/macosx-10.9.5/KerberosHelper-148/Source/ |
H A D | lookupDSLocalKDC.h | 33 OSStatus DSCopyLocalKDC (CFStringRef *realm);
|
H A D | checkLocalKDC | 34 my $realm = `$dscl . -read /Config/KerberosKDC RealName | awk '{print \$2}'`; 35 chomp ($realm); 37 if ($realm eq "") { 42 if ($realm =~ /^.*LKDC:SHA1\.([0-9A-F]{40}).*$/) { 46 messageout("notLocalRealm", "This ($realm) is not a LocalKDC realm."); 57 messageout("nonMatchingCert", "The KDC certificate hash ($kdccerthash) does not match the realm ($realmhash)."); 75 if ($ktentry =~ /^.*?aes.*?afpserver\/$realm\@$realm.*$/) { 83 my $kadmincheck = system("$kadmin -l check --ds-local $realm"); [all...] |
H A D | configureTestingLocalKDC | 8 my $realm = "/var/db/realm.local"; 10 if (! -f $realm) { 14 open (REALM, '<'. $realm) or die "No realm";
|
/macosx-10.9.5/MITKerberosShim-62.1/test/ |
H A D | test-gss.sh | 4 realm="TEST.APPLE.COM" 24 kadmin="kadmin -l -r ${realm}" 29 echo "realm : ${realm}" 40 -e "s,[@]realm[@],${realm},g" \ 52 --realm-max-ticket-life=1day \ 53 --realm-max-renewable-life=1month \ 54 "${realm}" || exit 1 56 ${kadmin} add -p "${pass}" --use-defaults "${user}@${realm}" || exi [all...] |
H A D | test_get_user_name.c | 11 char *name, *instance, *realm; local 22 error = KLGetTripletFromPrincipal (principal, &name, &instance, &realm); 27 printf("name: %s instance: %s realm: %s\n", name, instance, realm); 31 KLDisposeString (realm);
|
H A D | test-authen::krb5.pl | 34 my $server = $serverPrincipal->data . '@' . $serverPrincipal->realm; 35 my $client = $clientPrincipal->data . '@' . $clientPrincipal->realm; 46 my $realm = shift; 50 if ( defined($realm) && $realm ) { 51 printf("KrbConnect-getServiceRequestTicket: Set the default realm to '$realm'\n"); 52 Authen::Krb5::set_default_realm($realm); 60 printf("getServiceRequestTicket: Default realm: %s\n", Authen::Krb5::get_default_realm() );
|
/macosx-10.9.5/ruby-104/ruby/lib/webrick/httpauth/ |
H A D | userdb.rb | 28 # Creates an obscured password in +realm+ with +user+ and +password+ 31 def make_passwd(realm, user, pass) 32 @auth_type::make_passwd(realm, user, pass) 36 # Sets a password in +realm+ with +user+ and +password+ for the 39 def set_passwd(realm, user, pass) 44 # Retrieves a password in +realm+ for +user+ for the auth_type of this 47 def get_passwd(realm, user, reload_db=false) 48 make_passwd(realm, user, self[user])
|
H A D | htdigest.rb | 19 # matched to a realm where they are valid. For security, the path for a 27 # htpasswd.set_passwd 'my realm', 'username', 'password' 56 user, realm, pass = line.split(/:/, 3) 57 unless @digest[realm] 58 @digest[realm] = Hash.new 60 @digest[realm][user] = pass 84 # Retrieves a password from the database for +user+ in +realm+. If 87 def get_passwd(realm, user, reload_db) 89 if hash = @digest[realm] 95 # Sets a password in the database for +user+ in +realm [all...] |
/macosx-10.9.5/OpenSSH-186/openssh/regress/ |
H A D | gssapi.sh | 4 realm="TEST.APPLE.COM" 24 kadmin="kadmin -l -r ${realm}" 34 -e "s,[@]realm[@],${realm},g" \ 40 --realm-max-ticket-life=1day \ 41 --realm-max-renewable-life=1month \ 42 "${realm}" || exit 1 44 ${kadmin} add -p "${pass}" --use-defaults "${user}@${realm}" || exit 1 45 ${kadmin} add -r --use-defaults "host/${server}@${realm}" || exit 1 46 ${kadmin} ext_keytab "${user}@${realm}" || exi [all...] |
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/ |
H A D | appdefault.c | 38 krb5_const_realm realm, const char *option, 47 if(realm != NULL) 49 "realms", realm, option, NULL); 55 if(realm != NULL) 58 realm, 67 if(realm != NULL) 71 realm, 80 krb5_const_realm realm, const char *option, 88 if(realm != NULL) 90 "realms", realm, optio 37 krb5_appdefault_boolean(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, krb5_boolean def_val, krb5_boolean *ret_val) argument 79 krb5_appdefault_string(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, const char *def_val, char **ret_val) argument 123 krb5_appdefault_time(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, time_t def_val, time_t *ret_val) argument [all...] |
H A D | asn1_glue.c | 51 const Realm realm) 64 p->realm = strdup(realm); 65 if (p->realm == NULL) { 48 _krb5_principalname2krb5_principal(krb5_context context, krb5_principal *principal, const PrincipalName from, const Realm realm) argument
|
H A D | set_default_realm.c | 38 add_default_realm(krb5_context context, void *userctx, krb5_const_realm realm) argument 41 heim_string_t s = heim_string_create(realm); 70 * Set the knowledge of the default realm(s) in context. 71 * If realm is not NULL, that's the new default realm. 72 * Otherwise, the realm(s) are figured out from plugin, configuration file or DNS. 75 * @param realm the new default realm or NULL for using configuration. 85 const char *realm) 94 if (realm 84 krb5_set_default_realm(krb5_context context, const char *realm) argument [all...] |
