Searched refs:realm (Results 1 - 25 of 374) sorted by relevance

1234567891011>>

/macosx-10.9.5/KerberosHelper-148/Source/
H A DlookupDSLocalKDC.h33 OSStatus DSCopyLocalKDC (CFStringRef *realm);
H A DcheckLocalKDC34 my $realm = `$dscl . -read /Config/KerberosKDC RealName | awk '{print \$2}'`;
35 chomp ($realm);
37 if ($realm eq "") {
42 if ($realm =~ /^.*LKDC:SHA1\.([0-9A-F]{40}).*$/) {
46 messageout("notLocalRealm", "This ($realm) is not a LocalKDC realm.");
57 messageout("nonMatchingCert", "The KDC certificate hash ($kdccerthash) does not match the realm ($realmhash).");
75 if ($ktentry =~ /^.*?aes.*?afpserver\/$realm\@$realm.*$/) {
83 my $kadmincheck = system("$kadmin -l check --ds-local $realm");
[all...]
H A DconfigureTestingLocalKDC8 my $realm = "/var/db/realm.local";
10 if (! -f $realm) {
14 open (REALM, '<'. $realm) or die "No realm";
/macosx-10.9.5/MITKerberosShim-62.1/test/
H A Dtest-gss.sh4 realm="TEST.APPLE.COM"
24 kadmin="kadmin -l -r ${realm}"
29 echo "realm : ${realm}"
40 -e "s,[@]realm[@],${realm},g" \
52 --realm-max-ticket-life=1day \
53 --realm-max-renewable-life=1month \
54 "${realm}" || exit 1
56 ${kadmin} add -p "${pass}" --use-defaults "${user}@${realm}" || exi
[all...]
H A Dtest_get_user_name.c11 char *name, *instance, *realm; local
22 error = KLGetTripletFromPrincipal (principal, &name, &instance, &realm);
27 printf("name: %s instance: %s realm: %s\n", name, instance, realm);
31 KLDisposeString (realm);
H A Dtest-authen::krb5.pl34 my $server = $serverPrincipal->data . '@' . $serverPrincipal->realm;
35 my $client = $clientPrincipal->data . '@' . $clientPrincipal->realm;
46 my $realm = shift;
50 if ( defined($realm) && $realm ) {
51 printf("KrbConnect-getServiceRequestTicket: Set the default realm to '$realm'\n");
52 Authen::Krb5::set_default_realm($realm);
60 printf("getServiceRequestTicket: Default realm: %s\n", Authen::Krb5::get_default_realm() );
/macosx-10.9.5/ruby-104/ruby/lib/webrick/httpauth/
H A Duserdb.rb28 # Creates an obscured password in +realm+ with +user+ and +password+
31 def make_passwd(realm, user, pass)
32 @auth_type::make_passwd(realm, user, pass)
36 # Sets a password in +realm+ with +user+ and +password+ for the
39 def set_passwd(realm, user, pass)
44 # Retrieves a password in +realm+ for +user+ for the auth_type of this
47 def get_passwd(realm, user, reload_db=false)
48 make_passwd(realm, user, self[user])
H A Dhtdigest.rb19 # matched to a realm where they are valid. For security, the path for a
27 # htpasswd.set_passwd 'my realm', 'username', 'password'
56 user, realm, pass = line.split(/:/, 3)
57 unless @digest[realm]
58 @digest[realm] = Hash.new
60 @digest[realm][user] = pass
84 # Retrieves a password from the database for +user+ in +realm+. If
87 def get_passwd(realm, user, reload_db)
89 if hash = @digest[realm]
95 # Sets a password in the database for +user+ in +realm
[all...]
/macosx-10.9.5/OpenSSH-186/openssh/regress/
H A Dgssapi.sh4 realm="TEST.APPLE.COM"
24 kadmin="kadmin -l -r ${realm}"
34 -e "s,[@]realm[@],${realm},g" \
40 --realm-max-ticket-life=1day \
41 --realm-max-renewable-life=1month \
42 "${realm}" || exit 1
44 ${kadmin} add -p "${pass}" --use-defaults "${user}@${realm}" || exit 1
45 ${kadmin} add -r --use-defaults "host/${server}@${realm}" || exit 1
46 ${kadmin} ext_keytab "${user}@${realm}" || exi
[all...]
/macosx-10.9.5/Heimdal-323.92.1/lib/krb5/
H A Dappdefault.c38 krb5_const_realm realm, const char *option,
47 if(realm != NULL)
49 "realms", realm, option, NULL);
55 if(realm != NULL)
58 realm,
67 if(realm != NULL)
71 realm,
80 krb5_const_realm realm, const char *option,
88 if(realm != NULL)
90 "realms", realm, optio
37 krb5_appdefault_boolean(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, krb5_boolean def_val, krb5_boolean *ret_val) argument
79 krb5_appdefault_string(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, const char *def_val, char **ret_val) argument
123 krb5_appdefault_time(krb5_context context, const char *appname, krb5_const_realm realm, const char *option, time_t def_val, time_t *ret_val) argument
[all...]
H A Dasn1_glue.c51 const Realm realm)
64 p->realm = strdup(realm);
65 if (p->realm == NULL) {
48 _krb5_principalname2krb5_principal(krb5_context context, krb5_principal *principal, const PrincipalName from, const Realm realm) argument
H A Dset_default_realm.c38 add_default_realm(krb5_context context, void *userctx, krb5_const_realm realm) argument
41 heim_string_t s = heim_string_create(realm);
70 * Set the knowledge of the default realm(s) in context.
71 * If realm is not NULL, that's the new default realm.
72 * Otherwise, the realm(s) are figured out from plugin, configuration file or DNS.
75 * @param realm the new default realm or NULL for using configuration.
