Searched refs:principal (Results 1 - 25 of 145) sorted by relevance

123456

/freebsd-10.0-release/crypto/heimdal/kadmin/
H A Dpw_quality.c41 krb5_principal principal; local
45 ret = krb5_parse_name(context, argv[0], &principal);
53 s = kadm5_check_password_quality (context, principal, &pw_data);
57 krb5_free_principal(context, principal);
H A Dcpw.c45 set_random_key (krb5_principal principal) argument
52 ret = kadm5_randkey_principal(kadm_handle, principal, &keys, &num_keys);
62 set_random_password (krb5_principal principal) argument
68 ret = kadm5_chpass_principal(kadm_handle, principal, pw);
72 krb5_unparse_name(context, principal, &princ_name);
82 set_password (krb5_principal principal, char *password) argument
91 krb5_unparse_name(context, principal, &princ_name);
102 ret = kadm5_chpass_principal(kadm_handle, principal, password);
108 set_key_data (krb5_principal principal, krb5_key_data *key_data) argument
112 ret = kadm5_chpass_principal_with_key (kadm_handle, principal,
118 do_cpw_entry(krb5_principal principal, void *data) argument
[all...]
H A Ddel.c38 do_del_entry(krb5_principal principal, void *data) argument
40 return kadm5_delete_principal(kadm_handle, principal);
H A Dext.c42 do_ext_keytab(krb5_principal principal, void *data) argument
51 ret = kadm5_get_principal(kadm_handle, principal, &princ,
66 keys[i].principal = princ.principal;
76 ret = kadm5_randkey_principal(kadm_handle, principal, &k, &n_k);
88 keys[i].principal = principal;
/freebsd-10.0-release/contrib/opie/libopie/
H A Dlookup.c18 int opielookup FUNCTION((opie, principal), struct opie *opie AND char *principal) argument
23 opie->opie_principal = principal;
H A Dpasswd.c26 int opiepasswd FUNCTION((old, flags, principal, n, seed, ks), struct opie *old AND int flags AND char *principal AND int n AND char *seed AND char *ks)
44 opie.opie_principal = principal;
66 if (opielock(principal))
/freebsd-10.0-release/crypto/heimdal/admin/
H A Dremove.c44 krb5_principal principal = NULL; local
48 ret = krb5_parse_name(context, opt->principal_string, &principal);
62 if(principal)
63 krb5_free_principal(context, principal);
68 if (!principal && !enctype && !opt->kvno_integer) {
71 "principal, enctype or kvno.");
81 entry.principal = principal;
89 if(principal)
90 krb5_free_principal(context, principal);
[all...]
H A Drename.c82 if(krb5_principal_compare(context, entry.principal, from_princ)) {
83 krb5_free_principal(context, entry.principal);
84 entry.principal = to_princ;
87 entry.principal = NULL;
93 entry.principal = from_princ;
96 entry.principal = NULL;
102 entry.principal = NULL;
H A Dchange.c40 krb5_principal principal, krb5_kvno kvno,
51 ret = krb5_unparse_name (context, principal, &client_name);
60 realm = krb5_principal_get_realm(context, principal);
99 ret = kadm5_randkey_principal (kadm_handle, principal, &keys, &num_keys);
110 new_entry.principal = principal;
129 krb5_principal principal; member in struct:change_set
161 if (krb5_principal_compare (context, changeset[i].principal,
162 entry.principal)) {
184 if (krb5_principal_compare (context, princ, entry.principal))
39 change_entry(krb5_keytab keytab, krb5_principal principal, krb5_kvno kvno, const char *realm, const char *admin_server, int server_port) argument
[all...]
/freebsd-10.0-release/crypto/heimdal/lib/kadm5/
H A Dcheck-cracklib.pl8 # 1. Check that password is not the principal name
10 # 3. Check that password isn't repeated for this principal
50 my $principal = shift;
53 if ($principal eq $passwd) {
61 my $principal = shift;
69 $md5context->add($principal, ":", $passwd);
97 die "missing principal" if (!defined $params{'principal'});
102 $reason = check_basic($params{'principal'}, $params{'new-password'});
108 $reason = check_repeat($params{'principal'},
[all...]
