Searched refs:principal (Results 26 - 50 of 227) sorted by relevance

12345678910

/macosx-10.10/Heimdal-398.1.2/admin/
H A Dchange.c40 krb5_principal principal, krb5_kvno kvno,
51 ret = krb5_unparse_name (context, principal, &client_name);
60 realm = krb5_principal_get_realm(context, principal);
99 ret = kadm5_randkey_principal (kadm_handle, principal, &keys, &num_keys);
110 new_entry.principal = principal;
129 krb5_principal principal; member in struct:change_set
161 if (krb5_principal_compare (context, changeset[i].principal,
162 entry.principal)) {
184 if (krb5_principal_compare (context, princ, entry.principal))
39 change_entry(krb5_keytab keytab, krb5_principal principal, krb5_kvno kvno, const char *realm, const char *admin_server, int server_port) argument
[all...]
H A Dpurge.c39 * keep track of the highest version for every principal.
43 krb5_principal principal; member in struct:e
55 if (krb5_principal_compare (context, princ, e->principal))
77 ret = krb5_copy_principal (context, princ, &e->principal);
91 krb5_free_principal (context, head->principal);
129 add_entry (entry.principal, entry.vno, entry.timestamp, &head);
143 struct e *e = get_entry (entry.principal, head);
155 krb5_unparse_name (context, entry.principal, &name_str);
/macosx-10.10/MITKerberosShim-66/
H A Dprincipal.c69 krb5_parse_name(mit_krb5_context context, const char *str, mit_krb5_principal *principal) argument
71 return krb5_parse_name_flags(context, str, 0, principal);
75 krb5_parse_name_flags(mit_krb5_context context, const char *str, int flags, mit_krb5_principal *principal) argument
89 *principal = (mit_krb5_principal)p;
95 krb5_build_principal_ext(mit_krb5_context context, mit_krb5_principal *principal, unsigned int rlen, const char *realm, ...) argument
112 *principal = (mit_krb5_principal)p;
117 krb5_build_principal(mit_krb5_context context, mit_krb5_principal *principal, unsigned int rlen, const char *realm, ...) argument
134 *principal = (mit_krb5_principal)p;
139 krb5_unparse_name(mit_krb5_context context, mit_krb5_const_principal principal, char **str) argument
141 struct comb_principal *p = (struct comb_principal *)principal;
165 krb5_free_principal(mit_krb5_context context, mit_krb5_principal principal) argument
184 krb5_sname_to_principal(mit_krb5_context context, const char *hostname, const char *service, mit_krb5_int32 type, mit_krb5_principal *principal) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/krb5/
H A Dverify_user.c38 krb5_principal principal,
67 ret = krb5_cc_initialize(context, id, principal);
89 * Verify user `principal' with `password'.
172 krb5_principal principal,
187 krb5_principal_get_realm(context, principal),
192 principal,
204 ret = verify_common(context, principal, OPT(server, NULL),
217 krb5_principal principal,
231 ret = krb5_principal_set_realm(context, principal, *r);
237 ret = verify_user_opt_int(context, principal, passwor
37 verify_common(krb5_context context, krb5_principal principal, krb5_principal server_principal, krb5_ccache ccache, krb5_keytab keytab, krb5_boolean secure, const char *service, krb5_creds *cred) argument
171 verify_user_opt_int(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *vopt) argument
216 krb5_verify_user_opt(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *opt) argument
250 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument
274 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument
[all...]