H A D | test_x500.c | 44 const char *realm, 56 va_start(va, realm); 58 while (realm) { 60 inrealms[num_inrealms] = rk_UNCONST(realm); 62 realm = va_arg(va, const char *); 41 check_linear(krb5_context context, const char *client_realm, const char *server_realm, const char *realm, ...) argument
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient/ |
H A D | kcglue_krb.h | 8 #define KCGLUE_ITEM_SIZE (40) /* name instance or realm size*/ 9 #define KCGLUE_MAX_K_STR_LEN (KCGLUE_ITEM_SIZE*3+2) /* id.instance@realm */ 17 char *realm,
|
H A D | kcglue_krb.c | 92 * given a service instance and realm, combine them to foo.bar@REALM 95 static int implode_krb_user_info(char *dst,const char *service,const char *instance,const char *realm) argument 101 if(strlen(realm)>=KCGLUE_ITEM_SIZE) 111 strcpy(dst,realm); 115 int kcglue_krb_mk_req(void *dat,int *len, const char *service, char *instance, char *realm, argument 127 if(!implode_krb_user_info(user_id,service,instance,realm))
|
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/ |
H A D | kcglue_krb.h | 8 #define KCGLUE_ITEM_SIZE (40) /* name instance or realm size*/ 9 #define KCGLUE_MAX_K_STR_LEN (KCGLUE_ITEM_SIZE*3+2) /* id.instance@realm */ 17 char *realm,
|
/macosx-10.9.5/ruby-104/ruby/lib/webrick/ |
H A D | httpauth.rb | 26 # config = { :Realm => 'DigestAuth example realm' } 35 # realm for a server. 56 def _basic_auth(req, res, realm, req_field, res_field, err_type, 67 res[res_field] = "Basic realm=\"#{realm}\"" 73 # called with a request +req+, response +res+, authentication +realm+ and 78 def basic_auth(req, res, realm, &block) # :yield: username, password 79 _basic_auth(req, res, realm, "Authorization", "WWW-Authenticate", 85 # When called with a request +req+, response +res+, authentication +realm+ 90 def proxy_basic_auth(req, res, realm, [all...] |
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/sasldb/ |
H A D | sasldb.h | 63 const char *realm, 71 const char *realm, 83 const char *realm, 106 const char *realm, 112 const char *realm, 117 char *realm, const size_t max_realm, 123 const char *realm,
|
/macosx-10.9.5/MITKerberosShim-62.1/mittestcc/ |
H A D | test_ccapi_util.h | 9 cc_int32 new_v5_creds_union(cc_credentials_union *out_union, const char *realm);
|
/macosx-10.9.5/WebKit-7537.78.2/efl/ewk/ |
H A D | ewk_auth.h | 37 * @param realm auth's realm 41 typedef void (*Ewk_Auth_Show_Dialog_Callback)(const char *realm, const char *uri, void *data);
|
/macosx-10.9.5/WebCore-7537.78.1/platform/network/ |
H A D | ProtectionSpace.cpp | 50 ProtectionSpace::ProtectionSpace(const String& host, int port, ProtectionSpaceServerType serverType, const String& realm, ProtectionSpaceAuthenticationScheme authenticationScheme) argument 54 , m_realm(realm.length() ? realm : "") 83 const String& ProtectionSpace::realm() const function in class:WebCore::ProtectionSpace 114 // Ignore realm for proxies 115 if (!a.isProxy() && a.realm() != b.realm())
|
/macosx-10.9.5/sudo-72/src/auth/ |
H A D | kerb4.c | 55 static char realm[REALM_SZ]; local 61 /* Get the local realm, or retrun failure (no krb.conf) */ 62 if (krb_get_lrealm(realm, 1) != KSUCCESS) 65 /* Stash a pointer to the realm (used in kerb4_verify) */ 66 auth->data = (void *) realm; 78 char *realm = (char *) auth->data; local 90 error = krb_get_pw_in_tkt(pw->pw_name, "", realm, "krbtgt", realm,
|
/macosx-10.9.5/Heimdal-323.92.1/kadmin/ |
H A D | check.c | 108 char *realm = NULL, *p, *p2; local 112 ret = krb5_get_default_realm(context, &realm); 118 realm = strdup(argv[0]); 119 if (realm == NULL) { 131 if (asprintf(&p, "%s/%s@%s", KRB5_TGS_NAME, realm, realm) == -1) { 138 printf("%s doesn't exist, are you sure %s is a realm in your database", 139 p, realm); 152 if (asprintf(&p, "kadmin/admin@%s", realm) == -1) { 174 if (asprintf(&p, "kadmin/changepw@%s", realm) [all...] |
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/krb4_sources/ |
H A D | krb-protos.h | 83 char *realm, 123 char *realm, 214 char *realm, 239 char *realm, 252 char *realm, 259 char *realm)); 270 char *realm, 277 char *realm, 310 char *realm, 329 char *realm)); [all...] |
H A D | mk_req.c | 47 build_request(KTEXT req, char *name, char *inst, char *realm, argument 55 tmp = krb_put_nir(name, inst, realm, p, rem); 90 * be built, the name of a service, an instance, a realm, 109 * string realm server's realm 122 * string cr.pinst realm of principal 133 krb_mk_req(KTEXT authent, char *service, char *instance, char *realm, argument 163 krb_warning("Realm: %s\n", realm); 165 retval = krb_get_cred(service,instance,realm,&cr); 168 retval = get_ad_tkt(service, instance, realm, lifetim [all...] |