Searched refs:realm (Results 26 - 50 of 139) sorted by relevance

123456

/freebsd-11-stable/contrib/subversion/subversion/include/
H A Dsvn_cmdline.h219 const char *realm,
235 const char *realm,
251 const char *realm,
272 const char *realm,
288 const char *realm,
H A Dsvn_auth.h363 * If @a realm is non-NULL, maybe use it in the prompt string.
381 const char *realm,
390 * If @a realm is non-NULL, maybe use it in the prompt string.
401 const char *realm,
433 * etc.). @a realm is a string that can be used in the prompt string.
444 const char *realm,
452 * @a baton is an implementation-specific closure. @a realm is a string
464 const char *realm,
470 * @a baton is an implementation-specific closure. @a realm is a string
482 const char *realm,
[all...]
/freebsd-11-stable/contrib/telnet/libtelnet/
H A Dkerberos.c152 char *realm; local
166 if ((realm = krb_get_phost(RemoteHostName)))
167 strncpy(instance, realm, sizeof(instance));
171 realm = dest_realm ? dest_realm : krb_realmofhost(RemoteHostName);
173 if (!realm) {
174 printf("Kerberos V4: no realm for %s\r\n", RemoteHostName);
177 if ((r = krb_mk_req(&lauth, krb_service_name, instance, realm, 0L))) {
181 if ((r = krb_get_cred(krb_service_name, instance, realm, &cred))) {
240 char realm[REALM_SZ]; local
248 if (krb_get_lrealm(realm,
[all...]
H A Dkrb4encpwd.c153 char hostname[80], *cp, *realm; local
161 realm = krb_realmofhost(hostname);
164 if (read_service_key(KRB_SERVICE_NAME, hostname, realm, 0,
281 char hostname[80], *realm; local
304 realm = krb_realmofhost(hostname);
313 if (r = krb_mk_encpwd_req(&krb_token, KRB_SERVICE_NAME, instance, realm, Challenge, UserNameRequested, user_passwd)) {
/freebsd-11-stable/crypto/heimdal/kcm/
H A Dacquire.c47 krb5_const_realm realm; local
86 realm = krb5_principal_get_realm(context, ccache->client);
91 krb5_get_init_creds_opt_set_default_flags(context, "kcm", realm, opt);
/freebsd-11-stable/crypto/heimdal/kadmin/
H A Dkadmind.c46 char *realm; variable
57 { "realm", 'r', arg_string, &realm,
58 "realm to use", "realm"
195 if(realm)
196 krb5_set_default_realm(context, realm); /* XXX */
/freebsd-11-stable/crypto/heimdal/lib/kadm5/
H A Ddestroy_s.c45 free (c->realm);
H A Dprivate.h103 char *realm; member in struct:kadm5_client_context
124 char *realm; member in struct:kadm5_ad_context
H A Dinit_c.c83 (*ctx)->realm = strdup(params->realm);
84 if ((*ctx)->realm == NULL)
87 ret = krb5_get_default_realm((*ctx)->context, &(*ctx)->realm);
97 ret = krb5_get_krb_admin_hst (context, &(*ctx)->realm, &hostlist);
99 free((*ctx)->realm);
108 free((*ctx)->realm);
467 if (ctx->realm)
468 asprintf(&service_name, "%s@%s", KADM5_ADMIN_SERVICE, ctx->realm);
498 if(ctx->realm) {
[all...]
