/freebsd-9.3-release/crypto/heimdal/tests/gss/ |
H A D | check-spnego.in | 84 --realm-max-ticket-life=1day \ 85 --realm-max-renewable-life=1month \
|
/freebsd-9.3-release/usr.bin/csup/ |
H A D | auth.c | 95 char *line, *cmd, *challenge, *realm, *client, *srvresponse, *msg; local 105 realm = proto_get_ascii(&line); 118 if (strcmp(realm, ".") == 0) { 122 error = auth_lookuprecord(realm, &auth);
|
/freebsd-9.3-release/crypto/openssl/crypto/krb5/ |
H A D | krb5_asn.h | 105 * realm[1] Realm, 112 ASN1_GENERALSTRING *realm; member in struct:krb5_tktbody_st
|
H A D | krb5_asn.c | 83 ASN1_EXP(KRB5_TKTBODY, realm, ASN1_GENERALSTRING, 1),
|
/freebsd-9.3-release/crypto/heimdal/appl/su/ |
H A D | su.c | 295 char *name, *instance, realm[REALM_SZ]; local 301 ret = krb_get_lrealm(realm, 1); 314 krb_kuserok(name, instance, realm, su_info->pw_name) == 0) { 319 krb_unparse_name_long (name, instance, realm)); 332 ret = krb_verify_user(name, instance, realm, password,
|
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | get_cred.c | 173 ret = copy_Realm(&in_creds->server->realm, &t->req_body.realm); 251 krbtgt->server->realm, 306 krb5_realm realm, 320 realm, 322 realm, 442 self.realm = impersonate_principal->realm; 648 in_creds->server->realm, 798 krb5_appdefault_boolean(context, NULL, tgts.server->realm, 304 _krb5_get_krbtgt(krb5_context context, krb5_ccache id, krb5_realm realm, krb5_creds **cred) argument 1243 const char *realm = krb5_principal_get_realm(context, client); local [all...] |
H A D | pkinit.c | 499 ret = copy_Realm(&req_body->realm, &ap.pkAuthenticator.kdcRealm); 644 req_body->realm, 653 req_body->realm, 664 req_body->realm, 671 req_body->realm, 679 req_body->realm, 687 req_body->realm, 861 const char *realm, 907 strcmp(r.principalName.name_string.val[1], realm) != 0 || 908 strcmp(r.realm, real 860 pk_verify_host(krb5_context context, const char *realm, const krb5_krbhst_info *hi, struct krb5_pk_init_ctx_data *ctx, struct krb5_pk_cert *host) argument 939 pk_rd_pa_reply_enckey(krb5_context context, int type, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument 1075 pk_rd_pa_reply_dh(krb5_context context, const heim_octet_string *indata, const heim_oid *dataType, const char *realm, krb5_pk_init_ctx ctx, krb5_enctype etype, const krb5_krbhst_info *hi, const DHNonce *c_n, const DHNonce *k_n, unsigned nonce, PA_DATA *pa, krb5_keyblock **key) argument 1248 _krb5_pk_rd_pa_reply(krb5_context context, const char *realm, void *c, krb5_enctype etype, const krb5_krbhst_info *hi, unsigned nonce, const krb5_data *req_buffer, PA_DATA *pa, krb5_keyblock **key) argument [all...] |
H A D | test_princ.c | 52 const char *realm; local 80 realm = krb5_principal_get_realm(context, p); 82 asprintf(&princ_reformed, "%s@%s", princ_short, realm); 213 "because it lacked a realm", princ_short);
|
H A D | build_auth.c | 126 copy_Realm(&cred->client->realm, &auth->crealm);
|
/freebsd-9.3-release/contrib/bind9/lib/dns/ |
H A D | gssapictx.c | 209 * - the default realm in /etc/krb5.conf and the 232 gss_log(ISC_LOG_ERROR, "Unable to get krb5 default realm"); 244 gss_log(ISC_LOG_ERROR, "default realm from krb5.conf (%s) " 277 * dependency due to DNS-based realm lookup in at least one 354 dns_name_t *realm) 375 dns_name_format(realm, rbuf, sizeof(rbuf)); 378 * Find the realm portion. This is the part after the @. If it 405 * Now, we do a simple comparison between the name and the realm. 420 UNUSED(realm); 427 dns_name_t *realm) 353 dst_gssapi_identitymatchesrealmkrb5(dns_name_t *signer, dns_name_t *name, dns_name_t *realm) argument 426 dst_gssapi_identitymatchesrealmms(dns_name_t *signer, dns_name_t *name, dns_name_t *realm) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/appl/login/ |
