Searched refs:principal (Results 76 - 100 of 227) sorted by relevance

12345678910

/macosx-10.10/Heimdal-398.1.2/tests/db/mit-krb5kdc/
H A Dkdc.conf18 database_name = /var/db/krb5kdc/principal.LKDC:SHA1.58FCE36DBDBD86AE701093B4B1D79ADD0705D00B
/macosx-10.10/KerberosHelper-151/Tests/migration/data/10.6/private/var/db/krb5kdc/
H A Dkdc.conf18 database_name = /var/db/krb5kdc/principal.LKDC:SHA1.D0649BAA5F1ADD13B5FEE2729DCCCC5210DDD94B
/macosx-10.10/KerberosHelper-151/Tests/migration/data/10.6/var/db/krb5kdc/
H A Dkdc.conf18 database_name = /var/db/krb5kdc/principal.LKDC:SHA1.D0649BAA5F1ADD13B5FEE2729DCCCC5210DDD94B
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dtest_keytab.c82 ret = krb5_parse_name(context, "lha@SU.SE", &entry.principal);
99 entry.principal,
112 entry.principal,
130 ret = krb5_parse_name(context, "lha3@SU.SE", &entry3.principal);
148 entry.principal,
169 krb5_free_principal(context, entry3.principal);
H A Dtest_ap-req.c51 "let server pick the principal", NULL },
168 const char *principal, *keytab, *ccache; local
192 principal = argv[0];
204 ret = krb5_parse_name(context, principal, &sprincipal);
H A Ddeprecated.c316 krb5_principal principal = args->principal; variable
326 ret = krb5_kt_get_entry (context, real_keytab, principal,
360 a.principal = creds->client;
405 krb5_principal principal)
408 return &principal->realm;
420 krb5_principal principal,
424 principal->realm = *realm;
H A Dkcache.c61 * The service principal name
306 CFStringCreateFromPrincipal(CFAllocatorRef alloc, krb5_context context, krb5_principal principal) argument
311 if (krb5_unparse_name(context, principal, &p) != 0)
330 CFStringRef principal = NULL; local
353 principal = CFStringCreateFromPrincipal(NULL, context, primary_principal);
354 if (principal == NULL) {
359 label = CFStringCreateWithFormat(NULL, NULL, CFSTR("Kerberos credentials for %@"), principal);
389 principal,
412 if (principal)
413 CFRelease(principal);
453 CFStringRef principal = NULL; local
563 kcc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument
[all...]
H A Dcache.c84 char *principal;
86 krb5_unparse_name(context, creds.server, &principal);
87 printf("principal: %s\\n", principal);
88 free(principal);
812 * Return the principal of `id' in `principal'.
823 krb5_principal *principal)
825 return (*id->ops->get_princ)(context, id, principal);
1190 * `principal' a
821 krb5_cc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument
1224 krb5_principal principal; local
1320 build_conf_principals(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_creds *cred) argument
1365 krb5_is_config_principal(krb5_context context, krb5_const_principal principal) argument
1393 krb5_cc_set_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_data *data) argument
1441 krb5_cc_get_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_data *data) argument
1696 krb5_principal principal; local
[all...]
H A Dstring-to-key-test.c108 /* to enable realm-less principal name above */
114 krb5_principal principal; local
117 ret = krb5_parse_name (context, t->principal_name, &principal);
122 principal, &key);
125 krb5_free_principal (context, principal);
/macosx-10.10/Heimdal-398.1.2/kdc/
H A Dmisc.c41 krb5_const_principal principal,
52 krb5_const_principal princ = principal;
65 if (principal->name.name_type == KRB5_NT_ENTERPRISE_PRINCIPAL) {
66 if (principal->name.name_string.len != 1) {
71 principal->name.name_string.len);
74 ret = krb5_parse_name(context, principal->name.name_string.val[0],
90 princ = principal;
39 _kdc_db_fetch(krb5_context context, krb5_kdc_configuration *config, krb5_const_principal principal, unsigned flags, krb5int32 *kvno_ptr, HDB **db, hdb_entry_ex **h) argument
H A Dkx509.c129 * Build a certifate for `principal�� that will expire at `endtime��.
137 krb5_principal principal,
146 if (krb5_principal_get_comp_string(context, principal, 1) != NULL) {
151 ret = hx509_env_add(context->hx509ctx, &env, "principal-name",
152 krb5_principal_get_comp_string(context, principal, 0));
325 /* verify server principal */
333 krb5_principal principal = NULL; local
335 ret = krb5_ticket_get_server(context, ticket, &principal);
339 ret = krb5_principal_compare(context, sprincipal, principal);
340 krb5_free_principal(context, principal);
133 build_certificate(krb5_context context, krb5_kdc_configuration *config, const krb5_data *key, time_t endtime, krb5_principal principal, krb5_data *certificate) argument
[all...]
/macosx-10.10/gssd-64/
H A Dgsstest.c112 "[-k] use kerberos service principal name, otherwise",
117 "[-N uid | user | krb5 | ntlm] name type for client principal",
118 "[-p principal] use principal for client",
122 "[-S Service principal] Service principal to use",
152 char *principal=""; variable
215 printf("Held credential for %s\n", principal);
222 printf("Unheld credential for %s\n", principal);
333 principal
[all...]
/macosx-10.10/Heimdal-398.1.2/appl/kf/
H A Dkf.c137 krb5_principal principal; local
213 status = krb5_cc_get_principal (context, ccache, &principal);
220 creds.client = principal;
