/freebsd-10.0-release/crypto/heimdal/kadmin/ |
H A D | pw_quality.c | 41 krb5_principal principal; local 45 ret = krb5_parse_name(context, argv[0], &principal); 53 s = kadm5_check_password_quality (context, principal, &pw_data); 57 krb5_free_principal(context, principal);
|
H A D | cpw.c | 45 set_random_key (krb5_principal principal) argument 52 ret = kadm5_randkey_principal(kadm_handle, principal, &keys, &num_keys); 62 set_random_password (krb5_principal principal) argument 68 ret = kadm5_chpass_principal(kadm_handle, principal, pw); 72 krb5_unparse_name(context, principal, &princ_name); 82 set_password (krb5_principal principal, char *password) argument 91 krb5_unparse_name(context, principal, &princ_name); 102 ret = kadm5_chpass_principal(kadm_handle, principal, password); 108 set_key_data (krb5_principal principal, krb5_key_data *key_data) argument 112 ret = kadm5_chpass_principal_with_key (kadm_handle, principal, 118 do_cpw_entry(krb5_principal principal, void *data) argument [all...] |
H A D | del.c | 38 do_del_entry(krb5_principal principal, void *data) argument 40 return kadm5_delete_principal(kadm_handle, principal);
|
H A D | ext.c | 42 do_ext_keytab(krb5_principal principal, void *data) argument 51 ret = kadm5_get_principal(kadm_handle, principal, &princ, 66 keys[i].principal = princ.principal; 76 ret = kadm5_randkey_principal(kadm_handle, principal, &k, &n_k); 88 keys[i].principal = principal;
|
/freebsd-10.0-release/contrib/opie/libopie/ |
H A D | lookup.c | 18 int opielookup FUNCTION((opie, principal), struct opie *opie AND char *principal) argument 23 opie->opie_principal = principal;
|
H A D | passwd.c | 26 int opiepasswd FUNCTION((old, flags, principal, n, seed, ks), struct opie *old AND int flags AND char *principal AND int n AND char *seed AND char *ks) 44 opie.opie_principal = principal; 66 if (opielock(principal))
|
/freebsd-10.0-release/crypto/heimdal/admin/ |
H A D | remove.c | 44 krb5_principal principal = NULL; local 48 ret = krb5_parse_name(context, opt->principal_string, &principal); 62 if(principal) 63 krb5_free_principal(context, principal); 68 if (!principal && !enctype && !opt->kvno_integer) { 71 "principal, enctype or kvno."); 81 entry.principal = principal; 89 if(principal) 90 krb5_free_principal(context, principal); [all...] |
H A D | rename.c | 82 if(krb5_principal_compare(context, entry.principal, from_princ)) { 83 krb5_free_principal(context, entry.principal); 84 entry.principal = to_princ; 87 entry.principal = NULL; 93 entry.principal = from_princ; 96 entry.principal = NULL; 102 entry.principal = NULL;
|
H A D | change.c | 40 krb5_principal principal, krb5_kvno kvno, 51 ret = krb5_unparse_name (context, principal, &client_name); 60 realm = krb5_principal_get_realm(context, principal); 99 ret = kadm5_randkey_principal (kadm_handle, principal, &keys, &num_keys); 110 new_entry.principal = principal; 129 krb5_principal principal; member in struct:change_set 161 if (krb5_principal_compare (context, changeset[i].principal, 162 entry.principal)) { 184 if (krb5_principal_compare (context, princ, entry.principal)) 39 change_entry(krb5_keytab keytab, krb5_principal principal, krb5_kvno kvno, const char *realm, const char *admin_server, int server_port) argument [all...] |
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/ |
H A D | check-cracklib.pl | 8 # 1. Check that password is not the principal name 10 # 3. Check that password isn't repeated for this principal 50 my $principal = shift; 53 if ($principal eq $passwd) { 61 my $principal = shift; 69 $md5context->add($principal, ":", $passwd); 97 die "missing principal" if (!defined $params{'principal'}); 102 $reason = check_basic($params{'principal'}, $params{'new-password'}); 108 $reason = check_repeat($params{'principal'}, [all...] |
