Searched refs:principal (Results 101 - 125 of 227) sorted by relevance

12345678910

/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dst/
H A Dgssapi.h123 gss_ctx_id_t *context, dns_name_t *principal,
197 * principal: host/example.com@EXAMPLE.COM) to the realm name stored
207 * principal: host/example.com@EXAMPLE.COM) to the realm name stored
/macosx-10.10/dcerpc-61/dcerpc/ncklib/
H A Did_base.h108 sec_id_t principal; member in struct:sec_id_pac_format_v1_t
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dget_s.c146 ret = krb5_copy_principal(context->context, ent.entry.principal,
147 &out->principal);
185 if (ent.entry.modified_by->principal != NULL)
187 ent.entry.modified_by->principal,
189 } else if(ent.entry.created_by.principal != NULL)
191 ent.entry.created_by.principal,
252 krb5_get_pw_salt(context->context, ent.entry.principal, &salt);
H A Dad.c510 krb5_principal principal,
534 principal,
610 fqdn = get_fqdn(context->context, entry->principal);
612 ret = krb5_unparse_name(context->context, entry->principal, &p);
805 kadm5_ad_delete_principal(void *server_handle, krb5_principal principal) argument
821 fqdn = get_fqdn(context->context, principal);
823 ret = krb5_unparse_name(context->context, principal, &p);
881 krb5_principal principal,
894 * principal
919 krb5_unparse_name_short(context->context, principal,
509 kadm5_ad_chpass_principal(void *server_handle, krb5_principal principal, int keepold, const char *password, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple) argument
880 kadm5_ad_get_principal(void *server_handle, krb5_principal principal, kadm5_principal_ent_t entry, uint32_t mask) argument
1237 kadm5_ad_randkey_principal(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keys, int *n_keys) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/hdb/
H A Dkeys.c63 * string (for that principal). Additional special values:
84 krb5_salt *salt, krb5_principal principal)
171 ret = krb5_get_pw_salt(context, principal, salt);
175 krb5_const_realm realm = krb5_principal_get_realm(context, principal);
479 hdb_generate_key_set(krb5_context context, krb5_principal principal, argument
532 &etypes, &num_etypes, &salt, principal);
597 krb5_principal principal,
608 ret = hdb_generate_key_set(context, principal, n_ks_tuple, ks_tuple,
646 krb5_const_principal principal,
680 principal,
82 parse_key_set(krb5_context context, const char *key, krb5_enctype **ret_enctypes, size_t *ret_num_enctypes, krb5_salt *salt, krb5_principal principal) argument
596 hdb_generate_key_set_password(krb5_context context, krb5_principal principal, const char *password, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, Key **keys, size_t *num_keys) argument
644 hdb_set_srp_verifier(krb5_context context, KRB5_SRP_GROUP group, krb5_const_principal principal, const char *password, uint32_t iterations, hdb_srp *srp) argument
[all...]
H A Dprint.c46 principal
54 creation date and principal
55 modification date and principal
56 principal valid from date (not used)
57 principal valid end date (not used)
58 principal key expires (not used)
125 if (ev->principal != NULL) {
126 ret = krb5_unparse_name(context, ev->principal, &pr);
143 /* --- principal */
144 ret = krb5_unparse_name(context, ent->principal,
[all...]
