/macosx-10.10/Heimdal-398.1.2/admin/ |
H A D | change.c | 40 krb5_principal principal, krb5_kvno kvno, 51 ret = krb5_unparse_name (context, principal, &client_name); 60 realm = krb5_principal_get_realm(context, principal); 99 ret = kadm5_randkey_principal (kadm_handle, principal, &keys, &num_keys); 110 new_entry.principal = principal; 129 krb5_principal principal; member in struct:change_set 161 if (krb5_principal_compare (context, changeset[i].principal, 162 entry.principal)) { 184 if (krb5_principal_compare (context, princ, entry.principal)) 39 change_entry(krb5_keytab keytab, krb5_principal principal, krb5_kvno kvno, const char *realm, const char *admin_server, int server_port) argument [all...] |
H A D | purge.c | 39 * keep track of the highest version for every principal. 43 krb5_principal principal; member in struct:e 55 if (krb5_principal_compare (context, princ, e->principal)) 77 ret = krb5_copy_principal (context, princ, &e->principal); 91 krb5_free_principal (context, head->principal); 129 add_entry (entry.principal, entry.vno, entry.timestamp, &head); 143 struct e *e = get_entry (entry.principal, head); 155 krb5_unparse_name (context, entry.principal, &name_str);
|
/macosx-10.10/MITKerberosShim-66/ |
H A D | principal.c | 69 krb5_parse_name(mit_krb5_context context, const char *str, mit_krb5_principal *principal) argument 71 return krb5_parse_name_flags(context, str, 0, principal); 75 krb5_parse_name_flags(mit_krb5_context context, const char *str, int flags, mit_krb5_principal *principal) argument 89 *principal = (mit_krb5_principal)p; 95 krb5_build_principal_ext(mit_krb5_context context, mit_krb5_principal *principal, unsigned int rlen, const char *realm, ...) argument 112 *principal = (mit_krb5_principal)p; 117 krb5_build_principal(mit_krb5_context context, mit_krb5_principal *principal, unsigned int rlen, const char *realm, ...) argument 134 *principal = (mit_krb5_principal)p; 139 krb5_unparse_name(mit_krb5_context context, mit_krb5_const_principal principal, char **str) argument 141 struct comb_principal *p = (struct comb_principal *)principal; 165 krb5_free_principal(mit_krb5_context context, mit_krb5_principal principal) argument 184 krb5_sname_to_principal(mit_krb5_context context, const char *hostname, const char *service, mit_krb5_int32 type, mit_krb5_principal *principal) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/krb5/ |
H A D | verify_user.c | 38 krb5_principal principal, 67 ret = krb5_cc_initialize(context, id, principal); 89 * Verify user `principal' with `password'. 172 krb5_principal principal, 187 krb5_principal_get_realm(context, principal), 192 principal, 204 ret = verify_common(context, principal, OPT(server, NULL), 217 krb5_principal principal, 231 ret = krb5_principal_set_realm(context, principal, *r); 237 ret = verify_user_opt_int(context, principal, passwor 37 verify_common(krb5_context context, krb5_principal principal, krb5_principal server_principal, krb5_ccache ccache, krb5_keytab keytab, krb5_boolean secure, const char *service, krb5_creds *cred) argument 171 verify_user_opt_int(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *vopt) argument 216 krb5_verify_user_opt(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *opt) argument 250 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument 274 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument [all...] |
H A D | asn1_glue.c | 49 krb5_principal *principal, 70 *principal = p; 48 _krb5_principalname2krb5_principal(krb5_context context, krb5_principal *principal, const PrincipalName from, const Realm realm) argument
|
