Searched refs:principal (Results 1 - 15 of 15) sorted by relevance

/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/
H A Dsasl.c143 static ADS_STATUS ads_sasl_spnego_krb5_bind(ADS_STRUCT *ads, const char *principal) argument
150 rc = spnego_gen_negTokenTarg(principal, ads->auth.time_offset, &blob, &session_key, 0,
181 char *principal = NULL; local
204 if (!spnego_parse_negTokenInit(blob, OIDs, &principal)) {
222 DEBUG(3,("ads_sasl_spnego_bind: got server principal name = %s\n", principal));
229 the principal name back in the first round of
232 if ( !principal ) {
244 asprintf( &principal, "ldap/%s@%s", server, server_realm );
249 if ( !principal )
316 krb5_principal principal = NULL; local
[all...]
H A Dkrb5_setpw.c61 static DATA_BLOB encode_krb5_setpw(const char *principal, const char *password) argument
73 princ = SMB_STRDUP(principal);
228 {KRB5_KPASSWD_BAD_PRINCIPAL, "Target principal does not exist"},
545 krb5_principal principal = NULL; local
594 /* parse the principal we got as a function argument */
595 ret = smb_krb5_parse_name(context, princ, &principal);
607 /* The creds.server principal takes ownership of this memory.
610 krb5_princ_set_realm(context, creds.server, krb5_princ_realm(context, principal));
617 krb5_free_principal(context, principal);
619 DEBUG(1,("Failed to get principal fro
681 ads_krb5_chg_password(const char *kdc_host, const char *principal, const char *oldpw, const char *newpw, int time_offset) argument
780 char *principal = NULL; local
[all...]
H A Dkerberos.c63 int kerberos_kinit_password_ext(const char *principal, argument
98 if ((code = smb_krb5_parse_name(ctx, principal, &me))) {
271 Routine to fetch the salting principal for a service. Active
272 Directory may use a non-obvious principal name to generate the salt
367 Routine to get the salting principal for this service. This is
369 Since we store the salting principal string only at join, we may have
406 Routine to set the salting principal for this service. Active
407 Directory may use a non-obvious principal name to generate the salt
410 Setting principal to NULL deletes this entry.
415 const char *principal)
413 kerberos_secrets_store_salting_principal(const char *service, int enctype, const char *principal) argument
470 kerberos_kinit_password(const char *principal, const char *password, int time_offset, const char *cache_name) argument
[all...]
H A Dkerberos_verify.c64 /* Generate the list of principal names which we expect
90 /* Iterate through the keytab. For each key, if the principal
92 * try verifying the ticket using that principal. */
101 ret = smb_krb5_unparse_name(context, kt_entry.principal, &entry_princ_s);
120 kt_entry.principal, keytab,
143 "krb5_rd_req_return_keyblock_from_keytab succeeded for principal %s\n",
299 Verify an incoming ticket and parse out the principal name and
307 char **principal,
334 *principal = NULL;
500 if ((ret = smb_krb5_unparse_name(context, client_principal, principal))) {
303 ads_verify_ticket(TALLOC_CTX *mem_ctx, const char *realm, time_t time_offset, const DATA_BLOB *ticket, char **principal, PAC_DATA **pac_data, DATA_BLOB *ap_rep, DATA_BLOB *session_key) argument
[all...]
H A Dkerberos_keytab.c69 ret = smb_krb5_unparse_name(context, kt_entry.principal, &ktprinc);
92 DEBUG(10,("smb_krb5_kt_add_entry: ignoring keytab entry principal %s, kvno = %d\n",
100 DEBUG(5,("smb_krb5_kt_add_entry: Saving previous (kvno %d) entry for principal: %s.\n",
104 DEBUG(5,("smb_krb5_kt_add_entry: Found old entry for principal: %s (kvno %d) - trying to remove it.\n",
120 DEBUG(5,("smb_krb5_kt_add_entry: removed old entry for principal: %s (kvno %d).\n",
180 kt_entry.principal = princ;
220 Adds a single service principal, i.e. 'host' to the system keytab
304 /* Construct our principal */
307 /* It's a fully-named principal. */
313 /* It's a normal service principal
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/
H A Duams_gss.c142 /* get the principal from afpd and import it into server_name */
146 char *fqdn, *service, *principal, *p; local
163 "get_afpd_principal: could not retrieve information from afpd, using default service principal(s)");
169 /* allocate memory to hold the temporary principal string */
171 if ( NULL == (principal = (char*) malloc( principal_length)) ) {
179 * Build the principal string.
182 strlcpy( principal, service, principal_length);
183 strlcat( principal, "@", principal_length);
187 * We need to strip the port from fqdn for principal.
192 strlcat( principal, fqd
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/
H A Dclispnego.c27 OIDs (the mechanisms) and a principal name string
31 const char *principal)
56 asn1_write_GeneralString(&data,principal);
124 OIDs (the mechanisms) and a principal name string
128 char **principal)
152 *principal = NULL;
157 asn1_read_GeneralString(&data,principal);
171 SAFE_FREE(*principal);
344 int spnego_gen_negTokenTarg(const char *principal, int time_offset, argument
354 retval = cli_krb5_get_ticket(principal, time_offse
29 spnego_gen_negTokenInit(char guid[16], const char *OIDs[], const char *principal) argument
126 spnego_parse_negTokenInit(DATA_BLOB blob, char *OIDs[ASN1_MAX_OIDS], char **principal) argument
[all...]