H A Ddb.c149 if (code == 0 && entry->entry.principal == NULL) {
150 entry->entry.principal = malloc(sizeof(*entry->entry.principal));
151 if (entry->entry.principal == NULL) {
156 hdb_key2principal(context, &key_data, entry->entry.principal);
H A Ddb3.c146 if (entry->entry.principal == NULL) {
147 entry->entry.principal = malloc(sizeof(*entry->entry.principal));
148 if (entry->entry.principal == NULL) {
153 hdb_key2principal(context, &key_data, entry->entry.principal);
H A Dndbm.c108 if (ret == 0 && entry->entry.principal == NULL) {
109 entry->entry.principal = malloc (sizeof(*entry->entry.principal));
110 if (entry->entry.principal == NULL) {
115 hdb_key2principal (context, &key_data, entry->entry.principal);
/macosx-10.10/Heimdal-398.1.2/lib/akadmin/
H A DHeimODAdmin.c177 krb5_principalCreateFromString(krb5_context context, CFStringRef principal) argument
183 princstr = cfstring2cstring(principal);
197 krb5_const_principal principal)
203 ret = krb5_unparse_name(context, principal, &name);
386 HeimODCreatePrincipalData(ODNodeRef node, ODRecordRef record, CFTypeRef flags, CFStringRef principal, CFErrorRef *error) argument
429 if (principal) {
430 r = ODRecordSetValue(datarecord, kusername, principal, error);
449 HeimODRemovePrincipalData(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFErrorRef *error) argument
931 last_kvno_array(CFArrayRef array, krb5_context context, krb5_principal principal) argument
948 if (principal) {
196 CFStringCreateWithkrb5_principal(krb5_context context, krb5_const_principal principal) argument
969 last_kvno_record(ODRecordRef datarecord, krb5_context context, krb5_principal principal) argument
1193 HeimODCreateSRPKeys(CFArrayRef srptype, CFStringRef principal, CFTypeRef password, unsigned long flags, CFErrorRef *error) argument
1294 SetSRP(krb5_context context, ODNodeRef node, ODRecordRef datarecord, krb5_const_principal principal, CFTypeRef password, unsigned long flags, CFErrorRef *error) argument
1333 HeimODSetVerifiers(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFArrayRef types, CFTypeRef password, unsigned long flags, CFErrorRef *error) argument
1364 HeimODSetKeys(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFArrayRef enctypes, CFTypeRef password, unsigned long flags, CFErrorRef *error) argument
1641 HeimODModifyKeys(CFArrayRef prevKeyset, CFStringRef principal, CFArrayRef enctypes, CFTypeRef password, unsigned long flags, CFErrorRef *error) argument
2468 HeimODDumpRecord(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFErrorRef *error) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dtest_cc.c362 test_cache_find(krb5_context context, const char *principal, int find) argument
368 ret = krb5_parse_name(context, principal, &client);
370 krb5_err(context, 1, ret, "parse_name for %s failed", principal);
374 krb5_err(context, 1, ret, "cc_cache_match for %s failed", principal);
376 krb5_err(context, 1, ret, "cc_cache_match for %s found", principal);
399 krb5_principal principal; local
404 ret = krb5_cc_get_principal(context, id, &principal);
406 ret = krb5_unparse_name(context, principal, &name);
412 krb5_free_principal(context, principal);
438 krb5_principal principal; local
[all...]
H A Dxcache.c67 CFStringCreateFromPrincipal(krb5_context context, krb5_principal principal) argument
72 if (krb5_unparse_name(context, principal, &p) != 0)
84 krb5_principal principal = NULL; local
89 (void)krb5_parse_name(context, p, &principal);
91 return principal;
309 CFStringRef principal = NULL; local
350 principal = CFStringCreateFromPrincipal(context, creds->server);
351 if (principal == NULL) {
370 principal,
395 CFRELEASE_NULL(principal);
403 xcc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument
[all...]
H A Dmcache.c289 krb5_principal *principal)
297 principal);
442 krb5_principal principal; local
459 /* swap principal */
460 principal = mto->primary_principal;
462 mfrom->primary_principal = principal;
287 mcc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument
H A Dpac.c605 krb5_const_principal principal)
696 if (krb5_principal_compare_any_realm(context, principal, p2) != TRUE) {
713 krb5_const_principal principal,
736 ret = krb5_unparse_name_flags(context, principal,
785 * @param principal the principal to verify.
799 krb5_const_principal principal,
822 principal);
936 krb5_principal principal,
954 if (principal !
