Searched refs:principal (Results 126 - 150 of 227) sorted by relevance

12345678910

/macosx-10.10/Heimdal-398.1.2/kadmin/
H A Dget.c48 { "principal", KADM5_PRINCIPAL, 0, 0, "Principal", "Principal", 0 },
171 krb5_unparse_name_fixed_short(context, princ->principal, buf, buf_len);
173 krb5_unparse_name_fixed(context, princ->principal, buf, buf_len);
237 krb5_get_pw_salt (context, princ->principal, &def_salt);
371 do_get_entry(krb5_principal principal, void *data) argument
378 ret = kadm5_get_principal(kadm_handle, principal,
430 do_list_entry(krb5_principal principal, void *data) argument
435 ret = krb5_unparse_name_fixed_short(context, principal, buf, sizeof(buf));
456 #define DEFAULT_COLUMNS_SHORT "principal,princ_expire_time,pw_expiration,last_pwd_change,max_life,max_rlife"
457 #define DEFAULT_COLUMNS_LONG "principal,princ_expire_tim
[all...]
H A Dload.c39 char *principal; member in struct:entry
250 ret = krb5_parse_name(context, p, &ev->principal);
404 e.principal = p;
449 ret = krb5_parse_name(context, e.principal, &ent.entry.principal);
453 filename, line, msg, e.principal);
537 krb5_get_pw_salt(context, ent.entry.principal, &salt2);
H A Dank.c38 * fetch the default principal corresponding to `princ'
61 * Add the principal `name' to the database.
94 princ.principal = princ_ent;
144 princ.principal = NULL;
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dkrb5-private.h416 krb5_principal principal,
570 krb5_const_principal principal,
616 krb5_principal principal,
667 krb5_principal *principal,
707 krb5_principal principal,
786 krb5_principal *principal,
835 krb5_const_principal principal,
H A Dkrb5-protos.h730 * Build a principal using vararg style building
733 * @param principal returned principal
746 krb5_principal *principal,
754 krb5_principal *principal,
762 krb5_principal *principal,
770 krb5_principal *principal,
935 * `principal' as the default principal. On success, `id' needs to be
938 * If the input principal hav
[all...]
H A Dkeytab_keyfile.c253 ret = krb5_make_principal (context, &entry->principal,
260 krb5_free_principal (context, entry->principal);
273 krb5_free_principal (context, entry->principal);
H A Dpkinit.c1106 krb5_principal principal; local
1108 ret = krb5_make_principal(context, &principal, realm,
1114 ret = _krb5_pk_match_cert(context, principal, host, 1);
1115 krb5_free_principal(context, principal);
1806 krb5_principal principal,
2343 krb5_principal principal,
2353 return krb5_get_init_creds_opt_set_pkinit(context, opt, principal, user_id, x509_anchors, pool, pki_revoke, flags, prompter, prompter_data, password);
2359 krb5_principal principal,
2410 krb5_principal_get_realm(context, principal),
2435 if (principal
1805 _krb5_pk_select_cert(krb5_context context, krb5_principal principal, krb5_pk_init_ctx ctx, struct hx509_certs_data *certs) argument
2341 _krb5_get_init_creds_opt_set_pkinit_user_cert(krb5_context context, krb5_get_init_creds_opt *opt, krb5_principal principal, const char *user_id, const char *x509_anchors, char * const * pool, char * const * pki_revoke, int flags, krb5_prompter_fct prompter, void *prompter_data, char *password) argument
2357 krb5_get_init_creds_opt_set_pkinit(krb5_context context, krb5_get_init_creds_opt *opt, krb5_principal principal, const char *user_id, const char *x509_anchors, char * const * pool, char * const * pki_revoke, int flags, krb5_prompter_fct prompter, void *prompter_data, char *password) argument
2555 _krb5_pk_enterprise_cert(krb5_context context, const char *user_id, krb5_const_realm realm, krb5_principal *principal, struct hx509_cert_data **res) argument
2570 krb5_pk_enterprise_cert(krb5_context context, const char *user_id, krb5_const_realm realm, krb5_principal *principal, struct hx509_cert_data **res) argument
2662 _krb5_pk_match_cert(krb5_context context, krb5_principal principal, struct hx509_cert_data *cert, int match_realm) argument
[all...]
