Searched refs:princ (Results 1 - 25 of 64) sorted by relevance

123

/freebsd-10.0-release/crypto/heimdal/lib/kadm5/
H A Dfree.c60 kadm5_principal_ent_t princ)
63 if(princ->principal)
64 krb5_free_principal(context->context, princ->principal);
65 if(princ->mod_name)
66 krb5_free_principal(context->context, princ->mod_name);
67 kadm5_free_key_data(server_handle, &princ->n_key_data, princ->key_data);
68 while(princ->n_tl_data && princ->tl_data) {
70 tp = princ
59 kadm5_free_principal_ent(void *server_handle, kadm5_principal_ent_t princ) argument
[all...]
H A Dmarshall.c107 kadm5_principal_ent_t princ,
113 krb5_store_principal(sp, princ->principal);
115 krb5_store_int32(sp, princ->princ_expire_time);
117 krb5_store_int32(sp, princ->pw_expiration);
119 krb5_store_int32(sp, princ->last_pwd_change);
121 krb5_store_int32(sp, princ->max_life);
123 krb5_store_int32(sp, princ->mod_name != NULL);
124 if(princ->mod_name)
125 krb5_store_principal(sp, princ->mod_name);
128 krb5_store_int32(sp, princ
106 store_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t mask) argument
167 kadm5_store_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ) argument
174 kadm5_store_principal_ent_mask(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t mask) argument
183 ret_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t mask) argument
285 kadm5_ret_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ) argument
292 kadm5_ret_principal_ent_mask(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t *mask) argument
[all...]
H A Dcommon_glue.c42 krb5_principal princ,
45 return __CALL(chpass_principal, (server_handle, princ, password));
50 krb5_principal princ,
55 (server_handle, princ, n_key_data, key_data));
60 kadm5_principal_ent_t princ,
64 return __CALL(create_principal, (server_handle, princ, mask, password));
69 krb5_principal princ)
71 return __CALL(delete_principal, (server_handle, princ));
88 krb5_principal princ,
92 return __CALL(get_principal, (server_handle, princ, ou
41 kadm5_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument
49 kadm5_chpass_principal_with_key(void *server_handle, krb5_principal princ, int n_key_data, krb5_key_data *key_data) argument
59 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument
68 kadm5_delete_principal(void *server_handle, krb5_principal princ) argument
87 kadm5_get_principal(void *server_handle, krb5_principal princ, kadm5_principal_ent_t out, uint32_t mask) argument
96 kadm5_modify_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask) argument
104 kadm5_randkey_principal(void *server_handle, krb5_principal princ, krb5_keyblock **new_keys, int *n_keys) argument
[all...]
H A Dget_princs_s.c46 add_princ(struct foreach_data *d, char *princ) argument
53 d->princs[d->count++] = princ;
61 char *princ; local
63 ret = krb5_unparse_name(context, ent->entry.principal, &princ);
67 if(fnmatch(d->exp, princ, 0) == 0 || fnmatch(d->exp2, princ, 0) == 0)
68 ret = add_princ(d, princ);
70 free(princ);
72 ret = add_princ(d, princ);
75 free(princ);
[all...]
H A Dmodify_s.c40 kadm5_principal_ent_t princ,
49 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default"))
57 princ->principal, HDB_F_GET_ANY|HDB_F_ADMIN_DATA, 0, &ent);
60 ret = _kadm5_setup_entry(context, &ent, mask, princ, mask, NULL, 0);
90 kadm5_principal_ent_t princ,
93 return modify_principal(server_handle, princ, mask,
39 modify_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, uint32_t forbidden_mask) argument
89 kadm5_s_modify_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask) argument
H A Ddelete_s.c39 kadm5_s_delete_principal(void *server_handle, krb5_principal princ) argument
51 ret = context->db->hdb_fetch_kvno(context->context, context->db, princ,
64 ret = context->db->hdb_remove(context->context, context->db, princ);
68 kadm5_log_delete (context, princ);
H A Dacl.c72 * retrieve the right for the current caller on `princ' (NULL means all)
79 krb5_const_principal princ,
123 if (princ != NULL) {
131 princ, pattern_princ);
151 krb5_principal princ; local
154 ret = krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ);
157 ret = krb5_principal_compare(context->context, context->caller, princ);
158 krb5_free_principal(context->context, princ);
197 * `op' on `princ' and otherwise an error
198 * princ
78 fetch_acl(kadm5_server_context *context, krb5_const_principal princ, unsigned *ret_flags) argument
202 _kadm5_acl_check_permission(kadm5_server_context *context, unsigned op, krb5_const_principal princ) argument
[all...]
