Searched refs:principal (Results 151 - 175 of 227) sorted by relevance

12345678910

/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/libldap/
H A Dgssapi.c504 gss_name_t *principal )
566 Debug( LDAP_DEBUG_TRACE, "principal for host[%s]: '%s'\n",
572 gss_rc = gss_import_name( &minor_status, &input_name, &nt_principal, principal );
661 gss_name_t principal = GSS_C_NO_NAME; local
683 rc = guess_service_principal( ld, ldapServiceName, dnsHostName, &principal );
714 principal,
751 principal,
793 if ( principal != GSS_C_NO_NAME ) {
794 gss_release_name( &minor_status, &principal );
/macosx-10.10/Heimdal-398.1.2/appl/telnet/libtelnet/
H A Dkerberos5.c794 krb5_principal principal; local
804 ret = krb5_cc_get_principal (context, ccache, &principal);
807 printf ("KerberosV5: could not get principal: %s\r\n",
814 creds.client = principal;
818 principal->realm,
820 principal->realm,
825 printf ("KerberosV5: could not get principal: %s\r\n",
/macosx-10.10/Heimdal-398.1.2/kdc/
H A Dkrb5tgs.c522 * of the principals here, while "target" is the principal
525 if(!krb5_realm_compare(context, client->entry.principal, server->entry.principal)) {
538 if (krb5_principal_compare(context, client->entry.principal, server->entry.principal) == TRUE)
563 * For example, regardless of the principal being impersonated, if the
577 if (krb5_principal_compare(context, client->entry.principal, server) == TRUE)
773 3) principal requires checking
774 4) we allow non-check per-principal, but principal is
[all...]
H A Dkerberos5.c114 _kdc_is_weak_exception(krb5_principal principal, krb5_enctype etype) argument
116 if (principal->name.name_string.len > 0 &&
117 strcmp(principal->name.name_string.val[0], "afs") == 0 &&
161 ret = krb5_get_pw_salt(context, princ->entry.principal, &def_salt);
216 * supported by the cryptosystem and by the given principal.
226 !_kdc_is_weak_exception(princ->entry.principal, etypes[i]))
356 "impersonate principal");
1732 r->client->entry.principal,
1756 _kdc_is_anonymous(krb5_context context, krb5_principal principal) argument
1758 if (principal
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hdb/
H A Dhdb-sqlite.c72 " principal TEXT UNIQUE NOT NULL," \
89 " WHERE Principal.principal = ? AND" \
93 " WHERE principal = ?"
97 " INSERT INTO Principal (principal, entry, canonical)" \
100 " INSERT INTO Principal (principal, entry, canonical)" \
111 " WHERE principal = ?)"
375 * principal in the Principal database table, both
380 * @param principal The principal whose entry to search for
387 hdb_sqlite_fetch_kvno(krb5_context context, HDB *db, krb5_const_principal principal, argument
789 hdb_sqlite_remove(krb5_context context, HDB *db, krb5_const_principal principal) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dchangepw.c374 * principal indicated in them) to `newpw', storing the result of
537 * @param creds The initial kadmin/passwd for the principal or an admin principal
540 * argument. Targprinc is the principal to change the password
542 * change another Kerberos principal's password, ie you are an
543 * admin. If NULL, the default authenticating principal in the
602 * kadmin/changepw principal.
605 * argument. Targprinc is the principal to change the password
607 * change another Kerberos principal's password, ie you are an
608 * admin. If NULL, the default authenticating principal i
631 krb5_principal principal = NULL; local
[all...]
H A Dfcache.c698 krb5_principal *principal)
707 ret = krb5_ret_principal(sp, principal);
727 krb5_principal principal; local
746 ret = krb5_ret_principal (FCC_CURSOR(*cursor)->sp, &principal);
752 krb5_free_principal (context, principal);
696 fcc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dmit.c415 krb5_principal principal,
488 kadm5_mit_delete_principal(void *server_handle, krb5_principal principal) argument
501 CHECK(_kadm5_xdr_store_principal_xdr(context->context, sp, principal));
544 krb5_principal principal,
559 CHECK(_kadm5_xdr_store_principal_xdr(context->context, sp, principal));
658 krb5_principal principal,
676 CHECK(_kadm5_xdr_store_principal_xdr(context->context, sp, principal));
414 kadm5_mit_chpass_principal(void *server_handle, krb5_principal principal, int keepold, const char *password, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple) argument
543 kadm5_mit_get_principal(void *server_handle, krb5_principal principal, kadm5_principal_ent_t entry, uint32_t mask) argument
657 kadm5_mit_randkey_principal(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keys, int *n_keys) argument
H A Diprop-log.c151 krb5_unparse_name(scontext, ent.principal, &name2);
178 if(ent.principal /* mask & KADM5_PRINCIPAL */) {
179 krb5_unparse_name(scontext, ent.principal, &name1);
180 printf(" principal = %s\n", name1);
H A Dadmin.h142 krb5_principal principal; member in struct:_kadm5_principal_ent_t
H A Dset_keys.c53 ent->principal,
