/freebsd-10.0-release/crypto/heimdal/lib/kadm5/ |
H A D | free.c | 60 kadm5_principal_ent_t princ) 63 if(princ->principal) 64 krb5_free_principal(context->context, princ->principal); 65 if(princ->mod_name) 66 krb5_free_principal(context->context, princ->mod_name); 67 kadm5_free_key_data(server_handle, &princ->n_key_data, princ->key_data); 68 while(princ->n_tl_data && princ->tl_data) { 70 tp = princ 59 kadm5_free_principal_ent(void *server_handle, kadm5_principal_ent_t princ) argument [all...] |
H A D | marshall.c | 107 kadm5_principal_ent_t princ, 113 krb5_store_principal(sp, princ->principal); 115 krb5_store_int32(sp, princ->princ_expire_time); 117 krb5_store_int32(sp, princ->pw_expiration); 119 krb5_store_int32(sp, princ->last_pwd_change); 121 krb5_store_int32(sp, princ->max_life); 123 krb5_store_int32(sp, princ->mod_name != NULL); 124 if(princ->mod_name) 125 krb5_store_principal(sp, princ->mod_name); 128 krb5_store_int32(sp, princ 106 store_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t mask) argument 167 kadm5_store_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ) argument 174 kadm5_store_principal_ent_mask(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t mask) argument 183 ret_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t mask) argument 285 kadm5_ret_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ) argument 292 kadm5_ret_principal_ent_mask(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t *mask) argument [all...] |
H A D | common_glue.c | 42 krb5_principal princ, 45 return __CALL(chpass_principal, (server_handle, princ, password)); 50 krb5_principal princ, 55 (server_handle, princ, n_key_data, key_data)); 60 kadm5_principal_ent_t princ, 64 return __CALL(create_principal, (server_handle, princ, mask, password)); 69 krb5_principal princ) 71 return __CALL(delete_principal, (server_handle, princ)); 88 krb5_principal princ, 92 return __CALL(get_principal, (server_handle, princ, ou 41 kadm5_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument 49 kadm5_chpass_principal_with_key(void *server_handle, krb5_principal princ, int n_key_data, krb5_key_data *key_data) argument 59 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument 68 kadm5_delete_principal(void *server_handle, krb5_principal princ) argument 87 kadm5_get_principal(void *server_handle, krb5_principal princ, kadm5_principal_ent_t out, uint32_t mask) argument 96 kadm5_modify_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask) argument 104 kadm5_randkey_principal(void *server_handle, krb5_principal princ, krb5_keyblock **new_keys, int *n_keys) argument [all...] |
H A D | get_princs_s.c | 46 add_princ(struct foreach_data *d, char *princ) argument 53 d->princs[d->count++] = princ; 61 char *princ; local 63 ret = krb5_unparse_name(context, ent->entry.principal, &princ); 67 if(fnmatch(d->exp, princ, 0) == 0 || fnmatch(d->exp2, princ, 0) == 0) 68 ret = add_princ(d, princ); 70 free(princ); 72 ret = add_princ(d, princ); 75 free(princ); [all...] |
H A D | modify_s.c | 40 kadm5_principal_ent_t princ, 49 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default")) 57 princ->principal, HDB_F_GET_ANY|HDB_F_ADMIN_DATA, 0, &ent); 60 ret = _kadm5_setup_entry(context, &ent, mask, princ, mask, NULL, 0); 90 kadm5_principal_ent_t princ, 93 return modify_principal(server_handle, princ, mask, 39 modify_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, uint32_t forbidden_mask) argument 89 kadm5_s_modify_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask) argument