H A Dent_setup.c128 * Create the hdb entry `ent' based on data from `princ' with
137 kadm5_principal_ent_t princ,
144 if (princ->princ_expire_time)
145 set_value(ent->entry.valid_end, princ->princ_expire_time);
151 if (princ->pw_expiration)
152 set_value(ent->entry.pw_end, princ->pw_expiration);
158 attr_to_flags(princ->attributes, &ent->entry.flags);
169 if(princ->max_life)
170 set_value(ent->entry.max_life, princ->max_life);
182 ent->entry.kvno = princ
134 _kadm5_setup_entry(kadm5_server_context *context, hdb_entry_ex *ent, uint32_t mask, kadm5_principal_ent_t princ, uint32_t princ_mask, kadm5_principal_ent_t def, uint32_t def_mask) argument
[all...]
H A Dchpass_s.c40 krb5_principal princ,
56 ret = context->db->hdb_fetch_kvno(context->context, context->db, princ,
128 * change the password of `princ' to `password' if it's not already that.
133 krb5_principal princ,
136 return change (server_handle, princ, password, 1);
140 * change the password of `princ' to `password'
145 krb5_principal princ,
148 return change (server_handle, princ, password, 0);
152 * change keys for `princ' to `keys'
157 krb5_principal princ,
39 change(void *server_handle, krb5_principal princ, const char *password, int cond) argument
132 kadm5_s_chpass_principal_cond(void *server_handle, krb5_principal princ, const char *password) argument
144 kadm5_s_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument
156 kadm5_s_chpass_principal_with_key(void *server_handle, krb5_principal princ, int n_key_data, krb5_key_data *key_data) argument
[all...]
/freebsd-10.0-release/crypto/heimdal/kadmin/
H A Ddel_enctype.c44 kadm5_principal_ent_rec princ; local
53 memset (&princ, 0, sizeof(princ));
76 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ,
84 new_key_data = malloc(princ.n_key_data * sizeof(*new_key_data));
85 if (new_key_data == NULL && princ.n_key_data != 0) {
90 for (i = 0, j = 0; i < princ.n_key_data; ++i) {
91 krb5_key_data *key = &princ.key_data[i];
108 free (princ.key_data);
109 princ
[all...]
H A Dext.c45 kadm5_principal_ent_rec princ; local
51 ret = kadm5_get_principal(kadm_handle, principal, &princ,
56 if (princ.n_key_data) {
57 keys = malloc(sizeof(*keys) * princ.n_key_data);
59 kadm5_free_principal_ent(kadm_handle, &princ);
63 for (i = 0; i < princ.n_key_data; i++) {
64 krb5_key_data *kd = &princ.key_data[i];
66 keys[i].principal = princ.principal;
74 n_k = princ.n_key_data;
78 kadm5_free_principal_ent(kadm_handle, &princ);
[all...]
H A Dinit.c41 create_random_entry(krb5_principal princ, argument
58 ret = krb5_unparse_name(context, princ, &name);
65 ent.principal = princ;
87 ret = kadm5_randkey_principal(kadm_handle, princ, &keys, &n_keys);
96 ret = kadm5_get_principal(kadm_handle, princ, &ent,
157 krb5_principal princ; local
175 ret = krb5_make_principal(context, &princ, realm,
180 create_random_entry(princ, max_life, max_rlife, 0);
181 krb5_free_principal(context, princ);
187 krb5_make_principal(context, &princ, real
[all...]
