/macosx-10.9.5/Heimdal-323.92.1/kadmin/ |
H A D | pw_quality.c | 41 krb5_principal principal; local 45 ret = krb5_parse_name(context, argv[0], &principal); 53 s = kadm5_check_password_quality (context, principal, &pw_data); 57 krb5_free_principal(context, principal);
|
H A D | del.c | 38 do_del_entry(krb5_principal principal, void *data) argument 40 return kadm5_delete_principal(kadm_handle, principal);
|
H A D | cpw.c | 46 set_random_key (krb5_principal principal, int keepold) argument 53 ret = kadm5_randkey_principal_3(kadm_handle, principal, keepold, 0, NULL, 64 set_random_password (krb5_principal principal, int keepold) argument 70 ret = kadm5_chpass_principal_3(kadm_handle, principal, keepold, 0, NULL, pw); 74 krb5_unparse_name(context, principal, &princ_name); 84 set_password (krb5_principal principal, char *password, int keepold) argument 93 krb5_unparse_name(context, principal, &princ_name); 104 ret = kadm5_chpass_principal_3(kadm_handle, principal, keepold, 0, NULL, 111 set_key_data (krb5_principal principal, krb5_key_data *key_data, int keepold) argument 115 ret = kadm5_chpass_principal_with_key_3(kadm_handle, principal, keepol 121 do_cpw_entry(krb5_principal principal, void *data) argument [all...] |
H A D | kadmin.local | 40 echo "add: no principal" | logger 43 principal="$1" 46 echo "principal: X${principal}X $(echo -n $principal | wc -c)" | logger 47 if test $(echo -n $principal | wc -c) = 40; then 52 cmd="/usr/sbin/kadmin -l $realm add --use-defaults --verbose $mod $principal" 112 echo "mod: no principal" | logger 115 principal="$1" 121 cmd="/usr/sbin/kadmin -l $realm add --use-defaults $mod $principal" [all...] |
/macosx-10.9.5/KerberosHelper-148/Source/ |
H A D | configureTestingLocalKDC | 24 my $principal; 29 $principal = sprintf "%s%s@%s", $service, $realmString, $realmString; 33 $principal = sprintf "%s@%s", $service, $realmString; 39 my @args = ('ank', @password, $principal); 47 my @args = ('ktadd', $principal);
|
H A D | configureAFPServer | 26 my $principal = sprintf "%s/%s@%s", $service, $realmString, $realmString; 33 system "/usr/bin/defaults", "write", $prefs, $key, $principal; 37 my @args = ('ank', '-randkey', $principal); 44 my @args = ('ktadd', $principal);
|
/macosx-10.9.5/Heimdal-323.92.1/admin/ |
H A D | remove.c | 44 krb5_principal principal = NULL; local 48 ret = krb5_parse_name(context, opt->principal_string, &principal); 62 if(principal) 63 krb5_free_principal(context, principal); 68 if (!principal && !enctype && !opt->kvno_integer) { 71 "principal, enctype or kvno."); 81 entry.principal = principal; 89 if(principal) 90 krb5_free_principal(context, principal); [all...] |
H A D | rename.c | 82 if(krb5_principal_compare(context, entry.principal, from_princ)) { 83 krb5_free_principal(context, entry.principal); 84 entry.principal = to_princ; 87 entry.principal = NULL; 93 entry.principal = from_princ; 96 entry.principal = NULL; 102 entry.principal = NULL;
|
H A D | change.c | 40 krb5_principal principal, krb5_kvno kvno, 51 ret = krb5_unparse_name (context, principal, &client_name); 60 realm = krb5_principal_get_realm(context, principal); 99 ret = kadm5_randkey_principal (kadm_handle, principal, &keys, &num_keys); 110 new_entry.principal = principal; 129 krb5_principal principal; member in struct:change_set 161 if (krb5_principal_compare (context, changeset[i].principal, 162 entry.principal)) { 184 if (krb5_principal_compare (context, princ, entry.principal)) 39 change_entry(krb5_keytab keytab, krb5_principal principal, krb5_kvno kvno, const char *realm, const char *admin_server, int server_port) argument [all...] |
/macosx-10.9.5/MITKerberosShim-62.1/test/ |
H A D | test_get_user_name.c | 14 KLPrincipal principal; local 18 &foundTickets, &principal, &cacheName); 22 error = KLGetTripletFromPrincipal (principal, &name, &instance, &realm); 23 KLDisposePrincipal (principal); 25 errx(1, "failed to parse principal");
|
/macosx-10.9.5/MITKerberosShim-62.1/PrivateKerberos/ |
H A D | pkinit_cert_store.h | 59 * Obtain signing cert for specified principal. On successful return, 65 const char *principal, /* full principal string */ 73 const char *principal); /* full principal string */ 77 * reference to it) as the specified principal's signing cert. Passing 82 const char *principal, /* full principal string */ 85 const char *principal, /* full principal strin [all...] |
/macosx-10.9.5/Heimdal-323.92.1/tests/kdc/ |
