/freebsd-9.3-release/crypto/heimdal/tests/kdc/ |
H A D | check-iprop.in | 78 --realm-max-ticket-life=1day \ 79 --realm-max-renewable-life=1month \
|
H A D | check-pkinit.in | 94 --realm-max-ticket-life=1day \ 95 --realm-max-renewable-life=1month \
|
H A D | check-kdc.in | 88 --realm-max-ticket-life=1day \ 89 --realm-max-renewable-life=1month \ 94 --realm-max-ticket-life=1day \ 95 --realm-max-renewable-life=1month \ 194 echo "Getting client initial tickets for cross realm case"; > messages.log 197 echo "Getting cross realm tickets ($a)"; > messages.log 236 echo "cross realm case (removed user)"; > messages.log 256 echo "rename user to another realm"; > messages.log
|
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/ntlm/ |
H A D | digest.c | 195 kdc_probe(OM_uint32 *minor, void *ctx, const char *realm) argument 201 ret = krb5_digest_probe(c->context, rk_UNCONST(realm), c->id, &flags);
|
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | ad.c | 279 asprintf(&domain, "_ldap._tcp.%s", context->realm); 492 context->realm, context->realm); 855 free(context->realm); 1385 ctx->realm = strdup(realm_params->realm); 1386 if (ctx->realm == NULL) 1389 ret = krb5_get_default_realm(ctx->context, &ctx->realm);
|
H A D | marshall.c | 313 krb5_store_string(sp, params->realm); 332 krb5_ret_string(sp, ¶ms->realm);
|
H A D | ipropd_master.c | 702 static char *realm; variable 713 { "realm", 'r', arg_string, &realm }, 798 if(realm) { 800 conf.realm = realm;
|
/freebsd-9.3-release/crypto/heimdal/appl/rsh/ |
H A D | rsh.c | 242 strlen(principal->realm), 243 principal->realm, 245 principal->realm, 369 krb5_const_realm realm = krb5_principal_get_realm(context, server); local 371 krb5_appdefault_boolean(context, NULL, realm, 375 krb5_appdefault_boolean(context, NULL, realm,
|
/freebsd-9.3-release/contrib/bind9/bin/nsupdate/ |
H A D | nsupdate.c | 207 static char *realm = NULL; variable 1551 if (realm != NULL) { 1552 isc_mem_free(mctx, realm); 1553 realm = NULL; 1562 fatal("realm is too long"); 1563 realm = isc_mem_strdup(mctx, buf); 1564 if (realm == NULL) 1966 if (strcasecmp(word, "realm") == 0) 2501 * Get the realm from the users kerberos ticket if possible 2539 realm [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | init_creds_pw.c | 103 const char *realm, 111 realm, 214 krb5_const_realm realm, 228 realm, 576 ret = copy_Realm(&creds->client->realm, &a->req_body.realm); 1185 a->req_body.realm, 1290 creds->client->realm, &resp); 1551 const char *realm = krb5_principal_get_realm(context, client); local 1556 realm, 102 get_config_time(krb5_context context, const char *realm, const char *name, int def) argument 213 print_expire(krb5_context context, krb5_const_realm realm, krb5_kdc_rep *rep, krb5_prompter_fct prompter, krb5_data *data) argument [all...] |
H A D | get_for_creds.c | 368 copy_Realm (&out_creds->client->realm, krb_cred_info->prealm); 382 copy_Realm (&out_creds->server->realm, krb_cred_info->srealm);
|
H A D | get_in_tkt.c | 176 rep->kdc_rep.ticket.realm); 458 ret = copy_Realm(&creds->client->realm, &a->req_body.realm); 699 ret = krb5_sendto_kdc (context, &req, &creds->client->realm, &resp);
|
H A D | rd_req.c | 156 ticket->realm); 160 ticket->realm, 384 ap_req->ticket.realm); 801 ap_req.ticket.realm);
