/macosx-10.10/OpenLDAP-499.27/OpenLDAP/libraries/libldap/ |
H A D | gssapi.c | 504 gss_name_t *principal ) 566 Debug( LDAP_DEBUG_TRACE, "principal for host[%s]: '%s'\n", 572 gss_rc = gss_import_name( &minor_status, &input_name, &nt_principal, principal ); 661 gss_name_t principal = GSS_C_NO_NAME; local 683 rc = guess_service_principal( ld, ldapServiceName, dnsHostName, &principal ); 714 principal, 751 principal, 793 if ( principal != GSS_C_NO_NAME ) { 794 gss_release_name( &minor_status, &principal );
|
/macosx-10.10/Heimdal-398.1.2/appl/telnet/libtelnet/ |
H A D | kerberos5.c | 794 krb5_principal principal; local 804 ret = krb5_cc_get_principal (context, ccache, &principal); 807 printf ("KerberosV5: could not get principal: %s\r\n", 814 creds.client = principal; 818 principal->realm, 820 principal->realm, 825 printf ("KerberosV5: could not get principal: %s\r\n",
|
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | krb5tgs.c | 522 * of the principals here, while "target" is the principal 525 if(!krb5_realm_compare(context, client->entry.principal, server->entry.principal)) { 538 if (krb5_principal_compare(context, client->entry.principal, server->entry.principal) == TRUE) 563 * For example, regardless of the principal being impersonated, if the 577 if (krb5_principal_compare(context, client->entry.principal, server) == TRUE) 773 3) principal requires checking 774 4) we allow non-check per-principal, but principal is [all...] |
H A D | kerberos5.c | 114 _kdc_is_weak_exception(krb5_principal principal, krb5_enctype etype) argument 116 if (principal->name.name_string.len > 0 && 117 strcmp(principal->name.name_string.val[0], "afs") == 0 && 161 ret = krb5_get_pw_salt(context, princ->entry.principal, &def_salt); 216 * supported by the cryptosystem and by the given principal. 226 !_kdc_is_weak_exception(princ->entry.principal, etypes[i])) 356 "impersonate principal"); 1732 r->client->entry.principal, 1756 _kdc_is_anonymous(krb5_context context, krb5_principal principal) argument 1758 if (principal [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hdb/ |
H A D | hdb-sqlite.c | 72 " principal TEXT UNIQUE NOT NULL," \ 89 " WHERE Principal.principal = ? AND" \ 93 " WHERE principal = ?" 97 " INSERT INTO Principal (principal, entry, canonical)" \ 100 " INSERT INTO Principal (principal, entry, canonical)" \ 111 " WHERE principal = ?)" 375 * principal in the Principal database table, both 380 * @param principal The principal whose entry to search for 387 hdb_sqlite_fetch_kvno(krb5_context context, HDB *db, krb5_const_principal principal, argument 789 hdb_sqlite_remove(krb5_context context, HDB *db, krb5_const_principal principal) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | changepw.c | 374 * principal indicated in them) to `newpw', storing the result of 537 * @param creds The initial kadmin/passwd for the principal or an admin principal 540 * argument. Targprinc is the principal to change the password 542 * change another Kerberos principal's password, ie you are an 543 * admin. If NULL, the default authenticating principal in the 602 * kadmin/changepw principal. 605 * argument. Targprinc is the principal to change the password 607 * change another Kerberos principal's password, ie you are an 608 * admin. If NULL, the default authenticating principal i 631 krb5_principal principal = NULL; local [all...] |
H A D | fcache.c | 698 krb5_principal *principal) 707 ret = krb5_ret_principal(sp, principal); 727 krb5_principal principal; local 746 ret = krb5_ret_principal (FCC_CURSOR(*cursor)->sp, &principal); 752 krb5_free_principal (context, principal); 696 fcc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | mit.c | 415 krb5_principal principal, 488 kadm5_mit_delete_principal(void *server_handle, krb5_principal principal) argument 501 CHECK(_kadm5_xdr_store_principal_xdr(context->context, sp, principal)); 544 krb5_principal principal, 559 CHECK(_kadm5_xdr_store_principal_xdr(context->context, sp, principal)); 658 krb5_principal principal, 676 CHECK(_kadm5_xdr_store_principal_xdr(context->context, sp, principal)); 414 kadm5_mit_chpass_principal(void *server_handle, krb5_principal principal, int keepold, const char *password, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple) argument 543 kadm5_mit_get_principal(void *server_handle, krb5_principal principal, kadm5_principal_ent_t entry, uint32_t mask) argument 657 kadm5_mit_randkey_principal(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keys, int *n_keys) argument
|
H A D | iprop-log.c | 151 krb5_unparse_name(scontext, ent.principal, &name2); 178 if(ent.principal /* mask & KADM5_PRINCIPAL */) { 179 krb5_unparse_name(scontext, ent.principal, &name1); 180 printf(" principal = %s\n", name1);
|
H A D | admin.h | 142 krb5_principal principal; member in struct:_kadm5_principal_ent_t
|
