/macosx-10.10/Heimdal-398.1.2/kadmin/ |
H A D | get.c | 48 { "principal", KADM5_PRINCIPAL, 0, 0, "Principal", "Principal", 0 }, 171 krb5_unparse_name_fixed_short(context, princ->principal, buf, buf_len); 173 krb5_unparse_name_fixed(context, princ->principal, buf, buf_len); 237 krb5_get_pw_salt (context, princ->principal, &def_salt); 371 do_get_entry(krb5_principal principal, void *data) argument 378 ret = kadm5_get_principal(kadm_handle, principal, 430 do_list_entry(krb5_principal principal, void *data) argument 435 ret = krb5_unparse_name_fixed_short(context, principal, buf, sizeof(buf)); 456 #define DEFAULT_COLUMNS_SHORT "principal,princ_expire_time,pw_expiration,last_pwd_change,max_life,max_rlife" 457 #define DEFAULT_COLUMNS_LONG "principal,princ_expire_tim [all...] |
H A D | load.c | 39 char *principal; member in struct:entry 250 ret = krb5_parse_name(context, p, &ev->principal); 404 e.principal = p; 449 ret = krb5_parse_name(context, e.principal, &ent.entry.principal); 453 filename, line, msg, e.principal); 537 krb5_get_pw_salt(context, ent.entry.principal, &salt2);
|
H A D | ank.c | 38 * fetch the default principal corresponding to `princ' 61 * Add the principal `name' to the database. 94 princ.principal = princ_ent; 144 princ.principal = NULL;
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | krb5-private.h | 416 krb5_principal principal, 570 krb5_const_principal principal, 616 krb5_principal principal, 667 krb5_principal *principal, 707 krb5_principal principal, 786 krb5_principal *principal, 835 krb5_const_principal principal,
|
H A D | krb5-protos.h | 730 * Build a principal using vararg style building 733 * @param principal returned principal 746 krb5_principal *principal, 754 krb5_principal *principal, 762 krb5_principal *principal, 770 krb5_principal *principal, 935 * `principal' as the default principal. On success, `id' needs to be 938 * If the input principal hav [all...] |
H A D | keytab_keyfile.c | 253 ret = krb5_make_principal (context, &entry->principal, 260 krb5_free_principal (context, entry->principal); 273 krb5_free_principal (context, entry->principal);
|
H A D | pkinit.c | 1106 krb5_principal principal; local 1108 ret = krb5_make_principal(context, &principal, realm, 1114 ret = _krb5_pk_match_cert(context, principal, host, 1); 1115 krb5_free_principal(context, principal); 1806 krb5_principal principal, 2343 krb5_principal principal, 2353 return krb5_get_init_creds_opt_set_pkinit(context, opt, principal, user_id, x509_anchors, pool, pki_revoke, flags, prompter, prompter_data, password); 2359 krb5_principal principal, 2410 krb5_principal_get_realm(context, principal), 2435 if (principal 1805 _krb5_pk_select_cert(krb5_context context, krb5_principal principal, krb5_pk_init_ctx ctx, struct hx509_certs_data *certs) argument 2341 _krb5_get_init_creds_opt_set_pkinit_user_cert(krb5_context context, krb5_get_init_creds_opt *opt, krb5_principal principal, const char *user_id, const char *x509_anchors, char * const * pool, char * const * pki_revoke, int flags, krb5_prompter_fct prompter, void *prompter_data, char *password) argument 2357 krb5_get_init_creds_opt_set_pkinit(krb5_context context, krb5_get_init_creds_opt *opt, krb5_principal principal, const char *user_id, const char *x509_anchors, char * const * pool, char * const * pki_revoke, int flags, krb5_prompter_fct prompter, void *prompter_data, char *password) argument 2555 _krb5_pk_enterprise_cert(krb5_context context, const char *user_id, krb5_const_realm realm, krb5_principal *principal, struct hx509_cert_data **res) argument 2570 krb5_pk_enterprise_cert(krb5_context context, const char *user_id, krb5_const_realm realm, krb5_principal *principal, struct hx509_cert_data **res) argument 2662 _krb5_pk_match_cert(krb5_context context, krb5_principal principal, struct hx509_cert_data *cert, int match_realm) argument [all...] |
/macosx-10.10/MITKerberosShim-66/ |
