/macosx-10.9.5/Heimdal-323.92.1/tests/db/ |
H A D | add-modify-delete.in | 87 echo checking principal 109 echo checking principal
|
/macosx-10.9.5/MITKerberosShim-62.1/test/ |
H A D | test-sd.c | 63 krb5_data *nameData = krb5_princ_name (kcontext, entry.principal);
|
/macosx-10.9.5/OpenSSH-186/openssh/openbsd-compat/ |
H A D | port-aix.c | 379 * aix_krb5_get_principal_name: returns the user's kerberos client principal name if 385 char *authname = NULL, *authdomain = NULL, *principal = NULL; local 394 xasprintf(&principal, "%s@%s", authname ? authname : pw_name, authdomain); 396 principal = xstrdup(authname); 398 return principal;
|
/macosx-10.9.5/bind9-45.100/bind9/lib/dns/include/dst/ |
H A D | gssapi.h | 123 gss_ctx_id_t *context, dns_name_t *principal, 197 * principal: host/example.com@EXAMPLE.COM) to the realm name stored 207 * principal: host/example.com@EXAMPLE.COM) to the realm name stored
|
/macosx-10.9.5/dcerpc-58/dcerpc/ncklib/ |
H A D | id_base.h | 108 sec_id_t principal; member in struct:sec_id_pac_format_v1_t
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/Headers/CredentialsCache/ |
H A D | CredentialsCache2.h | 86 /*
* This is backwards compatibility for CCache API v2 clients to be able to run
* against the CCache API v3 library
*/
#ifndef __CREDENTIALSCACHE2__
#define __CREDENTIALSCACHE2__
#include <CredentialsCache/CredentialsCache.h>
#ifdef __cplusplus
extern "C" {
#endif /* __cplusplus */
#include <KerberosSupport/KerberosConditionalMacros.h>
#if PRAGMA_IMPORT
# pragma import on
#endif
/* This stuff is to make sure that we always use the same compiler options for
this header file. Otherwise we get really exciting failure modes -- meeroh */
/* Sadly, the v2 APi didn't specify the alignment, so we use the default except on MacOS
(where our implementation defined it to be 2-byte aligned) */
#if TARGET_OS_MAC
#if PRAGMA_STRUCT_ALIGN
#pragma options align=mac68k
#elif PRAGMA_STRUCT_PACKPUSH
#pragma pack(push, 2)
#elif PRAGMA_STRUCT_PACK
#pragma pack(2)
#endif
#endif
#if PRAGMA_ENUM_ALWAYSINT
#pragma enumsalwaysint on
#endif
#if TARGET_CPU_68K
#pragma fourbyteints on
#endif
/* Some old types get directly mapped to new types */
typedef cc_context_d apiCB;
typedef cc_ccache_d ccache_p;
typedef cc_credentials_iterator_d ccache_cit_creds;
typedef cc_ccache_iterator_d ccache_cit_ccache;
typedef cc_data cc_data_compat;
typedef cc_int32 cc_cred_vers;
typedef cc_int32 cc_result;
/* This doesn't exist in API v3 */
typedef cc_uint32 cc_flags;
/* Credentials types are visible to the caller so we have to keep binary compatibility */
typedef struct cc_credentials_v5_compat {
char* client;
char* server;
cc_data_compat keyblock;
cc_time_t authtime;
cc_time_t starttime;
cc_time_t endtime;
cc_time_t renew_till;
cc_uint32 is_skey;
cc_uint32 ticket_flags;
cc_data_compat** addresses;
cc_data_compat ticket;
cc_data_compat second_ticket;
cc_data_compat** authdata;
} cc_credentials_v5_compat;
enum {
MAX_V4_CRED_LEN = 1250
};
enum {
KRB_NAME_SZ = 40,
KRB_INSTANCE_SZ = 40,
KRB_REALM_SZ = 40
};
typedef struct cc_credentials_v4_compat {
unsigned char kversion;
char principal[KRB_NAME_SZ+1];
char principal_instance[KRB_INSTANCE_SZ+1];
char service[KRB_NAME_SZ+1];
char service_instance[KRB_INSTANCE_SZ+1];
char realm[KRB_REALM_SZ+1];
unsigned char session_key[8];
cc_int32 kvno;
cc_int32 str_to_key;
long issue_date;
cc_int32 lifetime;
cc_uint32 address;
cc_int32 ticket_sz;
unsigned char ticket[MAX_V4_CRED_LEN];
unsigned long oops;
} cc_credentials_v4_compat;