/macosx-10.10/MITKerberosShim-66/
H A Dccache.c555 return LOG_FAILURE(ret, "get principal");
1003 * Probe for client principal to make sure the cache really
1085 krb5_principal principal; local
1096 ret = heim_krb5_parse_name(milcontext, in_principal, &principal);
1102 heim_krb5_free_principal(milcontext, principal);
1106 ret = heim_krb5_cc_initialize(milcontext, id, principal);
1107 heim_krb5_free_principal(milcontext, principal);
1124 krb5_principal principal; local
1144 ret = heim_krb5_parse_name(milcontext, in_principal, &principal);
1150 ret = heim_krb5_cc_initialize(milcontext, id, principal);
1172 krb5_principal principal; local
[all...]
H A Dcrypto.c90 mit_krb5_const_principal principal,
93 struct comb_principal *c = (struct comb_principal *)principal;
89 krb5_principal2salt(mit_krb5_context context, mit_krb5_const_principal principal, mit_krb5_data *salt) argument
H A Dkll.c137 #define kCoreAuthPanelKerberosPrincipal "principal"
221 if (strcmp(info->items[i].name, "out-principal") == 0) {
448 krb5_principal principal = NULL; local
460 principal = inPrincipal;
462 ret = heim_krb5_get_default_principal(context, &principal);
467 ret = heim_krb5_cc_cache_match(context, principal, &id);
470 heim_krb5_free_principal(context, principal);
474 in.client = principal;
484 heim_krb5_free_principal(context, principal);
496 heim_krb5_free_principal(context, principal);
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hdb/
H A Dhdb-ldap.c474 krb5_principal_compare(context, ent->entry.principal, orig.entry.principal)
479 ret = krb5_unparse_name(context, ent->entry.principal, &tmp);
493 ret = krb5_unparse_name_short(context, ent->entry.principal, &tmp);
742 krb5_principal * principal)
778 ret = krb5_parse_name(context, p, principal);
986 ret = krb5_parse_name(context, unparsed_name, &ent->entry.principal);
993 ret = krb5_parse_name(context, unparsed_name, &ent->entry.principal);
999 "principal name");
1034 * This violates the ASN1 but it allows a principal t
741 LDAP_dn2principal(krb5_context context, HDB * db, const char *dn, krb5_principal * principal) argument
1607 LDAP_fetch_kvno(krb5_context context, HDB * db, krb5_const_principal principal, unsigned flags, krb5_kvno kvno, hdb_entry_ex * entry) argument
1639 LDAP_fetch(krb5_context context, HDB * db, krb5_const_principal principal, unsigned flags, hdb_entry_ex * entry) argument
1728 LDAP_remove(krb5_context context, HDB *db, krb5_const_principal principal) argument
[all...]
/macosx-10.10/KerberosHelper-151/Source/
H A DKerberosHelper.c179 krb5_principal principal = NULL; local
186 if (krb5_parse_name(ctx, princname, &principal)) {
191 len = krb5_principal_get_num_comp(ctx, principal);
193 *namep = strdup(krb5_principal_get_comp_string(ctx, principal, 0));
195 *instancep = strdup(krb5_principal_get_comp_string(ctx, principal, 1));
196 *realmp = strdup(krb5_principal_get_realm(ctx, principal));
199 if (NULL != principal)
200 krb5_free_principal(ctx, principal);
416 /* Retain any given advertised principal name in the context
787 KRBCopyServicePrincipal will return the service principal fo
1243 krb5_principal principal = NULL; local
1286 CFStringRef principal = NULL, password = NULL; local
[all...]
/macosx-10.10/Heimdal-398.1.2/appl/gssmask/
H A Dgssmask.c201 krb5_principal principal,
220 principal,
521 krb5_principal principal = NULL; local
532 ret = krb5_parse_name(context, name, &principal);
544 gsm_error = acquire_cred(c, principal, opt, &handle);
552 if (principal)
553 krb5_free_principal(context, principal);
857 krb5_principal principal = NULL; local
871 if (principal)
872 krb5_free_principal(context, principal);
200 acquire_cred(struct client *c, krb5_principal principal, krb5_get_init_creds_opt *opt, int32_t *handle) argument
[all...]
/macosx-10.10/CPANInternal-159.1/Authen-Krb5/
H A DKrb5.xs297 krb5_kt_read_service_key(name, principal, kvno = 0, enctype = 0)
299 Authen::Krb5::Principal principal
304 err = krb5_kt_read_service_key(context, name, principal, kvno, enctype,
1027 get_entry(keytab, principal, vno = 0, enctype = 0)
1029 Authen::Krb5::Principal principal
1036 err = krb5_kt_get_entry(context, keytab, principal, vno, enctype,
1116 new(class, principal, vno, key)
1118 Authen::Krb5::Principal principal
1126 RETVAL->principal = principal;
[all...]
