/freebsd-9.3-release/crypto/heimdal/lib/kadm5/ |
H A D | free.c | 60 kadm5_principal_ent_t princ) 63 if(princ->principal) 64 krb5_free_principal(context->context, princ->principal); 65 if(princ->mod_name) 66 krb5_free_principal(context->context, princ->mod_name); 67 kadm5_free_key_data(server_handle, &princ->n_key_data, princ->key_data); 68 while(princ->n_tl_data && princ->tl_data) { 70 tp = princ 59 kadm5_free_principal_ent(void *server_handle, kadm5_principal_ent_t princ) argument [all...] |
H A D | marshall.c | 107 kadm5_principal_ent_t princ, 113 krb5_store_principal(sp, princ->principal); 115 krb5_store_int32(sp, princ->princ_expire_time); 117 krb5_store_int32(sp, princ->pw_expiration); 119 krb5_store_int32(sp, princ->last_pwd_change); 121 krb5_store_int32(sp, princ->max_life); 123 krb5_store_int32(sp, princ->mod_name != NULL); 124 if(princ->mod_name) 125 krb5_store_principal(sp, princ->mod_name); 128 krb5_store_int32(sp, princ 106 store_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t mask) argument 167 kadm5_store_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ) argument 174 kadm5_store_principal_ent_mask(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t mask) argument 183 ret_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t mask) argument 285 kadm5_ret_principal_ent(krb5_storage *sp, kadm5_principal_ent_t princ) argument 292 kadm5_ret_principal_ent_mask(krb5_storage *sp, kadm5_principal_ent_t princ, uint32_t *mask) argument [all...] |
H A D | common_glue.c | 42 krb5_principal princ, 45 return __CALL(chpass_principal, (server_handle, princ, password)); 50 krb5_principal princ, 55 (server_handle, princ, n_key_data, key_data)); 60 kadm5_principal_ent_t princ, 64 return __CALL(create_principal, (server_handle, princ, mask, password)); 69 krb5_principal princ) 71 return __CALL(delete_principal, (server_handle, princ)); 88 krb5_principal princ, 92 return __CALL(get_principal, (server_handle, princ, ou 41 kadm5_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument 49 kadm5_chpass_principal_with_key(void *server_handle, krb5_principal princ, int n_key_data, krb5_key_data *key_data) argument 59 kadm5_create_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, const char *password) argument 68 kadm5_delete_principal(void *server_handle, krb5_principal princ) argument 87 kadm5_get_principal(void *server_handle, krb5_principal princ, kadm5_principal_ent_t out, uint32_t mask) argument 96 kadm5_modify_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask) argument 104 kadm5_randkey_principal(void *server_handle, krb5_principal princ, krb5_keyblock **new_keys, int *n_keys) argument [all...] |
H A D | get_princs_s.c | 46 add_princ(struct foreach_data *d, char *princ) argument 53 d->princs[d->count++] = princ; 61 char *princ; local 63 ret = krb5_unparse_name(context, ent->entry.principal, &princ); 67 if(fnmatch(d->exp, princ, 0) == 0 || fnmatch(d->exp2, princ, 0) == 0) 68 ret = add_princ(d, princ); 70 free(princ); 72 ret = add_princ(d, princ); 75 free(princ); [all...] |
H A D | modify_s.c | 40 kadm5_principal_ent_t princ, 49 if((mask & KADM5_POLICY) && strcmp(princ->policy, "default")) 57 princ->principal, HDB_F_GET_ANY, &ent); 60 ret = _kadm5_setup_entry(context, &ent, mask, princ, mask, NULL, 0); 90 kadm5_principal_ent_t princ, 93 return modify_principal(server_handle, princ, mask, 39 modify_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask, uint32_t forbidden_mask) argument 89 kadm5_s_modify_principal(void *server_handle, kadm5_principal_ent_t princ, uint32_t mask) argument
