/macosx-10.9.5/Heimdal-323.92.1/tests/kdc/ |
H A D | check-delegation.in | 82 ${kadmin} add -p cross1 --use-defaults krbtgt/${R2}@${R} || exit 1 83 ${kadmin} add -p cross2 --use-defaults krbtgt/${R3}@${R2} || exit 1 84 ${kadmin} add -p cross3 --use-defaults krbtgt/${R4}@${R3} || exit 1 86 ${kadmin} modify --attributes=+ok-as-delegate krbtgt/${R2}@${R} || exit 1 87 ${kadmin} modify --attributes=+ok-as-delegate krbtgt/${R3}@${R2} || exit 1 123 ${kgetcred} krbtgt/${R2}@${R} || { ec=1 ; eval "${testfailed}"; } 124 ${kgetcred} krbtgt/${R3}@${R2} || { ec=1 ; eval "${testfailed}"; } 125 ${kgetcred} krbtgt/${R4}@${R3} || { ec=1 ; eval "${testfailed}"; }
|
H A D | check-kdc.in | 115 ${kadmin} cpw -r krbtgt/${R}@${R} || exit 1 116 ${kadmin} cpw -r krbtgt/${R}@${R} || exit 1 117 ${kadmin} cpw -r krbtgt/${R}@${R} || exit 1 118 ${kadmin} cpw -r krbtgt/${R}@${R} || exit 1 145 ${kadmin} add -p cross1 --use-defaults krbtgt/${R2}@${R} || exit 1 146 ${kadmin} add -p cross2 --use-defaults krbtgt/${R}@${R2} || exit 1 198 echo "Doing krbtgt key rollover"; > messages.log 199 ${kadmin} cpw -r --keepold krbtgt/${R}@${R} || exit 1 328 ${kgetcred} krbtgt/${R}@${R2} 2> /dev/null || \ 355 echo deleting all but aes enctypes on krbtgt [all...] |
H A D | check-referral.in | 94 ${kadmin} add -p cross1 --use-defaults krbtgt/${R2}@${R} || exit 1 95 ${kadmin} add -p cross2 --use-defaults krbtgt/${R}@${R2} || exit 1
|
H A D | check-des.in | 85 ${kadmin} cpw -r krbtgt/${R}@${R} || exit 1
|
/macosx-10.9.5/Heimdal-323.92.1/kdc/ |
H A D | windc.c | 90 hdb_entry_ex *krbtgt, 102 client, server, krbtgt, pac); 85 _kdc_pac_verify(krb5_context context, const krb5_principal client_principal, const krb5_principal delegated_proxy_principal, hdb_entry_ex *client, hdb_entry_ex *server, hdb_entry_ex *krbtgt, krb5_pac *pac, int *verified) argument
|
H A D | krb5tgs.c | 39 * return the realm of a krbtgt-ticket or NULL 107 hdb_entry_ex *krbtgt, 144 ret = hdb_enctype2key(context, &krbtgt->entry, enctype, &key); 191 hdb_entry_ex *krbtgt, 231 ret = hdb_enctype2key(context, &krbtgt->entry, sp.etype, &key); 287 hdb_entry_ex *krbtgt, 343 client, server, krbtgt, &pac, &signed_pac); 742 hdb_entry_ex *krbtgt, 803 krb5_principal_get_realm(context, krbtgt->entry.principal)); 948 krbtgt, 105 _kdc_add_KRB5SignedPath(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *krbtgt, krb5_enctype enctype, krb5_principal client, krb5_const_principal server, krb5_principals principals, EncTicketPart *tkt) argument 189 check_KRB5SignedPath(krb5_context context, krb5_kdc_configuration *config, hdb_entry_ex *krbtgt, krb5_principal cp, EncTicketPart *tkt, krb5_principals *delegated, int *signedpath) argument 281 check_PAC(krb5_context context, krb5_kdc_configuration *config, const krb5_principal client_principal, const krb5_principal delegated_proxy_principal, hdb_entry_ex *client, hdb_entry_ex *server, hdb_entry_ex *krbtgt, const EncryptionKey *server_check_key, const EncryptionKey *krbtgt_check_key, const EncryptionKey *server_sign_key, const EncryptionKey *krbtgt_sign_key, EncTicketPart *tkt, krb5_data *rspac, int *signedpath) argument 726 tgs_make_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, krb5_const_principal tgt_name, const EncTicketPart *tgt, const krb5_keyblock *replykey, int rk_is_subkey, const EncryptionKey *serverkey, const krb5_keyblock *sessionkey, krb5_kvno kvno, AuthorizationData *auth_data, hdb_entry_ex *server, krb5_principal server_principal, const char *server_name, hdb_entry_ex *client, krb5_principal client_principal, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, krb5_principals spp, const krb5_data *rspac, const METHOD_DATA *enc_pa_data, const char **e_text, krb5_data *reply) argument 1133 tgs_parse_request(krb5_context context, krb5_kdc_configuration *config, KDC_REQ_BODY *b, const PA_DATA *tgs_req, hdb_entry_ex **krbtgt, krb5_enctype *krbtgt_etype, krb5_ticket **ticket, const char **e_text, const char *from, const struct sockaddr *from_addr, time_t **csec, int **cusec, AuthorizationData **auth_data, krb5_keyblock **replykey, int *rk_is_subkey) argument 1467 tgs_build_reply(krb5_context context, krb5_kdc_configuration *config, KDC_REQ *req, KDC_REQ_BODY *b, hdb_entry_ex *krbtgt, krb5_enctype krbtgt_etype, const krb5_keyblock *replykey, int rk_is_subkey, krb5_ticket *ticket, krb5_data *reply, const char *from, const char **e_text, AuthorizationData **auth_data, const struct sockaddr *from_addr) argument 2311 hdb_entry_ex *krbtgt = NULL; local [all...] |
