Searched refs:principals (Results 1 - 12 of 12) sorted by relevance

/freebsd-current/crypto/openssh/
H A Dsshsig.c735 char *opts = NULL, *tmp, *cp, *principals = NULL; local
759 if ((principals = strdup(tmp)) == NULL) {
770 principals, 0) != 1) {
813 *principalsp = principals;
814 principals = NULL; /* transferred */
826 free(principals);
836 char *cp, *oprincipals, *principals; local
842 oprincipals = principals = *principalsp;
850 while ((cp = strsep(&principals, ",")) != NULL && *cp != '\0') {
860 if (match_pattern(cert->cert->principals[
894 char *principals = NULL; local
1025 sshsig_find_principals(const char *path, const struct sshkey *sign_key, uint64_t verify_time, char **principals) argument
1077 char *found, *line = NULL, **principals = NULL, **tmp; local
[all...]
H A Dauth2-pubkeyfile.c63 * Check keys/principals file expiry time.
75 debug("%s: principals on non-CA key", loc);
76 auth_debug_add("%s: principals on non-CA key", loc);
155 if ((result = match_list(cert->principals[i],
201 debug("%s: bad principals options: %s", loc, reason);
202 auth_debug_add("%s: bad principals options: %s", loc, reason);
205 /* Check principals in cert against those on line */
207 if (strcmp(cp, cert->principals[i]) != 0)
210 loc, cert->principals[i]);
358 * If the user has specified a list of principals a
[all...]
H A Dsshkey.c581 free(cert->principals[i]);
582 free(cert->principals);
602 cert->principals = NULL;
1467 if ((to->principals = calloc(from->nprincipals,
1468 sizeof(*to->principals))) == NULL) {
1473 to->principals[i] = strdup(from->principals[i]);
1474 if (to->principals[i] == NULL) {
1764 struct sshbuf *principals = NULL, *crit = NULL; local
1778 (ret = sshbuf_froms(b, &principals)) !
2178 struct sshbuf *principals = NULL; local
[all...]
H A Dsshkey.h116 char **principals; member in struct:sshkey_cert
H A Dssh-keygen.c1836 /* Split list of principals */
1849 fatal("Too many certificate principals specified");
1865 public->cert->principals = plist;
2154 key->cert->principals[i]);
2898 char *principals = NULL, *cp, *tmp; local
2917 verify_time, &principals)) != 0) {
2925 /* Emit matching principals one per line */
2926 tmp = principals;
2935 free(principals);
2944 char **principals local
[all...]
H A Dsshconnect.c1474 host_key->cert->principals[i]);
/freebsd-current/crypto/openssh/regress/unittests/sshkey/
H A Dtest_sshkey.c61 struct sshbuf *ca_buf, *pk, *principals, *critopts, *exts; local
78 principals = sshbuf_new();
79 ASSERT_PTR_NE(principals, NULL);
80 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gsamsa"), 0);
81 ASSERT_INT_EQ(sshbuf_put_cstring(principals, "gregor"), 0);
98 ASSERT_INT_EQ(sshbuf_put_stringb(b, principals), 0); /* principals */
113 sshbuf_free(principals);
424 k1->cert->principals = calloc(4, sizeof(*k1->cert->principals));
[all...]
/freebsd-current/crypto/openssh/regress/
H A Dsshsig.sh178 trace "$tid: key type $t find-principals with valid lifespan"
179 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
182 fail "failed find-principals for $t key with valid expiry interval"
184 trace "$tid: key type $t find principals with not-yet-valid lifespan"
185 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
188 fail "failed find-principals for $t not-yet-valid key"
190 trace "$tid: key type $t find-principals with expired lifespan"
191 ${SSHKEYGEN} -vvv -Y find-principals -s $sigfile \
194 fail "failed find-principals for $t with expired key"
196 trace "$tid: key type $t find-principals wit
[all...]
H A DMakefile97 principals-command \
/freebsd-current/crypto/heimdal/appl/gssmask/
H A Dgssmaestro.c721 static getarg_strings principals; variable
725 { "principals", 0, arg_strings, &principals, "Test principal",
775 if (principals.num_strings == 0)
776 errx(1, "no principals");
778 user = estrdup(principals.strings[0]);
785 errx(1, "no principals");
/freebsd-current/crypto/heimdal/kdc/
H A Dkrb5tgs.c109 krb5_principals principals,
118 if (server && principals) {
119 ret = add_Principals(principals, server);
129 spd.delegated = principals;
156 sp.delegated = principals;
520 * of the principals here, while "target" is the principal
103 _kdc_add_KRB5SignedPath(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *krbtgt, krb5_enctype enctype, krb5_principal client, krb5_const_principal server, krb5_principals principals, EncTicketPart *tkt) argument
/freebsd-current/crypto/heimdal/lib/kadm5/
H A Dad.c1020 char ***principals,
1018 kadm5_ad_get_principals(void *server_handle, const char *expression, char ***principals, int *count) argument

Completed in 230 milliseconds