H A D | default_keys.c | 82 parse_file(krb5_context context, krb5_principal principal, int no_salt) argument 88 ret = hdb_generate_key_set(context, principal, &keys, &nkeys, no_salt); 102 krb5_principal principal; local 108 ret = krb5_parse_name(context, "lha@SU.SE", &principal); 112 parse_file(context, principal, 0); 113 parse_file(context, principal, 1); 115 krb5_free_principal(context, principal);
|
H A D | test_pw_quality.c | 41 static char *principal; variable 45 { "principal", 0, arg_string, &principal }, 70 if (principal == NULL) 71 krb5_errx(context, 1, "no principal given"); 75 ret = krb5_parse_name(context, principal, &p); 77 krb5_errx(context, 1, "krb5_parse_name: %s", principal);
|
H A D | kadm5-pwcheck.h | 55 krb5_principal principal,
|
H A D | sample_passwd_check.c | 70 krb5_principal principal, 78 strings[0] = principal->name.name_string.val[0]; /* XXX */ 69 check_cracklib(krb5_context context, krb5_principal principal, krb5_data *password) argument
|
/freebsd-10.0-release/contrib/opie/ |
H A D | opieserv.c | 25 char *principal; local 34 fprintf(stderr, "Error reading principal!"); 35 principal = buffer; 37 principal = argv[1]; 40 syslog(LOG_DEBUG, "Principal is +%s+", principal); 43 switch (result = opiechallenge(&opie, principal, challenge)) {
|
/freebsd-10.0-release/crypto/heimdal/lib/krb5/ |
H A D | principal.c | 35 * @page krb5_principal_intro The principal handing functions. 37 * A Kerberos principal is a email address looking string that 39 * realm the principal belongs to and the former is a list of 0 or 67 * Frees a Kerberos principal allocated by the library with 69 * principal functions. 72 * @param p a principal to free. 90 * Set the type of the principal 93 * @param principal principal to set the type for 103 krb5_principal principal, 102 krb5_principal_set_type(krb5_context context, krb5_principal principal, int type) argument 121 krb5_principal_get_type(krb5_context context, krb5_const_principal principal) argument 139 krb5_principal_get_realm(krb5_context context, krb5_const_principal principal) argument 146 krb5_principal_get_comp_string(krb5_context context, krb5_const_principal principal, unsigned int component) argument 167 krb5_principal_get_num_comp(krb5_context context, krb5_const_principal principal) argument 187 krb5_parse_name_flags(krb5_context context, const char *name, int flags, krb5_principal *principal) argument 388 krb5_parse_name(krb5_context context, const char *name, krb5_principal *principal) argument 422 unparse_name_fixed(krb5_context context, krb5_const_principal principal, char *name, size_t len, int flags) argument 489 krb5_unparse_name_fixed(krb5_context context, krb5_const_principal principal, char *name, size_t len) argument 512 krb5_unparse_name_fixed_short(krb5_context context, krb5_const_principal principal, char *name, size_t len) argument 536 krb5_unparse_name_fixed_flags(krb5_context context, krb5_const_principal principal, int flags, char *name, size_t len) argument 546 unparse_name(krb5_context context, krb5_const_principal principal, char **name, int flags) argument 600 krb5_unparse_name(krb5_context context, krb5_const_principal principal, char **name) argument 621 krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal, int flags, char **name) argument 643 krb5_unparse_name_short(krb5_context context, krb5_const_principal principal, char **name) argument 664 krb5_principal_set_realm(krb5_context context, krb5_principal principal, krb5_const_realm realm) argument 696 krb5_build_principal(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, ...) argument 725 krb5_make_principal(krb5_context context, krb5_principal *principal, krb5_const_realm realm, ...) argument 801 build_principal(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, void (*func)(krb5_context, krb5_principal, va_list), va_list ap) argument 832 krb5_build_principal_va(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, va_list ap) argument 842 krb5_build_principal_va_ext(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, va_list ap) argument 853 krb5_build_principal_ext(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, ...) argument [all...] |
