/freebsd-11-stable/crypto/heimdal/lib/krb5/ |
H A D | appdefault.c | 38 krb5_const_realm realm, const char *option, 47 if(realm != NULL) 49 "realms", realm, option, NULL); 55 if(realm != NULL) 58 realm, 67 if(realm != NULL) 71 realm, 80 krb5_const_realm realm, const char *option, 88 if(realm != NULL) 90 "realms", realm, optio 37 krb5_appdefault_boolean(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, krb5_boolean def_val, krb5_boolean *ret_val) argument 79 krb5_appdefault_string(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, const char *def_val, char **ret_val) argument 123 krb5_appdefault_time(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, time_t def_val, time_t *ret_val) argument [all...] |
H A D | asn1_glue.c | 51 const Realm realm) 64 p->realm = strdup(realm); 65 if (p->realm == NULL) { 48 _krb5_principalname2krb5_principal(krb5_context context, krb5_principal *principal, const PrincipalName from, const Realm realm) argument
|
H A D | set_default_realm.c | 63 * Set the knowledge of the default realm(s) in `context'. 64 * If realm != NULL, that's the new default realm. 65 * Otherwise, the realm(s) are figured out from configuration or DNS. 70 const char *realm) 75 if (realm == NULL) { 83 ret = string_to_list (context, realm, &realms); 69 krb5_set_default_realm(krb5_context context, const char *realm) argument
|
H A D | test_alname.c | 38 test_alname(krb5_context context, krb5_const_realm realm, argument 47 ret = krb5_make_principal(context, &p, realm, user, inst, NULL); 102 krb5_realm realm; local 131 ret = krb5_get_default_realm(context, &realm); 135 test_alname(context, realm, user, NULL, user, 1); 136 test_alname(context, realm, user, "root", "root", 1); 141 test_alname(context, realm, user, NULL, 143 test_alname(context, realm, user, "root",
|
H A D | transited.c | 42 char *realm; member in struct:tr_realm 56 free(p->realm); 91 tmp->realm = strdup(p); 92 if(tmp->realm == NULL){ 112 tmp->realm = malloc(p - from + 1); 113 if(tmp->realm == NULL){ 118 memcpy(tmp->realm, from, p - from); 119 tmp->realm[p - from] = '\0'; 143 if(r->realm[0] == '\0'){ 144 while(r->next && r->next->realm[ 206 make_realm(char *realm) argument [all...] |
H A D | mk_error.c | 75 msg.realm = server->realm; 78 static char unspec[] = "<unspecified realm>"; 79 msg.realm = unspec; 82 msg.crealm = &client->realm;
|
H A D | get_default_realm.c | 57 * Return the first default realm. For compatibility. 62 krb5_realm *realm) 81 *realm = res; 61 krb5_get_default_realm(krb5_context context, krb5_realm *realm) argument
|
H A D | init_creds.c | 105 const char *realm, 113 realm, 130 const char *realm, 136 "realms", realm, name, NULL); 148 * application `appname' (default to getprogname() if NULL), and realm 149 * `realm'. First looks in [appdefaults] but falls back to 156 krb5_const_realm realm, 163 realm, "forwardable"); 164 krb5_appdefault_boolean(context, appname, realm, "forwardable", b, &b); 167 b = get_config_bool (context, FALSE, realm, "proxiabl 104 get_config_time(krb5_context context, const char *realm, const char *name, int def) argument 128 get_config_bool(krb5_context context, krb5_boolean def_value, const char *realm, const char *name) argument 154 krb5_get_init_creds_opt_set_default_flags(krb5_context context, const char *appname, krb5_const_realm realm, krb5_get_init_creds_opt *opt) argument [all...] |
H A D | krbhst.c | 52 * `proto', `proto', `realm' using `dns_type'. 58 const char *realm, const char *dns_type, 86 snprintf(domain, sizeof(domain), "_%s._%s.%s.", service, proto, realm); 144 char *realm; member in struct:krb5_krbhst_data 189 return handle->realm; 441 ret = srv_find_realm(context, &res, &count, kd->realm, "SRV", proto, service, 443 _krb5_debug(context, 2, "searching DNS for realm %s %s.%s -> %d", 444 kd->realm, proto, service, ret); 464 "realms", kd->realm, conf_string, NULL); 466 _krb5_debug(context, 2, "configuration file for realm 57 srv_find_realm(krb5_context context, krb5_krbhst_info ***res, int *count, const char *realm, const char *dns_type, const char *proto, const char *service, int port) argument 866 common_init(krb5_context context, const char *service, const char *realm, int flags) argument 899 krb5_krbhst_init(krb5_context context, const char *realm, unsigned int type, krb5_krbhst_handle *handle) argument 908 krb5_krbhst_init_flags(krb5_context context, const char *realm, unsigned int type, int flags, krb5_krbhst_handle *handle) argument 1017 gethostlist(krb5_context context, const char *realm, unsigned int type, char ***hostlist) argument 1063 krb5_get_krb_admin_hst(krb5_context context, const krb5_realm *realm, char ***hostlist) argument 1075 krb5_get_krb_changepw_hst(krb5_context context, const krb5_realm *realm, char ***hostlist) argument 1087 krb5_get_krb524hst(krb5_context context, const krb5_realm *realm, char ***hostlist) argument 1100 krb5_get_krbhst(krb5_context context, const krb5_realm *realm, char ***hostlist) argument [all...] |
