/freebsd-current/crypto/openssh/ |
H A D | sshsig.c | 735 char *opts = NULL, *tmp, *cp, *principals = NULL; local 759 if ((principals = strdup(tmp)) == NULL) { 770 principals, 0) != 1) { 813 *principalsp = principals; 814 principals = NULL; /* transferred */ 826 free(principals); 836 char *cp, *oprincipals, *principals; local 842 oprincipals = principals = *principalsp; 850 while ((cp = strsep(&principals, ",")) != NULL && *cp != '\0') { 860 if (match_pattern(cert->cert->principals[ 894 char *principals = NULL; local 1025 sshsig_find_principals(const char *path, const struct sshkey *sign_key, uint64_t verify_time, char **principals) argument 1077 char *found, *line = NULL, **principals = NULL, **tmp; local [all...] |
H A D | auth2-pubkeyfile.c | 63 * Check keys/principals file expiry time. 75 debug("%s: principals on non-CA key", loc); 76 auth_debug_add("%s: principals on non-CA key", loc); 155 if ((result = match_list(cert->principals[i], 201 debug("%s: bad principals options: %s", loc, reason); 202 auth_debug_add("%s: bad principals options: %s", loc, reason); 205 /* Check principals in cert against those on line */ 207 if (strcmp(cp, cert->principals[i]) != 0) 210 loc, cert->principals[i]); 358 * If the user has specified a list of principals a [all...] |
H A D | sshkey.c | 581 free(cert->principals[i]); 582 free(cert->principals); 602 cert->principals = NULL; 1467 if ((to->principals = calloc(from->nprincipals, 1468 sizeof(*to->principals))) == NULL) { 1473 to->principals[i] = strdup(from->principals[i]); 1474 if (to->principals[i] == NULL) { 1764 struct sshbuf *principals = NULL, *crit = NULL; local 1778 (ret = sshbuf_froms(b, &principals)) ! 2178 struct sshbuf *principals = NULL; local [all...] |
H A D | sshkey.h | 116 char **principals; member in struct:sshkey_cert
|
H A D | ssh-keygen.c | 1836 /* Split list of principals */ 1849 fatal("Too many certificate principals specified"); 1865 public->cert->principals = plist; 2154 key->cert->principals[i]); 2898 char *principals = NULL, *cp, *tmp; local 2917 verify_time, &principals)) != 0) { 2925 /* Emit matching principals one per line */ 2926 tmp = principals; 2935 free(principals); 2944 char **principals local [all...] |
H A D | sshconnect.c | 1474 host_key->cert->principals[i]);
|
/freebsd-current/crypto/openssh/regress/unittests/sshkey/ |
H A D | test_sshkey.c | 61 struct sshbuf *ca_buf, *pk, *principals, *critopts, *exts; local 78 principals = sshbuf_new(); 79 ASSERT_PTR_NE(principals, NULL); 80 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gsamsa"), 0); 81 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gregor"), 0); 98 ASSERT_INT_EQ(sshbuf_put_stringb(b, principals), 0); /* principals */ 113 sshbuf_free(principals); 424 k1->cert->principals = calloc(4, sizeof(*k1->cert->principals)); [all...] |
/freebsd-current/crypto/openssh/regress/ |
H A D | sshsig.sh | 178 trace "$tid: key type $t find-principals with valid lifespan" 179 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \ 182 fail "failed find-principals for $t key with valid expiry interval" 184 trace "$tid: key type $t find principals with not-yet-valid lifespan" 185 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \ 188 fail "failed find-principals for $t not-yet-valid key" 190 trace "$tid: key type $t find-principals with expired lifespan" 191 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \ 194 fail "failed find-principals for $t with expired key" 196 trace "$tid: key type $t find-principals wit [all...] |
H A D | Makefile | 97 principals-command \
|
/freebsd-current/crypto/heimdal/appl/gssmask/ |
H A D | gssmaestro.c | 721 static getarg_strings principals; variable 725 { "principals", 0, arg_strings, &principals, "Test principal", 775 if (principals.num_strings == 0) 776 errx(1, "no principals"); 778 user = estrdup(principals.strings[0]); 785 errx(1, "no principals");
|
/freebsd-current/crypto/heimdal/kdc/ |
H A D | krb5tgs.c | 109 krb5_principals principals, 118 if (server && principals) { 119 ret = add_Principals(principals, server); 129 spd.delegated = principals; 156 sp.delegated = principals; 520 * of the principals here, while "target" is the principal 103 _kdc_add_KRB5SignedPath(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *krbtgt, krb5_enctype enctype, krb5_principal client, krb5_const_principal server, krb5_principals principals, EncTicketPart *tkt) argument
|
/freebsd-current/crypto/heimdal/lib/kadm5/ |
H A D | ad.c | 1020 char ***principals, 1018 kadm5_ad_get_principals(void *server_handle, const char *expression, char ***principals, int *count) argument
|