|
H A D | delete_s.c | 39 kadm5_s_delete_principal(void *server_handle, krb5_principal princ) argument 51 ret = context->db->hdb_fetch(context->context, context->db, princ, 64 ret = context->db->hdb_remove(context->context, context->db, princ); 68 kadm5_log_delete (context, princ);
|
H A D | acl.c | 72 * retrieve the right for the current caller on `princ' (NULL means all) 79 krb5_const_principal princ, 123 if (princ != NULL) { 131 princ, pattern_princ); 151 krb5_principal princ; local 154 ret = krb5_parse_name(context->context, KADM5_ADMIN_SERVICE, &princ); 157 ret = krb5_principal_compare(context->context, context->caller, princ); 158 krb5_free_principal(context->context, princ); 197 * `op' on `princ' and otherwise an error 198 * princ 78 fetch_acl(kadm5_server_context *context, krb5_const_principal princ, unsigned *ret_flags) argument 202 _kadm5_acl_check_permission(kadm5_server_context *context, unsigned op, krb5_const_principal princ) argument [all...] |
H A D | ent_setup.c | 115 * Create the hdb entry `ent' based on data from `princ' with 124 kadm5_principal_ent_t princ, 131 if (princ->princ_expire_time) 132 set_value(ent->entry.valid_end, princ->princ_expire_time); 138 if (princ->pw_expiration) 139 set_value(ent->entry.pw_end, princ->pw_expiration); 145 attr_to_flags(princ->attributes, &ent->entry.flags); 160 if(princ->max_life) 161 set_value(ent->entry.max_life, princ->max_life); 173 ent->entry.kvno = princ 121 _kadm5_setup_entry(kadm5_server_context *context, hdb_entry_ex *ent, uint32_t mask, kadm5_principal_ent_t princ, uint32_t princ_mask, kadm5_principal_ent_t def, uint32_t def_mask) argument [all...] |
H A D | chpass_s.c | 40 krb5_principal princ, 55 ret = context->db->hdb_fetch(context->context, context->db, princ, 116 * change the password of `princ' to `password' if it's not already that. 121 krb5_principal princ, 124 return change (server_handle, princ, password, 1); 128 * change the password of `princ' to `password' 133 krb5_principal princ, 136 return change (server_handle, princ, password, 0); 140 * change keys for `princ' to `keys' 145 krb5_principal princ, 39 change(void *server_handle, krb5_principal princ, const char *password, int cond) argument 120 kadm5_s_chpass_principal_cond(void *server_handle, krb5_principal princ, const char *password) argument 132 kadm5_s_chpass_principal(void *server_handle, krb5_principal princ, const char *password) argument 144 kadm5_s_chpass_principal_with_key(void *server_handle, krb5_principal princ, int n_key_data, krb5_key_data *key_data) argument [all...] |
H A D | delete_c.c | 39 kadm5_c_delete_principal(void *server_handle, krb5_principal princ) argument 58 krb5_store_principal(sp, princ);
|
/freebsd-9.3-release/crypto/heimdal/kadmin/ |
H A D | del_enctype.c | 46 kadm5_principal_ent_rec princ; local 55 memset (&princ, 0, sizeof(princ)); 78 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 86 new_key_data = malloc(princ.n_key_data * sizeof(*new_key_data)); 92 for (i = 0, j = 0; i < princ.n_key_data; ++i) { 93 krb5_key_data *key = &princ.key_data[i]; 110 free (princ.key_data); 111 princ.n_key_data = j; 112 princ [all...] |
H A D | ext.c | 47 kadm5_principal_ent_rec princ; local 53 ret = kadm5_get_principal(kadm_handle, principal, &princ, 58 if (princ.n_key_data) { 59 keys = malloc(sizeof(*keys) * princ.n_key_data); 61 kadm5_free_principal_ent(kadm_handle, &princ); 65 for (i = 0; i < princ.n_key_data; i++) { 66 krb5_key_data *kd = &princ.key_data[i]; 68 keys[i].principal = princ.principal; 76 n_k = princ.n_key_data; 80 kadm5_free_principal_ent(kadm_handle, &princ); [all...] |