|
H A D | store.c | 531 ret = krb5_store_string(sp, p->realm); 572 ret = krb5_ret_string(sp, &p->realm); 579 free(p->realm); 588 free(p->realm);
|
H A D | keytab_file.c | 189 ret = krb5_kt_ret_string(context, sp, &p->realm); 233 ret = krb5_kt_store_string(sp, p->realm);
|
/freebsd-9.3-release/crypto/heimdal/lib/asn1/ |
H A D | check-gen.c | 80 COMPARE_STRING(pa,pb,realm); 232 COMPARE_STRING(aa,ab,realm); 268 char *realm = "NADA.KTH.SE"; local 277 e1.crealm = &realm; 279 e1.realm = "NADA.KTH.SE";
|
/freebsd-9.3-release/contrib/telnet/libtelnet/ |
H A D | kerberos5.c | 770 strlen(principal->realm), 771 principal->realm, 773 principal->realm,
|
/freebsd-9.3-release/crypto/heimdal/appl/telnet/libtelnet/ |
H A D | kerberos5.c | 816 strlen(principal->realm), 817 principal->realm, 819 principal->realm,
|
/freebsd-9.3-release/kerberos5/lib/libgssapi_krb5/ |
H A D | gss_krb5.c | 779 gsskrb5_set_default_realm(const char *realm) argument 784 buffer.value = rk_UNCONST(realm); 785 buffer.length = strlen(realm);
|
/freebsd-9.3-release/contrib/tnftp/src/ |
H A D | fetch.c | 150 char *ep, *clear, *realm; local 157 clear = realm = NULL; 171 #define REALM "realm=\"" 182 realm = (char *)ftp_malloc(len + 1); 183 (void)strlcpy(realm, cp, len + 1); 190 fprintf(ttyout, "Username for `%s': ", realm); 233 FREEPTR(realm);
|
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | kerberos5.c | 414 that the cell is the same as the realm in lower 987 b->realm); 1019 b->realm); 1374 * enctype that and older version of a KDC in the same realm can't 1433 copy_Realm(&client->entry.principal->realm, &rep.crealm); 1440 copy_Realm(&server->entry.principal->realm, &rep.ticket.realm); 1512 t = min(t, start + realm->max_life); 1533 t = min(t, start + realm->max_renew); 1610 copy_Realm(&rep.ticket.realm, [all...] |
H A D | krb5tgs.c | 39 * return the realm of a krbtgt-ticket or NULL 591 /* not us, so add the previous realm to transited set */ 612 "cross-realm %s -> %s", client_realm, server_realm); 627 "cross-realm %s -> %s via [%s]", 637 krb5_warn(context, ret, "cross-realm %s -> %s", 733 &rep.ticket.realm); 735 copy_Realm(&tgt_name->realm, &rep.crealm); 854 ek.srealm = rep.ticket.realm; 860 /* Don't sign cross realm tickets, they can't be checked anyway */ 1059 ap_req.ticket.realm); [all...] |
H A D | config.c | 42 char *realm; member in struct:dbinfo 92 "v4-realm", 'r', arg_string, &v4_realm, 93 "realm to serve v4-requests for" 95 { "kerberos4-cross-realm", 0, arg_flag, 296 krb5_errx(context, 1, "Kerberos 4 enabled but no realm configured");
|
H A D | kaserver.c | 286 char *name, char *instance, char *realm, 315 realm, 339 #if 1 /* XXX - Why shouldn't the realm go here? */ 342 krb5_store_stringz (sp, realm); 835 /* if this is a cross realm request, the client_entry will likely 283 create_reply_ticket(krb5_context context, struct rx_header *hdr, Key *skey, char *name, char *instance, char *realm, struct sockaddr_in *addr, int life, int kvno, int32_t max_seq_len, const char *sname, const char *sinstance, uint32_t challenge, const char *label, krb5_keyblock *key, krb5_data *reply) argument
|
/freebsd-9.3-release/crypto/heimdal/kuser/ |
H A D | kimpersonate.c | 123 ticket.realm = *krb5_princ_realm (context, cred->server);
|