H A Ddefault_keys.c82 parse_file(krb5_context context, krb5_principal principal, int no_salt) argument
88 ret = hdb_generate_key_set(context, principal, &keys, &nkeys, no_salt);
102 krb5_principal principal; local
108 ret = krb5_parse_name(context, "lha@SU.SE", &principal);
112 parse_file(context, principal, 0);
113 parse_file(context, principal, 1);
115 krb5_free_principal(context, principal);
H A Dtest_pw_quality.c41 static char *principal; variable
45 { "principal", 0, arg_string, &principal },
70 if (principal == NULL)
71 krb5_errx(context, 1, "no principal given");
75 ret = krb5_parse_name(context, principal, &p);
77 krb5_errx(context, 1, "krb5_parse_name: %s", principal);
H A Dkadm5-pwcheck.h55 krb5_principal principal,
H A Dsample_passwd_check.c70 krb5_principal principal,
78 strings[0] = principal->name.name_string.val[0]; /* XXX */
69 check_cracklib(krb5_context context, krb5_principal principal, krb5_data *password) argument
/freebsd-10.0-release/contrib/opie/
H A Dopieserv.c25 char *principal; local
34 fprintf(stderr, "Error reading principal!");
35 principal = buffer;
37 principal = argv[1];
40 syslog(LOG_DEBUG, "Principal is +%s+", principal);
43 switch (result = opiechallenge(&opie, principal, challenge)) {
/freebsd-10.0-release/crypto/heimdal/lib/krb5/
H A Dprincipal.c35 * @page krb5_principal_intro The principal handing functions.
37 * A Kerberos principal is a email address looking string that
39 * realm the principal belongs to and the former is a list of 0 or
67 * Frees a Kerberos principal allocated by the library with
69 * principal functions.
72 * @param p a principal to free.
90 * Set the type of the principal
93 * @param principal principal to set the type for
103 krb5_principal principal,
102 krb5_principal_set_type(krb5_context context, krb5_principal principal, int type) argument
121 krb5_principal_get_type(krb5_context context, krb5_const_principal principal) argument
139 krb5_principal_get_realm(krb5_context context, krb5_const_principal principal) argument
146 krb5_principal_get_comp_string(krb5_context context, krb5_const_principal principal, unsigned int component) argument
167 krb5_principal_get_num_comp(krb5_context context, krb5_const_principal principal) argument
187 krb5_parse_name_flags(krb5_context context, const char *name, int flags, krb5_principal *principal) argument
388 krb5_parse_name(krb5_context context, const char *name, krb5_principal *principal) argument
422 unparse_name_fixed(krb5_context context, krb5_const_principal principal, char *name, size_t len, int flags) argument
489 krb5_unparse_name_fixed(krb5_context context, krb5_const_principal principal, char *name, size_t len) argument
512 krb5_unparse_name_fixed_short(krb5_context context, krb5_const_principal principal, char *name, size_t len) argument
536 krb5_unparse_name_fixed_flags(krb5_context context, krb5_const_principal principal, int flags, char *name, size_t len) argument
546 unparse_name(krb5_context context, krb5_const_principal principal, char **name, int flags) argument
600 krb5_unparse_name(krb5_context context, krb5_const_principal principal, char **name) argument
621 krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal, int flags, char **name) argument
643 krb5_unparse_name_short(krb5_context context, krb5_const_principal principal, char **name) argument
664 krb5_principal_set_realm(krb5_context context, krb5_principal principal, krb5_const_realm realm) argument
696 krb5_build_principal(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, ...) argument
725 krb5_make_principal(krb5_context context, krb5_principal *principal, krb5_const_realm realm, ...) argument
801 build_principal(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, void (*func)(krb5_context, krb5_principal, va_list), va_list ap) argument
832 krb5_build_principal_va(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, va_list ap) argument
842 krb5_build_principal_va_ext(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, va_list ap) argument
853 krb5_build_principal_ext(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, ...) argument
[all...]