H A Dasn1_glue.c49 krb5_principal *principal,
70 *principal = p;
48 _krb5_principalname2krb5_principal(krb5_context context, krb5_principal *principal, const PrincipalName from, const Realm realm) argument
H A Dstore-test.c73 krb5_principal principal; local
106 krb5_make_principal(context, &principal, "TEST", "foobar", NULL);
107 krb5_store_principal(sp, principal);
108 krb5_free_principal(context, principal);
H A Dsalt.c98 krb5_const_principal principal,
107 len = strlen(principal->realm);
108 for (i = 0; i < principal->name.name_string.len; ++i)
109 len += strlen(principal->name.name_string.val[i]);
114 memcpy (p, principal->realm, strlen(principal->realm));
115 p += strlen(principal->realm);
116 for (i = 0; i < principal->name.name_string.len; ++i) {
118 principal->name.name_string.val[i],
119 strlen(principal
97 krb5_get_pw_salt(krb5_context context, krb5_const_principal principal, krb5_salt *salt) argument
134 krb5_string_to_key_data(krb5_context context, krb5_enctype enctype, krb5_data password, krb5_principal principal, krb5_keyblock *key) argument
152 krb5_string_to_key(krb5_context context, krb5_enctype enctype, const char *password, krb5_principal principal, krb5_keyblock *key) argument
[all...]
H A Dkeytab.c99 char *principal;
112 krb5_unparse_name(context, entry.principal, &principal);
113 printf("principal: %s\n", principal);
114 free(principal);
328 * Read the key identified by `(principal, vno, enctype)' from the
333 * @param principal principal to find
346 krb5_principal principal,
344 krb5_kt_read_service_key(krb5_context context, krb5_pointer keyprocarg, krb5_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keyblock **key) argument
512 compare_aliseses(krb5_context context, krb5_keytab_entry *entry, krb5_error_code (*cmp)(krb5_context, krb5_const_principal, krb5_const_principal), krb5_const_principal principal) argument
543 krb5_kt_compare(krb5_context context, krb5_keytab_entry *entry, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype) argument
568 _krb5_kt_principal_not_found(krb5_context context, krb5_error_code ret, krb5_keytab id, krb5_const_principal principal, krb5_enctype enctype, int kvno) argument
619 krb5_kt_get_entry(krb5_context context, krb5_keytab id, krb5_const_principal principal, krb5_kvno kvno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
[all...]
/macosx-10.10/Heimdal-398.1.2/appl/ftp/ftpd/
H A Dklist.c71 krb5_principal principal)
78 ret = krb5_unparse_name (context, principal, &str);
126 krb5_principal principal; local
144 ret = krb5_cc_get_principal (context, ccache, &principal);
154 exit_status = print_tickets (context, ccache, principal);
162 krb5_free_principal (context, principal);
69 print_tickets(krb5_context context, krb5_ccache ccache, krb5_principal principal) argument
/macosx-10.10/Heimdal-398.1.2/lib/kadm5/
H A Dsample_passwd_check.c70 krb5_principal principal,
78 strings[0] = principal->name.name_string.val[0]; /* XXX */
69 check_cracklib(krb5_context context, krb5_principal principal, krb5_data *password) argument
H A Dset_modifier.c51 &ent->modified_by->principal);
H A Drename_s.c90 oldname = ent.entry.principal;
91 ent.entry.principal = target;
95 ent.entry.principal = oldname;
103 ent.entry.principal = oldname;
107 ent.entry.principal = oldname;
/macosx-10.10/Heimdal-398.1.2/tests/apple/
H A Dcheck-apple-hodadmin.in73 $hodadmin . principal-delete $ u> /dev/null 2>/dev/null
74 $hodadmin . principal-create $u || exit 1
77 $hodadmin . principal-clearflags $u Invalid Forwardable || exit 1
78 $hodadmin . principal-setflags $u Forwardable || exit 1
H A Dcheck-server-hodadmin.in78 $hodadmin . principal-create $u $u@$r || exit 1
81 $hodadmin . principal-clearflags $u Invalid Forwardable || exit 1
82 $hodadmin . principal-setflags $u Forwardable || exit 1
84 $hodadmin . principal-create $s $s@$r || exit 1
86 $hodadmin . principal-clearflags $s Invalid Forwardable || exit 1
87 $hodadmin . principal-setflags $s Forwardable || exit 1
/macosx-10.10/dcerpc-61/dcerpc/include/dce/
H A Dsmb.idl118 [out] char** principal
/macosx-10.10/Heimdal-398.1.2/lib/hdb/
H A Dtest_hdbkeys.c53 krb5_principal principal; local
84 ret = krb5_parse_name (context, principal_str, &principal);
96 ret = hdb_generate_key_set_password(context, principal, password_str, 0, NULL,
105 krb5_free_principal (context, principal);
/macosx-10.10/smb-759.0/lib/smb/
H A Dgss.c253 char *principal = NULL; local
263 asprintf(&principal, "%.*s", (int)buf.length, (char *)buf.value);
267 return (principal);
296 asprintf(&ep->principal, "%.*s", (int)buf.length, (char *)buf.value);
297 if (ep->principal) {
366 free(ep->principal);
392 char *n, *r, *principal, *tofree, *realm; local
397 if (entry->principal == NULL)
403 tofree = principal = strdup(entry->principal);
[all...]