149 * assume we must be setting the principal's kvno as well!
346 ret = hdb_generate_key_set(context->context, ent->principal,
H A Dlog.c372 krb5_principal principal; local
374 ret = krb5_ret_principal (sp, &principal);
377 "principal from log version: %ld", (long)ver);
381 ret = context->db->hdb_remove(context->context, context->db, principal);
382 krb5_free_principal (context->context, principal);
475 "principal in log, version: %ld", (long)ver);
590 log_ent.entry.principal,
/macosx-10.10/Heimdal-398.1.2/kadmin/
H A Dadd-random-users.c97 ret = krb5_parse_name(context, name, &princ.principal);
H A Dserver.c145 krb5_unparse_name_fixed(contextp->context, ent.principal,
149 ent.principal);
179 krb5_unparse_name_fixed(contextp->context, ent.principal,
183 ent.principal);
250 * b) it's for the principal him/herself and this was an
378 * a) it's for the principal him/herself and this was an initial ticket
561 krb5_errx (contextp, 1, "ticket for strange principal (%s)",
H A Dmod.c220 do_mod_entry(krb5_principal principal, void *data) argument
228 ret = kadm5_get_principal(kadm_handle, principal, &princ,
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/
H A Dgsskrb5_locl.h151 krb5_principal principal; member in struct:gsskrb5_cred
H A Daccept_sec_context.c616 acceptor_cred->principal &&
617 krb5_principal_is_gss_hostbased_service(context, acceptor_cred->principal));
629 server = acceptor_cred->principal;
710 strcmp(sp->name.name_string.val[0], acceptor_cred->principal->name.name_string.val[0]) != 0)
714 acceptor_cred->principal->name.name_string.val[0],
731 * We need to copy the principal names to the context and the
/macosx-10.10/Heimdal-398.1.2/tests/gss/
H A Dcheck-basic.in145 echo "keytab default realm wrong (kerberos principal)"
150 --name-type=krb5-principal-name \
153 echo "keytab default realm wrong (kerberos principal referral)"
158 --name-type=krb5-principal-name-referral \
/macosx-10.10/Heimdal-398.1.2/tests/kdc/
H A Dcheck-pkinit.in133 --pk-init-principal="krbtgt/TEST.H5L.SE@TEST.H5L.SE" \
141 --pk-init-principal="bar@TEST.H5L.SE" \
185 echo "Trying pk-init (principal in cert)"; > messages.log
192 echo "Trying pk-init (principal in pki-mapping file) "; > messages.log
198 echo "Trying pk-init (principal subject in DB)"; > messages.log
230 echo "Trying pk-init (principal in cert)"; > messages.log
237 echo "Trying pk-init (principal in pki-mapping file) "; > messages.log
243 echo "Trying pk-init (principal subject in DB)"; > messages.log
281 echo "Trying pk-init (principal in pki-mapping file) "; > messages.log
/macosx-10.10/pam_modules-140/common/
H A DCommon.c729 /* extract the principal from OpenDirectory */
735 CFStringRef principal = NULL; local
792 principal = CFArrayGetValueAtIndex(authparts, 3);
793 if (NULL == principal) {
794 openpam_log(PAM_LOG_DEBUG, "no principal found in authentication authority");
799 retval = cfstring_to_cstring(principal, od_principal);
/macosx-10.10/vim-55/runtime/syntax/
H A Dfetchmail.vim34 \ checkalias uidl interval netsec principal
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/smbk5pwd/
H A Dsmbk5pwd.c354 ret = krb5_parse_name(context, a->a_vals[0].bv_val, &ent.principal);
369 krb5_get_pw_salt( context, ent.principal, &salt );
370 krb5_free_principal( context, ent.principal );
451 ret = krb5_parse_name(context, a->a_vals[0].bv_val, &ent.principal);
470 ret = hdb_generate_key_set_password(context, ent.principal,
474 krb5_free_principal( context, ent.principal );
/macosx-10.10/Heimdal-398.1.2/appl/rsh/
H A Drsh.c169 krb5_principal principal; local
180 ret = krb5_cc_get_principal (context, ccache, &principal);
187 creds.client = principal;
191 principal->realm,
193 principal->realm,
315 /* do this while we have a principal */
/macosx-10.10/Heimdal-398.1.2/lib/hx509/
H A Dca.c584 * certificate object. The principal string is a UTF8 string.
588 * @param principal Kerberos principal to add to the certificate.
598 const char *principal)
608 /* parse principal */
616 for(str = principal; *str != '\0' && *str != '@'; str++){
621 "trailing \\ in principal name");
638 q = s = strdup(principal);
647 hx509_set_error_string(context, 0, ret, "Missing @ in principal");
719 * certificate object. The principal strin
596 hx509_ca_tbs_add_san_pkinit(hx509_context context, hx509_ca_tbs tbs, const char *principal) argument
731 hx509_ca_tbs_add_san_ms_upn(hx509_context context, hx509_ca_tbs tbs, const char *principal) argument
[all...]
/macosx-10.10/libxslt-13/libxslt/libxslt/
H A DxsltInternals.h144 (((s) != NULL) && ((s)->principal) && \
145 ((s)->principal->principalData) && \
146 ((s)->principal->principalData->nsMap))
153 #define XSLT_GET_INTERNAL_NSMAP(s) ((s)->principal->principalData->nsMap)
1627 * The principal stylesheet
1629 xsltStylesheetPtr principal; member in struct:_xsltStylesheet

Completed in 213 milliseconds

12345678910