/macosx-10.10.1/Heimdal-398.1.2/admin/ |
H A D | destroy.c | 40 krb5_keytab keytab; local 42 if((keytab = ktutil_open_keytab()) == NULL) 45 ret = krb5_kt_destroy (context, keytab); 47 krb5_warn (context, ret, "destroy keytab failed");
|
H A D | rename.c | 43 krb5_keytab keytab; local 60 if((keytab = ktutil_open_keytab()) == NULL) { 66 ret = krb5_kt_start_seq_get(context, keytab, &cursor); 68 krb5_kt_close(context, keytab); 74 ret = krb5_kt_next_entry(context, keytab, &entry, &cursor); 77 krb5_warn(context, ret, "getting entry from keytab"); 85 ret = krb5_kt_add_entry(context, keytab, &entry); 94 ret = krb5_kt_remove_entry(context, keytab, &entry); 106 krb5_kt_end_seq_get(context, keytab, &cursor);
|
H A D | remove.c | 43 krb5_keytab keytab; local 76 if((keytab = ktutil_open_keytab()) == NULL) { 84 ret = krb5_kt_remove_entry(context, keytab, &entry); 85 krb5_kt_close(context, keytab);
|
H A D | purge.c | 107 krb5_keytab keytab; local 119 if((keytab = ktutil_open_keytab()) == NULL) 122 ret = krb5_kt_start_seq_get(context, keytab, &cursor); 128 while(krb5_kt_next_entry(context, keytab, &entry, &cursor) == 0) { 132 krb5_kt_end_seq_get(context, keytab, &cursor); 136 ret = krb5_kt_start_seq_get(context, keytab, &cursor); 142 while(krb5_kt_next_entry(context, keytab, &entry, &cursor) == 0) { 159 ret = krb5_kt_remove_entry (context, keytab, &entry); 165 ret = krb5_kt_end_seq_get(context, keytab, &cursor); 170 krb5_kt_close (context, keytab); [all...] |
H A D | list.c | 41 krb5_keytab keytab; local 63 ret = krb5_kt_resolve(context, keytab_str, &keytab); 65 krb5_warn(context, ret, "resolving keytab %s", keytab_str); 69 ret = krb5_kt_start_seq_get(context, keytab, &cursor); 72 krb5_kt_close(context, keytab); 89 while(krb5_kt_next_entry(context, keytab, &entry, &cursor) == 0){ 142 ret = krb5_kt_end_seq_get(context, keytab, &cursor); 148 krb5_kt_close(context, keytab); 163 krb5_warn(context, ret, "getting default keytab name");
|
H A D | change.c | 39 change_entry (krb5_keytab keytab, argument 115 ret = krb5_kt_add_entry (context, keytab, &new_entry); 124 * loop over all the entries in the keytab (or those given) and change 137 krb5_keytab keytab; local 144 if((keytab = ktutil_open_keytab()) == NULL) 151 ret = krb5_kt_start_seq_get(context, keytab, &cursor); 157 while((ret = krb5_kt_next_entry(context, keytab, &entry, &cursor)) == 0) { 217 krb5_kt_end_seq_get(context, keytab, &cursor); 234 ret = change_entry (keytab, 249 krb5_kt_close(context, keytab); [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/kadm5/ |
H A D | client_glue.c | 78 const char *keytab, 86 keytab, 97 const char *keytab, 106 keytab, 77 kadm5_init_with_skey(const char *client_name, const char *keytab, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument 95 kadm5_init_with_skey_ctx(krb5_context context, const char *client_name, const char *keytab, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
|
H A D | server_glue.c | 78 const char *keytab, 86 keytab, 97 const char *keytab, 106 keytab, 77 kadm5_init_with_skey(const char *client_name, const char *keytab, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument 95 kadm5_init_with_skey_ctx(krb5_context context, const char *client_name, const char *keytab, const char *service_name, kadm5_config_params *realm_params, unsigned long struct_version, unsigned long api_version, void **server_handle) argument