H A D | check-keys.in | 46 principal=host/datan.test.h5l.se@${R} 74 ${kadmin} add -p foo --use-defaults ${principal} || exit 1 76 ${kadmin} cpw -p foo ${principal} || exit 1 80 ${kadmin} cpw -p foo ${principal} || exit 1 84 ${kadmin} cpw -p foo ${principal} || exit 1 88 ${kadmin} cpw -p foo ${principal} || exit 1 92 ${kadmin} cpw -p foo ${principal} || exit 1 96 ${kadmin} cpw -p foo ${principal} || exit 1 100 ${kadmin} cpw -p foo ${principal} || exit 1
|
/macosx-10.9.5/Heimdal-323.92.1/lib/kadm5/ |
H A D | check-cracklib.pl | 8 # 1. Check that password is not the principal name 10 # 3. Check that password isn't repeated for this principal 50 my $principal = shift; 53 if ($principal eq $passwd) { 61 my $principal = shift; 69 $md5context->add($principal, ":", $passwd); 97 die "missing principal" if (!defined $params{'principal'}); 102 $reason = check_basic($params{'principal'}, $params{'new-password'}); 108 $reason = check_repeat($params{'principal'}, [all...] |
H A D | default_keys.c | 82 parse_file(krb5_context context, krb5_principal principal, int no_salt) argument 88 ret = hdb_generate_key_set(context, principal, 0, NULL, &keys, &nkeys, 103 krb5_principal principal; local 109 ret = krb5_parse_name(context, "lha@SU.SE", &principal); 113 parse_file(context, principal, 0); 114 parse_file(context, principal, 1); 116 krb5_free_principal(context, principal);
|
H A D | test_pw_quality.c | 41 static char *principal; variable 45 { "principal", 0, arg_string, &principal }, 70 if (principal == NULL) 71 krb5_errx(context, 1, "no principal given"); 75 ret = krb5_parse_name(context, principal, &p); 77 krb5_errx(context, 1, "krb5_parse_name: %s", principal);
|
H A D | kadm5-pwcheck.h | 55 krb5_principal principal,
|
/macosx-10.9.5/Heimdal-323.92.1/lib/gssapi/krb5/ |
H A D | iter_cred.c | 59 krb5_principal principal; local 63 ret = krb5_cc_get_principal(context, id, &principal); 69 if (krb5_principal_is_pku2u(context, principal)) 79 krb5_free_principal(context, principal); 93 handle->principal = principal; 96 handle->principal, &handle->endtime);
|
H A D | copy_ccache.c | 99 &handle->principal); 110 handle->principal, 113 krb5_free_principal(context, handle->principal); 124 handle->principal, 127 krb5_free_principal(context, handle->principal); 149 if (keytab_principal && handle->principal == NULL) { 152 &handle->principal); 177 if (handle->principal) 178 krb5_free_principal(context, handle->principal);
|
H A D | acquire_cred.c | 46 krb5_principal principal, 54 in_cred.client = principal; 56 realm = krb5_principal_get_realm(context, principal); 104 krb5_principal principal = tmp.principal; local 107 if (principal->name.name_string.len < 1 108 || strcmp(principal->name.name_string.val[0], service) != 0) 112 if (krb5_principal_is_lkdc(context, principal)) 114 if (krb5_principal_is_pku2u(context, principal)) 155 if (handle->principal) { 43 __gsskrb5_ccache_lifetime(OM_uint32 *minor_status, krb5_context context, krb5_ccache id, krb5_principal principal, time_t *endtime) argument 424 krb5_const_principal principal = (krb5_const_principal)desired_name; local 801 krb5_principal principal; local 1076 _gsspku2u_principal(krb5_context context, struct hx509_cert_data *cert, krb5_principal *principal) argument 1149 krb5_principal principal; member in struct:search [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | principal.c | 37 * @page krb5_principal_intro The principal handing functions. 39 * A Kerberos principal is a email address looking string that 41 * realm the principal belongs to and the former is a list of 0 or 69 * Frees a Kerberos principal allocated by the library with 71 * principal functions. 74 * @param p a principal to free. 92 * Set the type of the principal 95 * @param principal principal to set the type for 105 krb5_principal principal, 104 krb5_principal_set_type(krb5_context context, krb5_principal principal, int type) argument 123 krb5_principal_get_type(krb5_context context, krb5_const_principal principal) argument 141 krb5_principal_get_realm(krb5_context context, krb5_const_principal principal) argument 148 krb5_principal_get_comp_string(krb5_context context, krb5_const_principal principal, unsigned int component) argument 169 krb5_principal_get_num_comp(krb5_context context, krb5_const_principal principal) argument 189 krb5_parse_name_flags(krb5_context context, const char *name, int flags, krb5_principal *principal) argument 390 krb5_parse_name(krb5_context context, const char *name, krb5_principal *principal) argument 424 unparse_name_fixed(krb5_context context, krb5_const_principal principal, char *name, size_t len, int flags) argument 491 krb5_unparse_name_fixed(krb5_context context, krb5_const_principal principal, char *name, size_t len) argument 514 krb5_unparse_name_fixed_short(krb5_context