601 verify_logonname(krb5_context context, const struct PAC_INFO_BUFFER *logon_name, const krb5_data *data, time_t authtime, krb5_const_principal principal) argument
711 build_logon_name(krb5_context context, time_t authtime, krb5_const_principal principal, krb5_data *logon) argument
796 krb5_pac_verify(krb5_context context, const krb5_pac pac, time_t authtime, krb5_const_principal principal, const krb5_keyblock *server, const krb5_keyblock *privsvr) argument
933 _krb5_pac_sign(krb5_context context, krb5_pac p, time_t authtime, krb5_principal principal, const krb5_keyblock *server_key, const krb5_keyblock *priv_key, krb5_data *data) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/admin/
H A Dadd.c66 ret = krb5_parse_name(context, opt->principal_string, &entry.principal);
159 entry.principal, &entry.keyblock);
H A Dlist.c105 krb5_unparse_name_fixed(context, entry.principal, buf, sizeof(buf));
132 krb5_unparse_name_fixed(context, entry.principal, buf, sizeof(buf));
/macosx-10.10/Heimdal-398.1.2/appl/dceutils/
H A Dk5dce.h44 * by this program, and it needs access to the client principal
156 #define krb5_cc_get_principal(cache, principal) (*(cache)->ops->get_princ)(cache, principal)
/macosx-10.10/Heimdal-398.1.2/appl/popper/
H A Dpop_pass.c147 if (!krb5_kuserok (p->context, p->principal, p->user)) {
153 if(krb5_unparse_name (p->context, p->principal, &name) == 0) {
H A Dauth_gssapi.c158 krb5_principal principal; local
209 krb5_parse_name(gssapi_krb5_context, name, &principal);
211 if(!krb5_kuserok(gssapi_krb5_context, principal, ptr)) {
/macosx-10.10/Heimdal-398.1.2/kcm/
H A Dglue.c155 krb5_principal *principal)
163 principal);
153 kcmss_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument
/macosx-10.10/dcerpc-61/dcerpc/include/dce/
H A Did_base.idl131 sec_id_t principal;
/macosx-10.10/Heimdal-398.1.2/kadmin/
H A Dinit.c60 krb5_warn(context, ret, "failed to unparse principal name");
65 ent.principal = princ;
100 "unable to get principal", name);
110 "unable to modify principal", name);
251 krb5_make_principal(context, &ent.principal, realm,
264 krb5_free_principal(context, ent.principal);
/macosx-10.10/KerberosHelper-151/Tests/
H A DKRBCreateSession.pl56 LocalKDC service principal s_princ_lkdc: $s_princ_l
57 Managed realm service principal (local): $s_princ_ml
58 Managed realm service principal (routed): $s_princ_mr
/macosx-10.10/Heimdal-398.1.2/kdc/
H A Dpkinit.c76 krb5_principal principal; member in struct:pk_principal_mapping::pk_allowed_princ
1690 krb5_principal_data principal; local
1711 principal.name = kn.principalName;
1712 principal.realm = kn.realm;
1714 if (krb5_principal_compare(context, &principal, match) == TRUE)
1739 krb5_principal principal = NULL; local
1778 ret = krb5_parse_name(context, upn, &principal);
1781 kdc_log(context, config, 0, "Failed to parse principal in MS UPN SAN");
1786 ret = clientdb->hdb_check_pkinit_ms_upn_match(context, clientdb, client, principal);
1792 strupr(principal
2016 krb5_principal principal; local
[all...]
H A Ddigest.c89 client->entry.principal));
116 p = client->entry.principal;
257 /* check the server principal in the ticket matches digest/R@R */
259 krb5_principal principal = NULL; local
262 ret = krb5_ticket_get_server(context, ticket, &principal);
267 krb5_set_error_message(context, ret, "Wrong digest server principal used");
268 p = krb5_principal_get_comp_string(context, principal, 0);
270 krb5_free_principal(context, principal);
274 krb5_free_principal(context, principal);
278 p = krb5_principal_get_comp_string(context, principal,
304 krb5_principal principal = NULL; local
[all...]

Completed in 400 milliseconds

12345678910