H A D | build_ap_req.c | 56 copy_Realm(&cred->server->realm, &ap.ticket.realm);
|
H A D | principal.c | 39 * realm the principal belongs to and the former is a list of 0 or 64 #define princ_realm(P) ((P)->realm) 128 * Get the realm of the principal 131 * @param principal principal to get the realm for 133 * @return realm of the principal, don't free or use after krb5_principal is freed 194 heim_general_string realm = NULL; local 214 N_("Can't require both realm and " 215 "no realm at the same time", "")); 279 N_("part after realm in principal name", "")); 301 N_("part after realm i 664 krb5_principal_set_realm(krb5_context context, krb5_principal principal, krb5_const_realm realm) argument 696 krb5_build_principal(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, ...) argument 725 krb5_make_principal(krb5_context context, krb5_principal *principal, krb5_const_realm realm, ...) argument 801 build_principal(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, void (*func)(krb5_context, krb5_principal, va_list), va_list ap) argument 832 krb5_build_principal_va(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, va_list ap) argument 842 krb5_build_principal_va_ext(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, va_list ap) argument 853 krb5_build_principal_ext(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, ...) argument [all...] |
H A D | test_plugin.c | 52 const char *realm, 69 if (strcmp(realm, "NOTHERE.H5L.SE") == 0) 50 resolve_lookup(void *ctx, enum locate_service_type service, const char *realm, int domain, int type, int (*add)(void *,int,struct sockaddr *), void *addctx) argument
|
H A D | parse-name-test.c | 41 krb5_realm realm; member in struct:testcase 76 /* to enable realm-less principal name above */ 90 if (strcmp (t->realm, princ->realm) != 0) { 91 printf ("wrong realm (\"%s\" should be \"%s\")" 93 princ->realm, t->realm,
|
/freebsd-11-stable/crypto/heimdal/kadmin/ |
H A D | check.c | 108 char *realm = NULL, *p, *p2; local 112 ret = krb5_get_default_realm(context, &realm); 118 realm = strdup(argv[0]); 119 if (realm == NULL) { 131 if (asprintf(&p, "%s/%s@%s", KRB5_TGS_NAME, realm, realm) == -1) { 138 printf("%s doesn't exist, are you sure %s is a realm in your database", 139 p, realm); 151 if (asprintf(&p, "kadmin/admin@%s", realm) == -1) { 171 if (asprintf(&p, "kadmin/changepw@%s", realm) [all...] |
H A D | kadmin.c | 44 static char *realm; variable 67 "realm", 'r', arg_string, &realm, 68 "realm to use", "realm" 187 if(realm) { 188 krb5_set_default_realm(context, realm); /* XXX should be fixed 190 conf.realm = realm;
|
H A D | init.c | 158 const char *realm = argv[i]; local 175 ret = krb5_make_principal(context, &princ, realm, 176 KRB5_TGS_NAME, realm, NULL); 187 krb5_make_principal(context, &princ, realm, 205 krb5_make_principal(context, &princ, realm, 211 krb5_make_principal(context, &princ, realm, 220 krb5_make_principal(context, &princ, realm, 228 krb5_make_principal(context, &princ, realm, 242 krb5_make_principal(context, &ent.principal, realm,
|
/freebsd-11-stable/crypto/heimdal/lib/kafs/ |
H A D | kafs.h | 110 int krb_afslog (const char *cell, const char *realm); 111 int krb_afslog_uid (const char *cell, const char *realm, uid_t uid); 112 int krb_afslog_home (const char *cell, const char *realm, 114 int krb_afslog_uid_home (const char *cell, const char *realm, uid_t uid, 117 int krb_realm_of_cell (const char *cell, char **realm); 157 krb5_const_realm realm, 162 krb5_const_realm realm); 166 krb5_const_realm realm, 173 krb5_const_realm realm, 176 krb5_error_code krb5_realm_of_cell (const char *cell, char **realm); [all...] |