85 const char *realm)
94 if (realm
84 krb5_set_default_realm(krb5_context context, const char *realm) argument
[all...]
H A Dtest_x500.c44 const char *realm,
56 va_start(va, realm);
58 while (realm) {
60 inrealms[num_inrealms] = rk_UNCONST(realm);
62 realm = va_arg(va, const char *);
41 check_linear(krb5_context context, const char *client_realm, const char *server_realm, const char *realm, ...) argument
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient/
H A Dkcglue_krb.h8 #define KCGLUE_ITEM_SIZE (40) /* name instance or realm size*/
9 #define KCGLUE_MAX_K_STR_LEN (KCGLUE_ITEM_SIZE*3+2) /* id.instance@realm */
17 char *realm,
H A Dkcglue_krb.c92 * given a service instance and realm, combine them to foo.bar@REALM
95 static int implode_krb_user_info(char *dst,const char *service,const char *instance,const char *realm) argument
101 if(strlen(realm)>=KCGLUE_ITEM_SIZE)
111 strcpy(dst,realm);
115 int kcglue_krb_mk_req(void *dat,int *len, const char *service, char *instance, char *realm, argument
127 if(!implode_krb_user_info(user_id,service,instance,realm))
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/CommonKClient/mac_kclient3/
H A Dkcglue_krb.h8 #define KCGLUE_ITEM_SIZE (40) /* name instance or realm size*/
9 #define KCGLUE_MAX_K_STR_LEN (KCGLUE_ITEM_SIZE*3+2) /* id.instance@realm */
17 char *realm,
/macosx-10.9.5/ruby-104/ruby/lib/webrick/
H A Dhttpauth.rb26 # config = { :Realm => 'DigestAuth example realm' }
35 # realm for a server.
56 def _basic_auth(req, res, realm, req_field, res_field, err_type,
67 res[res_field] = "Basic realm=\"#{realm}\""
73 # called with a request +req+, response +res+, authentication +realm+ and
78 def basic_auth(req, res, realm, &block) # :yield: username, password
79 _basic_auth(req, res, realm, "Authorization", "WWW-Authenticate",
85 # When called with a request +req+, response +res+, authentication +realm+
90 def proxy_basic_auth(req, res, realm,
[all...]
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/sasldb/
H A Dsasldb.h63 const char *realm,
71 const char *realm,
83 const char *realm,
106 const char *realm,
112 const char *realm,
117 char *realm, const size_t max_realm,
123 const char *realm,
/macosx-10.9.5/MITKerberosShim-62.1/mittestcc/
H A Dtest_ccapi_util.h9 cc_int32 new_v5_creds_union(cc_credentials_union *out_union, const char *realm);
/macosx-10.9.5/WebKit-7537.78.2/efl/ewk/
H A Dewk_auth.h37 * @param realm auth's realm
41 typedef void (*Ewk_Auth_Show_Dialog_Callback)(const char *realm, const char *uri, void *data);
/macosx-10.9.5/WebCore-7537.78.1/platform/network/
H A DProtectionSpace.cpp50 ProtectionSpace::ProtectionSpace(const String& host, int port, ProtectionSpaceServerType serverType, const String& realm, ProtectionSpaceAuthenticationScheme authenticationScheme) argument
54 , m_realm(realm.length() ? realm : "")
83 const String& ProtectionSpace::realm() const function in class:WebCore::ProtectionSpace
114 // Ignore realm for proxies
115 if (!a.isProxy() && a.realm() != b.realm())
/macosx-10.9.5/sudo-72/src/auth/
H A Dkerb4.c55 static char realm[REALM_SZ]; local
61 /* Get the local realm, or retrun failure (no krb.conf) */
62 if (krb_get_lrealm(realm, 1) != KSUCCESS)
65 /* Stash a pointer to the realm (used in kerb4_verify) */
66 auth->data = (void *) realm;
78 char *realm = (char *) auth->data; local
90 error = krb_get_pw_in_tkt(pw->pw_name, "", realm, "krbtgt", realm,
/macosx-10.9.5/Heimdal-323.92.1/kadmin/
H A Dcheck.c108 char *realm = NULL, *p, *p2; local
112 ret = krb5_get_default_realm(context, &realm);
118 realm = strdup(argv[0]);
119 if (realm == NULL) {
131 if (asprintf(&p, "%s/%s@%s", KRB5_TGS_NAME, realm, realm) == -1) {
138 printf("%s doesn't exist, are you sure %s is a realm in your database",
139 p, realm);
152 if (asprintf(&p, "kadmin/admin@%s", realm) == -1) {
174 if (asprintf(&p, "kadmin/changepw@%s", realm)
[all...]
/macosx-10.9.5/passwordserver_sasl-170/cyrus_sasl/mac/krb4_sources/
H A Dkrb-protos.h83 char *realm,
123 char *realm,
214 char *realm,
239 char *realm,
252 char *realm,
259 char *realm));
270 char *realm,
277 char *realm,
310 char *realm,
329 char *realm));
[all...]
H A Dmk_req.c47 build_request(KTEXT req, char *name, char *inst, char *realm, argument
55 tmp = krb_put_nir(name, inst, realm, p, rem);
90 * be built, the name of a service, an instance, a realm,
109 * string realm server's realm
122 * string cr.pinst realm of principal
133 krb_mk_req(KTEXT authent, char *service, char *instance, char *realm, argument
163 krb_warning("Realm: %s\n", realm);
165 retval = krb_get_cred(service,instance,realm,&cr);
168 retval = get_ad_tkt(service, instance, realm, lifetim
[all...]

Completed in 262 milliseconds

1234567891011>>