/macosx-10.10/Heimdal-398.1.2/tests/db/mit-krb5kdc/ |
H A D | kdc.conf | 18 database_name = /var/db/krb5kdc/principal.LKDC:SHA1.58FCE36DBDBD86AE701093B4B1D79ADD0705D00B
|
/macosx-10.10/KerberosHelper-151/Tests/migration/data/10.6/private/var/db/krb5kdc/ |
H A D | kdc.conf | 18 database_name = /var/db/krb5kdc/principal.LKDC:SHA1.D0649BAA5F1ADD13B5FEE2729DCCCC5210DDD94B
|
/macosx-10.10/KerberosHelper-151/Tests/migration/data/10.6/var/db/krb5kdc/ |
H A D | kdc.conf | 18 database_name = /var/db/krb5kdc/principal.LKDC:SHA1.D0649BAA5F1ADD13B5FEE2729DCCCC5210DDD94B
|
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | test_keytab.c | 82 ret = krb5_parse_name(context, "lha@SU.SE", &entry.principal); 99 entry.principal, 112 entry.principal, 130 ret = krb5_parse_name(context, "lha3@SU.SE", &entry3.principal); 148 entry.principal, 169 krb5_free_principal(context, entry3.principal);
|
H A D | test_ap-req.c | 51 "let server pick the principal", NULL }, 168 const char *principal, *keytab, *ccache; local 192 principal = argv[0]; 204 ret = krb5_parse_name(context, principal, &sprincipal);
|
H A D | deprecated.c | 316 krb5_principal principal = args->principal; variable 326 ret = krb5_kt_get_entry (context, real_keytab, principal, 360 a.principal = creds->client; 405 krb5_principal principal) 408 return &principal->realm; 420 krb5_principal principal, 424 principal->realm = *realm;
|
H A D | kcache.c | 61 * The service principal name 306 CFStringCreateFromPrincipal(CFAllocatorRef alloc, krb5_context context, krb5_principal principal) argument 311 if (krb5_unparse_name(context, principal, &p) != 0) 330 CFStringRef principal = NULL; local 353 principal = CFStringCreateFromPrincipal(NULL, context, primary_principal); 354 if (principal == NULL) { 359 label = CFStringCreateWithFormat(NULL, NULL, CFSTR("Kerberos credentials for %@"), principal); 389 principal, 412 if (principal) 413 CFRelease(principal); 453 CFStringRef principal = NULL; local 563 kcc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument [all...] |
H A D | cache.c | 84 char *principal; 86 krb5_unparse_name(context, creds.server, &principal); 87 printf("principal: %s\\n", principal); 88 free(principal); 812 * Return the principal of `id' in `principal'. 823 krb5_principal *principal) 825 return (*id->ops->get_princ)(context, id, principal); 1190 * `principal' a 821 krb5_cc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument 1224 krb5_principal principal; local 1320 build_conf_principals(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_creds *cred) argument 1365 krb5_is_config_principal(krb5_context context, krb5_const_principal principal) argument 1393 krb5_cc_set_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_data *data) argument 1441 krb5_cc_get_config(krb5_context context, krb5_ccache id, krb5_const_principal principal, const char *name, krb5_data *data) argument 1696 krb5_principal principal; local [all...] |
H A D | string-to-key-test.c | 108 /* to enable realm-less principal name above */ 114 krb5_principal principal; local 117 ret = krb5_parse_name (context, t->principal_name, &principal); 122 principal, &key); 125 krb5_free_principal (context, principal);
|
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | misc.c | 41 krb5_const_principal principal, 52 krb5_const_principal princ = principal; 65 if (principal->name.name_type == KRB5_NT_ENTERPRISE_PRINCIPAL) { 66 if (principal->name.name_string.len != 1) { 71 principal->name.name_string.len); 74 ret = krb5_parse_name(context, principal->name.name_string.val[0], 90 princ = principal; 39 _kdc_db_fetch(krb5_context context, krb5_kdc_configuration *config, krb5_const_principal principal, unsigned flags, krb5int32 *kvno_ptr, HDB **db, hdb_entry_ex **h) argument
|
H A D | kx509.c | 129 * Build a certifate for `principal�� that will expire at `endtime��. 137 krb5_principal principal, 146 if (krb5_principal_get_comp_string(context, principal, 1) != NULL) { 151 ret = hx509_env_add(context->hx509ctx, &env, "principal-name", 152 krb5_principal_get_comp_string(context, principal, 0)); 325 /* verify server principal */ 333 krb5_principal principal = NULL; local 335 ret = krb5_ticket_get_server(context, ticket, &principal); 339 ret = krb5_principal_compare(context, sprincipal, principal); 340 krb5_free_principal(context, principal); 133 build_certificate(krb5_context context, krb5_kdc_configuration *config, const krb5_data *key, time_t endtime, krb5_principal principal, krb5_data *certificate) argument [all...] |
/macosx-10.10/gssd-64/ |
H A D | gsstest.c | 112 "[-k] use kerberos service principal name, otherwise", 117 "[-N uid | user | krb5 | ntlm] name type for client principal", 118 "[-p principal] use principal for client", 122 "[-S Service principal] Service principal to use", 152 char *principal=""; variable 215 printf("Held credential for %s\n", principal); 222 printf("Unheld credential for %s\n", principal); 333 principal [all...] |
/macosx-10.10/Heimdal-398.1.2/appl/kf/ |
H A D | kf.c | 137 krb5_principal principal; local 213 status = krb5_cc_get_principal (context, ccache, &principal); 220 creds.client = principal; 224 principal->realm, 226 principal->realm,