/macosx-10.10/CPANInternal-159.1/Krb5-1.9/
H A DKrb5.xs318 krb5_kt_read_service_key(name, principal, kvno = 0, enctype = 0)
320 Authen::Krb5::Principal principal
325 err = krb5_kt_read_service_key(context, name, principal, kvno, enctype,
1138 get_entry(keytab, principal, vno = 0, enctype = 0)
1140 Authen::Krb5::Principal principal
1147 err = krb5_kt_get_entry(context, keytab, principal, vno, enctype,
1227 new(class, principal, vno, key)
1229 Authen::Krb5::Principal principal
1237 RETVAL->principal = principal;
[all...]
/macosx-10.10/Heimdal-398.1.2/kuser/
H A Dklist.c250 krb5_principal principal,
264 ret = krb5_unparse_name (context, principal, &str);
312 printf ("{ %s, \"cache\" : \"%s\", \"principal\" : \"%s\", ", json_version, fullname, str);
362 * Check if there's a tgt for the realm of `principal' and ccache and
468 krb5_principal principal; local
472 ret = krb5_cc_get_principal (context, ccache, &principal);
489 print_tickets (context, ccache, principal, do_verbose,
496 krb5_free_principal (context, principal);
248 print_tickets(krb5_context context, krb5_ccache ccache, krb5_principal principal, int do_verbose, int do_flags, int do_hidden, int do_json) argument
/macosx-10.10/Heimdal-398.1.2/tests/gss/
H A Dcheck-context.in107 # Create a server principal with no AES
180 ${test_context} --name-type=krb5-principal-name host/lucid.test.h5l.se@${R} || \
183 ${test_context} --name-type=krb5-principal-name host/lucid.test.h5l.se || \
195 ${test_context} --no-dns-canon --name-type=krb5-principal-name host/lucid@${R} || \
198 ${test_context} --no-dns-canon --name-type=krb5-principal-name host/lucid || \
457 --name-type=krb5-principal-name host/short || \
467 --name-type=krb5-principal-name \
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dget_princs_s.c63 ret = krb5_unparse_name(context, ent->entry.principal, &princ);
H A Dmodify_s.c61 princ->principal, HDB_F_GET_ANY|HDB_F_ADMIN_DATA, 0, &ent);
/macosx-10.10/Heimdal-398.1.2/tests/apple/
H A Dcheck-apple-ad.in144 ${rkpty} cpw.tmp env ${kpasswd} -c ${cache} --admin-principal=da3admin@${R} ktestuser2@${R} ||
183 ${rkpty} cpw.tmp env ${kpasswd} -c ${cache} --admin-principal=da3admin@${R} ktestuser2@${R} || \
/macosx-10.10/MITKerberosShim-66/mittestcc/
H A Dtest_ccapi_context.c156 * a ccache principal is changed
192 // change principal (fails with ccErrBadInternalMessage)
195 log_error("failed to change ccache's principal - %s (%d)", translate_ccapi_error(err), err);
587 err = check_once_cc_context_create_ccache(context, "name", cc_credentials_v5, NULL, &ccache, ccErrBadParam, "NULL principal"); // NULL principal
600 cc_int32 check_once_cc_context_create_ccache(cc_context_t context, const char *name, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description) { argument
620 err = cc_context_create_ccache(context, name, cred_vers, principal, ccache);
638 // principal
640 if (!err) { check_if(strcmp(stored_principal->data, principal), NULL); }
685 err = check_once_cc_context_create_default_ccache(context, cc_credentials_v5, NULL, &ccache, ccErrBadParam, "NULL principal"); // NUL
698 check_once_cc_context_create_default_ccache(cc_context_t context, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description) argument
790 check_once_cc_context_create_new_ccache(cc_context_t context, cc_int32 should_be_default, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description) argument
[all...]
H A Dtest_ccapi_v2.h22 cc_result check_once_cc_create(apiCB *context, const char *name, cc_int32 cred_vers, const char *principal, ccache_p **ccache, cc_int32 expected_err, const char *description);
/macosx-10.10/dcerpc-61/dcerpc/ncklib/
H A Dsec_id.c173 sec_id_free(&v1->principal);
/macosx-10.10/MITKerberosShim-66/Kerberos/
H A DCredentialsCache2.h102 char principal[KRB_NAME_SZ+1]; member in struct:cc_credentials_v4_compat
132 char* principal; member in struct:infoNC
/macosx-10.10/MITKerberosShim-66/include/
H A Dmit-CredentialsCache2.h102 char principal[KRB_NAME_SZ+1]; member in struct:cc_credentials_v4_compat
132 char* principal; member in struct:infoNC

Completed in 146 milliseconds

12345678910