H A Dtest_kuserok.c53 "principal luser");
62 krb5_principal principal; local
89 ret = krb5_parse_name(context, argv[0], &principal);
93 ret = krb5_unparse_name(context, principal, &p);
97 ret = krb5_kuserok(context, principal, argv[1]);
H A Dverify_user.c38 krb5_principal principal,
72 ret = krb5_cc_initialize(context, id, principal);
84 * Verify user `principal' with `password'.
150 krb5_principal principal,
163 krb5_principal_get_realm(context, principal),
167 principal,
178 return verify_common (context, principal, OPT(ccache, NULL),
186 krb5_principal principal,
200 ret = krb5_principal_set_realm(context, principal, *r);
206 ret = verify_user_opt_int(context, principal, passwor
37 verify_common(krb5_context context, krb5_principal principal, krb5_ccache ccache, krb5_keytab keytab, krb5_boolean secure, const char *service, krb5_creds cred) argument
149 verify_user_opt_int(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *vopt) argument
185 krb5_verify_user_opt(krb5_context context, krb5_principal principal, const char *password, krb5_verify_opt *opt) argument
219 krb5_verify_user(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument
243 krb5_verify_user_lrealm(krb5_context context, krb5_principal principal, krb5_ccache ccache, const char *password, krb5_boolean secure, const char *service) argument
[all...]
H A Dkuserok.c39 /* see if principal is mentioned in the filename access file, return
46 krb5_principal principal,
97 *result = krb5_principal_compare (context, principal, tmp);
112 krb5_principal principal,
159 ret = check_one_file(context, filename, pwd, principal, result);
172 krb5_principal principal,
180 if(krb5_principal_get_comp_string(context, principal, 1) != NULL)
188 if(strcmp(krb5_principal_get_realm(context, principal),
191 if(strcmp(krb5_principal_get_comp_string(context, principal, 0),
203 * principal i
43 check_one_file(krb5_context context, const char *filename, struct passwd *pwd, krb5_principal principal, krb5_boolean *result) argument
109 check_directory(krb5_context context, const char *dirname, struct passwd *pwd, krb5_principal principal, krb5_boolean *result) argument
171 match_local_principals(krb5_context context, krb5_principal principal, const char *luser) argument
237 krb5_kuserok(krb5_context context, krb5_principal principal, const char *luser) argument
[all...]
H A Dasn1_glue.c49 krb5_principal *principal,
70 *principal = p;
48 _krb5_principalname2krb5_principal(krb5_context context, krb5_principal *principal, const PrincipalName from, const Realm realm) argument
/freebsd-10.0-release/crypto/heimdal/kuser/
H A Dkverify.c50 "[principal]");
63 krb5_principal principal = NULL; local
97 ret = krb5_parse_name(context, argv[0], &principal);
101 ret = krb5_get_default_principal(context, &principal);
109 principal,
/freebsd-10.0-release/lib/libpam/modules/pam_opie/
H A Dpam_opie.c66 char principal[OPIE_PRINCIPAL_MAX]; local
90 if (strlen(user) >= sizeof(principal))
92 strlcpy(principal, user, sizeof(principal));
105 if (opiechallenge(&opie, principal, challenge) != 0 &&
/freebsd-10.0-release/crypto/heimdal/lib/gssapi/krb5/
H A Dcopy_ccache.c97 &handle->principal);
108 handle->principal,
111 krb5_free_principal(context, handle->principal);
122 handle->principal,
125 krb5_free_principal(context, handle->principal);
147 if (keytab_principal && handle->principal == NULL) {
150 &handle->principal);
187 if (handle->principal)
188 krb5_free_principal(context, handle->principal);
H A Drelease_cred.c57 if (cred->principal != NULL)
58 krb5_free_principal(context, cred->principal);
/freebsd-10.0-release/crypto/heimdal/appl/ftp/ftpd/
H A Dklist.c71 krb5_principal principal)
78 ret = krb5_unparse_name (context, principal, &str);
126 krb5_principal principal; local
144 ret = krb5_cc_get_principal (context, ccache, &principal);
154 exit_status = print_tickets (context, ccache, principal);
162 krb5_free_principal (context, principal);
69 print_tickets(krb5_context context, krb5_ccache ccache, krb5_principal principal) argument

Completed in 130 milliseconds

123456