/macosx-10.10/bind9-45.101/bind9/lib/dns/include/dst/ |
H A D | gssapi.h | 123 gss_ctx_id_t *context, dns_name_t *principal, 197 * principal: host/example.com@EXAMPLE.COM) to the realm name stored 207 * principal: host/example.com@EXAMPLE.COM) to the realm name stored
|
/macosx-10.10/dcerpc-61/dcerpc/ncklib/ |
H A D | id_base.h | 108 sec_id_t principal; member in struct:sec_id_pac_format_v1_t
|
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | get_s.c | 146 ret = krb5_copy_principal(context->context, ent.entry.principal, 147 &out->principal); 185 if (ent.entry.modified_by->principal != NULL) 187 ent.entry.modified_by->principal, 189 } else if(ent.entry.created_by.principal != NULL) 191 ent.entry.created_by.principal, 252 krb5_get_pw_salt(context->context, ent.entry.principal, &salt);
|
H A D | ad.c | 510 krb5_principal principal, 534 principal, 610 fqdn = get_fqdn(context->context, entry->principal); 612 ret = krb5_unparse_name(context->context, entry->principal, &p); 805 kadm5_ad_delete_principal(void *server_handle, krb5_principal principal) argument 821 fqdn = get_fqdn(context->context, principal); 823 ret = krb5_unparse_name(context->context, principal, &p); 881 krb5_principal principal, 894 * principal 919 krb5_unparse_name_short(context->context, principal, 509 kadm5_ad_chpass_principal(void *server_handle, krb5_principal principal, int keepold, const char *password, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple) argument 880 kadm5_ad_get_principal(void *server_handle, krb5_principal principal, kadm5_principal_ent_t entry, uint32_t mask) argument 1237 kadm5_ad_randkey_principal(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keys, int *n_keys) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/hdb/ |
H A D | keys.c | 63 * string (for that principal). Additional special values: 84 krb5_salt *salt, krb5_principal principal) 171 ret = krb5_get_pw_salt(context, principal, salt); 175 krb5_const_realm realm = krb5_principal_get_realm(context, principal); 479 hdb_generate_key_set(krb5_context context, krb5_principal principal, argument 532 &etypes, &num_etypes, &salt, principal); 597 krb5_principal principal, 608 ret = hdb_generate_key_set(context, principal, n_ks_tuple, ks_tuple, 646 krb5_const_principal principal, 680 principal, 82 parse_key_set(krb5_context context, const char *key, krb5_enctype **ret_enctypes, size_t *ret_num_enctypes, krb5_salt *salt, krb5_principal principal) argument 596 hdb_generate_key_set_password(krb5_context context, krb5_principal principal, const char *password, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, Key **keys, size_t *num_keys) argument 644 hdb_set_srp_verifier(krb5_context context, KRB5_SRP_GROUP group, krb5_const_principal principal, const char *password, uint32_t iterations, hdb_srp *srp) argument [all...] |
H A D | print.c | 46 principal 54 creation date and principal 55 modification date and principal 56 principal valid from date (not used) 57 principal valid end date (not used) 58 principal key expires (not used) 125 if (ev->principal != NULL) { 126 ret = krb5_unparse_name(context, ev->principal, &pr); 143 /* --- principal */ 144 ret = krb5_unparse_name(context, ent->principal, [all...] |
H A D | db.c | 149 if (code == 0 && entry->entry.principal == NULL) { 150 entry->entry.principal = malloc(sizeof(*entry->entry.principal)); 151 if (entry->entry.principal == NULL) { 156 hdb_key2principal(context, &key_data, entry->entry.principal);
|
H A D | db3.c | 146 if (entry->entry.principal == NULL) { 147 entry->entry.principal = malloc(sizeof(*entry->entry.principal)); 148 if (entry->entry.principal == NULL) { 153 hdb_key2principal(context, &key_data, entry->entry.principal);
|