H A Dclikrb5.c52 krb5_principal *principal)
61 ret = krb5_parse_name(context, utf8_name, principal);
73 krb5_principal *principal)
78 *principal = NULL;
83 ret = krb5_parse_name_norealm(context, utf8_name, principal);
95 krb5_const_principal principal,
102 ret = krb5_unparse_name(context, principal, &utf8_name);
239 * principal/enctype in a non-obvious way. If it is, try to match
562 const char *principal,
575 retval = smb_krb5_parse_name(context, principal,
50 smb_krb5_parse_name(krb5_context context, const char *name, krb5_principal *principal) argument
71 smb_krb5_parse_name_norealm_conv(krb5_context context, const char *name, krb5_principal *principal) argument
94 smb_krb5_unparse_name(krb5_context context, krb5_const_principal principal, char **unix_name) argument
559 ads_krb5_mk_req(krb5_context context, krb5_auth_context *auth_context, const krb5_flags ap_req_options, const char *principal, krb5_ccache ccache, krb5_data *outbuf, time_t *expire_time) argument
652 cli_krb5_get_ticket(const char *principal, time_t time_offset, DATA_BLOB *ticket, DATA_BLOB *session_key_krb5, uint32 extra_ap_opts, const char *ccname, time_t *tgs_expire) argument
753 krb5_princ_component(krb5_context context, krb5_principal principal, int i ) argument
1044 smb_krb5_parse_name_norealm(krb5_context context, const char *name, krb5_principal *principal) argument
1488 cli_krb5_get_ticket(const char *principal, time_t time_offset, DATA_BLOB *ticket, DATA_BLOB *session_key_krb5, uint32 extra_ap_opts, const char *ccname, time_t *tgs_expire) argument
[all...]
H A Dcliconnect.c606 static ADS_STATUS cli_session_setup_kerberos(struct cli_state *cli, const char *principal, const char *workgroup) argument
615 rc = spnego_gen_negTokenTarg(principal, 0, &negTokenTarg, &session_key_krb5, 0, NULL);
783 char *principal; local
806 if (!spnego_parse_negTokenInit(blob, OIDs, &principal)) {
822 DEBUG(3,("got principal=%s\n", principal ? principal : "<null>"));
824 if (got_kerberos_mechanism && (principal == NULL)) {
826 * It is WRONG to depend on the principal sent in the negprot
828 * segfault later) disable Kerberos when no principal wa
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/
H A Dntlm_auth.c999 pstring principal; local
1007 pstr_sprintf(principal, "%s$@%s", myname_lower, lp_realm());
1022 spnego.negTokenInit.mechListMIC = data_blob(principal,
1023 strlen(principal));
1154 char *principal; local
1171 &principal, NULL, &ap_rep,
1176 /* Now in "principal" we have the name we are
1181 domain = strchr_m(principal, '@');
1184 DEBUG(1, ("Did not get a valid principal "
1192 user = SMB_STRDUP(principal);
1399 char *principal; local
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/
H A Dincludes.h1099 krb5_principal *principal);
1102 krb5_const_principal principal,
1178 krb5_principal *principal);
1182 int cli_krb5_get_ticket(const char *principal, time_t time_offset,
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/
H A Dkssl.c194 krb5_principal *principal);
241 (krb5_context context, krb5_ccache cache, krb5_principal *principal) = NULL;
281 principal,
685 (krb5_context context, krb5_ccache cache, krb5_principal *principal) {
687 return (p_krb5_cc_get_principal(context, cache, principal));
689 return (krb5_x((cache)->ops->get_princ, (context, cache, principal)));
732 krb5_const_principal principal, krb5_kvno vno,
737 (context, keytab, principal, vno, enctype, entry));
1015 fprintf(stderr, "%s principal Realm: ", label);
1250 "Error building ticket server principal
684 kssl_krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument
731 kssl_krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/
H A Dkssl.c202 krb5_principal *principal);
252 krb5_principal *principal)=NULL;
289 krb5_const_principal principal, krb5_kvno vno,
727 krb5_principal *principal)
730 return(p_krb5_cc_get_principal(context,cache,principal));
733 ((cache)->ops->get_princ,(context, cache, principal)));
777 krb5_const_principal principal, krb5_kvno vno,
781 return(p_krb5_kt_get_entry(context,keytab,principal,vno,enctype,entry));
1038 printf("%s principal Realm: ", label);
1273 "Error building ticket server principal
725 kssl_krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument
776 kssl_krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/
H A Dkssl.c194 krb5_principal *principal);
241 (krb5_context context, krb5_ccache cache, krb5_principal *principal) = NULL;
281 principal,
685 (krb5_context context, krb5_ccache cache, krb5_principal *principal) {
687 return (p_krb5_cc_get_principal(context, cache, principal));
689 return (krb5_x((cache)->ops->get_princ, (context, cache, principal)));
732 krb5_const_principal principal, krb5_kvno vno,
737 (context, keytab, principal, vno, enctype, entry));
1015 fprintf(stderr, "%s principal Realm: ", label);
1250 "Error building ticket server principal
684 kssl_krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument
731 kssl_krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument
[all...]
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/
H A Dconfigure[all...]

Completed in 206 milliseconds