H A D | store-test.c | 73 krb5_principal principal; local 106 krb5_make_principal(context, &principal, "TEST", "foobar", NULL); 107 krb5_store_principal(sp, principal); 108 krb5_free_principal(context, principal);
|
H A D | salt.c | 98 krb5_const_principal principal, 107 len = strlen(principal->realm); 108 for (i = 0; i < principal->name.name_string.len; ++i) 109 len += strlen(principal->name.name_string.val[i]); 114 memcpy (p, principal->realm, strlen(principal->realm)); 115 p += strlen(principal->realm); 116 for (i = 0; i < principal->name.name_string.len; ++i) { 118 principal->name.name_string.val[i], 119 strlen(principal 97 krb5_get_pw_salt(krb5_context context, krb5_const_principal principal, krb5_salt *salt) argument 134 krb5_string_to_key_data(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_principal principal, krb5_keyblock *key) argument 152 krb5_string_to_key(krb5_context context, krb5_enctype enctype, const char *password, krb5_principal principal, krb5_keyblock *key) argument [all...] |
H A D | keytab.c | 99 char *principal; 112 krb5_unparse_name(context, entry.principal, &principal); 113 printf("principal: %s\n", principal); 114 free(principal); 328 * Read the key identified by `(principal, vno, enctype)' from the 333 * @param principal principal to find 346 krb5_principal principal, 344 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument 512 compare_aliseses(krb5_context context, krb5_keytab_entry *entry, krb5_error_code (*cmp)(krb5_context, krb5_const_principal, krb5_const_principal), krb5_const_principal principal) argument 543 krb5_kt_compare(krb5_context context, krb5_keytab_entry *entry, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype) argument 568 _krb5_kt_principal_not_found(krb5_context context, krb5_error_code ret, krb5_keytab id, krb5_const_principal principal, krb5_enctype enctype, int kvno) argument 619 krb5_kt_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument [all...] |
/macosx-10.10/Heimdal-398.1.2/appl/ftp/ftpd/ |
H A D | klist.c | 71 krb5_principal principal) 78 ret = krb5_unparse_name (context, principal, &str); 126 krb5_principal principal; local 144 ret = krb5_cc_get_principal (context, ccache, &principal); 154 exit_status = print_tickets (context, ccache, principal); 162 krb5_free_principal (context, principal); 69 print_tickets(krb5_context context, krb5_ccache ccache, krb5_principal principal) argument
|
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/ |
H A D | sample_passwd_check.c | 70 krb5_principal principal, 78 strings[0] = principal->name.name_string.val[0]; /* XXX */ 69 check_cracklib(krb5_context context, krb5_principal principal, krb5_data *password) argument
|
H A D | set_modifier.c | 51 &ent->modified_by->principal);
|
H A D | rename_s.c | 90 oldname = ent.entry.principal; 91 ent.entry.principal = target; 95 ent.entry.principal = oldname; 103 ent.entry.principal = oldname; 107 ent.entry.principal = oldname;
|
/macosx-10.10/Heimdal-398.1.2/tests/apple/ |
H A D | check-apple-hodadmin.in | 73 $hodadmin . principal-delete $ u> /dev/null 2>/dev/null 74 $hodadmin . principal-create $u || exit 1 77 $hodadmin . principal-clearflags $u Invalid Forwardable || exit 1 78 $hodadmin . principal-setflags $u Forwardable || exit 1
|
H A D | check-server-hodadmin.in | 78 $hodadmin . principal-create $u $u@$r || exit 1 81 $hodadmin . principal-clearflags $u Invalid Forwardable || exit 1 82 $hodadmin . principal-setflags $u Forwardable || exit 1 84 $hodadmin . principal-create $s $s@$r || exit 1 86 $hodadmin . principal-clearflags $s Invalid Forwardable || exit 1 87 $hodadmin . principal-setflags $s Forwardable || exit 1
|
/macosx-10.10/dcerpc-61/dcerpc/include/dce/ |
H A D | smb.idl | 118 [out] char** principal
|
/macosx-10.10/Heimdal-398.1.2/lib/hdb/ |
