/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libads/ |
H A D | sasl.c | 143 static ADS_STATUS ads_sasl_spnego_krb5_bind(ADS_STRUCT *ads, const char *principal) argument 150 rc = spnego_gen_negTokenTarg(principal, ads->auth.time_offset, &blob, &session_key, 0, 181 char *principal = NULL; local 204 if (!spnego_parse_negTokenInit(blob, OIDs, &principal)) { 222 DEBUG(3,("ads_sasl_spnego_bind: got server principal name = %s\n", principal)); 229 the principal name back in the first round of 232 if ( !principal ) { 244 asprintf( &principal, "ldap/%s@%s", server, server_realm ); 249 if ( !principal ) 316 krb5_principal principal = NULL; local [all...] |
H A D | krb5_setpw.c | 61 static DATA_BLOB encode_krb5_setpw(const char *principal, const char *password) argument 73 princ = SMB_STRDUP(principal); 228 {KRB5_KPASSWD_BAD_PRINCIPAL, "Target principal does not exist"}, 545 krb5_principal principal = NULL; local 594 /* parse the principal we got as a function argument */ 595 ret = smb_krb5_parse_name(context, princ, &principal); 607 /* The creds.server principal takes ownership of this memory. 610 krb5_princ_set_realm(context, creds.server, krb5_princ_realm(context, principal)); 617 krb5_free_principal(context, principal); 619 DEBUG(1,("Failed to get principal fro 681 ads_krb5_chg_password(const char *kdc_host, const char *principal, const char *oldpw, const char *newpw, int time_offset) argument 780 char *principal = NULL; local [all...] |
H A D | kerberos.c | 63 int kerberos_kinit_password_ext(const char *principal, argument 98 if ((code = smb_krb5_parse_name(ctx, principal, &me))) { 271 Routine to fetch the salting principal for a service. Active 272 Directory may use a non-obvious principal name to generate the salt 367 Routine to get the salting principal for this service. This is 369 Since we store the salting principal string only at join, we may have 406 Routine to set the salting principal for this service. Active 407 Directory may use a non-obvious principal name to generate the salt 410 Setting principal to NULL deletes this entry. 415 const char *principal) 413 kerberos_secrets_store_salting_principal(const char *service, int enctype, const char *principal) argument 470 kerberos_kinit_password(const char *principal, const char *password, int time_offset, const char *cache_name) argument [all...] |
H A D | kerberos_verify.c | 64 /* Generate the list of principal names which we expect 90 /* Iterate through the keytab. For each key, if the principal 92 * try verifying the ticket using that principal. */ 101 ret = smb_krb5_unparse_name(context, kt_entry.principal, &entry_princ_s); 120 kt_entry.principal, keytab, 143 "krb5_rd_req_return_keyblock_from_keytab succeeded for principal %s\n", 299 Verify an incoming ticket and parse out the principal name and 307 char **principal, 334 *principal = NULL; 500 if ((ret = smb_krb5_unparse_name(context, client_principal, principal))) { 303 ads_verify_ticket(TALLOC_CTX *mem_ctx, const char *realm, time_t time_offset, const DATA_BLOB *ticket, char **principal, PAC_DATA **pac_data, DATA_BLOB *ap_rep, DATA_BLOB *session_key) argument [all...] |
H A D | kerberos_keytab.c | 69 ret = smb_krb5_unparse_name(context, kt_entry.principal, &ktprinc); 92 DEBUG(10,("smb_krb5_kt_add_entry: ignoring keytab entry principal %s, kvno = %d\n", 100 DEBUG(5,("smb_krb5_kt_add_entry: Saving previous (kvno %d) entry for principal: %s.\n", 104 DEBUG(5,("smb_krb5_kt_add_entry: Found old entry for principal: %s (kvno %d) - trying to remove it.\n", 120 DEBUG(5,("smb_krb5_kt_add_entry: removed old entry for principal: %s (kvno %d).\n", 180 kt_entry.principal = princ; 220 Adds a single service principal, i.e. 'host' to the system keytab 304 /* Construct our principal */ 307 /* It's a fully-named principal. */ 313 /* It's a normal service principal [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/netatalk-2.2.5/etc/uams/ |
H A D | uams_gss.c | 142 /* get the principal from afpd and import it into server_name */ 146 char *fqdn, *service, *principal, *p; local 163 "get_afpd_principal: could not retrieve information from afpd, using default service principal(s)"); 169 /* allocate memory to hold the temporary principal string */ 171 if ( NULL == (principal = (char*) malloc( principal_length)) ) { 179 * Build the principal string. 182 strlcpy( principal, service, principal_length); 183 strlcat( principal, "@", principal_length); 187 * We need to strip the port from fqdn for principal. 192 strlcat( principal, fqd [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/libsmb/ |
H A D | clispnego.c | 27 OIDs (the mechanisms) and a principal name string 31 const char *principal) 56 asn1_write_GeneralString(&data,principal); 124 OIDs (the mechanisms) and a principal name string 128 char **principal) 152 *principal = NULL; 157 asn1_read_GeneralString(&data,principal); 171 SAFE_FREE(*principal); 344 int spnego_gen_negTokenTarg(const char *principal, int time_offset, argument 354 retval = cli_krb5_get_ticket(principal, time_offse 29 spnego_gen_negTokenInit(char guid[16], const char *OIDs[], const char *principal) argument 126 spnego_parse_negTokenInit(DATA_BLOB blob, char *OIDs[ASN1_MAX_OIDS], char **principal) argument [all...] |
