390 put_nir(krb5_storage *sp, const char *name, const char *instance, const char *realm) argument 468 _krb5_krb_create_ciph(krb5_context context, const krb5_keyblock *session, const char *service, const char *instance, const char *realm, uint32_t life, unsigned char kvno, const krb5_data *ticket, uint32_t kdc_time, const krb5_keyblock *key, krb5_data *enc_data) argument 581 _krb5_krb_cr_err_reply(krb5_context context, const char *name, const char *inst, const char *realm, uint32_t time_ws, uint32_t e, const char *e_string, krb5_data *data) argument 762 char *realm = NULL; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/heimdal/lib/krb5/ |
H A D | ticket.c | 340 N_("Referral EncryptedData wrong for realm %s", 341 "realm"), requested->realm); 366 if (strcmp(requested->realm, returned->realm) != 0) { 369 N_("server ref realm mismatch, " 370 "requested realm %s got back %s", ""), 371 requested->realm, returned->realm); 378 const char *realm local [all...] |
H A D | keytab_keyfile.c | 58 char *realm; member in struct:akf_data 62 * set `d->cell' and `d->realm' 105 N_("No realm in ThisCell file %s", ""), 116 d->realm = strdup (buf); 117 if (d->realm == NULL) { 152 free (d->realm); 246 d->realm, "afs", d->cell, NULL);
|
H A D | v4_glue.c | 261 RCHECK(ret, krb5_store_stringz(sp, v4creds->realm), error); 391 const char *instance, const char *realm) 397 if (realm) { 398 RCHECK(ret, krb5_store_stringz(sp, realm), error); 472 const char *realm, 501 RCHECK(ret, put_nir(sp, service, instance, realm), error); 584 const char *realm, 597 if (realm == NULL) realm = ""; 609 RCHECK(ret, put_nir(sp, name, inst, realm), erro 390 put_nir(krb5_storage *sp, const char *name, const char *instance, const char *realm) argument 468 _krb5_krb_create_ciph(krb5_context context, const krb5_keyblock *session, const char *service, const char *instance, const char *realm, uint32_t life, unsigned char kvno, const krb5_data *ticket, uint32_t kdc_time, const krb5_keyblock *key, krb5_data *enc_data) argument 581 _krb5_krb_cr_err_reply(krb5_context context, const char *name, const char *inst, const char *realm, uint32_t time_ws, uint32_t e, const char *e_string, krb5_data *data) argument 762 char *realm = NULL; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/heimdal/lib/krb5/ |
H A D | ticket.c | 340 N_("Referral EncryptedData wrong for realm %s", 341 "realm"), requested->realm); 366 if (strcmp(requested->realm, returned->realm) != 0) { 369 N_("server ref realm mismatch, " 370 "requested realm %s got back %s", ""), 371 requested->realm, returned->realm); 378 const char *realm local [all...] |
H A D | keytab_keyfile.c | 58 char *realm; member in struct:akf_data 62 * set `d->cell' and `d->realm' 105 N_("No realm in ThisCell file %s", ""), 116 d->realm = strdup (buf); 117 if (d->realm == NULL) { 152 free (d->realm); 246 d->realm, "afs", d->cell, NULL);
|
H A D | v4_glue.c | 261 RCHECK(ret, krb5_store_stringz(sp, v4creds->realm), error); 391 const char *instance, const char *realm) 397 if (realm) { 398 RCHECK(ret, krb5_store_stringz(sp, realm), error); 472 const char *realm, 501 RCHECK(ret, put_nir(sp, service, instance, realm), error); 584 const char *realm, 597 if (realm == NULL) realm = ""; 609 RCHECK(ret, put_nir(sp, name, inst, realm), erro 390 put_nir(krb5_storage *sp, const char *name, const char *instance, const char *realm) argument 468 _krb5_krb_create_ciph(krb5_context context, const krb5_keyblock *session, const char *service, const char *instance, const char *realm, uint32_t life, unsigned char kvno, const krb5_data *ticket, uint32_t kdc_time, const krb5_keyblock *key, krb5_data *enc_data) argument 581 _krb5_krb_cr_err_reply(krb5_context context, const char *name, const char *inst, const char *realm, uint32_t time_ws, uint32_t e, const char *e_string, krb5_data *data) argument 762 char *realm = NULL; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source4/heimdal/lib/gssapi/krb5/ |