|
/macosx-10.10/Heimdal-398.1.2/admin/ |
H A D | copy.c | 77 krb5_warn (context, ret, "failed parsing match principal `%s'", 85 fprintf(stderr, "matching on principal %s\n", str); 104 ret = krb5_unparse_name (context, entry.principal, &name_str); 116 !krb5_principal_match(context, entry.principal, match_principal)) 128 entry.principal,
|
H A D | get.c | 39 open_kadmin_connection(char *principal, argument 68 /* should get realm from each principal, instead of doing 72 principal, 135 krb5_warn(context, ret, "can't parse principal %s", argv[a]); 140 princ.principal = princ_ent; 219 entry.principal = princ_ent;
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/ |
H A D | creds.c | 85 handle->principal->realm, 244 krb5_cc_get_principal(context, id, &handle->principal); 248 if (handle->principal) 250 id, handle->principal, 393 krb5_principal principal = (krb5_principal)name; local 412 principal,
|
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/ntlm/ |
H A D | kdc.c | 64 krb5_principal principal = NULL; local 83 KRB5_NT_SRV_HST, &principal); 87 ret = krb5_cc_cache_match(context, principal, id); 112 principal, 147 if (principal) 148 krb5_free_principal(context, principal);
|
/macosx-10.10/MITKerberosShim-66/Kerberos/ |
H A D | CredentialsCache.h | 129 * The user presentable identifier of a ccache is its principal. 525 /*! A properly quoted string representation of the first component of the client principal */ 526 char principal [cc_v4_name_size]; member in struct:cc_credentials_v4_t 527 /*! A properly quoted string representation of the second component of the client principal */ 529 /*! A properly quoted string representation of the first component of the service principal */ 531 /*! A properly quoted string representation of the second component of the service principal */ 583 /*! A properly quoted string representation of the client principal. */ 585 /*! A properly quoted string representation of the service principal. */ 667 * This type is used for both principal names and ccache names 715 * \li a ccache principal i [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hdb/ |
H A D | hdb-mitdb.c | 51 16: principal length 52 length: principal 93 krb5_const_principal principal, 99 ret = krb5_unparse_name(context, principal, &str); 136 for (i = 0; i < ent->principal->name.name_string.len; ++i) 137 len += strlen(ent->principal->name.name_string.val[i]); 142 for (i = 0; i < ent->principal->name.name_string.len; ++i) { 144 ent->principal->name.name_string.val[i], 145 strlen(ent->principal->name.name_string.val[i])); 146 p += strlen(ent->principal 92 mdb_principal2key(krb5_context context, krb5_const_principal principal, krb5_data *key) argument 766 mdb_fetch_kvno(krb5_context context, HDB *db, krb5_const_principal principal, unsigned flags, krb5_kvno kvno, hdb_entry_ex *entry) argument 801 mdb_remove(krb5_context context, HDB *db, krb5_const_principal principal) argument [all...] |
/macosx-10.10/pam_modules-140/modules/pam_krb5/ |
H A D | pam_krb5.c | 147 char *principal = NULL, *princ_name = NULL, *ccache_name, luser[32], *srvdup; local 174 /* Get principal name */ 176 asprintf(&principal, "%s/%s", (const char *)sourceuser, user); 178 od_principal_for_user(pamh, user, &principal); 180 principal = strdup(user); 181 if (principal == NULL) { 182 PAM_LOG("Failed to determine Kerberos principal name."); 191 PAM_LOG("Stashing kcm credentials in enviroment for kcminit: %s", principal); 195 PAM_LOG("no password: %s", principal); 199 retval = pam_setenv(pamh, user_key, principal, [all...] |
/macosx-10.10/Heimdal-398.1.2/kpasswd/ |
H A D | kpasswdd.c | 207 * Change the password for `principal', sending the reply back on `s' 223 krb5_principal principal = NULL; local 239 principal = admin_principal; 285 ret = krb5_copy_principal(context, &princ, &principal); 291 "failed to allocate principal", out_data); 295 principal = admin_principal; 310 conf.realm = principal->realm; 325 ret = krb5_unparse_name(context, principal, &client); 336 if (krb5_principal_compare(context, admin_principal, principal) == TRUE) { 338 pwd_reason = kadm5_check_password_quality (context, principal, 466 krb5_principal principal; local [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | create_s.c | 76 ret = krb5_copy_principal(context->context, princ->principal, 77 &ent->entry.principal); 82 ret = get_default(context, princ->principal, defent); 102 &ent->entry.created_by.principal);
|
/macosx-10.10/Heimdal-398.1.2/tests/db/ |
H A D | add-modify-delete.in | 87 echo checking principal 109 echo checking principal
|
/macosx-10.10/MITKerberosShim-66/test/ |
H A D | test-sd.c | 63 krb5_data *nameData = krb5_princ_name (kcontext, entry.principal);
|
/macosx-10.10/OpenSSH-189/openssh/openbsd-compat/ |
H A D | port-aix.c | 379 * aix_krb5_get_principal_name: returns the user's kerberos client principal name if 385 char *authname = NULL, *authdomain = NULL, *principal = NULL; local 394 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomain); 396 principal = xstrdup(authname); 398 return principal;
|