typedef union cred_ptr_union_compat {
cc_credentials_v4_compat* pV4Cred;
cc_credentials_v5_compat* pV5Cred;
} cred_ptr_union_compat;
typedef struct cred_union {
cc_int32 cred_type; // cc_cred_vers
cred_ptr_union_compat cred;
} cred_union;
/* NC info structure is gone in v3 */
struct infoNC {
char* name;
char* principal;
cc_int32 vers;
};
typedef struct infoNC infoNC;
/* Some old type names */
typedef cc_credenti (…) 1 / member in struct:cc_credentials_v4_compat
|
/macosx-10.9.5/Heimdal-323.92.1/lib/kadm5/ |
H A D | get_s.c | 146 ret = krb5_copy_principal(context->context, ent.entry.principal, 147 &out->principal); 185 if (ent.entry.modified_by->principal != NULL) 187 ent.entry.modified_by->principal, 189 } else if(ent.entry.created_by.principal != NULL) 191 ent.entry.created_by.principal, 252 krb5_get_pw_salt(context->context, ent.entry.principal, &salt);
|
H A D | ad.c | 510 krb5_principal principal, 534 principal, 610 fqdn = get_fqdn(context->context, entry->principal); 612 ret = krb5_unparse_name(context->context, entry->principal, &p); 805 kadm5_ad_delete_principal(void *server_handle, krb5_principal principal) argument 821 fqdn = get_fqdn(context->context, principal); 823 ret = krb5_unparse_name(context->context, principal, &p); 881 krb5_principal principal, 894 * principal 919 krb5_unparse_name_short(context->context, principal, 509 kadm5_ad_chpass_principal(void *server_handle, krb5_principal principal, int keepold, const char *password, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple) argument 880 kadm5_ad_get_principal(void *server_handle, krb5_principal principal, kadm5_principal_ent_t entry, uint32_t mask) argument 1237 kadm5_ad_randkey_principal(void *server_handle, krb5_principal principal, krb5_boolean keepold, int n_ks_tuple, krb5_key_salt_tuple *ks_tuple, krb5_keyblock **keys, int *n_keys) argument [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | test_cc.c | 362 test_cache_find(krb5_context context, const char *principal, int find) argument 368 ret = krb5_parse_name(context, principal, &client); 370 krb5_err(context, 1, ret, "parse_name for %s failed", principal); 374 krb5_err(context, 1, ret, "cc_cache_match for %s failed", principal); 376 krb5_err(context, 1, ret, "cc_cache_match for %s found", principal); 399 krb5_principal principal; local 404 ret = krb5_cc_get_principal(context, id, &principal); 406 ret = krb5_unparse_name(context, principal, &name); 412 krb5_free_principal(context, principal); 438 krb5_principal principal; local [all...] |
H A D | mcache.c | 289 krb5_principal *principal) 297 principal); 442 krb5_principal principal; local 459 /* swap principal */ 460 principal = mto->primary_principal; 462 mfrom->primary_principal = principal; 287 mcc_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument
|
/macosx-10.9.5/Heimdal-323.92.1/admin/ |
H A D | add.c | 66 ret = krb5_parse_name(context, opt->principal_string, &entry.principal); 159 entry.principal, &entry.keyblock);
|
H A D | list.c | 107 krb5_unparse_name_fixed(context, entry.principal, buf, sizeof(buf)); 134 krb5_unparse_name_fixed(context, entry.principal, buf, sizeof(buf));
|
/macosx-10.9.5/Heimdal-323.92.1/appl/dceutils/ |
H A D | k5dce.h | 44 * by this program, and it needs access to the client principal 156 #define krb5_cc_get_principal(cache, principal) (*(cache)->ops->get_princ)(cache, principal)
|
/macosx-10.9.5/Heimdal-323.92.1/appl/popper/ |
H A D | pop_pass.c | 147 if (!krb5_kuserok (p->context, p->principal, p->user)) { 153 if(krb5_unparse_name (p->context, p->principal, &name) == 0) {