/macosx-10.10/Heimdal-398.1.2/kadmin/
H A Dcheck.c45 krb5_principal principal; local
47 ret = krb5_parse_name(context, name, &principal);
54 ret = kadm5_get_principal(kadm_handle, principal, ent, 0);
55 krb5_free_principal(context, principal);
64 do_check_entry(krb5_principal principal, void *data) argument
71 ret = krb5_unparse_name(context, principal, &name);
76 ret = kadm5_get_principal(kadm_handle, principal, &princ,
79 krb5_warn(context, ret, "Failed to get principal: %s", name);
H A Dext.c42 do_ext_keytab(krb5_principal principal, void *data) argument
52 ret = kadm5_get_principal(kadm_handle, principal, &princ,
76 keys[i].principal = princ.principal;
86 ret = kadm5_randkey_principal(kadm_handle, principal, &k, &n_k);
98 keys[i].principal = principal;
/macosx-10.10/OpenSSH-189/openssh/
H A Dgss-serv-krb5.c85 /* Check if the principal matches any of the user's OD entries for RecordName */
87 od_kuserok(krb5_context context, krb5_principal principal, const char *luser) argument
93 ret = krb5_unparse_name(context, principal, &kprinc);
145 logit("Authorized to %s, krb5 principal %s (krb5_kuserok)",
150 logit("Authorized to %s, krb5 principal %s (od_kuserok)",
247 krb5_principal principal = NULL; local
258 /* Find out who the principal in this cache is */
260 &principal))) {
267 if ((problem = krb5_unparse_name(krb_context, principal, &name))) {
270 krb5_free_principal(krb_context, principal);
[all...]
/macosx-10.10/Heimdal-398.1.2/lib/gssapi/krb5/
H A Dadd_cred.c90 cred->principal) != FALSE) {
110 handle->principal = NULL;
115 kret = krb5_copy_principal(context, cred->principal,
116 &handle->principal);
217 if (handle->principal)
218 krb5_free_principal(context, handle->principal);
H A Dinquire_cred.c104 if (handle->usage == GSS_C_INITIATE && handle->principal != NULL) {
108 kret = krb5_cc_cache_match(context, handle->principal, &ccache);
124 if (icred && icred->principal != NULL) {
127 if (acred && acred->principal)
128 name = (gss_name_t)acred->principal;
130 name = (gss_name_t)icred->principal;
H A Dstore_cred.c75 if (cred->principal == NULL) {
83 ret = krb5_cc_cache_match(context, cred->principal, &id);
94 ret = krb5_cc_initialize(context, id, cred->principal);
/macosx-10.10/MITKerberosShim-66/mittestcc/
H A Dtest_ccapi_context.h21 cc_int32 check_once_cc_context_create_ccache(cc_context_t context, const char *name, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description);
23 cc_int32 check_once_cc_context_create_default_ccache(cc_context_t context, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description);
25 cc_int32 check_once_cc_context_create_new_ccache(cc_context_t context, cc_int32 should_be_default, cc_uint32 cred_vers, const char *principal, cc_ccache_t *ccache, cc_int32 expected_err, const char *description);
/macosx-10.10/Heimdal-398.1.2/lib/hx509/
H A Dtest_windows.in63 --pk-init-principal="krbtgt/HEIMDAL.PKI@HEIMDAL.PKI" \
76 --pk-init-principal="user@HEIMDAL.PKI" \

Completed in 9275 milliseconds

12345678910