H A D | login.c | 197 krb5_realm realm = NULL; local 198 krb5_get_default_realm(context, &realm); 200 realm, 202 free(realm); 219 princ->realm, 221 princ->realm,
|
/freebsd-9.3-release/crypto/heimdal/kdc/ |
H A D | 524.c | 57 t->sname, t->realm); 253 if (!config->enable_v4_cross_realm && strcmp (et.crealm, t->realm) != 0) { 254 kdc_log(context, config, 0, "524 cross-realm %s -> %s disabled", et.crealm, 255 t->realm);
|
/freebsd-9.3-release/crypto/heimdal/lib/hdb/ |
H A D | keys.c | 173 krb5_realm *realm = krb5_princ_realm(context, principal); local 174 salt->saltvalue.data = strdup(*realm); 181 salt->saltvalue.length = strlen(*realm);
|
/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | iprop-log.c | 44 get_kadmin_context(const char *config_file, char *realm) argument 69 if(realm) { 71 conf.realm = realm;
|
H A D | create_s.c | 44 krb5_realm *realm = krb5_princ_realm(context->context, princ); local 47 *realm, "default", NULL);
|
H A D | ipropd_slave.c | 429 static char *realm; variable 438 { "realm", 'r', arg_string, &realm }, 521 if(realm) { 523 conf.realm = realm;
|
H A D | admin.h | 206 char *realm; member in struct:_kadm5_config_params
|
/freebsd-9.3-release/crypto/heimdal/tests/db/ |
H A D | loaddump-db.in | 63 --realm-max-ticket-life=1day \ 64 --realm-max-renewable-life=1month \
|
/freebsd-9.3-release/crypto/heimdal/appl/kf/ |
H A D | kf.c | 217 principal->realm, 219 principal->realm,
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | ank.c | 50 krb5_realm *realm = krb5_princ_realm(context->context, princ); local 53 *realm, "default", NULL);
|
/freebsd-9.3-release/lib/libfetch/ |
H A D | http.c | 630 char *realm; member in struct:__anon5216 643 b->realm = b->qop = b->nonce = b->opaque = b->algo = NULL; 650 if (b->realm) 651 free(b->realm); 809 if (!strcasecmp(key, "realm")) 810 cs->challenges[cs->count]->realm = 1021 * The value is like scheme:realm:user:pass 1025 char *realm; member in struct:__anon5219 1033 s->scheme = s->realm = s->user = s->password = 0; 1041 if (s->realm) [all...] |
/freebsd-9.3-release/crypto/openssl/ssl/ |
H A D | kssl.c | 1015 for (ui = 0; ui < (int)princ->realm.length; ui++) 1016 putchar(princ->realm.data[ui]); 1217 if (asn1ticket == NULL || asn1ticket->realm == NULL || 1238 asn1ticket->realm->length, 1239 (char *)asn1ticket->realm->data, 1488 &krb5ticket->enc_part2->client->realm, 1559 * Given an array of (krb5_data *) entity (and optional realm), set the plain 1564 krb5_data *realm, krb5_data *entity, int nentities) 1594 /* Space for the ('@'+realm+NULL | NULL) */ 1595 length += ((realm) 1563 kssl_ctx_setprinc(KSSL_CTX *kssl_ctx, int which, krb5_data *realm, krb5_data *entity, int nentities) argument 2166 kssl_build_principal_2( krb5_context context, krb5_principal *princ, int rlen, const char *realm, int slen, const char *svc, int hlen, const char *host) argument [all...] |
/freebsd-9.3-release/crypto/heimdal/kcm/ |
H A D | acquire.c | 52 krb5_const_realm realm; local 92 realm = krb5_principal_get_realm(context, ccache->client); 95 krb5_get_init_creds_opt_set_default_flags(context, "kcm", realm, &opt);
|
/freebsd-9.3-release/crypto/heimdal/kuser/ |
H A D | kdigest.c | 68 krb5_realm realm; local 71 realm = opt->realm_string; 73 if (realm == NULL) 74 errx(1, "realm missing"); 76 ret = krb5_digest_probe(context, realm, id, &flags);
|
/freebsd-9.3-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | init_sec_context.c | 284 strlen(creds.client->realm), 285 creds.client->realm, 287 creds.client->realm, 459 "gssapi", name->realm,
|