|
H A D | auth_gssapi.c | 158 krb5_principal principal; local 209 krb5_parse_name(gssapi_krb5_context, name, &principal); 211 if(!krb5_kuserok(gssapi_krb5_context, principal, ptr)) {
|
/macosx-10.9.5/Heimdal-323.92.1/kcm/ |
H A D | glue.c | 155 krb5_principal *principal) 163 principal); 153 kcmss_get_principal(krb5_context context, krb5_ccache id, krb5_principal *principal) argument
|
/macosx-10.9.5/dcerpc-58/dcerpc/include/dce/ |
H A D | id_base.idl | 131 sec_id_t principal;
|
/macosx-10.9.5/Heimdal-323.92.1/kadmin/ |
H A D | init.c | 60 krb5_warn(context, ret, "failed to unparse principal name"); 65 ent.principal = princ; 100 "unable to get principal", name); 110 "unable to modify principal", name); 251 krb5_make_principal(context, &ent.principal, realm, 264 krb5_free_principal(context, ent.principal);
|
/macosx-10.9.5/Heimdal-323.92.1/lib/hdb/ |
H A D | print.c | 41 principal 49 creation date and principal 50 modification date and principal 51 principal valid from date (not used) 52 principal valid end date (not used) 53 principal key expires (not used) 118 if (ev->principal != NULL) { 119 ret = krb5_unparse_name(context, ev->principal, &pr); 136 /* --- principal */ 137 ret = krb5_unparse_name(context, ent->principal, [all...] |
H A D | db.c | 149 if (code == 0 && entry->entry.principal == NULL) { 150 entry->entry.principal = malloc(sizeof(*entry->entry.principal)); 151 if (entry->entry.principal == NULL) { 156 hdb_key2principal(context, &key_data, entry->entry.principal);
|
H A D | db3.c | 146 if (entry->entry.principal == NULL) { 147 entry->entry.principal = malloc(sizeof(*entry->entry.principal)); 148 if (entry->entry.principal == NULL) { 153 hdb_key2principal(context, &key_data, entry->entry.principal);
|
H A D | ndbm.c | 108 if (ret == 0 && entry->entry.principal == NULL) { 109 entry->entry.principal = malloc (sizeof(*entry->entry.principal)); 110 if (entry->entry.principal == NULL) { 115 hdb_key2principal (context, &key_data, entry->entry.principal);
|
/macosx-10.9.5/KerberosHelper-148/Tests/ |
H A D | KRBCreateSession.pl | 56 LocalKDC service principal s_princ_lkdc: $s_princ_l 57 Managed realm service principal (local): $s_princ_ml 58 Managed realm service principal (routed): $s_princ_mr
|
/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | pkinit.c | 76 krb5_principal principal; member in struct:pk_principal_mapping::pk_allowed_princ 1629 krb5_principal_data principal; local 1650 principal.name = kn.principalName; 1651 principal.realm = kn.realm; 1653 if (krb5_principal_compare(context, &principal, match) == TRUE) 1678 krb5_principal principal = NULL; local 1717 ret = krb5_parse_name(context, upn, &principal); 1720 kdc_log(context, config, 0, "Failed to parse principal in MS UPN SAN"); 1725 ret = clientdb->hdb_check_pkinit_ms_upn_match(context, clientdb, client, principal); 1731 strupr(principal 1955 krb5_principal principal; local [all...] |
H A D | digest.c | 89 client->entry.principal)); 116 p = client->entry.principal; 257 /* check the server principal in the ticket matches digest/R@R */ 259 krb5_principal principal = NULL; local 262 ret = krb5_ticket_get_server(context, ticket, &principal); 267 krb5_set_error_message(context, ret, "Wrong digest server principal used"); 268 p = krb5_principal_get_comp_string(context, principal, 0); 270 krb5_free_principal(context, principal); 274 krb5_free_principal(context, principal); 278 p = krb5_principal_get_comp_string(context, principal, 304 krb5_principal principal = NULL; local [all...] |