H A D | init.c | 41 create_random_entry(krb5_principal princ, argument 58 ret = krb5_unparse_name(context, princ, &name); 65 ent.principal = princ; 87 ret = kadm5_randkey_principal(kadm_handle, princ, &keys, &n_keys); 96 ret = kadm5_get_principal(kadm_handle, princ, &ent, 157 krb5_principal princ; local 161 ret = krb5_make_principal(context, &princ, realm, 168 krb5_free_principal(context, princ); 176 krb5_free_principal(context, princ); 180 create_random_entry(princ, max_lif [all...] |
H A D | mod.c | 40 add_tl(kadm5_principal_ent_rec *princ, int type, krb5_data *data) argument 50 princ->n_tl_data++; 51 ptl = &princ->tl_data; 61 kadm5_principal_ent_rec *princ, 100 add_tl(princ, KRB5_TL_EXTENSION, &buf); 104 add_aliases(krb5_context context, kadm5_principal_ent_rec *princ, argument 143 add_tl(princ, KRB5_TL_EXTENSION, &buf); 147 add_pkinit_acl(krb5_context context, kadm5_principal_ent_rec *princ, argument 183 add_tl(princ, KRB5_TL_EXTENSION, &buf); 190 kadm5_principal_ent_rec princ; local 60 add_constrained_delegation(krb5_context context, kadm5_principal_ent_rec *princ, struct getarg_strings *strings) argument [all...] |
H A D | add_enctype.c | 46 kadm5_principal_ent_rec princ; local 60 memset (&princ, 0, sizeof(princ)); 83 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 91 new_key_data = malloc((princ.n_key_data + n_etypes) 98 for (i = 0; i < princ.n_key_data; ++i) { 99 krb5_key_data *key = &princ.key_data[i]; 112 int n = princ.n_key_data + i; 150 free (princ.key_data); 151 princ [all...] |
H A D | ank.c | 40 * fetch the default principal corresponding to `princ' 45 krb5_principal princ, 50 krb5_realm *realm = krb5_princ_realm(context->context, princ); 81 kadm5_principal_ent_rec princ, defrec; local 88 memset(&princ, 0, sizeof(princ)); 94 princ.principal = princ_ent; 97 ret = set_entry(context, &princ, &mask, 114 set_defaults(&princ, &mask, default_ent, default_mask); 116 if(edit_entry(&princ, 44 get_default(kadm5_server_context *context, krb5_principal princ, kadm5_principal_ent_t default_ent) argument [all...] |
H A D | get.c | 162 format_field(kadm5_principal_ent_t princ, unsigned int field, argument 168 krb5_unparse_name_fixed_short(context, princ->principal, buf, buf_len); 170 krb5_unparse_name_fixed(context, princ->principal, buf, buf_len); 174 time_t2str(princ->princ_expire_time, buf, buf_len, !condensed); 178 time_t2str(princ->pw_expiration, buf, buf_len, !condensed); 182 time_t2str(princ->last_pwd_change, buf, buf_len, !condensed); 186 deltat2str(princ->max_life, buf, buf_len); 190 deltat2str(princ->max_renewable_life, buf, buf_len); 194 time_t2str(princ->mod_date, buf, buf_len, !condensed); 198 if (princ 334 print_entry_short(struct get_entry_data *data, kadm5_principal_ent_t princ) argument 346 print_entry_long(struct get_entry_data *data, kadm5_principal_ent_t princ) argument 367 kadm5_principal_ent_rec princ; local [all...] |
H A D | server.c | 48 krb5_principal princ, princ2; local 66 ret = krb5_ret_principal(sp, &princ); 71 krb5_free_principal(context->context, princ); 74 krb5_unparse_name_fixed(context->context, princ, name, sizeof(name)); 76 ret = _kadm5_acl_check_permission(context, KADM5_PRIV_GET, princ); 78 krb5_free_principal(context->context, princ); 81 ret = kadm5_get_principal(kadm_handle, princ, &ent, mask); 89 krb5_free_principal(context->context, princ); 94 ret = krb5_ret_principal(sp, &princ); 97 krb5_unparse_name_fixed(context->context, princ, nam [all...] |