|
H A D | delete_s.c | 39 kadm5_s_delete_principal(void *server_handle, krb5_principal princ) argument 51 ret = context->db->hdb_fetch_kvno(context->context, context->db, princ, 64 ret = context->db->hdb_remove(context->context, context->db, princ); 68 kadm5_log_delete (context, princ);
|
H A D | acl.c | 72 * retrieve the right for the current caller on `princ' (NULL means all) 79 krb5_const_principal princ, 123 if (princ != NULL) { 131 princ, pattern_princ); 151 krb5_principal princ; local 154 ret = krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ); 157 ret = krb5_principal_compare(context->context, context->caller, princ); 158 krb5_free_principal(context->context, princ); 197 * `op' on `princ' and otherwise an error 198 * princ 78 fetch_acl(kadm5_server_context *context, krb5_const_principal princ, unsigned *ret_flags) argument 202 _kadm5_acl_check_permission(kadm5_server_context *context, unsigned op, krb5_const_principal princ) argument [all...] |
H A D | ent_setup.c | 128 * Create the hdb entry `ent' based on data from `princ' with 137 kadm5_principal_ent_t princ, 144 if (princ->princ_expire_time) 145 set_value(ent->entry.valid_end, princ->princ_expire_time); 151 if (princ->pw_expiration) 152 set_value(ent->entry.pw_end, princ->pw_expiration); 158 attr_to_flags(princ->attributes, &ent->entry.flags); 169 if(princ->max_life) 170 set_value(ent->entry.max_life, princ->max_life); 182 ent->entry.kvno = princ 134 _kadm5_setup_entry(kadm5_server_context *context, hdb_entry_ex *ent, uint32_t mask, kadm5_principal_ent_t princ, uint32_t princ_mask, kadm5_principal_ent_t def, uint32_t def_mask) argument [all...] |
H A D | chpass_s.c | 40 krb5_principal princ, 56 ret = context->db->hdb_fetch_kvno(context->context, context->db, princ, 128 * change the password of `princ' to `password' if it's not already that. 133 krb5_principal princ, 136 return change (server_handle, princ, password, 1); 140 * change the password of `princ' to `password' 145 krb5_principal princ, 148 return change (server_handle, princ, password, 0); 152 * change keys for `princ' to `keys' 157 krb5_principal princ, 39 change(void *server_handle, krb5_principal princ, const char *password, int cond) argument 132 kadm5_s_chpass_principal_cond(void *server_handle, krb5_principal princ, const char *password) argument 144 kadm5_s_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument 156 kadm5_s_chpass_principal_with_key(void *server_handle, krb5_principal princ, int n_key_data, krb5_key_data *key_data) argument [all...] |
/freebsd-10.0-release/crypto/heimdal/kadmin/ |
H A D | del_enctype.c | 44 kadm5_principal_ent_rec princ; local 53 memset (&princ, 0, sizeof(princ)); 76 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 84 new_key_data = malloc(princ.n_key_data * sizeof(*new_key_data)); 85 if (new_key_data == NULL && princ.n_key_data != 0) { 90 for (i = 0, j = 0; i < princ.n_key_data; ++i) { 91 krb5_key_data *key = &princ.key_data[i]; 108 free (princ.key_data); 109 princ [all...] |
H A D | ext.c | 45 kadm5_principal_ent_rec princ; local 51 ret = kadm5_get_principal(kadm_handle, principal, &princ, 56 if (princ.n_key_data) { 57 keys = malloc(sizeof(*keys) * princ.n_key_data); 59 kadm5_free_principal_ent(kadm_handle, &princ); 63 for (i = 0; i < princ.n_key_data; i++) { 64 krb5_key_data *kd = &princ.key_data[i]; 66 keys[i].principal = princ.principal; 74 n_k = princ.n_key_data; 78 kadm5_free_principal_ent(kadm_handle, &princ); [all...] |