H A D | common.c | 265 const char *cell, char **realm, int exact) 303 *realm = (*data->get_realm)(data, p); 304 if (*realm && **realm != '\0') 314 /* Find the realm associated with cell. Do this by opening CellServDB 315 file and getting the realm-of-host for the first VL-server for the 318 This does not work when the VL-server is living in one realm, but 319 the cell it is serving is living in another realm. 326 const char *cell, char **realm) 331 ret = file_find_cell(data, cell, realm, 264 file_find_cell(struct kafs_data *data, const char *cell, char **realm, int exact) argument 325 _kafs_realm_of_cell(struct kafs_data *data, const char *cell, char **realm) argument 343 _kafs_try_get_cred(struct kafs_data *data, const char *user, const char *cell, const char *realm, uid_t uid, struct kafs_token *kt) argument 366 _kafs_get_cred(struct kafs_data *data, const char *cell, const char *realm_hint, const char *realm, uid_t uid, struct kafs_token *kt) argument [all...] |
H A D | afskrb5.c | 39 krb5_const_realm realm; member in struct:krb5_kafs_data 147 const char *realm, uid_t uid, struct kafs_token *kt) 157 realm, name, inst, NULL); 188 (inst != NULL && inst[0] != '\0') ? inst : realm, kt); 215 const char *trealm; /* ticket realm */ 228 ret = _kafs_get_cred(data, cell, d->realm, trealm, uid, &kt); 255 krb5_const_realm realm, 282 d.realm = realm; 296 krb5_const_realm realm, 146 get_cred(struct kafs_data *data, const char *name, const char *inst, const char *realm, uid_t uid, struct kafs_token *kt) argument 252 krb5_afslog_uid_home(krb5_context context, krb5_ccache id, const char *cell, krb5_const_realm realm, uid_t uid, const char *homedir) argument 293 krb5_afslog_uid(krb5_context context, krb5_ccache id, const char *cell, krb5_const_realm realm, uid_t uid) argument 303 krb5_afslog(krb5_context context, krb5_ccache id, const char *cell, krb5_const_realm realm) argument 312 krb5_afslog_home(krb5_context context, krb5_ccache id, const char *cell, krb5_const_realm realm, const char *homedir) argument 326 krb5_realm_of_cell(const char *cell, char **realm) argument [all...] |
/freebsd-11-stable/crypto/heimdal/kcm/ |
H A D | renew.c | 45 krb5_const_realm realm; local 74 realm = krb5_principal_get_realm(context, in.client); 75 ret = krb5_make_principal(context, &in.server, realm, 76 KRB5_TGS_NAME, realm, NULL); 78 kcm_log(0, "Failed to make TGS principal for realm %s: %s", 79 realm, krb5_get_err_text(context, ret));
|
/freebsd-11-stable/crypto/heimdal/kdc/ |
H A D | announce.c | 49 char *realm; member in struct:entry 158 domain_add(const char *domain, const char *realm, int flag) argument 163 if (strcmp(domain, e->domain) == 0 && strcmp(realm, e->realm) == 0) { 169 LOG("Adding realm %s to domain %s", realm, domain); 175 e->realm = strdup(realm); 176 if (e->domain == NULL || e->realm == NULL) { 178 free(e->realm); 189 const char *realm; member in struct:addctx 232 register_srv(const char *realm, const char *hostname, int port) argument 400 update_entries(SCDynamicStoreRef store, const char *realm, int flags) argument [all...] |
/freebsd-11-stable/crypto/heimdal/lib/kadm5/ |
H A D | destroy_c.c | 43 free(context->realm);
|
H A D | context_s.c | 85 if (ctx->config.realm) { 95 /* match default (realm-less) */ 96 if(p != NULL && strcmp(ctx->config.realm, p) != 0) 153 (*ctx)->config.realm = strdup(params->realm); 155 krb5_get_default_realm(context, &(*ctx)->config.realm);
|
/freebsd-11-stable/crypto/heimdal/tools/ |
H A D | kdc-log-analyze.pl | 299 print "Cross realm statistics\n\n"; 301 print "\tNumber of cross-realm tgs out: $tgs_xrealm_out\n"; 303 print "\tTop ten realms used for out cross-realm:\n"; 305 print "\tTop ten principals use out cross-realm:\n"; 308 print "\tNumber of cross-realm tgs in: $tgs_xrealm_in\n"; 310 print "\tTop ten realms used for in cross-realm:\n"; 312 print "\tTop ten principals use in cross-realm:\n"; 322 print "\tTop ten to realm referrals:\n"; 433 } elsif (/returning a referral to realm (.*) for server (.*) that was not found/) { 437 } elsif (/krb4 Cross-realm ( [all...] |
/freebsd-11-stable/crypto/heimdal/admin/ |
H A D | change.c | 41 const char *realm, const char *admin_server, int server_port) 59 if(realm == NULL) 60 realm = krb5_principal_get_realm(context, principal); 61 conf.realm = strdup(realm); 62 if (conf.realm == NULL) { 73 free(conf.realm); 92 free(conf.realm); 39 change_entry(krb5_keytab keytab, krb5_principal principal, krb5_kvno kvno, const char *realm, const char *admin_server, int server_port) argument
|