context, krb5_const_principal principal, char *name, size_t len) argument 538 krb5_unparse_name_fixed_flags(krb5_context context, krb5_const_principal principal, int flags, char *name, size_t len) argument 548 unparse_name(krb5_context context, krb5_const_principal principal, char **name, int flags) argument 602 krb5_unparse_name(krb5_context context, krb5_const_principal principal, char **name) argument 623 krb5_unparse_name_flags(krb5_context context, krb5_const_principal principal, int flags, char **name) argument 645 krb5_unparse_name_short(krb5_context context, krb5_const_principal principal, char **name) argument 666 krb5_principal_set_realm(krb5_context context, krb5_principal principal, krb5_const_realm realm) argument 697 krb5_build_principal(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, ...) argument 725 krb5_make_principal(krb5_context context, krb5_principal *principal, krb5_const_realm realm, ...) argument 801 build_principal(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, void (*func)(krb5_context, krb5_principal, va_list), va_list ap) argument 832 krb5_build_principal_va(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, va_list ap) argument 842 krb5_build_principal_va_ext(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, va_list ap) argument 853 krb5_build_principal_ext(krb5_context context, krb5_principal *principal, int rlen, krb5_const_realm realm, ...) argument 1145 krb5_principal_is_null(krb5_context context, krb5_const_principal principal) argument 1179 krb5_principal_is_lkdc(krb5_context context, krb5_const_principal principal) argument 1191 krb5_principal_is_pku2u(krb5_context context, krb5_const_principal principal) argument 1216 krb5_principal_is_gss_hostbased_service(krb5_context context, krb5_const_principal principal) argument [all...] |
H A D | kuserok.c | 39 /* see if principal is mentioned in the filename access file, return 46 krb5_principal principal, 97 *result = krb5_principal_compare (context, principal, tmp); 112 krb5_principal principal, 159 ret = check_one_file(context, filename, pwd, principal, result); 172 krb5_principal principal, 180 if(krb5_principal_get_comp_string(context, principal, 1) != NULL) 188 if(strcmp(krb5_principal_get_realm(context, principal), 191 if(strcmp(krb5_principal_get_comp_string(context, principal, 0), 203 krb5_principal principal, 43 check_one_file(krb5_context context, const char *filename, struct passwd *pwd, krb5_principal principal, krb5_boolean *result) argument 109 check_directory(krb5_context context, const char *dirname, struct passwd *pwd, krb5_principal principal, krb5_boolean *result) argument 171 match_local_principals(krb5_context context, krb5_principal principal, const char *luser) argument 202 check_unix(krb5_context context, krb5_principal principal, const char *luser) argument 267 check_od(krb5_context context, krb5_principal principal, const char *luser) argument 336 krb5_kuserok(krb5_context context, krb5_principal principal, const char *luser) argument [all...] |
H A D | test_kuserok.c | 53 "principal luser"); 62 krb5_principal principal; local 89 ret = krb5_parse_name(context, argv[0], &principal); 93 ret = krb5_unparse_name(context, principal, &p); 97 ret = krb5_kuserok(context, principal, argv[1]);
|
/macosx-10.9.5/Heimdal-323.92.1/tests/java/ |
H A D | jaas.conf | 12 principal="host/localhost"
|
/macosx-10.9.5/MITKerberosShim-62.1/ |
H A D | keytab.c | 71 entry->principal = mshim_hprinc2mprinc(HC(context), e.principal); 88 krb5_free_principal(context, entry->principal); 116 mit_krb5_const_principal principal, 122 if(principal != NULL && 123 !krb5_principal_compare(context, entry->principal, principal)) 138 krb5_free_principal (context, entry->principal); 156 ret = krb5_copy_principal (context, in->principal, &out->principal); 114 krb5_kt_compare(mit_krb5_context context, mit_krb5_keytab_entry *entry, mit_krb5_const_principal principal, mit_krb5_kvno vno, mit_krb5_enctype enctype) argument 171 krb5_kt_get_entry(mit_krb5_context context, mit_krb5_keytab id, mit_krb5_const_principal principal, mit_krb5_kvno kvno, mit_krb5_enctype enctype, mit_krb5_keytab_entry *entry) argument 225 krb5_kt_read_service_key(mit_krb5_context context, mit_krb5_pointer keyprocarg, mit_krb5_principal principal, mit_krb5_kvno vno, mit_krb5_enctype enctype, mit_krb5_keyblock **key) argument [all...] |
/macosx-10.9.5/Heimdal-323.92.1/kuser/ |
H A D | kverify.c | 50 "[principal]"); 63 krb5_principal principal = NULL; local 97 ret = krb5_parse_name(context, argv[0], &principal); 101 ret = krb5_get_default_principal(context, &principal); 109 principal,
|