H A D | init.c | 41 create_random_entry(krb5_principal princ, argument 58 ret = krb5_unparse_name(context, princ, &name); 65 ent.principal = princ; 87 ret = kadm5_randkey_principal(kadm_handle, princ, &keys, &n_keys); 96 ret = kadm5_get_principal(kadm_handle, princ, &ent, 157 krb5_principal princ; local 175 ret = krb5_make_principal(context, &princ, realm, 180 create_random_entry(princ, max_life, max_rlife, 0); 181 krb5_free_principal(context, princ); 187 krb5_make_principal(context, &princ, real [all...] |
H A D | add_enctype.c | 44 kadm5_principal_ent_rec princ; local 58 memset (&princ, 0, sizeof(princ)); 81 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 89 new_key_data = malloc((princ.n_key_data + n_etypes) 96 for (i = 0; i < princ.n_key_data; ++i) { 97 krb5_key_data *key = &princ.key_data[i]; 111 int n = princ.n_key_data + i; 149 free (princ.key_data); 150 princ [all...] |
H A D | ank.c | 38 * fetch the default principal corresponding to `princ' 43 krb5_principal princ, 48 krb5_const_realm realm = krb5_principal_get_realm(contextp->context, princ); 79 kadm5_principal_ent_rec princ, defrec; local 86 memset(&princ, 0, sizeof(princ)); 92 princ.principal = princ_ent; 95 ret = set_entry(context, &princ, &mask, 112 set_defaults(&princ, &mask, default_ent, default_mask); 114 if(edit_entry(&princ, 42 get_default(kadm5_server_context *contextp, krb5_principal princ, kadm5_principal_ent_t default_ent) argument [all...] |
H A D | server.c | 46 krb5_principal princ, princ2; local 66 ret = krb5_ret_principal(sp, &princ); 71 krb5_free_principal(contextp->context, princ); 75 krb5_unparse_name_fixed(contextp->context, princ, name, sizeof(name)); 77 ret = _kadm5_acl_check_permission(contextp, KADM5_PRIV_GET, princ); 79 krb5_free_principal(contextp->context, princ); 82 ret = kadm5_get_principal(kadm_handlep, princ, &ent, mask); 90 krb5_free_principal(contextp->context, princ); 95 ret = krb5_ret_principal(sp, &princ); 98 krb5_unparse_name_fixed(contextp->context, princ, nam [all...] |
H A D | mod.c | 38 add_tl(kadm5_principal_ent_rec *princ, int type, krb5_data *data) argument 48 princ->n_tl_data++; 49 ptl = &princ->tl_data; 59 kadm5_principal_ent_rec *princ, 102 add_tl(princ, KRB5_TL_EXTENSION, &buf); 106 add_aliases(krb5_context contextp, kadm5_principal_ent_rec *princ, argument 145 add_tl(princ, KRB5_TL_EXTENSION, &buf); 149 add_pkinit_acl(krb5_context contextp, kadm5_principal_ent_rec *princ, argument 185 add_tl(princ, KRB5_TL_EXTENSION, &buf); 192 kadm5_principal_ent_rec princ; local 58 add_constrained_delegation(krb5_context contextp, kadm5_principal_ent_rec *princ, struct getarg_strings *strings) argument [all...] |
H A D | check.c | 67 kadm5_principal_ent_rec princ; local 75 memset (&princ, 0, sizeof(princ)); 76 ret = kadm5_get_principal(kadm_handle, principal, &princ, 84 for (i = 0; i < princ.n_key_data; i++) { 87 princ.key_data[i].key_data_type[0], 89 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) { 92 name, princ.key_data[i].key_data_type[0], 93 (unsigned long)princ.key_data[i].key_data_length); 98 kadm5_free_principal_ent(kadm_handle, &princ); [all...] |