/macosx-10.9.5/Heimdal-323.92.1/appl/dceutils/ |
H A D | k5dcecon.c | 360 strcpy(tgtname,"krbtgt/"); 491 int k5dceupdate(krbtgt, pag) 492 krb5_creds **krbtgt; 504 if (code = ccache->ops->init(ccache,(*krbtgt)->client)) { 510 if (code = ccache->ops->store(ccache, *krbtgt)) { 515 sec_login_pag_new_tgt(pag, (*krbtgt)->times.endtime); 521 int k5dcecreate(luid, luser, pname, krbtgt) 525 krb5_creds **krbtgt; 597 sec_login_krb5_add_cred(lcontext, *krbtgt, &st);
|
/macosx-10.9.5/Heimdal-323.92.1/tests/plugin/ |
H A D | windc.c | 48 struct hdb_entry_ex * krbtgt, 43 pac_verify(void *ctx, krb5_context context, const krb5_principal new_ticket_client, const krb5_principal delegation_proxy, struct hdb_entry_ex * client, struct hdb_entry_ex * server, struct hdb_entry_ex * krbtgt, krb5_pac *pac) argument
|
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | get_cred.c | 87 krb5_creds *krbtgt, 136 krbtgt, 168 krbtgt->server->name.name_string.val[1], 199 &krbtgt->session, 201 &krbtgt->addresses, 233 * same as above, just get local addresses first if the krbtgt have 243 krb5_creds *krbtgt, 253 * Inherit the address-ness of the krbtgt if the address is not 257 if (addrs == NULL && krbtgt->addresses.len != 0) { 260 krb5_appdefault_boolean(context, NULL, krbtgt 82 get_cred_kdc(krb5_context context, krb5_ccache id, krb5_kdc_flags flags, krb5_addresses *addresses, krb5_creds *in_creds, krb5_creds *krbtgt, krb5_principal impersonate_principal, Ticket *second_ticket, const char *kdc_hostname, krb5_creds *out_creds) argument 238 get_cred_kdc_address(krb5_context context, krb5_ccache id, krb5_kdc_flags flags, krb5_addresses *addrs, krb5_creds *in_creds, krb5_creds *krbtgt, krb5_principal impersonate_principal, Ticket *second_ticket, const char *kdc_hostname, krb5_creds *out_creds) argument 289 krb5_creds *krbtgt; local [all...] |
H A D | tkt.c | 132 * (if not-NULL), `in_creds', `krbtgt', and returning the generated 144 krb5_creds *krbtgt, 153 /* inherit the forwardable/proxyable flags from the krbtgt */ 154 flags.b.forwardable = krbtgt->flags.b.forwardable; 155 flags.b.proxiable = krbtgt->flags.b.proxiable; 190 ret = krb5_crypto_init(context, &krbtgt->session, 0, &crypto); 317 ret = krb5_auth_con_generatelocalsubkey(context, ac, &krbtgt->session); 331 krbtgt); 487 * Store all credentials that seems not to be _the_ krbtgt 816 N_("Got back an non krbtgt " 137 _krb5_init_tgs_req(krb5_context context, krb5_ccache ccache, krb5_addresses *addresses, krb5_kdc_flags flags, krb5_const_principal impersonate_principal, Ticket *second_ticket, krb5_creds *in_creds, krb5_creds *krbtgt, unsigned nonce, METHOD_DATA *padata, krb5_keyblock **subkey, TGS_REQ *t) argument [all...] |
/macosx-10.9.5/Heimdal-323.92.1/tools/ |
H A D | kdc-log-analyze.pl | 355 if (/AS-REQ \(krb4\) (.*) from IPv([46]):([0-9\.:a-fA-F]+) for krbtgt.*$/){ 393 if ($dest =~ /krbtgt\/([^@]+)@[^@]+/) {
|
/macosx-10.9.5/CPANInternal-140/Krb5-1.9/ |
H A D | Krb5.pm | 57 sub KRB5_TGS_NAME() { return "krbtgt"; } 197 krbtgt/REALM@REALM for the local realm. Returns an Authen::Krb5::Creds 206 given, it defaults to krbtgt/REALM@REALM for the local realm. Returns an 213 for the service (usually krbtgt/REALM@REALM). 'password' is the password 225 principal object for the service (usually krbtgt/REALM@REALM). 'keytab' is
|
/macosx-10.9.5/Heimdal-323.92.1/tests/apple/ |
H A D | check-apple-lkdc.in | 174 dscl . -append /Users/$o dsAttrTypeNative:KerberosUserName krbtgt/$r2@$r2 181 $hodadmin . alias-add $o krbtgt/$r2@$r2 || exit 1
|
/macosx-10.9.5/CPANInternal-140/Authen-Krb5/ |
H A D | Krb5.pm | 57 sub KRB5_TGS_NAME() { return "krbtgt"; } 195 for the service (usually krbtgt/REALM@REALM). 'password' is the password for 203 object for the service (usually krbtgt/REALM@REALM). 'keytab' is a keytab
|
/macosx-10.9.5/Heimdal-323.92.1/lib/akadmin/ |
H A D | admin.c | 779 int krbtgt, 809 if (krbtgt)
|