H A D | set_keys.c | 53 ent->principal, 149 * assume we must be setting the principal's kvno as well! 346 ret = hdb_generate_key_set(context->context, ent->principal,
|
H A D | log.c | 372 krb5_principal principal; local 374 ret = krb5_ret_principal (sp, &principal); 377 "principal from log version: %ld", (long)ver); 381 ret = context->db->hdb_remove(context->context, context->db, principal); 382 krb5_free_principal (context->context, principal); 475 "principal in log, version: %ld", (long)ver); 590 log_ent.entry.principal,
|
/macosx-10.10/Heimdal-398.1.2/kadmin/ |
H A D | add-random-users.c | 97 ret = krb5_parse_name(context, name, &princ.principal);
|
H A D | server.c | 145 krb5_unparse_name_fixed(contextp->context, ent.principal, 149 ent.principal); 179 krb5_unparse_name_fixed(contextp->context, ent.principal, 183 ent.principal); 250 * b) it's for the principal him/herself and this was an 378 * a) it's for the principal him/herself and this was an initial ticket 561 krb5_errx (contextp, 1, "ticket for strange principal (%s)",
|
H A D | mod.c | 220 do_mod_entry(krb5_principal principal, void *data) argument 228 ret = kadm5_get_principal(kadm_handle, principal, &princ,
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/ |
H A D | gsskrb5_locl.h | 151 krb5_principal principal; member in struct:gsskrb5_cred
|
H A D | accept_sec_context.c | 616 acceptor_cred->principal && 617 krb5_principal_is_gss_hostbased_service(context, acceptor_cred->principal)); 629 server = acceptor_cred->principal; 710 strcmp(sp->name.name_string.val[0], acceptor_cred->principal->name.name_string.val[0]) != 0) 714 acceptor_cred->principal->name.name_string.val[0], 731 * We need to copy the principal names to the context and the
|
/macosx-10.10/Heimdal-398.1.2/tests/gss/ |
H A D | check-basic.in | 145 echo "keytab default realm wrong (kerberos principal)" 150 --name-type=krb5-principal-name \ 153 echo "keytab default realm wrong (kerberos principal referral)" 158 --name-type=krb5-principal-name-referral \
|
/macosx-10.10/Heimdal-398.1.2/tests/kdc/ |
H A D | check-pkinit.in | 133 --pk-init-principal="krbtgt/TEST.H5L.SE@TEST.H5L.SE" \ 141 --pk-init-principal="bar@TEST.H5L.SE" \ 185 echo "Trying pk-init (principal in cert)"; > messages.log 192 echo "Trying pk-init (principal in pki-mapping file) "; > messages.log 198 echo "Trying pk-init (principal subject in DB)"; > messages.log 230 echo "Trying pk-init (principal in cert)"; > messages.log 237 echo "Trying pk-init (principal in pki-mapping file) "; > messages.log 243 echo "Trying pk-init (principal subject in DB)"; > messages.log 281 echo "Trying pk-init (principal in pki-mapping file) "; > messages.log
|
/macosx-10.10/pam_modules-140/common/ |
H A D | Common.c | 729 /* extract the principal from OpenDirectory */ 735 CFStringRef principal = NULL; local 792 principal = CFArrayGetValueAtIndex(authparts, 3); 793 if (NULL == principal) { 794 openpam_log(PAM_LOG_DEBUG, "no principal found in authentication authority"); 799 retval = cfstring_to_cstring(principal, od_principal);
|
/macosx-10.10/vim-55/runtime/syntax/ |
H A D | fetchmail.vim | 34 \ checkalias uidl interval netsec principal
|
/macosx-10.10/OpenLDAP-499.27/OpenLDAP/contrib/slapd-modules/smbk5pwd/ |
H A D | smbk5pwd.c | 354 ret = krb5_parse_name(context, a->a_vals[0].bv_val, &ent.principal); 369 krb5_get_pw_salt( context, ent.principal, &salt ); 370 krb5_free_principal( context, ent.principal ); 451 ret = krb5_parse_name(context, a->a_vals[0].bv_val, &ent.principal); 470 ret = hdb_generate_key_set_password(context, ent.principal, 474 krb5_free_principal( context, ent.principal );
|
/macosx-10.10/Heimdal-398.1.2/appl/rsh/ |
H A D | rsh.c | 169 krb5_principal principal; local 180 ret = krb5_cc_get_principal (context, ccache, &principal); 187 creds.client = principal; 191 principal->realm, 193 principal->realm, 315 /* do this while we have a principal */
|
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | ca.c | 584 * certificate object. The principal string is a UTF8 string. 588 * @param principal Kerberos principal to add to the certificate. 598 const char *principal) 608 /* parse principal */ 616 for(str = principal; *str != '\0' && *str != '@'; str++){ 621 "trailing \\ in principal name"); 638 q = s = strdup(principal); 647 hx509_set_error_string(context, 0, ret, "Missing @ in principal"); 719 * certificate object. The principal strin 596 hx509_ca_tbs_add_san_pkinit(hx509_context context, hx509_ca_tbs tbs, const char *principal) argument 731 hx509_ca_tbs_add_san_ms_upn(hx509_context context, hx509_ca_tbs tbs, const char *principal) argument [all...] |
/macosx-10.10/libxslt-13/libxslt/libxslt/ |
H A D | xsltInternals.h | 144 (((s) != NULL) && ((s)->principal) && \ 145 ((s)->principal->principalData) && \ 146 ((s)->principal->principalData->nsMap)) 153 #define XSLT_GET_INTERNAL_NSMAP(s) ((s)->principal->principalData->nsMap) 1627 * The principal stylesheet 1629 xsltStylesheetPtr principal; member in struct:_xsltStylesheet
|