H A Dadd_enctype.c44 kadm5_principal_ent_rec princ; local
58 memset (&princ, 0, sizeof(princ));
81 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ,
89 new_key_data = malloc((princ.n_key_data + n_etypes)
96 for (i = 0; i < princ.n_key_data; ++i) {
97 krb5_key_data *key = &princ.key_data[i];
111 int n = princ.n_key_data + i;
149 free (princ.key_data);
150 princ
[all...]
H A Dank.c38 * fetch the default principal corresponding to `princ'
43 krb5_principal princ,
48 krb5_const_realm realm = krb5_principal_get_realm(contextp->context, princ);
79 kadm5_principal_ent_rec princ, defrec; local
86 memset(&princ, 0, sizeof(princ));
92 princ.principal = princ_ent;
95 ret = set_entry(context, &princ, &mask,
112 set_defaults(&princ, &mask, default_ent, default_mask);
114 if(edit_entry(&princ,
42 get_default(kadm5_server_context *contextp, krb5_principal princ, kadm5_principal_ent_t default_ent) argument
[all...]
H A Dserver.c46 krb5_principal princ, princ2; local
66 ret = krb5_ret_principal(sp, &princ);
71 krb5_free_principal(contextp->context, princ);
75 krb5_unparse_name_fixed(contextp->context, princ, name, sizeof(name));
77 ret = _kadm5_acl_check_permission(contextp, KADM5_PRIV_GET, princ);
79 krb5_free_principal(contextp->context, princ);
82 ret = kadm5_get_principal(kadm_handlep, princ, &ent, mask);
90 krb5_free_principal(contextp->context, princ);
95 ret = krb5_ret_principal(sp, &princ);
98 krb5_unparse_name_fixed(contextp->context, princ, nam
[all...]
H A Dmod.c38 add_tl(kadm5_principal_ent_rec *princ, int type, krb5_data *data) argument
48 princ->n_tl_data++;
49 ptl = &princ->tl_data;
59 kadm5_principal_ent_rec *princ,
102 add_tl(princ, KRB5_TL_EXTENSION, &buf);
106 add_aliases(krb5_context contextp, kadm5_principal_ent_rec *princ, argument
145 add_tl(princ, KRB5_TL_EXTENSION, &buf);
149 add_pkinit_acl(krb5_context contextp, kadm5_principal_ent_rec *princ, argument
185 add_tl(princ, KRB5_TL_EXTENSION, &buf);
192 kadm5_principal_ent_rec princ; local
58 add_constrained_delegation(krb5_context contextp, kadm5_principal_ent_rec *princ, struct getarg_strings *strings) argument
[all...]
H A Dcheck.c67 kadm5_principal_ent_rec princ; local
75 memset (&princ, 0, sizeof(princ));
76 ret = kadm5_get_principal(kadm_handle, principal, &princ,
84 for (i = 0; i < princ.n_key_data; i++) {
87 princ.key_data[i].key_data_type[0],
89 if (ret == 0 && keysize != (size_t)princ.key_data[i].key_data_length[0]) {
92 name, princ.key_data[i].key_data_type[0],
93 (unsigned long)princ.key_data[i].key_data_length);
98 kadm5_free_principal_ent(kadm_handle, &princ);
[all...]