|
/macosx-10.10.1/Heimdal-398.1.2/lib/gssapi/krb5/ |
H A D | copy_ccache.c | 71 krb5_keytab keytab, 144 if (keytab) { 157 kret = krb5_kt_get_full_name(context, keytab, &str); 161 kret = krb5_kt_resolve(context, str, &handle->keytab); 175 if (handle->keytab) 176 krb5_kt_close(context, handle->keytab); 68 _gsskrb5_krb5_import_cred(OM_uint32 *minor_status, krb5_ccache id, krb5_principal keytab_principal, krb5_keytab keytab, gss_cred_id_t *cred) argument
|
H A D | add_cred.c | 111 handle->keytab = NULL; 124 if (cred->keytab) { 129 kret = krb5_kt_get_full_name(context, cred->keytab, &name); 136 &handle->keytab); 219 if (handle->keytab) 220 krb5_kt_close(context, handle->keytab);
|
H A D | release_cred.c | 58 if (cred->keytab != NULL) 59 krb5_kt_close(context, cred->keytab);
|
H A D | set_cred_option.c | 45 krb5_keytab keytab = NULL; local 79 /* keytab principal name */ 91 /* keytab principal */ 99 ret = krb5_kt_resolve(context, str, &keytab); 110 keytab, cred_handle); 116 if (keytab) 117 krb5_kt_close(context, keytab);
|
/macosx-10.10.1/MITKerberosShim-66/ |
H A D | keytab.c | 39 krb5_kt_start_seq_get(mit_krb5_context context, mit_krb5_keytab keytab, argument 48 ret = heim_krb5_kt_start_seq_get(HC(context), (krb5_keytab)keytab, (krb5_kt_cursor *)*cursor); 57 krb5_kt_next_entry(mit_krb5_context context, mit_krb5_keytab keytab, argument 65 ret = heim_krb5_kt_next_entry(HC(context), (krb5_keytab)keytab, 99 krb5_kt_end_seq_get(mit_krb5_context context, mit_krb5_keytab keytab, argument 106 ret = heim_krb5_kt_end_seq_get(HC(context), (krb5_keytab)keytab, (krb5_kt_cursor *)*cursor); 193 /* the file keytab might only store the lower 8 bits of 217 mit_krb5_keytab keytab, 221 return heim_krb5_kt_get_name(HC(context), (krb5_keytab)keytab, name, namelen); 232 mit_krb5_keytab keytab; local 216 krb5_kt_get_name(mit_krb5_context context, mit_krb5_keytab keytab, char *name, unsigned int namelen) argument [all...] |
/macosx-10.10.1/Heimdal-398.1.2/tests/kdc/ |
H A D | check-hdb-mitdb.in | 65 keytabfile=${objdir}/server.keytab 66 keytab="FILE:${keytabfile}" 82 ${kadmin} ext -k ${keytab} ${server}@${R} || exit 1 108 ${test_ap_req} ${server}@${R} ${keytab} ${cache} || \
|
H A D | check-kdc.in | 76 keytabfile=${testdir}/server.keytab 77 keytab="FILE:${keytabfile}" 87 kimpersonate="${kimpersonate} -k ${keytab} --ccache=${ocache}" 129 ${kadmin} ext -k ${keytab} ${server}@${R} || exit 1 130 ${kadmin} ext -k ${keytab} ${ps} || exit 1 133 ${kadmin} ext -k ${keytab} ${server2}@${R2} || exit 1 135 ${kadmin} ext -k ${keytab} ${serverip}@${R} || exit 1 137 ${kadmin} ext -k ${keytab} ${serveripname}@${R} || exit 1 142 ${kadmin} ext -k ${keytab} ${alias1}@${R} || exit 1 162 ${ktutil} -k ${keytab} lis [all...] |
H A D | check-iprop.in | 52 keytabfile=${objdir}/iprop.keytab 53 keytab="FILE:${keytabfile}" 81 ${kadmin} -l ext -k ${keytab} iprop/localhost@${R} || exit 1 83 ${kadmin} -l ext -k ${keytab} iprop/slave.test.h5l.se@${R} || exit 1 103 ${ipropd_master} --hostname=localhost -k ${keytab} \ 111 ${ipropd_slave} --hostname=slave.test.h5l.se -k ${keytab} localhost & 163 ${ipropd_slave} --hostname=slave.test.h5l.se -k ${keytab} localhost & 181 ${ipropd_slave} --hostname=slave.test.h5l.se -k ${keytab} localhost & 221 ${ipropd_master} --hostname=localhost -k ${keytab} \ 229 ${ipropd_slave} --hostname=slave.test.h5l.se -k ${keytab} localhos [all...] |