H A D | ccache.c | 555 return LOG_FAILURE(ret, "get principal"); 1003 * Probe for client principal to make sure the cache really 1085 krb5_principal principal; local 1096 ret = heim_krb5_parse_name(milcontext, in_principal, &principal); 1102 heim_krb5_free_principal(milcontext, principal); 1106 ret = heim_krb5_cc_initialize(milcontext, id, principal); 1107 heim_krb5_free_principal(milcontext, principal); 1124 krb5_principal principal; local 1144 ret = heim_krb5_parse_name(milcontext, in_principal, &principal); 1150 ret = heim_krb5_cc_initialize(milcontext, id, principal); 1172 krb5_principal principal; local [all...] |
H A D | crypto.c | 90 mit_krb5_const_principal principal, 93 struct comb_principal *c = (struct comb_principal *)principal; 89 krb5_principal2salt(mit_krb5_context context, mit_krb5_const_principal principal, mit_krb5_data *salt) argument
|
H A D | kll.c | 137 #define kCoreAuthPanelKerberosPrincipal "principal" 221 if (strcmp(info->items[i].name, "out-principal") == 0) { 448 krb5_principal principal = NULL; local 460 principal = inPrincipal; 462 ret = heim_krb5_get_default_principal(context, &principal); 467 ret = heim_krb5_cc_cache_match(context, principal, &id); 470 heim_krb5_free_principal(context, principal); 474 in.client = principal; 484 heim_krb5_free_principal(context, principal); 496 heim_krb5_free_principal(context, principal); [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hdb/ |
H A D | hdb-ldap.c | 474 krb5_principal_compare(context, ent->entry.principal, orig.entry.principal) 479 ret = krb5_unparse_name(context, ent->entry.principal, &tmp); 493 ret = krb5_unparse_name_short(context, ent->entry.principal, &tmp); 742 krb5_principal * principal) 778 ret = krb5_parse_name(context, p, principal); 986 ret = krb5_parse_name(context, unparsed_name, &ent->entry.principal); 993 ret = krb5_parse_name(context, unparsed_name, &ent->entry.principal); 999 "principal name"); 1034 * This violates the ASN1 but it allows a principal t 741 LDAP_dn2principal(krb5_context context, HDB * db, const char *dn, krb5_principal * principal) argument 1607 LDAP_fetch_kvno(krb5_context context, HDB * db, krb5_const_principal principal, unsigned flags, krb5_kvno kvno, hdb_entry_ex * entry) argument 1639 LDAP_fetch(krb5_context context, HDB * db, krb5_const_principal principal, unsigned flags, hdb_entry_ex * entry) argument 1728 LDAP_remove(krb5_context context, HDB *db, krb5_const_principal principal) argument [all...] |
/macosx-10.10/KerberosHelper-151/Source/ |
H A D | KerberosHelper.c | 179 krb5_principal principal = NULL; local 186 if (krb5_parse_name(ctx, princname, &principal)) { 191 len = krb5_principal_get_num_comp(ctx, principal); 193 *namep = strdup(krb5_principal_get_comp_string(ctx, principal, 0)); 195 *instancep = strdup(krb5_principal_get_comp_string(ctx, principal, 1)); 196 *realmp = strdup(krb5_principal_get_realm(ctx, principal)); 199 if (NULL != principal) 200 krb5_free_principal(ctx, principal); 416 /* Retain any given advertised principal name in the context 787 KRBCopyServicePrincipal will return the service principal fo 1243 krb5_principal principal = NULL; local 1286 CFStringRef principal = NULL, password = NULL; local [all...] |
/macosx-10.10/Heimdal-398.1.2/appl/gssmask/ |
H A D | gssmask.c | 201 krb5_principal principal, 220 principal, 521 krb5_principal principal = NULL; local 532 ret = krb5_parse_name(context, name, &principal); 544 gsm_error = acquire_cred(c, principal, opt, &handle); 552 if (principal) 553 krb5_free_principal(context, principal); 857 krb5_principal principal = NULL; local 871 if (principal) 872 krb5_free_principal(context, principal); 200 acquire_cred(struct client *c, krb5_principal principal, krb5_get_init_creds_opt *opt, int32_t *handle) argument [all...] |
/macosx-10.10/CPANInternal-159.1/Authen-Krb5/ |
H A D | Krb5.xs | 297 krb5_kt_read_service_key(name, principal, kvno = 0, enctype = 0) 299 Authen::Krb5::Principal principal 304 err = krb5_kt_read_service_key(context, name, principal, kvno, enctype, 1027 get_entry(keytab, principal, vno = 0, enctype = 0) 1029 Authen::Krb5::Principal principal 1036 err = krb5_kt_get_entry(context, keytab, principal, vno, enctype, 1116 new(class, principal, vno, key) 1118 Authen::Krb5::Principal principal 1126 RETVAL->principal = principal; [all...] |
/macosx-10.10/CPANInternal-159.1/Krb5-1.9/ |