/freebsd-11-stable/crypto/heimdal/admin/
H A Dget.c40 const char *realm,
49 if(realm) {
50 conf.realm = strdup(realm);
51 if (conf.realm == NULL) {
68 /* should get realm from each principal, instead of doing
69 everything with the same (local) realm */
77 free(conf.realm);
39 open_kadmin_connection(char *principal, const char *realm, char *admin_server, int server_port) argument
/freebsd-11-stable/contrib/wpa/src/ap/
H A Dgas_serv.c408 struct hostapd_nai_realm_data *realm)
412 wpabuf_put_u8(buf, realm->eap_method_count);
414 for (i = 0; i < realm->eap_method_count; i++) {
415 struct hostapd_nai_realm_eap *eap = &realm->eap_method[i];
429 struct hostapd_nai_realm_data *realm,
434 wpa_printf(MSG_DEBUG, "realm=%s, len=%d", realm->realm[realm_idx],
435 (int) os_strlen(realm->realm[realm_id
407 anqp_add_nai_realm_eap(struct wpabuf *buf, struct hostapd_nai_realm_data *realm) argument
428 anqp_add_nai_realm_data(struct wpabuf *buf, struct hostapd_nai_realm_data *realm, unsigned int realm_idx) argument
452 struct hostapd_nai_realm_data *realm; local
554 struct hostapd_nai_realm_data *realm; local
620 struct fils_realm *realm; local
[all...]
/freebsd-11-stable/contrib/subversion/subversion/libsvn_subr/
H A Dprompt.c589 * authentication @a realm on stderr, in a manner appropriate for
590 * preceding a prompt; or if @a realm is null, then do nothing. argument
593 maybe_print_realm(const char *realm, apr_pool_t *pool)
595 if (realm)
601 _("Authentication realm: %s\n"), realm),
614 const char *realm,
623 SVN_ERR(maybe_print_realm(realm, pool));
642 const char *realm,
649 SVN_ERR(maybe_print_realm(realm, poo
609 svn_cmdline_auth_simple_prompt(svn_auth_cred_simple_t **cred_p, void *baton, const char *realm, const char *username, svn_boolean_t may_save, apr_pool_t *pool) argument
637 svn_cmdline_auth_username_prompt(svn_auth_cred_username_t **cred_p, void *baton, const char *realm, svn_boolean_t may_save, apr_pool_t *pool) argument
657 svn_cmdline_auth_ssl_server_trust_prompt(svn_auth_cred_ssl_server_trust_t **cred_p, void *baton, const char *realm, apr_uint32_t failures, const svn_auth_ssl_server_cert_info_t *cert_info, svn_boolean_t may_save, apr_pool_t *pool) argument
752 svn_cmdline_auth_ssl_client_cert_prompt(svn_auth_cred_ssl_client_cert_t **cred_p, void *baton, const char *realm, svn_boolean_t may_save, apr_pool_t *pool) argument
780 svn_cmdline_auth_ssl_client_cert_pw_prompt(svn_auth_cred_ssl_client_cert_pw_t **cred_p, void *baton, const char *realm, svn_boolean_t may_save, apr_pool_t *pool) argument
[all...]
H A Dconfig_auth.c215 const svn_string_t *realm;
249 realm = svn_hash_gets(creds_hash, SVN_CONFIG_REALMSTRING_KEY);
250 if (! realm)
254 realm->data, creds_hash, itempool);
214 const svn_string_t *realm; local
/freebsd-11-stable/contrib/serf/auth/
H A Dauth_basic.c56 const char *eq, *realm = NULL; local
74 if (eq && strncasecmp(auth_attr, "realm", 5) == 0) {
90 realm = serf__construct_realm(code == 401 ? HOST : PROXY,
101 realm, cred_pool);
128 connections in the context to the same server (same realm, username,
131 TODO: we currently don't cache this info per realm, so each time a request
H A Dauth_digest.c49 const char *realm; member in struct:digest_authn_info_t
116 MD5 hash of the combined user name, authentication realm and password */
179 "Digest realm=\"%s\","
183 digest_info->realm, digest_info->username,
246 const char *realm, *realm_name = NULL; local
277 Ex. realm="SVN Digest",
302 if (strcmp(key, "realm") == 0)
320 realm = serf__construct_realm(code == 401 ? HOST : PROXY,
330 realm, cred_pool);
343 TODO: we currently don't cache this info per realm, s
[all...]