H A D | check-fuzzer.in | 64 keytabfile=${testdir}/server.keytab 65 keytab="FILE:${keytabfile}" 89 ${kadmin} ext -k ${keytab} ${server}@${R} || exit 1 118 ${test_ap_req} ${server}@${R} ${keytab} ${cache} || \
|
/macosx-10.10.1/Heimdal-398.1.2/tests/plugin/ |
H A D | check-pac.in | 55 keytabfile=${objdir}/server.keytab 56 keytab="FILE:${keytabfile}" 83 ${kadmin} ext -k ${keytab} ${server}@${R} || exit 1 118 ${test_apreq} --verify-pac ${server}@${R} ${keytab} ${cache} || \ 128 ${test_apreq} --verify-pac ${server}@${R} ${keytab} ${cache} || \ 138 ${test_apreq} --verify-pac ${server}@${R} ${keytab} ${cache} 2> /dev/null && \
|
/macosx-10.10.1/MITKerberosShim-66/test/ |
H A D | test-authen::krb5.pl | 10 my $keytab = shift; 12 if ( !-e $keytab ) { 13 die("The keytab file '$keytab' does not exist."); 20 my $kt = Authen::Krb5::kt_resolve($keytab); 24 # the 4th parameter is the keytab. If the keytab is not in '/etc/krb5.keytab' then 25 # the keytab file must be specified. 88 my $client = getPrincipalFromServiceRequestTicket($ticket, "/etc/krb5.keytab"); [all...] |
/macosx-10.10.1/Heimdal-398.1.2/lib/hdb/ |
H A D | hdb-keytab.c | 41 krb5_keytab keytab; member in struct:__anon571 54 assert(k->keytab); 56 ret = krb5_kt_close(context, k->keytab); 57 k->keytab = NULL; 110 assert(k->keytab == NULL); 112 ret = krb5_kt_resolve(context, k->path, &k->keytab); 139 ret = krb5_parse_name(context, "hdb/keytab@WELL-KNOWN:KEYTAB-BACKEND", 151 ret = krb5_kt_get_entry(context, k->keytab, principal, kvno, 0, &ktentry);
|
/macosx-10.10.1/Heimdal-398.1.2/tests/gss/ |
H A D | check-gssmask.in | 49 keytabfile=${objdir}/server.keytab 50 keytab="FILE:${keytabfile}" 78 ${kadmin} ext -k ${keytab} host/n1.test.h5l.se@${R} || exit 1 79 ${kadmin} ext -k ${keytab} host/n2.test.h5l.se@${R} || exit 1 80 ${kadmin} ext -k ${keytab} host/n3.test.h5l.se@${R} || exit 1
|
/macosx-10.10.1/Heimdal-398.1.2/lib/krb5/ |
H A D | verify_init.c | 91 krb5_keytab keytab = NULL; local 123 ret = krb5_kt_default (context, &keytab); 127 keytab = ap_req_keytab; 186 keytab, 200 if (ap_req_keytab == NULL && keytab) 201 krb5_kt_close (context, keytab);
|
H A D | test_ap-req.c | 70 krb5_keytab keytab, 95 keytab, 168 const char *principal, *keytab, *ccache; local 193 keytab = argv[1]; 208 ret = krb5_kt_resolve(context, keytab, &kt); 67 test_ap(krb5_context context, krb5_principal target, krb5_principal server, krb5_keytab keytab, krb5_ccache ccache, const krb5_flags client_flags) argument
|
/macosx-10.10.1/KerberosHelper-151/Source/ |
H A D | checkLocalKDC | 8 my $keytab = "/etc/krb5.keytab"; 60 if (! -e $keytab) { 61 messageout("noKeytab", "There is no keytab."); 64 if (-z $keytab) { 65 messageout("emptyKeytab", "The keytab is empty."); 70 messageout("brokenKeytab", "The keytab appears to be broken."); 80 messageout("incompleteKeytab", "The keytab appers to be incomplete.");
|
/macosx-10.10.1/Heimdal-398.1.2/kadmin/ |
H A D | ext.c | 38 krb5_keytab keytab; member in struct:ext_keytab_data 106 ret = krb5_kt_add_entry(context, e->keytab, &keys[i]); 129 ret = krb5_kt_default(context, &data.keytab); 131 ret = krb5_kt_resolve(context, opt->keytab_string, &data.keytab); 144 krb5_kt_close(context, data.keytab);
|