H A D | ndbm.c | 108 if (ret == 0 && entry->entry.principal == NULL) { 109 entry->entry.principal = malloc (sizeof(*entry->entry.principal)); 110 if (entry->entry.principal == NULL) { 115 hdb_key2principal (context, &key_data, entry->entry.principal);
|
/macosx-10.10/Heimdal-398.1.2/lib/akadmin/ |
H A D | HeimODAdmin.c | 177 krb5_principalCreateFromString(krb5_context context, CFStringRef principal) argument 183 princstr = cfstring2cstring(principal); 197 krb5_const_principal principal) 203 ret = krb5_unparse_name(context, principal, &name); 386 HeimODCreatePrincipalData(ODNodeRef node, ODRecordRef record, CFTypeRef flags, CFStringRef principal, CFErrorRef *error) argument 429 if (principal) { 430 r = ODRecordSetValue(datarecord, kusername, principal, error); 449 HeimODRemovePrincipalData(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFErrorRef *error) argument 931 last_kvno_array(CFArrayRef array, krb5_context context, krb5_principal principal) argument 948 if (principal) { 196 CFStringCreateWithkrb5_principal(krb5_context context, krb5_const_principal principal) argument 969 last_kvno_record(ODRecordRef datarecord, krb5_context context, krb5_principal principal) argument 1193 HeimODCreateSRPKeys(CFArrayRef srptype, CFStringRef principal, CFTypeRef password, unsigned long flags, CFErrorRef *error) argument 1294 SetSRP(krb5_context context, ODNodeRef node, ODRecordRef datarecord, krb5_const_principal principal, CFTypeRef password, unsigned long flags, CFErrorRef *error) argument 1333 HeimODSetVerifiers(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFArrayRef types, CFTypeRef password, unsigned long flags, CFErrorRef *error) argument 1364 HeimODSetKeys(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFArrayRef enctypes, CFTypeRef password, unsigned long flags, CFErrorRef *error) argument 1641 HeimODModifyKeys(CFArrayRef prevKeyset, CFStringRef principal, CFArrayRef enctypes, CFTypeRef password, unsigned long flags, CFErrorRef *error) argument 2468 HeimODDumpRecord(ODNodeRef node, ODRecordRef record, CFStringRef principal, CFErrorRef *error) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | test_cc.c | 362 test_cache_find(krb5_context context, const char *principal, int find) argument 368 ret = krb5_parse_name(context, principal, &client); 370 krb5_err(context, 1, ret, "parse_name for %s failed", principal); 374 krb5_err(context, 1, ret, "cc_cache_match for %s failed", principal); 376 krb5_err(context, 1, ret, "cc_cache_match for %s found", principal); 399 krb5_principal principal; local 404 ret = krb5_cc_get_principal(context, id, &principal); 406 ret = krb5_unparse_name(context, principal, &name); 412 krb5_free_principal(context, principal); 438 krb5_principal principal; local [all...] |
H A D | xcache.c | 67 CFStringCreateFromPrincipal(krb5_context context, krb5_principal principal) argument 72 if (krb5_unparse_name(context, principal, &p) != 0) 84 krb5_principal principal = NULL; local 89 (void)krb5_parse_name(context, p, &principal); 91 return principal; 309 CFStringRef principal = NULL; local 350 principal = CFStringCreateFromPrincipal(context, creds->server); 351 if (principal == NULL) { 370 principal, 395 CFRELEASE_NULL(principal); 403 xcc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument [all...] |
H A D | mcache.c | 289 krb5_principal *principal) 297 principal); 442 krb5_principal principal; local 459 /* swap principal */ 460 principal = mto->primary_principal; 462 mfrom->primary_principal = principal; 287 mcc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument
|