H A D | clikrb5.c | 52 krb5_principal *principal) 61 ret = krb5_parse_name(context, utf8_name, principal); 73 krb5_principal *principal) 78 *principal = NULL; 83 ret = krb5_parse_name_norealm(context, utf8_name, principal); 95 krb5_const_principal principal, 102 ret = krb5_unparse_name(context, principal, &utf8_name); 239 * principal/enctype in a non-obvious way. If it is, try to match 562 const char *principal, 575 retval = smb_krb5_parse_name(context, principal, 50 smb_krb5_parse_name(krb5_context context, const char *name, krb5_principal *principal) argument 71 smb_krb5_parse_name_norealm_conv(krb5_context context, const char *name, krb5_principal *principal) argument 94 smb_krb5_unparse_name(krb5_context context, krb5_const_principal principal, char **unix_name) argument 559 ads_krb5_mk_req(krb5_context context, krb5_auth_context *auth_context, const krb5_flags ap_req_options, const char *principal, krb5_ccache ccache, krb5_data *outbuf, time_t *expire_time) argument 652 cli_krb5_get_ticket(const char *principal, time_t time_offset, DATA_BLOB *ticket, DATA_BLOB *session_key_krb5, uint32 extra_ap_opts, const char *ccname, time_t *tgs_expire) argument 753 krb5_princ_component(krb5_context context, krb5_principal principal, int i ) argument 1044 smb_krb5_parse_name_norealm(krb5_context context, const char *name, krb5_principal *principal) argument 1488 cli_krb5_get_ticket(const char *principal, time_t time_offset, DATA_BLOB *ticket, DATA_BLOB *session_key_krb5, uint32 extra_ap_opts, const char *ccname, time_t *tgs_expire) argument [all...] |
H A D | cliconnect.c | 606 static ADS_STATUS cli_session_setup_kerberos(struct cli_state *cli, const char *principal, const char *workgroup) argument 615 rc = spnego_gen_negTokenTarg(principal, 0, &negTokenTarg, &session_key_krb5, 0, NULL); 783 char *principal; local 806 if (!spnego_parse_negTokenInit(blob, OIDs, &principal)) { 822 DEBUG(3,("got principal=%s\n", principal ? principal : "<null>")); 824 if (got_kerberos_mechanism && (principal == NULL)) { 826 * It is WRONG to depend on the principal sent in the negprot 828 * segfault later) disable Kerberos when no principal wa [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/utils/ |
H A D | ntlm_auth.c | 999 pstring principal; local 1007 pstr_sprintf(principal, "%s$@%s", myname_lower, lp_realm()); 1022 spnego.negTokenInit.mechListMIC = data_blob(principal, 1023 strlen(principal)); 1154 char *principal; local 1171 &principal, NULL, &ap_rep, 1176 /* Now in "principal" we have the name we are 1181 domain = strchr_m(principal, '@'); 1184 DEBUG(1, ("Did not get a valid principal " 1192 user = SMB_STRDUP(principal); 1399 char *principal; local [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/include/ |
H A D | includes.h | 1099 krb5_principal *principal); 1102 krb5_const_principal principal, 1178 krb5_principal *principal); 1182 int cli_krb5_get_ticket(const char *principal, time_t time_offset,
|
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl-1.0.2h/ssl/ |
H A D | kssl.c | 194 krb5_principal *principal); 241 (krb5_context context, krb5_ccache cache, krb5_principal *principal) = NULL; 281 principal, 685 (krb5_context context, krb5_ccache cache, krb5_principal *principal) { 687 return (p_krb5_cc_get_principal(context, cache, principal)); 689 return (krb5_x((cache)->ops->get_princ, (context, cache, principal))); 732 krb5_const_principal principal, krb5_kvno vno, 737 (context, keytab, principal, vno, enctype, entry)); 1015 fprintf(stderr, "%s principal Realm: ", label); 1250 "Error building ticket server principal 684 kssl_krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument 731 kssl_krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/timemachine/openssl-0.9.8e/ssl/ |
H A D | kssl.c | 202 krb5_principal *principal); 252 krb5_principal *principal)=NULL; 289 krb5_const_principal principal, krb5_kvno vno, 727 krb5_principal *principal) 730 return(p_krb5_cc_get_principal(context,cache,principal)); 733 ((cache)->ops->get_princ,(context, cache, principal))); 777 krb5_const_principal principal, krb5_kvno vno, 781 return(p_krb5_kt_get_entry(context,keytab,principal,vno,enctype,entry)); 1038 printf("%s principal Realm: ", label); 1273 "Error building ticket server principal 725 kssl_krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument 776 kssl_krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/openssl/ssl/ |
H A D | kssl.c | 194 krb5_principal *principal); 241 (krb5_context context, krb5_ccache cache, krb5_principal *principal) = NULL; 281 principal, 685 (krb5_context context, krb5_ccache cache, krb5_principal *principal) { 687 return (p_krb5_cc_get_principal(context, cache, principal)); 689 return (krb5_x((cache)->ops->get_princ, (context, cache, principal))); 732 krb5_const_principal principal, krb5_kvno vno, 737 (context, keytab, principal, vno, enctype, entry)); 1015 fprintf(stderr, "%s principal Realm: ", label); 1250 "Error building ticket server principal 684 kssl_krb5_cc_get_principal(krb5_context context, krb5_ccache cache, krb5_principal *principal) argument 731 kssl_krb5_kt_get_entry(krb5_context context, krb5_keytab keytab, krb5_const_principal principal, krb5_kvno vno, krb5_enctype enctype, krb5_keytab_entry *entry) argument [all...] |
/netgear-R7000-V1.0.7.12_1.2.5/ap/gpl/samba-3.0.25b/source/ |
H A D | configure | [all...] |