H A D | test_hdbkeys.c | 53 krb5_principal principal; local 84 ret = krb5_parse_name (context, principal_str, &principal); 96 ret = hdb_generate_key_set_password(context, principal, password_str, 0, NULL, 105 krb5_free_principal (context, principal);
|
/macosx-10.10/smb-759.0/lib/smb/ |
H A D | gss.c | 253 char *principal = NULL; local 263 asprintf(&principal, "%.*s", (int)buf.length, (char *)buf.value); 267 return (principal); 296 asprintf(&ep->principal, "%.*s", (int)buf.length, (char *)buf.value); 297 if (ep->principal) { 366 free(ep->principal); 392 char *n, *r, *principal, *tofree, *realm; local 397 if (entry->principal == NULL) 403 tofree = principal = strdup(entry->principal); [all...] |
/macosx-10.10/Heimdal-398.1.2/kadmin/ |
H A D | check.c | 45 krb5_principal principal; local 47 ret = krb5_parse_name(context, name, &principal); 54 ret = kadm5_get_principal(kadm_handle, principal, ent, 0); 55 krb5_free_principal(context, principal); 64 do_check_entry(krb5_principal principal, void *data) argument 71 ret = krb5_unparse_name(context, principal, &name); 76 ret = kadm5_get_principal(kadm_handle, principal, &princ, 79 krb5_warn(context, ret, "Failed to get principal: %s", name);
|
H A D | ext.c | 42 do_ext_keytab(krb5_principal principal, void *data) argument 52 ret = kadm5_get_principal(kadm_handle, principal, &princ, 76 keys[i].principal = princ.principal; 86 ret = kadm5_randkey_principal(kadm_handle, principal, &k, &n_k); 98 keys[i].principal = principal;
|
/macosx-10.10/OpenSSH-189/openssh/ |
H A D | gss-serv-krb5.c | 85 /* Check if the principal matches any of the user's OD entries for RecordName */ 87 od_kuserok(krb5_context context, krb5_principal principal, const char *luser) argument 93 ret = krb5_unparse_name(context, principal, &kprinc); 145 logit("Authorized to %s, krb5 principal %s (krb5_kuserok)", 150 logit("Authorized to %s, krb5 principal %s (od_kuserok)", 247 krb5_principal principal = NULL; local 258 /* Find out who the principal in this cache is */ 260 &principal))) { 267 if ((problem = krb5_unparse_name(krb_context, principal, &name))) { 270 krb5_free_principal(krb_context, principal); [all...] |
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/ |
H A D | add_cred.c | 90 cred->principal) != FALSE) { 110 handle->principal = NULL; 115 kret = krb5_copy_principal(context, cred->principal, 116 &handle->principal); 217 if (handle->principal) 218 krb5_free_principal(context, handle->principal);
|
H A D | inquire_cred.c | 104 if (handle->usage == GSS_C_INITIATE && handle->principal != NULL) { 108 kret = krb5_cc_cache_match(context, handle->principal, &ccache); 124 if (icred && icred->principal != NULL) { 127 if (acred && acred->principal) 128 name = (gss_name_t)acred->principal; 130 name = (gss_name_t)icred->principal;
|
H A D | store_cred.c | 75 if (cred->principal == NULL) { 83 ret = krb5_cc_cache_match(context, cred->principal, &id); 94 ret = krb5_cc_initialize(context, id, cred->principal);
|
/macosx-10.10/MITKerberosShim-66/mittestcc/ |
H A D | test_ccapi_context.h | 21 cc_int32 check_once_cc_context_create_ccache(cc_context_t context, const char *name, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description); 23 cc_int32 check_once_cc_context_create_default_ccache(cc_context_t context, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description); 25 cc_int32 check_once_cc_context_create_new_ccache(cc_context_t context, cc_int32 should_be_default, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description);
|
/macosx-10.10/Heimdal-398.1.2/lib/hx509/ |
H A D | test_windows.in | 63 --pk-init-principal="krbtgt/HEIMDAL.PKI@HEIMDAL.PKI" \ 76 --pk-init-principal="user@HEIMDAL.PKI" \
|