/freebsd-11-stable/crypto/heimdal/lib/krb5/
H A Ddigest.c237 krb5_realm realm,
266 if (realm == NULL) {
271 r = realm;
391 if (realm == NULL && r)
412 krb5_realm realm,
431 ret = digest_request(context, realm, ccache,
572 const char *realm)
574 if (digest->request.realm) {
575 krb5_set_error_message(context, EINVAL, "realm already set");
578 digest->request.realm
236 digest_request(krb5_context context, krb5_realm realm, krb5_ccache ccache, krb5_key_usage usage, const DigestReqInner *ireq, DigestRepInner *irep) argument
410 krb5_digest_init_request(krb5_context context, krb5_digest digest, krb5_realm realm, krb5_ccache ccache) argument
570 krb5_digest_set_realm(krb5_context context, krb5_digest digest, const char *realm) argument
706 krb5_digest_request(krb5_context context, krb5_digest digest, krb5_realm realm, krb5_ccache ccache) argument
866 krb5_ntlm_init_request(krb5_context context, krb5_ntlm ntlm, krb5_realm realm, krb5_ccache ccache, uint32_t flags, const char *hostname, const char *domainname) argument
1000 krb5_ntlm_request(krb5_context context, krb5_ntlm ntlm, krb5_realm realm, krb5_ccache ccache) argument
1185 krb5_digest_probe(krb5_context context, krb5_realm realm, krb5_ccache ccache, unsigned *flags) argument
[all...]
H A Dmisc.c67 size = strlen(self->realm);
68 ssize = krb5_storage_write(sp, self->realm, size);
H A Daname_to_localname.c54 if (strcmp (*r, aname->realm) == 0) {
H A Dkrb5-v4compat.h84 char realm[REALM_SZ]; /* Auth domain */ member in struct:credentials
H A Dkeytab_keyfile.c58 char *realm; member in struct:akf_data
62 * set `d->cell' and `d->realm'
105 N_("No realm in ThisCell file %s", ""),
116 d->realm = strdup (buf);
117 if (d->realm == NULL) {
152 free (d->realm);
254 d->realm, "afs", d->cell, NULL);
H A Dticket.c411 N_("Referral EncryptedData wrong for realm %s",
412 "realm"), requested->realm);
437 if (strcmp(requested->realm, returned->realm) != 0) {
440 N_("server ref realm mismatch, "
441 "requested realm %s got back %s", ""),
442 requested->realm, returned->realm);
447 const char *realm local
[all...]
/freebsd-11-stable/crypto/openssl/ssl/
H A Dkssl.h168 krb5_data *realm, krb5_data *entity,
179 const char *realm, int slen,
/freebsd-11-stable/contrib/subversion/subversion/libsvn_ra_svn/
H A Dinternal_auth.c73 const char *realm, apr_pool_t *pool)
80 realmstring = apr_psprintf(pool, "%s %s", sess->realm_prefix, realm);
71 svn_ra_svn__do_internal_auth(svn_ra_svn__session_baton_t *sess, const svn_ra_svn__list_t *mechlist, const char *realm, apr_pool_t *pool) argument
/freebsd-11-stable/crypto/heimdal/kpasswd/
H A Dkpasswdd.c144 reply_error (krb5_realm realm, argument
160 if (realm) {
161 ret = krb5_make_principal (context, &server, realm,
297 princ.realm = *chpw.targrealm;
298 if (princ.realm == NULL) {
299 ret = krb5_get_default_realm(context, &princ.realm);
304 "failed to allocate realm");
307 "failed to allocate realm");
313 free(princ.realm);
339 conf.realm
[all...]
/freebsd-11-stable/crypto/heimdal/lib/hdb/
H A Ddbinfo.c38 char *realm; member in struct:hdb_dbinfo
70 p = krb5_config_get_string(context, db_binding, "realm", NULL);
72 di->realm = strdup(p);
125 krb5_err(context, 1, ret, "failed getting realm");
189 return dbp->realm;
230 free (di->realm);

Completed in 228 milliseconds

123456