H A D | acquire_cred.c | 44 krb5_const_realm realm; local 50 realm = krb5_principal_get_realm(context, principal); 51 if (realm == NULL) { 58 realm, KRB5_TGS_NAME, realm, NULL);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source4/heimdal/lib/gssapi/krb5/ |
H A D | acquire_cred.c | 44 krb5_const_realm realm; local 50 realm = krb5_principal_get_realm(context, principal); 51 if (realm == NULL) { 58 realm, KRB5_TGS_NAME, realm, NULL);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source4/heimdal/lib/gssapi/krb5/ |
H A D | acquire_cred.c | 44 krb5_const_realm realm; local 50 realm = krb5_principal_get_realm(context, principal); 51 if (realm == NULL) { 58 realm, KRB5_TGS_NAME, realm, NULL);
|
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/neon/src/ |
H A D | ne_auth.c | 121 const char *realm, *nonce, *opaque, *domain; member in struct:auth_challenge 190 char *realm; member in struct:__anon4776 278 if (sess->realm) ne_free(sess->realm); 279 sess->realm = sess->basic = sess->cnonce = sess->nonce = 379 if (chall->handler->creds(chall->handler->userdata, sess->realm, 397 /* Verify challenge... must have a realm */ 398 if (parms->realm == NULL) { 399 challenge_error(errmsg, _("missing realm in Basic challenge")); 405 sess->realm [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/neon/src/ |
H A D | ne_auth.c | 121 const char *realm, *nonce, *opaque, *domain; member in struct:auth_challenge 190 char *realm; member in struct:__anon5681 278 if (sess->realm) ne_free(sess->realm); 279 sess->realm = sess->basic = sess->cnonce = sess->nonce = 379 if (chall->handler->creds(chall->handler->userdata, sess->realm, 397 /* Verify challenge... must have a realm */ 398 if (parms->realm == NULL) { 399 challenge_error(errmsg, _("missing realm in Basic challenge")); 405 sess->realm [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/neon/src/ |
H A D | ne_auth.c | 121 const char *realm, *nonce, *opaque, *domain; member in struct:auth_challenge 190 char *realm; member in struct:__anon39706 278 if (sess->realm) ne_free(sess->realm); 279 sess->realm = sess->basic = sess->cnonce = sess->nonce = 379 if (chall->handler->creds(chall->handler->userdata, sess->realm, 397 /* Verify challenge... must have a realm */ 398 if (parms->realm == NULL) { 399 challenge_error(errmsg, _("missing realm in Basic challenge")); 405 sess->realm [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.0.25b/source/libads/ |
H A D | krb5_setpw.c | 65 char* realm = NULL; local 88 realm = c; 90 /* We must have a realm component. */ 122 asn1_write_GeneralString(&req, realm); 547 char *realm = NULL; local 576 realm = strchr_m(princ, '@'); 577 if (!realm) { 580 DEBUG(1,("Failed to get realm\n")); 583 realm++; 585 asprintf(&princ_name, "kadmin/changepw@%s", realm); [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.5.8/source3/libads/ |
H A D | krb5_setpw.c | 65 char* realm = NULL; local 88 realm = c; 90 /* We must have a realm component. */ 125 asn1_write_GeneralString(req, realm); 578 char *realm = NULL; local 607 realm = strchr_m(princ, '@'); 608 if (!realm) { 611 DEBUG(1,("Failed to get realm\n")); 614 realm++; 616 if (asprintf(&princ_name, "kadmin/changepw@%s", realm) [all...] |