H A D | pac.c | 605 krb5_const_principal principal) 696 if (krb5_principal_compare_any_realm(context, principal, p2) != TRUE) { 713 krb5_const_principal principal, 736 ret = krb5_unparse_name_flags(context, principal, 785 * @param principal the principal to verify. 799 krb5_const_principal principal, 822 principal); 936 krb5_principal principal, 954 if (principal ! 601 verify_logonname(krb5_context context, const struct PAC_INFO_BUFFER *logon_name, const krb5_data *data, time_t authtime, krb5_const_principal principal) argument 711 build_logon_name(krb5_context context, time_t authtime, krb5_const_principal principal, krb5_data *logon) argument 796 krb5_pac_verify(krb5_context context, const krb5_pac pac, time_t authtime, krb5_const_principal principal, const krb5_keyblock *server, const krb5_keyblock *privsvr) argument 933 _krb5_pac_sign(krb5_context context, krb5_pac p, time_t authtime, krb5_principal principal, const krb5_keyblock *server_key, const krb5_keyblock *priv_key, krb5_data *data) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/admin/ |
H A D | add.c | 66 ret = krb5_parse_name(context, opt->principal_string, &entry.principal); 159 entry.principal, &entry.keyblock);
|
H A D | list.c | 105 krb5_unparse_name_fixed(context, entry.principal, buf, sizeof(buf)); 132 krb5_unparse_name_fixed(context, entry.principal, buf, sizeof(buf));
|
/macosx-10.10/Heimdal-398.1.2/appl/dceutils/ |
H A D | k5dce.h | 44 * by this program, and it needs access to the client principal 156 #define krb5_cc_get_principal(cache, principal) (*(cache)->ops->get_princ)(cache, principal)
|
/macosx-10.10/Heimdal-398.1.2/appl/popper/ |
H A D | pop_pass.c | 147 if (!krb5_kuserok (p->context, p->principal, p->user)) { 153 if(krb5_unparse_name (p->context, p->principal, &name) == 0) {
|
H A D | auth_gssapi.c | 158 krb5_principal principal; local 209 krb5_parse_name(gssapi_krb5_context, name, &principal); 211 if(!krb5_kuserok(gssapi_krb5_context, principal, ptr)) {
|
/macosx-10.10/Heimdal-398.1.2/kcm/ |
H A D | glue.c | 155 krb5_principal *principal) 163 principal); 153 kcmss_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument
|
/macosx-10.10/dcerpc-61/dcerpc/include/dce/ |
H A D | id_base.idl | 131 sec_id_t principal;
|
/macosx-10.10/Heimdal-398.1.2/kadmin/ |
H A D | init.c | 60 krb5_warn(context, ret, "failed to unparse principal name"); 65 ent.principal = princ; 100 "unable to get principal", name); 110 "unable to modify principal", name); 251 krb5_make_principal(context, &ent.principal, realm, 264 krb5_free_principal(context, ent.principal);
|
/macosx-10.10/KerberosHelper-151/Tests/ |
H A D | KRBCreateSession.pl | 56 LocalKDC service principal s_princ_lkdc: $s_princ_l 57 Managed realm service principal (local): $s_princ_ml 58 Managed realm service principal (routed): $s_princ_mr
|
/macosx-10.10/Heimdal-398.1.2/kdc/ |
H A D | pkinit.c | 76 krb5_principal principal; member in struct:pk_principal_mapping::pk_allowed_princ 1690 krb5_principal_data principal; local 1711 principal.name = kn.principalName; 1712 principal.realm = kn.realm; 1714 if (krb5_principal_compare(context, &principal, match) == TRUE) 1739 krb5_principal principal = NULL; local 1778 ret = krb5_parse_name(context, upn, &principal); 1781 kdc_log(context, config, 0, "Failed to parse principal in MS UPN SAN"); 1786 ret = clientdb->hdb_check_pkinit_ms_upn_match(context, clientdb, client, principal); 1792 strupr(principal 2016 krb5_principal principal; local [all...] |
H A D | digest.c | 89 client->entry.principal)); 116 p = client->entry.principal; 257 /* check the server principal in the ticket matches digest/R@R */ 259 krb5_principal principal = NULL; local 262 ret = krb5_ticket_get_server(context, ticket, &principal); 267 krb5_set_error_message(context, ret, "Wrong digest server principal used"); 268 p = krb5_principal_get_comp_string(context, principal, 0); 270 krb5_free_principal(context, principal); 274 krb5_free_principal(context, principal); 278 p = krb5_principal_get_comp_string(context, principal, 304 krb5_principal principal = NULL; local [all...] |