H A D | Krb5.xs | 318 krb5_kt_read_service_key(name, principal, kvno = 0, enctype = 0) 320 Authen::Krb5::Principal principal 325 err = krb5_kt_read_service_key(context, name, principal, kvno, enctype, 1138 get_entry(keytab, principal, vno = 0, enctype = 0) 1140 Authen::Krb5::Principal principal 1147 err = krb5_kt_get_entry(context, keytab, principal, vno, enctype, 1227 new(class, principal, vno, key) 1229 Authen::Krb5::Principal principal 1237 RETVAL->principal = principal; [all...] |
/macosx-10.10/Heimdal-398.1.2/kuser/ |
H A D | klist.c | 250 krb5_principal principal, 264 ret = krb5_unparse_name (context, principal, &str); 312 printf ("{ %s, \"cache\" : \"%s\", \"principal\" : \"%s\", ", json_version, fullname, str); 362 * Check if there's a tgt for the realm of `principal' and ccache and 468 krb5_principal principal; local 472 ret = krb5_cc_get_principal (context, ccache, &principal); 489 print_tickets (context, ccache, principal, do_verbose, 496 krb5_free_principal (context, principal); 248 print_tickets(krb5_context context, krb5_ccache ccache, krb5_principal principal, int do_verbose, int do_flags, int do_hidden, int do_json) argument
|
/macosx-10.10/Heimdal-398.1.2/tests/gss/ |
H A D | check-context.in | 107 # Create a server principal with no AES 180 ${test_context} --name-type=krb5-principal-name host/lucid.test.h5l.se@${R} || \ 183 ${test_context} --name-type=krb5-principal-name host/lucid.test.h5l.se || \ 195 ${test_context} --no-dns-canon --name-type=krb5-principal-name host/lucid@${R} || \ 198 ${test_context} --no-dns-canon --name-type=krb5-principal-name host/lucid || \ 457 --name-type=krb5-principal-name host/short || \ 467 --name-type=krb5-principal-name \
|
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | get_princs_s.c | 63 ret = krb5_unparse_name(context, ent->entry.principal, &princ);
|
H A D | modify_s.c | 61 princ->principal, HDB_F_GET_ANY|HDB_F_ADMIN_DATA, 0, &ent);
|
/macosx-10.10/Heimdal-398.1.2/tests/apple/ |
H A D | check-apple-ad.in | 144 ${rkpty} cpw.tmp env ${kpasswd} -c ${cache} --admin-principal=da3admin@${R} ktestuser2@${R} || 183 ${rkpty} cpw.tmp env ${kpasswd} -c ${cache} --admin-principal=da3admin@${R} ktestuser2@${R} || \
|
/macosx-10.10/MITKerberosShim-66/mittestcc/ |
H A D | test_ccapi_context.c | 156 * a ccache principal is changed 192 // change principal (fails with ccErrBadInternalMessage) 195 log_error("failed to change ccache's principal - %s (%d)", translate_ccapi_error(err), err); 587 err = check_once_cc_context_create_ccache(context, "name", cc_credentials_v5, NULL, &ccache, ccErrBadParam, "NULL principal"); // NULL principal 600 cc_int32 check_once_cc_context_create_ccache(cc_context_t context, const char *name, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description) { argument 620 err = cc_context_create_ccache(context, name, cred_vers, principal, ccache); 638 // principal 640 if (!err) { check_if(strcmp(stored_principal->data, principal), NULL); } 685 err = check_once_cc_context_create_default_ccache(context, cc_credentials_v5, NULL, &ccache, ccErrBadParam, "NULL principal"); // NUL 698 check_once_cc_context_create_default_ccache(cc_context_t context, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description) argument 790 check_once_cc_context_create_new_ccache(cc_context_t context, cc_int32 should_be_default, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description) argument [all...] |
H A D | test_ccapi_v2.h | 22 cc_result check_once_cc_create(apiCB *context, const char *name, cc_int32 cred_vers, const char *principal, ccache_p **ccache, cc_int32 expected_err, const char *description);
|
/macosx-10.10/dcerpc-61/dcerpc/ncklib/ |
H A D | sec_id.c | 173 sec_id_free(&v1->principal);
|
/macosx-10.10/MITKerberosShim-66/Kerberos/ |
H A D | CredentialsCache2.h | 102 char principal[KRB_NAME_SZ+1]; member in struct:cc_credentials_v4_compat 132 char* principal; member in struct:infoNC
|
/macosx-10.10/MITKerberosShim-66/include/ |
H A D | mit-CredentialsCache2.h | 102 char principal[KRB_NAME_SZ+1]; member in struct:cc_credentials_v4_compat 132 char* principal; member in struct:infoNC
|