H A D | ldap.c | 225 DEBUG(5,("ads_try_connect: sending CLDAP request to %s (realm: %s)\n", 226 srv, ads->server.realm)); 230 if ( !ads_cldap_netlogon_5(frame, srv, ads->server.realm, &cldap_reply ) ) { 247 SAFE_FREE(ads->config.realm); 256 ads->config.realm = SMB_STRDUP(cldap_reply.dns_domain); 257 strupper_m(ads->config.realm); 258 ads->config.bind_path = ads_build_dn(ads->config.realm); 292 Try the realm first and then then workgroup name if netbios is not 302 const char *realm; local 309 /* if the realm an 512 char *realm = ads->server.realm; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt/router/samba-3.0.25b/source/libads/ |
H A D | krb5_setpw.c | 65 char* realm = NULL; local 88 realm = c; 90 /* We must have a realm component. */ 122 asn1_write_GeneralString(&req, realm); 547 char *realm = NULL; local 576 realm = strchr_m(princ, '@'); 577 if (!realm) { 580 DEBUG(1,("Failed to get realm\n")); 583 realm++; 585 asprintf(&princ_name, "kadmin/changepw@%s", realm); [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src/router/samba-3.5.8/source3/libads/ |
H A D | krb5_setpw.c | 65 char* realm = NULL; local 88 realm = c; 90 /* We must have a realm component. */ 125 asn1_write_GeneralString(req, realm); 578 char *realm = NULL; local 607 realm = strchr_m(princ, '@'); 608 if (!realm) { 611 DEBUG(1,("Failed to get realm\n")); 614 realm++; 616 if (asprintf(&princ_name, "kadmin/changepw@%s", realm) [all...] |
H A D | ldap.c | 225 DEBUG(5,("ads_try_connect: sending CLDAP request to %s (realm: %s)\n", 226 srv, ads->server.realm)); 230 if ( !ads_cldap_netlogon_5(frame, srv, ads->server.realm, &cldap_reply ) ) { 247 SAFE_FREE(ads->config.realm); 256 ads->config.realm = SMB_STRDUP(cldap_reply.dns_domain); 257 strupper_m(ads->config.realm); 258 ads->config.bind_path = ads_build_dn(ads->config.realm); 292 Try the realm first and then then workgroup name if netbios is not 302 const char *realm; local 309 /* if the realm an 512 char *realm = ads->server.realm; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.5.8/source3/libads/ |
H A D | krb5_setpw.c | 65 char* realm = NULL; local 88 realm = c; 90 /* We must have a realm component. */ 125 asn1_write_GeneralString(req, realm); 578 char *realm = NULL; local 607 realm = strchr_m(princ, '@'); 608 if (!realm) { 611 DEBUG(1,("Failed to get realm\n")); 614 realm++; 616 if (asprintf(&princ_name, "kadmin/changepw@%s", realm) [all...] |
H A D | ldap.c | 225 DEBUG(5,("ads_try_connect: sending CLDAP request to %s (realm: %s)\n", 226 srv, ads->server.realm)); 230 if ( !ads_cldap_netlogon_5(frame, srv, ads->server.realm, &cldap_reply ) ) { 247 SAFE_FREE(ads->config.realm); 256 ads->config.realm = SMB_STRDUP(cldap_reply.dns_domain); 257 strupper_m(ads->config.realm); 258 ads->config.bind_path = ads_build_dn(ads->config.realm); 292 Try the realm first and then then workgroup name if netbios is not 302 const char *realm; local 309 /* if the realm an 512 char *realm = ads->server.realm; local [all...] |
/asuswrt-rt-n18u-9.0.0.4.380.2695/release/src-rt-6.x.4708/router/samba-3.0.25b/source/libads/ |
H A D | krb5_setpw.c | 65 char* realm = NULL; local 88 realm = c; 90 /* We must have a realm component. */ 122 asn1_write_GeneralString(&req, realm); 547 char *realm = NULL; local 576 realm = strchr_m(princ, '@'); 577 if (!realm) { 580 DEBUG(1,("Failed to get realm\n")); 583 realm++; 585 asprintf(&princ_name, "kadmin/changepw@%s", realm); [all...] |