H A Dget.c160 format_field(kadm5_principal_ent_t princ, unsigned int field, argument
166 krb5_unparse_name_fixed_short(context, princ->principal, buf, buf_len);
168 krb5_unparse_name_fixed(context, princ->principal, buf, buf_len);
172 time_t2str(princ->princ_expire_time, buf, buf_len, !condensed);
176 time_t2str(princ->pw_expiration, buf, buf_len, !condensed);
180 time_t2str(princ->last_pwd_change, buf, buf_len, !condensed);
184 deltat2str(princ->max_life, buf, buf_len);
188 deltat2str(princ->max_renewable_life, buf, buf_len);
192 time_t2str(princ->mod_date, buf, buf_len, !condensed);
196 if (princ
335 print_entry_short(struct get_entry_data *data, kadm5_principal_ent_t princ) argument
347 print_entry_long(struct get_entry_data *data, kadm5_principal_ent_t princ) argument
368 kadm5_principal_ent_rec princ; local
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dget_default_principal.c61 krb5_principal *princ)
67 *princ = NULL;
75 ret = krb5_make_principal(context, princ, NULL, user, "root", NULL);
77 ret = krb5_make_principal(context, princ, NULL, "root", NULL);
93 ret = krb5_make_principal(context, princ, NULL, user, NULL);
105 krb5_principal *princ)
116 princ);
127 return krb5_make_principal(context, princ, NULL, username, NULL);
141 return krb5_make_principal(context, princ, NULL, username, NULL);
149 krb5_principal *princ)
60 _krb5_get_default_principal_local(krb5_context context, krb5_principal *princ) argument
104 _krb5_get_default_principal_local(krb5_context context, krb5_principal *princ) argument
148 krb5_get_default_principal(krb5_context context, krb5_principal *princ) argument
[all...]
H A Dparse-name-test.c81 krb5_principal princ; local
86 ret = krb5_parse_name(context, t->input_string, &princ);
90 if (strcmp (t->realm, princ->realm) != 0) {
93 princ->realm, t->realm,
98 if (t->ncomponents != princ->name.name_string.len) {
101 princ->name.name_string.len, t->ncomponents,
107 princ->name.name_string.val[i]) != 0) {
111 princ->name.name_string.val[i],
119 ret = krb5_unparse_name_fixed(context, princ,
128 ret = krb5_unparse_name_fixed(context, princ,
[all...]
H A Dtest_princ.c44 const char *princ = "lha@SU.SE"; local
54 ret = krb5_parse_name(context, princ, &p);
62 if (strcmp(princ, princ_unparsed)) {
63 krb5_errx(context, 1, "%s != %s", princ, princ_unparsed);
120 if (strcmp(princ, princ_unparsed))
121 krb5_errx(context, 1, "'%s' != '%s'", princ, princ_unparsed);
142 if (strcmp(princ, princ_unparsed) == 0)
143 krb5_errx(context, 1, "%s == %s", princ, princ_unparsed);
148 ret = krb5_parse_name(context, princ, &p2);
159 if (strcmp(princ, princ_unparse
[all...]
/freebsd-10.0-release/crypto/openssh/
H A Dgss-serv-krb5.c87 krb5_principal princ; local
95 &princ))) {
101 if (krb5_kuserok(krb_context, princ, name)) {
108 krb5_free_principal(krb_context, princ);
121 krb5_principal princ; local
152 client->exportedname.value, &princ))) {
159 if ((problem = krb5_cc_initialize(krb_context, ccache, princ))) {
163 krb5_free_principal(krb_context, princ);
168 krb5_free_principal(krb_context, princ);
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/krb5/
H A Dauthorize_localname.c42 krb5_principal princ = (krb5_principal)input_name; local
61 user_ok = krb5_kuserok(context, princ, user);
H A Dpname_to_uid.c47 krb5_const_principal princ = (krb5_const_principal)pname;
60 ret = krb5_aname_to_localname(context, princ,
/freebsd-10.0-release/crypto/heimdal/admin/
H A Dget.c126 kadm5_principal_ent_rec princ; local
139 memset(&princ, 0, sizeof(princ));
140 princ.principal = princ_ent;
142 princ.attributes |= KRB5_KDB_DISALLOW_ALL_TIX;
144 princ.princ_expire_time = 0;
161 ret = kadm5_create_principal(kadm_handle, &princ, mask, "x");
178 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ,
188 if(!created && (princ.attributes & KRB5_KDB_DISALLOW_ALL_TIX))
190 princ
[all...]

Completed in 128 milliseconds

123