224 principal->realm,
226 principal->realm,
/macosx-10.10/Heimdal-398.1.2/admin/
H A Dcopy.c77 krb5_warn (context, ret, "failed parsing match principal `%s'",
85 fprintf(stderr, "matching on principal %s\n", str);
104 ret = krb5_unparse_name (context, entry.principal, &name_str);
116 !krb5_principal_match(context, entry.principal, match_principal))
128 entry.principal,
H A Dget.c39 open_kadmin_connection(char *principal, argument
68 /* should get realm from each principal, instead of doing
72 principal,
135 krb5_warn(context, ret, "can't parse principal %s", argv[a]);
140 princ.principal = princ_ent;
219 entry.principal = princ_ent;
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/
H A Dcreds.c85 handle->principal->realm,
244 krb5_cc_get_principal(context, id, &handle->principal);
248 if (handle->principal)
250 id, handle->principal,
393 krb5_principal principal = (krb5_principal)name; local
412 principal,
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/ntlm/
H A Dkdc.c64 krb5_principal principal = NULL; local
83 KRB5_NT_SRV_HST, &principal);
87 ret = krb5_cc_cache_match(context, principal, id);
112 principal,
147 if (principal)
148 krb5_free_principal(context, principal);
/macosx-10.10/MITKerberosShim-66/Kerberos/
H A DCredentialsCache.h129 * The user presentable identifier of a ccache is its principal.
525 /*! A properly quoted string representation of the first component of the client principal */
526 char principal [cc_v4_name_size]; member in struct:cc_credentials_v4_t
527 /*! A properly quoted string representation of the second component of the client principal */
529 /*! A properly quoted string representation of the first component of the service principal */
531 /*! A properly quoted string representation of the second component of the service principal */
583 /*! A properly quoted string representation of the client principal. */
585 /*! A properly quoted string representation of the service principal. */
667 * This type is used for both principal names and ccache names
715 * \li a ccache principal i
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hdb/
H A Dhdb-mitdb.c51 16: principal length
52 length: principal
93 krb5_const_principal principal,
99 ret = krb5_unparse_name(context, principal, &str);
136 for (i = 0; i < ent->principal->name.name_string.len; ++i)
137 len += strlen(ent->principal->name.name_string.val[i]);
142 for (i = 0; i < ent->principal->name.name_string.len; ++i) {
144 ent->principal->name.name_string.val[i],
145 strlen(ent->principal->name.name_string.val[i]));
146 p += strlen(ent->principal
92 mdb_principal2key(krb5_context context, krb5_const_principal principal, krb5_data *key) argument
766 mdb_fetch_kvno(krb5_context context, HDB *db, krb5_const_principal principal, unsigned flags, krb5_kvno kvno, hdb_entry_ex *entry) argument
801 mdb_remove(krb5_context context, HDB *db, krb5_const_principal principal) argument
[all...]
/macosx-10.10/pam_modules-140/modules/pam_krb5/
H A Dpam_krb5.c147 char *principal = NULL, *princ_name = NULL, *ccache_name, luser[32], *srvdup; local
174 /* Get principal name */
176 asprintf(&principal, "%s/%s", (const char *)sourceuser, user);
178 od_principal_for_user(pamh, user, &principal);
180 principal = strdup(user);
181 if (principal == NULL) {
182 PAM_LOG("Failed to determine Kerberos principal name.");
191 PAM_LOG("Stashing kcm credentials in enviroment for kcminit: %s", principal);
195 PAM_LOG("no password: %s", principal);
199 retval = pam_setenv(pamh, user_key, principal,
[all...]
/macosx-10.10/Heimdal-398.1.2/kpasswd/
H A Dkpasswdd.c207 * Change the password for `principal', sending the reply back on `s'
223 krb5_principal principal = NULL; local
239 principal = admin_principal;
285 ret = krb5_copy_principal(context, &princ, &principal);
291 "failed to allocate principal", out_data);
295 principal = admin_principal;
310 conf.realm = principal->realm;
325 ret = krb5_unparse_name(context, principal, &client);
336 if (krb5_principal_compare(context, admin_principal, principal) == TRUE) {
338 pwd_reason = kadm5_check_password_quality (context, principal,
466 krb5_principal principal; local
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dcreate_s.c76 ret = krb5_copy_principal(context->context, princ->principal,
77 &ent->entry.principal);
82 ret = get_default(context, princ->principal, defent);
102 &ent->entry.created_by.principal);
/macosx-10.10/Heimdal-398.1.2/tests/db/
H A Dadd-modify-delete.in87 echo checking principal
109 echo checking principal
/macosx-10.10/MITKerberosShim-66/test/
H A Dtest-sd.c63 krb5_data *nameData = krb5_princ_name (kcontext, entry.principal);
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/
H A Dport-aix.c379 * aix_krb5_get_principal_name: returns the user's kerberos client principal name if
385 char *authname = NULL, *authdomain = NULL, *principal = NULL; local
394 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomain);
396 principal = xstrdup(authname);
398 return principal;

Completed in 189 milliseconds

12345678910