H A D | test_kuserok.c | 53 "principal luser"); 62 krb5_principal principal; local 89 ret = krb5_parse_name(context, argv[0], &principal); 93 ret = krb5_unparse_name(context, principal, &p); 97 ret = krb5_kuserok(context, principal, argv[1]);
|
H A D | verify_user.c | 38 krb5_principal principal, 72 ret = krb5_cc_initialize(context, id, principal); 84 * Verify user `principal' with `password'. 150 krb5_principal principal, 163 krb5_principal_get_realm(context, principal), 167 principal, 178 return verify_common (context, principal, OPT(ccache, NULL), 186 krb5_principal principal, 200 ret = krb5_principal_set_realm(context, principal, *r); 206 ret = verify_user_opt_int(context, principal, passwor 37 verify_common(krb5_context context, krb5_principal principal, krb5_ccache ccache, krb5_keytab keytab, krb5_boolean secure, const char *service, krb5_creds cred) argument 149 verify_user_opt_int(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *vopt) argument 185 krb5_verify_user_opt(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *opt) argument 219 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument 243 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument [all...] |
H A D | kuserok.c | 39 /* see if principal is mentioned in the filename access file, return 46 krb5_principal principal, 97 *result = krb5_principal_compare (context, principal, tmp); 112 krb5_principal principal, 159 ret = check_one_file(context, filename, pwd, principal, result); 172 krb5_principal principal, 180 if(krb5_principal_get_comp_string(context, principal, 1) != NULL) 188 if(strcmp(krb5_principal_get_realm(context, principal), 191 if(strcmp(krb5_principal_get_comp_string(context, principal, 0), 203 * principal i 43 check_one_file(krb5_context context, const char *filename, struct passwd *pwd, krb5_principal principal, krb5_boolean *result) argument 109 check_directory(krb5_context context, const char *dirname, struct passwd *pwd, krb5_principal principal, krb5_boolean *result) argument 171 match_local_principals(krb5_context context, krb5_principal principal, const char *luser) argument 237 krb5_kuserok(krb5_context context, krb5_principal principal, const char *luser) argument [all...] |
H A D | asn1_glue.c | 49 krb5_principal *principal, 70 *principal = p; 48 _krb5_principalname2krb5_principal(krb5_context context, krb5_principal *principal, const PrincipalName from, const Realm realm) argument
|
/freebsd-10.0-release/crypto/heimdal/kuser/ |
H A D | kverify.c | 50 "[principal]"); 63 krb5_principal principal = NULL; local 97 ret = krb5_parse_name(context, argv[0], &principal); 101 ret = krb5_get_default_principal(context, &principal); 109 principal,
|
/freebsd-10.0-release/lib/libpam/modules/pam_opie/ |
H A D | pam_opie.c | 66 char principal[OPIE_PRINCIPAL_MAX]; local 90 if (strlen(user) >= sizeof(principal)) 92 strlcpy(principal, user, sizeof(principal)); 105 if (opiechallenge(&opie, principal, challenge) != 0 &&
|
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/krb5/ |
H A D | copy_ccache.c | 97 &handle->principal); 108 handle->principal, 111 krb5_free_principal(context, handle->principal); 122 handle->principal, 125 krb5_free_principal(context, handle->principal); 147 if (keytab_principal && handle->principal == NULL) { 150 &handle->principal); 187 if (handle->principal) 188 krb5_free_principal(context, handle->principal);
|
H A D | release_cred.c | 57 if (cred->principal != NULL) 58 krb5_free_principal(context, cred->principal);
|
/freebsd-10.0-release/crypto/heimdal/appl/ftp/ftpd/ |
H A D | klist.c | 71 krb5_principal principal) 78 ret = krb5_unparse_name (context, principal, &str); 126 krb5_principal principal; local 144 ret = krb5_cc_get_principal (context, ccache, &principal); 154 exit_status = print_tickets (context, ccache, principal); 162 krb5_free_principal (context, principal); 69 print_tickets(krb5_context context, krb5_ccache ccache, krb5_principal principal) argument
|