H A D | check.c | 69 kadm5_principal_ent_rec princ; local 77 memset (&princ, 0, sizeof(princ)); 78 ret = kadm5_get_principal(kadm_handle, principal, &princ, 86 for (i = 0; i < princ.n_key_data; i++) { 89 princ.key_data[i].key_data_type[0], 91 if (ret == 0 && keysize != princ.key_data[i].key_data_length[0]) { 94 name, princ.key_data[i].key_data_type[0], 95 (unsigned long)princ.key_data[i].key_data_length); 100 kadm5_free_principal_ent(kadm_handle, &princ); [all...] |
/freebsd-9.3-release/crypto/heimdal/lib/krb5/ |
H A D | get_default_principal.c | 61 krb5_principal *princ) 67 *princ = NULL; 75 ret = krb5_make_principal(context, princ, NULL, user, "root", NULL); 77 ret = krb5_make_principal(context, princ, NULL, "root", NULL); 92 ret = krb5_make_principal(context, princ, NULL, user, NULL); 99 krb5_principal *princ) 104 *princ = NULL; 108 ret = krb5_cc_get_principal (context, id, princ); 114 return _krb5_get_default_principal_local(context, princ); 60 _krb5_get_default_principal_local(krb5_context context, krb5_principal *princ) argument 98 krb5_get_default_principal(krb5_context context, krb5_principal *princ) argument
|
H A D | parse-name-test.c | 83 krb5_principal princ; local 88 ret = krb5_parse_name(context, t->input_string, &princ); 92 if (strcmp (t->realm, princ->realm) != 0) { 95 princ->realm, t->realm, 100 if (t->ncomponents != princ->name.name_string.len) { 103 princ->name.name_string.len, t->ncomponents, 109 princ->name.name_string.val[i]) != 0) { 113 princ->name.name_string.val[i], 121 ret = krb5_unparse_name_fixed(context, princ, 130 ret = krb5_unparse_name_fixed(context, princ, [all...] |
H A D | name-45-test.c | 166 krb5_principal princ; local 200 &princ); 211 krb5_unparse_name(context, princ, &s); 228 if (strcmp (t->v5_realm, princ->realm) != 0) { 231 princ->realm, t->v5_realm, 238 if (t->ncomponents != princ->name.name_string.len) { 241 princ->name.name_string.len, t->ncomponents, 249 princ->name.name_string.val[i]) != 0) { 253 princ->name.name_string.val[i], 262 ret = krb5_524_conv_principal (context, princ, [all...] |
H A D | test_princ.c | 46 const char *princ = "lha@SU.SE"; local 56 ret = krb5_parse_name(context, princ, &p); 64 if (strcmp(princ, princ_unparsed)) { 65 krb5_errx(context, 1, "%s != %s", princ, princ_unparsed); 121 if (strcmp(princ, princ_unparsed)) 122 krb5_errx(context, 1, "'%s' != '%s'", princ, princ_unparsed); 143 if (strcmp(princ, princ_unparsed) == 0) 144 krb5_errx(context, 1, "%s == %s", princ, princ_unparsed); 149 ret = krb5_parse_name(context, princ, &p2); 160 if (strcmp(princ, princ_unparse [all...] |
/freebsd-9.3-release/crypto/openssh/ |
H A D | gss-serv-krb5.c | 87 krb5_principal princ; local 95 &princ))) { 101 if (krb5_kuserok(krb_context, princ, name)) { 108 krb5_free_principal(krb_context, princ); 121 krb5_principal princ; local 158 client->exportedname.value, &princ))) { 165 if ((problem = krb5_cc_initialize(krb_context, ccache, princ))) { 169 krb5_free_principal(krb_context, princ); 174 krb5_free_principal(krb_context, princ);
|
/freebsd-9.3-release/crypto/heimdal/admin/ |
H A D | get.c | 125 kadm5_principal_ent_rec princ; local 138 memset(&princ, 0, sizeof(princ)); 139 princ.principal = princ_ent; 141 princ.attributes |= KRB5_KDB_DISALLOW_ALL_TIX; 143 princ.princ_expire_time = 0; 160 ret = kadm5_create_principal(kadm_handle, &princ, mask, "x"); 177 ret = kadm5_get_principal(kadm_handle, princ_ent, &princ, 187 if(!created && (princ.attributes & KRB5_KDB_DISALLOW_ALL_TIX)) 189 princ [all...] |