H A D | get.c | 160 format_field(kadm5_principal_ent_t princ, unsigned int field, argument 166 krb5_unparse_name_fixed_short(context, princ->principal, buf, buf_len); 168 krb5_unparse_name_fixed(context, princ->principal, buf, buf_len); 172 time_t2str(princ->princ_expire_time, buf, buf_len, !condensed); 176 time_t2str(princ->pw_expiration, buf, buf_len, !condensed); 180 time_t2str(princ->last_pwd_change, buf, buf_len, !condensed); 184 deltat2str(princ->max_life, buf, buf_len); 188 deltat2str(princ->max_renewable_life, buf, buf_len); 192 time_t2str(princ->mod_date, buf, buf_len, !condensed); 196 if (princ 335 print_entry_short(struct get_entry_data *data, kadm5_principal_ent_t princ) argument 347 print_entry_long(struct get_entry_data *data, kadm5_principal_ent_t princ) argument 368 kadm5_principal_ent_rec princ; local [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | get_default_principal.c | 61 krb5_principal *princ) 67 *princ = NULL; 75 ret = krb5_make_principal(context, princ, NULL, user, "root", NULL); 77 ret = krb5_make_principal(context, princ, NULL, "root", NULL); 93 ret = krb5_make_principal(context, princ, NULL, user, NULL); 105 krb5_principal *princ) 116 princ); 127 return krb5_make_principal(context, princ, NULL, username, NULL); 141 return krb5_make_principal(context, princ, NULL, username, NULL); 149 krb5_principal *princ) 60 _krb5_get_default_principal_local(krb5_context context, krb5_principal *princ) argument 104 _krb5_get_default_principal_local(krb5_context context, krb5_principal *princ) argument 148 krb5_get_default_principal(krb5_context context, krb5_principal *princ) argument [all...] |
H A D | parse-name-test.c | 81 krb5_principal princ; local 86 ret = krb5_parse_name(context, t->input_string, &princ); 90 if (strcmp (t->realm, princ->realm) != 0) { 93 princ->realm, t->realm, 98 if (t->ncomponents != princ->name.name_string.len) { 101 princ->name.name_string.len, t->ncomponents, 107 princ->name.name_string.val[i]) != 0) { 111 princ->name.name_string.val[i], 119 ret = krb5_unparse_name_fixed(context, princ, 128 ret = krb5_unparse_name_fixed(context, princ, [all...] |
H A D | test_princ.c | 44 const char *princ = "lha@SU.SE"; local 54 ret = krb5_parse_name(context, princ, &p); 62 if (strcmp(princ, princ_unparsed)) { 63 krb5_errx(context, 1, "%s != %s", princ, princ_unparsed); 120 if (strcmp(princ, princ_unparsed)) 121 krb5_errx(context, 1, "'%s' != '%s'", princ, princ_unparsed); 142 if (strcmp(princ, princ_unparsed) == 0) 143 krb5_errx(context, 1, "%s == %s", princ, princ_unparsed); 148 ret = krb5_parse_name(context, princ, &p2); 159 if (strcmp(princ, princ_unparse [all...] |
/freebsd-10.0-release/crypto/openssh/ |
H A D | gss-serv-krb5.c | 87 krb5_principal princ; local 95 &princ))) { 101 if (krb5_kuserok(krb_context, princ, name)) { 108 krb5_free_principal(krb_context, princ); 121 krb5_principal princ; local 152 client->exportedname.value, &princ))) { 159 if ((problem = krb5_cc_initialize(krb_context, ccache, princ))) { 163 krb5_free_principal(krb_context, princ); 168 krb5_free_principal(krb_context, princ);
|
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | authorize_localname.c | 42 krb5_principal princ = (krb5_principal)input_name; local 61 user_ok = krb5_kuserok(context, princ, user);
|
H A D | pname_to_uid.c | 47 krb5_const_principal princ = (krb5_const_principal)pname; 60 ret = krb5_aname_to_localname(context, princ,
|
/freebsd-10.0-release/crypto/heimdal/admin/ |
H A D | get.c | 126 kadm5_principal_ent_rec princ; local 139 memset(&princ, 0, sizeof(princ)); 140 princ.principal = princ_ent; 142 princ.attributes |= KRB5_KDB_DISALLOW_ALL_TIX; 144 princ.princ_expire_time = 0; 161 ret = kadm5_create_principal(kadm_handle, &princ, mask, "x"); 178 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 188 if(!created && (princ.attributes & KRB5_KDB_DISALLOW_ALL_TIX)) 190 princ [all...] |